| #include <net/tcp.h> | 
 | #include <net/tcp_memcontrol.h> | 
 | #include <net/sock.h> | 
 | #include <net/ip.h> | 
 | #include <linux/nsproxy.h> | 
 | #include <linux/memcontrol.h> | 
 | #include <linux/module.h> | 
 |  | 
 | int tcp_init_cgroup(struct mem_cgroup *memcg, struct cgroup_subsys *ss) | 
 | { | 
 | 	/* | 
 | 	 * The root cgroup does not use res_counters, but rather, | 
 | 	 * rely on the data already collected by the network | 
 | 	 * subsystem | 
 | 	 */ | 
 | 	struct res_counter *res_parent = NULL; | 
 | 	struct cg_proto *cg_proto, *parent_cg; | 
 | 	struct mem_cgroup *parent = parent_mem_cgroup(memcg); | 
 |  | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return 0; | 
 |  | 
 | 	cg_proto->sysctl_mem[0] = sysctl_tcp_mem[0]; | 
 | 	cg_proto->sysctl_mem[1] = sysctl_tcp_mem[1]; | 
 | 	cg_proto->sysctl_mem[2] = sysctl_tcp_mem[2]; | 
 | 	cg_proto->memory_pressure = 0; | 
 | 	cg_proto->memcg = memcg; | 
 |  | 
 | 	parent_cg = tcp_prot.proto_cgroup(parent); | 
 | 	if (parent_cg) | 
 | 		res_parent = &parent_cg->memory_allocated; | 
 |  | 
 | 	res_counter_init(&cg_proto->memory_allocated, res_parent); | 
 | 	percpu_counter_init(&cg_proto->sockets_allocated, 0); | 
 |  | 
 | 	return 0; | 
 | } | 
 | EXPORT_SYMBOL(tcp_init_cgroup); | 
 |  | 
 | void tcp_destroy_cgroup(struct mem_cgroup *memcg) | 
 | { | 
 | 	struct cg_proto *cg_proto; | 
 |  | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return; | 
 |  | 
 | 	percpu_counter_destroy(&cg_proto->sockets_allocated); | 
 | } | 
 | EXPORT_SYMBOL(tcp_destroy_cgroup); | 
 |  | 
 | static int tcp_update_limit(struct mem_cgroup *memcg, u64 val) | 
 | { | 
 | 	struct cg_proto *cg_proto; | 
 | 	int i; | 
 | 	int ret; | 
 |  | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return -EINVAL; | 
 |  | 
 | 	if (val > RES_COUNTER_MAX) | 
 | 		val = RES_COUNTER_MAX; | 
 |  | 
 | 	ret = res_counter_set_limit(&cg_proto->memory_allocated, val); | 
 | 	if (ret) | 
 | 		return ret; | 
 |  | 
 | 	for (i = 0; i < 3; i++) | 
 | 		cg_proto->sysctl_mem[i] = min_t(long, val >> PAGE_SHIFT, | 
 | 						sysctl_tcp_mem[i]); | 
 |  | 
 | 	if (val == RES_COUNTER_MAX) | 
 | 		clear_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags); | 
 | 	else if (val != RES_COUNTER_MAX) { | 
 | 		/* | 
 | 		 * The active bit needs to be written after the static_key | 
 | 		 * update. This is what guarantees that the socket activation | 
 | 		 * function is the last one to run. See sock_update_memcg() for | 
 | 		 * details, and note that we don't mark any socket as belonging | 
 | 		 * to this memcg until that flag is up. | 
 | 		 * | 
 | 		 * We need to do this, because static_keys will span multiple | 
 | 		 * sites, but we can't control their order. If we mark a socket | 
 | 		 * as accounted, but the accounting functions are not patched in | 
 | 		 * yet, we'll lose accounting. | 
 | 		 * | 
 | 		 * We never race with the readers in sock_update_memcg(), | 
 | 		 * because when this value change, the code to process it is not | 
 | 		 * patched in yet. | 
 | 		 * | 
 | 		 * The activated bit is used to guarantee that no two writers | 
 | 		 * will do the update in the same memcg. Without that, we can't | 
 | 		 * properly shutdown the static key. | 
 | 		 */ | 
 | 		if (!test_and_set_bit(MEMCG_SOCK_ACTIVATED, &cg_proto->flags)) | 
 | 			static_key_slow_inc(&memcg_socket_limit_enabled); | 
