gps: refine iGNSS build system - sepolicy
Bug: 318310869 Bug: 315915958 Test: build pass and GPS function works Change-Id: Ie98482de964c8478f94886cd1494c6362e2c86d9
This commit is contained in:
parent
9b03fffd65
commit
13470b8cec
8 changed files with 0 additions and 56 deletions
11
vendor/file_contexts
vendored
11
vendor/file_contexts
vendored
|
@ -1,8 +1,3 @@
|
|||
# GPS
|
||||
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
|
||||
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
|
||||
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
|
||||
|
||||
# Devices
|
||||
/dev/lwis-act-cornerfolk u:object_r:lwis_device:s0
|
||||
/dev/lwis-act-jotnar u:object_r:lwis_device:s0
|
||||
|
@ -23,12 +18,6 @@
|
|||
/dev/lwis-tof-tarasque u:object_r:lwis_device:s0
|
||||
|
||||
# Services
|
||||
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
|
||||
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
|
||||
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
|
||||
/vendor/bin/hw/spad u:object_r:spad_exec:s0
|
||||
/vendor/bin/hw/gnss-aidl-service_IGnssV2_ISlsiGnssV1 u:object_r:hal_gnss_default_exec:s0
|
||||
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0
|
||||
/vendor/bin/init_thermal_config u:object_r:init_thermal_config_exec:s0
|
||||
# FPC AIDL HAL
|
||||
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint-service\.fpc42_fw49 u:object_r:hal_fingerprint_capacitance_exec:s0
|
||||
|
|
9
vendor/gnss_check.te
vendored
9
vendor/gnss_check.te
vendored
|
@ -1,9 +0,0 @@
|
|||
type gnss_check, domain;
|
||||
type gnss_check_exec, exec_type, vendor_file_type, file_type;
|
||||
|
||||
init_daemon_domain(gnss_check);
|
||||
|
||||
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
|
||||
|
||||
set_prop(gnss_check, ctl_stop_prop);
|
||||
set_prop(gnss_check, ctl_start_prop);
|
23
vendor/gnssd.te
vendored
23
vendor/gnssd.te
vendored
|
@ -1,23 +0,0 @@
|
|||
type gnssd, domain;
|
||||
type gnssd_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(gnssd);
|
||||
|
||||
# Allow gnssd to access rild
|
||||
binder_call(gnssd, rild);
|
||||
# binder_call(gnssd, hwservicemanager)
|
||||
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
|
||||
allow gnssd radio_device:chr_file rw_file_perms;
|
||||
|
||||
# Allow gnssd to acess gnss device
|
||||
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
|
||||
allow gnssd vendor_gps_file:dir create_dir_perms;
|
||||
allow gnssd vendor_gps_file:file create_file_perms;
|
||||
allow gnssd vendor_gps_file:fifo_file create_file_perms;
|
||||
|
||||
get_prop(gnssd, bootanim_system_prop)
|
||||
|
||||
# Allow gnssd to obtain wakelock
|
||||
wakelock_use(gnssd)
|
||||
|
||||
# Allow a base set of permissions required for network access.
|
||||
net_domain(gnssd);
|
3
vendor/hal_gnss_default.te
vendored
3
vendor/hal_gnss_default.te
vendored
|
@ -1,3 +0,0 @@
|
|||
binder_call(hal_gnss_default, gnssd);
|
||||
|
||||
allow hal_gnss_default gnssd:unix_stream_socket connectto;
|
1
vendor/rild.te
vendored
1
vendor/rild.te
vendored
|
@ -1 +0,0 @@
|
|||
binder_call(rild, gnssd)
|
3
vendor/sctd.te
vendored
3
vendor/sctd.te
vendored
|
@ -1,3 +0,0 @@
|
|||
type sctd, domain;
|
||||
type sctd_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(sctd);
|
3
vendor/spad.te
vendored
3
vendor/spad.te
vendored
|
@ -1,3 +0,0 @@
|
|||
type spad, domain;
|
||||
type spad_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(spad);
|
3
vendor/swcnd.te
vendored
3
vendor/swcnd.te
vendored
|
@ -1,3 +0,0 @@
|
|||
type swcnd, domain;
|
||||
type swcnd_exec, exec_type, vendor_file_type, file_type;
|
||||
init_daemon_domain(swcnd);
|
Loading…
Add table
Add a link
Reference in a new issue