/system/core/libcutils/ |
D | fs_config.c | 66 { 00770, AID_SYSTEM, AID_CACHE, 0, "cache" }, 68 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app" }, 69 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-private" }, 70 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral" }, 72 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/data" }, 77 { 01771, AID_SYSTEM, AID_MISC, 0, "data/misc" }, 83 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data" }, 84 { 00755, AID_ROOT, AID_SYSTEM, 0, "mnt" }, 129 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app/*" }, 130 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral/*" }, [all …]
|
/system/security/keystore/ |
D | permissions.cpp | 58 {AID_VPN, AID_SYSTEM}, {AID_WIFI, AID_SYSTEM}, {AID_ROOT, AID_SYSTEM}, 68 {AID_SYSTEM, static_cast<perm_t>((uint32_t)(~0))}, 162 if (get_app_id(uid) == AID_SYSTEM) { in has_permission() 163 uid = AID_SYSTEM; in has_permission()
|
D | key_store_service.cpp | 666 if (get_app_id(targetUid) == AID_SYSTEM) { in clear_uid() 702 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in generateKey() 862 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in importKey() 1016 if (!pruneable && get_app_id(callingUid) != AID_SYSTEM) { in begin() 1562 return getEffectiveUid(targetUid) == callingUid || callingUid == AID_SYSTEM; in checkBinderPermissionSelfOrSystem()
|
/system/vold/ |
D | PrivateVolume.cpp | 143 if (PrepareDir(mPath + "/app", 0771, AID_SYSTEM, AID_SYSTEM) || in doMount() 144 PrepareDir(mPath + "/user", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount() 145 PrepareDir(mPath + "/user_de", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount()
|
D | Ext4Crypt.cpp | 735 if (!prepare_dir(system_legacy_path, 0700, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage() 737 if (!prepare_dir(misc_legacy_path, 0750, multiuser_get_uid(user_id, AID_SYSTEM), in e4crypt_prepare_user_storage() 740 if (!prepare_dir(profiles_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage() 742 if (!prepare_dir(system_de_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage() 743 if (!prepare_dir(misc_de_path, 01771, AID_SYSTEM, AID_MISC)) return false; in e4crypt_prepare_user_storage() 744 if (!prepare_dir(user_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage() 763 if (!prepare_dir(system_ce_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage() 764 if (!prepare_dir(misc_ce_path, 01771, AID_SYSTEM, AID_MISC)) return false; in e4crypt_prepare_user_storage() 766 if (!prepare_dir(user_ce_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in e4crypt_prepare_user_storage()
|
D | Benchmark.cpp | 138 if (android::vold::PrepareDir(benchPath, 01771, AID_SYSTEM, AID_MISC)) { in BenchmarkPrivate()
|
D | CommandListener.cpp | 601 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) { in runCommand() 709 if (sb.st_uid != AID_SYSTEM) { in runCommandInNamespace() 710 LOG(ERROR) << "Only system can mount appfuse. UID expected=" << AID_SYSTEM in runCommandInNamespace()
|
D | CryptCommandListener.cpp | 175 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) { in runCommand()
|
/system/core/logd/ |
D | FlushCommand.cpp | 107 return (client->getUid() == AID_SYSTEM) || (client->getGid() == AID_SYSTEM); in clientHasSecurityCredentials()
|
D | LogCommand.cpp | 61 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { in clientHasLogCredentials() 65 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) { in clientHasLogCredentials()
|
D | LogStatistics.cpp | 97 if (element->getUid() == AID_SYSTEM) { in add() 132 if (element->getUid() == AID_SYSTEM) { in subtract() 162 if (element->getUid() == AID_SYSTEM) { in drop() 320 if (uid != AID_SYSTEM) { in format()
|
D | README.property | 43 (1000, or AID_SYSTEM). 73 (system or AID_SYSTEM).
|
D | main.cpp | 251 (void)setgid(AID_SYSTEM); // readonly access to /data/system/packages.list in reinit_thread_start()
|
/system/core/libprocessgroup/ |
D | processgroup.cpp | 343 if (!mkdirAndChown(path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup() 350 if (!mkdirAndChown(path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup()
|
/system/core/trusty/storage/proxy/ |
D | proxy.c | 69 if (setgid(AID_SYSTEM) != 0) { in drop_privs() 73 if (setuid(AID_SYSTEM) != 0) { in drop_privs()
|
/system/core/liblog/ |
D | logger_write.c | 59 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions() 61 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions() 63 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions() 65 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions()
|
D | logger.h | 184 return AID_SYSTEM; in __android_log_uid()
|
D | logd_reader.c | 98 if (uid != AID_SYSTEM) { in logdAvailable() 403 return ((uid != AID_ROOT) && (uid != AID_LOG) && (uid != AID_SYSTEM)) ? 3 : 4; in logdVersion()
|
/system/core/include/private/ |
D | android_filesystem_config.h | 70 #define AID_SYSTEM 1000 /* system server */ macro
|
/system/core/libcutils/include/private/ |
D | android_filesystem_config.h | 70 #define AID_SYSTEM 1000 /* system server */ macro
|
/system/core/debuggerd/libdebuggerd/ |
D | tombstone.cpp | 704 fchown(fd, AID_SYSTEM, AID_SYSTEM); in open_tombstone() 724 fchown(fd, AID_SYSTEM, AID_SYSTEM); in open_tombstone()
|
/system/core/run-as/ |
D | run-as.cpp | 122 if (!check_directory(subpath, AID_SYSTEM)) return false; in check_data_path()
|
/system/core/init/ |
D | reboot.cpp | 314 S_IRUSR | S_IWUSR, AID_SYSTEM, AID_SYSTEM); in DoReboot()
|
/system/core/debuggerd/ |
D | crash_dump.cpp | 417 if (target_info.name != "system_server" || target_info.uid != AID_SYSTEM) { in main()
|
/system/core/liblog/tests/ |
D | liblog_test.cpp | 1994 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG) && in TEST() 1995 (gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in TEST() 1997 if ((euid != AID_SYSTEM) && (euid != AID_ROOT) && (euid != AID_LOG)) { in TEST() 1999 if ((egid != AID_SYSTEM) && (egid != AID_ROOT) && (egid != AID_LOG)) { in TEST() 2033 EXPECT_EQ(0, setuid(AID_SYSTEM)); // only one that can read security buffer in TEST() 2086 bool clientHasSecurityCredentials = (uid == AID_SYSTEM) || (gid == AID_SYSTEM); in TEST()
|