/frameworks/support/v4/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 80 * @param pid The process id for which to check. 88 int pid, int uid, String packageName) { 89 if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) { 87 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
|
/frameworks/rs/ |
H A D | rsCppUtils.cpp | 58 pid_t pid = fork(); local 60 switch (pid) { 84 pid_t w = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SubscriptionController.java | 99 int pid = android.os.Process.myPid(); 102 mLog.add(mNow.format("%m-%d %H:%M:%S") + " pid=" + pid + " tid=" + tid + " " + msg);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/gsm/ |
H A D | UsimDataDownloadHandler.java | 115 int pid = smsMessage.getProtocolIdentifier(); 170 EVENT_SEND_ENVELOPE_RESPONSE, new int[]{ dcs, pid })); 199 private void sendSmsAckForEnvelopeResponse(IccIoResult response, int dcs, int pid) { argument 244 smsAckPdu[index++] = (byte) pid;
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiServiceImpl.java | 554 Slog.d(TAG, "setWifiEnabled: " + enable + " pid=" + Binder.getCallingPid() 1459 pw.println("Permission Denial: can't dump WifiService from from pid=" 1623 void enforceWakeSourcePermission(int uid, int pid) { argument 1628 pid, uid, null); 1706 int pid = Binder.getCallingPid(); 1711 enforceWakeSourcePermission(uid, pid);
|
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/ |
H A D | BinderUtilTest.java | 59 final int pid = Binder.getCallingPid(); 63 // Verify that setUid() can be used to fake the Binder uid without affecting the pid. 65 assertEquals(pid, Binder.getCallingPid()); 69 // pid. 71 assertEquals(pid, Binder.getCallingPid()); 81 final int pid = Binder.getCallingPid(); 85 // Verify that setUid() can be used to fake the Binder uid without affecting the pid. 87 assertEquals(pid, Binder.getCallingPid()); 92 assertEquals(pid, Binder.getCallingPid());
|
/frameworks/native/cmds/dumpstate/ |
H A D | dumpstate.cpp | 124 void do_mountinfo(int pid, const char *name) { argument 129 snprintf(path, sizeof(path), "/proc/%d/ns/mnt", pid); 140 snprintf(path, sizeof(path), "/proc/%d/mountinfo", pid); 529 printf("Dumpstate info: id=%lu pid=%d\n", id, getpid()); 673 for_each_pid(show_showtime, "PROCESS TIMES (pid cmd user system iowait+percentage)"); 931 printf("== Final progress (pid %d): %d/%d (originally %d)\n",
|
H A D | dumpstate.h | 170 void show_wchan(int pid, int tid, const char *name); 173 void show_showtime(int pid, const char *name); 176 void do_showmap(int pid, const char *name);
|
H A D | utils.cpp | 54 // This matches the /proc/pid/exe link instead of /proc/pid/cmdline. 133 int pid; local 138 if (!(pid = atoi(de->d_name))) { 144 snprintf(cmdpath, sizeof(cmdpath), "/proc/%d/cmdline", pid); 149 helper(pid, cmdline, arg); 155 snprintf(cmdpath, sizeof(cmdpath), "/proc/%d/comm", pid); 169 helper(pid, cmdline, arg); 175 static void for_each_pid_helper(int pid, const char *cmdline, void *arg) { argument 177 func(pid, cmdlin 185 for_each_tid_helper(int pid, const char *cmdline, void *arg) argument 238 show_wchan(int pid, int tid, const char *name) argument 304 show_showtime(int pid, const char *name) argument 396 do_showmap(int pid, const char *name) argument 592 waitpid_with_timeout(pid_t pid, int timeout_seconds, int* status) argument 726 pid_t pid = fork(); local 1057 int pid = atoi(d->d_name); local [all...] |
/frameworks/native/cmds/installd/ |
H A D | commands.cpp | 1145 pid_t pid = fork(); local 1146 if (pid == 0) { 1153 int return_code = wait_child(pid); 1293 pid_t pid = fork(); local 1294 if (pid == 0) { 1307 int return_code = wait_child(pid); 1520 pid_t pid; local 1521 pid = fork(); 1522 if (pid == 0) { 1547 res = wait_child(pid); 1777 pid_t pid; local [all...] |
H A D | installd.cpp | 232 pid_t pid = fork(); local 233 if (pid == 0) { 245 int res = wait_child(pid);
|
H A D | otapreopt.cpp | 395 pid_t pid = fork(); local 396 if (pid == 0) { 408 if (pid == -1) { 416 pid_t got_pid = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0)); 417 if (got_pid != pid) { 420 command_line.c_str(), pid, got_pid, strerror(errno));
|
H A D | utils.cpp | 1173 int wait_child(pid_t pid) argument 1179 got_pid = waitpid(pid, &status, 0); 1186 if (got_pid != pid) { 1188 (int) pid, (int) got_pid, strerror(errno));
|
H A D | utils.h | 145 int wait_child(pid_t pid);
|
/frameworks/native/cmds/servicemanager/ |
H A D | service_manager.c | 27 pid_t pid; member in struct:audit_data 73 ALOGE("SELinux: getpidcon(pid=%d) failed to retrieve pid context.\n", spid); 77 ad.pid = spid; 267 //ALOGI("target=%p code=%d pid=%d uid=%d\n", 361 snprintf(buf, len, "service=%s pid=%d uid=%d", ad->name, ad->pid, ad->uid);
|
/frameworks/native/include/binder/ |
H A D | IMediaResourceMonitor.h | 36 virtual void notifyResourceGranted(/*in*/ int32_t pid, /*in*/ const int32_t type) = 0;
|
H A D | IPermissionController.h | 33 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) = 0;
|
H A D | IServiceManager.h | 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
H A D | PermissionCache.h | 74 pid_t pid, uid_t uid);
|
/frameworks/native/libs/binder/ |
H A D | IMediaResourceMonitor.cpp | 31 virtual void notifyResourceGranted(/*in*/ int32_t pid, /*in*/ const int32_t type) argument 35 data.writeInt32(pid); 50 int32_t pid = data.readInt32(); local 52 notifyResourceGranted(/*in*/ pid, /*in*/ type);
|
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeInt32(pid); 94 int32_t pid = data.readInt32(); local 96 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 61 pid_t pid = ipcState->getCallingPid(); local 63 if (outPid) *outPid = pid; 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 84 bool res = pc->checkPermission(permission, pid, uid); 87 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d", 89 String8(permission).string(), uid, pid); 96 ALOGW("Permission failure: %s from uid=%d pid=%d", 97 String8(permission).string(), uid, pid); 115 ALOGI("Waiting to check permission %s from uid=%d pid [all...] |
H A D | PermissionCache.cpp | 62 // note, we don't need to store the pid, which is not actually used in 84 pid_t pid = ipcState->getCallingPid(); local 86 if (outPid) *outPid = pid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 93 if ((uid == 0) || (pid == getpid())) { 102 granted = android::checkPermission(permission, pid, uid); 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
|
H A D | ProcessState.cpp | 281 pid_t pid = getpid(); local 283 name.appendFormat("Binder:%d_%X", pid, s);
|
/frameworks/native/libs/binder/tests/ |
H A D | binderLibTest.cpp | 63 pid_t pid; local 83 pid = fork(); 84 if (pid == -1) 85 return pid; 86 if (pid == 0) { 101 kill(pid, SIGKILL); 110 return pid; 127 //printf("%s: pid %d, get service\n", __func__, m_pid); 130 //printf("%s: pid %d, get service done\n", __func__, m_pid); 136 pid_t pid; local [all...] |