aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/cgroup.c
diff options
context:
space:
mode:
authorTejun Heo <tj@kernel.org>2013-08-15 11:42:36 -0400
committerTejun Heo <tj@kernel.org>2013-08-19 09:56:25 -0400
commit0bfb4aa67cef4982adc70590a31624d7b35a0bda (patch)
tree89a20d8b76a803e2ac6e04c032b97e35f392fd8f /kernel/cgroup.c
parent1cb650b91ba582f6737457b7d22e368585596d2c (diff)
cgroup: fix subsystem file accesses on the root cgroup
105347ba5 ("cgroup: make cgroup_file_open() rcu_read_lock() around cgroup_css() and add cfent->css") added cfent->css to cache the associted cgroup_subsys_state across file operations. A cfent is associated with single css throughout its lifetime and the origimal commit initialized the cache pointer during cgroup_add_file() and verified that it matches the actual one in cgroup_file_open(). While this works fine for !root cgroups, it's broken for root cgroups as files in a root cgroup are created before the css's are associated with the cgroup and thus cgroup_css() call in cgroup_add_file() returns NULL associating all cfents in the root cgroup with NULL css. This makes cgroup_file_open() trigger WARN and fail with -ENODEV for all !core subsystem files in the root cgroups. There's no reason to initialize cfent->css separately from cgroup_add_file(). As the association never changes, cgroup_file_open() can set it unconditionally every time and containing the logic in cgroup_file_open() makes more sense anyway as the only reason it's necessary is file->private_data being already occupied. Fix it by setting cfent->css unconditionally from cgroup_file_open(). Signed-off-by: Tejun Heo <tj@kernel.org> Acked-by: Li Zefan <lizefan@huawei.com>
Diffstat (limited to 'kernel/cgroup.c')
-rw-r--r--kernel/cgroup.c24
1 files changed, 10 insertions, 14 deletions
diff --git a/kernel/cgroup.c b/kernel/cgroup.c
index ff7d642a070a..896e035eb6e4 100644
--- a/kernel/cgroup.c
+++ b/kernel/cgroup.c
@@ -2490,10 +2490,18 @@ static int cgroup_file_open(struct inode *inode, struct file *file)
2490 } 2490 }
2491 rcu_read_unlock(); 2491 rcu_read_unlock();
2492 2492
2493 /* css should match @cfe->css, see cgroup_add_file() for details */ 2493 if (!css)
2494 if (!css || WARN_ON_ONCE(css != cfe->css))
2495 return -ENODEV; 2494 return -ENODEV;
2496 2495
2496 /*
2497 * @cfe->css is used by read/write/close to determine the
2498 * associated css. @file->private_data would be a better place but
2499 * that's already used by seqfile. Multiple accessors may use it
2500 * simultaneously which is okay as the association never changes.
2501 */
2502 WARN_ON_ONCE(cfe->css && cfe->css != css);
2503 cfe->css = css;
2504
2497 if (cft->read_map || cft->read_seq_string) { 2505 if (cft->read_map || cft->read_seq_string) {
2498 file->f_op = &cgroup_seqfile_operations; 2506 file->f_op = &cgroup_seqfile_operations;
2499 err = single_open(file, cgroup_seqfile_show, cfe); 2507 err = single_open(file, cgroup_seqfile_show, cfe);
@@ -2772,18 +2780,6 @@ static int cgroup_add_file(struct cgroup *cgrp, struct cftype *cft)
2772 dentry->d_fsdata = cfe; 2780 dentry->d_fsdata = cfe;
2773 simple_xattrs_init(&cfe->xattrs); 2781 simple_xattrs_init(&cfe->xattrs);
2774 2782
2775 /*
2776 * cfe->css is used by read/write/close to determine the associated
2777 * css. file->private_data would be a better place but that's
2778 * already used by seqfile. Note that open will use the usual
2779 * cgroup_css() and css_tryget() to acquire the css and this
2780 * caching doesn't affect css lifetime management.
2781 */
2782 if (cft->ss)
2783 cfe->css = cgroup_css(cgrp, cft->ss->subsys_id);
2784 else
2785 cfe->css = &cgrp->dummy_css;
2786
2787 mode = cgroup_file_mode(cft); 2783 mode = cgroup_file_mode(cft);
2788 error = cgroup_create_file(dentry, mode | S_IFREG, cgrp->root->sb); 2784 error = cgroup_create_file(dentry, mode | S_IFREG, cgrp->root->sb);
2789 if (!error) { 2785 if (!error) {