/system/core/libsysutils/src/ |
H A D | SocketClient.cpp | 41 mUid = creds.uid;
|
/system/core/run-as/ |
H A D | package.c | 29 * the run-as command has dropped the uid/gid. Hence be very 139 * - is owned by a given uid/gid 147 check_directory_ownership(const char* path, uid_t uid) argument 163 /* must be owned by specific uid/gid */ 164 if (st.st_uid != uid || st.st_gid != uid) 187 check_data_path(const char* dataPath, uid_t uid) argument 238 * directory is owned by the application uid 240 if (check_directory_ownership(dataPath, uid) < 0) 411 info->uid 440 int uid, debugFlag; local [all...] |
H A D | package.h | 30 uid_t uid; member in struct:__anon472 39 extern int check_data_path(const char* dataDir, uid_t uid);
|
H A D | run-as.c | 38 * This program runs as set-uid root on Android production devices. 45 * until the uid/gid has been dropped to that of a normal user 105 int myuid, uid, gid; local 126 if (info.uid < AID_APP) { 138 if (check_data_path(info.dataDir, info.uid) < 0) { 159 uid = gid = info.uid; 160 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { [all...] |
/system/core/sdcard/ |
H A D | fuse.h | 98 __u32 uid; member in struct:fuse_attr 344 __u32 uid; member in struct:fuse_setattr_in 541 __u32 uid; member in struct:fuse_in_header
|
H A D | sdcard.c | 299 attr->uid = 0; 1242 ERROR("usage: sdcard [-t<threads>] <source_path> <dest_path> <uid> <gid>\n" 1248 static int run(const char* source_path, const char* dest_path, uid_t uid, gid_t gid, argument 1266 fd, uid, gid); 1280 res = setuid(uid); 1304 uid_t uid = 0; local 1317 else if (!uid) { 1320 uid = strtoul(arg, &endptr, 10); 1322 ERROR("Invalid uid"); 1347 if (!uid || !gi [all...] |
/system/core/toolbox/ |
H A D | chown.c | 33 // Lookup uid (and gid if specified) 36 uid_t uid; local 41 uid = pw->pw_uid; 44 uid = (int) strtoul(user, &endptr, 0); 66 if (chown(argv[i], uid, gid) < 0) {
|
H A D | id.c | 12 static void print_uid(uid_t uid) argument 14 struct passwd *pw = getpwuid(uid); 17 printf("%d(%s)", uid, pw->pw_name); 19 printf("%d",uid); 44 printf("uid=");
|
H A D | ls.c | 79 static void user2str(unsigned uid, char *out) argument 81 struct passwd *pw = getpwuid(uid); 85 sprintf(out, "%d", uid);
|
H A D | top.c | 57 uid_t uid; member in struct:proc_info 303 proc->uid = cur_proc.uid; 395 unsigned int uid, gid; local 400 sscanf(line, "Uid: %u", &uid); 404 proc->uid = uid; proc->gid = gid; 465 user = getpwuid(proc->uid); 470 snprintf(user_buf, 20, "%d", proc->uid);
|
/system/extras/ext4_utils/ |
H A D | contents.c | 236 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime) argument 244 inode->i_uid = uid;
|
H A D | contents.h | 28 u16 uid; member in struct:dentry 39 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|
H A D | make_ext4fs.c | 85 .uid = 0, 93 dentries.uid, dentries.gid, dentries.mtime); 149 unsigned int uid = 0; local 152 fs_config_func(dentries[i].path, dir, &uid, &gid, &mode); 154 dentries[i].uid = uid; 215 dentries[i].uid, dentries[i].gid,
|
H A D | make_ext4fs.h | 34 typedef void (*fs_config_func_t)(const char *path, int dir, unsigned *uid, unsigned *gid,
|
/system/extras/su/ |
H A D | su.c | 45 int uid, gid, myuid; local 50 fprintf(stderr,"su: uid %d not allowed to su\n", myuid); 55 uid = gid = 0; 60 uid = gid = atoi(argv[1]); 62 uid = pw->pw_uid; 67 if(setgid(gid) || setuid(uid)) {
|
/system/extras/tests/fstest/ |
H A D | perm_checker.c | 78 printf("# ERROR # Invalid uid '%s' reading line %d\n", str, line_num); 200 static void print_new_rule(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 205 pw = getpwuid(uid); 206 printf("%s %4o %4o %s %d %s %d\n", name, mode, mode, pw->pw_name, uid, 211 static int pass_rule(const perm_rule_t *pr, mode_t mode, uid_t uid, gid_t gid) argument 216 (pr->min_uid <= uid) && (pr->max_uid >= uid)) 223 static int validate_file(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 232 if (!pass_rule(pr, mode, uid, gid)) 245 print_new_rule(name, mode, uid, gi 284 validate_link(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 312 validate_dir(const char *name, mode_t mode, uid_t uid, gid_t gid) argument [all...] |
/system/extras/tests/iptables/qtaguid/ |
H A D | socketTag.cpp | 43 bool checkTag(uint64_t tag, uid_t uid); 124 * tag + uid. But it is not fool proof. 129 bool SockInfo::checkTag(uint64_t acct_tag, uid_t uid) { argument 154 asprintf(&match_template, "sock=%lx %s", addr, "tag=0x%llx (uid=%u)"); 158 asprintf(&match_template, "%s", " tag=0x%llx (uid=%u)"); 161 full_tag = acct_tag | uid; 163 asprintf(&buff, match_template, full_tag | uid, uid); 170 "sock=%lx tag=0x%llx (uid=%lu) pid=%u f_count=%lu", 172 if (!(res == 5 && k_tag == full_tag && k_uid == uid)) { [all...] |
/system/netd/ |
H A D | BandwidthController.cpp | 100 * iptables -A penalty_box -m owner --uid-owner app_3 \ 284 std::string BandwidthController::makeIptablesNaughtyCmd(IptOp op, int uid) { argument 301 asprintf(&buff, "%s penalty_box -m owner --uid-owner %d", opFlag, uid); 322 std::list<int /*uid*/>::iterator it; 327 failLogTemplate = "Failed to add app uid %d to penalty box."; 331 failLogTemplate = "Failed to delete app uid %d from penalty box."; 347 int uid = appUids[uidNum]; local 349 if (*it == uid) 356 ALOGE("No such appUid %d to remove", uid); [all...] |
H A D | BandwidthController.h | 115 std::string makeIptablesNaughtyCmd(IptOp op, int uid);
|
H A D | CommandListener.cpp | 1432 int uid = atoi(argv[2]); local 1435 int res = sFirewallCtrl->setUidRule(uid, rule);
|
H A D | FirewallController.cpp | 132 int FirewallController::setUidRule(int uid, FirewallRule rule) { argument 134 sprintf(uidStr, "%d", uid); 144 res |= execIptables(V4V6, op, LOCAL_INPUT, "-m", "owner", "--uid-owner", uidStr, 146 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-m", "owner", "--uid-owner", uidStr,
|