Merge tag 'mm-hotfixes-stable-2025-07-11-16-16' of git://git.kernel.org/pub/scm/linux...
[linux-block.git] / include / linux / kernfs.h
CommitLineData
55716d26 1/* SPDX-License-Identifier: GPL-2.0-only */
b8441ed2
TH
2/*
3 * kernfs.h - pseudo filesystem decoupled from vfs locking
b8441ed2
TH
4 */
5
6#ifndef __LINUX_KERNFS_H
7#define __LINUX_KERNFS_H
8
5d0e26bb 9#include <linux/err.h>
dd8a5b03
TH
10#include <linux/list.h>
11#include <linux/mutex.h>
bc755553 12#include <linux/idr.h>
517e64f5 13#include <linux/lockdep.h>
cf9e5a73
TH
14#include <linux/rbtree.h>
15#include <linux/atomic.h>
79f1c730
AS
16#include <linux/bug.h>
17#include <linux/types.h>
488dee96 18#include <linux/uidgid.h>
abd54f02 19#include <linux/wait.h>
393c3714 20#include <linux/rwsem.h>
1d25b84e 21#include <linux/cache.h>
879f40d1 22
5d60418e 23struct file;
917f56ca 24struct dentry;
5d60418e 25struct iattr;
dd8a5b03
TH
26struct seq_file;
27struct vm_area_struct;
79f1c730 28struct vm_operations_struct;
4b93dc9b
TH
29struct super_block;
30struct file_system_type;
147e1a97 31struct poll_table_struct;
23bf1b6b 32struct fs_context;
5d60418e 33
23bf1b6b 34struct kernfs_fs_context;
c525aadd
TH
35struct kernfs_open_node;
36struct kernfs_iattrs;
cf9e5a73 37
1d25b84e
IK
38/*
39 * NR_KERNFS_LOCK_BITS determines size (NR_KERNFS_LOCKS) of hash
40 * table of locks.
41 * Having a small hash table would impact scalability, since
42 * more and more kernfs_node objects will end up using same lock
43 * and having a very large hash table would waste memory.
44 *
45 * At the moment size of hash table of locks is being set based on
46 * the number of CPUs as follows:
47 *
48 * NR_CPU NR_KERNFS_LOCK_BITS NR_KERNFS_LOCKS
49 * 1 1 2
50 * 2-3 2 4
51 * 4-7 4 16
52 * 8-15 6 64
53 * 16-31 8 256
54 * 32 and more 10 1024
55 *
56 * The above relation between NR_CPU and number of locks is based
57 * on some internal experimentation which involved booting qemu
58 * with different values of smp, performing some sysfs operations
59 * on all CPUs and observing how increase in number of locks impacts
60 * completion time of these sysfs operations on each CPU.
61 */
62#ifdef CONFIG_SMP
63#define NR_KERNFS_LOCK_BITS (2 * (ilog2(NR_CPUS < 32 ? NR_CPUS : 32)))
64#else
65#define NR_KERNFS_LOCK_BITS 1
66#endif
67
68#define NR_KERNFS_LOCKS (1 << NR_KERNFS_LOCK_BITS)
69
70/*
71 * There's one kernfs_open_file for each open file and one kernfs_open_node
72 * for each kernfs_node with one or more open files.
73 *
74 * filp->private_data points to seq_file whose ->private points to
75 * kernfs_open_file.
76 *
77 * kernfs_open_files are chained at kernfs_open_node->files, which is
78 * protected by kernfs_global_locks.open_file_mutex[i].
79 *
80 * To reduce possible contention in sysfs access, arising due to single
81 * locks, use an array of locks (e.g. open_file_mutex) and use kernfs_node
82 * object address as hash keys to get the index of these locks.
83 *
84 * Hashed mutexes are safe to use here because operations using these don't
85 * rely on global exclusion.
86 *
87 * In future we intend to replace other global locks with hashed ones as well.
88 * kernfs_global_locks acts as a holder for all such hash tables.
