device_google_comet/vendor/hal_fingerprint_capacitance.te
eddielan 6b25e7527c fingerprint: Allow fps to access wakeup node
01-12 08:01:43.652  1852  1852 W android.hardwar: type=1400 audit(0.0:38):
avc:  denied  { write } for  name="wakeup_enable" dev="sysfs" ino=97986
scontext=u:r:hal_fingerprint_capacitance:s0
tcontext=u:object_r:sysfs_wakeup:s0 tclass=file permissive=0

Bug: 319578405
Test: Build pass & check on device
Change-Id: I31380020ac5fe61bb976954d03a9449bbe6c287d
2024-01-12 08:20:52 +00:00

36 lines
1.5 KiB
Text

# hal_fingerprint_capacitance definition
type hal_fingerprint_capacitance, domain;
hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(hal_fingerprint_capacitance)
# allow fingerprint to access file
allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
# allow fingerprint to access wakeup node
allow hal_fingerprint_capacitance sysfs_wakeup:file rw_file_perms;
# allow fingerprint to access power hal
hal_client_domain(hal_fingerprint_capacitance, hal_power);
# allow fingerprint to find fwk service
allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
# allow fingerprint to access input_device
allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
# allow fingerprint to access hwservice
add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
# allow fingerprint to access servicemanager
binder_call(hal_fingerprint_capacitance, servicemanager)
# allow fingerprint to access fwk sensor hwservice
allow hal_fingerprint_capacitance fwk_sensor_service:service_manager find;
# allow fingerprint to access fingerprint property
set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)