/system/core/libmemunreachable/ |
D | README.md | 6 …on on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimi… 35 … is divided into three processes - the original process, the collection process, and the sweeper p… 37 1. *Original process*: Leak detection is requested by calling `GetUnreachableMemory()` 39 …process is spawned. The collection process is similar to a normal `fork()` child process, except … 40 4. *Collection process*: All threads in the original process are paused with `ptrace()`. 42 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti… 43 …process*: The sweeper process is spawned using a normal `fork()`. The sweeper process has a copy … 44 8. Collection process releases all threads from `ptrace` and exits 45 …9. *Original process*: All threads continue, the thread that called `GetUnreachableMemory()` block… 46 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin… [all …]
|
/system/extras/libpagemap/ |
D | pagemap_test.cpp | 27 pm_process_t* process; in TEST() local 28 ASSERT_EQ(0, pm_process_create(kernel, getpid(), &process)); in TEST() 32 ASSERT_EQ(0, pm_process_maps(process, &maps, &num_maps)); in TEST() 46 pm_process_destroy(process); in TEST()
|
/system/extras/ANRdaemon/ |
D | README | 20 not running. This is because the daemon process turns off tracing when CPU usage 22 from some other process to the daemon. Then sometime later (say 20 secs later), 23 when the CPU usage becomes high and the daemon process turn on tracing again, 25 daemon process to some other process. Due to this artifact, when the raw trace 26 file is parsed by systrace.py, the daemon process is shown as running for the 28 entries regarding the daemon process indicates the daemon process ran continuously
|
/system/core/init/ |
D | compare-bootcharts.py | 125 process = process_map[proc_name] 127 process = {'start_time': int(segs[21])} 128 process_map[proc_name] = process 130 process['last_tick'] = timestamp
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/ |
D | header.h | 119 int (*process)(struct perf_file_section *section, 131 perf_event__handler_t process); 134 perf_event__handler_t process); 140 perf_event__handler_t process); 147 perf_event__handler_t process,
|
D | event.h | 199 perf_event__handler_t process, 202 perf_event__handler_t process, 205 perf_event__handler_t process, 210 perf_event__handler_t process,
|
/system/bt/build/secondary/third_party/libchrome/ |
D | BUILD.gn | 95 "base/process/internal_linux.cc", 96 "base/process/kill.cc", 97 "base/process/kill_posix.cc", 98 "base/process/launch.cc", 99 "base/process/launch_posix.cc", 100 "base/process/process_handle_linux.cc", 101 "base/process/process_handle_posix.cc", 102 "base/process/process_iterator.cc", 103 "base/process/process_iterator_linux.cc", 104 "base/process/process_metrics.cc", [all …]
|
/system/connectivity/shill/ |
D | process_manager.cc | 99 std::unique_ptr<brillo::Process> process(new brillo::ProcessImpl()); in StartProcess() local 100 process->AddArg(program.value()); in StartProcess() 102 process->AddArg(option); in StartProcess() 104 process->SetCloseUnusedFileDescriptors(true); in StartProcess() 105 process->SetPreExecCallback( in StartProcess() 107 if (!process->Start()) { in StartProcess() 113 pid_t pid = process->pid(); in StartProcess() 123 process->Release(); in StartProcess()
|
/system/sepolicy/ |
D | zygote.te | 12 allow zygote self:process setcurrent; 13 allow zygote system_server:process dyntransition; 14 allow zygote { appdomain autoplay_app }:process dyntransition; 18 # Move children into the peer process group. 19 allow zygote system_server:process { getpgid setpgid }; 20 allow zygote { appdomain autoplay_app }:process { getpgid setpgid }; 100 neverallow zygote ~{ appdomain autoplay_app system_server }:process dyntransition;
|
D | runas.te | 6 allow runas adbd:process sigchld; 26 allow runas self:process setcurrent; 27 allow runas non_system_app_set:process dyntransition; # setcon
|
D | debuggerd.te | 21 }:process { ptrace getattr }; 27 allow debuggerd domain:process { sigstop sigkill signal }; 33 # debuggerd and get redirected to the 32 bit debuggerd if the process is 32 bit.
|
D | blkid.te | 18 neverallow { domain -vold } blkid:process transition; 19 neverallow * blkid:process dyntransition;
|
D | sgdisk.te | 20 neverallow { domain -vold } sgdisk:process transition; 21 neverallow * sgdisk:process dyntransition;
|
D | netd.te | 11 # than one of the groups assigned to the current process to see if 51 allow netd hostapd:process signal; 55 allow netd dnsmasq:process signal; 59 allow netd clatd:process signal; 89 neverallow netd { domain }:process ptrace;
|
D | dumpstate.te | 9 # Allow setting process priority, protect from OOM killer, and dropping 48 # Get process attributes 49 allow dumpstate domain:process getattr; 52 allow dumpstate { appdomain autoplay_app system_server }:process signal; 67 }:process signal; 123 allow dumpstate self:process execmem;
|
D | blkid_untrusted.te | 34 neverallow { domain -vold } blkid_untrusted:process transition; 35 neverallow * blkid_untrusted:process dyntransition;
|
D | fsck_untrusted.te | 34 neverallow { domain -vold } fsck_untrusted:process transition; 35 neverallow * fsck_untrusted:process dyntransition;
|
D | lmkd.te | 29 allow lmkd appdomain:process sigkill; 40 neverallow * lmkd:process noatsecure;
|
D | toolbox.te | 24 neverallow { domain -init } toolbox:process transition; 25 neverallow * toolbox:process dyntransition;
|
D | update_engine.te | 11 allow update_engine self:process { setsched }; 18 dontaudit update_engine kernel:process setsched;
|
D | te_macros | 12 allow $1 $3:process transition; 16 allow $3 $1:process sigchld; 18 dontaudit $1 $3:process noatsecure; 20 allow $1 $3:process { siginh rlimitinh }; 32 type_transition $1 $2:process $3; 183 allow servicemanager $1:process getattr; 340 allow keystore $1:process getattr; 352 allow drmserver $1:process getattr;
|
D | fsck.te | 45 neverallow { domain -init -vold } fsck:process transition; 46 neverallow * fsck:process dyntransition;
|
/system/connectivity/apmanager/ |
D | dhcp_server_unittest.cc | 122 ProcessMock* process = new ProcessMock(); in TEST_F() local 134 EXPECT_CALL(process_factory_, CreateProcess()).WillOnce(Return(process)); in TEST_F() 135 EXPECT_CALL(*process, Start()).WillOnce(Return(true)); in TEST_F()
|
D | service_unittest.cc | 146 ProcessMock* process = new ProcessMock(); in TEST_F() local 155 EXPECT_CALL(process_factory_, CreateProcess()).WillOnce(Return(process)); in TEST_F() 156 EXPECT_CALL(*process, Start()).WillOnce(Return(true)); in TEST_F()
|
/system/extras/librank/ |
D | librank.c | 160 struct process_info *process; in get_process() local 162 process = calloc(1, sizeof(*process)); in get_process() 163 if (!process) { in get_process() 168 process->pid = pid; in get_process() 169 getprocname(pid, process->cmdline, sizeof(process->cmdline)); in get_process() 171 return process; in get_process()
|