sepolicy: Add sepolicy for FPS

Bug: 277843284
Test: make selinux_policy
Change-Id: I29b7ea88b001ec2dd4fdb56d8a6b8ae598478c0f
This commit is contained in:
eddielan 2023-04-19 13:20:45 +08:00
parent ee9740df18
commit 0017642efe
9 changed files with 51 additions and 0 deletions

View file

@ -1,3 +1,5 @@
# sepolicy exclusively for comet.
BOARD_SEPOLICY_DIRS += device/google/comet-sepolicy/vendor
# Fingerprint
BOARD_SEPOLICY_DIRS += device/google/comet-sepolicy/fingerprint_capacitance

View file

@ -0,0 +1 @@
type sysfs_fingerprint, sysfs_type, fs_type;

View file

@ -0,0 +1,5 @@
# FPC AIDL HAL
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint-service\.fpc42 u:object_r:hal_fingerprint_capacitance_exec:s0
# FPC HIDL HAL
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:fingerprint_factory_service_exec:s0

View file

@ -0,0 +1,3 @@
type fingerprint_factory_service, service_manager_type;
type fingerprint_factory_service_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(fingerprint_factory_service)

View file

@ -0,0 +1 @@
genfscon sysfs /devices/platform/odm/odm:fp_fpc1020 u:object_r:sysfs_fingerprint:s0

View file

@ -0,0 +1,35 @@
# hal_fingerprint_capacitance definition
type hal_fingerprint_capacitance, domain;
#hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(hal_fingerprint_capacitance)
#set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)
# allow fingerprint to access file
#allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms;
#allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
#allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
#allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
# allow fingerprint to access power hal
#hal_client_domain(hal_fingerprint_capacitance, hal_power);
# allow fingerprint to find fwk service
#allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
# allow fingerprint to access sysfs_leds
#allow hal_fingerprint_capacitance sysfs_leds:dir search;
#allow hal_fingerprint_capacitance sysfs_leds:file rw_file_perms;
# allow fingerprint to access input_device
#allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
#allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
# allow fingerprint to access hwservice
#hwbinder_use(hal_fingerprint_capacitance)
#add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
# allow fingerprint to access fwk sensor hwservice
#allow hal_fingerprint_capacitance fwk_sensor_hwservice:hwservice_manager find;

View file

@ -0,0 +1 @@
type hal_fingerprint_capacitance_ext_hwservice, hwservice_manager_type;

View file

@ -0,0 +1,2 @@
com.fingerprints42.extension::IFingerprintEngineering u:object_r:hal_fingerprint_capacitance_ext_hwservice:s0
com.fingerprints42.extension::IFingerprintSensorTest u:object_r:hal_fingerprint_capacitance_ext_hwservice:s0

View file

@ -0,0 +1 @@
#binder_call(servicemanager, hal_fingerprint_capacitance)