]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - kernel/params.c
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux
[mirror_ubuntu-artful-kernel.git] / kernel / params.c
CommitLineData
1da177e4
LT
1/* Helpers for initial module or kernel cmdline parsing
2 Copyright (C) 2001 Rusty Russell.
3
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
8
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
13
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17*/
1da177e4
LT
18#include <linux/kernel.h>
19#include <linux/string.h>
20#include <linux/errno.h>
21#include <linux/module.h>
22#include <linux/device.h>
23#include <linux/err.h>
4e57b681 24#include <linux/slab.h>
26d052bf 25#include <linux/ctype.h>
1da177e4 26
907b29eb
RR
27/* Protects all parameters, and incidentally kmalloced_param list. */
28static DEFINE_MUTEX(param_lock);
29
a1054322
RR
30/* This just allows us to keep track of which parameters are kmalloced. */
31struct kmalloced_param {
32 struct list_head list;
33 char val[];
34};
a1054322
RR
35static LIST_HEAD(kmalloced_params);
36
37static void *kmalloc_parameter(unsigned int size)
38{
39 struct kmalloced_param *p;
40
41 p = kmalloc(sizeof(*p) + size, GFP_KERNEL);
42 if (!p)
43 return NULL;
44
a1054322 45 list_add(&p->list, &kmalloced_params);
a1054322
RR
46 return p->val;
47}
48
49/* Does nothing if parameter wasn't kmalloced above. */
50static void maybe_kfree_parameter(void *param)
51{
52 struct kmalloced_param *p;
53
a1054322
RR
54 list_for_each_entry(p, &kmalloced_params, list) {
55 if (p->val == param) {
56 list_del(&p->list);
57 kfree(p);
58 break;
59 }
60 }
a1054322
RR
61}
62
b1e4d20c 63static char dash2underscore(char c)
1da177e4
LT
64{
65 if (c == '-')
66 return '_';
67 return c;
68}
69
b1e4d20c 70bool parameqn(const char *a, const char *b, size_t n)
1da177e4 71{
b1e4d20c
MS
72 size_t i;
73
74 for (i = 0; i < n; i++) {
75 if (dash2underscore(a[i]) != dash2underscore(b[i]))
76 return false;
77 }
78 return true;
79}
80
81bool parameq(const char *a, const char *b)
82{
83 return parameqn(a, b, strlen(a)+1);
1da177e4
LT
84}
85
86static int parse_one(char *param,
87 char *val,
9fb48c74 88 const char *doing,
914dcaa8 89 const struct kernel_param *params,
1da177e4 90 unsigned num_params,
026cee00
PM
91 s16 min_level,
92 s16 max_level,
9fb48c74
JC
93 int (*handle_unknown)(char *param, char *val,
94 const char *doing))
1da177e4
LT
95{
96 unsigned int i;
907b29eb 97 int err;
1da177e4
LT
98
99 /* Find parameter */
100 for (i = 0; i < num_params; i++) {
101 if (parameq(param, params[i].name)) {
026cee00
PM
102 if (params[i].level < min_level
103 || params[i].level > max_level)
104 return 0;
25985edc 105 /* No one handled NULL, so do it here. */
ab013c5f
SR
106 if (!val &&
107 !(params[i].ops->flags & KERNEL_PARAM_FL_NOARG))
2e9fb995 108 return -EINVAL;
9fb48c74
JC
109 pr_debug("handling %s with %p\n", param,
110 params[i].ops->set);
907b29eb
RR
111 mutex_lock(&param_lock);
112 err = params[i].ops->set(val, &params[i]);
113 mutex_unlock(&param_lock);
114 return err;
1da177e4
LT
115 }
116 }
117
118 if (handle_unknown) {
9fb48c74
JC
119 pr_debug("doing %s: %s='%s'\n", doing, param, val);
120 return handle_unknown(param, val, doing);
1da177e4
LT
121 }
122
9fb48c74 123 pr_debug("Unknown argument '%s'\n", param);
1da177e4
LT
124 return -ENOENT;
125}
126
127/* You can use " around spaces, but can't escape ". */
128/* Hyphens and underscores equivalent in parameter names. */
