LG8n: sepolicy: Address some hal_fingerprint_default denials

Signed-off-by: Shirayuki39 <lorddemecrius83@proton.me>
This commit is contained in:
Shirayuki39 2024-07-18 15:34:27 +08:00
parent 144091680f
commit 89775bac18
3 changed files with 10 additions and 0 deletions

View file

@ -6,7 +6,12 @@ allow hal_fingerprint_default persist_data_file:file create_file_perms;
allow hal_fingerprint_default self:netlink_kobject_uevent_socket { read create bind setopt }; allow hal_fingerprint_default self:netlink_kobject_uevent_socket { read create bind setopt };
allow hal_fingerprint_default sysfs_fp_name_path:dir r_dir_perms; allow hal_fingerprint_default sysfs_fp_name_path:dir r_dir_perms;
allow hal_fingerprint_default sysfs_fp_name_path:file rw_file_perms; allow hal_fingerprint_default sysfs_fp_name_path:file rw_file_perms;
allow hal_fingerprint_default vndbinder_device:chr_file { ioctl read write getattr lock append map open watch watch_reads };
allow hal_fingerprint_default vendor_gf_data_file:dir create_dir_perms; allow hal_fingerprint_default vendor_gf_data_file:dir create_dir_perms;
allow hal_fingerprint_default vendor_gf_data_file:file create_file_perms; allow hal_fingerprint_default vendor_gf_data_file:file create_file_perms;
allow hal_fingerprint_default property_socket:sock_file write;
dontaudit hal_fingerprint_default hal_power_hwservice:hwservice_manager find;
set_prop(hal_fingerprint_default, ctl_default_prop)
get_prop(hal_fingerprint_default, vendor_fingerprint_prop)
set_prop(hal_fingerprint_default, vendor_fingerprint_prop) set_prop(hal_fingerprint_default, vendor_fingerprint_prop)

View file

@ -31,6 +31,7 @@ allow hal_sensors_default sensor_data_file:dir search;
allow hal_sensors_default sensor_data_file:file create_file_perms; allow hal_sensors_default sensor_data_file:file create_file_perms;
allow hal_sensors_default sensorlist_device:chr_file rw_file_perms; allow hal_sensors_default sensorlist_device:chr_file rw_file_perms;
allow hal_sensors_default sysfs_dt_firmware_android:dir search; allow hal_sensors_default sysfs_dt_firmware_android:dir search;
allow hal_sensors_default sysfs_dt_firmware_android:file { ioctl read getattr lock map open watch watch_reads };
allow hal_sensors_default sysfs_mtk_nanohub_state:file r_file_perms; allow hal_sensors_default sysfs_mtk_nanohub_state:file r_file_perms;
allow hal_sensors_default sysfs_sensor:dir r_dir_perms; allow hal_sensors_default sysfs_sensor:dir r_dir_perms;
allow hal_sensors_default sysfs_sensor:file rw_file_perms; allow hal_sensors_default sysfs_sensor:file rw_file_perms;

View file

@ -21,6 +21,10 @@ persist.vendor.sys.fp.goodix.spmt.flag u:object_r:vendor_fingerprint_prop:s
vendor.fp.goodix.X.offset u:object_r:vendor_fingerprint_prop:s0 vendor.fp.goodix.X.offset u:object_r:vendor_fingerprint_prop:s0
vendor.fp.goodix.Y.offset u:object_r:vendor_fingerprint_prop:s0 vendor.fp.goodix.Y.offset u:object_r:vendor_fingerprint_prop:s0
vendor.fp.transsion.lcmname u:object_r:vendor_fingerprint_prop:s0 vendor.fp.transsion.lcmname u:object_r:vendor_fingerprint_prop:s0
vendor.fp.currentUid u:object_r:vendor_fingerprint_prop:s0
persist.vendor.fp.sensorUid u:object_r:vendor_fingerprint_prop:s0
persist.vendor.sys.fp.fod.location.X_Y u:object_r:vendor_fingerprint_prop:s0
persist.vendor.sys.fp.fod.size.width_height u:object_r:vendor_fingerprint_prop:s0
# Key manager # Key manager
ro.mtk_key_manager_support u:object_r:vendor_mtk_default_prop:s0 ro.mtk_key_manager_support u:object_r:vendor_mtk_default_prop:s0