blob: f8a030ced0c7f39297085eb346a989aff5b5d612 [file] [log] [blame]
Paul Menageddbcc7e2007-10-18 23:39:30 -07001#ifndef _LINUX_CGROUP_H
2#define _LINUX_CGROUP_H
3/*
4 * cgroup interface
5 *
6 * Copyright (C) 2003 BULL SA
7 * Copyright (C) 2004-2006 Silicon Graphics, Inc.
8 *
9 */
10
11#include <linux/sched.h>
Paul Menageddbcc7e2007-10-18 23:39:30 -070012#include <linux/cpumask.h>
13#include <linux/nodemask.h>
14#include <linux/rcupdate.h>
Balbir Singh846c7bb2007-10-18 23:39:44 -070015#include <linux/cgroupstats.h>
Cliff Wickman31a7df02008-02-07 00:14:42 -080016#include <linux/prio_heap.h>
Paul Menagecc31edc2008-10-18 20:28:04 -070017#include <linux/rwsem.h>
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -070018#include <linux/idr.h>
Tejun Heo48ddbe12012-04-01 12:09:56 -070019#include <linux/workqueue.h>
Aristeu Rozanski03b1cde2012-08-23 16:53:30 -040020#include <linux/xattr.h>
Paul Menageddbcc7e2007-10-18 23:39:30 -070021
22#ifdef CONFIG_CGROUPS
23
24struct cgroupfs_root;
25struct cgroup_subsys;
26struct inode;
Paul Menage84eea842008-07-25 01:47:00 -070027struct cgroup;
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -070028struct css_id;
Paul Menageddbcc7e2007-10-18 23:39:30 -070029
30extern int cgroup_init_early(void);
31extern int cgroup_init(void);
Paul Menageddbcc7e2007-10-18 23:39:30 -070032extern void cgroup_lock(void);
Paul E. McKenneyd11c5632010-02-22 17:04:50 -080033extern int cgroup_lock_is_held(void);
Paul Menage84eea842008-07-25 01:47:00 -070034extern bool cgroup_lock_live_group(struct cgroup *cgrp);
Paul Menageddbcc7e2007-10-18 23:39:30 -070035extern void cgroup_unlock(void);
Paul Menageb4f48b62007-10-18 23:39:33 -070036extern void cgroup_fork(struct task_struct *p);
37extern void cgroup_fork_callbacks(struct task_struct *p);
Paul Menage817929e2007-10-18 23:39:36 -070038extern void cgroup_post_fork(struct task_struct *p);
Paul Menageb4f48b62007-10-18 23:39:33 -070039extern void cgroup_exit(struct task_struct *p, int run_callbacks);
Balbir Singh846c7bb2007-10-18 23:39:44 -070040extern int cgroupstats_build(struct cgroupstats *stats,
41 struct dentry *dentry);
Ben Blume6a11052010-03-10 15:22:09 -080042extern int cgroup_load_subsys(struct cgroup_subsys *ss);
Ben Blumcf5d5942010-03-10 15:22:09 -080043extern void cgroup_unload_subsys(struct cgroup_subsys *ss);
Paul Menageddbcc7e2007-10-18 23:39:30 -070044
Alexey Dobriyan828c0952009-10-01 15:43:56 -070045extern const struct file_operations proc_cgroup_operations;
Paul Menagea4243162007-10-18 23:39:35 -070046
Ben Blumaae8aab2010-03-10 15:22:07 -080047/* Define the enumeration of all builtin cgroup subsystems */
Paul Menage817929e2007-10-18 23:39:36 -070048#define SUBSYS(_x) _x ## _subsys_id,
Daniel Wagner8a8e04d2012-09-12 16:12:07 +020049#define IS_SUBSYS_ENABLED(option) IS_ENABLED(option)
Paul Menage817929e2007-10-18 23:39:36 -070050enum cgroup_subsys_id {
51#include <linux/cgroup_subsys.h>
Daniel Wagnera6f00292012-09-12 16:12:08 +020052 CGROUP_SUBSYS_COUNT,
Paul Menage817929e2007-10-18 23:39:36 -070053};
Daniel Wagner5fc0b022012-09-12 16:12:05 +020054#undef IS_SUBSYS_ENABLED
Paul Menage817929e2007-10-18 23:39:36 -070055#undef SUBSYS
56
Paul Menageddbcc7e2007-10-18 23:39:30 -070057/* Per-subsystem/per-cgroup state maintained by the system. */
58struct cgroup_subsys_state {
Paul Menaged20a3902009-04-02 16:57:22 -070059 /*
60 * The cgroup that this subsystem is attached to. Useful
Paul Menageddbcc7e2007-10-18 23:39:30 -070061 * for subsystems that want to know about the cgroup
Paul Menaged20a3902009-04-02 16:57:22 -070062 * hierarchy structure
63 */
Paul Menageddbcc7e2007-10-18 23:39:30 -070064 struct cgroup *cgroup;
65
Paul Menaged20a3902009-04-02 16:57:22 -070066 /*
67 * State maintained by the cgroup system to allow subsystems
Paul Menagee7c5ec92009-01-07 18:08:38 -080068 * to be "busy". Should be accessed via css_get(),
Paul Menaged20a3902009-04-02 16:57:22 -070069 * css_tryget() and and css_put().
