Home
last modified time | relevance | path

Searched refs:process (Results 1 – 25 of 292) sorted by relevance

12345678910>>...12

/base/hiviewdfx/faultloggerd/test/unittest/process_dump/
Dprocess_dump_test.cpp53 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable
54 EXPECT_EQ(false, process == nullptr) << "DfxProcessTest001 Failed";
74 auto process = DfxProcess::Create(pid, pid); variable
75 EXPECT_EQ(true, process != nullptr) << "DfxProcessTest002 Failed";
87 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable
88 auto ret = process->InitOtherThreads();
90 auto threads = process->GetOtherThreads();
92 process->ClearOtherThreads();
93 threads = process->GetOtherThreads();
106 std::shared_ptr<DfxProcess> process = DfxProcess::Create(getpid(), getpid()); variable
[all …]
/base/hiviewdfx/faultloggerd/tools/process_dump/
Dprinter.cpp33 …::PrintDumpHeader(std::shared_ptr<ProcessDumpRequest> request, std::shared_ptr<DfxProcess> process) in PrintDumpHeader() argument
41 DfxRingBufferWrapper::GetInstance().AppendBuf("Pid:%d\n", process->processInfo_.pid); in PrintDumpHeader()
42 DfxRingBufferWrapper::GetInstance().AppendBuf("Uid:%d\n", process->processInfo_.uid); in PrintDumpHeader()
43 …DfxRingBufferWrapper::GetInstance().AppendBuf("Process name:%s\n", process->processInfo_.processNa… in PrintDumpHeader()
48 auto msg = process->GetFatalMessage(); in PrintDumpHeader()
59 if (process->vmThread_ != nullptr) { in PrintDumpHeader()
65 void Printer::PrintProcessMapsByConfig(std::shared_ptr<DfxProcess> process) in PrintProcessMapsByConfig() argument
68 process->InitProcessMaps(); in PrintProcessMapsByConfig()
69 if (process->GetMaps() == nullptr) { in PrintProcessMapsByConfig()
70 DFXLOG_WARN("Pid:%d maps is null", process->processInfo_.pid); in PrintProcessMapsByConfig()
[all …]
Ddfx_unwind_remote.cpp63 bool DfxUnwindRemote::UnwindProcess(std::shared_ptr<DfxProcess> process) in UnwindProcess() argument
66 if (process == nullptr) { in UnwindProcess()
78 std::shared_ptr<DfxThread> unwThread = process->keyThread_; in UnwindProcess()
79 if (ProcessDumper::GetInstance().IsCrash() && (process->vmThread_ != nullptr)) { in UnwindProcess()
80 unw_set_target_pid(as_, process->vmThread_->threadInfo_.tid); in UnwindProcess()
81 unwThread = process->vmThread_; in UnwindProcess()
83 unw_set_target_pid(as_, process->processInfo_.pid); in UnwindProcess()
91 Printer::PrintThreadHeaderByConfig(process->keyThread_); in UnwindProcess()
92 ret = UnwindThread(process, unwThread); in UnwindProcess()
94 UnwindThreadFallback(process, unwThread); in UnwindProcess()
[all …]
Dprinter.h31 … PrintDumpHeader(std::shared_ptr<ProcessDumpRequest> request, std::shared_ptr<DfxProcess> process);
32 static void PrintProcessMapsByConfig(std::shared_ptr<DfxProcess> process);
37 …static void PrintThreadFaultStackByConfig(std::shared_ptr<DfxProcess> process, std::shared_ptr<Dfx…
Ddfx_unwind_remote.h42 bool UnwindProcess(std::shared_ptr<DfxProcess> process);
43 bool UnwindThread(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread);
44 … void UnwindThreadFallback(std::shared_ptr<DfxProcess> process, std::shared_ptr<DfxThread> thread);
49 … std::shared_ptr<DfxThread> &thread, unw_cursor_t &cursor, std::shared_ptr<DfxProcess> process);
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/useriam/vendor/
Dinit.te14 allow init pin_auth_host:process { rlimitinh siginh transition };
15 allow init pinauth:process { rlimitinh siginh transition };
17 allow init user_auth_host:process { rlimitinh siginh transition };
20 allow init useriam:process { getattr rlimitinh siginh transition };
22 allow init face_auth_host:process { rlimitinh siginh transition };
24 allow init fingerprint_auth_host:process { rlimitinh siginh transition };
Dhdf_devmgr.te20 allow hdf_devmgr pin_auth_host:process { getattr };
21 allow hdf_devmgr pinauth:process { getattr };
26 allow hdf_devmgr user_auth_host:process { getattr };
30 allow hdf_devmgr useriam:process { getattr };
35 allow hdf_devmgr face_auth_host:process { getattr };
39 allow hdf_devmgr fingerprint_auth_host:process { getattr };
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/light/vendor/
Dinit.te14 dontaudit init light_host:process noatsecure;
15 dontaudit init light_host:process rlimitinh;
16 dontaudit init light_host:process siginh;
17 dontaudit init light_host:process transition;
19 allow init light_host:process { rlimitinh siginh transition };
/base/notification/eventhandler/frameworks/eventhandler/test/unittest/
Dlib_event_handler_trace_test.cpp128 auto process = []() { in TraceFlagTest() local
131 Wait(process); in TraceFlagTest()
241 auto process = []() { in __anon084c07880302() variable
244 Wait(process);
277 auto process = []() { in __anon084c07880502() variable
280 Wait(process);
