/system/extras/simpleperf/scripts/inferno/ |
D | inferno.py | 89 def parse_samples(process, args, sample_filter_fn): argument 112 process.cmd = lib.GetRecordCmd() 116 process.props['ro.product.manufacturer'] = manufacturer 117 process.props['ro.product.model'] = model 118 process.props['ro.product.name'] = name 120 process.props['trace_offcpu'] = True 125 process.props['trace_offcpu'] = False 136 process.add_sample(sample, symbol, callchain) 138 if process.pid == 0: 139 main_threads = [thread for thread in process.threads.values() if thread.tid == thread.pid] [all …]
|
/system/extras/simpleperf/ |
D | JITDebugReader.cpp | 340 Process& process = it->second; in ReadAllProcesses() local 341 if (!ReadProcess(process, &debug_info)) { in ReadAllProcesses() 344 if (process.died) { in ReadAllProcesses() 345 LOG(DEBUG) << "Stop monitoring process " << process.pid; in ReadAllProcesses() 369 bool JITDebugReader::ReadProcess(Process& process, std::vector<JITDebugInfo>* debug_info) { in ReadProcess() argument 370 if (process.died || (!process.initialized && !InitializeProcess(process))) { in ReadProcess() 376 if (!ReadDescriptors(process, &jit_descriptor, &dex_descriptor)) { in ReadProcess() 380 if (jit_descriptor.action_seqlock == process.last_jit_descriptor.action_seqlock && in ReadProcess() 381 dex_descriptor.action_seqlock == process.last_dex_descriptor.action_seqlock) { in ReadProcess() 386 return ReadDebugInfo(process, jit_descriptor, debug_info) && in ReadProcess() [all …]
|
D | cmd_trace_sched.cpp | 295 ProcessInfo& process = process_map[thread.process_id]; in BuildProcessInfo() local 296 process.process_id = thread.process_id; in BuildProcessInfo() 298 process.name = thread.name; in BuildProcessInfo() 300 process.total_runtime_in_ns += thread.total_runtime_in_ns; in BuildProcessInfo() 301 process.threads.push_back(&thread); in BuildProcessInfo() 314 for (auto& process : processes) { in BuildProcessInfo() local 315 std::sort(process.threads.begin(), process.threads.end(), sort_thread); in BuildProcessInfo() 322 for (auto& process : processes) { in ReportProcessInfo() local 323 total_runtime_in_ns += process.total_runtime_in_ns; in ReportProcessInfo() 334 for (auto& process : processes) { in ReportProcessInfo() local [all …]
|
D | JITDebugReader.h | 183 bool ReadProcess(Process& process, std::vector<JITDebugInfo>* debug_info); 184 bool ReadDebugInfo(Process& process, Descriptor& new_descriptor, 186 bool IsDescriptorChanged(Process& process, Descriptor& old_descriptor); 187 bool InitializeProcess(Process& process); 190 bool ReadRemoteMem(Process& process, uint64_t remote_addr, uint64_t size, void* data); 191 bool ReadDescriptors(Process& process, Descriptor* jit_descriptor, Descriptor* dex_descriptor); 196 bool ReadNewCodeEntries(Process& process, const Descriptor& descriptor, 200 bool ReadNewCodeEntriesImpl(Process& process, const Descriptor& descriptor, 204 bool ReadJITCodeDebugInfo(Process& process, const std::vector<CodeEntry>& jit_entries, 206 void ReadDexFileDebugInfo(Process& process, const std::vector<CodeEntry>& dex_entries,
|
/system/memory/libmemunreachable/ |
D | README.md | 6 …on on the main process, and then forks a copy of the process to perform the mark-and-sweep, minimi… 17 …ble is loaded by zygote and can be triggered with `dumpsys -t 600 meminfo --unreachable [process]`. 19 To enable malloc\_debug backtraces on allocations for a single app process on a userdebug device, u… 23 adb shell setprop wrap.[process] "\$\@" 27 …d restart the app, trigger the leak, and then run `dumpsys -t 600 meminfo --unreachable [process]`. 33 adb shell setprop wrap.[process] "''" 56 … is divided into three processes - the original process, the collection process, and the sweeper p… 58 1. *Original process*: Leak detection is requested by calling `GetUnreachableMemory()` 60 …process is spawned. The collection process, created using clone, is similar to a normal `fork()` … 61 4. *Collection process*: All threads in the original process are paused with `ptrace()`. [all …]
|
/system/netd/server/ |
D | IptablesRestoreController.cpp | 209 std::unique_ptr<IptablesProcess> *process = in sendCommand() local 220 IptablesProcess *existingProcess = process->get(); in sendCommand() 234 process->reset(newProcess); in sendCommand() 237 if (!android::base::WriteFully((*process)->stdIn, command.data(), command.length())) { in sendCommand() 242 if (!android::base::WriteFully((*process)->stdIn, PING, PING_SIZE)) { in sendCommand() 247 if (!drainAndWaitForAck(*process, command, output)) { in sendCommand() 255 void IptablesRestoreController::maybeLogStderr(const std::unique_ptr<IptablesProcess> &process, in maybeLogStderr() argument 257 if (process->errBuf.empty()) { in maybeLogStderr() 265 ALOGE("%s", process->errBuf.c_str()); in maybeLogStderr() 267 process->errBuf.clear(); in maybeLogStderr() [all …]
|
/system/sepolicy/prebuilts/api/28.0/ |
D | vendor_sepolicy.cil | 477 (allow init_28_0 hal_audio_default (process (transition))) 479 (dontaudit init_28_0 hal_audio_default (process (noatsecure))) 480 (allow init_28_0 hal_audio_default (process (siginh rlimitinh))) 481 (typetransition init_28_0 hal_audio_default_exec process hal_audio_default) 486 (allow init_28_0 hal_audiocontrol_default (process (transition))) 488 (dontaudit init_28_0 hal_audiocontrol_default (process (noatsecure))) 489 (allow init_28_0 hal_audiocontrol_default (process (siginh rlimitinh))) 490 (typetransition init_28_0 hal_audiocontrol_default_exec process hal_audiocontrol_default) 495 (allow init_28_0 hal_authsecret_default (process (transition))) 497 (dontaudit init_28_0 hal_authsecret_default (process (noatsecure))) [all …]
|
/system/core/adb/daemon/ |
D | jdwp_service.cpp | 152 JdwpProcess(unique_fd socket, ProcessInfo process) { in JdwpProcess() 153 CHECK(process.pid != 0); in JdwpProcess() 156 this->process = process; in JdwpProcess() 184 ProcessInfo process; member 195 if (!proc->process.debuggable) continue; in jdwp_process_list() 196 std::string next = std::to_string(proc->process.pid) + "\n"; in jdwp_process_list() 216 if (!proc->process.debuggable && !proc->process.profileable) continue; in app_process_list() 218 entry->set_pid(proc->process.pid); in app_process_list() 219 entry->set_debuggable(proc->process.debuggable); in app_process_list() 220 entry->set_profileable(proc->process.profileable); in app_process_list() [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | llkd.te | 19 allow llkd domain:process sigkill; 32 }:process ptrace; 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and 49 neverallow { domain -init } llkd:process { dyntransition transition }; 50 neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace; 53 neverallow * llkd:process noatsecure;
|
D | system_server_startup.te | 7 allow system_server_startup self:process execmem; 19 allow system_server_startup self:process setcurrent; 20 allow system_server_startup system_server:process dyntransition; 23 allow system_server_startup zygote:process sigchld;
|
D | app_zygote.te | 14 # Set the UID/GID of the process. 20 allow app_zygote self:process setcurrent; 21 allow app_zygote isolated_app:process dyntransition; 24 allow app_zygote self:process execmem; 31 # get system_server process group 32 allow app_zygote system_server:process getpgid; 35 allow app_zygote isolated_app:process setpgid; 53 allow app_zygote zygote:process sigchld; 75 neverallow app_zygote { domain -isolated_app }:process dyntransition; 78 neverallow app_zygote { domain -crash_dump }:process transition; [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | llkd.te | 19 allow llkd domain:process sigkill; 32 }:process ptrace; 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and 49 neverallow { domain -init } llkd:process { dyntransition transition }; 50 neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace; 53 neverallow * llkd:process noatsecure;
|
D | system_server_startup.te | 7 allow system_server_startup self:process execmem; 12 allow system_server_startup self:process setcurrent; 13 allow system_server_startup system_server:process dyntransition; 16 allow system_server_startup zygote:process sigchld;
|
D | app_zygote.te | 14 # Set the UID/GID of the process. 20 allow app_zygote self:process setcurrent; 21 allow app_zygote isolated_app:process dyntransition; 24 allow app_zygote self:process execmem; 31 # get system_server process group 32 allow app_zygote system_server:process getpgid; 35 allow app_zygote isolated_app:process setpgid; 53 allow app_zygote zygote:process sigchld; 81 neverallow app_zygote { domain -isolated_app }:process dyntransition; 84 neverallow app_zygote { domain -crash_dump }:process transition; [all …]
|
/system/sepolicy/private/ |
D | llkd.te | 19 allow llkd domain:process sigkill; 32 }:process ptrace; 35 # live lock watchdog process allowed to look through /proc/ 42 # live lock watchdog process allowed to dump process trace and 49 neverallow { domain -init } llkd:process { dyntransition transition }; 50 neverallow { domain userdebug_or_eng(`-crash_dump') } llkd:process ptrace; 53 neverallow * llkd:process noatsecure;
|
D | system_server_startup.te | 7 allow system_server_startup self:process execmem; 12 allow system_server_startup self:process setcurrent; 13 allow system_server_startup system_server:process dyntransition; 16 allow system_server_startup zygote:process sigchld;
|
