/system/extras/su/ |
D | su.c | 35 void pwtoid(const char *tok, uid_t *uid, gid_t *gid) in pwtoid() argument 40 if (uid) *uid = pw->pw_uid; in pwtoid() 44 if (uid) *uid = tmpid; in pwtoid() 49 void extract_uidgids(const char *uidgids, uid_t *uid, gid_t *gid, gid_t *gids, in extract_uidgids() argument 58 *gid = *uid = 0; in extract_uidgids() 66 pwtoid(tok, uid, gid); in extract_uidgids() 105 uid_t uid, myuid; in main() local 116 uid = gid = 0; in main() 119 extract_uidgids(argv[1], &uid, &gid, gids, &gids_count); in main() 128 if(setgid(gid) || setuid(uid)) { in main()
|
/system/core/run-as/ |
D | run-as.c | 106 int myuid, uid, gid; in main() local 127 if (info.uid < AID_APP) { in main() 139 if (check_data_path(info.dataDir, info.uid) < 0) { in main() 160 uid = gid = info.uid; in main() 161 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { in main() 166 if (selinux_android_setcontext(uid, 0, info.seinfo, pkgname) < 0) { in main()
|
D | package.c | 168 check_directory_ownership(const char* path, uid_t uid) in check_directory_ownership() argument 185 if (st.st_uid != uid || st.st_gid != uid) in check_directory_ownership() 208 check_data_path(const char* dataPath, uid_t uid) in check_data_path() argument 261 if (check_directory_ownership(dataPath, uid) < 0) in check_data_path() 432 info->uid = 0; in get_package_info() 463 int uid, debugFlag; in get_package_info() local 475 uid = parse_positive_decimal(&p, end); in get_package_info() 476 if (uid < 0) in get_package_info() 479 info->uid = (uid_t) uid; in get_package_info()
|
D | package.h | 30 uid_t uid; member 40 extern int check_data_path(const char* dataDir, uid_t uid);
|
/system/core/libcutils/ |
D | qtaguid.c | 99 int qtaguid_tagSocket(int sockfd, int tag, uid_t uid) { in qtaguid_tagSocket() argument 106 snprintf(lineBuf, sizeof(lineBuf), "t %d %llu %d", sockfd, kTag, uid); in qtaguid_tagSocket() 108 ALOGV("Tagging socket %d with tag %llx{%u,0} for uid %d", sockfd, kTag, tag, uid); in qtaguid_tagSocket() 113 sockfd, kTag, tag, uid, res); in qtaguid_tagSocket() 134 int qtaguid_setCounterSet(int counterSetNum, uid_t uid) { in qtaguid_setCounterSet() argument 138 ALOGV("Setting counters to set %d for uid %d", counterSetNum, uid); in qtaguid_setCounterSet() 140 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid); in qtaguid_setCounterSet() 145 int qtaguid_deleteTagData(int tag, uid_t uid) { in qtaguid_deleteTagData() argument 150 ALOGV("Deleting tag data with tag %llx{%d,0} for uid %d", kTag, tag, uid); in qtaguid_deleteTagData() 154 snprintf(lineBuf, sizeof(lineBuf), "d %llu %d", kTag, uid); in qtaguid_deleteTagData() [all …]
|
D | multiuser.c | 19 userid_t multiuser_get_user_id(uid_t uid) { in multiuser_get_user_id() argument 20 return uid / MULTIUSER_APP_PER_USER_RANGE; in multiuser_get_user_id() 23 appid_t multiuser_get_app_id(uid_t uid) { in multiuser_get_app_id() argument 24 return uid % MULTIUSER_APP_PER_USER_RANGE; in multiuser_get_app_id()
|
D | sockets.c | 37 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { in socket_peer_is_trusted() 38 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid); in socket_peer_is_trusted()
|
D | fs.c | 34 int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid) { in fs_prepare_dir() argument 51 if (((sb.st_mode & ALL_PERMS) == mode) && (sb.st_uid == uid) && (sb.st_gid == gid)) { in fs_prepare_dir() 70 if (TEMP_FAILURE_RETRY(chown(path, uid, gid)) == -1) { in fs_prepare_dir() 71 ALOGE("Failed to chown(%s, %d, %d): %s", path, uid, gid, strerror(errno)); in fs_prepare_dir()
|
/system/extras/tests/fstest/ |
