155716d26SThomas Gleixner /* SPDX-License-Identifier: GPL-2.0-only */
2b8441ed2STejun Heo /*
3b8441ed2STejun Heo * kernfs.h - pseudo filesystem decoupled from vfs locking
4b8441ed2STejun Heo */
5b8441ed2STejun Heo
6b8441ed2STejun Heo #ifndef __LINUX_KERNFS_H
7b8441ed2STejun Heo #define __LINUX_KERNFS_H
8b8441ed2STejun Heo
95d0e26bbSTejun Heo #include <linux/err.h>
10dd8a5b03STejun Heo #include <linux/list.h>
11dd8a5b03STejun Heo #include <linux/mutex.h>
12bc755553STejun Heo #include <linux/idr.h>
13517e64f5STejun Heo #include <linux/lockdep.h>
14cf9e5a73STejun Heo #include <linux/rbtree.h>
15cf9e5a73STejun Heo #include <linux/atomic.h>
1679f1c730SAndy Shevchenko #include <linux/bug.h>
1779f1c730SAndy Shevchenko #include <linux/types.h>
18488dee96SDmitry Torokhov #include <linux/uidgid.h>
19abd54f02STejun Heo #include <linux/wait.h>
20393c3714SMinchan Kim #include <linux/rwsem.h>
211d25b84eSImran Khan #include <linux/cache.h>
22879f40d1STejun Heo
235d60418eSTejun Heo struct file;
24917f56caSTejun Heo struct dentry;
255d60418eSTejun Heo struct iattr;
26dd8a5b03STejun Heo struct seq_file;
27dd8a5b03STejun Heo struct vm_area_struct;
2879f1c730SAndy Shevchenko struct vm_operations_struct;
294b93dc9bSTejun Heo struct super_block;
304b93dc9bSTejun Heo struct file_system_type;
31147e1a97SJohannes Weiner struct poll_table_struct;
3223bf1b6bSDavid Howells struct fs_context;
335d60418eSTejun Heo
3423bf1b6bSDavid Howells struct kernfs_fs_context;
35c525aaddSTejun Heo struct kernfs_open_node;
36c525aaddSTejun Heo struct kernfs_iattrs;
37cf9e5a73STejun Heo
381d25b84eSImran Khan /*
391d25b84eSImran Khan * NR_KERNFS_LOCK_BITS determines size (NR_KERNFS_LOCKS) of hash
401d25b84eSImran Khan * table of locks.
411d25b84eSImran Khan * Having a small hash table would impact scalability, since
421d25b84eSImran Khan * more and more kernfs_node objects will end up using same lock
431d25b84eSImran Khan * and having a very large hash table would waste memory.
441d25b84eSImran Khan *
451d25b84eSImran Khan * At the moment size of hash table of locks is being set based on
461d25b84eSImran Khan * the number of CPUs as follows:
471d25b84eSImran Khan *
481d25b84eSImran Khan * NR_CPU NR_KERNFS_LOCK_BITS NR_KERNFS_LOCKS
491d25b84eSImran Khan * 1 1 2
501d25b84eSImran Khan * 2-3 2 4
511d25b84eSImran Khan * 4-7 4 16
521d25b84eSImran Khan * 8-15 6 64
531d25b84eSImran Khan * 16-31 8 256
541d25b84eSImran Khan * 32 and more 10 1024
551d25b84eSImran Khan *
561d25b84eSImran Khan * The above relation between NR_CPU and number of locks is based
571d25b84eSImran Khan * on some internal experimentation which involved booting qemu
581d25b84eSImran Khan * with different values of smp, performing some sysfs operations
591d25b84eSImran Khan * on all CPUs and observing how increase in number of locks impacts
601d25b84eSImran Khan * completion time of these sysfs operations on each CPU.
611d25b84eSImran Khan */
621d25b84eSImran Khan #ifdef CONFIG_SMP
631d25b84eSImran Khan #define NR_KERNFS_LOCK_BITS (2 * (ilog2(NR_CPUS < 32 ? NR_CPUS : 32)))
641d25b84eSImran Khan #else
651d25b84eSImran Khan #define NR_KERNFS_LOCK_BITS 1
661d25b84eSImran Khan #endif
671d25b84eSImran Khan
681d25b84eSImran Khan #define NR_KERNFS_LOCKS (1 << NR_KERNFS_LOCK_BITS)
691d25b84eSImran Khan
701d25b84eSImran Khan /*
711d25b84eSImran Khan * There's one kernfs_open_file for each open file and one kernfs_open_node
721d25b84eSImran Khan * for each kernfs_node with one or more open files.
731d25b84eSImran Khan *
741d25b84eSImran Khan * filp->private_data points to seq_file whose ->private points to
751d25b84eSImran Khan * kernfs_open_file.
761d25b84eSImran Khan *
771d25b84eSImran Khan * kernfs_open_files are chained at kernfs_open_node->files, which is
781d25b84eSImran Khan * protected by kernfs_global_locks.open_file_mutex[i].
791d25b84eSImran Khan *
801d25b84eSImran Khan * To reduce possible contention in sysfs access, arising due to single
811d25b84eSImran Khan * locks, use an array of locks (e.g. open_file_mutex) and use kernfs_node
821d25b84eSImran Khan * object address as hash keys to get the index of these locks.
831d25b84eSImran Khan *
841d25b84eSImran Khan * Hashed mutexes are safe to use here because operations using these don't
851d25b84eSImran Khan * rely on global exclusion.
861d25b84eSImran Khan *
871d25b84eSImran Khan * In future we intend to replace other global locks with hashed ones as well.
881d25b84eSImran Khan * kernfs_global_locks acts as a holder for all such hash tables.
