/frameworks/base/cmds/uiautomator/library/testrunner-src/com/android/uiautomator/core/ |
H A D | UiAutomationShellWrapper.java | 100 public boolean appCrashed(String processName, int pid, String shortMsg, String longMsg, argument 107 public int appEarlyNotResponding(String processName, int pid, String annotation) argument 114 public int appNotResponding(String processName, int pid, String processStats) argument
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 1408 public int pid; field in class:ActivityManager.RunningServiceInfo 1512 dest.writeInt(pid); 1529 pid = source.readInt(); 1824 * The pid of this process; 0 if none 1826 public int pid; field in class:ActivityManager.ProcessErrorStateInfo 1872 dest.writeInt(pid); 1883 pid = source.readInt(); 1932 * The pid of this process; 0 if none 1934 public int pid; field in class:ActivityManager.RunningAppProcessInfo 2079 * content providers is being used by another process. The pid o [all...] |
H A D | ActivityManagerNative.java | 1178 int pid = data.readInt(); 1180 setProcessForeground(token, pid, isForeground); 1188 int pid = data.readInt(); 1190 int res = checkPermission(perm, pid, uid); 1199 int pid = data.readInt(); 1202 int res = checkPermissionWithToken(perm, pid, uid, token); 1211 int pid = data.readInt(); 1216 int res = checkUriPermission(uri, pid, uid, mode, userId, callerToken); 2098 int pid = data.readInt(); 2101 long res = inputDispatchingTimedOut(pid, aboveSyste 3860 setProcessForeground(IBinder token, int pid, boolean isForeground) argument 3873 checkPermission(String permission, int pid, int uid) argument 3888 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 3919 checkUriPermission(Uri uri, int pid, int uid, int mode, int userId, IBinder callerToken) argument 5077 inputDispatchingTimedOut(int pid, boolean aboveSystem, String reason) argument [all...] |
H A D | ActivityThread.java | 727 + Binder.getCallingUid() + " pid=" + Binder.getCallingPid()); 1888 boolean dumpFullInfo, boolean dumpDalvik, int pid, String processName, 1899 pw.print(pid); pw.print(','); 1887 dumpMemInfoTable(PrintWriter pw, Debug.MemoryInfo memInfo, boolean checkin, boolean dumpFullInfo, boolean dumpDalvik, int pid, String processName, long nativeMax, long nativeAllocated, long nativeFree, long dalvikMax, long dalvikAllocated, long dalvikFree) argument
|
H A D | AppImportanceMonitor.java | 50 public void onForegroundActivitiesChanged(int pid, int uid, boolean foregroundActivities) { 54 public void onProcessStateChanged(int pid, int uid, int procState) { 56 updateImportanceLocked(pid, uid, 63 public void onProcessDied(int pid, int uid) { 65 updateImportanceLocked(pid, uid, 98 updateImportanceLocked(app.uid, app.pid, app.importance, false); 117 void updateImportanceLocked(int uid, int pid, int importance, boolean repChange) { argument 124 ent.procs.remove(pid); 126 ent.procs.put(pid, importance);
|
H A D | ContextImpl.java | 1859 public int checkPermission(String permission, int pid, int uid) { argument 1866 permission, pid, uid); 1874 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1881 permission, pid, uid, callerToken); 1893 int pid = Binder.getCallingPid(); 1894 if (pid != Process.myPid()) { 1895 return checkPermission(permission, pid, Binder.getCallingUid()); 1925 String permission, int pid, int uid, String message) { 1927 checkPermission(permission, pid, uid), 1971 public int checkUriPermission(Uri uri, int pid, in argument 1924 enforcePermission( String permission, int pid, int uid, String message) argument 1983 checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) argument 2014 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2078 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2101 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | IActivityManager.java | 218 public void setProcessForeground(IBinder token, int pid, argument 221 public int checkPermission(String permission, int pid, int uid) argument 223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 226 public int checkUriPermission(Uri uri, int pid, int uid, int mode, int userId, argument 416 public long inputDispatchingTimedOut(int pid, boolean aboveSystem, String reason) argument
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 469 boolean checkUser(int pid, int uid, Context context) { argument 472 || context.checkPermission(INTERACT_ACROSS_USERS, pid, uid) 480 final int pid = Binder.getCallingPid(); 488 if (mExported && checkUser(pid, uid, context)) { 491 if (context.checkPermission(componentPerm, pid, uid, callerToken) 509 if (context.checkPermission(pathPerm, pid, uid, callerToken) 531 if (context.checkUriPermission(userUri, pid, uid, Intent.FLAG_GRANT_READ_URI_PERMISSION, 540 + ContentProvider.this.getClass().getName() + " uri " + uri + " from pid=" + pid 548 final int pid [all...] |
