device_google_lynx/vendor
Hsiu-Chang Chen 069de3333d wifi: Add sepolicy for qcom driver control interface
01-06 11:55:38.816   796   796 I auditd  : type=1400 audit(0.0:281): avc: denied { write } for comm="wifi_ext@1.0-se" name="wlan" dev="tmpfs" ino=984 scontext=u:r:hal_wifi_ext:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
01-06 11:55:38.820   796   796 I auditd  : type=1400 audit(0.0:282): avc: denied { open } for comm="wifi_ext@1.0-se" path="/dev/wlan" dev="tmpfs" ino=984 scontext=u:r:hal_wifi_ext:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Bug: 209934729
Test: Basic function tests, SSR tests
Change-Id: Id6afd0580f8792eeb7ef8a25d42724ec79696875
2022-01-10 14:45:30 +08:00
..
device.te wifi: Add sepolicy for qcom driver control interface 2022-01-10 14:45:30 +08:00
file_contexts wifi: Add sepolicy for qcom driver control interface 2022-01-10 14:45:30 +08:00
hal_wifi_ext.te wifi: Add sepolicy for qcom driver control interface 2022-01-10 14:45:30 +08:00
README.txt Initial device lynx sepolicy 2021-11-01 15:28:54 +08:00

This folder holds sepolicy exclusively for one device. For example, genfs_contexts
paths that are affected by device tree.