/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 89 * @param pid an int representing the process id to check. 90 * @return a String representing the security context of the given pid. 92 public static final native String getPidContext(int pid); argument
|
/frameworks/native/include/binder/ |
H A D | IServiceManager.h | 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/ |
H A D | UsimDataDownloadHandler.java | 115 int pid = smsMessage.getProtocolIdentifier(); 170 EVENT_SEND_ENVELOPE_RESPONSE, new int[]{ dcs, pid })); 199 private void sendSmsAckForEnvelopeResponse(IccIoResult response, int dcs, int pid) { argument 244 smsAckPdu[index++] = (byte) pid;
|
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 556 public int checkPermission(String permission, int pid, int uid) { argument 562 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 563 return checkPermission(permission, pid, uid); 583 String permission, int pid, int uid, String message) { 608 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 614 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) { argument 615 return checkUriPermission(uri, pid, uid, modeFlags); 630 String writePermission, int pid, int uid, int modeFlags) { 636 Uri uri, int pid, int uid, int modeFlags, String message) { 654 int pid, in 582 enforcePermission( String permission, int pid, int uid, String message) argument 629 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 635 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 652 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/base/packages/Shell/src/com/android/shell/ |
H A D | BugreportProgressService.java | 95 * its pid, and the estimated total effort. 320 final int pid = intent.getIntExtra(EXTRA_PID, 0); 326 Log.v(TAG, "action: " + action + ", name: " + name + ", id: " + id + ", pid: " 327 + pid + ", max: " + max); 330 if (!startProgress(name, id, pid, max)) { 405 private boolean startProgress(String name, int id, int pid, int max) { argument 413 if (pid == -1) { 422 final BugreportInfo info = new BugreportInfo(mContext, id, pid, name, max); 488 Log.d(TAG, "Sending 'Progress' notification for id " + info.id + " (pid " + info.pid 1297 setBugreportNameProperty(int pid, String name) argument 1571 final int pid; field in class:BugreportProgressService.BugreportInfo 1652 BugreportInfo(Context context, int id, int pid, String name, int max) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_os_Debug.cpp | 162 * Any graphics memory reported in /proc/pid/smaps is not included here. 164 static int read_memtrack_memory(struct memtrack_proc* p, int pid, argument 167 int err = memtrack_proc_get(p, pid); 198 * Retrieves the graphics memory that is unaccounted for in /proc/pid/smaps. 200 static int read_memtrack_memory(int pid, struct graphics_memory_pss* graphics_mem) argument 212 int err = read_memtrack_memory(p, pid, graphics_mem); 428 static void load_maps(int pid, stats_t* stats, bool* foundSwapPss) argument 433 sprintf(tmp, "/proc/%d/smaps", pid); 442 jint pid, jobject object) 448 load_maps(pid, stat 441 android_os_Debug_getDirtyPagesPid(JNIEnv *env, jobject clazz, jint pid, jobject object) argument 511 android_os_Debug_getPssPid(JNIEnv *env, jobject clazz, jint pid, jlongArray outUssSwapPss, jlongArray outMemtrack) argument 1018 android_os_Debug_dumpNativeBacktraceToFile(JNIEnv* env, jobject clazz, jint pid, jstring fileName) argument [all...] |
H A D | android_os_SELinux.cpp | 225 * Purpose: Get the context of a process identified by its pid 227 * pid: a jint representing the process 228 * Returns: a jstring representing the security context of the pid, 232 static jstring getPidCon(JNIEnv *env, jobject, jint pid) { argument 238 int ret = getpidcon(static_cast<pid_t>(pid), &tmp); 246 ALOGV("getPidCon(%d) => %s", pid, context.get());
|
/frameworks/av/services/audioflinger/ |
H A D | AudioFlinger.cpp | 328 snprintf(buffer, SIZE, " pid: %d\n", client->pid()); 335 snprintf(buffer, SIZE, " pid: %d\n", mNotificationClients.keyAt(i)); 340 result.append(" session pid count\n"); 371 "can't dump AudioFlinger from pid=%d, uid=%d\n", 499 sp<AudioFlinger::Client> AudioFlinger::registerPid(pid_t pid) argument 502 // If pid is already in the mClients wp<> map, then use that entry 504 sp<Client> client = mClients.valueFor(pid).promote(); 506 client = new Client(this, pid); 507 mClients.add(pid, clien 573 createTrack( audio_stream_type_t streamType, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, size_t *frameCount, IAudioFlinger::track_flags_t *flags, const sp<IMemory>& sharedBuffer, audio_io_handle_t output, pid_t pid, pid_t tid, audio_session_t *sessionId, int clientUid, status_t *status) argument 1313 pid_t pid = IPCThreadState::self()->getCallingPid(); local 1342 removeNotificationClient(pid_t pid) argument 1371 ioConfigChanged(audio_io_config_event