/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsAccess.java | 106 Context context, int callingUid, String callingPackage) { 114 boolean isDeviceOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 117 || UserHandle.getAppId(callingUid) == android.os.Process.SYSTEM_UID) { 123 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage); 129 boolean isProfileOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 172 Context context, int callingUid, String callingPackage) { 178 callingUid, callingPackage); 105 checkAccessLevel( Context context, int callingUid, String callingPackage) argument 171 hasAppOpsPermission( Context context, int callingUid, String callingPackage) argument
|
H A D | NetworkStatsObservers.java | 81 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) { 83 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid, 96 public void unregister(DataUsageRequest request, int callingUid) { argument 97 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */, 143 handleUnregister((DataUsageRequest) msg.obj, msg.arg1 /* callingUid */); 171 private void handleUnregister(DataUsageRequest request, int callingUid) { argument 178 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) { 179 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request); 212 Messenger messenger, IBinder binder, int callingUid, 80 register(DataUsageRequest inputRequest, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 211 buildRequestInfo(DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 239 RequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 334 NetworkUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 376 UserUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | NotificationManagerInternal.java | 24 void enqueueNotification(String pkg, String basePkg, int callingUid, int callingPid, argument
|
H A D | NotificationDelegate.java | 23 void onClearAll(int callingUid, int callingPid, int userId); argument 24 void onNotificationClick(int callingUid, int callingPid, String key); argument 25 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex); argument 26 void onNotificationClear(int callingUid, int callingPid, argument 28 void onNotificationError(int callingUid, int callingPid, argument
|
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | NotificationCompatSideChannelService.java | 112 void checkPermission(int callingUid, String packageName) { argument 113 for (String validPackage : getPackageManager().getPackagesForUid(callingUid)) { 118 throw new SecurityException("NotificationSideChannelService: Uid " + callingUid
|
/frameworks/support/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument 96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
|
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument 96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
|
/frameworks/base/services/restrictions/java/com/android/server/restrictions/ |
H A D | RestrictionsManagerService.java | 97 int callingUid = Binder.getCallingUid(); 98 int userHandle = UserHandle.getUserId(callingUid); 110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" + 163 int callingUid = Binder.getCallingUid(); 164 int userHandle = UserHandle.getUserId(callingUid); 172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(), 187 private void enforceCallerMatchesPackage(int callingUid, String packageName, argument 190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid); 193 throw new SecurityException(message + callingUid);
|
/frameworks/base/core/java/android/net/ |
H A D | NetworkScoreManager.java | 420 * @param callingUid the UID to check 424 public boolean isCallerActiveScorer(int callingUid) { argument 426 return mService.isCallerActiveScorer(callingUid);
|
/frameworks/base/core/java/android/speech/ |
H A D | RecognitionService.java | 98 int callingUid) { 112 mCurrentCallback = new Callback(listener, callingUid); 162 public StartListeningArgs(Intent intent, IRecognitionListener listener, int callingUid) { argument 165 this.mCallingUid = callingUid; 236 private Callback(IRecognitionListener listener, int callingUid) { argument 238 mCallingUid = callingUid; 97 dispatchStartListening(Intent intent, final IRecognitionListener listener, int callingUid) argument
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | PersistentDataBlockService.java | 177 private void enforceUid(int callingUid) { argument 178 if (callingUid != mAllowedUid) { 179 throw new SecurityException("uid " + callingUid + " not allowed to access PST");
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityStartInterceptor.java | 98 TaskRecord inTask, int callingPid, int callingUid, ActivityOptions activityOptions) { 102 mCallingUid = callingUid; 97 intercept(Intent intent, ResolveInfo rInfo, ActivityInfo aInfo, String resolvedType, TaskRecord inTask, int callingPid, int callingUid, ActivityOptions activityOptions) argument
|
H A D | AppErrors.java | 317 final int callingUid = Binder.getCallingUid(); 321 crashApplicationInner(r, crashInfo, callingPid, callingUid); 328 int callingPid, int callingUid) { 353 timeMillis, callingPid, callingUid)) { 455 int callingPid, int callingUid) { 463 int uid = r != null ? r.info.uid : callingUid; 327 crashApplicationInner(ProcessRecord r, ApplicationErrorReport.CrashInfo crashInfo, int callingPid, int callingUid) argument 451 handleAppCrashInActivityController(ProcessRecord r, ApplicationErrorReport.CrashInfo crashInfo, String shortMsg, String longMsg, String stackTrace, long timeMillis, int callingPid, int callingUid) argument
