/base/startup/init/interfaces/innerkits/sandbox/ |
D | sandbox.c | 89 sandbox_t *sandbox; member 96 .sandbox = &g_systemSandbox, 101 .sandbox = &g_chipsetSandbox, 107 .sandbox = &g_testSandbox, 222 typedef int (*AddInfoToSandboxCallback)(sandbox_t *sandbox, cJSON *item, const char *type); 224 static int AddMountInfoToSandbox(sandbox_t *sandbox, cJSON *item, const char *type) in AddMountInfoToSandbox() argument 226 BEGET_CHECK(sandbox != NULL && item != NULL && type != NULL, return -1); in AddMountInfoToSandbox() 255 RemoveOldSandboxMountListNode(&sandbox->pathMountsHead, dstPath); in AddMountInfoToSandbox() 256 OH_ListAddTail(&sandbox->pathMountsHead, &tmpMount->node); in AddMountInfoToSandbox() 259 RemoveOldSandboxMountListNode(&sandbox->fileMountsHead, dstPath); in AddMountInfoToSandbox() [all …]
|
D | BUILD.gn | 20 "//base/startup/init/interfaces/innerkits/sandbox/include", 25 ohos_static_library("sandbox") { 27 "sandbox.c",
|
/base/startup/appspawn/etc/ |
D | BUILD.gn | 17 ohos_prebuilt_etc("appdata-sandbox.json") { 21 source = "//base/startup/appspawn/appdata-sandbox.json" 26 module_install_dir = "etc/sandbox" 29 ohos_prebuilt_etc("product-sandbox.json") { 30 source = "//base/startup/appspawn/product-sandbox.json" 32 module_install_dir = "etc/sandbox" 35 ohos_prebuilt_etc("sandbox-config.json") { 36 source = "//base/startup/appspawn/sandbox-config.json" 38 module_install_dir = "etc/sandbox" 43 ":appdata-sandbox.json", [all …]
|
/base/startup/appspawn/common/ |
D | appspawn_server.c | 154 AppSandboxArg *sandbox = (AppSandboxArg *)arg; local 155 struct AppSpawnContent_ *content = sandbox->content; 156 AppSpawnClient *client = sandbox->client; 219 int AppSpawnProcessMsg(AppSandboxArg *sandbox, pid_t *childPid) argument 222 …APPSPAWN_CHECK(sandbox != NULL && sandbox->content != NULL, return -1, "Invalid content for appspa… 223 …APPSPAWN_CHECK(sandbox->client != NULL && childPid != NULL, return -1, "Invalid client for appspaw… 224 APPSPAWN_LOGI("AppSpawnProcessMsg id %d 0x%x", sandbox->client->id, sandbox->client->flags); 227 AppSpawnClient *client = sandbox->client; 233 …one(AppSpawnChild, childStack + SANDBOX_STACK_SIZE, client->cloneFlags | SIGCHLD, (void *)sandbox); 252 ProcessExit(AppSpawnChild((void *)sandbox));
|
D | appspawn_server.h | 94 int AppSpawnProcessMsg(AppSandboxArg *sandbox, pid_t *childPid);
|
/base/startup/init/services/etc/ |
D | BUILD.gn | 217 ohos_prebuilt_etc("system-sandbox.json") { 219 source = "//base/startup/init/interfaces/innerkits/sandbox/system-sandbox64.json" 222 "//base/startup/init/interfaces/innerkits/sandbox/system-sandbox.json" 225 "//base/startup/init/interfaces/innerkits/sandbox/system-sandbox.json" 228 module_install_dir = "etc/sandbox" 231 ohos_prebuilt_etc("chipset-sandbox.json") { 233 source = "//base/startup/init/interfaces/innerkits/sandbox/chipset-sandbox64.json" 235 source = "//base/startup/init/interfaces/innerkits/sandbox/chipset-sandbox.json" 238 "//base/startup/init/interfaces/innerkits/sandbox/chipset-sandbox.json" 241 module_install_dir = "etc/sandbox" [all …]
|
D | watchdog.cfg | 7 "sandbox" : 0,
|
D | console.cfg | 8 "sandbox" : 0,
|
D | ueventd.cfg | 25 "sandbox" : 0,
|
D | init.usb.cfg | 54 "sandbox" : 0,
|
D | init.without_two_stages.cfg | 266 "sandbox" : 0,
|
/base/startup/init/test/unittest/init/ |
