/external/ltp/testcases/kernel/syscalls/setfsuid/ |
setfsuid03.c | 48 uid_t uid; local 54 uid = 1; 55 while (!getpwuid(uid)) 56 uid++; 58 UID16_CHECK(uid, setfsuid, cleanup); 64 TEST(SETFSUID(cleanup, uid)); 72 if (TEST_RETURN == uid) { 75 TEST_RETURN, uid); 97 "to set the effective uid to %d", ltpuser->pw_uid);
|
/frameworks/av/media/utils/include/mediautils/ |
BatteryNotifier.h | 40 void noteStartVideo(uid_t uid); 41 void noteStopVideo(uid_t uid); 43 void noteStartAudio(uid_t uid); 44 void noteStopAudio(uid_t uid); 46 void noteFlashlightOn(const String8& id, uid_t uid); 47 void noteFlashlightOff(const String8& id, uid_t uid); 49 void noteStartCamera(const String8& id, uid_t uid); 50 void noteStopCamera(const String8& id, uid_t uid);
|
/frameworks/base/core/java/com/android/internal/app/ |
IAppOpsCallback.aidl | 22 void opChanged(int op, int uid, String packageName);
|
/frameworks/base/core/proto/android/os/ |
worksource.proto | 25 int32 uid = 1;
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreLoadStoreParameter.java | 26 AndroidKeyStoreLoadStoreParameter(int uid) { 27 mUid = uid;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
WifiPermissionsWrapper.java | 48 * Returns the user ID corresponding to the UID 49 * @param uid Calling Uid 52 public int getCallingUserId(int uid) { 53 return UserHandle.getUserId(uid); 72 * get location permissions for a certain UID 74 * @param: Uid to get permission for 77 public int getUidPermission(String permissionType, int uid) { 78 return ActivityManager.checkUidPermission(permissionType, uid); 91 * @param uid to check the permission fo [all...] |
/packages/services/Car/libvehiclemonitor/java/src/com/android/car/vehiclemonitor/ |
IVehicleMonitorListener.aidl | 24 void onAppViolation(int pid, int uid, int action, int violation) = 0;
|
/test/vts-testcase/kernel/api/qtaguid/ |
SocketTagUserSpace.h | 33 bool checkTag(uint64_t acct_tag, uid_t uid); 35 bool checkStats(uint64_t acct_tag, uid_t uid, int counterSet,
|
/frameworks/native/services/sensorservice/ |
BatteryService.cpp | 36 bool BatteryService::addSensor(uid_t uid, int handle) { 38 Info key(uid, handle); 48 bool BatteryService::removeSensor(uid_t uid, int handle) { 50 ssize_t index = mActivations.indexOf(Info(uid, handle)); 58 void BatteryService::enableSensorImpl(uid_t uid, int handle) { 60 if (addSensor(uid, handle)) { 62 mBatteryStatService->noteStartSensor(uid, handle); 67 void BatteryService::disableSensorImpl(uid_t uid, int handle) { 69 if (removeSensor(uid, handle)) { 71 mBatteryStatService->noteStopSensor(uid, handle) [all...] |
/cts/tests/app/src/android/app/cts/android/app/cts/tools/ |
UidImportanceListener.java | 24 * Helper for monitoring the importance state of a uid. 31 public UidImportanceListener(int uid) { 32 mUid = uid; 36 public void onUidImportance(int uid, int importance) { 38 Log.d("XXXXX", "Got importance for uid " + uid + ": " + importance); 39 if (uid == mUid) {
|
/external/ltp/testcases/kernel/syscalls/chown/ |
chown01.c | 125 int uid, gid; variable 142 TEST(CHOWN(cleanup, fname, uid, gid)); 146 fname, uid, gid); 149 fname, uid, gid, TEST_RETURN); 167 UID16_CHECK((uid = geteuid()), "chown", cleanup)
|
/frameworks/native/libs/vr/libvr_manager/ |
trusted_uids.cpp | 15 bool IsTrustedUid(uid_t uid, bool use_cache) { 19 // Whitelist requests from the system UID. 23 if (uid == AID_SYSTEM) 29 auto it = uid_cache.find(uid); 43 String16("android.permission.RESTRICTED_VR_ACCESS"), -1, uid); 45 // Cache the information for this uid to avoid future Java calls. 46 uid_cache[uid] = trusted;
|
/external/compiler-rt/lib/tsan/rtl/ |
tsan_sync.h | 33 u64 uid; // Globally unique id. member in struct:__tsan::SyncVar 49 void Init(ThreadState *thr, uptr pc, uptr addr, u64 uid); 53 // 47 lsb is addr, then 14 bits is low part of uid, then 3 zero bits. 54 return GetLsb((u64)addr | (uid << 47), 61); 56 bool CheckId(u64 uid) const { 57 CHECK_EQ(uid, GetLsb(uid, 14)); 58 return GetLsb(this->uid, 14) == uid; 60 static uptr SplitId(u64 id, u64 *uid) { [all...] |
/system/security/keystore/ |
permissions.cpp | 53 uid_t uid; member in struct:user_euid 63 uid_t uid; member in struct:user_perm 80 uid_t uid; member in struct:audit_data 100 snprintf(buf, len, "pid=%d uid=%d", ad->pid, ad->uid); 120 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { 136 ad.uid = uid; 145 * Returns the UID that the callingUid should act as. This is here for 149 uid_t get_keystore_euid(uid_t uid) { [all...] |
/packages/apps/Settings/src/com/android/settings/datausage/ |
DataSaverBackend.java | 85 public void setIsWhitelisted(int uid, String packageName, boolean whitelisted) { 87 mPolicyManager.setUidPolicy(uid, policy); 88 mUidPolicies.put(uid, policy); 95 public boolean isWhitelisted(int uid) { 97 return mUidPolicies.get(uid, POLICY_NONE) == POLICY_ALLOW_METERED_BACKGROUND; 114 for (int uid : mPolicyManager.getUidsWithPolicy(POLICY_ALLOW_METERED_BACKGROUND)) { 115 mUidPolicies.put(uid, POLICY_ALLOW_METERED_BACKGROUND); 124 public void setIsBlacklisted(int uid, String packageName, boolean blacklisted) { 126 mPolicyManager.setUidPolicy(uid, policy); 127 mUidPolicies.put(uid, policy) [all...] |
/frameworks/base/core/java/android/security/ |
IKeystoreService.aidl | 35 byte[] get(String name, int uid); 36 int insert(String name, in byte[] item, int uid, int flags); 37 int del(String name, int uid); 38 int exist(String name, int uid); 39 String[] list(String namePrefix, int uid); 45 int generate(String name, int uid, int keyType, int keySize, int flags, 47 int import_key(String name, in byte[] data, int uid, int flags); 53 long getmtime(String name, int uid); 56 int clear_uid(long uid); 60 int generateKey(String alias, in KeymasterArguments arguments, in byte[] entropy, int uid, [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
BinderUtilTest.java | 55 * Test using {@link BinderUtil.setUid} to set and restore the Binder uid. 60 final int uid = Binder.getCallingUid(); local 61 assertFalse(uid == FAKE_UID); 63 // Verify that setUid() can be used to fake the Binder uid without affecting the pid. 68 // Verify that setUid() can be used to restore the original Binder uid without affecting the 70 BinderUtil.setUid(uid); 72 assertEquals(uid, Binder.getCallingUid()); 76 * Test using {@link BinderUtil.setUid} to set the Binder uid and 82 final int uid = Binder.getCallingUid(); local 83 assertFalse(uid == FAKE_UID) [all...] |
/system/core/libcutils/ |
multiuser.c | 20 userid_t multiuser_get_user_id(uid_t uid) { 21 return uid / AID_USER_OFFSET; 24 appid_t multiuser_get_app_id(uid_t uid) { 25 return uid % AID_USER_OFFSET; 64 gid_t multiuser_get_shared_app_gid(uid_t uid) { 65 return multiuser_get_shared_gid(multiuser_get_user_id(uid), multiuser_get_app_id(uid));
|
uevent.c | 34 uid_t uid = -1; local 35 return uevent_kernel_multicast_uid_recv(socket, buffer, length, &uid); 40 * fails due to a bad uid check, the uid_t will be set to the uid of the 44 * returns -1, sets errno to EIO, and sets "user" to the UID associated with the 45 * message. If the peer UID cannot be determined, "user" is set to -1." 47 ssize_t uevent_kernel_multicast_uid_recv(int socket, void *buffer, size_t length, uid_t *uid) 49 return uevent_kernel_recv(socket, buffer, length, true, uid); 52 ssize_t uevent_kernel_recv(int socket, void *buffer, size_t length, bool require_group, uid_t *uid) 67 *uid = -1 [all...] |
/external/openssh/openbsd-compat/ |
pwcache.c | 48 user_from_uid(uid_t uid, int nouser) 51 uid_t uid; member in struct:ncache 59 cp = c_uid + (uid & MASK); 60 if (cp->uid != uid || cp->name == NULL) { 67 if ((pw = getpwuid(uid)) == NULL) { 70 (void)snprintf(nbuf, sizeof(nbuf), "%u", uid); 72 cp->uid = uid;
|
/external/ltp/testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_auth_authsys_create/ |
tirpc_authsys_create.c | 47 uid_t uid; local 52 uid = geteuid(); 57 authSys = authsys_create(argc[1], uid, gid, len, aup_gids);
|
/external/strace/tests/ |
fchownat.c | 43 uid_t uid = geteuid(); local 49 long rc = syscall(__NR_fchownat, AT_FDCWD, sample, uid, gid, 0); 51 sample, uid, gid, sprintrc(rc));
|
xchownx.c | 96 #define PAIR(val) { val, gid }, { uid, val } 103 unsigned int uid = GETEUID; local 104 CHECK_OVERFLOWUID(uid); 109 const long uid, gid; member in struct:__anon31978 111 { uid, gid }, 112 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, 113 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, 116 { 0xffff0000U | uid, gid }, 117 { uid, 0xffff0000U | gid }, 134 const unsigned int unum = ugid2int(tests[i].uid); [all...] |
/external/strace/tests-m32/ |
fchownat.c | 43 uid_t uid = geteuid(); local 49 long rc = syscall(__NR_fchownat, AT_FDCWD, sample, uid, gid, 0); 51 sample, uid, gid, sprintrc(rc));
|
xchownx.c | 96 #define PAIR(val) { val, gid }, { uid, val } 103 unsigned int uid = GETEUID; local 104 CHECK_OVERFLOWUID(uid); 109 const long uid, gid; member in struct:__anon32044 111 { uid, gid }, 112 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, 113 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, 116 { 0xffff0000U | uid, gid }, 117 { uid, 0xffff0000U | gid }, 134 const unsigned int unum = ugid2int(tests[i].uid); [all...] |