diff --git a/sepolicy/vendor/hal_fingerprint_sdm660.te b/sepolicy/vendor/hal_fingerprint_sdm660.te index ae0122c1..95d5a725 100644 --- a/sepolicy/vendor/hal_fingerprint_sdm660.te +++ b/sepolicy/vendor/hal_fingerprint_sdm660.te @@ -23,6 +23,7 @@ allow hal_fingerprint_sdm660 sysfs_devfreq:dir search; allow hal_fingerprint_sdm660 sysfs_devfreq:file r_file_perms; allow hal_fingerprint_sdm660 mnt_vendor_file:dir search; allow hal_fingerprint_sdm660 mnt_vendor_file:file r_file_perms; +allow hal_fingerprint_sdm660 persist_drm_file:dir rw_dir_perms; binder_call(hal_fingerprint_sdm660, hal_perf_default) r_dir_file(hal_fingerprint_sdm660, firmware_file) diff --git a/sepolicy/vendor/system_server.te b/sepolicy/vendor/system_server.te index 23eef0e9..a8c89b6f 100644 --- a/sepolicy/vendor/system_server.te +++ b/sepolicy/vendor/system_server.te @@ -3,5 +3,6 @@ get_prop(system_server, userspace_reboot_exported_prop) allow system_server app_zygote:process getpgid; allow system_server blkio_dev:dir search; allow system_server sysfs_battery_supply:file rw_file_perms; +allow system_server sysfs_livedisplay_tuneable:file rw_file_perms; dontaudit system_server sysfs:file { read open getattr };