/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkStatsServiceTest.java | 527 // existing uid and total should remain unchanged; but removed UID 665 // now verify that recent history only contains one uid 857 private void assertUidTotal(NetworkTemplate template, int uid, long rxBytes, long rxPackets, argument 859 assertUidTotal(template, uid, SET_ALL, rxBytes, rxPackets, txBytes, txPackets, operations); 862 private void assertUidTotal(NetworkTemplate template, int uid, int set, long rxBytes, argument 866 template, uid, set, TAG_NONE, FIELD_ALL); 873 assertValues(stats, IFACE_ALL, uid, set, TAG_NONE, rxBytes, rxPackets, txBytes, txPackets, 972 private static void assertValues(NetworkStats stats, String iface, int uid, int set, argument 976 final int i = stats.findIndex(iface, uid, SET_DEFAULT, tag); 982 final int i = stats.findIndex(iface, uid, SET_FOREGROUN [all...] |
H A D | NetworkPolicyManagerServiceTest.java | 162 public String[] getPackagesForUid(int uid) { 282 // push all uid into background 298 // and swap another uid into foreground 338 // push strict policy for foreground uid, verify ALLOW rule 922 private void expectSetUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) argument 924 mNetworkManager.setUidNetworkRules(uid, rejectOnQuotaInterfaces); 928 private void expectSetUidForeground(int uid, boolean uidForeground) throws Exception { argument 929 mStatsService.setUidForeground(uid, uidForeground); 933 private Future<Void> expectRulesChanged(int uid, int policy) throws Exception { argument 935 mPolicyListener.onUidRulesChanged(eq(uid), e [all...] |
/frameworks/av/services/camera/libcameraservice/ |
H A D | CameraService.cpp | 260 const int uid = getCallingUid(); local 262 "can't use the camera pid=%d, uid=%d", pid, uid); 1303 "can't dump CameraService from pid=%d, uid=%d\n",
|
/frameworks/base/cmds/installd/ |
H A D | commands.c | 27 int install(const char *pkgname, uid_t uid, gid_t gid) argument 32 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 33 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 75 if (chown(pkgdir, uid, gid) < 0) { 112 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 118 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 119 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 131 ALOGE("fixing uid o 160 make_user_data(const char *pkgname, uid_t uid, uid_t persona) argument 198 uid_t uid; local 563 dexopt(const char *apk_path, uid_t uid, int is_public) argument 669 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument [all...] |
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManager.java | 205 * to the AccountAuthenticators. The uid of the caller will be known by the 207 * verify that the package is consistent with the uid (a uid might be shared by many 408 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken 414 * @param uid The uid that identifies the app which is being granted or revoked permission. 418 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument 420 mService.updateAppPermission(account, authTokenType, uid, value);
|
H A D | AccountManagerService.java | 120 private static final String GRANTS_GRANTEE_UID = "uid"; 274 final int uid = cursor.getInt(0); 275 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null; 279 Log.d(TAG, "deleting grants for UID " + uid 282 new String[]{Integer.toString(uid)}); 405 + ", caller's uid " + Binder.getCallingUid() 445 + ", caller's uid " + Binder.getCallingUid() 463 + "caller's uid " + Binder.getCallingUid() 487 + ", caller's uid " + Binder.getCallingUid() 565 + ", caller's uid " 1196 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument 1215 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 2238 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 2260 grantAppPermission(Account account, String authTokenType, int uid) argument 2294 revokeAppPermission(Account account, String authTokenType, int uid) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ApplicationPackageManager.java | 373 public String[] getPackagesForUid(int uid) { argument 375 return mPM.getPackagesForUid(uid); 382 public String getNameForUid(int uid) { argument 384 return mPM.getNameForUid(uid); 394 int uid = mPM.getUidForSharedUser(sharedUserName); 395 if(uid != -1) { 396 return uid; 554 int uid, int flags) { 556 return mPM.queryContentProviders(processName, uid, flags); 715 app.uid 553 queryContentProviders(String processName, int uid, int flags) argument [all...] |
H A D | ActivityManager.java | 891 public int uid; field in class:ActivityManager.RunningServiceInfo 991 dest.writeInt(uid); 1008 uid = source.readInt(); 1220 * the same uid). 1222 public int uid; field in class:ActivityManager.ProcessErrorStateInfo 1260 dest.writeInt(uid); 1271 uid = source.readInt(); 1326 public int uid; field in class:ActivityManager.RunningAppProcessInfo 1502 dest.writeInt(uid); 1517 uid 1810 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument [all...] |
H A D | ContextImpl.java | 1271 public int checkPermission(String permission, int pid, int uid) { argument 1278 permission, pid, uid); 1309 boolean selfToo, int uid, String message) { 1314 ? "Neither user " + uid + " nor current process has " 1315 : "User " + uid + " does not have ") + 1322 String permission, int pid, int uid, String message) { 1324 checkPermission(permission, pid, uid), 1326 uid, 1368 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 1371 uri, pid, uid, modeFlag 1307 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1321 enforcePermission( String permission, int pid, int uid, String message) argument 1394 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1433 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument 1449 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1472 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 420 public int checkPermission(String permission, int pid, int uid) { argument 421 return mBase.checkPermission(permission, pid, uid); 436 String permission, int pid, int uid, String message) { 437 mBase.enforcePermission(permission, pid, uid, message); 462 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 463 return mBase.checkUriPermission(uri, pid, uid, modeFlags); 478 String writePermission, int pid, int uid, int modeFlags) { 480 pid, uid, modeFlags); 485 Uri uri, int pid, int uid, int modeFlags, String message) { 486 mBase.enforceUriPermission(uri, pid, uid, modeFlag 435 enforcePermission( String permission, int pid, int uid, String message) argument 477 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 484 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 502 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | Context.java | 1963 * @param uid The user ID being checked against. A uid of 0 is the root 1967 * pid/uid is allowed that permission, or 1973 public abstract int checkPermission(String permission, int pid, int uid); argument 1978 * {@link #checkPermission(String, int, int)} with the pid and uid returned 1989 * pid/uid is allowed that permission, or 2007 * pid/uid is allowed that permission, or 2022 * @param uid The user ID being checked against. A uid of 0 is the root 2029 String permission, int pid, int uid, Strin 2028 enforcePermission( String permission, int pid, int uid, String message) argument 2144 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 2210 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2232 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2297 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | Process.java | 137 * First uid used for fully isolated sandboxed processes (with no permissions of their own) 143 * Last uid used for fully isolated sandboxed processes (with no permissions of their own) 357 * @param uid The user-id under which the process will run. 371 int uid, int gid, int[] gids, 375 return startViaZygote(processClass, niceName, uid, gid, gids, 533 * @param uid a POSIX uid that the new process should setuid() to 545 final int uid, final int gid, 556 argsForZygote.add("--setuid=" + uid); 638 int uid 369 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int targetSdkVersion, String[] zygoteArgs) argument 543 startViaZygote(final String processClass, final String niceName, final int uid, final int gid, final int[] gids, int debugFlags, int targetSdkVersion, String[] extraArgs) argument 865 setUid(int uid) argument 868 setGid(int uid) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_util_Process.cpp | 389 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument 391 return setuid(uid) == 0 ? 0 : errno; 394 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument 396 return setgid(uid) == 0 ? 0 : errno;
|
H A D | android_util_Binder.cpp | 745 int uid = (int)(token>>32); local 746 if (uid > 0 && uid < 999) {
|
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetServiceImpl.java | 87 * When identifying a Host or Provider based on the calling process, use the uid field. When 92 int uid; field in class:AppWidgetServiceImpl.Provider 102 int uid; field in class:AppWidgetServiceImpl.Host 309 pw.print(host.uid); pw.println(':'); 321 pw.println(id.host.uid); 339 + ", uid=" + Binder.getCallingUid()); 440 if (host.uid == callingUid) { 648 int userId = UserId.getUserId(id.provider.uid); 739 int userId = UserId.getUserId(id.provider.uid); 1006 int userId = UserId.getUserId(id.provider.uid); 1093 lookupHostLocked(int uid, int hostId) argument 1104 lookupOrAddHostLocked(int uid, String packageName, int hostId) argument [all...] |
H A D | NetworkManagementService.java | 327 Slog.d(TAG, "pushing " + size + " active uid rules"); 1126 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument 1134 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false); 1142 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid); 1144 mUidRejectOnQuota.put(uid, true); 1146 mUidRejectOnQuota.delete(uid); 1161 public NetworkStats getNetworkStatsUidDetail(int uid) { argument 1163 return mStatsFactory.readNetworkStatsDetail(uid); 1204 entry.uid = UID_TETHERING;
