Home
last modified time | relevance | path

Searched refs:crash_dump (Results 1 – 24 of 24) sorted by relevance

/system/sepolicy/prebuilts/api/26.0/public/
Dcrash_dump.te1 type crash_dump, domain;
4 allow crash_dump {
7 -crash_dump
12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
14 dontaudit crash_dump self:capability { sys_ptrace };
17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
21 allow crash_dump domain:fd use;
25 allow crash_dump domain:fifo_file { write append };
27 r_dir_file(crash_dump, domain)
28 allow crash_dump exec_type:file r_file_perms;
[all …]
Dlogd.te56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
Ddomain.te774 -crash_dump
778 # Processes that can't exec crash_dump
784 -crash_dump
1018 # Enforce AT_SECURE for executing crash_dump.
1019 neverallow domain crash_dump:process noatsecure;
Dte_macros465 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
/system/sepolicy/public/
Dcrash_dump.te1 type crash_dump, domain;
4 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process,
6 dontaudit crash_dump self:capability { sys_ptrace };
9 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
11 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up.
12 allow crash_dump kmsg_debug_device:chr_file { open append };
16 allow crash_dump domain:fd use;
20 allow crash_dump domain:fifo_file { write append };
22 r_dir_file(crash_dump, domain)
23 allow crash_dump exec_type:file r_file_perms;
[all …]
Dhal_configstore.te11 # hal_configstore runs with a strict seccomp filter. Use crash_dump's
Dlogd.te56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
Ddomain.te769 -crash_dump
773 # Processes that can't exec crash_dump
1011 # Enforce AT_SECURE for executing crash_dump.
1012 neverallow domain crash_dump:process noatsecure;
Dte_macros475 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
/system/sepolicy/prebuilts/api/26.0/private/
Ddomain.te1 # Transition to crash_dump when /system/bin/crash_dump* is executed.
3 domain_auto_trans(domain, crash_dump_exec, crash_dump);
4 allow domain crash_dump:process sigchld;
Dcrash_dump.te1 typeattribute crash_dump coredomain;
Dwebview_zygote.te60 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
61 neverallow webview_zygote { domain -crash_dump }:process transition;
Dadbd.te137 # No transitions from adbd to non-shell, non-crash_dump domains. adbd only ever
140 neverallow adbd { domain -crash_dump -shell }:process transition;
Dsystem_server.te13 # Create a socket for connections from crash_dump.
43 allow system_server crash_dump:process sigkill;
698 # transitioning to the crash_dump domain when a crash occurs.
699 neverallow system_server { domain -crash_dump }:process transition;
702 # Only allow crash_dump to connect to system_ndebug_socket.
703 neverallow { domain -init -system_server -crash_dump } system_ndebug_socket:sock_file { open write …
Dapp.te406 # Exception for crash_dump.
407 neverallow { appdomain -shell userdebug_or_eng(`-su') } { domain -appdomain -crash_dump }:process
/system/sepolicy/private/
Ddomain.te1 # Transition to crash_dump when /system/bin/crash_dump* is executed.
3 domain_auto_trans(domain, crash_dump_exec, crash_dump);
4 allow domain crash_dump:process sigchld;
Dcrash_dump.te1 typeattribute crash_dump coredomain;
3 allow crash_dump {
5 -crash_dump
Dwebview_zygote.te64 # Only setcon() transitions, no exec() based transitions, except for crash_dump.
65 neverallow webview_zygote { domain -crash_dump }:process transition;
Dadbd.te139 # No transitions from adbd to non-shell, non-crash_dump domains. adbd only ever
142 neverallow adbd { domain -crash_dump -shell }:process transition;
Dsystem_server.te13 # Create a socket for connections from crash_dump.
43 allow system_server crash_dump:process sigkill;
729 # transitioning to the crash_dump domain when a crash occurs.
730 neverallow system_server { domain -crash_dump }:process transition;
733 # Only allow crash_dump to connect to system_ndebug_socket.
734 neverallow { domain -init -system_server -crash_dump } system_ndebug_socket:sock_file { open write …
Dapp.te417 # Exception for crash_dump.
418 neverallow { appdomain -shell userdebug_or_eng(`-su') } { domain -appdomain -crash_dump }:process
/system/core/debuggerd/
DAndroid.bp235 name: "crash_dump",
237 "crash_dump.cpp",
Ddebuggerd_test.cpp572 TEST(crash_dump, zombie) { in TEST() argument
/system/sepolicy/private/compat/26.0/
D26.0.cil115 (typeattributeset crash_dump_26_0 (crash_dump))