76aab82cb3
This attribute is being actively removed from policy. Since attributes are not being versioned, partners must not be able to access and use this attribute. Move it from private and verify in the logs that rild and tee are not using these permissions. Bug: 38316109 Test: build and boot Marlin Test: Verify that rild and tee are not being granted any of these permissions. Change-Id: I31beeb5bdf3885195310b086c1af3432dc6a349b
28 lines
901 B
Text
28 lines
901 B
Text
type fingerprintd, domain;
|
|
type fingerprintd_exec, exec_type, file_type;
|
|
|
|
binder_use(fingerprintd)
|
|
|
|
# Scan through /system/lib64/hw looking for installed HALs
|
|
allow fingerprintd system_file:dir r_dir_perms;
|
|
|
|
# need to find KeyStore and add self
|
|
add_service(fingerprintd, fingerprintd_service)
|
|
|
|
# allow HAL module to read dir contents
|
|
allow fingerprintd fingerprintd_data_file:file { create_file_perms };
|
|
|
|
# allow HAL module to read/write/unlink contents of this dir
|
|
allow fingerprintd fingerprintd_data_file:dir rw_dir_perms;
|
|
|
|
# Need to add auth tokens to KeyStore
|
|
use_keystore(fingerprintd)
|
|
allow fingerprintd keystore:keystore_key { add_auth };
|
|
|
|
# For permissions checking
|
|
binder_call(fingerprintd, system_server);
|
|
allow fingerprintd permission_service:service_manager find;
|
|
|
|
r_dir_file(fingerprintd, cgroup)
|
|
r_dir_file(fingerprintd, sysfs_type)
|
|
allow fingerprintd ion_device:chr_file r_file_perms;
|