/frameworks/base/core/java/android/net/ |
H A D | Credentials.java | 24 /** pid of process. root peers may lie. */ 25 private final int pid; field in class:Credentials 31 public Credentials (int pid, int uid, int gid) { argument 32 this.pid = pid; 38 return pid;
|
/frameworks/av/media/utils/ |
H A D | SchedulingPolicyService.cpp | 31 int requestPriority(pid_t pid, pid_t tid, int32_t prio, bool isForApp, bool asynchronous) argument 50 ret = sps->requestPriority(pid, tid, prio, isForApp, asynchronous);
|
H A D | ISchedulingPolicyService.cpp | 40 virtual int requestPriority(int32_t pid, int32_t tid, argument 45 data.writeInt32(pid);
|
H A D | ProcessInfo.cpp | 31 bool ProcessInfo::getPriority(int pid, int* priority) { argument 40 status_t err = service->getProcessStatesAndOomScoresFromPids(length, &pid, &state, &score); 45 ALOGV("pid %d state %d score %d", pid, state, score); 47 ALOGE("pid %d invalid OOM adjustments value %d", pid, score); 56 bool ProcessInfo::isValidPid(int pid) { argument 58 // Trust it if this is called from the same process otherwise pid has to match the calling pid. 59 return (callingPid == getpid()) || (callingPid == pid); [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 59 private void checkPermission(int pid, int uid, int monitoringType) { argument 60 if (mGeofenceHardwareImpl.getAllowedResolutionLevel(pid, uid) <
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | MediaResourceMonitorService.java | 54 public void notifyResourceGranted(int pid, int type) argument 57 Slog.d(TAG, "notifyResourceGranted(pid=" + pid + ", type=" + type + ")"); 61 String pkgNames[] = getPackageNamesFromPid(pid); 83 private String[] getPackageNamesFromPid(int pid) { argument 87 if (proc.pid == pid) {
|
/frameworks/base/services/core/java/com/android/server/os/ |
H A D | SchedulingPolicyService.java | 43 public int requestPriority(int pid, int tid, int prio, boolean isForApp) { argument 44 //Log.i(TAG, "requestPriority(pid=" + pid + ", tid=" + tid + ", prio=" + prio + ")"); 49 // Once we've verified that the caller uid is permitted, we can trust the pid but 50 // we can't trust the tid. No need to explicitly check for pid == 0 || tid == 0, 53 prio > PRIORITY_MAX || Process.getThreadGroupLeader(tid) != pid) {
|
/frameworks/native/libs/binder/ |
H A D | IMediaResourceMonitor.cpp | 31 virtual void notifyResourceGranted(/*in*/ int32_t pid, /*in*/ const int32_t type) argument 35 data.writeInt32(pid); 50 int32_t pid = data.readInt32(); local 52 notifyResourceGranted(/*in*/ pid, /*in*/ type);
|
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeInt32(pid); 94 int32_t pid = data.readInt32(); local 96 bool res = checkPermission(permission, pid, uid);
|
H A D | PermissionCache.cpp | 62 // note, we don't need to store the pid, which is not actually used in 84 pid_t pid = ipcState->getCallingPid(); local 86 if (outPid) *outPid = pid; 88 return PermissionCache::checkPermission(permission, pid, uid); 92 const String16& permission, pid_t pid, uid_t uid) { 93 if ((uid == 0) || (pid == getpid())) { 102 granted = android::checkPermission(permission, pid, uid); 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
|
/frameworks/native/services/inputflinger/host/ |
H A D | InputFlinger.cpp | 51 const int pid = ipc->getCallingPid(); local 54 && !PermissionCache::checkPermission(sDumpPermission, pid, uid)) { 56 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
|
/frameworks/native/services/nativeperms/ |
H A D | nativeperms.cpp | 38 const ::android::String16& permission, int32_t pid, int32_t uid, 41 (void)pid; 37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument
|
/frameworks/native/services/schedulerservice/ |
