/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManagerInternal.java | 71 * Checks if an app with given uid is an active device admin of its user and has the policy 76 * @param uid App uid. 78 * @return true if the uid is an active admin with the given policy. 80 public abstract boolean isActiveAdminWithPolicy(int uid, int reqPolicy); argument
|
/frameworks/base/core/java/android/app/usage/ |
H A D | IStorageStatsManager.aidl | 28 long getCacheQuotaBytes(String volumeUuid, int uid, String callingPackage); 30 StorageStats queryStatsForUid(String volumeUuid, int uid, String callingPackage);
|
H A D | NetworkStats.java | 61 * Index of the current uid in mUids when doing uid enumeration or a single uid value, 244 private static int convertUid(int uid) { argument 245 switch (uid) { 249 return uid; 281 * Key of the bucket. Usually an app uid or one of the following special values:<p /> 469 * Collects history results for uid and resets history enumeration index. 471 void startHistoryEnumeration(int uid) { argument 472 startHistoryEnumeration(uid, androi 478 startHistoryEnumeration(int uid, int tag) argument 632 setSingleUidTag(int uid, int tag) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 245 NetworkStats getNetworkStatsUidDetail(int uid); 280 void setUidMeteredNetworkBlacklist(int uid, boolean enable); 281 void setUidMeteredNetworkWhitelist(int uid, boolean enable); 284 void setUidCleartextNetworkPolicy(int uid, int policy); 320 void setFirewallUidRule(int chain, int uid, int rule); 391 void addLegacyRouteForNetId(int netId, in RouteInfo routeInfo, int uid); 409 void allowProtect(int uid); 414 void denyProtect(int uid);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | HardwarePropertiesManagerService.java | 92 int uid = 0; 94 uid = pm.getPackageUid(callingPackage, 0); 95 if (Binder.getCallingUid() != uid) { 102 final int userId = UserHandle.getUserId(uid);
|
/frameworks/native/include/binder/ |
H A D | AppOpsManager.h | 100 int32_t checkOp(int32_t op, int32_t uid, const String16& callingPackage); 101 int32_t noteOp(int32_t op, int32_t uid, const String16& callingPackage); 102 int32_t startOp(int32_t op, int32_t uid, const String16& callingPackage); 103 void finishOp(int32_t op, int32_t uid, const String16& callingPackage);
|
/frameworks/native/libs/binder/include/binder/ |
H A D | AppOpsManager.h | 100 int32_t checkOp(int32_t op, int32_t uid, const String16& callingPackage); 101 int32_t noteOp(int32_t op, int32_t uid, const String16& callingPackage); 102 int32_t startOp(int32_t op, int32_t uid, const String16& callingPackage); 103 void finishOp(int32_t op, int32_t uid, const String16& callingPackage);
|
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/ |
H A D | SessionRoute.h | 44 uid_t uid) 45 : mUid(uid), 110 uid_t uid); 40 SessionRoute(audio_session_t session, audio_stream_type_t streamType, audio_source_t source, sp<DeviceDescriptor> deviceDescriptor, uid_t uid) argument
|
/frameworks/base/services/core/java/com/android/server/security/ |
H A D | KeyAttestationApplicationIdProviderService.java | 47 public KeyAttestationApplicationId getKeyAttestationApplicationId(int uid) argument 55 String[] packageNames = mPackageManager.getPackagesForUid(uid); 57 throw new RemoteException("No packages for uid"); 59 int userId = UserHandle.getUserId(uid);
|
/frameworks/native/services/vr/hardware_composer/ |
H A D | vr_composer.cpp | 13 const uid_t uid = ipc->getCallingUid(); local 15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid); 17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
|
/frameworks/base/services/autofill/java/com/android/server/autofill/ |
