2017-03-23 22:27:32 +01:00
|
|
|
typeattribute lmkd coredomain;
|
2022-02-10 01:32:44 +01:00
|
|
|
typeattribute lmkd bpfdomain;
|
2017-03-23 22:27:32 +01:00
|
|
|
|
2016-07-22 22:13:11 +02:00
|
|
|
init_daemon_domain(lmkd)
|
2020-03-04 09:20:35 +01:00
|
|
|
|
|
|
|
# Set sys.lmk.* properties.
|
|
|
|
set_prop(lmkd, system_lmk_prop)
|
2020-05-05 21:41:02 +02:00
|
|
|
|
|
|
|
# Set lmkd.* properties.
|
|
|
|
set_prop(lmkd, lmkd_prop)
|
|
|
|
|
2021-08-04 21:31:43 +02:00
|
|
|
# Get persist.device_config.lmk_native.* properties.
|
|
|
|
get_prop(lmkd, device_config_lmkd_native_prop)
|
|
|
|
|
2024-03-12 21:04:41 +01:00
|
|
|
# Needed for reading tracepoint ids in order to attach bpf programs.
|
|
|
|
allow lmkd debugfs_tracing:file r_file_perms;
|
|
|
|
allow lmkd self:perf_event { cpu kernel open write };
|
|
|
|
|
2021-05-28 03:22:41 +02:00
|
|
|
allow lmkd fs_bpf:file read;
|
2024-03-12 21:04:41 +01:00
|
|
|
allow lmkd bpfloader:bpf { map_read map_write prog_run };
|
|
|
|
|
|
|
|
# Needed for polling directly from the bpf ring buffer's fd
|
|
|
|
allow lmkd fs_bpf_lmkd_memevents_rb:file { read write };
|
|
|
|
allow lmkd fs_bpf_lmkd_memevents_prog:file read;
|
2021-05-28 03:22:41 +02:00
|
|
|
|
2024-03-27 09:18:41 +01:00
|
|
|
allow lmkd self:global_capability_class_set { dac_override dac_read_search sys_resource kill };
|
|
|
|
|
|
|
|
# lmkd locks itself in memory, to prevent it from being
|
|
|
|
# swapped out and unable to kill other memory hogs.
|
|
|
|
# system/core commit b28ff9131363f7b4a698990da5748b2a88c3ed35
|
|
|
|
# b/16236289
|
|
|
|
allow lmkd self:global_capability_class_set ipc_lock;
|
|
|
|
|
|
|
|
## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
|
|
|
|
## TODO: maybe scope this down?
|
|
|
|
r_dir_file(lmkd, domain)
|
|
|
|
allow lmkd domain:file write;
|
|
|
|
|
|
|
|
## Writes to /sys/module/lowmemorykiller/parameters/minfree
|
|
|
|
r_dir_file(lmkd, sysfs_lowmemorykiller)
|
|
|
|
allow lmkd sysfs_lowmemorykiller:file w_file_perms;
|
|
|
|
|
|
|
|
# setsched and send kill signals to any registered process
|
|
|
|
allow lmkd domain:process { setsched sigkill };
|
|
|
|
# TODO: delete this line b/131761776
|
|
|
|
allow lmkd kernel:process { setsched };
|
|
|
|
|
|
|
|
# Clean up old cgroups
|
|
|
|
allow lmkd cgroup:dir { remove_name rmdir };
|
|
|
|
allow lmkd cgroup_v2:dir { remove_name rmdir };
|
|
|
|
|
|
|
|
# Allow to read memcg stats
|
|
|
|
allow lmkd cgroup:file r_file_perms;
|
|
|
|
allow lmkd cgroup_v2:file r_file_perms;
|
|
|
|
|
|
|
|
# Set self to SCHED_FIFO
|
|
|
|
allow lmkd self:global_capability_class_set sys_nice;
|
|
|
|
|
|
|
|
allow lmkd proc_zoneinfo:file r_file_perms;
|
|
|
|
allow lmkd proc_vmstat:file r_file_perms;
|
|
|
|
|
|
|
|
# live lock watchdog process allowed to look through /proc/
|
|
|
|
allow lmkd domain:dir { search open read };
|
|
|
|
allow lmkd domain:file { open read };
|
|
|
|
|
|
|
|
# live lock watchdog process allowed to dump process trace and
|
|
|
|
# reboot because orderly shutdown may not be possible.
|
|
|
|
allow lmkd proc_sysrq:file rw_file_perms;
|
|
|
|
|
|
|
|
# Read /proc/lowmemorykiller
|
|
|
|
allow lmkd proc_lowmemorykiller:file r_file_perms;
|
|
|
|
|
|
|
|
# Read /proc/meminfo
|
|
|
|
allow lmkd proc_meminfo:file r_file_perms;
|
|
|
|
|
|
|
|
# Read /proc/pressure/cpu and /proc/pressure/io
|
|
|
|
allow lmkd proc_pressure_cpu:file r_file_perms;
|
|
|
|
allow lmkd proc_pressure_io:file r_file_perms;
|
|
|
|
|
|
|
|
# Read/Write /proc/pressure/memory
|
|
|
|
allow lmkd proc_pressure_mem:file rw_file_perms;
|
|
|
|
|
|
|
|
# Allow lmkd to connect during reinit.
|
|
|
|
allow lmkd lmkd_socket:sock_file write;
|
|
|
|
|
|
|
|
# Allow lmkd to write to statsd.
|
|
|
|
unix_socket_send(lmkd, statsdw, statsd)
|
|
|
|
|
|
|
|
### neverallow rules
|
|
|
|
|
|
|
|
# never honor LD_PRELOAD
|
|
|
|
neverallow * lmkd:process noatsecure;
|
|
|
|
neverallow lmkd self:global_capability_class_set sys_ptrace;
|
2021-03-10 02:42:23 +01:00
|
|
|
neverallow { domain -init -lmkd -vendor_init } lmkd_prop:property_service set;
|
2024-03-12 21:04:41 +01:00
|
|
|
neverallow lmkd self:perf_event ~{ cpu kernel open write };
|