diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
commit | fc22b3d6507c6745911b9dfcc68f1e665ae13dbc (patch) | |
tree | ce1e3bce06471410239a6f41282e328770aa404a /templates/man7/cgroups.7.pot | |
parent | Initial commit. (diff) | |
download | manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.tar.xz manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.zip |
Adding upstream version 4.22.0.upstream/4.22.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'templates/man7/cgroups.7.pot')
-rw-r--r-- | templates/man7/cgroups.7.pot | 3118 |
1 files changed, 3118 insertions, 0 deletions
diff --git a/templates/man7/cgroups.7.pot b/templates/man7/cgroups.7.pot new file mode 100644 index 00000000..9569cb83 --- /dev/null +++ b/templates/man7/cgroups.7.pot @@ -0,0 +1,3118 @@ +# SOME DESCRIPTIVE TITLE +# Copyright (C) YEAR Free Software Foundation, Inc. +# This file is distributed under the same license as the PACKAGE package. +# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. +# +#, fuzzy +msgid "" +msgstr "" +"Project-Id-Version: PACKAGE VERSION\n" +"POT-Creation-Date: 2024-03-01 16:53+0100\n" +"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "cgroups" +msgstr "" + +#. type: TH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "2023-10-31" +msgstr "" + +#. type: TH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "Linux man-pages 6.06" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "NAME" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "cgroups - Linux control groups" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "DESCRIPTION" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Control groups, usually referred to as cgroups, are a Linux kernel feature " +"which allow processes to be organized into hierarchical groups whose usage " +"of various types of resources can then be limited and monitored. The " +"kernel's cgroup interface is provided through a pseudo-filesystem called " +"cgroupfs. Grouping is implemented in the core cgroup kernel code, while " +"resource tracking and limits are implemented in a set of per-resource-type " +"subsystems (memory, CPU, and so on)." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Terminology" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A I<cgroup> is a collection of processes that are bound to a set of limits " +"or parameters defined via the cgroup filesystem." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A I<subsystem> is a kernel component that modifies the behavior of the " +"processes in a cgroup. Various subsystems have been implemented, making it " +"possible to do things such as limiting the amount of CPU time and memory " +"available to a cgroup, accounting for the CPU time used by a cgroup, and " +"freezing and resuming execution of the processes in a cgroup. Subsystems " +"are sometimes also known as I<resource controllers> (or simply, controllers)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The cgroups for a controller are arranged in a I<hierarchy>. This hierarchy " +"is defined by creating, removing, and renaming subdirectories within the " +"cgroup filesystem. At each level of the hierarchy, attributes (e.g., " +"limits) can be defined. The limits, control, and accounting provided by " +"cgroups generally have effect throughout the subhierarchy underneath the " +"cgroup where the attributes are defined. Thus, for example, the limits " +"placed on a cgroup at a higher level in the hierarchy cannot be exceeded by " +"descendant cgroups." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups version 1 and version 2" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The initial release of the cgroups implementation was in Linux 2.6.24. Over " +"time, various cgroup controllers have been added to allow the management of " +"various types of resources. However, the development of these controllers " +"was largely uncoordinated, with the result that many inconsistencies arose " +"between controllers and management of the cgroup hierarchies became rather " +"complex. A longer description of these problems can be found in the kernel " +"source file I<Documentation/admin-guide/cgroup-v2.rst> (or I<Documentation/" +"cgroup-v2.txt> in Linux 4.17 and earlier)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Because of the problems with the initial cgroups implementation (cgroups " +"version 1), starting in Linux 3.10, work began on a new, orthogonal " +"implementation to remedy these problems. Initially marked experimental, and " +"hidden behind the I<-o\\ __DEVEL__sane_behavior> mount option, the new " +"version (cgroups version 2) was eventually made official with the release " +"of Linux 4.5. Differences between the two versions are described in the " +"text below. The file I<cgroup.sane_behavior>, present in cgroups v1, is a " +"relic of this mount option. The file always reports \"0\" and is only " +"retained for backward compatibility." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Although cgroups v2 is intended as a replacement for cgroups v1, the older " +"system continues to exist (and for compatibility reasons is unlikely to be " +"removed). Currently, cgroups v2 implements only a subset of the controllers " +"available in cgroups v1. The two systems are implemented so that both v1 " +"controllers and v2 controllers can be mounted on the same system. Thus, for " +"example, it is possible to use those controllers that are supported under " +"version 2, while also using version 1 controllers where version 2 does not " +"yet support those controllers. The only restriction here is that a " +"controller can't be simultaneously employed in both a cgroups v1 hierarchy " +"and in the cgroups v2 hierarchy." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "CGROUPS VERSION 1" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Under cgroups v1, each controller may be mounted against a separate cgroup " +"filesystem that provides its own hierarchical organization of the processes " +"on the system. It is also possible to comount multiple (or even all) " +"cgroups v1 controllers against the same cgroup filesystem, meaning that the " +"comounted controllers manage the same hierarchical organization of processes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For each mounted hierarchy, the directory tree mirrors the control group " +"hierarchy. Each control group is represented by a directory, with each of " +"its child control cgroups represented as a child directory. For instance, " +"I</user/joe/1.session> represents control group I<1.session>, which is a " +"child of cgroup I<joe>, which is a child of I</user>. Under each cgroup " +"directory is a set of files which can be read or written to, reflecting " +"resource limits and a few general cgroup properties." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Tasks (threads) versus processes" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1, a distinction is drawn between I<processes> and I<tasks>. In " +"this view, a process can consist of multiple tasks (more commonly called " +"threads, from a user-space perspective, and called such in the remainder of " +"this man page). In cgroups v1, it is possible to independently manipulate " +"the cgroup memberships of the threads in a process." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The cgroups v1 ability to split threads across different cgroups caused " +"problems in some cases. For example, it made no sense for the I<memory> " +"controller, since all of the threads of a process share a single address " +"space. Because of these problems, the ability to independently manipulate " +"the cgroup memberships of the threads in a process was removed in the " +"initial cgroups v2 implementation, and subsequently restored in a more " +"limited form (see the discussion of \"thread mode\" below)." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Mounting v1 controllers" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The use of cgroups requires a kernel built with the B<CONFIG_CGROUP> " +"option. In addition, each of the v1 controllers has an associated " +"configuration option that must be set in order to employ that controller." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In order to use a v1 controller, it must be mounted against a cgroup " +"filesystem. The usual place for such mounts is under a B<tmpfs>(5) " +"filesystem mounted at I</sys/fs/cgroup>. Thus, one might mount the I<cpu> " +"controller as follows:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -t cgroup -o cpu none /sys/fs/cgroup/cpu\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"It is possible to comount multiple controllers against the same hierarchy. " +"For example, here the I<cpu> and I<cpuacct> controllers are comounted " +"against a single hierarchy:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -t cgroup -o cpu,cpuacct none /sys/fs/cgroup/cpu,cpuacct\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Comounting controllers has the effect that a process is in the same cgroup " +"for all of the comounted controllers. Separately mounting controllers " +"allows a process to be in cgroup I</foo1> for one controller while being in " +"I</foo2/foo3> for another." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"It is possible to comount all v1 controllers against the same hierarchy:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -t cgroup -o all cgroup /sys/fs/cgroup\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"(One can achieve the same result by omitting I<-o all>, since it is the " +"default if no controllers are explicitly specified.