Lines Matching defs:uid

602         public int uid;
606 uid = _uid;
772 int uid;
1113 int uid = msg.arg1;
1116 forceStopPackageLocked(pkg, uid, restart, false, true, false,
1117 UserId.getUserId(uid));
1221 final int uid = msg.arg2;
1222 dispatchProcessDied(pid, uid);
1334 mSelf.mProcessNames.put(app.processName, app.uid, app);
1441 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1462 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1482 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1502 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1849 String processName, int uid) {
1850 if (uid == Process.SYSTEM_UID) {
1852 // processes with the same uid, just pick the first (this
1859 if (UserId.isSameUser(procs.keyAt(i), uid)) return procs.valueAt(i);
1862 ProcessRecord proc = mProcessNames.get(processName, uid);
1889 app = getProcessRecordLocked(processName, info.uid);
1927 if (mBadProcesses.get(info.processName, info.uid) != null) {
1928 if (DEBUG_PROCESSES) Slog.v(TAG, "Bad process: " + info.uid
1937 if (DEBUG_PROCESSES) Slog.v(TAG, "Clearing bad process: " + info.uid
1939 mProcessCrashTimes.remove(info.processName, info.uid);
1940 if (mBadProcesses.get(info.processName, info.uid) != null) {
1941 EventLog.writeEvent(EventLogTags.AM_PROC_GOOD, info.uid,
1943 mBadProcesses.remove(info.processName, info.uid);
1955 + processName + "/" + info.uid + " isolated=" + isolated);
1958 mProcessNames.put(processName, app.uid, app);
1960 mIsolatedProcesses.put(app.uid, app);
2007 int uid = app.uid;
2022 uid = 0;
2026 uid = 0;
2055 app.processName, uid, uid, gids, debugFlags,
2065 EventLog.writeEvent(EventLogTags.AM_PROC_START, startResult.pid, uid,
2085 buf.append(" uid=");
2086 buf.append(uid);
2155 aInfo.applicationInfo.uid);
2302 + item.pid + " uid=" + item.uid + ": "
2304 observer.onForegroundActivitiesChanged(item.pid, item.uid,
2309 + item.pid + " uid=" + item.uid + ": " + item.importance);
2310 observer.onImportanceChanged(item.pid, item.uid,
2321 private void dispatchProcessDied(int pid, int uid) {
2328 observer.onProcessDied(pid, uid);
2418 && mMainStack.mResumedActivity.info.applicationInfo.uid ==
2524 public final int startActivityInPackage(int uid,
2537 int ret = mMainStack.startActivityMayWait(null, uid, intent, resolvedType,
2551 public final int startActivitiesInPackage(int uid,
2562 int ret = mMainStack.startActivities(null, uid, intents, resolvedTypes, resultTo,
2563 options, UserId.getUserId(uid));
2673 + ", uid=" + Binder.getCallingUid()
2702 public void crashApplication(int uid, int initialPid, String packageName,
2708 + ", uid=" + Binder.getCallingUid()
2723 if (p.uid != uid) {
2739 Slog.w(TAG, "crashApplication: nothing for uid=" + uid
2949 stats.noteProcessDiedLocked(app.info.uid, pid);
3373 int uid = Binder.getCallingUid();
3388 if (uid == pkgUid || checkComponentPermission(
3390 pid, uid, -1, true)
3423 + ", uid=" + Binder.getCallingUid()
3456 + ", uid=" + Binder.getCallingUid()
3498 + ", uid=" + Binder.getCallingUid()
3532 * The pkg name and uid have to be specified.
3535 public void killApplicationWithUid(String pkg, int uid) {
3539 // Make sure the uid is valid.
3540 if (uid < 0) {
3541 Slog.w(TAG, "Invalid uid specified for pkg : " + pkg);
3549 msg.arg1 = uid;
3562 final int uid = Binder.getCallingUid();
3565 closeSystemDialogsLocked(uid, reason);
3611 public void killApplicationProcess(String processName, int uid) {
3620 ProcessRecord app = getProcessRecordLocked(processName, uid);
3628 Slog.w(TAG, "Process/uid not found attempting kill of "
3629 + processName + " / " + uid);
3638 private void forceStopPackageLocked(final String packageName, int uid) {
3639 forceStopPackageLocked(packageName, uid, false, false, true, false, UserId.getUserId(uid));
3645 intent.putExtra(Intent.EXTRA_UID, uid);
3649 MY_PID, Process.SYSTEM_UID, UserId.getUserId(uid));
3652 private final boolean killPackageProcessesLocked(String packageName, int uid,
3673 // If uid is specified and the uid and process name match
3674 // Or, the uid is not specified and the process name matches
3675 } else if (((uid > 0 && uid != Process.SYSTEM_UID && app.info.uid == uid)
3678 && uid < 0))) {
3697 private final boolean forceStopPackageLocked(String name, int uid,
3703 if (uid < 0) {
3705 uid = AppGlobals.getPackageManager().getPackageUid(name, userId);
3711 Slog.i(TAG, "Force stopping package " + name + " uid=" + uid);
3716 if (ba.get(uid) != null) {
3722 boolean didSomething = killPackageProcessesLocked(name, uid, -100,
3815 final int uid = app.uid;
3818 + "/" + uid + ")");
3820 mProcessNames.remove(name, uid);
3821 mIsolatedProcesses.remove(app.uid);
3865 EventLog.writeEvent(EventLogTags.AM_PROCESS_START_TIMEOUT, pid, app.uid,
3867 mProcessNames.remove(app.processName, app.uid);
3868 mIsolatedProcesses.remove(app.uid);
3878 if ((app.uid == sr.appInfo.uid
4068 if (hr.app == null && app.uid == hr.info.applicationInfo.uid
4092 if (app != sr.isolatedProc && (app.uid != sr.appInfo.uid
4120 if (!badApp && mBackupTarget != null && mBackupTarget.appInfo.uid == app.uid) {
4408 int uid = AppGlobals.getPackageManager()
4410 if (!UserId.isSameApp(callingUid, uid)) {
4413 + ", uid=" + Binder.getCallingUid()
4414 + ", (need uid=" + uid + ")"
4438 Slog.v(TAG_MU, "getIntentSenderLocked(): uid=" + callingUid);
4505 int uid = AppGlobals.getPackageManager()
4507 if (!UserId.isSameApp(uid, Binder.getCallingUid())) {
4510 + ", uid=" + Binder.getCallingUid()
4547 return res.uid;
4683 public boolean checkPermission(String permission, int pid, int uid) {
4685 uid) == PackageManager.PERMISSION_GRANTED;
4692 int checkComponentPermission(String permission, int pid, int uid,
4699 Slog.d(TAG, "checkComponentPermission() adjusting {pid,uid} to {"
4700 + tlsIdentity.pid + "," + tlsIdentity.uid + "}");
4701 uid = tlsIdentity.uid;
4709 return ActivityManager.checkComponentPermission(permission, uid,
4718 * when only uid-based security is needed.)
4722 public int checkPermission(String permission, int pid, int uid) {
4726 return checkComponentPermission(permission, pid, UserId.getAppId(uid), -1, true);
4750 + ", uid=" + Binder.getCallingUid()
4762 IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) {
4764 "checkHoldingPermissionsLocked: uri=" + uri + " uid=" + uid);
4766 if (pi.applicationInfo.uid == uid) {
4777 && (pm.checkUidPermission(pi.readPermission, uid) == PERMISSION_GRANTED)) {
4781 && (pm.checkUidPermission(pi.writePermission, uid) == PERMISSION_GRANTED)) {
4804 + " check=" + pm.checkUidPermission(pprperm, uid));
4806 if (pm.checkUidPermission(pprperm, uid) == PERMISSION_GRANTED) {
4818 + " check=" + pm.checkUidPermission(ppwperm, uid));
4820 if (pm.checkUidPermission(ppwperm, uid) == PERMISSION_GRANTED) {
4843 private final boolean checkUriPermissionLocked(Uri uri, int uid,
4846 if (uid == 0) {
4849 HashMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid);
4856 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) {
4863 uid = tlsIdentity.uid;
4867 uid = UserId.getAppId(uid);
4873 return checkUriPermissionLocked(uri, uid, modeFlags)
4882 * if callingUid is not allowed to do this. Returns the uid of the target
4885 * If you already know the uid of the target, you can supply it in
4934 "Can't grant URI permission no uid for: " + targetPkg);
5187 grantUriPermissionLocked(r.uid, targetPkg, uri, modeFlags,
5196 = mGrantedUriPermissions.get(perm.uid);
5199 "Removing " + perm.uid + " permission to " + perm.uri);
5202 mGrantedUriPermissions.remove(perm.uid);
5278 "Revoking " + perm.uid + " permission to " + perm.uri);
5335 revokeUriPermissionLocked(r.uid, uri, modeFlags);
5449 + ", uid=" + Binder.getCallingUid()
5561 // If it's the system uid asking, then use the current user id.
