Home
last modified time | relevance | path

Searched refs:processes (Results 1 – 25 of 199) sorted by relevance

12345678

/system/core/lmkd/
DREADME.md18 non-essential processes was handled by a kernel lowmemorykiller driver.
37 ro.lmk.low: min oom_adj score for processes eligible to be
41 ro.lmk.medium: min oom_adj score for processes eligible to be
43 (non-essential processes)
45 ro.lmk.critical: min oom_adj score for processes eligible to be
47 (all processes)
/system/extras/simpleperf/
Dcmd_trace_sched.cpp106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes);
133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local
134 ReportProcessInfo(processes); in Run()
313 std::vector<ProcessInfo> processes; in BuildProcessInfo() local
315 processes.push_back(pair.second); in BuildProcessInfo()
323 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo()
324 for (auto& process : processes) { in BuildProcessInfo()
327 return processes; in BuildProcessInfo()
330 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument
332 for (auto& process : processes) { in ReportProcessInfo()
[all …]
Devent_selection_set.h115 void AddMonitoredProcesses(const std::set<pid_t>& processes) { in AddMonitoredProcesses() argument
116 processes_.insert(processes.begin(), processes.end()); in AddMonitoredProcesses()
/system/sepolicy/prebuilts/api/29.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
42 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
Dviewcompiler.te8 # own label, which differs from other labels created by other processes.
10 # processes.
/system/sepolicy/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
42 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
Dviewcompiler.te8 # own label, which differs from other labels created by other processes.
10 # processes.
/system/sepolicy/vendor/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
/system/core/libprocessgroup/
Dprocessgroup.cpp281 int processes = 0; in DoKillProcessGroupOnce() local
283 processes++; in DoKillProcessGroupOnce()
329 return feof(fd.get()) ? processes : -1; in DoKillProcessGroupOnce()
348 int processes; in KillProcessGroup() local
349 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup()
350 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup()
359 if (processes < 0) { in KillProcessGroup()
374 if (processes == 0) { in KillProcessGroup()
383 << " in " << static_cast<int>(ms) << "ms, " << processes in KillProcessGroup()
/system/sepolicy/prebuilts/api/27.0/private/
Dincidentd.te12 # Allow incidentd to scan through /proc/pid for all processes
16 # Send signals to processes
34 # Signal java processes to dump their stack and get the results
39 # Signal native processes to dump their stack.
58 # Reading /proc/PID/maps of other processes
/system/extras/iotop/
Diotop.cpp103 bool processes = false; in main() local
153 processes = true; in main()
190 if (processes) { in main()
209 if (processes) { in main()
216 if (processes) { in main()
/system/sepolicy/prebuilts/api/26.0/private/
Dincidentd.te12 # Allow incidentd to scan through /proc/pid for all processes
16 # Send signals to processes
34 # Signal java processes to dump their stack and get the results
39 # Signal native processes to dump their stack.
58 # Reading /proc/PID/maps of other processes
Ddexoptanalyzer.te7 # own label, which differs from other labels created by other processes.
9 #processes.
/system/sepolicy/prebuilts/api/29.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/prebuilts/api/27.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/prebuilts/api/26.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/sepolicy/prebuilts/api/28.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
Dwebview_zygote.te2 # isolated_app processes for rendering untrusted web content.
/system/extras/boottime_tools/io_analysis/
Dcheck_io_trace_all.py306 self.processes = {} # key: pid, v : SchedProcess
337 out_process = self.processes.get(out_pid)
340 self.processes[out_pid] = out_process
341 in_process = self.processes.get(in_pid)
344 self.processes[in_pid] = in_process
355 process = self.processes.get(pid)
358 self.processes[pid] = process
362 sorted_by_total_execution = collections.OrderedDict(sorted(self.processes.items(), \
/system/sepolicy/prebuilts/api/28.0/private/
Dincidentd.te9 # Allow incidentd to scan through /proc/pid for all processes
63 # Signal java processes to dump their stack and get the results
66 # Signal native processes to dump their stack.
96 # Reading /proc/PID/maps of other processes
103 # Send signals to processes

12345678