diff options
Diffstat (limited to 'lib/kobject_uevent.c')
-rw-r--r-- | lib/kobject_uevent.c | 279 |
1 files changed, 95 insertions, 184 deletions
diff --git a/lib/kobject_uevent.c b/lib/kobject_uevent.c index 845bf67d94ca..dd061da3aba9 100644 --- a/lib/kobject_uevent.c +++ b/lib/kobject_uevent.c | |||
@@ -29,6 +29,7 @@ | |||
29 | char hotplug_path[HOTPLUG_PATH_LEN] = "/sbin/hotplug"; | 29 | char hotplug_path[HOTPLUG_PATH_LEN] = "/sbin/hotplug"; |
30 | u64 hotplug_seqnum; | 30 | u64 hotplug_seqnum; |
31 | static DEFINE_SPINLOCK(sequence_lock); | 31 | static DEFINE_SPINLOCK(sequence_lock); |
32 | static struct sock *uevent_sock; | ||
32 | 33 | ||
33 | static char *action_to_string(enum kobject_action action) | 34 | static char *action_to_string(enum kobject_action action) |
34 | { | 35 | { |
@@ -48,123 +49,6 @@ static char *action_to_string(enum kobject_action action) | |||
48 | } | 49 | } |
49 | } | 50 | } |
50 | 51 | ||
51 | static struct sock *uevent_sock; | ||
52 | |||
53 | /** | ||
54 | * send_uevent - notify userspace by sending event through netlink socket | ||
55 | * | ||
56 | * @signal: signal name | ||
57 | * @obj: object path (kobject) | ||
58 | * @envp: possible hotplug environment to pass with the message | ||
59 | * @gfp_mask: | ||
60 | */ | ||
61 | static int send_uevent(const char *signal, const char *obj, | ||
62 | char **envp, gfp_t gfp_mask) | ||
63 | { | ||
64 | struct sk_buff *skb; | ||
65 | char *pos; | ||
66 | int len; | ||
67 | |||
68 | if (!uevent_sock) | ||
69 | return -EIO; | ||
70 | |||
71 | len = strlen(signal) + 1; | ||
72 | len += strlen(obj) + 1; | ||
73 | |||
74 | /* allocate buffer with the maximum possible message size */ | ||
75 | skb = alloc_skb(len + BUFFER_SIZE, gfp_mask); | ||
76 | if (!skb) | ||
77 | return -ENOMEM; | ||
78 | |||
79 | pos = skb_put(skb, len); | ||
80 | sprintf(pos, "%s@%s", signal, obj); | ||
81 | |||
82 | /* copy the environment key by key to our continuous buffer */ | ||
83 | if (envp) { | ||
84 | int i; | ||
85 | |||
86 | for (i = 2; envp[i]; i++) { | ||
87 | len = strlen(envp[i]) + 1; | ||
88 | pos = skb_put(skb, len); | ||
89 | strcpy(pos, envp[i]); | ||
90 | } | ||
91 | } | ||
92 | |||
93 | NETLINK_CB(skb).dst_group = 1; | ||
94 | return netlink_broadcast(uevent_sock, skb, 0, 1, gfp_mask); | ||
95 | } | ||
96 | |||
97 | static int do_kobject_uevent(struct kobject *kobj, enum kobject_action action, | ||
98 | struct attribute *attr, gfp_t gfp_mask) | ||
99 | { | ||
100 | char *path; | ||
101 | char *attrpath; | ||
102 | char *signal; | ||
103 | int len; | ||
104 | int rc = -ENOMEM; | ||
105 | |||
106 | path = kobject_get_path(kobj, gfp_mask); | ||
107 | if (!path) | ||
108 | return -ENOMEM; | ||
109 | |||
110 | signal = action_to_string(action); | ||
111 | if (!signal) | ||
112 | return -EINVAL; | ||
113 | |||
114 | if (attr) { | ||
115 | len = strlen(path); | ||
116 | len += strlen(attr->name) + 2; | ||
117 | attrpath = kmalloc(len, gfp_mask); | ||
118 | if (!attrpath) | ||
119 | goto exit; | ||
120 | sprintf(attrpath, "%s/%s", path, attr->name); | ||
121 | rc = send_uevent(signal, attrpath, NULL, gfp_mask); | ||
122 | kfree(attrpath); | ||
123 | } else | ||
124 | rc = send_uevent(signal, path, NULL, gfp_mask); | ||
125 | |||
126 | exit: | ||
127 | kfree(path); | ||
128 | return rc; | ||
129 | } | ||
130 | |||
131 | /** | ||
132 | * kobject_uevent - notify userspace by sending event through netlink socket | ||
133 | * | ||
134 | * @signal: signal name | ||
