Searched refs:crash_dump (Results 1 – 25 of 81) sorted by relevance
1234
/system/sepolicy/prebuilts/api/27.0/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 allow crash_dump { 7 -crash_dump 12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 14 dontaudit crash_dump self:capability { sys_ptrace }; 17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 19 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up. 20 allow crash_dump kmsg_debug_device:chr_file { open append }; 24 allow crash_dump domain:fd use; 28 allow crash_dump domain:fifo_file { write append }; [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 6 dontaudit crash_dump self:global_capability_class_set { sys_ptrace }; 9 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 11 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up. 12 allow crash_dump kmsg_debug_device:chr_file { open append }; 16 allow crash_dump domain:fd use; 19 allow crash_dump domain:fifo_file { read write }; 22 allow crash_dump domain:fifo_file { append }; 24 r_dir_file(crash_dump, domain) [all …]
|
/system/sepolicy/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 6 dontaudit crash_dump self:global_capability_class_set { sys_ptrace }; 9 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 11 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up. 12 allow crash_dump kmsg_debug_device:chr_file { open append }; 16 allow crash_dump domain:fd use; 19 allow crash_dump domain:fifo_file { read write }; 22 allow crash_dump domain:fifo_file { append }; 24 r_dir_file(crash_dump, domain) [all …]
|
D | apexd.te | 12 neverallow { domain userdebug_or_eng(`-crash_dump') } apexd:process ptrace;
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 6 dontaudit crash_dump self:global_capability_class_set { sys_ptrace }; 9 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 11 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up. 12 allow crash_dump kmsg_debug_device:chr_file { open append }; 16 allow crash_dump domain:fd use; 19 allow crash_dump domain:fifo_file { read write }; 22 allow crash_dump domain:fifo_file { append }; 24 r_dir_file(crash_dump, domain) [all …]
|
D | apexd.te | 12 neverallow { domain userdebug_or_eng(`-crash_dump') } apexd:process ptrace;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 allow crash_dump { 7 -crash_dump 12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 14 dontaudit crash_dump self:capability { sys_ptrace }; 17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 21 allow crash_dump domain:fd use; 25 allow crash_dump domain:fifo_file { write append }; 27 r_dir_file(crash_dump, domain) 28 allow crash_dump exec_type:file r_file_perms; [all …]
|
/system/core/debuggerd/ |
D | Android.mk | 4 LOCAL_MODULE := crash_dump.policy 9 LOCAL_MODULE_STEM_32 := crash_dump.arm.policy 10 LOCAL_MODULE_STEM_64 := crash_dump.arm64.policy 14 LOCAL_MODULE_STEM_32 := crash_dump.x86.policy 15 LOCAL_MODULE_STEM_64 := crash_dump.x86_64.policy 19 LOCAL_SRC_FILES_arm := seccomp_policy/crash_dump.arm.policy 20 LOCAL_SRC_FILES_arm64 := seccomp_policy/crash_dump.arm64.policy 21 LOCAL_SRC_FILES_x86 := seccomp_policy/crash_dump.x86.policy 22 LOCAL_SRC_FILES_x86_64 := seccomp_policy/crash_dump.x86_64.policy
|
D | Android.bp | 262 name: "crash_dump", 264 "crash_dump.cpp",
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | crash_dump.te | 1 typeattribute crash_dump coredomain; 4 dontaudit crash_dump { devpts dev_type }:chr_file { read write }; 6 allow crash_dump { 10 -crash_dump 21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill }; 31 neverallow crash_dump { 48 neverallow crash_dump self:process ptrace; 49 neverallow crash_dump gpu_device:chr_file *;
|
D | app.te | 11 # Exception for crash_dump to allow for app crash reporting. 15 { domain -appdomain -crash_dump -rs }:process { transition };
|
D | bug_map | 25 system_server crash_dump process 73128755
|
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump); 6 allow domain crash_dump:process sigchld;
|
/system/sepolicy/private/ |
D | crash_dump.te | 1 typeattribute crash_dump coredomain; 4 dontaudit crash_dump { devpts dev_type }:chr_file { read write }; 6 allow crash_dump { 10 -crash_dump 21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill }; 31 neverallow crash_dump { 48 neverallow crash_dump self:process ptrace; 49 neverallow crash_dump gpu_device:chr_file *;
|
D | app.te | 11 # Exception for crash_dump to allow for app crash reporting. 15 { domain -appdomain -crash_dump -rs }:process { transition };
|
D | bug_map | 25 system_server crash_dump process 73128755
|
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 5 domain_auto_trans({ domain userdebug_or_eng(`-su') }, crash_dump_exec, crash_dump); 6 allow domain crash_dump:process sigchld;
|
/system/core/debuggerd/seccomp_policy/ |
D | generate.sh | 7 $CPP -D__arm__ -o crash_dump.arm.policy 8 $CPP -D__aarch64__ -D__LP64__ -o crash_dump.arm64.policy 9 $CPP -D__i386__ -o crash_dump.x86.policy 10 $CPP -D__x86_64__ -D__LP64__ -o crash_dump.x86_64.policy
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | crash_dump.te | 1 typeattribute crash_dump coredomain; 3 allow crash_dump { 6 -crash_dump
|
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 3 domain_auto_trans(domain, crash_dump_exec, crash_dump); 4 allow domain crash_dump:process sigchld;
|
D | bug_map | 38 system_server crash_dump process 73128755
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 3 domain_auto_trans(domain, crash_dump_exec, crash_dump); 4 allow domain crash_dump:process sigchld;
|
D | crash_dump.te | 1 typeattribute crash_dump coredomain;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 3 domain_auto_trans(domain, crash_dump_exec, crash_dump); 4 allow domain crash_dump:process sigchld;
|
D | crash_dump.te | 1 typeattribute crash_dump coredomain;
|
1234