avc: denied { find } for interface=com.fingerprints42.extension::IFingerprintEngineering sid=u:r:hal_fingerprint_capacitance:s0 pid=895 scontext=u:r:hal_fingerprint_capacitance:s0 tcontext=u:object_r:default_android_hwservice:s0 tclass=hwservice_manager permissive=0 Bug: 240633068 Test: make selinux_policy -j128 Change-Id: Ifd13d8c73c97cef9a85555a7d09de4424548ca73
28 lines
1.2 KiB
Text
28 lines
1.2 KiB
Text
# hal_fingerprint_capacitance definition
|
|
type hal_fingerprint_capacitance, domain;
|
|
hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
|
|
|
|
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_fingerprint_capacitance)
|
|
|
|
set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)
|
|
|
|
# allow fingerprint to access file
|
|
allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
|
|
allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
|
|
|
|
# allow fingerprint to access power hal
|
|
hal_client_domain(hal_fingerprint_capacitance, hal_power);
|
|
|
|
# allow fingerprint to find fwk service
|
|
allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
|
|
|
|
# allow fingerprint to access input_device
|
|
allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
|
|
allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
|
|
|
|
# allow fingerprint to access hwservice
|
|
hwbinder_use(hal_fingerprint_capacitance)
|
|
add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
|