/frameworks/base/core/java/android/app/ |
H A D | AppOpsManager.java | 1185 public PackageOps(String packageName, int uid, List<OpEntry> entries) { argument 1187 mUid = uid; 1371 * @param uid The uid of the application of interest. 1376 public List<AppOpsManager.PackageOps> getOpsForPackage(int uid, String packageName, int[] ops) { argument 1378 return mService.getOpsForPackage(uid, packageName, ops); 1390 * @param uid The UID for which to set the app. 1394 public void setUidMode(int code, int uid, int mode) { argument 1396 mService.setUidMode(code, uid, mode); 1408 * @param uid Th 1414 setUidMode(String appOp, int uid, int mode) argument 1444 setMode(int code, int uid, String packageName, int mode) argument 1559 buildSecurityExceptionMsg(int op, int uid, String packageName) argument 1590 checkOp(String op, int uid, String packageName) argument 1598 checkOpNoThrow(String op, int uid, String packageName) argument 1616 noteOp(String op, int uid, String packageName) argument 1624 noteOpNoThrow(String op, int uid, String packageName) argument 1671 startOp(String op, int uid, String packageName) argument 1679 startOpNoThrow(String op, int uid, String packageName) argument 1689 finishOp(String op, int uid, String packageName) argument 1710 checkOp(int op, int uid, String packageName) argument 1727 checkOpNoThrow(int op, int uid, String packageName) argument 1741 checkPackage(int uid, String packageName) argument 1756 checkAudioOp(int op, int stream, int uid, String packageName) argument 1773 checkAudioOpNoThrow(int op, int stream, int uid, String packageName) argument 1796 noteOp(int op, int uid, String packageName) argument 1856 noteOpNoThrow(int op, int uid, String packageName) argument 1901 startOp(int op, int uid, String packageName) argument 1918 startOpNoThrow(int op, int uid, String packageName) argument 1938 finishOp(int op, int uid, String packageName) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 717 public int checkPermission(String permission, int pid, int uid) { argument 718 return mBase.checkPermission(permission, pid, uid); 723 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 724 return mBase.checkPermission(permission, pid, uid, callerToken); 744 String permission, int pid, int uid, String message) { 745 mBase.enforcePermission(permission, pid, uid, message); 775 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 776 return mBase.checkUriPermission(uri, pid, uid, modeFlags); 781 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument 782 return mBase.checkUriPermission(uri, pid, uid, modeFlag 743 enforcePermission( String permission, int pid, int uid, String message) argument 796 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 803 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 821 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ApplicationInfo.java | 824 * the same uid). 826 public int uid; field in class:ApplicationInfo 1025 pw.println(prefix + "uid=" + uid + " flags=0x" + Integer.toHexString(flags) 1166 uid = orig.uid; 1234 dest.writeInt(uid); 1299 uid = source.readInt(); 1362 uid = UserHandle.getUid(userId, UserHandle.getAppId(uid)); [all...] |
/frameworks/base/core/java/android/os/ |
H A D | Process.java | 168 * First uid used for fully isolated sandboxed processes (with no permissions of their own) 174 * Last uid used for fully isolated sandboxed processes (with no permissions of their own) 419 * and not a zygote fork. Note that this is only allowed for uid 0 or when 425 * @param uid The user-id under which the process will run. 444 int uid, int gid, int[] gids, 453 return zygoteProcess.start(processClass, niceName, uid, gid, gids, 461 int uid, int gid, int[] gids, 470 return WebViewZygote.getProcess().start(processClass, niceName, uid, gid, gids, 533 * Returns the identifier of this process's uid. This is the kernel uid 442 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String invokeWith, String[] zygoteArgs) argument 459 startWebView(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String invokeWith, String[] zygoteArgs) argument 558 isApplicationUid(int uid) argument 571 isIsolated(int uid) argument 871 setUid(int uid) argument 874 setGid(int uid) argument 981 killProcessGroup(int uid, int pid) argument [all...] |
/frameworks/base/core/java/android/service/voice/ |
