Searched defs:pid (Results 51 - 75 of 81) sorted by relevance

1234

/frameworks/base/services/java/com/android/server/display/
H A DDisplayManagerService.java1148 pw.println("Permission Denial: can't dump DisplayManager from from pid="
1308 public CallbackRecord(int pid, IDisplayManagerCallback callback) { argument
1309 mPid = pid;
1316 Slog.d(TAG, "Display listener for pid " + mPid + " died.");
/frameworks/base/services/java/com/android/server/wifi/
H A DWifiService.java374 final int pid; field in class:WifiService.BatchedScanRequest
381 this.pid = getCallingPid();
385 stopBatchedScan(settings, uid, pid);
391 public boolean isSameApp(int uid, int pid) { argument
392 return (this.uid == uid && this.pid == pid);
460 private void stopBatchedScan(BatchedScanSettings settings, int uid, int pid) { argument
464 if (r.isSameApp(uid, pid) && (settings == null || settings.equals(r.settings))) {
593 Slog.d(TAG, "setWifiEnabled: " + enable + " pid=" + Binder.getCallingPid()
1193 pw.println("Permission Denial: can't dump WifiService from from pid
1322 enforceWakeSourcePermission(int uid, int pid) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java462 public int checkPermission(String permission, int pid, int uid) { argument
478 String permission, int pid, int uid, String message) {
503 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
519 String writePermission, int pid, int uid, int modeFlags) {
525 Uri uri, int pid, int uid, int modeFlags, String message) {
543 int pid, int uid, int modeFlags, String message) {
477 enforcePermission( String permission, int pid, int uid, String message) argument
518 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
524 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
541 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
/frameworks/native/cmds/installd/
H A Dcommands.c621 static int wait_dexopt(pid_t pid, const char* apk_path) argument
630 got_pid = waitpid(pid, &status, 0);
637 if (got_pid != pid) {
639 (int) pid, (int) got_pid, strerror(errno));
714 pid_t pid; local
715 pid = fork();
716 if (pid == 0) {
750 res = wait_dexopt(pid, apk_path);
/frameworks/av/media/libmediaplayerservice/
H A DMediaPlayerService.cpp233 pid_t pid = IPCThreadState::self()->getCallingPid(); local
234 sp<MediaRecorderClient> recorder = new MediaRecorderClient(this, pid);
238 ALOGV("Create new media recorder client from pid %d", pid);
251 pid_t pid = IPCThreadState::self()->getCallingPid(); local
252 sp<MetadataRetrieverClient> retriever = new MetadataRetrieverClient(pid);
253 ALOGV("Create new media retriever from pid %d", pid);
260 pid_t pid = IPCThreadState::self()->getCallingPid(); local
264 this, pid, connI
500 Client( const sp<MediaPlayerService>& service, pid_t pid, int32_t connId, const sp<IMediaPlayerClient>& client, int audioSessionId, uid_t uid) argument
[all...]
/frameworks/av/services/audioflinger/
H A DThreads.h83 PrioConfigEvent(pid_t pid, pid_t tid, int32_t prio) : argument
84 ConfigEvent(CFG_EVENT_PRIO), mPid(pid), mTid(tid), mPrio(prio) {}
87 pid_t pid() const { return mPid; } function in class:ThreadBase::PrioConfigEvent
92 snprintf(buffer, size, "Prio event: pid %d, tid %d, prio %d\n", mPid, mTid, mPrio);
142 void sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio);
H A DAudioFlinger.cpp262 snprintf(buffer, SIZE, " pid: %d\n", client->pid());
269 snprintf(buffer, SIZE, " pid: %d\n", mNotificationClients.keyAt(i));
274 result.append(" session pid count\n");
305 "can't dump AudioFlinger from pid=%d, uid=%d\n",
391 sp<AudioFlinger::Client> AudioFlinger::registerPid_l(pid_t pid) argument
393 // If pid is already in the mClients wp<> map, then use that entry
395 sp<Client> client = mClients.valueFor(pid).promote();
397 client = new Client(this, pid);
398 mClients.add(pid, clien
486 pid_t pid = IPCThreadState::self()->getCallingPid(); local
1065 pid_t pid = IPCThreadState::self()->getCallingPid(); local
1089 removeNotificationClient(pid_t pid) argument
1127 removeClient_l(pid_t pid) argument
1153 Client(const sp<AudioFlinger>& audioFlinger, pid_t pid) argument
1202 NotificationClient(const sp<AudioFlinger>& audioFlinger, const sp<IAudioFlingerClient>& client, pid_t pid) argument
1275 pid_t pid = IPCThreadState::self()->getCallingPid(); local
2091 pid_t pid = IPCThreadState::self()->getCallingPid(); local
[all...]
H A DThreads.cpp361 void AudioFlinger::ThreadBase::sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio) argument
363 PrioConfigEvent *prioEvent = new PrioConfigEvent(pid, tid, prio);
365 ALOGV("sendPrioConfigEvent_l() num events %d pid %d, tid %d prio %d",
366 mConfigEvents.size(), pid, tid, prio);
384 int err = requestPriority(prioEvent->pid(), prioEvent->tid(), prioEvent->prio(),
387 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; "
389 prioEvent->prio(), prioEvent->pid(), prioEvent->tid(), err);
2560 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d",
2572 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d",
/frameworks/base/core/java/android/app/
H A DActivityManager.java998 public int pid; field in class:ActivityManager.RunningServiceInfo
1102 dest.writeInt(pid);
1119 pid = source.readInt();
1501 * The pid of this process; 0 if none
1503 public int pid; field in class:ActivityManager.ProcessErrorStateInfo
1549 dest.writeInt(pid);
1560 pid = source.readInt();
1609 * The pid of this process; 0 if none
1611 public int pid; field in class:ActivityManager.RunningAppProcessInfo
1741 * content providers is being used by another process. The pid o
[all...]
H A DContextImpl.java1645 public int checkPermission(String permission, int pid, int uid) { argument
1652 permission, pid, uid);
1664 int pid = Binder.getCallingPid();
1665 if (pid != Process.myPid()) {
1666 return checkPermission(permission, pid, Binder.getCallingUid());
1696 String permission, int pid, int uid, String message) {
1698 checkPermission(permission, pid, uid),
1742 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument
1745 uri, pid, uid, modeFlags);
1753 int pid
1695 enforcePermission( String permission, int pid, int uid, String message) argument
1768 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
1823 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
1846 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
H A DActivityManagerNative.java1078 int pid = data.readInt();
1080 setProcessForeground(token, pid, isForeground);
1088 int pid = data.readInt();
1090 int res = checkPermission(perm, pid, uid);
1099 int pid = data.readInt();
1102 int res = checkUriPermission(uri, pid, uid, mode);
1957 int pid = data.readInt();
1960 long res = inputDispatchingTimedOut(pid, aboveSystem, reason);
3392 public void setProcessForeground(IBinder token, int pid, argument
3398 data.writeInt(pid);
3405 checkPermission(String permission, int pid, int uid) argument
3435 checkUriPermission(Uri uri, int pid, int uid, int mode) argument
4555 inputDispatchingTimedOut(int pid, boolean aboveSystem, String reason) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContext.java2462 * @param pid The process ID being checked against. Must be > 0.
2467 * pid/uid is allowed that permission, or
2473 public abstract int checkPermission(String permission, int pid, int uid); argument
2478 * {@link #checkPermission(String, int, int)} with the pid and uid returned
2489 * pid/uid is allowed that permission, or
2507 * pid/uid is allowed that permission, or
2521 * @param pid The process ID being checked against. Must be &gt; 0.
2529 String permission, int pid, int uid, String message);
2536 * pid and uid returned by {@link android.os.Binder#getCallingPid}
2631 * @param pid Th
2528 enforcePermission( String permission, int pid, int uid, String message) argument
2644 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument
2710 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
2732 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument
2797 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
[all...]
