/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_wait3.py | 25 spid, status, rusage = os.wait3(os.WNOHANG) 26 if spid == cpid: 30 self.assertEqual(spid, cpid)
|
test_wait4.py | 19 spid, status, rusage = os.wait4(cpid, os.WNOHANG) 20 if spid == cpid: 23 self.assertEqual(spid, cpid)
|
test_fork1.py | 23 spid, status = os.waitpid(cpid, os.WNOHANG) 24 if spid == cpid: 28 self.assertEqual(spid, cpid)
|
fork_wait.py | 41 spid, status = os.waitpid(cpid, os.WNOHANG) 42 if spid == cpid: 46 self.assertEqual(spid, cpid)
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_wait3.py | 25 spid, status, rusage = os.wait3(os.WNOHANG) 26 if spid == cpid: 30 self.assertEqual(spid, cpid)
|
test_wait4.py | 19 spid, status, rusage = os.wait4(cpid, os.WNOHANG) 20 if spid == cpid: 23 self.assertEqual(spid, cpid)
|
test_fork1.py | 23 spid, status = os.waitpid(cpid, os.WNOHANG) 24 if spid == cpid: 28 self.assertEqual(spid, cpid)
|
fork_wait.py | 41 spid, status = os.waitpid(cpid, os.WNOHANG) 42 if spid == cpid: 46 self.assertEqual(spid, cpid)
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_wait3.py | 25 spid, status, rusage = os.wait3(os.WNOHANG) 26 if spid == cpid: 30 self.assertEqual(spid, cpid)
|
test_wait4.py | 19 spid, status, rusage = os.wait4(cpid, os.WNOHANG) 20 if spid == cpid: 23 self.assertEqual(spid, cpid)
|
test_fork1.py | 23 spid, status = os.waitpid(cpid, os.WNOHANG) 24 if spid == cpid: 28 self.assertEqual(spid, cpid)
|
fork_wait.py | 41 spid, status = os.waitpid(cpid, os.WNOHANG) 42 if spid == cpid: 46 self.assertEqual(spid, cpid)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_wait3.py | 25 spid, status, rusage = os.wait3(os.WNOHANG) 26 if spid == cpid: 30 self.assertEqual(spid, cpid)
|
test_wait4.py | 19 spid, status, rusage = os.wait4(cpid, os.WNOHANG) 20 if spid == cpid: 23 self.assertEqual(spid, cpid)
|
test_fork1.py | 23 spid, status = os.waitpid(cpid, os.WNOHANG) 24 if spid == cpid: 28 self.assertEqual(spid, cpid)
|
fork_wait.py | 41 spid, status = os.waitpid(cpid, os.WNOHANG) 42 if spid == cpid: 46 self.assertEqual(spid, cpid)
|
/frameworks/native/cmds/servicemanager/ |
service_manager.c | 67 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) 74 if (getpidcon(spid, &sctx) < 0) { 75 ALOGE("SELinux: getpidcon(pid=%d) failed to retrieve pid context.\n", spid); 79 ad.pid = spid; 90 static bool check_mac_perms_from_getcon(pid_t spid, uid_t uid, const char *perm) 96 return check_mac_perms(spid, uid, service_manager_context, perm, NULL); 99 static bool check_mac_perms_from_lookup(pid_t spid, uid_t uid, const char *perm, const char *name) 118 allowed = check_mac_perms(spid, uid, tctx, perm, name); 123 static int svc_can_register(const uint16_t *name, size_t name_len, pid_t spid, uid_t uid) 131 return check_mac_perms_from_lookup(spid, uid, perm, str8(name, name_len)) ? 1 : 0 [all...] |
/system/security/keystore/ |
permissions.cpp | 108 static bool keystore_selinux_check_access(uid_t uid, perm_t perm, pid_t spid) { 122 if (getpidcon(spid, &sctx) != 0) { 127 ad.pid = spid; 152 bool has_permission(uid_t uid, perm_t perm, pid_t spid) { 161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); 165 return (DEFAULT_PERMS & perm) && keystore_selinux_check_access(uid, perm, spid);
|
permissions.h | 53 bool has_permission(uid_t uid, perm_t perm, pid_t spid);
|
/external/ipsec-tools/src/libipsec/ |
test-policy.c | 230 int spid; local 283 spid = test2sub(so); 285 printf("spdget(%u)\n", spid); 286 if (pfkey_send_spdget(so, spid) < 0) 295 if (pfkey_send_spddelete2(so, spid) < 0) 305 spid = test2sub(so);
|
/external/dbus/bus/ |
selinux.c | 480 unsigned long spid; local 488 if (!dbus_connection_get_unix_process_id (connection, &spid)) 489 spid = 0; 500 if (spid) 502 if (!_dbus_string_append (&auxdata, " spid=")) 505 if (!_dbus_string_append_uint (&auxdata, spid)) 551 unsigned long spid, tpid; local 559 if (!sender || !dbus_connection_get_unix_process_id (sender, &spid)) 560 spid = 0; 607 if (spid) [all...] |
/frameworks/av/drm/drmserver/ |
DrmManagerService.cpp | 61 bool DrmManagerService::selinuxIsProtectedCallAllowed(pid_t spid, drm_perm_t perm) { 70 if (getpidcon(spid, &sctx) != 0) { 71 ALOGE("SELinux: getpidcon(pid=%d) failed.\n", spid); 88 pid_t spid = ipcState->getCallingPid(); local 92 return selinuxIsProtectedCallAllowed(spid, perm);
|
/external/toybox/lib/ |
xwrap.c | 639 char pidfile[256], spid[32]; local 654 spid[xread(fd, spid, sizeof(spid)-1)] = 0; 656 pid = atoi(spid); 664 xwrite(fd, spid, sprintf(spid, "%ld\n", (long)getpid()));
|
/external/ipsec-tools/src/racoon/ |
handler.c | 437 getph2byspid(spid) 438 u_int32_t spid; 447 if (p->spid == spid) 490 getph2byid(src, dst, spid) 492 u_int32_t spid; 497 if (spid == p->spid &&
|
policy.c | 164 getspbyspid(spid) 165 u_int32_t spid; 170 if (p->id == spid)
|