aboutsummaryrefslogtreecommitdiff
path: root/sepolicy (follow)
Commit message (Collapse)AuthorAge
...
* msm8996-common: neverallows: Nuke priv-app and qti denialsDavide Garberi2018-10-07
| | | | | Change-Id: Ifc66eb447953aaa312b7c3a9230a72b70fb78ea7 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: neverallows: Address a scheduler denialDavide Garberi2018-10-07
| | | | | | | * Without this the scheduler (bfq) doesn't get set at boot Change-Id: Ibd59caeabac4cdcfae9060cc16975a54ce12db7c Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Put all the neverallows in a separated fileDavide Garberi2018-10-07
| | | | | | | | * They won't make the build fail anyway * Probably just a temporarely thing Change-Id: I4822b4eeef8cb3381a5721da8cc6b382898e6c4a Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: Address CNE IMS and some other denialsdavidevinavil2018-10-07
| | | | | Change-Id: Idd48c93dbfddede327c556cf273520412485295e Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: Add pocketmode appfluxi2018-10-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Change-Id: I71e47d5f203adb7e28d37447e19a8041a1d02840 msm8996-common: PocketMode: Apply LineageOS rebrand Change-Id: I1de627062f56bd125f430033e8bb7aad8fe48f69 msm8996-common: pocketmode: Bump sdk version Change-Id: Ic521e380868bdc886e15c6a8a472564a98dbc094 msm8996-common: PocketMode: Explicitly include Android support libs * Fixes non-jack build Change-Id: I9d8346193577c7be218e12efb20f52ca9946eb14 msm8996-common: PocketMode: Properly depend on Lineage SDK * This is actually the proper library to include (only spotted while buidling with Jack disabled, because app compilation was failing). Change-Id: Ib61f93704c6411a4cb1f91d9e8693a1775934037 msm8996-common: PocketMode: Remove useless cast Change-Id: I655b0b80ccafdaae422a2464d2b8409f70be0e8c msm8996-common: Adapt to Zuk Change-Id: I9050faac37de0a8392b31fed5c3562d4553c546f msm8996-common: Set LOCAL_SDK_VERSION where possible. This change sets LOCAL_SDK_VERSION for all packages where this is possible without breaking the build, and LOCAL_PRIVATE_PLATFORM_APIS := true otherwise. Setting one of these two will be made required soon, and this is a change in preparation for that. Not setting LOCAL_SDK_VERSION makes the app implicitly depend on the bootclasspath, which is often not required. This change effectively makes depending on private apis opt-in rather than opt-out. Test: make relevant packages Bug: 73535841 Change-Id: Ic906adbd670c4dbfe2cdf0b71cdbeaf9ac08a27e msm8996-common: sepolicy: Address a fingerprint denial Change-Id: I07c75d58357f7eea2dcc68ed80dacbab76bb30f5 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Address binder denialsDavide Garberi2018-10-06
| | | | | Change-Id: Id73515a55b1082283789cffbd2aafecaada4e06c Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Label sys.post_boot.parsedLuK13372018-09-30
| | | | | | | | * QCOM has moved to `vendor.post_boot.parsed` but our blobs still use `sys.post_boot.parsed`. Change-Id: I881f459aa10f1c55f8a7c3de87f36d42e000f47e Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: Update perf blobs from LA.UM.7.2.r1-04000-sdm660.0Davide Garberi2018-09-27
| | | | | | | | * From Nokia 7 plus * Don't update perf configs because we need 8996 ones Change-Id: I0c074af4b01e2198f3f36084177e3fae6b77e64c Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: property_contexts: Label perf propsDavide Garberi2018-09-26
| | | | | Change-Id: Ib2e08d365f088e07d30df2c5dfc72660ca839d21 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Address hal_bluetooth_qti denialsDavide Garberi2018-09-26
| | | | | | | * Fixes the bluetooth crashing when activated Change-Id: Ic4c120319cbc5267fd433ca935e51837946000a6 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: file_contexts: Label light service correctlyDavide Garberi2018-09-25
| | | | | Change-Id: Ia4fa68909a710a904bd796ab53d486b81ee2238a Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: readmac: Add back a denial fixDavide Garberi2018-09-25
