cgroup.c 175 KB
Newer Older
1 2 3 4 5 6
/*
 *  Generic process-grouping system.
 *
 *  Based originally on the cpuset system, extracted by Paul Menage
 *  Copyright (C) 2006 Google, Inc
 *
7 8 9 10
 *  Notifications support
 *  Copyright (C) 2009 Nokia Corporation
 *  Author: Kirill A. Shutemov
 *
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
 *  Copyright notices from the original cpuset code:
 *  --------------------------------------------------
 *  Copyright (C) 2003 BULL SA.
 *  Copyright (C) 2004-2006 Silicon Graphics, Inc.
 *
 *  Portions derived from Patrick Mochel's sysfs code.
 *  sysfs is Copyright (c) 2001-3 Patrick Mochel
 *
 *  2003-10-10 Written by Simon Derr.
 *  2003-10-22 Updates by Stephen Hemminger.
 *  2004 May-July Rework by Paul Jackson.
 *  ---------------------------------------------------
 *
 *  This file is subject to the terms and conditions of the GNU General Public
 *  License.  See the file COPYING in the main directory of the Linux
 *  distribution for more details.
 */

29 30
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt

31 32
#include "cgroup-internal.h"

33
#include <linux/cred.h>
34
#include <linux/errno.h>
35
#include <linux/init_task.h>
36
#include <linux/kernel.h>
37
#include <linux/magic.h>
38 39 40
#include <linux/mutex.h>
#include <linux/mount.h>
#include <linux/pagemap.h>
41
#include <linux/proc_fs.h>
42 43
#include <linux/rcupdate.h>
#include <linux/sched.h>
44
#include <linux/sched/task.h>
45 46
#include <linux/slab.h>
#include <linux/spinlock.h>
47
#include <linux/percpu-rwsem.h>
48
#include <linux/string.h>
49
#include <linux/hashtable.h>
50
#include <linux/idr.h>
51
#include <linux/kthread.h>
Arun Sharma's avatar
Arun Sharma committed
52
#include <linux/atomic.h>
53
#include <linux/cpuset.h>
54 55
#include <linux/proc_ns.h>
#include <linux/nsproxy.h>
56
#include <linux/file.h>
57
#include <linux/fs_parser.h>
58
#include <linux/sched/cputime.h>
Johannes Weiner's avatar
Johannes Weiner committed
59
#include <linux/psi.h>
60
#include <net/sock.h>
61

62 63 64
#define CREATE_TRACE_POINTS
#include <trace/events/cgroup.h>

65 66
#define CGROUP_FILE_NAME_MAX		(MAX_CGROUP_TYPE_NAMELEN +	\
					 MAX_CFTYPE_NAME + 2)
67 68
/* let's not notify more than 100 times per second */
#define CGROUP_FILE_NOTIFY_MIN_INTV	DIV_ROUND_UP(HZ, 100)
69

70 71 72 73 74 75 76 77
/*
 * To avoid confusing the compiler (and generating warnings) with code
 * that attempts to access what would be a 0-element array (i.e. sized
 * to a potentially empty array when CGROUP_SUBSYS_COUNT == 0), this
 * constant expression can be added.
 */
#define CGROUP_HAS_SUBSYS_CONFIG	(CGROUP_SUBSYS_COUNT > 0)

Tejun Heo's avatar
Tejun Heo committed
78 79 80 81
/*
 * cgroup_mutex is the master lock.  Any modification to cgroup or its
 * hierarchy must be performed while holding it.
 *
82
 * css_set_lock protects task->cgroups pointer, the list of css_set
83
 * objects, and the chain of tasks off each css_set.
Tejun Heo's avatar
Tejun Heo committed
84
 *
85 86
 * These locks are exported if CONFIG_PROVE_RCU so that accessors in
 * cgroup.h can use them for lockdep annotations.
Tejun Heo's avatar
Tejun Heo committed
87
 */
88
DEFINE_MUTEX(cgroup_mutex);
89
DEFINE_SPINLOCK(css_set_lock);
90 91

#ifdef CONFIG_PROVE_RCU
92
EXPORT_SYMBOL_GPL(cgroup_mutex);
93
EXPORT_SYMBOL_GPL(css_set_lock);
94 95
#endif

96 97
DEFINE_SPINLOCK(trace_cgroup_path_lock);
char trace_cgroup_path[TRACE_CGROUP_PATH_LEN];
98
bool cgroup_debug __read_mostly;
99

100
/*
101 102
 * Protects cgroup_idr and css_idr so that IDs can be released without
 * grabbing cgroup_mutex.
103 104 105
 */
static DEFINE_SPINLOCK(cgroup_idr_lock);

106 107 108 109 110 111
/*
 * Protects cgroup_file->kn for !self csses.  It synchronizes notifications
 * against file removal/re-creation across css hiding.
 */
static DEFINE_SPINLOCK(cgroup_file_kn_lock);

112
DEFINE_PERCPU_RWSEM(cgroup_threadgroup_rwsem);
113

Tejun Heo's avatar
Tejun Heo committed
114
#define cgroup_assert_mutex_or_rcu_locked()				\
115 116
	RCU_LOCKDEP_WARN(!rcu_read_lock_held() &&			\
			   !lockdep_is_held(&cgroup_mutex),		\
Tejun Heo's avatar
Tejun Heo committed
117
			   "cgroup_mutex or RCU read lock required");
118

119 120 121 122 123 124 125 126
/*
 * cgroup destruction makes heavy use of work items and there can be a lot
 * of concurrent destructions.  Use a separate workqueue so that cgroup
 * destruction work items don't end up filling up max_active of system_wq
 * which may lead to deadlock.
 */
static struct workqueue_struct *cgroup_destroy_wq;

Tejun Heo's avatar
Tejun Heo committed
127
/* generate an array of cgroup subsystem pointers */
128
#define SUBSYS(_x) [_x ## _cgrp_id] = &_x ## _cgrp_subsys,
129
struct cgroup_subsys *cgroup_subsys[] = {
130 131
#include <linux/cgroup_subsys.h>
};
132 133 134 135 136
#undef SUBSYS

/* array of cgroup subsystem names */
#define SUBSYS(_x) [_x ## _cgrp_id] = #_x,
static const char *cgroup_subsys_name[] = {
137 138
#include <linux/cgroup_subsys.h>
};
139
#undef SUBSYS
140

141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
/* array of static_keys for cgroup_subsys_enabled() and cgroup_subsys_on_dfl() */
#define SUBSYS(_x)								\
	DEFINE_STATIC_KEY_TRUE(_x ## _cgrp_subsys_enabled_key);			\
	DEFINE_STATIC_KEY_TRUE(_x ## _cgrp_subsys_on_dfl_key);			\
	EXPORT_SYMBOL_GPL(_x ## _cgrp_subsys_enabled_key);			\
	EXPORT_SYMBOL_GPL(_x ## _cgrp_subsys_on_dfl_key);
#include <linux/cgroup_subsys.h>
#undef SUBSYS

#define SUBSYS(_x) [_x ## _cgrp_id] = &_x ## _cgrp_subsys_enabled_key,
static struct static_key_true *cgroup_subsys_enabled_key[] = {
#include <linux/cgroup_subsys.h>
};
#undef SUBSYS

#define SUBSYS(_x) [_x ## _cgrp_id] = &_x ## _cgrp_subsys_on_dfl_key,
static struct static_key_true *cgroup_subsys_on_dfl_key[] = {
#include <linux/cgroup_subsys.h>
};
#undef SUBSYS

Tejun Heo's avatar
Tejun Heo committed
162
static DEFINE_PER_CPU(struct cgroup_rstat_cpu, cgrp_dfl_root_rstat_cpu);
163

Zefan Li's avatar
Zefan Li committed
164
/* the default hierarchy */
Tejun Heo's avatar
Tejun Heo committed
165
struct cgroup_root cgrp_dfl_root = { .cgrp.rstat_cpu = &cgrp_dfl_root_rstat_cpu };
Tejun Heo's avatar
Tejun Heo committed
166
EXPORT_SYMBOL_GPL(cgrp_dfl_root);
167

168 169 170 171
/*
 * The default hierarchy always exists but is hidden until mounted for the
 * first time.  This is for backward compatibility.
 */
172
static bool cgrp_dfl_visible;
173

174
/* some controllers are not supported in the default hierarchy */
175
static u16 cgrp_dfl_inhibit_ss_mask;
176

177
/* some controllers are implicitly enabled on the default hierarchy */
Tejun Heo's avatar
Tejun Heo committed
178
static u16 cgrp_dfl_implicit_ss_mask;
179

180 181 182
/* some controllers can be threaded on the default hierarchy */
static u16 cgrp_dfl_threaded_ss_mask;

183
/* The list of hierarchy roots */
184
LIST_HEAD(cgroup_roots);
185
static int cgroup_root_count;
186

Tejun Heo's avatar
Tejun Heo committed
187
/* hierarchy ID allocation and mapping, protected by cgroup_mutex */
188
static DEFINE_IDR(cgroup_hierarchy_idr);
189

190
/*
191 192 193 194 195
 * Assign a monotonically increasing serial number to csses.  It guarantees
 * cgroups with bigger numbers are newer than those with smaller numbers.
 * Also, as csses are always appended to the parent's ->children list, it
 * guarantees that sibling csses are always sorted in the ascending serial
 * number order on the list.  Protected by cgroup_mutex.
196
 */
197
static u64 css_serial_nr_next = 1;
198

199
/*
Tejun Heo's avatar
Tejun Heo committed
200 201
 * These bitmasks identify subsystems with specific features to avoid
 * having to do iterative checks repeatedly.
202
 */
203 204
static u16 have_fork_callback __read_mostly;
static u16 have_exit_callback __read_mostly;
205
static u16 have_release_callback __read_mostly;
Tejun Heo's avatar
Tejun Heo committed
206
static u16 have_canfork_callback __read_mostly;
207

208 209
/* cgroup namespace for init task */
struct cgroup_namespace init_cgroup_ns = {
210
	.ns.count	= REFCOUNT_INIT(2),
211 212 213 214 215 216
	.user_ns	= &init_user_ns,
	.ns.ops		= &cgroupns_operations,
	.ns.inum	= PROC_CGROUP_INIT_INO,
	.root_cset	= &init_css_set,
};

217
static struct file_system_type cgroup2_fs_type;
218
static struct cftype cgroup_base_files[];
219

220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235
/* cgroup optional features */
enum cgroup_opt_features {
#ifdef CONFIG_PSI
	OPT_FEATURE_PRESSURE,
#endif
	OPT_FEATURE_COUNT
};

static const char *cgroup_opt_feature_names[OPT_FEATURE_COUNT] = {
#ifdef CONFIG_PSI
	"pressure",
#endif
};

static u16 cgroup_feature_disable_mask __read_mostly;

236 237
static int cgroup_apply_control(struct cgroup *cgrp);
static void cgroup_finalize_control(struct cgroup *cgrp, int ret);
238 239
static void css_task_iter_skip(struct css_task_iter *it,
			       struct task_struct *task);
240
static int cgroup_destroy_locked(struct cgroup *cgrp);
241 242
static struct cgroup_subsys_state *css_create(struct cgroup *cgrp,
					      struct cgroup_subsys *ss);
243
static void css_release(struct percpu_ref *ref);
244
static void kill_css(struct cgroup_subsys_state *css);
245 246
static int cgroup_addrm_files(struct cgroup_subsys_state *css,
			      struct cgroup *cgrp, struct cftype cfts[],
247
			      bool is_add);
248

249 250 251 252 253 254 255 256
/**
 * cgroup_ssid_enabled - cgroup subsys enabled test by subsys ID
 * @ssid: subsys ID of interest
 *
 * cgroup_subsys_enabled() can only be used with literal subsys names which
 * is fine for individual subsystems but unsuitable for cgroup core.  This
 * is slower static_key_enabled() based test indexed by @ssid.
 */
257
bool cgroup_ssid_enabled(int ssid)
258
{
259
	if (!CGROUP_HAS_SUBSYS_CONFIG)
260 261
		return false;

262 263 264
	return static_key_enabled(cgroup_subsys_enabled_key[ssid]);
}

265 266 267 268 269 270
/**
 * cgroup_on_dfl - test whether a cgroup is on the default hierarchy
 * @cgrp: the cgroup of interest
 *
 * The default hierarchy is the v2 interface of cgroup and this function
 * can be used to test whether a cgroup is on the default hierarchy for
271
 * cases where a subsystem should behave differently depending on the
272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288
 * interface version.
 *
 * List of changed behaviors:
 *
 * - Mount options "noprefix", "xattr", "clone_children", "release_agent"
 *   and "name" are disallowed.
 *
 * - When mounting an existing superblock, mount options should match.
 *
 * - Remount is disallowed.
 *
 * - rename(2) is disallowed.
 *
 * - "tasks" is removed.  Everything should be at process granularity.  Use
 *   "cgroup.procs" instead.
 *
 * - "cgroup.procs" is not sorted.  pids will be unique unless they got
289
 *   recycled in-between reads.
290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311
 *
 * - "release_agent" and "notify_on_release" are removed.  Replacement
 *   notification mechanism will be implemented.
 *
 * - "cgroup.clone_children" is removed.
 *
 * - "cgroup.subtree_populated" is available.  Its value is 0 if the cgroup
 *   and its descendants contain no task; otherwise, 1.  The file also
 *   generates kernfs notification which can be monitored through poll and
 *   [di]notify when the value of the file changes.
 *
 * - cpuset: tasks will be kept in empty cpusets when hotplug happens and
 *   take masks of ancestors with non-empty cpus/mems, instead of being
 *   moved to an ancestor.
 *
 * - cpuset: a task can be moved into an empty cpuset, and again it takes
 *   masks of ancestors.
 *
 * - blkcg: blk-throttle becomes properly hierarchical.
 *
 * - debug: disallowed on the default hierarchy.
 */
312
bool cgroup_on_dfl(const struct cgroup *cgrp)
313 314 315 316
{
	return cgrp->root == &cgrp_dfl_root;
}

317 318 319 320 321 322 323
/* IDR wrappers which synchronize using cgroup_idr_lock */
static int cgroup_idr_alloc(struct idr *idr, void *ptr, int start, int end,
			    gfp_t gfp_mask)
{
	int ret;

	idr_preload(gfp_mask);
324
	spin_lock_bh(&cgroup_idr_lock);
325
	ret = idr_alloc(idr, ptr, start, end, gfp_mask & ~__GFP_DIRECT_RECLAIM);
326
	spin_unlock_bh(&cgroup_idr_lock);
327 328 329 330 331 332 333 334
	idr_preload_end();
	return ret;
}

static void *cgroup_idr_replace(struct idr *idr, void *ptr, int id)
{
	void *ret;

335
	spin_lock_bh(&cgroup_idr_lock);
336
	ret = idr_replace(idr, ptr, id);
337
	spin_unlock_bh(&cgroup_idr_lock);
338 339 340 341 342
	return ret;
}

static void cgroup_idr_remove(struct idr *idr, int id)
{
343
	spin_lock_bh(&cgroup_idr_lock);
344
	idr_remove(idr, id);
345
	spin_unlock_bh(&cgroup_idr_lock);
346 347
}

348
static bool cgroup_has_tasks(struct cgroup *cgrp)
Tejun Heo's avatar
Tejun Heo committed
349
{
350 351
	return cgrp->nr_populated_csets;
}
Tejun Heo's avatar
Tejun Heo committed
352

353
bool cgroup_is_threaded(struct cgroup *cgrp)
354 355 356 357
{
	return cgrp->dom_cgrp != cgrp;
}

358 359 360 361 362 363 364 365 366 367 368
/* can @cgrp host both domain and threaded children? */
static bool cgroup_is_mixable(struct cgroup *cgrp)
{
	/*
	 * Root isn't under domain level resource control exempting it from
	 * the no-internal-process constraint, so it can serve as a thread
	 * root and a parent of resource domains at the same time.
	 */
	return !cgroup_parent(cgrp);
}

369
/* can @cgrp become a thread root? Should always be true for a thread root */
370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391
static bool cgroup_can_be_thread_root(struct cgroup *cgrp)
{
	/* mixables don't care */
	if (cgroup_is_mixable(cgrp))
		return true;

	/* domain roots can't be nested under threaded */
	if (cgroup_is_threaded(cgrp))
		return false;

	/* can only have either domain or threaded children */
	if (cgrp->nr_populated_domain_children)
		return false;

	/* and no domain controllers can be enabled */
	if (cgrp->subtree_control & ~cgrp_dfl_threaded_ss_mask)
		return false;

	return true;
}

/* is @cgrp root of a threaded subtree? */
392
bool cgroup_is_thread_root(struct cgroup *cgrp)
393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428
{
	/* thread root should be a domain */
	if (cgroup_is_threaded(cgrp))
		return false;

	/* a domain w/ threaded children is a thread root */
	if (cgrp->nr_threaded_children)
		return true;

	/*
	 * A domain which has tasks and explicit threaded controllers
	 * enabled is a thread root.
	 */
	if (cgroup_has_tasks(cgrp) &&
	    (cgrp->subtree_control & cgrp_dfl_threaded_ss_mask))
		return true;

	return false;
}

/* a domain which isn't connected to the root w/o brekage can't be used */
static bool cgroup_is_valid_domain(struct cgroup *cgrp)
{
	/* the cgroup itself can be a thread root */
	if (cgroup_is_threaded(cgrp))
		return false;

	/* but the ancestors can't be unless mixable */
	while ((cgrp = cgroup_parent(cgrp))) {
		if (!cgroup_is_mixable(cgrp) && cgroup_is_thread_root(cgrp))
			return false;
		if (cgroup_is_threaded(cgrp))
			return false;
	}

	return true;
Tejun Heo's avatar
Tejun Heo committed
429 430
}

431 432 433 434 435 436
/* subsystems visibly enabled on a cgroup */
static u16 cgroup_control(struct cgroup *cgrp)
{
	struct cgroup *parent = cgroup_parent(cgrp);
	u16 root_ss_mask = cgrp->root->subsys_mask;

437 438 439 440 441 442 443 444
	if (parent) {
		u16 ss_mask = parent->subtree_control;

		/* threaded cgroups can only have threaded controllers */
		if (cgroup_is_threaded(cgrp))
			ss_mask &= cgrp_dfl_threaded_ss_mask;
		return ss_mask;
	}
445 446

	if (cgroup_on_dfl(cgrp))
447 448
		root_ss_mask &= ~(cgrp_dfl_inhibit_ss_mask |
				  cgrp_dfl_implicit_ss_mask);
449 450 451 452 453 454 455 456
	return root_ss_mask;
}

/* subsystems enabled on a cgroup */
static u16 cgroup_ss_mask(struct cgroup *cgrp)
{
	struct cgroup *parent = cgroup_parent(cgrp);

457 458 459 460 461 462 463 464
	if (parent) {
		u16 ss_mask = parent->subtree_ss_mask;

		/* threaded cgroups can only have threaded controllers */
		if (cgroup_is_threaded(cgrp))
			ss_mask &= cgrp_dfl_threaded_ss_mask;
		return ss_mask;
	}
465 466 467 468

	return cgrp->root->subsys_mask;
}

Tejun Heo's avatar
Tejun Heo committed
469 470 471
/**
 * cgroup_css - obtain a cgroup's css for the specified subsystem
 * @cgrp: the cgroup of interest
472
 * @ss: the subsystem of interest (%NULL returns @cgrp->self)
Tejun Heo's avatar
Tejun Heo committed
473
 *
474 475 476 477 478
 * Return @cgrp's css (cgroup_subsys_state) associated with @ss.  This
 * function must be called either under cgroup_mutex or rcu_read_lock() and
 * the caller is responsible for pinning the returned css if it wants to
 * keep accessing it outside the said locks.  This function may return
 * %NULL if @cgrp doesn't have @subsys_id enabled.
Tejun Heo's avatar
Tejun Heo committed
479 480
 */
static struct cgroup_subsys_state *cgroup_css(struct cgroup *cgrp,
481
					      struct cgroup_subsys *ss)
Tejun Heo's avatar
Tejun Heo committed
482
{
483
	if (CGROUP_HAS_SUBSYS_CONFIG && ss)
484
		return rcu_dereference_check(cgrp->subsys[ss->id],
485
					lockdep_is_held(&cgroup_mutex));
486
	else
487
		return &cgrp->self;
Tejun Heo's avatar
Tejun Heo committed
488
}
489

490 491 492 493 494
/**
 * cgroup_tryget_css - try to get a cgroup's css for the specified subsystem
 * @cgrp: the cgroup of interest
 * @ss: the subsystem of interest
 *
Zhen Lei's avatar
Zhen Lei committed
495
 * Find and get @cgrp's css associated with @ss.  If the css doesn't exist
496 497 498 499 500 501 502 503 504
 * or is offline, %NULL is returned.
 */
static struct cgroup_subsys_state *cgroup_tryget_css(struct cgroup *cgrp,
						     struct cgroup_subsys *ss)
{
	struct cgroup_subsys_state *css;

	rcu_read_lock();
	css = cgroup_css(cgrp, ss);
505
	if (css && !css_tryget_online(css))
506 507 508 509 510 511
		css = NULL;
	rcu_read_unlock();

	return css;
}

512
/**
513
 * cgroup_e_css_by_mask - obtain a cgroup's effective css for the specified ss
514
 * @cgrp: the cgroup of interest
515
 * @ss: the subsystem of interest (%NULL returns @cgrp->self)
516
 *
517
 * Similar to cgroup_css() but returns the effective css, which is defined
518 519 520 521
 * as the matching css of the nearest ancestor including self which has @ss
 * enabled.  If @ss is associated with the hierarchy @cgrp is on, this
 * function is guaranteed to return non-NULL css.
 */
522 523
static struct cgroup_subsys_state *cgroup_e_css_by_mask(struct cgroup *cgrp,
							struct cgroup_subsys *ss)
524 525 526 527
{
	lockdep_assert_held(&cgroup_mutex);

	if (!ss)
528
		return &cgrp->self;
529

530 531
	/*
	 * This function is used while updating css associations and thus
532
	 * can't test the csses directly.  Test ss_mask.
533
	 */
534
	while (!(cgroup_ss_mask(cgrp) & (1 << ss->id))) {
Tejun Heo's avatar
Tejun Heo committed
535
		cgrp = cgroup_parent(cgrp);
536 537 538
		if (!cgrp)
			return NULL;
	}
539 540

	return cgroup_css(cgrp, ss);
Tejun Heo's avatar
Tejun Heo committed
541
}
542

543 544 545 546 547 548 549 550 551 552 553
/**
 * cgroup_e_css - obtain a cgroup's effective css for the specified subsystem
 * @cgrp: the cgroup of interest
 * @ss: the subsystem of interest
 *
 * Find and get the effective css of @cgrp for @ss.  The effective css is
 * defined as the matching css of the nearest ancestor including self which
 * has @ss enabled.  If @ss is not mounted on the hierarchy @cgrp is on,
 * the root css is returned, so this function always returns a valid css.
 *
 * The returned css is not guaranteed to be online, and therefore it is the
554
 * callers responsibility to try get a reference for it.
555 556 557 558 559 560
 */
struct cgroup_subsys_state *cgroup_e_css(struct cgroup *cgrp,
					 struct cgroup_subsys *ss)
{
	struct cgroup_subsys_state *css;

561 562 563
	if (!CGROUP_HAS_SUBSYS_CONFIG)
		return NULL;

564 565 566 567 568 569 570 571 572 573 574
	do {
		css = cgroup_css(cgrp, ss);

		if (css)
			return css;
		cgrp = cgroup_parent(cgrp);
	} while (cgrp);

	return init_css_set.subsys[ss->id];
}

575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590
/**
 * cgroup_get_e_css - get a cgroup's effective css for the specified subsystem
 * @cgrp: the cgroup of interest
 * @ss: the subsystem of interest
 *
 * Find and get the effective css of @cgrp for @ss.  The effective css is
 * defined as the matching css of the nearest ancestor including self which
 * has @ss enabled.  If @ss is not mounted on the hierarchy @cgrp is on,
 * the root css is returned, so this function always returns a valid css.
 * The returned css must be put using css_put().
 */
struct cgroup_subsys_state *cgroup_get_e_css(struct cgroup *cgrp,
					     struct cgroup_subsys *ss)
{
	struct cgroup_subsys_state *css;

591 592 593
	if (!CGROUP_HAS_SUBSYS_CONFIG)
		return NULL;

594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609
	rcu_read_lock();

	do {
		css = cgroup_css(cgrp, ss);

		if (css && css_tryget_online(css))
			goto out_unlock;
		cgrp = cgroup_parent(cgrp);
	} while (cgrp);

	css = init_css_set.subsys[ss->id];
	css_get(css);
out_unlock:
	rcu_read_unlock();
	return css;
}
610
EXPORT_SYMBOL_GPL(cgroup_get_e_css);
611

612
static void cgroup_get_live(struct cgroup *cgrp)
613 614 615 616 617
{
	WARN_ON_ONCE(cgroup_is_dead(cgrp));
	css_get(&cgrp->self);
}

618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650
/**
 * __cgroup_task_count - count the number of tasks in a cgroup. The caller
 * is responsible for taking the css_set_lock.
 * @cgrp: the cgroup in question
 */
int __cgroup_task_count(const struct cgroup *cgrp)
{
	int count = 0;
	struct cgrp_cset_link *link;

	lockdep_assert_held(&css_set_lock);

	list_for_each_entry(link, &cgrp->cset_links, cset_link)
		count += link->cset->nr_tasks;

	return count;
}

/**
 * cgroup_task_count - count the number of tasks in a cgroup.
 * @cgrp: the cgroup in question
 */
int cgroup_task_count(const struct cgroup *cgrp)
{
	int count;

	spin_lock_irq(&css_set_lock);
	count = __cgroup_task_count(cgrp);
	spin_unlock_irq(&css_set_lock);

	return count;
}

651
struct cgroup_subsys_state *of_css(struct kernfs_open_file *of)
652
{
Tejun Heo's avatar
Tejun Heo committed
653
	struct cgroup *cgrp = of->kn->parent->priv;
654
	struct cftype *cft = of_cft(of);
Tejun Heo's avatar
Tejun Heo committed
655 656 657 658 659 660 661 662 663

	/*
	 * This is open and unprotected implementation of cgroup_css().
	 * seq_css() is only called from a kernfs file operation which has
	 * an active reference on the file.  Because all the subsystem
	 * files are drained before a css is disassociated with a cgroup,
	 * the matching css from the cgroup's subsys table is guaranteed to
	 * be and stay valid until the enclosing operation is complete.
	 */
664
	if (CGROUP_HAS_SUBSYS_CONFIG && cft->ss)
Tejun Heo's avatar
Tejun Heo committed
665 666
		return rcu_dereference_raw(cgrp->subsys[cft->ss->id]);
	else
667
		return &cgrp->self;
668
}
669
EXPORT_SYMBOL_GPL(of_css);
670

Tejun Heo's avatar
Tejun Heo committed
671 672 673 674 675 676
/**
 * for_each_css - iterate all css's of a cgroup
 * @css: the iteration cursor
 * @ssid: the index of the subsystem, CGROUP_SUBSYS_COUNT after reaching the end
 * @cgrp: the target cgroup to iterate css's of
 *
677
 * Should be called under cgroup_[tree_]mutex.
Tejun Heo's avatar
Tejun Heo committed
678 679 680 681 682 683 684 685
 */
#define for_each_css(css, ssid, cgrp)					\
	for ((ssid) = 0; (ssid) < CGROUP_SUBSYS_COUNT; (ssid)++)	\
		if (!((css) = rcu_dereference_check(			\
				(cgrp)->subsys[(ssid)],			\
				lockdep_is_held(&cgroup_mutex)))) { }	\
		else

686 687 688 689 690 691 692 693
/**
 * for_each_e_css - iterate all effective css's of a cgroup
 * @css: the iteration cursor
 * @ssid: the index of the subsystem, CGROUP_SUBSYS_COUNT after reaching the end
 * @cgrp: the target cgroup to iterate css's of
 *
 * Should be called under cgroup_[tree_]mutex.
 */
694 695 696 697 698
#define for_each_e_css(css, ssid, cgrp)					    \
	for ((ssid) = 0; (ssid) < CGROUP_SUBSYS_COUNT; (ssid)++)	    \
		if (!((css) = cgroup_e_css_by_mask(cgrp,		    \
						   cgroup_subsys[(ssid)]))) \
			;						    \
699 700
		else

701
/**
702
 * do_each_subsys_mask - filter for_each_subsys with a bitmask
703 704
 * @ss: the iteration cursor
 * @ssid: the index of @ss, CGROUP_SUBSYS_COUNT after reaching the end
705
 * @ss_mask: the bitmask
706 707
 *
 * The block will only run for cases where the ssid-th bit (1 << ssid) of
708
 * @ss_mask is set.
709
 */
710 711
#define do_each_subsys_mask(ss, ssid, ss_mask) do {			\
	unsigned long __ss_mask = (ss_mask);				\
712
	if (!CGROUP_HAS_SUBSYS_CONFIG) {				\
713
		(ssid) = 0;						\
714 715 716 717 718 719 720 721 722 723
		break;							\
	}								\
	for_each_set_bit(ssid, &__ss_mask, CGROUP_SUBSYS_COUNT) {	\
		(ss) = cgroup_subsys[ssid];				\
		{

#define while_each_subsys_mask()					\
		}							\
	}								\
} while (false)
724

725 726
/* iterate over child cgrps, lock should be held throughout iteration */
#define cgroup_for_each_live_child(child, cgrp)				\
727
	list_for_each_entry((child), &(cgrp)->self.children, self.sibling) \
Tejun Heo's avatar
Tejun Heo committed
728
		if (({ lockdep_assert_held(&cgroup_mutex);		\
729 730 731
		       cgroup_is_dead(child); }))			\
			;						\
		else
732

733
/* walk live descendants in pre order */
734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750
#define cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp)		\
	css_for_each_descendant_pre((d_css), cgroup_css((cgrp), NULL))	\
		if (({ lockdep_assert_held(&cgroup_mutex);		\
		       (dsct) = (d_css)->cgroup;			\
		       cgroup_is_dead(dsct); }))			\
			;						\
		else

/* walk live descendants in postorder */
#define cgroup_for_each_live_descendant_post(dsct, d_css, cgrp)		\
	css_for_each_descendant_post((d_css), cgroup_css((cgrp), NULL))	\
		if (({ lockdep_assert_held(&cgroup_mutex);		\
		       (dsct) = (d_css)->cgroup;			\
		       cgroup_is_dead(dsct); }))			\
			;						\
		else

751 752
/*
 * The default css_set - used by init and its children prior to any
753 754 755 756 757
 * hierarchies being mounted. It contains a pointer to the root state
 * for each subsystem. Also used to anchor the list of css_sets. Not
 * reference-counted, to improve performance when child cgroups
 * haven't been created.
 */
758
struct css_set init_css_set = {
759
	.refcount		= REFCOUNT_INIT(1),
760
	.dom_cset		= &init_css_set,
761 762
	.tasks			= LIST_HEAD_INIT(init_css_set.tasks),
	.mg_tasks		= LIST_HEAD_INIT(init_css_set.mg_tasks),
763
	.dying_tasks		= LIST_HEAD_INIT(init_css_set.dying_tasks),
Tejun Heo's avatar
Tejun Heo committed
764
	.task_iters		= LIST_HEAD_INIT(init_css_set.task_iters),
765
	.threaded_csets		= LIST_HEAD_INIT(init_css_set.threaded_csets),
Tejun Heo's avatar
Tejun Heo committed
766
	.cgrp_links		= LIST_HEAD_INIT(init_css_set.cgrp_links),
767 768
	.mg_preload_node	= LIST_HEAD_INIT(init_css_set.mg_preload_node),
	.mg_node		= LIST_HEAD_INIT(init_css_set.mg_node),
769 770 771 772 773 774 775 776

	/*
	 * The following field is re-initialized when this cset gets linked
	 * in cgroup_init().  However, let's initialize the field
	 * statically too so that the default cgroup can be accessed safely
	 * early during boot.
	 */
	.dfl_cgrp		= &cgrp_dfl_root.cgrp,
777
};
778

779
static int css_set_count	= 1;	/* 1 for init_css_set */
780

781 782 783 784 785
static bool css_set_threaded(struct css_set *cset)
{
	return cset->dom_cset != cset;
}

786 787 788
/**
 * css_set_populated - does a css_set contain any tasks?
 * @cset: target css_set
789 790 791 792 793
 *
 * css_set_populated() should be the same as !!cset->nr_tasks at steady
 * state. However, css_set_populated() can be called while a task is being
 * added to or removed from the linked list before the nr_tasks is
 * properly updated. Hence, we can't just look at ->nr_tasks here.
794 795 796
 */
static bool css_set_populated(struct css_set *cset)
{
797
	lockdep_assert_held(&css_set_lock);
798 799 800 801

	return !list_empty(&cset->tasks) || !list_empty(&cset->mg_tasks);
}

802
/**
803
 * cgroup_update_populated - update the populated count of a cgroup
804 805 806
 * @cgrp: the target cgroup
 * @populated: inc or dec populated count
 *
807
 * One of the css_sets associated with @cgrp is either getting its first
808 809 810 811
 * task or losing the last.  Update @cgrp->nr_populated_* accordingly.  The
 * count is propagated towards root so that a given cgroup's
 * nr_populated_children is zero iff none of its descendants contain any
 * tasks.
812
 *
813 814 815 816 817
 * @cgrp's interface file "cgroup.populated" is zero if both
 * @cgrp->nr_populated_csets and @cgrp->nr_populated_children are zero and
 * 1 otherwise.  When the sum changes from or to zero, userland is notified
 * that the content of the interface file has changed.  This can be used to
 * detect when @cgrp and its descendants become populated or empty.
818 819 820
 */
static void cgroup_update_populated(struct cgroup *cgrp, bool populated)
{
821 822 823
	struct cgroup *child = NULL;
	int adj = populated ? 1 : -1;

824
	lockdep_assert_held(&css_set_lock);
825 826

	do {
827
		bool was_populated = cgroup_is_populated(cgrp);
828

829
		if (!child) {
830
			cgrp->nr_populated_csets += adj;
831 832 833 834 835 836
		} else {
			if (cgroup_is_threaded(child))
				cgrp->nr_populated_threaded_children += adj;
			else
				cgrp->nr_populated_domain_children += adj;
		}
837

838
		if (was_populated == cgroup_is_populated(cgrp))
839 840
			break;

841
		cgroup1_check_for_release(cgrp);
842 843
		TRACE_CGROUP_PATH(notify_populated, cgrp,
				  cgroup_is_populated(cgrp));
844 845
		cgroup_file_notify(&cgrp->events_file);

846
		child = cgrp;
Tejun Heo's avatar
Tejun Heo committed
847
		cgrp = cgroup_parent(cgrp);
848 849 850
	} while (cgrp);
}

851 852 853 854 855 856
/**
 * css_set_update_populated - update populated state of a css_set
 * @cset: target css_set
 * @populated: whether @cset is populated or depopulated
 *
 * @cset is either getting the first task or losing the last.  Update the
857
 * populated counters of all associated cgroups accordingly.
858 859 860 861 862
 */
static void css_set_update_populated(struct css_set *cset, bool populated)
{
	struct cgrp_cset_link *link;

863
	lockdep_assert_held(&css_set_lock);
864 865 866 867 868

	list_for_each_entry(link, &cset->cgrp_links, cgrp_link)
		cgroup_update_populated(link->cgrp, populated);
}

869 870 871 872 873 874 875 876 877 878 879 880 881 882 883
/*
 * @task is leaving, advance task iterators which are pointing to it so
 * that they can resume at the next position.  Advancing an iterator might
 * remove it from the list, use safe walk.  See css_task_iter_skip() for
 * details.
 */
static void css_set_skip_task_iters(struct css_set *cset,
				    struct task_struct *task)
{
	struct css_task_iter *it, *pos;

	list_for_each_entry_safe(it, pos, &cset->task_iters, iters_node)
		css_task_iter_skip(it, task);
}

884 885 886 887 888 889 890 891 892 893 894
/**
 * css_set_move_task - move a task from one css_set to another
 * @task: task being moved
 * @from_cset: css_set @task currently belongs to (may be NULL)
 * @to_cset: new css_set @task is being moved to (may be NULL)
 * @use_mg_tasks: move to @to_cset->mg_tasks instead of ->tasks
 *
 * Move @task from @from_cset to @to_cset.  If @task didn't belong to any
 * css_set, @from_cset can be NULL.  If @task is being disassociated
 * instead of moved, @to_cset can be NULL.
 *
895
 * This function automatically handles populated counter updates and
896 897
 * css_task_iter adjustments but the caller is responsible for managing
 * @from_cset and @to_cset's reference counts.
898 899 900 901 902
 */
static void css_set_move_task(struct task_struct *task,
			      struct css_set *from_cset, struct css_set *to_cset,
			      bool use_mg_tasks)
{
903
	lockdep_assert_held(&css_set_lock);
904

905 906 907
	if (to_cset && !css_set_populated(to_cset))
		css_set_update_populated(to_cset, true);

908 909
	if (from_cset) {
		WARN_ON_ONCE(list_empty(&task->cg_list));
910

911
		css_set_skip_task_iters(from_cset, task);
912 913 914 915 916 917 918 919 920 921 922
		list_del_init(&task->cg_list);
		if (!css_set_populated(from_cset))
			css_set_update_populated(from_cset, false);
	} else {
		WARN_ON_ONCE(!list_empty(&task->cg_list));
	}

	if (to_cset) {
		/*
		 * We are synchronized through cgroup_threadgroup_rwsem
		 * against PF_EXITING setting such that we can't race
923
		 * against cgroup_exit()/cgroup_free() dropping the css_set.
924 925 926
		 */
		WARN_ON_ONCE(task->flags & PF_EXITING);

Johannes Weiner's avatar
Johannes Weiner committed
927
		cgroup_move_task(task, to_cset);
928 929 930 931 932
		list_add_tail(&task->cg_list, use_mg_tasks ? &to_cset->mg_tasks :
							     &to_cset->tasks);
	}
}

933 934 935 936 937
/*
 * hash table for cgroup groups. This improves the performance to find
 * an existing css_set. This hash doesn't (currently) take into
 * account cgroups in empty hierarchies.
 */
938
#define CSS_SET_HASH_BITS	7
939
static DEFINE_HASHTABLE(css_set_table, CSS_SET_HASH_BITS);
940

941
static unsigned long css_set_hash(struct cgroup_subsys_state *css[])
942
{
943
	unsigned long key = 0UL;
944 945
	struct cgroup_subsys *ss;
	int i;
946

947
	for_each_subsys(ss, i)
948 949
		key += (unsigned long)css[i];
	key = (key >> 16) ^ key;
950

951
	return key;
952 953
}

954
void put_css_set_locked(struct css_set *cset)
955
{
956
	struct cgrp_cset_link *link, *tmp_link;
957 958
	struct cgroup_subsys *ss;
	int ssid;
959

960
	lockdep_assert_held(&css_set_lock);
961

962
	if (!refcount_dec_and_test(&cset->refcount))
963
		return;
964

965 966
	WARN_ON_ONCE(!list_empty(&cset->threaded_csets));

967
	/* This css_set is dead. Unlink it and release cgroup and css refs */
968
	for_each_subsys(ss, ssid) {
969
		list_del(&cset->e_cset_node[ssid]);
970 971
		css_put(cset->subsys[ssid]);
	}
972
	hash_del(&cset->hlist);
973 974
	css_set_count--;

975 976 977
	list_for_each_entry_safe(link, tmp_link, &cset->cgrp_links, cgrp_link) {
		list_del(&link->cset_link);
		list_del(&link->cgrp_link);
978 979
		if (cgroup_parent(link->cgrp))
			cgroup_put(link->cgrp);
980
		kfree(link);
981
	}
982

983 984 985 986 987
	if (css_set_threaded(cset)) {
		list_del(&cset->threaded_csets_node);
		put_css_set_locked(cset->dom_cset);
	}

988
	kfree_rcu(cset, rcu_head);
989 990
}

991
/**
992
 * compare_css_sets - helper function for find_existing_css_set().
993 994
 * @cset: candidate css_set being tested
 * @old_cset: existing css_set for a task
995 996 997
 * @new_cgrp: cgroup that's being entered by the task
 * @template: desired set of css pointers in css_set (pre-calculated)
 *
Li Zefan's avatar
Li Zefan committed
998
 * Returns true if "cset" matches "old_cset" except for the hierarchy
999 1000
 * which "new_cgrp" belongs to, for which it should match "new_cgrp".
 */
1001 1002
static bool compare_css_sets(struct css_set *cset,
			     struct css_set *old_cset,
1003 1004 1005
			     struct cgroup *new_cgrp,
			     struct cgroup_subsys_state *template[])
{
1006
	struct cgroup *new_dfl_cgrp;
1007 1008
	struct list_head *l1, *l2;

1009 1010 1011 1012 1013 1014
	/*
	 * On the default hierarchy, there can be csets which are
	 * associated with the same set of cgroups but different csses.
	 * Let's first ensure that csses match.
	 */
	if (memcmp(template, cset->subsys, sizeof(cset->subsys)))
1015 1016
		return false;

1017 1018 1019 1020 1021 1022 1023 1024 1025 1026

	/* @cset's domain should match the default cgroup's */
	if (cgroup_on_dfl(new_cgrp))
		new_dfl_cgrp = new_cgrp;
	else
		new_dfl_cgrp = old_cset->dfl_cgrp;

	if (new_dfl_cgrp->dom_cgrp != cset->dom_cset->dfl_cgrp)
		return false;

1027 1028
	/*
	 * Compare cgroup pointers in order to distinguish between
1029 1030 1031
	 * different cgroups in hierarchies.  As different cgroups may
	 * share the same effective css, this comparison is always
	 * necessary.
1032
	 */
1033 1034
	l1 = &cset->cgrp_links;
	l2 = &old_cset->cgrp_links;
1035
	while (1) {
1036
		struct cgrp_cset_link *link1, *link2;
1037
		struct cgroup *cgrp1, *cgrp2;
1038 1039 1040 1041

		l1 = l1->next;
		l2 = l2->next;
		/* See if we reached the end - both lists are equal length. */
1042 1043
		if (l1 == &cset->cgrp_links) {
			BUG_ON(l2 != &old_cset->cgrp_links);
1044 1045
			break;
		} else {
1046
			BUG_ON(l2 == &old_cset->cgrp_links);
1047 1048
		}
		/* Locate the cgroups associated with these links. */
1049 1050 1051 1052
		link1 = list_entry(l1, struct cgrp_cset_link, cgrp_link);
		link2 = list_entry(l2, struct cgrp_cset_link, cgrp_link);
		cgrp1 = link1->cgrp;
		cgrp2 = link2->cgrp;
1053
		/* Hierarchies should be linked in the same order. */
1054
		BUG_ON(cgrp1->root != cgrp2->root);
1055 1056 1057 1058 1059 1060 1061 1062

		/*
		 * If this hierarchy is the hierarchy of the cgroup
		 * that's changing, then we need to check that this
		 * css_set points to the new cgroup; if it's any other
		 * hierarchy, then this css_set should point to the
		 * same cgroup as the old css_set.
		 */
1063 1064
		if (cgrp1->root == new_cgrp->root) {
			if (cgrp1 != new_cgrp)
1065 1066
				return false;
		} else {
1067
			if (cgrp1 != cgrp2)
1068 1069 1070 1071 1072 1073
				return false;
		}
	}
	return true;
}

1074 1075 1076 1077 1078
/**
 * find_existing_css_set - init css array and find the matching css_set
 * @old_cset: the css_set that we're using before the cgroup transition
 * @cgrp: the cgroup that we're moving into
 * @template: out param for the new set of csses, should be clear on entry
1079
 */
1080 1081 1082
static struct css_set *find_existing_css_set(struct css_set *old_cset,
					struct cgroup *cgrp,
					struct cgroup_subsys_state *template[])
1083
{
1084
	struct cgroup_root *root = cgrp->root;
1085
	struct cgroup_subsys *ss;
1086
	struct css_set *cset;
1087
	unsigned long key;
1088
	int i;
1089

Ben Blum's avatar
Ben Blum committed
1090 1091
	/*
	 * Build the set of subsystem state objects that we want to see in the
1092
	 * new css_set. While subsystems can change globally, the entries here
Ben Blum's avatar
Ben Blum committed
1093 1094
	 * won't change, so no need for locking.
	 */
1095
	for_each_subsys(ss, i) {
1096
		if (root->subsys_mask & (1UL << i)) {
1097 1098 1099 1100
			/*
			 * @ss is in this hierarchy, so we want the
			 * effective css from @cgrp.
			 */
1101
			template[i] = cgroup_e_css_by_mask(cgrp, ss);
1102
		} else {
1103 1104 1105 1106
			/*
			 * @ss is not in this hierarchy, so we don't want
			 * to change the css.
			 */
1107
			template[i] = old_cset->subsys[i];
1108 1109 1110
		}
	}

1111
	key = css_set_hash(template);
1112 1113
	hash_for_each_possible(css_set_table, cset, hlist, key) {
		if (!compare_css_sets(cset, old_cset, cgrp, template))
1114 1115 1116
			continue;

		/* This css_set matches what we need */
1117
		return cset;
1118
	}
1119 1120 1121 1122 1123

	/* No existing cgroup group matched */
	return NULL;
}

1124
static void free_cgrp_cset_links(struct list_head *links_to_free)
1125
{
1126
	struct cgrp_cset_link *link, *tmp_link;
1127

1128 1129
	list_for_each_entry_safe(link, tmp_link, links_to_free, cset_link) {
		list_del(&link->cset_link);
1130 1131 1132 1133
		kfree(link);
	}
}

1134 1135 1136 1137 1138 1139 1140
/**
 * allocate_cgrp_cset_links - allocate cgrp_cset_links
 * @count: the number of links to allocate
 * @tmp_links: list_head the allocated links are put on
 *
 * Allocate @count cgrp_cset_link structures and chain them on @tmp_links
 * through ->cset_link.  Returns 0 on success or -errno.
1141
 */
1142
static int allocate_cgrp_cset_links(int count, struct list_head *tmp_links)
1143
{
1144
	struct cgrp_cset_link *link;
1145
	int i;
1146 1147 1148

	INIT_LIST_HEAD(tmp_links);

1149
	for (i = 0; i < count; i++) {
1150
		link = kzalloc(sizeof(*link), GFP_KERNEL);
1151
		if (!link) {
1152
			free_cgrp_cset_links(tmp_links);
1153 1154
			return -ENOMEM;
		}
1155
		list_add(&link->cset_link, tmp_links);
1156 1157 1158 1159
	}
	return 0;
}

1160 1161
/**
 * link_css_set - a helper function to link a css_set to a cgroup
1162
 * @tmp_links: cgrp_cset_link objects allocated by allocate_cgrp_cset_links()
1163
 * @cset: the css_set to be linked
1164 1165
 * @cgrp: the destination cgroup
 */
1166 1167
static void link_css_set(struct list_head *tmp_links, struct css_set *cset,
			 struct cgroup *cgrp)
1168
{
1169
	struct cgrp_cset_link *link;
1170

1171
	BUG_ON(list_empty(tmp_links));
Tejun Heo's avatar
Tejun Heo committed
1172 1173 1174 1175

	if (cgroup_on_dfl(cgrp))
		cset->dfl_cgrp = cgrp;

1176 1177
	link = list_first_entry(tmp_links, struct cgrp_cset_link, cset_link);
	link->cset = cset;
1178
	link->cgrp = cgrp;
1179

1180
	/*
1181
	 * Always add links to the tail of the lists so that the lists are
1182
	 * in chronological order.
1183
	 */
1184
	list_move_tail(&link->cset_link, &cgrp->cset_links);
1185
	list_add_tail(&link->cgrp_link, &cset->cgrp_links);
1186 1187

	if (cgroup_parent(cgrp))
1188
		cgroup_get_live(cgrp);
1189 1190
}

1191 1192 1193 1194 1195 1196 1197
/**
 * find_css_set - return a new css_set with one cgroup updated
 * @old_cset: the baseline css_set
 * @cgrp: the cgroup to be updated
 *
 * Return a new css_set that's equivalent to @old_cset, but with @cgrp
 * substituted into the appropriate hierarchy.
1198
 */
1199 1200
static struct css_set *find_css_set(struct css_set *old_cset,
				    struct cgroup *cgrp)
1201
{
1202
	struct cgroup_subsys_state *template[CGROUP_SUBSYS_COUNT] = { };
1203
	struct css_set *cset;
1204 1205
	struct list_head tmp_links;
	struct cgrp_cset_link *link;
1206
	struct cgroup_subsys *ss;
1207
	unsigned long key;
1208
	int ssid;
1209

1210 1211
	lockdep_assert_held(&cgroup_mutex);

1212 1213
	/* First see if we already have a cgroup group that matches
	 * the desired set */
1214
	spin_lock_irq(&css_set_lock);
1215 1216 1217
	cset = find_existing_css_set(old_cset, cgrp, template);
	if (cset)
		get_css_set(cset);
1218
	spin_unlock_irq(&css_set_lock);
1219

1220 1221
	if (cset)
		return cset;
1222

1223
	cset = kzalloc(sizeof(*cset), GFP_KERNEL);
1224
	if (!cset)
1225 1226
		return NULL;

1227
	/* Allocate all the cgrp_cset_link objects that we'll need */
1228
	if (allocate_cgrp_cset_links(cgroup_root_count, &tmp_links) < 0) {
1229
		kfree(cset);
1230 1231 1232
		return NULL;
	}

1233
	refcount_set(&cset->refcount, 1);
1234
	cset->dom_cset = cset;
1235
	INIT_LIST_HEAD(&cset->tasks);
Tejun Heo's avatar
Tejun Heo committed
1236
	INIT_LIST_HEAD(&cset->mg_tasks);
1237
	INIT_LIST_HEAD(&cset->dying_tasks);
1238
	INIT_LIST_HEAD(&cset->task_iters);
1239
	INIT_LIST_HEAD(&cset->threaded_csets);
1240
	INIT_HLIST_NODE(&cset->hlist);
Tejun Heo's avatar
Tejun Heo committed
1241 1242 1243
	INIT_LIST_HEAD(&cset->cgrp_links);
	INIT_LIST_HEAD(&cset->mg_preload_node);
	INIT_LIST_HEAD(&cset->mg_node);
1244 1245 1246

	/* Copy the set of subsystem state objects generated in
	 * find_existing_css_set() */
1247
	memcpy(cset->subsys, template, sizeof(cset->subsys));
1248

1249
	spin_lock_irq(&css_set_lock);
1250
	/* Add reference counts and links from the new css_set. */
1251
	list_for_each_entry(link, &old_cset->cgrp_links, cgrp_link) {
1252
		struct cgroup *c = link->cgrp;
1253

1254 1255
		if (c->root == cgrp->root)
			c = cgrp;
1256
		link_css_set(&tmp_links, cset, c);
1257
	}
1258

1259
	BUG_ON(!list_empty(&tmp_links));
1260 1261

	css_set_count++;
1262

1263
	/* Add @cset to the hash table */
1264 1265
	key = css_set_hash(cset->subsys);
	hash_add(css_set_table, &cset->hlist, key);
1266

1267 1268 1269
	for_each_subsys(ss, ssid) {
		struct cgroup_subsys_state *css = cset->subsys[ssid];

1270
		list_add_tail(&cset->e_cset_node[ssid],
1271 1272 1273
			      &css->cgroup->e_csets[ssid]);
		css_get(css);
	}
1274

1275
	spin_unlock_irq(&css_set_lock);
1276

1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298
	/*
	 * If @cset should be threaded, look up the matching dom_cset and
	 * link them up.  We first fully initialize @cset then look for the
	 * dom_cset.  It's simpler this way and safe as @cset is guaranteed
	 * to stay empty until we return.
	 */
	if (cgroup_is_threaded(cset->dfl_cgrp)) {
		struct css_set *dcset;

		dcset = find_css_set(cset, cset->dfl_cgrp->dom_cgrp);
		if (!dcset) {
			put_css_set(cset);
			return NULL;
		}

		spin_lock_irq(&css_set_lock);
		cset->dom_cset = dcset;
		list_add_tail(&cset->threaded_csets_node,
			      &dcset->threaded_csets);
		spin_unlock_irq(&css_set_lock);
	}

1299
	return cset;
1300 1301
}

1302
struct cgroup_root *cgroup_root_from_kf(struct kernfs_root *kf_root)
1303
{
1304
	struct cgroup *root_cgrp = kf_root->kn->priv;
Tejun Heo's avatar
Tejun Heo committed
1305

1306
	return root_cgrp->root;
Tejun Heo's avatar
Tejun Heo committed
1307 1308
}

1309
static int cgroup_init_root_id(struct cgroup_root *root)
1310 1311 1312 1313 1314
{
	int id;

	lockdep_assert_held(&cgroup_mutex);

1315
	id = idr_alloc_cyclic(&cgroup_hierarchy_idr, root, 0, 0, GFP_KERNEL);
1316 1317 1318 1319 1320 1321 1322
	if (id < 0)
		return id;

	root->hierarchy_id = id;
	return 0;
}

1323
static void cgroup_exit_root_id(struct cgroup_root *root)
1324 1325 1326
{
	lockdep_assert_held(&cgroup_mutex);

1327
	idr_remove(&cgroup_hierarchy_idr, root->hierarchy_id);
1328 1329
}

1330
void cgroup_free_root(struct cgroup_root *root)
1331
{
1332
	kfree(root);
1333 1334
}

1335
static void cgroup_destroy_root(struct cgroup_root *root)
1336
{
1337
	struct cgroup *cgrp = &root->cgrp;
1338 1339
	struct cgrp_cset_link *link, *tmp_link;

1340 1341
	trace_cgroup_destroy_root(root);

1342
	cgroup_lock_and_drain_offline(&cgrp_dfl_root.cgrp);
1343

1344
	BUG_ON(atomic_read(&root->nr_cgrps));
1345
	BUG_ON(!list_empty(&cgrp->self.children));
1346 1347

	/* Rebind all subsystems back to the default hierarchy */
1348
	WARN_ON(rebind_subsystems(&cgrp_dfl_root, root->subsys_mask));
1349 1350

	/*
1351 1352
	 * Release all the links from cset_links to this hierarchy's
	 * root cgroup
1353
	 */
1354
	spin_lock_irq(&css_set_lock);
1355 1356 1357 1358 1359 1360

	list_for_each_entry_safe(link, tmp_link, &cgrp->cset_links, cset_link) {
		list_del(&link->cset_link);
		list_del(&link->cgrp_link);
		kfree(link);
	}
1361

1362
	spin_unlock_irq(&css_set_lock);
1363 1364 1365 1366 1367 1368 1369 1370 1371 1372

	if (!list_empty(&root->root_list)) {
		list_del(&root->root_list);
		cgroup_root_count--;
	}

	cgroup_exit_root_id(root);

	mutex_unlock(&cgroup_mutex);

1373
	cgroup_rstat_exit(cgrp);
Tejun Heo's avatar
Tejun Heo committed
1374
	kernfs_destroy_root(root->kf_root);
1375 1376 1377
	cgroup_free_root(root);
}

1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394
/*
 * look up cgroup associated with current task's cgroup namespace on the
 * specified hierarchy
 */
static struct cgroup *
current_cgns_cgroup_from_root(struct cgroup_root *root)
{
	struct cgroup *res = NULL;
	struct css_set *cset;

	lockdep_assert_held(&css_set_lock);

	rcu_read_lock();

	cset = current->nsproxy->cgroup_ns->root_cset;
	if (cset == &init_css_set) {
		res = &root->cgrp;
1395 1396
	} else if (root == &cgrp_dfl_root) {
		res = cset->dfl_cgrp;
1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414
	} else {
		struct cgrp_cset_link *link;

		list_for_each_entry(link, &cset->cgrp_links, cgrp_link) {
			struct cgroup *c = link->cgrp;

			if (c->root == root) {
				res = c;
				break;
			}
		}
	}
	rcu_read_unlock();

	BUG_ON(!res);
	return res;
}

1415 1416
/* look up cgroup associated with given css_set on the specified hierarchy */
static struct cgroup *cset_cgroup_from_root(struct css_set *cset,
1417
					    struct cgroup_root *root)
1418 1419 1420
{
	struct cgroup *res = NULL;

1421
	lockdep_assert_held(&cgroup_mutex);
1422
	lockdep_assert_held(&css_set_lock);
1423

1424
	if (cset == &init_css_set) {
1425
		res = &root->cgrp;
1426 1427
	} else if (root == &cgrp_dfl_root) {
		res = cset->dfl_cgrp;
1428
	} else {
1429 1430 1431
		struct cgrp_cset_link *link;

		list_for_each_entry(link, &cset->cgrp_links, cgrp_link) {
1432
			struct cgroup *c = link->cgrp;
1433

1434 1435 1436 1437 1438 1439
			if (c->root == root) {
				res = c;
				break;
			}
		}
	}
1440

1441 1442 1443 1444
	BUG_ON(!res);
	return res;
}

1445
/*
1446
 * Return the cgroup for "task" from the given hierarchy. Must be
1447
 * called with cgroup_mutex and css_set_lock held.
1448
 */
1449 1450
struct cgroup *task_cgroup_from_root(struct task_struct *task,
				     struct cgroup_root *root)
1451 1452
{
	/*
1453 1454
	 * No need to lock the task - since we hold css_set_lock the
	 * task can't change groups.
1455 1456 1457 1458
	 */
	return cset_cgroup_from_root(task_css_set(task), root);
}

1459 1460 1461 1462 1463 1464
/*
 * A task must hold cgroup_mutex to modify cgroups.
 *
 * Any task can increment and decrement the count field without lock.
 * So in general, code holding cgroup_mutex can't rely on the count
 * field not changing.  However, if the count goes to zero, then only
1465
 * cgroup_attach_task() can increment it again.  Because a count of zero
1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476
 * means that no tasks are currently attached, therefore there is no
 * way a task attached to that cgroup can fork (the other way to
 * increment the count).  So code holding cgroup_mutex can safely
 * assume that if the count is zero, it will stay zero. Similarly, if
 * a task holds cgroup_mutex on a cgroup with zero count, it
 * knows that the cgroup won't be removed, as cgroup_rmdir()
 * needs that mutex.
 *
 * A cgroup can only be deleted if both its 'count' of using tasks
 * is zero, and its list of 'children' cgroups is empty.  Since all
 * tasks in the system use _some_ cgroup, and since there is always at
1477
 * least one task in the system (init, pid == 1), therefore, root cgroup
1478
 * always has either children cgroups and/or using tasks.  So we don't
1479
 * need a special hack to ensure that root cgroup cannot be deleted.
1480 1481
 *
 * P.S.  One more locking exception.  RCU is used to guard the
1482
 * update of a tasks cgroup pointer by cgroup_attach_task()
1483 1484
 */

Tejun Heo's avatar
Tejun Heo committed
1485
static struct kernfs_syscall_ops cgroup_kf_syscall_ops;
1486

1487 1488
static char *cgroup_file_name(struct cgroup *cgrp, const struct cftype *cft,
			      char *buf)
1489
{
1490 1491
	struct cgroup_subsys *ss = cft->ss;

1492
	if (cft->ss && !(cft->flags & CFTYPE_NO_PREFIX) &&
1493 1494 1495 1496 1497
	    !(cgrp->root->flags & CGRP_ROOT_NOPREFIX)) {
		const char *dbg = (cft->flags & CFTYPE_DEBUG) ? ".__DEBUG__." : "";

		snprintf(buf, CGROUP_FILE_NAME_MAX, "%s%s.%s",
			 dbg, cgroup_on_dfl(cgrp) ? ss->name : ss->legacy_name,
1498
			 cft->name);
1499
	} else {
1500
		strscpy(buf, cft->name, CGROUP_FILE_NAME_MAX);
1501
	}
1502
	return buf;
1503 1504
}

1505 1506 1507 1508
/**
 * cgroup_file_mode - deduce file mode of a control file
 * @cft: the control file in question
 *
1509
 * S_IRUGO for read, S_IWUSR for write.
1510 1511
 */
static umode_t cgroup_file_mode(const struct cftype *cft)
1512
{
1513
	umode_t mode = 0;
1514

1515 1516 1517
	if (cft->read_u64 || cft->read_s64 || cft->seq_show)
		mode |= S_IRUGO;

1518 1519 1520 1521 1522 1523
	if (cft->write_u64 || cft->write_s64 || cft->write) {
		if (cft->flags & CFTYPE_WORLD_WRITABLE)
			mode |= S_IWUGO;
		else
			mode |= S_IWUSR;
	}
1524 1525

	return mode;
1526 1527
}

1528
/**
1529
 * cgroup_calc_subtree_ss_mask - calculate subtree_ss_mask
1530
 * @subtree_control: the new subtree_control mask to consider
1531
 * @this_ss_mask: available subsystems
1532 1533 1534 1535 1536
 *
 * On the default hierarchy, a subsystem may request other subsystems to be
 * enabled together through its ->depends_on mask.  In such cases, more
 * subsystems than specified in "cgroup.subtree_control" may be enabled.
 *
1537
 * This function calculates which subsystems need to be enabled if
1538
 * @subtree_control is to be applied while restricted to @this_ss_mask.
1539
 */
1540
static u16 cgroup_calc_subtree_ss_mask(u16 subtree_control, u16 this_ss_mask)
1541
{
1542
	u16 cur_ss_mask = subtree_control;
1543 1544 1545 1546 1547
	struct cgroup_subsys *ss;
	int ssid;

	lockdep_assert_held(&cgroup_mutex);

1548 1549
	cur_ss_mask |= cgrp_dfl_implicit_ss_mask;

1550
	while (true) {
1551
		u16 new_ss_mask = cur_ss_mask;
1552

1553
		do_each_subsys_mask(ss, ssid, cur_ss_mask) {
1554
			new_ss_mask |= ss->depends_on;
1555
		} while_each_subsys_mask();
1556 1557 1558 1559 1560 1561

		/*
		 * Mask out subsystems which aren't available.  This can
		 * happen only if some depended-upon subsystems were bound
		 * to non-default hierarchies.
		 */
1562
		new_ss_mask &= this_ss_mask;
1563 1564 1565 1566 1567 1568

		if (new_ss_mask == cur_ss_mask)
			break;
		cur_ss_mask = new_ss_mask;
	}

1569 1570 1571
	return cur_ss_mask;
}

1572 1573 1574 1575 1576 1577 1578 1579 1580 1581
/**
 * cgroup_kn_unlock - unlocking helper for cgroup kernfs methods
 * @kn: the kernfs_node being serviced
 *
 * This helper undoes cgroup_kn_lock_live() and should be invoked before
 * the method finishes if locking succeeded.  Note that once this function
 * returns the cgroup returned by cgroup_kn_lock_live() may become
 * inaccessible any time.  If the caller intends to continue to access the
 * cgroup, it should pin it before invoking this function.
 */
1582
void cgroup_kn_unlock(struct kernfs_node *kn)
1583
{
1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594
	struct cgroup *cgrp;

	if (kernfs_type(kn) == KERNFS_DIR)
		cgrp = kn->priv;
	else
		cgrp = kn->parent->priv;

	mutex_unlock(&cgroup_mutex);

	kernfs_unbreak_active_protection(kn);
	cgroup_put(cgrp);
1595 1596
}

1597 1598 1599
/**
 * cgroup_kn_lock_live - locking helper for cgroup kernfs methods
 * @kn: the kernfs_node being serviced
1600
 * @drain_offline: perform offline draining on the cgroup
1601 1602 1603 1604 1605
 *
 * This helper is to be used by a cgroup kernfs method currently servicing
 * @kn.  It breaks the active protection, performs cgroup locking and
 * verifies that the associated cgroup is alive.  Returns the cgroup if
 * alive; otherwise, %NULL.  A successful return should be undone by a
1606 1607
 * matching cgroup_kn_unlock() invocation.  If @drain_offline is %true, the
 * cgroup is drained of offlining csses before return.
1608 1609 1610 1611 1612 1613
 *
 * Any cgroup kernfs method implementation which requires locking the
 * associated cgroup should use this helper.  It avoids nesting cgroup
 * locking under kernfs active protection and allows all kernfs operations
 * including self-removal.
 */
1614
struct cgroup *cgroup_kn_lock_live(struct kernfs_node *kn, bool drain_offline)
Tejun Heo's avatar
Tejun Heo committed
1615
{
1616 1617 1618 1619 1620 1621
	struct cgroup *cgrp;

	if (kernfs_type(kn) == KERNFS_DIR)
		cgrp = kn->priv;
	else
		cgrp = kn->parent->priv;
Tejun Heo's avatar
Tejun Heo committed
1622

1623
	/*
1624
	 * We're gonna grab cgroup_mutex which nests outside kernfs
1625 1626 1627
	 * active_ref.  cgroup liveliness check alone provides enough
	 * protection against removal.  Ensure @cgrp stays accessible and
	 * break the active_ref protection.
1628
	 */
1629 1630
	if (!cgroup_tryget(cgrp))
		return NULL;
1631 1632
	kernfs_break_active_protection(kn);

1633 1634 1635 1636
	if (drain_offline)
		cgroup_lock_and_drain_offline(cgrp);
	else
		mutex_lock(&cgroup_mutex);
Tejun Heo's avatar
Tejun Heo committed
1637

1638 1639 1640 1641 1642
	if (!cgroup_is_dead(cgrp))
		return cgrp;

	cgroup_kn_unlock(kn);
	return NULL;
1643
}
Tejun Heo's avatar
Tejun Heo committed
1644

1645
static void cgroup_rm_file(struct cgroup *cgrp, const struct cftype *cft)
Tejun Heo's avatar
Tejun Heo committed
1646
{
Tejun Heo's avatar
Tejun Heo committed
1647
	char name[CGROUP_FILE_NAME_MAX];
Tejun Heo's avatar
Tejun Heo committed
1648

1649
	lockdep_assert_held(&cgroup_mutex);
1650 1651 1652 1653 1654 1655 1656 1657

	if (cft->file_offset) {
		struct cgroup_subsys_state *css = cgroup_css(cgrp, cft->ss);
		struct cgroup_file *cfile = (void *)css + cft->file_offset;

		spin_lock_irq(&cgroup_file_kn_lock);
		cfile->kn = NULL;
		spin_unlock_irq(&cgroup_file_kn_lock);
1658 1659

		del_timer_sync(&cfile->notify_timer);
1660 1661
	}

Tejun Heo's avatar
Tejun Heo committed
1662
	kernfs_remove_by_name(cgrp->kn, cgroup_file_name(cgrp, cft, name));
Tejun Heo's avatar
Tejun Heo committed
1663 1664
}

