diff options
Diffstat (limited to 'fs/sysfs/dir.c')
-rw-r--r-- | fs/sysfs/dir.c | 1075 |
1 files changed, 35 insertions, 1040 deletions
diff --git a/fs/sysfs/dir.c b/fs/sysfs/dir.c index 5e73d6626e50..ee0d761c3179 100644 --- a/fs/sysfs/dir.c +++ b/fs/sysfs/dir.c | |||
@@ -13,465 +13,31 @@ | |||
13 | #undef DEBUG | 13 | #undef DEBUG |
14 | 14 | ||
15 | #include <linux/fs.h> | 15 | #include <linux/fs.h> |
16 | #include <linux/mount.h> | ||
17 | #include <linux/module.h> | ||
18 | #include <linux/kobject.h> | 16 | #include <linux/kobject.h> |
19 | #include <linux/namei.h> | ||
20 | #include <linux/idr.h> | ||
21 | #include <linux/completion.h> | ||
22 | #include <linux/mutex.h> | ||
23 | #include <linux/slab.h> | 17 | #include <linux/slab.h> |
24 | #include <linux/security.h> | ||
25 | #include <linux/hash.h> | ||
26 | #include "sysfs.h" | 18 | #include "sysfs.h" |
27 | 19 | ||
28 | DEFINE_MUTEX(sysfs_mutex); | ||
29 | DEFINE_SPINLOCK(sysfs_symlink_target_lock); | 20 | DEFINE_SPINLOCK(sysfs_symlink_target_lock); |
30 | 21 | ||
31 | #define to_sysfs_dirent(X) rb_entry((X), struct sysfs_dirent, s_rb) | ||
32 | |||
33 | static DEFINE_SPINLOCK(sysfs_ino_lock); | ||
34 | static DEFINE_IDA(sysfs_ino_ida); | ||
35 | |||
36 | /** | ||
37 | * sysfs_name_hash | ||
38 | * @name: Null terminated string to hash | ||
39 | * @ns: Namespace tag to hash | ||
40 | * | ||
41 | * Returns 31 bit hash of ns + name (so it fits in an off_t ) | ||
42 | */ | ||
43 | static unsigned int sysfs_name_hash(const char *name, const void *ns) | ||
44 | { | ||
45 | unsigned long hash = init_name_hash(); | ||
46 | unsigned int len = strlen(name); | ||
47 | while (len--) | ||
48 | hash = partial_name_hash(*name++, hash); | ||
49 | hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31)); | ||
50 | hash &= 0x7fffffffU; | ||
51 | /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */ | ||
52 | if (hash < 1) | ||
53 | hash += 2; | ||
54 | if (hash >= INT_MAX) | ||
55 | hash = INT_MAX - 1; | ||
56 | return hash; | ||
57 | } | ||
58 | |||
59 | static int sysfs_name_compare(unsigned int hash, const char *name, | ||
60 | const void *ns, const struct sysfs_dirent *sd) | ||
61 | { | ||
62 | if (hash != sd->s_hash) | ||
63 | return hash - sd->s_hash; | ||
64 | if (ns != sd->s_ns) | ||
65 | return ns - sd->s_ns; | ||
66 | return strcmp(name, sd->s_name); | ||
67 | } | ||
68 | |||
69 | static int sysfs_sd_compare(const struct sysfs_dirent *left, | ||
70 | const struct sysfs_dirent *right) | ||
71 | { | ||
72 | return sysfs_name_compare(left->s_hash, left->s_name, left->s_ns, | ||
73 | right); | ||
74 | } | ||
75 | |||
76 | /** | ||
77 | * sysfs_link_sibling - link sysfs_dirent into sibling rbtree | ||
78 | * @sd: sysfs_dirent of interest | ||
79 | * | ||
80 | * Link @sd into its sibling rbtree which starts from | ||
81 | * sd->s_parent->s_dir.children. | ||
82 | * | ||
83 | * Locking: | ||
84 | * mutex_lock(sysfs_mutex) | ||
85 | * | ||
86 | * RETURNS: | ||
87 | * 0 on susccess -EEXIST on failure. | ||
88 | */ | ||
89 | static int sysfs_link_sibling(struct sysfs_dirent *sd) | ||
90 | { | ||
91 | struct rb_node **node = &sd->s_parent->s_dir.children.rb_node; | ||
92 | struct rb_node *parent = NULL; | ||
93 | |||
94 | if (sysfs_type(sd) == SYSFS_DIR) | ||
95 | sd->s_parent->s_dir.subdirs++; | ||
96 | |||
97 | while (*node) { | ||
98 | struct sysfs_dirent *pos; | ||
99 | int result; | ||
100 | |||
101 | pos = to_sysfs_dirent(*node); | ||
102 | parent = *node; | ||
103 | result = sysfs_sd_compare(sd, pos); | ||
104 | if (result < 0) | ||
105 | node = &pos->s_rb.rb_left; | ||
106 | else if (result > 0) | ||
107 | node = &pos->s_rb.rb_right; | ||
108 | else | ||
109 | return -EEXIST; | ||
110 | } | ||
111 | /* add new node and rebalance the tree */ | ||
112 | rb_link_node(&sd->s_rb, parent, node); | ||
113 | rb_insert_color(&sd->s_rb, &sd->s_parent->s_dir.children); | ||
114 | return 0; | ||
115 | } | ||
116 | |||
117 | /** | ||
118 | * sysfs_unlink_sibling - unlink sysfs_dirent from sibling rbtree | ||
119 | * @sd: sysfs_dirent of interest | ||
120 | * | ||
121 | * Unlink @sd from its sibling rbtree which starts from | ||
122 | * sd->s_parent->s_dir.children. | ||
123 | * | ||
124 | * Locking: | ||
125 | * mutex_lock(sysfs_mutex) | ||
126 | */ | ||
127 | static void sysfs_unlink_sibling(struct sysfs_dirent *sd) | ||
128 | { | ||
129 | if (sysfs_type(sd) == SYSFS_DIR) | ||
130 | sd->s_parent->s_dir.subdirs--; | ||
131 | |||
132 | rb_erase(&sd->s_rb, &sd->s_parent->s_dir.children); | ||
133 | } | ||
134 | |||
135 | /** | ||
136 | * sysfs_get_active - get an active reference to sysfs_dirent | ||
137 | * @sd: sysfs_dirent to get an active reference to | ||
138 | * | ||
139 | * Get an active reference of @sd. This function is noop if @sd | ||
140 | * is NULL. | ||
141 | * | ||
142 | * RETURNS: | ||
143 | * Pointer to @sd on success, NULL on failure. | ||
144 | */ | ||
145 | struct sysfs_dirent *sysfs_get_active(struct sysfs_dirent *sd) | ||
146 | { | ||
147 | if (unlikely(!sd)) | ||
148 | return NULL; | ||
149 | |||
150 | if (!atomic_inc_unless_negative(&sd->s_active)) | ||
151 | return NULL; | ||
152 | |||
153 | if (likely(!sysfs_ignore_lockdep(sd))) | ||
154 | rwsem_acquire_read(&sd->dep_map, 0, 1, _RET_IP_); | ||
155 | return sd; | ||
156 | } | ||
157 | |||
158 | /** | ||
159 | * sysfs_put_active - put an active reference to sysfs_dirent | ||
160 | * @sd: sysfs_dirent to put an active reference to | ||
161 | * | ||
162 | * Put an active reference to @sd. This function is noop if @sd | ||
163 | * is NULL. | ||
164 | */ | ||
165 | void sysfs_put_active(struct sysfs_dirent *sd) | ||
166 | { | ||
167 | int v; | ||
168 | |||
169 | if (unlikely(!sd)) | ||
170 | return; | ||
171 | |||
172 | if (likely(!sysfs_ignore_lockdep(sd))) | ||
173 | rwsem_release(&sd->dep_map, 1, _RET_IP_); | ||
174 | v = atomic_dec_return(&sd->s_active); | ||
175 | if (likely(v != SD_DEACTIVATED_BIAS)) | ||
176 | return; | ||
177 | |||
178 | /* atomic_dec_return() is a mb(), we'll always see the updated | ||
179 | * sd->u.completion. | ||
180 | */ | ||
181 | complete(sd->u.completion); | ||
182 | } | ||
183 | |||
184 | /** | ||
185 | * sysfs_deactivate - deactivate sysfs_dirent | ||
186 | * @sd: sysfs_dirent to deactivate | ||
187 | * | ||
188 | * Deny new active references and drain existing ones. | ||
189 | */ | ||
190 | static void sysfs_deactivate(struct sysfs_dirent *sd) | ||
191 | { | ||
192 | DECLARE_COMPLETION_ONSTACK(wait); | ||
193 | int v; | ||
194 | |||
195 | BUG_ON(!(sd->s_flags & SYSFS_FLAG_REMOVED)); | ||
196 | |||
197 | if (!(sysfs_type(sd) & SYSFS_ACTIVE_REF)) | ||
198 | return; | ||
199 | |||
200 | sd->u.completion = (void *)&wait; | ||
201 | |||
202 | rwsem_acquire(&sd->dep_map, 0, 0, _RET_IP_); | ||
203 | /* atomic_add_return() is a mb(), put_active() will always see | ||
204 | * the updated sd->u.completion. | ||
205 | */ | ||
206 | v = atomic_add_return(SD_DEACTIVATED_BIAS, &sd->s_active); | ||
207 | |||
208 | if (v != SD_DEACTIVATED_BIAS) { | ||
209 | lock_contended(&sd->dep_map, _RET_IP_); | ||
210 | wait_for_completion(&wait); | ||
211 | } | ||
212 | |||
213 | lock_acquired(&sd->dep_map, _RET_IP_); | ||
214 | rwsem_release(&sd->dep_map, 1, _RET_IP_); | ||
215 | } | ||
216 | |||
217 | static int sysfs_alloc_ino(unsigned int *pino) | ||
218 | { | ||
219 | int ino, rc; | ||
220 | |||
221 | retry: | ||
222 | spin_lock(&sysfs_ino_lock); | ||
223 | rc = ida_get_new_above(&sysfs_ino_ida, 2, &ino); | ||
224 | spin_unlock(&sysfs_ino_lock); | ||
225 | |||
226 | if (rc == -EAGAIN) { | ||
227 | if (ida_pre_get(&sysfs_ino_ida, GFP_KERNEL)) | ||
228 | goto retry; | ||
229 | rc = -ENOMEM; | ||
230 | } | ||
231 | |||
232 | *pino = ino; | ||
233 | return rc; | ||
234 | } | ||
235 | |||
236 | static void sysfs_free_ino(unsigned int ino) | ||
237 | { | ||
238 | spin_lock(&sysfs_ino_lock); | ||
239 | ida_remove(&sysfs_ino_ida, ino); | ||
240 | spin_unlock(&sysfs_ino_lock); | ||
241 | } | ||
242 | |||
243 | void release_sysfs_dirent(struct sysfs_dirent *sd) | ||
244 | { | ||
245 | struct sysfs_dirent *parent_sd; | ||
246 | |||
247 | repeat: | ||
248 | /* Moving/renaming is always done while holding reference. | ||
249 | * sd->s_parent won't change beneath us. | ||
250 | */ | ||
251 | parent_sd = sd->s_parent; | ||
252 | |||
253 | WARN(!(sd->s_flags & SYSFS_FLAG_REMOVED), | ||
254 | "sysfs: free using entry: %s/%s\n", | ||
255 | parent_sd ? parent_sd->s_name : "", sd->s_name); | ||
256 | |||
257 | if (sysfs_type(sd) == SYSFS_KOBJ_LINK) | ||
258 | sysfs_put(sd->s_symlink.target_sd); | ||
259 | if (sysfs_type(sd) & SYSFS_COPY_NAME) | ||
260 | kfree(sd->s_name); | ||
261 | if (sd->s_iattr && sd->s_iattr->ia_secdata) | ||
262 | security_release_secctx(sd->s_iattr->ia_secdata, | ||
263 | sd->s_iattr->ia_secdata_len); | ||
264 | kfree(sd->s_iattr); | ||
265 | sysfs_free_ino(sd->s_ino); | ||
266 | kmem_cache_free(sysfs_dir_cachep, sd); | ||
267 | |||
268 | sd = parent_sd; | ||
269 | if (sd && atomic_dec_and_test(&sd->s_count)) | ||
270 | goto repeat; | ||
271 | } | ||
272 | |||
273 | static int sysfs_dentry_delete(const struct dentry *dentry) | ||
274 | { | ||
275 | struct sysfs_dirent *sd = dentry->d_fsdata; | ||
276 | return !(sd && !(sd->s_flags & SYSFS_FLAG_REMOVED)); | ||
277 | } | ||
278 | |||
279 | static int sysfs_dentry_revalidate(struct dentry *dentry, unsigned int flags) | ||
280 | { | ||
281 | struct sysfs_dirent *sd; | ||
282 | int type; | ||
283 | |||
284 | if (flags & LOOKUP_RCU) | ||
285 | return -ECHILD; | ||
286 | |||
287 | sd = dentry->d_fsdata; | ||
288 | mutex_lock(&sysfs_mutex); | ||
289 | |||
290 | /* The sysfs dirent has been deleted */ | ||
291 | if (sd->s_flags & SYSFS_FLAG_REMOVED) | ||
292 | goto out_bad; | ||
293 | |||
294 | /* The sysfs dirent has been moved? */ | ||
295 | if (dentry->d_parent->d_fsdata != sd->s_parent) | ||
296 | goto out_bad; | ||
297 | |||
298 | /* The sysfs dirent has been renamed */ | ||
299 | if (strcmp(dentry->d_name.name, sd->s_name) != 0) | ||
300 | goto out_bad; | ||
301 | |||
302 | /* The sysfs dirent has been moved to a different namespace */ | ||
303 | type = KOBJ_NS_TYPE_NONE; | ||
304 | if (sd->s_parent) { | ||
305 | type = sysfs_ns_type(sd->s_parent); | ||
306 | if (type != KOBJ_NS_TYPE_NONE && | ||
307 | sysfs_info(dentry->d_sb)->ns[type] != sd->s_ns) | ||
308 | goto out_bad; | ||
