gps: use common gps sepolicy

Bug: 323105941
Test: build pass and device boot up without problem
Change-Id: Ic680c41cd1726ab998d8d8e9f58aaad7e2734cb2
This commit is contained in:
Wayne Lin 2024-01-31 16:17:31 +08:00
parent a2f203e90f
commit 5ea33555b2
9 changed files with 0 additions and 63 deletions

2
vendor/file.te vendored
View file

@ -1,2 +0,0 @@
type sysfs_modem_state, sysfs_type, fs_type;
type sysfs_gps, sysfs_type, fs_type;

14
vendor/file_contexts vendored
View file

@ -8,17 +8,3 @@
/dev/lwis-sensor-barghest u:object_r:lwis_device:s0 /dev/lwis-sensor-barghest u:object_r:lwis_device:s0
/dev/lwis-sensor-leshen u:object_r:lwis_device:s0 /dev/lwis-sensor-leshen u:object_r:lwis_device:s0
/dev/lwis-sensor-leshen-uw u:object_r:lwis_device:s0 /dev/lwis-sensor-leshen-uw u:object_r:lwis_device:s0
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/android.hardware.gnss-service u:object_r:hal_gnss_default_exec:s0
# gnss/gps data/log files
/data/vendor/gps(/.*)? u:object_r:vendor_gps_file:s0

View file

@ -1,2 +0,0 @@
# gps coredump node
genfscon sysfs /devices/platform/gnssif/coredump u:object_r:sysfs_gps:s0

28
vendor/gnssd.te vendored
View file

@ -1,28 +0,0 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
# Allow gnssd to obtain wakelock
wakelock_use(gnssd);
# Allow a base set of permissions required for network access.
net_domain(gnssd);
# Allow gnssd to get boot complete
get_prop(gnssd, bootanim_system_prop);
allow gnssd sysfs_soc:file r_file_perms;
allow gnssd sysfs_gps:file rw_file_perms;

View file

@ -1,7 +0,0 @@
allow hal_gnss_default fwk_sensor_service:service_manager find;
allow hal_gnss_default gnssd:unix_stream_socket connectto;
allow hal_gnss_default vendor_gps_file:dir create_dir_perms;
allow hal_gnss_default vendor_gps_file:file create_file_perms;
allow hal_gnss_default vendor_gps_file:fifo_file create_file_perms;
allow hal_gnss_default sysfs_gps:file rw_file_perms;

1
vendor/rild.te vendored
View file

@ -1 +0,0 @@
binder_call(rild, gnssd)

3
vendor/sctd.te vendored
View file

@ -1,3 +0,0 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

3
vendor/spad.te vendored
View file

@ -1,3 +0,0 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

3
vendor/swcnd.te vendored
View file

@ -1,3 +0,0 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);