/system/extras/simpleperf/ |
D | cmd_trace_sched.cpp | 106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes); 133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local 134 ReportProcessInfo(processes); in Run() 307 std::vector<ProcessInfo> processes; in BuildProcessInfo() local 309 processes.push_back(pair.second); in BuildProcessInfo() 317 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo() 318 for (auto& process : processes) { in BuildProcessInfo() 321 return processes; in BuildProcessInfo() 324 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument 326 for (auto& process : processes) { in ReportProcessInfo() [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 40 # expected (native processes on debug builds use the policy for enforcing which 41 # processes are profileable). 47 # Never allow profiling highly privileged processes.
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 42 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 54 # expected (native processes on debug builds use the policy for enforcing which 55 # processes are profileable). 61 # Never allow profiling highly privileged processes.
|
D | viewcompiler.te | 8 # own label, which differs from other labels created by other processes. 10 # processes.
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 54 # expected (native processes on debug builds use the policy for enforcing which 55 # processes are profileable). 61 # Never allow profiling highly privileged processes.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | heapprofd.te | 4 # profiling configuration, finding matching target processes (if profiling by 6 # properties for new processes to start profiling from startup). When profiling 11 # processes (which talk directly to this daemon). 27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 40 # When handling profiling for all processes, heapprofd needs to read
|
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | traced_perf.te | 12 # profiling, but retain samples only for profileable processes. 54 # expected (native processes on debug builds use the policy for enforcing which 55 # processes are profileable). 61 # Never allow profiling highly privileged processes.
|
/system/core/libprocessgroup/ |
D | processgroup.cpp | 380 int processes = 0; in DoKillProcessGroupOnce() local 399 processes++; in DoKillProcessGroupOnce() 449 return (!fd || feof(fd.get())) ? processes : -1; in DoKillProcessGroupOnce() 470 int processes; in KillProcessGroup() local 471 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup() 472 if (max_processes != nullptr && processes > *max_processes) { in KillProcessGroup() 473 *max_processes = processes; in KillProcessGroup() 475 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup() 478 processes = 0; // no remaining processes in KillProcessGroup() 489 if (processes < 0) { in KillProcessGroup() [all …]
|
/system/sepolicy/private/ |
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | heapprofd.te | 17 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 21 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 30 # When handling profiling for all processes, heapprofd needs to read
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | runas_app.te | 13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes. 16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes. 30 # processes, but not the whole system.
|
D | heapprofd.te | 17 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and 21 # When scanning /proc/[pid]/cmdline to find matching processes for by-name 30 # When handling profiling for all processes, heapprofd needs to read
|
/system/memory/lmkd/ |
D | README.md | 18 non-essential processes was handled by a kernel lowmemorykiller driver. 37 - `ro.lmk.low`: min oom_adj score for processes eligible to be 41 - `ro.lmk.medium`: min oom_adj score for processes eligible to be 43 (non-essential processes) 45 - `ro.lmk.critical`: min oom_adj score for processes eligible to be 47 (all processes)
|
/system/sepolicy/vendor/ |
D | vndservicemanager.te | 1 # vndservicemanager - the Binder context manager for vendor processes 8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
|
/system/extras/iotop/ |
D | iotop.cpp | 103 bool processes = false; in main() local 153 processes = true; in main() 190 if (processes) { in main() 209 if (processes) { in main() 216 if (processes) { in main()
|
/system/extras/boottime_tools/io_analysis/ |
D | check_io_trace_all.py | 306 self.processes = {} # key: pid, v : SchedProcess 337 out_process = self.processes.get(out_pid) 340 self.processes[out_pid] = out_process 341 in_process = self.processes.get(in_pid) 344 self.processes[in_pid] = in_process 355 process = self.processes.get(pid) 358 self.processes[pid] = process 362 sorted_by_total_execution = collections.OrderedDict(sorted(self.processes.items(), \
|