blob: 73e3f58183f3831dd478b235691ff08552d184f7 [file] [log] [blame]
Mark Salyzyne4b3e0b2018-02-20 11:02:39 -08001# llkd Live LocK Daemon
2typeattribute llkd coredomain;
3
4init_daemon_domain(llkd)
5
Mark Salyzyn275ea122018-08-07 16:03:47 -07006get_prop(llkd, llkd_prop)
7
Mark Salyzyne4b3e0b2018-02-20 11:02:39 -08008allow llkd self:global_capability_class_set kill;
Mark Salyzyn275ea122018-08-07 16:03:47 -07009userdebug_or_eng(`
10 allow llkd self:global_capability_class_set sys_ptrace;
11 allow llkd self:global_capability_class_set dac_override;
12')
Mark Salyzyne4b3e0b2018-02-20 11:02:39 -080013
14# llkd optionally locks itself in memory, to prevent it from being
15# swapped out and unable to discover a kernel in live-lock state.
16allow llkd self:global_capability_class_set ipc_lock;
17
18# Send kill signals to _anyone_ suffering from Live Lock
19allow llkd domain:process sigkill;
20
Mark Salyzyn275ea122018-08-07 16:03:47 -070021# read stack to check for Live Lock
22userdebug_or_eng(`
23 allow llkd {
24 domain
25 -keystore
26 -init
27 -llkd
28 }:process ptrace;
29')
30
Mark Salyzyne4b3e0b2018-02-20 11:02:39 -080031# live lock watchdog process allowed to look through /proc/
32allow llkd domain:dir r_dir_perms;
33allow llkd domain:file r_file_perms;
34allow llkd domain:lnk_file read;
35# Set /proc/sys/kernel/hung_task_*
36allow llkd proc_hung_task:file rw_file_perms;
37
38# live lock watchdog process allowed to dump process trace and
39# reboot because orderly shutdown may not be possible.
40allow llkd proc_sysrq:file w_file_perms;
41allow llkd kmsg_device:chr_file w_file_perms;
42
43### neverallow rules
44
45neverallow { domain -init } llkd:process { dyntransition transition };
Mark Salyzyn275ea122018-08-07 16:03:47 -070046neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace;
Mark Salyzyne4b3e0b2018-02-20 11:02:39 -080047
48# never honor LD_PRELOAD
49neverallow * llkd:process noatsecure;