/system/core/libcutils/ |
H A D | multiuser.c | 19 userid_t multiuser_get_user_id(uid_t uid) { argument 20 return uid / MULTIUSER_APP_PER_USER_RANGE; 23 appid_t multiuser_get_app_id(uid_t uid) { argument 24 return uid % MULTIUSER_APP_PER_USER_RANGE;
|
H A D | uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) argument 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) argument 67 *uid = -1; 80 *uid = cred->uid; [all...] |
H A D | sockets.c | 40 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { 41 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
|
H A D | qtaguid.c | 100 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { argument 107 snprintf(lineBuf, sizeof(lineBuf), "t %d %" PRIu64 " %d", sockfd, kTag, uid); 109 ALOGV("Tagging socket %d with tag %" PRIx64 "{%u,0} for uid %d", sockfd, kTag, tag, uid); 113 ALOGI("Tagging socket %d with tag %" PRIx64 "(%d) for uid %d failed errno=%d", 114 sockfd, kTag, tag, uid, res); 135 int qtaguid_setCounterSet(int counterSetNum, uid_t uid) { argument 139 ALOGV("Setting counters to set %d for uid %d", counterSetNum, uid); 141 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid); 146 qtaguid_deleteTagData(int tag, uid_t uid) argument [all...] |
/system/core/libprocessgroup/include/processgroup/ |
H A D | processgroup.h | 25 int killProcessGroup(uid_t uid, int initialPid, int signal); 27 int createProcessGroup(uid_t uid, int initialPid);
|
/system/core/include/cutils/ |
H A D | qtaguid.h | 31 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 39 * For the given uid, switch counter sets. 43 extern int qtaguid_setCounterSet(int counterSetNum, uid_t uid); 46 * Delete all tag info that relates to the given tag an uid. 47 * If the tag is 0, then ALL info about the uid is freeded. 54 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
H A D | multiuser.h | 33 extern userid_t multiuser_get_user_id(uid_t uid); 34 extern appid_t multiuser_get_app_id(uid_t uid);
|
H A D | uevent.h | 29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid); 30 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid);
|
/system/core/run-as/ |
H A D | package.h | 30 uid_t uid; member in struct:__anon1504 42 extern int check_data_path(const char* dataDir, uid_t uid);
|
H A D | run-as.c | 49 * until the uid/gid has been dropped to that of a normal user 105 panic("Usage:\n " PROGNAME " <package-name> [--user <uid>] <command> [<args>]\n"); 111 uid_t myuid, uid, gid, userAppId = 0; local 156 if ((UID_MAX - info.uid) / AID_USER < (uid_t)userId) { 161 userAppId = (AID_USER * userId) + info.uid; 181 uid = gid = userAppId; 182 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { 186 /* Required if caller has uid an [all...] |
/system/netd/server/ |
H A D | NetworkController.h | 36 * Keeps track of default, per-pid, and per-uid-range network selection, as 56 uint32_t getNetworkForDns(unsigned* netId, uid_t uid) const; 57 unsigned getNetworkForUser(uid_t uid) const; 58 unsigned getNetworkForConnect(uid_t uid) const; 59 void getNetworkContext(unsigned netId, uid_t uid, struct android_net_context* netcontext) const; 70 Permission getPermissionForUser(uid_t uid) const; 72 int checkUserNetworkAccess(uid_t uid, unsigned netId) const; 85 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 87 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 89 bool canProtect(uid_t uid) cons [all...] |
H A D | NetworkController.cpp | 182 uint32_t NetworkController::getNetworkForDns(unsigned* netId, uid_t uid) const { 187 if (checkUserNetworkAccessLocked(uid, *netId) == 0) { 196 VirtualNetwork* virtualNetwork = getVirtualNetworkForUserLocked(uid); 209 unsigned NetworkController::getNetworkForUser(uid_t uid) const { 211 if (VirtualNetwork* virtualNetwork = getVirtualNetworkForUserLocked(uid)) { 231 unsigned NetworkController::getNetworkForConnect(uid_t uid) const { 233 VirtualNetwork* virtualNetwork = getVirtualNetworkForUserLocked(uid); 241 unsigned netId, uid_t uid, struct android_net_context* netcontext) const { 247 .uid = uid, 240 getNetworkContext( unsigned netId, uid_t uid, struct android_net_context* netcontext) const argument 403 checkUserNetworkAccess(uid_t uid, unsigned netId) const argument 465 addRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 470 removeRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool legacy, uid_t uid) argument 523 checkUserNetworkAccessLocked(uid_t uid, unsigned netId) const argument 550 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument [all...] |
