Lines Matching refs:property
545 int SpawnBuildSandboxEnv(AppSpawnMgr *content, AppSpawningCtx *property)
547 ExtDataType type = CheckAppMsgFlagsSet(property, APP_FLAGS_ISOLATED_SANDBOX_TYPE) ? EXT_DATA_ISOLATED_SANDBOX :
550 APPSPAWN_CHECK(appSandbox != NULL, return -1, "Failed to get sandbox for %{public}s", GetProcessName(property));
552 if (CheckAppMsgFlagsSet(property, APP_FLAGS_NO_SANDBOX)) {
563 int ret = MountSandboxConfigs(appSandbox, property, IsNWebSpawnMode(content));
566 if (CheckAppMsgFlagsSet(property, APP_FLAGS_IGNORE_SANDBOX)) {
573 static int AppendPermissionGid(const AppSpawnSandboxCfg *sandbox, AppSpawningCtx *property)
575 AppSpawnMsgDacInfo *dacInfo = (AppSpawnMsgDacInfo *)GetAppProperty(property, TLV_DAC_INFO);
577 "No tlv %{public}d in msg %{public}s", TLV_DAC_INFO, GetProcessName(property));
579 APPSPAWN_LOGV("AppendPermissionGid %{public}s", GetProcessName(property));
583 if (!CheckAppPermissionFlagSet(property, (uint32_t)permissionNode->permissionIndex)) {
592 permissionNode->section.name, permissionNode->section.gidTable[0], GetProcessName(property));
597 GetProcessName(property), dacInfo->gidCount, permissionNode->section.gidCount);
604 permissionNode->section.name, GetProcessName(property));
614 static int AppendPackageNameGids(const AppSpawnSandboxCfg *sandbox, AppSpawningCtx *property)
616 AppSpawnMsgDacInfo *dacInfo = (AppSpawnMsgDacInfo *)GetAppProperty(property, TLV_DAC_INFO);
618 "No tlv %{public}d in msg %{public}s", TLV_DAC_INFO, GetProcessName(property));
621 (SandboxPackageNameNode *)GetSandboxSection(&sandbox->packageNameQueue, GetProcessName(property));
629 GetProcessName(property),
639 GetProcessName(property));
646 int SpawnPrepareSandboxCfg(AppSpawnMgr *content, AppSpawningCtx *property)
649 APPSPAWN_CHECK_ONLY_EXPER(property != NULL, return -1);
650 APPSPAWN_LOGV("Prepare sandbox config %{public}s", GetProcessName(property));
651 ExtDataType type = CheckAppMsgFlagsSet(property, APP_FLAGS_ISOLATED_SANDBOX_TYPE) ? EXT_DATA_ISOLATED_SANDBOX :
654 APPSPAWN_CHECK(sandbox != NULL, return -1, "Failed to get sandbox for %{public}s", GetProcessName(property));
664 if (index > 0 && (CheckAppMsgFlagsSet(property, (uint32_t)fileMgrIndex) == 0)) {
665 if (SetAppPermissionFlags(property, index) != 0) {
670 int ret = AppendPermissionGid(sandbox, property);
671 APPSPAWN_CHECK(ret == 0, return ret, "Failed to add gid for %{public}s", GetProcessName(property));
672 ret = AppendPackageNameGids(sandbox, property);
673 APPSPAWN_CHECK(ret == 0, return ret, "Failed to add gid for %{public}s", GetProcessName(property));
674 ret = StagedMountSystemConst(sandbox, property, IsNWebSpawnMode(content));
675 APPSPAWN_CHECK(ret == 0, return ret, "Failed to mount system-const for %{public}s", GetProcessName(property));