aboutsummaryrefslogtreecommitdiffstats
path: root/include/linux
diff options
context:
space:
mode:
authorTejun Heo <tj@kernel.org>2013-04-07 12:29:51 -0400
committerTejun Heo <tj@kernel.org>2013-04-07 12:29:51 -0400
commit2219449a65ace0290cd9c2260ff337e326b8be8a (patch)
treeca93a1567a9e07adec09a3384d23536dca44603f /include/linux
parent47cfcd0922454e49f4923b1e2d31a5bf199237c3 (diff)
cgroup: remove cgroup_lock_is_held()
We don't want controllers to assume that the information is officially available and do funky things with it. The only user is task_subsys_state_check() which uses it to verify RCU access context. We can move cgroup_lock_is_held() inside CONFIG_PROVE_RCU but that doesn't add meaningful protection compared to conditionally exposing cgroup_mutex. Remove cgroup_lock_is_held(), export cgroup_mutex iff CONFIG_PROVE_RCU and use lockdep_is_held() directly on the mutex in task_subsys_state_check(). While at it, add parentheses around macro arguments in task_subsys_state_check(). Signed-off-by: Tejun Heo <tj@kernel.org> Acked-by: Li Zefan <lizefan@huawei.com>
Diffstat (limited to 'include/linux')
-rw-r--r--include/linux/cgroup.h13
1 files changed, 9 insertions, 4 deletions
diff --git a/include/linux/cgroup.h b/include/linux/cgroup.h
index 63deb70f3149..515927eebb37 100644
--- a/include/linux/cgroup.h
+++ b/include/linux/cgroup.h
@@ -30,7 +30,6 @@ struct css_id;
30 30
31extern int cgroup_init_early(void); 31extern int cgroup_init_early(void);
32extern int cgroup_init(void); 32extern int cgroup_init(void);
33extern int cgroup_lock_is_held(void);
34extern void cgroup_fork(struct task_struct *p); 33extern void cgroup_fork(struct task_struct *p);
35extern void cgroup_post_fork(struct task_struct *p); 34extern void cgroup_post_fork(struct task_struct *p);
36extern void cgroup_exit(struct task_struct *p, int run_callbacks); 35extern void cgroup_exit(struct task_struct *p, int run_callbacks);
@@ -552,10 +551,16 @@ static inline struct cgroup_subsys_state *cgroup_subsys_state(
552 * rcu_dereference_check() conditions, such as locks used during the 551 * rcu_dereference_check() conditions, such as locks used during the
553 * cgroup_subsys::attach() methods. 552 * cgroup_subsys::attach() methods.
554 */ 553 */
554#ifdef CONFIG_PROVE_RCU
555extern struct mutex cgroup_mutex;
555#define task_subsys_state_check(task, subsys_id, __c) \ 556#define task_subsys_state_check(task, subsys_id, __c) \
556 rcu_dereference_check(task->cgroups->subsys[subsys_id], \ 557 rcu_dereference_check((task)->cgroups->subsys[(subsys_id)], \
557 lockdep_is_held(&task->alloc_lock) || \ 558 lockdep_is_held(&(task)->alloc_lock) || \
558 cgroup_lock_is_held() || (__c)) 559 lockdep_is_held(&cgroup_mutex) || (__c))
560#else
561#define task_subsys_state_check(task, subsys_id, __c) \
562 rcu_dereference((task)->cgroups->subsys[(subsys_id)])
563#endif
559 564
560static inline struct cgroup_subsys_state * 565static inline struct cgroup_subsys_state *
561task_subsys_state(struct task_struct *task, int subsys_id) 566task_subsys_state(struct task_struct *task, int subsys_id)