/system/core/libprocessgroup/ |
D | processgroup.cpp | 126 static std::string ConvertUidToPath(const char* cgroup, uid_t uid) { in ConvertUidToPath() argument 127 return StringPrintf("%s/uid_%d", cgroup, uid); in ConvertUidToPath() 130 static std::string ConvertUidPidToPath(const char* cgroup, uid_t uid, int pid) { in ConvertUidPidToPath() argument 131 return StringPrintf("%s/uid_%d/pid_%d", cgroup, uid, pid); in ConvertUidPidToPath() 134 static int RemoveProcessGroup(const char* cgroup, uid_t uid, int pid, unsigned int retries) { in RemoveProcessGroup() argument 136 auto uid_pid_path = ConvertUidPidToPath(cgroup, uid, pid); in RemoveProcessGroup() 137 auto uid_path = ConvertUidToPath(cgroup, uid); in RemoveProcessGroup() 273 static int DoKillProcessGroupOnce(const char* cgroup, uid_t uid, int initialPid, int signal) { in DoKillProcessGroupOnce() argument 274 auto path = ConvertUidPidToPath(cgroup, uid, initialPid) + PROCESSGROUP_CGROUP_PROCS_FILE; in DoKillProcessGroupOnce() 347 const char* cgroup = hierarchy_root_path.c_str(); in KillProcessGroup() local [all …]
|
/system/core/libprocessgroup/profiles/ |
D | cgroups_test.h | 42 auto&& cgroup = cgroups_->cgroups(i); in TEST_P() 43 EXPECT_FALSE(cgroup.controller().empty()) in TEST_P() 45 EXPECT_FALSE(cgroup.path().empty()) << "No path for cgroup #" << i << " in " << file_path_; in TEST_P()
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | hal_cas.te | 15 r_dir_file(hal_cas, cgroup) 16 allow hal_cas cgroup:dir { search write }; 17 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 19 r_dir_file(hal_drm, cgroup) 20 allow hal_drm cgroup:dir { search write }; 21 allow hal_drm cgroup:file w_file_perms;
|
D | hal_telephony.te | 12 allow hal_telephony_server cgroup:dir create_dir_perms; 13 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
D | inputflinger.te | 15 r_dir_file(inputflinger, cgroup)
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_cas.te | 15 r_dir_file(hal_cas, cgroup) 16 allow hal_cas cgroup:dir { search write }; 17 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 19 r_dir_file(hal_drm, cgroup) 20 allow hal_drm cgroup:dir { search write }; 21 allow hal_drm cgroup:file w_file_perms;
|
D | hal_telephony.te | 12 allow hal_telephony_server cgroup:dir create_dir_perms; 13 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
D | inputflinger.te | 15 r_dir_file(inputflinger, cgroup)
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_cas.te | 16 r_dir_file(hal_cas, cgroup) 17 allow hal_cas cgroup:dir { search write }; 18 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 25 r_dir_file(hal_drm, cgroup) 26 allow hal_drm cgroup:dir { search write }; 27 allow hal_drm cgroup:file w_file_perms;
|
D | hal_telephony.te | 14 allow hal_telephony_server cgroup:dir create_dir_perms; 15 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
/system/core/libprocessgroup/setup/ |
D | cgroup_map_write.cpp | 148 const Json::Value& cgroup, const std::string& name, in MergeCgroupToDescriptors() argument 153 path = root_path + "/" + cgroup["Path"].asString(); in MergeCgroupToDescriptors() 155 path = cgroup["Path"].asString(); in MergeCgroupToDescriptors() 160 if (cgroup["NeedsActivation"].isBool() && cgroup["NeedsActivation"].asBool()) { in MergeCgroupToDescriptors() 164 if (cgroup["Optional"].isBool() && cgroup["Optional"].asBool()) { in MergeCgroupToDescriptors() 169 cgroups_version, name, path, std::strtoul(cgroup["Mode"].asString().c_str(), 0, 8), in MergeCgroupToDescriptors() 170 cgroup["UID"].asString(), cgroup["GID"].asString(), controller_flags); in MergeCgroupToDescriptors()
|
/system/sepolicy/public/ |
D | hal_cas.te | 15 r_dir_file(hal_cas, cgroup) 16 allow hal_cas cgroup:dir { search write }; 17 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 19 r_dir_file(hal_drm, cgroup) 20 allow hal_drm cgroup:dir { search write }; 21 allow hal_drm cgroup:file w_file_perms;
|
D | hal_telephony.te | 12 allow hal_telephony_server cgroup:dir create_dir_perms; 13 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | hal_cas.te | 15 r_dir_file(hal_cas, cgroup) 16 allow hal_cas cgroup:dir { search write }; 17 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 19 r_dir_file(hal_drm, cgroup) 20 allow hal_drm cgroup:dir { search write }; 21 allow hal_drm cgroup:file w_file_perms;
|
D | hal_telephony.te | 12 allow hal_telephony_server cgroup:dir create_dir_perms; 13 allow hal_telephony_server cgroup:{ file lnk_file } r_file_perms;
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_cas.te | 18 r_dir_file(hal_cas, cgroup) 19 allow hal_cas cgroup:dir { search write }; 20 allow hal_cas cgroup:file w_file_perms;
|
D | hal_drm.te | 27 r_dir_file(hal_drm, cgroup) 28 allow hal_drm cgroup:dir { search write }; 29 allow hal_drm cgroup:file w_file_perms;
|
D | lmkd.te | 28 allow lmkd cgroup:dir { remove_name rmdir }; 31 allow lmkd cgroup:file r_file_perms;
|
D | rild.te | 12 allow rild cgroup:dir create_dir_perms; 13 allow rild cgroup:{ file lnk_file } r_file_perms;
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_drm.te | 27 r_dir_file(hal_drm, cgroup) 28 allow hal_drm cgroup:dir { search write }; 29 allow hal_drm cgroup:file w_file_perms;
|