Searched refs:uid (Results 101 - 125 of 526) sorted by relevance

1234567891011>>

/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManagerInternal.java71 * Checks if an app with given uid is an active device admin of its user and has the policy
76 * @param uid App uid.
78 * @return true if the uid is an active admin with the given policy.
80 public abstract boolean isActiveAdminWithPolicy(int uid, int reqPolicy); argument
/frameworks/base/core/java/android/app/usage/
H A DIStorageStatsManager.aidl28 long getCacheQuotaBytes(String volumeUuid, int uid, String callingPackage);
30 StorageStats queryStatsForUid(String volumeUuid, int uid, String callingPackage);
H A DNetworkStats.java61 * Index of the current uid in mUids when doing uid enumeration or a single uid value,
244 private static int convertUid(int uid) { argument
245 switch (uid) {
249 return uid;
281 * Key of the bucket. Usually an app uid or one of the following special values:<p />
469 * Collects history results for uid and resets history enumeration index.
471 void startHistoryEnumeration(int uid) { argument
472 startHistoryEnumeration(uid, androi
478 startHistoryEnumeration(int uid, int tag) argument
632 setSingleUidTag(int uid, int tag) argument
[all...]
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl245 NetworkStats getNetworkStatsUidDetail(int uid);
280 void setUidMeteredNetworkBlacklist(int uid, boolean enable);
281 void setUidMeteredNetworkWhitelist(int uid, boolean enable);
284 void setUidCleartextNetworkPolicy(int uid, int policy);
320 void setFirewallUidRule(int chain, int uid, int rule);
391 void addLegacyRouteForNetId(int netId, in RouteInfo routeInfo, int uid);
409 void allowProtect(int uid);
414 void denyProtect(int uid);
/frameworks/base/services/core/java/com/android/server/
H A DHardwarePropertiesManagerService.java92 int uid = 0;
94 uid = pm.getPackageUid(callingPackage, 0);
95 if (Binder.getCallingUid() != uid) {
102 final int userId = UserHandle.getUserId(uid);
/frameworks/native/include/binder/
H A DAppOpsManager.h100 int32_t checkOp(int32_t op, int32_t uid, const String16& callingPackage);
101 int32_t noteOp(int32_t op, int32_t uid, const String16& callingPackage);
102 int32_t startOp(int32_t op, int32_t uid, const String16& callingPackage);
103 void finishOp(int32_t op, int32_t uid, const String16& callingPackage);
/frameworks/native/libs/binder/include/binder/
H A DAppOpsManager.h100 int32_t checkOp(int32_t op, int32_t uid, const String16& callingPackage);
101 int32_t noteOp(int32_t op, int32_t uid, const String16& callingPackage);
102 int32_t startOp(int32_t op, int32_t uid, const String16& callingPackage);
103 void finishOp(int32_t op, int32_t uid, const String16& callingPackage);
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/
H A DSessionRoute.h44 uid_t uid)
45 : mUid(uid),
110 uid_t uid);
40 SessionRoute(audio_session_t session, audio_stream_type_t streamType, audio_source_t source, sp<DeviceDescriptor> deviceDescriptor, uid_t uid) argument
/frameworks/base/services/core/java/com/android/server/security/
H A DKeyAttestationApplicationIdProviderService.java47 public KeyAttestationApplicationId getKeyAttestationApplicationId(int uid) argument
55 String[] packageNames = mPackageManager.getPackagesForUid(uid);
57 throw new RemoteException("No packages for uid");
59 int userId = UserHandle.getUserId(uid);
/frameworks/native/services/vr/hardware_composer/
H A Dvr_composer.cpp13 const uid_t uid = ipc->getCallingUid(); local
15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid);
17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
/frameworks/base/services/autofill/java/com/android/server/autofill/
H A DAutofillManagerServiceImpl.java264 void setAuthenticationResultLocked(Bundle data, int sessionId, int authenticationId, int uid) { argument
269 if (session != null && uid == session.uid) {
274 void setHasCallback(int sessionId, int uid, boolean hasIt) { argument
279 if (session != null && uid == session.uid) {
286 int startSessionLocked(@NonNull IBinder activityToken, int uid, argument
297 final Session newSession = createSessionByTokenLocked(activityToken, uid, appCallbackToken,
304 "id=" + newSession.id + " uid=" + uid
328 finishSessionLocked(int sessionId, int uid) argument
349 cancelSessionLocked(int sessionId, int uid) argument
362 disableOwnedAutofillServicesLocked(int uid) argument
380 createSessionByTokenLocked(@onNull IBinder activityToken, int uid, @NonNull IBinder appCallbackToken, boolean hasCallback, @NonNull String packageName) argument
411 restoreSession(int sessionId, int uid, @NonNull IBinder activityToken, @NonNull IBinder appCallback) argument
426 updateSessionLocked(int sessionId, int uid, AutofillId autofillId, Rect virtualBounds, AutofillValue value, int action, int flags) argument
[all...]
/frameworks/av/media/libstagefright/
H A DHTTPBase.cpp118 void HTTPBase::RegisterSocketUserTag(int sockfd, uid_t uid, uint32_t kTag) { argument
119 int res = qtaguid_tagSocket(sockfd, kTag, uid);
121 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid());
134 void HTTPBase::RegisterSocketUserMark(int sockfd, uid_t uid) { argument
135 setNetworkForUser(uid, sockfd);
/frameworks/base/core/java/com/android/internal/content/
H A DPackageMonitor.java130 public void onPackageAdded(String packageName, int uid) { argument
136 public void onPackageRemoved(String packageName, int uid) { argument
143 public void onPackageRemovedAllUsers(String packageName, int uid) { argument
146 public void onPackageUpdateStarted(String packageName, int uid) { argument
149 public void onPackageUpdateFinished(String packageName, int uid) { argument
159 * @param uid The user ID the package runs under.
169 public boolean onPackageChanged(String packageName, int uid, String[] components) { argument
180 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument
187 public void onUidRemoved(int uid) { argument
292 public void onPackageDataCleared(String packageName, int uid) { argument
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DUidRecord.java30 * Overall information about a uid that has actively running processes.
33 final int uid; field in class:UidRecord
60 * Last seq number for which AcitivityManagerService dispatched uid state change to
67 * Indicates if any thread is waiting for network rules to get updated for {@link #uid}.
72 * Indicates whether this uid has internet permission or not.
89 int uid; field in class:UidRecord.ChangeItem
99 uid = _uid;
111 uid) == PackageManager.PERMISSION_GRANTED;
130 UserHandle.formatUid(sb, uid);
H A DContentProviderRecord.java38 final int uid; field in class:ContentProviderRecord
61 uid = ai.uid;
65 noReleaseNeeded = uid == 0 || uid == Process.SYSTEM_UID;
71 uid = cpr.uid;
88 && uid == app.info.uid;
157 pw.print(prefix); pw.print("uid
[all...]
/frameworks/base/core/java/android/net/
H A DNetworkPolicyManager.java56 * Rules defining whether an uid has access to a network given its type (metered / non-metered).
64 * if the device is on Battery Saver Mode and Data Saver Mode simulatenously, and a uid
135 public void setUidPolicy(int uid, int policy) { argument
137 mService.setUidPolicy(uid, policy);
146 * <p>The given policy bits will be set for the uid.
151 public void addUidPolicy(int uid, int policy) { argument
153 mService.addUidPolicy(uid, policy);
162 * <p>The given policy bits will be set for the uid.
167 public void removeUidPolicy(int uid, int policy) { argument
169 mService.removeUidPolicy(uid, polic
175 getUidPolicy(int uid) argument
326 isUidValidForPolicy(Context context, int uid) argument
[all...]
H A DNetworkStats.java49 /** {@link #uid} value when UID details unavailable. */
95 private int[] uid; field in class:NetworkStats
108 public int uid; field in class:NetworkStats.Entry
138 public Entry(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, argument
140 this(iface, uid, set, tag, METERED_NO, ROAMING_NO, rxBytes, rxPackets, txBytes,
144 public Entry(String iface, int uid, int set, int tag, int metered, int roaming, argument
147 this.uid = uid;
180 builder.append(" uid=").append(uid);
298 addValues(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument
305 addValues(String iface, int uid, int set, int tag, int metered, int roaming, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument
394 combineValues(String iface, int uid, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument
401 combineValues(String iface, int uid, int set, int tag, long rxBytes, long rxPackets, long txBytes, long txPackets, long operations) argument
442 findIndex(String iface, int uid, int set, int tag, int metered, int roaming) argument
458 findIndexHinted(String iface, int uid, int set, int tag, int metered, int roaming, int hintIndex) argument
[all...]
