/system/chre/platform/shared/ |
D | memory_manager.cc | 23 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument 29 app->getInstanceId()); in nanoappAlloc() 33 app->getInstanceId()); in nanoappAlloc() 36 static_cast<AllocHeader *>(doAlloc(app, sizeof(AllocHeader) + bytes)); in nanoappAlloc() 39 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc() 46 header->data.instanceId = app->getInstanceId(); in nanoappAlloc() 54 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument 62 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree() 64 app->getInstanceId(), header->data.instanceId); in nanoappFree() 67 size_t nanoAppTotalAllocatedBytes = app->getTotalAllocatedBytes(); in nanoappFree() [all …]
|
/system/chre/core/tests/ |
D | memory_manager_test.cc | 39 Nanoapp app; in TEST() local 40 void *ptr = manager.nanoappAlloc(&app, 1); in TEST() 44 manager.nanoappFree(&app, ptr); in TEST() 51 Nanoapp app; in TEST() local 52 manager.nanoappFree(&app, nullptr); in TEST() 59 Nanoapp app; in TEST() local 60 void *ptr = manager.nanoappAlloc(&app, 0); in TEST() 68 Nanoapp app; in TEST() local 69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST() 76 Nanoapp app; in TEST() local [all …]
|
/system/chre/core/ |
D | event_loop.cc | 49 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument 52 if (app != nullptr && info != nullptr) { in populateNanoappInfo() 53 info->appId = app->getAppId(); in populateNanoappInfo() 54 info->version = app->getAppVersion(); in populateNanoappInfo() 55 info->instanceId = app->getInstanceId(); in populateNanoappInfo() 70 for (const UniquePtr<Nanoapp> &app : mNanoapps) { in findNanoappInstanceIdByAppId() local 71 if (app->getAppId() == appId) { in findNanoappInstanceIdByAppId() 72 *instanceId = app->getInstanceId(); in findNanoappInstanceIdByAppId() 315 Nanoapp *app = lookupAppByAppId(appId); in populateNanoappInfoForAppId() local 316 return populateNanoappInfo(app, info); in populateNanoappInfoForAppId() [all …]
|
/system/extras/tests/workloads/ |
D | systemapps.sh | 156 for app in $appList 158 vout Starting $app... 162 resetJankyFrames $(getPackageName $app) 164 tmpTraceOut="$tmpTraceOutBase-$app.out" 166 startInstramentation "$app-$cur" 169 startInstramentation "$app-$cur" 0 176 t=$(startActivity $app) 178 t=$(forceStartActivity $app) 183 set -- $(getJankyFrames $(getPackageName $app)) 213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP… [all …]
|
D | youtube.sh | 8 app=youtube 90 resetJankyFrames $(getPackageName $app) 94 t=$(startActivity $app) 117 set -- $(getJankyFrames $(getPackageName $app)) 136 resetJankyFrames $(getPackageName $app)
|
D | chromefling.sh | 11 app=chrome 96 resetJankyFrames $(getPackageName $app) 103 t=$(startActivity $app) 119 set -- $(getJankyFrames $(getPackageName $app)) 140 resetJankyFrames $(getPackageName $app)
|
/system/extras/memory_replay/traces/ |
D | TRACES | 7 Trace of the native camera app from start-up. 10 Trace of the Google Gmail app from start-up and through reading messages. 13 Trace of the Google Maps app from start-up while looking at various parts 17 Trace of the system app process surfaceflinger from start-up while 21 Trace of the system app process system_server from start-up while 25 Trace of the system app process systemui from start-up while 29 Trace of the Google YouTube app from start-up and while watching various 40 Why: Top 500 app using Unity engine. 42 Complete the tutorial. Restart the app with tracing enabled and play 53 Play first level. Restart the app with tracing enabled and play a few [all …]
|
/system/chre/platform/slpi/ |
D | memory_manager.cc | 24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 25 if (app->isUimgApp()) { in doAlloc() 32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 33 if (app->isUimgApp()) { in doFree()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### seapp_contexts for any app with UID between APP_AID (10000) 11 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 15 ### a system app into a specific domain, add a signer entry for it to 20 ### Note that rules that should apply to all untrusted apps must be in app.te or also 33 # Follow priv-app symlinks. This is used for dynamite functionality. 69 # Read and write system app data files passed over Binder. 75 # Rules migrated from old app domains coalesced into untrusted_app. 106 # gdbserver for ndk-gdb ptrace attaches to app process. 128 # Allow untrusted apps read / execute access to /vendor/app for there can [all …]
