android_device_xiaomi_sdm66.../sepolicy/vendor
pix106 738dff294a sdm660-common: sepolicy: Address many denials
sdm660-common: sepolicy: Address vendor_init persist_file read denial
avc: denied { read } for comm="init" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:vendor_init:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0

sdm660-common: sepolicy: Address tee persist_file read denial
avc: denied { read } for comm="qseecomd" name="persist" dev="mmcblk0p63" ino=47 scontext=u:r:tee:s0 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0

sdm660-common: sepolicy: Address installd mnt_user_file denial
avc: denied { search } for comm="Binder:1018_6" name="0" dev="tmpfs" ino=5541 scontext=u:r:installd:s0 tcontext=u:object_r:mnt_user_file:s0 tclass=dir permissive=0

sdm660-common: sepolicy: Address ssgtzd qipcrtr_socket denial

sdm660-common: sepolicy: Address platform_app denials
avc: denied { read } for comm="emui:screenshot" name="u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=4254 scontext=u:r:platform_app:s0:c512,c768 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=0 app=com.android.systemui

sdm660-common: sepolicy: Address init sysfs_graphics denial
avc: denied { read } for comm="init" name="device" dev="sysfs" ino=44569 scontext=u:r:init:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=lnk_file permissive=0

sdm660-common: sepolicy: Address system_app sysfs_graphics denials
avc: denied { write } for comm="settings.device" name="max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0
avc: denied { open } for comm="settings.device" path="/sys/devices/platform/soc/800f000.qcom,spmi/spmi-0/spmi0-03/800f000.qcom,spmi:qcom,pm660l@3:qcom,leds@d000/leds/red/max_brightness" dev="sysfs" ino=44572 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_graphics:s0 tclass=file permissive=0

sdm660-common: sepolicy: Address system_server sysfs_rtc denial
avc: denied { read } for comm="system_server" name="hctosys" dev="sysfs" ino=41512 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0

sdm660-common: sepolicy: Address gmscore_app getattr denials
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/linkerconfig" dev="tmpfs" ino=3474 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:linkerconfig_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/persist" dev="mmcblk0p63" ino=47 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:persist_file:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/init" dev="mmcblk0p63" ino=28 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:init_exec:s0 tclass=lnk_file permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/metadata" dev="mmcblk0p63" ino=32 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/postinstall" dev="mmcblk0p63" ino=48 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:postinstall_mnt_dir:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware_mnt" dev="mmcblk0p58" ino=1 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms
avc: denied { getattr } for comm="CTION_IDLE_MODE" path="/vendor/firmware" dev="mmcblk0p64" ino=1216 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:vendor_firmware_file:s0 tclass=dir permissive=0 app=com.google.android.gms

sdm660-common: sepolicy: Address vendor_mutualex create denial
avc: denied { create } for comm="mutualex" scontext=u:r:vendor_mutualex:s0 tcontext=u:r:vendor_mutualex:s0 tclass=qipcrtr_socket permissive=0

Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
..
adsprpcd.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
app.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
bluetooth.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
bootanim.te sdm660-common: Address denials regarding to access sysfs_kgsl 2020-12-13 18:38:07 +06:00
cameraserver.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
cdsprpcd.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
cnd.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
device.te sdm660-common: sepolicy: Update sepolicy and cleanup 2020-12-21 09:16:25 +06:00
file.te sdm660-common: Introduce kernelspace battery saver 2021-11-13 11:31:49 +01:00
file_contexts sdm660-common: sepolicy: Label sysfs wakeup nodes 2021-11-13 11:31:51 +01:00
genfs_contexts sdm660-common: sepolicy: Remove some wakeup nodes 2021-11-13 11:31:51 +01:00
gmscore_app.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
hal_audio_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_bootctrl_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_camera_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_fingerprint_sdm660.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_ir_default.te wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR 2019-08-14 10:04:10 +02:00
hal_mlipay.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_neuralnetworks_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_power_default.te sdm660-common: Introduce kernelspace battery saver 2021-11-13 11:31:49 +01:00
hal_power_stats_default.te sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19 2021-07-16 15:56:07 +06:00
hal_sensors_default.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_wifi_default.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_wifi_hostapd_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hvdcp.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hwservice.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
hwservice_contexts sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
init.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
kernel.te sdm660-common: sepolicy: Add swapper to kill 2021-06-07 09:21:11 +06:00
mediaprovider.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
mutalex.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
netmgrd.te sdm660-common: sepolicy: Remove netmgrd set_prop vendor_data_ko_prop 2021-11-13 11:31:51 +01:00
poweroffalarm_app.te sdm660-common: sepolicy: Allow power off alarm app to set cpuset 2019-12-02 07:57:05 +01:00
property.te Revert "sdm660-common: sepolicy: Adjust sepolicy for qti thermal" 2021-11-13 11:31:51 +01:00
property_contexts sdm660-common: sepolicy: Label sys.use_fifo_ui and address system_server vendor_video_prop denial 2021-11-13 11:31:51 +01:00
qti_init_shell.te sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19 2021-07-16 15:56:07 +06:00
radio.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
rild.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
ssgtzd.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
system_app.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
system_server.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
tee.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
thermal-engine.te Revert "sdm660-common: sepolicy: Adjust sepolicy for qti thermal" 2021-11-13 11:31:51 +01:00
ueventd.te sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19 2021-07-16 15:56:07 +06:00
vendor_init.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
vendor_mutualex_exec.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
vendor_tinyalse.te sdm660-common: Build vendor variant of tinymix 2019-12-01 10:27:53 +01:00
vendor_toolbox.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
wcnss_service.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00