/base/request/request/services/service/rust/src/ |
D | request_service_ability.rs | 314 client_data.write::<InterfaceToken>(¬ify_token).ok(); in notify_client() 315 client_data.write(&cb_type).ok(); in notify_client() 316 client_data.write(&(notify_data.task_id.to_string())).ok(); in notify_client() 318 .write(&(notify_data.progress.common_data.state as u32)) in notify_client() 321 client_data.write(&(index as u32)).ok(); in notify_client() 323 .write(&(notify_data.progress.processed[index] as u64)) in notify_client() 326 .write(&(notify_data.progress.common_data.total_processed as u64)) in notify_client() 328 client_data.write(&(notify_data.progress.sizes)).ok(); in notify_client() 330 .write(&(notify_data.progress.extras.len() as u32)) in notify_client() 333 client_data.write(&k).ok(); in notify_client() [all …]
|
D | request_service.rs | 53 reply.write(&(ErrorCode::Permission as i32)); in construct() 87 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct() 101 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct() 123 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct() 136 reply.write(&(ErrorCode::Ipc_size_too_large as i32)); in construct() 182 reply.write(&(ret as i32))?; in construct() 187 reply.write(&(task_id as i32))?; in construct() 197 reply.write(&(ErrorCode::Permission as i32)); in pause() 206 reply.write(&(ret as i32))?; in pause() 215 reply.write(&(ErrorCode::TaskNotFound as i32)); in pause() [all …]
|
/base/startup/init/scripts/ |
D | param_cfg_to_code.py | 81 f.write('#ifndef PARAM_LITE_DEF_CFG_' + os.linesep) 82 f.write('#define PARAM_LITE_DEF_CFG_' + os.linesep) 83 f.write('#include <stdint.h>' + os.linesep + os.linesep) 84 f.write('#ifdef __cplusplus' + os.linesep) 85 f.write('#if __cplusplus' + os.linesep) 86 f.write('extern "C" {' + os.linesep) 87 f.write('#endif' + os.linesep) 88 f.write('#endif' + os.linesep + os.linesep) 91 f.write('typedef struct Node_ {' + os.linesep) 92 f.write(' const char *name;' + os.linesep) [all …]
|
/base/security/selinux_adapter/sepolicy/base/te/ |
D | udevd.te | 25 allow udevd data_file:dir { add_name create read remove_name watch write }; 28 allow udevd data_udev:dir { add_name create getattr open read remove_name search watch write }; 29 allow udevd data_udev:file { create ioctl open read rename unlink write write open }; 34 allow udevd dev_bbox:chr_file { getattr write }; 37 allow udevd dev_bus_usb_file:chr_file { getattr write }; 39 allow udevd dev_char_file:dir { add_name getattr search write }; 40 allow udevd dev_char_file:lnk_file { create getattr read write }; 41 allow udevd dev_console_file:chr_file { getattr write }; 42 allow udevd dev_cpu_dma_latency_file:chr_file { getattr write }; 43 allow udevd dev_dev_cec0:chr_file { getattr write }; [all …]
|
D | kernel.te | 14 allow kernel data_file:dir { add_name write create search setattr }; 15 allow kernel data_log:dir { add_name create search setattr write }; 16 allow kernel data_log:file { append create read write open setattr }; 17 allow kernel dev_bbox:chr_file { open write }; 19 allow kernel device:dir { add_name remove_name rmdir search write }; 23 allow kernel pstorefs:dir { open read remove_name search write }; 25 allow kernel softbus_server:tcp_socket { read write }; 27 allow kernel tmpfs:chr_file { write };
|
/base/startup/init/services/etc/ |
D | init.cfg | 10 "write /proc/sys/kernel/sysrq 0", 11 "write /proc/sys/kernel/dmesg_restrict 1", 12 "write /proc/sys/kernel/kptr_restrict 1", 42 "write /proc/sys/kernel/panic_on_oops 1", 43 "write /proc/sys/kernel/hung_task_timeout_secs 0", 44 "write /proc/cpu/alignment 4", 45 "write /proc/sys/kernel/sched_tunable_scaling 0", 46 "write /proc/sys/kernel/sched_latency_ns 10000000", 47 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000", 48 "write /proc/sys/kernel/sched_child_runs_first 0", [all …]
