Blame view
fs/kernfs/dir.c
42.5 KB
55716d264 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
b8441ed27 sysfs, kernfs: ad... |
2 3 4 5 6 7 |
/* * fs/kernfs/dir.c - kernfs directory implementation * * Copyright (c) 2001-3 Patrick Mochel * Copyright (c) 2007 SUSE Linux Products GmbH * Copyright (c) 2007, 2013 Tejun Heo <tj@kernel.org> |
b8441ed27 sysfs, kernfs: ad... |
8 |
*/ |
fd7b9f7b9 sysfs, kernfs: mo... |
9 |
|
abd54f028 kernfs: replace k... |
10 |
#include <linux/sched.h> |
fd7b9f7b9 sysfs, kernfs: mo... |
11 12 13 14 15 16 17 18 |
#include <linux/fs.h> #include <linux/namei.h> #include <linux/idr.h> #include <linux/slab.h> #include <linux/security.h> #include <linux/hash.h> #include "kernfs-internal.h" |
a797bfc30 kernfs: s/sysfs/k... |
19 |
DEFINE_MUTEX(kernfs_mutex); |
3eef34ad7 kernfs: implement... |
20 21 |
static DEFINE_SPINLOCK(kernfs_rename_lock); /* kn->parent and ->name */ static char kernfs_pr_cont_buf[PATH_MAX]; /* protected by rename_lock */ |
7d35079f8 kernfs: use idr i... |
22 |
static DEFINE_SPINLOCK(kernfs_idr_lock); /* root->ino_idr */ |
fd7b9f7b9 sysfs, kernfs: mo... |
23 |
|
adc5e8b58 kernfs: drop s_ p... |
24 |
#define rb_to_kn(X) rb_entry((X), struct kernfs_node, rb) |
fd7b9f7b9 sysfs, kernfs: mo... |
25 |
|
81c173cb5 kernfs: remove KE... |
26 27 28 29 30 |
static bool kernfs_active(struct kernfs_node *kn) { lockdep_assert_held(&kernfs_mutex); return atomic_read(&kn->active) >= 0; } |
182fd64b6 kernfs: remove KE... |
31 32 33 34 35 36 37 38 |
static bool kernfs_lockdep(struct kernfs_node *kn) { #ifdef CONFIG_DEBUG_LOCK_ALLOC return kn->flags & KERNFS_LOCKDEP; #else return false; #endif } |
3eef34ad7 kernfs: implement... |
39 40 |
static int kernfs_name_locked(struct kernfs_node *kn, char *buf, size_t buflen) { |
17627157c kernfs: handle nu... |
41 42 |
if (!kn) return strlcpy(buf, "(null)", buflen); |
3eef34ad7 kernfs: implement... |
43 44 |
return strlcpy(buf, kn->parent ? kn->name : "/", buflen); } |
9f6df573a kernfs: Add API t... |
45 46 |
/* kernfs_node_depth - compute depth from @from to @to */ static size_t kernfs_depth(struct kernfs_node *from, struct kernfs_node *to) |
3eef34ad7 kernfs: implement... |
47 |
{ |
9f6df573a kernfs: Add API t... |
48 |
size_t depth = 0; |
3eef34ad7 kernfs: implement... |
49 |
|
9f6df573a kernfs: Add API t... |
50 51 52 53 54 55 |
while (to->parent && to != from) { depth++; to = to->parent; } return depth; } |
3eef34ad7 kernfs: implement... |
56 |
|
9f6df573a kernfs: Add API t... |
57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 |
static struct kernfs_node *kernfs_common_ancestor(struct kernfs_node *a, struct kernfs_node *b) { size_t da, db; struct kernfs_root *ra = kernfs_root(a), *rb = kernfs_root(b); if (ra != rb) return NULL; da = kernfs_depth(ra->kn, a); db = kernfs_depth(rb->kn, b); while (da > db) { a = a->parent; da--; } while (db > da) { b = b->parent; db--; } /* worst case b and a will be the same at root */ while (b != a) { b = b->parent; a = a->parent; } return a; } /** * kernfs_path_from_node_locked - find a pseudo-absolute path to @kn_to, * where kn_from is treated as root of the path. * @kn_from: kernfs node which should be treated as root for the path * @kn_to: kernfs node to which path is needed * @buf: buffer to copy the path into * @buflen: size of @buf * * We need to handle couple of scenarios here: * [1] when @kn_from is an ancestor of @kn_to at some level * kn_from: /n1/n2/n3 * kn_to: /n1/n2/n3/n4/n5 * result: /n4/n5 * * [2] when @kn_from is on a different hierarchy and we need to find common * ancestor between @kn_from and @kn_to. * kn_from: /n1/n2/n3/n4 * kn_to: /n1/n2/n5 * result: /../../n5 * OR * kn_from: /n1/n2/n3/n4/n5 [depth=5] * kn_to: /n1/n2/n3 [depth=3] * result: /../.. * |
17627157c kernfs: handle nu... |
111 112 |
* [3] when @kn_to is NULL result will be "(null)" * |
3abb1d90f kernfs: make kern... |
113 114 115 |
* Returns the length of the full path. If the full length is equal to or * greater than @buflen, @buf contains the truncated path with the trailing * '\0'. On error, -errno is returned. |
9f6df573a kernfs: Add API t... |
116 117 118 119 120 121 122 |
*/ static int kernfs_path_from_node_locked(struct kernfs_node *kn_to, struct kernfs_node *kn_from, char *buf, size_t buflen) { struct kernfs_node *kn, *common; const char parent_str[] = "/.."; |
3abb1d90f kernfs: make kern... |
123 124 |
size_t depth_from, depth_to, len = 0; int i, j; |
9f6df573a kernfs: Add API t... |
125 |
|
17627157c kernfs: handle nu... |
126 127 |
if (!kn_to) return strlcpy(buf, "(null)", buflen); |
9f6df573a kernfs: Add API t... |
128 129 130 131 132 |
if (!kn_from) kn_from = kernfs_root(kn_to)->kn; if (kn_from == kn_to) return strlcpy(buf, "/", buflen); |
bbe70e4e4 fs: kernfs: Fix p... |
133 134 |
if (!buf) return -EINVAL; |
9f6df573a kernfs: Add API t... |
135 136 |
common = kernfs_common_ancestor(kn_from, kn_to); if (WARN_ON(!common)) |
3abb1d90f kernfs: make kern... |
137 |
return -EINVAL; |
9f6df573a kernfs: Add API t... |
138 139 140 |
depth_to = kernfs_depth(common, kn_to); depth_from = kernfs_depth(common, kn_from); |
bbe70e4e4 fs: kernfs: Fix p... |
141 |
buf[0] = '\0'; |
9f6df573a kernfs: Add API t... |
142 143 144 145 146 147 |
for (i = 0; i < depth_from; i++) len += strlcpy(buf + len, parent_str, len < buflen ? buflen - len : 0); /* Calculate how many bytes we need for the rest */ |
3abb1d90f kernfs: make kern... |
148 149 150 151 152 153 154 |
for (i = depth_to - 1; i >= 0; i--) { for (kn = kn_to, j = 0; j < i; j++) kn = kn->parent; len += strlcpy(buf + len, "/", len < buflen ? buflen - len : 0); len += strlcpy(buf + len, kn->name, len < buflen ? buflen - len : 0); |
9f6df573a kernfs: Add API t... |
155 |
} |
3eef34ad7 kernfs: implement... |
156 |
|
3abb1d90f kernfs: make kern... |
157 |
return len; |
3eef34ad7 kernfs: implement... |
158 159 160 161 162 163 164 165 166 167 168 169 |
} /** * kernfs_name - obtain the name of a given node * @kn: kernfs_node of interest * @buf: buffer to copy @kn's name into * @buflen: size of @buf * * Copies the name of @kn into @buf of @buflen bytes. The behavior is * similar to strlcpy(). It returns the length of @kn's name and if @buf * isn't long enough, it's filled upto @buflen-1 and nul terminated. * |
17627157c kernfs: handle nu... |
170 171 |
* Fills buffer with "(null)" if @kn is NULL. * |
3eef34ad7 kernfs: implement... |
172 173 174 175 176 177 178 179 180 181 182 183 184 185 |
* This function can be called from any context. */ int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen) { unsigned long flags; int ret; spin_lock_irqsave(&kernfs_rename_lock, flags); ret = kernfs_name_locked(kn, buf, buflen); spin_unlock_irqrestore(&kernfs_rename_lock, flags); return ret; } /** |
9f6df573a kernfs: Add API t... |
186 187 188 189 190 191 192 193 194 195 196 |
* kernfs_path_from_node - build path of node @to relative to @from. * @from: parent kernfs_node relative to which we need to build the path * @to: kernfs_node of interest * @buf: buffer to copy @to's path into * @buflen: size of @buf * * Builds @to's path relative to @from in @buf. @from and @to must * be on the same kernfs-root. If @from is not parent of @to, then a relative * path (which includes '..'s) as needed to reach from @from to @to is * returned. * |
3abb1d90f kernfs: make kern... |
197 198 199 |
* Returns the length of the full path. If the full length is equal to or * greater than @buflen, @buf contains the truncated path with the trailing * '\0'. On error, -errno is returned. |
9f6df573a kernfs: Add API t... |
200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 |
*/ int kernfs_path_from_node(struct kernfs_node *to, struct kernfs_node *from, char *buf, size_t buflen) { unsigned long flags; int ret; spin_lock_irqsave(&kernfs_rename_lock, flags); ret = kernfs_path_from_node_locked(to, from, buf, buflen); spin_unlock_irqrestore(&kernfs_rename_lock, flags); return ret; } EXPORT_SYMBOL_GPL(kernfs_path_from_node); /** |
3eef34ad7 kernfs: implement... |
215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 |
* pr_cont_kernfs_name - pr_cont name of a kernfs_node * @kn: kernfs_node of interest * * This function can be called from any context. */ void pr_cont_kernfs_name(struct kernfs_node *kn) { unsigned long flags; spin_lock_irqsave(&kernfs_rename_lock, flags); kernfs_name_locked(kn, kernfs_pr_cont_buf, sizeof(kernfs_pr_cont_buf)); pr_cont("%s", kernfs_pr_cont_buf); spin_unlock_irqrestore(&kernfs_rename_lock, flags); } /** * pr_cont_kernfs_path - pr_cont path of a kernfs_node * @kn: kernfs_node of interest * * This function can be called from any context. */ void pr_cont_kernfs_path(struct kernfs_node *kn) { unsigned long flags; |
9f6df573a kernfs: Add API t... |
241 |
int sz; |
3eef34ad7 kernfs: implement... |
242 243 |
spin_lock_irqsave(&kernfs_rename_lock, flags); |
9f6df573a kernfs: Add API t... |
244 245 246 247 248 249 250 251 252 253 254 255 256 |
sz = kernfs_path_from_node_locked(kn, NULL, kernfs_pr_cont_buf, sizeof(kernfs_pr_cont_buf)); if (sz < 0) { pr_cont("(error)"); goto out; } if (sz >= sizeof(kernfs_pr_cont_buf)) { pr_cont("(name too long)"); goto out; } pr_cont("%s", kernfs_pr_cont_buf); |
3eef34ad7 kernfs: implement... |
257 |
|
9f6df573a kernfs: Add API t... |
258 |
out: |
