/system/core/rootdir/ |
D | ueventd.rc | 11 /dev/null 0666 root root 12 /dev/zero 0666 root root 13 /dev/full 0666 root root 14 /dev/ptmx 0666 root root 15 /dev/tty 0666 root root 16 /dev/random 0666 root root 17 /dev/urandom 0666 root root 19 /dev/hw_random 0440 root system 20 /dev/ashmem 0666 root root 21 /dev/binder 0666 root root [all …]
|
D | init.rc | 24 mkdir /mnt 0775 root system 69 mkdir /mnt/secure 0700 root root 70 mkdir /mnt/secure/asec 0700 root root 71 mkdir /mnt/asec 0755 root system 72 mkdir /mnt/obb 0755 root system 73 mkdir /mnt/media_rw 0750 root media_rw 74 mkdir /mnt/user 0755 root root 75 mkdir /mnt/user/0 0755 root root 77 mkdir /mnt/appfuse 0711 root root 80 mkdir /mnt/runtime 0700 root root [all …]
|
D | init.zygote64_32.rc | 3 socket zygote stream 660 root system 14 socket zygote_secondary stream 660 root system
|
D | init.zygote32_64.rc | 3 socket zygote stream 660 root system 14 socket zygote_secondary stream 660 root system
|
/system/core/libcutils/ |
D | config_utils.c | 39 cnode* config_find(cnode *root, const char *name) in config_find() argument 44 for(node = root->first_child; node; node = node->next) in config_find() 51 static cnode* _config_create(cnode *root, const char *name) in _config_create() argument 57 if(root->last_child) in _config_create() 58 root->last_child->next = node; in _config_create() 60 root->first_child = node; in _config_create() 62 root->last_child = node; in _config_create() 67 int config_bool(cnode *root, const char *name, int _default) in config_bool() argument 71 node = config_find(root, name); in config_bool() 85 const char* config_str(cnode *root, const char *name, const char *_default) in config_str() argument [all …]
|
/system/core/crash_reporter/ |
D | crash_reporter.rc | 21 # These directories are group-writable by root so that crash_reporter can 23 mkdir /data/misc/crash_reporter 0770 root root 24 mkdir /data/misc/crash_reporter/crash 0770 root root 25 mkdir /data/misc/crash_reporter/lock 0700 root root 26 mkdir /data/misc/crash_reporter/log 0700 root root 27 mkdir /data/misc/crash_reporter/run 0700 root root 28 mkdir /data/misc/crash_reporter/tmp 0770 root root
|
/system/bt/osi/src/ |
D | buffer.c | 30 buffer_t *root; member 41 buffer->root = buffer; in buffer_new() 60 ret->root = buf->root; in buffer_new_slice() 64 ++buf->root->refcount; in buffer_new_slice() 73 if (buffer->root != buffer) { in buffer_free() 75 if (--buffer->root->refcount == 0) in buffer_free() 76 osi_free(buffer->root); in buffer_free() 86 return buf->root->data + buf->root->length - buf->length; in buffer_ptr()
|
/system/core/bootstat/ |
D | bootstat.rc | 4 mkdir /data/misc/bootstat 0700 root root 12 exec - root root -- /system/bin/bootstat -r post_decrypt_time_elapsed 22 exec - root root -- /system/bin/bootstat --record_boot_complete 25 exec - root root -- /system/bin/bootstat --record_boot_reason 28 exec - root root -- /system/bin/bootstat --record_time_since_factory_reset 31 exec - root root -- /system/bin/bootstat -l
|
/system/core/include/cutils/ |
D | config_utils.h | 37 void config_load(cnode *root, char *data); 40 void config_load_file(cnode *root, const char *fn); 46 cnode* config_find(cnode *root, const char *name); 49 int config_bool(cnode *root, const char *name, int _default); 52 const char* config_str(cnode *root, const char *name, const char *_default); 55 void config_set(cnode *root, const char *name, const char *value); 58 void config_free(cnode *root);
|
/system/netd/server/ |