H A D | VoiceInteractionSession.java | 327 Request(String packageName, int uid, IVoiceInteractorCallback callback, argument 330 mCallingUid = uid; 337 * Return the uid of the application that initiated the request. 408 sb.append(" uid="); 437 ConfirmationRequest(String packageName, int uid, IVoiceInteractorCallback callback, argument 439 super(packageName, uid, callback, session, extras); 497 PickOptionRequest(String packageName, int uid, IVoiceInteractorCallback callback, argument 500 super(packageName, uid, callback, session, extras); 608 CompleteVoiceRequest(String packageName, int uid, IVoiceInteractorCallback callback, argument 610 super(packageName, uid, callbac 667 AbortVoiceRequest(String packageName, int uid, IVoiceInteractorCallback callback, VoiceInteractionSession session, VoiceInteractor.Prompt prompt, Bundle extras) argument 724 CommandRequest(String packageName, int uid, IVoiceInteractorCallback callback, VoiceInteractionSession session, String command, Bundle extras) argument [all...] |
/frameworks/base/core/java/com/android/internal/app/procstats/ |
H A D | ProcessStats.java | 224 final int uid = uids.keyAt(iu); 234 if (DEBUG) Slog.d(TAG, "Adding pkg " + pkgName + " uid " + uid 236 ProcessState thisProc = getProcessStateLocked(pkgName, uid, vers, 242 final PackageState pkgState = getPackageStateLocked(pkgName, uid, 252 if (DEBUG) Slog.d(TAG, "Adding pkg " + pkgName + " uid " + uid 254 ServiceState thisSvc = getServiceStateLocked(pkgName, uid, vers, 266 int uid = uids.keyAt(iu); 271 ProcessState thisProc = mProcesses.get(name, uid); 1118 getPackageStateLocked(String packageName, int uid, int vers) argument 1133 getProcessStateLocked(String packageName, int uid, int vers, String processName) argument 1203 getServiceStateLocked(String packageName, int uid, int vers, String processName, String className) argument 1727 PackageState(String packageName, int uid) argument [all...] |
/frameworks/base/core/java/com/android/internal/inputmethod/ |
H A D | InputMethodUtils.java | 759 * @param uid the UID to be validated. 764 final int uid, final String packageName) { 766 appOpsManager.checkPackage(uid, packageName); 763 checkIfPackageBelongsToUid(final AppOpsManager appOpsManager, final int uid, final String packageName) argument
|
/frameworks/base/core/jni/ |
H A D | android_util_Binder.cpp | 801 int uid = (int)(token>>32); local 802 if (uid > 0 && uid < 999) {
|
H A D | android_util_Process.cpp | 586 jint android_os_Process_setUid(JNIEnv* env, jobject clazz, jint uid) argument 588 return setuid(uid) == 0 ? 0 : errno; 591 jint android_os_Process_setGid(JNIEnv* env, jobject clazz, jint uid) argument 593 return setgid(uid) == 0 ? 0 : errno; 1206 jint android_os_Process_killProcessGroup(JNIEnv* env, jobject clazz, jint uid, jint pid) argument 1208 return killProcessGroup(uid, pid, SIGKILL);
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
H A D | SettingsProvider.java | 776 public void onPackageRemoved(String packageName, int uid) { 779 UserHandle.getUserId(uid)); 784 public void onUidRemoved(int uid) { 786 mSettingsRegistry.onUidRemovedLocked(uid); 1122 // Get uid of caller (key) used to store ssaid value 1554 // Whitelist system uid (ConnectivityService) and root uid to change always-on vpn 2227 final String uid = Integer.toString(callingPkg.applicationInfo.uid); 2229 final boolean success = ssaidSettings.insertSettingLocked(uid, ssai 2578 onUidRemovedLocked(int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | AppOpsService.java | 120 public final int uid; field in class:AppOpsService.UidState 124 public UidState(int uid) { argument 125 this.uid = uid; 152 public final int uid; field in class:AppOpsService.Op 164 uid = _uid; 256 String[] packageNames = getPackagesForUid(uidState.uid); 276 UserHandle.getUserId(ops.uidState.uid)); 279 if (curUid != ops.uidState.uid) { 281 + "/" + ops.uidState + ": new uid 344 packageRemoved(int uid, String packageName) argument 370 uidRemoved(int uid) argument 474 getOpsForPackage(int uid, String packageName, int[] ops) argument 500 getUidOps(int uid, int[] ops) argument 520 pruneOp(Op op, int uid, String packageName) argument 543 setUidMode(int code, int uid, int mode) argument 654 setMode(int code, int uid, String packageName, int mode) argument 709 addCallbacks( HashMap<Callback, ArrayList<ChangeRec>> callbacks, int op, int uid, String packageName, ArraySet<Callback> cbs) argument 745 final int uid; field in class:AppOpsService.ChangeRec 934 checkOperation(int code, int uid, String packageName) argument 960 checkAudioOperation(int code, int usage, int uid, String packageName) argument 983 isPackageSuspendedForUser(String pkg, int uid) argument 992 