/frameworks/base/core/java/android/os/
H A DDebug.java1032 * Note: currently only works when the requested pid has the same UID
1036 public static native void getMemoryInfo(int pid, MemoryInfo memoryInfo); argument
1049 public static native long getPss(int pid, long[] outUss); argument
1580 public static native void dumpNativeBacktraceToFile(int pid, String file); argument
/frameworks/base/core/jni/
H A Dandroid_os_Debug.cpp163 * Any graphics memory reported in /proc/pid/smaps is not included here.
165 static int read_memtrack_memory(struct memtrack_proc* p, int pid, argument
168 int err = memtrack_proc_get(p, pid);
199 * Retrieves the graphics memory that is unaccounted for in /proc/pid/smaps.
201 static int read_memtrack_memory(int pid, struct graphics_memory_pss* graphics_mem) argument
213 int err = read_memtrack_memory(p, pid, graphics_mem);
411 static void load_maps(int pid, stats_t* stats) argument
416 sprintf(tmp, "/proc/%d/smaps", pid);
425 jint pid, jobject object)
430 load_maps(pid, stat
424 android_os_Debug_getDirtyPagesPid(JNIEnv *env, jobject clazz, jint pid, jobject object) argument
489 android_os_Debug_getPssPid(JNIEnv *env, jobject clazz, jint pid, jlongArray outUss) argument
889 android_os_Debug_dumpNativeBacktraceToFile(JNIEnv* env, jobject clazz, jint pid, jstring fileName) argument
[all...]
H A Dandroid_util_Binder.cpp945 static int getprocname(pid_t pid, char *buf, size_t len) { argument
949 sprintf(filename, "/proc/%d/cmdline", pid);
/frameworks/base/services/java/com/android/server/
H A DLocationManagerService.java474 final int mPid; // pid of receiver
493 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument
502 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid);
504 mPid = pid;
889 * @param pid the PID
891 * @return resolution level allowed to the pid/uid pair
893 private int getAllowedResolutionLevel(int pid, int uid) { argument
895 pid, uid) == PackageManager.PERMISSION_GRANTED) {
898 pid, uid) == PackageManager.PERMISSION_GRANTED) {
1326 private Receiver getReceiverLocked(ILocationListener listener, int pid, in argument
1345 getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument
1411 checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument
1462 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument
[all...]
H A DNetworkManagementService.java1683 public void setDnsInterfaceForPid(String iface, int pid) throws IllegalStateException { argument
1686 mConnector.execute("resolver", "setifaceforpid", iface, pid);
1689 "Error communicating with native deamon to set interface for pid" + iface, e);
1694 public void clearDnsInterfaceForPid(int pid) throws IllegalStateException { argument
1697 mConnector.execute("resolver", "clearifaceforpid", pid);
1700 "Error communicating with native deamon to clear interface for pid " + pid, e);
H A DNotificationManagerService.java1002 final int pid; field in class:NotificationManagerService.ToastRecord
1007 ToastRecord(int pid, String pkg, ITransientNotification callback, int duration) argument
1009 this.pid = pid;
1120 + "; will crashApplication(uid=" + uid + ", pid=" + initialPid + ")");
1520 keepProcessAliveLocked(record.pid);
1541 keepProcessAliveLocked(record.pid);
1585 private void keepProcessAliveLocked(int pid) argument
1587 int toastCount = 0; // toasts from this pid
1592 if (r.pid
[all...]
H A DInputMethodManagerService.java212 return "SessionState{uid " + client.uid + " pid " + client.pid
234 final int pid; field in class:InputMethodManagerService.ClientState
244 + " pid " + pid + "}";
252 pid = _pid;
253 binding = new InputBinding(null, inputContext.asBinder(), uid, pid);
905 + mSettings.getCurrentUserId() + ", calling pid = " + Binder.getCallingPid()
1002 IInputContext inputContext, int uid, int pid) {
1008 inputContext, uid, pid));
1001 addClient(IInputMethodClient client, IInputContext inputContext, int uid, int pid) argument
[all...]