891d25b84eSImran Khan */
901d25b84eSImran Khan struct kernfs_global_locks {
911d25b84eSImran Khan struct mutex open_file_mutex[NR_KERNFS_LOCKS];
921d25b84eSImran Khan };
931d25b84eSImran Khan
94cf9e5a73STejun Heo enum kernfs_node_type {
95df23fc39STejun Heo KERNFS_DIR = 0x0001,
96df23fc39STejun Heo KERNFS_FILE = 0x0002,
97df23fc39STejun Heo KERNFS_LINK = 0x0004,
98cf9e5a73STejun Heo };
99cf9e5a73STejun Heo
100df23fc39STejun Heo #define KERNFS_TYPE_MASK 0x000f
101df23fc39STejun Heo #define KERNFS_FLAG_MASK ~KERNFS_TYPE_MASK
1020c47383bSDaniel Xu #define KERNFS_MAX_USER_XATTRS 128
1030c47383bSDaniel Xu #define KERNFS_USER_XATTR_SIZE_LIMIT (128 << 10)
104cf9e5a73STejun Heo
105cf9e5a73STejun Heo enum kernfs_node_flag {
106d35258efSTejun Heo KERNFS_ACTIVATED = 0x0010,
107df23fc39STejun Heo KERNFS_NS = 0x0020,
108df23fc39STejun Heo KERNFS_HAS_SEQ_SHOW = 0x0040,
109df23fc39STejun Heo KERNFS_HAS_MMAP = 0x0080,
110df23fc39STejun Heo KERNFS_LOCKDEP = 0x0100,
111783bd07dSTejun Heo KERNFS_HIDDEN = 0x0200,
1126b0afc2aSTejun Heo KERNFS_SUICIDAL = 0x0400,
1136b0afc2aSTejun Heo KERNFS_SUICIDED = 0x0800,
114ea015218SEric W. Biederman KERNFS_EMPTY_DIR = 0x1000,
1150e67db2fSTejun Heo KERNFS_HAS_RELEASE = 0x2000,
116c2549174STejun Heo KERNFS_REMOVING = 0x4000,
117cf9e5a73STejun Heo };
118cf9e5a73STejun Heo
119d35258efSTejun Heo /* @flags for kernfs_create_root() */
120d35258efSTejun Heo enum kernfs_root_flag {
121555724a8STejun Heo /*
122555724a8STejun Heo * kernfs_nodes are created in the deactivated state and invisible.
123555724a8STejun Heo * They require explicit kernfs_activate() to become visible. This
124555724a8STejun Heo * can be used to make related nodes become visible atomically
125555724a8STejun Heo * after all nodes are created successfully.
126555724a8STejun Heo */
127d35258efSTejun Heo KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
128555724a8STejun Heo
129555724a8STejun Heo /*
1300d1a393dSChristina Quast * For regular files, if the opener has CAP_DAC_OVERRIDE, open(2)
131555724a8STejun Heo * succeeds regardless of the RW permissions. sysfs had an extra
132555724a8STejun Heo * layer of enforcement where open(2) fails with -EACCES regardless
133555724a8STejun Heo * of CAP_DAC_OVERRIDE if the permission doesn't have the
134555724a8STejun Heo * respective read or write access at all (none of S_IRUGO or
135555724a8STejun Heo * S_IWUGO) or the respective operation isn't implemented. The
136555724a8STejun Heo * following flag enables that behavior.
137555724a8STejun Heo */
138555724a8STejun Heo KERNFS_ROOT_EXTRA_OPEN_PERM_CHECK = 0x0002,
139aa818825SShaohua Li
140aa818825SShaohua Li /*
141aa818825SShaohua Li * The filesystem supports exportfs operation, so userspace can use
142aa818825SShaohua Li * fhandle to access nodes of the fs.
143aa818825SShaohua Li */
144aa818825SShaohua Li KERNFS_ROOT_SUPPORT_EXPORTOP = 0x0004,
1450c47383bSDaniel Xu
1460c47383bSDaniel Xu /*
1470c47383bSDaniel Xu * Support user xattrs to be written to nodes rooted at this root.
1480c47383bSDaniel Xu */
1490c47383bSDaniel Xu KERNFS_ROOT_SUPPORT_USER_XATTR = 0x0008,
15063348894SSebastian Andrzej Siewior
15163348894SSebastian Andrzej Siewior /*
15263348894SSebastian Andrzej Siewior * Renames must not change the parent node.
15363348894SSebastian Andrzej Siewior */
15463348894SSebastian Andrzej Siewior KERNFS_ROOT_INVARIANT_PARENT = 0x0010,
155d35258efSTejun Heo };
156d35258efSTejun Heo
157324a56e1STejun Heo /* type-specific structures for kernfs_node union members */
158324a56e1STejun Heo struct kernfs_elem_dir {
159cf9e5a73STejun Heo unsigned long subdirs;
160adc5e8b5STejun Heo /* children rbtree starts here and goes through kn->rb */
161cf9e5a73STejun Heo struct rb_root children;
162cf9e5a73STejun Heo
163cf9e5a73STejun Heo /*
164cf9e5a73STejun Heo * The kernfs hierarchy this directory belongs to. This fits
165324a56e1STejun Heo * better directly in kernfs_node but is here to save space.
166cf9e5a73STejun Heo */
167cf9e5a73STejun Heo struct kernfs_root *root;
168895adbecSIan Kent /*
169895adbecSIan Kent * Monotonic revision counter, used to identify if a directory
170895adbecSIan Kent * node has changed during negative dentry revalidation.
