1457c8996SThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only 2e1ad7468SDavide Libenzi /* 3e1ad7468SDavide Libenzi * fs/eventfd.c 4e1ad7468SDavide Libenzi * 5e1ad7468SDavide Libenzi * Copyright (C) 2007 Davide Libenzi <davidel@xmailserver.org> 6e1ad7468SDavide Libenzi * 7e1ad7468SDavide Libenzi */ 8e1ad7468SDavide Libenzi 9e1ad7468SDavide Libenzi #include <linux/file.h> 10e1ad7468SDavide Libenzi #include <linux/poll.h> 11e1ad7468SDavide Libenzi #include <linux/init.h> 12e1ad7468SDavide Libenzi #include <linux/fs.h> 13174cd4b1SIngo Molnar #include <linux/sched/signal.h> 14e1ad7468SDavide Libenzi #include <linux/kernel.h> 155a0e3ad6STejun Heo #include <linux/slab.h> 16e1ad7468SDavide Libenzi #include <linux/list.h> 17e1ad7468SDavide Libenzi #include <linux/spinlock.h> 18e1ad7468SDavide Libenzi #include <linux/anon_inodes.h> 197747cdb2SAdrian Bunk #include <linux/syscalls.h> 20630d9c47SPaul Gortmaker #include <linux/export.h> 2113389010SDavide Libenzi #include <linux/kref.h> 2213389010SDavide Libenzi #include <linux/eventfd.h> 23cbac5542SCyrill Gorcunov #include <linux/proc_fs.h> 24cbac5542SCyrill Gorcunov #include <linux/seq_file.h> 25b556db17SMasatake YAMATO #include <linux/idr.h> 2612aceb89SJens Axboe #include <linux/uio.h> 27b556db17SMasatake YAMATO 28ce528c4cSYueHaibing static DEFINE_IDA(eventfd_ida); 29e1ad7468SDavide Libenzi 30e1ad7468SDavide Libenzi struct eventfd_ctx { 3113389010SDavide Libenzi struct kref kref; 32e1ad7468SDavide Libenzi wait_queue_head_t wqh; 33e1ad7468SDavide Libenzi /* 34e1ad7468SDavide Libenzi * Every time that a write(2) is performed on an eventfd, the 35e1ad7468SDavide Libenzi * value of the __u64 being written is added to "count" and a 36e1ad7468SDavide Libenzi * wakeup is performed on "wqh". A read(2) will return the "count" 37e1ad7468SDavide Libenzi * value to userspace, and will reset "count" to zero. The kernel 3813389010SDavide Libenzi * side eventfd_signal() also, adds to the "count" counter and 39e1ad7468SDavide Libenzi * issue a wakeup. 40e1ad7468SDavide Libenzi */ 41e1ad7468SDavide Libenzi __u64 count; 42bcd0b235SDavide Libenzi unsigned int flags; 43b556db17SMasatake YAMATO int id; 44e1ad7468SDavide Libenzi }; 45e1ad7468SDavide Libenzi 46*03e02acdSJens Axboe __u64 eventfd_signal_mask(struct eventfd_ctx *ctx, __u64 n, unsigned mask) 47e1ad7468SDavide Libenzi { 48e1ad7468SDavide Libenzi unsigned long flags; 49e1ad7468SDavide Libenzi 50b5e683d5SJens Axboe /* 51b5e683d5SJens Axboe * Deadlock or stack overflow issues can happen if we recurse here 52b5e683d5SJens Axboe * through waitqueue wakeup handlers. If the caller users potentially 53b5e683d5SJens Axboe * nested waitqueues with custom wakeup handlers, then it should 54b542e383SThomas Gleixner * check eventfd_signal_allowed() before calling this function. If 55b542e383SThomas Gleixner * it returns false, the eventfd_signal() call should be deferred to a 56b5e683d5SJens Axboe * safe context. 