70 */
Paul Menageddbcc7e2007-10-18 23:39:30 -070071
72 atomic_t refcnt;
73
74 unsigned long flags;
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -070075 /* ID for this css, if possible */
Arnd Bergmann2c392b82010-02-24 19:41:39 +010076 struct css_id __rcu *id;
Tejun Heo48ddbe12012-04-01 12:09:56 -070077
78 /* Used to put @cgroup->dentry on the last css_put() */
79 struct work_struct dput_work;
Paul Menageddbcc7e2007-10-18 23:39:30 -070080};
81
82/* bits in struct cgroup_subsys_state flags field */
83enum {
84 CSS_ROOT, /* This CSS is the root of the subsystem */
Paul Menagee7c5ec92009-01-07 18:08:38 -080085 CSS_REMOVED, /* This CSS is dead */
Tejun Heo48ddbe12012-04-01 12:09:56 -070086 CSS_CLEAR_CSS_REFS, /* @ss->__DEPRECATED_clear_css_refs */
Paul Menageddbcc7e2007-10-18 23:39:30 -070087};
88
Daisuke Nishimurad7b9fff2010-03-10 15:22:05 -080089/* Caller must verify that the css is not for root cgroup */
90static inline void __css_get(struct cgroup_subsys_state *css, int count)
91{
92 atomic_add(count, &css->refcnt);
93}
94
Paul Menageddbcc7e2007-10-18 23:39:30 -070095/*
Paul Menagee7c5ec92009-01-07 18:08:38 -080096 * Call css_get() to hold a reference on the css; it can be used
97 * for a reference obtained via:
98 * - an existing ref-counted reference to the css
99 * - task->cgroups for a locked task
Paul Menageddbcc7e2007-10-18 23:39:30 -0700100 */
101
102static inline void css_get(struct cgroup_subsys_state *css)
103{
104 /* We don't need to reference count the root state */
105 if (!test_bit(CSS_ROOT, &css->flags))
Daisuke Nishimurad7b9fff2010-03-10 15:22:05 -0800106 __css_get(css, 1);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700107}
Paul Menagee7c5ec92009-01-07 18:08:38 -0800108
109static inline bool css_is_removed(struct cgroup_subsys_state *css)
110{
111 return test_bit(CSS_REMOVED, &css->flags);
112}
113
114/*
115 * Call css_tryget() to take a reference on a css if your existing
116 * (known-valid) reference isn't already ref-counted. Returns false if
117 * the css has been destroyed.
118 */
119
Tejun Heo28b4c272012-04-01 12:09:56 -0700120extern bool __css_tryget(struct cgroup_subsys_state *css);
Paul Menagee7c5ec92009-01-07 18:08:38 -0800121static inline bool css_tryget(struct cgroup_subsys_state *css)
122{
123 if (test_bit(CSS_ROOT, &css->flags))
124 return true;
Tejun Heo28b4c272012-04-01 12:09:56 -0700125 return __css_tryget(css);
Paul Menagee7c5ec92009-01-07 18:08:38 -0800126}
127
Paul Menageddbcc7e2007-10-18 23:39:30 -0700128/*
129 * css_put() should be called to release a reference taken by
Paul Menagee7c5ec92009-01-07 18:08:38 -0800130 * css_get() or css_tryget()
Paul Menageddbcc7e2007-10-18 23:39:30 -0700131 */
132
Tejun Heo28b4c272012-04-01 12:09:56 -0700133extern void __css_put(struct cgroup_subsys_state *css);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700134static inline void css_put(struct cgroup_subsys_state *css)
135{
136 if (!test_bit(CSS_ROOT, &css->flags))
Tejun Heo28b4c272012-04-01 12:09:56 -0700137 __css_put(css);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700138}
139
Paul Menage3116f0e2008-04-29 01:00:04 -0700140/* bits in struct cgroup flags field */
141enum {
142 /* Control Group is dead */
143 CGRP_REMOVED,
Paul Menaged20a3902009-04-02 16:57:22 -0700144 /*
145 * Control Group has previously had a child cgroup or a task,
146 * but no longer (only if CGRP_NOTIFY_ON_RELEASE is set)
147 */
Paul Menage3116f0e2008-04-29 01:00:04 -0700148 CGRP_RELEASABLE,
149 /* Control Group requires release notifications to userspace */
150 CGRP_NOTIFY_ON_RELEASE,
KAMEZAWA Hiroyukiec64f512009-04-02 16:57:26 -0700151 /*
152 * A thread in rmdir() is wating for this cgroup.
