/frameworks/base/services/tests/servicestests/src/com/android/server/am/ |
H A D | AppErrorDialogTest.java | 59 public boolean isNetworkRestrictedForUid(int uid) {
|
/frameworks/native/cmds/installd/ |
H A D | installd.cpp | 243 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM); local 244 gid_t gid = uid; 246 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) { 251 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gid) != 0) {
|
H A D | InstalldNativeService.h | 82 binder::Status dexopt(const std::string& apkPath, int32_t uid, 91 binder::Status mergeProfiles(int32_t uid, const std::string& packageName, bool* _aidl_return); 92 binder::Status dumpProfiles(int32_t uid, const std::string& packageName, 98 int32_t uid); 114 const std::string& packageName, int32_t uid, const std::vector<std::string>& isa,
|
/frameworks/native/include/binder/ |
H A D | IServiceManager.h | 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/include/binder/ |
H A D | IServiceManager.h | 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/native/services/sensorservice/ |
H A D | SensorDirectConnection.h | 39 SensorDirectConnection(const sp<SensorService>& service, uid_t uid,
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsService.java | 184 private static final String PREFIX_UID = "uid"; 353 // listen for uid removal to clean stats 580 NetworkTemplate template, int uid, int set, int tag, int fields) { 583 return getUidComplete().getHistory(template, uid, set, tag, fields, 586 return getUidTagComplete().getHistory(template, uid, set, tag, fields, 593 NetworkTemplate template, int uid, int set, int tag, int fields, 597 return getUidComplete().getHistory(template, uid, set, tag, fields, start, end, 599 } else if (uid == Binder.getCallingUid()) { 600 return getUidTagComplete().getHistory(template, uid, set, tag, fields, 604 + " cannot access tag information from a different uid"); 655 getDataLayerSnapshotForUid(int uid) argument 693 incrementOperationCount(int uid, int tag, int operationCount) argument 715 setUidForeground(int uid, boolean uidForeground) argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 683 * For addAppTask: cached of the last activity uid that was added. 1056 * have seen. Mapping is target uid -> target component -> source uid -> source process name 1183 public final int uid; field in class:ActivityManagerService.Identity 1188 uid = _uid; 1459 * service. The ProcessMap is package/uid tuples; each of these contain 1537 * particular uid even when the uidRecord is re-created. 1548 int uid; field in class:ActivityManagerService.ProcessChangeItem 1555 final int uid; field in class:ActivityManagerService.UidObserverRegistration 1563 uid 3332 killProcessGroup(int uid, int pid) argument 3555 getProcessRecordLocked(String processName, int uid, boolean keepIfLarge) argument 3610 startIsolatedProcess(String entryPoint, String[] entryPointArgs, String processName, String abiOverride, int uid, Runnable crashHandler) argument 4321 dispatchProcessDied(int pid, int uid) argument 4885 startActivityInPackage(int uid, String callingPackage, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, Bundle bOptions, int userId, IActivityContainer container, TaskRecord inTask, String reason) argument 4914 startActivitiesInPackage(int uid, String callingPackage, Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle bOptions, int userId) argument 5102 crashApplication(int uid, int initialPid, String packageName, int userId, String message) argument 6175 killApplicationProcess(String processName, int uid) argument 6202 forceStopPackageLocked(final String packageName, int uid, String reason) argument 6207 finishForceStopPackageLocked(final String packageName, int uid) argument 6538 removeProcessNameLocked(final String name, final int uid) argument 6542 removeProcessNameLocked(final String name, final int uid, final ProcessRecord expecting) argument 7848 isAppForeground(int uid) argument 7860 getUidState(int uid) argument 7866 getUidStateLocked(int uid) argument 8151 checkPermission(String permission, int pid, int uid) argument 8157 getPackagesForUid(int uid) argument 8178 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 8193 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 8212 