/system/extras/simpleperf/ |
D | cmd_trace_sched.cpp | 106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes); 133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local 134 ReportProcessInfo(processes); in Run() 306 std::vector<ProcessInfo> processes; in BuildProcessInfo() local 308 processes.push_back(pair.second); in BuildProcessInfo() 316 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo() 317 for (auto& process : processes) { in BuildProcessInfo() 320 return processes; in BuildProcessInfo() 323 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument 325 for (auto& process : processes) { in ReportProcessInfo() [all …]
|
/system/sepolicy/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 54 # expected (native processes on debug builds use the policy for enforcing which 55 # processes are profileable). 61 # Never allow profiling highly privileged processes.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 42 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 40 # expected (native processes on debug builds use the policy for enforcing which 41 # processes are profileable). 47 # Never allow profiling highly privileged processes.
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 54 # expected (native processes on debug builds use the policy for enforcing which 55 # processes are profileable). 61 # Never allow profiling highly privileged processes.
|
/system/core/libprocessgroup/ |
D | processgroup.cpp | 292 int processes = 0; in DoKillProcessGroupOnce() local 294 processes++; in DoKillProcessGroupOnce() 340 return feof(fd.get()) ? processes : -1; in DoKillProcessGroupOnce() 356 int processes; in KillProcessGroup() local 357 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup() 358 if (max_processes != nullptr && processes > *max_processes) { in KillProcessGroup() 359 *max_processes = processes; in KillProcessGroup() 361 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup() 370 if (processes < 0) { in KillProcessGroup() 385 if (processes == 0) { in KillProcessGroup() [all …]
|
/system/sepolicy/vendor/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes 8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
|
/system/memory/lmkd/ |
D | README.md | 18 non-essential processes was handled by a kernel lowmemorykiller driver. 37 ro.lmk.low: min oom_adj score for processes eligible to be 41 ro.lmk.medium: min oom_adj score for processes eligible to be 43 (non-essential processes) 45 ro.lmk.critical: min oom_adj score for processes eligible to be 47 (all processes)
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | incidentd.te | 12 # Allow incidentd to scan through /proc/pid for all processes 16 # Send signals to processes 34 # Signal java processes to dump their stack and get the results 39 # Signal native processes to dump their stack. 58 # Reading /proc/PID/maps of other processes
|
/system/extras/iotop/ |
D | iotop.cpp | 103 bool processes = false; in main() local 153 processes = true; in main() 190 if (processes) { in main() 209 if (processes) { in main() 216 if (processes) { in main()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | incidentd.te | 12 # Allow incidentd to scan through /proc/pid for all processes 16 # Send signals to processes 34 # Signal java processes to dump their stack and get the results 39 # Signal native processes to dump their stack. 58 # Reading /proc/PID/maps of other processes
|
/system/extras/simpleperf/scripts/test/ |
D | report_html_test.py | 62 processes = record_data['sampleInfo'][0]['processes'] 63 self.assertEqual(len(processes), 2) 68 processes = record_data['sampleInfo'][0]['processes'] 69 self.assertEqual(len(processes), 1)
|
/system/sepolicy/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes
|