/external/ltp/testcases/kernel/controllers/freezer/ |
TODO | 7 Generate patch adding these tests to the controllers (cgroup) suite 24 ./libcgroup_subsys:828: assert_cgroup_freezer_state "FROZEN" "ERROR: failed to freeze cgroup" 25 ./libcgroup_subsys:846: assert_cgroup_freezer_state "THAWED" "ERROR: Failed to thaw cgroup." 26 ./freezer/freeze_move_thaw.sh:22: "ERROR: cgroup freezer started in non-THAWED state" 27 ./freezer/freeze_cancel.sh:18: "ERROR: cgroup freezer started in non-THAWED state" 30 ./freezer/freeze_self_thaw.sh:31: "ERROR: cgroup freezer started in non-THAWED state" && { 31 ./freezer/freeze_thaw.sh:17: "ERROR: cgroup freezer started in non-THAWED state" 32 ./freezer/stop_freeze_thaw_cont.sh:18: "ERROR: cgroup freezer started in non-THAWED state" 33 ./freezer/freeze_write_freezing.sh:16: "ERROR: cgroup freezer started in non-THAWED state" 35 ./freezer/stop_freeze_sleep_thaw_cont.sh:18: "ERROR: cgroup freezer started in non-THAWED state [all...] |
freeze_move_thaw.sh | 24 # cgroup. We expect moving the sleep process to fail. [While developing 25 # the cgroup freezer it was undecided whether moving would fail or it would 28 # be removed once the cgroup freezer is in mainline. ] 47 "ERROR: cgroup freezer started in non-THAWED state" 66 # This block of comments can be removed once the cgroup freezer has 79 # This block of comments can be removed once the cgroup freezer has 93 # This block of comments can be removed once the cgroup freezer has
|
00_description.txt | 3 We initially try to freeze the cgroup but then try to cancel that. 12 after the cgroup is thawed. 17 cgroup. We expect moving the sleep process to fail. 30 sleep process to wakeup almost immediately after the cgroup is thawed, 40 Freeze the cgroup and then make sure that writing "FREEZING" into 67 A task within the cgroup to be frozen tries to fork.
|
/external/lisa/experiments/ |
run_uibench_cgroup.py | 2 # This experiment enables CGroup tracing for UiBench workloads 4 # - post_collect_start hook used to dump fake cgroup events 26 parser.add_argument('--out_prefix', dest='out_prefix', action='store', default='cgroup', 88 'cgroups' # Enable for cgroup support, doing this also enables cgroup tracing 97 # Mandatory events for CGroup tracing
|
/external/autotest/client/site_tests/kernel_SchedBandwith/ |
control | 7 Runs a cpu-hogging process in the Chrome renderer background cgroup, which is 12 Checks that /sys/fs/cgroup/cpu/chrome_renderers/background/cpu.cfs_quota_us
|
/external/autotest/client/site_tests/kernel_SchedCgroups/ |
kernel_SchedCgroups.py | 27 utils.system('mount -t cgroup cgroup %s -o cpu' % self._tmpdir)
|
control | 19 This test tries to create a cgroup hierarchy and verifies division of CPU within
|
/external/ltp/testcases/kernel/controllers/cgroup/ |
test_3_1.sh | 28 mkdir cgroup/0 29 rmdir cgroup/0
|
/system/sepolicy/public/ |
lmkd.te | 28 allow lmkd cgroup:dir { remove_name rmdir }; 31 allow lmkd cgroup:file r_file_perms;
|
hal_fingerprint.te | 17 r_dir_file(hal_fingerprint, cgroup)
|
hal_drm.te | 27 r_dir_file(hal_drm, cgroup) 28 allow hal_drm cgroup:dir { search write }; 29 allow hal_drm cgroup:file w_file_perms;
|
fingerprintd.te | 26 r_dir_file(fingerprintd, cgroup)
|
keystore.te | 20 r_dir_file(keystore, cgroup)
|
/system/sepolicy/prebuilts/api/26.0/public/ |
hal_fingerprint.te | 17 r_dir_file(hal_fingerprint, cgroup)
|
hal_drm.te | 27 r_dir_file(hal_drm, cgroup) 28 allow hal_drm cgroup:dir { search write }; 29 allow hal_drm cgroup:file w_file_perms;
|
fingerprintd.te | 26 r_dir_file(fingerprintd, cgroup)
|
keystore.te | 20 r_dir_file(keystore, cgroup)
|
performanced.te | 18 r_dir_file(performanced, cgroup)
|
/external/autotest/client/tests/cgroup/ |
cgroup.py | 7 from cgroup_common import Cgroup as CG 10 class cgroup(test.test): class in inherits:test.test 12 Tests the cgroup functionalities. It works by creating a process (which is 22 Try to access different resources which are restricted by cgroup. 24 logging.info('Starting cgroup testing') 61 raise error.TestFail('Can\'t mount any cgroup modules') 84 err += "\nCan't remove cgroup directory" 97 raise error.TestFail("cgroup init failed") 104 raise error.TestFail("Can't create cgroup") 140 # Fill the memory without cgroup limitatio [all...] |
/external/ltp/testcases/kernel/controllers/memctl/ |
myfunctions.sh | 26 # mounting it with cgroup filesystem with option memory and # 29 # Functions: setup(): creaes /dev/memctl, mounts cgroup fs on it, creates # 54 # Create /dev/memctl & mount the cgroup file system with memory controller 67 mount -t cgroup -omemory cgroup /dev/memctl 2> /dev/null 70 echo "ERROR: Could not mount cgroup filesystem on /dev/memctl..Exiting test";
|
/external/libnl/include/netlink/route/cls/ |
cgroup.h | 2 * netlink/route/cls/cgroup.h Control Groups Classifier
|
/system/update_engine/common/ |
cpu_limiter.cc | 30 // Cgroup container is created in update-engine's upstart script located at 32 const char kCGroupSharesPath[] = "/sys/fs/cgroup/cpu/update-engine/cpu.shares"; 71 LOG(INFO) << "Setting cgroup cpu shares to " << string_shares; 74 LOG(ERROR) << "Failed to change cgroup cpu shares to " << string_shares
|
/device/asus/fugu/sepolicy/ |
device_domain_deprecated.te | 31 allow device_domain_deprecated cgroup:dir r_dir_perms; 32 allow device_domain_deprecated cgroup:{ file lnk_file } r_file_perms;
|
/device/google/dragon/sepolicy/ |
device_domain_deprecated.te | 31 allow device_domain_deprecated cgroup:dir r_dir_perms; 32 allow device_domain_deprecated cgroup:{ file lnk_file } r_file_perms;
|
/device/huawei/angler/sepolicy/ |
device_domain_deprecated.te | 31 allow device_domain_deprecated cgroup:dir r_dir_perms; 32 allow device_domain_deprecated cgroup:{ file lnk_file } r_file_perms;
|