57b5e683d5SJens Axboe */ 589f0deaa1SDylan Yudaken if (WARN_ON_ONCE(current->in_eventfd)) 59b5e683d5SJens Axboe return 0; 60b5e683d5SJens Axboe 61d48eb233SDavide Libenzi spin_lock_irqsave(&ctx->wqh.lock, flags); 629f0deaa1SDylan Yudaken current->in_eventfd = 1; 63e1ad7468SDavide Libenzi if (ULLONG_MAX - ctx->count < n) 64ee62c6b2SSha Zhengju n = ULLONG_MAX - ctx->count; 65e1ad7468SDavide Libenzi ctx->count += n; 66e1ad7468SDavide Libenzi if (waitqueue_active(&ctx->wqh)) 67*03e02acdSJens Axboe wake_up_locked_poll(&ctx->wqh, EPOLLIN | mask); 689f0deaa1SDylan Yudaken current->in_eventfd = 0; 69d48eb233SDavide Libenzi spin_unlock_irqrestore(&ctx->wqh.lock, flags); 70e1ad7468SDavide Libenzi 71e1ad7468SDavide Libenzi return n; 72e1ad7468SDavide Libenzi } 73*03e02acdSJens Axboe 74*03e02acdSJens Axboe /** 75*03e02acdSJens Axboe * eventfd_signal - Adds @n to the eventfd counter. 76*03e02acdSJens Axboe * @ctx: [in] Pointer to the eventfd context. 77*03e02acdSJens Axboe * @n: [in] Value of the counter to be added to the eventfd internal counter. 78*03e02acdSJens Axboe * The value cannot be negative. 79*03e02acdSJens Axboe * 80*03e02acdSJens Axboe * This function is supposed to be called by the kernel in paths that do not 81*03e02acdSJens Axboe * allow sleeping. In this function we allow the counter to reach the ULLONG_MAX 82*03e02acdSJens Axboe * value, and we signal this as overflow condition by returning a EPOLLERR 83*03e02acdSJens Axboe * to poll(2). 84*03e02acdSJens Axboe * 85*03e02acdSJens Axboe * Returns the amount by which the counter was incremented. This will be less 86*03e02acdSJens Axboe * than @n if the counter has overflowed. 87*03e02acdSJens Axboe */ 88*03e02acdSJens Axboe __u64 eventfd_signal(struct eventfd_ctx *ctx, __u64 n) 89*03e02acdSJens Axboe { 90*03e02acdSJens Axboe return eventfd_signal_mask(ctx, n, 0); 91*03e02acdSJens Axboe } 925718607bSRusty Russell EXPORT_SYMBOL_GPL(eventfd_signal); 93e1ad7468SDavide Libenzi 94562787a5SDavide Libenzi static void eventfd_free_ctx(struct eventfd_ctx *ctx) 95562787a5SDavide Libenzi { 96b556db17SMasatake YAMATO if (ctx->id >= 0) 97b556db17SMasatake YAMATO ida_simple_remove(&eventfd_ida, ctx->id); 98562787a5SDavide Libenzi kfree(ctx); 99562787a5SDavide Libenzi } 100562787a5SDavide Libenzi 10113389010SDavide Libenzi static void eventfd_free(struct kref *kref) 10213389010SDavide Libenzi { 10313389010SDavide Libenzi struct eventfd_ctx *ctx = container_of(kref, struct eventfd_ctx, kref); 10413389010SDavide Libenzi 105562787a5SDavide Libenzi eventfd_free_ctx(ctx); 10613389010SDavide Libenzi } 10713389010SDavide Libenzi 10813389010SDavide Libenzi /** 10913389010SDavide Libenzi * eventfd_ctx_put - Releases a reference to the internal eventfd context. 11013389010SDavide Libenzi * @ctx: [in] Pointer to eventfd context. 11113389010SDavide Libenzi * 11213389010SDavide Libenzi * The eventfd context reference must have been previously acquired either 113105f2b70SEric Biggers * with eventfd_ctx_fdget() or eventfd_ctx_fileget(). 11413389010SDavide Libenzi */ 11513389010SDavide Libenzi void eventfd_ctx_put(struct eventfd_ctx *ctx) 11613389010SDavide Libenzi { 11713389010SDavide Libenzi kref_put(&ctx->kref, eventfd_free); 11813389010SDavide Libenzi } 11913389010SDavide Libenzi EXPORT_SYMBOL_GPL(eventfd_ctx_put); 12013389010SDavide Libenzi 121e1ad7468SDavide Libenzi static int eventfd_release(struct inode *inode, struct file *file) 122e1ad7468SDavide Libenzi { 12313389010SDavide Libenzi struct eventfd_ctx *ctx = file->private_data; 12413389010SDavide Libenzi 125a9a08845SLinus Torvalds wake_up_poll(&ctx->wqh, EPOLLHUP); 12613389010SDavide Libenzi eventfd_ctx_put(ctx); 127e1ad7468SDavide Libenzi return 0; 128e1ad7468SDavide Libenzi } 129e1ad7468SDavide Libenzi 130a11e1d43SLinus Torvalds static __poll_t eventfd_poll(struct file *file, poll_table *wait) 131e1ad7468SDavide Libenzi { 132e1ad7468SDavide Libenzi struct eventfd_ctx *ctx = file->private_data; 133076ccb76SAl Viro __poll_t events = 0; 134e22553e2SChris Mason u64 count; 135e1ad7468SDavide Libenzi 136a11e1d43SLinus Torvalds poll_wait(file, &ctx->wqh, wait); 137a11e1d43SLinus Torvalds 138a484c3ddSPaolo Bonzini /* 139a484c3ddSPaolo Bonzini * All writes to ctx->count occur within ctx->wqh.lock. This read 140a484c3ddSPaolo Bonzini * can be done outside ctx->wqh.lock because we know that poll_wait 141a484c3ddSPaolo Bonzini * takes that lock (through add_wait_queue) if our caller will sleep. 142a484c3ddSPaolo Bonzini * 143a484c3ddSPaolo Bonzini * The read _can_ therefore seep into add_wait_queue's critical 144a484c3ddSPaolo Bonzini * section, but cannot move above it! add_wait_queue's spin_lock acts 145a484c3ddSPaolo Bonzini * as an acquire barrier and ensures that the read be ordered properly 146a484c3ddSPaolo Bonzini * against the writes. The following CAN happen and is safe: 147a484c3ddSPaolo Bonzini * 148a484c3ddSPaolo Bonzini * poll write 149a484c3ddSPaolo Bonzini * ----------------- ------------ 150a484c3ddSPaolo Bonzini * lock ctx->wqh.lock (in poll_wait) 151a484c3ddSPaolo Bonzini * count = ctx->count 152a484c3ddSPaolo Bonzini * __add_wait_queue 153a484c3ddSPaolo Bonzini * unlock ctx->wqh.lock 154a484c3ddSPaolo Bonzini * lock ctx->qwh.lock 155a484c3ddSPaolo Bonzini * ctx->count += n 156a484c3ddSPaolo Bonzini * if (waitqueue_active) 157a484c3ddSPaolo Bonzini * wake_up_locked_poll 158a484c3ddSPaolo Bonzini * unlock ctx->qwh.lock 159a484c3ddSPaolo Bonzini * eventfd_poll returns 0 160a484c3ddSPaolo Bonzini * 161a484c3ddSPaolo Bonzini * but the following, which would miss a wakeup, cannot happen: 162a484c3ddSPaolo Bonzini * 163a484c3ddSPaolo Bonzini * poll write 164a484c3ddSPaolo Bonzini * ----------------- ------------ 165a484c3ddSPaolo Bonzini * count = ctx->count (INVALID!) 166a484c3ddSPaolo Bonzini * lock ctx->qwh.lock 167a484c3ddSPaolo Bonzini * ctx->count += n 168a484c3ddSPaolo Bonzini * **waitqueue_active is false** 169a484c3ddSPaolo Bonzini * **no wake_up_locked_poll!** 170a484c3ddSPaolo Bonzini * unlock ctx->qwh.lock 171a484c3ddSPaolo Bonzini * lock ctx->wqh.lock (in poll_wait) 172a484c3ddSPaolo Bonzini * __add_wait_queue 173a484c3ddSPaolo Bonzini * unlock ctx->wqh.lock 174a484c3ddSPaolo Bonzini * eventfd_poll returns 0 175a484c3ddSPaolo Bonzini */ 176a484c3ddSPaolo Bonzini count = READ_ONCE(ctx->count); 177e1ad7468SDavide Libenzi 178e22553e2SChris Mason if (count > 0) 179a11e1d43SLinus Torvalds events |= EPOLLIN; 180e22553e2SChris Mason if (count == ULLONG_MAX) 181a9a08845SLinus Torvalds events |= EPOLLERR; 182e22553e2SChris Mason if (ULLONG_MAX - 1 > count) 183a11e1d43SLinus Torvalds events |= EPOLLOUT; 184e1ad7468SDavide Libenzi 185e1ad7468SDavide Libenzi return events; 186e1ad7468SDavide Libenzi } 187e1ad7468SDavide Libenzi 18828f13267SDavid Woodhouse void eventfd_ctx_do_read(struct eventfd_ctx *ctx, __u64 *cnt) 189e1ad7468SDavide Libenzi { 19028f13267SDavid Woodhouse lockdep_assert_held(&ctx->wqh.lock); 19128f13267SDavid Woodhouse 192cb289d62SDavide Libenzi *cnt = (ctx->flags & EFD_SEMAPHORE) ? 1 : ctx->count; 193cb289d62SDavide Libenzi ctx->count -= *cnt; 194cb289d62SDavide Libenzi } 19528f13267SDavid Woodhouse EXPORT_SYMBOL_GPL(eventfd_ctx_do_read); 196cb289d62SDavide Libenzi 197cb289d62SDavide Libenzi /** 198cb289d62SDavide Libenzi * eventfd_ctx_remove_wait_queue - Read the current counter and removes wait queue. 199cb289d62SDavide Libenzi * @ctx: [in] Pointer to eventfd context. 200cb289d62SDavide Libenzi * @wait: [in] Wait queue to be removed. 20136182185SRandy Dunlap * @cnt: [out] Pointer to the 64-bit counter value. 202cb289d62SDavide Libenzi * 20336182185SRandy Dunlap * Returns %0 if successful, or the following error codes: 204cb289d62SDavide Libenzi * 205cb289d62SDavide Libenzi * -EAGAIN : The operation would have blocked. 206cb289d62SDavide Libenzi * 207cb289d62SDavide Libenzi * This is used to atomically remove a wait queue entry from the eventfd wait 208cb289d62SDavide Libenzi * queue head, and read/reset the counter value. 209cb289d62SDavide Libenzi */ 210ac6424b9SIngo Molnar int eventfd_ctx_remove_wait_queue(struct eventfd_ctx *ctx, wait_queue_entry_t *wait, 211cb289d62SDavide Libenzi __u64 *cnt) 212cb289d62SDavide Libenzi { 213cb289d62SDavide Libenzi unsigned long flags; 214cb289d62SDavide Libenzi 215cb289d62SDavide Libenzi spin_lock_irqsave(&ctx->wqh.lock, flags); 216cb289d62SDavide Libenzi eventfd_ctx_do_read(ctx, cnt); 217cb289d62SDavide Libenzi __remove_wait_queue(&ctx->wqh, wait); 218cb289d62SDavide Libenzi if (*cnt != 0 && waitqueue_active(&ctx->wqh)) 219a9a08845SLinus Torvalds wake_up_locked_poll(&ctx->wqh, EPOLLOUT); 220cb289d62SDavide Libenzi spin_unlock_irqrestore(&ctx->wqh.lock, flags); 221cb289d62SDavide Libenzi 222cb289d62SDavide Libenzi return *cnt != 0 ? 0 : -EAGAIN; 223cb289d62SDavide Libenzi } 224cb289d62SDavide Libenzi EXPORT_SYMBOL_GPL(eventfd_ctx_remove_wait_queue); 225cb289d62SDavide Libenzi 22612aceb89SJens Axboe static ssize_t eventfd_read(struct kiocb *iocb, struct iov_iter *to) 227cb289d62SDavide Libenzi { 22812aceb89SJens Axboe struct file *file = iocb->ki_filp; 229b6364572SEric Biggers struct eventfd_ctx *ctx = file->private_data; 230b6364572SEric Biggers __u64 ucnt = 0; 231e1ad7468SDavide Libenzi DECLARE_WAITQUEUE(wait, current); 232e1ad7468SDavide Libenzi 23312aceb89SJens Axboe if (iov_iter_count(to) < sizeof(ucnt)) 234b6364572SEric Biggers return -EINVAL; 235d48eb233SDavide Libenzi spin_lock_irq(&ctx->wqh.lock); 23612aceb89SJens Axboe if (!ctx->count) { 23712aceb89SJens Axboe if ((file->f_flags & O_NONBLOCK) || 23812aceb89SJens Axboe (iocb->ki_flags & IOCB_NOWAIT)) { 23912aceb89SJens Axboe spin_unlock_irq(&ctx->wqh.lock); 24012aceb89SJens Axboe return -EAGAIN; 24112aceb89SJens Axboe } 242e1ad7468SDavide Libenzi __add_wait_queue(&ctx->wqh, &wait); 243cb289d62SDavide Libenzi for (;;) { 244e1ad7468SDavide Libenzi set_current_state(TASK_INTERRUPTIBLE); 24512aceb89SJens Axboe if (ctx->count) 246e1ad7468SDavide Libenzi break; 247e1ad7468SDavide Libenzi if (signal_pending(current)) { 24812aceb89SJens Axboe __remove_wait_queue(&ctx->wqh, &wait); 24912aceb89SJens Axboe __set_current_state(TASK_RUNNING); 25012aceb89SJens Axboe spin_unlock_irq(&ctx->wqh.lock); 25112aceb89SJens Axboe return -ERESTARTSYS; 252e1ad7468SDavide Libenzi } 253d48eb233SDavide Libenzi spin_unlock_irq(&ctx->wqh.lock); 254e1ad7468SDavide Libenzi schedule(); 255d48eb233SDavide Libenzi spin_lock_irq(&ctx->wqh.lock); 256e1ad7468SDavide Libenzi } 257e1ad7468SDavide Libenzi __remove_wait_queue(&ctx->wqh, &wait); 258e1ad7468SDavide Libenzi __set_current_state(TASK_RUNNING); 259e1ad7468SDavide Libenzi } 260b6364572SEric Biggers eventfd_ctx_do_read(ctx, &ucnt); 2619f0deaa1SDylan Yudaken current->in_eventfd = 1; 262e1ad7468SDavide Libenzi if (waitqueue_active(&ctx->wqh)) 263a9a08845SLinus Torvalds wake_up_locked_poll(&ctx->wqh, EPOLLOUT); 2649f0deaa1SDylan Yudaken current->in_eventfd = 0; 265d48eb233SDavide Libenzi spin_unlock_irq(&ctx->wqh.lock); 26612aceb89SJens Axboe if (unlikely(copy_to_iter(&ucnt, sizeof(ucnt), to) != sizeof(ucnt))) 267b6364572SEric Biggers return -EFAULT; 268b6364572SEric Biggers 26912aceb89SJens Axboe return sizeof(ucnt); 270e1ad7468SDavide Libenzi } 271e1ad7468SDavide Libenzi 272e1ad7468SDavide Libenzi static ssize_t eventfd_write(struct file *file, const char __user *buf, size_t count, 273e1ad7468SDavide Libenzi loff_t *ppos) 274e1ad7468SDavide Libenzi { 275e1ad7468SDavide Libenzi struct eventfd_ctx *ctx = file->private_data; 276e1ad7468SDavide Libenzi ssize_t res; 277e1ad7468SDavide Libenzi __u64 ucnt; 278e1ad7468SDavide Libenzi DECLARE_WAITQUEUE(wait, current); 279e1ad7468SDavide Libenzi 280e1ad7468SDavide Libenzi if (count < sizeof(ucnt)) 281e1ad7468SDavide Libenzi return -EINVAL; 282e1ad7468SDavide Libenzi if (copy_from_user(&ucnt, buf, sizeof(ucnt))) 283e1ad7468SDavide Libenzi return -EFAULT; 284e1ad7468SDavide Libenzi if (ucnt == ULLONG_MAX) 285e1ad7468SDavide Libenzi return -EINVAL; 286d48eb233SDavide Libenzi spin_lock_irq(&ctx->wqh.lock); 287e1ad7468SDavide Libenzi res = -EAGAIN; 288e1ad7468SDavide Libenzi if (ULLONG_MAX - ctx->count > ucnt) 289e1ad7468SDavide Libenzi res = sizeof(ucnt); 290e1ad7468SDavide Libenzi else if (!