1type dmd, domain; 2type dmd_exec, vendor_file_type, exec_type, file_type; 3init_daemon_domain(dmd) 4 5# Grant to access serial device for external logging tool 6allow dmd serial_device:chr_file rw_file_perms; 7 8# Grant to access radio device 9allow dmd radio_device:chr_file rw_file_perms; 10 11# Grant to access slog dir/file 12allow dmd vendor_slog_file:dir create_dir_perms; 13allow dmd vendor_slog_file:file create_file_perms; 14 15# Grant to access tcp socket 16allow dmd node:tcp_socket node_bind; 17allow dmd self:tcp_socket { create_socket_perms_no_ioctl listen accept bind }; 18 19# Grant to access log related properties 20set_prop(dmd, vendor_diag_prop) 21set_prop(dmd, vendor_slog_prop) 22set_prop(dmd, vendor_modem_prop) 23get_prop(dmd, vendor_persist_config_default_prop) 24 25# Grant to access hwservice manager 26get_prop(dmd, hwservicemanager_prop) 27allow dmd hidl_base_hwservice:hwservice_manager add; 28allow dmd hal_vendor_oem_hwservice:hwservice_manager { add find }; 29binder_call(dmd, hwservicemanager) 30binder_call(dmd, modem_diagnostic_app) 31binder_call(dmd, modem_logging_control) 32binder_call(dmd, vendor_telephony_silentlogging_app) 33binder_call(dmd, liboemservice_proxy_default) 34