/frameworks/av/media/libstagefright/webm/ |
WebmElement.cpp | 59 uint64_t uid, 66 ls.push_back(new WebmUnsigned(kMkvTrackUid, uid)); 310 uint64_t uid, 313 if (uid == 0) { 314 uid = kAudioTrackNum; 320 uid, 343 uint64_t uid, 346 if (uid == 0) { 347 uid = kVideoTrackNum; 353 uid, [all...] |
/frameworks/base/core/java/android/os/ |
Process.java | 64 * Defines the root UID. 70 * Defines the UID/GID under which system code runs. 75 * Defines the UID/GID under which the telephony code runs. 80 * Defines the UID/GID for the user shell. 86 * Defines the UID/GID for the log group. 92 * Defines the UID/GID for the WIFI supplicant process. 98 * Defines the UID/GID for the mediaserver process. 104 * Defines the UID/GID for the DRM process. 110 * Defines the UID/GID for the group that controls VPN services. 116 * Defines the UID/GID for the NFC service process 793 int uid = UserHandle.getAppId(myUid()); local [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
MockContext.java | 483 public int checkPermission(String permission, int pid, int uid) { 489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { 490 return checkPermission(permission, pid, uid); 505 String permission, int pid, int uid, String message) { 530 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { 536 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { 537 return checkUriPermission(uri, pid, uid, modeFlags); 552 String writePermission, int pid, int uid, int modeFlags) { 558 Uri uri, int pid, int uid, int modeFlags, String message) { 576 int pid, int uid, int modeFlags, String message) [all...] |
/external/lldb/include/lldb/Target/ |
Platform.h | 273 GetUserName (uint32_t uid); 574 GetCachedUserName (uint32_t uid) 577 IDToNameMap::iterator pos = m_uid_map.find (uid); 590 SetCachedUserName (uint32_t uid, const char *name, size_t name_len) 594 m_uid_map[uid] = const_name; 602 SetUserNameNotFound (uint32_t uid) 605 m_uid_map[uid] = ConstString();
|
/frameworks/base/core/tests/bandwidthtests/src/com/android/bandwidthtest/ |
BandwidthTest.java | 221 // is accounted against download manager's uid, since it uses pre-ICS API. 244 // remember to use download manager uid for proc stats 253 * Fetch network data from /proc/uid_stat/uid 257 public NetworkStats fetchDataFromProc(int uid) { 258 String root_filepath = "/proc/uid_stat/" + uid + "/"; 264 stats.addValues(NetworkStats.IFACE_ALL, uid, NetworkStats.SET_DEFAULT, 304 * @param uid for which to report the results. 306 public void addStatsToResults(String label, NetworkStats stats, Bundle results, int uid){ 319 if (statsEntry.uid != uid) { [all...] |
/frameworks/native/cmds/servicemanager/ |
service_manager.c | 170 uint32_t do_find_service(struct binder_state *bs, const uint16_t *s, size_t len, uid_t uid, pid_t spid) 175 ALOGE("find_service('%s') uid=%d - PERMISSION DENIED\n", 176 str8(s, len), uid); 184 // then check the uid to see if it is isolated. 185 uid_t appid = uid % AID_USER; 198 uint32_t handle, uid_t uid, int allow_isolated, 203 //ALOGI("add_service('%s',%x,%s) uid=%d\n", str8(s, len), handle, 204 // allow_isolated ? "allow_isolated" : "!allow_isolated", uid); 210 ALOGE("add_service('%s',%x) uid=%d - PERMISSION DENIED\n", 211 str8(s, len), handle, uid); [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiServiceImpl.java | 185 + " uid=" + Integer.toString(config.creatorUid) 198 + " uid=" + Binder.getCallingUid()); 420 * @param workSource If null, all blame is given to the calling uid. 443 final int uid; field in class:WifiServiceImpl.BatchedScanRequest 450 this.uid = getCallingUid(); 455 stopBatchedScan(settings, uid, pid); 461 public boolean isSameApp(int uid, int pid) { 462 return (this.uid == uid && this.pid == pid); 509 int uid = Binder.getCallingUid() local 977 int uid = Binder.getCallingUid(); local 1613 int uid = Binder.getCallingUid(); local 1755 int uid = Binder.getCallingUid(); local 1768 int uid = Binder.getCallingUid(); local [all...] |