D | netd.rc | 3 socket netd stream 0660 root system 4 socket dnsproxyd stream 0660 root inet 5 socket mdns stream 0660 root system 6 socket fwmarkd stream 0660 root inet
|
/system/core/ |
D | CleanSpec.mk | 51 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/root/init.rc) 52 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/root/init.rc) 54 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/root/default.prop) 55 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/default.prop)
|
/system/sepolicy/ |
D | CleanSpec.mk | 51 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/root/file_contexts) 52 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/recovery/root/file_contexts)
|
/system/extras/perfprofd/ |
D | perfprofd.rc | 3 user root 4 group root wakelock
|
/system/tpm/trunks/ |
D | trunksd.rc | 6 user root 7 group root
|
D | trunksd-simulator.rc | 6 user root 7 group root
|
/system/update_engine/ |
D | update_engine.rc | 3 user root 4 group root system wakelock dbus inet
|
/system/update_engine/scripts/ |
D | brillo_update_payload | 293 local kernel root 296 root=$(create_tempfile "root.bin.XXXXXX") 297 CLEANUP_FILES+=("${root}") 301 --kern_path "${kernel}" --root_path "${root}" \ 310 ZLIB_FINGERPRINT=$(e2cp "${root}":/etc/zlib_fingerprint -) 317 eval ${partitions_array}[system]=\""${root}"\"
|
/system/update_engine/common/ |
D | hwid_override.cc | 37 string HwidOverride::Read(const base::FilePath& root) { in Read() argument 39 lsb_release.Load(base::FilePath(root.value() + "/etc/lsb-release")); in Read()
|
/system/bt/service/common/ |
D | README | 3 subdirectory, which is the exported root path for the client static library. 6 root path, e.g.: 14 It is however OK to include from the package root when including common headers
|
/system/vold/ |
D | vold.rc | 5 socket vold stream 0660 root mount 6 socket cryptd stream 0660 root mount
|
D | vdc.rc | 3 exec - root -- /system/bin/vdc --wait cryptfs mountdefaultencrypted 10 exec - root -- /system/bin/vdc --wait cryptfs enablecrypto inplace default noui
|
/system/security/keystore/ |
D | test-keystore | 79 keystore root t 125 keystore root g baz 243 keystore root g baz 254 keystore root g baz
|
/system/core/libdiskconfig/ |
D | diskconfig.c | 94 load_partitions(cnode *root, struct disk_info *dinfo) in load_partitions() argument 99 for (partnode = root->first_child; partnode; partnode = partnode->next) { in load_partitions() 146 cnode *root = config_node("", ""); in load_diskconfig() local 162 config_load_file(root, fn); in load_diskconfig() 163 if (root->first_child == NULL) { in load_diskconfig() 168 if (!(devroot = config_find(root, "device"))) { in load_diskconfig()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 7 sepolicy-analyze out/target/product/<board>/root/sepolicy typecmp -e 28 sepolicy-analyze out/target/product/<board>/root/sepolicy typecmp -d 35 sepolicy-analyze out/target/product/<board>/root/sepolicy dups 49 sepolicy-analyze out/target/product/<board>/root/sepolicy permissive 57 sepolicy-analyze out/target/product/<board>/root/sepolicy booleans 64 sepolicy-analyze out/target/product/<board>/root/sepolicy attribute <name> 69 sepolicy-analyze out/target/product/<board>/root/sepolicy neverallow \
|
/system/extras/tests/net_test/ |
D | README | 31 machine" whose root filesystem is the supplied Debian disk image. The machine 32 boots, mounts the root filesystem read-only, runs the specified test from init, and then drops to a… 66 net_test mounts the root filesystem read-only, and runs the test from init, but 69 apt-get install. Log in as root with no password. By default, the filesystem is
|