Home
last modified time | relevance | path

Searched refs:process (Results 1 – 25 of 95) sorted by relevance

1234

/system/core/libmemunreachable/
DREADME.md6 …on on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimi…
35 … is divided into three processes - the original process, the collection process, and the sweeper p…
37 1. *Original process*: Leak detection is requested by calling `GetUnreachableMemory()`
39process is spawned. The collection process is similar to a normal `fork()` child process, except …
40 4. *Collection process*: All threads in the original process are paused with `ptrace()`.
42 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti…
43process*: The sweeper process is spawned using a normal `fork()`. The sweeper process has a copy …
44 8. Collection process releases all threads from `ptrace` and exits
45 …9. *Original process*: All threads continue, the thread that called `GetUnreachableMemory()` block…
46 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin…
[all …]
/system/extras/libpagemap/
Dpagemap_test.cpp27 pm_process_t* process; in TEST() local
28 ASSERT_EQ(0, pm_process_create(kernel, getpid(), &process)); in TEST()
32 ASSERT_EQ(0, pm_process_maps(process, &maps, &num_maps)); in TEST()
46 pm_process_destroy(process); in TEST()
/system/extras/ANRdaemon/
DREADME20 not running. This is because the daemon process turns off tracing when CPU usage
22 from some other process to the daemon. Then sometime later (say 20 secs later),
23 when the CPU usage becomes high and the daemon process turn on tracing again,
25 daemon process to some other process. Due to this artifact, when the raw trace
26 file is parsed by systrace.py, the daemon process is shown as running for the
28 entries regarding the daemon process indicates the daemon process ran continuously
/system/core/init/
Dcompare-bootcharts.py125 process = process_map[proc_name]
127 process = {'start_time': int(segs[21])}
128 process_map[proc_name] = process
130 process['last_tick'] = timestamp
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/
Dheader.h119 int (*process)(struct perf_file_section *section,
131 perf_event__handler_t process);
134 perf_event__handler_t process);
140 perf_event__handler_t process);
147 perf_event__handler_t process,
Devent.h199 perf_event__handler_t process,
202 perf_event__handler_t process,
205 perf_event__handler_t process,
210 perf_event__handler_t process,
/system/bt/build/secondary/third_party/libchrome/
DBUILD.gn95 "base/process/internal_linux.cc",
96 "base/process/kill.cc",
97 "base/process/kill_posix.cc",
98 "base/process/launch.cc",
99 "base/process/launch_posix.cc",
100 "base/process/process_handle_linux.cc",
101 "base/process/process_handle_posix.cc",
102 "base/process/process_iterator.cc",
103 "base/process/process_iterator_linux.cc",
104 "base/process/process_metrics.cc",
[all …]
/system/connectivity/shill/
Dprocess_manager.cc99 std::unique_ptr<brillo::Process> process(new brillo::ProcessImpl()); in StartProcess() local
100 process->AddArg(program.value()); in StartProcess()
102 process->AddArg(option); in StartProcess()
104 process->SetCloseUnusedFileDescriptors(true); in StartProcess()
105 process->SetPreExecCallback( in StartProcess()
107 if (!process->Start()) { in StartProcess()
113 pid_t pid = process->pid(); in StartProcess()
123 process->Release(); in StartProcess()
/system/sepolicy/
Dzygote.te12 allow zygote self:process setcurrent;
13 allow zygote system_server:process dyntransition;
14 allow zygote { appdomain autoplay_app }:process dyntransition;
18 # Move children into the peer process group.
19 allow zygote system_server:process { getpgid setpgid };
20 allow zygote { appdomain autoplay_app }:process { getpgid setpgid };
100 neverallow zygote ~{ appdomain autoplay_app system_server }:process dyntransition;
Drunas.te6 allow runas adbd:process sigchld;
26 allow runas self:process setcurrent;
27 allow runas non_system_app_set:process dyntransition; # setcon
Ddebuggerd.te21 }:process { ptrace getattr };
27 allow debuggerd domain:process { sigstop sigkill signal };
33 # debuggerd and get redirected to the 32 bit debuggerd if the process is 32 bit.
Dblkid.te18 neverallow { domain -vold } blkid:process transition;
19 neverallow * blkid:process dyntransition;
Dsgdisk.te20 neverallow { domain -vold } sgdisk:process transition;
21 neverallow * sgdisk:process dyntransition;
Dnetd.te11 # than one of the groups assigned to the current process to see if
51 allow netd hostapd:process signal;
55 allow netd dnsmasq:process signal;
59 allow netd clatd:process signal;
89 neverallow netd { domain }:process ptrace;
Ddumpstate.te9 # Allow setting process priority, protect from OOM killer, and dropping
48 # Get process attributes
49 allow dumpstate domain:process getattr;
52 allow dumpstate { appdomain autoplay_app system_server }:process signal;
67 }:process signal;
123 allow dumpstate self:process execmem;
Dblkid_untrusted.te34 neverallow { domain -vold } blkid_untrusted:process transition;
35 neverallow * blkid_untrusted:process dyntransition;
Dfsck_untrusted.te34 neverallow { domain -vold } fsck_untrusted:process transition;
35 neverallow * fsck_untrusted:process dyntransition;
Dlmkd.te29 allow lmkd appdomain:process sigkill;
40 neverallow * lmkd:process noatsecure;
Dtoolbox.te24 neverallow { domain -init } toolbox:process transition;
25 neverallow * toolbox:process dyntransition;
Dupdate_engine.te11 allow update_engine self:process { setsched };
18 dontaudit update_engine kernel:process setsched;
Dte_macros12 allow $1 $3:process transition;
16 allow $3 $1:process sigchld;
18 dontaudit $1 $3:process noatsecure;
20 allow $1 $3:process { siginh rlimitinh };
32 type_transition $1 $2:process $3;
183 allow servicemanager $1:process getattr;
340 allow keystore $1:process getattr;
352 allow drmserver $1:process getattr;
Dfsck.te45 neverallow { domain -init -vold } fsck:process transition;
46 neverallow * fsck:process dyntransition;
/system/connectivity/apmanager/
Ddhcp_server_unittest.cc122 ProcessMock* process = new ProcessMock(); in TEST_F() local
134 EXPECT_CALL(process_factory_, CreateProcess()).WillOnce(Return(process)); in TEST_F()
135 EXPECT_CALL(*process, Start()).WillOnce(Return(true)); in TEST_F()
Dservice_unittest.cc146 ProcessMock* process = new ProcessMock(); in TEST_F() local
155 EXPECT_CALL(process_factory_, CreateProcess()).WillOnce(Return(process)); in TEST_F()
156 EXPECT_CALL(*process, Start()).WillOnce(Return(true)); in TEST_F()
/system/extras/librank/
Dlibrank.c160 struct process_info *process; in get_process() local
162 process = calloc(1, sizeof(*process)); in get_process()
163 if (!process) { in get_process()
168 process->pid = pid; in get_process()
169 getprocname(pid, process->cmdline, sizeof(process->cmdline)); in get_process()
171 return process; in get_process()

1234