ceph: handle the case where a dentry has been renamed on outstanding req
[linux-2.6-block.git] / fs / sysfs / file.c
CommitLineData
619daeee 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
6d66f5cd
TH
3 * fs/sysfs/file.c - sysfs regular (text) file implementation
4 *
5 * Copyright (c) 2001-3 Patrick Mochel
6 * Copyright (c) 2007 SUSE Linux Products GmbH
7 * Copyright (c) 2007 Tejun Heo <teheo@suse.de>
8 *
6d66f5cd 9 * Please see Documentation/filesystems/sysfs.txt for more information.
1da177e4
LT
10 */
11
12#include <linux/module.h>
1da177e4 13#include <linux/kobject.h>
c6f87733 14#include <linux/slab.h>
94bebf4d 15#include <linux/list.h>
52e8c209 16#include <linux/mutex.h>
13c589d5 17#include <linux/seq_file.h>
1da177e4
LT
18
19#include "sysfs.h"
f6acf8bb 20
375b611e 21/*
324a56e1 22 * Determine ktype->sysfs_ops for the given kernfs_node. This function
375b611e
TH
23 * must be called while holding an active reference.
24 */
324a56e1 25static const struct sysfs_ops *sysfs_file_ops(struct kernfs_node *kn)
375b611e 26{
adc5e8b5 27 struct kobject *kobj = kn->parent->priv;
375b611e 28
df23fc39 29 if (kn->flags & KERNFS_LOCKDEP)
324a56e1 30 lockdep_assert_held(kn);
375b611e
TH
31 return kobj->ktype ? kobj->ktype->sysfs_ops : NULL;
32}
33
13c589d5
TH
34/*
35 * Reads on sysfs are handled through seq_file, which takes care of hairy
36 * details like buffering and seeking. The following function pipes
37 * sysfs_ops->show() result through seq_file.
1da177e4 38 */
c2b19daf 39static int sysfs_kf_seq_show(struct seq_file *sf, void *v)
1da177e4 40{
c525aadd 41 struct kernfs_open_file *of = sf->private;
adc5e8b5 42 struct kobject *kobj = of->kn->parent->priv;
324a56e1 43 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
1da177e4 44 ssize_t count;
c2b19daf 45 char *buf;
1da177e4 46
f5c16f29 47 /* acquire buffer and ensure that it's >= PAGE_SIZE and clear */
13c589d5
TH
48 count = seq_get_buf(sf, &buf);
49 if (count < PAGE_SIZE) {
50 seq_commit(sf, -1);
51 return 0;
52 }
f5c16f29 53 memset(buf, 0, PAGE_SIZE);
1da177e4 54
13c589d5 55 /*
c2b19daf
TH
56 * Invoke show(). Control may reach here via seq file lseek even
57 * if @ops->show() isn't implemented.
13c589d5 58 */
c2b19daf 59 if (ops->show) {
324a56e1 60 count = ops->show(kobj, of->kn->priv, buf);
c2b19daf
TH
61 if (count < 0)
62 return count;
63 }
0ab66088 64
8118a859
MX
65 /*
66 * The code works fine with PAGE_SIZE return but it's likely to
67 * indicate truncated result or overflow in normal use cases.
68 */
815d2d50 69 if (count >= (ssize_t)PAGE_SIZE) {
9e6d35ff
SS
70 printk("fill_read_buffer: %pS returned bad count\n",
71 ops->show);
815d2d50
AM
72 /* Try to struggle along */
73 count = PAGE_SIZE - 1;
74 }
13c589d5
TH
75 seq_commit(sf, count);
76 return 0;
1da177e4
LT
77}
78
c525aadd 79static ssize_t sysfs_kf_bin_read(struct kernfs_open_file *of, char *buf,
c2b19daf 80 size_t count, loff_t pos)
2f0c6b75 81{
324a56e1 82 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 83 struct kobject *kobj = of->kn->parent->priv;
c2b19daf 84 loff_t size = file_inode(of->file)->i_size;
2f0c6b75 85
c2b19daf 86 if (!count)
2f0c6b75
TH
87 return 0;
88
89 if (size) {
eaa5cd92 90 if (pos >= size)
2f0c6b75 91 return 0;
c2b19daf
TH
92 if (pos + count > size)
93 count = size - pos;
2f0c6b75
TH
94 }
95
c2b19daf
TH
96 if (!battr->read)
97 return -EIO;
98
99 return battr->read(of->file, kobj, battr, buf, pos, count);
100}
101
4ef67a8c
N
102/* kernfs read callback for regular sysfs files with pre-alloc */
103static ssize_t sysfs_kf_read(struct kernfs_open_file *of, char *buf,
104 size_t count, loff_t pos)
105{
106 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
107 struct kobject *kobj = of->kn->parent->priv;
c8a139d0 108 ssize_t len;
4ef67a8c
N
109
110 /*
111 * If buf != of->prealloc_buf, we don't know how
112 * large it is, so cannot safely pass it to ->show
113 */
17d0774f 114 if (WARN_ON_ONCE(buf != of->prealloc_buf))
4ef67a8c 115 return 0;
65da3484 116 len = ops->show(kobj, of->kn->priv, buf);
c8a139d0
N
117 if (len < 0)
118 return len;
17d0774f
KK
119 if (pos) {
120 if (len <= pos)
121 return 0;
122 len -= pos;
123 memmove(buf, buf + pos, len);
124 }
c8a139d0 125 return min_t(ssize_t, count, len);
4ef67a8c
N
126}
127
50b38ca0 128/* kernfs write callback for regular sysfs files */
c525aadd 129static ssize_t sysfs_kf_write(struct kernfs_open_file *of, char *buf,
50b38ca0 130 size_t count, loff_t pos)
1da177e4 131{
324a56e1 132 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
adc5e8b5 133 struct kobject *kobj = of->kn->parent->priv;
0ab66088 134
50b38ca0
TH
135 if (!count)
136 return 0;
0ab66088 137
324a56e1 138 return ops->store(kobj, of->kn->priv, buf, count);
50b38ca0 139}
f9b9a621 140
50b38ca0 141/* kernfs write callback for bin sysfs files */
c525aadd 142static ssize_t sysfs_kf_bin_write(struct kernfs_open_file *of, char *buf,
50b38ca0
TH
143 size_t count, loff_t pos)
144{
324a56e1 145 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 146 struct kobject *kobj = of->kn->parent->priv;
50b38ca0 147 loff_t size = file_inode(of->file)->i_size;
f9b9a621 148
50b38ca0
TH
149 if (size) {
150 if (size <= pos)
09368960 151 return -EFBIG;
50b38ca0 152 count = min_t(ssize_t, count, size - pos);
f9b9a621 153 }
50b38ca0
TH
154 if (!count)
155 return 0;
0ab66088 156
50b38ca0
TH
157 if (!battr->write)
158 return -EIO;
1da177e4 159
50b38ca0 160 return battr->write(of->file, kobj, battr, buf, pos, count);
