/system/core/init/ |
H A D | init_parser_test.cpp | 50 args.push_back("root"); // gid. 52 args.push_back("root"); // Supplementary gid. 60 bool gid, bool supplementary_gids) { 68 if (gid) { 69 args.push_back("shell"); // gid 71 args.push_back("system"); // supplementary gid 0 72 args.push_back("adb"); // supplementary gid 1 95 if (gid) { 96 ASSERT_EQ(decode_uid("shell"), svc->gid()); 98 ASSERT_EQ(0U, svc->gid()); 59 Test_make_exec_oneshot_service(bool dash_dash, bool seclabel, bool uid, bool gid, bool supplementary_gids) argument [all...] |
H A D | ueventd.cpp | 102 gid_t gid; local 164 ERROR("invalid gid '%s'\n", args[3]); 168 gid = ret; 170 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard);
|
H A D | service.h | 53 gid_t gid, int perm, const std::string& socketcon); 57 gid_t gid; member in struct:SocketInfo 75 unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids, 95 gid_t gid() const { return gid_; } function in class:Service
|
H A D | service.cpp | 46 SocketInfo::SocketInfo() : uid(0), gid(0), perm(0) { 50 gid_t gid, int perm, const std::string& socketcon) 51 : name(name), type(type), uid(uid), gid(gid), perm(perm), socketcon(socketcon) { 71 unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids, 74 time_crashed_(0), nr_crashed_(0), uid_(uid), gid_(gid), supp_gids_(supp_gids), 247 /* name type perm [ uid gid context ] */ 256 gid_t gid = args.size() > 5 ? decode_uid(args[5].c_str()) : 0; local 259 sockets_.emplace_back(args[1], args[2], uid, gid, perm, socketcon); 406 si.uid, si.gid, socketco 49 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& socketcon) argument 70 Service(const std::string& name, const std::string& classname, unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids, const std::string& seclabel, const std::vector<std::string>& args) argument 675 gid_t gid = 0; local [all...] |
H A D | util.cpp | 50 * android_name_to_id - returns the integer uid/gid associated with the given 84 * numeric or name representation, into the integer uid or gid. Returns 102 gid_t gid, const char *socketcon) 153 ret = lchown(addr.sun_path, uid, gid); 165 addr.sun_path, perm, uid, gid); 101 create_socket(const char *name, int type, mode_t perm, uid_t uid, gid_t gid, const char *socketcon) argument
|
/system/extras/ext4_utils/ |
H A D | contents.h | 29 u16 gid; member in struct:dentry 40 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|
H A D | contents.c | 247 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime) argument 256 inode->i_gid = gid;
|
/system/extras/su/ |
H A D | su.c | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument 34 if (gid) *gid = pw->pw_gid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 41 if (gid) *gid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 64 /* gid i 103 gid_t gid = 0; local [all...] |
/system/core/libcutils/ |
H A D | canned_fs_config.c | 30 unsigned gid; member in struct:__anon1609 59 p->gid = atoi(strtok(NULL, " ")); 86 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) { 97 *gid = p->gid; 109 if (c_gid != *gid) printf("%s gid %d %d\n", path, *gid, c_gid); 85 canned_fs_config(const char* path, int dir, const char* target_out_path, unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) argument
|
H A D | fs.c | 40 static int fs_prepare_path_impl(const char* path, mode_t mode, uid_t uid, gid_t gid, argument 61 int owner_match = ((sb.st_uid == uid) && (sb.st_gid == gid)); 70 path, uid, gid, sb.st_uid, sb.st_gid); 100 if (TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) { 101 ALOGE("Failed to chown(%s, %d, %d): %s", path, uid, gid, strerror(errno)); 108 int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument 109 return fs_prepare_path_impl(path, mode, uid, gid, /*allow_fixup*/ 1, /*prepare_as_dir*/ 1); 112 int fs_prepare_dir_strict(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument 113 return fs_prepare_path_impl(path, mode, uid, gid, /*allow_fixup*/ 0, /*prepare_as_dir*/ 1); 116 int fs_prepare_file_strict(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument [all...] |
H A D | fs_config.c | 49 uint16_t gid; member in struct:fs_path_config_from_file 212 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) 255 *gid = get2LE((const uint8_t *)&(header.gid)); 272 *gid = pc->gid; 290 p->gid = get2LE((const uint8_t *)&(pc->gid)); 211 fs_config(const char *path, int dir, const char *target_out_path, unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) argument
|
/system/core/libpackagelistparser/ |
