cgroup.c 133 KB
Newer Older
1 2 3 4 5 6
/*
 *  Generic process-grouping system.
 *
 *  Based originally on the cpuset system, extracted by Paul Menage
 *  Copyright (C) 2006 Google, Inc
 *
7 8 9 10
 *  Notifications support
 *  Copyright (C) 2009 Nokia Corporation
 *  Author: Kirill A. Shutemov
 *
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
 *  Copyright notices from the original cpuset code:
 *  --------------------------------------------------
 *  Copyright (C) 2003 BULL SA.
 *  Copyright (C) 2004-2006 Silicon Graphics, Inc.
 *
 *  Portions derived from Patrick Mochel's sysfs code.
 *  sysfs is Copyright (c) 2001-3 Patrick Mochel
 *
 *  2003-10-10 Written by Simon Derr.
 *  2003-10-22 Updates by Stephen Hemminger.
 *  2004 May-July Rework by Paul Jackson.
 *  ---------------------------------------------------
 *
 *  This file is subject to the terms and conditions of the GNU General Public
 *  License.  See the file COPYING in the main directory of the Linux
 *  distribution for more details.
 */

#include <linux/cgroup.h>
30
#include <linux/cred.h>
31
#include <linux/ctype.h>
32
#include <linux/errno.h>
33
#include <linux/init_task.h>
34 35 36 37 38 39
#include <linux/kernel.h>
#include <linux/list.h>
#include <linux/mm.h>
#include <linux/mutex.h>
#include <linux/mount.h>
#include <linux/pagemap.h>
40
#include <linux/proc_fs.h>
41 42 43 44
#include <linux/rcupdate.h>
#include <linux/sched.h>
#include <linux/slab.h>
#include <linux/spinlock.h>
45
#include <linux/rwsem.h>
46
#include <linux/string.h>
47
#include <linux/sort.h>
48
#include <linux/kmod.h>
Balbir Singh's avatar
Balbir Singh committed
49 50
#include <linux/delayacct.h>
#include <linux/cgroupstats.h>
51
#include <linux/hashtable.h>
Li Zefan's avatar
Li Zefan committed
52
#include <linux/pid_namespace.h>
53
#include <linux/idr.h>
54
#include <linux/vmalloc.h> /* TODO: replace with more sophisticated array */
55
#include <linux/kthread.h>
56
#include <linux/delay.h>
Balbir Singh's avatar
Balbir Singh committed
57

Arun Sharma's avatar
Arun Sharma committed
58
#include <linux/atomic.h>
59

60 61 62 63 64 65 66 67
/*
 * pidlists linger the following amount before being destroyed.  The goal
 * is avoiding frequent destruction in the middle of consecutive read calls
 * Expiring in the middle is a performance problem not a correctness one.
 * 1 sec should be enough.
 */
#define CGROUP_PIDLIST_DESTROY_DELAY	HZ

68 69 70
#define CGROUP_FILE_NAME_MAX		(MAX_CGROUP_TYPE_NAMELEN +	\
					 MAX_CFTYPE_NAME + 2)

71 72 73 74 75 76 77 78 79
/*
 * cgroup_tree_mutex nests above cgroup_mutex and protects cftypes, file
 * creation/removal and hierarchy changing operations including cgroup
 * creation, removal, css association and controller rebinding.  This outer
 * lock is needed mainly to resolve the circular dependency between kernfs
 * active ref and cgroup_mutex.  cgroup_tree_mutex nests above both.
 */
static DEFINE_MUTEX(cgroup_tree_mutex);

Tejun Heo's avatar
Tejun Heo committed
80 81 82 83
/*
 * cgroup_mutex is the master lock.  Any modification to cgroup or its
 * hierarchy must be performed while holding it.
 *
84 85
 * css_set_rwsem protects task->cgroups pointer, the list of css_set
 * objects, and the chain of tasks off each css_set.
Tejun Heo's avatar
Tejun Heo committed
86
 *
87 88
 * These locks are exported if CONFIG_PROVE_RCU so that accessors in
 * cgroup.h can use them for lockdep annotations.
Tejun Heo's avatar
Tejun Heo committed
89
 */
90 91
#ifdef CONFIG_PROVE_RCU
DEFINE_MUTEX(cgroup_mutex);
92 93 94
DECLARE_RWSEM(css_set_rwsem);
EXPORT_SYMBOL_GPL(cgroup_mutex);
EXPORT_SYMBOL_GPL(css_set_rwsem);
95
#else
96
static DEFINE_MUTEX(cgroup_mutex);
97
static DECLARE_RWSEM(css_set_rwsem);
98 99
#endif

100 101 102 103 104
/*
 * Protects cgroup_subsys->release_agent_path.  Modifying it also requires
 * cgroup_mutex.  Reading requires either cgroup_mutex or this spinlock.
 */
static DEFINE_SPINLOCK(release_agent_path_lock);
105

106
#define cgroup_assert_mutexes_or_rcu_locked()				\
107
	rcu_lockdep_assert(rcu_read_lock_held() ||			\
108
			   lockdep_is_held(&cgroup_tree_mutex) ||	\
109
			   lockdep_is_held(&cgroup_mutex),		\
110
			   "cgroup_[tree_]mutex or RCU read lock required");
111

112 113 114 115 116 117 118 119
/*
 * cgroup destruction makes heavy use of work items and there can be a lot
 * of concurrent destructions.  Use a separate workqueue so that cgroup
 * destruction work items don't end up filling up max_active of system_wq
 * which may lead to deadlock.
 */
static struct workqueue_struct *cgroup_destroy_wq;

120 121 122 123 124 125
/*
 * pidlist destructions need to be flushed on cgroup destruction.  Use a
 * separate workqueue as flush domain.
 */
static struct workqueue_struct *cgroup_pidlist_destroy_wq;

Tejun Heo's avatar
Tejun Heo committed
126
/* generate an array of cgroup subsystem pointers */
127
#define SUBSYS(_x) [_x ## _cgrp_id] = &_x ## _cgrp_subsys,
Tejun Heo's avatar
Tejun Heo committed
128
static struct cgroup_subsys *cgroup_subsys[] = {
129 130
#include <linux/cgroup_subsys.h>
};
131 132 133 134 135
#undef SUBSYS

/* array of cgroup subsystem names */
#define SUBSYS(_x) [_x ## _cgrp_id] = #_x,
static const char *cgroup_subsys_name[] = {
136 137
#include <linux/cgroup_subsys.h>
};
138
#undef SUBSYS
139 140

/*
141
 * The default hierarchy, reserved for the subsystems that are otherwise
142 143
 * unattached - it never has more than a single cgroup, and all tasks are
 * part of that cgroup.
144
 */
145
struct cgroup_root cgrp_dfl_root;
146

147 148 149 150 151
/*
 * The default hierarchy always exists but is hidden until mounted for the
 * first time.  This is for backward compatibility.
 */
static bool cgrp_dfl_root_visible;
152 153 154

/* The list of hierarchy roots */

155 156
static LIST_HEAD(cgroup_roots);
static int cgroup_root_count;
157

Tejun Heo's avatar
Tejun Heo committed
158
/* hierarchy ID allocation and mapping, protected by cgroup_mutex */
159
static DEFINE_IDR(cgroup_hierarchy_idr);
160

161 162 163 164 165
/*
 * Assign a monotonically increasing serial number to cgroups.  It
 * guarantees cgroups with bigger numbers are newer than those with smaller
 * numbers.  Also, as cgroups are always appended to the parent's
 * ->children list, it guarantees that sibling cgroups are always sorted in
166 167
 * the ascending serial number order on the list.  Protected by
 * cgroup_mutex.
168
 */
169
static u64 cgroup_serial_nr_next = 1;
170

171
/* This flag indicates whether tasks in the fork and exit paths should
Li Zefan's avatar
Li Zefan committed
172 173 174
 * check for fork/exit handlers to call. This avoids us having to do
 * extra work in the fork/exit path if none of the subsystems need to
 * be called.
175
 */
176
static int need_forkexit_callback __read_mostly;
177

178 179
static struct cftype cgroup_base_files[];

180
static void cgroup_put(struct cgroup *cgrp);
181
static int rebind_subsystems(struct cgroup_root *dst_root,
182
			     unsigned long ss_mask);
183
static void cgroup_destroy_css_killed(struct cgroup *cgrp);
184
static int cgroup_destroy_locked(struct cgroup *cgrp);
185 186
static int cgroup_addrm_files(struct cgroup *cgrp, struct cftype cfts[],
			      bool is_add);
187
static void cgroup_pidlist_destroy_all(struct cgroup *cgrp);
188

Tejun Heo's avatar
Tejun Heo committed
189 190 191
/**
 * cgroup_css - obtain a cgroup's css for the specified subsystem
 * @cgrp: the cgroup of interest
192
 * @ss: the subsystem of interest (%NULL returns the dummy_css)
Tejun Heo's avatar
Tejun Heo committed
193
 *
194 195 196 197 198
 * Return @cgrp's css (cgroup_subsys_state) associated with @ss.  This
 * function must be called either under cgroup_mutex or rcu_read_lock() and
 * the caller is responsible for pinning the returned css if it wants to
 * keep accessing it outside the said locks.  This function may return
 * %NULL if @cgrp doesn't have @subsys_id enabled.
Tejun Heo's avatar
Tejun Heo committed
199 200
 */
static struct cgroup_subsys_state *cgroup_css(struct cgroup *cgrp,
201
					      struct cgroup_subsys *ss)
Tejun Heo's avatar
Tejun Heo committed
202
{
203
	if (ss)
204
		return rcu_dereference_check(cgrp->subsys[ss->id],
205 206
					lockdep_is_held(&cgroup_tree_mutex) ||
					lockdep_is_held(&cgroup_mutex));
207 208
	else
		return &cgrp->dummy_css;
Tejun Heo's avatar
Tejun Heo committed
209
}
210

211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238
/**
 * cgroup_e_css - obtain a cgroup's effective css for the specified subsystem
 * @cgrp: the cgroup of interest
 * @ss: the subsystem of interest (%NULL returns the dummy_css)
 *
 * Similar to cgroup_css() but returns the effctive css, which is defined
 * as the matching css of the nearest ancestor including self which has @ss
 * enabled.  If @ss is associated with the hierarchy @cgrp is on, this
 * function is guaranteed to return non-NULL css.
 */
static struct cgroup_subsys_state *cgroup_e_css(struct cgroup *cgrp,
						struct cgroup_subsys *ss)
{
	lockdep_assert_held(&cgroup_mutex);

	if (!ss)
		return &cgrp->dummy_css;

	if (!(cgrp->root->subsys_mask & (1 << ss->id)))
		return NULL;

	while (cgrp->parent &&
	       !(cgrp->parent->child_subsys_mask & (1 << ss->id)))
		cgrp = cgrp->parent;

	return cgroup_css(cgrp, ss);
}

239
/* convenient tests for these bits */
240
static inline bool cgroup_is_dead(const struct cgroup *cgrp)
241
{
242
	return test_bit(CGRP_DEAD, &cgrp->flags);
243 244
}

245 246
struct cgroup_subsys_state *seq_css(struct seq_file *seq)
{
Tejun Heo's avatar
Tejun Heo committed
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262
	struct kernfs_open_file *of = seq->private;
	struct cgroup *cgrp = of->kn->parent->priv;
	struct cftype *cft = seq_cft(seq);

	/*
	 * This is open and unprotected implementation of cgroup_css().
	 * seq_css() is only called from a kernfs file operation which has
	 * an active reference on the file.  Because all the subsystem
	 * files are drained before a css is disassociated with a cgroup,
	 * the matching css from the cgroup's subsys table is guaranteed to
	 * be and stay valid until the enclosing operation is complete.
	 */
	if (cft->ss)
		return rcu_dereference_raw(cgrp->subsys[cft->ss->id]);
	else
		return &cgrp->dummy_css;
263 264 265
}
EXPORT_SYMBOL_GPL(seq_css);

266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283
/**
 * cgroup_is_descendant - test ancestry
 * @cgrp: the cgroup to be tested
 * @ancestor: possible ancestor of @cgrp
 *
 * Test whether @cgrp is a descendant of @ancestor.  It also returns %true
 * if @cgrp == @ancestor.  This function is safe to call as long as @cgrp
 * and @ancestor are accessible.
 */
bool cgroup_is_descendant(struct cgroup *cgrp, struct cgroup *ancestor)
{
	while (cgrp) {
		if (cgrp == ancestor)
			return true;
		cgrp = cgrp->parent;
	}
	return false;
}
284

285
static int cgroup_is_releasable(const struct cgroup *cgrp)
286 287
{
	const int bits =
288 289 290
		(1 << CGRP_RELEASABLE) |
		(1 << CGRP_NOTIFY_ON_RELEASE);
	return (cgrp->flags & bits) == bits;
291 292
}

293
static int notify_on_release(const struct cgroup *cgrp)
294
{
295
	return test_bit(CGRP_NOTIFY_ON_RELEASE, &cgrp->flags);
296 297
}

Tejun Heo's avatar
Tejun Heo committed
298 299 300 301 302 303
/**
 * for_each_css - iterate all css's of a cgroup
 * @css: the iteration cursor
 * @ssid: the index of the subsystem, CGROUP_SUBSYS_COUNT after reaching the end
 * @cgrp: the target cgroup to iterate css's of
 *
304
 * Should be called under cgroup_[tree_]mutex.
Tejun Heo's avatar
Tejun Heo committed
305 306 307 308 309
 */
#define for_each_css(css, ssid, cgrp)					\
	for ((ssid) = 0; (ssid) < CGROUP_SUBSYS_COUNT; (ssid)++)	\
		if (!((css) = rcu_dereference_check(			\
				(cgrp)->subsys[(ssid)],			\
310
				lockdep_is_held(&cgroup_tree_mutex) ||	\
Tejun Heo's avatar
Tejun Heo committed
311 312 313
				lockdep_is_held(&cgroup_mutex)))) { }	\
		else

314 315 316 317 318 319 320 321 322 323 324 325 326 327
/**
 * for_each_e_css - iterate all effective css's of a cgroup
 * @css: the iteration cursor
 * @ssid: the index of the subsystem, CGROUP_SUBSYS_COUNT after reaching the end
 * @cgrp: the target cgroup to iterate css's of
 *
 * Should be called under cgroup_[tree_]mutex.
 */
#define for_each_e_css(css, ssid, cgrp)					\
	for ((ssid) = 0; (ssid) < CGROUP_SUBSYS_COUNT; (ssid)++)	\
		if (!((css) = cgroup_e_css(cgrp, cgroup_subsys[(ssid)]))) \
			;						\
		else

328
/**
Tejun Heo's avatar
Tejun Heo committed
329
 * for_each_subsys - iterate all enabled cgroup subsystems
330
 * @ss: the iteration cursor
331
 * @ssid: the index of @ss, CGROUP_SUBSYS_COUNT after reaching the end
332
 */
333
#define for_each_subsys(ss, ssid)					\
Tejun Heo's avatar
Tejun Heo committed
334 335
	for ((ssid) = 0; (ssid) < CGROUP_SUBSYS_COUNT &&		\
	     (((ss) = cgroup_subsys[ssid]) || true); (ssid)++)
336

337 338
/* iterate across the hierarchies */
#define for_each_root(root)						\
339
	list_for_each_entry((root), &cgroup_roots, root_list)
340

341 342 343 344
/**
 * cgroup_lock_live_group - take cgroup_mutex and check that cgrp is alive.
 * @cgrp: the cgroup to be checked for liveness
 *
Tejun Heo's avatar
Tejun Heo committed
345 346
 * On success, returns true; the mutex should be later unlocked.  On
 * failure returns false with no lock held.
347
 */
348
static bool cgroup_lock_live_group(struct cgroup *cgrp)
349 350
{
	mutex_lock(&cgroup_mutex);
351
	if (cgroup_is_dead(cgrp)) {
352 353 354 355 356 357
		mutex_unlock(&cgroup_mutex);
		return false;
	}
	return true;
}

358 359 360
/* the list of cgroups eligible for automatic release. Protected by
 * release_list_lock */
static LIST_HEAD(release_list);
361
static DEFINE_RAW_SPINLOCK(release_list_lock);
362 363
static void cgroup_release_agent(struct work_struct *work);
static DECLARE_WORK(release_agent_work, cgroup_release_agent);
364
static void check_for_release(struct cgroup *cgrp);
365

366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383
/*
 * A cgroup can be associated with multiple css_sets as different tasks may
 * belong to different cgroups on different hierarchies.  In the other
 * direction, a css_set is naturally associated with multiple cgroups.
 * This M:N relationship is represented by the following link structure
 * which exists for each association and allows traversing the associations
 * from both sides.
 */
struct cgrp_cset_link {
	/* the cgroup and css_set this link associates */
	struct cgroup		*cgrp;
	struct css_set		*cset;

	/* list of cgrp_cset_links anchored at cgrp->cset_links */
	struct list_head	cset_link;

	/* list of cgrp_cset_links anchored at css_set->cgrp_links */
	struct list_head	cgrp_link;
384 385
};

386 387
/*
 * The default css_set - used by init and its children prior to any
388 389 390 391 392
 * hierarchies being mounted. It contains a pointer to the root state
 * for each subsystem. Also used to anchor the list of css_sets. Not
 * reference-counted, to improve performance when child cgroups
 * haven't been created.
 */
393 394 395 396 397 398 399 400
static struct css_set init_css_set = {
	.refcount		= ATOMIC_INIT(1),
	.cgrp_links		= LIST_HEAD_INIT(init_css_set.cgrp_links),
	.tasks			= LIST_HEAD_INIT(init_css_set.tasks),
	.mg_tasks		= LIST_HEAD_INIT(init_css_set.mg_tasks),
	.mg_preload_node	= LIST_HEAD_INIT(init_css_set.mg_preload_node),
	.mg_node		= LIST_HEAD_INIT(init_css_set.mg_node),
};
401

402
static int css_set_count	= 1;	/* 1 for init_css_set */
403

404 405 406 407 408
/*
 * hash table for cgroup groups. This improves the performance to find
 * an existing css_set. This hash doesn't (currently) take into
 * account cgroups in empty hierarchies.
 */
409
#define CSS_SET_HASH_BITS	7
410
static DEFINE_HASHTABLE(css_set_table, CSS_SET_HASH_BITS);
411

412
static unsigned long css_set_hash(struct cgroup_subsys_state *css[])
413
{
414
	unsigned long key = 0UL;
415 416
	struct cgroup_subsys *ss;
	int i;
417

418
	for_each_subsys(ss, i)
419 420
		key += (unsigned long)css[i];
	key = (key >> 16) ^ key;
421

422
	return key;
423 424
}

425
static void put_css_set_locked(struct css_set *cset, bool taskexit)
426
{
427
	struct cgrp_cset_link *link, *tmp_link;
428 429
	struct cgroup_subsys *ss;
	int ssid;
430

431 432 433
	lockdep_assert_held(&css_set_rwsem);

	if (!atomic_dec_and_test(&cset->refcount))
434
		return;
435

436
	/* This css_set is dead. unlink it and release cgroup refcounts */
437 438
	for_each_subsys(ss, ssid)
		list_del(&cset->e_cset_node[ssid]);
439
	hash_del(&cset->hlist);
440 441
	css_set_count--;

442
	list_for_each_entry_safe(link, tmp_link, &cset->cgrp_links, cgrp_link) {
443
		struct cgroup *cgrp = link->cgrp;
444

445 446
		list_del(&link->cset_link);
		list_del(&link->cgrp_link);
447

448
		/* @cgrp can't go away while we're holding css_set_rwsem */
449
		if (list_empty(&cgrp->cset_links) && notify_on_release(cgrp)) {
450
			if (taskexit)
451 452
				set_bit(CGRP_RELEASABLE, &cgrp->flags);
			check_for_release(cgrp);
453
		}
454 455

		kfree(link);
456
	}
457

458
	kfree_rcu(cset, rcu_head);
459 460
}

461 462 463 464 465 466 467 468 469 470 471 472 473 474 475
static void put_css_set(struct css_set *cset, bool taskexit)
{
	/*
	 * Ensure that the refcount doesn't hit zero while any readers
	 * can see it. Similar to atomic_dec_and_lock(), but for an
	 * rwlock
	 */
	if (atomic_add_unless(&cset->refcount, -1, 1))
		return;

	down_write(&css_set_rwsem);
	put_css_set_locked(cset, taskexit);
	up_write(&css_set_rwsem);
}

476 477 478
/*
 * refcounted get/put for css_set objects
 */
479
static inline void get_css_set(struct css_set *cset)
480
{
481
	atomic_inc(&cset->refcount);
482 483
}

484
/**
485
 * compare_css_sets - helper function for find_existing_css_set().
486 487
 * @cset: candidate css_set being tested
 * @old_cset: existing css_set for a task
488 489 490
 * @new_cgrp: cgroup that's being entered by the task
 * @template: desired set of css pointers in css_set (pre-calculated)
 *
Li Zefan's avatar
Li Zefan committed
491
 * Returns true if "cset" matches "old_cset" except for the hierarchy
492 493
 * which "new_cgrp" belongs to, for which it should match "new_cgrp".
 */
494 495
static bool compare_css_sets(struct css_set *cset,
			     struct css_set *old_cset,
496 497 498 499 500
			     struct cgroup *new_cgrp,
			     struct cgroup_subsys_state *template[])
{
	struct list_head *l1, *l2;

501 502 503 504 505 506
	/*
	 * On the default hierarchy, there can be csets which are
	 * associated with the same set of cgroups but different csses.
	 * Let's first ensure that csses match.
	 */
	if (memcmp(template, cset->subsys, sizeof(cset->subsys)))
507 508 509 510
		return false;

	/*
	 * Compare cgroup pointers in order to distinguish between
511 512 513
	 * different cgroups in hierarchies.  As different cgroups may
	 * share the same effective css, this comparison is always
	 * necessary.
514
	 */
515 516
	l1 = &cset->cgrp_links;
	l2 = &old_cset->cgrp_links;
517
	while (1) {
518
		struct cgrp_cset_link *link1, *link2;
519
		struct cgroup *cgrp1, *cgrp2;
520 521 522 523

		l1 = l1->next;
		l2 = l2->next;
		/* See if we reached the end - both lists are equal length. */
524 525
		if (l1 == &cset->cgrp_links) {
			BUG_ON(l2 != &old_cset->cgrp_links);
526 527
			break;
		} else {
528
			BUG_ON(l2 == &old_cset->cgrp_links);
529 530
		}
		/* Locate the cgroups associated with these links. */
531 532 533 534
		link1 = list_entry(l1, struct cgrp_cset_link, cgrp_link);
		link2 = list_entry(l2, struct cgrp_cset_link, cgrp_link);
		cgrp1 = link1->cgrp;
		cgrp2 = link2->cgrp;
535
		/* Hierarchies should be linked in the same order. */
536
		BUG_ON(cgrp1->root != cgrp2->root);
537 538 539 540 541 542 543 544

		/*
		 * If this hierarchy is the hierarchy of the cgroup
		 * that's changing, then we need to check that this
		 * css_set points to the new cgroup; if it's any other
		 * hierarchy, then this css_set should point to the
		 * same cgroup as the old css_set.
		 */
545 546
		if (cgrp1->root == new_cgrp->root) {
			if (cgrp1 != new_cgrp)
547 548
				return false;
		} else {
549
			if (cgrp1 != cgrp2)
550 551 552 553 554 555
				return false;
		}
	}
	return true;
}

556 557 558 559 560
/**
 * find_existing_css_set - init css array and find the matching css_set
 * @old_cset: the css_set that we're using before the cgroup transition
 * @cgrp: the cgroup that we're moving into
 * @template: out param for the new set of csses, should be clear on entry
561
 */
562 563 564
static struct css_set *find_existing_css_set(struct css_set *old_cset,
					struct cgroup *cgrp,
					struct cgroup_subsys_state *template[])
565
{
566
	struct cgroup_root *root = cgrp->root;
567
	struct cgroup_subsys *ss;
568
	struct css_set *cset;
569
	unsigned long key;
570
	int i;
571

Ben Blum's avatar
Ben Blum committed
572 573 574 575 576
	/*
	 * Build the set of subsystem state objects that we want to see in the
	 * new css_set. while subsystems can change globally, the entries here
	 * won't change, so no need for locking.
	 */
577
	for_each_subsys(ss, i) {
578
		if (root->subsys_mask & (1UL << i)) {
579 580 581 582 583
			/*
			 * @ss is in this hierarchy, so we want the
			 * effective css from @cgrp.
			 */
			template[i] = cgroup_e_css(cgrp, ss);
584
		} else {
585 586 587 588
			/*
			 * @ss is not in this hierarchy, so we don't want
			 * to change the css.
			 */
589
			template[i] = old_cset->subsys[i];
590 591 592
		}
	}

593
	key = css_set_hash(template);
594 595
	hash_for_each_possible(css_set_table, cset, hlist, key) {
		if (!compare_css_sets(cset, old_cset, cgrp, template))
596 597 598
			continue;

		/* This css_set matches what we need */
599
		return cset;
600
	}
601 602 603 604 605

	/* No existing cgroup group matched */
	return NULL;
}

606
static void free_cgrp_cset_links(struct list_head *links_to_free)
607
{
608
	struct cgrp_cset_link *link, *tmp_link;
609

610 611
	list_for_each_entry_safe(link, tmp_link, links_to_free, cset_link) {
		list_del(&link->cset_link);
612 613 614 615
		kfree(link);
	}
}