89 */
90struct kernfs_global_locks {
91 struct mutex open_file_mutex[NR_KERNFS_LOCKS];
92};
93
cf9e5a73 94enum kernfs_node_type {
df23fc39
TH
95 KERNFS_DIR = 0x0001,
96 KERNFS_FILE = 0x0002,
97 KERNFS_LINK = 0x0004,
cf9e5a73
TH
98};
99
0c47383b
DX
100#define KERNFS_TYPE_MASK 0x000f
101#define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK
102#define KERNFS_MAX_USER_XATTRS 128
103#define KERNFS_USER_XATTR_SIZE_LIMIT (128 << 10)
cf9e5a73
TH
104
105enum kernfs_node_flag {
d35258ef 106 KERNFS_ACTIVATED = 0x0010,
df23fc39
TH
107 KERNFS_NS = 0x0020,
108 KERNFS_HAS_SEQ_SHOW = 0x0040,
109 KERNFS_HAS_MMAP = 0x0080,
110 KERNFS_LOCKDEP = 0x0100,
783bd07d 111 KERNFS_HIDDEN = 0x0200,
6b0afc2a
TH
112 KERNFS_SUICIDAL = 0x0400,
113 KERNFS_SUICIDED = 0x0800,
ea015218 114 KERNFS_EMPTY_DIR = 0x1000,
0e67db2f 115 KERNFS_HAS_RELEASE = 0x2000,
c2549174 116 KERNFS_REMOVING = 0x4000,
cf9e5a73
TH
117};
118
d35258ef
TH
119/* @flags for kernfs_create_root() */
120enum kernfs_root_flag {
555724a8
TH
121 /*
122 * kernfs_nodes are created in the deactivated state and invisible.
123 * They require explicit kernfs_activate() to become visible. This
124 * can be used to make related nodes become visible atomically
125 * after all nodes are created successfully.
126 */
127 KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
128
129 /*
0d1a393d 130 * For regular files, if the opener has CAP_DAC_OVERRIDE, open(2)
555724a8
TH
131 * succeeds regardless of the RW permissions. sysfs had an extra
132 * layer of enforcement where open(2) fails with -EACCES regardless
133 * of CAP_DAC_OVERRIDE if the permission doesn't have the
134 * respective read or write access at all (none of S_IRUGO or
135 * S_IWUGO) or the respective operation isn't implemented. The
136 * following flag enables that behavior.
137 */
138 KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002,
aa818825
SL
139
140 /*
141 * The filesystem supports exportfs operation, so userspace can use
142 * fhandle to access nodes of the fs.
143 */
144 KERNFS_ROOT_SUPPORT_EXPORTOP = 0x0004,
0c47383b
DX
145
146 /*
147 * Support user xattrs to be written to nodes rooted at this root.
148 */
149 KERNFS_ROOT_SUPPORT_USER_XATTR = 0x0008,
63348894
SAS
150
151 /*
152 * Renames must not change the parent node.
153 */
154 KERNFS_ROOT_INVARIANT_PARENT = 0x0010,
d35258ef
TH
155};
156
324a56e1
TH
157/* type-specific structures for kernfs_node union members */
158struct kernfs_elem_dir {
cf9e5a73 159 unsigned long subdirs;
adc5e8b5 160 /* children rbtree starts here and goes through kn->rb */
cf9e5a73
TH
161 struct rb_root children;
162
163 /*
164 * The kernfs hierarchy this directory belongs to. This fits
324a56e1 165 * better directly in kernfs_node but is here to save space.
cf9e5a73
TH
166 */
167 struct kernfs_root *root;
895adbec
IK
168 /*
169 * Monotonic revision counter, used to identify if a directory
170 * node has changed during negative dentry revalidation.
