Skip to content
Snippets Groups Projects
Commit 73682e4e authored by Treehugger Robot's avatar Treehugger Robot Committed by Gerrit Code Review
Browse files

Merge "Fingerprint data is now stored in one of two ways depending on the"

parents 02f82964 4d6a5e87
No related branches found
No related tags found
No related merge requests found
...@@ -43,6 +43,7 @@ ...@@ -43,6 +43,7 @@
exported3_default_prop exported3_default_prop
exported3_radio_prop exported3_radio_prop
exported3_system_prop exported3_system_prop
fingerprint_vendor_data_file
fs_bpf fs_bpf
hal_audiocontrol_hwservice hal_audiocontrol_hwservice
hal_authsecret_hwservice hal_authsecret_hwservice
......
...@@ -455,6 +455,9 @@ ...@@ -455,6 +455,9 @@
# Fingerprint data # Fingerprint data
/data/system/users/[0-9]+/fpdata(/.*)? u:object_r:fingerprintd_data_file:s0 /data/system/users/[0-9]+/fpdata(/.*)? u:object_r:fingerprintd_data_file:s0
# Fingerprint vendor data file
/data/vendor_de/[0-9]+/fpdata(/.*)? u:object_r:fingerprint_vendor_data_file:s0
# Bootchart data # Bootchart data
/data/bootchart(/.*)? u:object_r:bootchart_data_file:s0 /data/bootchart(/.*)? u:object_r:bootchart_data_file:s0
......
...@@ -14,10 +14,12 @@ allow vold_prepare_subdirs { ...@@ -14,10 +14,12 @@ allow vold_prepare_subdirs {
vendor_data_file vendor_data_file
}:dir { open read write add_name remove_name rmdir relabelfrom }; }:dir { open read write add_name remove_name rmdir relabelfrom };
allow vold_prepare_subdirs { allow vold_prepare_subdirs {
fingerprint_vendor_data_file
storaged_data_file storaged_data_file
vold_data_file vold_data_file
}:dir { create_dir_perms relabelto }; }:dir { create_dir_perms relabelto };
allow vold_prepare_subdirs { allow vold_prepare_subdirs {
fingerprint_vendor_data_file
storaged_data_file storaged_data_file
system_data_file system_data_file
vold_data_file vold_data_file
......
...@@ -814,6 +814,7 @@ full_treble_only(` ...@@ -814,6 +814,7 @@ full_treble_only(`
-appdomain # TODO(b/34980020) remove exemption for appdomain -appdomain # TODO(b/34980020) remove exemption for appdomain
-data_between_core_and_vendor_violators -data_between_core_and_vendor_violators
-init -init
-vold_prepare_subdirs
} { } {
data_file_type data_file_type
-core_data_file_type -core_data_file_type
...@@ -825,6 +826,7 @@ full_treble_only(` ...@@ -825,6 +826,7 @@ full_treble_only(`
-appdomain # TODO(b/34980020) remove exemption for appdomain -appdomain # TODO(b/34980020) remove exemption for appdomain
-data_between_core_and_vendor_violators -data_between_core_and_vendor_violators
-init -init
-vold_prepare_subdirs
} { } {
data_file_type data_file_type
-core_data_file_type -core_data_file_type
......
...@@ -312,6 +312,8 @@ type backup_data_file, file_type, data_file_type, core_data_file_type, mlstruste ...@@ -312,6 +312,8 @@ type backup_data_file, file_type, data_file_type, core_data_file_type, mlstruste
type bluetooth_efs_file, file_type; type bluetooth_efs_file, file_type;
# Type for fingerprint template file # Type for fingerprint template file
type fingerprintd_data_file, file_type, data_file_type, core_data_file_type; type fingerprintd_data_file, file_type, data_file_type, core_data_file_type;
# Type for _new_ fingerprint template file
type fingerprint_vendor_data_file, file_type, data_file_type;
# Type for appfuse file. # Type for appfuse file.
type app_fuse_file, file_type, data_file_type, core_data_file_type, mlstrustedobject; type app_fuse_file, file_type, data_file_type, core_data_file_type, mlstrustedobject;
......
...@@ -8,5 +8,10 @@ allow hal_fingerprint_client hal_fingerprint_hwservice:hwservice_manager find; ...@@ -8,5 +8,10 @@ allow hal_fingerprint_client hal_fingerprint_hwservice:hwservice_manager find;
# For memory allocation # For memory allocation
allow hal_fingerprint ion_device:chr_file r_file_perms; allow hal_fingerprint ion_device:chr_file r_file_perms;
allow hal_fingerprint fingerprint_vendor_data_file:file { create_file_perms };
allow hal_fingerprint fingerprint_vendor_data_file:dir rw_dir_perms;
r_dir_file(hal_fingerprint, cgroup) r_dir_file(hal_fingerprint, cgroup)
r_dir_file(hal_fingerprint, sysfs) r_dir_file(hal_fingerprint, sysfs)
...@@ -5,3 +5,7 @@ type tee, domain; ...@@ -5,3 +5,7 @@ type tee, domain;
# Device(s) for communicating with the TEE # Device(s) for communicating with the TEE
type tee_device, dev_type; type tee_device, dev_type;
allow tee fingerprint_vendor_data_file:dir rw_dir_perms;
allow tee fingerprint_vendor_data_file:file create_file_perms;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment