Commit c0e8a139 authored by Linus Torvalds's avatar Linus Torvalds

Merge branch 'for-3.7' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup

Pull cgroup updates from Tejun Heo:

 - xattr support added.  The implementation is shared with tmpfs.  The
   usage is restricted and intended to be used to manage per-cgroup
   metadata by system software.  tmpfs changes are routed through this
   branch with Hugh's permission.

 - cgroup subsystem ID handling simplified.

* 'for-3.7' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup:
  cgroup: Define CGROUP_SUBSYS_COUNT according the configuration
  cgroup: Assign subsystem IDs during compile time
  cgroup: Do not depend on a given order when populating the subsys array
  cgroup: Wrap subsystem selection macro
  cgroup: Remove CGROUP_BUILTIN_SUBSYS_COUNT
  cgroup: net_prio: Do not define task_netpioidx() when not selected
  cgroup: net_cls: Do not define task_cls_classid() when not selected
  cgroup: net_cls: Move sock_update_classid() declaration to cls_cgroup.h
  cgroup: trivial fixes for Documentation/cgroups/cgroups.txt
  xattr: mark variable as uninitialized to make both gcc and smatch happy
  fs: add missing documentation to simple_xattr functions
  cgroup: add documentation on extended attributes usage
  cgroup: rename subsys_bits to subsys_mask
  cgroup: add xattr support
  cgroup: revise how we re-populate root directory
  xattr: extract simple_xattr code from tmpfs
parents 033d9959 a6f00298
This diff is collapsed.
...@@ -68,6 +68,7 @@ ...@@ -68,6 +68,7 @@
#include <net/netns/generic.h> #include <net/netns/generic.h>
#include <net/rtnetlink.h> #include <net/rtnetlink.h>
#include <net/sock.h> #include <net/sock.h>
#include <net/cls_cgroup.h>
#include <asm/uaccess.h> #include <asm/uaccess.h>
......
...@@ -791,3 +791,183 @@ EXPORT_SYMBOL(generic_getxattr); ...@@ -791,3 +791,183 @@ EXPORT_SYMBOL(generic_getxattr);
EXPORT_SYMBOL(generic_listxattr); EXPORT_SYMBOL(generic_listxattr);
EXPORT_SYMBOL(generic_setxattr); EXPORT_SYMBOL(generic_setxattr);
EXPORT_SYMBOL(generic_removexattr); EXPORT_SYMBOL(generic_removexattr);
/*
* Allocate new xattr and copy in the value; but leave the name to callers.
*/
struct simple_xattr *simple_xattr_alloc(const void *value, size_t size)
{
struct simple_xattr *new_xattr;
size_t len;
/* wrap around? */
len = sizeof(*new_xattr) + size;
if (len <= sizeof(*new_xattr))
return NULL;
new_xattr = kmalloc(len, GFP_KERNEL);
if (!new_xattr)
return NULL;
new_xattr->size = size;
memcpy(new_xattr->value, value, size);
return new_xattr;
}
/*
* xattr GET operation for in-memory/pseudo filesystems
*/
int simple_xattr_get(struct simple_xattrs *xattrs, const char *name,
void *buffer, size_t size)
{
struct simple_xattr *xattr;
int ret = -ENODATA;
spin_lock(&xattrs->lock);
list_for_each_entry(xattr, &xattrs->head, list) {
if (strcmp(name, xattr->name))
continue;
ret = xattr->size;
if (buffer) {
if (size < xattr->size)
ret = -ERANGE;
else
memcpy(buffer, xattr->value, xattr->size);
}
break;
}
spin_unlock(&xattrs->lock);
return ret;
}
static int __simple_xattr_set(struct simple_xattrs *xattrs, const char *name,
const void *value, size_t size, int flags)
{
struct simple_xattr *xattr;
struct simple_xattr *uninitialized_var(new_xattr);
int err = 0;
/* value == NULL means remove */
if (value) {
new_xattr = simple_xattr_alloc(value, size);
if (!new_xattr)
return -ENOMEM;
new_xattr->name = kstrdup(name, GFP_KERNEL);
if (!new_xattr->name) {
kfree(new_xattr);
return -ENOMEM;
}
}
spin_lock(&xattrs->lock);
list_for_each_entry(xattr, &xattrs->head, list) {
if (!strcmp(name, xattr->name)) {
if (flags & XATTR_CREATE) {
xattr = new_xattr;
err = -EEXIST;
} else if (new_xattr) {
list_replace(&xattr->list, &new_xattr->list);
} else {
list_del(&xattr->list);
}
goto out;
}
}
if (flags & XATTR_REPLACE) {
xattr = new_xattr;
err = -ENODATA;
} else {
list_add(&new_xattr->list, &xattrs->head);
xattr = NULL;
}
out:
spin_unlock(&xattrs->lock);
if (xattr) {
kfree(xattr->name);
kfree(xattr);
}
return err;
}
/**
* simple_xattr_set - xattr SET operation for in-memory/pseudo filesystems
* @xattrs: target simple_xattr list
* @name: name of the new extended attribute
* @value: value of the new xattr. If %NULL, will remove the attribute
* @size: size of the new xattr
* @flags: %XATTR_{CREATE|REPLACE}
*
* %XATTR_CREATE is set, the xattr shouldn't exist already; otherwise fails
* with -EEXIST. If %XATTR_REPLACE is set, the xattr should exist;
* otherwise, fails with -ENODATA.
