blob: d9d9b54a2377bde324d9fca32711968e55a11c98 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
|
# ==============================================
# Policy File of /system/bingsm0710muxd Executable File
# ==============================================
# Type Declaration
# ==============================================
type gsm0710muxd_exec , exec_type, file_type;
type gsm0710muxd ,domain;
# ==============================================
# Android Policy Rule
# ==============================================
# ==============================================
# NSA Policy Rule
# ==============================================
# ==============================================
# MTK Policy Rule
# ==============================================
init_daemon_domain(gsm0710muxd)
allow gsm0710muxd gsm0710muxd_device:chr_file open;
allow gsm0710muxd gsm0710muxd_device:chr_file { read write };
allow gsm0710muxd ctl_rildaemon_prop:property_service set;
allow gsm0710muxd ctl_ril-daemon-mtk_prop:property_service set;
allow gsm0710muxd gsm0710muxd_prop:property_service set;
allow gsm0710muxd devpts:chr_file setattr;
allow gsm0710muxd device:dir write;
allow gsm0710muxd self:capability chown;
allow gsm0710muxd self:capability fowner;
allow gsm0710muxd device:dir add_name;
allow gsm0710muxd device:lnk_file create;
allow gsm0710muxd init:unix_stream_socket connectto;
allow gsm0710muxd property_socket:sock_file write;
allow gsm0710muxd self:capability setuid;
allow gsm0710muxd device:dir remove_name;
allow gsm0710muxd device:lnk_file unlink;
allow gsm0710muxd eemcs_device:chr_file open;
allow gsm0710muxd eemcs_device:chr_file { read write };
|