H A DUidRange.java51 public boolean contains(int uid) { argument
52 return start <= uid && uid <= stop;
/frameworks/base/keystore/java/android/security/
H A DCredentials.java233 public static boolean deleteAllTypesForAlias(KeyStore keystore, String alias, int uid) { argument
238 return deletePrivateKeyTypeForAlias(keystore, alias, uid)
239 & deleteSecretKeyTypeForAlias(keystore, alias, uid)
240 & deleteCertificateTypesForAlias(keystore, alias, uid);
257 public static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias, int uid) { argument
262 return keystore.delete(Credentials.USER_CERTIFICATE + alias, uid)
263 & keystore.delete(Credentials.CA_CERTIFICATE + alias, uid);
278 static boolean deletePrivateKeyTypeForAlias(KeyStore keystore, String alias, int uid) { argument
279 return keystore.delete(Credentials.USER_PRIVATE_KEY + alias, uid);
294 public static boolean deleteSecretKeyTypeForAlias(KeyStore keystore, String alias, int uid) { argument
[all...]
/frameworks/base/core/java/android/app/
H A DINotificationManager.aidl45 void clearData(String pkg, int uid, boolean fromApp);
52 void setShowBadge(String pkg, int uid, boolean showBadge);
53 boolean canShowBadge(String pkg, int uid);
54 void setNotificationsEnabledForPackage(String pkg, int uid, boolean enabled);
55 boolean areNotificationsEnabledForPackage(String pkg, int uid);
61 void createNotificationChannelsForPackage(String pkg, int uid, in ParceledListSlice channelsList);
62 ParceledListSlice getNotificationChannelGroupsForPackage(String pkg, int uid, boolean includeDeleted);
63 NotificationChannelGroup getNotificationChannelGroupForPackage(String groupId, String pkg, int uid);
64 void updateNotificationChannelForPackage(String pkg, int uid, in NotificationChannel channel);
66 NotificationChannel getNotificationChannelForPackage(String pkg, int uid, Strin
[all...]
H A DActivityManagerInternal.java90 String processName, String abiOverride, int uid, Runnable crashHandler);
212 public abstract int getUidProcessState(int uid); argument
244 * {@link com.android.server.net.NetworkPolicyManagerService} for a specific {@param uid} and
247 public abstract void notifyNetworkPolicyRulesUpdated(int uid, long procStateSeq); argument
89 startIsolatedProcess(String entryPoint, String[] mainArgs, String processName, String abiOverride, int uid, Runnable crashHandler) argument
/frameworks/base/services/core/java/com/android/server/job/
H A DJobPackageTracker.java49 public void addEvent(int cmd, int uid, String tag) { argument
53 mEventUids[index] = uid;
123 private PackageEntry getOrCreateEntry(int uid, String pkg) { argument
124 ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid);
127 mEntries.put(uid, uidMap);
137 public PackageEntry getEntry(int uid, String pkg) { argument
138 ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid);
152 void incPending(int uid, String pkg, long now) { argument
153 PackageEntry pe = getOrCreateEntry(uid, pkg);
161 void decPending(int uid, Strin argument
169 incActive(int uid, String pkg, long now) argument
178 decActive(int uid, String pkg, long now) argument
186 incActiveTop(int uid, String pkg, long now) argument
195 decActiveTop(int uid, String pkg, long now) argument
[all...]
