/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | NotificationDelegate.java | 23 void onClearAll(int callingUid, int callingPid, int userId); argument 24 void onNotificationClick(int callingUid, int callingPid, String key); argument 25 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex); argument 26 void onNotificationClear(int callingUid, int callingPid, argument 28 void onNotificationError(int callingUid, int callingPid, argument
|
H A D | NotificationManagerInternal.java | 24 void enqueueNotification(String pkg, String basePkg, int callingUid, int callingPid, argument
|
/frameworks/base/location/lib/java/com/android/location/provider/ |
H A D | ActivityRecognitionProviderClient.java | 42 int callingUid = Binder.getCallingUid(); 43 if (callingUid != Process.SYSTEM_UID) { 44 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
|
H A D | ActivityRecognitionProviderWatcher.java | 58 int callingUid = Binder.getCallingUid(); 59 if (callingUid != Process.SYSTEM_UID) { 60 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerTestable.java | 35 return UserHandle.getUserId(dpms.context.binder.callingUid);
|
H A D | DevicePolicyManagerTest.java | 167 mServiceContext.binder.callingUid = DpmMockContext.CALLER_UID; 184 mAdmin1Context.binder.callingUid = DpmMockContext.CALLER_UID; 247 mServiceContext.binder.callingUid = 401 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; 405 mMockContext.binder.callingUid = DpmMockContext.CALLER_UID; 409 mMockContext.binder.callingUid = ANOTHER_ADMIN_UID; 480 mContext.binder.callingUid = 1234567; 492 mContext.binder.callingUid = DpmMockContext.CALLER_UID; 537 mContext.binder.callingUid = 1234567; 607 mContext.binder.callingUid [all...] |
H A D | DpmTestBase.java | 96 final int callingUid = caller.binder.callingUid; 101 serviceContext.binder.callingUid = callingUid; 103 serviceContext.binder.callingPermissions.put(callingUid, caller.permissions);
|
H A D | DpmMockContext.java | 82 public int callingUid = CALLER_UID; field in class:DpmMockContext.MockBinder 87 final long token = (((long) callingUid) << 32) | (callingPid); 88 callingUid = SYSTEM_UID; 94 callingUid = (int) (token >> 32); 99 return callingUid; 111 return callingUid == SYSTEM_UID;
|
/frameworks/base/core/java/android/net/ |
H A D | TrafficStats.java | 583 final int callingUid = android.os.Process.myUid(); 584 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 612 final int callingUid = android.os.Process.myUid(); 613 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 641 final int callingUid = android.os.Process.myUid(); 642 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 670 final int callingUid [all...] |
H A D | INetworkScoreService.aidl | 96 * @param callingUid the UID to check 100 boolean isCallerActiveScorer(int callingUid);
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsAccess.java | 106 Context context, int callingUid, String callingPackage) { 114 boolean isDeviceOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 117 || UserHandle.getAppId(callingUid) == android.os.Process.SYSTEM_UID) { 123 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage); 129 boolean isProfileOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 172 Context context, int callingUid, String callingPackage) { 178 callingUid, callingPackage); 105 checkAccessLevel( Context context, int callingUid, String callingPackage) argument 171 hasAppOpsPermission( Context context, int callingUid, String callingPackage) argument
|
H A D | NetworkStatsObservers.java | 81 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) { 83 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid, 96 public void unregister(DataUsageRequest request, int callingUid) { argument 97 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */, 143 handleUnregister((DataUsageRequest) msg.obj, msg.arg1 /* callingUid */); 171 private void handleUnregister(DataUsageRequest request, int callingUid) { argument 178 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) { 179 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request); 212 Messenger messenger, IBinder binder, int callingUid, 80 register(DataUsageRequest inputRequest, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 211 buildRequestInfo(DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 239 RequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 334 NetworkUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument 376 UserUsageRequestInfo(NetworkStatsObservers statsObserver, DataUsageRequest request, Messenger messenger, IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) argument [all...] |
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | NotificationCompatSideChannelService.java | 112 void checkPermission(int callingUid, String packageName) { argument 113 for (String validPackage : getPackageManager().getPackagesForUid(callingUid)) { 118 throw new SecurityException("NotificationSideChannelService: Uid " + callingUid
|
/frameworks/base/services/restrictions/java/com/android/server/restrictions/ |
H A D | RestrictionsManagerService.java | 97 int callingUid = Binder.getCallingUid(); 98 int userHandle = UserHandle.getUserId(callingUid); 110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" + 163 int callingUid = Binder.getCallingUid(); 164 int userHandle = UserHandle.getUserId(callingUid); 172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(), 187 private void enforceCallerMatchesPackage(int callingUid, String packageName, argument 190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid); 193 throw new SecurityException(message + callingUid);
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 450 int callingUid = Binder.getCallingUid(); 453 Log.v(TAG, "addAccountExplicitly: " + account + ", caller's uid " + callingUid 457 if (!isAccountManagedByCaller(account.type, callingUid, userId)) { 459 callingUid, account.type); 472 return addAccountInternal(accounts, account, password, extras, callingUid, 482 int callingUid = Binder.getCallingUid(); 484 boolean isSystemUid = UserHandle.isSameApp(callingUid, Process.SYSTEM_UID); 485 List<String> managedTypes = getTypesForCaller(callingUid, userId, isSystemUid); 491 + callingUid + " with packageName=" + packageName); 501 return getAccountsAndVisibilityForPackage(packageName, managedTypes, callingUid, 511 getAccountsAndVisibilityForPackage(String packageName, List<String> accountTypes, Integer callingUid, UserAccounts accounts) argument 1595 isCrossUser(int callingUid, int userId) argument 1760 addAccountInternal(UserAccounts accounts, Account account, String password, Bundle extras, int callingUid, Map<String, Integer> packageToVisibility) argument 2269 removeAccountInternal(UserAccounts accounts, Account account, int callingUid) argument 2556 setPasswordInternal(UserAccounts accounts, Account account, String password, int callingUid) argument 4063 GetAccountsByTypeAndFeatureSession( UserAccounts accounts, IAccountManagerResponse response, String type, String[] features, int callingUid, String packageName, boolean includeManagedNotVisible) argument 4314 getAccountsInternal( UserAccounts userAccounts, int callingUid, String callingPackage, List<String> visibleAccountTypes, boolean includeUserManagedNotVisible) argument 4382 removeSharedAccountAsUser(Account account, int userId, int callingUid) argument 5058 logRecord(String action, String tableName, long accountId, UserAccounts userAccount, int callingUid) argument 5302 isPermitted(String opPackageName, int callingUid, String... permissions) argument 5328 isPrivileged(int callingUid) argument 5394 isAccountVisibleToCaller(String accountType, int callingUid, int userId, String opPackageName) argument 5446 checkPackageSignature(String accountType, int callingUid, int userId) argument 5475 isAccountManagedByCaller(String accountType, int callingUid, int userId) argument 5483 getTypesVisibleToCaller(int callingUid, int userId, String opPackageName) argument 5488 getTypesManagedByCaller(int callingUid, int userId) argument 5492 getTypesForCaller( int callingUid, int userId, boolean isOtherwisePermitted) argument 5572 isSystemUid(int callingUid) argument 5600 checkReadAccountsPermitted( int callingUid, String accountType, int userId, String opPackageName) argument 5615 canUserModifyAccounts(int userId, int callingUid) argument 5627 canUserModifyAccountsForType(int userId, String accountType, int callingUid) argument 5788 filterAccounts(UserAccounts accounts, Account[] unfiltered, int callingUid, @Nullable String callingPackage, boolean includeManagedNotVisible) argument 5814 filterSharedAccounts(UserAccounts userAccounts, @NonNull Map<Account, Integer> unfiltered, int callingUid, @Nullable String callingPackage) argument 5897 getAccountsFromCache(UserAccounts userAccounts, String accountType, int callingUid, @Nullable String callingPackage, boolean includeManagedNotVisible) argument [all...] |
/frameworks/base/services/voiceinteraction/java/com/android/server/voiceinteraction/ |
H A D | VoiceInteractionManagerServiceImpl.java | 190 public int startVoiceActivityLocked(int callingPid, int callingUid, IBinder token, argument 204 return mAm.startVoiceActivity(mComponent.getPackageName(), callingPid, callingUid, 212 public int startAssistantActivityLocked(int callingPid, int callingUid, IBinder token, argument 227 return mAm.startAssistantActivity(mComponent.getPackageName(), callingPid, callingUid, 267 public void setDisabledShowContextLocked(int callingUid, int flags) { argument 269 if (callingUid != activeUid) { 270 throw new SecurityException("Calling uid " + callingUid 276 public int getDisabledShowContextLocked(int callingUid) { argument 278 if (callingUid != activeUid) { 279 throw new SecurityException("Calling uid " + callingUid 285 getUserDisabledShowContextLocked(int callingUid) argument [all...] |