(file->f_flags & O_NONBLOCK)) { 291e1ad7468SDavide Libenzi __add_wait_queue(&ctx->wqh, &wait); 292e1ad7468SDavide Libenzi for (res = 0;;) { 293e1ad7468SDavide Libenzi set_current_state(TASK_INTERRUPTIBLE); 294e1ad7468SDavide Libenzi if (ULLONG_MAX - ctx->count > ucnt) { 295e1ad7468SDavide Libenzi res = sizeof(ucnt); 296e1ad7468SDavide Libenzi break; 297e1ad7468SDavide Libenzi } 298e1ad7468SDavide Libenzi if (signal_pending(current)) { 299e1ad7468SDavide Libenzi res = -ERESTARTSYS; 300e1ad7468SDavide Libenzi break; 301e1ad7468SDavide Libenzi } 302d48eb233SDavide Libenzi spin_unlock_irq(&ctx->wqh.lock); 303e1ad7468SDavide Libenzi schedule(); 304d48eb233SDavide Libenzi spin_lock_irq(&ctx->wqh.lock); 305e1ad7468SDavide Libenzi } 306e1ad7468SDavide Libenzi __remove_wait_queue(&ctx->wqh, &wait); 307e1ad7468SDavide Libenzi __set_current_state(TASK_RUNNING); 308e1ad7468SDavide Libenzi } 309bcd0b235SDavide Libenzi if (likely(res > 0)) { 310e1ad7468SDavide Libenzi ctx->count += ucnt; 3119f0deaa1SDylan Yudaken current->in_eventfd = 1; 312e1ad7468SDavide Libenzi if (waitqueue_active(&ctx->wqh)) 313a9a08845SLinus Torvalds wake_up_locked_poll(&ctx->wqh, EPOLLIN); 3149f0deaa1SDylan Yudaken current->in_eventfd = 0; 315e1ad7468SDavide Libenzi } 316d48eb233SDavide Libenzi spin_unlock_irq(&ctx->wqh.lock); 317e1ad7468SDavide Libenzi 318e1ad7468SDavide Libenzi return res; 319e1ad7468SDavide Libenzi } 320e1ad7468SDavide Libenzi 321cbac5542SCyrill Gorcunov #ifdef CONFIG_PROC_FS 322a3816ab0SJoe Perches static void eventfd_show_fdinfo(struct seq_file *m, struct file *f) 323cbac5542SCyrill Gorcunov { 324cbac5542SCyrill Gorcunov struct eventfd_ctx *ctx = f->private_data; 325cbac5542SCyrill Gorcunov 326cbac5542SCyrill Gorcunov spin_lock_irq(&ctx->wqh.lock); 327a3816ab0SJoe Perches seq_printf(m, "eventfd-count: %16llx\n", 328cbac5542SCyrill Gorcunov (unsigned long long)ctx->count); 329cbac5542SCyrill Gorcunov spin_unlock_irq(&ctx->wqh.lock); 330b556db17SMasatake YAMATO seq_printf(m, "eventfd-id: %d\n", ctx->id); 331cbac5542SCyrill Gorcunov } 332cbac5542SCyrill Gorcunov #endif 333cbac5542SCyrill Gorcunov 334e1ad7468SDavide Libenzi static const struct file_operations eventfd_fops = { 335cbac5542SCyrill Gorcunov #ifdef CONFIG_PROC_FS 336cbac5542SCyrill Gorcunov .show_fdinfo = eventfd_show_fdinfo, 337cbac5542SCyrill Gorcunov #endif 338e1ad7468SDavide Libenzi .release = eventfd_release, 339a11e1d43SLinus Torvalds .poll = eventfd_poll, 34012aceb89SJens Axboe .read_iter = eventfd_read, 341e1ad7468SDavide Libenzi .write = eventfd_write, 3426038f373SArnd Bergmann .llseek = noop_llseek, 343e1ad7468SDavide Libenzi }; 344e1ad7468SDavide Libenzi 34513389010SDavide Libenzi /** 34613389010SDavide Libenzi * eventfd_fget - Acquire a reference of an eventfd file descriptor. 34713389010SDavide Libenzi * @fd: [in] Eventfd file descriptor. 34813389010SDavide Libenzi * 34913389010SDavide Libenzi * Returns a pointer to the eventfd file structure in case of success, or the 35013389010SDavide Libenzi * following error pointer: 35113389010SDavide Libenzi * 35213389010SDavide Libenzi * -EBADF : Invalid @fd file descriptor. 35313389010SDavide Libenzi * -EINVAL : The @fd file descriptor is not an eventfd file. 35413389010SDavide Libenzi */ 355e1ad7468SDavide Libenzi struct file *eventfd_fget(int fd) 356e1ad7468SDavide Libenzi { 357e1ad7468SDavide Libenzi struct file *file; 358e1ad7468SDavide Libenzi 359e1ad7468SDavide Libenzi file = fget(fd); 360e1ad7468SDavide Libenzi if (!file) 361e1ad7468SDavide Libenzi return ERR_PTR(-EBADF); 362e1ad7468SDavide Libenzi if (file->f_op != &eventfd_fops) { 363e1ad7468SDavide Libenzi fput(file); 364e1ad7468SDavide Libenzi return ERR_PTR(-EINVAL); 365e1ad7468SDavide Libenzi } 366e1ad7468SDavide Libenzi 367e1ad7468SDavide Libenzi return file; 368e1ad7468SDavide Libenzi } 3695718607bSRusty Russell EXPORT_SYMBOL_GPL(eventfd_fget); 370e1ad7468SDavide Libenzi 37113389010SDavide Libenzi /** 37213389010SDavide Libenzi * eventfd_ctx_fdget - Acquires a reference to the internal eventfd context. 37313389010SDavide Libenzi * @fd: [in] Eventfd file descriptor. 37413389010SDavide Libenzi * 37513389010SDavide Libenzi * Returns a pointer to the internal eventfd context, otherwise the error 37613389010SDavide Libenzi * pointers returned by the following functions: 37713389010SDavide Libenzi * 37813389010SDavide Libenzi * eventfd_fget 37913389010SDavide Libenzi */ 38013389010SDavide Libenzi struct eventfd_ctx *eventfd_ctx_fdget(int fd) 38113389010SDavide Libenzi { 38213389010SDavide Libenzi struct eventfd_ctx *ctx; 38336a74117SAl Viro struct fd f = fdget(fd); 38436a74117SAl Viro if (!f.file) 38536a74117SAl Viro return ERR_PTR(-EBADF); 38636a74117SAl Viro ctx = eventfd_ctx_fileget(f.file); 38736a74117SAl Viro fdput(f); 38813389010SDavide Libenzi return ctx; 38913389010SDavide Libenzi } 39013389010SDavide Libenzi EXPORT_SYMBOL_GPL(eventfd_ctx_fdget); 39113389010SDavide Libenzi 39213389010SDavide Libenzi /** 39313389010SDavide Libenzi * eventfd_ctx_fileget - Acquires a reference to the internal eventfd context. 39413389010SDavide Libenzi * @file: [in] Eventfd file pointer. 