Fix compile issues

Change-Id: I26fd2e0ad503bbdd4235b2120737feb9f5711a0b
This commit is contained in:
Sridhar Parasuram
2018-01-03 09:14:37 -08:00
parent 7eaf0fb2b2
commit e479b0cee6
6 changed files with 4 additions and 29 deletions

View File

@@ -1,3 +1 @@
/system/bin/folio_daemon u:object_r:folio_daemon_exec:s0
/data/misc/elabel(/.*)? u:object_r:elabel_data_file:s0
/system/bin/init\.elabel\.sh u:object_r:init_elabel_exec:s0

View File

@@ -1 +0,0 @@
binder_call(system_server, folio_daemon)

2
vendor/file.te vendored
View File

@@ -75,3 +75,5 @@ type sysfs_data, fs_type, sysfs_type;
type sysfs_diag, fs_type, sysfs_type;
type hexagon_halide_file, vendor_file_type, file_type;
type bt_firmware_file, fs_type, contextmount_type;

View File

@@ -115,7 +115,8 @@
# files in /vendor
/vendor/firmware(/.*)? u:object_r:vendor_firmware_file:s0
/vendor/bin/hw/android\.hardware\.dumpstate@1\.0-service.crosshatch u:object_r:hal_dumpstate_impl_exec:s0
/bt_firmware(/.*)? u:object_r:bt_firmware_file:s0
/vendor/bin/hw/android\.hardware\.vr@1\.0-service.crosshatch u:object_r:hal_vr_default_exec:s0
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:hal_fingerprint_default_exec:s0
/vendor/bin/perfd u:object_r:perfd_exec:s0
@@ -137,8 +138,6 @@
/vendor/bin/netmgrd u:object_r:netmgrd_exec:s0
/vendor/bin/port-bridge u:object_r:port-bridge_exec:s0
/vendor/bin/qti u:object_r:qti_exec:s0
/vendor/bin/ramdump u:object_r:ramdump_exec:s0
/vendor/bin/smlog_dump u:object_r:smlog_dump_exec:s0
/vendor/bin/wcnss_filter u:object_r:wcnss_filter_exec:s0
/vendor/bin/loc_launcher u:object_r:location_exec:s0
/vendor/bin/lowi-server u:object_r:location_exec:s0
@@ -151,7 +150,6 @@
/vendor/bin/ipacm-diag u:object_r:hal_tetheroffload_default_exec:s0
/vendor/bin/qmuxd u:object_r:qmuxd_exec:s0
/vendor/bin/cnd u:object_r:cnd_exec:s0
/vendor/bin/hw/android\.hardware\.oemlock@1\.0-service u:object_r:hal_oemlock_default_exec:s0
/vendor/bin/oemlock_provision u:object_r:hal_bootctl_default_exec:s0
/vendor/bin/oemlock-bridge u:object_r:hal_bootctl_default_exec:s0
/vendor/bin/hw/android\.hardware\.usb@1\.1-service.crosshatch u:object_r:hal_usb_default_exec:s0
@@ -172,7 +170,6 @@
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service-qti u:object_r:hal_gatekeeper_qti_exec:s0
/vendor/bin/hw/android\.hardware\.gnss@1\.0-service-qti u:object_r:hal_gnss_qti_exec:s0
/vendor/bin/hw/android\.hardware\.bluetooth@1\.0-service-qti u:object_r:hal_bluetooth_default_exec:s0
/vendor/bin/hw/citadeld u:object_r:citadeld_exec:s0
###############################################
# same-process HAL files and their dependencies

4
vendor/rild.te vendored
View File

@@ -19,9 +19,5 @@ allow rild self:socket ioctl;
allowxperm rild self:socket ioctl msm_sock_ipc_ioctls;
allow rild time_daemon:unix_stream_socket connectto;
userdebug_or_eng(`
domain_auto_trans(rild, smlog_dump_exec, smlog_dump)
')
allow rild radio_vendor_data_file:dir rw_dir_perms;
allow rild radio_vendor_data_file:file create_file_perms;

17
vendor/seapp_contexts vendored
View File

@@ -1,26 +1,9 @@
user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_app_data_file
user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFrom=all
user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=all
#Add new domain for DataServices
#TODO Remove user "system" when b/38043081 is resolved
user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file
# The default domain for tango_core process
user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user
user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user
# A fallback in case tango_core is missing something critical that untrusted_app provides
user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=user
# Hardware Info Collection
user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_data_file levelFrom=user
# Use a custom domain for GoogleCamera, to allow for Hexagon DSP access
user=_app seinfo=google name=com.google.android.GoogleCamera domain=google_camera_app type=app_data_file levelFrom=user
#Needed for time service apk
user=_app seinfo=platform name=com.qualcomm.timeservice domain=timeservice_app type=app_data_file
# Domain for easelservice app
user=_app seinfo=easel name=com.google.android.imaging.easel.service domain=easelservice_app type=app_data_file levelFrom=user