3eef34ad7 kernfs: implement... |
259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 |
spin_unlock_irqrestore(&kernfs_rename_lock, flags); } /** * kernfs_get_parent - determine the parent node and pin it * @kn: kernfs_node of interest * * Determines @kn's parent, pins and returns it. This function can be * called from any context. */ struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn) { struct kernfs_node *parent; unsigned long flags; spin_lock_irqsave(&kernfs_rename_lock, flags); parent = kn->parent; kernfs_get(parent); spin_unlock_irqrestore(&kernfs_rename_lock, flags); return parent; } |
fd7b9f7b9 sysfs, kernfs: mo... |
281 |
/** |
c637b8acb kernfs: s/sysfs/k... |
282 |
* kernfs_name_hash |
fd7b9f7b9 sysfs, kernfs: mo... |
283 284 285 286 287 |
* @name: Null terminated string to hash * @ns: Namespace tag to hash * * Returns 31 bit hash of ns + name (so it fits in an off_t ) */ |
c637b8acb kernfs: s/sysfs/k... |
288 |
static unsigned int kernfs_name_hash(const char *name, const void *ns) |
fd7b9f7b9 sysfs, kernfs: mo... |
289 |
{ |
8387ff257 vfs: make the str... |
290 |
unsigned long hash = init_name_hash(ns); |
fd7b9f7b9 sysfs, kernfs: mo... |
291 292 293 |
unsigned int len = strlen(name); while (len--) hash = partial_name_hash(*name++, hash); |
8387ff257 vfs: make the str... |
294 |
hash = end_name_hash(hash); |
fd7b9f7b9 sysfs, kernfs: mo... |
295 296 |
hash &= 0x7fffffffU; /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */ |
88391d49a kernfs: fix off b... |
297 |
if (hash < 2) |
fd7b9f7b9 sysfs, kernfs: mo... |
298 299 300 301 302 |
hash += 2; if (hash >= INT_MAX) hash = INT_MAX - 1; return hash; } |
c637b8acb kernfs: s/sysfs/k... |
303 304 |
static int kernfs_name_compare(unsigned int hash, const char *name, const void *ns, const struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
305 |
{ |
72392ed0e kernfs: Fix kernf... |
306 307 308 309 310 311 312 313 |
if (hash < kn->hash) return -1; if (hash > kn->hash) return 1; if (ns < kn->ns) return -1; if (ns > kn->ns) return 1; |
adc5e8b58 kernfs: drop s_ p... |
314 |
return strcmp(name, kn->name); |
fd7b9f7b9 sysfs, kernfs: mo... |
315 |
} |
c637b8acb kernfs: s/sysfs/k... |
316 317 |
static int kernfs_sd_compare(const struct kernfs_node *left, const struct kernfs_node *right) |
fd7b9f7b9 sysfs, kernfs: mo... |
318 |
{ |
c637b8acb kernfs: s/sysfs/k... |
319 |
return kernfs_name_compare(left->hash, left->name, left->ns, right); |
fd7b9f7b9 sysfs, kernfs: mo... |
320 321 322 |
} /** |
c637b8acb kernfs: s/sysfs/k... |
323 |
* kernfs_link_sibling - link kernfs_node into sibling rbtree |
324a56e16 kernfs: s/sysfs_d... |
324 |
* @kn: kernfs_node of interest |
fd7b9f7b9 sysfs, kernfs: mo... |
325 |
* |
324a56e16 kernfs: s/sysfs_d... |
326 |
* Link @kn into its sibling rbtree which starts from |
adc5e8b58 kernfs: drop s_ p... |
327 |
* @kn->parent->dir.children. |
fd7b9f7b9 sysfs, kernfs: mo... |
328 329 |
* * Locking: |
a797bfc30 kernfs: s/sysfs/k... |
330 |
* mutex_lock(kernfs_mutex) |
fd7b9f7b9 sysfs, kernfs: mo... |
331 332 333 334 |
* * RETURNS: * 0 on susccess -EEXIST on failure. */ |
c637b8acb kernfs: s/sysfs/k... |
335 |
static int kernfs_link_sibling(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
336 |
{ |
adc5e8b58 kernfs: drop s_ p... |
337 |
struct rb_node **node = &kn->parent->dir.children.rb_node; |
fd7b9f7b9 sysfs, kernfs: mo... |
338 |
struct rb_node *parent = NULL; |
fd7b9f7b9 sysfs, kernfs: mo... |
339 |
while (*node) { |
324a56e16 kernfs: s/sysfs_d... |
340 |
struct kernfs_node *pos; |
fd7b9f7b9 sysfs, kernfs: mo... |
341 |
int result; |
324a56e16 kernfs: s/sysfs_d... |
342 |
pos = rb_to_kn(*node); |
fd7b9f7b9 sysfs, kernfs: mo... |
343 |
parent = *node; |
c637b8acb kernfs: s/sysfs/k... |
344 |
result = kernfs_sd_compare(kn, pos); |
fd7b9f7b9 sysfs, kernfs: mo... |
345 |
if (result < 0) |
adc5e8b58 kernfs: drop s_ p... |
346 |
node = &pos->rb.rb_left; |
fd7b9f7b9 sysfs, kernfs: mo... |
347 |
else if (result > 0) |
adc5e8b58 kernfs: drop s_ p... |
348 |
node = &pos->rb.rb_right; |
fd7b9f7b9 sysfs, kernfs: mo... |
349 350 351 |
else return -EEXIST; } |
c1befb885 kernfs: fix a sub... |
352 |
|
fd7b9f7b9 sysfs, kernfs: mo... |
353 |
/* add new node and rebalance the tree */ |
adc5e8b58 kernfs: drop s_ p... |
354 355 |
rb_link_node(&kn->rb, parent, node); rb_insert_color(&kn->rb, &kn->parent->dir.children); |
c1befb885 kernfs: fix a sub... |
356 357 358 359 |
/* successfully added, account subdir number */ if (kernfs_type(kn) == KERNFS_DIR) kn->parent->dir.subdirs++; |
fd7b9f7b9 sysfs, kernfs: mo... |
360 361 362 363 |
return 0; } /** |
c637b8acb kernfs: s/sysfs/k... |
364 |
* kernfs_unlink_sibling - unlink kernfs_node from sibling rbtree |
324a56e16 kernfs: s/sysfs_d... |
365 |
* @kn: kernfs_node of interest |
fd7b9f7b9 sysfs, kernfs: mo... |
366 |
* |
35beab063 kernfs: restructu... |
367 368 369 |
* Try to unlink @kn from its sibling rbtree which starts from * kn->parent->dir.children. Returns %true if @kn was actually * removed, %false if @kn wasn't on the rbtree. |
fd7b9f7b9 sysfs, kernfs: mo... |
370 371 |
* * Locking: |
a797bfc30 kernfs: s/sysfs/k... |
372 |
* mutex_lock(kernfs_mutex) |
fd7b9f7b9 sysfs, kernfs: mo... |
373 |
*/ |
35beab063 kernfs: restructu... |
374 |
static bool kernfs_unlink_sibling(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
375 |
{ |
35beab063 kernfs: restructu... |
376 377 |
if (RB_EMPTY_NODE(&kn->rb)) return false; |
df23fc39b kernfs: s/sysfs/k... |
378 |
if (kernfs_type(kn) == KERNFS_DIR) |
adc5e8b58 kernfs: drop s_ p... |
379 |
kn->parent->dir.subdirs--; |
fd7b9f7b9 sysfs, kernfs: mo... |
380 |
|
adc5e8b58 kernfs: drop s_ p... |
381 |
rb_erase(&kn->rb, &kn->parent->dir.children); |
35beab063 kernfs: restructu... |
382 383 |
RB_CLEAR_NODE(&kn->rb); return true; |
fd7b9f7b9 sysfs, kernfs: mo... |
384 385 386 |
} /** |
c637b8acb kernfs: s/sysfs/k... |
387 |
* kernfs_get_active - get an active reference to kernfs_node |
324a56e16 kernfs: s/sysfs_d... |
388 |
* @kn: kernfs_node to get an active reference to |
fd7b9f7b9 sysfs, kernfs: mo... |
389 |
* |
324a56e16 kernfs: s/sysfs_d... |
390 |
* Get an active reference of @kn. This function is noop if @kn |
fd7b9f7b9 sysfs, kernfs: mo... |
391 392 393 |
* is NULL. * * RETURNS: |
324a56e16 kernfs: s/sysfs_d... |
394 |
* Pointer to @kn on success, NULL on failure. |
fd7b9f7b9 sysfs, kernfs: mo... |
395 |
*/ |
c637b8acb kernfs: s/sysfs/k... |
396 |
struct kernfs_node *kernfs_get_active(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
397 |
{ |
324a56e16 kernfs: s/sysfs_d... |
398 |
if (unlikely(!kn)) |
fd7b9f7b9 sysfs, kernfs: mo... |
399 |
return NULL; |
f4b3e631b Revert "kernfs: m... |
400 401 |
if (!atomic_inc_unless_negative(&kn->active)) return NULL; |
895a068a5 kernfs: make kern... |
402 |
|
182fd64b6 kernfs: remove KE... |
403 |
if (kernfs_lockdep(kn)) |
f4b3e631b Revert "kernfs: m... |
404 405 |
rwsem_acquire_read(&kn->dep_map, 0, 1, _RET_IP_); return kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
406 407 408 |
} /** |
c637b8acb kernfs: s/sysfs/k... |
409 |
* kernfs_put_active - put an active reference to kernfs_node |
324a56e16 kernfs: s/sysfs_d... |
410 |
* @kn: kernfs_node to put an active reference to |
fd7b9f7b9 sysfs, kernfs: mo... |
411 |
* |
324a56e16 kernfs: s/sysfs_d... |
412 |
* Put an active reference to @kn. This function is noop if @kn |
fd7b9f7b9 sysfs, kernfs: mo... |
413 414 |
* is NULL. */ |
c637b8acb kernfs: s/sysfs/k... |
415 |
void kernfs_put_active(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
416 417 |
{ int v; |
324a56e16 kernfs: s/sysfs_d... |
418 |
if (unlikely(!kn)) |
fd7b9f7b9 sysfs, kernfs: mo... |
419 |
return; |
182fd64b6 kernfs: remove KE... |
420 |
if (kernfs_lockdep(kn)) |
5facae4f3 locking/lockdep: ... |
421 |
rwsem_release(&kn->dep_map, _RET_IP_); |
adc5e8b58 kernfs: drop s_ p... |
422 |
v = atomic_dec_return(&kn->active); |
df23fc39b kernfs: s/sysfs/k... |
423 |
if (likely(v != KN_DEACTIVATED_BIAS)) |
fd7b9f7b9 sysfs, kernfs: mo... |
424 |
return; |
2fd60da46 kernfs: fix poten... |
425 |
wake_up_all(&kernfs_root(kn)->deactivate_waitq); |
fd7b9f7b9 sysfs, kernfs: mo... |
426 427 428 |
} /** |
81c173cb5 kernfs: remove KE... |
429 430 |
* kernfs_drain - drain kernfs_node * @kn: kernfs_node to drain |
fd7b9f7b9 sysfs, kernfs: mo... |
431 |
* |
81c173cb5 kernfs: remove KE... |
432 433 434 |
* Drain existing usages and nuke all existing mmaps of @kn. Mutiple * removers may invoke this function concurrently on @kn and all will * return after draining is complete. |
fd7b9f7b9 sysfs, kernfs: mo... |
435 |
*/ |
81c173cb5 kernfs: remove KE... |
436 |
static void kernfs_drain(struct kernfs_node *kn) |
35beab063 kernfs: restructu... |
437 |
__releases(&kernfs_mutex) __acquires(&kernfs_mutex) |
fd7b9f7b9 sysfs, kernfs: mo... |
438 |
{ |
abd54f028 kernfs: replace k... |
439 |
struct kernfs_root *root = kernfs_root(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
440 |
|
35beab063 kernfs: restructu... |
441 |
lockdep_assert_held(&kernfs_mutex); |
81c173cb5 kernfs: remove KE... |
442 |
WARN_ON_ONCE(kernfs_active(kn)); |
ea1c472df kernfs: replace k... |
443 |
|
35beab063 kernfs: restructu... |
444 |
mutex_unlock(&kernfs_mutex); |
abd54f028 kernfs: replace k... |
445 |
|
182fd64b6 kernfs: remove KE... |
