/system/core/libbacktrace/ |
H A D | BacktracePtrace.h | 29 BacktracePtrace(pid_t pid, pid_t tid, BacktraceMap* map) : Backtrace(pid, tid, map) {} argument
|
H A D | BacktraceCurrent.h | 40 BacktraceCurrent(pid_t pid, pid_t tid, BacktraceMap* map) : Backtrace(pid, tid, map) {} argument
|
H A D | UnwindCurrent.h | 36 UnwindCurrent(pid_t pid, pid_t tid, BacktraceMap* map) : BacktraceCurrent(pid, tid, map) {} argument
|
H A D | BacktraceMap.cpp | 32 BacktraceMap::BacktraceMap(pid_t pid) : pid_(pid) { argument 66 // Linux /proc/<pid>/maps lines: 139 BacktraceMap* BacktraceMap::Create(pid_t pid, bool /*uncached*/) { argument 140 BacktraceMap* map = new BacktraceMap(pid); 149 BacktraceMap* BacktraceMap::Create(pid_t pid, const std::vector<backtrace_map_t>& maps) { argument 150 BacktraceMap* backtrace_map = new BacktraceMap(pid);
|
H A D | BacktraceOffline.h | 47 BacktraceOffline(pid_t pid, pid_t tid, BacktraceMap* map, const backtrace_stackinfo_t& stack, argument 49 : Backtrace(pid, tid, map),
|
/system/core/libunwindstack/ |
H A D | MapInfo.cpp | 30 Memory* MapInfo::CreateMemory(pid_t pid) { argument 70 if (pid == getpid()) { 73 memory = new MemoryRemote(pid); 78 Elf* MapInfo::GetElf(pid_t pid, bool init_gnu_debugdata) { argument 83 elf = new Elf(CreateMemory(pid));
|
/system/core/logd/ |
H A D | LogBufferInterface.cpp | 24 uid_t LogBufferInterface::pidToUid(pid_t pid) { argument 25 return android::pidToUid(pid);
|
H A D | FlushCommand.cpp | 30 unsigned int logMask, pid_t pid, log_time start, 36 mPid(pid), 29 FlushCommand(LogReader& reader, bool nonBlock, unsigned long tail, unsigned int logMask, pid_t pid, log_time start, uint64_t timeout) argument
|
H A D | libaudit.h | 40 pid_t pid; member in struct:audit_sig_info 82 * Sets a pid to receive audit netlink events from the kernel 85 * @param pid 86 * The pid whom to set as the receiver of audit messages 90 extern int audit_setup(int fd, pid_t pid);
|
/system/extras/simpleperf/runtest/ |
H A D | function_fork.cpp | 24 pid_t pid = fork(); local 25 if (pid == 0) { 30 waitpid(pid, nullptr, 0);
|
/system/extras/tests/cpueater/ |
H A D | cpueater.c | 30 pid_t pid; local 45 switch(pid = fork()) { 69 printf("%d\n", pid);
|
H A D | daemonize.c | 33 int pid, fd, mode; local 84 switch(pid = fork()) { 104 switch(pid = fork()) { 117 waitpid(pid, &status, 0);
|
/system/core/debuggerd/tombstoned/ |
H A D | tombstoned_client.cpp | 33 bool tombstoned_connect(pid_t pid, unique_fd* tombstoned_socket, unique_fd* output_fd, argument 47 packet.packet.dump_request.pid = pid;
|
/system/core/libmemunreachable/ |
H A D | ProcessMappings.cpp | 32 bool ProcessMappings(pid_t pid, allocator::vector<Mapping>& mappings) { argument 34 snprintf(map_buffer, sizeof(map_buffer), "/proc/%d/maps", pid);
|