H A D | Context.java | 2923 * @param pid The process ID being checked against. Must be > 0. 2928 * pid/uid is allowed that permission, or 2935 public abstract int checkPermission(@NonNull String permission, int pid, int uid); argument 2939 public abstract int checkPermission(@NonNull String permission, int pid, int uid, argument 2945 * {@link #checkPermission(String, int, int)} with the pid and uid returned 2956 * pid/uid is allowed that permission, or 2975 * pid/uid is allowed that permission, or 2990 * @param pid The process ID being checked against. Must be > 0. 2998 @NonNull String permission, int pid, int uid, @Nullable String message); 3005 * pid an 2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3126 checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument 3130 checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, IBinder callerToken) argument 3198 checkUriPermission(@ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags) argument 3221 enforceUriPermission( Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, String message) argument 3286 enforceUriPermission( @ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags, @Nullable String message) argument [all...] |
H A D | ContextWrapper.java | 566 public int checkPermission(String permission, int pid, int uid) { argument 567 return mBase.checkPermission(permission, pid, uid); 572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 573 return mBase.checkPermission(permission, pid, uid, callerToken); 588 String permission, int pid, int uid, String message) { 589 mBase.enforcePermission(permission, pid, uid, message); 614 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 615 return mBase.checkUriPermission(uri, pid, uid, modeFlags); 620 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument 621 return mBase.checkUriPermission(uri, pid, ui 587 enforcePermission( String permission, int pid, int uid, String message) argument 635 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 642 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 660 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/core/java/android/database/ |
H A D | CursorWindow.java | 722 private void recordNewWindow(int pid, long window) { argument 724 sWindowToPidMap.put(window, pid); 753 int pid = sWindowToPidMap.valueAt(indx); 754 int value = pidCounts.get(pid); 755 pidCounts.put(pid, ++value); 761 int pid = pidCounts.keyAt(i); 762 if (pid == myPid) { 765 buff.append("pid " + pid + "="); 767 int num = pidCounts.get(pid); [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareImpl.java | 881 int getAllowedResolutionLevel(int pid, int uid) { argument 883 pid, uid) == PackageManager.PERMISSION_GRANTED) { 886 pid, uid) == PackageManager.PERMISSION_GRANTED) {
|
H A D | GeofenceHardwareService.java | 59 private void checkPermission(int pid, int uid, int monitoringType) { argument 60 if (mGeofenceHardwareImpl.getAllowedResolutionLevel(pid, uid) <
|
/frameworks/base/core/java/android/net/ |
H A D | Credentials.java | 24 /** pid of process. root peers may lie. */ 25 private final int pid; field in class:Credentials 31 public Credentials (int pid, int uid, int gid) { argument 32 this.pid = pid; 38 return pid;
|
/frameworks/base/core/java/android/os/ |
H A D | Debug.java | 1062 * Note: currently only works when the requested pid has the same UID 1066 public static native void getMemoryInfo(int pid, MemoryInfo memoryInfo); argument 1080 public static native long getPss(int pid, long[] outUss, long[] outMemtrack); argument 1619 public static native void dumpNativeBacktraceToFile(int pid, String file); argument
|
H A D | Process.java | 531 * and returns the child's pid. Please note: the present implementation 546 * After the zygote process reads these it will write the pid of 571 result.pid = inputStream.readInt(); 572 if (result.pid < 0) { 813 * @param pid the process id 817 public static final int getUidForPid(int pid) { argument 821 Process.readProcLines("/proc/" + pid + "/status", procStatusLabels, procStatusValues); 827 * @param pid the process id 831 public static final int getParentPid(int pid) { argument 835 Process.readProcLines("/proc/" + pid 914 setProcessGroup(int pid, int group) argument 922 getProcessGroup(int pid) argument 1000 setSwappiness(int pid, boolean is_increased) argument 1023 killProcess(int pid) argument 1039 sendSignal(int pid, int signal) argument 1047 killProcessQuiet(int pid) argument 1057 sendSignalQuiet(int pid, int signal) argument 1112 getPss(int pid) argument 1123 public int pid; field in class:Process.ProcessStartResult 1136 killProcessGroup(int uid, int pid) argument [all...] |