446 |
if (kernfs_lockdep(kn)) { |
35beab063 kernfs: restructu... |
447 448 449 450 |
rwsem_acquire(&kn->dep_map, 0, 0, _RET_IP_); if (atomic_read(&kn->active) != KN_DEACTIVATED_BIAS) lock_contended(&kn->dep_map, _RET_IP_); } |
abd54f028 kernfs: replace k... |
451 |
|
35beab063 kernfs: restructu... |
452 |
/* but everyone should wait for draining */ |
abd54f028 kernfs: replace k... |
453 454 |
wait_event(root->deactivate_waitq, atomic_read(&kn->active) == KN_DEACTIVATED_BIAS); |
fd7b9f7b9 sysfs, kernfs: mo... |
455 |
|
182fd64b6 kernfs: remove KE... |
456 |
if (kernfs_lockdep(kn)) { |
a6607930b kernfs: make kern... |
457 |
lock_acquired(&kn->dep_map, _RET_IP_); |
5facae4f3 locking/lockdep: ... |
458 |
rwsem_release(&kn->dep_map, _RET_IP_); |
a6607930b kernfs: make kern... |
459 |
} |
35beab063 kernfs: restructu... |
460 |
|
0e67db2f9 kernfs: add kernf... |
461 |
kernfs_drain_open_files(kn); |
ccf02aaf8 kernfs: invoke ke... |
462 |
|
35beab063 kernfs: restructu... |
463 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
464 |
} |
fd7b9f7b9 sysfs, kernfs: mo... |
465 |
/** |
324a56e16 kernfs: s/sysfs_d... |
466 467 |
* kernfs_get - get a reference count on a kernfs_node * @kn: the target kernfs_node |
fd7b9f7b9 sysfs, kernfs: mo... |
468 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
469 |
void kernfs_get(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
470 |
{ |
324a56e16 kernfs: s/sysfs_d... |
471 |
if (kn) { |
adc5e8b58 kernfs: drop s_ p... |
472 473 |
WARN_ON(!atomic_read(&kn->count)); atomic_inc(&kn->count); |
fd7b9f7b9 sysfs, kernfs: mo... |
474 475 476 477 478 |
} } EXPORT_SYMBOL_GPL(kernfs_get); /** |
324a56e16 kernfs: s/sysfs_d... |
479 480 |
* kernfs_put - put a reference count on a kernfs_node * @kn: the target kernfs_node |
fd7b9f7b9 sysfs, kernfs: mo... |
481 |
* |
324a56e16 kernfs: s/sysfs_d... |
482 |
* Put a reference count of @kn and destroy it if it reached zero. |
fd7b9f7b9 sysfs, kernfs: mo... |
483 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
484 |
void kernfs_put(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
485 |
{ |
324a56e16 kernfs: s/sysfs_d... |
486 |
struct kernfs_node *parent; |
ba7443bc6 sysfs, kernfs: im... |
487 |
struct kernfs_root *root; |
fd7b9f7b9 sysfs, kernfs: mo... |
488 |
|
adc5e8b58 kernfs: drop s_ p... |
489 |
if (!kn || !atomic_dec_and_test(&kn->count)) |
fd7b9f7b9 sysfs, kernfs: mo... |
490 |
return; |
324a56e16 kernfs: s/sysfs_d... |
491 |
root = kernfs_root(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
492 |
repeat: |
81c173cb5 kernfs: remove KE... |
493 494 |
/* * Moving/renaming is always done while holding reference. |
adc5e8b58 kernfs: drop s_ p... |
495 |
* kn->parent won't change beneath us. |
fd7b9f7b9 sysfs, kernfs: mo... |
496 |
*/ |
adc5e8b58 kernfs: drop s_ p... |
497 |
parent = kn->parent; |
fd7b9f7b9 sysfs, kernfs: mo... |
498 |
|
81c173cb5 kernfs: remove KE... |
499 500 501 502 |
WARN_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS, "kernfs_put: %s/%s: released with incorrect active_ref %d ", parent ? parent->name : "", kn->name, atomic_read(&kn->active)); |
324a56e16 kernfs: s/sysfs_d... |
503 |
|
df23fc39b kernfs: s/sysfs/k... |
504 |
if (kernfs_type(kn) == KERNFS_LINK) |
adc5e8b58 kernfs: drop s_ p... |
505 |
kernfs_put(kn->symlink.target_kn); |
dfeb0750b kernfs: remove KE... |
506 507 |
kfree_const(kn->name); |
adc5e8b58 kernfs: drop s_ p... |
508 |
if (kn->iattr) { |
adc5e8b58 kernfs: drop s_ p... |
509 |
simple_xattrs_free(&kn->iattr->xattrs); |
26e28d68b kernfs: Allocatin... |
510 |
kmem_cache_free(kernfs_iattrs_cache, kn->iattr); |
2322392b0 kernfs: implement... |
511 |
} |
7d35079f8 kernfs: use idr i... |
512 |
spin_lock(&kernfs_idr_lock); |
40430452f kernfs: use 64bit... |
513 |
idr_remove(&root->ino_idr, (u32)kernfs_ino(kn)); |
7d35079f8 kernfs: use idr i... |
514 |
spin_unlock(&kernfs_idr_lock); |
a797bfc30 kernfs: s/sysfs/k... |
515 |
kmem_cache_free(kernfs_node_cache, kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
516 |
|
324a56e16 kernfs: s/sysfs_d... |
517 518 |
kn = parent; if (kn) { |
adc5e8b58 kernfs: drop s_ p... |
519 |
if (atomic_dec_and_test(&kn->count)) |
ba7443bc6 sysfs, kernfs: im... |
520 521 |
goto repeat; } else { |
324a56e16 kernfs: s/sysfs_d... |
522 |
/* just released the root kn, free @root too */ |
7d35079f8 kernfs: use idr i... |
523 |
idr_destroy(&root->ino_idr); |
ba7443bc6 sysfs, kernfs: im... |
524 525 |
kfree(root); } |
fd7b9f7b9 sysfs, kernfs: mo... |
526 527 |
} EXPORT_SYMBOL_GPL(kernfs_put); |
c637b8acb kernfs: s/sysfs/k... |
528 |
static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags) |
fd7b9f7b9 sysfs, kernfs: mo... |
529 |
{ |
324a56e16 kernfs: s/sysfs_d... |
530 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
531 532 533 |
if (flags & LOOKUP_RCU) return -ECHILD; |
19bbb9262 kernfs: allow neg... |
534 |
/* Always perform fresh lookup for negatives */ |
2b0143b5c VFS: normal files... |
535 |
if (d_really_is_negative(dentry)) |
19bbb9262 kernfs: allow neg... |
536 |
goto out_bad_unlocked; |
319ba91d3 kernfs: don't set... |
537 |
kn = kernfs_dentry_node(dentry); |
a797bfc30 kernfs: s/sysfs/k... |
538 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
539 |
|
81c173cb5 kernfs: remove KE... |
540 541 |
/* The kernfs node has been deactivated */ if (!kernfs_active(kn)) |
fd7b9f7b9 sysfs, kernfs: mo... |
542 |
goto out_bad; |
c637b8acb kernfs: s/sysfs/k... |
543 |
/* The kernfs node has been moved? */ |
319ba91d3 kernfs: don't set... |
544 |
if (kernfs_dentry_node(dentry->d_parent) != kn->parent) |
fd7b9f7b9 sysfs, kernfs: mo... |
545 |
goto out_bad; |
c637b8acb kernfs: s/sysfs/k... |
546 |
/* The kernfs node has been renamed */ |
adc5e8b58 kernfs: drop s_ p... |
547 |
if (strcmp(dentry->d_name.name, kn->name) != 0) |
fd7b9f7b9 sysfs, kernfs: mo... |
548 |
goto out_bad; |
c637b8acb kernfs: s/sysfs/k... |
549 |
/* The kernfs node has been moved to a different namespace */ |
adc5e8b58 kernfs: drop s_ p... |
550 |
if (kn->parent && kernfs_ns_enabled(kn->parent) && |
c525aaddc kernfs: s/sysfs/k... |
551 |
kernfs_info(dentry->d_sb)->ns != kn->ns) |
fd7b9f7b9 sysfs, kernfs: mo... |
552 |
goto out_bad; |
a797bfc30 kernfs: s/sysfs/k... |
553 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
554 555 |
return 1; out_bad: |
a797bfc30 kernfs: s/sysfs/k... |
556 |
mutex_unlock(&kernfs_mutex); |
19bbb9262 kernfs: allow neg... |
557 |
out_bad_unlocked: |
fd7b9f7b9 sysfs, kernfs: mo... |
558 559 |
return 0; } |
a797bfc30 kernfs: s/sysfs/k... |
560 |
const struct dentry_operations kernfs_dops = { |
c637b8acb kernfs: s/sysfs/k... |
561 |
.d_revalidate = kernfs_dop_revalidate, |
fd7b9f7b9 sysfs, kernfs: mo... |
562 |
}; |
0c23b2259 kernfs: implement... |
563 564 565 566 567 568 569 570 571 572 573 574 575 |
/** * kernfs_node_from_dentry - determine kernfs_node associated with a dentry * @dentry: the dentry in question * * Return the kernfs_node associated with @dentry. If @dentry is not a * kernfs one, %NULL is returned. * * While the returned kernfs_node will stay accessible as long as @dentry * is accessible, the returned node can be in any state and the caller is * fully responsible for determining what's accessible. */ struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry) { |
319ba91d3 kernfs: don't set... |
576 577 578 |
if (dentry->d_sb->s_op == &kernfs_sops && !d_really_is_negative(dentry)) return kernfs_dentry_node(dentry); |
0c23b2259 kernfs: implement... |
579 580 |
return NULL; } |
db4aad209 kernfs: associate... |
581 |
static struct kernfs_node *__kernfs_new_node(struct kernfs_root *root, |
e19dfdc83 kernfs: initializ... |
582 |
struct kernfs_node *parent, |
db4aad209 kernfs: associate... |
583 |
const char *name, umode_t mode, |
488dee96b kernfs: allow cre... |
584 |
kuid_t uid, kgid_t gid, |
db4aad209 kernfs: associate... |
585 |
unsigned flags) |
fd7b9f7b9 sysfs, kernfs: mo... |
586 |
{ |
324a56e16 kernfs: s/sysfs_d... |
587 |
struct kernfs_node *kn; |
40430452f kernfs: use 64bit... |
588 |
u32 id_highbits; |
bc755553d sysfs, kernfs: ma... |
589 |
int ret; |
fd7b9f7b9 sysfs, kernfs: mo... |
590 |
|
dfeb0750b kernfs: remove KE... |
591 592 593 |
name = kstrdup_const(name, GFP_KERNEL); if (!name) return NULL; |
fd7b9f7b9 sysfs, kernfs: mo... |
594 |
|
a797bfc30 kernfs: s/sysfs/k... |
595 |
kn = kmem_cache_zalloc(kernfs_node_cache, GFP_KERNEL); |
324a56e16 kernfs: s/sysfs_d... |
596 |
if (!kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
597 |
goto err_out1; |
7d35079f8 kernfs: use idr i... |
598 599 |
idr_preload(GFP_KERNEL); spin_lock(&kernfs_idr_lock); |
4a3ef68ac kernfs: implement... |
600 |
ret = idr_alloc_cyclic(&root->ino_idr, kn, 1, 0, GFP_ATOMIC); |
40430452f kernfs: use 64bit... |
601 602 603 604 |
if (ret >= 0 && ret < root->last_id_lowbits) root->id_highbits++; id_highbits = root->id_highbits; root->last_id_lowbits = ret; |
7d35079f8 kernfs: use idr i... |
605 606 |
spin_unlock(&kernfs_idr_lock); idr_preload_end(); |
bc755553d sysfs, kernfs: ma... |
607 |
if (ret < 0) |
fd7b9f7b9 sysfs, kernfs: mo... |
608 |
goto err_out2; |
67c0496e8 kernfs: convert k... |
609 |
|
40430452f kernfs: use 64bit... |
610 |
kn->id = (u64)id_highbits << 32 | ret; |
fd7b9f7b9 sysfs, kernfs: mo... |
611 |
|
b680b0817 kernfs: use dumbe... |
612 |
atomic_set(&kn->count, 1); |
81c173cb5 kernfs: remove KE... |
613 |
atomic_set(&kn->active, KN_DEACTIVATED_BIAS); |
35beab063 kernfs: restructu... |
614 |
RB_CLEAR_NODE(&kn->rb); |
fd7b9f7b9 sysfs, kernfs: mo... |
615 |
|
adc5e8b58 kernfs: drop s_ p... |
616 617 |
kn->name = name; kn->mode = mode; |
81c173cb5 kernfs: remove KE... |
618 |
kn->flags = flags; |
fd7b9f7b9 sysfs, kernfs: mo... |
619 |
|
488dee96b kernfs: allow cre... |
620 621 622 623 624 625 626 627 628 629 630 |
if (!uid_eq(uid, GLOBAL_ROOT_UID) || !gid_eq(gid, GLOBAL_ROOT_GID)) { struct iattr iattr = { .ia_valid = ATTR_UID | ATTR_GID, .ia_uid = uid, .ia_gid = gid, }; ret = __kernfs_setattr(kn, &iattr); if (ret < 0) goto err_out3; } |
e19dfdc83 kernfs: initializ... |
631 632 633 634 635 |
if (parent) { ret = security_kernfs_init_security(parent, kn); if (ret) goto err_out3; } |
324a56e16 kernfs: s/sysfs_d... |
636 |
return kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
637 |
|
488dee96b kernfs: allow cre... |
638 |
err_out3: |
40430452f kernfs: use 64bit... |
639 |
idr_remove(&root->ino_idr, (u32)kernfs_ino(kn)); |
fd7b9f7b9 sysfs, kernfs: mo... |
640 |
err_out2: |
a797bfc30 kernfs: s/sysfs/k... |
641 |
kmem_cache_free(kernfs_node_cache, kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
642 |
err_out1: |
dfeb0750b kernfs: remove KE... |
643 |
kfree_const(name); |
fd7b9f7b9 sysfs, kernfs: mo... |
644 645 |
return NULL; } |
db4aad209 kernfs: associate... |
646 647 |
struct kernfs_node *kernfs_new_node(struct kernfs_node *parent, const char *name, umode_t mode, |
488dee96b kernfs: allow cre... |
648 |
kuid_t uid, kgid_t gid, |
db4aad209 kernfs: associate... |
649 650 651 |
unsigned flags) { struct kernfs_node *kn; |
e19dfdc83 kernfs: initializ... |
652 |
kn = __kernfs_new_node(kernfs_root(parent), parent, |
488dee96b kernfs: allow cre... |
653 |
name, mode, uid, gid, flags); |
db4aad209 kernfs: associate... |
654 655 656 657 658 659 |
if (kn) { kernfs_get(parent); kn->parent = parent; } return kn; } |
ba16b2846 kernfs: add an AP... |
660 |
/* |
fe0f726c9 kernfs: combine i... |
661 |
* kernfs_find_and_get_node_by_id - get kernfs_node from node id |
ba16b2846 kernfs: add an AP... |
662 |
* @root: the kernfs root |
fe0f726c9 kernfs: combine i... |
663 664 665 666 |
* @id: the target node id * * @id's lower 32bits encode ino and upper gen. If the gen portion is * zero, all generations are matched. |
ba16b2846 kernfs: add an AP... |
667 668 669 670 |
* * RETURNS: * NULL on failure. Return a kernfs node with reference counter incremented */ |
fe0f726c9 kernfs: combine i... |
671 672 |
struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root, u64 id) |
ba16b2846 kernfs: add an AP... |
673 674 |
{ struct kernfs_node *kn; |
fe0f726c9 kernfs: combine i... |
675 676 |
ino_t ino = kernfs_id_ino(id); u32 gen = kernfs_id_gen(id); |
ba16b2846 kernfs: add an AP... |
677 |
|
b680b0817 kernfs: use dumbe... |
678 |
spin_lock(&kernfs_idr_lock); |
40430452f kernfs: use 64bit... |
679 |
kn = idr_find(&root->ino_idr, (u32)ino); |
ba16b2846 kernfs: add an AP... |
680 |
if (!kn) |
b680b0817 kernfs: use dumbe... |
681 |
goto err_unlock; |
ba16b2846 kernfs: add an AP... |
682 |
|
40430452f kernfs: use 64bit... |
683 684 685 686 687 688 689 690 691 |
if (sizeof(ino_t) >= sizeof(u64)) { /* we looked up with the low 32bits, compare the whole */ if (kernfs_ino(kn) != ino) goto err_unlock; } else { /* 0 matches all generations */ if (unlikely(gen && kernfs_gen(kn) != gen)) goto err_unlock; } |
fe0f726c9 kernfs: combine i... |
692 |
|
880df1316 kernfs: kernfs_fi... |
693 694 695 696 697 698 699 |
/* * ACTIVATED is protected with kernfs_mutex but it was clear when * @kn was added to idr and we just wanna see it set. No need to * grab kernfs_mutex. */ if (unlikely(!(kn->flags & KERNFS_ACTIVATED) || !atomic_inc_not_zero(&kn->count))) |
b680b0817 kernfs: use dumbe... |
700 |
goto err_unlock; |
ba16b2846 kernfs: add an AP... |
701 |
|
b680b0817 kernfs: use dumbe... |
702 |
spin_unlock(&kernfs_idr_lock); |
ba16b2846 kernfs: add an AP... |
703 |
return kn; |
b680b0817 kernfs: use dumbe... |
704 705 |
err_unlock: spin_unlock(&kernfs_idr_lock); |
ba16b2846 kernfs: add an AP... |
706 707 |
return NULL; } |
fd7b9f7b9 sysfs, kernfs: mo... |
708 |
/** |
c637b8acb kernfs: s/sysfs/k... |
709 |
* kernfs_add_one - add kernfs_node to parent without warning |
324a56e16 kernfs: s/sysfs_d... |
710 |
* @kn: kernfs_node to be added |
fd7b9f7b9 sysfs, kernfs: mo... |
711 |
* |
db4aad209 kernfs: associate... |
712 713 714 |
* The caller must already have initialized @kn->parent. This * function increments nlink of the parent's inode if @kn is a * directory and link into the children list of the parent. |
fd7b9f7b9 sysfs, kernfs: mo... |
715 |
* |
fd7b9f7b9 sysfs, kernfs: mo... |
716 717 718 719 |
* RETURNS: * 0 on success, -EEXIST if entry with the given name already * exists. */ |
988cd7afb kernfs: remove ke... |
720 |
int kernfs_add_one(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
721 |
{ |
db4aad209 kernfs: associate... |
722 |
struct kernfs_node *parent = kn->parent; |
c525aaddc kernfs: s/sysfs/k... |
723 |
struct kernfs_iattrs *ps_iattr; |
988cd7afb kernfs: remove ke... |
724 |
bool has_ns; |
fd7b9f7b9 sysfs, kernfs: mo... |
725 |
int ret; |
988cd7afb kernfs: remove ke... |
726 727 728 729 730 731 732 733 |
mutex_lock(&kernfs_mutex); ret = -EINVAL; has_ns = kernfs_ns_enabled(parent); if (WARN(has_ns != (bool)kn->ns, KERN_WARNING "kernfs: ns %s in '%s' for '%s' ", has_ns ? "required" : "invalid", parent->name, kn->name)) goto out_unlock; |
fd7b9f7b9 sysfs, kernfs: mo... |
734 |
|
df23fc39b kernfs: s/sysfs/k... |
735 |
if (kernfs_type(parent) != KERNFS_DIR) |
988cd7afb kernfs: remove ke... |
736 |
goto out_unlock; |
fd7b9f7b9 sysfs, kernfs: mo... |
737 |
|
988cd7afb kernfs: remove ke... |
738 |
ret = -ENOENT; |
ea015218f kernfs: Add suppo... |
739 740 |
if (parent->flags & KERNFS_EMPTY_DIR) goto out_unlock; |
d35258ef7 kernfs: allow nod... |
741 |
if ((parent->flags & KERNFS_ACTIVATED) && !kernfs_active(parent)) |
988cd7afb kernfs: remove ke... |
742 |
goto out_unlock; |
798c75a0d Revert "kernfs: r... |
743 |
|
c637b8acb kernfs: s/sysfs/k... |
744 |
kn->hash = kernfs_name_hash(kn->name, kn->ns); |
fd7b9f7b9 sysfs, kernfs: mo... |
745 |
|
c637b8acb kernfs: s/sysfs/k... |
746 |
ret = kernfs_link_sibling(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
747 |
if (ret) |
988cd7afb kernfs: remove ke... |
748 |
goto out_unlock; |
fd7b9f7b9 sysfs, kernfs: mo... |
749 750 |
/* Update timestamps on the parent */ |
adc5e8b58 kernfs: drop s_ p... |
751 |
ps_iattr = parent->iattr; |
fd7b9f7b9 sysfs, kernfs: mo... |
752 |
if (ps_iattr) { |
058952196 kernfs: clean up ... |
753 754 |
ktime_get_real_ts64(&ps_iattr->ia_ctime); ps_iattr->ia_mtime = ps_iattr->ia_ctime; |
fd7b9f7b9 sysfs, kernfs: mo... |
755 |
} |
d35258ef7 kernfs: allow nod... |
756 757 758 759 760 761 762 763 764 765 766 767 |
mutex_unlock(&kernfs_mutex); /* * Activate the new node unless CREATE_DEACTIVATED is requested. * If not activated here, the kernfs user is responsible for * activating the node with kernfs_activate(). A node which hasn't * been activated is not visible to userland and its removal won't * trigger deactivation. */ if (!(kernfs_root(kn)->flags & KERNFS_ROOT_CREATE_DEACTIVATED)) kernfs_activate(kn); return 0; |
988cd7afb kernfs: remove ke... |
768 |
out_unlock: |
a797bfc30 kernfs: s/sysfs/k... |
769 |
mutex_unlock(&kernfs_mutex); |
988cd7afb kernfs: remove ke... |
770 |
return ret; |
fd7b9f7b9 sysfs, kernfs: mo... |
771 772 773 |
} /** |
324a56e16 kernfs: s/sysfs_d... |
774 775 |
* kernfs_find_ns - find kernfs_node with the given name * @parent: kernfs_node to search under |
fd7b9f7b9 sysfs, kernfs: mo... |
776 777 778 |
* @name: name to look for * @ns: the namespace tag to use * |
324a56e16 kernfs: s/sysfs_d... |
779 780 |
* Look for kernfs_node with name @name under @parent. Returns pointer to * the found kernfs_node on success, %NULL on failure. |
fd7b9f7b9 sysfs, kernfs: mo... |
781 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
782 783 784 |
static struct kernfs_node *kernfs_find_ns(struct kernfs_node *parent, const unsigned char *name, const void *ns) |
fd7b9f7b9 sysfs, kernfs: mo... |
785 |
{ |
adc5e8b58 kernfs: drop s_ p... |
786 |
struct rb_node *node = parent->dir.children.rb_node; |
ac9bba031 sysfs, kernfs: im... |
787 |
bool has_ns = kernfs_ns_enabled(parent); |
fd7b9f7b9 sysfs, kernfs: mo... |
788 |
unsigned int hash; |
a797bfc30 kernfs: s/sysfs/k... |
789 |
lockdep_assert_held(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
790 791 |
if (has_ns != (bool)ns) { |
c637b8acb kernfs: s/sysfs/k... |
792 793 |
WARN(1, KERN_WARNING "kernfs: ns %s in '%s' for '%s' ", |
adc5e8b58 kernfs: drop s_ p... |
794 |
has_ns ? "required" : "invalid", parent->name, name); |
fd7b9f7b9 sysfs, kernfs: mo... |
795 796 |
return NULL; } |
c637b8acb kernfs: s/sysfs/k... |
797 |
hash = kernfs_name_hash(name, ns); |
fd7b9f7b9 sysfs, kernfs: mo... |
798 |
while (node) { |
324a56e16 kernfs: s/sysfs_d... |
799 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
800 |
int result; |
324a56e16 kernfs: s/sysfs_d... |
801 |
kn = rb_to_kn(node); |
c637b8acb kernfs: s/sysfs/k... |
802 |
result = kernfs_name_compare(hash, name, ns, kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
803 804 805 806 807 |
if (result < 0) node = node->rb_left; else if (result > 0) node = node->rb_right; else |
324a56e16 kernfs: s/sysfs_d... |
808 |
return kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
809 810 811 |
} return NULL; } |
bd96f76a2 kernfs: implement... |
812 813 814 815 |
static struct kernfs_node *kernfs_walk_ns(struct kernfs_node *parent, const unsigned char *path, const void *ns) { |
e56ed358a kernfs: make kern... |
816 817 |
size_t len; char *p, *name; |
bd96f76a2 kernfs: implement... |
818 819 |
lockdep_assert_held(&kernfs_mutex); |
e56ed358a kernfs: make kern... |
820 821 822 823 824 825 826 |
/* grab kernfs_rename_lock to piggy back on kernfs_pr_cont_buf */ spin_lock_irq(&kernfs_rename_lock); len = strlcpy(kernfs_pr_cont_buf, path, sizeof(kernfs_pr_cont_buf)); if (len >= sizeof(kernfs_pr_cont_buf)) { spin_unlock_irq(&kernfs_rename_lock); |
bd96f76a2 kernfs: implement... |
827 |
return NULL; |
e56ed358a kernfs: make kern... |
828 829 830 |
} p = kernfs_pr_cont_buf; |
bd96f76a2 kernfs: implement... |
831 832 833 834 835 836 |
while ((name = strsep(&p, "/")) && parent) { if (*name == '\0') continue; parent = kernfs_find_ns(parent, name, ns); } |
e56ed358a kernfs: make kern... |
837 |
spin_unlock_irq(&kernfs_rename_lock); |
bd96f76a2 kernfs: implement... |
838 839 |
return parent; } |
fd7b9f7b9 sysfs, kernfs: mo... |
840 |
/** |
324a56e16 kernfs: s/sysfs_d... |
841 842 |
* kernfs_find_and_get_ns - find and get kernfs_node with the given name * @parent: kernfs_node to search under |
fd7b9f7b9 sysfs, kernfs: mo... |
843 844 845 |
* @name: name to look for * @ns: the namespace tag to use * |
324a56e16 kernfs: s/sysfs_d... |
846 |
* Look for kernfs_node with name @name under @parent and get a reference |
fd7b9f7b9 sysfs, kernfs: mo... |
847 |
* if found. This function may sleep and returns pointer to the found |
324a56e16 kernfs: s/sysfs_d... |
848 |
* kernfs_node on success, %NULL on failure. |
fd7b9f7b9 sysfs, kernfs: mo... |
849 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
850 851 |
struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name, const void *ns) |
fd7b9f7b9 sysfs, kernfs: mo... |
852 |
{ |
324a56e16 kernfs: s/sysfs_d... |
853 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
854 |
|
a797bfc30 kernfs: s/sysfs/k... |
855 |
mutex_lock(&kernfs_mutex); |
324a56e16 kernfs: s/sysfs_d... |
856 857 |
kn = kernfs_find_ns(parent, name, ns); kernfs_get(kn); |
a797bfc30 kernfs: s/sysfs/k... |
858 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
859 |
|
324a56e16 kernfs: s/sysfs_d... |
860 |
return kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
861 862 863 864 |
} EXPORT_SYMBOL_GPL(kernfs_find_and_get_ns); /** |
bd96f76a2 kernfs: implement... |
865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 |
* kernfs_walk_and_get_ns - find and get kernfs_node with the given path * @parent: kernfs_node to search under * @path: path to look for * @ns: the namespace tag to use * * Look for kernfs_node with path @path under @parent and get a reference * if found. This function may sleep and returns pointer to the found * kernfs_node on success, %NULL on failure. */ struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path, const void *ns) { struct kernfs_node *kn; mutex_lock(&kernfs_mutex); kn = kernfs_walk_ns(parent, path, ns); kernfs_get(kn); mutex_unlock(&kernfs_mutex); return kn; } /** |
ba7443bc6 sysfs, kernfs: im... |
888 |
* kernfs_create_root - create a new kernfs hierarchy |
90c07c895 kernfs: rename ke... |
889 |
* @scops: optional syscall operations for the hierarchy |
d35258ef7 kernfs: allow nod... |
890 |
* @flags: KERNFS_ROOT_* flags |
ba7443bc6 sysfs, kernfs: im... |
891 892 893 894 895 |
* @priv: opaque data associated with the new directory * * Returns the root of the new hierarchy on success, ERR_PTR() value on * failure. */ |
90c07c895 kernfs: rename ke... |
896 |
struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops, |
d35258ef7 kernfs: allow nod... |
897 |
unsigned int flags, void *priv) |
ba7443bc6 sysfs, kernfs: im... |
898 899 |
{ struct kernfs_root *root; |
324a56e16 kernfs: s/sysfs_d... |
900 |
struct kernfs_node *kn; |
ba7443bc6 sysfs, kernfs: im... |
901 902 903 904 |
root = kzalloc(sizeof(*root), GFP_KERNEL); if (!root) return ERR_PTR(-ENOMEM); |
7d35079f8 kernfs: use idr i... |
905 |
idr_init(&root->ino_idr); |
7d568a838 kernfs: implement... |
906 |
INIT_LIST_HEAD(&root->supers); |
40430452f kernfs: use 64bit... |
907 908 909 910 911 912 913 914 915 916 917 |
/* * On 64bit ino setups, id is ino. On 32bit, low 32bits are ino. * High bits generation. The starting value for both ino and * genenration is 1. Initialize upper 32bit allocation * accordingly. */ if (sizeof(ino_t) >= sizeof(u64)) root->id_highbits = 0; else root->id_highbits = 1; |
bc755553d sysfs, kernfs: ma... |
918 |
|
e19dfdc83 kernfs: initializ... |
919 |
kn = __kernfs_new_node(root, NULL, "", S_IFDIR | S_IRUGO | S_IXUGO, |
488dee96b kernfs: allow cre... |
920 |
GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, |
db4aad209 kernfs: associate... |
921 |
KERNFS_DIR); |
324a56e16 kernfs: s/sysfs_d... |
922 |
if (!kn) { |
7d35079f8 kernfs: use idr i... |
923 |
idr_destroy(&root->ino_idr); |
ba7443bc6 sysfs, kernfs: im... |
924 925 926 |
kfree(root); return ERR_PTR(-ENOMEM); } |
324a56e16 kernfs: s/sysfs_d... |
927 |
kn->priv = priv; |
adc5e8b58 kernfs: drop s_ p... |
928 |
kn->dir.root = root; |
ba7443bc6 sysfs, kernfs: im... |
929 |
|
90c07c895 kernfs: rename ke... |
930 |
root->syscall_ops = scops; |
d35258ef7 kernfs: allow nod... |
931 |
root->flags = flags; |
324a56e16 kernfs: s/sysfs_d... |
932 |
root->kn = kn; |
abd54f028 kernfs: replace k... |
933 |
init_waitqueue_head(&root->deactivate_waitq); |
ba7443bc6 sysfs, kernfs: im... |
934 |
|
d35258ef7 kernfs: allow nod... |
935 936 |
if (!(root->flags & KERNFS_ROOT_CREATE_DEACTIVATED)) kernfs_activate(kn); |
ba7443bc6 sysfs, kernfs: im... |
937 938 939 940 941 942 943 944 945 946 947 948 |
return root; } /** * kernfs_destroy_root - destroy a kernfs hierarchy * @root: root of the hierarchy to destroy * * Destroy the hierarchy anchored at @root by removing all existing * directories and destroying @root. */ void kernfs_destroy_root(struct kernfs_root *root) { |
324a56e16 kernfs: s/sysfs_d... |
949 |
kernfs_remove(root->kn); /* will also free @root */ |
ba7443bc6 sysfs, kernfs: im... |
950 951 952 |
} /** |
fd7b9f7b9 sysfs, kernfs: mo... |
953 954 955 |
* kernfs_create_dir_ns - create a directory * @parent: parent in which to create a new directory * @name: name of the new directory |
bb8b9d095 kernfs: add @mode... |
956 |
* @mode: mode of the new directory |
488dee96b kernfs: allow cre... |
957 958 |
* @uid: uid of the new directory * @gid: gid of the new directory |
fd7b9f7b9 sysfs, kernfs: mo... |
959 960 961 962 963 |
* @priv: opaque data associated with the new directory * @ns: optional namespace tag of the directory * * Returns the created node on success, ERR_PTR() value on failure. */ |
324a56e16 kernfs: s/sysfs_d... |
964 |
struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent, |
bb8b9d095 kernfs: add @mode... |
965 |
const char *name, umode_t mode, |
488dee96b kernfs: allow cre... |
966 |
kuid_t uid, kgid_t gid, |
bb8b9d095 kernfs: add @mode... |
967 |
void *priv, const void *ns) |
fd7b9f7b9 sysfs, kernfs: mo... |
968 |
{ |
324a56e16 kernfs: s/sysfs_d... |
969 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
970 971 972 |
int rc; /* allocate */ |
488dee96b kernfs: allow cre... |
973 974 |
kn = kernfs_new_node(parent, name, mode | S_IFDIR, uid, gid, KERNFS_DIR); |
324a56e16 kernfs: s/sysfs_d... |
975 |
if (!kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
976 |
return ERR_PTR(-ENOMEM); |
adc5e8b58 kernfs: drop s_ p... |
977 978 |
kn->dir.root = parent->dir.root; kn->ns = ns; |
324a56e16 kernfs: s/sysfs_d... |
979 |
kn->priv = priv; |
fd7b9f7b9 sysfs, kernfs: mo... |
980 981 |
/* link in */ |
988cd7afb kernfs: remove ke... |
982 |
rc = kernfs_add_one(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
983 |
if (!rc) |
324a56e16 kernfs: s/sysfs_d... |
984 |
return kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
985 |
|
324a56e16 kernfs: s/sysfs_d... |
986 |
kernfs_put(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
987 988 |
return ERR_PTR(rc); } |
ea015218f kernfs: Add suppo... |
989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 |
/** * kernfs_create_empty_dir - create an always empty directory * @parent: parent in which to create a new directory * @name: name of the new directory * * Returns the created node on success, ERR_PTR() value on failure. */ struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent, const char *name) { struct kernfs_node *kn; int rc; /* allocate */ |
488dee96b kernfs: allow cre... |
1003 1004 |
kn = kernfs_new_node(parent, name, S_IRUGO|S_IXUGO|S_IFDIR, GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, KERNFS_DIR); |
ea015218f kernfs: Add suppo... |
1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 |
if (!kn) return ERR_PTR(-ENOMEM); kn->flags |= KERNFS_EMPTY_DIR; kn->dir.root = parent->dir.root; kn->ns = NULL; kn->priv = NULL; /* link in */ rc = kernfs_add_one(kn); if (!rc) return kn; kernfs_put(kn); return ERR_PTR(rc); } |
c637b8acb kernfs: s/sysfs/k... |
1021 1022 1023 |
static struct dentry *kernfs_iop_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags) |
fd7b9f7b9 sysfs, kernfs: mo... |
1024 |
{ |
19bbb9262 kernfs: allow neg... |
1025 |
struct dentry *ret; |
319ba91d3 kernfs: don't set... |
1026 |
struct kernfs_node *parent = dir->i_private; |
324a56e16 kernfs: s/sysfs_d... |
1027 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
1028 1029 |
struct inode *inode; const void *ns = NULL; |
a797bfc30 kernfs: s/sysfs/k... |
1030 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1031 |
|
324a56e16 kernfs: s/sysfs_d... |
1032 |
if (kernfs_ns_enabled(parent)) |
c525aaddc kernfs: s/sysfs/k... |
1033 |
ns = kernfs_info(dir->i_sb)->ns; |
fd7b9f7b9 sysfs, kernfs: mo... |
1034 |
|
324a56e16 kernfs: s/sysfs_d... |
1035 |
kn = kernfs_find_ns(parent, dentry->d_name.name, ns); |
fd7b9f7b9 sysfs, kernfs: mo... |
1036 1037 |
/* no such entry */ |
b9c9dad0c kernfs: add missi... |
1038 |
if (!kn || !kernfs_active(kn)) { |
19bbb9262 kernfs: allow neg... |
1039 |
ret = NULL; |
fd7b9f7b9 sysfs, kernfs: mo... |
1040 1041 |
goto out_unlock; } |
fd7b9f7b9 sysfs, kernfs: mo... |
1042 1043 |
/* attach dentry and inode */ |
c637b8acb kernfs: s/sysfs/k... |
1044 |
inode = kernfs_get_inode(dir->i_sb, kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1045 1046 1047 1048 1049 1050 |
if (!inode) { ret = ERR_PTR(-ENOMEM); goto out_unlock; } /* instantiate and hash dentry */ |
41d28bca2 switch d_material... |
1051 |
ret = d_splice_alias(inode, dentry); |
fd7b9f7b9 sysfs, kernfs: mo... |
1052 |
out_unlock: |
a797bfc30 kernfs: s/sysfs/k... |
1053 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1054 1055 |
return ret; } |
80b9bbefc kernfs: add kernf... |
1056 1057 1058 1059 |
static int kernfs_iop_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode) { struct kernfs_node *parent = dir->i_private; |
90c07c895 kernfs: rename ke... |
1060 |
struct kernfs_syscall_ops *scops = kernfs_root(parent)->syscall_ops; |
07c7530dd kernfs: invoke di... |
1061 |
int ret; |
80b9bbefc kernfs: add kernf... |
1062 |
|
90c07c895 kernfs: rename ke... |
1063 |
if (!scops || !scops->mkdir) |
80b9bbefc kernfs: add kernf... |
1064 |
return -EPERM; |
07c7530dd kernfs: invoke di... |
1065 1066 |
if (!kernfs_get_active(parent)) return -ENODEV; |
90c07c895 kernfs: rename ke... |
1067 |
ret = scops->mkdir(parent, dentry->d_name.name, mode); |
07c7530dd kernfs: invoke di... |
1068 1069 1070 |
kernfs_put_active(parent); return ret; |
80b9bbefc kernfs: add kernf... |
1071 1072 1073 1074 |
} static int kernfs_iop_rmdir(struct inode *dir, struct dentry *dentry) { |
319ba91d3 kernfs: don't set... |
1075 |
struct kernfs_node *kn = kernfs_dentry_node(dentry); |
90c07c895 kernfs: rename ke... |
1076 |
struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops; |
07c7530dd kernfs: invoke di... |
1077 |
int ret; |
80b9bbefc kernfs: add kernf... |
1078 |
|
90c07c895 kernfs: rename ke... |
1079 |
if (!scops || !scops->rmdir) |
80b9bbefc kernfs: add kernf... |
1080 |
return -EPERM; |
07c7530dd kernfs: invoke di... |
1081 1082 |
if (!kernfs_get_active(kn)) return -ENODEV; |
90c07c895 kernfs: rename ke... |
1083 |
ret = scops->rmdir(kn); |
07c7530dd kernfs: invoke di... |
1084 1085 1086 |
kernfs_put_active(kn); return ret; |
80b9bbefc kernfs: add kernf... |
1087 1088 1089 |
} static int kernfs_iop_rename(struct inode *old_dir, struct dentry *old_dentry, |
1cd66c93b fs: make remainin... |
1090 1091 |
struct inode *new_dir, struct dentry *new_dentry, unsigned int flags) |
80b9bbefc kernfs: add kernf... |
1092 |
{ |
319ba91d3 kernfs: don't set... |
1093 |
struct kernfs_node *kn = kernfs_dentry_node(old_dentry); |
80b9bbefc kernfs: add kernf... |
1094 |
struct kernfs_node *new_parent = new_dir->i_private; |
90c07c895 kernfs: rename ke... |
1095 |
struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops; |
07c7530dd kernfs: invoke di... |
1096 |
int ret; |
80b9bbefc kernfs: add kernf... |
1097 |
|
1cd66c93b fs: make remainin... |
1098 1099 |
if (flags) return -EINVAL; |
90c07c895 kernfs: rename ke... |
1100 |
if (!scops || !scops->rename) |
80b9bbefc kernfs: add kernf... |
1101 |
return -EPERM; |
07c7530dd kernfs: invoke di... |
1102 1103 1104 1105 1106 1107 1108 |
if (!kernfs_get_active(kn)) return -ENODEV; if (!kernfs_get_active(new_parent)) { kernfs_put_active(kn); return -ENODEV; } |
90c07c895 kernfs: rename ke... |
1109 |
ret = scops->rename(kn, new_parent, new_dentry->d_name.name); |
07c7530dd kernfs: invoke di... |
1110 1111 1112 1113 |
kernfs_put_active(new_parent); kernfs_put_active(kn); return ret; |
80b9bbefc kernfs: add kernf... |
1114 |
} |
a797bfc30 kernfs: s/sysfs/k... |
1115 |
const struct inode_operations kernfs_dir_iops = { |
c637b8acb kernfs: s/sysfs/k... |
1116 1117 1118 1119 |
.lookup = kernfs_iop_lookup, .permission = kernfs_iop_permission, .setattr = kernfs_iop_setattr, .getattr = kernfs_iop_getattr, |
c637b8acb kernfs: s/sysfs/k... |
1120 |
.listxattr = kernfs_iop_listxattr, |
80b9bbefc kernfs: add kernf... |
1121 1122 1123 1124 |
.mkdir = kernfs_iop_mkdir, .rmdir = kernfs_iop_rmdir, .rename = kernfs_iop_rename, |
fd7b9f7b9 sysfs, kernfs: mo... |
1125 |
}; |
c637b8acb kernfs: s/sysfs/k... |
1126 |
static struct kernfs_node *kernfs_leftmost_descendant(struct kernfs_node *pos) |
fd7b9f7b9 sysfs, kernfs: mo... |
1127 |
{ |
324a56e16 kernfs: s/sysfs_d... |
1128 |
struct kernfs_node *last; |
fd7b9f7b9 sysfs, kernfs: mo... |
1129 1130 1131 1132 1133 |
while (true) { struct rb_node *rbn; last = pos; |
df23fc39b kernfs: s/sysfs/k... |
1134 |
if (kernfs_type(pos) != KERNFS_DIR) |
fd7b9f7b9 sysfs, kernfs: mo... |
1135 |
break; |
adc5e8b58 kernfs: drop s_ p... |
1136 |
rbn = rb_first(&pos->dir.children); |
fd7b9f7b9 sysfs, kernfs: mo... |
1137 1138 |
if (!rbn) break; |
324a56e16 kernfs: s/sysfs_d... |
1139 |
pos = rb_to_kn(rbn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1140 1141 1142 1143 1144 1145 |
} return last; } /** |
c637b8acb kernfs: s/sysfs/k... |
1146 |
* kernfs_next_descendant_post - find the next descendant for post-order walk |
fd7b9f7b9 sysfs, kernfs: mo... |
1147 |
* @pos: the current position (%NULL to initiate traversal) |
324a56e16 kernfs: s/sysfs_d... |
1148 |
* @root: kernfs_node whose descendants to walk |
fd7b9f7b9 sysfs, kernfs: mo... |
1149 1150 1151 1152 1153 |
* * Find the next descendant to visit for post-order traversal of @root's * descendants. @root is included in the iteration and the last node to be * visited. */ |
c637b8acb kernfs: s/sysfs/k... |
1154 1155 |
static struct kernfs_node *kernfs_next_descendant_post(struct kernfs_node *pos, struct kernfs_node *root) |
fd7b9f7b9 sysfs, kernfs: mo... |
1156 1157 |
{ struct rb_node *rbn; |
a797bfc30 kernfs: s/sysfs/k... |
1158 |
lockdep_assert_held(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1159 1160 1161 |
/* if first iteration, visit leftmost descendant which may be root */ if (!pos) |
c637b8acb kernfs: s/sysfs/k... |
1162 |
return kernfs_leftmost_descendant(root); |
fd7b9f7b9 sysfs, kernfs: mo... |
1163 1164 1165 1166 1167 1168 |
/* if we visited @root, we're done */ if (pos == root) return NULL; /* if there's an unvisited sibling, visit its leftmost descendant */ |
adc5e8b58 kernfs: drop s_ p... |
1169 |
rbn = rb_next(&pos->rb); |
fd7b9f7b9 sysfs, kernfs: mo... |
1170 |
if (rbn) |
c637b8acb kernfs: s/sysfs/k... |
1171 |
return kernfs_leftmost_descendant(rb_to_kn(rbn)); |
fd7b9f7b9 sysfs, kernfs: mo... |
1172 1173 |
/* no sibling left, visit parent */ |
adc5e8b58 kernfs: drop s_ p... |
1174 |
return pos->parent; |
fd7b9f7b9 sysfs, kernfs: mo... |
1175 |
} |
d35258ef7 kernfs: allow nod... |
1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 |
/** * kernfs_activate - activate a node which started deactivated * @kn: kernfs_node whose subtree is to be activated * * If the root has KERNFS_ROOT_CREATE_DEACTIVATED set, a newly created node * needs to be explicitly activated. A node which hasn't been activated * isn't visible to userland and deactivation is skipped during its * removal. This is useful to construct atomic init sequences where * creation of multiple nodes should either succeed or fail atomically. * * The caller is responsible for ensuring that this function is not called * after kernfs_remove*() is invoked on @kn. */ void kernfs_activate(struct kernfs_node *kn) { struct kernfs_node *pos; mutex_lock(&kernfs_mutex); pos = NULL; while ((pos = kernfs_next_descendant_post(pos, kn))) { |
5bf33f04e fs/kernfs/dir.c: ... |
1197 |
if (pos->flags & KERNFS_ACTIVATED) |
d35258ef7 kernfs: allow nod... |
1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 |
continue; WARN_ON_ONCE(pos->parent && RB_EMPTY_NODE(&pos->rb)); WARN_ON_ONCE(atomic_read(&pos->active) != KN_DEACTIVATED_BIAS); atomic_sub(KN_DEACTIVATED_BIAS, &pos->active); pos->flags |= KERNFS_ACTIVATED; } mutex_unlock(&kernfs_mutex); } |
988cd7afb kernfs: remove ke... |
1209 |
static void __kernfs_remove(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
1210 |
{ |
35beab063 kernfs: restructu... |
1211 1212 1213 |
struct kernfs_node *pos; lockdep_assert_held(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1214 |
|
