/packages/apps/Bluetooth/jni/ |
permission_helpers.cc | 54 uid_t callingUid = ipcState->getCallingUid(); 55 uid_t callingUser = callingUid / PER_USER_RANGE; 56 if (callingUid == getuid()) return true; // It's a local call 58 return (foregroundUserId == callingUser) || (systemUiUid == callingUid) || 59 (SYSTEM_UID == callingUid); 66 uid_t callingUid = ipcState->getCallingUid(); 67 uid_t callingUser = callingUid / PER_USER_RANGE; 68 if (callingUid == getuid()) return true; // It's a local call 70 if ((foregroundUserId == callingUser) || (systemUiUid == callingUid) || 71 (SYSTEM_UID == callingUid)) [all...] |
/frameworks/base/core/java/com/android/internal/util/ |
ProviderAccessStats.java | 49 private void incrementStats(int callingUid, SparseLongArray stats) { 51 stats.put(callingUid, stats.get(callingUid) + 1); 52 mAllCallingUids.put(callingUid, true); 62 private void incrementStats(int callingUid, boolean inBatch, 64 incrementStats(callingUid, inBatch ? statsInBatch : statsNonBatch); 67 public final void incrementInsertStats(int callingUid, boolean inBatch) { 68 incrementStats(callingUid, inBatch, mInsertStats, mInsertInBatchStats); 71 public final void incrementUpdateStats(int callingUid, boolean inBatch) { 72 incrementStats(callingUid, inBatch, mUpdateStats, mUpdateInBatchStats) [all...] |
/external/robolectric/v1/src/main/java/com/xtremelabs/robolectric/shadows/ |
ShadowBinder.java | 17 private static Integer callingUid; 35 if (callingUid != null) { 36 return callingUid; 46 ShadowBinder.callingUid = uid; 51 ShadowBinder.callingUid = null;
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
ShadowBinder.java | 16 private static Integer callingUid; 51 if (callingUid != null) { 52 return callingUid; 62 ShadowBinder.callingUid = uid; 68 ShadowBinder.callingUid = null;
|
/frameworks/base/services/core/java/com/android/server/notification/ |
NotificationDelegate.java | 25 void onClearAll(int callingUid, int callingPid, int userId); 26 void onNotificationClick(int callingUid, int callingPid, String key, 28 void onNotificationActionClick(int callingUid, int callingPid, String key, int actionIndex, 30 void onNotificationClear(int callingUid, int callingPid, 34 void onNotificationError(int callingUid, int callingPid,
|
NotificationManagerInternal.java | 24 void enqueueNotification(String pkg, String basePkg, int callingUid, int callingPid,
|
/frameworks/base/location/lib/java/com/android/location/provider/ |
ActivityRecognitionProviderClient.java | 43 int callingUid = Binder.getCallingUid(); 44 if (callingUid != Process.SYSTEM_UID) { 45 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
|
ActivityRecognitionProviderWatcher.java | 59 int callingUid = Binder.getCallingUid(); 60 if (callingUid != Process.SYSTEM_UID) { 61 Log.d(TAG, "Ignoring calls from non-system server. Uid: " + callingUid);
|
/system/bt/include/hardware/ |
bt_sock.h | 61 * The callingUid is the UID of the application which is requesting the 66 int* sock_fd, int flags, int callingUid); 71 * be read out when connected. The callingUid is the UID of the application 77 int flags, int callingUid);
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
PermissionManagerInternal.java | 76 int callingUid, int userId, @Nullable PermissionCallback callback); 78 @NonNull PackageParser.Package pkg, int callingUid, 82 @NonNull String[] grantedPermissions, int callingUid, 85 @NonNull String packageName, boolean overridePolicy, int callingUid, int userId, 120 int callingUid, @Nullable PermissionCallback callback); 121 public abstract void removeDynamicPermission(@NonNull String permName, int callingUid, 127 @NonNull String packageName, int callingUid, int userId); 132 @NonNull String groupName, int flags, int callingUid); 137 int callingUid); 142 @NonNull String packageName, @PermissionInfoFlags int flags, int callingUid); [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DevicePolicyManagerTestable.java | 35 return UserHandle.getUserId(dpms.context.binder.callingUid);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
