Commit | Line | Data |
---|---|---|
55716d26 | 1 | /* SPDX-License-Identifier: GPL-2.0-only */ |
b8441ed2 TH |
2 | /* |
3 | * kernfs.h - pseudo filesystem decoupled from vfs locking | |
b8441ed2 TH |
4 | */ |
5 | ||
6 | #ifndef __LINUX_KERNFS_H | |
7 | #define __LINUX_KERNFS_H | |
8 | ||
5d0e26bb | 9 | #include <linux/err.h> |
dd8a5b03 TH |
10 | #include <linux/list.h> |
11 | #include <linux/mutex.h> | |
bc755553 | 12 | #include <linux/idr.h> |
517e64f5 | 13 | #include <linux/lockdep.h> |
cf9e5a73 TH |
14 | #include <linux/rbtree.h> |
15 | #include <linux/atomic.h> | |
79f1c730 AS |
16 | #include <linux/bug.h> |
17 | #include <linux/types.h> | |
488dee96 | 18 | #include <linux/uidgid.h> |
abd54f02 | 19 | #include <linux/wait.h> |
393c3714 | 20 | #include <linux/rwsem.h> |
1d25b84e | 21 | #include <linux/cache.h> |
879f40d1 | 22 | |
5d60418e | 23 | struct file; |
917f56ca | 24 | struct dentry; |
5d60418e | 25 | struct iattr; |
dd8a5b03 TH |
26 | struct seq_file; |
27 | struct vm_area_struct; | |
79f1c730 | 28 | struct vm_operations_struct; |
4b93dc9b TH |
29 | struct super_block; |
30 | struct file_system_type; | |
147e1a97 | 31 | struct poll_table_struct; |
23bf1b6b | 32 | struct fs_context; |
5d60418e | 33 | |
23bf1b6b | 34 | struct kernfs_fs_context; |
c525aadd TH |
35 | struct kernfs_open_node; |
36 | struct kernfs_iattrs; | |
cf9e5a73 | 37 | |
1d25b84e IK |
38 | /* |
39 | * NR_KERNFS_LOCK_BITS determines size (NR_KERNFS_LOCKS) of hash | |
40 | * table of locks. | |
41 | * Having a small hash table would impact scalability, since | |
42 | * more and more kernfs_node objects will end up using same lock | |
43 | * and having a very large hash table would waste memory. | |
44 | * | |
45 | * At the moment size of hash table of locks is being set based on | |
46 | * the number of CPUs as follows: | |
47 | * | |
48 | * NR_CPU NR_KERNFS_LOCK_BITS NR_KERNFS_LOCKS | |
49 | * 1 1 2 | |
50 | * 2-3 2 4 | |
51 | * 4-7 4 16 | |
52 | * 8-15 6 64 | |
53 | * 16-31 8 256 | |
54 | * 32 and more 10 1024 | |
55 | * | |
56 | * The above relation between NR_CPU and number of locks is based | |
57 | * on some internal experimentation which involved booting qemu | |
58 | * with different values of smp, performing some sysfs operations | |
59 | * on all CPUs and observing how increase in number of locks impacts | |
60 | * completion time of these sysfs operations on each CPU. | |
61 | */ | |
62 | #ifdef CONFIG_SMP | |
63 | #define NR_KERNFS_LOCK_BITS (2 * (ilog2(NR_CPUS < 32 ? NR_CPUS : 32))) | |
64 | #else | |
65 | #define NR_KERNFS_LOCK_BITS 1 | |
66 | #endif | |
67 | ||
68 | #define NR_KERNFS_LOCKS (1 << NR_KERNFS_LOCK_BITS) | |
69 | ||
70 | /* | |
71 | * There's one kernfs_open_file for each open file and one kernfs_open_node | |
72 | * for each kernfs_node with one or more open files. | |
73 | * | |
74 | * filp->private_data points to seq_file whose ->private points to | |
75 | * kernfs_open_file. | |
76 | * | |
77 | * kernfs_open_files are chained at kernfs_open_node->files, which is | |
78 | * protected by kernfs_global_locks.open_file_mutex[i]. | |
79 | * | |
80 | * To reduce possible contention in sysfs access, arising due to single | |
81 | * locks, use an array of locks (e.g. open_file_mutex) and use kernfs_node | |
82 | * object address as hash keys to get the index of these locks. | |
83 | * | |
84 | * Hashed mutexes are safe to use here because operations using these don't | |
85 | * rely on global exclusion. | |
86 | * | |