129static char *next_arg(char *args, char **param, char **val)
130{
131 unsigned int i, equals = 0;
132 int in_quote = 0, quoted = 0;
133 char *next;
134
1da177e4
LT
135 if (*args == '"') {
136 args++;
137 in_quote = 1;
138 quoted = 1;
139 }
140
141 for (i = 0; args[i]; i++) {
26d052bf 142 if (isspace(args[i]) && !in_quote)
1da177e4
LT
143 break;
144 if (equals == 0) {
145 if (args[i] == '=')
146 equals = i;
147 }
148 if (args[i] == '"')
149 in_quote = !in_quote;
150 }
151
152 *param = args;
153 if (!equals)
154 *val = NULL;
155 else {
156 args[equals] = '\0';
157 *val = args + equals + 1;
158
159 /* Don't include quotes in value. */
160 if (**val == '"') {
161 (*val)++;
162 if (args[i-1] == '"')
163 args[i-1] = '\0';
164 }
165 if (quoted && args[i-1] == '"')
166 args[i-1] = '\0';
167 }
168
169 if (args[i]) {
170 args[i] = '\0';
171 next = args + i + 1;
172 } else
173 next = args + i;
f36462f0
RR
174
175 /* Chew up trailing spaces. */
e7d2860b 176 return skip_spaces(next);
1da177e4
LT
177}
178
179/* Args looks like "foo=bar,bar2 baz=fuz wiz". */
51e158c1
RR
180char *parse_args(const char *doing,
181 char *args,
182 const struct kernel_param *params,
183 unsigned num,
184 s16 min_level,
185 s16 max_level,
186 int (*unknown)(char *param, char *val, const char *doing))
1da177e4
LT
187{
188 char *param, *val;
189
f36462f0 190 /* Chew leading spaces */
e7d2860b 191 args = skip_spaces(args);
f36462f0 192
1ef9eaf2 193 if (*args)
9fb48c74
JC
194 pr_debug("doing %s, parsing ARGS: '%s'\n", doing, args);
195
1da177e4
LT
196 while (*args) {
197 int ret;
a416aba6 198 int irq_was_disabled;
1da177e4
LT
199
200 args = next_arg(args, &param, &val);
51e158c1
RR
201 /* Stop at -- */
202 if (!val && strcmp(param, "--") == 0)
203 return args;
a416aba6 204 irq_was_disabled = irqs_disabled();
9fb48c74 205 ret = parse_one(param, val, doing, params, num,
026cee00 206 min_level, max_level, unknown);
b5f3abf9
JC
207 if (irq_was_disabled && !irqs_disabled())
208 pr_warn("%s: option '%s' enabled irq's!\n",
209 doing, param);
210
1da177e4
LT
211 switch (ret) {
212 case -ENOENT:
b5f3abf9 213 pr_err("%s: Unknown parameter `%s'\n", doing, param);
51e158c1 214 return ERR_PTR(ret);
1da177e4 215 case -ENOSPC:
b5f3abf9 216 pr_err("%s: `%s' too large for parameter `%s'\n",
9fb48c74 217 doing, val ?: "", param);
51e158c1 218 return ERR_PTR(ret);
1da177e4
LT
219 case 0:
220 break;
221 default:
b5f3abf9 222 pr_err("%s: `%s' invalid for parameter `%s'\n",
9fb48c74 223 doing, val ?: "", param);
51e158c1 224 return ERR_PTR(ret);
1da177e4
LT
225 }
226 }
227
228 /* All parsed OK. */
51e158c1 229 return NULL;
1da177e4
LT
230}
231
232/* Lazy bastard, eh? */
88a88b32 233#define STANDARD_PARAM_DEF(name, type, format, strtolfn) \
9bbb9e5a 234 int param_set_##name(const char *val, const struct kernel_param *kp) \
1da177e4 235 { \
88a88b32 236 return strtolfn(val, 0, (type *)kp->arg); \
1da177e4 237 } \
9bbb9e5a 238 int param_get_##name(char *buffer, const struct kernel_param *kp) \
1da177e4 239 { \
f4940ab7
CG
240 return scnprintf(buffer, PAGE_SIZE, format, \
241 *((type *)kp->arg)); \
a14fe249 242 } \
9bbb9e5a
RR
243 struct kernel_param_ops param_ops_##name = { \
244 .set = param_set_##name, \
245 .get = param_get_##name, \
246 }; \
a14fe249 247 EXPORT_SYMBOL(param_set_##name); \
9bbb9e5a
RR
248 EXPORT_SYMBOL(param_get_##name); \
249 EXPORT_SYMBOL(param_ops_##name)
250
1da177e4 251
88a88b32
FC
252STANDARD_PARAM_DEF(byte, unsigned char, "%hhu", kstrtou8);
253STANDARD_PARAM_DEF(short, short, "%hi", kstrtos16);
