[ALPS03897470] Fix SEPolicy violation

[Solution]
Fix SEPolicy violation for stp_dump

MTK-Commit-Id: e8a098656a9a1a2e1ad951a5ffa640baa0198d33

Change-Id: I68915511ad84819ddf155a7f4cd8fd8badac985b
CR-Id: ALPS03897470
Feature: [Module]WMT Driver
Signed-off-by: Robbin Chiu <robbin.chiu@mediatek.com>
This commit is contained in:
Robbin Chiu 2020-01-18 09:44:01 +08:00
parent dae8e38414
commit 23aae46327

View File

@ -20,16 +20,9 @@ type stp_dump3 ,domain;
# ============================================== # ==============================================
# MTK Policy Rule # MTK Policy Rule
# ============================================== # ==============================================
file_type_auto_trans(stp_dump3,system_data_file,stp_dump_data_file)
#allow stp_dump3 self:capability { net_admin fowner chown fsetid dac_override }; #allow stp_dump3 self:capability { net_admin fowner chown fsetid dac_override };
allow stp_dump3 self:netlink_socket { read write getattr bind create setopt }; allow stp_dump3 self:netlink_socket { read write getattr bind create setopt };
allow stp_dump3 self:netlink_generic_socket { read write getattr bind create setopt }; allow stp_dump3 self:netlink_generic_socket { read write getattr bind create setopt };
#allow stp_dump3 media_rw_data_file:sock_file { write create unlink setattr };
typeattribute stp_dump3 data_between_core_and_vendor_violators;
allow stp_dump3 media_rw_data_file:dir { add_name setattr };
allow stp_dump3 media_rw_data_file:dir rmdir;
allow stp_dump3 media_rw_data_file:dir { open read write create setattr getattr add_name remove_name search};
allow stp_dump3 media_rw_data_file:file { open read write create setattr getattr append unlink rename};
allow stp_dump3 wmtdetect_device:chr_file { read write ioctl open }; allow stp_dump3 wmtdetect_device:chr_file { read write ioctl open };
allow stp_dump3 stpwmt_device:chr_file { read write ioctl open }; allow stp_dump3 stpwmt_device:chr_file { read write ioctl open };
allow stp_dump3 tmpfs:lnk_file r_file_perms; allow stp_dump3 tmpfs:lnk_file r_file_perms;