87 | * In future we intend to replace other global locks with hashed ones as well. | |
88 | * kernfs_global_locks acts as a holder for all such hash tables. | |
89 | */ | |
90 | struct kernfs_global_locks { | |
91 | struct mutex open_file_mutex[NR_KERNFS_LOCKS]; | |
92 | }; | |
93 | ||
cf9e5a73 | 94 | enum kernfs_node_type { |
df23fc39 TH |
95 | KERNFS_DIR = 0x0001, |
96 | KERNFS_FILE = 0x0002, | |
97 | KERNFS_LINK = 0x0004, | |
cf9e5a73 TH |
98 | }; |
99 | ||
0c47383b DX |
100 | #define KERNFS_TYPE_MASK 0x000f |
101 | #define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK | |
102 | #define KERNFS_MAX_USER_XATTRS 128 | |
103 | #define KERNFS_USER_XATTR_SIZE_LIMIT (128 << 10) | |
cf9e5a73 TH |
104 | |
105 | enum kernfs_node_flag { | |
d35258ef | 106 | KERNFS_ACTIVATED = 0x0010, |
df23fc39 TH |
107 | KERNFS_NS = 0x0020, |
108 | KERNFS_HAS_SEQ_SHOW = 0x0040, | |
109 | KERNFS_HAS_MMAP = 0x0080, | |
110 | KERNFS_LOCKDEP = 0x0100, | |
783bd07d | 111 | KERNFS_HIDDEN = 0x0200, |
6b0afc2a TH |
112 | KERNFS_SUICIDAL = 0x0400, |
113 | KERNFS_SUICIDED = 0x0800, | |
ea015218 | 114 | KERNFS_EMPTY_DIR = 0x1000, |
0e67db2f | 115 | KERNFS_HAS_RELEASE = 0x2000, |
c2549174 | 116 | KERNFS_REMOVING = 0x4000, |
cf9e5a73 TH |
117 | }; |
118 | ||
d35258ef TH |
119 | /* @flags for kernfs_create_root() */ |
120 | enum kernfs_root_flag { | |
555724a8 TH |
121 | /* |
122 | * kernfs_nodes are created in the deactivated state and invisible. | |
123 | * They require explicit kernfs_activate() to become visible. This | |
124 | * can be used to make related nodes become visible atomically | |
125 | * after all nodes are created successfully. | |
126 | */ | |
127 | KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001, | |
128 | ||
129 | /* | |
0d1a393d | 130 | * For regular files, if the opener has CAP_DAC_OVERRIDE, open(2) |
555724a8 TH |
131 | * succeeds regardless of the RW permissions. sysfs had an extra |
132 | * layer of enforcement where open(2) fails with -EACCES regardless | |
133 | * of CAP_DAC_OVERRIDE if the permission doesn't have the | |
134 | * respective read or write access at all (none of S_IRUGO or | |
135 | * S_IWUGO) or the respective operation isn't implemented. The | |
136 | * following flag enables that behavior. | |
137 | */ | |
138 | KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002, | |
aa818825 SL |
139 | |
140 | /* | |
141 | * The filesystem supports exportfs operation, so userspace can use | |
142 | * fhandle to access nodes of the fs. | |
143 | */ | |
144 | KERNFS_ROOT_SUPPORT_EXPORTOP = 0x0004, | |
0c47383b DX |
145 | |
146 | /* | |
147 | * Support user xattrs to be written to nodes rooted at this root. | |
148 | */ | |
149 | KERNFS_ROOT_SUPPORT_USER_XATTR = 0x0008, | |
63348894 SAS |
150 | |
151 | /* | |
152 | * Renames must not change the parent node. | |
153 | */ | |
154 | KERNFS_ROOT_INVARIANT_PARENT = 0x0010, | |
d35258ef TH |
155 | }; |
156 | ||
324a56e1 TH |
157 | /* type-specific structures for kernfs_node union members */ |
158 | struct kernfs_elem_dir { | |
cf9e5a73 | 159 | unsigned long subdirs; |
adc5e8b5 | 160 | /* children rbtree starts here and goes through kn->rb */ |
cf9e5a73 TH |
161 | struct rb_root children; |
162 | ||
163 | /* | |
164 | * The kernfs hierarchy this directory belongs to. This fits | |
324a56e1 | 165 | * better directly in kernfs_node but is here to save space. |
cf9e5a73 TH |
166 | */ |
167 | struct kernfs_root *root; | |
895adbec IK |
168 | /* |
169 | * Monotonic revision counter, used to identify if a directory | |
170 | * node has changed during negative dentry revalidation. | |
171 | */ | |
172 | unsigned long rev; | |
cf9e5a73 TH |
173 | }; |
174 | ||
324a56e1 TH |
175 | struct kernfs_elem_symlink { |
176 | struct kernfs_node *target_kn; | |
cf9e5a73 TH |
177 | }; |
178 | ||
324a56e1 | 179 | struct kernfs_elem_attr { |
cf9e5a73 | 180 | const struct kernfs_ops *ops; |
086c00c7 | 181 | struct kernfs_open_node __rcu *open; |
cf9e5a73 | 182 | loff_t size; |
2fd26970 | 183 | struct kernfs_node *notify_next; /* for kernfs_notify() */ |
cf9e5a73 TH |
184 | }; |
185 | ||
186 | /* | |
324a56e1 TH |
187 | * kernfs_node - the building block of kernfs hierarchy. Each and every |
188 | * kernfs node is represented by single kernfs_node. Most fields are | |
cf9e5a73 TH |
189 | * private to kernfs and shouldn't be accessed directly by kernfs users. |
190 | * | |
21774fd8 | 191 | * As long as count reference is held, the kernfs_node itself is |
324a56e1 TH |
192 | * accessible. Dereferencing elem or any other outer entity requires |
193 | * active reference. | |
cf9e5a73 | 194 | */ |
324a56e1 | 195 | struct kernfs_node { |
adc5e8b5 TH |
196 | atomic_t count; |
197 | atomic_t active; | |
cf9e5a73 TH |
198 | #ifdef CONFIG_DEBUG_LOCK_ALLOC |
199 | struct lockdep_map dep_map; | |
200 | #endif | |
3eef34ad TH |
201 | /* |
202 | * Use kernfs_get_parent() and kernfs_name/path() instead of | |
203 | * accessing the following two fields directly. If the node is | |
204 | * never moved to a different parent, it is safe to access the | |
205 | * parent directly. | |
206 | */ | |
63348894 | 207 | struct kernfs_node __rcu *__parent; |
741c10b0 | 208 | const char __rcu *name; |
cf9e5a73 | 209 | |
adc5e8b5 | 210 | struct rb_node rb; |
cf9e5a73 | 211 | |
adc5e8b5 | 212 | const void *ns; /* namespace tag */ |
9b0925a6 | 213 | unsigned int hash; /* ns + name hash */ |
1c9f2c76 TH |
214 | unsigned short flags; |
215 | umode_t mode; | |
216 | ||
cf9e5a73 | 217 | union { |
adc5e8b5 TH |
218 | struct kernfs_elem_dir dir; |
219 | struct kernfs_elem_symlink symlink; | |
220 | struct kernfs_elem_attr attr; | |
cf9e5a73 TH |
221 | }; |
222 | ||
67c0496e | 223 | /* |
40430452 TH |
224 | * 64bit unique ID. On 64bit ino setups, id is the ino. On 32bit, |
225 | * the low 32bits are ino and upper generation. | |
67c0496e TH |
226 | */ |
227 | u64 id; | |
228 | ||
1c9f2c76 | 229 | void *priv; |
c525aadd | 230 | struct kernfs_iattrs *iattr; |
4207b556 TH |
231 | |
232 | struct rcu_head rcu; | |
cf9e5a73 | 233 | }; |
b8441ed2 | 234 | |
80b9bbef | 235 | /* |
90c07c89 TH |
236 | * kernfs_syscall_ops may be specified on kernfs_create_root() to support |
237 | * syscalls. These optional callbacks are invoked on the matching syscalls | |
238 | * and can perform any kernfs operations which don't necessarily have to be | |
239 | * the exact operation requested. An active reference is held for each | |
240 | * kernfs_node parameter. | |
80b9bbef | 241 | */ |
90c07c89 | 242 | struct kernfs_syscall_ops { |
6a7fed4e TH |
243 | int (*show_options)(struct seq_file *sf, struct kernfs_root *root); |
244 | ||
80b9bbef TH |
245 | int (*mkdir)(struct kernfs_node *parent, const char *name, |
246 | umode_t mode); | |
247 | int (*rmdir)(struct kernfs_node *kn); | |
248 | int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent, | |
249 | const char *new_name); | |
4f41fc59 SH |
250 | int (*show_path)(struct seq_file *sf, struct kernfs_node *kn, |
251 | struct kernfs_root *root); | |
80b9bbef TH |
252 | }; |
253 | ||
