87b0b914b1
We are going to enforce that each property has an explicit owner, such as system, vendor, or product. This attaches vendor_property_type to properties defined under vendor sepolicy directories. Bug: 159097992 Test: m selinux_policy && boot device Change-Id: Ibed833cd9e5d786e82985ded6bc62abdf8cd9ded Merged-In: Ibed833cd9e5d786e82985ded6bc62abdf8cd9ded (cherry picked from commit 44eb8e1f89adf04fd413a69391fd444ba68af742) (cherry picked from commit 1922128397116d551a663d5344b4456a84bf46eb)
27 lines
1.4 KiB
Plaintext
27 lines
1.4 KiB
Plaintext
type hal_fingerprint_hwservice_xiaomi, hwservice_manager_type;
|
|
type fingerprint_device, dev_type;
|
|
type fingerprint_data_file, data_file_type, file_type;
|
|
type vendor_sysfs_fod, sysfs_type, fs_type;
|
|
vendor_internal_prop(vendor_fp_prop)
|
|
|
|
allow hal_fingerprint_default fingerprint_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default fingerprint_data_file:dir create_dir_perms;
|
|
allow hal_fingerprint_default fingerprint_data_file:file create_file_perms;
|
|
allow hal_fingerprint_default input_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default self:netlink_socket create_socket_perms_no_ioctl;
|
|
allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default touchfeature_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default uhid_device:chr_file rw_file_perms;
|
|
allow hal_fingerprint_default vendor_qdsp_device:chr_file r_file_perms;
|
|
allow hal_fingerprint_default vendor_sysfs_fod:file rw_file_perms;
|
|
allow hal_fingerprint_default vendor_sysfs_graphics:file rw_file_perms;
|
|
allow hal_fingerprint_default vendor_xdsp_device:chr_file r_file_perms;
|
|
|
|
r_dir_file(hal_fingerprint_default, firmware_file)
|
|
|
|
get_prop(hal_fingerprint_default, vendor_adsprpc_prop)
|
|
set_prop(hal_fingerprint_default, vendor_fp_prop)
|
|
hal_client_domain(hal_fingerprint_default, vendor_hal_perf)
|
|
|
|
add_hwservice(hal_fingerprint_default, hal_fingerprint_hwservice_xiaomi)
|