Merge tag 'linux-kselftest-4.2-rc5' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-2.6-block.git] / include / linux / kernfs.h
CommitLineData
b8441ed2
TH
1/*
2 * kernfs.h - pseudo filesystem decoupled from vfs locking
3 *
4 * This file is released under the GPLv2.
5 */
6
7#ifndef __LINUX_KERNFS_H
8#define __LINUX_KERNFS_H
9
879f40d1 10#include <linux/kernel.h>
5d0e26bb 11#include <linux/err.h>
dd8a5b03
TH
12#include <linux/list.h>
13#include <linux/mutex.h>
bc755553 14#include <linux/idr.h>
517e64f5 15#include <linux/lockdep.h>
cf9e5a73
TH
16#include <linux/rbtree.h>
17#include <linux/atomic.h>
abd54f02 18#include <linux/wait.h>
879f40d1 19
5d60418e 20struct file;
917f56ca 21struct dentry;
5d60418e 22struct iattr;
dd8a5b03
TH
23struct seq_file;
24struct vm_area_struct;
4b93dc9b
TH
25struct super_block;
26struct file_system_type;
5d60418e 27
c525aadd
TH
28struct kernfs_open_node;
29struct kernfs_iattrs;
cf9e5a73
TH
30
31enum kernfs_node_type {
df23fc39
TH
32 KERNFS_DIR = 0x0001,
33 KERNFS_FILE = 0x0002,
34 KERNFS_LINK = 0x0004,
cf9e5a73
TH
35};
36
df23fc39 37#define KERNFS_TYPE_MASK 0x000f
df23fc39 38#define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK
cf9e5a73
TH
39
40enum kernfs_node_flag {
d35258ef 41 KERNFS_ACTIVATED = 0x0010,
df23fc39
TH
42 KERNFS_NS = 0x0020,
43 KERNFS_HAS_SEQ_SHOW = 0x0040,
44 KERNFS_HAS_MMAP = 0x0080,
45 KERNFS_LOCKDEP = 0x0100,
6b0afc2a
TH
46 KERNFS_SUICIDAL = 0x0400,
47 KERNFS_SUICIDED = 0x0800,
ea015218 48 KERNFS_EMPTY_DIR = 0x1000,
cf9e5a73
TH
49};
50
d35258ef
TH
51/* @flags for kernfs_create_root() */
52enum kernfs_root_flag {
555724a8
TH
53 /*
54 * kernfs_nodes are created in the deactivated state and invisible.
55 * They require explicit kernfs_activate() to become visible. This
56 * can be used to make related nodes become visible atomically
57 * after all nodes are created successfully.
58 */
59 KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
60
61 /*
62 * For regular flies, if the opener has CAP_DAC_OVERRIDE, open(2)
63 * succeeds regardless of the RW permissions. sysfs had an extra
64 * layer of enforcement where open(2) fails with -EACCES regardless
65 * of CAP_DAC_OVERRIDE if the permission doesn't have the
66 * respective read or write access at all (none of S_IRUGO or
67 * S_IWUGO) or the respective operation isn't implemented. The
68 * following flag enables that behavior.
69 */
70 KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002,
d35258ef
TH
71};
72
324a56e1
TH
73/* type-specific structures for kernfs_node union members */
74struct kernfs_elem_dir {
cf9e5a73 75 unsigned long subdirs;
adc5e8b5 76 /* children rbtree starts here and goes through kn->rb */
cf9e5a73
TH
77 struct rb_root children;
78
79 /*
80 * The kernfs hierarchy this directory belongs to. This fits
324a56e1 81 * better directly in kernfs_node but is here to save space.
cf9e5a73
TH
82 */
83 struct kernfs_root *root;
84};
85
324a56e1
TH
86struct kernfs_elem_symlink {
87 struct kernfs_node *target_kn;
cf9e5a73
TH
88};
89
324a56e1 90struct kernfs_elem_attr {
cf9e5a73 91 const struct kernfs_ops *ops;
c525aadd 92 struct kernfs_open_node *open;
cf9e5a73 93 loff_t size;
ecca47ce 94 struct kernfs_node *notify_next; /* for kernfs_notify() */
cf9e5a73
TH
95};
96
97/*
324a56e1
TH
98 * kernfs_node - the building block of kernfs hierarchy. Each and every
99 * kernfs node is represented by single kernfs_node. Most fields are
cf9e5a73
TH
100 * private to kernfs and shouldn't be accessed directly by kernfs users.