H A D | AutofillManagerServiceImpl.java | 264 void setAuthenticationResultLocked(Bundle data, int sessionId, int authenticationId, int uid) { argument 269 if (session != null && uid == session.uid) { 274 void setHasCallback(int sessionId, int uid, boolean hasIt) { argument 279 if (session != null && uid == session.uid) { 286 int startSessionLocked(@NonNull IBinder activityToken, int uid, argument 297 final Session newSession = createSessionByTokenLocked(activityToken, uid, appCallbackToken, 304 "id=" + newSession.id + " uid=" + uid 328 finishSessionLocked(int sessionId, int uid) argument 349 cancelSessionLocked(int sessionId, int uid) argument 362 disableOwnedAutofillServicesLocked(int uid) argument 380 createSessionByTokenLocked(@onNull IBinder activityToken, int uid, @NonNull IBinder appCallbackToken, boolean hasCallback, @NonNull String packageName) argument 411 restoreSession(int sessionId, int uid, @NonNull IBinder activityToken, @NonNull IBinder appCallback) argument 426 updateSessionLocked(int sessionId, int uid, AutofillId autofillId, Rect virtualBounds, AutofillValue value, int action, int flags) argument [all...] |
/frameworks/av/media/libstagefright/ |
H A D | HTTPBase.cpp | 118 void HTTPBase::RegisterSocketUserTag(int sockfd, uid_t uid, uint32_t kTag) { argument 119 int res = qtaguid_tagSocket(sockfd, kTag, uid); 121 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid()); 134 void HTTPBase::RegisterSocketUserMark(int sockfd, uid_t uid) { argument 135 setNetworkForUser(uid, sockfd);
|
/frameworks/base/core/java/com/android/internal/content/ |
H A D | PackageMonitor.java | 130 public void onPackageAdded(String packageName, int uid) { argument 136 public void onPackageRemoved(String packageName, int uid) { argument 143 public void onPackageRemovedAllUsers(String packageName, int uid) { argument 146 public void onPackageUpdateStarted(String packageName, int uid) { argument 149 public void onPackageUpdateFinished(String packageName, int uid) { argument 159 * @param uid The user ID the package runs under. 169 public boolean onPackageChanged(String packageName, int uid, String[] components) { argument 180 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument 187 public void onUidRemoved(int uid) { argument 292 public void onPackageDataCleared(String packageName, int uid) { argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UidRecord.java | 30 * Overall information about a uid that has actively running processes. 33 final int uid; field in class:UidRecord 60 * Last seq number for which AcitivityManagerService dispatched uid state change to 67 * Indicates if any thread is waiting for network rules to get updated for {@link #uid}. 72 * Indicates whether this uid has internet permission or not. 89 int uid; field in class:UidRecord.ChangeItem 99 uid = _uid; 111 uid) == PackageManager.PERMISSION_GRANTED; 130 UserHandle.formatUid(sb, uid);
|
H A D | ContentProviderRecord.java | 38 final int uid; field in class:ContentProviderRecord 61 uid = ai.uid; 65 noReleaseNeeded = uid == 0 || uid == Process.SYSTEM_UID; 71 uid = cpr.uid; 88 && uid == app.info.uid; 157 pw.print(prefix); pw.print("uid [all...] |
/frameworks/base/core/java/android/net/ |
H A D | NetworkPolicyManager.java | 56 * Rules defining whether an uid has access to a network given its type (metered / non-metered). 64 * if the device is on Battery Saver Mode and Data Saver Mode simulatenously, and a uid 135 public void setUidPolicy(int uid, int policy) { argument 137 mService.setUidPolicy(uid, policy); 146 * <p>The given policy bits will be set for the uid. 151 public void addUidPolicy(int uid, int policy) { argument 153 mService.addUidPolicy(uid, policy); 162 * <p>The given policy bits will be set for the uid. 167 public void removeUidPolicy(int uid, int policy) { argument 169 mService.removeUidPolicy(uid, polic 175 getUidPolicy(int uid) argument 326 isUidValidForPolicy(Context context, int uid) argument [all...] |
H A D | NetworkStats.java | 49 /** {@link #uid} value when UID details unavailable. */ 95 private int[] uid; field in class:NetworkStats 108 public int uid; field in class:NetworkStats.Entry 138 public Entry(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, argument 140 this(iface, uid, set, tag, METERED_NO, ROAMING_NO, rxBytes, rxPackets, txBytes, 144 public Entry(String iface, int uid, int set, int tag, int metered, int roaming, argument 147 this.uid = uid; 180 builder.append(" uid=").append(uid); 298 addValues(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument 305 addValues(String iface, int uid, int set, int tag, int metered, int roaming, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument 394 combineValues(String iface, int uid, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument 401 combineValues(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument 442 findIndex(String iface, int uid, int set, int tag, int metered, int roaming) argument 458 findIndexHinted(String iface, int uid, int set, int tag, int metered, int roaming, int hintIndex) argument [all...] |
