device_google_gs-common/performance/sepolicy
Martin Liu 437d35e7cb allow power hal to access vendor_mm files
I auditd  : type=1400 audit(0.0:79): avc:  denied  { write } for  comm="NodeLooperThrea" name="vendor_mm" dev="sysfs" ino=56518 scontext=u:r:hal_power_default:s0 tcontext=u:object_r:sysfs_vendor_mm:s0 tclass=dir permissive=0

Bug: 357995885
Test: check avc error
Flag: EXEMPT adding avc rule
Change-Id: I1261aa14f2cd912ede51edc2e1a547d2e182ca46
Signed-off-by: Martin Liu <liumartin@google.com>
2024-12-12 13:38:20 +00:00
..
dump_perf.te Dump bts information 2024-05-14 07:40:58 +00:00
file.te Move compaction_proactiveness to vendor sepolicy 2024-08-30 07:21:16 +00:00
file_contexts add perf dump 2023-02-10 13:30:18 +08:00
genfs_contexts Move compaction_proactiveness to vendor sepolicy 2024-08-30 07:21:16 +00:00
hal_power_default.te allow power hal to access vendor_mm files 2024-12-12 13:38:20 +00:00
proc_vendor_sched.te Add Proc Vendor Sched Sepolicy Fix 2024-12-05 12:05:19 +01:00
vendor_init.te Move compaction_proactiveness to vendor sepolicy 2024-08-30 07:21:16 +00:00