Searched refs:uid (Results 1 - 25 of 49) sorted by relevance

12

/system/core/libcutils/
H A Dmultiuser.c19 userid_t multiuser_get_user_id(uid_t uid) { argument
20 return uid / MULTIUSER_APP_PER_USER_RANGE;
23 appid_t multiuser_get_app_id(uid_t uid) { argument
24 return uid % MULTIUSER_APP_PER_USER_RANGE;
H A Dsockets.c37 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) {
38 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
H A Dqtaguid.c99 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { argument
106 snprintf(lineBuf, sizeof(lineBuf), "t %d %llu %d", sockfd, kTag, uid);
108 ALOGV("Tagging socket %d with tag %llx{%u,0} for uid %d", sockfd, kTag, tag, uid);
112 ALOGI("Tagging socket %d with tag %llx(%d) for uid %d failed errno=%d",
113 sockfd, kTag, tag, uid, res);
134 int qtaguid_setCounterSet(int counterSetNum, uid_t uid) { argument
138 ALOGV("Setting counters to set %d for uid %d", counterSetNum, uid);
140 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid);
145 qtaguid_deleteTagData(int tag, uid_t uid) argument
[all...]
H A Dfs.c34 int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument
51 if (((sb.st_mode & ALL_PERMS) == mode) && (sb.st_uid == uid) && (sb.st_gid == gid)) {
70 if (TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) {
71 ALOGE("Failed to chown(%s, %d, %d): %s", path, uid, gid, strerror(errno));
/system/core/include/cutils/
H A Dqtaguid.h31 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid);
39 * For the given uid, switch counter sets.
43 extern int qtaguid_setCounterSet(int counterSetNum, uid_t uid);
46 * Delete all tag info that relates to the given tag an uid.
47 * If the tag is 0, then ALL info about the uid is freeded.
54 extern int qtaguid_deleteTagData(int tag, uid_t uid);
H A Dmultiuser.h33 extern userid_t multiuser_get_user_id(uid_t uid);
34 extern appid_t multiuser_get_app_id(uid_t uid);
H A Duevent.h29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid);
H A Dfs.h44 extern int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid);
/system/core/run-as/
H A Dpackage.h30 uid_t uid; member in struct:__anon480
40 extern int check_data_path(const char* dataDir, uid_t uid);
H A Drun-as.c39 * This program runs as set-uid root on Android production devices.
46 * until the uid/gid has been dropped to that of a normal user
106 int myuid, uid, gid; local
127 if (info.uid < AID_APP) {
139 if (check_data_path(info.dataDir, info.uid) < 0) {
160 uid = gid = info.uid;
161 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) {
[all...]
H A Dpackage.c29 * the run-as command has dropped the uid/gid. Hence be very
160 * - is owned by a given uid/gid
168 check_directory_ownership(const char* path, uid_t uid) argument
184 /* must be owned by specific uid/gid */
185 if (st.st_uid != uid || st.st_gid != uid)
208 check_data_path(const char* dataPath, uid_t uid) argument
259 * directory is owned by the application uid
261 if (check_directory_ownership(dataPath, uid) < 0)
432 info->uid
463 int uid, debugFlag; local
[all...]
/system/extras/su/
H A Dsu.c35 void pwtoid(const char *tok, uid_t *uid, gid_t *gid) argument
40 if (uid) *uid = pw->pw_uid;
44 if (uid) *uid = tmpid;
49 void extract_uidgids(const char *uidgids, uid_t *uid, gid_t *gid, gid_t *gids, argument
58 *gid = *uid = 0;
66 pwtoid(tok, uid, gid);
96 * su [uid[,gid[,group1]...] [cmd]]
100 * uid
105 uid_t uid, myuid; local
[all...]
/system/core/init/
H A Ddevices.h25 mode_t perm, unsigned int uid,
H A Dproperty_service.c62 unsigned int uid; member in struct:__anon374
105 unsigned int uid; member in struct:__anon375
247 * Returns 1 if uid allowed, 0 otherwise.
249 static int check_control_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) { argument
252 if (uid == AID_SYSTEM || uid == AID_ROOT)
258 if ((uid && control_perms[i].uid == uid) ||
269 * Returns 1 if uid allowe
271 check_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) argument
[all...]
H A Dueventd.c116 uid_t uid; local
166 ERROR("invalid uid '%s'\n", args[2]);
170 uid = ret;
180 add_dev_perms(name, attr, perm, uid, gid, prefix);
/system/core/libsysutils/src/
H A DNetlinkListener.cpp48 uid_t uid = -1; local
51 socket, mBuffer, sizeof(mBuffer), &uid));
53 if (uid > 0)
54 LOG_EVENT_INT(65537, uid);
/system/core/toolbox/
H A Dchown.c33 // Lookup uid (and gid if specified)
36 uid_t uid; local
41 uid = pw->pw_uid;
44 uid = (int) strtoul(user, &endptr, 0);
66 if (chown(argv[i], uid, gid) < 0) {
H A Did.c9 static void print_uid(uid_t uid) argument
11 struct passwd *pw = getpwuid(uid);
14 printf("%d(%s)", uid, pw->pw_name);
16 printf("%d",uid);
39 printf("uid=");
/system/extras/ext4_utils/
H A Dcontents.h28 u16 uid; member in struct:dentry
40 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
/system/security/keystore/include/keystore/
H A DIKeystoreService.h63 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid,
