/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 44 uid_t uid; member in struct:android::PermissionCache::Entry 47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid); 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 74 pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 46 data.writeInt32(uid); 67 int32_t uid = data.readInt32(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 61 uid_t uid = ipcState->getCallingUid(); local 63 if (outUid) *outUid = uid; 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 81 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d", 83 String8(permission).string(), uid, pid); 90 ALOGW("Permission failure: %s from uid=%d pid=%d", 91 String8(permission).string(), uid, pid); 109 ALOGI("Waiting to check permission %s from uid [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 51 cache(const String16& permission, uid_t uid, bool granted) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/native/services/sensorservice/ |
H A D | BatteryService.cpp | 41 status_t BatteryService::noteStartSensor(int uid, int handle) { argument 44 data.writeInt32(uid); 52 status_t BatteryService::noteStopSensor(int uid, int handle) { argument 55 data.writeInt32(uid); 63 bool BatteryService::addSensor(uid_t uid, int handle) { argument 65 Info key(uid, handle); 75 bool BatteryService::removeSensor(uid_t uid, int handle) { argument 77 ssize_t index = mActivations.indexOf(Info(uid, handle)); 85 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument 87 if (addSensor(uid, handl 94 disableSensorImpl(uid_t uid, int handle) argument 104 cleanupImpl(uid_t uid) argument [all...] |
H A D | BatteryService.h | 34 status_t noteStartSensor(int uid, int handle); 35 status_t noteStopSensor(int uid, int handle); 37 void enableSensorImpl(uid_t uid, int handle); 38 void disableSensorImpl(uid_t uid, int handle); 39 void cleanupImpl(uid_t uid); 42 uid_t uid; member in struct:android::BatteryService::Info 45 Info() : uid(0), handle(0), count(0) { } 46 Info(uid_t uid, int handle) : uid(uid), handl argument 58 enableSensor(uid_t uid, int handle) argument 61 disableSensor(uid_t uid, int handle) argument 64 cleanup(uid_t uid) argument [all...] |
H A D | SensorService.cpp | 198 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", 387 uid_t uid = IPCThreadState::self()->getCallingUid(); local 388 sp<SensorEventConnection> result(new SensorEventConnection(this, uid)); 562 const sp<SensorService>& service, uid_t uid) 563 : mService(service), mChannel(new BitTube()), mUid(uid) 561 SensorEventConnection( const sp<SensorService>& service, uid_t uid) argument
|
/frameworks/native/services/surfaceflinger/ |
H A D | Client.cpp | 96 const int uid = ipc->getCallingUid(); local 98 if (CC_UNLIKELY(pid != self_pid && uid != AID_GRAPHICS && uid != 0)) { 103 "can't openGlobalTransaction pid=%d, uid=%d", pid, uid);
|
H A D | SurfaceFlinger.cpp | 2130 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", 2427 const int uid = ipc->getCallingUid(); local 2428 if ((uid != AID_GRAPHICS) && 2429 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) { 2431 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid); 2441 const int uid = ipc->getCallingUid(); local 2442 if ((uid != AID_GRAPHICS) && 2443 !PermissionCache::checkPermission(sReadFramebuffer, pid, uid)) { 2445 "can't read framebuffer pid=%d, uid 2458 const int uid = ipc->getCallingUid(); local [all...] |
/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | Archive.h | 47 char uid[6]; ///< user id in ASCII decimal member in struct:mcld::Archive::MemberHeader
|
/frameworks/base/voip/java/android/net/sip/ |
H A D | SipProfile.java | 485 public void setCallingUid(int uid) { argument 486 mCallingUid = uid;
|
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetServiceImpl.java | 93 * When identifying a Host or Provider based on the calling process, use the uid field. When 98 int uid; field in class:AppWidgetServiceImpl.Provider 108 int uid; field in class:AppWidgetServiceImpl.Host 340 pw.print(host.uid); pw.println(':'); 352 pw.println(id.host.uid); 370 + ", uid=" + Binder.getCallingUid()); 472 if (host.uid == callingUid) { 695 int userId = UserHandle.getUserId(id.provider.uid); 786 int userId = UserHandle.getUserId(id.provider.uid); 1069 int userId = UserHandle.getUserId(id.provider.uid); 1184 lookupHostLocked(int uid, int hostId) argument 1195 lookupOrAddHostLocked(int uid, String packageName, int hostId) argument [all...] |
