Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 91) sorted by relevance

1234

/system/core/libunwindstack/
DRegs.cpp139 arm_user_regs* user = reinterpret_cast<arm_user_regs*>(remote_data); in ReadArm() local
142 memcpy(regs->RawData(), &user->regs[0], ARM_REG_LAST * sizeof(uint32_t)); in ReadArm()
144 regs->set_pc(user->regs[ARM_REG_PC]); in ReadArm()
145 regs->set_sp(user->regs[ARM_REG_SP]); in ReadArm()
151 arm64_user_regs* user = reinterpret_cast<arm64_user_regs*>(remote_data); in ReadArm64() local
154 memcpy(regs->RawData(), &user->regs[0], (ARM64_REG_R31 + 1) * sizeof(uint64_t)); in ReadArm64()
155 regs->set_pc(user->pc); in ReadArm64()
156 regs->set_sp(user->sp); in ReadArm64()
162 x86_user_regs* user = reinterpret_cast<x86_user_regs*>(remote_data); in ReadX86() local
165 (*regs)[X86_REG_EAX] = user->eax; in ReadX86()
[all …]
/system/sepolicy/private/
Dseapp_contexts6 # user (string)
16 # isOwner=true will only match for the owner/primary user.
20 # A user string selector that ends in * will perform a prefix match.
21 # user=_app will match any regular app UID.
22 # user=_isolated will match any isolated service UID.
36 # (5) Specified user= string before unspecified user= string.
37 # (6) Fixed user= string before user= prefix (i.e. ending in *).
38 # (7) Longer user= prefix before shorter user= prefix.
50 # levelFrom (string; one of none, all, app, or user)
54 # levelFrom=user is only supported for _app or _isolated UIDs.
[all …]
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/security/keystore/
Dpermissions.cpp151 struct user_euid user = user_euids[i]; in get_keystore_euid() local
152 if (user.uid == uid) { in get_keystore_euid()
153 return user.euid; in get_keystore_euid()
167 struct user_perm user = user_perms[i]; in has_permission() local
168 if (user.uid == uid) { in has_permission()
169 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
185 struct user_euid user = user_euids[i]; in is_granted_to() local
186 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
Dkeystore.rc3 user keystore
/system/update_engine/
DUpdateEngine.conf4 <policy user="root">
8 <policy user="chronos">
71 <policy user="power">
/system/tpm/tpm_manager/server/
Dorg.chromium.TpmManager.conf5 <policy user="tpm_manager">
9 <policy user="root">
Dtpm_managerd.rc6 user root
/system/core/logd/
Dlogd.rc7 user logd
14 user logd
/system/core/rootdir/
Dinit.zygote32_64.rc4 user root
19 user root
Dinit.zygote64_32.rc4 user root
19 user root
/system/sepolicy/reqd_mask/
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/media/brillo/audio/audioservice/
Dbrilloaudioserv.rc3 user audioserver
/system/connectivity/wificond/
Dwificond.rc3 user wifi
/system/bt/service/
Dbluetoothtbd.rc3 user bluetooth
/system/libhidl/transport/allocator/1.0/default/
Dandroid.hidl.allocator@1.0-service.rc3 user system
/system/bt/test/rootcanal/
Dandroid.hardware.bluetooth@1.0-service.sim.rc3 user bluetooth
/system/core/init/test_service/
Dtest_service.rc3 user system
/system/core/gatekeeperd/
Dgatekeeperd.rc3 user system
/system/extras/perfprofd/
Dperfprofd.rc3 user root
/system/tpm/trunks/
Dorg.chromium.Trunks.conf5 <policy user="trunks">
Dcom.android.Trunks.conf5 <policy user="system">
Dtrunksd.rc6 user root
Dtrunksd-simulator.rc6 user root
/system/tpm/attestation/server/
Dorg.chromium.Attestation.conf5 <policy user="attestation">

1234