kernfs: introduce kernfs_node_id
[linux-2.6-block.git] / include / linux / kernfs.h
CommitLineData
b8441ed2
TH
1/*
2 * kernfs.h - pseudo filesystem decoupled from vfs locking
3 *
4 * This file is released under the GPLv2.
5 */
6
7#ifndef __LINUX_KERNFS_H
8#define __LINUX_KERNFS_H
9
879f40d1 10#include <linux/kernel.h>
5d0e26bb 11#include <linux/err.h>
dd8a5b03
TH
12#include <linux/list.h>
13#include <linux/mutex.h>
bc755553 14#include <linux/idr.h>
517e64f5 15#include <linux/lockdep.h>
cf9e5a73
TH
16#include <linux/rbtree.h>
17#include <linux/atomic.h>
abd54f02 18#include <linux/wait.h>
879f40d1 19
5d60418e 20struct file;
917f56ca 21struct dentry;
5d60418e 22struct iattr;
dd8a5b03
TH
23struct seq_file;
24struct vm_area_struct;
4b93dc9b
TH
25struct super_block;
26struct file_system_type;
5d60418e 27
c525aadd
TH
28struct kernfs_open_node;
29struct kernfs_iattrs;
cf9e5a73
TH
30
31enum kernfs_node_type {
df23fc39
TH
32 KERNFS_DIR = 0x0001,
33 KERNFS_FILE = 0x0002,
34 KERNFS_LINK = 0x0004,
cf9e5a73
TH
35};
36
df23fc39 37#define KERNFS_TYPE_MASK 0x000f
df23fc39 38#define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK
cf9e5a73
TH
39
40enum kernfs_node_flag {
d35258ef 41 KERNFS_ACTIVATED = 0x0010,
df23fc39
TH
42 KERNFS_NS = 0x0020,
43 KERNFS_HAS_SEQ_SHOW = 0x0040,
44 KERNFS_HAS_MMAP = 0x0080,
45 KERNFS_LOCKDEP = 0x0100,
6b0afc2a
TH
46 KERNFS_SUICIDAL = 0x0400,
47 KERNFS_SUICIDED = 0x0800,
ea015218 48 KERNFS_EMPTY_DIR = 0x1000,
0e67db2f 49 KERNFS_HAS_RELEASE = 0x2000,
cf9e5a73
TH
50};
51
d35258ef
TH
52/* @flags for kernfs_create_root() */
53enum kernfs_root_flag {
555724a8
TH
54 /*
55 * kernfs_nodes are created in the deactivated state and invisible.
56 * They require explicit kernfs_activate() to become visible. This
57 * can be used to make related nodes become visible atomically
58 * after all nodes are created successfully.
59 */
60 KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
61
62 /*
63 * For regular flies, if the opener has CAP_DAC_OVERRIDE, open(2)
64 * succeeds regardless of the RW permissions. sysfs had an extra
65 * layer of enforcement where open(2) fails with -EACCES regardless
66 * of CAP_DAC_OVERRIDE if the permission doesn't have the
67 * respective read or write access at all (none of S_IRUGO or
68 * S_IWUGO) or the respective operation isn't implemented. The
69 * following flag enables that behavior.
70 */
71 KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002,
d35258ef
TH
72};
73
324a56e1
TH
74/* type-specific structures for kernfs_node union members */
75struct kernfs_elem_dir {
cf9e5a73 76 unsigned long subdirs;
adc5e8b5 77 /* children rbtree starts here and goes through kn->rb */
cf9e5a73
TH
78 struct rb_root children;
79
80 /*
81 * The kernfs hierarchy this directory belongs to. This fits
324a56e1 82 * better directly in kernfs_node but is here to save space.
cf9e5a73
TH
83 */
84 struct kernfs_root *root;
85};
86
324a56e1
TH
87struct kernfs_elem_symlink {
88 struct kernfs_node *target_kn;
cf9e5a73
TH
89};
90
324a56e1 91struct kernfs_elem_attr {
cf9e5a73 92 const struct kernfs_ops *ops;
c525aadd 93 struct kernfs_open_node *open;
cf9e5a73 94 loff_t size;
ecca47ce 95 struct kernfs_node *notify_next; /* for kernfs_notify() */
cf9e5a73
TH
96};
97
c53cd490
SL
98/* represent a kernfs node */
99union kernfs_node_id {
100 struct {
101 u32 ino;
102 u32 generation;
103 };
104 u64 id;
105};
106
cf9e5a73 107/*
324a56e1
TH
108 * kernfs_node - the building block of kernfs hierarchy. Each and every
109 * kernfs node is represented by single kernfs_node. Most fields are
cf9e5a73
TH
110 * private to kernfs and shouldn't be accessed directly by kernfs users.
