With regard to SELinux encountered the following error messages. I'm currently going through some resources on modifying sepolicies. But most of the denials were based on file access permissions.
[ 28.729002] audit: type=1400 audit(6776.279:4): avc: denied { write } for pid=1 comm="init" name="kpi_values" dev="debugfs" ino=163 scontext=u:r:init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
[ 39.574461] type=1400 audit(6787.129:5): avc: denied { entrypoint } for pid=538 comm="init" path="/
init.peripheral.props.sh" dev="dm-0" ino=29 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0
[ 43.986927] type=1400 audit(6791.539:25): avc: denied { transfer } for pid=593 comm="devicemanager" scontext=u:r:devicemanager:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=0
[ 44.151760] type=1400 audit(6791.699:26): avc: denied { write } for pid=39 comm="kdevtmpfs" name="snd" dev="devtmpfs" ino=7556 scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=dir permissive=0
[ 46.061316] type=1400 audit(6793.539:165): avc: denied { search } for pid=558 comm="vendor.meaa.aut" name="cpucom" dev="mmcblk0p58" ino=16436 scontext=u:r:hal_vehicle_meaa:s0 tcontext=u:object_r:cpucom_data_file:s0 tclass=dir permissive=0
[ 79.523270] type=1400 audit(1549865308.739:26269): avc: denied { create } for pid=733 comm="cpucomserviced" name="cpucomservice.sock" scontext=u:r:cpucomserviced:s0 tcontext=u:object_r:cpucom_data_file:s0 tclass=sock_file permissive=0 duplicate messages suppressed
Please could you let me know how these can be fixed.