android_device_xiaomi_sdm66.../sepolicy/vendor
pix106 d05ecaa812 sdm660-common: sepolicy: Address many sys_admin and kill denials
sdm660-common: sepolicy: Address qti_init_shell kill denial
avc: denied { kill } for comm="init.class_main" capability=5 scontext=u:r:qti_init_shell:s0 tcontext=u:r:qti_init_shell:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address hal_power_default kill and sys_admin denial
avc: denied { sys_admin } for comm="android.hardwar" capability=21 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0
avc: denied { kill } for comm="android.hardwar" capability=5 scontext=u:r:hal_power_default:s0 tcontext=u:r:hal_power_default:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vdc sys_admin denial
avc: denied { sys_admin } for comm="vdc" capability=21 scontext=u:r:vdc:s0 tcontext=u:r:vdc:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vold_prepare_subdirs sys_admin denial
avc: denied { sys_admin } for comm="vold_prepare_su" capability=21 scontext=u:r:vold_prepare_subdirs:s0 tcontext=u:r:vold_prepare_subdirs:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address fsck sys_admin denial
avc: denied { sys_admin } for comm="e2fsck" capability=21 scontext=u:r:fsck:s0 tcontext=u:r:fsck:s0 tclass=capability permissive=0

sdm660-common: sepolicy: address toolbox sys_admin, kill denial
avc: denied { sys_admin } for comm="mkswap" capability=21 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0
avc: denied { kill } for comm="mkswap" capability=5 scontext=u:r:toolbox:s0 tcontext=u:r:toolbox:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address ueventd kill and sys_admin denials
avc:  denied  { sys_admin } for  pid=460 comm="ueventd" capability=21  scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0
avc: denied { kill } for comm="ueventd" capability=5 scontext=u:r:ueventd:s0 tcontext=u:r:ueventd:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address irsc_util sys_admin denial
avc: denied { sys_admin } for comm="irsc_util" capability=21 scontext=u:r:irsc_util:s0 tcontext=u:r:irsc_util:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address rfs_access sys_admin denial
avc: denied { sys_admin } for comm="tftp_server" capability=21 scontext=u:r:rfs_access:s0 tcontext=u:r:rfs_access:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address rmt_storage sys_admin denial
avc: denied { sys_admin } for comm="rmt_storage" capability=21 scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vendor_pd_mapper sys_admin denial

sdm660-common: sepolicy: Address vendor_modprobe sys_admin denial
avc: denied { sys_admin } for comm="modprobe" capability=21 scontext=u:r:vendor_modprobe:s0 tcontext=u:r:vendor_modprobe:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address adbd sys_admin denial
avc: denied { sys_admin } for comm="adbd" capability=21 scontext=u:r:adbd:s0 tcontext=u:r:adbd:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vendor_dpmd sys_admin denial
avc: denied { sys_admin } for comm="dpmd" capability=21 scontext=u:r:vendor_dpmd:s0 tcontext=u:r:vendor_dpmd:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address thermal-engine sys_admin denial
avc: denied { sys_admin } for comm="thermal-engine" capability=21 scontext=u:r:thermal-engine:s0 tcontext=u:r:thermal-engine:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address usbd sys_admin denial
avc: denied { sys_admin } for comm="usbd" capability=21 scontext=u:r:usbd:s0 tcontext=u:r:usbd:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vendor_msm_irqbalanced sys_admin denial
avc: denied { sys_admin } for comm="msm_irqbalance" capability=21 scontext=u:r:vendor_msm_irqbalanced:s0 tcontext=u:r:vendor_msm_irqbalanced:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address hal_wifi_supplicant_default sys_admin denial
avc: denied { sys_admin } for comm="wpa_supplicant" capability=21 scontext=u:r:hal_wifi_supplicant_default:s0 tcontext=u:r:hal_wifi_supplicant_default:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address boringssl_self_test sys_admin denial
avc:  denied  { sys_admin } for  pid=460 comm="boringssl_self_" capability=21  scontext=u:r:boringssl_self_test:s0 tcontext=u:r:boringssl_self_test:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address vendor_boringssl_self_test sys_admin denial
avc:  denied  { sys_admin } for  pid=462 comm="boringssl_self_" capability=21  scontext=u:r:vendor_boringssl_self_test:s0 tcontext=u:r:vendor_boringssl_self_test:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address linkerconfig sys_admin denial
avc:  denied  { sys_admin } for  pid=459 comm="linkerconfig" capability=21  scontext=u:r:linkerconfig:s0 tcontext=u:r:linkerconfig:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address fsverity_init sys_admin denial
avc: denied { sys_admin } for comm="fsverity_init" capability=21 scontext=u:r:fsverity_init:s0 tcontext=u:r:fsverity_init:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address migrate_legacy_obb_data sys_admin denial
avc: denied { sys_admin } for comm="migrate_legacy_" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="mkdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="touch" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rm" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="rmdir" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0
avc: denied { sys_admin } for comm="log" capability=21 scontext=u:r:migrate_legacy_obb_data:s0 tcontext=u:r:migrate_legacy_obb_data:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address hvdcp sys_admin denial
avc: denied { sys_admin } for comm="hvdcp_opti" capability=21 scontext=u:r:hvdcp:s0 tcontext=u:r:hvdcp:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address netmgrd sys_admin denial
avc: denied { sys_admin } for comm="netmgrd" capability=21 scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability permissive=0

sdm660-common: sepolicy: Address adbroot sys_admin denial
avc: denied { sys_admin } for comm="adb_root" capability=21 scontext=u:r:adbroot:s0 tcontext=u:r:adbroot:s0 tclass=capability permissive=0

Signed-off-by: pix106 <sbordenave@gmail.com>
2021-11-13 11:31:51 +01:00
..
adbd.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
adsprpcd.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
app.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
bluetooth.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
bootanim.te sdm660-common: Address denials regarding to access sysfs_kgsl 2020-12-13 18:38:07 +06:00
cameraserver.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
cdsprpcd.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
cnd.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
device.te sdm660-common: sepolicy: Update sepolicy and cleanup 2020-12-21 09:16:25 +06:00
file.te sdm660-common: Introduce kernelspace battery saver 2021-11-13 11:31:49 +01:00
file_contexts sdm660-common: sepolicy: Label sysfs wakeup nodes 2021-11-13 11:31:51 +01:00
fsck.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
genfs_contexts sdm660-common: sepolicy: Remove some wakeup nodes 2021-11-13 11:31:51 +01:00
gmscore_app.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
hal_audio_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_bootctrl_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_camera_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_fingerprint_sdm660.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_ir_default.te wayne-common: Add BOARD_PLAT_[PUBLIC|PRIVATE]_SEPOLICY_DIR 2019-08-14 10:04:10 +02:00
hal_mlipay.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_neuralnetworks_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_power_default.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
hal_power_stats_default.te sdm66-common: sepolicy: Fix labeling sysfs nodes for K4.19 2021-07-16 15:56:07 +06:00
hal_sensors_default.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_wifi_default.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
hal_wifi_hostapd_default.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
hal_wifi_supplicant_default.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
hvdcp.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
hwservice.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
hwservice_contexts sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
init.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
irsc_util.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
kernel.te sdm660-common: sepolicy: Add swapper to kill 2021-06-07 09:21:11 +06:00
mediaprovider.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00
mutalex.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
netmgrd.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
poweroffalarm_app.te sdm660-common: sepolicy: Allow power off alarm app to set cpuset 2019-12-02 07:57:05 +01:00
property.te Revert "sdm660-common: sepolicy: Adjust sepolicy for qti thermal" 2021-11-13 11:31:51 +01:00
property_contexts sdm660-common: sepolicy: Label sys.use_fifo_ui and address system_server vendor_video_prop denial 2021-11-13 11:31:51 +01:00
qti_init_shell.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
radio.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
rfs_access.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
rild.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
rmt_storage.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
ssgtzd.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
system_app.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
system_server.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
tee.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
thermal-engine.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
toolbox.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
ueventd.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
usbd.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vdc.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vendor_dpmd.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vendor_init.te sdm660-common: sepolicy: Address many denials 2021-11-13 11:31:51 +01:00
vendor_modprobe.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vendor_msm_irqbalanced.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vendor_mutualex_exec.te sdm660-common: Update RIL from AOSPA 2021-07-15 17:00:40 +06:00
vendor_pd_mapper.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
vendor_tinyalse.te sdm660-common: Build vendor variant of tinymix 2019-12-01 10:27:53 +01:00
vendor_toolbox.te sdm660-common: sepolicy: Rework sepolicy (No more neverallow) 2021-05-18 05:03:51 +06:00
vold_prepare_subdirs.te sdm660-common: sepolicy: Address many sys_admin and kill denials 2021-11-13 11:31:51 +01:00
wcnss_service.te sdm660-common: sepolicy: Update sepolicy for 4.19 2021-07-13 11:56:43 +06:00