Searched defs:uid (Results 76 - 100 of 112) sorted by relevance

12345

/frameworks/base/cmds/installd/
H A Dcommands.c34 int install(const char *pkgname, uid_t uid, gid_t gid) argument
41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
42 ALOGE("invalid uid/gid: %d %d\n", uid, gid);
98 if (selinux_android_setfilecon(pkgdir, pkgname, uid) < 0) {
106 if (chown(pkgdir, uid, gid) < 0) {
144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument
150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
151 ALOGE("invalid uid/gid: %d %d\n", uid, gi
192 make_user_data(const char *pkgname, uid_t uid, uid_t persona) argument
300 uid_t uid; local
684 dexopt(const char *apk_path, uid_t uid, int is_public) argument
800 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument
[all...]
/frameworks/base/core/java/android/accounts/
H A DAccountManager.java206 * to the AccountAuthenticators. The uid of the caller will be known by the
208 * verify that the package is consistent with the uid (a uid might be shared by many
414 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken
420 * @param uid The uid that identifies the app which is being granted or revoked permission.
424 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument
426 mService.updateAppPermission(account, authTokenType, uid, value);
H A DAccountManagerService.java126 private static final String GRANTS_GRANTEE_UID = "uid";
288 final int uid = cursor.getInt(0);
289 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null;
293 Log.d(TAG, "deleting grants for UID " + uid
296 new String[]{Integer.toString(uid)});
431 + ", caller's uid " + Binder.getCallingUid()
471 + ", caller's uid " + Binder.getCallingUid()
489 + "caller's uid " + Binder.getCallingUid()
514 + ", caller's uid " + Binder.getCallingUid()
592 + ", caller's uid "
1206 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument
1225 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument
2304 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument
2326 grantAppPermission(Account account, String authTokenType, int uid) argument
2361 revokeAppPermission(Account account, String authTokenType, int uid) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContextWrapper.java499 public int checkPermission(String permission, int pid, int uid) { argument
500 return mBase.checkPermission(permission, pid, uid);
515 String permission, int pid, int uid, String message) {
516 mBase.enforcePermission(permission, pid, uid, message);
541 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
542 return mBase.checkUriPermission(uri, pid, uid, modeFlags);
557 String writePermission, int pid, int uid, int modeFlags) {
559 pid, uid, modeFlags);
564 Uri uri, int pid, int uid, int modeFlags, String message) {
565 mBase.enforceUriPermission(uri, pid, uid, modeFlag
514 enforcePermission( String permission, int pid, int uid, String message) argument
556 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
563 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
581 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
H A DContext.java2263 * @param uid The user ID being checked against. A uid of 0 is the root
2267 * pid/uid is allowed that permission, or
2273 public abstract int checkPermission(String permission, int pid, int uid); argument
2278 * {@link #checkPermission(String, int, int)} with the pid and uid returned
2289 * pid/uid is allowed that permission, or
2307 * pid/uid is allowed that permission, or
2322 * @param uid The user ID being checked against. A uid of 0 is the root
2329 String permission, int pid, int uid, Strin
2328 enforcePermission( String permission, int pid, int uid, String message) argument
2444 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument
2510 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
2532 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
2597 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
/frameworks/base/core/java/android/net/
H A DConnectivityManager.java432 public NetworkInfo getActiveNetworkInfoForUid(int uid) { argument
434 return mService.getActiveNetworkInfoForUid(uid);
/frameworks/base/core/java/android/os/
H A DProcess.java143 * First uid used for fully isolated sandboxed processes (with no permissions of their own)
149 * Last uid used for fully isolated sandboxed processes (with no permissions of their own)
377 * @param uid The user-id under which the process will run.
392 int uid, int gid, int[] gids,
398 return startViaZygote(processClass, niceName, uid, gid, gids,
556 * @param uid a POSIX uid that the new process should setuid() to
569 final int uid, final int gid,
582 argsForZygote.add("--setuid=" + uid);
664 * Returns the identifier of this process's uid
390 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String[] zygoteArgs) argument
567 startViaZygote(final String processClass, final String niceName, final int uid, final int gid, final int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String[] extraArgs) argument
913 setUid(int uid) argument
916 setGid(int uid) argument
[all...]
/frameworks/base/core/jni/
H A Dandroid_util_Process.cpp389 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument
391 return setuid(uid) == 0 ? 0 : errno;
394 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument
396 return setgid(uid) == 0 ? 0 : errno;
H A Dandroid_util_Binder.cpp740 int uid = (int)(token>>32); local
741 if (uid > 0 && uid < 999) {
/frameworks/base/services/java/com/android/server/
H A DAppWidgetServiceImpl.java93 * When identifying a Host or Provider based on the calling process, use the uid field. When
98 int uid; field in class:AppWidgetServiceImpl.Provider
108 int uid; field in class:AppWidgetServiceImpl.Host
340 pw.print(host.uid); pw.println(':');
352 pw.println(id.host.uid);
370 + ", uid=" + Binder.getCallingUid());
472 if (host.uid == callingUid) {
695 int userId = UserHandle.getUserId(id.provider.uid);
786 int userId = UserHandle.getUserId(id.provider.uid);
1069 int userId = UserHandle.getUserId(id.provider.uid);
1184 lookupHostLocked(int uid, int hostId) argument
1195 lookupOrAddHostLocked(int uid, String packageName, int hostId) argument
[all...]
