diff --git a/app.te b/app.te index 37ab9a30569b9815e10642e3a304258cb1516568..c670c9dd818a8ddbad8c55da64bf9421a8e7a239 100644 --- a/app.te +++ b/app.te @@ -19,9 +19,6 @@ allow appdomain zygote:fd use; # valgrind needs mmap exec for zygote allow appdomain zygote_exec:file rx_file_perms; -# gdbserver for ndk-gdb ptrace attaches to app process. -allow appdomain self:process ptrace; - # Read system properties managed by zygote. allow appdomain zygote_tmpfs:file read; diff --git a/isolated_app.te b/isolated_app.te index 330f0af3861b0554604c86d0d02a84ea53766ebc..463f02d070ef89b1443bdba6730e27d245c99159 100644 --- a/isolated_app.te +++ b/isolated_app.te @@ -21,6 +21,13 @@ allow isolated_app display_service:service_manager find; # only allow unprivileged socket ioctl commands allow isolated_app self:{ rawip_socket tcp_socket udp_socket } unpriv_sock_ioctls; +# Google Breakpad (crash reporter for Chrome) relies on ptrace +# functionality. Without the ability to ptrace, the crash reporter +# tool is broken. +# b/20150694 +# https://code.google.com/p/chromium/issues/detail?id=475270 +allow isolated_app self:process ptrace; + ##### ##### Neverallow ##### diff --git a/untrusted_app.te b/untrusted_app.te index eb3005a99c743ce5c3b819300d4e70e434718b20..bbdfdaf7785e054c46e03f1e13454d9dbb486a17 100644 --- a/untrusted_app.te +++ b/untrusted_app.te @@ -110,6 +110,9 @@ userdebug_or_eng(` allow untrusted_app perfprofd_data_file:dir r_dir_perms; ') +# gdbserver for ndk-gdb ptrace attaches to app process. +allow untrusted_app self:process ptrace; + # Programs routinely attempt to scan through /system, looking # for files. Suppress the denials when they occur. dontaudit untrusted_app exec_type:file getattr;