H A D | SchedulingPolicyService.cpp | 35 Return<bool> SchedulingPolicyService::requestPriority(int32_t pid, int32_t tid, int32_t priority) { argument 47 int value = ::android::requestPriority(pid, tid, priority, false /* isForApp */);
|
/frameworks/av/media/libaaudio/src/binding/ |
H A D | IAAudioService.cpp | 243 pid_t pid; local 329 data.readInt32(&pid); 332 result = registerAudioThread(stream, pid, tid, nanoseconds); 341 data.readInt32(&pid); 343 result = unregisterAudioThread(stream, pid, tid);
|
/frameworks/av/services/audioflinger/ |
H A D | ServiceUtilities.cpp | 51 bool recordingAllowed(const String16& opPackageName, pid_t pid, uid_t uid) { argument 57 // We specify a pid and uid here as mediaserver (aka MediaRecorder or StageFrightRecorder) 58 // may open a record track on behalf of a client. Note that pid may be a tid. 60 const bool ok = checkPermission(sRecordAudio, pid, uid); 108 bool captureAudioOutputAllowed(pid_t pid, uid_t uid) { argument 111 bool ok = checkPermission(sCaptureAudioOutput, pid, uid); 142 // don't optimize for same pid, since mediaserver never dumps itself
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ProcessMemInfo.java | 21 final int pid; field in class:ProcessMemInfo 32 pid = _pid;
|
/frameworks/native/services/vr/hardware_composer/ |
H A D | vr_composer.cpp | 12 const pid_t pid = ipc->getCallingPid(); local 15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid); 17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
|
/frameworks/rs/ |
H A D | rsCppUtils.cpp | 58 pid_t pid = fork(); local 60 switch (pid) { 84 pid_t w = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
|
/frameworks/support/core-utils/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 85 * @param pid The process id for which to check. 93 int pid, int uid, String packageName) { 94 if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) { 92 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
|
/frameworks/av/services/oboeservice/ |
H A D | AAudioServiceStreamBase.h | 96 void setRegisteredThread(pid_t pid) { argument 97 mRegisteredClientThread = pid;
|
/frameworks/base/core/java/android/view/inputmethod/ |
H A D | InputBinding.java | 56 * @param pid The process id of where the binding came from. 59 int uid, int pid) { 63 mPid = pid; 120 + " / uid " + mUid + " / pid " + mPid + "}"; 58 InputBinding(InputConnection conn, IBinder connToken, int uid, int pid) argument
|
/frameworks/base/tools/preload/ |
H A D | Record.java | 83 final int pid; field in class:Record 129 pid = Integer.parseInt(parts[1]);
|
/frameworks/native/libs/vr/libvrflinger/ |
H A D | vsync_service.h | 39 VSyncChannel(pdx::Service& service, int pid, int cid) argument 40 : service_(service), pid_(pid), cid_(cid) {}
|
/frameworks/native/services/vr/virtual_touchpad/ |
H A D | VirtualTouchpadService.cpp | 29 pid_t pid; local 30 if (!CheckTouchPermission(&pid)) { 33 if (client_pid_ == pid) { 38 ALOGE("pid=%ld attached twice", static_cast<long>(pid)); 46 ALOGE("pid=%ld replaces %ld", static_cast<long>(pid), 48 client_pid_ = pid; 51 client_pid_ = pid; 94 const pid_t pid local 111 pid_t pid; local [all...] |
/frameworks/av/drm/libmediadrm/ |
H A D | DrmSessionManager.cpp | 68 int pid, const sp<DrmSessionClientInterface>& drm, const Vector<uint8_t> &sessionId) { 69 ALOGV("addSession(pid %d, drm %p, sessionId %s)", pid, drm.get(), 77 ssize_t index = mSessionMap.indexOfKey(pid); 79 // new pid 82 mSessionMap.add(pid, infosForPid); 170 ALOGV("reclaim session(%s) opened by pid %d", 181 int pid = -1; local 194 if (pid == -1) { 195 pid 67 addSession( int pid, const sp<DrmSessionClientInterface>& drm, const Vector<uint8_t> &sessionId) argument 211 getLeastUsedSession_l( int pid, sp<DrmSessionClientInterface>* drm, Vector<uint8_t>* sessionId) argument [all...] |