Searched defs:uid (Results 126 - 150 of 177) sorted by relevance

12345678

/frameworks/base/services/core/java/com/android/server/media/
H A DMediaSessionService.java189 protected void enforcePhoneStatePermission(int pid, int uid) { argument
190 if (getContext().checkPermission(android.Manifest.permission.MODIFY_PHONE_STATE, pid, uid)
288 private void enforcePackageName(String packageName, int uid) { argument
292 String[] packages = getContext().getPackageManager().getPackagesForUid(uid);
312 private void enforceMediaPermissions(ComponentName compName, int pid, int uid, argument
315 .checkPermission(android.Manifest.permission.MEDIA_CONTENT_CONTROL, pid, uid)
317 && !isEnabledNotificationListener(compName, UserHandle.getUserId(uid),
323 private void enforceStatusBarPermission(String action, int pid, int uid) { argument
325 pid, uid) != PackageManager.PERMISSION_GRANTED) {
548 int userId, int pid, int uid) {
546 SessionsListenerRecord(IActiveSessionsListener listener, ComponentName componentName, int userId, int pid, int uid) argument
781 verifySessionsRequest(ComponentName componentName, int userId, final int pid, final int uid) argument
[all...]
H A DMediaRouterService.java123 final int uid = Binder.getCallingUid();
124 if (!validatePackageName(uid, packageName)) {
125 throw new SecurityException("packageName must match the calling uid");
129 final int resolvedUserId = ActivityManager.handleIncomingUser(pid, uid, userId,
265 + ", uid=" + Binder.getCallingUid());
477 private boolean validatePackageName(int uid, String packageName) { argument
479 String[] packageNames = mContext.getPackageManager().getPackagesForUid(uid);
H A DMediaSessionRecord.java235 * @param uid The uid that made the original volume request.
239 public void adjustVolume(int direction, int flags, String packageName, int uid, argument
255 flags, packageName, uid);
260 uid);
264 packageName, uid);
289 public void setVolumeTo(int value, int flags, String packageName, int uid) { argument
292 mAudioManagerInternal.setStreamVolumeForUid(stream, value, flags, packageName, uid);
709 int uid = getCallingUid();
710 mService.enforcePhoneStatePermission(pid, uid);
[all...]
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkStatsService.java177 private static final String PREFIX_UID = "uid";
327 // listen for uid removal to clean stats
509 NetworkTemplate template, int uid, int set, int tag, int fields) {
511 return getUidComplete().getHistory(template, uid, set, tag, fields);
513 return getUidTagComplete().getHistory(template, uid, set, tag, fields);
578 public NetworkStats getDataLayerSnapshotForUid(int uid) throws RemoteException { argument
579 if (Binder.getCallingUid() != uid) {
589 networkLayer = mNetworkManager.getNetworkStatsUidDetail(uid);
616 public void incrementOperationCount(int uid, int tag, int operationCount) { argument
617 if (Binder.getCallingUid() != uid) {
638 setUidForeground(int uid, boolean uidForeground) argument
[all...]
H A DNetworkPolicyManagerService.java199 private static final String TAG_UID_POLICY = "uid-policy";
216 private static final String ATTR_UID = "uid";
353 mPowerSaveWhitelistAppIds.put(UserHandle.getAppId(ai.uid), true);
447 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) {
451 public void onProcessStateChanged(int pid, int uid, int procState) {
453 // because a uid can have multiple pids running inside, we need to
454 // remember all pid states and summarize foreground at uid level.
457 SparseIntArray pidState = mUidPidState.get(uid);
460 mUidPidState.put(uid, pidState);
463 computeUidStateLocked(uid);
1449 setUidPolicy(int uid, int policy) argument
1465 addUidPolicy(int uid, int policy) argument
1482 removeUidPolicy(int uid, int policy) argument
1498 setUidPolicyUncheckedLocked(int uid, int policy, boolean persist) argument
1509 getUidPolicy(int uid) argument
1876 isUidForeground(int uid) argument
1884 isUidForegroundLocked(int uid) argument
1894 computeUidStateLocked(int uid) argument
1983 isUidValidForRules(int uid) argument
1993 updateRulesForUidLocked(int uid) argument
2155 setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) argument
[all...]
