/base/security/selinux/sepolicy/base/te/ |
D | init.te | 14 allow init a2dp_host:process { rlimitinh siginh sigkill transition }; 15 allow init accessibility:process { rlimitinh siginh transition }; 17 allow init accesstoken_service:process { rlimitinh siginh transition }; 18 allow init appspawn:process { signal }; 20 allow init audio_hdi_server_host:process { rlimitinh siginh transition }; 21 allow init bgtaskmgr_service:process { rlimitinh siginh transition }; 22 allow init blue_host:process { rlimitinh siginh transition }; 23 allow init bluetooth_service:process { rlimitinh siginh transition }; 26 allow init bootanimation:process { getattr rlimitinh siginh transition }; 30 allow init camera_host:process { rlimitinh siginh transition }; [all …]
|
D | hdf_devmgr.te | 17 allow hdf_devmgr a2dp_host:process { getattr }; 21 allow hdf_devmgr audio_hdi_server_host:process { getattr }; 25 allow hdf_devmgr blue_host:process { getattr }; 29 allow hdf_devmgr bluetooth_service:process { getattr }; 36 allow hdf_devmgr camera_host:process { getattr }; 40 allow hdf_devmgr camera_service:process { getattr }; 44 allow hdf_devmgr codec_host:process { getattr }; 59 allow hdf_devmgr dcamera_host:process { getattr }; 60 allow hdf_devmgr dcamera:process { getattr }; 69 allow hdf_devmgr disp_gralloc_host:process { getattr }; [all …]
|
D | processdump.te | 29 allow processdump download_server:process { ptrace }; 30 allow processdump foundation:process { ptrace }; 38 allow processdump installs:process { ptrace }; 46 allow processdump sh:process { ptrace }; 47 allow processdump softbus_server:process { ptrace };
|
D | sh.te | 23 allow sh appspawn:process { getattr }; 29 allow sh audio_policy:process { getattr }; 46 allow sh console:process { getattr }; 144 allow sh edm_sa:process { getattr }; 157 allow sh foundation:process { getattr }; 165 allow sh hdf_devmgr:process { getattr }; 171 allow sh hilogd:process { getattr }; 175 allow sh hiview:process { getattr }; 182 allow sh init:process { getattr }; 191 allow sh installs:process { getattr }; [all …]
|
/base/hiviewdfx/faultloggerd/tools/process_dump/ |
D | dfx_unwind_remote.cpp | 63 bool DfxUnwindRemote::UnwindProcess(std::shared_ptr<DfxProcess> process) in UnwindProcess() argument 66 if (!process) { in UnwindProcess() 71 auto threads = process->GetThreads(); in UnwindProcess() 87 if (!process->GetIsSignalDump() && !DfxConfig::GetInstance().GetDumpOtherThreads()) { in UnwindProcess() 88 ret = UnwindThread(process, threads[0]); in UnwindProcess() 90 UnwindThreadFallback(process, threads[0]); in UnwindProcess() 93 if (threads[0]->GetIsCrashThread() && (!process->GetIsSignalDump())) { in UnwindProcess() 94 process->PrintProcessMapsByConfig(); in UnwindProcess() 102 process->PrintThreadsHeaderByConfig(); in UnwindProcess() 109 UnwindThread(process, thread); in UnwindProcess() [all …]
|
D | dfx_unwind_remote.h | 42 bool UnwindProcess(std::shared_ptr<DfxProcess> process); 43 bool UnwindThread(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread); 44 … void UnwindThreadFallback(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread); 48 … std::shared_ptr<DfxThread> & thread, unw_cursor_t & cursor, std::shared_ptr<DfxProcess> process);
|
D | dfx_dump_writer.cpp | 24 DfxDumpWriter::DfxDumpWriter(std::shared_ptr<DfxProcess> process, int32_t fromSignalHandler) in DfxDumpWriter() argument 26 process_ = process; in DfxDumpWriter()
|
/base/notification/eventhandler/frameworks/eventhandler/test/unittest/ |
D | lib_event_handler_trace_test.cpp | 128 auto process = []() { in TraceFlagTest() local 131 Wait(process); in TraceFlagTest() 241 auto process = []() { in __anonbd34842a0302() variable 244 Wait(process); 277 auto process = []() { in __anonbd34842a0502() variable 280 Wait(process); 481 auto process = []() { in __anonbd34842a0602() variable 484 auto f = [&runner, &process]() { in __anonbd34842a0702() 485 Wait(process); in __anonbd34842a0702() 524 auto process = []() { in __anonbd34842a0802() variable [all …]