ScanRequestProxy.java | 255 int callingUid, String packageName) { 256 Pair<Integer, String> uidAndPackageNamePair = Pair.create(callingUid, packageName); 273 int callingUid, String packageName) { 275 getOrCreateScanRequestTimestampsForForegroundApp(callingUid, packageName); 305 private boolean isRequestFromBackground(int callingUid, String packageName) { 306 mAppOps.checkPackage(callingUid, packageName); 321 * Checks if the scan request from the app (specified by callingUid & packageName) needs 324 private boolean shouldScanRequestBeThrottledForApp(int callingUid, String packageName) { 326 if (isRequestFromBackground(callingUid, packageName)) { 330 Log.v(TAG, "Background scan app request [" + callingUid + ", [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
NetworkStatsAccess.java | 106 Context context, int callingUid, String callingPackage) { 114 boolean isDeviceOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 117 || UserHandle.getAppId(callingUid) == android.os.Process.SYSTEM_UID) { 123 boolean hasAppOpsPermission = hasAppOpsPermission(context, callingUid, callingPackage); 129 boolean isProfileOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(callingUid, 172 Context context, int callingUid, String callingPackage) { 178 callingUid, callingPackage);
|
NetworkStatsObservers.java | 79 IBinder binder, int callingUid, @NetworkStatsAccess.Level int accessLevel) { 81 RequestInfo requestInfo = buildRequestInfo(request, messenger, binder, callingUid, 94 public void unregister(DataUsageRequest request, int callingUid) { 95 getHandler().sendMessage(mHandler.obtainMessage(MSG_UNREGISTER, callingUid, 0 /* ignore */, 141 handleUnregister((DataUsageRequest) msg.obj, msg.arg1 /* callingUid */); 169 private void handleUnregister(DataUsageRequest request, int callingUid) { 176 if (Process.SYSTEM_UID != callingUid && requestInfo.mCallingUid != callingUid) { 177 Slog.w(TAG, "Caller uid " + callingUid + " is not owner of " + request); 210 Messenger messenger, IBinder binder, int callingUid, [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
SafeActivityOptions.java | 190 ActivityOptions options, int callingPid, int callingUid) { 194 && !supervisor.mRecentTasks.isCallerRecents(callingUid)) { 196 START_TASKS_FROM_RECENTS, callingPid, callingUid); 200 + ", uid=" + callingUid + ") with launchTaskId=" 210 && !supervisor.isCallerAllowedToLaunchOnDisplay(callingPid, callingUid, 214 + ", uid=" + callingUid + ") with launchDisplayId=" 223 UserHandle.getUserId(callingUid), aInfo.packageName)) { 226 + ", uid=" + callingUid + ") with lockTaskMode=true"; 234 CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS, callingPid, callingUid) 238 + ", uid=" + callingUid + ") with remoteAnimationAdapter" [all...] |
/frameworks/base/cmds/incidentd/src/ |
IncidentService.cpp | 52 uid_t callingUid = IPCThreadState::self()->getCallingUid(); 54 if (callingUid == AID_ROOT || callingUid == AID_SHELL) { 62 callingPid, callingUid); 69 callingPid, callingUid); 78 if (callingUid != AID_SHELL && callingUid != AID_ROOT) { 80 callingPid, callingUid); 86 if (callingUid != AID_SHELL && callingUid != AID_ROOT && callingUid != AID_STATSD & [all...] |
/packages/apps/Nfc/src/com/android/nfc/cardemulation/ |
