HomeSort by relevance Sort by last modified time
    Searched full:cgroup (Results 1 - 25 of 75) sorted by null

1 2 3

  /external/fio/
cgroup.c 2 * Code related to setting up a blkio cgroup
11 #include "cgroup.h"
36 if (!strcmp(mnt->mnt_type, "cgroup") &&
44 log_err("fio: cgroup blkio does not appear to be mounted\n");
61 log_err("fio: failed to allocate cgroup member\n");
104 if (td->o.cgroup)
105 sprintf(str, "%s%s%s", mnt, FIO_OS_PATH_SEPARATOR, td->o.cgroup);
136 return write_int_to_file(td, root, "tasks", val, "cgroup write pid");
165 td_verror(td, __e, "cgroup mkdir");
175 "cgroup open weight")
    [all...]
  /external/chromium_org/chrome/browser/chromeos/power/
freezer_cgroup_process_manager.cc 16 "/sys/fs/cgroup/freezer/chrome_renderers/freezer.state";
26 LOG(WARNING) << "Cgroup freezer does not exist or is not writable. "
36 LOG(ERROR) << "Attempting to freeze renderers when the freezer cgroup is "
46 LOG(ERROR) << "Attempting to thaw renderers when the freezer cgroup is not "
freezer_cgroup_process_manager.h 14 // Manages all the processes in the freezer cgroup on Chrome OS.
  /external/libnl/src/cls/
cgroup.c 2 * src/cls/cgroup.c Control Groups Classifier
12 #include <netlink/route/cls/cgroup.h>
18 "Usage: ... cgroup [OPTIONS]...\n"
66 .name = "cgroup",
  /device/lge/mako/sepolicy/
rmt.te 19 allow rmt cgroup:dir { create add_name };
  /external/libnl/include/netlink/route/cls/
cgroup.h 2 * netlink/route/cls/cgroup.h Control Groups Classifier
  /external/libnl/lib/route/cls/
cgroup.c 2 * lib/route/cls/cgroup.c Control Groups Classifier
14 * @defgroup cgroup Control Groups Classifier
26 #include <netlink/route/cls/cgroup.h>
121 .co_kind = "cgroup",
  /external/linux-tools-perf/perf-3.12.0/tools/perf/util/
python-ext-sources 17 util/cgroup.c
cgroup.c 5 #include "cgroup.h"
31 if (!strcmp(type, "cgroup")) {
71 fprintf(stderr, "no access to cgroup %s\n", path);
110 * if add cgroup N, then need to find event N
  /external/sepolicy/
sdcardd.te 6 allow sdcardd cgroup:dir create_dir_perms;
dhcp.te 8 allow dhcp cgroup:dir { create write add_name };
lmkd.te 29 allow lmkd cgroup:dir { remove_name rmdir };
racoon.te 13 allow racoon cgroup:dir { add_name create };
wpa.te 11 allow wpa cgroup:dir create_dir_perms;
  /external/chromium_org/base/process/
process_linux.cc 31 const char kControlPath[] = "/sys/fs/cgroup/cpu%s/cgroup.procs";
34 const char kProcPath[] = "/proc/%d/cgroup";
38 // a cgroup mount in /sys/fs/cgroup and then configures two cpu task groups,
  /device/asus/flo/sepolicy/
rmt.te 22 allow rmt cgroup:dir { create add_name };
  /device/lge/hammerhead/sepolicy/
rmt.te 26 allow rmt cgroup:dir { create add_name };
  /frameworks/base/core/tests/coretests/src/android/os/
BinderThreadPriorityTest.java 79 Process.setThreadPriority(mSavedPriority); // To realign priority & cgroup, if needed
98 String fn = "/proc/" + Process.myPid() + "/task/" + Process.myTid() + "/cgroup";
100 String cgroup = FileUtils.readTextFile(new File(fn), 1024, null); local
101 for (String line : cgroup.split("\n")) {
  /system/core/libprocessgroup/
processgroup_priv.h 23 #define PROCESSGROUP_CGROUP_PROCS_FILE "/cgroup.procs"
  /external/kernel-headers/original/uapi/linux/
cgroupstats.h 1 /* cgroupstats.h - exporting per-cgroup statistics
22 * Data shared between user space and kernel space on a per cgroup
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/
cgroupstats.h 1 /* cgroupstats.h - exporting per-cgroup statistics
22 * Data shared between user space and kernel space on a per cgroup
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
cgroupstats.h 1 /* cgroupstats.h - exporting per-cgroup statistics
22 * Data shared between user space and kernel space on a per cgroup
  /system/core/include/cutils/
sched_policy.h 37 /* Assign thread tid to the cgroup associated with the specified policy.
45 /* Return the policy associated with the cgroup of thread tid via policy pointer.
  /external/linux-tools-perf/perf-3.12.0/tools/perf/Documentation/
perf-stat.txt 87 --cgroup name::
88 monitor only in the container (cgroup) called "name". This option is available only
89 in per-cpu mode. The cgroup filesystem must be mounted. All threads belonging to
91 can be provided. Each cgroup is applied to the corresponding event, i.e., first cgroup
92 to first event, second cgroup to second event and so on. It is possible to provide
93 an empty cgroup (monitor all the time) using, e.g., -G foo,,bar. Cgroups must have
  /system/core/rootdir/
init.rc 45 # Create cgroup mount point for cpu accounting
47 mount cgroup none /acct cpuacct
50 # Create cgroup mount point for memory
51 mount tmpfs none /sys/fs/cgroup mode=0750,uid=0,gid=1000
52 mkdir /sys/fs/cgroup/memory 0750 root system
53 mount cgroup none /sys/fs/cgroup/memory memory
54 write /sys/fs/cgroup/memory/memory.move_charge_at_immigrate 1
55 chown root system /sys/fs/cgroup/memory/tasks
56 chmod 0660 /sys/fs/cgroup/memory/task
    [all...]

Completed in 770 milliseconds

1 2 3