/external/e2fsprogs/tests/f_journal/ |
D | expect.1 | 2 Clearing orphaned inode 37 (uid=0, gid=0, mode=0100600, size=4096) 3 Clearing orphaned inode 90 (uid=0, gid=0, mode=040700, size=1024) 4 Clearing orphaned inode 67 (uid=0, gid=0, mode=0100600, size=4096) 5 Clearing orphaned inode 50 (uid=0, gid=0, mode=0100600, size=4096) 6 Clearing orphaned inode 57 (uid=0, gid=0, mode=040700, size=1024) 7 Clearing orphaned inode 80 (uid=0, gid=0, mode=040700, size=1024) 8 Clearing orphaned inode 45 (uid=0, gid=0, mode=040700, size=1024) 9 Clearing orphaned inode 71 (uid=0, gid=0, mode=0100600, size=4096) 10 Clearing orphaned inode 86 (uid=0, gid=0, mode=040700, size=1024) 11 Clearing orphaned inode 83 (uid=0, gid=0, mode=040700, size=1024) [all …]
|
/external/selinux/python/sepolgen/tests/ |
D | audit.txt | 2 …0=80d2437 a1=bf9132f8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8132 auid=500 uid=0 gid=0 euid=0 suid… 5 …0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0 suid… 8 …0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0 suid… 11 …0=80d2437 a1=bfc0ba38 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid… 14 …0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8145 auid=500 uid=0 gid=0 euid=0 suid… 17 …0=80d2437 a1=bfc0b188 a2=4c56cff4 a3=0 items=0 ppid=8144 pid=8146 auid=500 uid=0 gid=0 euid=0 suid… 20 …0=80d2437 a1=bfc0a6c8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid… 23 …0=80d2437 a1=bfc0a0b8 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8152 auid=500 uid=0 gid=0 euid=0 suid… 26 …0=80d2437 a1=bfc09c78 a2=4c56cff4 a3=0 items=0 ppid=8151 pid=8153 auid=500 uid=0 gid=0 euid=0 suid… 29 …0=80d2437 a1=bfc09be8 a2=4c56cff4 a3=0 items=0 ppid=8131 pid=8144 auid=500 uid=0 gid=0 euid=0 suid… [all …]
|
/external/exoplayer/tree/library/core/src/main/java/com/google/android/exoplayer2/ |
D | AbstractConcatenatedTimeline.java | 30 * Returns UID of child timeline from a concatenated period UID. 32 * @param concatenatedUid UID of a period in a concatenated timeline. 33 * @return UID of the child timeline this period belongs to. 41 * Returns UID of the period in the child timeline from a concatenated period UID. 43 * @param concatenatedUid UID of a period in a concatenated timeline. 44 * @return UID of the period in the child timeline. 52 * Returns a concatenated UID for a period or window in a child timeline. 54 * @param childTimelineUid UID of the child timeline this period or window belongs to. 55 * @param childPeriodOrWindowUid UID of the period or window in the child timeline. 56 * @return UID of the period or window in the concatenated timeline. [all …]
|
/external/selinux/python/sepolgen/tests/test_data/ |
D | audit.log | 2 …2 a0=2 a1=5401 a2=bfb6479c a3=bfb647dc items=0 ppid=6311 pid=6314 auid=500 uid=500 gid=500 euid=0 … 5 … a0=bfdb2fde a1=4 a2=4db18a64 a3=bfdb2fde items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=50… 7 …es exit=24 a0=11833c a1=0 a2=1 a3=8aeffb8 items=0 ppid=1 pid=6306 auid=500 uid=500 gid=500 euid=50… 9 …xit=13 a0=9c0e840 a1=42 a2=1c0 a3=9c0e840 items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=50… 11 … exit=0 a0=d a1=7 a2=bf991e3c a3=bf991e3c items=0 ppid=1 pid=6336 auid=500 uid=500 gid=500 euid=50… 13 type=USER_AUTH msg=audit(1162850343.419:983): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:s… 14 type=USER_ACCT msg=audit(1162850343.419:984): user pid=6377 uid=500 auid=500 subj=staff_u:staff_r:s… 16 … a0=bf95cd98 a1=8000 a2=1b6 a3=8e1f9a8 items=0 ppid=6356 pid=6377 auid=500 uid=500 gid=500 euid=0 … 18 …it=0 a0=bfa1f935 a1=2 a2=bfa1e1e0 a3=0 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=50… 20 …t=2 a0=bfa1f935 a1=0 a2=1b6 a3=85b5008 items=0 ppid=6377 pid=6378 auid=500 uid=500 gid=500 euid=50… [all …]
|
