Searched refs:kernel (Results 1 – 25 of 112) sorted by relevance
12345
/base/hiviewdfx/hitrace/cmd/config/ |
D | hitrace.cfg | 5 "mount debugfs /sys/kernel/debug /sys/kernel/debug mode=755", 6 "mount tracefs /sys/kernel/tracing /sys/kernel/tracing mode=755" 11 "write /proc/sys/kernel/sched_schedstats 1", 12 "write /sys/kernel/debug/tracing/tracing_on 0", 13 "chmod 0666 /sys/kernel/debug/tracing/buffer_size_kb", 14 "chmod 0666 /sys/kernel/debug/tracing/current_tracer", 15 "chmod 0666 /sys/kernel/debug/tracing/saved_cmdlines_size", 16 "chmod 0666 /sys/kernel/debug/tracing/trace", 17 "chmod 0666 /sys/kernel/debug/tracing/trace_clock", 18 "chmod 0222 /sys/kernel/debug/tracing/trace_marker", [all …]
|
D | hitrace.rc | 15 write /proc/sys/kernel/sched_schedstats 1 17 write /sys/kernel/debug/tracing/tracing_on 0 18 chmod 0666 /sys/kernel/debug/tracing/buffer_size_kb 19 chmod 0666 /sys/kernel/debug/tracing/saved_cmdlines_size 20 chmod 0666 /sys/kernel/debug/tracing/trace 21 chmod 0666 /sys/kernel/debug/tracing/trace_clock 22 chmod 0222 /sys/kernel/debug/tracing/trace_marker 23 chmod 0666 /sys/kernel/debug/tracing/tracing_on 26 chmod 0666 /sys/kernel/debug/tracing/events/binder/binder_lock/enable 27 chmod 0666 /sys/kernel/debug/tracing/events/binder/binder_locked/enable [all …]
|
/base/security/selinux/sepolicy/base/te/ |
D | kernel.te | 14 allow kernel data_file:dir { add_name write create search setattr }; 15 allow kernel data_log:dir { add_name create search setattr write }; 16 allow kernel data_log:file { append create read write open setattr }; 17 allow kernel dev_bbox:chr_file { open write }; 18 allow kernel device:chr_file { create getattr setattr unlink }; 19 allow kernel device:dir { add_name remove_name rmdir search write }; 20 allow kernel init:process { dyntransition }; 21 allow kernel kernel:capability { mknod }; 22 allow kernel kernel:process { setcurrent }; 23 allow kernel pstorefs:dir { open read remove_name search write }; [all …]
|
/base/security/selinux/sepolicy/ohos_policy/kernel/linux/system/ |
D | kernel.te | 14 #domain_auto_transition_pattern(kernel, init_exec, init) 16 #allow kernel tmpfs:chr_file read_file_perms; 17 #allow kernel kernel:process setsched; 18 allow kernel debugfs_usb:dir { search }; 19 allow kernel device:dir { create }; 20 allow kernel sys_file:dir { open }; 21 allow kernel vendor_etc_file:dir { open read search }; 22 allow kernel vendor_etc_file:file { open read };
|
/base/powermgr/powermgr_lite/services/src/power/mini/ |
D | BUILD.gn | 31 "//kernel/liteos_m/components/power", 32 "//kernel/liteos_m/kernel/include", 33 "//kernel/liteos_m/utils", 38 "//kernel/liteos_m/kernel:kernel",
|
/base/hiviewdfx/hidumper_lite/mini/ |
D | BUILD.gn | 23 "//kernel/liteos_m/kernel/include", 24 "//kernel/liteos_m/utils", 25 "//kernel/liteos_m/kernel/arch/include", 26 "//kernel/liteos_m/kal/posix/include"
|
/base/security/selinux/sepolicy/ohos_policy/filemanagement/storage_service/system/ |
D | kernel.te | 14 allow kernel device:blk_file { create getattr setattr unlink }; 15 allow kernel hmdfs:dir { create_dir_perms }; 16 allow kernel hmdfs:dir { create_file_perms }; 17 allow kernel data_service_el2_hmdfs:dir { create_dir_perms }; 18 allow kernel data_service_el2_hmdfs:file { create_file_perms };
|
D | init.te | 40 …kmod="crypto-cryptd(__cts-cbc-aes-ce)" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system p… 41 …="crypto-cryptd(__cts-cbc-aes-ce)-all" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system p… 42 allow init kernel:system { module_request };
|
/base/security/selinux/sepolicy/ohos_policy/developtools/smartperf/system/ |
D | kernel.te | 14 allow kernel init:process { dyntransition }; 15 allow kernel kernel:process { setcurrent }; 16 allow kernel tmpfs:chr_file { write };
|
/base/powermgr/battery_lite/services/src/mini/ |
D | BUILD.gn | 27 "//kernel/liteos_m/components/power", 28 "//kernel/liteos_m/kernel/include", 29 "//kernel/liteos_m/utils",
|
/base/powermgr/powermgr_lite/utils/ |
D | BUILD.gn | 39 "//kernel/liteos_m/kal/posix:posix", 40 "//kernel/liteos_m/kernel:kernel",
|
/base/security/selinux/sepolicy/base/public/ |
D | kernel.te | 14 neverallow * kernel:process { transition dyntransition }; 15 neverallow * kernel:process ptrace; 17 neverallow kernel *:file { entrypoint execute_no_trans };