616 617 618 619 620 621 622
/**
 * allocate_cgrp_cset_links - allocate cgrp_cset_links
 * @count: the number of links to allocate
 * @tmp_links: list_head the allocated links are put on
 *
 * Allocate @count cgrp_cset_link structures and chain them on @tmp_links
 * through ->cset_link.  Returns 0 on success or -errno.
623
 */
624
static int allocate_cgrp_cset_links(int count, struct list_head *tmp_links)
625
{
626
	struct cgrp_cset_link *link;
627
	int i;
628 629 630

	INIT_LIST_HEAD(tmp_links);

631
	for (i = 0; i < count; i++) {
632
		link = kzalloc(sizeof(*link), GFP_KERNEL);
633
		if (!link) {
634
			free_cgrp_cset_links(tmp_links);
635 636
			return -ENOMEM;
		}
637
		list_add(&link->cset_link, tmp_links);
638 639 640 641
	}
	return 0;
}

642 643
/**
 * link_css_set - a helper function to link a css_set to a cgroup
644
 * @tmp_links: cgrp_cset_link objects allocated by allocate_cgrp_cset_links()
645
 * @cset: the css_set to be linked
646 647
 * @cgrp: the destination cgroup
 */
648 649
static void link_css_set(struct list_head *tmp_links, struct css_set *cset,
			 struct cgroup *cgrp)
650
{
651
	struct cgrp_cset_link *link;
652

653 654 655
	BUG_ON(list_empty(tmp_links));
	link = list_first_entry(tmp_links, struct cgrp_cset_link, cset_link);
	link->cset = cset;
656
	link->cgrp = cgrp;
657
	list_move(&link->cset_link, &cgrp->cset_links);
658 659 660 661
	/*
	 * Always add links to the tail of the list so that the list
	 * is sorted by order of hierarchy creation
	 */
662
	list_add_tail(&link->cgrp_link, &cset->cgrp_links);
663 664
}

665 666 667 668 669 670 671
/**
 * find_css_set - return a new css_set with one cgroup updated
 * @old_cset: the baseline css_set
 * @cgrp: the cgroup to be updated
 *
 * Return a new css_set that's equivalent to @old_cset, but with @cgrp
 * substituted into the appropriate hierarchy.
672
 */
673 674
static struct css_set *find_css_set(struct css_set *old_cset,
				    struct cgroup *cgrp)
675
{
676
	struct cgroup_subsys_state *template[CGROUP_SUBSYS_COUNT] = { };
677
	struct css_set *cset;
678 679
	struct list_head tmp_links;
	struct cgrp_cset_link *link;
680
	struct cgroup_subsys *ss;
681
	unsigned long key;
682
	int ssid;
683

684 685
	lockdep_assert_held(&cgroup_mutex);

686 687
	/* First see if we already have a cgroup group that matches
	 * the desired set */
688
	down_read(&css_set_rwsem);
689 690 691
	cset = find_existing_css_set(old_cset, cgrp, template);
	if (cset)
		get_css_set(cset);
692
	up_read(&css_set_rwsem);
693

694 695
	if (cset)
		return cset;
696

697
	cset = kzalloc(sizeof(*cset), GFP_KERNEL);
698
	if (!cset)
699 700
		return NULL;

701
	/* Allocate all the cgrp_cset_link objects that we'll need */
702
	if (allocate_cgrp_cset_links(cgroup_root_count, &tmp_links) < 0) {
703
		kfree(cset);
704 705 706
		return NULL;
	}

707
	atomic_set(&cset->refcount, 1);
708
	INIT_LIST_HEAD(&cset->cgrp_links);
709
	INIT_LIST_HEAD(&cset->tasks);
Tejun Heo's avatar
Tejun Heo committed
710
	INIT_LIST_HEAD(&cset->mg_tasks);
711
	INIT_LIST_HEAD(&cset->mg_preload_node);
712
	INIT_LIST_HEAD(&cset->mg_node);
713
	INIT_HLIST_NODE(&cset->hlist);
714 715 716

	/* Copy the set of subsystem state objects generated in
	 * find_existing_css_set() */
717
	memcpy(cset->subsys, template, sizeof(cset->subsys));
718

719
	down_write(&css_set_rwsem);
720
	/* Add reference counts and links from the new css_set. */
721
	list_for_each_entry(link, &old_cset->cgrp_links, cgrp_link) {
722
		struct cgroup *c = link->cgrp;
723

724 725
		if (c->root == cgrp->root)
			c = cgrp;
726
		link_css_set(&tmp_links, cset, c);
727
	}
728

729
	BUG_ON(!list_empty(&tmp_links));
730 731

	css_set_count++;
732

733
	/* Add @cset to the hash table */
734 735
	key = css_set_hash(cset->subsys);
	hash_add(css_set_table, &cset->hlist, key);
736

737 738 739 740
	for_each_subsys(ss, ssid)
		list_add_tail(&cset->e_cset_node[ssid],
			      &cset->subsys[ssid]->cgroup->e_csets[ssid]);

741
	up_write(&css_set_rwsem);
742

743
	return cset;
744 745
}

746
static struct cgroup_root *cgroup_root_from_kf(struct kernfs_root *kf_root)
747
{
748
	struct cgroup *root_cgrp = kf_root->kn->priv;
Tejun Heo's avatar
Tejun Heo committed
749

750
	return root_cgrp->root;
Tejun Heo's avatar
Tejun Heo committed
751 752
}

753
static int cgroup_init_root_id(struct cgroup_root *root)
754 755 756 757 758
{
	int id;

	lockdep_assert_held(&cgroup_mutex);

759
	id = idr_alloc_cyclic(&cgroup_hierarchy_idr, root, 0, 0, GFP_KERNEL);
760 761 762 763 764 765 766
	if (id < 0)
		return id;

	root->hierarchy_id = id;
	return 0;
}

767
static void cgroup_exit_root_id(struct cgroup_root *root)
768 769 770 771 772 773 774 775 776
{
	lockdep_assert_held(&cgroup_mutex);

	if (root->hierarchy_id) {
		idr_remove(&cgroup_hierarchy_idr, root->hierarchy_id);
		root->hierarchy_id = 0;
	}
}

777
static void cgroup_free_root(struct cgroup_root *root)
778 779 780 781 782 783 784 785 786 787
{
	if (root) {
		/* hierarhcy ID shoulid already have been released */
		WARN_ON_ONCE(root->hierarchy_id);

		idr_destroy(&root->cgroup_idr);
		kfree(root);
	}
}

788
static void cgroup_destroy_root(struct cgroup_root *root)
789
{
790
	struct cgroup *cgrp = &root->cgrp;
791 792
	struct cgrp_cset_link *link, *tmp_link;

Tejun Heo's avatar
Tejun Heo committed
793 794
	mutex_lock(&cgroup_tree_mutex);
	mutex_lock(&cgroup_mutex);
795

796
	BUG_ON(atomic_read(&root->nr_cgrps));
797 798 799
	BUG_ON(!list_empty(&cgrp->children));

	/* Rebind all subsystems back to the default hierarchy */
800
	rebind_subsystems(&cgrp_dfl_root, root->subsys_mask);
801 802

	/*
803 804
	 * Release all the links from cset_links to this hierarchy's
	 * root cgroup
805
	 */
806
	down_write(&css_set_rwsem);
807 808 809 810 811 812

	list_for_each_entry_safe(link, tmp_link, &cgrp->cset_links, cset_link) {
		list_del(&link->cset_link);
		list_del(&link->cgrp_link);
		kfree(link);
	}
813
	up_write(&css_set_rwsem);
814 815 816 817 818 819 820 821 822 823 824

	if (!list_empty(&root->root_list)) {
		list_del(&root->root_list);
		cgroup_root_count--;
	}

	cgroup_exit_root_id(root);

	mutex_unlock(&cgroup_mutex);
	mutex_unlock(&cgroup_tree_mutex);

Tejun Heo's avatar
Tejun Heo committed
825
	kernfs_destroy_root(root->kf_root);
826 827 828
	cgroup_free_root(root);
}

829 830
/* look up cgroup associated with given css_set on the specified hierarchy */
static struct cgroup *cset_cgroup_from_root(struct css_set *cset,
831
					    struct cgroup_root *root)
832 833 834
{
	struct cgroup *res = NULL;

835 836 837
	lockdep_assert_held(&cgroup_mutex);
	lockdep_assert_held(&css_set_rwsem);

838
	if (cset == &init_css_set) {
839
		res = &root->cgrp;
840
	} else {
841 842 843
		struct cgrp_cset_link *link;

		list_for_each_entry(link, &cset->cgrp_links, cgrp_link) {
844
			struct cgroup *c = link->cgrp;
845

846 847 848 849 850 851
			if (c->root == root) {
				res = c;
				break;
			}
		}
	}
852

853 854 855 856
	BUG_ON(!res);
	return res;
}

857
/*
858 859 860 861
 * Return the cgroup for "task" from the given hierarchy. Must be
 * called with cgroup_mutex and css_set_rwsem held.
 */
static struct cgroup *task_cgroup_from_root(struct task_struct *task,
862
					    struct cgroup_root *root)
863 864 865 866 867 868 869 870 871
{
	/*
	 * No need to lock the task - since we hold cgroup_mutex the
	 * task can't change groups, so the only thing that can happen
	 * is that it exits and its css is set back to init_css_set.
	 */
	return cset_cgroup_from_root(task_css_set(task), root);
}

872 873 874 875 876 877
/*
 * A task must hold cgroup_mutex to modify cgroups.
 *
 * Any task can increment and decrement the count field without lock.
 * So in general, code holding cgroup_mutex can't rely on the count
 * field not changing.  However, if the count goes to zero, then only
878
 * cgroup_attach_task() can increment it again.  Because a count of zero
879 880 881 882 883 884 885 886 887 888 889 890 891
 * means that no tasks are currently attached, therefore there is no
 * way a task attached to that cgroup can fork (the other way to
 * increment the count).  So code holding cgroup_mutex can safely
 * assume that if the count is zero, it will stay zero. Similarly, if
 * a task holds cgroup_mutex on a cgroup with zero count, it
 * knows that the cgroup won't be removed, as cgroup_rmdir()
 * needs that mutex.
 *
 * The fork and exit callbacks cgroup_fork() and cgroup_exit(), don't
 * (usually) take cgroup_mutex.  These are the two most performance
 * critical pieces of code here.  The exception occurs on cgroup_exit(),
 * when a task in a notify_on_release cgroup exits.  Then cgroup_mutex
 * is taken, and if the cgroup count is zero, a usermode call made
Li Zefan's avatar
Li Zefan committed
892 893
 * to the release agent with the name of the cgroup (path relative to
 * the root of cgroup file system) as the argument.
894 895 896 897
 *
 * A cgroup can only be deleted if both its 'count' of using tasks
 * is zero, and its list of 'children' cgroups is empty.  Since all
 * tasks in the system use _some_ cgroup, and since there is always at
898
 * least one task in the system (init, pid == 1), therefore, root cgroup
899
 * always has either children cgroups and/or using tasks.  So we don't
900
 * need a special hack to ensure that root cgroup cannot be deleted.
901 902
 *
 * P.S.  One more locking exception.  RCU is used to guard the
903
 * update of a tasks cgroup pointer by cgroup_attach_task()
904 905
 */

906
static int cgroup_populate_dir(struct cgroup *cgrp, unsigned long subsys_mask);
Tejun Heo's avatar
Tejun Heo committed
907
static struct kernfs_syscall_ops cgroup_kf_syscall_ops;
908
static const struct file_operations proc_cgroupstats_operations;
909

910 911
static char *cgroup_file_name(struct cgroup *cgrp, const struct cftype *cft,
			      char *buf)
912
{
913 914 915 916 917 918 919
	if (cft->ss && !(cft->flags & CFTYPE_NO_PREFIX) &&
	    !(cgrp->root->flags & CGRP_ROOT_NOPREFIX))
		snprintf(buf, CGROUP_FILE_NAME_MAX, "%s.%s",
			 cft->ss->name, cft->name);
	else
		strncpy(buf, cft->name, CGROUP_FILE_NAME_MAX);
	return buf;
920 921
}

922 923 924 925 926 927 928 929 930 931
/**
 * cgroup_file_mode - deduce file mode of a control file
 * @cft: the control file in question
 *
 * returns cft->mode if ->mode is not 0
 * returns S_IRUGO|S_IWUSR if it has both a read and a write handler
 * returns S_IRUGO if it has only a read handler
 * returns S_IWUSR if it has only a write hander
 */
static umode_t cgroup_file_mode(const struct cftype *cft)
932
{
933
	umode_t mode = 0;
934

935 936 937 938 939 940 941 942 943 944 945
	if (cft->mode)
		return cft->mode;

	if (cft->read_u64 || cft->read_s64 || cft->seq_show)
		mode |= S_IRUGO;

	if (cft->write_u64 || cft->write_s64 || cft->write_string ||
	    cft->trigger)
		mode |= S_IWUSR;

	return mode;
946 947
}

948 949
static void cgroup_free_fn(struct work_struct *work)
{
950
	struct cgroup *cgrp = container_of(work, struct cgroup, destroy_work);
951

952
	atomic_dec(&cgrp->root->nr_cgrps);
953
	cgroup_pidlist_destroy_all(cgrp);
954

955 956 957 958 959 960 961 962 963 964 965
	if (cgrp->parent) {
		/*
		 * We get a ref to the parent, and put the ref when this
		 * cgroup is being freed, so it's guaranteed that the
		 * parent won't be destroyed before its children.
		 */
		cgroup_put(cgrp->parent);
		kernfs_put(cgrp->kn);
		kfree(cgrp);
	} else {
		/*
966
		 * This is root cgroup's refcnt reaching zero, which
967 968 969 970
		 * indicates that the root should be released.
		 */
		cgroup_destroy_root(cgrp->root);
	}
971 972 973 974 975 976
}

static void cgroup_free_rcu(struct rcu_head *head)
{
	struct cgroup *cgrp = container_of(head, struct cgroup, rcu_head);

977
	INIT_WORK(&cgrp->destroy_work, cgroup_free_fn);
978
	queue_work(cgroup_destroy_wq, &cgrp->destroy_work);
979 980
}

981
static void cgroup_get(struct cgroup *cgrp)
982
{
Tejun Heo's avatar
Tejun Heo committed
983 984 985
	WARN_ON_ONCE(cgroup_is_dead(cgrp));
	WARN_ON_ONCE(atomic_read(&cgrp->refcnt) <= 0);
	atomic_inc(&cgrp->refcnt);
986 987
}

988
static void cgroup_put(struct cgroup *cgrp)
Tejun Heo's avatar
Tejun Heo committed
989
{
Tejun Heo's avatar
Tejun Heo committed
990 991
	if (!atomic_dec_and_test(&cgrp->refcnt))
		return;
992
	if (WARN_ON_ONCE(cgrp->parent && !cgroup_is_dead(cgrp)))
Tejun Heo's avatar
Tejun Heo committed
993
		return;
Tejun Heo's avatar
Tejun Heo committed
994

995
	/*
Tejun Heo's avatar
Tejun Heo committed
996 997 998 999
	 * XXX: cgrp->id is only used to look up css's.  As cgroup and
	 * css's lifetimes will be decoupled, it should be made
	 * per-subsystem and moved to css->id so that lookups are
	 * successful until the target css is released.
1000
	 */
Tejun Heo's avatar
Tejun Heo committed
1001 1002 1003 1004
	mutex_lock(&cgroup_mutex);
	idr_remove(&cgrp->root->cgroup_idr, cgrp->id);
	mutex_unlock(&cgroup_mutex);
	cgrp->id = -1;
Tejun Heo's avatar
Tejun Heo committed
1005

Tejun Heo's avatar
Tejun Heo committed
1006
	call_rcu(&cgrp->rcu_head, cgroup_free_rcu);
1007
}
Tejun Heo's avatar
Tejun Heo committed
1008

1009
static void cgroup_rm_file(struct cgroup *cgrp, const struct cftype *cft)
Tejun Heo's avatar
Tejun Heo committed
1010
{
Tejun Heo's avatar
Tejun Heo committed
1011
	char name[CGROUP_FILE_NAME_MAX];
Tejun Heo's avatar
Tejun Heo committed
1012

1013
	lockdep_assert_held(&cgroup_tree_mutex);
Tejun Heo's avatar
Tejun Heo committed
1014
	kernfs_remove_by_name(cgrp->kn, cgroup_file_name(cgrp, cft, name));
Tejun Heo's avatar
Tejun Heo committed
1015 1016
}

1017
/**
1018
 * cgroup_clear_dir - remove subsys files in a cgroup directory
1019
 * @cgrp: target cgroup
1020 1021
 * @subsys_mask: mask of the subsystem ids whose files should be removed
 */
1022
static void cgroup_clear_dir(struct cgroup *cgrp, unsigned long subsys_mask)
Tejun Heo's avatar
Tejun Heo committed
1023
{
1024
	struct cgroup_subsys *ss;
1025
	int i;
Tejun Heo's avatar
Tejun Heo committed
1026

1027
	for_each_subsys(ss, i) {
Tejun Heo's avatar
Tejun Heo committed
1028
		struct cftype *cfts;
1029 1030

		if (!test_bit(i, &subsys_mask))
1031
			continue;
Tejun Heo's avatar
Tejun Heo committed
1032 1033
		list_for_each_entry(cfts, &ss->cfts, node)
			cgroup_addrm_files(cgrp, cfts, false);
1034
	}
1035 1036
}

1037
static int rebind_subsystems(struct cgroup_root *dst_root,
1038
			     unsigned long ss_mask)
1039
{
1040
	struct cgroup_subsys *ss;
1041
	int ssid, i, ret;
1042

1043 1044
	lockdep_assert_held(&cgroup_tree_mutex);
	lockdep_assert_held(&cgroup_mutex);
1045

1046 1047 1048
	for_each_subsys(ss, ssid) {
		if (!(ss_mask & (1 << ssid)))
			continue;
Ben Blum's avatar
Ben Blum committed
1049

1050
		/* if @ss is on the dummy_root, we can always move it */
1051
		if (ss->root == &cgrp_dfl_root)
1052
			continue;
1053

1054
		/* if @ss has non-root cgroups attached to it, can't move */
1055
		if (!list_empty(&ss->root->cgrp.children))
Tejun Heo's avatar
Tejun Heo committed
1056
			return -EBUSY;
1057

1058
		/* can't move between two non-dummy roots either */
1059
		if (dst_root != &cgrp_dfl_root)
1060
			return -EBUSY;
1061 1062
	}

1063 1064 1065
	ret = cgroup_populate_dir(&dst_root->cgrp, ss_mask);
	if (ret) {
		if (dst_root != &cgrp_dfl_root)
1066
			return ret;
1067

1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078
		/*
		 * Rebinding back to the default root is not allowed to
		 * fail.  Using both default and non-default roots should
		 * be rare.  Moving subsystems back and forth even more so.
		 * Just warn about it and continue.
		 */
		if (cgrp_dfl_root_visible) {
			pr_warning("cgroup: failed to create files (%d) while rebinding 0x%lx to default root\n",
				   ret, ss_mask);
			pr_warning("cgroup: you may retry by moving them to a different hierarchy and unbinding\n");
		}
1079
	}
1080 1081 1082 1083 1084

	/*
	 * Nothing can fail from this point on.  Remove files for the
	 * removed subsystems and rebind each subsystem.
	 */
1085
	mutex_unlock(&cgroup_mutex);
1086
	for_each_subsys(ss, ssid)
1087
		if (ss_mask & (1 << ssid))
1088
			cgroup_clear_dir(&ss->root->cgrp, 1 << ssid);
1089
	mutex_lock(&cgroup_mutex);
1090

1091
	for_each_subsys(ss, ssid) {
1092
		struct cgroup_root *src_root;
1093
		struct cgroup_subsys_state *css;
1094
		struct css_set *cset;
1095

1096 1097
		if (!(ss_mask & (1 << ssid)))
			continue;
1098

1099
		src_root = ss->root;
1100
		css = cgroup_css(&src_root->cgrp, ss);
1101

1102
		WARN_ON(!css || cgroup_css(&dst_root->cgrp, ss));
1103

1104 1105
		RCU_INIT_POINTER(src_root->cgrp.subsys[ssid], NULL);
		rcu_assign_pointer(dst_root->cgrp.subsys[ssid], css);
1106
		ss->root = dst_root;
1107
		css->cgroup = &dst_root->cgrp;
1108

1109 1110 1111 1112 1113 1114
		down_write(&css_set_rwsem);
		hash_for_each(css_set_table, i, cset, hlist)
			list_move_tail(&cset->e_cset_node[ss->id],
				       &dst_root->cgrp.e_csets[ss->id]);
		up_write(&css_set_rwsem);

1115 1116 1117
		src_root->subsys_mask &= ~(1 << ssid);
		src_root->cgrp.child_subsys_mask &= ~(1 << ssid);

1118
		/* default hierarchy doesn't enable controllers by default */
1119
		dst_root->subsys_mask |= 1 << ssid;
1120 1121
		if (dst_root != &cgrp_dfl_root)
			dst_root->cgrp.child_subsys_mask |= 1 << ssid;
1122

1123 1124
		if (ss->bind)
			ss->bind(css);
1125 1126
	}

1127
	kernfs_activate(dst_root->cgrp.kn);
1128 1129 1130
	return 0;
}

Tejun Heo's avatar
Tejun Heo committed
1131 1132
static int cgroup_show_options(struct seq_file *seq,
			       struct kernfs_root *kf_root)
1133
{
1134
	struct cgroup_root *root = cgroup_root_from_kf(kf_root);
1135
	struct cgroup_subsys *ss;
1136
	int ssid;
1137

1138
	for_each_subsys(ss, ssid)
1139
		if (root->subsys_mask & (1 << ssid))
1140
			seq_printf(seq, ",%s", ss->name);
1141 1142
	if (root->flags & CGRP_ROOT_SANE_BEHAVIOR)
		seq_puts(seq, ",sane_behavior");
1143
	if (root->flags & CGRP_ROOT_NOPREFIX)
1144
		seq_puts(seq, ",noprefix");
1145
	if (root->flags & CGRP_ROOT_XATTR)
Aristeu Rozanski's avatar
Aristeu Rozanski committed
1146
		seq_puts(seq, ",xattr");
1147 1148

	spin_lock(&release_agent_path_lock);
1149 1150
	if (strlen(root->release_agent_path))
		seq_printf(seq, ",release_agent=%s", root->release_agent_path);
1151 1152
	spin_unlock(&release_agent_path_lock);

1153
	if (test_bit(CGRP_CPUSET_CLONE_CHILDREN, &root->cgrp.flags))
1154
		seq_puts(seq, ",clone_children");
1155 1156
	if (strlen(root->name))
		seq_printf(seq, ",name=%s", root->name);
1157 1158 1159 1160
	return 0;
}

struct cgroup_sb_opts {
1161
	unsigned long subsys_mask;
1162
	unsigned long flags;
1163
	char *release_agent;
1164
	bool cpuset_clone_children;
1165
	char *name;
1166 1167
	/* User explicitly requested empty subsystem */
	bool none;
1168 1169
};

Ben Blum's avatar
Ben Blum committed
1170
/*
1171 1172 1173 1174
 * Convert a hierarchy specifier into a bitmask of subsystems and
 * flags. Call with cgroup_mutex held to protect the cgroup_subsys[]
 * array. This function takes refcounts on subsystems to be used, unless it
 * returns error, in which case no refcounts are taken.
Ben Blum's avatar
Ben Blum committed
1175
 */
1176
static int parse_cgroupfs_options(char *data, struct cgroup_sb_opts *opts)
1177
{
1178 1179
	char *token, *o = data;
	bool all_ss = false, one_ss = false;
1180
	unsigned long mask = (unsigned long)-1;
1181 1182
	struct cgroup_subsys *ss;
	int i;
1183

Ben Blum's avatar
Ben Blum committed
1184 1185
	BUG_ON(!mutex_is_locked(&cgroup_mutex));

1186
#ifdef CONFIG_CPUSETS
1187
	mask = ~(1UL << cpuset_cgrp_id);
1188
#endif
1189

1190
	memset(opts, 0, sizeof(*opts));
1191 1192 1193 1194

	while ((token = strsep(&o, ",")) != NULL) {
		if (!*token)
			return -EINVAL;
1195
		if (!strcmp(token, "none")) {
1196 1197
			/* Explicitly have no subsystems */
			opts->none = true;
1198 1199 1200 1201 1202 1203 1204 1205 1206
			continue;
		}
		if (!strcmp(token, "all")) {
			/* Mutually exclusive option 'all' + subsystem name */
			if (one_ss)
				return -EINVAL;
			all_ss = true;
			continue;
		}
1207 1208 1209 1210
		if (!strcmp(token, "__DEVEL__sane_behavior")) {
			opts->flags |= CGRP_ROOT_SANE_BEHAVIOR;
			continue;
		}
1211
		if (!strcmp(token, "noprefix")) {
1212
			opts->flags |= CGRP_ROOT_NOPREFIX;
1213 1214 1215
			continue;
		}
		if (!strcmp(token, "clone_children")) {
1216
			opts->cpuset_clone_children = true;
1217 1218
			continue;
		}
Aristeu Rozanski's avatar
Aristeu Rozanski committed
1219
		if (!strcmp(token, "xattr")) {
1220
			opts->flags |= CGRP_ROOT_XATTR;
Aristeu Rozanski's avatar
Aristeu Rozanski committed
1221 1222
			continue;
		}
1223
		if (!strncmp(token, "release_agent=", 14)) {
1224 1225 1226
			/* Specifying two release agents is forbidden */
			if (opts->release_agent)
				return -EINVAL;
1227
			opts->release_agent =
1228
				kstrndup(token + 14, PATH_MAX - 1, GFP_KERNEL);
1229 1230
			if (!opts->release_agent)
				return -ENOMEM;
1231 1232 1233
			continue;
		}
		if (!strncmp(token, "name=", 5)) {
1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250
			const char *name = token + 5;
			/* Can't specify an empty name */
			if (!strlen(name))
				return -EINVAL;
			/* Must match [\w.-]+ */
			for (i = 0; i < strlen(name); i++) {
				char c = name[i];
				if (isalnum(c))
					continue;
				if ((c == '.') || (c == '-') || (c == '_'))
					continue;
				return -EINVAL;
			}
			/* Specifying two names is forbidden */
			if (opts->name)
				return -EINVAL;
			opts->name = kstrndup(name,
1251
					      MAX_CGROUP_ROOT_NAMELEN - 1,
1252 1253 1254
					      GFP_KERNEL);
			if (!opts->name)
				return -ENOMEM;
1255 1256 1257 1258

			continue;
		}

1259
		for_each_subsys(ss, i) {
1260 1261 1262 1263 1264 1265 1266 1267
			if (strcmp(token, ss->name))
				continue;
			if (ss->disabled)
				continue;

			/* Mutually exclusive option 'all' + subsystem name */
			if (all_ss)
				return -EINVAL;
1268
			set_bit(i, &opts->subsys_mask);
1269 1270 1271 1272 1273 1274 1275 1276
			one_ss = true;

			break;
		}
		if (i == CGROUP_SUBSYS_COUNT)
			return -ENOENT;
	}

1277 1278
	/* Consistency checks */

1279 1280 1281
	if (opts->flags & CGRP_ROOT_SANE_BEHAVIOR) {
		pr_warning("cgroup: sane_behavior: this is still under development and its behaviors will change, proceed at your own risk\n");

1282 1283 1284 1285
		if ((opts->flags & (CGRP_ROOT_NOPREFIX | CGRP_ROOT_XATTR)) ||
		    opts->cpuset_clone_children || opts->release_agent ||
		    opts->name) {
			pr_err("cgroup: sane_behavior: noprefix, xattr, clone_children, release_agent and name are not allowed\n");
1286 1287
			return -EINVAL;
		}
1288 1289 1290 1291 1292 1293 1294 1295 1296 1297
	} else {
		/*
		 * If the 'all' option was specified select all the
		 * subsystems, otherwise if 'none', 'name=' and a subsystem
		 * name options were not specified, let's default to 'all'
		 */
		if (all_ss || (!one_ss && !opts->none && !opts->name))
			for_each_subsys(ss, i)
				if (!ss->disabled)
					set_bit(i, &opts->subsys_mask);
1298

1299 1300 1301 1302 1303
		/*
		 * We either have to specify by name or by subsystems. (So
		 * all empty hierarchies must have a name).
		 */
		if (!opts->subsys_mask && !opts->name)
1304 1305 1306
			return -EINVAL;
	}

1307 1308 1309 1310 1311
	/*
	 * Option noprefix was introduced just for backward compatibility
	 * with the old cpuset, so we allow noprefix only if mounting just
	 * the cpuset subsystem.
	 */
1312
	if ((opts->flags & CGRP_ROOT_NOPREFIX) && (opts->subsys_mask & mask))
1313 1314
		return -EINVAL;

1315 1316

	/* Can't specify "none" and some subsystems */
1317
	if (opts->subsys_mask && opts->none)
1318 1319
		return -EINVAL;

1320 1321 1322
	return 0;
}

Tejun Heo's avatar
Tejun Heo committed
1323
static int cgroup_remount(struct kernfs_root *kf_root, int *flags, char *data)
1324 1325
{
	int ret = 0;
1326
	struct cgroup_root *root = cgroup_root_from_kf(kf_root);
1327
	struct cgroup_sb_opts opts;
1328
	unsigned long added_mask, removed_mask;
1329

1330 1331 1332 1333 1334
	if (root->flags & CGRP_ROOT_SANE_BEHAVIOR) {
		pr_err("cgroup: sane_behavior: remount is not allowed\n");
		return -EINVAL;
	}

1335
	mutex_lock(&cgroup_tree_mutex);
1336 1337 1338 1339 1340 1341 1342
	mutex_lock(&cgroup_mutex);

	/* See what subsystems are wanted */
	ret = parse_cgroupfs_options(data, &opts);
	if (ret)
		goto out_unlock;

1343
	if (opts.subsys_mask != root->subsys_mask || opts.release_agent)
1344 1345 1346
		pr_warning("cgroup: option changes via remount are deprecated (pid=%d comm=%s)\n",
			   task_tgid_nr(current), current->comm);

1347 1348
	added_mask = opts.subsys_mask & ~root->subsys_mask;
	removed_mask = root->subsys_mask & ~opts.subsys_mask;
1349

1350
	/* Don't allow flags or name to change at remount */
1351
	if (((opts.flags ^ root->flags) & CGRP_ROOT_OPTION_MASK) ||
1352
	    (opts.name && strcmp(opts.name, root->name))) {
1353 1354 1355
		pr_err("cgroup: option or name mismatch, new: 0x%lx \"%s\", old: 0x%lx \"%s\"\n",
		       opts.flags & CGRP_ROOT_OPTION_MASK, opts.name ?: "",
		       root->flags & CGRP_ROOT_OPTION_MASK, root->name);
1356 1357 1358 1359
		ret = -EINVAL;
		goto out_unlock;
	}

1360
	/* remounting is not allowed for populated hierarchies */
1361
	if (!list_empty(&root->cgrp.children)) {
1362
		ret = -EBUSY;
1363
		goto out_unlock;
1364
	}
1365

1366
	ret = rebind_subsystems(root, added_mask);
1367
	if (ret)
1368
		goto out_unlock;
1369

1370
	rebind_subsystems(&cgrp_dfl_root, removed_mask);
1371

1372 1373
	if (opts.release_agent) {
		spin_lock(&release_agent_path_lock);
1374
		strcpy(root->release_agent_path, opts.release_agent);
1375 1376
		spin_unlock(&release_agent_path_lock);
	}
1377
 out_unlock:
1378
	kfree(opts.release_agent);
1379
	kfree(opts.name);
1380
	mutex_unlock(&cgroup_mutex);
1381
	mutex_unlock(&cgroup_tree_mutex);
1382 1383 1384
	return ret;
}

1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396
/*
 * To reduce the fork() overhead for systems that are not actually using
 * their cgroups capability, we don't maintain the lists running through
 * each css_set to its tasks until we see the list actually used - in other
 * words after the first mount.
 */
static bool use_task_css_set_links __read_mostly;

static void cgroup_enable_task_cg_lists(void)
{
	struct task_struct *p, *g;

1397
	down_write(&css_set_rwsem);
1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419

	if (use_task_css_set_links)
		goto out_unlock;

	use_task_css_set_links = true;

	/*
	 * We need tasklist_lock because RCU is not safe against
	 * while_each_thread(). Besides, a forking task that has passed
	 * cgroup_post_fork() without seeing use_task_css_set_links = 1
	 * is not guaranteed to have its child immediately visible in the
	 * tasklist if we walk through it with RCU.
	 */
	read_lock(&tasklist_lock);
	do_each_thread(g, p) {
		WARN_ON_ONCE(!list_empty(&p->cg_list) ||
			     task_css_set(p) != &init_css_set);

		/*
		 * We should check if the process is exiting, otherwise
		 * it will race with cgroup_exit() in that the list
		 * entry won't be deleted though the process has exited.
1420 1421
		 * Do it while holding siglock so that we don't end up
		 * racing against cgroup_exit().
1422
		 */
1423
		spin_lock_irq(&p->sighand->siglock);
1424 1425 1426 1427 1428 1429
		if (!(p->flags & PF_EXITING)) {
			struct css_set *cset = task_css_set(p);

			list_add(&p->cg_list, &cset->tasks);
			get_css_set(cset);
		}
1430
		spin_unlock_irq(&p->sighand->siglock);
1431 1432 1433
	} while_each_thread(g, p);
	read_unlock(&tasklist_lock);
out_unlock:
1434
	up_write(&css_set_rwsem);
1435
}
1436

1437 1438
static void init_cgroup_housekeeping(struct cgroup *cgrp)
{
1439 1440 1441
	struct cgroup_subsys *ss;
	int ssid;

Tejun Heo's avatar
Tejun Heo committed
1442
	atomic_set(&cgrp->refcnt, 1);
1443 1444
	INIT_LIST_HEAD(&cgrp->sibling);
	INIT_LIST_HEAD(&cgrp->children);
1445
	INIT_LIST_HEAD(&cgrp->cset_links);
1446
	INIT_LIST_HEAD(&cgrp->release_list);
1447 1448
	INIT_LIST_HEAD(&cgrp->pidlists);
	mutex_init(&cgrp->pidlist_mutex);
Tejun Heo's avatar
Tejun Heo committed
1449
	cgrp->dummy_css.cgroup = cgrp;
1450 1451 1452

	for_each_subsys(ss, ssid)
		INIT_LIST_HEAD(&cgrp->e_csets[ssid]);
1453
}
1454

1455
static void init_cgroup_root(struct cgroup_root *root,
1456
			     struct cgroup_sb_opts *opts)
1457
{
1458
	struct cgroup *cgrp = &root->cgrp;
1459

1460
	INIT_LIST_HEAD(&root->root_list);
1461
	atomic_set(&root->nr_cgrps, 1);
1462
	cgrp->root = root;
1463
	init_cgroup_housekeeping(cgrp);
1464
	idr_init(&root->cgroup_idr);
1465 1466 1467 1468 1469 1470

	root->flags = opts->flags;
	if (opts->release_agent)
		strcpy(root->release_agent_path, opts->release_agent);
	if (opts->name)
		strcpy(root->name, opts->name);
1471
	if (opts->cpuset_clone_children)
1472
		set_bit(CGRP_CPUSET_CLONE_CHILDREN, &root->cgrp.flags);
1473 1474
}

1475
static int cgroup_setup_root(struct cgroup_root *root, unsigned long ss_mask)
1476
{
1477
	LIST_HEAD(tmp_links);
1478
	struct cgroup *root_cgrp = &root->cgrp;
1479 1480
	struct css_set *cset;
	int i, ret;
1481

1482 1483
	lockdep_assert_held(&cgroup_tree_mutex);
	lockdep_assert_held(&cgroup_mutex);
1484

1485 1486
	ret = idr_alloc(&root->cgroup_idr, root_cgrp, 0, 1, GFP_KERNEL);
	if (ret < 0)
Tejun Heo's avatar
Tejun Heo committed
1487
		goto out;
1488
	root_cgrp->id = ret;
1489

1490
	/*
1491
	 * We're accessing css_set_count without locking css_set_rwsem here,
1492 1493 1494 1495 1496 1497
	 * but that's OK - it can only be increased by someone holding
	 * cgroup_lock, and that's us. The worst that can happen is that we
	 * have some link structures left over
	 */
	ret = allocate_cgrp_cset_links(css_set_count, &tmp_links);
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
1498
		goto out;
1499

1500
	ret = cgroup_init_root_id(root);
1501
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
1502
		goto out;
1503

Tejun Heo's avatar
Tejun Heo committed
1504 1505 1506 1507 1508 1509 1510 1511
	root->kf_root = kernfs_create_root(&cgroup_kf_syscall_ops,
					   KERNFS_ROOT_CREATE_DEACTIVATED,
					   root_cgrp);
	if (IS_ERR(root->kf_root)) {
		ret = PTR_ERR(root->kf_root);
		goto exit_root_id;
	}
	root_cgrp->kn = root->kf_root->kn;
1512

1513 1514
	ret = cgroup_addrm_files(root_cgrp, cgroup_base_files, true);
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
1515
		goto destroy_root;
1516

1517
	ret = rebind_subsystems(root, ss_mask);
1518
	if (ret)
Tejun Heo's avatar
Tejun Heo committed
1519
		goto destroy_root;
1520

1521 1522 1523 1524 1525 1526 1527
	/*
	 * There must be no failure case after here, since rebinding takes
	 * care of subsystems' refcounts, which are explicitly dropped in
	 * the failure exit path.
	 */
	list_add(&root->root_list, &cgroup_roots);
	cgroup_root_count++;
Al Viro's avatar
Al Viro committed
1528

1529
	/*
1530
	 * Link the root cgroup in this hierarchy into all the css_set
1531 1532
	 * objects.
	 */
1533
	down_write(&css_set_rwsem);
1534 1535
	hash_for_each(css_set_table, i, cset, hlist)
		link_css_set(&tmp_links, cset, root_cgrp);
1536
	up_write(&css_set_rwsem);
1537

1538
	BUG_ON(!list_empty(&root_cgrp->children));
1539
	BUG_ON(atomic_read(&root->nr_cgrps) != 1);
1540

Tejun Heo's avatar
Tejun Heo committed
1541
	kernfs_activate(root_cgrp->kn);
1542
	ret = 0;
Tejun Heo's avatar
Tejun Heo committed
1543
	goto out;
1544

Tejun Heo's avatar
Tejun Heo committed
1545 1546 1547 1548
destroy_root:
	kernfs_destroy_root(root->kf_root);
	root->kf_root = NULL;
exit_root_id:
1549
	cgroup_exit_root_id(root);
Tejun Heo's avatar
Tejun Heo committed
1550
out:
1551 1552
	free_cgrp_cset_links(&tmp_links);
	return ret;
1553 1554
}

Al Viro's avatar
Al Viro committed
1555
static struct dentry *cgroup_mount(struct file_system_type *fs_type,
1556
			 int flags, const char *unused_dev_name,
Al Viro's avatar
Al Viro committed
1557
			 void *data)
1558
{
1559
	struct cgroup_root *root;
1560
	struct cgroup_sb_opts opts;
Tejun Heo's avatar
Tejun Heo committed
1561
	struct dentry *dentry;
1562
	int ret;
1563
	bool new_sb;
1564

1565 1566 1567 1568 1569 1570
	/*
	 * The first time anyone tries to mount a cgroup, enable the list
	 * linking each css_set to its tasks and fix up all existing tasks.
	 */
	if (!use_task_css_set_links)
		cgroup_enable_task_cg_lists();
1571

1572
	mutex_lock(&cgroup_tree_mutex);
Ben Blum's avatar
Ben Blum committed
1573
	mutex_lock(&cgroup_mutex);
1574 1575

	/* First find the desired set of subsystems */
1576
	ret = parse_cgroupfs_options(data, &opts);
1577
	if (ret)
1578
		goto out_unlock;
1579
retry:
Tejun Heo's avatar
Tejun Heo committed
1580
	/* look for a matching existing root */
1581 1582 1583 1584 1585 1586
	if (!opts.subsys_mask && !opts.none && !opts.name) {
		cgrp_dfl_root_visible = true;
		root = &cgrp_dfl_root;
		cgroup_get(&root->cgrp);
		ret = 0;
		goto out_unlock;
1587 1588
	}

1589
	for_each_root(root) {
Tejun Heo's avatar
Tejun Heo committed
1590
		bool name_match = false;
1591

1592
		if (root == &cgrp_dfl_root)
1593
			continue;
1594

1595
		/*
Tejun Heo's avatar
Tejun Heo committed
1596 1597 1598
		 * If we asked for a name then it must match.  Also, if
		 * name matches but sybsys_mask doesn't, we should fail.
		 * Remember whether name matched.
1599
		 */
Tejun Heo's avatar
Tejun Heo committed
1600 1601 1602 1603 1604
		if (opts.name) {
			if (strcmp(opts.name, root->name))
				continue;
			name_match = true;
		}
1605

1606
		/*
Tejun Heo's avatar
Tejun Heo committed
1607 1608
		 * If we asked for subsystems (or explicitly for no
		 * subsystems) then they must match.
1609
		 */
Tejun Heo's avatar
Tejun Heo committed
1610
		if ((opts.subsys_mask || opts.none) &&
1611
		    (opts.subsys_mask != root->subsys_mask)) {
Tejun Heo's avatar
Tejun Heo committed
1612 1613 1614 1615 1616
			if (!name_match)
				continue;
			ret = -EBUSY;
			goto out_unlock;
		}
1617

1618
		if ((root->flags ^ opts.flags) & CGRP_ROOT_OPTION_MASK) {
1619 1620 1621
			if ((root->flags | opts.flags) & CGRP_ROOT_SANE_BEHAVIOR) {
				pr_err("cgroup: sane_behavior: new mount options should match the existing superblock\n");
				ret = -EINVAL;
1622
				goto out_unlock;
1623 1624 1625
			} else {
				pr_warning("cgroup: new mount options do not match the existing superblock, will be ignored\n");
			}
1626
		}
1627

1628
		/*
1629
		 * A root's lifetime is governed by its root cgroup.  Zero
1630 1631 1632 1633 1634
		 * ref indicate that the root is being destroyed.  Wait for
		 * destruction to complete so that the subsystems are free.
		 * We can use wait_queue for the wait but this path is
		 * super cold.  Let's just sleep for a bit and retry.
		 */
1635
		if (!atomic_inc_not_zero(&root->cgrp.refcnt)) {
1636 1637 1638
			mutex_unlock(&cgroup_mutex);
			mutex_unlock(&cgroup_tree_mutex);
			msleep(10);
1639 1640
			mutex_lock(&cgroup_tree_mutex);
			mutex_lock(&cgroup_mutex);
1641 1642
			goto retry;
		}
1643

1644
		ret = 0;
Tejun Heo's avatar
Tejun Heo committed
1645
		goto out_unlock;
1646 1647
	}

1648
	/*
1649 1650 1651
	 * No such thing, create a new one.  name= matching without subsys
	 * specification is allowed for already existing hierarchies but we
	 * can't create new one without subsys specification.
1652
	 */
1653 1654 1655
	if (!opts.subsys_mask && !opts.none) {
		ret = -EINVAL;
		goto out_unlock;
1656 1657
	}

1658 1659 1660
	root = kzalloc(sizeof(*root), GFP_KERNEL);
	if (!root) {
		ret = -ENOMEM;
Tejun Heo's avatar
Tejun Heo committed
1661
		goto out_unlock;
1662
	}
1663

1664 1665
	init_cgroup_root(root, &opts);

1666
	ret = cgroup_setup_root(root, opts.subsys_mask);
Tejun Heo's avatar
Tejun Heo committed
1667 1668
	if (ret)
		cgroup_free_root(root);
1669

1670
out_unlock:
1671
	mutex_unlock(&cgroup_mutex);
1672
	mutex_unlock(&cgroup_tree_mutex);
1673

1674 1675
	kfree(opts.release_agent);
	kfree(opts.name);
Aristeu Rozanski's avatar
Aristeu Rozanski committed
1676

Tejun Heo's avatar
Tejun Heo committed
1677
	if (ret)
1678
		return ERR_PTR(ret);
Tejun Heo's avatar
Tejun Heo committed
1679

1680 1681
	dentry = kernfs_mount(fs_type, flags, root->kf_root, &new_sb);
	if (IS_ERR(dentry) || !new_sb)
1682
		cgroup_put(&root->cgrp);
Tejun Heo's avatar
Tejun Heo committed
1683 1684 1685 1686 1687 1688
	return dentry;
}

static void cgroup_kill_sb(struct super_block *sb)
{
	struct kernfs_root *kf_root = kernfs_root_from_sb(sb);
1689
	struct cgroup_root *root = cgroup_root_from_kf(kf_root);
Tejun Heo's avatar
Tejun Heo committed
1690

1691
	cgroup_put(&root->cgrp);
Tejun Heo's avatar
Tejun Heo committed
1692
	kernfs_kill_sb(sb);
1693 1694 1695 1696
}

static struct file_system_type cgroup_fs_type = {
	.name = "cgroup",
Al Viro's avatar
Al Viro committed
1697
	.mount = cgroup_mount,
1698 1699 1700
	.kill_sb = cgroup_kill_sb,
};

1701 1702
static struct kobject *cgroup_kobj;

1703
/**
1704
 * task_cgroup_path - cgroup path of a task in the first cgroup hierarchy
1705 1706 1707 1708
 * @task: target task
 * @buf: the buffer to write the path into
 * @buflen: the length of the buffer
 *
1709 1710 1711 1712 1713
 * Determine @task's cgroup on the first (the one with the lowest non-zero
 * hierarchy_id) cgroup hierarchy and copy its path into @buf.  This
 * function grabs cgroup_mutex and shouldn't be used inside locks used by
 * cgroup controller callbacks.
 *
Tejun Heo's avatar
Tejun Heo committed
1714
 * Return value is the same as kernfs_path().
1715
 */
Tejun Heo's avatar
Tejun Heo committed
1716
char *task_cgroup_path(struct task_struct *task, char *buf, size_t buflen)
1717
{
1718
	struct cgroup_root *root;
1719
	struct cgroup *cgrp;
Tejun Heo's avatar
Tejun Heo committed
1720 1721
	int hierarchy_id = 1;
	char *path = NULL;
1722 1723

	mutex_lock(&cgroup_mutex);
1724
	down_read(&css_set_rwsem);
1725

1726 1727
	root = idr_get_next(&cgroup_hierarchy_idr, &hierarchy_id);

1728 1729
	if (root) {
		cgrp = task_cgroup_from_root(task, root);
Tejun Heo's avatar
Tejun Heo committed
1730
		path = cgroup_path(cgrp, buf, buflen);
1731 1732
	} else {
		/* if no hierarchy exists, everyone is in "/" */
Tejun Heo's avatar
Tejun Heo committed
1733 1734
		if (strlcpy(buf, "/", buflen) < buflen)
			path = buf;
1735 1736
	}

1737
	up_read(&css_set_rwsem);
1738
	mutex_unlock(&cgroup_mutex);
Tejun Heo's avatar
Tejun Heo committed
1739
	return path;
1740
}
1741
EXPORT_SYMBOL_GPL(task_cgroup_path);
1742

1743
/* used to track tasks and other necessary states during migration */
1744
struct cgroup_taskset {
1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762
	/* the src and dst cset list running through cset->mg_node */
	struct list_head	src_csets;
	struct list_head	dst_csets;

	/*
	 * Fields for cgroup_taskset_*() iteration.
	 *
	 * Before migration is committed, the target migration tasks are on
	 * ->mg_tasks of the csets on ->src_csets.  After, on ->mg_tasks of
	 * the csets on ->dst_csets.  ->csets point to either ->src_csets
	 * or ->dst_csets depending on whether migration is committed.
	 *
	 * ->cur_csets and ->cur_task point to the current task position
	 * during iteration.
	 */
	struct list_head	*csets;
	struct css_set		*cur_cset;
	struct task_struct	*cur_task;
1763 1764 1765 1766 1767 1768 1769 1770 1771 1772
};

/**
 * cgroup_taskset_first - reset taskset and return the first task
 * @tset: taskset of interest
 *
 * @tset iteration is initialized and the first task is returned.
 */
struct task_struct *cgroup_taskset_first(struct cgroup_taskset *tset)
{
1773 1774 1775 1776
	tset->cur_cset = list_first_entry(tset->csets, struct css_set, mg_node);
	tset->cur_task = NULL;

	return cgroup_taskset_next(tset);
1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787
}

/**
 * cgroup_taskset_next - iterate to the next task in taskset
 * @tset: taskset of interest
 *
 * Return the next task in @tset.  Iteration must have been initialized
 * with cgroup_taskset_first().
 */
struct task_struct *cgroup_taskset_next(struct cgroup_taskset *tset)
{
1788 1789
	struct css_set *cset = tset->cur_cset;
	struct task_struct *task = tset->cur_task;
1790

1791 1792 1793 1794 1795 1796
	while (&cset->mg_node != tset->csets) {
		if (!task)
			task = list_first_entry(&cset->mg_tasks,
						struct task_struct, cg_list);
		else
			task = list_next_entry(task, cg_list);
1797

1798 1799 1800 1801 1802
		if (&task->cg_list != &cset->mg_tasks) {
			tset->cur_cset = cset;
			tset->cur_task = task;
			return task;
		}
1803

1804 1805 1806
		cset = list_next_entry(cset, mg_node);
		task = NULL;
	}
1807

1808
	return NULL;
1809 1810
}

1811
/**
Ben Blum's avatar
Ben Blum committed
1812
 * cgroup_task_migrate - move a task from one cgroup to another.
1813 1814 1815
 * @old_cgrp; the cgroup @tsk is being migrated from
 * @tsk: the task being migrated
 * @new_cset: the new css_set @tsk is being attached to
Ben Blum's avatar
Ben Blum committed
1816
 *
1817
 * Must be called with cgroup_mutex, threadgroup and css_set_rwsem locked.
Ben Blum's avatar
Ben Blum committed
1818
 */
1819 1820 1821
static void cgroup_task_migrate(struct cgroup *old_cgrp,
				struct task_struct *tsk,
				struct css_set *new_cset)
Ben Blum's avatar
Ben Blum committed
1822
{
1823
	struct css_set *old_cset;
Ben Blum's avatar
Ben Blum committed
1824

1825 1826 1827
	lockdep_assert_held(&cgroup_mutex);
	lockdep_assert_held(&css_set_rwsem);

Ben Blum's avatar
Ben Blum committed
1828
	/*
1829 1830 1831
	 * We are synchronized through threadgroup_lock() against PF_EXITING
	 * setting such that we can't race against cgroup_exit() changing the
	 * css_set to init_css_set and dropping the old one.
Ben Blum's avatar
Ben Blum committed
1832
	 */
1833
	WARN_ON_ONCE(tsk->flags & PF_EXITING);
1834
	old_cset = task_css_set(tsk);
Ben Blum's avatar
Ben Blum committed
1835

1836
	get_css_set(new_cset);
1837
	rcu_assign_pointer(tsk->cgroups, new_cset);
Ben Blum's avatar
Ben Blum committed
1838

1839 1840 1841 1842 1843 1844 1845
	/*
	 * Use move_tail so that cgroup_taskset_first() still returns the
	 * leader after migration.  This works because cgroup_migrate()
	 * ensures that the dst_cset of the leader is the first on the
	 * tset's dst_csets list.
	 */
	list_move_tail(&tsk->cg_list, &new_cset->mg_tasks);
Ben Blum's avatar
Ben Blum committed
1846 1847

	/*
1848 1849 1850
	 * We just gained a reference on old_cset by taking it from the
	 * task. As trading it for new_cset is protected by cgroup_mutex,
	 * we're safe to drop it here; it will be freed under RCU.
Ben Blum's avatar
Ben Blum committed
1851
	 */
1852
	set_bit(CGRP_RELEASABLE, &old_cgrp->flags);
1853
	put_css_set_locked(old_cset, false);
Ben Blum's avatar
Ben Blum committed
1854 1855
}

Li Zefan's avatar
Li Zefan committed
1856
/**
1857 1858
 * cgroup_migrate_finish - cleanup after attach
 * @preloaded_csets: list of preloaded css_sets
Ben Blum's avatar
Ben Blum committed
1859
 *
1860 1861
 * Undo cgroup_migrate_add_src() and cgroup_migrate_prepare_dst().  See
 * those functions for details.
Ben Blum's avatar
Ben Blum committed
1862
 */
1863
static void cgroup_migrate_finish(struct list_head *preloaded_csets)
Ben Blum's avatar
Ben Blum committed
1864
{
1865
	struct css_set *cset, *tmp_cset;
Ben Blum's avatar
Ben Blum committed
1866

1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987
	lockdep_assert_held(&cgroup_mutex);

	down_write(&css_set_rwsem);
	list_for_each_entry_safe(cset, tmp_cset, preloaded_csets, mg_preload_node) {
		cset->mg_src_cgrp = NULL;
		cset->mg_dst_cset = NULL;
		list_del_init(&cset->mg_preload_node);
		put_css_set_locked(cset, false);
	}
	up_write(&css_set_rwsem);
}

/**
 * cgroup_migrate_add_src - add a migration source css_set
 * @src_cset: the source css_set to add
 * @dst_cgrp: the destination cgroup
 * @preloaded_csets: list of preloaded css_sets
 *
 * Tasks belonging to @src_cset are about to be migrated to @dst_cgrp.  Pin
 * @src_cset and add it to @preloaded_csets, which should later be cleaned
 * up by cgroup_migrate_finish().
 *
 * This function may be called without holding threadgroup_lock even if the
 * target is a process.  Threads may be created and destroyed but as long
 * as cgroup_mutex is not dropped, no new css_set can be put into play and
 * the preloaded css_sets are guaranteed to cover all migrations.
 */
static void cgroup_migrate_add_src(struct css_set *src_cset,
				   struct cgroup *dst_cgrp,
				   struct list_head *preloaded_csets)
{
	struct cgroup *src_cgrp;

	lockdep_assert_held(&cgroup_mutex);
	lockdep_assert_held(&css_set_rwsem);

	src_cgrp = cset_cgroup_from_root(src_cset, dst_cgrp->root);

	/* nothing to do if this cset already belongs to the cgroup */
	if (src_cgrp == dst_cgrp)
		return;

	if (!list_empty(&src_cset->mg_preload_node))
		return;

	WARN_ON(src_cset->mg_src_cgrp);
	WARN_ON(!list_empty(&src_cset->mg_tasks));
	WARN_ON(!list_empty(&src_cset->mg_node));

	src_cset->mg_src_cgrp = src_cgrp;
	get_css_set(src_cset);
	list_add(&src_cset->mg_preload_node, preloaded_csets);
}

/**
 * cgroup_migrate_prepare_dst - prepare destination css_sets for migration
 * @dst_cgrp: the destination cgroup
 * @preloaded_csets: list of preloaded source css_sets
 *
 * Tasks are about to be moved to @dst_cgrp and all the source css_sets
 * have been preloaded to @preloaded_csets.  This function looks up and
 * pins all destination css_sets, links each to its source, and put them on
 * @preloaded_csets.
 *
 * This function must be called after cgroup_migrate_add_src() has been
 * called on each migration source css_set.  After migration is performed
 * using cgroup_migrate(), cgroup_migrate_finish() must be called on
 * @preloaded_csets.
 */
static int cgroup_migrate_prepare_dst(struct cgroup *dst_cgrp,
				      struct list_head *preloaded_csets)
{
	LIST_HEAD(csets);
	struct css_set *src_cset;

	lockdep_assert_held(&cgroup_mutex);

	/* look up the dst cset for each src cset and link it to src */
	list_for_each_entry(src_cset, preloaded_csets, mg_preload_node) {
		struct css_set *dst_cset;

		dst_cset = find_css_set(src_cset, dst_cgrp);
		if (!dst_cset)
			goto err;

		WARN_ON_ONCE(src_cset->mg_dst_cset || dst_cset->mg_dst_cset);
		src_cset->mg_dst_cset = dst_cset;

		if (list_empty(&dst_cset->mg_preload_node))
			list_add(&dst_cset->mg_preload_node, &csets);
		else
			put_css_set(dst_cset, false);
	}

	list_splice(&csets, preloaded_csets);
	return 0;
err:
	cgroup_migrate_finish(&csets);
	return -ENOMEM;
}

/**
 * cgroup_migrate - migrate a process or task to a cgroup
 * @cgrp: the destination cgroup
 * @leader: the leader of the process or the task to migrate
 * @threadgroup: whether @leader points to the whole process or a single task
 *
 * Migrate a process or task denoted by @leader to @cgrp.  If migrating a
 * process, the caller must be holding threadgroup_lock of @leader.  The
 * caller is also responsible for invoking cgroup_migrate_add_src() and
 * cgroup_migrate_prepare_dst() on the targets before invoking this
 * function and following up with cgroup_migrate_finish().
 *
 * As long as a controller's ->can_attach() doesn't fail, this function is
 * guaranteed to succeed.  This means that, excluding ->can_attach()
 * failure, when migrating multiple targets, the success or failure can be
 * decided for all targets by invoking group_migrate_prepare_dst() before
 * actually starting migrating.
 */
static int cgroup_migrate(struct cgroup *cgrp, struct task_struct *leader,
			  bool threadgroup)
Ben Blum's avatar
Ben Blum committed
1988
{
1989 1990 1991 1992 1993
	struct cgroup_taskset tset = {
		.src_csets	= LIST_HEAD_INIT(tset.src_csets),
		.dst_csets	= LIST_HEAD_INIT(tset.dst_csets),
		.csets		= &tset.src_csets,
	};
Tejun Heo's avatar
Tejun Heo committed
1994
	struct cgroup_subsys_state *css, *failed_css = NULL;
1995 1996 1997
	struct css_set *cset, *tmp_cset;
	struct task_struct *task, *tmp_task;
	int i, ret;
Ben Blum's avatar
Ben Blum committed
1998

1999 2000 2001 2002 2003
	/*
	 * Prevent freeing of tasks while we take a snapshot. Tasks that are
	 * already PF_EXITING could be freed from underneath us unless we
	 * take an rcu_read_lock.
	 */
2004
	down_write(&css_set_rwsem);
2005
	rcu_read_lock();
2006
	task = leader;
Ben Blum's avatar
Ben Blum committed
2007
	do {
2008 2009
		/* @task either already exited or can't exit until the end */
		if (task->flags & PF_EXITING)
2010
			goto next;
2011

2012 2013
		/* leave @task alone if post_fork() hasn't linked it yet */
		if (list_empty(&task->cg_list))
2014
			goto next;
2015

2016
		cset = task_css_set(task);
2017
		if (!cset->mg_src_cgrp)
2018
			goto next;
2019

2020
		/*
2021 2022
		 * cgroup_taskset_first() must always return the leader.
		 * Take care to avoid disturbing the ordering.
2023
		 */
2024 2025 2026 2027 2028 2029
		list_move_tail(&task->cg_list, &cset->mg_tasks);
		if (list_empty(&cset->mg_node))
			list_add_tail(&cset->mg_node, &tset.src_csets);
		if (list_empty(&cset->mg_dst_cset->mg_node))
			list_move_tail(&cset->mg_dst_cset->mg_node,
				       &tset.dst_csets);
2030
	next:
2031 2032
		if (!threadgroup)
			break;
2033
	} while_each_thread(leader, task);
2034
	rcu_read_unlock();
2035
	up_write(&css_set_rwsem);
Ben Blum's avatar
Ben Blum committed
2036

2037
	/* methods shouldn't be called if no task is actually migrating */
2038 2039
	if (list_empty(&tset.src_csets))
		return 0;
2040

2041
	/* check that we can legitimately attach to the cgroup */
2042
	for_each_e_css(css, i, cgrp) {
Tejun Heo's avatar
Tejun Heo committed
2043
		if (css->ss->can_attach) {
2044 2045
			ret = css->ss->can_attach(css, &tset);
			if (ret) {
Tejun Heo's avatar
Tejun Heo committed
2046
				failed_css = css;
Ben Blum's avatar
Ben Blum committed
2047 2048 2049 2050 2051 2052
				goto out_cancel_attach;
			}
		}
	}

	/*
2053 2054 2055
	 * Now that we're guaranteed success, proceed to move all tasks to
	 * the new cgroup.  There are no failure cases after here, so this
	 * is the commit point.
Ben Blum's avatar
Ben Blum committed
2056
	 */
2057
	down_write(&css_set_rwsem);
2058 2059 2060 2061
	list_for_each_entry(cset, &tset.src_csets, mg_node) {
		list_for_each_entry_safe(task, tmp_task, &cset->mg_tasks, cg_list)
			cgroup_task_migrate(cset->mg_src_cgrp, task,
					    cset->mg_dst_cset);
Ben Blum's avatar
Ben Blum committed
2062
	}
2063
	up_write(&css_set_rwsem);
Ben Blum's avatar
Ben Blum committed
2064 2065

	/*
2066 2067 2068
	 * Migration is committed, all target tasks are now on dst_csets.
	 * Nothing is sensitive to fork() after this point.  Notify
	 * controllers that migration is complete.
Ben Blum's avatar
Ben Blum committed
2069
	 */
2070
	tset.csets = &tset.dst_csets;
Ben Blum's avatar
Ben Blum committed
2071

2072
	for_each_e_css(css, i, cgrp)
Tejun Heo's avatar
Tejun Heo committed
2073 2074
		if (css->ss->attach)
			css->ss->attach(css, &tset);
Ben Blum's avatar
Ben Blum committed
2075

2076
	ret = 0;
2077 2078
	goto out_release_tset;

Ben Blum's avatar
Ben Blum committed
2079
out_cancel_attach:
2080
	for_each_e_css(css, i, cgrp) {
2081 2082 2083 2084
		if (css == failed_css)
			break;
		if (css->ss->cancel_attach)
			css->ss->cancel_attach(css, &tset);
Ben Blum's avatar
Ben Blum committed
2085
	}
2086 2087 2088 2089
out_release_tset:
	down_write(&css_set_rwsem);
	list_splice_init(&tset.dst_csets, &tset.src_csets);
	list_for_each_entry_safe(cset, tmp_cset, &tset.src_csets, mg_node) {
2090
		list_splice_tail_init(&cset->mg_tasks, &cset->tasks);
2091 2092 2093
		list_del_init(&cset->mg_node);
	}
	up_write(&css_set_rwsem);
2094
	return ret;
Ben Blum's avatar
Ben Blum committed
2095 2096
}

2097 2098 2099 2100 2101 2102
/**
 * cgroup_attach_task - attach a task or a whole threadgroup to a cgroup
 * @dst_cgrp: the cgroup to attach to
 * @leader: the task or the leader of the threadgroup to be attached
 * @threadgroup: attach the whole threadgroup?
 *
2103
 * Call holding cgroup_mutex and threadgroup_lock of @leader.
2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131
 */
static int cgroup_attach_task(struct cgroup *dst_cgrp,
			      struct task_struct *leader, bool threadgroup)
{
	LIST_HEAD(preloaded_csets);
	struct task_struct *task;
	int ret;

	/* look up all src csets */
	down_read(&css_set_rwsem);
	rcu_read_lock();
	task = leader;
	do {
		cgroup_migrate_add_src(task_css_set(task), dst_cgrp,
				       &preloaded_csets);
		if (!threadgroup)
			break;
	} while_each_thread(leader, task);
	rcu_read_unlock();
	up_read(&css_set_rwsem);

	/* prepare dst csets and commit */
	ret = cgroup_migrate_prepare_dst(dst_cgrp, &preloaded_csets);
	if (!ret)
		ret = cgroup_migrate(dst_cgrp, leader, threadgroup);

	cgroup_migrate_finish(&preloaded_csets);
	return ret;
Ben Blum's avatar
Ben Blum committed
2132 2133 2134 2135
}

/*
 * Find the task_struct of the task to attach by vpid and pass it along to the
2136
 * function to attach either it or all tasks in its threadgroup. Will lock
2137
 * cgroup_mutex and threadgroup.
2138
 */
Ben Blum's avatar
Ben Blum committed
2139
static int attach_task_by_pid(struct cgroup *cgrp, u64 pid, bool threadgroup)
2140 2141
{
	struct task_struct *tsk;
2142
	const struct cred *cred = current_cred(), *tcred;
2143 2144
	int ret;

Ben Blum's avatar
Ben Blum committed
2145 2146 2147
	if (!cgroup_lock_live_group(cgrp))
		return -ENODEV;

2148 2149
retry_find_task:
	rcu_read_lock();
2150
	if (pid) {
2151
		tsk = find_task_by_vpid(pid);
Ben Blum's avatar
Ben Blum committed
2152 2153
		if (!tsk) {
			rcu_read_unlock();
2154
			ret = -ESRCH;
2155
			goto out_unlock_cgroup;
2156
		}
Ben Blum's avatar
Ben Blum committed
2157 2158 2159 2160
		/*
		 * even if we're attaching all tasks in the thread group, we
		 * only need to check permissions on one of them.
		 */
2161
		tcred = __task_cred(tsk);
2162 2163 2164
		if (!uid_eq(cred->euid, GLOBAL_ROOT_UID) &&
		    !uid_eq(cred->euid, tcred->uid) &&
		    !uid_eq(cred->euid, tcred->suid)) {
2165
			rcu_read_unlock();
2166 2167
			ret = -EACCES;
			goto out_unlock_cgroup;
2168
		}
2169 2170
	} else
		tsk = current;
2171 2172

	if (threadgroup)
2173
		tsk = tsk->group_leader;
2174 2175

	/*
2176
	 * Workqueue threads may acquire PF_NO_SETAFFINITY and become
2177 2178 2179
	 * trapped in a cpuset, or RT worker may be born in a cgroup
	 * with no rt_runtime allocated.  Just say no.
	 */
2180
	if (tsk == kthreadd_task || (tsk->flags & PF_NO_SETAFFINITY)) {
2181 2182 2183 2184 2185
		ret = -EINVAL;
		rcu_read_unlock();
		goto out_unlock_cgroup;
	}

2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202
	get_task_struct(tsk);
	rcu_read_unlock();

	threadgroup_lock(tsk);
	if (threadgroup) {
		if (!thread_group_leader(tsk)) {
			/*
			 * a race with de_thread from another thread's exec()
			 * may strip us of our leadership, if this happens,
			 * there is no choice but to throw this task away and
			 * try again; this is
			 * "double-double-toil-and-trouble-check locking".
			 */
			threadgroup_unlock(tsk);
			put_task_struct(tsk);
			goto retry_find_task;
		}
2203 2204 2205 2206
	}

	ret = cgroup_attach_task(cgrp, tsk, threadgroup);

2207 2208
	threadgroup_unlock(tsk);

2209
	put_task_struct(tsk);
2210
out_unlock_cgroup:
Tejun Heo's avatar
Tejun Heo committed
2211
	mutex_unlock(&cgroup_mutex);
2212 2213 2214
	return ret;
}

2215 2216 2217 2218 2219 2220 2221
/**
 * cgroup_attach_task_all - attach task 'tsk' to all cgroups of task 'from'
 * @from: attach to all cgroups of a given task
 * @tsk: the task to be attached
 */
int cgroup_attach_task_all(struct task_struct *from, struct task_struct *tsk)
{
2222
	struct cgroup_root *root;
2223 2224
	int retval = 0;

Tejun Heo's avatar
Tejun Heo committed
2225
	mutex_lock(&cgroup_mutex);
2226
	for_each_root(root) {
2227 2228
		struct cgroup *from_cgrp;

2229
		if (root == &cgrp_dfl_root)
2230 2231
			continue;

2232 2233 2234
		down_read(&css_set_rwsem);
		from_cgrp = task_cgroup_from_root(from, root);
		up_read(&css_set_rwsem);
2235

Li Zefan's avatar
Li Zefan committed
2236
		retval = cgroup_attach_task(from_cgrp, tsk, false);
2237 2238 2239
		if (retval)
			break;
	}
Tejun Heo's avatar
Tejun Heo committed
2240
	mutex_unlock(&cgroup_mutex);
2241 2242 2243 2244 2245

	return retval;
}
EXPORT_SYMBOL_GPL(cgroup_attach_task_all);

2246 2247
static int cgroup_tasks_write(struct cgroup_subsys_state *css,
			      struct cftype *cft, u64 pid)
Ben Blum's avatar
Ben Blum committed
2248
{
2249
	return attach_task_by_pid(css->cgroup, pid, false);
Ben Blum's avatar
Ben Blum committed
2250 2251
}

2252 2253
static int cgroup_procs_write(struct cgroup_subsys_state *css,
			      struct cftype *cft, u64 tgid)
2254
{
2255
	return attach_task_by_pid(css->cgroup, tgid, true);
2256 2257
}

2258
static int cgroup_release_agent_write(struct cgroup_subsys_state *css,
2259
				      struct cftype *cft, char *buffer)
2260
{
2261
	struct cgroup_root *root = css->cgroup->root;
2262 2263

	BUILD_BUG_ON(sizeof(root->release_agent_path) < PATH_MAX);
2264
	if (!cgroup_lock_live_group(css->cgroup))
2265
		return -ENODEV;
2266
	spin_lock(&release_agent_path_lock);
2267 2268
	strlcpy(root->release_agent_path, buffer,
		sizeof(root->release_agent_path));
2269
	spin_unlock(&release_agent_path_lock);
Tejun Heo's avatar
Tejun Heo committed
2270
	mutex_unlock(&cgroup_mutex);
2271 2272 2273
	return 0;
}

2274
static int cgroup_release_agent_show(struct seq_file *seq, void *v)
2275
{
2276
	struct cgroup *cgrp = seq_css(seq)->cgroup;
2277

2278 2279 2280 2281
	if (!cgroup_lock_live_group(cgrp))
		return -ENODEV;
	seq_puts(seq, cgrp->root->release_agent_path);
	seq_putc(seq, '\n');
Tejun Heo's avatar
Tejun Heo committed
2282
	mutex_unlock(&cgroup_mutex);
2283 2284 2285
	return 0;
}

2286
static int cgroup_sane_behavior_show(struct seq_file *seq, void *v)
2287
{
2288 2289 2290
	struct cgroup *cgrp = seq_css(seq)->cgroup;

	seq_printf(seq, "%d\n", cgroup_sane_behavior(cgrp));
2291 2292 2293
	return 0;
}

Tejun Heo's avatar
Tejun Heo committed
2294 2295
static ssize_t cgroup_file_write(struct kernfs_open_file *of, char *buf,
				 size_t nbytes, loff_t off)
2296
{
Tejun Heo's avatar
Tejun Heo committed
2297 2298 2299
	struct cgroup *cgrp = of->kn->parent->priv;
	struct cftype *cft = of->kn->priv;
	struct cgroup_subsys_state *css;
2300
	int ret;
2301

Tejun Heo's avatar
Tejun Heo committed
2302 2303 2304 2305 2306 2307 2308 2309 2310
	/*
	 * kernfs guarantees that a file isn't deleted with operations in
	 * flight, which means that the matching css is and stays alive and
	 * doesn't need to be pinned.  The RCU locking is not necessary
	 * either.  It's just for the convenience of using cgroup_css().
	 */
	rcu_read_lock();
	css = cgroup_css(cgrp, cft->ss);
	rcu_read_unlock();
2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325

	if (cft->write_string) {
		ret = cft->write_string(css, cft, strstrip(buf));
	} else if (cft->write_u64) {
		unsigned long long v;
		ret = kstrtoull(buf, 0, &v);
		if (!ret)
			ret = cft->write_u64(css, cft, v);
	} else if (cft->write_s64) {
		long long v;
		ret = kstrtoll(buf, 0, &v);
		if (!ret)
			ret = cft->write_s64(css, cft, v);
	} else if (cft->trigger) {
		ret = cft->trigger(css, (unsigned int)cft->private);
2326
	} else {
2327
		ret = -EINVAL;
2328
	}
Tejun Heo's avatar
Tejun Heo committed
2329

2330
	return ret ?: nbytes;
2331 2332
}

2333
static void *cgroup_seqfile_start(struct seq_file *seq, loff_t *ppos)
2334
{
Tejun Heo's avatar
Tejun Heo committed
2335
	return seq_cft(seq)->seq_start(seq, ppos);
2336 2337
}

2338
static void *cgroup_seqfile_next(struct seq_file *seq, void *v, loff_t *ppos)
2339
{
Tejun Heo's avatar
Tejun Heo committed
2340
	return seq_cft(seq)->seq_next(seq, v, ppos);
2341 2342
}

2343
static void cgroup_seqfile_stop(struct seq_file *seq, void *v)
2344
{
Tejun Heo's avatar
Tejun Heo committed
2345
	seq_cft(seq)->seq_stop(seq, v);
2346 2347
}

2348
static int cgroup_seqfile_show(struct seq_file *m, void *arg)
2349
{
2350 2351
	struct cftype *cft = seq_cft(m);
	struct cgroup_subsys_state *css = seq_css(m);
2352

2353 2354
	if (cft->seq_show)
		return cft->seq_show(m, arg);
2355

2356
	if (cft->read_u64)
2357 2358 2359 2360 2361 2362
		seq_printf(m, "%llu\n", cft->read_u64(css, cft));
	else if (cft->read_s64)
		seq_printf(m, "%lld\n", cft->read_s64(css, cft));
	else
		return -EINVAL;
	return 0;
2363 2364
}

Tejun Heo's avatar
Tejun Heo committed
2365 2366 2367 2368
static struct kernfs_ops cgroup_kf_single_ops = {
	.atomic_write_len	= PAGE_SIZE,
	.write			= cgroup_file_write,
	.seq_show		= cgroup_seqfile_show,
2369 2370
};

Tejun Heo's avatar
Tejun Heo committed
2371 2372 2373 2374 2375 2376 2377 2378
static struct kernfs_ops cgroup_kf_ops = {
	.atomic_write_len	= PAGE_SIZE,
	.write			= cgroup_file_write,
	.seq_start		= cgroup_seqfile_start,
	.seq_next		= cgroup_seqfile_next,
	.seq_stop		= cgroup_seqfile_stop,
	.seq_show		= cgroup_seqfile_show,
};
2379 2380 2381 2382

/*
 * cgroup_rename - Only allow simple rename of directories in place.
 */
Tejun Heo's avatar
Tejun Heo committed
2383 2384
static int cgroup_rename(struct kernfs_node *kn, struct kernfs_node *new_parent,
			 const char *new_name_str)
2385
{
Tejun Heo's avatar
Tejun Heo committed
2386
	struct cgroup *cgrp = kn->priv;
2387 2388
	int ret;

Tejun Heo's avatar
Tejun Heo committed
2389
	if (kernfs_type(kn) != KERNFS_DIR)
2390
		return -ENOTDIR;
Tejun Heo's avatar
Tejun Heo committed
2391
	if (kn->parent != new_parent)
2392
		return -EIO;
2393

2394 2395 2396 2397 2398 2399
	/*
	 * This isn't a proper migration and its usefulness is very
	 * limited.  Disallow if sane_behavior.
	 */
	if (cgroup_sane_behavior(cgrp))
		return -EPERM;
Li Zefan's avatar
Li Zefan committed
2400

2401 2402 2403 2404 2405 2406 2407
	/*
	 * We're gonna grab cgroup_tree_mutex which nests outside kernfs
	 * active_ref.  kernfs_rename() doesn't require active_ref
	 * protection.  Break them before grabbing cgroup_tree_mutex.
	 */
	kernfs_break_active_protection(new_parent);
	kernfs_break_active_protection(kn);
Li Zefan's avatar
Li Zefan committed
2408

Tejun Heo's avatar
Tejun Heo committed
2409 2410
	mutex_lock(&cgroup_tree_mutex);
	mutex_lock(&cgroup_mutex);
Li Zefan's avatar
Li Zefan committed
2411

Tejun Heo's avatar
Tejun Heo committed
2412
	ret = kernfs_rename(kn, new_parent, new_name_str);
Li Zefan's avatar
Li Zefan committed
2413

Tejun Heo's avatar
Tejun Heo committed
2414 2415
	mutex_unlock(&cgroup_mutex);
	mutex_unlock(&cgroup_tree_mutex);
2416 2417 2418

	kernfs_unbreak_active_protection(kn);
	kernfs_unbreak_active_protection(new_parent);
Tejun Heo's avatar
Tejun Heo committed
2419
	return ret;
Li Zefan's avatar
Li Zefan committed
2420 2421
}