event, const sp<AudioIoDescriptor>& ioDesc, pid_t pid) argument 1385 removeClient_l(pid_t pid) argument 1412 Client(const sp<AudioFlinger>& audioFlinger, pid_t pid) argument 1439 NotificationClient(const sp<AudioFlinger>& audioFlinger, const sp<IAudioFlingerClient>& client, pid_t pid) argument 1459 openRecord( audio_io_handle_t input, uint32_t sampleRate, audio_format_t format, audio_channel_mask_t channelMask, const String16& opPackageName, size_t *frameCount, IAudioFlinger::track_flags_t *flags, pid_t pid, pid_t tid, int clientUid, audio_session_t *sessionId, size_t *notificationFrames, sp<IMemory>& cblk, sp<IMemory>& buffers, status_t *status) argument 2329 acquireAudioSessionId(audio_session_t audioSession, pid_t pid) argument 2363 releaseAudioSessionId(audio_session_t audioSession, pid_t pid) argument 2603 pid_t pid = IPCThreadState::self()->getCallingPid(); local [all...] |
H A D | Threads.h | 107 IoConfigEventData(audio_io_config_event event, pid_t pid) : argument 108 mEvent(event), mPid(pid) {} 120 IoConfigEvent(audio_io_config_event event, pid_t pid) : argument 122 mData = new IoConfigEventData(event, pid); 129 PrioConfigEventData(pid_t pid, pid_t tid, int32_t prio) : argument 130 mPid(pid), mTid(tid), mPrio(prio) {} 133 snprintf(buffer, size, "Prio event: pid %d, tid %d, prio %d\n", mPid, mTid, mPrio); 143 PrioConfigEvent(pid_t pid, pid_t tid, int32_t prio) : argument 145 mData = new PrioConfigEventData(pid, tid, prio); 263 virtual void ioConfigChanged(audio_io_config_event event, pid_t pid [all...] |
/frameworks/av/media/libstagefright/omx/ |
H A D | OMXMaster.cpp | 37 pid_t pid = getpid(); local 39 snprintf(filename, sizeof(filename), "/proc/%d/comm", pid);
|
/frameworks/base/libs/hwui/tests/macrobench/ |
H A D | main.cpp | 111 pid_t pid = getpid(); local 113 int towrite = snprintf(buffer, BUF_SIZE, "%ld", (long) pid);
|
/frameworks/base/media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/ |
H A D | MediaTestUtil.java | 79 String pid = poList2[1]; 80 pidvalue = Integer.parseInt(pid);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | LocationManagerService.java | 637 final int mPid; // pid of receiver 656 Receiver(ILocationListener listener, PendingIntent intent, int pid, int uid, argument 665 mAllowedResolutionLevel = getAllowedResolutionLevel(pid, uid); 667 mPid = pid; 1064 * @param pid the PID 1066 * @return resolution level allowed to the pid/uid pair 1068 private int getAllowedResolutionLevel(int pid, int uid) { argument 1070 pid, uid) == PackageManager.PERMISSION_GRANTED) { 1073 pid, uid) == PackageManager.PERMISSION_GRANTED) { 1185 int pid, in 1184 reportLocationAccessNoThrow( int pid, int uid, String packageName, int allowedResolutionLevel) argument 1200 checkLocationAccess(int pid, int uid, String packageName, int allowedResolutionLevel) argument 1532 getReceiverLocked(ILocationListener listener, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument 1550 getReceiverLocked(PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument 1616 checkListenerOrIntentLocked(ILocationListener listener, PendingIntent intent, int pid, int uid, String packageName, WorkSource workSource, boolean hideFromAppOps) argument 1667 requestLocationUpdatesLocked(LocationRequest request, Receiver receiver, int pid, int uid, String packageName) argument [all...] |
/frameworks/base/test-runner/src/android/test/ |
H A D | IsolatedContext.java | 108 Uri uri, String readPermission, String writePermission, int pid, 114 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 107 checkUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
|
/frameworks/av/include/media/stagefright/ |
H A D | AudioSource.h | 43 pid_t pid = -1);
|
/frameworks/base/cmds/hid/jni/ |
H A D | com_android_commands_hid_Device.cpp | 85 Device* Device::open(int32_t id, const char* name, int32_t vid, int32_t pid, argument 103 ev.u.create.product = pid; 186 static jlong openDevice(JNIEnv* env, jclass /* clazz */, jstring rawName, jint id, jint vid, jint pid, argument 200 id, reinterpret_cast<const char*>(name.c_str()), vid, pid,
|
/frameworks/av/media/libmediaplayerservice/ |
H A D | MetadataRetrieverClient.cpp | 46 MetadataRetrieverClient::MetadataRetrieverClient(pid_t pid) argument 48 ALOGV("MetadataRetrieverClient constructor pid(%d)", pid); 49 mPid = pid; 67 snprintf(buffer, 255, " pid(%d)\n", mPid); 76 ALOGV("disconnect from pid %d", mPid);
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | BroadcastQueue.java | 214 public boolean isPendingBroadcastProcessLocked(int pid) { argument 215 return mPendingBroadcast != null && mPendingBroadcast.curApp.pid == pid; 304 if (br != null && br.curApp.pid == app.pid) { 324 public void skipPendingBroadcastLocked(int pid) { argument 326 if (br != null && br.curApp.pid == pid) { 479 + " (pid " + app.pid [all...] |
