/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SmsApplication.java | 115 public SmsApplicationData(String applicationName, String packageName, int uid) { argument 118 mUid = uid; 196 applicationName, packageName, activityInfo.applicationInfo.uid); 358 // are checking is for our current uid. Doing this check from the unprivileged current 391 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 395 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 406 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 410 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 420 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 424 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, [all...] |
/frameworks/opt/net/voip/src/java/android/net/sip/ |
H A D | SipProfile.java | 485 public void setCallingUid(int uid) { argument 486 mCallingUid = uid;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 807 NetworkUpdateResult saveNetwork(WifiConfiguration config, int uid) { argument 823 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid); 850 + " uid=" + Integer.toString(config.creatorUid)); 971 int addOrUpdateNetwork(WifiConfiguration config, int uid) { argument 975 + " uid=" + Integer.toString(config.creatorUid) 977 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid); 1873 String uid = key.replace(CREATOR_UID_KEY, ""); 1874 uid = uid.replace(SEPARATOR_KEY, ""); 1875 config.creatorUid = Integer.parseInt(uid); 2508 addOrUpdateNetworkNative(WifiConfiguration config, int uid) argument [all...] |
H A D | WifiServiceImpl.java | 184 + " uid=" + Integer.toString(config.creatorUid) 197 + " uid=" + Binder.getCallingUid()); 395 * @param workSource If null, all blame is given to the calling uid. 421 final int uid; field in class:WifiServiceImpl.BatchedScanRequest 428 this.uid = getCallingUid(); 433 stopBatchedScan(settings, uid, pid); 439 public boolean isSameApp(int uid, int pid) { argument 440 return (this.uid == uid && this.pid == pid); 487 int uid 510 stopBatchedScan(BatchedScanSettings settings, int uid, int pid) argument 989 isOwner(int uid) argument 1486 enforceWakeSourcePermission(int uid, int pid) argument 1736 removeMulticasterLocked(int i, int uid) argument [all...] |
/frameworks/native/services/powermanager/ |
H A D | IPowerManager.cpp | 64 const String16& packageName, int uid, bool isOneWay) 73 data.writeInt32(uid); // uid to blame for the work 63 acquireWakeLockWithUid(int flags, const sp<IBinder>& lock, const String16& tag, const String16& packageName, int uid, bool isOneWay) argument
|
/frameworks/native/services/sensorservice/ |
H A D | BatteryService.cpp | 41 bool BatteryService::addSensor(uid_t uid, int handle) { argument 43 Info key(uid, handle); 53 bool BatteryService::removeSensor(uid_t uid, int handle) { argument 55 ssize_t index = mActivations.indexOf(Info(uid, handle)); 63 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument 65 if (addSensor(uid, handle)) { 67 mBatteryStatService->noteStartSensor(uid, handle); 72 void BatteryService::disableSensorImpl(uid_t uid, int handle) { argument 74 if (removeSensor(uid, handle)) { 76 mBatteryStatService->noteStopSensor(uid, handl 82 cleanupImpl(uid_t uid) argument [all...] |
H A D | BatteryService.h | 33 void enableSensorImpl(uid_t uid, int handle); 34 void disableSensorImpl(uid_t uid, int handle); 35 void cleanupImpl(uid_t uid); 38 uid_t uid; member in struct:android::BatteryService::Info 41 Info() : uid(0), handle(0), count(0) { } 42 Info(uid_t uid, int handle) : uid(uid), handle(handle), count(0) { } argument 44 return (uid == rhs.uid) 54 enableSensor(uid_t uid, int handle) argument 57 disableSensor(uid_t uid, int handle) argument 60 cleanup(uid_t uid) argument [all...] |
H A D | SensorService.cpp | 236 "can't dump SensorService from pid=%d, uid=%d\n", 633 uid_t uid = IPCThreadState::self()->getCallingUid(); local 634 sp<SensorEventConnection> result(new SensorEventConnection(this, uid)); 989 const sp<SensorService>& service, uid_t uid) 990 : mService(service), mUid(uid), mWakeLockRefCount(0), mHasLooperCallbacks(false), 1018 result.appendFormat("\t WakeLockRefCount %d | uid %d | cache size %d | max cache size %d\n", 988 SensorEventConnection( const sp<SensorService>& service, uid_t uid) argument
|
