Remove incorrect fingerprint SePolicy.
Bug: 295228935 Test: Compiles. Change-Id: I2410bb45df4f90b8e7d853516910341814b839bb
This commit is contained in:
parent
6ceba47719
commit
185d6a4844
4 changed files with 0 additions and 60 deletions
|
@ -1,12 +0,0 @@
|
|||
# qfp-daemon HAL for fingerprint
|
||||
/vendor/bin/hw/qfp-daemon u:object_r:qfp-daemon_exec:s0
|
||||
|
||||
/data/vendor/misc/qti_fp u:object_r:vendor_qfp-daemon_data_file:s0
|
||||
|
||||
/dev/qbt_ipc u:object_r:vendor_qbt_device:s0
|
||||
/dev/qbt_fd u:object_r:vendor_qbt_device:s0
|
||||
|
||||
/mnt/vendor/persist/qti_fp u:object_r:vendor_persist_qti_fp_file:s0
|
||||
|
||||
# Script for initializing vfs_calib.dat and persistent props.
|
||||
/vendor/bin/init\.qfp\.sh u:object_r:init-qfp-sh_exec:s0
|
|
@ -1 +0,0 @@
|
|||
vendor.qti.hardware.fingerprint::IQtiExtendedFingerprint u:object_r:qfp_hal_fingerprint_hwservice:s0
|
|
@ -1,5 +0,0 @@
|
|||
type init-qfp-sh, domain;
|
||||
type init-qfp-sh_exec, vendor_file_type, exec_type, file_type;
|
||||
init_daemon_domain(init-qfp-sh)
|
||||
|
||||
domain_auto_trans(init, init-qfp-sh_exec, init-qfp-sh)
|
|
@ -1,42 +0,0 @@
|
|||
# Allow qfp-daemon to act as AIDL service.
|
||||
type qfp-daemon, domain;
|
||||
type qfp-daemon_exec, exec_type, vendor_file_type, file_type;
|
||||
hal_server_domain(qfp-daemon, hal_fingerprint)
|
||||
init_daemon_domain(qfp-daemon)
|
||||
|
||||
# Permissions to /data/vendor/misc/qti_fp and make files.
|
||||
type vendor_qfp-daemon_data_file, file_type, data_file_type;
|
||||
allow qfp-daemon vendor_qfp-daemon_data_file:dir { rw_dir_perms setattr create_dir_perms search };
|
||||
allow qfp-daemon vendor_qfp-daemon_data_file:file create_file_perms;
|
||||
|
||||
# Permissions to read system properties.
|
||||
allow qfp-daemon property_socket:sock_file write;
|
||||
|
||||
# Permissions to write to /dev/qbt_fd and /dev/qbt_ipc
|
||||
type vendor_qbt_device, dev_type;
|
||||
allow qfp-daemon vendor_qbt_device:chr_file rw_file_perms;
|
||||
|
||||
# /vendor/data read permissions for storing factory test data.
|
||||
type qfp_vendor_data_file, file_type, data_file_type;
|
||||
allow qfp-daemon qfp_vendor_data_file:dir r_dir_perms;
|
||||
|
||||
# Permissions to create directory at /vendor/persist/qti_fp and make a file.
|
||||
type vendor_persist_qti_fp_file, file_type, vendor_persist_type;
|
||||
allow qfp-daemon vendor_persist_qti_fp_file:dir r_dir_perms;
|
||||
allow qfp-daemon vendor_persist_qti_fp_file:file r_file_perms;
|
||||
|
||||
# Permissions to wake device.
|
||||
allow qfp-daemon self:capability2 { block_suspend wake_alarm };
|
||||
|
||||
# Register to hwbinder for HIDL and binder for AIDL.
|
||||
hwbinder_use(qfp-daemon)
|
||||
binder_use(qfp-daemon)
|
||||
|
||||
# Add hwservice for IQti extension HIDL.
|
||||
type qfp_hal_fingerprint_hwservice, hwservice_manager_type;
|
||||
add_hwservice(qfp-daemon, qfp_hal_fingerprint_hwservice);
|
||||
|
||||
allow hal_fingerprint qfp_hal_fingerprint_hwservice:hwservice_manager find;
|
||||
|
||||
allow platform_app qfp-daemon:binder { call transfer };
|
||||
allow platform_app qfp_hal_fingerprint_hwservice:hwservice_manager find;
|
Loading…
Add table
Add a link
Reference in a new issue