]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - fs/sysfs/file.c
ethernet: s2io: fix setting mac address during resume
[mirror_ubuntu-focal-kernel.git] / fs / sysfs / file.c
CommitLineData
619daeee 1// SPDX-License-Identifier: GPL-2.0
1da177e4 2/*
6d66f5cd
TH
3 * fs/sysfs/file.c - sysfs regular (text) file implementation
4 *
5 * Copyright (c) 2001-3 Patrick Mochel
6 * Copyright (c) 2007 SUSE Linux Products GmbH
7 * Copyright (c) 2007 Tejun Heo <teheo@suse.de>
8 *
6d66f5cd 9 * Please see Documentation/filesystems/sysfs.txt for more information.
1da177e4
LT
10 */
11
12#include <linux/module.h>
1da177e4 13#include <linux/kobject.h>
c6f87733 14#include <linux/slab.h>
94bebf4d 15#include <linux/list.h>
52e8c209 16#include <linux/mutex.h>
13c589d5 17#include <linux/seq_file.h>
ce4a3168 18#include <linux/mm.h>
1da177e4
LT
19
20#include "sysfs.h"
f6acf8bb 21
375b611e 22/*
324a56e1 23 * Determine ktype->sysfs_ops for the given kernfs_node. This function
375b611e
TH
24 * must be called while holding an active reference.
25 */
324a56e1 26static const struct sysfs_ops *sysfs_file_ops(struct kernfs_node *kn)
375b611e 27{
adc5e8b5 28 struct kobject *kobj = kn->parent->priv;
375b611e 29
df23fc39 30 if (kn->flags & KERNFS_LOCKDEP)
324a56e1 31 lockdep_assert_held(kn);
375b611e
TH
32 return kobj->ktype ? kobj->ktype->sysfs_ops : NULL;
33}
34
13c589d5
TH
35/*
36 * Reads on sysfs are handled through seq_file, which takes care of hairy
37 * details like buffering and seeking. The following function pipes
38 * sysfs_ops->show() result through seq_file.
1da177e4 39 */
c2b19daf 40static int sysfs_kf_seq_show(struct seq_file *sf, void *v)
1da177e4 41{
c525aadd 42 struct kernfs_open_file *of = sf->private;
adc5e8b5 43 struct kobject *kobj = of->kn->parent->priv;
324a56e1 44 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
1da177e4 45 ssize_t count;
c2b19daf 46 char *buf;
1da177e4 47
f5c16f29 48 /* acquire buffer and ensure that it's >= PAGE_SIZE and clear */
13c589d5
TH
49 count = seq_get_buf(sf, &buf);
50 if (count < PAGE_SIZE) {
51 seq_commit(sf, -1);
52 return 0;
53 }
f5c16f29 54 memset(buf, 0, PAGE_SIZE);
1da177e4 55
13c589d5 56 /*
c2b19daf
TH
57 * Invoke show(). Control may reach here via seq file lseek even
58 * if @ops->show() isn't implemented.
13c589d5 59 */
c2b19daf 60 if (ops->show) {
324a56e1 61 count = ops->show(kobj, of->kn->priv, buf);
c2b19daf
TH
62 if (count < 0)
63 return count;
64 }
0ab66088 65
8118a859
MX
66 /*
67 * The code works fine with PAGE_SIZE return but it's likely to
68 * indicate truncated result or overflow in normal use cases.
69 */
815d2d50 70 if (count >= (ssize_t)PAGE_SIZE) {
9e6d35ff
SS
71 printk("fill_read_buffer: %pS returned bad count\n",
72 ops->show);
815d2d50
AM
73 /* Try to struggle along */
74 count = PAGE_SIZE - 1;
75 }
13c589d5
TH
76 seq_commit(sf, count);
77 return 0;
1da177e4
LT
78}
79
c525aadd 80static ssize_t sysfs_kf_bin_read(struct kernfs_open_file *of, char *buf,
c2b19daf 81 size_t count, loff_t pos)
2f0c6b75 82{
324a56e1 83 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 84 struct kobject *kobj = of->kn->parent->priv;
c2b19daf 85 loff_t size = file_inode(of->file)->i_size;
2f0c6b75 86
c2b19daf 87 if (!count)
2f0c6b75
TH
88 return 0;
89
90 if (size) {
eaa5cd92 91 if (pos >= size)
2f0c6b75 92 return 0;
c2b19daf
TH
93 if (pos + count > size)
94 count = size - pos;
2f0c6b75
TH
95 }
96
c2b19daf
TH
97 if (!battr->read)
98 return -EIO;
99
100 return battr->read(of->file, kobj, battr, buf, pos, count);
101}
102
4ef67a8c
N
103/* kernfs read callback for regular sysfs files with pre-alloc */
104static ssize_t sysfs_kf_read(struct kernfs_open_file *of, char *buf,
105 size_t count, loff_t pos)
106{
107 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
108 struct kobject *kobj = of->kn->parent->priv;
c8a139d0 109 ssize_t len;
4ef67a8c
N
110
111 /*
112 * If buf != of->prealloc_buf, we don't know how
113 * large it is, so cannot safely pass it to ->show
114 */
17d0774f 115 if (WARN_ON_ONCE(buf != of->prealloc_buf))
4ef67a8c 116 return 0;
65da3484 117 len = ops->show(kobj, of->kn->priv, buf);
c8a139d0
N
118 if (len < 0)
119 return len;
17d0774f
KK
120 if (pos) {
121 if (len <= pos)
122 return 0;
123 len -= pos;
124 memmove(buf, buf + pos, len);
125 }
c8a139d0 126 return min_t(ssize_t, count, len);
4ef67a8c
N
127}
128
50b38ca0 129/* kernfs write callback for regular sysfs files */
c525aadd 130static ssize_t sysfs_kf_write(struct kernfs_open_file *of, char *buf,
50b38ca0 131 size_t count, loff_t pos)
1da177e4 132{
324a56e1 133 const struct sysfs_ops *ops = sysfs_file_ops(of->kn);
adc5e8b5 134 struct kobject *kobj = of->kn->parent->priv;
0ab66088 135
50b38ca0
TH
136 if (!count)
137 return 0;
0ab66088 138
324a56e1 139 return ops->store(kobj, of->kn->priv, buf, count);
50b38ca0 140}
f9b9a621 141
50b38ca0 142/* kernfs write callback for bin sysfs files */
c525aadd 143static ssize_t sysfs_kf_bin_write(struct kernfs_open_file *of, char *buf,
50b38ca0
TH
144 size_t count, loff_t pos)
145{
324a56e1 146 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 147 struct kobject *kobj = of->kn->parent->priv;
50b38ca0 148 loff_t size = file_inode(of->file)->i_size;
f9b9a621 149
50b38ca0
TH
150 if (size) {
151 if (size <= pos)
09368960 152 return -EFBIG;
50b38ca0 153 count = min_t(ssize_t, count, size - pos);
f9b9a621 154 }
50b38ca0
TH
155 if (!count)
156 return 0;
0ab66088 157
50b38ca0
TH
158 if (!battr->write)
159 return -EIO;
1da177e4 160
50b38ca0 161 return battr->write(of->file, kobj, battr, buf, pos, count);
1da177e4
LT
162}
163
c525aadd 164static int sysfs_kf_bin_mmap(struct kernfs_open_file *of,
fdbffaa4
TH
165 struct vm_area_struct *vma)
166{
324a56e1 167 struct bin_attribute *battr = of->kn->priv;
adc5e8b5 168 struct kobject *kobj = of->kn->parent->priv;
fdbffaa4 169
fdbffaa4
TH
170 return battr->mmap(of->file, kobj, battr, vma);
171}
172
324a56e1 173void sysfs_notify(struct kobject *kobj, const char *dir, const char *attr)
4508a7a7 174{
324a56e1 175 struct kernfs_node *kn = kobj->sd, *tmp;
51225039 176
324a56e1
TH
177 if (kn && dir)
178 kn = kernfs_find_and_get(kn, dir);
024f6471 179 else
324a56e1 180 kernfs_get(kn);
024f6471 181
324a56e1
TH
182 if (kn && attr) {
183 tmp = kernfs_find_and_get(kn, attr);
184 kernfs_put(kn);
185 kn = tmp;
024f6471 186 }
51225039 187
324a56e1
TH
188 if (kn) {
189 kernfs_notify(kn);
190 kernfs_put(kn);
024f6471 191 }
4508a7a7
N
192}
193EXPORT_SYMBOL_GPL(sysfs_notify);
194
f6acf8bb
TH
195static const struct kernfs_ops sysfs_file_kfops_empty = {
196};
197
198static const struct kernfs_ops sysfs_file_kfops_ro = {
199 .seq_show = sysfs_kf_seq_show,
200};
201
202static const struct kernfs_ops sysfs_file_kfops_wo = {
203 .write = sysfs_kf_write,
204};
205
206static const struct kernfs_ops sysfs_file_kfops_rw = {
207 .seq_show = sysfs_kf_seq_show,
208 .write = sysfs_kf_write,
209};
210
4ef67a8c
N
211static const struct kernfs_ops sysfs_prealloc_kfops_ro = {
212 .read = sysfs_kf_read,
213 .prealloc = true,
214};
215
2b75869b
N
216static const struct kernfs_ops sysfs_prealloc_kfops_wo = {
217 .write = sysfs_kf_write,
218 .prealloc = true,
219};
220
221static const struct kernfs_ops sysfs_prealloc_kfops_rw = {
4ef67a8c 222 .read = sysfs_kf_read,
2b75869b
N
223 .write = sysfs_kf_write,
224 .prealloc = true,
225};
226
f6acf8bb
TH
227static const struct kernfs_ops sysfs_bin_kfops_ro = {
228 .read = sysfs_kf_bin_read,
229};
230
231static const struct kernfs_ops sysfs_bin_kfops_wo = {
232 .write = sysfs_kf_bin_write,
233};
234
235static const struct kernfs_ops sysfs_bin_kfops_rw = {
236 .read = sysfs_kf_bin_read,
237 .write = sysfs_kf_bin_write,
9b2db6e1
TH
238};
239
240static const struct kernfs_ops sysfs_bin_kfops_mmap = {
241 .read = sysfs_kf_bin_read,
242 .write = sysfs_kf_bin_write,
f6acf8bb
TH
243 .mmap = sysfs_kf_bin_mmap,
244};
245
324a56e1 246int sysfs_add_file_mode_ns(struct kernfs_node *parent,
a7dc66df 247 const struct attribute *attr, bool is_bin,
5f81880d 248 umode_t mode, kuid_t uid, kgid_t gid, const void *ns)
1da177e4 249{
517e64f5 250 struct lock_class_key *key = NULL;
f6acf8bb 251 const struct kernfs_ops *ops;
324a56e1 252 struct kernfs_node *kn;
471bd7b7 253 loff_t size;
1da177e4 254
a7dc66df 255 if (!is_bin) {
324a56e1 256 struct kobject *kobj = parent->priv;
f6acf8bb
TH
257 const struct sysfs_ops *sysfs_ops = kobj->ktype->sysfs_ops;
258
259 /* every kobject with an attribute needs a ktype assigned */
260 if (WARN(!sysfs_ops, KERN_ERR
261 "missing sysfs attribute operations for kobject: %s\n",
262 kobject_name(kobj)))
263 return -EINVAL;
264
2b75869b
N
265 if (sysfs_ops->show && sysfs_ops->store) {
266 if (mode & SYSFS_PREALLOC)
267 ops = &sysfs_prealloc_kfops_rw;
268 else
269 ops = &sysfs_file_kfops_rw;
4ef67a8c
N
270 } else if (sysfs_ops->show) {
271 if (mode & SYSFS_PREALLOC)
272 ops = &sysfs_prealloc_kfops_ro;
273 else
274 ops = &sysfs_file_kfops_ro;
275 } else if (sysfs_ops->store) {
2b75869b
N
276 if (mode & SYSFS_PREALLOC)
277 ops = &sysfs_prealloc_kfops_wo;
278 else
279 ops = &sysfs_file_kfops_wo;
280 } else
f6acf8bb 281 ops = &sysfs_file_kfops_empty;
471bd7b7
TH
282
283 size = PAGE_SIZE;
f6acf8bb
TH
284 } else {
285 struct bin_attribute *battr = (void *)attr;
286
9b2db6e1
TH
287 if (battr->mmap)
288 ops = &sysfs_bin_kfops_mmap;
289 else if (battr->read && battr->write)
f6acf8bb
TH
290 ops = &sysfs_bin_kfops_rw;
291 else if (battr->read)
292 ops = &sysfs_bin_kfops_ro;
293 else if (battr->write)
294 ops = &sysfs_bin_kfops_wo;
295 else
296 ops = &sysfs_file_kfops_empty;
471bd7b7
TH
297
298 size = battr->size;
f6acf8bb
TH
299 }
300
517e64f5
TH
301#ifdef CONFIG_DEBUG_LOCK_ALLOC
