blob: 08c66969d52a7af81071cbdf2dfc1a7a81dcad98 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
Tejun Heo6d66f5c2007-09-20 17:31:38 +09002 * fs/sysfs/dir.c - sysfs core and dir operation implementation
3 *
4 * Copyright (c) 2001-3 Patrick Mochel
5 * Copyright (c) 2007 SUSE Linux Products GmbH
6 * Copyright (c) 2007 Tejun Heo <teheo@suse.de>
7 *
8 * This file is released under the GPLv2.
9 *
10 * Please see Documentation/filesystems/sysfs.txt for more information.
Linus Torvalds1da177e2005-04-16 15:20:36 -070011 */
12
13#undef DEBUG
14
15#include <linux/fs.h>
16#include <linux/mount.h>
17#include <linux/module.h>
18#include <linux/kobject.h>
Christoph Hellwig5f45f1a2005-06-23 00:09:12 -070019#include <linux/namei.h>
Tejun Heo2b611bb2007-06-14 03:45:13 +090020#include <linux/idr.h>
Tejun Heo8619f972007-06-14 03:45:18 +090021#include <linux/completion.h>
Dave Young869512a2007-07-26 14:53:53 +000022#include <linux/mutex.h>
Robert P. J. Dayc6f87732008-03-13 22:41:52 -040023#include <linux/slab.h>
Eric W. Biederman4c3da222009-11-04 02:50:06 -080024#include <linux/security.h>
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080025#include <linux/hash.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070026#include "sysfs.h"
27
Tejun Heo3007e992007-06-14 04:27:23 +090028DEFINE_MUTEX(sysfs_mutex);
Tejun Heo0cae60f2013-10-30 10:28:36 -040029DEFINE_SPINLOCK(sysfs_symlink_target_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Tejun Heobcac3762013-09-11 22:29:03 -040031#define to_sysfs_dirent(X) rb_entry((X), struct sysfs_dirent, s_rb)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080032
Roel Kluinf7a75f02007-10-16 23:30:25 -070033static DEFINE_SPINLOCK(sysfs_ino_lock);
Tejun Heo2b611bb2007-06-14 03:45:13 +090034static DEFINE_IDA(sysfs_ino_ida);
35
Tejun Heob6b4a432007-06-14 03:45:18 +090036/**
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080037 * sysfs_name_hash
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080038 * @name: Null terminated string to hash
Tejun Heocfec0bc2013-09-11 22:29:09 -040039 * @ns: Namespace tag to hash
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080040 *
41 * Returns 31 bit hash of ns + name (so it fits in an off_t )
42 */
Tejun Heocfec0bc2013-09-11 22:29:09 -040043static unsigned int sysfs_name_hash(const char *name, const void *ns)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080044{
45 unsigned long hash = init_name_hash();
46 unsigned int len = strlen(name);
47 while (len--)
48 hash = partial_name_hash(*name++, hash);
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -070049 hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31));
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080050 hash &= 0x7fffffffU;
51 /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
52 if (hash < 1)
53 hash += 2;
54 if (hash >= INT_MAX)
55 hash = INT_MAX - 1;
56 return hash;
57}
58
Tejun Heocfec0bc2013-09-11 22:29:09 -040059static int sysfs_name_compare(unsigned int hash, const char *name,
60 const void *ns, const struct sysfs_dirent *sd)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080061{
62 if (hash != sd->s_hash)
63 return hash - sd->s_hash;
64 if (ns != sd->s_ns)
65 return ns - sd->s_ns;
66 return strcmp(name, sd->s_name);
67}
68
69static int sysfs_sd_compare(const struct sysfs_dirent *left,
70 const struct sysfs_dirent *right)
71{
Tejun Heocfec0bc2013-09-11 22:29:09 -040072 return sysfs_name_compare(left->s_hash, left->s_name, left->s_ns,
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080073 right);
74}
75
76/**
Warner Wang43474912013-05-13 11:11:05 +080077 * sysfs_link_sibling - link sysfs_dirent into sibling rbtree
Tejun Heo0c73f182007-06-14 03:45:18 +090078 * @sd: sysfs_dirent of interest
79 *
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080080 * Link @sd into its sibling rbtree which starts from
Tejun Heobc747f32007-09-20 16:05:12 +090081 * sd->s_parent->s_dir.children.
Tejun Heo0c73f182007-06-14 03:45:18 +090082 *
83 * Locking:
Tejun Heo3007e992007-06-14 04:27:23 +090084 * mutex_lock(sysfs_mutex)
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080085 *
86 * RETURNS:
87 * 0 on susccess -EEXIST on failure.
Tejun Heo0c73f182007-06-14 03:45:18 +090088 */
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080089static int sysfs_link_sibling(struct sysfs_dirent *sd)
Tejun Heo0c73f182007-06-14 03:45:18 +090090{
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080091 struct rb_node **node = &sd->s_parent->s_dir.children.rb_node;
92 struct rb_node *parent = NULL;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -040093
Greg Kroah-Hartman54d20f02012-03-08 13:03:10 -080094 if (sysfs_type(sd) == SYSFS_DIR)
95 sd->s_parent->s_dir.subdirs++;
96
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -080097 while (*node) {
98 struct sysfs_dirent *pos;
99 int result;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400100
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800101 pos = to_sysfs_dirent(*node);
102 parent = *node;
103 result = sysfs_sd_compare(sd, pos);
104 if (result < 0)
105 node = &pos->s_rb.rb_left;
106 else if (result > 0)
107 node = &pos->s_rb.rb_right;
108 else
109 return -EEXIST;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400110 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800111 /* add new node and rebalance the tree */
112 rb_link_node(&sd->s_rb, parent, node);
113 rb_insert_color(&sd->s_rb, &sd->s_parent->s_dir.children);
Tejun Heocb26a312013-09-11 22:29:07 -0400114
115 /* if @sd has ns tag, mark the parent to enable ns filtering */
116 if (sd->s_ns)
117 sd->s_parent->s_flags |= SYSFS_FLAG_HAS_NS;
118
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800119 return 0;
Tejun Heo0c73f182007-06-14 03:45:18 +0900120}
121
122/**
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800123 * sysfs_unlink_sibling - unlink sysfs_dirent from sibling rbtree
Tejun Heo0c73f182007-06-14 03:45:18 +0900124 * @sd: sysfs_dirent of interest
125 *
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800126 * Unlink @sd from its sibling rbtree which starts from
Tejun Heobc747f32007-09-20 16:05:12 +0900127 * sd->s_parent->s_dir.children.
Tejun Heo0c73f182007-06-14 03:45:18 +0900128 *
129 * Locking:
Tejun Heo3007e992007-06-14 04:27:23 +0900130 * mutex_lock(sysfs_mutex)
Tejun Heo0c73f182007-06-14 03:45:18 +0900131 */
Tejun Heo41fc1c22007-08-02 21:38:03 +0900132static void sysfs_unlink_sibling(struct sysfs_dirent *sd)
Tejun Heo0c73f182007-06-14 03:45:18 +0900133{
Greg Kroah-Hartman54d20f02012-03-08 13:03:10 -0800134 if (sysfs_type(sd) == SYSFS_DIR)
135 sd->s_parent->s_dir.subdirs--;
136
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800137 rb_erase(&sd->s_rb, &sd->s_parent->s_dir.children);
Tejun Heocb26a312013-09-11 22:29:07 -0400138
139 /*
140 * Either all or none of the children have tags. Clearing HAS_NS
141 * when there's no child left is enough to keep the flag synced.