| | | | | | | | * Partial revert of 2bc563eaed5ab7aec72b3bd929739245cf3de4ab * Even if it generates a neverallow this fixes the readmac crash in enforcing Change-Id: Ib108662c17f456fcdea90b9615e2e4f350755059 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Fix persist_file related rulesLuK13372018-09-25
| | | | | | | * It has been renamed to mnt_vendor_file in QCOM sepolicy. Change-Id: If16c6d17635ec746fc01c7309854ccbeb1303339 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: file_contexts: Label zuk's fingerprint integrationDavide Garberi2018-09-25
| | | | | Change-Id: I1cf339887cedf3ff5bf9a01160f1acc56da5eb93 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: Address some denialsDavide Garberi2018-09-25
| | | | | Change-Id: Id7520ca339db83eeeb8b3e608a44809141e30df3 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996-common: sepolicy: let qseecomd access system filesDemon Singur2018-09-25
| | | | | | | Solves the following denials. denied { read } for name="/" dev="sda17" ino=2 scontext=u:r:tee:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=0 Change-Id: I767e4e12a6b4d72c0df0ff7cc018a8bcfe5edf18
* msm8996-common: sepolicy: Label persist.camera. propertiesLuK13372018-09-25
| | | | Change-Id: I3e3668d77a7b65fd3572248ba98c980537ad1e25
* msm8996-common: sepolicy: label old doxlat propDemon Singur2018-09-25
| | | | | | | Solves the following denial. denied { set } for property=persist.net.doxlat pid=837 uid=1001 gid=1001 scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1 Change-Id: I30db8b7aa6017dfdea1c874f69b7b8b90bcc8800
* msm8996-common: sepolicy: let camera hal access /data/misc filesDemon Singur2018-09-25
| | | | | | | | | | Removed from system_sepolicy, but still needed by our old camera stack. Solves the following denials. denied { search } for pid=717 comm="CAM_AECAWB" name="camera" dev="sda17" ino=3121215 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=dir permissive=0 denied { search } for pid=717 comm="CAM_AECAWB" name="camera" dev="sda17" ino=3121215 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:camera_data_file:s0 tclass=dir permissive=0 Change-Id: I497bade68e6a5b2f60cd8ec90a97a81986d971af
* msm8996-common: sepolicy: solve drm hal denialsDemon Singur2018-09-25
| | | | | | | | Solves the following denial. denied { search } for pid=719 comm="HwBinder:719_1" name="mediadrm" dev="sda17" ino=1449985 scontext=u:r:hal_drm_default:s0 tcontext=u:object_r:media_data_file:s0 tclass=dir permissive=0 Change-Id: I068732c69dcb8da08f223359ece5e3e09bcea82e
* msm8996-common: sepolicy: solve vendor_init denialsDemon Singur2018-09-25
| | | | | | | | | | | Solves the following denials. denied { search } for pid=546 comm="init" name="dpm" dev="sda17" ino=1204225 scontext=u:r:vendor_init:s0 tcontext=u:object_r:dpmd_data_file:s0 tclass=dir permissive=0 denied { search } for pid=546 comm="init" name="thermal" dev="sda17" ino=3325953 scontext=u:r:vendor_init:s0 tcontext=u:object_r:thermal_data_file:s0 tclass=dir permissive=0 denied { search } for pid=546 comm="init" name="thermal" dev="sda17" ino=3325953 scontext=u:r:vendor_init:s0 tcontext=u:object_r:thermal_data_file:s0 tclass=dir permissive=0 denied { setattr } for pid=546 comm="init" name="camera" dev="sda17" ino=3121215 scontext=u:r:vendor_init:s0 tcontext=u:object_r:camera_data_file:s0 tclass=dir permissive=0 Change-Id: I824f7c27c9f93630ba7b65252609777197e3a682
* msm8996-common: sepolicy: label old cne data fileDemon Singur2018-09-25
| | | | Change-Id: Id4b05f402da939a3add6be254666132744133c20
* msm8996-common: sepolicy: label old qseecomd ready propDemon Singur2018-09-25
| | | | | | | | | | CAF renamed this prop to vendor.sys.listeners.registered, but our blobs still use the old one, making enforcing boot to stall. Label it. selinux: avc: denied { set } for property=sys.listeners.registered pid=568 uid=1000 gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=0 init: Unable to set property 'sys.listeners.registered' to 'true' from uid:1000 gid:1000 pid:568: SELinux permission check failed Change-Id: I43407d89df024b557dd4c06a4ac9d0ec8f37581e
* msm8996-common: sepolicy: mark vendor core_data violatorsVol Zhdanov2018-09-25
