type charger, domain; type charger_exec, system_file_type, exec_type, file_type; # Write to /dev/kmsg allow charger kmsg_device:chr_file rw_file_perms; # Read access to pseudo filesystems. r_dir_file(charger, rootfs) r_dir_file(charger, cgroup) r_dir_file(charger, cgroup_v2) # Allow to read /sys/class/power_supply directory allow charger sysfs_type:dir r_dir_perms; allow charger self:global_capability_class_set { sys_tty_config }; allow charger self:global_capability_class_set sys_boot; wakelock_use(charger) allow charger self:netlink_kobject_uevent_socket create_socket_perms_no_ioctl; # Read/write to /sys/power/state allow charger sysfs_power:file rw_file_perms; r_dir_file(charger, sysfs_batteryinfo) # Read /sys/fs/pstore/console-ramoops # Don't worry about overly broad permissions for now, as there's # only one file in /sys/fs/pstore allow charger pstorefs:dir r_dir_perms; allow charger pstorefs:file r_file_perms; allow charger graphics_device:dir r_dir_perms; allow charger graphics_device:chr_file rw_file_perms; allow charger input_device:dir r_dir_perms; allow charger input_device:chr_file r_file_perms; allow charger tty_device:chr_file rw_file_perms; allow charger proc_sysrq:file rw_file_perms; hal_client_domain(charger, hal_health)