H A DNotificationManagerService.java318 final int uid; field in class:NotificationManagerService.NotificationRecord
325 NotificationRecord(String pkg, String tag, int id, int uid, int initialPid, argument
331 this.uid = uid;
348 pw.println(prefix + " uid=" + uid + " userId=" + userId);
489 int uid, int initialPid, String message) {
491 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")");
494 cancelNotification(pkg, tag, id, 0, 0, false, UserHandle.getUserId(uid));
[all...]
H A DLocationManagerService.java420 final int mUid; // uid of receiver
433 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument
442 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
443 mUid = uid;
705 * @param uid the UID
706 * @return resolution level allowed to the pid/uid pair
708 private int getAllowedResolutionLevel(int pid, int uid) { argument
710 pid, uid) == PackageManager.PERMISSION_GRANTED) {
713 pid, uid) == PackageManager.PERMISSION_GRANTED) {
1080 private Receiver getReceiver(ILocationListener listener, int pid, int uid, Strin argument
1097 getReceiver(PendingIntent intent, int pid, int uid, String packageName) argument
1164 checkListenerOrIntent(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName) argument
1203 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument
1517 doesPackageHaveUid(int uid, String packageName) argument
[all...]
H A DNetworkManagementService.java366 Slog.d(TAG, "pushing " + size + " active uid rules");
1255 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument
1263 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false);
1271 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid);
1273 mUidRejectOnQuota.put(uid, true);
1275 mUidRejectOnQuota.delete(uid);
1290 public NetworkStats getNetworkStatsUidDetail(int uid) { argument
1292 return mStatsFactory.readNetworkStatsDetail(uid);
1333 entry.uid = UID_TETHERING;
1493 public void setFirewallUidRule(int uid, boolea argument
[all...]
H A DWifiService.java628 + ", uid=" + Binder.getCallingUid());
1228 + ", uid=" + Binder.getCallingUid());
1347 void enforceWakeSourcePermission(int uid, int pid) { argument
1348 if (uid == android.os.Process.myUid()) {
1352 pid, uid, null);
1434 int uid = Binder.getCallingUid();
1440 enforceWakeSourcePermission(uid, pid);
1451 wl.mWorkSource = ws != null ? new WorkSource(ws) : new WorkSource(uid);
1579 int uid = Binder.getCallingUid();
1582 mBatteryStats.noteWifiMulticastEnabled(uid);
1605 removeMulticasterLocked(int i, int uid) argument
[all...]
/frameworks/base/services/java/com/android/server/net/
H A DNetworkStatsService.java178 private static final String PREFIX_UID = "uid";
327 // listen for uid removal to clean stats
511 NetworkTemplate template, int uid, int set, int tag, int fields) {
513 return getUidComplete().getHistory(template, uid, set, tag, fields);
515 return getUidTagComplete().getHistory(template, uid, set, tag, fields);
580 public NetworkStats getDataLayerSnapshotForUid(int uid) throws RemoteException { argument
581 if (Binder.getCallingUid() != uid) {
591 networkLayer = mNetworkManager.getNetworkStatsUidDetail(uid);
618 public void incrementOperationCount(int uid, int tag, int operationCount) { argument
619 if (Binder.getCallingUid() != uid) {
640 setUidForeground(int uid, boolean uidForeground) argument
[all...]