f2eb478f | 254 | struct kernfs_node *kernfs_root_to_node(struct kernfs_root *root); |
ba7443bc | 255 | |
c525aadd | 256 | struct kernfs_open_file { |
dd8a5b03 | 257 | /* published fields */ |
324a56e1 | 258 | struct kernfs_node *kn; |
dd8a5b03 | 259 | struct file *file; |
0e67db2f | 260 | struct seq_file *seq_file; |
2536390d | 261 | void *priv; |
dd8a5b03 TH |
262 | |
263 | /* private fields, do not use outside kernfs proper */ | |
264 | struct mutex mutex; | |
e4234a1f | 265 | struct mutex prealloc_mutex; |
dd8a5b03 TH |
266 | int event; |
267 | struct list_head list; | |
2b75869b | 268 | char *prealloc_buf; |
dd8a5b03 | 269 | |
b7ce40cf | 270 | size_t atomic_write_len; |
a1d82aff | 271 | bool mmapped:1; |
0e67db2f | 272 | bool released:1; |
dd8a5b03 TH |
273 | const struct vm_operations_struct *vm_ops; |
274 | }; | |
275 | ||
f6acf8bb | 276 | struct kernfs_ops { |
0e67db2f TH |
277 | /* |
278 | * Optional open/release methods. Both are called with | |
279 | * @of->seq_file populated. | |
280 | */ | |
281 | int (*open)(struct kernfs_open_file *of); | |
282 | void (*release)(struct kernfs_open_file *of); | |
283 | ||
f6acf8bb TH |
284 | /* |
285 | * Read is handled by either seq_file or raw_read(). | |
286 | * | |
d19b9846 TH |
287 | * If seq_show() is present, seq_file path is active. Other seq |
288 | * operations are optional and if not implemented, the behavior is | |
289 | * equivalent to single_open(). @sf->private points to the | |
c525aadd | 290 | * associated kernfs_open_file. |
f6acf8bb TH |
291 | * |
292 | * read() is bounced through kernel buffer and a read larger than | |
293 | * PAGE_SIZE results in partial operation of PAGE_SIZE. | |
294 | */ | |
295 | int (*seq_show)(struct seq_file *sf, void *v); | |
d19b9846 TH |
296 | |
297 | void *(*seq_start)(struct seq_file *sf, loff_t *ppos); | |
298 | void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos); | |
299 | void (*seq_stop)(struct seq_file *sf, void *v); | |
f6acf8bb | 300 | |
c525aadd | 301 | ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes, |
f6acf8bb TH |
302 | loff_t off); |
303 | ||
304 | /* | |
4d3773c4 TH |
305 | * write() is bounced through kernel buffer. If atomic_write_len |
306 | * is not set, a write larger than PAGE_SIZE results in partial | |
307 | * operations of PAGE_SIZE chunks. If atomic_write_len is set, | |
308 | * writes upto the specified size are executed atomically but | |
309 | * larger ones are rejected with -E2BIG. | |
f6acf8bb | 310 | */ |
4d3773c4 | 311 | size_t atomic_write_len; |
2b75869b N |
312 | /* |
313 | * "prealloc" causes a buffer to be allocated at open for | |
314 | * all read/write requests. As ->seq_show uses seq_read() | |
315 | * which does its own allocation, it is incompatible with | |
316 | * ->prealloc. Provide ->read and ->write with ->prealloc. | |
317 | */ | |
318 | bool prealloc; | |
c525aadd | 319 | ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes, |
f6acf8bb TH |
320 | loff_t off); |
321 | ||
147e1a97 JW |
322 | __poll_t (*poll)(struct kernfs_open_file *of, |
323 | struct poll_table_struct *pt); | |
324 | ||
c525aadd | 325 | int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma); |
0fedefd4 | 326 | loff_t (*llseek)(struct kernfs_open_file *of, loff_t offset, int whence); |
f6acf8bb TH |
327 | }; |
328 | ||
23bf1b6b DH |
329 | /* |
330 | * The kernfs superblock creation/mount parameter context. | |
331 | */ | |
332 | struct kernfs_fs_context { | |
333 | struct kernfs_root *root; /* Root of the hierarchy being mounted */ | |
