gps: refine iGNSS build system - sepolicy

Bug: 318310869
Bug: 315915958
Test: build pass and GPS function works
Change-Id: I6329298f89a03a10dc9c8e1579baa4060d85c30c
This commit is contained in:
Wayne Lin 2024-01-13 00:35:50 +08:00
parent afcfb46894
commit 3dc01cbd48
32 changed files with 0 additions and 224 deletions

View file

@ -14,14 +14,3 @@
/dev/lwis-sensor-taotie-tele u:object_r:lwis_device:s0
/dev/lwis-sensor-taotie-uw u:object_r:lwis_device:s0
/dev/lwis-tof-tarasque u:object_r:lwis_device:s0
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/gnss-aidl-service_IGnssV2_ISlsiGnssV1 u:object_r:hal_gnss_default_exec:s0
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0

View file

@ -1,9 +0,0 @@
type gnss_check, domain;
type gnss_check_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnss_check);
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
set_prop(gnss_check, ctl_stop_prop);
set_prop(gnss_check, ctl_start_prop);

View file

@ -1,23 +0,0 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
# binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
get_prop(gnssd, bootanim_system_prop)
# Allow gnssd to obtain wakelock
wakelock_use(gnssd)
# Allow a base set of permissions required for network access.
net_domain(gnssd);

View file

@ -1,3 +0,0 @@
binder_call(hal_gnss_default, gnssd);
allow hal_gnss_default gnssd:unix_stream_socket connectto;

View file

@ -1 +0,0 @@
binder_call(rild, gnssd)

View file

@ -1,3 +0,0 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

View file

@ -1,3 +0,0 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

View file

@ -1,3 +0,0 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);

View file

@ -14,14 +14,3 @@
/dev/lwis-sensor-taotie-tele u:object_r:lwis_device:s0
/dev/lwis-sensor-taotie-uw u:object_r:lwis_device:s0
/dev/lwis-tof-tarasque u:object_r:lwis_device:s0
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/gnss-aidl-service_IGnssV2_ISlsiGnssV1 u:object_r:hal_gnss_default_exec:s0
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0

View file

@ -1,9 +0,0 @@
type gnss_check, domain;
type gnss_check_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnss_check);
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
set_prop(gnss_check, ctl_stop_prop);
set_prop(gnss_check, ctl_start_prop);

View file

@ -1,23 +0,0 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
# binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
get_prop(gnssd, bootanim_system_prop)
# Allow gnssd to obtain wakelock
wakelock_use(gnssd)
# Allow a base set of permissions required for network access.
net_domain(gnssd);

View file

@ -1,3 +0,0 @@
binder_call(hal_gnss_default, gnssd);
allow hal_gnss_default gnssd:unix_stream_socket connectto;

View file

@ -1 +0,0 @@
binder_call(rild, gnssd)

View file

@ -1,3 +0,0 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

View file

@ -1,3 +0,0 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

View file

@ -1,3 +0,0 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);

View file

@ -42,14 +42,3 @@
/dev/lwis-sensor-taotie-tele u:object_r:lwis_device:s0
/dev/lwis-sensor-taotie-uw u:object_r:lwis_device:s0
/dev/lwis-tof-tarasque u:object_r:lwis_device:s0
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/gnss-aidl-service_IGnssV2_ISlsiGnssV1 u:object_r:hal_gnss_default_exec:s0
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0

View file

@ -1,9 +0,0 @@
type gnss_check, domain;
type gnss_check_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnss_check);
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
set_prop(gnss_check, ctl_stop_prop);
set_prop(gnss_check, ctl_start_prop);

View file

@ -1,23 +0,0 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
# binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
get_prop(gnssd, bootanim_system_prop)
# Allow gnssd to obtain wakelock
wakelock_use(gnssd)
# Allow a base set of permissions required for network access.
net_domain(gnssd);

View file

@ -1,3 +0,0 @@
binder_call(hal_gnss_default, gnssd);
allow hal_gnss_default gnssd:unix_stream_socket connectto;

View file

@ -1 +0,0 @@
binder_call(rild, gnssd)

View file

@ -1,3 +0,0 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

View file

@ -1,3 +0,0 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

View file

@ -1,3 +0,0 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);

View file

@ -10,14 +10,3 @@
/dev/lwis-sensor-boitata u:object_r:lwis_device:s0
/dev/lwis-sensor-dokkaebi u:object_r:lwis_device:s0
/dev/lwis-sensor-taotie-uw u:object_r:lwis_device:s0
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/gnss-aidl-service_IGnssV2_ISlsiGnssV1 u:object_r:hal_gnss_default_exec:s0
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0

View file

@ -1,9 +0,0 @@
type gnss_check, domain;
type gnss_check_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnss_check);
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
set_prop(gnss_check, ctl_stop_prop);
set_prop(gnss_check, ctl_start_prop);

View file

@ -1,23 +0,0 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
# binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
get_prop(gnssd, bootanim_system_prop)
# Allow gnssd to obtain wakelock
wakelock_use(gnssd)
# Allow a base set of permissions required for network access.
net_domain(gnssd);

View file

@ -1,3 +0,0 @@
binder_call(hal_gnss_default, gnssd);
allow hal_gnss_default gnssd:unix_stream_socket connectto;

View file

@ -1 +0,0 @@
binder_call(rild, gnssd)

View file

@ -1,3 +0,0 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

View file

@ -1,3 +0,0 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

View file

@ -1,3 +0,0 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);