blob: 53e6e8ef908d50aeed193b0b9ef37831e44b1a27 [file] [log] [blame]
Todd Poynorb2b87d92013-06-03 14:09:54 -07001# healthd seclabel is specified in init.rc since
2# it lives in the rootfs and has no unique file type.
3type healthd, domain;
Todd Poynorb2b87d92013-06-03 14:09:54 -07004type healthd_exec, exec_type, file_type;
5
6init_daemon_domain(healthd)
Stephen Smalley2a604ad2013-11-04 09:53:46 -05007allow healthd rootfs:file { read entrypoint };
Todd Poynorb2b87d92013-06-03 14:09:54 -07008write_klog(healthd)
9
Stephen Smalley2a604ad2013-11-04 09:53:46 -050010allow healthd self:capability { net_admin mknod };
11allow healthd self:capability2 block_suspend;
12allow healthd self:netlink_kobject_uevent_socket create_socket_perms;
13binder_use(healthd)
14binder_call(healthd, system_server)
Todd Poynorb2b87d92013-06-03 14:09:54 -070015
Stephen Smalley2a604ad2013-11-04 09:53:46 -050016# Workaround for 0x10 / block_suspend capability2 denials.
17# Requires a kernel patch to fix properly.
18permissive healthd;