/system/unwinding/libunwindstack/ |
D | GlobalDebugImpl.h | 82 struct UID { struct 86 bool operator<(const UID& other) const { argument 218 std::map<UID, std::shared_ptr<Symfile>> entries; in ReadAllEntries() 234 bool ReadNewEntries(Maps* maps, std::map<UID, std::shared_ptr<Symfile>>* entries, bool* race) { in ReadNewEntries() argument 236 UID uid; in ReadNewEntries() 280 UID next_uid; in ReadNewEntries() 303 bool ReadNextField(uint64_t next_field_addr, UID* uid, bool* race) { in ReadNextField() 315 *uid = UID{.address = address[0], .seqlock = 0}; in ReadNextField() 332 *uid = UID{.address = address[1], .seqlock = seqlock[1]}; in ReadNextField() 337 bool CheckSeqlock(UID uid, bool* race = nullptr) { [all …]
|
/system/core/storaged/ |
D | README.properties | 4 ro.storaged.uid_io.interval # interval storaged checks Per UID IO usage, in seconds 5 ro.storaged.uid_io.threshold # Per UID IO usage limit, in bytes
|
/system/logging/logd/ |
D | README.property | 42 oldest entries of chattiest UID, and 66 - Pruning filter rules are specified as UID, UID/PID or /PID. A '~' prefix indicates that elements 69 pruning for the noisiest UID as determined by the current statistics. Special case ~1000/! 70 represents pruning of the worst PID within AID_SYSTEM when AID_SYSTEM is the noisiest UID.
|
D | README.compression.md | 78 * Note: Chatty does not consider the metadata (UID, PID, timestamp, etc) in its calculation of log …
|
/system/core/libprocessgroup/profiles/ |
D | cgroups.proto | 32 string uid = 4 [json_name = "UID"]; 45 string uid = 3 [json_name = "UID"];
|
/system/netd/server/ |
D | SockDiagTest.cpp | 271 UID, enumerator 282 TO_STRING_TYPE(UID); in testTypeName() 337 case UID: in howManySockets() 350 case UID: in modifySocketForTest() 377 case UID: in destroySockets() 408 case UID: in shouldHaveClosedSocket() 528 testing::Values(ADDRESS, UID, UIDRANGE,
|
/system/sepolicy/public/ |
D | system_app.te | 2 ### Apps that run with the system UID, e.g. com.android.system.ui,
|
D | untrusted_app.te | 5 ### optionally package name to seinfo value) and seapp_contexts (maps UID 8 ### seapp_contexts for any app with UID between APP_AID (10000)
|
D | isolated_app.te | 5 ### app" is an APP with UID between AID_ISOLATED_START (99000)
|
D | attributes | 209 # All apps with UID between AID_ISOLATED_START (99000) and AID_ISOLATED_END (99999).
|
/system/sepolicy/private/ |
D | system_app.te | 2 ### Apps that run with the system UID, e.g. com.android.system.ui, 16 # read/write certain subdirectories of /data/data for system UID apps. 188 # Apps which run as UID=system should not rely on any attacker controlled
|
D | sdk_sandbox_all.te | 6 ### optionally package name to seinfo value) and seapp_contexts (maps UID 9 ### seapp_contexts for any app with UID between FIRST_SDK_SANDBOX_UID (20000)
|
D | runas.te | 27 # run-as switches to the app UID/GID.
|
D | simpleperf_app_runner.te | 18 # simpleperf_app_runner switches to the app UID/GID.
|
D | seapp_contexts | 34 # UID. 116 # levelFrom=app determines the level from the process UID. 118 # levelFrom=all determines the level from both UID and user ID. 122 # level may be used to specify a fixed level for any UID.
|
D | untrusted_app_all.te | 8 ### optionally package name to seinfo value) and seapp_contexts (maps UID 11 ### seapp_contexts for any app with UID between APP_AID (10000)
|
D | isolated_app_all.te | 7 ### app" is an APP with UID between AID_ISOLATED_START (99000)
|
D | webview_zygote.te | 24 # Set the UID/GID of the process.
|
D | app_zygote.te | 11 # Set the UID/GID of the process.
|
D | adbd.te | 34 # Set UID and GID to shell. Set supplementary groups.
|
D | installd.te | 157 # Upgrade from before system_app_data_file was used for system UID apps.
|
D | app_neverallows.te | 239 # caller UID information and, even if it did, those services either operate
|
/system/sepolicy/microdroid/system/private/ |
D | adbd.te | 18 # Set UID and GID to shell. Set supplementary groups.
|
/system/sepolicy/ |
D | README.apps.md | 48 system UID. com.android.settings is an example of an app running with this
|
/system/security/keystore2/src/ |
D | database.rs | 3990 const UID: u32 = 33; in test_upgrade_0_to_1() constant 3994 make_test_key_entry(&mut db, Domain::APP, UID as i64, ALIAS1, None).unwrap().id(); in test_upgrade_0_to_1() 3996 make_bootlevel_key_entry(&mut db, Domain::APP, UID as i64, ALIAS2, false).unwrap().id(); in test_upgrade_0_to_1() 3998 make_bootlevel_key_entry(&mut db, Domain::APP, UID as i64, ALIAS3, true).unwrap().id(); in test_upgrade_0_to_1() 4010 UID, in test_upgrade_0_to_1() 4013 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1() 4030 UID, in test_upgrade_0_to_1() 4033 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1() 4050 UID, in test_upgrade_0_to_1() 4053 assert_eq!(UID as i64, k.nspace); in test_upgrade_0_to_1() [all …]
|