# healthd seclabel is specified in init.rc since # it lives in the rootfs and has no unique file type. type healthd, domain; write_klog(healthd) # /dev/__null__ created by init prior to policy load, # open fd inherited by healthd. allow healthd tmpfs:chr_file { read write }; allow healthd self:capability { net_admin mknod sys_tty_config }; wakelock_use(healthd) allow healthd self:netlink_kobject_uevent_socket create_socket_perms; binder_use(healthd) binder_service(healthd) binder_call(healthd, system_server) # Write to state file. # TODO: Split into a separate type? allow healthd sysfs:file write; ### ### healthd: charger mode ### # Read /sys/fs/pstore/console-ramoops # Don't worry about overly broad permissions for now, as there's # only one file in /sys/fs/pstore allow healthd pstorefs:dir r_dir_perms; allow healthd pstorefs:file r_file_perms; allow healthd graphics_device:dir r_dir_perms; allow healthd graphics_device:chr_file rw_file_perms; allow healthd input_device:dir r_dir_perms; allow healthd input_device:chr_file r_file_perms; allow healthd tty_device:chr_file rw_file_perms; allow healthd ashmem_device:chr_file execute; allow healthd self:process execmem; allow healthd proc_sysrq:file rw_file_perms; allow healthd self:capability sys_boot; allow healthd healthd_service:service_manager add; # Audited locally. service_manager_local_audit_domain(healthd) auditallow healthd { service_manager_type -healthd_service }:service_manager find; # Healthd needs to tell init to continue the boot # process when running in charger mode. unix_socket_connect(healthd, property, init) allow healthd system_prop:property_service set;