/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 59 private void checkPermission(int pid, int uid, int monitoringType) { argument 60 if (mGeofenceHardwareImpl.getAllowedResolutionLevel(pid, uid) <
|
/frameworks/base/core/proto/android/service/ |
H A D | netstats.proto | 92 int32 uid = 2;
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | ProcessLoggingHandler.java | 53 int uid = bundle.getInt("uid"); 60 startTimestamp, uid, pid, seinfo, apkHash);
|
H A D | BasePermission.java | 45 int uid; field in class:BasePermission
|
/frameworks/base/services/core/java/com/android/server/storage/ |
H A D | CacheQuotaStrategy.java | 85 private static final String ATTR_UID = "uid"; 188 // We need the app info to determine the uid and the uuid of the volume 195 .setUid(appInfo.uid) 227 int uid = request.getUid(); 229 UserHandle.getUserId(uid), 230 UserHandle.getAppId(uid), proposedQuota); 232 UserHandle.getUserId(uid), 233 UserHandle.getAppId(uid), proposedQuota); 397 int uid = Integer.parseInt(parser.getAttributeValue(null, ATTR_UID)); 400 .setVolumeUuid(uuid).setUid(uid) [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/am/ |
H A D | ActivityManagerServiceTest.java | 207 // Verify when uid is not restricted, procStateSeq is not incremented. 229 // Verify when the uid doesn't have internet permission, then procStateSeq is not 242 // Verify procStateSeq is not incremented when the uid is not an application, regardless 255 private UidRecord addUidRecord(int uid) { argument 256 final UidRecord uidRec = new UidRecord(uid); 259 mAms.mActiveUids.put(uid, uidRec); 262 new ApplicationInfo(), TAG, uid); 285 if (app.uid == uidRec.uid && expectedBlockState == NETWORK_STATE_BLOCK) { 314 // No change in uid stat 647 verifyLastProcStateSeqUpdated(UidRecord uidRecord, int uid, long curProcstateSeq) argument 825 isNetworkRestrictedForUid(int uid) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/storage/ |
H A D | CacheQuotaStrategyTest.java | 70 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 86 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 87 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n" 103 + "<quota uid=\"0\" bytes=\"100\" />\n" 104 + "<quota uid=\"10\" bytes=\"250\" />\n" 112 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 113 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n" 124 private CacheQuotaHint buildCacheQuotaHint(String volumeUuid, int uid, long quota) { argument 126 .setVolumeUuid(volumeUuid).setUid(uid).setQuota(quota).build();
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 320 public void onPackageAdded(String packageName, int uid) { 322 cancelAccountAccessRequestNotificationIfNeeded(uid, true); 326 public void onPackageUpdateFinished(String packageName, int uid) { 328 cancelAccountAccessRequestNotificationIfNeeded(uid, true); 339 final int uid = mPackageManager.getPackageUidAsUser(packageName, userId); 341 AppOpsManager.OP_GET_ACCOUNTS, uid, packageName); 345 cancelAccountAccessRequestNotificationIfNeeded(packageName, uid, true); 358 (int uid) -> { 360 String[] packageNames = mPackageManager.getPackagesForUid(uid); 362 final int userId = UserHandle.getUserId(uid); 393 cancelAccountAccessRequestNotificationIfNeeded(int uid, boolean checkAccess) argument 401 cancelAccountAccessRequestNotificationIfNeeded(String packageName, int uid, boolean checkAccess) argument 409 cancelAccountAccessRequestNotificationIfNeeded(Account account, int uid, boolean checkAccess) argument 420 cancelAccountAccessRequestNotificationIfNeeded(Account account, int uid, String packageName, boolean checkAccess) argument 3027 newGrantCredentialsPermissionIntent(Account account, String packageName, int uid, AccountAuthenticatorResponse response, String authTokenType, boolean startInNewTask) argument 3049 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 3901 getPackageNameForUid(int uid) argument 3929 hasAccountAccess(@onNull Account account, @Nullable String packageName, int uid) argument 3988 newRequestAccountAccessIntent(Account account, String packageName, int uid, RemoteCallback callback) argument 4400 getAccountsForPackage(String packageName, int uid, String opPackageName) argument 5023 logRecordWithUid(UserAccounts accounts, String action, String tableName, int uid) argument 5235 isPermittedForPackage(String packageName, int uid, int userId, String... permissions) argument 5364 checkGetAccountsPermission(String packageName, int uid, int userId) argument 5369 checkReadContactsPermission(String packageName, int uid, int userId) argument 5603 isProfileOwner(int uid) argument 5611 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 5633 grantAppPermission(Account account, String authTokenType, int uid) argument 5668 revokeAppPermission(Account account, String authTokenType, int uid) argument 6080 hasAccountAccess(@onNull Account account, @IntRange(from = 0) int uid) argument [all...] |
