blob: 5e73d6626e50593ef95eeca259d71d6e8babbb55 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Tejun Heo6d66f5c2007-09-20 17:31:38 +09002 * fs/sysfs/dir.c - sysfs core and dir operation implementation
3 *
4 * Copyright (c) 2001-3 Patrick Mochel
5 * Copyright (c) 2007 SUSE Linux Products GmbH
6 * Copyright (c) 2007 Tejun Heo <teheo@suse.de>
7 *
8 * This file is released under the GPLv2.
9 *
10 * Please see Documentation/filesystems/sysfs.txt for more information.
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 */
12
13#undef DEBUG
14
15#include <linux/fs.h>
16#include <linux/mount.h>
17#include <linux/module.h>
18#include <linux/kobject.h>
Christoph Hellwig5f45f1a2005-06-23 00:09:12 -070019#include <linux/namei.h>
Tejun Heo2b611bb2007-06-14 03:45:13 +090020#include <linux/idr.h>
Tejun Heo8619f972007-06-14 03:45:18 +090021#include <linux/completion.h>
Dave Young869512a2007-07-26 14:53:53 +000022#include <linux/mutex.h>
Robert P. J. Dayc6f87732008-03-13 22:41:52 -040023#include <linux/slab.h>
Eric W. Biederman4c3da222009-11-04 02:50:06 -080024#include <linux/security.h>
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080025#include <linux/hash.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026#include "sysfs.h"
27
Tejun Heo3007e992007-06-14 04:27:23 +090028DEFINE_MUTEX(sysfs_mutex);
Tejun Heo0cae60f2013-10-30 10:28:36 -040029DEFINE_SPINLOCK(sysfs_symlink_target_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Tejun Heobcac3762013-09-11 22:29:03 -040031#define to_sysfs_dirent(X) rb_entry((X), struct sysfs_dirent, s_rb)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080032
Roel Kluinf7a75f02007-10-16 23:30:25 -070033static DEFINE_SPINLOCK(sysfs_ino_lock);
Tejun Heo2b611bb2007-06-14 03:45:13 +090034static DEFINE_IDA(sysfs_ino_ida);
35
Tejun Heob6b4a432007-06-14 03:45:18 +090036/**
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080037 * sysfs_name_hash
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080038 * @name: Null terminated string to hash
Tejun Heocfec0bc2013-09-11 22:29:09 -040039 * @ns: Namespace tag to hash
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080040 *
41 * Returns 31 bit hash of ns + name (so it fits in an off_t )
42 */
Tejun Heocfec0bc2013-09-11 22:29:09 -040043static unsigned int sysfs_name_hash(const char *name, const void *ns)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080044{
45 unsigned long hash = init_name_hash();
46 unsigned int len = strlen(name);
47 while (len--)
48 hash = partial_name_hash(*name++, hash);
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -070049 hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31));
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080050 hash &= 0x7fffffffU;
51 /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
52 if (hash < 1)
53 hash += 2;
54 if (hash >= INT_MAX)
55 hash = INT_MAX - 1;
56 return hash;
57}
58
Tejun Heocfec0bc2013-09-11 22:29:09 -040059static int sysfs_name_compare(unsigned int hash, const char *name,
60 const void *ns, const struct sysfs_dirent *sd)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080061{
62 if (hash != sd->s_hash)
63 return hash - sd->s_hash;
64 if (ns != sd->s_ns)
65 return ns - sd->s_ns;
66 return strcmp(name, sd->s_name);
67}
68
69static int sysfs_sd_compare(const struct sysfs_dirent *left,
70 const struct sysfs_dirent *right)
71{
Tejun Heocfec0bc2013-09-11 22:29:09 -040072 return sysfs_name_compare(left->s_hash, left->s_name, left->s_ns,
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080073 right);
74}
75
76/**
Warner Wang43474912013-05-13 11:11:05 +080077 * sysfs_link_sibling - link sysfs_dirent into sibling rbtree
Tejun Heo0c73f182007-06-14 03:45:18 +090078 * @sd: sysfs_dirent of interest
79 *
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080080 * Link @sd into its sibling rbtree which starts from
Tejun Heobc747f32007-09-20 16:05:12 +090081 * sd->s_parent->s_dir.children.
Tejun Heo0c73f182007-06-14 03:45:18 +090082 *
83 * Locking:
Tejun Heo3007e992007-06-14 04:27:23 +090084 * mutex_lock(sysfs_mutex)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080085 *
86 * RETURNS:
87 * 0 on susccess -EEXIST on failure.
Tejun Heo0c73f182007-06-14 03:45:18 +090088 */
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080089static int sysfs_link_sibling(struct sysfs_dirent *sd)
Tejun Heo0c73f182007-06-14 03:45:18 +090090{
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080091 struct rb_node **node = &sd->s_parent->s_dir.children.rb_node;
92 struct rb_node *parent = NULL;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -040093
Greg Kroah-Hartman54d20f02012-03-08 13:03:10 -080094 if (sysfs_type(sd) == SYSFS_DIR)
95 sd->s_parent->s_dir.subdirs++;
96
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080097 while (*node) {
98 struct sysfs_dirent *pos;
99 int result;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400100
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800101 pos = to_sysfs_dirent(*node);
102 parent = *node;
103 result = sysfs_sd_compare(sd, pos);
104 if (result < 0)
105 node = &pos->s_rb.rb_left;
106 else if (result > 0)
107 node = &pos->s_rb.rb_right;
108 else
109 return -EEXIST;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400110 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800111 /* add new node and rebalance the tree */
112 rb_link_node(&sd->s_rb, parent, node);
113 rb_insert_color(&sd->s_rb, &sd->s_parent->s_dir.children);
114 return 0;
Tejun Heo0c73f182007-06-14 03:45:18 +0900115}
116
117/**
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800118 * sysfs_unlink_sibling - unlink sysfs_dirent from sibling rbtree
Tejun Heo0c73f182007-06-14 03:45:18 +0900119 * @sd: sysfs_dirent of interest
120 *
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800121 * Unlink @sd from its sibling rbtree which starts from
Tejun Heobc747f32007-09-20 16:05:12 +0900122 * sd->s_parent->s_dir.children.
Tejun Heo0c73f182007-06-14 03:45:18 +0900123 *
124 * Locking:
Tejun Heo3007e992007-06-14 04:27:23 +0900125 * mutex_lock(sysfs_mutex)
Tejun Heo0c73f182007-06-14 03:45:18 +0900126 */
Tejun Heo41fc1c22007-08-02 21:38:03 +0900127static void sysfs_unlink_sibling(struct sysfs_dirent *sd)
Tejun Heo0c73f182007-06-14 03:45:18 +0900128{
Greg Kroah-Hartman54d20f02012-03-08 13:03:10 -0800129 if (sysfs_type(sd) == SYSFS_DIR)
130 sd->s_parent->s_dir.subdirs--;
131
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800132 rb_erase(&sd->s_rb, &sd->s_parent->s_dir.children);
Tejun Heo0c73f182007-06-14 03:45:18 +0900133}
134
135/**
Tejun Heob6b4a432007-06-14 03:45:18 +0900136 * sysfs_get_active - get an active reference to sysfs_dirent
137 * @sd: sysfs_dirent to get an active reference to
138 *
139 * Get an active reference of @sd. This function is noop if @sd
140 * is NULL.
141 *
142 * RETURNS:
143 * Pointer to @sd on success, NULL on failure.