142 */
143 if (RB_EMPTY_ROOT(&sd->s_parent->s_dir.children))
144 sd->s_parent->s_flags &= ~SYSFS_FLAG_HAS_NS;
Tejun Heo0c73f182007-06-14 03:45:18 +0900145}
146
147/**
Tejun Heob6b4a432007-06-14 03:45:18 +0900148 * sysfs_get_active - get an active reference to sysfs_dirent
149 * @sd: sysfs_dirent to get an active reference to
150 *
151 * Get an active reference of @sd. This function is noop if @sd
152 * is NULL.
153 *
154 * RETURNS:
155 * Pointer to @sd on success, NULL on failure.
156 */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800157struct sysfs_dirent *sysfs_get_active(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900158{
Tejun Heo8619f972007-06-14 03:45:18 +0900159 if (unlikely(!sd))
160 return NULL;
161
Maarten Lankhorst3db3c622013-03-08 16:07:27 +0100162 if (!atomic_inc_unless_negative(&sd->s_active))
163 return NULL;
Alan Stern356c05d2012-05-14 13:30:03 -0400164
Tejun Heo785a1622013-10-14 09:27:11 -0400165 if (likely(!sysfs_ignore_lockdep(sd)))
Alan Stern356c05d2012-05-14 13:30:03 -0400166 rwsem_acquire_read(&sd->dep_map, 0, 1, _RET_IP_);
167 return sd;
Tejun Heob6b4a432007-06-14 03:45:18 +0900168}
169
170/**
171 * sysfs_put_active - put an active reference to sysfs_dirent
172 * @sd: sysfs_dirent to put an active reference to
173 *
174 * Put an active reference to @sd. This function is noop if @sd
175 * is NULL.
176 */
Eric W. Biedermane72ceb82010-02-11 15:18:38 -0800177void sysfs_put_active(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900178{
Tejun Heo8619f972007-06-14 03:45:18 +0900179 int v;
180
181 if (unlikely(!sd))
182 return;
183
Tejun Heo785a1622013-10-14 09:27:11 -0400184 if (likely(!sysfs_ignore_lockdep(sd)))
Alan Stern356c05d2012-05-14 13:30:03 -0400185 rwsem_release(&sd->dep_map, 1, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900186 v = atomic_dec_return(&sd->s_active);
187 if (likely(v != SD_DEACTIVATED_BIAS))
188 return;
189
190 /* atomic_dec_return() is a mb(), we'll always see the updated
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400191 * sd->u.completion.
Tejun Heo8619f972007-06-14 03:45:18 +0900192 */
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400193 complete(sd->u.completion);
Tejun Heob6b4a432007-06-14 03:45:18 +0900194}
195
196/**
Tejun Heob6b4a432007-06-14 03:45:18 +0900197 * sysfs_deactivate - deactivate sysfs_dirent
198 * @sd: sysfs_dirent to deactivate
199 *
Tejun Heo8619f972007-06-14 03:45:18 +0900200 * Deny new active references and drain existing ones.
Tejun Heob6b4a432007-06-14 03:45:18 +0900201 */
Tejun Heofb6896da2007-06-14 04:27:24 +0900202static void sysfs_deactivate(struct sysfs_dirent *sd)
Tejun Heob6b4a432007-06-14 03:45:18 +0900203{
Tejun Heo8619f972007-06-14 03:45:18 +0900204 DECLARE_COMPLETION_ONSTACK(wait);
205 int v;
Tejun Heob6b4a432007-06-14 03:45:18 +0900206
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400207 BUG_ON(!(sd->s_flags & SYSFS_FLAG_REMOVED));
Eric W. Biedermana2db6842010-02-11 15:20:00 -0800208
209 if (!(sysfs_type(sd) & SYSFS_ACTIVE_REF))
210 return;
211
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400212 sd->u.completion = (void *)&wait;
Tejun Heo8619f972007-06-14 03:45:18 +0900213
Eric W. Biederman846f9972010-01-02 13:37:12 -0800214 rwsem_acquire(&sd->dep_map, 0, 0, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900215 /* atomic_add_return() is a mb(), put_active() will always see
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400216 * the updated sd->u.completion.
Tejun Heob6b4a432007-06-14 03:45:18 +0900217 */
Tejun Heo8619f972007-06-14 03:45:18 +0900218 v = atomic_add_return(SD_DEACTIVATED_BIAS, &sd->s_active);
219
Eric W. Biederman846f9972010-01-02 13:37:12 -0800220 if (v != SD_DEACTIVATED_BIAS) {
221 lock_contended(&sd->dep_map, _RET_IP_);
Tejun Heo8619f972007-06-14 03:45:18 +0900222 wait_for_completion(&wait);
Eric W. Biederman846f9972010-01-02 13:37:12 -0800223 }
Tejun Heo8619f972007-06-14 03:45:18 +0900224
Eric W. Biederman846f9972010-01-02 13:37:12 -0800225 lock_acquired(&sd->dep_map, _RET_IP_);
226 rwsem_release(&sd->dep_map, 1, _RET_IP_);
Tejun Heob6b4a432007-06-14 03:45:18 +0900227}
228
Eric W. Biedermancafa6b52011-12-18 20:08:16 -0800229static int sysfs_alloc_ino(unsigned int *pino)
Tejun Heo2b611bb2007-06-14 03:45:13 +0900230{
231 int ino, rc;
232
233 retry:
234 spin_lock(&sysfs_ino_lock);
235 rc = ida_get_new_above(&sysfs_ino_ida, 2, &ino);
236 spin_unlock(&sysfs_ino_lock);
237
238 if (rc == -EAGAIN) {
239 if (ida_pre_get(&sysfs_ino_ida, GFP_KERNEL))
240 goto retry;
241 rc = -ENOMEM;
242 }
243
244 *pino = ino;
245 return rc;
246}
247
Eric W. Biedermancafa6b52011-12-18 20:08:16 -0800248static void sysfs_free_ino(unsigned int ino)
Tejun Heo2b611bb2007-06-14 03:45:13 +0900249{
250 spin_lock(&sysfs_ino_lock);
251 ida_remove(&sysfs_ino_ida, ino);
252 spin_unlock(&sysfs_ino_lock);
253}
254
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700255void release_sysfs_dirent(struct sysfs_dirent *sd)
Tejun Heofa7f9122007-06-14 03:45:13 +0900256{
Tejun Heo13b30862007-06-14 03:45:14 +0900257 struct sysfs_dirent *parent_sd;
258
259 repeat:
Tejun Heo3007e992007-06-14 04:27:23 +0900260 /* Moving/renaming is always done while holding reference.
261 * sd->s_parent won't change beneath us.