checkRestrictionLocked(int code, int usage, int uid, String packageName) argument 1004 setAudioRestriction(int code, int usage, int uid, int mode, String[] exceptionPackages) argument 1035 checkPackage(int uid, String packageName) argument 1069 noteOperation(int code, int uid, String packageName) argument 1079 noteOperationUnchecked(int code, int uid, String packageName, int proxyUid, String proxyPackageName) argument 1131 startOperation(IBinder token, int code, int uid, String packageName) argument 1186 finishOperation(IBinder token, int code, int uid, String packageName) argument 1236 verifyIncomingUid(int uid) argument 1254 getUidStateLocked(int uid, boolean edit) argument 1266 getOpsRawLocked(int uid, String packageName, boolean edit) argument 1350 getOpLocked(int code, int uid, String packageName, boolean edit) argument 1373 isOpRestrictedLocked(int uid, int code, String packageName) argument 2464 resolvePackageName(int uid, String packageName) argument 2475 getPackagesForUid(int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountsDb.java | 84 private static final String GRANTS_GRANTEE_UID = "uid"; 109 // these are called by the authenticators, the uid associated will be 596 oldVersion = 3; // skip version 2 which had uid based table 600 // Remove uid based table and replace it with packageName based 850 String authTokenType, long uid) { 855 new String[] {String.valueOf(accountId), authTokenType, String.valueOf(uid)}) > 0; 866 final int uid = cursor.getInt(0); 867 result.add(uid); 875 long findMatchingGrantsCount(int uid, String authTokenType, Account account) { argument 877 String[] args = {String.valueOf(uid), authTokenTyp 849 deleteGrantsByAccountIdAuthTokenTypeAndUid(long accountId, String authTokenType, long uid) argument 881 findMatchingGrantsCountAnyToken(int uid, Account account) argument 887 insertGrant(long accountId, String authTokenType, int uid) argument 896 deleteGrantsByUid(int uid) argument 1016 insertOrReplaceMetaAuthTypeAndUid(String authenticatorType, int uid) argument 1057 deleteMetaByAuthTypeAndUid(String type, int uid) argument 1146 insertMetaAuthTypeAndUid(SQLiteDatabase db, String authenticatorType, int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 370 final int allowed = mAm.getAppStartModeLocked(r.appInfo.uid, r.packageName, 375 + " from pid=" + callingPid + " uid=" + callingUid 384 UidRecord uidRec = mAm.mActiveUids.get(r.appInfo.uid); 385 return new ComponentName("?", "app is in background uid " + uidRec); 417 ProcessRecord proc = mAm.getProcessRecordLocked(r.processName, r.appInfo.uid, false); 468 Slog.v(TAG_SERVICE, "Not potential delay (callerFg=" + callerFg + " uid=" 615 void stopInBackgroundLocked(int uid) { argument 616 // Stop all services associated with this uid due to it going to the background 618 ServiceMap services = mServiceMap.get(UserHandle.getUserId(uid)); 623 if (service.appInfo.uid [all...] |
H A D | BatteryStatsService.java | 175 public void scheduleCpuSyncDueToRemovedUid(int uid) { argument 177 scheduleSyncLocked("remove-uid", UPDATE_CPU); 178 mUidsToRemove.add(uid); 315 void removeUid(int uid) { argument 317 mStats.removeUidStatsLocked(uid); 333 void noteProcessStart(String name, int uid) { argument 335 mStats.noteProcessStartLocked(name, uid); 339 void noteProcessCrash(String name, int uid) { argument 341 mStats.noteProcessCrashLocked(name, uid); 345 void noteProcessAnr(String name, int uid) { argument 351 noteProcessFinish(String name, int uid) argument 357 noteUidProcessState(int uid, int state) argument 420 noteEvent(int code, String name, int uid) argument 427 noteSyncStart(String name, int uid) argument 434 noteSyncFinish(String name, int uid) argument 441 noteJobStart(String name, int uid) argument 448 noteJobFinish(String name, int uid) argument 455 noteAlarmStart(String name, int uid) argument 462 noteAlarmFinish(String name, int uid) argument 469 noteStartWakelock(int uid, int pid, String name, String historyName, int type, boolean unimportantForLogging) argument 478 noteStopWakelock(int uid, int pid, String name, String historyName, int type) argument 513 noteLongPartialWakelockStart(String name, String historyName, int uid) argument 520 noteLongPartialWakelockFinish(String name, String historyName, int uid) argument 527 noteStartSensor(int uid, int sensor) argument 534 noteStopSensor(int uid, int sensor) argument 541 noteVibratorOn(int uid, long durationMillis) argument 548 noteVibratorOff(int uid) argument 555 noteStartGps(int uid) argument 562 