D | httpd.log | 1 type=USER_AVC msg=audit(1163772866.369:8084): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 2 type=USER_AVC msg=audit(1163772866.437:8085): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 3 type=USER_AVC msg=audit(1163772866.449:8086): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 4 type=USER_AVC msg=audit(1163772866.449:8087): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 5 type=USER_AVC msg=audit(1163772866.449:8088): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 6 type=USER_AVC msg=audit(1163772866.453:8089): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 7 type=USER_AVC msg=audit(1163772866.453:8090): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 8 type=USER_AVC msg=audit(1163772866.453:8091): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 9 type=USER_AVC msg=audit(1163772866.453:8092): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… 10 type=USER_AVC msg=audit(1163772866.453:8093): user pid=6659 uid=81 auid=500 subj=staff_u:staff_r:st… [all …]
|
/external/strace/tests-m32/ |
D | so_peercred.c | 86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main() 87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local 107 PRINT_FIELD_UID(", ", *peercred, uid); in main() 122 PRINT_FIELD_UID(", ", *peercred, uid); in main() 139 * struct ucred.uid and struct ucred.gid are not printed. in main() 149 * but smaller than offsetofend(struct ucred, uid): in main() 150 * the part of struct ucred.uid is printed in hex. in main() 158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main() 160 PRINT_FIELD_D(", {", *uid, pid); in main() 161 printf(", uid="); in main() [all …]
|
D | xchownx.c | 97 #define PAIR(val) { val, gid }, { uid, val } 104 unsigned int uid = GETEUID; in main() local 105 CHECK_OVERFLOWUID(uid); in main() 110 const long uid, gid; in main() member 112 { uid, gid }, in main() 113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main() 114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main() 117 { 0xffff0000U | uid, gid }, in main() 118 { uid, 0xffff0000U | gid }, in main() 135 const unsigned int unum = ugid2int(tests[i].uid); in main() [all …]
|
/external/strace/tests/ |
D | so_peercred.c | 86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main() 87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local 107 PRINT_FIELD_UID(", ", *peercred, uid); in main() 122 PRINT_FIELD_UID(", ", *peercred, uid); in main() 139 * struct ucred.uid and struct ucred.gid are not printed. in main() 149 * but smaller than offsetofend(struct ucred, uid): in main() 150 * the part of struct ucred.uid is printed in hex. in main() 158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main() 160 PRINT_FIELD_D(", {", *uid, pid); in main() 161 printf(", uid="); in main() [all …]
|
D | xchownx.c | 97 #define PAIR(val) { val, gid }, { uid, val } 104 unsigned int uid = GETEUID; in main() local 105 CHECK_OVERFLOWUID(uid); in main() 110 const long uid, gid; in main() member 112 { uid, gid }, in main() 113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main() 114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main() 117 { 0xffff0000U | uid, gid }, in main() 118 { uid, 0xffff0000U | gid }, in main() 135 const unsigned int unum = ugid2int(tests[i].uid); in main() [all …]
|
/external/strace/tests-mx32/ |
D | so_peercred.c | 86 const unsigned int sizeof_uid = offsetofend(struct ucred, uid); in main() 87 struct ucred *const uid = tail_alloc(sizeof_uid); in main() local 107 PRINT_FIELD_UID(", ", *peercred, uid); in main() 122 PRINT_FIELD_UID(", ", *peercred, uid); in main() 139 * struct ucred.uid and struct ucred.gid are not printed. in main() 149 * but smaller than offsetofend(struct ucred, uid): in main() 150 * the part of struct ucred.uid is printed in hex. in main() 158 memcpy(uid, uid_truncated, sizeof_uid_truncated); in main() 160 PRINT_FIELD_D(", {", *uid, pid); in main() 161 printf(", uid="); in main() [all …]
|
D | xchownx.c | 97 #define PAIR(val) { val, gid }, { uid, val } 104 unsigned int uid = GETEUID; in main() local 105 CHECK_OVERFLOWUID(uid); in main() 110 const long uid, gid; in main() member 112 { uid, gid }, in main() 113 { (unsigned long) 0xffffffff00000000ULL | uid, gid }, in main() 114 { uid, (unsigned long) 0xffffffff00000000ULL | gid }, in main() 117 { 0xffff0000U | uid, gid }, in main() 118 { uid, 0xffff0000U | gid }, in main() 135 const unsigned int unum = ugid2int(tests[i].uid); in main() [all …]
