Skip to content
Snippets Groups Projects
Commit f1554f15 authored by Jeff Vander Stoep's avatar Jeff Vander Stoep
Browse files

crash_dump: disallow ptrace of TCB components

Remove permissions and add neverallow assertion.

Bug: 110107376
Test: kill -6 <components excluded from ptrace>
Change-Id: If8b9c932af03a551e40e786d591544ecdd4e5c98
parent b1293b33
No related branches found
No related tags found
No related merge requests found
typeattribute crash_dump coredomain;
allow crash_dump {
domain
-bpfloader
-crash_dump
-init
-kernel
-keystore
-logd
-ueventd
-vendor_init
-vold
}:process { ptrace signal sigchld sigstop sigkill };
neverallow crash_dump {
bpfloader
init
kernel
keystore
logd
userdebug_or_eng(`-logd')
ueventd
vendor_init
vold
}:process { ptrace signal sigstop sigkill };
type crash_dump, domain;
type crash_dump_exec, exec_type, file_type;
allow crash_dump {
domain
-init
-crash_dump
-keystore
-logd
}:process { ptrace signal sigchld sigstop sigkill };
# crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
# which will result in an audit log even when it's allowed to trace.
dontaudit crash_dump self:global_capability_class_set { sys_ptrace };
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment