Home
last modified time | relevance | path

Searched full:uid (Results 1 – 25 of 2042) sorted by relevance

12345678910>>...82

/external/e2fsprogs/tests/f_journal/
Dexpect.12 Clearing orphaned inode 37 (uid=0, gid=0, mode=0100600, size=4096)
3 Clearing orphaned inode 90 (uid=0, gid=0, mode=040700, size=1024)
4 Clearing orphaned inode 67 (uid=0, gid=0, mode=0100600, size=4096)
5 Clearing orphaned inode 50 (uid=0, gid=0, mode=0100600, size=4096)
6 Clearing orphaned inode 57 (uid=0, gid=0, mode=040700, size=1024)
7 Clearing orphaned inode 80 (uid=0, gid=0, mode=040700, size=1024)
8 Clearing orphaned inode 45 (uid=0, gid=0, mode=040700, size=1024)
9 Clearing orphaned inode 71 (uid=0, gid=0, mode=0100600, size=4096)
10 Clearing orphaned inode 86 (uid=0, gid=0, mode=040700, size=1024)
11 Clearing orphaned inode 83 (uid=0, gid=0, mode=040700, size=1024)
[all …]
/external/selinux/python/sepolgen/tests/
Daudit.txt2 …0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid…
5 …0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid…
8 …0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid…
11 …0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid…
14 …0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid…
17 …0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8146 auid=500 uid=0 gid=0 euid=0 suid…
20 …0=80d2437 a1=bfc0a6c8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid…
23 …0=80d2437 a1=bfc0a0b8 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8152 auid=500 uid=0 gid=0 euid=0 suid…
26 …0=80d2437 a1=bfc09c78 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8153 auid=500 uid=0 gid=0 euid=0 suid…
29 …0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid…
[all …]
/external/exoplayer/tree/library/core/src/main/java/com/google/android/exoplayer2/
DAbstractConcatenatedTimeline.java30 * Returns UID of child timeline from a concatenated period UID.
32 * @param concatenatedUid UID of a period in a concatenated timeline.
33 * @return UID of the child timeline this period belongs to.
41 * Returns UID of the period in the child timeline from a concatenated period UID.
43 * @param concatenatedUid UID of a period in a concatenated timeline.
44 * @return UID of the period in the child timeline.
52 * Returns a concatenated UID for a period or window in a child timeline.
54 * @param childTimelineUid UID of the child timeline this period or window belongs to.
55 * @param childPeriodOrWindowUid UID of the period or window in the child timeline.
56 * @return UID of the period or window in the concatenated timeline.
[all …]
/external/selinux/python/sepolgen/tests/test_data/
Daudit.log2 …2 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 …
5 … a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=50…
7 …es exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=50…
9 …xit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=50…
11 … exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=50…
13 type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:s…
14 type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:s…
16 … a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 …
18 …it=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=50…
20 …t=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=50…
[all …]
Dhttpd.log1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st…
[all …]
/external/strace/tests-m32/
Dso_peercred.c86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main()
87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local
107 PRINT_FIELD_UID(", ", *peercred, uid); in main()
122 PRINT_FIELD_UID(", ", *peercred, uid); in main()
139 * struct ucred.uid and struct ucred.gid are not printed. in main()
149 * but smaller than offsetofend(struct ucred, uid): in main()
150 * the part of struct ucred.uid is printed in hex. in main()
158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main()
160 PRINT_FIELD_D(", {", *uid, pid); in main()
161 printf(", uid="); in main()
[all …]
Dxchownx.c97 #define PAIR(val) { val, gid }, { uid, val }
104 unsigned int uid = GETEUID; in main() local
105 CHECK_OVERFLOWUID(uid); in main()
110 const long uid, gid; in main() member
112 { uid, gid }, in main()
113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main()
114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main()
117 { 0xffff0000U | uid, gid }, in main()
118 { uid, 0xffff0000U | gid }, in main()
135 const unsigned int unum = ugid2int(tests[i].uid); in main()
[all …]
/external/strace/tests/
Dso_peercred.c86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main()
87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local
107 PRINT_FIELD_UID(", ", *peercred, uid); in main()
122 PRINT_FIELD_UID(", ", *peercred, uid); in main()
139 * struct ucred.uid and struct ucred.gid are not printed. in main()
149 * but smaller than offsetofend(struct ucred, uid): in main()
150 * the part of struct ucred.uid is printed in hex. in main()
158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main()
160 PRINT_FIELD_D(", {", *uid, pid); in main()
161 printf(", uid="); in main()
[all …]
Dxchownx.c97 #define PAIR(val) { val, gid }, { uid, val }
104 unsigned int uid = GETEUID; in main() local
105 CHECK_OVERFLOWUID(uid); in main()
110 const long uid, gid; in main() member
112 { uid, gid }, in main()
113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main()
114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main()
117 { 0xffff0000U | uid, gid }, in main()
118 { uid, 0xffff0000U | gid }, in main()
135 const unsigned int unum = ugid2int(tests[i].uid); in main()
[all …]
/external/strace/tests-mx32/
Dso_peercred.c86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main()
87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local
107 PRINT_FIELD_UID(", ", *peercred, uid); in main()
122 PRINT_FIELD_UID(", ", *peercred, uid); in main()
139 * struct ucred.uid and struct ucred.gid are not printed. in main()
149 * but smaller than offsetofend(struct ucred, uid): in main()
150 * the part of struct ucred.uid is printed in hex. in main()
158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main()
160 PRINT_FIELD_D(", {", *uid, pid); in main()
161 printf(", uid="); in main()
[all …]
Dxchownx.c97 #define PAIR(val) { val, gid }, { uid, val }
104 unsigned int uid = GETEUID; in main() local
105 CHECK_OVERFLOWUID(uid); in main()
110 const long uid, gid; in main() member
112 { uid, gid }, in main()
113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main()
114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main()
117 { 0xffff0000U | uid, gid }, in main()
118 { uid, 0xffff0000U | gid }, in main()
135 const unsigned int unum = ugid2int(tests[i].uid); in main()
[all …]
/external/apache-commons-compress/src/main/java/org/apache/commons/compress/archivers/zip/
DX7875_NewUnix.java30 * An extra field that stores UNIX UID/GID data (owner & group ownership) for a given
42 * UIDSize 1 byte Size of UID field
43 * UID Variable UID for this entry (little endian)
66 // Also, the spec theoretically allows UID/GID up to 255 bytes long!
69 private BigInteger uid; field in X7875_NewUnix
90 * Gets the UID as a long. UID is typically a 32 bit unsigned
95 * @return the UID value.
97 public long getUID() { return ZipUtil.bigToLong(uid); } in getUID()
110 * Sets the UID.
112 * @param l UID value to set on this extra field.
[all …]
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowAppOpsManager.java65 // Recorded operations, keyed by "uid|packageName"
67 // "uid|packageName|opCode" => opMode
90 * uid and name of the application whose mode is being modified; if these do not match, the
98 * @param uid The user id of the application whose mode will be changed.
105 public void setMode(String op, int uid, String packageName, int mode) { in setMode() argument
106 setMode(AppOpsManager.strOpToOp(op), uid, packageName, mode); in setMode() local
119 public void setMode(int op, int uid, String packageName, int mode) { in setMode() argument
120 Integer oldMode = appModeMap.put(getOpMapKey(uid, packageName, op), mode); in setMode()
130 public int unsafeCheckOpNoThrow(String op, int uid, String packageName) { in unsafeCheckOpNoThrow() argument
131 return checkOpNoThrow(AppOpsManager.strOpToOp(op), uid, packageName); in unsafeCheckOpNoThrow()
[all …]
/external/ltp/testcases/kernel/syscalls/add_key/
Dadd_key03.c9 * "_uid.$UID" (or "_uid_ses.$UID"), and it would become the user keyring (or
10 * user session keyring) for user $UID, provided that it hadn't already been
48 uid_t uid = 1; in do_test() local
55 * reproducible for a UID which already has its keyrings, so find an in do_test()
56 * unused UID. Note that it would be better to directly check for the in do_test()
57 * presence of the UID's keyrings than to search the passwd file. in do_test()
58 * However, that's not easy to do given that even if we assumed the UID in do_test()
63 while (getpwuid(uid)) in do_test()
64 uid++; in do_test()
66 sprintf(description, "_uid.%u", uid); in do_test()
[all …]
/external/libcap/progs/
Dquicktest.sh96 pass_capsh --uid=1 -- -c "./tcapsh --keep=1 --caps=\"cap_net_raw,cap_net_admin=ip\" --print --uid=1…
100 pass_capsh --uid=1 -- -c "./tcapsh --caps=\"cap_net_raw,cap_net_admin=ip cap_setuid=p\" --print --c…
103 pass_capsh --uid=1 -- -c "./tcapsh --keep=1 --caps=\"cap_net_raw,cap_net_admin=ip\" --uid=1 --forkf…
114 # nobody's uid. Static compilation of the capsh binary can disable pwd
121 fail_capsh --secbits=47 -- -c "./tcapsh --uid=$nouid"
125 # Suppress uid=0 privilege
126 fail_capsh --secbits=47 --print -- -c "./capsh --uid=$nouid"
128 # suppress uid=0 privilege and test this privileged
129 pass_capsh --secbits=0x2f --print -- -c "./privileged --uid=$nouid"
132 fail_capsh --drop=cap_setuid --secbits=0x2f --print -- -c "./privileged --uid=$nouid"
[all …]
/external/rust/crates/tokio/src/net/unix/
Ducred.rs8 /// UID (user ID) of the process
9 uid: uid_t, field
15 /// Gets UID (user ID) of the process.
16 pub fn uid(&self) -> uid_t { in uid() method
17 self.uid in uid()
68 uid: 0, in get_peer_cred()
89 uid: ucred.uid, in get_peer_cred()
118 let mut uid = MaybeUninit::uninit(); in get_peer_cred() localVariable
121 let ret = getpeereid(raw_fd, uid.as_mut_ptr(), gid.as_mut_ptr()); in get_peer_cred()
125 uid: uid.assume_init(), in get_peer_cred()
[all …]
/external/bcc/tools/
Dtcpconnect_example.txt41 The -U option prints a UID column:
44 UID PID COMM IP SADDR DADDR DPORT
51 The -u option filtering UID:
54 UID PID COMM IP SADDR DADDR DPORT
72 -U, --print-uid include UID on output
73 -u UID, --uid UID trace this UID only
81 ./tcpconnect -U # include UID
82 ./tcpconnect -u 1000 # only trace UID 1000
Dtcpconnect.py19 # 09-Jan-2019 Takuma Kume Support filtering by UID
36 ./tcpconnect -U # include UID
37 ./tcpconnect -u 1000 # only trace UID 1000
49 parser.add_argument("-U", "--print-uid", action="store_true",
50 help="include UID on output")
51 parser.add_argument("-u", "--uid",
52 help="trace this UID only")
70 u32 uid;
82 u32 uid;
96 u32 uid = bpf_get_current_uid_gid();
[all …]
/external/ltp/testcases/kernel/syscalls/setreuid/
Dsetreuid01.c70 * Don't change either real or effective uid in main()
72 ruid = getuid(); /* get real uid */ in main()
75 euid = geteuid(); /* get effective uid */ in main()
82 "setreuid - Don't change either real or effective uid failed, errno=%d : %s", in main()
86 "setreuid - Don't change either real or effective uid returned %ld", in main()
92 * change effective to effective uid in main()
99 "setreuid - change effective to effective uid failed, errno=%d : %s", in main()
103 "setreuid - change effective to effective uid returned %ld", in main()
109 * change real to real uid in main()
116 "setreuid - change real to real uid failed, errno=%d : %s", in main()
[all …]
/external/toybox/toys/pending/
Duseradd.c15 usage: useradd [-SDH] [-h DIR] [-s SHELL] [-G GRP] [-g NAME] [-u UID] USER [GROUP]
26 -u UID User id
37 long uid;
59 // Add a new group to the system, if UID is given then that is validated
60 // to be free, else a free UID is choosen by self.
82 if (TT.uid > INT_MAX) error_exit("bad uid");
83 if (getpwuid(TT.uid)) error_exit("uid '%ld' in use", TT.uid);
85 if (toys.optflags & FLAG_S) TT.uid = CFG_TOYBOX_UID_SYS;
86 else TT.uid = CFG_TOYBOX_UID_USR;
87 //find unused uid
[all …]
/external/iptables/extensions/
Dlibxt_owner.t3 -m owner --uid-owner root;-m owner --uid-owner 0;OK
4 -m owner --uid-owner 0-10;=;OK
7 -m owner --uid-owner root --gid-owner root;-m owner --uid-owner 0 --gid-owner 0;OK
8 -m owner --uid-owner 0-10 --gid-owner 0-10;=;OK
9 -m owner ! --uid-owner root;-m owner ! --uid-owner 0;OK
16 -m owner --uid-owner root;;FAIL
/external/libcap/goapps/gowns/
Dgowns.go20 // uid holds the uid for the base user in this namespace (defaults to getuid).
21 uid int member
23 // uidMap holds the namespace mapping of uid values.
34 baseID = flag.Int("base", -1, "base id for uids and gids (-1 = invoker's uid)")
35 uid = flag.Int("uid", -1, "uid of the hosting user") var
41 uids = flag.String("uids", "", "comma separated UID ranges to map contiguously (req. CAP_SETUID)")
109 base = detail.uid
142 switch *uid {
144 detail.uid = thisUID
146 detail.uid = *uid
[all …]
/external/ltp/testcases/kernel/syscalls/setuid/
Dsetuid01.c8 * setuid(2) returns a value of 0 and uid has been set successfully
20 uid_t uid; in verify_setuid() local
22 /* Set the effective user ID to the current real uid */ in verify_setuid()
23 uid = getuid(); in verify_setuid()
24 UID16_CHECK(uid, setuid); in verify_setuid()
26 TEST(SETUID(uid)); in verify_setuid()
28 tst_res(TFAIL | TTERRNO, "setuid(%d) failed", uid); in verify_setuid()
30 tst_res(TPASS, "setuid(%d) successfully", uid); in verify_setuid()
/external/autotest/server/cros/clique_lib/
Dclique_dut_control.py61 'ControlResult', [ 'uid', 'run_num', 'success',
75 test_params=None, uid=""): argument
86 @param uid: UID of this instance of the object. Host name for DUTRole
93 self._uid = uid
118 def uid(self): member in CliqueControl
193 uid=dut.host.hostname)
200 result = ControlResult(uid=self.uid,
211 result = ControlResult(uid=self.uid,
224 result = ControlResult(uid=self.uid,
247 result = ControlResult(uid=self.uid,
[all …]
/external/ltp/testcases/kernel/syscalls/ipc/msgctl/
Dmsgctl01.c21 static uid_t uid; variable
84 if (buf.msg_perm.uid == uid) { in verify_msgctl()
85 tst_res(TPASS, "msg_perm.uid = %u", (unsigned)uid); in verify_msgctl()
87 tst_res(TFAIL, "msg_perm.uid = %u, expected %u", in verify_msgctl()
88 (unsigned)buf.msg_perm.uid, (unsigned)uid); in verify_msgctl()
98 if (buf.msg_perm.cuid == uid) { in verify_msgctl()
99 tst_res(TPASS, "msg_perm.cuid = %u", (unsigned)uid); in verify_msgctl()
102 (unsigned)buf.msg_perm.cuid, (unsigned)uid); in verify_msgctl()
127 uid = geteuid(); in setup()

12345678910>>...82