2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435
/* set uid and gid of cgroup dirs and files to that of the creator */
static int cgroup_kn_set_ugid(struct kernfs_node *kn)
{
	struct iattr iattr = { .ia_valid = ATTR_UID | ATTR_GID,
			       .ia_uid = current_fsuid(),
			       .ia_gid = current_fsgid(), };

	if (uid_eq(iattr.ia_uid, GLOBAL_ROOT_UID) &&
	    gid_eq(iattr.ia_gid, GLOBAL_ROOT_GID))
		return 0;

	return kernfs_setattr(kn, &iattr);
}

2436
static int cgroup_add_file(struct cgroup *cgrp, struct cftype *cft)
2437
{
2438
	char name[CGROUP_FILE_NAME_MAX];
Tejun Heo's avatar
Tejun Heo committed
2439 2440
	struct kernfs_node *kn;
	struct lock_class_key *key = NULL;
2441
	int ret;
Tejun Heo's avatar
Tejun Heo committed
2442

Tejun Heo's avatar
Tejun Heo committed
2443 2444 2445 2446 2447 2448
#ifdef CONFIG_DEBUG_LOCK_ALLOC
	key = &cft->lockdep_key;
#endif
	kn = __kernfs_create_file(cgrp->kn, cgroup_file_name(cgrp, cft, name),
				  cgroup_file_mode(cft), 0, cft->kf_ops, cft,
				  NULL, false, key);
2449 2450 2451 2452 2453 2454 2455
	if (IS_ERR(kn))
		return PTR_ERR(kn);

	ret = cgroup_kn_set_ugid(kn);
	if (ret)
		kernfs_remove(kn);
	return ret;
2456 2457
}

2458 2459 2460 2461 2462 2463 2464
/**
 * cgroup_addrm_files - add or remove files to a cgroup directory
 * @cgrp: the target cgroup
 * @cfts: array of cftypes to be added
 * @is_add: whether to add or remove
 *
 * Depending on @is_add, add or remove files defined by @cfts on @cgrp.
2465 2466 2467
 * For removals, this function never fails.  If addition fails, this
 * function doesn't remove files already added.  The caller is responsible
 * for cleaning up.
2468
 */
2469 2470
static int cgroup_addrm_files(struct cgroup *cgrp, struct cftype cfts[],
			      bool is_add)
2471
{
Aristeu Rozanski's avatar
Aristeu Rozanski committed
2472
	struct cftype *cft;
2473 2474
	int ret;

2475
	lockdep_assert_held(&cgroup_tree_mutex);
2476 2477

	for (cft = cfts; cft->name[0] != '\0'; cft++) {
2478
		/* does cft->flags tell us to skip this file on @cgrp? */
2479 2480
		if ((cft->flags & CFTYPE_ONLY_ON_DFL) && !cgroup_on_dfl(cgrp))
			continue;
2481 2482
		if ((cft->flags & CFTYPE_INSANE) && cgroup_sane_behavior(cgrp))
			continue;
2483 2484 2485 2486 2487
		if ((cft->flags & CFTYPE_NOT_ON_ROOT) && !cgrp->parent)
			continue;
		if ((cft->flags & CFTYPE_ONLY_ON_ROOT) && cgrp->parent)
			continue;

2488
		if (is_add) {
2489
			ret = cgroup_add_file(cgrp, cft);
2490
			if (ret) {
2491
				pr_warn("cgroup_addrm_files: failed to add %s, err=%d\n",
2492 2493 2494
					cft->name, ret);
				return ret;
			}
2495 2496
		} else {
			cgroup_rm_file(cgrp, cft);
2497
		}
2498
	}
2499
	return 0;
2500 2501
}

2502
static int cgroup_apply_cftypes(struct cftype *cfts, bool is_add)
2503 2504
{
	LIST_HEAD(pending);
2505
	struct cgroup_subsys *ss = cfts[0].ss;
2506
	struct cgroup *root = &ss->root->cgrp;
2507
	struct cgroup_subsys_state *css;
2508
	int ret = 0;
2509

2510
	lockdep_assert_held(&cgroup_tree_mutex);
2511

2512
	/* add/rm files for all cgroups created before */
2513
	css_for_each_descendant_pre(css, cgroup_css(root, ss)) {
2514 2515
		struct cgroup *cgrp = css->cgroup;

2516 2517 2518
		if (cgroup_is_dead(cgrp))
			continue;

2519
		ret = cgroup_addrm_files(cgrp, cfts, is_add);
2520 2521
		if (ret)
			break;
2522
	}
2523 2524 2525

	if (is_add && !ret)
		kernfs_activate(root->kn);
2526
	return ret;
2527 2528
}

2529
static void cgroup_exit_cftypes(struct cftype *cfts)
2530
{
2531
	struct cftype *cft;
2532

Tejun Heo's avatar
Tejun Heo committed
2533 2534 2535 2536 2537
	for (cft = cfts; cft->name[0] != '\0'; cft++) {
		/* free copy for custom atomic_write_len, see init_cftypes() */
		if (cft->max_write_len && cft->max_write_len != PAGE_SIZE)
			kfree(cft->kf_ops);
		cft->kf_ops = NULL;
2538
		cft->ss = NULL;
Tejun Heo's avatar
Tejun Heo committed
2539
	}
2540 2541
}

Tejun Heo's avatar
Tejun Heo committed
2542
static int cgroup_init_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
2543 2544 2545
{
	struct cftype *cft;

Tejun Heo's avatar
Tejun Heo committed
2546 2547 2548
	for (cft = cfts; cft->name[0] != '\0'; cft++) {
		struct kernfs_ops *kf_ops;

Tejun Heo's avatar
Tejun Heo committed
2549 2550
		WARN_ON(cft->ss || cft->kf_ops);

Tejun Heo's avatar
Tejun Heo committed
2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567
		if (cft->seq_start)
			kf_ops = &cgroup_kf_ops;
		else
			kf_ops = &cgroup_kf_single_ops;

		/*
		 * Ugh... if @cft wants a custom max_write_len, we need to
		 * make a copy of kf_ops to set its atomic_write_len.
		 */
		if (cft->max_write_len && cft->max_write_len != PAGE_SIZE) {
			kf_ops = kmemdup(kf_ops, sizeof(*kf_ops), GFP_KERNEL);
			if (!kf_ops) {
				cgroup_exit_cftypes(cfts);
				return -ENOMEM;
			}
			kf_ops->atomic_write_len = cft->max_write_len;
		}
2568

Tejun Heo's avatar
Tejun Heo committed
2569
		cft->kf_ops = kf_ops;
2570
		cft->ss = ss;
Tejun Heo's avatar
Tejun Heo committed
2571
	}
2572

Tejun Heo's avatar
Tejun Heo committed
2573
	return 0;
2574 2575
}

2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586
static int cgroup_rm_cftypes_locked(struct cftype *cfts)
{
	lockdep_assert_held(&cgroup_tree_mutex);

	if (!cfts || !cfts[0].ss)
		return -ENOENT;

	list_del(&cfts->node);
	cgroup_apply_cftypes(cfts, false);
	cgroup_exit_cftypes(cfts);
	return 0;
2587 2588
}

2589 2590 2591 2592
/**
 * cgroup_rm_cftypes - remove an array of cftypes from a subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
2593 2594 2595
 * Unregister @cfts.  Files described by @cfts are removed from all
 * existing cgroups and all future cgroups won't have them either.  This
 * function can be called anytime whether @cfts' subsys is attached or not.
2596 2597
 *
 * Returns 0 on successful unregistration, -ENOENT if @cfts is not
2598
 * registered.
2599
 */
2600
int cgroup_rm_cftypes(struct cftype *cfts)
2601
{
2602
	int ret;
2603

2604 2605 2606 2607
	mutex_lock(&cgroup_tree_mutex);
	ret = cgroup_rm_cftypes_locked(cfts);
	mutex_unlock(&cgroup_tree_mutex);
	return ret;
2608 2609
}

2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623
/**
 * cgroup_add_cftypes - add an array of cftypes to a subsystem
 * @ss: target cgroup subsystem
 * @cfts: zero-length name terminated array of cftypes
 *
 * Register @cfts to @ss.  Files described by @cfts are created for all
 * existing cgroups to which @ss is attached and all future cgroups will
 * have them too.  This function can be called anytime whether @ss is
 * attached or not.
 *
 * Returns 0 on successful registration, -errno on failure.  Note that this
 * function currently returns 0 as long as @cfts registration is successful
 * even if some file creation attempts on existing cgroups fail.
 */
Aristeu Rozanski's avatar
Aristeu Rozanski committed
2624
int cgroup_add_cftypes(struct cgroup_subsys *ss, struct cftype *cfts)
2625
{
2626
	int ret;
2627

2628 2629
	if (!cfts || cfts[0].name[0] == '\0')
		return 0;
2630

Tejun Heo's avatar
Tejun Heo committed
2631 2632 2633
	ret = cgroup_init_cftypes(ss, cfts);
	if (ret)
		return ret;
2634

2635 2636
	mutex_lock(&cgroup_tree_mutex);

Tejun Heo's avatar
Tejun Heo committed
2637
	list_add_tail(&cfts->node, &ss->cfts);
2638
	ret = cgroup_apply_cftypes(cfts, true);
2639
	if (ret)
2640
		cgroup_rm_cftypes_locked(cfts);
2641

2642
	mutex_unlock(&cgroup_tree_mutex);
2643
	return ret;
2644 2645
}

Li Zefan's avatar
Li Zefan committed
2646 2647 2648 2649 2650 2651
/**
 * cgroup_task_count - count the number of tasks in a cgroup.
 * @cgrp: the cgroup in question
 *
 * Return the number of tasks in the cgroup.
 */
2652
static int cgroup_task_count(const struct cgroup *cgrp)
2653 2654
{
	int count = 0;
2655
	struct cgrp_cset_link *link;
2656

2657
	down_read(&css_set_rwsem);
2658 2659
	list_for_each_entry(link, &cgrp->cset_links, cset_link)
		count += atomic_read(&link->cset->refcount);
2660
	up_read(&css_set_rwsem);
2661 2662 2663
	return count;
}

2664
/**
2665 2666 2667
 * css_next_child - find the next child of a given css
 * @pos_css: the current position (%NULL to initiate traversal)
 * @parent_css: css whose children to walk
2668
 *
2669
 * This function returns the next child of @parent_css and should be called
2670 2671 2672
 * under either cgroup_mutex or RCU read lock.  The only requirement is
 * that @parent_css and @pos_css are accessible.  The next sibling is
 * guaranteed to be returned regardless of their states.
2673
 */
2674 2675 2676
struct cgroup_subsys_state *
css_next_child(struct cgroup_subsys_state *pos_css,
	       struct cgroup_subsys_state *parent_css)
2677
{
2678 2679
	struct cgroup *pos = pos_css ? pos_css->cgroup : NULL;
	struct cgroup *cgrp = parent_css->cgroup;
2680 2681
	struct cgroup *next;

2682
	cgroup_assert_mutexes_or_rcu_locked();
2683 2684 2685 2686

	/*
	 * @pos could already have been removed.  Once a cgroup is removed,
	 * its ->sibling.next is no longer updated when its next sibling
2687 2688 2689 2690 2691 2692 2693
	 * changes.  As CGRP_DEAD assertion is serialized and happens
	 * before the cgroup is taken off the ->sibling list, if we see it
	 * unasserted, it's guaranteed that the next sibling hasn't
	 * finished its grace period even if it's already removed, and thus
	 * safe to dereference from this RCU critical section.  If
	 * ->sibling.next is inaccessible, cgroup_is_dead() is guaranteed
	 * to be visible as %true here.
2694 2695 2696 2697 2698 2699 2700 2701
	 *
	 * If @pos is dead, its next pointer can't be dereferenced;
	 * however, as each cgroup is given a monotonically increasing
	 * unique serial number and always appended to the sibling list,
	 * the next one can be found by walking the parent's children until
	 * we see a cgroup with higher serial number than @pos's.  While
	 * this path can be slower, it's taken only when either the current
	 * cgroup is removed or iteration and removal race.
2702
	 */
2703 2704 2705
	if (!pos) {
		next = list_entry_rcu(cgrp->children.next, struct cgroup, sibling);
	} else if (likely(!cgroup_is_dead(pos))) {
2706
		next = list_entry_rcu(pos->sibling.next, struct cgroup, sibling);
2707 2708 2709 2710
	} else {
		list_for_each_entry_rcu(next, &cgrp->children, sibling)
			if (next->serial_nr > pos->serial_nr)
				break;
2711 2712
	}

2713 2714 2715 2716 2717 2718 2719
	/*
	 * @next, if not pointing to the head, can be dereferenced and is
	 * the next sibling; however, it might have @ss disabled.  If so,
	 * fast-forward to the next enabled one.
	 */
	while (&next->sibling != &cgrp->children) {
		struct cgroup_subsys_state *next_css = cgroup_css(next, parent_css->ss);
2720

2721 2722 2723 2724 2725
		if (next_css)
			return next_css;
		next = list_entry_rcu(next->sibling.next, struct cgroup, sibling);
	}
	return NULL;
2726 2727
}

2728
/**
2729
 * css_next_descendant_pre - find the next descendant for pre-order walk
2730
 * @pos: the current position (%NULL to initiate traversal)
2731
 * @root: css whose descendants to walk
2732
 *
2733
 * To be used by css_for_each_descendant_pre().  Find the next descendant
2734 2735
 * to visit for pre-order traversal of @root's descendants.  @root is
 * included in the iteration and the first node to be visited.
2736
 *
2737 2738 2739 2740
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct next descendant as long
 * as both @pos and @root are accessible and @pos is a descendant of @root.
2741
 */
2742 2743 2744
struct cgroup_subsys_state *
css_next_descendant_pre(struct cgroup_subsys_state *pos,
			struct cgroup_subsys_state *root)
2745
{
2746
	struct cgroup_subsys_state *next;
2747

2748
	cgroup_assert_mutexes_or_rcu_locked();
2749

2750
	/* if first iteration, visit @root */
2751
	if (!pos)
2752
		return root;
2753 2754

	/* visit the first child if exists */
2755
	next = css_next_child(NULL, pos);
2756 2757 2758 2759
	if (next)
		return next;

	/* no child, visit my or the closest ancestor's next sibling */
2760 2761
	while (pos != root) {
		next = css_next_child(pos, css_parent(pos));
2762
		if (next)
2763
			return next;
2764
		pos = css_parent(pos);
2765
	}
2766 2767 2768 2769

	return NULL;
}

2770
/**
2771 2772
 * css_rightmost_descendant - return the rightmost descendant of a css
 * @pos: css of interest
2773
 *
2774 2775
 * Return the rightmost descendant of @pos.  If there's no descendant, @pos
 * is returned.  This can be used during pre-order traversal to skip
2776
 * subtree of @pos.
2777
 *
2778 2779 2780 2781
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct rightmost descendant as
 * long as @pos is accessible.
2782
 */
2783 2784
struct cgroup_subsys_state *
css_rightmost_descendant(struct cgroup_subsys_state *pos)
2785
{
2786
	struct cgroup_subsys_state *last, *tmp;
2787

2788
	cgroup_assert_mutexes_or_rcu_locked();
2789 2790 2791 2792 2793

	do {
		last = pos;
		/* ->prev isn't RCU safe, walk ->next till the end */
		pos = NULL;
2794
		css_for_each_child(tmp, last)
2795 2796 2797 2798 2799 2800
			pos = tmp;
	} while (pos);

	return last;
}

2801 2802
static struct cgroup_subsys_state *
css_leftmost_descendant(struct cgroup_subsys_state *pos)
2803
{
2804
	struct cgroup_subsys_state *last;
2805 2806 2807

	do {
		last = pos;
2808
		pos = css_next_child(NULL, pos);
2809 2810 2811 2812 2813 2814
	} while (pos);

	return last;
}

/**
2815
 * css_next_descendant_post - find the next descendant for post-order walk
2816
 * @pos: the current position (%NULL to initiate traversal)
2817
 * @root: css whose descendants to walk
2818
 *
2819
 * To be used by css_for_each_descendant_post().  Find the next descendant
2820 2821
 * to visit for post-order traversal of @root's descendants.  @root is
 * included in the iteration and the last node to be visited.
2822
 *
2823 2824 2825 2826 2827
 * While this function requires cgroup_mutex or RCU read locking, it
 * doesn't require the whole traversal to be contained in a single critical
 * section.  This function will return the correct next descendant as long
 * as both @pos and @cgroup are accessible and @pos is a descendant of
 * @cgroup.
2828
 */
2829 2830 2831
struct cgroup_subsys_state *
css_next_descendant_post(struct cgroup_subsys_state *pos,
			 struct cgroup_subsys_state *root)
2832
{
2833
	struct cgroup_subsys_state *next;
2834

2835
	cgroup_assert_mutexes_or_rcu_locked();
2836

2837 2838 2839
	/* if first iteration, visit leftmost descendant which may be @root */
	if (!pos)
		return css_leftmost_descendant(root);
2840

2841 2842 2843 2844
	/* if we visited @root, we're done */
	if (pos == root)
		return NULL;

2845
	/* if there's an unvisited sibling, visit its leftmost descendant */
2846
	next = css_next_child(pos, css_parent(pos));
2847
	if (next)
2848
		return css_leftmost_descendant(next);
2849 2850

	/* no sibling left, visit parent */
2851
	return css_parent(pos);
2852 2853
}

2854
/**
2855
 * css_advance_task_iter - advance a task itererator to the next css_set
2856 2857 2858
 * @it: the iterator to advance
 *
 * Advance @it to the next css_set to walk.
2859
 */
2860
static void css_advance_task_iter(struct css_task_iter *it)
2861
{
Tejun Heo's avatar
Tejun Heo committed
2862
	struct list_head *l = it->cset_pos;
2863 2864 2865 2866 2867 2868
	struct cgrp_cset_link *link;
	struct css_set *cset;

	/* Advance to the next non-empty css_set */
	do {
		l = l->next;
Tejun Heo's avatar
Tejun Heo committed
2869 2870
		if (l == it->cset_head) {
			it->cset_pos = NULL;
2871 2872
			return;
		}
2873 2874 2875 2876 2877 2878 2879 2880

		if (it->ss) {
			cset = container_of(l, struct css_set,
					    e_cset_node[it->ss->id]);
		} else {
			link = list_entry(l, struct cgrp_cset_link, cset_link);
			cset = link->cset;
		}
Tejun Heo's avatar
Tejun Heo committed
2881 2882
	} while (list_empty(&cset->tasks) && list_empty(&cset->mg_tasks));

Tejun Heo's avatar
Tejun Heo committed
2883
	it->cset_pos = l;
Tejun Heo's avatar
Tejun Heo committed
2884 2885

	if (!list_empty(&cset->tasks))
Tejun Heo's avatar
Tejun Heo committed
2886
		it->task_pos = cset->tasks.next;
Tejun Heo's avatar
Tejun Heo committed
2887
	else
Tejun Heo's avatar
Tejun Heo committed
2888 2889 2890 2891
		it->task_pos = cset->mg_tasks.next;

	it->tasks_head = &cset->tasks;
	it->mg_tasks_head = &cset->mg_tasks;
2892 2893
}

2894
/**
2895 2896
 * css_task_iter_start - initiate task iteration
 * @css: the css to walk tasks of
2897 2898
 * @it: the task iterator to use
 *
2899 2900 2901 2902
 * Initiate iteration through the tasks of @css.  The caller can call
 * css_task_iter_next() to walk through the tasks until the function
 * returns NULL.  On completion of iteration, css_task_iter_end() must be
 * called.
2903 2904 2905 2906 2907
 *
 * Note that this function acquires a lock which is released when the
 * iteration finishes.  The caller can't sleep while iteration is in
 * progress.
 */
2908 2909
void css_task_iter_start(struct cgroup_subsys_state *css,
			 struct css_task_iter *it)
2910
	__acquires(css_set_rwsem)
2911
{
2912 2913
	/* no one should try to iterate before mounting cgroups */
	WARN_ON_ONCE(!use_task_css_set_links);
2914

2915
	down_read(&css_set_rwsem);
2916

2917 2918 2919 2920 2921 2922 2923
	it->ss = css->ss;

	if (it->ss)
		it->cset_pos = &css->cgroup->e_csets[css->ss->id];
	else
		it->cset_pos = &css->cgroup->cset_links;

Tejun Heo's avatar
Tejun Heo committed
2924
	it->cset_head = it->cset_pos;
2925

2926
	css_advance_task_iter(it);
2927 2928
}

2929
/**
2930
 * css_task_iter_next - return the next task for the iterator
2931 2932 2933
 * @it: the task iterator being iterated
 *
 * The "next" function for task iteration.  @it should have been
2934 2935
 * initialized via css_task_iter_start().  Returns NULL when the iteration
 * reaches the end.
2936
 */
2937
struct task_struct *css_task_iter_next(struct css_task_iter *it)
2938 2939
{
	struct task_struct *res;
Tejun Heo's avatar
Tejun Heo committed
2940
	struct list_head *l = it->task_pos;
2941 2942

	/* If the iterator cg is NULL, we have no tasks */
Tejun Heo's avatar
Tejun Heo committed
2943
	if (!it->cset_pos)
2944 2945
		return NULL;
	res = list_entry(l, struct task_struct, cg_list);
Tejun Heo's avatar
Tejun Heo committed
2946 2947 2948 2949 2950 2951

	/*
	 * Advance iterator to find next entry.  cset->tasks is consumed
	 * first and then ->mg_tasks.  After ->mg_tasks, we move onto the
	 * next cset.
	 */
2952
	l = l->next;
Tejun Heo's avatar
Tejun Heo committed
2953

Tejun Heo's avatar
Tejun Heo committed
2954 2955
	if (l == it->tasks_head)
		l = it->mg_tasks_head->next;
Tejun Heo's avatar
Tejun Heo committed
2956

Tejun Heo's avatar
Tejun Heo committed
2957
	if (l == it->mg_tasks_head)
2958
		css_advance_task_iter(it);
Tejun Heo's avatar
Tejun Heo committed
2959
	else
Tejun Heo's avatar
Tejun Heo committed
2960
		it->task_pos = l;
Tejun Heo's avatar
Tejun Heo committed
2961

2962 2963 2964
	return res;
}

2965
/**
2966
 * css_task_iter_end - finish task iteration
2967 2968
 * @it: the task iterator to finish
 *
2969
 * Finish task iteration started by css_task_iter_start().
2970
 */
2971
void css_task_iter_end(struct css_task_iter *it)
2972
	__releases(css_set_rwsem)
2973
{
2974
	up_read(&css_set_rwsem);
2975 2976 2977
}

/**
2978 2979 2980
 * cgroup_trasnsfer_tasks - move tasks from one cgroup to another
 * @to: cgroup to which the tasks will be moved
 * @from: cgroup in which the tasks currently reside
2981
 *
2982 2983 2984 2985 2986
 * Locking rules between cgroup_post_fork() and the migration path
 * guarantee that, if a task is forking while being migrated, the new child
 * is guaranteed to be either visible in the source cgroup after the
 * parent's migration is complete or put into the target cgroup.  No task
 * can slip out of migration through forking.
2987
 */
2988
int cgroup_transfer_tasks(struct cgroup *to, struct cgroup *from)
2989
{
2990 2991
	LIST_HEAD(preloaded_csets);
	struct cgrp_cset_link *link;
2992
	struct css_task_iter it;
2993
	struct task_struct *task;
2994
	int ret;
2995

2996
	mutex_lock(&cgroup_mutex);
2997

2998 2999 3000 3001 3002
	/* all tasks in @from are being moved, all csets are source */
	down_read(&css_set_rwsem);
	list_for_each_entry(link, &from->cset_links, cset_link)
		cgroup_migrate_add_src(link->cset, to, &preloaded_csets);
	up_read(&css_set_rwsem);
3003

3004 3005 3006
	ret = cgroup_migrate_prepare_dst(to, &preloaded_csets);
	if (ret)
		goto out_err;
3007

3008 3009 3010 3011
	/*
	 * Migrate tasks one-by-one until @form is empty.  This fails iff
	 * ->can_attach() fails.
	 */
3012 3013 3014 3015 3016 3017 3018 3019
	do {
		css_task_iter_start(&from->dummy_css, &it);
		task = css_task_iter_next(&it);
		if (task)
			get_task_struct(task);
		css_task_iter_end(&it);

		if (task) {
3020
			ret = cgroup_migrate(to, task, false);
3021 3022 3023
			put_task_struct(task);
		}
	} while (task && !ret);
3024 3025
out_err:
	cgroup_migrate_finish(&preloaded_csets);
Tejun Heo's avatar
Tejun Heo committed
3026
	mutex_unlock(&cgroup_mutex);
3027
	return ret;
3028 3029
}

3030
/*
3031
 * Stuff for reading the 'tasks'/'procs' files.
3032 3033 3034 3035 3036 3037 3038 3039
 *
 * Reading this file can return large amounts of data if a cgroup has
 * *lots* of attached tasks. So it may need several calls to read(),
 * but we cannot guarantee that the information we produce is correct
 * unless we produce it entirely atomically.
 *
 */

3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065
/* which pidlist file are we talking about? */
enum cgroup_filetype {
	CGROUP_FILE_PROCS,
	CGROUP_FILE_TASKS,
};

/*
 * A pidlist is a list of pids that virtually represents the contents of one
 * of the cgroup files ("procs" or "tasks"). We keep a list of such pidlists,
 * a pair (one each for procs, tasks) for each pid namespace that's relevant
 * to the cgroup.
 */
struct cgroup_pidlist {
	/*
	 * used to find which pidlist is wanted. doesn't change as long as
	 * this particular list stays in the list.
	*/
	struct { enum cgroup_filetype type; struct pid_namespace *ns; } key;
	/* array of xids */
	pid_t *list;
	/* how many elements the above list has */
	int length;
	/* each of these stored in a list by its cgroup */
	struct list_head links;
	/* pointer to the cgroup we belong to, for list removal purposes */
	struct cgroup *owner;
3066 3067
	/* for delayed destruction */
	struct delayed_work destroy_dwork;
3068 3069
};

