2005-04-17 05:20:36 +07:00
|
|
|
/*
|
2007-09-20 15:31:38 +07:00
|
|
|
* fs/sysfs/dir.c - sysfs core and dir operation implementation
|
|
|
|
*
|
|
|
|
* Copyright (c) 2001-3 Patrick Mochel
|
|
|
|
* Copyright (c) 2007 SUSE Linux Products GmbH
|
|
|
|
* Copyright (c) 2007 Tejun Heo <teheo@suse.de>
|
|
|
|
*
|
|
|
|
* This file is released under the GPLv2.
|
|
|
|
*
|
|
|
|
* Please see Documentation/filesystems/sysfs.txt for more information.
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
|
|
|
|
|
|
|
#undef DEBUG
|
|
|
|
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/mount.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kobject.h>
|
2005-06-23 14:09:12 +07:00
|
|
|
#include <linux/namei.h>
|
2007-06-14 01:45:13 +07:00
|
|
|
#include <linux/idr.h>
|
2007-06-14 01:45:18 +07:00
|
|
|
#include <linux/completion.h>
|
2007-07-26 21:53:53 +07:00
|
|
|
#include <linux/mutex.h>
|
2008-03-14 09:41:52 +07:00
|
|
|
#include <linux/slab.h>
|
2009-11-04 17:50:06 +07:00
|
|
|
#include <linux/security.h>
|
2011-12-19 11:05:43 +07:00
|
|
|
#include <linux/hash.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include "sysfs.h"
|
|
|
|
|
2007-06-14 02:27:23 +07:00
|
|
|
DEFINE_MUTEX(sysfs_mutex);
|
2013-10-30 21:28:36 +07:00
|
|
|
DEFINE_SPINLOCK(sysfs_symlink_target_lock);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2013-09-12 09:29:03 +07:00
|
|
|
#define to_sysfs_dirent(X) rb_entry((X), struct sysfs_dirent, s_rb)
|
2011-12-19 11:05:43 +07:00
|
|
|
|
2007-10-17 13:30:25 +07:00
|
|
|
static DEFINE_SPINLOCK(sysfs_ino_lock);
|
2007-06-14 01:45:13 +07:00
|
|
|
static DEFINE_IDA(sysfs_ino_ida);
|
|
|
|
|
2007-06-14 01:45:18 +07:00
|
|
|
/**
|
2011-12-19 11:05:43 +07:00
|
|
|
* sysfs_name_hash
|
|
|
|
* @name: Null terminated string to hash
|
2013-09-12 09:29:09 +07:00
|
|
|
* @ns: Namespace tag to hash
|
2011-12-19 11:05:43 +07:00
|
|
|
*
|
|
|
|
* Returns 31 bit hash of ns + name (so it fits in an off_t )
|
|
|
|
*/
|
2013-09-12 09:29:09 +07:00
|
|
|
static unsigned int sysfs_name_hash(const char *name, const void *ns)
|
2011-12-19 11:05:43 +07:00
|
|
|
{
|
|
|
|
unsigned long hash = init_name_hash();
|
|
|
|
unsigned int len = strlen(name);
|
|
|
|
while (len--)
|
|
|
|
hash = partial_name_hash(*name++, hash);
|
2013-08-22 06:28:26 +07:00
|
|
|
hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31));
|
2011-12-19 11:05:43 +07:00
|
|
|
hash &= 0x7fffffffU;
|
|
|
|
/* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
|
|
|
|
if (hash < 1)
|
|
|
|
hash += 2;
|
|
|
|
if (hash >= INT_MAX)
|
|
|
|
hash = INT_MAX - 1;
|
|
|
|
return hash;
|
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
static int sysfs_name_compare(unsigned int hash, const char *name,
|
|
|
|
const void *ns, const struct sysfs_dirent *sd)
|
2011-12-19 11:05:43 +07:00
|
|
|
{
|
|
|
|
if (hash != sd->s_hash)
|
|
|
|
return hash - sd->s_hash;
|
|
|
|
if (ns != sd->s_ns)
|
|
|
|
return ns - sd->s_ns;
|
|
|
|
return strcmp(name, sd->s_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int sysfs_sd_compare(const struct sysfs_dirent *left,
|
|
|
|
const struct sysfs_dirent *right)
|
|
|
|
{
|
2013-09-12 09:29:09 +07:00
|
|
|
return sysfs_name_compare(left->s_hash, left->s_name, left->s_ns,
|
2011-12-19 11:05:43 +07:00
|
|
|
right);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-05-13 10:11:05 +07:00
|
|
|
* sysfs_link_sibling - link sysfs_dirent into sibling rbtree
|
2007-06-14 01:45:18 +07:00
|
|
|
* @sd: sysfs_dirent of interest
|
|
|
|
*
|
2011-12-19 11:05:43 +07:00
|
|
|
* Link @sd into its sibling rbtree which starts from
|
2007-09-20 14:05:12 +07:00
|
|
|
* sd->s_parent->s_dir.children.
|
2007-06-14 01:45:18 +07:00
|
|
|
*
|
|
|
|
* Locking:
|
2007-06-14 02:27:23 +07:00
|
|
|
* mutex_lock(sysfs_mutex)
|
2011-12-19 11:05:43 +07:00
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* 0 on susccess -EEXIST on failure.
|
2007-06-14 01:45:18 +07:00
|
|
|
*/
|
2011-12-19 11:05:43 +07:00
|
|
|
static int sysfs_link_sibling(struct sysfs_dirent *sd)
|
2007-06-14 01:45:18 +07:00
|
|
|
{
|
2011-12-19 11:05:43 +07:00
|
|
|
struct rb_node **node = &sd->s_parent->s_dir.children.rb_node;
|
|
|
|
struct rb_node *parent = NULL;
|
2011-07-26 04:55:57 +07:00
|
|
|
|
2012-03-09 04:03:10 +07:00
|
|
|
if (sysfs_type(sd) == SYSFS_DIR)
|
|
|
|
sd->s_parent->s_dir.subdirs++;
|
|
|
|
|
2011-12-19 11:05:43 +07:00
|
|
|
while (*node) {
|
|
|
|
struct sysfs_dirent *pos;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
pos = to_sysfs_dirent(*node);
|
|
|
|
parent = *node;
|
|
|
|
result = sysfs_sd_compare(sd, pos);
|
|
|
|
if (result < 0)
|
|
|
|
node = &pos->s_rb.rb_left;
|
|
|
|
else if (result > 0)
|
|
|
|
node = &pos->s_rb.rb_right;
|
|
|
|
else
|
|
|
|
return -EEXIST;
|
2011-07-26 04:55:57 +07:00
|
|
|
}
|
2011-12-19 11:05:43 +07:00
|
|
|
/* add new node and rebalance the tree */
|
|
|
|
rb_link_node(&sd->s_rb, parent, node);
|
|
|
|
rb_insert_color(&sd->s_rb, &sd->s_parent->s_dir.children);
|
|
|
|
return 0;
|
2007-06-14 01:45:18 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2011-12-19 11:05:43 +07:00
|
|
|
* sysfs_unlink_sibling - unlink sysfs_dirent from sibling rbtree
|
2007-06-14 01:45:18 +07:00
|
|
|
* @sd: sysfs_dirent of interest
|
|
|
|
*
|
2011-12-19 11:05:43 +07:00
|
|
|
* Unlink @sd from its sibling rbtree which starts from
|
2007-09-20 14:05:12 +07:00
|
|
|
* sd->s_parent->s_dir.children.
|
2007-06-14 01:45:18 +07:00
|
|
|
*
|
|
|
|
* Locking:
|
2007-06-14 02:27:23 +07:00
|
|
|
* mutex_lock(sysfs_mutex)
|
2007-06-14 01:45:18 +07:00
|
|
|
*/
|
2007-08-02 19:38:03 +07:00
|
|
|
static void sysfs_unlink_sibling(struct sysfs_dirent *sd)
|
2007-06-14 01:45:18 +07:00
|
|
|
{
|
2012-03-09 04:03:10 +07:00
|
|
|
if (sysfs_type(sd) == SYSFS_DIR)
|
|
|
|
sd->s_parent->s_dir.subdirs--;
|
|
|
|
|
2011-12-19 11:05:43 +07:00
|
|
|
rb_erase(&sd->s_rb, &sd->s_parent->s_dir.children);
|
2007-06-14 01:45:18 +07:00
|
|
|
}
|
|
|
|
|
2007-06-14 01:45:18 +07:00
|
|
|
/**
|
|
|
|
* sysfs_get_active - get an active reference to sysfs_dirent
|
|
|
|
* @sd: sysfs_dirent to get an active reference to
|
|
|
|
*
|
|
|
|
* Get an active reference of @sd. This function is noop if @sd
|
|
|
|
* is NULL.
|
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* Pointer to @sd on success, NULL on failure.