153 */
154 CGRP_WAIT_ON_RMDIR,
Daniel Lezcano97978e62010-10-27 15:33:35 -0700155 /*
156 * Clone cgroup values when creating a new child cgroup
157 */
158 CGRP_CLONE_CHILDREN,
Paul Menage3116f0e2008-04-29 01:00:04 -0700159};
160
Paul Menageddbcc7e2007-10-18 23:39:30 -0700161struct cgroup {
162 unsigned long flags; /* "unsigned long" so bitops work */
163
Paul Menaged20a3902009-04-02 16:57:22 -0700164 /*
165 * count users of this cgroup. >0 means busy, but doesn't
166 * necessarily indicate the number of tasks in the cgroup
167 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700168 atomic_t count;
169
170 /*
171 * We link our 'sibling' struct into our parent's 'children'.
172 * Our children link their 'sibling' into our 'children'.
173 */
174 struct list_head sibling; /* my parent's children */
175 struct list_head children; /* my children */
Tejun Heo05ef1d72012-04-01 12:09:56 -0700176 struct list_head files; /* my files */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700177
Paul Menaged20a3902009-04-02 16:57:22 -0700178 struct cgroup *parent; /* my parent */
Arnd Bergmann2c392b82010-02-24 19:41:39 +0100179 struct dentry __rcu *dentry; /* cgroup fs entry, RCU protected */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700180
181 /* Private pointers for each registered subsystem */
182 struct cgroup_subsys_state *subsys[CGROUP_SUBSYS_COUNT];
183
184 struct cgroupfs_root *root;
185 struct cgroup *top_cgroup;
Paul Menage817929e2007-10-18 23:39:36 -0700186
187 /*
188 * List of cg_cgroup_links pointing at css_sets with
189 * tasks in this cgroup. Protected by css_set_lock
190 */
191 struct list_head css_sets;
Paul Menage81a6a5c2007-10-18 23:39:38 -0700192
Tejun Heob0ca5a82012-04-01 12:09:54 -0700193 struct list_head allcg_node; /* cgroupfs_root->allcg_list */
Tejun Heo8e3f6542012-04-01 12:09:55 -0700194 struct list_head cft_q_node; /* used during cftype add/rm */
Tejun Heob0ca5a82012-04-01 12:09:54 -0700195
Paul Menage81a6a5c2007-10-18 23:39:38 -0700196 /*
197 * Linked list running through all cgroups that can
198 * potentially be reaped by the release agent. Protected by
199 * release_list_lock
200 */
201 struct list_head release_list;
Paul Menagecc31edc2008-10-18 20:28:04 -0700202
Ben Blum72a8cb32009-09-23 15:56:27 -0700203 /*
204 * list of pidlists, up to two for each namespace (one for procs, one
205 * for tasks); created on demand.
206 */
207 struct list_head pidlists;
208 struct mutex pidlist_mutex;
Paul Menagea47295e2009-01-07 18:07:44 -0800209
210 /* For RCU-protected deletion */
211 struct rcu_head rcu_head;
Kirill A. Shutemov0dea1162010-03-10 15:22:20 -0800212
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300213 /* List of events which userspace want to receive */
Kirill A. Shutemov0dea1162010-03-10 15:22:20 -0800214 struct list_head event_list;
215 spinlock_t event_list_lock;
Aristeu Rozanski03b1cde2012-08-23 16:53:30 -0400216
217 /* directory xattrs */
218 struct simple_xattrs xattrs;
Paul Menage817929e2007-10-18 23:39:36 -0700219};
220
Paul Menaged20a3902009-04-02 16:57:22 -0700221/*
222 * A css_set is a structure holding pointers to a set of
Paul Menage817929e2007-10-18 23:39:36 -0700223 * cgroup_subsys_state objects. This saves space in the task struct
224 * object and speeds up fork()/exit(), since a single inc/dec and a
Paul Menaged20a3902009-04-02 16:57:22 -0700225 * list_add()/del() can bump the reference count on the entire cgroup
226 * set for a task.
Paul Menage817929e2007-10-18 23:39:36 -0700227 */
228
229struct css_set {
230
231 /* Reference count */
Lai Jiangshan146aa1b2008-10-18 20:28:03 -0700232 atomic_t refcount;
Paul Menage817929e2007-10-18 23:39:36 -0700233
234 /*
Li Zefan472b1052008-04-29 01:00:11 -0700235 * List running through all cgroup groups in the same hash
236 * slot. Protected by css_set_lock
237 */
238 struct hlist_node hlist;
239
240 /*
Paul Menage817929e2007-10-18 23:39:36 -0700241 * List running through all tasks using this cgroup
242 * group. Protected by css_set_lock
243 */
244 struct list_head tasks;
245
246 /*
247 * List of cg_cgroup_link objects on link chains from
248 * cgroups referenced from this css_set. Protected by
249 * css_set_lock
250 */
251 struct list_head cg_links;
252
253 /*
254 * Set of subsystem states, one for each subsystem. This array
255 * is immutable after creation apart from the init_css_set
Ben Blumcf5d5942010-03-10 15:22:09 -0800256 * during subsystem registration (at boot time) and modular subsystem
257 * loading/unloading.
