/frameworks/av/include/media/ |
H A D | MediaPlayerInterface.h | 120 virtual status_t setUID(uid_t uid) { argument
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 260 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid, 371 "can't dump MediaPlayerService from pid=%d, uid=%d\n", 487 int audioSessionId, uid_t uid) 497 mUID = uid; 1957 int uid = IPCThreadState::self()->getCallingUid(); local 1958 if (uid == AID_MEDIA) { 1961 int index = mBatteryData.indexOfKey(uid); 1971 if (mBatteryData.add(uid, info) == NO_MEMORY) { 1977 BatteryUsageInfo &info = mBatteryData.editValueFor(uid); 1994 mBatteryData.removeItem(uid); 484 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument [all...] |
H A D | StagefrightPlayer.cpp | 50 status_t StagefrightPlayer::setUID(uid_t uid) { argument 51 mPlayer->setUID(uid);
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | GenericSource.cpp | 38 uid_t uid) 34 GenericSource( const char *url, const KeyedVector<String8, String8> *headers, bool uidValid, uid_t uid) argument
|
H A D | HTTPLiveSource.cpp | 39 bool uidValid, uid_t uid) 42 mUID(uid), 36 HTTPLiveSource( const char *url, const KeyedVector<String8, String8> *headers, bool uidValid, uid_t uid) argument
|
H A D | NuPlayer.cpp | 78 void NuPlayer::setUID(uid_t uid) { argument 80 mUID = uid;
|
H A D | NuPlayerDriver.cpp | 61 status_t NuPlayerDriver::setUID(uid_t uid) { argument 62 mPlayer->setUID(uid);
|
H A D | RTSPSource.cpp | 35 uid_t uid) 38 mUID(uid), 31 RTSPSource( const char *url, const KeyedVector<String8, String8> *headers, bool uidValid, uid_t uid) argument
|
/frameworks/av/media/libstagefright/ |
H A D | AwesomePlayer.cpp | 251 void AwesomePlayer::setUID(uid_t uid) { argument 252 ALOGV("AwesomePlayer running on behalf of uid %d", uid); 254 mUID = uid;
|
H A D | HTTPBase.cpp | 126 void HTTPBase::setUID(uid_t uid) { argument 128 mUID = uid; 131 bool HTTPBase::getUID(uid_t *uid) const { 136 *uid = mUID; 142 void HTTPBase::RegisterSocketUserTag(int sockfd, uid_t uid, uint32_t kTag) { argument 143 int res = qtaguid_tagSocket(sockfd, kTag, uid); 145 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid());
|
H A D | WVMExtractor.cpp | 145 void WVMExtractor::setUID(uid_t uid) { argument 147 mImpl->setUID(uid);
|
/frameworks/av/media/libstagefright/chromium_http/ |
H A D | ChromiumHTTPDataSource.cpp | 64 uid_t uid; local 65 if (getUID(&uid)) { 66 mDelegate->setUID(uid); 68 LOG_PRI(ANDROID_LOG_VERBOSE, LOG_TAG, "connect on behalf of uid %d", uid);
|
H A D | support.cpp | 238 void SfDelegate::setUID(uid_t uid) { argument 239 gReqContext->setUID(uid); 242 bool SfDelegate::getUID(uid_t *uid) const { 243 return gReqContext->getUID(uid);
|
/frameworks/av/media/libstagefright/httplive/ |
H A D | LiveSession.cpp | 43 LiveSession::LiveSession(uint32_t flags, bool uidValid, uid_t uid) argument 46 mUID(uid),
|
/frameworks/av/media/libstagefright/rtsp/ |
H A D | ARTSPConnection.cpp | 44 ARTSPConnection::ARTSPConnection(bool uidValid, uid_t uid) argument 46 mUID(uid),
|
/frameworks/av/services/camera/libcameraservice/ |
H A D | CameraService.cpp | 310 const int uid = getCallingUid(); local 312 "can't use the camera pid=%d, uid=%d", pid, uid); 467 "can't dump CameraService from pid=%d, uid=%d\n",
|
/frameworks/base/cmds/installd/ |
H A D | commands.c | 34 int install(const char *pkgname, uid_t uid, gid_t gid) argument 41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 42 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 98 if (selinux_android_setfilecon(pkgdir, pkgname, uid) < 0) { 106 if (chown(pkgdir, uid, gid) < 0) { 144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 151 ALOGE("invalid uid/gid: %d %d\n", uid, gi 192 make_user_data(const char *pkgname, uid_t uid, uid_t persona) argument 300 uid_t uid; local 684 dexopt(const char *apk_path, uid_t uid, int is_public) argument 800 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument [all...] |
/frameworks/base/cmds/servicemanager/ |
H A D | service_manager.c | 24 * uid can register media.*, etc) 27 unsigned uid; member in struct:__anon955 77 int svc_can_register(unsigned uid, uint16_t *name) argument 81 if ((uid == 0) || (uid == AID_SYSTEM)) 85 if ((uid == allowed[n].uid) && str16eq(name, allowed[n].name)) 132 void *do_find_service(struct binder_state *bs, uint16_t *s, unsigned len, unsigned uid) argument 141 // then check the uid to see if it is isolated. 142 unsigned appid = uid 153 do_add_service(struct binder_state *bs, uint16_t *s, unsigned len, void *ptr, unsigned uid, int allow_isolated) argument [all...] |
