1 type ril-daemon-mtk_exec, exec_type, file_type;
2 type ril-daemon-mtk, domain, domain_deprecated;
4 init_daemon_domain(ril-daemon-mtk)
5 net_domain(ril-daemon-mtk)
7 allow ril-daemon-mtk ccci_device:chr_file rw_file_perms;
8 allow ril-daemon-mtk devpts:chr_file rw_file_perms;
9 allow ril-daemon-mtk self:capability setuid;
10 allow ril-daemon-mtk sysfs_wake_lock:file rw_file_perms;
11 allow ril-daemon-mtk sysfs_ccci:dir search;
12 allow ril-daemon-mtk sysfs_ccci:file r_file_perms;
13 allow ril-daemon-mtk block_device:dir search;
14 allow ril-daemon-mtk para_block_device:blk_file rw_file_perms;
16 allow ril-daemon-mtk self:udp_socket create_socket_perms;
17 allow ril-daemon-mtk self:capability { setuid net_admin net_raw };
19 allow ril-daemon-mtk mal_mfi_socket:sock_file { w_file_perms };
20 allow ril-daemon-mtk mtkmal:unix_stream_socket connectto;
22 allow ril-daemon-mtk radio_device:dir search;
23 allow ril-daemon-mtk radio_prop:property_service set;
25 allow ril-daemon-mtk ctl_muxreport-daemon_prop:property_service set;
26 allow ril-daemon-mtk ril_mux_report_case_prop:property_service set;
27 allow ril-daemon-mtk ril_sim_inserted_status:property_service set;
28 allow ril-daemon-mtk serial_number_prop:property_service set;
30 unix_socket_connect(ril-daemon-mtk, property, init)
32 # Access to wake locks
33 wakelock_use(ril-daemon-mtk)