H A D | SELinux.java | 96 * @param pid an int representing the process id to check. 97 * @return a String representing the security context of the given pid. 99 public static final native String getPidContext(int pid); argument
|
/frameworks/av/media/libstagefright/mpeg2ts/ |
H A D | ATSParser.cpp | 53 unsigned pid, ABitReader *br, status_t *err); 56 unsigned pid, unsigned continuity_counter, 108 unsigned pid() const { return mElementaryPID; } function in struct:android::ATSParser::Stream 109 void setPID(unsigned pid) { mElementaryPID = pid; } argument 190 unsigned pid, ABitReader *br, status_t *err) { 193 if (pid != mProgramMapPID) { 203 unsigned pid, unsigned continuity_counter, 208 ssize_t index = mStreams.indexOfKey(pid); 361 ALOGI("PID 0x%08x => type 0x%02x", stream->pid(), strea 189 parsePSISection( unsigned pid, ABitReader *br, status_t *err) argument 202 parsePID( unsigned pid, unsigned continuity_counter, unsigned payload_unit_start_indicator, ABitReader *br, status_t *err) argument [all...] |
/frameworks/av/media/libstagefright/omx/ |
H A D | OMX.cpp | 190 bool OMX::livesLocally(node_id /* node */, pid_t pid) { argument 191 return pid == getpid();
|
/frameworks/av/services/audioflinger/ |
H A D | AudioFlinger.cpp | 314 snprintf(buffer, SIZE, " pid: %d\n", client->pid()); 321 snprintf(buffer, SIZE, " pid: %d\n", mNotificationClients.keyAt(i)); 326 result.append(" session pid count\n"); 357 "can't dump AudioFlinger from pid=%d, uid=%d\n", 459 sp<AudioFlinger::Client> AudioFlinger::registerPid(pid_t pid) argument 462 // If pid is already in the mClients wp<> map, then use that entry 464 sp<Client> client = mClients.valueFor(pid).promote(); 466 client = new Client(this, pid); 467 mClients.add(pid, clien 597 pid_t pid = IPCThreadState::self()->getCallingPid(); local 1205 pid_t pid = IPCThreadState::self()->getCallingPid(); local 1235 removeNotificationClient(pid_t pid) argument 1276 removeClient_l(pid_t pid) argument 1302 Client(const sp<AudioFlinger>& audioFlinger, pid_t pid) argument 1351 NotificationClient(const sp<AudioFlinger>& audioFlinger, const sp<IAudioFlingerClient>& client, pid_t pid) argument 1436 pid_t pid = IPCThreadState::self()->getCallingPid(); local 2192 acquireAudioSessionId(int audioSession, pid_t pid) argument 2226 releaseAudioSessionId(int audioSession, pid_t pid) argument 2429 pid_t pid = IPCThreadState::self()->getCallingPid(); local [all...] |
H A D | AudioFlinger.h | 199 virtual void acquireAudioSessionId(int audioSession, pid_t pid); 201 virtual void releaseAudioSessionId(int audioSession, pid_t pid); 396 Client(const sp<AudioFlinger>& audioFlinger, pid_t pid); 399 pid_t pid() const { return mPid; } function in class:android::AudioFlinger::Client 421 pid_t pid); 567 void removeClient_l(pid_t pid); 568 void removeNotificationClient(pid_t pid); 652 AudioSessionRef(int sessionid, pid_t pid) : argument 653 mSessionid(sessionid), mPid(pid), mCnt(1) {} 739 sp<Client> registerPid(pid_t pid); // alway [all...] |
H A D | ISchedulingPolicyService.cpp | 40 virtual int requestPriority(int32_t pid, int32_t tid, int32_t prio, bool asynchronous) argument 44 data.writeInt32(pid);
|
H A D | SchedulingPolicyService.cpp | 31 int requestPriority(pid_t pid, pid_t tid, int32_t prio, bool asynchronous) argument 50 ret = sps->requestPriority(pid, tid, prio, asynchronous);
|
H A D | Threads.cpp | 429 void AudioFlinger::ThreadBase::sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio) argument 431 sp<ConfigEvent> configEvent = (ConfigEvent *)new PrioConfigEvent(pid, tid, prio); 482 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d", 2916 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d", 2928 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d", 5057 ALOGW("Policy SCHED_FIFO priority %d is unavailable for pid %d tid %d; error %d",
|
H A D | Threads.h | 123 PrioConfigEventData(pid_t pid, pid_t tid, int32_t prio) : argument 124 mPid(pid), mTid(tid), mPrio(prio) {} 127 snprintf(buffer, size, "Prio event: pid %d, tid %d, prio %d\n", mPid, mTid, mPrio); 137 PrioConfigEvent(pid_t pid, pid_t tid, int32_t prio) : argument 139 mData = new PrioConfigEventData(pid, tid, prio); 258 void sendPrioConfigEvent_l(pid_t pid, pid_t tid, int32_t prio);
|