From e2906c4eb9650589424c5a7be2845340a40225e1 Mon Sep 17 00:00:00 2001 From: eddielan Date: Mon, 24 Apr 2023 10:52:31 +0800 Subject: [PATCH] fps: Enable policy for SFPS Bug: 279363703 Test: Build pass Change-Id: I5c55fa507db79ad490dd315574d6e02212c6cb9b --- .../hal_fingerprint_capacitance.te | 30 +++++++------------ 1 file changed, 11 insertions(+), 19 deletions(-) diff --git a/fingerprint_capacitance/hal_fingerprint_capacitance.te b/fingerprint_capacitance/hal_fingerprint_capacitance.te index 52073d0..1f62633 100644 --- a/fingerprint_capacitance/hal_fingerprint_capacitance.te +++ b/fingerprint_capacitance/hal_fingerprint_capacitance.te @@ -1,35 +1,27 @@ # hal_fingerprint_capacitance definition type hal_fingerprint_capacitance, domain; -#hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint) +hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint) type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type; init_daemon_domain(hal_fingerprint_capacitance) -#set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop) - # allow fingerprint to access file -#allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms; -#allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms; -#allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms; -#allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms; +allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms; +allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms; +allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms; # allow fingerprint to access power hal -#hal_client_domain(hal_fingerprint_capacitance, hal_power); +hal_client_domain(hal_fingerprint_capacitance, hal_power); # allow fingerprint to find fwk service -#allow hal_fingerprint_capacitance fwk_stats_service:service_manager find; - -# allow fingerprint to access sysfs_leds -#allow hal_fingerprint_capacitance sysfs_leds:dir search; -#allow hal_fingerprint_capacitance sysfs_leds:file rw_file_perms; +allow hal_fingerprint_capacitance fwk_stats_service:service_manager find; # allow fingerprint to access input_device -#allow hal_fingerprint_capacitance input_device:dir r_dir_perms; -#allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms; +allow hal_fingerprint_capacitance input_device:dir r_dir_perms; +allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms; # allow fingerprint to access hwservice -#hwbinder_use(hal_fingerprint_capacitance) -#add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice) +add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice) -# allow fingerprint to access fwk sensor hwservice -#allow hal_fingerprint_capacitance fwk_sensor_hwservice:hwservice_manager find; +# allow fingerprint to access servicemanager +binder_call(hal_fingerprint_capacitance, servicemanager)