You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 27, 2022. It is now read-only.
For systems that support POSIX rlimits (for example Linux and Solaris), the process object supports the following process-specific properties...
FreeBSD definitely supports rlimits, see getrlimit(2). According to rctl(8), it's possible to set rlimits on a jail base, e.g. following will limit the amount of memory jail knast can allocate to 1g.
rctl -a jail:knast:vmemoryuse:deny=1g
The scope of this task
write bindings to programmatically mimic the behavior of rctl(8)
support runtime config's process.limits option
figure out the sane defaults. E.g. podman generates runtime spec like this
Quoting runtime-spec
FreeBSD definitely supports rlimits, see getrlimit(2). According to rctl(8), it's possible to set rlimits on a jail base, e.g. following will limit the amount of memory jail
knast
can allocate to 1g.rctl -a jail:knast:vmemoryuse:deny=1g
The scope of this task
process.limits
optionThe text was updated successfully, but these errors were encountered: