Home
last modified time | relevance | path

Searched refs:process (Results 1 – 25 of 563) sorted by relevance

12345678910>>...23

/system/extras/simpleperf/scripts/inferno/
Dinferno.py89 def parse_samples(process, args, sample_filter_fn): argument
112 process.cmd = lib.GetRecordCmd()
116 process.props['ro.product.manufacturer'] = manufacturer
117 process.props['ro.product.model'] = model
118 process.props['ro.product.name'] = name
120 process.props['trace_offcpu'] = True
125 process.props['trace_offcpu'] = False
136 process.add_sample(sample, symbol, callchain)
138 if process.pid == 0:
139 main_threads = [thread for thread in process.threads.values() if thread.tid == thread.pid]
[all …]
/system/extras/simpleperf/
DJITDebugReader.cpp199 Process& process = it->second; in ReadAllProcesses() local
200 ReadProcess(process, &debug_info); in ReadAllProcesses()
201 if (process.died) { in ReadAllProcesses()
202 LOG(DEBUG) << "Stop monitoring process " << process.pid; in ReadAllProcesses()
227 void JITDebugReader::ReadProcess(Process& process, std::vector<JITDebugInfo>* debug_info) { in ReadProcess() argument
228 if (process.died || (!process.initialized && !InitializeProcess(process))) { in ReadProcess()
234 if (!ReadDescriptors(process, &jit_descriptor, &dex_descriptor)) { in ReadProcess()
238 if (jit_descriptor.action_seqlock == process.last_jit_descriptor.action_seqlock && in ReadProcess()
239 dex_descriptor.action_seqlock == process.last_dex_descriptor.action_seqlock) { in ReadProcess()
247 if (!ReadDescriptors(process, &tmp_jit_descriptor, &tmp_dex_descriptor)) { in ReadProcess()
[all …]
Dcmd_trace_sched.cpp305 ProcessInfo& process = process_map[thread.process_id]; in BuildProcessInfo() local
306 process.process_id = thread.process_id; in BuildProcessInfo()
308 process.name = thread.name; in BuildProcessInfo()
310 process.total_runtime_in_ns += thread.total_runtime_in_ns; in BuildProcessInfo()
311 process.threads.push_back(&thread); in BuildProcessInfo()
324 for (auto& process : processes) { in BuildProcessInfo() local
325 std::sort(process.threads.begin(), process.threads.end(), sort_thread); in BuildProcessInfo()
332 for (auto& process : processes) { in ReportProcessInfo() local
333 total_runtime_in_ns += process.total_runtime_in_ns; in ReportProcessInfo()
344 for (auto& process : processes) { in ReportProcessInfo() local
[all …]
DJITDebugReader.h147 void ReadProcess(Process& process, std::vector<JITDebugInfo>* debug_info);
148 bool InitializeProcess(Process& process);
151 bool ReadRemoteMem(Process& process, uint64_t remote_addr, uint64_t size, void* data);
152 bool ReadDescriptors(Process& process, Descriptor* jit_descriptor, Descriptor* dex_descriptor);
157 bool ReadNewCodeEntries(Process& process, const Descriptor& descriptor,
161 bool ReadNewCodeEntriesImpl(Process& process, const Descriptor& descriptor,
165 void ReadJITCodeDebugInfo(Process& process, const std::vector<CodeEntry>& jit_entries,
167 void ReadDexFileDebugInfo(Process& process, const std::vector<CodeEntry>& dex_entries,
/system/core/libmemunreachable/
DREADME.md6 …on on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimi…
17 …ble is loaded by zygote and can be triggered with `dumpsys -t 600 meminfo --unreachable [process]`.
19 To enable malloc\_debug backtraces on allocations for a single app process on a userdebug device, u…
23 adb shell setprop wrap.[process] "\$\@"
27 …d restart the app, trigger the leak, and then run `dumpsys -t 600 meminfo --unreachable [process]`.
33 adb shell setprop wrap.[process] "''"
56 … is divided into three processes - the original process, the collection process, and the sweeper p…
58 1. *Original process*: Leak detection is requested by calling `GetUnreachableMemory()`
60process is spawned. The collection process, created using clone, is similar to a normal `fork()` …
61 4. *Collection process*: All threads in the original process are paused with `ptrace()`.
