1# Policy for /system/bin/rmt_storage
2type rmt, domain;
3type rmt_exec, exec_type, vendor_file_type, file_type;
4
5# STOPSHIP b/28340421
6# Temporarily grant this permission and log its use.
7allow rmt self:capability net_bind_service;
8auditallow rmt self:capability net_bind_service;
9
10init_daemon_domain(rmt)
11wakelock_use(rmt)
12
13allow rmt self:capability { setgid setpcap setuid sys_admin };
14
15allow rmt block_device:dir search;
16allow rmt modem_block_device:blk_file rw_file_perms;
17
18# access to /dev/uio0
19allow rmt uio_device:chr_file rw_file_perms;
20
21allow rmt self:socket create_socket_perms;
22allowxperm rmt self:socket ioctl msm_sock_ipc_ioctls;
23
24allow rmt debugfs_rmt_storage:dir search;
25allow rmt debugfs_rmt_storage:file w_file_perms;
26
27allow rmt sysfs:dir r_dir_perms;
28r_dir_file(rmt, sysfs_rmtfs)
29