Home
last modified time | relevance | path

Searched refs:processes (Results 1 – 25 of 403) sorted by relevance

12345678910>>...17

/system/extras/simpleperf/
Dcmd_trace_sched.cpp106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes);
133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local
134 ReportProcessInfo(processes); in Run()
307 std::vector<ProcessInfo> processes; in BuildProcessInfo() local
309 processes.push_back(pair.second); in BuildProcessInfo()
317 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo()
318 for (auto& process : processes) { in BuildProcessInfo()
321 return processes; in BuildProcessInfo()
324 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument
326 for (auto& process : processes) { in ReportProcessInfo()
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
40 # expected (native processes on debug builds use the policy for enforcing which
41 # processes are profileable).
47 # Never allow profiling highly privileged processes.
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
/system/sepolicy/prebuilts/api/29.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
42 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
/system/sepolicy/prebuilts/api/32.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
54 # expected (native processes on debug builds use the policy for enforcing which
55 # processes are profileable).
61 # Never allow profiling highly privileged processes.
Dviewcompiler.te8 # own label, which differs from other labels created by other processes.
10 # processes.
/system/sepolicy/prebuilts/api/33.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
54 # expected (native processes on debug builds use the policy for enforcing which
55 # processes are profileable).
61 # Never allow profiling highly privileged processes.
/system/sepolicy/prebuilts/api/31.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
54 # expected (native processes on debug builds use the policy for enforcing which
55 # processes are profileable).
61 # Never allow profiling highly privileged processes.
/system/core/libprocessgroup/
Dprocessgroup.cpp380 int processes = 0; in DoKillProcessGroupOnce() local
399 processes++; in DoKillProcessGroupOnce()
449 return (!fd || feof(fd.get())) ? processes : -1; in DoKillProcessGroupOnce()
470 int processes; in KillProcessGroup() local
471 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup()
472 if (max_processes != nullptr && processes > *max_processes) { in KillProcessGroup()
473 *max_processes = processes; in KillProcessGroup()
475 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup()
478 processes = 0; // no remaining processes in KillProcessGroup()
489 if (processes < 0) { in KillProcessGroup()
[all …]
/system/sepolicy/private/
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dheapprofd.te17 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
21 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
30 # When handling profiling for all processes, heapprofd needs to read
/system/sepolicy/prebuilts/api/34.0/private/
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dheapprofd.te17 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
21 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
30 # When handling profiling for all processes, heapprofd needs to read
/system/memory/lmkd/
DREADME.md18 non-essential processes was handled by a kernel lowmemorykiller driver.
37 - `ro.lmk.low`: min oom_adj score for processes eligible to be
41 - `ro.lmk.medium`: min oom_adj score for processes eligible to be
43 (non-essential processes)
45 - `ro.lmk.critical`: min oom_adj score for processes eligible to be
47 (all processes)
/system/sepolicy/vendor/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
/system/extras/iotop/
Diotop.cpp103 bool processes = false; in main() local
153 processes = true; in main()
190 if (processes) { in main()
209 if (processes) { in main()
216 if (processes) { in main()
/system/extras/boottime_tools/io_analysis/
Dcheck_io_trace_all.py306 self.processes = {} # key: pid, v : SchedProcess
337 out_process = self.processes.get(out_pid)
340 self.processes[out_pid] = out_process
341 in_process = self.processes.get(in_pid)
344 self.processes[in_pid] = in_process
355 process = self.processes.get(pid)
358 self.processes[pid] = process
362 sorted_by_total_execution = collections.OrderedDict(sorted(self.processes.items(), \

12345678910>>...17