H A D | packagelistparser.c | 61 gid_t gid; local 72 gid = strtoul(token, &endptr, 10); 81 if (gid > GID_MAX) { 82 CLOGE("A gid in field \"gid list\" greater than GID_MAX"); 86 gid_list[cmp++] = gid; 202 errmsg = "Could not get next token for field \"gid(s)\""; 207 * Parse the gid list, could be in the form of none, single gid or list: 209 * gid [all...] |
/system/core/logd/ |
H A D | LogCommand.cpp | 60 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid) { argument 65 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) { 133 if ((gid == g[0]) 134 && (gid == g[1]) 135 && (gid == g[2]) 136 && (gid == g[3])) {
|
/system/core/run-as/ |
H A D | run-as.c | 51 * until the uid/gid has been dropped to that of a normal user 113 uid_t myuid, uid, gid, userAppId = 0; local 183 uid = gid = userAppId; 184 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { 188 /* Required if caller has uid and gid all non-zero */
|
/system/core/adb/ |
H A D | file_sync_service.cpp | 52 gid_t gid = -1; local 65 fs_config(partial_path.c_str(), 1, nullptr, &uid, &gid, &mode, &cap); 72 if (chown(partial_path.c_str(), uid, gid) == -1) { 150 gid_t gid, mode_t mode, std::vector<char>& buffer, bool do_unlink) { 171 if (fchown(fd, uid, gid) == -1) { 340 gid_t gid = -1; local 344 fs_config(path.c_str(), 0, nullptr, &uid, &gid, &broken_api_hack, &cap); 347 return handle_send_file(s, path.c_str(), uid, gid, mode, buffer, do_unlink); 149 handle_send_file(int s, const char* path, uid_t uid, gid_t gid, mode_t mode, std::vector<char>& buffer, bool do_unlink) argument
|
/system/core/cpio/ |
H A D | mkbootfs.c | 40 int uid, gid, mode; member in struct:fs_config_entry 47 * gid, mode). */ 61 // Use the list of file uid/gid/modes loaded from the file 72 s->st_gid = p->gid; 78 s->st_gid = empty_path_config->gid; 313 cc->gid = atoi(strtok(NULL, " \n"));
|
/system/core/crash_reporter/ |
H A D | user_collector_test.cc | 98 gid_t gid; local 101 &pid, &signal, &uid, &gid, &exec_name)); 105 EXPECT_EQ(2000, gid); 108 &pid, &signal, &uid, &gid, &exec_name)); 112 EXPECT_EQ(-1, gid); 116 &pid, &signal, &uid, &gid, &exec_name)); 119 &pid, &signal, &uid, &gid, &exec_name)); 123 &pid, &signal, &uid, &gid, &exec_name)); 126 &pid, &signal, &uid, &gid, &exec_name)); 129 &pid, &signal, &uid, &gid, 333 gid_t gid = 100; local [all...] |
H A D | crash_collector.cc | 170 gid_t *gid) { 182 *gid = passwd_result->pw_gid; 168 GetUserInfoFromName(const std::string &name, uid_t *uid, gid_t *gid) argument
|
H A D | user_collector.cc | 415 PLOG(FATAL) << "Unable to read saved gid"; 418 PLOG(FATAL) << "Unable to set real group ID back to saved gid"; 559 gid_t *gid, 562 if (re.FullMatch(crash_attributes, pid, signal, uid, gid, 570 *gid = kUnknownGid; 557 ParseCrashAttributes(const std::string &crash_attributes, pid_t *pid, int *signal, uid_t *uid, gid_t *gid, std::string *kernel_supplied_name) argument
|
/system/core/liblog/ |
H A D | logger_write.c | 61 gid_t gid = getgid(); local 62 if ((gid != AID_SYSTEM) && 63 (gid != AID_ROOT) && 64 (gid != AID_LOG)) { 65 gid = getegid(); 66 if ((gid != AID_SYSTEM) && 67 (gid != AID_ROOT) && 68 (gid != AID_LOG)) {
|
H A D | pmsg_reader.c | 80 gid_t gid; local 95 gid = getgid(); 96 if (uid_has_log_permission(gid)) { 97 return last_uid = gid; 99 gid = getegid(); 100 if (uid_has_log_permission(gid)) { 101 return last_uid = gid;
|
/system/core/libprocessgroup/ |
H A D | processgroup.cpp | 321 static int mkdirAndChown(const char *path, mode_t mode, uid_t uid, gid_t gid) argument 330 ret = chown(path, uid, gid);
|
/system/vold/ |
H A D | CommandListener.cpp | 436 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false); 441 gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10); local 443 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false); 447 rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]);
|
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 72 uid_t uid, gid; member in struct:debugger_request_t 150 snprintf(buf, len, "pid=%d uid=%d gid=%d", req->pid, req->uid, req->gid); 234 out_request->gid = cr.gid; 250 &out_request->uid, &out_request->gid); 607 // sending the request. Validate the trusted request.uid/gid to defend against this. 611 gid_t gid; local 612 if (get_process_info(request.tid, &pid, &uid, &gid) != 0) { 617 if (pid != request.pid || uid != request.uid || gid ! [all...] |
/system/core/include/private/ |
H A D | android_filesystem_config.h | 237 unsigned gid; member in struct:fs_path_config 257 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities);
|