H A D | UidRange.java | 51 public boolean contains(int uid) { argument 52 return start <= uid && uid <= stop;
|
/frameworks/base/keystore/java/android/security/ |
H A D | Credentials.java | 233 public static boolean deleteAllTypesForAlias(KeyStore keystore, String alias, int uid) { argument 238 return deletePrivateKeyTypeForAlias(keystore, alias, uid) 239 & deleteSecretKeyTypeForAlias(keystore, alias, uid) 240 & deleteCertificateTypesForAlias(keystore, alias, uid); 257 public static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias, int uid) { argument 262 return keystore.delete(Credentials.USER_CERTIFICATE + alias, uid) 263 & keystore.delete(Credentials.CA_CERTIFICATE + alias, uid); 278 static boolean deletePrivateKeyTypeForAlias(KeyStore keystore, String alias, int uid) { argument 279 return keystore.delete(Credentials.USER_PRIVATE_KEY + alias, uid); 294 public static boolean deleteSecretKeyTypeForAlias(KeyStore keystore, String alias, int uid) { argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | INotificationManager.aidl | 45 void clearData(String pkg, int uid, boolean fromApp); 52 void setShowBadge(String pkg, int uid, boolean showBadge); 53 boolean canShowBadge(String pkg, int uid); 54 void setNotificationsEnabledForPackage(String pkg, int uid, boolean enabled); 55 boolean areNotificationsEnabledForPackage(String pkg, int uid); 61 void createNotificationChannelsForPackage(String pkg, int uid, in ParceledListSlice channelsList); 62 ParceledListSlice getNotificationChannelGroupsForPackage(String pkg, int uid, boolean includeDeleted); 63 NotificationChannelGroup getNotificationChannelGroupForPackage(String groupId, String pkg, int uid); 64 void updateNotificationChannelForPackage(String pkg, int uid, in NotificationChannel channel); 66 NotificationChannel getNotificationChannelForPackage(String pkg, int uid, Strin [all...] |
H A D | ActivityManagerInternal.java | 90 String processName, String abiOverride, int uid, Runnable crashHandler); 212 public abstract int getUidProcessState(int uid); argument 244 * {@link com.android.server.net.NetworkPolicyManagerService} for a specific {@param uid} and 247 public abstract void notifyNetworkPolicyRulesUpdated(int uid, long procStateSeq); argument 89 startIsolatedProcess(String entryPoint, String[] mainArgs, String processName, String abiOverride, int uid, Runnable crashHandler) argument
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobPackageTracker.java | 49 public void addEvent(int cmd, int uid, String tag) { argument 53 mEventUids[index] = uid; 123 private PackageEntry getOrCreateEntry(int uid, String pkg) { argument 124 ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid); 127 mEntries.put(uid, uidMap); 137 public PackageEntry getEntry(int uid, String pkg) { argument 138 ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid); 152 void incPending(int uid, String pkg, long now) { argument 153 PackageEntry pe = getOrCreateEntry(uid, pkg); 161 void decPending(int uid, Strin argument 169 incActive(int uid, String pkg, long now) argument 178 decActive(int uid, String pkg, long now) argument 186 incActiveTop(int uid, String pkg, long now) argument 195 decActiveTop(int uid, String pkg, long now) argument [all...] |
/frameworks/native/services/vr/virtual_touchpad/ |
H A D | VirtualTouchpadService.cpp | 95 const uid_t uid = ipc->getCallingUid(); local 96 if ((uid != AID_SHELL) && 97 !PermissionCache::checkPermission(kDumpPermission, pid, uid)) { 99 " from pid=%ld, uid=%ld\n", 100 static_cast<long>(pid), static_cast<long>(uid)); 125 const uid_t uid = ipc->getCallingUid(); local 126 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid); 128 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid), 129 static_cast<long>(uid));
|
