device_google_zumapro/sepolicy/vendor/hal_fingerprint_default.te
Michael Bestas 033f3a090a Android 15.0.0 Release 21 (BP1A.250305.020)
-----BEGIN PGP SIGNATURE-----
 
 iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO
 eKE3AJ4uFXxFPLY5WKfjV42Swr4BBy8a1ACcD53kvqqVMTUClsM4lrgXGQ82YKc=
 =5fRU
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN SSH SIGNATURE-----
 U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgPpdpjxPACTIhnlvYz0GM4BR7FJ
 +rYv3jMbfxNKD3JvcAAAADZ2l0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5
 AAAAQD3Qc4A3bmG6C5UeJ72OX6KEYC9rOCtnIlT5iRxwxs/8+aoXRxpQTf78JyVn+Xsz2J
 TUbFUORg+gRtEXsx4ApwE=
 -----END SSH SIGNATURE-----

Merge tag 'android-15.0.0_r21' into staging/lineage-22.2_merge-android-15.0.0_r21

Android 15.0.0 Release 21 (BP1A.250305.020)

# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO
# eKE3AJ4uFXxFPLY5WKfjV42Swr4BBy8a1ACcD53kvqqVMTUClsM4lrgXGQ82YKc=
# =5fRU
# -----END PGP SIGNATURE-----
# gpg: Signature made Wed Mar  5 05:50:32 2025 EET
# gpg:                using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate]

# By Nina Chen (11) and others
# Via Android Build Coastguard Worker (32) and others
* tag 'android-15.0.0_r21': (41 commits)
  Update SELinux error
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Allow tachyon service to make binder calls to GCA
  Update SELinux error
  allow hal_bluetooth_btlinux write sysfs file
  port display sysfs access
  Add hal_shared_modem_platform to modem_diagnostic_app.te
  add permission for hl7132 sysfs
  Update SELinux error
  Update the PMS app seinfo for the certification change.
  Update SELinux error
  Revert "modem_svc: move shared_modem_platform related sepolicy t..."
  modem_svc: move shared_modem_platform related sepolicy to gs-common
  Support access to radioext service over AIDL
  Update SELinux error
  Update SELinux error
  correct frame_interval_ns and expected_present_time_ns naming
  shamp: remove fixed bug from bugmap
  sepolicy: add label for logbuffer
  Update SELinux error
  ...

 Conflicts:
	sepolicy/vendor/keys.conf
	sepolicy/zumapro-sepolicy.mk

Change-Id: I904f4d429cf34da67777654f6c373a66b105d128
2025-03-09 11:01:22 +02:00

66 lines
2.9 KiB
Text

# SE policies for fingerprint
allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;
allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
allow hal_fingerprint_default dmabuf_system_heap_device:chr_file r_file_perms;
allow hal_fingerprint_default fwk_stats_service:service_manager find;
set_prop(hal_fingerprint_default, vendor_fingerprint_prop)
add_hwservice(hal_fingerprint_default, hal_fingerprint_ext_hwservice)
# allow fingerprint to access power hal
hal_client_domain(hal_fingerprint_default, hal_power);
# Allow access to the files of CDT information.
r_dir_file(hal_fingerprint_default, sysfs_chosen)
# Allow fingerprint to access calibration blk device.
allow hal_fingerprint_default mfg_data_block_device:blk_file rw_file_perms;
allow hal_fingerprint_default block_device:dir search;
# Allow fingerprint to access fwk_sensor_hwservice
allow hal_fingerprint_default fwk_sensor_hwservice:hwservice_manager find;
# Allow fingerprint to access sysfs_display
allow hal_fingerprint_default sysfs_display:file rw_file_perms;
# Allow fingerprint to access trusty sysfs
allow hal_fingerprint_default sysfs_trusty:file rw_file_perms;
# Allow fingerprint to access display hal
allow hal_fingerprint_default hal_pixel_display_service:service_manager find;
binder_call(hal_fingerprint_default, hal_graphics_composer_default)
# allow fingerprint to access thermal hal
hal_client_domain(hal_fingerprint_default, hal_thermal);
# allow fingerprint to read sysfs_leds
allow hal_fingerprint_default sysfs_leds:file r_file_perms;
allow hal_fingerprint_default sysfs_leds:dir r_dir_perms;
# allow fingerprint to wakeup to trigger calibration scans and sleep after
allow hal_fingerprint_default self:capability2 wake_alarm;
allow hal_fingerprint_default self:capability2 block_suspend;
# allow fingerprint to search for files
# TODO: b/297562630 - remove unecessary permissions once not needed
allow hal_fingerprint_default mnt_vendor_file:dir search;
allow hal_fingerprint_default vendor_misc_data_file:dir search;
allow hal_fingerprint_default persist_file:dir search;
# allow fingerprint to rw config and calibration files in persist
# TODO: b/297562630 - remove unecessary permissions once not needed
allow hal_fingerprint_default persist_fingerprint_file:dir search;
allow hal_fingerprint_default persist_fingerprint_file:file create_file_perms;
# allow fingerprint to rw data files
# TODO: b/297562630 - remove unecessary permissions once not needed
allow hal_fingerprint_default vendor_fingerprint_data_file:dir create_dir_perms;
allow hal_fingerprint_default vendor_fingerprint_data_file:file create_file_perms;
# Allow fingerprint to rw lhbm files
allow hal_fingerprint_default sysfs_lhbm:file rw_file_perms;
# Allow fingerprint to access sysfs_aoc_udfps
allow hal_fingerprint_default sysfs_aoc:dir search;
allow hal_fingerprint_default sysfs_aoc_udfps:file rw_file_perms;