155716d26SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-only */
2b8441ed2STejun Heo /*
3b8441ed2STejun Heo * kernfs.h - pseudo filesystem decoupled from vfs locking
4b8441ed2STejun Heo */
5b8441ed2STejun Heo
6b8441ed2STejun Heo #ifndef __LINUX_KERNFS_H
7b8441ed2STejun Heo #define __LINUX_KERNFS_H
8b8441ed2STejun Heo
95d0e26bbSTejun Heo #include <linux/err.h>
10dd8a5b03STejun Heo #include <linux/list.h>
11dd8a5b03STejun Heo #include <linux/mutex.h>
12bc755553STejun Heo #include <linux/idr.h>
13517e64f5STejun Heo #include <linux/lockdep.h>
14cf9e5a73STejun Heo #include <linux/rbtree.h>
15cf9e5a73STejun Heo #include <linux/atomic.h>
1679f1c730SAndy Shevchenko #include <linux/bug.h>
1779f1c730SAndy Shevchenko #include <linux/types.h>
18488dee96SDmitry Torokhov #include <linux/uidgid.h>
19abd54f02STejun Heo #include <linux/wait.h>
20393c3714SMinchan Kim #include <linux/rwsem.h>
211d25b84eSImran Khan #include <linux/cache.h>
22879f40d1STejun Heo
235d60418eSTejun Heo struct file;
24917f56caSTejun Heo struct dentry;
255d60418eSTejun Heo struct iattr;
26dd8a5b03STejun Heo struct seq_file;
27dd8a5b03STejun Heo struct vm_area_struct;
2879f1c730SAndy Shevchenko struct vm_operations_struct;
294b93dc9bSTejun Heo struct super_block;
304b93dc9bSTejun Heo struct file_system_type;
31147e1a97SJohannes Weiner struct poll_table_struct;
3223bf1b6bSDavid Howells struct fs_context;
335d60418eSTejun Heo
3423bf1b6bSDavid Howells struct kernfs_fs_context;
35c525aaddSTejun Heo struct kernfs_open_node;
36c525aaddSTejun Heo struct kernfs_iattrs;
37cf9e5a73STejun Heo
381d25b84eSImran Khan /*
391d25b84eSImran Khan * NR_KERNFS_LOCK_BITS determines size (NR_KERNFS_LOCKS) of hash
401d25b84eSImran Khan * table of locks.
411d25b84eSImran Khan * Having a small hash table would impact scalability, since
421d25b84eSImran Khan * more and more kernfs_node objects will end up using same lock
431d25b84eSImran Khan * and having a very large hash table would waste memory.
441d25b84eSImran Khan *
451d25b84eSImran Khan * At the moment size of hash table of locks is being set based on
461d25b84eSImran Khan * the number of CPUs as follows:
471d25b84eSImran Khan *
481d25b84eSImran Khan * NR_CPU NR_KERNFS_LOCK_BITS NR_KERNFS_LOCKS
491d25b84eSImran Khan * 1 1 2
501d25b84eSImran Khan * 2-3 2 4
511d25b84eSImran Khan * 4-7 4 16
521d25b84eSImran Khan * 8-15 6 64
531d25b84eSImran Khan * 16-31 8 256
541d25b84eSImran Khan * 32 and more 10 1024
551d25b84eSImran Khan *
561d25b84eSImran Khan * The above relation between NR_CPU and number of locks is based
571d25b84eSImran Khan * on some internal experimentation which involved booting qemu
581d25b84eSImran Khan * with different values of smp, performing some sysfs operations
591d25b84eSImran Khan * on all CPUs and observing how increase in number of locks impacts
601d25b84eSImran Khan * completion time of these sysfs operations on each CPU.
611d25b84eSImran Khan */
621d25b84eSImran Khan #ifdef CONFIG_SMP
631d25b84eSImran Khan #define NR_KERNFS_LOCK_BITS (2 * (ilog2(NR_CPUS < 32 ? NR_CPUS : 32)))
641d25b84eSImran Khan #else
651d25b84eSImran Khan #define NR_KERNFS_LOCK_BITS 1
661d25b84eSImran Khan #endif
671d25b84eSImran Khan
681d25b84eSImran Khan #define NR_KERNFS_LOCKS (1 << NR_KERNFS_LOCK_BITS)
691d25b84eSImran Khan
701d25b84eSImran Khan /*
711d25b84eSImran Khan * There's one kernfs_open_file for each open file and one kernfs_open_node
721d25b84eSImran Khan * for each kernfs_node with one or more open files.
731d25b84eSImran Khan *
741d25b84eSImran Khan * filp->private_data points to seq_file whose ->private points to
751d25b84eSImran Khan * kernfs_open_file.
761d25b84eSImran Khan *
771d25b84eSImran Khan * kernfs_open_files are chained at kernfs_open_node->files, which is
781d25b84eSImran Khan * protected by kernfs_global_locks.open_file_mutex[i].
791d25b84eSImran Khan *
801d25b84eSImran Khan * To reduce possible contention in sysfs access, arising due to single
811d25b84eSImran Khan * locks, use an array of locks (e.g. open_file_mutex) and use kernfs_node
821d25b84eSImran Khan * object address as hash keys to get the index of these locks.
831d25b84eSImran Khan *
841d25b84eSImran Khan * Hashed mutexes are safe to use here because operations using these don't
851d25b84eSImran Khan * rely on global exclusion.
861d25b84eSImran Khan *
871d25b84eSImran Khan * In future we intend to replace other global locks with hashed ones as well.
881d25b84eSImran Khan * kernfs_global_locks acts as a holder for all such hash tables.
891d25b84eSImran Khan */
901d25b84eSImran Khan struct kernfs_global_locks {
911d25b84eSImran Khan struct mutex open_file_mutex[NR_KERNFS_LOCKS];
921d25b84eSImran Khan };
931d25b84eSImran Khan
94cf9e5a73STejun Heo enum kernfs_node_type {
95df23fc39STejun Heo KERNFS_DIR = 0x0001,
96df23fc39STejun Heo KERNFS_FILE = 0x0002,
97df23fc39STejun Heo KERNFS_LINK = 0x0004,
98cf9e5a73STejun Heo };
99cf9e5a73STejun Heo
100df23fc39STejun Heo #define KERNFS_TYPE_MASK 0x000f
101df23fc39STejun Heo #define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK
1020c47383bSDaniel Xu #define KERNFS_MAX_USER_XATTRS 128
1030c47383bSDaniel Xu #define KERNFS_USER_XATTR_SIZE_LIMIT (128 << 10)
104cf9e5a73STejun Heo
105cf9e5a73STejun Heo enum kernfs_node_flag {
106d35258efSTejun Heo KERNFS_ACTIVATED = 0x0010,
107df23fc39STejun Heo KERNFS_NS = 0x0020,
108df23fc39STejun Heo KERNFS_HAS_SEQ_SHOW = 0x0040,
109df23fc39STejun Heo KERNFS_HAS_MMAP = 0x0080,
110df23fc39STejun Heo KERNFS_LOCKDEP = 0x0100,
111783bd07dSTejun Heo KERNFS_HIDDEN = 0x0200,
1126b0afc2aSTejun Heo KERNFS_SUICIDAL = 0x0400,
1136b0afc2aSTejun Heo KERNFS_SUICIDED = 0x0800,
114ea015218SEric W. Biederman KERNFS_EMPTY_DIR = 0x1000,
1150e67db2fSTejun Heo KERNFS_HAS_RELEASE = 0x2000,
116c2549174STejun Heo KERNFS_REMOVING = 0x4000,
117cf9e5a73STejun Heo };
118cf9e5a73STejun Heo
119d35258efSTejun Heo /* @flags for kernfs_create_root() */
120d35258efSTejun Heo enum kernfs_root_flag {
121555724a8STejun Heo /*
122555724a8STejun Heo * kernfs_nodes are created in the deactivated state and invisible.
123555724a8STejun Heo * They require explicit kernfs_activate() to become visible. This
124555724a8STejun Heo * can be used to make related nodes become visible atomically
125555724a8STejun Heo * after all nodes are created successfully.
126555724a8STejun Heo */
127d35258efSTejun Heo KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
128555724a8STejun Heo
129555724a8STejun Heo /*
1300d1a393dSChristina Quast * For regular files, if the opener has CAP_DAC_OVERRIDE, open(2)
131555724a8STejun Heo * succeeds regardless of the RW permissions. sysfs had an extra
132555724a8STejun Heo * layer of enforcement where open(2) fails with -EACCES regardless
133555724a8STejun Heo * of CAP_DAC_OVERRIDE if the permission doesn't have the
134555724a8STejun Heo * respective read or write access at all (none of S_IRUGO or
135555724a8STejun Heo * S_IWUGO) or the respective operation isn't implemented. The
136555724a8STejun Heo * following flag enables that behavior.
137555724a8STejun Heo */
138555724a8STejun Heo KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002,
139aa818825SShaohua Li
140aa818825SShaohua Li /*
141aa818825SShaohua Li * The filesystem supports exportfs operation, so userspace can use
142aa818825SShaohua Li * fhandle to access nodes of the fs.
143aa818825SShaohua Li */
144aa818825SShaohua Li KERNFS_ROOT_SUPPORT_EXPORTOP = 0x0004,
1450c47383bSDaniel Xu
1460c47383bSDaniel Xu /*
1470c47383bSDaniel Xu * Support user xattrs to be written to nodes rooted at this root.
1480c47383bSDaniel Xu */
1490c47383bSDaniel Xu KERNFS_ROOT_SUPPORT_USER_XATTR = 0x0008,
150d35258efSTejun Heo };
151d35258efSTejun Heo
152324a56e1STejun Heo /* type-specific structures for kernfs_node union members */
153324a56e1STejun Heo struct kernfs_elem_dir {
154cf9e5a73STejun Heo unsigned long subdirs;
155adc5e8b5STejun Heo /* children rbtree starts here and goes through kn->rb */
156cf9e5a73STejun Heo struct rb_root children;
157cf9e5a73STejun Heo
158cf9e5a73STejun Heo /*
159cf9e5a73STejun Heo * The kernfs hierarchy this directory belongs to. This fits
160324a56e1STejun Heo * better directly in kernfs_node but is here to save space.
161cf9e5a73STejun Heo */
162cf9e5a73STejun Heo struct kernfs_root *root;
163895adbecSIan Kent /*
164895adbecSIan Kent * Monotonic revision counter, used to identify if a directory
165895adbecSIan Kent * node has changed during negative dentry revalidation.