171895adbecSIan Kent */
172895adbecSIan Kent unsigned long rev;
173cf9e5a73STejun Heo };
174cf9e5a73STejun Heo
175324a56e1STejun Heo struct kernfs_elem_symlink {
176324a56e1STejun Heo struct kernfs_node *target_kn;
177cf9e5a73STejun Heo };
178cf9e5a73STejun Heo
179324a56e1STejun Heo struct kernfs_elem_attr {
180cf9e5a73STejun Heo const struct kernfs_ops *ops;
181086c00c7SImran Khan struct kernfs_open_node __rcu *open;
182cf9e5a73STejun Heo loff_t size;
1832fd26970SImran Khan struct kernfs_node *notify_next; /* for kernfs_notify() */
184cf9e5a73STejun Heo };
185cf9e5a73STejun Heo
186cf9e5a73STejun Heo /*
187324a56e1STejun Heo * kernfs_node - the building block of kernfs hierarchy. Each and every
188324a56e1STejun Heo * kernfs node is represented by single kernfs_node. Most fields are
189cf9e5a73STejun Heo * private to kernfs and shouldn't be accessed directly by kernfs users.
190cf9e5a73STejun Heo *
19121774fd8SWillem de Bruijn * As long as count reference is held, the kernfs_node itself is
192324a56e1STejun Heo * accessible. Dereferencing elem or any other outer entity requires
193324a56e1STejun Heo * active reference.
194cf9e5a73STejun Heo */
195324a56e1STejun Heo struct kernfs_node {
196adc5e8b5STejun Heo atomic_t count;
197adc5e8b5STejun Heo atomic_t active;
198cf9e5a73STejun Heo #ifdef CONFIG_DEBUG_LOCK_ALLOC
199cf9e5a73STejun Heo struct lockdep_map dep_map;
200cf9e5a73STejun Heo #endif
2013eef34adSTejun Heo /*
2023eef34adSTejun Heo * Use kernfs_get_parent() and kernfs_name/path() instead of
2033eef34adSTejun Heo * accessing the following two fields directly. If the node is
2043eef34adSTejun Heo * never moved to a different parent, it is safe to access the
2053eef34adSTejun Heo * parent directly.
2063eef34adSTejun Heo */
20763348894SSebastian Andrzej Siewior struct kernfs_node __rcu *__parent;
208*741c10b0SSebastian Andrzej Siewior const char __rcu *name;
209cf9e5a73STejun Heo
210adc5e8b5STejun Heo struct rb_node rb;
211cf9e5a73STejun Heo
212adc5e8b5STejun Heo const void *ns; /* namespace tag */
2139b0925a6SGreg Kroah-Hartman unsigned int hash; /* ns + name hash */
2141c9f2c76STejun Heo unsigned short flags;
2151c9f2c76STejun Heo umode_t mode;
2161c9f2c76STejun Heo
217cf9e5a73STejun Heo union {
218adc5e8b5STejun Heo struct kernfs_elem_dir dir;
219adc5e8b5STejun Heo struct kernfs_elem_symlink symlink;
220adc5e8b5STejun Heo struct kernfs_elem_attr attr;
221cf9e5a73STejun Heo };
222cf9e5a73STejun Heo
22367c0496eSTejun Heo /*
22440430452STejun Heo * 64bit unique ID. On 64bit ino setups, id is the ino. On 32bit,
22540430452STejun Heo * the low 32bits are ino and upper generation.
22667c0496eSTejun Heo */
22767c0496eSTejun Heo u64 id;
22867c0496eSTejun Heo
2291c9f2c76STejun Heo void *priv;
230c525aaddSTejun Heo struct kernfs_iattrs *iattr;
2314207b556STejun Heo
2324207b556STejun Heo struct rcu_head rcu;
233cf9e5a73STejun Heo };
234b8441ed2STejun Heo
23580b9bbefSTejun Heo /*
23690c07c89STejun Heo * kernfs_syscall_ops may be specified on kernfs_create_root() to support
23790c07c89STejun Heo * syscalls. These optional callbacks are invoked on the matching syscalls
23890c07c89STejun Heo * and can perform any kernfs operations which don't necessarily have to be
23990c07c89STejun Heo * the exact operation requested. An active reference is held for each
24090c07c89STejun Heo * kernfs_node parameter.
24180b9bbefSTejun Heo */
24290c07c89STejun Heo struct kernfs_syscall_ops {
2436a7fed4eSTejun Heo int (*show_options)(struct seq_file *sf, struct kernfs_root *root);
2446a7fed4eSTejun Heo
24580b9bbefSTejun Heo int (*mkdir)(struct kernfs_node *parent, const char *name,
24680b9bbefSTejun Heo umode_t mode);
24780b9bbefSTejun Heo int (*rmdir)(struct kernfs_node *kn);
24880b9bbefSTejun Heo int (*rename)(struct kernfs_node *kn, struct kernfs_node *new_parent,
24980b9bbefSTejun Heo const char *new_name);
2504f41fc59SSerge E. Hallyn int (*show_path)(struct seq_file *sf, struct kernfs_node *kn,
2514f41fc59SSerge E. Hallyn struct kernfs_root *root);
25280b9bbefSTejun Heo };
25380b9bbefSTejun Heo
254f2eb478fSGreg Kroah-Hartman struct kernfs_node *kernfs_root_to_node(struct kernfs_root *root);
255ba7443bcSTejun Heo
256c525aaddSTejun Heo struct kernfs_open_file {
257dd8a5b03STejun Heo /* published fields */
258324a56e1STejun Heo struct kernfs_node *kn;
259dd8a5b03STejun Heo struct file *file;
2600e67db2fSTejun Heo struct seq_file *seq_file;
2612536390dSTejun Heo void *priv;
262dd8a5b03STejun Heo
263dd8a5b03STejun Heo /* private fields, do not use outside kernfs proper */
264dd8a5b03STejun Heo struct mutex mutex;
265e4234a1fSChris Wilson struct mutex prealloc_mutex;
266dd8a5b03STejun Heo int event;
267dd8a5b03STejun Heo struct list_head list;
2682b75869bSNeilBrown char *prealloc_buf;
269dd8a5b03STejun Heo
270b7ce40cfSTejun Heo size_t atomic_write_len;
271a1d82affSTejun Heo bool mmapped:1;
2720e67db2fSTejun Heo bool released:1;
273dd8a5b03STejun Heo const struct vm_operations_struct *vm_ops;
274dd8a5b03STejun Heo };
275dd8a5b03STejun Heo
276f6acf8bbSTejun Heo struct kernfs_ops {
277f6acf8bbSTejun Heo /*
2780e67db2fSTejun Heo * Optional open/release methods. Both are called with
2790e67db2fSTejun Heo * @of->seq_file populated.