334 | void *ns_tag; /* Namespace tag of the mount (or NULL) */ | |
335 | unsigned long magic; /* File system specific magic number */ | |
336 | ||
337 | /* The following are set/used by kernfs_mount() */ | |
338 | bool new_sb_created; /* Set to T if we allocated a new sb */ | |
339 | }; | |
340 | ||
ba341d55 | 341 | #ifdef CONFIG_KERNFS |
879f40d1 | 342 | |
df23fc39 | 343 | static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn) |
cf9e5a73 | 344 | { |
df23fc39 | 345 | return kn->flags & KERNFS_TYPE_MASK; |
cf9e5a73 TH |
346 | } |
347 | ||
67c0496e TH |
348 | static inline ino_t kernfs_id_ino(u64 id) |
349 | { | |
40430452 TH |
350 | /* id is ino if ino_t is 64bit; otherwise, low 32bits */ |
351 | if (sizeof(ino_t) >= sizeof(u64)) | |
352 | return id; | |
353 | else | |
354 | return (u32)id; | |
67c0496e TH |
355 | } |
356 | ||
357 | static inline u32 kernfs_id_gen(u64 id) | |
358 | { | |
40430452 TH |
359 | /* gen is fixed at 1 if ino_t is 64bit; otherwise, high 32bits */ |
360 | if (sizeof(ino_t) >= sizeof(u64)) | |
361 | return 1; | |
362 | else | |
363 | return id >> 32; | |
67c0496e TH |
364 | } |
365 | ||
366 | static inline ino_t kernfs_ino(struct kernfs_node *kn) | |
367 | { | |
368 | return kernfs_id_ino(kn->id); | |
369 | } | |
370 | ||
371 | static inline ino_t kernfs_gen(struct kernfs_node *kn) | |
372 | { | |
373 | return kernfs_id_gen(kn->id); | |
374 | } | |
375 | ||
cf9e5a73 TH |
376 | /** |
377 | * kernfs_enable_ns - enable namespace under a directory | |
324a56e1 | 378 | * @kn: directory of interest, should be empty |
cf9e5a73 | 379 | * |
324a56e1 TH |
380 | * This is to be called right after @kn is created to enable namespace |
381 | * under it. All children of @kn must have non-NULL namespace tags and | |
cf9e5a73 TH |
382 | * only the ones which match the super_block's tag will be visible. |
383 | */ | |
324a56e1 | 384 | static inline void kernfs_enable_ns(struct kernfs_node *kn) |
cf9e5a73 | 385 | { |
df23fc39 | 386 | WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR); |
adc5e8b5 | 387 | WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children)); |
df23fc39 | 388 | kn->flags |= KERNFS_NS; |
cf9e5a73 TH |
389 | } |
390 | ||
ac9bba03 TH |
391 | /** |
392 | * kernfs_ns_enabled - test whether namespace is enabled | |
324a56e1 | 393 | * @kn: the node to test |
ac9bba03 TH |
394 | * |
395 | * Test whether namespace filtering is enabled for the children of @ns. | |
396 | */ | |
324a56e1 | 397 | static inline bool kernfs_ns_enabled(struct kernfs_node *kn) |
ac9bba03 | 398 | { |
df23fc39 | 399 | return kn->flags & KERNFS_NS; |
ac9bba03 TH |
400 | } |
401 | ||
3eef34ad | 402 | int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen); |
741c10b0 | 403 | int kernfs_path_from_node(struct kernfs_node *kn_to, struct kernfs_node *kn_from, |
9f6df573 | 404 | char *buf, size_t buflen); |
3eef34ad TH |
405 | void pr_cont_kernfs_name(struct kernfs_node *kn); |
406 | void pr_cont_kernfs_path(struct kernfs_node *kn); | |
407 | struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn); | |
324a56e1 TH |
408 | struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent, |
409 | const char *name, const void *ns); | |
bd96f76a TH |
410 | struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent, |
411 | const char *path, const void *ns); | |
324a56e1 TH |
412 | void kernfs_get(struct kernfs_node *kn); |
413 | void kernfs_put(struct kernfs_node *kn); | |
ccf73cf3 | 414 | |
0c23b225 TH |
415 | struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry); |
