Searched refs:crash_dump (Results 1 – 24 of 24) sorted by relevance
/system/sepolicy/prebuilts/api/26.0/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 allow crash_dump { 7 -crash_dump 12 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 14 dontaudit crash_dump self:capability { sys_ptrace }; 17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 21 allow crash_dump domain:fd use; 25 allow crash_dump domain:fifo_file { write append }; 27 r_dir_file(crash_dump, domain) 28 allow crash_dump exec_type:file r_file_perms; [all …]
|
D | logd.te | 56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
|
D | domain.te | 774 -crash_dump 778 # Processes that can't exec crash_dump 784 -crash_dump 1018 # Enforce AT_SECURE for executing crash_dump. 1019 neverallow domain crash_dump:process noatsecure;
|
D | te_macros | 465 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|
/system/sepolicy/public/ |
D | crash_dump.te | 1 type crash_dump, domain; 4 # crash_dump might inherit CAP_SYS_PTRACE from a privileged process, 6 dontaudit crash_dump self:capability { sys_ptrace }; 9 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill }; 11 # Let crash_dump write to /dev/kmsg_debug crashes that happen before logd comes up. 12 allow crash_dump kmsg_debug_device:chr_file { open append }; 16 allow crash_dump domain:fd use; 20 allow crash_dump domain:fifo_file { write append }; 22 r_dir_file(crash_dump, domain) 23 allow crash_dump exec_type:file r_file_perms; [all …]
|
D | hal_configstore.te | 11 # hal_configstore runs with a strict seccomp filter. Use crash_dump's
|
D | logd.te | 56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
|
D | domain.te | 769 -crash_dump 773 # Processes that can't exec crash_dump 1011 # Enforce AT_SECURE for executing crash_dump. 1012 neverallow domain crash_dump:process noatsecure;
|
D | te_macros | 475 # Fallback crash handling for processes that can't exec crash_dump (e.g. because of seccomp).
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 3 domain_auto_trans(domain, crash_dump_exec, crash_dump); 4 allow domain crash_dump:process sigchld;
|
D | crash_dump.te | 1 typeattribute crash_dump coredomain;
|
D | webview_zygote.te | 60 # Only setcon() transitions, no exec() based transitions, except for crash_dump. 61 neverallow webview_zygote { domain -crash_dump }:process transition;
|
D | adbd.te | 137 # No transitions from adbd to non-shell, non-crash_dump domains. adbd only ever 140 neverallow adbd { domain -crash_dump -shell }:process transition;
|
D | system_server.te | 13 # Create a socket for connections from crash_dump. 43 allow system_server crash_dump:process sigkill; 698 # transitioning to the crash_dump domain when a crash occurs. 699 neverallow system_server { domain -crash_dump }:process transition; 702 # Only allow crash_dump to connect to system_ndebug_socket. 703 neverallow { domain -init -system_server -crash_dump } system_ndebug_socket:sock_file { open write …
|
D | app.te | 406 # Exception for crash_dump. 407 neverallow { appdomain -shell userdebug_or_eng(`-su') } { domain -appdomain -crash_dump }:process
|
/system/sepolicy/private/ |
D | domain.te | 1 # Transition to crash_dump when /system/bin/crash_dump* is executed. 3 domain_auto_trans(domain, crash_dump_exec, crash_dump); 4 allow domain crash_dump:process sigchld;
|
D | crash_dump.te | 1 typeattribute crash_dump coredomain; 3 allow crash_dump { 5 -crash_dump
|
D | webview_zygote.te | 64 # Only setcon() transitions, no exec() based transitions, except for crash_dump. 65 neverallow webview_zygote { domain -crash_dump }:process transition;
|
D | adbd.te | 139 # No transitions from adbd to non-shell, non-crash_dump domains. adbd only ever 142 neverallow adbd { domain -crash_dump -shell }:process transition;
|
D | system_server.te | 13 # Create a socket for connections from crash_dump. 43 allow system_server crash_dump:process sigkill; 729 # transitioning to the crash_dump domain when a crash occurs. 730 neverallow system_server { domain -crash_dump }:process transition; 733 # Only allow crash_dump to connect to system_ndebug_socket. 734 neverallow { domain -init -system_server -crash_dump } system_ndebug_socket:sock_file { open write …
|
D | app.te | 417 # Exception for crash_dump. 418 neverallow { appdomain -shell userdebug_or_eng(`-su') } { domain -appdomain -crash_dump }:process
|
/system/core/debuggerd/ |
D | Android.bp | 235 name: "crash_dump", 237 "crash_dump.cpp",
|
D | debuggerd_test.cpp | 572 TEST(crash_dump, zombie) { in TEST() argument
|
/system/sepolicy/private/compat/26.0/ |
D | 26.0.cil | 115 (typeattributeset crash_dump_26_0 (crash_dump))
|