2800e67db2fSTejun Heo */
2810e67db2fSTejun Heo int (*open)(struct kernfs_open_file *of);
2820e67db2fSTejun Heo void (*release)(struct kernfs_open_file *of);
2830e67db2fSTejun Heo
2840e67db2fSTejun Heo /*
285f6acf8bbSTejun Heo * Read is handled by either seq_file or raw_read().
286f6acf8bbSTejun Heo *
287d19b9846STejun Heo * If seq_show() is present, seq_file path is active. Other seq
288d19b9846STejun Heo * operations are optional and if not implemented, the behavior is
289d19b9846STejun Heo * equivalent to single_open(). @sf->private points to the
290c525aaddSTejun Heo * associated kernfs_open_file.
291f6acf8bbSTejun Heo *
292f6acf8bbSTejun Heo * read() is bounced through kernel buffer and a read larger than
293f6acf8bbSTejun Heo * PAGE_SIZE results in partial operation of PAGE_SIZE.
294f6acf8bbSTejun Heo */
295f6acf8bbSTejun Heo int (*seq_show)(struct seq_file *sf, void *v);
296f6acf8bbSTejun Heo
297d19b9846STejun Heo void *(*seq_start)(struct seq_file *sf, loff_t *ppos);
298d19b9846STejun Heo void *(*seq_next)(struct seq_file *sf, void *v, loff_t *ppos);
299d19b9846STejun Heo void (*seq_stop)(struct seq_file *sf, void *v);
300d19b9846STejun Heo
301c525aaddSTejun Heo ssize_t (*read)(struct kernfs_open_file *of, char *buf, size_t bytes,
302f6acf8bbSTejun Heo loff_t off);
303f6acf8bbSTejun Heo
304f6acf8bbSTejun Heo /*
3054d3773c4STejun Heo * write() is bounced through kernel buffer. If atomic_write_len
3064d3773c4STejun Heo * is not set, a write larger than PAGE_SIZE results in partial
3074d3773c4STejun Heo * operations of PAGE_SIZE chunks. If atomic_write_len is set,
3084d3773c4STejun Heo * writes upto the specified size are executed atomically but
3094d3773c4STejun Heo * larger ones are rejected with -E2BIG.
310f6acf8bbSTejun Heo */
3114d3773c4STejun Heo size_t atomic_write_len;
3122b75869bSNeilBrown /*
3132b75869bSNeilBrown * "prealloc" causes a buffer to be allocated at open for
3142b75869bSNeilBrown * all read/write requests. As ->seq_show uses seq_read()
3152b75869bSNeilBrown * which does its own allocation, it is incompatible with
3162b75869bSNeilBrown * ->prealloc. Provide ->read and ->write with ->prealloc.
3172b75869bSNeilBrown */
3182b75869bSNeilBrown bool prealloc;
319c525aaddSTejun Heo ssize_t (*write)(struct kernfs_open_file *of, char *buf, size_t bytes,
320f6acf8bbSTejun Heo loff_t off);
321f6acf8bbSTejun Heo
322147e1a97SJohannes Weiner __poll_t (*poll)(struct kernfs_open_file *of,
323147e1a97SJohannes Weiner struct poll_table_struct *pt);
324147e1a97SJohannes Weiner
325c525aaddSTejun Heo int (*mmap)(struct kernfs_open_file *of, struct vm_area_struct *vma);
3260fedefd4SValentine Sinitsyn loff_t (*llseek)(struct kernfs_open_file *of, loff_t offset, int whence);
327f6acf8bbSTejun Heo };
328f6acf8bbSTejun Heo
32923bf1b6bSDavid Howells /*
33023bf1b6bSDavid Howells * The kernfs superblock creation/mount parameter context.
