/external/chromium_org/components/crash/app/ |
breakpad_linux.h | 17 extern void InitCrashReporter(const std::string& process_type); 22 const std::string& process_type);
|
breakpad_mac.h | 15 void InitCrashReporter(const std::string& process_type);
|
/external/chromium_org/content/public/browser/ |
child_process_data.h | 17 int process_type; member in struct:content::ChildProcessData 33 explicit ChildProcessData(int process_type) 34 : process_type(process_type), id(0), handle(base::kNullProcessHandle) {
|
profiler_subscriber.h | 30 int process_type) = 0;
|
browser_child_process_host_iterator.h | 53 explicit BrowserChildProcessHostTypeIterator(int process_type) 54 : BrowserChildProcessHostIterator(process_type) {}
|
/external/chromium_org/content/public/app/ |
content_main_delegate.h | 42 virtual void SandboxInitialized(const std::string& process_type) {} 46 const std::string& process_type, 50 virtual void ProcessExiting(const std::string& process_type) {} 57 const std::string& process_type); 62 virtual bool ShouldSendMachPort(const std::string& process_type); 67 virtual bool DelaySandboxInitialization(const std::string& process_type);
|
content_main_delegate.cc | 24 const std::string& process_type, 32 const std::string& process_type) { 36 bool ContentMainDelegate::ShouldSendMachPort(const std::string& process_type) { 41 const std::string& process_type) {
|
/external/chromium_org/tools/perf/metrics/ |
cpu.py | 35 for process_type in cpu_stats: 36 trace_name_for_process = '%s_%s' % (trace_name, process_type.lower()) 37 cpu_percent = 100 * cpu_stats[process_type] 60 for process_type in cpu_stats: 61 assert process_type in start_cpu_stats, 'Mismatching process types' 63 if (not cpu_stats[process_type]) or (not start_cpu_stats[process_type]): 65 cpu_process_time = (cpu_stats[process_type]['CpuProcessTime'] - 66 start_cpu_stats[process_type]['CpuProcessTime']) 67 total_time = (cpu_stats[process_type]['TotalTime'] [all...] |
system_memory.py | 100 for process_type in end_memory_stats: 101 memory_stats[process_type] = {} 102 end_process_memory = end_memory_stats[process_type] 108 if (process_type not in start_memory_stats or 109 not start_memory_stats[process_type]): 110 memory_stats[process_type] = end_process_memory 114 start_value = start_memory_stats[process_type] or 0 115 memory_stats[process_type] = end_process_memory - start_value 119 start_value = start_memory_stats[process_type][metric] or 0 121 memory_stats[process_type][metric] = end_valu [all...] |
/external/chromium_org/content/common/ |
sandbox_init_mac.cc | 39 std::string process_type = 41 if (process_type.empty()) { 44 } else if (process_type == switches::kRendererProcess) { 46 } else if (process_type == switches::kUtilityProcess) { 51 } else if (process_type == switches::kGpuProcess) { 55 } else if ((process_type == switches::kPluginProcess) || 56 (process_type == switches::kPpapiBrokerProcess)) { 58 } else if (process_type == switches::kPpapiPluginProcess) {
|
/external/chromium_org/content/common/sandbox_linux/ |
sandbox_seccomp_bpf_linux.h | 32 // Should the sandbox be enabled for process_type ? 33 static bool ShouldEnableSeccompBPF(const std::string& process_type); 37 // Start the sandbox and apply the policy for process_type, depending on 39 static bool StartSandbox(const std::string& process_type);
|
sandbox_seccomp_bpf_linux.cc | 112 // If a BPF policy is engaged for |process_type|, run a few sanity checks. 113 void RunSandboxSanityChecks(const std::string& process_type) { 114 if (process_type == switches::kRendererProcess || 115 process_type == switches::kGpuProcess || 116 process_type == switches::kPpapiPluginProcess) { 176 const std::string& process_type) { 179 if (process_type == switches::kGpuProcess) { 181 } else if (process_type == switches::kRendererProcess) { 183 } else if (process_type == switches::kPpapiPluginProcess) { 185 } else if (process_type == switches::kUtilityProcess) [all...] |