H A DConnectivityService.java1238 public boolean isSameUser(int pid, int uid, int networkType, String feature) { argument
1239 if ((mPid == pid) && (mUid == uid) && (mNetworkType == networkType) &&
1332 // this gets used for per-pid dns when connected
1347 // add the pid-specific dns
1378 // this gets used for per-pid dns when connected
1404 int pid = getCallingPid();
1412 if (x.isSameUser(pid, uid, networkType, feature)) {
1433 int pid = u.mPid;
1492 Integer currentPid = new Integer(pid);
1497 reassessPidDns(pid, tru
2729 reassessPidDns(int pid, boolean doBump) argument
[all...]
/frameworks/base/services/java/com/android/server/media/
H A DMediaRouterService.java128 final int pid = Binder.getCallingPid();
129 final int resolvedUserId = ActivityManager.handleIncomingUser(pid, uid, userId,
137 registerClientLocked(client, pid, packageName, resolvedUserId, trusted);
263 pw.println("Permission Denial: can't dump MediaRouterService from from pid="
312 int pid, String packageName, int userId, boolean trusted) {
322 clientRecord = new ClientRecord(userRecord, client, pid, packageName, trusted);
507 int pid, String packageName, boolean trusted) {
510 mPid = pid;
540 return "Client " + mPackageName + " (pid " + mPid + ")";
311 registerClientLocked(IMediaRouterClient client, int pid, String packageName, int userId, boolean trusted) argument
506 ClientRecord(UserRecord userRecord, IMediaRouterClient client, int pid, String packageName, boolean trusted) argument
/frameworks/base/services/java/com/android/server/input/
H A DInputManagerService.java517 final int pid = Binder.getCallingPid();
522 result = nativeInjectInputEvent(mPtr, event, pid, uid, mode,
529 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
535 Slog.w(TAG, "Input event injection from pid " + pid + " timed out.");
539 Slog.w(TAG, "Input event injection from pid " + pid + " failed.");
616 private void onInputDevicesChangedListenerDied(int pid) { argument
618 mInputDevicesChangedListeners.remove(pid);
1597 InputDevicesChangedListenerRecord(int pid, IInputDevicesChangedListener listener) argument
[all...]
/frameworks/base/services/java/com/android/server/power/
H A DPowerManagerService.java608 final int pid = Binder.getCallingPid();
611 acquireWakeLockInternal(lock, flags, tag, packageName, ws, uid, pid);
618 WorkSource ws, int uid, int pid) {
623 + ", tag=\"" + tag + "\", ws=" + ws + ", uid=" + uid + ", pid=" + pid);
630 if (!wakeLock.hasSameProperties(flags, tag, ws, uid, pid)) {
633 wakeLock.updateProperties(flags, tag, packageName, ws, uid, pid);
637 wakeLock = new WakeLock(lock, flags, tag, packageName, ws, uid, pid);
880 + " pid=" + Binder.getCallingPid()
2269 pw.println("Permission Denial: can't dump PowerManager from from pid
617 acquireWakeLockInternal(IBinder lock, int flags, String tag, String packageName, WorkSource ws, int uid, int pid) argument
[all...]
/frameworks/base/tools/aapt/
H A DResourceTable.cpp597 " pid=%s, bag=%s, id=%s: %s\n",
3860 int pid = Res_GETPACKAGE(resID)+1; local
3866 if (check->getAssignedId() == pid) {
/frameworks/native/services/surfaceflinger/
H A DSurfaceFlinger.cpp2304 const int pid = ipc->getCallingPid(); local
2307 !PermissionCache::checkPermission(sDump, pid, uid)) {
2309 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
2637 const int pid = ipc->getCallingPid(); local
2640 !PermissionCache::checkPermission(sAccessSurfaceFlinger, pid, uid)) {
2642 "can't access SurfaceFlinger pid=%d, uid=%d", pid, uid);
2651 const int pid = ipc->getCallingPid(); local
2654 !PermissionCache::checkPermission(sReadFramebuffer, pid, ui
2668 const int pid = ipc->getCallingPid(); local
[all...]

Completed in 1539 milliseconds

1234