144 */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800145struct sysfs_dirent *sysfs_get_active(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900146{
Tejun Heo8619f972007-06-14 03:45:18 +0900147 if (unlikely(!sd))
148 return NULL;
149
Maarten Lankhorst3db3c622013-03-08 16:07:27 +0100150 if (!atomic_inc_unless_negative(&sd->s_active))
151 return NULL;
Alan Stern356c05d2012-05-14 13:30:03 -0400152
Tejun Heo785a1622013-10-14 09:27:11 -0400153 if (likely(!sysfs_ignore_lockdep(sd)))
Alan Stern356c05d2012-05-14 13:30:03 -0400154 rwsem_acquire_read(&sd->dep_map, 0, 1, _RET_IP_);
155 return sd;
Tejun Heob6b4a432007-06-14 03:45:18 +0900156}
157
158/**
159 * sysfs_put_active - put an active reference to sysfs_dirent
160 * @sd: sysfs_dirent to put an active reference to
161 *
162 * Put an active reference to @sd. This function is noop if @sd
163 * is NULL.
164 */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800165void sysfs_put_active(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900166{
Tejun Heo8619f972007-06-14 03:45:18 +0900167 int v;
168
169 if (unlikely(!sd))
170 return;
171
Tejun Heo785a1622013-10-14 09:27:11 -0400172 if (likely(!sysfs_ignore_lockdep(sd)))
Alan Stern356c05d2012-05-14 13:30:03 -0400173 rwsem_release(&sd->dep_map, 1, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900174 v = atomic_dec_return(&sd->s_active);
175 if (likely(v != SD_DEACTIVATED_BIAS))
176 return;
177
178 /* atomic_dec_return() is a mb(), we'll always see the updated
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400179 * sd->u.completion.
Tejun Heo8619f972007-06-14 03:45:18 +0900180 */
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400181 complete(sd->u.completion);
Tejun Heob6b4a432007-06-14 03:45:18 +0900182}
183
184/**
Tejun Heob6b4a432007-06-14 03:45:18 +0900185 * sysfs_deactivate - deactivate sysfs_dirent
186 * @sd: sysfs_dirent to deactivate
187 *
Tejun Heo8619f972007-06-14 03:45:18 +0900188 * Deny new active references and drain existing ones.
Tejun Heob6b4a432007-06-14 03:45:18 +0900189 */
Tejun Heofb6896d2007-06-14 04:27:24 +0900190static void sysfs_deactivate(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900191{
Tejun Heo8619f972007-06-14 03:45:18 +0900192 DECLARE_COMPLETION_ONSTACK(wait);
193 int v;
Tejun Heob6b4a432007-06-14 03:45:18 +0900194
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400195 BUG_ON(!(sd->s_flags & SYSFS_FLAG_REMOVED));
Eric W. Biedermana2db6842010-02-11 15:20:00 -0800196
197 if (!(sysfs_type(sd) & SYSFS_ACTIVE_REF))
198 return;
199
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400200 sd->u.completion = (void *)&wait;
Tejun Heo8619f972007-06-14 03:45:18 +0900201
Eric W. Biederman846f9972010-01-02 13:37:12 -0800202 rwsem_acquire(&sd->dep_map, 0, 0, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900203 /* atomic_add_return() is a mb(), put_active() will always see
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400204 * the updated sd->u.completion.
Tejun Heob6b4a432007-06-14 03:45:18 +0900205 */
Tejun Heo8619f972007-06-14 03:45:18 +0900206 v = atomic_add_return(SD_DEACTIVATED_BIAS, &sd->s_active);
207
Eric W. Biederman846f9972010-01-02 13:37:12 -0800208 if (v != SD_DEACTIVATED_BIAS) {
209 lock_contended(&sd->dep_map, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900210 wait_for_completion(&wait);
Eric W. Biederman846f9972010-01-02 13:37:12 -0800211 }
Tejun Heo8619f972007-06-14 03:45:18 +0900212
Eric W. Biederman846f9972010-01-02 13:37:12 -0800213 lock_acquired(&sd->dep_map, _RET_IP_);
214 rwsem_release(&sd->dep_map, 1, _RET_IP_);
Tejun Heob6b4a432007-06-14 03:45:18 +0900215}
216
Eric W. Biedermancafa6b52011-12-18 20:08:16 -0800217static int sysfs_alloc_ino(unsigned int *pino)
Tejun Heo2b611bb2007-06-14 03:45:13 +0900218{
219 int ino, rc;
220
221 retry:
222 spin_lock(&sysfs_ino_lock);
223 rc = ida_get_new_above(&sysfs_ino_ida, 2, &ino);
224 spin_unlock(&sysfs_ino_lock);
225
226 if (rc == -EAGAIN) {
227 if (ida_pre_get(&sysfs_ino_ida, GFP_KERNEL))
228 goto retry;
229 rc = -ENOMEM;
230 }
231
232 *pino = ino;
233 return rc;
234}
235
Eric W. Biedermancafa6b52011-12-18 20:08:16 -0800236static void sysfs_free_ino(unsigned int ino)
Tejun Heo2b611bb2007-06-14 03:45:13 +0900237{
238 spin_lock(&sysfs_ino_lock);
239 ida_remove(&sysfs_ino_ida, ino);
240 spin_unlock(&sysfs_ino_lock);
241}
242
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700243void release_sysfs_dirent(struct sysfs_dirent *sd)
Tejun Heofa7f9122007-06-14 03:45:13 +0900244{
Tejun Heo13b30862007-06-14 03:45:14 +0900245 struct sysfs_dirent *parent_sd;
246
247 repeat:
Tejun Heo3007e992007-06-14 04:27:23 +0900248 /* Moving/renaming is always done while holding reference.
249 * sd->s_parent won't change beneath us.
250 */
Tejun Heo13b30862007-06-14 03:45:14 +0900251 parent_sd = sd->s_parent;
252
Ming Leibb2b0052013-04-04 22:22:37 +0800253 WARN(!(sd->s_flags & SYSFS_FLAG_REMOVED),
254 "sysfs: free using entry: %s/%s\n",
255 parent_sd ? parent_sd->s_name : "", sd->s_name);
256
Tejun Heob402d722007-06-14 04:27:21 +0900257 if (sysfs_type(sd) == SYSFS_KOBJ_LINK)
Tejun Heob1fc3d62007-09-20 16:05:11 +0900258 sysfs_put(sd->s_symlink.target_sd);
Tejun Heob402d722007-06-14 04:27:21 +0900259 if (sysfs_type(sd) & SYSFS_COPY_NAME)
Tejun Heo0c096b52007-06-14 03:45:15 +0900260 kfree(sd->s_name);
Eric W. Biederman4c3da222009-11-04 02:50:06 -0800261 if (sd->s_iattr && sd->s_iattr->ia_secdata)
262 security_release_secctx(sd->s_iattr->ia_secdata,
263 sd->s_iattr->ia_secdata_len);
Tejun Heofa7f9122007-06-14 03:45:13 +0900264 kfree(sd->s_iattr);
Tejun Heo2b611bb2007-06-14 03:45:13 +0900265 sysfs_free_ino(sd->s_ino);
Tejun Heofa7f9122007-06-14 03:45:13 +0900266 kmem_cache_free(sysfs_dir_cachep, sd);
Tejun Heo13b30862007-06-14 03:45:14 +0900267
268 sd = parent_sd;
269 if (sd && atomic_dec_and_test(&sd->s_count))
270 goto repeat;
Tejun Heofa7f9122007-06-14 03:45:13 +0900271}
272
Nick Pigginfe15ce42011-01-07 17:49:23 +1100273static int sysfs_dentry_delete(const struct dentry *dentry)
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800274{
275 struct sysfs_dirent *sd = dentry->d_fsdata;
Al Viro469796d2012-06-07 20:51:39 -0400276 return !(sd && !(sd->s_flags & SYSFS_FLAG_REMOVED));
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800277}
278
Al Viro0b728e12012-06-10 16:03:43 -0400279static int sysfs_dentry_revalidate(struct dentry *dentry, unsigned int flags)
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800280{
Nick Piggin34286d62011-01-07 17:49:57 +1100281 struct sysfs_dirent *sd;
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900282 int type;
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800283
Al Viro0b728e12012-06-10 16:03:43 -0400284 if (flags & LOOKUP_RCU)
Nick Piggin34286d62011-01-07 17:49:57 +1100285 return -ECHILD;
286
287 sd = dentry->d_fsdata;
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800288 mutex_lock(&sysfs_mutex);
289
290 /* The sysfs dirent has been deleted */
291 if (sd->s_flags & SYSFS_FLAG_REMOVED)
292 goto out_bad;
293
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800294 /* The sysfs dirent has been moved? */
295 if (dentry->d_parent->d_fsdata != sd->s_parent)
296 goto out_bad;
297
298 /* The sysfs dirent has been renamed */
299 if (strcmp(dentry->d_name.name, sd->s_name) != 0)
300 goto out_bad;
301
Glauber Costae5bcac62012-07-06 13:09:07 +0400302 /* The sysfs dirent has been moved to a different namespace */
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900303 type = KOBJ_NS_TYPE_NONE;
304 if (sd->s_parent) {
305 type = sysfs_ns_type(sd->s_parent);
306 if (type != KOBJ_NS_TYPE_NONE &&
307 sysfs_info(dentry->d_sb)->ns[type] != sd->s_ns)
308 goto out_bad;
309 }
Glauber Costae5bcac62012-07-06 13:09:07 +0400310
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800311 mutex_unlock(&sysfs_mutex);
312out_valid:
313 return 1;
314out_bad:
315 /* Remove the dentry from the dcache hashes.
