diff options
Diffstat (limited to 'sepolicy/vendor')
-rw-r--r-- | sepolicy/vendor/hwservice.te | 1 | ||||
-rw-r--r-- | sepolicy/vendor/hwservice_contexts | 1 | ||||
-rw-r--r-- | sepolicy/vendor/init_fingerprint.te | 1 | ||||
-rw-r--r-- | sepolicy/vendor/system_server.te | 1 |
4 files changed, 3 insertions, 1 deletions
diff --git a/sepolicy/vendor/hwservice.te b/sepolicy/vendor/hwservice.te index 32adecb..db29744 100644 --- a/sepolicy/vendor/hwservice.te +++ b/sepolicy/vendor/hwservice.te @@ -1,2 +1,3 @@ type goodixhw_service, hwservice_manager_type; type hal_mlipay_hwservice, hwservice_manager_type, untrusted_app_visible_hwservice; +type fpnav_hwservice, hwservice_manager_type; diff --git a/sepolicy/vendor/hwservice_contexts b/sepolicy/vendor/hwservice_contexts index 8ff7ae7..14bb48b 100644 --- a/sepolicy/vendor/hwservice_contexts +++ b/sepolicy/vendor/hwservice_contexts @@ -1,2 +1,3 @@ vendor.goodix.hardware.fingerprint::IGoodixBiometricsFingerprint u:object_r:goodixhw_service:s0 +com.fingerprints.extension::IFingerprintNavigation u:object_r:fpnav_hwservice:s0 vendor.xiaomi.hardware.mlipay::IMlipayService u:object_r:hal_mlipay_hwservice:s0 diff --git a/sepolicy/vendor/init_fingerprint.te b/sepolicy/vendor/init_fingerprint.te index 9ef78c4..29ea735 100644 --- a/sepolicy/vendor/init_fingerprint.te +++ b/sepolicy/vendor/init_fingerprint.te @@ -12,5 +12,4 @@ allow init_fingerprint vendor_toolbox_exec:file rx_file_perms; allow init_fingerprint persist_file:dir search; allow init_fingerprint persist_drm_file:dir { read search open write remove_name }; allow init_fingerprint persist_drm_file:file { getattr unlink }; - allow init_fingerprint system_data_file:file getattr; diff --git a/sepolicy/vendor/system_server.te b/sepolicy/vendor/system_server.te index c9135cf..1ab55bd 100644 --- a/sepolicy/vendor/system_server.te +++ b/sepolicy/vendor/system_server.te @@ -2,3 +2,4 @@ allow system_server vendor_keylayout_file:dir search; allow system_server vendor_keylayout_file:file r_file_perms; allow system_server sysfs_vibrator:file rw_file_perms; allow system_server sysfs_rtc:file r_file_perms; +allow system_server fpnav_hwservice:hwservice_manager { add find }; |