Searched defs:gid (Results 1 - 25 of 34) sorted by relevance

12

/system/core/init/
H A Dinit_parser_test.cpp50 args.push_back("root"); // gid.
52 args.push_back("root"); // Supplementary gid.
60 bool gid, bool supplementary_gids) {
68 if (gid) {
69 args.push_back("shell"); // gid
71 args.push_back("system"); // supplementary gid 0
72 args.push_back("adb"); // supplementary gid 1
95 if (gid) {
96 ASSERT_EQ(decode_uid("shell"), svc->gid());
98 ASSERT_EQ(0U, svc->gid());
59 Test_make_exec_oneshot_service(bool dash_dash, bool seclabel, bool uid, bool gid, bool supplementary_gids) argument
[all...]
H A Dueventd.cpp102 gid_t gid; local
164 ERROR("invalid gid '%s'\n", args[3]);
168 gid = ret;
170 add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard);
H A Dservice.h53 gid_t gid, int perm, const std::string& socketcon);
57 gid_t gid; member in struct:SocketInfo
75 unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids,
95 gid_t gid() const { return gid_; } function in class:Service
H A Dservice.cpp46 SocketInfo::SocketInfo() : uid(0), gid(0), perm(0) {
50 gid_t gid, int perm, const std::string& socketcon)
51 : name(name), type(type), uid(uid), gid(gid), perm(perm), socketcon(socketcon) {
71 unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids,
74 time_crashed_(0), nr_crashed_(0), uid_(uid), gid_(gid), supp_gids_(supp_gids),
247 /* name type perm [ uid gid context ] */
256 gid_t gid = args.size() > 5 ? decode_uid(args[5].c_str()) : 0; local
259 sockets_.emplace_back(args[1], args[2], uid, gid, perm, socketcon);
406 si.uid, si.gid, socketco
49 SocketInfo(const std::string& name, const std::string& type, uid_t uid, gid_t gid, int perm, const std::string& socketcon) argument
70 Service(const std::string& name, const std::string& classname, unsigned flags, uid_t uid, gid_t gid, const std::vector<gid_t>& supp_gids, const std::string& seclabel, const std::vector<std::string>& args) argument
675 gid_t gid = 0; local
[all...]
H A Dutil.cpp50 * android_name_to_id - returns the integer uid/gid associated with the given
84 * numeric or name representation, into the integer uid or gid. Returns
102 gid_t gid, const char *socketcon)
153 ret = lchown(addr.sun_path, uid, gid);
165 addr.sun_path, perm, uid, gid);
101 create_socket(const char *name, int type, mode_t perm, uid_t uid, gid_t gid, const char *socketcon) argument
/system/extras/ext4_utils/
H A Dcontents.h29 u16 gid; member in struct:dentry
40 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
H A Dcontents.c247 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime) argument
256 inode->i_gid = gid;
/system/extras/su/
H A Dsu.c30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument
34 if (gid) *gid = pw->pw_gid;
39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok);
41 if (gid) *gid = tmpid;
45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument
52 *gid = *uid = 0;
61 pwtoid(tok, uid, gid);
64 /* gid i
103 gid_t gid = 0; local
[all...]
/system/core/libcutils/
H A Dcanned_fs_config.c30 unsigned gid; member in struct:__anon1609
59 p->gid = atoi(strtok(NULL, " "));
86 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) {
97 *gid = p->gid;
109 if (c_gid != *gid) printf("%s gid %d %d\n", path, *gid, c_gid);
85 canned_fs_config(const char* path, int dir, const char* target_out_path, unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) argument
H A Dfs.c40 static int fs_prepare_path_impl(const char* path, mode_t mode, uid_t uid, gid_t gid, argument
61 int owner_match = ((sb.st_uid == uid) && (sb.st_gid == gid));
70 path, uid, gid, sb.st_uid, sb.st_gid);
100 if (TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) {
101 ALOGE("Failed to chown(%s, %d, %d): %s", path, uid, gid, strerror(errno));
108 int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument
109 return fs_prepare_path_impl(path, mode, uid, gid, /*allow_fixup*/ 1, /*prepare_as_dir*/ 1);
112 int fs_prepare_dir_strict(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument
113 return fs_prepare_path_impl(path, mode, uid, gid, /*allow_fixup*/ 0, /*prepare_as_dir*/ 1);
116 int fs_prepare_file_strict(const char* path, mode_t mode, uid_t uid, gid_t gid) { argument
[all...]
H A Dfs_config.c49 uint16_t gid; member in struct:fs_path_config_from_file
212 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities)
255 *gid = get2LE((const uint8_t *)&(header.gid));
272 *gid = pc->gid;
290 p->gid = get2LE((const uint8_t *)&(pc->gid));
211 fs_config(const char *path, int dir, const char *target_out_path, unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) argument
