Home | History | Annotate | Download | only in am

Lines Matching refs:Uid

742         public int uid;
746 uid = _uid;
951 int uid;
1099 if (!showBackground && UserHandle.getAppId(proc.uid)
1437 final int uid = msg.arg2;
1438 dispatchProcessDied(pid, uid);
1759 mSelf.mProcessNames.put(app.processName, app.uid, app);
1885 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1905 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1925 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
1945 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
2152 BatteryStatsImpl.Uid.Proc ps = bstats.getProcessStatsLocked(
2158 } else if (st.uid >= Process.FIRST_APPLICATION_UID) {
2159 BatteryStatsImpl.Uid.Proc ps = st.batteryStats;
2161 st.batteryStats = ps = bstats.getProcessStatsLocked(st.uid,
2168 BatteryStatsImpl.Uid.Proc ps =
2444 final int uid = app.info.uid;
2447 if (subProc.info.uid == uid) {
2449 // it is for the same uid, however, don't do so, because we don't
2451 if (mLruProcesses.get(i-1).info.uid != uid) {
2452 if (DEBUG_LRU) Slog.d(TAG, "Pushing uid " + uid + " swapping at " + i
2522 final ProcessRecord getProcessRecordLocked(String processName, int uid, boolean keepIfLarge) {
2523 if (uid == Process.SYSTEM_UID) {
2525 // processes with the same uid, just pick the first (this
2531 if (UserHandle.isSameUser(procs.keyAt(i), uid)) return procs.valueAt(i);
2534 ProcessRecord proc = mProcessNames.get(processName, uid);
2582 app = getProcessRecordLocked(processName, info.uid, keepIfLarge);
2620 if (mBadProcesses.get(info.processName, info.uid) != null) {
2621 if (DEBUG_PROCESSES) Slog.v(TAG, "Bad process: " + info.uid
2630 if (DEBUG_PROCESSES) Slog.v(TAG, "Clearing bad process: " + info.uid
2632 mProcessCrashTimes.remove(info.processName, info.uid);
2633 if (mBadProcesses.get(info.processName, info.uid) != null) {
2635 UserHandle.getUserId(info.uid), info.uid,
2637 mBadProcesses.remove(info.processName, info.uid);
2649 + processName + "/" + info.uid + " isolated=" + isolated);
2652 mProcessNames.put(processName, app.uid, app);
2654 mIsolatedProcesses.put(app.uid, app);
2698 int uid = app.uid;
2731 gids[0] = UserHandle.getSharedAppGid(UserHandle.getAppId(uid));
2737 uid = 0;
2741 uid = 0;
2770 app.processName, uid, uid, gids, debugFlags, mountExternal,
2776 bs.getProcessStatsLocked(app.uid, app.processName).incStartsLocked();
2781 UserHandle.getUserId(uid), startResult.pid, uid,
2801 buf.append(" uid=");
2802 buf.append(uid);
2836 stats.noteActivityResumedLocked(component.app.uid);
2841 stats.noteActivityPausedLocked(component.app.uid);
2881 aInfo.applicationInfo.uid, true);
3052 + item.pid + " uid=" + item.uid + ": "
3054 observer.onForegroundActivitiesChanged(item.pid, item.uid,
3059 + item.pid + " uid=" + item.uid + ": " + item.importance);
3060 observer.onImportanceChanged(item.pid, item.uid,
3071 private void dispatchProcessDied(int pid, int uid) {
3078 observer.onProcessDied(pid, uid);
3177 stack.mResumedActivity.info.applicationInfo.uid == Binder.getCallingUid()) {
3292 final int startActivityInPackage(int uid, String callingPackage,
3300 int ret = mStackSupervisor.startActivityMayWait(null, uid, callingPackage, intent, resolvedType,
3319 final int startActivitiesInPackage(int uid, String callingPackage,
3326 int ret = mStackSupervisor.startActivities(null, uid, callingPackage, intents, resolvedTypes,
3456 + ", uid=" + Binder.getCallingUid()
3484 public void crashApplication(int uid, int initialPid, String packageName,
3490 + ", uid=" + Binder.getCallingUid()
3505 if (p.uid != uid) {
3519 Slog.w(TAG, "crashApplication: nothing for uid=" + uid
3729 stats.noteProcessDiedLocked(app.info.uid, pid);
4148 int uid = Binder.getCallingUid();
4150 userId = handleIncomingUser(pid, uid,
4172 if (uid == pkgUid || checkComponentPermission(
4174 pid, uid, -1, true)
4212 + ", uid=" + Binder.getCallingUid()
4247 + ", uid=" + Binder.getCallingUid()
4295 + ", uid=" + Binder.getCallingUid()
4344 // Make sure the uid is valid.
