-
-
Save fat-tire/e1b59c7c6e9d5d8602a0f47341312505 to your computer and use it in GitHub Desktop.
important denials...
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for _mone. No SIM currently. (Update: See post at https://forum.xda-developers.com/note-4/snapdragon-dev/oreo-8-1-0-unofficial-lineage-15-1-rom-t3760969/page269#post76853457 ) | |
06-18 12:11:15.236 429 429 W mdm_helper: type=1400 audit(0.0:63): avc: denied { read } for name="esoc_name" dev="sysfs" ino=18588 scontext=u:r:mdm_helper:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 | |
06-18 12:11:19.096 439 439 W audioserver: type=1400 audit(0.0:64): avc: denied { read } for name="esoc_name" dev="sysfs" ino=18588 scontext=u:r:audioserver:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 | |
06-18 12:11:19.100 439 439 E libmdmdetect: Failed to open /sys/bus/esoc/devices/esoc0/esoc_name: Permission denied | |
06-18 12:11:19.096 439 439 W audioserver: type=1400 audit(0.0:64): avc: denied { read } for name="esoc_name" dev="sysfs" ino=18588 scontext=u:r:audioserver:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 | |
06-18 12:11:19.100 439 439 E libmdmdetect: Failed to open /sys/bus/esoc/devices/esoc0/esoc_name: Permission denied | |
06-18 12:13:53.371 3563 3563 W tunein.player: type=1400 audit(0.0:106): avc: denied { read } for name="vmstat" dev="proc" ino=4026543611 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0 | |
06-18 12:16:01.012 6192 6192 W PodcastAddictAp: type=1400 audit(0.0:199): avc: denied { read } for name="vmstat" dev="proc" ino=4026543611 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0 | |
06-18 12:18:10.902 9174 9174 W a.podcastaddict: type=1400 audit(0.0:287): avc: denied { read } for name="vmstat" dev="proc" ino=4026543611 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=u:object_r:proc:s0 tclass=file permissive=0 | |
suggested fixes. I tihnk the mdm_helper one might not work but I'll give it a shot as it's the important one. | |
#============= audioserver ============== | |
allow audioserver sysfs:file read; | |
#============= mdm_helper ============== | |
allow mdm_helper sysfs:file read; | |
#============= untrusted_app ============== | |
allow untrusted_app proc:file read; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment