HomeSort by relevance Sort by last modified time
    Searched refs:uid (Results 26 - 50 of 1781) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/autotest/client/site_tests/security_Minijail0/src/
common.sh 11 uid=$(id -ru)
12 [ "$uid" != "$1" ] && die "uid $uid != $1"
  /external/strace/tests/
uid.awk 30 regexp = "^getx?uid" suffix "\\(\\)[[:space:]]+= " r_uint "$"
43 uid = a[1]
45 regexp = "^setuid" suffix "\\(" uid "\\)[[:space:]]+= 0$"
48 regexp = "^getresuid" suffix "\\(\\[" uid "\\], \\[" uid "\\], \\[" uid "\\]\\)[[:space:]]+= 0$"
54 regexp = "^setresuid" suffix "\\(" uid ", -1, -1\\)[[:space:]]+= 0$"
  /frameworks/base/core/java/android/os/
IVibratorService.aidl 23 void vibrate(int uid, String opPkg, long milliseconds, int usageHint, IBinder token);
24 void vibratePattern(int uid, String opPkg, in long[] pattern, int repeat, int usageHint, IBinder token);
  /packages/apps/Nfc/src/com/android/nfc/
ForegroundUtils.java 35 // We need to keep track of the individual PIDs per UID,
36 // since a single UID may have multiple processes running
58 void onUidToBackground(int uid);
66 * Checks whether the specified UID has any activities running in the foreground,
67 * and if it does, registers a callback for when that UID no longer has any foreground
72 * @param uid The UID to be checked
73 * @return true when the UID has an Activity in the foreground and the callback
76 public boolean registerUidToBackgroundCallback(Callback callback, int uid) {
78 if (!isInForegroundLocked(uid)) {
    [all...]
  /frameworks/base/core/java/com/android/server/
NetworkManagementSocketTagger.java 61 public static void setThreadSocketStatsUid(int uid) {
62 threadSocketTags.get().statsUid = uid;
76 private void tagSocketFd(FileDescriptor fd, int tag, int uid) {
77 if (tag == -1 && uid == -1) return;
80 final int errno = native_tagSocketFd(fd, tag, uid);
84 + uid + ") failed with errno" + errno);
114 public static void setKernelCounterSet(int uid, int counterSet) {
116 final int errno = native_setCounterSet(counterSet, uid);
118 Log.w(TAG, "setKernelCountSet(" + uid + ", " + counterSet + ") failed with errno "
124 public static void resetKernelUidStats(int uid) {
    [all...]
  /frameworks/native/libs/binder/
PermissionCache.cpp 38 const String16& permission, uid_t uid) const {
42 e.uid = uid;
52 uid_t uid, bool granted) {
64 e.uid = uid;
85 uid_t uid = ipcState->getCallingUid(); local
87 if (outUid) *outUid = uid;
88 return PermissionCache::checkPermission(permission, pid, uid);
92 const String16& permission, pid_t pid, uid_t uid) {
    [all...]
  /bionic/libc/bionic/
chown.cpp 34 int chown(const char* path, uid_t uid, gid_t gid) {
35 return fchownat(AT_FDCWD, path, uid, gid, 0);
lchown.cpp 34 int lchown(const char* path, uid_t uid, gid_t gid) {
35 return fchownat(AT_FDCWD, path, uid, gid, AT_SYMLINK_NOFOLLOW);
  /frameworks/base/core/java/com/android/internal/app/
IAppOpsCallback.aidl 22 void opChanged(int op, int uid, String packageName);
IAppOpsService.aidl 26 int checkOperation(int code, int uid, String packageName);
27 int noteOperation(int code, int uid, String packageName);
28 int startOperation(IBinder token, int code, int uid, String packageName);
29 void finishOperation(IBinder token, int code, int uid, String packageName);
38 int checkPackage(int uid, String packageName);
40 List<AppOpsManager.PackageOps> getOpsForPackage(int uid, String packageName, in int[] ops);
41 void setUidMode(int code, int uid, int mode);
42 void setMode(int code, int uid, String packageName, int mode);
44 int checkAudioOperation(int code, int usage, int uid, String packageName);
45 void setAudioRestriction(int code, int usage, int uid, int mode, in String[] exceptionPackages)
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreLoadStoreParameter.java 26 AndroidKeyStoreLoadStoreParameter(int uid) {
27 mUid = uid;
  /system/core/run-as/
package.h 30 uid_t uid; member in struct:__anon74425
42 extern int check_data_path(const char* dataDir, uid_t uid);
  /frameworks/native/services/sensorservice/
BatteryService.cpp 41 bool BatteryService::addSensor(uid_t uid, int handle) {
43 Info key(uid, handle);
53 bool BatteryService::removeSensor(uid_t uid, int handle) {
55 ssize_t index = mActivations.indexOf(Info(uid, handle));
63 void BatteryService::enableSensorImpl(uid_t uid, int handle) {
65 if (addSensor(uid, handle)) {
67 mBatteryStatService->noteStartSensor(uid, handle);
72 void BatteryService::disableSensorImpl(uid_t uid, int handle) {
74 if (removeSensor(uid, handle)) {
76 mBatteryStatService->noteStopSensor(uid, handle)
    [all...]
  /external/compiler-rt/lib/tsan/rtl/
tsan_sync.h 33 u64 uid; // Globally unique id. member in struct:__tsan::SyncVar
49 void Init(ThreadState *thr, uptr pc, uptr addr, u64 uid);
53 // 47 lsb is addr, then 14 bits is low part of uid, then 3 zero bits.
54 return GetLsb((u64)addr | (uid << 47), 61);
56 bool CheckId(u64 uid) const {
57 CHECK_EQ(uid, GetLsb(uid, 14));
58 return GetLsb(this->uid, 14) == uid;
60 static uptr SplitId(u64 id, u64 *uid) {
    [all...]
  /system/security/keystore/
permissions.cpp 37 uid_t uid; member in struct:user_euid
46 uid_t uid; member in struct:user_perm
62 uid_t uid; member in struct:audit_data
82 snprintf(buf, len, "pid=%d uid=%d", ad->pid, ad->uid);
108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) {
128 ad.uid = uid;
137 * Returns the UID that the callingUid should act as. This is here for
141 uid_t get_keystore_euid(uid_t uid) {
    [all...]
  /system/netd/server/
NetworkController.h 37 * Keeps track of default, per-pid, and per-uid-range network selection, as
57 uint32_t getNetworkForDns(unsigned* netId, uid_t uid) const;
58 unsigned getNetworkForUser(uid_t uid) const;
59 unsigned getNetworkForConnect(uid_t uid) const;
60 void getNetworkContext(unsigned netId, uid_t uid, struct android_net_context* netcontext) const;
71 Permission getPermissionForUser(uid_t uid) const;
73 int checkUserNetworkAccess(uid_t uid, unsigned netId) const;
86 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT;
88 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT;
90 bool canProtect(uid_t uid) const
    [all...]
  /frameworks/base/core/java/android/security/
IKeystoreService.aidl 35 byte[] get(String name, int uid);
36 int insert(String name, in byte[] item, int uid, int flags);
37 int del(String name, int uid);
38 int exist(String name, int uid);
39 String[] list(String namePrefix, int uid);
45 int generate(String name, int uid, int keyType, int keySize, int flags,
47 int import_key(String name, in byte[] data, int uid, int flags);
53 long getmtime(String name, int uid);
56 int clear_uid(long uid);
60 int generateKey(String alias, in KeymasterArguments arguments, in byte[] entropy, int uid,
    [all...]
  /frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
BinderUtilTest.java 55 * Test using {@link BinderUtil.setUid} to set and restore the Binder uid.
60 final int uid = Binder.getCallingUid(); local
61 assertFalse(uid == FAKE_UID);
63 // Verify that setUid() can be used to fake the Binder uid without affecting the pid.
68 // Verify that setUid() can be used to restore the original Binder uid without affecting the
70 BinderUtil.setUid(uid);
72 assertEquals(uid, Binder.getCallingUid());
76 * Test using {@link BinderUtil.setUid} to set the Binder uid and
82 final int uid = Binder.getCallingUid(); local
83 assertFalse(uid == FAKE_UID)
    [all...]
  /frameworks/av/services/audioflinger/
ServiceUtilities.cpp 39 // A trusted calling UID may specify the client UID as part of a binder interface call.
40 // otherwise the calling UID must be equal to the client UID.
41 bool isTrustedCallingUid(uid_t uid) {
42 switch (uid) {
51 bool recordingAllowed(const String16& opPackageName, pid_t pid, uid_t uid) {
57 // We specify a pid and uid here as mediaserver (aka MediaRecorder or StageFrightRecorder)
60 const bool ok = checkPermission(sRecordAudio, pid, uid);
67 if (uid == AID_ROOT) return true
    [all...]
  /system/core/libcutils/
uevent.c 34 uid_t uid = -1; local
35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid);
40 * fails due to a bad uid check, the uid_t will be set to the uid of the
44 * returns -1, sets errno to EIO, and sets "user" to the UID associated with the
45 * message. If the peer UID cannot be determined, "user" is set to -1."
47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid)
49 return uevent_kernel_recv(socket, buffer, length, true, uid);
52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid)
67 *uid = -1
    [all...]
  /frameworks/base/core/java/android/net/
TrafficStats.java 39 * over all interfaces, over the mobile interface, and on a per-UID basis.
66 * Special UID value used when collecting {@link NetworkStatsHistory} for
74 * Special UID value used when collecting {@link NetworkStatsHistory} for
195 * Set specific UID to use when accounting {@link Socket} traffic
208 public static void setThreadStatsUid(int uid) {
209 NetworkManagementSocketTagger.setThreadSocketStatsUid(uid);
213 * Clear any active UID set to account {@link Socket} traffic originating
264 * Start profiling data usage for current UID. Only one profiling session
281 * Stop profiling data usage for current UID.
322 final int uid = android.os.Process.myUid() local
717 final int uid = android.os.Process.myUid(); local
    [all...]
  /packages/apps/Settings/src/com/android/settings/datausage/
DataSaverBackend.java 84 public void setIsWhitelisted(int uid, String packageName, boolean whitelisted) {
85 mWhitelist.put(uid, whitelisted);
88 mIPolicyManager.addRestrictBackgroundWhitelistedUid(uid);
90 mIPolicyManager.removeRestrictBackgroundWhitelistedUid(uid);
100 public boolean isWhitelisted(int uid) {
104 return mWhitelist.get(uid);
123 for (int uid : mIPolicyManager.getRestrictBackgroundWhitelistedUids()) {
124 mWhitelist.put(uid, true);
134 public void setIsBlacklisted(int uid, String packageName, boolean blacklisted) {
136 uid, blacklisted ? POLICY_REJECT_METERED_BACKGROUND : POLICY_NONE)
    [all...]
  /system/core/include/cutils/
fs.h 46 extern int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid);
52 extern int fs_prepare_dir_strict(const char* path, mode_t mode, uid_t uid, gid_t gid);
58 extern int fs_prepare_file_strict(const char* path, mode_t mode, uid_t uid, gid_t gid);
  /system/extras/su/
su.c 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) {
33 if (uid) *uid = pw->pw_uid;
39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok);
40 if (uid) *uid = tmpid;
45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) {
52 *gid = *uid = 0;
61 pwtoid(tok, uid, gid);
91 "usage: su [UID[,GID[,GID2]...]] [COMMAND [ARG...]]\n
102 uid_t uid = 0; local
    [all...]
  /frameworks/base/core/java/android/app/
AppImportanceMonitor.java 37 final int uid; field in class:AppImportanceMonitor.AppEntry
42 uid = _uid;
48 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) {
52 public void onProcessStateChanged(int pid, int uid, int procState) {
54 updateImportanceLocked(pid, uid,
61 public void onProcessDied(int pid, int uid) {
63 updateImportanceLocked(pid, uid,
96 updateImportanceLocked(app.uid, app.pid, app.importance, false);
101 public int getImportance(int uid) {
102 AppEntry ent = mApps.get(uid);
    [all...]

Completed in 853 milliseconds

12 3 4 5 6 7 8 91011>>