101 *
324a56e1
TH
102 * As long as s_count reference is held, the kernfs_node itself is
103 * accessible. Dereferencing elem or any other outer entity requires
104 * active reference.
cf9e5a73 105 */
324a56e1 106struct kernfs_node {
adc5e8b5
TH
107 atomic_t count;
108 atomic_t active;
cf9e5a73
TH
109#ifdef CONFIG_DEBUG_LOCK_ALLOC
110 struct lockdep_map dep_map;
111#endif
3eef34ad
TH
112 /*
113 * Use kernfs_get_parent() and kernfs_name/path() instead of
114 * accessing the following two fields directly. If the node is
115 * never moved to a different parent, it is safe to access the
116 * parent directly.
117 */
adc5e8b5
TH
118 struct kernfs_node *parent;
119 const char *name;
cf9e5a73 120
adc5e8b5 121 struct rb_node rb;
cf9e5a73 122
adc5e8b5 123 const void *ns; /* namespace tag */
9b0925a6 124 unsigned int hash; /* ns + name hash */
cf9e5a73 125 union {
adc5e8b5
TH
126 struct kernfs_elem_dir dir;
127 struct kernfs_elem_symlink symlink;
128 struct kernfs_elem_attr attr;
cf9e5a73
TH
129 };
130
131 void *priv;
132
adc5e8b5
TH
133 unsigned short flags;
134 umode_t mode;
135 unsigned int ino;
c525aadd 136 struct kernfs_iattrs *iattr;
cf9e5a73 137};
b8441ed2 138
80b9bbef 139/*
90c07c89
TH
140 * kernfs_syscall_ops may be specified on kernfs_create_root() to support
141 * syscalls. These optional callbacks are invoked on the matching syscalls
142 * and can perform any kernfs operations which don't necessarily have to be
143 * the exact operation requested. An active reference is held for each
144 * kernfs_node parameter.
80b9bbef 145 */
90c07c89 146struct kernfs_syscall_ops {
6a7fed4e
TH
147 int (*remount_fs)(struct kernfs_root *root, int *flags, char *data);
148 int (*show_options)(struct seq_file *sf, struct kernfs_root *root);
149
80b9bbef
TH
150 int (*mkdir)(struct kernfs_node *parent, const char *name,
151 umode_t mode);
152 int (*rmdir)(struct kernfs_node *kn);
153 int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent,
154 const char *new_name);
155};
156
ba7443bc
TH
157struct kernfs_root {
158 /* published fields */
324a56e1 159 struct kernfs_node *kn;
d35258ef 160 unsigned int flags; /* KERNFS_ROOT_* flags */
bc755553
TH
161
162 /* private fields, do not use outside kernfs proper */
163 struct ida ino_ida;
90c07c89 164 struct kernfs_syscall_ops *syscall_ops;
7d568a83
TH
165
166 /* list of kernfs_super_info of this root, protected by kernfs_mutex */
167 struct list_head supers;
168
abd54f02 169 wait_queue_head_t deactivate_waitq;
ba7443bc
TH
170};
171
c525aadd 172struct kernfs_open_file {
dd8a5b03 173 /* published fields */
324a56e1 174 struct kernfs_node *kn;
dd8a5b03 175 struct file *file;
2536390d 176 void *priv;
dd8a5b03
TH
177
178 /* private fields, do not use outside kernfs proper */
179 struct mutex mutex;
180 int event;
181 struct list_head list;
2b75869b 182 char *prealloc_buf;
dd8a5b03 183
b7ce40cf 184 size_t atomic_write_len;
dd8a5b03
TH
185 bool mmapped;
186 const struct vm_operations_struct *vm_ops;
187};
188
f6acf8bb
TH
189struct kernfs_ops {
190 /*
191 * Read is handled by either seq_file or raw_read().