|
D | init.te | 18 neverallow { domain -kernel } init:process dyntransition; 19 neverallow { domain -kernel } init:process transition; 25 neverallow init self:perf_event { kernel tracepoint read write };
|
/base/update/ota_lite/frameworks/test/unittest/common/ |
D | BUILD.gn | 26 "//kernel/liteos-a/compat/linux/include", 27 "//kernel/liteos-a/kernel/include/", 28 "//kernel/liteos-a/lib/libsec/include",
|
/base/startup/init/services/etc/ |
D | init.without_two_stages.cfg | 10 "write /proc/sys/kernel/sysrq 0", 30 "write /proc/sys/kernel/panic_on_oops 1", 31 "write /proc/sys/kernel/hung_task_timeout_secs 0", 33 "write /proc/sys/kernel/sched_tunable_scaling 0", 34 "write /proc/sys/kernel/sched_latency_ns 10000000", 35 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000", 36 "write /proc/sys/kernel/sched_child_runs_first 0", 37 "write /proc/sys/kernel/randomize_va_space 2", 41 "write /proc/sys/kernel/sched_rt_runtime_us 950000", 42 "write /proc/sys/kernel/sched_rt_period_us 1000000", [all …]
|
D | init.cfg | 10 "write /proc/sys/kernel/sysrq 0", 39 "write /proc/sys/kernel/panic_on_oops 1", 40 "write /proc/sys/kernel/hung_task_timeout_secs 0", 42 "write /proc/sys/kernel/sched_tunable_scaling 0", 43 "write /proc/sys/kernel/sched_latency_ns 10000000", 44 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000", 45 "write /proc/sys/kernel/sched_child_runs_first 0", 46 "write /proc/sys/kernel/randomize_va_space 2", 50 "write /proc/sys/kernel/sched_rt_runtime_us 950000", 51 "write /proc/sys/kernel/sched_rt_period_us 1000000", [all …]
|
/base/startup/init/services/modules/seccomp/ |
D | BUILD.gn | 19 import("//build/ohos/kernel/kernel.gni") 29 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include/asm-arm"), 32 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include"), 51 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include/asm-arm64"), 54 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include"),
|
/base/security/selinux/sepolicy/ohos_policy/filemanagement/user_file_service/system/ |
D | kernel.te | 14 allow kernel debugfs_usb:dir { search }; 15 allow kernel sys_file:dir { open };
|
/base/security/selinux/sepolicy/ohos_policy/multimedia/player/system/ |
D | kernel.te | 14 …d=177 comm="kworker/u8:3" name="xhci" dev="debugfs" ino=962 scontext=u:r:kernel:s0 tcontext=u:obje… 15 allow kernel debugfs_usb:dir { search };
|
/base/startup/init/services/init/lite/ |
D | BUILD.gn | 74 "//kernel/liteos_a/syscall", 75 "//kernel/liteos_a/kernel/include",
|
/base/request/request/test/download/ |
D | download.test.ets | 19 url: 'https://mirror.bjtu.edu.cn/kernel/linux/libs/libc5/libc5.cvs.tar.gz',// Resource address. 29 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.10.91.0.2-1.i386.rpm',// R… 39 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.23-2.11.90.0.24.si… 54 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/autoconf-2.13-10.tar.gz',// Resource … 64 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/automake-1.4-8.3.tar.gz',// Resource … 74 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.10.91.0.2-2.10.91.0.4.diff… 84 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.23-2.11.90.0.24.si… 94 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.5-2.11.90.0.6.diff… 104 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.6-2.11.90.0.7.diff… 114 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.7-2.11.90.0.8.diff… [all …]
|
/base/security/selinux/sepolicy/ohos_policy/bundlemanager/distributed_bundle_framework/system/ |
D | sh.te | 40 allow sh kernel:dir { getattr search }; 41 allow sh kernel:file { open read }; 42 allow sh kernel:system { syslog_read };
|
/base/security/selinux/sepolicy/base/system/ |
D | initial_sid_contexts | 14 sid kernel u:r:kernel:s0
|
/base/security/selinux/sepolicy/ohos_policy/ability/ability_runtime/system/ |
D | sh.te | 53 allow sh kernel:dir { getattr search }; 54 allow sh kernel:file { open read }; 55 allow sh kernel:system { syslog_read }; 56 allow sh kernel:unix_stream_socket { connectto };
|
/base/security/selinux/sepolicy/ohos_policy/kernel/linux/public/ |
D | kernel.te | 14 type kernel, domain;
|
12345