Fix compile issues
Change-Id: I26fd2e0ad503bbdd4235b2120737feb9f5711a0b
This commit is contained in:
		@@ -1,3 +1 @@
 | 
			
		||||
/system/bin/folio_daemon        u:object_r:folio_daemon_exec:s0
 | 
			
		||||
/data/misc/elabel(/.*)?         u:object_r:elabel_data_file:s0
 | 
			
		||||
/system/bin/init\.elabel\.sh    u:object_r:init_elabel_exec:s0
 | 
			
		||||
 
 | 
			
		||||
@@ -1 +0,0 @@
 | 
			
		||||
binder_call(system_server, folio_daemon)
 | 
			
		||||
							
								
								
									
										2
									
								
								vendor/file.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/file.te
									
									
									
									
										vendored
									
									
								
							@@ -75,3 +75,5 @@ type sysfs_data, fs_type, sysfs_type;
 | 
			
		||||
type sysfs_diag, fs_type, sysfs_type;
 | 
			
		||||
 | 
			
		||||
type hexagon_halide_file, vendor_file_type, file_type;
 | 
			
		||||
 | 
			
		||||
type bt_firmware_file, fs_type, contextmount_type;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										7
									
								
								vendor/file_contexts
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										7
									
								
								vendor/file_contexts
									
									
									
									
										vendored
									
									
								
							@@ -115,7 +115,8 @@
 | 
			
		||||
 | 
			
		||||
# files in /vendor
 | 
			
		||||
/vendor/firmware(/.*)?          u:object_r:vendor_firmware_file:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.dumpstate@1\.0-service.crosshatch      u:object_r:hal_dumpstate_impl_exec:s0
 | 
			
		||||
/bt_firmware(/.*)?              u:object_r:bt_firmware_file:s0
 | 
			
		||||
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.vr@1\.0-service.crosshatch      u:object_r:hal_vr_default_exec:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.biometrics\.fingerprint@2\.1-service\.fpc u:object_r:hal_fingerprint_default_exec:s0
 | 
			
		||||
/vendor/bin/perfd               u:object_r:perfd_exec:s0
 | 
			
		||||
@@ -137,8 +138,6 @@
 | 
			
		||||
/vendor/bin/netmgrd             u:object_r:netmgrd_exec:s0
 | 
			
		||||
/vendor/bin/port-bridge         u:object_r:port-bridge_exec:s0
 | 
			
		||||
/vendor/bin/qti                 u:object_r:qti_exec:s0
 | 
			
		||||
/vendor/bin/ramdump             u:object_r:ramdump_exec:s0
 | 
			
		||||
/vendor/bin/smlog_dump          u:object_r:smlog_dump_exec:s0
 | 
			
		||||
/vendor/bin/wcnss_filter        u:object_r:wcnss_filter_exec:s0
 | 
			
		||||
/vendor/bin/loc_launcher        u:object_r:location_exec:s0
 | 
			
		||||
/vendor/bin/lowi-server         u:object_r:location_exec:s0
 | 
			
		||||
@@ -151,7 +150,6 @@
 | 
			
		||||
/vendor/bin/ipacm-diag          u:object_r:hal_tetheroffload_default_exec:s0
 | 
			
		||||
/vendor/bin/qmuxd               u:object_r:qmuxd_exec:s0
 | 
			
		||||
/vendor/bin/cnd                 u:object_r:cnd_exec:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.oemlock@1\.0-service               u:object_r:hal_oemlock_default_exec:s0
 | 
			
		||||
/vendor/bin/oemlock_provision   u:object_r:hal_bootctl_default_exec:s0
 | 
			
		||||
/vendor/bin/oemlock-bridge      u:object_r:hal_bootctl_default_exec:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.usb@1\.1-service.crosshatch             u:object_r:hal_usb_default_exec:s0
 | 
			