302 if (!attr->ignore_lockdep)
303 key = attr->key ?: (struct lock_class_key *)&attr->skey;
304#endif
5f81880d
DT
305
306 kn = __kernfs_create_file(parent, attr->name, mode & 0777, uid, gid,
488dee96 307 size, ops, (void *)attr, ns, key);
324a56e1
TH
308 if (IS_ERR(kn)) {
309 if (PTR_ERR(kn) == -EEXIST)
310 sysfs_warn_dup(parent, attr->name);
311 return PTR_ERR(kn);
496f7394
TH
312 }
313 return 0;
314}
315
1da177e4 316/**
58292cbe
TH
317 * sysfs_create_file_ns - create an attribute file for an object with custom ns
318 * @kobj: object we're creating for
319 * @attr: attribute descriptor
320 * @ns: namespace the new file should belong to
1da177e4 321 */
58292cbe
TH
322int sysfs_create_file_ns(struct kobject *kobj, const struct attribute *attr,
323 const void *ns)
1da177e4 324{
5f81880d
DT
325 kuid_t uid;
326 kgid_t gid;
327
de96e9fe
GKH
328 if (WARN_ON(!kobj || !kobj->sd || !attr))
329 return -EINVAL;
1da177e4 330
5f81880d
DT
331 kobject_get_ownership(kobj, &uid, &gid);
332 return sysfs_add_file_mode_ns(kobj->sd, attr, false, attr->mode,
333 uid, gid, ns);
1da177e4
LT
334
335}
58292cbe 336EXPORT_SYMBOL_GPL(sysfs_create_file_ns);
1da177e4 337
9ee4685c 338int sysfs_create_files(struct kobject *kobj, const struct attribute * const *ptr)
1c205ae1
AK
339{
340 int err = 0;
341 int i;
342
343 for (i = 0; ptr[i] && !err; i++)
344 err = sysfs_create_file(kobj, ptr[i]);
345 if (err)
346 while (--i >= 0)
347 sysfs_remove_file(kobj, ptr[i]);
348 return err;
349}
1b866757 350EXPORT_SYMBOL_GPL(sysfs_create_files);
1da177e4 351
dfa87c82
AS
352/**
353 * sysfs_add_file_to_group - add an attribute file to a pre-existing group.
354 * @kobj: object we're acting for.
355 * @attr: attribute descriptor.
356 * @group: group name.
357 */
358int sysfs_add_file_to_group(struct kobject *kobj,
359 const struct attribute *attr, const char *group)
360{
324a56e1 361 struct kernfs_node *parent;
5f81880d
DT
362 kuid_t uid;
363 kgid_t gid;
dfa87c82
AS
364 int error;
365
ccf73cf3 366 if (group) {
324a56e1 367 parent = kernfs_find_and_get(kobj->sd, group);
ccf73cf3 368 } else {
324a56e1
TH
369 parent = kobj->sd;
370 kernfs_get(parent);
ccf73cf3 371 }
11f24fbd 372
324a56e1 373 if (!parent)
608e266a
TH
374 return -ENOENT;
375
5f81880d 376 kobject_get_ownership(kobj, &uid, &gid);
d1753390 377 error = sysfs_add_file_mode_ns(parent, attr, false,
5f81880d 378 attr->mode, uid, gid, NULL);
324a56e1 379 kernfs_put(parent);
608e266a 380
dfa87c82
AS
381 return error;
382}
383EXPORT_SYMBOL_GPL(sysfs_add_file_to_group);
384
31e5abe9
KS
385/**
386 * sysfs_chmod_file - update the modified mode value on an object attribute.
387 * @kobj: object we're acting for.
388 * @attr: attribute descriptor.
389 * @mode: file permissions.
390 *
391 */
49c19400 392int sysfs_chmod_file(struct kobject *kobj, const struct attribute *attr,
48176a97 393 umode_t mode)
31e5abe9 394{
324a56e1 395 struct kernfs_node *kn;
bc062b1b 396 struct iattr newattrs;
51225039
TH
397 int rc;
398
324a56e1
TH
399 kn = kernfs_find_and_get(kobj->sd, attr->name);
400 if (!kn)
5d60418e 401 return -ENOENT;
f88123ea 402
adc5e8b5 403 newattrs.ia_mode = (mode & S_IALLUGO) | (kn->mode & ~S_IALLUGO);
4c6974f5 404 newattrs.ia_valid = ATTR_MODE;
f88123ea 405
324a56e1 406 rc = kernfs_setattr(kn, &newattrs);
5d60418e 407
324a56e1 408 kernfs_put(kn);
51225039 409 return rc;
31e5abe9
KS
410}
411EXPORT_SYMBOL_GPL(sysfs_chmod_file);
412
2afc9166
BVA
413/**
414 * sysfs_break_active_protection - break "active" protection
415 * @kobj: The kernel object @attr is associated with.
