/frameworks/base/core/java/android/net/ |
H A D | Credentials.java | 28 /** gid of process. root peers may lie. */ 29 private final int gid; field in class:Credentials 31 public Credentials (int pid, int uid, int gid) { argument 34 this.gid = gid; 46 return gid;
|
/frameworks/base/cmds/idmap/ |
H A D | idmap.cpp | 117 gid_t gid = getgid(); local 119 return (uid == 0 && gid == 0) || (uid == AID_SYSTEM && gid == AID_SYSTEM); 216 ALOGD("%s:%d: uid=%d gid=%d argv=%s\n", __FILE__, __LINE__, getuid(), getgid(), buf);
|
H A D | scan.cpp | 67 int mkdir_p(const String8& path, uid_t uid, gid_t gid) argument 76 if (mkdir_p(path.getPathDir(), uid, gid) < 0) { 82 if (chown(path.string(), uid, gid) == -1) {
|
/frameworks/base/core/java/android/os/ |
H A D | FileUtils.java | 71 * @param gid to apply through {@code chown}, or -1 to leave unchanged 74 public static int setPermissions(File path, int mode, int uid, int gid) { argument 75 return setPermissions(path.getAbsolutePath(), mode, uid, gid); 83 * @param gid to apply through {@code chown}, or -1 to leave unchanged 86 public static int setPermissions(String path, int mode, int uid, int gid) { argument 94 if (uid >= 0 || gid >= 0) { 96 Os.chown(path, uid, gid); 111 * @param gid to apply through {@code chown}, or -1 to leave unchanged 114 public static int setPermissions(FileDescriptor fd, int mode, int uid, int gid) { argument 122 if (uid >= 0 || gid > [all...] |
H A D | Process.java | 171 * Defines the gid shared by all applications running under the same profile. 177 * First gid for applications to share resources. Used when forward-locking 184 * Last gid for applications to share resources. Used when forward-locking 465 * @param gid The group-id under which the process will run. 482 int uid, int gid, int[] gids, 491 return startViaZygote(processClass, niceName, uid, gid, gids, 589 * @param gid a POSIX gid that the new process shuold setgid() to 604 final int uid, final int gid, 621 argsForZygote.add("--setgid=" + gid); 480 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String[] zygoteArgs) argument 602 startViaZygote(final String processClass, final String niceName, final int uid, final int gid, final int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String[] extraArgs) argument [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
H A D | Zygote.java | 65 * @param gid the UNIX gid that the new process should setgid() to after 87 public static int forkAndSpecialize(int uid, int gid, int[] gids, int debugFlags, argument 94 uid, gid, gids, debugFlags, rlimits, mountExternal, seInfo, niceName, fdsToClose, 102 native private static int nativeForkAndSpecialize(int uid, int gid, int[] gids,int debugFlags, argument 126 * @param gid the UNIX gid that the new process should setgid() to after 141 public static int forkSystemServer(int uid, int gid, int[] gids, int debugFlags, argument 145 uid, gid, gids, debugFlags, rlimits, permittedCapabilities, effectiveCapabilities); 150 native private static int nativeForkSystemServer(int uid, int gid, in argument [all...] |
H A D | ZygoteConnection.java | 246 pid = Zygote.forkAndSpecialize(parsedArgs.uid, parsedArgs.gid, parsedArgs.gids, 314 * <li> --setgid=<i>gid of child process, defaults to 0</i> 315 * <li> --setgroups=<i>comma-separated list of supplimentary gid's</i> 348 int gid = 0; field in class:ZygoteConnection.Arguments 454 gid = Integer.parseInt( 643 * <li> uid 0 (root) may specify any uid, gid, and setgroups() list 645 * operation. It may also specify any gid and setgroups() list it chooses. 647 * <li> Any other uid may not specify any uid, gid, or setgroups list. The 648 * uid and gid will be inherited from the requesting process. 685 "App UIDs may not specify uid's or gid' [all...] |
H A D | ZygoteInit.java | 247 private static void setEffectiveGroup(int gid) { argument 248 int errno = setregid(ROOT_GID, gid); 612 parsedArgs.uid, parsedArgs.gid, 808 * @param rgid real gid 809 * @param egid effective gid
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | Installer.java | 44 public int install(String name, int uid, int gid, String seinfo) { argument 51 builder.append(gid); 154 public int fixUid(String name, int uid, int gid) { argument 161 builder.append(gid);
|
/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | Archive.h | 47 char gid[6]; ///< group id in ASCII decimal member in struct:mcld::Archive::MemberHeader
|
/frameworks/base/core/java/com/android/internal/content/ |
H A D | PackageHelper.java | 322 public static boolean fixSdPermissions(String cid, int gid, String filename) { argument 324 int rc = getMountService().fixPermissionsSecureContainer(cid, gid, filename);
|
/frameworks/base/core/jni/ |