4372 final int uid = Binder.getCallingUid();
4378 if (uid >= Process.FIRST_APPLICATION_UID) {
4468 public void killApplicationProcess(String processName, int uid) {
4477 ProcessRecord app = getProcessRecordLocked(processName, uid, true);
4485 Slog.w(TAG, "Process/uid not found attempting kill of "
4486 + processName + " / " + uid);
4495 private void forceStopPackageLocked(final String packageName, int uid, String reason) {
4496 forceStopPackageLocked(packageName, UserHandle.getAppId(uid), false,
4497 false, true, false, UserHandle.getUserId(uid), reason);
4504 intent.putExtra(Intent.EXTRA_UID, uid);
4505 intent.putExtra(Intent.EXTRA_USER_HANDLE, UserHandle.getUserId(uid));
4509 MY_PID, Process.SYSTEM_UID, UserHandle.getUserId(uid));
4530 // same UID (except for the system or root user), and all whose name
4561 if (appId >= 0 && UserHandle.getAppId(app.uid) != appId) {
4568 if (UserHandle.getAppId(app.uid) != appId) {
4716 if (UserHandle.getAppId(pir.uid) != appId) {
4761 final int uid = app.uid;
4764 + "/" + uid + ")");
4766 mProcessNames.remove(name, uid);
4767 mIsolatedProcesses.remove(app.uid);
4812 pid, app.uid, app.processName);
4813 mProcessNames.remove(app.processName, app.uid);
4814 mIsolatedProcesses.remove(app.uid);
5031 if (!badApp && mBackupTarget != null && mBackupTarget.appInfo.uid == app.uid) {
5378 int uid = AppGlobals.getPackageManager()
5380 if (!UserHandle.isSameApp(callingUid, uid)) {
5383 + ", uid=" + Binder.getCallingUid()
5384 + ", (need uid=" + uid + ")"
5405 Slog.v(TAG_MU, "getIntentSenderLocked(): uid=" + callingUid);
5473 int uid = AppGlobals.getPackageManager()
5475 if (!UserHandle.isSameApp(uid, Binder.getCallingUid())) {
5478 + ", uid=" + Binder.getCallingUid()
5517 return res.uid;
5673 public boolean checkPermission(String permission, int pid, int uid) {
5675 uid) == PackageManager.PERMISSION_GRANTED;
5681 public int checkComponentPermission(String permission, int pid, int uid,
5683 return ActivityManagerService.this.checkComponentPermission(permission, pid, uid,
5696 int checkComponentPermission(String permission, int pid, int uid,
5703 Slog.d(TAG, "checkComponentPermission() adjusting {pid,uid} to {"
5704 + tlsIdentity.pid + "," + tlsIdentity.uid + "}");
5705 uid = tlsIdentity.uid;
5713 return ActivityManager.checkComponentPermission(permission, uid,
5722 * when only uid-based security is needed.)
