1type rmt_storage, domain;
2type rmt_storage_exec, exec_type, vendor_file_type, file_type;
3
4init_daemon_domain(rmt_storage)
5
6wakelock_use(rmt_storage)
7
8r_dir_file(rmt_storage, sysfs_msm_subsys)
9
10set_prop(rmt_storage, ctl_vendor_rmt_storage_prop)
11
12allow rmt_storage self:capability { net_bind_service setgid setpcap setuid };
13
14allow rmt_storage modem_block_device:blk_file rw_file_perms;
15allow rmt_storage uio_device:chr_file rw_file_perms;
16allow rmt_storage block_device:dir search;
17
18allow rmt_storage sysfs_uio:dir r_dir_perms;
19allow rmt_storage sysfs_uio:lnk_file r_file_perms;
20
21allow rmt_storage sysfs_rmtfs:dir search;
22allow rmt_storage sysfs_rmtfs:file r_file_perms;
23allow rmt_storage sysfs_rmtfs:dir search;
24
25allow rmt_storage self:socket create_socket_perms;
26allowxperm rmt_storage self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT;
27
28allow rmt_storage kmsg_device:chr_file w_file_perms;
29
30allow rmt_storage modem_fdr_file:dir rw_dir_perms;
31allow rmt_storage modem_fdr_file:file create_file_perms;
32
33dontaudit rmt_storage kernel:system module_request;
34