254STANDARD_PARAM_DEF(ushort, unsigned short, "%hu", kstrtou16);
255STANDARD_PARAM_DEF(int, int, "%i", kstrtoint);
256STANDARD_PARAM_DEF(uint, unsigned int, "%u", kstrtouint);
257STANDARD_PARAM_DEF(long, long, "%li", kstrtol);
258STANDARD_PARAM_DEF(ulong, unsigned long, "%lu", kstrtoul);
b4210b81 259STANDARD_PARAM_DEF(ullong, unsigned long long, "%llu", kstrtoull);
1da177e4 260
9bbb9e5a 261int param_set_charp(const char *val, const struct kernel_param *kp)
1da177e4 262{
1da177e4 263 if (strlen(val) > 1024) {
b5f3abf9 264 pr_err("%s: string parameter too long\n", kp->name);
1da177e4
LT
265 return -ENOSPC;
266 }
267
a1054322
RR
268 maybe_kfree_parameter(*(char **)kp->arg);
269
270 /* This is a hack. We can't kmalloc in early boot, and we
e180a6b7
RR
271 * don't need to; this mangled commandline is preserved. */
272 if (slab_is_available()) {
a1054322 273 *(char **)kp->arg = kmalloc_parameter(strlen(val)+1);
d553ad86 274 if (!*(char **)kp->arg)
e180a6b7 275 return -ENOMEM;
a1054322 276 strcpy(*(char **)kp->arg, val);
e180a6b7
RR
277 } else
278 *(const char **)kp->arg = val;
279
1da177e4
LT
280 return 0;
281}
a14fe249 282EXPORT_SYMBOL(param_set_charp);
1da177e4 283
9bbb9e5a 284int param_get_charp(char *buffer, const struct kernel_param *kp)
1da177e4 285{
f4940ab7 286 return scnprintf(buffer, PAGE_SIZE, "%s", *((char **)kp->arg));
1da177e4 287}
a14fe249 288EXPORT_SYMBOL(param_get_charp);
1da177e4 289
a1054322
RR
290static void param_free_charp(void *arg)
291{
292 maybe_kfree_parameter(*((char **)arg));
293}
294
9bbb9e5a
RR
295struct kernel_param_ops param_ops_charp = {
296 .set = param_set_charp,
297 .get = param_get_charp,
a1054322 298 .free = param_free_charp,
9bbb9e5a
RR
299};
300EXPORT_SYMBOL(param_ops_charp);
301
fddd5201 302/* Actually could be a bool or an int, for historical reasons. */
9bbb9e5a 303int param_set_bool(const char *val, const struct kernel_param *kp)
1da177e4
LT
304{
305 /* No equals means "set"... */
306 if (!val) val = "1";
307
308 /* One of =[yYnN01] */
8b825281 309 return strtobool(val, kp->arg);
1da177e4 310}
a14fe249 311EXPORT_SYMBOL(param_set_bool);
1da177e4 312
9bbb9e5a 313int param_get_bool(char *buffer, const struct kernel_param *kp)
1da177e4
LT
314{
315 /* Y and N chosen as being relatively non-coder friendly */
8b825281 316 return sprintf(buffer, "%c", *(bool *)kp->arg ? 'Y' : 'N');
1da177e4 317}
a14fe249 318EXPORT_SYMBOL(param_get_bool);
1da177e4 319
9bbb9e5a 320struct kernel_param_ops param_ops_bool = {
ab013c5f 321 .flags = KERNEL_PARAM_FL_NOARG,
9bbb9e5a
RR
322 .set = param_set_bool,
323 .get = param_get_bool,
324};
325EXPORT_SYMBOL(param_ops_bool);
326
fddd5201 327/* This one must be bool. */
9bbb9e5a 328int param_set_invbool(const char *val, const struct kernel_param *kp)
1da177e4 329{
fddd5201
RR
330 int ret;
331 bool boolval;
22e48eaf 332 struct kernel_param dummy;
1da177e4 333
22e48eaf 334 dummy.arg = &boolval;
1da177e4
LT
335 ret = param_set_bool(val, &dummy);
336 if (ret == 0)
9a71af2c 337 *(bool *)kp->arg = !boolval;
1da177e4
LT
338 return ret;
339}
a14fe249 340EXPORT_SYMBOL(param_set_invbool);
1da177e4 341
9bbb9e5a 342int param_get_invbool(char *buffer, const struct kernel_param *kp)
1da177e4 343{
9a71af2c 344 return sprintf(buffer, "%c", (*(bool *)kp->arg) ? 'N' : 'Y');
1da177e4 345}
a14fe249 346EXPORT_SYMBOL(param_get_invbool);
1da177e4 347
9bbb9e5a
RR
348struct kernel_param_ops param_ops_invbool = {
349 .set = param_set_invbool,
350 .get = param_get_invbool,
