blob: 9d23571323369bf3affd332fb4e5525c4111e2c2 [file] [log] [blame]
Todd Poynorb2b87d92013-06-03 14:09:54 -07001# healthd seclabel is specified in init.rc since
2# it lives in the rootfs and has no unique file type.
3type healthd, domain;
Todd Poynorb2b87d92013-06-03 14:09:54 -07004type healthd_exec, exec_type, file_type;
5
6init_daemon_domain(healthd)
Stephen Smalley2a604ad2013-11-04 09:53:46 -05007allow healthd rootfs:file { read entrypoint };
Todd Poynorb2b87d92013-06-03 14:09:54 -07008write_klog(healthd)
9
Stephen Smalley2a604ad2013-11-04 09:53:46 -050010allow healthd self:capability { net_admin mknod };
11allow healthd self:capability2 block_suspend;
12allow healthd self:netlink_kobject_uevent_socket create_socket_perms;
13binder_use(healthd)
Nick Kralevich09e6abd2013-12-13 22:19:45 -080014binder_service(healthd)
Stephen Smalley2a604ad2013-11-04 09:53:46 -050015binder_call(healthd, system_server)
Todd Poynorb2b87d92013-06-03 14:09:54 -070016
Stephen Smalley2a604ad2013-11-04 09:53:46 -050017# Workaround for 0x10 / block_suspend capability2 denials.
18# Requires a kernel patch to fix properly.
19permissive healthd;