Home
last modified time | relevance | path

Searched refs:process (Results 1 – 25 of 193) sorted by relevance

12345678

/base/security/selinux/sepolicy/base/te/
Dinit.te14 allow init a2dp_host:process { rlimitinh siginh sigkill transition };
15 allow init accessibility:process { rlimitinh siginh transition };
17 allow init accesstoken_service:process { rlimitinh siginh transition };
18 allow init appspawn:process { signal };
20 allow init audio_hdi_server_host:process { rlimitinh siginh transition };
21 allow init bgtaskmgr_service:process { rlimitinh siginh transition };
22 allow init blue_host:process { rlimitinh siginh transition };
23 allow init bluetooth_service:process { rlimitinh siginh transition };
26 allow init bootanimation:process { getattr rlimitinh siginh transition };
30 allow init camera_host:process { rlimitinh siginh transition };
[all …]
Dhdf_devmgr.te17 allow hdf_devmgr a2dp_host:process { getattr };
21 allow hdf_devmgr audio_hdi_server_host:process { getattr };
25 allow hdf_devmgr blue_host:process { getattr };
29 allow hdf_devmgr bluetooth_service:process { getattr };
36 allow hdf_devmgr camera_host:process { getattr };
40 allow hdf_devmgr camera_service:process { getattr };
44 allow hdf_devmgr codec_host:process { getattr };
59 allow hdf_devmgr dcamera_host:process { getattr };
60 allow hdf_devmgr dcamera:process { getattr };
69 allow hdf_devmgr disp_gralloc_host:process { getattr };
[all …]
Dprocessdump.te29 allow processdump download_server:process { ptrace };
30 allow processdump foundation:process { ptrace };
38 allow processdump installs:process { ptrace };
46 allow processdump sh:process { ptrace };
47 allow processdump softbus_server:process { ptrace };
Dsh.te23 allow sh appspawn:process { getattr };
29 allow sh audio_policy:process { getattr };
46 allow sh console:process { getattr };
144 allow sh edm_sa:process { getattr };
157 allow sh foundation:process { getattr };
165 allow sh hdf_devmgr:process { getattr };
171 allow sh hilogd:process { getattr };
175 allow sh hiview:process { getattr };
182 allow sh init:process { getattr };
191 allow sh installs:process { getattr };
[all …]
/base/hiviewdfx/faultloggerd/tools/process_dump/
Ddfx_unwind_remote.cpp63 bool DfxUnwindRemote::UnwindProcess(std::shared_ptr<DfxProcess> process) in UnwindProcess() argument
66 if (!process) { in UnwindProcess()
71 auto threads = process->GetThreads(); in UnwindProcess()
87 if (!process->GetIsSignalDump() && !DfxConfig::GetInstance().GetDumpOtherThreads()) { in UnwindProcess()
88 ret = UnwindThread(process, threads[0]); in UnwindProcess()
90 UnwindThreadFallback(process, threads[0]); in UnwindProcess()
93 if (threads[0]->GetIsCrashThread() && (!process->GetIsSignalDump())) { in UnwindProcess()
94 process->PrintProcessMapsByConfig(); in UnwindProcess()
102 process->PrintThreadsHeaderByConfig(); in UnwindProcess()
109 UnwindThread(process, thread); in UnwindProcess()
[all …]
Ddfx_unwind_remote.h42 bool UnwindProcess(std::shared_ptr<DfxProcess> process);
43 bool UnwindThread(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread);
44 … void UnwindThreadFallback(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread);
48 … std::shared_ptr<DfxThread> & thread, unw_cursor_t & cursor, std::shared_ptr<DfxProcess> process);
Ddfx_dump_writer.cpp24 DfxDumpWriter::DfxDumpWriter(std::shared_ptr<DfxProcess> process, int32_t fromSignalHandler) in DfxDumpWriter() argument
26 process_ = process; in DfxDumpWriter()
/base/notification/eventhandler/frameworks/eventhandler/test/unittest/
Dlib_event_handler_trace_test.cpp128 auto process = []() { in TraceFlagTest() local
131 Wait(process); in TraceFlagTest()
241 auto process = []() { in __anonbd34842a0302() variable
244 Wait(process);
277 auto process = []() { in __anonbd34842a0502() variable
280 Wait(process);
481 auto process = []() { in __anonbd34842a0602() variable
484 auto f = [&runner, &process]() { in __anonbd34842a0702()
485 Wait(process); in __anonbd34842a0702()
524 auto process = []() { in __anonbd34842a0802() variable
[all …]
/base/sensors/start/
DREADME.md19 └── init # Place the startup file for the hsensor process
23 …sors process to start sensor and small device services such as vibrator. Sensor and small device s…
24process be placed in a separate start-up part compartment, shared by the two parts, so that any pa…
25 … the 3601 service. The sensors.xml file starts the service when the sensors process is started.
29 <process>sensors</process>
/base/security/selinux/sepolicy/base/public/
Dglb_te_def.spt16 allow $1 $3:process transition;
17 allow $1 $3:process { siginh rlimitinh };
19 dontaudit $1 $3:process noatsecure;
24 type_transition $1 $2:process $3;
44 allow hdf_devmgr $1:process { getattr };
53 neverallow { domain -$1 -processdump } $1:process ptrace;
Dinit.te18 neverallow { domain -kernel } init:process dyntransition;
19 neverallow { domain -kernel } init:process transition;
21 neverallow init *:process noatsecure;
23 neverallow { domain -processdump } init:process ptrace;
/base/security/selinux/sepolicy/ohos_policy/multimedia/player/system/
Dinit.te18 …ll } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:hilogd:s0 tclass=process permissive=1
19 allow init hilogd:process { sigkill };
24 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
25 allow init privacy_service:process { rlimitinh };
26 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
27 allow init privacy_service:process { siginh };
28 …mmcblk0p6" ino=348 scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
29 allow init privacy_service:process { transition };