166895adbecSIan Kent */
167895adbecSIan Kent unsigned long rev;
168cf9e5a73STejun Heo };
169cf9e5a73STejun Heo
170324a56e1STejun Heo struct kernfs_elem_symlink {
171324a56e1STejun Heo struct kernfs_node *target_kn;
172cf9e5a73STejun Heo };
173cf9e5a73STejun Heo
174324a56e1STejun Heo struct kernfs_elem_attr {
175cf9e5a73STejun Heo const struct kernfs_ops *ops;
176086c00c7SImran Khan struct kernfs_open_node __rcu *open;
177cf9e5a73STejun Heo loff_t size;
1782fd26970SImran Khan struct kernfs_node *notify_next; /* for kernfs_notify() */
179cf9e5a73STejun Heo };
180cf9e5a73STejun Heo
181cf9e5a73STejun Heo /*
182324a56e1STejun Heo * kernfs_node - the building block of kernfs hierarchy. Each and every
183324a56e1STejun Heo * kernfs node is represented by single kernfs_node. Most fields are
184cf9e5a73STejun Heo * private to kernfs and shouldn't be accessed directly by kernfs users.
185cf9e5a73STejun Heo *
18621774fd8SWillem de Bruijn * As long as count reference is held, the kernfs_node itself is
187324a56e1STejun Heo * accessible. Dereferencing elem or any other outer entity requires
188324a56e1STejun Heo * active reference.
189cf9e5a73STejun Heo */
190324a56e1STejun Heo struct kernfs_node {
191adc5e8b5STejun Heo atomic_t count;
192adc5e8b5STejun Heo atomic_t active;
193cf9e5a73STejun Heo #ifdef CONFIG_DEBUG_LOCK_ALLOC
194cf9e5a73STejun Heo struct lockdep_map dep_map;
195cf9e5a73STejun Heo #endif
1963eef34adSTejun Heo /*
1973eef34adSTejun Heo * Use kernfs_get_parent() and kernfs_name/path() instead of
1983eef34adSTejun Heo * accessing the following two fields directly. If the node is
1993eef34adSTejun Heo * never moved to a different parent, it is safe to access the
2003eef34adSTejun Heo * parent directly.
2013eef34adSTejun Heo */
202adc5e8b5STejun Heo struct kernfs_node *parent;
203adc5e8b5STejun Heo const char *name;
204cf9e5a73STejun Heo
205adc5e8b5STejun Heo struct rb_node rb;
206cf9e5a73STejun Heo
207adc5e8b5STejun Heo const void *ns; /* namespace tag */
2089b0925a6SGreg Kroah-Hartman unsigned int hash; /* ns + name hash */
209cf9e5a73STejun Heo union {
210adc5e8b5STejun Heo struct kernfs_elem_dir dir;
211adc5e8b5STejun Heo struct kernfs_elem_symlink symlink;
212adc5e8b5STejun Heo struct kernfs_elem_attr attr;
213cf9e5a73STejun Heo };
214cf9e5a73STejun Heo
215cf9e5a73STejun Heo void *priv;
216cf9e5a73STejun Heo
21767c0496eSTejun Heo /*
21840430452STejun Heo * 64bit unique ID. On 64bit ino setups, id is the ino. On 32bit,
21940430452STejun Heo * the low 32bits are ino and upper generation.
22067c0496eSTejun Heo */
22167c0496eSTejun Heo u64 id;
22267c0496eSTejun Heo
223adc5e8b5STejun Heo unsigned short flags;
224adc5e8b5STejun Heo umode_t mode;
225c525aaddSTejun Heo struct kernfs_iattrs *iattr;
226*4b1f991bSTejun Heo
227*4b1f991bSTejun Heo struct rcu_head rcu;
228cf9e5a73STejun Heo };
229b8441ed2STejun Heo
23080b9bbefSTejun Heo /*
23190c07c89STejun Heo * kernfs_syscall_ops may be specified on kernfs_create_root() to support
23290c07c89STejun Heo * syscalls. These optional callbacks are invoked on the matching syscalls
23390c07c89STejun Heo * and can perform any kernfs operations which don't necessarily have to be
23490c07c89STejun Heo * the exact operation requested. An active reference is held for each
23590c07c89STejun Heo * kernfs_node parameter.
23680b9bbefSTejun Heo */
23790c07c89STejun Heo struct kernfs_syscall_ops {
2386a7fed4eSTejun Heo int (*show_options)(struct seq_file *sf, struct kernfs_root *root);
2396a7fed4eSTejun Heo
24080b9bbefSTejun Heo int (*mkdir)(struct kernfs_node *parent, const char *name,
24180b9bbefSTejun Heo umode_t mode);
24280b9bbefSTejun Heo int (*rmdir)(struct kernfs_node *kn);
24380b9bbefSTejun Heo int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent,
24480b9bbefSTejun Heo const char *new_name);
2454f41fc59SSerge E. Hallyn int (*show_path)(struct seq_file *sf, struct kernfs_node *kn,
2464f41fc59SSerge E. Hallyn struct kernfs_root *root);
24780b9bbefSTejun Heo };
24880b9bbefSTejun Heo
249f2eb478fSGreg Kroah-Hartman struct kernfs_node *kernfs_root_to_node(struct kernfs_root *root);
250ba7443bcSTejun Heo
251c525aaddSTejun Heo struct kernfs_open_file {
252dd8a5b03STejun Heo /* published fields */
253324a56e1STejun Heo struct kernfs_node *kn;
254dd8a5b03STejun Heo struct file *file;
2550e67db2fSTejun Heo struct seq_file *seq_file;
2562536390dSTejun Heo void *priv;
257dd8a5b03STejun Heo
258dd8a5b03STejun Heo /* private fields, do not use outside kernfs proper */
259dd8a5b03STejun Heo struct mutex mutex;
260e4234a1fSChris Wilson struct mutex prealloc_mutex;
261dd8a5b03STejun Heo int event;
262dd8a5b03STejun Heo struct list_head list;
2632b75869bSNeilBrown char *prealloc_buf;
264dd8a5b03STejun Heo
265b7ce40cfSTejun Heo size_t atomic_write_len;
266a1d82affSTejun Heo bool mmapped:1;
2670e67db2fSTejun Heo bool released:1;
268dd8a5b03STejun Heo const struct vm_operations_struct *vm_ops;
269dd8a5b03STejun Heo };
270dd8a5b03STejun Heo
271f6acf8bbSTejun Heo struct kernfs_ops {
272f6acf8bbSTejun Heo /*
2730e67db2fSTejun Heo * Optional open/release methods. Both are called with
2740e67db2fSTejun Heo * @of->seq_file populated.
2750e67db2fSTejun Heo */
2760e67db2fSTejun Heo int (*open)(struct kernfs_open_file *of);
2770e67db2fSTejun Heo void (*release)(struct kernfs_open_file *of);
2780e67db2fSTejun Heo
2790e67db2fSTejun Heo /*
280f6acf8bbSTejun Heo * Read is handled by either seq_file or raw_read().
281f6acf8bbSTejun Heo *
282d19b9846STejun Heo * If seq_show() is present, seq_file path is active. Other seq
283d19b9846STejun Heo * operations are optional and if not implemented, the behavior is
284d19b9846STejun Heo * equivalent to single_open(). @sf->private points to the
285c525aaddSTejun Heo * associated kernfs_open_file.
286f6acf8bbSTejun Heo *
287f6acf8bbSTejun Heo * read() is bounced through kernel buffer and a read larger than
288f6acf8bbSTejun Heo * PAGE_SIZE results in partial operation of PAGE_SIZE.
289f6acf8bbSTejun Heo */
290f6acf8bbSTejun Heo int (*seq_show)(struct seq_file *sf, void *v);
291f6acf8bbSTejun Heo
292d19b9846STejun Heo void *(*seq_start)(struct seq_file *sf, loff_t *ppos);
293d19b9846STejun Heo void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos);
294d19b9846STejun Heo void (*seq_stop)(struct seq_file *sf, void *v);
295d19b9846STejun Heo
296c525aaddSTejun Heo ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes,
297f6acf8bbSTejun Heo loff_t off);
298f6acf8bbSTejun Heo
299f6acf8bbSTejun Heo /*
3004d3773c4STejun Heo * write() is bounced through kernel buffer. If atomic_write_len
3014d3773c4STejun Heo * is not set, a write larger than PAGE_SIZE results in partial
3024d3773c4STejun Heo * operations of PAGE_SIZE chunks. If atomic_write_len is set,
3034d3773c4STejun Heo * writes upto the specified size are executed atomically but
3044d3773c4STejun Heo * larger ones are rejected with -E2BIG.
305f6acf8bbSTejun Heo */
3064d3773c4STejun Heo size_t atomic_write_len;
3072b75869bSNeilBrown /*
3082b75869bSNeilBrown * "prealloc" causes a buffer to be allocated at open for
3092b75869bSNeilBrown * all read/write requests. As ->seq_show uses seq_read()
3102b75869bSNeilBrown * which does its own allocation, it is incompatible with
3112b75869bSNeilBrown * ->prealloc. Provide ->read and ->write with ->prealloc.
3122b75869bSNeilBrown */
3132b75869bSNeilBrown bool prealloc;
314c525aaddSTejun Heo ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes,
315f6acf8bbSTejun Heo loff_t off);
316f6acf8bbSTejun Heo
317147e1a97SJohannes Weiner __poll_t (*poll)(struct kernfs_open_file *of,
318147e1a97SJohannes Weiner struct poll_table_struct *pt);
319147e1a97SJohannes Weiner
320c525aaddSTejun Heo int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma);
321f6acf8bbSTejun Heo };
322f6acf8bbSTejun Heo
32323bf1b6bSDavid Howells /*
32423bf1b6bSDavid Howells * The kernfs superblock creation/mount parameter context.
