Home
last modified time | relevance | path

Searched refs:AID_SYSTEM (Results 1 – 25 of 30) sorted by relevance

12

/system/core/libcutils/
Dfs_config.c66 { 00770, AID_SYSTEM, AID_CACHE, 0, "cache" },
68 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app" },
69 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-private" },
70 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral" },
72 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/data" },
77 { 01771, AID_SYSTEM, AID_MISC, 0, "data/misc" },
83 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data" },
84 { 00755, AID_ROOT, AID_SYSTEM, 0, "mnt" },
129 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app/*" },
130 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral/*" },
[all …]
/system/security/keystore/
Dpermissions.cpp58 {AID_VPN, AID_SYSTEM}, {AID_WIFI, AID_SYSTEM}, {AID_ROOT, AID_SYSTEM},
68 {AID_SYSTEM, static_cast<perm_t>((uint32_t)(~0))},
162 if (get_app_id(uid) == AID_SYSTEM) { in has_permission()
163 uid = AID_SYSTEM; in has_permission()
Dkey_store_service.cpp666 if (get_app_id(targetUid) == AID_SYSTEM) { in clear_uid()
702 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in generateKey()
862 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in importKey()
1016 if (!pruneable && get_app_id(callingUid) != AID_SYSTEM) { in begin()
1562 return getEffectiveUid(targetUid) == callingUid || callingUid == AID_SYSTEM; in checkBinderPermissionSelfOrSystem()
/system/vold/
DPrivateVolume.cpp143 if (PrepareDir(mPath + "/app", 0771, AID_SYSTEM, AID_SYSTEM) || in doMount()
144 PrepareDir(mPath + "/user", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount()
145 PrepareDir(mPath + "/user_de", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount()
DExt4Crypt.cpp735 if (!prepare_dir(system_legacy_path, 0700, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
737 if (!prepare_dir(misc_legacy_path, 0750, multiuser_get_uid(user_id, AID_SYSTEM), in e4crypt_prepare_user_storage()
740 if (!prepare_dir(profiles_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
742 if (!prepare_dir(system_de_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
743 if (!prepare_dir(misc_de_path, 01771, AID_SYSTEM, AID_MISC)) return false; in e4crypt_prepare_user_storage()
744 if (!prepare_dir(user_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
763 if (!prepare_dir(system_ce_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
764 if (!prepare_dir(misc_ce_path, 01771, AID_SYSTEM, AID_MISC)) return false; in e4crypt_prepare_user_storage()
766 if (!prepare_dir(user_ce_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
DBenchmark.cpp138 if (android::vold::PrepareDir(benchPath, 01771, AID_SYSTEM, AID_MISC)) { in BenchmarkPrivate()
DCommandListener.cpp601 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) { in runCommand()
709 if (sb.st_uid != AID_SYSTEM) { in runCommandInNamespace()
710 LOG(ERROR) << "Only system can mount appfuse. UID expected=" << AID_SYSTEM in runCommandInNamespace()
DCryptCommandListener.cpp175 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) { in runCommand()
/system/core/logd/
DFlushCommand.cpp107 return (client->getUid() == AID_SYSTEM) || (client->getGid() == AID_SYSTEM); in clientHasSecurityCredentials()
DLogCommand.cpp61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { in clientHasLogCredentials()
65 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) { in clientHasLogCredentials()
DLogStatistics.cpp97 if (element->getUid() == AID_SYSTEM) { in add()
132 if (element->getUid() == AID_SYSTEM) { in subtract()
162 if (element->getUid() == AID_SYSTEM) { in drop()
320 if (uid != AID_SYSTEM) { in format()
DREADME.property43 (1000, or AID_SYSTEM).
73 (system or AID_SYSTEM).
Dmain.cpp251 (void)setgid(AID_SYSTEM); // readonly access to /data/system/packages.list in reinit_thread_start()
/system/core/libprocessgroup/
Dprocessgroup.cpp343 if (!mkdirAndChown(path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup()
350 if (!mkdirAndChown(path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup()
/system/core/trusty/storage/proxy/
Dproxy.c69 if (setgid(AID_SYSTEM) != 0) { in drop_privs()
73 if (setuid(AID_SYSTEM) != 0) { in drop_privs()
/system/core/liblog/
Dlogger_write.c59 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions()
61 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions()
63 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions()
65 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions()
Dlogger.h184 return AID_SYSTEM; in __android_log_uid()
Dlogd_reader.c98 if (uid != AID_SYSTEM) { in logdAvailable()
403 return ((uid != AID_ROOT) && (uid != AID_LOG) && (uid != AID_SYSTEM)) ? 3 : 4; in logdVersion()
/system/core/include/private/
Dandroid_filesystem_config.h70 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/libcutils/include/private/
Dandroid_filesystem_config.h70 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/debuggerd/libdebuggerd/
Dtombstone.cpp704 fchown(fd, AID_SYSTEM, AID_SYSTEM); in open_tombstone()
724 fchown(fd, AID_SYSTEM, AID_SYSTEM); in open_tombstone()
/system/core/run-as/
Drun-as.cpp122 if (!check_directory(subpath, AID_SYSTEM)) return false; in check_data_path()
/system/core/init/
Dreboot.cpp314 S_IRUSR | S_IWUSR, AID_SYSTEM, AID_SYSTEM); in DoReboot()
/system/core/debuggerd/
Dcrash_dump.cpp417 if (target_info.name != "system_server" || target_info.uid != AID_SYSTEM) { in main()
/system/core/liblog/tests/
Dliblog_test.cpp1994 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG) && in TEST()
1995 (gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in TEST()
1997 if ((euid != AID_SYSTEM) && (euid != AID_ROOT) && (euid != AID_LOG)) { in TEST()
1999 if ((egid != AID_SYSTEM) && (egid != AID_ROOT) && (egid != AID_LOG)) { in TEST()
2033 EXPECT_EQ(0, setuid(AID_SYSTEM)); // only one that can read security buffer in TEST()
2086 bool clientHasSecurityCredentials = (uid == AID_SYSTEM) || (gid == AID_SYSTEM); in TEST()

12