/system/core/libprocessgroup/include/processgroup/ |
H A D | processgroup.h | 25 int killProcessGroup(uid_t uid, int initialPid, int signal); 27 int createProcessGroup(uid_t uid, int initialPid);
|
/system/core/libcutils/ |
H A D | multiuser.c | 19 userid_t multiuser_get_user_id(uid_t uid) { argument 20 return uid / MULTIUSER_APP_PER_USER_RANGE; 23 appid_t multiuser_get_app_id(uid_t uid) { argument 24 return uid % MULTIUSER_APP_PER_USER_RANGE;
|
H A D | uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) argument 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) argument 67 *uid = -1; 80 *uid = cred->uid; [all...] |
H A D | qtaguid.c | 101 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { argument 108 snprintf(lineBuf, sizeof(lineBuf), "t %d %" PRIu64 " %d", sockfd, kTag, uid); 110 ALOGV("Tagging socket %d with tag %" PRIx64 "{%u,0} for uid %d", sockfd, kTag, tag, uid); 114 ALOGI("Tagging socket %d with tag %" PRIx64 "(%d) for uid %d failed errno=%d", 115 sockfd, kTag, tag, uid, res); 136 int qtaguid_setCounterSet(int counterSetNum, uid_t uid) { argument 140 ALOGV("Setting counters to set %d for uid %d", counterSetNum, uid); 142 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid); 147 qtaguid_deleteTagData(int tag, uid_t uid) argument [all...] |
/system/core/include/cutils/ |
H A D | multiuser.h | 35 extern userid_t multiuser_get_user_id(uid_t uid); 36 extern appid_t multiuser_get_app_id(uid_t uid); 38 extern appid_t multiuser_get_shared_app_gid(uid_t uid);
|
H A D | qtaguid.h | 31 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 39 * For the given uid, switch counter sets. 43 extern int qtaguid_setCounterSet(int counterSetNum, uid_t uid); 46 * Delete all tag info that relates to the given tag an uid. 47 * If the tag is 0, then ALL info about the uid is freeded. 54 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
H A D | fs.h | 46 extern int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid); 52 extern int fs_prepare_dir_strict(const char* path, mode_t mode, uid_t uid, gid_t gid); 58 extern int fs_prepare_file_strict(const char* path, mode_t mode, uid_t uid, gid_t gid);
|
H A D | uevent.h | 29 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid); 30 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid);
|
/system/core/run-as/ |
H A D | package.h | 30 uid_t uid; member in struct:__anon1712 42 extern int check_data_path(const char* dataDir, uid_t uid);
|
/system/security/keystore/ |
H A D | permissions.cpp | 37 uid_t uid; member in struct:user_euid 46 uid_t uid; member in struct:user_perm 62 uid_t uid; member in struct:audit_data 82 snprintf(buf, len, "pid=%d uid=%d", ad->pid, ad->uid); 108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { argument 128 ad.uid = uid; 141 uid_t get_keystore_euid(uid_t uid) { argument 144 if (user.uid 152 has_permission(uid_t uid, perm_t perm, pid_t spid) argument [all...] |
H A D | permissions.h | 51 uid_t get_keystore_euid(uid_t uid); 53 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
|
H A D | keystore.h | 29 uint32_t uid; member in struct:__anon1895 57 android::String8 getKeyNameForUid(const android::String8& keyName, uid_t uid); 58 android::String8 getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid); 78 bool hasGrant(const char* filename, const uid_t uid) const { 79 return getGrant(filename, uid) != NULL; 87 ResponseCode getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid, 98 UserState* getUserStateByUid(uid_t uid); 108 const UserState* getUserStateByUid(uid_t uid) const; 127 const grant_t* getGrant(const char* filename, uid_t uid) const; 133 const BlobType type, uid_t uid); [all...] |
/system/netd/server/ |
H A D | NetworkController.h | 37 * Keeps track of default, per-pid, and per-uid-range network selection, as 57 uint32_t getNetworkForDns(unsigned* netId, uid_t uid) const; 58 unsigned getNetworkForUser(uid_t uid) const; 59 unsigned getNetworkForConnect(uid_t uid) const; 60 void getNetworkContext(unsigned netId, uid_t uid, struct android_net_context* netcontext) const; 71 Permission getPermissionForUser(uid_t uid) const; 73 int checkUserNetworkAccess(uid_t uid, unsigned netId) const; 86 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 88 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 90 bool canProtect(uid_t uid) cons [all...] |
/system/extras/su/ |
H A D | su.c | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument 33 if (uid) *uid = pw->pw_uid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 40 if (uid) *uid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 102 uid_t uid local [all...] |