262 */
Tejun Heo13b30862007-06-14 03:45:14 +0900263 parent_sd = sd->s_parent;
264
Ming Leibb2b0052013-04-04 22:22:37 +0800265 WARN(!(sd->s_flags & SYSFS_FLAG_REMOVED),
266 "sysfs: free using entry: %s/%s\n",
267 parent_sd ? parent_sd->s_name : "", sd->s_name);
268
Tejun Heob402d722007-06-14 04:27:21 +0900269 if (sysfs_type(sd) == SYSFS_KOBJ_LINK)
Tejun Heob1fc3d62007-09-20 16:05:11 +0900270 sysfs_put(sd->s_symlink.target_sd);
Tejun Heob402d722007-06-14 04:27:21 +0900271 if (sysfs_type(sd) & SYSFS_COPY_NAME)
Tejun Heo0c096b52007-06-14 03:45:15 +0900272 kfree(sd->s_name);
Eric W. Biederman4c3da222009-11-04 02:50:06 -0800273 if (sd->s_iattr && sd->s_iattr->ia_secdata)
274 security_release_secctx(sd->s_iattr->ia_secdata,
275 sd->s_iattr->ia_secdata_len);
Tejun Heofa7f9122007-06-14 03:45:13 +0900276 kfree(sd->s_iattr);
Tejun Heo2b611bb2007-06-14 03:45:13 +0900277 sysfs_free_ino(sd->s_ino);
Tejun Heofa7f9122007-06-14 03:45:13 +0900278 kmem_cache_free(sysfs_dir_cachep, sd);
Tejun Heo13b30862007-06-14 03:45:14 +0900279
280 sd = parent_sd;
281 if (sd && atomic_dec_and_test(&sd->s_count))
282 goto repeat;
Tejun Heofa7f9122007-06-14 03:45:13 +0900283}
284
Nick Pigginfe15ce42011-01-07 17:49:23 +1100285static int sysfs_dentry_delete(const struct dentry *dentry)
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800286{
287 struct sysfs_dirent *sd = dentry->d_fsdata;
Al Viro469796d2012-06-07 20:51:39 -0400288 return !(sd && !(sd->s_flags & SYSFS_FLAG_REMOVED));
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800289}
290
Al Viro0b728e12012-06-10 16:03:43 -0400291static int sysfs_dentry_revalidate(struct dentry *dentry, unsigned int flags)
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800292{
Nick Piggin34286d62011-01-07 17:49:57 +1100293 struct sysfs_dirent *sd;
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800294
Al Viro0b728e12012-06-10 16:03:43 -0400295 if (flags & LOOKUP_RCU)
Nick Piggin34286d62011-01-07 17:49:57 +1100296 return -ECHILD;
297
298 sd = dentry->d_fsdata;
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800299 mutex_lock(&sysfs_mutex);
300
301 /* The sysfs dirent has been deleted */
302 if (sd->s_flags & SYSFS_FLAG_REMOVED)
303 goto out_bad;
304
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800305 /* The sysfs dirent has been moved? */
306 if (dentry->d_parent->d_fsdata != sd->s_parent)
307 goto out_bad;
308
309 /* The sysfs dirent has been renamed */
310 if (strcmp(dentry->d_name.name, sd->s_name) != 0)
311 goto out_bad;
312
Glauber Costae5bcac62012-07-06 13:09:07 +0400313 /* The sysfs dirent has been moved to a different namespace */
Tejun Heocb26a312013-09-11 22:29:07 -0400314 if (sd->s_ns && sd->s_ns != sysfs_info(dentry->d_sb)->ns)
315 goto out_bad;
Glauber Costae5bcac62012-07-06 13:09:07 +0400316
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800317 mutex_unlock(&sysfs_mutex);
318out_valid:
319 return 1;
320out_bad:
321 /* Remove the dentry from the dcache hashes.
322 * If this is a deleted dentry we use d_drop instead of d_delete
323 * so sysfs doesn't need to cope with negative dentries.
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800324 *
325 * If this is a dentry that has simply been renamed we
326 * use d_drop to remove it from the dcache lookup on its
327 * old parent. If this dentry persists later when a lookup
328 * is performed at its new name the dentry will be readded
329 * to the dcache hashes.
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800330 */
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800331 mutex_unlock(&sysfs_mutex);
Miklos Szeredi6497d162013-09-05 11:44:41 +0200332
333 /* If we have submounts we must allow the vfs caches
334 * to lie about the state of the filesystem to prevent
335 * leaks and other nasty things.
336 */
337 if (check_submounts_and_drop(dentry) != 0)
338 goto out_valid;
339
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800340 return 0;
341}
342
Al Viro469796d2012-06-07 20:51:39 -0400343static void sysfs_dentry_release(struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344{
Al Viro469796d2012-06-07 20:51:39 -0400345 sysfs_put(dentry->d_fsdata);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700346}
347
Al Viro469796d2012-06-07 20:51:39 -0400348const struct dentry_operations sysfs_dentry_ops = {
Eric W. Biedermane8f077c2009-11-07 23:27:01 -0800349 .d_revalidate = sysfs_dentry_revalidate,
350 .d_delete = sysfs_dentry_delete,
Al Viro469796d2012-06-07 20:51:39 -0400351 .d_release = sysfs_dentry_release,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352};
353
Tejun Heo3e519032007-06-14 03:45:15 +0900354struct sysfs_dirent *sysfs_new_dirent(const char *name, umode_t mode, int type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700355{
Tejun Heo0c096b52007-06-14 03:45:15 +0900356 char *dup_name = NULL;
Akinobu Mita01da2422007-07-14 11:03:35 +0900357 struct sysfs_dirent *sd;
Tejun Heo0c096b52007-06-14 03:45:15 +0900358
359 if (type & SYSFS_COPY_NAME) {
360 name = dup_name = kstrdup(name, GFP_KERNEL);
361 if (!name)
Akinobu Mita01da2422007-07-14 11:03:35 +0900362 return NULL;
Tejun Heo0c096b52007-06-14 03:45:15 +0900363 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364
Robert P. J. Dayc3762222007-02-10 01:45:03 -0800365 sd = kmem_cache_zalloc(sysfs_dir_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700366 if (!sd)
Akinobu Mita01da2422007-07-14 11:03:35 +0900367 goto err_out1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368
Tejun Heo0c096b52007-06-14 03:45:15 +0900369 if (sysfs_alloc_ino(&sd->s_ino))
Akinobu Mita01da2422007-07-14 11:03:35 +0900370 goto err_out2;
Tejun Heo2b611bb2007-06-14 03:45:13 +0900371
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372 atomic_set(&sd->s_count, 1);
Tejun Heo8619f972007-06-14 03:45:18 +0900373 atomic_set(&sd->s_active, 0);
Tejun Heoa26cd722007-06-14 03:45:14 +0900374
Tejun Heo0c096b52007-06-14 03:45:15 +0900375 sd->s_name = name;
Tejun Heoa26cd722007-06-14 03:45:14 +0900376 sd->s_mode = mode;
Ming Leibb2b0052013-04-04 22:22:37 +0800377 sd->s_flags = type | SYSFS_FLAG_REMOVED;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700378
379 return sd;
Tejun Heo0c096b52007-06-14 03:45:15 +0900380
Akinobu Mita01da2422007-07-14 11:03:35 +0900381 err_out2:
Tejun Heo0c096b52007-06-14 03:45:15 +0900382 kmem_cache_free(sysfs_dir_cachep, sd);
Akinobu Mita01da2422007-07-14 11:03:35 +0900383 err_out1:
384 kfree(dup_name);
Tejun Heo0c096b52007-06-14 03:45:15 +0900385 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700386}
387
Tejun Heo3007e992007-06-14 04:27:23 +0900388/**
Tejun Heofb6896da2007-06-14 04:27:24 +0900389 * sysfs_addrm_start - prepare for sysfs_dirent add/remove
390 * @acxt: pointer to sysfs_addrm_cxt to be used
Tejun Heo3007e992007-06-14 04:27:23 +0900391 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400392 * This function is called when the caller is about to add or remove
393 * sysfs_dirent. This function acquires sysfs_mutex. @acxt is used
394 * to keep and pass context to other addrm functions.
Tejun Heo3007e992007-06-14 04:27:23 +0900395 *
396 * LOCKING:
Tejun Heofb6896da2007-06-14 04:27:24 +0900397 * Kernel thread context (may sleep). sysfs_mutex is locked on
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800398 * return.
Tejun Heo3007e992007-06-14 04:27:23 +0900399 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400400void sysfs_addrm_start(struct sysfs_addrm_cxt *acxt)
401 __acquires(sysfs_mutex)
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700402{
Tejun Heofb6896da2007-06-14 04:27:24 +0900403 memset(acxt, 0, sizeof(*acxt));
Tejun Heofb6896da2007-06-14 04:27:24 +0900404
Tejun Heofb6896da2007-06-14 04:27:24 +0900405 mutex_lock(&sysfs_mutex);
Tejun Heofb6896da2007-06-14 04:27:24 +0900406}
407
408/**
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200409 * __sysfs_add_one - add sysfs_dirent to parent without warning
410 * @acxt: addrm context to use
411 * @sd: sysfs_dirent to be added
Tejun Heod69ac5a2013-09-18 17:15:35 -0400412 * @parent_sd: the parent sysfs_dirent to add @sd to
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200413 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400414 * Get @parent_sd and set @sd->s_parent to it and increment nlink of
415 * the parent inode if @sd is a directory and link into the children
416 * list of the parent.
