Add sepolicy for gnssd
Bug: 269987831 Test: build pass Change-Id: I3b852b7c7b7f1813830a9ceca476d658099a2c55
This commit is contained in:
parent
6a80f00041
commit
1be1e15c26
2 changed files with 16 additions and 0 deletions
15
vendor/gnssd.te
vendored
15
vendor/gnssd.te
vendored
|
@ -1,3 +1,18 @@
|
|||
type gnssd, domain;
|
||||
type gnssd_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(gnssd);
|
||||
|
||||
# Allow gnssd to access rild
|
||||
binder_call(gnssd, rild);
|
||||
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
|
||||
binder_call(gnssd, hwservicemanager)
|
||||
|
||||
allow gnssd vendor_gps_file:dir create_dir_perms;
|
||||
allow gnssd vendor_gps_file:file create_file_perms;
|
||||
allow gnssd vendor_gps_file:fifo_file create_file_perms;
|
||||
|
||||
# Allow gnssd to obtain wakelock
|
||||
wakelock_use(gnssd)
|
||||
|
||||
# Allow a base set of permissions required for network access.
|
||||
net_domain(gnssd);
|
||||
|
|
1
vendor/radio/rild.te
vendored
Normal file
1
vendor/radio/rild.te
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
binder_call(rild, gnssd)
|
Loading…
Add table
Add a link
Reference in a new issue