fingerprintd.te: neverallow fingerprint data file access
Only fingerprintd should be creating/reading/writing/etc from
/data/system/users/[0-9]+/fpdata(/.*)? . Add a neverallow rule
(compile time assertion + CTS test) to ensure no regressions.
Change-Id: I30261a4bd880f5c4f3d90d1686a6267f60bdd413
diff --git a/fingerprintd.te b/fingerprintd.te
index 1c0ab1c..41e1aca 100644
--- a/fingerprintd.te
+++ b/fingerprintd.te
@@ -21,3 +21,12 @@
# For permissions checking
binder_call(fingerprintd, system_server);
allow fingerprintd permission_service:service_manager find;
+
+###
+### Neverallow rules
+###
+
+# Protect fingerprint data files from access by anything other
+# than fingerprintd and init
+neverallow { domain -fingerprintd -init } fingerprintd_data_file:file
+ { append create link relabelfrom rename setattr write open read ioctl lock };