1 // SPDX-License-Identifier: GPL-2.0-only
5 * Copyright (C) 2007 Davide Libenzi <davidel@xmailserver.org>
9 #include <linux/file.h>
10 #include <linux/poll.h>
11 #include <linux/init.h>
13 #include <linux/sched/signal.h>
14 #include <linux/kernel.h>
15 #include <linux/slab.h>
16 #include <linux/list.h>
17 #include <linux/spinlock.h>
18 #include <linux/anon_inodes.h>
19 #include <linux/syscalls.h>
20 #include <linux/export.h>
21 #include <linux/kref.h>
22 #include <linux/eventfd.h>
23 #include <linux/proc_fs.h>
24 #include <linux/seq_file.h>
25 #include <linux/idr.h>
27 DEFINE_PER_CPU(int, eventfd_wake_count
);
29 static DEFINE_IDA(eventfd_ida
);
33 wait_queue_head_t wqh
;
35 * Every time that a write(2) is performed on an eventfd, the
36 * value of the __u64 being written is added to "count" and a
37 * wakeup is performed on "wqh". A read(2) will return the "count"
38 * value to userspace, and will reset "count" to zero. The kernel
39 * side eventfd_signal() also, adds to the "count" counter and
48 * eventfd_signal - Adds @n to the eventfd counter.
49 * @ctx: [in] Pointer to the eventfd context.
50 * @n: [in] Value of the counter to be added to the eventfd internal counter.
51 * The value cannot be negative.
53 * This function is supposed to be called by the kernel in paths that do not
54 * allow sleeping. In this function we allow the counter to reach the ULLONG_MAX
55 * value, and we signal this as overflow condition by returning a EPOLLERR
58 * Returns the amount by which the counter was incremented. This will be less
59 * than @n if the counter has overflowed.
61 __u64
eventfd_signal(struct eventfd_ctx
*ctx
, __u64 n
)
66 * Deadlock or stack overflow issues can happen if we recurse here
67 * through waitqueue wakeup handlers. If the caller users potentially
68 * nested waitqueues with custom wakeup handlers, then it should
69 * check eventfd_signal_count() before calling this function. If
70 * it returns true, the eventfd_signal() call should be deferred to a
73 if (WARN_ON_ONCE(this_cpu_read(eventfd_wake_count
)))
76 spin_lock_irqsave(&ctx
->wqh
.lock
, flags
);
77 this_cpu_inc(eventfd_wake_count
);
78 if (ULLONG_MAX
- ctx
->count
< n
)
79 n
= ULLONG_MAX
- ctx
->count
;
81 if (waitqueue_active(&ctx
->wqh
))
82 wake_up_locked_poll(&ctx
->wqh
, EPOLLIN
);
83 this_cpu_dec(eventfd_wake_count
);
84 spin_unlock_irqrestore(&ctx
->wqh
.lock
, flags
);
88 EXPORT_SYMBOL_GPL(eventfd_signal
);
90 static void eventfd_free_ctx(struct eventfd_ctx
*ctx
)
93 ida_simple_remove(&eventfd_ida
, ctx
->id
);
97 static void eventfd_free(struct kref
*kref
)
99 struct eventfd_ctx
*ctx
= container_of(kref
, struct eventfd_ctx
, kref
);
101 eventfd_free_ctx(ctx
);
105 * eventfd_ctx_put - Releases a reference to the internal eventfd context.
106 * @ctx: [in] Pointer to eventfd context.
108 * The eventfd context reference must have been previously acquired either
109 * with eventfd_ctx_fdget() or eventfd_ctx_fileget().
111 void eventfd_ctx_put(struct eventfd_ctx
*ctx
)
113 kref_put(&ctx
->kref
, eventfd_free
);
115 EXPORT_SYMBOL_GPL(eventfd_ctx_put
);
117 static int eventfd_release(struct inode
*inode
, struct file
*file
)
119 struct eventfd_ctx
*ctx
= file
->private_data
;
121 wake_up_poll(&ctx
->wqh
, EPOLLHUP
);
122 eventfd_ctx_put(ctx
);
126 static __poll_t
eventfd_poll(struct file
*file
, poll_table
*wait
)
128 struct eventfd_ctx
*ctx
= file
->private_data
;
132 poll_wait(file
, &ctx
->wqh
, wait
);
135 * All writes to ctx->count occur within ctx->wqh.lock. This read
136 * can be done outside ctx->wqh.lock because we know that poll_wait
137 * takes that lock (through add_wait_queue) if our caller will sleep.
