[Solution] Remove SEPolicy rules to fix high risk sepolicy issues for stp_dump and wmt_loader MTK-Commit-Id: 00ea2a4d222547ba0872c93521de79b8cb26673f Change-Id: I8b31383f55f1075488a55c406ecd08bd5b3249af Signed-off-by: Robbin Chiu <robbin.chiu@mediatek.com> CR-Id: ALPS04763245 Feature: [Module]WMT Driver
31 lines
947 B
Plaintext
31 lines
947 B
Plaintext
# ==============================================
|
|
# Policy File of /system/bin/wmt_loader Executable File
|
|
|
|
|
|
# ==============================================
|
|
# Type Declaration
|
|
# ==============================================
|
|
type wmt_loader ,domain;
|
|
type wmt_loader_exec , exec_type, file_type, vendor_file_type;
|
|
|
|
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
init_daemon_domain(wmt_loader)
|
|
|
|
allow wmt_loader self:capability chown;
|
|
|
|
# Set the property
|
|
set_prop(wmt_loader, wmt_prop)
|
|
|
|
# add ioctl/open/read/write permission for wmt_loader with /dev/wmtdetect
|
|
allow wmt_loader wmtdetect_device:chr_file rw_file_perms;
|
|
|
|
# add ioctl/open/read/write permission for wmt_loader with /dev/stpwm
|
|
allow wmt_loader stpwmt_device:chr_file rw_file_perms;
|
|
allow wmt_loader devpts:chr_file rwx_file_perms;
|
|
|
|
# Date: 2019/06/14
|
|
# Operation : Migration
|
|
allow wmt_loader proc_wmtdbg:file setattr;
|