Paul Menage817929e2007-10-18 23:39:36 -0700258 */
259 struct cgroup_subsys_state *subsys[CGROUP_SUBSYS_COUNT];
Ben Blumc3783692009-09-23 15:56:29 -0700260
261 /* For RCU-protected deletion */
262 struct rcu_head rcu_head;
Paul Menageddbcc7e2007-10-18 23:39:30 -0700263};
264
Paul Menage91796562008-04-29 01:00:01 -0700265/*
266 * cgroup_map_cb is an abstract callback API for reporting map-valued
267 * control files
268 */
269
270struct cgroup_map_cb {
271 int (*fill)(struct cgroup_map_cb *cb, const char *key, u64 value);
272 void *state;
273};
274
Paul Menaged20a3902009-04-02 16:57:22 -0700275/*
276 * struct cftype: handler definitions for cgroup control files
Paul Menageddbcc7e2007-10-18 23:39:30 -0700277 *
278 * When reading/writing to a file:
Li Zefana043e3b2008-02-23 15:24:09 -0800279 * - the cgroup to use is file->f_dentry->d_parent->d_fsdata
Paul Menageddbcc7e2007-10-18 23:39:30 -0700280 * - the 'cftype' of the file is file->f_dentry->d_fsdata
281 */
282
Tejun Heo8e3f6542012-04-01 12:09:55 -0700283/* cftype->flags */
284#define CFTYPE_ONLY_ON_ROOT (1U << 0) /* only create on root cg */
285#define CFTYPE_NOT_ON_ROOT (1U << 1) /* don't create onp root cg */
286
287#define MAX_CFTYPE_NAME 64
288
Paul Menageddbcc7e2007-10-18 23:39:30 -0700289struct cftype {
Paul Menaged20a3902009-04-02 16:57:22 -0700290 /*
291 * By convention, the name should begin with the name of the
Tejun Heo8e3f6542012-04-01 12:09:55 -0700292 * subsystem, followed by a period. Zero length string indicates
293 * end of cftype array.
Paul Menaged20a3902009-04-02 16:57:22 -0700294 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700295 char name[MAX_CFTYPE_NAME];
296 int private;
Li Zefan099fca32009-04-02 16:57:29 -0700297 /*
298 * If not 0, file mode is set to this value, otherwise it will
299 * be figured out automatically
300 */
Al Viroa5e7ed32011-07-26 01:55:55 -0400301 umode_t mode;
Paul Menagedb3b1492008-07-25 01:46:58 -0700302
303 /*
304 * If non-zero, defines the maximum length of string that can
305 * be passed to write_string; defaults to 64
306 */
307 size_t max_write_len;
308
Tejun Heo8e3f6542012-04-01 12:09:55 -0700309 /* CFTYPE_* flags */
310 unsigned int flags;
311
Aristeu Rozanski03b1cde2012-08-23 16:53:30 -0400312 /* file xattrs */
313 struct simple_xattrs xattrs;
314
Paul Menagece16b492008-07-25 01:46:57 -0700315 int (*open)(struct inode *inode, struct file *file);
316 ssize_t (*read)(struct cgroup *cgrp, struct cftype *cft,
317 struct file *file,
318 char __user *buf, size_t nbytes, loff_t *ppos);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700319 /*
Paul Menagef4c753b2008-04-29 00:59:56 -0700320 * read_u64() is a shortcut for the common case of returning a
Paul Menageddbcc7e2007-10-18 23:39:30 -0700321 * single integer. Use it in place of read()
322 */
Paul Menagece16b492008-07-25 01:46:57 -0700323 u64 (*read_u64)(struct cgroup *cgrp, struct cftype *cft);
Paul Menage91796562008-04-29 01:00:01 -0700324 /*
Paul Menagee73d2c62008-04-29 01:00:06 -0700325 * read_s64() is a signed version of read_u64()
326 */
Paul Menagece16b492008-07-25 01:46:57 -0700327 s64 (*read_s64)(struct cgroup *cgrp, struct cftype *cft);
Paul Menagee73d2c62008-04-29 01:00:06 -0700328 /*
Paul Menage91796562008-04-29 01:00:01 -0700329 * read_map() is used for defining a map of key/value
330 * pairs. It should call cb->fill(cb, key, value) for each
331 * entry. The key/value pairs (and their ordering) should not
332 * change between reboots.
333 */
Paul Menagece16b492008-07-25 01:46:57 -0700334 int (*read_map)(struct cgroup *cont, struct cftype *cft,
335 struct cgroup_map_cb *cb);
Serge E. Hallyn29486df2008-04-29 01:00:14 -0700336 /*
337 * read_seq_string() is used for outputting a simple sequence
338 * using seqfile.
