blob: 4921bda3a37a234e1e06e394dec009bd27974b52 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Tejun Heo6d66f5c2007-09-20 17:31:38 +09002 * fs/sysfs/file.c - sysfs regular (text) file implementation
3 *
4 * Copyright (c) 2001-3 Patrick Mochel
5 * Copyright (c) 2007 SUSE Linux Products GmbH
6 * Copyright (c) 2007 Tejun Heo <teheo@suse.de>
7 *
8 * This file is released under the GPLv2.
9 *
10 * Please see Documentation/filesystems/sysfs.txt for more information.
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 */
12
13#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070014#include <linux/kobject.h>
Andrew Morton815d2d52008-03-04 15:09:07 -080015#include <linux/kallsyms.h>
Robert P. J. Dayc6f87732008-03-13 22:41:52 -040016#include <linux/slab.h>
Miklos Szeredi93265d12008-06-16 13:46:47 +020017#include <linux/fsnotify.h>
Christoph Hellwig5f45f1a2005-06-23 00:09:12 -070018#include <linux/namei.h>
NeilBrown4508a7a2006-03-20 17:53:53 +110019#include <linux/poll.h>
Oliver Neukum94bebf42006-12-20 10:52:44 +010020#include <linux/list.h>
Dave Young52e8c202007-07-26 11:03:54 +000021#include <linux/mutex.h>
Andrew Mortonae87221d2007-08-24 16:11:54 -070022#include <linux/limits.h>
Greg Kroah-Hartman060cc742013-08-21 16:34:59 -070023#include <linux/uaccess.h>
Tejun Heo13c589d2013-10-01 17:42:02 -040024#include <linux/seq_file.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025
26#include "sysfs.h"
27
Tejun Heo85a4ffa2007-09-20 16:05:12 +090028/*
Tejun Heo58282d82013-10-01 17:41:59 -040029 * There's one sysfs_open_file for each open file and one sysfs_open_dirent
Tejun Heoc75ec762013-10-01 17:41:58 -040030 * for each sysfs_dirent with one or more open files.
Tejun Heo85a4ffa2007-09-20 16:05:12 +090031 *
Tejun Heoc75ec762013-10-01 17:41:58 -040032 * sysfs_dirent->s_attr.open points to sysfs_open_dirent. s_attr.open is
33 * protected by sysfs_open_dirent_lock.
34 *
Tejun Heo13c589d2013-10-01 17:42:02 -040035 * filp->private_data points to seq_file whose ->private points to
36 * sysfs_open_file. sysfs_open_files are chained at
Tejun Heo58282d82013-10-01 17:41:59 -040037 * sysfs_open_dirent->files, which is protected by sysfs_open_file_mutex.
Tejun Heo85a4ffa2007-09-20 16:05:12 +090038 */
Jiri Slabyd7b37882007-11-21 14:55:19 -080039static DEFINE_SPINLOCK(sysfs_open_dirent_lock);
Tejun Heoc75ec762013-10-01 17:41:58 -040040static DEFINE_MUTEX(sysfs_open_file_mutex);
Tejun Heo85a4ffa2007-09-20 16:05:12 +090041
42struct sysfs_open_dirent {
43 atomic_t refcnt;
Tejun Heoa4e8b912007-09-20 16:05:12 +090044 atomic_t event;
45 wait_queue_head_t poll;
Tejun Heo58282d82013-10-01 17:41:59 -040046 struct list_head files; /* goes through sysfs_open_file.list */
Tejun Heo85a4ffa2007-09-20 16:05:12 +090047};
48
Tejun Heo58282d82013-10-01 17:41:59 -040049struct sysfs_open_file {
Tejun Heobcafe4e2013-10-01 17:42:00 -040050 struct sysfs_dirent *sd;
51 struct file *file;
Dave Young52e8c202007-07-26 11:03:54 +000052 struct mutex mutex;
Tejun Heo73107cb2007-06-14 03:45:16 +090053 int event;
Tejun Heo85a4ffa2007-09-20 16:05:12 +090054 struct list_head list;
Tejun Heo73107cb2007-06-14 03:45:16 +090055};
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
Tejun Heo13c589d2013-10-01 17:42:02 -040057static struct sysfs_open_file *sysfs_of(struct file *file)
58{
59 return ((struct seq_file *)file->private_data)->private;
60}
61
Tejun Heo375b6112013-10-01 17:41:57 -040062/*
63 * Determine ktype->sysfs_ops for the given sysfs_dirent. This function
64 * must be called while holding an active reference.
65 */
66static const struct sysfs_ops *sysfs_file_ops(struct sysfs_dirent *sd)
67{
68 struct kobject *kobj = sd->s_parent->s_dir.kobj;
69
70 lockdep_assert_held(sd);
71 return kobj->ktype ? kobj->ktype->sysfs_ops : NULL;
72}
73
Tejun Heo13c589d2013-10-01 17:42:02 -040074/*
75 * Reads on sysfs are handled through seq_file, which takes care of hairy
76 * details like buffering and seeking. The following function pipes
77 * sysfs_ops->show() result through seq_file.