32523bf1b6bSDavid Howells */
32623bf1b6bSDavid Howells struct kernfs_fs_context {
32723bf1b6bSDavid Howells struct kernfs_root *root; /* Root of the hierarchy being mounted */
32823bf1b6bSDavid Howells void *ns_tag; /* Namespace tag of the mount (or NULL) */
32923bf1b6bSDavid Howells unsigned long magic; /* File system specific magic number */
33023bf1b6bSDavid Howells
33123bf1b6bSDavid Howells /* The following are set/used by kernfs_mount() */
33223bf1b6bSDavid Howells bool new_sb_created; /* Set to T if we allocated a new sb */
33323bf1b6bSDavid Howells };
33423bf1b6bSDavid Howells
335ba341d55STejun Heo #ifdef CONFIG_KERNFS
336879f40d1STejun Heo
kernfs_type(struct kernfs_node * kn)337df23fc39STejun Heo static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
338cf9e5a73STejun Heo {
339df23fc39STejun Heo return kn->flags & KERNFS_TYPE_MASK;
340cf9e5a73STejun Heo }
341cf9e5a73STejun Heo
kernfs_id_ino(u64 id)34267c0496eSTejun Heo static inline ino_t kernfs_id_ino(u64 id)
34367c0496eSTejun Heo {
34440430452STejun Heo /* id is ino if ino_t is 64bit; otherwise, low 32bits */
34540430452STejun Heo if (sizeof(ino_t) >= sizeof(u64))
34640430452STejun Heo return id;
34740430452STejun Heo else
34867c0496eSTejun Heo return (u32)id;
34967c0496eSTejun Heo }
35067c0496eSTejun Heo
kernfs_id_gen(u64 id)35167c0496eSTejun Heo static inline u32 kernfs_id_gen(u64 id)
35267c0496eSTejun Heo {
35340430452STejun Heo /* gen is fixed at 1 if ino_t is 64bit; otherwise, high 32bits */
35440430452STejun Heo if (sizeof(ino_t) >= sizeof(u64))
35540430452STejun Heo return 1;
35640430452STejun Heo else
35767c0496eSTejun Heo return id >> 32;
35867c0496eSTejun Heo }
35967c0496eSTejun Heo
kernfs_ino(struct kernfs_node * kn)36067c0496eSTejun Heo static inline ino_t kernfs_ino(struct kernfs_node *kn)
36167c0496eSTejun Heo {
36267c0496eSTejun Heo return kernfs_id_ino(kn->id);
36367c0496eSTejun Heo }
36467c0496eSTejun Heo
kernfs_gen(struct kernfs_node * kn)36567c0496eSTejun Heo static inline ino_t kernfs_gen(struct kernfs_node *kn)
36667c0496eSTejun Heo {
36767c0496eSTejun Heo return kernfs_id_gen(kn->id);
36867c0496eSTejun Heo }
36967c0496eSTejun Heo
370cf9e5a73STejun Heo /**
371cf9e5a73STejun Heo * kernfs_enable_ns - enable namespace under a directory
372324a56e1STejun Heo * @kn: directory of interest, should be empty
373cf9e5a73STejun Heo *
374324a56e1STejun Heo * This is to be called right after @kn is created to enable namespace
375324a56e1STejun Heo * under it. All children of @kn must have non-NULL namespace tags and
376cf9e5a73STejun Heo * only the ones which match the super_block's tag will be visible.
377cf9e5a73STejun Heo */
kernfs_enable_ns(struct kernfs_node * kn)378324a56e1STejun Heo static inline void kernfs_enable_ns(struct kernfs_node *kn)
379cf9e5a73STejun Heo {
380df23fc39STejun Heo WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR);
381adc5e8b5STejun Heo WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children));
382df23fc39STejun Heo kn->flags |= KERNFS_NS;
383cf9e5a73STejun Heo }
384cf9e5a73STejun Heo
385ac9bba03STejun Heo /**
386ac9bba03STejun Heo * kernfs_ns_enabled - test whether namespace is enabled
387324a56e1STejun Heo * @kn: the node to test
388ac9bba03STejun Heo *
389ac9bba03STejun Heo * Test whether namespace filtering is enabled for the children of @ns.
390ac9bba03STejun Heo */
kernfs_ns_enabled(struct kernfs_node * kn)391324a56e1STejun Heo static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
392ac9bba03STejun Heo {
393df23fc39STejun Heo return kn->flags & KERNFS_NS;
394ac9bba03STejun Heo }
395ac9bba03STejun Heo
3963eef34adSTejun Heo int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen);
3979f6df573SAditya Kali int kernfs_path_from_node(struct kernfs_node *root_kn, struct kernfs_node *kn,
3989f6df573SAditya Kali char *buf, size_t buflen);
3993eef34adSTejun Heo void pr_cont_kernfs_name(struct kernfs_node *kn);
4003eef34adSTejun Heo void pr_cont_kernfs_path(struct kernfs_node *kn);
4013eef34adSTejun Heo struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn);
402324a56e1STejun Heo struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
403ccf73cf3STejun Heo const char *name, const void *ns);
404bd96f76aSTejun Heo struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
405bd96f76aSTejun Heo const char *path, const void *ns);
406324a56e1STejun Heo void kernfs_get(struct kernfs_node *kn);
407324a56e1STejun Heo void kernfs_put(struct kernfs_node *kn);
408ccf73cf3STejun Heo
4090c23b225STejun Heo struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry);
4100c23b225STejun Heo struct kernfs_root *kernfs_root_from_sb(struct super_block *sb);
411fb02915fSTejun Heo struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn);
4120c23b225STejun Heo
413fb3c8315SAditya Kali struct dentry *kernfs_node_dentry(struct kernfs_node *kn,