339 */
Paul Menagece16b492008-07-25 01:46:57 -0700340 int (*read_seq_string)(struct cgroup *cont, struct cftype *cft,
341 struct seq_file *m);
Paul Menage91796562008-04-29 01:00:01 -0700342
Paul Menagece16b492008-07-25 01:46:57 -0700343 ssize_t (*write)(struct cgroup *cgrp, struct cftype *cft,
344 struct file *file,
345 const char __user *buf, size_t nbytes, loff_t *ppos);
Paul Menage355e0c42007-10-18 23:39:33 -0700346
347 /*
Paul Menagef4c753b2008-04-29 00:59:56 -0700348 * write_u64() is a shortcut for the common case of accepting
Paul Menage355e0c42007-10-18 23:39:33 -0700349 * a single integer (as parsed by simple_strtoull) from
350 * userspace. Use in place of write(); return 0 or error.
351 */
Paul Menagece16b492008-07-25 01:46:57 -0700352 int (*write_u64)(struct cgroup *cgrp, struct cftype *cft, u64 val);
Paul Menagee73d2c62008-04-29 01:00:06 -0700353 /*
354 * write_s64() is a signed version of write_u64()
355 */
Paul Menagece16b492008-07-25 01:46:57 -0700356 int (*write_s64)(struct cgroup *cgrp, struct cftype *cft, s64 val);
Paul Menage355e0c42007-10-18 23:39:33 -0700357
Pavel Emelyanovd447ea22008-04-29 01:00:08 -0700358 /*
Paul Menagedb3b1492008-07-25 01:46:58 -0700359 * write_string() is passed a nul-terminated kernelspace
360 * buffer of maximum length determined by max_write_len.
361 * Returns 0 or -ve error code.
362 */
363 int (*write_string)(struct cgroup *cgrp, struct cftype *cft,
364 const char *buffer);
365 /*
Pavel Emelyanovd447ea22008-04-29 01:00:08 -0700366 * trigger() callback can be used to get some kick from the
367 * userspace, when the actual string written is not important
368 * at all. The private field can be used to determine the
369 * kick type for multiplexing.
370 */
371 int (*trigger)(struct cgroup *cgrp, unsigned int event);
372
Paul Menagece16b492008-07-25 01:46:57 -0700373 int (*release)(struct inode *inode, struct file *file);
Kirill A. Shutemov0dea1162010-03-10 15:22:20 -0800374
375 /*
376 * register_event() callback will be used to add new userspace
377 * waiter for changes related to the cftype. Implement it if
378 * you want to provide this functionality. Use eventfd_signal()
379 * on eventfd to send notification to userspace.
380 */
381 int (*register_event)(struct cgroup *cgrp, struct cftype *cft,
382 struct eventfd_ctx *eventfd, const char *args);
383 /*
384 * unregister_event() callback will be called when userspace
385 * closes the eventfd or on cgroup removing.
386 * This callback must be implemented, if you want provide
387 * notification functionality.
Kirill A. Shutemov0dea1162010-03-10 15:22:20 -0800388 */
Kirill A. Shutemov907860e2010-05-26 14:42:46 -0700389 void (*unregister_event)(struct cgroup *cgrp, struct cftype *cft,
Kirill A. Shutemov0dea1162010-03-10 15:22:20 -0800390 struct eventfd_ctx *eventfd);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700391};
392
Tejun Heo8e3f6542012-04-01 12:09:55 -0700393/*
394 * cftype_sets describe cftypes belonging to a subsystem and are chained at
395 * cgroup_subsys->cftsets. Each cftset points to an array of cftypes
396 * terminated by zero length name.
397 */
398struct cftype_set {
399 struct list_head node; /* chained at subsys->cftsets */
Aristeu Rozanski03b1cde2012-08-23 16:53:30 -0400400 struct cftype *cfts;
Tejun Heo8e3f6542012-04-01 12:09:55 -0700401};
402
Cliff Wickman31a7df02008-02-07 00:14:42 -0800403struct cgroup_scanner {
404 struct cgroup *cg;
405 int (*test_task)(struct task_struct *p, struct cgroup_scanner *scan);
406 void (*process_task)(struct task_struct *p,
407 struct cgroup_scanner *scan);
408 struct ptr_heap *heap;
Li Zefanbd1a8ab2009-04-02 16:57:50 -0700409 void *data;
Cliff Wickman31a7df02008-02-07 00:14:42 -0800410};
411
Aristeu Rozanski03b1cde2012-08-23 16:53:30 -0400412int cgroup_add_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
413int cgroup_rm_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
Tejun Heo8e3f6542012-04-01 12:09:55 -0700414
Li Zefanffd2d882008-02-23 15:24:09 -0800415int cgroup_is_removed(const struct cgroup *cgrp);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700416
Li Zefanffd2d882008-02-23 15:24:09 -0800417int cgroup_path(const struct cgroup *cgrp, char *buf, int buflen);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700418
Li Zefanffd2d882008-02-23 15:24:09 -0800419int cgroup_task_count(const struct cgroup *cgrp);
Paul Menagebbcb81d2007-10-18 23:39:32 -0700420
Grzegorz Nosek313e9242009-04-02 16:57:23 -0700421/* Return true if cgrp is a descendant of the task's cgroup */
422int cgroup_is_descendant(const struct cgroup *cgrp, struct task_struct *task);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700423
Thadeu Lima de Souza Cascardo21acb9c2009-02-04 10:12:08 +0100424/*
KAMEZAWA Hiroyuki88703262009-07-29 15:04:06 -0700425 * When the subsys has to access css and may add permanent refcnt to css,
426 * it should take care of racy conditions with rmdir(). Following set of
427 * functions, is for stop/restart rmdir if necessary.
