/foundation/communication/dsoftbus/core/transmission/trans_channel/tcp_direct/src/ |
H A D | trans_tcp_direct_message.c | 321 info->peerUid = conn->appInfo.peerData.uid; in GetChannelInfoFromConn() 419 int32_t uid = 0; in NotifyChannelOpened() local 421 if (TransTdcGetUidAndPid(conn.appInfo.myData.sessionName, &uid, &pid) != SOFTBUS_OK) { in NotifyChannelOpened() 422 TRANS_LOGE(TRANS_CTRL, "get uid and pid fail."); in NotifyChannelOpened() 862 if (TransTdcGetUidAndPid(appInfo->myData.sessionName, &appInfo->myData.uid, &appInfo->myData.pid) != SOFTBUS_OK) { in TransTdcFillAppInfoAndNotifyChannel()
|
/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_manage/wifi_sta_sa/ |
H A D | wifi_device_stub.cpp | 200 WIFI_LOGD("%{public}s, code: %{public}u, uid: %{public}d, pid: %{public}d", in OnRemoteRequest() 414 config.uid = data.ReadInt32(); in ReadWifiDeviceConfig() 518 reply.WriteInt32(config.uid); in WriteWifiDeviceConfig() 1277 int uid = data.ReadInt32(); 1284 ret = SetDpiMarkRule(ifaceName, uid, protocol, enable);
|
/foundation/window/window_manager/window_scene/session_manager/include/ |
H A D | scene_session_manager.h | 372 WSError NotifyWindowExtensionVisibilityChange(int32_t pid, int32_t uid, bool visible) override; 424 WMError UpdateDisplayHookInfo(int32_t uid, uint32_t width, uint32_t height, float_t density, bool enable); 425 WMError UpdateAppHookDisplayInfo(int32_t uid, const HookInfo& hookInfo, bool enable); 575 int32_t NotifyRssThawApp(const int32_t uid, const std::string& bundleName,
|
/kernel/linux/linux-5.10/drivers/block/ |
H A D | loop.c | 1008 kuid_t uid = current_uid(); in loop_set_status_from_info() local 1057 lo->lo_key_owner = uid; in loop_set_status_from_info() 1350 kuid_t uid = current_uid(); in loop_set_status() local 1359 !uid_eq(lo->lo_key_owner, uid) && in loop_set_status()
|
/kernel/linux/linux-5.10/drivers/pinctrl/intel/ |
H A D | pinctrl-cherryview.c | 274 .uid = "1", 368 .uid = "2", 413 .uid = "3", 537 .uid = "4",
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | syscalls.h | 737 asmlinkage long sys_setuid(uid_t uid); 742 asmlinkage long sys_setfsuid(uid_t uid); 1196 asmlinkage long sys_setuid16(old_uid_t uid); 1203 asmlinkage long sys_setfsuid16(old_uid_t uid);
|
/kernel/linux/linux-5.10/fs/nfs/ |
H A D | inode.c | 557 inode->i_uid = fattr->uid; in nfs_fhget() 1491 if ((fattr->valid & NFS_ATTR_FATTR_OWNER) && !uid_eq(inode->i_uid, fattr->uid)) in nfs_check_inode_attributes() 2022 if (!uid_eq(inode->i_uid, fattr->uid)) { in nfs_update_inode() 2025 inode->i_uid = fattr->uid; in nfs_update_inode()
|
/kernel/linux/linux-5.10/fs/ |
H A D | exec.c | 1592 kuid_t uid; in bprm_fill_uid() local 1610 /* Atomically reload and check mode/uid/gid now that lock held. */ in bprm_fill_uid() 1612 uid = inode->i_uid; in bprm_fill_uid() 1622 if (!kuid_has_mapping(bprm->cred->user_ns, uid) || in bprm_fill_uid() 1628 bprm->cred->euid = uid; in bprm_fill_uid() 1888 * set*uid() to execve() because too many poorly written programs in do_execveat_common()
|
/kernel/linux/linux-5.10/fs/ext2/ |
H A D | inode.c | 1536 uid_t uid = i_uid_read(inode); in __ext2_write_inode() local 1553 raw_inode->i_uid_low = cpu_to_le16(low_16_bits(uid)); in __ext2_write_inode() 1557 * re-used with the upper 16 bits of the uid/gid intact in __ext2_write_inode() 1560 raw_inode->i_uid_high = cpu_to_le16(high_16_bits(uid)); in __ext2_write_inode() 1567 raw_inode->i_uid_low = cpu_to_le16(fs_high2lowuid(uid)); in __ext2_write_inode()