414fb3c8315SAditya Kali struct super_block *sb);
41590c07c89STejun Heo struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
416d35258efSTejun Heo unsigned int flags, void *priv);
417ba7443bcSTejun Heo void kernfs_destroy_root(struct kernfs_root *root);
418ba7443bcSTejun Heo
419324a56e1STejun Heo struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
420bb8b9d09STejun Heo const char *name, umode_t mode,
421488dee96SDmitry Torokhov kuid_t uid, kgid_t gid,
422bb8b9d09STejun Heo void *priv, const void *ns);
423ea015218SEric W. Biederman struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
424ea015218SEric W. Biederman const char *name);
4252063d608STejun Heo struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent,
426488dee96SDmitry Torokhov const char *name, umode_t mode,
427488dee96SDmitry Torokhov kuid_t uid, kgid_t gid,
428488dee96SDmitry Torokhov loff_t size,
429496f7394STejun Heo const struct kernfs_ops *ops,
430517e64f5STejun Heo void *priv, const void *ns,
431517e64f5STejun Heo struct lock_class_key *key);
432324a56e1STejun Heo struct kernfs_node *kernfs_create_link(struct kernfs_node *parent,
4335d0e26bbSTejun Heo const char *name,
434324a56e1STejun Heo struct kernfs_node *target);
435d35258efSTejun Heo void kernfs_activate(struct kernfs_node *kn);
436783bd07dSTejun Heo void kernfs_show(struct kernfs_node *kn, bool show);
437324a56e1STejun Heo void kernfs_remove(struct kernfs_node *kn);
4386b0afc2aSTejun Heo void kernfs_break_active_protection(struct kernfs_node *kn);
4396b0afc2aSTejun Heo void kernfs_unbreak_active_protection(struct kernfs_node *kn);
4406b0afc2aSTejun Heo bool kernfs_remove_self(struct kernfs_node *kn);
441324a56e1STejun Heo int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
442879f40d1STejun Heo const void *ns);
443324a56e1STejun Heo int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
444890ece16STejun Heo const char *new_name, const void *new_ns);
445324a56e1STejun Heo int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr);
446147e1a97SJohannes Weiner __poll_t kernfs_generic_poll(struct kernfs_open_file *of,
447147e1a97SJohannes Weiner struct poll_table_struct *pt);
448324a56e1STejun Heo void kernfs_notify(struct kernfs_node *kn);
449879f40d1STejun Heo
4501537ad15SOndrej Mosnacek int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
451b230d5abSOndrej Mosnacek void *value, size_t size);
4521537ad15SOndrej Mosnacek int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
4531537ad15SOndrej Mosnacek const void *value, size_t size, int flags);
454b230d5abSOndrej Mosnacek
4554b93dc9bSTejun Heo const void *kernfs_super_ns(struct super_block *sb);
45623bf1b6bSDavid Howells int kernfs_get_tree(struct fs_context *fc);
45723bf1b6bSDavid Howells void kernfs_free_fs_context(struct fs_context *fc);
4584b93dc9bSTejun Heo void kernfs_kill_sb(struct super_block *sb);
4594b93dc9bSTejun Heo
4604b93dc9bSTejun Heo void kernfs_init(void);
4614b93dc9bSTejun Heo
462fe0f726cSTejun Heo struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
463fe0f726cSTejun Heo u64 id);
464ba341d55STejun Heo #else /* CONFIG_KERNFS */
465879f40d1STejun Heo
kernfs_type(struct kernfs_node * kn)466df23fc39STejun Heo static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
467cf9e5a73STejun Heo { return 0; } /* whatever */
468cf9e5a73STejun Heo
kernfs_enable_ns(struct kernfs_node * kn)469324a56e1STejun Heo static inline void kernfs_enable_ns(struct kernfs_node *kn) { }
470cf9e5a73STejun Heo
kernfs_ns_enabled(struct kernfs_node * kn)471324a56e1STejun Heo static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
472ac9bba03STejun Heo { return false; }
473ac9bba03STejun Heo
kernfs_name(struct kernfs_node * kn,char * buf,size_t buflen)4743eef34adSTejun Heo static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
4753eef34adSTejun Heo { return -ENOSYS; }
4763eef34adSTejun Heo
kernfs_path_from_node(struct kernfs_node * root_kn,struct kernfs_node * kn,char * buf,size_t buflen)4770e0b2afdSTejun Heo static inline int kernfs_path_from_node(struct kernfs_node *root_kn,
4780e0b2afdSTejun Heo struct kernfs_node *kn,
4790e0b2afdSTejun Heo char *buf, size_t buflen)
4800e0b2afdSTejun Heo { return -ENOSYS; }
4810e0b2afdSTejun Heo
pr_cont_kernfs_name(struct kernfs_node * kn)4823eef34adSTejun Heo static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { }
pr_cont_kernfs_path(struct kernfs_node * kn)4833eef34adSTejun Heo static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { }
4843eef34adSTejun Heo
kernfs_get_parent(struct kernfs_node * kn)4853eef34adSTejun Heo static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
4863eef34adSTejun Heo { return NULL; }
4873eef34adSTejun Heo
488324a56e1STejun Heo static inline struct kernfs_node *
kernfs_find_and_get_ns(struct kernfs_node * parent,const char * name,const void * ns)489324a56e1STejun Heo kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name,