192 *
d19b9846
TH
193 * If seq_show() is present, seq_file path is active. Other seq
194 * operations are optional and if not implemented, the behavior is
195 * equivalent to single_open(). @sf->private points to the
c525aadd 196 * associated kernfs_open_file.
f6acf8bb
TH
197 *
198 * read() is bounced through kernel buffer and a read larger than
199 * PAGE_SIZE results in partial operation of PAGE_SIZE.
200 */
201 int (*seq_show)(struct seq_file *sf, void *v);
d19b9846
TH
202
203 void *(*seq_start)(struct seq_file *sf, loff_t *ppos);
204 void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos);
205 void (*seq_stop)(struct seq_file *sf, void *v);
f6acf8bb 206
c525aadd 207 ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
208 loff_t off);
209
210 /*
4d3773c4
TH
211 * write() is bounced through kernel buffer. If atomic_write_len
212 * is not set, a write larger than PAGE_SIZE results in partial
213 * operations of PAGE_SIZE chunks. If atomic_write_len is set,
214 * writes upto the specified size are executed atomically but
215 * larger ones are rejected with -E2BIG.
f6acf8bb 216 */
4d3773c4 217 size_t atomic_write_len;
2b75869b
N
218 /*
219 * "prealloc" causes a buffer to be allocated at open for
220 * all read/write requests. As ->seq_show uses seq_read()
221 * which does its own allocation, it is incompatible with
222 * ->prealloc. Provide ->read and ->write with ->prealloc.
223 */
224 bool prealloc;
c525aadd 225 ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
226 loff_t off);
227
c525aadd 228 int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma);
517e64f5
TH
229
230#ifdef CONFIG_DEBUG_LOCK_ALLOC
231 struct lock_class_key lockdep_key;
232#endif
f6acf8bb
TH
233};
234
ba341d55 235#ifdef CONFIG_KERNFS
879f40d1 236
df23fc39 237static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73 238{
df23fc39 239 return kn->flags & KERNFS_TYPE_MASK;
cf9e5a73
TH
240}
241
242/**
243 * kernfs_enable_ns - enable namespace under a directory
324a56e1 244 * @kn: directory of interest, should be empty
cf9e5a73 245 *
324a56e1
TH
246 * This is to be called right after @kn is created to enable namespace
247 * under it. All children of @kn must have non-NULL namespace tags and
cf9e5a73
TH
248 * only the ones which match the super_block's tag will be visible.
249 */
324a56e1 250static inline void kernfs_enable_ns(struct kernfs_node *kn)
cf9e5a73 251{
df23fc39 252 WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR);
adc5e8b5 253 WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children));
df23fc39 254 kn->flags |= KERNFS_NS;
cf9e5a73
TH
255}
256
ac9bba03
TH
257/**
258 * kernfs_ns_enabled - test whether namespace is enabled
324a56e1 259 * @kn: the node to test
ac9bba03
TH
260 *
261 * Test whether namespace filtering is enabled for the children of @ns.
