Home
last modified time | relevance | path

Searched refs:app (Results 1 – 25 of 373) sorted by relevance

12345678910>>...15

/system/chre/platform/shared/
Dmemory_manager.cc23 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument
28 ": allocation count exceeded limit.", app->getInstanceId()); in nanoappAlloc()
31 ": not enough space.", app->getInstanceId()); in nanoappAlloc()
34 doAlloc(app, sizeof(AllocHeader) + bytes)); in nanoappAlloc()
37 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc()
44 header->data.instanceId = app->getInstanceId(); in nanoappAlloc()
52 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument
60 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree()
62 app->getInstanceId(), header->data.instanceId); in nanoappFree()
65 size_t nanoAppTotalAllocatedBytes = app->getTotalAllocatedBytes(); in nanoappFree()
[all …]
/system/chre/core/tests/
Dmemory_manager_test.cc39 Nanoapp app; in TEST() local
40 void *ptr = manager.nanoappAlloc(&app, 1); in TEST()
44 manager.nanoappFree(&app, ptr); in TEST()
51 Nanoapp app; in TEST() local
52 manager.nanoappFree(&app, nullptr); in TEST()
59 Nanoapp app; in TEST() local
60 void *ptr = manager.nanoappAlloc(&app, 0); in TEST()
68 Nanoapp app; in TEST() local
69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST()
76 Nanoapp app; in TEST() local
[all …]
/system/chre/core/
Devent_loop.cc44 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument
47 if (app != nullptr && info != nullptr) { in populateNanoappInfo()
48 info->appId = app->getAppId(); in populateNanoappInfo()
49 info->version = app->getAppVersion(); in populateNanoappInfo()
50 info->instanceId = app->getInstanceId(); in populateNanoappInfo()
65 for (const UniquePtr<Nanoapp>& app : mNanoapps) { in findNanoappInstanceIdByAppId() local
66 if (app->getAppId() == appId) { in findNanoappInstanceIdByAppId()
67 *instanceId = app->getInstanceId(); in findNanoappInstanceIdByAppId()
304 Nanoapp *app = lookupAppByAppId(appId); in populateNanoappInfoForAppId() local
305 return populateNanoappInfo(app, info); in populateNanoappInfoForAppId()
[all …]
/system/extras/tests/workloads/
Dsystemapps.sh156 for app in $appList
158 vout Starting $app...
162 resetJankyFrames $(getPackageName $app)
164 tmpTraceOut="$tmpTraceOutBase-$app.out"
166 startInstramentation "$app-$cur"
169 startInstramentation "$app-$cur" 0
176 t=$(startActivity $app)
178 t=$(forceStartActivity $app)
183 set -- $(getJankyFrames $(getPackageName $app))
213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP…
[all …]
Dyoutube.sh8 app=youtube
90 resetJankyFrames $(getPackageName $app)
94 t=$(startActivity $app)
117 set -- $(getJankyFrames $(getPackageName $app))
136 resetJankyFrames $(getPackageName $app)
Dchromefling.sh11 app=chrome
96 resetJankyFrames $(getPackageName $app)
103 t=$(startActivity $app)
119 set -- $(getJankyFrames $(getPackageName $app))
140 resetJankyFrames $(getPackageName $app)
/system/core/libnativeloader/test/
Druntest.sh9 adb shell am start -n android.test.app.system/android.test.app.TestActivity
10 adb shell am start -n android.test.app.vendor/android.test.app.TestActivity
11 adb logcat | grep android.test.app
/system/chre/platform/slpi/
Dmemory_manager.cc24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument
25 if (app->isUimgApp()) { in doAlloc()
32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
33 if (app->isUimgApp()) { in doFree()
/system/chre/platform/include/chre/platform/
Dmemory_manager.h48 void *nanoappAlloc(Nanoapp *app, uint32_t bytes);
56 void nanoappFree(Nanoapp *app, void *ptr);
142 void *doAlloc(Nanoapp *app, uint32_t size);
149 void doFree(Nanoapp *app, void *ptr);
/system/sepolicy/prebuilts/api/29.0/private/
Drs.te10 # Read files from the app home directory.
14 # Cleanup app_exec_data_file files in the app home directory.
22 # Read contents of app apks
29 # File descriptors passed from app to renderscript
32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
Drunas_app.te9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf,
13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
/system/sepolicy/private/
Drs.te10 # Read files from the app home directory.
14 # Cleanup app_exec_data_file files in the app home directory.
22 # Read contents of app apks
29 # File descriptors passed from app to renderscript
32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
Drunas_app.te9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf,
13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
/system/update_engine/
Domaha_request_action.cc549 OmahaParserData::App app; in ParserHandlerStart() local
