type per_mgr, domain;
type per_mgr_exec, exec_type, file_type;
init_daemon_domain(per_mgr);

allow per_mgr shared_log_device:chr_file rw_file_perms;

allow per_mgr sysfs_msm_subsys:dir r_dir_perms;
allow per_mgr sysfs_msm_subsys:lnk_file r_file_perms;

binder_service(per_mgr)
binder_use(per_mgr)
binder_call(per_mgr, per_proxy)
binder_call(per_mgr, rild)
allow per_mgr per_mgr_service:service_manager add;

allow per_mgr subsys_modem_device:chr_file r_file_perms;

allow per_mgr self:capability net_raw;
allow per_mgr self:socket create_socket_perms;