/external/fio/ |
cgroup.c | 2 * Code related to setting up a blkio cgroup 11 #include "cgroup.h" 36 if (!strcmp(mnt->mnt_type, "cgroup") && 44 log_err("fio: cgroup blkio does not appear to be mounted\n"); 61 log_err("fio: failed to allocate cgroup member\n"); 104 if (td->o.cgroup) 105 sprintf(str, "%s%s%s", mnt, FIO_OS_PATH_SEPARATOR, td->o.cgroup); 136 return write_int_to_file(td, root, "tasks", val, "cgroup write pid"); 165 td_verror(td, __e, "cgroup mkdir"); 175 "cgroup open weight") [all...] |
/external/chromium_org/chrome/browser/chromeos/power/ |
freezer_cgroup_process_manager.cc | 16 "/sys/fs/cgroup/freezer/chrome_renderers/freezer.state"; 26 LOG(WARNING) << "Cgroup freezer does not exist or is not writable. " 36 LOG(ERROR) << "Attempting to freeze renderers when the freezer cgroup is " 46 LOG(ERROR) << "Attempting to thaw renderers when the freezer cgroup is not "
|
freezer_cgroup_process_manager.h | 14 // Manages all the processes in the freezer cgroup on Chrome OS.
|
/external/libnl/src/cls/ |
cgroup.c | 2 * src/cls/cgroup.c Control Groups Classifier 12 #include <netlink/route/cls/cgroup.h> 18 "Usage: ... cgroup [OPTIONS]...\n" 66 .name = "cgroup",
|
/device/lge/mako/sepolicy/ |
rmt.te | 19 allow rmt cgroup:dir { create add_name };
|
/external/libnl/include/netlink/route/cls/ |
cgroup.h | 2 * netlink/route/cls/cgroup.h Control Groups Classifier
|
/external/libnl/lib/route/cls/ |
cgroup.c | 2 * lib/route/cls/cgroup.c Control Groups Classifier 14 * @defgroup cgroup Control Groups Classifier 26 #include <netlink/route/cls/cgroup.h> 121 .co_kind = "cgroup",
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
python-ext-sources | 17 util/cgroup.c
|
cgroup.c | 5 #include "cgroup.h" 31 if (!strcmp(type, "cgroup")) { 71 fprintf(stderr, "no access to cgroup %s\n", path); 110 * if add cgroup N, then need to find event N
|
/external/sepolicy/ |
sdcardd.te | 6 allow sdcardd cgroup:dir create_dir_perms;
|
dhcp.te | 8 allow dhcp cgroup:dir { create write add_name };
|
lmkd.te | 29 allow lmkd cgroup:dir { remove_name rmdir };
|
racoon.te | 13 allow racoon cgroup:dir { add_name create };
|
wpa.te | 11 allow wpa cgroup:dir create_dir_perms;
|
/external/chromium_org/base/process/ |
process_linux.cc | 31 const char kControlPath[] = "/sys/fs/cgroup/cpu%s/cgroup.procs"; 34 const char kProcPath[] = "/proc/%d/cgroup"; 38 // a cgroup mount in /sys/fs/cgroup and then configures two cpu task groups,
|
/device/asus/flo/sepolicy/ |
rmt.te | 22 allow rmt cgroup:dir { create add_name };
|
/device/lge/hammerhead/sepolicy/ |
rmt.te | 26 allow rmt cgroup:dir { create add_name };
|
/frameworks/base/core/tests/coretests/src/android/os/ |
BinderThreadPriorityTest.java | 79 Process.setThreadPriority(mSavedPriority); // To realign priority & cgroup, if needed 98 String fn = "/proc/" + Process.myPid() + "/task/" + Process.myTid() + "/cgroup"; 100 String cgroup = FileUtils.readTextFile(new File(fn), 1024, null); local 101 for (String line : cgroup.split("\n")) {
|
/system/core/libprocessgroup/ |
processgroup_priv.h | 23 #define PROCESSGROUP_CGROUP_PROCS_FILE "/cgroup.procs"
|
/external/kernel-headers/original/uapi/linux/ |
cgroupstats.h | 1 /* cgroupstats.h - exporting per-cgroup statistics 22 * Data shared between user space and kernel space on a per cgroup
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/ |
cgroupstats.h | 1 /* cgroupstats.h - exporting per-cgroup statistics 22 * Data shared between user space and kernel space on a per cgroup
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
cgroupstats.h | 1 /* cgroupstats.h - exporting per-cgroup statistics 22 * Data shared between user space and kernel space on a per cgroup
|
/system/core/include/cutils/ |
sched_policy.h | 37 /* Assign thread tid to the cgroup associated with the specified policy. 45 /* Return the policy associated with the cgroup of thread tid via policy pointer.
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/Documentation/ |
perf-stat.txt | 87 --cgroup name:: 88 monitor only in the container (cgroup) called "name". This option is available only 89 in per-cpu mode. The cgroup filesystem must be mounted. All threads belonging to 91 can be provided. Each cgroup is applied to the corresponding event, i.e., first cgroup 92 to first event, second cgroup to second event and so on. It is possible to provide 93 an empty cgroup (monitor all the time) using, e.g., -G foo,,bar. Cgroups must have
|
/system/core/rootdir/ |
init.rc | 45 # Create cgroup mount point for cpu accounting 47 mount cgroup none /acct cpuacct 50 # Create cgroup mount point for memory 51 mount tmpfs none /sys/fs/cgroup mode=0750,uid=0,gid=1000 52 mkdir /sys/fs/cgroup/memory 0750 root system 53 mount cgroup none /sys/fs/cgroup/memory memory 54 write /sys/fs/cgroup/memory/memory.move_charge_at_immigrate 1 55 chown root system /sys/fs/cgroup/memory/tasks 56 chmod 0660 /sys/fs/cgroup/memory/task [all...] |