diff --git a/sepolicy/vendor/hal_fingerprint_default.te b/sepolicy/vendor/hal_fingerprint_default.te index 2bd0ceb..31d10c1 100644 --- a/sepolicy/vendor/hal_fingerprint_default.te +++ b/sepolicy/vendor/hal_fingerprint_default.te @@ -9,5 +9,9 @@ allow hal_fingerprint_default sysfs_fp_name_path:file rw_file_perms; allow hal_fingerprint_default vndbinder_device:chr_file { ioctl read write getattr lock append map open watch watch_reads }; allow hal_fingerprint_default vendor_gf_data_file:dir create_dir_perms; allow hal_fingerprint_default vendor_gf_data_file:file create_file_perms; +allow hal_fingerprint_default property_socket:sock_file write; +get_prop(hal_fingerprint_default, vendor_system_prop) +set_prop(hal_fingerprint_default, vendor_system_prop) +set_prop(hal_fingerprint_default, ctl_default_prop) set_prop(hal_fingerprint_default, vendor_fingerprint_prop) diff --git a/sepolicy/vendor/property_contexts b/sepolicy/vendor/property_contexts index 69d4376..3fcf9b2 100644 --- a/sepolicy/vendor/property_contexts +++ b/sepolicy/vendor/property_contexts @@ -21,6 +21,9 @@ persist.vendor.sys.fp.goodix.spmt.flag u:object_r:vendor_fingerprint_prop:s vendor.fp.goodix.X.offset u:object_r:vendor_fingerprint_prop:s0 vendor.fp.goodix.Y.offset u:object_r:vendor_fingerprint_prop:s0 vendor.fp.transsion.lcmname u:object_r:vendor_fingerprint_prop:s0 +vendor.fp.currentUid u:object_r:vendor_fingerprint_prop:s0 +persist.vendor.fp.sensorUid u:object_r:vendor_fingerprint_prop:s0 + # Key manager ro.mtk_key_manager_support u:object_r:vendor_mtk_default_prop:s0