416 | struct kernfs_root *kernfs_root_from_sb(struct super_block *sb); | |
fb02915f | 417 | struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn); |
0c23b225 | 418 | |
fb3c8315 AK |
419 | struct dentry *kernfs_node_dentry(struct kernfs_node *kn, |
420 | struct super_block *sb); | |
90c07c89 | 421 | struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops, |
d35258ef | 422 | unsigned int flags, void *priv); |
ba7443bc | 423 | void kernfs_destroy_root(struct kernfs_root *root); |
63348894 | 424 | unsigned int kernfs_root_flags(struct kernfs_node *kn); |
ba7443bc | 425 | |
324a56e1 | 426 | struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent, |
bb8b9d09 | 427 | const char *name, umode_t mode, |
488dee96 | 428 | kuid_t uid, kgid_t gid, |
bb8b9d09 | 429 | void *priv, const void *ns); |
ea015218 EB |
430 | struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent, |
431 | const char *name); | |
2063d608 | 432 | struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent, |
488dee96 DT |
433 | const char *name, umode_t mode, |
434 | kuid_t uid, kgid_t gid, | |
435 | loff_t size, | |
2063d608 TH |
436 | const struct kernfs_ops *ops, |
437 | void *priv, const void *ns, | |
2063d608 | 438 | struct lock_class_key *key); |
324a56e1 TH |
439 | struct kernfs_node *kernfs_create_link(struct kernfs_node *parent, |
440 | const char *name, | |
441 | struct kernfs_node *target); | |
d35258ef | 442 | void kernfs_activate(struct kernfs_node *kn); |
783bd07d | 443 | void kernfs_show(struct kernfs_node *kn, bool show); |
324a56e1 | 444 | void kernfs_remove(struct kernfs_node *kn); |
6b0afc2a TH |
445 | void kernfs_break_active_protection(struct kernfs_node *kn); |
446 | void kernfs_unbreak_active_protection(struct kernfs_node *kn); | |
447 | bool kernfs_remove_self(struct kernfs_node *kn); | |
324a56e1 | 448 | int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name, |
879f40d1 | 449 | const void *ns); |
324a56e1 | 450 | int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent, |
890ece16 | 451 | const char *new_name, const void *new_ns); |
324a56e1 | 452 | int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr); |
147e1a97 JW |
453 | __poll_t kernfs_generic_poll(struct kernfs_open_file *of, |
454 | struct poll_table_struct *pt); | |
324a56e1 | 455 | void kernfs_notify(struct kernfs_node *kn); |
879f40d1 | 456 | |
1537ad15 OM |
457 | int kernfs_xattr_get(struct kernfs_node *kn, const char *name, |
458 | void *value, size_t size); | |
459 | int kernfs_xattr_set(struct kernfs_node *kn, const char *name, | |
460 | const void *value, size_t size, int flags); | |
b230d5ab | 461 | |
4b93dc9b | 462 | const void *kernfs_super_ns(struct super_block *sb); |
23bf1b6b DH |
463 | int kernfs_get_tree(struct fs_context *fc); |
464 | void kernfs_free_fs_context(struct fs_context *fc); | |
4b93dc9b TH |
465 | void kernfs_kill_sb(struct super_block *sb); |
466 | ||
467 | void kernfs_init(void); | |
468 | ||
fe0f726c TH |
469 | struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root, |
470 | u64 id); | |
ba341d55 | 471 | #else /* CONFIG_KERNFS */ |
879f40d1 | 472 | |
df23fc39 | 473 | static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn) |
cf9e5a73 TH |
474 | { return 0; } /* whatever */ |
475 | ||
324a56e1 | 476 | static inline void kernfs_enable_ns(struct kernfs_node *kn) { } |
cf9e5a73 | 477 | |
324a56e1 | 478 | static inline bool kernfs_ns_enabled(struct kernfs_node *kn) |
ac9bba03 TH |
479 | { return false; } |
480 | ||
3eef34ad TH |