481 auto process = []() { in __anon084c07880602() variable
484 auto f = [&runner, &process]() { in __anon084c07880702()
485 Wait(process); in __anon084c07880702()
524 auto process = []() { in __anon084c07880802() variable
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/ai/intelligent_voice_framework/system/
Dinit.te14 …dd74" ino=462 scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0
15 …omm="sa_main" scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0
16 …omm="sa_main" scontext=u:r:init:s0 tcontext=u:r:intell_voice_service:s0 tclass=process permissive=0
17 allow init intell_voice_service:process { transition rlimitinh siginh };
19 …v="sdd72" ino=34 scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0
20 allow init intell_voice_host:process { transition };
/base/security/selinux_adapter/sepolicy/ohos_policy/startup/init/system/
Dinit.te18 allow init privacy_service:process { transition };
22 allow init system_core_hap_attr:process { getattr };
94 allow init deviceinfoservice:process { getattr };
117 allow init sh:process { getattr };
120 allow init a2dp_host:process { rlimitinh siginh sigkill transition };
121 allow init accessibility:process { rlimitinh siginh transition };
123 allow init accesstoken_service:process { rlimitinh siginh transition };
124 allow init appspawn:process { signal };
126 allow init bgtaskmgr_service:process { rlimitinh siginh transition };
127 allow init blue_host:process { rlimitinh siginh transition };
[all …]
/base/sensors/start/
DREADME.md19 └── init # Place the startup file for the hsensor process
23 …sors process to start sensor and small device services such as vibrator. Sensor and small device s…
24process be placed in a separate start-up part compartment, shared by the two parts, so that any pa…
25 … the 3601 service. The sensors.xml file starts the service when the sensors process is started.
29 <process>sensors</process>
/base/security/selinux_adapter/sepolicy/base/public/
Dglb_te_def.spt16 allow $1 $3:process transition;
17 allow $1 $3:process { siginh rlimitinh };
19 dontaudit $1 $3:process noatsecure;
24 type_transition $1 $2:process $3;
48 allow hdf_devmgr $1:process { getattr };
57 neverallow { domain -$1 -processdump } $1:process ptrace;
Dinit.te18 neverallow { domain -kernel } init:process dyntransition;
19 neverallow { domain -kernel } init:process transition;
22 neverallow init *:process noatsecure;
24 neverallow { domain -processdump } init:process ptrace;
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/adapter/vendor/
Dinit.te14 …dev="mmcblk0p7" ino=14 scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1
15 …970 comm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1
16 …970 comm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1
17 …for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=1
18 allow init sample_host:process { rlimitinh siginh transition sigkill };
Dhdf_devmgr.te41 …mm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:telephony_sa:s0 tclass=process permissive=1
42 allow hdf_devmgr telephony_sa:process { getattr };
64 …omm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:sample_host:s0 tclass=process permissive=0
71 …pid=241 comm="hdf_devmgr" scontext=u:r:hdf_devmgr:s0 tcontext=u:r:sh:s0 tclass=process permissive=1
74 allow hdf_devmgr sample_host:process { getattr };
80 allow hdf_devmgr sh:process { getattr };
87 allow hdf_devmgr a2dp_host:process { getattr };
91 allow hdf_devmgr blue_host:process { getattr };
95 allow hdf_devmgr bluetooth_service:process { getattr };
102 allow hdf_devmgr camera_service:process { getattr };
[all …]
/base/security/selinux_adapter/sepolicy/ohos_policy/multimedia/player/system/
Dinit.te18 …ll } for pid=1 comm="init" scontext=u:r:init:s0 tcontext=u:r:hilogd:s0 tclass=process permissive=1
19 allow init hilogd:process { sigkill };
24 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
25 allow init privacy_service:process { rlimitinh };
26 …507 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
27 allow init privacy_service:process { siginh };
28 …mmcblk0p6" ino=348 scontext=u:r:init:s0 tcontext=u:r:privacy_service:s0 tclass=process permissive=1
29 allow init privacy_service:process { transition };
Dresource_schedule_service.te14 …EventHand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:sh:s0 tclass=process permissive=1
16 allow resource_schedule_service sh:process { setsched };
19 …Hand" scontext=u:r:resource_schedule_service:s0 tcontext=u:r:dscreen:s0 tclass=process permissive=0
20 allow resource_schedule_service dscreen:process { setsched };
/base/hiviewdfx/faultloggerd/
DREADME.md23 …ler, which receives system exception signals and triggers the capture of process exception informa…
24 …ol, which provides the function of capturing stack information of the specified process and thread.
