/system/core/libcutils/include/private/ |
H A D | fs_config.h | 45 uint16_t uid; member in struct:fs_path_config_from_file 53 unsigned uid; member in struct:fs_path_config 73 void fs_config(const char* path, int dir, const char* target_out_path, unsigned* uid, unsigned* gid,
|
/system/core/liblog/ |
H A D | log_event_write.c | 28 int32_t uid, const char* data, 39 ret = android_log_write_int32(ctx, uid); 27 __android_log_error_write(int tag, const char* subTag, int32_t uid, const char* data, uint32_t dataLen) argument
|
/system/core/libsysutils/src/ |
H A D | NetlinkListener.cpp | 50 uid_t uid = -1; local 58 mBuffer, sizeof(mBuffer), require_group, &uid));
|
/system/core/init/ |
H A D | init_parser_test.cpp | 51 args.push_back("root"); // uid. 61 static void Test_make_exec_oneshot_service(bool dash_dash, bool seclabel, bool uid, argument 68 if (uid) { 69 args.push_back("log"); // uid 92 if (uid) { 96 ASSERT_EQ(decoded_uid, svc->uid()); 98 ASSERT_EQ(0U, svc->uid());
|
H A D | descriptors.h | 30 DescriptorInfo(const std::string& name, const std::string& type, uid_t uid, 43 uid_t uid() const { return uid_; } function in class:android::init::DescriptorInfo 64 SocketInfo(const std::string& name, const std::string& type, uid_t uid, 74 FileInfo(const std::string& name, const std::string& type, uid_t uid,
|
/system/core/libbinderwrapper/include/binderwrapper/ |
H A D | stub_binder_wrapper.h | 80 void set_calling_uid(uid_t uid) { calling_uid_ = uid; } argument
|
/system/core/libcutils/ |
H A D | multiuser.c | 20 userid_t multiuser_get_user_id(uid_t uid) { argument 21 return uid / AID_USER_OFFSET; 24 appid_t multiuser_get_app_id(uid_t uid) { argument 25 return uid % AID_USER_OFFSET; 64 gid_t multiuser_get_shared_app_gid(uid_t uid) { argument 65 return multiuser_get_shared_gid(multiuser_get_user_id(uid), multiuser_get_app_id(uid));
|
H A D | uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) argument 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) argument 67 *uid = -1; 80 *uid = cred->uid; [all...] |
/system/core/libpackagelistparser/include/packagelistparser/ |
H A D | packagelistparser.h | 50 uid_t uid; member in struct:pkg_info
|
/system/core/logd/ |
H A D | libaudit.h | 39 uid_t uid; member in struct:audit_sig_info
|
H A D | LogCommand.cpp | 60 bool clientHasLogCredentials(uid_t uid, gid_t gid, pid_t pid) { argument 61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { 119 if ((uid == u[0]) && (uid == u[1]) && (uid == u[2]) && 120 (uid == u[3])) {
|
H A D | LogListener.cpp | 81 cred->uid = DEFAULT_OVERFLOWUID; 84 if (cred->uid == AID_LOGD) { 100 !clientHasLogCredentials(cred->uid, cred->gid, cred->pid))) { 115 if (cred->uid == DEFAULT_OVERFLOWUID) { 116 uid_t uid = local 118 if (uid == AID_LOGD) { 119 uid = logbuf ? logbuf->pidToUid(header->tid) 122 if (uid != AID_LOGD) cred->uid = uid; [all...] |
H A D | LogWhiteBlackList.cpp | 26 Prune::Prune(uid_t uid, pid_t pid) : mUid(uid), mPid(pid) { argument 29 int Prune::cmp(uid_t uid, pid_t pid) const { argument 30 if ((mUid == uid_all) || (mUid == uid)) { 36 return uid - mUid; 157 uid_t uid = Prune::uid_all; local 159 uid = 0; 161 uid = uid * 10 + *str++ - '0'; 176 if ((uid [all...] |
/system/extras/ext4_utils/ |
H A D | contents.h | 30 u16 uid; member in struct:dentry 42 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|
/system/netd/server/binder/android/net/ |
H A D | UidRange.cpp | 70 void UidRange::setStart(int32_t uid) { argument 72 ALOG_ASSERT(uid <= mStop, "start UID must be less than or equal to stop UID"); 74 mStart = uid; 77 void UidRange::setStop(int32_t uid) { argument 79 ALOG_ASSERT(mStart <= uid, "stop UID must be greater than or equal to start UID"); 81 mStop = uid;
|
/system/security/keystore/ |
H A D | keystore_utils.cpp | 90 uid_t get_app_id(uid_t uid) { argument 91 return uid % AID_USER; 94 uid_t get_user_id(uid_t uid) { argument 95 return uid / AID_USER;
|
H A D | keystore_cli.cpp | 102 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 105 int uid = -1; \ 107 uid = atoi(argv[3]); \ 108 fprintf(stderr, "Running as uid %d\n", uid); \ 110 int32_t ret = service->cmd(String16(argv[2]), uid); \ 125 fprintf(stderr, "Usage: %s " #cmd " <name> <uid>\n", argv[0]); \ 129 int uid = -1; \ 131 uid = atoi(argv[3]); \ 132 fprintf(stderr, "Running as uid 193 list(const sp<IKeystoreService>& service, const String16& name, int uid) argument [all...] |
/system/core/gatekeeperd/ |
H A D | SoftGateKeeperDevice.cpp | 21 int SoftGateKeeperDevice::enroll(uint32_t uid, argument 54 EnrollRequest request(uid, ¤t_password_handle_buffer, &desired_password_buffer, 71 int SoftGateKeeperDevice::verify(uint32_t uid, argument 88 VerifyRequest request(uid, challenge, &password_handle_buffer, &provided_password_buffer);
|
H A D | IGateKeeperService.cpp | 34 uint32_t uid = data.readInt32(); local 53 int ret = enroll(uid, currentPasswordHandle, currentPasswordHandleSize, 77 uint32_t uid = data.readInt32(); local 89 int ret = verify(uid, (uint8_t *) currentPasswordHandle, 109 uint32_t uid = data.readInt32(); local 125 int ret = verifyChallenge(uid, challenge, (uint8_t *) currentPasswordHandle, 148 uint32_t uid = data.readInt32(); local 149 uint64_t sid = getSecureUserId(uid); 156 uint32_t uid = data.readInt32(); local 157 clearSecureUserId(uid); [all...] |
/system/core/healthd/ |
H A D | BatteryPropertiesRegistrar.cpp | 97 const int uid = self->getCallingUid(); local 98 if ((uid != AID_SHELL) && 100 String16("android.permission.DUMP"), pid, uid))
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
H A D | target.h | 28 uid_t uid; member in struct:perf_target
|
/system/extras/su/ |
H A D | su.cpp | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { argument 33 if (uid) *uid = pw->pw_uid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 40 if (uid) *uid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { argument 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 102 uid_t uid local [all...] |
/system/core/libprocinfo/include/procinfo/ |
H A D | process.h | 54 uid_t uid; member in struct:android::procinfo::ProcessInfo
|
/system/core/run-as/ |
H A D | run-as.cpp | 68 static bool check_directory(const char* path, uid_t uid) { argument 78 // Must be owned by specific uid/gid. 79 if (st.st_uid != uid || st.st_gid != uid) return false; 91 static bool check_data_path(const char* data_path, uid_t uid) { argument 126 // directory is owned by the application uid. 127 return check_directory(data_path, uid); 133 error(1, 0, "usage: run-as <package-name> [--user <uid>] <command> [<args>]\n"); 162 if (info.uid == 0) { 168 if ((UID_MAX - info.uid) / AID_USER_OFFSE 192 uid_t uid = userAppId; local [all...] |
/system/core/storaged/ |
H A D | storaged_service.cpp | 46 for (auto&& uid : res) { 47 uid.uid = reply.readInt32(); 48 uid.name = reply.readCString(); 49 reply.read(&uid.io, sizeof(uid.io)); 62 for (auto uid : res) { 63 reply->writeInt32(uid.uid); 64 reply->writeCString(uid 88 const int uid = self->getCallingUid(); local [all...] |