139 * The read _can_ therefore seep into add_wait_queue's critical
140 * section, but cannot move above it! add_wait_queue's spin_lock acts
141 * as an acquire barrier and ensures that the read be ordered properly
142 * against the writes. The following CAN happen and is safe:
145 * ----------------- ------------
146 * lock ctx->wqh.lock (in poll_wait)
149 * unlock ctx->wqh.lock
152 * if (waitqueue_active)
153 * wake_up_locked_poll
154 * unlock ctx->qwh.lock
155 * eventfd_poll returns 0
157 * but the following, which would miss a wakeup, cannot happen:
160 * ----------------- ------------
161 * count = ctx->count (INVALID!)
164 * **waitqueue_active is false**
165 * **no wake_up_locked_poll!**
166 * unlock ctx->qwh.lock
167 * lock ctx->wqh.lock (in poll_wait)
169 * unlock ctx->wqh.lock
170 * eventfd_poll returns 0
172 count
= READ_ONCE(ctx
->count
);
176 if (count
== ULLONG_MAX
)
178 if (ULLONG_MAX
- 1 > count
)
184 static void eventfd_ctx_do_read(struct eventfd_ctx
*ctx
, __u64
*cnt
)
186 *cnt
= (ctx
->flags
& EFD_SEMAPHORE
) ? 1 : ctx
->count
;
191 * eventfd_ctx_remove_wait_queue - Read the current counter and removes wait queue.
192 * @ctx: [in] Pointer to eventfd context.
193 * @wait: [in] Wait queue to be removed.
194 * @cnt: [out] Pointer to the 64-bit counter value.
196 * Returns %0 if successful, or the following error codes:
198 * -EAGAIN : The operation would have blocked.
200 * This is used to atomically remove a wait queue entry from the eventfd wait
201 * queue head, and read/reset the counter value.
203 int eventfd_ctx_remove_wait_queue(struct eventfd_ctx
*ctx
, wait_queue_entry_t
*wait
,
208 spin_lock_irqsave(&ctx
->wqh
.lock
, flags
);
209 eventfd_ctx_do_read(ctx
, cnt
);
210 __remove_wait_queue(&ctx
->wqh
, wait
);
211 if (*cnt
!= 0 && waitqueue_active(&ctx
->wqh
))
212 wake_up_locked_poll(&ctx
->wqh
, EPOLLOUT
);
213 spin_unlock_irqrestore(&ctx
->wqh
.lock
, flags
);
215 return *cnt
!= 0 ? 0 : -EAGAIN
;
217 EXPORT_SYMBOL_GPL(eventfd_ctx_remove_wait_queue
);
219 static ssize_t
eventfd_read(struct file
*file
, char __user
*buf
, size_t count
,
222 struct eventfd_ctx
*ctx
= file
->private_data
;
225 DECLARE_WAITQUEUE(wait
, current
);
227 if (count
< sizeof(ucnt
))
230 spin_lock_irq(&ctx
->wqh
.lock
);
234 else if (!(file
->f_flags
& O_NONBLOCK
)) {
235 __add_wait_queue(&ctx
->wqh
, &wait
);
237 set_current_state(TASK_INTERRUPTIBLE
);
238 if (ctx
->count
> 0) {
242 if (signal_pending(current
)) {
246 spin_unlock_irq(&ctx
->wqh
.lock
);
248 spin_lock_irq(&ctx
->wqh
.lock
);
250 __remove_wait_queue(&ctx
->wqh
, &wait
);
251 __set_current_state(TASK_RUNNING
);
253 if (likely(res
> 0)) {
254 eventfd_ctx_do_read(ctx
, &ucnt
);
255 if (waitqueue_active(&ctx
->wqh
))
256 wake_up_locked_poll(&ctx
->wqh
, EPOLLOUT
);
258 spin_unlock_irq(&ctx
->wqh
.lock
);
260 if (res
> 0 && put_user(ucnt
, (__u64 __user
*)buf
))
266 static ssize_t
eventfd_write(struct file
*file
, const char __user
*buf
, size_t count
,
269 struct eventfd_ctx
*ctx
= file
->private_data
;
272 DECLARE_WAITQUEUE(wait
, current
);
274 if (count
< sizeof(ucnt
))
276 if (copy_from_user(&ucnt
, buf
, sizeof(ucnt
)))
278 if (ucnt
== ULLONG_MAX
)
280 spin_lock_irq(&ctx
->wqh
.lock
);
282 if (ULLONG_MAX
- ctx
->count
> ucnt
)
284 else if (!(file
->f_flags
& O_NONBLOCK
)) {
285 __add_wait_queue(&ctx
->wqh
, &wait
);
287 set_current_state(TASK_INTERRUPTIBLE
);
288 if (ULLONG_MAX
- ctx
->count
> ucnt
) {
292 if (signal_pending(current
)) {
296 spin_unlock_irq(&ctx
->wqh
.lock
);
298 spin_lock_irq(&ctx
->wqh
.lock
);
300 __remove_wait_queue(&ctx
->wqh
, &wait
);
301 __set_current_state(TASK_RUNNING
);
303 if (likely(res
> 0)) {
305 if (waitqueue_active(&ctx
->wqh
))
306 wake_up_locked_poll(&ctx
->wqh
, EPOLLIN
);
308 spin_unlock_irq(&ctx
->wqh
.lock
);
313 #ifdef CONFIG_PROC_FS
314 static void eventfd_show_fdinfo(struct seq_file
*m
, struct file
*f
)
316 struct eventfd_ctx
*ctx
= f
->private_data
;
318 spin_lock_irq(&ctx
->wqh
.lock
);
319 seq_printf(m
, "eventfd-count: %16llx\n",
320 (unsigned long long)ctx
->count
);
321 spin_unlock_irq(&ctx
->wqh
.lock
);
322 seq_printf(m
, "eventfd-id: %d\n", ctx
->id
);
326 static const struct file_operations eventfd_fops
= {
327 #ifdef CONFIG_PROC_FS
328 .show_fdinfo
= eventfd_show_fdinfo
,
330 .release
= eventfd_release
,
331 .poll
= eventfd_poll
,
332 .read
= eventfd_read
,
333 .write
= eventfd_write
,
334 .llseek
= noop_llseek
,
338 * eventfd_fget - Acquire a reference of an eventfd file descriptor.
339 * @fd: [in] Eventfd file descriptor.
341 * Returns a pointer to the eventfd file structure in case of success, or the
342 * following error pointer:
344 * -EBADF : Invalid @fd file descriptor.
345 * -EINVAL : The @fd file descriptor is not an eventfd file.
347 struct file
*eventfd_fget(int fd
)
353 return ERR_PTR(-EBADF
);
354 if (file
->f_op
!= &eventfd_fops
) {
356 return ERR_PTR(-EINVAL
);
361 EXPORT_SYMBOL_GPL(eventfd_fget
);
364 * eventfd_ctx_fdget - Acquires a reference to the internal eventfd context.
365 * @fd: [in] Eventfd file descriptor.
367 * Returns a pointer to the internal eventfd context, otherwise the error
368 * pointers returned by the following functions:
372 struct eventfd_ctx
*eventfd_ctx_fdget(int fd
)
374 struct eventfd_ctx
*ctx
;
375 struct fd f
= fdget(fd
);
377 return ERR_PTR(-EBADF
);
378 ctx
= eventfd_ctx_fileget(f
.file
);
382 EXPORT_SYMBOL_GPL(eventfd_ctx_fdget
);
385 * eventfd_ctx_fileget - Acquires a reference to the internal eventfd context.
386 * @file: [in] Eventfd file pointer.
388 * Returns a pointer to the internal eventfd context, otherwise the error
391 * -EINVAL : The @fd file descriptor is not an eventfd file.
393 struct eventfd_ctx
*eventfd_ctx_fileget(struct file
*file
)
395 struct eventfd_ctx
*ctx
;
397 if (file
->f_op
!= &eventfd_fops
)
398 return ERR_PTR(-EINVAL
);
400 ctx
= file
->private_data
;
401 kref_get(&ctx
->kref
);
404 EXPORT_SYMBOL_GPL(eventfd_ctx_fileget
);
406 static int do_eventfd(unsigned int count
, int flags
)
408 struct eventfd_ctx
*ctx
;
411 /* Check the EFD_* constants for consistency. */
412 BUILD_BUG_ON(EFD_CLOEXEC
!= O_CLOEXEC
);
413 BUILD_BUG_ON(EFD_NONBLOCK
!= O_NONBLOCK
);
415 if (flags
& ~EFD_FLAGS_SET
)
418 ctx
= kmalloc(sizeof(*ctx
), GFP_KERNEL
);
422 kref_init(&ctx
->kref
);
423 init_waitqueue_head(&ctx
->wqh
);
426 ctx
->id
= ida_simple_get(&eventfd_ida
, 0, 0, GFP_KERNEL
);
428 fd
= anon_inode_getfd("[eventfd]", &eventfd_fops
, ctx
,
429 O_RDWR
| (flags
& EFD_SHARED_FCNTL_FLAGS
));
431 eventfd_free_ctx(ctx
);
436 SYSCALL_DEFINE2(eventfd2
, unsigned int, count
, int, flags
)
438 return do_eventfd(count
, flags
);
441 SYSCALL_DEFINE1(eventfd
, unsigned int, count
)
443 return do_eventfd(count
, 0);