|
|
|
|
*/
|
2010-02-12 06:18:38 +07:00
|
|
|
struct sysfs_dirent *sysfs_get_active(struct sysfs_dirent *sd)
|
2007-06-14 01:45:18 +07:00
|
|
|
{
|
2007-06-14 01:45:18 +07:00
|
|
|
if (unlikely(!sd))
|
|
|
|
return NULL;
|
|
|
|
|
2013-03-08 22:07:27 +07:00
|
|
|
if (!atomic_inc_unless_negative(&sd->s_active))
|
|
|
|
return NULL;
|
2012-05-15 00:30:03 +07:00
|
|
|
|
2013-10-14 20:27:11 +07:00
|
|
|
if (likely(!sysfs_ignore_lockdep(sd)))
|
2012-05-15 00:30:03 +07:00
|
|
|
rwsem_acquire_read(&sd->dep_map, 0, 1, _RET_IP_);
|
|
|
|
return sd;
|
2007-06-14 01:45:18 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* sysfs_put_active - put an active reference to sysfs_dirent
|
|
|
|
* @sd: sysfs_dirent to put an active reference to
|
|
|
|
*
|
|
|
|
* Put an active reference to @sd. This function is noop if @sd
|
|
|
|
* is NULL.
|
|
|
|
*/
|
2010-02-12 06:18:38 +07:00
|
|
|
void sysfs_put_active(struct sysfs_dirent *sd)
|
2007-06-14 01:45:18 +07:00
|
|
|
{
|
2007-06-14 01:45:18 +07:00
|
|
|
int v;
|
|
|
|
|
|
|
|
if (unlikely(!sd))
|
|
|
|
return;
|
|
|
|
|
2013-10-14 20:27:11 +07:00
|
|
|
if (likely(!sysfs_ignore_lockdep(sd)))
|
2012-05-15 00:30:03 +07:00
|
|
|
rwsem_release(&sd->dep_map, 1, _RET_IP_);
|
2007-06-14 01:45:18 +07:00
|
|
|
v = atomic_dec_return(&sd->s_active);
|
|
|
|
if (likely(v != SD_DEACTIVATED_BIAS))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* atomic_dec_return() is a mb(), we'll always see the updated
|
2011-07-22 07:01:12 +07:00
|
|
|
* sd->u.completion.
|
2007-06-14 01:45:18 +07:00
|
|
|
*/
|
2011-07-22 07:01:12 +07:00
|
|
|
complete(sd->u.completion);
|
2007-06-14 01:45:18 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* sysfs_deactivate - deactivate sysfs_dirent
|
|
|
|
* @sd: sysfs_dirent to deactivate
|
|
|
|
*
|
2007-06-14 01:45:18 +07:00
|
|
|
* Deny new active references and drain existing ones.
|
2007-06-14 01:45:18 +07:00
|
|
|
*/
|
2007-06-14 02:27:24 +07:00
|
|
|
static void sysfs_deactivate(struct sysfs_dirent *sd)
|
2007-06-14 01:45:18 +07:00
|
|
|
{
|
2007-06-14 01:45:18 +07:00
|
|
|
DECLARE_COMPLETION_ONSTACK(wait);
|
|
|
|
int v;
|
2007-06-14 01:45:18 +07:00
|
|
|
|
2011-07-22 07:01:12 +07:00
|
|
|
BUG_ON(!(sd->s_flags & SYSFS_FLAG_REMOVED));
|
2010-02-12 06:20:00 +07:00
|
|
|
|
|
|
|
if (!(sysfs_type(sd) & SYSFS_ACTIVE_REF))
|
|
|
|
return;
|
|
|
|
|
2011-07-22 07:01:12 +07:00
|
|
|
sd->u.completion = (void *)&wait;
|
2007-06-14 01:45:18 +07:00
|
|
|
|
2010-01-03 04:37:12 +07:00
|
|
|
rwsem_acquire(&sd->dep_map, 0, 0, _RET_IP_);
|
2007-06-14 01:45:18 +07:00
|
|
|
/* atomic_add_return() is a mb(), put_active() will always see
|
2011-07-22 07:01:12 +07:00
|
|
|
* the updated sd->u.completion.
|
2007-06-14 01:45:18 +07:00
|
|
|
*/
|
2007-06-14 01:45:18 +07:00
|
|
|
v = atomic_add_return(SD_DEACTIVATED_BIAS, &sd->s_active);
|
|
|
|
|
2010-01-03 04:37:12 +07:00
|
|
|
if (v != SD_DEACTIVATED_BIAS) {
|
|
|
|
lock_contended(&sd->dep_map, _RET_IP_);
|
2007-06-14 01:45:18 +07:00
|
|
|
wait_for_completion(&wait);
|
2010-01-03 04:37:12 +07:00
|
|
|
}
|
2007-06-14 01:45:18 +07:00
|
|
|
|
2010-01-03 04:37:12 +07:00
|
|
|
lock_acquired(&sd->dep_map, _RET_IP_);
|
|
|
|
rwsem_release(&sd->dep_map, 1, _RET_IP_);
|
2007-06-14 01:45:18 +07:00
|
|
|
}
|
|
|
|
|
2011-12-19 11:08:16 +07:00
|
|
|
static int sysfs_alloc_ino(unsigned int *pino)
|
2007-06-14 01:45:13 +07:00
|
|
|
{
|
|
|
|
int ino, rc;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
spin_lock(&sysfs_ino_lock);
|
|
|
|
rc = ida_get_new_above(&sysfs_ino_ida, 2, &ino);
|
|
|
|
spin_unlock(&sysfs_ino_lock);
|
|
|
|
|
|
|
|
if (rc == -EAGAIN) {
|
|
|
|
if (ida_pre_get(&sysfs_ino_ida, GFP_KERNEL))
|
|
|
|
goto retry;
|
|
|
|
rc = -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
*pino = ino;
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2011-12-19 11:08:16 +07:00
|
|
|
static void sysfs_free_ino(unsigned int ino)
|
2007-06-14 01:45:13 +07:00
|
|
|
{
|
|
|
|
spin_lock(&sysfs_ino_lock);
|
|
|
|
ida_remove(&sysfs_ino_ida, ino);
|
|
|
|
spin_unlock(&sysfs_ino_lock);
|
|
|
|
}
|
|
|
|
|
2013-08-22 06:28:26 +07:00
|
|
|
void release_sysfs_dirent(struct sysfs_dirent *sd)
|
2007-06-14 01:45:13 +07:00
|
|
|
{
|
2007-06-14 01:45:14 +07:00
|
|
|
struct sysfs_dirent *parent_sd;
|
|
|
|
|
|
|
|
repeat:
|
2007-06-14 02:27:23 +07:00
|
|
|
/* Moving/renaming is always done while holding reference.
|
|
|
|
* sd->s_parent won't change beneath us.
