/system/core/libcutils/ |
D | fs_config.c | 79 { 00500, AID_ROOT, AID_ROOT, 0, "config" }, 83 { 00771, AID_ROOT, AID_ROOT, 0, "data/dalvik-cache" }, 92 { 00750, AID_ROOT, AID_SHELL, 0, "data/nativetest" }, 93 { 00750, AID_ROOT, AID_SHELL, 0, "data/nativetest64" }, 94 { 00775, AID_ROOT, AID_ROOT, 0, "data/preloads" }, 96 { 00755, AID_ROOT, AID_SYSTEM, 0, "mnt" }, 97 { 00755, AID_ROOT, AID_ROOT, 0, "root" }, 98 { 00750, AID_ROOT, AID_SHELL, 0, "sbin" }, 99 { 00751, AID_ROOT, AID_SDCARD_R, 0, "storage" }, 100 { 00755, AID_ROOT, AID_SHELL, 0, "system/bin" }, [all …]
|
D | sockets_unix.cpp | 42 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { in socket_peer_is_trusted()
|
/system/vold/ |
D | EmulatedVolume.cpp | 71 if (fs_prepare_dir(mFuseDefault.c_str(), 0700, AID_ROOT, AID_ROOT) || in doMount() 72 fs_prepare_dir(mFuseRead.c_str(), 0700, AID_ROOT, AID_ROOT) || in doMount() 73 fs_prepare_dir(mFuseWrite.c_str(), 0700, AID_ROOT, AID_ROOT)) { in doMount()
|
D | PublicVolume.cpp | 126 if (fs_prepare_dir(mRawPath.c_str(), 0700, AID_ROOT, AID_ROOT)) { in doMount() 146 if (fs_prepare_dir(mFuseDefault.c_str(), 0700, AID_ROOT, AID_ROOT) || in doMount() 147 fs_prepare_dir(mFuseRead.c_str(), 0700, AID_ROOT, AID_ROOT) || in doMount() 148 fs_prepare_dir(mFuseWrite.c_str(), 0700, AID_ROOT, AID_ROOT)) { in doMount()
|
D | Benchmark.cpp | 142 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) { in BenchmarkPrivate() 146 if (android::vold::PrepareDir(benchPath, 0700, AID_ROOT, AID_ROOT)) { in BenchmarkPrivate()
|
D | PrivateVolume.cpp | 102 if (PrepareDir(mPath, 0700, AID_ROOT, AID_ROOT)) { in doMount() 148 PrepareDir(mPath + "/local", 0751, AID_ROOT, AID_ROOT) || in doMount()
|
D | Ext4Crypt.cpp | 343 if (!prepare_dir(directory_path, 0700, AID_ROOT, AID_ROOT)) return false; in create_and_install_user_keys() 475 if (!prepare_dir(user_key_dir, 0700, AID_ROOT, AID_ROOT)) return false; in e4crypt_init_user0() 476 if (!prepare_dir(user_key_dir + "/ce", 0700, AID_ROOT, AID_ROOT)) return false; in e4crypt_init_user0() 477 if (!prepare_dir(user_key_dir + "/de", 0700, AID_ROOT, AID_ROOT)) return false; in e4crypt_init_user0()
|
D | VolumeManager.cpp | 425 fs_prepare_dir(source.c_str(), 0755, AID_ROOT, AID_ROOT); in linkPrimary() 458 fs_prepare_dir(path.c_str(), 0755, AID_ROOT, AID_ROOT); in onUserStarted()
|
/system/core/logd/ |
D | LogCommand.cpp | 61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { in clientHasLogCredentials() 65 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) { in clientHasLogCredentials()
|
D | LogBuffer.h | 118 bool clear(log_id_t id, uid_t uid = AID_ROOT); 145 bool prune(log_id_t id, unsigned long pruneRows, uid_t uid = AID_ROOT);
|
D | CommandListener.cpp | 86 uid = AID_ROOT; in runCommand() 209 uid = AID_ROOT; in runCommand()
|
D | LogStatistics.cpp | 507 name = (uid == AID_ROOT) in format() 514 name = ((uid == AID_ROOT) && !pid) in format()
|
D | LogBuffer.cpp | 513 if (caller_uid != AID_ROOT) { in prune() 558 AID_ROOT, (pid_t)0, 2, id); in prune()
|
D | LogStatistics.h | 63 if ((uid != AID_ROOT) && (uid != entry.getUid())) { in sort()
|
D | LogKlog.cpp | 618 uid_t uid = AID_ROOT; in log()
|
/system/core/include/private/ |
D | android_filesystem_config.h | 41 #define AID_ROOT 0 /* traditional unix root user */ macro 154 { "root", AID_ROOT, },
|
/system/security/keystore/ |
D | permissions.cpp | 42 {AID_VPN, AID_SYSTEM}, {AID_WIFI, AID_SYSTEM}, {AID_ROOT, AID_SYSTEM}, 54 {AID_ROOT, static_cast<perm_t>(P_GET)},
|
/system/core/liblog/ |
D | logger_write.c | 58 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions() 60 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions() 63 (gid != AID_ROOT) && in check_log_uid_permissions() 67 (gid != AID_ROOT) && in check_log_uid_permissions()
|
D | logd_reader.c | 413 return ((uid != AID_ROOT) && (uid != AID_LOG) && (uid != AID_SYSTEM)) ? 3 : 4; in logdVersion()
|
D | pmsg_reader.c | 73 return (uid == AID_SYSTEM) || (uid == AID_LOG) || (uid == AID_ROOT); in uid_has_log_permission()
|
/system/extras/su/ |
D | su.c | 85 if (current_uid != AID_ROOT && current_uid != AID_SHELL) error(1, 0, "not allowed"); in main()
|
/system/core/run-as/ |
D | run-as.c | 126 if (myuid != AID_SHELL && myuid != AID_ROOT) { in main()
|
/system/core/liblog/tests/ |
D | liblog_test.cpp | 387 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG) in TEST() 388 && (gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in TEST() 390 if ((euid != AID_SYSTEM) && (euid != AID_ROOT) && (euid != AID_LOG)) { in TEST() 392 if ((egid != AID_SYSTEM) && (egid != AID_ROOT) && (egid != AID_LOG)) { in TEST()
|
/system/core/crash_reporter/ |
D | user_collector.cc | 93 gid_t groups[] = { AID_ROOT, AID_SYSTEM, AID_DBUS, AID_READPROC }; in Initialize()
|
/system/core/init/ |
D | devices.cpp | 268 setegid(AID_ROOT); in make_device()
|