/frameworks/native/services/surfaceflinger/ |
H A D | Client.cpp | 94 const int uid = ipc->getCallingUid(); local 96 if (CC_UNLIKELY(pid != self_pid && uid != AID_GRAPHICS && uid != 0)) { 101 "can't openGlobalTransaction pid=%d, uid=%d", pid, uid);
|
H A D | SurfaceFlinger.cpp | 2355 const int uid = ipc->getCallingUid(); local 2356 if ((uid != AID_SHELL) && 2357 !PermissionCache::checkPermission(sDump, pid, uid)) { 2359 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid); 2701 const int uid = ipc->getCallingUid(); local 2702 if ((uid != AID_GRAPHICS) && 2703 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) { 2705 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid); 2715 const int uid = ipc->getCallingUid(); local 2732 const int uid = ipc->getCallingUid(); local [all...] |
/frameworks/native/cmds/installd/ |
H A D | commands.c | 33 int install(const char *pkgname, uid_t uid, gid_t gid, const char *seinfo) argument 40 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 41 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 89 if (selinux_android_setfilecon(pkgdir, pkgname, seinfo, uid) < 0) { 103 if (chown(pkgdir, uid, gid) < 0) { 143 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 149 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 150 ALOGE("invalid uid/gid: %d %d\n", uid, gi 190 make_user_data(const char *pkgname, uid_t uid, userid_t userid, const char* seinfo) argument 863 dexopt(const char *apk_path, uid_t uid, bool is_public, const char *pkgname, const char *instruction_set, bool vm_safe_mode, bool is_patchoat) argument 1035 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument 1413 idmap(const char *target_apk, const char *overlay_apk, uid_t uid) argument 1478 restorecon_data(const char* pkgName, const char* seinfo, uid_t uid) argument [all...] |
H A D | installd.c | 36 return install(arg[0], atoi(arg[1]), atoi(arg[2]), arg[3]); /* pkgname, uid, gid, seinfo */ 41 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */ 67 return fix_uid(arg[0], atoi(arg[1]), atoi(arg[2])); /* pkgname, uid, gid */ 114 /* pkgname, uid, userid, seinfo */ 145 /* pkgName, seinfo, uid*/ 149 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */ 549 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM); local 550 gid_t gid = uid; 552 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) { 557 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gi [all...] |
H A D | utils.c | 1120 const int uid = multiuser_get_uid(userid, AID_SYSTEM); local 1125 if (fs_prepare_dir(config_user_path, 0750, uid, gid) == -1) { 1144 // Always set the uid/gid/permissions. The file could have been previously created
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 170 uint32_t do_find_service(struct binder_state *bs, const uint16_t *s, size_t len, uid_t uid, pid_t spid) argument 175 ALOGE("find_service('%s') uid=%d - PERMISSION DENIED\n", 176 str8(s, len), uid); 184 // then check the uid to see if it is isolated. 185 uid_t appid = uid % AID_USER; 198 uint32_t handle, uid_t uid, int allow_isolated, 203 //ALOGI("add_service('%s',%x,%s) uid=%d\n", str8(s, len), handle, 204 // allow_isolated ? "allow_isolated" : "!allow_isolated", uid); 210 ALOGE("add_service('%s',%x) uid=%d - PERMISSION DENIED\n", 211 str8(s, len), handle, uid); 196 do_add_service(struct binder_state *bs, const uint16_t *s, size_t len, uint32_t handle, uid_t uid, int allow_isolated, pid_t spid) argument [all...] |
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 44 uid_t uid; member in struct:android::PermissionCache::Entry 47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid); 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 74 pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/ |
H A D | AppOpsManager.cpp | 68 int32_t AppOpsManager::checkOp(int32_t op, int32_t uid, const String16& callingPackage) argument 71 return service != NULL ? service->checkOperation(op, uid, callingPackage) : MODE_IGNORED; 74 int32_t AppOpsManager::noteOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 76 return service != NULL ? service->noteOperation(op, uid, callingPackage) : MODE_IGNORED; 79 int32_t AppOpsManager::startOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 81 return service != NULL ? service->startOperation(getToken(service), op, uid, callingPackage) 85 void AppOpsManager::finishOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 88 service->finishOperation(getToken(service), op, uid, callingPackage); local
