Searched refs:uid (Results 26 - 46 of 46) sorted by last modified time

12

/system/core/libsysutils/src/
H A DSocketClient.cpp41 mUid = creds.uid;
/system/core/run-as/
H A Dpackage.c29 * the run-as command has dropped the uid/gid. Hence be very
139 * - is owned by a given uid/gid
147 check_directory_ownership(const char* path, uid_t uid) argument
163 /* must be owned by specific uid/gid */
164 if (st.st_uid != uid || st.st_gid != uid)
187 check_data_path(const char* dataPath, uid_t uid) argument
238 * directory is owned by the application uid
240 if (check_directory_ownership(dataPath, uid) < 0)
411 info->uid
440 int uid, debugFlag; local
[all...]
H A Dpackage.h30 uid_t uid; member in struct:__anon472
39 extern int check_data_path(const char* dataDir, uid_t uid);
H A Drun-as.c38 * This program runs as set-uid root on Android production devices.
45 * until the uid/gid has been dropped to that of a normal user
105 int myuid, uid, gid; local
126 if (info.uid < AID_APP) {
138 if (check_data_path(info.dataDir, info.uid) < 0) {
159 uid = gid = info.uid;
160 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) {
[all...]
/system/core/sdcard/
H A Dfuse.h98 __u32 uid; member in struct:fuse_attr
344 __u32 uid; member in struct:fuse_setattr_in
541 __u32 uid; member in struct:fuse_in_header
H A Dsdcard.c299 attr->uid = 0;
1242 ERROR("usage: sdcard [-t<threads>] <source_path> <dest_path> <uid> <gid>\n"
1248 static int run(const char* source_path, const char* dest_path, uid_t uid, gid_t gid, argument
1266 fd, uid, gid);
1280 res = setuid(uid);
1304 uid_t uid = 0; local
1317 else if (!uid) {
1320 uid = strtoul(arg, &endptr, 10);
1322 ERROR("Invalid uid");
1347 if (!uid || !gi
[all...]
/system/core/toolbox/
H A Dchown.c33 // Lookup uid (and gid if specified)
36 uid_t uid; local
41 uid = pw->pw_uid;
44 uid = (int) strtoul(user, &endptr, 0);
66 if (chown(argv[i], uid, gid) < 0) {
H A Did.c12 static void print_uid(uid_t uid) argument
14 struct passwd *pw = getpwuid(uid);
17 printf("%d(%s)", uid, pw->pw_name);
19 printf("%d",uid);
44 printf("uid=");
H A Dls.c79 static void user2str(unsigned uid, char *out) argument
81 struct passwd *pw = getpwuid(uid);
85 sprintf(out, "%d", uid);
H A Dtop.c57 uid_t uid; member in struct:proc_info
303 proc->uid = cur_proc.uid;
395 unsigned int uid, gid; local
400 sscanf(line, "Uid: %u", &uid);
404 proc->uid = uid; proc->gid = gid;
465 user = getpwuid(proc->uid);
470 snprintf(user_buf, 20, "%d", proc->uid);
/system/extras/ext4_utils/
H A Dcontents.c236 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime) argument
244 inode->i_uid = uid;
H A Dcontents.h28 u16 uid; member in struct:dentry
39 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
H A Dmake_ext4fs.c85 .uid = 0,
93 dentries.uid, dentries.gid, dentries.mtime);
149 unsigned int uid = 0; local
152 fs_config_func(dentries[i].path, dir, &uid, &gid, &mode);
154 dentries[i].uid = uid;
215 dentries[i].uid, dentries[i].gid,
H A Dmake_ext4fs.h34 typedef void (*fs_config_func_t)(const char *path, int dir, unsigned *uid, unsigned *gid,
/system/extras/su/
H A Dsu.c45 int uid, gid, myuid; local
50 fprintf(stderr,"su: uid %d not allowed to su\n", myuid);
55 uid = gid = 0;
60 uid = gid = atoi(argv[1]);
62 uid = pw->pw_uid;
67 if(setgid(gid) || setuid(uid)) {
/system/extras/tests/fstest/
H A Dperm_checker.c78 printf("# ERROR # Invalid uid '%s' reading line %d\n", str, line_num);
200 static void print_new_rule(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
205 pw = getpwuid(uid);
206 printf("%s %4o %4o %s %d %s %d\n", name, mode, mode, pw->pw_name, uid,
211 static int pass_rule(const perm_rule_t *pr, mode_t mode, uid_t uid, gid_t gid) argument
216 (pr->min_uid <= uid) && (pr->max_uid >= uid))
223 static int validate_file(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
232 if (!pass_rule(pr, mode, uid, gid))
245 print_new_rule(name, mode, uid, gi
284 validate_link(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
312 validate_dir(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
[all...]
/system/extras/tests/iptables/qtaguid/
H A DsocketTag.cpp43 bool checkTag(uint64_t tag, uid_t uid);
124 * tag + uid. But it is not fool proof.
129 bool SockInfo::checkTag(uint64_t acct_tag, uid_t uid) { argument
154 asprintf(&match_template, "sock=%lx %s", addr, "tag=0x%llx (uid=%u)");
158 asprintf(&match_template, "%s", " tag=0x%llx (uid=%u)");
161 full_tag = acct_tag | uid;
163 asprintf(&buff, match_template, full_tag | uid, uid);
170 "sock=%lx tag=0x%llx (uid=%lu) pid=%u f_count=%lu",
172 if (!(res == 5 && k_tag == full_tag && k_uid == uid)) {
[all...]
/system/netd/
H A DBandwidthController.cpp100 * iptables -A penalty_box -m owner --uid-owner app_3 \
284 std::string BandwidthController::makeIptablesNaughtyCmd(IptOp op, int uid) { argument
301 asprintf(&buff, "%s penalty_box -m owner --uid-owner %d", opFlag, uid);
322 std::list<int /*uid*/>::iterator it;
327 failLogTemplate = "Failed to add app uid %d to penalty box.";
331 failLogTemplate = "Failed to delete app uid %d from penalty box.";
347 int uid = appUids[uidNum]; local
349 if (*it == uid)
356 ALOGE("No such appUid %d to remove", uid);
[all...]
H A DBandwidthController.h115 std::string makeIptablesNaughtyCmd(IptOp op, int uid);
H A DCommandListener.cpp1432 int uid = atoi(argv[2]); local
1435 int res = sFirewallCtrl->setUidRule(uid, rule);
H A DFirewallController.cpp132 int FirewallController::setUidRule(int uid, FirewallRule rule) { argument
134 sprintf(uidStr, "%d", uid);
144 res |= execIptables(V4V6, op, LOCAL_INPUT, "-m", "owner", "--uid-owner", uidStr,
146 res |= execIptables(V4V6, op, LOCAL_OUTPUT, "-m", "owner", "--uid-owner", uidStr,

Completed in 96 milliseconds

12