*
* Returns 0 on success, -errno on failure.
*/
int simple_xattr_set(struct simple_xattrs *xattrs, const char *name,
const void *value, size_t size, int flags)
{
if (size == 0)
value = ""; /* empty EA, do not remove */
return __simple_xattr_set(xattrs, name, value, size, flags);
}
/*
* xattr REMOVE operation for in-memory/pseudo filesystems
*/
int simple_xattr_remove(struct simple_xattrs *xattrs, const char *name)
{
return __simple_xattr_set(xattrs, name, NULL, 0, XATTR_REPLACE);
}
static bool xattr_is_trusted(const char *name)
{
return !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN);
}
/*
* xattr LIST operation for in-memory/pseudo filesystems
*/
ssize_t simple_xattr_list(struct simple_xattrs *xattrs, char *buffer,
size_t size)
{
bool trusted = capable(CAP_SYS_ADMIN);
struct simple_xattr *xattr;
size_t used = 0;
spin_lock(&xattrs->lock);
list_for_each_entry(xattr, &xattrs->head, list) {
size_t len;
/* skip "trusted." attributes for unprivileged callers */
if (!trusted && xattr_is_trusted(xattr->name))
continue;
len = strlen(xattr->name) + 1;
used += len;
if (buffer) {
if (size < used) {
used = -ERANGE;
break;
}
memcpy(buffer, xattr->name, len);
buffer += len;
}
}
spin_unlock(&xattrs->lock);
return used;
}
/*
* Adds an extended attribute to the list
*/
void simple_xattr_list_add(struct simple_xattrs *xattrs,
struct simple_xattr *new_xattr)
{
spin_lock(&xattrs->lock);
list_add(&new_xattr->list, &xattrs->head);
spin_unlock(&xattrs->lock);
}
...@@ -17,6 +17,7 @@ ...@@ -17,6 +17,7 @@
#include <linux/rwsem.h> #include <linux/rwsem.h>
#include <linux/idr.h> #include <linux/idr.h>
#include <linux/workqueue.h> #include <linux/workqueue.h>
#include <linux/xattr.h>
#ifdef CONFIG_CGROUPS #ifdef CONFIG_CGROUPS
...@@ -45,17 +46,13 @@ extern const struct file_operations proc_cgroup_operations; ...@@ -45,17 +46,13 @@ extern const struct file_operations proc_cgroup_operations;
/* Define the enumeration of all builtin cgroup subsystems */ /* Define the enumeration of all builtin cgroup subsystems */
#define SUBSYS(_x) _x ## _subsys_id, #define SUBSYS(_x) _x ## _subsys_id,
#define IS_SUBSYS_ENABLED(option) IS_ENABLED(option)
enum cgroup_subsys_id { enum cgroup_subsys_id {
#include <linux/cgroup_subsys.h> #include <linux/cgroup_subsys.h>
CGROUP_BUILTIN_SUBSYS_COUNT CGROUP_SUBSYS_COUNT,
}; };
#undef IS_SUBSYS_ENABLED
#undef SUBSYS #undef SUBSYS
/*
* This define indicates the maximum number of subsystems that can be loaded
* at once. We limit to this many since cgroupfs_root has subsys_bits to keep
* track of all of them.
*/
#define CGROUP_SUBSYS_COUNT (BITS_PER_BYTE*sizeof(unsigned long))
/* Per-subsystem/per-cgroup state maintained by the system. */ /* Per-subsystem/per-cgroup state maintained by the system. */
struct cgroup_subsys_state { struct cgroup_subsys_state {
...@@ -216,6 +213,9 @@ struct cgroup { ...@@ -216,6 +213,9 @@ struct cgroup {
/* List of events which userspace want to receive */ /* List of events which userspace want to receive */
struct list_head event_list; struct list_head event_list;
spinlock_t event_list_lock; spinlock_t event_list_lock;
/* directory xattrs */
struct simple_xattrs xattrs;
}; };
/* /*
...@@ -309,6 +309,9 @@ struct cftype { ...@@ -309,6 +309,9 @@ struct cftype {
/* CFTYPE_* flags */ /* CFTYPE_* flags */
unsigned int flags; unsigned int flags;
/* file xattrs */
struct simple_xattrs xattrs;
int (*open)(struct inode *inode, struct file *file); int (*open)(struct inode *inode, struct file *file);
ssize_t (*read)(struct cgroup *cgrp, struct cftype *cft, ssize_t (*read)(struct cgroup *cgrp, struct cftype *cft,
struct file *file, struct file *file,
...@@ -394,7 +397,7 @@ struct cftype { ...@@ -394,7 +397,7 @@ struct cftype {
*/ */
struct cftype_set { struct cftype_set {
struct list_head node; /* chained at subsys->cftsets */ struct list_head node; /* chained at subsys->cftsets */
const struct cftype *cfts; struct cftype *cfts;
}; };
struct cgroup_scanner { struct cgroup_scanner {
...@@ -406,8 +409,8 @@ struct cgroup_scanner { ...@@ -406,8 +409,8 @@ struct cgroup_scanner {
void *data; void *data;
}; };
int cgroup_add_cftypes(struct cgroup_subsys *ss, const struct cftype *cfts); int cgroup_add_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
int cgroup_rm_cftypes(struct cgroup_subsys *ss, const struct cftype *cfts); int cgroup_rm_cftypes(struct cgroup_subsys *ss, struct cftype *cfts);
int cgroup_is_removed(const struct cgroup *cgrp); int cgroup_is_removed(const struct cgroup *cgrp);
...@@ -521,7 +524,9 @@ struct cgroup_subsys { ...@@ -521,7 +524,9 @@ struct cgroup_subsys {
}; };
#define SUBSYS(_x) extern struct cgroup_subsys _x ## _subsys; #define SUBSYS(_x) extern struct cgroup_subsys _x ## _subsys;
#define IS_SUBSYS_ENABLED(option) IS_BUILTIN(option)
#include <linux/cgroup_subsys.h> #include <linux/cgroup_subsys.h>
#undef IS_SUBSYS_ENABLED
#undef SUBSYS #undef SUBSYS
static inline struct cgroup_subsys_state *cgroup_subsys_state( static inline struct cgroup_subsys_state *cgroup_subsys_state(
......
