01-12 08:01:43.652 1852 1852 W android.hardwar: type=1400 audit(0.0:38): avc: denied { write } for name="wakeup_enable" dev="sysfs" ino=97986 scontext=u:r:hal_fingerprint_capacitance:s0 tcontext=u:object_r:sysfs_wakeup:s0 tclass=file permissive=0 Bug: 319578405 Test: Build pass & check on device Change-Id: I31380020ac5fe61bb976954d03a9449bbe6c287d
36 lines
1.5 KiB
Text
36 lines
1.5 KiB
Text
# hal_fingerprint_capacitance definition
|
|
type hal_fingerprint_capacitance, domain;
|
|
hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
|
|
|
|
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_fingerprint_capacitance)
|
|
|
|
# allow fingerprint to access file
|
|
allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
|
|
allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
|
|
|
|
# allow fingerprint to access wakeup node
|
|
allow hal_fingerprint_capacitance sysfs_wakeup:file rw_file_perms;
|
|
|
|
# allow fingerprint to access power hal
|
|
hal_client_domain(hal_fingerprint_capacitance, hal_power);
|
|
|
|
# allow fingerprint to find fwk service
|
|
allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
|
|
|
|
# allow fingerprint to access input_device
|
|
allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
|
|
allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
|
|
|
|
# allow fingerprint to access hwservice
|
|
add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
|
|
|
|
# allow fingerprint to access servicemanager
|
|
binder_call(hal_fingerprint_capacitance, servicemanager)
|
|
|
|
# allow fingerprint to access fwk sensor hwservice
|
|
allow hal_fingerprint_capacitance fwk_sensor_service:service_manager find;
|
|
|
|
# allow fingerprint to access fingerprint property
|
|
set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)
|