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"It is not possible to mount the same controller against multiple cgroup " +"hierarchies. For example, it is not possible to mount both the I<cpu> and " +"I<cpuacct> controllers against one hierarchy, and to mount the I<cpu> " +"controller alone against another hierarchy. It is possible to create " +"multiple mount with exactly the same set of comounted controllers. However, " +"in this case all that results is multiple mount points providing a view of " +"the same hierarchy." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Note that on many systems, the v1 controllers are automatically mounted " +"under I</sys/fs/cgroup>; in particular, B<systemd>(1) automatically creates " +"such mounts." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Unmounting v1 controllers" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A mounted cgroup filesystem can be unmounted using the B<umount>(8) " +"command, as in the following example:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "umount /sys/fs/cgroup/pids\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<But note well>: a cgroup filesystem is unmounted only if it is not busy, " +"that is, it has no child cgroups. If this is not the case, then the only " +"effect of the B<umount>(8) is to make the mount invisible. Thus, to ensure " +"that the mount is really removed, one must first remove all child cgroups, " +"which in turn can be done only after all member processes have been moved " +"from those cgroups to the root cgroup." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups version 1 controllers" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Each of the cgroups version 1 controllers is governed by a kernel " +"configuration option (listed below). Additionally, the availability of the " +"cgroups feature is governed by the B<CONFIG_CGROUPS> kernel configuration " +"option." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cpu> (since Linux 2.6.24; B<CONFIG_CGROUP_SCHED>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Cgroups can be guaranteed a minimum number of \"CPU shares\" when a system " +"is busy. This does not limit a cgroup's CPU usage if the CPUs are not " +"busy. For further information, see I<Documentation/scheduler/sched-design-" +"CFS.rst> (or I<Documentation/scheduler/sched-design-CFS.txt> in Linux 5.2 " +"and earlier)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In Linux 3.2, this controller was extended to provide CPU \"bandwidth\" " +"control. If the kernel is configured with B<CONFIG_CFS_BANDWIDTH>, then " +"within each scheduling period (defined via a file in the cgroup directory), " +"it is possible to define an upper limit on the CPU time allocated to the " +"processes in a cgroup. This upper limit applies even if there is no other " +"competition for the CPU. Further information can be found in the kernel " +"source file I<Documentation/scheduler/sched-bwc.rst> (or I<Documentation/" +"scheduler/sched-bwc.txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cpuacct> (since Linux 2.6.24; B<CONFIG_CGROUP_CPUACCT>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This provides accounting for CPU usage by groups of processes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/cpuacct.rst> (or I<Documentation/cgroup-v1/cpuacct." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cpuset> (since Linux 2.6.24; B<CONFIG_CPUSETS>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This cgroup can be used to bind the processes in a cgroup to a specified set " +"of CPUs and NUMA nodes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/cpusets.rst> (or I<Documentation/cgroup-v1/cpusets." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<memory> (since Linux 2.6.25; B<CONFIG_MEMCG>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The memory controller supports reporting and limiting of process memory, " +"kernel memory, and swap used by cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/memory.rst> (or I<Documentation/cgroup-v1/memory.txt> " +"in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<devices> (since Linux 2.6.26; B<CONFIG_CGROUP_DEVICE>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This supports controlling which processes may create (mknod) devices as well " +"as open them for reading or writing. The policies may be specified as allow-" +"lists and deny-lists. Hierarchy is enforced, so new rules must not violate " +"existing rules for the target or ancestor cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/devices.rst> (or I<Documentation/cgroup-v1/devices." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<freezer> (since Linux 2.6.28; B<CONFIG_CGROUP_FREEZER>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<freezer> cgroup can suspend and restore (resume) all processes in a " +"cgroup. Freezing a cgroup I</A> also causes its children, for example, " +"processes in I</A/B>, to be frozen." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/freezer-subsystem.rst> (or I<Documentation/cgroup-v1/" +"freezer-subsystem.txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<net_cls> (since Linux 2.6.29; B<CONFIG_CGROUP_NET_CLASSID>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This places a classid, specified for the cgroup, on network packets created " +"by a cgroup. These classids can then be used in firewall rules, as well as " +"used to shape traffic using B<tc>(8). This applies only to packets leaving " +"the cgroup, not to traffic arriving at the cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/net_cls.rst> (or I<Documentation/cgroup-v1/net_cls." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<blkio> (since Linux 2.6.33; B<CONFIG_BLK_CGROUP>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<blkio> cgroup controls and limits access to specified block devices by " +"applying IO control in the form of throttling and upper limits against leaf " +"nodes and intermediate nodes in the storage hierarchy." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Two policies are available. The first is a proportional-weight time-based " +"division of disk implemented with CFQ. This is in effect for leaf nodes " +"using CFQ. The second is a throttling policy which specifies upper I/O rate " +"limits on a device." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/blkio-controller.rst> (or I<Documentation/cgroup-v1/" +"blkio-controller.txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<perf_event> (since Linux 2.6.39; B<CONFIG_CGROUP_PERF>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This controller allows I<perf> monitoring of the set of processes grouped in " +"a cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "Further information can be found in the kernel source files" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<net_prio> (since Linux 3.3; B<CONFIG_CGROUP_NET_PRIO>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This allows priorities to be specified, per network interface, for cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/net_prio.rst> (or I<Documentation/cgroup-v1/net_prio." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<hugetlb> (since Linux 3.5; B<CONFIG_CGROUP_HUGETLB>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This supports limiting the use of huge pages by cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/hugetlb.rst> (or I<Documentation/cgroup-v1/hugetlb." +"txt> in Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<pids> (since Linux 4.3; B<CONFIG_CGROUP_PIDS>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This controller permits limiting the number of process that may be created " +"in a cgroup (and its descendants)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/pids.rst> (or I<Documentation/cgroup-v1/pids.txt> in " +"Linux 5.2 and earlier)." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<rdma> (since Linux 4.11; B<CONFIG_CGROUP_RDMA>)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The RDMA controller permits limiting the use of RDMA/IB-specific resources " +"per cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Further information can be found in the kernel source file I<Documentation/" +"admin-guide/cgroup-v1/rdma.rst> (or I<Documentation/cgroup-v1/rdma.txt> in " +"Linux 5.2 and earlier)." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Creating cgroups and moving processes" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A cgroup filesystem initially contains a single root cgroup, '/', which all " +"processes belong to. A new cgroup is created by creating a directory in the " +"cgroup filesystem:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mkdir /sys/fs/cgroup/cpu/cg1\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This creates a new empty cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A process may be moved to this cgroup by writing its PID into the cgroup's " +"I<cgroup.procs> file:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "echo $$ E<gt> /sys/fs/cgroup/cpu/cg1/cgroup.procs\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "Only one PID at a time should be written to this file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Writing the value 0 to a I<cgroup.procs> file causes the writing process to " +"be moved to the corresponding cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"When writing a PID into the I<cgroup.procs>, all threads in the process are " +"moved into the new cgroup at once." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Within a hierarchy, a process can be a member of exactly one cgroup. " +"Writing a process's PID to a I<cgroup.procs> file automatically removes it " +"from the cgroup of which it was previously a member." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<cgroup.procs> file can be read to obtain a list of the processes that " +"are members of a cgroup. The returned list of PIDs is not guaranteed to be " +"in order. Nor is it guaranteed to be free of duplicates. (For example, a " +"PID may be recycled while reading from the list.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1, an individual thread can be moved to another cgroup by " +"writing its thread ID (i.e., the kernel thread ID returned by B<clone>(2) " +"and B<gettid>(2)) to the I<tasks> file in a cgroup directory. This file " +"can be read to discover the set of threads that are members of the cgroup." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Removing cgroups" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"To remove a cgroup, it must first have no child cgroups and contain no " +"(nonzombie) processes. So long as that is the case, one can simply remove " +"the corresponding directory pathname. Note that files in a cgroup directory " +"cannot and need not be removed." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v1 release notification" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Two files can be used to determine whether the kernel provides notifications " +"when a cgroup becomes empty. A cgroup is considered to be empty when it " +"contains no child cgroups and no member processes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A special file in the root directory of each cgroup hierarchy, " +"I<release_agent>, can be used to register the pathname of a program that may " +"be invoked when a cgroup in the hierarchy becomes empty. The pathname of " +"the newly empty cgroup (relative to the cgroup mount point) is provided as " +"the sole command-line argument when the I<release_agent> program is " +"invoked. The I<release_agent> program might remove the cgroup directory, or " +"perhaps repopulate it with a process." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The default value of the I<release_agent> file is empty, meaning that no " +"release agent is invoked." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The content of the I<release_agent> file can also be specified via a mount " +"option when the cgroup filesystem is mounted:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -o release_agent=pathname ...\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Whether or not the I<release_agent> program is invoked when a particular " +"cgroup becomes empty is determined by the value in the I<notify_on_release> " +"file in the corresponding cgroup directory. If this file contains the value " +"0, then the I<release_agent> program is not invoked. If it contains the " +"value 1, the I<release_agent> program is invoked. The default value for " +"this file in the root cgroup is 0. At the time when a new cgroup is " +"created, the value in this file is inherited from the corresponding file in " +"the parent cgroup." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroup v1 named hierarchies" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1, it is possible to mount a cgroup hierarchy that has no " +"attached controllers:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -t cgroup -o none,name=somename none /some/mount/point\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Multiple instances of such hierarchies can be mounted; each hierarchy must " +"have a unique name. The only purpose of such hierarchies is to track " +"processes. (See the discussion of release notification below.) An example " +"of this is the I<name=systemd> cgroup hierarchy that is used by " +"B<systemd>(1) to track services and user sessions." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Since Linux 5.0, the I<cgroup_no_v1> kernel boot option (described below) " +"can be used to disable cgroup v1 named hierarchies, by specifying " +"I<cgroup_no_v1=named>." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "CGROUPS VERSION 2" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v2, all mounted controllers reside in a single unified " +"hierarchy. While (different) controllers may be simultaneously mounted " +"under the v1 and v2 hierarchies, it is not possible to mount the same " +"controller simultaneously under both the v1 and the v2 hierarchies." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The new behaviors in cgroups v2 are summarized here, and in some cases " +"elaborated in the following subsections." +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "\\[bu]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Cgroups v2 provides a unified hierarchy against which all controllers are " +"mounted." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"\"Internal\" processes are not permitted. With the exception of the root " +"cgroup, processes may reside only in leaf nodes (cgroups that do not " +"themselves contain child cgroups). The details are somewhat more subtle " +"than this, and are described below." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Active cgroups must be specified via the files I<cgroup.controllers> and " +"I<cgroup.subtree_control>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<tasks> file has been removed. In addition, the I<cgroup." +"clone_children> file that is employed by the I<cpuset> controller has been " +"removed." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"An improved mechanism for notification of empty cgroups is provided by the " +"I<cgroup.events> file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For more changes, see the I<Documentation/admin-guide/cgroup-v2.rst> file in " +"the kernel source (or I<Documentation/cgroup-v2.txt> in Linux 4.17 and " +"earlier)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Some of the new behaviors listed above saw subsequent modification with the " +"addition in Linux 4.14 of \"thread mode\" (described below)." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 unified hierarchy" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1, the ability to mount different controllers against different " +"hierarchies was intended to allow great flexibility for application design. " +"In practice, though, the flexibility turned out to be less useful than " +"expected, and in many cases added complexity. Therefore, in cgroups v2, all " +"available controllers are mounted against a single hierarchy. The available " +"controllers are automatically mounted, meaning that it is not necessary (or " +"possible) to specify the controllers when mounting the cgroup v2 filesystem " +"using a command such as the following:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "mount -t cgroup2 none /mnt/cgroup2\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A cgroup v2 controller is available only if it is not currently in use via a " +"mount against a cgroup v1 hierarchy. Or, to put things another way, it is " +"not possible to employ the same controller against both a v1 hierarchy and " +"the unified v2 hierarchy. This means that it may be necessary first to " +"unmount a v1 controller (as described above) before that controller is " +"available in v2. Since B<systemd>(1) makes heavy use of some v1 " +"controllers by default, it can in some cases be simpler to boot the system " +"with selected v1 controllers disabled. To do this, specify the " +"I<cgroup_no_v1=list> option on the kernel boot command line; I<list> is a " +"comma-separated list of the names of the controllers to disable, or the word " +"I<all> to disable all v1 controllers. (This situation is correctly handled " +"by B<systemd>(1), which falls back to operating without the specified " +"controllers.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Note that on many modern systems, B<systemd>(1) automatically mounts the " +"I<cgroup2> filesystem at I</sys/fs/cgroup/unified> during the boot process." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 mount options" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The following options (I<mount\\~-o>) can be specified when mounting the " +"group v2 filesystem:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<nsdelegate> (since Linux 4.15)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Treat cgroup namespaces as delegation boundaries. For details, see below." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<memory_localevents> (since Linux 5.2)" +msgstr "" + +#. commit 9852ae3fe5293264f01c49f2571ef7688f7823ce +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<memory.events> should show statistics only for the cgroup itself, and " +"not for any descendant cgroups. This was the behavior before Linux 5.2. " +"Starting in Linux 5.2, the default behavior is to include statistics for " +"descendant cgroups in I<memory.events>, and this mount option can be used to " +"revert to the legacy behavior. This option is system wide and can be set on " +"mount or modified through remount only from the initial mount namespace; it " +"is silently ignored in noninitial namespaces." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 controllers" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The following controllers, documented in the kernel source file " +"I<Documentation/admin-guide/cgroup-v2.rst> (or I<Documentation/cgroup-v2." +"txt> in Linux 4.17 and earlier), are supported in cgroups version 2:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cpu> (since Linux 4.15)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is the successor to the version 1 I<cpu> and I<cpuacct> controllers." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cpuset> (since Linux 5.0)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the successor of the version 1 I<cpuset> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<freezer> (since Linux 5.2)" +msgstr "" + +#. commit 76f969e8948d82e78e1bc4beb6b9465908e74873 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the successor of the version 1 I<freezer> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<hugetlb> (since Linux 5.6)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the successor of the version 1 I<hugetlb> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<io> (since Linux 4.5)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the successor of the version 1 I<blkio> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<memory> (since Linux 4.5)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the successor of the version 1 I<memory> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<perf_event> (since Linux 4.11)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the same as the version 1 I<perf_event> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<pids> (since Linux 4.5)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the same as the version 1 I<pids> controller." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<rdma> (since Linux 4.11)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "This is the same as the version 1 I<rdma> controller." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"There is no direct equivalent of the I<net_cls> and I<net_prio> controllers " +"from cgroups version 1. Instead, support has been added to B<iptables>(8) " +"to allow eBPF filters that hook on cgroup v2 pathnames to make decisions " +"about network traffic on a per-cgroup basis." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The v2 I<devices> controller provides no interface files; instead, device " +"control is gated by attaching an eBPF (B<BPF_CGROUP_DEVICE>) program to a " +"v2 cgroup." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 subtree control" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "Each cgroup in the v2 hierarchy contains the following two files:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cgroup.controllers>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This read-only file exposes a list of the controllers that are I<available> " +"in this cgroup. The contents of this file match the contents of the " +"I<cgroup.subtree_control> file in the parent cgroup." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cgroup.subtree_control>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is a list of controllers that are I<active> (I<enabled>) in the " +"cgroup. The set of controllers in this file is a subset of the set in the " +"I<cgroup.controllers> of this cgroup. The set of active controllers is " +"modified by writing strings to this file containing space-delimited " +"controller names, each preceded by '+' (to enable a controller) or '-' (to " +"disable a controller), as in the following example:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "echo \\[aq]+pids -memory\\[aq] E<gt> x/y/cgroup.subtree_control\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"An attempt to enable a controller that is not present in I<cgroup." +"controllers> leads to an B<ENOENT> error when writing to the I<cgroup." +"subtree_control> file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Because the list of controllers in I<cgroup.subtree_control> is a subset of " +"those I<cgroup.controllers>, a controller that has been disabled in one " +"cgroup in the hierarchy can never be re-enabled in the subtree below that " +"cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A cgroup's I<cgroup.subtree_control> file determines the set of controllers " +"that are exercised in the I<child> cgroups. When a controller (e.g., " +"I<pids>) is present in the I<cgroup.subtree_control> file of a parent " +"cgroup, then the corresponding controller-interface files (e.g., I<pids." +"max>) are automatically created in the children of that cgroup and can be " +"used to exert resource control in the child cgroups." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 \"no internal processes\" rule" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Cgroups v2 enforces a so-called \"no internal processes\" rule. Roughly " +"speaking, this rule means that, with the exception of the root cgroup, " +"processes may reside only in leaf nodes (cgroups that do not themselves " +"contain child cgroups). This avoids the need to decide how to partition " +"resources between processes which are members of cgroup A and processes in " +"child cgroups of A." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For instance, if cgroup I</cg1/cg2> exists, then a process may reside in I</" +"cg1/cg2>, but not in I</cg1>. This is to avoid an ambiguity in cgroups v1 " +"with respect to the delegation of resources between processes in I</cg1> and " +"its child cgroups. The recommended approach in cgroups v2 is to create a " +"subdirectory called I<leaf> for any nonleaf cgroup which should contain " +"processes, but no child cgroups. Thus, processes which previously would " +"have gone into I</cg1> would now go into I</cg1/leaf>. This has the " +"advantage of making explicit the relationship between processes in I</cg1/" +"leaf> and I</cg1>'s other children." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The \"no internal processes\" rule is in fact more subtle than stated " +"above. More precisely, the rule is that a (nonroot) cgroup can't both (1) " +"have member processes, and (2) distribute resources into child " +"cgroups\\[em]that is, have a nonempty I<cgroup.subtree_control> file. Thus, " +"it I<is> possible for a cgroup to have both member processes and child " +"cgroups, but before controllers can be enabled for that cgroup, the member " +"processes must be moved out of the cgroup (e.g., perhaps into the child " +"cgroups)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"With the Linux 4.14 addition of \"thread mode\" (described below), the \"no " +"internal processes\" rule has been relaxed in some cases." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 cgroup.events file" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Each nonroot cgroup in the v2 hierarchy contains a read-only file, I<cgroup." +"events>, whose contents are key-value pairs (delimited by newline " +"characters, with the key and value separated by spaces) providing state " +"information about the cgroup:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "" +"$ B<cat mygrp/cgroup.events>\n" +"populated 1\n" +"frozen 0\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The following keys may appear in this file:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<populated>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The value of this key is either 1, if this cgroup or any of its descendants " +"has member processes, or otherwise 0." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<frozen> (since Linux 5.2)" +msgstr "" + +#. commit 76f969e8948d82e78e1bc4beb6b9465908e7487 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The value of this key is 1 if this cgroup is currently frozen, or 0 if it is " +"not." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<cgroup.events> file can be monitored, in order to receive notification " +"when the value of one of its keys changes. Such monitoring can be done " +"using B<inotify>(7), which notifies changes as B<IN_MODIFY> events, or " +"B<poll>(2), which notifies changes by returning the B<POLLPRI> and " +"B<POLLERR> bits in the I<revents> field." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroup v2 release notification" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Cgroups v2 provides a new mechanism for obtaining notification when a cgroup " +"becomes empty. The cgroups v1 I<release_agent> and I<notify_on_release> " +"files are removed, and replaced by the I<populated> key in the I<cgroup." +"events> file. This key either has the value 0, meaning that the cgroup (and " +"its descendants) contain no (nonzombie) member processes, or 1, meaning " +"that the cgroup (or one of its descendants) contains member processes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The cgroups v2 release-notification mechanism offers the following " +"advantages over the cgroups v1 I<release_agent> mechanism:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"It allows for cheaper notification, since a single process can monitor " +"multiple I<cgroup.events> files (using the techniques described earlier). " +"By contrast, the cgroups v1 mechanism requires the expense of creating a " +"process for each notification." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Notification for different cgroup subhierarchies can be delegated to " +"different processes. By contrast, the cgroups v1 mechanism allows only one " +"release agent for an entire hierarchy." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 cgroup.stat file" +msgstr "" + +#. commit ec39225cca42c05ac36853d11d28f877fde5c42e +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Each cgroup in the v2 hierarchy contains a read-only I<cgroup.stat> file " +"(first introduced in Linux 4.14) that consists of lines containing key-" +"value pairs. The following keys currently appear in this file:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<nr_descendants>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is the total number of visible (i.e., living) descendant cgroups " +"underneath this cgroup." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<nr_dying_descendants>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is the total number of dying descendant cgroups underneath this " +"cgroup. A cgroup enters the dying state after being deleted. It remains in " +"that state for an undefined period (which will depend on system load) while " +"resources are freed before the cgroup is destroyed. Note that the presence " +"of some cgroups in the dying state is normal, and is not indicative of any " +"problem." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A process can't be made a member of a dying cgroup, and a dying cgroup can't " +"be brought back to life." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Limiting the number of descendant cgroups" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Each cgroup in the v2 hierarchy contains the following files, which can be " +"used to view and set limits on the number of descendant cgroups under that " +"cgroup:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cgroup.max.depth> (since Linux 4.14)" +msgstr "" + +#. commit 1a926e0bbab83bae8207d05a533173425e0496d1 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This file defines a limit on the depth of nesting of descendant cgroups. A " +"value of 0 in this file means that no descendant cgroups can be created. An " +"attempt to create a descendant whose nesting level exceeds the limit fails " +"(I<mkdir>(2) fails with the error B<EAGAIN>)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Writing the string I<\"max\"> to this file means that no limit is imposed. " +"The default value in this file is I<\"max\" .>" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<cgroup.max.descendants> (since Linux 4.14)" +msgstr "" + +#. commit 1a926e0bbab83bae8207d05a533173425e0496d1 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This file defines a limit on the number of live descendant cgroups that this " +"cgroup may have. An attempt to create more descendants than allowed by the " +"limit fails (I<mkdir>(2) fails with the error B<EAGAIN>)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Writing the string I<\"max\"> to this file means that no limit is imposed. " +"The default value in this file is I<\"max\">." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "CGROUPS DELEGATION: DELEGATING A HIERARCHY TO A LESS PRIVILEGED USER" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In the context of cgroups, delegation means passing management of some " +"subtree of the cgroup hierarchy to a nonprivileged user. Cgroups v1 " +"provides support for delegation based on file permissions in the cgroup " +"hierarchy but with less strict containment rules than v2 (as noted below). " +"Cgroups v2 supports delegation with containment by explicit design. The " +"focus of the discussion in this section is on delegation in cgroups v2, with " +"some differences for cgroups v1 noted along the way." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Some terminology is required in order to describe delegation. A " +"I<delegater> is a privileged user (i.e., root) who owns a parent cgroup. A " +"I<delegatee> is a nonprivileged user who will be granted the permissions " +"needed to manage some subhierarchy under that parent cgroup, known as the " +"I<delegated subtree>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"To perform delegation, the delegater makes certain directories and files " +"writable by the delegatee, typically by changing the ownership of the " +"objects to be the user ID of the delegatee. Assuming that we want to " +"delegate the hierarchy rooted at (say) I</dlgt_grp> and that there are not " +"yet any child cgroups under that cgroup, the ownership of the following is " +"changed to the user ID of the delegatee:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</dlgt_grp>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Changing the ownership of the root of the subtree means that any new cgroups " +"created under the subtree (and the files they contain) will also be owned " +"by the delegatee." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</dlgt_grp/cgroup.procs>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Changing the ownership of this file means that the delegatee can move " +"processes into the root of the delegated subtree." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</dlgt_grp/cgroup.subtree_control> (cgroups v2 only)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Changing the ownership of this file means that the delegatee can enable " +"controllers (that are present in I</dlgt_grp/cgroup.controllers>) in order " +"to further redistribute resources at lower levels in the subtree. (As an " +"alternative to changing the ownership of this file, the delegater might " +"instead add selected controllers to this file.)" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</dlgt_grp/cgroup.threads> (cgroups v2 only)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Changing the ownership of this file is necessary if a threaded subtree is " +"being delegated (see the description of \"thread mode\", below). This " +"permits the delegatee to write thread IDs to the file. (The ownership of " +"this file can also be changed when delegating a domain subtree, but " +"currently this serves no purpose, since, as described below, it is not " +"possible to move a thread between domain cgroups by writing its thread ID to " +"the I<cgroup.threads> file.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1, the corresponding file that should instead be delegated is " +"the I<tasks> file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The delegater should I<not> change the ownership of any of the controller " +"interfaces files (e.g., I<pids.max>, I<memory.high>) in I<dlgt_grp>. Those " +"files are used from the next level above the delegated subtree in order to " +"distribute resources into the subtree, and the delegatee should not have " +"permission to change the resources that are distributed into the delegated " +"subtree." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"See also the discussion of the I</sys/kernel/cgroup/delegate> file in NOTES " +"for information about further delegatable files in cgroups v2." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"After the aforementioned steps have been performed, the delegatee can create " +"child cgroups within the delegated subtree (the cgroup subdirectories and " +"the files they contain will be owned by the delegatee) and move processes " +"between cgroups in the subtree. If some controllers are present in " +"I<dlgt_grp/cgroup.subtree_control>, or the ownership of that file was passed " +"to the delegatee, the delegatee can also control the further redistribution " +"of the corresponding resources into the delegated subtree." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroups v2 delegation: nsdelegate and cgroup namespaces" +msgstr "" + +#. commit 5136f6365ce3eace5a926e10f16ed2a233db5ba9 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Starting with Linux 4.13, there is a second way to perform cgroup delegation " +"in the cgroups v2 hierarchy. This is done by mounting or remounting the " +"cgroup v2 filesystem with the I<nsdelegate> mount option. For example, if " +"the cgroup v2 filesystem has already been mounted, we can remount it with " +"the I<nsdelegate> option as follows:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "" +"mount -t cgroup2 -o remount,nsdelegate \\e\n" +" none /sys/fs/cgroup/unified\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The effect of this mount option is to cause cgroup namespaces to " +"automatically become delegation boundaries. More specifically, the " +"following restrictions apply for processes inside the cgroup namespace:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Writes to controller interface files in the root directory of the namespace " +"will fail with the error B<EPERM>. Processes inside the cgroup namespace " +"can still write to delegatable files in the root directory of the cgroup " +"namespace such as I<cgroup.procs> and I<cgroup.subtree_control>, and can " +"create subhierarchy underneath the root directory." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Attempts to migrate processes across the namespace boundary are denied (with " +"the error B<ENOENT>). Processes inside the cgroup namespace can still " +"(subject to the containment rules described below) move processes between " +"cgroups I<within> the subhierarchy under the namespace root." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The ability to define cgroup namespaces as delegation boundaries makes " +"cgroup namespaces more useful. To understand why, suppose that we already " +"have one cgroup hierarchy that has been delegated to a nonprivileged user, " +"I<cecilia>, using the older delegation technique described above. Suppose " +"further that I<cecilia> wanted to further delegate a subhierarchy under the " +"existing delegated hierarchy. (For example, the delegated hierarchy might " +"be associated with an unprivileged container run by I<cecilia>.) Even if a " +"cgroup namespace was employed, because both hierarchies are owned by the " +"unprivileged user I<cecilia>, the following illegitimate actions could be " +"performed:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A process in the inferior hierarchy could change the resource controller " +"settings in the root directory of that hierarchy. (These resource " +"controller settings are intended to allow control to be exercised from the " +"I<parent> cgroup; a process inside the child cgroup should not be allowed to " +"modify them.