diff --git a/sepolicy/private/audio_parameter_service.te b/sepolicy/private/audio_parameter_service.te index 3d3c8ec..1f8e174 100644 --- a/sepolicy/private/audio_parameter_service.te +++ b/sepolicy/private/audio_parameter_service.te @@ -5,5 +5,4 @@ init_daemon_domain(audio_parameter_service) hal_client_domain(audio_parameter_service, hal_audio) -get_prop(audio_parameter_service, vendor_call_prop) set_prop(audio_parameter_service, vendor_call_prop) diff --git a/sepolicy/vendor/hal_bluetooth_default.te b/sepolicy/vendor/hal_bluetooth_default.te index bea2785..485f365 100644 --- a/sepolicy/vendor/hal_bluetooth_default.te +++ b/sepolicy/vendor/hal_bluetooth_default.te @@ -3,7 +3,6 @@ allow hal_bluetooth_default bluetooth_efs_file:file { read open getattr }; allow hal_bluetooth_default efs_file:dir search; set_prop(hal_bluetooth_default, vendor_bluetooth_prop) -get_prop(hal_bluetooth_default, vendor_bluetooth_prop) get_prop(hal_bluetooth_default, exported_bluetooth_prop) allow hal_bluetooth_default self:file { read getattr map open }; diff --git a/sepolicy/vendor/macloader.te b/sepolicy/vendor/macloader.te index 39f03e5..0a12d27 100644 --- a/sepolicy/vendor/macloader.te +++ b/sepolicy/vendor/macloader.te @@ -41,7 +41,5 @@ allow macloader sysfs_wifi:file r_file_perms; # /sys/kernel/boot_wlan allow macloader sysfs_wifi_writable:file { write open }; -set_prop(macloader, vendor_wifi_prop) - # Don't set ro.vendor.wifi.sap.interface dontaudit macloader vendor_default_prop:property_service set; diff --git a/sepolicy/vendor/rild.te b/sepolicy/vendor/rild.te index 7f87c2b..9b4a529 100644 --- a/sepolicy/vendor/rild.te +++ b/sepolicy/vendor/rild.te @@ -4,7 +4,6 @@ get_prop(rild, vendor_radio_prop) get_prop(rild, radio_prop) set_prop(rild, vendor_call_prop) -get_prop(rild, vendor_call_prop) allow rild block_device:dir search; allow rild mnt_vendor_file:dir { getattr search }; diff --git a/sepolicy/vendor/secril_config_svc.te b/sepolicy/vendor/secril_config_svc.te index f1bd52b..0c42912 100644 --- a/sepolicy/vendor/secril_config_svc.te +++ b/sepolicy/vendor/secril_config_svc.te @@ -22,5 +22,3 @@ allow secril_config_svc efs_file:file r_file_perms; get_prop(secril_config_svc, exported_system_prop) set_prop(secril_config_svc, radio_prop) set_prop(secril_config_svc, vendor_radio_prop) - -get_prop(secril_config_svc, vendor_radio_prop)