/system/core/libmeminfo/testdata1/ |
D | vmallocinfo | 5 0x0000000000000000-0x0000000000000000 266240 atomic_pool_init+0x0/0x200 user 18 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 19 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 20 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 21 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 26 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 27 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 28 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 29 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 42 0x0000000000000000-0x0000000000000000 40960 mem_dump_probe+0x1d4/0x464 user [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/sepolicy/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/core/libunwindstack/ |
D | RegsX86_64.cpp | 94 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); in Read() local 97 (*regs)[X86_64_REG_RAX] = user->rax; in Read() 98 (*regs)[X86_64_REG_RBX] = user->rbx; in Read() 99 (*regs)[X86_64_REG_RCX] = user->rcx; in Read() 100 (*regs)[X86_64_REG_RDX] = user->rdx; in Read() 101 (*regs)[X86_64_REG_R8] = user->r8; in Read() 102 (*regs)[X86_64_REG_R9] = user->r9; in Read() 103 (*regs)[X86_64_REG_R10] = user->r10; in Read() 104 (*regs)[X86_64_REG_R11] = user->r11; in Read() 105 (*regs)[X86_64_REG_R12] = user->r12; in Read() [all …]
|
D | RegsX86.cpp | 85 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); in Read() local 88 (*regs)[X86_REG_EAX] = user->eax; in Read() 89 (*regs)[X86_REG_EBX] = user->ebx; in Read() 90 (*regs)[X86_REG_ECX] = user->ecx; in Read() 91 (*regs)[X86_REG_EDX] = user->edx; in Read() 92 (*regs)[X86_REG_EBP] = user->ebp; in Read() 93 (*regs)[X86_REG_EDI] = user->edi; in Read() 94 (*regs)[X86_REG_ESI] = user->esi; in Read() 95 (*regs)[X86_REG_ESP] = user->esp; in Read() 96 (*regs)[X86_REG_EIP] = user->eip; in Read()
|
D | RegsArm64.cpp | 109 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); in Read() local 112 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R31 + 1) * sizeof(uint64_t)); in Read() 114 reg_data[ARM64_REG_PC] = user->pc; in Read() 115 reg_data[ARM64_REG_SP] = user->sp; in Read()
|
D | RegsMips64.cpp | 110 mips64_user_regs* user = reinterpret_cast<mips64_user_regs*>(remote_data); in Read() local 114 memcpy(regs->RawData(), &user->regs[MIPS64_EF_R0], (MIPS64_REG_R31 + 1) * sizeof(uint64_t)); in Read() 116 reg_data[MIPS64_REG_PC] = user->regs[MIPS64_EF_CP0_EPC]; in Read()
|
/system/security/keystore/ |
D | permissions.cpp | 170 struct user_euid user = user_euids[i]; in get_keystore_euid() local 171 if (user.uid == uid) { in get_keystore_euid() 172 return user.euid; in get_keystore_euid() 190 struct user_perm user = user_perms[i]; in has_permission() local 191 if (user.uid == uid) { in has_permission() 192 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid, sid); in has_permission() 208 struct user_euid user = user_euids[i]; in is_granted_to() local 209 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
|
/system/update_engine/ |
D | UpdateEngine.conf | 4 <policy user="root"> 8 <policy user="chronos"> 74 <policy user="power"> 79 <policy user="dlcservice">
|
/system/apex/apexd/ |
D | apexd.rc | 4 user root 10 user root
|
/system/core/logd/ |
D | logd.rc | 7 user logd 15 user logd 23 user logd
|
/system/core/rootdir/ |
D | adb_debug.prop | 5 # Disable adb authentication to allow test automation on user build GSI 8 # Allow 'adb root' on user build GSI
|
D | init.zygote32_64.rc | 4 user root 20 user root
|
D | init.zygote64_32.rc | 4 user root 20 user root
|
/system/sepolicy/reqd_mask/ |
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|