1 =======================================================
2 Configfs - Userspace-driven Kernel Object Configuration
3 =======================================================
5 Joel Becker <joel.becker@oracle.com>
9 Copyright (c) 2005 Oracle Corporation,
10 Joel Becker <joel.becker@oracle.com>
16 configfs is a ram-based filesystem that provides the converse of
17 sysfs's functionality. Where sysfs is a filesystem-based view of
18 kernel objects, configfs is a filesystem-based manager of kernel
19 objects, or config_items.
21 With sysfs, an object is created in kernel (for example, when a device
22 is discovered) and it is registered with sysfs. Its attributes then
23 appear in sysfs, allowing userspace to read the attributes via
24 readdir(3)/read(2). It may allow some attributes to be modified via
25 write(2). The important point is that the object is created and
26 destroyed in kernel, the kernel controls the lifecycle of the sysfs
27 representation, and sysfs is merely a window on all this.
29 A configfs config_item is created via an explicit userspace operation:
30 mkdir(2). It is destroyed via rmdir(2). The attributes appear at
31 mkdir(2) time, and can be read or modified via read(2) and write(2).
32 As with sysfs, readdir(3) queries the list of items and/or attributes.
33 symlink(2) can be used to group items together. Unlike sysfs, the
34 lifetime of the representation is completely driven by userspace. The
35 kernel modules backing the items must respond to this.
37 Both sysfs and configfs can and should exist together on the same
38 system. One is not a replacement for the other.
43 configfs can be compiled as a module or into the kernel. You can access
46 mount -t configfs none /config
48 The configfs tree will be empty unless client modules are also loaded.
49 These are modules that register their item types with configfs as
50 subsystems. Once a client subsystem is loaded, it will appear as a
51 subdirectory (or more than one) under /config. Like sysfs, the
52 configfs tree is always there, whether mounted on /config or not.
54 An item is created via mkdir(2). The item's attributes will also
55 appear at this time. readdir(3) can determine what the attributes are,
56 read(2) can query their default values, and write(2) can store new
57 values. Don't mix more than one attribute in one attribute file.
59 There are two types of configfs attributes:
61 * Normal attributes, which similar to sysfs attributes, are small ASCII text
62 files, with a maximum size of one page (PAGE_SIZE, 4096 on i386). Preferably
63 only one value per file should be used, and the same caveats from sysfs apply.
64 Configfs expects write(2) to store the entire buffer at once. When writing to
65 normal configfs attributes, userspace processes should first read the entire
66 file, modify the portions they wish to change, and then write the entire
69 * Binary attributes, which are somewhat similar to sysfs binary attributes,
70 but with a few slight changes to semantics. The PAGE_SIZE limitation does not
71 apply, but the whole binary item must fit in single kernel vmalloc'ed buffer.
72 The write(2) calls from user space are buffered, and the attributes'
73 write_bin_attribute method will be invoked on the final close, therefore it is
74 imperative for user-space to check the return code of close(2) in order to
75 verify that the operation finished successfully.
76 To avoid a malicious user OOMing the kernel, there's a per-binary attribute
79 When an item needs to be destroyed, remove it with rmdir(2). An
80 item cannot be destroyed if any other item has a link to it (via
81 symlink(2)). Links can be removed via unlink(2).
83 Configuring FakeNBD: an Example
84 ===============================
86 Imagine there's a Network Block Device (NBD) driver that allows you to
87 access remote block devices. Call it FakeNBD. FakeNBD uses configfs
88 for its configuration. Obviously, there will be a nice program that
89 sysadmins use to configure FakeNBD, but somehow that program has to tell
90 the driver about it. Here's where configfs comes in.
92 When the FakeNBD driver is loaded, it registers itself with configfs.
93 readdir(3) sees this just fine::
98 A fakenbd connection can be created with mkdir(2). The name is
99 arbitrary, but likely the tool will make some use of the name. Perhaps
100 it is a uuid or a disk name::
102 # mkdir /config/fakenbd/disk1
103 # ls /config/fakenbd/disk1
106 The target attribute contains the IP address of the server FakeNBD will
107 connect to. The device attribute is the device on the server.