309 | } | ||
310 | |||
311 | mutex_unlock(&sysfs_mutex); | ||
312 | out_valid: | ||
313 | return 1; | ||
314 | out_bad: | ||
315 | /* Remove the dentry from the dcache hashes. | ||
316 | * If this is a deleted dentry we use d_drop instead of d_delete | ||
317 | * so sysfs doesn't need to cope with negative dentries. | ||
318 | * | ||
319 | * If this is a dentry that has simply been renamed we | ||
320 | * use d_drop to remove it from the dcache lookup on its | ||
321 | * old parent. If this dentry persists later when a lookup | ||
322 | * is performed at its new name the dentry will be readded | ||
323 | * to the dcache hashes. | ||
324 | */ | ||
325 | mutex_unlock(&sysfs_mutex); | ||
326 | |||
327 | /* If we have submounts we must allow the vfs caches | ||
328 | * to lie about the state of the filesystem to prevent | ||
329 | * leaks and other nasty things. | ||
330 | */ | ||
331 | if (check_submounts_and_drop(dentry) != 0) | ||
332 | goto out_valid; | ||
333 | |||
334 | return 0; | ||
335 | } | ||
336 | |||
337 | static void sysfs_dentry_release(struct dentry *dentry) | ||
338 | { | ||
339 | sysfs_put(dentry->d_fsdata); | ||
340 | } | ||
341 | |||
342 | const struct dentry_operations sysfs_dentry_ops = { | ||
343 | .d_revalidate = sysfs_dentry_revalidate, | ||
344 | .d_delete = sysfs_dentry_delete, | ||
345 | .d_release = sysfs_dentry_release, | ||
346 | }; | ||
347 | |||
348 | struct sysfs_dirent *sysfs_new_dirent(const char *name, umode_t mode, int type) | ||
349 | { | ||
350 | char *dup_name = NULL; | ||
351 | struct sysfs_dirent *sd; | ||
352 | |||
353 | if (type & SYSFS_COPY_NAME) { | ||
354 | name = dup_name = kstrdup(name, GFP_KERNEL); | ||
355 | if (!name) | ||
356 | return NULL; | ||
357 | } | ||
358 | |||
359 | sd = kmem_cache_zalloc(sysfs_dir_cachep, GFP_KERNEL); | ||
360 | if (!sd) | ||
361 | goto err_out1; | ||
362 | |||
363 | if (sysfs_alloc_ino(&sd->s_ino)) | ||
364 | goto err_out2; | ||
365 | |||
366 | atomic_set(&sd->s_count, 1); | ||
367 | atomic_set(&sd->s_active, 0); | ||
368 | |||
369 | sd->s_name = name; | ||
370 | sd->s_mode = mode; | ||
371 | sd->s_flags = type | SYSFS_FLAG_REMOVED; | ||
372 | |||
373 | return sd; | ||
374 | |||
375 | err_out2: | ||
376 | kmem_cache_free(sysfs_dir_cachep, sd); | ||
377 | err_out1: | ||
378 | kfree(dup_name); | ||
379 | return NULL; | ||
380 | } | ||
381 | |||
382 | /** | ||
383 | * sysfs_addrm_start - prepare for sysfs_dirent add/remove | ||
384 | * @acxt: pointer to sysfs_addrm_cxt to be used | ||
385 | * | ||
386 | * This function is called when the caller is about to add or remove | ||
387 | * sysfs_dirent. This function acquires sysfs_mutex. @acxt is used | ||
388 | * to keep and pass context to other addrm functions. | ||
389 | * | ||
390 | * LOCKING: | ||
391 | * Kernel thread context (may sleep). sysfs_mutex is locked on | ||
392 | * return. | ||
393 | */ | ||
394 | void sysfs_addrm_start(struct sysfs_addrm_cxt *acxt) | ||
395 | __acquires(sysfs_mutex) | ||
396 | { | ||
397 | memset(acxt, 0, sizeof(*acxt)); | ||
398 | |||
399 | mutex_lock(&sysfs_mutex); | ||
400 | } | ||
401 | |||
402 | /** | ||
403 | * __sysfs_add_one - add sysfs_dirent to parent without warning | ||
404 | * @acxt: addrm context to use | ||
405 | * @sd: sysfs_dirent to be added | ||
406 | * @parent_sd: the parent sysfs_dirent to add @sd to | ||
407 | * | ||
408 | * Get @parent_sd and set @sd->s_parent to it and increment nlink of | ||
409 | * the parent inode if @sd is a directory and link into the children | ||
410 | * list of the parent. | ||
411 | * | ||
412 | * This function should be called between calls to | ||
413 | * sysfs_addrm_start() and sysfs_addrm_finish() and should be | ||
414 | * passed the same @acxt as passed to sysfs_addrm_start(). | ||
415 | * | ||
416 | * LOCKING: | ||
417 | * Determined by sysfs_addrm_start(). | ||
418 | * | ||
419 | * RETURNS: | ||
420 | * 0 on success, -EEXIST if entry with the given name already | ||
421 | * exists. | ||
422 | */ | ||
423 | int __sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd, | ||
424 | struct sysfs_dirent *parent_sd) | ||
425 | { | ||
426 | struct sysfs_inode_attrs *ps_iattr; | ||
427 | int ret; | ||
428 | |||
429 | if (!!sysfs_ns_type(parent_sd) != !!sd->s_ns) { | ||
430 | WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n", | ||
431 | sysfs_ns_type(parent_sd) ? "required" : "invalid", | ||
432 | parent_sd->s_name, sd->s_name); | ||
433 | return -EINVAL; | ||
434 | } | ||
435 | |||
436 | sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns); | ||
437 | sd->s_parent = sysfs_get(parent_sd); | ||
438 | |||
439 | ret = sysfs_link_sibling(sd); | ||
440 | if (ret) | ||
441 | return ret; | ||
442 | |||
443 | /* Update timestamps on the parent */ | ||
444 | ps_iattr = parent_sd->s_iattr; | ||
445 | if (ps_iattr) { | ||
446 | struct iattr *ps_iattrs = &ps_iattr->ia_iattr; | ||
447 | ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME; | ||
448 | } | ||
449 | |||
450 | /* Mark the entry added into directory tree */ | ||
451 | sd->s_flags &= ~SYSFS_FLAG_REMOVED; | ||
452 | |||
453 | return 0; | ||
454 | } | ||
455 | |||
456 | /** | 22 | /** |
