/system/core/init/ |
H A D | init_parser_test.cpp | 49 args.push_back("root"); // uid. 59 static void Test_make_exec_oneshot_service(bool dash_dash, bool seclabel, bool uid, argument 66 if (uid) { 67 args.push_back("log"); // uid 90 if (uid) { 91 ASSERT_EQ(decode_uid("log"), svc->uid()); 93 ASSERT_EQ(0U, svc->uid());
|
H A D | descriptors.h | 27 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, 40 uid_t uid() const { return uid_; } function in class:DescriptorInfo 61 SocketInfo(const std::string& name, const std::string& type, uid_t uid, 71 FileInfo(const std::string& name, const std::string& type, uid_t uid,
|
H A D | descriptors.cpp | 34 DescriptorInfo::DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, argument 36 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) { 71 SocketInfo::SocketInfo(const std::string& name, const std::string& type, uid_t uid, argument 73 : DescriptorInfo(name, type, uid, gid, perm, context) { 84 return create_socket(name().c_str(), flags, perm(), uid(), gid(), context.c_str()); 91 FileInfo::FileInfo(const std::string& name, const std::string& type, uid_t uid, argument 93 // defaults OK for uid,..., they are ignored for this class. 94 : DescriptorInfo(name, type, uid, gid, perm, context) {
|
H A D | ueventd.cpp | 102 uid_t uid; local 145 LOG(ERROR) << "invalid uid '" << args[2] << "'"; 148 uid = pwd->pw_uid; 157 if (add_dev_perms(name, attr, perm, uid, gid, prefix, wildcard) != 0) { 161 ", uid=" << uid << ", gid=" << gid <<
|
/system/core/libcutils/include/private/ |
H A D | fs_config.h | 31 uint16_t uid; member in struct:fs_path_config_from_file
|
/system/core/libcutils/include_vndk/private/ |
H A D | fs_config.h | 31 uint16_t uid; member in struct:fs_path_config_from_file
|
/system/core/liblog/ |
H A D | log_event_write.c | 28 int32_t uid, const char* data, 39 ret = android_log_write_int32(ctx, uid); 27 __android_log_error_write(int tag, const char* subTag, int32_t uid, const char* data, uint32_t dataLen) argument
|
/system/core/libsysutils/src/ |
H A D | NetlinkListener.cpp | 50 uid_t uid = -1; local 58 mBuffer, sizeof(mBuffer), require_group, &uid)); 60 if (uid > 0) 61 LOG_EVENT_INT(65537, uid);
|
/system/core/libbinderwrapper/include/binderwrapper/ |
H A D | stub_binder_wrapper.h | 80 void set_calling_uid(uid_t uid) { calling_uid_ = uid; } argument
|
/system/core/libcutils/ |
H A D | multiuser.c | 20 userid_t multiuser_get_user_id(uid_t uid) { argument 21 return uid / AID_USER_OFFSET; 24 appid_t multiuser_get_app_id(uid_t uid) { argument 25 return uid % AID_USER_OFFSET; 64 gid_t multiuser_get_shared_app_gid(uid_t uid) { argument 65 return multiuser_get_shared_gid(multiuser_get_user_id(uid), multiuser_get_app_id(uid));
|
H A D | uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) argument 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) argument 67 *uid = -1; 80 *uid = cred->uid; [all...] |
H A D | canned_fs_config.c | 29 unsigned uid; member in struct:__anon1517 63 p->uid = atoi(strtok(NULL, " ")); 90 unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) { 100 *uid = p->uid; 113 if (c_uid != *uid) printf("%s uid %d %d\n", path, *uid, c_uid); 89 canned_fs_config(const char* path, int dir, const char* target_out_path, unsigned* uid, unsigned* gid, unsigned* mode, uint64_t* capabilities) argument
|
/system/core/libpackagelistparser/include/packagelistparser/ |
H A D | packagelistparser.h | 50 uid_t uid; member in struct:pkg_info
|
/system/core/libprocinfo/include/procinfo/ |
H A D | process.h | 44 uid_t uid; member in struct:android::procinfo::ProcessInfo
|
/system/core/logd/ |
H A D | libaudit.h | 39 uid_t uid; member in struct:audit_sig_info
|
H A D | LogCommand.cpp | 60 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid) { argument 61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { 119 if ((uid == u[0]) && (uid == u[1]) && (uid == u[2]) && 120 (uid == u[3])) {
|
/system/extras/ext4_utils/ |
H A D | contents.h | 30 u16 uid; member in struct:dentry 42 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|
/system/netd/server/binder/android/net/ |
H A D | UidRange.cpp | 70 void UidRange::setStart(int32_t uid) { argument 72 ALOG_ASSERT(uid <= mStop, "start UID must be less than or equal to stop UID"); 74 mStart = uid; 77 void UidRange::setStop(int32_t uid) { argument 79 ALOG_ASSERT(mStart <= uid, "stop UID must be greater than or equal to start UID"); 81 mStop = uid;
|
/system/security/keystore/ |
H A D | keystore_utils.cpp | 91 uid_t get_app_id(uid_t uid) { argument 92 return uid % AID_USER; 95 uid_t get_user_id(uid_t uid) { argument 96 return uid / AID_USER;
|
H A D | keystore_cli.cpp | 102 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 105 int uid = -1; \ 107 uid = atoi(argv[3]); \ 108 fprintf(stderr, "Running as uid %d\n", uid); \ 110 int32_t ret = service->cmd(String16(argv[2]), uid); \ 125 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 129 int uid = -1; \ 131 uid = atoi(argv[3]); \ 132 fprintf(stderr, "Running as uid 193 list(const sp<IKeystoreService>& service, const String16& name, int uid) argument [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 21 int SoftGateKeeperDevice::enroll(uint32_t uid, argument 54 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 71 int SoftGateKeeperDevice::verify(uint32_t uid, argument 88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
|
H A D | IGateKeeperService.cpp | 34 uint32_t uid = data.readInt32(); local 53 int ret = enroll(uid, currentPasswordHandle, currentPasswordHandleSize, 77 uint32_t uid = data.readInt32(); local 89 int ret = verify(uid, (uint8_t *) currentPasswordHandle, 109 uint32_t uid = data.readInt32(); local 125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle, 148 uint32_t uid = data.readInt32(); local 149 uint64_t sid = getSecureUserId(uid); 156 uint32_t uid = data.readInt32(); local 157 clearSecureUserId(uid); [all...] |
/system/core/healthd/ |
H A D | BatteryPropertiesRegistrar.cpp | 97 const int uid = self->getCallingUid(); local 98 if ((uid != AID_SHELL) && 100 String16("android.permission.DUMP"), pid, uid))
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
H A D | target.h | 28 uid_t uid; member in struct:perf_target
|
/system/extras/su/ |
H A D | su.cpp | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument 33 if (uid) *uid = pw->pw_uid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 40 if (uid) *uid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 102 uid_t uid local [all...] |