Lines Matching refs:cgroups

103 multiple individual control groups, the plural form "cgroups" is used.
120 cgroups form a tree structure and every process in the system belongs
130 processes which belong to the cgroups consisting the inclusive
206 propagation into leaf cgroups. This allows protecting entire
261 A given cgroup may have multiple child cgroups forming a tree
327 different cgroups and are not subject to the no internal process
328 constraint - threaded controllers can be enabled on non-leaf cgroups
334 can't have populated child cgroups which aren't threaded. Because the
336 serve both as a threaded domain and a parent to domain cgroups.
400 between threads in a non-leaf cgroup and its child cgroups. Each
431 both cgroups.
471 files in the child cgroups. In the above example, enabling "cpu" on B
494 Non-root cgroups can distribute domain resources to their children
496 only domain cgroups which don't contain any processes can have domain
501 the leaves. This rules out situations where child cgroups compete
506 with any other cgroups and requires special treatment from most
552 cgroups in or nesting depth of a delegated sub-hierarchy; however,
570 common ancestor of the source and destination cgroups.
576 For an example, let's assume cgroups C0 and C1 have been delegated to
593 that both the source and destination cgroups are reachable from the
604 Migrating a process across cgroups is a relatively expensive operation
610 As such, migrating processes across cgroups frequently as a means to
621 Interface files for a cgroup and its children cgroups occupy the same
622 directory and it is possible to create children cgroups which collide
849 cgroups.
871 all cgroups.
886 common ancestor of the source and destination cgroups.
897 all cgroups.
915 common ancestor of the source and destination cgroups.
922 cgroups.
929 cgroups. Starts out empty.
943 A read-only flat-keyed file which exists on non-root cgroups.
957 Maximum allowed number of descent cgroups.
972 Total number of visible descendant cgroups.
975 Total number of dying descendant cgroups. A cgroup becomes
995 A read-write single value file which exists on non-root cgroups.
999 descendant cgroups. This means that all belonging processes will
1007 of any ancestor cgroups. If any of ancestor cgroups is frozen, the
1018 create new sub-cgroups.
1021 A write-only single value file which exists in non-root cgroups.
1024 Writing "1" to the file causes the cgroup and all descendant cgroups to
1032 killing cgroups is a process directed operation, i.e. it affects
1050 be used to disable PSI accounting in the non-leaf cgroups.
1084 cgroups during the system boot process, and these processes may need
1114 cgroups. The default is "100".
1124 cgroups. The default is "0".
1135 A read-write two value file which exists on non-root cgroups.
1148 cgroups. The default is "0".
1159 A read-write single value file which exists on non-root cgroups.
1174 A read-write single value file which exists on non-root cgroups.
1185 A read-write single value file which exists on non-root cgroups.
1228 cgroups.
1235 cgroups. The default is "0".
1247 all ancestor cgroups. If there is memory.min overcommitment
1248 (child cgroup or cgroups are requiring more protected memory
1261 cgroups. The default is "0".
1266 memory available in unprotected cgroups.
1273 all ancestor cgroups. If there is memory.low overcommitment
1274 (child cgroup or cgroups are requiring more protected memory
1284 cgroups. The default is "max".
1298 cgroups. The default is "max".
1314 A write-only nested-keyed file which exists for all cgroups.
1346 A read-write single value file which exists on non-root cgroups.
1357 cgroups. The default value is "0".
1371 memory.oom.group values of ancestor cgroups.
1374 A read-only flat-keyed file which exists on non-root cgroups.
1424 A read-only flat-keyed file which exists on non-root cgroups.
1659 A read-only nested-keyed file which exists on non-root cgroups.
1685 cgroups.
1692 cgroups. The default is "max".
1707 A read-write single value file which exists on non-root cgroups.
1718 cgroups. The default is "max".
1724 A read-only flat-keyed file which exists on non-root cgroups.
1750 cgroups.
1757 cgroups. The default is "max".
1766 implicitly disabled for child cgroups if the upper hierarchy
1820 A memory area may be used by processes belonging to different cgroups.
1826 to be accessed repeatedly by other cgroups, it may make sense to use
1962 A read-write flat-keyed file which exists on non-root cgroups.
1983 cgroups.
2056 which are associated with different cgroups than the one the inode is
2064 changes over time, use cases where multiple cgroups write to a single
2069 strictly follows page ownership, multiple cgroups dirtying overlapping
2249 cgroups. The default is "max".
2254 A read-only single value file which exists on non-root cgroups.
2260 A read-only single value file which exists on non-root cgroups.
2266 A read-only flat-keyed file which exists on non-root cgroups. Unless
2308 cpuset-enabled cgroups.
2330 cpuset-enabled cgroups.
2347 cpuset-enabled cgroups.
2381 cpuset-enabled cgroups.
2397 cpuset-enabled cgroups.
2421 be distributed to at most one of its child cgroups. Having an
2422 exclusive CPU appearing in two or more of its child cgroups is
2431 cpuset-enabled cgroups.
2451 cpuset-enabled cgroups. This flag is owned by the parent cgroup
2462 A cpuset partition is a collection of cpuset-enabled cgroups with
2466 set of exclusive CPUs allocated to it. Other cgroups outside
2485 be changed. All other non-root cgroups start out as "member".
2571 them to cgroups with BPF_CGROUP_DEVICE flag. On an attempt to access a
2595 A readwrite nested-keyed file that exists for all the cgroups
2642 A read-only flat-keyed file which exists on non-root cgroups.
2689 A read-only flat-keyed file shown in the all cgroups. It shows
2697 A read-only flat-keyed file shown in all cgroups. It shows the
2706 A read-write flat-keyed file shown in the non root cgroups. Allowed
2725 A read-only flat-keyed file which exists on non-root cgroups. The
2804 a set of cgroups and namespaces are intended to isolate processes the
2835 namespace is destroyed. The cgroupns root and the actual cgroups
2893 namespace root if they have proper access to external cgroups. For
2989 - /proc/cgroups is meaningless for v2. Use "cgroup.controllers" or
3052 cgroup v1 allowed threads of a process to belong to different cgroups.
3064 in combination with thread granularity. cgroups were delegated to
3096 cgroup v1 allowed threads to be in any cgroups which created an
3098 children cgroups competed for resources. This was nasty as two
3102 The cpu controller considered threads and cgroups as equivalents and
3120 between internal tasks and child cgroups and the behavior was not
3147 all cgroups as if they were all located directly under the root
3170 that is per default unset. As a result, the set of cgroups that