Lines Matching refs:cgroups
103 multiple individual control groups, the plural form "cgroups" is used.
120 cgroups form a tree structure and every process in the system belongs
130 processes which belong to the cgroups consisting the inclusive
206 propagation into leaf cgroups. This allows protecting entire
225 A given cgroup may have multiple child cgroups forming a tree
291 different cgroups and are not subject to the no internal process
292 constraint - threaded controllers can be enabled on non-leaf cgroups
298 can't have populated child cgroups which aren't threaded. Because the
300 serve both as a threaded domain and a parent to domain cgroups.
364 between threads in a non-leaf cgroup and its child cgroups. Each
388 both cgroups.
428 files in the child cgroups. In the above example, enabling "cpu" on B
451 Non-root cgroups can distribute domain resources to their children
453 only domain cgroups which don't contain any processes can have domain
458 the leaves. This rules out situations where child cgroups compete
463 with any other cgroups and requires special treatment from most
507 cgroups in or nesting depth of a delegated sub-hierarchy; however,
525 common ancestor of the source and destination cgroups.
531 For an example, let's assume cgroups C0 and C1 have been delegated to
548 that both the source and destination cgroups are reachable from the
559 Migrating a process across cgroups is a relatively expensive operation
565 As such, migrating processes across cgroups frequently as a means to
576 Interface files for a cgroup and its children cgroups occupy the same
577 directory and it is possible to create children cgroups which collide
804 cgroups.
826 all cgroups.
841 common ancestor of the source and destination cgroups.
852 all cgroups.
870 common ancestor of the source and destination cgroups.
877 cgroups.
884 cgroups. Starts out empty.
898 A read-only flat-keyed file which exists on non-root cgroups.
912 Maximum allowed number of descent cgroups.
927 Total number of visible descendant cgroups.
930 Total number of dying descendant cgroups. A cgroup becomes
942 A read-write single value file which exists on non-root cgroups.
946 descendant cgroups. This means that all belonging processes will
954 of any ancestor cgroups. If any of ancestor cgroups is frozen, the
965 create new sub-cgroups.
968 A write-only single value file which exists in non-root cgroups.
971 Writing "1" to the file causes the cgroup and all descendant cgroups to
979 killing cgroups is a process directed operation, i.e. it affects
997 be used to disable PSI accounting in the non-leaf cgroups.
1028 have placed RT processes into nonroot cgroups during the system boot
1058 cgroups. The default is "100".
1064 cgroups. The default is "0".
1075 A read-write two value file which exists on non-root cgroups.
1088 cgroups. The default is "0".
1099 A read-write single value file which exists on non-root cgroups.
1114 A read-write single value file which exists on non-root cgroups.
1158 cgroups.
1165 cgroups. The default is "0".
1177 all ancestor cgroups. If there is memory.min overcommitment
1178 (child cgroup or cgroups are requiring more protected memory
1191 cgroups. The default is "0".
1196 memory available in unprotected cgroups.
1203 all ancestor cgroups. If there is memory.low overcommitment
1204 (child cgroup or cgroups are requiring more protected memory
1214 cgroups. The default is "max".
1228 cgroups. The default is "max".
1244 A write-only nested-keyed file which exists for all cgroups.
1273 cgroups.
1280 cgroups. The default value is "0".
1294 memory.oom.group values of ancestor cgroups.
1297 A read-only flat-keyed file which exists on non-root cgroups.
1347 A read-only flat-keyed file which exists on non-root cgroups.
1536 A read-only nested-keyed file which exists on non-root cgroups.
1562 cgroups.
1569 cgroups. The default is "max".
1585 cgroups.
1592 cgroups. The default is "max".
1598 A read-only flat-keyed file which exists on non-root cgroups.
1624 cgroups.
1631 cgroups. The default is "max".
1676 A memory area may be used by processes belonging to different cgroups.
1682 to be accessed repeatedly by other cgroups, it may make sense to use
1818 A read-write flat-keyed file which exists on non-root cgroups.
1839 cgroups.
1912 which are associated with different cgroups than the one the inode is
1920 changes over time, use cases where multiple cgroups write to a single
1925 strictly follows page ownership, multiple cgroups dirtying overlapping
2103 cgroups. The default is "max".
2108 A read-only single value file which exists on all cgroups.
2142 cpuset-enabled cgroups.
2164 cpuset-enabled cgroups.
2181 cpuset-enabled cgroups.
2215 cpuset-enabled cgroups.
2231 cpuset-enabled cgroups. This flag is owned by the parent cgroup
2243 cannot be changed. All other non-root cgroups start out as
2335 them to cgroups with BPF_CGROUP_DEVICE flag. On an attempt to access a
2359 A readwrite nested-keyed file that exists for all the cgroups
2406 A read-only flat-keyed file which exists on non-root cgroups.
2453 A read-only flat-keyed file shown in the all cgroups. It shows
2461 A read-write flat-keyed file shown in the non root cgroups. Allowed
2480 A read-only flat-keyed file which exists on non-root cgroups. The
2554 a set of cgroups and namespaces are intended to isolate processes the
2585 namespace is destroyed. The cgroupns root and the actual cgroups
2643 namespace root if they have proper access to external cgroups. For
2739 - /proc/cgroups is meaningless for v2. Use "cgroup.controllers" file
2802 cgroup v1 allowed threads of a process to belong to different cgroups.
2814 in combination with thread granularity. cgroups were delegated to
2846 cgroup v1 allowed threads to be in any cgroups which created an
2848 children cgroups competed for resources. This was nasty as two
2852 The cpu controller considered threads and cgroups as equivalents and
2870 between internal tasks and child cgroups and the behavior was not
2897 all cgroups as if they were all located directly under the root
2920 that is per default unset. As a result, the set of cgroups that