/system/chre/platform/shared/ |
D | memory_manager.cc | 23 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument 29 app->getInstanceId()); in nanoappAlloc() 34 app->getInstanceId()); in nanoappAlloc() 37 static_cast<AllocHeader *>(doAlloc(app, sizeof(AllocHeader) + bytes)); in nanoappAlloc() 40 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc() 47 header->data.instanceId = app->getInstanceId(); in nanoappAlloc() 55 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument 63 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree() 65 app->getInstanceId(), header->data.instanceId); in nanoappFree() 68 size_t nanoAppTotalAllocatedBytes = app->getTotalAllocatedBytes(); in nanoappFree() [all …]
|
/system/chre/core/tests/ |
D | memory_manager_test.cc | 39 Nanoapp app; in TEST() local 40 void *ptr = manager.nanoappAlloc(&app, 1u); in TEST() 44 manager.nanoappFree(&app, ptr); in TEST() 51 Nanoapp app; in TEST() local 52 manager.nanoappFree(&app, nullptr); in TEST() 59 Nanoapp app; in TEST() local 60 void *ptr = manager.nanoappAlloc(&app, 0u); in TEST() 68 Nanoapp app; in TEST() local 69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST() 76 Nanoapp app; in TEST() local [all …]
|
/system/linkerconfig/testdata/golden_output/stage0/ |
D | ld.config.txt | 12 dir.system = /product/app/ 24 namespace.default.permitted.paths += /system/app 25 namespace.default.permitted.paths += /system/priv-app 27 namespace.default.permitted.paths += /system_ext/app 28 namespace.default.permitted.paths += /system_ext/priv-app 30 namespace.default.permitted.paths += /vendor/app 31 namespace.default.permitted.paths += /vendor/priv-app 33 namespace.default.permitted.paths += /system/vendor/app 34 namespace.default.permitted.paths += /system/vendor/priv-app 36 namespace.default.permitted.paths += /odm/app [all …]
|
/system/chre/core/ |
D | event_loop.cc | 49 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument 52 if (app != nullptr && info != nullptr) { in populateNanoappInfo() 53 info->appId = app->getAppId(); in populateNanoappInfo() 54 info->version = app->getAppVersion(); in populateNanoappInfo() 55 info->instanceId = app->getInstanceId(); in populateNanoappInfo() 70 for (const UniquePtr<Nanoapp> &app : mNanoapps) { in findNanoappInstanceIdByAppId() local 71 if (app->getAppId() == appId) { in findNanoappInstanceIdByAppId() 72 *instanceId = app->getInstanceId(); in findNanoappInstanceIdByAppId() 336 Nanoapp *app = lookupAppByAppId(appId); in populateNanoappInfoForAppId() local 337 return populateNanoappInfo(app, info); in populateNanoappInfoForAppId() [all …]
|
/system/extras/tests/workloads/ |
D | systemapps.sh | 156 for app in $appList 158 vout Starting $app... 162 resetJankyFrames $(getPackageName $app) 164 tmpTraceOut="$tmpTraceOutBase-$app.out" 166 startInstramentation "$app-$cur" 169 startInstramentation "$app-$cur" 0 176 t=$(startActivity $app) 178 t=$(forceStartActivity $app) 183 set -- $(getJankyFrames $(getPackageName $app)) 213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP… [all …]
|
D | youtube.sh | 8 app=youtube 90 resetJankyFrames $(getPackageName $app) 94 t=$(startActivity $app) 117 set -- $(getJankyFrames $(getPackageName $app)) 136 resetJankyFrames $(getPackageName $app)
|
D | chromefling.sh | 11 app=chrome 96 resetJankyFrames $(getPackageName $app) 103 t=$(startActivity $app) 119 set -- $(getJankyFrames $(getPackageName $app)) 140 resetJankyFrames $(getPackageName $app)
|
/system/extras/memory_replay/traces/ |
D | TRACES | 7 Trace of the native camera app from start-up. 10 Trace of the Google Gmail app from start-up and through reading messages. 13 Trace of the Google Maps app from start-up while looking at various parts 17 Trace of the system app process surfaceflinger from start-up while 21 Trace of the system app process system_server from start-up while 25 Trace of the system app process systemui from start-up while 29 Trace of the Google YouTube app from start-up and while watching various 40 Why: Top 500 app using Unity engine. 42 Complete the tutorial. Restart the app with tracing enabled and play 53 Play first level. Restart the app with tracing enabled and play a few [all …]
|
/system/tools/aidl/ |
D | hiddenapi-greylist | 7 "android.app.admin.IDeviceAdminService", 8 "android.app.admin.IDevicePolicyManager", 9 "android.app.backup.IBackupManager", 10 "android.app.backup.IBackupManagerMonitor", 11 "android.app.backup.IBackupObserver", 12 "android.app.backup.IFullBackupRestoreObserver", 13 "android.app.backup.IRestoreObserver", 14 "android.app.backup.IRestoreSession", 15 "android.app.backup.ISelectBackupTransportCallback", 16 "android.app.IActivityController", [all …]
|
/system/chre/platform/freertos/ |