|
H A D | super.c | 479 kuid_t uid; in parse_options() local 507 uid = make_kuid(current_user_ns(), option); in parse_options() 508 if (!uid_valid(uid)) { in parse_options() 509 ext2_msg(sb, KERN_ERR, "Invalid uid value %d", option); in parse_options() 513 opts->s_resuid = uid; in parse_options()
|
/kernel/linux/linux-5.10/ipc/ |
H A D | shm.c | 159 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n", in shm_init() 161 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n", in shm_init() 886 out->shm_perm.uid = tbuf_old.shm_perm.uid; in copy_shmid_from_user() 1188 if (!uid_eq(euid, shp->shm_perm.uid) && in shmctl_do_lock() 1862 from_kuid_munged(user_ns, shp->shm_perm.uid), in sysvipc_shm_proc_show()
|
/kernel/linux/linux-5.10/fs/fuse/ |
H A D | dir.c | 1026 stat->uid = make_kuid(fc->user_ns, attr->uid); in fuse_fillattr() 1217 uid_eq(cred->uid, fc->user_id) && in fuse_allow_current_process() 1494 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); in iattr_to_fattr()
|
/kernel/linux/linux-6.6/fs/nfs/ |
H A D | inode.c | 554 inode->i_uid = fattr->uid; in nfs_fhget() 1528 if ((fattr->valid & NFS_ATTR_FATTR_OWNER) && !uid_eq(inode->i_uid, fattr->uid)) in nfs_check_inode_attributes() 2241 if (!uid_eq(inode->i_uid, fattr->uid)) { in nfs_update_inode() 2244 inode->i_uid = fattr->uid; in nfs_update_inode()
|
/kernel/linux/linux-6.6/fs/ext2/ |
H A D | super.c | 473 kuid_t uid; in parse_options() local 501 uid = make_kuid(current_user_ns(), option); in parse_options() 502 if (!uid_valid(uid)) { in parse_options() 503 ext2_msg(sb, KERN_ERR, "Invalid uid value %d", option); in parse_options() 507 opts->s_resuid = uid; in parse_options()
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | syscalls.h | 654 asmlinkage long sys_setuid(uid_t uid); 659 asmlinkage long sys_setfsuid(uid_t uid); 1103 asmlinkage long sys_setuid16(old_uid_t uid); 1110 asmlinkage long sys_setfsuid16(old_uid_t uid);
|
/kernel/linux/linux-6.6/drivers/powercap/ |
H A D | intel_rapl_common.c | 1551 int uid; in rapl_find_package_domain_cpuslocked() local 1554 uid = topology_logical_die_id(id); in rapl_find_package_domain_cpuslocked() 1556 uid = id; in rapl_find_package_domain_cpuslocked() 1559 if (rp->id == uid in rapl_find_package_domain_cpuslocked()
|
/kernel/linux/linux-6.6/ipc/ |
H A D | shm.c | 159 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n", in shm_init() 161 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n", in shm_init() 896 out->shm_perm.uid = tbuf_old.shm_perm.uid; in copy_shmid_from_user() 1198 if (!uid_eq(euid, shp->shm_perm.uid) && in shmctl_do_lock() 1871 from_kuid_munged(user_ns, shp->shm_perm.uid), in sysvipc_shm_proc_show()
|
/kernel/linux/linux-6.6/drivers/pinctrl/intel/ |
H A D | pinctrl-cherryview.c | 278 .uid = "1", 372 .uid = "2", 417 .uid = "3", 541 .uid = "4",
|
/foundation/systemabilitymgr/samgr/services/samgr/native/source/ |