D | sandbox_unittest.cpp | 45 int RestartSandbox(const char *sandbox) in RestartSandbox() argument 47 if (sandbox == nullptr) { in RestartSandbox() 53 if (!InitSandboxWithName(sandbox)) { in RestartSandbox() 55 std::cout << "Failed to init sandbox with name " << sandbox << std::endl; in RestartSandbox() 59 DumpSandboxByName(sandbox); in RestartSandbox() 61 if (PrepareSandbox(sandbox) != 0) { in RestartSandbox() 62 std::cout << "Failed to prepare sandbox %s" << sandbox << std::endl; in RestartSandbox() 63 DestroySandbox(sandbox); in RestartSandbox() 70 DestroySandbox(sandbox); in RestartSandbox()
|
/base/startup/appspawn/ |
D | appspawn.cfg | 6 … "--sandbox-switch on --bundle-name com.ohos.appspawn.startup --app-operate-type operate ", 11 "sandbox" : 0,
|
D | nwebspawn.cfg | 6 … "--sandbox-switch on --bundle-name com.ohos.appspawn.startup --app-operate-type operate ",
|
/base/startup/init/services/init/standard/ |
D | init_cmds.c | 509 const char *sandbox = ctx->argv[0]; in DoMkSandbox() local 510 if (sandbox == NULL) { in DoMkSandbox() 515 if (!InitSandboxWithName(sandbox)) { in DoMkSandbox() 516 INIT_LOGE("Failed to init sandbox with name %s.", sandbox); in DoMkSandbox() 519 if (PrepareSandbox(sandbox) != 0) { in DoMkSandbox() 520 INIT_LOGE("Failed to prepare sandbox %s.", sandbox); in DoMkSandbox() 521 DestroySandbox(sandbox); in DoMkSandbox()
|
D | BUILD.gn | 67 "//base/startup/init/interfaces/innerkits/sandbox:sandbox",
|
/base/security/selinux/sepolicy/ohos_policy/web/webview/system/ |
D | nwebspawn.te | 53 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 56 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 64 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 67 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 70 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 73 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 76 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 79 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
|
D | normal_hap.te | 70 #avc: denied { mounton } for pid=4514 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 81 #avc: denied { mounton } for pid=4514 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 105 #avc: denied { mounton } for pid=4514 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 160 #avc: denied { mounton } for pid=4514 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 163 #avc: denied { mounton } for pid=4514 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 204 #avc: denied { mounton } for pid=4914 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 207 #avc: denied { mounton } for pid=4914 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta…
|
/base/hiviewdfx/hilog/services/hilogd/etc/ |
D | hilogd.cfg | 22 "sandbox" : 0,
|
/base/startup/init/services/begetctl/ |
D | BUILD.gn | 28 "//base/startup/init/interfaces/innerkits/sandbox/include", 72 "sandbox.cpp", 121 "sandbox",
|
/base/startup/init/services/etc/param/ |
D | ohos.para | 23 const.sandbox=enable
|
/base/startup/init/interfaces/innerkits/ |
D | BUILD.gn | 29 "//base/startup/init/interfaces/innerkits/include/sandbox/include", 190 "//base/startup/init/interfaces/innerkits/sandbox:sandbox",
|
/base/startup/init/test/unittest/ |
D | BUILD.gn | 45 "//base/startup/init/interfaces/innerkits/sandbox/sandbox.c", 46 "//base/startup/init/interfaces/innerkits/sandbox/sandbox_namespace.c", 57 "//base/startup/init/services/begetctl/sandbox.cpp", 239 "//base/startup/init/interfaces/innerkits/sandbox/include",
|
/base/startup/init/ |
D | README_zh.md | 75 …s://gitee.com/openharmony/docs/blob/master/zh-cn/device-dev/subsystems/subsys-boot-init-sandbox.md)
|