Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit a6182010 authored by Sahil Sonar's avatar Sahil Sonar 💬
Browse files

[DNM] universal9810-common: sepolicy: Kill neverallow rules

parent d32ff0ae
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -18,7 +18,7 @@
/system/bin/hw/lineage\.touch@1\.0-service\.samsung u:object_r:hal_touch_samsung_exec:s0

# FastCharge HAL
/system/bin/hw/lineage\.fastcharge@1\.0-service\.9810 u:object_r:hal_lineage_fastcharge_default_exec:s0
#/system/bin/hw/lineage\.fastcharge@1\.0-service\.9810 u:object_r:hal_lineage_fastcharge_default_exec:s0

# Vendor overlay
/(product|system/product)/vendor_overlay/[0-9]+/etc(/.*)? u:object_r:vendor_configs_file:s0
+8 −8
Original line number Diff line number Diff line
type hal_lineage_fastcharge_default, coredomain, domain;
hal_server_domain(hal_lineage_fastcharge_default, hal_lineage_fastcharge)
type hal_lineage_fastcharge_default, domain;
#hal_server_domain(hal_lineage_fastcharge_default, hal_lineage_fastcharge)

type hal_lineage_fastcharge_default_exec, exec_type, system_file_type, file_type;
init_daemon_domain(hal_lineage_fastcharge_default)
#type hal_lineage_fastcharge_default_exec, exec_type, system_file_type, file_type;
#init_daemon_domain(hal_lineage_fastcharge_default)

allow hal_lineage_fastcharge_default sysfs_fastcharge:file rw_file_perms;
allow hal_lineage_fastcharge_default init:unix_stream_socket connectto;
allow hal_lineage_fastcharge_default property_socket:sock_file write;
allow hal_lineage_fastcharge_default vendor_default_prop:property_service set;
#allow hal_lineage_fastcharge_default sysfs_fastcharge:file rw_file_perms;
#allow hal_lineage_fastcharge_default init:unix_stream_socket connectto;
#allow hal_lineage_fastcharge_default property_socket:sock_file write;
#allow hal_lineage_fastcharge_default vendor_default_prop:property_service set;
+1 −1
Original line number Diff line number Diff line
type boot_prop, property_type;
set_prop(system_server, boot_prop);
#set_prop(system_server, boot_prop);

allow system_server sysfs_rtc:file rw_file_perms;