3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082
/*
 * The following two functions "fix" the issue where there are more pids
 * than kmalloc will give memory for; in such cases, we use vmalloc/vfree.
 * TODO: replace with a kernel-wide solution to this problem
 */
#define PIDLIST_TOO_LARGE(c) ((c) * sizeof(pid_t) > (PAGE_SIZE * 2))
static void *pidlist_allocate(int count)
{
	if (PIDLIST_TOO_LARGE(count))
		return vmalloc(count * sizeof(pid_t));
	else
		return kmalloc(count * sizeof(pid_t), GFP_KERNEL);
}
3083

3084 3085 3086 3087 3088 3089 3090 3091
static void pidlist_free(void *p)
{
	if (is_vmalloc_addr(p))
		vfree(p);
	else
		kfree(p);
}

3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118
/*
 * Used to destroy all pidlists lingering waiting for destroy timer.  None
 * should be left afterwards.
 */
static void cgroup_pidlist_destroy_all(struct cgroup *cgrp)
{
	struct cgroup_pidlist *l, *tmp_l;

	mutex_lock(&cgrp->pidlist_mutex);
	list_for_each_entry_safe(l, tmp_l, &cgrp->pidlists, links)
		mod_delayed_work(cgroup_pidlist_destroy_wq, &l->destroy_dwork, 0);
	mutex_unlock(&cgrp->pidlist_mutex);

	flush_workqueue(cgroup_pidlist_destroy_wq);
	BUG_ON(!list_empty(&cgrp->pidlists));
}

static void cgroup_pidlist_destroy_work_fn(struct work_struct *work)
{
	struct delayed_work *dwork = to_delayed_work(work);
	struct cgroup_pidlist *l = container_of(dwork, struct cgroup_pidlist,
						destroy_dwork);
	struct cgroup_pidlist *tofree = NULL;

	mutex_lock(&l->owner->pidlist_mutex);

	/*
3119 3120
	 * Destroy iff we didn't get queued again.  The state won't change
	 * as destroy_dwork can only be queued while locked.
3121
	 */
3122
	if (!delayed_work_pending(dwork)) {
3123 3124 3125 3126 3127 3128 3129 3130 3131 3132
		list_del(&l->links);
		pidlist_free(l->list);
		put_pid_ns(l->key.ns);
		tofree = l;
	}

	mutex_unlock(&l->owner->pidlist_mutex);
	kfree(tofree);
}

3133
/*
3134
 * pidlist_uniq - given a kmalloc()ed list, strip out all duplicate entries
3135
 * Returns the number of unique elements.
3136
 */
3137
static int pidlist_uniq(pid_t *list, int length)
3138
{
3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162
	int src, dest = 1;

	/*
	 * we presume the 0th element is unique, so i starts at 1. trivial
	 * edge cases first; no work needs to be done for either
	 */
	if (length == 0 || length == 1)
		return length;
	/* src and dest walk down the list; dest counts unique elements */
	for (src = 1; src < length; src++) {
		/* find next unique element */
		while (list[src] == list[src-1]) {
			src++;
			if (src == length)
				goto after;
		}
		/* dest always points to where the next unique element goes */
		list[dest] = list[src];
		dest++;
	}
after:
	return dest;
}

3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195
/*
 * The two pid files - task and cgroup.procs - guaranteed that the result
 * is sorted, which forced this whole pidlist fiasco.  As pid order is
 * different per namespace, each namespace needs differently sorted list,
 * making it impossible to use, for example, single rbtree of member tasks
 * sorted by task pointer.  As pidlists can be fairly large, allocating one
 * per open file is dangerous, so cgroup had to implement shared pool of
 * pidlists keyed by cgroup and namespace.
 *
 * All this extra complexity was caused by the original implementation
 * committing to an entirely unnecessary property.  In the long term, we
 * want to do away with it.  Explicitly scramble sort order if
 * sane_behavior so that no such expectation exists in the new interface.
 *
 * Scrambling is done by swapping every two consecutive bits, which is
 * non-identity one-to-one mapping which disturbs sort order sufficiently.
 */
static pid_t pid_fry(pid_t pid)
{
	unsigned a = pid & 0x55555555;
	unsigned b = pid & 0xAAAAAAAA;

	return (a << 1) | (b >> 1);
}

static pid_t cgroup_pid_fry(struct cgroup *cgrp, pid_t pid)
{
	if (cgroup_sane_behavior(cgrp))
		return pid_fry(pid);
	else
		return pid;
}

3196 3197 3198 3199 3200
static int cmppid(const void *a, const void *b)
{
	return *(pid_t *)a - *(pid_t *)b;
}

3201 3202 3203 3204 3205
static int fried_cmppid(const void *a, const void *b)
{
	return pid_fry(*(pid_t *)a) - pid_fry(*(pid_t *)b);
}

3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220
static struct cgroup_pidlist *cgroup_pidlist_find(struct cgroup *cgrp,
						  enum cgroup_filetype type)
{
	struct cgroup_pidlist *l;
	/* don't need task_nsproxy() if we're looking at ourself */
	struct pid_namespace *ns = task_active_pid_ns(current);

	lockdep_assert_held(&cgrp->pidlist_mutex);

	list_for_each_entry(l, &cgrp->pidlists, links)
		if (l->key.type == type && l->key.ns == ns)
			return l;
	return NULL;
}

3221 3222 3223 3224 3225 3226
/*
 * find the appropriate pidlist for our purpose (given procs vs tasks)
 * returns with the lock on that pidlist already held, and takes care
 * of the use count, or returns NULL with no locks held if we're out of
 * memory.
 */
3227 3228
static struct cgroup_pidlist *cgroup_pidlist_find_create(struct cgroup *cgrp,
						enum cgroup_filetype type)
3229 3230
{
	struct cgroup_pidlist *l;
3231

3232 3233 3234 3235 3236 3237
	lockdep_assert_held(&cgrp->pidlist_mutex);

	l = cgroup_pidlist_find(cgrp, type);
	if (l)
		return l;

3238
	/* entry not found; create a new one */
3239
	l = kzalloc(sizeof(struct cgroup_pidlist), GFP_KERNEL);
3240
	if (!l)
3241
		return l;
3242

3243
	INIT_DELAYED_WORK(&l->destroy_dwork, cgroup_pidlist_destroy_work_fn);
3244
	l->key.type = type;
3245 3246
	/* don't need task_nsproxy() if we're looking at ourself */
	l->key.ns = get_pid_ns(task_active_pid_ns(current));
3247 3248 3249 3250 3251
	l->owner = cgrp;
	list_add(&l->links, &cgrp->pidlists);
	return l;
}

3252 3253 3254
/*
 * Load a cgroup's pidarray with either procs' tgids or tasks' pids
 */
3255 3256
static int pidlist_array_load(struct cgroup *cgrp, enum cgroup_filetype type,
			      struct cgroup_pidlist **lp)
3257 3258 3259 3260
{
	pid_t *array;
	int length;
	int pid, n = 0; /* used for populating the array */
3261
	struct css_task_iter it;
3262
	struct task_struct *tsk;
3263 3264
	struct cgroup_pidlist *l;

3265 3266
	lockdep_assert_held(&cgrp->pidlist_mutex);

3267 3268 3269 3270 3271 3272 3273
	/*
	 * If cgroup gets more users after we read count, we won't have
	 * enough space - tough.  This race is indistinguishable to the
	 * caller from the case that the additional cgroup users didn't
	 * show up until sometime later on.
	 */
	length = cgroup_task_count(cgrp);
3274
	array = pidlist_allocate(length);
3275 3276 3277
	if (!array)
		return -ENOMEM;
	/* now, populate the array */
3278 3279
	css_task_iter_start(&cgrp->dummy_css, &it);
	while ((tsk = css_task_iter_next(&it))) {
3280
		if (unlikely(n == length))
3281
			break;
3282
		/* get tgid or pid for procs or tasks file respectively */
3283 3284 3285 3286
		if (type == CGROUP_FILE_PROCS)
			pid = task_tgid_vnr(tsk);
		else
			pid = task_pid_vnr(tsk);
3287 3288
		if (pid > 0) /* make sure to only use valid results */
			array[n++] = pid;
3289
	}
3290
	css_task_iter_end(&it);
3291 3292
	length = n;
	/* now sort & (if procs) strip out duplicates */
3293 3294 3295 3296
	if (cgroup_sane_behavior(cgrp))
		sort(array, length, sizeof(pid_t), fried_cmppid, NULL);
	else
		sort(array, length, sizeof(pid_t), cmppid, NULL);
3297
	if (type == CGROUP_FILE_PROCS)
3298
		length = pidlist_uniq(array, length);
3299 3300

	l = cgroup_pidlist_find_create(cgrp, type);
3301
	if (!l) {
3302
		mutex_unlock(&cgrp->pidlist_mutex);
3303
		pidlist_free(array);
3304
		return -ENOMEM;
3305
	}
3306 3307

	/* store array, freeing old if necessary */
3308
	pidlist_free(l->list);
3309 3310
	l->list = array;
	l->length = length;
3311
	*lp = l;
3312
	return 0;
3313 3314
}

Balbir Singh's avatar
Balbir Singh committed
3315
/**
Li Zefan's avatar
Li Zefan committed
3316
 * cgroupstats_build - build and fill cgroupstats
Balbir Singh's avatar
Balbir Singh committed
3317 3318 3319
 * @stats: cgroupstats to fill information into
 * @dentry: A dentry entry belonging to the cgroup for which stats have
 * been requested.
Li Zefan's avatar
Li Zefan committed
3320 3321 3322
 *
 * Build and fill cgroupstats so that taskstats can export it to user
 * space.
Balbir Singh's avatar
Balbir Singh committed
3323 3324 3325
 */
int cgroupstats_build(struct cgroupstats *stats, struct dentry *dentry)
{
Tejun Heo's avatar
Tejun Heo committed
3326
	struct kernfs_node *kn = kernfs_node_from_dentry(dentry);
3327
	struct cgroup *cgrp;
3328
	struct css_task_iter it;
Balbir Singh's avatar
Balbir Singh committed
3329
	struct task_struct *tsk;
3330

Tejun Heo's avatar
Tejun Heo committed
3331 3332 3333 3334 3335
	/* it should be kernfs_node belonging to cgroupfs and is a directory */
	if (dentry->d_sb->s_type != &cgroup_fs_type || !kn ||
	    kernfs_type(kn) != KERNFS_DIR)
		return -EINVAL;

3336 3337
	mutex_lock(&cgroup_mutex);

Balbir Singh's avatar
Balbir Singh committed
3338
	/*
Tejun Heo's avatar
Tejun Heo committed
3339 3340 3341
	 * We aren't being called from kernfs and there's no guarantee on
	 * @kn->priv's validity.  For this and css_tryget_from_dir(),
	 * @kn->priv is RCU safe.  Let's do the RCU dancing.
Balbir Singh's avatar
Balbir Singh committed
3342
	 */
Tejun Heo's avatar
Tejun Heo committed
3343 3344
	rcu_read_lock();
	cgrp = rcu_dereference(kn->priv);
3345
	if (!cgrp || cgroup_is_dead(cgrp)) {
Tejun Heo's avatar
Tejun Heo committed
3346
		rcu_read_unlock();
3347
		mutex_unlock(&cgroup_mutex);
Tejun Heo's avatar
Tejun Heo committed
3348 3349
		return -ENOENT;
	}
3350
	rcu_read_unlock();
Balbir Singh's avatar
Balbir Singh committed
3351

3352 3353
	css_task_iter_start(&cgrp->dummy_css, &it);
	while ((tsk = css_task_iter_next(&it))) {
Balbir Singh's avatar
Balbir Singh committed
3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372
		switch (tsk->state) {
		case TASK_RUNNING:
			stats->nr_running++;
			break;
		case TASK_INTERRUPTIBLE:
			stats->nr_sleeping++;
			break;
		case TASK_UNINTERRUPTIBLE:
			stats->nr_uninterruptible++;
			break;
		case TASK_STOPPED:
			stats->nr_stopped++;
			break;
		default:
			if (delayacct_is_task_waiting_on_io(tsk))
				stats->nr_io_wait++;
			break;
		}
	}
3373
	css_task_iter_end(&it);
Balbir Singh's avatar
Balbir Singh committed
3374

3375
	mutex_unlock(&cgroup_mutex);
Tejun Heo's avatar
Tejun Heo committed
3376
	return 0;
Balbir Singh's avatar
Balbir Singh committed
3377 3378
}

3379

3380
/*
3381
 * seq_file methods for the tasks/procs files. The seq_file position is the
3382
 * next pid to display; the seq_file iterator is a pointer to the pid
3383
 * in the cgroup->l->list array.
3384
 */
3385

3386
static void *cgroup_pidlist_start(struct seq_file *s, loff_t *pos)
3387
{
3388 3389 3390 3391 3392 3393
	/*
	 * Initially we receive a position value that corresponds to
	 * one more than the last pid shown (or 0 on the first call or
	 * after a seek to the start). Use a binary-search to find the
	 * next pid to display, if any
	 */
Tejun Heo's avatar
Tejun Heo committed
3394
	struct kernfs_open_file *of = s->private;
3395
	struct cgroup *cgrp = seq_css(s)->cgroup;
3396
	struct cgroup_pidlist *l;
3397
	enum cgroup_filetype type = seq_cft(s)->private;
3398
	int index = 0, pid = *pos;
3399 3400 3401 3402 3403
	int *iter, ret;

	mutex_lock(&cgrp->pidlist_mutex);

	/*
3404
	 * !NULL @of->priv indicates that this isn't the first start()
3405
	 * after open.  If the matching pidlist is around, we can use that.
3406
	 * Look for it.  Note that @of->priv can't be used directly.  It
3407 3408
	 * could already have been destroyed.
	 */
3409 3410
	if (of->priv)
		of->priv = cgroup_pidlist_find(cgrp, type);
3411 3412 3413 3414 3415

	/*
	 * Either this is the first start() after open or the matching
	 * pidlist has been destroyed inbetween.  Create a new one.
	 */
3416 3417 3418
	if (!of->priv) {
		ret = pidlist_array_load(cgrp, type,
					 (struct cgroup_pidlist **)&of->priv);
3419 3420 3421
		if (ret)
			return ERR_PTR(ret);
	}
3422
	l = of->priv;
3423 3424

	if (pid) {
3425
		int end = l->length;
3426

3427 3428
		while (index < end) {
			int mid = (index + end) / 2;
3429
			if (cgroup_pid_fry(cgrp, l->list[mid]) == pid) {
3430 3431
				index = mid;
				break;
3432
			} else if (cgroup_pid_fry(cgrp, l->list[mid]) <= pid)
3433 3434 3435 3436 3437 3438
				index = mid + 1;
			else
				end = mid;
		}
	}
	/* If we're off the end of the array, we're done */
3439
	if (index >= l->length)
3440 3441
		return NULL;
	/* Update the abstract position to be the actual pid that we found */
3442
	iter = l->list + index;
3443
	*pos = cgroup_pid_fry(cgrp, *iter);
3444 3445 3446
	return iter;
}

3447
static void cgroup_pidlist_stop(struct seq_file *s, void *v)
3448
{
Tejun Heo's avatar
Tejun Heo committed
3449
	struct kernfs_open_file *of = s->private;
3450
	struct cgroup_pidlist *l = of->priv;
3451

3452 3453
	if (l)
		mod_delayed_work(cgroup_pidlist_destroy_wq, &l->destroy_dwork,
3454
				 CGROUP_PIDLIST_DESTROY_DELAY);
3455
	mutex_unlock(&seq_css(s)->cgroup->pidlist_mutex);
3456 3457
}

3458
static void *cgroup_pidlist_next(struct seq_file *s, void *v, loff_t *pos)
3459
{
Tejun Heo's avatar
Tejun Heo committed
3460
	struct kernfs_open_file *of = s->private;
3461
	struct cgroup_pidlist *l = of->priv;
3462 3463
	pid_t *p = v;
	pid_t *end = l->list + l->length;
3464 3465 3466 3467 3468 3469 3470 3471
	/*
	 * Advance to the next pid in the array. If this goes off the
	 * end, we're done
	 */
	p++;
	if (p >= end) {
		return NULL;
	} else {
3472
		*pos = cgroup_pid_fry(seq_css(s)->cgroup, *p);
3473 3474 3475 3476
		return p;
	}
}

3477
static int cgroup_pidlist_show(struct seq_file *s, void *v)
3478 3479 3480
{
	return seq_printf(s, "%d\n", *(int *)v);
}
3481

3482 3483 3484 3485 3486 3487 3488 3489 3490
/*
 * seq_operations functions for iterating on pidlists through seq_file -
 * independent of whether it's tasks or procs
 */
static const struct seq_operations cgroup_pidlist_seq_operations = {
	.start = cgroup_pidlist_start,
	.stop = cgroup_pidlist_stop,
	.next = cgroup_pidlist_next,
	.show = cgroup_pidlist_show,
3491 3492
};

3493 3494
static u64 cgroup_read_notify_on_release(struct cgroup_subsys_state *css,
					 struct cftype *cft)
3495
{
3496
	return notify_on_release(css->cgroup);
3497 3498
}

3499 3500
static int cgroup_write_notify_on_release(struct cgroup_subsys_state *css,
					  struct cftype *cft, u64 val)
3501
{
3502
	clear_bit(CGRP_RELEASABLE, &css->cgroup->flags);
3503
	if (val)
3504
		set_bit(CGRP_NOTIFY_ON_RELEASE, &css->cgroup->flags);
3505
	else
3506
		clear_bit(CGRP_NOTIFY_ON_RELEASE, &css->cgroup->flags);
3507 3508 3509
	return 0;
}

3510 3511
static u64 cgroup_clone_children_read(struct cgroup_subsys_state *css,
				      struct cftype *cft)
3512
{
3513
	return test_bit(CGRP_CPUSET_CLONE_CHILDREN, &css->cgroup->flags);
3514 3515
}

3516 3517
static int cgroup_clone_children_write(struct cgroup_subsys_state *css,
				       struct cftype *cft, u64 val)
3518 3519
{
	if (val)
3520
		set_bit(CGRP_CPUSET_CLONE_CHILDREN, &css->cgroup->flags);
3521
	else
3522
		clear_bit(CGRP_CPUSET_CLONE_CHILDREN, &css->cgroup->flags);
3523 3524 3525
	return 0;
}

3526
static struct cftype cgroup_base_files[] = {
3527
	{
3528
		.name = "cgroup.procs",
3529 3530 3531 3532
		.seq_start = cgroup_pidlist_start,
		.seq_next = cgroup_pidlist_next,
		.seq_stop = cgroup_pidlist_stop,
		.seq_show = cgroup_pidlist_show,
3533
		.private = CGROUP_FILE_PROCS,
Ben Blum's avatar
Ben Blum committed
3534 3535
		.write_u64 = cgroup_procs_write,
		.mode = S_IRUGO | S_IWUSR,
3536
	},
3537 3538
	{
		.name = "cgroup.clone_children",
3539
		.flags = CFTYPE_INSANE,
3540 3541 3542
		.read_u64 = cgroup_clone_children_read,
		.write_u64 = cgroup_clone_children_write,
	},
3543 3544 3545
	{
		.name = "cgroup.sane_behavior",
		.flags = CFTYPE_ONLY_ON_ROOT,
3546
		.seq_show = cgroup_sane_behavior_show,
3547
	},
3548 3549 3550 3551 3552 3553 3554 3555 3556

	/*
	 * Historical crazy stuff.  These don't have "cgroup."  prefix and
	 * don't exist if sane_behavior.  If you're depending on these, be
	 * prepared to be burned.
	 */
	{
		.name = "tasks",
		.flags = CFTYPE_INSANE,		/* use "procs" instead */
3557 3558 3559 3560
		.seq_start = cgroup_pidlist_start,
		.seq_next = cgroup_pidlist_next,
		.seq_stop = cgroup_pidlist_stop,
		.seq_show = cgroup_pidlist_show,
3561
		.private = CGROUP_FILE_TASKS,
3562 3563 3564 3565 3566 3567 3568 3569 3570
		.write_u64 = cgroup_tasks_write,
		.mode = S_IRUGO | S_IWUSR,
	},
	{
		.name = "notify_on_release",
		.flags = CFTYPE_INSANE,
		.read_u64 = cgroup_read_notify_on_release,
		.write_u64 = cgroup_write_notify_on_release,
	},
3571 3572
	{
		.name = "release_agent",
3573
		.flags = CFTYPE_INSANE | CFTYPE_ONLY_ON_ROOT,
3574
		.seq_show = cgroup_release_agent_show,
3575
		.write_string = cgroup_release_agent_write,
3576
		.max_write_len = PATH_MAX - 1,
3577
	},
3578
	{ }	/* terminate */
3579 3580
};

3581
/**
3582
 * cgroup_populate_dir - create subsys files in a cgroup directory
3583 3584
 * @cgrp: target cgroup
 * @subsys_mask: mask of the subsystem ids whose files should be added
3585 3586
 *
 * On failure, no file is added.
3587
 */
3588
static int cgroup_populate_dir(struct cgroup *cgrp, unsigned long subsys_mask)
3589 3590
{
	struct cgroup_subsys *ss;
3591
	int i, ret = 0;
3592

3593
	/* process cftsets of each subsystem */
3594
	for_each_subsys(ss, i) {
Tejun Heo's avatar
Tejun Heo committed
3595
		struct cftype *cfts;
3596 3597

		if (!test_bit(i, &subsys_mask))
3598
			continue;
3599

Tejun Heo's avatar
Tejun Heo committed
3600 3601
		list_for_each_entry(cfts, &ss->cfts, node) {
			ret = cgroup_addrm_files(cgrp, cfts, true);
3602 3603 3604
			if (ret < 0)
				goto err;
		}
3605 3606
	}
	return 0;
3607 3608 3609
err:
	cgroup_clear_dir(cgrp, subsys_mask);
	return ret;
3610 3611
}

3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633
/*
 * css destruction is four-stage process.
 *
 * 1. Destruction starts.  Killing of the percpu_ref is initiated.
 *    Implemented in kill_css().
 *
 * 2. When the percpu_ref is confirmed to be visible as killed on all CPUs
 *    and thus css_tryget() is guaranteed to fail, the css can be offlined
 *    by invoking offline_css().  After offlining, the base ref is put.
 *    Implemented in css_killed_work_fn().
 *
 * 3. When the percpu_ref reaches zero, the only possible remaining
 *    accessors are inside RCU read sections.  css_release() schedules the
 *    RCU callback.
 *
 * 4. After the grace period, the css can be freed.  Implemented in
 *    css_free_work_fn().
 *
 * It is actually hairier because both step 2 and 4 require process context
 * and thus involve punting to css->destroy_work adding two additional
 * steps to the already complex sequence.
 */
3634
static void css_free_work_fn(struct work_struct *work)
3635 3636
{
	struct cgroup_subsys_state *css =
3637
		container_of(work, struct cgroup_subsys_state, destroy_work);
3638
	struct cgroup *cgrp = css->cgroup;
3639

3640 3641 3642
	if (css->parent)
		css_put(css->parent);

3643
	css->ss->css_free(css);
Tejun Heo's avatar
Tejun Heo committed
3644
	cgroup_put(cgrp);
3645 3646
}

3647
static void css_free_rcu_fn(struct rcu_head *rcu_head)
3648 3649
{
	struct cgroup_subsys_state *css =
3650
		container_of(rcu_head, struct cgroup_subsys_state, rcu_head);
3651

3652
	INIT_WORK(&css->destroy_work, css_free_work_fn);
3653
	queue_work(cgroup_destroy_wq, &css->destroy_work);
3654 3655
}

3656 3657 3658 3659 3660
static void css_release(struct percpu_ref *ref)
{
	struct cgroup_subsys_state *css =
		container_of(ref, struct cgroup_subsys_state, refcnt);

3661
	RCU_INIT_POINTER(css->cgroup->subsys[css->ss->id], NULL);
3662
	call_rcu(&css->rcu_head, css_free_rcu_fn);
3663 3664
}

3665 3666
static void init_css(struct cgroup_subsys_state *css, struct cgroup_subsys *ss,
		     struct cgroup *cgrp)
3667
{
3668
	css->cgroup = cgrp;
3669
	css->ss = ss;
3670
	css->flags = 0;
3671 3672

	if (cgrp->parent)
3673
		css->parent = cgroup_css(cgrp->parent, ss);
3674
	else
3675
		css->flags |= CSS_ROOT;
3676

3677
	BUG_ON(cgroup_css(cgrp, ss));
3678 3679
}

3680
/* invoke ->css_online() on a new CSS and mark it online if successful */
3681
static int online_css(struct cgroup_subsys_state *css)
3682
{
3683
	struct cgroup_subsys *ss = css->ss;
3684 3685
	int ret = 0;

3686
	lockdep_assert_held(&cgroup_tree_mutex);
3687 3688
	lockdep_assert_held(&cgroup_mutex);

3689
	if (ss->css_online)
3690
		ret = ss->css_online(css);
3691
	if (!ret) {
3692
		css->flags |= CSS_ONLINE;
3693
		css->cgroup->nr_css++;
3694
		rcu_assign_pointer(css->cgroup->subsys[ss->id], css);
3695
	}
3696
	return ret;
3697 3698
}