262 */
324a56e1 263static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03 264{
df23fc39 265 return kn->flags & KERNFS_NS;
ac9bba03
TH
266}
267
3eef34ad
TH
268int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen);
269char * __must_check kernfs_path(struct kernfs_node *kn, char *buf,
270 size_t buflen);
271void pr_cont_kernfs_name(struct kernfs_node *kn);
272void pr_cont_kernfs_path(struct kernfs_node *kn);
273struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn);
324a56e1
TH
274struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
275 const char *name, const void *ns);
276void kernfs_get(struct kernfs_node *kn);
277void kernfs_put(struct kernfs_node *kn);
ccf73cf3 278
0c23b225
TH
279struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry);
280struct kernfs_root *kernfs_root_from_sb(struct super_block *sb);
fb02915f 281struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn);
0c23b225 282
90c07c89 283struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 284 unsigned int flags, void *priv);
ba7443bc
TH
285void kernfs_destroy_root(struct kernfs_root *root);
286
324a56e1 287struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09
TH
288 const char *name, umode_t mode,
289 void *priv, const void *ns);
ea015218
EB
290struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
291 const char *name);
2063d608
TH
292struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent,
293 const char *name,
294 umode_t mode, loff_t size,
295 const struct kernfs_ops *ops,
296 void *priv, const void *ns,
2063d608 297 struct lock_class_key *key);
324a56e1
TH
298struct kernfs_node *kernfs_create_link(struct kernfs_node *parent,
299 const char *name,
300 struct kernfs_node *target);
d35258ef 301void kernfs_activate(struct kernfs_node *kn);
324a56e1 302void kernfs_remove(struct kernfs_node *kn);
6b0afc2a
TH
303void kernfs_break_active_protection(struct kernfs_node *kn);
304void kernfs_unbreak_active_protection(struct kernfs_node *kn);
305bool kernfs_remove_self(struct kernfs_node *kn);
324a56e1 306int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
879f40d1 307 const void *ns);
324a56e1 308int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
890ece16 309 const char *new_name, const void *new_ns);
324a56e1
TH
310int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr);
311void kernfs_notify(struct kernfs_node *kn);
879f40d1 312
4b93dc9b
TH
313const void *kernfs_super_ns(struct super_block *sb);
314struct dentry *kernfs_mount_ns(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
315 struct kernfs_root *root, unsigned long magic,
316 bool *new_sb_created, const void *ns);
4b93dc9b 317void kernfs_kill_sb(struct super_block *sb);
4e26445f 318struct super_block *kernfs_pin_sb(struct kernfs_root *root, const void *ns);
4b93dc9b
TH
319
320void kernfs_init(void);
321
ba341d55 322#else /* CONFIG_KERNFS */
879f40d1 323
df23fc39 324static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73
TH
325{ return 0; } /* whatever */
326
324a56e1 327static inline void kernfs_enable_ns(struct kernfs_node *kn) { }
cf9e5a73 328
324a56e1 329static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03
TH
330{ return false; }
331
3eef34ad
TH
332static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
333{ return -ENOSYS; }
334
335static inline char * __must_check kernfs_path(struct kernfs_node *kn, char *buf,
336 size_t buflen)
337{ return NULL; }
338
339static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { }
340static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { }
341
342static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
343{ return NULL; }
344
324a56e1
TH
345static inline struct kernfs_node *
346kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name,
ccf73cf3
TH
347 const void *ns)
348{ return NULL; }
349
324a56e1
TH
350static inline void kernfs_get(struct kernfs_node *kn) { }
351static inline void kernfs_put(struct kernfs_node *kn) { }
ccf73cf3 352
0c23b225
TH
353static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
354{ return NULL; }
355
356static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb)
357{ return NULL; }
358
fb02915f
TH
359static inline struct inode *
360kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn)
361{ return NULL; }
362
80b9bbef 363static inline struct kernfs_root *
