-----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO eKE3AJ4uFXxFPLY5WKfjV42Swr4BBy8a1ACcD53kvqqVMTUClsM4lrgXGQ82YKc= =5fRU -----END PGP SIGNATURE----- gpgsig -----BEGIN SSH SIGNATURE----- U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgPpdpjxPACTIhnlvYz0GM4BR7FJ +rYv3jMbfxNKD3JvcAAAADZ2l0AAAAAAAAAAZzaGE1MTIAAABTAAAAC3NzaC1lZDI1NTE5 AAAAQD3Qc4A3bmG6C5UeJ72OX6KEYC9rOCtnIlT5iRxwxs/8+aoXRxpQTf78JyVn+Xsz2J TUbFUORg+gRtEXsx4ApwE= -----END SSH SIGNATURE----- Merge tag 'android-15.0.0_r21' into staging/lineage-22.2_merge-android-15.0.0_r21 Android 15.0.0 Release 21 (BP1A.250305.020) # -----BEGIN PGP SIGNATURE----- # # iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZ8fKCAAKCRDorT+BmrEO # eKE3AJ4uFXxFPLY5WKfjV42Swr4BBy8a1ACcD53kvqqVMTUClsM4lrgXGQ82YKc= # =5fRU # -----END PGP SIGNATURE----- # gpg: Signature made Wed Mar 5 05:50:32 2025 EET # gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78 # gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [ultimate] # By Nina Chen (11) and others # Via Android Build Coastguard Worker (32) and others * tag 'android-15.0.0_r21': (41 commits) Update SELinux error modem_svc: move shared_modem_platform related sepolicy to gs-common Allow tachyon service to make binder calls to GCA Update SELinux error allow hal_bluetooth_btlinux write sysfs file port display sysfs access Add hal_shared_modem_platform to modem_diagnostic_app.te add permission for hl7132 sysfs Update SELinux error Update the PMS app seinfo for the certification change. Update SELinux error Revert "modem_svc: move shared_modem_platform related sepolicy t..." modem_svc: move shared_modem_platform related sepolicy to gs-common Support access to radioext service over AIDL Update SELinux error Update SELinux error correct frame_interval_ns and expected_present_time_ns naming shamp: remove fixed bug from bugmap sepolicy: add label for logbuffer Update SELinux error ... Conflicts: sepolicy/vendor/keys.conf sepolicy/zumapro-sepolicy.mk Change-Id: I904f4d429cf34da67777654f6c373a66b105d128
66 lines
2.9 KiB
Text
66 lines
2.9 KiB
Text
# SE policies for fingerprint
|
|
allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
|
|
allow hal_fingerprint_default dmabuf_system_heap_device:chr_file r_file_perms;
|
|
|
|
allow hal_fingerprint_default fwk_stats_service:service_manager find;
|
|
set_prop(hal_fingerprint_default, vendor_fingerprint_prop)
|
|
add_hwservice(hal_fingerprint_default, hal_fingerprint_ext_hwservice)
|
|
|
|
# allow fingerprint to access power hal
|
|
hal_client_domain(hal_fingerprint_default, hal_power);
|
|
|
|
# Allow access to the files of CDT information.
|
|
r_dir_file(hal_fingerprint_default, sysfs_chosen)
|
|
|
|
# Allow fingerprint to access calibration blk device.
|
|
allow hal_fingerprint_default mfg_data_block_device:blk_file rw_file_perms;
|
|
allow hal_fingerprint_default block_device:dir search;
|
|
|
|
# Allow fingerprint to access fwk_sensor_hwservice
|
|
allow hal_fingerprint_default fwk_sensor_hwservice:hwservice_manager find;
|
|
|
|
# Allow fingerprint to access sysfs_display
|
|
allow hal_fingerprint_default sysfs_display:file rw_file_perms;
|
|
|
|
# Allow fingerprint to access trusty sysfs
|
|
allow hal_fingerprint_default sysfs_trusty:file rw_file_perms;
|
|
|
|
# Allow fingerprint to access display hal
|
|
allow hal_fingerprint_default hal_pixel_display_service:service_manager find;
|
|
binder_call(hal_fingerprint_default, hal_graphics_composer_default)
|
|
|
|
# allow fingerprint to access thermal hal
|
|
hal_client_domain(hal_fingerprint_default, hal_thermal);
|
|
|
|
# allow fingerprint to read sysfs_leds
|
|
allow hal_fingerprint_default sysfs_leds:file r_file_perms;
|
|
allow hal_fingerprint_default sysfs_leds:dir r_dir_perms;
|
|
|
|
# allow fingerprint to wakeup to trigger calibration scans and sleep after
|
|
allow hal_fingerprint_default self:capability2 wake_alarm;
|
|
allow hal_fingerprint_default self:capability2 block_suspend;
|
|
|
|
# allow fingerprint to search for files
|
|
# TODO: b/297562630 - remove unecessary permissions once not needed
|
|
allow hal_fingerprint_default mnt_vendor_file:dir search;
|
|
allow hal_fingerprint_default vendor_misc_data_file:dir search;
|
|
allow hal_fingerprint_default persist_file:dir search;
|
|
|
|
# allow fingerprint to rw config and calibration files in persist
|
|
# TODO: b/297562630 - remove unecessary permissions once not needed
|
|
allow hal_fingerprint_default persist_fingerprint_file:dir search;
|
|
allow hal_fingerprint_default persist_fingerprint_file:file create_file_perms;
|
|
|
|
# allow fingerprint to rw data files
|
|
# TODO: b/297562630 - remove unecessary permissions once not needed
|
|
allow hal_fingerprint_default vendor_fingerprint_data_file:dir create_dir_perms;
|
|
allow hal_fingerprint_default vendor_fingerprint_data_file:file create_file_perms;
|
|
|
|
# Allow fingerprint to rw lhbm files
|
|
allow hal_fingerprint_default sysfs_lhbm:file rw_file_perms;
|
|
|
|
# Allow fingerprint to access sysfs_aoc_udfps
|
|
allow hal_fingerprint_default sysfs_aoc:dir search;
|
|
allow hal_fingerprint_default sysfs_aoc_udfps:file rw_file_perms;
|