H A D | ClipboardService.java | 206 private final void checkUriOwnerLocked(Uri uri, int uid) { argument 213 mAm.checkGrantUriPermission(uid, null, uri, Intent.FLAG_GRANT_READ_URI_PERMISSION); 220 private final void checkItemOwnerLocked(ClipData.Item item, int uid) { argument 222 checkUriOwnerLocked(item.getUri(), uid); 226 checkUriOwnerLocked(intent.getData(), uid); 230 private final void checkDataOwnerLocked(ClipData data, int uid) { argument 233 checkItemOwnerLocked(data.getItemAt(i), uid); 258 private final void addActiveOwnerLocked(int uid, String pkg) { argument 267 if (!UserHandle.isSameApp(pi.applicationInfo.uid, uid)) { [all...] |
H A D | ConnectivityService.java | 775 private boolean isNetworkBlocked(NetworkStateTracker tracker, int uid) { argument 782 uidRules = mUidRules.get(uid, RULE_ALLOW_ALL); 798 private NetworkInfo getFilteredNetworkInfo(NetworkStateTracker tracker, int uid) { argument 800 if (isNetworkBlocked(tracker, uid)) { 821 final int uid = Binder.getCallingUid(); 822 return getNetworkInfo(mActiveDefaultNetwork, uid); 837 public NetworkInfo getActiveNetworkInfoForUid(int uid) { argument 839 return getNetworkInfo(mActiveDefaultNetwork, uid); 845 final int uid = Binder.getCallingUid(); 846 return getNetworkInfo(networkType, uid); 849 getNetworkInfo(int networkType, int uid) argument 1058 isSameUser(int pid, int uid, int networkType, String feature) argument [all...] |
H A D | InputMethodManagerService.java | 215 return "SessionState{uid " + client.uid + " pid " + client.pid 234 final int uid; field in class:InputMethodManagerService.ClientState 244 System.identityHashCode(this)) + " uid " + uid 252 uid = _uid; 254 binding = new InputBinding(null, inputContext.asBinder(), uid, pid); 452 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument 897 final int uid = Binder.getCallingUid(); 898 final int userId = UserHandle.getUserId(uid); 995 addClient(IInputMethodClient client, IInputContext inputContext, int uid, int pid) argument [all...] |
H A D | LocationManagerService.java | 420 final int mUid; // uid of receiver 433 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument 442 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid); 443 mUid = uid; 705 * @param uid the UID 706 * @return resolution level allowed to the pid/uid pair 708 private int getAllowedResolutionLevel(int pid, int uid) { argument 710 pid, uid) == PackageManager.PERMISSION_GRANTED) { 713 pid, uid) == PackageManager.PERMISSION_GRANTED) { 1080 private Receiver getReceiver(ILocationListener listener, int pid, int uid, Strin argument 1097 getReceiver(PendingIntent intent, int pid, int uid, String packageName) argument 1164 checkListenerOrIntent(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName) argument 1203 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument 1517 doesPackageHaveUid(int uid, String packageName) argument [all...] |
H A D | NetworkManagementService.java | 366 Slog.d(TAG, "pushing " + size + " active uid rules"); 1255 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument 1263 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false); 1271 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid); 1273 mUidRejectOnQuota.put(uid, true); 1275 mUidRejectOnQuota.delete(uid); 1290 public NetworkStats getNetworkStatsUidDetail(int uid) { argument 1292 return mStatsFactory.readNetworkStatsDetail(uid); 1333 entry.uid = UID_TETHERING; 1493 public void setFirewallUidRule(int uid, boolea argument [all...] |
H A D | NotificationManagerService.java | 318 final int uid; field in class:NotificationManagerService.NotificationRecord 325 NotificationRecord(String pkg, String tag, int id, int uid, int initialPid, argument 331 this.uid = uid; 348 pw.println(prefix + " uid=" + uid + " userId=" + userId); 489 int uid, int initialPid, String message) { 491 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 494 cancelNotification(pkg, tag, id, 0, 0, false, UserHandle.getUserId(uid)); [all...] |
H A D | ProcessMap.java | 27 public E get(String name, int uid) { argument 30 return uids.get(uid); 33 public E put(String name, int uid, E value) { argument 39 uids.put(uid, value); 43 public void remove(String name, int uid) { argument 46 uids.remove(uid);
|
H A D | StatusBarManagerService.java | 100 int uid, int initialPid, String message); 464 int uid, int initialPid, String message) { 468 mNotificationCallbacks.onNotificationError(pkg, tag, id, uid, initialPid, message); 598 + ", uid=" + Binder.getCallingUid()); 99 onNotificationError(String pkg, String tag, int id, int uid, int initialPid, String message) argument 463 onNotificationError(String pkg, String tag, int id, int uid, int initialPid, String message) argument
|