...@@ -7,73 +7,73 @@ ...@@ -7,73 +7,73 @@
/* */ /* */
#ifdef CONFIG_CPUSETS #if IS_SUBSYS_ENABLED(CONFIG_CPUSETS)
SUBSYS(cpuset) SUBSYS(cpuset)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_DEBUG #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_DEBUG)
SUBSYS(debug) SUBSYS(debug)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_SCHED #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_SCHED)
SUBSYS(cpu_cgroup) SUBSYS(cpu_cgroup)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_CPUACCT #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_CPUACCT)
SUBSYS(cpuacct) SUBSYS(cpuacct)
#endif #endif
/* */ /* */
#ifdef CONFIG_MEMCG #if IS_SUBSYS_ENABLED(CONFIG_MEMCG)
SUBSYS(mem_cgroup) SUBSYS(mem_cgroup)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_DEVICE #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_DEVICE)
SUBSYS(devices) SUBSYS(devices)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_FREEZER #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_FREEZER)
SUBSYS(freezer) SUBSYS(freezer)
#endif #endif
/* */ /* */
#ifdef CONFIG_NET_CLS_CGROUP #if IS_SUBSYS_ENABLED(CONFIG_NET_CLS_CGROUP)
SUBSYS(net_cls) SUBSYS(net_cls)
#endif #endif
/* */ /* */
#ifdef CONFIG_BLK_CGROUP #if IS_SUBSYS_ENABLED(CONFIG_BLK_CGROUP)
SUBSYS(blkio) SUBSYS(blkio)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_PERF #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_PERF)
SUBSYS(perf) SUBSYS(perf)
#endif #endif
/* */ /* */
#ifdef CONFIG_NETPRIO_CGROUP #if IS_SUBSYS_ENABLED(CONFIG_NETPRIO_CGROUP)
SUBSYS(net_prio) SUBSYS(net_prio)
#endif #endif
/* */ /* */
#ifdef CONFIG_CGROUP_HUGETLB #if IS_SUBSYS_ENABLED(CONFIG_CGROUP_HUGETLB)
SUBSYS(hugetlb) SUBSYS(hugetlb)
#endif #endif
......
...@@ -5,6 +5,7 @@ ...@@ -5,6 +5,7 @@
#include <linux/mempolicy.h> #include <linux/mempolicy.h>
#include <linux/pagemap.h> #include <linux/pagemap.h>
#include <linux/percpu_counter.h> #include <linux/percpu_counter.h>
#include <linux/xattr.h>
/* inode in-kernel data */ /* inode in-kernel data */
...@@ -18,7 +19,7 @@ struct shmem_inode_info { ...@@ -18,7 +19,7 @@ struct shmem_inode_info {
}; };
struct shared_policy policy; /* NUMA memory alloc policy */ struct shared_policy policy; /* NUMA memory alloc policy */
struct list_head swaplist; /* chain of maybes on swap */ struct list_head swaplist; /* chain of maybes on swap */
struct list_head xattr_list; /* list of shmem_xattr */ struct simple_xattrs xattrs; /* list of xattrs */
struct inode vfs_inode; struct inode vfs_inode;
}; };
......
...@@ -59,7 +59,9 @@ ...@@ -59,7 +59,9 @@
#ifdef __KERNEL__ #ifdef __KERNEL__
#include <linux/slab.h>
#include <linux/types.h> #include <linux/types.h>
#include <linux/spinlock.h>
struct inode; struct inode;
struct dentry; struct dentry;
...@@ -96,6 +98,52 @@ ssize_t vfs_getxattr_alloc(struct dentry *dentry, const char *name, ...@@ -96,6 +98,52 @@ ssize_t vfs_getxattr_alloc(struct dentry *dentry, const char *name,
char **xattr_value, size_t size, gfp_t flags); char **xattr_value, size_t size, gfp_t flags);
int vfs_xattr_cmp(struct dentry *dentry, const char *xattr_name, int vfs_xattr_cmp(struct dentry *dentry, const char *xattr_name,
const char *value, size_t size, gfp_t flags); const char *value, size_t size, gfp_t flags);
struct simple_xattrs {
struct list_head head;
spinlock_t lock;
};
struct simple_xattr {
struct list_head list;
char *name;
size_t size;
char value[0];
};
/*
* initialize the simple_xattrs structure
*/
static inline void simple_xattrs_init(struct simple_xattrs *xattrs)
{
INIT_LIST_HEAD(&xattrs->head);
spin_lock_init(&xattrs->lock);
}
/*
* free all the xattrs
*/
static inline void simple_xattrs_free(struct simple_xattrs *xattrs)
{
struct simple_xattr *xattr, *node;
list_for_each_entry_safe(xattr, node, &xattrs->head, list) {
kfree(xattr->name);
kfree(xattr);
}
}
struct simple_xattr *simple_xattr_alloc(const void *value, size_t size);
int simple_xattr_get(struct simple_xattrs *xattrs, const char *name,
void *buffer, size_t size);
int simple_xattr_set(struct simple_xattrs *xattrs, const char *name,
const void *value, size_t size, int flags);
int simple_xattr_remove(struct simple_xattrs *xattrs, const char *name);
ssize_t simple_xattr_list(struct simple_xattrs *xattrs, char *buffer,
size_t size);
void simple_xattr_list_add(struct simple_xattrs *xattrs,
struct simple_xattr *new_xattr);
#endif /* __KERNEL__ */ #endif /* __KERNEL__ */
#endif /* _LINUX_XATTR_H */ #endif /* _LINUX_XATTR_H */
...@@ -17,14 +17,16 @@ ...@@ -17,14 +17,16 @@
#include <linux/hardirq.h> #include <linux/hardirq.h>
#include <linux/rcupdate.h> #include <linux/rcupdate.h>
#ifdef CONFIG_CGROUPS #if IS_ENABLED(CONFIG_NET_CLS_CGROUP)
struct cgroup_cls_state struct cgroup_cls_state
{ {
struct cgroup_subsys_state css; struct cgroup_subsys_state css;
u32 classid; u32 classid;
}; };
#ifdef CONFIG_NET_CLS_CGROUP extern void sock_update_classid(struct sock *sk);
#if IS_BUILTIN(CONFIG_NET_CLS_CGROUP)
static inline u32 task_cls_classid(struct task_struct *p) static inline u32 task_cls_classid(struct task_struct *p)
{ {
int classid; int classid;
...@@ -39,32 +41,33 @@ static inline u32 task_cls_classid(struct task_struct *p) ...@@ -39,32 +41,33 @@ static inline u32 task_cls_classid(struct task_struct *p)
return classid; return classid;
} }
#else #elif IS_MODULE(CONFIG_NET_CLS_CGROUP)
extern int net_cls_subsys_id;
static inline u32 task_cls_classid(struct task_struct *p) static inline u32 task_cls_classid(struct task_struct *p)
{ {
int id; struct cgroup_subsys_state *css;
u32 classid = 0; u32 classid = 0;
if (in_interrupt()) if (in_interrupt())
return 0; return 0;
rcu_read_lock(); rcu_read_lock();
id = rcu_dereference_index_check(net_cls_subsys_id, css = task_subsys_state(p, net_cls_subsys_id);
rcu_read_lock_held()); if (css)
if (id >= 0) classid = container_of(css,
classid = container_of(task_subsys_state(p, id),
struct cgroup_cls_state, css)->classid; struct cgroup_cls_state, css)->classid;
rcu_read_unlock(); rcu_read_unlock();
return classid; return classid;
} }
#endif #endif
#else #else /* !CGROUP_NET_CLS_CGROUP */
static inline void sock_update_classid(struct sock *sk)
{
}
static inline u32 task_cls_classid(struct task_struct *p) static inline u32 task_cls_classid(struct task_struct *p)
{ {
return 0; return 0;
} }
#endif #endif /* CGROUP_NET_CLS_CGROUP */
#endif /* _NET_CLS_CGROUP_H */ #endif /* _NET_CLS_CGROUP_H */
...@@ -18,23 +18,18 @@ ...@@ -18,23 +18,18 @@
#include <linux/rcupdate.h> #include <linux/rcupdate.h>
#if IS_ENABLED(CONFIG_NETPRIO_CGROUP)
struct netprio_map { struct netprio_map {
struct rcu_head rcu; struct rcu_head rcu;
u32 priomap_len; u32 priomap_len;
u32 priomap[]; u32 priomap[];
}; };
#ifdef CONFIG_CGROUPS
struct cgroup_netprio_state { struct cgroup_netprio_state {
struct cgroup_subsys_state css; struct cgroup_subsys_state css;
u32 prioidx; u32 prioidx;
}; };
#ifndef CONFIG_NETPRIO_CGROUP
extern int net_prio_subsys_id;
#endif
extern void sock_update_netprioidx(struct sock *sk, struct task_struct *task); extern void sock_update_netprioidx(struct sock *sk, struct task_struct *task);
#if IS_BUILTIN(CONFIG_NETPRIO_CGROUP) #if IS_BUILTIN(CONFIG_NETPRIO_CGROUP)