5562 // TODO: Make sure that there aren't any other legitimate calls from the system uid that
6039 queryContentProviders(app.processName, app.uid,
6044 Slog.v(TAG_MU, "generateApplicationProvidersLocked, app.info.uid = " + app.uid);
6059 Slog.v(TAG_MU, "generateApplicationProvidersLocked, cpi.uid = " + cpr.uid);
6076 final int callingUid = (r != null) ? r.uid : Binder.getCallingUid();
6078 cpi.applicationInfo.uid, cpi.exported)
6083 cpi.applicationInfo.uid, cpi.exported)
6095 cpi.applicationInfo.uid, cpi.exported)
6100 cpi.applicationInfo.uid, cpi.exported)
6120 + ", uid=" + callingUid + ") that is not exported from uid "
6121 + cpi.applicationInfo.uid;
6125 + ", uid=" + callingUid + ") requires "
6213 int userId = UserId.getUserId(r != null ? r.uid : Binder.getCallingUid());
6349 Slog.w(TAG, "LAUNCHING REMOTE PROVIDER (myuid " + r.uid
6350 + " pruid " + cpr.appInfo.uid + "): " + cpr.info.name, e);
6387 + cpi.applicationInfo.uid + " for provider "
6418 + cpi.applicationInfo.uid + " for provider "
6422 cpi.applicationInfo.uid, name);
6538 Slog.v(TAG_MU, "ProcessRecord uid = " + r.uid);
6556 Slog.v(TAG_MU, "ContentProviderRecord uid = " + dst.uid);
6756 int uid = info.uid;
6758 int userId = UserId.getUserId(uid);
6760 uid = 0;
6766 uid = UserId.getUid(userId, mNextIsolatedProcessUid);
6768 if (mIsolatedProcesses.indexOfKey(uid) < 0) {
6769 // No process for this uid, use it.
6779 ps = stats.getProcessStatsLocked(info.uid, proc);
6781 return new ProcessRecord(ps, thread, info, proc, uid);
6787 app = getProcessRecordLocked(info.processName, info.uid);
6794 mProcessNames.put(info.processName, app.uid, app);
6796 mIsolatedProcesses.put(app.uid, app);
6804 info.packageName, false, UserId.getUserId(app.uid));
6847 // We record the binder invoker's uid in thread-local storage before
6849 // that handles all permissions checks, we look for this uid and use
6850 // that rather than the Activity Manager's own uid. The effect is that
7229 int uid = rec.uid == MY_UID ? Process.SYSTEM_UID : rec.uid;
7231 stats.getPackageStatsLocked(uid, rec.key.packageName);
7697 report.uid = app.info.uid;
7737 crashTime = mProcessCrashTimes.get(app.info.processName, app.uid);
7746 app.info.processName, app.uid);
7760 EventLog.writeEvent(EventLogTags.AM_PROC_BAD, app.uid,
7765 mBadProcesses.put(app.info.processName, app.uid, now);
7766 mProcessCrashTimes.remove(app.info.processName, app.uid);
7843 mProcessCrashTimes.put(app.info.processName, app.uid, now);
8110 + " uid=" + Binder.getCallingUid() + ": " + app);
8348 mProcessCrashTimes.put(r.info.processName, r.uid,
8476 outInfo.uid = app.info.uid;
8571 + ", uid=" + Binder.getCallingUid()
8904 pw.println(" Isolated process list (sorted by uid):");
9014 pw.print(" uid "); pw.print(puid);
9042 pw.print(" uid "); pw.print(puid);
9827 int uid = mGrantedUriPermissions.keyAt(i);
9830 pw.print(" * UID "); pw.print(uid);
10114 wtime = stats.getProcessWakeTime(r.info.uid,
10714 mProviderMap.removeProviderByClass(cpr.name, UserId.getUserId(cpr.uid));
10717 mProviderMap.removeProviderByName(names[j], UserId.getUserId(cpr.uid));
