| type rmt_storage, domain; |
| type rmt_storage_exec, exec_type, vendor_file_type, file_type; |
| |
| init_daemon_domain(rmt_storage) |
| |
| wakelock_use(rmt_storage) |
| |
| r_dir_file(rmt_storage, sysfs_msm_subsys) |
| |
| set_prop(rmt_storage, ctl_vendor_rmt_storage_prop) |
| |
| allow rmt_storage self:capability { net_bind_service setgid setpcap setuid }; |
| |
| allow rmt_storage modem_block_device:blk_file rw_file_perms; |
| allow rmt_storage uio_device:chr_file rw_file_perms; |
| allow rmt_storage block_device:dir search; |
| |
| allow rmt_storage sysfs_uio:dir r_dir_perms; |
| allow rmt_storage sysfs_uio:lnk_file r_file_perms; |
| |
| allow rmt_storage sysfs_rmtfs:dir search; |
| allow rmt_storage sysfs_rmtfs:file r_file_perms; |
| allow rmt_storage sysfs_rmtfs:dir search; |
| |
| allow rmt_storage self:socket create_socket_perms; |
| allowxperm rmt_storage self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT; |
| |
| allow rmt_storage kmsg_device:chr_file w_file_perms; |
| |
| allow rmt_storage modem_fdr_file:dir rw_dir_perms; |
| allow rmt_storage modem_fdr_file:file create_file_perms; |
| |
| dontaudit rmt_storage kernel:system module_request; |