/frameworks/base/cmds/installd/ |
H A D | commands.c | 34 int install(const char *pkgname, uid_t uid, gid_t gid) argument 41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 42 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 98 if (selinux_android_setfilecon(pkgdir, pkgname, uid) < 0) { 106 if (chown(pkgdir, uid, gid) < 0) { 144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 151 ALOGE("invalid uid/gid: %d %d\n", uid, gi 192 make_user_data(const char *pkgname, uid_t uid, uid_t persona) argument 300 uid_t uid; local 684 dexopt(const char *apk_path, uid_t uid, int is_public) argument 800 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument [all...] |
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManager.java | 206 * to the AccountAuthenticators. The uid of the caller will be known by the 208 * verify that the package is consistent with the uid (a uid might be shared by many 414 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken 420 * @param uid The uid that identifies the app which is being granted or revoked permission. 424 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument 426 mService.updateAppPermission(account, authTokenType, uid, value);
|
H A D | AccountManagerService.java | 126 private static final String GRANTS_GRANTEE_UID = "uid"; 288 final int uid = cursor.getInt(0); 289 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null; 293 Log.d(TAG, "deleting grants for UID " + uid 296 new String[]{Integer.toString(uid)}); 431 + ", caller's uid " + Binder.getCallingUid() 471 + ", caller's uid " + Binder.getCallingUid() 489 + "caller's uid " + Binder.getCallingUid() 514 + ", caller's uid " + Binder.getCallingUid() 592 + ", caller's uid " 1206 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument 1225 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 2304 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 2326 grantAppPermission(Account account, String authTokenType, int uid) argument 2361 revokeAppPermission(Account account, String authTokenType, int uid) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 499 public int checkPermission(String permission, int pid, int uid) { argument 500 return mBase.checkPermission(permission, pid, uid); 515 String permission, int pid, int uid, String message) { 516 mBase.enforcePermission(permission, pid, uid, message); 541 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 542 return mBase.checkUriPermission(uri, pid, uid, modeFlags); 557 String writePermission, int pid, int uid, int modeFlags) { 559 pid, uid, modeFlags); 564 Uri uri, int pid, int uid, int modeFlags, String message) { 565 mBase.enforceUriPermission(uri, pid, uid, modeFlag 514 enforcePermission( String permission, int pid, int uid, String message) argument 556 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 563 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 581 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | Context.java | 2263 * @param uid The user ID being checked against. A uid of 0 is the root 2267 * pid/uid is allowed that permission, or 2273 public abstract int checkPermission(String permission, int pid, int uid); argument 2278 * {@link #checkPermission(String, int, int)} with the pid and uid returned 2289 * pid/uid is allowed that permission, or 2307 * pid/uid is allowed that permission, or 2322 * @param uid The user ID being checked against. A uid of 0 is the root 2329 String permission, int pid, int uid, Strin 2328 enforcePermission( String permission, int pid, int uid, String message) argument 2444 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 2510 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2532 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2597 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | ConnectivityManager.java | 432 public NetworkInfo getActiveNetworkInfoForUid(int uid) { argument 434 return mService.getActiveNetworkInfoForUid(uid);
|
/frameworks/base/core/java/android/os/ |
H A D | Process.java | 143 * First uid used for fully isolated sandboxed processes (with no permissions of their own) 149 * Last uid used for fully isolated sandboxed processes (with no permissions of their own) 377 * @param uid The user-id under which the process will run. 392 int uid, int gid, int[] gids, 398 return startViaZygote(processClass, niceName, uid, gid, gids, 556 * @param uid a POSIX uid that the new process should setuid() to 569 final int uid, final int gid, 582 argsForZygote.add("--setuid=" + uid); 664 * Returns the identifier of this process's uid 390 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String[] zygoteArgs) argument 567 startViaZygote(final String processClass, final String niceName, final int uid, final int gid, final int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String[] extraArgs) argument 913 setUid(int uid) argument 916 setGid(int uid) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_util_Process.cpp | 389 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument 391 return setuid(uid) == 0 ? 0 : errno; 394 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument 396 return setgid(uid) == 0 ? 0 : errno;
|
