Loading...
1/*
2 * System Trace Module (STM) master/channel allocation policy management
3 * Copyright (c) 2014, Intel Corporation.
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms and conditions of the GNU General Public License,
7 * version 2, as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
12 * more details.
13 *
14 * A master/channel allocation policy allows mapping string identifiers to
15 * master and channel ranges, where allocation can be done.
16 */
17
18#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
19
20#include <linux/types.h>
21#include <linux/module.h>
22#include <linux/device.h>
23#include <linux/configfs.h>
24#include <linux/slab.h>
25#include <linux/stm.h>
26#include "stm.h"
27
28/*
29 * STP Master/Channel allocation policy configfs layout.
30 */
31
32struct stp_policy {
33 struct config_group group;
34 struct stm_device *stm;
35};
36
37struct stp_policy_node {
38 struct config_group group;
39 struct stp_policy *policy;
40 unsigned int first_master;
41 unsigned int last_master;
42 unsigned int first_channel;
43 unsigned int last_channel;
44};
45
46static struct configfs_subsystem stp_policy_subsys;
47
48void stp_policy_node_get_ranges(struct stp_policy_node *policy_node,
49 unsigned int *mstart, unsigned int *mend,
50 unsigned int *cstart, unsigned int *cend)
51{
52 *mstart = policy_node->first_master;
53 *mend = policy_node->last_master;
54 *cstart = policy_node->first_channel;
55 *cend = policy_node->last_channel;
56}
57
58static inline char *stp_policy_node_name(struct stp_policy_node *policy_node)
59{
60 return policy_node->group.cg_item.ci_name ? : "<none>";
61}
62
63static inline struct stp_policy *to_stp_policy(struct config_item *item)
64{
65 return item ?
66 container_of(to_config_group(item), struct stp_policy, group) :
67 NULL;
68}
69
70static inline struct stp_policy_node *
71to_stp_policy_node(struct config_item *item)
72{
73 return item ?
74 container_of(to_config_group(item), struct stp_policy_node,
75 group) :
76 NULL;
77}
78
79static ssize_t
80stp_policy_node_masters_show(struct config_item *item, char *page)
81{
82 struct stp_policy_node *policy_node = to_stp_policy_node(item);
83 ssize_t count;
84
85 count = sprintf(page, "%u %u\n", policy_node->first_master,
86 policy_node->last_master);
87
88 return count;
89}
90
91static ssize_t
92stp_policy_node_masters_store(struct config_item *item, const char *page,
93 size_t count)
94{
95 struct stp_policy_node *policy_node = to_stp_policy_node(item);
96 unsigned int first, last;
97 struct stm_device *stm;
98 char *p = (char *)page;
99 ssize_t ret = -ENODEV;
100
101 if (sscanf(p, "%u %u", &first, &last) != 2)
102 return -EINVAL;
103
104 mutex_lock(&stp_policy_subsys.su_mutex);
105 stm = policy_node->policy->stm;
106 if (!stm)
107 goto unlock;
108
109 /* must be within [sw_start..sw_end], which is an inclusive range */
110 if (first > INT_MAX || last > INT_MAX || first > last ||
111 first < stm->data->sw_start ||
112 last > stm->data->sw_end) {
113 ret = -ERANGE;
114 goto unlock;
115 }
116
117 ret = count;
118 policy_node->first_master = first;
119 policy_node->last_master = last;
120
121unlock:
122 mutex_unlock(&stp_policy_subsys.su_mutex);
123
124 return ret;
125}
126
127static ssize_t
128stp_policy_node_channels_show(struct config_item *item, char *page)
129{
130 struct stp_policy_node *policy_node = to_stp_policy_node(item);
131 ssize_t count;
132
133 count = sprintf(page, "%u %u\n", policy_node->first_channel,
134 policy_node->last_channel);
135
136 return count;
137}
138
139static ssize_t
140stp_policy_node_channels_store(struct config_item *item, const char *page,
141 size_t count)
142{
143 struct stp_policy_node *policy_node = to_stp_policy_node(item);
144 unsigned int first, last;
145 struct stm_device *stm;
146 char *p = (char *)page;
147 ssize_t ret = -ENODEV;
148
149 if (sscanf(p, "%u %u", &first, &last) != 2)
150 return -EINVAL;
151
152 mutex_lock(&stp_policy_subsys.su_mutex);
153 stm = policy_node->policy->stm;
154 if (!stm)
155 goto unlock;
156
157 if (first > INT_MAX || last > INT_MAX || first > last ||
158 last >= stm->data->sw_nchannels) {
159 ret = -ERANGE;
160 goto unlock;
161 }
162
163 ret = count;
164 policy_node->first_channel = first;
165 policy_node->last_channel = last;
166
167unlock:
168 mutex_unlock(&stp_policy_subsys.su_mutex);
169
170 return ret;
171}
172
173static void stp_policy_node_release(struct config_item *item)
174{
175 kfree(to_stp_policy_node(item));
176}
177
178static struct configfs_item_operations stp_policy_node_item_ops = {
179 .release = stp_policy_node_release,
180};
181
182CONFIGFS_ATTR(stp_policy_node_, masters);
183CONFIGFS_ATTR(stp_policy_node_, channels);
184
185static struct configfs_attribute *stp_policy_node_attrs[] = {
186 &stp_policy_node_attr_masters,
187 &stp_policy_node_attr_channels,
188 NULL,
189};
190
191static struct config_item_type stp_policy_type;
192static struct config_item_type stp_policy_node_type;
193
194static struct config_group *
195stp_policy_node_make(struct config_group *group, const char *name)
196{
197 struct stp_policy_node *policy_node, *parent_node;
198 struct stp_policy *policy;
199
200 if (group->cg_item.ci_type == &stp_policy_type) {
201 policy = container_of(group, struct stp_policy, group);
202 } else {
203 parent_node = container_of(group, struct stp_policy_node,
204 group);
205 policy = parent_node->policy;
206 }
207
208 if (!policy->stm)
209 return ERR_PTR(-ENODEV);
210
211 policy_node = kzalloc(sizeof(struct stp_policy_node), GFP_KERNEL);
212 if (!policy_node)
213 return ERR_PTR(-ENOMEM);
214
215 config_group_init_type_name(&policy_node->group, name,
216 &stp_policy_node_type);
217
218 policy_node->policy = policy;
219
220 /* default values for the attributes */
221 policy_node->first_master = policy->stm->data->sw_start;
222 policy_node->last_master = policy->stm->data->sw_end;
223 policy_node->first_channel = 0;
224 policy_node->last_channel = policy->stm->data->sw_nchannels - 1;
225
226 return &policy_node->group;
227}
228
229static void
230stp_policy_node_drop(struct config_group *group, struct config_item *item)
231{
232 config_item_put(item);
233}
234
235static struct configfs_group_operations stp_policy_node_group_ops = {
236 .make_group = stp_policy_node_make,
237 .drop_item = stp_policy_node_drop,
238};
239
240static struct config_item_type stp_policy_node_type = {
241 .ct_item_ops = &stp_policy_node_item_ops,
242 .ct_group_ops = &stp_policy_node_group_ops,
243 .ct_attrs = stp_policy_node_attrs,
244 .ct_owner = THIS_MODULE,
245};
246
247/*
248 * Root group: policies.
249 */
250static ssize_t stp_policy_device_show(struct config_item *item,
251 char *page)
252{
253 struct stp_policy *policy = to_stp_policy(item);
254 ssize_t count;
255
256 count = sprintf(page, "%s\n",
257 (policy && policy->stm) ?
258 policy->stm->data->name :
259 "<none>");
260
261 return count;
262}
263
264CONFIGFS_ATTR_RO(stp_policy_, device);
265
266static struct configfs_attribute *stp_policy_attrs[] = {
267 &stp_policy_attr_device,
268 NULL,
269};
270
271void stp_policy_unbind(struct stp_policy *policy)
272{
273 struct stm_device *stm = policy->stm;
274
275 /*
276 * stp_policy_release() will not call here if the policy is already
277 * unbound; other users should not either, as no link exists between
278 * this policy and anything else in that case
279 */
280 if (WARN_ON_ONCE(!policy->stm))
281 return;
282
283 lockdep_assert_held(&stm->policy_mutex);
284
285 stm->policy = NULL;
286 policy->stm = NULL;
287
288 stm_put_device(stm);
289}
290
291static void stp_policy_release(struct config_item *item)
292{
293 struct stp_policy *policy = to_stp_policy(item);
294 struct stm_device *stm = policy->stm;
295
296 /* a policy *can* be unbound and still exist in configfs tree */
297 if (!stm)
298 return;
299
300 mutex_lock(&stm->policy_mutex);
301 stp_policy_unbind(policy);
302 mutex_unlock(&stm->policy_mutex);
303
304 kfree(policy);
305}
306
307static struct configfs_item_operations stp_policy_item_ops = {
308 .release = stp_policy_release,
309};
310
311static struct configfs_group_operations stp_policy_group_ops = {
312 .make_group = stp_policy_node_make,
313};
314
315static struct config_item_type stp_policy_type = {
316 .ct_item_ops = &stp_policy_item_ops,
317 .ct_group_ops = &stp_policy_group_ops,
318 .ct_attrs = stp_policy_attrs,
319 .ct_owner = THIS_MODULE,
320};
321
322static struct config_group *
323stp_policies_make(struct config_group *group, const char *name)
324{
325 struct config_group *ret;
326 struct stm_device *stm;
327 char *devname, *p;
328
329 devname = kasprintf(GFP_KERNEL, "%s", name);
330 if (!devname)
331 return ERR_PTR(-ENOMEM);
332
333 /*
334 * node must look like <device_name>.<policy_name>, where
335 * <device_name> is the name of an existing stm device; may
336 * contain dots;
337 * <policy_name> is an arbitrary string; may not contain dots
338 */
339 p = strrchr(devname, '.');
340 if (!p) {
341 kfree(devname);
342 return ERR_PTR(-EINVAL);
343 }
344
345 *p++ = '\0';
346
347 stm = stm_find_device(devname);
348 kfree(devname);
349
350 if (!stm)
351 return ERR_PTR(-ENODEV);
352
353 mutex_lock(&stm->policy_mutex);
354 if (stm->policy) {
355 ret = ERR_PTR(-EBUSY);
356 goto unlock_policy;
357 }
358
359 stm->policy = kzalloc(sizeof(*stm->policy), GFP_KERNEL);
360 if (!stm->policy) {
361 ret = ERR_PTR(-ENOMEM);
362 goto unlock_policy;
363 }
364
365 config_group_init_type_name(&stm->policy->group, name,
366 &stp_policy_type);
367 stm->policy->stm = stm;
368
369 ret = &stm->policy->group;
370
371unlock_policy:
372 mutex_unlock(&stm->policy_mutex);
373
374 if (IS_ERR(ret))
375 stm_put_device(stm);
376
377 return ret;
378}
379
380static struct configfs_group_operations stp_policies_group_ops = {
381 .make_group = stp_policies_make,
382};
383
384static struct config_item_type stp_policies_type = {
385 .ct_group_ops = &stp_policies_group_ops,
386 .ct_owner = THIS_MODULE,
387};
388
389static struct configfs_subsystem stp_policy_subsys = {
390 .su_group = {
391 .cg_item = {
392 .ci_namebuf = "stp-policy",
393 .ci_type = &stp_policies_type,
394 },
395 },
396};
397
398/*
399 * Lock the policy mutex from the outside
400 */
401static struct stp_policy_node *
402__stp_policy_node_lookup(struct stp_policy *policy, char *s)
403{
404 struct stp_policy_node *policy_node, *ret;
405 struct list_head *head = &policy->group.cg_children;
406 struct config_item *item;
407 char *start, *end = s;
408
409 if (list_empty(head))
410 return NULL;
411
412 /* return the first entry if everything else fails */
413 item = list_entry(head->next, struct config_item, ci_entry);
414 ret = to_stp_policy_node(item);
415
416next:
417 for (;;) {
418 start = strsep(&end, "/");
419 if (!start)
420 break;
421
422 if (!*start)
423 continue;
424
425 list_for_each_entry(item, head, ci_entry) {
426 policy_node = to_stp_policy_node(item);
427
428 if (!strcmp(start,
429 policy_node->group.cg_item.ci_name)) {
430 ret = policy_node;
431
432 if (!end)
433 goto out;
434
435 head = &policy_node->group.cg_children;
436 goto next;
437 }
438 }
439 break;
440 }
441
442out:
443 return ret;
444}
445
446
447struct stp_policy_node *
448stp_policy_node_lookup(struct stm_device *stm, char *s)
449{
450 struct stp_policy_node *policy_node = NULL;
451
452 mutex_lock(&stp_policy_subsys.su_mutex);
453
454 mutex_lock(&stm->policy_mutex);
455 if (stm->policy)
456 policy_node = __stp_policy_node_lookup(stm->policy, s);
457 mutex_unlock(&stm->policy_mutex);
458
459 if (policy_node)
460 config_item_get(&policy_node->group.cg_item);
461 mutex_unlock(&stp_policy_subsys.su_mutex);
462
463 return policy_node;
464}
465
466void stp_policy_node_put(struct stp_policy_node *policy_node)
467{
468 config_item_put(&policy_node->group.cg_item);
469}
470
471int __init stp_configfs_init(void)
472{
473 int err;
474
475 config_group_init(&stp_policy_subsys.su_group);
476 mutex_init(&stp_policy_subsys.su_mutex);
477 err = configfs_register_subsystem(&stp_policy_subsys);
478
479 return err;
480}
481
482void __exit stp_configfs_exit(void)
483{
484 configfs_unregister_subsystem(&stp_policy_subsys);
485}
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * System Trace Module (STM) master/channel allocation policy management
4 * Copyright (c) 2014, Intel Corporation.
5 *
6 * A master/channel allocation policy allows mapping string identifiers to
7 * master and channel ranges, where allocation can be done.
8 */
9
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
12#include <linux/types.h>
13#include <linux/module.h>
14#include <linux/device.h>
15#include <linux/configfs.h>
16#include <linux/slab.h>
17#include <linux/stm.h>
18#include "stm.h"
19
20/*
21 * STP Master/Channel allocation policy configfs layout.
22 */
23
24struct stp_policy {
25 struct config_group group;
26 struct stm_device *stm;
27};
28
29struct stp_policy_node {
30 struct config_group group;
31 struct stp_policy *policy;
32 unsigned int first_master;
33 unsigned int last_master;
34 unsigned int first_channel;
35 unsigned int last_channel;
36};
37
38static struct configfs_subsystem stp_policy_subsys;
39
40void stp_policy_node_get_ranges(struct stp_policy_node *policy_node,
41 unsigned int *mstart, unsigned int *mend,
42 unsigned int *cstart, unsigned int *cend)
43{
44 *mstart = policy_node->first_master;
45 *mend = policy_node->last_master;
46 *cstart = policy_node->first_channel;
47 *cend = policy_node->last_channel;
48}
49
50static inline char *stp_policy_node_name(struct stp_policy_node *policy_node)
51{
52 return policy_node->group.cg_item.ci_name ? : "<none>";
53}
54
55static inline struct stp_policy *to_stp_policy(struct config_item *item)
56{
57 return item ?
58 container_of(to_config_group(item), struct stp_policy, group) :
59 NULL;
60}
61
62static inline struct stp_policy_node *
63to_stp_policy_node(struct config_item *item)
64{
65 return item ?
66 container_of(to_config_group(item), struct stp_policy_node,
67 group) :
68 NULL;
69}
70
71static ssize_t
72stp_policy_node_masters_show(struct config_item *item, char *page)
73{
74 struct stp_policy_node *policy_node = to_stp_policy_node(item);
75 ssize_t count;
76
77 count = sprintf(page, "%u %u\n", policy_node->first_master,
78 policy_node->last_master);
79
80 return count;
81}
82
83static ssize_t
84stp_policy_node_masters_store(struct config_item *item, const char *page,
85 size_t count)
86{
87 struct stp_policy_node *policy_node = to_stp_policy_node(item);
88 unsigned int first, last;
89 struct stm_device *stm;
90 char *p = (char *)page;
91 ssize_t ret = -ENODEV;
92
93 if (sscanf(p, "%u %u", &first, &last) != 2)
94 return -EINVAL;
95
96 mutex_lock(&stp_policy_subsys.su_mutex);
97 stm = policy_node->policy->stm;
98 if (!stm)
99 goto unlock;
100
101 /* must be within [sw_start..sw_end], which is an inclusive range */
102 if (first > last || first < stm->data->sw_start ||
103 last > stm->data->sw_end) {
104 ret = -ERANGE;
105 goto unlock;
106 }
107
108 ret = count;
109 policy_node->first_master = first;
110 policy_node->last_master = last;
111
112unlock:
113 mutex_unlock(&stp_policy_subsys.su_mutex);
114
115 return ret;
116}
117
118static ssize_t
119stp_policy_node_channels_show(struct config_item *item, char *page)
120{
121 struct stp_policy_node *policy_node = to_stp_policy_node(item);
122 ssize_t count;
123
124 count = sprintf(page, "%u %u\n", policy_node->first_channel,
125 policy_node->last_channel);
126
127 return count;
128}
129
130static ssize_t
131stp_policy_node_channels_store(struct config_item *item, const char *page,
132 size_t count)
133{
134 struct stp_policy_node *policy_node = to_stp_policy_node(item);
135 unsigned int first, last;
136 struct stm_device *stm;
137 char *p = (char *)page;
138 ssize_t ret = -ENODEV;
139
140 if (sscanf(p, "%u %u", &first, &last) != 2)
141 return -EINVAL;
142
143 mutex_lock(&stp_policy_subsys.su_mutex);
144 stm = policy_node->policy->stm;
145 if (!stm)
146 goto unlock;
147
148 if (first > INT_MAX || last > INT_MAX || first > last ||
149 last >= stm->data->sw_nchannels) {
150 ret = -ERANGE;
151 goto unlock;
152 }
153
154 ret = count;
155 policy_node->first_channel = first;
156 policy_node->last_channel = last;
157
158unlock:
159 mutex_unlock(&stp_policy_subsys.su_mutex);
160
161 return ret;
162}
163
164static void stp_policy_node_release(struct config_item *item)
165{
166 kfree(to_stp_policy_node(item));
167}
168
169static struct configfs_item_operations stp_policy_node_item_ops = {
170 .release = stp_policy_node_release,
171};
172
173CONFIGFS_ATTR(stp_policy_node_, masters);
174CONFIGFS_ATTR(stp_policy_node_, channels);
175
176static struct configfs_attribute *stp_policy_node_attrs[] = {
177 &stp_policy_node_attr_masters,
178 &stp_policy_node_attr_channels,
179 NULL,
180};
181
182static const struct config_item_type stp_policy_type;
183static const struct config_item_type stp_policy_node_type;
184
185static struct config_group *
186stp_policy_node_make(struct config_group *group, const char *name)
187{
188 struct stp_policy_node *policy_node, *parent_node;
189 struct stp_policy *policy;
190
191 if (group->cg_item.ci_type == &stp_policy_type) {
192 policy = container_of(group, struct stp_policy, group);
193 } else {
194 parent_node = container_of(group, struct stp_policy_node,
195 group);
196 policy = parent_node->policy;
197 }
198
199 if (!policy->stm)
200 return ERR_PTR(-ENODEV);
201
202 policy_node = kzalloc(sizeof(struct stp_policy_node), GFP_KERNEL);
203 if (!policy_node)
204 return ERR_PTR(-ENOMEM);
205
206 config_group_init_type_name(&policy_node->group, name,
207 &stp_policy_node_type);
208
209 policy_node->policy = policy;
210
211 /* default values for the attributes */
212 policy_node->first_master = policy->stm->data->sw_start;
213 policy_node->last_master = policy->stm->data->sw_end;
214 policy_node->first_channel = 0;
215 policy_node->last_channel = policy->stm->data->sw_nchannels - 1;
216
217 return &policy_node->group;
218}
219
220static void
221stp_policy_node_drop(struct config_group *group, struct config_item *item)
222{
223 config_item_put(item);
224}
225
226static struct configfs_group_operations stp_policy_node_group_ops = {
227 .make_group = stp_policy_node_make,
228 .drop_item = stp_policy_node_drop,
229};
230
231static const struct config_item_type stp_policy_node_type = {
232 .ct_item_ops = &stp_policy_node_item_ops,
233 .ct_group_ops = &stp_policy_node_group_ops,
234 .ct_attrs = stp_policy_node_attrs,
235 .ct_owner = THIS_MODULE,
236};
237
238/*
239 * Root group: policies.
240 */
241static ssize_t stp_policy_device_show(struct config_item *item,
242 char *page)
243{
244 struct stp_policy *policy = to_stp_policy(item);
245 ssize_t count;
246
247 count = sprintf(page, "%s\n",
248 (policy && policy->stm) ?
249 policy->stm->data->name :
250 "<none>");
251
252 return count;
253}
254
255CONFIGFS_ATTR_RO(stp_policy_, device);
256
257static struct configfs_attribute *stp_policy_attrs[] = {
258 &stp_policy_attr_device,
259 NULL,
260};
261
262void stp_policy_unbind(struct stp_policy *policy)
263{
264 struct stm_device *stm = policy->stm;
265
266 /*
267 * stp_policy_release() will not call here if the policy is already
268 * unbound; other users should not either, as no link exists between
269 * this policy and anything else in that case
270 */
271 if (WARN_ON_ONCE(!policy->stm))
272 return;
273
274 lockdep_assert_held(&stm->policy_mutex);
275
276 stm->policy = NULL;
277 policy->stm = NULL;
278
279 stm_put_device(stm);
280}
281
282static void stp_policy_release(struct config_item *item)
283{
284 struct stp_policy *policy = to_stp_policy(item);
285 struct stm_device *stm = policy->stm;
286
287 /* a policy *can* be unbound and still exist in configfs tree */
288 if (!stm)
289 return;
290
291 mutex_lock(&stm->policy_mutex);
292 stp_policy_unbind(policy);
293 mutex_unlock(&stm->policy_mutex);
294
295 kfree(policy);
296}
297
298static struct configfs_item_operations stp_policy_item_ops = {
299 .release = stp_policy_release,
300};
301
302static struct configfs_group_operations stp_policy_group_ops = {
303 .make_group = stp_policy_node_make,
304};
305
306static const struct config_item_type stp_policy_type = {
307 .ct_item_ops = &stp_policy_item_ops,
308 .ct_group_ops = &stp_policy_group_ops,
309 .ct_attrs = stp_policy_attrs,
310 .ct_owner = THIS_MODULE,
311};
312
313static struct config_group *
314stp_policies_make(struct config_group *group, const char *name)
315{
316 struct config_group *ret;
317 struct stm_device *stm;
318 char *devname, *p;
319
320 devname = kasprintf(GFP_KERNEL, "%s", name);
321 if (!devname)
322 return ERR_PTR(-ENOMEM);
323
324 /*
325 * node must look like <device_name>.<policy_name>, where
326 * <device_name> is the name of an existing stm device; may
327 * contain dots;
328 * <policy_name> is an arbitrary string; may not contain dots
329 */
330 p = strrchr(devname, '.');
331 if (!p) {
332 kfree(devname);
333 return ERR_PTR(-EINVAL);
334 }
335
336 *p = '\0';
337
338 stm = stm_find_device(devname);
339 kfree(devname);
340
341 if (!stm)
342 return ERR_PTR(-ENODEV);
343
344 mutex_lock(&stm->policy_mutex);
345 if (stm->policy) {
346 ret = ERR_PTR(-EBUSY);
347 goto unlock_policy;
348 }
349
350 stm->policy = kzalloc(sizeof(*stm->policy), GFP_KERNEL);
351 if (!stm->policy) {
352 ret = ERR_PTR(-ENOMEM);
353 goto unlock_policy;
354 }
355
356 config_group_init_type_name(&stm->policy->group, name,
357 &stp_policy_type);
358 stm->policy->stm = stm;
359
360 ret = &stm->policy->group;
361
362unlock_policy:
363 mutex_unlock(&stm->policy_mutex);
364
365 if (IS_ERR(ret))
366 stm_put_device(stm);
367
368 return ret;
369}
370
371static struct configfs_group_operations stp_policies_group_ops = {
372 .make_group = stp_policies_make,
373};
374
375static const struct config_item_type stp_policies_type = {
376 .ct_group_ops = &stp_policies_group_ops,
377 .ct_owner = THIS_MODULE,
378};
379
380static struct configfs_subsystem stp_policy_subsys = {
381 .su_group = {
382 .cg_item = {
383 .ci_namebuf = "stp-policy",
384 .ci_type = &stp_policies_type,
385 },
386 },
387};
388
389/*
390 * Lock the policy mutex from the outside
391 */
392static struct stp_policy_node *
393__stp_policy_node_lookup(struct stp_policy *policy, char *s)
394{
395 struct stp_policy_node *policy_node, *ret;
396 struct list_head *head = &policy->group.cg_children;
397 struct config_item *item;
398 char *start, *end = s;
399
400 if (list_empty(head))
401 return NULL;
402
403 /* return the first entry if everything else fails */
404 item = list_entry(head->next, struct config_item, ci_entry);
405 ret = to_stp_policy_node(item);
406
407next:
408 for (;;) {
409 start = strsep(&end, "/");
410 if (!start)
411 break;
412
413 if (!*start)
414 continue;
415
416 list_for_each_entry(item, head, ci_entry) {
417 policy_node = to_stp_policy_node(item);
418
419 if (!strcmp(start,
420 policy_node->group.cg_item.ci_name)) {
421 ret = policy_node;
422
423 if (!end)
424 goto out;
425
426 head = &policy_node->group.cg_children;
427 goto next;
428 }
429 }
430 break;
431 }
432
433out:
434 return ret;
435}
436
437
438struct stp_policy_node *
439stp_policy_node_lookup(struct stm_device *stm, char *s)
440{
441 struct stp_policy_node *policy_node = NULL;
442
443 mutex_lock(&stp_policy_subsys.su_mutex);
444
445 mutex_lock(&stm->policy_mutex);
446 if (stm->policy)
447 policy_node = __stp_policy_node_lookup(stm->policy, s);
448 mutex_unlock(&stm->policy_mutex);
449
450 if (policy_node)
451 config_item_get(&policy_node->group.cg_item);
452 mutex_unlock(&stp_policy_subsys.su_mutex);
453
454 return policy_node;
455}
456
457void stp_policy_node_put(struct stp_policy_node *policy_node)
458{
459 config_item_put(&policy_node->group.cg_item);
460}
461
462int __init stp_configfs_init(void)
463{
464 int err;
465
466 config_group_init(&stp_policy_subsys.su_group);
467 mutex_init(&stp_policy_subsys.su_mutex);
468 err = configfs_register_subsystem(&stp_policy_subsys);
469
470 return err;
471}
472
473void __exit stp_configfs_exit(void)
474{
475 configfs_unregister_subsystem(&stp_policy_subsys);
476}