blob: 8d225523c2142e0e864b60bba77b97406b02afb0 [file] [log] [blame]
Alex Klyubinf5446eb2017-03-23 14:27:32 -07001typeattribute lmkd coredomain;
Steven Moreland65981752022-02-10 00:32:44 +00002typeattribute lmkd bpfdomain;
Alex Klyubinf5446eb2017-03-23 14:27:32 -07003
dcashmancc39f632016-07-22 13:13:11 -07004init_daemon_domain(lmkd)
Inseob Kim55e5c9b2020-03-04 17:20:35 +09005
6# Set sys.lmk.* properties.
7set_prop(lmkd, system_lmk_prop)
Suren Baghdasaryanb221e662020-05-05 12:41:02 -07008
9# Set lmkd.* properties.
10set_prop(lmkd, lmkd_prop)
11
Suren Baghdasaryan592e06c2021-08-04 12:31:43 -070012# Get persist.device_config.lmk_native.* properties.
13get_prop(lmkd, device_config_lmkd_native_prop)
14
Carlos Galoea1bd5d2024-03-12 20:04:41 +000015# Needed for reading tracepoint ids in order to attach bpf programs.
16allow lmkd debugfs_tracing:file r_file_perms;
17allow lmkd self:perf_event { cpu kernel open write };
18
Suren Baghdasaryanea2941b2021-05-27 18:22:41 -070019allow lmkd fs_bpf:file read;
Carlos Galoea1bd5d2024-03-12 20:04:41 +000020allow lmkd bpfloader:bpf { map_read map_write prog_run };
21
22# Needed for polling directly from the bpf ring buffer's fd
23allow lmkd fs_bpf_lmkd_memevents_rb:file { read write };
24allow lmkd fs_bpf_lmkd_memevents_prog:file read;
Suren Baghdasaryanea2941b2021-05-27 18:22:41 -070025
Inseob Kim75806ef2024-03-27 17:18:41 +090026allow lmkd self:global_capability_class_set { dac_override dac_read_search sys_resource kill };
27
28# lmkd locks itself in memory, to prevent it from being
29# swapped out and unable to kill other memory hogs.
30# system/core commit b28ff9131363f7b4a698990da5748b2a88c3ed35
31# b/16236289
32allow lmkd self:global_capability_class_set ipc_lock;
33
34## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
35## TODO: maybe scope this down?
36r_dir_file(lmkd, domain)
37allow lmkd domain:file write;
38
39## Writes to /sys/module/lowmemorykiller/parameters/minfree
40r_dir_file(lmkd, sysfs_lowmemorykiller)
41allow lmkd sysfs_lowmemorykiller:file w_file_perms;
42
43# setsched and send kill signals to any registered process
44allow lmkd domain:process { setsched sigkill };
45# TODO: delete this line b/131761776
46allow lmkd kernel:process { setsched };
47
48# Clean up old cgroups
49allow lmkd cgroup:dir { remove_name rmdir };
50allow lmkd cgroup_v2:dir { remove_name rmdir };
51
52# Allow to read memcg stats
53allow lmkd cgroup:file r_file_perms;
54allow lmkd cgroup_v2:file r_file_perms;
55
56# Set self to SCHED_FIFO
57allow lmkd self:global_capability_class_set sys_nice;
58
59allow lmkd proc_zoneinfo:file r_file_perms;
60allow lmkd proc_vmstat:file r_file_perms;
61
62# live lock watchdog process allowed to look through /proc/
63allow lmkd domain:dir { search open read };
64allow lmkd domain:file { open read };
65
66# live lock watchdog process allowed to dump process trace and
67# reboot because orderly shutdown may not be possible.
68allow lmkd proc_sysrq:file rw_file_perms;
69
70# Read /proc/lowmemorykiller
71allow lmkd proc_lowmemorykiller:file r_file_perms;
72
73# Read /proc/meminfo
74allow lmkd proc_meminfo:file r_file_perms;
75
76# Read /proc/pressure/cpu and /proc/pressure/io
77allow lmkd proc_pressure_cpu:file r_file_perms;
78allow lmkd proc_pressure_io:file r_file_perms;
79
80# Read/Write /proc/pressure/memory
81allow lmkd proc_pressure_mem:file rw_file_perms;
82
83# Allow lmkd to connect during reinit.
84allow lmkd lmkd_socket:sock_file write;
85
86# Allow lmkd to write to statsd.
87unix_socket_send(lmkd, statsdw, statsd)
88
89### neverallow rules
90
91# never honor LD_PRELOAD
92neverallow * lmkd:process noatsecure;
93neverallow lmkd self:global_capability_class_set sys_ptrace;
Inseob Kim85acf6e2021-03-10 10:42:23 +090094neverallow { domain -init -lmkd -vendor_init } lmkd_prop:property_service set;
Carlos Galoea1bd5d2024-03-12 20:04:41 +000095neverallow lmkd self:perf_event ~{ cpu kernel open write };