/base/hiviewdfx/faultloggerd/test/unittest/process_dump/ |
D | process_dump_test.cpp | 53 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable 54 EXPECT_EQ(false, process == nullptr) << "DfxProcessTest001 Failed"; 74 auto process = DfxProcess::Create(pid, pid); variable 75 EXPECT_EQ(true, process != nullptr) << "DfxProcessTest002 Failed"; 87 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable 88 auto ret = process->InitOtherThreads(); 90 auto threads = process->GetOtherThreads(); 92 process->ClearOtherThreads(); 93 threads = process->GetOtherThreads(); 106 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable [all …]
|
/base/hiviewdfx/faultloggerd/tools/process_dump/ |
D | printer.cpp | 33 …::PrintDumpHeader(std::shared_ptr<ProcessDumpRequest> request, std::shared_ptr<DfxProcess> process) in PrintDumpHeader() argument 41 DfxRingBufferWrapper::GetInstance().AppendBuf("Pid:%d\n", process->processInfo_.pid); in PrintDumpHeader() 42 DfxRingBufferWrapper::GetInstance().AppendBuf("Uid:%d\n", process->processInfo_.uid); in PrintDumpHeader() 43 …DfxRingBufferWrapper::GetInstance().AppendBuf("Process name:%s\n", process->processInfo_.processNa… in PrintDumpHeader() 48 auto msg = process->GetFatalMessage(); in PrintDumpHeader() 59 if (process->vmThread_ != nullptr) { in PrintDumpHeader() 65 void Printer::PrintProcessMapsByConfig(std::shared_ptr<DfxProcess> process) in PrintProcessMapsByConfig() argument 68 process->InitProcessMaps(); in PrintProcessMapsByConfig() 69 if (process->GetMaps() == nullptr) { in PrintProcessMapsByConfig() 70 DFXLOG_WARN("Pid:%d maps is null", process->processInfo_.pid); in PrintProcessMapsByConfig() [all …]
|
D | dfx_unwind_remote.cpp | 63 bool DfxUnwindRemote::UnwindProcess(std::shared_ptr<DfxProcess> process) in UnwindProcess() argument 66 if (process == nullptr) { in UnwindProcess() 78 std::shared_ptr<DfxThread> unwThread = process->keyThread_; in UnwindProcess() 79 if (ProcessDumper::GetInstance().IsCrash() && (process->vmThread_ != nullptr)) { in UnwindProcess() 80 unw_set_target_pid(as_, process->vmThread_->threadInfo_.tid); in UnwindProcess() 81 unwThread = process->vmThread_; in UnwindProcess() 83 unw_set_target_pid(as_, process->processInfo_.pid); in UnwindProcess() 91 Printer::PrintThreadHeaderByConfig(process->keyThread_); in UnwindProcess() 92 ret = UnwindThread(process, unwThread); in UnwindProcess() 94 UnwindThreadFallback(process, unwThread); in UnwindProcess() [all …]
|
D | printer.h | 31 … PrintDumpHeader(std::shared_ptr<ProcessDumpRequest> request, std::shared_ptr<DfxProcess> process); 32 static void PrintProcessMapsByConfig(std::shared_ptr<DfxProcess> process); 37 …static void PrintThreadFaultStackByConfig(std::shared_ptr<DfxProcess> process, std::shared_ptr<Dfx…
|
D | dfx_unwind_remote.h | 42 bool UnwindProcess(std::shared_ptr<DfxProcess> process); 43 bool UnwindThread(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread); 44 … void UnwindThreadFallback(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread); 49 … std::shared_ptr<DfxThread> &thread, unw_cursor_t &cursor, std::shared_ptr<DfxProcess> process);
|
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/useriam/vendor/ |
D | init.te | 14 allow init pin_auth_host:process { rlimitinh siginh transition }; 15 allow init pinauth:process { rlimitinh siginh transition }; 17 allow init user_auth_host:process { rlimitinh siginh transition }; 20 allow init useriam:process { getattr rlimitinh siginh transition }; 22 allow init face_auth_host:process { rlimitinh siginh transition }; 24 allow init fingerprint_auth_host:process { rlimitinh siginh transition };
|
D | hdf_devmgr.te | 20 allow hdf_devmgr pin_auth_host:process { getattr }; 21 allow hdf_devmgr pinauth:process { getattr }; 26 allow hdf_devmgr user_auth_host:process { getattr }; 30 allow hdf_devmgr useriam:process { getattr }; 35 allow hdf_devmgr face_auth_host:process { getattr }; 39 allow hdf_devmgr fingerprint_auth_host:process { getattr };
|
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/light/vendor/ |
D | init.te | 14 dontaudit init light_host:process noatsecure; 15 dontaudit init light_host:process rlimitinh; 16 dontaudit init light_host:process siginh; 17 dontaudit init light_host:process transition; 19 allow init light_host:process { rlimitinh siginh transition };
|
/base/notification/eventhandler/frameworks/eventhandler/test/unittest/ |
