Searched defs:uid (Results 1 - 25 of 179) sorted by last modified time

12345678

/frameworks/opt/net/voip/src/java/android/net/sip/
H A DSipProfile.java485 public void setCallingUid(int uid) { argument
486 mCallingUid = uid;
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiConfigStore.java849 NetworkUpdateResult saveNetwork(WifiConfiguration config, int uid) { argument
874 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid);
901 + " uid=" + Integer.toString(config.creatorUid));
1071 int addOrUpdateNetwork(WifiConfiguration config, int uid) { argument
1075 + " uid=" + Integer.toString(config.creatorUid)
1077 NetworkUpdateResult result = addOrUpdateNetworkNative(config, uid);
1975 String uid = key.replace(CREATOR_UID_KEY, "");
1976 uid = uid.replace(SEPARATOR_KEY, "");
1977 config.creatorUid = Integer.parseInt(uid);
2623 addOrUpdateNetworkNative(WifiConfiguration config, int uid) argument
[all...]
H A DWifiServiceImpl.java185 + " uid=" + Integer.toString(config.creatorUid)
198 + " uid=" + Binder.getCallingUid());
420 * @param workSource If null, all blame is given to the calling uid.
443 final int uid; field in class:WifiServiceImpl.BatchedScanRequest
450 this.uid = getCallingUid();
455 stopBatchedScan(settings, uid, pid);
461 public boolean isSameApp(int uid, int pid) { argument
462 return (this.uid == uid && this.pid == pid);
509 int uid
533 stopBatchedScan(BatchedScanSettings settings, int uid, int pid) argument
1026 isOwner(int uid) argument
1531 enforceWakeSourcePermission(int uid, int pid) argument
1781 removeMulticasterLocked(int i, int uid) argument
[all...]
H A DWifiStateMachine.java1289 * @param callingUid The uid initiating the wifi scan. Blame will be given here unless
1397 log("set batched scan to " + settings + " for uid=" + responsibleUid +
1770 + " uid " + Integer.toString(callingUid));
1773 + " uid " + Integer.toString(callingUid));
2098 public void disconnectCommand(int uid, int reason) { argument
2099 sendMessage(CMD_DISCONNECT, uid, reason);
2491 sb.append(" uid=" + msg.sendingUid);
6602 + " uid = " + message.sendingUid
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSmsApplication.java115 public SmsApplicationData(String applicationName, String packageName, int uid) { argument
118 mUid = uid;
196 applicationName, packageName, activityInfo.applicationInfo.uid);
358 // are checking is for our current uid. Doing this check from the unprivileged current
391 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
395 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
406 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
410 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
420 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
424 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid,
[all...]
/frameworks/native/services/powermanager/
H A DIPowerManager.cpp64 const String16& packageName, int uid, bool isOneWay)
73 data.writeInt32(uid); // uid to blame for the work
63 acquireWakeLockWithUid(int flags, const sp<IBinder>& lock, const String16& tag, const String16& packageName, int uid, bool isOneWay) argument
/frameworks/native/services/sensorservice/
H A DBatteryService.cpp41 bool BatteryService::addSensor(uid_t uid, int handle) { argument
43 Info key(uid, handle);
53 bool BatteryService::removeSensor(uid_t uid, int handle) { argument
55 ssize_t index = mActivations.indexOf(Info(uid, handle));
63 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument
65 if (addSensor(uid, handle)) {
67 mBatteryStatService->noteStartSensor(uid, handle);
72 void BatteryService::disableSensorImpl(uid_t uid, int handle) { argument
74 if (removeSensor(uid, handle)) {
76 mBatteryStatService->noteStopSensor(uid, handl
82 cleanupImpl(uid_t uid) argument
[all...]
H A DBatteryService.h33 void enableSensorImpl(uid_t uid, int handle);
34 void disableSensorImpl(uid_t uid, int handle);
35 void cleanupImpl(uid_t uid);
38 uid_t uid; member in struct:android::BatteryService::Info
41 Info() : uid(0), handle(0), count(0) { }
42 Info(uid_t uid, int handle) : uid(uid), handle(handle), count(0) { } argument
44 return (uid == rhs.uid)
54 enableSensor(uid_t uid, int handle) argument
57 disableSensor(uid_t uid, int handle) argument
60 cleanup(uid_t uid) argument
[all...]