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200417 *
418 * This function should be called between calls to
419 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
420 * passed the same @acxt as passed to sysfs_addrm_start().
421 *
422 * LOCKING:
423 * Determined by sysfs_addrm_start().
424 *
425 * RETURNS:
426 * 0 on success, -EEXIST if entry with the given name already
427 * exists.
428 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400429int __sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
430 struct sysfs_dirent *parent_sd)
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200431{
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800432 struct sysfs_inode_attrs *ps_iattr;
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800433 int ret;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800434
Tejun Heocfec0bc2013-09-11 22:29:09 -0400435 sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
Tejun Heod69ac5a2013-09-18 17:15:35 -0400436 sd->s_parent = sysfs_get(parent_sd);
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200437
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800438 ret = sysfs_link_sibling(sd);
439 if (ret)
440 return ret;
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200441
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800442 /* Update timestamps on the parent */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400443 ps_iattr = parent_sd->s_iattr;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800444 if (ps_iattr) {
445 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
446 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
447 }
448
Ming Leibb2b0052013-04-04 22:22:37 +0800449 /* Mark the entry added into directory tree */
450 sd->s_flags &= ~SYSFS_FLAG_REMOVED;
451
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200452 return 0;
453}
454
455/**
Alex Chiang425cb022009-02-12 10:56:59 -0700456 * sysfs_pathname - return full path to sysfs dirent
457 * @sd: sysfs_dirent whose path we want
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200458 * @path: caller allocated buffer of size PATH_MAX
Alex Chiang425cb022009-02-12 10:56:59 -0700459 *
460 * Gives the name "/" to the sysfs_root entry; any path returned
461 * is relative to wherever sysfs is mounted.
Alex Chiang425cb022009-02-12 10:56:59 -0700462 */
463static char *sysfs_pathname(struct sysfs_dirent *sd, char *path)
464{
465 if (sd->s_parent) {
466 sysfs_pathname(sd->s_parent, path);
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200467 strlcat(path, "/", PATH_MAX);
Alex Chiang425cb022009-02-12 10:56:59 -0700468 }
Geert Uytterhoeven66081a72012-09-29 22:23:19 +0200469 strlcat(path, sd->s_name, PATH_MAX);
Alex Chiang425cb022009-02-12 10:56:59 -0700470 return path;
471}
472
Tejun Heod1c14592013-10-24 11:49:11 -0400473void sysfs_warn_dup(struct sysfs_dirent *parent, const char *name)
474{
475 char *path;
476
477 path = kzalloc(PATH_MAX, GFP_KERNEL);
478 if (path) {
479 sysfs_pathname(parent, path);
480 strlcat(path, "/", PATH_MAX);
481 strlcat(path, name, PATH_MAX);
482 }
483
484 WARN(1, KERN_WARNING "sysfs: cannot create duplicate filename '%s'\n",
485 path ? path : name);
486
487 kfree(path);
488}
489
Alex Chiang425cb022009-02-12 10:56:59 -0700490/**
Tejun Heofb6896da2007-06-14 04:27:24 +0900491 * sysfs_add_one - add sysfs_dirent to parent
492 * @acxt: addrm context to use
493 * @sd: sysfs_dirent to be added
Tejun Heod69ac5a2013-09-18 17:15:35 -0400494 * @parent_sd: the parent sysfs_dirent to add @sd to
Tejun Heofb6896da2007-06-14 04:27:24 +0900495 *
Tejun Heod69ac5a2013-09-18 17:15:35 -0400496 * Get @parent_sd and set @sd->s_parent to it and increment nlink of
497 * the parent inode if @sd is a directory and link into the children
498 * list of the parent.
Tejun Heofb6896da2007-06-14 04:27:24 +0900499 *
500 * This function should be called between calls to
501 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
502 * passed the same @acxt as passed to sysfs_addrm_start().
503 *
504 * LOCKING:
505 * Determined by sysfs_addrm_start().
Tejun Heo23dc2792007-08-02 21:38:03 +0900506 *
507 * RETURNS:
508 * 0 on success, -EEXIST if entry with the given name already
509 * exists.
Tejun Heofb6896da2007-06-14 04:27:24 +0900510 */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400511int sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd,
512 struct sysfs_dirent *parent_sd)
Tejun Heofb6896da2007-06-14 04:27:24 +0900513{
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200514 int ret;
Tejun Heo23dc2792007-08-02 21:38:03 +0900515
Tejun Heod69ac5a2013-09-18 17:15:35 -0400516 ret = __sysfs_add_one(acxt, sd, parent_sd);
Alex Chiang425cb022009-02-12 10:56:59 -0700517
Tejun Heod1c14592013-10-24 11:49:11 -0400518 if (ret == -EEXIST)
519 sysfs_warn_dup(parent_sd, sd->s_name);
Cornelia Huck36ce6da2008-06-10 11:09:08 +0200520 return ret;
Tejun Heofb6896da2007-06-14 04:27:24 +0900521}
522
523/**
524 * sysfs_remove_one - remove sysfs_dirent from parent
525 * @acxt: addrm context to use
Jean Delvare9fd5b1c2008-01-08 18:11:24 +0100526 * @sd: sysfs_dirent to be removed
Tejun Heofb6896da2007-06-14 04:27:24 +0900527 *
528 * Mark @sd removed and drop nlink of parent inode if @sd is a
Tejun Heo181b2e42007-09-20 16:05:09 +0900529 * directory. @sd is unlinked from the children list.
Tejun Heofb6896da2007-06-14 04:27:24 +0900530 *
531 * This function should be called between calls to
532 * sysfs_addrm_start() and sysfs_addrm_finish() and should be
533 * passed the same @acxt as passed to sysfs_addrm_start().
534 *
535 * LOCKING:
536 * Determined by sysfs_addrm_start().
537 */
Tejun Heo250f7c32013-09-18 17:15:38 -0400538static void sysfs_remove_one(struct sysfs_addrm_cxt *acxt,
539 struct sysfs_dirent *sd)
Tejun Heofb6896da2007-06-14 04:27:24 +0900540{
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800541 struct sysfs_inode_attrs *ps_iattr;
542
Tejun Heo26ea12d2013-09-18 17:15:36 -0400543 /*
544 * Removal can be called multiple times on the same node. Only the
545 * first invocation is effective and puts the base ref.
546 */
547 if (sd->s_flags & SYSFS_FLAG_REMOVED)
548 return;
Tejun Heo41fc1c22007-08-02 21:38:03 +0900549
550 sysfs_unlink_sibling(sd);
Tejun Heofb6896da2007-06-14 04:27:24 +0900551
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800552 /* Update timestamps on the parent */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400553 ps_iattr = sd->s_parent->s_iattr;
Eric W. Biederman6b0bfe92009-11-20 16:08:51 -0800554 if (ps_iattr) {
555 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
556 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
557 }
558
Tejun Heofb6896da2007-06-14 04:27:24 +0900559 sd->s_flags |= SYSFS_FLAG_REMOVED;
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400560 sd->u.removed_list = acxt->removed;
Tejun Heofb6896da2007-06-14 04:27:24 +0900561 acxt->removed = sd;
Tejun Heoa0edd7c2007-06-14 04:27:24 +0900562}
563
564/**
Tejun Heofb6896da2007-06-14 04:27:24 +0900565 * sysfs_addrm_finish - finish up sysfs_dirent add/remove
566 * @acxt: addrm context to finish up
567 *
568 * Finish up sysfs_dirent add/remove. Resources acquired by
569 * sysfs_addrm_start() are released and removed sysfs_dirents are
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800570 * cleaned up.