|
D | init.without_two_stages.cfg | 10 "write /proc/sys/kernel/sysrq 0", 30 "write /proc/sys/kernel/panic_on_oops 1", 31 "write /proc/sys/kernel/hung_task_timeout_secs 0", 32 "write /proc/cpu/alignment 4", 33 "write /proc/sys/kernel/sched_tunable_scaling 0", 34 "write /proc/sys/kernel/sched_latency_ns 10000000", 35 "write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000", 36 "write /proc/sys/kernel/sched_child_runs_first 0", 37 "write /proc/sys/kernel/randomize_va_space 2", 38 "write /proc/sys/vm/mmap_min_addr 32768", [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/communication/netmanager/system/ |
D | netsysnative.te | 16 allow netsysnative netsysnative:netlink_route_socket { create listen nlmsg_write write }; 24 allow netsysnative proc_file:file { write open read }; 28 allow netsysnative tty_device:chr_file { open read write }; 29 allow netsysnative netsysnative:udp_socket { bind read getopt setopt connect write }; 33 allow netsysnative dev_file:sock_file { write unlink }; 34 allow netsysnative dev_console_file:chr_file { read write }; 41 allow netsysnative data_service_el1_file:dir { search write add_name }; 42 allow netsysnative data_service_el1_file:file { create write open ioctl read }; 43 allow netsysnative fwmark_service:sock_file { create unlink setattr write }; 47 allow netsysnative normal_hap_attr:tcp_socket { read write getopt setopt }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/hilog/system/ |
D | hilogd.te | 18 allow $1 hilog_input_socket:sock_file write; 24 allow $1 hilog_output_socket:sock_file write; 30 allow $1 hilog_control_socket:sock_file write; 73 allow hilogd data_init_agent:dir { add_name search write }; 79 allow hilogd init:unix_dgram_socket { getattr getopt read write }; 83 allow hilogd paramservice_socket:sock_file { write }; 95 # hilogd is not allowed to write anywhere other than /data/log/hilog 100 }:file { create write append }; 108 # write to /system 109 neverallow hilogd system_file:dir_file_class_set write; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/bundlemanager/bundle_framework/system/ |
D | installs.te | 16 allow installs data_app_el1_file:dir { add_name getattr open read remove_name rmdir search write }; 18 …data_app_el2_file:dir { add_name create getattr open read remove_name search setattr write rmdir }; 22 allow installs data_service_el1_file:file { create setattr unlink getattr open read rename write io… 23 allow installs data_service_el2_file:dir { add_name create open read search setattr write getattr r… 28 …a_file_attr:dir { getattr open read relabelfrom relabelto remove_name rmdir search setattr write }; 32 allow installs selinuxfs:file { open read write }; 34 …a_file_attr:dir { open read relabelfrom relabelto remove_name rmdir search getattr setattr write }; 35 …a_file_attr:dir { getattr open read relabelfrom relabelto remove_name rmdir search setattr write }; 39 …service_el2_share:dir { add_name create open read search remove_name setattr write getattr rmdir }; 40 allow installs data_local:file { create getattr ioctl setattr unlink map read open write }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/hitrace/system/ |
D | hitrace.te | 14 #allow hitrace data_file:file write; 17 allow hitrace data_log:dir { add_name search write }; 18 allow hitrace data_log:file { create getattr open write }; 19 allow hitrace data_local_tmp:dir { add_name search write create }; 20 allow hitrace data_local_tmp:file { create getattr open write }; 23 allow hitrace devpts:chr_file { read write }; 25 allow hitrace hdcd:unix_stream_socket { read write }; 29 allow hitrace tracefs_trace_marker_file:file { getattr open write }; 30 allow hitrace tty_device:chr_file { read write }; 31 allow hitrace tracefs:file { getattr ioctl open read write }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/bytrace/system/ |
D | bytrace.te | 14 #allow bytrace data_file:file write; 17 allow bytrace data_log:dir { add_name search write }; 18 allow bytrace data_log:file { create getattr open write }; 19 allow bytrace data_local_tmp:dir { add_name search write create }; 20 allow bytrace data_local_tmp:file { create getattr open write }; 23 allow bytrace devpts:chr_file { read write }; 25 allow bytrace hdcd:unix_stream_socket { read write }; 29 allow bytrace tracefs_trace_marker_file:file { getattr open write }; 30 allow bytrace tty_device:chr_file { read write }; 31 allow bytrace tracefs:file { getattr ioctl open read write }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/dfs_service/system/ |
D | cloudfiledaemon.te | 18 allow cloudfiledaemon paramservice_socket:sock_file { write }; 28 allow cloudfiledaemon data_app_file:dir { search open read write }; 29 allow cloudfiledaemon data_app_el2_file:dir { search read write open }; 30 allow cloudfiledaemon data_app_el2_file:file { lock getattr open read write ioctl map }; 31 allow cloudfiledaemon dev_fuse_file:chr_file { read write }; 33 allow cloudfiledaemon data_service_el2_hmdfs:dir { create search read open write add_name remove_na… 34 allow cloudfiledaemon data_service_el2_hmdfs:file { create setattr getattr read open write append i… 35 allow cloudfiledaemon hmdfs:dir { search write remove_name add_name create open read rmdir }; 44 allow cloudfiledaemon dev_console_file:chr_file { read write }; 46 allow cloudfiledaemon data_service_el1_file:dir { search write add_name create remove_name }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/multimodalinput/input/system/ |
D | udevd.te | 18 allow udevd data_service_el1_file:dir { search write add_name create getattr remove_name read open … 19 allow udevd data_service_el1_file:file { create unlink write open ioctl read rename }; 24 allow udevd dev_char_file:dir { search write remove_name }; 26 allow udevd dev_dri_file:chr_file { getattr write }; 27 allow udevd dev_dri_file:dir { add_name search write }; 28 allow udevd dev_file:dir { add_name create write }; 31 allow udevd dev_input_file:lnk_file { getattr read write unlink rename }; 32 allow udevd dev_ptmx:chr_file { write getattr }; 36 allow udevd tty_device:chr_file { open read write }; 39 allow udevd udevd:netlink_kobject_uevent_socket { getattr setopt write };
|
D | multimodalinput.te | 19 allow multimodalinput data_log:dir { search write add_name create }; 20 allow multimodalinput data_log:file { create open read write ioctl }; 21 …nput data_multimodalinput:dir { add_name create getattr open read remove_name search watch write }; 22 allow multimodalinput data_multimodalinput:file { create open read rename unlink write setattr geta… 27 allow multimodalinput dev_console_file:chr_file { open read write getattr ioctl }; 29 allow multimodalinput dev_dri_file:chr_file { open read write getattr ioctl }; 30 allow multimodalinput dev_kmsg_file:chr_file { open write }; 34 allow multimodalinput dev_unix_socket:sock_file { write }; 38 allow multimodalinput faultloggerd_socket:sock_file { write }; 49 allow multimodalinput rootfs:chr_file { write }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/update/updater_sa/system/ |
D | updater_sa.te | 17 allow updater_sa updater_sa:tcp_socket { connect create read setopt write getopt getattr }; 20 allow updater_sa data_ota_package:dir { add_name search write remove_name getattr }; 23 allow updater_sa dev_file:sock_file { write }; 25 allow updater_sa updater_sa:udp_socket { create bind connect getattr read write }; 33 allow updater_sa data_service_el1_file:dir { search write add_name remove_name read open getattr }; 34 allow updater_sa data_service_el1_file:file { create getattr read write open lock ioctl unlink map … 40 allow updater_sa update_firmware_file:dir { search read open write getattr add_name remove_name }; 41 …updater_sa update_firmware_file:file {create read append open getattr unlink setattr ioctl write }; 43 allow updater_sa data_file:dir { read open write getattr setattr add_name remove_name }; 45 allow updater_sa data_updater_file:dir { search getattr write add_name create }; [all …]
