From b544b15e6864b2f310b7cea507e67d46991bd543 Mon Sep 17 00:00:00 2001 From: Pierre-Hugues Husson Date: Tue, 18 Sep 2018 11:16:19 +0200 Subject: [PATCH] Get back to allowing "rild" universally This requires to drop a checkpolicy, because checkpolicy doesn't allow multiple identical domains definition, and "rild" will be defined both in system and vendor. This isn't optimal, but that's still the best solution I've found. --- base.mk | 1 + sepolicy/qualcomm.te | 5 ++--- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/base.mk b/base.mk index c7d408f..d1f002d 100644 --- a/base.mk +++ b/base.mk @@ -92,3 +92,4 @@ PRODUCT_COPY_FILES += \ device/phh/treble/files/samsung-sec_touchscreen.kl:system/phh/samsung-sec_touchscreen.kl \ device/phh/treble/files/oneplus6-synaptics_s3320.kl:system/phh/oneplus6-synaptics_s3320.kl \ +SELINUX_IGNORE_NEVERALLOWS := true diff --git a/sepolicy/qualcomm.te b/sepolicy/qualcomm.te index 9774d76..dcdf462 100644 --- a/sepolicy/qualcomm.te +++ b/sepolicy/qualcomm.te @@ -1,9 +1,8 @@ -attribute rild_26_0; -attribute rild_27_0; +type rild, domain; #me.phh.treble.qti.audio is system-signed allow system_app hal_telephony_hwservice:hwservice_manager { find }; -allow { rild_26_0 rild_27_0 system_app } { rild_26_0 rild_27_0 system_app }:binder { call transfer }; +allow { rild system_app } { rild system_app }:binder { call transfer }; #Pixel 1 type vnd_qcril_audio_hwservice, hwservice_manager_type;