Searched defs:uid (Results 76 - 100 of 113) sorted by relevance

12345

/frameworks/base/services/tests/servicestests/src/com/android/server/
H A DNetworkStatsServiceTest.java527 // existing uid and total should remain unchanged; but removed UID
665 // now verify that recent history only contains one uid
857 private void assertUidTotal(NetworkTemplate template, int uid, long rxBytes, long rxPackets, argument
859 assertUidTotal(template, uid, SET_ALL, rxBytes, rxPackets, txBytes, txPackets, operations);
862 private void assertUidTotal(NetworkTemplate template, int uid, int set, long rxBytes, argument
866 template, uid, set, TAG_NONE, FIELD_ALL);
873 assertValues(stats, IFACE_ALL, uid, set, TAG_NONE, rxBytes, rxPackets, txBytes, txPackets,
972 private static void assertValues(NetworkStats stats, String iface, int uid, int set, argument
976 final int i = stats.findIndex(iface, uid, SET_DEFAULT, tag);
982 final int i = stats.findIndex(iface, uid, SET_FOREGROUN
[all...]
H A DNetworkPolicyManagerServiceTest.java162 public String[] getPackagesForUid(int uid) {
282 // push all uid into background
298 // and swap another uid into foreground
338 // push strict policy for foreground uid, verify ALLOW rule
922 private void expectSetUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) argument
924 mNetworkManager.setUidNetworkRules(uid, rejectOnQuotaInterfaces);
928 private void expectSetUidForeground(int uid, boolean uidForeground) throws Exception { argument
929 mStatsService.setUidForeground(uid, uidForeground);
933 private Future<Void> expectRulesChanged(int uid, int policy) throws Exception { argument
935 mPolicyListener.onUidRulesChanged(eq(uid), e
[all...]
/frameworks/av/services/camera/libcameraservice/
H A DCameraService.cpp260 const int uid = getCallingUid(); local
262 "can't use the camera pid=%d, uid=%d", pid, uid);
1303 "can't dump CameraService from pid=%d, uid=%d\n",
/frameworks/base/cmds/installd/
H A Dcommands.c27 int install(const char *pkgname, uid_t uid, gid_t gid) argument
32 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
33 ALOGE("invalid uid/gid: %d %d\n", uid, gid);
75 if (chown(pkgdir, uid, gid) < 0) {
112 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument
118 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
119 ALOGE("invalid uid/gid: %d %d\n", uid, gid);
131 ALOGE("fixing uid o
160 make_user_data(const char *pkgname, uid_t uid, uid_t persona) argument
198 uid_t uid; local
563 dexopt(const char *apk_path, uid_t uid, int is_public) argument
669 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument
[all...]
/frameworks/base/core/java/android/accounts/
H A DAccountManager.java205 * to the AccountAuthenticators. The uid of the caller will be known by the
207 * verify that the package is consistent with the uid (a uid might be shared by many
408 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken
414 * @param uid The uid that identifies the app which is being granted or revoked permission.
418 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument
420 mService.updateAppPermission(account, authTokenType, uid, value);
H A DAccountManagerService.java120 private static final String GRANTS_GRANTEE_UID = "uid";
274 final int uid = cursor.getInt(0);
275 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null;
279 Log.d(TAG, "deleting grants for UID " + uid
282 new String[]{Integer.toString(uid)});
405 + ", caller's uid " + Binder.getCallingUid()
445 + ", caller's uid " + Binder.getCallingUid()
463 + "caller's uid " + Binder.getCallingUid()
487 + ", caller's uid " + Binder.getCallingUid()
565 + ", caller's uid "
1196 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument
1215 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument
2238 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument
2260 grantAppPermission(Account account, String authTokenType, int uid) argument
2294 revokeAppPermission(Account account, String authTokenType, int uid) argument
[all...]
/frameworks/base/core/java/android/app/
H A DApplicationPackageManager.java373 public String[] getPackagesForUid(int uid) { argument
375 return mPM.getPackagesForUid(uid);
382 public String getNameForUid(int uid) { argument
384 return mPM.getNameForUid(uid);
394 int uid = mPM.getUidForSharedUser(sharedUserName);
395 if(uid != -1) {
396 return uid;
554 int uid, int flags) {
556 return mPM.queryContentProviders(processName, uid, flags);
715 app.uid
553 queryContentProviders(String processName, int uid, int flags) argument
[all...]
H A DActivityManager.java891 public int uid; field in class:ActivityManager.RunningServiceInfo
991 dest.writeInt(uid);
1008 uid = source.readInt();
1220 * the same uid).
1222 public int uid; field in class:ActivityManager.ProcessErrorStateInfo
1260 dest.writeInt(uid);
1271 uid = source.readInt();
1326 public int uid; field in class:ActivityManager.RunningAppProcessInfo
1502 dest.writeInt(uid);
1517 uid
1810 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
[all...]
