From e41e95e0eafe1d29a27864bf4cb42f2078dbc99c Mon Sep 17 00:00:00 2001 From: Inseob Kim Date: Tue, 13 Feb 2024 02:19:24 +0000 Subject: [PATCH] Revert^2 "Add 1000000.0 mapping file temporarily" 82126e9d7765c4c33605c8380e2f09e52f143009 Change-Id: Ia2ef237d9918532f24cd00688ae2bc15196123e9 --- Android.bp | 30 ++++++++++++++++++++++++++++++ Android.mk | 18 ++++++++++++++++++ 2 files changed, 48 insertions(+) diff --git a/Android.bp b/Android.bp index 88107cc97..1d8e5dd46 100644 --- a/Android.bp +++ b/Android.bp @@ -337,6 +337,36 @@ se_versioned_policy { product_specific: true, } +// HACK to support vendor blobs using 1000000.0 +// TODO(b/314010177): remove after new ToT (202404) fully propagates +se_versioned_policy { + name: "plat_mapping_file_1000000.0", + base: ":plat_pub_policy.cil", + mapping: true, + version: "1000000.0", + relative_install_path: "mapping", // install to /system/etc/selinux/mapping +} + +se_versioned_policy { + name: "system_ext_mapping_file_1000000.0", + base: ":system_ext_pub_policy.cil", + mapping: true, + version: "1000000.0", + filter_out: [":plat_mapping_file"], + relative_install_path: "mapping", // install to /system_ext/etc/selinux/mapping + system_ext_specific: true, +} + +se_versioned_policy { + name: "product_mapping_file_1000000.0", + base: ":pub_policy.cil", + mapping: true, + version: "1000000.0", + filter_out: [":plat_mapping_file", ":system_ext_mapping_file"], + relative_install_path: "mapping", // install to /product/etc/selinux/mapping + product_specific: true, +} + ////////////////////////////////// // vendor/odm sepolicy ////////////////////////////////// diff --git a/Android.mk b/Android.mk index fe6a77377..8a38682e5 100644 --- a/Android.mk +++ b/Android.mk @@ -210,6 +210,12 @@ LOCAL_REQUIRED_MODULES += \ plat_sepolicy.cil \ secilc \ +# HACK to support vendor blobs using 1000000.0 +# TODO(b/314010177): remove after new ToT (202404) fully propagates +ifneq (true,$(BOARD_API_LEVEL_FROZEN)) +LOCAL_REQUIRED_MODULES += plat_mapping_file_1000000.0 +endif + ifneq ($(PRODUCT_PRECOMPILED_SEPOLICY),false) LOCAL_REQUIRED_MODULES += plat_sepolicy_and_mapping.sha256 endif @@ -278,6 +284,12 @@ ifdef HAS_SYSTEM_EXT_PUBLIC_SEPOLICY LOCAL_REQUIRED_MODULES += \ system_ext_mapping_file +# HACK to support vendor blobs using 1000000.0 +# TODO(b/314010177): remove after new ToT (202404) fully propagates +ifneq (true,$(BOARD_API_LEVEL_FROZEN)) +LOCAL_REQUIRED_MODULES += system_ext_mapping_file_1000000.0 +endif + system_ext_compat_files := $(call build_policy, $(sepolicy_compat_files), $(SYSTEM_EXT_PRIVATE_POLICY)) LOCAL_REQUIRED_MODULES += $(addprefix system_ext_, $(notdir $(system_ext_compat_files))) @@ -326,6 +338,12 @@ ifdef HAS_PRODUCT_PUBLIC_SEPOLICY LOCAL_REQUIRED_MODULES += \ product_mapping_file +# HACK to support vendor blobs using 1000000.0 +# TODO(b/314010177): remove after new ToT (202404) fully propagates +ifneq (true,$(BOARD_API_LEVEL_FROZEN)) +LOCAL_REQUIRED_MODULES += product_mapping_file_1000000.0 +endif + product_compat_files := $(call build_policy, $(sepolicy_compat_files), $(PRODUCT_PRIVATE_POLICY)) LOCAL_REQUIRED_MODULES += $(addprefix product_, $(notdir $(product_compat_files)))