H A D | android_util_Binder.cpp | 740 int uid = (int)(token>>32); local 741 if (uid > 0 && uid < 999) {
|
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetServiceImpl.java | 93 * When identifying a Host or Provider based on the calling process, use the uid field. When 98 int uid; field in class:AppWidgetServiceImpl.Provider 108 int uid; field in class:AppWidgetServiceImpl.Host 340 pw.print(host.uid); pw.println(':'); 352 pw.println(id.host.uid); 370 + ", uid=" + Binder.getCallingUid()); 472 if (host.uid == callingUid) { 695 int userId = UserHandle.getUserId(id.provider.uid); 786 int userId = UserHandle.getUserId(id.provider.uid); 1069 int userId = UserHandle.getUserId(id.provider.uid); 1184 lookupHostLocked(int uid, int hostId) argument 1195 lookupOrAddHostLocked(int uid, String packageName, int hostId) argument [all...] |
H A D | NotificationManagerService.java | 318 final int uid; field in class:NotificationManagerService.NotificationRecord 325 NotificationRecord(String pkg, String tag, int id, int uid, int initialPid, argument 331 this.uid = uid; 348 pw.println(prefix + " uid=" + uid + " userId=" + userId); 489 int uid, int initialPid, String message) { 491 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 494 cancelNotification(pkg, tag, id, 0, 0, false, UserHandle.getUserId(uid)); [all...] |
H A D | LocationManagerService.java | 420 final int mUid; // uid of receiver 433 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument 442 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid); 443 mUid = uid; 705 * @param uid the UID 706 * @return resolution level allowed to the pid/uid pair 708 private int getAllowedResolutionLevel(int pid, int uid) { argument 710 pid, uid) == PackageManager.PERMISSION_GRANTED) { 713 pid, uid) == PackageManager.PERMISSION_GRANTED) { 1080 private Receiver getReceiver(ILocationListener listener, int pid, int uid, Strin argument 1097 getReceiver(PendingIntent intent, int pid, int uid, String packageName) argument 1164 checkListenerOrIntent(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName) argument 1203 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument 1517 doesPackageHaveUid(int uid, String packageName) argument [all...] |
H A D | NetworkManagementService.java | 366 Slog.d(TAG, "pushing " + size + " active uid rules"); 1255 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument 1263 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false); 1271 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid); 1273 mUidRejectOnQuota.put(uid, true); 1275 mUidRejectOnQuota.delete(uid); 1290 public NetworkStats getNetworkStatsUidDetail(int uid) { argument 1292 return mStatsFactory.readNetworkStatsDetail(uid); 1333 entry.uid = UID_TETHERING; 1493 public void setFirewallUidRule(int uid, boolea argument [all...] |
H A D | WifiService.java | 628 + ", uid=" + Binder.getCallingUid()); 1228 + ", uid=" + Binder.getCallingUid()); 1347 void enforceWakeSourcePermission(int uid, int pid) { argument 1348 if (uid == android.os.Process.myUid()) { 1352 pid, uid, null); 1434 int uid = Binder.getCallingUid(); 1440 enforceWakeSourcePermission(uid, pid); 1451 wl.mWorkSource = ws != null ? new WorkSource(ws) : new WorkSource(uid); 1579 int uid = Binder.getCallingUid(); 1582 mBatteryStats.noteWifiMulticastEnabled(uid); 1605 removeMulticasterLocked(int i, int uid) argument [all...] |
/frameworks/base/services/java/com/android/server/net/ |
H A D | NetworkStatsService.java | 178 private static final String PREFIX_UID = "uid"; 327 // listen for uid removal to clean stats 511 NetworkTemplate template, int uid, int set, int tag, int fields) { 513 return getUidComplete().getHistory(template, uid, set, tag, fields); 515 return getUidTagComplete().getHistory(template, uid, set, tag, fields); 580 public NetworkStats getDataLayerSnapshotForUid(int uid) throws RemoteException { argument 581 if (Binder.getCallingUid() != uid) { 591 networkLayer = mNetworkManager.getNetworkStatsUidDetail(uid); 618 public void incrementOperationCount(int uid, int tag, int operationCount) { argument 619 if (Binder.getCallingUid() != uid) { 640 setUidForeground(int uid, boolean uidForeground) argument [all...] |
H A D | NetworkPolicyManagerService.java | 194 private static final String TAG_UID_POLICY = "uid-policy"; 211 private static final String ATTR_UID = "uid"; 408 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) { 410 pid, uid, foregroundActivities).sendToTarget(); 414 public void onImportanceChanged(int pid, int uid, int importance) { 418 public void onProcessDied(int pid, int uid) { 419 mHandler.obtainMessage(MSG_PROCESS_DIED, pid, uid).sendToTarget(); 440 final int uid = intent.getIntExtra(EXTRA_UID, -1); 441 if (uid == -1) return; 446 if (LOGV) Slog.v(TAG, "ACTION_PACKAGE_ADDED for uid 1347 setUidPolicy(int uid, int policy) argument 1357 setUidPolicyUnchecked(int uid, int policy, boolean persist) argument 1372 getUidPolicy(int uid) argument 1701 isUidForeground(int uid) argument 1714 computeUidForegroundLocked(int uid) argument 1784 isUidValidForRules(int uid) argument 1794 updateRulesForUidLocked(int uid) argument 1980 setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 435 public int checkPermission(String permission, int pid, int uid) { argument 451 String permission, int pid, int uid, String message) { 476 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 492 String writePermission, int pid, int uid, int modeFlags) { 498 Uri uri, int pid, int uid, int modeFlags, String message) { 516 int pid, int uid, int modeFlags, String message) { 450 enforcePermission( String permission, int pid, int uid, String message) argument 491 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 497 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 514 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
