Home
last modified time | relevance | path

Searched refs:AID_SYSTEM (Results 1 – 25 of 31) sorted by relevance

12

/system/core/libcutils/
Dfs_config.cpp61 { 00770, AID_SYSTEM, AID_CACHE, 0, "cache" },
63 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app" },
64 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-private" },
65 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral" },
67 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/data" },
72 { 01771, AID_SYSTEM, AID_MISC, 0, "data/misc" },
80 { 00771, AID_SYSTEM, AID_SYSTEM, 0, "data" },
81 { 00755, AID_ROOT, AID_SYSTEM, 0, "mnt" },
141 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app/*" },
142 { 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app-ephemeral/*" },
[all …]
/system/bpfprogs/
Dtime_in_state.c20 DEFINE_BPF_MAP_GRW(uid_time_in_state_map, PERCPU_HASH, time_key_t, tis_val_t, 1024, AID_SYSTEM)
22 …_BPF_MAP_GRW(uid_concurrent_times_map, PERCPU_HASH, time_key_t, concurrent_val_t, 1024, AID_SYSTEM)
23 DEFINE_BPF_MAP_GRW(uid_last_update_map, HASH, uint32_t, uint64_t, 1024, AID_SYSTEM)
25 DEFINE_BPF_MAP_GWO(cpu_last_update_map, PERCPU_ARRAY, uint32_t, uint64_t, 1, AID_SYSTEM)
27 DEFINE_BPF_MAP_GWO(cpu_policy_map, ARRAY, uint32_t, uint32_t, 1024, AID_SYSTEM)
28 DEFINE_BPF_MAP_GWO(policy_freq_idx_map, ARRAY, uint32_t, uint8_t, 1024, AID_SYSTEM)
30 DEFINE_BPF_MAP_GWO(freq_to_idx_map, HASH, freq_idx_key_t, uint8_t, 2048, AID_SYSTEM)
32 DEFINE_BPF_MAP_GWO(nr_active_map, ARRAY, uint32_t, uint32_t, 1, AID_SYSTEM)
33 DEFINE_BPF_MAP_GWO(policy_nr_active_map, ARRAY, uint32_t, uint32_t, 1024, AID_SYSTEM)
46 DEFINE_BPF_PROG("tracepoint/sched/sched_switch", AID_ROOT, AID_SYSTEM, tp_sched_switch)
[all …]
/system/vold/
Dvold_prepare_subdirs.cpp141 if (!prepare_dir(sehandle, 0771, AID_ROOT, AID_SYSTEM, path + "/apexdata/" + name)) { in prepare_apex_subdirs()
162 if (!prepare_dir(sehandle, 0700, AID_SYSTEM, AID_SYSTEM, vendor_de_path + "/fpdata")) { in prepare_subdirs()
166 if (!prepare_dir(sehandle, 0700, AID_SYSTEM, AID_SYSTEM, facedata_path)) { in prepare_subdirs()
180 if (!prepare_dir(sehandle, 0700, AID_SYSTEM, AID_SYSTEM, system_ce_path + "/backup")) { in prepare_subdirs()
183 if (!prepare_dir(sehandle, 0700, AID_SYSTEM, AID_SYSTEM, in prepare_subdirs()
189 if (!prepare_dir(sehandle, 0700, AID_SYSTEM, AID_SYSTEM, facedata_path)) { in prepare_subdirs()
DFsCrypt.cpp818 if (!prepare_dir(system_legacy_path, 0700, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
820 if (!prepare_dir(misc_legacy_path, 0750, multiuser_get_uid(user_id, AID_SYSTEM), in fscrypt_prepare_user_storage()
824 if (!prepare_dir(profiles_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
826 if (!prepare_dir(system_de_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
827 if (!prepare_dir(misc_de_path, 01771, AID_SYSTEM, AID_MISC)) return false; in fscrypt_prepare_user_storage()
830 if (!prepare_dir(user_de_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
855 if (!prepare_dir(system_ce_path, 0770, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
856 if (!prepare_dir(misc_ce_path, 01771, AID_SYSTEM, AID_MISC)) return false; in fscrypt_prepare_user_storage()
860 if (!prepare_dir(user_ce_path, 0771, AID_SYSTEM, AID_SYSTEM)) return false; in fscrypt_prepare_user_storage()
DBenchmark.cpp96 if (android::vold::PrepareDir(path, 01771, AID_SYSTEM, AID_MISC)) { in benchmarkInternal()
/system/security/keystore/
Dpermissions.cpp57 user_euid user_euids[] = {{AID_VPN, AID_SYSTEM},
58 {AID_WIFI, AID_SYSTEM},
59 {AID_ROOT, AID_SYSTEM},
73 {AID_SYSTEM, static_cast<perm_t>((uint32_t)(~0))},
179 if (get_app_id(uid) == AID_SYSTEM) { in has_permission()
180 uid = AID_SYSTEM; in has_permission()
Dkey_store_service.cpp287 if (appId != AID_SYSTEM) { in listUidsOfAuthBoundKeys()
586 if (get_app_id(targetUid) == AID_SYSTEM) { in clear_uid()
632 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in generateKey()