Linus Torvalds1da177e2005-04-16 15:20:36 -070078 */
Tejun Heo13c589d2013-10-01 17:42:02 -040079static int sysfs_seq_show(struct seq_file *sf, void *v)
Linus Torvalds1da177e2005-04-16 15:20:36 -070080{
Tejun Heo13c589d2013-10-01 17:42:02 -040081 struct sysfs_open_file *of = sf->private;
82 struct kobject *kobj = of->sd->s_parent->s_dir.kobj;
Tejun Heo375b6112013-10-01 17:41:57 -040083 const struct sysfs_ops *ops;
Tejun Heo13c589d2013-10-01 17:42:02 -040084 char *buf;
Linus Torvalds1da177e2005-04-16 15:20:36 -070085 ssize_t count;
86
Tejun Heo13c589d2013-10-01 17:42:02 -040087 /* acquire buffer and ensure that it's >= PAGE_SIZE */
88 count = seq_get_buf(sf, &buf);
89 if (count < PAGE_SIZE) {
90 seq_commit(sf, -1);
91 return 0;
92 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070093
Tejun Heo13c589d2013-10-01 17:42:02 -040094 /*
95 * Need @of->sd for attr and ops, its parent for kobj. @of->mutex
96 * nests outside active ref and is just to ensure that the ops
97 * aren't called concurrently for the same open file.
98 */
99 mutex_lock(&of->mutex);
100 if (!sysfs_get_active(of->sd)) {
101 mutex_unlock(&of->mutex);
Tejun Heo0ab66082007-06-14 03:45:16 +0900102 return -ENODEV;
Tejun Heo13c589d2013-10-01 17:42:02 -0400103 }
Tejun Heo0ab66082007-06-14 03:45:16 +0900104
Tejun Heo13c589d2013-10-01 17:42:02 -0400105 of->event = atomic_read(&of->sd->s_attr.open->event);
Tejun Heo375b6112013-10-01 17:41:57 -0400106
Tejun Heo13c589d2013-10-01 17:42:02 -0400107 /*
108 * Lookup @ops and invoke show(). Control may reach here via seq
109 * file lseek even if @ops->show() isn't implemented.
110 */
111 ops = sysfs_file_ops(of->sd);
112 if (ops->show)
113 count = ops->show(kobj, of->sd->s_attr.attr, buf);
114 else
115 count = 0;
Tejun Heo0ab66082007-06-14 03:45:16 +0900116
Tejun Heo13c589d2013-10-01 17:42:02 -0400117 sysfs_put_active(of->sd);
118 mutex_unlock(&of->mutex);
119
120 if (count < 0)
121 return count;
Tejun Heo0ab66082007-06-14 03:45:16 +0900122
Miao Xie8118a852007-11-21 14:55:19 -0800123 /*
124 * The code works fine with PAGE_SIZE return but it's likely to
125 * indicate truncated result or overflow in normal use cases.
126 */
Andrew Morton815d2d52008-03-04 15:09:07 -0800127 if (count >= (ssize_t)PAGE_SIZE) {
128 print_symbol("fill_read_buffer: %s returned bad count\n",
129 (unsigned long)ops->show);
130 /* Try to struggle along */
131 count = PAGE_SIZE - 1;
132 }
Tejun Heo13c589d2013-10-01 17:42:02 -0400133 seq_commit(sf, count);
134 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135}
136
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137/**
Tejun Heo8ef445f2013-10-01 17:42:01 -0400138 * flush_write_buffer - push buffer to kobject
139 * @of: open file
140 * @buf: data buffer for file
141 * @count: number of bytes
Linus Torvalds1da177e2005-04-16 15:20:36 -0700142 *
Tejun Heo8ef445f2013-10-01 17:42:01 -0400143 * Get the correct pointers for the kobject and the attribute we're dealing
144 * with, then call the store() method for it with @buf.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145 */
Tejun Heo8ef445f2013-10-01 17:42:01 -0400146static int flush_write_buffer(struct sysfs_open_file *of, char *buf,
147 size_t count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148{
Tejun Heobcafe4e2013-10-01 17:42:00 -0400149 struct kobject *kobj = of->sd->s_parent->s_dir.kobj;
Tejun Heo375b6112013-10-01 17:41:57 -0400150 const struct sysfs_ops *ops;
Tejun Heo8ef445f2013-10-01 17:42:01 -0400151 int rc = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152
Tejun Heo8ef445f2013-10-01 17:42:01 -0400153 /*
154 * Need @of->sd for attr and ops, its parent for kobj. @of->mutex
155 * nests outside active ref and is just to ensure that the ops
156 * aren't called concurrently for the same open file.
157 */
158 mutex_lock(&of->mutex);
159 if (!sysfs_get_active(of->sd)) {
160 mutex_unlock(&of->mutex);
Tejun Heo0ab66082007-06-14 03:45:16 +0900161 return -ENODEV;
Tejun Heo8ef445f2013-10-01 17:42:01 -0400162 }
Tejun Heo0ab66082007-06-14 03:45:16 +0900163
Tejun Heobcafe4e2013-10-01 17:42:00 -0400164 ops = sysfs_file_ops(of->sd);
Tejun Heo8ef445f2013-10-01 17:42:01 -0400165 rc = ops->store(kobj, of->sd->s_attr.attr, buf, count);
Tejun Heo0ab66082007-06-14 03:45:16 +0900166
Tejun Heobcafe4e2013-10-01 17:42:00 -0400167 sysfs_put_active(of->sd);
Tejun Heo8ef445f2013-10-01 17:42:01 -0400168 mutex_unlock(&of->mutex);
Tejun Heo0ab66082007-06-14 03:45:16 +0900169
170 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171}
172
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173/**
Tejun Heo8ef445f2013-10-01 17:42:01 -0400174 * sysfs_write_file - write an attribute
175 * @file: file pointer
176 * @user_buf: data to write
177 * @count: number of bytes
178 * @ppos: starting offset
Linus Torvalds1da177e2005-04-16 15:20:36 -0700179 *
Tejun Heo8ef445f2013-10-01 17:42:01 -0400180 * Copy data in from userland and pass it to the matching
181 * sysfs_ops->store() by invoking flush_write_buffer().
