Home
last modified time | relevance | path

Searched refs:sigstop (Results 1 – 15 of 15) sorted by relevance

/system/sepolicy/private/
Dcrash_dump.te19 }:process { ptrace signal sigchld sigstop sigkill };
28 }:process { ptrace signal sigchld sigstop sigkill };
47 allow crash_dump logd:process { ptrace signal sigchld sigstop sigkill };
140 }:process { ptrace signal sigstop sigkill };
Drunas_app.te17 allow runas_app untrusted_app_all:process { ptrace sigkill signal sigstop };
Dupdate_engine_common.te63 allow update_engine_common postinstall:process { signal sigstop sigkill };
Dmls18 mlsconstrain process { sigkill sigstop signal setsched setpgid setcap setrlimit ptrace share }
Daccess_vectors281 sigstop # cannot be caught or ignored
Dproperty.te193 # sigstop property is only used for debugging; should only be set by su which is permissive
Dapp.te584 { sigkill sigstop signal };
Ddomain.te11 sigstop
/system/sepolicy/microdroid/system/private/
Dcrash_dump.te58 }:process { ptrace signal sigchld sigstop sigkill };
63 }:process { ptrace signal sigchld sigstop sigkill };
Daccess_vectors281 sigstop # cannot be caught or ignored
Ddomain.te11 sigstop
/system/core/init/
Dservice.cpp116 static bool ExpandArgsAndExecv(const std::vector<std::string>& args, bool sigstop) { in ExpandArgsAndExecv() argument
132 if (sigstop) { in ExpandArgsAndExecv()
DREADME.md380 `sigstop`
1000 If it is required to debug a service from its very start, the `sigstop` service option is added.
/system/sepolicy/microdroid/reqd_mask/
Daccess_vectors281 sigstop # cannot be caught or ignored
/system/sepolicy/reqd_mask/
Daccess_vectors281 sigstop # cannot be caught or ignored