Skip to content
Snippets Groups Projects
  • Nick Kralevich's avatar
    cf7ee8a8
    Revert "fingerprintd.te: neverallow fingerprint data file access" · cf7ee8a8
    Nick Kralevich authored
    Both angler and bullhead violate these SELinux rules.
    
    Bullhead: tee has access to these files
    Angler: system_server has read/write access to these files.
    
    Fixes the following compile time error:
    
      libsepol.report_failure: neverallow on line 32 of external/sepolicy/fingerprintd.te (or line 6704 of policy.conf) violated by allow tee fingerprintd_data_file:file { ioctl read write create setattr lock append rename open };
      libsepol.check_assertions: 1 neverallow failures occurred
      Error while expanding policy
      out/host/linux-x86/bin/checkpolicy:  loading policy configuration from out/target/product/bullhead/obj/ETC/sepolicy_intermediates/policy.conf
    
    This reverts commit 604a8cae.
    
    Change-Id: Iabb8f2e9de96f9082cd6a790d1af80cbc6a569b1
    cf7ee8a8
    History
    Revert "fingerprintd.te: neverallow fingerprint data file access"
    Nick Kralevich authored
    Both angler and bullhead violate these SELinux rules.
    
    Bullhead: tee has access to these files
    Angler: system_server has read/write access to these files.
    
    Fixes the following compile time error:
    
      libsepol.report_failure: neverallow on line 32 of external/sepolicy/fingerprintd.te (or line 6704 of policy.conf) violated by allow tee fingerprintd_data_file:file { ioctl read write create setattr lock append rename open };
      libsepol.check_assertions: 1 neverallow failures occurred
      Error while expanding policy
      out/host/linux-x86/bin/checkpolicy:  loading policy configuration from out/target/product/bullhead/obj/ETC/sepolicy_intermediates/policy.conf
    
    This reverts commit 604a8cae.
    
    Change-Id: Iabb8f2e9de96f9082cd6a790d1af80cbc6a569b1
fingerprintd.te 758 B
type fingerprintd, domain, domain_deprecated;
type fingerprintd_exec, exec_type, file_type;

# fingerprintd
init_daemon_domain(fingerprintd)
binder_use(fingerprintd)

# need to find KeyStore and add self
allow fingerprintd fingerprintd_service:service_manager { add find };

# allow HAL module to read dir contents
allow fingerprintd fingerprintd_data_file:file { create_file_perms };

# allow HAL module to read/write/unlink contents of this dir
allow fingerprintd fingerprintd_data_file:dir rw_dir_perms;

# Need to add auth tokens to KeyStore
use_keystore(fingerprintd)
allow fingerprintd keystore:keystore_key { add_auth };

# For permissions checking
binder_call(fingerprintd, system_server);
allow fingerprintd permission_service:service_manager find;