416 * @attr: The attribute to break the "active" protection for.
417 *
418 * With sysfs, just like kernfs, deletion of an attribute is postponed until
419 * all active .show() and .store() callbacks have finished unless this function
420 * is called. Hence this function is useful in methods that implement self
421 * deletion.
422 */
423struct kernfs_node *sysfs_break_active_protection(struct kobject *kobj,
424 const struct attribute *attr)
425{
426 struct kernfs_node *kn;
427
428 kobject_get(kobj);
429 kn = kernfs_find_and_get(kobj->sd, attr->name);
430 if (kn)
431 kernfs_break_active_protection(kn);
432 return kn;
433}
434EXPORT_SYMBOL_GPL(sysfs_break_active_protection);
435
436/**
437 * sysfs_unbreak_active_protection - restore "active" protection
438 * @kn: Pointer returned by sysfs_break_active_protection().
439 *
440 * Undo the effects of sysfs_break_active_protection(). Since this function
441 * calls kernfs_put() on the kernfs node that corresponds to the 'attr'
442 * argument passed to sysfs_break_active_protection() that attribute may have
443 * been removed between the sysfs_break_active_protection() and
444 * sysfs_unbreak_active_protection() calls, it is not safe to access @kn after
445 * this function has returned.
446 */
447void sysfs_unbreak_active_protection(struct kernfs_node *kn)
448{
449 struct kobject *kobj = kn->parent->priv;
450
451 kernfs_unbreak_active_protection(kn);
452 kernfs_put(kn);
453 kobject_put(kobj);
454}
455EXPORT_SYMBOL_GPL(sysfs_unbreak_active_protection);
456
1da177e4 457/**
58292cbe
TH
458 * sysfs_remove_file_ns - remove an object attribute with a custom ns tag
459 * @kobj: object we're acting for
460 * @attr: attribute descriptor
461 * @ns: namespace tag of the file to remove
1da177e4 462 *
58292cbe 463 * Hash the attribute name and namespace tag and kill the victim.
1da177e4 464 */
58292cbe
TH
465void sysfs_remove_file_ns(struct kobject *kobj, const struct attribute *attr,
466 const void *ns)
1da177e4 467{
324a56e1 468 struct kernfs_node *parent = kobj->sd;
487505c2 469
324a56e1 470 kernfs_remove_by_name_ns(parent, attr->name, ns);
1da177e4 471}
58292cbe 472EXPORT_SYMBOL_GPL(sysfs_remove_file_ns);
1da177e4 473
6b0afc2a
TH
474/**
475 * sysfs_remove_file_self - remove an object attribute from its own method
476 * @kobj: object we're acting for
477 * @attr: attribute descriptor
478 *
479 * See kernfs_remove_self() for details.
480 */
481bool sysfs_remove_file_self(struct kobject *kobj, const struct attribute *attr)
482{
483 struct kernfs_node *parent = kobj->sd;
484 struct kernfs_node *kn;
485 bool ret;
486
487 kn = kernfs_find_and_get(parent, attr->name);
488 if (WARN_ON_ONCE(!kn))
489 return false;
490
491 ret = kernfs_remove_self(kn);
492
493 kernfs_put(kn);
494 return ret;
495}
496
9ee4685c 497void sysfs_remove_files(struct kobject *kobj, const struct attribute * const *ptr)
1c205ae1
AK
498{
499 int i;
4bd4e92c 500
1c205ae1
AK
501 for (i = 0; ptr[i]; i++)
502 sysfs_remove_file(kobj, ptr[i]);
503}
1b866757 504EXPORT_SYMBOL_GPL(sysfs_remove_files);
1da177e4 505
dfa87c82
AS
506/**
507 * sysfs_remove_file_from_group - remove an attribute file from a group.
508 * @kobj: object we're acting for.
509 * @attr: attribute descriptor.
510 * @group: group name.
