sm6375-common: sepolicy: Allow binder calls from fp hal to health hal
* I health@2.1-serv: type=1400 audit(0.0:860): avc: denied { call } for scontext=u:r:hal_health_default:s0 tcontext=u:r:hal_fingerprint_default:s0 tclass=binder permissive=0 Change-Id: Ifc834b3ef0f07ebf94ecb1f3c7163f8b9959b0f1
This commit is contained in:
parent
fc851ad7e4
commit
63efc084ce
1 changed files with 1 additions and 0 deletions
1
sepolicy/vendor/hal_fingerprint_default.te
vendored
1
sepolicy/vendor/hal_fingerprint_default.te
vendored
|
@ -20,6 +20,7 @@ allow hal_fingerprint_default vendor_data_tzstorage_file:dir rw_dir_perms;
|
|||
allow hal_fingerprint_default vendor_data_tzstorage_file:file create_file_perms;
|
||||
|
||||
binder_call(hal_fingerprint_default, hal_fingerprint_default)
|
||||
binder_call(hal_fingerprint_default, hal_health_default)
|
||||
binder_call(hal_fingerprint_default, vendor_hal_perf_default)
|
||||
|
||||
allow hal_fingerprint_default vendor_hal_perf_hwservice:hwservice_manager find;
|
||||
|
|
Loading…
Reference in a new issue