• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Help What Does “[UID]” appended to a root request mean?

Well, UID is basically the user-id--a unique number representing the user name/identification for each user on a Linux system.

Since each app runs as a new "user", each app gets it's own user-id (UID).

I'm pretty sure that I've seen the same format of root verification prompt, but what I currently see is simply "<application> has been granted superuser permissions for an interactive shell" and/or the standard pop-up (indicating the app name and package name) the first time the app asks for root permission.

Are you suspicious that this is not actually Greenify that is asking? SuperSU should be showing/providing the application and package name for the app in question.
 
Upvote 0
Well, UID is basically the user-id--a unique number representing the user name/identification for each user on a Linux system.

Since each app runs as a new "user", each app gets it's own user-id (UID).

I'm pretty sure that I've seen the same format of root verification prompt, but what I currently see is simply "<application> has been granted superuser permissions for an interactive shell" and/or the standard pop-up (indicating the app name and package name) the first time the app asks for root permission.

Are you suspicious that this is not actually Greenify that is asking? SuperSU should be showing/providing the application and package name for the app in question.
I can't find out as I don't have SuperSu Pro.
 
Upvote 0
Here is a screenshot.
I have also entered "pm list packages" into the terminal and have found a few suspicious apps:

com.samsung.intelligenceservice ( Its a system app. Many suspect it is used by the NSA. It also has many, many permissions. )
com.lookout ( Looking this up says that this is the lookout security app. But it not in my apps list, nor is it disabled. )
com.sec.android.app.mt ( Avg's website says that it is adware )
com.gd.mobicore.pa ( Comes from RootPA.apk. Some have seen it re-install itself. )
com.vlingo.midas ( Avg's website says that it is active malware. )
 

Attachments

  • Screenshot_2016-06-12-20-52-46.png
    Screenshot_2016-06-12-20-52-46.png
    98.7 KB · Views: 430
Last edited:
  • Like
Reactions: scary alien
Upvote 0
Can't speak to the other items you listed, but I suspect that there's a service component to Greenifyand that is what you're seeing being reported.

I'm still looking and will report back if I find anything concrete re. this.

Thanks bro. Till then, my device will be off and I have revoked its access to my google account.
I will also be watching my accounts very carefully.

Thanks!
 
Upvote 0
Quick follow-up / update:

I installed Greenify and could not reproduce the output/behavior you posted above.

I see that your screenshot shows a red "#" which means that you denied it access...can you do whatever you did before with it and capture a screenshot of the "Superuser request" pop-up?

That pop-up should show you the app name and the package name of the app in question.

I'm guessing it will be:

Greenify [UID]
com.oasisfeng.greenify

If that is indeed the package name that you see (com.oasisfeng.greenify) and you didn't install any "outside" apps but got them/it directly from the Play Store--then it would be impossible for an app to spoof the package name on your device or from the Play Store (they are absolutely unique) and would indicate that the app is indeed legit.

Let us know!

:)
 
Upvote 0
Quick follow-up / update:

I installed Greenify and could not reproduce the output/behavior you posted above.

I see that your screenshot shows a red "#" which means that you denied it access...can you do whatever you did before with it and capture a screenshot of the "Superuser request" pop-up?

That pop-up should show you the app name and the package name of the app in question.

I'm guessing it will be:

Greenify [UID]
com.oasisfeng.greenify

If that is indeed the package name that you see (com.oasisfeng.greenify) and you didn't install any "outside" apps but got them/it directly from the Play Store--then it would be impossible for an app to spoof the package name on your device or from the Play Store (they are absolutely unique) and would indicate that the app is indeed legit.

Let us know!

:)
Okay. I will try to reproduce it later. I will report back. :p
 
Upvote 0
Quick follow-up / update:

I installed Greenify and could not reproduce the output/behavior you posted above.

I see that your screenshot shows a red "#" which means that you denied it access...can you do whatever you did before with it and capture a screenshot of the "Superuser request" pop-up?

That pop-up should show you the app name and the package name of the app in question.

I'm guessing it will be:

Greenify [UID]
com.oasisfeng.greenify

If that is indeed the package name that you see (com.oasisfeng.greenify) and you didn't install any "outside" apps but got them/it directly from the Play Store--then it would be impossible for an app to spoof the package name on your device or from the Play Store (they are absolutely unique) and would indicate that the app is indeed legit.

Let us know!

:)
I will also add that I haven't installed any outside apps recently. I have installed a couple like android pay but that was long ago.
I'll get you copies of the outside apps that I have installed. I will also tell you what Xposed packages I have as they are outside apps too.
Anyway, I will report back after I try to re-create the root request.
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones