/frameworks/opt/net/voip/src/java/android/net/sip/ |
H A D | SipProfile.java | 485 public void setCallingUid(int uid) { argument 486 mCallingUid = uid;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiConfigStore.java | 849 NetworkUpdateResult saveNetwork(WifiConfiguration config, int uid) { argument 874 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid); 901 + " uid=" + Integer.toString(config.creatorUid)); 1071 int addOrUpdateNetwork(WifiConfiguration config, int uid) { argument 1075 + " uid=" + Integer.toString(config.creatorUid) 1077 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid); 1975 String uid = key.replace(CREATOR_UID_KEY, ""); 1976 uid = uid.replace(SEPARATOR_KEY, ""); 1977 config.creatorUid = Integer.parseInt(uid); 2623 addOrUpdateNetworkNative(WifiConfiguration config, int uid) argument [all...] |
H A D | WifiServiceImpl.java | 185 + " uid=" + Integer.toString(config.creatorUid) 198 + " uid=" + Binder.getCallingUid()); 420 * @param workSource If null, all blame is given to the calling uid. 443 final int uid; field in class:WifiServiceImpl.BatchedScanRequest 450 this.uid = getCallingUid(); 455 stopBatchedScan(settings, uid, pid); 461 public boolean isSameApp(int uid, int pid) { argument 462 return (this.uid == uid && this.pid == pid); 509 int uid 533 stopBatchedScan(BatchedScanSettings settings, int uid, int pid) argument 1026 isOwner(int uid) argument 1531 enforceWakeSourcePermission(int uid, int pid) argument 1781 removeMulticasterLocked(int i, int uid) argument [all...] |
H A D | WifiStateMachine.java | 1289 * @param callingUid The uid initiating the wifi scan. Blame will be given here unless 1397 log("set batched scan to " + settings + " for uid=" + responsibleUid + 1770 + " uid " + Integer.toString(callingUid)); 1773 + " uid " + Integer.toString(callingUid)); 2098 public void disconnectCommand(int uid, int reason) { argument 2099 sendMessage(CMD_DISCONNECT, uid, reason); 2491 sb.append(" uid=" + msg.sendingUid); 6602 + " uid = " + message.sendingUid
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SmsApplication.java | 115 public SmsApplicationData(String applicationName, String packageName, int uid) { argument 118 mUid = uid; 196 applicationName, packageName, activityInfo.applicationInfo.uid); 358 // are checking is for our current uid. Doing this check from the unprivileged current 391 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 395 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 406 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 410 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 420 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 424 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, [all...] |
/frameworks/native/services/powermanager/ |
H A D | IPowerManager.cpp | 64 const String16& packageName, int uid, bool isOneWay) 73 data.writeInt32(uid); // uid to blame for the work 63 acquireWakeLockWithUid(int flags, const sp<IBinder>& lock, const String16& tag, const String16& packageName, int uid, bool isOneWay) argument
|
/frameworks/native/services/sensorservice/ |
H A D | BatteryService.cpp | 41 bool BatteryService::addSensor(uid_t uid, int handle) { argument 43 Info key(uid, handle); 53 bool BatteryService::removeSensor(uid_t uid, int handle) { argument 55 ssize_t index = mActivations.indexOf(Info(uid, handle)); 63 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument 65 if (addSensor(uid, handle)) { 67 mBatteryStatService->noteStartSensor(uid, handle); 72 void BatteryService::disableSensorImpl(uid_t uid, int handle) { argument 74 if (removeSensor(uid, handle)) { 76 mBatteryStatService->noteStopSensor(uid, handl 82 cleanupImpl(uid_t uid) argument [all...] |
H A D | BatteryService.h | 33 void enableSensorImpl(uid_t uid, int handle); 34 void disableSensorImpl(uid_t uid, int handle); 35 void cleanupImpl(uid_t uid); 38 uid_t uid; member in struct:android::BatteryService::Info 41 Info() : uid(0), handle(0), count(0) { } 42 Info(uid_t uid, int handle) : uid(uid), handle(handle), count(0) { } argument 44 return (uid == rhs.uid) 54 enableSensor(uid_t uid, int handle) argument 57 disableSensor(uid_t uid, int handle) argument 60 cleanup(uid_t uid) argument [all...] |