1da177e4
LT
161}
162
c525aadd 163static int sysfs_kf_bin_mmap(struct kernfs_open_file *of,
fdbffaa4
TH
164 struct vm_area_struct *vma)
165{
324a56e1 166 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 167 struct kobject *kobj = of->kn->parent->priv;
fdbffaa4 168
fdbffaa4
TH
169 return battr->mmap(of->file, kobj, battr, vma);
170}
171
324a56e1 172void sysfs_notify(struct kobject *kobj, const char *dir, const char *attr)
4508a7a7 173{
324a56e1 174 struct kernfs_node *kn = kobj->sd, *tmp;
51225039 175
324a56e1
TH
176 if (kn && dir)
177 kn = kernfs_find_and_get(kn, dir);
024f6471 178 else
324a56e1 179 kernfs_get(kn);
024f6471 180
324a56e1
TH
181 if (kn && attr) {
182 tmp = kernfs_find_and_get(kn, attr);
183 kernfs_put(kn);
184 kn = tmp;
024f6471 185 }
51225039 186
324a56e1
TH
187 if (kn) {
188 kernfs_notify(kn);
189 kernfs_put(kn);
024f6471 190 }
4508a7a7
N
191}
192EXPORT_SYMBOL_GPL(sysfs_notify);
193
f6acf8bb
TH
194static const struct kernfs_ops sysfs_file_kfops_empty = {
195};
196
197static const struct kernfs_ops sysfs_file_kfops_ro = {
198 .seq_show = sysfs_kf_seq_show,
199};
200
201static const struct kernfs_ops sysfs_file_kfops_wo = {
202 .write = sysfs_kf_write,
203};
204
205static const struct kernfs_ops sysfs_file_kfops_rw = {
206 .seq_show = sysfs_kf_seq_show,
207 .write = sysfs_kf_write,
208};
209
4ef67a8c
N
210static const struct kernfs_ops sysfs_prealloc_kfops_ro = {
211 .read = sysfs_kf_read,
212 .prealloc = true,
213};
214
2b75869b
N
215static const struct kernfs_ops sysfs_prealloc_kfops_wo = {
216 .write = sysfs_kf_write,
217 .prealloc = true,
218};
219
220static const struct kernfs_ops sysfs_prealloc_kfops_rw = {
4ef67a8c 221 .read = sysfs_kf_read,
2b75869b
N
222 .write = sysfs_kf_write,
223 .prealloc = true,
224};
225
f6acf8bb
TH
226static const struct kernfs_ops sysfs_bin_kfops_ro = {
227 .read = sysfs_kf_bin_read,
228};
229
230static const struct kernfs_ops sysfs_bin_kfops_wo = {
231 .write = sysfs_kf_bin_write,
232};
233
234static const struct kernfs_ops sysfs_bin_kfops_rw = {
235 .read = sysfs_kf_bin_read,
236 .write = sysfs_kf_bin_write,
9b2db6e1
TH
237};
238
239static const struct kernfs_ops sysfs_bin_kfops_mmap = {
240 .read = sysfs_kf_bin_read,
241 .write = sysfs_kf_bin_write,
f6acf8bb
TH
242 .mmap = sysfs_kf_bin_mmap,
243};
244
324a56e1 245int sysfs_add_file_mode_ns(struct kernfs_node *parent,
a7dc66df 246 const struct attribute *attr, bool is_bin,
5f81880d 247 umode_t mode, kuid_t uid, kgid_t gid, const void *ns)
1da177e4 248{
517e64f5 249 struct lock_class_key *key = NULL;
f6acf8bb 250 const struct kernfs_ops *ops;
324a56e1 251 struct kernfs_node *kn;
471bd7b7 252 loff_t size;
1da177e4 253
a7dc66df 254 if (!is_bin) {
324a56e1 255 struct kobject *kobj = parent->priv;
f6acf8bb
TH
256 const struct sysfs_ops *sysfs_ops = kobj->ktype->sysfs_ops;
257
258 /* every kobject with an attribute needs a ktype assigned */
