From cc2458e456a55d91be04f504f1c43eccabf04e9e Mon Sep 17 00:00:00 2001 From: Kris Chen Date: Wed, 8 Mar 2023 17:04:21 +0800 Subject: [PATCH] Allow fingerprint hal to access display hibernation node Fix the following avc denial: avc: denied { write } for name="hibernation" dev="sysfs" ino=75339 scontext=u:r:hal_fingerprint_default:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=0 Bug: 256947811 Bug: 251239489 Bug: 267271482 Test: Perform udfps osc compensation. Change-Id: I2cfb1353770734a19e7fcf1a10eb2fc7bf84a4f5 --- vendor/genfs_contexts | 1 + vendor/hal_fingerprint_default.te | 4 ++-- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/vendor/genfs_contexts b/vendor/genfs_contexts index 6d2d9524..3894ff15 100644 --- a/vendor/genfs_contexts +++ b/vendor/genfs_contexts @@ -72,6 +72,7 @@ genfscon sysfs /devices/platform/19440000.drmdsim/19440000.drmdsim.0/panel_name genfscon sysfs /devices/platform/19440000.drmdsim/19440000.drmdsim.0/serial_number u:object_r:sysfs_display:s0 genfscon sysfs /devices/platform/19440000.drmdsim/19440000.drmdsim.0/refresh_rate u:object_r:sysfs_display:s0 genfscon sysfs /devices/platform/19470000.drmdecon/dqe0/atc u:object_r:sysfs_display:s0 +genfscon sysfs /devices/platform/19470000.drmdecon/hibernation u:object_r:sysfs_display:s0 genfscon sysfs /module/drm/parameters/vblankoffdelay u:object_r:sysfs_display:s0 genfscon sysfs /devices/platform/exynos-drm/tui_status u:object_r:sysfs_display:s0 genfscon sysfs /devices/platform/19440000.drmdsim/19440000.drmdsim.0/backlight/panel0-backlight/als_table u:object_r:sysfs_write_leds:s0 diff --git a/vendor/hal_fingerprint_default.te b/vendor/hal_fingerprint_default.te index 912776dd..28f372c1 100644 --- a/vendor/hal_fingerprint_default.te +++ b/vendor/hal_fingerprint_default.te @@ -21,8 +21,8 @@ allow hal_fingerprint_default block_device:dir search; # Allow fingerprint to access fwk_sensor_hwservice allow hal_fingerprint_default fwk_sensor_hwservice:hwservice_manager find; -# Allow fingerprint to read sysfs_display -allow hal_fingerprint_default sysfs_display:file r_file_perms; +# Allow fingerprint to access sysfs_display +allow hal_fingerprint_default sysfs_display:file rw_file_perms; # Allow fingerprint to access trusty sysfs allow hal_fingerprint_default sysfs_trusty:file rw_file_perms;