Tejun Heofb6896da2007-06-14 04:27:24 +0900571 *
572 * LOCKING:
Eric W. Biedermana16bbc32009-11-20 16:08:55 -0800573 * sysfs_mutex is released.
Tejun Heofb6896da2007-06-14 04:27:24 +0900574 */
Tejun Heo990e53f2007-08-02 21:38:03 +0900575void sysfs_addrm_finish(struct sysfs_addrm_cxt *acxt)
Tejun Heod69ac5a2013-09-18 17:15:35 -0400576 __releases(sysfs_mutex)
Tejun Heofb6896da2007-06-14 04:27:24 +0900577{
578 /* release resources acquired by sysfs_addrm_start() */
579 mutex_unlock(&sysfs_mutex);
Tejun Heofb6896da2007-06-14 04:27:24 +0900580
581 /* kill removed sysfs_dirents */
582 while (acxt->removed) {
583 struct sysfs_dirent *sd = acxt->removed;
584
Mikulas Patocka58f2a4c2011-07-21 20:01:12 -0400585 acxt->removed = sd->u.removed_list;
Tejun Heofb6896da2007-06-14 04:27:24 +0900586
Tejun Heofb6896da2007-06-14 04:27:24 +0900587 sysfs_deactivate(sd);
Tejun Heo73d97142013-10-01 17:42:07 -0400588 sysfs_unmap_bin_file(sd);
Tejun Heofb6896da2007-06-14 04:27:24 +0900589 sysfs_put(sd);
590 }
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700591}
592
Tejun Heof0b0af42007-06-14 04:27:22 +0900593/**
594 * sysfs_find_dirent - find sysfs_dirent with the given name
595 * @parent_sd: sysfs_dirent to search under
596 * @name: name to look for
Tejun Heocfec0bc2013-09-11 22:29:09 -0400597 * @ns: the namespace tag to use
Maneesh Sonic5168652006-03-09 19:40:14 +0530598 *
Tejun Heof0b0af42007-06-14 04:27:22 +0900599 * Look for sysfs_dirent with name @name under @parent_sd.
Maneesh Sonic5168652006-03-09 19:40:14 +0530600 *
Tejun Heof0b0af42007-06-14 04:27:22 +0900601 * LOCKING:
Tejun Heo3007e992007-06-14 04:27:23 +0900602 * mutex_lock(sysfs_mutex)
Tejun Heof0b0af42007-06-14 04:27:22 +0900603 *
604 * RETURNS:
605 * Pointer to sysfs_dirent if found, NULL if not.
Maneesh Sonic5168652006-03-09 19:40:14 +0530606 */
Tejun Heof0b0af42007-06-14 04:27:22 +0900607struct sysfs_dirent *sysfs_find_dirent(struct sysfs_dirent *parent_sd,
Tejun Heocfec0bc2013-09-11 22:29:09 -0400608 const unsigned char *name,
609 const void *ns)
Maneesh Sonic5168652006-03-09 19:40:14 +0530610{
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800611 struct rb_node *node = parent_sd->s_dir.children.rb_node;
612 unsigned int hash;
Maneesh Sonic5168652006-03-09 19:40:14 +0530613
Tejun Heocfec0bc2013-09-11 22:29:09 -0400614 hash = sysfs_name_hash(name, ns);
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800615 while (node) {
616 struct sysfs_dirent *sd;
617 int result;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400618
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800619 sd = to_sysfs_dirent(node);
Tejun Heocfec0bc2013-09-11 22:29:09 -0400620 result = sysfs_name_compare(hash, name, ns, sd);
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800621 if (result < 0)
622 node = node->rb_left;
623 else if (result > 0)
624 node = node->rb_right;
625 else
626 return sd;
Mikulas Patocka4f72c0c2011-07-25 17:55:57 -0400627 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -0800628 return NULL;
Tejun Heof0b0af42007-06-14 04:27:22 +0900629}
Maneesh Sonic5168652006-03-09 19:40:14 +0530630
Tejun Heof0b0af42007-06-14 04:27:22 +0900631/**
Tejun Heo388975c2013-09-11 23:19:13 -0400632 * sysfs_get_dirent_ns - find and get sysfs_dirent with the given name
Tejun Heof0b0af42007-06-14 04:27:22 +0900633 * @parent_sd: sysfs_dirent to search under
634 * @name: name to look for
Tejun Heo388975c2013-09-11 23:19:13 -0400635 * @ns: the namespace tag to use
Tejun Heof0b0af42007-06-14 04:27:22 +0900636 *
637 * Look for sysfs_dirent with name @name under @parent_sd and get
638 * it if found.
639 *
640 * LOCKING:
Tejun Heo3007e992007-06-14 04:27:23 +0900641 * Kernel thread context (may sleep). Grabs sysfs_mutex.
Tejun Heof0b0af42007-06-14 04:27:22 +0900642 *
643 * RETURNS:
644 * Pointer to sysfs_dirent if found, NULL if not.
645 */
Tejun Heo388975c2013-09-11 23:19:13 -0400646struct sysfs_dirent *sysfs_get_dirent_ns(struct sysfs_dirent *parent_sd,
647 const unsigned char *name,
648 const void *ns)
Tejun Heof0b0af42007-06-14 04:27:22 +0900649{
650 struct sysfs_dirent *sd;
651
Tejun Heo3007e992007-06-14 04:27:23 +0900652 mutex_lock(&sysfs_mutex);
Tejun Heocfec0bc2013-09-11 22:29:09 -0400653 sd = sysfs_find_dirent(parent_sd, name, ns);
Tejun Heof0b0af42007-06-14 04:27:22 +0900654 sysfs_get(sd);
Tejun Heo3007e992007-06-14 04:27:23 +0900655 mutex_unlock(&sysfs_mutex);
Tejun Heof0b0af42007-06-14 04:27:22 +0900656
657 return sd;
Maneesh Sonic5168652006-03-09 19:40:14 +0530658}
Tejun Heo388975c2013-09-11 23:19:13 -0400659EXPORT_SYMBOL_GPL(sysfs_get_dirent_ns);
Maneesh Sonic5168652006-03-09 19:40:14 +0530660
Tejun Heo608e2662007-06-14 04:27:22 +0900661static int create_dir(struct kobject *kobj, struct sysfs_dirent *parent_sd,
Tejun Heocfec0bc2013-09-11 22:29:09 -0400662 const char *name, const void *ns,
663 struct sysfs_dirent **p_sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700664{
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700665 umode_t mode = S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO;
Tejun Heo51225032007-06-14 04:27:25 +0900666 struct sysfs_addrm_cxt acxt;
Tejun Heodfeb9fb2007-06-14 03:45:14 +0900667 struct sysfs_dirent *sd;
Tejun Heo23dc2792007-08-02 21:38:03 +0900668 int rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700669
Tejun Heofc9f54b2007-06-14 03:45:17 +0900670 /* allocate */
Tejun Heo3e519032007-06-14 03:45:15 +0900671 sd = sysfs_new_dirent(name, mode, SYSFS_DIR);
Tejun Heoa26cd722007-06-14 03:45:14 +0900672 if (!sd)
Tejun Heo51225032007-06-14 04:27:25 +0900673 return -ENOMEM;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700674
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700675 sd->s_ns = ns;
Tejun Heob1fc3d62007-09-20 16:05:11 +0900676 sd->s_dir.kobj = kobj;
Tejun Heodfeb9fb2007-06-14 03:45:14 +0900677