736 if ((flags & KEYSTORE_FLAG_CRITICAL_TO_DEVICE_ENCRYPTION) && get_app_id(uid) != AID_SYSTEM) { in importKey()
819 if (!pruneable && get_app_id(callingUid) != AID_SYSTEM) { in begin()
1115 if (needsPermissionToAttestDeviceIds(params) && (get_app_id(callingUid) != AID_SYSTEM)) { in attestKey()
1380 return getEffectiveUid(targetUid) == callingUid || callingUid == AID_SYSTEM; in checkBinderPermissionSelfOrSystem()
Dkeystore_attestation_id.cpp272 if (uid == AID_SYSTEM) { in gather_attestation_application_id()
/system/core/init/
Dueventd_parser_test.cpp113 {"/dev/rtc0", 0640, AID_SYSTEM, AID_SYSTEM}, in TEST()
115 {"/dev/*/test", 0660, AID_ROOT, AID_SYSTEM}, in TEST()
158 AID_SYSTEM, in TEST()
262 {"/dev/rtc0", 0640, AID_SYSTEM, AID_SYSTEM}, in TEST()
264 {"/dev/*/test", 0660, AID_ROOT, AID_SYSTEM}, in TEST()
/system/vold/model/
DPrivateVolume.cpp146 if (PrepareDir(mPath + "/app", 0771, AID_SYSTEM, AID_SYSTEM) || in doMount()
147 PrepareDir(mPath + "/user", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount()
148 PrepareDir(mPath + "/user_de", 0711, AID_SYSTEM, AID_SYSTEM) || in doMount()
/system/core/logd/
DLogPermissions.cpp57 if ((uid == AID_ROOT) || (uid == AID_SYSTEM) || (uid == AID_LOG)) { in clientHasLogCredentials()
61 if ((gid == AID_ROOT) || (gid == AID_SYSTEM) || (gid == AID_LOG)) { in clientHasLogCredentials()
DREADME.property46 (1000, or AID_SYSTEM).
72 represents pruning of the worst PID within AID_SYSTEM when AID_SYSTEM is the noisiest UID.
DLogReader.cpp40 return client->getUid() == AID_SYSTEM || client->getGid() == AID_SYSTEM; in CanReadSecurityLogs()
DLogStatistics.cpp177 if (element.uid == AID_SYSTEM) { in Add()
226 if (element.uid == AID_SYSTEM) { in Subtract()
267 if (element.uid == AID_SYSTEM) { in Drop()
306 if (element.uid == AID_SYSTEM) { in Erase()
429 pidSystemTable[id].MaxEntries(AID_SYSTEM, 0, max_keys, max_entries); in WorstTwoSystemPids()
563 if (uid != AID_SYSTEM) { in format()
DChattyLogBuffer.cpp396 if (worst == AID_SYSTEM && prune_->worst_pid_of_system_enabled()) { in Prune()
/system/core/libprocessgroup/
Dprocessgroup.cpp388 if (!MkdirAndChown(uid_path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup()
395 if (!MkdirAndChown(uid_pid_path, 0750, AID_SYSTEM, AID_SYSTEM)) { in createProcessGroup()
/system/core/trusty/storage/proxy/
Dproxy.c83 if (setgid(AID_SYSTEM) != 0) { in drop_privs()
87 if (setuid(AID_SYSTEM) != 0) { in drop_privs()
/system/core/liblog/
Dlogger_write.cpp64 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions()
66 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG)) { in check_log_uid_permissions()
68 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions()
70 if ((gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in check_log_uid_permissions()
/system/core/libcutils/include_vndk/cutils/
Dandroid_filesystem_config.h48 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/libcutils/include/cutils/
Dandroid_filesystem_config.h48 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/include/private/
Dandroid_filesystem_config.h48 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/libcutils/include/private/
Dandroid_filesystem_config.h48 #define AID_SYSTEM 1000 /* system server */ macro
/system/core/run-as/
Drun-as.cpp137 check_directory(subpath, AID_SYSTEM); in check_data_path()
/system/netd/server/
DFwmarkServer.cpp48 if (client->getUid() != AID_SYSTEM) { in isSystemServer()
/system/core/liblog/tests/
Dliblog_test.cpp1778 if ((uid != AID_SYSTEM) && (uid != AID_ROOT) && (uid != AID_LOG) && in TEST()
1779 (gid != AID_SYSTEM) && (gid != AID_ROOT) && (gid != AID_LOG)) { in TEST()
1781 if ((euid != AID_SYSTEM) && (euid != AID_ROOT) && (euid != AID_LOG)) { in TEST()
1783 if ((egid != AID_SYSTEM) && (egid != AID_ROOT) && (egid != AID_LOG)) { in TEST()
1817 EXPECT_EQ(0, setuid(AID_SYSTEM)); // only one that can read security buffer in TEST()
1868 bool clientHasSecurityCredentials = (uid == AID_SYSTEM) || (gid == AID_SYSTEM); in TEST()

12