H A DSensorService.cpp238 "can't dump SensorService from pid=%d, uid=%d\n",
663 uid_t uid = IPCThreadState::self()->getCallingUid(); local
664 sp<SensorEventConnection> result(new SensorEventConnection(this, uid));
1034 const sp<SensorService>& service, uid_t uid)
1035 : mService(service), mUid(uid), mWakeLockRefCount(0), mHasLooperCallbacks(false),
1068 result.appendFormat("\t WakeLockRefCount %d | uid %d | cache size %d | max cache size %d\n",
1033 SensorEventConnection( const sp<SensorService>& service, uid_t uid) argument
/frameworks/native/services/surfaceflinger/
H A DClient.cpp94 const int uid = ipc->getCallingUid(); local
96 if (CC_UNLIKELY(pid != self_pid && uid != AID_GRAPHICS && uid != 0)) {
101 "can't openGlobalTransaction pid=%d, uid=%d", pid, uid);
H A DSurfaceFlinger.cpp2399 const int uid = ipc->getCallingUid(); local
2400 if ((uid != AID_SHELL) &&
2401 !PermissionCache::checkPermission(sDump, pid, uid)) {
2403 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
2745 const int uid = ipc->getCallingUid(); local
2746 if ((uid != AID_GRAPHICS) &&
2747 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) {
2749 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid);
2759 const int uid = ipc->getCallingUid(); local
2776 const int uid = ipc->getCallingUid(); local
[all...]
/frameworks/native/cmds/installd/
H A Dcommands.c34 int install(const char *pkgname, uid_t uid, gid_t gid, const char *seinfo) argument
41 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
42 ALOGE("invalid uid/gid: %d %d\n", uid, gid);
90 if (selinux_android_setfilecon(pkgdir, pkgname, seinfo, uid) < 0) {
104 if (chown(pkgdir, uid, gid) < 0) {
144 int fix_uid(const char *pkgname, uid_t uid, gid_t gid) argument
150 if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) {
151 ALOGE("invalid uid/gid: %d %d\n", uid, gi
191 make_user_data(const char *pkgname, uid_t uid, userid_t userid, const char* seinfo) argument
891 dexopt(const char *apk_path, uid_t uid, bool is_public, const char *pkgname, const char *instruction_set, bool vm_safe_mode, bool is_patchoat) argument
1111 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument
1489 idmap(const char *target_apk, const char *overlay_apk, uid_t uid) argument
1554 restorecon_data(const char* pkgName, const char* seinfo, uid_t uid) argument
[all...]
H A Dinstalld.c36 return install(arg[0], atoi(arg[1]), atoi(arg[2]), arg[3]); /* pkgname, uid, gid, seinfo */
41 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */
72 return fix_uid(arg[0], atoi(arg[1]), atoi(arg[2])); /* pkgname, uid, gid */
119 /* pkgname, uid, userid, seinfo */
150 /* pkgName, seinfo, uid*/
154 /* apk_path, uid, is_public, pkgname, instruction_set, vm_safe_mode, should_relocate */
555 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM); local
556 gid_t gid = uid;
558 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) {
563 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gi
[all...]
H A Dutils.c1120 const int uid = multiuser_get_uid(userid, AID_SYSTEM); local
1125 if (fs_prepare_dir(config_user_path, 0750, uid, gid) == -1) {
1144 // Always set the uid/gid/permissions. The file could have been previously created
/frameworks/native/cmds/servicemanager/
H A Dservice_manager.c170 uint32_t do_find_service(struct binder_state *bs, const uint16_t *s, size_t len, uid_t uid, pid_t spid) argument
175 ALOGE("find_service('%s') uid=%d - PERMISSION DENIED\n",
176 str8(s, len), uid);
184 // then check the uid to see if it is isolated.
185 uid_t appid = uid % AID_USER;
198 uint32_t handle, uid_t uid, int allow_isolated,
203 //ALOGI("add_service('%s',%x,%s) uid=%d\n", str8(s, len), handle,
204 // allow_isolated ? "allow_isolated" : "!allow_isolated", uid);
210 ALOGE("add_service('%s',%x) uid=%d - PERMISSION DENIED\n",
211 str8(s, len), handle, uid);
196 do_add_service(struct binder_state *bs, const uint16_t *s, size_t len, uint32_t handle, uid_t uid, int allow_isolated, pid_t spid) argument
[all...]