|
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
D | hap_signing_block_utils_test.cpp | 56 hapFile.write(block, sizeof(block)); in CreatTestZipFile() 62 hapFile.write(reinterpret_cast<char*>(&signBlob), sizeof(signBlob)); in CreatTestZipFile() 63 hapFile.write(reinterpret_cast<char*>(&profileBlob), sizeof(profileBlob)); in CreatTestZipFile() 64 hapFile.write(reinterpret_cast<char*>(&propertyBlob), sizeof(propertyBlob)); in CreatTestZipFile() 66 hapFile.write(block, sizeof(block)); in CreatTestZipFile() 69 hapFile.write(reinterpret_cast<char*>(&blockCount), sizeof(blockCount)); in CreatTestZipFile() 72 hapFile.write(reinterpret_cast<char*>(&signBlockSize), sizeof(signBlockSize)); in CreatTestZipFile() 74 hapFile.write(reinterpret_cast<char*>(&magic), sizeof(magic)); in CreatTestZipFile() 76 hapFile.write(reinterpret_cast<char*>(&magic), sizeof(magic)); in CreatTestZipFile() 78 hapFile.write(reinterpret_cast<char*>(&version), sizeof(version)); in CreatTestZipFile() [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/hdc/system/ |
D | hdcd.te | 15 allow hdcd data_local:file { read open getattr create write }; 16 allow hdcd data_local:dir { search getattr read write add_name open create }; 17 allow hdcd data_local_tmp:file { write create setattr read append open getattr unlink }; 18 allow hdcd data_local_tmp:dir { add_name remove_name write create setattr search getattr read open … 24 allow hdcd self:tcp_socket { accept ioctl setopt read write create bind listen getattr connect name… 37 allow hdcd dev_rtc_file:chr_file { write open ioctl }; 42 allow hdcd data_file:dir { read write open create getattr search rmdir add_name }; 47 allow hdcd tty_device:chr_file { ioctl read write open }; 57 allow hdcd dev_unix_socket:sock_file { write }; 59 allow hdcd data_init_agent:dir { search write add_name }; [all …]
|
/base/update/packaging_tools/test/ |
D | test_utils.py | 53 zip_obj.write('test_dir', 'test_dir') 64 w_f.write('test') 65 zip_obj.write(UPDATER_CONFIG, UPDATER_CONFIG) 66 zip_obj.write('test.file', 'test.file') 81 w_f.write(UPDATER_SPECIFIED_CONFIG_REPEATS.encode()) 103 w_f.write('test') 121 w_f.write('test content') 135 w_f.write('test content') 137 w_f.write('test content') 153 w_f.write(PARTITION_FILE_CONVERSION_FAILED)
|
/base/security/selinux_adapter/sepolicy/base/public/ |
D | hap_domain.te | 47 allow hap_domain appspawn:fifo_file write; 48 allow hap_domain appspawn:unix_dgram_socket { connect write }; 51 allow hap_domain data_app_el1_file:dir { add_name create open read search setattr write }; 53 allow hap_domain data_app_el2_file:dir { add_name search read write create open remove_name setattr… 54 allow hap_domain data_app_el2_file:file { create read write open lock ioctl unlink map setattr geta… 58 …omain data_file:file { create getattr ioctl lock map open read write rename setattr unlink write }; 59 allow hap_domain data_log:file { read write }; 89 neverallow hap_domain dev_attr:blk_file { read write }; 93 …nix_socket_file -dev_mali -tty_device -dev_fuse_file -dev_bbox }:chr_file { open ioctl read write}; 96 …e -dev_mali -tty_device -dev_fuse_file -dev_tun_file -dev_bbox }:chr_file { open ioctl read write}; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/hiviewdfx/faultloggerd/system/ |