481 | static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen) |
482 | { return -ENOSYS; } | |
483 | ||
0e0b2afd TH |
484 | static inline int kernfs_path_from_node(struct kernfs_node *root_kn, |
485 | struct kernfs_node *kn, | |
486 | char *buf, size_t buflen) | |
487 | { return -ENOSYS; } | |
488 | ||
3eef34ad TH |
489 | static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { } |
490 | static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { } | |
491 | ||
492 | static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn) | |
493 | { return NULL; } | |
494 | ||
324a56e1 TH |
495 | static inline struct kernfs_node * |
496 | kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name, | |
ccf73cf3 TH |
497 | const void *ns) |
498 | { return NULL; } | |
bd96f76a TH |
499 | static inline struct kernfs_node * |
500 | kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path, | |
501 | const void *ns) | |
502 | { return NULL; } | |
ccf73cf3 | 503 | |
324a56e1 TH |
504 | static inline void kernfs_get(struct kernfs_node *kn) { } |
505 | static inline void kernfs_put(struct kernfs_node *kn) { } | |
ccf73cf3 | 506 | |
0c23b225 TH |
507 | static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry) |
508 | { return NULL; } | |
509 | ||
510 | static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb) | |
511 | { return NULL; } | |
512 | ||
fb02915f TH |
513 | static inline struct inode * |
514 | kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn) | |
515 | { return NULL; } | |
516 | ||
80b9bbef | 517 | static inline struct kernfs_root * |
d35258ef TH |
518 | kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags, |
519 | void *priv) | |
ba7443bc TH |
520 | { return ERR_PTR(-ENOSYS); } |
521 | ||
522 | static inline void kernfs_destroy_root(struct kernfs_root *root) { } | |
63348894 SAS |
523 | static inline unsigned int kernfs_root_flags(struct kernfs_node *kn) |
524 | { return 0; } | |
ba7443bc | 525 | |
324a56e1 | 526 | static inline struct kernfs_node * |
bb8b9d09 | 527 | kernfs_create_dir_ns(struct kernfs_node *parent, const char *name, |
488dee96 DT |
528 | umode_t mode, kuid_t uid, kgid_t gid, |
529 | void *priv, const void *ns) | |
93b2b8e4 TH |
530 | { return ERR_PTR(-ENOSYS); } |
531 | ||
324a56e1 | 532 | static inline struct kernfs_node * |
2063d608 | 533 | __kernfs_create_file(struct kernfs_node *parent, const char *name, |
488dee96 DT |
534 | umode_t mode, kuid_t uid, kgid_t gid, |
535 | loff_t size, const struct kernfs_ops *ops, | |
dfeb0750 | 536 | void *priv, const void *ns, struct lock_class_key *key) |
496f7394 TH |
537 | { return ERR_PTR(-ENOSYS); } |
538 | ||
324a56e1 TH |
539 | static inline struct kernfs_node * |
540 | kernfs_create_link(struct kernfs_node *parent, const char *name, | |
541 | struct kernfs_node *target) | |
5d0e26bb TH |
542 | { return ERR_PTR(-ENOSYS); } |
543 | ||
d35258ef TH |
544 | static inline void kernfs_activate(struct kernfs_node *kn) { } |
545 | ||
324a56e1 | 546 | static inline void kernfs_remove(struct kernfs_node *kn) { } |
879f40d1 | 547 | |
6b0afc2a TH |
548 | static inline bool kernfs_remove_self(struct kernfs_node *kn) |
549 | { return false; } | |
550 | ||
324a56e1 | 551 | static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn, |
879f40d1 TH |
552 | const char *name, const void *ns) |
553 | { return -ENOSYS; } | |
554 | ||
324a56e1 TH |
555 | static inline int kernfs_rename_ns(struct kernfs_node *kn, |
556 | struct kernfs_node *new_parent, | |
890ece16 TH |
557 | const char *new_name, const void *new_ns) |
