device_motorola_sm7325-common/sepolicy/vendor/hal_fingerprint_default.te
SamarV-121 71f89622fd sm7325-common: sepolicy: Allow hal_fingerprint_default to make self binder calls
`avc: denied { call } for comm="android.hardwar" scontext=u:r:hal_fingerprint_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=binder permissive=0`

Signed-off-by: sb6596 <shubhamprince111@gmail.com>
Change-Id: I7bdac61d9705f24ae068c522cf73af9c094ad97f
2022-10-11 15:27:56 -04:00

23 lines
1.1 KiB
Plaintext

allow hal_fingerprint_default {
etsd_device
egis_device
goodix_device
tee_device
}: chr_file rw_file_perms;
allow hal_fingerprint_default self:binder { call transfer };
allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
r_dir_file(hal_fingerprint_default, firmware_file)
get_prop(hal_fingerprint_default, build_bootimage_prop)
set_prop(hal_fingerprint_default, vendor_mot_fingerprint_prop)
allow hal_fingerprint_default vendor_sysfs_battery_supply:dir r_dir_perms;
allow hal_fingerprint_default vendor_sysfs_battery_supply:file r_file_perms;
allow hal_fingerprint_default vendor_sysfs_fingerprint:dir r_dir_perms;
allow hal_fingerprint_default vendor_sysfs_fingerprint:file rw_file_perms;
allow hal_fingerprint_default uhid_device:chr_file rw_file_perms;
allow hal_fingerprint_default vendor_sysfs_fingerprint:{ file lnk_file } read;
allow hal_fingerprint_default vendor_data_tzstorage_file:dir rw_dir_perms;
allow hal_fingerprint_default vendor_data_tzstorage_file:file create_file_perms;
binder_call(hal_fingerprint_default, hal_fingerprint_default)