5727 public int checkPermission(String permission, int pid, int uid) {
5731 return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true);
5755 + ", uid=" + Binder.getCallingUid()
5762 * Determine if UID is holding permissions required to access {@link Uri} in
5767 IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) {
5769 "checkHoldingPermissionsLocked: uri=" + uri + " uid=" + uid);
5771 if (pi.applicationInfo.uid == uid) {
5782 && (pm.checkUidPermission(pi.readPermission, uid) == PERMISSION_GRANTED)) {
5786 && (pm.checkUidPermission(pi.writePermission, uid) == PERMISSION_GRANTED)) {
5809 + " check=" + pm.checkUidPermission(pprperm, uid));
5811 if (pm.checkUidPermission(pprperm, uid) == PERMISSION_GRANTED) {
5823 + " check=" + pm.checkUidPermission(ppwperm, uid));
5825 if (pm.checkUidPermission(ppwperm, uid) == PERMISSION_GRANTED) {
5890 Uri uri, int uid, int modeFlags, int minStrength) {
5892 if (uid == 0) {
5895 ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid);
5903 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) {
5910 uid = tlsIdentity.uid;
5919 return checkUriPermissionLocked(uri, uid, modeFlags, UriPermission.STRENGTH_OWNED)
5928 * if callingUid is not allowed to do this. Returns the uid of the target
5931 uid of the target, you can supply it in
5970 "Can't grant URI permission no uid for: " + targetPkg);
6037 throw new SecurityException("Uid " + callingUid
6218 grantUriPermissionLocked(r.uid, targetPkg, uri, modeFlags,
6255 throw new SecurityException("Uid " + callingUid
6342 revokeUriPermissionLocked(r.uid, uri, modeFlags);
6564 throw new SecurityException("No permission grant found for UID " + callingUid
6589 Slog.w(TAG, "No permission grant found for UID " + callingUid + " and Uri "
6603 * Prune any older {@link UriPermission} for the given UID until outstanding
6608 private boolean maybePrunePersistedUriGrantsLocked(int uid) {
6609 final ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid);
6650 "Package " + packageName + " does not belong to calling UID " + callingUid);
6749 + ", uid=" + Binder.getCallingUid()
7340 queryContentProviders(app.processName, app.uid,
7345 Slog.v(TAG_MU, "generateApplicationProvidersLocked, app.info.uid = " + app.uid);
7355 if (singleton && UserHandle.getUserId(app.uid) != 0) {
7373 Slog.v(TAG_MU, "generateApplicationProvidersLocked, cpi.uid = " + cpr.uid);
7396 final int callingUid = (r != null) ? r.uid : Binder.getCallingUid();
7398 cpi.applicationInfo.uid, cpi.exported)
7403 cpi.applicationInfo.uid, cpi.exported)
7415 cpi.applicationInfo.uid, cpi.exported)
7420 cpi.applicationInfo.uid, cpi.exported)
7440 + ", uid=" + callingUid + ") that is not exported from uid "
7441 + cpi.applicationInfo.uid;
7445 + ", uid=" + callingUid + ") requires "
7644 + cpi.applicationInfo.uid + " for provider "
7681 Slog.w(TAG, "LAUNCHING REMOTE PROVIDER (myuid " + (r != null ? r.uid : null)
7682 + " pruid " + cpr.appInfo.uid + "): " + cpr.info.name, e);
7714 cpi.processName, cpr.appInfo.uid, false);
7732 + cpi.applicationInfo.uid + " for provider "
7764 + cpi.applicationInfo.uid + " for provider "
7767 UserHandle.getUserId(cpi.applicationInfo.uid),
7769 cpi.applicationInfo.uid, name);
7888 Slog.v(TAG_MU, "ProcessRecord uid = " + r.uid);
7906 Slog.v(TAG_MU, "ContentProviderRecord uid = " + dst.uid);
8131 BatteryStatsImpl.Uid.Proc ps = null;
8133 int uid = info.uid;
8135 int userId = UserHandle.getUserId(uid);
8142 uid = UserHandle.getUid(userId, mNextIsolatedProcessUid);
8144 if (mIsolatedProcesses.indexOfKey(uid) < 0) {
8145 // No process for this uid, use it.