...@@ -56,33 +51,28 @@ static inline u32 task_netprioidx(struct task_struct *p) ...@@ -56,33 +51,28 @@ static inline u32 task_netprioidx(struct task_struct *p)
static inline u32 task_netprioidx(struct task_struct *p) static inline u32 task_netprioidx(struct task_struct *p)
{ {
struct cgroup_netprio_state *state; struct cgroup_subsys_state *css;
int subsys_id;
u32 idx = 0; u32 idx = 0;
rcu_read_lock(); rcu_read_lock();
subsys_id = rcu_dereference_index_check(net_prio_subsys_id, css = task_subsys_state(p, net_prio_subsys_id);
rcu_read_lock_held()); if (css)
if (subsys_id >= 0) { idx = container_of(css,
state = container_of(task_subsys_state(p, subsys_id), struct cgroup_netprio_state, css)->prioidx;
struct cgroup_netprio_state, css);
idx = state->prioidx;
}
rcu_read_unlock(); rcu_read_unlock();
return idx; return idx;
} }
#endif
#else #else /* !CONFIG_NETPRIO_CGROUP */
static inline u32 task_netprioidx(struct task_struct *p) static inline u32 task_netprioidx(struct task_struct *p)
{ {
return 0; return 0;
} }
#endif /* CONFIG_NETPRIO_CGROUP */
#else
#define sock_update_netprioidx(sk, task) #define sock_update_netprioidx(sk, task)
#endif
#endif /* CONFIG_NETPRIO_CGROUP */
#endif /* _NET_CLS_CGROUP_H */ #endif /* _NET_CLS_CGROUP_H */
...@@ -1486,14 +1486,6 @@ extern void *sock_kmalloc(struct sock *sk, int size, ...@@ -1486,14 +1486,6 @@ extern void *sock_kmalloc(struct sock *sk, int size,
extern void sock_kfree_s(struct sock *sk, void *mem, int size); extern void sock_kfree_s(struct sock *sk, void *mem, int size);
extern void sk_send_sigurg(struct sock *sk); extern void sk_send_sigurg(struct sock *sk);
#ifdef CONFIG_CGROUPS
extern void sock_update_classid(struct sock *sk);
#else
static inline void sock_update_classid(struct sock *sk)
{
}
#endif
/* /*
* Functions to fill in entries in struct proto_ops when a protocol * Functions to fill in entries in struct proto_ops when a protocol
* does not implement a particular function. * does not implement a particular function.
......
This diff is collapsed.
...@@ -77,13 +77,6 @@ static struct vfsmount *shm_mnt; ...@@ -77,13 +77,6 @@ static struct vfsmount *shm_mnt;
/* Symlink up to this size is kmalloc'ed instead of using a swappable page */ /* Symlink up to this size is kmalloc'ed instead of using a swappable page */
#define SHORT_SYMLINK_LEN 128 #define SHORT_SYMLINK_LEN 128
struct shmem_xattr {
struct list_head list; /* anchored by shmem_inode_info->xattr_list */
char *name; /* xattr name */
size_t size;
char value[0];
};
/* /*
* shmem_fallocate and shmem_writepage communicate via inode->i_private * shmem_fallocate and shmem_writepage communicate via inode->i_private
* (with i_mutex making sure that it has only one user at a time): * (with i_mutex making sure that it has only one user at a time):
...@@ -636,7 +629,6 @@ static int shmem_setattr(struct dentry *dentry, struct iattr *attr) ...@@ -636,7 +629,6 @@ static int shmem_setattr(struct dentry *dentry, struct iattr *attr)
static void shmem_evict_inode(struct inode *inode) static void shmem_evict_inode(struct inode *inode)
{ {
struct shmem_inode_info *info = SHMEM_I(inode); struct shmem_inode_info *info = SHMEM_I(inode);
struct shmem_xattr *xattr, *nxattr;
if (inode->i_mapping->a_ops == &shmem_aops) { if (inode->i_mapping->a_ops == &shmem_aops) {
shmem_unacct_size(info->flags, inode->i_size); shmem_unacct_size(info->flags, inode->i_size);
...@@ -650,10 +642,7 @@ static void shmem_evict_inode(struct inode *inode) ...@@ -650,10 +642,7 @@ static void shmem_evict_inode(struct inode *inode)
} else } else
kfree(info->symlink); kfree(info->symlink);
list_for_each_entry_safe(xattr, nxattr, &info->xattr_list, list) { simple_xattrs_free(&info->xattrs);
kfree(xattr->name);
kfree(xattr);
}
BUG_ON(inode->i_blocks); BUG_ON(inode->i_blocks);
shmem_free_inode(inode->i_sb); shmem_free_inode(inode->i_sb);
clear_inode(inode); clear_inode(inode);
...@@ -1377,7 +1366,7 @@ static struct inode *shmem_get_inode(struct super_block *sb, const struct inode ...@@ -1377,7 +1366,7 @@ static struct inode *shmem_get_inode(struct super_block *sb, const struct inode
spin_lock_init(&info->lock); spin_lock_init(&info->lock);
info->flags = flags & VM_NORESERVE; info->flags = flags & VM_NORESERVE;
INIT_LIST_HEAD(&info->swaplist); INIT_LIST_HEAD(&info->swaplist);
INIT_LIST_HEAD(&info->xattr_list); simple_xattrs_init(&info->xattrs);
cache_no_acl(inode); cache_no_acl(inode);
switch (mode & S_IFMT) { switch (mode & S_IFMT) {
...@@ -2059,28 +2048,6 @@ static void shmem_put_link(struct dentry *dentry, struct nameidata *nd, void *co ...@@ -2059,28 +2048,6 @@ static void shmem_put_link(struct dentry *dentry, struct nameidata *nd, void *co
* filesystem level, though. * filesystem level, though.