551 app.id = attrs[kAttrAppId]; in ParserHandlerStart()
554 app.cohort_set = true; in ParserHandlerStart()
555 app.cohort = attrs[kAttrCohort]; in ParserHandlerStart()
558 app.cohorthint_set = true; in ParserHandlerStart()
559 app.cohorthint = attrs[kAttrCohortHint]; in ParserHandlerStart()
562 app.cohortname_set = true; in ParserHandlerStart()
563 app.cohortname = attrs[kAttrCohortName]; in ParserHandlerStart()
565 data->apps.push_back(std::move(app)); in ParserHandlerStart()
910 bool ParsePackage(OmahaParserData::App* app, in ParsePackage() argument
[all …]
/system/extras/app-launcher/
DREADME1 Instructions to Run (and modify) app-launcher script
4 Introduction: app-launcher is a script that launches apps many times,
17 Launching app-launcher :
18 app-launcher -a|-b|-u [-c|-v|-s <serial number>] num-iterations
43 To add new apps, launch app manually and grep for package name +
47 Adding support for new Devices to app-launcher :
56 Adding new Metrics to app-launcher :
67 way to find the package and activity for the app of interest is to
68 launch the app and then grep for it in logcat to find the
84 adb shell 'am start -W -n com.google.android.youtube/com.google.android.apps.youtube.app.WatchWhile…
DAndroid.bp29 name: "app-launcher",
30 src: "app-launcher",
/system/extras/boottime_tools/bootanalyze/stressfs/
Dproguard.flags2 -keep public class * extends android.app.Activity
3 -keep public class * extends android.app.Service
/system/chre/platform/linux/
Dmemory_manager.cc23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument
27 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
/system/sepolicy/prebuilts/api/28.0/public/
Drunas.te17 # The app's data dir may be accessed through a symlink.
20 # run-as checks and changes to the app data dir.
24 # run-as switches to the app UID/GID.
27 # run-as switches to the app security context.
/system/sepolicy/prebuilts/api/26.0/private/
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
11 ### seapp_contexts for any app with UID between APP_AID (10000)
12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo
16 ### a system app into a specific domain, add a signer entry for it to
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
44 # Read and write system app data files passed over Binder.
50 # Rules migrated from old app domains coalesced into untrusted_app.
88 # gdbserver for ndk-gdb ptrace attaches to app process.
100 # Allow untrusted apps read / execute access to /vendor/app for there can
102 # TODO (b/37784178) Consider creating a special type for /vendor/app installed
/system/sepolicy/prebuilts/api/27.0/private/
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
11 ### seapp_contexts for any app with UID between APP_AID (10000)
12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo
16 ### a system app into a specific domain, add a signer entry for it to
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
47 # Read and write system app data files passed over Binder.
53 # Rules migrated from old app domains coalesced into untrusted_app.
90 # gdbserver for ndk-gdb ptrace attaches to app process.
102 # Allow untrusted apps read / execute access to /vendor/app for there can
104 # TODO (b/37784178) Consider creating a special type for /vendor/app installed
/system/sepolicy/public/
Drunas.te18 # The app's data dir may be accessed through a symlink.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
/system/sepolicy/prebuilts/api/29.0/public/
Drunas.te18 # The app's data dir may be accessed through a symlink.
21 # run-as checks and changes to the app data dir.
25 # run-as switches to the app UID/GID.
28 # run-as switches to the app security context.
/system/core/libnativeloader/test/src/android/test/app/
DTestActivity.java17 package android.test.app;
19 import android.app.Activity;
/system/sepolicy/prebuilts/api/28.0/private/
Duntrusted_app_all.te4 ### This file defines the rules shared by all untrusted app domains except
11 ### seapp_contexts for any app with UID between APP_AID (10000)
12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo
16 ### a system app into a specific domain, add a signer entry for it to
21 ### Note that rules that should apply to all untrusted apps must be in app.te or also
56 # Read and write system app data files passed over Binder.
62 # Rules migrated from old app domains coalesced into untrusted_app.
98 # gdbserver for ndk-gdb ptrace attaches to app process.
110 # Allow untrusted apps read / execute access to /vendor/app for there can
112 # TODO (b/37784178) Consider creating a special type for /vendor/app installed
[all …]

12345678910>>...15