111 *
324a56e1
TH
112 * As long as s_count reference is held, the kernfs_node itself is
113 * accessible. Dereferencing elem or any other outer entity requires
114 * active reference.
cf9e5a73 115 */
324a56e1 116struct kernfs_node {
adc5e8b5
TH
117 atomic_t count;
118 atomic_t active;
cf9e5a73
TH
119#ifdef CONFIG_DEBUG_LOCK_ALLOC
120 struct lockdep_map dep_map;
121#endif
3eef34ad
TH
122 /*
123 * Use kernfs_get_parent() and kernfs_name/path() instead of
124 * accessing the following two fields directly. If the node is
125 * never moved to a different parent, it is safe to access the
126 * parent directly.
127 */
adc5e8b5
TH
128 struct kernfs_node *parent;
129 const char *name;
cf9e5a73 130
adc5e8b5 131 struct rb_node rb;
cf9e5a73 132
adc5e8b5 133 const void *ns; /* namespace tag */
9b0925a6 134 unsigned int hash; /* ns + name hash */
cf9e5a73 135 union {
adc5e8b5
TH
136 struct kernfs_elem_dir dir;
137 struct kernfs_elem_symlink symlink;
138 struct kernfs_elem_attr attr;
cf9e5a73
TH
139 };
140
141 void *priv;
142
c53cd490 143 union kernfs_node_id id;
adc5e8b5
TH
144 unsigned short flags;
145 umode_t mode;
c525aadd 146 struct kernfs_iattrs *iattr;
cf9e5a73 147};
b8441ed2 148
80b9bbef 149/*
90c07c89
TH
150 * kernfs_syscall_ops may be specified on kernfs_create_root() to support
151 * syscalls. These optional callbacks are invoked on the matching syscalls
152 * and can perform any kernfs operations which don't necessarily have to be
153 * the exact operation requested. An active reference is held for each
154 * kernfs_node parameter.
80b9bbef 155 */
90c07c89 156struct kernfs_syscall_ops {
6a7fed4e
TH
157 int (*remount_fs)(struct kernfs_root *root, int *flags, char *data);
158 int (*show_options)(struct seq_file *sf, struct kernfs_root *root);
159
80b9bbef
TH
160 int (*mkdir)(struct kernfs_node *parent, const char *name,
161 umode_t mode);
162 int (*rmdir)(struct kernfs_node *kn);
163 int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent,
164 const char *new_name);
4f41fc59
SH
165 int (*show_path)(struct seq_file *sf, struct kernfs_node *kn,
166 struct kernfs_root *root);
80b9bbef
TH
167};
168
ba7443bc
TH
169struct kernfs_root {
170 /* published fields */
324a56e1 171 struct kernfs_node *kn;
d35258ef 172 unsigned int flags; /* KERNFS_ROOT_* flags */
bc755553
TH
173
174 /* private fields, do not use outside kernfs proper */
7d35079f 175 struct idr ino_idr;
4a3ef68a 176 u32 next_generation;
90c07c89 177 struct kernfs_syscall_ops *syscall_ops;
7d568a83
TH
178
179 /* list of kernfs_super_info of this root, protected by kernfs_mutex */
180 struct list_head supers;
181
abd54f02 182 wait_queue_head_t deactivate_waitq;
ba7443bc
TH
183};
184
c525aadd 185struct kernfs_open_file {
dd8a5b03 186 /* published fields */
324a56e1 187 struct kernfs_node *kn;
dd8a5b03 188 struct file *file;
0e67db2f 189 struct seq_file *seq_file;
2536390d 190 void *priv;
dd8a5b03
TH
191
192 /* private fields, do not use outside kernfs proper */
193 struct mutex mutex;
e4234a1f 194 struct mutex prealloc_mutex;
dd8a5b03
TH
195 int event;
196 struct list_head list;
2b75869b 197 char *prealloc_buf;
dd8a5b03 198
b7ce40cf 199 size_t atomic_write_len;
a1d82aff 200 bool mmapped:1;
0e67db2f 201 bool released:1;
dd8a5b03
TH
202 const struct vm_operations_struct *vm_ops;
203};
204
f6acf8bb 205struct kernfs_ops {
0e67db2f
TH
206 /*
207 * Optional open/release methods. Both are called with
208 * @of->seq_file populated.
209 */
210 int (*open)(struct kernfs_open_file *of);
211 void (*release)(struct kernfs_open_file *of);
212
f6acf8bb
TH
213 /*
214 * Read is handled by either seq_file or raw_read().
215 *
d19b9846
TH
216 * If seq_show() is present, seq_file path is active. Other seq
217 * operations are optional and if not implemented, the behavior is
218 * equivalent to single_open(). @sf->private points to the
c525aadd 219 * associated kernfs_open_file.
f6acf8bb
TH
220 *
221 * read() is bounced through kernel buffer and a read larger than
222 * PAGE_SIZE results in partial operation of PAGE_SIZE.
223 */
224 int (*seq_show)(struct seq_file *sf, void *v);
d19b9846
TH
225
226 void *(*seq_start)(struct seq_file *sf, loff_t *ppos);
227 void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos);
228 void (*seq_stop)(struct seq_file *sf, void *v);
f6acf8bb 229
c525aadd 230 ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
231 loff_t off);
232
233 /*
4d3773c4
TH
234 * write() is bounced through kernel buffer. If atomic_write_len
235 * is not set, a write larger than PAGE_SIZE results in partial
236 * operations of PAGE_SIZE chunks. If atomic_write_len is set,
237 * writes upto the specified size are executed atomically but
238 * larger ones are rejected with -E2BIG.
f6acf8bb 239 */
4d3773c4 240 size_t atomic_write_len;
2b75869b
N
241 /*
242 * "prealloc" causes a buffer to be allocated at open for
243 * all read/write requests. As ->seq_show uses seq_read()
244 * which does its own allocation, it is incompatible with
245 * ->prealloc. Provide ->read and ->write with ->prealloc.
246 */
247 bool prealloc;
c525aadd 248 ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
249 loff_t off);
250
c525aadd 251 int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma);
517e64f5
TH
252
253#ifdef CONFIG_DEBUG_LOCK_ALLOC
254 struct lock_class_key lockdep_key;
255#endif
f6acf8bb
TH
256};
257
ba341d55 258#ifdef CONFIG_KERNFS
879f40d1 259
df23fc39 260static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73 261{
df23fc39 262 return kn->flags & KERNFS_TYPE_MASK;
cf9e5a73
TH
263}
264
265/**
266 * kernfs_enable_ns - enable namespace under a directory
324a56e1 267 * @kn: directory of interest, should be empty
cf9e5a73 268 *
324a56e1
TH
269 * This is to be called right after @kn is created to enable namespace
270 * under it. All children of @kn must have non-NULL namespace tags and
cf9e5a73
TH
271 * only the ones which match the super_block's tag will be visible.
272 */
324a56e1 273static inline void kernfs_enable_ns(struct kernfs_node *kn)
cf9e5a73 274{
df23fc39 275 WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR);
adc5e8b5 276 WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children));
df23fc39 277 kn->flags |= KERNFS_NS;
cf9e5a73
TH
278}
279
ac9bba03
TH
280/**
281 * kernfs_ns_enabled - test whether namespace is enabled
324a56e1 282 * @kn: the node to test
ac9bba03
TH
283 *
284 * Test whether namespace filtering is enabled for the children of @ns.
285 */
324a56e1 286static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03 287{
df23fc39 288 return kn->flags & KERNFS_NS;
ac9bba03
TH
289}
290
3eef34ad 291int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen);
9f6df573
AK
292int kernfs_path_from_node(struct kernfs_node *root_kn, struct kernfs_node *kn,
293 char *buf, size_t buflen);
3eef34ad
TH
294void pr_cont_kernfs_name(struct kernfs_node *kn);
295void pr_cont_kernfs_path(struct kernfs_node *kn);
296struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn);
324a56e1
TH
297struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
298 const char *name, const void *ns);
bd96f76a
TH
299struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
300 const char *path, const void *ns);
324a56e1
TH
301void kernfs_get(struct kernfs_node *kn);
302void kernfs_put(struct kernfs_node *kn);
ccf73cf3 303
0c23b225
TH
304struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry);
305struct kernfs_root *kernfs_root_from_sb(struct super_block *sb);
fb02915f 306struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn);
0c23b225 307
fb3c8315
AK
308struct dentry *kernfs_node_dentry(struct kernfs_node *kn,
309 struct super_block *sb);
90c07c89 310struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 311 unsigned int flags, void *priv);
ba7443bc
TH
312void kernfs_destroy_root(struct kernfs_root *root);
313
324a56e1 314struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09
TH
315 const char *name, umode_t mode,
316 void *priv, const void *ns);
ea015218
EB
317struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
318 const char *name);
2063d608
TH
319struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent,
320 const char *name,
321 umode_t mode, loff_t size,
322 const struct kernfs_ops *ops,
323 void *priv, const void *ns,
2063d608 324 struct lock_class_key *key);
324a56e1
TH
325struct kernfs_node *kernfs_create_link(struct kernfs_node *parent,
326 const char *name,
327 struct kernfs_node *target);
d35258ef 328void kernfs_activate(struct kernfs_node *kn);
324a56e1 329void kernfs_remove(struct kernfs_node *kn);
6b0afc2a
TH
330void kernfs_break_active_protection(struct kernfs_node *kn);
331void kernfs_unbreak_active_protection(struct kernfs_node *kn);
332bool kernfs_remove_self(struct kernfs_node *kn);
324a56e1 333int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
879f40d1 334 const void *ns);
324a56e1 335int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
890ece16 336 const char *new_name, const void *new_ns);
324a56e1
TH
337int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr);
338void kernfs_notify(struct kernfs_node *kn);
879f40d1 339
4b93dc9b
TH
340const void *kernfs_super_ns(struct super_block *sb);
341struct dentry *kernfs_mount_ns(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
342 struct kernfs_root *root, unsigned long magic,
343 bool *new_sb_created, const void *ns);
4b93dc9b 344void kernfs_kill_sb(struct super_block *sb);
4e26445f 345struct super_block *kernfs_pin_sb(struct kernfs_root *root, const void *ns);
4b93dc9b
TH
346
347void kernfs_init(void);
348
ba341d55 349#else /* CONFIG_KERNFS */
879f40d1 350
df23fc39 351static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73
TH
352{ return 0; } /* whatever */
353
324a56e1 354static inline void kernfs_enable_ns(struct kernfs_node *kn) { }
cf9e5a73 355
324a56e1 356static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03
TH
357{ return false; }
358
3eef34ad
TH
359static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
360{ return -ENOSYS; }
361
0e0b2afd
TH
362static inline int kernfs_path_from_node(struct kernfs_node *root_kn,
363 struct kernfs_node *kn,
364 char *buf, size_t buflen)
365{ return -ENOSYS; }
366
3eef34ad
TH
367static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { }
368static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { }
369
370static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
371{ return NULL; }
372
324a56e1
TH
373static inline struct kernfs_node *
374kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name,
ccf73cf3
TH
375 const void *ns)
376{ return NULL; }
bd96f76a
TH
377static inline struct kernfs_node *
378kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path,
379 const void *ns)
380{ return NULL; }
ccf73cf3 381
324a56e1
TH
382static inline void kernfs_get(struct kernfs_node *kn) { }
383static inline void kernfs_put(struct kernfs_node *kn) { }
ccf73cf3 384
0c23b225
TH
385static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
386{ return NULL; }
387
388static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb)
389{ return NULL; }
390
fb02915f
TH
391static inline struct inode *
392kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn)
393{ return NULL; }
394
80b9bbef 395static inline struct kernfs_root *
d35258ef
TH
396kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags,
397 void *priv)
ba7443bc
TH
398{ return ERR_PTR(-ENOSYS); }
399
400static inline void kernfs_destroy_root(struct kernfs_root *root) { }
401
324a56e1 402static inline struct kernfs_node *
bb8b9d09
TH
403kernfs_create_dir_ns(struct kernfs_node *parent, const char *name,
404 umode_t mode, void *priv, const void *ns)
93b2b8e4
TH
405{ return ERR_PTR(-ENOSYS); }
406
324a56e1 407static inline struct kernfs_node *
2063d608
TH
408__kernfs_create_file(struct kernfs_node *parent, const char *name,
409 umode_t mode, loff_t size, const struct kernfs_ops *ops,
dfeb0750 410 void *priv, const void *ns, struct lock_class_key *key)
496f7394
TH
411{ return ERR_PTR(-ENOSYS); }
412
324a56e1
TH
413static inline struct kernfs_node *