D | app_zygote.te | 14 # Set the UID/GID of the process. 20 allow app_zygote self:process setcurrent; 21 allow app_zygote isolated_app:process dyntransition; 24 allow app_zygote self:process execmem; 31 # get system_server process group 32 allow app_zygote system_server:process getpgid; 35 allow app_zygote isolated_app:process setpgid; 53 allow app_zygote zygote:process sigchld; 81 neverallow app_zygote { domain -isolated_app }:process dyntransition; 84 neverallow app_zygote { domain -crash_dump }:process transition; [all …]
|
/system/core/libunwindstack/tests/ |
D | DwarfSectionTest.cpp | 109 MemoryFake process; in TEST_F() local 110 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, ®s_, ::testing::_)) in TEST_F() 114 ASSERT_TRUE(section_->Step(0x1000, ®s_, &process, &finished)); in TEST_F() 135 MemoryFake process; in TEST_F() local 136 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, ®s_, ::testing::_)) in TEST_F() 140 ASSERT_TRUE(section_->Step(0x1000, ®s_, &process, &finished)); in TEST_F() 141 ASSERT_TRUE(section_->Step(0x1000, ®s_, &process, &finished)); in TEST_F() 142 ASSERT_TRUE(section_->Step(0x1500, ®s_, &process, &finished)); in TEST_F() 155 MemoryFake process; in TEST_F() local 156 EXPECT_CALL(*section_, Eval(&cie, &process, ::testing::_, ®s_, ::testing::_)) in TEST_F() [all …]
|
/system/extras/boottime_tools/io_analysis/ |
D | check_io_trace.py | 51 def __init__(self, process): argument 52 self.process = process 63 if process[-1] == '*': 64 print "Process name starts with", process[:-1] 67 print "Process name", process 80 process = match.group(7) 82 if not process.startswith(self.process[:-1]): 84 self.processes.add(process) 86 if process != self.process:
|
/system/core/adb/libs/adbconnection/ |
D | adbconnection_server.cpp | 41 void adbconnection_listen(void (*callback)(int fd, ProcessInfo process)) { in adbconnection_listen() argument 111 ProcessInfo process; in adbconnection_listen() local 112 int rc = TEMP_FAILURE_RETRY(recv(it->get(), &process, sizeof(process), MSG_DONTWAIT)); in adbconnection_listen() 113 if (rc != sizeof(process)) { in adbconnection_listen() 115 << ", expected " << sizeof(process); in adbconnection_listen() 117 callback(it->release(), process); in adbconnection_listen()
|
/system/bt/gd/cert/ |
D | async_subprocess_logger.py | 36 process: subprocess.Popen, 49 if not process: 51 if not process.stdout: 60 self.process = process 86 for line in self.process.stdout:
|
/system/extras/ANRdaemon/ |
D | README | 20 not running. This is because the daemon process turns off tracing when CPU usage 22 from some other process to the daemon. Then sometime later (say 20 secs later), 23 when the CPU usage becomes high and the daemon process turn on tracing again, 25 daemon process to some other process. Due to this artifact, when the raw trace 26 file is parsed by systrace.py, the daemon process is shown as running for the 28 entries regarding the daemon process indicates the daemon process ran continuously
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | webview_zygote.te | 1 # webview_zygote is an auxiliary zygote process that is used to spawn 10 # resulting process into webview_zygote domain. 22 # Set the UID/GID of the process. 27 allow webview_zygote self:process setcurrent; 28 allow webview_zygote isolated_app:process dyntransition; 41 allow webview_zygote system_server:process getpgid; 44 allow webview_zygote isolated_app:process setpgid; 58 neverallow webview_zygote { domain -isolated_app }:process dyntransition; 61 neverallow webview_zygote { domain -crash_dump }:process transition; 68 neverallow { domain -init } webview_zygote:process transition; [all …]
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | webview_zygote.te | 1 # webview_zygote is an auxiliary zygote process that is used to spawn 10 # resulting process into webview_zygote domain. 22 # Set the UID/GID of the process. 27 allow webview_zygote self:process setcurrent; 28 allow webview_zygote isolated_app:process dyntransition; 41 allow webview_zygote system_server:process getpgid; 44 allow webview_zygote isolated_app:process setpgid; 62 neverallow webview_zygote { domain -isolated_app }:process dyntransition; 65 neverallow webview_zygote { domain -crash_dump }:process transition; 72 neverallow { domain -init } webview_zygote:process transition; [all …]
|
/system/sepolicy/public/ |
D | lmkd.te | 22 # setsched and send kill signals to any registered process 23 allow lmkd domain:process { setsched sigkill }; 25 allow lmkd kernel:process { setsched }; 39 # live lock watchdog process allowed to look through /proc/ 43 # live lock watchdog process allowed to dump process trace and 69 neverallow * lmkd:process noatsecure;
|