351};
352EXPORT_SYMBOL(param_ops_invbool);
353
69116f27
RR
354int param_set_bint(const char *val, const struct kernel_param *kp)
355{
356 struct kernel_param boolkp;
357 bool v;
358 int ret;
359
360 /* Match bool exactly, by re-using it. */
361 boolkp = *kp;
362 boolkp.arg = &v;
69116f27
RR
363
364 ret = param_set_bool(val, &boolkp);
365 if (ret == 0)
366 *(int *)kp->arg = v;
367 return ret;
368}
369EXPORT_SYMBOL(param_set_bint);
370
371struct kernel_param_ops param_ops_bint = {
ab013c5f 372 .flags = KERNEL_PARAM_FL_NOARG,
69116f27
RR
373 .set = param_set_bint,
374 .get = param_get_int,
375};
376EXPORT_SYMBOL(param_ops_bint);
377
9730b5b0 378/* We break the rule and mangle the string. */
9871728b
AB
379static int param_array(const char *name,
380 const char *val,
381 unsigned int min, unsigned int max,
382 void *elem, int elemsize,
9bbb9e5a 383 int (*set)(const char *, const struct kernel_param *kp),
026cee00 384 s16 level,
eb38a996 385 unsigned int *num)
1da177e4
LT
386{
387 int ret;
388 struct kernel_param kp;
389 char save;
390
391 /* Get the name right for errors. */
392 kp.name = name;
393 kp.arg = elem;
026cee00 394 kp.level = level;
1da177e4 395
1da177e4
LT
396 *num = 0;
397 /* We expect a comma-separated list of values. */
398 do {
399 int len;
400
401 if (*num == max) {
b5f3abf9 402 pr_err("%s: can only take %i arguments\n", name, max);
1da177e4
LT
403 return -EINVAL;
404 }
405 len = strcspn(val, ",");
406
407 /* nul-terminate and parse */
408 save = val[len];
409 ((char *)val)[len] = '\0';
907b29eb 410 BUG_ON(!mutex_is_locked(&param_lock));
1da177e4
LT
411 ret = set(val, &kp);
412
413 if (ret != 0)
414 return ret;
415 kp.arg += elemsize;
416 val += len+1;
417 (*num)++;
418 } while (save == ',');
419
420 if (*num < min) {
b5f3abf9 421 pr_err("%s: needs at least %i arguments\n", name, min);
1da177e4
LT
422 return -EINVAL;
423 }
424 return 0;
425}
426
9bbb9e5a 427static int param_array_set(const char *val, const struct kernel_param *kp)
1da177e4 428{
22e48eaf 429 const struct kparam_array *arr = kp->arr;
31143a12 430 unsigned int temp_num;
1da177e4
LT
431
432 return param_array(kp->name, val, 1, arr->max, arr->elem,
026cee00 433 arr->elemsize, arr->ops->set, kp->level,
3c7d76e3 434 arr->num ?: &temp_num);
1da177e4
LT
435}
436
9bbb9e5a 437static int param_array_get(char *buffer, const struct kernel_param *kp)
1da177e4
LT
438{
439 int i, off, ret;
22e48eaf 440 const struct kparam_array *arr = kp->arr;
1da177e4
LT
441 struct kernel_param p;
442
443 p = *kp;
444 for (i = off = 0; i < (arr->num ? *arr->num : arr->max); i++) {
445 if (i)
446 buffer[off++] = ',';
447 p.arg = arr->elem + arr->elemsize * i;
907b29eb 448 BUG_ON(!mutex_is_locked(&param_lock));
9bbb9e5a 449 ret = arr->ops->get(buffer + off, &p);
1da177e4
LT
450 if (ret < 0)
451 return ret;
452 off += ret;
453 }
454 buffer[off] = '\0';
455 return off;
456}
457
e6df34a4
RR
458static void param_array_free(void *arg)
459{
460 unsigned int i;
461 const struct kparam_array *arr = arg;
462
463 if (arr->ops->free)
464 for (i = 0; i < (arr->num ? *arr->num : arr->max); i++)
465 arr->ops->free(arr->elem + arr->elemsize * i);
466}
467
9bbb9e5a
RR
468struct kernel_param_ops param_array_ops = {
469 .set = param_array_set,
470 .get = param_array_get,
e6df34a4 471 .free = param_array_free,
9bbb9e5a
RR
472};
473EXPORT_SYMBOL(param_array_ops);
474
475int param_set_copystring(const char *val, const struct kernel_param *kp)
1da177e4 476{
22e48eaf 477 const struct kparam_string *kps = kp->str;
