Home
last modified time | relevance | path

Searched refs:PID (Results 1 – 25 of 43) sorted by relevance

12

/system/extras/ANRdaemon/
DANRdaemon_get_trace.sh12 PID=$(adb $DEVICE shell "ps | grep anrd")
19 PID=$(echo "$PID" | awk '{ print $2 }')
20 adb $DEVICE shell "kill -s SIGUSR1 $PID"
26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null
30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
/system/extras/ioblame/
Dioblame-gmail-launch.example170 PID VIEW:
171 PID: am
175 PID: android.anim
178 PID: AsyncTask_#1
181 PID: AsyncTask_#2
187 PID: AsyncTask_#3
195 PID: cat
203 PID: cmd
213 PID: EGL_Init
216 PID: HeapTaskDaemon
[all …]
Dioblame-gmail-run.example897 PID VIEW:
898 PID: android.anim
901 PID: AsyncTask_#1
908 PID: AsyncTask_#2
913 PID: AsyncTask_#3
921 PID: Binder1550_5
924 PID: Binder8493_1
928 PID: cat
936 PID: ChildProcessMai
939 PID: Chrome_CacheThr
[all …]
DREADME45 To enable PID view, use -v
47 PID: CrRendererMain
102 and finally, -v adds the PID view
/system/core/logd/
DREADME.property45 the chattiest PID of system
68 - Pruning filter rules are specified as UID, UID/PID or /PID. A '~' prefix indicates that elements
72 represents pruning of the worst PID within AID_SYSTEM when AID_SYSTEM is the noisiest UID.
/system/core/adb/coverage/
Dgen_coverage.sh113 for PID in $ADBD_PIDS; do
114 cp "$TRACEDIR"/trace/clang-$PID-*.profraw "$TRACEDIR"/adbd_traces 2>/dev/null || true
/system/sepolicy/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
Ddumpstate.te152 # Reading /proc/PID/maps of other processes
347 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/30.0/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
Ddumpstate.te148 # Reading /proc/PID/maps of other processes
351 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/26.0/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj
Ddumpstate.te105 # Reading /proc/PID/maps of other processes
207 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/27.0/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj
Ddumpstate.te118 # Reading /proc/PID/maps of other processes
242 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/28.0/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj
Ddumpstate.te125 # Reading /proc/PID/maps of other processes
279 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/28.0/private/
Dincidentd.te96 # Reading /proc/PID/maps of other processes
99 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/29.0/private/
Dincidentd.te107 # Reading /proc/PID/maps of other processes
110 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/29.0/public/
Dlmkd.te13 ## Open and write to /proc/PID/oom_score_adj
Ddumpstate.te142 # Reading /proc/PID/maps of other processes
312 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/30.0/private/
Dincidentd.te111 # Reading /proc/PID/maps of other processes
114 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/private/
Dincidentd.te111 # Reading /proc/PID/maps of other processes
114 # accessing sensitive /proc/PID files, never for using ptrace attach.
/system/sepolicy/prebuilts/api/27.0/private/
Dincidentd.te58 # Reading /proc/PID/maps of other processes
/system/sepolicy/prebuilts/api/26.0/private/
Dincidentd.te58 # Reading /proc/PID/maps of other processes
/system/extras/tests/workloads/
Ddefs.sh110 echo Could not put PID $$ in background

12