|
H A D | BroadcastRecord.java | 50 final int callingUid; // the uid of who sent this field in class:BroadcastRecord 116 pw.print(" uid="); pw.println(callingUid); 231 callingUid = _callingUid; 262 callingUid = from.callingUid;
|
/frameworks/base/services/voiceinteraction/java/com/android/server/voiceinteraction/ |
H A D | VoiceInteractionManagerServiceImpl.java | 190 public int startVoiceActivityLocked(int callingPid, int callingUid, IBinder token, argument 204 return mAm.startVoiceActivity(mComponent.getPackageName(), callingPid, callingUid, 212 public int startAssistantActivityLocked(int callingPid, int callingUid, IBinder token, argument 227 return mAm.startAssistantActivity(mComponent.getPackageName(), callingPid, callingUid, 267 public void setDisabledShowContextLocked(int callingUid, int flags) { argument 269 if (callingUid != activeUid) { 270 throw new SecurityException("Calling uid " + callingUid 276 public int getDisabledShowContextLocked(int callingUid) { argument 278 if (callingUid != activeUid) { 279 throw new SecurityException("Calling uid " + callingUid 285 getUserDisabledShowContextLocked(int callingUid) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerInternal.java | 74 * permission grants if {@code callingUid} has permission to them. 76 public abstract void grantUriPermissionFromIntent(int callingUid, String targetPkg, argument
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageManagerInternal.java | 352 int flags, int userId, int callingUid); 373 public abstract boolean canAccessInstantApps(int callingUid, int userId); argument 351 resolveService(Intent intent, String resolvedType, int flags, int userId, int callingUid) argument
|
/frameworks/base/services/core/java/com/android/server/clipboard/ |
H A D | ClipboardService.java | 257 final int callingUid = Binder.getCallingUid(); 259 callingUid)) { 262 checkDataOwnerLocked(clip, callingUid); 263 final int userId = UserHandle.getUserId(callingUid); 568 private boolean clipboardAccessAllowed(int op, String callingPackage, int callingUid) { argument 570 if (mAppOps.checkOp(op, callingUid, callingPackage) != AppOpsManager.MODE_ALLOWED) { 576 UserHandle.getUserId(callingUid))) { 580 return mAm.isAppForeground(callingUid);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/am/ |
H A D | ActivityTestsBase.java | 178 int callingUid, ActivityInfo activityInfo) { 180 return super.canPlaceEntityOnDisplay(displayId, resizeable, callingPid, callingUid, 177 canPlaceEntityOnDisplay(int displayId, boolean resizeable, int callingPid, int callingUid, ActivityInfo activityInfo) argument
|
H A D | UserControllerTest.java | 387 boolean sticky, int callingPid, int callingUid, int userId) { 384 broadcastIntentLocked(Intent intent, String resolvedType, IIntentReceiver resultTo, int resultCode, String resultData, Bundle resultExtras, String[] requiredPermissions, int appOp, Bundle bOptions, boolean ordered, boolean sticky, int callingPid, int callingUid, int userId) argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
H A D | DpmMockContext.java | 82 public int callingUid = CALLER_UID; field in class:DpmMockContext.MockBinder 87 final long token = (((long) callingUid) << 32) | (callingPid); 88 callingUid = SYSTEM_UID; 94 callingUid = (int) (token >> 32); 99 return callingUid; 111 return callingUid == SYSTEM_UID;
|
/frameworks/base/services/usage/java/com/android/server/usage/ |
H A D | StorageStatsService.java | 139 private void enforcePermission(int callingUid, String callingPackage) { argument 141 callingUid, callingPackage); 150 throw new SecurityException("Package " + callingPackage + " from UID " + callingUid
|
/frameworks/av/services/audiopolicy/service/ |
H A D | AudioPolicyInterfaceImpl.cpp | 179 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local 180 if (!isTrustedCallingUid(callingUid) || uid == (uid_t)-1) { 181 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid, 182 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid); 183 uid = callingUid; 293 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local 294 if (!isTrustedCallingUid(callingUid)) { 295 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid, 296 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid); 297 uid = callingUid; [all...] |
/frameworks/base/services/autofill/java/com/android/server/autofill/ |
H A D | AutofillManagerServiceImpl.java | 424 final int callingUid = Binder.getCallingUid(); 431 if (callingUid != packageUid && !LocalServices.getService(ActivityManagerInternal.class) 432 .hasRunningActivity(callingUid, packageName)) { 433 final String[] packages = pm.getPackagesForUid(callingUid); 434 final String callingPackage = packages != null ? packages[0] : "uid-" + callingUid; 435 Slog.w(TAG, "App (package=" + callingPackage + ", UID=" + callingUid 637 * @param callingUid The calling uid 641 FillEventHistory getFillEventHistory(int callingUid) { argument 643 if (mEventHistory != null && mEventHistory.getServiceUid() == callingUid) {
|
H A D | RemoteFillService.java | 283 int callingUid, int requestFlags, FillResponse response) { 286 mCallbacks.onFillRequestSuccess(requestFlags, response, callingUid, 282 dispatchOnFillRequestSuccess(PendingRequest pendingRequest, int callingUid, int requestFlags, FillResponse response) argument
|