Searched refs:uid (Results 201 - 225 of 526) sorted by relevance

1234567891011>>

/frameworks/base/core/java/android/hardware/location/
H A DGeofenceHardwareService.java59 private void checkPermission(int pid, int uid, int monitoringType) { argument
60 if (mGeofenceHardwareImpl.getAllowedResolutionLevel(pid, uid) <
/frameworks/base/core/proto/android/service/
H A Dnetstats.proto92 int32 uid = 2;
/frameworks/base/services/core/java/com/android/server/pm/
H A DProcessLoggingHandler.java53 int uid = bundle.getInt("uid");
60 startTimestamp, uid, pid, seinfo, apkHash);
H A DBasePermission.java45 int uid; field in class:BasePermission
/frameworks/base/services/core/java/com/android/server/storage/
H A DCacheQuotaStrategy.java85 private static final String ATTR_UID = "uid";
188 // We need the app info to determine the uid and the uuid of the volume
195 .setUid(appInfo.uid)
227 int uid = request.getUid();
229 UserHandle.getUserId(uid),
230 UserHandle.getAppId(uid), proposedQuota);
232 UserHandle.getUserId(uid),
233 UserHandle.getAppId(uid), proposedQuota);
397 int uid = Integer.parseInt(parser.getAttributeValue(null, ATTR_UID));
400 .setVolumeUuid(uuid).setUid(uid)
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/am/
H A DActivityManagerServiceTest.java207 // Verify when uid is not restricted, procStateSeq is not incremented.
229 // Verify when the uid doesn't have internet permission, then procStateSeq is not
242 // Verify procStateSeq is not incremented when the uid is not an application, regardless
255 private UidRecord addUidRecord(int uid) { argument
256 final UidRecord uidRec = new UidRecord(uid);
259 mAms.mActiveUids.put(uid, uidRec);
262 new ApplicationInfo(), TAG, uid);
285 if (app.uid == uidRec.uid && expectedBlockState == NETWORK_STATE_BLOCK) {
314 // No change in uid stat
647 verifyLastProcStateSeqUpdated(UidRecord uidRecord, int uid, long curProcstateSeq) argument
825 isNetworkRestrictedForUid(int uid) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/storage/
H A DCacheQuotaStrategyTest.java70 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
86 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
87 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n"
103 + "<quota uid=\"0\" bytes=\"100\" />\n"
104 + "<quota uid=\"10\" bytes=\"250\" />\n"
112 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
113 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n"
124 private CacheQuotaHint buildCacheQuotaHint(String volumeUuid, int uid, long quota) { argument
126 .setVolumeUuid(volumeUuid).setUid(uid).setQuota(quota).build();
/frameworks/base/services/core/java/com/android/server/accounts/
H A DAccountManagerService.java320 public void onPackageAdded(String packageName, int uid) {
322 cancelAccountAccessRequestNotificationIfNeeded(uid, true);
326 public void onPackageUpdateFinished(String packageName, int uid) {
328 cancelAccountAccessRequestNotificationIfNeeded(uid, true);
339 final int uid = mPackageManager.getPackageUidAsUser(packageName, userId);
341 AppOpsManager.OP_GET_ACCOUNTS, uid, packageName);
345 cancelAccountAccessRequestNotificationIfNeeded(packageName, uid, true);
358 (int uid) -> {
360 String[] packageNames = mPackageManager.getPackagesForUid(uid);
362 final int userId = UserHandle.getUserId(uid);
393 cancelAccountAccessRequestNotificationIfNeeded(int uid, boolean checkAccess) argument
401 cancelAccountAccessRequestNotificationIfNeeded(String packageName, int uid, boolean checkAccess) argument
409 cancelAccountAccessRequestNotificationIfNeeded(Account account, int uid, boolean checkAccess) argument
420 cancelAccountAccessRequestNotificationIfNeeded(Account account, int uid, String packageName, boolean checkAccess) argument
3027 newGrantCredentialsPermissionIntent(Account account, String packageName, int uid, AccountAuthenticatorResponse response, String authTokenType, boolean startInNewTask) argument
3049 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument
3901 getPackageNameForUid(int uid) argument
3929 hasAccountAccess(@onNull Account account, @Nullable String packageName, int uid) argument
3988 newRequestAccountAccessIntent(Account account, String packageName, int uid, RemoteCallback callback) argument
4400 getAccountsForPackage(String packageName, int uid, String opPackageName) argument
5023 logRecordWithUid(UserAccounts accounts, String action, String tableName, int uid) argument
5235 isPermittedForPackage(String packageName, int uid, int userId, String... permissions) argument
5364 checkGetAccountsPermission(String packageName, int uid, int userId) argument
5369 checkReadContactsPermission(String packageName, int uid, int userId) argument
5603 isProfileOwner(int uid) argument
5611 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument
5633 grantAppPermission(Account account, String authTokenType, int uid) argument
5668 revokeAppPermission(Account account, String authTokenType, int uid) argument
6080 hasAccountAccess(@onNull Account account, @IntRange(from = 0) int uid) argument
[all...]
