Fix compilation errors for a new SP
-Remove violating sepolicy rules -Several sepolicy rules are violating new neverallow rules -Rename mediacodec to hal_omx_server Change-Id: I92e46378092f14b7ceab9b946207f006ce0e2611
This commit is contained in:
		@@ -80,7 +80,7 @@ userdebug_or_eng(`
 | 
			
		||||
# allow adbd qti-testscripts:process dyntransition;
 | 
			
		||||
  #allow { domain -mediaextractor -mediacodec } qti-testscripts:unix_stream_socket connectto;
 | 
			
		||||
  allow domain qti-testscripts:fd use;
 | 
			
		||||
  allow { domain -mediaextractor -mediacodec -hal_configstore_server } qti-testscripts:unix_stream_socket { getattr getopt read write shutdown };
 | 
			
		||||
  allow { domain -mediaextractor -hal_omx_server -hal_configstore_server } qti-testscripts:unix_stream_socket { getattr getopt read write shutdown };
 | 
			
		||||
#  binder_call({ domain -init -netd }, qti-testscripts)
 | 
			
		||||
  allow domain qti-testscripts:fifo_file { write getattr };
 | 
			
		||||
  allow domain qti-testscripts:process sigchld;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/drmserver.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/drmserver.te
									
									
									
									
										vendored
									
									
								
							@@ -1,5 +1,5 @@
 | 
			
		||||
#Address denial logs for drm server accessing firmware file
 | 
			
		||||
r_dir_file(drmserver, firmware_file)
 | 
			
		||||
#r_dir_file(drmserver, firmware_file)
 | 
			
		||||
 | 
			
		||||
#Address denial logs for drm server accessing qseecom driver
 | 
			
		||||
allow drmserver tee_device:chr_file rw_file_perms;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/genfs_contexts
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/genfs_contexts
									
									
									
									
										vendored
									
									
								
							@@ -5,7 +5,7 @@ genfscon proc /ath_pktlog/cld                         u:object_r:proc_wifi_dbg:s
 | 
			
		||||
genfscon sysfs /android_touch                         u:object_r:sysfs_touch:s0
 | 
			
		||||
genfscon sysfs /devices/virtual/input/ftm4_touch      u:object_r:sysfs_touch:s0
 | 
			
		||||
 | 
			
		||||
genfscon sysfs /class/rfkill/rfkill0/state            u:object_r:sysfs_bluetooth_writable:s0
 | 
			
		||||
#genfscon sysfs /class/rfkill/rfkill0/state            u:object_r:sysfs_bluetooth_writable:s0
 | 
			
		||||
genfscon sysfs /kernel/irq_helper/irq_blacklist_on    u:object_r:sysfs_irqbalance:s0
 | 
			
		||||
 | 
			
		||||
genfscon sysfs /kernel/wcd_cpe0                                         u:object_r:sysfs_audio:s0
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/hal_tetheroffload_default.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/hal_tetheroffload_default.te
									
									
									
									
										vendored
									
									
								
							@@ -31,7 +31,7 @@ allow hal_tetheroffload_default ipacm_socket:sock_file w_file_perms;
 | 
			
		||||
allow hal_tetheroffload_default ipa_vendor_data_file:dir w_dir_perms;
 | 
			
		||||
allow hal_tetheroffload_default ipa_vendor_data_file:file create_file_perms;
 | 
			
		||||
 | 
			
		||||
add_hwservice(hal_tetheroffload_default, hal_tetheroffload_hwservice)
 | 
			
		||||
#add_hwservice(hal_tetheroffload_default, hal_tetheroffload_hwservice)
 | 
			
		||||
 | 
			
		||||
#diag
 | 
			
		||||
userdebug_or_eng(`
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/common/hwservice.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/common/hwservice.te
									
									
									
									
										vendored
									
									
								
							@@ -7,7 +7,7 @@ type hal_imsrtp_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_imscallinfo_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_ipacm_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_hbtp_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_perf_hwservice, hwservice_manager_type, untrusted_app_visible_hwservice;
 | 
			
		||||
type hal_perf_hwservice, hwservice_manager_type, untrusted_app_visible_hwservice_violators;
 | 
			
		||||
type hal_tui_comm_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_qdutils_disp_hwservice, hwservice_manager_type;
 | 
			
		||||
type hal_display_color_hwservice, hwservice_manager_type;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								vendor/common/ipacm.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								vendor/common/ipacm.te
									
									
									
									
										vendored
									
									
								
							@@ -39,5 +39,5 @@ allow hal_tetheroffload ipa_vendor_data_file:dir w_dir_perms;
 | 
			
		||||
allow hal_tetheroffload ipa_vendor_data_file:file create_file_perms;
 | 
			
		||||
 | 
			
		||||
# To register ipacm to hwbinder
 | 
			
		||||
add_hwservice(ipacm, hal_ipacm_hwservice)
 | 
			
		||||
binder_call(ipacm, system_server)
 | 
			
		||||
#add_hwservice(ipacm, hal_ipacm_hwservice)
 | 
			
		||||
#binder_call(ipacm, system_server)
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user