*/ */
/*
* Allocate new xattr and copy in the value; but leave the name to callers.
*/
static struct shmem_xattr *shmem_xattr_alloc(const void *value, size_t size)
{
struct shmem_xattr *new_xattr;
size_t len;
/* wrap around? */
len = sizeof(*new_xattr) + size;
if (len <= sizeof(*new_xattr))
return NULL;
new_xattr = kmalloc(len, GFP_KERNEL);
if (!new_xattr)
return NULL;
new_xattr->size = size;
memcpy(new_xattr->value, value, size);
return new_xattr;
}
/* /*
* Callback for security_inode_init_security() for acquiring xattrs. * Callback for security_inode_init_security() for acquiring xattrs.
*/ */
...@@ -2090,11 +2057,11 @@ static int shmem_initxattrs(struct inode *inode, ...@@ -2090,11 +2057,11 @@ static int shmem_initxattrs(struct inode *inode,
{ {
struct shmem_inode_info *info = SHMEM_I(inode); struct shmem_inode_info *info = SHMEM_I(inode);
const struct xattr *xattr; const struct xattr *xattr;
struct shmem_xattr *new_xattr; struct simple_xattr *new_xattr;
size_t len; size_t len;
for (xattr = xattr_array; xattr->name != NULL; xattr++) { for (xattr = xattr_array; xattr->name != NULL; xattr++) {
new_xattr = shmem_xattr_alloc(xattr->value, xattr->value_len); new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len);
if (!new_xattr) if (!new_xattr)
return -ENOMEM; return -ENOMEM;
...@@ -2111,91 +2078,12 @@ static int shmem_initxattrs(struct inode *inode, ...@@ -2111,91 +2078,12 @@ static int shmem_initxattrs(struct inode *inode,
memcpy(new_xattr->name + XATTR_SECURITY_PREFIX_LEN, memcpy(new_xattr->name + XATTR_SECURITY_PREFIX_LEN,
xattr->name, len); xattr->name, len);
spin_lock(&info->lock); simple_xattr_list_add(&info->xattrs, new_xattr);
list_add(&new_xattr->list, &info->xattr_list);
spin_unlock(&info->lock);
} }
return 0; return 0;
} }
static int shmem_xattr_get(struct dentry *dentry, const char *name,
void *buffer, size_t size)
{
struct shmem_inode_info *info;
struct shmem_xattr *xattr;
int ret = -ENODATA;
info = SHMEM_I(dentry->d_inode);
spin_lock(&info->lock);
list_for_each_entry(xattr, &info->xattr_list, list) {
if (strcmp(name, xattr->name))
continue;
ret = xattr->size;
if (buffer) {
if (size < xattr->size)
ret = -ERANGE;
else
memcpy(buffer, xattr->value, xattr->size);
}
break;
}
spin_unlock(&info->lock);
return ret;
}
static int shmem_xattr_set(struct inode *inode, const char *name,
const void *value, size_t size, int flags)
{
struct shmem_inode_info *info = SHMEM_I(inode);
struct shmem_xattr *xattr;
struct shmem_xattr *new_xattr = NULL;
int err = 0;
/* value == NULL means remove */
if (value) {
new_xattr = shmem_xattr_alloc(value, size);
if (!new_xattr)
return -ENOMEM;
new_xattr->name = kstrdup(name, GFP_KERNEL);
if (!new_xattr->name) {
kfree(new_xattr);
return -ENOMEM;
}
}
spin_lock(&info->lock);
list_for_each_entry(xattr, &info->xattr_list, list) {
if (!strcmp(name, xattr->name)) {
if (flags & XATTR_CREATE) {
xattr = new_xattr;
err = -EEXIST;
} else if (new_xattr) {
list_replace(&xattr->list, &new_xattr->list);
} else {
list_del(&xattr->list);
}
goto out;
}
}
if (flags & XATTR_REPLACE) {
xattr = new_xattr;
err = -ENODATA;
} else {
list_add(&new_xattr->list, &info->xattr_list);
xattr = NULL;
}
out:
spin_unlock(&info->lock);
if (xattr)
kfree(xattr->name);
kfree(xattr);
return err;
}
static const struct xattr_handler *shmem_xattr_handlers[] = { static const struct xattr_handler *shmem_xattr_handlers[] = {
#ifdef CONFIG_TMPFS_POSIX_ACL #ifdef CONFIG_TMPFS_POSIX_ACL
&generic_acl_access_handler, &generic_acl_access_handler,
...@@ -2226,6 +2114,7 @@ static int shmem_xattr_validate(const char *name) ...@@ -2226,6 +2114,7 @@ static int shmem_xattr_validate(const char *name)
static ssize_t shmem_getxattr(struct dentry *dentry, const char *name, static ssize_t shmem_getxattr(struct dentry *dentry, const char *name,
void *buffer, size_t size) void *buffer, size_t size)
{ {
struct shmem_inode_info *info = SHMEM_I(dentry->d_inode);
int err; int err;
/* /*
...@@ -2240,12 +2129,13 @@ static ssize_t shmem_getxattr(struct dentry *dentry, const char *name, ...@@ -2240,12 +2129,13 @@ static ssize_t shmem_getxattr(struct dentry *dentry, const char *name,