D | lib_event_handler_trace_test.cpp | 128 auto process = []() { in TraceFlagTest() local 131 Wait(process); in TraceFlagTest() 241 auto process = []() { in __anon084c07880302() variable 244 Wait(process); 277 auto process = []() { in __anon084c07880502() variable 280 Wait(process); 481 auto process = []() { in __anon084c07880602() variable 484 auto f = [&runner, &process]() { in __anon084c07880702() 485 Wait(process); in __anon084c07880702() 524 auto process = []() { in __anon084c07880802() variable [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/ai/intelligent_voice_framework/system/ |
D | init.te | 14 …dd74" ino=462 scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0 15 …omm="sa_main" scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0 16 …omm="sa_main" scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0 17 allow init intell_voice_service:process { transition rlimitinh siginh }; 19 …v="sdd72" ino=34 scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0 20 allow init intell_voice_host:process { transition };
|
/base/security/selinux_adapter/sepolicy/ohos_policy/startup/init/system/ |
D | init.te | 18 allow init privacy_service:process { transition }; 22 allow init system_core_hap_attr:process { getattr }; 94 allow init deviceinfoservice:process { getattr }; 117 allow init sh:process { getattr }; 120 allow init a2dp_host:process { rlimitinh siginh sigkill transition }; 121 allow init accessibility:process { rlimitinh siginh transition }; 123 allow init accesstoken_service:process { rlimitinh siginh transition }; 124 allow init appspawn:process { signal }; 126 allow init bgtaskmgr_service:process { rlimitinh siginh transition }; 127 allow init blue_host:process { rlimitinh siginh transition }; [all …]
|
/base/sensors/start/ |
D | README.md | 19 └── init # Place the startup file for the hsensor process 23 …sors process to start sensor and small device services such as vibrator. Sensor and small device s… 24 …process be placed in a separate start-up part compartment, shared by the two parts, so that any pa… 25 … the 3601 service. The sensors.xml file starts the service when the sensors process is started. 29 <process>sensors</process>
|
/base/security/selinux_adapter/sepolicy/base/public/ |
D | glb_te_def.spt | 16 allow $1 $3:process transition; 17 allow $1 $3:process { siginh rlimitinh }; 19 dontaudit $1 $3:process noatsecure; 24 type_transition $1 $2:process $3; 48 allow hdf_devmgr $1:process { getattr }; 57 neverallow { domain -$1 -processdump } $1:process ptrace;
|
D | init.te | 18 neverallow { domain -kernel } init:process dyntransition; 19 neverallow { domain -kernel } init:process transition; 22 neverallow init *:process noatsecure; 24 neverallow { domain -processdump } init:process ptrace;
|
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/adapter/vendor/ |
D | init.te | 14 …dev="mmcblk0p7" ino=14 scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1 15 …970 comm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1 16 …970 comm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1 17 …for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1 18 allow init sample_host:process { rlimitinh siginh transition sigkill };
|
D | hdf_devmgr.te | 41 …mm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:telephony_sa:s0 tclass=process permissive=1 42 allow hdf_devmgr telephony_sa:process { getattr }; 64 …omm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=0 71 …pid=241 comm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:sh:s0 tclass=process permissive=1 74 allow hdf_devmgr sample_host:process { getattr }; 80 allow hdf_devmgr sh:process { getattr }; 87 allow hdf_devmgr a2dp_host:process { getattr }; 91 allow hdf_devmgr blue_host:process { getattr }; 95 allow hdf_devmgr bluetooth_service:process { getattr }; 102 allow hdf_devmgr camera_service:process { getattr }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/multimedia/player/system/ |
D | init.te | 18 …ll } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:hilogd:s0 tclass=process permissive=1 19 allow init hilogd:process { sigkill }; 24 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 25 allow init privacy_service:process { rlimitinh }; 26 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 27 allow init privacy_service:process { siginh }; 28 …mmcblk0p6" ino=348 scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1 29 allow init privacy_service:process { transition };
|
