Searched +full:ptrace +path:sepolicy (Results 51 - 75 of 108) sorted by last modified time

12345

/system/sepolicy/prebuilts/api/28.0/private/
H A Daudioserver.te27 # ptrace to processes in the same domain for memory leak detection
28 allow audioserver self:process ptrace;
H A Ddomain.te6 # Limit ability to ptrace or read sensitive /proc/pid files of processes
H A Dincidentd.te99 # accessing sensitive /proc/PID files, never for using ptrace attach.
100 neverallow incidentd *:process ptrace;
H A Disolated_app.te20 # Google Breakpad (crash reporter for Chrome) relies on ptrace
21 # functionality. Without the ability to ptrace, the crash reporter
25 allow isolated_app self:process ptrace;
H A Dmls14 mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share }
18 mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share }
H A Dperfetto.te52 # ptrace any other process
53 neverallow perfetto domain:process ptrace;
H A Dpriv_app.te17 # webview crash handling depends on self ptrace (b/27697529, b/20150694, b/19277529#comment7)
18 allow priv_app self:process ptrace;
H A Dstoraged.te60 neverallow storaged domain:process ptrace;
H A Dsystem_server.te29 # ptrace to processes in the same domain for debugging crashes.
30 allow system_server self:process ptrace;
860 neverallow system_server { domain -system_server }:process ptrace;
H A Dtraced.te36 # ptrace any other process
37 neverallow traced domain:process ptrace;
H A Dtraced_probes.te72 # ptrace any other app
73 neverallow traced_probes domain:process ptrace;
H A Duntrusted_app_all.te98 # gdbserver for ndk-gdb ptrace attaches to app process.
99 allow untrusted_app_all self:process ptrace;
H A Duntrusted_v2_app.te40 # gdbserver for ndk-gdb ptrace attaches to app process.
41 allow untrusted_v2_app self:process ptrace;
/system/sepolicy/prebuilts/api/28.0/public/
H A Dapp.te418 # ptrace access to non-app domains.
419 neverallow appdomain { domain -appdomain }:process ptrace;
H A Dcrash_dump.te10 }:process { ptrace signal sigchld sigstop sigkill };
17 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
H A Ddomain.te399 # No domain should be allowed to ptrace init.
400 neverallow * init:process ptrace;
H A Ddumpstate.te279 # accessing sensitive /proc/PID files, never for using ptrace attach.
280 neverallow dumpstate *:process ptrace;
H A Dhal_configstore.te68 neverallow hal_configstore_server *:process ptrace;
H A Dkeystore.te35 neverallow * keystore:process ptrace;
H A Dlogd.te52 # ptrace any other app
53 neverallow logd domain:process ptrace;
55 # ... and nobody may ptrace me (except on userdebug or eng builds)
56 neverallow { domain userdebug_or_eng(`-crash_dump') } logd:process ptrace;
H A Dlogpersist.te12 # ptrace any other app
13 neverallow logpersist domain:process ptrace;
H A Dmediaserver.te22 # ptrace to processes in the same domain for memory leak detection
23 allow mediaserver self:process ptrace;
H A Dnetd.te123 # ptrace any other app
124 neverallow netd { domain }:process ptrace;
H A Dperfprofd.te67 neverallow perfprofd domain:process ptrace;
H A Drecovery_persist.te19 # ptrace any other app
20 neverallow recovery_persist domain:process ptrace;

Completed in 1816 milliseconds

12345