1da177e4
LT
478
479 if (strlen(val)+1 > kps->maxlen) {
b5f3abf9 480 pr_err("%s: string doesn't fit in %u chars.\n",
1da177e4
LT
481 kp->name, kps->maxlen-1);
482 return -ENOSPC;
483 }
484 strcpy(kps->string, val);
485 return 0;
486}
a14fe249 487EXPORT_SYMBOL(param_set_copystring);
1da177e4 488
9bbb9e5a 489int param_get_string(char *buffer, const struct kernel_param *kp)
1da177e4 490{
22e48eaf 491 const struct kparam_string *kps = kp->str;
1da177e4
LT
492 return strlcpy(buffer, kps->string, kps->maxlen);
493}
a14fe249 494EXPORT_SYMBOL(param_get_string);
1da177e4 495
9bbb9e5a
RR
496struct kernel_param_ops param_ops_string = {
497 .set = param_set_copystring,
498 .get = param_get_string,
499};
500EXPORT_SYMBOL(param_ops_string);
501
1da177e4 502/* sysfs output in /sys/modules/XYZ/parameters/ */
350f8258
EY
503#define to_module_attr(n) container_of(n, struct module_attribute, attr)
504#define to_module_kobject(n) container_of(n, struct module_kobject, kobj)
1da177e4
LT
505
506extern struct kernel_param __start___param[], __stop___param[];
507
1da177e4
LT
508struct param_attribute
509{
510 struct module_attribute mattr;
9bbb9e5a 511 const struct kernel_param *param;
1da177e4
LT
512};
513
514struct module_param_attrs
515{
9b473de8 516 unsigned int num;
1da177e4
LT
517 struct attribute_group grp;
518 struct param_attribute attrs[0];
519};
520
ef665c1a 521#ifdef CONFIG_SYSFS
350f8258 522#define to_param_attr(n) container_of(n, struct param_attribute, mattr)
1da177e4
LT
523
524static ssize_t param_attr_show(struct module_attribute *mattr,
4befb026 525 struct module_kobject *mk, char *buf)
1da177e4
LT
526{
527 int count;
528 struct param_attribute *attribute = to_param_attr(mattr);
529
9bbb9e5a 530 if (!attribute->param->ops->get)
1da177e4
LT
531 return -EPERM;
532
907b29eb 533 mutex_lock(&param_lock);
9bbb9e5a 534 count = attribute->param->ops->get(buf, attribute->param);
907b29eb 535 mutex_unlock(&param_lock);
1da177e4
LT
536 if (count > 0) {
537 strcat(buf, "\n");
538 ++count;
539 }
540 return count;
541}
542
543/* sysfs always hands a nul-terminated string in buf. We rely on that. */
544static ssize_t param_attr_store(struct module_attribute *mattr,
4befb026 545 struct module_kobject *km,
1da177e4
LT
546 const char *buf, size_t len)
547{
548 int err;
549 struct param_attribute *attribute = to_param_attr(mattr);
550
9bbb9e5a 551 if (!attribute->param->ops->set)
1da177e4
LT
552 return -EPERM;
553
907b29eb 554 mutex_lock(&param_lock);
9bbb9e5a 555 err = attribute->param->ops->set(buf, attribute->param);
907b29eb 556 mutex_unlock(&param_lock);
1da177e4
LT
557 if (!err)
558 return len;
559 return err;
560}
ef665c1a 561#endif
1da177e4
LT
562
563#ifdef CONFIG_MODULES
564#define __modinit
565#else
566#define __modinit __init
567#endif
568
ef665c1a 569#ifdef CONFIG_SYSFS
907b29eb
RR
570void __kernel_param_lock(void)
571{
572 mutex_lock(&param_lock);
573}
574EXPORT_SYMBOL(__kernel_param_lock);
575
576void __kernel_param_unlock(void)
577{
578 mutex_unlock(&param_lock);
579}
580EXPORT_SYMBOL(__kernel_param_unlock);
581
1da177e4 582/*
9b473de8
RR
583 * add_sysfs_param - add a parameter to sysfs
584 * @mk: struct module_kobject
585 * @kparam: the actual parameter definition to add to sysfs
586 * @name: name of parameter
1da177e4 587 *
9b473de8
RR
588 * Create a kobject if for a (per-module) parameter if mp NULL, and
589 * create file in sysfs. Returns an error on out of memory. Always cleans up
590 * if there's an error.