|
H A D | IAppOpsService.cpp | 39 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) { argument 43 data.writeInt32(uid); 51 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) { argument 55 data.writeInt32(uid); 63 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 69 data.writeInt32(uid); 77 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 83 data.writeInt32(uid); 128 int32_t uid = data.readInt32(); local 130 int32_t res = checkOperation(code, uid, packageNam 138 int32_t uid = data.readInt32(); local 149 int32_t uid = data.readInt32(); local 160 int32_t uid = data.readInt32(); local [all...] |
H A D | IBatteryStats.cpp | 37 virtual void noteStartSensor(int uid, int sensor) { argument 40 data.writeInt32(uid); 45 virtual void noteStopSensor(int uid, int sensor) { argument 48 data.writeInt32(uid); 53 virtual void noteStartVideo(int uid) { argument 56 data.writeInt32(uid); 60 virtual void noteStopVideo(int uid) { argument 63 data.writeInt32(uid); 67 virtual void noteStartAudio(int uid) { argument 70 data.writeInt32(uid); 74 noteStopAudio(int uid) argument 104 int uid = data.readInt32(); local 112 int uid = data.readInt32(); local 120 int uid = data.readInt32(); local 127 int uid = data.readInt32(); local 134 int uid = data.readInt32(); local 141 int uid = data.readInt32(); local [all...] |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 45 data.writeInt32(uid); 66 int32_t uid = data.readInt32(); local 67 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 62 uid_t uid = ipcState->getCallingUid(); local 64 if (outUid) *outUid = uid; 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 82 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d", 84 String8(permission).string(), uid, pid); 91 ALOGW("Permission failure: %s from uid=%d pid=%d", 92 String8(permission).string(), uid, pid); 110 ALOGI("Waiting to check permission %s from uid [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 51 cache(const String16& permission, uid_t uid, bool granted) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | Archive.h | 46 char uid[6]; ///< user id in ASCII decimal member in struct:mcld::Archive::MemberHeader
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/media/ |
H A D | MediaProjectionPermissionActivity.java | 70 mUid = aInfo.uid; 130 private Intent getMediaProjectionIntent(int uid, String packageName, boolean permanentGrant) argument 132 IMediaProjection projection = mService.createProjection(uid, packageName,
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/recents/model/ |
H A D | RecentsPackageMonitor.java | 71 public void onPackageRemoved(String packageName, int uid) { argument 88 public boolean onPackageChanged(String packageName, int uid, String[] components) { argument
|
/frameworks/base/services/appwidget/java/com/android/server/appwidget/ |
H A D | AppWidgetServiceImpl.java | 362 final int uid = getUidForPackage(pkgName, userId); 363 if (uid >= 0 ) { 364 resolveHostUidLocked(pkgName, uid); 391 private void resolveHostUidLocked(String pkg, int uid) { argument 395 if (host.id.uid == UNKNOWN_UID && pkg.equals(host.id.packageName)) { 397 Slog.i(TAG, "host " + host.id + " resolved to uid " + uid); 399 host.id = new HostId(uid, host.id.hostId, host.id.packageName); 448 + ", uid=" + Binder.getCallingUid()); 491 // Make sure the package runs under the caller uid 1752 lookupWidgetLocked(int appWidgetId, int uid, String packageName) argument 3103 canAccessAppWidget(Widget widget, int uid, String packageName) argument 3181 isHostInPackageForUid(Host host, int uid, String packageName) argument 3185 isProviderInPackageForUid(Provider provider, int uid, String packageName) argument 3192 isHostAccessingProvider(Host host, Provider provider, int uid, String packageName) argument 3251 final int uid; field in class:AppWidgetServiceImpl.ProviderId 3254 ProviderId(int uid, ComponentName componentName) argument 3334 final int uid; field in class:AppWidgetServiceImpl.HostId 3338 HostId(int uid, int hostId, String packageName) argument [all...] |