/system/chre/platform/shared/ |
D | memory_manager.cc | 23 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument 28 ": allocation count exceeded limit.", app->getInstanceId()); in nanoappAlloc() 31 ": not enough space.", app->getInstanceId()); in nanoappAlloc() 34 doAlloc(app, sizeof(AllocHeader) + bytes)); in nanoappAlloc() 37 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc() 44 header->data.instanceId = app->getInstanceId(); in nanoappAlloc() 52 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument 60 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree() 62 app->getInstanceId(), header->data.instanceId); in nanoappFree() 65 size_t nanoAppTotalAllocatedBytes = app->getTotalAllocatedBytes(); in nanoappFree() [all …]
|
/system/chre/core/tests/ |
D | memory_manager_test.cc | 39 Nanoapp app; in TEST() local 40 void *ptr = manager.nanoappAlloc(&app, 1); in TEST() 44 manager.nanoappFree(&app, ptr); in TEST() 51 Nanoapp app; in TEST() local 52 manager.nanoappFree(&app, nullptr); in TEST() 59 Nanoapp app; in TEST() local 60 void *ptr = manager.nanoappAlloc(&app, 0); in TEST() 68 Nanoapp app; in TEST() local 69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST() 76 Nanoapp app; in TEST() local [all …]
|
/system/chre/core/ |
D | event_loop.cc | 44 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument 47 if (app != nullptr && info != nullptr) { in populateNanoappInfo() 48 info->appId = app->getAppId(); in populateNanoappInfo() 49 info->version = app->getAppVersion(); in populateNanoappInfo() 50 info->instanceId = app->getInstanceId(); in populateNanoappInfo() 65 for (const UniquePtr<Nanoapp>& app : mNanoapps) { in findNanoappInstanceIdByAppId() local 66 if (app->getAppId() == appId) { in findNanoappInstanceIdByAppId() 67 *instanceId = app->getInstanceId(); in findNanoappInstanceIdByAppId() 304 Nanoapp *app = lookupAppByAppId(appId); in populateNanoappInfoForAppId() local 305 return populateNanoappInfo(app, info); in populateNanoappInfoForAppId() [all …]
|
/system/extras/tests/workloads/ |
D | systemapps.sh | 156 for app in $appList 158 vout Starting $app... 162 resetJankyFrames $(getPackageName $app) 164 tmpTraceOut="$tmpTraceOutBase-$app.out" 166 startInstramentation "$app-$cur" 169 startInstramentation "$app-$cur" 0 176 t=$(startActivity $app) 178 t=$(forceStartActivity $app) 183 set -- $(getJankyFrames $(getPackageName $app)) 213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP… [all …]
|
D | youtube.sh | 8 app=youtube 90 resetJankyFrames $(getPackageName $app) 94 t=$(startActivity $app) 117 set -- $(getJankyFrames $(getPackageName $app)) 136 resetJankyFrames $(getPackageName $app)
|
D | chromefling.sh | 11 app=chrome 96 resetJankyFrames $(getPackageName $app) 103 t=$(startActivity $app) 119 set -- $(getJankyFrames $(getPackageName $app)) 140 resetJankyFrames $(getPackageName $app)
|
/system/core/libnativeloader/test/ |
D | runtest.sh | 9 adb shell am start -n android.test.app.system/android.test.app.TestActivity 10 adb shell am start -n android.test.app.vendor/android.test.app.TestActivity 11 adb logcat | grep android.test.app
|
/system/chre/platform/slpi/ |
D | memory_manager.cc | 24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 25 if (app->isUimgApp()) { in doAlloc() 32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 33 if (app->isUimgApp()) { in doFree()
|
/system/chre/platform/include/chre/platform/ |
D | memory_manager.h | 48 void *nanoappAlloc(Nanoapp *app, uint32_t bytes); 56 void nanoappFree(Nanoapp *app, void *ptr); 142 void *doAlloc(Nanoapp *app, uint32_t size); 149 void doFree(Nanoapp *app, void *ptr);
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
D | runas_app.te | 9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf, 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
/system/sepolicy/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
D | runas_app.te | 9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf, 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
/system/update_engine/ |
