39 lines
1.3 KiB
Plaintext
Executable File
39 lines
1.3 KiB
Plaintext
Executable File
# ==============================================
|
|
# Policy File of /system/binpppd_dt Executable File
|
|
|
|
|
|
# ==============================================
|
|
# Type Declaration
|
|
# ==============================================
|
|
|
|
type pppd_dt_exec , exec_type, file_type;
|
|
type pppd_dt ,domain;
|
|
|
|
# ==============================================
|
|
# Android Policy Rule
|
|
# ==============================================
|
|
|
|
# ==============================================
|
|
# NSA Policy Rule
|
|
# ==============================================
|
|
|
|
# ==============================================
|
|
# MTK Policy Rule
|
|
# ==============================================
|
|
|
|
|
|
init_daemon_domain(pppd_dt)
|
|
allow pppd_dt self:capability { setgid setuid net_admin };
|
|
allow pppd_dt property_socket:sock_file write;
|
|
allow pppd_dt dnsproxyd_socket:sock_file write;
|
|
allow pppd_dt init:unix_stream_socket connectto;
|
|
allow pppd_dt self:udp_socket { ioctl create };
|
|
allow pppd_dt netd:unix_stream_socket connectto;
|
|
allow pppd_dt ttyACM_device:chr_file { read write ioctl open getattr };
|
|
allow pppd_dt ppp_device:chr_file { read write ioctl open };
|
|
allow pppd_dt system_file:file execute_no_trans;
|
|
allow pppd_dt shell_exec:file { read open execute };
|
|
allow pppd_dt net_radio_prop:property_service set;
|
|
allow pppd_dt pppoe_ppp0_prop:property_service set;
|
|
allow pppd_dt system_prop:property_service set;
|