75806ef3c5
Ideally, public should only contain APIs (types / attributes) for vendor. The other statements like allow/neverallow/typeattributes are regarded as implementation detail for platform and should be in private. Bug: 232023812 Test: m selinux_policy Test: diff <(git diff --staged | grep "^-" | cut -b2- | sort) \ <(git diff --staged | grep "^+" | cut -b2- | sort) Test: remove comments on plat_sepolicy.cil, replace base_typeattr_* to base_typeattr and then compare old and new plat_sepolicy.cil Change-Id: I5e7d2da4465ab0216de6bacdf03077d37f6ffe12
27 lines
828 B
Text
27 lines
828 B
Text
typeattribute fingerprintd coredomain;
|
|
|
|
init_daemon_domain(fingerprintd)
|
|
|
|
binder_use(fingerprintd)
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
allow fingerprintd system_file:dir r_dir_perms;
|
|
|
|
# need to find KeyStore and add self
|
|
add_service(fingerprintd, fingerprintd_service)
|
|
|
|
# allow HAL module to read dir contents
|
|
allow fingerprintd fingerprintd_data_file:file { create_file_perms };
|
|
|
|
# allow HAL module to read/write/unlink contents of this dir
|
|
allow fingerprintd fingerprintd_data_file:dir rw_dir_perms;
|
|
|
|
# Need to add auth tokens to KeyStore
|
|
use_keystore(fingerprintd)
|
|
allow fingerprintd keystore:keystore2 { add_auth };
|
|
|
|
# For permissions checking
|
|
binder_call(fingerprintd, system_server);
|
|
allow fingerprintd permission_service:service_manager find;
|
|
|
|
allow fingerprintd ion_device:chr_file r_file_perms;
|