diff --git a/debuggerd.te b/debuggerd.te
index 30204f20e25fb6d5ce75454df662d606dc4d5f97..6bbeac4a6dfe4a9af38a2155930edd13c31b35a4 100644
--- a/debuggerd.te
+++ b/debuggerd.te
@@ -9,7 +9,7 @@ allow debuggerd self:capability2 { syslog };
 allow debuggerd domain:dir r_dir_perms;
 allow debuggerd domain:file r_file_perms;
 allow debuggerd domain:lnk_file read;
-allow debuggerd { domain -init -ueventd -watchdogd -healthd -adbd }:process ptrace;
+allow debuggerd { domain -init -ueventd -watchdogd -healthd -adbd -keystore }:process ptrace;
 security_access_policy(debuggerd)
 allow debuggerd system_data_file:dir create_dir_perms;
 allow debuggerd system_data_file:dir relabelfrom;
diff --git a/keystore.te b/keystore.te
index e92efaa4fd9c7f012be7fdf6648ea21f121028f1..8aa1d7d4a3fec69b468d483a42fdc2de80ffd9d2 100644
--- a/keystore.te
+++ b/keystore.te
@@ -15,7 +15,7 @@ allow keystore tee:unix_stream_socket connectto;
 ###
 ### Neverallow rules
 ###
-### Protect our files from others
+### Protect ourself from others
 ###
 
 neverallow { domain -keystore } keystore_data_file:dir ~{ open create read getattr setattr search relabelto };
@@ -23,3 +23,5 @@ neverallow { domain -keystore } keystore_data_file:notdevfile_class_set ~{ relab
 
 neverallow { domain -keystore -init -kernel -recovery } keystore_data_file:dir *;
 neverallow { domain -keystore -init -kernel -recovery } keystore_data_file:notdevfile_class_set *;
+
+neverallow domain keystore:process ptrace;