2013-12-06 01:55:34 +01:00
|
|
|
# lmkd low memory killer daemon
|
2016-11-26 02:37:30 +01:00
|
|
|
type lmkd, domain, mlstrustedsubject;
|
2013-12-06 01:55:34 +01:00
|
|
|
type lmkd_exec, exec_type, file_type;
|
|
|
|
|
2017-11-09 23:51:26 +01:00
|
|
|
allow lmkd self:global_capability_class_set { dac_override sys_resource kill };
|
2014-02-13 21:19:50 +01:00
|
|
|
|
2014-07-16 20:45:51 +02:00
|
|
|
# lmkd locks itself in memory, to prevent it from being
|
|
|
|
# swapped out and unable to kill other memory hogs.
|
|
|
|
# system/core commit b28ff9131363f7b4a698990da5748b2a88c3ed35
|
|
|
|
# b/16236289
|
2017-11-09 23:51:26 +01:00
|
|
|
allow lmkd self:global_capability_class_set ipc_lock;
|
2014-07-16 20:45:51 +02:00
|
|
|
|
2014-02-13 21:19:50 +01:00
|
|
|
## Open and write to /proc/PID/oom_score_adj
|
|
|
|
## TODO: maybe scope this down?
|
|
|
|
r_dir_file(lmkd, appdomain)
|
|
|
|
allow lmkd appdomain:file write;
|
|
|
|
r_dir_file(lmkd, system_server)
|
|
|
|
allow lmkd system_server:file write;
|
|
|
|
|
|
|
|
## Writes to /sys/module/lowmemorykiller/parameters/minfree
|
2017-09-21 01:29:23 +02:00
|
|
|
r_dir_file(lmkd, sysfs_lowmemorykiller)
|
2014-02-13 21:19:50 +01:00
|
|
|
allow lmkd sysfs_lowmemorykiller:file w_file_perms;
|
2014-03-05 02:15:13 +01:00
|
|
|
|
|
|
|
# Send kill signals
|
|
|
|
allow lmkd appdomain:process sigkill;
|
2014-07-15 02:39:15 +02:00
|
|
|
|
|
|
|
# Clean up old cgroups
|
|
|
|
allow lmkd cgroup:dir { remove_name rmdir };
|
|
|
|
|
2017-08-30 23:02:38 +02:00
|
|
|
# Allow to read memcg stats
|
|
|
|
allow lmkd cgroup:file r_file_perms;
|
|
|
|
|
2014-07-15 02:39:15 +02:00
|
|
|
# Set self to SCHED_FIFO
|
2017-11-09 23:51:26 +01:00
|
|
|
allow lmkd self:global_capability_class_set sys_nice;
|
2014-07-17 03:42:36 +02:00
|
|
|
|
2016-08-08 19:48:01 +02:00
|
|
|
allow lmkd proc_zoneinfo:file r_file_perms;
|
|
|
|
|
2018-02-01 18:35:14 +01:00
|
|
|
# live lock watchdog process allowed to look through /proc/
|
|
|
|
allow lmkd domain:dir { search open read };
|
|
|
|
allow lmkd domain:file { open read };
|
|
|
|
|
|
|
|
# live lock watchdog process allowed to dump process trace and
|
|
|
|
# reboot because orderly shutdown may not be possible.
|
|
|
|
allow lmkd proc_sysrq:file rw_file_perms;
|
|
|
|
|
2018-03-29 21:30:58 +02:00
|
|
|
# Read /proc/meminfo
|
|
|
|
allow lmkd proc_meminfo:file r_file_perms;
|
|
|
|
|
2014-07-17 03:42:36 +02:00
|
|
|
### neverallow rules
|
|
|
|
|
|
|
|
# never honor LD_PRELOAD
|
2016-02-05 23:48:03 +01:00
|
|
|
neverallow * lmkd:process noatsecure;
|