1da177e4 591 */
9b473de8 592static __modinit int add_sysfs_param(struct module_kobject *mk,
9bbb9e5a 593 const struct kernel_param *kp,
9b473de8 594 const char *name)
1da177e4 595{
9b473de8
RR
596 struct module_param_attrs *new;
597 struct attribute **attrs;
598 int err, num;
599
600 /* We don't bother calling this with invisible parameters. */
601 BUG_ON(!kp->perm);
602
603 if (!mk->mp) {
604 num = 0;
605 attrs = NULL;
606 } else {
607 num = mk->mp->num;
608 attrs = mk->mp->grp.attrs;
1da177e4
LT
609 }
610
9b473de8
RR
611 /* Enlarge. */
612 new = krealloc(mk->mp,
613 sizeof(*mk->mp) + sizeof(mk->mp->attrs[0]) * (num+1),
614 GFP_KERNEL);
615 if (!new) {
63662139 616 kfree(attrs);
9b473de8
RR
617 err = -ENOMEM;
618 goto fail;
619 }
63662139
DW
620 /* Despite looking like the typical realloc() bug, this is safe.
621 * We *want* the old 'attrs' to be freed either way, and we'll store
622 * the new one in the success case. */
9b473de8
RR
623 attrs = krealloc(attrs, sizeof(new->grp.attrs[0])*(num+2), GFP_KERNEL);
624 if (!attrs) {
625 err = -ENOMEM;
626 goto fail_free_new;
627 }
1da177e4 628
9b473de8
RR
629 /* Sysfs wants everything zeroed. */
630 memset(new, 0, sizeof(*new));
631 memset(&new->attrs[num], 0, sizeof(new->attrs[num]));
632 memset(&attrs[num], 0, sizeof(attrs[num]));
633 new->grp.name = "parameters";
634 new->grp.attrs = attrs;
635
636 /* Tack new one on the end. */
a07e4156 637 sysfs_attr_init(&new->attrs[num].mattr.attr);
9b473de8
RR
638 new->attrs[num].param = kp;
639 new->attrs[num].mattr.show = param_attr_show;
640 new->attrs[num].mattr.store = param_attr_store;
641 new->attrs[num].mattr.attr.name = (char *)name;
642 new->attrs[num].mattr.attr.mode = kp->perm;
643 new->num = num+1;
644
645 /* Fix up all the pointers, since krealloc can move us */
646 for (num = 0; num < new->num; num++)
647 new->grp.attrs[num] = &new->attrs[num].mattr.attr;
648 new->grp.attrs[num] = NULL;
649
650 mk->mp = new;
651 return 0;
1da177e4 652
9b473de8
RR
653fail_free_new:
654 kfree(new);
655fail:
656 mk->mp = NULL;
657 return err;
658}
1da177e4 659
d2441183 660#ifdef CONFIG_MODULES
9b473de8
RR
661static void free_module_param_attrs(struct module_kobject *mk)
662{
663 kfree(mk->mp->grp.attrs);
664 kfree(mk->mp);
665 mk->mp = NULL;
1da177e4
LT
666}
667
1da177e4
LT
668/*
669 * module_param_sysfs_setup - setup sysfs support for one module
670 * @mod: module
671 * @kparam: module parameters (array)
672 * @num_params: number of module parameters
673 *
9b473de8
RR
674 * Adds sysfs entries for module parameters under
675 * /sys/module/[mod->name]/parameters/
1da177e4
LT
676 */
677int module_param_sysfs_setup(struct module *mod,
9bbb9e5a 678 const struct kernel_param *kparam,
1da177e4
LT
679 unsigned int num_params)
680{
9b473de8
RR
681 int i, err;
682 bool params = false;
683
684 for (i = 0; i < num_params; i++) {
685 if (kparam[i].perm == 0)
686 continue;
687 err = add_sysfs_param(&mod->mkobj, &kparam[i], kparam[i].name);
688 if (err)
689 return err;
690 params = true;
691 }
1da177e4 692
9b473de8
RR
693 if (!params)
694 return 0;
1da177e4 695
9b473de8
RR
696 /* Create the param group. */
697 err = sysfs_create_group(&mod->mkobj.kobj, &mod->mkobj.mp->grp);
698 if (err)
699 free_module_param_attrs(&mod->mkobj);
700 return err;
1da177e4
LT
701}
702
703/*
704 * module_param_sysfs_remove - remove sysfs support for one module
705 * @mod: module
706 *
707 * Remove sysfs entries for module parameters and the corresponding
708 * kobject.
