/system/memory/libmeminfo/testdata1/ |
D | vmallocinfo | 5 0x0000000000000000-0x0000000000000000 266240 atomic_pool_init+0x0/0x200 user 18 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 19 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 20 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 21 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 26 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 27 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 28 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 29 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 42 0x0000000000000000-0x0000000000000000 40960 mem_dump_probe+0x1d4/0x464 user [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/core/libunwindstack/ |
D | RegsX86_64.cpp | 87 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); in Read() local 90 (*regs)[X86_64_REG_RAX] = user->rax; in Read() 91 (*regs)[X86_64_REG_RBX] = user->rbx; in Read() 92 (*regs)[X86_64_REG_RCX] = user->rcx; in Read() 93 (*regs)[X86_64_REG_RDX] = user->rdx; in Read() 94 (*regs)[X86_64_REG_R8] = user->r8; in Read() 95 (*regs)[X86_64_REG_R9] = user->r9; in Read() 96 (*regs)[X86_64_REG_R10] = user->r10; in Read() 97 (*regs)[X86_64_REG_R11] = user->r11; in Read() 98 (*regs)[X86_64_REG_R12] = user->r12; in Read() [all …]
|
D | RegsX86.cpp | 78 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); in Read() local 81 (*regs)[X86_REG_EAX] = user->eax; in Read() 82 (*regs)[X86_REG_EBX] = user->ebx; in Read() 83 (*regs)[X86_REG_ECX] = user->ecx; in Read() 84 (*regs)[X86_REG_EDX] = user->edx; in Read() 85 (*regs)[X86_REG_EBP] = user->ebp; in Read() 86 (*regs)[X86_REG_EDI] = user->edi; in Read() 87 (*regs)[X86_REG_ESI] = user->esi; in Read() 88 (*regs)[X86_REG_ESP] = user->esp; in Read() 89 (*regs)[X86_REG_EIP] = user->eip; in Read()
|
D | RegsArm64.cpp | 123 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); in Read() local 126 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R30 + 1) * sizeof(uint64_t)); in Read() 128 reg_data[ARM64_REG_SP] = user->sp; in Read() 129 reg_data[ARM64_REG_PC] = user->pc; in Read() 130 reg_data[ARM64_REG_PSTATE] = user->pstate; in Read()
|
D | RegsMips64.cpp | 102 mips64_user_regs* user = reinterpret_cast<mips64_user_regs*>(remote_data); in Read() local 106 memcpy(regs->RawData(), &user->regs[MIPS64_EF_R0], (MIPS64_REG_R31 + 1) * sizeof(uint64_t)); in Read() 108 reg_data[MIPS64_REG_PC] = user->regs[MIPS64_EF_CP0_EPC]; in Read()
|
/system/security/keystore/ |
D | permissions.cpp | 168 struct user_euid user = user_euids[i]; in get_keystore_euid() local 169 if (user.uid == uid) { in get_keystore_euid() 170 return user.euid; in get_keystore_euid() 188 struct user_perm user = user_perms[i]; in has_permission() local 189 if (user.uid == uid) { in has_permission() 190 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission() 206 struct user_euid user = user_euids[i]; in is_granted_to() local 207 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
|
/system/apex/apexd/ |
D | apexd.rc | 4 user root 11 user root 18 user root
|
/system/core/logd/ |
D | logd.rc | 7 user logd 16 user logd 24 user logd
|
/system/core/trusty/utils/rpmb_dev/ |
D | rpmb_dev.rc | 17 user root 21 user system 28 user system
|
/system/update_engine/ |
D | UpdateEngine.conf | 19 <policy user="root"> 23 <policy user="chronos"> 86 <policy user="power"> 91 <policy user="dlcservice">
|
/system/core/rootdir/ |
D | adb_debug.prop | 5 # Disable adb authentication to allow test automation on user build GSI 8 # Allow 'adb root' on user build GSI
|
D | init.zygote64_32.rc | 4 user root 19 user root
|