• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (c) 2022 Huawei Device Co., Ltd.
2# Licensed under the Apache License, Version 2.0 (the "License");
3# you may not use this file except in compliance with the License.
4# You may obtain a copy of the License at
5#
6#     http://www.apache.org/licenses/LICENSE-2.0
7#
8# Unless required by applicable law or agreed to in writing, software
9# distributed under the License is distributed on an "AS IS" BASIS,
10# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
11# See the License for the specific language governing permissions and
12# limitations under the License.
13
14#avc:  denied  { get } for service=3301 pid=1969 scontext=u:r:sh:s0 tcontext=u:object_r:sa_foundation_powermgr_service:s0 tclass=samgr_class permissive=1
15allow sh sa_foundation_powermgr_service:samgr_class { get };
16
17#avc:  denied  { call } for  pid=3190 comm="test_power_sett" scontext=u:r:sh:s0 tcontext=u:r:system_basic_hap:s0 tclass=binder permissive=1
18#avc:  denied  { transfer } for  pid=3190 comm="test_power_sett" scontext=u:r:sh:s0 tcontext=u:r:system_basic_hap:s0 tclass=binder permissive=1
19allow sh system_basic_hap:binder { call transfer };
20
21#avc:  denied  { call } for  pid=4868 comm="test_power_sett" scontext=u:r:sh:s0 tcontext=u:r:normal_hap:s0 tclass=binder permissive=1
22#avc:  denied  { transfer } for  pid=4868 comm="test_power_sett" scontext=u:r:sh:s0 tcontext=u:r:normal_hap:s0 tclass=binder permissive=1
23allow sh normal_hap:binder { call transfer };
24
25#avc:  denied  { getattr } for  pid=2030 comm="sh" path="/sys/power/wakeup_count" dev="sysfs" ino=4994 scontext=u:r:sh:s0 tcontext=u:object_r:sysfs_power:s0 tclass=file permissive=1
26allow sh sysfs_power:file { getattr };
27
28#avc:  denied  { getattr } for  pid=2030 comm="sh" path="/sys/power/wake_unlock" dev="sysfs" ino=4999 scontext=u:r:sh:s0 tcontext=u:object_r:sysfs_wake_lck:s0 tclass=file permissive=1
29#avc:  denied  { open } for  pid=2030 comm="sh" path="/sys/power/wake_lock" dev="sysfs" ino=4998 scontext=u:r:sh:s0 tcontext=u:object_r:sysfs_wake_lck:s0 tclass=file permissive=1
30allow sh sysfs_wake_lck:file { getattr open };
31