3699
/* if the CSS is online, invoke ->css_offline() on it and mark it offline */
3700
static void offline_css(struct cgroup_subsys_state *css)
3701
{
3702
	struct cgroup_subsys *ss = css->ss;
3703

3704
	lockdep_assert_held(&cgroup_tree_mutex);
3705 3706 3707 3708 3709
	lockdep_assert_held(&cgroup_mutex);

	if (!(css->flags & CSS_ONLINE))
		return;

3710
	if (ss->css_offline)
3711
		ss->css_offline(css);
3712

3713
	css->flags &= ~CSS_ONLINE;
3714
	css->cgroup->nr_css--;
3715
	RCU_INIT_POINTER(css->cgroup->subsys[ss->id], NULL);
3716 3717
}

3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740
/**
 * create_css - create a cgroup_subsys_state
 * @cgrp: the cgroup new css will be associated with
 * @ss: the subsys of new css
 *
 * Create a new css associated with @cgrp - @ss pair.  On success, the new
 * css is online and installed in @cgrp with all interface files created.
 * Returns 0 on success, -errno on failure.
 */
static int create_css(struct cgroup *cgrp, struct cgroup_subsys *ss)
{
	struct cgroup *parent = cgrp->parent;
	struct cgroup_subsys_state *css;
	int err;

	lockdep_assert_held(&cgroup_mutex);

	css = ss->css_alloc(cgroup_css(parent, ss));
	if (IS_ERR(css))
		return PTR_ERR(css);

	err = percpu_ref_init(&css->refcnt, css_release);
	if (err)
3741
		goto err_free_css;
3742 3743 3744

	init_css(css, ss, cgrp);

3745
	err = cgroup_populate_dir(cgrp, 1 << ss->id);
3746
	if (err)
3747
		goto err_free_percpu_ref;
3748 3749 3750

	err = online_css(css);
	if (err)
3751
		goto err_clear_dir;
3752

3753
	cgroup_get(cgrp);
3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766
	css_get(css->parent);

	if (ss->broken_hierarchy && !ss->warned_broken_hierarchy &&
	    parent->parent) {
		pr_warning("cgroup: %s (%d) created nested cgroup for controller \"%s\" which has incomplete hierarchy support. Nested cgroups may change behavior in the future.\n",
			   current->comm, current->pid, ss->name);
		if (!strcmp(ss->name, "memory"))
			pr_warning("cgroup: \"memory\" requires setting use_hierarchy to 1 on the root.\n");
		ss->warned_broken_hierarchy = true;
	}

	return 0;

3767
err_clear_dir:
3768
	cgroup_clear_dir(css->cgroup, 1 << css->ss->id);
3769
err_free_percpu_ref:
3770
	percpu_ref_cancel_init(&css->refcnt);
3771
err_free_css:
3772 3773 3774 3775
	ss->css_free(css);
	return err;
}

Tejun Heo's avatar
Tejun Heo committed
3776
/**
Li Zefan's avatar
Li Zefan committed
3777 3778
 * cgroup_create - create a cgroup
 * @parent: cgroup that will be parent of the new cgroup
Tejun Heo's avatar
Tejun Heo committed
3779
 * @name: name of the new cgroup
Tejun Heo's avatar
Tejun Heo committed
3780
 * @mode: mode to set on new cgroup
3781
 */
Tejun Heo's avatar
Tejun Heo committed
3782
static long cgroup_create(struct cgroup *parent, const char *name,
Tejun Heo's avatar
Tejun Heo committed
3783
			  umode_t mode)
3784
{
3785
	struct cgroup *cgrp;
3786
	struct cgroup_root *root = parent->root;
3787
	int ssid, err;
3788
	struct cgroup_subsys *ss;
Tejun Heo's avatar
Tejun Heo committed
3789
	struct kernfs_node *kn;
3790

Tejun Heo's avatar
Tejun Heo committed
3791
	/* allocate the cgroup and its ID, 0 is reserved for the root */
3792 3793
	cgrp = kzalloc(sizeof(*cgrp), GFP_KERNEL);
	if (!cgrp)
3794 3795
		return -ENOMEM;

3796
	mutex_lock(&cgroup_tree_mutex);
3797

3798 3799 3800 3801 3802 3803 3804 3805 3806
	/*
	 * Only live parents can have children.  Note that the liveliness
	 * check isn't strictly necessary because cgroup_mkdir() and
	 * cgroup_rmdir() are fully synchronized by i_mutex; however, do it
	 * anyway so that locking is contained inside cgroup proper and we
	 * don't get nasty surprises if we ever grow another caller.
	 */
	if (!cgroup_lock_live_group(parent)) {
		err = -ENODEV;
3807
		goto err_unlock_tree;
3808 3809 3810 3811 3812 3813 3814 3815 3816 3817
	}

	/*
	 * Temporarily set the pointer to NULL, so idr_find() won't return
	 * a half-baked cgroup.
	 */
	cgrp->id = idr_alloc(&root->cgroup_idr, NULL, 1, 0, GFP_KERNEL);
	if (cgrp->id < 0) {
		err = -ENOMEM;
		goto err_unlock;
3818 3819
	}

3820
	init_cgroup_housekeeping(cgrp);
3821

3822
	cgrp->parent = parent;
3823
	cgrp->dummy_css.parent = &parent->dummy_css;
3824
	cgrp->root = parent->root;
3825

3826 3827 3828
	if (notify_on_release(parent))
		set_bit(CGRP_NOTIFY_ON_RELEASE, &cgrp->flags);

3829 3830
	if (test_bit(CGRP_CPUSET_CLONE_CHILDREN, &parent->flags))
		set_bit(CGRP_CPUSET_CLONE_CHILDREN, &cgrp->flags);
3831

Tejun Heo's avatar
Tejun Heo committed
3832
	/* create the directory */
Tejun Heo's avatar
Tejun Heo committed
3833
	kn = kernfs_create_dir(parent->kn, name, mode, cgrp);
Tejun Heo's avatar
Tejun Heo committed
3834 3835
	if (IS_ERR(kn)) {
		err = PTR_ERR(kn);
3836
		goto err_free_id;
Tejun Heo's avatar
Tejun Heo committed
3837 3838
	}
	cgrp->kn = kn;
3839

3840
	/*
3841 3842
	 * This extra ref will be put in cgroup_free_fn() and guarantees
	 * that @cgrp->kn is always accessible.
3843
	 */
3844
	kernfs_get(kn);
3845

3846
	cgrp->serial_nr = cgroup_serial_nr_next++;
3847

3848 3849
	/* allocation complete, commit to creation */
	list_add_tail_rcu(&cgrp->sibling, &cgrp->parent->children);
3850
	atomic_inc(&root->nr_cgrps);
3851
	cgroup_get(parent);
3852

3853 3854 3855 3856
	/*
	 * @cgrp is now fully operational.  If something fails after this
	 * point, it'll be released via the normal destruction path.
	 */
3857 3858
	idr_replace(&root->cgroup_idr, cgrp, cgrp->id);

3859 3860 3861 3862
	err = cgroup_kn_set_ugid(kn);
	if (err)
		goto err_destroy;

3863
	err = cgroup_addrm_files(cgrp, cgroup_base_files, true);
3864 3865 3866
	if (err)
		goto err_destroy;

3867
	/* let's create and online css's */
3868
	for_each_subsys(ss, ssid) {
3869
		if (parent->child_subsys_mask & (1 << ssid)) {
3870 3871 3872 3873
			err = create_css(cgrp, ss);
			if (err)
				goto err_destroy;
		}
3874
	}
3875

3876 3877 3878 3879 3880 3881
	/*
	 * On the default hierarchy, a child doesn't automatically inherit
	 * child_subsys_mask from the parent.  Each is configured manually.
	 */
	if (!cgroup_on_dfl(cgrp))
		cgrp->child_subsys_mask = parent->child_subsys_mask;
3882

Tejun Heo's avatar
Tejun Heo committed
3883 3884
	kernfs_activate(kn);

3885
	mutex_unlock(&cgroup_mutex);
3886
	mutex_unlock(&cgroup_tree_mutex);
3887 3888 3889

	return 0;

Tejun Heo's avatar
Tejun Heo committed
3890
err_free_id:
3891
	idr_remove(&root->cgroup_idr, cgrp->id);
3892 3893
err_unlock:
	mutex_unlock(&cgroup_mutex);
3894 3895
err_unlock_tree:
	mutex_unlock(&cgroup_tree_mutex);
3896
	kfree(cgrp);
3897
	return err;
3898 3899 3900 3901

err_destroy:
	cgroup_destroy_locked(cgrp);
	mutex_unlock(&cgroup_mutex);
3902
	mutex_unlock(&cgroup_tree_mutex);
3903
	return err;
3904 3905
}

Tejun Heo's avatar
Tejun Heo committed
3906 3907
static int cgroup_mkdir(struct kernfs_node *parent_kn, const char *name,
			umode_t mode)
3908
{
Tejun Heo's avatar
Tejun Heo committed
3909
	struct cgroup *parent = parent_kn->priv;
3910
	int ret;
3911

3912 3913 3914 3915 3916 3917 3918 3919
	/*
	 * cgroup_create() grabs cgroup_tree_mutex which nests outside
	 * kernfs active_ref and cgroup_create() already synchronizes
	 * properly against removal through cgroup_lock_live_group().
	 * Break it before calling cgroup_create().
	 */
	cgroup_get(parent);
	kernfs_break_active_protection(parent_kn);
3920

3921 3922 3923 3924 3925
	ret = cgroup_create(parent, name, mode);

	kernfs_unbreak_active_protection(parent_kn);
	cgroup_put(parent);
	return ret;
3926 3927
}

3928 3929 3930 3931 3932
/*
 * This is called when the refcnt of a css is confirmed to be killed.
 * css_tryget() is now guaranteed to fail.
 */
static void css_killed_work_fn(struct work_struct *work)
3933
{
3934 3935 3936
	struct cgroup_subsys_state *css =
		container_of(work, struct cgroup_subsys_state, destroy_work);
	struct cgroup *cgrp = css->cgroup;
3937

3938
	mutex_lock(&cgroup_tree_mutex);
3939 3940
	mutex_lock(&cgroup_mutex);

3941 3942 3943 3944 3945 3946
	/*
	 * css_tryget() is guaranteed to fail now.  Tell subsystems to
	 * initate destruction.
	 */
	offline_css(css);

3947 3948 3949 3950 3951
	/*
	 * If @cgrp is marked dead, it's waiting for refs of all css's to
	 * be disabled before proceeding to the second phase of cgroup
	 * destruction.  If we are the last one, kick it off.
	 */
3952
	if (!cgrp->nr_css && cgroup_is_dead(cgrp))
3953 3954 3955
		cgroup_destroy_css_killed(cgrp);

	mutex_unlock(&cgroup_mutex);
3956
	mutex_unlock(&cgroup_tree_mutex);
3957 3958 3959 3960 3961 3962 3963 3964 3965

	/*
	 * Put the css refs from kill_css().  Each css holds an extra
	 * reference to the cgroup's dentry and cgroup removal proceeds
	 * regardless of css refs.  On the last put of each css, whenever
	 * that may be, the extra dentry ref is put so that dentry
	 * destruction happens only after all css's are released.
	 */
	css_put(css);
3966 3967
}

3968 3969
/* css kill confirmation processing requires process context, bounce */
static void css_killed_ref_fn(struct percpu_ref *ref)
3970 3971 3972 3973
{
	struct cgroup_subsys_state *css =
		container_of(ref, struct cgroup_subsys_state, refcnt);

3974
	INIT_WORK(&css->destroy_work, css_killed_work_fn);
3975
	queue_work(cgroup_destroy_wq, &css->destroy_work);
3976 3977
}

3978 3979 3980 3981 3982 3983 3984 3985 3986 3987
/**
 * kill_css - destroy a css
 * @css: css to destroy
 *
 * This function initiates destruction of @css by removing cgroup interface
 * files and putting its base reference.  ->css_offline() will be invoked
 * asynchronously once css_tryget() is guaranteed to fail and when the
 * reference count reaches zero, @css will be released.
 */
static void kill_css(struct cgroup_subsys_state *css)
Tejun Heo's avatar
Tejun Heo committed
3988
{
3989 3990
	lockdep_assert_held(&cgroup_tree_mutex);

Tejun Heo's avatar
Tejun Heo committed
3991 3992 3993 3994
	/*
	 * This must happen before css is disassociated with its cgroup.
	 * See seq_css() for details.
	 */
3995
	cgroup_clear_dir(css->cgroup, 1 << css->ss->id);
3996

Tejun Heo's avatar
Tejun Heo committed
3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013
	/*
	 * Killing would put the base ref, but we need to keep it alive
	 * until after ->css_offline().
	 */
	css_get(css);

	/*
	 * cgroup core guarantees that, by the time ->css_offline() is
	 * invoked, no new css reference will be given out via
	 * css_tryget().  We can't simply call percpu_ref_kill() and
	 * proceed to offlining css's because percpu_ref_kill() doesn't
	 * guarantee that the ref is seen as killed on all CPUs on return.
	 *
	 * Use percpu_ref_kill_and_confirm() to get notifications as each
	 * css is confirmed to be seen as killed on all CPUs.
	 */
	percpu_ref_kill_and_confirm(&css->refcnt, css_killed_ref_fn);
4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036 4037 4038 4039
}

/**
 * cgroup_destroy_locked - the first stage of cgroup destruction
 * @cgrp: cgroup to be destroyed
 *
 * css's make use of percpu refcnts whose killing latency shouldn't be
 * exposed to userland and are RCU protected.  Also, cgroup core needs to
 * guarantee that css_tryget() won't succeed by the time ->css_offline() is
 * invoked.  To satisfy all the requirements, destruction is implemented in
 * the following two steps.
 *
 * s1. Verify @cgrp can be destroyed and mark it dying.  Remove all
 *     userland visible parts and start killing the percpu refcnts of
 *     css's.  Set up so that the next stage will be kicked off once all
 *     the percpu refcnts are confirmed to be killed.
 *
 * s2. Invoke ->css_offline(), mark the cgroup dead and proceed with the
 *     rest of destruction.  Once all cgroup references are gone, the
 *     cgroup is RCU-freed.
 *
 * This function implements s1.  After this step, @cgrp is gone as far as
 * the userland is concerned and a new cgroup with the same name may be
 * created.  As cgroup doesn't care about the names internally, this
 * doesn't cause any problem.
 */
4040 4041
static int cgroup_destroy_locked(struct cgroup *cgrp)
	__releases(&cgroup_mutex) __acquires(&cgroup_mutex)
4042
{
4043
	struct cgroup *child;
Tejun Heo's avatar
Tejun Heo committed
4044
	struct cgroup_subsys_state *css;
4045
	bool empty;
Tejun Heo's avatar
Tejun Heo committed
4046
	int ssid;
4047

4048
	lockdep_assert_held(&cgroup_tree_mutex);
4049 4050
	lockdep_assert_held(&cgroup_mutex);

4051
	/*
4052
	 * css_set_rwsem synchronizes access to ->cset_links and prevents
4053
	 * @cgrp from being removed while put_css_set() is in progress.
4054
	 */
4055
	down_read(&css_set_rwsem);
4056
	empty = list_empty(&cgrp->cset_links);
4057
	up_read(&css_set_rwsem);
4058
	if (!empty)
4059
		return -EBUSY;
Li Zefan's avatar
Li Zefan committed
4060

4061 4062 4063 4064 4065 4066 4067 4068 4069 4070 4071 4072 4073 4074 4075 4076
	/*
	 * Make sure there's no live children.  We can't test ->children
	 * emptiness as dead children linger on it while being destroyed;
	 * otherwise, "rmdir parent/child parent" may fail with -EBUSY.
	 */
	empty = true;
	rcu_read_lock();
	list_for_each_entry_rcu(child, &cgrp->children, sibling) {
		empty = cgroup_is_dead(child);
		if (!empty)
			break;
	}
	rcu_read_unlock();
	if (!empty)
		return -EBUSY;

4077 4078 4079
	/*
	 * Mark @cgrp dead.  This prevents further task migration and child
	 * creation by disabling cgroup_lock_live_group().  Note that
4080
	 * CGRP_DEAD assertion is depended upon by css_next_child() to
4081
	 * resume iteration after dropping RCU read lock.  See
4082
	 * css_next_child() for details.
4083
	 */
4084
	set_bit(CGRP_DEAD, &cgrp->flags);
4085

4086
	/*
Tejun Heo's avatar
Tejun Heo committed
4087 4088
	 * Initiate massacre of all css's.  cgroup_destroy_css_killed()
	 * will be invoked to perform the rest of destruction once the
4089 4090
	 * percpu refs of all css's are confirmed to be killed.  This
	 * involves removing the subsystem's files, drop cgroup_mutex.
4091
	 */
4092
	mutex_unlock(&cgroup_mutex);
Tejun Heo's avatar
Tejun Heo committed
4093 4094
	for_each_css(css, ssid, cgrp)
		kill_css(css);
4095
	mutex_lock(&cgroup_mutex);
4096 4097 4098 4099 4100 4101 4102 4103

	/* CGRP_DEAD is set, remove from ->release_list for the last time */
	raw_spin_lock(&release_list_lock);
	if (!list_empty(&cgrp->release_list))
		list_del_init(&cgrp->release_list);
	raw_spin_unlock(&release_list_lock);

	/*
4104 4105 4106 4107 4108 4109 4110 4111
	 * If @cgrp has css's attached, the second stage of cgroup
	 * destruction is kicked off from css_killed_work_fn() after the
	 * refs of all attached css's are killed.  If @cgrp doesn't have
	 * any css, we kick it off here.
	 */
	if (!cgrp->nr_css)
		cgroup_destroy_css_killed(cgrp);

Tejun Heo's avatar
Tejun Heo committed
4112 4113 4114
	/* remove @cgrp directory along with the base files */
	mutex_unlock(&cgroup_mutex);

4115
	/*
Tejun Heo's avatar
Tejun Heo committed
4116 4117 4118 4119 4120
	 * There are two control paths which try to determine cgroup from
	 * dentry without going through kernfs - cgroupstats_build() and
	 * css_tryget_from_dir().  Those are supported by RCU protecting
	 * clearing of cgrp->kn->priv backpointer, which should happen
	 * after all files under it have been removed.
4121
	 */
4122
	kernfs_remove(cgrp->kn);	/* @cgrp has an extra ref on its kn */
Tejun Heo's avatar
Tejun Heo committed
4123 4124
	RCU_INIT_POINTER(*(void __rcu __force **)&cgrp->kn->priv, NULL);

4125
	mutex_lock(&cgroup_mutex);
4126

4127 4128 4129
	return 0;
};

4130
/**
4131
 * cgroup_destroy_css_killed - the second step of cgroup destruction
4132 4133 4134
 * @work: cgroup->destroy_free_work
 *
 * This function is invoked from a work item for a cgroup which is being
4135 4136 4137
 * destroyed after all css's are offlined and performs the rest of
 * destruction.  This is the second step of destruction described in the
 * comment above cgroup_destroy_locked().
4138
 */
4139
static void cgroup_destroy_css_killed(struct cgroup *cgrp)
4140 4141 4142
{
	struct cgroup *parent = cgrp->parent;

4143
	lockdep_assert_held(&cgroup_tree_mutex);
4144
	lockdep_assert_held(&cgroup_mutex);
4145

4146
	/* delete this cgroup from parent->children */
4147
	list_del_rcu(&cgrp->sibling);
4148

4149
	cgroup_put(cgrp);
4150

4151
	set_bit(CGRP_RELEASABLE, &parent->flags);
4152
	check_for_release(parent);
4153 4154
}

Tejun Heo's avatar
Tejun Heo committed
4155
static int cgroup_rmdir(struct kernfs_node *kn)
4156
{
Tejun Heo's avatar
Tejun Heo committed
4157 4158
	struct cgroup *cgrp = kn->priv;
	int ret = 0;
4159

Tejun Heo's avatar
Tejun Heo committed
4160 4161 4162 4163 4164 4165 4166 4167
	/*
	 * This is self-destruction but @kn can't be removed while this
	 * callback is in progress.  Let's break active protection.  Once
	 * the protection is broken, @cgrp can be destroyed at any point.
	 * Pin it so that it stays accessible.
	 */
	cgroup_get(cgrp);
	kernfs_break_active_protection(kn);
4168

4169
	mutex_lock(&cgroup_tree_mutex);
4170
	mutex_lock(&cgroup_mutex);
4171 4172

	/*
Tejun Heo's avatar
Tejun Heo committed
4173 4174
	 * @cgrp might already have been destroyed while we're trying to
	 * grab the mutexes.
4175
	 */
Tejun Heo's avatar
Tejun Heo committed
4176 4177
	if (!cgroup_is_dead(cgrp))
		ret = cgroup_destroy_locked(cgrp);
4178

4179
	mutex_unlock(&cgroup_mutex);
4180
	mutex_unlock(&cgroup_tree_mutex);
4181

Tejun Heo's avatar
Tejun Heo committed
4182 4183
	kernfs_unbreak_active_protection(kn);
	cgroup_put(cgrp);
4184
	return ret;
4185 4186
}

Tejun Heo's avatar
Tejun Heo committed
4187 4188 4189 4190 4191 4192 4193 4194
static struct kernfs_syscall_ops cgroup_kf_syscall_ops = {
	.remount_fs		= cgroup_remount,
	.show_options		= cgroup_show_options,
	.mkdir			= cgroup_mkdir,
	.rmdir			= cgroup_rmdir,
	.rename			= cgroup_rename,
};

4195
static void __init cgroup_init_subsys(struct cgroup_subsys *ss)
4196 4197
{
	struct cgroup_subsys_state *css;
Diego Calleja's avatar
Diego Calleja committed
4198 4199

	printk(KERN_INFO "Initializing cgroup subsys %s\n", ss->name);
4200

4201
	mutex_lock(&cgroup_tree_mutex);
4202 4203
	mutex_lock(&cgroup_mutex);

Tejun Heo's avatar
Tejun Heo committed
4204
	INIT_LIST_HEAD(&ss->cfts);
4205

4206 4207 4208
	/* Create the root cgroup state for this subsystem */
	ss->root = &cgrp_dfl_root;
	css = ss->css_alloc(cgroup_css(&cgrp_dfl_root.cgrp, ss));
4209 4210
	/* We don't handle early failures gracefully */
	BUG_ON(IS_ERR(css));
4211
	init_css(css, ss, &cgrp_dfl_root.cgrp);
4212

Li Zefan's avatar
Li Zefan committed
4213
	/* Update the init_css_set to contain a subsys
4214
	 * pointer to this state - since the subsystem is
Li Zefan's avatar
Li Zefan committed
4215
	 * newly registered, all tasks and hence the
4216
	 * init_css_set is in the subsystem's root cgroup. */
4217
	init_css_set.subsys[ss->id] = css;
4218 4219 4220

	need_forkexit_callback |= ss->fork || ss->exit;

Li Zefan's avatar
Li Zefan committed
4221 4222 4223 4224 4225
	/* At system boot, before all subsystems have been
	 * registered, no tasks have been forked, so we don't
	 * need to invoke fork callbacks here. */
	BUG_ON(!list_empty(&init_task.tasks));

4226
	BUG_ON(online_css(css));
4227

4228
	cgrp_dfl_root.subsys_mask |= 1 << ss->id;
4229 4230

	mutex_unlock(&cgroup_mutex);
4231
	mutex_unlock(&cgroup_tree_mutex);
4232 4233
}

4234
/**
Li Zefan's avatar
Li Zefan committed
4235 4236 4237 4238
 * cgroup_init_early - cgroup initialization at system boot
 *
 * Initialize cgroups at system boot, and initialize any
 * subsystems that request early init.
4239 4240 4241
 */
int __init cgroup_init_early(void)
{
4242 4243
	static struct cgroup_sb_opts __initdata opts =
		{ .flags = CGRP_ROOT_SANE_BEHAVIOR };
4244
	struct cgroup_subsys *ss;
4245
	int i;
4246

4247
	init_cgroup_root(&cgrp_dfl_root, &opts);
4248
	RCU_INIT_POINTER(init_task.cgroups, &init_css_set);
4249

Tejun Heo's avatar
Tejun Heo committed
4250
	for_each_subsys(ss, i) {
4251
		WARN(!ss->css_alloc || !ss->css_free || ss->name || ss->id,
4252 4253
		     "invalid cgroup_subsys %d:%s css_alloc=%p css_free=%p name:id=%d:%s\n",
		     i, cgroup_subsys_name[i], ss->css_alloc, ss->css_free,
4254
		     ss->id, ss->name);
4255 4256 4257
		WARN(strlen(cgroup_subsys_name[i]) > MAX_CGROUP_TYPE_NAMELEN,
		     "cgroup_subsys_name %s too long\n", cgroup_subsys_name[i]);

4258
		ss->id = i;
4259
		ss->name = cgroup_subsys_name[i];
4260 4261 4262 4263 4264 4265 4266 4267

		if (ss->early_init)
			cgroup_init_subsys(ss);
	}
	return 0;
}

/**
Li Zefan's avatar
Li Zefan committed
4268 4269 4270 4271
 * cgroup_init - cgroup initialization
 *
 * Register cgroup filesystem and /proc file, and initialize
 * any subsystems that didn't request early init.
4272 4273 4274
 */
int __init cgroup_init(void)
{
4275
	struct cgroup_subsys *ss;
4276
	unsigned long key;
4277
	int ssid, err;
4278

Tejun Heo's avatar
Tejun Heo committed
4279
	BUG_ON(cgroup_init_cftypes(NULL, cgroup_base_files));
4280

4281
	mutex_lock(&cgroup_tree_mutex);
Tejun Heo's avatar
Tejun Heo committed
4282 4283
	mutex_lock(&cgroup_mutex);