noteStopGps(int uid) argument 585 noteUserActivity(int uid, int event) argument 613 noteMobileRadioPowerState(int powerState, long timestampNs, int uid) argument 675 noteStartAudio(int uid) argument 682 noteStopAudio(int uid) argument 689 noteStartVideo(int uid) argument 696 noteStopVideo(int uid) argument 717 noteFlashlightOn(int uid) argument 724 noteFlashlightOff(int uid) argument 731 noteStartCamera(int uid) argument 740 noteStopCamera(int uid) argument 762 noteWifiRadioPowerState(int powerState, long tsNanos, int uid) argument 821 noteFullWifiLockAcquired(int uid) argument 828 noteFullWifiLockReleased(int uid) argument 835 noteWifiScanStarted(int uid) argument 842 noteWifiScanStopped(int uid) argument 849 noteWifiMulticastEnabled(int uid) argument 856 noteWifiMulticastDisabled(int uid) argument [all...] |
H A D | UserController.java | 485 + ", uid=" + Binder.getCallingUid() 818 + ", uid=" + Binder.getCallingUid() 987 + ", uid=" + Binder.getCallingUid() 1367 + ", uid=" + Binder.getCallingUid() 1504 + ", uid=" + Binder.getCallingUid() 1713 void batteryStatsServiceNoteEvent(int code, String name, int uid) { argument 1714 mService.mBatteryStatsService.noteEvent(code, name, uid); 1748 int checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 1750 return mService.checkComponentPermission(permission, pid, uid, owningUid, exported);
|
/frameworks/base/services/core/java/com/android/server/display/ |
H A D | DisplayManagerService.java | 1006 private boolean isUidPresentOnDisplayInternal(int uid, int displayId) { argument 1009 return displayUIDs != null && displayUIDs.indexOf(uid) != -1; 1522 throw new SecurityException("packageName must match the calling uid"); 1634 private boolean validatePackageName(int uid, String packageName) { argument 1636 String[] packageNames = mContext.getPackageManager().getPackagesForUid(uid); 1775 public boolean isUidPresentOnDisplay(int uid, int displayId) { argument 1776 return isUidPresentOnDisplayInternal(uid, displayId);
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerService.java | 197 * The uid whose jobs we would like to assign to a context. 494 * still clean up. On reinstall the package will have a new uid. 546 Slog.w(TAG, "PACKAGE_CHANGED for " + pkgName + " / uid " + pkgUid); 554 Slog.d(TAG, "Removing jobs for uid: " + uidRemoved); 577 Slog.d(TAG, "Restart query: package " + pkgName + " at uid " 591 Slog.d(TAG, "Removing jobs for pkg " + pkgName + " at uid " + pkgUid); 606 @Override public void onUidStateChanged(int uid, int procState, 608 updateUidState(uid, procState); 611 @Override public void onUidGone(int uid, boolean disabled) throws RemoteException { 612 updateUidState(uid, ActivityManage 720 getPendingJobs(int uid) argument 732 getPendingJob(int uid, int jobId) argument 762 cancelJobsForPackageAndUid(String pkgName, int uid) argument 781 cancelJobsForUid(int uid, String reason) argument 798 cancelJob(int uid, int jobId) argument 821 updateUidState(int uid, int procState) argument 1753 addBackingUpUid(int uid) argument 1763 removeBackingUpUid(int uid) argument 1797 enforceValidJobRequest(int uid, JobInfo job) argument 1821 canPersistJobs(int pid, int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/job/controllers/ |
H A D | JobStatus.java | 730 public boolean matches(int uid, int jobId) { argument 731 return this.job.getId() == jobId && this.callingUid == uid; 898 pw.print("Source: uid="); UserHandle.formatUid(pw, getSourceUid());
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | MediaRouterService.java | 124 final int uid = Binder.getCallingUid(); 125 if (!validatePackageName(uid, packageName)) { 126 throw new SecurityException("packageName must match the calling uid"); 130 final int resolvedUserId = ActivityManager.handleIncomingUser(pid, uid, userId, 472 private boolean validatePackageName(int uid, String packageName) { argument 474 String[] packageNames = mContext.getPackageManager().getPackagesForUid(uid);
|
