Language Selection

English French German Italian Portuguese Spanish

All About the Linux Kernel: Cgroup’s Redesign

Filed under
Linux

Over the past few months, big changes have been underway on the cgroup Linux kernel subsystem and its related, but independent, system and service manager Systemd. Developers aren’t building shiny new features, though, as much as overhauling cgroups (control groups) to impose more structure in an area of the kernel that’s become problematic.

Cgroup allows fine-grained resource partitioning among competing processes running on the same machine. It’s technically a kernel subsystem but it acts quite different than typical, more isolated subsystems such as drivers or architecture-specific systems like PCI or USB. Cgroup is a conduit for other subsystems to manage and query with kernel resources such as CPU time, amounts of memory, and groups of processes.

What’s the Issue?




More in Tux Machines

Today in Techrights

today's howtos

Debian and Ubuntu

  • Debian is a puzzle: difficult
    I myself recently had to use the Ubuntu installer in a laptop, and it didn’t seem that different to the Debian one: same steps and choices, like in every other OS installation.
  • Canonical: 2017 Will See a Mir 1.0 Release, Plans to Implement Vulkan Support
    Canonical, the company founded by Mark Shuttleworth to promote the popular Ubuntu Linux operating system everywhere around the world, has recently published the 'year in review' for their Mir display server technology. As most of you are aware, Canonical develops its own display server for Ubuntu, called Mir, which, in some ways, is similar to the X.Org Server and Wayland technologies. While Ubuntu on the desktop still uses X.Org Server's components, Mir is currently heavily tested for the Unity 8 user interface that Canonical plans on implementing by default for future releases of Ubuntu Linux, for desktops.

Security News

  • Security advisories for Tuesday
  • FOI: NHS Trusts are ransomware pin cushions [Ed: Windows]
    The FOI requests found that 87 per cent of attacks came via a networked NHS device and that 80 per cent were down to phished staffers. However, only a small proportion of the 100 or so Trusts responded to this part of the requests. "These results are far from surprising. Public sector organisations make a soft target for fraudsters because budget and resource shortages frequently leave hospitals short-changed when it comes to security basics like regular software patching," said Tony Rowan, Chief Security Consultant at SentinelOne. "The results highlight the fact that old school AV technology is powerless to halt virulent, mutating forms of malware like ransomware and a new more dynamic approach to endpoint protection is needed.