316 * If this is a deleted dentry we use d_drop instead of d_delete
317 * so sysfs doesn't need to cope with negative dentries.
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800318 *
319 * If this is a dentry that has simply been renamed we
320 * use d_drop to remove it from the dcache lookup on its
321 * old parent. If this dentry persists later when a lookup
322 * is performed at its new name the dentry will be readded
323 * to the dcache hashes.
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800324 */
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800325 mutex_unlock(&sysfs_mutex);
Miklos Szeredi6497d162013-09-05 11:44:41 +0200326
327 /* If we have submounts we must allow the vfs caches
328 * to lie about the state of the filesystem to prevent
329 * leaks and other nasty things.
330 */
331 if (check_submounts_and_drop(dentry) != 0)
332 goto out_valid;
333
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800334 return 0;
335}
336
Al Viro469796d2012-06-07 20:51:39 -0400337static void sysfs_dentry_release(struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338{
Al Viro469796d2012-06-07 20:51:39 -0400339 sysfs_put(dentry->d_fsdata);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700340}
341
Al Viro469796d2012-06-07 20:51:39 -0400342const struct dentry_operations sysfs_dentry_ops = {
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800343 .d_revalidate = sysfs_dentry_revalidate,
344 .d_delete = sysfs_dentry_delete,
Al Viro469796d2012-06-07 20:51:39 -0400345 .d_release = sysfs_dentry_release,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346};
347
Tejun Heo3e519032007-06-14 03:45:15 +0900348struct sysfs_dirent *sysfs_new_dirent(const char *name, umode_t mode, int type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700349{
Tejun Heo0c096b52007-06-14 03:45:15 +0900350 char *dup_name = NULL;
Akinobu Mita01da2422007-07-14 11:03:35 +0900351 struct sysfs_dirent *sd;
Tejun Heo0c096b52007-06-14 03:45:15 +0900352
353 if (type & SYSFS_COPY_NAME) {
354 name = dup_name = kstrdup(name, GFP_KERNEL);
355 if (!name)
Akinobu Mita01da2422007-07-14 11:03:35 +0900356 return NULL;
Tejun Heo0c096b52007-06-14 03:45:15 +0900357 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358
Robert P. J. Dayc3762222007-02-10 01:45:03 -0800359 sd = kmem_cache_zalloc(sysfs_dir_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360 if (!sd)
Akinobu Mita01da2422007-07-14 11:03:35 +0900361 goto err_out1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700362
Tejun Heo0c096b52007-06-14 03:45:15 +0900363 if (sysfs_alloc_ino(&sd->s_ino))
Akinobu Mita01da2422007-07-14 11:03:35 +0900364 goto err_out2;
Tejun Heo2b611bb2007-06-14 03:45:13 +0900365
Linus Torvalds1da177e2005-04-16 15:20:36 -0700366 atomic_set(&sd->s_count, 1);
Tejun Heo8619f972007-06-14 03:45:18 +0900367 atomic_set(&sd->s_active, 0);
Tejun Heoa26cd722007-06-14 03:45:14 +0900368
Tejun Heo0c096b52007-06-14 03:45:15 +0900369 sd->s_name = name;
Tejun Heoa26cd722007-06-14 03:45:14 +0900370 sd->s_mode = mode;
Ming Leibb2b0052013-04-04 22:22:37 +0800371 sd->s_flags = type | SYSFS_FLAG_REMOVED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372
373 return sd;
Tejun Heo0c096b52007-06-14 03:45:15 +0900374
Akinobu Mita01da2422007-07-14 11:03:35 +0900375 err_out2:
Tejun Heo0c096b52007-06-14 03:45:15 +0900376 kmem_cache_free(sysfs_dir_cachep, sd);
Akinobu Mita01da2422007-07-14 11:03:35 +0900377 err_out1:
378 kfree(dup_name);
Tejun Heo0c096b52007-06-14 03:45:15 +0900379 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380}
381
Tejun Heo3007e992007-06-14 04:27:23 +0900382/**
Tejun Heofb6896d2007-06-14 04:27:24 +0900383 * sysfs_addrm_start - prepare for sysfs_dirent add/remove
384 * @acxt: pointer to sysfs_addrm_cxt to be used
Tejun Heo3007e992007-06-14 04:27:23 +0900385 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400386 * This function is called when the caller is about to add or remove
387 * sysfs_dirent. This function acquires sysfs_mutex. @acxt is used
388 * to keep and pass context to other addrm functions.
Tejun Heo3007e992007-06-14 04:27:23 +0900389 *
390 * LOCKING:
Tejun Heofb6896d2007-06-14 04:27:24 +0900391 * Kernel thread context (may sleep). sysfs_mutex is locked on
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800392 * return.
Tejun Heo3007e992007-06-14 04:27:23 +0900393 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400394void sysfs_addrm_start(struct sysfs_addrm_cxt *acxt)
395 __acquires(sysfs_mutex)
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700396{
Tejun Heofb6896d2007-06-14 04:27:24 +0900397 memset(acxt, 0, sizeof(*acxt));
Tejun Heofb6896d2007-06-14 04:27:24 +0900398
Tejun Heofb6896d2007-06-14 04:27:24 +0900399 mutex_lock(&sysfs_mutex);
Tejun Heofb6896d2007-06-14 04:27:24 +0900400}
401
402/**
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200403 * __sysfs_add_one - add sysfs_dirent to parent without warning
404 * @acxt: addrm context to use
405 * @sd: sysfs_dirent to be added
Tejun Heod69ac5a2013-09-18 17:15:35 -0400406 * @parent_sd: the parent sysfs_dirent to add @sd to
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200407 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400408 * Get @parent_sd and set @sd->s_parent to it and increment nlink of
409 * the parent inode if @sd is a directory and link into the children
410 * list of the parent.
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200411 *
412 * This function should be called between calls to
413 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
414 * passed the same @acxt as passed to sysfs_addrm_start().
415 *
416 * LOCKING:
417 * Determined by sysfs_addrm_start().
