Home
last modified time | relevance | path

Searched refs:processes (Results 1 – 25 of 308) sorted by relevance

12345678910>>...13

/system/extras/simpleperf/
Dcmd_trace_sched.cpp106 void ReportProcessInfo(const std::vector<ProcessInfo>& processes);
133 std::vector<ProcessInfo> processes = BuildProcessInfo(); in Run() local
134 ReportProcessInfo(processes); in Run()
306 std::vector<ProcessInfo> processes; in BuildProcessInfo() local
308 processes.push_back(pair.second); in BuildProcessInfo()
316 std::sort(processes.begin(), processes.end(), sort_process); in BuildProcessInfo()
317 for (auto& process : processes) { in BuildProcessInfo()
320 return processes; in BuildProcessInfo()
323 void TraceSchedCommand::ReportProcessInfo(const std::vector<ProcessInfo>& processes) { in ReportProcessInfo() argument
325 for (auto& process : processes) { in ReportProcessInfo()
[all …]
/system/sepolicy/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
54 # expected (native processes on debug builds use the policy for enforcing which
55 # processes are profileable).
61 # Never allow profiling highly privileged processes.
/system/sepolicy/prebuilts/api/29.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
42 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
/system/sepolicy/prebuilts/api/31.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
54 # expected (native processes on debug builds use the policy for enforcing which
55 # processes are profileable).
61 # Never allow profiling highly privileged processes.
/system/sepolicy/prebuilts/api/30.0/private/
Dheapprofd.te4 # profiling configuration, finding matching target processes (if profiling by
6 # properties for new processes to start profiling from startup). When profiling
11 # processes (which talk directly to this daemon).
27 # Allow sending signals to processes. This excludes SIGKILL, SIGSTOP and
31 # When scanning /proc/[pid]/cmdline to find matching processes for by-name
40 # When handling profiling for all processes, heapprofd needs to read
Dtraced_perf.te12 # profiling, but retain samples only for profileable processes.
40 # expected (native processes on debug builds use the policy for enforcing which
41 # processes are profileable).
47 # Never allow profiling highly privileged processes.
Drunas_app.te13 # Allow lldb/ndk-gdb/simpleperf to read maps of debuggable app processes.
16 # Allow lldb/ndk-gdb/simpleperf to ptrace attach to debuggable app processes.
30 # processes, but not the whole system.
/system/core/libprocessgroup/
Dprocessgroup.cpp292 int processes = 0; in DoKillProcessGroupOnce() local
294 processes++; in DoKillProcessGroupOnce()
340 return feof(fd.get()) ? processes : -1; in DoKillProcessGroupOnce()
356 int processes; in KillProcessGroup() local
357 while ((processes = DoKillProcessGroupOnce(cgroup, uid, initialPid, signal)) > 0) { in KillProcessGroup()
358 if (max_processes != nullptr && processes > *max_processes) { in KillProcessGroup()
359 *max_processes = processes; in KillProcessGroup()
361 LOG(VERBOSE) << "Killed " << processes << " processes for processgroup " << initialPid; in KillProcessGroup()
370 if (processes < 0) { in KillProcessGroup()
385 if (processes == 0) { in KillProcessGroup()
[all …]
/system/sepolicy/vendor/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
8 # transfer binder objects to other processes (TODO b/35870313 limit this to vendor-only)
/system/memory/lmkd/
DREADME.md18 non-essential processes was handled by a kernel lowmemorykiller driver.
37 ro.lmk.low: min oom_adj score for processes eligible to be
41 ro.lmk.medium: min oom_adj score for processes eligible to be
43 (non-essential processes)
45 ro.lmk.critical: min oom_adj score for processes eligible to be
47 (all processes)
/system/extras/iotop/
Diotop.cpp103 bool processes = false; in main() local
153 processes = true; in main()
190 if (processes) { in main()
209 if (processes) { in main()
216 if (processes) { in main()
/system/sepolicy/prebuilts/api/27.0/private/
Dincidentd.te12 # Allow incidentd to scan through /proc/pid for all processes
16 # Send signals to processes
34 # Signal java processes to dump their stack and get the results
39 # Signal native processes to dump their stack.
58 # Reading /proc/PID/maps of other processes
/system/sepolicy/prebuilts/api/26.0/private/
Dincidentd.te12 # Allow incidentd to scan through /proc/pid for all processes
16 # Send signals to processes
34 # Signal java processes to dump their stack and get the results
39 # Signal native processes to dump their stack.
58 # Reading /proc/PID/maps of other processes
/system/extras/simpleperf/scripts/test/
Dreport_html_test.py62 processes = record_data['sampleInfo'][0]['processes']
63 self.assertEqual(len(processes), 2)
68 processes = record_data['sampleInfo'][0]['processes']
69 self.assertEqual(len(processes), 1)
/system/sepolicy/prebuilts/api/29.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/prebuilts/api/28.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/prebuilts/api/27.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/prebuilts/api/31.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/prebuilts/api/30.0/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes
/system/sepolicy/public/
Dvndservicemanager.te1 # vndservicemanager - the Binder context manager for vendor processes

12345678910>>...13