8154 return new ProcessRecord(stats, info, proc, uid);
8160 app = getProcessRecordLocked(info.processName, info.uid, true);
8167 mProcessNames.put(info.processName, app.uid, app);
8169 mIsolatedProcesses.put(app.uid, app);
8178 info.packageName, false, UserHandle.getUserId(app.uid));
8219 // We record the binder invoker's uid in thread-local storage before
8221 // that handles all permissions checks, we look for this uid and use
8222 // that rather than the Activity Manager's own uid. The effect is that
8826 int uid = rec.uid == MY_UID ? Process.SYSTEM_UID : rec.uid;
8827 BatteryStatsImpl.Uid.Pkg pkg =
8828 stats.getPackageStatsLocked(uid, rec.key.packageName);
8887 public void killUid(int uid, String reason) {
8892 killPackageProcessesLocked(null, UserHandle.getAppId(uid), UserHandle.getUserId(uid),
8894 reason != null ? reason : "kill uid");
9469 report.uid = app.info.uid;
9507 crashTime = mProcessCrashTimes.get(app.info.processName, app.uid);
9516 app.userId, app.info.processName, app.uid);
9523 EventLog.writeEvent(EventLogTags.AM_PROC_BAD, app.userId, app.uid,
9528 mBadProcesses.put(app.info.processName, app.uid,
9530 mProcessCrashTimes.remove(app.info.processName, app.uid);
9578 mProcessCrashTimes.put(app.info.processName, app.uid, now);
9863 + " uid=" + Binder.getCallingUid() + ": " + app);
10104 mProcessCrashTimes.put(r.info.processName, r.uid,
10240 outInfo.uid = app.info.uid;
10345 + ", uid=" + Binder.getCallingUid()
10638 pw.print(" UID "); pw.print(procs.keyAt(ia));
10659 pw.println(" Isolated process list (sorted by uid):");
10781 pw.print(" uid "); pw.print(puid);
10812 pw.print(" uid "); pw.print(puid);
11419 int uid = mGrantedUriPermissions.keyAt(i);
11420 if (dumpUid >= -1 && UserHandle.getAppId(uid) != dumpUid) {
11432 pw.print(" * UID "); pw.print(uid);
11636 wtime = stats.getProcessWakeTime(r.info.uid,
12337 mProviderMap.removeProviderByClass(cpr.name, UserHandle.getUserId(cpr.uid));
12340 mProviderMap.removeProviderByName(names[j], UserHandle.getUserId(cpr.uid));
12501 mHandler.obtainMessage(DISPATCH_PROCESS_DIED, app.pid, app.info.uid, null).sendToTarget();
12512 mProcessNames.remove(app.processName, app.uid);
12513 mIsolatedProcesses.remove(app.uid);
12542 mProcessNames.put(app.processName, app.uid, app);
12617 ComponentName startServiceInPackage(int uid,
12624 resolvedType, -1, uid, userId);
12728 if (UserHandle.getAppId(aInfo.uid) >= Process.FIRST_APPLICATION_UID) {
12732 aInfo.uid) != PackageManager.PERMISSION_GRANTED) {
12822 BatteryStatsImpl.Uid.Pkg.Serv ss = null;
12825 ss = stats.getServiceStatsLocked(app.uid, app.packageName, app.name);
12831 app.packageName, false, UserHandle.getUserId(app.uid));
13021 if (callerApp.info.uid != Process.SYSTEM_UID &&
13027 callingUid = callerApp.info.uid;
13084 } else if (rl.uid != callingUid) {
13086 "Receiver requested to register for uid " + callingUid
13087 + " was previously registered for uid " + rl.uid);
13309 + callingPid + ", uid=" + callingUid;
13360 final int uid = intentExtras != null
13362 if (uid >= 0) {
13365 bs.removeUidStatsLocked(uid);
13367 mAppOpsService.uidRemoved(uid);
13410 + ", uid=" + callingUid + ")"
13452 + callingPid + ", uid=" + callingUid
13709 int broadcastIntentInPackage(String packageName, int uid,
13719 AppOpsManager.OP_NONE, serialized, sticky, -1, uid, userId);
13739 + ", uid=" + Binder.getCallingUid()
13859 + ", uid=" + Binder.getCallingPid()
14942 item.uid = app.info.uid;
15174 wtime = stats.getProcessWakeTime(app.info.uid,
15209 stats.reportExcessiveWakeLocked(app.info.uid, app.processName,
15218 stats.reportExcessiveCpuLocked(app.info.uid, app.processName,
15243 app.lastWakeTime = stats.getProcessWakeTime(app.info.uid,
16032 + ", uid=" + Binder.getCallingUid()
16337 + ", uid=" + Binder.getCallingUid()
16473 + ", uid=" + Binder.getCallingUid()
16493 + ", uid=" + Binder.getCallingUid()
16521 + ", uid=" + Binder.getCallingUid()
16559 + ", uid=" + Binder.getCallingUid()
16594 private int applyUserId(int uid, int userId) {
16595 return UserHandle.getUid(userId, uid);
16601 newInfo.uid = applyUserId(info.uid, userId);
16609 || (userId < 1 && aInfo.applicationInfo.uid < UserHandle.PER_USER_RANGE)) {