/frameworks/base/core/java/android/app/ |
H A D | ContextImpl.java | 1853 public int checkPermission(String permission, int pid, int uid) { argument 1860 permission, pid, uid); 1891 boolean selfToo, int uid, String message) { 1896 ? "Neither user " + uid + " nor current process has " 1897 : "uid " + uid + " does not have ") + 1904 String permission, int pid, int uid, String message) { 1906 checkPermission(permission, pid, uid), 1908 uid, 1950 public int checkUriPermission(Uri uri, int pid, int uid, in argument 1889 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1903 enforcePermission( String permission, int pid, int uid, String message) argument 1981 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2029 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument 2045 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2068 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 522 Slog.d(TAG, "pushing " + size + " active uid rules"); 1615 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument 1623 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false); 1631 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid); 1633 mUidRejectOnQuota.put(uid, true); 1635 mUidRejectOnQuota.delete(uid); 1650 public NetworkStats getNetworkStatsUidDetail(int uid) { argument 1653 return mStatsFactory.readNetworkStatsDetail(uid, null, TAG_ALL, null); 1678 entry.uid = UID_TETHERING; 1827 public void setFirewallUidRule(int uid, boolea argument 2018 addLegacyRouteForNetId(int netId, RouteInfo routeInfo, int uid) argument 2108 allowProtect(int uid) argument 2119 denyProtect(int uid) argument [all...] |
H A D | InputMethodManagerService.java | 220 return "SessionState{uid " + client.uid + " pid " + client.pid 241 final int uid; field in class:InputMethodManagerService.ClientState 251 System.identityHashCode(this)) + " uid " + uid 259 uid = _uid; 261 binding = new InputBinding(null, inputContext.asBinder(), uid, pid); 487 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument 949 final int uid = Binder.getCallingUid(); 950 final int userId = UserHandle.getUserId(uid); 1053 addClient(IInputMethodClient client, IInputContext inputContext, int uid, int pid) argument [all...] |
/frameworks/av/services/audiopolicy/ |
H A D | AudioPolicyService.cpp | 154 uid_t uid = IPCThreadState::self()->getCallingUid(); local 155 if (mNotificationClients.indexOfKey(uid) < 0) { 158 uid); 159 ALOGV("registerClient() client %p, uid %d", client.get(), uid); 161 mNotificationClients.add(uid, notificationClient); 169 void AudioPolicyService::removeNotificationClient(uid_t uid) argument 173 mNotificationClients.removeItem(uid); 177 mAudioPolicyManager->clearAudioPatches(uid); 229 uid_t uid) 227 NotificationClient(const sp<AudioPolicyService>& service, const sp<IAudioPolicyServiceClient>& client, uid_t uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 145 private static final String GRANTS_GRANTEE_UID = "uid"; 345 final int uid = cursor.getInt(0); 346 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null; 350 Log.d(TAG, "deleting grants for UID " + uid 353 new String[]{Integer.toString(uid)}); 503 + ", caller's uid " + Binder.getCallingUid() 543 + ", caller's uid " + Binder.getCallingUid() 595 + ", caller's uid " + Binder.getCallingUid() 615 + "caller's uid " + Binder.getCallingUid() 653 + ", caller's uid " 1717 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument 1736 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 2319 getAccountsForPackage(String packageName, int uid) argument 3171 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 3193 grantAppPermission(Account account, String authTokenType, int uid) argument 3228 revokeAppPermission(Account account, String authTokenType, int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | Settings.java | 383 String cpuAbiOverrideString, int uid, int vc, int pkgFlags) { 386 if (p.appId == uid) { 396 p.appId = uid; 397 if (addUserIdLPw(uid, p, name)) { 404 SharedUserSetting addSharedUserLPw(String name, int uid, int pkgFlags) { argument 407 if (s.userId == uid) { 415 s.userId = uid; 416 if (addUserIdLPw(uid, s, name)) { 454 bp.uid = 0; 607 "Package " + name + " could not be assigned a valid uid"); 381 addPackageLPw(String name, String realName, File codePath, File resourcePath, String legacyNativeLibraryPathString, String primaryCpuAbiString, String secondaryCpuAbiString, String cpuAbiOverrideString, int uid, int vc, int pkgFlags) argument 801 addUserIdLPw(int uid, Object obj, Object name) argument 832 getUserIdLPr(int uid) argument 842 removeUserIdLPw(int uid) argument 853 replaceUserIdLPw(int uid, Object obj) argument 3109 setFirstAvailableUid(int uid) argument 3221 setPackageStoppedStateLPw(String packageName, boolean stopped, boolean allowedByPermission, int uid, int userId) argument [all...] |