D | memory_manager.cc | 23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 24 if (app->isTcmApp()) { in doAlloc() 31 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 32 if (app->isTcmApp()) { in doFree()
|
/system/chre/platform/slpi/ |
D | memory_manager.cc | 24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 25 if (app->isUimgApp()) { in doAlloc() 32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 33 if (app->isUimgApp()) { in doFree()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
D | rs.te | 11 # Read files from the app home directory. 15 # Cleanup app_exec_data_file files in the app home directory. 23 # Read contents of app apks 30 # File descriptors passed from app to renderscript 33 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
/system/sepolicy/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
D | rs.te | 11 # Read files from the app home directory. 15 # Cleanup app_exec_data_file files in the app home directory. 23 # Read contents of app apks 30 # File descriptors passed from app to renderscript 33 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
/system/linkerconfig/testdata/golden_output/stage1/com.android.runtime/ |
D | ld.config.txt | 89 namespace.system.permitted.paths += /system/app 90 namespace.system.permitted.paths += /system/priv-app 92 namespace.system.permitted.paths += /system_ext/app 93 namespace.system.permitted.paths += /system_ext/priv-app 95 namespace.system.permitted.paths += /vendor/app 96 namespace.system.permitted.paths += /vendor/priv-app 98 namespace.system.permitted.paths += /system/vendor/app 99 namespace.system.permitted.paths += /system/vendor/priv-app 101 namespace.system.permitted.paths += /odm/app 102 namespace.system.permitted.paths += /odm/priv-app [all …]
|
/system/update_engine/cros/ |
D | omaha_request_action.cc | 472 for (const auto& app : parser_data.apps) { in StorePingReply() local 473 auto it = params->dlc_apps_params().find(app.id); in StorePingReply() 597 bool ParsePackage(OmahaParserData::App* app, in ParsePackage() argument 601 if (app->updatecheck.status.empty() || in ParsePackage() 602 app->updatecheck.status == kValNoUpdate) { in ParsePackage() 603 if (!app->packages.empty()) { in ParsePackage() 610 if (app->packages.empty()) { in ParsePackage() 615 if (app->urls.empty()) { in ParsePackage() 620 for (size_t i = 0; i < app->packages.size(); i++) { in ParsePackage() 621 const auto& package = app->packages[i]; in ParsePackage() [all …]
|
/system/linkerconfig/testdata/golden_output/stage1/com.android.art/ |
D | ld.config.txt | 100 namespace.system.permitted.paths += /system/app 101 namespace.system.permitted.paths += /system/priv-app 103 namespace.system.permitted.paths += /system_ext/app 104 namespace.system.permitted.paths += /system_ext/priv-app 106 namespace.system.permitted.paths += /vendor/app 107 namespace.system.permitted.paths += /vendor/priv-app 109 namespace.system.permitted.paths += /system/vendor/app 110 namespace.system.permitted.paths += /system/vendor/priv-app 112 namespace.system.permitted.paths += /odm/app 113 namespace.system.permitted.paths += /odm/priv-app [all …]
|
/system/chre/platform/include/chre/platform/ |
D | memory_manager.h | 49 void *nanoappAlloc(Nanoapp *app, uint32_t bytes); 57 void nanoappFree(Nanoapp *app, void *ptr); 141 void *doAlloc(Nanoapp *app, uint32_t size); 148 void doFree(Nanoapp *app, void *ptr);
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | rs.te | 10 # Read files from the app home directory. 14 # Cleanup app_exec_data_file files in the app home directory. 22 # Read contents of app apks 29 # File descriptors passed from app to renderscript 32 # rs can access app data, so ensure it can only be entered via an app domain and cannot have
|
/system/extras/app-launcher/ |
D | README | 1 Instructions to Run (and modify) app-launcher script 4 Introduction: app-launcher is a script that launches apps many times, 17 Launching app-launcher : 18 app-launcher -a|-b|-u [-c|-v|-s <serial number>] num-iterations 43 To add new apps, launch app manually and grep for package name + 47 Adding support for new Devices to app-launcher : 56 Adding new Metrics to app-launcher : 67 way to find the package and activity for the app of interest is to 68 launch the app and then grep for it in logcat to find the 84 adb shell 'am start -W -n com.google.android.youtube/com.google.android.apps.youtube.app.WatchWhile…
|
/system/apex/shim/build/ |
D | default_shim_allowed_list.txt | 2 ./app/CtsShim/CtsShim.apk 4 ./priv-app/CtsShimPriv/CtsShimPriv.apk
|
D | prebuilts_shim_allowed_list.txt | 2 ./app/CtsShimPrebuilt/CtsShimPrebuilt.apk 4 ./priv-app/CtsShimPrivPrebuilt/CtsShimPrivPrebuilt.apk
|