259 if (WARN(!sysfs_ops, KERN_ERR
260 "missing sysfs attribute operations for kobject: %s\n",
261 kobject_name(kobj)))
262 return -EINVAL;
263
2b75869b
N
264 if (sysfs_ops->show && sysfs_ops->store) {
265 if (mode & SYSFS_PREALLOC)
266 ops = &sysfs_prealloc_kfops_rw;
267 else
268 ops = &sysfs_file_kfops_rw;
4ef67a8c
N
269 } else if (sysfs_ops->show) {
270 if (mode & SYSFS_PREALLOC)
271 ops = &sysfs_prealloc_kfops_ro;
272 else
273 ops = &sysfs_file_kfops_ro;
274 } else if (sysfs_ops->store) {
2b75869b
N
275 if (mode & SYSFS_PREALLOC)
276 ops = &sysfs_prealloc_kfops_wo;
277 else
278 ops = &sysfs_file_kfops_wo;
279 } else
f6acf8bb 280 ops = &sysfs_file_kfops_empty;
471bd7b7
TH
281
282 size = PAGE_SIZE;
f6acf8bb
TH
283 } else {
284 struct bin_attribute *battr = (void *)attr;
285
9b2db6e1
TH
286 if (battr->mmap)
287 ops = &sysfs_bin_kfops_mmap;
288 else if (battr->read && battr->write)
f6acf8bb
TH
289 ops = &sysfs_bin_kfops_rw;
290 else if (battr->read)
291 ops = &sysfs_bin_kfops_ro;
292 else if (battr->write)
293 ops = &sysfs_bin_kfops_wo;
294 else
295 ops = &sysfs_file_kfops_empty;
471bd7b7
TH
296
297 size = battr->size;
f6acf8bb
TH
298 }
299
517e64f5
TH
300#ifdef CONFIG_DEBUG_LOCK_ALLOC
301 if (!attr->ignore_lockdep)
302 key = attr->key ?: (struct lock_class_key *)&attr->skey;
303#endif
5f81880d
DT
304
305 kn = __kernfs_create_file(parent, attr->name, mode & 0777, uid, gid,
488dee96 306 size, ops, (void *)attr, ns, key);
324a56e1
TH
307 if (IS_ERR(kn)) {
308 if (PTR_ERR(kn) == -EEXIST)
309 sysfs_warn_dup(parent, attr->name);
310 return PTR_ERR(kn);
496f7394
TH
311 }
312 return 0;
313}
314
1da177e4 315/**
58292cbe
TH
316 * sysfs_create_file_ns - create an attribute file for an object with custom ns
317 * @kobj: object we're creating for
318 * @attr: attribute descriptor
319 * @ns: namespace the new file should belong to
1da177e4 320 */
58292cbe
TH
321int sysfs_create_file_ns(struct kobject *kobj, const struct attribute *attr,
322 const void *ns)
1da177e4 323{
5f81880d
DT
324 kuid_t uid;
325 kgid_t gid;
326
de96e9fe
GKH
327 if (WARN_ON(!kobj || !kobj->sd || !attr))
328 return -EINVAL;
1da177e4 329
5f81880d
DT
330 kobject_get_ownership(kobj, &uid, &gid);
331 return sysfs_add_file_mode_ns(kobj->sd, attr, false, attr->mode,
332 uid, gid, ns);
1da177e4
LT
333
334}
58292cbe 335EXPORT_SYMBOL_GPL(sysfs_create_file_ns);
1da177e4 336
9ee4685c 337int sysfs_create_files(struct kobject *kobj, const struct attribute * const *ptr)
1c205ae1
AK
338{
339 int err = 0;
340 int i;
341
342 for (i = 0; ptr[i] && !err; i++)
343 err = sysfs_create_file(kobj, ptr[i]);
344 if (err)
345 while (--i >= 0)
346 sysfs_remove_file(kobj, ptr[i]);
347 return err;
348}
1b866757 349EXPORT_SYMBOL_GPL(sysfs_create_files);
1da177e4 350
dfa87c82
AS
351/**
352 * sysfs_add_file_to_group - add an attribute file to a pre-existing group.
353 * @kobj: object we're acting for.
354 * @attr: attribute descriptor.
355 * @group: group name.