|
H A D | NotificationManagerService.java | 315 final int uid; field in class:NotificationManagerService.NotificationRecord 321 NotificationRecord(String pkg, String tag, int id, int uid, int initialPid, int score, Notification notification) argument 326 this.uid = uid; 342 pw.println(prefix + " uid=" + uid); 476 int uid, int initialPid, String message) { 478 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 482 ActivityManagerNative.getDefault().crashApplication(uid, initialPi [all...] |
H A D | LocationManagerService.java | 1063 Receiver receiver, int uid) { 1069 mUid = uid; 1141 private boolean providerHasListener(String provider, int uid, Receiver excludedReceiver) { argument 1146 if (record.mUid == uid && record.mReceiver != excludedReceiver) { 1152 if (alert.mUid == uid) { 1450 public ProximityAlert(int uid, double latitude, double longitude, argument 1452 mUid = uid; 1485 + " uid " + mUid + mIntent + "}"; 2007 for (int uid : uidList) { 2008 if (uid > 1062 UpdateRecord(String provider, long minTime, float minDistance, boolean singleShot, Receiver receiver, int uid) argument [all...] |
H A D | WifiService.java | 545 int uid = Binder.getCallingUid(); 548 if (mScanCount.containsKey(uid)) { 549 count = mScanCount.get(uid); 551 mScanCount.put(uid, ++count); 582 + ", uid=" + Binder.getCallingUid()); 1174 + ", uid=" + Binder.getCallingUid()); 1300 void enforceWakeSourcePermission(int uid, int pid) { argument 1301 if (uid == android.os.Process.myUid()) { 1305 pid, uid, null); 1391 int uid 1562 removeMulticasterLocked(int i, int uid) argument [all...] |
/frameworks/base/services/java/com/android/server/net/ |
H A D | NetworkStatsService.java | 171 private static final String PREFIX_UID = "uid"; 320 // listen for uid removal to clean stats 500 NetworkTemplate template, int uid, int set, int tag, int fields) { 502 return getUidComplete().getHistory(template, uid, set, tag, fields); 504 return getUidTagComplete().getHistory(template, uid, set, tag, fields); 569 public NetworkStats getDataLayerSnapshotForUid(int uid) throws RemoteException { argument 570 if (Binder.getCallingUid() != uid) { 580 networkLayer = mNetworkManager.getNetworkStatsUidDetail(uid); 607 public void incrementOperationCount(int uid, int tag, int operationCount) { argument 608 if (Binder.getCallingUid() != uid) { 629 setUidForeground(int uid, boolean uidForeground) argument 1035 removeUidLocked(int uid) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | Settings.java | 292 String nativeLibraryPathString, int uid, int vc, int pkgFlags) { 295 if (p.appId == uid) { 304 p.appId = uid; 305 if (addUserIdLPw(uid, p, name)) { 312 SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { argument 315 if (s.userId == uid) { 323 s.userId = uid; 324 if (addUserIdLPw(uid, s, name)) { 349 bp.uid = 0; 484 "Package " + name + " could not be assigned a valid uid"); 291 addPackageLPw(String name, String realName, File codePath, File resourcePath, String nativeLibraryPathString, int uid, int vc, int pkgFlags) argument 645 addUserIdLPw(int uid, Object obj, Object name) argument 676 getUserIdLPr(int uid) argument 686 removeUserIdLPw(int uid) argument 696 replaceUserIdLPw(int uid, Object obj) argument 2338 setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 382 public int checkPermission(String permission, int pid, int uid) { argument 398 String permission, int pid, int uid, String message) { 423 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 439 String writePermission, int pid, int uid, int modeFlags) { 445 Uri uri, int pid, int uid, int modeFlags, String message) { 463 int pid, int uid, int modeFlags, String message) { 397 enforcePermission( String permission, int pid, int uid, String message) argument 438 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 444 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 461 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
|
H A D | MockPackageManager.java | 184 public String[] getPackagesForUid(int uid) { argument 189 public String getNameForUid(int uid) { argument 243 public List<ProviderInfo> queryContentProviders(String processName, int uid, int flags) { argument
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 275 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid, 373 "can't dump MediaPlayerService from pid=%d, uid=%d\n", 489 int audioSessionId, uid_t uid) 499 mUID = uid; 2091 int uid = IPCThreadState::self()->getCallingUid(); local 2092 if (uid == AID_MEDIA) { 2095 int index = mBatteryData.indexOfKey(uid); 2105 if (mBatteryData.add(uid, info) == NO_MEMORY) { 2111 BatteryUsageInfo &info = mBatteryData.editValueFor(uid); 2128 mBatteryData.removeItem(uid); 486 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument [all...] |
/frameworks/av/media/libstagefright/ |
H A D | AwesomePlayer.cpp | 250 void AwesomePlayer::setUID(uid_t uid) { argument 251 ALOGV("AwesomePlayer running on behalf of uid %d", uid); 253 mUID = uid;
|