H A D | ProcessList.java | 173 // LMK_PROCPRIO <pid> <uid> <prio> 174 // LMK_PROCREMOVE <pid> 634 * @param pid The process identifier to set. 640 public static final void setOomAdj(int pid, int uid, int amt) { argument 647 buf.putInt(pid); 653 Slog.w("ActivityManager", "SLOW OOM ADJ: " + (now-start) + "ms for pid " + pid 661 public static final void remove(int pid) { argument 664 buf.putInt(pid);
|
H A D | ActivityManagerService.java | 740 * All of the processes we currently have running organized by pid. 741 * The keys are the pid running the application. 750 * is the pid of the caller who requested it (we hold a death 754 int pid; field in class:ActivityManagerService.ForegroundToken 1088 public final int pid; field in class:ActivityManagerService.Identity 1093 pid = _pid; 1383 int pid; field in class:ActivityManagerService.ProcessChangeItem 1442 AppDeathRecipient(ProcessRecord app, int pid, argument 1448 mPid = pid; 1574 Process.killProcessGroup(msg.arg1 /* uid */, msg.arg2 /* pid */); 3174 killProcessGroup(int uid, int pid) argument 4138 dispatchProcessDied(int pid, int uid) argument 5135 appDiedLocked(ProcessRecord app, int pid, IApplicationThread thread, boolean fromBinderDied) argument 6364 attachApplicationLocked(IApplicationThread thread, int pid) argument 7407 setProcessForeground(IBinder token, int pid, boolean isForeground) argument 7615 checkPermission(String permission, int pid, int uid) argument 7641 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 7656 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 7675 checkPermission(String permission, int pid, int uid) argument 7683 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 7945 checkUriPermission(Uri uri, int pid, int uid, final int modeFlags, int userId, IBinder callerToken) argument 12048 inputDispatchingTimedOut(int pid, final boolean aboveSystem, String reason) argument 17263 isPendingBroadcastProcessLocked(int pid) argument 17268 skipPendingBroadcastLocked(int pid) argument [all...] |
/frameworks/av/services/audiopolicy/service/ |
H A D | AudioPolicyInterfaceImpl.cpp | 263 pid_t pid, 287 bool updatePid = (pid == -1); 298 ALOGW_IF(pid != (pid_t)-1 && pid != callingPid, 299 "%s uid %d pid %d tried to pass itself off as pid %d", 300 __func__, callingUid, callingPid, pid); 301 pid = callingPid; 321 if (!captureAudioOutputAllowed(pid, uid)) { 260 getInputForAttr(const audio_attributes_t *attr, audio_io_handle_t *input, audio_session_t session, pid_t pid, uid_t uid, uint32_t samplingRate, audio_format_t format, audio_channel_mask_t channelMask, audio_input_flags_t flags, audio_port_handle_t selectedDeviceId) argument
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 510 boolean checkUser(int pid, int uid, Context context) { argument 513 || context.checkPermission(INTERACT_ACROSS_USERS, pid, uid) 540 final int pid = Binder.getCallingPid(); 549 if (mExported && checkUser(pid, uid, context)) { 594 if (context.checkUriPermission(userUri, pid, uid, Intent.FLAG_GRANT_READ_URI_PERMISSION, 609 + ContentProvider.this.getClass().getName() + " uri " + uri + " from pid=" + pid 617 final int pid = Binder.getCallingPid(); 626 if (mExported && checkUser(pid, uid, context)) { 668 if (context.checkUriPermission(uri, pid, ui [all...] |
/frameworks/native/libs/binder/tests/ |
H A D | binderLibTest.cpp | 63 pid_t pid; local 83 pid = fork(); 84 if (pid == -1) 85 return pid; 86 if (pid == 0) { 101 kill(pid, SIGKILL); 110 return pid; 127 //printf("%s: pid %d, get service\n", __func__, m_pid); 130 //printf("%s: pid %d, get service done\n", __func__, m_pid); 136 pid_t pid; local [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ContextImpl.java | 1549 public int checkPermission(String permission, int pid, int uid) { argument 1556 permission, pid, uid); 1564 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1571 permission, pid, uid, callerToken); 1583 int pid = Binder.getCallingPid(); 1584 if (pid != Process.myPid()) { 1585 return checkPermission(permission, pid, Binder.getCallingUid()); 1625 String permission, int pid, int uid, String message) { 1627 checkPermission(permission, pid, uid), 1675 public int checkUriPermission(Uri uri, int pid, in argument 1624 enforcePermission( String permission, int pid, int uid, String message) argument 1687 checkUriPermission(Uri uri, int pid, int uid, int modeFlags, IBinder callerToken) argument 1718 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 1783 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 1809 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
/frameworks/av/cmds/screenrecord/ |
H A D | screenrecord.cpp | 758 pid_t pid = fork(); local 759 if (pid < 0) { 763 } else if (pid > 0) { 767 pid_t actualPid = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0)); 768 if (actualPid != pid) { 769 ALOGW("waitpid(%d) returned %d (errno=%d)", pid, actualPid, errno);
|