H A DAccountsDb.java84 private static final String GRANTS_GRANTEE_UID = "uid";
109 // these are called by the authenticators, the uid associated will be
596 oldVersion = 3; // skip version 2 which had uid based table
600 // Remove uid based table and replace it with packageName based
850 String authTokenType, long uid) {
855 new String[] {String.valueOf(accountId), authTokenType, String.valueOf(uid)}) > 0;
866 final int uid = cursor.getInt(0);
867 result.add(uid);
875 long findMatchingGrantsCount(int uid, String authTokenType, Account account) { argument
877 String[] args = {String.valueOf(uid), authTokenTyp
849 deleteGrantsByAccountIdAuthTokenTypeAndUid(long accountId, String authTokenType, long uid) argument
881 findMatchingGrantsCountAnyToken(int uid, Account account) argument
887 insertGrant(long accountId, String authTokenType, int uid) argument
896 deleteGrantsByUid(int uid) argument
1016 insertOrReplaceMetaAuthTypeAndUid(String authenticatorType, int uid) argument
1057 deleteMetaByAuthTypeAndUid(String type, int uid) argument
1146 insertMetaAuthTypeAndUid(SQLiteDatabase db, String authenticatorType, int uid) argument
[all...]
/frameworks/base/services/core/java/com/android/server/content/
H A DContentService.java295 final int uid = Binder.getCallingUid();
298 userHandle = handleIncomingUser(uri, pid, uid,
311 Log.w(TAG, "Ignoring content changes for " + uri + " from " + uid + ": " + msg);
319 uid, pid, userHandle);
361 final int uid = Binder.getCallingUid();
365 userHandle = handleIncomingUser(uri, pid, uid,
378 Log.w(TAG, "Ignoring notify for " + uri + " from " + uid + ": " + msg);
421 syncManager.scheduleLocalSync(null /* all accounts */, callingUserHandle, uid,
435 private int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, int userHandle) { argument
438 uri, pid, uid, modeFlag
1146 handleIncomingUser(Uri uri, int pid, int uid, int modeFlags, boolean allowNonFull, int userId) argument
1216 public final int uid; field in class:ContentService.ObserverNode.ObserverEntry
1319 addObserverLocked(Uri uri, IContentObserver observer, boolean notifyForDescendants, Object observersLock, int uid, int pid, int userHandle) argument
1326 addObserverLocked(Uri uri, int index, IContentObserver observer, boolean notifyForDescendants, Object observersLock, int uid, int pid, int userHandle) argument
[all...]
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/aware/
H A DWifiAwareStateManagerTest.java180 final int uid = 1000;
208 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false);
222 final int uid = 1000;
242 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false);
259 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false);
274 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false);
291 final int uid = 1000;
312 mDut.connect(clientId, uid, pid, callingPackage, mockCallback, configRequest, false);
333 final int uid = 1000;
356 mDut.connect(clientId1, uid, pi
[all...]
/frameworks/base/services/core/java/com/android/server/media/projection/
H A DMediaProjectionManagerService.java207 public boolean hasProjectionPermission(int uid, String packageName) { argument
214 AppOpsManager.OP_PROJECT_MEDIA, uid, packageName)
223 public IMediaProjection createProjection(int uid, String packageName, int type, argument
236 projection = new MediaProjection(type, uid, packageName);
239 projection.uid, projection.packageName, AppOpsManager.MODE_ALLOWED);
335 public final int uid; field in class:MediaProjectionManagerService.MediaProjection
344 public MediaProjection(int type, int uid, String packageName) { argument
346 this.uid = uid;
348 userHandle = new UserHandle(UserHandle.getUserId(uid));
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSmsUsageMonitor.java583 int uid = Binder.getCallingUid();
584 int appId = UserHandle.getAppId(uid);
585 if (appId == Process.SYSTEM_UID || appId == Process.PHONE_UID || uid == 0) {
591 if (!UserHandle.isSameApp(ai.uid, uid)) {
592 throw new SecurityException("Calling uid " + uid + " gave package"
593 + pkg + " which is owned by uid " + ai.uid);
601 int uid
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DVibratorService.java121 int usageHint, int uid, String opPkg) {
126 mUid = uid;
168 int usageHint, int uid, String opPkg) {
172 mUid = uid;
185 .append(", uid: ")
300 private void verifyIncomingUid(int uid) { argument
301 if (uid == Binder.getCallingUid()) {
347 public void vibrate(int uid, String opPkg, VibrationEffect effect, int usageHint, argument
357 verifyIncomingUid(uid);
379 Vibration vib = new Vibration(token, effect, usageHint, uid, opPk
120 Vibration(IBinder token, VibrationEffect effect, int usageHint, int uid, String opPkg) argument
167 VibrationInfo(long startTime, VibrationEffect effect, int usageHint, int uid, String opPkg) argument
667 doVibratorOn(long millis, int amplitude, int uid, int usageHint) argument
741 noteVibratorOnLocked(int uid, long millis) argument
765 VibrateThread(VibrationEffect.Waveform waveform, int uid, int usageHint) argument
[all...]
