Lines Matching defs:uid
223 static inline __u64 check_broker_policy(uint64_t uid)
225 uint64_t network_access_uid = uid;
254 SEC("cgroup_skb/uid/ingress")
344 SEC("cgroup_skb/uid/egress")
466 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
467 sock_permission_value *value = bpf_map_lookup_elem(map_ptr, &uid);
468 // value == NULL means that the process attached to this uid is not a hap process which started by appspawn
509 static inline __u8 socket_ringbuf_event_submit(__u32 uid)
514 *e = uid;
526 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
528 uid = check_broker_policy(uid);
531 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
532 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
553 if (socket_ringbuf_event_submit(uid) != 0) {
558 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
563 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
572 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
574 uid = check_broker_policy(uid);
577 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
578 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
599 if (socket_ringbuf_event_submit(uid) != 0) {
604 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
609 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
618 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
620 uid = check_broker_policy(uid);
623 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
624 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
645 if (socket_ringbuf_event_submit(uid) != 0) {
650 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
655 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
665 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
667 uid = check_broker_policy(uid);
670 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
671 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
692 if (socket_ringbuf_event_submit(uid) != 0) {
697 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
702 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
711 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
713 uid = check_broker_policy(uid);
716 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
717 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
738 if (socket_ringbuf_event_submit(uid) != 0) {
743 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
748 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
757 __u32 uid = (__u32)(uid_gid & 0x00000000FFFFFFFF);
759 uid = check_broker_policy(uid);
762 uid_access_policy_value *value = bpf_map_lookup_elem(map_ptr, &uid);
763 // value == NULL means that the process attached to this uid is not a hap process which has a default configuration
784 if (socket_ringbuf_event_submit(uid) != 0) {
789 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);
794 bpf_map_update_elem(map_ptr, &uid, value, BPF_NOEXIST);