D | perm_checker.c | 200 static void print_new_rule(const char *name, mode_t mode, uid_t uid, gid_t gid) in print_new_rule() argument 205 pw = getpwuid(uid); in print_new_rule() 206 printf("%s %4o %4o %s %d %s %d\n", name, mode, mode, pw->pw_name, uid, in print_new_rule() 211 static int pass_rule(const perm_rule_t *pr, mode_t mode, uid_t uid, gid_t gid) in pass_rule() argument 216 (pr->min_uid <= uid) && (pr->max_uid >= uid)) in pass_rule() 223 static int validate_file(const char *name, mode_t mode, uid_t uid, gid_t gid) in validate_file() argument 232 if (!pass_rule(pr, mode, uid, gid)) in validate_file() 245 print_new_rule(name, mode, uid, gid); in validate_file() 255 if (!pass_rule(pr, mode, uid, gid)) in validate_file() 266 if (!pass_rule(pr, mode, uid, gid)) in validate_file() [all …]
|
/system/core/libsysutils/src/ |
D | NetlinkListener.cpp | 48 uid_t uid = -1; in onDataAvailable() local 51 socket, mBuffer, sizeof(mBuffer), &uid)); in onDataAvailable() 53 if (uid > 0) in onDataAvailable() 54 LOG_EVENT_INT(65537, uid); in onDataAvailable()
|
/system/core/include/cutils/ |
D | qtaguid.h | 31 extern int qtaguid_tagSocket(int sockfd, int tag, uid_t uid); 43 extern int qtaguid_setCounterSet(int counterSetNum, uid_t uid); 54 extern int qtaguid_deleteTagData(int tag, uid_t uid);
|
D | multiuser.h | 33 extern userid_t multiuser_get_user_id(uid_t uid); 34 extern appid_t multiuser_get_app_id(uid_t uid);
|
/system/core/toolbox/ |
D | id.c | 9 static void print_uid(uid_t uid) in print_uid() argument 11 struct passwd *pw = getpwuid(uid); in print_uid() 14 printf("%d(%s)", uid, pw->pw_name); in print_uid() 16 printf("%d",uid); in print_uid()
|
D | chown.c | 36 uid_t uid; in chown_main() local 41 uid = pw->pw_uid; in chown_main() 44 uid = (int) strtoul(user, &endptr, 0); in chown_main() 66 if (chown(argv[i], uid, gid) < 0) { in chown_main()
|
/system/core/init/ |
D | property_service.c | 62 unsigned int uid; member 105 unsigned int uid; member 249 static int check_control_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) { in check_control_perms() argument 252 if (uid == AID_SYSTEM || uid == AID_ROOT) in check_control_perms() 258 if ((uid && control_perms[i].uid == uid) || in check_control_perms() 271 static int check_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx) in check_perms() argument 279 if (uid == 0) in check_perms() 282 app_id = multiuser_get_app_id(uid); in check_perms() 284 uid = app_id; in check_perms() 290 if ((uid && property_perms[i].uid == uid) || in check_perms() [all …]
|
D | ueventd.c | 116 uid_t uid; in set_device_permission() local 170 uid = ret; in set_device_permission() 180 add_dev_perms(name, attr, perm, uid, gid, prefix); in set_device_permission()
|
D | devices.c | 74 unsigned int uid; member 96 mode_t perm, unsigned int uid, unsigned int gid, in add_dev_perms() argument 113 node->dp.uid = uid; in add_dev_perms() 148 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); in fixup_sys_perms() 149 chown(buf, dp->uid, dp->gid); in fixup_sys_perms() 154 static mode_t get_device_perm(const char *path, unsigned *uid, unsigned *gid) in get_device_perm() argument 175 *uid = dp->uid; in get_device_perm() 180 *uid = 0; in get_device_perm() 189 unsigned uid; in make_device() local 195 mode = get_device_perm(path, &uid, &gid) | (block ? S_IFBLK : S_IFCHR); in make_device() [all …]
|
/system/security/keystore/include/keystore/ |