414kernfs_create_link(struct kernfs_node *parent, const char *name,
415 struct kernfs_node *target)
5d0e26bb
TH
416{ return ERR_PTR(-ENOSYS); }
417
d35258ef
TH
418static inline void kernfs_activate(struct kernfs_node *kn) { }
419
324a56e1 420static inline void kernfs_remove(struct kernfs_node *kn) { }
879f40d1 421
6b0afc2a
TH
422static inline bool kernfs_remove_self(struct kernfs_node *kn)
423{ return false; }
424
324a56e1 425static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn,
879f40d1
TH
426 const char *name, const void *ns)
427{ return -ENOSYS; }
428
324a56e1
TH
429static inline int kernfs_rename_ns(struct kernfs_node *kn,
430 struct kernfs_node *new_parent,
890ece16
TH
431 const char *new_name, const void *new_ns)
432{ return -ENOSYS; }
433
324a56e1 434static inline int kernfs_setattr(struct kernfs_node *kn,
5d60418e
TH
435 const struct iattr *iattr)
436{ return -ENOSYS; }
437
324a56e1 438static inline void kernfs_notify(struct kernfs_node *kn) { }
024f6471 439
4b93dc9b
TH
440static inline const void *kernfs_super_ns(struct super_block *sb)
441{ return NULL; }
442
443static inline struct dentry *
444kernfs_mount_ns(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
445 struct kernfs_root *root, unsigned long magic,
446 bool *new_sb_created, const void *ns)
4b93dc9b
TH
447{ return ERR_PTR(-ENOSYS); }
448
449static inline void kernfs_kill_sb(struct super_block *sb) { }
450
451static inline void kernfs_init(void) { }
452
ba341d55 453#endif /* CONFIG_KERNFS */
879f40d1 454
3abb1d90
TH
455/**
456 * kernfs_path - build full path of a given node
457 * @kn: kernfs_node of interest
458 * @buf: buffer to copy @kn's name into
459 * @buflen: size of @buf
460 *
461 * Builds and returns the full path of @kn in @buf of @buflen bytes. The
462 * path is built from the end of @buf so the returned pointer usually
463 * doesn't match @buf. If @buf isn't long enough, @buf is nul terminated
464 * and %NULL is returned.
465 */
466static inline int kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
467{
468 return kernfs_path_from_node(kn, NULL, buf, buflen);
469}
470
324a56e1
TH
471static inline struct kernfs_node *
472kernfs_find_and_get(struct kernfs_node *kn, const char *name)
ccf73cf3 473{
324a56e1 474 return kernfs_find_and_get_ns(kn, name, NULL);
ccf73cf3
TH
475}
476
bd96f76a
TH
477static inline struct kernfs_node *
478kernfs_walk_and_get(struct kernfs_node *kn, const char *path)
479{
480 return kernfs_walk_and_get_ns(kn, path, NULL);
481}
482
324a56e1 483static inline struct kernfs_node *
bb8b9d09
TH
484kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode,
485 void *priv)
93b2b8e4 486{
bb8b9d09 487 return kernfs_create_dir_ns(parent, name, mode, priv, NULL);
93b2b8e4
TH
488}
489
324a56e1
TH
490static inline struct kernfs_node *
491kernfs_create_file_ns(struct kernfs_node *parent, const char *name,
517e64f5
TH
492 umode_t mode, loff_t size, const struct kernfs_ops *ops,
493 void *priv, const void *ns)
494{
495 struct lock_class_key *key = NULL;
496
497#ifdef CONFIG_DEBUG_LOCK_ALLOC
498 key = (struct lock_class_key *)&ops->lockdep_key;
499#endif
2063d608 500 return __kernfs_create_file(parent, name, mode, size, ops, priv, ns,
dfeb0750 501 key);
517e64f5
TH
502}
503
324a56e1
TH
504static inline struct kernfs_node *
505kernfs_create_file(struct kernfs_node *parent, const char *name, umode_t mode,
496f7394
TH
506 loff_t size, const struct kernfs_ops *ops, void *priv)
507{
508 return kernfs_create_file_ns(parent, name, mode, size, ops, priv, NULL);
509}
510
324a56e1 511static inline int kernfs_remove_by_name(struct kernfs_node *parent,
879f40d1
TH
512 const char *name)
513{
514 return kernfs_remove_by_name_ns(parent, name, NULL);
515}
516
0c23b225
TH
517static inline int kernfs_rename(struct kernfs_node *kn,
518 struct kernfs_node *new_parent,
519 const char *new_name)
520{
521 return kernfs_rename_ns(kn, new_parent, new_name, NULL);
522}
523
4b93dc9b
TH
524static inline struct dentry *
525kernfs_mount(struct file_system_type *fs_type, int flags,
26fc9cd2
JZ
526 struct kernfs_root *root, unsigned long magic,
527 bool *new_sb_created)
4b93dc9b 528{
26fc9cd2
JZ
529 return kernfs_mount_ns(fs_type, flags, root,
530 magic, new_sb_created, NULL);
4b93dc9b
TH
531}
532
b8441ed2 533#endif /* __LINUX_KERNFS_H */