D | omaha_request_action.cc | 549 OmahaParserData::App app; in ParserHandlerStart() local 551 app.id = attrs[kAttrAppId]; in ParserHandlerStart() 554 app.cohort_set = true; in ParserHandlerStart() 555 app.cohort = attrs[kAttrCohort]; in ParserHandlerStart() 558 app.cohorthint_set = true; in ParserHandlerStart() 559 app.cohorthint = attrs[kAttrCohortHint]; in ParserHandlerStart() 562 app.cohortname_set = true; in ParserHandlerStart() 563 app.cohortname = attrs[kAttrCohortName]; in ParserHandlerStart() 565 data->apps.push_back(std::move(app)); in ParserHandlerStart() 910 bool ParsePackage(OmahaParserData::App* app, in ParsePackage() argument [all …]
|
/system/extras/app-launcher/ |
D | README | 1 Instructions to Run (and modify) app-launcher script 4 Introduction: app-launcher is a script that launches apps many times, 17 Launching app-launcher : 18 app-launcher -a|-b|-u [-c|-v|-s <serial number>] num-iterations 43 To add new apps, launch app manually and grep for package name + 47 Adding support for new Devices to app-launcher : 56 Adding new Metrics to app-launcher : 67 way to find the package and activity for the app of interest is to 68 launch the app and then grep for it in logcat to find the 84 adb shell 'am start -W -n com.google.android.youtube/com.google.android.apps.youtube.app.WatchWhile…
|
D | Android.bp | 29 name: "app-launcher", 30 src: "app-launcher",
|
/system/extras/boottime_tools/bootanalyze/stressfs/ |
D | proguard.flags | 2 -keep public class * extends android.app.Activity 3 -keep public class * extends android.app.Service
|
/system/chre/platform/linux/ |
D | memory_manager.cc | 23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 27 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | runas.te | 17 # The app's data dir may be accessed through a symlink. 20 # run-as checks and changes to the app data dir. 24 # run-as switches to the app UID/GID. 27 # run-as switches to the app security context.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 11 ### seapp_contexts for any app with UID between APP_AID (10000) 12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 16 ### a system app into a specific domain, add a signer entry for it to 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 44 # Read and write system app data files passed over Binder. 50 # Rules migrated from old app domains coalesced into untrusted_app. 88 # gdbserver for ndk-gdb ptrace attaches to app process. 100 # Allow untrusted apps read / execute access to /vendor/app for there can 102 # TODO (b/37784178) Consider creating a special type for /vendor/app installed
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 11 ### seapp_contexts for any app with UID between APP_AID (10000) 12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 16 ### a system app into a specific domain, add a signer entry for it to 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 47 # Read and write system app data files passed over Binder. 53 # Rules migrated from old app domains coalesced into untrusted_app. 90 # gdbserver for ndk-gdb ptrace attaches to app process. 102 # Allow untrusted apps read / execute access to /vendor/app for there can 104 # TODO (b/37784178) Consider creating a special type for /vendor/app installed
|
/system/sepolicy/public/ |
D | runas.te | 18 # The app's data dir may be accessed through a symlink. 21 # run-as checks and changes to the app data dir. 25 # run-as switches to the app UID/GID. 28 # run-as switches to the app security context.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | runas.te | 18 # The app's data dir may be accessed through a symlink. 21 # run-as checks and changes to the app data dir. 25 # run-as switches to the app UID/GID. 28 # run-as switches to the app security context.
|
/system/core/libnativeloader/test/src/android/test/app/ |
D | TestActivity.java | 17 package android.test.app; 19 import android.app.Activity;
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 11 ### seapp_contexts for any app with UID between APP_AID (10000) 12 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 16 ### a system app into a specific domain, add a signer entry for it to 21 ### Note that rules that should apply to all untrusted apps must be in app.te or also 56 # Read and write system app data files passed over Binder. 62 # Rules migrated from old app domains coalesced into untrusted_app. 98 # gdbserver for ndk-gdb ptrace attaches to app process. 110 # Allow untrusted apps read / execute access to /vendor/app for there can 112 # TODO (b/37784178) Consider creating a special type for /vendor/app installed [all …]
|