/frameworks/base/services/core/java/com/android/server/ |
LocationManagerService.java | 585 final int mUid; // uid of receiver 605 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, 614 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid); 615 mUid = uid; 1173 int uid = Binder.getCallingUid();; local 1516 int uid = Binder.getCallingUid(); local 1566 final int uid = Binder.getCallingUid(); local 1625 final int uid = Binder.getCallingUid(); local 1700 final int uid = Binder.getCallingUid(); local 1766 int uid = Binder.getCallingUid(); local 1805 final int uid = Binder.getCallingUid(); local 1848 int uid = Binder.getCallingUid(); local 1877 int uid = Binder.getCallingUid(); local 1963 int uid = Binder.getCallingUid(); local [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
SmsApplication.java | 115 public SmsApplicationData(String applicationName, String packageName, int uid) { 118 mUid = uid; 196 applicationName, packageName, activityInfo.applicationInfo.uid); 358 // are checking is for our current uid. Doing this check from the unprivileged current 391 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 395 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 406 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 410 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 420 int mode = appOps.checkOp(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, 424 appOps.setMode(AppOpsManager.OP_WRITE_SMS, info.applicationInfo.uid, [all...] |
/external/lldb/source/Plugins/Platform/gdb-server/ |
PlatformRemoteGDBServer.cpp | 255 PlatformRemoteGDBServer::GetUserName (uint32_t uid) 258 const char *cached_user_name = Platform::GetUserName(uid); 262 if (m_gdb_client.GetUserName(uid, name)) 263 return SetCachedUserName(uid, name.c_str(), name.size()); 265 SetUserNameNotFound(uid); // Negative cache so we don't keep sending packets
|
/packages/apps/Settings/src/com/android/settings/location/ |
RecentLocationApps.java | 122 int uid = ops.getUid(); local 123 int userId = UserHandle.getUserId(uid); 125 (uid == Process.SYSTEM_UID) && ANDROID_SYSTEM_PACKAGE_NAME.equals(packageName); 178 int uid = ops.getUid(); local 179 int userId = UserHandle.getUserId(uid);
|
/system/core/include/private/ |
android_filesystem_config.h | 106 #define AID_USER 100000 /* offset for uid ranges for each user */ 183 unsigned uid; member in struct:fs_path_config 241 /* the following file is INTENTIONALLY set-gid and not set-uid. 245 /* the following five files are INTENTIONALLY set-uid, but they 273 unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities) 298 *uid = pc->uid; 305 path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode);
|
/external/libselinux/src/ |
android.c | 516 uid_t uid, 532 userid = uid / AID_USER; 533 appid = uid % AID_USER; 664 "%s: No match for app with uid %d, seinfo %s, name %s\n", 665 __FUNCTION__, uid, seinfo, pkgname); 681 uid_t uid) 700 rc = seapp_context_lookup(SEAPP_TYPE, uid, 0, seinfo, pkgname, NULL, ctx); 726 selinux_log(SELINUX_ERROR, "%s: Error setting context for pkgdir %s, uid %d: %s\n", 727 __FUNCTION__, pkgdir, uid, strerror(errno)); 736 int selinux_android_setcontext(uid_t uid, 892 uid_t uid; member in struct:pkgInfo [all...] |
/external/qemu/distrib/libselinux/src/ |
android.c | 509 uid_t uid, 525 userid = uid / AID_USER; 526 appid = uid % AID_USER; 657 "%s: No match for app with uid %d, seinfo %s, name %s\n", 658 __FUNCTION__, uid, seinfo, pkgname); 674 uid_t uid) 693 rc = seapp_context_lookup(SEAPP_TYPE, uid, 0, seinfo, pkgname, NULL, ctx); 719 selinux_log(SELINUX_ERROR, "%s: Error setting context for pkgdir %s, uid %d: %s\n", 720 __FUNCTION__, pkgdir, uid, strerror(errno)); 729 int selinux_android_setcontext(uid_t uid, 866 uid_t uid; member in struct:pkgInfo [all...] |
/frameworks/base/core/java/android/content/ |
