1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2007 Davide Libenzi <davidel@xmailserver.org>
9 #include <linux/file.h>
10 #include <linux/poll.h>
11 #include <linux/init.h>
13 #include <linux/sched/signal.h>
14 #include <linux/kernel.h>
15 #include <linux/slab.h>
16 #include <linux/list.h>
17 #include <linux/spinlock.h>
18 #include <linux/anon_inodes.h>
19 #include <linux/syscalls.h>
20 #include <linux/export.h>
21 #include <linux/kref.h>
22 #include <linux/eventfd.h>
23 #include <linux/proc_fs.h>
24 #include <linux/seq_file.h>
25 #include <linux/idr.h>
26 #include <linux/uio.h>
28 static DEFINE_IDA(eventfd_ida
);
32 wait_queue_head_t wqh
;
34 * Every time that a write(2) is performed on an eventfd, the
35 * value of the __u64 being written is added to "count" and a
36 * wakeup is performed on "wqh". If EFD_SEMAPHORE flag was not
37 * specified, a read(2) will return the "count" value to userspace,
38 * and will reset "count" to zero. The kernel side eventfd_signal()
39 * also, adds to the "count" counter and issue a wakeup.
47 * eventfd_signal_mask - Increment the event counter
48 * @ctx: [in] Pointer to the eventfd context.
49 * @mask: [in] poll mask
51 * This function is supposed to be called by the kernel in paths that do not
52 * allow sleeping. In this function we allow the counter to reach the ULLONG_MAX
53 * value, and we signal this as overflow condition by returning a EPOLLERR
56 void eventfd_signal_mask(struct eventfd_ctx
*ctx
, __poll_t mask
)
61 * Deadlock or stack overflow issues can happen if we recurse here
62 * through waitqueue wakeup handlers. If the caller users potentially
63 * nested waitqueues with custom wakeup handlers, then it should
64 * check eventfd_signal_allowed() before calling this function. If
65 * it returns false, the eventfd_signal() call should be deferred to a
68 if (WARN_ON_ONCE(current
->in_eventfd
))
71 spin_lock_irqsave(&ctx
->wqh
.lock
, flags
);
72 current
->in_eventfd
= 1;
73 if (ctx
->count
< ULLONG_MAX
)
75 if (waitqueue_active(&ctx
->wqh
))
76 wake_up_locked_poll(&ctx
->wqh
, EPOLLIN
| mask
);
77 current
->in_eventfd
= 0;
78 spin_unlock_irqrestore(&ctx
->wqh
.lock
, flags
);
80 EXPORT_SYMBOL_GPL(eventfd_signal_mask
);
82 static void eventfd_free_ctx(struct eventfd_ctx
*ctx
)
85 ida_free(&eventfd_ida
, ctx
->id
);
89 static void eventfd_free(struct kref
*kref
)
91 struct eventfd_ctx
*ctx
= container_of(kref
, struct eventfd_ctx
, kref
);
93 eventfd_free_ctx(ctx
);
97 * eventfd_ctx_put - Releases a reference to the internal eventfd context.
98 * @ctx: [in] Pointer to eventfd context.
100 * The eventfd context reference must have been previously acquired either
101 * with eventfd_ctx_fdget() or eventfd_ctx_fileget().
103 void eventfd_ctx_put(struct eventfd_ctx
*ctx
)
105 kref_put(&ctx
->kref
, eventfd_free
);
107 EXPORT_SYMBOL_GPL(eventfd_ctx_put
);
109 static int eventfd_release(struct inode
*inode
, struct file
*file
)
111 struct eventfd_ctx
*ctx
= file
->private_data
;
113 wake_up_poll(&ctx
->wqh
, EPOLLHUP
);
114 eventfd_ctx_put(ctx
);
118 static __poll_t
eventfd_poll(struct file
*file
, poll_table
*wait
)
120 struct eventfd_ctx
*ctx
= file
->private_data
;
124 poll_wait(file
, &ctx
->wqh
, wait
);
127 * All writes to ctx->count occur within ctx->wqh.lock. This read
128 * can be done outside ctx->wqh.lock because we know that poll_wait
129 * takes that lock (through add_wait_queue) if our caller will sleep.
