/packages/apps/Nfc/src/com/android/nfc/ |
ForegroundUtils.java | 35 // We need to keep track of the individual PIDs per UID, 36 // since a single UID may have multiple processes running 58 void onUidToBackground(int uid); 66 * Checks whether the specified UID has any activities running in the foreground, 67 * and if it does, registers a callback for when that UID no longer has any foreground 72 * @param uid The UID to be checked 73 * @return true when the UID has an Activity in the foreground and the callback 76 public boolean registerUidToBackgroundCallback(Callback callback, int uid) { 78 if (!isInForegroundLocked(uid)) { [all...] |
/frameworks/base/core/java/com/android/server/ |
NetworkManagementSocketTagger.java | 61 public static void setThreadSocketStatsUid(int uid) { 62 threadSocketTags.get().statsUid = uid; 76 private void tagSocketFd(FileDescriptor fd, int tag, int uid) { 77 if (tag == -1 && uid == -1) return; 80 final int errno = native_tagSocketFd(fd, tag, uid); 84 + uid + ") failed with errno" + errno); 114 public static void setKernelCounterSet(int uid, int counterSet) { 116 final int errno = native_setCounterSet(counterSet, uid); 118 Log.w(TAG, "setKernelCountSet(" + uid + ", " + counterSet + ") failed with errno " 124 public static void resetKernelUidStats(int uid) { [all...] |
/frameworks/native/libs/binder/ |
PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 42 e.uid = uid; 52 uid_t uid, bool granted) { 64 e.uid = uid; 85 uid_t uid = ipcState->getCallingUid(); local 87 if (outUid) *outUid = uid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { [all...] |
/external/chromium_org/remoting/host/installer/mac/Scripts/ |
remoting_preflight.sh | 26 ps -eo uid,command | awk -v script="$SCRIPT_FILE" ' 53 for uid in $(find_users_with_active_hosts); do 54 if [[ -n "$uid" ]]; then 55 echo "$uid" >> "$USERS_TMP_FILE" 56 if [[ "$uid" = "0" ]]; then 61 pid="$(find_login_window_for_user "$uid")" 63 launchctl bsexec "$pid" sudo -u "#$uid" launchctl stop "$SERVICE_NAME" 64 launchctl bsexec "$pid" sudo -u "#$uid" launchctl unload -w -S \
|
/frameworks/base/core/java/android/net/ |
INetworkPolicyListener.aidl | 22 void onUidRulesChanged(int uid, int uidRules);
|
/packages/providers/TelephonyProvider/src/com/android/providers/telephony/ |
ProviderUtil.java | 32 * Get space separated package names associated with a UID 35 * @param uid The UID to look up 36 * @return The space separated list of package names for UID 38 public static String getPackageNamesByUid(Context context, int uid) { 40 final String[] packageNames = pm.getPackagesForUid(uid); 60 * @param uid The caller UID of the insertion 63 public static boolean shouldSetCreator(ContentValues values, int uid) { 64 return (uid != Process.SYSTEM_UID && uid != Process.PHONE_UID) | [all...] |
/system/core/include/cutils/ |
multiuser.h | 33 extern userid_t multiuser_get_user_id(uid_t uid); 34 extern appid_t multiuser_get_app_id(uid_t uid);
|
/system/core/run-as/ |
package.h | 30 uid_t uid; member in struct:__anon84517 40 extern int check_data_path(const char* dataDir, uid_t uid);
|
run-as.c | 46 * until the uid/gid has been dropped to that of a normal user 111 int myuid, uid, gid; local 132 if (info.uid < AID_APP) { 144 if (check_data_path(info.dataDir, info.uid) < 0) { 152 uid = gid = info.uid; 153 if(setresgid(gid,gid,gid) || setresuid(uid,uid,uid)) { 158 if (selinux_android_setcontext(uid, 0, info.seinfo, pkgname) < 0) [all...] |
/frameworks/native/services/sensorservice/ |
BatteryService.cpp | 41 bool BatteryService::addSensor(uid_t uid, int handle) { 43 Info key(uid, handle); 53 bool BatteryService::removeSensor(uid_t uid, int handle) { 55 ssize_t index = mActivations.indexOf(Info(uid, handle)); 63 void BatteryService::enableSensorImpl(uid_t uid, int handle) { 65 if (addSensor(uid, handle)) { 67 mBatteryStatService->noteStartSensor(uid, handle); 72 void BatteryService::disableSensorImpl(uid_t uid, int handle) { 74 if (removeSensor(uid, handle)) { 76 mBatteryStatService->noteStopSensor(uid, handle) [all...] |
/frameworks/base/media/java/android/media/ |
AudioManagerInternal.java | 33 String callingPackage, int uid); 36 String callingPackage, int uid); 39 String callingPackage, int uid); 42 int uid); 45 IBinder cb, int uid);
|
/system/core/toolbox/ |
pwcache.c | 34 int uid_from_user(const char* name, uid_t* uid) { 39 *uid = pw->pw_uid; 53 char* user_from_uid(uid_t uid, int noname) { 54 struct passwd* pw = getpwuid(uid); 57 snprintf(buf, sizeof(buf), "%lu", (long) uid);
|
/external/compiler-rt/lib/tsan/rtl/ |
tsan_sync.h | 33 u64 uid; // Globally unique id. member in struct:__tsan::SyncVar 49 void Init(ThreadState *thr, uptr pc, uptr addr, u64 uid); 53 // 47 lsb is addr, then 14 bits is low part of uid, then 3 zero bits. 54 return GetLsb((u64)addr | (uid << 47), 61); 56 bool CheckId(u64 uid) const { 57 CHECK_EQ(uid, GetLsb(uid, 14)); 58 return GetLsb(this->uid, 14) == uid; 60 static uptr SplitId(u64 id, u64 *uid) { [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
thread_map.h | 14 struct thread_map *thread_map__new_by_uid(uid_t uid); 15 struct thread_map *thread_map__new(pid_t pid, pid_t tid, uid_t uid); 18 const char *tid, uid_t uid);
|
/external/qemu/distrib/libselinux/include/selinux/ |
android.h | 22 extern int selinux_android_setcontext(uid_t uid, 30 uid_t uid); 41 uid_t uid,
|
/system/core/libcutils/ |
sockets.c | 40 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { 41 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
|
/system/extras/su/ |
su.c | 35 void pwtoid(const char *tok, uid_t *uid, gid_t *gid) 40 if (uid) *uid = pw->pw_uid; 44 if (uid) *uid = tmpid; 49 void extract_uidgids(const char *uidgids, uid_t *uid, gid_t *gid, gid_t *gids, 58 *gid = *uid = 0; 66 pwtoid(tok, uid, gid); 89 * SU can be given a specific command to exec. UID _must_ be 96 * su [uid[,gid[,group1]...] [cmd] 105 uid_t uid, myuid; local [all...] |
/system/netd/server/ |
NetworkController.h | 36 * Keeps track of default, per-pid, and per-uid-range network selection, as 55 uint32_t getNetworkForDns(unsigned* netId, uid_t uid) const; 56 unsigned getNetworkForUser(uid_t uid) const; 57 unsigned getNetworkForConnect(uid_t uid) const; 68 Permission getPermissionForUser(uid_t uid) const; 70 int checkUserNetworkAccess(uid_t uid, unsigned netId) const; 83 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 85 const char* nexthop, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 87 bool canProtect(uid_t uid) const; 94 VirtualNetwork* getVirtualNetworkForUserLocked(uid_t uid) const [all...] |
/frameworks/base/core/java/android/app/ |
AppImportanceMonitor.java | 39 final int uid; field in class:AppImportanceMonitor.AppEntry 44 uid = _uid; 50 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) { 54 public void onProcessStateChanged(int pid, int uid, int procState) { 56 updateImportanceLocked(pid, uid, 63 public void onProcessDied(int pid, int uid) { 65 updateImportanceLocked(pid, uid, 98 updateImportanceLocked(app.uid, app.pid, app.importance, false); 103 public int getImportance(int uid) { 104 AppEntry ent = mApps.get(uid); [all...] |
ActivityManagerInternal.java | 29 String processName, String abiOverride, int uid, Runnable crashHandler);
|
/system/core/libprocessgroup/ |
processgroup.cpp | 46 static int convertUidToPath(char *path, size_t size, uid_t uid) 51 uid); 54 static int convertUidPidToPath(char *path, size_t size, uid_t uid, int pid) 59 uid, 64 static int initCtx(uid_t uid, int pid, struct ctx *ctx) 68 convertUidPidToPath(path, sizeof(path), uid, pid); 110 static pid_t getOneAppProcess(uid_t uid, int appProcessPid, struct ctx *ctx) 113 int ret = initCtx(uid, appProcessPid, ctx); 147 static int removeProcessGroup(uid_t uid, int pid) 152 convertUidPidToPath(path, sizeof(path), uid, pid) 163 DIR *uid = opendir(uid_path); local [all...] |
/development/ndk/platforms/android-3/arch-arm/include/asm/ |
ipcbuf.h | 18 __kernel_uid32_t uid; member in struct:ipc64_perm
|
/development/ndk/platforms/android-9/arch-mips/include/asm/ |
ipcbuf.h | 25 __kernel_uid_t uid; member in struct:ipc64_perm
|
/development/ndk/platforms/android-9/arch-x86/include/asm/ |
ipcbuf.h | 25 __kernel_uid32_t uid; member in struct:ipc64_perm
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
IKeyChainServiceTestSupport.aidl | 37 void revokeAppPermission(int uid, String alias); 38 void grantAppPermission(int uid, String alias);
|