H A D | SensorService.cpp | 238 "can't dump SensorService from pid=%d, uid=%d\n", 663 uid_t uid = IPCThreadState::self()->getCallingUid(); local 664 sp<SensorEventConnection> result(new SensorEventConnection(this, uid)); 1034 const sp<SensorService>& service, uid_t uid) 1035 : mService(service), mUid(uid), mWakeLockRefCount(0), mHasLooperCallbacks(false), 1068 result.appendFormat("\t WakeLockRefCount %d | uid %d | cache size %d | max cache size %d\n", 1033 SensorEventConnection( const sp<SensorService>& service, uid_t uid) argument
|
/frameworks/native/services/surfaceflinger/ |
H A D | Client.cpp | 94 const int uid = ipc->getCallingUid(); local 96 if (CC_UNLIKELY(pid != self_pid && uid != AID_GRAPHICS && uid != 0)) { 101 "can't openGlobalTransaction pid=%d, uid=%d", pid, uid);
|
H A D | SurfaceFlinger.cpp | 2399 const int uid = ipc->getCallingUid(); local 2400 if ((uid != AID_SHELL) && 2401 !PermissionCache::checkPermission(sDump, pid, uid)) { 2403 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid); 2745 const int uid = ipc->getCallingUid(); local 2746 if ((uid != AID_GRAPHICS) && 2747 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) { 2749 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid); 2759 const int uid = ipc->getCallingUid(); local 2776 const int uid = ipc->getCallingUid(); local [all...] |
/frameworks/native/cmds/installd/ |
H A D | commands.c | 34 int install(const char *pkgname, uid_t uid, gid_t gid, const char *seinfo) argument 41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 42 ALOGE("invalid uid/gid: %d %d\n", uid, gid); 90 if (selinux_android_setfilecon(pkgdir, pkgname, seinfo, uid) < 0) { 104 if (chown(pkgdir, uid, gid) < 0) { 144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument 150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { 151 ALOGE("invalid uid/gid: %d %d\n", uid, gi 191 make_user_data(const char *pkgname, uid_t uid, userid_t userid, const char* seinfo) argument 891 dexopt(const char *apk_path, uid_t uid, bool is_public, const char *pkgname, const char *instruction_set, bool vm_safe_mode, bool is_patchoat) argument 1111 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument 1489 idmap(const char *target_apk, const char *overlay_apk, uid_t uid) argument 1554 restorecon_data(const char* pkgName, const char* seinfo, uid_t uid) argument [all...] |
H A D | installd.c | 36 return install(arg[0], atoi(arg[1]), atoi(arg[2]), arg[3]); /* pkgname, uid, gid, seinfo */ 41 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */ 72 return fix_uid(arg[0], atoi(arg[1]), atoi(arg[2])); /* pkgname, uid, gid */ 119 /* pkgname, uid, userid, seinfo */ 150 /* pkgName, seinfo, uid*/ 154 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */ 555 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM); local 556 gid_t gid = uid; 558 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) { 563 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gi [all...] |
H A D | utils.c | 1120 const int uid = multiuser_get_uid(userid, AID_SYSTEM); local 1125 if (fs_prepare_dir(config_user_path, 0750, uid, gid) == -1) { 1144 // Always set the uid/gid/permissions. The file could have been previously created
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 170 uint32_t do_find_service(struct binder_state *bs, const uint16_t *s, size_t len, uid_t uid, pid_t spid) argument 175 ALOGE("find_service('%s') uid=%d - PERMISSION DENIED\n", 176 str8(s, len), uid); 184 // then check the uid to see if it is isolated. 185 uid_t appid = uid % AID_USER; 198 uint32_t handle, uid_t uid, int allow_isolated, 203 //ALOGI("add_service('%s',%x,%s) uid=%d\n", str8(s, len), handle, 204 // allow_isolated ? "allow_isolated" : "!allow_isolated", uid); 210 ALOGE("add_service('%s',%x) uid=%d - PERMISSION DENIED\n", 211 str8(s, len), handle, uid); 196 do_add_service(struct binder_state *bs, const uint16_t *s, size_t len, uint32_t handle, uid_t uid, int allow_isolated, pid_t spid) argument [all...] |