H A DContextImpl.java1271 public int checkPermission(String permission, int pid, int uid) { argument
1278 permission, pid, uid);
1309 boolean selfToo, int uid, String message) {
1314 ? "Neither user " + uid + " nor current process has "
1315 : "User " + uid + " does not have ") +
1322 String permission, int pid, int uid, String message) {
1324 checkPermission(permission, pid, uid),
1326 uid,
1368 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
1371 uri, pid, uid, modeFlag
1307 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1321 enforcePermission( String permission, int pid, int uid, String message) argument
1394 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
1433 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument
1449 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
1472 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContextWrapper.java420 public int checkPermission(String permission, int pid, int uid) { argument
421 return mBase.checkPermission(permission, pid, uid);
436 String permission, int pid, int uid, String message) {
437 mBase.enforcePermission(permission, pid, uid, message);
462 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
463 return mBase.checkUriPermission(uri, pid, uid, modeFlags);
478 String writePermission, int pid, int uid, int modeFlags) {
480 pid, uid, modeFlags);
485 Uri uri, int pid, int uid, int modeFlags, String message) {
486 mBase.enforceUriPermission(uri, pid, uid, modeFlag
435 enforcePermission( String permission, int pid, int uid, String message) argument
477 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
484 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
502 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
H A DContext.java1963 * @param uid The user ID being checked against. A uid of 0 is the root
1967 * pid/uid is allowed that permission, or
1973 public abstract int checkPermission(String permission, int pid, int uid); argument
1978 * {@link #checkPermission(String, int, int)} with the pid and uid returned
1989 * pid/uid is allowed that permission, or
2007 * pid/uid is allowed that permission, or
2022 * @param uid The user ID being checked against. A uid of 0 is the root
2029 String permission, int pid, int uid, Strin
2028 enforcePermission( String permission, int pid, int uid, String message) argument
2144 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument
2210 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
2232 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
2297 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
/frameworks/base/core/java/android/os/
H A DProcess.java137 * First uid used for fully isolated sandboxed processes (with no permissions of their own)
143 * Last uid used for fully isolated sandboxed processes (with no permissions of their own)
357 * @param uid The user-id under which the process will run.
371 int uid, int gid, int[] gids,
375 return startViaZygote(processClass, niceName, uid, gid, gids,
533 * @param uid a POSIX uid that the new process should setuid() to
545 final int uid, final int gid,
556 argsForZygote.add("--setuid=" + uid);
638 int uid
369 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int targetSdkVersion, String[] zygoteArgs) argument
543 startViaZygote(final String processClass, final String niceName, final int uid, final int gid, final int[] gids, int debugFlags, int targetSdkVersion, String[] extraArgs) argument
865 setUid(int uid) argument
868 setGid(int uid) argument
[all...]
/frameworks/base/core/jni/
H A Dandroid_util_Process.cpp389 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument
391 return setuid(uid) == 0 ? 0 : errno;
394 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument
396 return setgid(uid) == 0 ? 0 : errno;
H A Dandroid_util_Binder.cpp745 int uid = (int)(token>>32); local
746 if (uid > 0 && uid < 999) {
/frameworks/base/services/java/com/android/server/
H A DAppWidgetServiceImpl.java87 * When identifying a Host or Provider based on the calling process, use the uid field. When
92 int uid; field in class:AppWidgetServiceImpl.Provider
102 int uid; field in class:AppWidgetServiceImpl.Host
309 pw.print(host.uid); pw.println(':');
321 pw.println(id.host.uid);
339 + ", uid=" + Binder.getCallingUid());
440 if (host.uid == callingUid) {
648 int userId = UserId.getUserId(id.provider.uid);
739 int userId = UserId.getUserId(id.provider.uid);
1006 int userId = UserId.getUserId(id.provider.uid);
1093 lookupHostLocked(int uid, int hostId) argument
1104 lookupOrAddHostLocked(int uid, String packageName, int hostId) argument
[all...]
H A DNetworkManagementService.java327 Slog.d(TAG, "pushing " + size + " active uid rules");
1126 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument
1134 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false);
1142 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid);
1144 mUidRejectOnQuota.put(uid, true);
1146 mUidRejectOnQuota.delete(uid);
1161 public NetworkStats getNetworkStatsUidDetail(int uid) { argument
1163 return mStatsFactory.readNetworkStatsDetail(uid);
1204 entry.uid = UID_TETHERING;
H A DNotificationManagerService.java315 final int uid; field in class:NotificationManagerService.NotificationRecord
321 NotificationRecord(String pkg, String tag, int id, int uid, int initialPid, int score, Notification notification) argument
326 this.uid = uid;
342 pw.println(prefix + " uid=" + uid);
476 int uid, int initialPid, String message) {
478 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")");
482 ActivityManagerNative.getDefault().crashApplication(uid, initialPi
[all...]