108 Predictably, the rw attribute determines whether the connection is
109 read-only or read-write::
111 # echo 10.0.0.1 > /config/fakenbd/disk1/target
112 # echo /dev/sda1 > /config/fakenbd/disk1/device
113 # echo 1 > /config/fakenbd/disk1/rw
115 That's it. That's all there is. Now the device is configured, via the
121 Every object in configfs is a config_item. A config_item reflects an
122 object in the subsystem. It has attributes that match values on that
123 object. configfs handles the filesystem representation of that object
124 and its attributes, allowing the subsystem to ignore all but the
125 basic show/store interaction.
127 Items are created and destroyed inside a config_group. A group is a
128 collection of items that share the same attributes and operations.
129 Items are created by mkdir(2) and removed by rmdir(2), but configfs
130 handles that. The group has a set of operations to perform these tasks
132 A subsystem is the top level of a client module. During initialization,
133 the client module registers the subsystem with configfs, the subsystem
134 appears as a directory at the top of the configfs filesystem. A
135 subsystem is also a config_group, and can do everything a config_group
145 char ci_namebuf[UOBJ_NAME_LEN];
147 struct list_head ci_entry;
148 struct config_item *ci_parent;
149 struct config_group *ci_group;
150 struct config_item_type *ci_type;
151 struct dentry *ci_dentry;
154 void config_item_init(struct config_item *);
155 void config_item_init_type_name(struct config_item *,
157 struct config_item_type *type);
158 struct config_item *config_item_get(struct config_item *);
159 void config_item_put(struct config_item *);
161 Generally, struct config_item is embedded in a container structure, a
162 structure that actually represents what the subsystem is doing. The
163 config_item portion of that structure is how the object interacts with
166 Whether statically defined in a source file or created by a parent
167 config_group, a config_item must have one of the _init() functions
168 called on it. This initializes the reference count and sets up the
171 All users of a config_item should have a reference on it via
172 config_item_get(), and drop the reference when they are done via
175 By itself, a config_item cannot do much more than appear in configfs.
176 Usually a subsystem wants the item to display and/or store attributes,
177 among other things. For that, it needs a type.
179 struct config_item_type
180 =======================
184 struct configfs_item_operations {
185 void (*release)(struct config_item *);
186 int (*allow_link)(struct config_item *src,
187 struct config_item *target);
188 void (*drop_link)(struct config_item *src,
189 struct config_item *target);
192 struct config_item_type {
193 struct module *ct_owner;
194 struct configfs_item_operations *ct_item_ops;
195 struct configfs_group_operations *ct_group_ops;
196 struct configfs_attribute **ct_attrs;
197 struct configfs_bin_attribute **ct_bin_attrs;
200 The most basic function of a config_item_type is to define what
201 operations can be performed on a config_item. All items that have been
202 allocated dynamically will need to provide the ct_item_ops->release()
203 method. This method is called when the config_item's reference count
206 struct configfs_attribute
207 =========================
211 struct configfs_attribute {
213 struct module *ca_owner;
215 ssize_t (*show)(struct config_item *, char *);
216 ssize_t (*store)(struct config_item *, const char *, size_t);
219 When a config_item wants an attribute to appear as a file in the item's
220 configfs directory, it must define a configfs_attribute describing it.
221 It then adds the attribute to the NULL-terminated array
222 config_item_type->ct_attrs. When the item appears in configfs, the
223 attribute file will appear with the configfs_attribute->ca_name
224 filename. configfs_attribute->ca_mode specifies the file permissions.
226 If an attribute is readable and provides a ->show method, that method will
227 be called whenever userspace asks for a read(2) on the attribute. If an
228 attribute is writable and provides a ->store method, that method will be
229 called whenever userspace asks for a write(2) on the attribute.
231 struct configfs_bin_attribute
232 =============================
236 struct configfs_bin_attribute {
237 struct configfs_attribute cb_attr;
242 The binary attribute is used when the one needs to use binary blob to
243 appear as the contents of a file in the item's configfs directory.
244 To do so add the binary attribute to the NULL-terminated array
245 config_item_type->ct_bin_attrs, and the item appears in configfs, the
246 attribute file will appear with the configfs_bin_attribute->cb_attr.ca_name
247 filename. configfs_bin_attribute->cb_attr.ca_mode specifies the file
249 The cb_private member is provided for use by the driver, while the
250 cb_max_size member specifies the maximum amount of vmalloc buffer
253 If binary attribute is readable and the config_item provides a
254 ct_item_ops->read_bin_attribute() method, that method will be called
255 whenever userspace asks for a read(2) on the attribute. The converse
256 will happen for write(2). The reads/writes are bufferred so only a
257 single read/write will occur; the attributes' need not concern itself
263 A config_item cannot live in a vacuum. The only way one can be created
264 is via mkdir(2) on a config_group. This will trigger creation of a
267 struct config_group {
268 struct config_item cg_item;
269 struct list_head cg_children;
270 struct configfs_subsystem *cg_subsys;
271 struct list_head default_groups;
272 struct list_head group_entry;
275 void config_group_init(struct config_group *group);
276 void config_group_init_type_name(struct config_group *group,
278 struct config_item_type *type);
281 The config_group structure contains a config_item. Properly configuring
282 that item means that a group can behave as an item in its own right.
283 However, it can do more: it can create child items or groups. This is
284 accomplished via the group operations specified on the group's
287 struct configfs_group_operations {
288 struct config_item *(*make_item)(struct config_group *group,
290 struct config_group *(*make_group)(struct config_group *group,
292 int (*commit_item)(struct config_item *item);
293 void (*disconnect_notify)(struct config_group *group,
294 struct config_item *item);
295 void (*drop_item)(struct config_group *group,
296 struct config_item *item);
299 A group creates child items by providing the
300 ct_group_ops->make_item() method. If provided, this method is called from
301 mkdir(2) in the group's directory. The subsystem allocates a new
302 config_item (or more likely, its container structure), initializes it,
303 and returns it to configfs. Configfs will then populate the filesystem
304 tree to reflect the new item.
306 If the subsystem wants the child to be a group itself, the subsystem
307 provides ct_group_ops->make_group(). Everything else behaves the same,
308 using the group _init() functions on the group.
310 Finally, when userspace calls rmdir(2) on the item or group,
311 ct_group_ops->drop_item() is called. As a config_group is also a
312 config_item, it is not necessary for a separate drop_group() method.
313 The subsystem must config_item_put() the reference that was initialized
314 upon item allocation. If a subsystem has no work to do, it may omit
315 the ct_group_ops->drop_item() method, and configfs will call
316 config_item_put() on the item on behalf of the subsystem.
319 drop_item() is void, and as such cannot fail. When rmdir(2)
320 is called, configfs WILL remove the item from the filesystem tree
321 (assuming that it has no children to keep it busy). The subsystem is
322 responsible for responding to this. If the subsystem has references to
323 the item in other threads, the memory is safe. It may take some time
324 for the item to actually disappear from the subsystem's usage. But it
325 is gone from configfs.
327 When drop_item() is called, the item's linkage has already been torn
328 down. It no longer has a reference on its parent and has no place in
329 the item hierarchy. If a client needs to do some cleanup before this
330 teardown happens, the subsystem can implement the
331 ct_group_ops->disconnect_notify() method. The method is called after
332 configfs has removed the item from the filesystem view but before the
333 item is removed from its parent group. Like drop_item(),
334 disconnect_notify() is void and cannot fail. Client subsystems should
335 not drop any references here, as they still must do it in drop_item().
337 A config_group cannot be removed while it still has child items. This
338 is implemented in the configfs rmdir(2) code. ->drop_item() will not be
339 called, as the item has not been dropped. rmdir(2) will fail, as the
340 directory is not empty.
