Skip to content

Commit

Permalink
rfkill: allow toggling soft state in sysfs again
Browse files Browse the repository at this point in the history
Apparently there actually _are_ tools that try to set
this in sysfs even though it wasn't supposed to be used
this way without claiming first. Guess what: now that
I've cleaned it all up it doesn't matter and we can
simply allow setting the soft-block state in sysfs.

Signed-off-by: Johannes Berg <[email protected]>
Tested-By: Darren Salt <[email protected]>
Signed-off-by: John W. Linville <[email protected]>
  • Loading branch information
jmberg authored and linvjw committed Jul 21, 2009
1 parent e2e414d commit f54c142
Showing 1 changed file with 19 additions and 8 deletions.
27 changes: 19 additions & 8 deletions net/rfkill/core.c
Original file line number Diff line number Diff line change
Expand Up @@ -648,15 +648,26 @@ static ssize_t rfkill_state_store(struct device *dev,
struct device_attribute *attr,
const char *buf, size_t count)
{
/*
* The intention was that userspace can only take control over
* a given device when/if rfkill-input doesn't control it due
* to user_claim. Since user_claim is currently unsupported,
* we never support changing the state from userspace -- this
* can be implemented again later.
*/
struct rfkill *rfkill = to_rfkill(dev);
unsigned long state;
int err;

if (!capable(CAP_NET_ADMIN))
return -EPERM;

err = strict_strtoul(buf, 0, &state);
if (err)
return err;

if (state != RFKILL_USER_STATE_SOFT_BLOCKED &&
state != RFKILL_USER_STATE_UNBLOCKED)
return -EINVAL;

mutex_lock(&rfkill_global_mutex);
rfkill_set_block(rfkill, state == RFKILL_USER_STATE_SOFT_BLOCKED);
mutex_unlock(&rfkill_global_mutex);

return -EPERM;
return err ?: count;
}

static ssize_t rfkill_claim_show(struct device *dev,
Expand Down

0 comments on commit f54c142

Please sign in to comment.