ContentProvider.java | 469 boolean checkUser(int pid, int uid, Context context) { 470 return UserHandle.getUserId(uid) == context.getUserId() 472 || context.checkPermission(INTERACT_ACROSS_USERS, pid, uid) 481 final int uid = Binder.getCallingUid(); local 484 if (UserHandle.isSameApp(uid, mMyUid)) { 488 if (mExported && checkUser(pid, uid, context)) { 491 if (context.checkPermission(componentPerm, pid, uid, callerToken) 509 if (context.checkPermission(pathPerm, pid, uid, callerToken) 528 final int callingUserId = UserHandle.getUserId(uid); 529 final Uri userUri = (mSingleUser && !UserHandle.isSameUser(mMyUid, uid)) 549 final int uid = Binder.getCallingUid(); local [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
ProcessRecord.java | 54 final int uid; // uid of process; may be different from 'info' if isolated field in class:ProcessRecord 65 BatteryStatsImpl.Uid.Proc curProcBatteryStats; 185 pw.print(" uid="); pw.print(info.uid); 186 if (uid != info.uid) { 187 pw.print(" ISOLATED uid="); pw.print(uid); 305 wtime = mBatteryStats.getProcessWakeTime(info.uid, [all...] |
/packages/apps/Settings/src/com/android/settings/notification/ |
NotificationAppList.java | 298 .putExtra(Settings.EXTRA_APP_UID, row.uid) 357 public int uid; field in class:NotificationAppList.AppRow 380 row.uid = app.uid; 388 row.banned = backend.getNotificationsBanned(row.pkg, row.uid); 389 row.priority = backend.getHighPriority(row.pkg, row.uid); 390 row.sensitive = backend.getSensitive(row.pkg, row.uid); 537 public boolean setNotificationsBanned(String pkg, int uid, boolean banned) { 539 sINM.setNotificationsEnabledForPackage(pkg, uid, !banned); 547 public boolean getNotificationsBanned(String pkg, int uid) { [all...] |
/cts/tests/ProcessTest/src/com/android/cts/process/ |
ProcessTest.java | 40 PackageManager.GET_META_DATA).uid; 42 PackageManager.GET_META_DATA).uid; 44 PackageManager.GET_META_DATA).uid;
|
/external/chromium_org/cc/layers/ |
ui_resource_layer_impl.cc | 45 void UIResourceLayerImpl::SetUIResourceId(UIResourceId uid) { 46 if (uid == ui_resource_id_) 48 ui_resource_id_ = uid;
|
nine_patch_layer_impl_unittest.cc | 57 UIResourceId uid = 1; local 61 host_impl.CreateUIResource(uid, bitmap); 62 layer->SetUIResourceId(uid); 227 UIResourceId uid = 5; local 229 impl.host_impl()->CreateUIResource(uid, bitmap); 236 nine_patch_layer_impl->SetUIResourceId(uid);
|
/external/chromium_org/chrome/browser/extensions/api/web_view/ |
chrome_web_view_internal_api.cc | 36 properties->GetInteger(helpers::kGeneratedIdKey, &id.uid)); 63 item_id.uid = *params->id.as_integer; 88 id.uid = *params->menu_item_id.as_integer;
|
/external/compiler-rt/lib/sanitizer_common/tests/ |
sanitizer_libc_test.cc | 66 u32 uid = GetUid(); local 75 GetEnv("EXTERNAL_STORAGE"), uid); 78 "/tmp/sanitizer_common.tmp.%d", uid);
|
/external/e2fsprogs/debugfs/ |
lsdel.c | 26 __u32 uid; member in struct:deleted_info 166 delarray[num_delarray].uid = inode_uid(inode); 195 delarray[i].uid, delarray[i].mode, delarray[i].size,
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/media/ |
MediaProjectionPermissionActivity.java | 75 mUid = aInfo.uid; 145 private Intent getMediaProjectionIntent(int uid, String packageName, boolean permanentGrant) 147 IMediaProjection projection = mService.createProjection(uid, packageName,
|
/packages/apps/Settings/src/com/android/settings/ |
DeviceAdminAdd.java | 265 mDeviceAdmin.getActivityInfo().applicationInfo.uid); 308 mDeviceAdmin.getActivityInfo().applicationInfo.uid); 360 final int uid = mDeviceAdmin.getActivityInfo().applicationInfo.uid; local 362 mCurSysAppOpMode = mAppOps.checkOp(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, uid, pkg); 363 mCurToastAppOpMode = mAppOps.checkOp(AppOpsManager.OP_TOAST_WINDOW, uid, pkg); 364 mAppOps.setMode(AppOpsManager.OP_SYSTEM_ALERT_WINDOW, uid, pkg, AppOpsManager.MODE_IGNORED); 365 mAppOps.setMode(AppOpsManager.OP_TOAST_WINDOW, uid, pkg, AppOpsManager.MODE_IGNORED); 372 final int uid = mDeviceAdmin.getActivityInfo().applicationInfo.uid; local [all...] |