H A D | LauncherAppsService.java | 370 public void onPackageAdded(String packageName, int uid) { argument 385 super.onPackageAdded(packageName, uid); 389 public void onPackageRemoved(String packageName, int uid) { argument 404 super.onPackageRemoved(packageName, uid);
|
H A D | PackageManagerService.java | 983 extras.putInt(Intent.EXTRA_UID, res.uid); 1041 int[] uidArray = new int[] { res.pkg.applicationInfo.uid }; 1284 mSettings.addSharedUserLPw("android.uid.system", Process.SYSTEM_UID, 1286 mSettings.addSharedUserLPw("android.uid.phone", RADIO_UID, 1288 mSettings.addSharedUserLPw("android.uid.log", LOG_UID, 1290 mSettings.addSharedUserLPw("android.uid.nfc", NFC_UID, 1292 mSettings.addSharedUserLPw("android.uid.bluetooth", BLUETOOTH_UID, 1294 mSettings.addSharedUserLPw("android.uid.shell", SHELL_UID, 1963 enforceCrossUserPermission(Binder.getCallingUid(), userId, false, false, "get package uid"); 1968 return UserHandle.getUid(userId, p.applicationInfo.uid); 2336 checkValidCaller(int uid, int userId) argument 2363 checkUidPermission(String permName, int uid) argument 2864 getPackagesForUid(int uid) argument 2888 getNameForUid(int uid) argument 2919 getFlagsForUid(int uid) argument 2934 isUidPrivileged(int uid) argument 3953 queryContentProviders(String processName, int uid, int flags) argument 4407 fixProcessName(String defProcessName, String processName, int uid) argument 4996 createDataDirsLI(String packageName, int uid, String seinfo) argument 9177 doPostInstall(int status, int uid) argument 9206 doPostCopy(int uid) argument 9376 doPostInstall(int status, int uid) argument 9700 doPostInstall(int status, int uid) argument 9815 doPostCopy(int uid) argument 9923 int uid; field in class:PackageManagerService.PackageInstalledInfo 10769 int uid = -1; field in class:PackageManagerService.PackageRemovedInfo 11480 getUidTargetSdkVersionLockedLPr(int uid) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | Context.java | 491 * ops uid verification will work with the name). */ 2911 * @param uid The user ID being checked against. A uid of 0 is the root 2915 * pid/uid is allowed that permission, or 2922 public abstract int checkPermission(@NonNull String permission, int pid, int uid); argument 2927 * {@link #checkPermission(String, int, int)} with the pid and uid returned 2938 * pid/uid is allowed that permission, or 2957 * pid/uid is allowed that permission, or 2973 * @param uid The user ID being checked against. A uid o 2979 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3108 checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument 3176 checkUriPermission(@ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument 3199 enforceUriPermission( Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, String message) argument 3264 enforceUriPermission( @ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags, @Nullable String message) argument [all...] |
/frameworks/av/include/media/ |
H A D | AudioTrack.h | 190 int uid = -1, 217 int uid = -1, 257 int uid = -1,
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | GeofenceManager.java | 120 int allowedResolutionLevel, int uid, String packageName) { 123 + ", intent=" + intent + ", uid=" + uid + ", packageName=" + packageName); 127 request.getExpireAt(), allowedResolutionLevel, uid, packageName, intent); 119 addFence(LocationRequest request, Geofence geofence, PendingIntent intent, int allowedResolutionLevel, int uid, String packageName) argument
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsRecorder.java | 185 mPending.recordData(ident, entry.uid, entry.set, entry.tag, start, end, entry); 189 mSinceBoot.recordData(ident, entry.uid, entry.set, entry.tag, start, end, entry); 194 complete.recordData(ident, entry.uid, entry.set, entry.tag, start, end, entry);