709 */
710void module_param_sysfs_remove(struct module *mod)
711{
9b473de8
RR
712 if (mod->mkobj.mp) {
713 sysfs_remove_group(&mod->mkobj.kobj, &mod->mkobj.mp->grp);
1da177e4
LT
714 /* We are positive that no one is using any param
715 * attrs at this point. Deallocate immediately. */
9b473de8 716 free_module_param_attrs(&mod->mkobj);
1da177e4
LT
717 }
718}
719#endif
720
e180a6b7
RR
721void destroy_params(const struct kernel_param *params, unsigned num)
722{
e6df34a4
RR
723 unsigned int i;
724
725 for (i = 0; i < num; i++)
726 if (params[i].ops->free)
727 params[i].ops->free(params[i].arg);
e180a6b7
RR
728}
729
e94965ed 730static struct module_kobject * __init locate_module_kobject(const char *name)
1da177e4
LT
731{
732 struct module_kobject *mk;
9b473de8
RR
733 struct kobject *kobj;
734 int err;
1da177e4 735
9b473de8
RR
736 kobj = kset_find_obj(module_kset, name);
737 if (kobj) {
9b473de8 738 mk = to_module_kobject(kobj);
9b473de8
RR
739 } else {
740 mk = kzalloc(sizeof(struct module_kobject), GFP_KERNEL);
741 BUG_ON(!mk);
742
743 mk->mod = THIS_MODULE;
744 mk->kobj.kset = module_kset;
745 err = kobject_init_and_add(&mk->kobj, &module_ktype, NULL,
746 "%s", name);
88bfa324
KS
747#ifdef CONFIG_MODULES
748 if (!err)
749 err = sysfs_create_file(&mk->kobj, &module_uevent.attr);
750#endif
9b473de8
RR
751 if (err) {
752 kobject_put(&mk->kobj);
b5f3abf9 753 pr_crit("Adding module '%s' to sysfs failed (%d), the system may be unstable.\n",
e94965ed 754 name, err);
e94965ed 755 return NULL;
9b473de8 756 }
e94965ed
DT
757
758 /* So that we hold reference in both cases. */
9b473de8 759 kobject_get(&mk->kobj);
74c5b597 760 }
9b473de8 761
e94965ed
DT
762 return mk;
763}
764
765static void __init kernel_add_sysfs_param(const char *name,
766 struct kernel_param *kparam,
767 unsigned int name_skip)
768{
769 struct module_kobject *mk;
770 int err;
771
772 mk = locate_module_kobject(name);
773 if (!mk)
774 return;
775
776 /* We need to remove old parameters before adding more. */
777 if (mk->mp)
778 sysfs_remove_group(&mk->kobj, &mk->mp->grp);
779
9b473de8
RR
780 /* These should not fail at boot. */
781 err = add_sysfs_param(mk, kparam, kparam->name + name_skip);
782 BUG_ON(err);
783 err = sysfs_create_group(&mk->kobj, &mk->mp->grp);
784 BUG_ON(err);
f30c53a8 785 kobject_uevent(&mk->kobj, KOBJ_ADD);
9b473de8 786 kobject_put(&mk->kobj);
1da177e4
LT
787}
788
789/*
b634d130 790 * param_sysfs_builtin - add sysfs parameters for built-in modules
1da177e4
LT
791 *
792 * Add module_parameters to sysfs for "modules" built into the kernel.
793 *
794 * The "module" name (KBUILD_MODNAME) is stored before a dot, the
795 * "parameter" name is stored behind a dot in kernel_param->name. So,
796 * extract the "module" name for all built-in kernel_param-eters,
9b473de8 797 * and for all who have the same, call kernel_add_sysfs_param.
