Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 1 | # debugger interface |
Jeff Vander Stoep | d22987b | 2015-11-03 09:54:39 -0800 | [diff] [blame] | 2 | type debuggerd, domain, domain_deprecated; |
Stephen Smalley | 2dd4e51 | 2012-01-04 12:33:27 -0500 | [diff] [blame] | 3 | type debuggerd_exec, exec_type, file_type; |
| 4 | |
| 5 | init_daemon_domain(debuggerd) |
Stephen Smalley | 258cb17 | 2013-10-29 14:42:35 -0400 | [diff] [blame] | 6 | typeattribute debuggerd mlstrustedsubject; |
Josh Gao | 2b93db7 | 2015-11-17 16:21:38 -0800 | [diff] [blame] | 7 | allow debuggerd self:capability { dac_override sys_ptrace chown kill fowner setuid setgid }; |
Stephen Smalley | 258cb17 | 2013-10-29 14:42:35 -0400 | [diff] [blame] | 8 | allow debuggerd self:capability2 { syslog }; |
| 9 | allow debuggerd domain:dir r_dir_perms; |
| 10 | allow debuggerd domain:file r_file_perms; |
Elliott Hughes | 38138c2 | 2014-05-16 19:14:13 -0700 | [diff] [blame] | 11 | allow debuggerd domain:lnk_file read; |
Nick Kralevich | 2d6fa72 | 2016-04-27 12:32:36 -0700 | [diff] [blame] | 12 | allow debuggerd { |
| 13 | domain |
| 14 | -adbd |
| 15 | -debuggerd |
| 16 | -healthd |
| 17 | -init |
| 18 | -keystore |
| 19 | -ueventd |
| 20 | -watchdogd |
| 21 | }:process { ptrace getattr }; |
Stephen Smalley | 258cb17 | 2013-10-29 14:42:35 -0400 | [diff] [blame] | 22 | security_access_policy(debuggerd) |
Josh Gao | 2b93db7 | 2015-11-17 16:21:38 -0800 | [diff] [blame] | 23 | allow debuggerd tombstone_data_file:dir rw_dir_perms; |
Stephen Smalley | 258cb17 | 2013-10-29 14:42:35 -0400 | [diff] [blame] | 24 | allow debuggerd tombstone_data_file:file create_file_perms; |
dcashman | cd10eb9 | 2014-08-18 17:09:38 -0700 | [diff] [blame] | 25 | allow debuggerd shared_relro_file:dir r_dir_perms; |
| 26 | allow debuggerd shared_relro_file:file r_file_perms; |
Josh Gao | fd841ad | 2016-03-08 18:02:15 -0800 | [diff] [blame] | 27 | allow debuggerd domain:process { sigstop sigkill signal }; |
Stephen Smalley | 258cb17 | 2013-10-29 14:42:35 -0400 | [diff] [blame] | 28 | allow debuggerd exec_type:file r_file_perms; |
| 29 | # Access app library |
| 30 | allow debuggerd system_data_file:file open; |
Christopher Ferris | b51c4dd | 2015-01-18 17:39:53 -0800 | [diff] [blame] | 31 | # Allow debuggerd to redirect a dump_backtrace request to itself. |
| 32 | # This only happens on 64 bit systems, where all requests go to the 64 bit |
| 33 | # debuggerd and get redirected to the 32 bit debuggerd if the process is 32 bit. |
Chien-Yu Chen | e037830 | 2015-12-03 16:10:05 -0800 | [diff] [blame] | 34 | |
Andy Hung | f3bfc96 | 2016-04-13 19:38:29 -0700 | [diff] [blame] | 35 | allow debuggerd { audioserver cameraserver drmserver inputflinger mediacodec mediadrmserver mediaextractor mediaserver sdcardd surfaceflinger }:debuggerd dump_backtrace; |
Stephen Smalley | 45ba665 | 2013-09-27 10:24:49 -0400 | [diff] [blame] | 36 | |
| 37 | # Connect to system_server via /data/system/ndebugsocket. |
| 38 | unix_socket_connect(debuggerd, system_ndebug, system_server) |
Mark Salyzyn | 8ed750e | 2013-11-12 15:34:52 -0800 | [diff] [blame] | 39 | |
Nick Kralevich | 116a20f | 2014-02-05 16:36:25 -0800 | [diff] [blame] | 40 | userdebug_or_eng(` |
| 41 | allow debuggerd input_device:dir r_dir_perms; |
| 42 | allow debuggerd input_device:chr_file rw_file_perms; |
| 43 | ') |
| 44 | |
Mark Salyzyn | 8ed750e | 2013-11-12 15:34:52 -0800 | [diff] [blame] | 45 | # logd access |
| 46 | read_logd(debuggerd) |
Stephen Smalley | ba99249 | 2014-07-24 15:25:43 -0400 | [diff] [blame] | 47 | |
| 48 | # Check SELinux permissions. |
| 49 | selinux_check_access(debuggerd) |