diff options
| author | Mister Oyster <oysterized@gmail.com> | 2017-01-02 12:44:35 +0100 |
|---|---|---|
| committer | Mister Oyster <oysterized@gmail.com> | 2017-01-02 12:44:35 +0100 |
| commit | a184d985bf43d3fe6eeba971bc6b32f79ea38b37 (patch) | |
| tree | 6f6e56e090777cc149bc1ab39e5987cc2b03e867 /sepolicy/wmt_loader.te | |
initial releasecm-13.0
Diffstat (limited to 'sepolicy/wmt_loader.te')
| -rw-r--r-- | sepolicy/wmt_loader.te | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/sepolicy/wmt_loader.te b/sepolicy/wmt_loader.te new file mode 100644 index 0000000..6a2fede --- /dev/null +++ b/sepolicy/wmt_loader.te @@ -0,0 +1,32 @@ +# ============================================== +# Policy File of /system/binwmt_loader Executable File + + +# ============================================== +# Type Declaration +# ============================================== + +type wmt_loader_exec , exec_type, file_type; +type wmt_loader ,domain; + +# ============================================== +# Android Policy Rule +# ============================================== + +# ============================================== +# NSA Policy Rule +# ============================================== + +# ============================================== +# MTK Policy Rule +# ============================================== + +allow wmt_loader wmt_prop:property_service set; +allow wmt_loader init:unix_stream_socket connectto; +allow wmt_loader proc:file setattr; +allow wmt_loader property_socket:sock_file write; +allow wmt_loader self:capability { chown dac_override }; +allow wmt_loader wmtdetect_device:chr_file { read write ioctl open }; +allow wmt_loader stpwmt_device:chr_file { read write ioctl open }; +allow wmt_loader devpts:chr_file { read write getattr ioctl }; +init_daemon_domain(wmt_loader) |