Dresource_schedule_service.te14 …EventHand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:sh:s0 tclass=process permissive=1
15 allow resource_schedule_service sh:process { setsched };
16 …Hand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:dscreen:s0 tclass=process permissive=0
17 allow resource_schedule_service dscreen:process { setsched };
/base/hiviewdfx/faultloggerd/
DREADME.md23 …ler, which receives system exception signals and triggers the capture of process exception informa…
24 …ol, which provides the function of capturing stack information of the specified process and thread.
26 …nary tool for capturing process information, which provides the function of capturing stack inform…
39 …resses (for example, access to storage space that is read only or does not belong to the process).|
41 | 11 | SIGSEGV | Invalid memory access | The process attempts to access memory that is not …
84 …nformation. It provides the API for printing stack information of the specified process and thread.
96 …* `pid`: ID of the process for dumping stack information. If all threads in the process need to be…
101process information. Common users can only capture information on their own processes. To capture …
235 …ify the target process and thread. After command execution is complete, it displays the thread sta…
243 * `-p [pid]`: prints all thread stack information of the specified process.
[all …]
/base/security/device_security_level/baselib/utils/src/
Dutils_work_queue.c43 WorkProcess process; // callback func member
70 worker->process(worker->dataBuff, worker->dataLen); in WorkQueueThread()
149 uint32_t QueueWork(WorkQueue *queue, WorkProcess process, uint8_t *data, uint32_t length) in QueueWork() argument
151 if ((queue == NULL) || (process == NULL)) { in QueueWork()
170 worker->process = process; in QueueWork()
/base/security/access_token/tools/accesstoken/src/
Datm_receiver_impl.cpp44 void AtmReceiverImpl::OnStatusNotify(const int process) in OnStatusNotify() argument
46 ACCESSTOKEN_LOG_DEBUG(LABEL, "on OnStatusNotify is %{public}d", process); in OnStatusNotify()
/base/security/selinux/sepolicy/ohos_policy/resourceschedule/concurrent_task_service/system/
Dconcurrent_task_service.te20 allow concurrent_task_service system_basic_hap:process { setsched };
21 allow concurrent_task_service system_core_hap:process { setsched };
32 allow concurrent_task_service ui_service:process { setsched };
34 allow concurrent_task_service normal_hap:process { setsched };
/base/security/selinux/sepolicy/ohos_policy/multimedia/audio/system/
Dinit.te14 …id=355 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1
15 …id=355 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1
16 …v="mmcblk0p5" ino=336 scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1
17 allow init audio_policy:process { rlimitinh siginh transition };
34 … pid=298 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:pulseaudio:s0 tclass=process permissive=1
35 … pid=298 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:pulseaudio:s0 tclass=process permissive=1
36 …v="mmcblk0p5" ino=336 scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1
37 allow init pulseaudio:process { rlimitinh siginh transition };
/base/security/selinux/sepolicy/ohos_policy/developtools/smartperf/system/
Dinit.te14 allow init accessibility:process { rlimitinh transition };
15 allow init bluetooth_service:process { rlimitinh siginh };
19 allow init memmgrservice:process { rlimitinh siginh };
/base/security/selinux/sepolicy/ohos_policy/resourceschedule/background_task_mgr/system/
Dsh.te16 allow sh bgtaskmgr_service:process { sigkill };
20 allow sh device_usage_stats_service:process { sigkill };
24 allow sh work_scheduler_service:process { sigkill };
Dsamgr.te17 allow samgr bgtaskmgr_service:process { getattr };
22 allow samgr device_usage_stats_service:process { getattr };
27 allow samgr work_scheduler_service:process { getattr };
/base/security/selinux/sepolicy/ohos_policy/telephony/telephony_sa/system/
Dinit.te17 allow init normal_hap:process getattr;
18 allow init riladapter_host:process { rlimitinh siginh transition };
23 allow init telephony_sa:process getattr;
/base/telephony/core_service/services/sim/src/
Dicc_file_controller.cpp75 const AppExecFwk::InnerEvent::Pointer &process = hd->fileLoaded; in ProcessLinearRecordSize() local
84 SendEfLinearResult(process, fileSize, RECORD_NUM); in ProcessLinearRecordSize()
154 AppExecFwk::InnerEvent::Pointer process = in ProcessBinarySize() local
166 telRilManager_->GetSimIO(slotId_, msg, process); in ProcessBinarySize()
176 const AppExecFwk::InnerEvent::Pointer &process = rcvMsg->controlHolder->fileLoaded; in ProcessReadRecord() local
186 SendMultiRecordResult(process, hd->fileResults); in ProcessReadRecord()
242 AppExecFwk::InnerEvent::Pointer process = in ObtainBinaryFile() local
254 telRilManager_->GetSimIO(slotId_, msg, process); in ObtainBinaryFile()
261 AppExecFwk::InnerEvent::Pointer process = in ObtainBinaryFile() local
273 telRilManager_->GetSimIO(slotId_, msg, process); in ObtainBinaryFile()
[all …]
/base/security/selinux/sepolicy/ohos_policy/distributedhardware/device_manager/system/
Dinit.te14 …=594 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0
15 …=594 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0
16 … pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0
17 allow init device_manager:process { transition rlimitinh siginh getattr };
/base/startup/appspawn/
DREADME.md9 Appspawn is responsible for creating application process and setting process information function.

12345678