/system/extras/iotop/ |
H A D | tasklist.cpp | 40 pid_t pid = atoi(entry->d_name); local 41 f(pid); 62 return ScanPidsInDir(filename, [&pid_list](pid_t pid) { 63 pid_list.push_back(pid);
|
/system/extras/tests/kernel.config/ |
H A D | sysvipc_test.cpp | 33 pid_t pid = getpid(); local 34 int ret = kcmp(pid, pid, KCMP_SYSVSEM, 0, 0); 36 EXPECT_EQ(-1, kcmp(pid, pid, KCMP_SYSVSEM, 0, 0));
|
/system/core/debuggerd/libdebuggerd/ |
H A D | open_files_list.cpp | 38 void populate_open_files_list(pid_t pid, OpenFilesList* list) { argument 39 std::string fd_dir_name = "/proc/" + std::to_string(pid) + "/fd";
|
/system/core/libbinderwrapper/include/binderwrapper/ |
H A D | stub_binder_wrapper.h | 81 void set_calling_pid(pid_t pid) { calling_pid_ = pid; } argument
|
/system/core/liblog/tests/ |
H A D | log_read_test.cpp | 33 pid_t pid = getpid(); local 39 LOG_ID_MAIN, ANDROID_LOG_RDONLY | ANDROID_LOG_NONBLOCK, 1000, pid))); 43 std::string buf = android::base::StringPrintf("pid=%u ts=%ld.%09ld", pid, 60 EXPECT_EQ(log_msg.entry.pid, pid);
|
H A D | log_wrap_test.cpp | 79 pid_t pid = fork(); local 81 if (pid == 0) { 99 int ret = waitid(P_PID, pid, &info, WEXITED); 111 kill(pid, SIGTERM);
|
/system/core/libunwindstack/tests/ |
H A D | MapInfoCreateMemoryTest.cpp | 169 pid_t pid; local 170 if ((pid = fork()) == 0) { 175 ASSERT_LT(0, pid); 177 ASSERT_TRUE(ptrace(PTRACE_ATTACH, pid, 0, 0) != -1); 180 while (TEMP_FAILURE_RETRY(ptrace(PTRACE_GETSIGINFO, pid, 0, &si)) < 0 && errno == ESRCH) { 192 memory.reset(info.CreateMemory(pid)); 203 ASSERT_TRUE(ptrace(PTRACE_DETACH, pid, 0, 0) == 0); 205 kill(pid, SIGKILL); 206 ASSERT_EQ(pid, wait(nullptr));
|
H A D | MemoryRemoteTest.cpp | 48 static bool Attach(pid_t pid) { argument 49 if (ptrace(PTRACE_ATTACH, pid, 0, 0) == -1) { 55 while (TEMP_FAILURE_RETRY(ptrace(PTRACE_GETSIGINFO, pid, 0, &si)) < 0 && errno == ESRCH) { 57 printf("%d: Failed to stop after 10 seconds.\n", pid); 65 static bool Detach(pid_t pid) { argument 66 return ptrace(PTRACE_DETACH, pid, 0, 0) == 0; 76 pid_t pid; local 77 if ((pid = fork()) == 0) { 81 ASSERT_LT(0, pid); 83 ASSERT_TRUE(Attach(pid)); 108 pid_t pid; local 149 pid_t pid; local [all...] |
/system/extras/ext4_utils/ |
H A D | setup_fs.c | 18 pid_t pid; local 57 while ((pid=waitpid(-1, &status, 0)) != child) { 58 if (pid == -1) {
|
/system/tools/hidl/test/ |
H A D | hidl_test_servers.cpp | 73 pid_t pid; local 75 if ((pid = fork()) == 0) { 82 gPidList.push_back({serviceName, pid}); 86 static void killServer(pid_t pid, const char *serverName) { argument 87 if (kill(pid, SIGTERM)) { 92 waitpid(pid, &status, 0);
|
/system/core/healthd/ |
H A D | BatteryPropertiesRegistrar.cpp | 96 const int pid = self->getCallingPid(); local 100 String16("android.permission.DUMP"), pid, uid))
|