/external/autotest/client/site_tests/security_Minijail0/src/ |
common.sh | 11 uid=$(id -ru) 12 [ "$uid" != "$1" ] && die "uid $uid != $1"
|
/external/strace/tests/ |
uid.awk | 30 regexp = "^getx?uid" suffix "\\(\\)[[:space:]]+= " r_uint "$" 43 uid = a[1] 45 regexp = "^setuid" suffix "\\(" uid "\\)[[:space:]]+= 0$" 48 regexp = "^getresuid" suffix "\\(\\[" uid "\\], \\[" uid "\\], \\[" uid "\\]\\)[[:space:]]+= 0$" 54 regexp = "^setresuid" suffix "\\(" uid ", -1, -1\\)[[:space:]]+= 0$"
|
/frameworks/base/core/java/android/os/ |
IVibratorService.aidl | 23 void vibrate(int uid, String opPkg, long milliseconds, int usageHint, IBinder token); 24 void vibratePattern(int uid, String opPkg, in long[] pattern, int repeat, int usageHint, IBinder token);
|
/packages/apps/Nfc/src/com/android/nfc/ |
ForegroundUtils.java | 35 // We need to keep track of the individual PIDs per UID, 36 // since a single UID may have multiple processes running 58 void onUidToBackground(int uid); 66 * Checks whether the specified UID has any activities running in the foreground, 67 * and if it does, registers a callback for when that UID no longer has any foreground 72 * @param uid The UID to be checked 73 * @return true when the UID has an Activity in the foreground and the callback 76 public boolean registerUidToBackgroundCallback(Callback callback, int uid) { 78 if (!isInForegroundLocked(uid)) { [all...] |
/frameworks/base/core/java/com/android/server/ |
NetworkManagementSocketTagger.java | 61 public static void setThreadSocketStatsUid(int uid) { 62 threadSocketTags.get().statsUid = uid; 76 private void tagSocketFd(FileDescriptor fd, int tag, int uid) { 77 if (tag == -1 && uid == -1) return; 80 final int errno = native_tagSocketFd(fd, tag, uid); 84 + uid + ") failed with errno" + errno); 114 public static void setKernelCounterSet(int uid, int counterSet) { 116 final int errno = native_setCounterSet(counterSet, uid); 118 Log.w(TAG, "setKernelCountSet(" + uid + ", " + counterSet + ") failed with errno " 124 public static void resetKernelUidStats(int uid) { [all...] |
/frameworks/native/libs/binder/ |
PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { [all...] |
/bionic/libc/bionic/ |
chown.cpp | 34 int chown(const char* path, uid_t uid, gid_t gid) { 35 return fchownat(AT_FDCWD, path, uid, gid, 0);
|
lchown.cpp | 34 int lchown(const char* path, uid_t uid, gid_t gid) { 35 return fchownat(AT_FDCWD, path, uid, gid, AT_SYMLINK_NOFOLLOW);
|
/frameworks/base/core/java/com/android/internal/app/ |
IAppOpsCallback.aidl | 22 void opChanged(int op, int uid, String packageName);
|
IAppOpsService.aidl | 26 int checkOperation(int code, int uid, String packageName); 27 int noteOperation(int code, int uid, String packageName); 28 int startOperation(IBinder token, int code, int uid, String packageName); 29 void finishOperation(IBinder token, int code, int uid, String packageName); 38 int checkPackage(int uid, String packageName); 40 List<AppOpsManager.PackageOps> getOpsForPackage(int uid, String packageName, in int[] ops); 41 void setUidMode(int code, int uid, int mode); 42 void setMode(int code, int uid, String packageName, int mode); 44 int checkAudioOperation(int code, int usage, int uid, String packageName); 45 void setAudioRestriction(int code, int usage, int uid, int mode, in String[] exceptionPackages) [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreLoadStoreParameter.java | 26 AndroidKeyStoreLoadStoreParameter(int uid) { 27 mUid = uid;
|
/system/core/run-as/ |
package.h | 30 uid_t uid; member in struct:__anon74425 42 extern int check_data_path(const char* dataDir, uid_t uid);
|
/frameworks/native/services/sensorservice/ |
BatteryService.cpp | 41 bool BatteryService::addSensor(uid_t uid, int handle) { 43 Info key(uid, handle); 53 bool BatteryService::removeSensor(uid_t uid, int handle) { 55 ssize_t index = mActivations.indexOf(Info(uid, handle)); 63 void BatteryService::enableSensorImpl(uid_t uid, int handle) { 65 if (addSensor(uid, handle)) { 67 mBatteryStatService->noteStartSensor(uid, handle); 72 void BatteryService::disableSensorImpl(uid_t uid, int handle) { 74 if (removeSensor(uid, handle)) { 76 mBatteryStatService->noteStopSensor(uid, handle) [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_sync.h | 33 u64 uid; // Globally unique id. member in struct:__tsan::SyncVar 49 void Init(ThreadState *thr, uptr pc, uptr addr, u64 uid); 53 // 47 lsb is addr, then 14 bits is low part of uid, then 3 zero bits. 54 return GetLsb((u64)addr | (uid << 47), 61); 56 bool CheckId(u64 uid) const { 57 CHECK_EQ(uid, GetLsb(uid, 14)); 58 return GetLsb(this->uid, 14) == uid; 60 static uptr SplitId(u64 id, u64 *uid) { [all...] |
/system/security/keystore/ |
permissions.cpp | 37 uid_t uid; member in struct:user_euid 46 uid_t uid; member in struct:user_perm 62 uid_t uid; member in struct:audit_data 82 snprintf(buf, len, "pid=%d uid=%d", ad->pid, ad->uid); 108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { 128 ad.uid = uid; 137 * Returns the UID that the callingUid should act as. This is here for 141 uid_t get_keystore_euid(uid_t uid) { [all...] |
/system/netd/server/ |
NetworkController.h | 37 * Keeps track of default, per-pid, and per-uid-range network selection, as 57 uint32_t getNetworkForDns(unsigned* netId, uid_t uid) const; 58 unsigned getNetworkForUser(uid_t uid) const; 59 unsigned getNetworkForConnect(uid_t uid) const; 60 void getNetworkContext(unsigned netId, uid_t uid, struct android_net_context* netcontext) const; 71 Permission getPermissionForUser(uid_t uid) const; 73 int checkUserNetworkAccess(uid_t uid, unsigned netId) const; 86 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 88 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 90 bool canProtect(uid_t uid) const [all...] |
/frameworks/base/core/java/android/security/ |
IKeystoreService.aidl | 35 byte[] get(String name, int uid); 36 int insert(String name, in byte[] item, int uid, int flags); 37 int del(String name, int uid); 38 int exist(String name, int uid); 39 String[] list(String namePrefix, int uid); 45 int generate(String name, int uid, int keyType, int keySize, int flags, 47 int import_key(String name, in byte[] data, int uid, int flags); 53 long getmtime(String name, int uid); 56 int clear_uid(long uid); 60 int generateKey(String alias, in KeymasterArguments arguments, in byte[] entropy, int uid, [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
BinderUtilTest.java | 55 * Test using {@link BinderUtil.setUid} to set and restore the Binder uid. 60 final int uid = Binder.getCallingUid(); local 61 assertFalse(uid == FAKE_UID); 63 // Verify that setUid() can be used to fake the Binder uid without affecting the pid. 68 // Verify that setUid() can be used to restore the original Binder uid without affecting the 70 BinderUtil.setUid(uid); 72 assertEquals(uid, Binder.getCallingUid()); 76 * Test using {@link BinderUtil.setUid} to set the Binder uid and 82 final int uid = Binder.getCallingUid(); local 83 assertFalse(uid == FAKE_UID) [all...] |
/frameworks/av/services/audioflinger/ |
ServiceUtilities.cpp | 39 // A trusted calling UID may specify the client UID as part of a binder interface call. 40 // otherwise the calling UID must be equal to the client UID. 41 bool isTrustedCallingUid(uid_t uid) { 42 switch (uid) { 51 bool recordingAllowed(const String16& opPackageName, pid_t pid, uid_t uid) { 57 // We specify a pid and uid here as mediaserver (aka MediaRecorder or StageFrightRecorder) 60 const bool ok = checkPermission(sRecordAudio, pid, uid); 67 if (uid == AID_ROOT) return true [all...] |
/system/core/libcutils/ |
uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 44 * returns -1, sets errno to EIO, and sets "user" to the UID associated with the 45 * message. If the peer UID cannot be determined, "user" is set to -1." 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) 67 *uid = -1 [all...] |
/frameworks/base/core/java/android/net/ |
TrafficStats.java | 39 * over all interfaces, over the mobile interface, and on a per-UID basis. 66 * Special UID value used when collecting {@link NetworkStatsHistory} for 74 * Special UID value used when collecting {@link NetworkStatsHistory} for 195 * Set specific UID to use when accounting {@link Socket} traffic 208 public static void setThreadStatsUid(int uid) { 209 NetworkManagementSocketTagger.setThreadSocketStatsUid(uid); 213 * Clear any active UID set to account {@link Socket} traffic originating 264 * Start profiling data usage for current UID. Only one profiling session 281 * Stop profiling data usage for current UID. 322 final int uid = android.os.Process.myUid() local 717 final int uid = android.os.Process.myUid(); local [all...] |
/packages/apps/Settings/src/com/android/settings/datausage/ |
DataSaverBackend.java | 84 public void setIsWhitelisted(int uid, String packageName, boolean whitelisted) { 85 mWhitelist.put(uid, whitelisted); 88 mIPolicyManager.addRestrictBackgroundWhitelistedUid(uid); 90 mIPolicyManager.removeRestrictBackgroundWhitelistedUid(uid); 100 public boolean isWhitelisted(int uid) { 104 return mWhitelist.get(uid); 123 for (int uid : mIPolicyManager.getRestrictBackgroundWhitelistedUids()) { 124 mWhitelist.put(uid, true); 134 public void setIsBlacklisted(int uid, String packageName, boolean blacklisted) { 136 uid, blacklisted ? POLICY_REJECT_METERED_BACKGROUND : POLICY_NONE) [all...] |
/system/core/include/cutils/ |
fs.h | 46 extern int fs_prepare_dir(const char* path, mode_t mode, uid_t uid, gid_t gid); 52 extern int fs_prepare_dir_strict(const char* path, mode_t mode, uid_t uid, gid_t gid); 58 extern int fs_prepare_file_strict(const char* path, mode_t mode, uid_t uid, gid_t gid);
|
/system/extras/su/ |
su.c | 30 void pwtoid(const char* tok, uid_t* uid, gid_t* gid) { 33 if (uid) *uid = pw->pw_uid; 39 if (errno != 0 || end == tok) error(1, errno, "invalid uid/gid '%s'", tok); 40 if (uid) *uid = tmpid; 45 void extract_uidgids(const char* uidgids, uid_t* uid, gid_t* gid, gid_t* gids, int* gids_count) { 52 *gid = *uid = 0; 61 pwtoid(tok, uid, gid); 91 "usage: su [UID[,GID[,GID2]...]] [COMMAND [ARG...]]\n 102 uid_t uid = 0; local [all...] |
/frameworks/base/core/java/android/app/ |
AppImportanceMonitor.java | 37 final int uid; field in class:AppImportanceMonitor.AppEntry 42 uid = _uid; 48 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) { 52 public void onProcessStateChanged(int pid, int uid, int procState) { 54 updateImportanceLocked(pid, uid, 61 public void onProcessDied(int pid, int uid) { 63 updateImportanceLocked(pid, uid, 96 updateImportanceLocked(app.uid, app.pid, app.importance, false); 101 public int getImportance(int uid) { 102 AppEntry ent = mApps.get(uid); [all...] |