66 virtual int32_t del(const String16& name, int uid) = 0;
68 virtual int32_t exist(const String16& name, int uid) = 0;
70 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) = 0;
82 virtual int32_t generate(const String16& name, int uid, int32_t flags) = 0;
84 virtual int32_t import(const String16& name, const uint8_t* data, size_t length, int uid,
95 virtual int32_t del_key(const String16& name, int uid) = 0;
108 virtual int32_t clear_uid(int64_t uid) = 0;
/system/extras/tests/fstest/
H A Dperm_checker.c78 printf("# ERROR # Invalid uid '%s' reading line %d\n", str, line_num);
200 static void print_new_rule(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
205 pw = getpwuid(uid);
206 printf("%s %4o %4o %s %d %s %d\n", name, mode, mode, pw->pw_name, uid,
211 static int pass_rule(const perm_rule_t *pr, mode_t mode, uid_t uid, gid_t gid) argument
216 (pr->min_uid <= uid) && (pr->max_uid >= uid))
223 static int validate_file(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
232 if (!pass_rule(pr, mode, uid, gid))
245 print_new_rule(name, mode, uid, gi
284 validate_link(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
312 validate_dir(const char *name, mode_t mode, uid_t uid, gid_t gid) argument
[all...]
/system/security/keystore/
H A Dkeystore.cpp145 uid_t uid; member in struct:user_euid
154 uid_t uid; member in struct:user_perm
170 static uid_t get_app_id(uid_t uid) { argument
171 return uid % AID_USER;
178 static uid_t get_user_id(uid_t uid) { argument
179 return uid / AID_USER;
183 static bool has_permission(uid_t uid, perm_t perm) { argument
185 if (get_app_id(uid) == AID_SYSTEM) {
186 uid = AID_SYSTEM;
191 if (user.uid
204 get_keystore_euid(uid_t uid) argument
264 encode_key_for_uid(char* out, uid_t uid, const android::String8& keyName) argument
846 uint32_t uid; member in struct:__anon555
886 getState(uid_t uid) argument
890 initializeUser(const android::String8& pw, uid_t uid) argument
895 writeMasterKey(const android::String8& pw, uid_t uid) argument
901 readMasterKey(const android::String8& pw, uid_t uid) argument
913 getKeyNameForUid(const android::String8& keyName, uid_t uid) argument
919 getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid) argument
926 reset(uid_t uid) argument
969 lock(uid_t uid) argument
975 get(const char* filename, Blob* keyBlob, const BlobType type, uid_t uid) argument
1006 put(const char* filename, Blob* keyBlob, uid_t uid) argument
1039 importKey(const uint8_t* key, size_t keyLen, const char* filename, uid_t uid, int32_t flags) argument
1068 getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid, const BlobType type) argument
1117 getUserState(uid_t uid) argument
1190 upgradeBlob(const char* filename, Blob* blob, const uint8_t oldVersion, const BlobType type, uid_t uid) argument
1234 importBlobAsKey(Blob* blob, const char* filename, uid_t uid) argument
[all...]
H A Dkeystore_cli.cpp83 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \
86 int uid = -1; \
88 uid = atoi(argv[3]); \
89 fprintf(stderr, "Running as uid %d\n", uid); \
91 int32_t ret = service->cmd(String16(argv[2]), uid); \
148 static int saw(sp<IKeystoreService> service, const String16& name, int uid) { argument
150 int32_t ret = service->saw(name, uid, &matches);
H A DIKeystoreService.cpp92 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid, argument
101 data.writeInt32(uid);
117 virtual int32_t del(const String16& name, int uid) argument
122 data.writeInt32(uid);
137 virtual int32_t exist(const String16& name, int uid) argument
142 data.writeInt32(uid);
157 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) argument
162 data.writeInt32(uid);
273 virtual int32_t generate(const String16& name, int uid, int32_t flags) argument
278 data.writeInt32(uid);
294 import(const String16& name, const uint8_t* key, size_t keyLength, int uid, int flags) argument
417 del_key(const String16& name, int uid) argument
537 clear_uid(int64_t uid) argument
600 int uid = data.readInt32(); local
610 int uid = data.readInt32(); local
619 int uid = data.readInt32(); local
628 int uid = data.readInt32(); local
680 int uid = data.readInt32(); local
698 int uid = data.readInt32(); local
777 int uid = data.readInt32(); local
829 int64_t uid = data.readInt64(); local
[all...]
/system/core/include/private/
H A Dandroid_filesystem_config.h99 #define AID_USER 100000 /* offset for uid ranges for each user */
162 unsigned uid; member in struct:fs_path_config
219 /* the following file is INTENTIONALLY set-gid and not set-uid.
223 /* the following five files are INTENTIONALLY set-uid, but they
250 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities)
275 *uid = pc->uid;
282 path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode);
249 fs_config(const char *path, int dir, unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) argument

Completed in 6354 milliseconds

12