H A DLocationManagerService.java1063 Receiver receiver, int uid) {
1069 mUid = uid;
1141 private boolean providerHasListener(String provider, int uid, Receiver excludedReceiver) { argument
1146 if (record.mUid == uid && record.mReceiver != excludedReceiver) {
1152 if (alert.mUid == uid) {
1450 public ProximityAlert(int uid, double latitude, double longitude, argument
1452 mUid = uid;
1485 + " uid " + mUid + mIntent + "}";
2007 for (int uid : uidList) {
2008 if (uid >
1062 UpdateRecord(String provider, long minTime, float minDistance, boolean singleShot, Receiver receiver, int uid) argument
[all...]
H A DWifiService.java545 int uid = Binder.getCallingUid();
548 if (mScanCount.containsKey(uid)) {
549 count = mScanCount.get(uid);
551 mScanCount.put(uid, ++count);
582 + ", uid=" + Binder.getCallingUid());
1174 + ", uid=" + Binder.getCallingUid());
1300 void enforceWakeSourcePermission(int uid, int pid) { argument
1301 if (uid == android.os.Process.myUid()) {
1305 pid, uid, null);
1391 int uid
1562 removeMulticasterLocked(int i, int uid) argument
[all...]
/frameworks/base/services/java/com/android/server/net/
H A DNetworkStatsService.java171 private static final String PREFIX_UID = "uid";
320 // listen for uid removal to clean stats
500 NetworkTemplate template, int uid, int set, int tag, int fields) {
502 return getUidComplete().getHistory(template, uid, set, tag, fields);
504 return getUidTagComplete().getHistory(template, uid, set, tag, fields);
569 public NetworkStats getDataLayerSnapshotForUid(int uid) throws RemoteException { argument
570 if (Binder.getCallingUid() != uid) {
580 networkLayer = mNetworkManager.getNetworkStatsUidDetail(uid);
607 public void incrementOperationCount(int uid, int tag, int operationCount) { argument
608 if (Binder.getCallingUid() != uid) {
629 setUidForeground(int uid, boolean uidForeground) argument
1035 removeUidLocked(int uid) argument
[all...]
/frameworks/base/services/java/com/android/server/pm/
H A DSettings.java292 String nativeLibraryPathString, int uid, int vc, int pkgFlags) {
295 if (p.appId == uid) {
304 p.appId = uid;
305 if (addUserIdLPw(uid, p, name)) {
312 SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { argument
315 if (s.userId == uid) {
323 s.userId = uid;
324 if (addUserIdLPw(uid, s, name)) {
349 bp.uid = 0;
484 "Package " + name + " could not be assigned a valid uid");
291 addPackageLPw(String name, String realName, File codePath, File resourcePath, String nativeLibraryPathString, int uid, int vc, int pkgFlags) argument
645 addUserIdLPw(int uid, Object obj, Object name) argument
676 getUserIdLPr(int uid) argument
686 removeUserIdLPw(int uid) argument
696 replaceUserIdLPw(int uid, Object obj) argument
2338 setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java382 public int checkPermission(String permission, int pid, int uid) { argument
398 String permission, int pid, int uid, String message) {
423 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
439 String writePermission, int pid, int uid, int modeFlags) {
445 Uri uri, int pid, int uid, int modeFlags, String message) {
463 int pid, int uid, int modeFlags, String message) {
397 enforcePermission( String permission, int pid, int uid, String message) argument
438 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
444 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
461 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
H A DMockPackageManager.java184 public String[] getPackagesForUid(int uid) { argument
189 public String getNameForUid(int uid) { argument
243 public List<ProviderInfo> queryContentProviders(String processName, int uid, int flags) { argument
/frameworks/av/media/libmediaplayerservice/
H A DMediaPlayerService.cpp275 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid,
373 "can't dump MediaPlayerService from pid=%d, uid=%d\n",
489 int audioSessionId, uid_t uid)
499 mUID = uid;
2091 int uid = IPCThreadState::self()->getCallingUid(); local
2092 if (uid == AID_MEDIA) {
2095 int index = mBatteryData.indexOfKey(uid);
2105 if (mBatteryData.add(uid, info) == NO_MEMORY) {
2111 BatteryUsageInfo &info = mBatteryData.editValueFor(uid);
2128 mBatteryData.removeItem(uid);
486 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument
[all...]
/frameworks/av/media/libstagefright/
H A DAwesomePlayer.cpp250 void AwesomePlayer::setUID(uid_t uid) { argument
251 ALOGV("AwesomePlayer running on behalf of uid %d", uid);
253 mUID = uid;

Completed in 398 milliseconds

12345