|
|
|
|
*/
|
2007-06-14 01:45:14 +07:00
|
|
|
parent_sd = sd->s_parent;
|
|
|
|
|
2013-04-04 21:22:37 +07:00
|
|
|
WARN(!(sd->s_flags & SYSFS_FLAG_REMOVED),
|
|
|
|
"sysfs: free using entry: %s/%s\n",
|
|
|
|
parent_sd ? parent_sd->s_name : "", sd->s_name);
|
|
|
|
|
2007-06-14 02:27:21 +07:00
|
|
|
if (sysfs_type(sd) == SYSFS_KOBJ_LINK)
|
2007-09-20 14:05:11 +07:00
|
|
|
sysfs_put(sd->s_symlink.target_sd);
|
2007-06-14 02:27:21 +07:00
|
|
|
if (sysfs_type(sd) & SYSFS_COPY_NAME)
|
2007-06-14 01:45:15 +07:00
|
|
|
kfree(sd->s_name);
|
2009-11-04 17:50:06 +07:00
|
|
|
if (sd->s_iattr && sd->s_iattr->ia_secdata)
|
|
|
|
security_release_secctx(sd->s_iattr->ia_secdata,
|
|
|
|
sd->s_iattr->ia_secdata_len);
|
2007-06-14 01:45:13 +07:00
|
|
|
kfree(sd->s_iattr);
|
2007-06-14 01:45:13 +07:00
|
|
|
sysfs_free_ino(sd->s_ino);
|
2007-06-14 01:45:13 +07:00
|
|
|
kmem_cache_free(sysfs_dir_cachep, sd);
|
2007-06-14 01:45:14 +07:00
|
|
|
|
|
|
|
sd = parent_sd;
|
|
|
|
if (sd && atomic_dec_and_test(&sd->s_count))
|
|
|
|
goto repeat;
|
2007-06-14 01:45:13 +07:00
|
|
|
}
|
|
|
|
|
2011-01-07 13:49:23 +07:00
|
|
|
static int sysfs_dentry_delete(const struct dentry *dentry)
|
2009-11-08 14:27:01 +07:00
|
|
|
{
|
|
|
|
struct sysfs_dirent *sd = dentry->d_fsdata;
|
2012-06-08 07:51:39 +07:00
|
|
|
return !(sd && !(sd->s_flags & SYSFS_FLAG_REMOVED));
|
2009-11-08 14:27:01 +07:00
|
|
|
}
|
|
|
|
|
2012-06-11 03:03:43 +07:00
|
|
|
static int sysfs_dentry_revalidate(struct dentry *dentry, unsigned int flags)
|
2009-11-08 14:27:01 +07:00
|
|
|
{
|
2011-01-07 13:49:57 +07:00
|
|
|
struct sysfs_dirent *sd;
|
2013-11-07 18:47:28 +07:00
|
|
|
int type;
|
2009-11-08 14:27:01 +07:00
|
|
|
|
2012-06-11 03:03:43 +07:00
|
|
|
if (flags & LOOKUP_RCU)
|
2011-01-07 13:49:57 +07:00
|
|
|
return -ECHILD;
|
|
|
|
|
|
|
|
sd = dentry->d_fsdata;
|
2009-11-08 14:27:01 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
|
|
|
|
|
|
|
/* The sysfs dirent has been deleted */
|
|
|
|
if (sd->s_flags & SYSFS_FLAG_REMOVED)
|
|
|
|
goto out_bad;
|
|
|
|
|
2009-11-21 07:08:56 +07:00
|
|
|
/* The sysfs dirent has been moved? */
|
|
|
|
if (dentry->d_parent->d_fsdata != sd->s_parent)
|
|
|
|
goto out_bad;
|
|
|
|
|
|
|
|
/* The sysfs dirent has been renamed */
|
|
|
|
if (strcmp(dentry->d_name.name, sd->s_name) != 0)
|
|
|
|
goto out_bad;
|
|
|
|
|
2012-07-06 16:09:07 +07:00
|
|
|
/* The sysfs dirent has been moved to a different namespace */
|
2013-11-07 18:47:28 +07:00
|
|
|
type = KOBJ_NS_TYPE_NONE;
|
|
|
|
if (sd->s_parent) {
|
|
|
|
type = sysfs_ns_type(sd->s_parent);
|
|
|
|
if (type != KOBJ_NS_TYPE_NONE &&
|
|
|
|
sysfs_info(dentry->d_sb)->ns[type] != sd->s_ns)
|
|
|
|
goto out_bad;
|
|
|
|
}
|
2012-07-06 16:09:07 +07:00
|
|
|
|
2009-11-08 14:27:01 +07:00
|
|
|
mutex_unlock(&sysfs_mutex);
|
|
|
|
out_valid:
|
|
|
|
return 1;
|
|
|
|
out_bad:
|
|
|
|
/* Remove the dentry from the dcache hashes.
|
|
|
|
* If this is a deleted dentry we use d_drop instead of d_delete
|
|
|
|
* so sysfs doesn't need to cope with negative dentries.
|
2009-11-21 07:08:56 +07:00
|
|
|
*
|
|
|
|
* If this is a dentry that has simply been renamed we
|
|
|
|
* use d_drop to remove it from the dcache lookup on its
|
|
|
|
* old parent. If this dentry persists later when a lookup
|
|
|
|
* is performed at its new name the dentry will be readded
|
|
|
|
* to the dcache hashes.
|
2009-11-08 14:27:01 +07:00
|
|
|
*/
|
|
|
|
mutex_unlock(&sysfs_mutex);
|
2013-09-05 16:44:41 +07:00
|
|
|
|
|
|
|
/* If we have submounts we must allow the vfs caches
|
|
|
|
* to lie about the state of the filesystem to prevent
|
|
|
|
* leaks and other nasty things.
|
|
|
|
*/
|
|
|
|
if (check_submounts_and_drop(dentry) != 0)
|
|
|
|
goto out_valid;
|
|
|
|
|
2009-11-08 14:27:01 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-06-08 07:51:39 +07:00
|
|
|
static void sysfs_dentry_release(struct dentry *dentry)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2012-06-08 07:51:39 +07:00
|
|
|
sysfs_put(dentry->d_fsdata);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2012-06-08 07:51:39 +07:00
|
|
|
const struct dentry_operations sysfs_dentry_ops = {
|
2009-11-08 14:27:01 +07:00
|
|
|
.d_revalidate = sysfs_dentry_revalidate,
|
|
|
|
.d_delete = sysfs_dentry_delete,
|
2012-06-08 07:51:39 +07:00
|
|
|
.d_release = sysfs_dentry_release,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
2007-06-14 01:45:15 +07:00
|
|
|
struct sysfs_dirent *sysfs_new_dirent(const char *name, umode_t mode, int type)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-06-14 01:45:15 +07:00
|
|
|
char *dup_name = NULL;
|
2007-07-14 09:03:35 +07:00
|
|
|
struct sysfs_dirent *sd;
|
2007-06-14 01:45:15 +07:00
|
|
|
|
|
|
|
if (type & SYSFS_COPY_NAME) {
|
|
|
|
name = dup_name = kstrdup(name, GFP_KERNEL);
|
|
|
|
if (!name)
|
2007-07-14 09:03:35 +07:00
|
|
|
return NULL;
|
2007-06-14 01:45:15 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-02-10 16:45:03 +07:00
|
|
|
sd = kmem_cache_zalloc(sysfs_dir_cachep, GFP_KERNEL);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (!sd)
|
2007-07-14 09:03:35 +07:00
|
|
|
goto err_out1;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-06-14 01:45:15 +07:00
|
|
|
if (sysfs_alloc_ino(&sd->s_ino))
|
2007-07-14 09:03:35 +07:00
|
|
|
goto err_out2;
|
2007-06-14 01:45:13 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
atomic_set(&sd->s_count, 1);
|
2007-06-14 01:45:18 +07:00
|
|
|
atomic_set(&sd->s_active, 0);
|
2007-06-14 01:45:14 +07:00
|
|
|
|
2007-06-14 01:45:15 +07:00
|
|
|
sd->s_name = name;
|
2007-06-14 01:45:14 +07:00
|
|
|
sd->s_mode = mode;
|
2013-04-04 21:22:37 +07:00
|
|
|
sd->s_flags = type | SYSFS_FLAG_REMOVED;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
return sd;
|
2007-06-14 01:45:15 +07:00
|
|
|
|
2007-07-14 09:03:35 +07:00
|
|
|
err_out2:
|
2007-06-14 01:45:15 +07:00
|
|
|
kmem_cache_free(sysfs_dir_cachep, sd);
|
2007-07-14 09:03:35 +07:00
|
|
|
err_out1:
|
|
|
|
kfree(dup_name);
|
2007-06-14 01:45:15 +07:00
|
|
|
return NULL;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:23 +07:00
|
|
|
/**
|
2007-06-14 02:27:24 +07:00
|
|
|
* sysfs_addrm_start - prepare for sysfs_dirent add/remove
|
|
|
|
* @acxt: pointer to sysfs_addrm_cxt to be used
|
2007-06-14 02:27:23 +07:00
|
|
|
*
|
2013-09-19 04:15:35 +07:00
|
|
|
* This function is called when the caller is about to add or remove
|
|
|
|
* sysfs_dirent. This function acquires sysfs_mutex. @acxt is used
|
|
|
|
* to keep and pass context to other addrm functions.
|
2007-06-14 02:27:23 +07:00
|
|
|
*
|
|
|
|
* LOCKING:
|
2007-06-14 02:27:24 +07:00
|
|
|
* Kernel thread context (may sleep). sysfs_mutex is locked on
|
2009-11-21 07:08:55 +07:00
|
|
|
* return.
|
2007-06-14 02:27:23 +07:00
|
|
|
*/
|
2013-09-19 04:15:35 +07:00
|
|
|
void sysfs_addrm_start(struct sysfs_addrm_cxt *acxt)
|
|
|
|
__acquires(sysfs_mutex)
|
2007-01-25 02:35:52 +07:00
|
|
|
{
|
2007-06-14 02:27:24 +07:00
|
|
|
memset(acxt, 0, sizeof(*acxt));
|
|
|
|
|
|
|
|
mutex_lock(&sysfs_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2008-06-10 16:09:08 +07:00
|
|
|
* __sysfs_add_one - add sysfs_dirent to parent without warning
|
2007-06-14 02:27:24 +07:00
|
|
|
* @acxt: addrm context to use
|
|
|
|
* @sd: sysfs_dirent to be added
|
2013-09-19 04:15:35 +07:00
|
|
|
* @parent_sd: the parent sysfs_dirent to add @sd to
|
2007-06-14 02:27:24 +07:00
|
|
|
*
|
2013-09-19 04:15:35 +07:00
|
|
|
* Get @parent_sd and set @sd->s_parent to it and increment nlink of
|
|
|
|
* the parent inode if @sd is a directory and link into the children
|
|
|
|
* list of the parent.
|
2007-06-14 02:27:24 +07:00
|
|
|
*
|
|
|
|
* This function should be called between calls to
|
|
|
|
* sysfs_addrm_start() and sysfs_addrm_finish() and should be
|
|
|
|
* passed the same @acxt as passed to sysfs_addrm_start().