H A D | MediaSessionRecord.java | 240 * @param uid The uid that made the original volume request. 244 public void adjustVolume(int direction, int flags, String packageName, int uid, argument 253 postAdjustLocalVolume(stream, direction, flags, packageName, uid, useSuggested, 285 public void setVolumeTo(int value, int flags, String packageName, int uid) { argument 288 mAudioManagerInternal.setStreamVolumeForUid(stream, value, flags, packageName, uid); 427 ResultReceiver cb, int uid, String packageName) { 428 updateCallingPackage(uid, packageName); 460 final String packageName, final int uid, final boolean useSuggested, 468 flags, packageName, uid); 426 sendMediaButton(KeyEvent ke, int sequenceId, ResultReceiver cb, int uid, String packageName) argument 459 postAdjustLocalVolume(final int stream, final int direction, final int flags, final String packageName, final int uid, final boolean useSuggested, final int previousFlagPlaySound) argument 703 updateCallingPackage(int uid, String packageName) argument 715 getPackageName(int uid) argument 1375 ISessionControllerCallbackHolder(ISessionControllerCallback callback, int uid) argument [all...] |
H A D | MediaSessionService.java | 144 public void onAudioPlaybackStarted(int uid) { 147 getFullUserRecordLocked(UserHandle.getUserId(uid)); 303 protected void enforcePhoneStatePermission(int pid, int uid) { argument 304 if (getContext().checkPermission(android.Manifest.permission.MODIFY_PHONE_STATE, pid, uid) 407 private void enforcePackageName(String packageName, int uid) { argument 411 String[] packages = getContext().getPackageManager().getPackagesForUid(uid); 431 private void enforceMediaPermissions(ComponentName compName, int pid, int uid, argument 433 if (isCurrentVolumeController(uid, pid)) return; 435 .checkPermission(android.Manifest.permission.MEDIA_CONTENT_CONTROL, pid, uid) 437 && !isEnabledNotificationListener(compName, UserHandle.getUserId(uid), 443 isCurrentVolumeController(int uid, int pid) argument 448 enforceSystemUiPermission(String action, int pid, int uid) argument 610 getCallingPackageName(int uid) argument 780 SessionsListenerRecord(IActiveSessionsListener listener, ComponentName componentName, int userId, int pid, int uid) argument 1325 verifySessionsRequest(ComponentName componentName, int userId, final int pid, final int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsService.java | 184 private static final String PREFIX_UID = "uid"; 353 // listen for uid removal to clean stats 580 NetworkTemplate template, int uid, int set, int tag, int fields) { 583 return getUidComplete().getHistory(template, uid, set, tag, fields, 586 return getUidTagComplete().getHistory(template, uid, set, tag, fields, 593 NetworkTemplate template, int uid, int set, int tag, int fields, 597 return getUidComplete().getHistory(template, uid, set, tag, fields, start, end, 599 } else if (uid == Binder.getCallingUid()) { 600 return getUidTagComplete().getHistory(template, uid, set, tag, fields, 604 + " cannot access tag information from a different uid"); 655 getDataLayerSnapshotForUid(int uid) argument 693 incrementOperationCount(int uid, int tag, int operationCount) argument 715 setUidForeground(int uid, boolean uidForeground) argument [all...] |
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
H A D | WallpaperManagerService.java | 787 public void onPackageUpdateFinished(String packageName, int uid) { argument 830 public void onPackageUpdateStarted(String packageName, int uid) { argument 854 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkPolicyManagerServiceTest.java | 696 @NetPolicyXml("restrict-background-lists-uid-policy-format.xml") 732 * Tests scenario where an UID had {@code restrict-background} and {@code uid-policy} tags. 774 // and swap another uid into foreground 1146 private void callOnUidStateChanged(int uid, int procState, long procStateSeq) argument 1148 mUidObserver.onUidStateChanged(uid, procState, procStateSeq); 1179 // Verify with no uid info written to history. 1182 assertEquals("When no uid info is there, dump should contain NONE", 1187 int uid = 111; 1191 uid++; 1193 history.addProcStateSeqUL(uid, procStateSe 1507 expectHasInternetPermission(int uid, boolean hasIt) argument 1586 assertUidPolicy(int uid, int expected) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerTest.java | 1260 final int uid = UserHandle.getUid(userId, appId); 1261 doReturn(uid).when(mContext.packageManager).getPackageUidAsUser( 1264 // Associate packageName to uid 1265 doReturn(packageName).when(mContext.ipackageManager).getNameForUid(eq(uid)); 1267 .when(mContext.ipackageManager).getPackagesForUid(eq(uid)); 1268 return uid; 1422 "Caller with uid \\d+ is not a delegate of scope delegation-app-restrictions.", 1430 "Caller with uid \\d+ is not a delegate of scope delegation-app-restrictions.", 1472 "Caller with uid \\d+ is not a delegate of scope delegation-app-restrictions.", 1495 "Caller with uid \\ 4378 assertProvisioningAllowed(String action, boolean expected, String packageName, int uid) argument [all...] |