1665
/**
1666
 * css_clear_dir - remove subsys files in a cgroup directory
Zhen Lei's avatar
Zhen Lei committed
1667
 * @css: target css
1668
 */
1669
static void css_clear_dir(struct cgroup_subsys_state *css)
Tejun Heo's avatar
Tejun Heo committed
1670
{
1671
	struct cgroup *cgrp = css->cgroup;
1672
	struct cftype *cfts;
Tejun Heo's avatar
Tejun Heo committed
1673

1674 1675 1676 1677 1678
	if (!(css->flags & CSS_VISIBLE))
		return;

	css->flags &= ~CSS_VISIBLE;

1679 1680 1681 1682 1683 1684
	if (!css->ss) {
		if (cgroup_on_dfl(cgrp))
			cfts = cgroup_base_files;
		else
			cfts = cgroup1_base_files;

1685
		cgroup_addrm_files(css, cgrp, cfts, false);
1686 1687 1688 1689
	} else {
		list_for_each_entry(cfts, &css->ss->cfts, node)
			cgroup_addrm_files(css, cgrp, cfts, false);
	}
1690 1691
}

1692
/**
1693 1694
 * css_populate_dir - create subsys files in a cgroup directory
 * @css: target css
1695 1696 1697
 *
 * On failure, no file is added.
 */
1698
static int css_populate_dir(struct cgroup_subsys_state *css)
1699
{
1700
	struct cgroup *cgrp = css->cgroup;
1701 1702
	struct cftype *cfts, *failed_cfts;
	int ret;
1703

1704
	if ((css->flags & CSS_VISIBLE) || !cgrp->kn)
1705 1706
		return 0;

1707 1708
	if (!css->ss) {
		if (cgroup_on_dfl(cgrp))
1709
			cfts = cgroup_base_files;
1710
		else
1711
			cfts = cgroup1_base_files;
1712

1713 1714 1715 1716 1717 1718 1719 1720 1721 1722
		ret = cgroup_addrm_files(&cgrp->self, cgrp, cfts, true);
		if (ret < 0)
			return ret;
	} else {
		list_for_each_entry(cfts, &css->ss->cfts, node) {
			ret = cgroup_addrm_files(css, cgrp, cfts, true);
			if (ret < 0) {
				failed_cfts = cfts;
				goto err;
			}
1723 1724
		}
	}
1725 1726 1727

	css->flags |= CSS_VISIBLE;

1728 1729
	return 0;
err:
1730 1731 1732 1733 1734
	list_for_each_entry(cfts, &css->ss->cfts, node) {
		if (cfts == failed_cfts)
			break;
		cgroup_addrm_files(css, cgrp, cfts, false);
	}
1735 1736 1737
	return ret;
}

1738
int rebind_subsystems(struct cgroup_root *dst_root, u16 ss_mask)
1739
{
1740
	struct cgroup *dcgrp = &dst_root->cgrp;
1741
	struct cgroup_subsys *ss;
1742
	int ssid, i, ret;
1743
	u16 dfl_disable_ss_mask = 0;
1744

1745
	lockdep_assert_held(&cgroup_mutex);
1746

1747
	do_each_subsys_mask(ss, ssid, ss_mask) {
1748 1749 1750 1751 1752 1753 1754
		/*
		 * If @ss has non-root csses attached to it, can't move.
		 * If @ss is an implicit controller, it is exempt from this
		 * rule and can be stolen.
		 */
		if (css_next_child(NULL, cgroup_css(&ss->root->cgrp, ss)) &&
		    !ss->implicit_on_dfl)
Tejun Heo's avatar
Tejun Heo committed
1755
			return -EBUSY;
1756

1757
		/* can't move between two non-dummy roots either */
1758
		if (ss->root != &cgrp_dfl_root && dst_root != &cgrp_dfl_root)
1759
			return -EBUSY;
1760 1761 1762 1763 1764 1765 1766 1767

		/*
		 * Collect ssid's that need to be disabled from default
		 * hierarchy.
		 */
		if (ss->root == &cgrp_dfl_root)
			dfl_disable_ss_mask |= 1 << ssid;

1768
	} while_each_subsys_mask();
1769

1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781
	if (dfl_disable_ss_mask) {
		struct cgroup *scgrp = &cgrp_dfl_root.cgrp;

		/*
		 * Controllers from default hierarchy that need to be rebound
		 * are all disabled together in one go.
		 */
		cgrp_dfl_root.subsys_mask &= ~dfl_disable_ss_mask;
		WARN_ON(cgroup_apply_control(scgrp));
		cgroup_finalize_control(scgrp, 0);
	}

1782
	do_each_subsys_mask(ss, ssid, ss_mask) {
1783 1784 1785
		struct cgroup_root *src_root = ss->root;
		struct cgroup *scgrp = &src_root->cgrp;
		struct cgroup_subsys_state *css = cgroup_css(scgrp, ss);
1786
		struct css_set *cset;
1787

1788
		WARN_ON(!css || cgroup_css(dcgrp, ss));
1789

1790 1791 1792 1793 1794 1795
		if (src_root != &cgrp_dfl_root) {
			/* disable from the source */
			src_root->subsys_mask &= ~(1 << ssid);
			WARN_ON(cgroup_apply_control(scgrp));
			cgroup_finalize_control(scgrp, 0);
		}
1796

1797
		/* rebind */
1798 1799
		RCU_INIT_POINTER(scgrp->subsys[ssid], NULL);
		rcu_assign_pointer(dcgrp->subsys[ssid], css);
1800
		ss->root = dst_root;
1801
		css->cgroup = dcgrp;
1802

1803
		spin_lock_irq(&css_set_lock);
1804 1805
		hash_for_each(css_set_table, i, cset, hlist)
			list_move_tail(&cset->e_cset_node[ss->id],
1806
				       &dcgrp->e_csets[ss->id]);
1807
		spin_unlock_irq(&css_set_lock);
1808

1809 1810 1811 1812 1813 1814
		if (ss->css_rstat_flush) {
			list_del_rcu(&css->rstat_css_node);
			list_add_rcu(&css->rstat_css_node,
				     &dcgrp->rstat_css_list);
		}

1815
		/* default hierarchy doesn't enable controllers by default */
1816
		dst_root->subsys_mask |= 1 << ssid;
1817 1818 1819
		if (dst_root == &cgrp_dfl_root) {
			static_branch_enable(cgroup_subsys_on_dfl_key[ssid]);
		} else {
1820
			dcgrp->subtree_control |= 1 << ssid;
1821
			static_branch_disable(cgroup_subsys_on_dfl_key[ssid]);
1822
		}
1823

1824 1825 1826 1827 1828
		ret = cgroup_apply_control(dcgrp);
		if (ret)
			pr_warn("partial failure to rebind %s controller (err=%d)\n",
				ss->name, ret);

1829 1830
		if (ss->bind)
			ss->bind(css);
1831
	} while_each_subsys_mask();
1832

1833
	kernfs_activate(dcgrp->kn);
1834 1835 1836
	return 0;
}

1837 1838
int cgroup_show_path(struct seq_file *sf, struct kernfs_node *kf_node,
		     struct kernfs_root *kf_root)
1839
{
Felipe Balbi's avatar
Felipe Balbi committed
1840
	int len = 0;
1841 1842 1843 1844 1845 1846 1847 1848
	char *buf = NULL;
	struct cgroup_root *kf_cgroot = cgroup_root_from_kf(kf_root);
	struct cgroup *ns_cgroup;

	buf = kmalloc(PATH_MAX, GFP_KERNEL);
	if (!buf)
		return -ENOMEM;

1849
	spin_lock_irq(&css_set_lock);
1850 1851
	ns_cgroup = current_cgns_cgroup_from_root(kf_cgroot);
	len = kernfs_path_from_node(kf_node, ns_cgroup->kn, buf, PATH_MAX);
1852
	spin_unlock_irq(&css_set_lock);
1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863

	if (len >= PATH_MAX)
		len = -ERANGE;
	else if (len > 0) {
		seq_escape(sf, buf, " \t\n\\");
		len = 0;
	}
	kfree(buf);
	return len;
}

1864 1865
enum cgroup2_param {
	Opt_nsdelegate,
1866
	Opt_memory_localevents,
1867
	Opt_memory_recursiveprot,
1868 1869
	nr__cgroup2_params
};
1870

1871
static const struct fs_parameter_spec cgroup2_fs_parameters[] = {
1872 1873
	fsparam_flag("nsdelegate",		Opt_nsdelegate),
	fsparam_flag("memory_localevents",	Opt_memory_localevents),
1874
	fsparam_flag("memory_recursiveprot",	Opt_memory_recursiveprot),
1875 1876
	{}
};
1877

1878 1879 1880 1881 1882
static int cgroup2_parse_param(struct fs_context *fc, struct fs_parameter *param)
{
	struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
	struct fs_parse_result result;
	int opt;
1883

1884
	opt = fs_parse(fc, cgroup2_fs_parameters, param, &result);
1885 1886
	if (opt < 0)
		return opt;
1887

1888 1889 1890 1891
	switch (opt) {
	case Opt_nsdelegate:
		ctx->flags |= CGRP_ROOT_NS_DELEGATE;
		return 0;
1892 1893 1894
	case Opt_memory_localevents:
		ctx->flags |= CGRP_ROOT_MEMORY_LOCAL_EVENTS;
		return 0;
1895 1896 1897
	case Opt_memory_recursiveprot:
		ctx->flags |= CGRP_ROOT_MEMORY_RECURSIVE_PROT;
		return 0;
1898 1899
	}
	return -EINVAL;
1900 1901 1902 1903 1904 1905 1906 1907 1908
}

static void apply_cgroup_root_flags(unsigned int root_flags)
{
	if (current->nsproxy->cgroup_ns == &init_cgroup_ns) {
		if (root_flags & CGRP_ROOT_NS_DELEGATE)
			cgrp_dfl_root.flags |= CGRP_ROOT_NS_DELEGATE;
		else
			cgrp_dfl_root.flags &= ~CGRP_ROOT_NS_DELEGATE;
1909 1910 1911 1912 1913

		if (root_flags & CGRP_ROOT_MEMORY_LOCAL_EVENTS)
			cgrp_dfl_root.flags |= CGRP_ROOT_MEMORY_LOCAL_EVENTS;
		else
			cgrp_dfl_root.flags &= ~CGRP_ROOT_MEMORY_LOCAL_EVENTS;
1914 1915 1916 1917 1918

		if (root_flags & CGRP_ROOT_MEMORY_RECURSIVE_PROT)
			cgrp_dfl_root.flags |= CGRP_ROOT_MEMORY_RECURSIVE_PROT;
		else
			cgrp_dfl_root.flags &= ~CGRP_ROOT_MEMORY_RECURSIVE_PROT;
1919 1920 1921 1922 1923 1924 1925
	}
}

static int cgroup_show_options(struct seq_file *seq, struct kernfs_root *kf_root)
{
	if (cgrp_dfl_root.flags & CGRP_ROOT_NS_DELEGATE)
		seq_puts(seq, ",nsdelegate");
1926 1927
	if (cgrp_dfl_root.flags & CGRP_ROOT_MEMORY_LOCAL_EVENTS)
		seq_puts(seq, ",memory_localevents");
1928 1929
	if (cgrp_dfl_root.flags & CGRP_ROOT_MEMORY_RECURSIVE_PROT)
		seq_puts(seq, ",memory_recursiveprot");
1930 1931 1932
	return 0;
}

1933
static int cgroup_reconfigure(struct fs_context *fc)
1934
{
1935
	struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
1936

1937
	apply_cgroup_root_flags(ctx->flags);
1938
	return 0;
1939 1940
}

1941 1942
static void init_cgroup_housekeeping(struct cgroup *cgrp)
{
1943 1944 1945
	struct cgroup_subsys *ss;
	int ssid;

1946 1947
	INIT_LIST_HEAD(&cgrp->self.sibling);
	INIT_LIST_HEAD(&cgrp->self.children);
1948
	INIT_LIST_HEAD(&cgrp->cset_links);
1949 1950
	INIT_LIST_HEAD(&cgrp->pidlists);
	mutex_init(&cgrp->pidlist_mutex);
1951
	cgrp->self.cgroup = cgrp;
1952
	cgrp->self.flags |= CSS_ONLINE;
1953
	cgrp->dom_cgrp = cgrp;
1954 1955
	cgrp->max_descendants = INT_MAX;
	cgrp->max_depth = INT_MAX;
1956
	INIT_LIST_HEAD(&cgrp->rstat_css_list);
1957
	prev_cputime_init(&cgrp->prev_cputime);
1958 1959 1960

	for_each_subsys(ss, ssid)
		INIT_LIST_HEAD(&cgrp->e_csets[ssid]);
1961 1962

	init_waitqueue_head(&cgrp->offline_waitq);
1963
	INIT_WORK(&cgrp->release_agent_work, cgroup1_release_agent);
1964
}
1965

1966
void init_cgroup_root(struct cgroup_fs_context *ctx)
1967
{
1968
	struct cgroup_root *root = ctx->root;
1969
	struct cgroup *cgrp = &root->cgrp;
1970

1971
	INIT_LIST_HEAD(&root->root_list);
1972
	atomic_set(&root->nr_cgrps, 1);
1973
	cgrp->root = root;
1974
	init_cgroup_housekeeping(cgrp);
1975

1976 1977 1978 1979 1980 1981
	root->flags = ctx->flags;
	if (ctx->release_agent)
		strscpy(root->release_agent_path, ctx->release_agent, PATH_MAX);
	if (ctx->name)
		strscpy(root->name, ctx->name, MAX_CGROUP_ROOT_NAMELEN);
	if (ctx->cpuset_clone_children)
1982
		set_bit(CGRP_CPUSET_CLONE_CHILDREN, &root->cgrp.flags);
1983 1984
}

1985
int cgroup_setup_root(struct cgroup_root *root, u16 ss_mask)
1986
{
1987
	LIST_HEAD(tmp_links);
1988
	struct cgroup *root_cgrp = &root->cgrp;
1989
	struct kernfs_syscall_ops *kf_sops;
1990 1991
	struct css_set *cset;
	int i, ret;
1992

1993
	lockdep_assert_held(&cgroup_mutex);
1994

1995
	ret = percpu_ref_init(&root_cgrp->self.refcnt, css_release,
1996
			      0, GFP_KERNEL);
1997 1998 1999
	if (ret)
		goto out;

2000
	/*
2001
	 * We're accessing css_set_count without locking css_set_lock here,
2002
	 * but that's OK - it can only be increased by someone holding
2003 2004 2005
	 * cgroup_lock, and that's us.  Later rebinding may disable
	 * controllers on the default hierarchy and thus create new csets,
	 * which can't be more than the existing ones.  Allocate 2x.
2006
	 */
2007
	ret = allocate_cgrp_cset_links(2 * css_set_count, &tmp_links);
2008
	if (ret)
2009
		goto cancel_ref;
2010

2011
	ret = cgroup_init_root_id(root);
2012
	if (ret)
2013
		goto cancel_ref;
2014

2015 2016 2017 2018
	kf_sops = root == &cgrp_dfl_root ?
		&cgroup_kf_syscall_ops : &cgroup1_kf_syscall_ops;

	root->kf_root = kernfs_create_root(kf_sops,
2019
					   KERNFS_ROOT_CREATE_DEACTIVATED |
Daniel Xu's avatar
Daniel Xu committed
2020 2021
					   KERNFS_ROOT_SUPPORT_EXPORTOP |
					   KERNFS_ROOT_SUPPORT_USER_XATTR,
Tejun Heo's avatar
Tejun Heo committed
2022 2023 2024 2025 2026 2027
					   root_cgrp);
	if (IS_ERR(root->kf_root)) {
		ret = PTR_ERR(root->kf_root);
		goto exit_root_id;
	}
	root_cgrp->kn = root->kf_root->kn;
2028
	WARN_ON_ONCE(cgroup_ino(root_cgrp) != 1);
2029
	root_cgrp->ancestor_ids[0] = cgroup_id(root_cgrp);
2030

2031
	ret = css_populate_dir(&root_cgrp->self);
2032
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
2033
		goto destroy_root;
2034

2035
	ret = cgroup_rstat_init(root_cgrp);
2036
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
2037
		goto destroy_root;
2038

2039 2040 2041 2042
	ret = rebind_subsystems(root, ss_mask);
	if (ret)
		goto exit_stats;

2043 2044 2045
	ret = cgroup_bpf_inherit(root_cgrp);
	WARN_ON_ONCE(ret);

2046 2047
	trace_cgroup_setup_root(root);

2048 2049 2050 2051 2052 2053 2054
	/*
	 * There must be no failure case after here, since rebinding takes
	 * care of subsystems' refcounts, which are explicitly dropped in
	 * the failure exit path.
	 */
	list_add(&root->root_list, &cgroup_roots);
	cgroup_root_count++;
Al Viro's avatar
Al Viro committed
2055

2056
	/*
2057
	 * Link the root cgroup in this hierarchy into all the css_set
2058 2059
	 * objects.
	 */
2060
	spin_lock_irq(&css_set_lock);
2061
	hash_for_each(css_set_table, i, cset, hlist) {
2062
		link_css_set(&tmp_links, cset, root_cgrp);
2063 2064 2065
		if (css_set_populated(cset))
			cgroup_update_populated(root_cgrp, true);
	}
2066
	spin_unlock_irq(&css_set_lock);
2067

2068
	BUG_ON(!list_empty(&root_cgrp->self.children));
2069
	BUG_ON(atomic_read(&root->nr_cgrps) != 1);
2070

2071
	ret = 0;
Tejun Heo's avatar
Tejun Heo committed
2072
	goto out;
2073

2074 2075
exit_stats:
	cgroup_rstat_exit(root_cgrp);
Tejun Heo's avatar
Tejun Heo committed
2076 2077 2078 2079
destroy_root:
	kernfs_destroy_root(root->kf_root);
	root->kf_root = NULL;
exit_root_id:
2080
	cgroup_exit_root_id(root);
2081
cancel_ref:
2082
	percpu_ref_exit(&root_cgrp->self.refcnt);
Tejun Heo's avatar
Tejun Heo committed
2083
out:
2084 2085
	free_cgrp_cset_links(&tmp_links);
	return ret;
2086 2087
}

2088
int cgroup_do_get_tree(struct fs_context *fc)
2089
{
2090
	struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
2091
	int ret;
2092

2093
	ctx->kfc.root = ctx->root->kf_root;
2094
	if (fc->fs_type == &cgroup2_fs_type)
2095
		ctx->kfc.magic = CGROUP2_SUPER_MAGIC;
2096
	else
2097 2098
		ctx->kfc.magic = CGROUP_SUPER_MAGIC;
	ret = kernfs_get_tree(fc);
2099

2100
	/*
2101 2102
	 * In non-init cgroup namespace, instead of root cgroup's dentry,
	 * we return the dentry corresponding to the cgroupns->root_cgrp.
2103
	 */
2104
	if (!ret && ctx->ns != &init_cgroup_ns) {
2105
		struct dentry *nsdentry;
2106
		struct super_block *sb = fc->root->d_sb;
2107
		struct cgroup *cgrp;
2108

2109 2110 2111
		mutex_lock(&cgroup_mutex);
		spin_lock_irq(&css_set_lock);

2112
		cgrp = cset_cgroup_from_root(ctx->ns->root_cset, ctx->root);
2113 2114 2115 2116

		spin_unlock_irq(&css_set_lock);
		mutex_unlock(&cgroup_mutex);

2117
		nsdentry = kernfs_node_dentry(cgrp->kn, sb);
2118 2119
		dput(fc->root);
		if (IS_ERR(nsdentry)) {
2120
			deactivate_locked_super(sb);
2121 2122
			ret = PTR_ERR(nsdentry);
			nsdentry = NULL;
2123
		}
2124
		fc->root = nsdentry;
2125 2126
	}

2127
	if (!ctx->kfc.new_sb_created)
2128
		cgroup_put(&ctx->root->cgrp);
2129

2130
	return ret;
2131 2132
}

2133 2134 2135 2136
/*
 * Destroy a cgroup filesystem context.
 */
static void cgroup_fs_context_free(struct fs_context *fc)
2137
{
2138 2139
	struct cgroup_fs_context *ctx = cgroup_fc2context(fc);

2140 2141
	kfree(ctx->name);
	kfree(ctx->release_agent);
2142
	put_cgroup_ns(ctx->ns);
2143
	kernfs_free_fs_context(fc);
2144 2145 2146 2147
	kfree(ctx);
}

static int cgroup_get_tree(struct fs_context *fc)
2148
{
2149
	struct cgroup_fs_context *ctx = cgroup_fc2context(fc);
2150
	int ret;
2151

2152 2153
	cgrp_dfl_visible = true;
	cgroup_get_live(&cgrp_dfl_root.cgrp);
2154
	ctx->root = &cgrp_dfl_root;
2155

2156
	ret = cgroup_do_get_tree(fc);
2157 2158 2159
	if (!ret)
		apply_cgroup_root_flags(ctx->flags);
	return ret;
2160 2161 2162 2163
}

static const struct fs_context_operations cgroup_fs_context_ops = {
	.free		= cgroup_fs_context_free,
2164
	.parse_param	= cgroup2_parse_param,
2165 2166 2167 2168 2169 2170
	.get_tree	= cgroup_get_tree,
	.reconfigure	= cgroup_reconfigure,
};

static const struct fs_context_operations cgroup1_fs_context_ops = {
	.free		= cgroup_fs_context_free,
2171
	.parse_param	= cgroup1_parse_param,
2172 2173 2174 2175 2176
	.get_tree	= cgroup1_get_tree,
	.reconfigure	= cgroup1_reconfigure,
};

/*
2177 2178
 * Initialise the cgroup filesystem creation/reconfiguration context.  Notably,
 * we select the namespace we're going to use.
2179 2180 2181 2182 2183 2184 2185 2186
 */
static int cgroup_init_fs_context(struct fs_context *fc)
{
	struct cgroup_fs_context *ctx;

	ctx = kzalloc(sizeof(struct cgroup_fs_context), GFP_KERNEL);
	if (!ctx)
		return -ENOMEM;
2187

2188 2189
	ctx->ns = current->nsproxy->cgroup_ns;
	get_cgroup_ns(ctx->ns);
2190
	fc->fs_private = &ctx->kfc;
2191 2192 2193 2194
	if (fc->fs_type == &cgroup2_fs_type)
		fc->ops = &cgroup_fs_context_ops;
	else
		fc->ops = &cgroup1_fs_context_ops;
2195
	put_user_ns(fc->user_ns);
2196 2197
	fc->user_ns = get_user_ns(ctx->ns->user_ns);
	fc->global = true;
2198
	return 0;
Tejun Heo's avatar
Tejun Heo committed
2199
}
2200

Tejun Heo's avatar
Tejun Heo committed
2201 2202 2203
static void cgroup_kill_sb(struct super_block *sb)
{
	struct kernfs_root *kf_root = kernfs_root_from_sb(sb);
2204
	struct cgroup_root *root = cgroup_root_from_kf(kf_root);
2205

2206
	/*
2207
	 * If @root doesn't have any children, start killing it.
2208
	 * This prevents new mounts by disabling percpu_ref_tryget_live().
2209 2210
	 *
	 * And don't kill the default root.
2211
	 */
2212
	if (list_empty(&root->cgrp.self.children) && root != &cgrp_dfl_root &&
2213 2214
	    !percpu_ref_is_dying(&root->cgrp.self.refcnt)) {
		cgroup_bpf_offline(&root->cgrp);
2215
		percpu_ref_kill(&root->cgrp.self.refcnt);
2216
	}
2217
	cgroup_put(&root->cgrp);
Tejun Heo's avatar
Tejun Heo committed
2218
	kernfs_kill_sb(sb);
2219
}
2220

2221
struct file_system_type cgroup_fs_type = {
2222 2223
	.name			= "cgroup",
	.init_fs_context	= cgroup_init_fs_context,
2224
	.parameters		= cgroup1_fs_parameters,
2225 2226
	.kill_sb		= cgroup_kill_sb,
	.fs_flags		= FS_USERNS_MOUNT,
2227
};
2228

2229
static struct file_system_type cgroup2_fs_type = {
2230 2231
	.name			= "cgroup2",
	.init_fs_context	= cgroup_init_fs_context,
2232
	.parameters		= cgroup2_fs_parameters,
2233 2234
	.kill_sb		= cgroup_kill_sb,
	.fs_flags		= FS_USERNS_MOUNT,
2235
};
2236

2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280
#ifdef CONFIG_CPUSETS
static const struct fs_context_operations cpuset_fs_context_ops = {
	.get_tree	= cgroup1_get_tree,
	.free		= cgroup_fs_context_free,
};

/*
 * This is ugly, but preserves the userspace API for existing cpuset
 * users. If someone tries to mount the "cpuset" filesystem, we
 * silently switch it to mount "cgroup" instead
 */
static int cpuset_init_fs_context(struct fs_context *fc)
{
	char *agent = kstrdup("/sbin/cpuset_release_agent", GFP_USER);
	struct cgroup_fs_context *ctx;
	int err;

	err = cgroup_init_fs_context(fc);
	if (err) {
		kfree(agent);
		return err;
	}

	fc->ops = &cpuset_fs_context_ops;

	ctx = cgroup_fc2context(fc);
	ctx->subsys_mask = 1 << cpuset_cgrp_id;
	ctx->flags |= CGRP_ROOT_NOPREFIX;
	ctx->release_agent = agent;

	get_filesystem(&cgroup_fs_type);
	put_filesystem(fc->fs_type);
	fc->fs_type = &cgroup_fs_type;

	return 0;
}

static struct file_system_type cpuset_fs_type = {
	.name			= "cpuset",
	.init_fs_context	= cpuset_init_fs_context,
	.fs_flags		= FS_USERNS_MOUNT,
};
#endif

2281 2282
int cgroup_path_ns_locked(struct cgroup *cgrp, char *buf, size_t buflen,
			  struct cgroup_namespace *ns)
2283 2284 2285
{
	struct cgroup *root = cset_cgroup_from_root(ns->root_cset, cgrp->root);

2286
	return kernfs_path_from_node(cgrp->kn, root->kn, buf, buflen);
2287 2288
}

2289 2290
int cgroup_path_ns(struct cgroup *cgrp, char *buf, size_t buflen,
		   struct cgroup_namespace *ns)
2291
{
2292
	int ret;
2293 2294

	mutex_lock(&cgroup_mutex);
2295
	spin_lock_irq(&css_set_lock);
2296 2297 2298

	ret = cgroup_path_ns_locked(cgrp, buf, buflen, ns);

2299
	spin_unlock_irq(&css_set_lock);
2300 2301 2302 2303 2304 2305
	mutex_unlock(&cgroup_mutex);

	return ret;
}
EXPORT_SYMBOL_GPL(cgroup_path_ns);

2306
/**
2307
 * task_cgroup_path - cgroup path of a task in the first cgroup hierarchy
2308 2309 2310 2311
 * @task: target task
 * @buf: the buffer to write the path into
 * @buflen: the length of the buffer
 *
2312 2313 2314 2315 2316
 * Determine @task's cgroup on the first (the one with the lowest non-zero
 * hierarchy_id) cgroup hierarchy and copy its path into @buf.  This
 * function grabs cgroup_mutex and shouldn't be used inside locks used by
 * cgroup controller callbacks.
 *
Tejun Heo's avatar
Tejun Heo committed
2317
 * Return value is the same as kernfs_path().
2318
 */
2319
int task_cgroup_path(struct task_struct *task, char *buf, size_t buflen)
2320
{
2321
	struct cgroup_root *root;
2322
	struct cgroup *cgrp;
Tejun Heo's avatar
Tejun Heo committed
2323
	int hierarchy_id = 1;
2324
	int ret;
2325 2326

	mutex_lock(&cgroup_mutex);
2327
	spin_lock_irq(&css_set_lock);
2328

2329 2330
	root = idr_get_next(&cgroup_hierarchy_idr, &hierarchy_id);

2331 2332
	if (root) {
		cgrp = task_cgroup_from_root(task, root);
2333
		ret = cgroup_path_ns_locked(cgrp, buf, buflen, &init_cgroup_ns);
2334 2335
	} else {
		/* if no hierarchy exists, everyone is in "/" */
2336
		ret = strlcpy(buf, "/", buflen);
2337 2338
	}

2339
	spin_unlock_irq(&css_set_lock);
2340
	mutex_unlock(&cgroup_mutex);
2341
	return ret;
2342
}
2343
EXPORT_SYMBOL_GPL(task_cgroup_path);
2344

2345
/**
2346
 * cgroup_migrate_add_task - add a migration target task to a migration context
2347
 * @task: target task
2348
 * @mgctx: target migration context
2349
 *
2350 2351 2352 2353
 * Add @task, which is a migration target, to @mgctx->tset.  This function
 * becomes noop if @task doesn't need to be migrated.  @task's css_set
 * should have been added as a migration source and @task->cg_list will be
 * moved from the css_set's tasks list to mg_tasks one.
2354
 */
2355 2356
static void cgroup_migrate_add_task(struct task_struct *task,
				    struct cgroup_mgctx *mgctx)
2357 2358 2359
{
	struct css_set *cset;

2360
	lockdep_assert_held(&css_set_lock);
2361 2362 2363 2364 2365

	/* @task either already exited or can't exit until the end */
	if (task->flags & PF_EXITING)
		return;

2366 2367
	/* cgroup_threadgroup_rwsem protects racing against forks */
	WARN_ON_ONCE(list_empty(&task->cg_list));
2368 2369 2370 2371 2372

	cset = task_css_set(task);
	if (!cset->mg_src_cgrp)
		return;

2373 2374
	mgctx->tset.nr_tasks++;

2375 2376
	list_move_tail(&task->cg_list, &cset->mg_tasks);
	if (list_empty(&cset->mg_node))
2377 2378
		list_add_tail(&cset->mg_node,
			      &mgctx->tset.src_csets);
2379
	if (list_empty(&cset->mg_dst_cset->mg_node))
2380
		list_add_tail(&cset->mg_dst_cset->mg_node,
2381
			      &mgctx->tset.dst_csets);
2382 2383
}

2384 2385 2386
/**
 * cgroup_taskset_first - reset taskset and return the first task
 * @tset: taskset of interest
2387
 * @dst_cssp: output variable for the destination css
2388 2389 2390
 *
 * @tset iteration is initialized and the first task is returned.
 */
2391 2392
struct task_struct *cgroup_taskset_first(struct cgroup_taskset *tset,
					 struct cgroup_subsys_state **dst_cssp)
2393
{
2394 2395 2396
	tset->cur_cset = list_first_entry(tset->csets, struct css_set, mg_node);
	tset->cur_task = NULL;

2397
	return cgroup_taskset_next(tset, dst_cssp);
2398 2399 2400 2401 2402
}

/**
 * cgroup_taskset_next - iterate to the next task in taskset
 * @tset: taskset of interest
2403
 * @dst_cssp: output variable for the destination css
2404 2405 2406 2407
 *
 * Return the next task in @tset.  Iteration must have been initialized
 * with cgroup_taskset_first().
 */
2408 2409
struct task_struct *cgroup_taskset_next(struct cgroup_taskset *tset,
					struct cgroup_subsys_state **dst_cssp)
2410
{
2411 2412
	struct css_set *cset = tset->cur_cset;
	struct task_struct *task = tset->cur_task;
2413

2414
	while (CGROUP_HAS_SUBSYS_CONFIG && &cset->mg_node != tset->csets) {
2415 2416 2417 2418 2419
		if (!task)
			task = list_first_entry(&cset->mg_tasks,
						struct task_struct, cg_list);
		else
			task = list_next_entry(task, cg_list);
2420

2421 2422 2423
		if (&task->cg_list != &cset->mg_tasks) {
			tset->cur_cset = cset;
			tset->cur_task = task;
2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435

			/*
			 * This function may be called both before and
			 * after cgroup_taskset_migrate().  The two cases
			 * can be distinguished by looking at whether @cset
			 * has its ->mg_dst_cset set.
			 */
			if (cset->mg_dst_cset)
				*dst_cssp = cset->mg_dst_cset->subsys[tset->ssid];
			else
				*dst_cssp = cset->subsys[tset->ssid];

2436 2437
			return task;
		}
2438

2439 2440 2441
		cset = list_next_entry(cset, mg_node);
		task = NULL;
	}
2442

2443
	return NULL;
2444 2445
}

2446
/**
Yang Li's avatar
Yang Li committed
2447
 * cgroup_migrate_execute - migrate a taskset
2448
 * @mgctx: migration context
2449
 *
2450
 * Migrate tasks in @mgctx as setup by migration preparation functions.
2451
 * This function fails iff one of the ->can_attach callbacks fails and
2452 2453
 * guarantees that either all or none of the tasks in @mgctx are migrated.
 * @mgctx is consumed regardless of success.
2454
 */
2455
static int cgroup_migrate_execute(struct cgroup_mgctx *mgctx)
2456
{
2457
	struct cgroup_taskset *tset = &mgctx->tset;
2458
	struct cgroup_subsys *ss;
2459 2460
	struct task_struct *task, *tmp_task;
	struct css_set *cset, *tmp_cset;
2461
	int ssid, failed_ssid, ret;
2462 2463

	/* check that we can legitimately attach to the cgroup */
2464 2465 2466 2467 2468 2469 2470 2471 2472
	if (tset->nr_tasks) {
		do_each_subsys_mask(ss, ssid, mgctx->ss_mask) {
			if (ss->can_attach) {
				tset->ssid = ssid;
				ret = ss->can_attach(tset);
				if (ret) {
					failed_ssid = ssid;
					goto out_cancel_attach;
				}
2473
			}
2474 2475
		} while_each_subsys_mask();
	}
2476 2477 2478 2479 2480 2481