H A DNetworkPolicyManagerService.java194 private static final String TAG_UID_POLICY = "uid-policy";
211 private static final String ATTR_UID = "uid";
408 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) {
410 pid, uid, foregroundActivities).sendToTarget();
414 public void onImportanceChanged(int pid, int uid, int importance) {
418 public void onProcessDied(int pid, int uid) {
419 mHandler.obtainMessage(MSG_PROCESS_DIED, pid, uid).sendToTarget();
440 final int uid = intent.getIntExtra(EXTRA_UID, -1);
441 if (uid == -1) return;
446 if (LOGV) Slog.v(TAG, "ACTION_PACKAGE_ADDED for uid
1347 setUidPolicy(int uid, int policy) argument
1357 setUidPolicyUnchecked(int uid, int policy, boolean persist) argument
1372 getUidPolicy(int uid) argument
1701 isUidForeground(int uid) argument
1714 computeUidForegroundLocked(int uid) argument
1784 isUidValidForRules(int uid) argument
1794 updateRulesForUidLocked(int uid) argument
1980 setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java435 public int checkPermission(String permission, int pid, int uid) { argument
451 String permission, int pid, int uid, String message) {
476 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
492 String writePermission, int pid, int uid, int modeFlags) {
498 Uri uri, int pid, int uid, int modeFlags, String message) {
516 int pid, int uid, int modeFlags, String message) {
450 enforcePermission( String permission, int pid, int uid, String message) argument
491 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
497 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
514 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
H A DMockPackageManager.java191 public String[] getPackagesForUid(int uid) { argument
196 public String getNameForUid(int uid) { argument
275 public List<ProviderInfo> queryContentProviders(String processName, int uid, int flags) { argument
/frameworks/av/media/libmediaplayerservice/
H A DMediaPlayerService.cpp260 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid,
371 "can't dump MediaPlayerService from pid=%d, uid=%d\n",
487 int audioSessionId, uid_t uid)
497 mUID = uid;
1957 int uid = IPCThreadState::self()->getCallingUid(); local
1958 if (uid == AID_MEDIA) {
1961 int index = mBatteryData.indexOfKey(uid);
1971 if (mBatteryData.add(uid, info) == NO_MEMORY) {
1977 BatteryUsageInfo &info = mBatteryData.editValueFor(uid);
1994 mBatteryData.removeItem(uid);
484 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument
[all...]
/frameworks/av/media/libstagefright/
H A DAwesomePlayer.cpp251 void AwesomePlayer::setUID(uid_t uid) { argument
252 ALOGV("AwesomePlayer running on behalf of uid %d", uid);
254 mUID = uid;
/frameworks/base/core/java/android/app/
H A DActivityManager.java945 public int uid; field in class:ActivityManager.RunningServiceInfo
1045 dest.writeInt(uid);
1062 uid = source.readInt();
1274 * the same uid).
1276 public int uid; field in class:ActivityManager.ProcessErrorStateInfo
1314 dest.writeInt(uid);
1325 uid = source.readInt();
1380 public int uid; field in class:ActivityManager.RunningAppProcessInfo
1563 dest.writeInt(uid);
1578 uid
1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
1907 checkUidPermission(String permission, int uid) argument
[all...]
H A DApplicationPackageManager.java373 public String[] getPackagesForUid(int uid) { argument
375 return mPM.getPackagesForUid(uid);
382 public String getNameForUid(int uid) { argument
384 return mPM.getNameForUid(uid);
394 int uid = mPM.getUidForSharedUser(sharedUserName);
395 if(uid != -1) {
396 return uid;
586 int uid, int flags) {
588 return mPM.queryContentProviders(processName, uid, flags);
747 app.uid
585 queryContentProviders(String processName, int uid, int flags) argument
[all...]
H A DContextImpl.java1501 public int checkPermission(String permission, int pid, int uid) { argument
1508 permission, pid, uid);
1539 boolean selfToo, int uid, String message) {
1544 ? "Neither user " + uid + " nor current process has "
1545 : "uid " + uid + " does not have ") +
1552 String permission, int pid, int uid, String message) {
1554 checkPermission(permission, pid, uid),
1556 uid,
1598 public int checkUriPermission(Uri uri, int pid, int uid, in argument
1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1551 enforcePermission( String permission, int pid, int uid, String message) argument
1624 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
1663 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument
1679 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
1702 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
H A DActivityManagerNative.java1012 int uid = data.readInt();
1013 int res = checkPermission(perm, pid, uid);
1023 int uid = data.readInt();
1025 int res = checkUriPermission(uri, pid, uid, mode);
1384 int uid = data.readInt();
1385 killApplicationProcess(processName, uid);
1444 int uid = data.readInt();
1448 crashApplication(uid, initialPid, packageName, message);
3073 public int checkPermission(String permission, int pid, int uid) argument
3080 data.writeInt(uid);
3103 checkUriPermission(Uri uri, int pid, int uid, int mode) argument
3532 killApplicationProcess(String processName, int uid) argument
3621 crashApplication(int uid, int initialPid, String packageName, String message) argument
[all...]
/frameworks/base/services/java/com/android/server/pm/
H A DSettings.java294 String nativeLibraryPathString, int uid, int vc, int pkgFlags) {
297 if (p.appId == uid) {
306 p.appId = uid;
307 if (addUserIdLPw(uid, p, name)) {
314 SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { argument
317 if (s.userId == uid) {
325 s.userId = uid;
326 if (addUserIdLPw(uid, s, name)) {
351 bp.uid = 0;
492 "Package " + name + " could not be assigned a valid uid");
293 addPackageLPw(String name, String realName, File codePath, File resourcePath, String nativeLibraryPathString, int uid, int vc, int pkgFlags) argument
676 addUserIdLPw(int uid, Object obj, Object name) argument
707 getUserIdLPr(int uid) argument
717 removeUserIdLPw(int uid) argument
727 replaceUserIdLPw(int uid, Object obj) argument
2455 setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) argument
[all...]

Completed in 2357 milliseconds

12345