Searched defs:uid (Results 26 - 50 of 329) sorted by relevance

1234567891011>>

/frameworks/native/include/binder/
H A DPermissionCache.h31 * PermissionCache caches permission checks for a given uid.
44 uid_t uid; member in struct:android::PermissionCache::Entry
47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid);
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
74 pid_t pid, uid_t uid);
/frameworks/native/libs/binder/include/binder/
H A DPermissionCache.h31 * PermissionCache caches permission checks for a given uid.
44 uid_t uid; member in struct:android::PermissionCache::Entry
47 return (uid == e.uid) ? (name < e.name) : (uid < e.uid);
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
74 pid_t pid, uid_t uid);
/frameworks/native/services/inputflinger/host/
H A DInputFlinger.cpp52 const int uid = ipc->getCallingUid(); local
53 if ((uid != AID_SHELL)
54 && !PermissionCache::checkPermission(sDumpPermission, pid, uid)) {
56 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
/frameworks/native/services/nativeperms/
H A Dnativeperms.cpp38 const ::android::String16& permission, int32_t pid, int32_t uid,
42 (void)uid;
48 int32_t uid, ::std::vector<::android::String16>* _aidl_return) {
49 (void)uid;
37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument
47 getPackagesForUid( int32_t uid, ::std::vector<::android::String16>* _aidl_return) argument
/frameworks/native/services/sensorservice/
H A DBatteryService.cpp36 bool BatteryService::addSensor(uid_t uid, int handle) { argument
38 Info key(uid, handle);
48 bool BatteryService::removeSensor(uid_t uid, int handle) { argument
50 ssize_t index = mActivations.indexOf(Info(uid, handle));
58 void BatteryService::enableSensorImpl(uid_t uid, int handle) { argument
60 if (addSensor(uid, handle)) {
62 mBatteryStatService->noteStartSensor(uid, handle);
67 void BatteryService::disableSensorImpl(uid_t uid, int handle) { argument
69 if (removeSensor(uid, handle)) {
71 mBatteryStatService->noteStopSensor(uid, handl
77 cleanupImpl(uid_t uid) argument
[all...]
H A DBatteryService.h33 void enableSensorImpl(uid_t uid, int handle);
34 void disableSensorImpl(uid_t uid, int handle);
35 void cleanupImpl(uid_t uid);
38 uid_t uid; member in struct:android::BatteryService::Info
41 Info() : uid(0), handle(0), count(0) { }
42 Info(uid_t uid, int handle) : uid(uid), handle(handle), count(0) { } argument
44 return (uid == rhs.uid)
55 enableSensor(uid_t uid, int handle) argument
58 disableSensor(uid_t uid, int handle) argument
61 cleanup(uid_t uid) argument
[all...]
/frameworks/av/services/audioflinger/
H A DServiceUtilities.cpp41 bool isTrustedCallingUid(uid_t uid) { argument
42 switch (uid) {
51 bool recordingAllowed(const String16& opPackageName, pid_t pid, uid_t uid) { argument
57 // We specify a pid and uid here as mediaserver (aka MediaRecorder or StageFrightRecorder)
60 const bool ok = checkPermission(sRecordAudio, pid, uid);
67 if (uid == AID_ROOT) return true;
89 permCtrl->getPackagesForUid(uid, packages);
99 if (appOps.noteOp(AppOpsManager::OP_RECORD_AUDIO, uid, checkedOpPackageName)
108 bool captureAudioOutputAllowed(pid_t pid, uid_t uid) { argument
111 bool ok = checkPermission(sCaptureAudioOutput, pid, uid);
[all...]
/frameworks/av/services/audiopolicy/common/managerdefinitions/src/
H A DSessionRoute.cpp94 uid_t uid)
115 route = new SessionRoute(session, streamType, source, descriptor, uid);
90 addRoute(audio_session_t session, audio_stream_type_t streamType, audio_source_t source, const sp<DeviceDescriptor>& descriptor, uid_t uid) argument
/frameworks/base/core/java/android/accounts/
H A DAccountManagerInternal.java40 * @param uid The UID for which the grant changed
42 public void onAppPermissionChanged(Account account, int uid); argument
64 * @param uid The UID
67 public abstract boolean hasAccountAccess(@NonNull Account account, @IntRange(from = 0) int uid); argument
/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManagerInternal.java71 * Checks if an app with given uid is an active device admin of its user and has the policy
76 * @param uid App uid.
78 * @return true if the uid is an active admin with the given policy.
80 public abstract boolean isActiveAdminWithPolicy(int uid, int reqPolicy); argument
/frameworks/base/core/java/android/os/
H A DVibrator.java187 public abstract void vibrate(int uid, String opPkg, argument
/frameworks/base/core/java/com/android/internal/os/
H A DKernelUidCpuTimeReader.java33 * uid: user_time_micro_seconds system_time_micro_seconds power_in_milli-amp-micro_seconds
50 * @param uid UID of the app
54 void onUidCpuTime(int uid, long userTimeUs, long systemTimeUs); argument
75 final int uid = Integer.parseInt(uidStr.substring(0, uidStr.length() - 1), 10);
83 int index = mLastUserTimeUs.indexOfKey(uid);
91 sb.append(uid).append("!\n");
116 callback.onUidCpuTime(uid, userTimeDeltaUs, systemTimeDeltaUs);
119 mLastUserTimeUs.put(uid, userTimeUs);
120 mLastSystemTimeUs.put(uid, systemTimeUs);
130 * @param uid Th
132 removeUid(int uid) argument
[all...]
/frameworks/base/keystore/java/android/security/keystore/
H A DAndroidKeyStoreKey.java31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { argument
33 mUid = uid;
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/net/
H A DUidDetailProvider.java78 public UidDetail getUidDetail(int uid, boolean blocking) { argument