|
|
|
|
*
|
|
|
|
* LOCKING:
|
|
|
|
* Determined by sysfs_addrm_start().
|
2007-08-02 19:38:03 +07:00
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* 0 on success, -EEXIST if entry with the given name already
|
|
|
|
* exists.
|
2007-06-14 02:27:24 +07:00
|
|
|
*/
|
2013-09-19 04:15:35 +07:00
|
|
|
int __sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
|
|
|
|
struct sysfs_dirent *parent_sd)
|
2007-06-14 02:27:24 +07:00
|
|
|
{
|
2009-11-21 07:08:51 +07:00
|
|
|
struct sysfs_inode_attrs *ps_iattr;
|
2011-12-19 11:05:43 +07:00
|
|
|
int ret;
|
2009-11-21 07:08:51 +07:00
|
|
|
|
2013-11-07 18:47:28 +07:00
|
|
|
if (!!sysfs_ns_type(parent_sd) != !!sd->s_ns) {
|
|
|
|
WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n",
|
|
|
|
sysfs_ns_type(parent_sd) ? "required" : "invalid",
|
|
|
|
parent_sd->s_name, sd->s_name);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
|
2013-09-19 04:15:35 +07:00
|
|
|
sd->s_parent = sysfs_get(parent_sd);
|
2007-06-14 02:27:24 +07:00
|
|
|
|
2011-12-19 11:05:43 +07:00
|
|
|
ret = sysfs_link_sibling(sd);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2007-08-02 19:38:03 +07:00
|
|
|
|
2009-11-21 07:08:51 +07:00
|
|
|
/* Update timestamps on the parent */
|
2013-09-19 04:15:35 +07:00
|
|
|
ps_iattr = parent_sd->s_iattr;
|
2009-11-21 07:08:51 +07:00
|
|
|
if (ps_iattr) {
|
|
|
|
struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
|
|
|
|
ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
|
|
|
|
}
|
|
|
|
|
2013-04-04 21:22:37 +07:00
|
|
|
/* Mark the entry added into directory tree */
|
|
|
|
sd->s_flags &= ~SYSFS_FLAG_REMOVED;
|
|
|
|
|
2007-08-02 19:38:03 +07:00
|
|
|
return 0;
|
2007-06-14 02:27:24 +07:00
|
|
|
}
|
|
|
|
|
2009-02-13 00:56:59 +07:00
|
|
|
/**
|
|
|
|
* sysfs_pathname - return full path to sysfs dirent
|
|
|
|
* @sd: sysfs_dirent whose path we want
|
2012-09-30 03:23:19 +07:00
|
|
|
* @path: caller allocated buffer of size PATH_MAX
|
2009-02-13 00:56:59 +07:00
|
|
|
*
|
|
|
|
* Gives the name "/" to the sysfs_root entry; any path returned
|
|
|
|
* is relative to wherever sysfs is mounted.
|
|
|
|
*/
|
|
|
|
static char *sysfs_pathname(struct sysfs_dirent *sd, char *path)
|
|
|
|
{
|
|
|
|
if (sd->s_parent) {
|
|
|
|
sysfs_pathname(sd->s_parent, path);
|
2012-09-30 03:23:19 +07:00
|
|
|
strlcat(path, "/", PATH_MAX);
|
2009-02-13 00:56:59 +07:00
|
|
|
}
|
2012-09-30 03:23:19 +07:00
|
|
|
strlcat(path, sd->s_name, PATH_MAX);
|
2009-02-13 00:56:59 +07:00
|
|
|
return path;
|
|
|
|
}
|
|
|
|
|
2013-10-24 22:49:11 +07:00
|
|
|
void sysfs_warn_dup(struct sysfs_dirent *parent, const char *name)
|
|
|
|
{
|
|
|
|
char *path;
|
|
|
|
|
|
|
|
path = kzalloc(PATH_MAX, GFP_KERNEL);
|
|
|
|
if (path) {
|
|
|
|
sysfs_pathname(parent, path);
|
|
|
|
strlcat(path, "/", PATH_MAX);
|
|
|
|
strlcat(path, name, PATH_MAX);
|
|
|
|
}
|
|
|
|
|
|
|
|
WARN(1, KERN_WARNING "sysfs: cannot create duplicate filename '%s'\n",
|
|
|
|
path ? path : name);
|
|
|
|
|
|
|
|
kfree(path);
|
|
|
|
}
|
|
|
|
|
2008-06-10 16:09:08 +07:00
|
|
|
/**
|
|
|
|
* sysfs_add_one - add sysfs_dirent to parent
|
|
|
|
* @acxt: addrm context to use
|
|
|
|
* @sd: sysfs_dirent to be added
|
2013-09-19 04:15:35 +07:00
|
|
|
* @parent_sd: the parent sysfs_dirent to add @sd to
|
2008-06-10 16:09:08 +07:00
|
|
|
*
|
2013-09-19 04:15:35 +07:00
|
|
|
* Get @parent_sd and set @sd->s_parent to it and increment nlink of
|
|
|
|
* the parent inode if @sd is a directory and link into the children
|
|
|
|
* list of the parent.
|
2008-06-10 16:09:08 +07:00
|
|
|
*
|
|
|
|
* This function should be called between calls to
|
|
|
|
* sysfs_addrm_start() and sysfs_addrm_finish() and should be
|
|
|
|
* passed the same @acxt as passed to sysfs_addrm_start().
|
|
|
|
*
|
|
|
|
* LOCKING:
|
|
|
|
* Determined by sysfs_addrm_start().
|
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* 0 on success, -EEXIST if entry with the given name already
|
|
|
|
* exists.
|
|
|
|
*/
|
2013-09-19 04:15:35 +07:00
|
|
|
int sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
|
|
|
|
struct sysfs_dirent *parent_sd)
|
2008-06-10 16:09:08 +07:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2013-09-19 04:15:35 +07:00
|
|
|
ret = __sysfs_add_one(acxt, sd, parent_sd);
|
2009-02-13 00:56:59 +07:00
|
|
|
|
2013-10-24 22:49:11 +07:00
|
|
|
if (ret == -EEXIST)
|
|
|
|
sysfs_warn_dup(parent_sd, sd->s_name);
|
2008-06-10 16:09:08 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:24 +07:00
|
|
|
/**
|
|
|
|
* sysfs_remove_one - remove sysfs_dirent from parent
|
|
|
|
* @acxt: addrm context to use
|
2008-01-09 00:11:24 +07:00
|
|
|
* @sd: sysfs_dirent to be removed
|
2007-06-14 02:27:24 +07:00
|
|
|
*
|
|
|
|
* Mark @sd removed and drop nlink of parent inode if @sd is a
|
2007-09-20 14:05:09 +07:00
|
|
|
* directory. @sd is unlinked from the children list.
|
2007-06-14 02:27:24 +07:00
|
|
|
*
|
|
|
|
* This function should be called between calls to
|
|
|
|
* sysfs_addrm_start() and sysfs_addrm_finish() and should be
|
|
|
|
* passed the same @acxt as passed to sysfs_addrm_start().
|
|
|
|
*
|
|
|
|
* LOCKING:
|
|
|
|
* Determined by sysfs_addrm_start().
|
|
|
|
*/
|
2013-09-19 04:15:38 +07:00
|
|
|
static void sysfs_remove_one(struct sysfs_addrm_cxt *acxt,
|
|
|
|
struct sysfs_dirent *sd)
|
2007-06-14 02:27:24 +07:00
|
|
|
{
|
2009-11-21 07:08:51 +07:00
|
|
|
struct sysfs_inode_attrs *ps_iattr;
|
|
|
|
|
2013-09-19 04:15:36 +07:00
|
|
|
/*
|
|
|
|
* Removal can be called multiple times on the same node. Only the
|
|
|
|
* first invocation is effective and puts the base ref.
|
|
|
|
*/
|
|
|
|
if (sd->s_flags & SYSFS_FLAG_REMOVED)
|
|
|
|
return;
|
2007-08-02 19:38:03 +07:00
|
|
|
|
|
|
|
sysfs_unlink_sibling(sd);
|
2007-06-14 02:27:24 +07:00
|
|
|
|
2009-11-21 07:08:51 +07:00
|
|
|
/* Update timestamps on the parent */
|
2013-09-19 04:15:35 +07:00
|
|
|
ps_iattr = sd->s_parent->s_iattr;
|
2009-11-21 07:08:51 +07:00
|
|
|
if (ps_iattr) {
|
|
|
|
struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
|
|
|
|
ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
|
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:24 +07:00
|
|
|
sd->s_flags |= SYSFS_FLAG_REMOVED;
|
2011-07-22 07:01:12 +07:00
|
|
|
sd->u.removed_list = acxt->removed;
|
2007-06-14 02:27:24 +07:00
|
|
|
acxt->removed = sd;
|
2007-06-14 02:27:24 +07:00
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:24 +07:00
|
|
|
/**
|
|
|
|
* sysfs_addrm_finish - finish up sysfs_dirent add/remove
|
|
|
|
* @acxt: addrm context to finish up
|
|
|
|
*
|
|
|
|
* Finish up sysfs_dirent add/remove. Resources acquired by
|
|
|
|
* sysfs_addrm_start() are released and removed sysfs_dirents are
|
2009-11-21 07:08:55 +07:00
|
|
|
* cleaned up.