558 | { return -ENOSYS; } | |
559 | ||
324a56e1 | 560 | static inline int kernfs_setattr(struct kernfs_node *kn, |
5d60418e TH |
561 | const struct iattr *iattr) |
562 | { return -ENOSYS; } | |
563 | ||
79038a99 AB |
564 | static inline __poll_t kernfs_generic_poll(struct kernfs_open_file *of, |
565 | struct poll_table_struct *pt) | |
566 | { return -ENOSYS; } | |
567 | ||
324a56e1 | 568 | static inline void kernfs_notify(struct kernfs_node *kn) { } |
024f6471 | 569 | |
1537ad15 OM |
570 | static inline int kernfs_xattr_get(struct kernfs_node *kn, const char *name, |
571 | void *value, size_t size) | |
b230d5ab OM |
572 | { return -ENOSYS; } |
573 | ||
1537ad15 OM |
574 | static inline int kernfs_xattr_set(struct kernfs_node *kn, const char *name, |
575 | const void *value, size_t size, int flags) | |
b230d5ab OM |
576 | { return -ENOSYS; } |
577 | ||
4b93dc9b TH |
578 | static inline const void *kernfs_super_ns(struct super_block *sb) |
579 | { return NULL; } | |
580 | ||
23bf1b6b DH |
581 | static inline int kernfs_get_tree(struct fs_context *fc) |
582 | { return -ENOSYS; } | |
583 | ||
584 | static inline void kernfs_free_fs_context(struct fs_context *fc) { } | |
4b93dc9b TH |
585 | |
586 | static inline void kernfs_kill_sb(struct super_block *sb) { } | |
587 | ||
588 | static inline void kernfs_init(void) { } | |
589 | ||
ba341d55 | 590 | #endif /* CONFIG_KERNFS */ |
879f40d1 | 591 | |
3abb1d90 TH |
592 | /** |
593 | * kernfs_path - build full path of a given node | |
594 | * @kn: kernfs_node of interest | |
595 | * @buf: buffer to copy @kn's name into | |
596 | * @buflen: size of @buf | |
597 | * | |
8f5be0ec KK |
598 | * If @kn is NULL result will be "(null)". |
599 | * | |
600 | * Returns the length of the full path. If the full length is equal to or | |
601 | * greater than @buflen, @buf contains the truncated path with the trailing | |
602 | * '\0'. On error, -errno is returned. | |
3abb1d90 TH |
603 | */ |
604 | static inline int kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen) | |
605 | { | |
606 | return kernfs_path_from_node(kn, NULL, buf, buflen); | |
607 | } | |
608 | ||
324a56e1 TH |
609 | static inline struct kernfs_node * |
610 | kernfs_find_and_get(struct kernfs_node *kn, const char *name) | |
ccf73cf3 | 611 | { |
324a56e1 | 612 | return kernfs_find_and_get_ns(kn, name, NULL); |
ccf73cf3 TH |
613 | } |
614 | ||
bd96f76a TH |
615 | static inline struct kernfs_node * |
616 | kernfs_walk_and_get(struct kernfs_node *kn, const char *path) | |
617 | { | |
618 | return kernfs_walk_and_get_ns(kn, path, NULL); | |
619 | } | |
620 | ||
324a56e1 | 621 | static inline struct kernfs_node * |
bb8b9d09 TH |
622 | kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode, |
623 | void *priv) | |
93b2b8e4 | 624 | { |
488dee96 DT |
625 | return kernfs_create_dir_ns(parent, name, mode, |
626 | GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, | |
627 | priv, NULL); | |
93b2b8e4 TH |
628 | } |
629 | ||
324a56e1 | 630 | static inline int kernfs_remove_by_name(struct kernfs_node *parent, |
879f40d1 TH |
631 | const char *name) |
632 | { | |
633 | return kernfs_remove_by_name_ns(parent, name, NULL); | |
634 | } | |
635 | ||
0c23b225 TH |
636 | static inline int kernfs_rename(struct kernfs_node *kn, |
637 | struct kernfs_node *new_parent, | |
638 | const char *new_name) | |
639 | { | |
640 | return kernfs_rename_ns(kn, new_parent, new_name, NULL); | |
641 | } | |
642 | ||
b8441ed2 | 643 | #endif /* __LINUX_KERNFS_H */ |