511 */
512void sysfs_remove_file_from_group(struct kobject *kobj,
513 const struct attribute *attr, const char *group)
514{
324a56e1 515 struct kernfs_node *parent;
dfa87c82 516
ccf73cf3 517 if (group) {
324a56e1 518 parent = kernfs_find_and_get(kobj->sd, group);
ccf73cf3 519 } else {
324a56e1
TH
520 parent = kobj->sd;
521 kernfs_get(parent);
ccf73cf3
TH
522 }
523
324a56e1
TH
524 if (parent) {
525 kernfs_remove_by_name(parent, attr->name);
526 kernfs_put(parent);
dfa87c82
AS
527 }
528}
529EXPORT_SYMBOL_GPL(sysfs_remove_file_from_group);
530
3124eb16
TH
531/**
532 * sysfs_create_bin_file - create binary file for object.
533 * @kobj: object.
534 * @attr: attribute descriptor.
535 */
536int sysfs_create_bin_file(struct kobject *kobj,
537 const struct bin_attribute *attr)
538{
5f81880d
DT
539 kuid_t uid;
540 kgid_t gid;
541
de96e9fe
GKH
542 if (WARN_ON(!kobj || !kobj->sd || !attr))
543 return -EINVAL;
3124eb16 544
5f81880d
DT
545 kobject_get_ownership(kobj, &uid, &gid);
546 return sysfs_add_file_mode_ns(kobj->sd, &attr->attr, true,
547 attr->attr.mode, uid, gid, NULL);
3124eb16
TH
548}
549EXPORT_SYMBOL_GPL(sysfs_create_bin_file);
550
551/**
552 * sysfs_remove_bin_file - remove binary file for object.
553 * @kobj: object.
554 * @attr: attribute descriptor.
555 */
556void sysfs_remove_bin_file(struct kobject *kobj,
557 const struct bin_attribute *attr)
558{
879f40d1 559 kernfs_remove_by_name(kobj->sd, attr->attr.name);
3124eb16
TH
560}
561EXPORT_SYMBOL_GPL(sysfs_remove_bin_file);
d5b0c817
CB
562
563static int internal_change_owner(struct kernfs_node *kn, kuid_t kuid,
564 kgid_t kgid)
565{
566 struct iattr newattrs = {
567 .ia_valid = ATTR_UID | ATTR_GID,
568 .ia_uid = kuid,
569 .ia_gid = kgid,
570 };
571 return kernfs_setattr(kn, &newattrs);
572}
573
c67a60b9
CB
574/**
575 * sysfs_link_change_owner - change owner of a sysfs file.
576 * @kobj: object of the kernfs_node the symlink is located in.
577 * @targ: object of the kernfs_node the symlink points to.
578 * @name: name of the link.
579 * @kuid: new owner's kuid
580 * @kgid: new owner's kgid
581 *
582 * This function looks up the sysfs symlink entry @name under @kobj and changes
583 * the ownership to @kuid/@kgid. The symlink is looked up in the namespace of
584 * @targ.
585 *
586 * Returns 0 on success or error code on failure.
587 */
588int sysfs_link_change_owner(struct kobject *kobj, struct kobject *targ,
589 const char *name, kuid_t kuid, kgid_t kgid)
590{
591 struct kernfs_node *kn = NULL;
592 int error;
593
594 if (!name || !kobj->state_in_sysfs || !targ->state_in_sysfs)
595 return -EINVAL;
596
597 error = -ENOENT;
598 kn = kernfs_find_and_get_ns(kobj->sd, name, targ->sd->ns);
599 if (!kn)
600 goto out;
601
602 error = -EINVAL;
603 if (kernfs_type(kn) != KERNFS_LINK)
604 goto out;
605 if (kn->symlink.target_kn->priv != targ)
606 goto out;
607
608 error = internal_change_owner(kn, kuid, kgid);
609
610out:
611 kernfs_put(kn);
612 return error;
613}
614
d5b0c817
CB
615/**
616 * sysfs_file_change_owner - change owner of a sysfs file.
617 * @kobj: object.
618 * @name: name of the file to change.
619 * @kuid: new owner's kuid
620 * @kgid: new owner's kgid
621 *
622 * This function looks up the sysfs entry @name under @kobj and changes the
623 * ownership to @kuid/@kgid.
624 *
625 * Returns 0 on success or error code on failure.
