/base/startup/init/services/sandbox/ |
D | sandbox.c | 89 sandbox_t *sandbox; member 96 .sandbox = &g_systemSandbox, 101 .sandbox = &g_chipsetSandbox, 107 .sandbox = &g_testSandbox, 222 typedef int (*AddInfoToSandboxCallback)(sandbox_t *sandbox, cJSON *item, const char *type); 224 static int AddMountInfoToSandbox(sandbox_t *sandbox, cJSON *item, const char *type) in AddMountInfoToSandbox() argument 226 BEGET_CHECK(sandbox != NULL && item != NULL && type != NULL, return -1); in AddMountInfoToSandbox() 255 RemoveOldSandboxMountListNode(&sandbox->pathMountsHead, dstPath); in AddMountInfoToSandbox() 256 OH_ListAddTail(&sandbox->pathMountsHead, &tmpMount->node); in AddMountInfoToSandbox() 259 RemoveOldSandboxMountListNode(&sandbox->fileMountsHead, dstPath); in AddMountInfoToSandbox() [all …]
|
D | BUILD.gn | 25 ohos_static_library("sandbox") { 27 "sandbox.c", 41 ":chipset-sandbox.json", 42 ":system-sandbox.json", 50 ohos_prebuilt_etc("system-sandbox.json") { 54 source = "system-sandbox.json" 56 output = "//base/startup/init/services/sandbox/system-sandbox.json" 59 module_install_dir = "etc/sandbox" 62 ohos_prebuilt_etc("chipset-sandbox.json") { 66 source = "chipset-sandbox.json" [all …]
|
/base/startup/appspawn/etc/ |
D | BUILD.gn | 15 import("//base/startup/appspawn/etc/sandbox/appdata_sandbox_fixer.gni") 18 ohos_prebuilt_appdata_sandbox("appdata-sandbox.json") { 19 source = "../appdata-sandbox.json" 26 extra_sandbox_cfgs += [ "../appdata-sandbox-asan.json" ] 30 module_install_dir = "etc/sandbox" 33 ohos_prebuilt_etc("sandbox-config.json") { 34 source = "//base/startup/appspawn/sandbox-config.json" 36 module_install_dir = "etc/sandbox" 47 ":appdata-sandbox.json", 49 ":sandbox-config.json",
|
/base/startup/appspawn/common/ |
D | appspawn_server.c | 152 AppSandboxArg *sandbox = (AppSandboxArg *)arg; in AppSpawnChild() local 153 struct AppSpawnContent_ *content = sandbox->content; in AppSpawnChild() 154 AppSpawnClient *client = sandbox->client; in AppSpawnChild() 213 int AppSpawnProcessMsg(AppSandboxArg *sandbox, pid_t *childPid) in AppSpawnProcessMsg() argument 215 …APPSPAWN_CHECK(sandbox != NULL && sandbox->content != NULL, return -1, "Invalid content for appspa… in AppSpawnProcessMsg() 216 …APPSPAWN_CHECK(sandbox->client != NULL && childPid != NULL, return -1, "Invalid client for appspaw… in AppSpawnProcessMsg() 217 …APPSPAWN_LOGI("AppSpawnProcessMsg id %{public}d 0x%{public}x", sandbox->client->id, sandbox->clien… in AppSpawnProcessMsg() 220 AppSpawnClient *client = sandbox->client; in AppSpawnProcessMsg() 226 childStack + SANDBOX_STACK_SIZE, client->cloneFlags | SIGCHLD, (void *)sandbox); in AppSpawnProcessMsg() 236 *childPid = AppSpawnFork(AppSpawnChild, (void *)sandbox); in AppSpawnProcessMsg()
|
D | appspawn_server.h | 89 int AppSpawnProcessMsg(AppSandboxArg *sandbox, pid_t *childPid);
|
/base/startup/appspawn/ |
D | appspawn.cfg | 5 "mkdir /mnt/sandbox", 6 "mkdir /mnt/sandbox/com.ohos.render/ 0711 nwebspawn nwebspawn" 14 … "--sandbox-switch on --bundle-name com.ohos.appspawn.startup --app-operate-type operate ", 19 "sandbox" : 0,
|
D | nwebspawn.cfg | 6 … "--sandbox-switch on --bundle-name com.ohos.appspawn.startup --app-operate-type operate ",
|
/base/startup/appspawn/etc/sandbox/ |
D | appdata_sandbox_fixer.pydeps | 2 …tartup/appspawn/etc/sandbox --output base/startup/appspawn/etc/sandbox/appdata_sandbox_fixer.pydep…
|
