type pd_mapper, domain;

type pd_mapper_exec, exec_type, vendor_file_type, file_type;
init_daemon_domain(pd_mapper);

allow pd_mapper self:capability { setgid setpcap setuid net_bind_service };

allow pd_mapper vendor_firmware_file:dir r_dir_perms;
allow pd_mapper vendor_firmware_file:file r_file_perms;

allow pd_mapper self:socket create_socket_perms;
allowxperm pd_mapper self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT;

r_dir_file(pd_mapper, sysfs_msm_subsys)
userdebug_or_eng(`set_prop(pd_mapper, vendor_ssr_prop)')

dontaudit pd_mapper kernel:system module_request;