/system/core/libpackagelistparser/
H A Dpackagelistparser.c61 gid_t gid; local
72 gid = strtoul(token, &endptr, 10);
81 if (gid > GID_MAX) {
82 CLOGE("A gid in field \"gid list\" greater than GID_MAX");
86 gid_list[cmp++] = gid;
202 errmsg = "Could not get next token for field \"gid(s)\"";
207 * Parse the gid list, could be in the form of none, single gid or list:
209 * gid
[all...]
/system/core/logd/
H A DLogCommand.cpp60 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid) { argument
65 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) {
133 if ((gid == g[0])
134 && (gid == g[1])
135 && (gid == g[2])
136 && (gid == g[3])) {
/system/core/run-as/
H A Drun-as.c51 * until the uid/gid has been dropped to that of a normal user
113 uid_t myuid, uid, gid, userAppId = 0; local
183 uid = gid = userAppId;
184 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) {
188 /* Required if caller has uid and gid all non-zero */
/system/core/adb/
H A Dfile_sync_service.cpp52 gid_t gid = -1; local
65 fs_config(partial_path.c_str(), 1, nullptr, &uid, &gid, &mode, &cap);
72 if (chown(partial_path.c_str(), uid, gid) == -1) {
150 gid_t gid, mode_t mode, std::vector<char>& buffer, bool do_unlink) {
171 if (fchown(fd, uid, gid) == -1) {
340 gid_t gid = -1; local
344 fs_config(path.c_str(), 0, nullptr, &uid, &gid, &broken_api_hack, &cap);
347 return handle_send_file(s, path.c_str(), uid, gid, mode, buffer, do_unlink);
149 handle_send_file(int s, const char* path, uid_t uid, gid_t gid, mode_t mode, std::vector<char>& buffer, bool do_unlink) argument
/system/core/cpio/
H A Dmkbootfs.c40 int uid, gid, mode; member in struct:fs_config_entry
47 * gid, mode). */
61 // Use the list of file uid/gid/modes loaded from the file
72 s->st_gid = p->gid;
78 s->st_gid = empty_path_config->gid;
313 cc->gid = atoi(strtok(NULL, " \n"));
/system/core/crash_reporter/
H A Duser_collector_test.cc98 gid_t gid; local
101 &pid, &signal, &uid, &gid, &exec_name));
105 EXPECT_EQ(2000, gid);
108 &pid, &signal, &uid, &gid, &exec_name));
112 EXPECT_EQ(-1, gid);
116 &pid, &signal, &uid, &gid, &exec_name));
119 &pid, &signal, &uid, &gid, &exec_name));
123 &pid, &signal, &uid, &gid, &exec_name));
126 &pid, &signal, &uid, &gid, &exec_name));
129 &pid, &signal, &uid, &gid,
333 gid_t gid = 100; local
[all...]
H A Dcrash_collector.cc170 gid_t *gid) {
182 *gid = passwd_result->pw_gid;
168 GetUserInfoFromName(const std::string &name, uid_t *uid, gid_t *gid) argument
H A Duser_collector.cc415 PLOG(FATAL) << "Unable to read saved gid";
418 PLOG(FATAL) << "Unable to set real group ID back to saved gid";
559 gid_t *gid,
562 if (re.FullMatch(crash_attributes, pid, signal, uid, gid,
570 *gid = kUnknownGid;
557 ParseCrashAttributes(const std::string &crash_attributes, pid_t *pid, int *signal, uid_t *uid, gid_t *gid, std::string *kernel_supplied_name) argument
/system/core/liblog/
H A Dlogger_write.c61 gid_t gid = getgid(); local
62 if ((gid != AID_SYSTEM) &&
63 (gid != AID_ROOT) &&
64 (gid != AID_LOG)) {
65 gid = getegid();
66 if ((gid != AID_SYSTEM) &&
67 (gid != AID_ROOT) &&
68 (gid != AID_LOG)) {
H A Dpmsg_reader.c80 gid_t gid; local
95 gid = getgid();
96 if (uid_has_log_permission(gid)) {
97 return last_uid = gid;
99 gid = getegid();
100 if (uid_has_log_permission(gid)) {
101 return last_uid = gid;
/system/core/libprocessgroup/
H A Dprocessgroup.cpp321 static int mkdirAndChown(const char *path, mode_t mode, uid_t uid, gid_t gid) argument
330 ret = chown(path, uid, gid);
/system/vold/
H A DCommandListener.cpp436 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
441 gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10); local
443 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
447 rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]);
/system/core/debuggerd/
H A Ddebuggerd.cpp72 uid_t uid, gid; member in struct:debugger_request_t
150 snprintf(buf, len, "pid=%d uid=%d gid=%d", req->pid, req->uid, req->gid);
234 out_request->gid = cr.gid;
250 &out_request->uid, &out_request->gid);
607 // sending the request. Validate the trusted request.uid/gid to defend against this.
611 gid_t gid; local
612 if (get_process_info(request.tid, &pid, &uid, &gid) != 0) {
617 if (pid != request.pid || uid != request.uid || gid !
[all...]
/system/core/include/private/
H A Dandroid_filesystem_config.h237 unsigned gid; member in struct:fs_path_config
257 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities);

Completed in 977 milliseconds

12