|
/base/sensors/start/ |
D | README.md | 19 └── init # Place the startup file for the hsensor process 23 …sors process to start sensor and small device services such as vibrator. Sensor and small device s… 24 …process be placed in a separate start-up part compartment, shared by the two parts, so that any pa… 25 … the 3601 service. The sensors.xml file starts the service when the sensors process is started. 29 <process>sensors</process>
|
/base/security/selinux/sepolicy/base/public/ |
D | glb_te_def.spt | 16 allow $1 $3:process transition; 17 allow $1 $3:process { siginh rlimitinh }; 19 dontaudit $1 $3:process noatsecure; 24 type_transition $1 $2:process $3; 44 allow hdf_devmgr $1:process { getattr }; 53 neverallow { domain -$1 -processdump } $1:process ptrace;
|
D | init.te | 18 neverallow { domain -kernel } init:process dyntransition; 19 neverallow { domain -kernel } init:process transition; 21 neverallow init *:process noatsecure; 23 neverallow { domain -processdump } init:process ptrace;
|
/base/security/selinux/sepolicy/ohos_policy/multimedia/player/system/ |
D | init.te | 18 …ll } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:hilogd:s0 tclass=process permissive=1 19 allow init hilogd:process { sigkill }; 24 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 25 allow init privacy_service:process { rlimitinh }; 26 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 27 allow init privacy_service:process { siginh }; 28 …mmcblk0p6" ino=348 scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 29 allow init privacy_service:process { transition };
|
D | resource_schedule_service.te | 14 …EventHand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:sh:s0 tclass=process permissive=1 15 allow resource_schedule_service sh:process { setsched }; 16 …Hand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:dscreen:s0 tclass=process permissive=0 17 allow resource_schedule_service dscreen:process { setsched };
|
/base/hiviewdfx/faultloggerd/ |
D | README.md | 23 …ler, which receives system exception signals and triggers the capture of process exception informa… 24 …ol, which provides the function of capturing stack information of the specified process and thread. 26 …nary tool for capturing process information, which provides the function of capturing stack inform… 39 …resses (for example, access to storage space that is read only or does not belong to the process).| 41 | 11 | SIGSEGV | Invalid memory access | The process attempts to access memory that is not … 84 …nformation. It provides the API for printing stack information of the specified process and thread. 96 …* `pid`: ID of the process for dumping stack information. If all threads in the process need to be… 101 …process information. Common users can only capture information on their own processes. To capture … 235 …ify the target process and thread. After command execution is complete, it displays the thread sta… 243 * `-p [pid]`: prints all thread stack information of the specified process. [all …]
|
/base/security/device_security_level/baselib/utils/src/ |
D | utils_work_queue.c | 43 WorkProcess process; // callback func member 70 worker->process(worker->dataBuff, worker->dataLen); in WorkQueueThread() 149 uint32_t QueueWork(WorkQueue *queue, WorkProcess process, uint8_t *data, uint32_t length) in QueueWork() argument 151 if ((queue == NULL) || (process == NULL)) { in QueueWork() 170 worker->process = process; in QueueWork()
|
/base/security/access_token/tools/accesstoken/src/ |
