1 # Policy for /system/bin/rmt_storage 2 type rmt, domain; 3 type rmt_exec, exec_type, vendor_file_type, file_type; 4 5 # STOPSHIP b/28340421 6 # Temporarily grant this permission and log its use. 7 allow rmt self:capability net_bind_service; 8 auditallow rmt self:capability net_bind_service; 9 10 init_daemon_domain(rmt) 11 wakelock_use(rmt) 12 13 allow rmt self:capability { setgid setpcap setuid sys_admin }; 14 15 allow rmt block_device:dir search; 16 allow rmt modem_block_device:blk_file rw_file_perms; 17 18 # access to /dev/uio0 19 allow rmt uio_device:chr_file rw_file_perms; 20 21 allow rmt self:socket create_socket_perms; 22 allowxperm rmt self:socket ioctl msm_sock_ipc_ioctls; 23 24 allow rmt debugfs_rmt_storage:dir search; 25 allow rmt debugfs_rmt_storage:file w_file_perms; 26 27 allow rmt sysfs:dir r_dir_perms; 28 r_dir_file(rmt, sysfs_rmtfs) 29