| | | | Change-Id: I9571f2a3cb82ea0de6ff4e76335ab9454ba66f3d
* msm8996-common: sepolicy: mark thermal files as core_dataVol Zhdanov2018-09-25
| | | | | | They're not under /data/vendor. Change-Id: I63ad040967c985925b05cf139710dc35b33291c5
* msm8996-common: sepolicy: do not use the same label for data and core_dataVol Zhdanov2018-09-25
| | | | | Change-Id: I36ba7dfe4bccae83703f65cd1afb57a8673e5471 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996: sepolicy: Fix device related neverallowsDavide Garberi2018-09-16
| | | | | Change-Id: Iddf2ac2f63d6f3a390e1720c11b1f334cc9729aa Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996: sepolicy: Address some denialsDavide Garberi2018-09-16
| | | | | Change-Id: I8f4d9588573e48069d365b77b081f981b4948fbb Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996: sepolicy: Remove duplicated entries and unknown typesDavide Garberi2018-09-16
| | | | | Change-Id: If6f7c4310f34239d49af0cad4cc481b507803f80 Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* msm8996: sepolicy: Switch to vendor_ prefixDavide Garberi2018-09-16
| | | | | Change-Id: Ib1b232d57ca108f73995690ad31bbeee638aa5ad Signed-off-by: Davide Garberi <dade.garberi@gmail.com>
* Revert "msm8996-common: Update Bluetooh firmware."Cosme Domínguez Díaz2018-08-11
| | | | | | | SELinux blocks the loading of the newer firmware and I do not know how to fix it, for now. This reverts commit 13c9609710f05a79d119636ec2b9640259dd67c2.
* msm8996-common: Update Bluetooh firmware.Cosme Domínguez Díaz2018-08-11
| | | | * From google/marlin/marlin:9/PPR1.180610.009/4898911:user/release-keys.
* msm8996-common: Fix priv_app sepolicy.Cosme Domínguez Díaz2018-08-04
|
* msm8996-common: Fix more SELinux denials.Cosme Domínguez Díaz2018-08-04
|
* msm8996-common: Fix priv_app SELinux denials:Cosme Domínguez Díaz2018-07-29
| | | | avc: denied { find } for interface=android.hardware.memtrack::IMemtrack pid=3638 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:hal_memtrack_hwservice:s0 tclass=hwservice_manager permissive=0
* msm8996-common: Re-enable Power HAL 1.1 and WiFi statsCosme Domínguez Díaz2018-07-29
| | | | | * Using marlin WiFi firmware, which is newer than ours, we can get a fully functional Power HAL.
* msm8996-common: Fix chager SELinux denials:Cosme Domínguez Díaz2018-07-28
| | | | | | | | | | | | | avc: denied { dac_override } for pid=442 comm="chargeonlymode" capability=1 scontext=u:r:charger:s0 tcontext=u:r:charger:s0 tclass=capability permissive=1 avc: denied { read } for pid=442 comm="chargeonlymode" name="rtc0" dev="tmpfs" ino=2231 scontext=u:r:charger:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1 avc: denied { open } for pid=442 comm="chargeonlymode" path="/dev/rtc0" dev="tmpfs" ino=2231 scontext=u:r:charger:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1 avc: denied { ioctl } for pid=442 comm="chargeonlymode" path="/dev/rtc0" dev="tmpfs" ino=2231 ioctlcmd=7008 scontext=u:r:charger:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1 avc: denied { write } for pid=442 comm="chargeonlymode" name="persist" dev="rootfs" ino=14980 scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 avc: denied { add_name } for pid=442 comm="chargeonlymode" name="subsys" scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 avc: denied { create } for pid=442 comm="chargeonlymode" name="subsys" scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1 avc: denied { create } for pid=442 comm="chargeonlymode" name="batt_info.bin" scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1 avc: denied { read append } for pid=442 comm="chargeonlymode" name="batt_info.bin" dev="rootfs" ino=2334 scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1 avc: denied { getattr } for pid=442 comm="chargeonlymode" path="/persist/subsys/batt_info.bin" dev="rootfs" ino=2334 scontext=u:r:charger:s0 tcontext=u:object_r:persist_file:s0 tclass=file permissive=1
* Revert "msm8996: Build HVX neuralnetworks HAL"Cosme Domínguez Díaz2018-07-28
| | | | This reverts commit 5a1c5d7094cf0c00f4bbca7390fee11ef9293366.