/system/extras/su/ |
H A D | su.c | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument 33 if (uid) *uid = pw->pw_uid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 40 if (uid) *uid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 102 uid_t uid local [all...] |
/system/core/libprocessgroup/ |
H A D | processgroup.cpp | 48 static int convertUidToPath(char *path, size_t size, uid_t uid) argument 53 uid); 56 static int convertUidPidToPath(char *path, size_t size, uid_t uid, int pid) argument 61 uid, 66 static int initCtx(uid_t uid, int pid, struct ctx *ctx) argument 70 convertUidPidToPath(path, sizeof(path), uid, pid); 112 static pid_t getOneAppProcess(uid_t uid, int appProcessPid, struct ctx *ctx) argument 115 int ret = initCtx(uid, appProcessPid, ctx); 149 static int removeProcessGroup(uid_t uid, int pid) argument 154 convertUidPidToPath(path, sizeof(path), uid, pi 165 DIR *uid = opendir(uid_path); local 216 killProcessGroupOnce(uid_t uid, int initialPid, int signal) argument 252 killProcessGroup(uid_t uid, int initialPid, int signal) argument 281 mkdirAndChown(const char *path, mode_t mode, uid_t uid, gid_t gid) argument 300 createProcessGroup(uid_t uid, int initialPid) argument [all...] |
/system/core/init/ |
H A D | devices.h | 25 mode_t perm, unsigned int uid,
|
/system/extras/ext4_utils/ |
H A D | canned_fs_config.h | 24 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities);
|
H A D | canned_fs_config.c | 29 unsigned uid; member in struct:__anon1515 58 p->uid = atoi(strtok(NULL, " ")); 84 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) { 92 *uid = p->uid; 104 if (c_uid != *uid) printf("%s uid %d %d\n", path, *uid, c_uid); 83 canned_fs_config(const char* path, int dir, const char* target_out_path, unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) argument
|
/system/netd/include/ |
H A D | FwmarkCommand.h | 33 uid_t uid; // used only in the SELECT_FOR_USER and QUERY_USER_ACCESS commands; member in struct:FwmarkCommand
|
H A D | NetdClient.h | 38 int setNetworkForUser(uid_t uid, int socketFd); 40 int queryUserAccess(uid_t uid, unsigned netId);
|
/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 77 void store_sid(uint32_t uid, uint64_t sid) { argument 79 sprintf(filename, "%u", uid); 103 void maybe_store_sid(uint32_t uid, uint64_t sid) { argument 105 sprintf(filename, "%u", uid); 107 store_sid(uid, sid); 111 uint64_t read_sid(uint32_t uid) { argument 114 sprintf(filename, "%u", uid); 122 void clear_sid(uint32_t uid) { argument 124 sprintf(filename, "%u", uid); 127 store_sid(uid, 131 enroll(uint32_t uid, const uint8_t *current_password_handle, uint32_t current_password_handle_length, const uint8_t *current_password, uint32_t current_password_length, const uint8_t *desired_password, uint32_t desired_password_length, uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) argument 187 verify(uint32_t uid, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, bool *request_reenroll) argument 197 verifyChallenge(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument 266 getSecureUserId(uint32_t uid) argument 284 clearSecureUserId(uint32_t uid) argument 302 const int uid = ipc->getCallingUid(); local [all...] |
H A D | IGateKeeperService.h | 58 virtual int enroll(uint32_t uid, 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 85 virtual int verifyChallenge(uint32_t uid, uint64_t challenge, 92 virtual uint64_t getSecureUserId(uint32_t uid) = 0; 97 virtual void clearSecureUserId(uint32_t uid) = 0;
|
/system/core/logd/ |
H A D | LogBuffer.h | 52 uid_t uid, pid_t pid, pid_t tid, 59 void clear(log_id_t id, uid_t uid = AID_ROOT); 64 void formatStatistics(char **strp, uid_t uid, unsigned int logMask); 77 char *uidToName(uid_t uid) { return stats.uidToName(uid); } argument 83 void prune(log_id_t id, unsigned long pruneRows, uid_t uid = AID_ROOT);
|
H A D | LogCommand.cpp | 61 uid_t uid = cli->getUid(); local 62 if (uid == AID_ROOT) { 103 if ((uid != u[0]) || (uid != u[1]) || (uid != u[2]) || (uid != u[3])) {
|
/system/core/libsysutils/src/ |
H A D | NetlinkListener.cpp | 48 uid_t uid = -1; local 56 mBuffer, sizeof(mBuffer), require_group, &uid)); 58 if (uid > 0) 59 LOG_EVENT_INT(65537, uid);
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
H A D | target.h | 28 uid_t uid; member in struct:perf_target
|