D | resource_schedule_service.te | 14 …EventHand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:sh:s0 tclass=process permissive=1 16 allow resource_schedule_service sh:process { setsched }; 19 …Hand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:dscreen:s0 tclass=process permissive=0 20 allow resource_schedule_service dscreen:process { setsched };
|
/base/hiviewdfx/faultloggerd/ |
D | README.md | 23 …ler, which receives system exception signals and triggers the capture of process exception informa… 24 …ol, which provides the function of capturing stack information of the specified process and thread. 26 …nary tool for capturing process information, which provides the function of capturing stack inform… 39 …resses (for example, access to storage space that is read only or does not belong to the process).| 41 | 11 | SIGSEGV | Invalid memory access | The process attempts to access memory that is not … 84 …nformation. It provides the API for printing stack information of the specified process and thread. 96 …* `pid`: ID of the process for dumping stack information. If all threads in the process need to be… 101 …process information. Common users can only capture information on their own processes. To capture … 235 …ify the target process and thread. After command execution is complete, it displays the thread sta… 243 * `-p [pid]`: prints all thread stack information of the specified process. [all …]
|
/base/security/device_security_level/baselib/utils/src/ |
D | utils_work_queue.c | 43 WorkProcess process; // callback func member 70 worker->process(worker->dataBuff, worker->dataLen); in WorkQueueThread() 149 uint32_t QueueWork(WorkQueue *queue, WorkProcess process, uint8_t *data, uint32_t length) in QueueWork() argument 151 if ((queue == NULL) || (process == NULL)) { in QueueWork() 170 worker->process = process; in QueueWork()
|
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/intelligent_voice/vendor/ |
D | init.te | 14 …v="sdd72" ino=34 scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0 15 …mm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0 16 …mm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0 17 allow init intell_voice_host:process { transition rlimitinh siginh };
|
/base/security/selinux_adapter/sepolicy/ohos_policy/multimedia/av_codec/system/ |
D | init.te | 14 …51 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1 15 …51 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1 16 …mcblk0p7" ino=343 scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1 17 allow init av_codec_service:process { rlimitinh siginh transition };
|
/base/security/selinux_adapter/sepolicy/ohos_policy/security/security_component/system/ |
D | init.te | 14 …a_main" scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1 15 …a_main" scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1 16 …ino=382 scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1 17 allow init security_component_service:process { rlimitinh siginh transition };
|
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/expand_sub_session/expand_process_lib/ |
D | auth_code_import_test.cpp | 116 res = server->process(server, clientOut, &serverOut, &serverState); 123 res = client->process(client, serverOut, &clientOut, &clientState); 224 int32_t res = self->process(nullptr, &in, &out, &state); 237 int32_t res = self->process(self, nullptr, &out, &state); 250 int32_t res = self->process(self, &in, nullptr, &state); 263 int32_t res = self->process(self, &in, &out, nullptr); 279 int32_t res = self->process(self, &in, &out, &state); 295 int32_t res = self->process(self, &in, &out, &state); 310 int32_t res = self->process(self, failEvent, &out, &state); 327 int32_t res = self->process(self, failEvent, &out, &state); [all …]
|
D | pub_key_exchange_test.cpp | 116 res = server->process(server, clientOut, &serverOut, &serverState); 123 res = client->process(client, serverOut, &clientOut, &clientState); 224 int32_t res = self->process(nullptr, &in, &out, &state); 237 int32_t res = self->process(self, nullptr, &out, &state); 250 int32_t res = self->process(self, &in, nullptr, &state); 263 int32_t res = self->process(self, &in, &out, nullptr); 279 int32_t res = self->process(self, &in, &out, &state); 295 int32_t res = self->process(self, &in, &out, &state); 310 int32_t res = self->process(self, failEvent, &out, &state); 327 int32_t res = self->process(self, failEvent, &out, &state); [all …]
|