Searched refs:user (Results 1 - 25 of 32) sorted by relevance

12

/system/tpm/tpm_manager/server/
H A Dorg.chromium.TpmManager.conf5 <policy user="tpm_manager">
9 <policy user="root">
/system/tpm/trunks/
H A Dcom.android.Trunks.conf5 <policy user="system">
H A Dorg.chromium.Trunks.conf5 <policy user="trunks">
/system/core/libunwindstack/
H A DRegsX86_64.cpp93 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); local
96 (*regs)[X86_64_REG_RAX] = user->rax;
97 (*regs)[X86_64_REG_RBX] = user->rbx;
98 (*regs)[X86_64_REG_RCX] = user->rcx;
99 (*regs)[X86_64_REG_RDX] = user->rdx;
100 (*regs)[X86_64_REG_R8] = user->r8;
101 (*regs)[X86_64_REG_R9] = user->r9;
102 (*regs)[X86_64_REG_R10] = user->r10;
103 (*regs)[X86_64_REG_R11] = user->r11;
104 (*regs)[X86_64_REG_R12] = user
[all...]
H A DRegsX86.cpp85 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); local
88 (*regs)[X86_REG_EAX] = user->eax;
89 (*regs)[X86_REG_EBX] = user->ebx;
90 (*regs)[X86_REG_ECX] = user->ecx;
91 (*regs)[X86_REG_EDX] = user->edx;
92 (*regs)[X86_REG_EBP] = user->ebp;
93 (*regs)[X86_REG_EDI] = user->edi;
94 (*regs)[X86_REG_ESI] = user->esi;
95 (*regs)[X86_REG_ESP] = user->esp;
96 (*regs)[X86_REG_EIP] = user
[all...]
H A DRegsArm64.cpp108 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); local
111 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R31 + 1) * sizeof(uint64_t));
113 reg_data[ARM64_REG_PC] = user->pc;
114 reg_data[ARM64_REG_SP] = user->sp;
H A DRegsMips.cpp109 mips_user_regs* user = reinterpret_cast<mips_user_regs*>(remote_data); local
113 memcpy(regs->RawData(), &user->regs[MIPS32_EF_R0], (MIPS_REG_R31 + 1) * sizeof(uint32_t));
115 reg_data[MIPS_REG_PC] = user->regs[MIPS32_EF_CP0_EPC];
H A DRegsMips64.cpp109 mips64_user_regs* user = reinterpret_cast<mips64_user_regs*>(remote_data); local
113 memcpy(regs->RawData(), &user->regs[MIPS64_EF_R0], (MIPS64_REG_R31 + 1) * sizeof(uint64_t));
115 reg_data[MIPS64_REG_PC] = user->regs[MIPS64_EF_CP0_EPC];
H A DRegsArm.cpp114 arm_user_regs* user = reinterpret_cast<arm_user_regs*>(remote_data); local
117 memcpy(regs->RawData(), &user->regs[0], ARM_REG_LAST * sizeof(uint32_t));
/system/tpm/attestation/server/
H A Dorg.chromium.Attestation.conf5 <policy user="attestation">
H A Dattestation_service.h254 // certificate. This decision factors in the currently signed-in |user| and
256 // which has not already been used by another user for the same origin.
257 int ChooseTemporalIndex(const std::string& user, const std::string& origin);
/system/security/keystore/
H A Dpermissions.cpp151 struct user_euid user = user_euids[i]; local
152 if (user.uid == uid) {
153 return user.euid;
161 // All system users are equivalent for multi-user support.
167 struct user_perm user = user_perms[i]; local
168 if (user.uid == uid) {
169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid);
185 struct user_euid user = user_euids[i]; local
186 if (user.euid == callingUid && user
[all...]
H A Dtest-keystore51 declare -r user=$1
53 run adb shell su $user keystore_cli "$@"
70 log "reset keystore as system user"
82 log "but system user does"
124 log "root can read system user keys (as can wifi or vpn users)"
130 # app user tests
138 log "app user cannot use reset, password, lock, unlock"
/system/update_engine/
H A DUpdateEngine.conf4 <policy user="root">
8 <policy user="chronos">
71 <policy user="power">
/system/core/include/utils/
H A DThread.h95 static int _threadLoop(void* user);
/system/core/libutils/include/utils/
H A DThread.h95 static int _threadLoop(void* user);
/system/extras/tests/workloads/
H A Ddefs.sh299 if [ "$user" = root -a $enableAtrace -gt 0 ]; then
309 if [ "$user" = root -a $enableAtrace -gt 0 ]; then
322 if [ "$user" = root ]; then
463 user=root
465 user=shell
467 vout User is $user
H A Dsystemapps.sh69 if [ $user != "root" -a $totaltimetest -eq 0 ]; then
/system/core/logcat/
H A Dlogcatd.rc61 user logd
/system/security/keystore-engine/
H A DAndroid.mk45 # owned by the WiFi user to perform signing operations.
/system/sepolicy/
H A DAndroid.mk86 ifeq ($(TARGET_BUILD_VARIANT),user)
87 $(error SELINUX_IGNORE_NEVERALLOWS := true cannot be used in user builds)
90 It does not work in user builds and using it will \
230 ifneq ($(TARGET_BUILD_VARIANT), user)
279 $(sepolicy_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user
705 $(hide) if [ "$(TARGET_BUILD_VARIANT)" = "user" -a -s $@.permissivedomains ]; then \
707 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \
756 $(hide) if [ "$(TARGET_BUILD_VARIANT)" = "user" -a -s $@.permissivedomains ]; then \
758 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \
781 $(LOCAL_BUILT_MODULE): PRIVATE_TARGET_BUILD_VARIANT := user
[all...]
H A Dtreble_sepolicy_tests_for_release.mk22 $($(version)_plat_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user
/system/core/libutils/
H A DThreads.cpp711 int Thread::_threadLoop(void* user) argument
713 Thread* const self = static_cast<Thread*>(user);
/system/update_engine/payload_consumer/
H A Dmtd_file_descriptor.cc20 #include <mtd/ubi-user.h>
/system/core/adb/
H A Djdwp_service.cpp358 static void jdwp_control_event(int s, unsigned events, void* user);

Completed in 295 milliseconds

12