1 type rfs_access, domain; 2 type rfs_access_exec, exec_type, vendor_file_type, file_type; 3 4 init_daemon_domain(rfs_access) 5 6 #For tftp server 7 allow rfs_access self:capability { chown setgid setpcap setuid net_bind_service }; 8 9 wakelock_use(rfs_access) 10 r_dir_file(rfs_access, vendor_firmware_file); 11 12 # For tftp server file access 13 allow rfs_access mnt_vendor_file:dir search; 14 allow rfs_access mnt_vendor_file:file r_file_perms; 15 allow rfs_access persist_file:dir search; 16 allow rfs_access persist_rfs_file:dir create_dir_perms; 17 allow rfs_access persist_rfs_file:file create_file_perms; 18 allow rfs_access mpss_rfs_data_file:dir create_dir_perms; 19 allow rfs_access mpss_rfs_data_file:file create_file_perms; 20 allow rfs_access rfs_tombstone_data_file:dir create_dir_perms; 21 allow rfs_access rfs_tombstone_data_file:file create_file_perms; 22 23 allow rfs_access self:socket create_socket_perms_no_ioctl; 24 userdebug_or_eng(` 25 allow rfs_access wifidump_vendor_data_file:dir rw_dir_perms; 26 allow rfs_access wifidump_vendor_data_file:file create_file_perms; 27 ') 28 29 dontaudit rfs_access kernel:system module_request; 30