	/*
	 * Now that we're guaranteed success, proceed to move all tasks to
	 * the new cgroup.  There are no failure cases after here, so this
	 * is the commit point.
	 */
2482
	spin_lock_irq(&css_set_lock);
2483
	list_for_each_entry(cset, &tset->src_csets, mg_node) {
2484 2485 2486 2487 2488
		list_for_each_entry_safe(task, tmp_task, &cset->mg_tasks, cg_list) {
			struct css_set *from_cset = task_css_set(task);
			struct css_set *to_cset = cset->mg_dst_cset;

			get_css_set(to_cset);
2489
			to_cset->nr_tasks++;
2490
			css_set_move_task(task, from_cset, to_cset, true);
2491
			from_cset->nr_tasks--;
Roman Gushchin's avatar
Roman Gushchin committed
2492 2493 2494 2495 2496 2497 2498 2499
			/*
			 * If the source or destination cgroup is frozen,
			 * the task might require to change its state.
			 */
			cgroup_freezer_migrate_task(task, from_cset->dfl_cgrp,
						    to_cset->dfl_cgrp);
			put_css_set_locked(from_cset);

2500
		}
2501
	}
2502
	spin_unlock_irq(&css_set_lock);
2503 2504 2505 2506 2507 2508 2509 2510

	/*
	 * Migration is committed, all target tasks are now on dst_csets.
	 * Nothing is sensitive to fork() after this point.  Notify
	 * controllers that migration is complete.
	 */
	tset->csets = &tset->dst_csets;

2511 2512 2513 2514 2515 2516 2517 2518
	if (tset->nr_tasks) {
		do_each_subsys_mask(ss, ssid, mgctx->ss_mask) {
			if (ss->attach) {
				tset->ssid = ssid;
				ss->attach(tset);
			}
		} while_each_subsys_mask();
	}
2519 2520 2521 2522 2523

	ret = 0;
	goto out_release_tset;

out_cancel_attach:
2524 2525 2526 2527 2528 2529 2530 2531 2532 2533
	if (tset->nr_tasks) {
		do_each_subsys_mask(ss, ssid, mgctx->ss_mask) {
			if (ssid == failed_ssid)
				break;
			if (ss->cancel_attach) {
				tset->ssid = ssid;
				ss->cancel_attach(tset);
			}
		} while_each_subsys_mask();
	}
2534
out_release_tset:
2535
	spin_lock_irq(&css_set_lock);
2536 2537 2538 2539 2540
	list_splice_init(&tset->dst_csets, &tset->src_csets);
	list_for_each_entry_safe(cset, tmp_cset, &tset->src_csets, mg_node) {
		list_splice_tail_init(&cset->mg_tasks, &cset->tasks);
		list_del_init(&cset->mg_node);
	}
2541
	spin_unlock_irq(&css_set_lock);
2542 2543 2544 2545 2546 2547 2548 2549

	/*
	 * Re-initialize the cgroup_taskset structure in case it is reused
	 * again in another cgroup_migrate_add_task()/cgroup_migrate_execute()
	 * iteration.
	 */
	tset->nr_tasks = 0;
	tset->csets    = &tset->src_csets;
2550 2551 2552
	return ret;
}

2553
/**
2554
 * cgroup_migrate_vet_dst - verify whether a cgroup can be migration destination
2555 2556
 * @dst_cgrp: destination cgroup to test
 *
2557 2558 2559 2560
 * On the default hierarchy, except for the mixable, (possible) thread root
 * and threaded cgroups, subtree_control must be zero for migration
 * destination cgroups with tasks so that child cgroups don't compete
 * against tasks.
2561
 */
2562
int cgroup_migrate_vet_dst(struct cgroup *dst_cgrp)
2563
{
2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587
	/* v1 doesn't have any restriction */
	if (!cgroup_on_dfl(dst_cgrp))
		return 0;

	/* verify @dst_cgrp can host resources */
	if (!cgroup_is_valid_domain(dst_cgrp->dom_cgrp))
		return -EOPNOTSUPP;

	/* mixables don't care */
	if (cgroup_is_mixable(dst_cgrp))
		return 0;

	/*
	 * If @dst_cgrp is already or can become a thread root or is
	 * threaded, it doesn't matter.
	 */
	if (cgroup_can_be_thread_root(dst_cgrp) || cgroup_is_threaded(dst_cgrp))
		return 0;

	/* apply no-internal-process constraint */
	if (dst_cgrp->subtree_control)
		return -EBUSY;

	return 0;
2588 2589
}

Li Zefan's avatar
Li Zefan committed
2590
/**
2591
 * cgroup_migrate_finish - cleanup after attach
2592
 * @mgctx: migration context
Ben Blum's avatar
Ben Blum committed
2593
 *
2594 2595
 * Undo cgroup_migrate_add_src() and cgroup_migrate_prepare_dst().  See
 * those functions for details.
Ben Blum's avatar
Ben Blum committed
2596
 */
2597
void cgroup_migrate_finish(struct cgroup_mgctx *mgctx)
Ben Blum's avatar
Ben Blum committed
2598
{
2599
	LIST_HEAD(preloaded);
2600
	struct css_set *cset, *tmp_cset;
Ben Blum's avatar
Ben Blum committed
2601

2602 2603
	lockdep_assert_held(&cgroup_mutex);

2604
	spin_lock_irq(&css_set_lock);
2605 2606 2607 2608 2609

	list_splice_tail_init(&mgctx->preloaded_src_csets, &preloaded);
	list_splice_tail_init(&mgctx->preloaded_dst_csets, &preloaded);

	list_for_each_entry_safe(cset, tmp_cset, &preloaded, mg_preload_node) {
2610
		cset->mg_src_cgrp = NULL;
2611
		cset->mg_dst_cgrp = NULL;
2612 2613
		cset->mg_dst_cset = NULL;
		list_del_init(&cset->mg_preload_node);
2614
		put_css_set_locked(cset);
2615
	}
2616

2617
	spin_unlock_irq(&css_set_lock);
2618 2619 2620 2621 2622 2623
}

/**
 * cgroup_migrate_add_src - add a migration source css_set
 * @src_cset: the source css_set to add
 * @dst_cgrp: the destination cgroup
2624
 * @mgctx: migration context
2625 2626
 *
 * Tasks belonging to @src_cset are about to be migrated to @dst_cgrp.  Pin
2627
 * @src_cset and add it to @mgctx->src_csets, which should later be cleaned
2628 2629
 * up by cgroup_migrate_finish().
 *
2630 2631 2632 2633 2634
 * This function may be called without holding cgroup_threadgroup_rwsem
 * even if the target is a process.  Threads may be created and destroyed
 * but as long as cgroup_mutex is not dropped, no new css_set can be put
 * into play and the preloaded css_sets are guaranteed to cover all
 * migrations.
2635
 */
2636 2637
void cgroup_migrate_add_src(struct css_set *src_cset,
			    struct cgroup *dst_cgrp,
2638
			    struct cgroup_mgctx *mgctx)
2639 2640 2641 2642
{
	struct cgroup *src_cgrp;

	lockdep_assert_held(&cgroup_mutex);
2643
	lockdep_assert_held(&css_set_lock);
2644

2645 2646 2647 2648 2649 2650 2651 2652
	/*
	 * If ->dead, @src_set is associated with one or more dead cgroups
	 * and doesn't contain any migratable tasks.  Ignore it early so
	 * that the rest of migration path doesn't get confused by it.
	 */
	if (src_cset->dead)
		return;

2653 2654 2655 2656 2657 2658
	src_cgrp = cset_cgroup_from_root(src_cset, dst_cgrp->root);

	if (!list_empty(&src_cset->mg_preload_node))
		return;

	WARN_ON(src_cset->mg_src_cgrp);
2659
	WARN_ON(src_cset->mg_dst_cgrp);
2660 2661 2662 2663
	WARN_ON(!list_empty(&src_cset->mg_tasks));
	WARN_ON(!list_empty(&src_cset->mg_node));

	src_cset->mg_src_cgrp = src_cgrp;
2664
	src_cset->mg_dst_cgrp = dst_cgrp;
2665
	get_css_set(src_cset);
2666
	list_add_tail(&src_cset->mg_preload_node, &mgctx->preloaded_src_csets);
2667 2668 2669 2670
}

/**
 * cgroup_migrate_prepare_dst - prepare destination css_sets for migration
2671
 * @mgctx: migration context
2672
 *
2673
 * Tasks are about to be moved and all the source css_sets have been
2674 2675 2676
 * preloaded to @mgctx->preloaded_src_csets.  This function looks up and
 * pins all destination css_sets, links each to its source, and append them
 * to @mgctx->preloaded_dst_csets.
2677 2678 2679 2680
 *
 * This function must be called after cgroup_migrate_add_src() has been
 * called on each migration source css_set.  After migration is performed
 * using cgroup_migrate(), cgroup_migrate_finish() must be called on
2681
 * @mgctx.
2682
 */
2683
int cgroup_migrate_prepare_dst(struct cgroup_mgctx *mgctx)
2684
{
2685
	struct css_set *src_cset, *tmp_cset;
2686 2687 2688 2689

	lockdep_assert_held(&cgroup_mutex);

	/* look up the dst cset for each src cset and link it to src */
2690 2691
	list_for_each_entry_safe(src_cset, tmp_cset, &mgctx->preloaded_src_csets,
				 mg_preload_node) {
2692
		struct css_set *dst_cset;
2693 2694
		struct cgroup_subsys *ss;
		int ssid;
2695

2696
		dst_cset = find_css_set(src_cset, src_cset->mg_dst_cgrp);
2697
		if (!dst_cset)
2698
			return -ENOMEM;
2699 2700

		WARN_ON_ONCE(src_cset->mg_dst_cset || dst_cset->mg_dst_cset);
2701 2702 2703 2704 2705 2706 2707 2708

		/*
		 * If src cset equals dst, it's noop.  Drop the src.
		 * cgroup_migrate() will skip the cset too.  Note that we
		 * can't handle src == dst as some nodes are used by both.
		 */
		if (src_cset == dst_cset) {
			src_cset->mg_src_cgrp = NULL;
2709
			src_cset->mg_dst_cgrp = NULL;
2710
			list_del_init(&src_cset->mg_preload_node);
2711 2712
			put_css_set(src_cset);
			put_css_set(dst_cset);
2713 2714 2715
			continue;
		}

2716 2717 2718
		src_cset->mg_dst_cset = dst_cset;

		if (list_empty(&dst_cset->mg_preload_node))
2719 2720
			list_add_tail(&dst_cset->mg_preload_node,
				      &mgctx->preloaded_dst_csets);
2721
		else
2722
			put_css_set(dst_cset);
2723 2724 2725 2726

		for_each_subsys(ss, ssid)
			if (src_cset->subsys[ssid] != dst_cset->subsys[ssid])
				mgctx->ss_mask |= 1 << ssid;
2727 2728 2729 2730 2731 2732 2733 2734 2735
	}

	return 0;
}

/**
 * cgroup_migrate - migrate a process or task to a cgroup
 * @leader: the leader of the process or the task to migrate
 * @threadgroup: whether @leader points to the whole process or a single task
2736
 * @mgctx: migration context
2737
 *
2738 2739 2740
 * Migrate a process or task denoted by @leader.  If migrating a process,
 * the caller must be holding cgroup_threadgroup_rwsem.  The caller is also
 * responsible for invoking cgroup_migrate_add_src() and
2741 2742 2743 2744 2745 2746 2747 2748 2749
 * cgroup_migrate_prepare_dst() on the targets before invoking this
 * function and following up with cgroup_migrate_finish().
 *
 * As long as a controller's ->can_attach() doesn't fail, this function is
 * guaranteed to succeed.  This means that, excluding ->can_attach()
 * failure, when migrating multiple targets, the success or failure can be
 * decided for all targets by invoking group_migrate_prepare_dst() before
 * actually starting migrating.
 */
2750
int cgroup_migrate(struct task_struct *leader, bool threadgroup,
2751
		   struct cgroup_mgctx *mgctx)
Ben Blum's avatar
Ben Blum committed
2752
{
2753
	struct task_struct *task;
Ben Blum's avatar
Ben Blum committed
2754

2755 2756 2757 2758 2759
	/*
	 * Prevent freeing of tasks while we take a snapshot. Tasks that are
	 * already PF_EXITING could be freed from underneath us unless we
	 * take an rcu_read_lock.
	 */
2760
	spin_lock_irq(&css_set_lock);
2761
	rcu_read_lock();
2762
	task = leader;
Ben Blum's avatar
Ben Blum committed
2763
	do {
2764
		cgroup_migrate_add_task(task, mgctx);
2765 2766
		if (!threadgroup)
			break;
2767
	} while_each_thread(leader, task);
2768
	rcu_read_unlock();
2769
	spin_unlock_irq(&css_set_lock);
Ben Blum's avatar
Ben Blum committed
2770

2771
	return cgroup_migrate_execute(mgctx);
Ben Blum's avatar
Ben Blum committed
2772 2773
}

2774 2775 2776 2777 2778 2779
/**
 * cgroup_attach_task - attach a task or a whole threadgroup to a cgroup
 * @dst_cgrp: the cgroup to attach to
 * @leader: the task or the leader of the threadgroup to be attached
 * @threadgroup: attach the whole threadgroup?
 *
2780
 * Call holding cgroup_mutex and cgroup_threadgroup_rwsem.
2781
 */
2782 2783
int cgroup_attach_task(struct cgroup *dst_cgrp, struct task_struct *leader,
		       bool threadgroup)
2784
{
2785
	DEFINE_CGROUP_MGCTX(mgctx);
2786
	struct task_struct *task;
2787
	int ret = 0;
2788

2789
	/* look up all src csets */
2790
	spin_lock_irq(&css_set_lock);
2791 2792 2793
	rcu_read_lock();
	task = leader;
	do {
2794
		cgroup_migrate_add_src(task_css_set(task), dst_cgrp, &mgctx);
2795 2796 2797 2798
		if (!threadgroup)
			break;
	} while_each_thread(leader, task);
	rcu_read_unlock();
2799
	spin_unlock_irq(&css_set_lock);
2800 2801

	/* prepare dst csets and commit */
2802
	ret = cgroup_migrate_prepare_dst(&mgctx);
2803
	if (!ret)
2804
		ret = cgroup_migrate(leader, threadgroup, &mgctx);
2805

2806
	cgroup_migrate_finish(&mgctx);
2807 2808

	if (!ret)
2809
		TRACE_CGROUP_PATH(attach_task, dst_cgrp, leader, threadgroup);
2810

2811
	return ret;
Ben Blum's avatar
Ben Blum committed
2812 2813
}

2814 2815
struct task_struct *cgroup_procs_write_start(char *buf, bool threadgroup,
					     bool *locked)
2816
	__acquires(&cgroup_threadgroup_rwsem)
2817 2818
{
	struct task_struct *tsk;
2819
	pid_t pid;
2820

2821
	if (kstrtoint(strstrip(buf), 0, &pid) || pid < 0)
2822
		return ERR_PTR(-EINVAL);
Ben Blum's avatar
Ben Blum committed
2823

2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838
	/*
	 * If we migrate a single thread, we don't care about threadgroup
	 * stability. If the thread is `current`, it won't exit(2) under our
	 * hands or change PID through exec(2). We exclude
	 * cgroup_update_dfl_csses and other cgroup_{proc,thread}s_write
	 * callers by cgroup_mutex.
	 * Therefore, we can skip the global lock.
	 */
	lockdep_assert_held(&cgroup_mutex);
	if (pid || threadgroup) {
		percpu_down_write(&cgroup_threadgroup_rwsem);
		*locked = true;
	} else {
		*locked = false;
	}
2839

2840
	rcu_read_lock();
2841
	if (pid) {
2842
		tsk = find_task_by_vpid(pid);
Ben Blum's avatar
Ben Blum committed
2843
		if (!tsk) {
2844 2845
			tsk = ERR_PTR(-ESRCH);
			goto out_unlock_threadgroup;
2846
		}
2847
	} else {
2848
		tsk = current;
2849
	}
2850 2851

	if (threadgroup)
2852
		tsk = tsk->group_leader;
2853 2854

	/*
2855 2856 2857 2858
	 * kthreads may acquire PF_NO_SETAFFINITY during initialization.
	 * If userland migrates such a kthread to a non-root cgroup, it can
	 * become trapped in a cpuset, or RT kthread may be born in a
	 * cgroup with no rt_runtime allocated.  Just say no.
2859
	 */
2860
	if (tsk->no_cgroup_migration || (tsk->flags & PF_NO_SETAFFINITY)) {
2861 2862
		tsk = ERR_PTR(-EINVAL);
		goto out_unlock_threadgroup;
2863 2864
	}

2865
	get_task_struct(tsk);
2866 2867 2868
	goto out_unlock_rcu;

out_unlock_threadgroup:
2869 2870 2871 2872
	if (*locked) {
		percpu_up_write(&cgroup_threadgroup_rwsem);
		*locked = false;
	}
2873
out_unlock_rcu:
2874
	rcu_read_unlock();
2875 2876
	return tsk;
}
2877

2878
void cgroup_procs_write_finish(struct task_struct *task, bool locked)
2879 2880 2881 2882
	__releases(&cgroup_threadgroup_rwsem)
{
	struct cgroup_subsys *ss;
	int ssid;
2883

2884 2885
	/* release reference from cgroup_procs_write_start() */
	put_task_struct(task);
2886

2887 2888
	if (locked)
		percpu_up_write(&cgroup_threadgroup_rwsem);
2889 2890 2891
	for_each_subsys(ss, ssid)
		if (ss->post_attach)
			ss->post_attach();
2892 2893
}

2894
static void cgroup_print_ss_mask(struct seq_file *seq, u16 ss_mask)
2895
{
2896 2897 2898
	struct cgroup_subsys *ss;
	bool printed = false;
	int ssid;
2899

2900
	do_each_subsys_mask(ss, ssid, ss_mask) {
2901 2902
		if (printed)
			seq_putc(seq, ' ');
2903
		seq_puts(seq, ss->name);
2904
		printed = true;
2905
	} while_each_subsys_mask();
2906 2907
	if (printed)
		seq_putc(seq, '\n');
2908 2909
}

2910 2911
/* show controllers which are enabled from the parent */
static int cgroup_controllers_show(struct seq_file *seq, void *v)
2912
{
2913 2914
	struct cgroup *cgrp = seq_css(seq)->cgroup;

2915
	cgroup_print_ss_mask(seq, cgroup_control(cgrp));
2916
	return 0;
2917 2918
}

2919 2920
/* show controllers which are enabled for a given cgroup's children */
static int cgroup_subtree_control_show(struct seq_file *seq, void *v)
2921
{
2922 2923
	struct cgroup *cgrp = seq_css(seq)->cgroup;

2924
	cgroup_print_ss_mask(seq, cgrp->subtree_control);
2925 2926 2927 2928 2929 2930 2931
	return 0;
}

/**
 * cgroup_update_dfl_csses - update css assoc of a subtree in default hierarchy
 * @cgrp: root of the subtree to update csses for
 *
2932 2933 2934 2935
 * @cgrp's control masks have changed and its subtree's css associations
 * need to be updated accordingly.  This function looks up all css_sets
 * which are attached to the subtree, creates the matching updated css_sets
 * and migrates the tasks to the new ones.
2936 2937 2938
 */
static int cgroup_update_dfl_csses(struct cgroup *cgrp)
{
2939
	DEFINE_CGROUP_MGCTX(mgctx);
2940 2941
	struct cgroup_subsys_state *d_css;
	struct cgroup *dsct;
2942 2943 2944 2945 2946
	struct css_set *src_cset;
	int ret;

	lockdep_assert_held(&cgroup_mutex);

2947 2948
	percpu_down_write(&cgroup_threadgroup_rwsem);

2949
	/* look up all csses currently attached to @cgrp's subtree */
2950
	spin_lock_irq(&css_set_lock);
2951
	cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp) {
2952 2953
		struct cgrp_cset_link *link;

2954
		list_for_each_entry(link, &dsct->cset_links, cset_link)
2955
			cgroup_migrate_add_src(link->cset, dsct, &mgctx);
2956
	}
2957
	spin_unlock_irq(&css_set_lock);
2958 2959

	/* NULL dst indicates self on default hierarchy */
2960
	ret = cgroup_migrate_prepare_dst(&mgctx);
2961 2962 2963
	if (ret)
		goto out_finish;

2964
	spin_lock_irq(&css_set_lock);
2965
	list_for_each_entry(src_cset, &mgctx.preloaded_src_csets, mg_preload_node) {
2966
		struct task_struct *task, *ntask;
2967

2968 2969
		/* all tasks in src_csets need to be migrated */
		list_for_each_entry_safe(task, ntask, &src_cset->tasks, cg_list)
2970
			cgroup_migrate_add_task(task, &mgctx);
2971
	}
2972
	spin_unlock_irq(&css_set_lock);
2973

2974
	ret = cgroup_migrate_execute(&mgctx);
2975
out_finish:
2976
	cgroup_migrate_finish(&mgctx);
2977
	percpu_up_write(&cgroup_threadgroup_rwsem);
2978 2979 2980
	return ret;
}

2981
/**
2982
 * cgroup_lock_and_drain_offline - lock cgroup_mutex and drain offlined csses
2983
 * @cgrp: root of the target subtree
2984 2985
 *
 * Because css offlining is asynchronous, userland may try to re-enable a
2986 2987
 * controller while the previous css is still around.  This function grabs
 * cgroup_mutex and drains the previous css instances of @cgrp's subtree.
2988
 */
2989
void cgroup_lock_and_drain_offline(struct cgroup *cgrp)
2990
	__acquires(&cgroup_mutex)
2991 2992
{
	struct cgroup *dsct;
2993
	struct cgroup_subsys_state *d_css;
2994 2995 2996
	struct cgroup_subsys *ss;
	int ssid;

2997 2998
restart:
	mutex_lock(&cgroup_mutex);
2999

3000
	cgroup_for_each_live_descendant_post(dsct, d_css, cgrp) {
3001 3002 3003 3004
		for_each_subsys(ss, ssid) {
			struct cgroup_subsys_state *css = cgroup_css(dsct, ss);
			DEFINE_WAIT(wait);

3005
			if (!css || !percpu_ref_is_dying(&css->refcnt))
3006 3007
				continue;

3008
			cgroup_get_live(dsct);
3009 3010 3011 3012 3013 3014 3015 3016
			prepare_to_wait(&dsct->offline_waitq, &wait,
					TASK_UNINTERRUPTIBLE);

			mutex_unlock(&cgroup_mutex);
			schedule();
			finish_wait(&dsct->offline_waitq, &wait);

			cgroup_put(dsct);
3017
			goto restart;
3018 3019 3020 3021
		}
	}
}

3022
/**
3023
 * cgroup_save_control - save control masks and dom_cgrp of a subtree
3024 3025
 * @cgrp: root of the target subtree
 *
3026 3027 3028
 * Save ->subtree_control, ->subtree_ss_mask and ->dom_cgrp to the
 * respective old_ prefixed fields for @cgrp's subtree including @cgrp
 * itself.
3029 3030 3031 3032 3033 3034 3035 3036 3037
 */
static void cgroup_save_control(struct cgroup *cgrp)
{
	struct cgroup *dsct;
	struct cgroup_subsys_state *d_css;

	cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp) {
		dsct->old_subtree_control = dsct->subtree_control;
		dsct->old_subtree_ss_mask = dsct->subtree_ss_mask;
3038
		dsct->old_dom_cgrp = dsct->dom_cgrp;
3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056
	}
}

/**
 * cgroup_propagate_control - refresh control masks of a subtree
 * @cgrp: root of the target subtree
 *
 * For @cgrp and its subtree, ensure ->subtree_ss_mask matches
 * ->subtree_control and propagate controller availability through the
 * subtree so that descendants don't have unavailable controllers enabled.
 */
static void cgroup_propagate_control(struct cgroup *cgrp)
{
	struct cgroup *dsct;
	struct cgroup_subsys_state *d_css;

	cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp) {
		dsct->subtree_control &= cgroup_control(dsct);
3057 3058 3059
		dsct->subtree_ss_mask =
			cgroup_calc_subtree_ss_mask(dsct->subtree_control,
						    cgroup_ss_mask(dsct));
3060 3061 3062 3063
	}
}

/**
3064
 * cgroup_restore_control - restore control masks and dom_cgrp of a subtree
3065 3066
 * @cgrp: root of the target subtree
 *
3067 3068 3069
 * Restore ->subtree_control, ->subtree_ss_mask and ->dom_cgrp from the
 * respective old_ prefixed fields for @cgrp's subtree including @cgrp
 * itself.
3070 3071 3072 3073 3074 3075 3076 3077 3078
 */
static void cgroup_restore_control(struct cgroup *cgrp)
{
	struct cgroup *dsct;
	struct cgroup_subsys_state *d_css;

	cgroup_for_each_live_descendant_post(dsct, d_css, cgrp) {
		dsct->subtree_control = dsct->old_subtree_control;
		dsct->subtree_ss_mask = dsct->old_subtree_ss_mask;
3079
		dsct->dom_cgrp = dsct->old_dom_cgrp;
3080 3081 3082
	}
}

3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094
static bool css_visible(struct cgroup_subsys_state *css)
{
	struct cgroup_subsys *ss = css->ss;
	struct cgroup *cgrp = css->cgroup;

	if (cgroup_control(cgrp) & (1 << ss->id))
		return true;
	if (!(cgroup_ss_mask(cgrp) & (1 << ss->id)))
		return false;
	return cgroup_on_dfl(cgrp) && ss->implicit_on_dfl;
}

3095 3096
/**
 * cgroup_apply_control_enable - enable or show csses according to control
3097
 * @cgrp: root of the target subtree
3098
 *
3099
 * Walk @cgrp's subtree and create new csses or make the existing ones
3100 3101 3102 3103 3104 3105
 * visible.  A css is created invisible if it's being implicitly enabled
 * through dependency.  An invisible css is made visible when the userland
 * explicitly enables it.
 *
 * Returns 0 on success, -errno on failure.  On failure, csses which have
 * been processed already aren't cleaned up.  The caller is responsible for
3106
 * cleaning up with cgroup_apply_control_disable().
3107 3108 3109 3110
 */
static int cgroup_apply_control_enable(struct cgroup *cgrp)
{
	struct cgroup *dsct;
3111
	struct cgroup_subsys_state *d_css;
3112 3113 3114
	struct cgroup_subsys *ss;
	int ssid, ret;

3115
	cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp) {
3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127
		for_each_subsys(ss, ssid) {
			struct cgroup_subsys_state *css = cgroup_css(dsct, ss);

			if (!(cgroup_ss_mask(dsct) & (1 << ss->id)))
				continue;

			if (!css) {
				css = css_create(dsct, ss);
				if (IS_ERR(css))
					return PTR_ERR(css);
			}

3128 3129
			WARN_ON_ONCE(percpu_ref_is_dying(&css->refcnt));

3130
			if (css_visible(css)) {
3131
				ret = css_populate_dir(css);
3132 3133 3134 3135 3136 3137 3138 3139 3140
				if (ret)
					return ret;
			}
		}
	}

	return 0;
}

3141 3142
/**
 * cgroup_apply_control_disable - kill or hide csses according to control
3143
 * @cgrp: root of the target subtree
3144
 *
3145
 * Walk @cgrp's subtree and kill and hide csses so that they match
3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156
 * cgroup_ss_mask() and cgroup_visible_mask().
 *
 * A css is hidden when the userland requests it to be disabled while other
 * subsystems are still depending on it.  The css must not actively control
 * resources and be in the vanilla state if it's made visible again later.
 * Controllers which may be depended upon should provide ->css_reset() for
 * this purpose.
 */
static void cgroup_apply_control_disable(struct cgroup *cgrp)
{
	struct cgroup *dsct;
3157
	struct cgroup_subsys_state *d_css;
3158 3159 3160
	struct cgroup_subsys *ss;
	int ssid;

3161
	cgroup_for_each_live_descendant_post(dsct, d_css, cgrp) {
3162 3163 3164 3165 3166 3167
		for_each_subsys(ss, ssid) {
			struct cgroup_subsys_state *css = cgroup_css(dsct, ss);

			if (!css)
				continue;

3168 3169
			WARN_ON_ONCE(percpu_ref_is_dying(&css->refcnt));

3170 3171
			if (css->parent &&
			    !(cgroup_ss_mask(dsct) & (1 << ss->id))) {
3172
				kill_css(css);
3173
			} else if (!css_visible(css)) {
3174
				css_clear_dir(css);
3175 3176 3177 3178 3179 3180 3181
				if (ss->css_reset)
					ss->css_reset(css);
			}
		}
	}
}

3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209
/**
 * cgroup_apply_control - apply control mask updates to the subtree
 * @cgrp: root of the target subtree
 *
 * subsystems can be enabled and disabled in a subtree using the following
 * steps.
 *
 * 1. Call cgroup_save_control() to stash the current state.
 * 2. Update ->subtree_control masks in the subtree as desired.
 * 3. Call cgroup_apply_control() to apply the changes.
 * 4. Optionally perform other related operations.
 * 5. Call cgroup_finalize_control() to finish up.
 *
 * This function implements step 3 and propagates the mask changes
 * throughout @cgrp's subtree, updates csses accordingly and perform
 * process migrations.
 */
static int cgroup_apply_control(struct cgroup *cgrp)
{
	int ret;

	cgroup_propagate_control(cgrp);

	ret = cgroup_apply_control_enable(cgrp);
	if (ret)
		return ret;

	/*
3210
	 * At this point, cgroup_e_css_by_mask() results reflect the new csses
3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237
	 * making the following cgroup_update_dfl_csses() properly update
	 * css associations of all tasks in the subtree.
	 */
	ret = cgroup_update_dfl_csses(cgrp);
	if (ret)
		return ret;

	return 0;
}

/**
 * cgroup_finalize_control - finalize control mask update
 * @cgrp: root of the target subtree
 * @ret: the result of the update
 *
 * Finalize control mask update.  See cgroup_apply_control() for more info.
 */
static void cgroup_finalize_control(struct cgroup *cgrp, int ret)
{
	if (ret) {
		cgroup_restore_control(cgrp);
		cgroup_propagate_control(cgrp);
	}

	cgroup_apply_control_disable(cgrp);
}

3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277
static int cgroup_vet_subtree_control_enable(struct cgroup *cgrp, u16 enable)
{
	u16 domain_enable = enable & ~cgrp_dfl_threaded_ss_mask;

	/* if nothing is getting enabled, nothing to worry about */
	if (!enable)
		return 0;

	/* can @cgrp host any resources? */
	if (!cgroup_is_valid_domain(cgrp->dom_cgrp))
		return -EOPNOTSUPP;

	/* mixables don't care */
	if (cgroup_is_mixable(cgrp))
		return 0;

	if (domain_enable) {
		/* can't enable domain controllers inside a thread subtree */
		if (cgroup_is_thread_root(cgrp) || cgroup_is_threaded(cgrp))
			return -EOPNOTSUPP;
	} else {
		/*
		 * Threaded controllers can handle internal competitions
		 * and are always allowed inside a (prospective) thread
		 * subtree.
		 */
		if (cgroup_can_be_thread_root(cgrp) || cgroup_is_threaded(cgrp))
			return 0;
	}

	/*
	 * Controllers can't be enabled for a cgroup with tasks to avoid
	 * child cgroups competing against tasks.
	 */
	if (cgroup_has_tasks(cgrp))
		return -EBUSY;

	return 0;
}

3278
/* change the enabled child controllers for a cgroup in the default hierarchy */
3279 3280 3281
static ssize_t cgroup_subtree_control_write(struct kernfs_open_file *of,
					    char *buf, size_t nbytes,
					    loff_t off)
3282
{
3283
	u16 enable = 0, disable = 0;
3284
	struct cgroup *cgrp, *child;
3285
	struct cgroup_subsys *ss;
3286
	char *tok;
3287 3288 3289
	int ssid, ret;

	/*
3290 3291
	 * Parse input - space separated list of subsystem names prefixed
	 * with either + or -.
3292
	 */
3293 3294
	buf = strstrip(buf);
	while ((tok = strsep(&buf, " "))) {
3295 3296
		if (tok[0] == '\0')
			continue;
3297
		do_each_subsys_mask(ss, ssid, ~cgrp_dfl_inhibit_ss_mask) {
3298 3299
			if (!cgroup_ssid_enabled(ssid) ||
			    strcmp(tok + 1, ss->name))
3300 3301 3302
				continue;

			if (*tok == '+') {
3303 3304
				enable |= 1 << ssid;
				disable &= ~(1 << ssid);
3305
			} else if (*tok == '-') {
3306 3307
				disable |= 1 << ssid;
				enable &= ~(1 << ssid);
3308 3309 3310 3311
			} else {
				return -EINVAL;
			}
			break;
3312
		} while_each_subsys_mask();
3313 3314 3315 3316
		if (ssid == CGROUP_SUBSYS_COUNT)
			return -EINVAL;
	}

3317
	cgrp = cgroup_kn_lock_live(of->kn, true);
3318 3319
	if (!cgrp)
		return -ENODEV;
3320 3321 3322

	for_each_subsys(ss, ssid) {
		if (enable & (1 << ssid)) {
3323
			if (cgrp->subtree_control & (1 << ssid)) {
3324 3325 3326 3327
				enable &= ~(1 << ssid);
				continue;
			}

