/frameworks/base/services/java/com/android/server/display/ |
H A D | DisplayManagerService.java | 1148 pw.println("Permission Denial: can't dump DisplayManager from from pid=" 1308 public CallbackRecord(int pid, IDisplayManagerCallback callback) { argument 1309 mPid = pid; 1316 Slog.d(TAG, "Display listener for pid " + mPid + " died.");
|
/frameworks/base/services/java/com/android/server/wifi/ |
H A D | WifiService.java | 374 final int pid; field in class:WifiService.BatchedScanRequest 381 this.pid = getCallingPid(); 385 stopBatchedScan(settings, uid, pid); 391 public boolean isSameApp(int uid, int pid) { argument 392 return (this.uid == uid && this.pid == pid); 460 private void stopBatchedScan(BatchedScanSettings settings, int uid, int pid) { argument 464 if (r.isSameApp(uid, pid) && (settings == null || settings.equals(r.settings))) { 593 Slog.d(TAG, "setWifiEnabled: " + enable + " pid=" + Binder.getCallingPid() 1193 pw.println("Permission Denial: can't dump WifiService from from pid 1322 enforceWakeSourcePermission(int uid, int pid) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 462 public int checkPermission(String permission, int pid, int uid) { argument 478 String permission, int pid, int uid, String message) { 503 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 519 String writePermission, int pid, int uid, int modeFlags) { 525 Uri uri, int pid, int uid, int modeFlags, String message) { 543 int pid, int uid, int modeFlags, String message) { 477 enforcePermission( String permission, int pid, int uid, String message) argument 518 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 524 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 541 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
|
/frameworks/native/cmds/installd/ |
H A D | commands.c | 621 static int wait_dexopt(pid_t pid, const char* apk_path) argument 630 got_pid = waitpid(pid, &status, 0); 637 if (got_pid != pid) { 639 (int) pid, (int) got_pid, strerror(errno)); 714 pid_t pid; local 715 pid = fork(); 716 if (pid == 0) { 750 res = wait_dexopt(pid, apk_path);
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MediaPlayerService.cpp | 233 pid_t pid = IPCThreadState::self()->getCallingPid(); local 234 sp<MediaRecorderClient> recorder = new MediaRecorderClient(this, pid); 238 ALOGV("Create new media recorder client from pid %d", pid); 251 pid_t pid = IPCThreadState::self()->getCallingPid(); local 252 sp<MetadataRetrieverClient> retriever = new MetadataRetrieverClient(pid); 253 ALOGV("Create new media retriever from pid %d", pid); 260 pid_t pid = IPCThreadState::self()->getCallingPid(); local 264 this, pid, connI 500 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument [all...] |
/frameworks/av/services/audioflinger/ |
H A D | Threads.h | 83 PrioConfigEvent(pid_t pid, pid_t tid, int32_t prio) : argument 84 ConfigEvent(CFG_EVENT_PRIO), mPid(pid), mTid(tid), mPrio(prio) {} 87 pid_t pid() const { return mPid; } function in class:ThreadBase::PrioConfigEvent 92 snprintf(buffer, size, "Prio event: pid %d, tid %d, prio %d\n", mPid, mTid, mPrio); 142 void sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio);
|
H A D | AudioFlinger.cpp | 262 snprintf(buffer, SIZE, " pid: %d\n", client->pid()); 269 snprintf(buffer, SIZE, " pid: %d\n", mNotificationClients.keyAt(i)); 274 result.append(" session pid count\n"); 305 "can't dump AudioFlinger from pid=%d, uid=%d\n", 391 sp<AudioFlinger::Client> AudioFlinger::registerPid_l(pid_t pid) argument 393 // If pid is already in the mClients wp<> map, then use that entry 395 sp<Client> client = mClients.valueFor(pid).promote(); 397 client = new Client(this, pid); 398 mClients.add(pid, clien 486 pid_t pid = IPCThreadState::self()->getCallingPid(); local 1065 pid_t pid = IPCThreadState::self()->getCallingPid(); local 1089 removeNotificationClient(pid_t pid) argument 1127 removeClient_l(pid_t pid) argument 1153 Client(const sp<AudioFlinger>& audioFlinger, pid_t pid) argument 1202 NotificationClient(const sp<AudioFlinger>& audioFlinger, const sp<IAudioFlingerClient>& client, pid_t pid) argument 1275 pid_t pid = IPCThreadState::self()->getCallingPid(); local 2091 pid_t pid = IPCThreadState::self()->getCallingPid(); local [all...] |
H A D | Threads.cpp | 361 void AudioFlinger::ThreadBase::sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio) argument 363 PrioConfigEvent *prioEvent = new PrioConfigEvent(pid, tid, prio); 365 ALOGV("sendPrioConfigEvent_l() num events %d pid %d, tid %d prio %d", 366 mConfigEvents.size(), pid, tid, prio); 384 int err = requestPriority(prioEvent->pid(), prioEvent->tid(), prioEvent->prio(), 387 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; " 389 prioEvent->prio(), prioEvent->pid(), prioEvent->tid(), err); 2560 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d", 2572 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d",
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 998 public int pid; field in class:ActivityManager.RunningServiceInfo 1102 dest.writeInt(pid); 1119 pid = source.readInt(); 1501 * The pid of this process; 0 if none 1503 public int pid; field in class:ActivityManager.ProcessErrorStateInfo 1549 dest.writeInt(pid); 1560 pid = source.readInt(); 1609 * The pid of this process; 0 if none 1611 public int pid; field in class:ActivityManager.RunningAppProcessInfo 1741 * content providers is being used by another process. The pid o [all...] |
H A D | ContextImpl.java | 1645 public int checkPermission(String permission, int pid, int uid) { argument 1652 permission, pid, uid); 1664 int pid = Binder.getCallingPid(); 1665 if (pid != Process.myPid()) { 1666 return checkPermission(permission, pid, Binder.getCallingUid()); 1696 String permission, int pid, int uid, String message) { 1698 checkPermission(permission, pid, uid), 1742 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 1745 uri, pid, uid, modeFlags); 1753 int pid 1695 enforcePermission( String permission, int pid, int uid, String message) argument 1768 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1823 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1846 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | ActivityManagerNative.java | 1078 int pid = data.readInt(); 1080 setProcessForeground(token, pid, isForeground); 1088 int pid = data.readInt(); 1090 int res = checkPermission(perm, pid, uid); 1099 int pid = data.readInt(); 1102 int res = checkUriPermission(uri, pid, uid, mode); 1957 int pid = data.readInt(); 1960 long res = inputDispatchingTimedOut(pid, aboveSystem, reason); 3392 public void setProcessForeground(IBinder token, int pid, argument 3398 data.writeInt(pid); 3405 checkPermission(String permission, int pid, int uid) argument 3435 checkUriPermission(Uri uri, int pid, int uid, int mode) argument 4555 inputDispatchingTimedOut(int pid, boolean aboveSystem, String reason) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | Context.java | 2462 * @param pid The process ID being checked against. Must be > 0. 2467 * pid/uid is allowed that permission, or 2473 public abstract int checkPermission(String permission, int pid, int uid); argument 2478 * {@link #checkPermission(String, int, int)} with the pid and uid returned 2489 * pid/uid is allowed that permission, or 2507 * pid/uid is allowed that permission, or 2521 * @param pid The process ID being checked against. Must be > 0. 2529 String permission, int pid, int uid, String message); 2536 * pid and uid returned by {@link android.os.Binder#getCallingPid} 2631 * @param pid Th 2528 enforcePermission( String permission, int pid, int uid, String message) argument 2644 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 2710 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2732 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2797 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | Debug.java | 1032 * Note: currently only works when the requested pid has the same UID 1036 public static native void getMemoryInfo(int pid, MemoryInfo memoryInfo); argument 1049 public static native long getPss(int pid, long[] outUss); argument 1580 public static native void dumpNativeBacktraceToFile(int pid, String file); argument