* Revert "msm8996-common: Switch to Power HAL 1.1 and enable WiFi stats."davidevinavil2018-06-10
| | | | | | | This commit make lag in battery settings. Thank to @kenny3fcb for the tip This reverts commit b53e00d1d443ad324182f932a3d2508c29aa8a56.
* msm8996-common: Switch to Power HAL 1.1 and enable WiFi stats.Cosme Domínguez Díaz2018-05-26
| | | | | | | * We need to set TARGET_WLAN_POWER_STAT to work with the QCACLD2 driver. The default value is for QCACLD3.
* msm8996-common: sepolicy: Remove duplicated rules.Cosme Domínguez Díaz2018-05-13
| | | | * And system_app and vold fixup.
* msm8996-common: More SELinux fixes...Cosme Domínguez Díaz2018-05-06
|
* msm8996-common: Disable Transparent Huge Pages (THP) when we don't have ↵Cosme Domínguez Díaz2018-05-06
| | | | | | | | | | | | | | | | enough RAM. * My device has 6GB of RAM so I didn't notice any issue. However devices with 3GB or less become unusable with THP enabled, according to @YaroST12 * Also, for devices with enough RAM, we'll restrict THP to madvise regions as suggested by the kernel documentation: "Embedded systems should enable hugepages only inside madvise regions to eliminate any risk of wasting any precious byte of memory and to only run faster." [1] [1] https://www.kernel.org/doc/Documentation/vm/transhuge.txt
* msm8996-common: Ship and enable atfwd daemonBruno Martins2018-05-06
| | | | | | | | * The atfwd daemon is responsible for handling AT command forward requests from modem and should be enabled for all targets except sda, apq, qcs. Change-Id: I886b616565f81da10ad4a7b52baf8854a0b26f52
* msm8996-common: sepolicy: CleanupCosme Domínguez Díaz2018-05-02
|
* msm8996-common: sepolicy: Add more genfs_contextsCosme Domínguez Díaz2018-05-02
| | | | | | | | | | | | SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.mdt/power: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/msadp/power: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/soc:qcom,kgsl-hyp/firmware/a530_zap.mdt/power: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/soc:qcom,kgsl-hyp/firmware/a530_zap.b02: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.b09/power: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/2080000.qcom,mss/firmware/modem.b10/power: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/evicted30.bin: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/bdwlan30.b00: No such file or directory.\x0a SELinux: Could not read /sys/devices/soc/600000.qcom,pcie/pci0000:00/0000:00:00.0/0000:01:00.0/firmware/bdwlan30.bin: No such file or directory.\x0a
* msm8996-common: Add more blobs for our camera.Cosme Domínguez Díaz2018-04-25
| | | | * Now we have "Sharp Shooter" mode on Snap.
* msm8996-common: Fix more SELinux denials.Cosme Domínguez Díaz2018-04-22
| | | | | | | | | | | | | | avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=1726 comm="m.android.phone" path="/data/user_de/0/com.android.settings" dev="sda10" ino=1957977 scontext=u:r:radio:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/recovery" dev="sda10" ino=2228226 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_recovery_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0 avc: denied { getattr } for pid=2363 comm="sAsyncHandlerTh" path="/data/cache/backup" dev="sda10" ino=2228228 scontext=u:r:mediaprovider:s0:c512,c768 tcontext=u:object_r:cache_private_backup_file:s0 tclass=dir permissive=0
* msm8996-common: Fixed crash due to an SELinux denial when disabling root in adb.Cosme Domínguez Díaz2018-04-16
| | | | * avc: denied { set } for property=service.adb.root pid=1892 uid=1000 gid=1000 scontext=u:r:system_app:s0 tcontext=u:object_r:shell_prop:s0 tclass=property_service permissive=1
* msm8996-common: Fix priv_app SELinux denials:Cosme Domínguez Díaz2018-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=tion.NEW_MODULE name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2212 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=2442 comm=lowpool[1] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=3917 comm=gcm-task#1 name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5270 comm=.gms.persistent name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=lowpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { read } for pid=5465 comm=highpool[3] name=stat dev=proc ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2241 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { open } for pid=2440 comm="lowpool[5]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="tion.NEW_MODULE" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2239 comm=".gms.persistent" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0 avc: denied { getattr } for pid=2345 comm="lowpool[4]" path="/proc/stat" dev="proc" ino=4026532465 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=0