33123bf1b6bSDavid Howells */
33223bf1b6bSDavid Howells struct kernfs_fs_context {
33323bf1b6bSDavid Howells struct kernfs_root *root; /* Root of the hierarchy being mounted */
33423bf1b6bSDavid Howells void *ns_tag; /* Namespace tag of the mount (or NULL) */
33523bf1b6bSDavid Howells unsigned long magic; /* File system specific magic number */
33623bf1b6bSDavid Howells
33723bf1b6bSDavid Howells /* The following are set/used by kernfs_mount() */
33823bf1b6bSDavid Howells bool new_sb_created; /* Set to T if we allocated a new sb */
33923bf1b6bSDavid Howells };
34023bf1b6bSDavid Howells
341ba341d55STejun Heo #ifdef CONFIG_KERNFS
342879f40d1STejun Heo
kernfs_type(struct kernfs_node * kn)343df23fc39STejun Heo static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
344cf9e5a73STejun Heo {
345df23fc39STejun Heo return kn->flags & KERNFS_TYPE_MASK;
346cf9e5a73STejun Heo }
347cf9e5a73STejun Heo
kernfs_id_ino(u64 id)34867c0496eSTejun Heo static inline ino_t kernfs_id_ino(u64 id)
34967c0496eSTejun Heo {
35040430452STejun Heo /* id is ino if ino_t is 64bit; otherwise, low 32bits */
35140430452STejun Heo if (sizeof(ino_t) >= sizeof(u64))
35240430452STejun Heo return id;
35340430452STejun Heo else
35467c0496eSTejun Heo return (u32)id;
35567c0496eSTejun Heo }
35667c0496eSTejun Heo
kernfs_id_gen(u64 id)35767c0496eSTejun Heo static inline u32 kernfs_id_gen(u64 id)
35867c0496eSTejun Heo {
35940430452STejun Heo /* gen is fixed at 1 if ino_t is 64bit; otherwise, high 32bits */
36040430452STejun Heo if (sizeof(ino_t) >= sizeof(u64))
36140430452STejun Heo return 1;
36240430452STejun Heo else
36367c0496eSTejun Heo return id >> 32;
36467c0496eSTejun Heo }
36567c0496eSTejun Heo
kernfs_ino(struct kernfs_node * kn)36667c0496eSTejun Heo static inline ino_t kernfs_ino(struct kernfs_node *kn)
36767c0496eSTejun Heo {
36867c0496eSTejun Heo return kernfs_id_ino(kn->id);
36967c0496eSTejun Heo }
37067c0496eSTejun Heo
kernfs_gen(struct kernfs_node * kn)37167c0496eSTejun Heo static inline ino_t kernfs_gen(struct kernfs_node *kn)
37267c0496eSTejun Heo {
37367c0496eSTejun Heo return kernfs_id_gen(kn->id);
37467c0496eSTejun Heo }
37567c0496eSTejun Heo
376cf9e5a73STejun Heo /**
377cf9e5a73STejun Heo * kernfs_enable_ns - enable namespace under a directory
378324a56e1STejun Heo * @kn: directory of interest, should be empty
379cf9e5a73STejun Heo *
380324a56e1STejun Heo * This is to be called right after @kn is created to enable namespace
381324a56e1STejun Heo * under it. All children of @kn must have non-NULL namespace tags and
382cf9e5a73STejun Heo * only the ones which match the super_block's tag will be visible.
383cf9e5a73STejun Heo */
kernfs_enable_ns(struct kernfs_node * kn)384324a56e1STejun Heo static inline void kernfs_enable_ns(struct kernfs_node *kn)
385cf9e5a73STejun Heo {
386df23fc39STejun Heo WARN_ON_ONCE(kernfs_type(kn) != KERNFS_DIR);
387adc5e8b5STejun Heo WARN_ON_ONCE(!RB_EMPTY_ROOT(&kn->dir.children));
388df23fc39STejun Heo kn->flags |= KERNFS_NS;
389cf9e5a73STejun Heo }
390cf9e5a73STejun Heo
391ac9bba03STejun Heo /**
392ac9bba03STejun Heo * kernfs_ns_enabled - test whether namespace is enabled
393324a56e1STejun Heo * @kn: the node to test
394ac9bba03STejun Heo *
395ac9bba03STejun Heo * Test whether namespace filtering is enabled for the children of @ns.
396ac9bba03STejun Heo */
kernfs_ns_enabled(struct kernfs_node * kn)397324a56e1STejun Heo static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
398ac9bba03STejun Heo {
399df23fc39STejun Heo return kn->flags & KERNFS_NS;
400ac9bba03STejun Heo }
401ac9bba03STejun Heo
4023eef34adSTejun Heo int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen);
403*741c10b0SSebastian Andrzej Siewior int kernfs_path_from_node(struct kernfs_node *kn_to, struct kernfs_node *kn_from,
4049f6df573SAditya Kali char *buf, size_t buflen);
4053eef34adSTejun Heo void pr_cont_kernfs_name(struct kernfs_node *kn);
4063eef34adSTejun Heo void pr_cont_kernfs_path(struct kernfs_node *kn);
4073eef34adSTejun Heo struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn);
408324a56e1STejun Heo struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
409ccf73cf3STejun Heo const char *name, const void *ns);
410bd96f76aSTejun Heo struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
411bd96f76aSTejun Heo const char *path, const void *ns);
412324a56e1STejun Heo void kernfs_get(struct kernfs_node *kn);
413324a56e1STejun Heo void kernfs_put(struct kernfs_node *kn);
414ccf73cf3STejun Heo
4150c23b225STejun Heo struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry);
4160c23b225STejun Heo struct kernfs_root *kernfs_root_from_sb(struct super_block *sb);
417fb02915fSTejun Heo struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn);
4180c23b225STejun Heo
419fb3c8315SAditya Kali struct dentry *kernfs_node_dentry(struct kernfs_node *kn,
420fb3c8315SAditya Kali struct super_block *sb);
42190c07c89STejun Heo struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
422d35258efSTejun Heo unsigned int flags, void *priv);
423ba7443bcSTejun Heo void kernfs_destroy_root(struct kernfs_root *root);
42463348894SSebastian Andrzej Siewior unsigned int kernfs_root_flags(struct kernfs_node *kn);
425ba7443bcSTejun Heo
426324a56e1STejun Heo struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
427bb8b9d09STejun Heo const char *name, umode_t mode,
428488dee96SDmitry Torokhov kuid_t uid, kgid_t gid,
429bb8b9d09STejun Heo void *priv, const void *ns);
430ea015218SEric W. Biederman struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
431ea015218SEric W. Biederman const char *name);
4322063d608STejun Heo struct kernfs_node *__kernfs_create_file(struct kernfs_node *parent,
433488dee96SDmitry Torokhov const char *name, umode_t mode,
434488dee96SDmitry Torokhov kuid_t uid, kgid_t gid,
435488dee96SDmitry Torokhov loff_t size,
436496f7394STejun Heo const struct kernfs_ops *ops,
437517e64f5STejun Heo void *priv, const void *ns,
438517e64f5STejun Heo struct lock_class_key *key);
439324a56e1STejun Heo struct kernfs_node *kernfs_create_link(struct kernfs_node *parent,
4405d0e26bbSTejun Heo const char *name,
441324a56e1STejun Heo struct kernfs_node *target);
442d35258efSTejun Heo void kernfs_activate(struct kernfs_node *kn);
443783bd07dSTejun Heo void kernfs_show(struct kernfs_node *kn, bool show);
444324a56e1STejun Heo void kernfs_remove(struct kernfs_node *kn);
4456b0afc2aSTejun Heo void kernfs_break_active_protection(struct kernfs_node *kn);
4466b0afc2aSTejun Heo void kernfs_unbreak_active_protection(struct kernfs_node *kn);
4476b0afc2aSTejun Heo bool kernfs_remove_self(struct kernfs_node *kn);
448324a56e1STejun Heo int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
449879f40d1STejun Heo const void *ns);
450324a56e1STejun Heo int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
451890ece16STejun Heo const char *new_name, const void *new_ns);
452324a56e1STejun Heo int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr);
453147e1a97SJohannes Weiner __poll_t kernfs_generic_poll(struct kernfs_open_file *of,
454147e1a97SJohannes Weiner struct poll_table_struct *pt);
455324a56e1STejun Heo void kernfs_notify(struct kernfs_node *kn);
456879f40d1STejun Heo
4571537ad15SOndrej Mosnacek int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
458b230d5abSOndrej Mosnacek void *value, size_t size);
4591537ad15SOndrej Mosnacek int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
4601537ad15SOndrej Mosnacek const void *value, size_t size, int flags);
461b230d5abSOndrej Mosnacek
4624b93dc9bSTejun Heo const void *kernfs_super_ns(struct super_block *sb);
46323bf1b6bSDavid Howells int kernfs_get_tree(struct fs_context *fc);
46423bf1b6bSDavid Howells void kernfs_free_fs_context(struct fs_context *fc);
4654b93dc9bSTejun Heo void kernfs_kill_sb(struct super_block *sb);
4664b93dc9bSTejun Heo
4674b93dc9bSTejun Heo void kernfs_init(void);
4684b93dc9bSTejun Heo
469fe0f726cSTejun Heo struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
470fe0f726cSTejun Heo u64 id);
471ba341d55STejun Heo #else /* CONFIG_KERNFS */
472879f40d1STejun Heo
kernfs_type(struct kernfs_node * kn)473df23fc39STejun Heo static inline enum kernfs_node_type kernfs_type(struct kernfs_node *kn)
474cf9e5a73STejun Heo { return 0; } /* whatever */
475cf9e5a73STejun Heo
kernfs_enable_ns(struct kernfs_node * kn)476324a56e1STejun Heo static inline void kernfs_enable_ns(struct kernfs_node *kn) { }
477cf9e5a73STejun Heo
kernfs_ns_enabled(struct kernfs_node * kn)478324a56e1STejun Heo static inline bool kernfs_ns_enabled(struct kernfs_node *kn)
479ac9bba03STejun Heo { return false; }
480ac9bba03STejun Heo
kernfs_name(struct kernfs_node * kn,char * buf,size_t buflen)4813eef34adSTejun Heo static inline int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
4823eef34adSTejun Heo { return -ENOSYS; }
4833eef34adSTejun Heo
kernfs_path_from_node(struct kernfs_node * root_kn,struct kernfs_node * kn,char * buf,size_t buflen)4840e0b2afdSTejun Heo static inline int kernfs_path_from_node(struct kernfs_node *root_kn,
4850e0b2afdSTejun Heo struct kernfs_node *kn,
4860e0b2afdSTejun Heo char *buf, size_t buflen)
4870e0b2afdSTejun Heo { return -ENOSYS; }
4880e0b2afdSTejun Heo
pr_cont_kernfs_name(struct kernfs_node * kn)4893eef34adSTejun Heo static inline void pr_cont_kernfs_name(struct kernfs_node *kn) { }
pr_cont_kernfs_path(struct kernfs_node * kn)4903eef34adSTejun Heo static inline void pr_cont_kernfs_path(struct kernfs_node *kn) { }
4913eef34adSTejun Heo
kernfs_get_parent(struct kernfs_node * kn)4923eef34adSTejun Heo static inline struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
4933eef34adSTejun Heo { return NULL; }
4943eef34adSTejun Heo
495324a56e1STejun Heo static inline struct kernfs_node *
kernfs_find_and_get_ns(struct kernfs_node * parent,const char * name,const void * ns)496324a56e1STejun Heo kernfs_find_and_get_ns(struct kernfs_node *parent, const char *name,
497ccf73cf3STejun Heo const void *ns)
