blob: 63efd059d155676f24bb630a44f6c92888f98431 [file] [log] [blame]
Todd Poynorb2b87d92013-06-03 14:09:54 -07001# healthd seclabel is specified in init.rc since
2# it lives in the rootfs and has no unique file type.
3type healthd, domain;
Todd Poynorb2b87d92013-06-03 14:09:54 -07004
Stephen Smalley2a604ad2013-11-04 09:53:46 -05005allow healthd rootfs:file { read entrypoint };
Todd Poynorb2b87d92013-06-03 14:09:54 -07006write_klog(healthd)
Stephen Smalley190c7042014-01-22 13:23:02 -05007# /dev/__null__ created by init prior to policy load,
8# open fd inherited by healthd.
9allow healthd tmpfs:chr_file { read write };
Todd Poynorb2b87d92013-06-03 14:09:54 -070010
Stephen Smalley2a604ad2013-11-04 09:53:46 -050011allow healthd self:capability { net_admin mknod };
12allow healthd self:capability2 block_suspend;
13allow healthd self:netlink_kobject_uevent_socket create_socket_perms;
14binder_use(healthd)
Nick Kralevich09e6abd2013-12-13 22:19:45 -080015binder_service(healthd)
Stephen Smalley2a604ad2013-11-04 09:53:46 -050016binder_call(healthd, system_server)
Nick Kralevich03523932014-01-27 16:15:00 -080017
18###
19### healthd: charger mode
20###
21
22allow healthd graphics_device:dir r_dir_perms;
23allow healthd graphics_device:chr_file rw_file_perms;
24allow healthd input_device:dir r_dir_perms;
25allow healthd input_device:chr_file r_file_perms;
26allow healthd ashmem_device:chr_file execute;
27allow healthd self:process execmem;