D | atm_receiver_impl.cpp | 44 void AtmReceiverImpl::OnStatusNotify(const int process) in OnStatusNotify() argument 46 ACCESSTOKEN_LOG_DEBUG(LABEL, "on OnStatusNotify is %{public}d", process); in OnStatusNotify()
|
/base/security/selinux/sepolicy/ohos_policy/resourceschedule/concurrent_task_service/system/ |
D | concurrent_task_service.te | 20 allow concurrent_task_service system_basic_hap:process { setsched }; 21 allow concurrent_task_service system_core_hap:process { setsched }; 32 allow concurrent_task_service ui_service:process { setsched }; 34 allow concurrent_task_service normal_hap:process { setsched };
|
/base/security/selinux/sepolicy/ohos_policy/multimedia/audio/system/ |
D | init.te | 14 …id=355 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1 15 …id=355 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1 16 …v="mmcblk0p5" ino=336 scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1 17 allow init audio_policy:process { rlimitinh siginh transition }; 34 … pid=298 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:pulseaudio:s0 tclass=process permissive=1 35 … pid=298 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:pulseaudio:s0 tclass=process permissive=1 36 …v="mmcblk0p5" ino=336 scontext=u:r:init:s0 tcontext=u:r:audio_policy:s0 tclass=process permissive=1 37 allow init pulseaudio:process { rlimitinh siginh transition };
|
/base/security/selinux/sepolicy/ohos_policy/developtools/smartperf/system/ |
D | init.te | 14 allow init accessibility:process { rlimitinh transition }; 15 allow init bluetooth_service:process { rlimitinh siginh }; 19 allow init memmgrservice:process { rlimitinh siginh };
|
/base/security/selinux/sepolicy/ohos_policy/resourceschedule/background_task_mgr/system/ |
D | sh.te | 16 allow sh bgtaskmgr_service:process { sigkill }; 20 allow sh device_usage_stats_service:process { sigkill }; 24 allow sh work_scheduler_service:process { sigkill };
|
D | samgr.te | 17 allow samgr bgtaskmgr_service:process { getattr }; 22 allow samgr device_usage_stats_service:process { getattr }; 27 allow samgr work_scheduler_service:process { getattr };
|
/base/security/selinux/sepolicy/ohos_policy/telephony/telephony_sa/system/ |
D | init.te | 17 allow init normal_hap:process getattr; 18 allow init riladapter_host:process { rlimitinh siginh transition }; 23 allow init telephony_sa:process getattr;
|
/base/telephony/core_service/services/sim/src/ |
D | icc_file_controller.cpp | 75 const AppExecFwk::InnerEvent::Pointer &process = hd->fileLoaded; in ProcessLinearRecordSize() local 84 SendEfLinearResult(process, fileSize, RECORD_NUM); in ProcessLinearRecordSize() 154 AppExecFwk::InnerEvent::Pointer process = in ProcessBinarySize() local 166 telRilManager_->GetSimIO(slotId_, msg, process); in ProcessBinarySize() 176 const AppExecFwk::InnerEvent::Pointer &process = rcvMsg->controlHolder->fileLoaded; in ProcessReadRecord() local 186 SendMultiRecordResult(process, hd->fileResults); in ProcessReadRecord() 242 AppExecFwk::InnerEvent::Pointer process = in ObtainBinaryFile() local 254 telRilManager_->GetSimIO(slotId_, msg, process); in ObtainBinaryFile() 261 AppExecFwk::InnerEvent::Pointer process = in ObtainBinaryFile() local 273 telRilManager_->GetSimIO(slotId_, msg, process); in ObtainBinaryFile() [all …]
|
/base/security/selinux/sepolicy/ohos_policy/distributedhardware/device_manager/system/ |
D | init.te | 14 …=594 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0 15 …=594 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0 16 … pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:device_manager:s0 tclass=process permissive=0 17 allow init device_manager:process { transition rlimitinh siginh getattr };
|
/base/startup/appspawn/ |
D | README.md | 9 Appspawn is responsible for creating application process and setting process information function.
|