device_google_felix/fingerprint_capacitance/hal_fingerprint_capacitance.te
eddielan f544a5a651 sepolicy: Allow fingerprint to access fwk hwservice
11-11 19:57:30.203   464   464 E SELinux : avc:
denied  { find } for interface=android.frameworks.sensorservice::ISensorManager
sid=u:r:hal_fingerprint_capacitance:s0 pid=903
scontext=u:r:hal_fingerprint_capacitance:s0
tcontext=u:object_r:fwk_sensor_hwservice:s0
tclass=hwservice_manager permissive=0

Bug: 258783592
Test: Build pass
Change-Id: I58a31c04cbb45ab12b0bf42a10c57ddf4f065ee7
2022-11-11 20:10:20 +08:00

31 lines
1.3 KiB
Text

# hal_fingerprint_capacitance definition
type hal_fingerprint_capacitance, domain;
hal_server_domain(hal_fingerprint_capacitance, hal_fingerprint)
type hal_fingerprint_capacitance_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(hal_fingerprint_capacitance)
set_prop(hal_fingerprint_capacitance, vendor_fingerprint_prop)
# allow fingerprint to access file
allow hal_fingerprint_capacitance fingerprint_device:chr_file rw_file_perms;
allow hal_fingerprint_capacitance tee_device:chr_file rw_file_perms;
allow hal_fingerprint_capacitance sysfs_fingerprint:dir r_dir_perms;
allow hal_fingerprint_capacitance sysfs_fingerprint:file rw_file_perms;
# allow fingerprint to access power hal
hal_client_domain(hal_fingerprint_capacitance, hal_power);
# allow fingerprint to find fwk service
allow hal_fingerprint_capacitance fwk_stats_service:service_manager find;
# allow fingerprint to access input_device
allow hal_fingerprint_capacitance input_device:dir r_dir_perms;
allow hal_fingerprint_capacitance input_device:chr_file rw_file_perms;
# allow fingerprint to access hwservice
hwbinder_use(hal_fingerprint_capacitance)
add_hwservice(hal_fingerprint_capacitance, hal_fingerprint_capacitance_ext_hwservice)
# allow fingerprint to access fwk sensor hwservice
allow hal_fingerprint_capacitance fwk_sensor_hwservice:hwservice_manager find;