|
/frameworks/base/tests/SmokeTest/tests/src/com/android/smoketest/ |
H A D | ProcessErrorsTest.java | 361 && (info.uid == peOther.info.uid); 382 code += info.uid;
|
/frameworks/testing/app-tests/AppLaunchTest/src/com/android/applaunchtest/ |
H A D | AppLaunchTest.java | 294 && (info.uid == peOther.info.uid); 315 code += info.uid;
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | NuPlayerDriver.h | 31 virtual status_t setUID(uid_t uid);
|
/frameworks/av/media/libstagefright/rtsp/ |
H A D | ARTSPConnection.h | 36 ARTSPConnection(bool uidValid = false, uid_t uid = 0);
|
/frameworks/av/services/audioflinger/ |
H A D | RecordTracks.h | 33 int uid,
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ProviderMap.java | 100 + ", record uid = " + record.appInfo.uid); 105 final int userId = UserHandle.getUserId(record.appInfo.uid); 113 + ", record uid = " + record.appInfo.uid); 118 final int userId = UserHandle.getUserId(record.appInfo.uid);
|
H A D | ActiveServices.java | 335 ProcessRecord proc = mAm.getProcessRecordLocked(r.processName, r.appInfo.uid, false); 385 Slog.v(TAG, "Not potential delay (callerFg=" + callerFg + " uid=" 498 + ", uid=" + Binder.getCallingUid() 697 if (callerApp.info.uid == Process.SYSTEM_UID) { 737 if (unscheduleServiceRestartLocked(s, callerApp.info.uid, false)) { 1029 && mAm.isValidSingletonCall(callingUid, sInfo.applicationInfo.uid)) { 1045 sInfo.applicationInfo.uid, sInfo.packageName, 1056 if (pr.serviceInfo.applicationInfo.uid == sInfo.applicationInfo.uid 1068 callingPid, callingUid, r.appInfo.uid, [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | NotificationManagerService.java | 444 private boolean noteNotificationOp(String pkg, int uid) { argument 445 if (mAppOps.noteOpNoThrow(AppOpsManager.OP_POST_NOTIFICATION, uid, pkg) 592 int uid, int initialPid, String message, int userId) { 594 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 599 ActivityManagerNative.getDefault().crashApplication(uid, initialPid, pkg, 923 setNotificationsEnabledForPackageImpl(pkg, info.applicationInfo.uid, false); 949 void setNotificationsEnabledForPackageImpl(String pkg, int uid, boolean enabled) { argument 952 mAppOps.setMode(AppOpsManager.OP_POST_NOTIFICATION, uid, pkg, 957 cancelAllNotificationsInt(MY_UID, MY_PID, pkg, 0, 0, true, UserHandle.getUserId(uid), 2641 isUidSystem(int uid) argument [all...] |
/frameworks/base/core/java/com/android/internal/view/ |
H A D | IInputMethodManager.aidl | 46 in IInputContext inputContext, int uid, int pid);
|
/frameworks/base/media/java/android/media/ |
H A D | PlayerRecord.java | 197 " -- uid: " + mCallingUid + 202 pw.println(" uid: " + mCallingUid + 279 String callingPackageName, int uid) { 288 mCallingUid = uid; 278 resetControllerInfoForRcc(IRemoteControlClient rcClient, String callingPackageName, int uid) argument
|
/frameworks/opt/net/voip/src/java/android/net/sip/ |
H A D | SipProfile.java | 485 public void setCallingUid(int uid) { argument 486 mCallingUid = uid;
|
/frameworks/base/core/java/android/nfc/cardemulation/ |
H A D | ApduServiceInfo.java | 87 * The uid of the package the service belongs to 95 boolean requiresUnlock, int bannerResource, int uid) { 109 this.mUid = uid; 248 // Set uid 249 mUid = si.applicationInfo.uid; 441 int uid = source.readInt(); 443 dynamicAidGroups, requiresUnlock, bannerResource, uid); 93 ApduServiceInfo(ResolveInfo info, boolean onHost, String description, ArrayList<AidGroup> staticAidGroups, ArrayList<AidGroup> dynamicAidGroups, boolean requiresUnlock, int bannerResource, int uid) argument
|
/frameworks/base/core/java/com/android/internal/os/ |
H A D | ZygoteConnection.java | 246 pid = Zygote.forkAndSpecialize(parsedArgs.uid, parsedArgs.gid, parsedArgs.gids, 313 * <li> --setuid=<i>uid of child process, defaults to 0</i> 321 * This parameter is only applied if the uid of the new process will 344 int uid = 0; field in class:ZygoteConnection.Arguments 446 uid = Integer.parseInt( 643 * <li> uid 0 (root) may specify any uid, gid, and setgroups() list 644 * <li> uid 1000 (Process.SYSTEM_UID) may specify any uid > 1000 in normal 647 * <li> Any other uid ma [all...] |