android_device_motorola_sm6.../sepolicy/vendor/vendor_init_fingerprint.te
Andrew Hexen cb11d4250f
sm7325-common: sepolicy: fix init.oem.fingerprint2.sh
* For dynamic fingerprint.

Signed-off-by: Andrew Hexen <SyberHexen@gmail.com>
Change-Id: I3f3b4904b8ca3d0e3fb7d8eae235a65996df2434
2023-08-31 03:24:56 -07:00

26 lines
1.4 KiB
Text

type vendor_init_fingerprint, domain;
type vendor_init_fingerprint_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(vendor_init_fingerprint)
allow vendor_init_fingerprint kernel:key search;
allow vendor_init_fingerprint self:capability { kill sys_module };
allow vendor_init_fingerprint vendor_file:system module_load;
allow vendor_init_fingerprint vendor_toolbox_exec:file rx_file_perms;
allow vendor_init_fingerprint vendor_persist_egis_file:file create_file_perms;
allow vendor_init_fingerprint vendor_persist_egis_file:dir rw_dir_perms;
allow vendor_init_fingerprint vendor_persist_fps_file:file create_file_perms;
allow vendor_init_fingerprint vendor_persist_fps_file:dir rw_dir_perms;
allow vendor_init_fingerprint mnt_vendor_file:dir r_dir_perms;
allow vendor_init_fingerprint mnt_vendor_file:file r_file_perms;
# Write to /dev/kmsg
allow vendor_init_fingerprint kmsg_device:chr_file rw_file_perms;
set_prop(vendor_init_fingerprint, ctl_start_prop)
set_prop(vendor_init_fingerprint, vendor_mot_fingerprint_prop)
allow vendor_init_fingerprint vendor_file:file execute_no_trans;
allow vendor_init_fingerprint goodix_device:chr_file { getattr ioctl open read write };
allow vendor_init_fingerprint hal_fingerprint_default_exec:file execute_no_trans;
allow vendor_init_fingerprint ctl_stop_prop:property_service set;
allow vendor_init_fingerprint ctl_start_prop:property_service set;