6b0afc2a2 kernfs, sysfs, dr... |
1215 1216 1217 1218 1219 1220 |
/* * Short-circuit if non-root @kn has already finished removal. * This is for kernfs_remove_self() which plays with active ref * after removal. */ if (!kn || (kn->parent && RB_EMPTY_NODE(&kn->rb))) |
ce9b499c9 Revert "kernfs: r... |
1221 |
return; |
c637b8acb kernfs: s/sysfs/k... |
1222 1223 |
pr_debug("kernfs %s: removing ", kn->name); |
fd7b9f7b9 sysfs, kernfs: mo... |
1224 |
|
81c173cb5 kernfs: remove KE... |
1225 |
/* prevent any new usage under @kn by deactivating all nodes */ |
35beab063 kernfs: restructu... |
1226 1227 |
pos = NULL; while ((pos = kernfs_next_descendant_post(pos, kn))) |
81c173cb5 kernfs: remove KE... |
1228 1229 |
if (kernfs_active(pos)) atomic_add(KN_DEACTIVATED_BIAS, &pos->active); |
35beab063 kernfs: restructu... |
1230 1231 |
/* deactivate and unlink the subtree node-by-node */ |
fd7b9f7b9 sysfs, kernfs: mo... |
1232 |
do { |
35beab063 kernfs: restructu... |
1233 1234 1235 |
pos = kernfs_leftmost_descendant(kn); /* |
81c173cb5 kernfs: remove KE... |
1236 1237 1238 1239 |
* kernfs_drain() drops kernfs_mutex temporarily and @pos's * base ref could have been put by someone else by the time * the function returns. Make sure it doesn't go away * underneath us. |
35beab063 kernfs: restructu... |
1240 1241 |
*/ kernfs_get(pos); |
d35258ef7 kernfs: allow nod... |
1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 |
/* * Drain iff @kn was activated. This avoids draining and * its lockdep annotations for nodes which have never been * activated and allows embedding kernfs_remove() in create * error paths without worrying about draining. */ if (kn->flags & KERNFS_ACTIVATED) kernfs_drain(pos); else WARN_ON_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS); |
35beab063 kernfs: restructu... |
1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 |
/* * kernfs_unlink_sibling() succeeds once per node. Use it * to decide who's responsible for cleanups. */ if (!pos->parent || kernfs_unlink_sibling(pos)) { struct kernfs_iattrs *ps_iattr = pos->parent ? pos->parent->iattr : NULL; /* update timestamps on the parent */ if (ps_iattr) { |
058952196 kernfs: clean up ... |
1263 1264 |
ktime_get_real_ts64(&ps_iattr->ia_ctime); ps_iattr->ia_mtime = ps_iattr->ia_ctime; |
35beab063 kernfs: restructu... |
1265 |
} |
988cd7afb kernfs: remove ke... |
1266 |
kernfs_put(pos); |
35beab063 kernfs: restructu... |
1267 1268 1269 1270 |
} kernfs_put(pos); } while (pos != kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1271 1272 1273 |
} /** |
324a56e16 kernfs: s/sysfs_d... |
1274 1275 |
* kernfs_remove - remove a kernfs_node recursively * @kn: the kernfs_node to remove |
fd7b9f7b9 sysfs, kernfs: mo... |
1276 |
* |
324a56e16 kernfs: s/sysfs_d... |
1277 |
* Remove @kn along with all its subdirectories and files. |
fd7b9f7b9 sysfs, kernfs: mo... |
1278 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
1279 |
void kernfs_remove(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
1280 |
{ |
988cd7afb kernfs: remove ke... |
1281 1282 1283 |
mutex_lock(&kernfs_mutex); __kernfs_remove(kn); mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1284 1285 1286 |
} /** |
6b0afc2a2 kernfs, sysfs, dr... |
1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 |
* kernfs_break_active_protection - break out of active protection * @kn: the self kernfs_node * * The caller must be running off of a kernfs operation which is invoked * with an active reference - e.g. one of kernfs_ops. Each invocation of * this function must also be matched with an invocation of * kernfs_unbreak_active_protection(). * * This function releases the active reference of @kn the caller is * holding. Once this function is called, @kn may be removed at any point * and the caller is solely responsible for ensuring that the objects it * dereferences are accessible. */ void kernfs_break_active_protection(struct kernfs_node *kn) { /* * Take out ourself out of the active ref dependency chain. If * we're called without an active ref, lockdep will complain. */ kernfs_put_active(kn); } /** * kernfs_unbreak_active_protection - undo kernfs_break_active_protection() * @kn: the self kernfs_node * * If kernfs_break_active_protection() was called, this function must be * invoked before finishing the kernfs operation. Note that while this * function restores the active reference, it doesn't and can't actually * restore the active protection - @kn may already or be in the process of * being removed. Once kernfs_break_active_protection() is invoked, that * protection is irreversibly gone for the kernfs operation instance. * * While this function may be called at any point after * kernfs_break_active_protection() is invoked, its most useful location * would be right before the enclosing kernfs operation returns. */ void kernfs_unbreak_active_protection(struct kernfs_node *kn) { /* * @kn->active could be in any state; however, the increment we do * here will be undone as soon as the enclosing kernfs operation * finishes and this temporary bump can't break anything. If @kn * is alive, nothing changes. If @kn is being deactivated, the * soon-to-follow put will either finish deactivation or restore * deactivated state. If @kn is already removed, the temporary * bump is guaranteed to be gone before @kn is released. */ atomic_inc(&kn->active); if (kernfs_lockdep(kn)) rwsem_acquire(&kn->dep_map, 0, 1, _RET_IP_); } /** * kernfs_remove_self - remove a kernfs_node from its own method * @kn: the self kernfs_node to remove * * The caller must be running off of a kernfs operation which is invoked * with an active reference - e.g. one of kernfs_ops. This can be used to * implement a file operation which deletes itself. * * For example, the "delete" file for a sysfs device directory can be * implemented by invoking kernfs_remove_self() on the "delete" file * itself. This function breaks the circular dependency of trying to * deactivate self while holding an active ref itself. It isn't necessary * to modify the usual removal path to use kernfs_remove_self(). The * "delete" implementation can simply invoke kernfs_remove_self() on self * before proceeding with the usual removal path. kernfs will ignore later * kernfs_remove() on self. * * kernfs_remove_self() can be called multiple times concurrently on the * same kernfs_node. Only the first one actually performs removal and * returns %true. All others will wait until the kernfs operation which * won self-removal finishes and return %false. Note that the losers wait * for the completion of not only the winning kernfs_remove_self() but also * the whole kernfs_ops which won the arbitration. This can be used to * guarantee, for example, all concurrent writes to a "delete" file to * finish only after the whole operation is complete. */ bool kernfs_remove_self(struct kernfs_node *kn) { bool ret; mutex_lock(&kernfs_mutex); kernfs_break_active_protection(kn); /* * SUICIDAL is used to arbitrate among competing invocations. Only * the first one will actually perform removal. When the removal * is complete, SUICIDED is set and the active ref is restored * while holding kernfs_mutex. The ones which lost arbitration * waits for SUICDED && drained which can happen only after the * enclosing kernfs operation which executed the winning instance * of kernfs_remove_self() finished. */ if (!(kn->flags & KERNFS_SUICIDAL)) { kn->flags |= KERNFS_SUICIDAL; __kernfs_remove(kn); kn->flags |= KERNFS_SUICIDED; ret = true; } else { wait_queue_head_t *waitq = &kernfs_root(kn)->deactivate_waitq; DEFINE_WAIT(wait); while (true) { prepare_to_wait(waitq, &wait, TASK_UNINTERRUPTIBLE); if ((kn->flags & KERNFS_SUICIDED) && atomic_read(&kn->active) == KN_DEACTIVATED_BIAS) break; mutex_unlock(&kernfs_mutex); schedule(); mutex_lock(&kernfs_mutex); } finish_wait(waitq, &wait); WARN_ON_ONCE(!RB_EMPTY_NODE(&kn->rb)); ret = false; } /* * This must be done while holding kernfs_mutex; otherwise, waiting * for SUICIDED && deactivated could finish prematurely. */ kernfs_unbreak_active_protection(kn); mutex_unlock(&kernfs_mutex); return ret; } /** |
324a56e16 kernfs: s/sysfs_d... |
1418 1419 1420 1421 |
* kernfs_remove_by_name_ns - find a kernfs_node by name and remove it * @parent: parent of the target * @name: name of the kernfs_node to remove * @ns: namespace tag of the kernfs_node to remove |
fd7b9f7b9 sysfs, kernfs: mo... |
1422 |
* |
324a56e16 kernfs: s/sysfs_d... |
1423 1424 |
* Look for the kernfs_node with @name and @ns under @parent and remove it. * Returns 0 on success, -ENOENT if such entry doesn't exist. |
fd7b9f7b9 sysfs, kernfs: mo... |
1425 |
*/ |
324a56e16 kernfs: s/sysfs_d... |
1426 |
int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name, |
fd7b9f7b9 sysfs, kernfs: mo... |
1427 1428 |
const void *ns) { |
324a56e16 kernfs: s/sysfs_d... |
1429 |
struct kernfs_node *kn; |
fd7b9f7b9 sysfs, kernfs: mo... |
1430 |
|
324a56e16 kernfs: s/sysfs_d... |
1431 |
if (!parent) { |
c637b8acb kernfs: s/sysfs/k... |
1432 1433 |
WARN(1, KERN_WARNING "kernfs: can not remove '%s', no directory ", |
fd7b9f7b9 sysfs, kernfs: mo... |
1434 1435 1436 |
name); return -ENOENT; } |
988cd7afb kernfs: remove ke... |
1437 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1438 |
|
324a56e16 kernfs: s/sysfs_d... |