[all …]
/system/netd/server/
DIptablesRestoreController.cpp209 std::unique_ptr<IptablesProcess> *process = in sendCommand() local
220 IptablesProcess *existingProcess = process->get(); in sendCommand()
234 process->reset(newProcess); in sendCommand()
237 if (!android::base::WriteFully((*process)->stdIn, command.data(), command.length())) { in sendCommand()
242 if (!android::base::WriteFully((*process)->stdIn, PING, PING_SIZE)) { in sendCommand()
247 if (!drainAndWaitForAck(*process, command, output)) { in sendCommand()
255 void IptablesRestoreController::maybeLogStderr(const std::unique_ptr<IptablesProcess> &process, in maybeLogStderr() argument
257 if (process->errBuf.empty()) { in maybeLogStderr()
267 command.c_str(), process->errBuf.c_str()); in maybeLogStderr()
268 process->errBuf.clear(); in maybeLogStderr()
[all …]
/system/sepolicy/prebuilts/api/28.0/
Dvendor_sepolicy.cil477 (allow init_28_0 hal_audio_default (process (transition)))
479 (dontaudit init_28_0 hal_audio_default (process (noatsecure)))
480 (allow init_28_0 hal_audio_default (process (siginh rlimitinh)))
481 (typetransition init_28_0 hal_audio_default_exec process hal_audio_default)
486 (allow init_28_0 hal_audiocontrol_default (process (transition)))
488 (dontaudit init_28_0 hal_audiocontrol_default (process (noatsecure)))
489 (allow init_28_0 hal_audiocontrol_default (process (siginh rlimitinh)))
490 (typetransition init_28_0 hal_audiocontrol_default_exec process hal_audiocontrol_default)
495 (allow init_28_0 hal_authsecret_default (process (transition)))
497 (dontaudit init_28_0 hal_authsecret_default (process (noatsecure)))
[all …]
/system/core/libunwindstack/tests/
DDwarfSectionTest.cpp102 MemoryFake process; in TEST_F() local
103 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
107 ASSERT_TRUE(section_->Step(0x1000, nullptr, &process, &finished)); in TEST_F()
128 MemoryFake process; in TEST_F() local
129 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
133 ASSERT_TRUE(section_->Step(0x1000, nullptr, &process, &finished)); in TEST_F()
134 ASSERT_TRUE(section_->Step(0x1000, nullptr, &process, &finished)); in TEST_F()
135 ASSERT_TRUE(section_->Step(0x1500, nullptr, &process, &finished)); in TEST_F()
148 MemoryFake process; in TEST_F() local
149 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
[all …]
/system/sepolicy/private/
Dllkd.te19 allow llkd domain:process sigkill;
32 }:process ptrace;
35 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
49 neverallow { domain -init } llkd:process { dyntransition transition };
50 neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace;
53 neverallow * llkd:process noatsecure;
Dsystem_server_startup.te7 allow system_server_startup self:process execmem;
19 allow system_server_startup self:process setcurrent;
20 allow system_server_startup system_server:process dyntransition;
23 allow system_server_startup zygote:process sigchld;
Dapp_zygote.te11 # Set the UID/GID of the process.
17 allow app_zygote self:process setcurrent;
18 allow app_zygote isolated_app:process dyntransition;
21 allow app_zygote self:process execmem;
28 # get system_server process group
29 allow app_zygote system_server:process getpgid;
32 allow app_zygote isolated_app:process setpgid;
50 allow app_zygote zygote:process sigchld;
72 neverallow app_zygote { domain -isolated_app }:process dyntransition;
75 neverallow app_zygote { domain -crash_dump }:process transition;
[all …]
Dcrash_dump.te19 }:process { ptrace signal sigchld sigstop sigkill };
21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill };
46 }:process { signal sigstop sigkill };
48 neverallow crash_dump self:process ptrace;
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
36 allow webview_zygote self:process execmem;
44 allow webview_zygote system_server:process getpgid;
47 allow webview_zygote isolated_app:process setpgid;
71 allow webview_zygote zygote:process sigchld;
85 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
88 neverallow webview_zygote { domain -crash_dump }:process transition;
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dllkd.te19 allow llkd domain:process sigkill;
32 }:process ptrace;
35 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
49 neverallow { domain -init } llkd:process { dyntransition transition };
50 neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace;
53 neverallow * llkd:process noatsecure;
Dsystem_server_startup.te7 allow system_server_startup self:process execmem;
19 allow system_server_startup self:process setcurrent;
20 allow system_server_startup system_server:process dyntransition;
23 allow system_server_startup zygote:process sigchld;
Dapp_zygote.te11 # Set the UID/GID of the process.
