d22987b4da
Motivation: Domain is overly permissive. Start removing permissions from domain and assign them to the domain_deprecated attribute. Domain_deprecated and domain can initially be assigned to all domains. The goal is to not assign domain_deprecated to new domains and to start removing domain_deprecated where it is not required or reassigning the appropriate permissions to the inheriting domain when necessary. Bug: 25433265 Change-Id: I8b11cb137df7bdd382629c98d916a73fe276413c
37 lines
1 KiB
Text
37 lines
1 KiB
Text
# lmkd low memory killer daemon
|
|
type lmkd, domain, domain_deprecated, mlstrustedsubject;
|
|
type lmkd_exec, exec_type, file_type;
|
|
|
|
init_daemon_domain(lmkd)
|
|
|
|
allow lmkd self:capability { dac_override sys_resource kill };
|
|
|
|
# lmkd locks itself in memory, to prevent it from being
|
|
# swapped out and unable to kill other memory hogs.
|
|
# system/core commit b28ff9131363f7b4a698990da5748b2a88c3ed35
|
|
# b/16236289
|
|
allow lmkd self:capability ipc_lock;
|
|
|
|
## Open and write to /proc/PID/oom_score_adj
|
|
## TODO: maybe scope this down?
|
|
r_dir_file(lmkd, appdomain)
|
|
allow lmkd appdomain:file write;
|
|
r_dir_file(lmkd, system_server)
|
|
allow lmkd system_server:file write;
|
|
|
|
## Writes to /sys/module/lowmemorykiller/parameters/minfree
|
|
allow lmkd sysfs_lowmemorykiller:file w_file_perms;
|
|
|
|
# Send kill signals
|
|
allow lmkd appdomain:process sigkill;
|
|
|
|
# Clean up old cgroups
|
|
allow lmkd cgroup:dir { remove_name rmdir };
|
|
|
|
# Set self to SCHED_FIFO
|
|
allow lmkd self:capability sys_nice;
|
|
|
|
### neverallow rules
|
|
|
|
# never honor LD_PRELOAD
|
|
neverallow domain lmkd:process noatsecure;
|