/system/core/lmkd/ |
D | README.md | 18 non-essential processes was handled by a kernel lowmemorykiller driver. 37 ro.lmk.low: min oom_adj score for processes eligible to be 41 ro.lmk.medium: min oom_adj score for processes eligible to be 43 (non-essential processes) 45 ro.lmk.critical: min oom_adj score for processes eligible to be 47 (all processes)
|
/system/extras/simpleperf/ |
D | cmd_trace_sched.cpp | 106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes); 133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local 134 ReportProcessInfo(processes); in Run() 313 std::vector<ProcessInfo> processes; in BuildProcessInfo() local 315 processes.push_back(pair.second); in BuildProcessInfo() 323 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo() 324 for (auto& process : processes) { in BuildProcessInfo() 327 return processes; in BuildProcessInfo() 330 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument 332 for (auto& process : processes) { in ReportProcessInfo() [all …]
|
D | event_selection_set.h | 115 void AddMonitoredProcesses(const std::set<pid_t>& processes) { in AddMonitoredProcesses() argument 116 processes_.insert(processes.begin(), processes.end()); in AddMonitoredProcesses()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 42 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
D | viewcompiler.te | 8 # own label, which differs from other labels created by other processes. 10 # processes.
|
/system/sepolicy/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 42 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
D | viewcompiler.te | 8 # own label, which differs from other labels created by other processes. 10 # processes.
|
/system/sepolicy/vendor/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes 8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
|
/system/core/libprocessgroup/ |
D | processgroup.cpp | 281 int processes = 0; in DoKillProcessGroupOnce() local 283 processes++; in DoKillProcessGroupOnce() 329 return feof(fd.get()) ? processes : -1; in DoKillProcessGroupOnce() 348 int processes; in KillProcessGroup() local 349 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup() 350 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup() 359 if (processes < 0) { in KillProcessGroup() 374 if (processes == 0) { in KillProcessGroup() 383 << " in " << static_cast<int>(ms) << "ms, " << processes in KillProcessGroup()
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | incidentd.te | 12 # Allow incidentd to scan through /proc/pid for all processes 16 # Send signals to processes 34 # Signal java processes to dump their stack and get the results 39 # Signal native processes to dump their stack. 58 # Reading /proc/PID/maps of other processes
|
/system/extras/iotop/ |
D | iotop.cpp | 103 bool processes = false; in main() local 153 processes = true; in main() 190 if (processes) { in main() 209 if (processes) { in main() 216 if (processes) { in main()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | incidentd.te | 12 # Allow incidentd to scan through /proc/pid for all processes 16 # Send signals to processes 34 # Signal java processes to dump their stack and get the results 39 # Signal native processes to dump their stack. 58 # Reading /proc/PID/maps of other processes
|
D | dexoptanalyzer.te | 7 # own label, which differs from other labels created by other processes. 9 #processes.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
D | webview_zygote.te | 2 # isolated_app processes for rendering untrusted web content.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
D | webview_zygote.te | 2 # isolated_app processes for rendering untrusted web content.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
D | webview_zygote.te | 2 # isolated_app processes for rendering untrusted web content.
|
/system/extras/boottime_tools/io_analysis/ |
D | check_io_trace_all.py | 306 self.processes = {} # key: pid, v : SchedProcess 337 out_process = self.processes.get(out_pid) 340 self.processes[out_pid] = out_process 341 in_process = self.processes.get(in_pid) 344 self.processes[in_pid] = in_process 355 process = self.processes.get(pid) 358 self.processes[pid] = process 362 sorted_by_total_execution = collections.OrderedDict(sorted(self.processes.items(), \
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | incidentd.te | 9 # Allow incidentd to scan through /proc/pid for all processes 63 # Signal java processes to dump their stack and get the results 66 # Signal native processes to dump their stack. 96 # Reading /proc/PID/maps of other processes 103 # Send signals to processes
|