I auditd : type=1400 audit(0.0:4402): avc: denied { read } for comm="UeventThread" name="voltage_now" dev="sysfs" ino=66900 scontext=u:r:hal_wireless_charger:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 I auditd : type=1400 audit(0.0:3924): avc: denied { read } for comm="binder:531_2" name="wakeup82" dev="sysfs" ino=83487 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=0 Bug: 320193504 Change-Id: I98e3c48f9c6eaaab2d303721bdb473fc72884738 Signed-off-by: Jenny Ho <hsiufangho@google.com> |
||
---|---|---|
.. | ||
cnss-daemon.te | ||
device.te | ||
file.te | ||
file_contexts | ||
genfs_contexts | ||
hal_dumpstate_default.te | ||
hal_power_stats_default.te | ||
hal_radioext_default.te | ||
hal_wifi_default.te | ||
hal_wifi_ext.te | ||
hal_wifi_hostapd.te | ||
hal_wifi_supplicant.te | ||
ioctl_macros | ||
kernel.te | ||
logger_app.te | ||
lowi_server.te | ||
README.txt | ||
tcpdump_logger.te | ||
vendor_init.te | ||
vendor_location.te | ||
wifi_perf_diag.te | ||
wifi_sniffer.te |
This folder holds sepolicy exclusively for one device. For example, genfs_contexts paths that are affected by device tree.