3328
			if (!(cgroup_control(cgrp) & (1 << ssid))) {
3329 3330 3331
				ret = -ENOENT;
				goto out_unlock;
			}
3332
		} else if (disable & (1 << ssid)) {
3333
			if (!(cgrp->subtree_control & (1 << ssid))) {
3334 3335 3336 3337 3338 3339
				disable &= ~(1 << ssid);
				continue;
			}

			/* a child has it enabled? */
			cgroup_for_each_live_child(child, cgrp) {
3340
				if (child->subtree_control & (1 << ssid)) {
3341
					ret = -EBUSY;
3342
					goto out_unlock;
3343 3344 3345 3346 3347 3348 3349
				}
			}
		}
	}

	if (!enable && !disable) {
		ret = 0;
3350
		goto out_unlock;
3351 3352
	}

3353 3354
	ret = cgroup_vet_subtree_control_enable(cgrp, enable);
	if (ret)
3355
		goto out_unlock;
3356

3357 3358
	/* save and update control masks and prepare csses */
	cgroup_save_control(cgrp);
3359

3360 3361
	cgrp->subtree_control |= enable;
	cgrp->subtree_control &= ~disable;
3362

3363 3364
	ret = cgroup_apply_control(cgrp);
	cgroup_finalize_control(cgrp, ret);
3365 3366
	if (ret)
		goto out_unlock;
3367 3368 3369

	kernfs_activate(cgrp->kn);
out_unlock:
3370
	cgroup_kn_unlock(of->kn);
3371
	return ret ?: nbytes;
3372 3373
}

3374 3375 3376 3377 3378 3379 3380 3381 3382
/**
 * cgroup_enable_threaded - make @cgrp threaded
 * @cgrp: the target cgroup
 *
 * Called when "threaded" is written to the cgroup.type interface file and
 * tries to make @cgrp threaded and join the parent's resource domain.
 * This function is never called on the root cgroup as cgroup.type doesn't
 * exist on it.
 */
3383 3384 3385 3386
static int cgroup_enable_threaded(struct cgroup *cgrp)
{
	struct cgroup *parent = cgroup_parent(cgrp);
	struct cgroup *dom_cgrp = parent->dom_cgrp;
3387 3388
	struct cgroup *dsct;
	struct cgroup_subsys_state *d_css;
3389 3390 3391 3392 3393 3394 3395 3396
	int ret;

	lockdep_assert_held(&cgroup_mutex);

	/* noop if already threaded */
	if (cgroup_is_threaded(cgrp))
		return 0;

3397 3398 3399 3400 3401 3402 3403 3404 3405 3406
	/*
	 * If @cgroup is populated or has domain controllers enabled, it
	 * can't be switched.  While the below cgroup_can_be_thread_root()
	 * test can catch the same conditions, that's only when @parent is
	 * not mixable, so let's check it explicitly.
	 */
	if (cgroup_is_populated(cgrp) ||
	    cgrp->subtree_control & ~cgrp_dfl_threaded_ss_mask)
		return -EOPNOTSUPP;

3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417
	/* we're joining the parent's domain, ensure its validity */
	if (!cgroup_is_valid_domain(dom_cgrp) ||
	    !cgroup_can_be_thread_root(dom_cgrp))
		return -EOPNOTSUPP;

	/*
	 * The following shouldn't cause actual migrations and should
	 * always succeed.
	 */
	cgroup_save_control(cgrp);

3418 3419 3420 3421
	cgroup_for_each_live_descendant_pre(dsct, d_css, cgrp)
		if (dsct == cgrp || cgroup_is_threaded(dsct))
			dsct->dom_cgrp = dom_cgrp;

3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455
	ret = cgroup_apply_control(cgrp);
	if (!ret)
		parent->nr_threaded_children++;

	cgroup_finalize_control(cgrp, ret);
	return ret;
}

static int cgroup_type_show(struct seq_file *seq, void *v)
{
	struct cgroup *cgrp = seq_css(seq)->cgroup;

	if (cgroup_is_threaded(cgrp))
		seq_puts(seq, "threaded\n");
	else if (!cgroup_is_valid_domain(cgrp))
		seq_puts(seq, "domain invalid\n");
	else if (cgroup_is_thread_root(cgrp))
		seq_puts(seq, "domain threaded\n");
	else
		seq_puts(seq, "domain\n");

	return 0;
}

static ssize_t cgroup_type_write(struct kernfs_open_file *of, char *buf,
				 size_t nbytes, loff_t off)
{
	struct cgroup *cgrp;
	int ret;

	/* only switching to threaded mode is supported */
	if (strcmp(strstrip(buf), "threaded"))
		return -EINVAL;

3456 3457
	/* drain dying csses before we re-apply (threaded) subtree control */
	cgrp = cgroup_kn_lock_live(of->kn, true);
3458 3459 3460 3461 3462 3463 3464 3465 3466 3467
	if (!cgrp)
		return -ENOENT;

	/* threaded can only be enabled */
	ret = cgroup_enable_threaded(cgrp);

	cgroup_kn_unlock(of->kn);
	return ret ?: nbytes;
}

3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496
static int cgroup_max_descendants_show(struct seq_file *seq, void *v)
{
	struct cgroup *cgrp = seq_css(seq)->cgroup;
	int descendants = READ_ONCE(cgrp->max_descendants);

	if (descendants == INT_MAX)
		seq_puts(seq, "max\n");
	else
		seq_printf(seq, "%d\n", descendants);

	return 0;
}

static ssize_t cgroup_max_descendants_write(struct kernfs_open_file *of,
					   char *buf, size_t nbytes, loff_t off)
{
	struct cgroup *cgrp;
	int descendants;
	ssize_t ret;

	buf = strstrip(buf);
	if (!strcmp(buf, "max")) {
		descendants = INT_MAX;
	} else {
		ret = kstrtoint(buf, 0, &descendants);
		if (ret)
			return ret;
	}

3497
	if (descendants < 0)
3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539
		return -ERANGE;

	cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!cgrp)
		return -ENOENT;

	cgrp->max_descendants = descendants;

	cgroup_kn_unlock(of->kn);

	return nbytes;
}

static int cgroup_max_depth_show(struct seq_file *seq, void *v)
{
	struct cgroup *cgrp = seq_css(seq)->cgroup;
	int depth = READ_ONCE(cgrp->max_depth);

	if (depth == INT_MAX)
		seq_puts(seq, "max\n");
	else
		seq_printf(seq, "%d\n", depth);

	return 0;
}

static ssize_t cgroup_max_depth_write(struct kernfs_open_file *of,
				      char *buf, size_t nbytes, loff_t off)
{
	struct cgroup *cgrp;
	ssize_t ret;
	int depth;

	buf = strstrip(buf);
	if (!strcmp(buf, "max")) {
		depth = INT_MAX;
	} else {
		ret = kstrtoint(buf, 0, &depth);
		if (ret)
			return ret;
	}

3540
	if (depth < 0)
3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553
		return -ERANGE;

	cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!cgrp)
		return -ENOENT;

	cgrp->max_depth = depth;

	cgroup_kn_unlock(of->kn);

	return nbytes;
}

3554
static int cgroup_events_show(struct seq_file *seq, void *v)
3555
{
Roman Gushchin's avatar
Roman Gushchin committed
3556 3557 3558 3559 3560
	struct cgroup *cgrp = seq_css(seq)->cgroup;

	seq_printf(seq, "populated %d\n", cgroup_is_populated(cgrp));
	seq_printf(seq, "frozen %d\n", test_bit(CGRP_FROZEN, &cgrp->flags));

3561 3562 3563
	return 0;
}

Tejun Heo's avatar
Tejun Heo committed
3564
static int cgroup_stat_show(struct seq_file *seq, void *v)
3565 3566 3567 3568 3569 3570 3571 3572 3573 3574 3575
{
	struct cgroup *cgroup = seq_css(seq)->cgroup;

	seq_printf(seq, "nr_descendants %d\n",
		   cgroup->nr_descendants);
	seq_printf(seq, "nr_dying_descendants %d\n",
		   cgroup->nr_dying_descendants);

	return 0;
}

3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596
static int __maybe_unused cgroup_extra_stat_show(struct seq_file *seq,
						 struct cgroup *cgrp, int ssid)
{
	struct cgroup_subsys *ss = cgroup_subsys[ssid];
	struct cgroup_subsys_state *css;
	int ret;

	if (!ss->css_extra_stat_show)
		return 0;

	css = cgroup_tryget_css(cgrp, ss);
	if (!css)
		return 0;

	ret = ss->css_extra_stat_show(seq, css);
	css_put(css);
	return ret;
}

static int cpu_stat_show(struct seq_file *seq, void *v)
{
3597
	struct cgroup __maybe_unused *cgrp = seq_css(seq)->cgroup;
3598 3599
	int ret = 0;

3600
	cgroup_base_stat_cputime_show(seq);
3601 3602 3603 3604 3605 3606
#ifdef CONFIG_CGROUP_SCHED
	ret = cgroup_extra_stat_show(seq, cgrp, cpu_cgrp_id);
#endif
	return ret;
}

Johannes Weiner's avatar
Johannes Weiner committed
3607 3608 3609
#ifdef CONFIG_PSI
static int cgroup_io_pressure_show(struct seq_file *seq, void *v)
{
3610
	struct cgroup *cgrp = seq_css(seq)->cgroup;
3611
	struct psi_group *psi = cgroup_ino(cgrp) == 1 ? &psi_system : &cgrp->psi;
3612 3613

	return psi_show(seq, psi, PSI_IO);
Johannes Weiner's avatar
Johannes Weiner committed
3614 3615 3616
}
static int cgroup_memory_pressure_show(struct seq_file *seq, void *v)
{
3617
	struct cgroup *cgrp = seq_css(seq)->cgroup;
3618
	struct psi_group *psi = cgroup_ino(cgrp) == 1 ? &psi_system : &cgrp->psi;
3619 3620

	return psi_show(seq, psi, PSI_MEM);
Johannes Weiner's avatar
Johannes Weiner committed
3621 3622 3623
}
static int cgroup_cpu_pressure_show(struct seq_file *seq, void *v)
{
3624
	struct cgroup *cgrp = seq_css(seq)->cgroup;
3625
	struct psi_group *psi = cgroup_ino(cgrp) == 1 ? &psi_system : &cgrp->psi;
3626 3627

	return psi_show(seq, psi, PSI_CPU);
Johannes Weiner's avatar
Johannes Weiner committed
3628
}
3629 3630 3631 3632

static ssize_t cgroup_pressure_write(struct kernfs_open_file *of, char *buf,
					  size_t nbytes, enum psi_res res)
{
3633
	struct cgroup_file_ctx *ctx = of->priv;
3634 3635
	struct psi_trigger *new;
	struct cgroup *cgrp;
3636
	struct psi_group *psi;
3637 3638 3639 3640 3641 3642 3643 3644

	cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!cgrp)
		return -ENODEV;

	cgroup_get(cgrp);
	cgroup_kn_unlock(of->kn);

3645 3646
	psi = cgroup_ino(cgrp) == 1 ? &psi_system : &cgrp->psi;
	new = psi_trigger_create(psi, buf, nbytes, res);
3647 3648 3649 3650 3651
	if (IS_ERR(new)) {
		cgroup_put(cgrp);
		return PTR_ERR(new);
	}

3652
	psi_trigger_replace(&ctx->psi.trigger, new);
3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666 3667 3668 3669 3670 3671 3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682

	cgroup_put(cgrp);

	return nbytes;
}

static ssize_t cgroup_io_pressure_write(struct kernfs_open_file *of,
					  char *buf, size_t nbytes,
					  loff_t off)
{
	return cgroup_pressure_write(of, buf, nbytes, PSI_IO);
}

static ssize_t cgroup_memory_pressure_write(struct kernfs_open_file *of,
					  char *buf, size_t nbytes,
					  loff_t off)
{
	return cgroup_pressure_write(of, buf, nbytes, PSI_MEM);
}

static ssize_t cgroup_cpu_pressure_write(struct kernfs_open_file *of,
					  char *buf, size_t nbytes,
					  loff_t off)
{
	return cgroup_pressure_write(of, buf, nbytes, PSI_CPU);
}

static __poll_t cgroup_pressure_poll(struct kernfs_open_file *of,
					  poll_table *pt)
{
3683 3684 3685
	struct cgroup_file_ctx *ctx = of->priv;

	return psi_trigger_poll(&ctx->psi.trigger, of->file, pt);
3686 3687 3688 3689
}

static void cgroup_pressure_release(struct kernfs_open_file *of)
{
3690 3691 3692
	struct cgroup_file_ctx *ctx = of->priv;

	psi_trigger_replace(&ctx->psi.trigger, NULL);
3693
}
3694 3695 3696 3697 3698 3699 3700 3701 3702 3703 3704 3705

bool cgroup_psi_enabled(void)
{
	return (cgroup_feature_disable_mask & (1 << OPT_FEATURE_PRESSURE)) == 0;
}

#else /* CONFIG_PSI */
bool cgroup_psi_enabled(void)
{
	return false;
}

3706
#endif /* CONFIG_PSI */
Johannes Weiner's avatar
Johannes Weiner committed
3707

Roman Gushchin's avatar
Roman Gushchin committed
3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740 3741
static int cgroup_freeze_show(struct seq_file *seq, void *v)
{
	struct cgroup *cgrp = seq_css(seq)->cgroup;

	seq_printf(seq, "%d\n", cgrp->freezer.freeze);

	return 0;
}

static ssize_t cgroup_freeze_write(struct kernfs_open_file *of,
				   char *buf, size_t nbytes, loff_t off)
{
	struct cgroup *cgrp;
	ssize_t ret;
	int freeze;

	ret = kstrtoint(strstrip(buf), 0, &freeze);
	if (ret)
		return ret;

	if (freeze < 0 || freeze > 1)
		return -ERANGE;

	cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!cgrp)
		return -ENOENT;

	cgroup_freeze(cgrp, freeze);

	cgroup_kn_unlock(of->kn);

	return nbytes;
}

3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767 3768 3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783 3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813 3814 3815
static void __cgroup_kill(struct cgroup *cgrp)
{
	struct css_task_iter it;
	struct task_struct *task;

	lockdep_assert_held(&cgroup_mutex);

	spin_lock_irq(&css_set_lock);
	set_bit(CGRP_KILL, &cgrp->flags);
	spin_unlock_irq(&css_set_lock);

	css_task_iter_start(&cgrp->self, CSS_TASK_ITER_PROCS | CSS_TASK_ITER_THREADED, &it);
	while ((task = css_task_iter_next(&it))) {
		/* Ignore kernel threads here. */
		if (task->flags & PF_KTHREAD)
			continue;

		/* Skip tasks that are already dying. */
		if (__fatal_signal_pending(task))
			continue;

		send_sig(SIGKILL, task, 0);
	}
	css_task_iter_end(&it);

	spin_lock_irq(&css_set_lock);
	clear_bit(CGRP_KILL, &cgrp->flags);
	spin_unlock_irq(&css_set_lock);
}

static void cgroup_kill(struct cgroup *cgrp)
{
	struct cgroup_subsys_state *css;
	struct cgroup *dsct;

	lockdep_assert_held(&cgroup_mutex);

	cgroup_for_each_live_descendant_pre(dsct, css, cgrp)
		__cgroup_kill(dsct);
}

static ssize_t cgroup_kill_write(struct kernfs_open_file *of, char *buf,
				 size_t nbytes, loff_t off)
{
	ssize_t ret = 0;
	int kill;
	struct cgroup *cgrp;

	ret = kstrtoint(strstrip(buf), 0, &kill);
	if (ret)
		return ret;

	if (kill != 1)
		return -ERANGE;

	cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!cgrp)
		return -ENOENT;

	/*
	 * Killing is a process directed operation, i.e. the whole thread-group
	 * is taken down so act like we do for cgroup.procs and only make this
	 * writable in non-threaded cgroups.
	 */
	if (cgroup_is_threaded(cgrp))
		ret = -EOPNOTSUPP;
	else
		cgroup_kill(cgrp);

	cgroup_kn_unlock(of->kn);

	return ret ?: nbytes;
}

3816 3817
static int cgroup_file_open(struct kernfs_open_file *of)
{
3818
	struct cftype *cft = of_cft(of);
3819 3820
	struct cgroup_file_ctx *ctx;
	int ret;
3821

3822 3823 3824
	ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
	if (!ctx)
		return -ENOMEM;
3825 3826 3827

	ctx->ns = current->nsproxy->cgroup_ns;
	get_cgroup_ns(ctx->ns);
3828 3829 3830 3831 3832 3833
	of->priv = ctx;

	if (!cft->open)
		return 0;

	ret = cft->open(of);
3834 3835
	if (ret) {
		put_cgroup_ns(ctx->ns);
3836
		kfree(ctx);
3837
	}
3838
	return ret;
3839 3840 3841 3842
}

static void cgroup_file_release(struct kernfs_open_file *of)
{
3843
	struct cftype *cft = of_cft(of);
3844
	struct cgroup_file_ctx *ctx = of->priv;
3845 3846 3847

	if (cft->release)
		cft->release(of);
3848
	put_cgroup_ns(ctx->ns);
3849
	kfree(ctx);
3850 3851
}

Tejun Heo's avatar
Tejun Heo committed
3852 3853
static ssize_t cgroup_file_write(struct kernfs_open_file *of, char *buf,
				 size_t nbytes, loff_t off)
3854
{
3855
	struct cgroup_file_ctx *ctx = of->priv;
Tejun Heo's avatar
Tejun Heo committed
3856
	struct cgroup *cgrp = of->kn->parent->priv;
3857
	struct cftype *cft = of_cft(of);
Tejun Heo's avatar
Tejun Heo committed
3858
	struct cgroup_subsys_state *css;
3859
	int ret;
3860

3861 3862 3863
	if (!nbytes)
		return 0;

3864 3865 3866 3867 3868 3869 3870 3871
	/*
	 * If namespaces are delegation boundaries, disallow writes to
	 * files in an non-init namespace root from inside the namespace
	 * except for the files explicitly marked delegatable -
	 * cgroup.procs and cgroup.subtree_control.
	 */
	if ((cgrp->root->flags & CGRP_ROOT_NS_DELEGATE) &&
	    !(cft->flags & CFTYPE_NS_DELEGATABLE) &&
3872
	    ctx->ns != &init_cgroup_ns && ctx->ns->root_cset->dfl_cgrp == cgrp)
3873 3874
		return -EPERM;

3875 3876 3877
	if (cft->write)
		return cft->write(of, buf, nbytes, off);

Tejun Heo's avatar
Tejun Heo committed
3878 3879 3880 3881 3882 3883 3884 3885 3886
	/*
	 * kernfs guarantees that a file isn't deleted with operations in
	 * flight, which means that the matching css is and stays alive and
	 * doesn't need to be pinned.  The RCU locking is not necessary
	 * either.  It's just for the convenience of using cgroup_css().
	 */
	rcu_read_lock();
	css = cgroup_css(cgrp, cft->ss);
	rcu_read_unlock();
3887

3888
	if (cft->write_u64) {
3889 3890 3891 3892 3893 3894 3895 3896 3897
		unsigned long long v;
		ret = kstrtoull(buf, 0, &v);
		if (!ret)
			ret = cft->write_u64(css, cft, v);
	} else if (cft->write_s64) {
		long long v;
		ret = kstrtoll(buf, 0, &v);
		if (!ret)
			ret = cft->write_s64(css, cft, v);
3898
	} else {
3899
		ret = -EINVAL;
3900
	}
Tejun Heo's avatar
Tejun Heo committed
3901

3902
	return ret ?: nbytes;
3903 3904
}

3905 3906
static __poll_t cgroup_file_poll(struct kernfs_open_file *of, poll_table *pt)
{
3907
	struct cftype *cft = of_cft(of);
3908 3909 3910 3911 3912 3913 3914

	if (cft->poll)
		return cft->poll(of, pt);

	return kernfs_generic_poll(of, pt);
}

3915
static void *cgroup_seqfile_start(struct seq_file *seq, loff_t *ppos)
3916
{
Tejun Heo's avatar
Tejun Heo committed
3917
	return seq_cft(seq)->seq_start(seq, ppos);
3918 3919
}

3920
static void *cgroup_seqfile_next(struct seq_file *seq, void *v, loff_t *ppos)
3921
{
Tejun Heo's avatar
Tejun Heo committed
3922
	return seq_cft(seq)->seq_next(seq, v, ppos);
3923 3924
}

3925
static void cgroup_seqfile_stop(struct seq_file *seq, void *v)
3926
{
3927 3928
	if (seq_cft(seq)->seq_stop)
		seq_cft(seq)->seq_stop(seq, v);
3929 3930
}

3931
static int cgroup_seqfile_show(struct seq_file *m, void *arg)
3932
{
3933 3934
	struct cftype *cft = seq_cft(m);
	struct cgroup_subsys_state *css = seq_css(m);
3935

3936 3937
	if (cft->seq_show)
		return cft->seq_show(m, arg);
3938

3939
	if (cft->read_u64)
3940 3941 3942 3943 3944 3945
		seq_printf(m, "%llu\n", cft->read_u64(css, cft));
	else if (cft->read_s64)
		seq_printf(m, "%lld\n", cft->read_s64(css, cft));
	else
		return -EINVAL;
	return 0;
3946 3947
}

Tejun Heo's avatar
Tejun Heo committed
3948 3949
static struct kernfs_ops cgroup_kf_single_ops = {
	.atomic_write_len	= PAGE_SIZE,
3950 3951
	.open			= cgroup_file_open,
	.release		= cgroup_file_release,
Tejun Heo's avatar
Tejun Heo committed
3952
	.write			= cgroup_file_write,
3953
	.poll			= cgroup_file_poll,
Tejun Heo's avatar
Tejun Heo committed
3954
	.seq_show		= cgroup_seqfile_show,
3955 3956
};

Tejun Heo's avatar
Tejun Heo committed
3957 3958
static struct kernfs_ops cgroup_kf_ops = {
	.atomic_write_len	= PAGE_SIZE,
3959 3960
	.open			= cgroup_file_open,
	.release		= cgroup_file_release,
Tejun Heo's avatar
Tejun Heo committed
3961
	.write			= cgroup_file_write,
3962
	.poll			= cgroup_file_poll,
Tejun Heo's avatar
Tejun Heo committed
3963 3964 3965 3966 3967
	.seq_start		= cgroup_seqfile_start,
	.seq_next		= cgroup_seqfile_next,
	.seq_stop		= cgroup_seqfile_stop,
	.seq_show		= cgroup_seqfile_show,
};
3968

3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982
/* set uid and gid of cgroup dirs and files to that of the creator */
static int cgroup_kn_set_ugid(struct kernfs_node *kn)
{
	struct iattr iattr = { .ia_valid = ATTR_UID | ATTR_GID,
			       .ia_uid = current_fsuid(),
			       .ia_gid = current_fsgid(), };

	if (uid_eq(iattr.ia_uid, GLOBAL_ROOT_UID) &&
	    gid_eq(iattr.ia_gid, GLOBAL_ROOT_GID))
		return 0;

	return kernfs_setattr(kn, &iattr);
}

3983 3984 3985 3986 3987 3988
static void cgroup_file_notify_timer(struct timer_list *timer)
{
	cgroup_file_notify(container_of(timer, struct cgroup_file,
					notify_timer));
}

3989 3990
static int cgroup_add_file(struct cgroup_subsys_state *css, struct cgroup *cgrp,
			   struct cftype *cft)
3991
{
3992
	char name[CGROUP_FILE_NAME_MAX];
Tejun Heo's avatar
Tejun Heo committed
3993 3994
	struct kernfs_node *kn;
	struct lock_class_key *key = NULL;
3995
	int ret;
Tejun Heo's avatar
Tejun Heo committed
3996

Tejun Heo's avatar
Tejun Heo committed
3997 3998 3999 4000
#ifdef CONFIG_DEBUG_LOCK_ALLOC
	key = &cft->lockdep_key;
#endif
	kn = __kernfs_create_file(cgrp->kn, cgroup_file_name(cgrp, cft, name),
4001 4002 4003
				  cgroup_file_mode(cft),
				  GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
				  0, cft->kf_ops, cft,
4004
				  NULL, key);
4005 4006 4007 4008
	if (IS_ERR(kn))
		return PTR_ERR(kn);

	ret = cgroup_kn_set_ugid(kn);
4009
	if (ret) {
4010
		kernfs_remove(kn);
4011 4012 4013
		return ret;
	}

4014 4015 4016
	if (cft->file_offset) {
		struct cgroup_file *cfile = (void *)css + cft->file_offset;

4017 4018
		timer_setup(&cfile->notify_timer, cgroup_file_notify_timer, 0);

4019
		spin_lock_irq(&cgroup_file_kn_lock);
4020
		cfile->kn = kn;
4021
		spin_unlock_irq(&cgroup_file_kn_lock);
4022 4023
	}

4024
	return 0;
4025 4026
}

4027 4028
/**
 * cgroup_addrm_files - add or remove files to a cgroup directory
4029 4030
 * @css: the target css
 * @cgrp: the target cgroup (usually css->cgroup)
4031 4032 4033 4034
 * @cfts: array of cftypes to be added
 * @is_add: whether to add or remove
 *
 * Depending on @is_add, add or remove files defined by @cfts on @cgrp.
4035
 * For removals, this function never fails.
4036
 */
4037 4038
static int cgroup_addrm_files(struct cgroup_subsys_state *css,
			      struct cgroup *cgrp, struct cftype cfts[],
4039
			      bool is_add)
4040
{
4041
	struct cftype *cft, *cft_end = NULL;
4042
	int ret = 0;
4043

4044
	lockdep_assert_held(&cgroup_mutex);
4045

4046 4047
restart:
	for (cft = cfts; cft != cft_end && cft->name[0] != '\0'; cft++) {
4048
		/* does cft->flags tell us to skip this file on @cgrp? */
4049 4050
		if ((cft->flags & CFTYPE_PRESSURE) && !cgroup_psi_enabled())
			continue;
4051
		if ((cft->flags & __CFTYPE_ONLY_ON_DFL) && !cgroup_on_dfl(cgrp))
4052
			continue;
4053
		if ((cft->flags & __CFTYPE_NOT_ON_DFL) && cgroup_on_dfl(cgrp))
4054
			continue;
Tejun Heo's avatar
Tejun Heo committed
4055
		if ((cft->flags & CFTYPE_NOT_ON_ROOT) && !cgroup_parent(cgrp))
4056
			continue;
Tejun Heo's avatar
Tejun Heo committed
4057
		if ((cft->flags & CFTYPE_ONLY_ON_ROOT) && cgroup_parent(cgrp))
4058
			continue;
4059 4060
		if ((cft->flags & CFTYPE_DEBUG) && !cgroup_debug)
			continue;
4061
		if (is_add) {
4062
			ret = cgroup_add_file(css, cgrp, cft);
4063
			if (ret) {
4064 4065
				pr_warn("%s: failed to add %s, err=%d\n",
					__func__, cft->name, ret);
4066 4067 4068
				cft_end = cft;
				is_add = false;
				goto restart;
4069
			}
4070 4071
		} else {
			cgroup_rm_file(cgrp, cft);
4072
		}
4073
	}
4074
	return ret;
4075 4076
}

4077
static int cgroup_apply_cftypes(struct cftype *cfts, bool is_add)
4078
{
4079
	struct cgroup_subsys *ss = cfts[0].ss;
4080
	struct cgroup *root = &ss->root->cgrp;
4081
	struct cgroup_subsys_state *css;
4082
	int ret = 0;
4083

4084
	lockdep_assert_held(&cgroup_mutex);
4085 4086

	/* add/rm files for all cgroups created before */
4087
	css_for_each_descendant_pre(css, cgroup_css(root, ss)) {
4088 4089
		struct cgroup *cgrp = css->cgroup;

4090
		if (!(css->flags & CSS_VISIBLE))
4091 4092
			continue;

4093
		ret = cgroup_addrm_files(css, cgrp, cfts, is_add);
4094 4095
		if (ret)
			break;
4096
	}
4097 4098 4099

	if (is_add && !ret)
		kernfs_activate(root->kn);
4100
	return ret;
4101 4102
}

4103
static void cgroup_exit_cftypes(struct cftype *cfts)
4104
{
4105
	struct cftype *cft;
4106

Tejun Heo's avatar
Tejun Heo committed
4107 4108 4109 4110 4111
	for (cft = cfts; cft->name[0] != '\0'; cft++) {
		/* free copy for custom atomic_write_len, see init_cftypes() */
		if (cft->max_write_len && cft->max_write_len != PAGE_SIZE)
			kfree(cft->kf_ops);
		cft->kf_ops = NULL;
4112
		cft->ss = NULL;
4113 4114

		/* revert flags set by cgroup core while adding @cfts */
4115
		cft->flags &= ~(__CFTYPE_ONLY_ON_DFL | __CFTYPE_NOT_ON_DFL);
Tejun Heo's avatar
Tejun Heo committed
4116
	}
4117 4118
}

Tejun Heo's avatar
Tejun Heo committed
4119
static int cgroup_init_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
4120 4121 4122
{
	struct cftype *cft;

Tejun Heo's avatar
Tejun Heo committed
4123 4124 4125
	for (cft = cfts; cft->name[0] != '\0'; cft++) {
		struct kernfs_ops *kf_ops;

Tejun Heo's avatar
Tejun Heo committed
4126 4127
		WARN_ON(cft->ss || cft->kf_ops);

4128 4129 4130
		if ((cft->flags & CFTYPE_PRESSURE) && !cgroup_psi_enabled())
			continue;

Tejun Heo's avatar
Tejun Heo committed
4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147
		if (cft->seq_start)
			kf_ops = &cgroup_kf_ops;
		else
			kf_ops = &cgroup_kf_single_ops;

		/*
		 * Ugh... if @cft wants a custom max_write_len, we need to
		 * make a copy of kf_ops to set its atomic_write_len.
		 */
		if (cft->max_write_len && cft->max_write_len != PAGE_SIZE) {
			kf_ops = kmemdup(kf_ops, sizeof(*kf_ops), GFP_KERNEL);
			if (!kf_ops) {
				cgroup_exit_cftypes(cfts);
				return -ENOMEM;
			}
			kf_ops->atomic_write_len = cft->max_write_len;
		}
4148

Tejun Heo's avatar
Tejun Heo committed
4149
		cft->kf_ops = kf_ops;
4150
		cft->ss = ss;
Tejun Heo's avatar
Tejun Heo committed
4151
	}
4152

Tejun Heo's avatar
Tejun Heo committed
4153
	return 0;
4154 4155
}

4156 4157
static int cgroup_rm_cftypes_locked(struct cftype *cfts)
{
4158
	lockdep_assert_held(&cgroup_mutex);
4159 4160 4161 4162 4163 4164 4165 4166

	if (!cfts || !cfts[0].ss)
		return -ENOENT;

	list_del(&cfts->node);
	cgroup_apply_cftypes(cfts, false);
	cgroup_exit_cftypes(cfts);
	return 0;
4167 4168
}

4169 4170 4171 4172
/**
 * cgroup_rm_cftypes - remove an array of cftypes from a subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
4173 4174 4175
 * Unregister @cfts.  Files described by @cfts are removed from all
 * existing cgroups and all future cgroups won't have them either.  This
 * function can be called anytime whether @cfts' subsys is attached or not.
4176 4177
 *
 * Returns 0 on successful unregistration, -ENOENT if @cfts is not
4178
 * registered.
4179
 */
4180
int cgroup_rm_cftypes(struct cftype *cfts)
4181
{
4182
	int ret;
4183

4184
	mutex_lock(&cgroup_mutex);
4185
	ret = cgroup_rm_cftypes_locked(cfts);
4186
	mutex_unlock(&cgroup_mutex);
4187
	return ret;
4188 4189
}

4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203
/**
 * cgroup_add_cftypes - add an array of cftypes to a subsystem
 * @ss: target cgroup subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
 * Register @cfts to @ss.  Files described by @cfts are created for all
 * existing cgroups to which @ss is attached and all future cgroups will
 * have them too.  This function can be called anytime whether @ss is
 * attached or not.
 *
 * Returns 0 on successful registration, -errno on failure.  Note that this
 * function currently returns 0 as long as @cfts registration is successful
 * even if some file creation attempts on existing cgroups fail.
 */
4204
static int cgroup_add_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
4205
{
4206
	int ret;
4207

4208
	if (!cgroup_ssid_enabled(ss->id))
4209 4210
		return 0;

4211 4212
	if (!cfts || cfts[0].name[0] == '\0')
		return 0;
4213

Tejun Heo's avatar
Tejun Heo committed
4214 4215 4216
	ret = cgroup_init_cftypes(ss, cfts);
	if (ret)
		return ret;
4217

4218
	mutex_lock(&cgroup_mutex);
4219

Tejun Heo's avatar
Tejun Heo committed
4220
	list_add_tail(&cfts->node, &ss->cfts);
4221
	ret = cgroup_apply_cftypes(cfts, true);
4222
	if (ret)
4223
		cgroup_rm_cftypes_locked(cfts);
4224

4225
	mutex_unlock(&cgroup_mutex);
4226
	return ret;
4227 4228
}

4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241
/**
 * cgroup_add_dfl_cftypes - add an array of cftypes for default hierarchy
 * @ss: target cgroup subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
 * Similar to cgroup_add_cftypes() but the added files are only used for
 * the default hierarchy.
 */
int cgroup_add_dfl_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
{
	struct cftype *cft;

	for (cft = cfts; cft && cft->name[0] != '\0'; cft++)
4242
		cft->flags |= __CFTYPE_ONLY_ON_DFL;
4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253
	return cgroup_add_cftypes(ss, cfts);
}