171 */
172 unsigned long rev;
cf9e5a73
TH
173};
174
324a56e1
TH
175struct kernfs_elem_symlink {
176 struct kernfs_node *target_kn;
cf9e5a73
TH
177};
178
324a56e1 179struct kernfs_elem_attr {
cf9e5a73 180 const struct kernfs_ops *ops;
086c00c7 181 struct kernfs_open_node __rcu *open;
cf9e5a73 182 loff_t size;
2fd26970 183 struct kernfs_node *notify_next; /* for kernfs_notify() */
cf9e5a73
TH
184};
185
186/*
324a56e1
TH
187 * kernfs_node - the building block of kernfs hierarchy. Each and every
188 * kernfs node is represented by single kernfs_node. Most fields are
cf9e5a73
TH
189 * private to kernfs and shouldn't be accessed directly by kernfs users.
190 *
21774fd8 191 * As long as count reference is held, the kernfs_node itself is
324a56e1
TH
192 * accessible. Dereferencing elem or any other outer entity requires
193 * active reference.
cf9e5a73 194 */
324a56e1 195struct kernfs_node {
adc5e8b5
TH
196 atomic_t count;
197 atomic_t active;
cf9e5a73
TH
198#ifdef CONFIG_DEBUG_LOCK_ALLOC
199 struct lockdep_map dep_map;
200#endif
3eef34ad
TH
201 /*
202 * Use kernfs_get_parent() and kernfs_name/path() instead of
203 * accessing the following two fields directly. If the node is
204 * never moved to a different parent, it is safe to access the
205 * parent directly.
206 */
63348894 207 struct kernfs_node __rcu *__parent;
741c10b0 208 const char __rcu *name;
cf9e5a73 209
adc5e8b5 210 struct rb_node rb;
cf9e5a73 211
adc5e8b5 212 const void *ns; /* namespace tag */
9b0925a6 213 unsigned int hash; /* ns + name hash */
1c9f2c76
TH
214 unsigned short flags;
215 umode_t mode;
216
cf9e5a73 217 union {
adc5e8b5
TH
218 struct kernfs_elem_dir dir;
219 struct kernfs_elem_symlink symlink;
220 struct kernfs_elem_attr attr;
cf9e5a73
TH
221 };
222
67c0496e 223 /*
40430452
TH
224 * 64bit unique ID. On 64bit ino setups, id is the ino. On 32bit,
225 * the low 32bits are ino and upper generation.
67c0496e
TH
226 */
227 u64 id;
228
1c9f2c76 229 void *priv;
c525aadd 230 struct kernfs_iattrs *iattr;
4207b556
TH
231
232 struct rcu_head rcu;
cf9e5a73 233};
b8441ed2 234
80b9bbef 235/*
90c07c89
TH
236 * kernfs_syscall_ops may be specified on kernfs_create_root() to support
237 * syscalls. These optional callbacks are invoked on the matching syscalls
238 * and can perform any kernfs operations which don't necessarily have to be
239 * the exact operation requested. An active reference is held for each
240 * kernfs_node parameter.
80b9bbef 241 */
90c07c89 242struct kernfs_syscall_ops {
6a7fed4e
TH
243 int (*show_options)(struct seq_file *sf, struct kernfs_root *root);
244
80b9bbef
TH
245 int (*mkdir)(struct kernfs_node *parent, const char *name,
246 umode_t mode);
247 int (*rmdir)(struct kernfs_node *kn);
248 int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent,
249 const char *new_name);
4f41fc59
SH
250 int (*show_path)(struct seq_file *sf, struct kernfs_node *kn,
251 struct kernfs_root *root);
80b9bbef
TH
252};
253
f2eb478f 254struct kernfs_node *kernfs_root_to_node(struct kernfs_root *root);
ba7443bc 255
c525aadd 256struct kernfs_open_file {
dd8a5b03 257 /* published fields */
324a56e1 258 struct kernfs_node *kn;
dd8a5b03 259 struct file *file;
0e67db2f 260 struct seq_file *seq_file;
2536390d 261 void *priv;
dd8a5b03
TH
262
263 /* private fields, do not use outside kernfs proper */
264 struct mutex mutex;
e4234a1f 265 struct mutex prealloc_mutex;
dd8a5b03
TH
266 int event;
267 struct list_head list;
2b75869b 268 char *prealloc_buf;
dd8a5b03 269
b7ce40cf 270 size_t atomic_write_len;
a1d82aff 271 bool mmapped:1;
0e67db2f 272 bool released:1;
dd8a5b03
TH
273 const struct vm_operations_struct *vm_ops;
274};
275
f6acf8bb 276struct kernfs_ops {
0e67db2f
TH
277 /*
278 * Optional open/release methods. Both are called with
279 * @of->seq_file populated.
280 */
281 int (*open)(struct kernfs_open_file *of);
282 void (*release)(struct kernfs_open_file *of);
283
f6acf8bb
TH
284 /*
285 * Read is handled by either seq_file or raw_read().
286 *
d19b9846
TH
287 * If seq_show() is present, seq_file path is active. Other seq
288 * operations are optional and if not implemented, the behavior is
289 * equivalent to single_open(). @sf->private points to the
c525aadd 290 * associated kernfs_open_file.
f6acf8bb
TH
291 *
292 * read() is bounced through kernel buffer and a read larger than
293 * PAGE_SIZE results in partial operation of PAGE_SIZE.
294 */
295 int (*seq_show)(struct seq_file *sf, void *v);
d19b9846
TH
296
297 void *(*seq_start)(struct seq_file *sf, loff_t *ppos);
298 void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos);
299 void (*seq_stop)(struct seq_file *sf, void *v);
f6acf8bb 300
c525aadd 301 ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
302 loff_t off);
303
304 /*
4d3773c4
TH
305 * write() is bounced through kernel buffer. If atomic_write_len
306 * is not set, a write larger than PAGE_SIZE results in partial
307 * operations of PAGE_SIZE chunks. If atomic_write_len is set,
308 * writes upto the specified size are executed atomically but
309 * larger ones are rejected with -E2BIG.
f6acf8bb 310 */
4d3773c4 311 size_t atomic_write_len;
2b75869b
N
312 /*
313 * "prealloc" causes a buffer to be allocated at open for
314 * all read/write requests. As ->seq_show uses seq_read()
315 * which does its own allocation, it is incompatible with
316 * ->prealloc. Provide ->read and ->write with ->prealloc.
317 */
318 bool prealloc;
c525aadd 319 ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes,
f6acf8bb
TH
320 loff_t off);
321
147e1a97
JW
322 __poll_t (*poll)(struct kernfs_open_file *of,
323 struct poll_table_struct *pt);
324
c525aadd 325 int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma);
0fedefd4 326 loff_t (*llseek)(struct kernfs_open_file *of, loff_t offset, int whence);
f6acf8bb
TH
327};
328
23bf1b6b
DH
329/*
330 * The kernfs superblock creation/mount parameter context.
331 */
332struct kernfs_fs_context {
333 struct kernfs_root *root; /* Root of the hierarchy being mounted */
334 void *ns_tag; /* Namespace tag of the mount (or NULL) */
335 unsigned long magic; /* File system specific magic number */
336
337 /* The following are set/used by kernfs_mount() */
338 bool new_sb_created; /* Set to T if we allocated a new sb */
339};
340
ba341d55 341#ifdef CONFIG_KERNFS
879f40d1 342
df23fc39 343static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73 344{
df23fc39 345 return kn->flags & KERNFS_TYPE_MASK;
cf9e5a73
TH
346}
347
67c0496e
TH
348static inline ino_t kernfs_id_ino(u64 id)
349{
40430452
TH
350 /* id is ino if ino_t is 64bit; otherwise, low 32bits */
351 if (sizeof(ino_t) >= sizeof(u64))
352 return id;
353 else
354 return (u32)id;
67c0496e
TH
355}
356
357static inline u32 kernfs_id_gen(u64 id)
358{
40430452
TH
359 /* gen is fixed at 1 if ino_t is 64bit; otherwise, high 32bits */
360 if (sizeof(ino_t) >= sizeof(u64))
361 return 1;
362 else
363 return id >> 32;
67c0496e
TH
364}
365
366static inline ino_t kernfs_ino(struct kernfs_node *kn)
367{
368 return kernfs_id_ino(kn->id);
369}
370
371static inline ino_t kernfs_gen(struct kernfs_node *kn)
372{
373 return kernfs_id_gen(kn->id);
374}
375
cf9e5a73
TH
376/**
377 * kernfs_enable_ns - enable namespace under a directory
324a56e1 378 * @kn: directory of interest, should be empty
cf9e5a73 379 *
324a56e1
TH
380 * This is to be called right after @kn is created to enable namespace
381 * under it. All children of @kn must have non-NULL namespace tags and
cf9e5a73
TH
382 * only the ones which match the super_block's tag will be visible.
383 */
324a56e1 384static inline void kernfs_enable_ns(struct kernfs_node *kn)
cf9e5a73 385{
df23fc39 386 WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR);
adc5e8b5 387 WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children));
df23fc39 388 kn->flags |= KERNFS_NS;
cf9e5a73
TH
389}
390
ac9bba03
TH
391/**
392 * kernfs_ns_enabled - test whether namespace is enabled
324a56e1 393 * @kn: the node to test
ac9bba03
TH
394 *
395 * Test whether namespace filtering is enabled for the children of @ns.
396 */
324a56e1 397static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03 398{
df23fc39 399 return kn->flags & KERNFS_NS;
ac9bba03
TH
400}
401
3eef34ad 402int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen);
741c10b0 403int kernfs_path_from_node(struct kernfs_node *kn_to, struct kernfs_node *kn_from,
9f6df573 404 char *buf, size_t buflen);
3eef34ad
TH
405void pr_cont_kernfs_name(struct kernfs_node *kn);
406void pr_cont_kernfs_path(struct kernfs_node *kn);
407struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn);
324a56e1
TH
408struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
409 const char *name, const void *ns);
bd96f76a
TH
410struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
411 const char *path, const void *ns);
324a56e1
TH
412void kernfs_get(struct kernfs_node *kn);
413void kernfs_put(struct kernfs_node *kn);
ccf73cf3 414
0c23b225
TH
415struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry);
416struct kernfs_root *kernfs_root_from_sb(struct super_block *sb);
fb02915f 417struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn);
0c23b225 418
fb3c8315
AK
419struct dentry *kernfs_node_dentry(struct kernfs_node *kn,
420 struct super_block *sb);
90c07c89 421struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 422 unsigned int flags, void *priv);
ba7443bc 423void kernfs_destroy_root(struct kernfs_root *root);
63348894 424unsigned int kernfs_root_flags(struct kernfs_node *kn);
ba7443bc 425
324a56e1 426struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09 427 const char *name, umode_t mode,
488dee96 428 kuid_t uid, kgid_t gid,
bb8b9d09 429 void *priv, const void *ns);
ea015218
EB
430struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
431 const char *name);
2063d608 432struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent,
488dee96
DT
433 const char *name, umode_t mode,
434 kuid_t uid, kgid_t gid,
435 loff_t size,
2063d608
TH
436 const struct kernfs_ops *ops,
437 void *priv, const void *ns,
2063d608 438 struct lock_class_key *key);
324a56e1
TH
439struct kernfs_node *kernfs_create_link(struct kernfs_node *parent,
440 const char *name,
441 struct kernfs_node *target);
d35258ef 442void kernfs_activate(struct kernfs_node *kn);
783bd07d 443void kernfs_show(struct kernfs_node *kn, bool show);
324a56e1 444void kernfs_remove(struct kernfs_node *kn);
6b0afc2a
TH
445void kernfs_break_active_protection(struct kernfs_node *kn);
446void kernfs_unbreak_active_protection(struct kernfs_node *kn);
447bool kernfs_remove_self(struct kernfs_node *kn);
324a56e1 448int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
879f40d1 449 const void *ns);
324a56e1 450int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
890ece16 451 const char *new_name, const void *new_ns);
324a56e1 452int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr);
147e1a97
JW
453__poll_t kernfs_generic_poll(struct kernfs_open_file *of,
454 struct poll_table_struct *pt);
324a56e1 455void kernfs_notify(struct kernfs_node *kn);
