1 <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
2 "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
5 <allow send_destination="org.tizen.system.crash.livedump"
6 send_interface="org.tizen.system.crash.livedump"
7 send_member="livedump_pid"/>
9 <policy user="crash_worker">
10 <allow own="org.tizen.system.crash.livedump"/>
11 <allow own="org.tizen.system.diagnostics"/>
13 <policy group="priv_livecoredump">
14 <!-- Following section is for services wanting to use livedump api.
15 Thoretically, the <policy group=..> should be enough to support
16 both service and application case. However, this does not work
17 in practice due to dbus-daemon getting group membership from
18 static source (via getgrouplist), while in Tizen it's dynamic,
19 assigned to application by security-manager. Dbus-daemon would
20 need to use SO_PEERGROUP socket option for this to work, but it's
21 supported only in kernels >= 4.13. -->
22 <allow send_destination="org.tizen.system.crash.livedump"
23 send_interface="org.tizen.system.crash.livedump"
24 send_member="livedump_pid"/>
26 <policy context="default">
27 <deny own="org.tizen.system.crash.livedump"/>
28 <deny send_destination="org.tizen.system.crash.livedump"/>
30 <deny own="org.tizen.system.diagnostics"/>
31 <deny send_destination="org.tizen.system.diagnostics"/>
33 <check send_destination="org.tizen.system.crash.livedump"
34 send_interface="org.tizen.system.crash.livedump"
35 send_member="livedump_pid"
36 privilege="http://tizen.org/privilege/internal/livecoredump"/>
38 <check send_destination="org.tizen.system.diagnostics"
39 send_interface="org.tizen.system.diagnostics"
40 send_member="get_file"
41 privilege="http://tizen.org/privilege/internal/default/platform"/>