/frameworks/native/include/binder/
H A DPermissionCache.h31 * PermissionCache caches permission checks for a given uid.
44 uid_t uid; member in struct:android::PermissionCache::Entry
47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid);
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
74 pid_t pid, uid_t uid);
/frameworks/native/libs/binder/
H A DAppOpsManager.cpp68 int32_t AppOpsManager::checkOp(int32_t op, int32_t uid, const String16& callingPackage) argument
71 return service != NULL ? service->checkOperation(op, uid, callingPackage) : MODE_IGNORED;
74 int32_t AppOpsManager::noteOp(int32_t op, int32_t uid, const String16& callingPackage) { argument
76 return service != NULL ? service->noteOperation(op, uid, callingPackage) : MODE_IGNORED;
79 int32_t AppOpsManager::startOp(int32_t op, int32_t uid, const String16& callingPackage) { argument
81 return service != NULL ? service->startOperation(getToken(service), op, uid, callingPackage)
85 void AppOpsManager::finishOp(int32_t op, int32_t uid, const String16& callingPackage) { argument
88 service->finishOperation(getToken(service), op, uid, callingPackage); local
H A DIAppOpsService.cpp39 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) { argument
43 data.writeInt32(uid);
51 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) { argument
55 data.writeInt32(uid);
63 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument
69 data.writeInt32(uid);
77 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument
83 data.writeInt32(uid);
128 int32_t uid = data.readInt32(); local
130 int32_t res = checkOperation(code, uid, packageNam
138 int32_t uid = data.readInt32(); local
149 int32_t uid = data.readInt32(); local
160 int32_t uid = data.readInt32(); local
[all...]
H A DIBatteryStats.cpp37 virtual void noteStartSensor(int uid, int sensor) { argument
40 data.writeInt32(uid);
45 virtual void noteStopSensor(int uid, int sensor) { argument
48 data.writeInt32(uid);
53 virtual void noteStartVideo(int uid) { argument
56 data.writeInt32(uid);
60 virtual void noteStopVideo(int uid) { argument
63 data.writeInt32(uid);
67 virtual void noteStartAudio(int uid) { argument
70 data.writeInt32(uid);
74 noteStopAudio(int uid) argument
104 int uid = data.readInt32(); local
112 int uid = data.readInt32(); local
120 int uid = data.readInt32(); local
127 int uid = data.readInt32(); local
134 int uid = data.readInt32(); local
141 int uid = data.readInt32(); local
[all...]
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
45 data.writeInt32(uid);
66 int32_t uid = data.readInt32(); local
67 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp62 uid_t uid = ipcState->getCallingUid(); local
64 if (outUid) *outUid = uid;
65 return checkPermission(permission, pid, uid);
68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
79 bool res = pc->checkPermission(permission, pid, uid);
82 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d",
84 String8(permission).string(), uid, pid);
91 ALOGW("Permission failure: %s from uid=%d pid=%d",
92 String8(permission).string(), uid, pid);
110 ALOGI("Waiting to check permission %s from uid
[all...]
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
42 e.uid = uid;
52 uid_t uid, bool granted) {
64 e.uid = uid;
85 uid_t uid = ipcState->getCallingUid(); local
87 if (outUid) *outUid = uid;
88 return PermissionCache::checkPermission(permission, pid, uid);
92 const String16& permission, pid_t pid, uid_t uid) {
51 cache(const String16& permission, uid_t uid, bool granted) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/compile/mclinker/include/mcld/LD/
H A DArchive.h46 char uid[6]; ///< user id in ASCII decimal member in struct:mcld::Archive::MemberHeader
/frameworks/base/packages/SystemUI/src/com/android/systemui/media/
H A DMediaProjectionPermissionActivity.java75 mUid = aInfo.uid;
141 private Intent getMediaProjectionIntent(int uid, String packageName, boolean permanentGrant) argument
143 IMediaProjection projection = mService.createProjection(uid, packageName,
/frameworks/base/packages/SystemUI/src/com/android/systemui/recents/model/
H A DRecentsPackageMonitor.java68 public void onPackageRemoved(String packageName, int uid) { argument
77 public boolean onPackageChanged(String packageName, int uid, String[] components) { argument

Completed in 412 milliseconds

12345678