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 44 uid_t uid; member in struct:android::PermissionCache::Entry 47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid); 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 74 pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/ |
H A D | AppOpsManager.cpp | 68 int32_t AppOpsManager::checkOp(int32_t op, int32_t uid, const String16& callingPackage) argument 71 return service != NULL ? service->checkOperation(op, uid, callingPackage) : MODE_IGNORED; 74 int32_t AppOpsManager::noteOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 76 return service != NULL ? service->noteOperation(op, uid, callingPackage) : MODE_IGNORED; 79 int32_t AppOpsManager::startOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 81 return service != NULL ? service->startOperation(getToken(service), op, uid, callingPackage) 85 void AppOpsManager::finishOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 88 service->finishOperation(getToken(service), op, uid, callingPackage); local
|
H A D | IAppOpsService.cpp | 39 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) { argument 43 data.writeInt32(uid); 51 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) { argument 55 data.writeInt32(uid); 63 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 69 data.writeInt32(uid); 77 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 83 data.writeInt32(uid); 128 int32_t uid = data.readInt32(); local 130 int32_t res = checkOperation(code, uid, packageNam 138 int32_t uid = data.readInt32(); local 149 int32_t uid = data.readInt32(); local 160 int32_t uid = data.readInt32(); local [all...] |
H A D | IBatteryStats.cpp | 37 virtual void noteStartSensor(int uid, int sensor) { argument 40 data.writeInt32(uid); 45 virtual void noteStopSensor(int uid, int sensor) { argument 48 data.writeInt32(uid); 53 virtual void noteStartVideo(int uid) { argument 56 data.writeInt32(uid); 60 virtual void noteStopVideo(int uid) { argument 63 data.writeInt32(uid); 67 virtual void noteStartAudio(int uid) { argument 70 data.writeInt32(uid); 74 noteStopAudio(int uid) argument 104 int uid = data.readInt32(); local 112 int uid = data.readInt32(); local 120 int uid = data.readInt32(); local 127 int uid = data.readInt32(); local 134 int uid = data.readInt32(); local 141 int uid = data.readInt32(); local [all...] |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 45 data.writeInt32(uid); 66 int32_t uid = data.readInt32(); local 67 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 62 uid_t uid = ipcState->getCallingUid(); local 64 if (outUid) *outUid = uid; 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 82 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d", 84 String8(permission).string(), uid, pid); 91 ALOGW("Permission failure: %s from uid=%d pid=%d", 92 String8(permission).string(), uid, pid); 110 ALOGI("Waiting to check permission %s from uid [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 51 cache(const String16& permission, uid_t uid, bool granted) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/compile/mclinker/include/mcld/LD/ |
H A D | Archive.h | 46 char uid[6]; ///< user id in ASCII decimal member in struct:mcld::Archive::MemberHeader
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/media/ |
H A D | MediaProjectionPermissionActivity.java | 75 mUid = aInfo.uid; 141 private Intent getMediaProjectionIntent(int uid, String packageName, boolean permanentGrant) argument 143 IMediaProjection projection = mService.createProjection(uid, packageName,
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/recents/model/ |
H A D | RecentsPackageMonitor.java | 68 public void onPackageRemoved(String packageName, int uid) { argument 77 public boolean onPackageChanged(String packageName, int uid, String[] components) { argument
|