10887 mHandler.obtainMessage(DISPATCH_PROCESS_DIED, app.pid, app.info.uid, null).sendToTarget();
10898 mProcessNames.remove(app.processName, app.uid);
10899 mIsolatedProcesses.remove(app.uid);
10927 mProcessNames.put(app.processName, app.uid, app);
10971 info.uid = r.appInfo.uid;
11100 callingPid, callingUid, r.appInfo.uid, r.exported)
11105 + ", uid=" + callingUid
11106 + " that is not exported from uid " + r.appInfo.uid);
11107 return new ServiceLookupResult(null, "not exported from uid "
11108 + r.appInfo.uid);
11112 + ", uid=" + callingUid
11178 sInfo.applicationInfo.uid, sInfo.packageName,
11183 mServiceMap.putServiceByName(name, UserId.getUserId(r.appInfo.uid), r);
11184 mServiceMap.putServiceByIntent(filter, UserId.getUserId(r.appInfo.uid), r);
11203 callingPid, callingUid, r.appInfo.uid, r.exported)
11208 + ", uid=" + callingUid
11209 + " that is not exported from uid " + r.appInfo.uid);
11210 return new ServiceLookupResult(null, "not exported from uid "
11211 + r.appInfo.uid);
11215 + ", uid=" + callingUid
11332 Slog.v(TAG_MU, "realStartServiceLocked, ServiceRecord.uid = " + r.appInfo.uid
11333 + ", ProcessRecord.uid = " + app.uid);
11533 app = getProcessRecordLocked(appName, r.appInfo.uid);
11535 Slog.v(TAG_MU, "bringUpServiceLocked: appInfo.uid=" + r.appInfo.uid + " app=" + app);
11565 + r.appInfo.uid + " for service "
11783 ComponentName startServiceInPackage(int uid,
11790 resolvedType, -1, uid);
11864 + ", uid=" + Binder.getCallingUid()
11985 if (UserId.getAppId(aInfo.uid) >= Process.FIRST_APPLICATION_UID) {
12014 Slog.i(TAG_MU, "bindService uid=" + Binder.getCallingUid() + " origUid="
12036 if (callerApp.info.uid == Process.SYSTEM_UID) {
12410 Slog.v(TAG_MU, "before serviceDontExecutingLocked, uid="
12499 ss = stats.getServiceStatsLocked(app.uid, app.packageName, app.name);
12505 app.packageName, false, UserId.getUserId(app.uid));
12676 if (callerApp.info.uid != Process.SYSTEM_UID &&
12854 final int uid = intentExtras != null
12856 if (uid >= 0) {
12859 bs.removeUidStatsLocked(uid);
12893 + ", uid=" + callingUid + ")"
12942 + callingPid + ", uid=" + callingUid;
12958 + callingPid + ", uid=" + callingUid
13198 int broadcastIntentInPackage(String packageName, int uid,
13208 serialized, sticky, -1, uid, userId);
13226 + ", uid=" + Binder.getCallingUid()
13329 + ", uid=" + Binder.getCallingPid()
13709 parent.deliverNewIntentLocked(srec.info.applicationInfo.uid, destIntent);
14338 item.uid = app.info.uid;
14530 wtime = stats.getProcessWakeTime(app.info.uid,
14565 stats.reportExcessiveWakeLocked(app.info.uid, app.processName,
14577 stats.reportExcessiveCpuLocked(app.info.uid, app.processName,
14615 app.lastWakeTime = stats.getProcessWakeTime(app.info.uid,
15240 private void checkValidCaller(int uid, int userId) {
15241 if (UserId.getUserId(uid) == userId || uid == Process.SYSTEM_UID || uid == 0) return;
15243 throw new SecurityException("Caller uid=" + uid
15247 private int applyUserId(int uid, int userId) {
15248 return UserId.getUid(userId, uid);
15254 newInfo.uid = applyUserId(info.uid, userId);
15262 || (userId < 1 && aInfo.applicationInfo.uid < UserId.PER_USER_RANGE)) {