|
/external/apache-commons-compress/src/main/java/org/apache/commons/compress/archivers/zip/ |
D | X7875_NewUnix.java | 30 * An extra field that stores UNIX UID/GID data (owner & group ownership) for a given 42 * UIDSize 1 byte Size of UID field 43 * UID Variable UID for this entry (little endian) 66 // Also, the spec theoretically allows UID/GID up to 255 bytes long! 69 private BigInteger uid; field in X7875_NewUnix 90 * Gets the UID as a long. UID is typically a 32 bit unsigned 95 * @return the UID value. 97 public long getUID() { return ZipUtil.bigToLong(uid); } in getUID() 110 * Sets the UID. 112 * @param l UID value to set on this extra field. [all …]
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowAppOpsManager.java | 65 // Recorded operations, keyed by "uid|packageName" 67 // "uid|packageName|opCode" => opMode 90 * uid and name of the application whose mode is being modified; if these do not match, the 98 * @param uid The user id of the application whose mode will be changed. 105 public void setMode(String op, int uid, String packageName, int mode) { in setMode() argument 106 setMode(AppOpsManager.strOpToOp(op), uid, packageName, mode); in setMode() local 119 public void setMode(int op, int uid, String packageName, int mode) { in setMode() argument 120 Integer oldMode = appModeMap.put(getOpMapKey(uid, packageName, op), mode); in setMode() 130 public int unsafeCheckOpNoThrow(String op, int uid, String packageName) { in unsafeCheckOpNoThrow() argument 131 return checkOpNoThrow(AppOpsManager.strOpToOp(op), uid, packageName); in unsafeCheckOpNoThrow() [all …]
|
/external/ltp/testcases/kernel/syscalls/add_key/ |
D | add_key03.c | 9 * "_uid.$UID" (or "_uid_ses.$UID"), and it would become the user keyring (or 10 * user session keyring) for user $UID, provided that it hadn't already been 48 uid_t uid = 1; in do_test() local 55 * reproducible for a UID which already has its keyrings, so find an in do_test() 56 * unused UID. Note that it would be better to directly check for the in do_test() 57 * presence of the UID's keyrings than to search the passwd file. in do_test() 58 * However, that's not easy to do given that even if we assumed the UID in do_test() 63 while (getpwuid(uid)) in do_test() 64 uid++; in do_test() 66 sprintf(description, "_uid.%u", uid); in do_test() [all …]
|
/external/libcap/progs/ |
D | quicktest.sh | 96 pass_capsh --uid=1 -- -c "./tcapsh --keep=1 --caps=\"cap_net_raw,cap_net_admin=ip\" --print --uid=1… 100 pass_capsh --uid=1 -- -c "./tcapsh --caps=\"cap_net_raw,cap_net_admin=ip cap_setuid=p\" --print --c… 103 pass_capsh --uid=1 -- -c "./tcapsh --keep=1 --caps=\"cap_net_raw,cap_net_admin=ip\" --uid=1 --forkf… 114 # nobody's uid. Static compilation of the capsh binary can disable pwd 121 fail_capsh --secbits=47 -- -c "./tcapsh --uid=$nouid" 125 # Suppress uid=0 privilege 126 fail_capsh --secbits=47 --print -- -c "./capsh --uid=$nouid" 128 # suppress uid=0 privilege and test this privileged 129 pass_capsh --secbits=0x2f --print -- -c "./privileged --uid=$nouid" 132 fail_capsh --drop=cap_setuid --secbits=0x2f --print -- -c "./privileged --uid=$nouid" [all …]
|
/external/rust/crates/tokio/src/net/unix/ |
D | ucred.rs | 8 /// UID (user ID) of the process 9 uid: uid_t, field 15 /// Gets UID (user ID) of the process. 16 pub fn uid(&self) -> uid_t { in uid() method 17 self.uid in uid() 68 uid: 0, in get_peer_cred() 89 uid: ucred.uid, in get_peer_cred() 118 let mut uid = MaybeUninit::uninit(); in get_peer_cred() localVariable 121 let ret = getpeereid(raw_fd, uid.as_mut_ptr(), gid.as_mut_ptr()); in get_peer_cred() 125 uid: uid.assume_init(), in get_peer_cred() [all …]
|
/external/bcc/tools/ |
D | tcpconnect_example.txt | 41 The -U option prints a UID column: 44 UID PID COMM IP SADDR DADDR DPORT 51 The -u option filtering UID: 54 UID PID COMM IP SADDR DADDR DPORT 72 -U, --print-uid include UID on output 73 -u UID, --uid UID trace this UID only 81 ./tcpconnect -U # include UID 82 ./tcpconnect -u 1000 # only trace UID 1000
|
D | tcpconnect.py | 19 # 09-Jan-2019 Takuma Kume Support filtering by UID 36 ./tcpconnect -U # include UID 37 ./tcpconnect -u 1000 # only trace UID 1000 49 parser.add_argument("-U", "--print-uid", action="store_true", 50 help="include UID on output") 51 parser.add_argument("-u", "--uid", 52 help="trace this UID only") 70 u32 uid; 82 u32 uid; 96 u32 uid = bpf_get_current_uid_gid(); [all …]
|
/external/ltp/testcases/kernel/syscalls/setreuid/ |
D | setreuid01.c | 70 * Don't change either real or effective uid in main() 72 ruid = getuid(); /* get real uid */ in main() 75 euid = geteuid(); /* get effective uid */ in main() 82 "setreuid - Don't change either real or effective uid failed, errno=%d : %s", in main() 86 "setreuid - Don't change either real or effective uid returned %ld", in main() 92 * change effective to effective uid in main() 99 "setreuid - change effective to effective uid failed, errno=%d : %s", in main() 103 "setreuid - change effective to effective uid returned %ld", in main() 109 * change real to real uid in main() 116 "setreuid - change real to real uid failed, errno=%d : %s", in main() [all …]
|
/external/toybox/toys/pending/ |
D | useradd.c | 15 usage: useradd [-SDH] [-h DIR] [-s SHELL] [-G GRP] [-g NAME] [-u UID] USER [GROUP] 26 -u UID User id 37 long uid; 59 // Add a new group to the system, if UID is given then that is validated 60 // to be free, else a free UID is choosen by self. 82 if (TT.uid > INT_MAX) error_exit("bad uid"); 83 if (getpwuid(TT.uid)) error_exit("uid '%ld' in use", TT.uid); 85 if (toys.optflags & FLAG_S) TT.uid = CFG_TOYBOX_UID_SYS; 86 else TT.uid = CFG_TOYBOX_UID_USR; 87 //find unused uid [all …]
|
/external/iptables/extensions/ |
D | libxt_owner.t | 3 -m owner --uid-owner root;-m owner --uid-owner 0;OK 4 -m owner --uid-owner 0-10;=;OK 7 -m owner --uid-owner root --gid-owner root;-m owner --uid-owner 0 --gid-owner 0;OK 8 -m owner --uid-owner 0-10 --gid-owner 0-10;=;OK 9 -m owner ! --uid-owner root;-m owner ! --uid-owner 0;OK 16 -m owner --uid-owner root;;FAIL
|
/external/libcap/goapps/gowns/ |
D | gowns.go | 20 // uid holds the uid for the base user in this namespace (defaults to getuid). 21 uid int member 23 // uidMap holds the namespace mapping of uid values. 34 baseID = flag.Int("base", -1, "base id for uids and gids (-1 = invoker's uid)") 35 uid = flag.Int("uid", -1, "uid of the hosting user") var 41 uids = flag.String("uids", "", "comma separated UID ranges to map contiguously (req. CAP_SETUID)") 109 base = detail.uid 142 switch *uid { 144 detail.uid = thisUID 146 detail.uid = *uid [all …]
|
/external/ltp/testcases/kernel/syscalls/setuid/ |
D | setuid01.c | 8 * setuid(2) returns a value of 0 and uid has been set successfully 20 uid_t uid; in verify_setuid() local 22 /* Set the effective user ID to the current real uid */ in verify_setuid() 23 uid = getuid(); in verify_setuid() 24 UID16_CHECK(uid, setuid); in verify_setuid() 26 TEST(SETUID(uid)); in verify_setuid() 28 tst_res(TFAIL | TTERRNO, "setuid(%d) failed", uid); in verify_setuid() 30 tst_res(TPASS, "setuid(%d) successfully", uid); in verify_setuid()
|
/external/autotest/server/cros/clique_lib/ |
D | clique_dut_control.py | 61 'ControlResult', [ 'uid', 'run_num', 'success', 75 test_params=None, uid=""): argument 86 @param uid: UID of this instance of the object. Host name for DUTRole 93 self._uid = uid 118 def uid(self): member in CliqueControl 193 uid=dut.host.hostname) 200 result = ControlResult(uid=self.uid, 211 result = ControlResult(uid=self.uid, 224 result = ControlResult(uid=self.uid, 247 result = ControlResult(uid=self.uid, [all …]
|
/external/ltp/testcases/kernel/syscalls/ipc/msgctl/ |
D | msgctl01.c | 21 static uid_t uid; variable 84 if (buf.msg_perm.uid == uid) { in verify_msgctl() 85 tst_res(TPASS, "msg_perm.uid = %u", (unsigned)uid); in verify_msgctl() 87 tst_res(TFAIL, "msg_perm.uid = %u, expected %u", in verify_msgctl() 88 (unsigned)buf.msg_perm.uid, (unsigned)uid); in verify_msgctl() 98 if (buf.msg_perm.cuid == uid) { in verify_msgctl() 99 tst_res(TPASS, "msg_perm.cuid = %u", (unsigned)uid); in verify_msgctl() 102 (unsigned)buf.msg_perm.cuid, (unsigned)uid); in verify_msgctl() 127 uid = geteuid(); in setup()
|