* For dynamic fingerprint. Signed-off-by: Andrew Hexen <SyberHexen@gmail.com> Change-Id: I3f3b4904b8ca3d0e3fb7d8eae235a65996df2434
26 lines
1.4 KiB
Text
26 lines
1.4 KiB
Text
type vendor_init_fingerprint, domain;
|
|
type vendor_init_fingerprint_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(vendor_init_fingerprint)
|
|
|
|
allow vendor_init_fingerprint kernel:key search;
|
|
allow vendor_init_fingerprint self:capability { kill sys_module };
|
|
allow vendor_init_fingerprint vendor_file:system module_load;
|
|
allow vendor_init_fingerprint vendor_toolbox_exec:file rx_file_perms;
|
|
allow vendor_init_fingerprint vendor_persist_egis_file:file create_file_perms;
|
|
allow vendor_init_fingerprint vendor_persist_egis_file:dir rw_dir_perms;
|
|
allow vendor_init_fingerprint vendor_persist_fps_file:file create_file_perms;
|
|
allow vendor_init_fingerprint vendor_persist_fps_file:dir rw_dir_perms;
|
|
allow vendor_init_fingerprint mnt_vendor_file:dir r_dir_perms;
|
|
allow vendor_init_fingerprint mnt_vendor_file:file r_file_perms;
|
|
|
|
# Write to /dev/kmsg
|
|
allow vendor_init_fingerprint kmsg_device:chr_file rw_file_perms;
|
|
|
|
set_prop(vendor_init_fingerprint, ctl_start_prop)
|
|
set_prop(vendor_init_fingerprint, vendor_mot_fingerprint_prop)
|
|
|
|
allow vendor_init_fingerprint vendor_file:file execute_no_trans;
|
|
allow vendor_init_fingerprint goodix_device:chr_file { getattr ioctl open read write };
|
|
allow vendor_init_fingerprint hal_fingerprint_default_exec:file execute_no_trans;
|
|
allow vendor_init_fingerprint ctl_stop_prop:property_service set;
|
|
allow vendor_init_fingerprint ctl_start_prop:property_service set;
|