|
/system/sepolicy/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
D | untrusted_app_all.te | 4 ### This file defines the rules shared by all untrusted app domains except 10 ### seapp_contexts for any app with UID between APP_AID (10000) 11 ### and AID_ISOLATED_START (99000) if the app has no specific seinfo 15 ### a system app into a specific domain, add a signer entry for it to 20 ### Note that rules that should apply to all untrusted apps must be in app.te or also 33 # Follow priv-app symlinks. This is used for dynamite functionality. 69 # Read and write system app data files passed over Binder. 75 # Rules migrated from old app domains coalesced into untrusted_app. 106 # gdbserver for ndk-gdb ptrace attaches to app process. 128 # Allow untrusted apps read / execute access to /vendor/app for there can [all …]
|
D | runas_app.te | 9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf, 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 29 # Allow runas_app to call perf_event_open for profiling debuggable app
|
/system/chre/platform/include/chre/platform/ |
D | memory_manager.h | 49 void *nanoappAlloc(Nanoapp *app, uint32_t bytes); 57 void nanoappFree(Nanoapp *app, void *ptr); 141 void *doAlloc(Nanoapp *app, uint32_t size); 148 void doFree(Nanoapp *app, void *ptr);
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
D | runas_app.te | 9 # when using run-as on a debuggable app. Used to run lldb/ndk-gdb/simpleperf, 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
/system/update_engine/ |
D | omaha_request_action.cc | 549 OmahaParserData::App app; in ParserHandlerStart() local 551 app.id = attrs[kAttrAppId]; in ParserHandlerStart() 554 app.cohort_set = true; in ParserHandlerStart() 555 app.cohort = attrs[kAttrCohort]; in ParserHandlerStart() 558 app.cohorthint_set = true; in ParserHandlerStart() 559 app.cohorthint = attrs[kAttrCohortHint]; in ParserHandlerStart() 562 app.cohortname_set = true; in ParserHandlerStart() 563 app.cohortname = attrs[kAttrCohortName]; in ParserHandlerStart() 565 data->apps.push_back(std::move(app)); in ParserHandlerStart() 910 bool ParsePackage(OmahaParserData::App* app, in ParsePackage() argument [all …]
|
/system/iorap/tests/src/compiler/testdata/ |
D | common_textcache | 153 23 177181 -1 /system/app 154 23 1492646 -1 /system/app/GooglePrintRecommendationService 155 64768 107 -1 /system/app/GooglePrintRecommendationService/GooglePrintRecommendationService.apk 156 23 1492648 -1 /system/app/OsuLogin 157 64768 124 -1 /system/app/OsuLogin/OsuLogin.apk 158 23 180674 -1 /system/app/RcsService 159 64768 148 -1 /system/app/RcsService/RcsService.apk 160 23 1492650 -1 /system/app/vzw_msdc_api 161 64768 186 -1 /system/app/vzw_msdc_api/vzw_msdc_api.apk 162 23 1492652 -1 /system/app/LiveWallpapersPicker [all …]
|
/system/extras/app-launcher/ |
D | README | 1 Instructions to Run (and modify) app-launcher script 4 Introduction: app-launcher is a script that launches apps many times, 17 Launching app-launcher : 18 app-launcher -a|-b|-u [-c|-v|-s <serial number>] num-iterations 43 To add new apps, launch app manually and grep for package name + 47 Adding support for new Devices to app-launcher : 56 Adding new Metrics to app-launcher : 67 way to find the package and activity for the app of interest is to 68 launch the app and then grep for it in logcat to find the 84 adb shell 'am start -W -n com.google.android.youtube/com.google.android.apps.youtube.app.WatchWhile…
|
/system/apex/shim/build/ |
D | default_shim_allowed_list.txt | 2 ./app/CtsShim/CtsShim.apk 4 ./priv-app/CtsShimPriv/CtsShimPriv.apk
|
D | prebuilts_shim_allowed_list.txt | 2 ./app/CtsShimPrebuilt/CtsShimPrebuilt.apk 4 ./priv-app/CtsShimPrivPrebuilt/CtsShimPrivPrebuilt.apk
|
/system/extras/boottime_tools/bootanalyze/stressfs/ |
D | proguard.flags | 2 -keep public class * extends android.app.Activity 3 -keep public class * extends android.app.Service
|
/system/chre/platform/linux/ |
D | memory_manager.cc | 23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 27 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument
|