|
/frameworks/base/core/jni/ |
H A D | android_os_Debug.cpp | 163 * Any graphics memory reported in /proc/pid/smaps is not included here. 165 static int read_memtrack_memory(struct memtrack_proc* p, int pid, argument 168 int err = memtrack_proc_get(p, pid); 199 * Retrieves the graphics memory that is unaccounted for in /proc/pid/smaps. 201 static int read_memtrack_memory(int pid, struct graphics_memory_pss* graphics_mem) argument 213 int err = read_memtrack_memory(p, pid, graphics_mem); 411 static void load_maps(int pid, stats_t* stats) argument 416 sprintf(tmp, "/proc/%d/smaps", pid); 425 jint pid, jobject object) 430 load_maps(pid, stat 424 android_os_Debug_getDirtyPagesPid(JNIEnv *env, jobject clazz, jint pid, jobject object) argument 489 android_os_Debug_getPssPid(JNIEnv *env, jobject clazz, jint pid, jlongArray outUss) argument 889 android_os_Debug_dumpNativeBacktraceToFile(JNIEnv* env, jobject clazz, jint pid, jstring fileName) argument [all...] |
H A D | android_util_Binder.cpp | 945 static int getprocname(pid_t pid, char *buf, size_t len) { argument 949 sprintf(filename, "/proc/%d/cmdline", pid);
|
/frameworks/base/services/java/com/android/server/ |
H A D | LocationManagerService.java | 474 final int mPid; // pid of receiver 493 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument 502 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid); 504 mPid = pid; 889 * @param pid the PID 891 * @return resolution level allowed to the pid/uid pair 893 private int getAllowedResolutionLevel(int pid, int uid) { argument 895 pid, uid) == PackageManager.PERMISSION_GRANTED) { 898 pid, uid) == PackageManager.PERMISSION_GRANTED) { 1326 private Receiver getReceiverLocked(ILocationListener listener, int pid, in argument 1345 getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument 1411 checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument 1462 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument [all...] |
H A D | NetworkManagementService.java | 1683 public void setDnsInterfaceForPid(String iface, int pid) throws IllegalStateException { argument 1686 mConnector.execute("resolver", "setifaceforpid", iface, pid); 1689 "Error communicating with native deamon to set interface for pid" + iface, e); 1694 public void clearDnsInterfaceForPid(int pid) throws IllegalStateException { argument 1697 mConnector.execute("resolver", "clearifaceforpid", pid); 1700 "Error communicating with native deamon to clear interface for pid " + pid, e);
|
H A D | NotificationManagerService.java | 1002 final int pid; field in class:NotificationManagerService.ToastRecord 1007 ToastRecord(int pid, String pkg, ITransientNotification callback, int duration) argument 1009 this.pid = pid; 1120 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")"); 1520 keepProcessAliveLocked(record.pid); 1541 keepProcessAliveLocked(record.pid); 1585 private void keepProcessAliveLocked(int pid) argument 1587 int toastCount = 0; // toasts from this pid 1592 if (r.pid [all...] |
H A D | InputMethodManagerService.java | 212 return "SessionState{uid " + client.uid + " pid " + client.pid 234 final int pid; field in class:InputMethodManagerService.ClientState 244 + " pid " + pid + "}"; 252 pid = _pid; 253 binding = new InputBinding(null, inputContext.asBinder(), uid, pid); 905 + mSettings.getCurrentUserId() + ", calling pid = " + Binder.getCallingPid() 1002 IInputContext inputContext, int uid, int pid) { 1008 inputContext, uid, pid)); 1001 addClient(IInputMethodClient client, IInputContext inputContext, int uid, int pid) argument [all...] |
H A D | ConnectivityService.java | 1238 public boolean isSameUser(int pid, int uid, int networkType, String feature) { argument 1239 if ((mPid == pid) && (mUid == uid) && (mNetworkType == networkType) && 1332 // this gets used for per-pid dns when connected 1347 // add the pid-specific dns 1378 // this gets used for per-pid dns when connected 1404 int pid = getCallingPid(); 1412 if (x.isSameUser(pid, uid, networkType, feature)) { 1433 int pid = u.mPid; 1492 Integer currentPid = new Integer(pid); 1497 reassessPidDns(pid, tru 2729 reassessPidDns(int pid, boolean doBump) argument [all...] |
/frameworks/base/services/java/com/android/server/media/ |
H A D | MediaRouterService.java | 128 final int pid = Binder.getCallingPid(); 129 final int resolvedUserId = ActivityManager.handleIncomingUser(pid, uid, userId, 137 registerClientLocked(client, pid, packageName, resolvedUserId, trusted); 263 pw.println("Permission Denial: can't dump MediaRouterService from from pid=" 312 int pid, String packageName, int userId, boolean trusted) { 322 clientRecord = new ClientRecord(userRecord, client, pid, packageName, trusted); 507 int pid, String packageName, boolean trusted) { 510 mPid = pid; 540 return "Client " + mPackageName + " (pid " + mPid + ")"; 311 registerClientLocked(IMediaRouterClient client, int pid, String packageName, int userId, boolean trusted) argument 506 ClientRecord(UserRecord userRecord, IMediaRouterClient client, int pid, String packageName, boolean trusted) argument
|
/frameworks/base/services/java/com/android/server/input/ |
H A D | InputManagerService.java | 517 final int pid = Binder.getCallingPid(); 522 result = nativeInjectInputEvent(mPtr, event, pid, uid, mode, 529 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 535 Slog.w(TAG, "Input event injection from pid " + pid + " timed out."); 539 Slog.w(TAG, "Input event injection from pid " + pid + " failed."); 616 private void onInputDevicesChangedListenerDied(int pid) { argument 618 mInputDevicesChangedListeners.remove(pid); 1597 InputDevicesChangedListenerRecord(int pid, IInputDevicesChangedListener listener) argument [all...] |
/frameworks/base/services/java/com/android/server/power/ |
H A D | PowerManagerService.java | 608 final int pid = Binder.getCallingPid(); 611 acquireWakeLockInternal(lock, flags, tag, packageName, ws, uid, pid); 618 WorkSource ws, int uid, int pid) { 623 + ", tag=\"" + tag + "\", ws=" + ws + ", uid=" + uid + ", pid=" + pid); 630 if (!wakeLock.hasSameProperties(flags, tag, ws, uid, pid)) { 633 wakeLock.updateProperties(flags, tag, packageName, ws, uid, pid); 637 wakeLock = new WakeLock(lock, flags, tag, packageName, ws, uid, pid); 880 + " pid=" + Binder.getCallingPid() 2269 pw.println("Permission Denial: can't dump PowerManager from from pid 617 acquireWakeLockInternal(IBinder lock, int flags, String tag, String packageName, WorkSource ws, int uid, int pid) argument [all...] |
/frameworks/base/tools/aapt/ |
H A D | ResourceTable.cpp | 597 " pid=%s, bag=%s, id=%s: %s\n", 3860 int pid = Res_GETPACKAGE(resID)+1; local 3866 if (check->getAssignedId() == pid) {
|
/frameworks/native/services/surfaceflinger/ |
H A D | SurfaceFlinger.cpp | 2304 const int pid = ipc->getCallingPid(); local 2307 !PermissionCache::checkPermission(sDump, pid, uid)) { 2309 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid); 2637 const int pid = ipc->getCallingPid(); local 2640 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) { 2642 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid); 2651 const int pid = ipc->getCallingPid(); local 2654 !PermissionCache::checkPermission(sReadFramebuffer, pid, ui 2668 const int pid = ipc->getCallingPid(); local [all...] |