android_device_xiaomi_sm835.../sepolicy/vendor/hal_fingerprint_default.te
EcrosoftXiao e5363bb71f sm8350-common: sepolicy: Address more denials for fp hal
Change-Id: I9a0ad1bc605ea6fd40b8f0a1301129bad1c61fbd
2023-08-12 16:50:49 +08:00

41 lines
1.8 KiB
Plaintext

type vendor_fingerprint_data_file, data_file_type, file_type;
type vendor_fingerprint_device, dev_type;
type vendor_hal_fingerprint_hwservice_xiaomi, hwservice_manager_type;
type vendor_sysfs_udfps, sysfs_type, fs_type;
vendor_restricted_prop(vendor_fp_prop)
vendor_internal_prop(vendor_fp_info_prop)
# Binder
add_hwservice(hal_fingerprint_default, vendor_hal_fingerprint_hwservice_xiaomi)
allow hal_fingerprint_default vendor_hal_perf_default:binder call;
allow hal_fingerprint_default vendor_hal_perf_hwservice:hwservice_manager find;
# Netlink_socket
allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
# Props
set_prop(hal_fingerprint_default, vendor_fp_prop)
set_prop(hal_fingerprint_default, vendor_fp_info_prop)
# Sysfs
allow hal_fingerprint_default sysfs_rtc:dir r_dir_perms;
allow hal_fingerprint_default sysfs_rtc:file rw_file_perms;
allow hal_fingerprint_default vendor_sysfs_spss:dir r_dir_perms;
allow hal_fingerprint_default vendor_sysfs_spss:file rw_file_perms;
allow hal_fingerprint_default vendor_sysfs_fingerprint:dir r_dir_perms;
allow hal_fingerprint_default vendor_sysfs_fingerprint:file rw_file_perms;
allow hal_fingerprint_default vendor_sysfs_udfps:file rw_file_perms;
allow hal_fingerprint_default vendor_sysfs_graphics:dir r_dir_perms;
allow hal_fingerprint_default vendor_sysfs_graphics:file rw_file_perms;
# Dev nodes
allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
allow hal_fingerprint_default uhid_device:chr_file rw_file_perms;
allow hal_fingerprint_default vendor_fingerprint_device:chr_file rw_file_perms;
allow hal_fingerprint_default input_device:dir r_dir_perms;
allow hal_fingerprint_default input_device:chr_file rw_file_perms;
# Data
allow hal_fingerprint_default vendor_fingerprint_data_file:dir rw_dir_perms;
allow hal_fingerprint_default vendor_fingerprint_data_file:file create_file_perms;