if (err) if (err)
return err; return err;
return shmem_xattr_get(dentry, name, buffer, size); return simple_xattr_get(&info->xattrs, name, buffer, size);
} }
static int shmem_setxattr(struct dentry *dentry, const char *name, static int shmem_setxattr(struct dentry *dentry, const char *name,
const void *value, size_t size, int flags) const void *value, size_t size, int flags)
{ {
struct shmem_inode_info *info = SHMEM_I(dentry->d_inode);
int err; int err;
/* /*
...@@ -2260,15 +2150,12 @@ static int shmem_setxattr(struct dentry *dentry, const char *name, ...@@ -2260,15 +2150,12 @@ static int shmem_setxattr(struct dentry *dentry, const char *name,
if (err) if (err)
return err; return err;
if (size == 0) return simple_xattr_set(&info->xattrs, name, value, size, flags);
value = ""; /* empty EA, do not remove */
return shmem_xattr_set(dentry->d_inode, name, value, size, flags);
} }
static int shmem_removexattr(struct dentry *dentry, const char *name) static int shmem_removexattr(struct dentry *dentry, const char *name)
{ {
struct shmem_inode_info *info = SHMEM_I(dentry->d_inode);
int err; int err;
/* /*
...@@ -2283,45 +2170,13 @@ static int shmem_removexattr(struct dentry *dentry, const char *name) ...@@ -2283,45 +2170,13 @@ static int shmem_removexattr(struct dentry *dentry, const char *name)
if (err) if (err)
return err; return err;
return shmem_xattr_set(dentry->d_inode, name, NULL, 0, XATTR_REPLACE); return simple_xattr_remove(&info->xattrs, name);
}
static bool xattr_is_trusted(const char *name)
{
return !strncmp(name, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN);
} }
static ssize_t shmem_listxattr(struct dentry *dentry, char *buffer, size_t size) static ssize_t shmem_listxattr(struct dentry *dentry, char *buffer, size_t size)
{ {
bool trusted = capable(CAP_SYS_ADMIN); struct shmem_inode_info *info = SHMEM_I(dentry->d_inode);
struct shmem_xattr *xattr; return simple_xattr_list(&info->xattrs, buffer, size);
struct shmem_inode_info *info;
size_t used = 0;
info = SHMEM_I(dentry->d_inode);
spin_lock(&info->lock);
list_for_each_entry(xattr, &info->xattr_list, list) {
size_t len;
/* skip "trusted." attributes for unprivileged callers */
if (!trusted && xattr_is_trusted(xattr->name))
continue;
len = strlen(xattr->name) + 1;
used += len;
if (buffer) {
if (size < used) {
used = -ERANGE;
break;
}
memcpy(buffer, xattr->name, len);
buffer += len;
}
}
spin_unlock(&info->lock);
return used;
} }
#endif /* CONFIG_TMPFS_XATTR */ #endif /* CONFIG_TMPFS_XATTR */
......
...@@ -326,9 +326,7 @@ struct cgroup_subsys net_prio_subsys = { ...@@ -326,9 +326,7 @@ struct cgroup_subsys net_prio_subsys = {
.create = cgrp_create, .create = cgrp_create,
.destroy = cgrp_destroy, .destroy = cgrp_destroy,
.attach = net_prio_attach, .attach = net_prio_attach,
#ifdef CONFIG_NETPRIO_CGROUP
.subsys_id = net_prio_subsys_id, .subsys_id = net_prio_subsys_id,
#endif
.base_cftypes = ss_files, .base_cftypes = ss_files,
.module = THIS_MODULE .module = THIS_MODULE
}; };
...@@ -366,10 +364,6 @@ static int __init init_cgroup_netprio(void) ...@@ -366,10 +364,6 @@ static int __init init_cgroup_netprio(void)
ret = cgroup_load_subsys(&net_prio_subsys); ret = cgroup_load_subsys(&net_prio_subsys);
if (ret) if (ret)
goto out; goto out;
#ifndef CONFIG_NETPRIO_CGROUP
smp_wmb();
net_prio_subsys_id = net_prio_subsys.subsys_id;
#endif
register_netdevice_notifier(&netprio_device_notifier); register_netdevice_notifier(&netprio_device_notifier);
...@@ -386,11 +380,6 @@ static void __exit exit_cgroup_netprio(void) ...@@ -386,11 +380,6 @@ static void __exit exit_cgroup_netprio(void)
cgroup_unload_subsys(&net_prio_subsys); cgroup_unload_subsys(&net_prio_subsys);
#ifndef CONFIG_NETPRIO_CGROUP
net_prio_subsys_id = -1;
synchronize_rcu();
#endif
rtnl_lock(); rtnl_lock();
for_each_netdev(&init_net, dev) { for_each_netdev(&init_net, dev) {
old = rtnl_dereference(dev->priomap); old = rtnl_dereference(dev->priomap);
......
