From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753054AbbKYWBy (ORCPT ); Wed, 25 Nov 2015 17:01:54 -0500 Received: from mx1.redhat.com ([209.132.183.28]:48399 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752458AbbKYWBu (ORCPT ); Wed, 25 Nov 2015 17:01:50 -0500 Date: Wed, 25 Nov 2015 20:01:17 -0200 From: Marcelo Tosatti To: linux-kernel@vger.kernel.org, Tejun Heo , Luiz Capitulino Cc: Chao Peng , Vikas Shivappa Subject: [PATCH] cgroups: move cpuset specific checks from generic code to cpuset_can_attach Message-ID: <20151125220117.GA990@amt.cnet> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Move PF_NO_SETAFFINITY check to cpuset cgroups, where it belongs. This makes it possible to attach PF_NO_SETAFFINITY to Intel CAT cgroups. Reported-by: Luiz Capitulino Signed-off-by: Marcelo Tosatti diff --git a/kernel/cgroup.c b/kernel/cgroup.c index f89d929..0603652 100644 --- a/kernel/cgroup.c +++ b/kernel/cgroup.c @@ -2466,16 +2466,6 @@ static ssize_t __cgroup_procs_write(struct kernfs_open_file *of, char *buf, if (threadgroup) tsk = tsk->group_leader; - /* - * Workqueue threads may acquire PF_NO_SETAFFINITY and become - * trapped in a cpuset, or RT worker may be born in a cgroup - * with no rt_runtime allocated. Just say no. - */ - if (tsk == kthreadd_task || (tsk->flags & PF_NO_SETAFFINITY)) { - ret = -EINVAL; - goto out_unlock_rcu; - } - get_task_struct(tsk); rcu_read_unlock(); diff --git a/kernel/cpuset.c b/kernel/cpuset.c index f0acff0..9fff4d6 100644 --- a/kernel/cpuset.c +++ b/kernel/cpuset.c @@ -53,6 +53,7 @@ #include #include #include +#include #include #include @@ -1445,6 +1446,17 @@ static int cpuset_can_attach(struct cgroup_subsys_state *css, goto out_unlock; cgroup_taskset_for_each(task, tset) { + /* + * Workqueue threads may acquire PF_NO_SETAFFINITY and become + * trapped in a cpuset, or RT worker may be born in a cgroup + * with no rt_runtime allocated. Just say no. + */ + if (task == kthreadd_task || + (task->flags & PF_NO_SETAFFINITY)) { + ret = -EINVAL; + goto out_unlock; + } + ret = task_can_attach(task, cs->cpus_allowed); if (ret) goto out_unlock;