Home | History | Annotate | Download | only in sepolicy
      1 # Policy for /system/bin/rmt_storage
      2 type rmt, domain;
      3 type rmt_exec, exec_type, vendor_file_type, file_type;
      4 
      5 # STOPSHIP b/28340421
      6 # Temporarily grant this permission and log its use.
      7 allow rmt self:capability net_bind_service;
      8 auditallow rmt self:capability net_bind_service;
      9 
     10 init_daemon_domain(rmt)
     11 wakelock_use(rmt)
     12 
     13 allow rmt self:capability { setgid setpcap setuid sys_admin };
     14 
     15 allow rmt block_device:dir search;
     16 allow rmt modem_block_device:blk_file rw_file_perms;
     17 
     18 # access to /dev/uio0
     19 allow rmt uio_device:chr_file rw_file_perms;
     20 
     21 allow rmt self:socket create_socket_perms;
     22 allowxperm rmt self:socket ioctl msm_sock_ipc_ioctls;
     23 
     24 allow rmt debugfs_rmt_storage:dir search;
     25 allow rmt debugfs_rmt_storage:file w_file_perms;
     26 
     27 allow rmt sysfs:dir r_dir_perms;
     28 r_dir_file(rmt, sysfs_rmtfs)
     29