/system/core/libcutils/ |
H A D | multiuser.c | 19 userid_t multiuser_get_user_id(uid_t uid) { argument 20 return uid / MULTIUSER_APP_PER_USER_RANGE; 23 appid_t multiuser_get_app_id(uid_t uid) { argument 24 return uid % MULTIUSER_APP_PER_USER_RANGE;
|
H A D | sockets.c | 37 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { 38 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
|
H A D | qtaguid.c | 99 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { argument 106 snprintf(lineBuf, sizeof(lineBuf), "t %d %llu %d", sockfd, kTag, uid); 108 ALOGV("Tagging socket %d with tag %llx{%u,0} for uid %d", sockfd, kTag, tag, uid); 112 ALOGI("Tagging socket %d with tag %llx(%d) for uid %d failed errno=%d", 113 sockfd, kTag, tag, uid, res); 134 int qtaguid_setCounterSet(int counterSetNum, uid_t uid) { argument 138 ALOGV("Setting counters to set %d for uid %d", counterSetNum, uid); 140 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid); 145 qtaguid_deleteTagData(int tag, uid_t uid) argument [all...] |
H A D | fs.c | 34 int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument 51 if (((sb.st_mode & ALL_PERMS) == mode) && (sb.st_uid == uid) && (sb.st_gid == gid)) { 70 if (TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) { 71 ALOGE("Failed to chown(%s, %d, %d): %s", path, uid, gid, strerror(errno));
|
/system/core/include/cutils/ |
H A D | qtaguid.h | 31 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 39 * For the given uid, switch counter sets. 43 extern int qtaguid_setCounterSet(int counterSetNum, uid_t uid); 46 * Delete all tag info that relates to the given tag an uid. 47 * If the tag is 0, then ALL info about the uid is freeded. 54 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
H A D | multiuser.h | 33 extern userid_t multiuser_get_user_id(uid_t uid); 34 extern appid_t multiuser_get_app_id(uid_t uid);
|
H A D | uevent.h | 29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid);
|
H A D | fs.h | 44 extern int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid);
|
/system/core/run-as/ |
H A D | package.h | 30 uid_t uid; member in struct:__anon480 40 extern int check_data_path(const char* dataDir, uid_t uid);
|
H A D | run-as.c | 39 * This program runs as set-uid root on Android production devices. 46 * until the uid/gid has been dropped to that of a normal user 106 int myuid, uid, gid; local 127 if (info.uid < AID_APP) { 139 if (check_data_path(info.dataDir, info.uid) < 0) { 160 uid = gid = info.uid; 161 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { [all...] |
H A D | package.c | 29 * the run-as command has dropped the uid/gid. Hence be very 160 * - is owned by a given uid/gid 168 check_directory_ownership(const char* path, uid_t uid) argument 184 /* must be owned by specific uid/gid */ 185 if (st.st_uid != uid || st.st_gid != uid) 208 check_data_path(const char* dataPath, uid_t uid) argument 259 * directory is owned by the application uid 261 if (check_directory_ownership(dataPath, uid) < 0) 432 info->uid 463 int uid, debugFlag; local [all...] |
/system/extras/su/ |
H A D | su.c | 35 void pwtoid(const char *tok, uid_t *uid, gid_t *gid) argument 40 if (uid) *uid = pw->pw_uid; 44 if (uid) *uid = tmpid; 49 void extract_uidgids(const char *uidgids, uid_t *uid, gid_t *gid, gid_t *gids, argument 58 *gid = *uid = 0; 66 pwtoid(tok, uid, gid); 96 * su [uid[,gid[,group1]...] [cmd]] 100 * uid 105 uid_t uid, myuid; local [all...] |
/system/core/init/ |
H A D | devices.h | 25 mode_t perm, unsigned int uid,
|
H A D | property_service.c | 62 unsigned int uid; member in struct:__anon374 105 unsigned int uid; member in struct:__anon375 247 * Returns 1 if uid allowed, 0 otherwise. 249 static int check_control_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) { argument 252 if (uid == AID_SYSTEM || uid == AID_ROOT) 258 if ((uid && control_perms[i].uid == uid) || 269 * Returns 1 if uid allowe 271 check_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) argument [all...] |
H A D | ueventd.c | 116 uid_t uid; local 166 ERROR("invalid uid '%s'\n", args[2]); 170 uid = ret; 180 add_dev_perms(name, attr, perm, uid, gid, prefix);
|
/system/core/libsysutils/src/ |
H A D | NetlinkListener.cpp | 48 uid_t uid = -1; local 51 socket, mBuffer, sizeof(mBuffer), &uid)); 53 if (uid > 0) 54 LOG_EVENT_INT(65537, uid);
|
/system/core/toolbox/ |
H A D | chown.c | 33 // Lookup uid (and gid if specified) 36 uid_t uid; local 41 uid = pw->pw_uid; 44 uid = (int) strtoul(user, &endptr, 0); 66 if (chown(argv[i], uid, gid) < 0) {
|
H A D | id.c | 9 static void print_uid(uid_t uid) argument 11 struct passwd *pw = getpwuid(uid); 14 printf("%d(%s)", uid, pw->pw_name); 16 printf("%d",uid); 39 printf("uid=");
|
/system/extras/ext4_utils/ |
H A D | contents.h | 28 u16 uid; member in struct:dentry 40 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|
/system/security/keystore/include/keystore/ |
