Searched refs:PID (Results 1 – 25 of 43) sorted by relevance
12
/system/extras/ANRdaemon/ |
D | ANRdaemon_get_trace.sh | 12 PID=$(adb $DEVICE shell "ps | grep anrd") 19 PID=$(echo "$PID" | awk '{ print $2 }') 20 adb $DEVICE shell "kill -s SIGUSR1 $PID" 26 adb $DEVICE shell "lsof -p $PID" | grep $TRACE_FILE > /dev/null 30 adb $DEVICE shell "lsof -p $PID" | grep "$TRACE_FILE" > /dev/null
|
/system/extras/ioblame/ |
D | ioblame-gmail-launch.example | 170 PID VIEW: 171 PID: am 175 PID: android.anim 178 PID: AsyncTask_#1 181 PID: AsyncTask_#2 187 PID: AsyncTask_#3 195 PID: cat 203 PID: cmd 213 PID: EGL_Init 216 PID: HeapTaskDaemon [all …]
|
D | ioblame-gmail-run.example | 897 PID VIEW: 898 PID: android.anim 901 PID: AsyncTask_#1 908 PID: AsyncTask_#2 913 PID: AsyncTask_#3 921 PID: Binder1550_5 924 PID: Binder8493_1 928 PID: cat 936 PID: ChildProcessMai 939 PID: Chrome_CacheThr [all …]
|
D | README | 45 To enable PID view, use -v 47 PID: CrRendererMain 102 and finally, -v adds the PID view
|
/system/core/logd/ |
D | README.property | 45 the chattiest PID of system 68 - Pruning filter rules are specified as UID, UID/PID or /PID. A '~' prefix indicates that elements 72 represents pruning of the worst PID within AID_SYSTEM when AID_SYSTEM is the noisiest UID.
|
/system/core/adb/coverage/ |
D | gen_coverage.sh | 113 for PID in $ADBD_PIDS; do 114 cp "$TRACEDIR"/trace/clang-$PID-*.profraw "$TRACEDIR"/adbd_traces 2>/dev/null || true
|
/system/sepolicy/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
|
D | dumpstate.te | 152 # Reading /proc/PID/maps of other processes 347 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj and /proc/PID/timerslack_ns
|
D | dumpstate.te | 148 # Reading /proc/PID/maps of other processes 351 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj
|
D | dumpstate.te | 105 # Reading /proc/PID/maps of other processes 207 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj
|
D | dumpstate.te | 118 # Reading /proc/PID/maps of other processes 242 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj
|
D | dumpstate.te | 125 # Reading /proc/PID/maps of other processes 279 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | incidentd.te | 96 # Reading /proc/PID/maps of other processes 99 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | incidentd.te | 107 # Reading /proc/PID/maps of other processes 110 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | lmkd.te | 13 ## Open and write to /proc/PID/oom_score_adj
|
D | dumpstate.te | 142 # Reading /proc/PID/maps of other processes 312 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | incidentd.te | 111 # Reading /proc/PID/maps of other processes 114 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/private/ |
D | incidentd.te | 111 # Reading /proc/PID/maps of other processes 114 # accessing sensitive /proc/PID files, never for using ptrace attach.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | incidentd.te | 58 # Reading /proc/PID/maps of other processes
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | incidentd.te | 58 # Reading /proc/PID/maps of other processes
|
/system/extras/tests/workloads/ |
D | defs.sh | 110 echo Could not put PID $$ in background
|
12