498ccf73cf3STejun Heo { return NULL; }
499bd96f76aSTejun Heo static inline struct kernfs_node *
kernfs_walk_and_get_ns(struct kernfs_node * parent,const char * path,const void * ns)500bd96f76aSTejun Heo kernfs_walk_and_get_ns(struct kernfs_node *parent, const char *path,
501bd96f76aSTejun Heo const void *ns)
502bd96f76aSTejun Heo { return NULL; }
503ccf73cf3STejun Heo
kernfs_get(struct kernfs_node * kn)504324a56e1STejun Heo static inline void kernfs_get(struct kernfs_node *kn) { }
kernfs_put(struct kernfs_node * kn)505324a56e1STejun Heo static inline void kernfs_put(struct kernfs_node *kn) { }
506ccf73cf3STejun Heo
kernfs_node_from_dentry(struct dentry * dentry)5070c23b225STejun Heo static inline struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
5080c23b225STejun Heo { return NULL; }
5090c23b225STejun Heo
kernfs_root_from_sb(struct super_block * sb)5100c23b225STejun Heo static inline struct kernfs_root *kernfs_root_from_sb(struct super_block *sb)
5110c23b225STejun Heo { return NULL; }
5120c23b225STejun Heo
513fb02915fSTejun Heo static inline struct inode *
kernfs_get_inode(struct super_block * sb,struct kernfs_node * kn)514fb02915fSTejun Heo kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn)
515fb02915fSTejun Heo { return NULL; }
516fb02915fSTejun Heo
51780b9bbefSTejun Heo static inline struct kernfs_root *
kernfs_create_root(struct kernfs_syscall_ops * scops,unsigned int flags,void * priv)518d35258efSTejun Heo kernfs_create_root(struct kernfs_syscall_ops *scops, unsigned int flags,
519d35258efSTejun Heo void *priv)
520ba7443bcSTejun Heo { return ERR_PTR(-ENOSYS); }
521ba7443bcSTejun Heo
kernfs_destroy_root(struct kernfs_root * root)522ba7443bcSTejun Heo static inline void kernfs_destroy_root(struct kernfs_root *root) { }
kernfs_root_flags(struct kernfs_node * kn)52363348894SSebastian Andrzej Siewior static inline unsigned int kernfs_root_flags(struct kernfs_node *kn)
52463348894SSebastian Andrzej Siewior { return 0; }
525ba7443bcSTejun Heo
526324a56e1STejun Heo static inline struct kernfs_node *
kernfs_create_dir_ns(struct kernfs_node * parent,const char * name,umode_t mode,kuid_t uid,kgid_t gid,void * priv,const void * ns)527bb8b9d09STejun Heo kernfs_create_dir_ns(struct kernfs_node *parent, const char *name,
528488dee96SDmitry Torokhov umode_t mode, kuid_t uid, kgid_t gid,
529488dee96SDmitry Torokhov void *priv, const void *ns)
53093b2b8e4STejun Heo { return ERR_PTR(-ENOSYS); }
53193b2b8e4STejun Heo
532324a56e1STejun Heo static inline struct kernfs_node *
__kernfs_create_file(struct kernfs_node * parent,const char * name,umode_t mode,kuid_t uid,kgid_t gid,loff_t size,const struct kernfs_ops * ops,void * priv,const void * ns,struct lock_class_key * key)5332063d608STejun Heo __kernfs_create_file(struct kernfs_node *parent, const char *name,
534488dee96SDmitry Torokhov umode_t mode, kuid_t uid, kgid_t gid,
535488dee96SDmitry Torokhov loff_t size, const struct kernfs_ops *ops,
536dfeb0750STejun Heo void *priv, const void *ns, struct lock_class_key *key)
537496f7394STejun Heo { return ERR_PTR(-ENOSYS); }
538496f7394STejun Heo
539324a56e1STejun Heo static inline struct kernfs_node *
kernfs_create_link(struct kernfs_node * parent,const char * name,struct kernfs_node * target)540324a56e1STejun Heo kernfs_create_link(struct kernfs_node *parent, const char *name,
541324a56e1STejun Heo struct kernfs_node *target)
5425d0e26bbSTejun Heo { return ERR_PTR(-ENOSYS); }
5435d0e26bbSTejun Heo
kernfs_activate(struct kernfs_node * kn)544d35258efSTejun Heo static inline void kernfs_activate(struct kernfs_node *kn) { }
545d35258efSTejun Heo
kernfs_remove(struct kernfs_node * kn)546324a56e1STejun Heo static inline void kernfs_remove(struct kernfs_node *kn) { }
547879f40d1STejun Heo
kernfs_remove_self(struct kernfs_node * kn)5486b0afc2aSTejun Heo static inline bool kernfs_remove_self(struct kernfs_node *kn)
5496b0afc2aSTejun Heo { return false; }
5506b0afc2aSTejun Heo
kernfs_remove_by_name_ns(struct kernfs_node * kn,const char * name,const void * ns)551324a56e1STejun Heo static inline int kernfs_remove_by_name_ns(struct kernfs_node *kn,
552879f40d1STejun Heo const char *name, const void *ns)
553879f40d1STejun Heo { return -ENOSYS; }
554879f40d1STejun Heo
kernfs_rename_ns(struct kernfs_node * kn,struct kernfs_node * new_parent,const char * new_name,const void * new_ns)555324a56e1STejun Heo static inline int kernfs_rename_ns(struct kernfs_node *kn,
556324a56e1STejun Heo struct kernfs_node *new_parent,
557890ece16STejun Heo const char *new_name, const void *new_ns)
558890ece16STejun Heo { return -ENOSYS; }
559890ece16STejun Heo
kernfs_setattr(struct kernfs_node * kn,const struct iattr * iattr)560324a56e1STejun Heo static inline int kernfs_setattr(struct kernfs_node *kn,
5615d60418eSTejun Heo const struct iattr *iattr)
5625d60418eSTejun Heo { return -ENOSYS; }
5635d60418eSTejun Heo