39513389010SDavide Libenzi * 39613389010SDavide Libenzi * Returns a pointer to the internal eventfd context, otherwise the error 39713389010SDavide Libenzi * pointer: 39813389010SDavide Libenzi * 39913389010SDavide Libenzi * -EINVAL : The @fd file descriptor is not an eventfd file. 40013389010SDavide Libenzi */ 40113389010SDavide Libenzi struct eventfd_ctx *eventfd_ctx_fileget(struct file *file) 40213389010SDavide Libenzi { 403105f2b70SEric Biggers struct eventfd_ctx *ctx; 404105f2b70SEric Biggers 40513389010SDavide Libenzi if (file->f_op != &eventfd_fops) 40613389010SDavide Libenzi return ERR_PTR(-EINVAL); 40713389010SDavide Libenzi 408105f2b70SEric Biggers ctx = file->private_data; 409105f2b70SEric Biggers kref_get(&ctx->kref); 410105f2b70SEric Biggers return ctx; 41113389010SDavide Libenzi } 41213389010SDavide Libenzi EXPORT_SYMBOL_GPL(eventfd_ctx_fileget); 41313389010SDavide Libenzi 4142fc96f83SDominik Brodowski static int do_eventfd(unsigned int count, int flags) 415e1ad7468SDavide Libenzi { 416e1ad7468SDavide Libenzi struct eventfd_ctx *ctx; 41712aceb89SJens Axboe struct file *file; 4187d815165SEric Biggers int fd; 419e1ad7468SDavide Libenzi 420e38b36f3SUlrich Drepper /* Check the EFD_* constants for consistency. */ 421e38b36f3SUlrich Drepper BUILD_BUG_ON(EFD_CLOEXEC != O_CLOEXEC); 422e38b36f3SUlrich Drepper BUILD_BUG_ON(EFD_NONBLOCK != O_NONBLOCK); 423e38b36f3SUlrich Drepper 424bcd0b235SDavide Libenzi if (flags & ~EFD_FLAGS_SET) 4257d815165SEric Biggers return -EINVAL; 426b087498eSUlrich Drepper 427e1ad7468SDavide Libenzi ctx = kmalloc(sizeof(*ctx), GFP_KERNEL); 428e1ad7468SDavide Libenzi if (!ctx) 4297d815165SEric Biggers return -ENOMEM; 430e1ad7468SDavide Libenzi 43113389010SDavide Libenzi kref_init(&ctx->kref); 432e1ad7468SDavide Libenzi init_waitqueue_head(&ctx->wqh); 433e1ad7468SDavide Libenzi ctx->count = count; 434bcd0b235SDavide Libenzi ctx->flags = flags; 435b556db17SMasatake YAMATO ctx->id = ida_simple_get(&eventfd_ida, 0, 0, GFP_KERNEL); 436e1ad7468SDavide Libenzi 43712aceb89SJens Axboe flags &= EFD_SHARED_FCNTL_FLAGS; 43812aceb89SJens Axboe flags |= O_RDWR; 43912aceb89SJens Axboe fd = get_unused_fd_flags(flags); 4407d815165SEric Biggers if (fd < 0) 44112aceb89SJens Axboe goto err; 442562787a5SDavide Libenzi 44312aceb89SJens Axboe file = anon_inode_getfile("[eventfd]", &eventfd_fops, ctx, flags); 44412aceb89SJens Axboe if (IS_ERR(file)) { 44512aceb89SJens Axboe put_unused_fd(fd); 44612aceb89SJens Axboe fd = PTR_ERR(file); 44712aceb89SJens Axboe goto err; 44812aceb89SJens Axboe } 44912aceb89SJens Axboe 45012aceb89SJens Axboe file->f_mode |= FMODE_NOWAIT; 45112aceb89SJens Axboe fd_install(fd, file); 45212aceb89SJens Axboe return fd; 45312aceb89SJens Axboe err: 45412aceb89SJens Axboe eventfd_free_ctx(ctx); 4552030a42cSAl Viro return fd; 456e1ad7468SDavide Libenzi } 457e1ad7468SDavide Libenzi 4582fc96f83SDominik Brodowski SYSCALL_DEFINE2(eventfd2, unsigned int, count, int, flags) 4592fc96f83SDominik Brodowski { 4602fc96f83SDominik Brodowski return do_eventfd(count, flags); 4612fc96f83SDominik Brodowski } 4622fc96f83SDominik Brodowski 463d4e82042SHeiko Carstens SYSCALL_DEFINE1(eventfd, unsigned int, count) 464b087498eSUlrich Drepper { 4652fc96f83SDominik Brodowski return do_eventfd(count, 0); 466b087498eSUlrich Drepper } 467bcd0b235SDavide Libenzi 468