sandbox_linux.cc | 57 const std::string process_type = local 61 process_type + "."; 251 bool LinuxSandbox::StartSeccompBPF(const std::string& process_type) { 255 seccomp_bpf_started_ = SandboxSeccompBPF::StartSandbox(process_type); 265 const std::string process_type = local 278 process_type)); 284 "threads in process " + process_type; 291 bool sandbox_failure_fatal = process_type != switches::kGpuProcess; 295 if (process_type == switches::kGpuProcess && 318 LimitAddressSpace(process_type); [all...] |
/external/chromium_org/chrome/app/android/ |
chrome_main_delegate_android.cc | 25 const std::string& process_type) { 26 ChromeMainDelegate::SandboxInitialized(process_type); 30 const std::string& process_type, 33 if (process_type.empty()) { 51 return ChromeMainDelegate::RunProcess(process_type, main_function_params);
|
chrome_main_delegate_android.h | 26 virtual void SandboxInitialized(const std::string& process_type) OVERRIDE; 29 const std::string& process_type,
|
/external/chromium_org/chrome/app/ |
chrome_main_delegate.cc | 167 static void AdjustLinuxOOMScore(const std::string& process_type) { 187 if (process_type == switches::kPluginProcess || 188 process_type == switches::kPpapiPluginProcess) { 190 } else if (process_type == switches::kPpapiBrokerProcess) { 193 } else if (process_type == switches::kUtilityProcess || 194 process_type == switches::kGpuProcess || 195 process_type == switches::kServiceProcess) { 198 } else if (process_type == switches::kNaClLoaderProcess || 199 process_type == switches::kNaClLoaderNonSfiProcess) { 202 } else if (process_type == switches::kZygoteProcess | 316 std::string process_type = local 606 << switches::kUtilityProcess << ", saw " << process_type; local 611 << switches::kNaClLoaderProcess << ", saw " << process_type; local 640 std::string process_type = local 896 std::string process_type = local [all...] |
chrome_main_delegate.h | 30 virtual void SandboxInitialized(const std::string& process_type) OVERRIDE; 32 const std::string& process_type, 34 virtual void ProcessExiting(const std::string& process_type) OVERRIDE; 37 const std::string& process_type) OVERRIDE; 38 virtual bool ShouldSendMachPort(const std::string& process_type) OVERRIDE; 40 const std::string& process_type) OVERRIDE; 57 const std::string& process_type);
|
/external/chromium_org/components/metrics/profiler/ |
tracking_synchronizer_observer.h | 17 // Received |profiler_data| from a single process of |process_type|. 22 int process_type) = 0;
|
tracking_synchronizer.h | 78 int process_type) OVERRIDE; 97 int process_type);
|
/external/chromium_org/chrome/nacl/ |
nacl_exe_win_64.cc | 24 std::string process_type = local 28 breakpad::InitCrashReporter(process_type);
|
/external/chromium_org/extensions/shell/app/ |
shell_main_delegate.cc | 72 std::string process_type = local 75 if (ProcessNeedsResourceBundle(process_type)) 123 const std::string& process_type) { 126 return process_type.empty() || 127 process_type == switches::kZygoteProcess || 128 process_type == switches::kRendererProcess || 130 process_type == switches::kNaClLoaderProcess || 132 process_type == switches::kUtilityProcess;
|
/external/chromium_org/content/shell/app/ |
shell_crash_reporter_client.cc | 65 const std::string& process_type) { 66 return process_type == switches::kRendererProcess || 67 process_type == switches::kPluginProcess || 68 process_type == switches::kPpapiPluginProcess || 69 process_type == switches::kZygoteProcess || 70 process_type == switches::kGpuProcess;
|
/external/chromium_org/content/public/common/ |
zygote_fork_delegate_linux.h | 47 virtual bool CanHelp(const std::string& process_type, std::string* uma_name, 68 virtual pid_t Fork(const std::string& process_type,
|
/external/chromium_org/chrome/browser/task_profiler/ |
task_profiler_data_serializer.h | 27 // Writes the contents of |process_data| and |process_type| into |dictionary|. 29 int process_type,
|
/external/chromium_org/chrome/browser/ui/webui/ |
profiler_ui.h | 26 int process_type) OVERRIDE;
|