From 23aae46327456ee96074fe6d0480fc2eb358d4d0 Mon Sep 17 00:00:00 2001 From: Robbin Chiu Date: Sat, 18 Jan 2020 09:44:01 +0800 Subject: [PATCH] [ALPS03897470] Fix SEPolicy violation [Solution] Fix SEPolicy violation for stp_dump MTK-Commit-Id: e8a098656a9a1a2e1ad951a5ffa640baa0198d33 Change-Id: I68915511ad84819ddf155a7f4cd8fd8badac985b CR-Id: ALPS03897470 Feature: [Module]WMT Driver Signed-off-by: Robbin Chiu --- non_plat/stp_dump3.te | 7 ------- 1 file changed, 7 deletions(-) diff --git a/non_plat/stp_dump3.te b/non_plat/stp_dump3.te index 5262990..a978ed9 100644 --- a/non_plat/stp_dump3.te +++ b/non_plat/stp_dump3.te @@ -20,16 +20,9 @@ type stp_dump3 ,domain; # ============================================== # MTK Policy Rule # ============================================== -file_type_auto_trans(stp_dump3,system_data_file,stp_dump_data_file) #allow stp_dump3 self:capability { net_admin fowner chown fsetid dac_override }; allow stp_dump3 self:netlink_socket { read write getattr bind create setopt }; allow stp_dump3 self:netlink_generic_socket { read write getattr bind create setopt }; -#allow stp_dump3 media_rw_data_file:sock_file { write create unlink setattr }; -typeattribute stp_dump3 data_between_core_and_vendor_violators; -allow stp_dump3 media_rw_data_file:dir { add_name setattr }; -allow stp_dump3 media_rw_data_file:dir rmdir; -allow stp_dump3 media_rw_data_file:dir { open read write create setattr getattr add_name remove_name search}; -allow stp_dump3 media_rw_data_file:file { open read write create setattr getattr append unlink rename}; allow stp_dump3 wmtdetect_device:chr_file { read write ioctl open }; allow stp_dump3 stpwmt_device:chr_file { read write ioctl open }; allow stp_dump3 tmpfs:lnk_file r_file_perms;