/system/tpm/tpm_manager/server/ |
H A D | org.chromium.TpmManager.conf | 5 <policy user="tpm_manager"> 9 <policy user="root">
|
/system/tpm/trunks/ |
H A D | com.android.Trunks.conf | 5 <policy user="system">
|
H A D | org.chromium.Trunks.conf | 5 <policy user="trunks">
|
/system/core/libunwindstack/ |
H A D | RegsX86_64.cpp | 93 x86_64_user_regs* user = reinterpret_cast<x86_64_user_regs*>(remote_data); local 96 (*regs)[X86_64_REG_RAX] = user->rax; 97 (*regs)[X86_64_REG_RBX] = user->rbx; 98 (*regs)[X86_64_REG_RCX] = user->rcx; 99 (*regs)[X86_64_REG_RDX] = user->rdx; 100 (*regs)[X86_64_REG_R8] = user->r8; 101 (*regs)[X86_64_REG_R9] = user->r9; 102 (*regs)[X86_64_REG_R10] = user->r10; 103 (*regs)[X86_64_REG_R11] = user->r11; 104 (*regs)[X86_64_REG_R12] = user [all...] |
H A D | RegsX86.cpp | 85 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(user_data); local 88 (*regs)[X86_REG_EAX] = user->eax; 89 (*regs)[X86_REG_EBX] = user->ebx; 90 (*regs)[X86_REG_ECX] = user->ecx; 91 (*regs)[X86_REG_EDX] = user->edx; 92 (*regs)[X86_REG_EBP] = user->ebp; 93 (*regs)[X86_REG_EDI] = user->edi; 94 (*regs)[X86_REG_ESI] = user->esi; 95 (*regs)[X86_REG_ESP] = user->esp; 96 (*regs)[X86_REG_EIP] = user [all...] |
H A D | RegsArm64.cpp | 108 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); local 111 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R31 + 1) * sizeof(uint64_t)); 113 reg_data[ARM64_REG_PC] = user->pc; 114 reg_data[ARM64_REG_SP] = user->sp;
|
H A D | RegsMips.cpp | 109 mips_user_regs* user = reinterpret_cast<mips_user_regs*>(remote_data); local 113 memcpy(regs->RawData(), &user->regs[MIPS32_EF_R0], (MIPS_REG_R31 + 1) * sizeof(uint32_t)); 115 reg_data[MIPS_REG_PC] = user->regs[MIPS32_EF_CP0_EPC];
|
H A D | RegsMips64.cpp | 109 mips64_user_regs* user = reinterpret_cast<mips64_user_regs*>(remote_data); local 113 memcpy(regs->RawData(), &user->regs[MIPS64_EF_R0], (MIPS64_REG_R31 + 1) * sizeof(uint64_t)); 115 reg_data[MIPS64_REG_PC] = user->regs[MIPS64_EF_CP0_EPC];
|
H A D | RegsArm.cpp | 114 arm_user_regs* user = reinterpret_cast<arm_user_regs*>(remote_data); local 117 memcpy(regs->RawData(), &user->regs[0], ARM_REG_LAST * sizeof(uint32_t));
|
/system/tpm/attestation/server/ |
H A D | org.chromium.Attestation.conf | 5 <policy user="attestation">
|
H A D | attestation_service.h | 254 // certificate. This decision factors in the currently signed-in |user| and 256 // which has not already been used by another user for the same origin. 257 int ChooseTemporalIndex(const std::string& user, const std::string& origin);
|
/system/security/keystore/ |
H A D | permissions.cpp | 151 struct user_euid user = user_euids[i]; local 152 if (user.uid == uid) { 153 return user.euid; 161 // All system users are equivalent for multi-user support. 167 struct user_perm user = user_perms[i]; local 168 if (user.uid == uid) { 169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 185 struct user_euid user = user_euids[i]; local 186 if (user.euid == callingUid && user [all...] |
H A D | test-keystore | 51 declare -r user=$1 53 run adb shell su $user keystore_cli "$@" 70 log "reset keystore as system user" 82 log "but system user does" 124 log "root can read system user keys (as can wifi or vpn users)" 130 # app user tests 138 log "app user cannot use reset, password, lock, unlock"
|
/system/update_engine/ |
H A D | UpdateEngine.conf | 4 <policy user="root"> 8 <policy user="chronos"> 71 <policy user="power">
|
/system/core/include/utils/ |
H A D | Thread.h | 95 static int _threadLoop(void* user);
|
/system/core/libutils/include/utils/ |
H A D | Thread.h | 95 static int _threadLoop(void* user);
|
/system/extras/tests/workloads/ |
H A D | defs.sh | 299 if [ "$user" = root -a $enableAtrace -gt 0 ]; then 309 if [ "$user" = root -a $enableAtrace -gt 0 ]; then 322 if [ "$user" = root ]; then 463 user=root 465 user=shell 467 vout User is $user
|
H A D | systemapps.sh | 69 if [ $user != "root" -a $totaltimetest -eq 0 ]; then
|
/system/core/logcat/ |
H A D | logcatd.rc | 61 user logd
|
/system/security/keystore-engine/ |
H A D | Android.mk | 45 # owned by the WiFi user to perform signing operations.
|
/system/sepolicy/ |
H A D | Android.mk | 86 ifeq ($(TARGET_BUILD_VARIANT),user) 87 $(error SELINUX_IGNORE_NEVERALLOWS := true cannot be used in user builds) 90 It does not work in user builds and using it will \ 230 ifneq ($(TARGET_BUILD_VARIANT), user) 279 $(sepolicy_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user 705 $(hide) if [ "$(TARGET_BUILD_VARIANT)" = "user" -a -s $@.permissivedomains ]; then \ 707 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \ 756 $(hide) if [ "$(TARGET_BUILD_VARIANT)" = "user" -a -s $@.permissivedomains ]; then \ 758 echo "ERROR: permissive domains not allowed in user builds" 1>&2; \ 781 $(LOCAL_BUILT_MODULE): PRIVATE_TARGET_BUILD_VARIANT := user [all...] |
H A D | treble_sepolicy_tests_for_release.mk | 22 $($(version)_plat_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user
|
/system/core/libutils/ |
H A D | Threads.cpp | 711 int Thread::_threadLoop(void* user) argument 713 Thread* const self = static_cast<Thread*>(user);
|
/system/update_engine/payload_consumer/ |
H A D | mtd_file_descriptor.cc | 20 #include <mtd/ubi-user.h>
|
/system/core/adb/ |
H A D | jdwp_service.cpp | 358 static void jdwp_control_event(int s, unsigned events, void* user);
|