Searched refs:uid (Results 1 - 25 of 29) sorted by path

12

/system/core/debuggerd/
H A Ddebuggerd.c735 property_get("debug.db.uid", value, "-1");
771 XLOG("BOOM: pid=%d uid=%d gid=%d tid=%d\n", cr.pid, cr.uid, cr.gid, tid);
845 * if debug.db.uid is set, its value indicates if we should wait
851 if ((signed)cr.uid <= debug_uid) {
/system/core/include/private/
H A Dandroid_filesystem_config.h124 unsigned uid; member in struct:fs_path_config
179 /* the following two files are INTENTIONALLY set-gid and not set-uid.
183 /* the following five files are INTENTIONALLY set-uid, but they
191 /* the following file is INTENTIONALLY set-uid, and IS included
204 unsigned *uid, unsigned *gid, unsigned *mode)
225 *uid = pc->uid;
231 path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode);
203 fs_config(const char *path, int dir, unsigned *uid, unsigned *gid, unsigned *mode) argument
/system/core/init/
H A Dbuiltins.c242 uid_t uid = decode_uid(args[3]); local
249 if (chown(args[1], uid, gid)) {
H A Ddevices.c89 unsigned int uid; member in struct:perms_
103 mode_t perm, unsigned int uid, unsigned int gid,
120 node->dp.uid = uid;
155 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm);
156 chown(buf, dp->uid, dp->gid);
161 static mode_t get_device_perm(const char *path, unsigned *uid, unsigned *gid) argument
182 *uid = dp->uid;
187 *uid
102 add_dev_perms(const char *name, const char *attr, mode_t perm, unsigned int uid, unsigned int gid, unsigned short prefix) argument
196 unsigned uid; local
[all...]
H A Ddevices.h25 mode_t perm, unsigned int uid,
H A Dinit.c213 si->perm, si->uid, si->gid);
244 /* as requested, set our gid, supplemental gids, and uid */
251 if (svc->uid) {
252 setuid(svc->uid);
H A Dinit.h55 uid_t uid; member in struct:socketinfo
90 uid_t uid; member in struct:service
H A Dinit_parser.c584 case K_socket: {/* name type perm [ uid gid ] */
604 si->uid = decode_uid(args[4]);
615 svc->uid = decode_uid(args[1]);
H A Dproperty_service.c58 unsigned int uid; member in struct:__anon70
94 unsigned int uid; member in struct:__anon71
202 * Returns 1 if uid allowed, 0 otherwise.
204 static int check_control_perms(const char *name, unsigned int uid, unsigned int gid) { argument
206 if (uid == AID_SYSTEM || uid == AID_ROOT)
212 if ((uid && control_perms[i].uid == uid) ||
223 * Returns 1 if uid allowe
225 check_perms(const char *name, unsigned int uid, unsigned int gid) argument
[all...]
H A Dueventd.c81 uid_t uid; local
131 ERROR("invalid uid '%s'\n", args[2]);
135 uid = ret;
145 add_dev_perms(name, attr, perm, uid, gid, prefix);
H A Dutil.c77 * android_name_to_id - returns the integer uid/gid associated with the given
95 * numeric or name representation, into the integer uid or gid. Returns -1U on
120 int create_socket(const char *name, int type, mode_t perm, uid_t uid, gid_t gid) argument
148 chown(addr.sun_path, uid, gid);
152 addr.sun_path, perm, uid, gid);
H A Dutil.h29 uid_t uid, gid_t gid);
/system/core/libcutils/
H A Dmq.c51 uid_t uid; member in struct:__anon83
628 // Fake gid and uid until we have the real thing. The real creds are
631 credentials.uid = 0;
1050 credentials.uid = ucredentials.uid;
/system/core/libsysutils/src/
H A DNetlinkListener.cpp60 if (cred->uid != 0) {
61 SLOGE("ignoring message from non-root UID %d", cred->uid);
H A DSocketClient.cpp28 mUid = creds.uid;
/system/core/run-as/
H A Dpackage.c28 * the run-as command has dropped the uid/gid. Hence be very
108 * - is owned by a given uid/gid
116 check_directory_ownership(const char* path, uid_t uid) argument
132 /* must be owned by specific uid/gid */
133 if (st.st_uid != uid || st.st_gid != uid)
156 check_data_path(const char* dataPath, uid_t uid) argument
207 * directory is owned by the application uid
209 if (check_directory_ownership(dataPath, uid) < 0)
380 info->uid
409 int uid, debugFlag; local
[all...]
H A Dpackage.h30 uid_t uid; member in struct:__anon151
39 extern int check_data_path(const char* dataDir, uid_t uid);
H A Drun-as.c38 * This program runs as set-uid root on Android production devices.
45 * is more complex than simple system calls until the uid/gid has
105 int myuid, uid, gid; local
126 if (info.uid < AID_APP) {
138 if (check_data_path(info.dataDir, info.uid) < 0) {
159 uid = gid = info.uid;
160 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) {
[all...]
/system/core/sdcard/
H A Dfuse.h98 __u32 uid; member in struct:fuse_attr
344 __u32 uid; member in struct:fuse_setattr_in
541 __u32 uid; member in struct:fuse_in_header
H A Dsdcard.c42 * usage: sdcard <path> <uid> <gid>
44 * It must be run as root, but will change to uid/gid as soon as it
45 * mounts a filesystem on /mnt/sdcard. It will refuse to run if uid or
169 attr->uid = 0;
744 unsigned uid; local
749 ERROR("usage: sdcard <path> <uid> <gid>\n");
753 uid = strtoul(argv[2], 0, 10);
755 if (!uid || !gid) {
756 ERROR("uid and gid must be nonzero\n");
772 "user_id=%d,group_id=%d", fd, uid, gi
[all...]
/system/core/toolbox/
H A Dchown.c31 // Lookup uid (and gid if specified)
34 uid_t uid; local
39 uid = pw->pw_uid;
42 uid = (int) strtoul(user, &endptr, 0);
64 if (chown(argv[i], uid, gid) < 0) {
H A Did.c8 static void print_uid(uid_t uid) argument
10 struct passwd *pw = getpwuid(uid);
13 printf("%d(%s)", uid, pw->pw_name);
15 printf("%d",uid);
37 printf("uid=");
H A Dls.c69 static void user2str(unsigned uid, char *out) argument
71 struct passwd *pw = getpwuid(uid);
75 sprintf(out, "%d", uid);
H A Dtop.c56 uid_t uid; member in struct:proc_info
301 proc->uid = cur_proc.uid;
396 unsigned int uid, gid; local
401 sscanf(line, "Uid: %u", &uid);
405 proc->uid = uid; proc->gid = gid;
466 user = getpwuid(proc->uid);
471 snprintf(user_buf, 20, "%d", proc->uid);
/system/extras/ext4_utils/
H A Dcontents.c226 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime) argument
234 inode->i_uid = uid;

Completed in 3213 milliseconds

12