sepolicy: Add sepolicy rules for QSPM hal

Log:
E init: Could not start service 'qspmhal' as part of class 'hal':
File /vendor/bin/vendor.qti.qspmhal@1.0-service(labeled
"u:object_r:vendor_file:s0") has incorrect label or no domain transition
from u:r:init:s0 to another SELinux domain defined. Have you configured
your service correctly? https://source.android.com/security/selinux/device-policy#label_new_services_and_address_denials

[hal_camera_defualt] avc denied logs
avc:  denied  { find } for interface=vendor.qti.qspmhal::IQspmhal
sid=u:r:hal_camera_default:s0 pid=863 scontext=u:r:hal_camera_default:s0
tcontext=u:object_r:hal_qspmhal_hwservice:s0 tclass=hwservice_manager permissive=0

avc: denied { call } for comm="android.hardwar" scontext=u:r:hal_camera_default:s0
tcontext=u:r:hal_qspmhal_default:s0 tclass=binder permissive=0

[hidl_allocator_hwservice] avd denied logs
avc:  denied  { find } for interface=android.hidl.allocator::IAllocator
sid=u:r:hal_qspmhal_default:s0 pid=946 scontext=u:r:hal_qspmhal_default:s0
tcontext=u:object_r:hidl_allocator_hwservice:s0 tclass=hwservice_manager permissive=0

Bug: 155252147
Bug: 157915098
Test: GCA, check avc logs
Change-Id: If70b30f26471d308d22e23ed8c2a56053518cbdd
7 files changed
tree: 2ffa36ae91187fe43934d8daca16bcac0ab98d14
  1. private/
  2. public/
  3. tracking_denials/
  4. vendor/
  5. OWNERS
  6. redbull-sepolicy.mk