checkPermission(String permission, int pid, int uid) argument 8220 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 8271 checkHoldingPermissionsLocked( IPackageManager pm, ProviderInfo pi, GrantUri grantUri, int uid, final int modeFlags) argument 8284 checkHoldingPermissionsInternalLocked(IPackageManager pm, ProviderInfo pi, GrantUri grantUri, int uid, final int modeFlags, boolean considerUidPermissions) argument 8365 isAppStartModeDisabled(int uid, String packageName) argument 8373 appRestrictedInBackgroundLocked(int uid, String packageName, int packageTargetSdk) argument 8400 appServicesRestrictedInBackgroundLocked(int uid, String packageName, int packageTargetSdk) argument 8432 getAppStartModeLocked(int uid, String packageName, int packageTargetSdk, int callingPid, boolean alwaysRestrict, boolean disabledOnly) argument 8488 isOnDeviceIdleWhitelistLocked(int uid) argument 8542 checkUriPermissionLocked(GrantUri grantUri, int uid, final int modeFlags) argument 8580 checkUriPermission(Uri uri, int pid, int uid, final int modeFlags, int userId, IBinder callerToken) argument 9471 maybePrunePersistedUriGrantsLocked(int uid) argument 12190 uidOnBackgroundWhitelist(final int uid) argument 12203 backgroundWhitelistUid(final int uid) argument 12427 notifyCleartextNetwork(int uid, byte[] firstPacket) argument 13183 getUidProcessState(int uid, String callingPackage) argument 18156 startServiceInPackage(int uid, Intent service, String resolvedType, boolean fgRequired, String callingPackage, int userId) argument 18536 isInstantApp(ProcessRecord record, String callerPackage, int uid) argument 19714 broadcastIntentInPackage(String packageName, int uid, Intent intent, String resolvedType, IIntentReceiver resultTo, int resultCode, String resultData, Bundle resultExtras, String requiredPermission, Bundle bOptions, boolean serialized, boolean sticky, int userId) argument 20678 noteUidProcessState(final int uid, final int state) argument 22140 isEphemeralLocked(int uid) argument 22150 enqueueUidChangeLocked(UidRecord uidRec, int uid, int change) argument 23041 runInBackgroundDisabled(int uid) argument 23056 doStopUidLocked(int uid, final UidRecord uidRec) argument 23149 setUidTempWhitelistStateLocked(int uid, boolean onWhitelist) argument 23398 setDumpHeapDebugLimit(String processName, int uid, long maxMemSize, String reportPackage) argument 23741 startIsolatedProcess(String entryPoint, String[] entryPointArgs, String processName, String abiOverride, int uid, Runnable crashHandler) argument 23912 getUidProcessState(int uid) argument 23979 notifyNetworkPolicyRulesUpdated(int uid, long procStateSeq) argument 24459 isNetworkRestrictedForUid(int uid) argument [all...] |
/frameworks/av/media/libstagefright/webm/ |
H A D | WebmElement.cpp | 61 uint64_t uid, 68 ls.push_back(new WebmUnsigned(kMkvTrackUid, uid)); 312 uint64_t uid, 315 if (uid == 0) { 316 uid = kAudioTrackNum; 322 uid, 347 uint64_t uid, 350 if (uid == 0) { 351 uid = kVideoTrackNum; 357 uid, 59 populateCommonTrackEntries( int num, uint64_t uid, bool lacing, const char *lang, const char *codec, TrackTypes type, List<sp<WebmElement> > &ls) argument 307 AudioTrackEntry( int chans, double rate, const sp<ABuffer> &buf, int bps, uint64_t uid, bool lacing, const char *lang) argument 342 VideoTrackEntry( const char *codec, uint64_t width, uint64_t height, const sp<MetaData> &meta, uint64_t uid, bool lacing, const char *lang) argument [all...] |
H A D | WebmElement.h | 57 uint64_t uid = 0, 66 uint64_t uid = 0,
|
/frameworks/av/services/audiopolicy/managerdefault/ |
H A D | AudioPolicyManager.h | 116 uid_t uid, 133 uid_t uid, 207 uid_t uid); 209 uid_t uid); 215 virtual void releaseResourcesForUid(uid_t uid); 232 uid_t uid); 494 void clearAudioPatches(uid_t uid); 495 void clearSessionRoutes(uid_t uid); 508 void clearAudioSources(uid_t uid); 640 uid_t uid, [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageDexOptimizer.java | 121 final long acquireTime = acquireWakeLockLI(pkg.applicationInfo.uid); 144 final int sharedGid = UserHandle.getSharedAppGid(pkg.applicationInfo.uid); 200 int dexoptFlags, int uid, CompilerStats.PackageStats packageStats) { 220 mInstaller.dexopt(path, uid, pkg.packageName, isa, dexoptNeeded, oatDir, dexoptFlags, 251 final long acquireTime = acquireWakeLockLI(info.uid); 262 private long acquireWakeLockLI(final int uid) { argument 269 mDexoptWakeLock.setWorkSource(new WorkSource(uid)); 322 mInstaller.dexopt(path, info.uid, info.packageName, isa, /*dexoptNeeded*/ 0, 523 private boolean isProfileUpdated(PackageParser.Package pkg, int uid, String compilerFilter) { argument 530 return mInstaller.mergeProfiles(uid, pk 198 dexOptPath(PackageParser.Package pkg, String path, String isa, String compilerFilter, boolean profileUpdated, String sharedLibrariesPath, int dexoptFlags, int uid, CompilerStats.PackageStats packageStats) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 590 public int checkPermission(String permission, int pid, int uid) { argument 596 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 597 return checkPermission(permission, pid, uid); 617 String permission, int pid, int uid, String message) { 647 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 653 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument 654 return checkUriPermission(uri, pid, uid, modeFlags); 669 String writePermission, int pid, int uid, int modeFlags) { 675 Uri uri, int pid, int uid, int modeFlags, String message) { 693 int pid, int uid, in 616 enforcePermission( String permission, int pid, int uid, String message) argument 668 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 674 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 691 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/nfc/cardemulation/ |
H A D | NfcFServiceInfo.java | 78 * The uid of the package the service belongs to 87 int uid) { 94 this.mUid = uid; 172 // Set uid 173 mUid = si.applicationInfo.uid; 285 int uid = source.readInt(); 287 systemCode, dynamicSystemCode, nfcid2, dynamicNfcid2, uid); 85 NfcFServiceInfo(ResolveInfo info, String description, String systemCode, String dynamicSystemCode, String nfcid2, String dynamicNfcid2, int uid) argument
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | PermissionMonitor.java | 124 int uid = app.applicationInfo != null ? app.applicationInfo.uid : -1; 125 if (uid < 0) { 133 Boolean permission = mApps.get(uid); 137 mApps.put(uid, hasRestrictedPermission);
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 530 boolean checkUser(int pid, int uid, Context context) { argument 531 return UserHandle.getUserId(uid) == context.getUserId() 533 || context.checkPermission(INTERACT_ACROSS_USERS, pid, uid) 561 final int uid = Binder.getCallingUid(); 565 if (UserHandle.isSameApp(uid, mMyUid)) { 569 if (mExported && checkUser(pid, uid, context)) { 611 final int callingUserId = UserHandle.getUserId(uid); 612 final Uri userUri = (mSingleUser && !UserHandle.isSameUser(mMyUid, uid)) 614 if (context.checkUriPermission(userUri, pid, uid, Intent.FLAG_GRANT_READ_URI_PERMISSION, 635 + ", uid [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | AlarmManagerService.java | 164 * For each uid, this is the last time we dispatched an "allow while idle" alarm, 170 int uid; field in class:AlarmManagerService.IdleDispatchEntry 353 public int uid; field in class:AlarmManagerService.WakeupEvent 358 uid = theUid; 503 boolean removeForStopped(final int uid) { argument 511 if (alarm.uid == uid && ActivityManager.getService().isAppStartModeDisabled( 512 uid, alarm.packageName)) { 802 ent.uid = 0; 844 WorkSource workSource, int uid, Strin 843 InFlight(AlarmManagerService service, PendingIntent pendingIntent, IAlarmListener listener, WorkSource workSource, int uid, String alarmPkg, int alarmType, String tag, long nowELAPSED) argument 919 BroadcastStats(int uid, String packageName) argument 1985 removeForStoppedLocked(int uid) argument 2284 public final int uid; field in class:AlarmManagerService.Alarm 2858 onUidStateChanged(int uid, int procState, long procStateSeq) argument 2862 onUidGone(int uid, boolean disabled) argument 2870 onUidActive(int uid) argument 2873 onUidIdle(int uid, boolean disabled) argument 2888 getStatsLocked(int uid, String pkgName) argument [all...] |