EnabledNfcFServices.java | 110 public boolean registerEnabledForegroundService(ComponentName service, int callingUid) { 129 if (mForegroundUtils.registerUidToBackgroundCallback(this, callingUid)) { 131 mForegroundUid = callingUid; 159 public boolean unregisteredEnabledForegroundService(int callingUid) { 162 if (mForegroundUtils.isInForeground(callingUid)) { 163 return unregisterForegroundService(callingUid);
|
/frameworks/base/core/java/android/net/ |
TrafficStats.java | 725 final int callingUid = android.os.Process.myUid(); 726 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 758 final int callingUid = android.os.Process.myUid(); 759 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 791 final int callingUid = android.os.Process.myUid(); 792 if (callingUid == android.os.Process.SYSTEM_UID || callingUid == uid) { 824 final int callingUid = android.os.Process.myUid() [all...] |
INetworkScoreService.aidl | 96 * @param callingUid the UID to check 100 boolean isCallerActiveScorer(int callingUid);
|
/frameworks/support/compat/src/main/java/androidx/core/app/ |
NotificationCompatSideChannelService.java | 113 void checkPermission(int callingUid, String packageName) { 114 for (String validPackage : getPackageManager().getPackagesForUid(callingUid)) { 119 throw new SecurityException("NotificationSideChannelService: Uid " + callingUid
|
/frameworks/base/core/java/android/content/pm/ |
ShortcutServiceInternal.java | 49 int userId, int callingPid, int callingUid); 62 int callingPid, int callingUid); 74 @NonNull String callingPackage, int callingPid, int callingUid); 86 int callingUid);
|
/frameworks/base/services/restrictions/java/com/android/server/restrictions/ |
RestrictionsManagerService.java | 97 int callingUid = Binder.getCallingUid(); 98 int userHandle = UserHandle.getUserId(callingUid); 110 enforceCallerMatchesPackage(callingUid, packageName, "Package name does not" + 163 int callingUid = Binder.getCallingUid(); 164 int userHandle = UserHandle.getUserId(callingUid); 172 enforceCallerMatchesPackage(callingUid, permProvider.getPackageName(), 187 private void enforceCallerMatchesPackage(int callingUid, String packageName, 190 String[] pkgs = AppGlobals.getPackageManager().getPackagesForUid(callingUid); 193 throw new SecurityException(message + callingUid);
|
/system/security/keystore/ |
permissions.h | 48 * Returns the UID that the callingUid should act as. This is here for 57 * Returns true if the callingUid is allowed to interact in the targetUid's 60 bool is_granted_to(uid_t callingUid, uid_t targetUid);
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
AbstractContactsProvider.java | 156 final int callingUid = Binder.getCallingUid(); 157 mStats.incrementInsertStats(callingUid, isInBatch()); 171 mStats.finishOperation(callingUid); 177 final int callingUid = Binder.getCallingUid(); 178 mStats.incrementDeleteStats(callingUid, isInBatch()); 192 mStats.finishOperation(callingUid); 198 final int callingUid = Binder.getCallingUid(); 199 mStats.incrementUpdateStats(callingUid, isInBatch()); 213 mStats.finishOperation(callingUid); 219 final int callingUid = Binder.getCallingUid() [all...] |
/frameworks/base/services/usage/java/com/android/server/usage/ |
UsageStatsService.java | 297 private boolean shouldObfuscateInstantAppsForCaller(int callingUid, int userId) { 298 return !mPackageManagerInternal.canAccessInstantApps(callingUid, userId); 673 final int callingUid = Binder.getCallingUid(); 674 if (callingUid == Process.SYSTEM_UID) { 678 callingUid, callingPackage); 689 final int callingUid = Binder.getCallingUid(); 691 if (callingUid == Process.SYSTEM_UID 693 && dpmInternal.isActiveAdminWithPolicy(callingUid, 710 final int callingUid = Binder.getCallingUid(); 711 final int callingUserId = UserHandle.getUserId(callingUid); [all...] |