From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755487Ab0JVIKO (ORCPT ); Fri, 22 Oct 2010 04:10:14 -0400 Received: from cn.fujitsu.com ([222.73.24.84]:54918 "EHLO song.cn.fujitsu.com" rhost-flags-OK-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1751838Ab0JVIKM (ORCPT ); Fri, 22 Oct 2010 04:10:12 -0400 Message-ID: <4CC1471C.9070403@cn.fujitsu.com> Date: Fri, 22 Oct 2010 16:11:08 +0800 From: Li Zefan User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b3pre) Gecko/20090513 Fedora/3.0-2.3.beta2.fc11 Thunderbird/3.0b2 MIME-Version: 1.0 To: "akpm >> Andrew Morton" CC: Paul Menage , Stephane Eranian , LKML , containers@lists.linux-foundation.org, David Miller , serge@hallyn.com, netdev Subject: [PATCH 4/7] cgroups: Mark some subsystems bindable References: <4CC146A4.9090505@cn.fujitsu.com> In-Reply-To: <4CC146A4.9090505@cn.fujitsu.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For those subsystems (debug, cpuacct, net_cls and devices), setting the can_bind flag is sufficient. Signed-off-by: Li Zefan --- kernel/cgroup.c | 1 + kernel/sched.c | 1 + net/sched/cls_cgroup.c | 1 + security/device_cgroup.c | 1 + 4 files changed, 4 insertions(+), 0 deletions(-) diff --git a/kernel/cgroup.c b/kernel/cgroup.c index 9ce3fdb..6364bb5 100644 --- a/kernel/cgroup.c +++ b/kernel/cgroup.c @@ -5124,5 +5124,6 @@ struct cgroup_subsys debug_subsys = { .destroy = debug_destroy, .populate = debug_populate, .subsys_id = debug_subsys_id, + .can_bind = 1, }; #endif /* CONFIG_CGROUP_DEBUG */ diff --git a/kernel/sched.c b/kernel/sched.c index 51944e8..cae104f 100644 --- a/kernel/sched.c +++ b/kernel/sched.c @@ -9329,6 +9329,7 @@ struct cgroup_subsys cpuacct_subsys = { .destroy = cpuacct_destroy, .populate = cpuacct_populate, .subsys_id = cpuacct_subsys_id, + .can_bind = 1, }; #endif /* CONFIG_CGROUP_CPUACCT */ diff --git a/net/sched/cls_cgroup.c b/net/sched/cls_cgroup.c index 37dff78..020ddfe 100644 --- a/net/sched/cls_cgroup.c +++ b/net/sched/cls_cgroup.c @@ -38,6 +38,7 @@ struct cgroup_subsys net_cls_subsys = { #define net_cls_subsys_id net_cls_subsys.subsys_id #endif .module = THIS_MODULE, + .can_bind = 1, }; diff --git a/security/device_cgroup.c b/security/device_cgroup.c index 8d9c48f..b8136fc 100644 --- a/security/device_cgroup.c +++ b/security/device_cgroup.c @@ -473,6 +473,7 @@ struct cgroup_subsys devices_subsys = { .destroy = devcgroup_destroy, .populate = devcgroup_populate, .subsys_id = devices_subsys_id, + .can_bind = 1, }; int devcgroup_inode_permission(struct inode *inode, int mask) -- 1.7.0.1