490ccf73cf3STejun Heo const void *ns)
491ccf73cf3STejun Heo { return NULL; }
492bd96f76aSTejun Heo static inline struct kernfs_node *
kernfs_walk_and_get_ns(struct kernfs_node * parent,const char * path,const void * ns)493bd96f76aSTejun Heo kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path,
494bd96f76aSTejun Heo const void *ns)
495bd96f76aSTejun Heo { return NULL; }
496ccf73cf3STejun Heo
kernfs_get(struct kernfs_node * kn)497324a56e1STejun Heo static inline void kernfs_get(struct kernfs_node *kn) { }
kernfs_put(struct kernfs_node * kn)498324a56e1STejun Heo static inline void kernfs_put(struct kernfs_node *kn) { }
499ccf73cf3STejun Heo
kernfs_node_from_dentry(struct dentry * dentry)5000c23b225STejun Heo static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
5010c23b225STejun Heo { return NULL; }
5020c23b225STejun Heo
kernfs_root_from_sb(struct super_block * sb)5030c23b225STejun Heo static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb)
5040c23b225STejun Heo { return NULL; }
5050c23b225STejun Heo
506fb02915fSTejun Heo static inline struct inode *
kernfs_get_inode(struct super_block * sb,struct kernfs_node * kn)507fb02915fSTejun Heo kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn)
508fb02915fSTejun Heo { return NULL; }
509fb02915fSTejun Heo
51080b9bbefSTejun Heo static inline struct kernfs_root *
kernfs_create_root(struct kernfs_syscall_ops * scops,unsigned int flags,void * priv)511d35258efSTejun Heo kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags,
512d35258efSTejun Heo void *priv)
513ba7443bcSTejun Heo { return ERR_PTR(-ENOSYS); }
514ba7443bcSTejun Heo
kernfs_destroy_root(struct kernfs_root * root)515ba7443bcSTejun Heo static inline void kernfs_destroy_root(struct kernfs_root *root) { }
516ba7443bcSTejun Heo
517324a56e1STejun Heo static inline struct kernfs_node *
kernfs_create_dir_ns(struct kernfs_node * parent,const char * name,umode_t mode,kuid_t uid,kgid_t gid,void * priv,const void * ns)518bb8b9d09STejun Heo kernfs_create_dir_ns(struct kernfs_node *parent, const char *name,
519488dee96SDmitry Torokhov umode_t mode, kuid_t uid, kgid_t gid,
520488dee96SDmitry Torokhov void *priv, const void *ns)
52193b2b8e4STejun Heo { return ERR_PTR(-ENOSYS); }
52293b2b8e4STejun Heo
523324a56e1STejun Heo static inline struct kernfs_node *
__kernfs_create_file(struct kernfs_node * parent,const char * name,umode_t mode,kuid_t uid,kgid_t gid,loff_t size,const struct kernfs_ops * ops,void * priv,const void * ns,struct lock_class_key * key)5242063d608STejun Heo __kernfs_create_file(struct kernfs_node *parent, const char *name,
525488dee96SDmitry Torokhov umode_t mode, kuid_t uid, kgid_t gid,
526488dee96SDmitry Torokhov loff_t size, const struct kernfs_ops *ops,
527dfeb0750STejun Heo void *priv, const void *ns, struct lock_class_key *key)
528496f7394STejun Heo { return ERR_PTR(-ENOSYS); }
529496f7394STejun Heo
530324a56e1STejun Heo static inline struct kernfs_node *
kernfs_create_link(struct kernfs_node * parent,const char * name,struct kernfs_node * target)531324a56e1STejun Heo kernfs_create_link(struct kernfs_node *parent, const char *name,
532324a56e1STejun Heo struct kernfs_node *target)
5335d0e26bbSTejun Heo { return ERR_PTR(-ENOSYS); }
5345d0e26bbSTejun Heo
kernfs_activate(struct kernfs_node * kn)535d35258efSTejun Heo static inline void kernfs_activate(struct kernfs_node *kn) { }
536d35258efSTejun Heo
kernfs_remove(struct kernfs_node * kn)537324a56e1STejun Heo static inline void kernfs_remove(struct kernfs_node *kn) { }
538879f40d1STejun Heo
kernfs_remove_self(struct kernfs_node * kn)5396b0afc2aSTejun Heo static inline bool kernfs_remove_self(struct kernfs_node *kn)
5406b0afc2aSTejun Heo { return false; }
5416b0afc2aSTejun Heo
kernfs_remove_by_name_ns(struct kernfs_node * kn,const char * name,const void * ns)542324a56e1STejun Heo static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn,
543879f40d1STejun Heo const char *name, const void *ns)
544879f40d1STejun Heo { return -ENOSYS; }
545879f40d1STejun Heo
kernfs_rename_ns(struct kernfs_node * kn,struct kernfs_node * new_parent,const char * new_name,const void * new_ns)546324a56e1STejun Heo static inline int kernfs_rename_ns(struct kernfs_node *kn,
547324a56e1STejun Heo struct kernfs_node *new_parent,
548890ece16STejun Heo const char *new_name, const void *new_ns)
549890ece16STejun Heo { return -ENOSYS; }
550890ece16STejun Heo
kernfs_setattr(struct kernfs_node * kn,const struct iattr * iattr)551324a56e1STejun Heo static inline int kernfs_setattr(struct kernfs_node *kn,
5525d60418eSTejun Heo const struct iattr *iattr)
5535d60418eSTejun Heo { return -ENOSYS; }
5545d60418eSTejun Heo
kernfs_generic_poll(struct kernfs_open_file * of,struct poll_table_struct * pt)55579038a99SArnd Bergmann static inline __poll_t kernfs_generic_poll(struct kernfs_open_file *of,
55679038a99SArnd Bergmann struct poll_table_struct *pt)
55779038a99SArnd Bergmann { return -ENOSYS; }
55879038a99SArnd Bergmann
kernfs_notify(struct kernfs_node * kn)559324a56e1STejun Heo static inline void kernfs_notify(struct kernfs_node *kn) { }
560024f6471STejun Heo
kernfs_xattr_get(struct kernfs_node * kn,const char * name,void * value,size_t size)5611537ad15SOndrej Mosnacek static inline int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
5621537ad15SOndrej Mosnacek void *value, size_t size)
563b230d5abSOndrej Mosnacek { return -ENOSYS; }
564b230d5abSOndrej Mosnacek
kernfs_xattr_set(struct kernfs_node * kn,const char * name,const void * value,size_t size,int flags)5651537ad15SOndrej Mosnacek static inline int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
5661537ad15SOndrej Mosnacek const void *value, size_t size, int flags)
567b230d5abSOndrej Mosnacek { return -ENOSYS; }
568b230d5abSOndrej Mosnacek
kernfs_super_ns(struct super_block * sb)5694b93dc9bSTejun Heo static inline const void *kernfs_super_ns(struct super_block *sb)
5704b93dc9bSTejun Heo { return NULL; }
5714b93dc9bSTejun Heo
kernfs_get_tree(struct fs_context * fc)57223bf1b6bSDavid Howells static inline int kernfs_get_tree(struct fs_context *fc)
57323bf1b6bSDavid Howells { return -ENOSYS; }
57423bf1b6bSDavid Howells
kernfs_free_fs_context(struct fs_context * fc)57523bf1b6bSDavid Howells static inline void kernfs_free_fs_context(struct fs_context *fc) { }
5764b93dc9bSTejun Heo
kernfs_kill_sb(struct super_block * sb)5774b93dc9bSTejun Heo static inline void kernfs_kill_sb(struct super_block *sb) { }
5784b93dc9bSTejun Heo
kernfs_init(void)5794b93dc9bSTejun Heo static inline void kernfs_init(void) { }
5804b93dc9bSTejun Heo
581ba341d55STejun Heo #endif /* CONFIG_KERNFS */
582879f40d1STejun Heo
5833abb1d90STejun Heo /**
5843abb1d90STejun Heo * kernfs_path - build full path of a given node
5853abb1d90STejun Heo * @kn: kernfs_node of interest
5863abb1d90STejun Heo * @buf: buffer to copy @kn's name into
5873abb1d90STejun Heo * @buflen: size of @buf
5883abb1d90STejun Heo *
5898f5be0ecSKonstantin Khlebnikov * If @kn is NULL result will be "(null)".
5908f5be0ecSKonstantin Khlebnikov *
5918f5be0ecSKonstantin Khlebnikov * Returns the length of the full path. If the full length is equal to or
5928f5be0ecSKonstantin Khlebnikov * greater than @buflen, @buf contains the truncated path with the trailing
5938f5be0ecSKonstantin Khlebnikov * '\0'. On error, -errno is returned.
5943abb1d90STejun Heo */
kernfs_path(struct kernfs_node * kn,char * buf,size_t buflen)5953abb1d90STejun Heo static inline int kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
5963abb1d90STejun Heo {
5973abb1d90STejun Heo return kernfs_path_from_node(kn, NULL, buf, buflen);
5983abb1d90STejun Heo }
5993abb1d90STejun Heo
600324a56e1STejun Heo static inline struct kernfs_node *
kernfs_find_and_get(struct kernfs_node * kn,const char * name)601324a56e1STejun Heo kernfs_find_and_get(struct kernfs_node *kn, const char *name)
602ccf73cf3STejun Heo {
603324a56e1STejun Heo return kernfs_find_and_get_ns(kn, name, NULL);
604ccf73cf3STejun Heo }
605ccf73cf3STejun Heo
606324a56e1STejun Heo static inline struct kernfs_node *
kernfs_walk_and_get(struct kernfs_node * kn,const char * path)607bd96f76aSTejun Heo kernfs_walk_and_get(struct kernfs_node *kn, const char *path)
608bd96f76aSTejun Heo {
609bd96f76aSTejun Heo return kernfs_walk_and_get_ns(kn, path, NULL);
610bd96f76aSTejun Heo }
611bd96f76aSTejun Heo
612bd96f76aSTejun Heo static inline struct kernfs_node *
kernfs_create_dir(struct kernfs_node * parent,const char * name,umode_t mode,void * priv)613bb8b9d09STejun Heo kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode,
614bb8b9d09STejun Heo void *priv)
61593b2b8e4STejun Heo {
616488dee96SDmitry Torokhov return kernfs_create_dir_ns(parent, name, mode,
617488dee96SDmitry Torokhov GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
618488dee96SDmitry Torokhov priv, NULL);
61993b2b8e4STejun Heo }
62093b2b8e4STejun Heo
kernfs_remove_by_name(struct kernfs_node * parent,const char * name)621324a56e1STejun Heo static inline int kernfs_remove_by_name(struct kernfs_node *parent,
622879f40d1STejun Heo const char *name)
623879f40d1STejun Heo {
624879f40d1STejun Heo return kernfs_remove_by_name_ns(parent, name, NULL);
625879f40d1STejun Heo }
626879f40d1STejun Heo
kernfs_rename(struct kernfs_node * kn,struct kernfs_node * new_parent,const char * new_name)6270c23b225STejun Heo static inline int kernfs_rename(struct kernfs_node *kn,
6280c23b225STejun Heo struct kernfs_node *new_parent,
6290c23b225STejun Heo const char *new_name)
6300c23b225STejun Heo {
6310c23b225STejun Heo return kernfs_rename_ns(kn, new_parent, new_name, NULL);
6320c23b225STejun Heo }
6330c23b225STejun Heo
634b8441ed2STejun Heo #endif /* __LINUX_KERNFS_H */
635