blob: 32bc185f0a38a24546c5babb5f5edddcb1df397d [file] [log] [blame]
Stephen Smalley2dd4e512012-01-04 12:33:27 -05001# debugger interface
2type debuggerd, domain;
3type debuggerd_exec, exec_type, file_type;
4
5init_daemon_domain(debuggerd)
Stephen Smalley258cb172013-10-29 14:42:35 -04006typeattribute debuggerd mlstrustedsubject;
7allow debuggerd self:capability { dac_override sys_ptrace chown kill fowner };
8allow debuggerd self:capability2 { syslog };
9allow debuggerd domain:dir r_dir_perms;
10allow debuggerd domain:file r_file_perms;
Stephen Smalley95e08422013-12-09 12:49:47 -050011allow debuggerd { domain -init -ueventd -watchdogd -healthd -adbd }:process ptrace;
Stephen Smalley258cb172013-10-29 14:42:35 -040012security_access_policy(debuggerd)
13allow debuggerd system_data_file:dir create_dir_perms;
14allow debuggerd system_data_file:dir relabelfrom;
Nick Kralevich08f01a32013-07-12 15:38:41 -070015relabelto_domain(debuggerd)
16allow debuggerd tombstone_data_file:dir relabelto;
Stephen Smalley258cb172013-10-29 14:42:35 -040017allow debuggerd tombstone_data_file:dir create_dir_perms;
18allow debuggerd tombstone_data_file:file create_file_perms;
19allow debuggerd domain:process { sigstop signal };
20allow debuggerd exec_type:file r_file_perms;
21# Access app library
22allow debuggerd system_data_file:file open;
Stephen Smalley45ba6652013-09-27 10:24:49 -040023
24# Connect to system_server via /data/system/ndebugsocket.
25unix_socket_connect(debuggerd, system_ndebug, system_server)
Mark Salyzyn8ed750e2013-11-12 15:34:52 -080026
Nick Kralevich116a20f2014-02-05 16:36:25 -080027userdebug_or_eng(`
28 allow debuggerd input_device:dir r_dir_perms;
29 allow debuggerd input_device:chr_file rw_file_perms;
30')
31
Mark Salyzyn8ed750e2013-11-12 15:34:52 -080032# logd access
33read_logd(debuggerd)