Searched refs:callingUid (Results 1 - 25 of 98) sorted by relevance

1234

/frameworks/base/services/core/java/com/android/server/notification/
H A DNotificationDelegate.java23 void onClearAll(int callingUid, int callingPid, int userId); argument
24 void onNotificationClick(int callingUid, int callingPid, String key); argument
25 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex); argument
26 void onNotificationClear(int callingUid, int callingPid, argument
28 void onNotificationError(int callingUid, int callingPid, argument
H A DNotificationManagerInternal.java24 void enqueueNotification(String pkg, String basePkg, int callingUid, int callingPid, argument
/frameworks/base/location/lib/java/com/android/location/provider/
H A DActivityRecognitionProviderClient.java42 int callingUid = Binder.getCallingUid();
43 if (callingUid != Process.SYSTEM_UID) {
44 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
H A DActivityRecognitionProviderWatcher.java58 int callingUid = Binder.getCallingUid();
59 if (callingUid != Process.SYSTEM_UID) {
60 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/
H A DDevicePolicyManagerTestable.java35 return UserHandle.getUserId(dpms.context.binder.callingUid);
H A DDevicePolicyManagerTest.java167 mServiceContext.binder.callingUid = DpmMockContext.CALLER_UID;
184 mAdmin1Context.binder.callingUid = DpmMockContext.CALLER_UID;
247 mServiceContext.binder.callingUid =
401 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID;
405 mMockContext.binder.callingUid = DpmMockContext.CALLER_UID;
409 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID;
480 mContext.binder.callingUid = 1234567;
492 mContext.binder.callingUid = DpmMockContext.CALLER_UID;
537 mContext.binder.callingUid = 1234567;
607 mContext.binder.callingUid
[all...]
H A DDpmTestBase.java96 final int callingUid = caller.binder.callingUid;
101 serviceContext.binder.callingUid = callingUid;
103 serviceContext.binder.callingPermissions.put(callingUid, caller.permissions);
H A DDpmMockContext.java82 public int callingUid = CALLER_UID; field in class:DpmMockContext.MockBinder
87 final long token = (((long) callingUid) << 32) | (callingPid);
88 callingUid = SYSTEM_UID;
94 callingUid = (int) (token >> 32);
99 return callingUid;
111 return callingUid == SYSTEM_UID;
/frameworks/base/core/java/android/net/
H A DTrafficStats.java583 final int callingUid = android.os.Process.myUid();
584 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) {
612 final int callingUid = android.os.Process.myUid();
613 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) {
641 final int callingUid = android.os.Process.myUid();
642 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) {
670 final int callingUid
[all...]
H A DINetworkScoreService.aidl96 * @param callingUid the UID to check
100 boolean isCallerActiveScorer(int callingUid);
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkStatsAccess.java106 Context context, int callingUid, String callingPackage) {
114 boolean isDeviceOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid,
117 || UserHandle.getAppId(callingUid) == android.os.Process.SYSTEM_UID) {
123 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage);
129 boolean isProfileOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid,
172 Context context, int callingUid, String callingPackage) {
178 callingUid, callingPackage);
105 checkAccessLevel( Context context, int callingUid, String callingPackage) argument
171 hasAppOpsPermission( Context context, int callingUid, String callingPackage) argument
H A DNetworkStatsObservers.java81 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) {
83 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid,
96 public void unregister(DataUsageRequest request, int callingUid) { argument
97 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */,
143 handleUnregister((DataUsageRequest) msg.obj, msg.arg1 /* callingUid */);
171 private void handleUnregister(DataUsageRequest request, int callingUid) { argument
178 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) {
179 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request);
212 Messenger messenger, IBinder binder, int callingUid,
80 register(DataUsageRequest inputRequest, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument
211 buildRequestInfo(DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument
239 RequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument
334 NetworkUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument
376 UserUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument
[all...]