Tejun Heo51225032007-06-14 04:27:25 +0900678 /* link in */
Tejun Heod69ac5a2013-09-18 17:15:35 -0400679 sysfs_addrm_start(&acxt);
680 rc = sysfs_add_one(&acxt, sd, parent_sd);
Tejun Heo23dc2792007-08-02 21:38:03 +0900681 sysfs_addrm_finish(&acxt);
Tejun Heo967e35d2007-07-18 16:38:11 +0900682
Tejun Heo23dc2792007-08-02 21:38:03 +0900683 if (rc == 0)
684 *p_sd = sd;
685 else
Tejun Heo967e35d2007-07-18 16:38:11 +0900686 sysfs_put(sd);
Tejun Heofc9f54b2007-06-14 03:45:17 +0900687
Tejun Heo23dc2792007-08-02 21:38:03 +0900688 return rc;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689}
690
Tejun Heo608e2662007-06-14 04:27:22 +0900691int sysfs_create_subdir(struct kobject *kobj, const char *name,
692 struct sysfs_dirent **p_sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700693{
Tejun Heocfec0bc2013-09-11 22:29:09 -0400694 return create_dir(kobj, kobj->sd, name, NULL, p_sd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700695}
696
697/**
Tejun Heoe34ff492013-09-11 22:29:05 -0400698 * sysfs_create_dir_ns - create a directory for an object with a namespace tag
699 * @kobj: object we're creating directory for
700 * @ns: the namespace tag to use
Linus Torvalds1da177e2005-04-16 15:20:36 -0700701 */
Tejun Heoe34ff492013-09-11 22:29:05 -0400702int sysfs_create_dir_ns(struct kobject *kobj, const void *ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700703{
Tejun Heo608e2662007-06-14 04:27:22 +0900704 struct sysfs_dirent *parent_sd, *sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700705 int error = 0;
706
707 BUG_ON(!kobj);
708
Eric W. Biederman90bc6132007-07-31 19:15:08 +0900709 if (kobj->parent)
Tejun Heo608e2662007-06-14 04:27:22 +0900710 parent_sd = kobj->parent->sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700711 else
Eric W. Biederman7d0c7d62007-08-20 21:36:30 +0900712 parent_sd = &sysfs_root;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700713
Dan Williams3a198882012-04-06 13:41:06 -0700714 if (!parent_sd)
715 return -ENOENT;
716
Tejun Heocfec0bc2013-09-11 22:29:09 -0400717 error = create_dir(kobj, parent_sd, kobject_name(kobj), ns, &sd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718 if (!error)
Tejun Heo608e2662007-06-14 04:27:22 +0900719 kobj->sd = sd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700720 return error;
721}
722
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700723static struct dentry *sysfs_lookup(struct inode *dir, struct dentry *dentry,
724 unsigned int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725{
Tejun Heo6cb52142007-07-31 19:15:08 +0900726 struct dentry *ret = NULL;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700727 struct dentry *parent = dentry->d_parent;
728 struct sysfs_dirent *parent_sd = parent->d_fsdata;
Tejun Heoa7a04752007-08-02 21:38:02 +0900729 struct sysfs_dirent *sd;
Tejun Heofc9f54b2007-06-14 03:45:17 +0900730 struct inode *inode;
Tejun Heocb26a312013-09-11 22:29:07 -0400731 const void *ns = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700732
Tejun Heo6cb52142007-07-31 19:15:08 +0900733 mutex_lock(&sysfs_mutex);
734
Tejun Heocb26a312013-09-11 22:29:07 -0400735 if (parent_sd->s_flags & SYSFS_FLAG_HAS_NS)
736 ns = sysfs_info(dir->i_sb)->ns;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700737
Tejun Heocfec0bc2013-09-11 22:29:09 -0400738 sd = sysfs_find_dirent(parent_sd, dentry->d_name.name, ns);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739
Tejun Heofc9f54b2007-06-14 03:45:17 +0900740 /* no such entry */
Tejun Heoe49452c2008-01-16 12:06:14 +0900741 if (!sd) {
742 ret = ERR_PTR(-ENOENT);
Tejun Heo6cb52142007-07-31 19:15:08 +0900743 goto out_unlock;
Tejun Heoe49452c2008-01-16 12:06:14 +0900744 }
Al Viro469796d2012-06-07 20:51:39 -0400745 dentry->d_fsdata = sysfs_get(sd);
Tejun Heofc9f54b2007-06-14 03:45:17 +0900746
747 /* attach dentry and inode */
Eric W. Biedermanfac26222010-02-12 19:22:27 -0800748 inode = sysfs_get_inode(dir->i_sb, sd);
Tejun Heo6cb52142007-07-31 19:15:08 +0900749 if (!inode) {
750 ret = ERR_PTR(-ENOMEM);
751 goto out_unlock;
752 }
Tejun Heo3007e992007-06-14 04:27:23 +0900753
Tejun Heod6b4fd22007-09-20 16:05:11 +0900754 /* instantiate and hash dentry */
Al Viroe77fb7c2012-06-07 20:56:54 -0400755 ret = d_materialise_unique(dentry, inode);
Tejun Heo6cb52142007-07-31 19:15:08 +0900756 out_unlock:
Tejun Heo3007e992007-06-14 04:27:23 +0900757 mutex_unlock(&sysfs_mutex);
Tejun Heo6cb52142007-07-31 19:15:08 +0900758 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700759}
760
Arjan van de Venc5ef1c42007-02-12 00:55:40 -0800761const struct inode_operations sysfs_dir_inode_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700762 .lookup = sysfs_lookup,
Eric W. Biedermane61ab4a2009-11-20 16:08:53 -0800763 .permission = sysfs_permission,
Maneesh Soni988d1862005-05-31 10:39:14 +0530764 .setattr = sysfs_setattr,
Eric W. Biedermane61ab4a2009-11-20 16:08:53 -0800765 .getattr = sysfs_getattr,
David P. Quigleyddd29ec2009-09-09 14:25:37 -0400766 .setxattr = sysfs_setxattr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700767};
768
Tejun Heobcdde7e2013-09-18 17:15:37 -0400769static struct sysfs_dirent *sysfs_leftmost_descendant(struct sysfs_dirent *pos)
770{
771 struct sysfs_dirent *last;
772
773 while (true) {
774 struct rb_node *rbn;
775
776 last = pos;
777
778 if (sysfs_type(pos) != SYSFS_DIR)
779 break;
780
781 rbn = rb_first(&pos->s_dir.children);
782 if (!rbn)
783 break;
784
785 pos = to_sysfs_dirent(rbn);
786 }
787
788 return last;
789}
790
791/**
792 * sysfs_next_descendant_post - find the next descendant for post-order walk
793 * @pos: the current position (%NULL to initiate traversal)
794 * @root: sysfs_dirent whose descendants to walk
795 *
796 * Find the next descendant to visit for post-order traversal of @root's
797 * descendants. @root is included in the iteration and the last node to be
798 * visited.