kernfs_generic_poll(struct kernfs_open_file * of,struct poll_table_struct * pt)56479038a99SArnd Bergmann static inline __poll_t kernfs_generic_poll(struct kernfs_open_file *of,
56579038a99SArnd Bergmann struct poll_table_struct *pt)
56679038a99SArnd Bergmann { return -ENOSYS; }
56779038a99SArnd Bergmann
kernfs_notify(struct kernfs_node * kn)568324a56e1STejun Heo static inline void kernfs_notify(struct kernfs_node *kn) { }
569024f6471STejun Heo
kernfs_xattr_get(struct kernfs_node * kn,const char * name,void * value,size_t size)5701537ad15SOndrej Mosnacek static inline int kernfs_xattr_get(struct kernfs_node *kn, const char *name,
5711537ad15SOndrej Mosnacek void *value, size_t size)
572b230d5abSOndrej Mosnacek { return -ENOSYS; }
573b230d5abSOndrej Mosnacek
kernfs_xattr_set(struct kernfs_node * kn,const char * name,const void * value,size_t size,int flags)5741537ad15SOndrej Mosnacek static inline int kernfs_xattr_set(struct kernfs_node *kn, const char *name,
5751537ad15SOndrej Mosnacek const void *value, size_t size, int flags)
576b230d5abSOndrej Mosnacek { return -ENOSYS; }
577b230d5abSOndrej Mosnacek
kernfs_super_ns(struct super_block * sb)5784b93dc9bSTejun Heo static inline const void *kernfs_super_ns(struct super_block *sb)
5794b93dc9bSTejun Heo { return NULL; }
5804b93dc9bSTejun Heo
kernfs_get_tree(struct fs_context * fc)58123bf1b6bSDavid Howells static inline int kernfs_get_tree(struct fs_context *fc)
58223bf1b6bSDavid Howells { return -ENOSYS; }
58323bf1b6bSDavid Howells
kernfs_free_fs_context(struct fs_context * fc)58423bf1b6bSDavid Howells static inline void kernfs_free_fs_context(struct fs_context *fc) { }
5854b93dc9bSTejun Heo
kernfs_kill_sb(struct super_block * sb)5864b93dc9bSTejun Heo static inline void kernfs_kill_sb(struct super_block *sb) { }
5874b93dc9bSTejun Heo
kernfs_init(void)5884b93dc9bSTejun Heo static inline void kernfs_init(void) { }
5894b93dc9bSTejun Heo
590ba341d55STejun Heo #endif /* CONFIG_KERNFS */
591879f40d1STejun Heo
5923abb1d90STejun Heo /**
5933abb1d90STejun Heo * kernfs_path - build full path of a given node
5943abb1d90STejun Heo * @kn: kernfs_node of interest
5953abb1d90STejun Heo * @buf: buffer to copy @kn's name into
5963abb1d90STejun Heo * @buflen: size of @buf
5973abb1d90STejun Heo *
5988f5be0ecSKonstantin Khlebnikov * If @kn is NULL result will be "(null)".
5998f5be0ecSKonstantin Khlebnikov *
6008f5be0ecSKonstantin Khlebnikov * Returns the length of the full path. If the full length is equal to or
6018f5be0ecSKonstantin Khlebnikov * greater than @buflen, @buf contains the truncated path with the trailing
6028f5be0ecSKonstantin Khlebnikov * '\0'. On error, -errno is returned.
6033abb1d90STejun Heo */
kernfs_path(struct kernfs_node * kn,char * buf,size_t buflen)6043abb1d90STejun Heo static inline int kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
6053abb1d90STejun Heo {
6063abb1d90STejun Heo return kernfs_path_from_node(kn, NULL, buf, buflen);
6073abb1d90STejun Heo }
6083abb1d90STejun Heo
609324a56e1STejun Heo static inline struct kernfs_node *
kernfs_find_and_get(struct kernfs_node * kn,const char * name)610324a56e1STejun Heo kernfs_find_and_get(struct kernfs_node *kn, const char *name)
611ccf73cf3STejun Heo {
612324a56e1STejun Heo return kernfs_find_and_get_ns(kn, name, NULL);
613ccf73cf3STejun Heo }
614ccf73cf3STejun Heo
615324a56e1STejun Heo static inline struct kernfs_node *
kernfs_walk_and_get(struct kernfs_node * kn,const char * path)616bd96f76aSTejun Heo kernfs_walk_and_get(struct kernfs_node *kn, const char *path)
617bd96f76aSTejun Heo {
618bd96f76aSTejun Heo return kernfs_walk_and_get_ns(kn, path, NULL);
619bd96f76aSTejun Heo }
620bd96f76aSTejun Heo
621bd96f76aSTejun Heo static inline struct kernfs_node *
kernfs_create_dir(struct kernfs_node * parent,const char * name,umode_t mode,void * priv)622bb8b9d09STejun Heo kernfs_create_dir(struct kernfs_node *parent, const char *name, umode_t mode,
623bb8b9d09STejun Heo void *priv)
62493b2b8e4STejun Heo {
625488dee96SDmitry Torokhov return kernfs_create_dir_ns(parent, name, mode,
626488dee96SDmitry Torokhov GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
627488dee96SDmitry Torokhov priv, NULL);
62893b2b8e4STejun Heo }
62993b2b8e4STejun Heo
kernfs_remove_by_name(struct kernfs_node * parent,const char * name)630324a56e1STejun Heo static inline int kernfs_remove_by_name(struct kernfs_node *parent,
631879f40d1STejun Heo const char *name)
632879f40d1STejun Heo {
633879f40d1STejun Heo return kernfs_remove_by_name_ns(parent, name, NULL);
634879f40d1STejun Heo }
635879f40d1STejun Heo
kernfs_rename(struct kernfs_node * kn,struct kernfs_node * new_parent,const char * new_name)6360c23b225STejun Heo static inline int kernfs_rename(struct kernfs_node *kn,
6370c23b225STejun Heo struct kernfs_node *new_parent,
6380c23b225STejun Heo const char *new_name)
6390c23b225STejun Heo {
6400c23b225STejun Heo return kernfs_rename_ns(kn, new_parent, new_name, NULL);
6410c23b225STejun Heo }
6420c23b225STejun Heo
643b8441ed2STejun Heo #endif /* __LINUX_KERNFS_H */
644