H A D | IKeystoreService.h | 63 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid, 66 virtual int32_t del(const String16& name, int uid) = 0; 68 virtual int32_t exist(const String16& name, int uid) = 0; 70 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) = 0; 82 virtual int32_t generate(const String16& name, int uid, int32_t flags) = 0; 84 virtual int32_t import(const String16& name, const uint8_t* data, size_t length, int uid, 95 virtual int32_t del_key(const String16& name, int uid) = 0; 108 virtual int32_t clear_uid(int64_t uid) = 0;
|
/system/extras/tests/fstest/ |
H A D | perm_checker.c | 78 printf("# ERROR # Invalid uid '%s' reading line %d\n", str, line_num); 200 static void print_new_rule(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 205 pw = getpwuid(uid); 206 printf("%s %4o %4o %s %d %s %d\n", name, mode, mode, pw->pw_name, uid, 211 static int pass_rule(const perm_rule_t *pr, mode_t mode, uid_t uid, gid_t gid) argument 216 (pr->min_uid <= uid) && (pr->max_uid >= uid)) 223 static int validate_file(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 232 if (!pass_rule(pr, mode, uid, gid)) 245 print_new_rule(name, mode, uid, gi 284 validate_link(const char *name, mode_t mode, uid_t uid, gid_t gid) argument 312 validate_dir(const char *name, mode_t mode, uid_t uid, gid_t gid) argument [all...] |
/system/security/keystore/ |
H A D | keystore.cpp | 145 uid_t uid; member in struct:user_euid 154 uid_t uid; member in struct:user_perm 170 static uid_t get_app_id(uid_t uid) { argument 171 return uid % AID_USER; 178 static uid_t get_user_id(uid_t uid) { argument 179 return uid / AID_USER; 183 static bool has_permission(uid_t uid, perm_t perm) { argument 185 if (get_app_id(uid) == AID_SYSTEM) { 186 uid = AID_SYSTEM; 191 if (user.uid 204 get_keystore_euid(uid_t uid) argument 264 encode_key_for_uid(char* out, uid_t uid, const android::String8& keyName) argument 846 uint32_t uid; member in struct:__anon555 886 getState(uid_t uid) argument 890 initializeUser(const android::String8& pw, uid_t uid) argument 895 writeMasterKey(const android::String8& pw, uid_t uid) argument 901 readMasterKey(const android::String8& pw, uid_t uid) argument 913 getKeyNameForUid(const android::String8& keyName, uid_t uid) argument 919 getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid) argument 926 reset(uid_t uid) argument 969 lock(uid_t uid) argument 975 get(const char* filename, Blob* keyBlob, const BlobType type, uid_t uid) argument 1006 put(const char* filename, Blob* keyBlob, uid_t uid) argument 1039 importKey(const uint8_t* key, size_t keyLen, const char* filename, uid_t uid, int32_t flags) argument 1068 getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid, const BlobType type) argument 1117 getUserState(uid_t uid) argument 1190 upgradeBlob(const char* filename, Blob* blob, const uint8_t oldVersion, const BlobType type, uid_t uid) argument 1234 importBlobAsKey(Blob* blob, const char* filename, uid_t uid) argument [all...] |
H A D | keystore_cli.cpp | 83 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 86 int uid = -1; \ 88 uid = atoi(argv[3]); \ 89 fprintf(stderr, "Running as uid %d\n", uid); \ 91 int32_t ret = service->cmd(String16(argv[2]), uid); \ 148 static int saw(sp<IKeystoreService> service, const String16& name, int uid) { argument 150 int32_t ret = service->saw(name, uid, &matches);
|
H A D | IKeystoreService.cpp | 92 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid, argument 101 data.writeInt32(uid); 117 virtual int32_t del(const String16& name, int uid) argument 122 data.writeInt32(uid); 137 virtual int32_t exist(const String16& name, int uid) argument 142 data.writeInt32(uid); 157 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) argument 162 data.writeInt32(uid); 273 virtual int32_t generate(const String16& name, int uid, int32_t flags) argument 278 data.writeInt32(uid); 294 import(const String16& name, const uint8_t* key, size_t keyLength, int uid, int flags) argument 417 del_key(const String16& name, int uid) argument 537 clear_uid(int64_t uid) argument 600 int uid = data.readInt32(); local 610 int uid = data.readInt32(); local 619 int uid = data.readInt32(); local 628 int uid = data.readInt32(); local 680 int uid = data.readInt32(); local 698 int uid = data.readInt32(); local 777 int uid = data.readInt32(); local 829 int64_t uid = data.readInt64(); local [all...] |
/system/core/include/private/ |
H A D | android_filesystem_config.h | 99 #define AID_USER 100000 /* offset for uid ranges for each user */ 162 unsigned uid; member in struct:fs_path_config 219 /* the following file is INTENTIONALLY set-gid and not set-uid. 223 /* the following five files are INTENTIONALLY set-uid, but they 250 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) 275 *uid = pc->uid; 282 path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode); 249 fs_config(const char *path, int dir, unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) argument
|