H A D | system_ability_manager.cpp | 2017 int32_t SystemAbilityManager::UpdateSaFreMap(int32_t uid, int32_t saId) in UpdateSaFreMap() argument 2019 if (uid < 0) { in UpdateSaFreMap() 2020 HILOGW("UpdateSaFreMap return, uid not valid!"); in UpdateSaFreMap() 2024 uint64_t key = SamgrUtil::GenerateFreKey(uid, saId); in UpdateSaFreMap() 2039 uint32_t uid = key >> SHFIT_BIT; in ReportGetSAPeriodically() local 2040 ReportGetSAFrequency(uid, saId, count); in ReportGetSAPeriodically()
|
/foundation/communication/wifi/wifi/services/wifi_standard/wifi_framework/wifi_toolkit/config/ |
H A D | wifi_config_file_spec.cpp | 246 } else if (key == "uid") { in SetWifiDeviceConfigFirst() 247 item.uid = CheckDataLegal(tmpValue); in SetWifiDeviceConfigFirst() 568 ss << " " <<"uid=" << item.uid << std::endl; in OutPutWifiDeviceConfig() 1754 item.uid = -1; in ClearWifiBackupConfig() 1786 } else if (key == "uid") { in SetWifiBackupConfigFirst() 1787 item.uid = CheckDataLegal(tmpValue); in SetWifiBackupConfigFirst() 1861 ss << " " <<"uid=" << item.uid << std::endl; in OutPutWifiBackupConfig()
|
/kernel/linux/linux-5.10/fs/ntfs/ |
H A D | super.c | 92 kuid_t uid = INVALID_UID; in parse_options() local 179 NTFS_GETOPT_UID("uid", uid) in parse_options() 297 if (uid_valid(uid)) in parse_options() 298 vol->uid = uid; in parse_options() 1038 /* Set uid and gid to root. */ in load_and_init_mft_mirror()
|
/kernel/linux/linux-6.6/fs/ntfs/ |
H A D | super.c | 100 kuid_t uid = INVALID_UID; in parse_options() local 187 NTFS_GETOPT_UID("uid", uid) in parse_options() 305 if (uid_valid(uid)) in parse_options() 306 vol->uid = uid; in parse_options() 1046 /* Set uid and gid to root. */ in load_and_init_mft_mirror()
|
/third_party/icu/icu4c/source/test/intltest/ |
H A D | measfmttest.cpp | 5531 UnicodeString uid(identifier, -1, US_INV); in verifySingleUnit() 5532 assertEquals(uid + ": SI or binary prefix", in verifySingleUnit() 5536 assertEquals(uid + ": Power", in verifySingleUnit() 5540 assertEquals(uid + ": Identifier", in verifySingleUnit() 5544 assertTrue(uid + ": Constructor", in verifySingleUnit() 5547 assertEquals(uid + ": Complexity", in verifySingleUnit() 5559 UnicodeString uid(identifier, -1, US_INV); in verifyCompoundUnit() 5560 assertEquals(uid + ": Identifier", in verifyCompoundUnit() 5564 assertTrue(uid + ": Constructor", in verifyCompoundUnit() 5567 assertEquals(uid in verifyCompoundUnit() [all...] |
/third_party/libfuse/lib/ |
H A D | fuse.c | 1494 stbuf->st_uid = f->conf.uid; in set_stat() 2075 int fuse_fs_chown(struct fuse_fs *fs, const char *path, uid_t uid, in fuse_fs_chown() argument 2084 path, (unsigned long) uid, (unsigned long) gid); in fuse_fs_chown() 2086 return fs->op.chown(path, uid, gid, fi); in fuse_fs_chown() 2566 c->ctx.uid = ctx->uid; in req_fuse_prepare() 2790 uid_t uid = (valid & FUSE_SET_ATTR_UID) ? in fuse_lib_setattr() local 2794 err = fuse_fs_chown(f->fs, path, uid, gid, fi); in fuse_lib_setattr() 4660 FUSE_LIB_OPT("uid=", set_uid, 1), 4661 FUSE_LIB_OPT("uid [all...] |
/foundation/graphic/graphic_3d/lume/Lume_3D/src/util/ |
H A D | mesh_builder.cpp | 1578 const IInterface* MeshBuilder::GetInterface(const Uid& uid) const in GetInterface() 1580 if ((uid == IMeshBuilder::UID) || (uid == IInterface::UID)) { in GetInterface() 1586 IInterface* MeshBuilder::GetInterface(const Uid& uid) in GetInterface() argument 1588 if ((uid == IMeshBuilder::UID) || (uid == IInterface::UID)) { in GetInterface()
|