/frameworks/base/services/core/java/com/android/server/wallpaper/
H A DWallpaperManagerService.java331 public void onPackageUpdateFinished(String packageName, int uid) { argument
371 public void onPackageUpdateStarted(String packageName, int uid) { argument
387 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument
1396 + ", uid=" + Binder.getCallingUid());
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java482 public int checkPermission(String permission, int pid, int uid) { argument
498 String permission, int pid, int uid, String message) {
523 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
539 String writePermission, int pid, int uid, int modeFlags) {
545 Uri uri, int pid, int uid, int modeFlags, String message) {
563 int pid, int uid, int modeFlags, String message) {
497 enforcePermission( String permission, int pid, int uid, String message) argument
538 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
544 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
561 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
/frameworks/native/cmds/installd/
H A Dutils.c1120 const int uid = multiuser_get_uid(userid, AID_SYSTEM); local
1125 if (fs_prepare_dir(config_user_path, 0750, uid, gid) == -1) {
1144 // Always set the uid/gid/permissions. The file could have been previously created
/frameworks/native/services/sensorservice/
H A DSensorService.cpp236 "can't dump SensorService from pid=%d, uid=%d\n",
633 uid_t uid = IPCThreadState::self()->getCallingUid(); local
634 sp<SensorEventConnection> result(new SensorEventConnection(this, uid));
989 const sp<SensorService>& service, uid_t uid)
990 : mService(service), mUid(uid), mWakeLockRefCount(0), mHasLooperCallbacks(false),
1018 result.appendFormat("\t WakeLockRefCount %d | uid %d | cache size %d | max cache size %d\n",
988 SensorEventConnection( const sp<SensorService>& service, uid_t uid) argument
/frameworks/av/media/libmedia/
H A DAudioTrack.cpp140 int uid,
152 offloadInfo, uid, pid, pAttributes);
168 int uid,
180 uid, pid, pAttributes);
222 int uid,
394 if (uid == -1 || (callingpid != mypid)) {
397 mClientUid = uid;
127 AudioTrack( audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, audio_output_flags_t flags, callback_t cbf, void* user, uint32_t notificationFrames, int sessionId, transfer_type transferType, const audio_offload_info_t *offloadInfo, int uid, pid_t pid, const audio_attributes_t* pAttributes) argument
155 AudioTrack( audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, const sp<IMemory>& sharedBuffer, audio_output_flags_t flags, callback_t cbf, void* user, uint32_t notificationFrames, int sessionId, transfer_type transferType, const audio_offload_info_t *offloadInfo, int uid, pid_t pid, const audio_attributes_t* pAttributes) argument
207 set( audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, audio_output_flags_t flags, callback_t cbf, void* user, uint32_t notificationFrames, const sp<IMemory>& sharedBuffer, bool threadCanCallJava, int sessionId, transfer_type transferType, const audio_offload_info_t *offloadInfo, int uid, pid_t pid, const audio_attributes_t* pAttributes) argument
/frameworks/av/media/libmediaplayerservice/
H A DMediaPlayerService.cpp342 ALOGV("Create new client(%d) from pid %d, uid %d, ", connId, pid,
461 "can't dump MediaPlayerService from pid=%d, uid=%d\n",
577 int audioSessionId, uid_t uid)
587 mUID = uid;
1409 MediaPlayerService::AudioOutput::AudioOutput(int sessionId, int uid, int pid, argument
1416 mUid(uid),
2274 int uid = IPCThreadState::self()->getCallingUid(); local
2275 if (uid == AID_MEDIA) {
2278 int index = mBatteryData.indexOfKey(uid);
2288 if (mBatteryData.add(uid, inf
574 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument
[all...]