|
H A D | MockPackageManager.java | 191 public String[] getPackagesForUid(int uid) { argument 196 public String getNameForUid(int uid) { argument 275 public List<ProviderInfo> queryContentProviders(String processName, int uid, int flags) { argument
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 260 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid, 371 "can't dump MediaPlayerService from pid=%d, uid=%d\n", 487 int audioSessionId, uid_t uid) 497 mUID = uid; 1957 int uid = IPCThreadState::self()->getCallingUid(); local 1958 if (uid == AID_MEDIA) { 1961 int index = mBatteryData.indexOfKey(uid); 1971 if (mBatteryData.add(uid, info) == NO_MEMORY) { 1977 BatteryUsageInfo &info = mBatteryData.editValueFor(uid); 1994 mBatteryData.removeItem(uid); 484 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument [all...] |
/frameworks/av/media/libstagefright/ |
H A D | AwesomePlayer.cpp | 251 void AwesomePlayer::setUID(uid_t uid) { argument 252 ALOGV("AwesomePlayer running on behalf of uid %d", uid); 254 mUID = uid;
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 945 public int uid; field in class:ActivityManager.RunningServiceInfo 1045 dest.writeInt(uid); 1062 uid = source.readInt(); 1274 * the same uid). 1276 public int uid; field in class:ActivityManager.ProcessErrorStateInfo 1314 dest.writeInt(uid); 1325 uid = source.readInt(); 1380 public int uid; field in class:ActivityManager.RunningAppProcessInfo 1563 dest.writeInt(uid); 1578 uid 1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 1907 checkUidPermission(String permission, int uid) argument [all...] |
H A D | ApplicationPackageManager.java | 373 public String[] getPackagesForUid(int uid) { argument 375 return mPM.getPackagesForUid(uid); 382 public String getNameForUid(int uid) { argument 384 return mPM.getNameForUid(uid); 394 int uid = mPM.getUidForSharedUser(sharedUserName); 395 if(uid != -1) { 396 return uid; 586 int uid, int flags) { 588 return mPM.queryContentProviders(processName, uid, flags); 747 app.uid 585 queryContentProviders(String processName, int uid, int flags) argument [all...] |
H A D | ContextImpl.java | 1501 public int checkPermission(String permission, int pid, int uid) { argument 1508 permission, pid, uid); 1539 boolean selfToo, int uid, String message) { 1544 ? "Neither user " + uid + " nor current process has " 1545 : "uid " + uid + " does not have ") + 1552 String permission, int pid, int uid, String message) { 1554 checkPermission(permission, pid, uid), 1556 uid, 1598 public int checkUriPermission(Uri uri, int pid, int uid, in argument 1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1551 enforcePermission( String permission, int pid, int uid, String message) argument 1624 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1663 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument 1679 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1702 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | ActivityManagerNative.java | 1012 int uid = data.readInt(); 1013 int res = checkPermission(perm, pid, uid); 1023 int uid = data.readInt(); 1025 int res = checkUriPermission(uri, pid, uid, mode); 1384 int uid = data.readInt(); 1385 killApplicationProcess(processName, uid); 1444 int uid = data.readInt(); 1448 crashApplication(uid, initialPid, packageName, message); 3073 public int checkPermission(String permission, int pid, int uid) argument 3080 data.writeInt(uid); 3103 checkUriPermission(Uri uri, int pid, int uid, int mode) argument 3532 killApplicationProcess(String processName, int uid) argument 3621 crashApplication(int uid, int initialPid, String packageName, String message) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | Settings.java | 294 String nativeLibraryPathString, int uid, int vc, int pkgFlags) { 297 if (p.appId == uid) { 306 p.appId = uid; 307 if (addUserIdLPw(uid, p, name)) { 314 SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { argument 317 if (s.userId == uid) { 325 s.userId = uid; 326 if (addUserIdLPw(uid, s, name)) { 351 bp.uid = 0; 492 "Package " + name + " could not be assigned a valid uid"); 293 addPackageLPw(String name, String realName, File codePath, File resourcePath, String nativeLibraryPathString, int uid, int vc, int pkgFlags) argument 676 addUserIdLPw(int uid, Object obj, Object name) argument 707 getUserIdLPr(int uid) argument 717 removeUserIdLPw(int uid) argument 727 replaceUserIdLPw(int uid, Object obj) argument 2455 setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) argument [all...] |