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManager.java | 206 * to the AccountAuthenticators. The uid of the caller will be known by the 208 * verify that the package is consistent with the uid (a uid might be shared by many 414 * Change whether or not an app (identified by its uid) is allowed to retrieve an authToken 420 * @param uid The uid that identifies the app which is being granted or revoked permission. 424 public void updateAppPermission(Account account, String authTokenType, int uid, boolean value) { argument 426 mService.updateAppPermission(account, authTokenType, uid, value);
|
H A D | AccountManagerService.java | 126 private static final String GRANTS_GRANTEE_UID = "uid"; 288 final int uid = cursor.getInt(0); 289 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null; 293 Log.d(TAG, "deleting grants for UID " + uid 296 new String[]{Integer.toString(uid)}); 431 + ", caller's uid " + Binder.getCallingUid() 471 + ", caller's uid " + Binder.getCallingUid() 489 + "caller's uid " + Binder.getCallingUid() 514 + ", caller's uid " + Binder.getCallingUid() 592 + ", caller's uid " 1206 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument 1225 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 2304 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 2326 grantAppPermission(Account account, String authTokenType, int uid) argument 2361 revokeAppPermission(Account account, String authTokenType, int uid) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 945 public int uid; field in class:ActivityManager.RunningServiceInfo 1045 dest.writeInt(uid); 1062 uid = source.readInt(); 1274 * the same uid). 1276 public int uid; field in class:ActivityManager.ProcessErrorStateInfo 1314 dest.writeInt(uid); 1325 uid = source.readInt(); 1380 public int uid; field in class:ActivityManager.RunningAppProcessInfo 1563 dest.writeInt(uid); 1578 uid 1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 1907 checkUidPermission(String permission, int uid) argument [all...] |
H A D | ActivityManagerNative.java | 1012 int uid = data.readInt(); 1013 int res = checkPermission(perm, pid, uid); 1023 int uid = data.readInt(); 1025 int res = checkUriPermission(uri, pid, uid, mode); 1384 int uid = data.readInt(); 1385 killApplicationProcess(processName, uid); 1444 int uid = data.readInt(); 1448 crashApplication(uid, initialPid, packageName, message); 3073 public int checkPermission(String permission, int pid, int uid) argument 3080 data.writeInt(uid); 3103 checkUriPermission(Uri uri, int pid, int uid, int mode) argument 3532 killApplicationProcess(String processName, int uid) argument 3621 crashApplication(int uid, int initialPid, String packageName, String message) argument [all...] |
H A D | ApplicationPackageManager.java | 373 public String[] getPackagesForUid(int uid) { argument 375 return mPM.getPackagesForUid(uid); 382 public String getNameForUid(int uid) { argument 384 return mPM.getNameForUid(uid); 394 int uid = mPM.getUidForSharedUser(sharedUserName); 395 if(uid != -1) { 396 return uid; 586 int uid, int flags) { 588 return mPM.queryContentProviders(processName, uid, flags); 747 app.uid 585 queryContentProviders(String processName, int uid, int flags) argument [all...] |
H A D | ContextImpl.java | 1501 public int checkPermission(String permission, int pid, int uid) { argument 1508 permission, pid, uid); 1539 boolean selfToo, int uid, String message) { 1544 ? "Neither user " + uid + " nor current process has " 1545 : "uid " + uid + " does not have ") + 1552 String permission, int pid, int uid, String message) { 1554 checkPermission(permission, pid, uid), 1556 uid, 1598 public int checkUriPermission(Uri uri, int pid, int uid, in argument 1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1551 enforcePermission( String permission, int pid, int uid, String message) argument 1624 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1663 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument 1679 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1702 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | IActivityManager.java | 158 public void killApplicationProcess(String processName, int uid) throws RemoteException; argument 194 public int checkPermission(String permission, int pid, int uid) argument 197 public int checkUriPermission(Uri uri, int pid, int uid, int mode) argument 295 public void crashApplication(int uid, int initialPid, String packageName, argument 359 // manage your activity to make sure it is always the uid you expect.
|