fps: Enable policy for SFPS am: e2906c4eb9
Original change: https://googleplex-android-review.googlesource.com/c/device/google/comet-sepolicy/+/22808517 Change-Id: Ib3d5aa404d1f0ad9867fdd389c1f8ba3351dd620 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
commit
7bb8d4a75d
1 changed files with 11 additions and 19 deletions
|
@ -1,35 +1,27 @@
|
||||||
# hal_fingerprint_capacitance definition
|
# hal_fingerprint_capacitance definition
|
||||||
type hal_fingerprint_capacitance, domain;
|
type hal_fingerprint_capacitance, domain;
|
||||||
#hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
|
hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
|
||||||
|
|
||||||
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
|
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
|
||||||
init_daemon_domain(hal_fingerprint_capacitance)
|
init_daemon_domain(hal_fingerprint_capacitance)
|
||||||
|
|
||||||
#set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)
|
|
||||||
|
|
||||||
# allow fingerprint to access file
|
# allow fingerprint to access file
|
||||||
#allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms;
|
allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
|
||||||
#allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
|
allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
|
||||||
#allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
|
allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
|
||||||
#allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
|
|
||||||
|
|
||||||
# allow fingerprint to access power hal
|
# allow fingerprint to access power hal
|
||||||
#hal_client_domain(hal_fingerprint_capacitance, hal_power);
|
hal_client_domain(hal_fingerprint_capacitance, hal_power);
|
||||||
|
|
||||||
# allow fingerprint to find fwk service
|
# allow fingerprint to find fwk service
|
||||||
#allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
|
allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
|
||||||
|
|
||||||
# allow fingerprint to access sysfs_leds
|
|
||||||
#allow hal_fingerprint_capacitance sysfs_leds:dir search;
|
|
||||||
#allow hal_fingerprint_capacitance sysfs_leds:file rw_file_perms;
|
|
||||||
|
|
||||||
# allow fingerprint to access input_device
|
# allow fingerprint to access input_device
|
||||||
#allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
|
allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
|
||||||
#allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
|
allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
|
||||||
|
|
||||||
# allow fingerprint to access hwservice
|
# allow fingerprint to access hwservice
|
||||||
#hwbinder_use(hal_fingerprint_capacitance)
|
add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
|
||||||
#add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
|
|
||||||
|
|
||||||
# allow fingerprint to access fwk sensor hwservice
|
# allow fingerprint to access servicemanager
|
||||||
#allow hal_fingerprint_capacitance fwk_sensor_hwservice:hwservice_manager find;
|
binder_call(hal_fingerprint_capacitance, servicemanager)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue