platform_system_core/debuggerd/seccomp_policy
Mitch Phillips bf2d6dd7d4 Update debuggerd for stack MTE.
Two things need changing for debuggerd_test to pass.

 1. The seccomp policy needs to allow for PROT_MTE (0x20) in both
    mprotect() and mmap(). Stack MTE processes do a mprotect()/mmap() of
    the stack when launching a process.
 2. The fault address and stack pointer need to be untagged when trying
    to figure out the stack overflow cause.

Bug: 320448268
Bug: 292478827
Test: atest debuggerd_test --iterations=10
Change-Id: I56471c32ca40edffbb61b7547bdf2b85a6eb1ff7
2024-02-06 15:18:04 +01:00
..
crash_dump.arm.policy debuggerd: add socksetopt to seccomp policy 2023-09-05 19:29:13 +00:00
crash_dump.arm64.policy Update debuggerd for stack MTE. 2024-02-06 15:18:04 +01:00
crash_dump.policy.def debuggerd: add socksetopt to seccomp policy 2023-09-05 19:29:13 +00:00
crash_dump.riscv64.policy debuggerd: add socksetopt to seccomp policy 2023-09-05 19:29:13 +00:00
crash_dump.x86.policy debuggerd: add socksetopt to seccomp policy 2023-09-05 19:29:13 +00:00
crash_dump.x86_64.policy debuggerd: add socksetopt to seccomp policy 2023-09-05 19:29:13 +00:00
generate.sh Add seccomp policy for riscv64 crash_dump 2022-10-12 22:31:39 +00:00