1typeattribute lmkd coredomain; 2typeattribute lmkd bpfdomain; 3 4init_daemon_domain(lmkd) 5 6# Set sys.lmk.* properties. 7set_prop(lmkd, system_lmk_prop) 8 9# Set lmkd.* properties. 10set_prop(lmkd, lmkd_prop) 11 12# Get persist.device_config.lmk_native.* properties. 13get_prop(lmkd, device_config_lmkd_native_prop) 14 15# Needed for reading tracepoint ids in order to attach bpf programs. 16allow lmkd debugfs_tracing:file r_file_perms; 17allow lmkd self:perf_event { cpu kernel open write }; 18 19allow lmkd fs_bpf:file read; 20allow lmkd bpfloader:bpf { map_read map_write prog_run }; 21 22# Needed to interact with memevents-eBPF and receive notifications for memory events 23allow lmkd fs_bpf_memevents:file { read write }; 24allow lmkd fs_bpf_memevents:dir search; 25 26allow lmkd self:global_capability_class_set { dac_override dac_read_search sys_resource kill }; 27 28# lmkd locks itself in memory, to prevent it from being 29# swapped out and unable to kill other memory hogs. 30# system/core commit b28ff9131363f7b4a698990da5748b2a88c3ed35 31# b/16236289 32allow lmkd self:global_capability_class_set ipc_lock; 33 34## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns 35## TODO: maybe scope this down? 36r_dir_file(lmkd, domain) 37allow lmkd domain:file write; 38 39## Writes to /sys/module/lowmemorykiller/parameters/minfree 40r_dir_file(lmkd, sysfs_lowmemorykiller) 41allow lmkd sysfs_lowmemorykiller:file w_file_perms; 42 43# setsched and send kill signals to any registered process 44allow lmkd domain:process { setsched sigkill }; 45# TODO: delete this line b/131761776 46allow lmkd kernel:process { setsched }; 47 48# Clean up old cgroups 49allow lmkd cgroup:dir { remove_name rmdir }; 50allow lmkd cgroup_v2:dir { remove_name rmdir }; 51 52# Allow to read memcg stats 53allow lmkd cgroup:file r_file_perms; 54allow lmkd cgroup_v2:file r_file_perms; 55 56# Set self to SCHED_FIFO 57allow lmkd self:global_capability_class_set sys_nice; 58 59allow lmkd proc_zoneinfo:file r_file_perms; 60allow lmkd proc_vmstat:file r_file_perms; 61 62# live lock watchdog process allowed to look through /proc/ 63allow lmkd domain:dir { search open read }; 64allow lmkd domain:file { open read }; 65 66# live lock watchdog process allowed to dump process trace and 67# reboot because orderly shutdown may not be possible. 68allow lmkd proc_sysrq:file rw_file_perms; 69 70# Read /proc/lowmemorykiller 71allow lmkd proc_lowmemorykiller:file r_file_perms; 72 73# Read /proc/meminfo 74allow lmkd proc_meminfo:file r_file_perms; 75 76# Read /proc/pressure/cpu and /proc/pressure/io 77allow lmkd proc_pressure_cpu:file r_file_perms; 78allow lmkd proc_pressure_io:file r_file_perms; 79 80# Read/Write /proc/pressure/memory 81allow lmkd proc_pressure_mem:file rw_file_perms; 82 83# Allow lmkd to connect during reinit. 84allow lmkd lmkd_socket:sock_file write; 85 86# Allow lmkd to write to statsd. 87unix_socket_send(lmkd, statsdw, statsd) 88 89### neverallow rules 90 91# never honor LD_PRELOAD 92neverallow * lmkd:process noatsecure; 93neverallow lmkd self:global_capability_class_set sys_ptrace; 94neverallow { domain -init -lmkd -vendor_init } lmkd_prop:property_service set; 95neverallow lmkd self:perf_event ~{ cpu kernel open write }; 96