H A D | AccountsDb.java | 84 private static final String GRANTS_GRANTEE_UID = "uid"; 109 // these are called by the authenticators, the uid associated will be 596 oldVersion = 3; // skip version 2 which had uid based table 600 // Remove uid based table and replace it with packageName based 850 String authTokenType, long uid) { 855 new String[] {String.valueOf(accountId), authTokenType, String.valueOf(uid)}) > 0; 866 final int uid = cursor.getInt(0); 867 result.add(uid); 875 long findMatchingGrantsCount(int uid, String authTokenType, Account account) { argument 877 String[] args = {String.valueOf(uid), authTokenTyp 849 deleteGrantsByAccountIdAuthTokenTypeAndUid(long accountId, String authTokenType, long uid) argument 881 findMatchingGrantsCountAnyToken(int uid, Account account) argument 887 insertGrant(long accountId, String authTokenType, int uid) argument 896 deleteGrantsByUid(int uid) argument 1016 insertOrReplaceMetaAuthTypeAndUid(String authenticatorType, int uid) argument 1057 deleteMetaByAuthTypeAndUid(String type, int uid) argument 1146 insertMetaAuthTypeAndUid(SQLiteDatabase db, String authenticatorType, int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/content/ |
H A D | ContentService.java | 295 final int uid = Binder.getCallingUid(); 298 userHandle = handleIncomingUser(uri, pid, uid, 311 Log.w(TAG, "Ignoring content changes for " + uri + " from " + uid + ": " + msg); 319 uid, pid, userHandle); 361 final int uid = Binder.getCallingUid(); 365 userHandle = handleIncomingUser(uri, pid, uid, 378 Log.w(TAG, "Ignoring notify for " + uri + " from " + uid + ": " + msg); 421 syncManager.scheduleLocalSync(null /* all accounts */, callingUserHandle, uid, 435 private int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, int userHandle) { argument 438 uri, pid, uid, modeFlag 1146 handleIncomingUser(Uri uri, int pid, int uid, int modeFlags, boolean allowNonFull, int userId) argument 1216 public final int uid; field in class:ContentService.ObserverNode.ObserverEntry 1319 addObserverLocked(Uri uri, IContentObserver observer, boolean notifyForDescendants, Object observersLock, int uid, int pid, int userHandle) argument 1326 addObserverLocked(Uri uri, int index, IContentObserver observer, boolean notifyForDescendants, Object observersLock, int uid, int pid, int userHandle) argument [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/ |
H A D | WifiAwareStateManagerTest.java | 180 final int uid = 1000; 208 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false); 222 final int uid = 1000; 242 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false); 259 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false); 274 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false); 291 final int uid = 1000; 312 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false); 333 final int uid = 1000; 356 mDut.connect(clientId1, uid, pi [all...] |
/frameworks/base/services/core/java/com/android/server/media/projection/ |
H A D | MediaProjectionManagerService.java | 207 public boolean hasProjectionPermission(int uid, String packageName) { argument 214 AppOpsManager.OP_PROJECT_MEDIA, uid, packageName) 223 public IMediaProjection createProjection(int uid, String packageName, int type, argument 236 projection = new MediaProjection(type, uid, packageName); 239 projection.uid, projection.packageName, AppOpsManager.MODE_ALLOWED); 335 public final int uid; field in class:MediaProjectionManagerService.MediaProjection 344 public MediaProjection(int type, int uid, String packageName) { argument 346 this.uid = uid; 348 userHandle = new UserHandle(UserHandle.getUserId(uid)); [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SmsUsageMonitor.java | 583 int uid = Binder.getCallingUid(); 584 int appId = UserHandle.getAppId(uid); 585 if (appId == Process.SYSTEM_UID || appId == Process.PHONE_UID || uid == 0) { 591 if (!UserHandle.isSameApp(ai.uid, uid)) { 592 throw new SecurityException("Calling uid " + uid + " gave package" 593 + pkg + " which is owned by uid " + ai.uid); 601 int uid [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | VibratorService.java | 121 int usageHint, int uid, String opPkg) { 126 mUid = uid; 168 int usageHint, int uid, String opPkg) { 172 mUid = uid; 185 .append(", uid: ") 300 private void verifyIncomingUid(int uid) { argument 301 if (uid == Binder.getCallingUid()) { 347 public void vibrate(int uid, String opPkg, VibrationEffect effect, int usageHint, argument 357 verifyIncomingUid(uid); 379 Vibration vib = new Vibration(token, effect, usageHint, uid, opPk 120 Vibration(IBinder token, VibrationEffect effect, int usageHint, int uid, String opPkg) argument 167 VibrationInfo(long startTime, VibrationEffect effect, int usageHint, int uid, String opPkg) argument 667 doVibratorOn(long millis, int amplitude, int uid, int usageHint) argument 741 noteVibratorOnLocked(int uid, long millis) argument 765 VibrateThread(VibrationEffect.Waveform waveform, int uid, int usageHint) argument [all...] |
/frameworks/av/include/media/ |
H A D | IMediaExtractor.h | 70 virtual void setUID(uid_t uid) = 0;
|
/frameworks/av/media/libmedia/include/media/ |
H A D | IMediaExtractor.h | 70 virtual void setUID(uid_t uid) = 0;
|
/frameworks/av/services/audioflinger/ |
H A D | MmapTracks.h | 30 uid_t uid,
|
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/ |
H A D | AudioPolicyMix.h | 74 status_t getOutputForAttr(audio_attributes_t attributes, uid_t uid,
|
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 717 public int checkPermission(String permission, int pid, int uid) { argument 718 return mBase.checkPermission(permission, pid, uid); 723 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 724 return mBase.checkPermission(permission, pid, uid, callerToken); 744 String permission, int pid, int uid, String message) { 745 mBase.enforcePermission(permission, pid, uid, message); 775 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 776 return mBase.checkUriPermission(uri, pid, uid, modeFlags); 781 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument 782 return mBase.checkUriPermission(uri, pid, uid, modeFlag 743 enforcePermission( String permission, int pid, int uid, String message) argument 796 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 803 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 821 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/hardware/usb/ |
H A D | UsbManager.java | 488 * Grants permission for USB device to given uid without showing system dialog. 491 * @uid uid to give permission 495 public void grantPermission(UsbDevice device, int uid) { argument 497 mService.grantDevicePermission(device, uid); 513 int uid = mContext.getPackageManager() 515 grantPermission(device, uid);
|
/frameworks/base/core/java/com/android/internal/os/ |
H A D | BatteryStatsHelper.java | 572 final int uid = app.getUid(); 573 final int userId = UserHandle.getUserId(uid); 574 if (uid == Process.WIFI_UID) { 576 } else if (uid == Process.BLUETOOTH_UID) { 579 && UserHandle.getAppId(uid) >= Process.FIRST_APPLICATION_UID) { 591 if (uid == 0) { 868 final BatteryStats.Uid uid = sippers.get(i).uidObj; 869 if (uid != null) { 870 final long timeMs = getForegroundActivityTotalTimeMs(uid, rawRealtimeMs); 871 activityTimeArray.put(uid 940 getForegroundActivityTotalTimeMs(BatteryStats.Uid uid, long rawRealtimeMs) argument [all...] |
/frameworks/base/media/native/midi/ |
H A D | midi.h | 62 int32_t uid; member in struct:__anon1300
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | UsbConfirmActivity.java | 117 final int uid = mResolveInfo.activityInfo.applicationInfo.uid; 127 service.grantDevicePermission(mDevice, uid); 140 service.grantAccessoryPermission(mAccessory, uid);
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | NetdEventListenerService.java | 102 String hostname, String[] ipAddresses, int ipAddressesCount, int uid) 115 mNetdEventCallback.onDnsEvent(hostname, ipAddresses, ipAddressesCount, timestamp, uid); 123 int port, int uid) throws RemoteException { 134 mNetdEventCallback.onConnectEvent(ipAddr, port, System.currentTimeMillis(), uid); 101 onDnsEvent(int netId, int eventType, int returnCode, int latencyMs, String hostname, String[] ipAddresses, int ipAddressesCount, int uid) argument 122 onConnectEvent(int netId, int error, int latencyMs, String ipAddr, int port, int uid) argument
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerShellCommand.java | 75 final int uid = Binder.getCallingUid(); 76 if (uid == 0) { 81 "android.permission.CHANGE_APP_IDLE_STATE", uid); 83 throw new SecurityException("Uid " + uid
|