Home
last modified time | relevance | path

Searched refs:kernel (Results 1 – 25 of 112) sorted by relevance

12345

/base/hiviewdfx/hitrace/cmd/config/
Dhitrace.cfg5 "mount debugfs /sys/kernel/debug /sys/kernel/debug mode=755",
6 "mount tracefs /sys/kernel/tracing /sys/kernel/tracing mode=755"
11 "write /proc/sys/kernel/sched_schedstats 1",
12 "write /sys/kernel/debug/tracing/tracing_on 0",
13 "chmod 0666 /sys/kernel/debug/tracing/buffer_size_kb",
14 "chmod 0666 /sys/kernel/debug/tracing/current_tracer",
15 "chmod 0666 /sys/kernel/debug/tracing/saved_cmdlines_size",
16 "chmod 0666 /sys/kernel/debug/tracing/trace",
17 "chmod 0666 /sys/kernel/debug/tracing/trace_clock",
18 "chmod 0222 /sys/kernel/debug/tracing/trace_marker",
[all …]
Dhitrace.rc15 write /proc/sys/kernel/sched_schedstats 1
17 write /sys/kernel/debug/tracing/tracing_on 0
18 chmod 0666 /sys/kernel/debug/tracing/buffer_size_kb
19 chmod 0666 /sys/kernel/debug/tracing/saved_cmdlines_size
20 chmod 0666 /sys/kernel/debug/tracing/trace
21 chmod 0666 /sys/kernel/debug/tracing/trace_clock
22 chmod 0222 /sys/kernel/debug/tracing/trace_marker
23 chmod 0666 /sys/kernel/debug/tracing/tracing_on
26 chmod 0666 /sys/kernel/debug/tracing/events/binder/binder_lock/enable
27 chmod 0666 /sys/kernel/debug/tracing/events/binder/binder_locked/enable
[all …]
/base/security/selinux/sepolicy/base/te/
Dkernel.te14 allow kernel data_file:dir { add_name write create search setattr };
15 allow kernel data_log:dir { add_name create search setattr write };
16 allow kernel data_log:file { append create read write open setattr };
17 allow kernel dev_bbox:chr_file { open write };
18 allow kernel device:chr_file { create getattr setattr unlink };
19 allow kernel device:dir { add_name remove_name rmdir search write };
20 allow kernel init:process { dyntransition };
21 allow kernel kernel:capability { mknod };
22 allow kernel kernel:process { setcurrent };
23 allow kernel pstorefs:dir { open read remove_name search write };
[all …]
/base/security/selinux/sepolicy/ohos_policy/kernel/linux/system/
Dkernel.te14 #domain_auto_transition_pattern(kernel, init_exec, init)
16 #allow kernel tmpfs:chr_file read_file_perms;
17 #allow kernel kernel:process setsched;
18 allow kernel debugfs_usb:dir { search };
19 allow kernel device:dir { create };
20 allow kernel sys_file:dir { open };
21 allow kernel vendor_etc_file:dir { open read search };
22 allow kernel vendor_etc_file:file { open read };
/base/powermgr/powermgr_lite/services/src/power/mini/
DBUILD.gn31 "//kernel/liteos_m/components/power",
32 "//kernel/liteos_m/kernel/include",
33 "//kernel/liteos_m/utils",
38 "//kernel/liteos_m/kernel:kernel",
/base/hiviewdfx/hidumper_lite/mini/
DBUILD.gn23 "//kernel/liteos_m/kernel/include",
24 "//kernel/liteos_m/utils",
25 "//kernel/liteos_m/kernel/arch/include",
26 "//kernel/liteos_m/kal/posix/include"
/base/security/selinux/sepolicy/ohos_policy/filemanagement/storage_service/system/
Dkernel.te14 allow kernel device:blk_file { create getattr setattr unlink };
15 allow kernel hmdfs:dir { create_dir_perms };
16 allow kernel hmdfs:dir { create_file_perms };
17 allow kernel data_service_el2_hmdfs:dir { create_dir_perms };
18 allow kernel data_service_el2_hmdfs:file { create_file_perms };
Dinit.te40 …kmod="crypto-cryptd(__cts-cbc-aes-ce)" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system p…
41 …="crypto-cryptd(__cts-cbc-aes-ce)-all" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system p…
42 allow init kernel:system { module_request };
/base/security/selinux/sepolicy/ohos_policy/developtools/smartperf/system/
Dkernel.te14 allow kernel init:process { dyntransition };
15 allow kernel kernel:process { setcurrent };
16 allow kernel tmpfs:chr_file { write };
/base/powermgr/battery_lite/services/src/mini/
DBUILD.gn27 "//kernel/liteos_m/components/power",
28 "//kernel/liteos_m/kernel/include",
29 "//kernel/liteos_m/utils",
/base/powermgr/powermgr_lite/utils/
DBUILD.gn39 "//kernel/liteos_m/kal/posix:posix",
40 "//kernel/liteos_m/kernel:kernel",
/base/security/selinux/sepolicy/base/public/
Dkernel.te14 neverallow * kernel:process { transition dyntransition };