428 * Because these will call css_get/put, "css" should be alive css.
429 *
430 * cgroup_exclude_rmdir();
431 * ...do some jobs which may access arbitrary empty cgroup
432 * cgroup_release_and_wakeup_rmdir();
433 *
434 * When someone removes a cgroup while cgroup_exclude_rmdir() holds it,
435 * it sleeps and cgroup_release_and_wakeup_rmdir() will wake him up.
436 */
437
438void cgroup_exclude_rmdir(struct cgroup_subsys_state *css);
439void cgroup_release_and_wakeup_rmdir(struct cgroup_subsys_state *css);
440
441/*
Tejun Heo2f7ee562011-12-12 18:12:21 -0800442 * Control Group taskset, used to pass around set of tasks to cgroup_subsys
443 * methods.
444 */
445struct cgroup_taskset;
446struct task_struct *cgroup_taskset_first(struct cgroup_taskset *tset);
447struct task_struct *cgroup_taskset_next(struct cgroup_taskset *tset);
448struct cgroup *cgroup_taskset_cur_cgroup(struct cgroup_taskset *tset);
449int cgroup_taskset_size(struct cgroup_taskset *tset);
450
451/**
452 * cgroup_taskset_for_each - iterate cgroup_taskset
453 * @task: the loop cursor
454 * @skip_cgrp: skip if task's cgroup matches this, %NULL to iterate through all
455 * @tset: taskset to iterate
456 */
457#define cgroup_taskset_for_each(task, skip_cgrp, tset) \
458 for ((task) = cgroup_taskset_first((tset)); (task); \
459 (task) = cgroup_taskset_next((tset))) \
460 if (!(skip_cgrp) || \
461 cgroup_taskset_cur_cgroup((tset)) != (skip_cgrp))
462
463/*
Thadeu Lima de Souza Cascardo21acb9c2009-02-04 10:12:08 +0100464 * Control Group subsystem type.
465 * See Documentation/cgroups/cgroups.txt for details
466 */
Paul Menageddbcc7e2007-10-18 23:39:30 -0700467
468struct cgroup_subsys {
Li Zefan761b3ef2012-01-31 13:47:36 +0800469 struct cgroup_subsys_state *(*create)(struct cgroup *cgrp);
470 int (*pre_destroy)(struct cgroup *cgrp);
471 void (*destroy)(struct cgroup *cgrp);
472 int (*can_attach)(struct cgroup *cgrp, struct cgroup_taskset *tset);
473 void (*cancel_attach)(struct cgroup *cgrp, struct cgroup_taskset *tset);
474 void (*attach)(struct cgroup *cgrp, struct cgroup_taskset *tset);
475 void (*fork)(struct task_struct *task);
476 void (*exit)(struct cgroup *cgrp, struct cgroup *old_cgrp,
477 struct task_struct *task);
Li Zefan761b3ef2012-01-31 13:47:36 +0800478 void (*post_clone)(struct cgroup *cgrp);
479 void (*bind)(struct cgroup *root);
Hugh Dickinse5991372009-01-06 14:39:22 -0800480
Paul Menageddbcc7e2007-10-18 23:39:30 -0700481 int subsys_id;
482 int active;
Paul Menage8bab8dd2008-04-04 14:29:57 -0700483 int disabled;
Paul Menageddbcc7e2007-10-18 23:39:30 -0700484 int early_init;
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700485 /*
486 * True if this subsys uses ID. ID is not available before cgroup_init()
487 * (not available in early_init time.)
488 */
489 bool use_id;
Tejun Heo48ddbe12012-04-01 12:09:56 -0700490
491 /*
492 * If %true, cgroup removal will try to clear css refs by retrying
493 * ss->pre_destroy() until there's no css ref left. This behavior
494 * is strictly for backward compatibility and will be removed as
495 * soon as the current user (memcg) is updated.
496 *
497 * If %false, ss->pre_destroy() can't fail and cgroup removal won't
498 * wait for css refs to drop to zero before proceeding.
499 */
500 bool __DEPRECATED_clear_css_refs;
501
Tejun Heo8c7f6ed2012-09-13 12:20:58 -0700502 /*
503 * If %false, this subsystem is properly hierarchical -
504 * configuration, resource accounting and restriction on a parent
505 * cgroup cover those of its children. If %true, hierarchy support
506 * is broken in some ways - some subsystems ignore hierarchy
507 * completely while others are only implemented half-way.
508 *
509 * It's now disallowed to create nested cgroups if the subsystem is
510 * broken and cgroup core will emit a warning message on such
511 * cases. Eventually, all subsystems will be made properly
512 * hierarchical and this will go away.
