Remove incorrect fingerprint SePolicy. am: 185d6a4844

Original change: https://googleplex-android-review.googlesource.com/c/device/google/caimito-sepolicy/+/24558261

Change-Id: Id9ea1d54435317da5510bb3e750ae87df725b7f2
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
This commit is contained in:
Alec Foster 2023-08-29 05:46:19 +00:00 committed by Automerger Merge Worker
commit 21625e533e
4 changed files with 0 additions and 60 deletions

View file

@ -1,12 +0,0 @@
# qfp-daemon HAL for fingerprint
/vendor/bin/hw/qfp-daemon u:object_r:qfp-daemon_exec:s0
/data/vendor/misc/qti_fp u:object_r:vendor_qfp-daemon_data_file:s0
/dev/qbt_ipc u:object_r:vendor_qbt_device:s0
/dev/qbt_fd u:object_r:vendor_qbt_device:s0
/mnt/vendor/persist/qti_fp u:object_r:vendor_persist_qti_fp_file:s0
# Script for initializing vfs_calib.dat and persistent props.
/vendor/bin/init\.qfp\.sh u:object_r:init-qfp-sh_exec:s0

View file

@ -1 +0,0 @@
vendor.qti.hardware.fingerprint::IQtiExtendedFingerprint u:object_r:qfp_hal_fingerprint_hwservice:s0

View file

@ -1,5 +0,0 @@
type init-qfp-sh, domain;
type init-qfp-sh_exec, vendor_file_type, exec_type, file_type;
init_daemon_domain(init-qfp-sh)
domain_auto_trans(init, init-qfp-sh_exec, init-qfp-sh)

View file

@ -1,42 +0,0 @@
# Allow qfp-daemon to act as AIDL service.
type qfp-daemon, domain;
type qfp-daemon_exec, exec_type, vendor_file_type, file_type;
hal_server_domain(qfp-daemon, hal_fingerprint)
init_daemon_domain(qfp-daemon)
# Permissions to /data/vendor/misc/qti_fp and make files.
type vendor_qfp-daemon_data_file, file_type, data_file_type;
allow qfp-daemon vendor_qfp-daemon_data_file:dir { rw_dir_perms setattr create_dir_perms search };
allow qfp-daemon vendor_qfp-daemon_data_file:file create_file_perms;
# Permissions to read system properties.
allow qfp-daemon property_socket:sock_file write;
# Permissions to write to /dev/qbt_fd and /dev/qbt_ipc
type vendor_qbt_device, dev_type;
allow qfp-daemon vendor_qbt_device:chr_file rw_file_perms;
# /vendor/data read permissions for storing factory test data.
type qfp_vendor_data_file, file_type, data_file_type;
allow qfp-daemon qfp_vendor_data_file:dir r_dir_perms;
# Permissions to create directory at /vendor/persist/qti_fp and make a file.
type vendor_persist_qti_fp_file, file_type, vendor_persist_type;
allow qfp-daemon vendor_persist_qti_fp_file:dir r_dir_perms;
allow qfp-daemon vendor_persist_qti_fp_file:file r_file_perms;
# Permissions to wake device.
allow qfp-daemon self:capability2 { block_suspend wake_alarm };
# Register to hwbinder for HIDL and binder for AIDL.
hwbinder_use(qfp-daemon)
binder_use(qfp-daemon)
# Add hwservice for IQti extension HIDL.
type qfp_hal_fingerprint_hwservice, hwservice_manager_type;
add_hwservice(qfp-daemon, qfp_hal_fingerprint_hwservice);
allow hal_fingerprint qfp_hal_fingerprint_hwservice:hwservice_manager find;
allow platform_app qfp-daemon:binder { call transfer };
allow platform_app qfp_hal_fingerprint_hwservice:hwservice_manager find;