H A D | ConnectivityService.java | 913 private NetworkState getFilteredNetworkState(int networkType, int uid, boolean ignoreBlocked) { argument 928 filterNetworkStateForUid(state, uid, ignoreBlocked); 944 private Network[] getVpnUnderlyingNetworks(int uid) { argument 946 int user = UserHandle.getUserId(uid); 949 if (vpn != null && vpn.appliesToUid(uid)) { 957 private NetworkState getUnfilteredActiveNetworkState(int uid) { argument 960 final Network[] networks = getVpnUnderlyingNetworks(uid); 984 private boolean isNetworkWithLinkPropertiesBlocked(LinkProperties lp, int uid, argument 992 if (isSystem(uid)) { 996 final Vpn vpn = mVpns.get(UserHandle.getUserId(uid)); 1005 maybeLogBlockedNetworkInfo(NetworkInfo ni, int uid) argument 1033 filterNetworkStateForUid(NetworkState state, int uid, boolean ignoreBlocked) argument 1077 getActiveNetworkForUid(int uid, boolean ignoreBlocked) argument 1082 getActiveNetworkForUidInternal(final int uid, boolean ignoreBlocked) argument 1113 getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) argument 1139 getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) argument 1424 addLegacyRouteToHost(LinkProperties lp, InetAddress addr, int netId, int uid) argument 4107 isSystem(int uid) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | IConnectivityManager.aidl | 47 Network getActiveNetworkForUid(int uid, boolean ignoreBlocked); 49 NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked); 51 NetworkInfo getNetworkInfoForUid(in Network network, int uid, boolean ignoreBlocked);
|
/frameworks/base/core/java/android/os/storage/ |
H A D | IStorageManager.aidl | 187 StorageVolume[] getVolumeList(int uid, in String packageName, int flags) = 29; 294 long getCacheQuotaBytes(String volumeUuid, int uid) = 75; 295 long getCacheSizeBytes(String volumeUuid, int uid) = 76;
|
/frameworks/base/core/java/android/view/ |
H A D | Display.java | 1001 public boolean hasAccess(int uid) { argument 1002 return Display.hasAccess(uid, mFlags, mOwnerUid); 1006 public static boolean hasAccess(int uid, int flags, int ownerUid) { argument 1008 || uid == ownerUid 1009 || uid == Process.SYSTEM_UID 1010 || uid == 0;
|
/frameworks/base/tests/net/java/com/android/server/connectivity/ |
H A D | VpnTest.java | 289 for (int uid : uids) { 290 assertTrue("Uid " + uid + " should be blocked", vpn.isBlockingUid(uid)); 295 for (int uid : uids) { 296 assertFalse("Uid " + uid + " should not be blocked", vpn.isBlockingUid(uid));
|
/frameworks/base/core/java/android/app/ |
H A D | ContextImpl.java | 1660 public int checkPermission(String permission, int pid, int uid) { argument 1670 final int appId = UserHandle.getAppId(uid); 1672 Slog.w(TAG, "Missing ActivityManager; assuming " + uid + " holds " + permission); 1678 return am.checkPermission(permission, pid, uid); 1686 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1693 permission, pid, uid, callerToken); 1733 boolean selfToo, int uid, String message) { 1738 ? "Neither user " + uid + " nor current process has " 1739 : "uid " + uid 1731 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1746 enforcePermission( String permission, int pid, int uid, String message) argument 1808 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 1820 checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) argument 1851 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1899 enforceForUri( int modeFlags, int resultOfCheck, boolean selfToo, int uid, Uri uri, String message) argument 1916 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1942 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | NotificationManagerService.java | 480 private boolean checkNotificationOp(String pkg, int uid) { argument 481 return mAppOps.checkOp(AppOpsManager.OP_POST_NOTIFICATION, uid, pkg) 482 == AppOpsManager.MODE_ALLOWED && !isPackageSuspendedForUser(pkg, uid); 639 int uid, int initialPid, String message, int userId) { 641 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 646 ActivityManager.getService().crashApplication(uid, initialPid, pkg, -1, 1305 private void updateNotificationChannelInt(String pkg, int uid, NotificationChannel channel, argument 1313 mRankingHelper.updateNotificationChannel(pkg, uid, channel); 1316 mRankingHelper.getNotificationChannel(pkg, uid, channe 4752 isUidSystemOrPhone(int uid) argument 4930 isPackageSuspendedForUser(String pkg, int uid) argument [all...] |
/frameworks/av/services/audioflinger/ |
H A D | TrackBase.h | 65 uid_t uid, 79 uid_t uid() const { return mUid; } function in class:TrackBase
|