D | processdump.te | 42 allow domain self:fifo_file { write }; 45 allow processdump domain:fifo_file { read write }; 48 #============= write event to hiview ========= 53 allow processdump faultloggerd_temp_file:file { getattr open read write }; 56 allow processdump faultloggerd_socket:sock_file write; 63 allow processdump processdump:unix_dgram_socket { create connect write }; 64 allow processdump processdump:unix_stream_socket { create setopt connect write read }; 77 allow processdump hdcd:fifo_file { read write }; 80 allow processdump hdcd:unix_stream_socket { read write }; 83 allow processdump devpts:chr_file { read write }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/developtools/profiler/system/ |
D | native_daemon.te | 16 allow domain dev_unix_socket:sock_file write; 17 allow domain dev_unix_file:sock_file write; 22 allow domain hiprofiler_socket:sock_file { getattr write unlink }; 25 allow native_daemon data_local_tmp:file { create read open write lock getattr ioctl map }; 26 allow native_daemon data_local_tmp:dir { search add_name write getattr }; 31 allow native_daemon devpts:chr_file { read write }; 36 allow native_daemon hdcd:unix_stream_socket { read write }; 38 allow native_daemon tty_device:chr_file { ioctl open read write }; 50 allow native_daemon paramservice_socket:sock_file write; 59 allow native_daemon dev_unix_socket:dir { add_name remove_name write search }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/bundlemanager/distributed_bundle_framework/system/ |
D | sh.te | 15 allow sh configfs:dir { add_name create search write }; 16 allow sh configfs:file { open write }; 20 allow sh data_file:dir { add_name create setattr write }; 21 allow sh data_file:file { create ioctl setattr write }; 36 allow sh hilog_control_socket:sock_file { write }; 47 allow sh selinuxfs:file { open read write }; 53 allow sh tmpfs:dir { add_name write }; 54 allow sh tmpfs:file { create open open write write write open };
|
/base/security/selinux_adapter/sepolicy/ohos_policy/communication/wifi/system/ |
D | wifi_hal_service.te | 15 allow wifi_hal_service data_log:file { read write }; 16 allow wifi_hal_service data_service_el1_file:dir { add_name getattr remove_name search write }; 17 allow wifi_hal_service data_service_el1_file:file { create read write open getattr ioctl rename }; 21 allow wifi_hal_service dev_unix_socket:sock_file { write }; 32 allow wifi_hal_service tty_device:chr_file { open read write }; 39 …wifi_hal_service wifi_hal_service:netlink_generic_socket { bind create getattr read setopt write }; 40 allow wifi_hal_service wifi_hal_service:netlink_route_socket { bind create nlmsg_write read write }; 41 allow wifi_hal_service wifi_hal_service:packet_socket { bind create ioctl read setopt write }; 42 allow wifi_hal_service wifi_hal_service:udp_socket { bind connect create ioctl read write }; 70 allow wifi_hal_service dev_hdfwifi:chr_file { read open write getattr ioctl }; [all …]
|
/base/security/selinux_adapter/sepolicy/ohos_policy/filemanagement/user_file_service/system/ |
D | normal_hap.te | 14 allow normal_hap_attr data_service_el1_file:dir { create read open rename reparent search write rmd… 15 allow normal_hap_attr data_service_el1_file:file { create read open write unlink getattr rename }; 16 allow normal_hap_attr vfat:dir { add_name create open read remove_name rename reparent rmdir write … 17 allow normal_hap_attr vfat:file { create getattr read rename open unlink write }; 20 allow normal_hap_attr exfat:dir { create read open rename reparent search write rmdir getattr remov… 21 allow normal_hap_attr exfat:file { create read open write unlink getattr rename }; 23 allow normal_hap_attr ntfs:dir { create read open rename reparent search write rmdir getattr remove… 24 allow normal_hap_attr ntfs:file { create read open write unlink getattr rename };
|