/**
 * cgroup_add_legacy_cftypes - add an array of cftypes for legacy hierarchies
 * @ss: target cgroup subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
 * Similar to cgroup_add_cftypes() but the added files are only used for
 * the legacy hierarchies.
 */
4254 4255
int cgroup_add_legacy_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
{
4256 4257
	struct cftype *cft;

4258 4259
	for (cft = cfts; cft && cft->name[0] != '\0'; cft++)
		cft->flags |= __CFTYPE_NOT_ON_DFL;
4260 4261 4262
	return cgroup_add_cftypes(ss, cfts);
}

4263 4264 4265 4266 4267 4268 4269 4270 4271 4272 4273
/**
 * cgroup_file_notify - generate a file modified event for a cgroup_file
 * @cfile: target cgroup_file
 *
 * @cfile must have been obtained by setting cftype->file_offset.
 */
void cgroup_file_notify(struct cgroup_file *cfile)
{
	unsigned long flags;

	spin_lock_irqsave(&cgroup_file_kn_lock, flags);
4274 4275 4276 4277 4278 4279 4280 4281 4282 4283 4284
	if (cfile->kn) {
		unsigned long last = cfile->notified_at;
		unsigned long next = last + CGROUP_FILE_NOTIFY_MIN_INTV;

		if (time_in_range(jiffies, last, next)) {
			timer_reduce(&cfile->notify_timer, next);
		} else {
			kernfs_notify(cfile->kn);
			cfile->notified_at = jiffies;
		}
	}
4285 4286 4287
	spin_unlock_irqrestore(&cgroup_file_kn_lock, flags);
}

4288
/**
4289
 * css_next_child - find the next child of a given css
4290 4291
 * @pos: the current position (%NULL to initiate traversal)
 * @parent: css whose children to walk
4292
 *
4293
 * This function returns the next child of @parent and should be called
4294
 * under either cgroup_mutex or RCU read lock.  The only requirement is
4295 4296 4297 4298 4299 4300 4301 4302 4303
 * that @parent and @pos are accessible.  The next sibling is guaranteed to
 * be returned regardless of their states.
 *
 * If a subsystem synchronizes ->css_online() and the start of iteration, a
 * css which finished ->css_online() is guaranteed to be visible in the
 * future iterations and will stay visible until the last reference is put.
 * A css which hasn't finished ->css_online() or already finished
 * ->css_offline() may show up during traversal.  It's each subsystem's
 * responsibility to synchronize against on/offlining.
4304
 */
4305 4306
struct cgroup_subsys_state *css_next_child(struct cgroup_subsys_state *pos,
					   struct cgroup_subsys_state *parent)
4307
{
4308
	struct cgroup_subsys_state *next;
4309

Tejun Heo's avatar
Tejun Heo committed
4310
	cgroup_assert_mutex_or_rcu_locked();
4311 4312

	/*
4313 4314 4315 4316 4317 4318 4319 4320 4321
	 * @pos could already have been unlinked from the sibling list.
	 * Once a cgroup is removed, its ->sibling.next is no longer
	 * updated when its next sibling changes.  CSS_RELEASED is set when
	 * @pos is taken off list, at which time its next pointer is valid,
	 * and, as releases are serialized, the one pointed to by the next
	 * pointer is guaranteed to not have started release yet.  This
	 * implies that if we observe !CSS_RELEASED on @pos in this RCU
	 * critical section, the one pointed to by its next pointer is
	 * guaranteed to not have finished its RCU grace period even if we
4322
	 * have dropped rcu_read_lock() in-between iterations.
4323
	 *
4324 4325 4326 4327 4328 4329 4330
	 * If @pos has CSS_RELEASED set, its next pointer can't be
	 * dereferenced; however, as each css is given a monotonically
	 * increasing unique serial number and always appended to the
	 * sibling list, the next one can be found by walking the parent's
	 * children until the first css with higher serial number than
	 * @pos's.  While this path can be slower, it happens iff iteration
	 * races against release and the race window is very small.
4331
	 */
4332
	if (!pos) {
4333 4334 4335
		next = list_entry_rcu(parent->children.next, struct cgroup_subsys_state, sibling);
	} else if (likely(!(pos->flags & CSS_RELEASED))) {
		next = list_entry_rcu(pos->sibling.next, struct cgroup_subsys_state, sibling);
4336
	} else {
4337 4338
		list_for_each_entry_rcu(next, &parent->children, sibling,
					lockdep_is_held(&cgroup_mutex))
4339 4340
			if (next->serial_nr > pos->serial_nr)
				break;
4341 4342
	}

4343 4344
	/*
	 * @next, if not pointing to the head, can be dereferenced and is
4345
	 * the next sibling.
4346
	 */
4347 4348
	if (&next->sibling != &parent->children)
		return next;
4349
	return NULL;
4350 4351
}

4352
/**
4353
 * css_next_descendant_pre - find the next descendant for pre-order walk
4354
 * @pos: the current position (%NULL to initiate traversal)
4355
 * @root: css whose descendants to walk
4356
 *
4357
 * To be used by css_for_each_descendant_pre().  Find the next descendant
4358 4359
 * to visit for pre-order traversal of @root's descendants.  @root is
 * included in the iteration and the first node to be visited.
4360
 *
4361 4362 4363 4364
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct next descendant as long
 * as both @pos and @root are accessible and @pos is a descendant of @root.
4365 4366 4367 4368 4369 4370 4371
 *
 * If a subsystem synchronizes ->css_online() and the start of iteration, a
 * css which finished ->css_online() is guaranteed to be visible in the
 * future iterations and will stay visible until the last reference is put.
 * A css which hasn't finished ->css_online() or already finished
 * ->css_offline() may show up during traversal.  It's each subsystem's
 * responsibility to synchronize against on/offlining.
4372
 */
4373 4374 4375
struct cgroup_subsys_state *
css_next_descendant_pre(struct cgroup_subsys_state *pos,
			struct cgroup_subsys_state *root)
4376
{
4377
	struct cgroup_subsys_state *next;
4378

Tejun Heo's avatar
Tejun Heo committed
4379
	cgroup_assert_mutex_or_rcu_locked();
4380

4381
	/* if first iteration, visit @root */
4382
	if (!pos)
4383
		return root;
4384 4385

	/* visit the first child if exists */
4386
	next = css_next_child(NULL, pos);
4387 4388 4389 4390
	if (next)
		return next;

	/* no child, visit my or the closest ancestor's next sibling */
4391
	while (pos != root) {
Tejun Heo's avatar
Tejun Heo committed
4392
		next = css_next_child(pos, pos->parent);
4393
		if (next)
4394
			return next;
Tejun Heo's avatar
Tejun Heo committed
4395
		pos = pos->parent;
4396
	}
4397 4398 4399

	return NULL;
}
4400
EXPORT_SYMBOL_GPL(css_next_descendant_pre);
4401

4402
/**
4403 4404
 * css_rightmost_descendant - return the rightmost descendant of a css
 * @pos: css of interest
4405
 *
4406 4407
 * Return the rightmost descendant of @pos.  If there's no descendant, @pos
 * is returned.  This can be used during pre-order traversal to skip
4408
 * subtree of @pos.
4409
 *
4410 4411 4412 4413
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct rightmost descendant as
 * long as @pos is accessible.
4414
 */
4415 4416
struct cgroup_subsys_state *
css_rightmost_descendant(struct cgroup_subsys_state *pos)
4417
{
4418
	struct cgroup_subsys_state *last, *tmp;
4419

Tejun Heo's avatar
Tejun Heo committed
4420
	cgroup_assert_mutex_or_rcu_locked();
4421 4422 4423 4424 4425

	do {
		last = pos;
		/* ->prev isn't RCU safe, walk ->next till the end */
		pos = NULL;
4426
		css_for_each_child(tmp, last)
4427 4428 4429 4430 4431 4432
			pos = tmp;
	} while (pos);

	return last;
}

4433 4434
static struct cgroup_subsys_state *
css_leftmost_descendant(struct cgroup_subsys_state *pos)
4435
{
4436
	struct cgroup_subsys_state *last;
4437 4438 4439

	do {
		last = pos;
4440
		pos = css_next_child(NULL, pos);
4441 4442 4443 4444 4445 4446
	} while (pos);

	return last;
}

/**
4447
 * css_next_descendant_post - find the next descendant for post-order walk
4448
 * @pos: the current position (%NULL to initiate traversal)
4449
 * @root: css whose descendants to walk
4450
 *
4451
 * To be used by css_for_each_descendant_post().  Find the next descendant
4452 4453
 * to visit for post-order traversal of @root's descendants.  @root is
 * included in the iteration and the last node to be visited.
4454
 *
4455 4456 4457 4458 4459
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct next descendant as long
 * as both @pos and @cgroup are accessible and @pos is a descendant of
 * @cgroup.
4460 4461 4462 4463 4464 4465 4466
 *
 * If a subsystem synchronizes ->css_online() and the start of iteration, a
 * css which finished ->css_online() is guaranteed to be visible in the
 * future iterations and will stay visible until the last reference is put.
 * A css which hasn't finished ->css_online() or already finished
 * ->css_offline() may show up during traversal.  It's each subsystem's
 * responsibility to synchronize against on/offlining.
4467
 */
4468 4469 4470
struct cgroup_subsys_state *
css_next_descendant_post(struct cgroup_subsys_state *pos,
			 struct cgroup_subsys_state *root)
4471
{
4472
	struct cgroup_subsys_state *next;
4473

Tejun Heo's avatar
Tejun Heo committed
4474
	cgroup_assert_mutex_or_rcu_locked();
4475

4476 4477 4478
	/* if first iteration, visit leftmost descendant which may be @root */
	if (!pos)
		return css_leftmost_descendant(root);
4479

4480 4481 4482 4483
	/* if we visited @root, we're done */
	if (pos == root)
		return NULL;

4484
	/* if there's an unvisited sibling, visit its leftmost descendant */
Tejun Heo's avatar
Tejun Heo committed
4485
	next = css_next_child(pos, pos->parent);
4486
	if (next)
4487
		return css_leftmost_descendant(next);
4488 4489

	/* no sibling left, visit parent */
Tejun Heo's avatar
Tejun Heo committed
4490
	return pos->parent;
4491 4492
}

4493 4494 4495 4496 4497 4498 4499 4500 4501
/**
 * css_has_online_children - does a css have online children
 * @css: the target css
 *
 * Returns %true if @css has any online children; otherwise, %false.  This
 * function can be called from any context but the caller is responsible
 * for synchronizing against on/offlining as necessary.
 */
bool css_has_online_children(struct cgroup_subsys_state *css)
4502
{
4503 4504
	struct cgroup_subsys_state *child;
	bool ret = false;
4505 4506

	rcu_read_lock();
4507
	css_for_each_child(child, css) {
4508
		if (child->flags & CSS_ONLINE) {
4509 4510
			ret = true;
			break;
4511 4512 4513
		}
	}
	rcu_read_unlock();
4514
	return ret;
4515 4516
}

4517 4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553 4554 4555 4556 4557 4558 4559 4560 4561 4562 4563 4564 4565 4566 4567 4568
static struct css_set *css_task_iter_next_css_set(struct css_task_iter *it)
{
	struct list_head *l;
	struct cgrp_cset_link *link;
	struct css_set *cset;

	lockdep_assert_held(&css_set_lock);

	/* find the next threaded cset */
	if (it->tcset_pos) {
		l = it->tcset_pos->next;

		if (l != it->tcset_head) {
			it->tcset_pos = l;
			return container_of(l, struct css_set,
					    threaded_csets_node);
		}

		it->tcset_pos = NULL;
	}

	/* find the next cset */
	l = it->cset_pos;
	l = l->next;
	if (l == it->cset_head) {
		it->cset_pos = NULL;
		return NULL;
	}

	if (it->ss) {
		cset = container_of(l, struct css_set, e_cset_node[it->ss->id]);
	} else {
		link = list_entry(l, struct cgrp_cset_link, cset_link);
		cset = link->cset;
	}

	it->cset_pos = l;

	/* initialize threaded css_set walking */
	if (it->flags & CSS_TASK_ITER_THREADED) {
		if (it->cur_dcset)
			put_css_set_locked(it->cur_dcset);
		it->cur_dcset = cset;
		get_css_set(cset);

		it->tcset_head = &cset->threaded_csets;
		it->tcset_pos = &cset->threaded_csets;
	}

	return cset;
}

4569
/**
4570
 * css_task_iter_advance_css_set - advance a task iterator to the next css_set
4571 4572 4573
 * @it: the iterator to advance
 *
 * Advance @it to the next css_set to walk.
4574
 */
4575
static void css_task_iter_advance_css_set(struct css_task_iter *it)
4576 4577 4578
{
	struct css_set *cset;

4579
	lockdep_assert_held(&css_set_lock);
4580

4581 4582 4583 4584 4585 4586 4587 4588 4589 4590 4591
	/* Advance to the next non-empty css_set and find first non-empty tasks list*/
	while ((cset = css_task_iter_next_css_set(it))) {
		if (!list_empty(&cset->tasks)) {
			it->cur_tasks_head = &cset->tasks;
			break;
		} else if (!list_empty(&cset->mg_tasks)) {
			it->cur_tasks_head = &cset->mg_tasks;
			break;
		} else if (!list_empty(&cset->dying_tasks)) {
			it->cur_tasks_head = &cset->dying_tasks;
			break;
4592
		}
4593
	}
4594 4595 4596 4597 4598
	if (!cset) {
		it->task_pos = NULL;
		return;
	}
	it->task_pos = it->cur_tasks_head->next;
4599 4600 4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621

	/*
	 * We don't keep css_sets locked across iteration steps and thus
	 * need to take steps to ensure that iteration can be resumed after
	 * the lock is re-acquired.  Iteration is performed at two levels -
	 * css_sets and tasks in them.
	 *
	 * Once created, a css_set never leaves its cgroup lists, so a
	 * pinned css_set is guaranteed to stay put and we can resume
	 * iteration afterwards.
	 *
	 * Tasks may leave @cset across iteration steps.  This is resolved
	 * by registering each iterator with the css_set currently being
	 * walked and making css_set_move_task() advance iterators whose
	 * next task is leaving.
	 */
	if (it->cur_cset) {
		list_del(&it->iters_node);
		put_css_set_locked(it->cur_cset);
	}
	get_css_set(cset);
	it->cur_cset = cset;
	list_add(&it->iters_node, &cset->task_iters);
4622 4623
}

4624 4625
static void css_task_iter_skip(struct css_task_iter *it,
			       struct task_struct *task)
4626
{
4627 4628 4629 4630 4631 4632 4633
	lockdep_assert_held(&css_set_lock);

	if (it->task_pos == &task->cg_list) {
		it->task_pos = it->task_pos->next;
		it->flags |= CSS_TASK_ITER_SKIPPED;
	}
}
4634 4635 4636

static void css_task_iter_advance(struct css_task_iter *it)
{
4637
	struct task_struct *task;
4638

4639
	lockdep_assert_held(&css_set_lock);
4640
repeat:
4641 4642
	if (it->task_pos) {
		/*
4643 4644 4645
		 * Advance iterator to find next entry. We go through cset
		 * tasks, mg_tasks and dying_tasks, when consumed we move onto
		 * the next cset.
4646
		 */
4647 4648 4649 4650
		if (it->flags & CSS_TASK_ITER_SKIPPED)
			it->flags &= ~CSS_TASK_ITER_SKIPPED;
		else
			it->task_pos = it->task_pos->next;
4651

4652 4653 4654
		if (it->task_pos == &it->cur_cset->tasks) {
			it->cur_tasks_head = &it->cur_cset->mg_tasks;
			it->task_pos = it->cur_tasks_head->next;
4655
		}
4656 4657 4658
		if (it->task_pos == &it->cur_cset->mg_tasks) {
			it->cur_tasks_head = &it->cur_cset->dying_tasks;
			it->task_pos = it->cur_tasks_head->next;
4659
		}
4660
		if (it->task_pos == &it->cur_cset->dying_tasks)
4661 4662 4663
			css_task_iter_advance_css_set(it);
	} else {
		/* called from start, proceed to the first cset */
4664
		css_task_iter_advance_css_set(it);
4665
	}
4666

4667 4668 4669 4670 4671 4672 4673 4674 4675 4676 4677
	if (!it->task_pos)
		return;

	task = list_entry(it->task_pos, struct task_struct, cg_list);

	if (it->flags & CSS_TASK_ITER_PROCS) {
		/* if PROCS, skip over tasks which aren't group leaders */
		if (!thread_group_leader(task))
			goto repeat;

		/* and dying leaders w/o live member threads */
4678
		if (it->cur_tasks_head == &it->cur_cset->dying_tasks &&
4679
		    !atomic_read(&task->signal->live))
4680 4681 4682
			goto repeat;
	} else {
		/* skip all dying ones */
4683
		if (it->cur_tasks_head == &it->cur_cset->dying_tasks)
4684 4685
			goto repeat;
	}
4686 4687
}

4688
/**
4689 4690
 * css_task_iter_start - initiate task iteration
 * @css: the css to walk tasks of
4691
 * @flags: CSS_TASK_ITER_* flags
4692 4693
 * @it: the task iterator to use
 *
4694 4695 4696 4697
 * Initiate iteration through the tasks of @css.  The caller can call
 * css_task_iter_next() to walk through the tasks until the function
 * returns NULL.  On completion of iteration, css_task_iter_end() must be
 * called.
4698
 */
4699
void css_task_iter_start(struct cgroup_subsys_state *css, unsigned int flags,
4700
			 struct css_task_iter *it)
4701
{
4702 4703
	memset(it, 0, sizeof(*it));

4704
	spin_lock_irq(&css_set_lock);
4705

4706
	it->ss = css->ss;
4707
	it->flags = flags;
4708

4709
	if (CGROUP_HAS_SUBSYS_CONFIG && it->ss)
4710 4711 4712 4713
		it->cset_pos = &css->cgroup->e_csets[css->ss->id];
	else
		it->cset_pos = &css->cgroup->cset_links;

Tejun Heo's avatar
Tejun Heo committed
4714
	it->cset_head = it->cset_pos;
4715

4716
	css_task_iter_advance(it);
4717

4718
	spin_unlock_irq(&css_set_lock);
4719 4720
}

4721
/**
4722
 * css_task_iter_next - return the next task for the iterator
4723 4724 4725
 * @it: the task iterator being iterated
 *
 * The "next" function for task iteration.  @it should have been
4726 4727
 * initialized via css_task_iter_start().  Returns NULL when the iteration
 * reaches the end.
4728
 */
4729
struct task_struct *css_task_iter_next(struct css_task_iter *it)
4730
{
4731
	if (it->cur_task) {
4732
		put_task_struct(it->cur_task);
4733 4734
		it->cur_task = NULL;
	}
4735

4736
	spin_lock_irq(&css_set_lock);
4737

4738 4739 4740 4741
	/* @it may be half-advanced by skips, finish advancing */
	if (it->flags & CSS_TASK_ITER_SKIPPED)
		css_task_iter_advance(it);

4742 4743 4744 4745 4746 4747
	if (it->task_pos) {
		it->cur_task = list_entry(it->task_pos, struct task_struct,
					  cg_list);
		get_task_struct(it->cur_task);
		css_task_iter_advance(it);
	}
4748

4749
	spin_unlock_irq(&css_set_lock);
4750 4751

	return it->cur_task;
4752 4753
}

4754
/**
4755
 * css_task_iter_end - finish task iteration
4756 4757
 * @it: the task iterator to finish
 *
4758
 * Finish task iteration started by css_task_iter_start().
4759
 */
4760
void css_task_iter_end(struct css_task_iter *it)
4761
{
4762
	if (it->cur_cset) {
4763
		spin_lock_irq(&css_set_lock);
4764 4765
		list_del(&it->iters_node);
		put_css_set_locked(it->cur_cset);
4766
		spin_unlock_irq(&css_set_lock);
4767 4768
	}

4769 4770 4771
	if (it->cur_dcset)
		put_css_set(it->cur_dcset);

4772 4773
	if (it->cur_task)
		put_task_struct(it->cur_task);
4774 4775
}

4776
static void cgroup_procs_release(struct kernfs_open_file *of)
4777
{
4778 4779 4780 4781
	struct cgroup_file_ctx *ctx = of->priv;

	if (ctx->procs.started)
		css_task_iter_end(&ctx->procs.iter);
4782
}
4783

4784 4785 4786
static void *cgroup_procs_next(struct seq_file *s, void *v, loff_t *pos)
{
	struct kernfs_open_file *of = s->private;
4787
	struct cgroup_file_ctx *ctx = of->priv;
4788

4789 4790 4791
	if (pos)
		(*pos)++;

4792
	return css_task_iter_next(&ctx->procs.iter);
4793
}
4794

4795 4796
static void *__cgroup_procs_start(struct seq_file *s, loff_t *pos,
				  unsigned int iter_flags)
4797 4798 4799
{
	struct kernfs_open_file *of = s->private;
	struct cgroup *cgrp = seq_css(s)->cgroup;
4800 4801
	struct cgroup_file_ctx *ctx = of->priv;
	struct css_task_iter *it = &ctx->procs.iter;
4802

4803
	/*
4804 4805
	 * When a seq_file is seeked, it's always traversed sequentially
	 * from position 0, so we can simply keep iterating on !0 *pos.
4806
	 */
4807
	if (!ctx->procs.started) {
4808
		if (WARN_ON_ONCE((*pos)))
4809
			return ERR_PTR(-EINVAL);
4810
		css_task_iter_start(&cgrp->self, iter_flags, it);
4811
		ctx->procs.started = true;
4812
	} else if (!(*pos)) {
4813
		css_task_iter_end(it);
4814
		css_task_iter_start(&cgrp->self, iter_flags, it);
4815 4816
	} else
		return it->cur_task;
4817

4818 4819
	return cgroup_procs_next(s, NULL, NULL);
}
4820

4821 4822 4823 4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836 4837
static void *cgroup_procs_start(struct seq_file *s, loff_t *pos)
{
	struct cgroup *cgrp = seq_css(s)->cgroup;

	/*
	 * All processes of a threaded subtree belong to the domain cgroup
	 * of the subtree.  Only threads can be distributed across the
	 * subtree.  Reject reads on cgroup.procs in the subtree proper.
	 * They're always empty anyway.
	 */
	if (cgroup_is_threaded(cgrp))
		return ERR_PTR(-EOPNOTSUPP);

	return __cgroup_procs_start(s, pos, CSS_TASK_ITER_PROCS |
					    CSS_TASK_ITER_THREADED);
}

4838
static int cgroup_procs_show(struct seq_file *s, void *v)
4839
{
4840
	seq_printf(s, "%d\n", task_pid_vnr(v));
4841 4842 4843
	return 0;
}

4844 4845 4846 4847 4848 4849 4850 4851 4852 4853 4854
static int cgroup_may_write(const struct cgroup *cgrp, struct super_block *sb)
{
	int ret;
	struct inode *inode;

	lockdep_assert_held(&cgroup_mutex);

	inode = kernfs_get_inode(sb, cgrp->procs_file.kn);
	if (!inode)
		return -ENOMEM;

4855
	ret = inode_permission(&init_user_ns, inode, MAY_WRITE);
4856 4857 4858 4859
	iput(inode);
	return ret;
}

4860 4861
static int cgroup_procs_write_permission(struct cgroup *src_cgrp,
					 struct cgroup *dst_cgrp,
4862 4863
					 struct super_block *sb,
					 struct cgroup_namespace *ns)
4864 4865 4866 4867 4868 4869 4870 4871 4872 4873 4874
{
	struct cgroup *com_cgrp = src_cgrp;
	int ret;

	lockdep_assert_held(&cgroup_mutex);

	/* find the common ancestor */
	while (!cgroup_is_descendant(dst_cgrp, com_cgrp))
		com_cgrp = cgroup_parent(com_cgrp);

	/* %current should be authorized to migrate to the common ancestor */
4875
	ret = cgroup_may_write(com_cgrp, sb);
4876 4877 4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888 4889 4890
	if (ret)
		return ret;

	/*
	 * If namespaces are delegation boundaries, %current must be able
	 * to see both source and destination cgroups from its namespace.
	 */
	if ((cgrp_dfl_root.flags & CGRP_ROOT_NS_DELEGATE) &&
	    (!cgroup_is_descendant(src_cgrp, ns->root_cset->dfl_cgrp) ||
	     !cgroup_is_descendant(dst_cgrp, ns->root_cset->dfl_cgrp)))
		return -ENOENT;

	return 0;
}

4891 4892
static int cgroup_attach_permissions(struct cgroup *src_cgrp,
				     struct cgroup *dst_cgrp,
4893 4894
				     struct super_block *sb, bool threadgroup,
				     struct cgroup_namespace *ns)
4895 4896 4897
{
	int ret = 0;

4898
	ret = cgroup_procs_write_permission(src_cgrp, dst_cgrp, sb, ns);
4899 4900 4901 4902 4903 4904 4905 4906 4907 4908 4909 4910 4911
	if (ret)
		return ret;

	ret = cgroup_migrate_vet_dst(dst_cgrp);
	if (ret)
		return ret;

	if (!threadgroup && (src_cgrp->dom_cgrp != dst_cgrp->dom_cgrp))
		ret = -EOPNOTSUPP;

	return ret;
}

4912 4913
static ssize_t __cgroup_procs_write(struct kernfs_open_file *of, char *buf,
				    bool threadgroup)
4914
{
4915
	struct cgroup_file_ctx *ctx = of->priv;
4916 4917
	struct cgroup *src_cgrp, *dst_cgrp;
	struct task_struct *task;
4918
	const struct cred *saved_cred;
4919
	ssize_t ret;
4920
	bool locked;
4921 4922 4923 4924 4925

	dst_cgrp = cgroup_kn_lock_live(of->kn, false);
	if (!dst_cgrp)
		return -ENODEV;

4926
	task = cgroup_procs_write_start(buf, threadgroup, &locked);
4927 4928 4929 4930 4931 4932 4933 4934 4935
	ret = PTR_ERR_OR_ZERO(task);
	if (ret)
		goto out_unlock;

	/* find the source cgroup */
	spin_lock_irq(&css_set_lock);
	src_cgrp = task_cgroup_from_root(task, &cgrp_dfl_root);
	spin_unlock_irq(&css_set_lock);

4936 4937 4938 4939 4940 4941
	/*
	 * Process and thread migrations follow same delegation rule. Check
	 * permissions using the credentials from file open to protect against
	 * inherited fd attacks.
	 */
	saved_cred = override_creds(of->file->f_cred);
4942
	ret = cgroup_attach_permissions(src_cgrp, dst_cgrp,
4943 4944
					of->file->f_path.dentry->d_sb,
					threadgroup, ctx->ns);
4945
	revert_creds(saved_cred);
4946 4947 4948
	if (ret)
		goto out_finish;

4949
	ret = cgroup_attach_task(dst_cgrp, task, threadgroup);
4950 4951

out_finish:
4952
	cgroup_procs_write_finish(task, locked);
4953 4954 4955
out_unlock:
	cgroup_kn_unlock(of->kn);

4956 4957 4958 4959 4960 4961 4962
	return ret;
}

static ssize_t cgroup_procs_write(struct kernfs_open_file *of,
				  char *buf, size_t nbytes, loff_t off)
{
	return __cgroup_procs_write(of, buf, true) ?: nbytes;
4963 4964
}

4965 4966 4967 4968 4969 4970 4971 4972
static void *cgroup_threads_start(struct seq_file *s, loff_t *pos)
{
	return __cgroup_procs_start(s, pos, 0);
}

static ssize_t cgroup_threads_write(struct kernfs_open_file *of,
				    char *buf, size_t nbytes, loff_t off)
{
4973
	return __cgroup_procs_write(of, buf, false) ?: nbytes;
4974 4975
}

4976
/* cgroup core interface files for the default hierarchy */
4977
static struct cftype cgroup_base_files[] = {
4978 4979 4980 4981 4982 4983
	{
		.name = "cgroup.type",
		.flags = CFTYPE_NOT_ON_ROOT,
		.seq_show = cgroup_type_show,
		.write = cgroup_type_write,
	},
4984
	{
4985
		.name = "cgroup.procs",
4986
		.flags = CFTYPE_NS_DELEGATABLE,
4987
		.file_offset = offsetof(struct cgroup, procs_file),
4988 4989 4990 4991
		.release = cgroup_procs_release,
		.seq_start = cgroup_procs_start,
		.seq_next = cgroup_procs_next,
		.seq_show = cgroup_procs_show,
4992
		.write = cgroup_procs_write,
4993
	},
4994 4995
	{
		.name = "cgroup.threads",
4996
		.flags = CFTYPE_NS_DELEGATABLE,
4997 4998 4999 5000 5001 5002
		.release = cgroup_procs_release,
		.seq_start = cgroup_threads_start,
		.seq_next = cgroup_procs_next,
		.seq_show = cgroup_procs_show,
		.write = cgroup_threads_write,
	},
5003 5004 5005 5006 5007 5008
	{
		.name = "cgroup.controllers",
		.seq_show = cgroup_controllers_show,
	},
	{
		.name = "cgroup.subtree_control",
5009
		.flags = CFTYPE_NS_DELEGATABLE,
5010
		.seq_show = cgroup_subtree_control_show,
5011
		.write = cgroup_subtree_control_write,
5012
	},
5013
	{
5014
		.name = "cgroup.events",
5015
		.flags = CFTYPE_NOT_ON_ROOT,
5016
		.file_offset = offsetof(struct cgroup, events_file),
5017
		.seq_show = cgroup_events_show,
5018
	},
5019 5020 5021 5022 5023 5024 5025 5026 5027 5028
	{
		.name = "cgroup.max.descendants",
		.seq_show = cgroup_max_descendants_show,
		.write = cgroup_max_descendants_write,
	},
	{
		.name = "cgroup.max.depth",
		.seq_show = cgroup_max_depth_show,
		.write = cgroup_max_depth_write,
	},
5029 5030
	{
		.name = "cgroup.stat",
Tejun Heo's avatar
Tejun Heo committed
5031
		.seq_show = cgroup_stat_show,
5032
	},
Roman Gushchin's avatar
Roman Gushchin committed
5033 5034 5035 5036 5037 5038
	{
		.name = "cgroup.freeze",
		.flags = CFTYPE_NOT_ON_ROOT,
		.seq_show = cgroup_freeze_show,
		.write = cgroup_freeze_write,
	},
5039 5040 5041 5042 5043
	{
		.name = "cgroup.kill",
		.flags = CFTYPE_NOT_ON_ROOT,
		.write = cgroup_kill_write,
	},
5044 5045 5046 5047
	{
		.name = "cpu.stat",
		.seq_show = cpu_stat_show,
	},
Johannes Weiner's avatar
Johannes Weiner committed
5048 5049 5050
#ifdef CONFIG_PSI
	{
		.name = "io.pressure",
5051
		.flags = CFTYPE_PRESSURE,
Johannes Weiner's avatar
Johannes Weiner committed
5052
		.seq_show = cgroup_io_pressure_show,
5053 5054 5055
		.write = cgroup_io_pressure_write,
		.poll = cgroup_pressure_poll,
		.release = cgroup_pressure_release,
Johannes Weiner's avatar
Johannes Weiner committed
5056 5057 5058
	},
	{
		.name = "memory.pressure",
5059
		.flags = CFTYPE_PRESSURE,
Johannes Weiner's avatar
Johannes Weiner committed
5060
		.seq_show = cgroup_memory_pressure_show,
5061 5062 5063
		.write = cgroup_memory_pressure_write,
		.poll = cgroup_pressure_poll,
		.release = cgroup_pressure_release,
Johannes Weiner's avatar
Johannes Weiner committed
5064 5065 5066
	},
	{
		.name = "cpu.pressure",
5067
		.flags = CFTYPE_PRESSURE,
Johannes Weiner's avatar
Johannes Weiner committed
5068
		.seq_show = cgroup_cpu_pressure_show,
5069 5070 5071
		.write = cgroup_cpu_pressure_write,
		.poll = cgroup_pressure_poll,
		.release = cgroup_pressure_release,
Johannes Weiner's avatar
Johannes Weiner committed
5072
	},
5073
#endif /* CONFIG_PSI */
5074 5075
	{ }	/* terminate */
};
5076

5077 5078 5079 5080 5081 5082 5083
/*
 * css destruction is four-stage process.
 *
 * 1. Destruction starts.  Killing of the percpu_ref is initiated.
 *    Implemented in kill_css().
 *
 * 2. When the percpu_ref is confirmed to be visible as killed on all CPUs
5084 5085 5086
 *    and thus css_tryget_online() is guaranteed to fail, the css can be
 *    offlined by invoking offline_css().  After offlining, the base ref is
 *    put.  Implemented in css_killed_work_fn().
5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098
 *
 * 3. When the percpu_ref reaches zero, the only possible remaining
 *    accessors are inside RCU read sections.  css_release() schedules the
 *    RCU callback.
 *
 * 4. After the grace period, the css can be freed.  Implemented in
 *    css_free_work_fn().
 *
 * It is actually hairier because both step 2 and 4 require process context
 * and thus involve punting to css->destroy_work adding two additional
 * steps to the already complex sequence.
 */
5099
static void css_free_rwork_fn(struct work_struct *work)
5100
{
5101 5102
	struct cgroup_subsys_state *css = container_of(to_rcu_work(work),
				struct cgroup_subsys_state, destroy_rwork);
5103
	struct cgroup_subsys *ss = css->ss;
5104
	struct cgroup *cgrp = css->cgroup;
5105

5106 5107
	percpu_ref_exit(&css->refcnt);

5108
	if (ss) {
5109
		/* css free path */
5110
		struct cgroup_subsys_state *parent = css->parent;
5111 5112 5113 5114
		int id = css->id;

		ss->css_free(css);
		cgroup_idr_remove(&ss->css_idr, id);
5115
		cgroup_put(cgrp);
5116 5117 5118

		if (parent)
			css_put(parent);
5119 5120 5121
	} else {
		/* cgroup free path */
		atomic_dec(&cgrp->root->nr_cgrps);
5122
		cgroup1_pidlist_destroy_all(cgrp);
5123
		cancel_work_sync(&cgrp->release_agent_work);
5124

Tejun Heo's avatar
Tejun Heo committed
5125
		if (cgroup_parent(cgrp)) {
5126 5127 5128 5129 5130 5131
			/*
			 * We get a ref to the parent, and put the ref when
			 * this cgroup is being freed, so it's guaranteed
			 * that the parent won't be destroyed before its
			 * children.
			 */
Tejun Heo's avatar
Tejun Heo committed
5132
			cgroup_put(cgroup_parent(cgrp));
5133
			kernfs_put(cgrp->kn);
Johannes Weiner's avatar
Johannes Weiner committed
5134
			psi_cgroup_free(cgrp);
5135
			cgroup_rstat_exit(cgrp);
5136 5137 5138 5139 5140 5141 5142 5143 5144 5145
			kfree(cgrp);
		} else {
			/*
			 * This is root cgroup's refcnt reaching zero,
			 * which indicates that the root should be
			 * released.
			 */
			cgroup_destroy_root(cgrp->root);
		}
	}
5146 5147
}

5148
static void css_release_work_fn(struct work_struct *work)
5149 5150
{
	struct cgroup_subsys_state *css =
5151
		container_of(work, struct cgroup_subsys_state, destroy_work);
5152
	struct cgroup_subsys *ss = css->ss;
5153
	struct cgroup *cgrp = css->cgroup;
5154

5155 5156
	mutex_lock(&cgroup_mutex);

5157
	css->flags |= CSS_RELEASED;
5158 5159
	list_del_rcu(&css->sibling);

5160 5161
	if (ss) {
		/* css release path */
5162 5163 5164 5165 5166
		if (!list_empty(&css->rstat_css_node)) {
			cgroup_rstat_flush(cgrp);
			list_del_rcu(&css->rstat_css_node);
		}

5167
		cgroup_idr_replace(&ss->css_idr, NULL, css->id);
5168 5169
		if (ss->css_released)
			ss->css_released(css);
5170
	} else {
5171 5172
		struct cgroup *tcgrp;

5173
		/* cgroup release path */
5174
		TRACE_CGROUP_PATH(release, cgrp);
5175

5176
		cgroup_rstat_flush(cgrp);
5177

5178
		spin_lock_irq(&css_set_lock);
5179 5180 5181
		for (tcgrp = cgroup_parent(cgrp); tcgrp;
		     tcgrp = cgroup_parent(tcgrp))
			tcgrp->nr_dying_descendants--;
5182
		spin_unlock_irq(&css_set_lock);
5183

5184 5185 5186 5187 5188 5189 5190
		/*
		 * There are two control paths which try to determine
		 * cgroup from dentry without going through kernfs -
		 * cgroupstats_build() and css_tryget_online_from_dir().
		 * Those are supported by RCU protecting clearing of
		 * cgrp->kn->priv backpointer.
		 */
5191 5192 5193
		if (cgrp->kn)
			RCU_INIT_POINTER(*(void __rcu __force **)&cgrp->kn->priv,
					 NULL);
5194
	}
5195

5196 5197
	mutex_unlock(&cgroup_mutex);

5198 5199
	INIT_RCU_WORK(&css->destroy_rwork, css_free_rwork_fn);
	queue_rcu_work(cgroup_destroy_wq, &css->destroy_rwork);
5200 5201 5202 5203 5204 5205 5206
}

static void css_release(struct percpu_ref *ref)
{
	struct cgroup_subsys_state *css =
		container_of(ref, struct cgroup_subsys_state, refcnt);

5207 5208
	INIT_WORK(&css->destroy_work, css_release_work_fn);
	queue_work(cgroup_destroy_wq, &css->destroy_work);
5209 5210
}

5211 5212
static void init_and_link_css(struct cgroup_subsys_state *css,
			      struct cgroup_subsys *ss, struct cgroup *cgrp)
5213
{
5214 5215
	lockdep_assert_held(&cgroup_mutex);

5216
	cgroup_get_live(cgrp);
5217

5218
	memset(css, 0, sizeof(*css));
5219
	css->cgroup = cgrp;
5220
	css->ss = ss;
5221
	css->id = -1;
5222 5223
	INIT_LIST_HEAD(&css->sibling);
	INIT_LIST_HEAD(&css->children);
5224
	INIT_LIST_HEAD(&css->rstat_css_node);
5225
	css->serial_nr = css_serial_nr_next++;
5226
	atomic_set(&css->online_cnt, 0);
5227

Tejun Heo's avatar
Tejun Heo committed
5228 5229
	if (cgroup_parent(cgrp)) {
		css->parent = cgroup_css(cgroup_parent(cgrp), ss);
5230 5231
		css_get(css->parent);
	}
5232

5233
	if (ss->css_rstat_flush)
5234 5235
		list_add_rcu(&css->rstat_css_node, &cgrp->rstat_css_list);

5236
	BUG_ON(cgroup_css(cgrp, ss));
5237 5238
}

5239
/* invoke ->css_online() on a new CSS and mark it online if successful */
5240
static int online_css(struct cgroup_subsys_state *css)
5241
{
5242
	struct cgroup_subsys *ss = css->ss;
5243 5244
	int ret = 0;

5245 5246
	lockdep_assert_held(&cgroup_mutex);

5247
	if (ss->css_online)
5248
		ret = ss->css_online(css);
5249
	if (!ret) {
5250
		css->flags |= CSS_ONLINE;
5251
		rcu_assign_pointer(css->cgroup->subsys[ss->id], css);
5252 5253 5254 5255

		atomic_inc(&css->online_cnt);
		if (css->parent)
			atomic_inc(&css->parent->online_cnt);
5256
	}
5257
	return ret;
5258 5259
}

5260
/* if the CSS is online, invoke ->css_offline() on it and mark it offline */
5261
static void offline_css(struct cgroup_subsys_state *css)
5262
{
5263
	struct cgroup_subsys *ss = css->ss;
5264 5265 5266 5267 5268 5269

	lockdep_assert_held(&cgroup_mutex);

	if (!(css->flags & CSS_ONLINE))
		return;

5270
	if (ss->css_offline)
5271
		ss->css_offline(css);
5272

5273
	css->flags &= ~CSS_ONLINE;
5274
	RCU_INIT_POINTER(css->cgroup->subsys[ss->id], NULL);
5275 5276

	wake_up_all(&css->cgroup->offline_waitq);
5277 5278
}

5279
/**
5280
 * css_create - create a cgroup_subsys_state
5281 5282 5283 5284
 * @cgrp: the cgroup new css will be associated with
 * @ss: the subsys of new css
 *
 * Create a new css associated with @cgrp - @ss pair.  On success, the new
5285 5286
 * css is online and installed in @cgrp.  This function doesn't create the
 * interface files.  Returns 0 on success, -errno on failure.
5287
 */
5288 5289
static struct cgroup_subsys_state *css_create(struct cgroup *cgrp,
					      struct cgroup_subsys *ss)
5290
{
Tejun Heo's avatar
Tejun Heo committed
5291
	struct cgroup *parent = cgroup_parent(cgrp);
5292
	struct cgroup_subsys_state *parent_css = cgroup_css(parent, ss);
5293 5294 5295 5296 5297
	struct cgroup_subsys_state *css;
	int err;

	lockdep_assert_held(&cgroup_mutex);

5298
	css = ss->css_alloc(parent_css);
5299 5300
	if (!css)
		css = ERR_PTR(-ENOMEM);
5301
	if (IS_ERR(css))
5302
		return css;
5303

5304
	init_and_link_css(css, ss, cgrp);
5305

5306
	err = percpu_ref_init(&css->refcnt, css_release, 0, GFP_KERNEL);
5307
	if (err)
5308
		goto err_free_css;
5309

5310
	err = cgroup_idr_alloc(&ss->css_idr, NULL, 2, 0, GFP_KERNEL);
5311
	if (err < 0)
5312
		goto err_free_css;
5313
	css->id = err;
5314

5315
	/* @css is ready to be brought online now, make it visible */
5316
	list_add_tail_rcu(&css->sibling, &parent_css->children);
5317
	cgroup_idr_replace(&ss->css_idr, css, css->id);
5318 5319 5320

	err = online_css(css);
	if (err)
5321
		goto err_list_del;
5322

5323
	return css;
5324

5325 5326
err_list_del:
	list_del_rcu(&css->sibling);
5327
err_free_css:
5328
	list_del_rcu(&css->rstat_css_node);
5329 5330
	INIT_RCU_WORK(&css->destroy_rwork, css_free_rwork_fn);
	queue_rcu_work(cgroup_destroy_wq, &css->destroy_rwork);
5331
	return ERR_PTR(err);
5332 5333
}

5334 5335 5336 5337 5338
/*
 * The returned cgroup is fully initialized including its control mask, but
 * it isn't associated with its kernfs_node and doesn't have the control
 * mask applied.
 */
5339 5340
static struct cgroup *cgroup_create(struct cgroup *parent, const char *name,
				    umode_t mode)
5341
{
5342 5343
	struct cgroup_root *root = parent->root;
	struct cgroup *cgrp, *tcgrp;
5344
	struct kernfs_node *kn;
5345
	int level = parent->level + 1;
5346
	int ret;
5347

Tejun Heo's avatar
Tejun Heo committed
5348
	/* allocate the cgroup and its ID, 0 is reserved for the root */
5349 5350
	cgrp = kzalloc(struct_size(cgrp, ancestor_ids, (level + 1)),
		       GFP_KERNEL);
5351 5352
	if (!cgrp)
		return ERR_PTR(-ENOMEM);
5353

5354
	ret = percpu_ref_init(&cgrp->self.refcnt, css_release, 0, GFP_KERNEL);
5355 5356 5357
	if (ret)
		goto out_free_cgrp;

5358 5359 5360
	ret = cgroup_rstat_init(cgrp);
	if (ret)
		goto out_cancel_ref;
5361

5362 5363 5364 5365
	/* create the directory */
	kn = kernfs_create_dir(parent->kn, name, mode, cgrp);
	if (IS_ERR(kn)) {
		ret = PTR_ERR(kn);
5366
		goto out_stat_exit;
5367
	}
5368
	cgrp->kn = kn;
5369

5370
	init_cgroup_housekeeping(cgrp);
5371

5372
	cgrp->self.parent = &parent->self;
5373
	cgrp->root = root;
5374
	cgrp->level = level;
Johannes Weiner's avatar
Johannes Weiner committed
5375 5376

	ret = psi_cgroup_alloc(cgrp);
5377
	if (ret)
5378
		goto out_kernfs_remove;
5379

Johannes Weiner's avatar
Johannes Weiner committed
5380 5381 5382 5383
	ret = cgroup_bpf_inherit(cgrp);
	if (ret)
		goto out_psi_free;

Roman Gushchin's avatar
Roman Gushchin committed
5384 5385 5386 5387 5388
	/*
	 * New cgroup inherits effective freeze counter, and
	 * if the parent has to be frozen, the child has too.
	 */
	cgrp->freezer.e_freeze = parent->freezer.e_freeze;
5389 5390 5391 5392 5393 5394 5395 5396
	if (cgrp->freezer.e_freeze) {
		/*
		 * Set the CGRP_FREEZE flag, so when a process will be
		 * attached to the child cgroup, it will become frozen.
		 * At this point the new cgroup is unpopulated, so we can
		 * consider it frozen immediately.
		 */
		set_bit(CGRP_FREEZE, &cgrp->flags);
Roman Gushchin's avatar
Roman Gushchin committed
5397
		set_bit(CGRP_FROZEN, &cgrp->flags);
5398
	}
Roman Gushchin's avatar
Roman Gushchin committed
5399

5400
	spin_lock_irq(&css_set_lock);
5401
	for (tcgrp = cgrp; tcgrp; tcgrp = cgroup_parent(tcgrp)) {
5402
		cgrp->ancestor_ids[tcgrp->level] = cgroup_id(tcgrp);
5403

Roman Gushchin's avatar
Roman Gushchin committed
5404
		if (tcgrp != cgrp) {
5405
			tcgrp->nr_descendants++;
Roman Gushchin's avatar
Roman Gushchin committed
5406 5407 5408 5409 5410 5411 5412 5413 5414

			/*
			 * If the new cgroup is frozen, all ancestor cgroups
			 * get a new frozen descendant, but their state can't
			 * change because of this.
			 */
			if (cgrp->freezer.e_freeze)
				tcgrp->freezer.nr_frozen_descendants++;
		}
5415
	}
5416
	spin_unlock_irq(&css_set_lock);
5417

5418 5419 5420
	if (notify_on_release(parent))
		set_bit(CGRP_NOTIFY_ON_RELEASE, &cgrp->flags);

5421 5422
	if (test_bit(CGRP_CPUSET_CLONE_CHILDREN, &parent->flags))
		set_bit(CGRP_CPUSET_CLONE_CHILDREN, &cgrp->flags);
5423

5424
	cgrp->self.serial_nr = css_serial_nr_next++;
5425

5426
	/* allocation complete, commit to creation */
5427
	list_add_tail_rcu(&cgrp->self.sibling, &cgroup_parent(cgrp)->self.children);
5428
	atomic_inc(&root->nr_cgrps);
5429
	cgroup_get_live(parent);
5430

5431 5432
	/*
	 * On the default hierarchy, a child doesn't automatically inherit
5433
	 * subtree_control from the parent.  Each is configured manually.
5434
	 */
5435
	if (!cgroup_on_dfl(cgrp))
5436
		cgrp->subtree_control = cgroup_control(cgrp);
5437 5438 5439

	cgroup_propagate_control(cgrp);

5440 5441
	return cgrp;

Johannes Weiner's avatar
Johannes Weiner committed
5442 5443
out_psi_free:
	psi_cgroup_free(cgrp);
5444 5445
out_kernfs_remove:
	kernfs_remove(cgrp->kn);
5446
out_stat_exit:
5447
	cgroup_rstat_exit(cgrp);
5448 5449 5450 5451 5452 5453 5454
out_cancel_ref:
	percpu_ref_exit(&cgrp->self.refcnt);
out_free_cgrp:
	kfree(cgrp);
	return ERR_PTR(ret);
}

5455 5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477
static bool cgroup_check_hierarchy_limits(struct cgroup *parent)
{
	struct cgroup *cgroup;
	int ret = false;
	int level = 1;

	lockdep_assert_held(&cgroup_mutex);

	for (cgroup = parent; cgroup; cgroup = cgroup_parent(cgroup)) {
		if (cgroup->nr_descendants >= cgroup->max_descendants)
			goto fail;

		if (level > cgroup->max_depth)
			goto fail;

		level++;
	}

	ret = true;
fail:
	return ret;
}

5478
int cgroup_mkdir(struct kernfs_node *parent_kn, const char *name, umode_t mode)
5479 5480
{
	struct cgroup *parent, *cgrp;
5481
	int ret;
5482 5483 5484 5485 5486

	/* do not accept '\n' to prevent making /proc/<pid>/cgroup unparsable */
	if (strchr(name, '\n'))
		return -EINVAL;

5487
	parent = cgroup_kn_lock_live(parent_kn, false);
5488 5489 5490
	if (!parent)
		return -ENODEV;

5491 5492 5493 5494 5495
	if (!cgroup_check_hierarchy_limits(parent)) {
		ret = -EAGAIN;
		goto out_unlock;
	}

5496
	cgrp = cgroup_create(parent, name, mode);
5497 5498 5499 5500 5501
	if (IS_ERR(cgrp)) {
		ret = PTR_ERR(cgrp);
		goto out_unlock;
	}

5502 5503 5504 5505
	/*
	 * This extra ref will be put in cgroup_free_fn() and guarantees
	 * that @cgrp->kn is always accessible.
	 */
5506
	kernfs_get(cgrp->kn);
5507

5508
	ret = cgroup_kn_set_ugid(cgrp->kn);
5509 5510 5511
	if (ret)
		goto out_destroy;

5512
	ret = css_populate_dir(&cgrp->self);
5513 5514 5515
	if (ret)
		goto out_destroy;

5516 5517 5518
	ret = cgroup_apply_control_enable(cgrp);
	if (ret)
		goto out_destroy;
5519

5520
	TRACE_CGROUP_PATH(mkdir, cgrp);
5521

5522
	/* let's create and online css's */
5523
	kernfs_activate(cgrp->kn);
5524

5525 5526
	ret = 0;
	goto out_unlock;
5527

5528 5529
out_destroy:
	cgroup_destroy_locked(cgrp);
5530
out_unlock:
5531
	cgroup_kn_unlock(parent_kn);
5532
	return ret;
5533 5534
}

5535 5536
/*
 * This is called when the refcnt of a css is confirmed to be killed.
5537
 * css_tryget_online() is now guaranteed to fail.  Tell the subsystem to
Zhen Lei's avatar
Zhen Lei committed
5538
 * initiate destruction and put the css ref from kill_css().
5539 5540
 */
static void css_killed_work_fn(struct work_struct *work)
5541
{
5542 5543
	struct cgroup_subsys_state *css =
		container_of(work, struct cgroup_subsys_state, destroy_work);
5544

5545
	mutex_lock(&cgroup_mutex);
5546

5547 5548 5549 5550 5551 5552 5553 5554
	do {
		offline_css(css);
		css_put(css);
		/* @css can't go away while we're holding cgroup_mutex */
		css = css->parent;
	} while (css && atomic_dec_and_test(&css->online_cnt));

	mutex_unlock(&cgroup_mutex);
5555 5556
}

5557 5558
/* css kill confirmation processing requires process context, bounce */
static void css_killed_ref_fn(struct percpu_ref *ref)
5559 5560 5561 5562
{
	struct cgroup_subsys_state *css =
		container_of(ref, struct cgroup_subsys_state, refcnt);

5563 5564 5565 5566
	if (atomic_dec_and_test(&css->online_cnt)) {
		INIT_WORK(&css->destroy_work, css_killed_work_fn);
		queue_work(cgroup_destroy_wq, &css->destroy_work);
	}
5567 5568
}

5569 5570 5571 5572 5573 5574
/**
 * kill_css - destroy a css
 * @css: css to destroy
 *
 * This function initiates destruction of @css by removing cgroup interface
 * files and putting its base reference.  ->css_offline() will be invoked
5575 5576
 * asynchronously once css_tryget_online() is guaranteed to fail and when
 * the reference count reaches zero, @css will be released.
5577 5578
 */
static void kill_css(struct cgroup_subsys_state *css)
Tejun Heo's avatar
Tejun Heo committed
5579
{
5580
	lockdep_assert_held(&cgroup_mutex);
5581

5582 5583 5584 5585 5586
	if (css->flags & CSS_DYING)
		return;

	css->flags |= CSS_DYING;

Tejun Heo's avatar
Tejun Heo committed
5587 5588 5589 5590
	/*
	 * This must happen before css is disassociated with its cgroup.
	 * See seq_css() for details.
	 */
5591
	css_clear_dir(css);
5592

Tejun Heo's avatar
Tejun Heo committed
5593 5594 5595 5596 5597 5598 5599 5600 5601
	/*
	 * Killing would put the base ref, but we need to keep it alive
	 * until after ->css_offline().
	 */
	css_get(css);

	/*
	 * cgroup core guarantees that, by the time ->css_offline() is
	 * invoked, no new css reference will be given out via
5602
	 * css_tryget_online().  We can't simply call percpu_ref_kill() and
Tejun Heo's avatar
Tejun Heo committed
5603 5604 5605 5606 5607 5608 5609
	 * proceed to offlining css's because percpu_ref_kill() doesn't
	 * guarantee that the ref is seen as killed on all CPUs on return.
	 *
	 * Use percpu_ref_kill_and_confirm() to get notifications as each
	 * css is confirmed to be seen as killed on all CPUs.
	 */
	percpu_ref_kill_and_confirm(&css->refcnt, css_killed_ref_fn);
5610 5611 5612 5613 5614 5615 5616 5617
}

/**
 * cgroup_destroy_locked - the first stage of cgroup destruction
 * @cgrp: cgroup to be destroyed
 *
 * css's make use of percpu refcnts whose killing latency shouldn't be
 * exposed to userland and are RCU protected.  Also, cgroup core needs to
5618 5619 5620
 * guarantee that css_tryget_online() won't succeed by the time
 * ->css_offline() is invoked.  To satisfy all the requirements,
 * destruction is implemented in the following two steps.
5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631 5632 5633 5634 5635
 *
 * s1. Verify @cgrp can be destroyed and mark it dying.  Remove all
 *     userland visible parts and start killing the percpu refcnts of
 *     css's.  Set up so that the next stage will be kicked off once all
 *     the percpu refcnts are confirmed to be killed.
 *
 * s2. Invoke ->css_offline(), mark the cgroup dead and proceed with the
 *     rest of destruction.  Once all cgroup references are gone, the
 *     cgroup is RCU-freed.
 *
 * This function implements s1.  After this step, @cgrp is gone as far as
 * the userland is concerned and a new cgroup with the same name may be
 * created.  As cgroup doesn't care about the names internally, this
 * doesn't cause any problem.
 */
5636 5637
static int cgroup_destroy_locked(struct cgroup *cgrp)
	__releases(&cgroup_mutex) __acquires(&cgroup_mutex)
5638
{
5639
	struct cgroup *tcgrp, *parent = cgroup_parent(cgrp);
Tejun Heo's avatar
Tejun Heo committed
5640
	struct cgroup_subsys_state *css;
5641
	struct cgrp_cset_link *link;
Tejun Heo's avatar
Tejun Heo committed
5642
	int ssid;
5643

5644 5645
	lockdep_assert_held(&cgroup_mutex);

5646 5647 5648 5649 5650
	/*
	 * Only migration can raise populated from zero and we're already
	 * holding cgroup_mutex.
	 */
	if (cgroup_is_populated(cgrp))
5651
		return -EBUSY;
Li Zefan's avatar
Li Zefan committed
5652

5653
	/*
5654 5655 5656
	 * Make sure there's no live children.  We can't test emptiness of
	 * ->self.children as dead children linger on it while being
	 * drained; otherwise, "rmdir parent/child parent" may fail.
5657
	 */
5658
	if (css_has_online_children(&cgrp->self))
5659 5660
		return -EBUSY;

5661
	/*
5662 5663 5664 5665
	 * Mark @cgrp and the associated csets dead.  The former prevents
	 * further task migration and child creation by disabling
	 * cgroup_lock_live_group().  The latter makes the csets ignored by
	 * the migration path.
5666
	 */
5667
	cgrp->self.flags &= ~CSS_ONLINE;
5668

5669
	spin_lock_irq(&css_set_lock);
5670 5671
	list_for_each_entry(link, &cgrp->cset_links, cset_link)
		link->cset->dead = true;
5672
	spin_unlock_irq(&css_set_lock);
5673

5674
	/* initiate massacre of all css's */
Tejun Heo's avatar
Tejun Heo committed
5675 5676
	for_each_css(css, ssid, cgrp)
		kill_css(css);
5677

5678 5679
	/* clear and remove @cgrp dir, @cgrp has an extra ref on its kn */
	css_clear_dir(&cgrp->self);
5680
	kernfs_remove(cgrp->kn);
5681

5682 5683 5684
	if (parent && cgroup_is_threaded(cgrp))
		parent->nr_threaded_children--;

5685
	spin_lock_irq(&css_set_lock);
5686 5687 5688
	for (tcgrp = cgroup_parent(cgrp); tcgrp; tcgrp = cgroup_parent(tcgrp)) {
		tcgrp->nr_descendants--;
		tcgrp->nr_dying_descendants++;
Roman Gushchin's avatar
Roman Gushchin committed
5689 5690 5691 5692 5693 5694
		/*
		 * If the dying cgroup is frozen, decrease frozen descendants
		 * counters of ancestor cgroups.
		 */
		if (test_bit(CGRP_FROZEN, &cgrp->flags))
			tcgrp->freezer.nr_frozen_descendants--;
5695
	}
5696
	spin_unlock_irq(&css_set_lock);
5697

5698
	cgroup1_check_for_release(parent);
Tejun Heo's avatar
Tejun Heo committed
5699

5700 5701
	cgroup_bpf_offline(cgrp);

5702
	/* put the base reference */
5703
	percpu_ref_kill(&cgrp->self.refcnt);
5704

5705 5706 5707
	return 0;
};

5708
int cgroup_rmdir(struct kernfs_node *kn)
5709
{
5710
	struct cgroup *cgrp;
Tejun Heo's avatar
Tejun Heo committed
5711
	int ret = 0;
5712

5713
	cgrp = cgroup_kn_lock_live(kn, false);
5714 5715
	if (!cgrp)
		return 0;
5716

5717
	ret = cgroup_destroy_locked(cgrp);
5718
	if (!ret)
5719
		TRACE_CGROUP_PATH(rmdir, cgrp);
5720

5721
	cgroup_kn_unlock(kn);
5722
	return ret;
5723 5724
}

Tejun Heo's avatar
Tejun Heo committed
5725
static struct kernfs_syscall_ops cgroup_kf_syscall_ops = {
5726
	.show_options		= cgroup_show_options,
Tejun Heo's avatar
Tejun Heo committed
5727 5728
	.mkdir			= cgroup_mkdir,
	.rmdir			= cgroup_rmdir,
5729
	.show_path		= cgroup_show_path,
Tejun Heo's avatar
Tejun Heo committed
5730 5731
};

5732
static void __init cgroup_init_subsys(struct cgroup_subsys *ss, bool early)
5733 5734
{
	struct cgroup_subsys_state *css;
Diego Calleja's avatar
Diego Calleja committed
5735

5736
	pr_debug("Initializing cgroup subsys %s\n", ss->name);
5737

5738 5739
	mutex_lock(&cgroup_mutex);

5740
	idr_init(&ss->css_idr);
Tejun Heo's avatar
Tejun Heo committed
5741
	INIT_LIST_HEAD(&ss->cfts);
5742

5743 5744 5745
	/* Create the root cgroup state for this subsystem */
	ss->root = &cgrp_dfl_root;
	css = ss->css_alloc(cgroup_css(&cgrp_dfl_root.cgrp, ss));
5746 5747
	/* We don't handle early failures gracefully */
	BUG_ON(IS_ERR(css));
5748
	init_and_link_css(css, ss, &cgrp_dfl_root.cgrp);
5749 5750 5751 5752 5753 5754 5755

	/*
	 * Root csses are never destroyed and we can't initialize
	 * percpu_ref during early init.  Disable refcnting.
	 */
	css->flags |= CSS_NO_REF;

5756
	if (early) {
5757
		/* allocation can't be done safely during early init */
5758 5759 5760 5761 5762
		css->id = 1;
	} else {
		css->id = cgroup_idr_alloc(&ss->css_idr, css, 1, 2, GFP_KERNEL);
		BUG_ON(css->id < 0);
	}
5763

Li Zefan's avatar
Li Zefan committed
5764
	/* Update the init_css_set to contain a subsys
5765
	 * pointer to this state - since the subsystem is
Li Zefan's avatar
Li Zefan committed
5766
	 * newly registered, all tasks and hence the
5767
	 * init_css_set is in the subsystem's root cgroup. */
5768
	init_css_set.subsys[ss->id] = css;
5769

5770 5771
	have_fork_callback |= (bool)ss->fork << ss->id;
	have_exit_callback |= (bool)ss->exit << ss->id;
5772
	have_release_callback |= (bool)ss->release << ss->id;
5773
	have_canfork_callback |= (bool)ss->can_fork << ss->id;
5774

Li Zefan's avatar
Li Zefan committed
5775 5776 5777 5778 5779
	/* At system boot, before all subsystems have been
	 * registered, no tasks have been forked, so we don't
	 * need to invoke fork callbacks here. */
	BUG_ON(!list_empty(&init_task.tasks));

5780
	BUG_ON(online_css(css));
5781

5782 5783 5784
	mutex_unlock(&cgroup_mutex);
}

5785
/**
Li Zefan's avatar
Li Zefan committed
5786 5787 5788 5789
 * cgroup_init_early - cgroup initialization at system boot
 *
 * Initialize cgroups at system boot, and initialize any
 * subsystems that request early init.
5790 5791 5792
 */
int __init cgroup_init_early(void)
{
5793
	static struct cgroup_fs_context __initdata ctx;
5794
	struct cgroup_subsys *ss;
5795
	int i;
5796

5797 5798
	ctx.root = &cgrp_dfl_root;
	init_cgroup_root(&ctx);
5799 5800
	cgrp_dfl_root.cgrp.self.flags |= CSS_NO_REF;

5801
	RCU_INIT_POINTER(init_task.cgroups, &init_css_set);
5802

Tejun Heo's avatar
Tejun Heo committed
5803
	for_each_subsys(ss, i) {
5804
		WARN(!ss->css_alloc || !ss->css_free || ss->name || ss->id,
5805
		     "invalid cgroup_subsys %d:%s css_alloc=%p css_free=%p id:name=%d:%s\n",
5806
		     i, cgroup_subsys_name[i], ss->css_alloc, ss->css_free,
5807
		     ss->id, ss->name);
5808 5809 5810
		WARN(strlen(cgroup_subsys_name[i]) > MAX_CGROUP_TYPE_NAMELEN,
		     "cgroup_subsys_name %s too long\n", cgroup_subsys_name[i]);

5811
		ss->id = i;
5812
		ss->name = cgroup_subsys_name[i];
5813 5814
		if (!ss->legacy_name)
			ss->legacy_name = cgroup_subsys_name[i];
5815 5816

		if (ss->early_init)
5817
			cgroup_init_subsys(ss, true);
5818 5819 5820 5821 5822
	}
	return 0;
}

/**
Li Zefan's avatar
Li Zefan committed
5823 5824 5825 5826
 * cgroup_init - cgroup initialization
 *
 * Register cgroup filesystem and /proc file, and initialize
 * any subsystems that didn't request early init.
5827 5828 5829
 */
int __init cgroup_init(void)
{
5830
	struct cgroup_subsys *ss;
5831
	int ssid;
5832

5833
	BUILD_BUG_ON(CGROUP_SUBSYS_COUNT > 16);
5834 5835
	BUG_ON(cgroup_init_cftypes(NULL, cgroup_base_files));
	BUG_ON(cgroup_init_cftypes(NULL, cgroup1_base_files));
5836

Tejun Heo's avatar
Tejun Heo committed
5837
	cgroup_rstat_boot();
5838

5839
	/*
5840
	 * The latency of the synchronize_rcu() is too high for cgroups,
5841 5842 5843 5844
	 * avoid it at the cost of forcing all readers into the slow path.
	 */
	rcu_sync_enter_start(&cgroup_threadgroup_rwsem.rss);

5845 5846
	get_user_ns(init_cgroup_ns.user_ns);

Tejun Heo's avatar
Tejun Heo committed
5847 5848
	mutex_lock(&cgroup_mutex);

5849 5850 5851 5852 5853 5854
	/*
	 * Add init_css_set to the hash table so that dfl_root can link to
	 * it during init.
	 */
	hash_add(css_set_table, &init_css_set.hlist,
		 css_set_hash(init_css_set.subsys));
5855

5856
	BUG_ON(cgroup_setup_root(&cgrp_dfl_root, 0));
5857

Tejun Heo's avatar
Tejun Heo committed
5858 5859
	mutex_unlock(&cgroup_mutex);

5860
	for_each_subsys(ss, ssid) {
5861 5862 5863 5864 5865 5866 5867 5868 5869 5870
		if (ss->early_init) {
			struct cgroup_subsys_state *css =
				init_css_set.subsys[ss->id];

			css->id = cgroup_idr_alloc(&ss->css_idr, css, 1, 2,
						   GFP_KERNEL);
			BUG_ON(css->id < 0);
		} else {
			cgroup_init_subsys(ss, false);
		}
5871

5872 5873
		list_add_tail(&init_css_set.e_cset_node[ssid],
			      &cgrp_dfl_root.cgrp.e_csets[ssid]);
5874 5875

		/*
5876 5877 5878
		 * Setting dfl_root subsys_mask needs to consider the
		 * disabled flag and cftype registration needs kmalloc,
		 * both of which aren't available during early_init.
5879
		 */
5880
		if (!cgroup_ssid_enabled(ssid))
5881 5882
			continue;

5883
		if (cgroup1_ssid_disabled(ssid))
5884 5885 5886
			printk(KERN_INFO "Disabling %s control group subsystem in v1 mounts\n",
			       ss->name);

5887 5888
		cgrp_dfl_root.subsys_mask |= 1 << ss->id;

5889 5890 5891
		/* implicit controllers must be threaded too */
		WARN_ON(ss->implicit_on_dfl && !ss->threaded);