356 */
357int sysfs_add_file_to_group(struct kobject *kobj,
358 const struct attribute *attr, const char *group)
359{
324a56e1 360 struct kernfs_node *parent;
5f81880d
DT
361 kuid_t uid;
362 kgid_t gid;
dfa87c82
AS
363 int error;
364
ccf73cf3 365 if (group) {
324a56e1 366 parent = kernfs_find_and_get(kobj->sd, group);
ccf73cf3 367 } else {
324a56e1
TH
368 parent = kobj->sd;
369 kernfs_get(parent);
ccf73cf3 370 }
11f24fbd 371
324a56e1 372 if (!parent)
608e266a
TH
373 return -ENOENT;
374
5f81880d 375 kobject_get_ownership(kobj, &uid, &gid);
d1753390 376 error = sysfs_add_file_mode_ns(parent, attr, false,
5f81880d 377 attr->mode, uid, gid, NULL);
324a56e1 378 kernfs_put(parent);
608e266a 379
dfa87c82
AS
380 return error;
381}
382EXPORT_SYMBOL_GPL(sysfs_add_file_to_group);
383
31e5abe9
KS
384/**
385 * sysfs_chmod_file - update the modified mode value on an object attribute.
386 * @kobj: object we're acting for.
387 * @attr: attribute descriptor.
388 * @mode: file permissions.
389 *
390 */
49c19400 391int sysfs_chmod_file(struct kobject *kobj, const struct attribute *attr,
48176a97 392 umode_t mode)
31e5abe9 393{
324a56e1 394 struct kernfs_node *kn;
bc062b1b 395 struct iattr newattrs;
51225039
TH
396 int rc;
397
324a56e1
TH
398 kn = kernfs_find_and_get(kobj->sd, attr->name);
399 if (!kn)
5d60418e 400 return -ENOENT;
f88123ea 401
adc5e8b5 402 newattrs.ia_mode = (mode & S_IALLUGO) | (kn->mode & ~S_IALLUGO);
4c6974f5 403 newattrs.ia_valid = ATTR_MODE;
f88123ea 404
324a56e1 405 rc = kernfs_setattr(kn, &newattrs);
5d60418e 406
324a56e1 407 kernfs_put(kn);
51225039 408 return rc;
31e5abe9
KS
409}
410EXPORT_SYMBOL_GPL(sysfs_chmod_file);
411
2afc9166
BVA
412/**
413 * sysfs_break_active_protection - break "active" protection
414 * @kobj: The kernel object @attr is associated with.
415 * @attr: The attribute to break the "active" protection for.
416 *
417 * With sysfs, just like kernfs, deletion of an attribute is postponed until
418 * all active .show() and .store() callbacks have finished unless this function
419 * is called. Hence this function is useful in methods that implement self
420 * deletion.
421 */
422struct kernfs_node *sysfs_break_active_protection(struct kobject *kobj,
423 const struct attribute *attr)
424{
425 struct kernfs_node *kn;
426
427 kobject_get(kobj);
428 kn = kernfs_find_and_get(kobj->sd, attr->name);
429 if (kn)
430 kernfs_break_active_protection(kn);
431 return kn;
432}
433EXPORT_SYMBOL_GPL(sysfs_break_active_protection);
434
435/**
436 * sysfs_unbreak_active_protection - restore "active" protection
437 * @kn: Pointer returned by sysfs_break_active_protection().
438 *
439 * Undo the effects of sysfs_break_active_protection(). Since this function
440 * calls kernfs_put() on the kernfs node that corresponds to the 'attr'
441 * argument passed to sysfs_break_active_protection() that attribute may have
442 * been removed between the sysfs_break_active_protection() and
443 * sysfs_unbreak_active_protection() calls, it is not safe to access @kn after
444 * this function has returned.
445 */
446void sysfs_unbreak_active_protection(struct kernfs_node *kn)
447{
448 struct kobject *kobj = kn->parent->priv;
449
450 kernfs_unbreak_active_protection(kn);
451 kernfs_put(kn);
452 kobject_put(kobj);
453}
454EXPORT_SYMBOL_GPL(sysfs_unbreak_active_protection);
455
1da177e4 456/**
58292cbe
TH
457 * sysfs_remove_file_ns - remove an object attribute with a custom ns tag
458 * @kobj: object we're acting for
459 * @attr: attribute descriptor
460 * @ns: namespace tag of the file to remove
1da177e4 461 *
58292cbe 462 * Hash the attribute name and namespace tag and kill the victim.
