Provide SetUserProfiles API to apply profiles at UID level. This enables applying the freezer profile to an entire UID instead of just individual process cgroups. Test: bash arg: -p Test: bash arg: com.haok.nirvana Test: bash arg: 1 Test: args: [-p, com.haok.nirvana, 1] Test: arg: "-p" Test: arg: "com.haok.nirvana" Test: arg: "1" Test: data="com.haok.nirvana" Test: Events injected: 1 Test: ## Network stats: elapsed time=14ms (0ms mobile, 0ms wifi, 14ms not connected) Test: raven:/ $ ps -eo pid,uid,ppid,name|grep 10266 Test: 2499 10266 823 com.haok.nirvana Test: 2577 10266 823 com.haok.nirvana:resident Test: 2584 10266 823 android.media Test: 2669 10266 1 app_d Test: 2672 10266 1 app_d Test: raven:/ $ am force-stop com.haok.nirvana Test: raven:/ $ ps -eo pid,uid,ppid,name|grep 10266 Test: 1|raven:/ $ Ignore-AOSP-First: Topic with AMS changes which is developed on git_master Bug: 236708592 Change-Id: I45e34244f9943c217757cf346c9410672a1ce365
79 lines
3.4 KiB
C++
79 lines
3.4 KiB
C++
/*
|
|
* Copyright 2014 Google, Inc
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#pragma once
|
|
|
|
#include <sys/cdefs.h>
|
|
#include <sys/types.h>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
__BEGIN_DECLS
|
|
|
|
static constexpr const char* CGROUPV2_CONTROLLER_NAME = "cgroup2";
|
|
|
|
bool CgroupGetControllerPath(const std::string& cgroup_name, std::string* path);
|
|
bool CgroupGetControllerFromPath(const std::string& path, std::string* cgroup_name);
|
|
bool CgroupGetAttributePath(const std::string& attr_name, std::string* path);
|
|
bool CgroupGetAttributePathForTask(const std::string& attr_name, int tid, std::string* path);
|
|
|
|
bool SetTaskProfiles(int tid, const std::vector<std::string>& profiles, bool use_fd_cache = false);
|
|
bool SetProcessProfiles(uid_t uid, pid_t pid, const std::vector<std::string>& profiles);
|
|
bool SetUserProfiles(uid_t uid, const std::vector<std::string>& profiles);
|
|
|
|
#ifndef __ANDROID_VNDK__
|
|
|
|
bool SetProcessProfilesCached(uid_t uid, pid_t pid, const std::vector<std::string>& profiles);
|
|
|
|
static constexpr const char* CGROUPS_RC_PATH = "/dev/cgroup_info/cgroup.rc";
|
|
|
|
bool UsePerAppMemcg();
|
|
|
|
// Drop the fd cache of cgroup path. It is used for when resource caching is enabled and a process
|
|
// loses the access to the path, the access checking (See SetCgroupAction::EnableResourceCaching)
|
|
// should be active again. E.g. Zygote specialization for child process.
|
|
void DropTaskProfilesResourceCaching();
|
|
|
|
// Return 0 and removes the cgroup if there are no longer any processes in it.
|
|
// Returns -1 in the case of an error occurring or if there are processes still running
|
|
// even after retrying for up to 200ms.
|
|
// If max_processes is not nullptr, it returns the maximum number of processes seen in the cgroup
|
|
// during the killing process. Note that this can be 0 if all processes from the process group have
|
|
// already been terminated.
|
|
int killProcessGroup(uid_t uid, int initialPid, int signal, int* max_processes = nullptr);
|
|
|
|
// Returns the same as killProcessGroup(), however it does not retry, which means
|
|
// that it only returns 0 in the case that the cgroup exists and it contains no processes.
|
|
int killProcessGroupOnce(uid_t uid, int initialPid, int signal, int* max_processes = nullptr);
|
|
|
|
int createProcessGroup(uid_t uid, int initialPid, bool memControl = false);
|
|
|
|
// Set various properties of a process group. For these functions to work, the process group must
|
|
// have been created by passing memControl=true to createProcessGroup.
|
|
bool setProcessGroupSwappiness(uid_t uid, int initialPid, int swappiness);
|
|
bool setProcessGroupSoftLimit(uid_t uid, int initialPid, int64_t softLimitInBytes);
|
|
bool setProcessGroupLimit(uid_t uid, int initialPid, int64_t limitInBytes);
|
|
|
|
void removeAllProcessGroups(void);
|
|
void removeAllEmptyProcessGroups(void);
|
|
|
|
// Provides the path for an attribute in a specific process group
|
|
// Returns false in case of error, true in case of success
|
|
bool getAttributePathForTask(const std::string& attr_name, int tid, std::string* path);
|
|
|
|
#endif // __ANDROID_VNDK__
|
|
|
|
__END_DECLS
|