/frameworks/native/cmds/installd/ |
H A D | InstalldNativeService.cpp | 122 uid_t uid; local 125 reinterpret_cast<int32_t*>(&uid))) { 129 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission)); 134 uid_t uid = IPCThreadState::self()->getCallingUid(); local 135 if (uid == expectedUid || uid == AID_ROOT) { 139 StringPrintf("UID %d is not expected UID %d", uid, expectedUid)); 161 #define ENFORCE_UID(uid) { \ 162 binder::Status status = checkUid((uid)); \ 240 static int restorecon_app_data_lazy(const std::string& path, const std::string& seInfo, uid_t uid, argument 285 restorecon_app_data_lazy(const std::string& parent, const char* name, const std::string& seInfo, uid_t uid, bool existing) argument 291 prepare_app_dir(const std::string& path, mode_t target_mode, uid_t uid) argument 303 prepare_app_quota(const std::unique_ptr<std::string>& uuid, const std::string& device, uid_t uid) argument 353 int32_t uid = multiuser_get_uid(userId, appId); local 612 get_cache_gid(uid_t uid) argument 666 uid_t uid = p->fts_parent->fts_statp->st_uid; local 963 uid_t uid = p->fts_statp->st_uid; local 1144 uid_t uid = multiuser_get_uid(userId, appId); local 1148 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local 1528 uid_t uid = multiuser_get_uid(userId, AID_MEDIA_RW); local 1532 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local 1654 uid_t uid = multiuser_get_uid(userId, AID_MEDIA_RW); local 1658 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local 1768 int32_t uid = multiuser_get_uid(userId, appId); local 1776 dumpProfiles(int32_t uid, const std::string& packageName, const std::string& codePaths, bool* _aidl_return) argument 1790 mergeProfiles(int32_t uid, const std::string& packageName, bool* _aidl_return) argument 1800 dexopt(const std::string& apkPath, int32_t uid, const std::unique_ptr<std::string>& packageName, const std::string& instructionSet, int32_t dexoptNeeded, const std::unique_ptr<std::string>& outputPath, int32_t dexFlags, const std::string& compilerFilter, const std::unique_ptr<std::string>& uuid, const std::unique_ptr<std::string>& sharedLibraries, const std::unique_ptr<std::string>& seInfo) argument 1846 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument 1960 delete_stale_idmap(const char* target_apk, const char* overlay_apk, const char* idmap_path, int32_t uid) argument 2037 idmap(const std::string& targetApkPath, const std::string& overlayApkPath, int32_t uid) argument 2156 uid_t uid = multiuser_get_uid(userId, appId); local 2264 reconcileSecondaryDexFile( const std::string& dexPath, const std::string& packageName, int32_t uid, const std::vector<std::string>& isas, const std::unique_ptr<std::string>& volumeUuid, int32_t storage_flag, bool* _aidl_return) argument [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsCollection.java | 152 if (NetworkStatsAccess.isAccessibleToUser(key.uid, callerUid, accessLevel)) { 153 int j = uids.binarySearch(key.uid); 157 uids.add(j, key.uid); 169 NetworkTemplate template, int uid, int set, int tag, int fields, 171 return getHistory(template, uid, set, tag, fields, Long.MIN_VALUE, Long.MAX_VALUE, 180 NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, 182 return getHistory(template, uid, set, tag, fields, start, end, accessLevel, 191 NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, 193 if (!NetworkStatsAccess.isAccessibleToUser(uid, callerUid, accessLevel)) { 194 throw new SecurityException("Network stats history of uid " 168 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, @NetworkStatsAccess.Level int accessLevel) argument 179 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, @NetworkStatsAccess.Level int accessLevel) argument 190 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, @NetworkStatsAccess.Level int accessLevel, int callerUid) argument 271 recordData(NetworkIdentitySet ident, int uid, int set, int tag, long start, long end, NetworkStats.Entry entry) argument 305 findOrCreateHistory( NetworkIdentitySet ident, int uid, int set, int tag) argument 647 public final int uid; field in class:NetworkStatsCollection.Key 653 Key(NetworkIdentitySet ident, int uid, int set, int tag) argument [all...] |