342 struct configfs_subsystem
343 =========================
345 A subsystem must register itself, usually at module_init time. This
346 tells configfs to make the subsystem appear in the file tree::
348 struct configfs_subsystem {
349 struct config_group su_group;
350 struct mutex su_mutex;
353 int configfs_register_subsystem(struct configfs_subsystem *subsys);
354 void configfs_unregister_subsystem(struct configfs_subsystem *subsys);
356 A subsystem consists of a toplevel config_group and a mutex.
357 The group is where child config_items are created. For a subsystem,
358 this group is usually defined statically. Before calling
359 configfs_register_subsystem(), the subsystem must have initialized the
360 group via the usual group _init() functions, and it must also have
361 initialized the mutex.
363 When the register call returns, the subsystem is live, and it
364 will be visible via configfs. At that point, mkdir(2) can be called and
365 the subsystem must be ready for it.
370 The best example of these basic concepts is the simple_children
371 subsystem/group and the simple_child item in
372 samples/configfs/configfs_sample.c. It shows a trivial object displaying
373 and storing an attribute, and a simple group creating and destroying
376 Hierarchy Navigation and the Subsystem Mutex
377 ============================================
379 There is an extra bonus that configfs provides. The config_groups and
380 config_items are arranged in a hierarchy due to the fact that they
381 appear in a filesystem. A subsystem is NEVER to touch the filesystem
382 parts, but the subsystem might be interested in this hierarchy. For
383 this reason, the hierarchy is mirrored via the config_group->cg_children
384 and config_item->ci_parent structure members.
386 A subsystem can navigate the cg_children list and the ci_parent pointer
387 to see the tree created by the subsystem. This can race with configfs'
388 management of the hierarchy, so configfs uses the subsystem mutex to
389 protect modifications. Whenever a subsystem wants to navigate the
390 hierarchy, it must do so under the protection of the subsystem
393 A subsystem will be prevented from acquiring the mutex while a newly
394 allocated item has not been linked into this hierarchy. Similarly, it
395 will not be able to acquire the mutex while a dropping item has not
396 yet been unlinked. This means that an item's ci_parent pointer will
397 never be NULL while the item is in configfs, and that an item will only
398 be in its parent's cg_children list for the same duration. This allows
399 a subsystem to trust ci_parent and cg_children while they hold the
402 Item Aggregation Via symlink(2)
403 ===============================
405 configfs provides a simple group via the group->item parent/child
406 relationship. Often, however, a larger environment requires aggregation
407 outside of the parent/child connection. This is implemented via
410 A config_item may provide the ct_item_ops->allow_link() and
411 ct_item_ops->drop_link() methods. If the ->allow_link() method exists,
412 symlink(2) may be called with the config_item as the source of the link.
413 These links are only allowed between configfs config_items. Any
414 symlink(2) attempt outside the configfs filesystem will be denied.
416 When symlink(2) is called, the source config_item's ->allow_link()
417 method is called with itself and a target item. If the source item
418 allows linking to target item, it returns 0. A source item may wish to
419 reject a link if it only wants links to a certain type of object (say,
420 in its own subsystem).
422 When unlink(2) is called on the symbolic link, the source item is
423 notified via the ->drop_link() method. Like the ->drop_item() method,
424 this is a void function and cannot return failure. The subsystem is
425 responsible for responding to the change.
427 A config_item cannot be removed while it links to any other item, nor
428 can it be removed while an item links to it. Dangling symlinks are not
431 Automatically Created Subgroups
432 ===============================
434 A new config_group may want to have two types of child config_items.
435 While this could be codified by magic names in ->make_item(), it is much
436 more explicit to have a method whereby userspace sees this divergence.