82 detail = mUidDetailCache.get(uid);
91 detail = buildUidDetail(uid);
94 mUidDetailCache.put(uid, detail);
104 private UidDetail buildUidDetail(int uid) { argument
109 detail.label = pm.getNameForUid(uid);
113 switch (uid) {
135 if (isKeyForUser(uid)) {
136 final int userHandle = getUserIdForKey(uid);
146 final String[] packageNames = pm.getPackagesForUid(uid);
[all...]
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkStatsAccess.java145 public static boolean isAccessibleToUser(int uid, int callerUid, argument
149 // Device-level access - can access usage for any uid.
155 return uid == android.os.Process.SYSTEM_UID || uid == UID_REMOVED
156 || uid == UID_TETHERING || uid == UID_ALL
157 || UserHandle.getUserId(uid) == UserHandle.getUserId(callerUid);
161 return uid == android.os.Process.SYSTEM_UID || uid == UID_REMOVED
162 || uid
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/storage/
H A DCacheQuotaStrategyTest.java70 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
86 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
87 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n"
103 + "<quota uid=\"0\" bytes=\"100\" />\n"
104 + "<quota uid=\"10\" bytes=\"250\" />\n"
112 + "<quota uuid=\"uuid\" uid=\"0\" bytes=\"100\" />\n"
113 + "<quota uuid=\"uuid2\" uid=\"10\" bytes=\"250\" />\n"
124 private CacheQuotaHint buildCacheQuotaHint(String volumeUuid, int uid, long quota) { argument
126 .setVolumeUuid(volumeUuid).setUid(uid).setQuota(quota).build();
/frameworks/native/libs/binder/
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
45 data.writeInt32(uid);
52 virtual void getPackagesForUid(const uid_t uid, Vector<String16>& packages) argument
56 data.writeInt32(uid);
95 int32_t uid = data.readInt32(); local
96 bool res = checkPermission(permission, pid, uid);
104 int32_t uid = data.readInt32(); local
106 getPackagesForUid(uid, packages);
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
42 e.uid = uid;
52 uid_t uid, bool granted) {
64 e.uid = uid;
85 uid_t uid = ipcState->getCallingUid(); local
87 if (outUid) *outUid = uid;
88 return PermissionCache::checkPermission(permission, pid, uid);
92 const String16& permission, pid_t pid, uid_t uid) {
51 cache(const String16& permission, uid_t uid, bool granted) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/native/services/vr/hardware_composer/
H A Dvr_composer.cpp13 const uid_t uid = ipc->getCallingUid(); local
15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid);
17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/
H A DWifiPermissionsWrapper.java48 * @param uid Calling Uid
51 public int getCallingUserId(int uid) { argument
52 return UserHandle.getUserId(uid);
76 public int getUidPermission(String permissionType, int uid) { argument
77 return ActivityManager.checkUidPermission(permissionType, uid);
90 * @param uid to check the permission for
94 public int getOverrideWifiConfigPermission(int uid) throws RemoteException { argument
96 android.Manifest.permission.OVERRIDE_WIFI_CONFIG, uid);
/frameworks/support/compat/java/android/support/v4/app/
H A DAppOpsManagerCompat.java70 * in both the uid and name of the application to be checked; this function will verify
76 * @param uid The user id of the application attempting to perform the operation.
83 public static int noteOp(@NonNull Context context, @NonNull String op, int uid, argument
87 return appOpsManager.noteOp(op, uid, packageName);
97 * the IPC state; this function will verify that the calling uid and proxied
/frameworks/support/core-utils/java/android/support/v4/content/
H A DPermissionChecker.java86 * @param uid The uid for which to check.
93 int pid, int uid, String packageName) {
94 if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) {
104 String[] packageNames = context.getPackageManager().getPackagesForUid(uid);
92 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
/frameworks/av/media/libstagefright/
H A DHTTPBase.cpp118 void HTTPBase::RegisterSocketUserTag(int sockfd, uid_t uid, uint32_t kTag) { argument
119 int res = qtaguid_tagSocket(sockfd, kTag, uid);
121 ALOGE("Failed tagging socket %d for uid %d (My UID=%d)", sockfd, uid, geteuid());
134 void HTTPBase::RegisterSocketUserMark(int sockfd, uid_t uid) { argument
135 setNetworkForUser(uid, sockfd);
/frameworks/av/media/utils/
H A DBatteryNotifier.cpp41 void BatteryNotifier::noteStartVideo(uid_t uid) { argument
44 if (mVideoRefCounts[uid] == 0 && batteryService != nullptr) {
45 batteryService->noteStartVideo(uid);
47 mVideoRefCounts[uid]++;
50 void BatteryNotifier::noteStopVideo(uid_t uid) { argument
52 if (mVideoRefCounts.find(uid) == mVideoRefCounts.end()) {
53 ALOGW("%s: video refcount is broken for uid(%d).", __FUNCTION__, (int)uid);
59 mVideoRefCounts[uid]--;
60 if (mVideoRefCounts[uid]
77 noteStartAudio(uid_t uid) argument
86 noteStopAudio(uid_t uid) argument
113 noteFlashlightOn(const String8& id, uid_t uid) argument
126 noteFlashlightOff(const String8& id, uid_t uid) argument
148 noteStartCamera(const String8& id, uid_t uid) argument
160 noteStopCamera(const String8& id, uid_t uid) argument
[all...]
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/
H A DAudioSession.h40 uid_t uid,
53 uid_t uid() const { return mUid; } function in class:android::AudioSession

Completed in 372 milliseconds

1234567891011>>