Merge "allow init to communicate with lmkd and lmkd to kill native processes"
am: 812f7da4dc
Change-Id: Ib9d97975e6f51f2a8a31c40547b54bcc5b0bbfaa
This commit is contained in:
commit
b7203825f2
2 changed files with 8 additions and 7 deletions
|
@ -28,6 +28,8 @@ allow init device:file relabelfrom;
|
|||
allow init runtime_event_log_tags_file:file { open write setattr relabelto create };
|
||||
# /dev/socket
|
||||
allow init { device socket_device }:dir relabelto;
|
||||
# allow init to establish connection and communicate with lmkd
|
||||
unix_socket_connect(init, lmkd, lmkd)
|
||||
# Relabel /dev nodes created in first stage init, /dev/null, /dev/ptmx, /dev/random, /dev/urandom
|
||||
allow init { null_device ptmx_device random_device } : chr_file relabelto;
|
||||
# /dev/device-mapper, /dev/block(/.*)?
|
||||
|
|
|
@ -10,19 +10,17 @@ allow lmkd self:global_capability_class_set { dac_override dac_read_search sys_r
|
|||
# b/16236289
|
||||
allow lmkd self:global_capability_class_set ipc_lock;
|
||||
|
||||
## Open and write to /proc/PID/oom_score_adj
|
||||
## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
|
||||
## TODO: maybe scope this down?
|
||||
r_dir_file(lmkd, appdomain)
|
||||
allow lmkd appdomain:file write;
|
||||
r_dir_file(lmkd, system_server)
|
||||
allow lmkd system_server:file write;
|
||||
r_dir_file(lmkd, domain)
|
||||
allow lmkd domain:file write;
|
||||
|
||||
## Writes to /sys/module/lowmemorykiller/parameters/minfree
|
||||
r_dir_file(lmkd, sysfs_lowmemorykiller)
|
||||
allow lmkd sysfs_lowmemorykiller:file w_file_perms;
|
||||
|
||||
# setsched and send kill signals
|
||||
allow lmkd appdomain:process { setsched sigkill };
|
||||
# setsched and send kill signals to any registered process
|
||||
allow lmkd domain:process { setsched sigkill };
|
||||
# TODO: delete this line b/131761776
|
||||
allow lmkd kernel:process { setsched };
|
||||
|
||||
|
@ -69,3 +67,4 @@ unix_socket_send(lmkd, statsdw, statsd)
|
|||
|
||||
# never honor LD_PRELOAD
|
||||
neverallow * lmkd:process noatsecure;
|
||||
neverallow lmkd self:global_capability_class_set sys_ptrace;
|
||||
|
|
Loading…
Reference in a new issue