Snap for 11380007 from 0f6e4c85d9ac3e0131c22fe9ef465eb519bfafc0 to 24Q2-release

Change-Id: Iecb24f24baada609b931d823b6b12b4dbebe262f
This commit is contained in:
Android Build Coastguard Worker 2024-01-31 00:02:18 +00:00
commit 5da0bebe91
12 changed files with 88 additions and 0 deletions

View File

@ -23,3 +23,6 @@ wakelock_use(aocxd);
# add aocx service to the domain
add_service(aocxd, aocx);
# allow managing thread priority
allow aocxd self:global_capability_class_set sys_nice;

16
gps/lsi/s5400.mk Normal file
View File

@ -0,0 +1,16 @@
BOARD_VENDOR_SEPOLICY_DIRS += device/google/gs-common/gps/lsi/sepolicy
PRODUCT_SOONG_NAMESPACES += \
vendor/samsung_slsi/gps/s5400
PRODUCT_PACKAGES += \
android.hardware.location.gps.prebuilt.xml \
gnssd \
android.hardware.gnss-service \
ca.pem \
gnss_check.sh \
kepler.bin
ifneq (,$(filter userdebug eng, $(TARGET_BUILD_VARIANT)))
PRODUCT_VENDOR_PROPERTIES += vendor.gps.aol.enabled=true
endif

1
gps/lsi/sepolicy/file.te Normal file
View File

@ -0,0 +1 @@
type vendor_gps_file, file_type, data_file_type;

View File

@ -0,0 +1,12 @@
# GPS
/dev/gnss_ipc u:object_r:vendor_gnss_device:s0
/dev/gnss_boot u:object_r:vendor_gnss_device:s0
/dev/gnss_dump u:object_r:vendor_gnss_device:s0
/vendor/bin/hw/gnssd u:object_r:gnssd_exec:s0
/vendor/bin/hw/sctd u:object_r:sctd_exec:s0
/vendor/bin/hw/swcnd u:object_r:swcnd_exec:s0
/vendor/bin/hw/spad u:object_r:spad_exec:s0
/vendor/bin/hw/android.hardware.gnss-service u:object_r:hal_gnss_default_exec:s0
/vendor/bin/gnss_check\.sh u:object_r:gnss_check_exec:s0
# keep only one rule and use eGNSS one
# /data/vendor/gps(/.*)? u:object_r:vendor_gps_file:s0

View File

@ -0,0 +1,9 @@
type gnss_check, domain;
type gnss_check_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnss_check);
allow gnss_check vendor_toolbox_exec:file { execute_no_trans };
set_prop(gnss_check, ctl_stop_prop);
set_prop(gnss_check, ctl_start_prop);

26
gps/lsi/sepolicy/gnssd.te Normal file
View File

@ -0,0 +1,26 @@
type gnssd, domain;
type gnssd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(gnssd);
# Allow gnssd to access rild
binder_call(gnssd, rild);
binder_call(gnssd, hwservicemanager)
allow gnssd hal_exynos_rild_hwservice:hwservice_manager find;
allow gnssd radio_device:chr_file rw_file_perms;
# Allow gnssd to acess gnss device
allow gnssd vendor_gnss_device:chr_file rw_file_perms;
allow gnssd vendor_gps_file:dir create_dir_perms;
allow gnssd vendor_gps_file:file create_file_perms;
allow gnssd vendor_gps_file:fifo_file create_file_perms;
# Allow gnssd to obtain wakelock
wakelock_use(gnssd)
# Allow a base set of permissions required for network access.
net_domain(gnssd);
# Allow gnssd to get boot complete
get_prop(gnssd, bootanim_system_prop)
allow gnssd sysfs_soc:file r_file_perms;

View File

@ -0,0 +1,9 @@
allow hal_gnss_default fwk_sensor_service:service_manager find;
allow hal_gnss_default gnssd:unix_stream_socket connectto;
allow hal_gnss_default vendor_gps_file:dir create_dir_perms;
allow hal_gnss_default vendor_gps_file:file create_file_perms;
allow hal_gnss_default vendor_gps_file:fifo_file create_file_perms;
binder_call(hal_gnss_default, gnssd);
#Read GPS property
get_prop(hal_gnss_default, vendor_gps_prop)

1
gps/lsi/sepolicy/rild.te Normal file
View File

@ -0,0 +1 @@
binder_call(rild, gnssd)

3
gps/lsi/sepolicy/sctd.te Normal file
View File

@ -0,0 +1,3 @@
type sctd, domain;
type sctd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(sctd);

3
gps/lsi/sepolicy/spad.te Normal file
View File

@ -0,0 +1,3 @@
type spad, domain;
type spad_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(spad);

View File

@ -0,0 +1,3 @@
type swcnd, domain;
type swcnd_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(swcnd);

View File

@ -0,0 +1,2 @@
# gps vendor property
set_prop(vendor_init, vendor_gps_prop)