/frameworks/base/core/java/android/app/ |
H A D | IActivityManager.java | 158 public void killApplicationProcess(String processName, int uid) throws RemoteException; argument 194 public int checkPermission(String permission, int pid, int uid) argument 197 public int checkUriPermission(Uri uri, int pid, int uid, int mode) argument 295 public void crashApplication(int uid, int initialPid, String packageName, argument 359 // manage your activity to make sure it is always the uid you expect.
|
H A D | ActivityManagerNative.java | 1012 int uid = data.readInt(); 1013 int res = checkPermission(perm, pid, uid); 1023 int uid = data.readInt(); 1025 int res = checkUriPermission(uri, pid, uid, mode); 1384 int uid = data.readInt(); 1385 killApplicationProcess(processName, uid); 1444 int uid = data.readInt(); 1448 crashApplication(uid, initialPid, packageName, message); 3073 public int checkPermission(String permission, int pid, int uid) argument 3080 data.writeInt(uid); 3103 checkUriPermission(Uri uri, int pid, int uid, int mode) argument 3532 killApplicationProcess(String processName, int uid) argument 3621 crashApplication(int uid, int initialPid, String packageName, String message) argument [all...] |
H A D | ActivityThread.java | 692 Slog.v(TAG, "scheduleBindService token=" + token + " intent=" + intent + " uid=" 1768 + "/" + mBoundApplication.appInfo.uid); 1792 boolean securityViolation = includeCode && ai.uid != 0 1793 && ai.uid != Process.SYSTEM_UID && (mBoundApplication != null 1794 ? !UserHandle.isSameApp(ai.uid, mBoundApplication.appInfo.uid) 1801 + " (with uid " + ai.uid + ")"; 1804 + mBoundApplication.processName + " (with uid " 1805 + mBoundApplication.appInfo.uid [all...] |
H A D | LoadedApk.java | 122 mResDir = aInfo.uid == myUid ? aInfo.sourceDir 124 if (!UserHandle.isSameUser(aInfo.uid, myUid) && !Process.isIsolated()) {
|
/frameworks/base/core/jni/ |
H A D | android_util_Process.cpp | 389 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument 391 return setuid(uid) == 0 ? 0 : errno; 394 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument 396 return setgid(uid) == 0 ? 0 : errno;
|
H A D | android_util_Binder.cpp | 740 int uid = (int)(token>>32); local 741 if (uid > 0 && uid < 999) {
|
H A D | android_net_LocalSocketImpl.cpp | 827 creds.pid, creds.uid, creds.gid);
|
/frameworks/base/services/java/com/android/server/am/ |
H A D | ActivityRecord.java | 61 final int launchedFromUid; // always the uid who started the activity. 330 userId = UserHandle.getUserId(aInfo.applicationInfo.uid); 396 && (aInfo.applicationInfo.uid == Process.SYSTEM_UID 397 || aInfo.applicationInfo.uid == _caller.info.uid)) {
|
H A D | TaskRecord.java | 104 userId = UserHandle.getUserId(info.applicationInfo.uid);
|
H A D | ServiceRecord.java | 303 userId = UserHandle.getUserId(appInfo.uid); 355 final int appUid = appInfo.uid;
|
/frameworks/base/services/java/com/android/server/pm/ |
H A D | UserManagerService.java | 355 final int uid = Binder.getCallingUid(); 356 if (uid != Process.SYSTEM_UID && uid != 0 359 uid, -1, true) != PackageManager.PERMISSION_GRANTED) { 927 + ", uid=" + Binder.getCallingUid()
|
/frameworks/native/services/surfaceflinger/ |
H A D | SurfaceFlinger.cpp | 2130 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", 2427 const int uid = ipc->getCallingUid(); local 2428 if ((uid != AID_GRAPHICS) && 2429 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) { 2431 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid); 2441 const int uid = ipc->getCallingUid(); local 2442 if ((uid != AID_GRAPHICS) && 2443 !PermissionCache::checkPermission(sReadFramebuffer, pid, uid)) { 2445 "can't read framebuffer pid=%d, uid 2458 const int uid = ipc->getCallingUid(); local [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | BackupManagerService.java | 803 // Build our mapping of uid to backup client services. This implicitly 1367 final int uid = extras.getInt(Intent.EXTRA_UID); 1372 // under the old uid and fall through to re-add. 1373 removePackageParticipantsLocked(pkgList, uid); 1382 removePackageParticipantsLocked(pkgList, uid); 1428 int uid = pkg.applicationInfo.uid; 1429 HashSet<String> set = mBackupParticipants.get(uid); 1432 mBackupParticipants.put(uid, set); 1451 if (DEBUG) Slog.v(TAG, "removePackageParticipantsLocked: uid [all...] |
H A D | AlarmManagerService.java | 468 + ", uid=" + Binder.getCallingUid()); 743 final int uid = ActivityManagerNative.getDefault() 745 if (uid >= 0) { 746 mWakeLock.setWorkSource(new WorkSource(uid));
|
H A D | WallpaperManagerService.java | 296 public void onPackageUpdateFinished(String packageName, int uid) { argument 336 public void onPackageUpdateStarted(String packageName, int uid) { argument 352 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument 1266 + ", uid=" + Binder.getCallingUid());
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | NuPlayer.cpp | 78 void NuPlayer::setUID(uid_t uid) { argument 80 mUID = uid;
|
/frameworks/av/media/libstagefright/httplive/ |
H A D | LiveSession.cpp | 43 LiveSession::LiveSession(uint32_t flags, bool uidValid, uid_t uid) argument 46 mUID(uid),
|
/frameworks/av/media/libstagefright/include/ |
H A D | AwesomePlayer.h | 62 void setUID(uid_t uid);
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | ComponentTest.java | 600 pi.applicationInfo.uid, 0); 618 pi.applicationInfo.uid, 0); 624 pi.applicationInfo.uid, GET_DISABLED_COMPONENTS);
|
/frameworks/base/services/java/com/android/server/connectivity/ |
H A D | Vpn.java | 221 if (Binder.getCallingUid() != app.uid) { 244 if (Binder.getCallingUid() != app.uid) { 378 if (Binder.getCallingUid() == app.uid) {
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.h | 365 uid_t uid);
|
/frameworks/av/media/libstagefright/rtsp/ |
H A D | ARTSPConnection.cpp | 44 ARTSPConnection::ARTSPConnection(bool uidValid, uid_t uid) argument 46 mUID(uid),
|
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManager.java | 206 * to the AccountAuthenticators. The uid of the caller will be known by the 208 * verify that the package is consistent with the uid (a uid might be shared by many 414 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken 420 * @param uid The uid that identifies the app which is being granted or revoked permission. 424 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument 426 mService.updateAppPermission(account, authTokenType, uid, value);
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 264 if((pkgInfo.applicationInfo != null) && (pkgInfo.applicationInfo.uid != -1)) { 265 getAllUsedPermissions(pkgInfo.applicationInfo.uid, permSet);
|
/frameworks/av/media/libstagefright/ |
H A D | AwesomePlayer.cpp | 251 void AwesomePlayer::setUID(uid_t uid) { argument 252 ALOGV("AwesomePlayer running on behalf of uid %d", uid); 254 mUID = uid;
|