418 *
419 * RETURNS:
420 * 0 on success, -EEXIST if entry with the given name already
421 * exists.
422 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400423int __sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
424 struct sysfs_dirent *parent_sd)
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200425{
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800426 struct sysfs_inode_attrs *ps_iattr;
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800427 int ret;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800428
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900429 if (!!sysfs_ns_type(parent_sd) != !!sd->s_ns) {
430 WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n",
431 sysfs_ns_type(parent_sd) ? "required" : "invalid",
432 parent_sd->s_name, sd->s_name);
433 return -EINVAL;
434 }
435
Tejun Heocfec0bc2013-09-11 22:29:09 -0400436 sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
Tejun Heod69ac5a2013-09-18 17:15:35 -0400437 sd->s_parent = sysfs_get(parent_sd);
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200438
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800439 ret = sysfs_link_sibling(sd);
440 if (ret)
441 return ret;
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200442
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800443 /* Update timestamps on the parent */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400444 ps_iattr = parent_sd->s_iattr;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800445 if (ps_iattr) {
446 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
447 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
448 }
449
Ming Leibb2b0052013-04-04 22:22:37 +0800450 /* Mark the entry added into directory tree */
451 sd->s_flags &= ~SYSFS_FLAG_REMOVED;
452
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200453 return 0;
454}
455
456/**
Alex Chiang425cb022009-02-12 10:56:59 -0700457 * sysfs_pathname - return full path to sysfs dirent
458 * @sd: sysfs_dirent whose path we want
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200459 * @path: caller allocated buffer of size PATH_MAX
Alex Chiang425cb022009-02-12 10:56:59 -0700460 *
461 * Gives the name "/" to the sysfs_root entry; any path returned
462 * is relative to wherever sysfs is mounted.
Alex Chiang425cb022009-02-12 10:56:59 -0700463 */
464static char *sysfs_pathname(struct sysfs_dirent *sd, char *path)
465{
466 if (sd->s_parent) {
467 sysfs_pathname(sd->s_parent, path);
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200468 strlcat(path, "/", PATH_MAX);
Alex Chiang425cb022009-02-12 10:56:59 -0700469 }
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200470 strlcat(path, sd->s_name, PATH_MAX);
Alex Chiang425cb022009-02-12 10:56:59 -0700471 return path;
472}
473
Tejun Heod1c14592013-10-24 11:49:11 -0400474void sysfs_warn_dup(struct sysfs_dirent *parent, const char *name)
475{
476 char *path;
477
478 path = kzalloc(PATH_MAX, GFP_KERNEL);
479 if (path) {
480 sysfs_pathname(parent, path);
481 strlcat(path, "/", PATH_MAX);
482 strlcat(path, name, PATH_MAX);
483 }
484
485 WARN(1, KERN_WARNING "sysfs: cannot create duplicate filename '%s'\n",
486 path ? path : name);
487
488 kfree(path);
489}
490
Alex Chiang425cb022009-02-12 10:56:59 -0700491/**
Tejun Heofb6896d2007-06-14 04:27:24 +0900492 * sysfs_add_one - add sysfs_dirent to parent
493 * @acxt: addrm context to use
494 * @sd: sysfs_dirent to be added
Tejun Heod69ac5a2013-09-18 17:15:35 -0400495 * @parent_sd: the parent sysfs_dirent to add @sd to
Tejun Heofb6896d2007-06-14 04:27:24 +0900496 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400497 * Get @parent_sd and set @sd->s_parent to it and increment nlink of
498 * the parent inode if @sd is a directory and link into the children
499 * list of the parent.
Tejun Heofb6896d2007-06-14 04:27:24 +0900500 *
501 * This function should be called between calls to
502 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
503 * passed the same @acxt as passed to sysfs_addrm_start().
504 *
505 * LOCKING:
506 * Determined by sysfs_addrm_start().
Tejun Heo23dc2792007-08-02 21:38:03 +0900507 *
508 * RETURNS:
509 * 0 on success, -EEXIST if entry with the given name already
510 * exists.
Tejun Heofb6896d2007-06-14 04:27:24 +0900511 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400512int sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
513 struct sysfs_dirent *parent_sd)
Tejun Heofb6896d2007-06-14 04:27:24 +0900514{
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200515 int ret;
Tejun Heo23dc2792007-08-02 21:38:03 +0900516
Tejun Heod69ac5a2013-09-18 17:15:35 -0400517 ret = __sysfs_add_one(acxt, sd, parent_sd);
Alex Chiang425cb022009-02-12 10:56:59 -0700518
Tejun Heod1c14592013-10-24 11:49:11 -0400519 if (ret == -EEXIST)
520 sysfs_warn_dup(parent_sd, sd->s_name);
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200521 return ret;
Tejun Heofb6896d2007-06-14 04:27:24 +0900522}
523
524/**
525 * sysfs_remove_one - remove sysfs_dirent from parent
526 * @acxt: addrm context to use
Jean Delvare9fd5b1c2008-01-08 18:11:24 +0100527 * @sd: sysfs_dirent to be removed
Tejun Heofb6896d2007-06-14 04:27:24 +0900528 *
529 * Mark @sd removed and drop nlink of parent inode if @sd is a
Tejun Heo181b2e42007-09-20 16:05:09 +0900530 * directory. @sd is unlinked from the children list.
Tejun Heofb6896d2007-06-14 04:27:24 +0900531 *
532 * This function should be called between calls to
533 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
534 * passed the same @acxt as passed to sysfs_addrm_start().
535 *
536 * LOCKING:
537 * Determined by sysfs_addrm_start().
538 */
Tejun Heo250f7c32013-09-18 17:15:38 -0400539static void sysfs_remove_one(struct sysfs_addrm_cxt *acxt,
540 struct sysfs_dirent *sd)
Tejun Heofb6896d2007-06-14 04:27:24 +0900541{
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800542 struct sysfs_inode_attrs *ps_iattr;
543
Tejun Heo26ea12d2013-09-18 17:15:36 -0400544 /*
545 * Removal can be called multiple times on the same node. Only the
546 * first invocation is effective and puts the base ref.
547 */
548 if (sd->s_flags & SYSFS_FLAG_REMOVED)
549 return;
Tejun Heo41fc1c22007-08-02 21:38:03 +0900550
551 sysfs_unlink_sibling(sd);
Tejun Heofb6896d2007-06-14 04:27:24 +0900552
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800553 /* Update timestamps on the parent */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400554 ps_iattr = sd->s_parent->s_iattr;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800555 if (ps_iattr) {
556 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
557 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
558 }
559
Tejun Heofb6896d2007-06-14 04:27:24 +0900560 sd->s_flags |= SYSFS_FLAG_REMOVED;
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400561 sd->u.removed_list = acxt->removed;
Tejun Heofb6896d2007-06-14 04:27:24 +0900562 acxt->removed = sd;
Tejun Heoa0edd7c2007-06-14 04:27:24 +0900563}
564
565/**
Tejun Heofb6896d2007-06-14 04:27:24 +0900566 * sysfs_addrm_finish - finish up sysfs_dirent add/remove
567 * @acxt: addrm context to finish up
568 *
569 * Finish up sysfs_dirent add/remove. Resources acquired by
570 * sysfs_addrm_start() are released and removed sysfs_dirents are
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800571 * cleaned up.
Tejun Heofb6896d2007-06-14 04:27:24 +0900572 *
573 * LOCKING:
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800574 * sysfs_mutex is released.