D | IKeystoreService.h | 63 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid, 66 virtual int32_t del(const String16& name, int uid) = 0; 68 virtual int32_t exist(const String16& name, int uid) = 0; 70 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) = 0; 82 virtual int32_t generate(const String16& name, int uid, int32_t flags) = 0; 84 virtual int32_t import(const String16& name, const uint8_t* data, size_t length, int uid, 95 virtual int32_t del_key(const String16& name, int uid) = 0; 108 virtual int32_t clear_uid(int64_t uid) = 0;
|
/system/security/keystore/ |
D | keystore.cpp | 145 uid_t uid; member 154 uid_t uid; member 170 static uid_t get_app_id(uid_t uid) { in get_app_id() argument 171 return uid % AID_USER; in get_app_id() 178 static uid_t get_user_id(uid_t uid) { in get_user_id() argument 179 return uid / AID_USER; in get_user_id() 183 static bool has_permission(uid_t uid, perm_t perm) { in has_permission() argument 185 if (get_app_id(uid) == AID_SYSTEM) { in has_permission() 186 uid = AID_SYSTEM; in has_permission() 191 if (user.uid == uid) { in has_permission() [all …]
|
D | IKeystoreService.cpp | 92 virtual int32_t insert(const String16& name, const uint8_t* item, size_t itemLength, int uid, in insert() argument 101 data.writeInt32(uid); in insert() 117 virtual int32_t del(const String16& name, int uid) in del() argument 122 data.writeInt32(uid); in del() 137 virtual int32_t exist(const String16& name, int uid) in exist() argument 142 data.writeInt32(uid); in exist() 157 virtual int32_t saw(const String16& name, int uid, Vector<String16>* matches) in saw() argument 162 data.writeInt32(uid); in saw() 273 virtual int32_t generate(const String16& name, int uid, int32_t flags) in generate() argument 278 data.writeInt32(uid); in generate() [all …]
|
D | keystore_cli.cpp | 86 int uid = -1; \ 88 uid = atoi(argv[3]); \ 89 fprintf(stderr, "Running as uid %d\n", uid); \ 91 int32_t ret = service->cmd(String16(argv[2]), uid); \ 148 static int saw(sp<IKeystoreService> service, const String16& name, int uid) { in saw() argument 150 int32_t ret = service->saw(name, uid, &matches); in saw()
|
/system/core/logcat/ |
D | event.logtags | 138 80100 bionic_event_memcpy_buffer_overflow (uid|1) 139 80105 bionic_event_strcat_buffer_overflow (uid|1) 140 80110 bionic_event_memmov_buffer_overflow (uid|1) 141 80115 bionic_event_strncat_buffer_overflow (uid|1) 142 80120 bionic_event_strncpy_buffer_overflow (uid|1) 143 80125 bionic_event_memset_buffer_overflow (uid|1) 144 80130 bionic_event_strcpy_buffer_overflow (uid|1) 146 80200 bionic_event_strcat_integer_overflow (uid|1) 147 80205 bionic_event_strncat_integer_overflow (uid|1) 149 80300 bionic_event_resolver_old_response (uid|1) [all …]
|
/system/core/debuggerd/ |
D | debuggerd.c | 54 uid_t uid, gid; member 206 LOG("timed out reading tid (from pid=%d uid=%d)\n", cr.pid, cr.uid); in read_request() 215 strerror(errno), cr.pid, cr.uid); in read_request() 222 status, cr.pid, cr.uid); in read_request() 229 out_request->uid = cr.uid; in read_request() 243 } else if (cr.uid == 0 in read_request() 244 || (cr.uid == AID_SYSTEM && msg.action == DEBUGGER_ACTION_DUMP_BACKTRACE)) { in read_request() 248 &out_request->uid, &out_request->gid); in read_request() 266 return debug_uid >= 0 && request->uid <= (uid_t)debug_uid; in should_attach_gdb() 279 request.pid, request.uid, request.gid, request.tid); in handle_request()
|
/system/core/include/private/ |
D | android_filesystem_config.h | 162 unsigned uid; member 250 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) in fs_config() argument 275 *uid = pc->uid; in fs_config() 282 path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode); in fs_config()
|
/system/extras/ext4_utils/ |
D | contents.h | 28 u16 uid; member 40 int inode_set_permissions(u32 inode_num, u16 mode, u16 uid, u16 gid, u32 mtime);
|