d35258ef
TH
364kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags,
365 void *priv)
ba7443bc
TH
366{ return ERR_PTR(-ENOSYS); }
367
368static inline void kernfs_destroy_root(struct kernfs_root *root) { }
369
324a56e1 370static inline struct kernfs_node *
bb8b9d09
TH
371kernfs_create_dir_ns(struct kernfs_node *parent, const char *name,
372 umode_t mode, void *priv, const void *ns)
93b2b8e4
TH
373{ return ERR_PTR(-ENOSYS); }
374
324a56e1 375static inline struct kernfs_node *
2063d608
TH
376__kernfs_create_file(struct kernfs_node *parent, const char *name,
377 umode_t mode, loff_t size, const struct kernfs_ops *ops,
dfeb0750 378 void *priv, const void *ns, struct lock_class_key *key)
496f7394
TH
379{ return ERR_PTR(-ENOSYS); }
380
324a56e1
TH
381static inline struct kernfs_node *
382kernfs_create_link(struct kernfs_node *parent, const char *name,
383 struct kernfs_node *target)
5d0e26bb
TH
384{ return ERR_PTR(-ENOSYS); }
385
d35258ef
TH
386static inline void kernfs_activate(struct kernfs_node *kn) { }
387
324a56e1 388static inline void kernfs_remove(struct kernfs_node *kn) { }
879f40d1 389
6b0afc2a
TH
390static inline bool kernfs_remove_self(struct kernfs_node *kn)
391{ return false; }
392
324a56e1 393static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn,
879f40d1
TH
394 const char *name, const void *ns)
395{ return -ENOSYS; }
396
324a56e1
TH
397static inline int kernfs_rename_ns(struct kernfs_node *kn,
398 struct kernfs_node *new_parent,
890ece16
TH
399 const char *new_name, const void *new_ns)
400{ return -ENOSYS; }
401
324a56e1 402static inline int kernfs_setattr(struct kernfs_node *kn,
5d60418e
TH
403 const struct iattr *iattr)
404{ return -ENOSYS; }
405
324a56e1 406static inline void kernfs_notify(struct kernfs_node *kn) { }
024f6471 407
4b93dc9b
TH
408static inline const void *kernfs_super_ns(struct super_block *sb)
409{ return NULL; }
410
411static inline struct dentry *
412kernfs_mount_ns(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
413 struct kernfs_root *root, unsigned long magic,
414 bool *new_sb_created, const void *ns)
4b93dc9b
TH
415{ return ERR_PTR(-ENOSYS); }
416
417static inline void kernfs_kill_sb(struct super_block *sb) { }
418
419static inline void kernfs_init(void) { }
420
ba341d55 421#endif /* CONFIG_KERNFS */
879f40d1 422
324a56e1
TH
423static inline struct kernfs_node *
424kernfs_find_and_get(struct kernfs_node *kn, const char *name)
ccf73cf3 425{
324a56e1 426 return kernfs_find_and_get_ns(kn, name, NULL);
ccf73cf3
TH
427}
428
324a56e1 429static inline struct kernfs_node *
bb8b9d09
TH
430kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode,
431 void *priv)
93b2b8e4 432{
bb8b9d09 433 return kernfs_create_dir_ns(parent, name, mode, priv, NULL);
93b2b8e4
TH
434}
435
324a56e1
TH
436static inline struct kernfs_node *
437kernfs_create_file_ns(struct kernfs_node *parent, const char *name,
517e64f5
TH
438 umode_t mode, loff_t size, const struct kernfs_ops *ops,
439 void *priv, const void *ns)
440{
441 struct lock_class_key *key = NULL;
442
443#ifdef CONFIG_DEBUG_LOCK_ALLOC
444 key = (struct lock_class_key *)&ops->lockdep_key;
445#endif
2063d608 446 return __kernfs_create_file(parent, name, mode, size, ops, priv, ns,
dfeb0750 447 key);
517e64f5
TH
448}
449
324a56e1
TH
450static inline struct kernfs_node *
451kernfs_create_file(struct kernfs_node *parent, const char *name, umode_t mode,
496f7394
TH
452 loff_t size, const struct kernfs_ops *ops, void *priv)
453{
454 return kernfs_create_file_ns(parent, name, mode, size, ops, priv, NULL);
455}
456
324a56e1 457static inline int kernfs_remove_by_name(struct kernfs_node *parent,
879f40d1
TH
458 const char *name)
459{
460 return kernfs_remove_by_name_ns(parent, name, NULL);
461}
462
0c23b225
TH
463static inline int kernfs_rename(struct kernfs_node *kn,
464 struct kernfs_node *new_parent,
465 const char *new_name)
466{
467 return kernfs_rename_ns(kn, new_parent, new_name, NULL);
468}
469
4b93dc9b
TH
470static inline struct dentry *
471kernfs_mount(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
472 struct kernfs_root *root, unsigned long magic,
473 bool *new_sb_created)
4b93dc9b 474{
26fc9cd2
JZ
475 return kernfs_mount_ns(fs_type, flags, root,
476 magic, new_sb_created, NULL);
4b93dc9b
TH
477}
478
b8441ed2 479#endif /* __LINUX_KERNFS_H */