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A process inside the inferior hierarchy could move processes into and out of " +"the inferior hierarchy if the cgroups in the superior hierarchy were somehow " +"visible." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Employing the I<nsdelegate> mount option prevents both of these " +"possibilities." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<nsdelegate> mount option only has an effect when performed in the " +"initial mount namespace; in other mount namespaces, the option is silently " +"ignored." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<Note>: On some systems, B<systemd>(1) automatically mounts the cgroup v2 " +"filesystem. In order to experiment with the I<nsdelegate> operation, it may " +"be useful to boot the kernel with the following command-line options:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "cgroup_no_v1=all systemd.legacy_systemd_cgroup_controller\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"These options cause the kernel to boot with the cgroups v1 controllers " +"disabled (meaning that the controllers are available in the v2 hierarchy), " +"and tells B<systemd>(1) not to mount and use the cgroup v2 hierarchy, so " +"that the v2 hierarchy can be manually mounted with the desired options after " +"boot-up." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Cgroup delegation containment rules" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Some delegation I<containment rules> ensure that the delegatee can move " +"processes between cgroups within the delegated subtree, but can't move " +"processes from outside the delegated subtree into the subtree or vice " +"versa. A nonprivileged process (i.e., the delegatee) can write the PID of a " +"\"target\" process into a I<cgroup.procs> file only if all of the following " +"are true:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The writer has write permission on the I<cgroup.procs> file in the " +"destination cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The writer has write permission on the I<cgroup.procs> file in the nearest " +"common ancestor of the source and destination cgroups. Note that in some " +"cases, the nearest common ancestor may be the source or destination cgroup " +"itself. This requirement is not enforced for cgroups v1 hierarchies, with " +"the consequence that containment in v1 is less strict than in v2. (For " +"example, in cgroups v1 the user that owns two distinct delegated " +"subhierarchies can move a process between the hierarchies.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"If the cgroup v2 filesystem was mounted with the I<nsdelegate> option, the " +"writer must be able to see the source and destination cgroups from its " +"cgroup namespace." +msgstr "" + +#. commit 576dd464505fc53d501bb94569db76f220104d28 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In cgroups v1: the effective UID of the writer (i.e., the delegatee) matches " +"the real user ID or the saved set-user-ID of the target process. Before " +"Linux 4.11, this requirement also applied in cgroups v2 (This was a " +"historical requirement inherited from cgroups v1 that was later deemed " +"unnecessary, since the other rules suffice for containment in cgroups v2.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<Note>: one consequence of these delegation containment rules is that the " +"unprivileged delegatee can't place the first process into the delegated " +"subtree; instead, the delegater must place the first process (a process " +"owned by the delegatee) into the delegated subtree." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "CGROUPS VERSION 2 THREAD MODE" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Among the restrictions imposed by cgroups v2 that were not present in " +"cgroups v1 are the following:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<No thread-granularity control>: all of the threads of a process must be in " +"the same cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<No internal processes>: a cgroup can't both have member processes and " +"exercise controllers on child cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Both of these restrictions were added because the lack of these restrictions " +"had caused problems in cgroups v1. In particular, the cgroups v1 ability to " +"allow thread-level granularity for cgroup membership made no sense for some " +"controllers. (A notable example was the I<memory> controller: since threads " +"share an address space, it made no sense to split threads across different " +"I<memory> cgroups.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Notwithstanding the initial design decision in cgroups v2, there were use " +"cases for certain controllers, notably the I<cpu> controller, for which " +"thread-level granularity of control was meaningful and useful. To " +"accommodate such use cases, Linux 4.14 added I<thread mode> for cgroups v2." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "Thread mode allows the following:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The creation of I<threaded subtrees> in which the threads of a process may " +"be spread across cgroups inside the tree. (A threaded subtree may contain " +"multiple multithreaded processes.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The concept of I<threaded controllers>, which can distribute resources " +"across the cgroups in a threaded subtree." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A relaxation of the \"no internal processes rule\", so that, within a " +"threaded subtree, a cgroup can both contain member threads and exercise " +"resource control over child cgroups." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"With the addition of thread mode, each nonroot cgroup now contains a new " +"file, I<cgroup.type>, that exposes, and in some circumstances can be used to " +"change, the \"type\" of a cgroup. This file contains one of the following " +"type values:" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<domain>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is a normal v2 cgroup that provides process-granularity control. If a " +"process is a member of this cgroup, then all threads of the process are (by " +"definition) in the same cgroup. This is the default cgroup type, and " +"provides the same behavior that was provided for cgroups in the initial " +"cgroups v2 implementation." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<threaded>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This cgroup is a member of a threaded subtree. Threads can be added to this " +"cgroup, and controllers can be enabled for the cgroup." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<domain threaded>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is a domain cgroup that serves as the root of a threaded subtree. This " +"cgroup type is also known as \"threaded root\"." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<domain invalid>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This is a cgroup inside a threaded subtree that is in an \"invalid\" state. " +"Processes can't be added to the cgroup, and controllers can't be enabled for " +"the cgroup. The only thing that can be done with this cgroup (other than " +"deleting it) is to convert it to a I<threaded> cgroup by writing the string " +"I<\"threaded\"> to the I<cgroup.type> file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The rationale for the existence of this \"interim\" type during the creation " +"of a threaded subtree (rather than the kernel simply immediately converting " +"all cgroups under the threaded root to the type I<threaded>) is to allow " +"for possible future extensions to the thread mode model" +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Threaded versus domain controllers" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"With the addition of threads mode, cgroups v2 now distinguishes two types of " +"resource controllers:" +msgstr "" + +#. In the kernel source, look for ".threaded[ \t]*= true" in +#. initializations of struct cgroup_subsys +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<Threaded> controllers: these controllers support thread-granularity for " +"resource control and can be enabled inside threaded subtrees, with the " +"result that the corresponding controller-interface files appear inside the " +"cgroups in the threaded subtree. As at Linux 4.19, the following " +"controllers are threaded: I<cpu>, I<perf_event>, and I<pids>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<Domain> controllers: these controllers support only process granularity " +"for resource control. From the perspective of a domain controller, all " +"threads of a process are always in the same cgroup. Domain controllers " +"can't be enabled inside a threaded subtree." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Creating a threaded subtree" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"There are two pathways that lead to the creation of a threaded subtree. The " +"first pathway proceeds as follows:" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "(1)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"We write the string I<\"threaded\"> to the I<cgroup.type> file of a cgroup " +"I<y/z> that currently has the type I<domain>. This has the following " +"effects:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The type of the cgroup I<y/z> becomes I<threaded>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The type of the parent cgroup, I<y>, becomes I<domain threaded>. The parent " +"cgroup is the root of a threaded subtree (also known as the \"threaded " +"root\")." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"All other cgroups under I<y> that were not already of type I<threaded> " +"(because they were inside already existing threaded subtrees under the new " +"threaded root) are converted to type I<domain invalid>. Any subsequently " +"created cgroups under I<y> will also have the type I<domain invalid>." +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "(2)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"We write the string I<\"threaded\"> to each of the I<domain invalid> cgroups " +"under I<y>, in order to convert them to the type I<threaded>. As a " +"consequence of this step, all threads under the threaded root now have the " +"type I<threaded> and the threaded subtree is now fully usable. The " +"requirement to write I<\"threaded\"> to each of these cgroups is somewhat " +"cumbersome, but allows for possible future extensions to the thread-mode " +"model." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The second way of creating a threaded subtree is as follows:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"In an existing cgroup, I<z>, that currently has the type I<domain>, we (1.1) " +"enable one or more threaded controllers and (1.2) make a process a member of " +"I<z>. (These two steps can be done in either order.) This has the " +"following consequences:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The type of I<z> becomes I<domain threaded>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"All of the descendant cgroups of I<x> that were not already of type " +"I<threaded> are converted to type I<domain invalid>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"As before, we make the threaded subtree usable by writing the string " +"I<\"threaded\"> to each of the I<domain invalid> cgroups under I<y>, in " +"order to convert them to the type I<threaded>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"One of the consequences of the above pathways to creating a threaded subtree " +"is that the threaded root cgroup can be a parent only to I<threaded> (and " +"I<domain invalid>) cgroups. The threaded root cgroup can't be a parent of " +"a I<domain> cgroups, and a I<threaded> cgroup can't have a sibling that is a " +"I<domain> cgroup." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Using a threaded subtree" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Within a threaded subtree, threaded controllers can be enabled in each " +"subgroup whose type has been changed to I<threaded>; upon doing so, the " +"corresponding controller interface files appear in the children of that " +"cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A process can be moved into a threaded subtree by writing its PID to the " +"I<cgroup.procs> file in one of the cgroups inside the tree. This has the " +"effect of making all of the threads in the process members of the " +"corresponding cgroup and makes the process a member of the threaded " +"subtree. The threads of the process can then be spread across the threaded " +"subtree by writing their thread IDs (see B<gettid>(2)) to the I<cgroup." +"threads> files in different cgroups inside the subtree. The threads of a " +"process must all reside in the same threaded subtree." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"As with writing to I<cgroup.procs>, some containment rules apply when " +"writing to the I<cgroup.threads> file:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The writer must have write permission on the cgroup.threads file in the " +"destination cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The writer must have write permission on the I<cgroup.procs> file in the " +"common ancestor of the source and destination cgroups. (In some cases, the " +"common ancestor may be the source or destination cgroup itself.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The source and destination cgroups must be in the same threaded subtree. " +"(Outside a threaded subtree, an attempt to move a thread by writing its " +"thread ID to the I<cgroup.threads> file in a different I<domain> cgroup " +"fails with the error B<EOPNOTSUPP>.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<cgroup.threads> file is present in each cgroup (including I<domain> " +"cgroups) and can be read in order to discover the set of threads that is " +"present in the cgroup. The set of thread IDs obtained when reading this " +"file is not guaranteed to be ordered or free of duplicates." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The I<cgroup.procs> file in the threaded root shows the PIDs of all " +"processes that are members of the threaded subtree. The I<cgroup.procs> " +"files in the other cgroups in the subtree are not readable." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Domain controllers can't be enabled in a threaded subtree; no controller-" +"interface files appear inside the cgroups underneath the threaded root. " +"From the point of view of a domain controller, threaded subtrees are " +"invisible: a multithreaded process inside a threaded subtree appears to a " +"domain controller as a process that resides in the threaded root cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Within a threaded subtree, the \"no internal processes\" rule does not " +"apply: a cgroup can both contain member processes (or thread) and exercise " +"controllers on child cgroups." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Rules for writing to cgroup.type and creating threaded subtrees" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "A number of rules apply when writing to the I<cgroup.type> file:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Only the string I<\"threaded\"> may be written. In other words, the only " +"explicit transition that is possible is to convert a I<domain> cgroup to " +"type I<threaded>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The effect of writing I<\"threaded\"> depends on the current value in " +"I<cgroup.type>, as follows:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<domain> or I<domain threaded>: start the creation of a threaded subtree " +"(whose root is the parent of this cgroup) via the first of the pathways " +"described above;" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"I<domain\\ invalid>: convert this cgroup (which is inside a threaded " +"subtree) to a usable (i.e., I<threaded>) state;" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "I<threaded>: no effect (a \"no-op\")." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"We can't write to a I<cgroup.type> file if the parent's type is I<domain " +"invalid>. In other words, the cgroups of a threaded subtree must be " +"converted to the I<threaded> state in a top-down manner." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"There are also some constraints that must be satisfied in order to create a " +"threaded subtree rooted at the cgroup I<x>:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"There can be no member processes in the descendant cgroups of I<x>. (The " +"cgroup I<x> can itself have member processes.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"No domain controllers may be enabled in I<x>'s I<cgroup.subtree_control> " +"file." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"If any of the above constraints is violated, then an attempt to write " +"I<\"threaded\"> to a I<cgroup.type> file fails with the error B<ENOTSUP>." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "The \"domain threaded\" cgroup type" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"According to the pathways described above, the type of a cgroup can change " +"to I<domain threaded> in either of the following cases:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The string I<\"threaded\"> is written to a child cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A threaded controller is enabled inside the cgroup and a process is made a " +"member of the cgroup." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A I<domain threaded> cgroup, I<x>, can revert to the type I<domain> if the " +"above conditions no longer hold true\\[em]that is, if all I<threaded> child " +"cgroups of I<x> are removed and either I<x> no longer has threaded " +"controllers enabled or no longer has member processes." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "When a I<domain threaded> cgroup I<x> reverts to the type I<domain>:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"All I<domain invalid> descendants of I<x> that are not in lower-level " +"threaded subtrees revert to the type I<domain>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The root cgroups in any lower-level threaded subtrees revert to the type " +"I<domain threaded>." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "Exceptions for the root cgroup" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The root cgroup of the v2 hierarchy is treated exceptionally: it can be the " +"parent of both I<domain> and I<threaded> cgroups. If the string " +"I<\"threaded\"> is written to the I<cgroup.type> file of one of the children " +"of the root cgroup, then" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The type of that cgroup becomes I<threaded>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The type of any descendants of that cgroup that are not part of lower-level " +"threaded subtrees changes to I<domain invalid>." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Note that in this case, there is no cgroup whose type becomes I<domain " +"threaded>. (Notionally, the root cgroup can be considered as the threaded " +"root for the cgroup whose type was changed to I<threaded>.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The aim of this exceptional treatment for the root cgroup is to allow a " +"threaded cgroup that employs the I<cpu> controller to be placed as high as " +"possible in the hierarchy, so as to minimize the (small) cost of traversing " +"the cgroup hierarchy." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "The cgroups v2 \"cpu\" controller and realtime threads" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"As at Linux 4.19, the cgroups v2 I<cpu> controller does not support control " +"of realtime threads (specifically threads scheduled under any of the " +"policies B<SCHED_FIFO>, B<SCHED_RR>, described B<SCHED_DEADLINE>; see " +"B<sched>(7)). Therefore, the I<cpu> controller can be enabled in the root " +"cgroup only if all realtime threads are in the root cgroup. (If there are " +"realtime threads in nonroot cgroups, then a B<write>(2) of the string " +"I<\"+cpu\"> to the I<cgroup.subtree_control> file fails with the error " +"B<EINVAL>.)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"On some systems, B<systemd>(1) places certain realtime threads in nonroot " +"cgroups in the v2 hierarchy. On such systems, these threads must first be " +"moved to the root cgroup before the I<cpu> controller can be enabled." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "ERRORS" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The following errors can occur for B<mount>(2):" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "B<EBUSY>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"An attempt to mount a cgroup version 1 filesystem specified neither the " +"I<name=> option (to mount a named hierarchy) nor a controller name (or " +"I<all>)." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "NOTES" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"A child process created via B<fork>(2) inherits its parent's cgroup " +"memberships. A process's cgroup memberships are preserved across " +"B<execve>(2)." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The B<clone3>(2) B<CLONE_INTO_CGROUP> flag can be used to create a child " +"process that begins its life in a different version 2 cgroup from the parent " +"process." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "/proc files" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</proc/cgroups> (since Linux 2.6.24)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This file contains information about the controllers that are compiled into " +"the kernel. An example of the contents of this file (reformatted for " +"readability) is the following:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "" +"#subsys_name hierarchy num_cgroups enabled\n" +"cpuset 4 1 1\n" +"cpu 8 1 1\n" +"cpuacct 8 1 1\n" +"blkio 6 1 1\n" +"memory 3 1 1\n" +"devices 10 84 1\n" +"freezer 7 1 1\n" +"net_cls 9 1 1\n" +"perf_event 5 1 1\n" +"net_prio 9 1 1\n" +"hugetlb 0 1 0\n" +"pids 2 1 1\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The fields in this file are, from left to right:" +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "[1]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The name of the controller." +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "[2]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"The unique ID of the cgroup hierarchy on which this controller is mounted. " +"If multiple cgroups v1 controllers are bound to the same hierarchy, then " +"each will show the same hierarchy ID in this field. The value in this field " +"will be 0 if:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "the controller is not mounted on a cgroups v1 hierarchy;" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "the controller is bound to the cgroups v2 single unified hierarchy; or" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "the controller is disabled (see below)." +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "[3]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The number of control groups in this hierarchy using this controller." +msgstr "" + +#. type: IP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "[4]" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This field contains the value 1 if this controller is enabled, or 0 if it " +"has been disabled (via the I<cgroup_disable> kernel command-line boot " +"parameter)." +msgstr "" + +#. type: TP +#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron +#: opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</proc/>pidI</cgroup> (since Linux 2.6.24)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This file describes control groups to which the process with the " +"corresponding PID belongs. The displayed information differs for cgroups " +"version 1 and version 2 hierarchies." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For each cgroup hierarchy of which the process is a member, there is one " +"entry containing three colon-separated fields:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "hierarchy-ID:controller-list:cgroup-path\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "For example:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "5:cpuacct,cpu,cpuset:/daemons\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The colon-separated fields are, from left to right:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For cgroups version 1 hierarchies, this field contains a unique hierarchy ID " +"number that can be matched to a hierarchy ID in I</proc/cgroups>. For the " +"cgroups version 2 hierarchy, this field contains the value 0." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"For cgroups version 1 hierarchies, this field contains a comma-separated " +"list of the controllers bound to the hierarchy. For the cgroups version 2 " +"hierarchy, this field is empty." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This field contains the pathname of the control group in the hierarchy to " +"which the process belongs. This pathname is relative to the mount point of " +"the hierarchy." +msgstr "" + +#. type: SS +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "/sys/kernel/cgroup files" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</sys/kernel/cgroup/delegate> (since Linux 4.15)" +msgstr "" + +#. commit 01ee6cfb1483fe57c9cbd8e73817dfbf9bacffd3 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"This file exports a list of the cgroups v2 files (one per line) that are " +"delegatable (i.e., whose ownership should be changed to the user ID of the " +"delegatee). In the future, the set of delegatable files may change or grow, " +"and this file provides a way for the kernel to inform user-space " +"applications of which files must be delegated. As at Linux 4.15, one sees " +"the following when inspecting this file:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "" +"$ B<cat /sys/kernel/cgroup/delegate>\n" +"cgroup.procs\n" +"cgroup.subtree_control\n" +"cgroup.threads\n" +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I</sys/kernel/cgroup/features> (since Linux 4.15)" +msgstr "" + +#. commit 5f2e673405b742be64e7c3604ed4ed3ac14f35ce +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"Over time, the set of cgroups v2 features that are provided by the kernel " +"may change or grow, or some features may not be enabled by default. This " +"file provides a way for user-space applications to discover what features " +"the running kernel supports and has enabled. Features are listed one per " +"line:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "" +"$ B<cat /sys/kernel/cgroup/features>\n" +"nsdelegate\n" +"memory_localevents\n" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The entries that can appear in this file are:" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The kernel supports the I<memory_localevents> mount option." +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The kernel supports the I<nsdelegate> mount option." +msgstr "" + +#. type: TP +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "I<memory_recursiveprot> (since Linux 5.7)" +msgstr "" + +#. commit 8a931f801340c2be10552c7b5622d5f4852f3a36 +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The kernel supports the I<memory_recursiveprot> mount option." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "SEE ALSO" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "" +"B<prlimit>(1), B<systemd>(1), B<systemd-cgls>(1), B<systemd-cgtop>(1), " +"B<clone>(2), B<ioprio_set>(2), B<perf_event_open>(2), B<setrlimit>(2), " +"B<cgroup_namespaces>(7), B<cpuset>(7), B<namespaces>(7), B<sched>(7), " +"B<user_namespaces>(7)" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed +msgid "The kernel source file I<Documentation/admin-guide/cgroup-v2.rst>." +msgstr "" + +#. type: TH +#: debian-bookworm +#, no-wrap +msgid "2023-02-05" +msgstr "" + +#. type: TH +#: debian-bookworm +#, no-wrap +msgid "Linux man-pages 6.03" +msgstr "" + +#. type: TP +#: debian-bookworm +#, no-wrap +msgid "I</proc/[pid]/cgroup> (since Linux 2.6.24)" +msgstr "" + +#. type: TH +#: debian-unstable opensuse-leap-15-6 opensuse-tumbleweed +#, no-wrap +msgid "2023-04-03" +msgstr "" + +#. type: TH +#: debian-unstable opensuse-tumbleweed +#, no-wrap +msgid "Linux man-pages 6.05.01" +msgstr "" + +#. type: TH +#: opensuse-leap-15-6 +#, no-wrap +msgid "Linux man-pages 6.04" +msgstr "" |