Remove 1000000.0 mapping files
It's a workaround for -with-phones branch and redundant now. Test: TH Change-Id: I0ec9e00a8ee1e3c929f33cbba3b8339c7e42b885
This commit is contained in:
parent
60f55289f8
commit
23c543c0ed
2 changed files with 0 additions and 51 deletions
33
Android.bp
33
Android.bp
|
@ -390,39 +390,6 @@ se_versioned_policy {
|
||||||
product_specific: true,
|
product_specific: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
// HACK to support vendor blobs using 1000000.0
|
|
||||||
// TODO(b/314010177): remove after new ToT (202404) fully propagates
|
|
||||||
se_versioned_policy {
|
|
||||||
name: "plat_mapping_file_1000000.0",
|
|
||||||
base: ":plat_pub_policy.cil",
|
|
||||||
mapping: true,
|
|
||||||
version: "1000000.0",
|
|
||||||
relative_install_path: "mapping", // install to /system/etc/selinux/mapping
|
|
||||||
}
|
|
||||||
|
|
||||||
se_versioned_policy {
|
|
||||||
name: "system_ext_mapping_file_1000000.0",
|
|
||||||
base: ":system_ext_pub_policy.cil",
|
|
||||||
mapping: true,
|
|
||||||
version: "1000000.0",
|
|
||||||
filter_out: [":plat_mapping_file"],
|
|
||||||
relative_install_path: "mapping", // install to /system_ext/etc/selinux/mapping
|
|
||||||
system_ext_specific: true,
|
|
||||||
}
|
|
||||||
|
|
||||||
se_versioned_policy {
|
|
||||||
name: "product_mapping_file_1000000.0",
|
|
||||||
base: ":pub_policy.cil",
|
|
||||||
mapping: true,
|
|
||||||
version: "1000000.0",
|
|
||||||
filter_out: [
|
|
||||||
":plat_mapping_file",
|
|
||||||
":system_ext_mapping_file",
|
|
||||||
],
|
|
||||||
relative_install_path: "mapping", // install to /product/etc/selinux/mapping
|
|
||||||
product_specific: true,
|
|
||||||
}
|
|
||||||
|
|
||||||
//////////////////////////////////
|
//////////////////////////////////
|
||||||
// vendor/odm sepolicy
|
// vendor/odm sepolicy
|
||||||
//////////////////////////////////
|
//////////////////////////////////
|
||||||
|
|
18
Android.mk
18
Android.mk
|
@ -210,12 +210,6 @@ LOCAL_REQUIRED_MODULES += \
|
||||||
plat_sepolicy.cil \
|
plat_sepolicy.cil \
|
||||||
secilc \
|
secilc \
|
||||||
|
|
||||||
# HACK to support vendor blobs using 1000000.0
|
|
||||||
# TODO(b/314010177): remove after new ToT (202404) fully propagates
|
|
||||||
ifneq (true,$(RELEASE_BOARD_API_LEVEL_FROZEN))
|
|
||||||
LOCAL_REQUIRED_MODULES += plat_mapping_file_1000000.0
|
|
||||||
endif
|
|
||||||
|
|
||||||
ifneq ($(PRODUCT_PRECOMPILED_SEPOLICY),false)
|
ifneq ($(PRODUCT_PRECOMPILED_SEPOLICY),false)
|
||||||
LOCAL_REQUIRED_MODULES += plat_sepolicy_and_mapping.sha256
|
LOCAL_REQUIRED_MODULES += plat_sepolicy_and_mapping.sha256
|
||||||
endif
|
endif
|
||||||
|
@ -284,12 +278,6 @@ ifdef HAS_SYSTEM_EXT_PUBLIC_SEPOLICY
|
||||||
LOCAL_REQUIRED_MODULES += \
|
LOCAL_REQUIRED_MODULES += \
|
||||||
system_ext_mapping_file
|
system_ext_mapping_file
|
||||||
|
|
||||||
# HACK to support vendor blobs using 1000000.0
|
|
||||||
# TODO(b/314010177): remove after new ToT (202404) fully propagates
|
|
||||||
ifneq (true,$(RELEASE_BOARD_API_LEVEL_FROZEN))
|
|
||||||
LOCAL_REQUIRED_MODULES += system_ext_mapping_file_1000000.0
|
|
||||||
endif
|
|
||||||
|
|
||||||
system_ext_compat_files := $(call build_policy, $(sepolicy_compat_files), $(SYSTEM_EXT_PRIVATE_POLICY))
|
system_ext_compat_files := $(call build_policy, $(sepolicy_compat_files), $(SYSTEM_EXT_PRIVATE_POLICY))
|
||||||
|
|
||||||
LOCAL_REQUIRED_MODULES += $(addprefix system_ext_, $(notdir $(system_ext_compat_files)))
|
LOCAL_REQUIRED_MODULES += $(addprefix system_ext_, $(notdir $(system_ext_compat_files)))
|
||||||
|
@ -338,12 +326,6 @@ ifdef HAS_PRODUCT_PUBLIC_SEPOLICY
|
||||||
LOCAL_REQUIRED_MODULES += \
|
LOCAL_REQUIRED_MODULES += \
|
||||||
product_mapping_file
|
product_mapping_file
|
||||||
|
|
||||||
# HACK to support vendor blobs using 1000000.0
|
|
||||||
# TODO(b/314010177): remove after new ToT (202404) fully propagates
|
|
||||||
ifneq (true,$(RELEASE_BOARD_API_LEVEL_FROZEN))
|
|
||||||
LOCAL_REQUIRED_MODULES += product_mapping_file_1000000.0
|
|
||||||
endif
|
|
||||||
|
|
||||||
product_compat_files := $(call build_policy, $(sepolicy_compat_files), $(PRODUCT_PRIVATE_POLICY))
|
product_compat_files := $(call build_policy, $(sepolicy_compat_files), $(PRODUCT_PRIVATE_POLICY))
|
||||||
|
|
||||||
LOCAL_REQUIRED_MODULES += $(addprefix product_, $(notdir $(product_compat_files)))
|
LOCAL_REQUIRED_MODULES += $(addprefix product_, $(notdir $(product_compat_files)))
|
||||||
|
|
Loading…
Reference in a new issue