H A D | TextServicesManagerService.java | 219 final int uid = Binder.getCallingUid(); 220 final int userId = UserHandle.getUserId(uid); 223 + "calling uid = " + uid + " system uid = " + Process.SYSTEM_UID 227 final String[] packageNames = AppGlobals.getPackageManager().getPackagesForUid(uid); 230 Slog.d(TAG, "--- process name for "+ uid + " = " + packageNames[i]); 237 if (uid == Process.SYSTEM_UID || userId == mSettings.getCurrentUserId()) { 405 final int uid = Binder.getCallingUid(); 411 tsListener, locale, scListener, uid, bundl 467 startSpellCheckerServiceInnerLocked(SpellCheckerInfo info, String locale, ITextServicesSessionListener tsListener, ISpellCheckerSessionListener scListener, int uid, Bundle bundle) argument 715 SpellCheckerBindGroup(InternalServiceConnection connection, ITextServicesSessionListener listener, String locale, ISpellCheckerSessionListener scListener, int uid, Bundle bundle) argument 751 addListener(ITextServicesSessionListener tsListener, String locale, ISpellCheckerSessionListener scListener, int uid, Bundle bundle) argument 891 InternalDeathRecipient(SpellCheckerBindGroup group, ITextServicesSessionListener tsListener, String scLocale, ISpellCheckerSessionListener scListener, int uid, Bundle bundle) argument [all...] |
H A D | VibratorService.java | 79 Vibration(IBinder token, long millis, int uid) { argument 80 this(token, millis, null, 0, uid); 83 Vibration(IBinder token, long[] pattern, int repeat, int uid) { argument 84 this(token, 0, pattern, repeat, uid); 88 int repeat, int uid) { 94 mUid = uid; 172 int uid = Binder.getCallingUid(); 183 Vibration vib = new Vibration(token, milliseconds, uid); 207 int uid = Binder.getCallingUid(); 227 Vibration vib = new Vibration(token, pattern, repeat, uid); 87 Vibration(IBinder token, long millis, long[] pattern, int repeat, int uid) argument [all...] |
H A D | WallpaperManagerService.java | 296 public void onPackageUpdateFinished(String packageName, int uid) { argument 336 public void onPackageUpdateStarted(String packageName, int uid) { argument 352 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument 1266 + ", uid=" + Binder.getCallingUid());
|
H A D | WifiService.java | 628 + ", uid=" + Binder.getCallingUid()); 1228 + ", uid=" + Binder.getCallingUid()); 1347 void enforceWakeSourcePermission(int uid, int pid) { argument 1348 if (uid == android.os.Process.myUid()) { 1352 pid, uid, null); 1434 int uid = Binder.getCallingUid(); 1440 enforceWakeSourcePermission(uid, pid); 1451 wl.mWorkSource = ws != null ? new WorkSource(ws) : new WorkSource(uid); 1579 int uid = Binder.getCallingUid(); 1582 mBatteryStats.noteWifiMulticastEnabled(uid); 1605 removeMulticasterLocked(int i, int uid) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 604 public int uid; field in class:ActivityManagerService.Identity 608 uid = _uid; 786 int uid; field in class:ActivityManagerService.ProcessChangeItem 929 if (!showBackground && UserHandle.getAppId(proc.uid) 1263 final int uid = msg.arg2; 1264 dispatchProcessDied(pid, uid); 1389 mSelf.mProcessNames.put(app.processName, app.uid, app); 1496 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() 1517 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() 1537 + Binder.getCallingPid() + ", uid 1907 getProcessRecordLocked( String processName, int uid) argument 2428 dispatchProcessDied(int pid, int uid) argument 2630 startActivityInPackage(int uid, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, Bundle options, int userId) argument 2654 startActivitiesInPackage(int uid, Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle options, int userId) argument 2801 crashApplication(int uid, int initialPid, String packageName, String message) argument 3695 killApplicationProcess(String processName, int uid) argument 3722 forceStopPackageLocked(final String packageName, int uid) argument 4860 checkPermission(String permission, int pid, int uid) argument 4869 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 4899 checkPermission(String permission, int pid, int uid) argument 4938 checkHoldingPermissionsLocked( IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) argument 5020 checkUriPermissionLocked(Uri uri, int uid, int modeFlags) argument 5033 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 10920 startServiceInPackage(int uid, Intent service, String resolvedType, int userId) argument 11977 broadcastIntentInPackage(String packageName, int uid, Intent intent, String resolvedType, IIntentReceiver resultTo, int resultCode, String resultData, Bundle map, String requiredPermission, boolean serialized, boolean sticky, int userId) argument 14676 checkValidCaller(int uid, int userId) argument 14683 applyUserId(int uid, int userId) argument [all...] |