Allow debuggerd execmem on debuggable domains

In anticipation of fixing a loophole in the Linux kernel that allows
circumventing the execmem permission by using the ptrace interface,
this patch grants execmem permission on debuggable domains to
debuggerd. This will be required for setting software break points
once the kernel has been fixed.

Bug: 31000401
Change-Id: I9b8d5853b643d24b94d36e2adbcb135dbaef8b1e
1 file changed
tree: fb90e17cf3a7c0dbe3630fa4a03a6e72bd788560
  1. tools/
  2. access_vectors
  3. adbd.te
  4. Android.mk
  5. app.te
  6. atrace.te
  7. attributes
  8. audioserver.te
  9. autoplay_app.te
  10. binderservicedomain.te
  11. blkid.te
  12. blkid_untrusted.te
  13. bluetooth.te
  14. bluetoothdomain.te
  15. boot_control_hal.te
  16. bootanim.te
  17. bootstat.te
  18. cameraserver.te
  19. clatd.te
  20. CleanSpec.mk
  21. cppreopts.te
  22. debuggerd.te
  23. device.te
  24. dex2oat.te
  25. dhcp.te
  26. dnsmasq.te
  27. domain.te
  28. domain_deprecated.te
  29. drmserver.te
  30. dumpstate.te
  31. file.te
  32. file_contexts
  33. file_contexts_asan
  34. fingerprintd.te
  35. fs_use
  36. fsck.te
  37. fsck_untrusted.te
  38. gatekeeperd.te
  39. genfs_contexts
  40. global_macros
  41. hci_attach.te
  42. healthd.te
  43. hostapd.te
  44. hwservicemanager.te
  45. idmap.te
  46. init.te
  47. initial_sid_contexts
  48. initial_sids
  49. inputflinger.te
  50. install_recovery.te
  51. installd.te
  52. ioctl_defines
  53. ioctl_macros
  54. isolated_app.te
  55. kernel.te
  56. keys.conf
  57. keystore.te
  58. lmkd.te
  59. logd.te
  60. mac_permissions.xml
  61. mdnsd.te
  62. mediacodec.te
  63. mediadrmserver.te
  64. mediaextractor.te
  65. mediaserver.te
  66. mls
  67. mls_macros
  68. MODULE_LICENSE_PUBLIC_DOMAIN
  69. mtp.te
  70. net.te
  71. netd.te
  72. neverallow_macros
  73. nfc.te
  74. NOTICE
  75. otapreopt_chroot.te
  76. otapreopt_slot.te
  77. perfprofd.te
  78. platform_app.te
  79. policy_capabilities
  80. port_contexts
  81. postinstall.te
  82. postinstall_dexopt.te
  83. ppp.te
  84. preopt2cachename.te
  85. priv_app.te
  86. profman.te
  87. property.te
  88. property_contexts
  89. racoon.te
  90. radio.te
  91. README
  92. recovery.te
  93. recovery_persist.te
  94. recovery_refresh.te
  95. rild.te
  96. roles
  97. runas.te
  98. sdcardd.te
  99. seapp_contexts
  100. security_classes
  101. service.te
  102. service_contexts
  103. servicemanager.te
  104. sgdisk.te
  105. shared_relro.te
  106. shell.te
  107. slideshow.te
  108. su.te
  109. surfaceflinger.te
  110. system_app.te
  111. system_server.te
  112. te_macros
  113. tee.te
  114. toolbox.te
  115. tzdatacheck.te
  116. ueventd.te
  117. uncrypt.te
  118. untrusted_app.te
  119. update_engine.te
  120. update_engine_common.te
  121. update_verifier.te
  122. users
  123. vdc.te
  124. vold.te
  125. watchdogd.te
  126. wificond.te
  127. wpa.te
  128. zygote.te