(This patch series is a revision of http://lkml.org/lkml/2009/7/23/330 .) The following series adds a "cgroup.procs" file to each cgroup that reports unique tgids rather than pids, which can also be written to for moving all threads in a threadgroup at once. Patch #5 modifies the subsystem attach interface to be able to attach whole threadgroups at a time, which could introduce potential problems if any subsystem were to need the old cgroup of every thread being moved. Patch #6 introduces a new rwsem (per threadgroup) that's taken for reading in the fork() path, and reveals potential for a race when forking before a subsystem's attach() function is called - one potential solution in case any subsystem has this problem is to hang on to the group's fork mutex through the attach() calls. This patch series was written at the same time as Li Zefan's pid namespace bugfix patch (from http://lkml.org/lkml/2009/7/1/559 ), and contains a similar but finer-grained fix for the same bug. These patches can either be rewritten to be applied on top of Li's patch, or be applied as they are with Li's patch reversed. --- Ben Blum (6): Makes procs file writable to move all threads by tgid at once Lets ss->can_attach and ss->attach do whole threadgroups at a time Changes css_set freeing mechanism to be under RCU Quick vmalloc vs kmalloc fix to the case where array size is too large Ensures correct concurrent opening/reading of pidlists across pid namespaces Adds a read-only "procs" file similar to "tasks" that shows only unique tgids Documentation/cgroups/cgroups.txt | 12 + include/linux/cgroup.h | 68 ++- include/linux/init_task.h | 9 include/linux/sched.h | 2 kernel/cgroup.c | 810 ++++++++++++++++++++++++++++++------- kernel/cgroup_freezer.c | 15 + kernel/cpuset.c | 65 ++- kernel/fork.c | 6 kernel/ns_cgroup.c | 16 + kernel/sched.c | 37 ++ mm/memcontrol.c | 3 security/device_cgroup.c | 3 12 files changed, 855 insertions(+), 191 deletions(-) _______________________________________________ Containers mailing list Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linux-foundation.org/mailman/listinfo/containers