		||||
@@ -172,7 +170,6 @@
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.gatekeeper@1\.0-service-qti        u:object_r:hal_gatekeeper_qti_exec:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.gnss@1\.0-service-qti              u:object_r:hal_gnss_qti_exec:s0
 | 
			
		||||
/vendor/bin/hw/android\.hardware\.bluetooth@1\.0-service-qti         u:object_r:hal_bluetooth_default_exec:s0
 | 
			
		||||
/vendor/bin/hw/citadeld                                              u:object_r:citadeld_exec:s0
 | 
			
		||||
 | 
			
		||||
###############################################
 | 
			
		||||
# same-process HAL files and their dependencies
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										4
									
								
								vendor/rild.te
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										4
									
								
								vendor/rild.te
									
									
									
									
										vendored
									
									
								
							@@ -19,9 +19,5 @@ allow rild self:socket ioctl;
 | 
			
		||||
allowxperm rild self:socket ioctl msm_sock_ipc_ioctls;
 | 
			
		||||
allow rild time_daemon:unix_stream_socket connectto;
 | 
			
		||||
 | 
			
		||||
userdebug_or_eng(`
 | 
			
		||||
  domain_auto_trans(rild, smlog_dump_exec, smlog_dump)
 | 
			
		||||
')
 | 
			
		||||
 | 
			
		||||
allow rild radio_vendor_data_file:dir rw_dir_perms;
 | 
			
		||||
allow rild radio_vendor_data_file:file create_file_perms;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										17
									
								
								vendor/seapp_contexts
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										17
									
								
								vendor/seapp_contexts
									
									
									
									
										vendored
									
									
								
							@@ -1,26 +1,9 @@
 | 
			
		||||
user=system seinfo=platform name=com.google.SSRestartDetector domain=ssr_detector_app type=system_app_data_file
 | 
			
		||||
user=_app seinfo=platform name=com.android.pixellogger domain=logger_app type=app_data_file levelFrom=all
 | 
			
		||||
user=_app seinfo=platform name=com.android.ramdump domain=ramdump_app type=app_data_file levelFrom=all
 | 
			
		||||
 | 
			
		||||
#Add new domain for DataServices
 | 
			
		||||
#TODO Remove user "system" when b/38043081 is resolved
 | 
			
		||||
user=system seinfo=platform name=.dataservices domain=dataservice_app type=system_app_data_file
 | 
			
		||||
 | 
			
		||||
# The default domain for tango_core process
 | 
			
		||||
user=_app seinfo=tango name=com.google.tango domain=tango_core type=app_data_file levelFrom=user
 | 
			
		||||
user=_app seinfo=tango name=com.google.tango.* domain=tango_core type=app_data_file levelFrom=user
 | 
			
		||||
 | 
			
		||||
# A fallback in case tango_core is missing something critical that untrusted_app provides
 | 
			
		||||
user=_app seinfo=tango name=com.google.tango:app domain=untrusted_app type=app_data_file levelFrom=user
 | 
			
		||||
 | 
			
		||||
# Hardware Info Collection
 | 
			
		||||
user=_app seinfo=platform name=com.google.android.hardwareinfo domain=hardware_info_app type=app_data_file levelFrom=user
 | 
			
		||||
 | 
			
		||||
# Use a custom domain for GoogleCamera, to allow for Hexagon DSP access
 | 
			
		||||
user=_app seinfo=google name=com.google.android.GoogleCamera domain=google_camera_app type=app_data_file levelFrom=user
 | 
			
		||||
 | 
			
		||||
#Needed for time service apk
 | 
			
		||||
user=_app seinfo=platform name=com.qualcomm.timeservice domain=timeservice_app type=app_data_file
 | 
			
		||||
 | 
			
		||||
# Domain for easelservice app
 | 
			
		||||
user=_app seinfo=easel name=com.google.android.imaging.easel.service domain=easelservice_app type=app_data_file levelFrom=user
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user