Need to bring project forward to more recent snapshot of AOSP
Most recent known good manifest: https://github.com/96boards/aosp-known-good-manifests/blob/master/known-good/hikey960/2018-09-11_15:49:35-pinned-manifest.xml
Currently working to make it build.
Had to disable a bunch of selinux neverallow's, causing these errors during build: Will need to address these rules at some point, but first step is make it build. Second is make it work. Third step is make it right....
libsepol.report_failure: neverallow on line 27 of system/sepolicy/public/hal_neverallows.te (or line 16648 of policy.conf) violated by allow hal_gnss_default hal_gnss_default:udp_socket { io
ctl read write create bind };
libsepol.report_failure: neverallow on line 27 of system/sepolicy/public/hal_neverallows.te (or line 16648 of policy.conf) violated by allow hal_gnss_default hal_gnss_default:tcp_socket { re
ad write create connect };
libsepol.report_failure: neverallow on line 1008 of system/sepolicy/public/domain.te (or line 12146 of policy.conf) violated by allow swid shell_exec:file { execute execute_no_trans };
libsepol.report_failure: neverallow on line 1008 of system/sepolicy/public/domain.te (or line 12146 of policy.conf) violated by allow camd toolbox_exec:file { execute execute_no_trans };
libsepol.report_failure: neverallow on line 1008 of system/sepolicy/public/domain.te (or line 12146 of policy.conf) violated by allow swid toolbox_exec:file { execute execute_no_trans };
libsepol.report_failure: neverallow on line 1008 of system/sepolicy/public/domain.te (or line 12146 of policy.conf) violated by allow camd shell_exec:file { execute execute_no_trans };
libsepol.report_failure: neverallow on line 903 of system/sepolicy/public/domain.te (or line 11944 of policy.conf) violated by allow swid system_data_file:dir { ioctl read write lock append
map add_name remove_name open };
libsepol.report_failure: neverallow on line 875 of system/sepolicy/public/domain.te (or line 11897 of policy.conf) violated by allow hal_gnss_default gnss_data_file:dir { ioctl read write ge
tattr lock append map add_name remove_name search open };
libsepol.report_failure: neverallow on line 848 of system/sepolicy/public/domain.te (or line 11846 of policy.conf) violated by allow hal_gnss_default gnss_data_file:file { create setattr loc
k open };
libsepol.report_failure: neverallow on line 848 of system/sepolicy/public/domain.te (or line 11846 of policy.conf) violated by allow swid system_data_file:sock_file { create setattr relabelf
rom unlink };
libsepol.report_failure: neverallow on line 765 of system/sepolicy/public/domain.te (or line 11692 of policy.conf) violated by allow swid system_data_file:sock_file { create setattr relabelf
rom unlink };
libsepol.report_failure: neverallow on line 755 of system/sepolicy/public/domain.te (or line 11661 of policy.conf) violated by allow hal_gnss_default netd:unix_stream_socket { connectto };
libsepol.report_failure: neverallow on line 725 of system/sepolicy/public/domain.te (or line 11564 of policy.conf) violated by allow system_server swid:unix_stream_socket { connectto };
libsepol.report_failure: neverallow on line 725 of system/sepolicy/public/domain.te (or line 11564 of policy.conf) violated by allow system_app swid:unix_stream_socket { connectto };
libsepol.check_assertions: 14 neverallow failures occurred
Edited by Adam Serbinski