...@@ -326,17 +326,6 @@ int __sk_backlog_rcv(struct sock *sk, struct sk_buff *skb) ...@@ -326,17 +326,6 @@ int __sk_backlog_rcv(struct sock *sk, struct sk_buff *skb)
} }
EXPORT_SYMBOL(__sk_backlog_rcv); EXPORT_SYMBOL(__sk_backlog_rcv);
#if defined(CONFIG_CGROUPS)
#if !defined(CONFIG_NET_CLS_CGROUP)
int net_cls_subsys_id = -1;
EXPORT_SYMBOL_GPL(net_cls_subsys_id);
#endif
#if !defined(CONFIG_NETPRIO_CGROUP)
int net_prio_subsys_id = -1;
EXPORT_SYMBOL_GPL(net_prio_subsys_id);
#endif
#endif
static int sock_set_timeout(long *timeo_p, char __user *optval, int optlen) static int sock_set_timeout(long *timeo_p, char __user *optval, int optlen)
{ {
struct timeval tv; struct timeval tv;
...@@ -1224,6 +1213,7 @@ static void sk_prot_free(struct proto *prot, struct sock *sk) ...@@ -1224,6 +1213,7 @@ static void sk_prot_free(struct proto *prot, struct sock *sk)
} }
#ifdef CONFIG_CGROUPS #ifdef CONFIG_CGROUPS
#if IS_ENABLED(CONFIG_NET_CLS_CGROUP)
void sock_update_classid(struct sock *sk) void sock_update_classid(struct sock *sk)
{ {
u32 classid; u32 classid;
...@@ -1235,7 +1225,9 @@ void sock_update_classid(struct sock *sk) ...@@ -1235,7 +1225,9 @@ void sock_update_classid(struct sock *sk)
sk->sk_classid = classid; sk->sk_classid = classid;
} }
EXPORT_SYMBOL(sock_update_classid); EXPORT_SYMBOL(sock_update_classid);
#endif
#if IS_ENABLED(CONFIG_NETPRIO_CGROUP)
void sock_update_netprioidx(struct sock *sk, struct task_struct *task) void sock_update_netprioidx(struct sock *sk, struct task_struct *task)
{ {
if (in_interrupt()) if (in_interrupt())
...@@ -1245,6 +1237,7 @@ void sock_update_netprioidx(struct sock *sk, struct task_struct *task) ...@@ -1245,6 +1237,7 @@ void sock_update_netprioidx(struct sock *sk, struct task_struct *task)
} }
EXPORT_SYMBOL_GPL(sock_update_netprioidx); EXPORT_SYMBOL_GPL(sock_update_netprioidx);
#endif #endif
#endif
/** /**
* sk_alloc - All socket objects are allocated here * sk_alloc - All socket objects are allocated here
......
...@@ -77,9 +77,7 @@ struct cgroup_subsys net_cls_subsys = { ...@@ -77,9 +77,7 @@ struct cgroup_subsys net_cls_subsys = {
.name = "net_cls", .name = "net_cls",
.create = cgrp_create, .create = cgrp_create,
.destroy = cgrp_destroy, .destroy = cgrp_destroy,
#ifdef CONFIG_NET_CLS_CGROUP
.subsys_id = net_cls_subsys_id, .subsys_id = net_cls_subsys_id,
#endif
.base_cftypes = ss_files, .base_cftypes = ss_files,
.module = THIS_MODULE, .module = THIS_MODULE,
}; };
...@@ -283,12 +281,6 @@ static int __init init_cgroup_cls(void) ...@@ -283,12 +281,6 @@ static int __init init_cgroup_cls(void)
if (ret) if (ret)
goto out; goto out;
#ifndef CONFIG_NET_CLS_CGROUP
/* We can't use rcu_assign_pointer because this is an int. */
smp_wmb();
net_cls_subsys_id = net_cls_subsys.subsys_id;
#endif
ret = register_tcf_proto_ops(&cls_cgroup_ops); ret = register_tcf_proto_ops(&cls_cgroup_ops);
if (ret) if (ret)
cgroup_unload_subsys(&net_cls_subsys); cgroup_unload_subsys(&net_cls_subsys);
...@@ -301,11 +293,6 @@ static void __exit exit_cgroup_cls(void) ...@@ -301,11 +293,6 @@ static void __exit exit_cgroup_cls(void)
{ {
unregister_tcf_proto_ops(&cls_cgroup_ops); unregister_tcf_proto_ops(&cls_cgroup_ops);
#ifndef CONFIG_NET_CLS_CGROUP
net_cls_subsys_id = -1;
synchronize_rcu();
#endif
cgroup_unload_subsys(&net_cls_subsys); cgroup_unload_subsys(&net_cls_subsys);
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment