Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 225) sorted by relevance

123456789

/system/core/libmeminfo/testdata1/
Dvmallocinfo5 0x0000000000000000-0x0000000000000000 266240 atomic_pool_init+0x0/0x200 user
18 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
19 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
20 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
21 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
26 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
27 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
28 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
29 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user
42 0x0000000000000000-0x0000000000000000 40960 mem_dump_probe+0x1d4/0x464 user
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dseapp_contexts6 # user (string)
16 # isOwner=true will only match for the owner/primary user.
20 # A user string selector that ends in * will perform a prefix match.
21 # user=_app will match any regular app UID.
22 # user=_isolated will match any isolated service UID.
36 # (5) Specified user= string before unspecified user= string.
37 # (6) Fixed user= string before user= prefix (i.e. ending in *).
38 # (7) Longer user= prefix before shorter user= prefix.
50 # levelFrom (string; one of none, all, app, or user)
54 # levelFrom=user is only supported for _app or _isolated UIDs.
[all …]
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/sepolicy/prebuilts/api/26.0/private/
Dseapp_contexts6 # user (string)
16 # isOwner=true will only match for the owner/primary user.
20 # A user string selector that ends in * will perform a prefix match.
21 # user=_app will match any regular app UID.
22 # user=_isolated will match any isolated service UID.
36 # (5) Specified user= string before unspecified user= string.
37 # (6) Fixed user= string before user= prefix (i.e. ending in *).
38 # (7) Longer user= prefix before shorter user= prefix.
50 # levelFrom (string; one of none, all, app, or user)
54 # levelFrom=user is only supported for _app or _isolated UIDs.
[all …]
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/sepolicy/prebuilts/api/28.0/private/
Dseapp_contexts6 # user (string)
16 # isOwner=true will only match for the owner/primary user.
20 # A user string selector that ends in * will perform a prefix match.
21 # user=_app will match any regular app UID.
22 # user=_isolated will match any isolated service UID.
36 # (5) Specified user= string before unspecified user= string.
37 # (6) Fixed user= string before user= prefix (i.e. ending in *).
38 # (7) Longer user= prefix before shorter user= prefix.
50 # levelFrom (string; one of none, all, app, or user)
54 # levelFrom=user is only supported for _app or _isolated UIDs.
[all …]
Dsu.te13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/sepolicy/prebuilts/api/29.0/private/
Dseapp_contexts9 # user (string)
20 # A user, name, or path string selector that ends in * will perform a prefix
29 # isOwner=true will only match for the owner/primary user.
30 # user=_app will match any regular app process.
31 # user=_isolated will match any isolated service process.
32 # Other values of user are matched against the name associated with the process
54 # (4) Specified user= string before unspecified user= string;
55 # more specific user= string before less specific user= string.
76 # levelFrom (string; one of none, all, app, or user)
87 # levelFrom=user determines the level from the user ID.
[all …]
Dsu.te13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/sepolicy/private/
Dseapp_contexts9 # user (string)
20 # A user, name, or path string selector that ends in * will perform a prefix
29 # isOwner=true will only match for the owner/primary user.
30 # user=_app will match any regular app process.
31 # user=_isolated will match any isolated service process.
32 # Other values of user are matched against the name associated with the process
54 # (4) Specified user= string before unspecified user= string;
55 # more specific user= string before less specific user= string.
76 # levelFrom (string; one of none, all, app, or user)
87 # levelFrom=user determines the level from the user ID.
[all …]
Dsu.te13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/core/libunwindstack/
DRegsX86_64.cpp94 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); in Read() local
97 (*regs)[X86_64_REG_RAX] = user->rax; in Read()
98 (*regs)[X86_64_REG_RBX] = user->rbx; in Read()
99 (*regs)[X86_64_REG_RCX] = user->rcx; in Read()
100 (*regs)[X86_64_REG_RDX] = user->rdx; in Read()
101 (*regs)[X86_64_REG_R8] = user->r8; in Read()
102 (*regs)[X86_64_REG_R9] = user->r9; in Read()
103 (*regs)[X86_64_REG_R10] = user->r10; in Read()
104 (*regs)[X86_64_REG_R11] = user->r11; in Read()
105 (*regs)[X86_64_REG_R12] = user->r12; in Read()
[all …]
DRegsX86.cpp85 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); in Read() local
88 (*regs)[X86_REG_EAX] = user->eax; in Read()
89 (*regs)[X86_REG_EBX] = user->ebx; in Read()
90 (*regs)[X86_REG_ECX] = user->ecx; in Read()
91 (*regs)[X86_REG_EDX] = user->edx; in Read()
92 (*regs)[X86_REG_EBP] = user->ebp; in Read()
93 (*regs)[X86_REG_EDI] = user->edi; in Read()
94 (*regs)[X86_REG_ESI] = user->esi; in Read()
95 (*regs)[X86_REG_ESP] = user->esp; in Read()
96 (*regs)[X86_REG_EIP] = user->eip; in Read()
DRegsArm64.cpp109 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); in Read() local
112 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R31 + 1) * sizeof(uint64_t)); in Read()
114 reg_data[ARM64_REG_PC] = user->pc; in Read()
115 reg_data[ARM64_REG_SP] = user->sp; in Read()
DRegsMips64.cpp110 mips64_user_regs* user = reinterpret_cast<mips64_user_regs*>(remote_data); in Read() local
114 memcpy(regs->RawData(), &user->regs[MIPS64_EF_R0], (MIPS64_REG_R31 + 1) * sizeof(uint64_t)); in Read()
116 reg_data[MIPS64_REG_PC] = user->regs[MIPS64_EF_CP0_EPC]; in Read()
/system/security/keystore/
Dpermissions.cpp170 struct user_euid user = user_euids[i]; in get_keystore_euid() local
171 if (user.uid == uid) { in get_keystore_euid()
172 return user.euid; in get_keystore_euid()
190 struct user_perm user = user_perms[i]; in has_permission() local
191 if (user.uid == uid) { in has_permission()
192 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission()
208 struct user_euid user = user_euids[i]; in is_granted_to() local
209 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
/system/update_engine/
DUpdateEngine.conf4 <policy user="root">
8 <policy user="chronos">
74 <policy user="power">
79 <policy user="dlcservice">
/system/apex/apexd/
Dapexd.rc4 user root
10 user root
/system/core/logd/
Dlogd.rc7 user logd
15 user logd
23 user logd
/system/core/rootdir/
Dadb_debug.prop5 # Disable adb authentication to allow test automation on user build GSI
8 # Allow 'adb root' on user build GSI
Dinit.zygote32_64.rc4 user root
20 user root
Dinit.zygote64_32.rc4 user root
20 user root
/system/sepolicy/reqd_mask/
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;

123456789