879f40d1 456
1537ad15
OM
457int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
458 void *value, size_t size);
459int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
460 const void *value, size_t size, int flags);
b230d5ab 461
4b93dc9b 462const void *kernfs_super_ns(struct super_block *sb);
23bf1b6b
DH
463int kernfs_get_tree(struct fs_context *fc);
464void kernfs_free_fs_context(struct fs_context *fc);
4b93dc9b
TH
465void kernfs_kill_sb(struct super_block *sb);
466
467void kernfs_init(void);
468
fe0f726c
TH
469struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
470 u64 id);
ba341d55 471#else /* CONFIG_KERNFS */
879f40d1 472
df23fc39 473static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
cf9e5a73
TH
474{ return 0; } /* whatever */
475
324a56e1 476static inline void kernfs_enable_ns(struct kernfs_node *kn) { }
cf9e5a73 477
324a56e1 478static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
ac9bba03
TH
479{ return false; }
480
3eef34ad
TH
481static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
482{ return -ENOSYS; }
483
0e0b2afd
TH
484static inline int kernfs_path_from_node(struct kernfs_node *root_kn,
485 struct kernfs_node *kn,
486 char *buf, size_t buflen)
487{ return -ENOSYS; }
488
3eef34ad
TH
489static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { }
490static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { }
491
492static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
493{ return NULL; }
494
324a56e1
TH
495static inline struct kernfs_node *
496kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name,
ccf73cf3
TH
497 const void *ns)
498{ return NULL; }
bd96f76a
TH
499static inline struct kernfs_node *
500kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path,
501 const void *ns)
502{ return NULL; }
ccf73cf3 503
324a56e1
TH
504static inline void kernfs_get(struct kernfs_node *kn) { }
505static inline void kernfs_put(struct kernfs_node *kn) { }
ccf73cf3 506
0c23b225
TH
507static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
508{ return NULL; }
509
510static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb)
511{ return NULL; }
512
fb02915f
TH
513static inline struct inode *
514kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn)
515{ return NULL; }
516
80b9bbef 517static inline struct kernfs_root *
d35258ef
TH
518kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags,
519 void *priv)
ba7443bc
TH
520{ return ERR_PTR(-ENOSYS); }
521
522static inline void kernfs_destroy_root(struct kernfs_root *root) { }
63348894
SAS
523static inline unsigned int kernfs_root_flags(struct kernfs_node *kn)
524{ return 0; }
ba7443bc 525
324a56e1 526static inline struct kernfs_node *
bb8b9d09 527kernfs_create_dir_ns(struct kernfs_node *parent, const char *name,
488dee96
DT
528 umode_t mode, kuid_t uid, kgid_t gid,
529 void *priv, const void *ns)
93b2b8e4
TH
530{ return ERR_PTR(-ENOSYS); }
531
324a56e1 532static inline struct kernfs_node *
2063d608 533__kernfs_create_file(struct kernfs_node *parent, const char *name,
488dee96
DT
534 umode_t mode, kuid_t uid, kgid_t gid,
535 loff_t size, const struct kernfs_ops *ops,
dfeb0750 536 void *priv, const void *ns, struct lock_class_key *key)
496f7394
TH
537{ return ERR_PTR(-ENOSYS); }
538
324a56e1
TH
539static inline struct kernfs_node *
540kernfs_create_link(struct kernfs_node *parent, const char *name,
541 struct kernfs_node *target)
5d0e26bb
TH
542{ return ERR_PTR(-ENOSYS); }
543
d35258ef
TH
