type rmt_storage, domain; type rmt_storage_exec, exec_type, vendor_file_type, file_type; init_daemon_domain(rmt_storage) wakelock_use(rmt_storage) r_dir_file(rmt_storage, sysfs_msm_subsys) set_prop(rmt_storage, ctl_vendor_rmt_storage_prop) allow rmt_storage self:capability { net_bind_service setgid setpcap setuid }; allow rmt_storage modem_block_device:blk_file rw_file_perms; allow rmt_storage uio_device:chr_file rw_file_perms; allow rmt_storage block_device:dir search; allow rmt_storage sysfs_uio:dir r_dir_perms; allow rmt_storage sysfs_uio:lnk_file r_file_perms; allow rmt_storage sysfs_rmtfs:dir search; allow rmt_storage sysfs_rmtfs:file r_file_perms; allow rmt_storage sysfs_rmtfs:dir search; allow rmt_storage self:socket create_socket_perms; allowxperm rmt_storage self:socket ioctl IPC_ROUTER_IOCTL_BIND_CONTROL_PORT; allow rmt_storage kmsg_device:chr_file w_file_perms; allow rmt_storage modem_fdr_file:dir rw_dir_perms; allow rmt_storage modem_fdr_file:file create_file_perms; dontaudit rmt_storage kernel:system module_request;