1439 1440 |
kn = kernfs_find_ns(parent, name, ns); if (kn) |
988cd7afb kernfs: remove ke... |
1441 |
__kernfs_remove(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1442 |
|
988cd7afb kernfs: remove ke... |
1443 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1444 |
|
324a56e16 kernfs: s/sysfs_d... |
1445 |
if (kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
1446 1447 1448 1449 1450 1451 1452 |
return 0; else return -ENOENT; } /** * kernfs_rename_ns - move and rename a kernfs_node |
324a56e16 kernfs: s/sysfs_d... |
1453 |
* @kn: target node |
fd7b9f7b9 sysfs, kernfs: mo... |
1454 1455 1456 1457 |
* @new_parent: new parent to put @sd under * @new_name: new name * @new_ns: new namespace tag */ |
324a56e16 kernfs: s/sysfs_d... |
1458 |
int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent, |
fd7b9f7b9 sysfs, kernfs: mo... |
1459 1460 |
const char *new_name, const void *new_ns) { |
3eef34ad7 kernfs: implement... |
1461 1462 |
struct kernfs_node *old_parent; const char *old_name = NULL; |
fd7b9f7b9 sysfs, kernfs: mo... |
1463 |
int error; |
3eef34ad7 kernfs: implement... |
1464 1465 1466 |
/* can't move or rename root */ if (!kn->parent) return -EINVAL; |
798c75a0d Revert "kernfs: r... |
1467 |
mutex_lock(&kernfs_mutex); |
d0ae3d434 kernfs: add REMOV... |
1468 |
error = -ENOENT; |
ea015218f kernfs: Add suppo... |
1469 1470 |
if (!kernfs_active(kn) || !kernfs_active(new_parent) || (new_parent->flags & KERNFS_EMPTY_DIR)) |
d0ae3d434 kernfs: add REMOV... |
1471 |
goto out; |
fd7b9f7b9 sysfs, kernfs: mo... |
1472 |
error = 0; |
adc5e8b58 kernfs: drop s_ p... |
1473 1474 |
if ((kn->parent == new_parent) && (kn->ns == new_ns) && (strcmp(kn->name, new_name) == 0)) |
798c75a0d Revert "kernfs: r... |
1475 |
goto out; /* nothing to rename */ |
fd7b9f7b9 sysfs, kernfs: mo... |
1476 1477 1478 |
error = -EEXIST; if (kernfs_find_ns(new_parent, new_name, new_ns)) |
798c75a0d Revert "kernfs: r... |
1479 |
goto out; |
fd7b9f7b9 sysfs, kernfs: mo... |
1480 |
|
324a56e16 kernfs: s/sysfs_d... |
1481 |
/* rename kernfs_node */ |
adc5e8b58 kernfs: drop s_ p... |
1482 |
if (strcmp(kn->name, new_name) != 0) { |
fd7b9f7b9 sysfs, kernfs: mo... |
1483 |
error = -ENOMEM; |
75287a677 kernfs: convert n... |
1484 |
new_name = kstrdup_const(new_name, GFP_KERNEL); |
fd7b9f7b9 sysfs, kernfs: mo... |
1485 |
if (!new_name) |
798c75a0d Revert "kernfs: r... |
1486 |
goto out; |
3eef34ad7 kernfs: implement... |
1487 1488 |
} else { new_name = NULL; |
fd7b9f7b9 sysfs, kernfs: mo... |
1489 1490 1491 1492 1493 |
} /* * Move to the appropriate place in the appropriate directories rbtree. */ |
c637b8acb kernfs: s/sysfs/k... |
1494 |
kernfs_unlink_sibling(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1495 |
kernfs_get(new_parent); |
3eef34ad7 kernfs: implement... |
1496 1497 1498 1499 1500 |
/* rename_lock protects ->parent and ->name accessors */ spin_lock_irq(&kernfs_rename_lock); old_parent = kn->parent; |
adc5e8b58 kernfs: drop s_ p... |
1501 |
kn->parent = new_parent; |
3eef34ad7 kernfs: implement... |
1502 1503 1504 |
kn->ns = new_ns; if (new_name) { |
dfeb0750b kernfs: remove KE... |
1505 |
old_name = kn->name; |
3eef34ad7 kernfs: implement... |
1506 1507 1508 1509 |
kn->name = new_name; } spin_unlock_irq(&kernfs_rename_lock); |
9561a8961 kernfs: fix hash ... |
1510 |
kn->hash = kernfs_name_hash(kn->name, kn->ns); |
c637b8acb kernfs: s/sysfs/k... |
1511 |
kernfs_link_sibling(kn); |
fd7b9f7b9 sysfs, kernfs: mo... |
1512 |
|
3eef34ad7 kernfs: implement... |
1513 |
kernfs_put(old_parent); |
75287a677 kernfs: convert n... |
1514 |
kfree_const(old_name); |
3eef34ad7 kernfs: implement... |
1515 |
|
fd7b9f7b9 sysfs, kernfs: mo... |
1516 |
error = 0; |
798c75a0d Revert "kernfs: r... |
1517 |
out: |
a797bfc30 kernfs: s/sysfs/k... |
1518 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1519 1520 |
return error; } |
fd7b9f7b9 sysfs, kernfs: mo... |
1521 |
/* Relationship between s_mode and the DT_xxx types */ |
324a56e16 kernfs: s/sysfs_d... |
1522 |
static inline unsigned char dt_type(struct kernfs_node *kn) |
fd7b9f7b9 sysfs, kernfs: mo... |
1523 |
{ |
adc5e8b58 kernfs: drop s_ p... |
1524 |
return (kn->mode >> 12) & 15; |
fd7b9f7b9 sysfs, kernfs: mo... |
1525 |
} |
c637b8acb kernfs: s/sysfs/k... |
1526 |
static int kernfs_dir_fop_release(struct inode *inode, struct file *filp) |
fd7b9f7b9 sysfs, kernfs: mo... |
1527 1528 1529 1530 |
{ kernfs_put(filp->private_data); return 0; } |
c637b8acb kernfs: s/sysfs/k... |
1531 |
static struct kernfs_node *kernfs_dir_pos(const void *ns, |
324a56e16 kernfs: s/sysfs_d... |
1532 |
struct kernfs_node *parent, loff_t hash, struct kernfs_node *pos) |
fd7b9f7b9 sysfs, kernfs: mo... |
1533 1534 |
{ if (pos) { |
81c173cb5 kernfs: remove KE... |
1535 |
int valid = kernfs_active(pos) && |
798c75a0d Revert "kernfs: r... |
1536 |
pos->parent == parent && hash == pos->hash; |
fd7b9f7b9 sysfs, kernfs: mo... |
1537 1538 1539 1540 1541 |
kernfs_put(pos); if (!valid) pos = NULL; } if (!pos && (hash > 1) && (hash < INT_MAX)) { |
adc5e8b58 kernfs: drop s_ p... |
1542 |
struct rb_node *node = parent->dir.children.rb_node; |
fd7b9f7b9 sysfs, kernfs: mo... |
1543 |
while (node) { |
324a56e16 kernfs: s/sysfs_d... |
1544 |
pos = rb_to_kn(node); |
fd7b9f7b9 sysfs, kernfs: mo... |
1545 |
|
adc5e8b58 kernfs: drop s_ p... |
1546 |
if (hash < pos->hash) |
fd7b9f7b9 sysfs, kernfs: mo... |
1547 |
node = node->rb_left; |
adc5e8b58 kernfs: drop s_ p... |
1548 |
else if (hash > pos->hash) |
fd7b9f7b9 sysfs, kernfs: mo... |
1549 1550 1551 1552 1553 |
node = node->rb_right; else break; } } |
b9c9dad0c kernfs: add missi... |
1554 1555 |
/* Skip over entries which are dying/dead or in the wrong namespace */ while (pos && (!kernfs_active(pos) || pos->ns != ns)) { |
adc5e8b58 kernfs: drop s_ p... |
1556 |
struct rb_node *node = rb_next(&pos->rb); |
fd7b9f7b9 sysfs, kernfs: mo... |
1557 1558 1559 |
if (!node) pos = NULL; else |
324a56e16 kernfs: s/sysfs_d... |
1560 |
pos = rb_to_kn(node); |
fd7b9f7b9 sysfs, kernfs: mo... |
1561 1562 1563 |
} return pos; } |
c637b8acb kernfs: s/sysfs/k... |
1564 |
static struct kernfs_node *kernfs_dir_next_pos(const void *ns, |
324a56e16 kernfs: s/sysfs_d... |
1565 |
struct kernfs_node *parent, ino_t ino, struct kernfs_node *pos) |
fd7b9f7b9 sysfs, kernfs: mo... |
1566 |
{ |
c637b8acb kernfs: s/sysfs/k... |
1567 |
pos = kernfs_dir_pos(ns, parent, ino, pos); |
b9c9dad0c kernfs: add missi... |
1568 |
if (pos) { |
fd7b9f7b9 sysfs, kernfs: mo... |
1569 |
do { |
adc5e8b58 kernfs: drop s_ p... |
1570 |
struct rb_node *node = rb_next(&pos->rb); |
fd7b9f7b9 sysfs, kernfs: mo... |
1571 1572 1573 |
if (!node) pos = NULL; else |
324a56e16 kernfs: s/sysfs_d... |
1574 |
pos = rb_to_kn(node); |
b9c9dad0c kernfs: add missi... |
1575 1576 |
} while (pos && (!kernfs_active(pos) || pos->ns != ns)); } |
fd7b9f7b9 sysfs, kernfs: mo... |
1577 1578 |
return pos; } |
c637b8acb kernfs: s/sysfs/k... |
1579 |
static int kernfs_fop_readdir(struct file *file, struct dir_context *ctx) |
fd7b9f7b9 sysfs, kernfs: mo... |
1580 1581 |
{ struct dentry *dentry = file->f_path.dentry; |
319ba91d3 kernfs: don't set... |
1582 |
struct kernfs_node *parent = kernfs_dentry_node(dentry); |
324a56e16 kernfs: s/sysfs_d... |
1583 |
struct kernfs_node *pos = file->private_data; |
fd7b9f7b9 sysfs, kernfs: mo... |
1584 1585 1586 1587 |
const void *ns = NULL; if (!dir_emit_dots(file, ctx)) return 0; |
a797bfc30 kernfs: s/sysfs/k... |
1588 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1589 |
|
324a56e16 kernfs: s/sysfs_d... |
1590 |
if (kernfs_ns_enabled(parent)) |
c525aaddc kernfs: s/sysfs/k... |
1591 |
ns = kernfs_info(dentry->d_sb)->ns; |
fd7b9f7b9 sysfs, kernfs: mo... |
1592 |
|
c637b8acb kernfs: s/sysfs/k... |
1593 |
for (pos = kernfs_dir_pos(ns, parent, ctx->pos, pos); |
fd7b9f7b9 sysfs, kernfs: mo... |
1594 |
pos; |
c637b8acb kernfs: s/sysfs/k... |
1595 |
pos = kernfs_dir_next_pos(ns, parent, ctx->pos, pos)) { |
adc5e8b58 kernfs: drop s_ p... |
1596 |
const char *name = pos->name; |
fd7b9f7b9 sysfs, kernfs: mo... |
1597 1598 |
unsigned int type = dt_type(pos); int len = strlen(name); |
67c0496e8 kernfs: convert k... |
1599 |
ino_t ino = kernfs_ino(pos); |
fd7b9f7b9 sysfs, kernfs: mo... |
1600 |
|
adc5e8b58 kernfs: drop s_ p... |
1601 |
ctx->pos = pos->hash; |
fd7b9f7b9 sysfs, kernfs: mo... |
1602 1603 |
file->private_data = pos; kernfs_get(pos); |
a797bfc30 kernfs: s/sysfs/k... |
1604 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1605 1606 |
if (!dir_emit(ctx, name, len, ino, type)) return 0; |
a797bfc30 kernfs: s/sysfs/k... |
1607 |
mutex_lock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1608 |
} |
a797bfc30 kernfs: s/sysfs/k... |
1609 |
mutex_unlock(&kernfs_mutex); |
fd7b9f7b9 sysfs, kernfs: mo... |
1610 1611 1612 1613 |
file->private_data = NULL; ctx->pos = INT_MAX; return 0; } |
a797bfc30 kernfs: s/sysfs/k... |
1614 |
const struct file_operations kernfs_dir_fops = { |
fd7b9f7b9 sysfs, kernfs: mo... |
1615 |
.read = generic_read_dir, |
8cb0d2c1c kernfs: no point ... |
1616 |
.iterate_shared = kernfs_fop_readdir, |
c637b8acb kernfs: s/sysfs/k... |
1617 |
.release = kernfs_dir_fop_release, |
8cb0d2c1c kernfs: no point ... |
1618 |
.llseek = generic_file_llseek, |
fd7b9f7b9 sysfs, kernfs: mo... |
1619 |
}; |