544static inline void kernfs_activate(struct kernfs_node *kn) { }
545
324a56e1 546static inline void kernfs_remove(struct kernfs_node *kn) { }
879f40d1 547
6b0afc2a
TH
548static inline bool kernfs_remove_self(struct kernfs_node *kn)
549{ return false; }
550
324a56e1 551static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn,
879f40d1
TH
552 const char *name, const void *ns)
553{ return -ENOSYS; }
554
324a56e1
TH
555static inline int kernfs_rename_ns(struct kernfs_node *kn,
556 struct kernfs_node *new_parent,
890ece16
TH
557 const char *new_name, const void *new_ns)
558{ return -ENOSYS; }
559
324a56e1 560static inline int kernfs_setattr(struct kernfs_node *kn,
5d60418e
TH
561 const struct iattr *iattr)
562{ return -ENOSYS; }
563
79038a99
AB
564static inline __poll_t kernfs_generic_poll(struct kernfs_open_file *of,
565 struct poll_table_struct *pt)
566{ return -ENOSYS; }
567
324a56e1 568static inline void kernfs_notify(struct kernfs_node *kn) { }
024f6471 569
1537ad15
OM
570static inline int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
571 void *value, size_t size)
b230d5ab
OM
572{ return -ENOSYS; }
573
1537ad15
OM
574static inline int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
575 const void *value, size_t size, int flags)
b230d5ab
OM
576{ return -ENOSYS; }
577
4b93dc9b
TH
578static inline const void *kernfs_super_ns(struct super_block *sb)
579{ return NULL; }
580
23bf1b6b
DH
581static inline int kernfs_get_tree(struct fs_context *fc)
582{ return -ENOSYS; }
583
584static inline void kernfs_free_fs_context(struct fs_context *fc) { }
4b93dc9b
TH
585
586static inline void kernfs_kill_sb(struct super_block *sb) { }
587
588static inline void kernfs_init(void) { }
589
ba341d55 590#endif /* CONFIG_KERNFS */
879f40d1 591
3abb1d90
TH
592/**
593 * kernfs_path - build full path of a given node
594 * @kn: kernfs_node of interest
595 * @buf: buffer to copy @kn's name into
596 * @buflen: size of @buf
597 *
8f5be0ec
KK
598 * If @kn is NULL result will be "(null)".
599 *
600 * Returns the length of the full path. If the full length is equal to or
601 * greater than @buflen, @buf contains the truncated path with the trailing
602 * '\0'. On error, -errno is returned.
3abb1d90
TH
603 */
604static inline int kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
605{
606 return kernfs_path_from_node(kn, NULL, buf, buflen);
607}
608
324a56e1
TH
609static inline struct kernfs_node *
610kernfs_find_and_get(struct kernfs_node *kn, const char *name)
ccf73cf3 611{
324a56e1 612 return kernfs_find_and_get_ns(kn, name, NULL);
ccf73cf3
TH
613}
614
bd96f76a
TH
615static inline struct kernfs_node *
616kernfs_walk_and_get(struct kernfs_node *kn, const char *path)
617{
618 return kernfs_walk_and_get_ns(kn, path, NULL);
619}
620
324a56e1 621static inline struct kernfs_node *
bb8b9d09
TH
622kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode,
623 void *priv)
93b2b8e4 624{
488dee96
DT
625 return kernfs_create_dir_ns(parent, name, mode,
626 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
627 priv, NULL);
93b2b8e4
TH
628}
629
324a56e1 630static inline int kernfs_remove_by_name(struct kernfs_node *parent,
879f40d1
TH
631 const char *name)
632{
633 return kernfs_remove_by_name_ns(parent, name, NULL);
634}
635
0c23b225
TH
636static inline int kernfs_rename(struct kernfs_node *kn,
637 struct kernfs_node *new_parent,
638 const char *new_name)
639{
640 return kernfs_rename_ns(kn, new_parent, new_name, NULL);
641}
642
b8441ed2 643#endif /* __LINUX_KERNFS_H */