438 Rather than have a group where some items behave differently than
439 others, configfs provides a method whereby one or many subgroups are
440 automatically created inside the parent at its creation. Thus,
441 mkdir("parent") results in "parent", "parent/subgroup1", up through
442 "parent/subgroupN". Items of type 1 can now be created in
443 "parent/subgroup1", and items of type N can be created in
446 These automatic subgroups, or default groups, do not preclude other
447 children of the parent group. If ct_group_ops->make_group() exists,
448 other child groups can be created on the parent group directly.
450 A configfs subsystem specifies default groups by adding them using the
451 configfs_add_default_group() function to the parent config_group
452 structure. Each added group is populated in the configfs tree at the same
453 time as the parent group. Similarly, they are removed at the same time
454 as the parent. No extra notification is provided. When a ->drop_item()
455 method call notifies the subsystem the parent group is going away, it
456 also means every default group child associated with that parent group.
458 As a consequence of this, default groups cannot be removed directly via
459 rmdir(2). They also are not considered when rmdir(2) on the parent
460 group is checking for children.
465 Sometimes other drivers depend on particular configfs items. For
466 example, ocfs2 mounts depend on a heartbeat region item. If that
467 region item is removed with rmdir(2), the ocfs2 mount must BUG or go
470 configfs provides two additional API calls: configfs_depend_item() and
471 configfs_undepend_item(). A client driver can call
472 configfs_depend_item() on an existing item to tell configfs that it is
473 depended on. configfs will then return -EBUSY from rmdir(2) for that
474 item. When the item is no longer depended on, the client driver calls
475 configfs_undepend_item() on it.
477 These API cannot be called underneath any configfs callbacks, as
478 they will conflict. They can block and allocate. A client driver
479 probably shouldn't calling them of its own gumption. Rather it should
480 be providing an API that external subsystems call.
482 How does this work? Imagine the ocfs2 mount process. When it mounts,
483 it asks for a heartbeat region item. This is done via a call into the
484 heartbeat code. Inside the heartbeat code, the region item is looked
485 up. Here, the heartbeat code calls configfs_depend_item(). If it
486 succeeds, then heartbeat knows the region is safe to give to ocfs2.
487 If it fails, it was being torn down anyway, and heartbeat can gracefully
494 Committable items are currently unimplemented.
496 Some config_items cannot have a valid initial state. That is, no
497 default values can be specified for the item's attributes such that the
498 item can do its work. Userspace must configure one or more attributes,
499 after which the subsystem can start whatever entity this item
502 Consider the FakeNBD device from above. Without a target address *and*
503 a target device, the subsystem has no idea what block device to import.
504 The simple example assumes that the subsystem merely waits until all the
505 appropriate attributes are configured, and then connects. This will,
506 indeed, work, but now every attribute store must check if the attributes
507 are initialized. Every attribute store must fire off the connection if
508 that condition is met.
510 Far better would be an explicit action notifying the subsystem that the
511 config_item is ready to go. More importantly, an explicit action allows
512 the subsystem to provide feedback as to whether the attributes are
513 initialized in a way that makes sense. configfs provides this as
516 configfs still uses only normal filesystem operations. An item is
517 committed via rename(2). The item is moved from a directory where it
518 can be modified to a directory where it cannot.
520 Any group that provides the ct_group_ops->commit_item() method has
521 committable items. When this group appears in configfs, mkdir(2) will
522 not work directly in the group. Instead, the group will have two
523 subdirectories: "live" and "pending". The "live" directory does not
524 support mkdir(2) or rmdir(2) either. It only allows rename(2). The
525 "pending" directory does allow mkdir(2) and rmdir(2). An item is
526 created in the "pending" directory. Its attributes can be modified at
527 will. Userspace commits the item by renaming it into the "live"
528 directory. At this point, the subsystem receives the ->commit_item()
529 callback. If all required attributes are filled to satisfaction, the
530 method returns zero and the item is moved to the "live" directory.
532 As rmdir(2) does not work in the "live" directory, an item must be
533 shutdown, or "uncommitted". Again, this is done via rename(2), this
534 time from the "live" directory back to the "pending" one. The subsystem
535 is notified by the ct_group_ops->uncommit_object() method.