/system/memory/libmeminfo/testdata1/ |
D | vmallocinfo | 5 0x0000000000000000-0x0000000000000000 266240 atomic_pool_init+0x0/0x200 user 18 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 19 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 20 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 21 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 26 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 27 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 28 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 29 0x0000000000000000-0x0000000000000000 73728 msm_watchdog_probe+0x5b8/0xc24 user 42 0x0000000000000000-0x0000000000000000 40960 mem_dump_probe+0x1d4/0x464 user [all …]
|
/system/sepolicy/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=user determines the level from the user ID. [all …]
|
D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 24 # Allow to communicate with the snapuserd service, for dm-user snapshots.
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 19 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
D | snapuserd.te | 1 # snapuserd - Daemon for servicing dm-user requests for Virtual A/B snapshots. 16 # Reading and writing to dm-user control nodes.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 88 # levelFrom=user determines the level from the user ID. [all …]
|
D | update_engine.te | 12 # Allow to start snapuserd for dm-user communication. 24 # Allow to communicate with the snapuserd service, for dm-user snapshots.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | seapp_contexts | 6 # user (string) 16 # isOwner=true will only match for the owner/primary user. 20 # A user string selector that ends in * will perform a prefix match. 21 # user=_app will match any regular app UID. 22 # user=_isolated will match any isolated service UID. 36 # (5) Specified user= string before unspecified user= string. 37 # (6) Fixed user= string before user= prefix (i.e. ending in *). 38 # (7) Longer user= prefix before shorter user= prefix. 50 # levelFrom (string; one of none, all, app, or user) 54 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | seapp_contexts | 9 # user (string) 20 # A user, name, or path string selector that ends in * will perform a prefix 29 # isOwner=true will only match for the owner/primary user. 30 # user=_app will match any regular app process. 31 # user=_isolated will match any isolated service process. 32 # Other values of user are matched against the name associated with the process 54 # (4) Specified user= string before unspecified user= string; 55 # more specific user= string before less specific user= string. 76 # levelFrom (string; one of none, all, app, or user) 87 # levelFrom=user determines the level from the user ID. [all …]
|
D | su.te | 13 # Put the incident command into its domain so it is the same on user, userdebug and eng. 16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
|
/system/unwinding/libunwindstack/ |
D | RegsX86_64.cpp | 87 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); in Read() local 90 (*regs)[X86_64_REG_RAX] = user->rax; in Read() 91 (*regs)[X86_64_REG_RBX] = user->rbx; in Read() 92 (*regs)[X86_64_REG_RCX] = user->rcx; in Read() 93 (*regs)[X86_64_REG_RDX] = user->rdx; in Read() 94 (*regs)[X86_64_REG_R8] = user->r8; in Read() 95 (*regs)[X86_64_REG_R9] = user->r9; in Read() 96 (*regs)[X86_64_REG_R10] = user->r10; in Read() 97 (*regs)[X86_64_REG_R11] = user->r11; in Read() 98 (*regs)[X86_64_REG_R12] = user->r12; in Read() [all …]
|
D | RegsX86.cpp | 78 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); in Read() local 81 (*regs)[X86_REG_EAX] = user->eax; in Read() 82 (*regs)[X86_REG_EBX] = user->ebx; in Read() 83 (*regs)[X86_REG_ECX] = user->ecx; in Read() 84 (*regs)[X86_REG_EDX] = user->edx; in Read() 85 (*regs)[X86_REG_EBP] = user->ebp; in Read() 86 (*regs)[X86_REG_EDI] = user->edi; in Read() 87 (*regs)[X86_REG_ESI] = user->esi; in Read() 88 (*regs)[X86_REG_ESP] = user->esp; in Read() 89 (*regs)[X86_REG_EIP] = user->eip; in Read()
|
D | RegsArm64.cpp | 135 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); in Read() local 138 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R30 + 1) * sizeof(uint64_t)); in Read() 140 reg_data[ARM64_REG_SP] = user->sp; in Read() 141 reg_data[ARM64_REG_PC] = user->pc; in Read() 142 reg_data[ARM64_REG_PSTATE] = user->pstate; in Read()
|
/system/apex/apexd/ |
D | apexd.rc | 4 user root 11 user root 18 user root
|
/system/core/trusty/utils/rpmb_dev/ |
D | rpmb_dev.rc | 17 user root 21 user system 28 user system
|
/system/logging/logd/ |
D | logd.rc | 7 user logd 16 user logd 24 user logd
|
/system/update_engine/ |
D | UpdateEngine.conf | 19 <policy user="root"> 23 <policy user="chronos"> 86 <policy user="power"> 91 <policy user="dlcservice">
|
/system/core/rootdir/ |
D | adb_debug.prop | 5 # Disable adb authentication to allow test automation on user build GSI 8 # Allow 'adb root' on user build GSI
|
D | init.zygote64_32.rc | 4 user root 21 user root
|
/system/security/keystore2/ |
D | keystore2.rc | 5 # Keystore shall run as user keystore and groups keystore, readproc, and log. 11 user keystore
|