/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 44 uid_t uid; member in struct:android::PermissionCache::Entry 47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid); 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 74 pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 44 uid_t uid; member in struct:android::PermissionCache::Entry 47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid); 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 74 pid_t pid, uid_t uid);
|
/frameworks/native/services/inputflinger/host/ |
H A D | InputFlinger.cpp | 52 const int uid = ipc->getCallingUid(); local 53 if ((uid != AID_SHELL) 54 && !PermissionCache::checkPermission(sDumpPermission, pid, uid)) { 56 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
|
/frameworks/native/services/nativeperms/ |
H A D | nativeperms.cpp | 38 const ::android::String16& permission, int32_t pid, int32_t uid, 42 (void)uid; 48 int32_t uid, ::std::vector<::android::String16>* _aidl_return) { 49 (void)uid; 37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument 47 getPackagesForUid( int32_t uid, ::std::vector<::android::String16>* _aidl_return) argument
|
/frameworks/native/services/sensorservice/ |
H A D | BatteryService.cpp | 36 bool BatteryService::addSensor(uid_t uid, int handle) { argument 38 Info key(uid, handle); 48 bool BatteryService::removeSensor(uid_t uid, int handle) { argument 50 ssize_t index = mActivations.indexOf(Info(uid, handle)); 58 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument 60 if (addSensor(uid, handle)) { 62 mBatteryStatService->noteStartSensor(uid, handle); 67 void BatteryService::disableSensorImpl(uid_t uid, int handle) { argument 69 if (removeSensor(uid, handle)) { 71 mBatteryStatService->noteStopSensor(uid, handl 77 cleanupImpl(uid_t uid) argument [all...] |
H A D | BatteryService.h | 33 void enableSensorImpl(uid_t uid, int handle); 34 void disableSensorImpl(uid_t uid, int handle); 35 void cleanupImpl(uid_t uid); 38 uid_t uid; member in struct:android::BatteryService::Info 41 Info() : uid(0), handle(0), count(0) { } 42 Info(uid_t uid, int handle) : uid(uid), handle(handle), count(0) { } argument 44 return (uid == rhs.uid) 55 enableSensor(uid_t uid, int handle) argument 58 disableSensor(uid_t uid, int handle) argument 61 cleanup(uid_t uid) argument [all...] |
/frameworks/av/services/audioflinger/ |
H A D | ServiceUtilities.cpp | 41 bool isTrustedCallingUid(uid_t uid) { argument 42 switch (uid) { 51 bool recordingAllowed(const String16& opPackageName, pid_t pid, uid_t uid) { argument 57 // We specify a pid and uid here as mediaserver (aka MediaRecorder or StageFrightRecorder) 60 const bool ok = checkPermission(sRecordAudio, pid, uid); 67 if (uid == AID_ROOT) return true; 89 permCtrl->getPackagesForUid(uid, packages); 99 if (appOps.noteOp(AppOpsManager::OP_RECORD_AUDIO, uid, checkedOpPackageName) 108 bool captureAudioOutputAllowed(pid_t pid, uid_t uid) { argument 111 bool ok = checkPermission(sCaptureAudioOutput, pid, uid); [all...] |
/frameworks/av/services/audiopolicy/common/managerdefinitions/src/ |
H A D | SessionRoute.cpp | 94 uid_t uid) 115 route = new SessionRoute(session, streamType, source, descriptor, uid); 90 addRoute(audio_session_t session, audio_stream_type_t streamType, audio_source_t source, const sp<DeviceDescriptor>& descriptor, uid_t uid) argument
|
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManagerInternal.java | 40 * @param uid The UID for which the grant changed 42 public void onAppPermissionChanged(Account account, int uid); argument 64 * @param uid The UID 67 public abstract boolean hasAccountAccess(@NonNull Account account, @IntRange(from = 0) int uid); argument
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManagerInternal.java | 71 * Checks if an app with given uid is an active device admin of its user and has the policy 76 * @param uid App uid. 78 * @return true if the uid is an active admin with the given policy. 80 public abstract boolean isActiveAdminWithPolicy(int uid, int reqPolicy); argument
|
/frameworks/base/core/java/android/os/ |
H A D | Vibrator.java | 187 public abstract void vibrate(int uid, String opPkg, argument
|
/frameworks/base/core/java/com/android/internal/os/ |
H A D | KernelUidCpuTimeReader.java | 33 * uid: user_time_micro_seconds system_time_micro_seconds power_in_milli-amp-micro_seconds 50 * @param uid UID of the app 54 void onUidCpuTime(int uid, long userTimeUs, long systemTimeUs); argument 75 final int uid = Integer.parseInt(uidStr.substring(0, uidStr.length() - 1), 10); 83 int index = mLastUserTimeUs.indexOfKey(uid); 91 sb.append(uid).append("!\n"); 116 callback.onUidCpuTime(uid, userTimeDeltaUs, systemTimeDeltaUs); 119 mLastUserTimeUs.put(uid, userTimeUs); 120 mLastSystemTimeUs.put(uid, systemTimeUs); 130 * @param uid Th 132 removeUid(int uid) argument [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreKey.java | 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { argument 33 mUid = uid;
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/net/ |
H A D | UidDetailProvider.java | 78 public UidDetail getUidDetail(int uid, boolean blocking) { argument 82 detail = mUidDetailCache.get(uid); 91 detail = buildUidDetail(uid); 94 mUidDetailCache.put(uid, detail); 104 private UidDetail buildUidDetail(int uid) { argument 109 detail.label = pm.getNameForUid(uid); 113 switch (uid) { 135 if (isKeyForUser(uid)) { 136 final int userHandle = getUserIdForKey(uid); 146 final String[] packageNames = pm.getPackagesForUid(uid); [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsAccess.java | 145 public static boolean isAccessibleToUser(int uid, int callerUid, argument 149 // Device-level access - can access usage for any uid. 155 return uid == android.os.Process.SYSTEM_UID || uid == UID_REMOVED 156 || uid == UID_TETHERING || uid == UID_ALL 157 || UserHandle.getUserId(uid) == UserHandle.getUserId(callerUid); 161 return uid == android.os.Process.SYSTEM_UID || uid == UID_REMOVED 162 || uid [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/storage/ |
H A D | CacheQuotaStrategyTest.java | 70 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 86 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 87 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n" 103 + "<quota uid=\"0\" bytes=\"100\" />\n" 104 + "<quota uid=\"10\" bytes=\"250\" />\n" 112 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n" 113 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n" 124 private CacheQuotaHint buildCacheQuotaHint(String volumeUuid, int uid, long quota) { argument 126 .setVolumeUuid(volumeUuid).setUid(uid).setQuota(quota).build();
|
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 45 data.writeInt32(uid); 52 virtual void getPackagesForUid(const uid_t uid, Vector<String16>& packages) argument 56 data.writeInt32(uid); 95 int32_t uid = data.readInt32(); local 96 bool res = checkPermission(permission, pid, uid); 104 int32_t uid = data.readInt32(); local 106 getPackagesForUid(uid, packages);
|
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 51 cache(const String16& permission, uid_t uid, bool granted) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/native/services/vr/hardware_composer/ |
H A D | vr_composer.cpp | 13 const uid_t uid = ipc->getCallingUid(); local 15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid); 17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/ |
H A D | WifiPermissionsWrapper.java | 48 * @param uid Calling Uid 51 public int getCallingUserId(int uid) { argument 52 return UserHandle.getUserId(uid); 76 public int getUidPermission(String permissionType, int uid) { argument 77 return ActivityManager.checkUidPermission(permissionType, uid); 90 * @param uid to check the permission for 94 public int getOverrideWifiConfigPermission(int uid) throws RemoteException { argument 96 android.Manifest.permission.OVERRIDE_WIFI_CONFIG, uid);
|
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | AppOpsManagerCompat.java | 70 * in both the uid and name of the application to be checked; this function will verify 76 * @param uid The user id of the application attempting to perform the operation. 83 public static int noteOp(@NonNull Context context, @NonNull String op, int uid, argument 87 return appOpsManager.noteOp(op, uid, packageName); 97 * the IPC state; this function will verify that the calling uid and proxied
|
/frameworks/support/core-utils/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 86 * @param uid The uid for which to check. 93 int pid, int uid, String packageName) { 94 if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) { 104 String[] packageNames = context.getPackageManager().getPackagesForUid(uid); 92 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
|
/frameworks/av/media/libstagefright/ |
H A D | HTTPBase.cpp | 118 void HTTPBase::RegisterSocketUserTag(int sockfd, uid_t uid, uint32_t kTag) { argument 119 int res = qtaguid_tagSocket(sockfd, kTag, uid); 121 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid()); 134 void HTTPBase::RegisterSocketUserMark(int sockfd, uid_t uid) { argument 135 setNetworkForUser(uid, sockfd);
|
/frameworks/av/media/utils/ |
H A D | BatteryNotifier.cpp | 41 void BatteryNotifier::noteStartVideo(uid_t uid) { argument 44 if (mVideoRefCounts[uid] == 0 && batteryService != nullptr) { 45 batteryService->noteStartVideo(uid); 47 mVideoRefCounts[uid]++; 50 void BatteryNotifier::noteStopVideo(uid_t uid) { argument 52 if (mVideoRefCounts.find(uid) == mVideoRefCounts.end()) { 53 ALOGW("%s: video refcount is broken for uid(%d).", __FUNCTION__, (int)uid); 59 mVideoRefCounts[uid]--; 60 if (mVideoRefCounts[uid] 77 noteStartAudio(uid_t uid) argument 86 noteStopAudio(uid_t uid) argument 113 noteFlashlightOn(const String8& id, uid_t uid) argument 126 noteFlashlightOff(const String8& id, uid_t uid) argument 148 noteStartCamera(const String8& id, uid_t uid) argument 160 noteStopCamera(const String8& id, uid_t uid) argument [all...] |
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/ |
H A D | AudioSession.h | 40 uid_t uid, 53 uid_t uid() const { return mUid; } function in class:android::AudioSession
|