/frameworks/av/media/libmediaplayerservice/nuplayer/
H A DNuPlayer.cpp180 void NuPlayer::setUID(uid_t uid) { argument
182 mUID = uid;
/frameworks/av/media/libstagefright/
H A DAwesomePlayer.cpp285 void AwesomePlayer::setUID(uid_t uid) { argument
286 ALOGV("AwesomePlayer running on behalf of uid %d", uid);
288 mUID = uid;
/frameworks/av/services/audioflinger/
H A DTracks.cpp102 // if the caller is us, trust the specified uid
106 ALOGW("uid %d tried to pass itself off as %d", newclientUid, clientUid);
110 // clientUid contains the uid of the app that is responsible for this track, so we can blame
384 int uid,
389 sessionId, uid, flags, true /*isOut*/,
1142 int uid)
1149 sharedBuffer, sessionId, uid);
1162 int uid)
1165 sessionId, uid, IAudioFlinger::TRACK_TIMED, TYPE_TIMED),
1658 int uid)
373 Track( PlaybackThread *thread, const sp<Client>& client, audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, void *buffer, const sp<IMemory>& sharedBuffer, int sessionId, int uid, IAudioFlinger::track_flags_t flags, track_type type) argument
1132 create( PlaybackThread *thread, const sp<Client>& client, audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, const sp<IMemory>& sharedBuffer, int sessionId, int uid) argument
1152 TimedTrack( PlaybackThread *thread, const sp<Client>& client, audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, const sp<IMemory>& sharedBuffer, int sessionId, int uid) argument
1651 OutputTrack( PlaybackThread *playbackThread, DuplicatingThread *sourceThread, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, int uid) argument
1977 RecordTrack( RecordThread *thread, const sp<Client>& client, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t frameCount, void *buffer, int sessionId, int uid, IAudioFlinger::track_flags_t flags, track_type type) argument
[all...]
/frameworks/av/services/audiopolicy/
H A DAudioPolicyManager.h166 uid_t uid);
168 uid_t uid);
173 virtual void clearAudioPatches(uid_t uid);
312 const struct audio_patch *patch, uid_t uid) :
313 mHandle(handle), mPatch(*patch), mUid(uid), mAfPatchHandle(0) {}
311 AudioPatch(audio_patch_handle_t handle, const struct audio_patch *patch, uid_t uid) argument
/frameworks/av/services/camera/libcameraservice/
H A DCameraService.cpp472 int uid = getCallingUid(); local
473 status_t ret = validateConnect(cameraId, uid);
494 uid,
1280 const int uid = getCallingUid(); local
1282 "can't use the camera pid=%d, uid=%d", pid, uid);
1612 "can't dump CameraService from pid=%d, uid=%d\n",
/frameworks/base/core/java/android/app/
H A DApplicationPackageManager.java200 int uid = mPM.getPackageUid(packageName, userHandle);
201 if (uid >= 0) {
202 return uid;
462 public String[] getPackagesForUid(int uid) { argument
464 return mPM.getPackagesForUid(uid);
471 public String getNameForUid(int uid) { argument
473 return mPM.getNameForUid(uid);
483 int uid = mPM.getUidForSharedUser(sharedUserName);
484 if(uid != -1) {
485 return uid;
691 queryContentProviders(String processName, int uid, int flags) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContext.java491 * ops uid verification will work with the name). */
2911 * @param uid The user ID being checked against. A uid of 0 is the root
2915 * pid/uid is allowed that permission, or
2922 public abstract int checkPermission(@NonNull String permission, int pid, int uid); argument
2927 * {@link #checkPermission(String, int, int)} with the pid and uid returned
2938 * pid/uid is allowed that permission, or
2957 * pid/uid is allowed that permission, or
2973 * @param uid The user ID being checked against. A uid o
2979 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument
3108 checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument
3176 checkUriPermission(@ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument
3199 enforceUriPermission( Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, String message) argument
3264 enforceUriPermission( @ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags, @Nullable String message) argument
[all...]
/frameworks/base/core/java/android/net/
H A DConnectivityManager.java611 * for a given uid. This is for internal use only to avoid spying
615 * for the given uid or {@code null} if no default network is
616 * available for the specified uid.
622 public NetworkInfo getActiveNetworkInfoForUid(int uid) { argument
624 return mService.getActiveNetworkInfoForUid(uid);
/frameworks/base/core/jni/
H A Dandroid_util_Binder.cpp763 int uid = (int)(token>>32); local
764 if (uid > 0 && uid < 999) {
/frameworks/base/services/core/java/com/android/server/
H A DAlarmManagerService.java166 public int uid; field in class:AlarmManagerService.WakeupEvent
171 uid = theUid;
578 BroadcastStats(int uid, String packageName) { argument
579 mUid = uid;
706 Slog.w(TAG, "Invalid alarm trigger time! " + triggerAtTime + " from uid=" + who
844 + ", uid=" + Binder.getCallingUid());
1022 pw.print('|'); pw.print(event.uid);
1782 final int uid = ActivityManagerNative.getDefault()
1784 if (uid >= 0) {
1785 mWakeLock.setWorkSource(new WorkSource(uid));
[all...]
H A DLocationManagerService.java583 final int mUid; // uid of receiver
603 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument
612 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
613 mUid = uid;
969 * @param uid the requestor's UID
972 private boolean isAllowedByUserSettingsLocked(String provider, int uid) { argument
973 if (!isCurrentProfile(UserHandle.getUserId(uid)) && !isUidALocationProvider(uid)) {
1000 * @param uid the UID
1001 * @return resolution level allowed to the pid/uid pai
1003 getAllowedResolutionLevel(int pid, int uid) argument
1119 reportLocationAccessNoThrow(int uid, String packageName, int allowedResolutionLevel) argument
1129 checkLocationAccess(int uid, String packageName, int allowedResolutionLevel) argument
1446 getReceiverLocked(ILocationListener listener, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument
1465 getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument
1531 checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument
1582 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument
1980 isUidALocationProvider(int uid) argument
2017 doesUidHavePackage(int uid, String packageName) argument
[all...]
H A DNetworkManagementService.java522 Slog.d(TAG, "pushing " + size + " active uid rules");
1615 public void setUidNetworkRules(int uid, boolean rejectOnQuotaInterfaces) { argument
1623 final boolean oldRejectOnQuota = mUidRejectOnQuota.get(uid, false);
1631 rejectOnQuotaInterfaces ? "addnaughtyapps" : "removenaughtyapps", uid);
1633 mUidRejectOnQuota.put(uid, true);
1635 mUidRejectOnQuota.delete(uid);
1650 public NetworkStats getNetworkStatsUidDetail(int uid) { argument
1653 return mStatsFactory.readNetworkStatsDetail(uid, null, TAG_ALL, null);
1678 entry.uid = UID_TETHERING;
1827 public void setFirewallUidRule(int uid, boolea argument
2018 addLegacyRouteForNetId(int netId, RouteInfo routeInfo, int uid) argument
2108 allowProtect(int uid) argument
2119 denyProtect(int uid) argument
[all...]
/frameworks/base/services/core/java/com/android/server/content/
H A DSyncManager.java549 * @param uid Linux uid of the application that is performing the sync.
556 public void scheduleSync(ComponentName cname, int userId, int uid, Bundle extras, argument
604 new SyncOperation(cname, userId, uid, source, extras,
633 * @param reason for sync request. If this is a positive integer, it is the Linux uid
2584 targetUid = syncAdapterInfo.uid;
2606 .uid;
2678 targetUid = syncAdapterInfo.uid;
2681 // TODO: Store the uid of the service as part of the authority info in order to
2687 .uid;
[all...]
/frameworks/base/services/core/java/com/android/server/display/
H A DDisplayManagerService.java1287 throw new SecurityException("packageName must match the calling uid");
1381 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid());
1393 private boolean validatePackageName(int uid, String packageName) { argument
1395 String[] packageNames = mContext.getPackageManager().getPackagesForUid(uid);

Completed in 542 milliseconds

12345678