/frameworks/support/compat/java/android/support/v4/app/
H A DNotificationCompatSideChannelService.java112 void checkPermission(int callingUid, String packageName) { argument
113 for (String validPackage : getPackageManager().getPackagesForUid(callingUid)) {
118 throw new SecurityException("NotificationSideChannelService: Uid " + callingUid
/frameworks/base/services/restrictions/java/com/android/server/restrictions/
H A DRestrictionsManagerService.java97 int callingUid = Binder.getCallingUid();
98 int userHandle = UserHandle.getUserId(callingUid);
110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" +
163 int callingUid = Binder.getCallingUid();
164 int userHandle = UserHandle.getUserId(callingUid);
172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(),
187 private void enforceCallerMatchesPackage(int callingUid, String packageName, argument
190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid);
193 throw new SecurityException(message + callingUid);
/frameworks/base/services/core/java/com/android/server/accounts/
H A DAccountManagerService.java450 int callingUid = Binder.getCallingUid();
453 Log.v(TAG, "addAccountExplicitly: " + account + ", caller's uid " + callingUid
457 if (!isAccountManagedByCaller(account.type, callingUid, userId)) {
459 callingUid, account.type);
472 return addAccountInternal(accounts, account, password, extras, callingUid,
482 int callingUid = Binder.getCallingUid();
484 boolean isSystemUid = UserHandle.isSameApp(callingUid, Process.SYSTEM_UID);
485 List<String> managedTypes = getTypesForCaller(callingUid, userId, isSystemUid);
491 + callingUid + " with packageName=" + packageName);
501 return getAccountsAndVisibilityForPackage(packageName, managedTypes, callingUid,
511 getAccountsAndVisibilityForPackage(String packageName, List<String> accountTypes, Integer callingUid, UserAccounts accounts) argument
1595 isCrossUser(int callingUid, int userId) argument
1760 addAccountInternal(UserAccounts accounts, Account account, String password, Bundle extras, int callingUid, Map<String, Integer> packageToVisibility) argument
2269 removeAccountInternal(UserAccounts accounts, Account account, int callingUid) argument
2556 setPasswordInternal(UserAccounts accounts, Account account, String password, int callingUid) argument
4063 GetAccountsByTypeAndFeatureSession( UserAccounts accounts, IAccountManagerResponse response, String type, String[] features, int callingUid, String packageName, boolean includeManagedNotVisible) argument
4314 getAccountsInternal( UserAccounts userAccounts, int callingUid, String callingPackage, List<String> visibleAccountTypes, boolean includeUserManagedNotVisible) argument
4382 removeSharedAccountAsUser(Account account, int userId, int callingUid) argument
5058 logRecord(String action, String tableName, long accountId, UserAccounts userAccount, int callingUid) argument
5302 isPermitted(String opPackageName, int callingUid, String... permissions) argument
5328 isPrivileged(int callingUid) argument
5394 isAccountVisibleToCaller(String accountType, int callingUid, int userId, String opPackageName) argument
5446 checkPackageSignature(String accountType, int callingUid, int userId) argument
5475 isAccountManagedByCaller(String accountType, int callingUid, int userId) argument
5483 getTypesVisibleToCaller(int callingUid, int userId, String opPackageName) argument
5488 getTypesManagedByCaller(int callingUid, int userId) argument
5492 getTypesForCaller( int callingUid, int userId, boolean isOtherwisePermitted) argument
5572 isSystemUid(int callingUid) argument
5600 checkReadAccountsPermitted( int callingUid, String accountType, int userId, String opPackageName) argument
5615 canUserModifyAccounts(int userId, int callingUid) argument
5627 canUserModifyAccountsForType(int userId, String accountType, int callingUid) argument
5788 filterAccounts(UserAccounts accounts, Account[] unfiltered, int callingUid, @Nullable String callingPackage, boolean includeManagedNotVisible) argument
5814 filterSharedAccounts(UserAccounts userAccounts, @NonNull Map<Account, Integer> unfiltered, int callingUid, @Nullable String callingPackage) argument
5897 getAccountsFromCache(UserAccounts userAccounts, String accountType, int callingUid, @Nullable String callingPackage, boolean includeManagedNotVisible) argument
[all...]
/frameworks/base/services/voiceinteraction/java/com/android/server/voiceinteraction/
H A DVoiceInteractionManagerServiceImpl.java190 public int startVoiceActivityLocked(int callingPid, int callingUid, IBinder token, argument
204 return mAm.startVoiceActivity(mComponent.getPackageName(), callingPid, callingUid,
212 public int startAssistantActivityLocked(int callingPid, int callingUid, IBinder token, argument
227 return mAm.startAssistantActivity(mComponent.getPackageName(), callingPid, callingUid,
267 public void setDisabledShowContextLocked(int callingUid, int flags) { argument
269 if (callingUid != activeUid) {
270 throw new SecurityException("Calling uid " + callingUid
276 public int getDisabledShowContextLocked(int callingUid) { argument
278 if (callingUid != activeUid) {
279 throw new SecurityException("Calling uid " + callingUid
285 getUserDisabledShowContextLocked(int callingUid) argument
[all...]
H A DVoiceInteractionManagerService.java641 final int callingUid = Binder.getCallingUid();
644 return mImpl.startVoiceActivityLocked(callingPid, callingUid, token,
660 final int callingUid = Binder.getCallingUid();
663 return mImpl.startAssistantActivityLocked(callingPid, callingUid, token,
726 final int callingUid = Binder.getCallingUid();
729 mImpl.setDisabledShowContextLocked(callingUid, flags);
743 final int callingUid = Binder.getCallingUid();
746 return mImpl.getDisabledShowContextLocked(callingUid);
761 final int callingUid = Binder.getCallingUid();
764 return mImpl.getUserDisabledShowContextLocked(callingUid);
[all...]
/frameworks/base/services/core/java/com/android/server/tv/
H A DTvInputManagerService.java523 private SessionState getSessionStateLocked(IBinder sessionToken, int callingUid, int userId) { argument
530 if (callingUid != Process.SYSTEM_UID && callingUid != sessionState.callingUid) {
532 + " from uid " + callingUid);
537 private ITvInputSession getSessionLocked(IBinder sessionToken, int callingUid, int userId) { argument
538 return getSessionLocked(getSessionStateLocked(sessionToken, callingUid, userId));
550 private int resolveCallingUserId(int callingPid, int callingUid, int requestedUserId, argument
552 return ActivityManager.handleIncomingUser(callingPid, callingUid, requestedUserId, false,
666 private void releaseSessionLocked(IBinder sessionToken, int callingUid, in argument
726 setMainLocked(IBinder sessionToken, boolean isMain, int callingUid, int userId) argument
2214 private final int callingUid; field in class:TvInputManagerService.SessionState
2222 SessionState(IBinder sessionToken, String inputId, ComponentName componentName, boolean isRecordingSession, ITvInputClient client, int seq, int callingUid, int userId) argument
[all...]
/frameworks/base/core/java/android/speech/
H A DRecognitionService.java98 int callingUid) {
112 mCurrentCallback = new Callback(listener, callingUid);
162 public StartListeningArgs(Intent intent, IRecognitionListener listener, int callingUid) { argument
165 this.mCallingUid = callingUid;
236 private Callback(IRecognitionListener listener, int callingUid) { argument
238 mCallingUid = callingUid;
97 dispatchStartListening(Intent intent, final IRecognitionListener listener, int callingUid) argument
/frameworks/base/services/core/java/com/android/server/am/
H A DBroadcastQueue.java522 r.callingPid, r.callingUid, -1, true);
527 + r.callingPid + ", uid=" + r.callingUid + ")"
534 && mService.mAppOpsService.noteOperation(opCode, r.callingUid,
539 + r.callingPid + ", uid=" + r.callingUid + ")"
560 + " (uid " + r.callingUid + ")");
577 + " (uid " + r.callingUid + ")");
593 + " (uid " + r.callingUid + ")");
608 + " (uid " + r.callingUid + ")");
612 if (!mService.mIntentFirewall.checkBroadcast(r.intent, r.callingUid,
630 && filter.receiverList.uid != r.callingUid) {
[all...]
/frameworks/support/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/
H A DPackageValidator.java94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument
96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/
H A DPackageValidator.java94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument
96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
/frameworks/base/services/core/java/com/android/server/job/controllers/
H A DJobStatus.java97 final int callingUid; field in class:JobStatus
221 return callingUid;
224 private JobStatus(JobInfo job, int callingUid, String sourcePackageName, argument
228 this.callingUid = callingUid;
240 this.sourceUid = callingUid;
241 this.sourceUserId = UserHandle.getUserId(callingUid);
321 public JobStatus(JobInfo job, int callingUid, String sourcePackageName, int sourceUserId, argument
325 this(job, callingUid, sourcePackageName, sourceUserId, sourceTag, 0,
354 * @param callingUid Ui
359 createFromJobInfo(JobInfo job, int callingUid, String sourcePackageName, int sourceUserId, String tag) argument
[all...]
/frameworks/av/services/audiopolicy/service/
H A DAudioPolicyInterfaceImpl.cpp179 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local
180 if (!isTrustedCallingUid(callingUid) || uid == (uid_t)-1) {
181 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid,
182 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid);
183 uid = callingUid;
293 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local
294 if (!isTrustedCallingUid(callingUid)) {
295 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid,
296 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid);
297 uid = callingUid;
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DPackageInstallerService.java428 final int callingUid = Binder.getCallingUid();
429 mPm.enforceCrossUserPermission(callingUid, userId, true, true, "createSession");
435 if ((callingUid == Process.SHELL_UID) || (callingUid == Process.ROOT_UID)) {
439 mAppOps.checkPackage(callingUid, installerPackageName);
445 && !mPm.isCallerVerifier(callingUid)) {
521 final int activeCount = getSessionCount(mSessions, callingUid);
524 "Too many active sessions for UID " + callingUid);
526 final int historicalCount = mHistoricalSessionsByInstaller.get(callingUid);
529 "Too many historical sessions for UID " + callingUid);
[all...]

Completed in 2061 milliseconds

1234