D | appdata_sandbox_fixer.gni | 27 script = "//base/startup/appspawn/etc/sandbox/appdata_sandbox_fixer.py"
|
/base/startup/init/test/unittest/init/ |
D | sandbox_unittest.cpp | 45 int RestartSandbox(const char *sandbox) in RestartSandbox() argument 47 if (sandbox == nullptr) { in RestartSandbox() 53 if (!InitSandboxWithName(sandbox)) { in RestartSandbox() 55 std::cout << "Failed to init sandbox with name " << sandbox << std::endl; in RestartSandbox() 59 DumpSandboxByName(sandbox); in RestartSandbox() 61 if (PrepareSandbox(sandbox) != 0) { in RestartSandbox() 62 std::cout << "Failed to prepare sandbox " << sandbox << std::endl; in RestartSandbox() 63 DestroySandbox(sandbox); in RestartSandbox() 70 DestroySandbox(sandbox); in RestartSandbox()
|
/base/security/selinux_adapter/sepolicy/ohos_policy/security/dlp_permission_service/system/ |
D | storage_daemon.te | 17 # avc: denied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanag… 18 # avc: denied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanag… 19 # avc: denied { getattr } for pid=494 comm="storage_daemon" path="/mnt/sandbox/com.ohos.dlpmanag…
|
D | appspawn.te | 18 # avc: denied { mounton } for pid=3454 comm="appspawn" path="/mnt/sandbox/com.ohos.dlpmanager/da…
|
/base/startup/init/services/etc/ |
D | watchdog.cfg | 7 "sandbox" : 0,
|
D | console.cfg | 8 "sandbox" : 0,
|
D | console.user.cfg | 7 "sandbox" : 0,
|
D | ueventd.cfg | 24 "sandbox" : 0,
|
/base/update/sys_installer/frameworks/ipc_server/etc/ |
D | module_update_service.cfg | 22 "sandbox" : 0
|
/base/startup/init/services/init/standard/ |
D | init_cmds.c | 511 const char *sandbox = ctx->argv[0]; in DoMkSandbox() local 513 if (!InitSandboxWithName(sandbox)) { in DoMkSandbox() 514 INIT_LOGE("Failed to init sandbox with name %s.", sandbox); in DoMkSandbox() 517 if (PrepareSandbox(sandbox) != 0) { in DoMkSandbox() 518 INIT_LOGE("Failed to prepare sandbox %s.", sandbox); in DoMkSandbox() 519 DestroySandbox(sandbox); in DoMkSandbox()
|
D | BUILD.gn | 71 "//base/startup/init/services/sandbox:sandbox",
|
/base/hiviewdfx/hilog/services/hilogd/etc/ |
D | hilogd.cfg | 22 "sandbox" : 0,
|
/base/security/selinux_adapter/sepolicy/ohos_policy/web/webview/system/ |
D | nwebspawn.te | 62 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 65 #avc: denied { mounton } for pid=4868 comm="nwebspawn" path="/mnt/sandbox/com.example.web0422sta… 73 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 76 #avc: denied { mounton } for pid=2318 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 79 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 82 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 85 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys… 88 #avc: denied { mounton } for pid=2763 comm="nwebspawn" path="/mnt/sandbox/com.example.web330/sys…
|
/base/startup/init/services/begetctl/ |
D | BUILD.gn | 79 "sandbox.cpp", 93 "//base/startup/init/services/sandbox:sandbox",
|
/base/startup/init/services/etc/param/ |
D | ohos.para | 23 const.sandbox=enable
|
/base/startup/init/test/unittest/ |
D | BUILD.gn | 67 "//base/startup/init/services/begetctl/sandbox.cpp", 133 "//base/startup/init/services/sandbox/sandbox.c", 134 "//base/startup/init/services/sandbox/sandbox_namespace.c", 267 "//base/startup/init/services/sandbox/include",
|
/base/startup/init/ |
D | README_zh.md | 75 …s://gitee.com/openharmony/docs/blob/master/zh-cn/device-dev/subsystems/subsys-boot-init-sandbox.md)
|