01-06 11:55:38.816 796 796 I auditd : type=1400 audit(0.0:281): avc: denied { write } for comm="wifi_ext@1.0-se" name="wlan" dev="tmpfs" ino=984 scontext=u:r:hal_wifi_ext:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 01-06 11:55:38.820 796 796 I auditd : type=1400 audit(0.0:282): avc: denied { open } for comm="wifi_ext@1.0-se" path="/dev/wlan" dev="tmpfs" ino=984 scontext=u:r:hal_wifi_ext:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 Bug: 209934729 Test: Basic function tests, SSR tests Change-Id: Id6afd0580f8792eeb7ef8a25d42724ec79696875 |
||
---|---|---|
.. | ||
device.te | ||
file_contexts | ||
hal_wifi_ext.te | ||
README.txt |
This folder holds sepolicy exclusively for one device. For example, genfs_contexts paths that are affected by device tree.