457 | * sysfs_pathname - return full path to sysfs dirent | 23 | * sysfs_pathname - return full path to sysfs dirent |
458 | * @sd: sysfs_dirent whose path we want | 24 | * @kn: kernfs_node whose path we want |
459 | * @path: caller allocated buffer of size PATH_MAX | 25 | * @path: caller allocated buffer of size PATH_MAX |
460 | * | 26 | * |
461 | * Gives the name "/" to the sysfs_root entry; any path returned | 27 | * Gives the name "/" to the sysfs_root entry; any path returned |
462 | * is relative to wherever sysfs is mounted. | 28 | * is relative to wherever sysfs is mounted. |
463 | */ | 29 | */ |
464 | static char *sysfs_pathname(struct sysfs_dirent *sd, char *path) | 30 | static char *sysfs_pathname(struct kernfs_node *kn, char *path) |
465 | { | 31 | { |
466 | if (sd->s_parent) { | 32 | if (kn->parent) { |
467 | sysfs_pathname(sd->s_parent, path); | 33 | sysfs_pathname(kn->parent, path); |
468 | strlcat(path, "/", PATH_MAX); | 34 | strlcat(path, "/", PATH_MAX); |
469 | } | 35 | } |
470 | strlcat(path, sd->s_name, PATH_MAX); | 36 | strlcat(path, kn->name, PATH_MAX); |
471 | return path; | 37 | return path; |
472 | } | 38 | } |
473 | 39 | ||
474 | void sysfs_warn_dup(struct sysfs_dirent *parent, const char *name) | 40 | void sysfs_warn_dup(struct kernfs_node *parent, const char *name) |
475 | { | 41 | { |
476 | char *path; | 42 | char *path; |
477 | 43 | ||
@@ -489,445 +55,34 @@ void sysfs_warn_dup(struct sysfs_dirent *parent, const char *name) | |||
489 | } | 55 | } |
490 | 56 | ||
491 | /** | 57 | /** |
492 | * sysfs_add_one - add sysfs_dirent to parent | ||
493 | * @acxt: addrm context to use | ||
494 | * @sd: sysfs_dirent to be added | ||
495 | * @parent_sd: the parent sysfs_dirent to add @sd to | ||
496 | * | ||
497 | * Get @parent_sd and set @sd->s_parent to it and increment nlink of | ||
498 | * the parent inode if @sd is a directory and link into the children | ||
499 | * list of the parent. | ||
500 | * | ||
501 | * This function should be called between calls to | ||
502 | * sysfs_addrm_start() and sysfs_addrm_finish() and should be | ||
503 | * passed the same @acxt as passed to sysfs_addrm_start(). | ||
504 | * | ||
505 | * LOCKING: | ||
506 | * Determined by sysfs_addrm_start(). | ||
507 | * | ||
508 | * RETURNS: | ||
509 | * 0 on success, -EEXIST if entry with the given name already | ||
510 | * exists. | ||
511 | */ | ||
512 | int sysfs_add_one(struct sysfs_addrm_cxt *acxt, struct sysfs_dirent *sd, | ||
513 | struct sysfs_dirent *parent_sd) | ||
514 | { | ||
515 | int ret; | ||
516 | |||
517 | ret = __sysfs_add_one(acxt, sd, parent_sd); | ||
518 | |||
519 | if (ret == -EEXIST) | ||
520 | sysfs_warn_dup(parent_sd, sd->s_name); | ||
521 | return ret; | ||
522 | } | ||
523 | |||
524 | /** | ||
525 | * sysfs_remove_one - remove sysfs_dirent from parent | ||
526 | * @acxt: addrm context to use | ||
527 | * @sd: sysfs_dirent to be removed | ||
528 | * | ||
529 | * Mark @sd removed and drop nlink of parent inode if @sd is a | ||
530 | * directory. @sd is unlinked from the children list. | ||
531 | * | ||
532 | * This function should be called between calls to | ||
533 | * sysfs_addrm_start() and sysfs_addrm_finish() and should be | ||
534 | * passed the same @acxt as passed to sysfs_addrm_start(). | ||
535 | * | ||
536 | * LOCKING: | ||
537 | * Determined by sysfs_addrm_start(). | ||
538 | */ | ||
539 | static void sysfs_remove_one(struct sysfs_addrm_cxt *acxt, | ||
540 | struct sysfs_dirent *sd) | ||
541 | { | ||
542 | struct sysfs_inode_attrs *ps_iattr; | ||
543 | |||
544 | /* | ||
545 | * Removal can be called multiple times on the same node. Only the | ||
546 | * first invocation is effective and puts the base ref. | ||
547 | */ | ||
548 | if (sd->s_flags & SYSFS_FLAG_REMOVED) | ||
549 | return; | ||
550 | |||
551 | sysfs_unlink_sibling(sd); | ||
552 | |||
553 | /* Update timestamps on the parent */ | ||
554 | ps_iattr = sd->s_parent->s_iattr; | ||
555 | if (ps_iattr) { | ||
556 | struct iattr *ps_iattrs = &ps_iattr->ia_iattr; | ||
557 | ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME; | ||
558 | } | ||
559 | |||
560 | sd->s_flags |= SYSFS_FLAG_REMOVED; | ||
561 | sd->u.removed_list = acxt->removed; | ||
562 | acxt->removed = sd; | ||
563 | } | ||
564 | |||
565 | /** | ||
566 | * sysfs_addrm_finish - finish up sysfs_dirent add/remove | ||
567 | * @acxt: addrm context to finish up | ||
568 | * | ||
569 | * Finish up sysfs_dirent add/remove. Resources acquired by | ||
570 | * sysfs_addrm_start() are released and removed sysfs_dirents are | ||
571 | * cleaned up. | ||
572 | * | ||
573 | * LOCKING: | ||
574 | * sysfs_mutex is released. | ||
575 | */ | ||
576 | void sysfs_addrm_finish(struct sysfs_addrm_cxt *acxt) | ||
577 | __releases(sysfs_mutex) | ||
578 | { | ||
579 | /* release resources acquired by sysfs_addrm_start() */ | ||
580 | mutex_unlock(&sysfs_mutex); | ||
581 | |||
582 | /* kill removed sysfs_dirents */ | ||
583 | while (acxt->removed) { | ||
584 | struct sysfs_dirent *sd = acxt->removed; | ||
585 | |||
586 | acxt->removed = sd->u.removed_list; | ||
587 | |||
588 | sysfs_deactivate(sd); | ||
589 | sysfs_unmap_bin_file(sd); | ||
590 | sysfs_put(sd); | ||
591 | } | ||
592 | } | ||
593 | |||
594 | /** | ||
595 | * sysfs_find_dirent - find sysfs_dirent with the given name | ||
596 | * @parent_sd: sysfs_dirent to search under | ||
597 | * @name: name to look for | ||
598 | * @ns: the namespace tag to use | ||
599 | * | ||
600 | * Look for sysfs_dirent with name @name under @parent_sd. | ||
601 | * | ||
602 | * LOCKING: | ||
603 | * mutex_lock(sysfs_mutex) | ||
604 | * | ||
605 | * RETURNS: | ||
606 | * Pointer to sysfs_dirent if found, NULL if not. | ||
607 | */ | ||
608 | struct sysfs_dirent *sysfs_find_dirent(struct sysfs_dirent *parent_sd, | ||
609 | const unsigned char *name, | ||
610 | const void *ns) | ||
611 | { | ||
612 | struct rb_node *node = parent_sd->s_dir.children.rb_node; | ||
613 | unsigned int hash; | ||
614 | |||
615 | if (!!sysfs_ns_type(parent_sd) != !!ns) { | ||
616 | WARN(1, KERN_WARNING "sysfs: ns %s in '%s' for '%s'\n", | ||
617 | sysfs_ns_type(parent_sd) ? "required" : "invalid", | ||
618 | parent_sd->s_name, name); | ||
619 | return NULL; | ||
620 | } | ||
621 | |||
622 | hash = sysfs_name_hash(name, ns); | ||
623 | while (node) { | ||
624 | struct sysfs_dirent *sd; | ||
625 | int result; | ||
626 | |||
627 | sd = to_sysfs_dirent(node); | ||
628 | result = sysfs_name_compare(hash, name, ns, sd); | ||
629 | if (result < 0) | ||
630 | node = node->rb_left; | ||
631 | else if (result > 0) | ||
632 | node = node->rb_right; | ||
633 | else | ||
634 | return sd; | ||
635 | } | ||
636 | return NULL; | ||
637 | } | ||
638 | |||
639 | /** | ||
640 | * sysfs_get_dirent_ns - find and get sysfs_dirent with the given name | ||
641 | * @parent_sd: sysfs_dirent to search under | ||
642 | * @name: name to look for | ||
643 | * @ns: the namespace tag to use | ||
644 | * | ||
645 | * Look for sysfs_dirent with name @name under @parent_sd and get | ||
646 | * it if found. | ||
647 | * | ||
648 | * LOCKING: | ||
649 | * Kernel thread context (may sleep). Grabs sysfs_mutex. | ||
650 | * | ||
651 | * RETURNS: | ||
652 | * Pointer to sysfs_dirent if found, NULL if not. | ||
653 | */ | ||
654 | struct sysfs_dirent *sysfs_get_dirent_ns(struct sysfs_dirent *parent_sd, | ||
655 | const unsigned char *name, | ||
656 | const void *ns) | ||
657 | { | ||
658 | struct sysfs_dirent *sd; | ||
659 | |||
660 | mutex_lock(&sysfs_mutex); | ||
661 | sd = sysfs_find_dirent(parent_sd, name, ns); | ||
662 | sysfs_get(sd); | ||
663 | mutex_unlock(&sysfs_mutex); | ||
664 | |||
665 | return sd; | ||
666 | } | ||
667 | EXPORT_SYMBOL_GPL(sysfs_get_dirent_ns); | ||
668 | |||
669 | static int create_dir(struct kobject *kobj, struct sysfs_dirent *parent_sd, | ||
670 | enum kobj_ns_type type, | ||
671 | const char *name, const void *ns, | ||
672 | struct sysfs_dirent **p_sd) | ||
673 | { | ||
674 | umode_t mode = S_IFDIR | S_IRWXU | S_IRUGO | S_IXUGO; | ||
675 | struct sysfs_addrm_cxt acxt; | ||
676 | struct sysfs_dirent *sd; | ||
677 | int rc; | ||
678 | |||
679 | /* allocate */ | ||
680 | sd = sysfs_new_dirent(name, mode, SYSFS_DIR); | ||
681 | if (!sd) | ||
682 | return -ENOMEM; | ||
683 | |||
684 | sd->s_flags |= (type << SYSFS_NS_TYPE_SHIFT); | ||
685 | sd->s_ns = ns; | ||
686 | sd->s_dir.kobj = kobj; | ||
687 | |||
688 | /* link in */ | ||
689 | sysfs_addrm_start(&acxt); | ||
690 | rc = sysfs_add_one(&acxt, sd, parent_sd); | ||
691 | sysfs_addrm_finish(&acxt); | ||
692 | |||
693 | if (rc == 0) | ||
694 | *p_sd = sd; | ||
695 | else | ||
696 | sysfs_put(sd); | ||
697 | |||
698 | return rc; | ||
699 | } | ||
700 | |||
701 | int sysfs_create_subdir(struct kobject *kobj, const char *name, | ||
702 | struct sysfs_dirent **p_sd) | ||
703 | { | ||
704 | return create_dir(kobj, kobj->sd, | ||
705 | KOBJ_NS_TYPE_NONE, name, NULL, p_sd); | ||
706 | } | ||
707 | |||
708 | /** | ||
709 | * sysfs_read_ns_type: return associated ns_type | ||
710 | * @kobj: the kobject being queried | ||
711 | * | ||
712 | * Each kobject can be tagged with exactly one namespace type | ||
713 | * (i.e. network or user). Return the ns_type associated with | ||
714 | * this object if any | ||
715 | */ | ||
716 | static enum kobj_ns_type sysfs_read_ns_type(struct kobject *kobj) | ||
717 | { | ||
718 | const struct kobj_ns_type_operations *ops; | ||
719 | enum kobj_ns_type type; | ||
720 | |||
721 | ops = kobj_child_ns_ops(kobj); | ||
722 | if (!ops) | ||
723 | return KOBJ_NS_TYPE_NONE; | ||
724 | |||
725 | type = ops->type; | ||
726 | BUG_ON(type <= KOBJ_NS_TYPE_NONE); | ||
727 | BUG_ON(type >= KOBJ_NS_TYPES); | ||
728 | BUG_ON(!kobj_ns_type_registered(type)); | ||
729 | |||
730 | return type; | ||
731 | } | ||
732 | |||
733 | /** | ||
734 | * sysfs_create_dir_ns - create a directory for an object with a namespace tag | 58 | * sysfs_create_dir_ns - create a directory for an object with a namespace tag |
735 | * @kobj: object we're creating directory for | 59 | * @kobj: object we're creating directory for |
736 | * @ns: the namespace tag to use | 60 | * @ns: the namespace tag to use |
737 | */ | 61 | */ |
738 | int sysfs_create_dir_ns(struct kobject *kobj, const void *ns) | 62 | int sysfs_create_dir_ns(struct kobject *kobj, const void *ns) |
739 | { | 63 | { |
740 | enum kobj_ns_type type; | 64 | struct kernfs_node *parent, *kn; |
741 | struct sysfs_dirent *parent_sd, *sd; | ||
742 | int error = 0; | ||
743 | 65 | ||
744 | BUG_ON(!kobj); | 66 | BUG_ON(!kobj); |
745 | 67 | ||
746 | if (kobj->parent) | 68 | if (kobj->parent) |
747 | parent_sd = kobj->parent->sd; | 69 | parent = kobj->parent->sd; |
748 | else | 70 | else |
749 | parent_sd = &sysfs_root; | 71 | parent = sysfs_root_kn; |
750 | 72 | ||
751 | if (!parent_sd) | 73 | if (!parent) |
752 | return -ENOENT; | 74 | return -ENOENT; |
753 | 75 | ||
754 | type = sysfs_read_ns_type(kobj); | 76 | kn = kernfs_create_dir_ns(parent, kobject_name(kobj), |
755 | 77 | S_IRWXU | S_IRUGO | S_IXUGO, kobj, ns); | |
756 | error = create_dir(kobj, parent_sd, type, kobject_name(kobj), ns, &sd); | 78 | if (IS_ERR(kn)) { |
757 | if (!error) | 79 | if (PTR_ERR(kn) == -EEXIST) |
758 | kobj->sd = sd; | 80 | sysfs_warn_dup(parent, kobject_name(kobj)); |
759 | return error; | 81 | return PTR_ERR(kn); |
760 | } | ||
761 | |||
762 | static struct dentry *sysfs_lookup(struct inode *dir, struct dentry *dentry, | ||
763 | unsigned int flags) | ||
764 | { | ||
765 | struct dentry *ret = NULL; | ||
766 | struct dentry *parent = dentry->d_parent; | ||
767 | struct sysfs_dirent *parent_sd = parent->d_fsdata; | ||
768 | struct sysfs_dirent *sd; | ||
769 | struct inode *inode; | ||
770 | enum kobj_ns_type type; | ||
771 | const void *ns; | ||
772 | |||
773 | mutex_lock(&sysfs_mutex); | ||
774 | |||
775 | type = sysfs_ns_type(parent_sd); | ||
776 | ns = sysfs_info(dir->i_sb)->ns[type]; | ||
777 | |||
778 | sd = sysfs_find_dirent(parent_sd, dentry->d_name.name, ns); | ||
779 | |||
780 | /* no such entry */ | ||
781 | if (!sd) { | ||
782 | ret = ERR_PTR(-ENOENT); | ||
783 | goto out_unlock; | ||
784 | } | ||
785 | dentry->d_fsdata = sysfs_get(sd); | ||
786 | |||
787 | /* attach dentry and inode */ | ||
788 | inode = sysfs_get_inode(dir->i_sb, sd); | ||
789 | if (!inode) { | ||
790 | ret = ERR_PTR(-ENOMEM); | ||
791 | goto out_unlock; | ||
792 | } | ||
793 | |||
794 | /* instantiate and hash dentry */ | ||
795 | ret = d_materialise_unique(dentry, inode); | ||
796 | out_unlock: | ||
797 | mutex_unlock(&sysfs_mutex); | ||
798 | return ret; | ||
799 | } | ||
800 | |||
801 | const struct inode_operations sysfs_dir_inode_operations = { | ||
802 | .lookup = sysfs_lookup, | ||
803 | .permission = sysfs_permission, | ||
804 | .setattr = sysfs_setattr, | ||
805 | .getattr = sysfs_getattr, | ||
806 | .setxattr = sysfs_setxattr, | ||
807 | }; | ||
808 | |||
809 | static struct sysfs_dirent *sysfs_leftmost_descendant(struct sysfs_dirent *pos) | ||
810 | { | ||
811 | struct sysfs_dirent *last; | ||
812 | |||
813 | while (true) { | ||
814 | struct rb_node *rbn; | ||
815 | |||
816 | last = pos; | ||
817 | |||
818 | if (sysfs_type(pos) != SYSFS_DIR) | ||
819 | break; | ||
820 | |||
821 | rbn = rb_first(&pos->s_dir.children); | ||
822 | if (!rbn) | ||
823 | break; | ||
824 | |||
825 | pos = to_sysfs_dirent(rbn); | ||
826 | } | ||
827 | |||
828 | return last; | ||
829 | } | ||
830 | |||
831 | /** | ||
832 | * sysfs_next_descendant_post - find the next descendant for post-order walk | ||
833 | * @pos: the current position (%NULL to initiate traversal) | ||
834 | * @root: sysfs_dirent whose descendants to walk | ||
835 | * | ||
836 | * Find the next descendant to visit for post-order traversal of @root's | ||
837 | * descendants. @root is included in the iteration and the last node to be | ||
838 | * visited. | ||
839 | */ | ||
840 | static struct sysfs_dirent *sysfs_next_descendant_post(struct sysfs_dirent *pos, | ||
841 | struct sysfs_dirent *root) | ||
842 | { | ||
843 | struct rb_node *rbn; | ||
844 | |||
845 | lockdep_assert_held(&sysfs_mutex); | ||
846 | |||
847 | /* if first iteration, visit leftmost descendant which may be root */ | ||
848 | if (!pos) | ||
849 | return sysfs_leftmost_descendant(root); | ||
850 | |||
851 | /* if we visited @root, we're done */ | ||
852 | if (pos == root) | ||
853 | return NULL; | ||
854 | |||
855 | /* if there's an unvisited sibling, visit its leftmost descendant */ | ||
856 | rbn = rb_next(&pos->s_rb); | ||
857 | if (rbn) | ||
858 | return sysfs_leftmost_descendant(to_sysfs_dirent(rbn)); | ||
859 | |||
860 | /* no sibling left, visit parent */ | ||
861 | return pos->s_parent; | ||
862 | } | ||
863 | |||
864 | static void __sysfs_remove(struct sysfs_addrm_cxt *acxt, | ||
865 | struct sysfs_dirent *sd) | ||
866 | { | ||
867 | struct sysfs_dirent *pos, *next; | ||
868 | |||
869 | if (!sd) | ||
870 | return; | ||
871 | |||
872 | pr_debug("sysfs %s: removing\n", sd->s_name); | ||
873 | |||
874 | next = NULL; | ||
875 | do { | ||
876 | pos = next; | ||
877 | next = sysfs_next_descendant_post(pos, sd); | ||
878 | if (pos) | ||
879 | sysfs_remove_one(acxt, pos); | ||
880 | } while (next); | ||
881 | } | ||
882 | |||
883 | /** | ||
884 | * sysfs_remove - remove a sysfs_dirent recursively | ||
885 | * @sd: the sysfs_dirent to remove | ||
886 | * | ||
887 | * Remove @sd along with all its subdirectories and files. | ||
888 | */ | ||
889 | void sysfs_remove(struct sysfs_dirent *sd) | ||
890 | { | ||
891 | struct sysfs_addrm_cxt acxt; | ||
892 | |||
893 | sysfs_addrm_start(&acxt); | ||
894 | __sysfs_remove(&acxt, sd); | ||
895 | sysfs_addrm_finish(&acxt); | ||
896 | } | ||
897 | |||
898 | /** | ||
899 | * sysfs_hash_and_remove - find a sysfs_dirent by name and remove it | ||
900 | * @dir_sd: parent of the target | ||
901 | * @name: name of the sysfs_dirent to remove | ||
902 | * @ns: namespace tag of the sysfs_dirent to remove | ||
903 | * | ||
904 | * Look for the sysfs_dirent with @name and @ns under @dir_sd and remove | ||
905 | * it. Returns 0 on success, -ENOENT if such entry doesn't exist. | ||
906 | */ | ||
907 | int sysfs_hash_and_remove(struct sysfs_dirent *dir_sd, const char *name, | ||
908 | const void *ns) | ||
909 | { | ||
910 | struct sysfs_addrm_cxt acxt; | ||
911 | struct sysfs_dirent *sd; | ||
912 | |||
913 | if (!dir_sd) { | ||
914 | WARN(1, KERN_WARNING "sysfs: can not remove '%s', no directory\n", | ||
915 | name); | ||
916 | return -ENOENT; | ||
917 | } | 82 | } |
918 | 83 | ||
919 | sysfs_addrm_start(&acxt); | 84 | kobj->sd = kn; |
920 | 85 | return 0; | |
921 | sd = sysfs_find_dirent(dir_sd, name, ns); | ||
922 | if (sd) | ||
923 | __sysfs_remove(&acxt, sd); | ||
924 | |||
925 | sysfs_addrm_finish(&acxt); | ||
926 | |||
927 | if (sd) | ||
928 | return 0; | ||
929 | else | ||
930 | return -ENOENT; | ||
931 | } | 86 | } |
932 | 87 | ||
933 | /** | 88 | /** |
@@ -940,207 +95,47 @@ int sysfs_hash_and_remove(struct sysfs_dirent *dir_sd, const char *name, | |||
940 | */ | 95 | */ |
941 | void sysfs_remove_dir(struct kobject *kobj) | 96 | void sysfs_remove_dir(struct kobject *kobj) |
942 | { | 97 | { |
943 | struct sysfs_dirent *sd = kobj->sd; | 98 | struct kernfs_node *kn = kobj->sd; |
944 | 99 | ||
945 | /* | 100 | /* |
946 | * In general, kboject owner is responsible for ensuring removal | 101 | * In general, kboject owner is responsible for ensuring removal |
947 | * doesn't race with other operations and sysfs doesn't provide any | 102 | * doesn't race with other operations and sysfs doesn't provide any |
948 | * protection; however, when @kobj is used as a symlink target, the | 103 | * protection; however, when @kobj is used as a symlink target, the |
949 | * symlinking entity usually doesn't own @kobj and thus has no | 104 | * symlinking entity usually doesn't own @kobj and thus has no |
950 | * control over removal. @kobj->sd may be removed anytime and | 105 | * control over removal. @kobj->sd may be removed anytime |
951 | * symlink code may end up dereferencing an already freed sd. | 106 | * and symlink code may end up dereferencing an already freed node. |
952 | * | 107 | * |
953 | * sysfs_symlink_target_lock synchronizes @kobj->sd disassociation | 108 | * sysfs_symlink_target_lock synchronizes @kobj->sd |
954 | * against symlink operations so that symlink code can safely | 109 | * disassociation against symlink operations so that symlink code |
955 | * dereference @kobj->sd. | 110 | * can safely dereference @kobj->sd. |
956 | */ | 111 | */ |
957 | spin_lock(&sysfs_symlink_target_lock); | 112 | spin_lock(&sysfs_symlink_target_lock); |
958 | kobj->sd = NULL; | 113 | kobj->sd = NULL; |
959 | spin_unlock(&sysfs_symlink_target_lock); | 114 | spin_unlock(&sysfs_symlink_target_lock); |
960 | 115 | ||
961 | if (sd) { | 116 | if (kn) { |
962 | WARN_ON_ONCE(sysfs_type(sd) != SYSFS_DIR); | 117 | WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR); |
963 | sysfs_remove(sd); | 118 | kernfs_remove(kn); |
964 | } | 119 | } |
965 | } | 120 | } |
966 | 121 | ||
967 | int sysfs_rename(struct sysfs_dirent *sd, struct sysfs_dirent *new_parent_sd, | ||
968 | const char *new_name, const void *new_ns) | ||
969 | { | ||
970 | int error; | ||
971 | |||
972 | mutex_lock(&sysfs_mutex); | ||
973 | |||
974 | error = 0; | ||
975 | if ((sd->s_parent == new_parent_sd) && (sd->s_ns == new_ns) && | ||
976 | (strcmp(sd->s_name, new_name) == 0)) | ||
977 | goto out; /* nothing to rename */ | ||
978 | |||
979 | error = -EEXIST; | ||
980 | if (sysfs_find_dirent(new_parent_sd, new_name, new_ns)) | ||
981 | goto out; | ||
982 | |||
983 | /* rename sysfs_dirent */ | ||
984 | if (strcmp(sd->s_name, new_name) != 0) { | ||
985 | error = -ENOMEM; | ||
986 | new_name = kstrdup(new_name, GFP_KERNEL); | ||
987 | if (!new_name) | ||
988 | goto out; | ||
989 | |||
990 | kfree(sd->s_name); | ||
991 | sd->s_name = new_name; | ||
992 | } | ||
993 | |||
994 | /* | ||
995 | * Move to the appropriate place in the appropriate directories rbtree. | ||
996 | */ | ||
997 | sysfs_unlink_sibling(sd); | ||
998 | sysfs_get(new_parent_sd); | ||
999 | sysfs_put(sd->s_parent); | ||
1000 | sd->s_ns = new_ns; | ||
1001 | sd->s_hash = sysfs_name_hash(sd->s_name, sd->s_ns); | ||
1002 | sd->s_parent = new_parent_sd; | ||
1003 | sysfs_link_sibling(sd); | ||
1004 | |||
1005 | error = 0; | ||
1006 | out: | ||
1007 | mutex_unlock(&sysfs_mutex); | ||
1008 | return error; | ||
1009 | } | ||
1010 | |||
1011 | int sysfs_rename_dir_ns(struct kobject *kobj, const char *new_name, | 122 | int sysfs_rename_dir_ns(struct kobject *kobj, const char *new_name, |
1012 | const void *new_ns) | 123 | const void *new_ns) |
1013 | { | 124 | { |
1014 | struct sysfs_dirent *parent_sd = kobj->sd->s_parent; | 125 | struct kernfs_node *parent = kobj->sd->parent; |
1015 | 126 | ||
1016 | return sysfs_rename(kobj->sd, parent_sd, new_name, new_ns); | 127 | return kernfs_rename_ns(kobj->sd, parent, new_name, new_ns); |
1017 | } | 128 | } |
1018 | 129 | ||
1019 | int sysfs_move_dir_ns(struct kobject *kobj, struct kobject *new_parent_kobj, | 130 | int sysfs_move_dir_ns(struct kobject *kobj, struct kobject *new_parent_kobj, |
1020 | const void *new_ns) | 131 | const void *new_ns) |
1021 | { | 132 | { |
1022 | struct sysfs_dirent *sd = kobj->sd; | 133 | struct kernfs_node *kn = kobj->sd; |
1023 | struct sysfs_dirent *new_parent_sd; | 134 | struct kernfs_node *new_parent; |
1024 | 135 | ||
1025 | BUG_ON(!sd->s_parent); | 136 | BUG_ON(!kn->parent); |
1026 | new_parent_sd = new_parent_kobj && new_parent_kobj->sd ? | 137 | new_parent = new_parent_kobj && new_parent_kobj->sd ? |
1027 | new_parent_kobj->sd : &sysfs_root; | 138 | new_parent_kobj->sd : sysfs_root_kn; |
1028 | 139 | ||
1029 | return sysfs_rename(sd, new_parent_sd, sd->s_name, new_ns); | 140 | return kernfs_rename_ns(kn, new_parent, kn->name, new_ns); |
1030 | } | 141 | } |
1031 | |||
1032 | /* Relationship between s_mode and the DT_xxx types */ | ||
1033 | static inline unsigned char dt_type(struct sysfs_dirent *sd) | ||
1034 | { | ||
1035 | return (sd->s_mode >> 12) & 15; | ||
1036 | } | ||
1037 | |||
1038 | static int sysfs_dir_release(struct inode *inode, struct file *filp) | ||
1039 | { | ||
1040 | sysfs_put(filp->private_data); | ||
1041 | return 0; | ||
1042 | } | ||
1043 | |||
1044 | static struct sysfs_dirent *sysfs_dir_pos(const void *ns, | ||
1045 | struct sysfs_dirent *parent_sd, loff_t hash, struct sysfs_dirent *pos) | ||
1046 | { | ||
1047 | if (pos) { | ||
1048 | int valid = !(pos->s_flags & SYSFS_FLAG_REMOVED) && | ||
1049 | pos->s_parent == parent_sd && | ||
1050 | hash == pos->s_hash; | ||
1051 | sysfs_put(pos); | ||
1052 | if (!valid) | ||
1053 | pos = NULL; | ||
1054 | } | ||
1055 | if (!pos && (hash > 1) && (hash < INT_MAX)) { | ||
1056 | struct rb_node *node = parent_sd->s_dir.children.rb_node; | ||
1057 | while (node) { | ||
1058 | pos = to_sysfs_dirent(node); | ||
1059 | |||
1060 | if (hash < pos->s_hash) | ||
1061 | node = node->rb_left; | ||
1062 | else if (hash > pos->s_hash) | ||
1063 | node = node->rb_right; | ||
1064 | else | ||
1065 | break; | ||
1066 | } | ||
1067 | } | ||
1068 | /* Skip over entries in the wrong namespace */ | ||
1069 | while (pos && pos->s_ns != ns) { | ||
1070 | struct rb_node *node = rb_next(&pos->s_rb); | ||
1071 | if (!node) | ||
1072 | pos = NULL; | ||
1073 | else | ||
1074 | pos = to_sysfs_dirent(node); | ||
1075 | } | ||
1076 | return pos; | ||
1077 | } | ||
1078 | |||
1079 | static struct sysfs_dirent *sysfs_dir_next_pos(const void *ns, | ||
1080 | struct sysfs_dirent *parent_sd, ino_t ino, struct sysfs_dirent *pos) | ||
1081 | { | ||
1082 | pos = sysfs_dir_pos(ns, parent_sd, ino, pos); | ||
1083 | if (pos) | ||
1084 | do { | ||
1085 | struct rb_node *node = rb_next(&pos->s_rb); | ||
1086 | if (!node) | ||
1087 | pos = NULL; | ||
1088 | else | ||
1089 | pos = to_sysfs_dirent(node); | ||
1090 | } while (pos && pos->s_ns != ns); | ||
1091 | return pos; | ||
1092 | } | ||
1093 | |||
1094 | static int sysfs_readdir(struct file *file, struct dir_context *ctx) | ||
1095 | { | ||
1096 | struct dentry *dentry = file->f_path.dentry; | ||
1097 | struct sysfs_dirent *parent_sd = dentry->d_fsdata; | ||
1098 | struct sysfs_dirent *pos = file->private_data; | ||
1099 | enum kobj_ns_type type; | ||
1100 | const void *ns; | ||
1101 | |||
1102 | type = sysfs_ns_type(parent_sd); | ||
1103 | ns = sysfs_info(dentry->d_sb)->ns[type]; | ||
1104 | |||
1105 | if (!dir_emit_dots(file, ctx)) | ||
1106 | return 0; | ||
1107 | mutex_lock(&sysfs_mutex); | ||
1108 | for (pos = sysfs_dir_pos(ns, parent_sd, ctx->pos, pos); | ||
1109 | pos; | ||
1110 | pos = sysfs_dir_next_pos(ns, parent_sd, ctx->pos, pos)) { | ||
1111 | const char *name = pos->s_name; | ||
1112 | unsigned int type = dt_type(pos); | ||
1113 | int len = strlen(name); | ||
1114 | ino_t ino = pos->s_ino; | ||
1115 | ctx->pos = pos->s_hash; | ||
1116 | file->private_data = sysfs_get(pos); | ||
1117 | |||
1118 | mutex_unlock(&sysfs_mutex); | ||
1119 | if (!dir_emit(ctx, name, len, ino, type)) | ||
1120 | return 0; | ||
1121 | mutex_lock(&sysfs_mutex); | ||
1122 | } | ||
1123 | mutex_unlock(&sysfs_mutex); | ||
1124 | file->private_data = NULL; | ||
1125 | ctx->pos = INT_MAX; | ||
1126 | return 0; | ||
1127 | } | ||
1128 | |||
1129 | static loff_t sysfs_dir_llseek(struct file *file, loff_t offset, int whence) | ||
1130 | { | ||
1131 | struct inode *inode = file_inode(file); | ||
1132 | loff_t ret; | ||
1133 | |||
1134 | mutex_lock(&inode->i_mutex); | ||
1135 | ret = generic_file_llseek(file, offset, whence); | ||
1136 | mutex_unlock(&inode->i_mutex); | ||
1137 | |||
1138 | return ret; | ||
1139 | } | ||
1140 | |||
1141 | const struct file_operations sysfs_dir_operations = { | ||
1142 | .read = generic_read_dir, | ||
1143 | .iterate = sysfs_readdir, | ||
1144 | .release = sysfs_dir_release, | ||
1145 | .llseek = sysfs_dir_llseek, | ||
1146 | }; | ||