131 * The read _can_ therefore seep into add_wait_queue's critical
132 * section, but cannot move above it! add_wait_queue's spin_lock acts
133 * as an acquire barrier and ensures that the read be ordered properly
134 * against the writes. The following CAN happen and is safe:
137 * ----------------- ------------
138 * lock ctx->wqh.lock (in poll_wait)
141 * unlock ctx->wqh.lock
144 * if (waitqueue_active)
145 * wake_up_locked_poll
146 * unlock ctx->qwh.lock
147 * eventfd_poll returns 0
149 * but the following, which would miss a wakeup, cannot happen:
152 * ----------------- ------------
153 * count = ctx->count (INVALID!)
156 * **waitqueue_active is false**
157 * **no wake_up_locked_poll!**
158 * unlock ctx->qwh.lock
159 * lock ctx->wqh.lock (in poll_wait)
161 * unlock ctx->wqh.lock
162 * eventfd_poll returns 0
164 count
= READ_ONCE(ctx
->count
);
168 if (count
== ULLONG_MAX
)
170 if (ULLONG_MAX
- 1 > count
)
176 void eventfd_ctx_do_read(struct eventfd_ctx
*ctx
, __u64
*cnt
)
178 lockdep_assert_held(&ctx
->wqh
.lock
);
180 *cnt
= ((ctx
->flags
& EFD_SEMAPHORE
) && ctx
->count
) ? 1 : ctx
->count
;
183 EXPORT_SYMBOL_GPL(eventfd_ctx_do_read
);
186 * eventfd_ctx_remove_wait_queue - Read the current counter and removes wait queue.
187 * @ctx: [in] Pointer to eventfd context.
188 * @wait: [in] Wait queue to be removed.
189 * @cnt: [out] Pointer to the 64-bit counter value.
191 * Returns %0 if successful, or the following error codes:
193 * -EAGAIN : The operation would have blocked.
195 * This is used to atomically remove a wait queue entry from the eventfd wait
196 * queue head, and read/reset the counter value.
198 int eventfd_ctx_remove_wait_queue(struct eventfd_ctx
*ctx
, wait_queue_entry_t
*wait
,
203 spin_lock_irqsave(&ctx
->wqh
.lock
, flags
);
204 eventfd_ctx_do_read(ctx
, cnt
);
205 __remove_wait_queue(&ctx
->wqh
, wait
);
206 if (*cnt
!= 0 && waitqueue_active(&ctx
->wqh
))
207 wake_up_locked_poll(&ctx
->wqh
, EPOLLOUT
);
208 spin_unlock_irqrestore(&ctx
->wqh
.lock
, flags
);
210 return *cnt
!= 0 ? 0 : -EAGAIN
;
212 EXPORT_SYMBOL_GPL(eventfd_ctx_remove_wait_queue
);
214 static ssize_t
eventfd_read(struct kiocb
*iocb
, struct iov_iter
*to
)
216 struct file
*file
= iocb
->ki_filp
;
217 struct eventfd_ctx
*ctx
= file
->private_data
;
220 if (iov_iter_count(to
) < sizeof(ucnt
))
222 spin_lock_irq(&ctx
->wqh
.lock
);
224 if ((file
->f_flags
& O_NONBLOCK
) ||
225 (iocb
->ki_flags
& IOCB_NOWAIT
)) {
226 spin_unlock_irq(&ctx
->wqh
.lock
);
230 if (wait_event_interruptible_locked_irq(ctx
->wqh
, ctx
->count
)) {
231 spin_unlock_irq(&ctx
->wqh
.lock
);
235 eventfd_ctx_do_read(ctx
, &ucnt
);
236 current
->in_eventfd
= 1;
237 if (waitqueue_active(&ctx
->wqh
))
238 wake_up_locked_poll(&ctx
->wqh
, EPOLLOUT
);
239 current
->in_eventfd
= 0;
240 spin_unlock_irq(&ctx
->wqh
.lock
);
241 if (unlikely(copy_to_iter(&ucnt
, sizeof(ucnt
), to
) != sizeof(ucnt
)))
247 static ssize_t
eventfd_write(struct file
*file
, const char __user
*buf
, size_t count
,
250 struct eventfd_ctx
*ctx
= file
->private_data
;
254 if (count
!= sizeof(ucnt
))
256 if (copy_from_user(&ucnt
, buf
, sizeof(ucnt
)))
258 if (ucnt
== ULLONG_MAX
)
260 spin_lock_irq(&ctx
->wqh
.lock
);
262 if (ULLONG_MAX
- ctx
->count
> ucnt
)
264 else if (!(file
->f_flags
& O_NONBLOCK
)) {
265 res
= wait_event_interruptible_locked_irq(ctx
->wqh
,
266 ULLONG_MAX
- ctx
->count
> ucnt
);
270 if (likely(res
> 0)) {
272 current
->in_eventfd
= 1;
273 if (waitqueue_active(&ctx
->wqh
))
274 wake_up_locked_poll(&ctx
->wqh
, EPOLLIN
);
275 current
->in_eventfd
= 0;
277 spin_unlock_irq(&ctx
->wqh
.lock
);
282 #ifdef CONFIG_PROC_FS
283 static void eventfd_show_fdinfo(struct seq_file
*m
, struct file
*f
)
285 struct eventfd_ctx
*ctx
= f
->private_data
;
288 spin_lock_irq(&ctx
->wqh
.lock
);
290 spin_unlock_irq(&ctx
->wqh
.lock
);
293 "eventfd-count: %16llx\n"
295 "eventfd-semaphore: %d\n",
298 !!(ctx
->flags
& EFD_SEMAPHORE
));
302 static const struct file_operations eventfd_fops
= {
303 #ifdef CONFIG_PROC_FS
304 .show_fdinfo
= eventfd_show_fdinfo
,
306 .release
= eventfd_release
,
307 .poll
= eventfd_poll
,
308 .read_iter
= eventfd_read
,
309 .write
= eventfd_write
,
310 .llseek
= noop_llseek
,
314 * eventfd_fget - Acquire a reference of an eventfd file descriptor.
315 * @fd: [in] Eventfd file descriptor.
317 * Returns a pointer to the eventfd file structure in case of success, or the
318 * following error pointer:
320 * -EBADF : Invalid @fd file descriptor.
321 * -EINVAL : The @fd file descriptor is not an eventfd file.
323 struct file
*eventfd_fget(int fd
)
329 return ERR_PTR(-EBADF
);
330 if (file
->f_op
!= &eventfd_fops
) {
332 return ERR_PTR(-EINVAL
);
337 EXPORT_SYMBOL_GPL(eventfd_fget
);
340 * eventfd_ctx_fdget - Acquires a reference to the internal eventfd context.
341 * @fd: [in] Eventfd file descriptor.
343 * Returns a pointer to the internal eventfd context, otherwise the error
344 * pointers returned by the following functions:
348 struct eventfd_ctx
*eventfd_ctx_fdget(int fd
)
352 return ERR_PTR(-EBADF
);
353 return eventfd_ctx_fileget(fd_file(f
));
355 EXPORT_SYMBOL_GPL(eventfd_ctx_fdget
);
358 * eventfd_ctx_fileget - Acquires a reference to the internal eventfd context.
359 * @file: [in] Eventfd file pointer.
361 * Returns a pointer to the internal eventfd context, otherwise the error
364 * -EINVAL : The @fd file descriptor is not an eventfd file.
366 struct eventfd_ctx
*eventfd_ctx_fileget(struct file
*file
)
368 struct eventfd_ctx
*ctx
;
370 if (file
->f_op
!= &eventfd_fops
)
371 return ERR_PTR(-EINVAL
);
373 ctx
= file
->private_data
;
374 kref_get(&ctx
->kref
);
377 EXPORT_SYMBOL_GPL(eventfd_ctx_fileget
);
379 static int do_eventfd(unsigned int count
, int flags
)
381 struct eventfd_ctx
*ctx
;
385 /* Check the EFD_* constants for consistency. */
386 BUILD_BUG_ON(EFD_CLOEXEC
!= O_CLOEXEC
);
387 BUILD_BUG_ON(EFD_NONBLOCK
!= O_NONBLOCK
);
388 BUILD_BUG_ON(EFD_SEMAPHORE
!= (1 << 0));
390 if (flags
& ~EFD_FLAGS_SET
)
393 ctx
= kmalloc(sizeof(*ctx
), GFP_KERNEL
);
397 kref_init(&ctx
->kref
);
398 init_waitqueue_head(&ctx
->wqh
);
401 ctx
->id
= ida_alloc(&eventfd_ida
, GFP_KERNEL
);
403 flags
&= EFD_SHARED_FCNTL_FLAGS
;
405 fd
= get_unused_fd_flags(flags
);
409 file
= anon_inode_getfile("[eventfd]", &eventfd_fops
, ctx
, flags
);
416 file
->f_mode
|= FMODE_NOWAIT
;
417 fd_install(fd
, file
);
420 eventfd_free_ctx(ctx
);
424 SYSCALL_DEFINE2(eventfd2
, unsigned int, count
, int, flags
)
426 return do_eventfd(count
, flags
);
429 SYSCALL_DEFINE1(eventfd
, unsigned int, count
)
431 return do_eventfd(count
, 0);