182 *
183 * There is no easy way for us to know if userspace is only doing a partial
184 * write, so we don't support them. We expect the entire buffer to come on
185 * the first write. Hint: if you're writing a value, first read the file,
186 * modify only the the value you're changing, then write entire buffer
187 * back.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188 */
Tejun Heo8ef445f2013-10-01 17:42:01 -0400189static ssize_t sysfs_write_file(struct file *file, const char __user *user_buf,
Greg Kroah-Hartmanddfd6d02013-08-21 16:33:34 -0700190 size_t count, loff_t *ppos)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191{
Tejun Heo13c589d2013-10-01 17:42:02 -0400192 struct sysfs_open_file *of = sysfs_of(file);
Tejun Heo8ef445f2013-10-01 17:42:01 -0400193 ssize_t len = min_t(size_t, count, PAGE_SIZE - 1);
194 char *buf;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195
Tejun Heo8ef445f2013-10-01 17:42:01 -0400196 if (!len)
197 return 0;
198
199 buf = kmalloc(len + 1, GFP_KERNEL);
200 if (!buf)
201 return -ENOMEM;
202
203 if (copy_from_user(buf, user_buf, len)) {
204 len = -EFAULT;
205 goto out_free;
206 }
207 buf[len] = '\0'; /* guarantee string termination */
208
209 len = flush_write_buffer(of, buf, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700210 if (len > 0)
211 *ppos += len;
Tejun Heo8ef445f2013-10-01 17:42:01 -0400212out_free:
213 kfree(buf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214 return len;
215}
216
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900217/**
218 * sysfs_get_open_dirent - get or create sysfs_open_dirent
219 * @sd: target sysfs_dirent
Tejun Heo58282d82013-10-01 17:41:59 -0400220 * @of: sysfs_open_file for this instance of open
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900221 *
222 * If @sd->s_attr.open exists, increment its reference count;
Tejun Heo58282d82013-10-01 17:41:59 -0400223 * otherwise, create one. @of is chained to the files list.
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900224 *
225 * LOCKING:
226 * Kernel thread context (may sleep).
227 *
228 * RETURNS:
229 * 0 on success, -errno on failure.
230 */
231static int sysfs_get_open_dirent(struct sysfs_dirent *sd,
Tejun Heo58282d82013-10-01 17:41:59 -0400232 struct sysfs_open_file *of)
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900233{
234 struct sysfs_open_dirent *od, *new_od = NULL;
235
236 retry:
Tejun Heoc75ec762013-10-01 17:41:58 -0400237 mutex_lock(&sysfs_open_file_mutex);
Neil Brown83db93f2009-09-15 16:05:51 -0700238 spin_lock_irq(&sysfs_open_dirent_lock);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900239
240 if (!sd->s_attr.open && new_od) {
241 sd->s_attr.open = new_od;
242 new_od = NULL;
243 }
244
245 od = sd->s_attr.open;
246 if (od) {
247 atomic_inc(&od->refcnt);
Tejun Heo58282d82013-10-01 17:41:59 -0400248 list_add_tail(&of->list, &od->files);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900249 }
250
Neil Brown83db93f2009-09-15 16:05:51 -0700251 spin_unlock_irq(&sysfs_open_dirent_lock);
Tejun Heoc75ec762013-10-01 17:41:58 -0400252 mutex_unlock(&sysfs_open_file_mutex);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900253
254 if (od) {
255 kfree(new_od);
256 return 0;
257 }
258
259 /* not there, initialize a new one and retry */
260 new_od = kmalloc(sizeof(*new_od), GFP_KERNEL);
261 if (!new_od)
262 return -ENOMEM;
263
264 atomic_set(&new_od->refcnt, 0);
Tejun Heoa4e8b912007-09-20 16:05:12 +0900265 atomic_set(&new_od->event, 1);
266 init_waitqueue_head(&new_od->poll);
Tejun Heo58282d82013-10-01 17:41:59 -0400267 INIT_LIST_HEAD(&new_od->files);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900268 goto retry;
269}
270
271/**
272 * sysfs_put_open_dirent - put sysfs_open_dirent
273 * @sd: target sysfs_dirent
Tejun Heo58282d82013-10-01 17:41:59 -0400274 * @of: associated sysfs_open_file
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900275 *
Tejun Heo58282d82013-10-01 17:41:59 -0400276 * Put @sd->s_attr.open and unlink @of from the files list. If
277 * reference count reaches zero, disassociate and free it.
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900278 *
279 * LOCKING:
280 * None.
281 */
282static void sysfs_put_open_dirent(struct sysfs_dirent *sd,
Tejun Heo58282d82013-10-01 17:41:59 -0400283 struct sysfs_open_file *of)
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900284{
285 struct sysfs_open_dirent *od = sd->s_attr.open;
Neil Brown83db93f2009-09-15 16:05:51 -0700286 unsigned long flags;
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900287
Tejun Heoc75ec762013-10-01 17:41:58 -0400288 mutex_lock(&sysfs_open_file_mutex);
Neil Brown83db93f2009-09-15 16:05:51 -0700289 spin_lock_irqsave(&sysfs_open_dirent_lock, flags);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900290
Tejun Heo58282d82013-10-01 17:41:59 -0400291 list_del(&of->list);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900292 if (atomic_dec_and_test(&od->refcnt))
293 sd->s_attr.open = NULL;
294 else
295 od = NULL;
296
Neil Brown83db93f2009-09-15 16:05:51 -0700297 spin_unlock_irqrestore(&sysfs_open_dirent_lock, flags);
Tejun Heoc75ec762013-10-01 17:41:58 -0400298 mutex_unlock(&sysfs_open_file_mutex);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900299
300 kfree(od);
301}
302
Oliver Neukum94bebf42006-12-20 10:52:44 +0100303static int sysfs_open_file(struct inode *inode, struct file *file)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700304{
Tejun Heo3e519032007-06-14 03:45:15 +0900305 struct sysfs_dirent *attr_sd = file->f_path.dentry->d_fsdata;
Tejun Heob1fc3d62007-09-20 16:05:11 +0900306 struct kobject *kobj = attr_sd->s_parent->s_dir.kobj;
Tejun Heo58282d82013-10-01 17:41:59 -0400307 struct sysfs_open_file *of;
Emese Revfy52cf25d2010-01-19 02:58:23 +0100308 const struct sysfs_ops *ops;
Kay Sievers000f2a42007-11-02 13:47:53 +0100309 int error = -EACCES;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310
Tejun Heo0ab66082007-06-14 03:45:16 +0900311 /* need attr_sd for attr and ops, its parent for kobj */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800312 if (!sysfs_get_active(attr_sd))
Tejun Heo0ab66082007-06-14 03:45:16 +0900313 return -ENODEV;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700314
Kay Sievers000f2a42007-11-02 13:47:53 +0100315 /* every kobject with an attribute needs a ktype assigned */
Tejun Heo375b6112013-10-01 17:41:57 -0400316 ops = sysfs_file_ops(attr_sd);
317 if (WARN(!ops, KERN_ERR
318 "missing sysfs attribute operations for kobject: %s\n",
319 kobject_name(kobj)))
Tejun Heo7b595752007-06-14 03:45:17 +0900320 goto err_out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700321
322 /* File needs write support.
Greg Kroah-Hartmanab9bf4b2013-08-21 16:21:17 -0700323 * The inode's perms must say it's ok,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700324 * and we must have a store method.
325 */
326 if (file->f_mode & FMODE_WRITE) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700327 if (!(inode->i_mode & S_IWUGO) || !ops->store)
Tejun Heo7b595752007-06-14 03:45:17 +0900328 goto err_out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700329 }
330
331 /* File needs read support.
332 * The inode's perms must say it's ok, and we there
333 * must be a show method for it.
334 */
335 if (file->f_mode & FMODE_READ) {
336 if (!(inode->i_mode & S_IRUGO) || !ops->show)
Tejun Heo7b595752007-06-14 03:45:17 +0900337 goto err_out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338 }
339
Tejun Heo13c589d2013-10-01 17:42:02 -0400340 /* allocate a sysfs_open_file for the file */
Tejun Heo0ab66082007-06-14 03:45:16 +0900341 error = -ENOMEM;
Tejun Heo58282d82013-10-01 17:41:59 -0400342 of = kzalloc(sizeof(struct sysfs_open_file), GFP_KERNEL);
343 if (!of)
Tejun Heo7b595752007-06-14 03:45:17 +0900344 goto err_out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700345
Tejun Heo58282d82013-10-01 17:41:59 -0400346 mutex_init(&of->mutex);
Tejun Heobcafe4e2013-10-01 17:42:00 -0400347 of->sd = attr_sd;
348 of->file = file;
Tejun Heo13c589d2013-10-01 17:42:02 -0400349
350 /*
351 * Always instantiate seq_file even if read access is not
352 * implemented or requested. This unifies private data access and
353 * most files are readable anyway.
354 */
355 error = single_open(file, sysfs_seq_show, of);
356 if (error)
357 goto err_free;
358
359 /* seq_file clears PWRITE unconditionally, restore it if WRITE */
360 if (file->f_mode & FMODE_WRITE)
361 file->f_mode |= FMODE_PWRITE;
Tejun Heo0ab66082007-06-14 03:45:16 +0900362
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900363 /* make sure we have open dirent struct */
Tejun Heo58282d82013-10-01 17:41:59 -0400364 error = sysfs_get_open_dirent(attr_sd, of);
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900365 if (error)
Tejun Heo13c589d2013-10-01 17:42:02 -0400366 goto err_close;
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900367
Tejun Heob05f0542007-09-20 16:05:10 +0900368 /* open succeeded, put active references */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800369 sysfs_put_active(attr_sd);
Tejun Heo0ab66082007-06-14 03:45:16 +0900370 return 0;
371
Tejun Heo13c589d2013-10-01 17:42:02 -0400372err_close:
373 single_release(inode, file);
374err_free:
Tejun Heo58282d82013-10-01 17:41:59 -0400375 kfree(of);
Tejun Heo13c589d2013-10-01 17:42:02 -0400376err_out:
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800377 sysfs_put_active(attr_sd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378 return error;
379}
380
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900381static int sysfs_release(struct inode *inode, struct file *filp)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700382{
Tejun Heo85a4ffa2007-09-20 16:05:12 +0900383 struct sysfs_dirent *sd = filp->f_path.dentry->d_fsdata;
Tejun Heo13c589d2013-10-01 17:42:02 -0400384 struct sysfs_open_file *of = sysfs_of(filp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385
Tejun Heo58282d82013-10-01 17:41:59 -0400386 sysfs_put_open_dirent(sd, of);
Tejun Heo13c589d2013-10-01 17:42:02 -0400387 single_release(inode, filp);
Tejun Heo58282d82013-10-01 17:41:59 -0400388 kfree(of);
Tejun Heo50ab1a72007-09-20 16:05:10 +0900389
Linus Torvalds1da177e2005-04-16 15:20:36 -0700390 return 0;
391}
392
NeilBrown4508a7a2006-03-20 17:53:53 +1100393/* Sysfs attribute files are pollable. The idea is that you read
394 * the content and then you use 'poll' or 'select' to wait for
395 * the content to change. When the content changes (assuming the
396 * manager for the kobject supports notification), poll will
397 * return POLLERR|POLLPRI, and select will return the fd whether
398 * it is waiting for read, write, or exceptions.
399 * Once poll/select indicates that the value has changed, you
Dan Williams2424b5d2008-04-07 15:35:01 -0700400 * need to close and re-open the file, or seek to 0 and read again.
NeilBrown4508a7a2006-03-20 17:53:53 +1100401 * Reminder: this only works for attributes which actively support
402 * it, and it is not possible to test an attribute from userspace
Rolf Eike Beera93720e2007-08-10 13:51:07 -0700403 * to see if it supports poll (Neither 'poll' nor 'select' return
NeilBrown4508a7a2006-03-20 17:53:53 +1100404 * an appropriate error code). When in doubt, set a suitable timeout value.
405 */
406static unsigned int sysfs_poll(struct file *filp, poll_table *wait)
407{
Tejun Heo13c589d2013-10-01 17:42:02 -0400408 struct sysfs_open_file *of = sysfs_of(filp);
Tejun Heo0ab66082007-06-14 03:45:16 +0900409 struct sysfs_dirent *attr_sd = filp->f_path.dentry->d_fsdata;
Tejun Heoa4e8b912007-09-20 16:05:12 +0900410 struct sysfs_open_dirent *od = attr_sd->s_attr.open;
Tejun Heo0ab66082007-06-14 03:45:16 +0900411
412 /* need parent for the kobj, grab both */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800413 if (!sysfs_get_active(attr_sd))
Tejun Heo0ab66082007-06-14 03:45:16 +0900414 goto trigger;
NeilBrown4508a7a2006-03-20 17:53:53 +1100415
Tejun Heoa4e8b912007-09-20 16:05:12 +0900416 poll_wait(filp, &od->poll, wait);
NeilBrown4508a7a2006-03-20 17:53:53 +1100417
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800418 sysfs_put_active(attr_sd);
NeilBrown4508a7a2006-03-20 17:53:53 +1100419
Tejun Heo58282d82013-10-01 17:41:59 -0400420 if (of->event != atomic_read(&od->event))
Tejun Heo0ab66082007-06-14 03:45:16 +0900421 goto trigger;
422
KOSAKI Motohiro1af35572009-04-09 13:53:22 +0900423 return DEFAULT_POLLMASK;
Tejun Heo0ab66082007-06-14 03:45:16 +0900424
425 trigger:
KOSAKI Motohiro1af35572009-04-09 13:53:22 +0900426 return DEFAULT_POLLMASK|POLLERR|POLLPRI;
NeilBrown4508a7a2006-03-20 17:53:53 +1100427}
428
Neil Brownf1282c82008-07-16 08:58:04 +1000429void sysfs_notify_dirent(struct sysfs_dirent *sd)
430{
431 struct sysfs_open_dirent *od;
Neil Brown83db93f2009-09-15 16:05:51 -0700432 unsigned long flags;
Neil Brownf1282c82008-07-16 08:58:04 +1000433
Neil Brown83db93f2009-09-15 16:05:51 -0700434 spin_lock_irqsave(&sysfs_open_dirent_lock, flags);
Neil Brownf1282c82008-07-16 08:58:04 +1000435
Nick Dyerfc60bb82013-06-07 15:45:13 +0100436 if (!WARN_ON(sysfs_type(sd) != SYSFS_KOBJ_ATTR)) {
437 od = sd->s_attr.open;
438 if (od) {
439 atomic_inc(&od->event);
440 wake_up_interruptible(&od->poll);
441 }
Neil Brownf1282c82008-07-16 08:58:04 +1000442 }
443
Neil Brown83db93f2009-09-15 16:05:51 -0700444 spin_unlock_irqrestore(&sysfs_open_dirent_lock, flags);
Neil Brownf1282c82008-07-16 08:58:04 +1000445}
446EXPORT_SYMBOL_GPL(sysfs_notify_dirent);
447
Trent Piepho8c0e3992008-09-25 16:45:13 -0700448void sysfs_notify(struct kobject *k, const char *dir, const char *attr)
NeilBrown4508a7a2006-03-20 17:53:53 +1100449{
Tejun Heo51225032007-06-14 04:27:25 +0900450 struct sysfs_dirent *sd = k->sd;
NeilBrown4508a7a2006-03-20 17:53:53 +1100451
Tejun Heo51225032007-06-14 04:27:25 +0900452 mutex_lock(&sysfs_mutex);
NeilBrown4508a7a2006-03-20 17:53:53 +1100453
Tejun Heo51225032007-06-14 04:27:25 +0900454 if (sd && dir)
Tejun Heocfec0bc2013-09-11 22:29:09 -0400455 sd = sysfs_find_dirent(sd, dir, NULL);
Tejun Heo51225032007-06-14 04:27:25 +0900456 if (sd && attr)
Tejun Heocfec0bc2013-09-11 22:29:09 -0400457 sd = sysfs_find_dirent(sd, attr, NULL);
Neil Brownf1282c82008-07-16 08:58:04 +1000458 if (sd)
459 sysfs_notify_dirent(sd);
Tejun Heo51225032007-06-14 04:27:25 +0900460
461 mutex_unlock(&sysfs_mutex);
NeilBrown4508a7a2006-03-20 17:53:53 +1100462}
463EXPORT_SYMBOL_GPL(sysfs_notify);
464
Arjan van de Ven4b6f5d22006-03-28 01:56:42 -0800465const struct file_operations sysfs_file_operations = {
Tejun Heo13c589d2013-10-01 17:42:02 -0400466 .read = seq_read,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467 .write = sysfs_write_file,
Tejun Heo13c589d2013-10-01 17:42:02 -0400468 .llseek = seq_lseek,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700469 .open = sysfs_open_file,
470 .release = sysfs_release,
NeilBrown4508a7a2006-03-20 17:53:53 +1100471 .poll = sysfs_poll,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472};
473
Tejun Heo58292cbe2013-09-11 22:29:04 -0400474int sysfs_add_file_mode_ns(struct sysfs_dirent *dir_sd,
475 const struct attribute *attr, int type,
476 umode_t amode, const void *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700477{
James Bottomley0f423892008-03-20 20:47:52 -0500478 umode_t mode = (amode & S_IALLUGO) | S_IFREG;
Tejun Heofb6896d2007-06-14 04:27:24 +0900479 struct sysfs_addrm_cxt acxt;
Tejun Heoa26cd722007-06-14 03:45:14 +0900480 struct sysfs_dirent *sd;
Tejun Heo23dc2792007-08-02 21:38:03 +0900481 int rc;
Tejun Heoa26cd722007-06-14 03:45:14 +0900482
Tejun Heo3e519032007-06-14 03:45:15 +0900483 sd = sysfs_new_dirent(attr->name, mode, type);
Tejun Heo3007e992007-06-14 04:27:23 +0900484 if (!sd)
485 return -ENOMEM;
Eric W. Biederman487505c2011-10-12 21:53:38 +0000486
487 sd->s_ns = ns;
Tejun Heob1fc3d62007-09-20 16:05:11 +0900488 sd->s_attr.attr = (void *)attr;
Eric W. Biedermana2db6842010-02-11 15:20:00 -0800489 sysfs_dirent_init_lockdep(sd);
Tejun Heoa26cd722007-06-14 03:45:14 +0900490
Tejun Heod69ac5a2013-09-18 17:15:35 -0400491 sysfs_addrm_start(&acxt);
492 rc = sysfs_add_one(&acxt, sd, dir_sd);
Tejun Heo23dc2792007-08-02 21:38:03 +0900493 sysfs_addrm_finish(&acxt);
Tejun Heo3007e992007-06-14 04:27:23 +0900494
Tejun Heo23dc2792007-08-02 21:38:03 +0900495 if (rc)
Tejun Heo967e35d2007-07-18 16:38:11 +0900496 sysfs_put(sd);
Tejun Heo3007e992007-06-14 04:27:23 +0900497
Tejun Heo23dc2792007-08-02 21:38:03 +0900498 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700499}
500
501
James Bottomley0f423892008-03-20 20:47:52 -0500502int sysfs_add_file(struct sysfs_dirent *dir_sd, const struct attribute *attr,
503 int type)
504{
Tejun Heo58292cbe2013-09-11 22:29:04 -0400505 return sysfs_add_file_mode_ns(dir_sd, attr, type, attr->mode, NULL);
James Bottomley0f423892008-03-20 20:47:52 -0500506}
507
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508/**
Tejun Heo58292cbe2013-09-11 22:29:04 -0400509 * sysfs_create_file_ns - create an attribute file for an object with custom ns
510 * @kobj: object we're creating for
511 * @attr: attribute descriptor
512 * @ns: namespace the new file should belong to
Linus Torvalds1da177e2005-04-16 15:20:36 -0700513 */
Tejun Heo58292cbe2013-09-11 22:29:04 -0400514int sysfs_create_file_ns(struct kobject *kobj, const struct attribute *attr,
515 const void *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700516{
Tejun Heo608e2662007-06-14 04:27:22 +0900517 BUG_ON(!kobj || !kobj->sd || !attr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518
Tejun Heo58292cbe2013-09-11 22:29:04 -0400519 return sysfs_add_file_mode_ns(kobj->sd, attr, SYSFS_KOBJ_ATTR,
520 attr->mode, ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700521
522}
Tejun Heo58292cbe2013-09-11 22:29:04 -0400523EXPORT_SYMBOL_GPL(sysfs_create_file_ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700524
Andi Kleen1c205ae2010-01-05 12:48:01 +0100525int sysfs_create_files(struct kobject *kobj, const struct attribute **ptr)
526{
527 int err = 0;
528 int i;
529
530 for (i = 0; ptr[i] && !err; i++)
531 err = sysfs_create_file(kobj, ptr[i]);
532 if (err)
533 while (--i >= 0)
534 sysfs_remove_file(kobj, ptr[i]);
535 return err;
536}
Greg Kroah-Hartman1b866752013-08-21 16:17:47 -0700537EXPORT_SYMBOL_GPL(sysfs_create_files);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700538
539/**
Alan Sterndfa87c82007-02-20 15:02:44 -0500540 * sysfs_add_file_to_group - add an attribute file to a pre-existing group.
541 * @kobj: object we're acting for.
542 * @attr: attribute descriptor.
543 * @group: group name.
544 */
545int sysfs_add_file_to_group(struct kobject *kobj,
546 const struct attribute *attr, const char *group)
547{
Tejun Heo608e2662007-06-14 04:27:22 +0900548 struct sysfs_dirent *dir_sd;
Alan Sterndfa87c82007-02-20 15:02:44 -0500549 int error;
550
James Bottomley11f24fb2008-01-02 18:44:05 -0600551 if (group)
Tejun Heo388975c2013-09-11 23:19:13 -0400552 dir_sd = sysfs_get_dirent(kobj->sd, group);
James Bottomley11f24fb2008-01-02 18:44:05 -0600553 else
554 dir_sd = sysfs_get(kobj->sd);
555
Tejun Heo608e2662007-06-14 04:27:22 +0900556 if (!dir_sd)
557 return -ENOENT;
558
559 error = sysfs_add_file(dir_sd, attr, SYSFS_KOBJ_ATTR);
560 sysfs_put(dir_sd);
561
Alan Sterndfa87c82007-02-20 15:02:44 -0500562 return error;
563}
564EXPORT_SYMBOL_GPL(sysfs_add_file_to_group);
565
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566/**
Kay Sievers31e5abe2005-04-18 21:57:32 -0700567 * sysfs_chmod_file - update the modified mode value on an object attribute.
568 * @kobj: object we're acting for.
569 * @attr: attribute descriptor.
570 * @mode: file permissions.
571 *
572 */
Jean Delvare49c19402010-07-02 16:54:05 +0200573int sysfs_chmod_file(struct kobject *kobj, const struct attribute *attr,
Al Viro48176a92011-07-24 03:40:40 -0400574 umode_t mode)
Kay Sievers31e5abe2005-04-18 21:57:32 -0700575{
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800576 struct sysfs_dirent *sd;
Maneesh Sonibc062b12005-07-29 12:13:35 -0700577 struct iattr newattrs;
Tejun Heo51225032007-06-14 04:27:25 +0900578 int rc;
Kay Sievers31e5abe2005-04-18 21:57:32 -0700579
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800580 mutex_lock(&sysfs_mutex);
581
Tejun Heo51225032007-06-14 04:27:25 +0900582 rc = -ENOENT;
Tejun Heocfec0bc2013-09-11 22:29:09 -0400583 sd = sysfs_find_dirent(kobj->sd, attr->name, NULL);
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800584 if (!sd)
Tejun Heo51225032007-06-14 04:27:25 +0900585 goto out;
586
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800587 newattrs.ia_mode = (mode & S_IALLUGO) | (sd->s_mode & ~S_IALLUGO);
Eric W. Biederman4c6974f2009-11-07 23:27:02 -0800588 newattrs.ia_valid = ATTR_MODE;
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800589 rc = sysfs_sd_setattr(sd, &newattrs);
Tejun Heof88123e2007-09-20 16:05:10 +0900590
Tejun Heo51225032007-06-14 04:27:25 +0900591 out:
Eric W. Biederman06fc0d62009-11-20 16:08:54 -0800592 mutex_unlock(&sysfs_mutex);
Tejun Heo51225032007-06-14 04:27:25 +0900593 return rc;
Kay Sievers31e5abe2005-04-18 21:57:32 -0700594}
595EXPORT_SYMBOL_GPL(sysfs_chmod_file);
596
Kay Sievers31e5abe2005-04-18 21:57:32 -0700597/**
Tejun Heo58292cbe2013-09-11 22:29:04 -0400598 * sysfs_remove_file_ns - remove an object attribute with a custom ns tag
599 * @kobj: object we're acting for
600 * @attr: attribute descriptor
601 * @ns: namespace tag of the file to remove
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602 *
Tejun Heo58292cbe2013-09-11 22:29:04 -0400603 * Hash the attribute name and namespace tag and kill the victim.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 */
Tejun Heo58292cbe2013-09-11 22:29:04 -0400605void sysfs_remove_file_ns(struct kobject *kobj, const struct attribute *attr,
606 const void *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700607{
Tejun Heo58292cbe2013-09-11 22:29:04 -0400608 struct sysfs_dirent *dir_sd = kobj->sd;
Eric W. Biederman487505c2011-10-12 21:53:38 +0000609
Tejun Heocfec0bc2013-09-11 22:29:09 -0400610 sysfs_hash_and_remove(dir_sd, attr->name, ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700611}
Tejun Heo58292cbe2013-09-11 22:29:04 -0400612EXPORT_SYMBOL_GPL(sysfs_remove_file_ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700614void sysfs_remove_files(struct kobject *kobj, const struct attribute **ptr)
Andi Kleen1c205ae2010-01-05 12:48:01 +0100615{
616 int i;
617 for (i = 0; ptr[i]; i++)
618 sysfs_remove_file(kobj, ptr[i]);
619}
Greg Kroah-Hartman1b866752013-08-21 16:17:47 -0700620EXPORT_SYMBOL_GPL(sysfs_remove_files);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700621
Alan Sterndfa87c82007-02-20 15:02:44 -0500622/**
623 * sysfs_remove_file_from_group - remove an attribute file from a group.
624 * @kobj: object we're acting for.
625 * @attr: attribute descriptor.
626 * @group: group name.
627 */
628void sysfs_remove_file_from_group(struct kobject *kobj,
629 const struct attribute *attr, const char *group)
630{
Tejun Heo608e2662007-06-14 04:27:22 +0900631 struct sysfs_dirent *dir_sd;
Alan Sterndfa87c82007-02-20 15:02:44 -0500632
James Bottomley11f24fb2008-01-02 18:44:05 -0600633 if (group)
Tejun Heo388975c2013-09-11 23:19:13 -0400634 dir_sd = sysfs_get_dirent(kobj->sd, group);
James Bottomley11f24fb2008-01-02 18:44:05 -0600635 else
636 dir_sd = sysfs_get(kobj->sd);
Tejun Heo608e2662007-06-14 04:27:22 +0900637 if (dir_sd) {
Tejun Heocfec0bc2013-09-11 22:29:09 -0400638 sysfs_hash_and_remove(dir_sd, attr->name, NULL);
Tejun Heo608e2662007-06-14 04:27:22 +0900639 sysfs_put(dir_sd);
Alan Sterndfa87c82007-02-20 15:02:44 -0500640 }
641}
642EXPORT_SYMBOL_GPL(sysfs_remove_file_from_group);
643
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400644struct sysfs_schedule_callback_struct {
Alex Chiang66942062009-03-13 12:07:36 -0600645 struct list_head workq_list;
646 struct kobject *kobj;
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400647 void (*func)(void *);
648 void *data;
Alan Stern523ded72007-04-26 00:12:04 -0700649 struct module *owner;
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400650 struct work_struct work;
651};
652
Alex Chiangd1102712009-03-25 15:11:36 -0600653static struct workqueue_struct *sysfs_workqueue;
Alex Chiang66942062009-03-13 12:07:36 -0600654static DEFINE_MUTEX(sysfs_workq_mutex);
655static LIST_HEAD(sysfs_workq);
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400656static void sysfs_schedule_callback_work(struct work_struct *work)
657{
658 struct sysfs_schedule_callback_struct *ss = container_of(work,
659 struct sysfs_schedule_callback_struct, work);
660
661 (ss->func)(ss->data);
662 kobject_put(ss->kobj);
Alan Stern523ded72007-04-26 00:12:04 -0700663 module_put(ss->owner);
Alex Chiang66942062009-03-13 12:07:36 -0600664 mutex_lock(&sysfs_workq_mutex);
665 list_del(&ss->workq_list);
666 mutex_unlock(&sysfs_workq_mutex);
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400667 kfree(ss);
668}
669
670/**
671 * sysfs_schedule_callback - helper to schedule a callback for a kobject
672 * @kobj: object we're acting for.
673 * @func: callback function to invoke later.
674 * @data: argument to pass to @func.
Alan Stern523ded72007-04-26 00:12:04 -0700675 * @owner: module owning the callback code
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400676 *
677 * sysfs attribute methods must not unregister themselves or their parent
678 * kobject (which would amount to the same thing). Attempts to do so will
679 * deadlock, since unregistration is mutually exclusive with driver
680 * callbacks.
681 *
682 * Instead methods can call this routine, which will attempt to allocate
683 * and schedule a workqueue request to call back @func with @data as its
684 * argument in the workqueue's process context. @kobj will be pinned
685 * until @func returns.
686 *
687 * Returns 0 if the request was submitted, -ENOMEM if storage could not
Alex Chiang66942062009-03-13 12:07:36 -0600688 * be allocated, -ENODEV if a reference to @owner isn't available,
689 * -EAGAIN if a callback has already been scheduled for @kobj.
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400690 */
691int sysfs_schedule_callback(struct kobject *kobj, void (*func)(void *),
Alan Stern523ded72007-04-26 00:12:04 -0700692 void *data, struct module *owner)
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400693{
Alex Chiang66942062009-03-13 12:07:36 -0600694 struct sysfs_schedule_callback_struct *ss, *tmp;
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400695
Alan Stern523ded72007-04-26 00:12:04 -0700696 if (!try_module_get(owner))
697 return -ENODEV;
Alex Chiang66942062009-03-13 12:07:36 -0600698
699 mutex_lock(&sysfs_workq_mutex);
700 list_for_each_entry_safe(ss, tmp, &sysfs_workq, workq_list)
701 if (ss->kobj == kobj) {
Alex Chiangd1102712009-03-25 15:11:36 -0600702 module_put(owner);
Alex Chiang66942062009-03-13 12:07:36 -0600703 mutex_unlock(&sysfs_workq_mutex);
704 return -EAGAIN;
705 }
706 mutex_unlock(&sysfs_workq_mutex);
707
Alex Chiangd1102712009-03-25 15:11:36 -0600708 if (sysfs_workqueue == NULL) {
Andrew Morton086a3772009-05-07 12:36:53 -0700709 sysfs_workqueue = create_singlethread_workqueue("sysfsd");
Alex Chiangd1102712009-03-25 15:11:36 -0600710 if (sysfs_workqueue == NULL) {
711 module_put(owner);
712 return -ENOMEM;
713 }
714 }
715
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400716 ss = kmalloc(sizeof(*ss), GFP_KERNEL);
Alan Stern523ded72007-04-26 00:12:04 -0700717 if (!ss) {
718 module_put(owner);
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400719 return -ENOMEM;
Alan Stern523ded72007-04-26 00:12:04 -0700720 }
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400721 kobject_get(kobj);
722 ss->kobj = kobj;
723 ss->func = func;
724 ss->data = data;
Alan Stern523ded72007-04-26 00:12:04 -0700725 ss->owner = owner;
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400726 INIT_WORK(&ss->work, sysfs_schedule_callback_work);
Alex Chiang66942062009-03-13 12:07:36 -0600727 INIT_LIST_HEAD(&ss->workq_list);
728 mutex_lock(&sysfs_workq_mutex);
729 list_add_tail(&ss->workq_list, &sysfs_workq);
730 mutex_unlock(&sysfs_workq_mutex);
Alex Chiangd1102712009-03-25 15:11:36 -0600731 queue_work(sysfs_workqueue, &ss->work);
Alan Sternd9a9cdf2007-03-15 15:50:34 -0400732 return 0;
733}
734EXPORT_SYMBOL_GPL(sysfs_schedule_callback);