diff options
author | Rafael J. Wysocki <rjw@sisk.pl> | 2011-12-21 15:59:45 -0500 |
---|---|---|
committer | Rafael J. Wysocki <rjw@sisk.pl> | 2011-12-21 15:59:45 -0500 |
commit | b00f4dc5ff022cb9cbaffd376d9454d7fa1e496f (patch) | |
tree | 40f1b232e2f1e8ac365317a14fdcbcb331722b46 /kernel/cgroup_freezer.c | |
parent | 1eac8111e0763853266a171ce11214da3a347a0a (diff) | |
parent | b9e26dfdad5a4f9cbdaacafac6998614cc9c41bc (diff) |
Merge branch 'master' into pm-sleep
* master: (848 commits)
SELinux: Fix RCU deref check warning in sel_netport_insert()
binary_sysctl(): fix memory leak
mm/vmalloc.c: remove static declaration of va from __get_vm_area_node
ipmi_watchdog: restore settings when BMC reset
oom: fix integer overflow of points in oom_badness
memcg: keep root group unchanged if creation fails
nilfs2: potential integer overflow in nilfs_ioctl_clean_segments()
nilfs2: unbreak compat ioctl
cpusets: stall when updating mems_allowed for mempolicy or disjoint nodemask
evm: prevent racing during tfm allocation
evm: key must be set once during initialization
mmc: vub300: fix type of firmware_rom_wait_states module parameter
Revert "mmc: enable runtime PM by default"
mmc: sdhci: remove "state" argument from sdhci_suspend_host
x86, dumpstack: Fix code bytes breakage due to missing KERN_CONT
IB/qib: Correct sense on freectxts increment and decrement
RDMA/cma: Verify private data length
cgroups: fix a css_set not found bug in cgroup_attach_proc
oprofile: Fix uninitialized memory access when writing to writing to oprofilefs
Revert "xen/pv-on-hvm kexec: add xs_reset_watches to shutdown watches from old kernel"
...
Conflicts:
kernel/cgroup_freezer.c
Diffstat (limited to 'kernel/cgroup_freezer.c')
-rw-r--r-- | kernel/cgroup_freezer.c | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/kernel/cgroup_freezer.c b/kernel/cgroup_freezer.c index e411a60cc2c8..fcb93fca782d 100644 --- a/kernel/cgroup_freezer.c +++ b/kernel/cgroup_freezer.c | |||
@@ -152,6 +152,13 @@ static void freezer_destroy(struct cgroup_subsys *ss, | |||
152 | kfree(freezer); | 152 | kfree(freezer); |
153 | } | 153 | } |
154 | 154 | ||
155 | /* task is frozen or will freeze immediately when next it gets woken */ | ||
156 | static bool is_task_frozen_enough(struct task_struct *task) | ||
157 | { | ||
158 | return frozen(task) || | ||
159 | (task_is_stopped_or_traced(task) && freezing(task)); | ||
160 | } | ||
161 | |||
155 | /* | 162 | /* |
156 | * The call to cgroup_lock() in the freezer.state write method prevents | 163 | * The call to cgroup_lock() in the freezer.state write method prevents |
157 | * a write to that file racing against an attach, and hence the | 164 | * a write to that file racing against an attach, and hence the |
@@ -224,7 +231,7 @@ static void update_if_frozen(struct cgroup *cgroup, | |||
224 | cgroup_iter_start(cgroup, &it); | 231 | cgroup_iter_start(cgroup, &it); |
225 | while ((task = cgroup_iter_next(cgroup, &it))) { | 232 | while ((task = cgroup_iter_next(cgroup, &it))) { |
226 | ntotal++; | 233 | ntotal++; |
227 | if (freezing(task) && frozen(task)) | 234 | if (freezing(task) && is_task_frozen_enough(task)) |
228 | nfrozen++; | 235 | nfrozen++; |
229 | } | 236 | } |
230 | 237 | ||
@@ -276,7 +283,7 @@ static int try_to_freeze_cgroup(struct cgroup *cgroup, struct freezer *freezer) | |||
276 | while ((task = cgroup_iter_next(cgroup, &it))) { | 283 | while ((task = cgroup_iter_next(cgroup, &it))) { |
277 | if (!freeze_task(task)) | 284 | if (!freeze_task(task)) |
278 | continue; | 285 | continue; |
279 | if (frozen(task)) | 286 | if (is_task_frozen_enough(task)) |
280 | continue; | 287 | continue; |
281 | if (!freezing(task) && !freezer_should_skip(task)) | 288 | if (!freezing(task) && !freezer_should_skip(task)) |
282 | num_cant_freeze_now++; | 289 | num_cant_freeze_now++; |