 | 		set_bit(MEMCG_SOCK_ACTIVE, &cg_proto->flags); | 
 | 	} | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | static int tcp_cgroup_write(struct cgroup_subsys_state *css, struct cftype *cft, | 
 | 			    const char *buffer) | 
 | { | 
 | 	struct mem_cgroup *memcg = mem_cgroup_from_css(css); | 
 | 	unsigned long long val; | 
 | 	int ret = 0; | 
 |  | 
 | 	switch (cft->private) { | 
 | 	case RES_LIMIT: | 
 | 		/* see memcontrol.c */ | 
 | 		ret = res_counter_memparse_write_strategy(buffer, &val); | 
 | 		if (ret) | 
 | 			break; | 
 | 		ret = tcp_update_limit(memcg, val); | 
 | 		break; | 
 | 	default: | 
 | 		ret = -EINVAL; | 
 | 		break; | 
 | 	} | 
 | 	return ret; | 
 | } | 
 |  | 
 | static u64 tcp_read_stat(struct mem_cgroup *memcg, int type, u64 default_val) | 
 | { | 
 | 	struct cg_proto *cg_proto; | 
 |  | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return default_val; | 
 |  | 
 | 	return res_counter_read_u64(&cg_proto->memory_allocated, type); | 
 | } | 
 |  | 
 | static u64 tcp_read_usage(struct mem_cgroup *memcg) | 
 | { | 
 | 	struct cg_proto *cg_proto; | 
 |  | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return atomic_long_read(&tcp_memory_allocated) << PAGE_SHIFT; | 
 |  | 
 | 	return res_counter_read_u64(&cg_proto->memory_allocated, RES_USAGE); | 
 | } | 
 |  | 
 | static u64 tcp_cgroup_read(struct cgroup_subsys_state *css, struct cftype *cft) | 
 | { | 
 | 	struct mem_cgroup *memcg = mem_cgroup_from_css(css); | 
 | 	u64 val; | 
 |  | 
 | 	switch (cft->private) { | 
 | 	case RES_LIMIT: | 
 | 		val = tcp_read_stat(memcg, RES_LIMIT, RES_COUNTER_MAX); | 
 | 		break; | 
 | 	case RES_USAGE: | 
 | 		val = tcp_read_usage(memcg); | 
 | 		break; | 
 | 	case RES_FAILCNT: | 
 | 	case RES_MAX_USAGE: | 
 | 		val = tcp_read_stat(memcg, cft->private, 0); | 
 | 		break; | 
 | 	default: | 
 | 		BUG(); | 
 | 	} | 
 | 	return val; | 
 | } | 
 |  | 
 | static int tcp_cgroup_reset(struct cgroup_subsys_state *css, unsigned int event) | 
 | { | 
 | 	struct mem_cgroup *memcg; | 
 | 	struct cg_proto *cg_proto; | 
 |  | 
 | 	memcg = mem_cgroup_from_css(css); | 
 | 	cg_proto = tcp_prot.proto_cgroup(memcg); | 
 | 	if (!cg_proto) | 
 | 		return 0; | 
 |  | 
 | 	switch (event) { | 
 | 	case RES_MAX_USAGE: | 
 | 		res_counter_reset_max(&cg_proto->memory_allocated); | 
 | 		break; | 
 | 	case RES_FAILCNT: | 
 | 		res_counter_reset_failcnt(&cg_proto->memory_allocated); | 
 | 		break; | 
 | 	} | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | static struct cftype tcp_files[] = { | 
 | 	{ | 
 | 		.name = "kmem.tcp.limit_in_bytes", | 
 | 		.write_string = tcp_cgroup_write, | 
 | 		.read_u64 = tcp_cgroup_read, | 
 | 		.private = RES_LIMIT, | 
 | 	}, | 
 | 	{ | 
 | 		.name = "kmem.tcp.usage_in_bytes", | 
 | 		.read_u64 = tcp_cgroup_read, | 
 | 		.private = RES_USAGE, | 
 | 	}, | 
 | 	{ | 
 | 		.name = "kmem.tcp.failcnt", | 
 | 		.private = RES_FAILCNT, | 
 | 		.trigger = tcp_cgroup_reset, | 
 | 		.read_u64 = tcp_cgroup_read, | 
 | 	}, | 
 | 	{ | 
 | 		.name = "kmem.tcp.max_usage_in_bytes", | 
 | 		.private = RES_MAX_USAGE, | 
 | 		.trigger = tcp_cgroup_reset, | 
 | 		.read_u64 = tcp_cgroup_read, | 
 | 	}, | 
 | 	{ }	/* terminate */ | 
 | }; | 
 |  | 
 | static int __init tcp_memcontrol_init(void) | 
 | { | 
 | 	WARN_ON(cgroup_add_cftypes(&mem_cgroup_subsys, tcp_files)); | 
 | 	return 0; | 
 | } | 
 | __initcall(tcp_memcontrol_init); |