1da177e4 463 */
58292cbe
TH
464void sysfs_remove_file_ns(struct kobject *kobj, const struct attribute *attr,
465 const void *ns)
1da177e4 466{
324a56e1 467 struct kernfs_node *parent = kobj->sd;
487505c2 468
324a56e1 469 kernfs_remove_by_name_ns(parent, attr->name, ns);
1da177e4 470}
58292cbe 471EXPORT_SYMBOL_GPL(sysfs_remove_file_ns);
1da177e4 472
6b0afc2a
TH
473/**
474 * sysfs_remove_file_self - remove an object attribute from its own method
475 * @kobj: object we're acting for
476 * @attr: attribute descriptor
477 *
478 * See kernfs_remove_self() for details.
479 */
480bool sysfs_remove_file_self(struct kobject *kobj, const struct attribute *attr)
481{
482 struct kernfs_node *parent = kobj->sd;
483 struct kernfs_node *kn;
484 bool ret;
485
486 kn = kernfs_find_and_get(parent, attr->name);
487 if (WARN_ON_ONCE(!kn))
488 return false;
489
490 ret = kernfs_remove_self(kn);
491
492 kernfs_put(kn);
493 return ret;
494}
495
9ee4685c 496void sysfs_remove_files(struct kobject *kobj, const struct attribute * const *ptr)
1c205ae1
AK
497{
498 int i;
4bd4e92c 499
1c205ae1
AK
500 for (i = 0; ptr[i]; i++)
501 sysfs_remove_file(kobj, ptr[i]);
502}
1b866757 503EXPORT_SYMBOL_GPL(sysfs_remove_files);
1da177e4 504
dfa87c82
AS
505/**
506 * sysfs_remove_file_from_group - remove an attribute file from a group.
507 * @kobj: object we're acting for.
508 * @attr: attribute descriptor.
509 * @group: group name.
510 */
511void sysfs_remove_file_from_group(struct kobject *kobj,
512 const struct attribute *attr, const char *group)
513{
324a56e1 514 struct kernfs_node *parent;
dfa87c82 515
ccf73cf3 516 if (group) {
324a56e1 517 parent = kernfs_find_and_get(kobj->sd, group);
ccf73cf3 518 } else {
324a56e1
TH
519 parent = kobj->sd;
520 kernfs_get(parent);
ccf73cf3
TH
521 }
522
324a56e1
TH
523 if (parent) {
524 kernfs_remove_by_name(parent, attr->name);
525 kernfs_put(parent);
dfa87c82
AS
526 }
527}
528EXPORT_SYMBOL_GPL(sysfs_remove_file_from_group);
529
3124eb16
TH
530/**
531 * sysfs_create_bin_file - create binary file for object.
532 * @kobj: object.
533 * @attr: attribute descriptor.
534 */
535int sysfs_create_bin_file(struct kobject *kobj,
536 const struct bin_attribute *attr)
537{
5f81880d
DT
538 kuid_t uid;
539 kgid_t gid;
540
de96e9fe
GKH
541 if (WARN_ON(!kobj || !kobj->sd || !attr))
542 return -EINVAL;
3124eb16 543
5f81880d
DT
544 kobject_get_ownership(kobj, &uid, &gid);
545 return sysfs_add_file_mode_ns(kobj->sd, &attr->attr, true,
546 attr->attr.mode, uid, gid, NULL);
3124eb16
TH
547}
548EXPORT_SYMBOL_GPL(sysfs_create_bin_file);
549
550/**
551 * sysfs_remove_bin_file - remove binary file for object.
552 * @kobj: object.
553 * @attr: attribute descriptor.
554 */
555void sysfs_remove_bin_file(struct kobject *kobj,
556 const struct bin_attribute *attr)
557{
879f40d1 558 kernfs_remove_by_name(kobj->sd, attr->attr.name);
3124eb16
TH
559}
560EXPORT_SYMBOL_GPL(sysfs_remove_bin_file);