513 */
514 bool broken_hierarchy;
515 bool warned_broken_hierarchy;
516
Paul Menageddbcc7e2007-10-18 23:39:30 -0700517#define MAX_CGROUP_TYPE_NAMELEN 32
518 const char *name;
519
Paul Menage999cd8a2009-01-07 18:08:36 -0800520 /*
Paul Menage999cd8a2009-01-07 18:08:36 -0800521 * Link to parent, and list entry in parent's children.
Li Zefan6be96a52012-06-06 19:12:30 -0700522 * Protected by cgroup_lock()
Paul Menage999cd8a2009-01-07 18:08:36 -0800523 */
524 struct cgroupfs_root *root;
Paul Menageddbcc7e2007-10-18 23:39:30 -0700525 struct list_head sibling;
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700526 /* used when use_id == true */
527 struct idr idr;
Hugh Dickins42aee6c2012-03-21 16:34:21 -0700528 spinlock_t id_lock;
Ben Blume6a11052010-03-10 15:22:09 -0800529
Tejun Heo8e3f6542012-04-01 12:09:55 -0700530 /* list of cftype_sets */
531 struct list_head cftsets;
532
533 /* base cftypes, automatically [de]registered with subsys itself */
534 struct cftype *base_cftypes;
535 struct cftype_set base_cftset;
536
Ben Blume6a11052010-03-10 15:22:09 -0800537 /* should be defined only by modular subsystems */
538 struct module *module;
Paul Menageddbcc7e2007-10-18 23:39:30 -0700539};
540
541#define SUBSYS(_x) extern struct cgroup_subsys _x ## _subsys;
Daniel Wagner5fc0b022012-09-12 16:12:05 +0200542#define IS_SUBSYS_ENABLED(option) IS_BUILTIN(option)
Paul Menageddbcc7e2007-10-18 23:39:30 -0700543#include <linux/cgroup_subsys.h>
Daniel Wagner5fc0b022012-09-12 16:12:05 +0200544#undef IS_SUBSYS_ENABLED
Paul Menageddbcc7e2007-10-18 23:39:30 -0700545#undef SUBSYS
546
547static inline struct cgroup_subsys_state *cgroup_subsys_state(
Li Zefanffd2d882008-02-23 15:24:09 -0800548 struct cgroup *cgrp, int subsys_id)
Paul Menageddbcc7e2007-10-18 23:39:30 -0700549{
Li Zefanffd2d882008-02-23 15:24:09 -0800550 return cgrp->subsys[subsys_id];
Paul Menageddbcc7e2007-10-18 23:39:30 -0700551}
552
Peter Zijlstradc61b1d2010-06-08 11:40:42 +0200553/*
554 * function to get the cgroup_subsys_state which allows for extra
555 * rcu_dereference_check() conditions, such as locks used during the
556 * cgroup_subsys::attach() methods.
557 */
558#define task_subsys_state_check(task, subsys_id, __c) \
559 rcu_dereference_check(task->cgroups->subsys[subsys_id], \
Peter Zijlstradc61b1d2010-06-08 11:40:42 +0200560 lockdep_is_held(&task->alloc_lock) || \
561 cgroup_lock_is_held() || (__c))
562
563static inline struct cgroup_subsys_state *
564task_subsys_state(struct task_struct *task, int subsys_id)
Paul Menageddbcc7e2007-10-18 23:39:30 -0700565{
Peter Zijlstradc61b1d2010-06-08 11:40:42 +0200566 return task_subsys_state_check(task, subsys_id, false);
Paul Menageddbcc7e2007-10-18 23:39:30 -0700567}
568
569static inline struct cgroup* task_cgroup(struct task_struct *task,
570 int subsys_id)
571{
572 return task_subsys_state(task, subsys_id)->cgroup;
573}
574
Paul Menage817929e2007-10-18 23:39:36 -0700575/* A cgroup_iter should be treated as an opaque object */
576struct cgroup_iter {
577 struct list_head *cg_link;
578 struct list_head *task;
579};
580
Paul Menaged20a3902009-04-02 16:57:22 -0700581/*
582 * To iterate across the tasks in a cgroup:
Paul Menage817929e2007-10-18 23:39:36 -0700583 *
Uwe Kleine-Königb5950762010-11-01 15:38:34 -0400584 * 1) call cgroup_iter_start to initialize an iterator
Paul Menage817929e2007-10-18 23:39:36 -0700585 *
586 * 2) call cgroup_iter_next() to retrieve member tasks until it
587 * returns NULL or until you want to end the iteration
588 *
589 * 3) call cgroup_iter_end() to destroy the iterator.
Cliff Wickman31a7df02008-02-07 00:14:42 -0800590 *
Paul Menaged20a3902009-04-02 16:57:22 -0700591 * Or, call cgroup_scan_tasks() to iterate through every task in a
592 * cgroup - cgroup_scan_tasks() holds the css_set_lock when calling
593 * the test_task() callback, but not while calling the process_task()
594 * callback.
