mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-03-30 19:15:14 +00:00
cgroups: add cgroup support for enabling controllers at boot time
The effects of cgroup_disable=foo are: - foo isn't auto-mounted if you mount all cgroups in a single hierarchy - foo isn't visible as an individually mountable subsystem As a result there will only ever be one call to foo->create(), at init time; all processes will stay in this group, and the group will never be mounted on a visible hierarchy. Any additional effects (e.g. not allocating metadata) are up to the foo subsystem. This doesn't handle early_init subsystems (their "disabled" bit isn't set be, but it could easily be extended to do so if any of the early_init systems wanted it - I think it would just involve some nastier parameter processing since it would occur before the command-line argument parser had been run. Hugh said: Ballpark figures, I'm trying to get this question out rather than processing the exact numbers: CONFIG_CGROUP_MEM_RES_CTLR adds 15% overhead to the affected paths, booting with cgroup_disable=memory cuts that back to 1% overhead (due to slightly bigger struct page). I'm no expert on distros, they may have no interest whatever in CONFIG_CGROUP_MEM_RES_CTLR=y; and the rest of us can easily build with or without it, or apply the cgroup_disable=memory patches. Unix bench's execl test result on x86_64 was == just after boot without mounting any cgroup fs.== mem_cgorup=off : Execl Throughput 43.0 3150.1 732.6 mem_cgroup=on : Execl Throughput 43.0 2932.6 682.0 == [lizf@cn.fujitsu.com: fix boot option parsing] Signed-off-by: Balbir Singh <balbir@linux.vnet.ibm.com> Cc: Paul Menage <menage@google.com> Cc: Balbir Singh <balbir@linux.vnet.ibm.com> Cc: Pavel Emelyanov <xemul@openvz.org> Cc: KAMEZAWA Hiroyuki <kamezawa.hiroyu@jp.fujitsu.com> Cc: Hugh Dickins <hugh@veritas.com> Cc: Sudhir Kumar <skumar@linux.vnet.ibm.com> Cc: YAMAMOTO Takashi <yamamoto@valinux.co.jp> Cc: David Rientjes <rientjes@google.com> Signed-off-by: Li Zefan <lizf@cn.fujitsu.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
parent
3a143125dd
commit
8bab8dded6
3 changed files with 42 additions and 5 deletions
|
@ -375,6 +375,10 @@ and is between 256 and 4096 characters. It is defined in the file
|
||||||
ccw_timeout_log [S390]
|
ccw_timeout_log [S390]
|
||||||
See Documentation/s390/CommonIO for details.
|
See Documentation/s390/CommonIO for details.
|
||||||
|
|
||||||
|
cgroup_disable= [KNL] Disable a particular controller
|
||||||
|
Format: {name of the controller(s) to disable}
|
||||||
|
{Currently supported controllers - "memory"}
|
||||||
|
|
||||||
checkreqprot [SELINUX] Set initial checkreqprot flag value.
|
checkreqprot [SELINUX] Set initial checkreqprot flag value.
|
||||||
Format: { "0" | "1" }
|
Format: { "0" | "1" }
|
||||||
See security/selinux/Kconfig help text.
|
See security/selinux/Kconfig help text.
|
||||||
|
|
|
@ -256,6 +256,7 @@ struct cgroup_subsys {
|
||||||
void (*bind)(struct cgroup_subsys *ss, struct cgroup *root);
|
void (*bind)(struct cgroup_subsys *ss, struct cgroup *root);
|
||||||
int subsys_id;
|
int subsys_id;
|
||||||
int active;
|
int active;
|
||||||
|
int disabled;
|
||||||
int early_init;
|
int early_init;
|
||||||
#define MAX_CGROUP_TYPE_NAMELEN 32
|
#define MAX_CGROUP_TYPE_NAMELEN 32
|
||||||
const char *name;
|
const char *name;
|
||||||
|
|
|
@ -782,7 +782,14 @@ static int parse_cgroupfs_options(char *data,
|
||||||
if (!*token)
|
if (!*token)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
if (!strcmp(token, "all")) {
|
if (!strcmp(token, "all")) {
|
||||||
opts->subsys_bits = (1 << CGROUP_SUBSYS_COUNT) - 1;
|
/* Add all non-disabled subsystems */
|
||||||
|
int i;
|
||||||
|
opts->subsys_bits = 0;
|
||||||
|
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
||||||
|
struct cgroup_subsys *ss = subsys[i];
|
||||||
|
if (!ss->disabled)
|
||||||
|
opts->subsys_bits |= 1ul << i;
|
||||||
|
}
|
||||||
} else if (!strcmp(token, "noprefix")) {
|
} else if (!strcmp(token, "noprefix")) {
|
||||||
set_bit(ROOT_NOPREFIX, &opts->flags);
|
set_bit(ROOT_NOPREFIX, &opts->flags);
|
||||||
} else if (!strncmp(token, "release_agent=", 14)) {
|
} else if (!strncmp(token, "release_agent=", 14)) {
|
||||||
|
@ -800,7 +807,8 @@ static int parse_cgroupfs_options(char *data,
|
||||||
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
||||||
ss = subsys[i];
|
ss = subsys[i];
|
||||||
if (!strcmp(token, ss->name)) {
|
if (!strcmp(token, ss->name)) {
|
||||||
set_bit(i, &opts->subsys_bits);
|
if (!ss->disabled)
|
||||||
|
set_bit(i, &opts->subsys_bits);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -2600,13 +2608,13 @@ static int proc_cgroupstats_show(struct seq_file *m, void *v)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
seq_puts(m, "#subsys_name\thierarchy\tnum_cgroups\n");
|
seq_puts(m, "#subsys_name\thierarchy\tnum_cgroups\tenabled\n");
|
||||||
mutex_lock(&cgroup_mutex);
|
mutex_lock(&cgroup_mutex);
|
||||||
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
||||||
struct cgroup_subsys *ss = subsys[i];
|
struct cgroup_subsys *ss = subsys[i];
|
||||||
seq_printf(m, "%s\t%lu\t%d\n",
|
seq_printf(m, "%s\t%lu\t%d\t%d\n",
|
||||||
ss->name, ss->root->subsys_bits,
|
ss->name, ss->root->subsys_bits,
|
||||||
ss->root->number_of_cgroups);
|
ss->root->number_of_cgroups, !ss->disabled);
|
||||||
}
|
}
|
||||||
mutex_unlock(&cgroup_mutex);
|
mutex_unlock(&cgroup_mutex);
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -3010,3 +3018,27 @@ static void cgroup_release_agent(struct work_struct *work)
|
||||||
spin_unlock(&release_list_lock);
|
spin_unlock(&release_list_lock);
|
||||||
mutex_unlock(&cgroup_mutex);
|
mutex_unlock(&cgroup_mutex);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int __init cgroup_disable(char *str)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
char *token;
|
||||||
|
|
||||||
|
while ((token = strsep(&str, ",")) != NULL) {
|
||||||
|
if (!*token)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
for (i = 0; i < CGROUP_SUBSYS_COUNT; i++) {
|
||||||
|
struct cgroup_subsys *ss = subsys[i];
|
||||||
|
|
||||||
|
if (!strcmp(token, ss->name)) {
|
||||||
|
ss->disabled = 1;
|
||||||
|
printk(KERN_INFO "Disabling %s control group"
|
||||||
|
" subsystem\n", ss->name);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
__setup("cgroup_disable=", cgroup_disable);
|
||||||
|
|
Loading…
Add table
Reference in a new issue