/frameworks/av/include/media/
H A DIMediaExtractor.h70 virtual void setUID(uid_t uid) = 0;
/frameworks/av/media/libmedia/include/media/
H A DIMediaExtractor.h70 virtual void setUID(uid_t uid) = 0;
/frameworks/av/services/audioflinger/
H A DMmapTracks.h30 uid_t uid,
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/
H A DAudioPolicyMix.h74 status_t getOutputForAttr(audio_attributes_t attributes, uid_t uid,
/frameworks/base/core/java/android/content/
H A DContextWrapper.java717 public int checkPermission(String permission, int pid, int uid) { argument
718 return mBase.checkPermission(permission, pid, uid);
723 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
724 return mBase.checkPermission(permission, pid, uid, callerToken);
744 String permission, int pid, int uid, String message) {
745 mBase.enforcePermission(permission, pid, uid, message);
775 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
776 return mBase.checkUriPermission(uri, pid, uid, modeFlags);
781 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument
782 return mBase.checkUriPermission(uri, pid, uid, modeFlag
743 enforcePermission( String permission, int pid, int uid, String message) argument
796 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
803 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
821 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
/frameworks/base/core/java/android/hardware/usb/
H A DUsbManager.java488 * Grants permission for USB device to given uid without showing system dialog.
491 * @uid uid to give permission
495 public void grantPermission(UsbDevice device, int uid) { argument
497 mService.grantDevicePermission(device, uid);
513 int uid = mContext.getPackageManager()
515 grantPermission(device, uid);
/frameworks/base/core/java/com/android/internal/os/
H A DBatteryStatsHelper.java572 final int uid = app.getUid();
573 final int userId = UserHandle.getUserId(uid);
574 if (uid == Process.WIFI_UID) {
576 } else if (uid == Process.BLUETOOTH_UID) {
579 && UserHandle.getAppId(uid) >= Process.FIRST_APPLICATION_UID) {
591 if (uid == 0) {
868 final BatteryStats.Uid uid = sippers.get(i).uidObj;
869 if (uid != null) {
870 final long timeMs = getForegroundActivityTotalTimeMs(uid, rawRealtimeMs);
871 activityTimeArray.put(uid
940 getForegroundActivityTotalTimeMs(BatteryStats.Uid uid, long rawRealtimeMs) argument
[all...]
/frameworks/base/media/native/midi/
H A Dmidi.h62 int32_t uid; member in struct:__anon1300
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/
H A DUsbConfirmActivity.java117 final int uid = mResolveInfo.activityInfo.applicationInfo.uid;
127 service.grantDevicePermission(mDevice, uid);
140 service.grantAccessoryPermission(mAccessory, uid);
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DNetdEventListenerService.java102 String hostname, String[] ipAddresses, int ipAddressesCount, int uid)
115 mNetdEventCallback.onDnsEvent(hostname, ipAddresses, ipAddressesCount, timestamp, uid);
123 int port, int uid) throws RemoteException {
134 mNetdEventCallback.onConnectEvent(ipAddr, port, System.currentTimeMillis(), uid);
101 onDnsEvent(int netId, int eventType, int returnCode, int latencyMs, String hostname, String[] ipAddresses, int ipAddressesCount, int uid) argument
122 onConnectEvent(int netId, int error, int latencyMs, String ipAddr, int port, int uid) argument
/frameworks/base/services/core/java/com/android/server/job/
H A DJobSchedulerShellCommand.java75 final int uid = Binder.getCallingUid();
76 if (uid == 0) {
81 "android.permission.CHANGE_APP_IDLE_STATE", uid);
83 throw new SecurityException("Uid " + uid

Completed in 1455 milliseconds

1234567891011>>