15 neverallow * kernel:process ptrace;
17 neverallow kernel *:file { entrypoint execute_no_trans };
Dinit.te18 neverallow { domain -kernel } init:process dyntransition;
19 neverallow { domain -kernel } init:process transition;
25 neverallow init self:perf_event { kernel tracepoint read write };
/base/update/ota_lite/frameworks/test/unittest/common/
DBUILD.gn26 "//kernel/liteos-a/compat/linux/include",
27 "//kernel/liteos-a/kernel/include/",
28 "//kernel/liteos-a/lib/libsec/include",
/base/startup/init/services/etc/
Dinit.without_two_stages.cfg10 "write /proc/sys/kernel/sysrq 0",
30 "write /proc/sys/kernel/panic_on_oops 1",
31 "write /proc/sys/kernel/hung_task_timeout_secs 0",
33 "write /proc/sys/kernel/sched_tunable_scaling 0",
34 "write /proc/sys/kernel/sched_latency_ns 10000000",
35 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000",
36 "write /proc/sys/kernel/sched_child_runs_first 0",
37 "write /proc/sys/kernel/randomize_va_space 2",
41 "write /proc/sys/kernel/sched_rt_runtime_us 950000",
42 "write /proc/sys/kernel/sched_rt_period_us 1000000",
[all …]
Dinit.cfg10 "write /proc/sys/kernel/sysrq 0",
39 "write /proc/sys/kernel/panic_on_oops 1",
40 "write /proc/sys/kernel/hung_task_timeout_secs 0",
42 "write /proc/sys/kernel/sched_tunable_scaling 0",
43 "write /proc/sys/kernel/sched_latency_ns 10000000",
44 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000",
45 "write /proc/sys/kernel/sched_child_runs_first 0",
46 "write /proc/sys/kernel/randomize_va_space 2",
50 "write /proc/sys/kernel/sched_rt_runtime_us 950000",
51 "write /proc/sys/kernel/sched_rt_period_us 1000000",
[all …]
/base/startup/init/services/modules/seccomp/
DBUILD.gn19 import("//build/ohos/kernel/kernel.gni")
29 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include/asm-arm"),
32 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include"),
51 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include/asm-arm64"),
54 "//kernel/linux/patches/${linux_kernel_version}/prebuilts/usr/include"),
/base/security/selinux/sepolicy/ohos_policy/filemanagement/user_file_service/system/
Dkernel.te14 allow kernel debugfs_usb:dir { search };
15 allow kernel sys_file:dir { open };
/base/security/selinux/sepolicy/ohos_policy/multimedia/player/system/
Dkernel.te14 …d=177 comm="kworker/u8:3" name="xhci" dev="debugfs" ino=962 scontext=u:r:kernel:s0 tcontext=u:obje…
15 allow kernel debugfs_usb:dir { search };
/base/startup/init/services/init/lite/
DBUILD.gn74 "//kernel/liteos_a/syscall",
75 "//kernel/liteos_a/kernel/include",
/base/request/request/test/download/
Ddownload.test.ets19 url: 'https://mirror.bjtu.edu.cn/kernel/linux/libs/libc5/libc5.cvs.tar.gz',// Resource address.
29 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.10.91.0.2-1.i386.rpm',// R…
39 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.23-2.11.90.0.24.si…
54 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/autoconf-2.13-10.tar.gz',// Resource …
64 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/automake-1.4-8.3.tar.gz',// Resource …
74 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.10.91.0.2-2.10.91.0.4.diff…
84 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.23-2.11.90.0.24.si…
94 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.5-2.11.90.0.6.diff…
104 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.6-2.11.90.0.7.diff…
114 …url: 'https://mirror.bjtu.edu.cn/kernel/linux/devel/binutils/binutils-2.11.90.0.7-2.11.90.0.8.diff…
[all …]
/base/security/selinux/sepolicy/ohos_policy/bundlemanager/distributed_bundle_framework/system/
Dsh.te40 allow sh kernel:dir { getattr search };
41 allow sh kernel:file { open read };
42 allow sh kernel:system { syslog_read };
/base/security/selinux/sepolicy/base/system/
Dinitial_sid_contexts14 sid kernel u:r:kernel:s0
/base/security/selinux/sepolicy/ohos_policy/ability/ability_runtime/system/
Dsh.te53 allow sh kernel:dir { getattr search };
54 allow sh kernel:file { open read };
55 allow sh kernel:system { syslog_read };
56 allow sh kernel:unix_stream_socket { connectto };
/base/security/selinux/sepolicy/ohos_policy/kernel/linux/public/
Dkernel.te14 type kernel, domain;

12345