626 */
627int sysfs_file_change_owner(struct kobject *kobj, const char *name, kuid_t kuid,
628 kgid_t kgid)
629{
630 struct kernfs_node *kn;
631 int error;
632
633 if (!name)
634 return -EINVAL;
635
636 if (!kobj->state_in_sysfs)
637 return -EINVAL;
638
639 kn = kernfs_find_and_get(kobj->sd, name);
640 if (!kn)
641 return -ENOENT;
642
643 error = internal_change_owner(kn, kuid, kgid);
644
645 kernfs_put(kn);
646
647 return error;
648}
649EXPORT_SYMBOL_GPL(sysfs_file_change_owner);
54864820
CB
650
651/**
652 * sysfs_change_owner - change owner of the given object.
653 * @kobj: object.
654 * @kuid: new owner's kuid
655 * @kgid: new owner's kgid
656 *
657 * Change the owner of the default directory, files, groups, and attributes of
658 * @kobj to @kuid/@kgid. Note that sysfs_change_owner mirrors how the sysfs
659 * entries for a kobject are added by driver core. In summary,
660 * sysfs_change_owner() takes care of the default directory entry for @kobj,
661 * the default attributes associated with the ktype of @kobj and the default
662 * attributes associated with the ktype of @kobj.
663 * Additional properties not added by driver core have to be changed by the
664 * driver or subsystem which created them. This is similar to how
665 * driver/subsystem specific entries are removed.
666 *
667 * Returns 0 on success or error code on failure.
668 */
669int sysfs_change_owner(struct kobject *kobj, kuid_t kuid, kgid_t kgid)
670{
671 int error;
672 const struct kobj_type *ktype;
673
674 if (!kobj->state_in_sysfs)
675 return -EINVAL;
676
677 /* Change the owner of the kobject itself. */
678 error = internal_change_owner(kobj->sd, kuid, kgid);
679 if (error)
680 return error;
681
682 ktype = get_ktype(kobj);
683 if (ktype) {
684 struct attribute **kattr;
685
686 /*
687 * Change owner of the default attributes associated with the
688 * ktype of @kobj.
689 */
690 for (kattr = ktype->default_attrs; kattr && *kattr; kattr++) {
691 error = sysfs_file_change_owner(kobj, (*kattr)->name,
692 kuid, kgid);
693 if (error)
694 return error;
695 }
696
697 /*
698 * Change owner of the default groups associated with the
699 * ktype of @kobj.
700 */
701 error = sysfs_groups_change_owner(kobj, ktype->default_groups,
702 kuid, kgid);
703 if (error)
704 return error;
705 }
706
707 return 0;
708}
709EXPORT_SYMBOL_GPL(sysfs_change_owner);
ce4a3168
JP
710
711/**
712 * sysfs_emit - scnprintf equivalent, aware of PAGE_SIZE buffer.
713 * @buf: start of PAGE_SIZE buffer.
714 * @fmt: format
715 * @...: optional arguments to @format
716 *
717 *
718 * Returns number of characters written to @buf.
719 */
720int sysfs_emit(char *buf, const char *fmt, ...)
721{
722 va_list args;
723 int len;
724
725 if (WARN(!buf || offset_in_page(buf),
726 "invalid sysfs_emit: buf:%p\n", buf))
727 return 0;
728
729 va_start(args, fmt);
730 len = vscnprintf(buf, PAGE_SIZE, fmt, args);
731 va_end(args);
732
733 return len;
734}
735EXPORT_SYMBOL_GPL(sysfs_emit);
736
737/**
738 * sysfs_emit_at - scnprintf equivalent, aware of PAGE_SIZE buffer.
739 * @buf: start of PAGE_SIZE buffer.
740 * @at: offset in @buf to start write in bytes
741 * @at must be >= 0 && < PAGE_SIZE
742 * @fmt: format
743 * @...: optional arguments to @fmt
744 *
745 *
746 * Returns number of characters written starting at &@buf[@at].
747 */
748int sysfs_emit_at(char *buf, int at, const char *fmt, ...)
749{
750 va_list args;
751 int len;
752
753 if (WARN(!buf || offset_in_page(buf) || at < 0 || at >= PAGE_SIZE,
754 "invalid sysfs_emit_at: buf:%p at:%d\n", buf, at))
755 return 0;
756
757 va_start(args, fmt);
758 len = vscnprintf(buf + at, PAGE_SIZE - at, fmt, args);
759 va_end(args);
760
761 return len;
762}
763EXPORT_SYMBOL_GPL(sysfs_emit_at);