5892 5893 5894
		if (ss->implicit_on_dfl)
			cgrp_dfl_implicit_ss_mask |= 1 << ss->id;
		else if (!ss->dfl_cftypes)
5895
			cgrp_dfl_inhibit_ss_mask |= 1 << ss->id;
5896

5897 5898 5899
		if (ss->threaded)
			cgrp_dfl_threaded_ss_mask |= 1 << ss->id;

5900 5901 5902 5903 5904
		if (ss->dfl_cftypes == ss->legacy_cftypes) {
			WARN_ON(cgroup_add_cftypes(ss, ss->dfl_cftypes));
		} else {
			WARN_ON(cgroup_add_dfl_cftypes(ss, ss->dfl_cftypes));
			WARN_ON(cgroup_add_legacy_cftypes(ss, ss->legacy_cftypes));
5905
		}
5906 5907 5908

		if (ss->bind)
			ss->bind(init_css_set.subsys[ssid]);
5909 5910 5911 5912

		mutex_lock(&cgroup_mutex);
		css_populate_dir(init_css_set.subsys[ssid]);
		mutex_unlock(&cgroup_mutex);
5913 5914
	}

5915 5916 5917 5918 5919
	/* init_css_set.subsys[] has been updated, re-hash */
	hash_del(&init_css_set.hlist);
	hash_add(css_set_table, &init_css_set.hlist,
		 css_set_hash(init_css_set.subsys));

5920 5921
	WARN_ON(sysfs_create_mount_point(fs_kobj, "cgroup"));
	WARN_ON(register_filesystem(&cgroup_fs_type));
5922
	WARN_ON(register_filesystem(&cgroup2_fs_type));
5923
	WARN_ON(!proc_create_single("cgroups", 0, NULL, proc_cgroupstats_show));
5924 5925 5926
#ifdef CONFIG_CPUSETS
	WARN_ON(register_filesystem(&cpuset_fs_type));
#endif
5927

Tejun Heo's avatar
Tejun Heo committed
5928
	return 0;
5929
}
5930

5931 5932 5933 5934 5935
static int __init cgroup_wq_init(void)
{
	/*
	 * There isn't much point in executing destruction path in
	 * parallel.  Good chunk is serialized with cgroup_mutex anyway.
5936
	 * Use 1 for @max_active.
5937 5938 5939 5940
	 *
	 * We would prefer to do this in cgroup_init() above, but that
	 * is called before init_workqueues(): so leave this until after.
	 */
5941
	cgroup_destroy_wq = alloc_workqueue("cgroup_destroy", 0, 1);
5942 5943 5944 5945 5946
	BUG_ON(!cgroup_destroy_wq);
	return 0;
}
core_initcall(cgroup_wq_init);

5947
void cgroup_path_from_kernfs_id(u64 id, char *buf, size_t buflen)
5948 5949 5950
{
	struct kernfs_node *kn;

5951
	kn = kernfs_find_and_get_node_by_id(cgrp_dfl_root.kf_root, id);
5952 5953 5954 5955 5956 5957
	if (!kn)
		return;
	kernfs_path(kn, buf, buflen);
	kernfs_put(kn);
}

5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969
/*
 * cgroup_get_from_id : get the cgroup associated with cgroup id
 * @id: cgroup id
 * On success return the cgrp, on failure return NULL
 */
struct cgroup *cgroup_get_from_id(u64 id)
{
	struct kernfs_node *kn;
	struct cgroup *cgrp = NULL;

	kn = kernfs_find_and_get_node_by_id(cgrp_dfl_root.kf_root, id);
	if (!kn)
5970
		goto out;
5971

5972
	rcu_read_lock();
5973

5974 5975
	cgrp = rcu_dereference(*(void __rcu __force **)&kn->priv);
	if (cgrp && !cgroup_tryget(cgrp))
5976
		cgrp = NULL;
5977 5978 5979

	rcu_read_unlock();

5980
	kernfs_put(kn);
5981
out:
5982 5983 5984 5985
	return cgrp;
}
EXPORT_SYMBOL_GPL(cgroup_get_from_id);

5986 5987 5988 5989 5990
/*
 * proc_cgroup_show()
 *  - Print task's cgroup paths into seq_file, one line for each hierarchy
 *  - Used for /proc/<pid>/cgroup.
 */
5991 5992
int proc_cgroup_show(struct seq_file *m, struct pid_namespace *ns,
		     struct pid *pid, struct task_struct *tsk)
5993
{
5994
	char *buf;
5995
	int retval;
5996
	struct cgroup_root *root;
5997 5998

	retval = -ENOMEM;
Tejun Heo's avatar
Tejun Heo committed
5999
	buf = kmalloc(PATH_MAX, GFP_KERNEL);
6000 6001 6002 6003
	if (!buf)
		goto out;

	mutex_lock(&cgroup_mutex);
6004
	spin_lock_irq(&css_set_lock);
6005

6006
	for_each_root(root) {
6007
		struct cgroup_subsys *ss;
6008
		struct cgroup *cgrp;
6009
		int ssid, count = 0;
6010

6011
		if (root == &cgrp_dfl_root && !cgrp_dfl_visible)
6012 6013
			continue;

6014
		seq_printf(m, "%d:", root->hierarchy_id);
6015 6016 6017 6018
		if (root != &cgrp_dfl_root)
			for_each_subsys(ss, ssid)
				if (root->subsys_mask & (1 << ssid))
					seq_printf(m, "%s%s", count++ ? "," : "",
6019
						   ss->legacy_name);
6020 6021 6022
		if (strlen(root->name))
			seq_printf(m, "%sname=%s", count ? "," : "",
				   root->name);
6023
		seq_putc(m, ':');
6024

6025
		cgrp = task_cgroup_from_root(tsk, root);
6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036

		/*
		 * On traditional hierarchies, all zombie tasks show up as
		 * belonging to the root cgroup.  On the default hierarchy,
		 * while a zombie doesn't show up in "cgroup.procs" and
		 * thus can't be migrated, its /proc/PID/cgroup keeps
		 * reporting the cgroup it belonged to before exiting.  If
		 * the cgroup is removed before the zombie is reaped,
		 * " (deleted)" is appended to the cgroup path.
		 */
		if (cgroup_on_dfl(cgrp) || !(tsk->flags & PF_EXITING)) {
6037
			retval = cgroup_path_ns_locked(cgrp, buf, PATH_MAX,
6038
						current->nsproxy->cgroup_ns);
6039
			if (retval >= PATH_MAX)
6040
				retval = -ENAMETOOLONG;
6041
			if (retval < 0)
6042
				goto out_unlock;
6043 6044

			seq_puts(m, buf);
6045
		} else {
6046
			seq_puts(m, "/");
Tejun Heo's avatar
Tejun Heo committed
6047
		}
6048 6049 6050 6051 6052

		if (cgroup_on_dfl(cgrp) && cgroup_is_dead(cgrp))
			seq_puts(m, " (deleted)\n");
		else
			seq_putc(m, '\n');
6053 6054
	}

6055
	retval = 0;
6056
out_unlock:
6057
	spin_unlock_irq(&css_set_lock);
6058 6059 6060 6061 6062 6063
	mutex_unlock(&cgroup_mutex);
	kfree(buf);
out:
	return retval;
}

6064
/**
6065
 * cgroup_fork - initialize cgroup related fields during copy_process()
Li Zefan's avatar
Li Zefan committed
6066
 * @child: pointer to task_struct of forking parent process.
6067
 *
6068
 * A task is associated with the init_css_set until cgroup_post_fork()
6069
 * attaches it to the target css_set.
6070 6071 6072
 */
void cgroup_fork(struct task_struct *child)
{
6073
	RCU_INIT_POINTER(child->cgroups, &init_css_set);
6074
	INIT_LIST_HEAD(&child->cg_list);
6075 6076
}

6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091 6092 6093 6094
static struct cgroup *cgroup_get_from_file(struct file *f)
{
	struct cgroup_subsys_state *css;
	struct cgroup *cgrp;

	css = css_tryget_online_from_dir(f->f_path.dentry, NULL);
	if (IS_ERR(css))
		return ERR_CAST(css);

	cgrp = css->cgroup;
	if (!cgroup_on_dfl(cgrp)) {
		cgroup_put(cgrp);
		return ERR_PTR(-EBADF);
	}

	return cgrp;
}

6095 6096 6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163
/**
 * cgroup_css_set_fork - find or create a css_set for a child process
 * @kargs: the arguments passed to create the child process
 *
 * This functions finds or creates a new css_set which the child
 * process will be attached to in cgroup_post_fork(). By default,
 * the child process will be given the same css_set as its parent.
 *
 * If CLONE_INTO_CGROUP is specified this function will try to find an
 * existing css_set which includes the requested cgroup and if not create
 * a new css_set that the child will be attached to later. If this function
 * succeeds it will hold cgroup_threadgroup_rwsem on return. If
 * CLONE_INTO_CGROUP is requested this function will grab cgroup mutex
 * before grabbing cgroup_threadgroup_rwsem and will hold a reference
 * to the target cgroup.
 */
static int cgroup_css_set_fork(struct kernel_clone_args *kargs)
	__acquires(&cgroup_mutex) __acquires(&cgroup_threadgroup_rwsem)
{
	int ret;
	struct cgroup *dst_cgrp = NULL;
	struct css_set *cset;
	struct super_block *sb;
	struct file *f;

	if (kargs->flags & CLONE_INTO_CGROUP)
		mutex_lock(&cgroup_mutex);

	cgroup_threadgroup_change_begin(current);

	spin_lock_irq(&css_set_lock);
	cset = task_css_set(current);
	get_css_set(cset);
	spin_unlock_irq(&css_set_lock);

	if (!(kargs->flags & CLONE_INTO_CGROUP)) {
		kargs->cset = cset;
		return 0;
	}

	f = fget_raw(kargs->cgroup);
	if (!f) {
		ret = -EBADF;
		goto err;
	}
	sb = f->f_path.dentry->d_sb;

	dst_cgrp = cgroup_get_from_file(f);
	if (IS_ERR(dst_cgrp)) {
		ret = PTR_ERR(dst_cgrp);
		dst_cgrp = NULL;
		goto err;
	}

	if (cgroup_is_dead(dst_cgrp)) {
		ret = -ENODEV;
		goto err;
	}

	/*
	 * Verify that we the target cgroup is writable for us. This is
	 * usually done by the vfs layer but since we're not going through
	 * the vfs layer here we need to do it "manually".
	 */
	ret = cgroup_may_write(dst_cgrp, sb);
	if (ret)
		goto err;

	ret = cgroup_attach_permissions(cset->dfl_cgrp, dst_cgrp, sb,
6164 6165
					!(kargs->flags & CLONE_THREAD),
					current->nsproxy->cgroup_ns);
6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222
	if (ret)
		goto err;

	kargs->cset = find_css_set(cset, dst_cgrp);
	if (!kargs->cset) {
		ret = -ENOMEM;
		goto err;
	}

	put_css_set(cset);
	fput(f);
	kargs->cgrp = dst_cgrp;
	return ret;

err:
	cgroup_threadgroup_change_end(current);
	mutex_unlock(&cgroup_mutex);
	if (f)
		fput(f);
	if (dst_cgrp)
		cgroup_put(dst_cgrp);
	put_css_set(cset);
	if (kargs->cset)
		put_css_set(kargs->cset);
	return ret;
}

/**
 * cgroup_css_set_put_fork - drop references we took during fork
 * @kargs: the arguments passed to create the child process
 *
 * Drop references to the prepared css_set and target cgroup if
 * CLONE_INTO_CGROUP was requested.
 */
static void cgroup_css_set_put_fork(struct kernel_clone_args *kargs)
	__releases(&cgroup_threadgroup_rwsem) __releases(&cgroup_mutex)
{
	cgroup_threadgroup_change_end(current);

	if (kargs->flags & CLONE_INTO_CGROUP) {
		struct cgroup *cgrp = kargs->cgrp;
		struct css_set *cset = kargs->cset;

		mutex_unlock(&cgroup_mutex);

		if (cset) {
			put_css_set(cset);
			kargs->cset = NULL;
		}

		if (cgrp) {
			cgroup_put(cgrp);
			kargs->cgrp = NULL;
		}
	}
}

6223 6224
/**
 * cgroup_can_fork - called on a new task before the process is exposed
6225
 * @child: the child process
6226
 *
6227 6228
 * This prepares a new css_set for the child process which the child will
 * be attached to in cgroup_post_fork().
6229 6230 6231
 * This calls the subsystem can_fork() callbacks. If the cgroup_can_fork()
 * callback returns an error, the fork aborts with that error code. This
 * allows for a cgroup subsystem to conditionally allow or deny new forks.
6232
 */
6233
int cgroup_can_fork(struct task_struct *child, struct kernel_clone_args *kargs)
6234 6235 6236 6237
{
	struct cgroup_subsys *ss;
	int i, j, ret;

6238 6239 6240
	ret = cgroup_css_set_fork(kargs);
	if (ret)
		return ret;
6241

6242
	do_each_subsys_mask(ss, i, have_canfork_callback) {
6243
		ret = ss->can_fork(child, kargs->cset);
6244 6245
		if (ret)
			goto out_revert;
6246
	} while_each_subsys_mask();
6247 6248 6249 6250 6251 6252 6253 6254

	return 0;

out_revert:
	for_each_subsys(ss, j) {
		if (j >= i)
			break;
		if (ss->cancel_fork)
6255
			ss->cancel_fork(child, kargs->cset);
6256 6257
	}

6258
	cgroup_css_set_put_fork(kargs);
6259

6260 6261 6262 6263 6264
	return ret;
}

/**
 * cgroup_cancel_fork - called if a fork failed after cgroup_can_fork()
6265 6266
 * @child: the child process
 * @kargs: the arguments passed to create the child process
6267 6268
 *
 * This calls the cancel_fork() callbacks if a fork failed *after*
Zhen Lei's avatar
Zhen Lei committed
6269
 * cgroup_can_fork() succeeded and cleans up references we took to
6270
 * prepare a new css_set for the child process in cgroup_can_fork().
6271
 */
6272 6273
void cgroup_cancel_fork(struct task_struct *child,
			struct kernel_clone_args *kargs)
6274 6275 6276 6277 6278 6279
{
	struct cgroup_subsys *ss;
	int i;

	for_each_subsys(ss, i)
		if (ss->cancel_fork)
6280
			ss->cancel_fork(child, kargs->cset);
6281

6282
	cgroup_css_set_put_fork(kargs);
6283 6284
}

6285
/**
6286 6287
 * cgroup_post_fork - finalize cgroup setup for the child process
 * @child: the child process
Li Zefan's avatar
Li Zefan committed
6288
 *
6289 6290
 * Attach the child process to its css_set calling the subsystem fork()
 * callbacks.
Li Zefan's avatar
Li Zefan committed
6291
 */
6292 6293 6294
void cgroup_post_fork(struct task_struct *child,
		      struct kernel_clone_args *kargs)
	__releases(&cgroup_threadgroup_rwsem) __releases(&cgroup_mutex)
6295
{
6296 6297
	unsigned long cgrp_flags = 0;
	bool kill = false;
6298
	struct cgroup_subsys *ss;
6299
	struct css_set *cset;
6300 6301
	int i;

6302 6303 6304
	cset = kargs->cset;
	kargs->cset = NULL;

6305 6306
	spin_lock_irq(&css_set_lock);

6307 6308
	/* init tasks are special, only link regular threads */
	if (likely(child->pid)) {
6309 6310 6311 6312 6313
		if (kargs->cgrp)
			cgrp_flags = kargs->cgrp->flags;
		else
			cgrp_flags = cset->dfl_cgrp->flags;

6314 6315 6316
		WARN_ON_ONCE(!list_empty(&child->cg_list));
		cset->nr_tasks++;
		css_set_move_task(child, NULL, cset, false);
6317 6318 6319
	} else {
		put_css_set(cset);
		cset = NULL;
6320
	}
6321

6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338 6339 6340
	if (!(child->flags & PF_KTHREAD)) {
		if (unlikely(test_bit(CGRP_FREEZE, &cgrp_flags))) {
			/*
			 * If the cgroup has to be frozen, the new task has
			 * too. Let's set the JOBCTL_TRAP_FREEZE jobctl bit to
			 * get the task into the frozen state.
			 */
			spin_lock(&child->sighand->siglock);
			WARN_ON_ONCE(child->frozen);
			child->jobctl |= JOBCTL_TRAP_FREEZE;
			spin_unlock(&child->sighand->siglock);

			/*
			 * Calling cgroup_update_frozen() isn't required here,
			 * because it will be called anyway a bit later from
			 * do_freezer_trap(). So we avoid cgroup's transient
			 * switch from the frozen state and back.
			 */
		}
Roman Gushchin's avatar
Roman Gushchin committed
6341 6342

		/*
6343 6344 6345
		 * If the cgroup is to be killed notice it now and take the
		 * child down right after we finished preparing it for
		 * userspace.
Roman Gushchin's avatar
Roman Gushchin committed
6346
		 */
6347
		kill = test_bit(CGRP_KILL, &cgrp_flags);
6348
	}
6349

6350 6351
	spin_unlock_irq(&css_set_lock);

6352 6353 6354 6355 6356
	/*
	 * Call ss->fork().  This must happen after @child is linked on
	 * css_set; otherwise, @child might change state between ->fork()
	 * and addition to css_set.
	 */
6357
	do_each_subsys_mask(ss, i, have_fork_callback) {
6358
		ss->fork(child);
6359
	} while_each_subsys_mask();
6360

6361 6362 6363 6364 6365 6366 6367 6368 6369
	/* Make the new cset the root_cset of the new cgroup namespace. */
	if (kargs->flags & CLONE_NEWCGROUP) {
		struct css_set *rcset = child->nsproxy->cgroup_ns->root_cset;

		get_css_set(cset);
		child->nsproxy->cgroup_ns->root_cset = cset;
		put_css_set(rcset);
	}

6370 6371 6372 6373
	/* Cgroup has to be killed so take down child immediately. */
	if (unlikely(kill))
		do_send_sig_info(SIGKILL, SEND_SIG_NOINFO, child, PIDTYPE_TGID);

6374
	cgroup_css_set_put_fork(kargs);
6375
}
6376

6377 6378 6379 6380
/**
 * cgroup_exit - detach cgroup from exiting task
 * @tsk: pointer to task_struct of exiting process
 *
6381
 * Description: Detach cgroup from @tsk.
6382 6383
 *
 */
6384
void cgroup_exit(struct task_struct *tsk)
6385
{
6386
	struct cgroup_subsys *ss;
6387
	struct css_set *cset;
6388
	int i;
6389

6390
	spin_lock_irq(&css_set_lock);
6391

6392 6393 6394 6395 6396
	WARN_ON_ONCE(list_empty(&tsk->cg_list));
	cset = task_css_set(tsk);
	css_set_move_task(tsk, cset, NULL, false);
	list_add_tail(&tsk->cg_list, &cset->dying_tasks);
	cset->nr_tasks--;
Roman Gushchin's avatar
Roman Gushchin committed
6397

6398
	WARN_ON_ONCE(cgroup_task_frozen(tsk));
6399 6400
	if (unlikely(!(tsk->flags & PF_KTHREAD) &&
		     test_bit(CGRP_FREEZE, &task_dfl_cgroup(tsk)->flags)))
6401
		cgroup_update_frozen(task_dfl_cgroup(tsk));
Roman Gushchin's avatar
Roman Gushchin committed
6402

6403
	spin_unlock_irq(&css_set_lock);
6404

6405
	/* see cgroup_post_fork() for details */
6406
	do_each_subsys_mask(ss, i, have_exit_callback) {
6407
		ss->exit(tsk);
6408
	} while_each_subsys_mask();
6409
}
6410

6411
void cgroup_release(struct task_struct *task)
6412
{
6413 6414 6415
	struct cgroup_subsys *ss;
	int ssid;

6416 6417
	do_each_subsys_mask(ss, ssid, have_release_callback) {
		ss->release(task);
6418
	} while_each_subsys_mask();
6419

6420 6421 6422 6423
	spin_lock_irq(&css_set_lock);
	css_set_skip_task_iters(task_css_set(task), task);
	list_del_init(&task->cg_list);
	spin_unlock_irq(&css_set_lock);
6424
}
6425

6426 6427 6428
void cgroup_free(struct task_struct *task)
{
	struct css_set *cset = task_css_set(task);
6429
	put_css_set(cset);
6430
}
6431

6432 6433
static int __init cgroup_disable(char *str)
{
6434
	struct cgroup_subsys *ss;
6435
	char *token;
6436
	int i;
6437 6438 6439 6440

	while ((token = strsep(&str, ",")) != NULL) {
		if (!*token)
			continue;
6441

Tejun Heo's avatar
Tejun Heo committed
6442
		for_each_subsys(ss, i) {
6443 6444 6445
			if (strcmp(token, ss->name) &&
			    strcmp(token, ss->legacy_name))
				continue;
6446 6447 6448 6449

			static_branch_disable(cgroup_subsys_enabled_key[i]);
			pr_info("Disabling %s control group subsystem\n",
				ss->name);
6450
		}
6451 6452 6453 6454 6455 6456 6457 6458 6459

		for (i = 0; i < OPT_FEATURE_COUNT; i++) {
			if (strcmp(token, cgroup_opt_feature_names[i]))
				continue;
			cgroup_feature_disable_mask |= 1 << i;
			pr_info("Disabling %s control group feature\n",
				cgroup_opt_feature_names[i]);
			break;
		}
6460 6461 6462 6463
	}
	return 1;
}
__setup("cgroup_disable=", cgroup_disable);
KAMEZAWA Hiroyuki's avatar
KAMEZAWA Hiroyuki committed
6464

6465 6466 6467 6468 6469 6470 6471 6472 6473 6474
void __init __weak enable_debug_cgroup(void) { }

static int __init enable_cgroup_debug(char *str)
{
	cgroup_debug = true;
	enable_debug_cgroup();
	return 1;
}
__setup("cgroup_debug", enable_cgroup_debug);

6475
/**
6476
 * css_tryget_online_from_dir - get corresponding css from a cgroup dentry
6477 6478
 * @dentry: directory dentry of interest
 * @ss: subsystem of interest
6479
 *
6480 6481 6482
 * If @dentry is a directory for a cgroup which has @ss enabled on it, try
 * to get the corresponding css and return it.  If such css doesn't exist
 * or can't be pinned, an ERR_PTR value is returned.
Stephane Eranian's avatar
Stephane Eranian committed
6483
 */
6484 6485
struct cgroup_subsys_state *css_tryget_online_from_dir(struct dentry *dentry,
						       struct cgroup_subsys *ss)
Stephane Eranian's avatar
Stephane Eranian committed
6486
{
Tejun Heo's avatar
Tejun Heo committed
6487
	struct kernfs_node *kn = kernfs_node_from_dentry(dentry);
6488
	struct file_system_type *s_type = dentry->d_sb->s_type;
Tejun Heo's avatar
Tejun Heo committed
6489
	struct cgroup_subsys_state *css = NULL;
Stephane Eranian's avatar
Stephane Eranian committed
6490 6491
	struct cgroup *cgrp;

6492
	/* is @dentry a cgroup dir? */
6493 6494
	if ((s_type != &cgroup_fs_type && s_type != &cgroup2_fs_type) ||
	    !kn || kernfs_type(kn) != KERNFS_DIR)
Stephane Eranian's avatar
Stephane Eranian committed
6495 6496
		return ERR_PTR(-EBADF);

6497 6498
	rcu_read_lock();

Tejun Heo's avatar
Tejun Heo committed
6499 6500 6501
	/*
	 * This path doesn't originate from kernfs and @kn could already
	 * have been or be removed at any point.  @kn->priv is RCU
6502
	 * protected for this access.  See css_release_work_fn() for details.
Tejun Heo's avatar
Tejun Heo committed
6503
	 */
6504
	cgrp = rcu_dereference(*(void __rcu __force **)&kn->priv);
Tejun Heo's avatar
Tejun Heo committed
6505 6506
	if (cgrp)
		css = cgroup_css(cgrp, ss);
6507

6508
	if (!css || !css_tryget_online(css))
6509 6510 6511 6512
		css = ERR_PTR(-ENOENT);

	rcu_read_unlock();
	return css;
Stephane Eranian's avatar
Stephane Eranian committed
6513 6514
}

6515 6516 6517 6518 6519 6520 6521 6522 6523 6524
/**
 * css_from_id - lookup css by id
 * @id: the cgroup id
 * @ss: cgroup subsys to be looked into
 *
 * Returns the css if there's valid one with @id, otherwise returns NULL.
 * Should be called under rcu_read_lock().
 */
struct cgroup_subsys_state *css_from_id(int id, struct cgroup_subsys *ss)
{
6525
	WARN_ON_ONCE(!rcu_read_lock_held());
6526
	return idr_find(&ss->css_idr, id);
Stephane Eranian's avatar
Stephane Eranian committed
6527 6528
}

6529 6530 6531 6532 6533 6534
/**
 * cgroup_get_from_path - lookup and get a cgroup from its default hierarchy path
 * @path: path on the default hierarchy
 *
 * Find the cgroup at @path on the default hierarchy, increment its
 * reference count and return it.  Returns pointer to the found cgroup on
6535 6536
 * success, ERR_PTR(-ENOENT) if @path doesn't exist or if the cgroup has already
 * been released and ERR_PTR(-ENOTDIR) if @path points to a non-directory.
6537 6538 6539 6540
 */
struct cgroup *cgroup_get_from_path(const char *path)
{
	struct kernfs_node *kn;
6541
	struct cgroup *cgrp = ERR_PTR(-ENOENT);
6542 6543

	kn = kernfs_walk_and_get(cgrp_dfl_root.cgrp.kn, path);
6544 6545 6546 6547 6548 6549
	if (!kn)
		goto out;

	if (kernfs_type(kn) != KERNFS_DIR) {
		cgrp = ERR_PTR(-ENOTDIR);
		goto out_kernfs;
6550 6551
	}

6552 6553 6554 6555 6556 6557 6558 6559 6560 6561 6562
	rcu_read_lock();

	cgrp = rcu_dereference(*(void __rcu __force **)&kn->priv);
	if (!cgrp || !cgroup_tryget(cgrp))
		cgrp = ERR_PTR(-ENOENT);

	rcu_read_unlock();

out_kernfs:
	kernfs_put(kn);
out:
6563 6564 6565 6566
	return cgrp;
}
EXPORT_SYMBOL_GPL(cgroup_get_from_path);

6567 6568 6569 6570 6571 6572 6573 6574 6575 6576 6577 6578 6579 6580 6581 6582 6583 6584
/**
 * cgroup_get_from_fd - get a cgroup pointer from a fd
 * @fd: fd obtained by open(cgroup2_dir)
 *
 * Find the cgroup from a fd which should be obtained
 * by opening a cgroup directory.  Returns a pointer to the
 * cgroup on success. ERR_PTR is returned if the cgroup
 * cannot be found.
 */
struct cgroup *cgroup_get_from_fd(int fd)
{
	struct cgroup *cgrp;
	struct file *f;

	f = fget_raw(fd);
	if (!f)
		return ERR_PTR(-EBADF);

6585
	cgrp = cgroup_get_from_file(f);
6586 6587 6588 6589 6590
	fput(f);
	return cgrp;
}
EXPORT_SYMBOL_GPL(cgroup_get_from_fd);

6591 6592 6593 6594 6595 6596 6597 6598 6599 6600 6601 6602 6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622 6623 6624 6625 6626 6627 6628 6629 6630 6631 6632
static u64 power_of_ten(int power)
{
	u64 v = 1;
	while (power--)
		v *= 10;
	return v;
}

/**
 * cgroup_parse_float - parse a floating number
 * @input: input string
 * @dec_shift: number of decimal digits to shift
 * @v: output
 *
 * Parse a decimal floating point number in @input and store the result in
 * @v with decimal point right shifted @dec_shift times.  For example, if
 * @input is "12.3456" and @dec_shift is 3, *@v will be set to 12345.
 * Returns 0 on success, -errno otherwise.
 *
 * There's nothing cgroup specific about this function except that it's
 * currently the only user.
 */
int cgroup_parse_float(const char *input, unsigned dec_shift, s64 *v)
{
	s64 whole, frac = 0;
	int fstart = 0, fend = 0, flen;

	if (!sscanf(input, "%lld.%n%lld%n", &whole, &fstart, &frac, &fend))
		return -EINVAL;
	if (frac < 0)
		return -EINVAL;

	flen = fend > fstart ? fend - fstart : 0;
	if (flen < dec_shift)
		frac *= power_of_ten(dec_shift - flen);
	else
		frac = DIV_ROUND_CLOSEST_ULL(frac, power_of_ten(flen - dec_shift));

	*v = whole * power_of_ten(dec_shift) + frac;
	return 0;
}

6633 6634 6635 6636 6637 6638 6639 6640
/*
 * sock->sk_cgrp_data handling.  For more info, see sock_cgroup_data
 * definition in cgroup-defs.h.
 */
#ifdef CONFIG_SOCK_CGROUP_DATA

void cgroup_sk_alloc(struct sock_cgroup_data *skcd)
{
6641
	struct cgroup *cgroup;
6642

6643
	rcu_read_lock();
6644 6645 6646 6647 6648 6649 6650
	/* Don't associate the sock with unrelated interrupted task's cgroup. */
	if (in_interrupt()) {
		cgroup = &cgrp_dfl_root.cgrp;
		cgroup_get(cgroup);
		goto out;
	}

6651 6652 6653 6654 6655
	while (true) {
		struct css_set *cset;

		cset = task_css_set(current);
		if (likely(cgroup_tryget(cset->dfl_cgrp))) {
6656
			cgroup = cset->dfl_cgrp;
6657 6658 6659 6660
			break;
		}
		cpu_relax();
	}
6661 6662 6663
out:
	skcd->cgroup = cgroup;
	cgroup_bpf_get(cgroup);
6664 6665 6666
	rcu_read_unlock();
}

6667 6668
void cgroup_sk_clone(struct sock_cgroup_data *skcd)
{
6669 6670 6671 6672 6673 6674 6675 6676 6677
	struct cgroup *cgrp = sock_cgroup_ptr(skcd);

	/*
	 * We might be cloning a socket which is left in an empty
	 * cgroup and the cgroup might have already been rmdir'd.
	 * Don't use cgroup_get_live().
	 */
	cgroup_get(cgrp);
	cgroup_bpf_get(cgrp);
6678 6679
}

6680 6681
void cgroup_sk_free(struct sock_cgroup_data *skcd)
{
6682 6683 6684 6685
	struct cgroup *cgrp = sock_cgroup_ptr(skcd);

	cgroup_bpf_put(cgrp);
	cgroup_put(cgrp);
6686 6687 6688 6689
}

#endif	/* CONFIG_SOCK_CGROUP_DATA */

6690 6691 6692 6693 6694 6695 6696 6697 6698 6699 6700
#ifdef CONFIG_SYSFS
static ssize_t show_delegatable_files(struct cftype *files, char *buf,
				      ssize_t size, const char *prefix)
{
	struct cftype *cft;
	ssize_t ret = 0;

	for (cft = files; cft && cft->name[0] != '\0'; cft++) {
		if (!(cft->flags & CFTYPE_NS_DELEGATABLE))
			continue;

6701 6702 6703
		if ((cft->flags & CFTYPE_PRESSURE) && !cgroup_psi_enabled())
			continue;

6704 6705 6706 6707 6708
		if (prefix)
			ret += snprintf(buf + ret, size - ret, "%s.", prefix);

		ret += snprintf(buf + ret, size - ret, "%s\n", cft->name);

6709
		if (WARN_ON(ret >= size))
6710 6711 6712 6713 6714 6715 6716 6717 6718 6719 6720 6721 6722 6723 6724 6725 6726 6727 6728 6729 6730 6731 6732 6733 6734
			break;
	}

	return ret;
}

static ssize_t delegate_show(struct kobject *kobj, struct kobj_attribute *attr,
			      char *buf)
{
	struct cgroup_subsys *ss;
	int ssid;
	ssize_t ret = 0;

	ret = show_delegatable_files(cgroup_base_files, buf, PAGE_SIZE - ret,
				     NULL);

	for_each_subsys(ss, ssid)
		ret += show_delegatable_files(ss->dfl_cftypes, buf + ret,
					      PAGE_SIZE - ret,
					      cgroup_subsys_name[ssid]);

	return ret;
}
static struct kobj_attribute cgroup_delegate_attr = __ATTR_RO(delegate);

6735 6736 6737
static ssize_t features_show(struct kobject *kobj, struct kobj_attribute *attr,
			     char *buf)
{
6738 6739 6740 6741
	return snprintf(buf, PAGE_SIZE,
			"nsdelegate\n"
			"memory_localevents\n"
			"memory_recursiveprot\n");
6742 6743 6744
}
static struct kobj_attribute cgroup_features_attr = __ATTR_RO(features);

6745 6746
static struct attribute *cgroup_sysfs_attrs[] = {
	&cgroup_delegate_attr.attr,
6747
	&cgroup_features_attr.attr,
6748 6749 6750 6751 6752 6753 6754 6755 6756 6757 6758 6759 6760
	NULL,
};

static const struct attribute_group cgroup_sysfs_attr_group = {
	.attrs = cgroup_sysfs_attrs,
	.name = "cgroup",
};

static int __init cgroup_sysfs_init(void)
{
	return sysfs_create_group(kernel_kobj, &cgroup_sysfs_attr_group);
}
subsys_initcall(cgroup_sysfs_init);
6761

6762
#endif /* CONFIG_SYSFS */