1type dmd, domain;
2type dmd_exec, vendor_file_type, exec_type, file_type;
3init_daemon_domain(dmd)
4
5# Grant to access serial device for external logging tool
6allow dmd serial_device:chr_file rw_file_perms;
7
8# Grant to access radio device
9allow dmd radio_device:chr_file rw_file_perms;
10
11# Grant to access slog dir/file
12allow dmd vendor_slog_file:dir create_dir_perms;
13allow dmd vendor_slog_file:file create_file_perms;
14
15# Grant to access tcp socket
16allow dmd node:tcp_socket node_bind;
17allow dmd self:tcp_socket { create_socket_perms_no_ioctl listen accept bind };
18
19# Grant to access log related properties
20set_prop(dmd, vendor_diag_prop)
21set_prop(dmd, vendor_slog_prop)
22set_prop(dmd, vendor_modem_prop)
23get_prop(dmd, vendor_persist_config_default_prop)
24
25# Grant to access hwservice manager
26get_prop(dmd, hwservicemanager_prop)
27allow dmd hidl_base_hwservice:hwservice_manager add;
28allow dmd hal_vendor_oem_hwservice:hwservice_manager { add find };
29binder_call(dmd, hwservicemanager)
30binder_call(dmd, modem_diagnostic_app)
31binder_call(dmd, modem_logging_control)
32binder_call(dmd, vendor_telephony_silentlogging_app)
33binder_call(dmd, liboemservice_proxy_default)
34