26 …nary tool for capturing process information, which provides the function of capturing stack inform…
39 …resses (for example, access to storage space that is read only or does not belong to the process).|
41 | 11 | SIGSEGV | Invalid memory access | The process attempts to access memory that is not …
84 …nformation. It provides the API for printing stack information of the specified process and thread.
96 …* `pid`: ID of the process for dumping stack information. If all threads in the process need to be…
101process information. Common users can only capture information on their own processes. To capture …
235 …ify the target process and thread. After command execution is complete, it displays the thread sta…
243 * `-p [pid]`: prints all thread stack information of the specified process.
[all …]
/base/security/device_security_level/baselib/utils/src/
Dutils_work_queue.c43 WorkProcess process; // callback func member
70 worker->process(worker->dataBuff, worker->dataLen); in WorkQueueThread()
149 uint32_t QueueWork(WorkQueue *queue, WorkProcess process, uint8_t *data, uint32_t length) in QueueWork() argument
151 if ((queue == NULL) || (process == NULL)) { in QueueWork()
170 worker->process = process; in QueueWork()
/base/security/selinux_adapter/sepolicy/ohos_policy/drivers/peripheral/intelligent_voice/vendor/
Dinit.te14 …v="sdd72" ino=34 scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0
15 …mm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0
16 …mm="hdf_devhost" scontext=u:r:init:s0 tcontext=u:r:intell_voice_host:s0 tclass=process permissive=0
17 allow init intell_voice_host:process { transition rlimitinh siginh };
/base/security/selinux_adapter/sepolicy/ohos_policy/multimedia/av_codec/system/
Dinit.te14 …51 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1
15 …51 comm="sa_main" scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1
16 …mcblk0p7" ino=343 scontext=u:r:init:s0 tcontext=u:r:av_codec_service:s0 tclass=process permissive=1
17 allow init av_codec_service:process { rlimitinh siginh transition };
/base/security/selinux_adapter/sepolicy/ohos_policy/security/security_component/system/
Dinit.te14 …a_main" scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1
15 …a_main" scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1
16 …ino=382 scontext=u:r:init:s0 tcontext=u:r:security_component_service:s0 tclass=process permissive=1
17 allow init security_component_service:process { rlimitinh siginh transition };
/base/security/device_auth/test/unittest/tdd_framework/unit_test/services/session_manager/session/v2/expand_sub_session/expand_process_lib/
Dauth_code_import_test.cpp116 res = server->process(server, clientOut, &serverOut, &serverState);
123 res = client->process(client, serverOut, &clientOut, &clientState);
224 int32_t res = self->process(nullptr, &in, &out, &state);
237 int32_t res = self->process(self, nullptr, &out, &state);
250 int32_t res = self->process(self, &in, nullptr, &state);
263 int32_t res = self->process(self, &in, &out, nullptr);
279 int32_t res = self->process(self, &in, &out, &state);
295 int32_t res = self->process(self, &in, &out, &state);
310 int32_t res = self->process(self, failEvent, &out, &state);
327 int32_t res = self->process(self, failEvent, &out, &state);
[all …]
Dpub_key_exchange_test.cpp116 res = server->process(server, clientOut, &serverOut, &serverState);
123 res = client->process(client, serverOut, &clientOut, &clientState);
224 int32_t res = self->process(nullptr, &in, &out, &state);
237 int32_t res = self->process(self, nullptr, &out, &state);
250 int32_t res = self->process(self, &in, nullptr, &state);
263 int32_t res = self->process(self, &in, &out, nullptr);
279 int32_t res = self->process(self, &in, &out, &state);
295 int32_t res = self->process(self, &in, &out, &state);
310 int32_t res = self->process(self, failEvent, &out, &state);
327 int32_t res = self->process(self, failEvent, &out, &state);
[all …]

12345678910>>...12