Paul Menage817929e2007-10-18 23:39:36 -0700595 */
Li Zefanffd2d882008-02-23 15:24:09 -0800596void cgroup_iter_start(struct cgroup *cgrp, struct cgroup_iter *it);
597struct task_struct *cgroup_iter_next(struct cgroup *cgrp,
Paul Menage817929e2007-10-18 23:39:36 -0700598 struct cgroup_iter *it);
Li Zefanffd2d882008-02-23 15:24:09 -0800599void cgroup_iter_end(struct cgroup *cgrp, struct cgroup_iter *it);
Cliff Wickman31a7df02008-02-07 00:14:42 -0800600int cgroup_scan_tasks(struct cgroup_scanner *scan);
Cliff Wickman956db3c2008-02-07 00:14:43 -0800601int cgroup_attach_task(struct cgroup *, struct task_struct *);
Michael S. Tsirkin31583bb2010-09-09 16:37:37 -0700602int cgroup_attach_task_all(struct task_struct *from, struct task_struct *);
603
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700604/*
605 * CSS ID is ID for cgroup_subsys_state structs under subsys. This only works
606 * if cgroup_subsys.use_id == true. It can be used for looking up and scanning.
607 * CSS ID is assigned at cgroup allocation (create) automatically
608 * and removed when subsys calls free_css_id() function. This is because
609 * the lifetime of cgroup_subsys_state is subsys's matter.
610 *
611 * Looking up and scanning function should be called under rcu_read_lock().
Li Zefan6be96a52012-06-06 19:12:30 -0700612 * Taking cgroup_mutex is not necessary for following calls.
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700613 * But the css returned by this routine can be "not populated yet" or "being
614 * destroyed". The caller should check css and cgroup's status.
615 */
616
617/*
618 * Typically Called at ->destroy(), or somewhere the subsys frees
619 * cgroup_subsys_state.
620 */
621void free_css_id(struct cgroup_subsys *ss, struct cgroup_subsys_state *css);
622
623/* Find a cgroup_subsys_state which has given ID */
624
625struct cgroup_subsys_state *css_lookup(struct cgroup_subsys *ss, int id);
626
627/*
628 * Get a cgroup whose id is greater than or equal to id under tree of root.
629 * Returning a cgroup_subsys_state or NULL.
630 */
631struct cgroup_subsys_state *css_get_next(struct cgroup_subsys *ss, int id,
632 struct cgroup_subsys_state *root, int *foundid);
633
634/* Returns true if root is ancestor of cg */
635bool css_is_ancestor(struct cgroup_subsys_state *cg,
KAMEZAWA Hiroyuki0b7f5692009-04-02 16:57:38 -0700636 const struct cgroup_subsys_state *root);
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700637
638/* Get id and depth of css */
639unsigned short css_id(struct cgroup_subsys_state *css);
640unsigned short css_depth(struct cgroup_subsys_state *css);
Stephane Eraniane5d13672011-02-14 11:20:01 +0200641struct cgroup_subsys_state *cgroup_css_from_dir(struct file *f, int id);
KAMEZAWA Hiroyuki38460b42009-04-02 16:57:25 -0700642
Paul Menageddbcc7e2007-10-18 23:39:30 -0700643#else /* !CONFIG_CGROUPS */
644
645static inline int cgroup_init_early(void) { return 0; }
646static inline int cgroup_init(void) { return 0; }
Paul Menageb4f48b62007-10-18 23:39:33 -0700647static inline void cgroup_fork(struct task_struct *p) {}
648static inline void cgroup_fork_callbacks(struct task_struct *p) {}
Paul Menage817929e2007-10-18 23:39:36 -0700649static inline void cgroup_post_fork(struct task_struct *p) {}
Paul Menageb4f48b62007-10-18 23:39:33 -0700650static inline void cgroup_exit(struct task_struct *p, int callbacks) {}
Paul Menageddbcc7e2007-10-18 23:39:30 -0700651
652static inline void cgroup_lock(void) {}
653static inline void cgroup_unlock(void) {}
Balbir Singh846c7bb2007-10-18 23:39:44 -0700654static inline int cgroupstats_build(struct cgroupstats *stats,
655 struct dentry *dentry)
656{
657 return -EINVAL;
658}
Paul Menageddbcc7e2007-10-18 23:39:30 -0700659
Sridhar Samudralad7926ee2010-05-30 22:24:39 +0200660/* No cgroups - nothing to do */
Michael S. Tsirkin31583bb2010-09-09 16:37:37 -0700661static inline int cgroup_attach_task_all(struct task_struct *from,
662 struct task_struct *t)
663{
664 return 0;
665}
Sridhar Samudralad7926ee2010-05-30 22:24:39 +0200666
Paul Menageddbcc7e2007-10-18 23:39:30 -0700667#endif /* !CONFIG_CGROUPS */
668
Paul Menageddbcc7e2007-10-18 23:39:30 -0700669#endif /* _LINUX_CGROUP_H */