135 | * @kobj: struct kobject that the event is happening to | ||
136 | * @attr: optional struct attribute the event belongs to | ||
137 | */ | ||
138 | int kobject_uevent(struct kobject *kobj, enum kobject_action action, | ||
139 | struct attribute *attr) | ||
140 | { | ||
141 | return do_kobject_uevent(kobj, action, attr, GFP_KERNEL); | ||
142 | } | ||
143 | EXPORT_SYMBOL_GPL(kobject_uevent); | ||
144 | |||
145 | int kobject_uevent_atomic(struct kobject *kobj, enum kobject_action action, | ||
146 | struct attribute *attr) | ||
147 | { | ||
148 | return do_kobject_uevent(kobj, action, attr, GFP_ATOMIC); | ||
149 | } | ||
150 | EXPORT_SYMBOL_GPL(kobject_uevent_atomic); | ||
151 | |||
152 | static int __init kobject_uevent_init(void) | ||
153 | { | ||
154 | uevent_sock = netlink_kernel_create(NETLINK_KOBJECT_UEVENT, 1, NULL, | ||
155 | THIS_MODULE); | ||
156 | |||
157 | if (!uevent_sock) { | ||
158 | printk(KERN_ERR | ||
159 | "kobject_uevent: unable to create netlink socket!\n"); | ||
160 | return -ENODEV; | ||
161 | } | ||
162 | |||
163 | return 0; | ||
164 | } | ||
165 | |||
166 | postcore_initcall(kobject_uevent_init); | ||
167 | |||
168 | /** | 52 | /** |
169 | * kobject_hotplug - notify userspace by executing /sbin/hotplug | 53 | * kobject_hotplug - notify userspace by executing /sbin/hotplug |
170 | * | 54 | * |
@@ -173,95 +57,84 @@ postcore_initcall(kobject_uevent_init); | |||
173 | */ | 57 | */ |
174 | void kobject_hotplug(struct kobject *kobj, enum kobject_action action) | 58 | void kobject_hotplug(struct kobject *kobj, enum kobject_action action) |
175 | { | 59 | { |
176 | char *argv [3]; | 60 | char **envp; |
177 | char **envp = NULL; | 61 | char *buffer; |
178 | char *buffer = NULL; | ||
179 | char *seq_buff; | ||
180 | char *scratch; | 62 | char *scratch; |
63 | const char *action_string; | ||
64 | const char *devpath = NULL; | ||
65 | const char *subsystem; | ||
66 | struct kobject *top_kobj; | ||
67 | struct kset *kset; | ||
68 | struct kset_hotplug_ops *hotplug_ops; | ||
69 | u64 seq; | ||
70 | char *seq_buff; | ||
181 | int i = 0; | 71 | int i = 0; |
182 | int retval; | 72 | int retval; |
183 | char *kobj_path = NULL; | ||
184 | const char *name = NULL; | ||
185 | char *action_string; | ||
186 | u64 seq; | ||
187 | struct kobject *top_kobj = kobj; | ||
188 | struct kset *kset; | ||
189 | static struct kset_hotplug_ops null_hotplug_ops; | ||
190 | struct kset_hotplug_ops *hotplug_ops = &null_hotplug_ops; | ||
191 | 73 | ||
192 | /* If this kobj does not belong to a kset, | 74 | pr_debug("%s\n", __FUNCTION__); |
193 | try to find a parent that does. */ | 75 | |
76 | action_string = action_to_string(action); | ||
77 | if (!action_string) | ||
78 | return; | ||
79 | |||
80 | /* search the kset we belong to */ | ||
81 | top_kobj = kobj; | ||
194 | if (!top_kobj->kset && top_kobj->parent) { | 82 | if (!top_kobj->kset && top_kobj->parent) { |
195 | do { | 83 | do { |
196 | top_kobj = top_kobj->parent; | 84 | top_kobj = top_kobj->parent; |
197 | } while (!top_kobj->kset && top_kobj->parent); | 85 | } while (!top_kobj->kset && top_kobj->parent); |
198 | } | 86 | } |
199 | 87 | if (!top_kobj->kset) | |
200 | if (top_kobj->kset) | ||
201 | kset = top_kobj->kset; | ||
202 | else | ||
203 | return; | 88 | return; |
204 | 89 | ||
205 | if (kset->hotplug_ops) | 90 | kset = top_kobj->kset; |
206 | hotplug_ops = kset->hotplug_ops; | 91 | hotplug_ops = kset->hotplug_ops; |
207 | 92 | ||
208 | /* If the kset has a filter operation, call it. | 93 | /* skip the event, if the filter returns zero. */ |
209 | Skip the event, if the filter returns zero. */ | 94 | if (hotplug_ops && hotplug_ops->filter) |
210 | if (hotplug_ops->filter) { | ||
211 | if (!hotplug_ops->filter(kset, kobj)) | 95 | if (!hotplug_ops->filter(kset, kobj)) |
212 | return; | 96 | return; |
213 | } | ||
214 | |||
215 | pr_debug ("%s\n", __FUNCTION__); | ||
216 | |||
217 | action_string = action_to_string(action); | ||
218 | if (!action_string) | ||
219 | return; | ||
220 | 97 | ||
221 | envp = kmalloc(NUM_ENVP * sizeof (char *), GFP_KERNEL); | 98 | /* environment index */ |
99 | envp = kzalloc(NUM_ENVP * sizeof (char *), GFP_KERNEL); | ||
222 | if (!envp) | 100 | if (!envp) |
223 | return; | 101 | return; |
224 | memset (envp, 0x00, NUM_ENVP * sizeof (char *)); | ||
225 | 102 | ||
103 | /* environment values */ | ||
226 | buffer = kmalloc(BUFFER_SIZE, GFP_KERNEL); | 104 | buffer = kmalloc(BUFFER_SIZE, GFP_KERNEL); |
227 | if (!buffer) | 105 | if (!buffer) |
228 | goto exit; | 106 | goto exit; |
229 | 107 | ||
230 | if (hotplug_ops->name) | 108 | /* complete object path */ |
231 | name = hotplug_ops->name(kset, kobj); | 109 | devpath = kobject_get_path(kobj, GFP_KERNEL); |
232 | if (name == NULL) | 110 | if (!devpath) |
233 | name = kobject_name(&kset->kobj); | 111 | goto exit; |
234 | 112 | ||
235 | argv [0] = hotplug_path; | 113 | /* originating subsystem */ |
236 | argv [1] = (char *)name; /* won't be changed but 'const' has to go */ | 114 | if (hotplug_ops && hotplug_ops->name) |
237 | argv [2] = NULL; | 115 | subsystem = hotplug_ops->name(kset, kobj); |
116 | else | ||
117 | subsystem = kobject_name(&kset->kobj); | ||
238 | 118 | ||
239 | /* minimal command environment */ | 119 | /* event environemnt for helper process only */ |
240 | envp [i++] = "HOME=/"; | 120 | envp[i++] = "HOME=/"; |
241 | envp [i++] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin"; | 121 | envp[i++] = "PATH=/sbin:/bin:/usr/sbin:/usr/bin"; |
242 | 122 | ||
123 | /* default keys */ | ||
243 | scratch = buffer; | 124 | scratch = buffer; |
244 | |||
245 | envp [i++] = scratch; | 125 | envp [i++] = scratch; |
246 | scratch += sprintf(scratch, "ACTION=%s", action_string) + 1; | 126 | scratch += sprintf(scratch, "ACTION=%s", action_string) + 1; |
247 | |||
248 | kobj_path = kobject_get_path(kobj, GFP_KERNEL); | ||
249 | if (!kobj_path) | ||
250 | goto exit; | ||
251 | |||
252 | envp [i++] = scratch; | 127 | envp [i++] = scratch; |
253 | scratch += sprintf (scratch, "DEVPATH=%s", kobj_path) + 1; | 128 | scratch += sprintf (scratch, "DEVPATH=%s", devpath) + 1; |
254 | |||
255 | envp [i++] = scratch; | 129 | envp [i++] = scratch; |
256 | scratch += sprintf(scratch, "SUBSYSTEM=%s", name) + 1; | 130 | scratch += sprintf(scratch, "SUBSYSTEM=%s", subsystem) + 1; |
257 | 131 | ||
258 | /* reserve space for the sequence, | 132 | /* just reserve the space, overwrite it after kset call has returned */ |
259 | * put the real one in after the hotplug call */ | ||
260 | envp[i++] = seq_buff = scratch; | 133 | envp[i++] = seq_buff = scratch; |
261 | scratch += strlen("SEQNUM=18446744073709551616") + 1; | 134 | scratch += strlen("SEQNUM=18446744073709551616") + 1; |
262 | 135 | ||
263 | if (hotplug_ops->hotplug) { | 136 | /* let the kset specific function add its stuff */ |
264 | /* have the kset specific function add its stuff */ | 137 | if (hotplug_ops && hotplug_ops->hotplug) { |
265 | retval = hotplug_ops->hotplug (kset, kobj, | 138 | retval = hotplug_ops->hotplug (kset, kobj, |
266 | &envp[i], NUM_ENVP - i, scratch, | 139 | &envp[i], NUM_ENVP - i, scratch, |
267 | BUFFER_SIZE - (scratch - buffer)); | 140 | BUFFER_SIZE - (scratch - buffer)); |
@@ -272,27 +145,49 @@ void kobject_hotplug(struct kobject *kobj, enum kobject_action action) | |||
272 | } | 145 | } |
273 | } | 146 | } |
274 | 147 | ||
148 | /* we will send an event, request a new sequence number */ | ||
275 | spin_lock(&sequence_lock); | 149 | spin_lock(&sequence_lock); |
276 | seq = ++hotplug_seqnum; | 150 | seq = ++hotplug_seqnum; |
277 | spin_unlock(&sequence_lock); | 151 | spin_unlock(&sequence_lock); |
278 | sprintf(seq_buff, "SEQNUM=%llu", (unsigned long long)seq); | 152 | sprintf(seq_buff, "SEQNUM=%llu", (unsigned long long)seq); |
279 | 153 | ||
280 | pr_debug ("%s: %s %s seq=%llu %s %s %s %s %s\n", | 154 | /* send netlink message */ |
281 | __FUNCTION__, argv[0], argv[1], (unsigned long long)seq, | 155 | if (uevent_sock) { |
282 | envp[0], envp[1], envp[2], envp[3], envp[4]); | 156 | struct sk_buff *skb; |
283 | 157 | size_t len; | |
284 | send_uevent(action_string, kobj_path, envp, GFP_KERNEL); | 158 | |
159 | /* allocate message with the maximum possible size */ | ||
160 | len = strlen(action_string) + strlen(devpath) + 2; | ||
161 | skb = alloc_skb(len + BUFFER_SIZE, GFP_KERNEL); | ||
162 | if (skb) { | ||
163 | /* add header */ | ||
164 | scratch = skb_put(skb, len); | ||
165 | sprintf(scratch, "%s@%s", action_string, devpath); | ||
166 | |||
167 | /* copy keys to our continuous event payload buffer */ | ||
168 | for (i = 2; envp[i]; i++) { | ||
169 | len = strlen(envp[i]) + 1; | ||
170 | scratch = skb_put(skb, len); | ||
171 | strcpy(scratch, envp[i]); | ||
172 | } | ||
173 | |||
174 | NETLINK_CB(skb).dst_group = 1; | ||
175 | netlink_broadcast(uevent_sock, skb, 0, 1, GFP_KERNEL); | ||
176 | } | ||
177 | } | ||
285 | 178 | ||
286 | if (!hotplug_path[0]) | 179 | /* call uevent_helper, usually only enabled during early boot */ |
287 | goto exit; | 180 | if (hotplug_path[0]) { |
181 | char *argv [3]; | ||
288 | 182 | ||
289 | retval = call_usermodehelper (argv[0], argv, envp, 0); | 183 | argv [0] = hotplug_path; |
290 | if (retval) | 184 | argv [1] = (char *)subsystem; |
291 | pr_debug ("%s - call_usermodehelper returned %d\n", | 185 | argv [2] = NULL; |
292 | __FUNCTION__, retval); | 186 | call_usermodehelper (argv[0], argv, envp, 0); |
187 | } | ||
293 | 188 | ||
294 | exit: | 189 | exit: |
295 | kfree(kobj_path); | 190 | kfree(devpath); |
296 | kfree(buffer); | 191 | kfree(buffer); |
297 | kfree(envp); | 192 | kfree(envp); |
298 | return; | 193 | return; |
@@ -350,4 +245,20 @@ int add_hotplug_env_var(char **envp, int num_envp, int *cur_index, | |||
350 | } | 245 | } |
351 | EXPORT_SYMBOL(add_hotplug_env_var); | 246 | EXPORT_SYMBOL(add_hotplug_env_var); |
352 | 247 | ||
248 | static int __init kobject_uevent_init(void) | ||
249 | { | ||
250 | uevent_sock = netlink_kernel_create(NETLINK_KOBJECT_UEVENT, 1, NULL, | ||
251 | THIS_MODULE); | ||
252 | |||
253 | if (!uevent_sock) { | ||
254 | printk(KERN_ERR | ||
255 | "kobject_uevent: unable to create netlink socket!\n"); | ||
256 | return -ENODEV; | ||
257 | } | ||
258 | |||
259 | return 0; | ||
260 | } | ||
261 | |||
262 | postcore_initcall(kobject_uevent_init); | ||
263 | |||
353 | #endif /* CONFIG_HOTPLUG */ | 264 | #endif /* CONFIG_HOTPLUG */ |