/frameworks/native/services/vr/virtual_touchpad/
H A DVirtualTouchpadService.cpp95 const uid_t uid = ipc->getCallingUid(); local
96 if ((uid != AID_SHELL) &&
97 !PermissionCache::checkPermission(kDumpPermission, pid, uid)) {
99 " from pid=%ld, uid=%ld\n",
100 static_cast<long>(pid), static_cast<long>(uid));
125 const uid_t uid = ipc->getCallingUid(); local
126 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid);
128 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid),
129 static_cast<long>(uid));
/frameworks/native/cmds/installd/
H A DInstalldNativeService.cpp122 uid_t uid; local
125 reinterpret_cast<int32_t*>(&uid))) {
129 StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission));
134 uid_t uid = IPCThreadState::self()->getCallingUid(); local
135 if (uid == expectedUid || uid == AID_ROOT) {
139 StringPrintf("UID %d is not expected UID %d", uid, expectedUid));
161 #define ENFORCE_UID(uid) { \
162 binder::Status status = checkUid((uid)); \
240 static int restorecon_app_data_lazy(const std::string& path, const std::string& seInfo, uid_t uid, argument
285 restorecon_app_data_lazy(const std::string& parent, const char* name, const std::string& seInfo, uid_t uid, bool existing) argument
291 prepare_app_dir(const std::string& path, mode_t target_mode, uid_t uid) argument
303 prepare_app_quota(const std::unique_ptr<std::string>& uuid, const std::string& device, uid_t uid) argument
353 int32_t uid = multiuser_get_uid(userId, appId); local
612 get_cache_gid(uid_t uid) argument
666 uid_t uid = p->fts_parent->fts_statp->st_uid; local
963 uid_t uid = p->fts_statp->st_uid; local
1144 uid_t uid = multiuser_get_uid(userId, appId); local
1148 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local
1528 uid_t uid = multiuser_get_uid(userId, AID_MEDIA_RW); local
1532 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local
1654 uid_t uid = multiuser_get_uid(userId, AID_MEDIA_RW); local
1658 PLOG(ERROR) << "Failed to quotactl " << device << " for UID " << uid; local
1768 int32_t uid = multiuser_get_uid(userId, appId); local
1776 dumpProfiles(int32_t uid, const std::string& packageName, const std::string& codePaths, bool* _aidl_return) argument
1790 mergeProfiles(int32_t uid, const std::string& packageName, bool* _aidl_return) argument
1800 dexopt(const std::string& apkPath, int32_t uid, const std::unique_ptr<std::string>& packageName, const std::string& instructionSet, int32_t dexoptNeeded, const std::unique_ptr<std::string>& outputPath, int32_t dexFlags, const std::string& compilerFilter, const std::unique_ptr<std::string>& uuid, const std::unique_ptr<std::string>& sharedLibraries, const std::unique_ptr<std::string>& seInfo) argument
1846 mkinnerdirs(char* path, int basepos, mode_t mode, int uid, int gid, struct stat* statbuf) argument
1960 delete_stale_idmap(const char* target_apk, const char* overlay_apk, const char* idmap_path, int32_t uid) argument
2037 idmap(const std::string& targetApkPath, const std::string& overlayApkPath, int32_t uid) argument
2156 uid_t uid = multiuser_get_uid(userId, appId); local
2264 reconcileSecondaryDexFile( const std::string& dexPath, const std::string& packageName, int32_t uid, const std::vector<std::string>& isas, const std::unique_ptr<std::string>& volumeUuid, int32_t storage_flag, bool* _aidl_return) argument
[all...]
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkStatsCollection.java152 if (NetworkStatsAccess.isAccessibleToUser(key.uid, callerUid, accessLevel)) {
153 int j = uids.binarySearch(key.uid);
157 uids.add(j, key.uid);
169 NetworkTemplate template, int uid, int set, int tag, int fields,
171 return getHistory(template, uid, set, tag, fields, Long.MIN_VALUE, Long.MAX_VALUE,
180 NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end,
182 return getHistory(template, uid, set, tag, fields, start, end, accessLevel,
191 NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end,
193 if (!NetworkStatsAccess.isAccessibleToUser(uid, callerUid, accessLevel)) {
194 throw new SecurityException("Network stats history of uid "
168 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, @NetworkStatsAccess.Level int accessLevel) argument
179 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, @NetworkStatsAccess.Level int accessLevel) argument
190 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, @NetworkStatsAccess.Level int accessLevel, int callerUid) argument
271 recordData(NetworkIdentitySet ident, int uid, int set, int tag, long start, long end, NetworkStats.Entry entry) argument
305 findOrCreateHistory( NetworkIdentitySet ident, int uid, int set, int tag) argument
647 public final int uid; field in class:NetworkStatsCollection.Key
653 Key(NetworkIdentitySet ident, int uid, int set, int tag) argument
[all...]

Completed in 583 milliseconds

1234567891011>>