17 allow app_zygote self:process setcurrent;
18 allow app_zygote isolated_app:process dyntransition;
21 allow app_zygote self:process execmem;
28 # get system_server process group
29 allow app_zygote system_server:process getpgid;
32 allow app_zygote isolated_app:process setpgid;
50 allow app_zygote zygote:process sigchld;
72 neverallow app_zygote { domain -isolated_app }:process dyntransition;
75 neverallow app_zygote { domain -crash_dump }:process transition;
[all …]
Dcrash_dump.te19 }:process { ptrace signal sigchld sigstop sigkill };
21 allow crash_dump { apexd llkd logd vold }:process { ptrace signal sigchld sigstop sigkill };
46 }:process { signal sigstop sigkill };
48 neverallow crash_dump self:process ptrace;
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
36 allow webview_zygote self:process execmem;
44 allow webview_zygote system_server:process getpgid;
47 allow webview_zygote isolated_app:process setpgid;
71 allow webview_zygote zygote:process sigchld;
85 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
88 neverallow webview_zygote { domain -crash_dump }:process transition;
[all …]
/system/extras/boottime_tools/io_analysis/
Dcheck_io_trace.py51 def __init__(self, process): argument
52 self.process = process
63 if process[-1] == '*':
64 print "Process name starts with", process[:-1]
67 print "Process name", process
80 process = match.group(7)
82 if not process.startswith(self.process[:-1]):
84 self.processes.add(process)
86 if process != self.process:
/system/extras/ANRdaemon/
DREADME20 not running. This is because the daemon process turns off tracing when CPU usage
22 from some other process to the daemon. Then sometime later (say 20 secs later),
23 when the CPU usage becomes high and the daemon process turn on tracing again,
25 daemon process to some other process. Due to this artifact, when the raw trace
26 file is parsed by systrace.py, the daemon process is shown as running for the
28 entries regarding the daemon process indicates the daemon process ran continuously
/system/sepolicy/prebuilts/api/26.0/private/
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
10 # resulting process into webview_zygote domain.
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
58 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
61 neverallow webview_zygote { domain -crash_dump }:process transition;
68 neverallow { domain -init } webview_zygote:process transition;
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
10 # resulting process into webview_zygote domain.
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
62 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
65 neverallow webview_zygote { domain -crash_dump }:process transition;
72 neverallow { domain -init } webview_zygote:process transition;
[all …]
/system/extras/simpleperf/app_api/java/com/android/simpleperf/
DProfileSession.java204 Process process = new ProcessBuilder() in findSimpleperfInTempDir() local
206 process.waitFor(); in findSimpleperfInTempDir()
216 Process process = new ProcessBuilder() in findSimpleperfInTempDir() local
218 process.waitFor(); in findSimpleperfInTempDir()
227 Process process; in checkIfPerfEnabled() local
229 process = new ProcessBuilder() in checkIfPerfEnabled()
236 process.waitFor(); in checkIfPerfEnabled()
239 value = readInputStream(process.getInputStream()); in checkIfPerfEnabled()
/system/core/init/
Dcompare-bootcharts.py125 process = process_map[proc_name]
127 process = {'start_time': int(segs[21])}
128 process_map[proc_name] = process
130 process['last_tick'] = timestamp
/system/sepolicy/prebuilts/api/28.0/public/
Dlmkd.te25 allow lmkd appdomain:process { setsched sigkill };
38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
52 neverallow * lmkd:process noatsecure;

12345678910>>...23