1da177e4
LT
798 */
799static void __init param_sysfs_builtin(void)
800{
9b473de8
RR
801 struct kernel_param *kp;
802 unsigned int name_len;
803 char modname[MODULE_NAME_LEN];
1da177e4 804
9b473de8 805 for (kp = __start___param; kp < __stop___param; kp++) {
1da177e4
LT
806 char *dot;
807
9b473de8
RR
808 if (kp->perm == 0)
809 continue;
1da177e4 810
730b69d2 811 dot = strchr(kp->name, '.');
1da177e4 812 if (!dot) {
67e67cea
RR
813 /* This happens for core_param() */
814 strcpy(modname, "kernel");
815 name_len = 0;
816 } else {
817 name_len = dot - kp->name + 1;
818 strlcpy(modname, kp->name, name_len);
1da177e4 819 }
67e67cea 820 kernel_add_sysfs_param(modname, kp, name_len);
1da177e4 821 }
1da177e4
LT
822}
823
e94965ed 824ssize_t __modver_version_show(struct module_attribute *mattr,
4befb026 825 struct module_kobject *mk, char *buf)
e94965ed
DT
826{
827 struct module_version_attribute *vattr =
828 container_of(mattr, struct module_version_attribute, mattr);
829
f4940ab7 830 return scnprintf(buf, PAGE_SIZE, "%s\n", vattr->version);
e94965ed
DT
831}
832
b4bc8428
DT
833extern const struct module_version_attribute *__start___modver[];
834extern const struct module_version_attribute *__stop___modver[];
e94965ed
DT
835
836static void __init version_sysfs_builtin(void)
837{
b4bc8428 838 const struct module_version_attribute **p;
e94965ed
DT
839 struct module_kobject *mk;
840 int err;
841
b4bc8428
DT
842 for (p = __start___modver; p < __stop___modver; p++) {
843 const struct module_version_attribute *vattr = *p;
844
e94965ed
DT
845 mk = locate_module_kobject(vattr->module_name);
846 if (mk) {
847 err = sysfs_create_file(&mk->kobj, &vattr->mattr.attr);
848 kobject_uevent(&mk->kobj, KOBJ_ADD);
849 kobject_put(&mk->kobj);
850 }
851 }
852}
1da177e4
LT
853
854/* module-related sysfs stuff */
1da177e4 855
1da177e4
LT
856static ssize_t module_attr_show(struct kobject *kobj,
857 struct attribute *attr,
858 char *buf)
859{
860 struct module_attribute *attribute;
861 struct module_kobject *mk;
862 int ret;
863
864 attribute = to_module_attr(attr);
865 mk = to_module_kobject(kobj);
866
867 if (!attribute->show)
70f2817a 868 return -EIO;
1da177e4 869
4befb026 870 ret = attribute->show(attribute, mk, buf);
1da177e4 871
1da177e4
LT
872 return ret;
873}
874
875static ssize_t module_attr_store(struct kobject *kobj,
876 struct attribute *attr,
877 const char *buf, size_t len)
878{
879 struct module_attribute *attribute;
880 struct module_kobject *mk;
881 int ret;
882
883 attribute = to_module_attr(attr);
884 mk = to_module_kobject(kobj);
885
886 if (!attribute->store)
70f2817a 887 return -EIO;
1da177e4 888
4befb026 889 ret = attribute->store(attribute, mk, buf, len);
1da177e4 890
1da177e4
LT
891 return ret;
892}
893
52cf25d0 894static const struct sysfs_ops module_sysfs_ops = {
1da177e4
LT
895 .show = module_attr_show,
896 .store = module_attr_store,
897};
898
270a6c4c
KS
899static int uevent_filter(struct kset *kset, struct kobject *kobj)
900{
901 struct kobj_type *ktype = get_ktype(kobj);
902
903 if (ktype == &module_ktype)
904 return 1;
905 return 0;
906}
907
9cd43611 908static const struct kset_uevent_ops module_uevent_ops = {
270a6c4c
KS
909 .filter = uevent_filter,
910};
911
7405c1e1 912struct kset *module_kset;
823bccfc 913int module_sysfs_initialized;
1da177e4 914
942e4431
LZ
915static void module_kobj_release(struct kobject *kobj)
916{
917 struct module_kobject *mk = to_module_kobject(kobj);
918 complete(mk->kobj_completion);
919}
920
7405c1e1 921struct kobj_type module_ktype = {
942e4431 922 .release = module_kobj_release,
1da177e4
LT
923 .sysfs_ops = &module_sysfs_ops,
924};
925
1da177e4
LT
926/*
927 * param_sysfs_init - wrapper for built-in params support
928 */
929static int __init param_sysfs_init(void)
930{
7405c1e1
GKH
931 module_kset = kset_create_and_add("module", &module_uevent_ops, NULL);
932 if (!module_kset) {
933 printk(KERN_WARNING "%s (%d): error creating kset\n",
934 __FILE__, __LINE__);
935 return -ENOMEM;
d8c7649e 936 }
823bccfc 937 module_sysfs_initialized = 1;
1da177e4 938
e94965ed 939 version_sysfs_builtin();
1da177e4
LT
940 param_sysfs_builtin();
941
942 return 0;
943}
d10be6d1 944subsys_initcall(param_sysfs_init);
1da177e4 945
7405c1e1 946#endif /* CONFIG_SYSFS */