/system/core/include/private/ |
H A D | canned_fs_config.h | 24 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities);
|
/system/core/init/ |
H A D | devices.h | 25 mode_t perm, unsigned int uid,
|
/system/netd/include/ |
H A D | FwmarkCommand.h | 33 uid_t uid; // used only in the SELECT_FOR_USER and QUERY_USER_ACCESS commands; member in struct:FwmarkCommand
|
H A D | NetdClient.h | 38 int setNetworkForUser(uid_t uid, int socketFd); 40 int queryUserAccess(uid_t uid, unsigned netId);
|
/system/core/logd/ |
H A D | LogCommand.cpp | 60 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid) { argument 61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { 120 if ((uid == u[0]) 121 && (uid == u[1]) 122 && (uid == u[2]) 123 && (uid == u[3])) {
|
/system/netd/server/binder/android/net/ |
H A D | UidRange.cpp | 70 void UidRange::setStart(int32_t uid) { argument 72 ALOG_ASSERT(uid <= mStop, "start UID must be less than or equal to stop UID"); 74 mStart = uid; 77 void UidRange::setStop(int32_t uid) { argument 79 ALOG_ASSERT(uid <= mStop, "stop UID must be greater than or equal to start UID"); 81 mStop = uid;
|
/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 77 void store_sid(uint32_t uid, uint64_t sid) { argument 79 sprintf(filename, "%u", uid); 103 void maybe_store_sid(uint32_t uid, uint64_t sid) { argument 105 sprintf(filename, "%u", uid); 107 store_sid(uid, sid); 111 uint64_t read_sid(uint32_t uid) { argument 114 sprintf(filename, "%u", uid); 122 void clear_sid(uint32_t uid) { argument 124 sprintf(filename, "%u", uid); 127 store_sid(uid, 131 enroll(uint32_t uid, const uint8_t *current_password_handle, uint32_t current_password_handle_length, const uint8_t *current_password, uint32_t current_password_length, const uint8_t *desired_password, uint32_t desired_password_length, uint8_t **enrolled_password_handle, uint32_t *enrolled_password_handle_length) argument 187 verify(uint32_t uid, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, bool *request_reenroll) argument 197 verifyChallenge(uint32_t uid, uint64_t challenge, const uint8_t *enrolled_password_handle, uint32_t enrolled_password_handle_length, const uint8_t *provided_password, uint32_t provided_password_length, uint8_t **auth_token, uint32_t *auth_token_length, bool *request_reenroll) argument 266 getSecureUserId(uint32_t uid) argument 284 clearSecureUserId(uint32_t uid) argument 302 const int uid = ipc->getCallingUid(); local [all...] |
H A D | IGateKeeperService.h | 58 virtual int enroll(uint32_t uid, 72 virtual int verify(uint32_t uid, const uint8_t *enrolled_password_handle, 85 virtual int verifyChallenge(uint32_t uid, uint64_t challenge, 92 virtual uint64_t getSecureUserId(uint32_t uid) = 0; 97 virtual void clearSecureUserId(uint32_t uid) = 0;
|
/system/core/libprocessgroup/ |
H A D | processgroup.cpp | 87 static int convertUidToPath(char *path, size_t size, uid_t uid) argument 92 uid); 95 static int convertUidPidToPath(char *path, size_t size, uid_t uid, int pid) argument 100 uid, 105 static int initCtx(uid_t uid, int pid, struct ctx *ctx) argument 109 convertUidPidToPath(path, sizeof(path), uid, pid); 151 static pid_t getOneAppProcess(uid_t uid, int appProcessPid, struct ctx *ctx) argument 154 int ret = initCtx(uid, appProcessPid, ctx); 188 static int removeProcessGroup(uid_t uid, int pid) argument 193 convertUidPidToPath(path, sizeof(path), uid, pi 204 DIR *uid = opendir(uid_path); local 256 killProcessGroupOnce(uid_t uid, int initialPid, int signal) argument 292 killProcessGroup(uid_t uid, int initialPid, int signal) argument 321 mkdirAndChown(const char *path, mode_t mode, uid_t uid, gid_t gid) argument 340 createProcessGroup(uid_t uid, int initialPid) argument [all...] |
/system/nativepower/daemon/ |
H A D | wake_lock_manager_stub.cc | 28 uid_t uid) { 29 return base::StringPrintf("%s,%s,%d", tag.c_str(), package.c_str(), uid); 43 return ConstructRequestString(req.tag, req.package, req.uid); 49 uid_t uid) { 50 requests_[client_binder] = Request(tag, package, uid); 25 ConstructRequestString( const std::string& tag, const std::string& package, uid_t uid) argument 46 AddRequest(sp<IBinder> client_binder, const std::string& tag, const std::string& package, uid_t uid) argument
|
/system/core/liblog/ |
H A D | log_event_write.c | 28 int32_t uid, 40 ret = android_log_write_int32(ctx, uid); 25 __android_log_error_write( int tag, const char *subTag, int32_t uid, const char *data, uint32_t dataLen) argument
|