android_device_lenovo_msm89.../sepolicy/vendor/hal_fingerprint_msm8937.te
Martijn Coenen a85558ea52 msm8937-common: Add selinux/private/service_contexts.
This makes sure that the remaining binder services
for radio end up in plat_service_contexts.

That in turn allows us to enforce that servicemanager
will only serve services from plat_service_contexts
on FULL_TREBLE devices.

Bug: 36866029
Test: boot, verify radio services still work
Change-Id: Ib67b3a03e5599484c5c4fb27a0f323a37dd51636
Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
2018-07-09 00:00:21 +08:00

27 lines
1.1 KiB
Text

type hal_fingerprint_msm8937, domain, binder_in_vendor_violators;
hal_server_domain(hal_fingerprint_msm8937, hal_fingerprint)
type hal_fingerprint_msm8937_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(hal_fingerprint_msm8937)
binder_use(hal_fingerprint_msm8937)
add_service(hal_fingerprint_msm8937, hal_fingerprint_msm8937_service)
binder_call(hal_fingerprint_msm8937, gx_fpd)
allow hal_fingerprint_msm8937 gx_fpd_service:service_manager find;
allow gx_fpd hal_fingerprint_msm8937:binder call;
allow hal_fingerprint_msm8937 fingerprint_service:service_manager find;
allow hal_fingerprint_msm8937 keystore_service:service_manager find;
allow hal_fingerprint_msm8937 fpc_sysfs:file rw_file_perms;
allow hal_fingerprint_msm8937 fpc_sysfs:dir rw_dir_perms;
allow hal_fingerprint_msm8937 tee_device:chr_file rw_file_perms;
allow hal_fingerprint_msm8937 uhid_device:chr_file rw_file_perms;
allow hal_fingerprint_msm8937 fpc_data_file:dir rw_dir_perms;
allow hal_fingerprint_msm8937 fpc_data_file:sock_file create_file_perms;
r_dir_file(hal_fingerprint_msm8937, firmware_file)
use_keystore(hal_fingerprint_msm8937)