H A D | VoiceInteractionManagerService.java | 641 final int callingUid = Binder.getCallingUid(); 644 return mImpl.startVoiceActivityLocked(callingPid, callingUid, token, 660 final int callingUid = Binder.getCallingUid(); 663 return mImpl.startAssistantActivityLocked(callingPid, callingUid, token, 726 final int callingUid = Binder.getCallingUid(); 729 mImpl.setDisabledShowContextLocked(callingUid, flags); 743 final int callingUid = Binder.getCallingUid(); 746 return mImpl.getDisabledShowContextLocked(callingUid); 761 final int callingUid = Binder.getCallingUid(); 764 return mImpl.getUserDisabledShowContextLocked(callingUid); [all...] |
/frameworks/base/services/core/java/com/android/server/tv/ |
H A D | TvInputManagerService.java | 523 private SessionState getSessionStateLocked(IBinder sessionToken, int callingUid, int userId) { argument 530 if (callingUid != Process.SYSTEM_UID && callingUid != sessionState.callingUid) { 532 + " from uid " + callingUid); 537 private ITvInputSession getSessionLocked(IBinder sessionToken, int callingUid, int userId) { argument 538 return getSessionLocked(getSessionStateLocked(sessionToken, callingUid, userId)); 550 private int resolveCallingUserId(int callingPid, int callingUid, int requestedUserId, argument 552 return ActivityManager.handleIncomingUser(callingPid, callingUid, requestedUserId, false, 666 private void releaseSessionLocked(IBinder sessionToken, int callingUid, in argument 726 setMainLocked(IBinder sessionToken, boolean isMain, int callingUid, int userId) argument 2214 private final int callingUid; field in class:TvInputManagerService.SessionState 2222 SessionState(IBinder sessionToken, String inputId, ComponentName componentName, boolean isRecordingSession, ITvInputClient client, int seq, int callingUid, int userId) argument [all...] |
/frameworks/base/core/java/android/speech/ |
H A D | RecognitionService.java | 98 int callingUid) { 112 mCurrentCallback = new Callback(listener, callingUid); 162 public StartListeningArgs(Intent intent, IRecognitionListener listener, int callingUid) { argument 165 this.mCallingUid = callingUid; 236 private Callback(IRecognitionListener listener, int callingUid) { argument 238 mCallingUid = callingUid; 97 dispatchStartListening(Intent intent, final IRecognitionListener listener, int callingUid) argument
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | BroadcastQueue.java | 522 r.callingPid, r.callingUid, -1, true); 527 + r.callingPid + ", uid=" + r.callingUid + ")" 534 && mService.mAppOpsService.noteOperation(opCode, r.callingUid, 539 + r.callingPid + ", uid=" + r.callingUid + ")" 560 + " (uid " + r.callingUid + ")"); 577 + " (uid " + r.callingUid + ")"); 593 + " (uid " + r.callingUid + ")"); 608 + " (uid " + r.callingUid + ")"); 612 if (!mService.mIntentFirewall.checkBroadcast(r.intent, r.callingUid, 630 && filter.receiverList.uid != r.callingUid) { [all...] |
/frameworks/support/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument 96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
|
/frameworks/support/samples/Support4Demos/src/com/example/android/supportv4/media/ |
H A D | PackageValidator.java | 94 public boolean isCallerAllowed(Context context, String callingPackage, int callingUid) { argument 96 if (Process.SYSTEM_UID == callingUid || Process.myUid() == callingUid) {
|
/frameworks/base/services/core/java/com/android/server/job/controllers/ |
H A D | JobStatus.java | 97 final int callingUid; field in class:JobStatus 221 return callingUid; 224 private JobStatus(JobInfo job, int callingUid, String sourcePackageName, argument 228 this.callingUid = callingUid; 240 this.sourceUid = callingUid; 241 this.sourceUserId = UserHandle.getUserId(callingUid); 321 public JobStatus(JobInfo job, int callingUid, String sourcePackageName, int sourceUserId, argument 325 this(job, callingUid, sourcePackageName, sourceUserId, sourceTag, 0, 354 * @param callingUid Ui 359 createFromJobInfo(JobInfo job, int callingUid, String sourcePackageName, int sourceUserId, String tag) argument [all...] |
/frameworks/av/services/audiopolicy/service/ |
H A D | AudioPolicyInterfaceImpl.cpp | 179 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local 180 if (!isTrustedCallingUid(callingUid) || uid == (uid_t)-1) { 181 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid, 182 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid); 183 uid = callingUid; 293 const uid_t callingUid = IPCThreadState::self()->getCallingUid(); local 294 if (!isTrustedCallingUid(callingUid)) { 295 ALOGW_IF(uid != (uid_t)-1 && uid != callingUid, 296 "%s uid %d tried to pass itself off as %d", __FUNCTION__, callingUid, uid); 297 uid = callingUid; [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageInstallerService.java | 428 final int callingUid = Binder.getCallingUid(); 429 mPm.enforceCrossUserPermission(callingUid, userId, true, true, "createSession"); 435 if ((callingUid == Process.SHELL_UID) || (callingUid == Process.ROOT_UID)) { 439 mAppOps.checkPackage(callingUid, installerPackageName); 445 && !mPm.isCallerVerifier(callingUid)) { 521 final int activeCount = getSessionCount(mSessions, callingUid); 524 "Too many active sessions for UID " + callingUid); 526 final int historicalCount = mHistoricalSessionsByInstaller.get(callingUid); 529 "Too many historical sessions for UID " + callingUid); [all...] |