H A D | com_android_internal_os_Zygote.cpp | 425 static pid_t ForkAndSpecializeCommon(JNIEnv* env, uid_t uid, gid_t gid, jintArray javaGids, argument 505 int rc = setresgid(gid, gid, gid); 507 ALOGE("setresgid(%d) failed", gid); 590 JNIEnv* env, jclass, jint uid, jint gid, jintArray gids, 600 return ForkAndSpecializeCommon(env, uid, gid, gids, debug_flags, 606 JNIEnv* env, jclass, uid_t uid, gid_t gid, jintArray gids, 609 pid_t pid = ForkAndSpecializeCommon(env, uid, gid, gids, 589 com_android_internal_os_Zygote_nativeForkAndSpecialize( JNIEnv* env, jclass, jint uid, jint gid, jintArray gids, jint debug_flags, jobjectArray rlimits, jint mount_external, jstring se_info, jstring se_name, jintArray fdsToClose, jstring instructionSet, jstring appDataDir) argument 605 com_android_internal_os_Zygote_nativeForkSystemServer( JNIEnv* env, jclass, uid_t uid, gid_t gid, jintArray gids, jint debug_flags, jobjectArray rlimits, jlong permittedCapabilities, jlong effectiveCapabilities) argument
|
/frameworks/native/cmds/installd/ |
H A D | installd.c | 36 return install(arg[0], atoi(arg[1]), atoi(arg[2]), arg[3]); /* pkgname, uid, gid, seinfo */ 72 return fix_uid(arg[0], atoi(arg[1]), atoi(arg[2])); /* pkgname, uid, gid */ 556 gid_t gid = uid; local 558 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) { 563 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gid) != 0) {
|
H A D | utils.c | 1121 const int gid = multiuser_get_uid(userid, AID_EVERYBODY); local 1125 if (fs_prepare_dir(config_user_path, 0750, uid, gid) == -1) { 1132 int create_profile_file(const char *pkgname, gid_t gid) { argument 1144 // Always set the uid/gid/permissions. The file could have been previously created 1147 if (fchown(fd, AID_SYSTEM, gid) < 0) {
|
H A D | commands.c | 34 int install(const char *pkgname, uid_t uid, gid_t gid, const char *seinfo) argument 41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 42 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 104 if (chown(pkgdir, uid, gid) < 0) { 144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 151 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 172 if (chown(pkgdir, uid, gid) < 1111 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument [all...] |
/frameworks/base/core/java/android/os/storage/ |
H A D | IMountService.java | 800 public int fixPermissionsSecureContainer(String id, int gid, String filename) argument 808 _data.writeInt(gid); 1319 int gid; 1320 gid = data.readInt(); 1323 int resultCode = fixPermissionsSecureContainer(id, gid, filename); 1625 public int fixPermissionsSecureContainer(String id, int gid, String filename) argument
|
/frameworks/support/v8/renderscript/jni/ |
H A D | android_renderscript_RenderScript.cpp | 949 nScriptGroupSetInput(JNIEnv *_env, jobject _this, RsContext con, jint gid, jint kid, jint alloc) argument 952 (void *)gid, (void *)kid, (void *)alloc); 953 rsScriptGroupSetInput(con, (RsScriptGroup)gid, (RsScriptKernelID)kid, (RsAllocation)alloc); 957 nScriptGroupSetOutput(JNIEnv *_env, jobject _this, RsContext con, jint gid, jint kid, jint alloc) argument 960 (void *)gid, (void *)kid, (void *)alloc); 961 rsScriptGroupSetOutput(con, (RsScriptGroup)gid, (RsScriptKernelID)kid, (RsAllocation)alloc); 965 nScriptGroupExecute(JNIEnv *_env, jobject _this, RsContext con, jint gid) argument 967 LOG_API("nScriptGroupSetOutput, con(%p) group(%p)", con, (void *)gid); 968 rsScriptGroupExecute(con, (RsScriptGroup)gid);
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | PackageManagerTests.java | 508 private void assertDirOwnerGroupPermsIfExists(String reason, int uid, int gid, int perms, argument 537 if (stat.st_gid != gid) { 539 sb.append(gid);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | MountService.java | 1877 public int fixPermissionsSecureContainer(String id, int gid, String filename) { argument 1883 mConnector.execute("asec", "fixperms", id, gid, filename);
|
/frameworks/base/rs/jni/ |
H A D | android_renderscript_RenderScript.cpp | 1383 nScriptGroupSetInput(JNIEnv *_env, jobject _this, jlong con, jlong gid, jlong kid, jlong alloc) argument 1386 (void *)gid, (void *)kid, (void *)alloc); 1387 rsScriptGroupSetInput((RsContext)con, (RsScriptGroup)gid, (RsScriptKernelID)kid, (RsAllocation)alloc); 1391 nScriptGroupSetOutput(JNIEnv *_env, jobject _this, jlong con, jlong gid, jlong kid, jlong alloc) argument 1394 (void *)gid, (void *)kid, (void *)alloc); 1395 rsScriptGroupSetOutput((RsContext)con, (RsScriptGroup)gid, (RsScriptKernelID)kid, (RsAllocation)alloc); 1399 nScriptGroupExecute(JNIEnv *_env, jobject _this, jlong con, jlong gid) argument 1401 LOG_API("nScriptGroupSetOutput, con(%p) group(%p)", (RsContext)con, (void *)gid); 1402 rsScriptGroupExecute((RsContext)con, (RsScriptGroup)gid);
|