4284 4285 4286 4287
	/* Add init_css_set to the hash table */
	key = css_set_hash(init_css_set.subsys);
	hash_add(css_set_table, &init_css_set.hlist, key);

4288
	BUG_ON(cgroup_setup_root(&cgrp_dfl_root, 0));
4289

Tejun Heo's avatar
Tejun Heo committed
4290
	mutex_unlock(&cgroup_mutex);
4291
	mutex_unlock(&cgroup_tree_mutex);
Tejun Heo's avatar
Tejun Heo committed
4292

4293 4294 4295 4296
	for_each_subsys(ss, ssid) {
		if (!ss->early_init)
			cgroup_init_subsys(ss);

4297 4298 4299
		list_add_tail(&init_css_set.e_cset_node[ssid],
			      &cgrp_dfl_root.cgrp.e_csets[ssid]);

4300 4301 4302 4303 4304 4305
		/*
		 * cftype registration needs kmalloc and can't be done
		 * during early_init.  Register base cftypes separately.
		 */
		if (ss->base_cftypes)
			WARN_ON(cgroup_add_cftypes(ss, ss->base_cftypes));
4306 4307 4308
	}

	cgroup_kobj = kobject_create_and_add("cgroup", fs_kobj);
Tejun Heo's avatar
Tejun Heo committed
4309 4310
	if (!cgroup_kobj)
		return -ENOMEM;
4311

4312
	err = register_filesystem(&cgroup_fs_type);
4313 4314
	if (err < 0) {
		kobject_put(cgroup_kobj);
Tejun Heo's avatar
Tejun Heo committed
4315
		return err;
4316
	}
4317

Li Zefan's avatar
Li Zefan committed
4318
	proc_create("cgroups", 0, NULL, &proc_cgroupstats_operations);
Tejun Heo's avatar
Tejun Heo committed
4319
	return 0;
4320
}
4321

4322 4323 4324 4325 4326
static int __init cgroup_wq_init(void)
{
	/*
	 * There isn't much point in executing destruction path in
	 * parallel.  Good chunk is serialized with cgroup_mutex anyway.
4327
	 * Use 1 for @max_active.
4328 4329 4330 4331
	 *
	 * We would prefer to do this in cgroup_init() above, but that
	 * is called before init_workqueues(): so leave this until after.
	 */
4332
	cgroup_destroy_wq = alloc_workqueue("cgroup_destroy", 0, 1);
4333
	BUG_ON(!cgroup_destroy_wq);
4334 4335 4336 4337 4338 4339 4340 4341 4342

	/*
	 * Used to destroy pidlists and separate to serve as flush domain.
	 * Cap @max_active to 1 too.
	 */
	cgroup_pidlist_destroy_wq = alloc_workqueue("cgroup_pidlist_destroy",
						    0, 1);
	BUG_ON(!cgroup_pidlist_destroy_wq);

4343 4344 4345 4346
	return 0;
}
core_initcall(cgroup_wq_init);

4347 4348 4349 4350 4351 4352 4353
/*
 * proc_cgroup_show()
 *  - Print task's cgroup paths into seq_file, one line for each hierarchy
 *  - Used for /proc/<pid>/cgroup.
 */

/* TODO: Use a proper seq_file iterator */
4354
int proc_cgroup_show(struct seq_file *m, void *v)
4355 4356 4357
{
	struct pid *pid;
	struct task_struct *tsk;
Tejun Heo's avatar
Tejun Heo committed
4358
	char *buf, *path;
4359
	int retval;
4360
	struct cgroup_root *root;
4361 4362

	retval = -ENOMEM;
Tejun Heo's avatar
Tejun Heo committed
4363
	buf = kmalloc(PATH_MAX, GFP_KERNEL);
4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375
	if (!buf)
		goto out;

	retval = -ESRCH;
	pid = m->private;
	tsk = get_pid_task(pid, PIDTYPE_PID);
	if (!tsk)
		goto out_free;

	retval = 0;

	mutex_lock(&cgroup_mutex);
4376
	down_read(&css_set_rwsem);
4377

4378
	for_each_root(root) {
4379
		struct cgroup_subsys *ss;
4380
		struct cgroup *cgrp;
4381
		int ssid, count = 0;
4382

4383
		if (root == &cgrp_dfl_root && !cgrp_dfl_root_visible)
4384 4385
			continue;

4386
		seq_printf(m, "%d:", root->hierarchy_id);
4387
		for_each_subsys(ss, ssid)
4388
			if (root->subsys_mask & (1 << ssid))
4389
				seq_printf(m, "%s%s", count++ ? "," : "", ss->name);
4390 4391 4392
		if (strlen(root->name))
			seq_printf(m, "%sname=%s", count ? "," : "",
				   root->name);
4393
		seq_putc(m, ':');
4394
		cgrp = task_cgroup_from_root(tsk, root);
Tejun Heo's avatar
Tejun Heo committed
4395 4396 4397
		path = cgroup_path(cgrp, buf, PATH_MAX);
		if (!path) {
			retval = -ENAMETOOLONG;
4398
			goto out_unlock;
Tejun Heo's avatar
Tejun Heo committed
4399 4400
		}
		seq_puts(m, path);
4401 4402 4403 4404
		seq_putc(m, '\n');
	}

out_unlock:
4405
	up_read(&css_set_rwsem);
4406 4407 4408 4409 4410 4411 4412 4413 4414 4415 4416
	mutex_unlock(&cgroup_mutex);
	put_task_struct(tsk);
out_free:
	kfree(buf);
out:
	return retval;
}

/* Display information about each subsystem and each hierarchy */
static int proc_cgroupstats_show(struct seq_file *m, void *v)
{
4417
	struct cgroup_subsys *ss;
4418 4419
	int i;

4420
	seq_puts(m, "#subsys_name\thierarchy\tnum_cgroups\tenabled\n");
Ben Blum's avatar
Ben Blum committed
4421 4422 4423 4424 4425
	/*
	 * ideally we don't want subsystems moving around while we do this.
	 * cgroup_mutex is also necessary to guarantee an atomic snapshot of
	 * subsys/hierarchy state.
	 */
4426
	mutex_lock(&cgroup_mutex);
4427 4428

	for_each_subsys(ss, i)
4429 4430
		seq_printf(m, "%s\t%d\t%d\t%d\n",
			   ss->name, ss->root->hierarchy_id,
4431
			   atomic_read(&ss->root->nr_cgrps), !ss->disabled);
4432

4433 4434 4435 4436 4437 4438
	mutex_unlock(&cgroup_mutex);
	return 0;
}

static int cgroupstats_open(struct inode *inode, struct file *file)
{
Al Viro's avatar
Al Viro committed
4439
	return single_open(file, proc_cgroupstats_show, NULL);
4440 4441
}

4442
static const struct file_operations proc_cgroupstats_operations = {
4443 4444 4445 4446 4447 4448
	.open = cgroupstats_open,
	.read = seq_read,
	.llseek = seq_lseek,
	.release = single_release,
};

4449
/**
4450
 * cgroup_fork - initialize cgroup related fields during copy_process()
Li Zefan's avatar
Li Zefan committed
4451
 * @child: pointer to task_struct of forking parent process.
4452
 *
4453 4454 4455
 * A task is associated with the init_css_set until cgroup_post_fork()
 * attaches it to the parent's css_set.  Empty cg_list indicates that
 * @child isn't holding reference to its css_set.
4456 4457 4458
 */
void cgroup_fork(struct task_struct *child)
{
4459
	RCU_INIT_POINTER(child->cgroups, &init_css_set);
4460
	INIT_LIST_HEAD(&child->cg_list);
4461 4462
}

4463
/**
Li Zefan's avatar
Li Zefan committed
4464 4465 4466
 * cgroup_post_fork - called on a new task after adding it to the task list
 * @child: the task in question
 *
4467 4468 4469
 * Adds the task to the list running through its css_set if necessary and
 * call the subsystem fork() callbacks.  Has to be after the task is
 * visible on the task list in case we race with the first call to
4470
 * cgroup_task_iter_start() - to guarantee that the new task ends up on its
4471
 * list.
Li Zefan's avatar
Li Zefan committed
4472
 */
4473 4474
void cgroup_post_fork(struct task_struct *child)
{
4475
	struct cgroup_subsys *ss;
4476 4477
	int i;

4478
	/*
4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497
	 * This may race against cgroup_enable_task_cg_links().  As that
	 * function sets use_task_css_set_links before grabbing
	 * tasklist_lock and we just went through tasklist_lock to add
	 * @child, it's guaranteed that either we see the set
	 * use_task_css_set_links or cgroup_enable_task_cg_lists() sees
	 * @child during its iteration.
	 *
	 * If we won the race, @child is associated with %current's
	 * css_set.  Grabbing css_set_rwsem guarantees both that the
	 * association is stable, and, on completion of the parent's
	 * migration, @child is visible in the source of migration or
	 * already in the destination cgroup.  This guarantee is necessary
	 * when implementing operations which need to migrate all tasks of
	 * a cgroup to another.
	 *
	 * Note that if we lose to cgroup_enable_task_cg_links(), @child
	 * will remain in init_css_set.  This is safe because all tasks are
	 * in the init_css_set before cg_links is enabled and there's no
	 * operation which transfers all tasks out of init_css_set.
4498
	 */
4499
	if (use_task_css_set_links) {
4500 4501
		struct css_set *cset;

4502
		down_write(&css_set_rwsem);
4503
		cset = task_css_set(current);
4504 4505 4506 4507 4508
		if (list_empty(&child->cg_list)) {
			rcu_assign_pointer(child->cgroups, cset);
			list_add(&child->cg_list, &cset->tasks);
			get_css_set(cset);
		}
4509
		up_write(&css_set_rwsem);
4510
	}
4511 4512 4513 4514 4515 4516 4517

	/*
	 * Call ss->fork().  This must happen after @child is linked on
	 * css_set; otherwise, @child might change state between ->fork()
	 * and addition to css_set.
	 */
	if (need_forkexit_callback) {
Tejun Heo's avatar
Tejun Heo committed
4518
		for_each_subsys(ss, i)
4519 4520 4521
			if (ss->fork)
				ss->fork(child);
	}
4522
}
4523

4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534 4535
/**
 * cgroup_exit - detach cgroup from exiting task
 * @tsk: pointer to task_struct of exiting process
 *
 * Description: Detach cgroup from @tsk and release it.
 *
 * Note that cgroups marked notify_on_release force every task in
 * them to take the global cgroup_mutex mutex when exiting.
 * This could impact scaling on very large systems.  Be reluctant to
 * use notify_on_release cgroups where very high task exit scaling
 * is required on large systems.
 *
4536 4537 4538 4539 4540
 * We set the exiting tasks cgroup to the root cgroup (top_cgroup).  We
 * call cgroup_exit() while the task is still competent to handle
 * notify_on_release(), then leave the task attached to the root cgroup in
 * each hierarchy for the remainder of its exit.  No need to bother with
 * init_css_set refcnting.  init_css_set never goes away and we can't race
4541
 * with migration path - PF_EXITING is visible to migration path.
4542
 */
4543
void cgroup_exit(struct task_struct *tsk)
4544
{
4545
	struct cgroup_subsys *ss;
4546
	struct css_set *cset;
4547
	bool put_cset = false;
4548
	int i;
4549 4550

	/*
4551 4552
	 * Unlink from @tsk from its css_set.  As migration path can't race
	 * with us, we can check cg_list without grabbing css_set_rwsem.
4553 4554
	 */
	if (!list_empty(&tsk->cg_list)) {
4555
		down_write(&css_set_rwsem);
4556
		list_del_init(&tsk->cg_list);
4557
		up_write(&css_set_rwsem);
4558
		put_cset = true;
4559 4560
	}

4561
	/* Reassign the task to the init_css_set. */
4562 4563
	cset = task_css_set(tsk);
	RCU_INIT_POINTER(tsk->cgroups, &init_css_set);
4564

4565
	if (need_forkexit_callback) {
Tejun Heo's avatar
Tejun Heo committed
4566 4567
		/* see cgroup_post_fork() for details */
		for_each_subsys(ss, i) {
4568
			if (ss->exit) {
4569 4570
				struct cgroup_subsys_state *old_css = cset->subsys[i];
				struct cgroup_subsys_state *css = task_css(tsk, i);
4571

4572
				ss->exit(css, old_css, tsk);
4573 4574 4575 4576
			}
		}
	}

4577 4578
	if (put_cset)
		put_css_set(cset, true);
4579
}
4580

4581
static void check_for_release(struct cgroup *cgrp)
4582
{
4583
	if (cgroup_is_releasable(cgrp) &&
4584
	    list_empty(&cgrp->cset_links) && list_empty(&cgrp->children)) {
4585 4586
		/*
		 * Control Group is currently removeable. If it's not
4587
		 * already queued for a userspace notification, queue
4588 4589
		 * it now
		 */
4590
		int need_schedule_work = 0;
4591

4592
		raw_spin_lock(&release_list_lock);
4593
		if (!cgroup_is_dead(cgrp) &&
4594 4595
		    list_empty(&cgrp->release_list)) {
			list_add(&cgrp->release_list, &release_list);
4596 4597
			need_schedule_work = 1;
		}
4598
		raw_spin_unlock(&release_list_lock);
4599 4600 4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622 4623 4624 4625 4626 4627 4628 4629 4630
		if (need_schedule_work)
			schedule_work(&release_agent_work);
	}
}

/*
 * Notify userspace when a cgroup is released, by running the
 * configured release agent with the name of the cgroup (path
 * relative to the root of cgroup file system) as the argument.
 *
 * Most likely, this user command will try to rmdir this cgroup.
 *
 * This races with the possibility that some other task will be
 * attached to this cgroup before it is removed, or that some other
 * user task will 'mkdir' a child cgroup of this cgroup.  That's ok.
 * The presumed 'rmdir' will fail quietly if this cgroup is no longer
 * unused, and this cgroup will be reprieved from its death sentence,
 * to continue to serve a useful existence.  Next time it's released,
 * we will get notified again, if it still has 'notify_on_release' set.
 *
 * The final arg to call_usermodehelper() is UMH_WAIT_EXEC, which
 * means only wait until the task is successfully execve()'d.  The
 * separate release agent task is forked by call_usermodehelper(),
 * then control in this thread returns here, without waiting for the
 * release agent task.  We don't bother to wait because the caller of
 * this routine has no use for the exit status of the release agent
 * task, so no sense holding our caller up for that.
 */
static void cgroup_release_agent(struct work_struct *work)
{
	BUG_ON(work != &release_agent_work);
	mutex_lock(&cgroup_mutex);
4631
	raw_spin_lock(&release_list_lock);
4632 4633 4634
	while (!list_empty(&release_list)) {
		char *argv[3], *envp[3];
		int i;
Tejun Heo's avatar
Tejun Heo committed
4635
		char *pathbuf = NULL, *agentbuf = NULL, *path;
4636
		struct cgroup *cgrp = list_entry(release_list.next,
4637 4638
						    struct cgroup,
						    release_list);
4639
		list_del_init(&cgrp->release_list);
4640
		raw_spin_unlock(&release_list_lock);
Tejun Heo's avatar
Tejun Heo committed
4641
		pathbuf = kmalloc(PATH_MAX, GFP_KERNEL);
4642 4643
		if (!pathbuf)
			goto continue_free;
Tejun Heo's avatar
Tejun Heo committed
4644 4645
		path = cgroup_path(cgrp, pathbuf, PATH_MAX);
		if (!path)
4646 4647 4648 4649
			goto continue_free;
		agentbuf = kstrdup(cgrp->root->release_agent_path, GFP_KERNEL);
		if (!agentbuf)
			goto continue_free;
4650 4651

		i = 0;
4652
		argv[i++] = agentbuf;
Tejun Heo's avatar
Tejun Heo committed
4653
		argv[i++] = path;
4654 4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666 4667
		argv[i] = NULL;

		i = 0;
		/* minimal command environment */
		envp[i++] = "HOME=/";
		envp[i++] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin";
		envp[i] = NULL;

		/* Drop the lock while we invoke the usermode helper,
		 * since the exec could involve hitting disk and hence
		 * be a slow process */
		mutex_unlock(&cgroup_mutex);
		call_usermodehelper(argv[0], argv, envp, UMH_WAIT_EXEC);
		mutex_lock(&cgroup_mutex);
4668 4669 4670
 continue_free:
		kfree(pathbuf);
		kfree(agentbuf);
4671
		raw_spin_lock(&release_list_lock);
4672
	}
4673
	raw_spin_unlock(&release_list_lock);
4674 4675
	mutex_unlock(&cgroup_mutex);
}
4676 4677 4678

static int __init cgroup_disable(char *str)
{
4679
	struct cgroup_subsys *ss;
4680
	char *token;
4681
	int i;
4682 4683 4684 4685

	while ((token = strsep(&str, ",")) != NULL) {
		if (!*token)
			continue;
4686

Tejun Heo's avatar
Tejun Heo committed
4687
		for_each_subsys(ss, i) {
4688 4689 4690 4691 4692 4693 4694 4695 4696 4697 4698
			if (!strcmp(token, ss->name)) {
				ss->disabled = 1;
				printk(KERN_INFO "Disabling %s control group"
					" subsystem\n", ss->name);
				break;
			}
		}
	}
	return 1;
}
__setup("cgroup_disable=", cgroup_disable);
KAMEZAWA Hiroyuki's avatar
KAMEZAWA Hiroyuki committed
4699

4700
/**
4701
 * css_tryget_from_dir - get corresponding css from the dentry of a cgroup dir
4702 4703
 * @dentry: directory dentry of interest
 * @ss: subsystem of interest
4704
 *
4705 4706 4707
 * If @dentry is a directory for a cgroup which has @ss enabled on it, try
 * to get the corresponding css and return it.  If such css doesn't exist
 * or can't be pinned, an ERR_PTR value is returned.
Stephane Eranian's avatar
Stephane Eranian committed
4708
 */
4709 4710
struct cgroup_subsys_state *css_tryget_from_dir(struct dentry *dentry,
						struct cgroup_subsys *ss)
Stephane Eranian's avatar
Stephane Eranian committed
4711
{
Tejun Heo's avatar
Tejun Heo committed
4712 4713
	struct kernfs_node *kn = kernfs_node_from_dentry(dentry);
	struct cgroup_subsys_state *css = NULL;
Stephane Eranian's avatar
Stephane Eranian committed
4714 4715
	struct cgroup *cgrp;

4716
	/* is @dentry a cgroup dir? */
Tejun Heo's avatar
Tejun Heo committed
4717 4718
	if (dentry->d_sb->s_type != &cgroup_fs_type || !kn ||
	    kernfs_type(kn) != KERNFS_DIR)
Stephane Eranian's avatar
Stephane Eranian committed
4719 4720
		return ERR_PTR(-EBADF);

4721 4722
	rcu_read_lock();

Tejun Heo's avatar
Tejun Heo committed
4723 4724 4725 4726 4727 4728 4729 4730
	/*
	 * This path doesn't originate from kernfs and @kn could already
	 * have been or be removed at any point.  @kn->priv is RCU
	 * protected for this access.  See destroy_locked() for details.
	 */
	cgrp = rcu_dereference(kn->priv);
	if (cgrp)
		css = cgroup_css(cgrp, ss);
4731 4732 4733 4734 4735 4736

	if (!css || !css_tryget(css))
		css = ERR_PTR(-ENOENT);

	rcu_read_unlock();
	return css;
Stephane Eranian's avatar
Stephane Eranian committed
4737 4738
}

4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750
/**
 * css_from_id - lookup css by id
 * @id: the cgroup id
 * @ss: cgroup subsys to be looked into
 *
 * Returns the css if there's valid one with @id, otherwise returns NULL.
 * Should be called under rcu_read_lock().
 */
struct cgroup_subsys_state *css_from_id(int id, struct cgroup_subsys *ss)
{
	struct cgroup *cgrp;

4751
	cgroup_assert_mutexes_or_rcu_locked();
4752 4753 4754

	cgrp = idr_find(&ss->root->cgroup_idr, id);
	if (cgrp)
4755
		return cgroup_css(cgrp, ss);
4756
	return NULL;
Stephane Eranian's avatar
Stephane Eranian committed
4757 4758
}

4759
#ifdef CONFIG_CGROUP_DEBUG
4760 4761
static struct cgroup_subsys_state *
debug_css_alloc(struct cgroup_subsys_state *parent_css)
4762 4763 4764 4765 4766 4767 4768 4769 4770
{
	struct cgroup_subsys_state *css = kzalloc(sizeof(*css), GFP_KERNEL);

	if (!css)
		return ERR_PTR(-ENOMEM);

	return css;
}

4771
static void debug_css_free(struct cgroup_subsys_state *css)
4772
{
4773
	kfree(css);
4774 4775
}

4776 4777
static u64 debug_taskcount_read(struct cgroup_subsys_state *css,
				struct cftype *cft)
4778
{
4779
	return cgroup_task_count(css->cgroup);
4780 4781
}

4782 4783
static u64 current_css_set_read(struct cgroup_subsys_state *css,
				struct cftype *cft)
4784 4785 4786 4787
{
	return (u64)(unsigned long)current->cgroups;
}

4788
static u64 current_css_set_refcount_read(struct cgroup_subsys_state *css,
Li Zefan's avatar
Li Zefan committed
4789
					 struct cftype *cft)
4790 4791 4792 4793
{
	u64 count;

	rcu_read_lock();
4794
	count = atomic_read(&task_css_set(current)->refcount);
4795 4796 4797 4798
	rcu_read_unlock();
	return count;
}

4799
static int current_css_set_cg_links_read(struct seq_file *seq, void *v)
4800
{
4801
	struct cgrp_cset_link *link;
4802
	struct css_set *cset;
Tejun Heo's avatar
Tejun Heo committed
4803 4804 4805 4806 4807
	char *name_buf;

	name_buf = kmalloc(NAME_MAX + 1, GFP_KERNEL);
	if (!name_buf)
		return -ENOMEM;
4808

4809
	down_read(&css_set_rwsem);
4810
	rcu_read_lock();
4811
	cset = rcu_dereference(current->cgroups);
4812
	list_for_each_entry(link, &cset->cgrp_links, cgrp_link) {
4813 4814
		struct cgroup *c = link->cgrp;

4815
		cgroup_name(c, name_buf, NAME_MAX + 1);
4816
		seq_printf(seq, "Root %d group %s\n",
4817
			   c->root->hierarchy_id, name_buf);
4818 4819
	}
	rcu_read_unlock();
4820
	up_read(&css_set_rwsem);
Tejun Heo's avatar
Tejun Heo committed
4821
	kfree(name_buf);
4822 4823 4824 4825
	return 0;
}

#define MAX_TASKS_SHOWN_PER_CSS 25
4826
static int cgroup_css_links_read(struct seq_file *seq, void *v)
4827
{
4828
	struct cgroup_subsys_state *css = seq_css(seq);
4829
	struct cgrp_cset_link *link;
4830

4831
	down_read(&css_set_rwsem);
4832
	list_for_each_entry(link, &css->cgroup->cset_links, cset_link) {
4833
		struct css_set *cset = link->cset;
4834 4835
		struct task_struct *task;
		int count = 0;
Tejun Heo's avatar
Tejun Heo committed
4836

4837
		seq_printf(seq, "css_set %p\n", cset);
Tejun Heo's avatar
Tejun Heo committed
4838

4839
		list_for_each_entry(task, &cset->tasks, cg_list) {
Tejun Heo's avatar
Tejun Heo committed
4840 4841 4842 4843 4844 4845 4846 4847 4848
			if (count++ > MAX_TASKS_SHOWN_PER_CSS)
				goto overflow;
			seq_printf(seq, "  task %d\n", task_pid_vnr(task));
		}

		list_for_each_entry(task, &cset->mg_tasks, cg_list) {
			if (count++ > MAX_TASKS_SHOWN_PER_CSS)
				goto overflow;
			seq_printf(seq, "  task %d\n", task_pid_vnr(task));
4849
		}
Tejun Heo's avatar
Tejun Heo committed
4850 4851 4852
		continue;
	overflow:
		seq_puts(seq, "  ...\n");
4853
	}
4854
	up_read(&css_set_rwsem);
4855 4856 4857
	return 0;
}

4858
static u64 releasable_read(struct cgroup_subsys_state *css, struct cftype *cft)
4859
{
4860
	return test_bit(CGRP_RELEASABLE, &css->cgroup->flags);
4861 4862 4863 4864 4865 4866 4867 4868 4869 4870 4871 4872 4873 4874 4875 4876 4877 4878
}

static struct cftype debug_files[] =  {
	{
		.name = "taskcount",
		.read_u64 = debug_taskcount_read,
	},

	{
		.name = "current_css_set",
		.read_u64 = current_css_set_read,
	},

	{
		.name = "current_css_set_refcount",
		.read_u64 = current_css_set_refcount_read,
	},

4879 4880
	{
		.name = "current_css_set_cg_links",
4881
		.seq_show = current_css_set_cg_links_read,
4882 4883 4884 4885
	},

	{
		.name = "cgroup_css_links",
4886
		.seq_show = cgroup_css_links_read,
4887 4888
	},

4889 4890 4891 4892 4893
	{
		.name = "releasable",
		.read_u64 = releasable_read,
	},

4894 4895
	{ }	/* terminate */
};
4896

4897
struct cgroup_subsys debug_cgrp_subsys = {
4898 4899
	.css_alloc = debug_css_alloc,
	.css_free = debug_css_free,
4900
	.base_cftypes = debug_files,
4901 4902
};
#endif /* CONFIG_CGROUP_DEBUG */