# ============================================== # Policy File of /vendor/bin/sysenv_daemon Executable File # ============================================== # Type Declaration # ============================================== type sysenv_daemon_exec , exec_type, file_type, vendor_file_type; type sysenv_daemon ,domain; # ============================================== # Android Policy Rule # ============================================== # ============================================== # NSA Policy Rule # ============================================== # ============================================== # MTK Policy Rule # ============================================== init_daemon_domain(sysenv_daemon) # Date : WK16.24 # Operation : Create # Purpose : move sysenv to userspace. allow sysenv_daemon block_device:dir search; allow sysenv_daemon para_block_device:blk_file rw_file_perms; allow sysenv_daemon proc_lk_env:file rw_file_perms; allow sysenv_daemon self:netlink_socket { read bind create }; # Date : WK17.29 # Operation : Migration # Purpose : for device bring up, not to block early SQC allow sysenv_daemon sysfs:file { open read }; # Date : WK17.43 # Operation : Migration # Purpose : to access mtd device allow sysenv_daemon mtd_device:blk_file { open read write };