|
2007-06-14 02:27:24 +07:00
|
|
|
*
|
|
|
|
* LOCKING:
|
2009-11-21 07:08:55 +07:00
|
|
|
* sysfs_mutex is released.
|
2007-06-14 02:27:24 +07:00
|
|
|
*/
|
2007-08-02 19:38:03 +07:00
|
|
|
void sysfs_addrm_finish(struct sysfs_addrm_cxt *acxt)
|
2013-09-19 04:15:35 +07:00
|
|
|
__releases(sysfs_mutex)
|
2007-06-14 02:27:24 +07:00
|
|
|
{
|
|
|
|
/* release resources acquired by sysfs_addrm_start() */
|
|
|
|
mutex_unlock(&sysfs_mutex);
|
|
|
|
|
|
|
|
/* kill removed sysfs_dirents */
|
|
|
|
while (acxt->removed) {
|
|
|
|
struct sysfs_dirent *sd = acxt->removed;
|
|
|
|
|
2011-07-22 07:01:12 +07:00
|
|
|
acxt->removed = sd->u.removed_list;
|
2007-06-14 02:27:24 +07:00
|
|
|
|
|
|
|
sysfs_deactivate(sd);
|
2013-10-02 04:42:07 +07:00
|
|
|
sysfs_unmap_bin_file(sd);
|
2007-06-14 02:27:24 +07:00
|
|
|
sysfs_put(sd);
|
2007-06-14 01:45:14 +07:00
|
|
|
}
|
2007-01-25 02:35:52 +07:00
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:22 +07:00
|
|
|
/**
|
|
|
|
* sysfs_find_dirent - find sysfs_dirent with the given name
|
|
|
|
* @parent_sd: sysfs_dirent to search under
|
|
|
|
* @name: name to look for
|
2013-09-12 09:29:09 +07:00
|
|
|
* @ns: the namespace tag to use
|
2007-06-14 02:27:22 +07:00
|
|
|
*
|
|
|
|
* Look for sysfs_dirent with name @name under @parent_sd.
|
2006-03-09 21:10:14 +07:00
|
|
|
*
|
2007-06-14 02:27:22 +07:00
|
|
|
* LOCKING:
|
2007-06-14 02:27:23 +07:00
|
|
|
* mutex_lock(sysfs_mutex)
|
2006-03-09 21:10:14 +07:00
|
|
|
*
|
2007-06-14 02:27:22 +07:00
|
|
|
* RETURNS:
|
|
|
|
* Pointer to sysfs_dirent if found, NULL if not.
|
2006-03-09 21:10:14 +07:00
|
|
|
*/
|
2007-06-14 02:27:22 +07:00
|
|
|
struct sysfs_dirent *sysfs_find_dirent(struct sysfs_dirent *parent_sd,
|
2013-09-12 09:29:09 +07:00
|
|
|
const unsigned char *name,
|
|
|
|
const void *ns)
|
2006-03-09 21:10:14 +07:00
|
|
|
{
|
2011-12-19 11:05:43 +07:00
|
|
|
struct rb_node *node = parent_sd->s_dir.children.rb_node;
|
|
|
|
unsigned int hash;
|
2011-07-26 04:55:57 +07:00
|
|
|
|
2013-11-07 18:47:28 +07:00
|
|
|
if (!!sysfs_ns_type(parent_sd) != !!ns) {
|
|
|
|
WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n",
|
|
|
|
sysfs_ns_type(parent_sd) ? "required" : "invalid",
|
|
|
|
parent_sd->s_name, name);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
hash = sysfs_name_hash(name, ns);
|
2011-12-19 11:05:43 +07:00
|
|
|
while (node) {
|
|
|
|
struct sysfs_dirent *sd;
|
|
|
|
int result;
|
|
|
|
|
|
|
|
sd = to_sysfs_dirent(node);
|
2013-09-12 09:29:09 +07:00
|
|
|
result = sysfs_name_compare(hash, name, ns, sd);
|
2011-12-19 11:05:43 +07:00
|
|
|
if (result < 0)
|
|
|
|
node = node->rb_left;
|
|
|
|
else if (result > 0)
|
|
|
|
node = node->rb_right;
|
|
|
|
else
|
|
|
|
return sd;
|
2010-03-31 01:31:26 +07:00
|
|
|
}
|
2011-12-19 11:05:43 +07:00
|
|
|
return NULL;
|
2007-06-14 02:27:22 +07:00
|
|
|
}
|
2006-03-09 21:10:14 +07:00
|
|
|
|
2007-06-14 02:27:22 +07:00
|
|
|
/**
|
2013-09-12 10:19:13 +07:00
|
|
|
* sysfs_get_dirent_ns - find and get sysfs_dirent with the given name
|
2007-06-14 02:27:22 +07:00
|
|
|
* @parent_sd: sysfs_dirent to search under
|
|
|
|
* @name: name to look for
|
2013-09-12 10:19:13 +07:00
|
|
|
* @ns: the namespace tag to use
|
2007-06-14 02:27:22 +07:00
|
|
|
*
|
|
|
|
* Look for sysfs_dirent with name @name under @parent_sd and get
|
|
|
|
* it if found.
|
|
|
|
*
|
|
|
|
* LOCKING:
|
2007-06-14 02:27:23 +07:00
|
|
|
* Kernel thread context (may sleep). Grabs sysfs_mutex.
|
2007-06-14 02:27:22 +07:00
|
|
|
*
|
|
|
|
* RETURNS:
|
|
|
|
* Pointer to sysfs_dirent if found, NULL if not.
|
|
|
|
*/
|
2013-09-12 10:19:13 +07:00
|
|
|
struct sysfs_dirent *sysfs_get_dirent_ns(struct sysfs_dirent *parent_sd,
|
|
|
|
const unsigned char *name,
|
|
|
|
const void *ns)
|
2007-06-14 02:27:22 +07:00
|
|
|
{
|
|
|
|
struct sysfs_dirent *sd;
|
|
|
|
|
2007-06-14 02:27:23 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
2013-09-12 09:29:09 +07:00
|
|
|
sd = sysfs_find_dirent(parent_sd, name, ns);
|
2007-06-14 02:27:22 +07:00
|
|
|
sysfs_get(sd);
|
2007-06-14 02:27:23 +07:00
|
|
|
mutex_unlock(&sysfs_mutex);
|
2007-06-14 02:27:22 +07:00
|
|
|
|
|
|
|
return sd;
|
2006-03-09 21:10:14 +07:00
|
|
|
}
|
2013-09-12 10:19:13 +07:00
|
|
|
EXPORT_SYMBOL_GPL(sysfs_get_dirent_ns);
|
2006-03-09 21:10:14 +07:00
|
|
|
|
2007-06-14 02:27:22 +07:00
|
|
|
static int create_dir(struct kobject *kobj, struct sysfs_dirent *parent_sd,
|
2013-11-07 18:47:28 +07:00
|
|
|
enum kobj_ns_type type,
|
2013-09-12 09:29:09 +07:00
|
|
|
const char *name, const void *ns,
|
|
|
|
struct sysfs_dirent **p_sd)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2013-08-22 06:28:26 +07:00
|
|
|
umode_t mode = S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO;
|
2007-06-14 02:27:25 +07:00
|
|
|
struct sysfs_addrm_cxt acxt;
|
2007-06-14 01:45:14 +07:00
|
|
|
struct sysfs_dirent *sd;
|
2007-08-02 19:38:03 +07:00
|
|
|
int rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-06-14 01:45:17 +07:00
|
|
|
/* allocate */
|
2007-06-14 01:45:15 +07:00
|
|
|
sd = sysfs_new_dirent(name, mode, SYSFS_DIR);
|
2007-06-14 01:45:14 +07:00
|
|
|
if (!sd)
|
2007-06-14 02:27:25 +07:00
|
|
|
return -ENOMEM;
|
2010-03-31 01:31:26 +07:00
|
|
|
|
2013-11-07 18:47:28 +07:00
|
|
|
sd->s_flags |= (type << SYSFS_NS_TYPE_SHIFT);
|
2010-03-31 01:31:26 +07:00
|
|
|
sd->s_ns = ns;
|
2007-09-20 14:05:11 +07:00
|
|
|
sd->s_dir.kobj = kobj;
|
2007-06-14 01:45:14 +07:00
|
|
|
|
2007-06-14 01:45:17 +07:00
|
|
|
/* link in */
|
2013-09-19 04:15:35 +07:00
|
|
|
sysfs_addrm_start(&acxt);
|
|
|
|
rc = sysfs_add_one(&acxt, sd, parent_sd);
|
2007-08-02 19:38:03 +07:00
|
|
|
sysfs_addrm_finish(&acxt);
|
2007-07-18 14:38:11 +07:00
|
|
|
|
2007-08-02 19:38:03 +07:00
|
|
|
if (rc == 0)
|
|
|
|
*p_sd = sd;
|
|
|
|
else
|
2007-07-18 14:38:11 +07:00
|
|
|
sysfs_put(sd);
|
2007-06-14 01:45:14 +07:00
|
|
|
|
2007-08-02 19:38:03 +07:00
|
|
|
return rc;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-06-14 02:27:22 +07:00
|
|
|
int sysfs_create_subdir(struct kobject *kobj, const char *name,
|
|
|
|
struct sysfs_dirent **p_sd)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2013-11-07 18:47:28 +07:00
|
|
|
return create_dir(kobj, kobj->sd,
|
|
|
|
KOBJ_NS_TYPE_NONE, name, NULL, p_sd);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* sysfs_read_ns_type: return associated ns_type
|
|
|
|
* @kobj: the kobject being queried
|
|
|
|
*
|
|
|
|
* Each kobject can be tagged with exactly one namespace type
|
|
|
|
* (i.e. network or user). Return the ns_type associated with
|
|
|
|
* this object if any
|
|
|
|
*/
|
|
|
|
static enum kobj_ns_type sysfs_read_ns_type(struct kobject *kobj)
|
|
|
|
{
|
|
|
|
const struct kobj_ns_type_operations *ops;
|
|
|
|
enum kobj_ns_type type;
|
|
|
|
|
|
|
|
ops = kobj_child_ns_ops(kobj);
|
|
|
|
if (!ops)
|
|
|
|
return KOBJ_NS_TYPE_NONE;
|
|
|
|
|
|
|
|
type = ops->type;
|
|
|
|
BUG_ON(type <= KOBJ_NS_TYPE_NONE);
|
|
|
|
BUG_ON(type >= KOBJ_NS_TYPES);
|
|
|
|
BUG_ON(!kobj_ns_type_registered(type));
|
|
|
|
|
|
|
|
return type;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2013-09-12 09:29:05 +07:00
|
|
|
* sysfs_create_dir_ns - create a directory for an object with a namespace tag
|
|
|
|
* @kobj: object we're creating directory for
|
|
|
|
* @ns: the namespace tag to use
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
2013-09-12 09:29:05 +07:00
|
|
|
int sysfs_create_dir_ns(struct kobject *kobj, const void *ns)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2013-11-07 18:47:28 +07:00
|
|
|
enum kobj_ns_type type;
|
2007-06-14 02:27:22 +07:00
|
|
|
struct sysfs_dirent *parent_sd, *sd;
|
2005-04-17 05:20:36 +07:00
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
BUG_ON(!kobj);
|
|
|
|
|
2007-07-31 17:15:08 +07:00
|
|
|
if (kobj->parent)
|
2007-06-14 02:27:22 +07:00
|
|
|
parent_sd = kobj->parent->sd;
|
2005-04-17 05:20:36 +07:00
|
|
|
else
|
2007-08-20 19:36:30 +07:00
|
|
|
parent_sd = &sysfs_root;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2012-04-07 03:41:06 +07:00
|
|
|
if (!parent_sd)
|
|
|
|
return -ENOENT;
|
|
|
|
|
2013-11-07 18:47:28 +07:00
|
|
|
type = sysfs_read_ns_type(kobj);
|
|
|
|
|
|
|
|
error = create_dir(kobj, parent_sd, type, kobject_name(kobj), ns, &sd);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (!error)
|
2007-06-14 02:27:22 +07:00
|
|
|
kobj->sd = sd;
|
2005-04-17 05:20:36 +07:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2013-08-22 06:28:26 +07:00
|
|
|
static struct dentry *sysfs_lookup(struct inode *dir, struct dentry *dentry,
|
|
|
|
unsigned int flags)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-07-31 17:15:08 +07:00
|
|
|
struct dentry *ret = NULL;
|
2010-03-31 01:31:26 +07:00
|
|
|
struct dentry *parent = dentry->d_parent;
|
|
|
|
struct sysfs_dirent *parent_sd = parent->d_fsdata;
|
2007-08-02 19:38:02 +07:00
|
|
|
struct sysfs_dirent *sd;
|
2007-06-14 01:45:17 +07:00
|
|
|
struct inode *inode;
|
2013-11-07 18:47:28 +07:00
|
|
|
enum kobj_ns_type type;
|
|
|
|
const void *ns;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-07-31 17:15:08 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
|
|
|
|
2013-11-07 18:47:28 +07:00
|
|
|
type = sysfs_ns_type(parent_sd);
|
|
|
|
ns = sysfs_info(dir->i_sb)->ns[type];
|
2010-03-31 01:31:26 +07:00
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
sd = sysfs_find_dirent(parent_sd, dentry->d_name.name, ns);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-06-14 01:45:17 +07:00
|
|
|
/* no such entry */
|
2008-01-16 10:06:14 +07:00
|
|
|
if (!sd) {
|
|
|
|
ret = ERR_PTR(-ENOENT);
|
2007-07-31 17:15:08 +07:00
|
|
|
goto out_unlock;
|
2008-01-16 10:06:14 +07:00
|
|
|
}
|
2012-06-08 07:51:39 +07:00
|
|
|
dentry->d_fsdata = sysfs_get(sd);
|
2007-06-14 01:45:17 +07:00
|
|
|
|
|
|
|
/* attach dentry and inode */
|
2010-02-13 10:22:27 +07:00
|
|
|
inode = sysfs_get_inode(dir->i_sb, sd);
|
2007-07-31 17:15:08 +07:00
|
|
|
if (!inode) {
|
|
|
|
ret = ERR_PTR(-ENOMEM);
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
2007-06-14 02:27:23 +07:00
|
|
|
|
2007-09-20 14:05:11 +07:00
|
|
|
/* instantiate and hash dentry */
|
2012-06-08 07:56:54 +07:00
|
|
|
ret = d_materialise_unique(dentry, inode);
|
2007-07-31 17:15:08 +07:00
|
|
|
out_unlock:
|
2007-06-14 02:27:23 +07:00
|
|
|
mutex_unlock(&sysfs_mutex);
|
2007-07-31 17:15:08 +07:00
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-02-12 15:55:40 +07:00
|
|
|
const struct inode_operations sysfs_dir_inode_operations = {
|
2005-04-17 05:20:36 +07:00
|
|
|
.lookup = sysfs_lookup,
|
2009-11-21 07:08:53 +07:00
|
|
|
.permission = sysfs_permission,
|
2005-05-31 12:09:14 +07:00
|
|
|
.setattr = sysfs_setattr,
|
2009-11-21 07:08:53 +07:00
|
|
|
.getattr = sysfs_getattr,
|
2009-09-10 01:25:37 +07:00
|
|
|
.setxattr = sysfs_setxattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
2013-09-19 04:15:37 +07:00
|
|
|
static struct sysfs_dirent *sysfs_leftmost_descendant(struct sysfs_dirent *pos)
|
|
|
|
{
|
|
|
|
struct sysfs_dirent *last;
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
struct rb_node *rbn;
|
|
|
|
|
|
|
|
last = pos;
|
|
|
|
|
|
|
|
if (sysfs_type(pos) != SYSFS_DIR)
|
|
|
|
break;
|
|
|
|
|
|
|
|
rbn = rb_first(&pos->s_dir.children);
|
|
|
|
if (!rbn)
|
|
|
|
break;
|
|
|
|
|
|
|
|
pos = to_sysfs_dirent(rbn);
|
|
|
|
}
|
|
|
|
|
|
|
|
return last;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* sysfs_next_descendant_post - find the next descendant for post-order walk
|
|
|
|
* @pos: the current position (%NULL to initiate traversal)
|
|
|
|
* @root: sysfs_dirent whose descendants to walk
|
|
|
|
*
|
|
|
|
* Find the next descendant to visit for post-order traversal of @root's
|
|
|
|
* descendants. @root is included in the iteration and the last node to be
|
|
|
|
* visited.
|
|
|
|
*/
|
|
|
|
static struct sysfs_dirent *sysfs_next_descendant_post(struct sysfs_dirent *pos,
|
|
|
|
struct sysfs_dirent *root)
|
|
|
|
{
|
|
|
|
struct rb_node *rbn;
|
|
|
|
|
|
|
|
lockdep_assert_held(&sysfs_mutex);
|
|
|
|
|
|
|
|
/* if first iteration, visit leftmost descendant which may be root */
|
|
|
|
if (!pos)
|
|
|
|
return sysfs_leftmost_descendant(root);
|
|
|
|
|
|
|
|
/* if we visited @root, we're done */
|
|
|
|
if (pos == root)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
/* if there's an unvisited sibling, visit its leftmost descendant */
|
|
|
|
rbn = rb_next(&pos->s_rb);
|
|
|
|
if (rbn)
|
|
|
|
return sysfs_leftmost_descendant(to_sysfs_dirent(rbn));
|
|
|
|
|
|
|
|
/* no sibling left, visit parent */
|
|
|
|
return pos->s_parent;
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2013-10-24 22:49:10 +07:00
|
|
|
static void __sysfs_remove(struct sysfs_addrm_cxt *acxt,
|
|
|
|
struct sysfs_dirent *sd)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2013-09-19 04:15:37 +07:00
|
|
|
struct sysfs_dirent *pos, *next;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2013-09-19 04:15:38 +07:00
|
|
|
if (!sd)
|
2005-04-17 05:20:36 +07:00
|
|
|
return;
|
|
|
|
|
2013-09-19 04:15:38 +07:00
|
|
|
pr_debug("sysfs %s: removing\n", sd->s_name);
|
2007-06-14 01:45:16 +07:00
|
|
|
|
2013-09-19 04:15:37 +07:00
|
|
|
next = NULL;
|
|
|
|
do {
|
|
|
|
pos = next;
|
2013-09-19 04:15:38 +07:00
|
|
|
next = sysfs_next_descendant_post(pos, sd);
|
2013-09-19 04:15:37 +07:00
|
|
|
if (pos)
|
2013-09-19 04:15:38 +07:00
|
|
|
sysfs_remove_one(acxt, pos);
|
2013-09-19 04:15:37 +07:00
|
|
|
} while (next);
|
2013-09-19 04:15:38 +07:00
|
|
|
}
|
2013-09-19 04:15:37 +07:00
|
|
|
|
2013-09-19 04:15:38 +07:00
|
|
|
/**
|
|
|
|
* sysfs_remove - remove a sysfs_dirent recursively
|
|
|
|
* @sd: the sysfs_dirent to remove
|
|
|
|
*
|
|
|
|
* Remove @sd along with all its subdirectories and files.
|
|
|
|
*/
|
|
|
|
void sysfs_remove(struct sysfs_dirent *sd)
|
|
|
|
{
|
|
|
|
struct sysfs_addrm_cxt acxt;
|
|
|
|
|
|
|
|
sysfs_addrm_start(&acxt);
|
|
|
|
__sysfs_remove(&acxt, sd);
|
2013-09-19 04:15:37 +07:00
|
|
|
sysfs_addrm_finish(&acxt);
|
2007-01-25 02:35:52 +07:00
|
|
|
}
|
|
|
|
|
2013-10-24 22:49:10 +07:00
|
|
|
/**
|
|
|
|
* sysfs_hash_and_remove - find a sysfs_dirent by name and remove it
|
|
|
|
* @dir_sd: parent of the target
|
|
|
|
* @name: name of the sysfs_dirent to remove
|
|
|
|
* @ns: namespace tag of the sysfs_dirent to remove
|
|
|
|
*
|
|
|
|
* Look for the sysfs_dirent with @name and @ns under @dir_sd and remove
|
|
|
|
* it. Returns 0 on success, -ENOENT if such entry doesn't exist.
|
|
|
|
*/
|
|
|
|
int sysfs_hash_and_remove(struct sysfs_dirent *dir_sd, const char *name,
|
|
|
|
const void *ns)
|
|
|
|
{
|
|
|
|
struct sysfs_addrm_cxt acxt;
|
|
|
|
struct sysfs_dirent *sd;
|
|
|
|
|
|
|
|
if (!dir_sd) {
|
|
|
|
WARN(1, KERN_WARNING "sysfs: can not remove '%s', no directory\n",
|
|
|
|
name);
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
sysfs_addrm_start(&acxt);
|
|
|
|
|
|
|
|
sd = sysfs_find_dirent(dir_sd, name, ns);
|
|
|
|
if (sd)
|
|
|
|
__sysfs_remove(&acxt, sd);
|
|
|
|
|
|
|
|
sysfs_addrm_finish(&acxt);
|
|
|
|
|
|
|
|
if (sd)
|
|
|
|
return 0;
|
|
|
|
else
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
2007-01-25 02:35:52 +07:00
|
|
|
/**
|
|
|
|
* sysfs_remove_dir - remove an object's directory.
|
|
|
|
* @kobj: object.
|
|
|
|
*
|
|
|
|
* The only thing special about this is that we remove any files in
|
|
|
|
* the directory before we remove the directory, and we've inlined
|
|
|
|
* what used to be sysfs_rmdir() below, instead of calling separately.
|
|
|
|
*/
|
2013-08-22 06:28:26 +07:00
|
|
|
void sysfs_remove_dir(struct kobject *kobj)
|
2007-01-25 02:35:52 +07:00
|
|
|
{
|
2007-06-14 02:27:22 +07:00
|
|
|
struct sysfs_dirent *sd = kobj->sd;
|
2007-06-14 01:45:15 +07:00
|
|
|
|
2013-10-30 21:28:36 +07:00
|
|
|
/*
|
|
|
|
* In general, kboject owner is responsible for ensuring removal
|
|
|
|
* doesn't race with other operations and sysfs doesn't provide any
|
|
|
|
* protection; however, when @kobj is used as a symlink target, the
|
|
|
|
* symlinking entity usually doesn't own @kobj and thus has no
|
|
|
|
* control over removal. @kobj->sd may be removed anytime and
|
|
|
|
* symlink code may end up dereferencing an already freed sd.
|
|
|
|
*
|
|
|
|
* sysfs_symlink_target_lock synchronizes @kobj->sd disassociation
|
|
|
|
* against symlink operations so that symlink code can safely
|
|
|
|
* dereference @kobj->sd.
|
|
|
|
*/
|
|
|
|
spin_lock(&sysfs_symlink_target_lock);
|
2007-06-14 02:27:22 +07:00
|
|
|
kobj->sd = NULL;
|
2013-10-30 21:28:36 +07:00
|
|
|
spin_unlock(&sysfs_symlink_target_lock);
|
2007-06-14 01:45:15 +07:00
|
|
|
|
2013-09-19 04:15:38 +07:00
|
|
|
if (sd) {
|
|
|
|
WARN_ON_ONCE(sysfs_type(sd) != SYSFS_DIR);
|
|
|
|
sysfs_remove(sd);
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
int sysfs_rename(struct sysfs_dirent *sd, struct sysfs_dirent *new_parent_sd,
|
|
|
|
const char *new_name, const void *new_ns)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-06-14 01:45:14 +07:00
|
|
|
int error;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2009-11-21 07:08:56 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
2007-08-20 19:36:30 +07:00
|
|
|
|
2007-08-20 19:36:31 +07:00
|
|
|
error = 0;
|
2010-03-31 01:31:26 +07:00
|
|
|
if ((sd->s_parent == new_parent_sd) && (sd->s_ns == new_ns) &&
|
2009-11-21 07:08:57 +07:00
|
|
|
(strcmp(sd->s_name, new_name) == 0))
|
2007-08-20 19:36:31 +07:00
|
|
|
goto out; /* nothing to rename */
|
|
|
|
|
|
|
|
error = -EEXIST;
|
2013-09-12 09:29:09 +07:00
|
|
|
if (sysfs_find_dirent(new_parent_sd, new_name, new_ns))
|
2009-11-21 07:08:56 +07:00
|
|
|
goto out;
|
2007-06-14 01:45:14 +07:00
|
|
|
|
2008-07-04 08:05:28 +07:00
|
|
|
/* rename sysfs_dirent */
|
2009-11-21 07:08:57 +07:00
|
|
|
if (strcmp(sd->s_name, new_name) != 0) {
|
|
|
|
error = -ENOMEM;
|
2012-05-03 03:56:14 +07:00
|
|
|
new_name = kstrdup(new_name, GFP_KERNEL);
|
2009-11-21 07:08:57 +07:00
|
|
|
if (!new_name)
|
|
|
|
goto out;
|
|
|
|
|
2012-05-03 03:56:14 +07:00
|
|
|
kfree(sd->s_name);
|
2009-11-21 07:08:57 +07:00
|
|
|
sd->s_name = new_name;
|
|
|
|
}
|
2007-06-14 01:45:15 +07:00
|
|
|
|
2013-08-22 06:33:34 +07:00
|
|
|
/*
|
|
|
|
* Move to the appropriate place in the appropriate directories rbtree.
|
|
|
|
*/
|
2011-11-01 21:06:17 +07:00
|
|
|
sysfs_unlink_sibling(sd);
|
|
|
|
sysfs_get(new_parent_sd);
|
|
|
|
sysfs_put(sd->s_parent);
|
2010-03-31 01:31:26 +07:00
|
|
|
sd->s_ns = new_ns;
|
2013-09-12 09:29:09 +07:00
|
|
|
sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
|
2011-11-01 21:06:17 +07:00
|
|
|
sd->s_parent = new_parent_sd;
|
|
|
|
sysfs_link_sibling(sd);
|
2007-06-14 01:45:15 +07:00
|
|
|
|
2007-06-14 01:45:14 +07:00
|
|
|
error = 0;
|
2009-11-21 07:08:56 +07:00
|
|
|
out:
|
2007-08-20 19:36:31 +07:00
|
|
|
mutex_unlock(&sysfs_mutex);
|
2005-04-17 05:20:36 +07:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:05 +07:00
|
|
|
int sysfs_rename_dir_ns(struct kobject *kobj, const char *new_name,
|
|
|
|
const void *new_ns)
|
2009-11-21 07:08:57 +07:00
|
|
|
{
|
2010-03-31 01:31:26 +07:00
|
|
|
struct sysfs_dirent *parent_sd = kobj->sd->s_parent;
|
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
return sysfs_rename(kobj->sd, parent_sd, new_name, new_ns);
|
2009-11-21 07:08:57 +07:00
|
|
|
}
|
|
|
|
|
2013-09-12 09:29:05 +07:00
|
|
|
int sysfs_move_dir_ns(struct kobject *kobj, struct kobject *new_parent_kobj,
|
|
|
|
const void *new_ns)
|
2006-11-20 23:07:51 +07:00
|
|
|
{
|
2007-06-14 02:27:25 +07:00
|
|
|
struct sysfs_dirent *sd = kobj->sd;
|
|
|
|
struct sysfs_dirent *new_parent_sd;
|
2006-11-20 23:07:51 +07:00
|
|
|
|
2007-06-14 02:27:25 +07:00
|
|
|
BUG_ON(!sd->s_parent);
|
2009-11-21 07:08:57 +07:00
|
|
|
new_parent_sd = new_parent_kobj && new_parent_kobj->sd ?
|
2009-10-06 20:33:35 +07:00
|
|
|
new_parent_kobj->sd : &sysfs_root;
|
2007-06-14 02:27:25 +07:00
|
|
|
|
2013-09-12 09:29:09 +07:00
|
|
|
return sysfs_rename(sd, new_parent_sd, sd->s_name, new_ns);
|
2006-11-20 23:07:51 +07:00
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/* Relationship between s_mode and the DT_xxx types */
|
|
|
|
static inline unsigned char dt_type(struct sysfs_dirent *sd)
|
|
|
|
{
|
|
|
|
return (sd->s_mode >> 12) & 15;
|
|
|
|
}
|
|
|
|
|
2010-01-02 05:43:53 +07:00
|
|
|
static int sysfs_dir_release(struct inode *inode, struct file *filp)
|
|
|
|
{
|
|
|
|
sysfs_put(filp->private_data);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-03-31 01:31:26 +07:00
|
|
|
static struct sysfs_dirent *sysfs_dir_pos(const void *ns,
|
2011-12-19 11:05:43 +07:00
|
|
|
struct sysfs_dirent *parent_sd, loff_t hash, struct sysfs_dirent *pos)
|
2010-01-02 05:43:53 +07:00
|
|
|
{
|
|
|
|
if (pos) {
|
|
|
|
int valid = !(pos->s_flags & SYSFS_FLAG_REMOVED) &&
|
|
|
|
pos->s_parent == parent_sd &&
|
2011-12-19 11:05:43 +07:00
|
|
|
hash == pos->s_hash;
|
2010-01-02 05:43:53 +07:00
|
|
|
sysfs_put(pos);
|
2010-03-31 01:31:26 +07:00
|
|
|
if (!valid)
|
|
|
|
pos = NULL;
|
2010-01-02 05:43:53 +07:00
|
|
|
}
|
2011-12-19 11:05:43 +07:00
|
|
|
if (!pos && (hash > 1) && (hash < INT_MAX)) {
|
|
|
|
struct rb_node *node = parent_sd->s_dir.children.rb_node;
|
|
|
|
while (node) {
|
|
|
|
pos = to_sysfs_dirent(node);
|
|
|
|
|
|
|
|
if (hash < pos->s_hash)
|
|
|
|
node = node->rb_left;
|
|
|
|
else if (hash > pos->s_hash)
|
|
|
|
node = node->rb_right;
|
|
|
|
else
|
2011-07-26 04:57:03 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2011-12-19 11:05:43 +07:00
|
|
|
/* Skip over entries in the wrong namespace */
|
2011-10-25 19:38:41 +07:00
|
|
|
while (pos && pos->s_ns != ns) {
|
2011-12-19 11:05:43 +07:00
|
|
|
struct rb_node *node = rb_next(&pos->s_rb);
|
|
|
|
if (!node)
|
2011-07-26 04:57:03 +07:00
|
|
|
pos = NULL;
|
|
|
|
else
|
2011-12-19 11:05:43 +07:00
|
|
|
pos = to_sysfs_dirent(node);
|
2010-01-02 05:43:53 +07:00
|
|
|
}
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
2010-03-31 01:31:26 +07:00
|
|
|
static struct sysfs_dirent *sysfs_dir_next_pos(const void *ns,
|
|
|
|
struct sysfs_dirent *parent_sd, ino_t ino, struct sysfs_dirent *pos)
|
2010-01-02 05:43:53 +07:00
|
|
|
{
|
2010-03-31 01:31:26 +07:00
|
|
|
pos = sysfs_dir_pos(ns, parent_sd, ino, pos);
|
2013-08-22 06:36:02 +07:00
|
|
|
if (pos)
|
|
|
|
do {
|
|
|
|
struct rb_node *node = rb_next(&pos->s_rb);
|
|
|
|
if (!node)
|
|
|
|
pos = NULL;
|
|
|
|
else
|
|
|
|
pos = to_sysfs_dirent(node);
|
|
|
|
} while (pos && pos->s_ns != ns);
|
2010-01-02 05:43:53 +07:00
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
2013-05-17 01:31:02 +07:00
|
|
|
static int sysfs_readdir(struct file *file, struct dir_context *ctx)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2013-05-17 01:31:02 +07:00
|
|
|
struct dentry *dentry = file->f_path.dentry;
|
2013-08-22 06:28:26 +07:00
|
|
|
struct sysfs_dirent *parent_sd = dentry->d_fsdata;
|
2013-05-17 01:31:02 +07:00
|
|
|
struct sysfs_dirent *pos = file->private_data;
|
2013-11-07 18:47:28 +07:00
|
|
|
enum kobj_ns_type type;
|
|
|
|
const void *ns;
|
|
|
|
|
|
|
|
type = sysfs_ns_type(parent_sd);
|
|
|
|
ns = sysfs_info(dentry->d_sb)->ns[type];
|
2010-03-31 01:31:26 +07:00
|
|
|
|
2013-05-17 01:31:02 +07:00
|
|
|
if (!dir_emit_dots(file, ctx))
|
|
|
|
return 0;
|
2010-01-02 05:43:53 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
2013-05-17 01:31:02 +07:00
|
|
|
for (pos = sysfs_dir_pos(ns, parent_sd, ctx->pos, pos);
|
2010-01-02 05:43:53 +07:00
|
|
|
pos;
|
2013-05-17 01:31:02 +07:00
|
|
|
pos = sysfs_dir_next_pos(ns, parent_sd, ctx->pos, pos)) {
|
|
|
|
const char *name = pos->s_name;
|
|
|
|
unsigned int type = dt_type(pos);
|
|
|
|
int len = strlen(name);
|
|
|
|
ino_t ino = pos->s_ino;
|
|
|
|
ctx->pos = pos->s_hash;
|
|
|
|
file->private_data = sysfs_get(pos);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-06-14 02:27:23 +07:00
|
|
|
mutex_unlock(&sysfs_mutex);
|
2013-05-17 01:31:02 +07:00
|
|
|
if (!dir_emit(ctx, name, len, ino, type))
|
|
|
|
return 0;
|
2010-01-02 05:43:53 +07:00
|
|
|
mutex_lock(&sysfs_mutex);
|
|
|
|
}
|
|
|
|
mutex_unlock(&sysfs_mutex);
|
2013-05-17 01:31:02 +07:00
|
|
|
file->private_data = NULL;
|
|
|
|
ctx->pos = INT_MAX;
|
2007-08-20 19:36:30 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2013-03-20 22:25:24 +07:00
|
|
|
static loff_t sysfs_dir_llseek(struct file *file, loff_t offset, int whence)
|
|
|
|
{
|
|
|
|
struct inode *inode = file_inode(file);
|
|
|
|
loff_t ret;
|
|
|
|
|
|
|
|
mutex_lock(&inode->i_mutex);
|
|
|
|
ret = generic_file_llseek(file, offset, whence);
|
|
|
|
mutex_unlock(&inode->i_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2007-08-20 19:36:30 +07:00
|
|
|
|
2006-03-28 16:56:42 +07:00
|
|
|
const struct file_operations sysfs_dir_operations = {
|
2005-04-17 05:20:36 +07:00
|
|
|
.read = generic_read_dir,
|
2013-05-17 01:31:02 +07:00
|
|
|
.iterate = sysfs_readdir,
|
2010-01-02 05:43:53 +07:00
|
|
|
.release = sysfs_dir_release,
|
2013-03-20 22:25:24 +07:00
|
|
|
.llseek = sysfs_dir_llseek,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|