Home
last modified time | relevance | path

Searched refs:process (Results 1 – 25 of 423) sorted by relevance

12345678910>>...17

/system/extras/simpleperf/scripts/inferno/
Dinferno.py83 def parse_samples(process, args, sample_filter_fn): argument
104 process.cmd = lib.GetRecordCmd()
108 process.props['ro.product.manufacturer'] = tuple[0]
109 process.props['ro.product.model'] = tuple[1]
110 process.props['ro.product.name'] = tuple[2]
112 process.props['trace_offcpu'] = True
117 process.props['trace_offcpu'] = False
128 process.add_sample(sample, symbol, callchain)
130 if process.pid == 0:
131 main_threads = [thread for thread in process.threads.values() if thread.tid == thread.pid]
[all …]
Dsvg_renderer.py66 def createSVGNode(process, callsite, depth, f, total_weight, height, color_scheme, nav): argument
84 if process.props['trace_offcpu']:
122 def renderSVGNodes(process, flamegraph, depth, f, total_weight, height, color_scheme): argument
141 createSVGNode(process, child, depth, f, total_weight, height, color_scheme, nav)
143 renderSVGNodes(process, child, depth + 1, f, total_weight, height, color_scheme)
185 def renderSVG(process, flamegraph, f, color_scheme): argument
199 renderSVGNodes(process, flamegraph, 0, f, flamegraph.weight(), height, color_scheme)
/system/netd/server/
DIptablesRestoreController.cpp209 std::unique_ptr<IptablesProcess> *process = in sendCommand() local
220 IptablesProcess *existingProcess = process->get(); in sendCommand()
234 process->reset(newProcess); in sendCommand()
237 if (!android::base::WriteFully((*process)->stdIn, command.data(), command.length())) { in sendCommand()
242 if (!android::base::WriteFully((*process)->stdIn, PING, PING_SIZE)) { in sendCommand()
247 if (!drainAndWaitForAck(*process, command, output)) { in sendCommand()
255 void IptablesRestoreController::maybeLogStderr(const std::unique_ptr<IptablesProcess> &process, in maybeLogStderr() argument
257 if (process->errBuf.empty()) { in maybeLogStderr()
267 command.c_str(), process->errBuf.c_str()); in maybeLogStderr()
268 process->errBuf.clear(); in maybeLogStderr()
[all …]
/system/core/libmemunreachable/
DREADME.md6 …on on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimi…
35 … is divided into three processes - the original process, the collection process, and the sweeper p…
37 1. *Original process*: Leak detection is requested by calling `GetUnreachableMemory()`
39process is spawned. The collection process, created using clone, is similar to a normal `fork()` …
40 4. *Collection process*: All threads in the original process are paused with `ptrace()`.
42 …6. *Original process*: Allocations are re-enabled using `malloc_enable()`, but all threads are sti…
43process*: The sweeper process is spawned using a normal `fork()`. The sweeper process has a copy …
44 8. Collection process releases all threads from `ptrace` and exits
45 …9. *Original process*: All threads continue, the thread that called `GetUnreachableMemory()` block…
46 …10. *Sweeper process*: A list of all active allocations is produced by examining the memory mappin…
[all …]
/system/extras/boottime_tools/io_analysis/
Dcheck_io_trace.py51 def __init__(self, process): argument
52 self.process = process
63 if process[-1] == '*':
64 print "Process name starts with", process[:-1]
67 print "Process name", process
80 process = match.group(7)
82 if not process.startswith(self.process[:-1]):
84 self.processes.add(process)
86 if process != self.process:
Dcheck_io_trace_all.py145 process = match.group(8) + "-" + pid
147 io = self.ios.get(process)
149 io = ProcessData(process)
150 self.ios[process] = io
192 process = sorted_by_total_rw.popitem(last=False)
193 if not process:
195 process[1].dump()
201 process = sorted_by_total_w.popitem(last=False)
202 if not process:
204 process[1].dump()
[all …]
/system/extras/libpagemap/
Dpagemap_test.cpp27 pm_process_t* process; in TEST() local
28 ASSERT_EQ(0, pm_process_create(kernel, getpid(), &process)); in TEST()
32 ASSERT_EQ(0, pm_process_maps(process, &maps, &num_maps)); in TEST()
46 pm_process_destroy(process); in TEST()
/system/core/libunwindstack/tests/
DDwarfSectionTest.cpp160 MemoryFake process; in TEST_F() local
161 EXPECT_CALL(mock_section, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
165 ASSERT_TRUE(mock_section.Step(0x1000, nullptr, &process, &finished)); in TEST_F()
191 MemoryFake process; in TEST_F() local
192 EXPECT_CALL(mock_section, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
196 ASSERT_TRUE(mock_section.Step(0x1000, nullptr, &process, &finished)); in TEST_F()
197 ASSERT_TRUE(mock_section.Step(0x1000, nullptr, &process, &finished)); in TEST_F()
198 ASSERT_TRUE(mock_section.Step(0x1500, nullptr, &process, &finished)); in TEST_F()
215 MemoryFake process; in TEST_F() local
216 EXPECT_CALL(mock_section, Eval(&cie, &process, ::testing::_, nullptr, ::testing::_)) in TEST_F()
[all …]
/system/extras/ANRdaemon/
DREADME20 not running. This is because the daemon process turns off tracing when CPU usage
22 from some other process to the daemon. Then sometime later (say 20 secs later),
23 when the CPU usage becomes high and the daemon process turn on tracing again,
25 daemon process to some other process. Due to this artifact, when the raw trace
26 file is parsed by systrace.py, the daemon process is shown as running for the
28 entries regarding the daemon process indicates the daemon process ran continuously
/system/sepolicy/prebuilts/api/26.0/private/
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
10 # resulting process into webview_zygote domain.
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
58 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
61 neverallow webview_zygote { domain -crash_dump }:process transition;
68 neverallow { domain -init } webview_zygote:process transition;
[all …]
/system/sepolicy/prebuilts/api/27.0/private/
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
10 # resulting process into webview_zygote domain.
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
62 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
65 neverallow webview_zygote { domain -crash_dump }:process transition;
72 neverallow { domain -init } webview_zygote:process transition;
[all …]
/system/core/init/
Dcompare-bootcharts.py125 process = process_map[proc_name]
127 process = {'start_time': int(segs[21])}
128 process_map[proc_name] = process
130 process['last_tick'] = timestamp
/system/sepolicy/public/
Dlmkd.te25 allow lmkd appdomain:process sigkill;
38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
52 neverallow * lmkd:process noatsecure;
Dlogpersist.te13 neverallow logpersist domain:process ptrace;
25 # } logpersist:process transition;
26 neverallow * logpersist:process dyntransition;
/system/sepolicy/prebuilts/api/28.0/public/
Dlmkd.te25 allow lmkd appdomain:process sigkill;
38 # live lock watchdog process allowed to look through /proc/
42 # live lock watchdog process allowed to dump process trace and
52 neverallow * lmkd:process noatsecure;
Dlogpersist.te13 neverallow logpersist domain:process ptrace;
25 # } logpersist:process transition;
26 neverallow * logpersist:process dyntransition;
/system/sepolicy/private/
Dtraced.te14 # the privileged process that controls it.
31 neverallow traced self:process execmem;
36 # ptrace any other process
37 neverallow traced domain:process ptrace;
59 neverallow { domain -init } traced:process transition;
60 neverallow * traced:process dyntransition;
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
68 allow webview_zygote zygote:process sigchld;
78 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
81 neverallow webview_zygote { domain -crash_dump }:process transition;
89 neverallow { domain -zygote } webview_zygote:process dyntransition;
Dzygote.te16 allow zygote self:process setcurrent;
17 allow zygote system_server:process dyntransition;
18 allow zygote appdomain:process dyntransition;
19 allow zygote webview_zygote:process dyntransition;
25 # Move children into the peer process group.
26 allow zygote system_server:process { getpgid setpgid };
27 allow zygote appdomain:process { getpgid setpgid };
28 allow zygote webview_zygote:process { getpgid setpgid };
127 neverallow zygote ~{ appdomain system_server webview_zygote }:process dyntransition;
/system/sepolicy/prebuilts/api/28.0/private/
Dtraced.te14 # the privileged process that controls it.
31 neverallow traced self:process execmem;
36 # ptrace any other process
37 neverallow traced domain:process ptrace;
59 neverallow { domain -init } traced:process transition;
60 neverallow * traced:process dyntransition;
Dwebview_zygote.te1 # webview_zygote is an auxiliary zygote process that is used to spawn
22 # Set the UID/GID of the process.
27 allow webview_zygote self:process setcurrent;
28 allow webview_zygote isolated_app:process dyntransition;
41 allow webview_zygote system_server:process getpgid;
44 allow webview_zygote isolated_app:process setpgid;
68 allow webview_zygote zygote:process sigchld;
78 neverallow webview_zygote { domain -isolated_app }:process dyntransition;
81 neverallow webview_zygote { domain -crash_dump }:process transition;
89 neverallow { domain -zygote } webview_zygote:process dyntransition;
Dzygote.te16 allow zygote self:process setcurrent;
17 allow zygote system_server:process dyntransition;
18 allow zygote appdomain:process dyntransition;
19 allow zygote webview_zygote:process dyntransition;
25 # Move children into the peer process group.
26 allow zygote system_server:process { getpgid setpgid };
27 allow zygote appdomain:process { getpgid setpgid };
28 allow zygote webview_zygote:process { getpgid setpgid };
127 neverallow zygote ~{ appdomain system_server webview_zygote }:process dyntransition;
/system/sepolicy/prebuilts/api/26.0/public/
Dlogpersist.te13 neverallow logpersist domain:process ptrace;
25 # } logpersist:process transition;
26 neverallow * logpersist:process dyntransition;
/system/sepolicy/prebuilts/api/27.0/public/
Dlogpersist.te13 neverallow logpersist domain:process ptrace;
25 # } logpersist:process transition;
26 neverallow * logpersist:process dyntransition;
Dhal_neverallows.te34 # its OK for them to share a process its not OK with them to share processes
40 # Do not allow a hal to exec another process without a domain transition.
47 # Do not allow a process other than init to transition into a HAL domain.
48 neverallow { domain -init } halserverdomain:process transition;
52 neverallow * halserverdomain:process dyntransition;

12345678910>>...17