[ALPS03804621] [P Migration] Fix SEPolicy violated

[Detail] Remove read/write system_data and radio_data
         declaration

MTK-Commit-Id: 35a543208e84f95989f7f01f9c2ed766c5aab457

Change-Id: I135686e96cf214ca67523256aaa21e96f4fca3f0
CR-Id: ALPS03804621
Feature: DSDS (Dual SIM Dual Standby) Framework-Common Framework(RIL)
This commit is contained in:
Allen Chu 2020-01-18 09:30:03 +08:00
parent 1f7d244f89
commit 6c3fdf8a05
2 changed files with 12 additions and 10 deletions

View File

@ -45,12 +45,13 @@ allow rild bluetooth_efs_file:dir r_dir_perms;
# Allow access permission to dir/files
# (radio data/system data/proc/etc)
typeattribute rild data_between_core_and_vendor_violators;
allow rild radio_data_file:dir rw_dir_perms;
allow rild radio_data_file:file create_file_perms;
# Violate Android P rule
#allow rild radio_data_file:dir rw_dir_perms;
#allow rild radio_data_file:file create_file_perms;
allow rild sdcard_type:dir r_dir_perms;
allow rild system_data_file:dir r_dir_perms;
allow rild system_data_file:file r_file_perms;
# Violate Android P rule
#allow rild system_data_file:dir r_dir_perms;
#allow rild system_data_file:file r_file_perms;
allow rild system_file:file x_file_perms;
allow rild proc:file rw_file_perms;
allow rild proc_net:file w_file_perms;

View File

@ -52,12 +52,13 @@ allow mtkrild bluetooth_efs_file:dir r_dir_perms;
# Allow access permission to dir/files
# (radio data/system data/proc/etc)
typeattribute mtkrild data_between_core_and_vendor_violators;
allow mtkrild radio_data_file:dir rw_dir_perms;
allow mtkrild radio_data_file:file create_file_perms;
# Violate Android P rule
#allow mtkrild radio_data_file:dir rw_dir_perms;
#allow mtkrild radio_data_file:file create_file_perms;
allow mtkrild sdcard_type:dir r_dir_perms;
allow mtkrild system_data_file:dir r_dir_perms;
allow mtkrild system_data_file:file r_file_perms;
# Violate Android P rule
#allow mtkrild system_data_file:dir r_dir_perms;
#allow mtkrild system_data_file:file r_file_perms;
allow mtkrild system_file:file x_file_perms;
allow mtkrild proc:file rw_file_perms;
allow mtkrild proc_net:file w_file_perms;