1 type rmt_storage, domain; 2 type rmt_storage_exec, exec_type, vendor_file_type, file_type; 3 4 init_daemon_domain(rmt_storage) 5 6 wakelock_use(rmt_storage) 7 8 r_dir_file(rmt_storage, sysfs_msm_subsys) 9 10 set_prop(rmt_storage, ctl_vendor_rmt_storage_prop) 11 12 allow rmt_storage self:capability { net_bind_service setgid setpcap setuid }; 13 14 allow rmt_storage modem_block_device:blk_file rw_file_perms; 15 allow rmt_storage uio_device:chr_file rw_file_perms; 16 allow rmt_storage block_device:dir search; 17 18 allow rmt_storage sysfs_uio:dir r_dir_perms; 19 allow rmt_storage sysfs_uio:lnk_file r_file_perms; 20 21 allow rmt_storage sysfs_rmtfs:dir search; 22 allow rmt_storage sysfs_rmtfs:file r_file_perms; 23 allow rmt_storage sysfs_rmtfs:dir search; 24 25 allow rmt_storage self:socket create_socket_perms; 26 allowxperm rmt_storage self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT; 27 28 allow rmt_storage kmsg_device:chr_file w_file_perms; 29 30 allow rmt_storage modem_fdr_file:dir rw_dir_perms; 31 allow rmt_storage modem_fdr_file:file create_file_perms; 32 33 dontaudit rmt_storage kernel:system module_request; 34