Tejun Heofb6896d2007-06-14 04:27:24 +0900575 */
Tejun Heo990e53f2007-08-02 21:38:03 +0900576void sysfs_addrm_finish(struct sysfs_addrm_cxt *acxt)
Tejun Heod69ac5a2013-09-18 17:15:35 -0400577 __releases(sysfs_mutex)
Tejun Heofb6896d2007-06-14 04:27:24 +0900578{
579 /* release resources acquired by sysfs_addrm_start() */
580 mutex_unlock(&sysfs_mutex);
Tejun Heofb6896d2007-06-14 04:27:24 +0900581
582 /* kill removed sysfs_dirents */
583 while (acxt->removed) {
584 struct sysfs_dirent *sd = acxt->removed;
585
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400586 acxt->removed = sd->u.removed_list;
Tejun Heofb6896d2007-06-14 04:27:24 +0900587
Tejun Heofb6896d2007-06-14 04:27:24 +0900588 sysfs_deactivate(sd);
Tejun Heo73d97142013-10-01 17:42:07 -0400589 sysfs_unmap_bin_file(sd);
Tejun Heofb6896d2007-06-14 04:27:24 +0900590 sysfs_put(sd);
591 }
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700592}
593
Tejun Heof0b0af42007-06-14 04:27:22 +0900594/**
595 * sysfs_find_dirent - find sysfs_dirent with the given name
596 * @parent_sd: sysfs_dirent to search under
597 * @name: name to look for
Tejun Heocfec0bc2013-09-11 22:29:09 -0400598 * @ns: the namespace tag to use
Maneesh Sonic5168652006-03-09 19:40:14 +0530599 *
Tejun Heof0b0af42007-06-14 04:27:22 +0900600 * Look for sysfs_dirent with name @name under @parent_sd.
Maneesh Sonic5168652006-03-09 19:40:14 +0530601 *
Tejun Heof0b0af42007-06-14 04:27:22 +0900602 * LOCKING:
Tejun Heo3007e992007-06-14 04:27:23 +0900603 * mutex_lock(sysfs_mutex)
Tejun Heof0b0af42007-06-14 04:27:22 +0900604 *
605 * RETURNS:
606 * Pointer to sysfs_dirent if found, NULL if not.
Maneesh Sonic5168652006-03-09 19:40:14 +0530607 */
Tejun Heof0b0af42007-06-14 04:27:22 +0900608struct sysfs_dirent *sysfs_find_dirent(struct sysfs_dirent *parent_sd,
Tejun Heocfec0bc2013-09-11 22:29:09 -0400609 const unsigned char *name,
610 const void *ns)
Maneesh Sonic5168652006-03-09 19:40:14 +0530611{
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800612 struct rb_node *node = parent_sd->s_dir.children.rb_node;
613 unsigned int hash;
Maneesh Sonic5168652006-03-09 19:40:14 +0530614
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900615 if (!!sysfs_ns_type(parent_sd) != !!ns) {
616 WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n",
617 sysfs_ns_type(parent_sd) ? "required" : "invalid",
618 parent_sd->s_name, name);
619 return NULL;
620 }
621
Tejun Heocfec0bc2013-09-11 22:29:09 -0400622 hash = sysfs_name_hash(name, ns);
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800623 while (node) {
624 struct sysfs_dirent *sd;
625 int result;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400626
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800627 sd = to_sysfs_dirent(node);
Tejun Heocfec0bc2013-09-11 22:29:09 -0400628 result = sysfs_name_compare(hash, name, ns, sd);
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800629 if (result < 0)
630 node = node->rb_left;
631 else if (result > 0)
632 node = node->rb_right;
633 else
634 return sd;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400635 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800636 return NULL;
Tejun Heof0b0af42007-06-14 04:27:22 +0900637}
Maneesh Sonic5168652006-03-09 19:40:14 +0530638
Tejun Heof0b0af42007-06-14 04:27:22 +0900639/**
Tejun Heo388975c2013-09-11 23:19:13 -0400640 * sysfs_get_dirent_ns - find and get sysfs_dirent with the given name
Tejun Heof0b0af42007-06-14 04:27:22 +0900641 * @parent_sd: sysfs_dirent to search under
642 * @name: name to look for
Tejun Heo388975c2013-09-11 23:19:13 -0400643 * @ns: the namespace tag to use
Tejun Heof0b0af42007-06-14 04:27:22 +0900644 *
645 * Look for sysfs_dirent with name @name under @parent_sd and get
646 * it if found.
647 *
648 * LOCKING:
Tejun Heo3007e992007-06-14 04:27:23 +0900649 * Kernel thread context (may sleep). Grabs sysfs_mutex.
Tejun Heof0b0af42007-06-14 04:27:22 +0900650 *
651 * RETURNS:
652 * Pointer to sysfs_dirent if found, NULL if not.
653 */
Tejun Heo388975c2013-09-11 23:19:13 -0400654struct sysfs_dirent *sysfs_get_dirent_ns(struct sysfs_dirent *parent_sd,
655 const unsigned char *name,
656 const void *ns)
Tejun Heof0b0af42007-06-14 04:27:22 +0900657{
658 struct sysfs_dirent *sd;
659
Tejun Heo3007e992007-06-14 04:27:23 +0900660 mutex_lock(&sysfs_mutex);
Tejun Heocfec0bc2013-09-11 22:29:09 -0400661 sd = sysfs_find_dirent(parent_sd, name, ns);
Tejun Heof0b0af42007-06-14 04:27:22 +0900662 sysfs_get(sd);
Tejun Heo3007e992007-06-14 04:27:23 +0900663 mutex_unlock(&sysfs_mutex);
Tejun Heof0b0af42007-06-14 04:27:22 +0900664
665 return sd;
Maneesh Sonic5168652006-03-09 19:40:14 +0530666}
Tejun Heo388975c2013-09-11 23:19:13 -0400667EXPORT_SYMBOL_GPL(sysfs_get_dirent_ns);
Maneesh Sonic5168652006-03-09 19:40:14 +0530668
Tejun Heo608e2662007-06-14 04:27:22 +0900669static int create_dir(struct kobject *kobj, struct sysfs_dirent *parent_sd,
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900670 enum kobj_ns_type type,
Tejun Heocfec0bc2013-09-11 22:29:09 -0400671 const char *name, const void *ns,
672 struct sysfs_dirent **p_sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700673{
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700674 umode_t mode = S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO;
Tejun Heo51225032007-06-14 04:27:25 +0900675 struct sysfs_addrm_cxt acxt;
Tejun Heodfeb9fb2007-06-14 03:45:14 +0900676 struct sysfs_dirent *sd;
Tejun Heo23dc2792007-08-02 21:38:03 +0900677 int rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700678
Tejun Heofc9f54b2007-06-14 03:45:17 +0900679 /* allocate */
Tejun Heo3e519032007-06-14 03:45:15 +0900680 sd = sysfs_new_dirent(name, mode, SYSFS_DIR);
Tejun Heoa26cd722007-06-14 03:45:14 +0900681 if (!sd)
Tejun Heo51225032007-06-14 04:27:25 +0900682 return -ENOMEM;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700683
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900684 sd->s_flags |= (type << SYSFS_NS_TYPE_SHIFT);
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700685 sd->s_ns = ns;
Tejun Heob1fc3d62007-09-20 16:05:11 +0900686 sd->s_dir.kobj = kobj;
Tejun Heodfeb9fb2007-06-14 03:45:14 +0900687
Tejun Heo51225032007-06-14 04:27:25 +0900688 /* link in */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400689 sysfs_addrm_start(&acxt);
690 rc = sysfs_add_one(&acxt, sd, parent_sd);
Tejun Heo23dc2792007-08-02 21:38:03 +0900691 sysfs_addrm_finish(&acxt);
Tejun Heo967e35d2007-07-18 16:38:11 +0900692
Tejun Heo23dc2792007-08-02 21:38:03 +0900693 if (rc == 0)
694 *p_sd = sd;
695 else
Tejun Heo967e35d2007-07-18 16:38:11 +0900696 sysfs_put(sd);
Tejun Heofc9f54b2007-06-14 03:45:17 +0900697
Tejun Heo23dc2792007-08-02 21:38:03 +0900698 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699}
700
Tejun Heo608e2662007-06-14 04:27:22 +0900701int sysfs_create_subdir(struct kobject *kobj, const char *name,
702 struct sysfs_dirent **p_sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700703{
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900704 return create_dir(kobj, kobj->sd,
705 KOBJ_NS_TYPE_NONE, name, NULL, p_sd);
706}
707
708/**
709 * sysfs_read_ns_type: return associated ns_type
710 * @kobj: the kobject being queried
711 *
712 * Each kobject can be tagged with exactly one namespace type
713 * (i.e. network or user). Return the ns_type associated with
714 * this object if any
715 */
716static enum kobj_ns_type sysfs_read_ns_type(struct kobject *kobj)
717{
718 const struct kobj_ns_type_operations *ops;
719 enum kobj_ns_type type;
720
721 ops = kobj_child_ns_ops(kobj);
722 if (!ops)
723 return KOBJ_NS_TYPE_NONE;
724
725 type = ops->type;
726 BUG_ON(type <= KOBJ_NS_TYPE_NONE);
727 BUG_ON(type >= KOBJ_NS_TYPES);
728 BUG_ON(!kobj_ns_type_registered(type));
729
730 return type;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700731}
732
733/**
Tejun Heoe34ff492013-09-11 22:29:05 -0400734 * sysfs_create_dir_ns - create a directory for an object with a namespace tag
735 * @kobj: object we're creating directory for
736 * @ns: the namespace tag to use
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737 */
Tejun Heoe34ff492013-09-11 22:29:05 -0400738int sysfs_create_dir_ns(struct kobject *kobj, const void *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739{
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900740 enum kobj_ns_type type;
Tejun Heo608e2662007-06-14 04:27:22 +0900741 struct sysfs_dirent *parent_sd, *sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742 int error = 0;
743
744 BUG_ON(!kobj);
745
Eric W. Biederman90bc6132007-07-31 19:15:08 +0900746 if (kobj->parent)
Tejun Heo608e2662007-06-14 04:27:22 +0900747 parent_sd = kobj->parent->sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748 else
Eric W. Biederman7d0c7d62007-08-20 21:36:30 +0900749 parent_sd = &sysfs_root;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700750
Dan Williams3a198882012-04-06 13:41:06 -0700751 if (!parent_sd)
752 return -ENOENT;
753
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900754 type = sysfs_read_ns_type(kobj);
755
756 error = create_dir(kobj, parent_sd, type, kobject_name(kobj), ns, &sd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700757 if (!error)
Tejun Heo608e2662007-06-14 04:27:22 +0900758 kobj->sd = sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759 return error;
760}
761
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700762static struct dentry *sysfs_lookup(struct inode *dir, struct dentry *dentry,
763 unsigned int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700764{
Tejun Heo6cb52142007-07-31 19:15:08 +0900765 struct dentry *ret = NULL;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700766 struct dentry *parent = dentry->d_parent;
767 struct sysfs_dirent *parent_sd = parent->d_fsdata;
Tejun Heoa7a04752007-08-02 21:38:02 +0900768 struct sysfs_dirent *sd;
Tejun Heofc9f54b2007-06-14 03:45:17 +0900769 struct inode *inode;
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900770 enum kobj_ns_type type;
771 const void *ns;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700772
Tejun Heo6cb52142007-07-31 19:15:08 +0900773 mutex_lock(&sysfs_mutex);
774
Linus Torvaldsa1212d22013-11-07 20:47:28 +0900775 type = sysfs_ns_type(parent_sd);
776 ns = sysfs_info(dir->i_sb)->ns[type];
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700777
Tejun Heocfec0bc2013-09-11 22:29:09 -0400778 sd = sysfs_find_dirent(parent_sd, dentry->d_name.name, ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700779
Tejun Heofc9f54b2007-06-14 03:45:17 +0900780 /* no such entry */
Tejun Heoe49452c2008-01-16 12:06:14 +0900781 if (!sd) {
782 ret = ERR_PTR(-ENOENT);
Tejun Heo6cb52142007-07-31 19:15:08 +0900783 goto out_unlock;
Tejun Heoe49452c2008-01-16 12:06:14 +0900784 }
Al Viro469796d2012-06-07 20:51:39 -0400785 dentry->d_fsdata = sysfs_get(sd);
Tejun Heofc9f54b2007-06-14 03:45:17 +0900786
787 /* attach dentry and inode */
Eric W. Biedermanfac26222010-02-12 19:22:27 -0800788 inode = sysfs_get_inode(dir->i_sb, sd);
Tejun Heo6cb52142007-07-31 19:15:08 +0900789 if (!inode) {
790 ret = ERR_PTR(-ENOMEM);
791 goto out_unlock;
792 }
Tejun Heo3007e992007-06-14 04:27:23 +0900793
Tejun Heod6b4fd22007-09-20 16:05:11 +0900794 /* instantiate and hash dentry */
Al Viroe77fb7c2012-06-07 20:56:54 -0400795 ret = d_materialise_unique(dentry, inode);
Tejun Heo6cb52142007-07-31 19:15:08 +0900796 out_unlock:
Tejun Heo3007e992007-06-14 04:27:23 +0900797 mutex_unlock(&sysfs_mutex);
Tejun Heo6cb52142007-07-31 19:15:08 +0900798 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700799}
800
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800801const struct inode_operations sysfs_dir_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700802 .lookup = sysfs_lookup,
Eric W. Biedermane61ab4a2009-11-20 16:08:53 -0800803 .permission = sysfs_permission,
Maneesh Soni988d1862005-05-31 10:39:14 +0530804 .setattr = sysfs_setattr,
Eric W. Biedermane61ab4a2009-11-20 16:08:53 -0800805 .getattr = sysfs_getattr,
David P. Quigleyddd29ec2009-09-09 14:25:37 -0400806 .setxattr = sysfs_setxattr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700807};
808
Tejun Heobcdde7e2013-09-18 17:15:37 -0400809static struct sysfs_dirent *sysfs_leftmost_descendant(struct sysfs_dirent *pos)
810{
811 struct sysfs_dirent *last;
812
813 while (true) {
814 struct rb_node *rbn;
815
816 last = pos;
817
818 if (sysfs_type(pos) != SYSFS_DIR)
819 break;
820
821 rbn = rb_first(&pos->s_dir.children);
822 if (!rbn)
823 break;
824
825 pos = to_sysfs_dirent(rbn);
826 }
827
828 return last;
829}
830
831/**
832 * sysfs_next_descendant_post - find the next descendant for post-order walk
833 * @pos: the current position (%NULL to initiate traversal)
834 * @root: sysfs_dirent whose descendants to walk
835 *
836 * Find the next descendant to visit for post-order traversal of @root's
837 * descendants. @root is included in the iteration and the last node to be
838 * visited.
839 */
840static struct sysfs_dirent *sysfs_next_descendant_post(struct sysfs_dirent *pos,
841 struct sysfs_dirent *root)
842{
843 struct rb_node *rbn;
844
845 lockdep_assert_held(&sysfs_mutex);
846
847 /* if first iteration, visit leftmost descendant which may be root */
848 if (!pos)
849 return sysfs_leftmost_descendant(root);
850
851 /* if we visited @root, we're done */
852 if (pos == root)
853 return NULL;
854
855 /* if there's an unvisited sibling, visit its leftmost descendant */
856 rbn = rb_next(&pos->s_rb);
857 if (rbn)
858 return sysfs_leftmost_descendant(to_sysfs_dirent(rbn));
859
860 /* no sibling left, visit parent */
861 return pos->s_parent;
862}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700863
Tejun Heo7eed6ec2013-10-24 11:49:10 -0400864static void __sysfs_remove(struct sysfs_addrm_cxt *acxt,
865 struct sysfs_dirent *sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700866{
Tejun Heobcdde7e2013-09-18 17:15:37 -0400867 struct sysfs_dirent *pos, *next;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700868
Tejun Heo250f7c32013-09-18 17:15:38 -0400869 if (!sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700870 return;
871
Tejun Heo250f7c32013-09-18 17:15:38 -0400872 pr_debug("sysfs %s: removing\n", sd->s_name);
Tejun Heo0ab66082007-06-14 03:45:16 +0900873
Tejun Heobcdde7e2013-09-18 17:15:37 -0400874 next = NULL;
875 do {
876 pos = next;
Tejun Heo250f7c32013-09-18 17:15:38 -0400877 next = sysfs_next_descendant_post(pos, sd);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400878 if (pos)
Tejun Heo250f7c32013-09-18 17:15:38 -0400879 sysfs_remove_one(acxt, pos);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400880 } while (next);
Tejun Heo250f7c32013-09-18 17:15:38 -0400881}
Tejun Heobcdde7e2013-09-18 17:15:37 -0400882
Tejun Heo250f7c32013-09-18 17:15:38 -0400883/**
884 * sysfs_remove - remove a sysfs_dirent recursively
885 * @sd: the sysfs_dirent to remove
886 *
887 * Remove @sd along with all its subdirectories and files.
888 */
889void sysfs_remove(struct sysfs_dirent *sd)
890{
891 struct sysfs_addrm_cxt acxt;
892
893 sysfs_addrm_start(&acxt);
894 __sysfs_remove(&acxt, sd);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400895 sysfs_addrm_finish(&acxt);
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700896}
897
898/**
Tejun Heo7eed6ec2013-10-24 11:49:10 -0400899 * sysfs_hash_and_remove - find a sysfs_dirent by name and remove it
900 * @dir_sd: parent of the target
901 * @name: name of the sysfs_dirent to remove
902 * @ns: namespace tag of the sysfs_dirent to remove
903 *
904 * Look for the sysfs_dirent with @name and @ns under @dir_sd and remove
905 * it. Returns 0 on success, -ENOENT if such entry doesn't exist.
906 */
907int sysfs_hash_and_remove(struct sysfs_dirent *dir_sd, const char *name,
908 const void *ns)
909{
910 struct sysfs_addrm_cxt acxt;
911 struct sysfs_dirent *sd;
912
913 if (!dir_sd) {
914 WARN(1, KERN_WARNING "sysfs: can not remove '%s', no directory\n",
915 name);
916 return -ENOENT;
917 }
918
919 sysfs_addrm_start(&acxt);
920
921 sd = sysfs_find_dirent(dir_sd, name, ns);
922 if (sd)
923 __sysfs_remove(&acxt, sd);
924
925 sysfs_addrm_finish(&acxt);
926
927 if (sd)
928 return 0;
929 else
930 return -ENOENT;
931}
932
933/**
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700934 * sysfs_remove_dir - remove an object's directory.
935 * @kobj: object.
936 *
937 * The only thing special about this is that we remove any files in
938 * the directory before we remove the directory, and we've inlined
939 * what used to be sysfs_rmdir() below, instead of calling separately.
940 */
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700941void sysfs_remove_dir(struct kobject *kobj)
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700942{
Tejun Heo608e2662007-06-14 04:27:22 +0900943 struct sysfs_dirent *sd = kobj->sd;
Tejun Heoaecdced2007-06-14 03:45:15 +0900944
Tejun Heo0cae60f2013-10-30 10:28:36 -0400945 /*
946 * In general, kboject owner is responsible for ensuring removal
947 * doesn't race with other operations and sysfs doesn't provide any
948 * protection; however, when @kobj is used as a symlink target, the
949 * symlinking entity usually doesn't own @kobj and thus has no
950 * control over removal. @kobj->sd may be removed anytime and
951 * symlink code may end up dereferencing an already freed sd.
952 *
953 * sysfs_symlink_target_lock synchronizes @kobj->sd disassociation
954 * against symlink operations so that symlink code can safely
955 * dereference @kobj->sd.
956 */
957 spin_lock(&sysfs_symlink_target_lock);
Tejun Heo608e2662007-06-14 04:27:22 +0900958 kobj->sd = NULL;
Tejun Heo0cae60f2013-10-30 10:28:36 -0400959 spin_unlock(&sysfs_symlink_target_lock);
Tejun Heoaecdced2007-06-14 03:45:15 +0900960
Tejun Heo250f7c32013-09-18 17:15:38 -0400961 if (sd) {
962 WARN_ON_ONCE(sysfs_type(sd) != SYSFS_DIR);
963 sysfs_remove(sd);
964 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700965}
966
Tejun Heocfec0bc2013-09-11 22:29:09 -0400967int sysfs_rename(struct sysfs_dirent *sd, struct sysfs_dirent *new_parent_sd,
968 const char *new_name, const void *new_ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700969{
Tejun Heo996b7372007-06-14 03:45:14 +0900970 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700971
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800972 mutex_lock(&sysfs_mutex);
Eric W. Biederman932ea2e2007-08-20 21:36:30 +0900973
Eric W. Biederman9918f9a2007-08-20 21:36:31 +0900974 error = 0;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700975 if ((sd->s_parent == new_parent_sd) && (sd->s_ns == new_ns) &&
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800976 (strcmp(sd->s_name, new_name) == 0))
Eric W. Biederman9918f9a2007-08-20 21:36:31 +0900977 goto out; /* nothing to rename */
978
Tejun Heo996b7372007-06-14 03:45:14 +0900979 error = -EEXIST;
Tejun Heocfec0bc2013-09-11 22:29:09 -0400980 if (sysfs_find_dirent(new_parent_sd, new_name, new_ns))
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800981 goto out;
Tejun Heo996b7372007-06-14 03:45:14 +0900982
Eric W. Biederman0b4a4fe2008-07-03 18:05:28 -0700983 /* rename sysfs_dirent */
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800984 if (strcmp(sd->s_name, new_name) != 0) {
985 error = -ENOMEM;
Sasikantha babub4eafca2012-05-03 02:26:14 +0530986 new_name = kstrdup(new_name, GFP_KERNEL);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800987 if (!new_name)
988 goto out;
Tejun Heo996b7372007-06-14 03:45:14 +0900989
Sasikantha babub4eafca2012-05-03 02:26:14 +0530990 kfree(sd->s_name);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800991 sd->s_name = new_name;
992 }
993
Greg Kroah-Hartmanddfd6d02013-08-21 16:33:34 -0700994 /*
995 * Move to the appropriate place in the appropriate directories rbtree.
996 */
Eric W. Biedermanf6d90b42011-11-01 07:06:17 -0700997 sysfs_unlink_sibling(sd);
998 sysfs_get(new_parent_sd);
999 sysfs_put(sd->s_parent);
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001000 sd->s_ns = new_ns;
Tejun Heocfec0bc2013-09-11 22:29:09 -04001001 sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
Eric W. Biedermanf6d90b42011-11-01 07:06:17 -07001002 sd->s_parent = new_parent_sd;
1003 sysfs_link_sibling(sd);
Tejun Heo0c096b52007-06-14 03:45:15 +09001004
Tejun Heo996b7372007-06-14 03:45:14 +09001005 error = 0;
Eric W. Biederman9918f9a2007-08-20 21:36:31 +09001006 out:
Eric W. Biederman832b6af2009-11-20 16:08:56 -08001007 mutex_unlock(&sysfs_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001008 return error;
1009}
1010
Tejun Heoe34ff492013-09-11 22:29:05 -04001011int sysfs_rename_dir_ns(struct kobject *kobj, const char *new_name,
1012 const void *new_ns)
Eric W. Biedermanca1bab32009-11-20 16:08:57 -08001013{
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001014 struct sysfs_dirent *parent_sd = kobj->sd->s_parent;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001015
Tejun Heocfec0bc2013-09-11 22:29:09 -04001016 return sysfs_rename(kobj->sd, parent_sd, new_name, new_ns);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -08001017}
1018
Tejun Heoe34ff492013-09-11 22:29:05 -04001019int sysfs_move_dir_ns(struct kobject *kobj, struct kobject *new_parent_kobj,
1020 const void *new_ns)
Cornelia Huck8a824722006-11-20 17:07:51 +01001021{
Tejun Heo51225032007-06-14 04:27:25 +09001022 struct sysfs_dirent *sd = kobj->sd;
1023 struct sysfs_dirent *new_parent_sd;
Cornelia Huck8a824722006-11-20 17:07:51 +01001024
Tejun Heo51225032007-06-14 04:27:25 +09001025 BUG_ON(!sd->s_parent);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -08001026 new_parent_sd = new_parent_kobj && new_parent_kobj->sd ?
Cornelia Hucka6a83572009-10-06 15:33:35 +02001027 new_parent_kobj->sd : &sysfs_root;
Cornelia Huck8a824722006-11-20 17:07:51 +01001028
Tejun Heocfec0bc2013-09-11 22:29:09 -04001029 return sysfs_rename(sd, new_parent_sd, sd->s_name, new_ns);
Cornelia Huck8a824722006-11-20 17:07:51 +01001030}
1031
Linus Torvalds1da177e2005-04-16 15:20:36 -07001032/* Relationship between s_mode and the DT_xxx types */
1033static inline unsigned char dt_type(struct sysfs_dirent *sd)
1034{
1035 return (sd->s_mode >> 12) & 15;
1036}
1037
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001038static int sysfs_dir_release(struct inode *inode, struct file *filp)
1039{
1040 sysfs_put(filp->private_data);
1041 return 0;
1042}
1043
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001044static struct sysfs_dirent *sysfs_dir_pos(const void *ns,
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001045 struct sysfs_dirent *parent_sd, loff_t hash, struct sysfs_dirent *pos)
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001046{
1047 if (pos) {
1048 int valid = !(pos->s_flags & SYSFS_FLAG_REMOVED) &&
1049 pos->s_parent == parent_sd &&
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001050 hash == pos->s_hash;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001051 sysfs_put(pos);
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001052 if (!valid)
1053 pos = NULL;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001054 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001055 if (!pos && (hash > 1) && (hash < INT_MAX)) {
1056 struct rb_node *node = parent_sd->s_dir.children.rb_node;
1057 while (node) {
1058 pos = to_sysfs_dirent(node);
1059
1060 if (hash < pos->s_hash)
1061 node = node->rb_left;
1062 else if (hash > pos->s_hash)
1063 node = node->rb_right;
1064 else
Mikulas Patockaa406f752011-07-25 17:57:03 -04001065 break;
Mikulas Patockaa406f752011-07-25 17:57:03 -04001066 }
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001067 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001068 /* Skip over entries in the wrong namespace */
Eric W. Biedermanb9e2780d2011-10-25 05:38:41 -07001069 while (pos && pos->s_ns != ns) {
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001070 struct rb_node *node = rb_next(&pos->s_rb);
1071 if (!node)
Mikulas Patockaa406f752011-07-25 17:57:03 -04001072 pos = NULL;
1073 else
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001074 pos = to_sysfs_dirent(node);
Mikulas Patockaa406f752011-07-25 17:57:03 -04001075 }
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001076 return pos;
1077}
1078
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001079static struct sysfs_dirent *sysfs_dir_next_pos(const void *ns,
1080 struct sysfs_dirent *parent_sd, ino_t ino, struct sysfs_dirent *pos)
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001081{
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001082 pos = sysfs_dir_pos(ns, parent_sd, ino, pos);
Greg Kroah-Hartman37814ee2013-08-21 16:36:02 -07001083 if (pos)
1084 do {
1085 struct rb_node *node = rb_next(&pos->s_rb);
1086 if (!node)
1087 pos = NULL;
1088 else
1089 pos = to_sysfs_dirent(node);
1090 } while (pos && pos->s_ns != ns);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001091 return pos;
1092}
1093
Al Virod55fea82013-05-16 14:31:02 -04001094static int sysfs_readdir(struct file *file, struct dir_context *ctx)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001095{
Al Virod55fea82013-05-16 14:31:02 -04001096 struct dentry *dentry = file->f_path.dentry;
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -07001097 struct sysfs_dirent *parent_sd = dentry->d_fsdata;
Al Virod55fea82013-05-16 14:31:02 -04001098 struct sysfs_dirent *pos = file->private_data;
Linus Torvaldsa1212d22013-11-07 20:47:28 +09001099 enum kobj_ns_type type;
1100 const void *ns;
1101
1102 type = sysfs_ns_type(parent_sd);
1103 ns = sysfs_info(dentry->d_sb)->ns[type];
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001104
Al Virod55fea82013-05-16 14:31:02 -04001105 if (!dir_emit_dots(file, ctx))
1106 return 0;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001107 mutex_lock(&sysfs_mutex);
Al Virod55fea82013-05-16 14:31:02 -04001108 for (pos = sysfs_dir_pos(ns, parent_sd, ctx->pos, pos);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001109 pos;
Al Virod55fea82013-05-16 14:31:02 -04001110 pos = sysfs_dir_next_pos(ns, parent_sd, ctx->pos, pos)) {
1111 const char *name = pos->s_name;
1112 unsigned int type = dt_type(pos);
1113 int len = strlen(name);
1114 ino_t ino = pos->s_ino;
1115 ctx->pos = pos->s_hash;
1116 file->private_data = sysfs_get(pos);
Eric W. Biederman3efa65b2007-08-20 21:36:30 +09001117
Eric W. Biederman3efa65b2007-08-20 21:36:30 +09001118 mutex_unlock(&sysfs_mutex);
Al Virod55fea82013-05-16 14:31:02 -04001119 if (!dir_emit(ctx, name, len, ino, type))
1120 return 0;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001121 mutex_lock(&sysfs_mutex);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001122 }
1123 mutex_unlock(&sysfs_mutex);
Al Virod55fea82013-05-16 14:31:02 -04001124 file->private_data = NULL;
1125 ctx->pos = INT_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126 return 0;
1127}
1128
Ming Lei991f76f2013-03-20 23:25:24 +08001129static loff_t sysfs_dir_llseek(struct file *file, loff_t offset, int whence)
1130{
1131 struct inode *inode = file_inode(file);
1132 loff_t ret;
1133
1134 mutex_lock(&inode->i_mutex);
1135 ret = generic_file_llseek(file, offset, whence);
1136 mutex_unlock(&inode->i_mutex);
1137
1138 return ret;
1139}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001140
Arjan van de Ven4b6f5d22006-03-28 01:56:42 -08001141const struct file_operations sysfs_dir_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001142 .read = generic_read_dir,
Al Virod55fea82013-05-16 14:31:02 -04001143 .iterate = sysfs_readdir,
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001144 .release = sysfs_dir_release,
Ming Lei991f76f2013-03-20 23:25:24 +08001145 .llseek = sysfs_dir_llseek,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001146};