799 */
800static struct sysfs_dirent *sysfs_next_descendant_post(struct sysfs_dirent *pos,
801 struct sysfs_dirent *root)
802{
803 struct rb_node *rbn;
804
805 lockdep_assert_held(&sysfs_mutex);
806
807 /* if first iteration, visit leftmost descendant which may be root */
808 if (!pos)
809 return sysfs_leftmost_descendant(root);
810
811 /* if we visited @root, we're done */
812 if (pos == root)
813 return NULL;
814
815 /* if there's an unvisited sibling, visit its leftmost descendant */
816 rbn = rb_next(&pos->s_rb);
817 if (rbn)
818 return sysfs_leftmost_descendant(to_sysfs_dirent(rbn));
819
820 /* no sibling left, visit parent */
821 return pos->s_parent;
822}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700823
Tejun Heo7eed6ec2013-10-24 11:49:10 -0400824static void __sysfs_remove(struct sysfs_addrm_cxt *acxt,
825 struct sysfs_dirent *sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826{
Tejun Heobcdde7e2013-09-18 17:15:37 -0400827 struct sysfs_dirent *pos, *next;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700828
Tejun Heo250f7c32013-09-18 17:15:38 -0400829 if (!sd)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700830 return;
831
Tejun Heo250f7c32013-09-18 17:15:38 -0400832 pr_debug("sysfs %s: removing\n", sd->s_name);
Tejun Heo0ab66082007-06-14 03:45:16 +0900833
Tejun Heobcdde7e2013-09-18 17:15:37 -0400834 next = NULL;
835 do {
836 pos = next;
Tejun Heo250f7c32013-09-18 17:15:38 -0400837 next = sysfs_next_descendant_post(pos, sd);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400838 if (pos)
Tejun Heo250f7c32013-09-18 17:15:38 -0400839 sysfs_remove_one(acxt, pos);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400840 } while (next);
Tejun Heo250f7c32013-09-18 17:15:38 -0400841}
Tejun Heobcdde7e2013-09-18 17:15:37 -0400842
Tejun Heo250f7c32013-09-18 17:15:38 -0400843/**
844 * sysfs_remove - remove a sysfs_dirent recursively
845 * @sd: the sysfs_dirent to remove
846 *
847 * Remove @sd along with all its subdirectories and files.
848 */
849void sysfs_remove(struct sysfs_dirent *sd)
850{
851 struct sysfs_addrm_cxt acxt;
852
853 sysfs_addrm_start(&acxt);
854 __sysfs_remove(&acxt, sd);
Tejun Heobcdde7e2013-09-18 17:15:37 -0400855 sysfs_addrm_finish(&acxt);
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700856}
857
858/**
Tejun Heo7eed6ec2013-10-24 11:49:10 -0400859 * sysfs_hash_and_remove - find a sysfs_dirent by name and remove it
860 * @dir_sd: parent of the target
861 * @name: name of the sysfs_dirent to remove
862 * @ns: namespace tag of the sysfs_dirent to remove
863 *
864 * Look for the sysfs_dirent with @name and @ns under @dir_sd and remove
865 * it. Returns 0 on success, -ENOENT if such entry doesn't exist.
866 */
867int sysfs_hash_and_remove(struct sysfs_dirent *dir_sd, const char *name,
868 const void *ns)
869{
870 struct sysfs_addrm_cxt acxt;
871 struct sysfs_dirent *sd;
872
873 if (!dir_sd) {
874 WARN(1, KERN_WARNING "sysfs: can not remove '%s', no directory\n",
875 name);
876 return -ENOENT;
877 }
878
879 sysfs_addrm_start(&acxt);
880
881 sd = sysfs_find_dirent(dir_sd, name, ns);
882 if (sd)
883 __sysfs_remove(&acxt, sd);
884
885 sysfs_addrm_finish(&acxt);
886
887 if (sd)
888 return 0;
889 else
890 return -ENOENT;
891}
892
893/**
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700894 * sysfs_remove_dir - remove an object's directory.
895 * @kobj: object.
896 *
897 * The only thing special about this is that we remove any files in
898 * the directory before we remove the directory, and we've inlined
899 * what used to be sysfs_rmdir() below, instead of calling separately.
900 */
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -0700901void sysfs_remove_dir(struct kobject *kobj)
Eric W. Biedermanb592fcf2007-01-24 12:35:52 -0700902{
Tejun Heo608e2662007-06-14 04:27:22 +0900903 struct sysfs_dirent *sd = kobj->sd;
Tejun Heoaecdced2007-06-14 03:45:15 +0900904
Tejun Heo0cae60f2013-10-30 10:28:36 -0400905 /*
906 * In general, kboject owner is responsible for ensuring removal
907 * doesn't race with other operations and sysfs doesn't provide any
908 * protection; however, when @kobj is used as a symlink target, the
909 * symlinking entity usually doesn't own @kobj and thus has no
910 * control over removal. @kobj->sd may be removed anytime and
911 * symlink code may end up dereferencing an already freed sd.
912 *
913 * sysfs_symlink_target_lock synchronizes @kobj->sd disassociation
914 * against symlink operations so that symlink code can safely
915 * dereference @kobj->sd.
916 */
917 spin_lock(&sysfs_symlink_target_lock);
Tejun Heo608e2662007-06-14 04:27:22 +0900918 kobj->sd = NULL;
Tejun Heo0cae60f2013-10-30 10:28:36 -0400919 spin_unlock(&sysfs_symlink_target_lock);
Tejun Heoaecdced2007-06-14 03:45:15 +0900920
Tejun Heo250f7c32013-09-18 17:15:38 -0400921 if (sd) {
922 WARN_ON_ONCE(sysfs_type(sd) != SYSFS_DIR);
923 sysfs_remove(sd);
924 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700925}
926
Tejun Heocfec0bc2013-09-11 22:29:09 -0400927int sysfs_rename(struct sysfs_dirent *sd, struct sysfs_dirent *new_parent_sd,
928 const char *new_name, const void *new_ns)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700929{
Tejun Heo996b7372007-06-14 03:45:14 +0900930 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700931
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800932 mutex_lock(&sysfs_mutex);
Eric W. Biederman932ea2e2007-08-20 21:36:30 +0900933
Eric W. Biederman9918f9a2007-08-20 21:36:31 +0900934 error = 0;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700935 if ((sd->s_parent == new_parent_sd) && (sd->s_ns == new_ns) &&
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800936 (strcmp(sd->s_name, new_name) == 0))
Eric W. Biederman9918f9a2007-08-20 21:36:31 +0900937 goto out; /* nothing to rename */
938
Tejun Heo996b7372007-06-14 03:45:14 +0900939 error = -EEXIST;
Tejun Heocfec0bc2013-09-11 22:29:09 -0400940 if (sysfs_find_dirent(new_parent_sd, new_name, new_ns))
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800941 goto out;
Tejun Heo996b7372007-06-14 03:45:14 +0900942
Eric W. Biederman0b4a4fe2008-07-03 18:05:28 -0700943 /* rename sysfs_dirent */
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800944 if (strcmp(sd->s_name, new_name) != 0) {
945 error = -ENOMEM;
Sasikantha babub4eafca2012-05-03 02:26:14 +0530946 new_name = kstrdup(new_name, GFP_KERNEL);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800947 if (!new_name)
948 goto out;
Tejun Heo996b7372007-06-14 03:45:14 +0900949
Sasikantha babub4eafca2012-05-03 02:26:14 +0530950 kfree(sd->s_name);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800951 sd->s_name = new_name;
952 }
953
Greg Kroah-Hartmanddfd6d02013-08-21 16:33:34 -0700954 /*
955 * Move to the appropriate place in the appropriate directories rbtree.
956 */
Eric W. Biedermanf6d90b42011-11-01 07:06:17 -0700957 sysfs_unlink_sibling(sd);
958 sysfs_get(new_parent_sd);
959 sysfs_put(sd->s_parent);
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700960 sd->s_ns = new_ns;
Tejun Heocfec0bc2013-09-11 22:29:09 -0400961 sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns);
Eric W. Biedermanf6d90b42011-11-01 07:06:17 -0700962 sd->s_parent = new_parent_sd;
963 sysfs_link_sibling(sd);
Tejun Heo0c096b52007-06-14 03:45:15 +0900964
Tejun Heo996b7372007-06-14 03:45:14 +0900965 error = 0;
Eric W. Biederman9918f9a2007-08-20 21:36:31 +0900966 out:
Eric W. Biederman832b6af2009-11-20 16:08:56 -0800967 mutex_unlock(&sysfs_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700968 return error;
969}
970
Tejun Heoe34ff492013-09-11 22:29:05 -0400971int sysfs_rename_dir_ns(struct kobject *kobj, const char *new_name,
972 const void *new_ns)
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800973{
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700974 struct sysfs_dirent *parent_sd = kobj->sd->s_parent;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -0700975
Tejun Heocfec0bc2013-09-11 22:29:09 -0400976 return sysfs_rename(kobj->sd, parent_sd, new_name, new_ns);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800977}
978
Tejun Heoe34ff492013-09-11 22:29:05 -0400979int sysfs_move_dir_ns(struct kobject *kobj, struct kobject *new_parent_kobj,
980 const void *new_ns)
Cornelia Huck8a824722006-11-20 17:07:51 +0100981{
Tejun Heo51225032007-06-14 04:27:25 +0900982 struct sysfs_dirent *sd = kobj->sd;
983 struct sysfs_dirent *new_parent_sd;
Cornelia Huck8a824722006-11-20 17:07:51 +0100984
Tejun Heo51225032007-06-14 04:27:25 +0900985 BUG_ON(!sd->s_parent);
Eric W. Biedermanca1bab32009-11-20 16:08:57 -0800986 new_parent_sd = new_parent_kobj && new_parent_kobj->sd ?
Cornelia Hucka6a83572009-10-06 15:33:35 +0200987 new_parent_kobj->sd : &sysfs_root;
Cornelia Huck8a824722006-11-20 17:07:51 +0100988
Tejun Heocfec0bc2013-09-11 22:29:09 -0400989 return sysfs_rename(sd, new_parent_sd, sd->s_name, new_ns);
Cornelia Huck8a824722006-11-20 17:07:51 +0100990}
991
Linus Torvalds1da177e2005-04-16 15:20:36 -0700992/* Relationship between s_mode and the DT_xxx types */
993static inline unsigned char dt_type(struct sysfs_dirent *sd)
994{
995 return (sd->s_mode >> 12) & 15;
996}
997
Eric W. Biederman1e5289c2010-01-01 14:43:53 -0800998static int sysfs_dir_release(struct inode *inode, struct file *filp)
999{
1000 sysfs_put(filp->private_data);
1001 return 0;
1002}
1003
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001004static struct sysfs_dirent *sysfs_dir_pos(const void *ns,
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001005 struct sysfs_dirent *parent_sd, loff_t hash, struct sysfs_dirent *pos)
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001006{
1007 if (pos) {
1008 int valid = !(pos->s_flags & SYSFS_FLAG_REMOVED) &&
1009 pos->s_parent == parent_sd &&
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001010 hash == pos->s_hash;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001011 sysfs_put(pos);
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001012 if (!valid)
1013 pos = NULL;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001014 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001015 if (!pos && (hash > 1) && (hash < INT_MAX)) {
1016 struct rb_node *node = parent_sd->s_dir.children.rb_node;
1017 while (node) {
1018 pos = to_sysfs_dirent(node);
1019
1020 if (hash < pos->s_hash)
1021 node = node->rb_left;
1022 else if (hash > pos->s_hash)
1023 node = node->rb_right;
1024 else
Mikulas Patockaa406f752011-07-25 17:57:03 -04001025 break;
Mikulas Patockaa406f752011-07-25 17:57:03 -04001026 }
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001027 }
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001028 /* Skip over entries in the wrong namespace */
Eric W. Biedermanb9e2780d2011-10-25 05:38:41 -07001029 while (pos && pos->s_ns != ns) {
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001030 struct rb_node *node = rb_next(&pos->s_rb);
1031 if (!node)
Mikulas Patockaa406f752011-07-25 17:57:03 -04001032 pos = NULL;
1033 else
Eric W. Biederman4e4d6d82011-12-18 20:05:43 -08001034 pos = to_sysfs_dirent(node);
Mikulas Patockaa406f752011-07-25 17:57:03 -04001035 }
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001036 return pos;
1037}
1038
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001039static struct sysfs_dirent *sysfs_dir_next_pos(const void *ns,
1040 struct sysfs_dirent *parent_sd, ino_t ino, struct sysfs_dirent *pos)
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001041{
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001042 pos = sysfs_dir_pos(ns, parent_sd, ino, pos);
Greg Kroah-Hartman37814ee2013-08-21 16:36:02 -07001043 if (pos)
1044 do {
1045 struct rb_node *node = rb_next(&pos->s_rb);
1046 if (!node)
1047 pos = NULL;
1048 else
1049 pos = to_sysfs_dirent(node);
1050 } while (pos && pos->s_ns != ns);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001051 return pos;
1052}
1053
Al Virod55fea82013-05-16 14:31:02 -04001054static int sysfs_readdir(struct file *file, struct dir_context *ctx)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001055{
Al Virod55fea82013-05-16 14:31:02 -04001056 struct dentry *dentry = file->f_path.dentry;
Greg Kroah-Hartman1b18dc22013-08-21 16:28:26 -07001057 struct sysfs_dirent *parent_sd = dentry->d_fsdata;
Al Virod55fea82013-05-16 14:31:02 -04001058 struct sysfs_dirent *pos = file->private_data;
Tejun Heocb26a312013-09-11 22:29:07 -04001059 const void *ns = NULL;
Eric W. Biederman3ff195b2010-03-30 11:31:26 -07001060
Al Virod55fea82013-05-16 14:31:02 -04001061 if (!dir_emit_dots(file, ctx))
1062 return 0;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001063 mutex_lock(&sysfs_mutex);
Tejun Heocb26a312013-09-11 22:29:07 -04001064
1065 if (parent_sd->s_flags & SYSFS_FLAG_HAS_NS)
1066 ns = sysfs_info(dentry->d_sb)->ns;
1067
Al Virod55fea82013-05-16 14:31:02 -04001068 for (pos = sysfs_dir_pos(ns, parent_sd, ctx->pos, pos);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001069 pos;
Al Virod55fea82013-05-16 14:31:02 -04001070 pos = sysfs_dir_next_pos(ns, parent_sd, ctx->pos, pos)) {
1071 const char *name = pos->s_name;
1072 unsigned int type = dt_type(pos);
1073 int len = strlen(name);
1074 ino_t ino = pos->s_ino;
1075 ctx->pos = pos->s_hash;
1076 file->private_data = sysfs_get(pos);
Eric W. Biederman3efa65b2007-08-20 21:36:30 +09001077
Eric W. Biederman3efa65b2007-08-20 21:36:30 +09001078 mutex_unlock(&sysfs_mutex);
Al Virod55fea82013-05-16 14:31:02 -04001079 if (!dir_emit(ctx, name, len, ino, type))
1080 return 0;
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001081 mutex_lock(&sysfs_mutex);
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001082 }
1083 mutex_unlock(&sysfs_mutex);
Al Virod55fea82013-05-16 14:31:02 -04001084 file->private_data = NULL;
1085 ctx->pos = INT_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001086 return 0;
1087}
1088
Ming Lei991f76f2013-03-20 23:25:24 +08001089static loff_t sysfs_dir_llseek(struct file *file, loff_t offset, int whence)
1090{
1091 struct inode *inode = file_inode(file);
1092 loff_t ret;
1093
1094 mutex_lock(&inode->i_mutex);
1095 ret = generic_file_llseek(file, offset, whence);
1096 mutex_unlock(&inode->i_mutex);
1097
1098 return ret;
1099}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001100
Arjan van de Ven4b6f5d22006-03-28 01:56:42 -08001101const struct file_operations sysfs_dir_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001102 .read = generic_read_dir,
Al Virod55fea82013-05-16 14:31:02 -04001103 .iterate = sysfs_readdir,
Eric W. Biederman1e5289c2010-01-01 14:43:53 -08001104 .release = sysfs_dir_release,
Ming Lei991f76f2013-03-20 23:25:24 +08001105 .llseek = sysfs_dir_llseek,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001106};