Add sepolicy for fingerprint HAL to check NSP file
Fix the following avc denials: avc: denied { search } for name="copied" dev="dm-58" ino=428 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:modem_efs_image_file:s0 tclass=dir avc: denied { search } for name="persist" dev="dm-58" ino=443 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:persist_file:s0 tclass=dir avc: denied { search } for name="ss" dev="dm-58" ino=445 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=dir avc: denied { read } for name="nsp" dev="dm-58" ino=15500 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file avc: denied { open } for path="/data/vendor/copied/persist/ss/nsp" dev="dm-58" ino=15500 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:persist_ss_file:s0 tclass=file Bug: 335525798 Test: Use UDFPS repair tool to update calibration files Change-Id: Ic233a07ced8fd828c0e4b4ae1cffa93763a83b42
This commit is contained in:
parent
cdc4acc647
commit
090928722e
1 changed files with 6 additions and 0 deletions
6
vendor/hal_fingerprint_default.te
vendored
6
vendor/hal_fingerprint_default.te
vendored
|
@ -41,3 +41,9 @@ allow hal_fingerprint_default sysfs_leds:dir r_dir_perms;
|
|||
# Allow fingerprint to access sysfs_aoc_udfps
|
||||
allow hal_fingerprint_default sysfs_aoc:dir search;
|
||||
allow hal_fingerprint_default sysfs_aoc_udfps:file rw_file_perms;
|
||||
|
||||
# Allow fingerprint to read nsp file
|
||||
allow hal_fingerprint_default modem_efs_image_file:dir search;
|
||||
allow hal_fingerprint_default persist_file:dir search;
|
||||
allow hal_fingerprint_default persist_ss_file:dir search;
|
||||
allow hal_fingerprint_default persist_ss_file:file r_file_perms;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue