]> git.ipfire.org Git - thirdparty/linux.git/blame - include/linux/fs.h
Linux 6.10-rc2
[thirdparty/linux.git] / include / linux / fs.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef _LINUX_FS_H
3#define _LINUX_FS_H
4
1da177e4 5#include <linux/linkage.h>
5dd43ce2 6#include <linux/wait_bit.h>
1da177e4
LT
7#include <linux/kdev_t.h>
8#include <linux/dcache.h>
3f8206d4 9#include <linux/path.h>
1da177e4
LT
10#include <linux/stat.h>
11#include <linux/cache.h>
1da177e4 12#include <linux/list.h>
bc3b14cb 13#include <linux/list_lru.h>
4f5e65a1 14#include <linux/llist.h>
1da177e4 15#include <linux/radix-tree.h>
b93b0163 16#include <linux/xarray.h>
6b2dbba8 17#include <linux/rbtree.h>
1da177e4 18#include <linux/init.h>
914e2637 19#include <linux/pid.h>
187f1882 20#include <linux/bug.h>
1b1dcc1b 21#include <linux/mutex.h>
c8c06efa 22#include <linux/rwsem.h>
baabda26 23#include <linux/mm_types.h>
3bd858ab 24#include <linux/capability.h>
6188e10d 25#include <linux/semaphore.h>
c75b1d94 26#include <linux/fcntl.h>
ceb5bdc2 27#include <linux/rculist_bl.h>
07b8ce1e 28#include <linux/atomic.h>
83aeeada 29#include <linux/shrinker.h>
c1aab02d 30#include <linux/migrate_mode.h>
92361636 31#include <linux/uidgid.h>
5accdf82 32#include <linux/lockdep.h>
c2b1ad80 33#include <linux/percpu-rwsem.h>
853b39a7 34#include <linux/workqueue.h>
fceef393 35#include <linux/delayed_call.h>
85787090 36#include <linux/uuid.h>
5660e13d 37#include <linux/errseq.h>
d9a08a9e 38#include <linux/ioprio.h>
bbe7449e 39#include <linux/fs_types.h>
f1fffbd4
RV
40#include <linux/build_bug.h>
41#include <linux/stddef.h>
a6435940 42#include <linux/mount.h>
e6c9a714 43#include <linux/cred.h>
a793d79e 44#include <linux/mnt_idmapping.h>
8b9f3ac5 45#include <linux/slab.h>
0e4a8621 46#include <linux/maple_tree.h>
fe3944fb 47#include <linux/rw_hint.h>
1da177e4 48
1da177e4 49#include <asm/byteorder.h>
607ca46e 50#include <uapi/linux/fs.h>
1da177e4 51
b83ae6d4 52struct backing_dev_info;
52ebea74 53struct bdi_writeback;
2f8b5444 54struct bio;
5a72e899 55struct io_comp_batch;
a5694255 56struct export_operations;
10c5db28 57struct fiemap_extent_info;
a885c8c4 58struct hd_geometry;
1da177e4 59struct iovec;
92198f7e 60struct kiocb;
57cc7215 61struct kobject;
1da177e4
LT
62struct pipe_inode_info;
63struct poll_table_struct;
64struct kstatfs;
65struct vm_area_struct;
66struct vfsmount;
745ca247 67struct cred;
a509bc1a 68struct swap_info_struct;
55985dd7 69struct seq_file;
7b7a8665 70struct workqueue_struct;
3b93f911 71struct iov_iter;
3e7807d5 72struct fscrypt_inode_info;
0b81d077 73struct fscrypt_operations;
5585f2af
EB
74struct fsverity_info;
75struct fsverity_operations;
07a3b8d0
AG
76struct fsnotify_mark_connector;
77struct fsnotify_sb_info;
f3a09c92 78struct fs_context;
d7167b14 79struct fs_parameter_spec;
4c5b4799 80struct fileattr;
6f7db389 81struct iomap_ops;
1da177e4 82
74bf17cf 83extern void __init inode_init(void);
1da177e4 84extern void __init inode_init_early(void);
4248b0da
MG
85extern void __init files_init(void);
86extern void __init files_maxfiles_init(void);
1da177e4 87
518de9b3 88extern unsigned long get_max_files(void);
9b80a184 89extern unsigned int sysctl_nr_open;
dded4f4d 90
ddef7ed2
CH
91typedef __kernel_rwf_t rwf_t;
92
1da177e4
LT
93struct buffer_head;
94typedef int (get_block_t)(struct inode *inode, sector_t iblock,
95 struct buffer_head *bh_result, int create);
187372a3 96typedef int (dio_iodone_t)(struct kiocb *iocb, loff_t offset,
7b7a8665 97 ssize_t bytes, void *private);
1da177e4 98
bbc1096a
DH
99#define MAY_EXEC 0x00000001
100#define MAY_WRITE 0x00000002
101#define MAY_READ 0x00000004
102#define MAY_APPEND 0x00000008
103#define MAY_ACCESS 0x00000010
104#define MAY_OPEN 0x00000020
105#define MAY_CHDIR 0x00000040
106/* called from RCU mode, don't block */
107#define MAY_NOT_BLOCK 0x00000080
108
109/*
110 * flags in file.f_mode. Note that FMODE_READ and FMODE_WRITE must correspond
75abe329 111 * to O_WRONLY and O_RDWR via the strange trick in do_dentry_open()
bbc1096a
DH
112 */
113
114/* file is open for reading */
0a4f544d 115#define FMODE_READ ((__force fmode_t)(1 << 0))
bbc1096a 116/* file is open for writing */
0a4f544d 117#define FMODE_WRITE ((__force fmode_t)(1 << 1))
bbc1096a 118/* file is seekable */
0a4f544d 119#define FMODE_LSEEK ((__force fmode_t)(1 << 2))
bbc1096a 120/* file can be accessed using pread */
0a4f544d 121#define FMODE_PREAD ((__force fmode_t)(1 << 3))
bbc1096a 122/* file can be accessed using pwrite */
0a4f544d 123#define FMODE_PWRITE ((__force fmode_t)(1 << 4))
bbc1096a 124/* File is opened for execution with sys_execve / sys_uselib */
0a4f544d 125#define FMODE_EXEC ((__force fmode_t)(1 << 5))
ddd65e19 126/* File writes are restricted (block device specific) */
1b0aabcc 127#define FMODE_WRITE_RESTRICTED ((__force fmode_t)(1 << 6))
0a4f544d 128
1b0aabcc 129/* FMODE_* bits 7 to 8 */
0a4f544d 130
bbc1096a 131/* 32bit hashes as llseek() offset (for directories) */
0a4f544d 132#define FMODE_32BITHASH ((__force fmode_t)(1 << 9))
bbc1096a 133/* 64bit hashes as llseek() offset (for directories) */
0a4f544d 134#define FMODE_64BITHASH ((__force fmode_t)(1 << 10))
bbc1096a
DH
135
136/*
137 * Don't update ctime and mtime.
138 *
139 * Currently a special hack for the XFS open_by_handle ioctl, but we'll
140 * hopefully graduate it to a proper O_CMTIME flag supported by open(2) soon.
141 */
0a4f544d 142#define FMODE_NOCMTIME ((__force fmode_t)(1 << 11))
bbc1096a
DH
143
144/* Expect random access pattern */
0a4f544d 145#define FMODE_RANDOM ((__force fmode_t)(1 << 12))
bbc1096a 146
bbcd53c9 147/* File is huge (eg. /dev/mem): treat loff_t as unsigned */
0a4f544d 148#define FMODE_UNSIGNED_OFFSET ((__force fmode_t)(1 << 13))
bbc1096a
DH
149
150/* File is opened with O_PATH; almost nothing can be done with it */
0a4f544d 151#define FMODE_PATH ((__force fmode_t)(1 << 14))
bbc1096a 152
2be7d348 153/* File needs atomic accesses to f_pos */
0a4f544d 154#define FMODE_ATOMIC_POS ((__force fmode_t)(1 << 15))
83f936c7 155/* Write access to underlying fs */
0a4f544d 156#define FMODE_WRITER ((__force fmode_t)(1 << 16))
7f7f25e8 157/* Has read method(s) */
0a4f544d 158#define FMODE_CAN_READ ((__force fmode_t)(1 << 17))
7f7f25e8 159/* Has write method(s) */
0a4f544d 160#define FMODE_CAN_WRITE ((__force fmode_t)(1 << 18))
9c225f26 161
0a4f544d
CB
162#define FMODE_OPENED ((__force fmode_t)(1 << 19))
163#define FMODE_CREATED ((__force fmode_t)(1 << 20))
f5d11409 164
10dce8af 165/* File is stream-like */
0a4f544d 166#define FMODE_STREAM ((__force fmode_t)(1 << 21))
10dce8af 167
a2ad63da 168/* File supports DIRECT IO */
0a4f544d 169#define FMODE_CAN_ODIRECT ((__force fmode_t)(1 << 22))
a2ad63da 170
0a4f544d 171#define FMODE_NOREUSE ((__force fmode_t)(1 << 23))
17e81022 172
0a4f544d 173/* FMODE_* bit 24 */
d8aeb44a 174
62d53c4a 175/* File is embedded in backing_file object */
0a4f544d 176#define FMODE_BACKING ((__force fmode_t)(1 << 25))
62d53c4a 177
bbc1096a 178/* File was opened by fanotify and shouldn't generate fanotify events */
0a4f544d 179#define FMODE_NONOTIFY ((__force fmode_t)(1 << 26))
bbc1096a 180
91f9943e 181/* File is capable of returning -EAGAIN if I/O will block */
0a4f544d 182#define FMODE_NOWAIT ((__force fmode_t)(1 << 27))
a07b2000
AV
183
184/* File represents mount that needs unmounting */
0a4f544d 185#define FMODE_NEED_UNMOUNT ((__force fmode_t)(1 << 28))
b745fafa 186
d3b1084d 187/* File does not contribute to nr_files count */
0a4f544d 188#define FMODE_NOACCOUNT ((__force fmode_t)(1 << 29))
80175539 189
1da177e4
LT
190/*
191 * Attribute flags. These should be or-ed together to figure out what
192 * has been changed!
193 */
9767d749
MS
194#define ATTR_MODE (1 << 0)
195#define ATTR_UID (1 << 1)
196#define ATTR_GID (1 << 2)
197#define ATTR_SIZE (1 << 3)
198#define ATTR_ATIME (1 << 4)
199#define ATTR_MTIME (1 << 5)
200#define ATTR_CTIME (1 << 6)
201#define ATTR_ATIME_SET (1 << 7)
202#define ATTR_MTIME_SET (1 << 8)
203#define ATTR_FORCE (1 << 9) /* Not a change, but a change it */
9767d749
MS
204#define ATTR_KILL_SUID (1 << 11)
205#define ATTR_KILL_SGID (1 << 12)
206#define ATTR_FILE (1 << 13)
207#define ATTR_KILL_PRIV (1 << 14)
208#define ATTR_OPEN (1 << 15) /* Truncating from open(O_TRUNC) */
209#define ATTR_TIMES_SET (1 << 16)
f2b20f6e 210#define ATTR_TOUCH (1 << 17)
1da177e4 211
787fb6bc
MS
212/*
213 * Whiteout is represented by a char device. The following constants define the
214 * mode and device number to use.
215 */
216#define WHITEOUT_MODE 0
217#define WHITEOUT_DEV 0
218
1da177e4
LT
219/*
220 * This is the Inode Attributes structure, used for notify_change(). It
221 * uses the above definitions as flags, to know which values have changed.
222 * Also, in this manner, a Filesystem can look at only the values it cares
223 * about. Basically, these are the attributes that the VFS layer can
224 * request to change from the FS layer.
225 *
226 * Derek Atkins <warlord@MIT.EDU> 94-10-20
227 */
228struct iattr {
229 unsigned int ia_valid;
230 umode_t ia_mode;
45c31150
CB
231 /*
232 * The two anonymous unions wrap structures with the same member.
233 *
234 * Filesystems raising FS_ALLOW_IDMAP need to use ia_vfs{g,u}id which
235 * are a dedicated type requiring the filesystem to use the dedicated
236 * helpers. Other filesystem can continue to use ia_{g,u}id until they
237 * have been ported.
b27c82e1
CB
238 *
239 * They always contain the same value. In other words FS_ALLOW_IDMAP
240 * pass down the same value on idmapped mounts as they would on regular
241 * mounts.
45c31150
CB
242 */
243 union {
244 kuid_t ia_uid;
245 vfsuid_t ia_vfsuid;
246 };
247 union {
248 kgid_t ia_gid;
249 vfsgid_t ia_vfsgid;
250 };
1da177e4 251 loff_t ia_size;
95582b00
DD
252 struct timespec64 ia_atime;
253 struct timespec64 ia_mtime;
254 struct timespec64 ia_ctime;
cc4e69de
MS
255
256 /*
25985edc 257 * Not an attribute, but an auxiliary info for filesystems wanting to
cc4e69de
MS
258 * implement an ftruncate() like method. NOTE: filesystem should
259 * check for (ia_valid & ATTR_FILE), and not for (ia_file != NULL).
260 */
261 struct file *ia_file;
1da177e4
LT
262};
263
1da177e4
LT
264/*
265 * Includes for diskquotas.
266 */
267#include <linux/quota.h>
268
69c433ed
MS
269/*
270 * Maximum number of layers of fs stack. Needs to be limited to
271 * prevent kernel stack overflow
272 */
273#define FILESYSTEM_MAX_STACK_DEPTH 2
274
994fc28c
ZB
275/**
276 * enum positive_aop_returns - aop return codes with specific semantics
277 *
278 * @AOP_WRITEPAGE_ACTIVATE: Informs the caller that page writeback has
279 * completed, that the page is still locked, and
280 * should be considered active. The VM uses this hint
281 * to return the page to the active list -- it won't
282 * be a candidate for writeback again in the near
283 * future. Other callers must be careful to unlock
284 * the page if they get this return. Returned by
285 * writepage();
286 *
287 * @AOP_TRUNCATED_PAGE: The AOP method that was handed a locked page has
288 * unlocked it and the page might have been truncated.
289 * The caller should back up to acquiring a new page and
290 * trying again. The aop will be taking reasonable
291 * precautions not to livelock. If the caller held a page
292 * reference, it should drop it before retrying. Returned
7e0a1265 293 * by read_folio().
994fc28c
ZB
294 *
295 * address_space_operation functions return these large constants to indicate
296 * special semantics to the caller. These are much larger than the bytes in a
297 * page to allow for functions that return the number of bytes operated on in a
298 * given page.
299 */
300
301enum positive_aop_returns {
302 AOP_WRITEPAGE_ACTIVATE = 0x80000,
303 AOP_TRUNCATED_PAGE = 0x80001,
304};
305
1da177e4
LT
306/*
307 * oh the beauties of C type declarations.
308 */
309struct page;
310struct address_space;
311struct writeback_control;
8151b4c8 312struct readahead_control;
1da177e4 313
ce71bfea
JA
314/* Match RWF_* bits to IOCB bits */
315#define IOCB_HIPRI (__force int) RWF_HIPRI
316#define IOCB_DSYNC (__force int) RWF_DSYNC
317#define IOCB_SYNC (__force int) RWF_SYNC
318#define IOCB_NOWAIT (__force int) RWF_NOWAIT
319#define IOCB_APPEND (__force int) RWF_APPEND
320
321/* non-RWF related bits - start at 16 */
322#define IOCB_EVENTFD (1 << 16)
323#define IOCB_DIRECT (1 << 17)
324#define IOCB_WRITE (1 << 18)
dd3e6d50 325/* iocb->ki_waitq is valid */
ce71bfea
JA
326#define IOCB_WAITQ (1 << 19)
327#define IOCB_NOIO (1 << 20)
6c7ef543
JA
328/* can use bio alloc cache */
329#define IOCB_ALLOC_CACHE (1 << 21)
9cf3516c
JA
330/*
331 * IOCB_DIO_CALLER_COMP can be set by the iocb owner, to indicate that the
332 * iocb completion can be passed back to the owner for execution from a safe
333 * context rather than needing to be punted through a workqueue. If this
334 * flag is set, the bio completion handling may set iocb->dio_complete to a
335 * handler function and iocb->private to context information for that handler.
336 * The issuer should call the handler with that context information from task
337 * context to complete the processing of the iocb. Note that while this
338 * provides a task context for the dio_complete() callback, it should only be
339 * used on the completion side for non-IO generating completions. It's fine to
340 * call blocking functions from this callback, but they should not wait for
341 * unrelated IO (like cache flushing, new IO generation, etc).
342 */
343#define IOCB_DIO_CALLER_COMP (1 << 22)
b820de74
BVA
344/* kiocb is a read or write operation submitted by fs/aio.c. */
345#define IOCB_AIO_RW (1 << 23)
e2e40f2c 346
f6c73a11
RHI
347/* for use in trace events */
348#define TRACE_IOCB_STRINGS \
349 { IOCB_HIPRI, "HIPRI" }, \
350 { IOCB_DSYNC, "DSYNC" }, \
351 { IOCB_SYNC, "SYNC" }, \
352 { IOCB_NOWAIT, "NOWAIT" }, \
353 { IOCB_APPEND, "APPEND" }, \
354 { IOCB_EVENTFD, "EVENTFD"}, \
355 { IOCB_DIRECT, "DIRECT" }, \
356 { IOCB_WRITE, "WRITE" }, \
357 { IOCB_WAITQ, "WAITQ" }, \
358 { IOCB_NOIO, "NOIO" }, \
9cf3516c
JA
359 { IOCB_ALLOC_CACHE, "ALLOC_CACHE" }, \
360 { IOCB_DIO_CALLER_COMP, "CALLER_COMP" }
f6c73a11 361
e2e40f2c
CH
362struct kiocb {
363 struct file *ki_filp;
364 loff_t ki_pos;
6b19b766 365 void (*ki_complete)(struct kiocb *iocb, long ret);
e2e40f2c
CH
366 void *private;
367 int ki_flags;
d9a08a9e 368 u16 ki_ioprio; /* See linux/ioprio.h */
9cf3516c
JA
369 union {
370 /*
371 * Only used for async buffered reads, where it denotes the
372 * page waitqueue associated with completing the read. Valid
373 * IFF IOCB_WAITQ is set.
374 */
375 struct wait_page_queue *ki_waitq;
376 /*
377 * Can be used for O_DIRECT IO, where the completion handling
378 * is punted back to the issuer of the IO. May only be set
379 * if IOCB_DIO_CALLER_COMP is set by the issuer, and the issuer
380 * must then check for presence of this handler when ki_complete
381 * is invoked. The data passed in to this handler must be
382 * assigned to ->private when dio_complete is assigned.
383 */
384 ssize_t (*dio_complete)(void *data);
385 };
84c4e1f8 386};
e2e40f2c
CH
387
388static inline bool is_sync_kiocb(struct kiocb *kiocb)
389{
390 return kiocb->ki_complete == NULL;
391}
392
1da177e4
LT
393struct address_space_operations {
394 int (*writepage)(struct page *page, struct writeback_control *wbc);
5efe7448 395 int (*read_folio)(struct file *, struct folio *);
1da177e4
LT
396
397 /* Write back some dirty pages from this mapping. */
398 int (*writepages)(struct address_space *, struct writeback_control *);
399
3a3bae50 400 /* Mark a folio dirty. Return true if this dirtied it */
6f31a5a2 401 bool (*dirty_folio)(struct address_space *, struct folio *);
1da177e4 402
8151b4c8 403 void (*readahead)(struct readahead_control *);
1da177e4 404
afddba49 405 int (*write_begin)(struct file *, struct address_space *mapping,
9d6b0cd7 406 loff_t pos, unsigned len,
afddba49
NP
407 struct page **pagep, void **fsdata);
408 int (*write_end)(struct file *, struct address_space *mapping,
409 loff_t pos, unsigned len, unsigned copied,
410 struct page *page, void *fsdata);
411
1da177e4
LT
412 /* Unfortunately this kludge is needed for FIBMAP. Don't use it */
413 sector_t (*bmap)(struct address_space *, sector_t);
128d1f82 414 void (*invalidate_folio) (struct folio *, size_t offset, size_t len);
fa29000b 415 bool (*release_folio)(struct folio *, gfp_t);
d2329aa0 416 void (*free_folio)(struct folio *folio);
c8b8e32d 417 ssize_t (*direct_IO)(struct kiocb *, struct iov_iter *iter);
b969c4ab 418 /*
5490da4f 419 * migrate the contents of a folio to the specified target. If
ef277c73 420 * migrate_mode is MIGRATE_ASYNC, it must not block.
b969c4ab 421 */
5490da4f
MWO
422 int (*migrate_folio)(struct address_space *, struct folio *dst,
423 struct folio *src, enum migrate_mode);
072acba6 424 int (*launder_folio)(struct folio *);
2e7e80f7
MWO
425 bool (*is_partially_uptodate) (struct folio *, size_t from,
426 size_t count);
520f301c 427 void (*is_dirty_writeback) (struct folio *, bool *dirty, bool *wb);
af7628d6 428 int (*error_remove_folio)(struct address_space *, struct folio *);
62c230bc
MG
429
430 /* swapfile support */
a509bc1a
MG
431 int (*swap_activate)(struct swap_info_struct *sis, struct file *file,
432 sector_t *span);
433 void (*swap_deactivate)(struct file *file);
e1209d3a 434 int (*swap_rw)(struct kiocb *iocb, struct iov_iter *iter);
1da177e4
LT
435};
436
7dcda1c9
JA
437extern const struct address_space_operations empty_aops;
438
eb797a8e
MW
439/**
440 * struct address_space - Contents of a cacheable, mappable object.
441 * @host: Owner, either the inode or the block_device.
442 * @i_pages: Cached pages.
730633f0
JK
443 * @invalidate_lock: Guards coherency between page cache contents and
444 * file offset->disk block mappings in the filesystem during invalidates.
445 * It is also used to block modification of page cache contents through
446 * memory mappings.
eb797a8e 447 * @gfp_mask: Memory allocation flags to use for allocating pages.
e8e17ee9 448 * @i_mmap_writable: Number of VM_SHARED, VM_MAYWRITE mappings.
09d91cda 449 * @nr_thps: Number of THPs in the pagecache (non-shmem only).
eb797a8e
MW
450 * @i_mmap: Tree of private and shared mappings.
451 * @i_mmap_rwsem: Protects @i_mmap and @i_mmap_writable.
452 * @nrpages: Number of page entries, protected by the i_pages lock.
eb797a8e
MW
453 * @writeback_index: Writeback starts here.
454 * @a_ops: Methods.
455 * @flags: Error bits and flags (AS_*).
456 * @wb_err: The most recent error which has occurred.
600f111e
MWO
457 * @i_private_lock: For use by the owner of the address_space.
458 * @i_private_list: For use by the owner of the address_space.
459 * @i_private_data: For use by the owner of the address_space.
eb797a8e 460 */
1da177e4 461struct address_space {
eb797a8e
MW
462 struct inode *host;
463 struct xarray i_pages;
730633f0 464 struct rw_semaphore invalidate_lock;
eb797a8e
MW
465 gfp_t gfp_mask;
466 atomic_t i_mmap_writable;
09d91cda
SL
467#ifdef CONFIG_READ_ONLY_THP_FOR_FS
468 /* number of thp, only for non-shmem files */
469 atomic_t nr_thps;
470#endif
eb797a8e 471 struct rb_root_cached i_mmap;
eb797a8e 472 unsigned long nrpages;
eb797a8e
MW
473 pgoff_t writeback_index;
474 const struct address_space_operations *a_ops;
475 unsigned long flags;
5660e13d 476 errseq_t wb_err;
600f111e
MWO
477 spinlock_t i_private_lock;
478 struct list_head i_private_list;
d3b1a9a7 479 struct rw_semaphore i_mmap_rwsem;
600f111e 480 void * i_private_data;
3859a271 481} __attribute__((aligned(sizeof(long)))) __randomize_layout;
1da177e4
LT
482 /*
483 * On most architectures that alignment is already the case; but
25985edc 484 * must be enforced here for CRIS, to let the least significant bit
1da177e4
LT
485 * of struct page's "mapping" pointer be used for PAGE_MAPPING_ANON.
486 */
1da177e4 487
ff9c745b
MW
488/* XArray tags, for tagging dirty and writeback pages in the pagecache. */
489#define PAGECACHE_TAG_DIRTY XA_MARK_0
490#define PAGECACHE_TAG_WRITEBACK XA_MARK_1
491#define PAGECACHE_TAG_TOWRITE XA_MARK_2
492
1da177e4 493/*
ff9c745b 494 * Returns true if any of the pages in the mapping are marked with the tag.
1da177e4 495 */
ff9c745b
MW
496static inline bool mapping_tagged(struct address_space *mapping, xa_mark_t tag)
497{
498 return xa_marked(&mapping->i_pages, tag);
499}
1da177e4 500
8b28f621
DB
501static inline void i_mmap_lock_write(struct address_space *mapping)
502{
c8c06efa 503 down_write(&mapping->i_mmap_rwsem);
8b28f621
DB
504}
505
c0d0381a
MK
506static inline int i_mmap_trylock_write(struct address_space *mapping)
507{
508 return down_write_trylock(&mapping->i_mmap_rwsem);
509}
510
8b28f621
DB
511static inline void i_mmap_unlock_write(struct address_space *mapping)
512{
c8c06efa 513 up_write(&mapping->i_mmap_rwsem);
8b28f621
DB
514}
515
6d4675e6
MK
516static inline int i_mmap_trylock_read(struct address_space *mapping)
517{
518 return down_read_trylock(&mapping->i_mmap_rwsem);
519}
520
3dec0ba0
DB
521static inline void i_mmap_lock_read(struct address_space *mapping)
522{
523 down_read(&mapping->i_mmap_rwsem);
524}
525
526static inline void i_mmap_unlock_read(struct address_space *mapping)
527{
528 up_read(&mapping->i_mmap_rwsem);
529}
530
34ae204f
MK
531static inline void i_mmap_assert_locked(struct address_space *mapping)
532{
533 lockdep_assert_held(&mapping->i_mmap_rwsem);
534}
535
536static inline void i_mmap_assert_write_locked(struct address_space *mapping)
537{
538 lockdep_assert_held_write(&mapping->i_mmap_rwsem);
539}
540
1da177e4
LT
541/*
542 * Might pages of this file be mapped into userspace?
543 */
544static inline int mapping_mapped(struct address_space *mapping)
545{
f808c13f 546 return !RB_EMPTY_ROOT(&mapping->i_mmap.rb_root);
1da177e4
LT
547}
548
549/*
550 * Might pages of this file have been modified in userspace?
e8e17ee9 551 * Note that i_mmap_writable counts all VM_SHARED, VM_MAYWRITE vmas: do_mmap
1da177e4
LT
552 * marks vma as VM_SHARED if it is shared, and the file was opened for
553 * writing i.e. vma may be mprotected writable even if now readonly.
4bb5f5d9
DR
554 *
555 * If i_mmap_writable is negative, no new writable mappings are allowed. You
556 * can only deny writable mappings, if none exists right now.
1da177e4
LT
557 */
558static inline int mapping_writably_mapped(struct address_space *mapping)
559{
4bb5f5d9
DR
560 return atomic_read(&mapping->i_mmap_writable) > 0;
561}
562
563static inline int mapping_map_writable(struct address_space *mapping)
564{
565 return atomic_inc_unless_negative(&mapping->i_mmap_writable) ?
566 0 : -EPERM;
567}
568
569static inline void mapping_unmap_writable(struct address_space *mapping)
570{
571 atomic_dec(&mapping->i_mmap_writable);
572}
573
574static inline int mapping_deny_writable(struct address_space *mapping)
575{
576 return atomic_dec_unless_positive(&mapping->i_mmap_writable) ?
577 0 : -EBUSY;
578}
579
580static inline void mapping_allow_writable(struct address_space *mapping)
581{
582 atomic_inc(&mapping->i_mmap_writable);
1da177e4
LT
583}
584
585/*
586 * Use sequence counter to get consistent i_size on 32-bit processors.
587 */
588#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
589#include <linux/seqlock.h>
590#define __NEED_I_SIZE_ORDERED
591#define i_size_ordered_init(inode) seqcount_init(&inode->i_size_seqcount)
592#else
593#define i_size_ordered_init(inode) do { } while (0)
594#endif
595
f19d4a8f
AV
596struct posix_acl;
597#define ACL_NOT_CACHED ((void *)(-1))
332f606b
MS
598/*
599 * ACL_DONT_CACHE is for stacked filesystems, that rely on underlying fs to
cac2f8b8
CB
600 * cache the ACL. This also means that ->get_inode_acl() can be called in RCU
601 * mode with the LOOKUP_RCU flag.
332f606b 602 */
2a3a2a3f 603#define ACL_DONT_CACHE ((void *)(-3))
f19d4a8f 604
b8a7a3a6
AG
605static inline struct posix_acl *
606uncached_acl_sentinel(struct task_struct *task)
607{
608 return (void *)task + 1;
609}
610
611static inline bool
612is_uncached_acl(struct posix_acl *acl)
613{
614 return (long)acl & 1;
615}
616
3ddcd056
LT
617#define IOP_FASTPERM 0x0001
618#define IOP_LOOKUP 0x0002
619#define IOP_NOFOLLOW 0x0004
d0a5b995 620#define IOP_XATTR 0x0008
76fca90e 621#define IOP_DEFAULT_READLINK 0x0010
3ddcd056
LT
622
623/*
624 * Keep mostly read-only and often accessed (especially for
625 * the RCU path lookup and 'stat' data) fields at the beginning
626 * of the 'struct inode'
627 */
1da177e4 628struct inode {
44a7d7a8 629 umode_t i_mode;
3ddcd056 630 unsigned short i_opflags;
92361636
EB
631 kuid_t i_uid;
632 kgid_t i_gid;
3ddcd056
LT
633 unsigned int i_flags;
634
635#ifdef CONFIG_FS_POSIX_ACL
636 struct posix_acl *i_acl;
637 struct posix_acl *i_default_acl;
638#endif
639
44a7d7a8
NP
640 const struct inode_operations *i_op;
641 struct super_block *i_sb;
3ddcd056 642 struct address_space *i_mapping;
44a7d7a8 643
13e12d14
LT
644#ifdef CONFIG_SECURITY
645 void *i_security;
646#endif
44a7d7a8 647
3ddcd056
LT
648 /* Stat data, not accessed from path walking */
649 unsigned long i_ino;
a78ef704
MS
650 /*
651 * Filesystems may only read i_nlink directly. They shall use the
652 * following functions for modification:
653 *
654 * (set|clear|inc|drop)_nlink
655 * inode_(inc|dec)_link_count
656 */
657 union {
658 const unsigned int i_nlink;
659 unsigned int __i_nlink;
660 };
3ddcd056 661 dev_t i_rdev;
2f9d3df8 662 loff_t i_size;
12cd4402
JL
663 struct timespec64 __i_atime;
664 struct timespec64 __i_mtime;
13bc2445 665 struct timespec64 __i_ctime; /* use inode_*_ctime accessors! */
6cdbb0ef
TT
666 spinlock_t i_lock; /* i_blocks, i_bytes, maybe i_size */
667 unsigned short i_bytes;
69448867 668 u8 i_blkbits;
fe3944fb 669 enum rw_hint i_write_hint;
3ddcd056
LT
670 blkcnt_t i_blocks;
671
672#ifdef __NEED_I_SIZE_ORDERED
673 seqcount_t i_size_seqcount;
674#endif
675
676 /* Misc */
677 unsigned long i_state;
9902af79 678 struct rw_semaphore i_rwsem;
13e12d14 679
44a7d7a8 680 unsigned long dirtied_when; /* jiffies of first dirtying */
a2f48706 681 unsigned long dirtied_time_when;
44a7d7a8 682
1da177e4 683 struct hlist_node i_hash;
c7f54084 684 struct list_head i_io_list; /* backing dev IO list */
52ebea74
TH
685#ifdef CONFIG_CGROUP_WRITEBACK
686 struct bdi_writeback *i_wb; /* the associated cgroup wb */
2a814908
TH
687
688 /* foreign inode detection, see wbc_detach_inode() */
689 int i_wb_frn_winner;
690 u16 i_wb_frn_avg_time;
691 u16 i_wb_frn_history;
52ebea74 692#endif
7ccf19a8 693 struct list_head i_lru; /* inode LRU list */
1da177e4 694 struct list_head i_sb_list;
6c60d2b5 695 struct list_head i_wb_list; /* backing dev writeback list */
fa0d7e3d 696 union {
b3d9b7a3 697 struct hlist_head i_dentry;
fa0d7e3d
NP
698 struct rcu_head i_rcu;
699 };
f02a9ad1 700 atomic64_t i_version;
8019ad13 701 atomic64_t i_sequence; /* see futex */
2f9d3df8 702 atomic_t i_count;
bd5fe6c5 703 atomic_t i_dio_count;
6cdbb0ef 704 atomic_t i_writecount;
387e3746 705#if defined(CONFIG_IMA) || defined(CONFIG_FILE_LOCKING)
d984ea60
MZ
706 atomic_t i_readcount; /* struct files open RO */
707#endif
fdb0da89
AV
708 union {
709 const struct file_operations *i_fop; /* former ->i_op->default_file_ops */
710 void (*free_inode)(struct inode *);
711 };
4a075e39 712 struct file_lock_context *i_flctx;
1da177e4 713 struct address_space i_data;
1da177e4 714 struct list_head i_devices;
4c154168
TT
715 union {
716 struct pipe_inode_info *i_pipe;
577c4eb0 717 struct cdev *i_cdev;
61ba64fc 718 char *i_link;
84e710da 719 unsigned i_dir_seq;
4c154168 720 };
1da177e4
LT
721
722 __u32 i_generation;
723
3be25f49
EP
724#ifdef CONFIG_FSNOTIFY
725 __u32 i_fsnotify_mask; /* all events this inode cares about */
08991e83 726 struct fsnotify_mark_connector __rcu *i_fsnotify_marks;
0eeca283
RL
727#endif
728
643fa961 729#ifdef CONFIG_FS_ENCRYPTION
3e7807d5 730 struct fscrypt_inode_info *i_crypt_info;
0b81d077
JK
731#endif
732
5585f2af
EB
733#ifdef CONFIG_FS_VERITY
734 struct fsverity_info *i_verity_info;
735#endif
736
8e18e294 737 void *i_private; /* fs or device private pointer */
3859a271 738} __randomize_layout;
1da177e4 739
50e17c00
DD
740struct timespec64 timestamp_truncate(struct timespec64 t, struct inode *inode);
741
93407472
FF
742static inline unsigned int i_blocksize(const struct inode *node)
743{
744 return (1 << node->i_blkbits);
745}
746
1d3382cb
AV
747static inline int inode_unhashed(struct inode *inode)
748{
749 return hlist_unhashed(&inode->i_hash);
750}
751
5bef9151
AV
752/*
753 * __mark_inode_dirty expects inodes to be hashed. Since we don't
754 * want special inodes in the fileset inode space, we make them
755 * appear hashed, but do not put on any lists. hlist_del()
756 * will work fine and require no locking.
757 */
758static inline void inode_fake_hash(struct inode *inode)
759{
760 hlist_add_fake(&inode->i_hash);
761}
762
f2eace23
IM
763/*
764 * inode->i_mutex nesting subclasses for the lock validator:
765 *
766 * 0: the object of the current VFS operation
767 * 1: parent
768 * 2: child/target
40bd22c9
BF
769 * 3: xattr
770 * 4: second non-directory
d1b72cc6
MS
771 * 5: second parent (when locking independent directories in rename)
772 *
773 * I_MUTEX_NONDIR2 is for certain operations (such as rename) which lock two
40bd22c9 774 * non-directories at once.
f2eace23
IM
775 *
776 * The locking order between these classes is
d1b72cc6 777 * parent[2] -> child -> grandchild -> normal -> xattr -> second non-directory
f2eace23
IM
778 */
779enum inode_i_mutex_lock_class
780{
781 I_MUTEX_NORMAL,
782 I_MUTEX_PARENT,
783 I_MUTEX_CHILD,
4df46240 784 I_MUTEX_XATTR,
d1b72cc6
MS
785 I_MUTEX_NONDIR2,
786 I_MUTEX_PARENT2,
f2eace23
IM
787};
788
5955102c
AV
789static inline void inode_lock(struct inode *inode)
790{
9902af79 791 down_write(&inode->i_rwsem);
5955102c
AV
792}
793
794static inline void inode_unlock(struct inode *inode)
795{
9902af79
AV
796 up_write(&inode->i_rwsem);
797}
798
799static inline void inode_lock_shared(struct inode *inode)
800{
801 down_read(&inode->i_rwsem);
802}
803
804static inline void inode_unlock_shared(struct inode *inode)
805{
806 up_read(&inode->i_rwsem);
5955102c
AV
807}
808
809static inline int inode_trylock(struct inode *inode)
810{
9902af79
AV
811 return down_write_trylock(&inode->i_rwsem);
812}
813
814static inline int inode_trylock_shared(struct inode *inode)
815{
816 return down_read_trylock(&inode->i_rwsem);
5955102c
AV
817}
818
819static inline int inode_is_locked(struct inode *inode)
820{
9902af79 821 return rwsem_is_locked(&inode->i_rwsem);
5955102c
AV
822}
823
824static inline void inode_lock_nested(struct inode *inode, unsigned subclass)
825{
9902af79 826 down_write_nested(&inode->i_rwsem, subclass);
5955102c
AV
827}
828
01c2e13d
DW
829static inline void inode_lock_shared_nested(struct inode *inode, unsigned subclass)
830{
831 down_read_nested(&inode->i_rwsem, subclass);
832}
833
730633f0
JK
834static inline void filemap_invalidate_lock(struct address_space *mapping)
835{
836 down_write(&mapping->invalidate_lock);
837}
838
839static inline void filemap_invalidate_unlock(struct address_space *mapping)
840{
841 up_write(&mapping->invalidate_lock);
842}
843
844static inline void filemap_invalidate_lock_shared(struct address_space *mapping)
845{
846 down_read(&mapping->invalidate_lock);
847}
848
849static inline int filemap_invalidate_trylock_shared(
850 struct address_space *mapping)
851{
852 return down_read_trylock(&mapping->invalidate_lock);
853}
854
855static inline void filemap_invalidate_unlock_shared(
856 struct address_space *mapping)
857{
858 up_read(&mapping->invalidate_lock);
859}
860
375e289e
BF
861void lock_two_nondirectories(struct inode *, struct inode*);
862void unlock_two_nondirectories(struct inode *, struct inode*);
863
7506ae6a
JK
864void filemap_invalidate_lock_two(struct address_space *mapping1,
865 struct address_space *mapping2);
866void filemap_invalidate_unlock_two(struct address_space *mapping1,
867 struct address_space *mapping2);
868
869
1da177e4
LT
870/*
871 * NOTE: in a 32bit arch with a preemptable kernel and
872 * an UP compile the i_size_read/write must be atomic
873 * with respect to the local cpu (unlike with preempt disabled),
874 * but they don't need to be atomic with respect to other cpus like in
875 * true SMP (so they need either to either locally disable irq around
876 * the read or for example on x86 they can be still implemented as a
877 * cmpxchg8b without the need of the lock prefix). For SMP compiles
878 * and 64bit archs it makes no difference if preempt is enabled or not.
879 */
48ed214d 880static inline loff_t i_size_read(const struct inode *inode)
1da177e4
LT
881{
882#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
883 loff_t i_size;
884 unsigned int seq;
885
886 do {
887 seq = read_seqcount_begin(&inode->i_size_seqcount);
888 i_size = inode->i_size;
889 } while (read_seqcount_retry(&inode->i_size_seqcount, seq));
890 return i_size;
2496396f 891#elif BITS_PER_LONG==32 && defined(CONFIG_PREEMPTION)
1da177e4
LT
892 loff_t i_size;
893
894 preempt_disable();
895 i_size = inode->i_size;
896 preempt_enable();
897 return i_size;
898#else
d8f899d1
BL
899 /* Pairs with smp_store_release() in i_size_write() */
900 return smp_load_acquire(&inode->i_size);
1da177e4
LT
901#endif
902}
903
7762f5a0
MS
904/*
905 * NOTE: unlike i_size_read(), i_size_write() does need locking around it
906 * (normally i_mutex), otherwise on 32bit/SMP an update of i_size_seqcount
907 * can be lost, resulting in subsequent i_size_read() calls spinning forever.
908 */
1da177e4
LT
909static inline void i_size_write(struct inode *inode, loff_t i_size)
910{
911#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
74e3d1e1 912 preempt_disable();
1da177e4
LT
913 write_seqcount_begin(&inode->i_size_seqcount);
914 inode->i_size = i_size;
915 write_seqcount_end(&inode->i_size_seqcount);
74e3d1e1 916 preempt_enable();
2496396f 917#elif BITS_PER_LONG==32 && defined(CONFIG_PREEMPTION)
1da177e4
LT
918 preempt_disable();
919 inode->i_size = i_size;
920 preempt_enable();
921#else
d8f899d1
BL
922 /*
923 * Pairs with smp_load_acquire() in i_size_read() to ensure
924 * changes related to inode size (such as page contents) are
925 * visible before we see the changed inode size.
926 */
927 smp_store_release(&inode->i_size, i_size);
1da177e4
LT
928#endif
929}
930
48ed214d 931static inline unsigned iminor(const struct inode *inode)
1da177e4
LT
932{
933 return MINOR(inode->i_rdev);
934}
935
48ed214d 936static inline unsigned imajor(const struct inode *inode)
1da177e4
LT
937{
938 return MAJOR(inode->i_rdev);
939}
940
1da177e4
LT
941struct fown_struct {
942 rwlock_t lock; /* protects pid, uid, euid fields */
609d7fa9
EB
943 struct pid *pid; /* pid or -pgrp where SIGIO should be sent */
944 enum pid_type pid_type; /* Kind of process group SIGIO should be sent to */
92361636 945 kuid_t uid, euid; /* uid/euid of process setting the owner */
1da177e4
LT
946 int signum; /* posix.1b rt signal to be delivered on IO */
947};
948
c790fbf2
MWO
949/**
950 * struct file_ra_state - Track a file's readahead state.
951 * @start: Where the most recent readahead started.
952 * @size: Number of pages read in the most recent readahead.
84dacdbd
N
953 * @async_size: Numer of pages that were/are not needed immediately
954 * and so were/are genuinely "ahead". Start next readahead when
955 * the first of these pages is accessed.
956 * @ra_pages: Maximum size of a readahead request, copied from the bdi.
c790fbf2
MWO
957 * @mmap_miss: How many mmap accesses missed in the page cache.
958 * @prev_pos: The last byte in the most recent read request.
84dacdbd
N
959 *
960 * When this structure is passed to ->readahead(), the "most recent"
961 * readahead means the current readahead.
1da177e4
LT
962 */
963struct file_ra_state {
c790fbf2
MWO
964 pgoff_t start;
965 unsigned int size;
966 unsigned int async_size;
967 unsigned int ra_pages;
968 unsigned int mmap_miss;
969 loff_t prev_pos;
1da177e4 970};
1da177e4 971
5ce1110b
FW
972/*
973 * Check if @index falls in the readahead windows.
974 */
975static inline int ra_has_index(struct file_ra_state *ra, pgoff_t index)
976{
f9acc8c7
FW
977 return (index >= ra->start &&
978 index < ra->start + ra->size);
5ce1110b
FW
979}
980
a7bc2e8d 981/*
982 * f_{lock,count,pos_lock} members can be highly contended and share
983 * the same cacheline. f_{lock,mode} are very frequently used together
984 * and so share the same cacheline as well. The read-mostly
985 * f_{path,inode,op} are kept on a separate cacheline.
986 */
1da177e4 987struct file {
2f512016 988 union {
372a34e6
CB
989 /* fput() uses task work when closing and freeing file (default). */
990 struct callback_head f_task_work;
991 /* fput() must use workqueue (most kernel threads). */
e87f2c26 992 struct llist_node f_llist;
164f4064 993 unsigned int f_iocb_flags;
e87f2c26 994 };
ef3d0fd2
AK
995
996 /*
319c1517 997 * Protects f_ep, f_flags.
ef3d0fd2
AK
998 * Must not be taken from IRQ context.
999 */
1000 spinlock_t f_lock;
aeb5d727 1001 fmode_t f_mode;
a7bc2e8d 1002 atomic_long_t f_count;
9c225f26 1003 struct mutex f_pos_lock;
1da177e4 1004 loff_t f_pos;
a7bc2e8d 1005 unsigned int f_flags;
1da177e4 1006 struct fown_struct f_owner;
d76b0d9b 1007 const struct cred *f_cred;
1da177e4 1008 struct file_ra_state f_ra;
a7bc2e8d 1009 struct path f_path;
1010 struct inode *f_inode; /* cached value */
1011 const struct file_operations *f_op;
1da177e4 1012
2b47c361 1013 u64 f_version;
50462062 1014#ifdef CONFIG_SECURITY
1da177e4 1015 void *f_security;
50462062 1016#endif
1da177e4
LT
1017 /* needed for tty driver, and maybe others */
1018 void *private_data;
1019
1020#ifdef CONFIG_EPOLL
1021 /* Used by fs/eventpoll.c to link all the hooks to this file */
319c1517 1022 struct hlist_head *f_ep;
1da177e4
LT
1023#endif /* #ifdef CONFIG_EPOLL */
1024 struct address_space *f_mapping;
5660e13d 1025 errseq_t f_wb_err;
735e4ae5 1026 errseq_t f_sb_err; /* for syncfs */
3859a271
KC
1027} __randomize_layout
1028 __attribute__((aligned(4))); /* lest something weird decides that 2 is OK */
1da177e4 1029
990d6c2d
AK
1030struct file_handle {
1031 __u32 handle_bytes;
1032 int handle_type;
1033 /* file identifier */
68d6f4f3 1034 unsigned char f_handle[] __counted_by(handle_bytes);
990d6c2d
AK
1035};
1036
cb0942b8
AV
1037static inline struct file *get_file(struct file *f)
1038{
f6bdc786
KC
1039 long prior = atomic_long_fetch_inc_relaxed(&f->f_count);
1040 WARN_ONCE(!prior, "struct file::f_count incremented from zero; use-after-free condition present!\n");
cb0942b8
AV
1041 return f;
1042}
0ede61d8
CB
1043
1044struct file *get_file_rcu(struct file __rcu **f);
61d4fb0b 1045struct file *get_file_active(struct file **f);
0ede61d8 1046
516e0cc5 1047#define file_count(x) atomic_long_read(&(x)->f_count)
1da177e4
LT
1048
1049#define MAX_NON_LFS ((1UL<<31) - 1)
1050
1051/* Page cache limit. The filesystems should put that into their s_maxbytes
1052 limits, otherwise bad things can happen in VM. */
1053#if BITS_PER_LONG==32
0cc3b0ec 1054#define MAX_LFS_FILESIZE ((loff_t)ULONG_MAX << PAGE_SHIFT)
1da177e4 1055#elif BITS_PER_LONG==64
0cc3b0ec 1056#define MAX_LFS_FILESIZE ((loff_t)LLONG_MAX)
1da177e4
LT
1057#endif
1058
7ca76311 1059/* legacy typedef, should eventually be removed */
17fa388d 1060typedef void *fl_owner_t;
1da177e4 1061
a7231a97 1062struct file_lock;
c69ff407 1063struct file_lease;
a7231a97 1064
1da177e4
LT
1065/* The following constant reflects the upper bound of the file/locking space */
1066#ifndef OFFSET_MAX
ea258f15
ZL
1067#define OFFSET_MAX type_max(loff_t)
1068#define OFFT_OFFSET_MAX type_max(off_t)
1da177e4
LT
1069#endif
1070
bfcd17a6
TP
1071extern void send_sigio(struct fown_struct *fown, int fd, int band);
1072
ee296d7c
JL
1073static inline struct inode *file_inode(const struct file *f)
1074{
1075 return f->f_inode;
1076}
1077
3058fca1
AG
1078/*
1079 * file_dentry() is a relic from the days that overlayfs was using files with a
1080 * "fake" path, meaning, f_path on overlayfs and f_inode on underlying fs.
1081 * In those days, file_dentry() was needed to get the underlying fs dentry that
1082 * matches f_inode.
1083 * Files with "fake" path should not exist nowadays, so use an assertion to make
1084 * sure that file_dentry() was not papering over filesystem bugs.
1085 */
d101a125
MS
1086static inline struct dentry *file_dentry(const struct file *file)
1087{
3058fca1
AG
1088 struct dentry *dentry = file->f_path.dentry;
1089
1090 WARN_ON_ONCE(d_inode(dentry) != file_inode(file));
1091 return dentry;
d101a125
MS
1092}
1093
1da177e4 1094struct fasync_struct {
7a107c0f 1095 rwlock_t fa_lock;
989a2979
ED
1096 int magic;
1097 int fa_fd;
1098 struct fasync_struct *fa_next; /* singly linked list */
1099 struct file *fa_file;
1100 struct rcu_head fa_rcu;
1da177e4
LT
1101};
1102
1103#define FASYNC_MAGIC 0x4601
1104
1105/* SMP safe fasync helpers: */
1106extern int fasync_helper(int, struct file *, int, struct fasync_struct **);
f7347ce4
LT
1107extern struct fasync_struct *fasync_insert_entry(int, struct file *, struct fasync_struct **, struct fasync_struct *);
1108extern int fasync_remove_entry(struct file *, struct fasync_struct **);
1109extern struct fasync_struct *fasync_alloc(void);
1110extern void fasync_free(struct fasync_struct *);
1111
1da177e4
LT
1112/* can be called from interrupts */
1113extern void kill_fasync(struct fasync_struct **, int, int);
1da177e4 1114
e0b93edd 1115extern void __f_setown(struct file *filp, struct pid *, enum pid_type, int force);
bccb5c39 1116extern int f_setown(struct file *filp, int who, int force);
1da177e4 1117extern void f_delown(struct file *filp);
609d7fa9 1118extern pid_t f_getown(struct file *filp);
1da177e4
LT
1119extern int send_sigurg(struct fown_struct *fown);
1120
e462ec50
DH
1121/*
1122 * sb->s_flags. Note that these mirror the equivalent MS_* flags where
1123 * represented in both.
1124 */
f15afbd3
HG
1125#define SB_RDONLY BIT(0) /* Mount read-only */
1126#define SB_NOSUID BIT(1) /* Ignore suid and sgid bits */
1127#define SB_NODEV BIT(2) /* Disallow access to device special files */
1128#define SB_NOEXEC BIT(3) /* Disallow program execution */
1129#define SB_SYNCHRONOUS BIT(4) /* Writes are synced at once */
1130#define SB_MANDLOCK BIT(6) /* Allow mandatory locks on an FS */
1131#define SB_DIRSYNC BIT(7) /* Directory modifications are synchronous */
1132#define SB_NOATIME BIT(10) /* Do not update access times. */
1133#define SB_NODIRATIME BIT(11) /* Do not update directory access times */
1134#define SB_SILENT BIT(15)
5aa8fd9c 1135#define SB_POSIXACL BIT(16) /* Supports POSIX ACLs */
f15afbd3
HG
1136#define SB_INLINECRYPT BIT(17) /* Use blk-crypto for encrypted files */
1137#define SB_KERNMOUNT BIT(22) /* this is a kern_mount call */
1138#define SB_I_VERSION BIT(23) /* Update inode I_version field */
1139#define SB_LAZYTIME BIT(25) /* Update the on-disk [acm]times lazily */
e462ec50
DH
1140
1141/* These sb flags are internal to the kernel */
2c18a63b 1142#define SB_DEAD BIT(21)
5e874914 1143#define SB_DYING BIT(24)
f15afbd3
HG
1144#define SB_SUBMOUNT BIT(26)
1145#define SB_FORCE BIT(27)
1146#define SB_NOSEC BIT(28)
1147#define SB_BORN BIT(29)
1148#define SB_ACTIVE BIT(30)
1149#define SB_NOUSER BIT(31)
e462ec50 1150
c843843e
DR
1151/* These flags relate to encoding and casefolding */
1152#define SB_ENC_STRICT_MODE_FL (1 << 0)
1153
1154#define sb_has_strict_encoding(sb) \
1155 (sb->s_encoding_flags & SB_ENC_STRICT_MODE_FL)
1156
1da177e4
LT
1157/*
1158 * Umount options
1159 */
1160
1161#define MNT_FORCE 0x00000001 /* Attempt to forcibily umount */
1162#define MNT_DETACH 0x00000002 /* Just detach from the tree */
1163#define MNT_EXPIRE 0x00000004 /* Mark for expiry */
db1f05bb
MS
1164#define UMOUNT_NOFOLLOW 0x00000008 /* Don't follow symlink on umount */
1165#define UMOUNT_UNUSED 0x80000000 /* Flag guaranteed to be unused */
1da177e4 1166
46b15caa
TH
1167/* sb->s_iflags */
1168#define SB_I_CGROUPWB 0x00000001 /* cgroup-aware writeback enabled */
90f8572b 1169#define SB_I_NOEXEC 0x00000002 /* Ignore executables on this fs */
a2982cc9 1170#define SB_I_NODEV 0x00000004 /* Ignore devices on this fs */
1cb039f3 1171#define SB_I_STABLE_WRITES 0x00000008 /* don't modify blks until WB is done */
1da177e4 1172
8654df4e
EB
1173/* sb->s_iflags to limit user namespace mounts */
1174#define SB_I_USERNS_VISIBLE 0x00000010 /* fstype already mounted */
57b56ac6
MZ
1175#define SB_I_IMA_UNVERIFIABLE_SIGNATURE 0x00000020
1176#define SB_I_UNTRUSTED_MOUNTER 0x00000040
1f65e57d 1177#define SB_I_EVM_HMAC_UNSUPPORTED 0x00000080
1da177e4 1178
32b1924b 1179#define SB_I_SKIP_SYNC 0x00000100 /* Skip superblock at global sync */
0b3ea092 1180#define SB_I_PERSB_BDI 0x00000200 /* has a per-sb bdi */
a128b054 1181#define SB_I_TS_EXPIRY_WARNED 0x00000400 /* warned about timestamp range expiry */
04b94071 1182#define SB_I_RETIRED 0x00000800 /* superblock shouldn't be reused */
5aa8fd9c 1183#define SB_I_NOUMASK 0x00001000 /* VFS does not apply umask */
32b1924b 1184
5accdf82
JK
1185/* Possible states of 'frozen' field */
1186enum {
1187 SB_UNFROZEN = 0, /* FS is unfrozen */
1188 SB_FREEZE_WRITE = 1, /* Writes, dir ops, ioctls frozen */
5accdf82
JK
1189 SB_FREEZE_PAGEFAULT = 2, /* Page faults stopped as well */
1190 SB_FREEZE_FS = 3, /* For internal FS use (e.g. to stop
1191 * internal threads if needed) */
1192 SB_FREEZE_COMPLETE = 4, /* ->freeze_fs finished successfully */
1193};
1194
1195#define SB_FREEZE_LEVELS (SB_FREEZE_COMPLETE - 1)
1196
1197struct sb_writers {
880b9577 1198 unsigned short frozen; /* Is sb frozen? */
7366f8b6
CB
1199 int freeze_kcount; /* How many kernel freeze requests? */
1200 int freeze_ucount; /* How many userspace freeze requests? */
8129ed29 1201 struct percpu_rw_semaphore rw_sem[SB_FREEZE_LEVELS];
5accdf82
JK
1202};
1203
1da177e4
LT
1204struct super_block {
1205 struct list_head s_list; /* Keep this first */
1206 dev_t s_dev; /* search index; _not_ kdev_t */
270ba5f7
RK
1207 unsigned char s_blocksize_bits;
1208 unsigned long s_blocksize;
42cb56ae 1209 loff_t s_maxbytes; /* Max file size */
1da177e4 1210 struct file_system_type *s_type;
ee9b6d61 1211 const struct super_operations *s_op;
61e225dc 1212 const struct dquot_operations *dq_op;
0d54b217 1213 const struct quotactl_ops *s_qcop;
39655164 1214 const struct export_operations *s_export_op;
1da177e4 1215 unsigned long s_flags;
46b15caa 1216 unsigned long s_iflags; /* internal SB_I_* flags */
1da177e4
LT
1217 unsigned long s_magic;
1218 struct dentry *s_root;
1219 struct rw_semaphore s_umount;
1da177e4 1220 int s_count;
1da177e4 1221 atomic_t s_active;
50462062 1222#ifdef CONFIG_SECURITY
1da177e4 1223 void *s_security;
50462062 1224#endif
e346fb6d 1225 const struct xattr_handler * const *s_xattr;
643fa961 1226#ifdef CONFIG_FS_ENCRYPTION
0b81d077 1227 const struct fscrypt_operations *s_cop;
d7e7b9af 1228 struct fscrypt_keyring *s_master_keys; /* master crypto keys in use */
5585f2af
EB
1229#endif
1230#ifdef CONFIG_FS_VERITY
1231 const struct fsverity_operations *s_vop;
c843843e 1232#endif
5298d4bf 1233#if IS_ENABLED(CONFIG_UNICODE)
c843843e
DR
1234 struct unicode_map *s_encoding;
1235 __u16 s_encoding_flags;
bbbc3fb6 1236#endif
f1ee6162 1237 struct hlist_bl_head s_roots; /* alternate root dentries for NFS */
39f7c4db 1238 struct list_head s_mounts; /* list of mounts; _not_ for fs use */
f3a60882
CB
1239 struct block_device *s_bdev; /* can go away once we use an accessor for @s_bdev_file */
1240 struct file *s_bdev_file;
32a88aa1 1241 struct backing_dev_info *s_bdi;
acaebfd8 1242 struct mtd_info *s_mtd;
a5166169 1243 struct hlist_node s_instances;
2c5f648a 1244 unsigned int s_quota_types; /* Bitmask of supported quota types */
1da177e4
LT
1245 struct quota_info s_dquot; /* Diskquota specific options */
1246
5accdf82 1247 struct sb_writers s_writers;
1da177e4 1248
99c228a9
AG
1249 /*
1250 * Keep s_fs_info, s_time_gran, s_fsnotify_mask, and
07a3b8d0 1251 * s_fsnotify_info together for cache efficiency. They are frequently
99c228a9
AG
1252 * accessed and rarely modified.
1253 */
1254 void *s_fs_info; /* Filesystem private info */
1255
1256 /* Granularity of c/m/atime in ns (cannot be worse than a second) */
1257 u32 s_time_gran;
188d20bc
DD
1258 /* Time limits for c/m/atime in seconds */
1259 time64_t s_time_min;
1260 time64_t s_time_max;
99c228a9
AG
1261#ifdef CONFIG_FSNOTIFY
1262 __u32 s_fsnotify_mask;
07a3b8d0 1263 struct fsnotify_sb_info *s_fsnotify_info;
99c228a9
AG
1264#endif
1265
ae8c5117
KO
1266 /*
1267 * q: why are s_id and s_sysfs_name not the same? both are human
1268 * readable strings that identify the filesystem
1269 * a: s_id is allowed to change at runtime; it's used in log messages,
1270 * and we want to when a device starts out as single device (s_id is dev
1271 * name) but then a device is hot added and we have to switch to
1272 * identifying it by UUID
1273 * but s_sysfs_name is a handle for programmatic access, and can't
1274 * change at runtime
1275 */
85787090
CH
1276 char s_id[32]; /* Informational name */
1277 uuid_t s_uuid; /* UUID */
a4af51ce 1278 u8 s_uuid_len; /* Default 16, possibly smaller for weird filesystems */
1da177e4 1279
ae8c5117
KO
1280 /* if set, fs shows up under sysfs at /sys/fs/$FSTYP/s_sysfs_name */
1281 char s_sysfs_name[UUID_STRING_LEN + 1];
1da177e4 1282
8de52778 1283 unsigned int s_max_links;
1da177e4
LT
1284
1285 /*
1286 * The next field is for VFS *only*. No filesystems have any business
1287 * even looking at it. You had been warned.
1288 */
a11f3a05 1289 struct mutex s_vfs_rename_mutex; /* Kludge */
1da177e4 1290
79c0b2df
MS
1291 /*
1292 * Filesystem subtype. If non-empty the filesystem type field
1293 * in /proc/mounts will be "type.subtype"
1294 */
a0c9a8b8 1295 const char *s_subtype;
b3b304a2 1296
c8aebb0c 1297 const struct dentry_operations *s_d_op; /* default d_op for dentries */
9fdfdcf1 1298
1720f5dd 1299 struct shrinker *s_shrink; /* per-sb shrinker handle */
4ed5e82f 1300
7ada4db8
MS
1301 /* Number of inodes with nlink == 0 but still referenced */
1302 atomic_long_t s_remove_count;
1303
d7439fb1 1304 /* Read-only state of the superblock is being changed */
4ed5e82f 1305 int s_readonly_remount;
7b7a8665 1306
735e4ae5
JL
1307 /* per-sb errseq_t for reporting writeback errors via syncfs */
1308 errseq_t s_wb_err;
1309
7b7a8665
CH
1310 /* AIO completions deferred from interrupt context */
1311 struct workqueue_struct *s_dio_done_wq;
215752fc 1312 struct hlist_head s_pins;
f6041567 1313
6e4eab57
EB
1314 /*
1315 * Owning user namespace and default context in which to
1316 * interpret filesystem uids, gids, quotas, device nodes,
1317 * xattrs and security labels.
1318 */
1319 struct user_namespace *s_user_ns;
1320
f6041567 1321 /*
7d10f70f
WL
1322 * The list_lru structure is essentially just a pointer to a table
1323 * of per-node lru lists, each of which has its own spinlock.
1324 * There is no need to put them into separate cachelines.
f6041567 1325 */
7d10f70f
WL
1326 struct list_lru s_dentry_lru;
1327 struct list_lru s_inode_lru;
e2fec7c3 1328 struct rcu_head rcu;
853b39a7 1329 struct work_struct destroy_work;
69c433ed 1330
e97fedb9 1331 struct mutex s_sync_lock; /* sync serialisation lock */
69c433ed
MS
1332
1333 /*
1334 * Indicates how deep in a filesystem stack this SB is
1335 */
1336 int s_stack_depth;
74278da9
DC
1337
1338 /* s_inode_list_lock protects s_inodes */
1339 spinlock_t s_inode_list_lock ____cacheline_aligned_in_smp;
1340 struct list_head s_inodes; /* all inodes */
6c60d2b5
DC
1341
1342 spinlock_t s_inode_wblist_lock;
1343 struct list_head s_inodes_wb; /* writeback inodes */
3859a271 1344} __randomize_layout;
1da177e4 1345
a1ec9040
CB
1346static inline struct user_namespace *i_user_ns(const struct inode *inode)
1347{
1348 return inode->i_sb->s_user_ns;
1349}
1350
81754357
SF
1351/* Helper functions so that in most cases filesystems will
1352 * not need to deal directly with kuid_t and kgid_t and can
1353 * instead deal with the raw numeric values that are stored
1354 * in the filesystem.
1355 */
1356static inline uid_t i_uid_read(const struct inode *inode)
1357{
a1ec9040 1358 return from_kuid(i_user_ns(inode), inode->i_uid);
81754357
SF
1359}
1360
1361static inline gid_t i_gid_read(const struct inode *inode)
1362{
a1ec9040 1363 return from_kgid(i_user_ns(inode), inode->i_gid);
81754357
SF
1364}
1365
1366static inline void i_uid_write(struct inode *inode, uid_t uid)
1367{
a1ec9040 1368 inode->i_uid = make_kuid(i_user_ns(inode), uid);
81754357
SF
1369}
1370
1371static inline void i_gid_write(struct inode *inode, gid_t gid)
1372{
a1ec9040 1373 inode->i_gid = make_kgid(i_user_ns(inode), gid);
81754357
SF
1374}
1375
234a3113 1376/**
e67fe633
CB
1377 * i_uid_into_vfsuid - map an inode's i_uid down according to an idmapping
1378 * @idmap: idmap of the mount the inode was found from
234a3113
CB
1379 * @inode: inode to map
1380 *
e67fe633 1381 * Return: whe inode's i_uid mapped down according to @idmap.
234a3113
CB
1382 * If the inode's i_uid has no mapping INVALID_VFSUID is returned.
1383 */
e67fe633 1384static inline vfsuid_t i_uid_into_vfsuid(struct mnt_idmap *idmap,
234a3113
CB
1385 const struct inode *inode)
1386{
4d7ca409 1387 return make_vfsuid(idmap, i_user_ns(inode), inode->i_uid);
e6c9a714
CB
1388}
1389
1f36146a
CB
1390/**
1391 * i_uid_needs_update - check whether inode's i_uid needs to be updated
0dbe12f2 1392 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1393 * @attr: the new attributes of @inode
1394 * @inode: the inode to update
1395 *
1396 * Check whether the $inode's i_uid field needs to be updated taking idmapped
1397 * mounts into account if the filesystem supports it.
1398 *
1399 * Return: true if @inode's i_uid field needs to be updated, false if not.
1400 */
0dbe12f2 1401static inline bool i_uid_needs_update(struct mnt_idmap *idmap,
1f36146a
CB
1402 const struct iattr *attr,
1403 const struct inode *inode)
1404{
1405 return ((attr->ia_valid & ATTR_UID) &&
1406 !vfsuid_eq(attr->ia_vfsuid,
e67fe633 1407 i_uid_into_vfsuid(idmap, inode)));
1f36146a
CB
1408}
1409
1410/**
1411 * i_uid_update - update @inode's i_uid field
0dbe12f2 1412 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1413 * @attr: the new attributes of @inode
1414 * @inode: the inode to update
1415 *
1416 * Safely update @inode's i_uid field translating the vfsuid of any idmapped
1417 * mount into the filesystem kuid.
1418 */
0dbe12f2 1419static inline void i_uid_update(struct mnt_idmap *idmap,
1f36146a
CB
1420 const struct iattr *attr,
1421 struct inode *inode)
1422{
1423 if (attr->ia_valid & ATTR_UID)
4d7ca409 1424 inode->i_uid = from_vfsuid(idmap, i_user_ns(inode),
1f36146a
CB
1425 attr->ia_vfsuid);
1426}
1427
234a3113 1428/**
e67fe633
CB
1429 * i_gid_into_vfsgid - map an inode's i_gid down according to an idmapping
1430 * @idmap: idmap of the mount the inode was found from
234a3113
CB
1431 * @inode: inode to map
1432 *
e67fe633 1433 * Return: the inode's i_gid mapped down according to @idmap.
234a3113
CB
1434 * If the inode's i_gid has no mapping INVALID_VFSGID is returned.
1435 */
e67fe633 1436static inline vfsgid_t i_gid_into_vfsgid(struct mnt_idmap *idmap,
234a3113
CB
1437 const struct inode *inode)
1438{
4d7ca409 1439 return make_vfsgid(idmap, i_user_ns(inode), inode->i_gid);
e6c9a714
CB
1440}
1441
1f36146a
CB
1442/**
1443 * i_gid_needs_update - check whether inode's i_gid needs to be updated
0dbe12f2 1444 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1445 * @attr: the new attributes of @inode
1446 * @inode: the inode to update
1447 *
1448 * Check whether the $inode's i_gid field needs to be updated taking idmapped
1449 * mounts into account if the filesystem supports it.
1450 *
1451 * Return: true if @inode's i_gid field needs to be updated, false if not.
1452 */
0dbe12f2 1453static inline bool i_gid_needs_update(struct mnt_idmap *idmap,
1f36146a
CB
1454 const struct iattr *attr,
1455 const struct inode *inode)
1456{
1457 return ((attr->ia_valid & ATTR_GID) &&
1458 !vfsgid_eq(attr->ia_vfsgid,
e67fe633 1459 i_gid_into_vfsgid(idmap, inode)));
1f36146a
CB
1460}
1461
1462/**
1463 * i_gid_update - update @inode's i_gid field
0dbe12f2 1464 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1465 * @attr: the new attributes of @inode
1466 * @inode: the inode to update
1467 *
1468 * Safely update @inode's i_gid field translating the vfsgid of any idmapped
1469 * mount into the filesystem kgid.
1470 */
0dbe12f2 1471static inline void i_gid_update(struct mnt_idmap *idmap,
1f36146a
CB
1472 const struct iattr *attr,
1473 struct inode *inode)
1474{
1475 if (attr->ia_valid & ATTR_GID)
4d7ca409 1476 inode->i_gid = from_vfsgid(idmap, i_user_ns(inode),
1f36146a
CB
1477 attr->ia_vfsgid);
1478}
1479
db998553
CB
1480/**
1481 * inode_fsuid_set - initialize inode's i_uid field with callers fsuid
1482 * @inode: inode to initialize
c14329d3 1483 * @idmap: idmap of the mount the inode was found from
db998553
CB
1484 *
1485 * Initialize the i_uid field of @inode. If the inode was found/created via
c14329d3 1486 * an idmapped mount map the caller's fsuid according to @idmap.
db998553
CB
1487 */
1488static inline void inode_fsuid_set(struct inode *inode,
c14329d3 1489 struct mnt_idmap *idmap)
db998553 1490{
c14329d3 1491 inode->i_uid = mapped_fsuid(idmap, i_user_ns(inode));
db998553
CB
1492}
1493
1494/**
1495 * inode_fsgid_set - initialize inode's i_gid field with callers fsgid
1496 * @inode: inode to initialize
c14329d3 1497 * @idmap: idmap of the mount the inode was found from
db998553
CB
1498 *
1499 * Initialize the i_gid field of @inode. If the inode was found/created via
c14329d3 1500 * an idmapped mount map the caller's fsgid according to @idmap.
db998553
CB
1501 */
1502static inline void inode_fsgid_set(struct inode *inode,
c14329d3 1503 struct mnt_idmap *idmap)
db998553 1504{
c14329d3 1505 inode->i_gid = mapped_fsgid(idmap, i_user_ns(inode));
db998553
CB
1506}
1507
8e538913
CB
1508/**
1509 * fsuidgid_has_mapping() - check whether caller's fsuid/fsgid is mapped
1510 * @sb: the superblock we want a mapping in
4609e1f1 1511 * @idmap: idmap of the relevant mount
8e538913
CB
1512 *
1513 * Check whether the caller's fsuid and fsgid have a valid mapping in the
1514 * s_user_ns of the superblock @sb. If the caller is on an idmapped mount map
4609e1f1 1515 * the caller's fsuid and fsgid according to the @idmap first.
8e538913
CB
1516 *
1517 * Return: true if fsuid and fsgid is mapped, false if not.
1518 */
1519static inline bool fsuidgid_has_mapping(struct super_block *sb,
4609e1f1 1520 struct mnt_idmap *idmap)
8e538913 1521{
476860b3
CB
1522 struct user_namespace *fs_userns = sb->s_user_ns;
1523 kuid_t kuid;
1524 kgid_t kgid;
1525
c14329d3 1526 kuid = mapped_fsuid(idmap, fs_userns);
476860b3
CB
1527 if (!uid_valid(kuid))
1528 return false;
c14329d3 1529 kgid = mapped_fsgid(idmap, fs_userns);
476860b3
CB
1530 if (!gid_valid(kgid))
1531 return false;
1532 return kuid_has_mapping(fs_userns, kuid) &&
1533 kgid_has_mapping(fs_userns, kgid);
8e538913
CB
1534}
1535
9b6304c1
JL
1536struct timespec64 current_time(struct inode *inode);
1537struct timespec64 inode_set_ctime_current(struct inode *inode);
1538
077c212f
JL
1539static inline time64_t inode_get_atime_sec(const struct inode *inode)
1540{
12cd4402 1541 return inode->__i_atime.tv_sec;
077c212f
JL
1542}
1543
1544static inline long inode_get_atime_nsec(const struct inode *inode)
1545{
12cd4402 1546 return inode->__i_atime.tv_nsec;
077c212f
JL
1547}
1548
1549static inline struct timespec64 inode_get_atime(const struct inode *inode)
1550{
12cd4402 1551 return inode->__i_atime;
077c212f
JL
1552}
1553
1554static inline struct timespec64 inode_set_atime_to_ts(struct inode *inode,
1555 struct timespec64 ts)
1556{
12cd4402 1557 inode->__i_atime = ts;
077c212f
JL
1558 return ts;
1559}
1560
1561static inline struct timespec64 inode_set_atime(struct inode *inode,
1562 time64_t sec, long nsec)
1563{
1564 struct timespec64 ts = { .tv_sec = sec,
1565 .tv_nsec = nsec };
1566 return inode_set_atime_to_ts(inode, ts);
1567}
1568
1569static inline time64_t inode_get_mtime_sec(const struct inode *inode)
1570{
12cd4402 1571 return inode->__i_mtime.tv_sec;
077c212f
JL
1572}
1573
1574static inline long inode_get_mtime_nsec(const struct inode *inode)
1575{
12cd4402 1576 return inode->__i_mtime.tv_nsec;
077c212f
JL
1577}
1578
1579static inline struct timespec64 inode_get_mtime(const struct inode *inode)
1580{
12cd4402 1581 return inode->__i_mtime;
077c212f
JL
1582}
1583
1584static inline struct timespec64 inode_set_mtime_to_ts(struct inode *inode,
1585 struct timespec64 ts)
1586{
12cd4402 1587 inode->__i_mtime = ts;
077c212f
JL
1588 return ts;
1589}
1590
1591static inline struct timespec64 inode_set_mtime(struct inode *inode,
1592 time64_t sec, long nsec)
1593{
1594 struct timespec64 ts = { .tv_sec = sec,
1595 .tv_nsec = nsec };
1596 return inode_set_mtime_to_ts(inode, ts);
1597}
1598
1599static inline time64_t inode_get_ctime_sec(const struct inode *inode)
1600{
1601 return inode->__i_ctime.tv_sec;
1602}
1603
1604static inline long inode_get_ctime_nsec(const struct inode *inode)
1605{
1606 return inode->__i_ctime.tv_nsec;
1607}
1608
9b6304c1
JL
1609static inline struct timespec64 inode_get_ctime(const struct inode *inode)
1610{
647aa768 1611 return inode->__i_ctime;
9b6304c1
JL
1612}
1613
9b6304c1
JL
1614static inline struct timespec64 inode_set_ctime_to_ts(struct inode *inode,
1615 struct timespec64 ts)
1616{
13bc2445 1617 inode->__i_ctime = ts;
9b6304c1
JL
1618 return ts;
1619}
1620
1621/**
1622 * inode_set_ctime - set the ctime in the inode
1623 * @inode: inode in which to set the ctime
1624 * @sec: tv_sec value to set
1625 * @nsec: tv_nsec value to set
1626 *
1627 * Set the ctime in @inode to { @sec, @nsec }
1628 */
1629static inline struct timespec64 inode_set_ctime(struct inode *inode,
1630 time64_t sec, long nsec)
1631{
1632 struct timespec64 ts = { .tv_sec = sec,
1633 .tv_nsec = nsec };
1634
1635 return inode_set_ctime_to_ts(inode, ts);
1636}
1da177e4 1637
077c212f
JL
1638struct timespec64 simple_inode_init_ts(struct inode *inode);
1639
1da177e4
LT
1640/*
1641 * Snapshotting support.
1642 */
1da177e4 1643
9b852342
DW
1644/*
1645 * These are internal functions, please use sb_start_{write,pagefault,intwrite}
1646 * instead.
1647 */
1648static inline void __sb_end_write(struct super_block *sb, int level)
1649{
1650 percpu_up_read(sb->s_writers.rw_sem + level-1);
1651}
1652
1653static inline void __sb_start_write(struct super_block *sb, int level)
1654{
1655 percpu_down_read(sb->s_writers.rw_sem + level - 1);
1656}
1657
1658static inline bool __sb_start_write_trylock(struct super_block *sb, int level)
1659{
1660 return percpu_down_read_trylock(sb->s_writers.rw_sem + level - 1);
1661}
5accdf82 1662
bee9182d 1663#define __sb_writers_acquired(sb, lev) \
8129ed29 1664 percpu_rwsem_acquire(&(sb)->s_writers.rw_sem[(lev)-1], 1, _THIS_IP_)
bee9182d 1665#define __sb_writers_release(sb, lev) \
8129ed29 1666 percpu_rwsem_release(&(sb)->s_writers.rw_sem[(lev)-1], 1, _THIS_IP_)
bee9182d 1667
8802e580
AG
1668/**
1669 * __sb_write_started - check if sb freeze level is held
1670 * @sb: the super we write to
1671 * @level: the freeze level
1672 *
c39e2ae3
VN
1673 * * > 0 - sb freeze level is held
1674 * * 0 - sb freeze level is not held
1675 * * < 0 - !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN
8802e580
AG
1676 */
1677static inline int __sb_write_started(const struct super_block *sb, int level)
1678{
1679 return lockdep_is_held_type(sb->s_writers.rw_sem + level - 1, 1);
1680}
1681
3d5cd491
AG
1682/**
1683 * sb_write_started - check if SB_FREEZE_WRITE is held
1684 * @sb: the super we write to
1685 *
1686 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1687 */
7f8d12ea
NA
1688static inline bool sb_write_started(const struct super_block *sb)
1689{
8802e580 1690 return __sb_write_started(sb, SB_FREEZE_WRITE);
7f8d12ea
NA
1691}
1692
21b32e6a
AG
1693/**
1694 * sb_write_not_started - check if SB_FREEZE_WRITE is not held
1695 * @sb: the super we write to
1696 *
1697 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1698 */
1699static inline bool sb_write_not_started(const struct super_block *sb)
1700{
1701 return __sb_write_started(sb, SB_FREEZE_WRITE) <= 0;
1702}
1703
3d5cd491
AG
1704/**
1705 * file_write_started - check if SB_FREEZE_WRITE is held
1706 * @file: the file we write to
1707 *
1708 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1709 * May be false positive with !S_ISREG, because file_start_write() has
1710 * no effect on !S_ISREG.
1711 */
1712static inline bool file_write_started(const struct file *file)
1713{
1714 if (!S_ISREG(file_inode(file)->i_mode))
1715 return true;
1716 return sb_write_started(file_inode(file)->i_sb);
1717}
1718
21b32e6a
AG
1719/**
1720 * file_write_not_started - check if SB_FREEZE_WRITE is not held
1721 * @file: the file we write to
1722 *
1723 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1724 * May be false positive with !S_ISREG, because file_start_write() has
1725 * no effect on !S_ISREG.
1726 */
1727static inline bool file_write_not_started(const struct file *file)
1728{
1729 if (!S_ISREG(file_inode(file)->i_mode))
1730 return true;
1731 return sb_write_not_started(file_inode(file)->i_sb);
7f8d12ea
NA
1732}
1733
5accdf82
JK
1734/**
1735 * sb_end_write - drop write access to a superblock
1736 * @sb: the super we wrote to
1737 *
1738 * Decrement number of writers to the filesystem. Wake up possible waiters
1739 * wanting to freeze the filesystem.
1740 */
1741static inline void sb_end_write(struct super_block *sb)
1742{
1743 __sb_end_write(sb, SB_FREEZE_WRITE);
1744}
1745
1746/**
1747 * sb_end_pagefault - drop write access to a superblock from a page fault
1748 * @sb: the super we wrote to
1749 *
1750 * Decrement number of processes handling write page fault to the filesystem.
1751 * Wake up possible waiters wanting to freeze the filesystem.
1752 */
1753static inline void sb_end_pagefault(struct super_block *sb)
1754{
1755 __sb_end_write(sb, SB_FREEZE_PAGEFAULT);
1756}
1757
1758/**
1759 * sb_end_intwrite - drop write access to a superblock for internal fs purposes
1760 * @sb: the super we wrote to
1761 *
1762 * Decrement fs-internal number of writers to the filesystem. Wake up possible
1763 * waiters wanting to freeze the filesystem.
1764 */
1765static inline void sb_end_intwrite(struct super_block *sb)
1766{
1767 __sb_end_write(sb, SB_FREEZE_FS);
1768}
1769
1770/**
1771 * sb_start_write - get write access to a superblock
1772 * @sb: the super we write to
1773 *
1774 * When a process wants to write data or metadata to a file system (i.e. dirty
1775 * a page or an inode), it should embed the operation in a sb_start_write() -
1776 * sb_end_write() pair to get exclusion against file system freezing. This
1777 * function increments number of writers preventing freezing. If the file
1778 * system is already frozen, the function waits until the file system is
1779 * thawed.
1780 *
1781 * Since freeze protection behaves as a lock, users have to preserve
1782 * ordering of freeze protection and other filesystem locks. Generally,
1783 * freeze protection should be the outermost lock. In particular, we have:
1784 *
1785 * sb_start_write
1786 * -> i_mutex (write path, truncate, directory ops, ...)
1787 * -> s_umount (freeze_super, thaw_super)
1788 */
1789static inline void sb_start_write(struct super_block *sb)
1790{
8a3c84b6 1791 __sb_start_write(sb, SB_FREEZE_WRITE);
5accdf82
JK
1792}
1793
8a3c84b6 1794static inline bool sb_start_write_trylock(struct super_block *sb)
5accdf82 1795{
8a3c84b6 1796 return __sb_start_write_trylock(sb, SB_FREEZE_WRITE);
5accdf82
JK
1797}
1798
1799/**
1800 * sb_start_pagefault - get write access to a superblock from a page fault
1801 * @sb: the super we write to
1802 *
1803 * When a process starts handling write page fault, it should embed the
1804 * operation into sb_start_pagefault() - sb_end_pagefault() pair to get
1805 * exclusion against file system freezing. This is needed since the page fault
1806 * is going to dirty a page. This function increments number of running page
1807 * faults preventing freezing. If the file system is already frozen, the
1808 * function waits until the file system is thawed.
1809 *
1810 * Since page fault freeze protection behaves as a lock, users have to preserve
1811 * ordering of freeze protection and other filesystem locks. It is advised to
c1e8d7c6 1812 * put sb_start_pagefault() close to mmap_lock in lock ordering. Page fault
5accdf82
JK
1813 * handling code implies lock dependency:
1814 *
c1e8d7c6 1815 * mmap_lock
5accdf82
JK
1816 * -> sb_start_pagefault
1817 */
1818static inline void sb_start_pagefault(struct super_block *sb)
1819{
8a3c84b6 1820 __sb_start_write(sb, SB_FREEZE_PAGEFAULT);
5accdf82
JK
1821}
1822
39015399 1823/**
5accdf82
JK
1824 * sb_start_intwrite - get write access to a superblock for internal fs purposes
1825 * @sb: the super we write to
1826 *
1827 * This is the third level of protection against filesystem freezing. It is
1828 * free for use by a filesystem. The only requirement is that it must rank
1829 * below sb_start_pagefault.
1830 *
1831 * For example filesystem can call sb_start_intwrite() when starting a
1832 * transaction which somewhat eases handling of freezing for internal sources
1833 * of filesystem changes (internal fs threads, discarding preallocation on file
1834 * close, etc.).
1835 */
1836static inline void sb_start_intwrite(struct super_block *sb)
1837{
8a3c84b6 1838 __sb_start_write(sb, SB_FREEZE_FS);
5accdf82 1839}
1da177e4 1840
8a3c84b6 1841static inline bool sb_start_intwrite_trylock(struct super_block *sb)
0c8e3fe3 1842{
8a3c84b6 1843 return __sb_start_write_trylock(sb, SB_FREEZE_FS);
0c8e3fe3
AG
1844}
1845
01beba79 1846bool inode_owner_or_capable(struct mnt_idmap *idmap,
21cb47be 1847 const struct inode *inode);
3bd858ab 1848
1da177e4
LT
1849/*
1850 * VFS helper functions..
1851 */
abf08576 1852int vfs_create(struct mnt_idmap *, struct inode *,
6521f891 1853 struct dentry *, umode_t, bool);
abf08576 1854int vfs_mkdir(struct mnt_idmap *, struct inode *,
6521f891 1855 struct dentry *, umode_t);
abf08576 1856int vfs_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
6521f891 1857 umode_t, dev_t);
abf08576 1858int vfs_symlink(struct mnt_idmap *, struct inode *,
6521f891 1859 struct dentry *, const char *);
abf08576 1860int vfs_link(struct dentry *, struct mnt_idmap *, struct inode *,
6521f891 1861 struct dentry *, struct inode **);
abf08576
CB
1862int vfs_rmdir(struct mnt_idmap *, struct inode *, struct dentry *);
1863int vfs_unlink(struct mnt_idmap *, struct inode *, struct dentry *,
6521f891 1864 struct inode **);
9fe61450 1865
92cb01c7
CB
1866/**
1867 * struct renamedata - contains all information required for renaming
abf08576 1868 * @old_mnt_idmap: idmap of the old mount the inode was found from
92cb01c7
CB
1869 * @old_dir: parent of source
1870 * @old_dentry: source
abf08576 1871 * @new_mnt_idmap: idmap of the new mount the inode was found from
92cb01c7
CB
1872 * @new_dir: parent of destination
1873 * @new_dentry: destination
1874 * @delegated_inode: returns an inode needing a delegation break
1875 * @flags: rename flags
1876 */
9fe61450 1877struct renamedata {
abf08576 1878 struct mnt_idmap *old_mnt_idmap;
9fe61450
CB
1879 struct inode *old_dir;
1880 struct dentry *old_dentry;
abf08576 1881 struct mnt_idmap *new_mnt_idmap;
9fe61450
CB
1882 struct inode *new_dir;
1883 struct dentry *new_dentry;
1884 struct inode **delegated_inode;
1885 unsigned int flags;
1886} __randomize_layout;
a3c751a5 1887
9fe61450 1888int vfs_rename(struct renamedata *);
a3c751a5 1889
abf08576 1890static inline int vfs_whiteout(struct mnt_idmap *idmap,
6521f891 1891 struct inode *dir, struct dentry *dentry)
a3c751a5 1892{
abf08576 1893 return vfs_mknod(idmap, dir, dentry, S_IFCHR | WHITEOUT_MODE,
6521f891 1894 WHITEOUT_DEV);
a3c751a5 1895}
1da177e4 1896
d56e0ddb
AG
1897struct file *kernel_tmpfile_open(struct mnt_idmap *idmap,
1898 const struct path *parentpath,
1899 umode_t mode, int open_flag,
1900 const struct cred *cred);
cbb0b9d4 1901struct file *kernel_file_open(const struct path *path, int flags,
af58dc1f 1902 const struct cred *cred);
af7bd4dc 1903
8e6c848e
AV
1904int vfs_mkobj(struct dentry *, umode_t,
1905 int (*f)(struct dentry *, umode_t, void *),
1906 void *);
1907
c04011fe 1908int vfs_fchown(struct file *file, uid_t user, gid_t group);
9e96c8c0 1909int vfs_fchmod(struct file *file, umode_t mode);
fd5ad30c 1910int vfs_utimes(const struct path *path, struct timespec64 *times);
c04011fe 1911
9df6702a
MS
1912extern long vfs_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
1913
2952db0f
AB
1914#ifdef CONFIG_COMPAT
1915extern long compat_ptr_ioctl(struct file *file, unsigned int cmd,
1916 unsigned long arg);
1917#else
1918#define compat_ptr_ioctl NULL
1919#endif
1920
8c744fb8
CH
1921/*
1922 * VFS file helper functions.
1923 */
f2d40141 1924void inode_init_owner(struct mnt_idmap *idmap, struct inode *inode,
21cb47be 1925 const struct inode *dir, umode_t mode);
a2982cc9 1926extern bool may_open_dev(const struct path *path);
9452e93e 1927umode_t mode_strip_sgid(struct mnt_idmap *idmap,
2b3416ce 1928 const struct inode *dir, umode_t mode);
c4b929b8 1929
1da177e4
LT
1930/*
1931 * This is the "filldir" function type, used by readdir() to let
1932 * the kernel specify what kind of dirent layout it wants to have.
1933 * This allows the kernel to read directories into kernel space or
1934 * to have different dirent layouts depending on the binary type.
25885a35 1935 * Return 'true' to keep going and 'false' if there are no more entries.
1da177e4 1936 */
ac7576f4 1937struct dir_context;
25885a35 1938typedef bool (*filldir_t)(struct dir_context *, const char *, int, loff_t, u64,
ac7576f4
MS
1939 unsigned);
1940
5c0ba4e0 1941struct dir_context {
a09acf4b 1942 filldir_t actor;
bb6f619b 1943 loff_t pos;
5c0ba4e0 1944};
bb6f619b 1945
b4caecd4
CH
1946/*
1947 * These flags let !MMU mmap() govern direct device mapping vs immediate
1948 * copying more easily for MAP_PRIVATE, especially for ROM filesystems.
1949 *
1950 * NOMMU_MAP_COPY: Copy can be mapped (MAP_PRIVATE)
1951 * NOMMU_MAP_DIRECT: Can be mapped directly (MAP_SHARED)
1952 * NOMMU_MAP_READ: Can be mapped for reading
1953 * NOMMU_MAP_WRITE: Can be mapped for writing
1954 * NOMMU_MAP_EXEC: Can be mapped for execution
1955 */
1956#define NOMMU_MAP_COPY 0x00000001
1957#define NOMMU_MAP_DIRECT 0x00000008
1958#define NOMMU_MAP_READ VM_MAYREAD
1959#define NOMMU_MAP_WRITE VM_MAYWRITE
1960#define NOMMU_MAP_EXEC VM_MAYEXEC
1961
1962#define NOMMU_VMFLAGS \
1963 (NOMMU_MAP_READ | NOMMU_MAP_WRITE | NOMMU_MAP_EXEC)
1964
2e5dfc99
DW
1965/*
1966 * These flags control the behavior of the remap_file_range function pointer.
1967 * If it is called with len == 0 that means "remap to end of source file".
5c437fa2 1968 * See Documentation/filesystems/vfs.rst for more details about this call.
2e5dfc99
DW
1969 *
1970 * REMAP_FILE_DEDUP: only remap if contents identical (i.e. deduplicate)
eca3654e 1971 * REMAP_FILE_CAN_SHORTEN: caller can handle a shortened request
2e5dfc99
DW
1972 */
1973#define REMAP_FILE_DEDUP (1 << 0)
eca3654e 1974#define REMAP_FILE_CAN_SHORTEN (1 << 1)
2e5dfc99
DW
1975
1976/*
1977 * These flags signal that the caller is ok with altering various aspects of
1978 * the behavior of the remap operation. The changes must be made by the
1979 * implementation; the vfs remap helper functions can take advantage of them.
1980 * Flags in this category exist to preserve the quirky behavior of the hoisted
1981 * btrfs clone/dedupe ioctls.
2e5dfc99 1982 */
eca3654e 1983#define REMAP_FILE_ADVISORY (REMAP_FILE_CAN_SHORTEN)
b4caecd4 1984
10bc8e4a
AG
1985/*
1986 * These flags control the behavior of vfs_copy_file_range().
1987 * They are not available to the user via syscall.
1988 *
1989 * COPY_FILE_SPLICE: call splice direct instead of fs clone/copy ops
1990 */
1991#define COPY_FILE_SPLICE (1 << 0)
1992
293bc982 1993struct iov_iter;
ee692a21 1994struct io_uring_cmd;
6faddda6 1995struct offset_ctx;
293bc982 1996
210a03c9
CB
1997typedef unsigned int __bitwise fop_flags_t;
1998
1da177e4
LT
1999struct file_operations {
2000 struct module *owner;
210a03c9 2001 fop_flags_t fop_flags;
1da177e4
LT
2002 loff_t (*llseek) (struct file *, loff_t, int);
2003 ssize_t (*read) (struct file *, char __user *, size_t, loff_t *);
1da177e4 2004 ssize_t (*write) (struct file *, const char __user *, size_t, loff_t *);
293bc982
AV
2005 ssize_t (*read_iter) (struct kiocb *, struct iov_iter *);
2006 ssize_t (*write_iter) (struct kiocb *, struct iov_iter *);
5a72e899
JA
2007 int (*iopoll)(struct kiocb *kiocb, struct io_comp_batch *,
2008 unsigned int flags);
61922694 2009 int (*iterate_shared) (struct file *, struct dir_context *);
a3f8683b 2010 __poll_t (*poll) (struct file *, struct poll_table_struct *);
1da177e4
LT
2011 long (*unlocked_ioctl) (struct file *, unsigned int, unsigned long);
2012 long (*compat_ioctl) (struct file *, unsigned int, unsigned long);
2013 int (*mmap) (struct file *, struct vm_area_struct *);
2014 int (*open) (struct inode *, struct file *);
75e1fcc0 2015 int (*flush) (struct file *, fl_owner_t id);
1da177e4 2016 int (*release) (struct inode *, struct file *);
02c24a82 2017 int (*fsync) (struct file *, loff_t, loff_t, int datasync);
1da177e4
LT
2018 int (*fasync) (int, struct file *, int);
2019 int (*lock) (struct file *, int, struct file_lock *);
1da177e4
LT
2020 unsigned long (*get_unmapped_area)(struct file *, unsigned long, unsigned long, unsigned long, unsigned long);
2021 int (*check_flags)(int);
1da177e4 2022 int (*flock) (struct file *, int, struct file_lock *);
cbb7e577
JA
2023 ssize_t (*splice_write)(struct pipe_inode_info *, struct file *, loff_t *, size_t, unsigned int);
2024 ssize_t (*splice_read)(struct file *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
2bfc6685 2025 void (*splice_eof)(struct file *file);
c69ff407 2026 int (*setlease)(struct file *, int, struct file_lease **, void **);
2fe17c10
CH
2027 long (*fallocate)(struct file *file, int mode, loff_t offset,
2028 loff_t len);
a3816ab0 2029 void (*show_fdinfo)(struct seq_file *m, struct file *f);
b4caecd4
CH
2030#ifndef CONFIG_MMU
2031 unsigned (*mmap_capabilities)(struct file *);
2032#endif
04b38d60
CH
2033 ssize_t (*copy_file_range)(struct file *, loff_t, struct file *,
2034 loff_t, size_t, unsigned int);
42ec3d4c
DW
2035 loff_t (*remap_file_range)(struct file *file_in, loff_t pos_in,
2036 struct file *file_out, loff_t pos_out,
2037 loff_t len, unsigned int remap_flags);
45cd0faa 2038 int (*fadvise)(struct file *, loff_t, loff_t, int);
ee692a21 2039 int (*uring_cmd)(struct io_uring_cmd *ioucmd, unsigned int issue_flags);
de97fcb3
JA
2040 int (*uring_cmd_iopoll)(struct io_uring_cmd *, struct io_comp_batch *,
2041 unsigned int poll_flags);
3859a271 2042} __randomize_layout;
1da177e4 2043
210a03c9
CB
2044/* Supports async buffered reads */
2045#define FOP_BUFFER_RASYNC ((__force fop_flags_t)(1 << 0))
2046/* Supports async buffered writes */
2047#define FOP_BUFFER_WASYNC ((__force fop_flags_t)(1 << 1))
2048/* Supports synchronous page faults for mappings */
2049#define FOP_MMAP_SYNC ((__force fop_flags_t)(1 << 2))
2050/* Supports non-exclusive O_DIRECT writes from multiple threads */
2051#define FOP_DIO_PARALLEL_WRITE ((__force fop_flags_t)(1 << 3))
886b94d2
MWO
2052/* Contains huge pages */
2053#define FOP_HUGE_PAGES ((__force fop_flags_t)(1 << 4))
210a03c9 2054
3e327154
LT
2055/* Wrap a directory iterator that needs exclusive inode access */
2056int wrap_directory_iterator(struct file *, struct dir_context *,
2057 int (*) (struct file *, struct dir_context *));
2058#define WRAP_DIR_ITER(x) \
2059 static int shared_##x(struct file *file , struct dir_context *ctx) \
2060 { return wrap_directory_iterator(file, ctx, x); }
2061
1da177e4 2062struct inode_operations {
00cd8dd3 2063 struct dentry * (*lookup) (struct inode *,struct dentry *, unsigned int);
fceef393 2064 const char * (*get_link) (struct dentry *, struct inode *, struct delayed_call *);
4609e1f1 2065 int (*permission) (struct mnt_idmap *, struct inode *, int);
cac2f8b8 2066 struct posix_acl * (*get_inode_acl)(struct inode *, int, bool);
44a7d7a8
NP
2067
2068 int (*readlink) (struct dentry *, char __user *,int);
44a7d7a8 2069
6c960e68 2070 int (*create) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2071 umode_t, bool);
1da177e4
LT
2072 int (*link) (struct dentry *,struct inode *,struct dentry *);
2073 int (*unlink) (struct inode *,struct dentry *);
7a77db95 2074 int (*symlink) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2075 const char *);
c54bd91e 2076 int (*mkdir) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2077 umode_t);
1da177e4 2078 int (*rmdir) (struct inode *,struct dentry *);
5ebb29be 2079 int (*mknod) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2080 umode_t,dev_t);
e18275ae 2081 int (*rename) (struct mnt_idmap *, struct inode *, struct dentry *,
520c8b16 2082 struct inode *, struct dentry *, unsigned int);
c1632a0f 2083 int (*setattr) (struct mnt_idmap *, struct dentry *, struct iattr *);
b74d24f7 2084 int (*getattr) (struct mnt_idmap *, const struct path *,
549c7297 2085 struct kstat *, u32, unsigned int);
1da177e4 2086 ssize_t (*listxattr) (struct dentry *, char *, size_t);
c4b929b8
MF
2087 int (*fiemap)(struct inode *, struct fiemap_extent_info *, u64 start,
2088 u64 len);
913e9928 2089 int (*update_time)(struct inode *, int);
d9585277 2090 int (*atomic_open)(struct inode *, struct dentry *,
30d90494 2091 struct file *, unsigned open_flag,
44907d79 2092 umode_t create_mode);
011e2b71 2093 int (*tmpfile) (struct mnt_idmap *, struct inode *,
863f144f 2094 struct file *, umode_t);
77435322 2095 struct posix_acl *(*get_acl)(struct mnt_idmap *, struct dentry *,
7420332a 2096 int);
13e83a49 2097 int (*set_acl)(struct mnt_idmap *, struct dentry *,
549c7297 2098 struct posix_acl *, int);
8782a9ae 2099 int (*fileattr_set)(struct mnt_idmap *idmap,
4c5b4799
MS
2100 struct dentry *dentry, struct fileattr *fa);
2101 int (*fileattr_get)(struct dentry *dentry, struct fileattr *fa);
6faddda6 2102 struct offset_ctx *(*get_offset_ctx)(struct inode *inode);
44a7d7a8 2103} ____cacheline_aligned;
1da177e4 2104
f74ac015
MS
2105static inline int call_mmap(struct file *file, struct vm_area_struct *vma)
2106{
2107 return file->f_op->mmap(file, vma);
2108}
2109
1da177e4
LT
2110extern ssize_t vfs_read(struct file *, char __user *, size_t, loff_t *);
2111extern ssize_t vfs_write(struct file *, const char __user *, size_t, loff_t *);
29732938
ZB
2112extern ssize_t vfs_copy_file_range(struct file *, loff_t , struct file *,
2113 loff_t, size_t, unsigned int);
5b9932f6 2114int remap_verify_area(struct file *file, loff_t pos, loff_t len, bool write);
6f7db389
SR
2115int __generic_remap_file_range_prep(struct file *file_in, loff_t pos_in,
2116 struct file *file_out, loff_t pos_out,
2117 loff_t *len, unsigned int remap_flags,
2118 const struct iomap_ops *dax_read_ops);
2119int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in,
2120 struct file *file_out, loff_t pos_out,
2121 loff_t *count, unsigned int remap_flags);
42ec3d4c
DW
2122extern loff_t vfs_clone_file_range(struct file *file_in, loff_t pos_in,
2123 struct file *file_out, loff_t pos_out,
452ce659 2124 loff_t len, unsigned int remap_flags);
54dbc151
DW
2125extern int vfs_dedupe_file_range(struct file *file,
2126 struct file_dedupe_range *same);
42ec3d4c
DW
2127extern loff_t vfs_dedupe_file_range_one(struct file *src_file, loff_t src_pos,
2128 struct file *dst_file, loff_t dst_pos,
df365836 2129 loff_t len, unsigned int remap_flags);
f1825366 2130
7366f8b6
CB
2131/**
2132 * enum freeze_holder - holder of the freeze
2133 * @FREEZE_HOLDER_KERNEL: kernel wants to freeze or thaw filesystem
2134 * @FREEZE_HOLDER_USERSPACE: userspace wants to freeze or thaw filesystem
2135 * @FREEZE_MAY_NEST: whether nesting freeze and thaw requests is allowed
2136 *
2137 * Indicate who the owner of the freeze or thaw request is and whether
2138 * the freeze needs to be exclusive or can nest.
2139 * Without @FREEZE_MAY_NEST, multiple freeze and thaw requests from the
2140 * same holder aren't allowed. It is however allowed to hold a single
2141 * @FREEZE_HOLDER_USERSPACE and a single @FREEZE_HOLDER_KERNEL freeze at
2142 * the same time. This is relied upon by some filesystems during online
2143 * repair or similar.
2144 */
880b9577
DW
2145enum freeze_holder {
2146 FREEZE_HOLDER_KERNEL = (1U << 0),
2147 FREEZE_HOLDER_USERSPACE = (1U << 1),
7366f8b6 2148 FREEZE_MAY_NEST = (1U << 2),
880b9577 2149};
1da177e4 2150
1da177e4
LT
2151struct super_operations {
2152 struct inode *(*alloc_inode)(struct super_block *sb);
2153 void (*destroy_inode)(struct inode *);
fdb0da89 2154 void (*free_inode)(struct inode *);
1da177e4 2155
aa385729 2156 void (*dirty_inode) (struct inode *, int flags);
a9185b41 2157 int (*write_inode) (struct inode *, struct writeback_control *wbc);
45321ac5 2158 int (*drop_inode) (struct inode *);
be7ce416 2159 void (*evict_inode) (struct inode *);
1da177e4 2160 void (*put_super) (struct super_block *);
1da177e4 2161 int (*sync_fs)(struct super_block *sb, int wait);
880b9577 2162 int (*freeze_super) (struct super_block *, enum freeze_holder who);
c4be0c1d 2163 int (*freeze_fs) (struct super_block *);
880b9577 2164 int (*thaw_super) (struct super_block *, enum freeze_holder who);
c4be0c1d 2165 int (*unfreeze_fs) (struct super_block *);
726c3342 2166 int (*statfs) (struct dentry *, struct kstatfs *);
1da177e4 2167 int (*remount_fs) (struct super_block *, int *, char *);
42faad99 2168 void (*umount_begin) (struct super_block *);
1da177e4 2169
34c80b1d 2170 int (*show_options)(struct seq_file *, struct dentry *);
d861c630 2171 int (*show_devname)(struct seq_file *, struct dentry *);
a6322de6 2172 int (*show_path)(struct seq_file *, struct dentry *);
64132379 2173 int (*show_stats)(struct seq_file *, struct dentry *);
0e51a720 2174#ifdef CONFIG_QUOTA
1da177e4
LT
2175 ssize_t (*quota_read)(struct super_block *, int, char *, size_t, loff_t);
2176 ssize_t (*quota_write)(struct super_block *, int, const char *, size_t, loff_t);
ccb49011 2177 struct dquot __rcu **(*get_dquots)(struct inode *);
0e51a720 2178#endif
4101b624
VD
2179 long (*nr_cached_objects)(struct super_block *,
2180 struct shrink_control *);
2181 long (*free_cached_objects)(struct super_block *,
2182 struct shrink_control *);
87efb390 2183 void (*shutdown)(struct super_block *sb);
1da177e4
LT
2184};
2185
bbc1096a
DH
2186/*
2187 * Inode flags - they have no relation to superblock flags now
2188 */
6414e9b0
EB
2189#define S_SYNC (1 << 0) /* Writes are synced at once */
2190#define S_NOATIME (1 << 1) /* Do not update access times */
2191#define S_APPEND (1 << 2) /* Append-only file */
2192#define S_IMMUTABLE (1 << 3) /* Immutable file */
2193#define S_DEAD (1 << 4) /* removed, but still open directory */
2194#define S_NOQUOTA (1 << 5) /* Inode is not counted to quota */
2195#define S_DIRSYNC (1 << 6) /* Directory modifications are synchronous */
2196#define S_NOCMTIME (1 << 7) /* Do not update file c/mtime */
2197#define S_SWAPFILE (1 << 8) /* Do not truncate: swapon got its bmaps */
2198#define S_PRIVATE (1 << 9) /* Inode is fs-internal */
2199#define S_IMA (1 << 10) /* Inode has an associated IMA struct */
2200#define S_AUTOMOUNT (1 << 11) /* Automount/referral quasi-directory */
2201#define S_NOSEC (1 << 12) /* no suid or xattr security attributes */
6cd176a5 2202#ifdef CONFIG_FS_DAX
6414e9b0 2203#define S_DAX (1 << 13) /* Direct Access, avoiding the page cache */
fbbbad4b 2204#else
6414e9b0 2205#define S_DAX 0 /* Make all the DAX code disappear */
fbbbad4b 2206#endif
6414e9b0
EB
2207#define S_ENCRYPTED (1 << 14) /* Encrypted file (using fs/crypto/) */
2208#define S_CASEFOLD (1 << 15) /* Casefolded file */
2209#define S_VERITY (1 << 16) /* Verity file (using fs/verity/) */
1bd9c4e4 2210#define S_KERNEL_FILE (1 << 17) /* File is in use by the kernel (eg. fs/cachefiles) */
bbc1096a
DH
2211
2212/*
2213 * Note that nosuid etc flags are inode-specific: setting some file-system
2214 * flags just means all the inodes inherit those flags by default. It might be
2215 * possible to override it selectively if you really wanted to with some
2216 * ioctl() that is not currently implemented.
2217 *
e462ec50 2218 * Exception: SB_RDONLY is always applied to the entire file system.
bbc1096a
DH
2219 *
2220 * Unfortunately, it is possible to change a filesystems flags with it mounted
2221 * with files in use. This means that all of the inodes will not have their
2222 * i_flags updated. Hence, i_flags no longer inherit the superblock mount
2223 * flags, so these have to be checked separately. -- rmk@arm.uk.linux.org
2224 */
2225#define __IS_FLG(inode, flg) ((inode)->i_sb->s_flags & (flg))
2226
1751e8a6 2227static inline bool sb_rdonly(const struct super_block *sb) { return sb->s_flags & SB_RDONLY; }
94e92e7a 2228#define IS_RDONLY(inode) sb_rdonly((inode)->i_sb)
e462ec50 2229#define IS_SYNC(inode) (__IS_FLG(inode, SB_SYNCHRONOUS) || \
bbc1096a 2230 ((inode)->i_flags & S_SYNC))
e462ec50 2231#define IS_DIRSYNC(inode) (__IS_FLG(inode, SB_SYNCHRONOUS|SB_DIRSYNC) || \
bbc1096a 2232 ((inode)->i_flags & (S_SYNC|S_DIRSYNC)))
e462ec50
DH
2233#define IS_MANDLOCK(inode) __IS_FLG(inode, SB_MANDLOCK)
2234#define IS_NOATIME(inode) __IS_FLG(inode, SB_RDONLY|SB_NOATIME)
2235#define IS_I_VERSION(inode) __IS_FLG(inode, SB_I_VERSION)
bbc1096a
DH
2236
2237#define IS_NOQUOTA(inode) ((inode)->i_flags & S_NOQUOTA)
2238#define IS_APPEND(inode) ((inode)->i_flags & S_APPEND)
2239#define IS_IMMUTABLE(inode) ((inode)->i_flags & S_IMMUTABLE)
e4e8b47a
MK
2240
2241#ifdef CONFIG_FS_POSIX_ACL
e462ec50 2242#define IS_POSIXACL(inode) __IS_FLG(inode, SB_POSIXACL)
e4e8b47a
MK
2243#else
2244#define IS_POSIXACL(inode) 0
2245#endif
bbc1096a
DH
2246
2247#define IS_DEADDIR(inode) ((inode)->i_flags & S_DEAD)
2248#define IS_NOCMTIME(inode) ((inode)->i_flags & S_NOCMTIME)
e964fc77
AD
2249
2250#ifdef CONFIG_SWAP
bbc1096a 2251#define IS_SWAPFILE(inode) ((inode)->i_flags & S_SWAPFILE)
e964fc77
AD
2252#else
2253#define IS_SWAPFILE(inode) ((void)(inode), 0U)
2254#endif
2255
bbc1096a
DH
2256#define IS_PRIVATE(inode) ((inode)->i_flags & S_PRIVATE)
2257#define IS_IMA(inode) ((inode)->i_flags & S_IMA)
2258#define IS_AUTOMOUNT(inode) ((inode)->i_flags & S_AUTOMOUNT)
2259#define IS_NOSEC(inode) ((inode)->i_flags & S_NOSEC)
fbbbad4b 2260#define IS_DAX(inode) ((inode)->i_flags & S_DAX)
2ee6a576 2261#define IS_ENCRYPTED(inode) ((inode)->i_flags & S_ENCRYPTED)
b886ee3e 2262#define IS_CASEFOLDED(inode) ((inode)->i_flags & S_CASEFOLD)
5585f2af 2263#define IS_VERITY(inode) ((inode)->i_flags & S_VERITY)
bbc1096a 2264
787fb6bc
MS
2265#define IS_WHITEOUT(inode) (S_ISCHR(inode->i_mode) && \
2266 (inode)->i_rdev == WHITEOUT_DEV)
2267
4609e1f1 2268static inline bool HAS_UNMAPPED_ID(struct mnt_idmap *idmap,
ba73d987 2269 struct inode *inode)
0bd23d09 2270{
e67fe633
CB
2271 return !vfsuid_valid(i_uid_into_vfsuid(idmap, inode)) ||
2272 !vfsgid_valid(i_gid_into_vfsgid(idmap, inode));
0bd23d09
EB
2273}
2274
c75b1d94
JA
2275static inline void init_sync_kiocb(struct kiocb *kiocb, struct file *filp)
2276{
2277 *kiocb = (struct kiocb) {
2278 .ki_filp = filp,
164f4064 2279 .ki_flags = filp->f_iocb_flags,
20578bdf 2280 .ki_ioprio = get_current_ioprio(),
c75b1d94
JA
2281 };
2282}
2283
5dcdc43e
JX
2284static inline void kiocb_clone(struct kiocb *kiocb, struct kiocb *kiocb_src,
2285 struct file *filp)
2286{
2287 *kiocb = (struct kiocb) {
2288 .ki_filp = filp,
2289 .ki_flags = kiocb_src->ki_flags,
5dcdc43e
JX
2290 .ki_ioprio = kiocb_src->ki_ioprio,
2291 .ki_pos = kiocb_src->ki_pos,
2292 };
2293}
2294
1c0eeaf5 2295/*
250df6ed 2296 * Inode state bits. Protected by inode->i_lock
1c0eeaf5 2297 *
1e9d6333
EB
2298 * Four bits determine the dirty state of the inode: I_DIRTY_SYNC,
2299 * I_DIRTY_DATASYNC, I_DIRTY_PAGES, and I_DIRTY_TIME.
1c0eeaf5
JE
2300 *
2301 * Four bits define the lifetime of an inode. Initially, inodes are I_NEW,
2302 * until that flag is cleared. I_WILL_FREE, I_FREEING and I_CLEAR are set at
2303 * various stages of removing an inode.
2304 *
eaff8079 2305 * Two bits are used for locking and completion notification, I_NEW and I_SYNC.
1c0eeaf5 2306 *
e7ca2d41 2307 * I_DIRTY_SYNC Inode is dirty, but doesn't have to be written on
1e9d6333
EB
2308 * fdatasync() (unless I_DIRTY_DATASYNC is also set).
2309 * Timestamp updates are the usual cause.
2310 * I_DIRTY_DATASYNC Data-related inode changes pending. We keep track of
000cb48e
JK
2311 * these changes separately from I_DIRTY_SYNC so that we
2312 * don't have to write inode on fdatasync() when only
1e9d6333 2313 * e.g. the timestamps have changed.
1c0eeaf5 2314 * I_DIRTY_PAGES Inode has dirty pages. Inode itself may be clean.
cbfecb92 2315 * I_DIRTY_TIME The inode itself has dirty timestamps, and the
1e9d6333
EB
2316 * lazytime mount option is enabled. We keep track of this
2317 * separately from I_DIRTY_SYNC in order to implement
2318 * lazytime. This gets cleared if I_DIRTY_INODE
cbfecb92
LC
2319 * (I_DIRTY_SYNC and/or I_DIRTY_DATASYNC) gets set. But
2320 * I_DIRTY_TIME can still be set if I_DIRTY_SYNC is already
2321 * in place because writeback might already be in progress
2322 * and we don't want to lose the time update
eaff8079
CH
2323 * I_NEW Serves as both a mutex and completion notification.
2324 * New inodes set I_NEW. If two processes both create
2325 * the same inode, one of them will release its inode and
2326 * wait for I_NEW to be released before returning.
2327 * Inodes in I_WILL_FREE, I_FREEING or I_CLEAR state can
2328 * also cause waiting on I_NEW, without I_NEW actually
2329 * being set. find_inode() uses this to prevent returning
2330 * nearly-dead inodes.
1c0eeaf5
JE
2331 * I_WILL_FREE Must be set when calling write_inode_now() if i_count
2332 * is zero. I_FREEING must be set when I_WILL_FREE is
2333 * cleared.
2334 * I_FREEING Set when inode is about to be freed but still has dirty
2335 * pages or buffers attached or the inode itself is still
2336 * dirty.
dbd5768f
JK
2337 * I_CLEAR Added by clear_inode(). In this state the inode is
2338 * clean and can be destroyed. Inode keeps I_FREEING.
1c0eeaf5
JE
2339 *
2340 * Inodes that are I_WILL_FREE, I_FREEING or I_CLEAR are
2341 * prohibited for many purposes. iget() must wait for
2342 * the inode to be completely released, then create it
2343 * anew. Other functions will just ignore such inodes,
eaff8079 2344 * if appropriate. I_NEW is used for waiting.
1c0eeaf5 2345 *
169ebd90
JK
2346 * I_SYNC Writeback of inode is running. The bit is set during
2347 * data writeback, and cleared with a wakeup on the bit
2348 * address once it is done. The bit is also used to pin
2349 * the inode in memory for flusher thread.
1c0eeaf5 2350 *
bd5fe6c5
CH
2351 * I_REFERENCED Marks the inode as recently references on the LRU list.
2352 *
2353 * I_DIO_WAKEUP Never set. Only used as a key for wait_on_bit().
2354 *
682aa8e1
TH
2355 * I_WB_SWITCH Cgroup bdi_writeback switching in progress. Used to
2356 * synchronize competing switching instances and to tell
b93b0163 2357 * wb stat updates to grab the i_pages lock. See
a9519def 2358 * inode_switch_wbs_work_fn() for details.
682aa8e1 2359 *
ad0af710
AG
2360 * I_OVL_INUSE Used by overlayfs to get exclusive ownership on upper
2361 * and work dirs among overlayfs mounts.
2362 *
c2b6d621
AV
2363 * I_CREATING New object's inode in the middle of setting up.
2364 *
dae2f8ed
IW
2365 * I_DONTCACHE Evict inode as soon as it is not used anymore.
2366 *
5afced3b
JK
2367 * I_SYNC_QUEUED Inode is queued in b_io or b_more_io writeback lists.
2368 * Used to detect that mark_inode_dirty() should not move
2369 * inode between dirty lists.
2370 *
08276bda
DH
2371 * I_PINNING_FSCACHE_WB Inode is pinning an fscache object for writeback.
2372 *
1c0eeaf5 2373 * Q: What is the difference between I_WILL_FREE and I_FREEING?
1c0eeaf5 2374 */
9e38d86f
NP
2375#define I_DIRTY_SYNC (1 << 0)
2376#define I_DIRTY_DATASYNC (1 << 1)
2377#define I_DIRTY_PAGES (1 << 2)
eaff8079
CH
2378#define __I_NEW 3
2379#define I_NEW (1 << __I_NEW)
9e38d86f
NP
2380#define I_WILL_FREE (1 << 4)
2381#define I_FREEING (1 << 5)
2382#define I_CLEAR (1 << 6)
eaff8079 2383#define __I_SYNC 7
1c0eeaf5 2384#define I_SYNC (1 << __I_SYNC)
9e38d86f 2385#define I_REFERENCED (1 << 8)
bd5fe6c5 2386#define __I_DIO_WAKEUP 9
ac74d8d6 2387#define I_DIO_WAKEUP (1 << __I_DIO_WAKEUP)
f4e0c30c 2388#define I_LINKABLE (1 << 10)
0ae45f63 2389#define I_DIRTY_TIME (1 << 11)
682aa8e1 2390#define I_WB_SWITCH (1 << 13)
c2b6d621
AV
2391#define I_OVL_INUSE (1 << 14)
2392#define I_CREATING (1 << 15)
dae2f8ed 2393#define I_DONTCACHE (1 << 16)
5afced3b 2394#define I_SYNC_QUEUED (1 << 17)
c9c4ff12 2395#define I_PINNING_NETFS_WB (1 << 18)
1da177e4 2396
0e11f644
CH
2397#define I_DIRTY_INODE (I_DIRTY_SYNC | I_DIRTY_DATASYNC)
2398#define I_DIRTY (I_DIRTY_INODE | I_DIRTY_PAGES)
0ae45f63 2399#define I_DIRTY_ALL (I_DIRTY | I_DIRTY_TIME)
1da177e4
LT
2400
2401extern void __mark_inode_dirty(struct inode *, int);
2402static inline void mark_inode_dirty(struct inode *inode)
2403{
2404 __mark_inode_dirty(inode, I_DIRTY);
2405}
2406
2407static inline void mark_inode_dirty_sync(struct inode *inode)
2408{
2409 __mark_inode_dirty(inode, I_DIRTY_SYNC);
2410}
2411
ed296c6c
EB
2412/*
2413 * Returns true if the given inode itself only has dirty timestamps (its pages
2414 * may still be dirty) and isn't currently being allocated or freed.
2415 * Filesystems should call this if when writing an inode when lazytime is
2416 * enabled, they want to opportunistically write the timestamps of other inodes
2417 * located very nearby on-disk, e.g. in the same inode block. This returns true
2418 * if the given inode is in need of such an opportunistic update. Requires
2419 * i_lock, or at least later re-checking under i_lock.
2420 */
2421static inline bool inode_is_dirtytime_only(struct inode *inode)
2422{
2423 return (inode->i_state & (I_DIRTY_TIME | I_NEW |
2424 I_FREEING | I_WILL_FREE)) == I_DIRTY_TIME;
2425}
2426
7ada4db8
MS
2427extern void inc_nlink(struct inode *inode);
2428extern void drop_nlink(struct inode *inode);
2429extern void clear_nlink(struct inode *inode);
2430extern void set_nlink(struct inode *inode, unsigned int nlink);
d8c76e6f
DH
2431
2432static inline void inode_inc_link_count(struct inode *inode)
2433{
2434 inc_nlink(inode);
66d21730
AD
2435 mark_inode_dirty(inode);
2436}
2437
9a53c3a7
DH
2438static inline void inode_dec_link_count(struct inode *inode)
2439{
2440 drop_nlink(inode);
66d21730
AD
2441 mark_inode_dirty(inode);
2442}
2443
c3b2da31
JB
2444enum file_time_flags {
2445 S_ATIME = 1,
2446 S_MTIME = 2,
2447 S_CTIME = 4,
2448 S_VERSION = 8,
2449};
2450
c6718543 2451extern bool atime_needs_update(const struct path *, struct inode *);
badcf2b7 2452extern void touch_atime(const struct path *);
913e9928 2453int inode_update_time(struct inode *inode, int flags);
e60feb44 2454
1da177e4
LT
2455static inline void file_accessed(struct file *file)
2456{
2457 if (!(file->f_flags & O_NOATIME))
68ac1234 2458 touch_atime(&file->f_path);
1da177e4
LT
2459}
2460
e38f7f53 2461extern int file_modified(struct file *file);
66fa3ced 2462int kiocb_modified(struct kiocb *iocb);
e38f7f53 2463
c3765016 2464int sync_inode_metadata(struct inode *inode, int wait);
1da177e4 2465
1da177e4
LT
2466struct file_system_type {
2467 const char *name;
2468 int fs_flags;
bbc1096a
DH
2469#define FS_REQUIRES_DEV 1
2470#define FS_BINARY_MOUNTDATA 2
2471#define FS_HAS_SUBTYPE 4
0c55cfc4 2472#define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */
0b3b094a 2473#define FS_DISALLOW_NOTIFY_PERM 16 /* Disable fanotify permission events */
a6435940 2474#define FS_ALLOW_IDMAP 32 /* FS has been updated to handle vfs idmappings. */
bbc1096a 2475#define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */
f3a09c92 2476 int (*init_fs_context)(struct fs_context *);
d7167b14 2477 const struct fs_parameter_spec *parameters;
c96e41e9
AV
2478 struct dentry *(*mount) (struct file_system_type *, int,
2479 const char *, void *);
1da177e4
LT
2480 void (*kill_sb) (struct super_block *);
2481 struct module *owner;
2482 struct file_system_type * next;
a5166169 2483 struct hlist_head fs_supers;
d475fd42 2484
cf516249 2485 struct lock_class_key s_lock_key;
897c6ff9 2486 struct lock_class_key s_umount_key;
51ee049e 2487 struct lock_class_key s_vfs_rename_key;
5accdf82 2488 struct lock_class_key s_writers_key[SB_FREEZE_LEVELS];
d475fd42
PZ
2489
2490 struct lock_class_key i_lock_key;
2491 struct lock_class_key i_mutex_key;
730633f0 2492 struct lock_class_key invalidate_lock_key;
14358e6d 2493 struct lock_class_key i_mutex_dir_key;
1da177e4
LT
2494};
2495
7f78e035
EB
2496#define MODULE_ALIAS_FS(NAME) MODULE_ALIAS("fs-" NAME)
2497
152a0836
AV
2498extern struct dentry *mount_bdev(struct file_system_type *fs_type,
2499 int flags, const char *dev_name, void *data,
2500 int (*fill_super)(struct super_block *, void *, int));
fc14f2fe
AV
2501extern struct dentry *mount_single(struct file_system_type *fs_type,
2502 int flags, void *data,
2503 int (*fill_super)(struct super_block *, void *, int));
3c26ff6e
AV
2504extern struct dentry *mount_nodev(struct file_system_type *fs_type,
2505 int flags, void *data,
2506 int (*fill_super)(struct super_block *, void *, int));
ea441d11 2507extern struct dentry *mount_subtree(struct vfsmount *mnt, const char *path);
04b94071 2508void retire_super(struct super_block *sb);
1da177e4
LT
2509void generic_shutdown_super(struct super_block *sb);
2510void kill_block_super(struct super_block *sb);
2511void kill_anon_super(struct super_block *sb);
2512void kill_litter_super(struct super_block *sb);
2513void deactivate_super(struct super_block *sb);
74dbbdd7 2514void deactivate_locked_super(struct super_block *sb);
1da177e4 2515int set_anon_super(struct super_block *s, void *data);
cb50b348 2516int set_anon_super_fc(struct super_block *s, struct fs_context *fc);
0ee5dc67
AV
2517int get_anon_bdev(dev_t *);
2518void free_anon_bdev(dev_t);
cb50b348
AV
2519struct super_block *sget_fc(struct fs_context *fc,
2520 int (*test)(struct super_block *, struct fs_context *),
2521 int (*set)(struct super_block *, struct fs_context *));
1da177e4
LT
2522struct super_block *sget(struct file_system_type *type,
2523 int (*test)(struct super_block *,void *),
2524 int (*set)(struct super_block *,void *),
9249e17f 2525 int flags, void *data);
69881be3 2526struct super_block *sget_dev(struct fs_context *fc, dev_t dev);
1da177e4
LT
2527
2528/* Alas, no aliases. Too much hassle with bringing module.h everywhere */
2529#define fops_get(fops) \
2530 (((fops) && try_module_get((fops)->owner) ? (fops) : NULL))
2531#define fops_put(fops) \
2532 do { if (fops) module_put((fops)->owner); } while(0)
e84f9e57
AV
2533/*
2534 * This one is to be used *ONLY* from ->open() instances.
2535 * fops must be non-NULL, pinned down *and* module dependencies
2536 * should be sufficient to pin the caller down as well.
2537 */
2538#define replace_fops(f, fops) \
2539 do { \
2540 struct file *__file = (f); \
2541 fops_put(__file->f_op); \
2542 BUG_ON(!(__file->f_op = (fops))); \
2543 } while(0)
1da177e4
LT
2544
2545extern int register_filesystem(struct file_system_type *);
2546extern int unregister_filesystem(struct file_system_type *);
f0bb5aaf 2547extern int vfs_statfs(const struct path *, struct kstatfs *);
c8b91acc
AV
2548extern int user_statfs(const char __user *, struct kstatfs *);
2549extern int fd_statfs(int, struct kstatfs *);
880b9577
DW
2550int freeze_super(struct super_block *super, enum freeze_holder who);
2551int thaw_super(struct super_block *super, enum freeze_holder who);
fca39346
JK
2552extern __printf(2, 3)
2553int super_setup_bdi_name(struct super_block *sb, char *fmt, ...);
2554extern int super_setup_bdi(struct super_block *sb);
1da177e4 2555
a4af51ce
KO
2556static inline void super_set_uuid(struct super_block *sb, const u8 *uuid, unsigned len)
2557{
2558 if (WARN_ON(len > sizeof(sb->s_uuid)))
2559 len = sizeof(sb->s_uuid);
2560 sb->s_uuid_len = len;
2561 memcpy(&sb->s_uuid, uuid, len);
2562}
2563
ae8c5117
KO
2564/* set sb sysfs name based on sb->s_bdev */
2565static inline void super_set_sysfs_name_bdev(struct super_block *sb)
2566{
2567 snprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), "%pg", sb->s_bdev);
2568}
2569
2570/* set sb sysfs name based on sb->s_uuid */
2571static inline void super_set_sysfs_name_uuid(struct super_block *sb)
2572{
2573 WARN_ON(sb->s_uuid_len != sizeof(sb->s_uuid));
2574 snprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), "%pU", sb->s_uuid.b);
2575}
2576
2577/* set sb sysfs name based on sb->s_id */
2578static inline void super_set_sysfs_name_id(struct super_block *sb)
2579{
2580 strscpy(sb->s_sysfs_name, sb->s_id, sizeof(sb->s_sysfs_name));
2581}
2582
2583/* try to use something standard before you use this */
2584__printf(2, 3)
2585static inline void super_set_sysfs_name_generic(struct super_block *sb, const char *fmt, ...)
2586{
2587 va_list args;
2588
2589 va_start(args, fmt);
2590 vsnprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), fmt, args);
2591 va_end(args);
2592}
2593
ce3b0f8d
AV
2594extern int current_umask(void);
2595
5a14696c
BF
2596extern void ihold(struct inode * inode);
2597extern void iput(struct inode *);
541d4c79
JL
2598int inode_update_timestamps(struct inode *inode, int flags);
2599int generic_update_time(struct inode *, int);
5a14696c 2600
f87fd4c2 2601/* /sys/fs */
00d26666 2602extern struct kobject *fs_kobj;
f87fd4c2 2603
09cbfeaf 2604#define MAX_RW_COUNT (INT_MAX & PAGE_MASK)
bfcd17a6 2605
1da177e4 2606/* fs/open.c */
adb5c247 2607struct audit_names;
91a27b2a 2608struct filename {
adb5c247
JL
2609 const char *name; /* pointer to actual string */
2610 const __user char *uptr; /* original userland pointer */
03adc61e 2611 atomic_t refcnt;
1c949843 2612 struct audit_names *aname;
fd2f7cb5 2613 const char iname[];
91a27b2a 2614};
f1fffbd4 2615static_assert(offsetof(struct filename, iname) % sizeof(long) == 0);
1da177e4 2616
4a00c673 2617static inline struct mnt_idmap *file_mnt_idmap(const struct file *file)
256c8aed
CB
2618{
2619 return mnt_idmap(file->f_path.mnt);
2620}
2621
bb49e9e7
CB
2622/**
2623 * is_idmapped_mnt - check whether a mount is mapped
2624 * @mnt: the mount to check
2625 *
256c8aed 2626 * If @mnt has an non @nop_mnt_idmap attached to it then @mnt is mapped.
bb49e9e7
CB
2627 *
2628 * Return: true if mount is mapped, false if not.
2629 */
2630static inline bool is_idmapped_mnt(const struct vfsmount *mnt)
2631{
256c8aed 2632 return mnt_idmap(mnt) != &nop_mnt_idmap;
bb49e9e7
CB
2633}
2634
7df818b2 2635extern long vfs_truncate(const struct path *, loff_t);
abf08576 2636int do_truncate(struct mnt_idmap *, struct dentry *, loff_t start,
643fe55a 2637 unsigned int time_attrs, struct file *filp);
72c72bdf 2638extern int vfs_fallocate(struct file *file, int mode, loff_t offset,
3e63cbb1 2639 loff_t len);
8e8a1407 2640extern long do_sys_open(int dfd, const char __user *filename, int flags,
a218d0fd 2641 umode_t mode);
669abf4e 2642extern struct file *file_open_name(struct filename *, int, umode_t);
a218d0fd 2643extern struct file *filp_open(const char *, int, umode_t);
ffb37ca3 2644extern struct file *file_open_root(const struct path *,
378c6520 2645 const char *, int, umode_t);
ffb37ca3
AV
2646static inline struct file *file_open_root_mnt(struct vfsmount *mnt,
2647 const char *name, int flags, umode_t mode)
2648{
2649 return file_open_root(&(struct path){.mnt = mnt, .dentry = mnt->mnt_root},
2650 name, flags, mode);
2651}
62d53c4a
AG
2652struct file *dentry_open(const struct path *path, int flags,
2653 const struct cred *creds);
2654struct file *dentry_create(const struct path *path, int flags, umode_t mode,
2655 const struct cred *cred);
def3ae83 2656struct path *backing_file_user_path(struct file *f);
62d53c4a
AG
2657
2658/*
08582d67
AG
2659 * When mmapping a file on a stackable filesystem (e.g., overlayfs), the file
2660 * stored in ->vm_file is a backing file whose f_inode is on the underlying
3efdc78f
AV
2661 * filesystem. When the mapped file path and inode number are displayed to
2662 * user (e.g. via /proc/<pid>/maps), these helpers should be used to get the
2663 * path and inode number to display to the user, which is the path of the fd
2664 * that user has requested to map and the inode number that would be returned
2665 * by fstat() on that same fd.
08582d67 2666 */
3efdc78f 2667/* Get the path to display in /proc/<pid>/maps */
08582d67 2668static inline const struct path *file_user_path(struct file *f)
62d53c4a
AG
2669{
2670 if (unlikely(f->f_mode & FMODE_BACKING))
def3ae83 2671 return backing_file_user_path(f);
62d53c4a
AG
2672 return &f->f_path;
2673}
3efdc78f
AV
2674/* Get the inode whose inode number to display in /proc/<pid>/maps */
2675static inline const struct inode *file_user_inode(struct file *f)
2676{
2677 if (unlikely(f->f_mode & FMODE_BACKING))
2678 return d_inode(backing_file_user_path(f)->dentry);
2679 return file_inode(f);
2680}
62d53c4a 2681
19f391eb
AV
2682static inline struct file *file_clone_open(struct file *file)
2683{
2684 return dentry_open(&file->f_path, file->f_flags, file->f_cred);
2685}
1da177e4 2686extern int filp_close(struct file *, fl_owner_t id);
91a27b2a 2687
51f39a1f 2688extern struct filename *getname_flags(const char __user *, int, int *);
8228e2c3 2689extern struct filename *getname_uflags(const char __user *, int);
91a27b2a 2690extern struct filename *getname(const char __user *);
c4ad8f98 2691extern struct filename *getname_kernel(const char *);
55422d0b 2692extern void putname(struct filename *name);
91a27b2a 2693
30d90494 2694extern int finish_open(struct file *file, struct dentry *dentry,
be12af3e 2695 int (*open)(struct inode *, struct file *));
e45198a6 2696extern int finish_no_open(struct file *file, struct dentry *dentry);
1da177e4 2697
9751b338
MS
2698/* Helper for the simple case when original dentry is used */
2699static inline int finish_open_simple(struct file *file, int error)
2700{
2701 if (error)
2702 return error;
2703
2704 return finish_open(file, file->f_path.dentry, NULL);
2705}
2706
1da177e4
LT
2707/* fs/dcache.c */
2708extern void __init vfs_caches_init_early(void);
4248b0da 2709extern void __init vfs_caches_init(void);
1da177e4 2710
b86c089b
CL
2711extern struct kmem_cache *names_cachep;
2712
a608ca21 2713#define __getname() kmem_cache_alloc(names_cachep, GFP_KERNEL)
3446a8aa 2714#define __putname(name) kmem_cache_free(names_cachep, (void *)(name))
1da177e4 2715
a212b105 2716extern struct super_block *blockdev_superblock;
a212b105
TH
2717static inline bool sb_is_blkdev_sb(struct super_block *sb)
2718{
dd0dca22 2719 return IS_ENABLED(CONFIG_BLOCK) && sb == blockdev_superblock;
47e4491b 2720}
5c0d6b60 2721
b818f09e 2722void emergency_thaw_all(void);
60b0680f 2723extern int sync_filesystem(struct super_block *);
9361401e 2724extern const struct file_operations def_blk_fops;
4b6f5d20 2725extern const struct file_operations def_chr_fops;
1da177e4
LT
2726
2727/* fs/char_dev.c */
8a932f73 2728#define CHRDEV_MAJOR_MAX 512
49db08c3
LW
2729/* Marks the bottom of the first segment of free char majors */
2730#define CHRDEV_MAJOR_DYN_END 234
a5d31a3f
LG
2731/* Marks the top and bottom of the second segment of free char majors */
2732#define CHRDEV_MAJOR_DYN_EXT_START 511
2733#define CHRDEV_MAJOR_DYN_EXT_END 384
2734
1da177e4
LT
2735extern int alloc_chrdev_region(dev_t *, unsigned, unsigned, const char *);
2736extern int register_chrdev_region(dev_t, unsigned, const char *);
1905b1bf
TH
2737extern int __register_chrdev(unsigned int major, unsigned int baseminor,
2738 unsigned int count, const char *name,
2739 const struct file_operations *fops);
2740extern void __unregister_chrdev(unsigned int major, unsigned int baseminor,
2741 unsigned int count, const char *name);
1da177e4 2742extern void unregister_chrdev_region(dev_t, unsigned);
68eef3b4 2743extern void chrdev_show(struct seq_file *,off_t);
1da177e4 2744
1905b1bf
TH
2745static inline int register_chrdev(unsigned int major, const char *name,
2746 const struct file_operations *fops)
2747{
2748 return __register_chrdev(major, 0, 256, name, fops);
2749}
2750
2751static inline void unregister_chrdev(unsigned int major, const char *name)
2752{
2753 __unregister_chrdev(major, 0, 256, name);
2754}
2755
1da177e4
LT
2756extern void init_special_inode(struct inode *, umode_t, dev_t);
2757
2758/* Invalid inode operations -- fs/bad_inode.c */
2759extern void make_bad_inode(struct inode *);
0e3ef1fe 2760extern bool is_bad_inode(struct inode *);
1da177e4 2761
a823e458
JL
2762extern int __must_check file_fdatawait_range(struct file *file, loff_t lstart,
2763 loff_t lend);
5660e13d
JL
2764extern int __must_check file_check_and_advance_wb_err(struct file *file);
2765extern int __must_check file_write_and_wait_range(struct file *file,
2766 loff_t start, loff_t end);
2767
a823e458
JL
2768static inline int file_write_and_wait(struct file *file)
2769{
2770 return file_write_and_wait_range(file, 0, LLONG_MAX);
2771}
2772
8018ab05
CH
2773extern int vfs_fsync_range(struct file *file, loff_t start, loff_t end,
2774 int datasync);
2775extern int vfs_fsync(struct file *file, int datasync);
e2592217 2776
22f96b38
JA
2777extern int sync_file_range(struct file *file, loff_t offset, loff_t nbytes,
2778 unsigned int flags);
2779
91b94c5d
AV
2780static inline bool iocb_is_dsync(const struct kiocb *iocb)
2781{
2782 return (iocb->ki_flags & IOCB_DSYNC) ||
2783 IS_SYNC(iocb->ki_filp->f_mapping->host);
2784}
2785
e2592217
CH
2786/*
2787 * Sync the bytes written if this was a synchronous write. Expect ki_pos
2788 * to already be updated for the write, and will return either the amount
2789 * of bytes passed in, or an error if syncing the file failed.
2790 */
2791static inline ssize_t generic_write_sync(struct kiocb *iocb, ssize_t count)
2792{
91b94c5d 2793 if (iocb_is_dsync(iocb)) {
e2592217
CH
2794 int ret = vfs_fsync_range(iocb->ki_filp,
2795 iocb->ki_pos - count, iocb->ki_pos - 1,
2796 (iocb->ki_flags & IOCB_SYNC) ? 0 : 1);
2797 if (ret)
2798 return ret;
2799 }
2800
2801 return count;
d311d79d 2802}
e2592217 2803
1da177e4
LT
2804extern void emergency_sync(void);
2805extern void emergency_remount(void);
30460e1e 2806
9361401e 2807#ifdef CONFIG_BLOCK
30460e1e
CM
2808extern int bmap(struct inode *inode, sector_t *block);
2809#else
2810static inline int bmap(struct inode *inode, sector_t *block)
2811{
2812 return -EINVAL;
2813}
9361401e 2814#endif
30460e1e 2815
abf08576 2816int notify_change(struct mnt_idmap *, struct dentry *,
2f221d6f 2817 struct iattr *, struct inode **);
4609e1f1
CB
2818int inode_permission(struct mnt_idmap *, struct inode *, int);
2819int generic_permission(struct mnt_idmap *, struct inode *, int);
02f92b38
CB
2820static inline int file_permission(struct file *file, int mask)
2821{
4609e1f1 2822 return inode_permission(file_mnt_idmap(file),
47291baa 2823 file_inode(file), mask);
02f92b38
CB
2824}
2825static inline int path_permission(const struct path *path, int mask)
2826{
4609e1f1 2827 return inode_permission(mnt_idmap(path->mnt),
47291baa 2828 d_inode(path->dentry), mask);
02f92b38 2829}
9452e93e 2830int __check_sticky(struct mnt_idmap *idmap, struct inode *dir,
ba73d987 2831 struct inode *inode);
1da177e4 2832
f696a365
MS
2833static inline bool execute_ok(struct inode *inode)
2834{
2835 return (inode->i_mode & S_IXUGO) || S_ISDIR(inode->i_mode);
2836}
2837
6e3e2c43
AV
2838static inline bool inode_wrong_type(const struct inode *inode, umode_t mode)
2839{
2840 return (inode->i_mode ^ mode) & S_IFMT;
2841}
2842
f6c05b9e
AG
2843/**
2844 * file_start_write - get write access to a superblock for regular file io
2845 * @file: the file we want to write to
2846 *
2847 * This is a variant of sb_start_write() which is a noop on non-regualr file.
2848 * Should be matched with a call to file_end_write().
2849 */
8d71db4f
AV
2850static inline void file_start_write(struct file *file)
2851{
2852 if (!S_ISREG(file_inode(file)->i_mode))
2853 return;
8a3c84b6 2854 sb_start_write(file_inode(file)->i_sb);
8d71db4f
AV
2855}
2856
5ae98f15
JK
2857static inline bool file_start_write_trylock(struct file *file)
2858{
2859 if (!S_ISREG(file_inode(file)->i_mode))
2860 return true;
8a3c84b6 2861 return sb_start_write_trylock(file_inode(file)->i_sb);
5ae98f15
JK
2862}
2863
f6c05b9e
AG
2864/**
2865 * file_end_write - drop write access to a superblock of a regular file
2866 * @file: the file we wrote to
2867 *
2868 * Should be matched with a call to file_start_write().
2869 */
8d71db4f
AV
2870static inline void file_end_write(struct file *file)
2871{
2872 if (!S_ISREG(file_inode(file)->i_mode))
2873 return;
f6c05b9e 2874 sb_end_write(file_inode(file)->i_sb);
8d71db4f 2875}
bfe219d3 2876
ed0360bb
AG
2877/**
2878 * kiocb_start_write - get write access to a superblock for async file io
2879 * @iocb: the io context we want to submit the write with
2880 *
2881 * This is a variant of sb_start_write() for async io submission.
2882 * Should be matched with a call to kiocb_end_write().
2883 */
2884static inline void kiocb_start_write(struct kiocb *iocb)
2885{
2886 struct inode *inode = file_inode(iocb->ki_filp);
2887
2888 sb_start_write(inode->i_sb);
2889 /*
2890 * Fool lockdep by telling it the lock got released so that it
2891 * doesn't complain about the held lock when we return to userspace.
2892 */
2893 __sb_writers_release(inode->i_sb, SB_FREEZE_WRITE);
2894}
2895
2896/**
2897 * kiocb_end_write - drop write access to a superblock after async file io
2898 * @iocb: the io context we sumbitted the write with
2899 *
2900 * Should be matched with a call to kiocb_start_write().
2901 */
2902static inline void kiocb_end_write(struct kiocb *iocb)
2903{
2904 struct inode *inode = file_inode(iocb->ki_filp);
2905
2906 /*
2907 * Tell lockdep we inherited freeze protection from submission thread.
2908 */
2909 __sb_writers_acquired(inode->i_sb, SB_FREEZE_WRITE);
2910 sb_end_write(inode->i_sb);
8d71db4f 2911}
bfe219d3 2912
07b8ce1e 2913/*
592ca09b
DH
2914 * This is used for regular files where some users -- especially the
2915 * currently executed binary in a process, previously handled via
2916 * VM_DENYWRITE -- cannot handle concurrent write (and maybe mmap
2917 * read-write shared) accesses.
2918 *
07b8ce1e
AV
2919 * get_write_access() gets write permission for a file.
2920 * put_write_access() releases this write permission.
592ca09b
DH
2921 * deny_write_access() denies write access to a file.
2922 * allow_write_access() re-enables write access to a file.
2923 *
2924 * The i_writecount field of an inode can have the following values:
2925 * 0: no write access, no denied write access
2926 * < 0: (-i_writecount) users that denied write access to the file.
2927 * > 0: (i_writecount) users that have write access to the file.
07b8ce1e
AV
2928 *
2929 * Normally we operate on that counter with atomic_{inc,dec} and it's safe
2930 * except for the cases where we don't hold i_writecount yet. Then we need to
2931 * use {get,deny}_write_access() - these functions check the sign and refuse
2932 * to do the change if sign is wrong.
2933 */
2934static inline int get_write_access(struct inode *inode)
2935{
2936 return atomic_inc_unless_negative(&inode->i_writecount) ? 0 : -ETXTBSY;
2937}
2938static inline int deny_write_access(struct file *file)
2939{
496ad9aa 2940 struct inode *inode = file_inode(file);
07b8ce1e
AV
2941 return atomic_dec_unless_positive(&inode->i_writecount) ? 0 : -ETXTBSY;
2942}
1da177e4
LT
2943static inline void put_write_access(struct inode * inode)
2944{
2945 atomic_dec(&inode->i_writecount);
2946}
2947static inline void allow_write_access(struct file *file)
2948{
2949 if (file)
496ad9aa 2950 atomic_inc(&file_inode(file)->i_writecount);
1da177e4 2951}
f1fe29b4
DH
2952static inline bool inode_is_open_for_write(const struct inode *inode)
2953{
2954 return atomic_read(&inode->i_writecount) > 0;
2955}
2956
387e3746 2957#if defined(CONFIG_IMA) || defined(CONFIG_FILE_LOCKING)
a5c96ebf
MZ
2958static inline void i_readcount_dec(struct inode *inode)
2959{
45e0d4b9 2960 BUG_ON(atomic_dec_return(&inode->i_readcount) < 0);
a5c96ebf
MZ
2961}
2962static inline void i_readcount_inc(struct inode *inode)
2963{
2964 atomic_inc(&inode->i_readcount);
2965}
2966#else
2967static inline void i_readcount_dec(struct inode *inode)
2968{
2969 return;
2970}
2971static inline void i_readcount_inc(struct inode *inode)
2972{
2973 return;
2974}
2975#endif
ed8cae8b 2976extern int do_pipe_flags(int *, int);
1da177e4 2977
bdd1d2d3 2978extern ssize_t kernel_read(struct file *, void *, size_t, loff_t *);
61a707c5 2979ssize_t __kernel_read(struct file *file, void *buf, size_t count, loff_t *pos);
e13ec939 2980extern ssize_t kernel_write(struct file *, const void *, size_t, loff_t *);
73e18f7c 2981extern ssize_t __kernel_write(struct file *, const void *, size_t, loff_t *);
1da177e4
LT
2982extern struct file * open_exec(const char *);
2983
2984/* fs/dcache.c -- generic fs support functions */
a6e5787f 2985extern bool is_subdir(struct dentry *, struct dentry *);
640eb7e7 2986extern bool path_is_under(const struct path *, const struct path *);
1da177e4 2987
9bf39ab2
MS
2988extern char *file_path(struct file *, char *, int);
2989
42c3732f
CL
2990/**
2991 * is_dot_dotdot - returns true only if @name is "." or ".."
2992 * @name: file name to check
2993 * @len: length of file name, in bytes
2994 */
2995static inline bool is_dot_dotdot(const char *name, size_t len)
2996{
2997 return len && unlikely(name[0] == '.') &&
2998 (len == 1 || (len == 2 && name[1] == '.'));
2999}
3000
1da177e4
LT
3001#include <linux/err.h>
3002
3003/* needed for stackable file system support */
965c8e59 3004extern loff_t default_llseek(struct file *file, loff_t offset, int whence);
1da177e4 3005
965c8e59 3006extern loff_t vfs_llseek(struct file *file, loff_t offset, int whence);
1da177e4 3007
54e34621 3008extern int inode_init_always(struct super_block *, struct inode *);
1da177e4 3009extern void inode_init_once(struct inode *);
2aa15890 3010extern void address_space_init_once(struct address_space *mapping);
1da177e4
LT
3011extern struct inode * igrab(struct inode *);
3012extern ino_t iunique(struct super_block *, ino_t);
3013extern int inode_needs_sync(struct inode *inode);
45321ac5 3014extern int generic_delete_inode(struct inode *inode);
9bcb4b73
AV
3015static inline int generic_drop_inode(struct inode *inode)
3016{
88149082 3017 return !inode->i_nlink || inode_unhashed(inode);
9bcb4b73 3018}
2c567af4 3019extern void d_mark_dontcache(struct inode *inode);
1da177e4 3020
88bd5121
AA
3021extern struct inode *ilookup5_nowait(struct super_block *sb,
3022 unsigned long hashval, int (*test)(struct inode *, void *),
3023 void *data);
1da177e4
LT
3024extern struct inode *ilookup5(struct super_block *sb, unsigned long hashval,
3025 int (*test)(struct inode *, void *), void *data);
3026extern struct inode *ilookup(struct super_block *sb, unsigned long ino);
3027
80ea09a0
MS
3028extern struct inode *inode_insert5(struct inode *inode, unsigned long hashval,
3029 int (*test)(struct inode *, void *),
3030 int (*set)(struct inode *, void *),
3031 void *data);
1da177e4
LT
3032extern struct inode * iget5_locked(struct super_block *, unsigned long, int (*test)(struct inode *, void *), int (*set)(struct inode *, void *), void *);
3033extern struct inode * iget_locked(struct super_block *, unsigned long);
fe032c42
TT
3034extern struct inode *find_inode_nowait(struct super_block *,
3035 unsigned long,
3036 int (*match)(struct inode *,
3037 unsigned long, void *),
3038 void *data);
3f19b2ab
DH
3039extern struct inode *find_inode_rcu(struct super_block *, unsigned long,
3040 int (*)(struct inode *, void *), void *);
3041extern struct inode *find_inode_by_ino_rcu(struct super_block *, unsigned long);
261bca86
AV
3042extern int insert_inode_locked4(struct inode *, unsigned long, int (*test)(struct inode *, void *), void *);
3043extern int insert_inode_locked(struct inode *);
e096d0c7
JB
3044#ifdef CONFIG_DEBUG_LOCK_ALLOC
3045extern void lockdep_annotate_inode_mutex_key(struct inode *inode);
3046#else
3047static inline void lockdep_annotate_inode_mutex_key(struct inode *inode) { };
3048#endif
1da177e4 3049extern void unlock_new_inode(struct inode *);
c2b6d621 3050extern void discard_new_inode(struct inode *);
85fe4025 3051extern unsigned int get_next_ino(void);
799ea9e9 3052extern void evict_inodes(struct super_block *sb);
3e9d80a8 3053void dump_mapping(const struct address_space *);
1da177e4 3054
e809d5f0 3055/*
b6334e2c 3056 * Userspace may rely on the inode number being non-zero. For example, glibc
e809d5f0
CD
3057 * simply ignores files with zero i_ino in unlink() and other places.
3058 *
3059 * As an additional complication, if userspace was compiled with
3060 * _FILE_OFFSET_BITS=32 on a 64-bit kernel we'll only end up reading out the
3061 * lower 32 bits, so we need to check that those aren't zero explicitly. With
3062 * _FILE_OFFSET_BITS=64, this may cause some harmless false-negatives, but
3063 * better safe than sorry.
3064 */
3065static inline bool is_zero_ino(ino_t ino)
3066{
3067 return (u32)ino == 0;
3068}
3069
1da177e4 3070extern void __iget(struct inode * inode);
b46980fe 3071extern void iget_failed(struct inode *);
dbd5768f 3072extern void clear_inode(struct inode *);
2e00c97e 3073extern void __destroy_inode(struct inode *);
a209dfc7
ED
3074extern struct inode *new_inode_pseudo(struct super_block *sb);
3075extern struct inode *new_inode(struct super_block *sb);
ff0c7d15 3076extern void free_inode_nonrcu(struct inode *inode);
9452e93e 3077extern int setattr_should_drop_suidgid(struct mnt_idmap *, struct inode *);
66a67c86 3078extern int file_remove_privs_flags(struct file *file, unsigned int flags);
5fa8e0a1 3079extern int file_remove_privs(struct file *);
4f704d9a
CB
3080int setattr_should_drop_sgid(struct mnt_idmap *idmap,
3081 const struct inode *inode);
1da177e4 3082
8b9f3ac5
MS
3083/*
3084 * This must be used for allocating filesystems specific inodes to set
3085 * up the inode reclaim context correctly.
3086 */
a5674119 3087#define alloc_inode_sb(_sb, _cache, _gfp) kmem_cache_alloc_lru(_cache, &_sb->s_inode_lru, _gfp)
8b9f3ac5 3088
1da177e4 3089extern void __insert_inode_hash(struct inode *, unsigned long hashval);
646ec461
CH
3090static inline void insert_inode_hash(struct inode *inode)
3091{
1da177e4
LT
3092 __insert_inode_hash(inode, inode->i_ino);
3093}
f2ee7abf
ED
3094
3095extern void __remove_inode_hash(struct inode *);
3096static inline void remove_inode_hash(struct inode *inode)
3097{
cbedaac6 3098 if (!inode_unhashed(inode) && !hlist_fake(&inode->i_hash))
f2ee7abf
ED
3099 __remove_inode_hash(inode);
3100}
3101
646ec461 3102extern void inode_sb_list_add(struct inode *inode);
51b8c1fe 3103extern void inode_add_lru(struct inode *inode);
1da177e4 3104
1da177e4
LT
3105extern int sb_set_blocksize(struct super_block *, int);
3106extern int sb_min_blocksize(struct super_block *, int);
3107
3108extern int generic_file_mmap(struct file *, struct vm_area_struct *);
3109extern int generic_file_readonly_mmap(struct file *, struct vm_area_struct *);
3309dd04 3110extern ssize_t generic_write_checks(struct kiocb *, struct iov_iter *);
f6f7a25a 3111int generic_write_checks_count(struct kiocb *iocb, loff_t *count);
02e83f46
DW
3112extern int generic_write_check_limits(struct file *file, loff_t pos,
3113 loff_t *count);
a3171351 3114extern int generic_file_rw_checks(struct file *file_in, struct file *file_out);
87fa0f3e
CH
3115ssize_t filemap_read(struct kiocb *iocb, struct iov_iter *to,
3116 ssize_t already_read);
ed978a81 3117extern ssize_t generic_file_read_iter(struct kiocb *, struct iov_iter *);
8174202b 3118extern ssize_t __generic_file_write_iter(struct kiocb *, struct iov_iter *);
8174202b 3119extern ssize_t generic_file_write_iter(struct kiocb *, struct iov_iter *);
1af5bb49 3120extern ssize_t generic_file_direct_write(struct kiocb *, struct iov_iter *);
800ba295 3121ssize_t generic_perform_write(struct kiocb *, struct iov_iter *);
44fff0fa
CH
3122ssize_t direct_write_fallback(struct kiocb *iocb, struct iov_iter *iter,
3123 ssize_t direct_written, ssize_t buffered_written);
88e6faef 3124
18e9710e 3125ssize_t vfs_iter_read(struct file *file, struct iov_iter *iter, loff_t *ppos,
ddef7ed2 3126 rwf_t flags);
abbb6589 3127ssize_t vfs_iter_write(struct file *file, struct iov_iter *iter, loff_t *ppos,
ddef7ed2 3128 rwf_t flags);
5dcdc43e
JX
3129ssize_t vfs_iocb_iter_read(struct file *file, struct kiocb *iocb,
3130 struct iov_iter *iter);
3131ssize_t vfs_iocb_iter_write(struct file *file, struct kiocb *iocb,
3132 struct iov_iter *iter);
dbe4e192 3133
88e6faef 3134/* fs/splice.c */
07073eb0
DH
3135ssize_t filemap_splice_read(struct file *in, loff_t *ppos,
3136 struct pipe_inode_info *pipe,
3137 size_t len, unsigned int flags);
69df79a4
DH
3138ssize_t copy_splice_read(struct file *in, loff_t *ppos,
3139 struct pipe_inode_info *pipe,
3140 size_t len, unsigned int flags);
8d020765 3141extern ssize_t iter_file_splice_write(struct pipe_inode_info *,
cbb7e577 3142 struct file *, loff_t *, size_t, unsigned int);
1c118596 3143
88e6faef 3144
1da177e4
LT
3145extern void
3146file_ra_state_init(struct file_ra_state *ra, struct address_space *mapping);
965c8e59 3147extern loff_t noop_llseek(struct file *file, loff_t offset, int whence);
868941b1 3148#define no_llseek NULL
46a1c2c7 3149extern loff_t vfs_setpos(struct file *file, loff_t offset, loff_t maxsize);
965c8e59 3150extern loff_t generic_file_llseek(struct file *file, loff_t offset, int whence);
5760495a 3151extern loff_t generic_file_llseek_size(struct file *file, loff_t offset,
965c8e59 3152 int whence, loff_t maxsize, loff_t eof);
1bf9d14d
AV
3153extern loff_t fixed_size_llseek(struct file *file, loff_t offset,
3154 int whence, loff_t size);
b25472f9
AV
3155extern loff_t no_seek_end_llseek_size(struct file *, loff_t, int, loff_t);
3156extern loff_t no_seek_end_llseek(struct file *, loff_t, int);
87112933 3157int rw_verify_area(int, struct file *, const loff_t *, size_t);
1da177e4
LT
3158extern int generic_file_open(struct inode * inode, struct file * filp);
3159extern int nonseekable_open(struct inode * inode, struct file * filp);
10dce8af 3160extern int stream_open(struct inode * inode, struct file * filp);
1da177e4 3161
9361401e 3162#ifdef CONFIG_BLOCK
8a4c1e42 3163typedef void (dio_submit_t)(struct bio *bio, struct inode *inode,
facd07b0 3164 loff_t file_offset);
1da177e4
LT
3165
3166enum {
1e431f5c
CH
3167 /* need locking between buffered and direct access */
3168 DIO_LOCKING = 0x01,
3169
3170 /* filesystem does not support filling holes */
3171 DIO_SKIP_HOLES = 0x02,
1da177e4
LT
3172};
3173
17f8c842
OS
3174ssize_t __blockdev_direct_IO(struct kiocb *iocb, struct inode *inode,
3175 struct block_device *bdev, struct iov_iter *iter,
c8b8e32d 3176 get_block_t get_block,
0aaf08de 3177 dio_iodone_t end_io,
17f8c842 3178 int flags);
7bb46a67 3179
17f8c842
OS
3180static inline ssize_t blockdev_direct_IO(struct kiocb *iocb,
3181 struct inode *inode,
c8b8e32d 3182 struct iov_iter *iter,
17f8c842 3183 get_block_t get_block)
1da177e4 3184{
17f8c842 3185 return __blockdev_direct_IO(iocb, inode, inode->i_sb->s_bdev, iter,
0aaf08de 3186 get_block, NULL, DIO_LOCKING | DIO_SKIP_HOLES);
1da177e4 3187}
9361401e 3188#endif
1da177e4 3189
1d59d61f 3190void inode_dio_wait(struct inode *inode);
fe0f07d0 3191
39015399 3192/**
fe0f07d0
JA
3193 * inode_dio_begin - signal start of a direct I/O requests
3194 * @inode: inode the direct I/O happens on
3195 *
3196 * This is called once we've finished processing a direct I/O request,
3197 * and is used to wake up callers waiting for direct I/O to be quiesced.
3198 */
3199static inline void inode_dio_begin(struct inode *inode)
3200{
3201 atomic_inc(&inode->i_dio_count);
3202}
3203
39015399 3204/**
fe0f07d0
JA
3205 * inode_dio_end - signal finish of a direct I/O requests
3206 * @inode: inode the direct I/O happens on
3207 *
3208 * This is called once we've finished processing a direct I/O request,
3209 * and is used to wake up callers waiting for direct I/O to be quiesced.
3210 */
3211static inline void inode_dio_end(struct inode *inode)
3212{
3213 if (atomic_dec_and_test(&inode->i_dio_count))
3214 wake_up_bit(&inode->i_state, __I_DIO_WAKEUP);
3215}
1d59d61f 3216
5f16f322
TT
3217extern void inode_set_flags(struct inode *inode, unsigned int flags,
3218 unsigned int mask);
3219
4b6f5d20 3220extern const struct file_operations generic_ro_fops;
1da177e4
LT
3221
3222#define special_file(m) (S_ISCHR(m)||S_ISBLK(m)||S_ISFIFO(m)||S_ISSOCK(m))
3223
5d826c84 3224extern int readlink_copy(char __user *, int, const char *);
1da177e4 3225extern int page_readlink(struct dentry *, char __user *, int);
fceef393
AV
3226extern const char *page_get_link(struct dentry *, struct inode *,
3227 struct delayed_call *);
3228extern void page_put_link(void *);
1da177e4 3229extern int page_symlink(struct inode *inode, const char *symname, int len);
c5ef1c42 3230extern const struct inode_operations page_symlink_inode_operations;
fceef393 3231extern void kfree_link(void *);
0d72b928 3232void generic_fillattr(struct mnt_idmap *, u32, struct inode *, struct kstat *);
4f911138 3233void generic_fill_statx_attr(struct inode *inode, struct kstat *stat);
a528d35e
DH
3234extern int vfs_getattr_nosec(const struct path *, struct kstat *, u32, unsigned int);
3235extern int vfs_getattr(const struct path *, struct kstat *, u32, unsigned int);
b462707e 3236void __inode_add_bytes(struct inode *inode, loff_t bytes);
1da177e4 3237void inode_add_bytes(struct inode *inode, loff_t bytes);
1c8924eb 3238void __inode_sub_bytes(struct inode *inode, loff_t bytes);
1da177e4 3239void inode_sub_bytes(struct inode *inode, loff_t bytes);
f4a8116a
JK
3240static inline loff_t __inode_get_bytes(struct inode *inode)
3241{
3242 return (((loff_t)inode->i_blocks) << 9) + inode->i_bytes;
3243}
1da177e4
LT
3244loff_t inode_get_bytes(struct inode *inode);
3245void inode_set_bytes(struct inode *inode, loff_t bytes);
fceef393
AV
3246const char *simple_get_link(struct dentry *, struct inode *,
3247 struct delayed_call *);
61ba64fc 3248extern const struct inode_operations simple_symlink_inode_operations;
1da177e4 3249
5c0ba4e0 3250extern int iterate_dir(struct file *, struct dir_context *);
1da177e4 3251
09f1bde4
CH
3252int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
3253 int flags);
da9aa5d9 3254int vfs_fstat(int fd, struct kstat *stat);
a528d35e
DH
3255
3256static inline int vfs_stat(const char __user *filename, struct kstat *stat)
3257{
0b2c6693 3258 return vfs_fstatat(AT_FDCWD, filename, stat, 0);
a528d35e
DH
3259}
3260static inline int vfs_lstat(const char __user *name, struct kstat *stat)
3261{
0b2c6693 3262 return vfs_fstatat(AT_FDCWD, name, stat, AT_SYMLINK_NOFOLLOW);
a528d35e 3263}
a528d35e 3264
d60874cd 3265extern const char *vfs_get_link(struct dentry *, struct delayed_call *);
fd4a0edf 3266extern int vfs_readlink(struct dentry *, char __user *, int);
1da177e4 3267
ee416bcd 3268extern struct file_system_type *get_filesystem(struct file_system_type *fs);
c18479fe 3269extern void put_filesystem(struct file_system_type *fs);
1da177e4 3270extern struct file_system_type *get_fs_type(const char *name);
1da177e4 3271extern void drop_super(struct super_block *sb);
ba6379f7 3272extern void drop_super_exclusive(struct super_block *sb);
01a05b33 3273extern void iterate_supers(void (*)(struct super_block *, void *), void *);
43e15cdb
AV
3274extern void iterate_supers_type(struct file_system_type *,
3275 void (*)(struct super_block *, void *), void *);
1da177e4
LT
3276
3277extern int dcache_dir_open(struct inode *, struct file *);
3278extern int dcache_dir_close(struct inode *, struct file *);
3279extern loff_t dcache_dir_lseek(struct file *, loff_t, int);
5f99f4e7 3280extern int dcache_readdir(struct file *, struct dir_context *);
c1632a0f 3281extern int simple_setattr(struct mnt_idmap *, struct dentry *,
549c7297 3282 struct iattr *);
b74d24f7 3283extern int simple_getattr(struct mnt_idmap *, const struct path *,
549c7297 3284 struct kstat *, u32, unsigned int);
726c3342 3285extern int simple_statfs(struct dentry *, struct kstatfs *);
20955e89 3286extern int simple_open(struct inode *inode, struct file *file);
1da177e4
LT
3287extern int simple_link(struct dentry *, struct inode *, struct dentry *);
3288extern int simple_unlink(struct inode *, struct dentry *);
3289extern int simple_rmdir(struct inode *, struct dentry *);
0c476792
JL
3290void simple_rename_timestamp(struct inode *old_dir, struct dentry *old_dentry,
3291 struct inode *new_dir, struct dentry *new_dentry);
6429e463
LB
3292extern int simple_rename_exchange(struct inode *old_dir, struct dentry *old_dentry,
3293 struct inode *new_dir, struct dentry *new_dentry);
e18275ae 3294extern int simple_rename(struct mnt_idmap *, struct inode *,
549c7297
CB
3295 struct dentry *, struct inode *, struct dentry *,
3296 unsigned int);
a3d1e7eb
AV
3297extern void simple_recursive_removal(struct dentry *,
3298 void (*callback)(struct dentry *));
02c24a82 3299extern int noop_fsync(struct file *, loff_t, loff_t, int);
f44c7763 3300extern ssize_t noop_direct_IO(struct kiocb *iocb, struct iov_iter *iter);
1da177e4 3301extern int simple_empty(struct dentry *);
afddba49 3302extern int simple_write_begin(struct file *file, struct address_space *mapping,
9d6b0cd7 3303 loff_t pos, unsigned len,
afddba49 3304 struct page **pagep, void **fsdata);
c1e3dbe9 3305extern const struct address_space_operations ram_aops;
b26d4cd3 3306extern int always_delete_dentry(const struct dentry *);
6987843f 3307extern struct inode *alloc_anon_inode(struct super_block *);
c69ff407 3308extern int simple_nosetlease(struct file *, int, struct file_lease **, void **);
b26d4cd3 3309extern const struct dentry_operations simple_dentry_operations;
1da177e4 3310
00cd8dd3 3311extern struct dentry *simple_lookup(struct inode *, struct dentry *, unsigned int flags);
1da177e4 3312extern ssize_t generic_read_dir(struct file *, char __user *, size_t, loff_t *);
4b6f5d20 3313extern const struct file_operations simple_dir_operations;
c5ef1c42 3314extern const struct inode_operations simple_dir_inode_operations;
fbabfd0f
EB
3315extern void make_empty_dir_inode(struct inode *inode);
3316extern bool is_empty_dir_inode(struct inode *inode);
cda37124 3317struct tree_descr { const char *name; const struct file_operations *ops; int mode; };
1da177e4 3318struct dentry *d_alloc_name(struct dentry *, const char *);
cda37124
EB
3319extern int simple_fill_super(struct super_block *, unsigned long,
3320 const struct tree_descr *);
1f5ce9e9 3321extern int simple_pin_fs(struct file_system_type *, struct vfsmount **mount, int *count);
1da177e4
LT
3322extern void simple_release_fs(struct vfsmount **mount, int *count);
3323
93b07113
AM
3324extern ssize_t simple_read_from_buffer(void __user *to, size_t count,
3325 loff_t *ppos, const void *from, size_t available);
6a727b43
JS
3326extern ssize_t simple_write_to_buffer(void *to, size_t available, loff_t *ppos,
3327 const void __user *from, size_t count);
1da177e4 3328
6faddda6 3329struct offset_ctx {
0e4a8621
CL
3330 struct maple_tree mt;
3331 unsigned long next_offset;
6faddda6
CL
3332};
3333
3334void simple_offset_init(struct offset_ctx *octx);
3335int simple_offset_add(struct offset_ctx *octx, struct dentry *dentry);
3336void simple_offset_remove(struct offset_ctx *octx, struct dentry *dentry);
ecba88a3 3337int simple_offset_empty(struct dentry *dentry);
5a1a25be
CL
3338int simple_offset_rename(struct inode *old_dir, struct dentry *old_dentry,
3339 struct inode *new_dir, struct dentry *new_dentry);
6faddda6
CL
3340int simple_offset_rename_exchange(struct inode *old_dir,
3341 struct dentry *old_dentry,
3342 struct inode *new_dir,
3343 struct dentry *new_dentry);
3344void simple_offset_destroy(struct offset_ctx *octx);
3345
3346extern const struct file_operations simple_offset_dir_operations;
3347
ac13a829 3348extern int __generic_file_fsync(struct file *, loff_t, loff_t, int);
02c24a82 3349extern int generic_file_fsync(struct file *, loff_t, loff_t, int);
d5aacad5 3350
30ca22c7
PL
3351extern int generic_check_addressable(unsigned, u64);
3352
70dfe3f0 3353extern void generic_set_sb_d_ops(struct super_block *sb);
c843843e 3354
2824083d
GKB
3355static inline bool sb_has_encoding(const struct super_block *sb)
3356{
3357#if IS_ENABLED(CONFIG_UNICODE)
3358 return !!sb->s_encoding;
3359#else
3360 return false;
3361#endif
3362}
c843843e 3363
4609e1f1 3364int may_setattr(struct mnt_idmap *idmap, struct inode *inode,
7bb698f0 3365 unsigned int ia_valid);
c1632a0f 3366int setattr_prepare(struct mnt_idmap *, struct dentry *, struct iattr *);
25d9e2d1 3367extern int inode_newsize_ok(const struct inode *, loff_t offset);
c1632a0f 3368void setattr_copy(struct mnt_idmap *, struct inode *inode,
2f221d6f 3369 const struct iattr *attr);
1da177e4 3370
c3b2da31 3371extern int file_update_time(struct file *file);
1da177e4 3372
f05a3849 3373static inline bool vma_is_dax(const struct vm_area_struct *vma)
baabda26
DW
3374{
3375 return vma->vm_file && IS_DAX(vma->vm_file->f_mapping->host);
3376}
3377
2bb6d283
DW
3378static inline bool vma_is_fsdax(struct vm_area_struct *vma)
3379{
3380 struct inode *inode;
3381
52650c8b 3382 if (!IS_ENABLED(CONFIG_FS_DAX) || !vma->vm_file)
2bb6d283
DW
3383 return false;
3384 if (!vma_is_dax(vma))
3385 return false;
3386 inode = file_inode(vma->vm_file);
230f5a89 3387 if (S_ISCHR(inode->i_mode))
2bb6d283
DW
3388 return false; /* device-dax */
3389 return true;
3390}
3391
2ba48ce5
AV
3392static inline int iocb_flags(struct file *file)
3393{
3394 int res = 0;
3395 if (file->f_flags & O_APPEND)
3396 res |= IOCB_APPEND;
efbe3c24 3397 if (file->f_flags & O_DIRECT)
2ba48ce5 3398 res |= IOCB_DIRECT;
91b94c5d 3399 if (file->f_flags & O_DSYNC)
dde0c2e7
CH
3400 res |= IOCB_DSYNC;
3401 if (file->f_flags & __O_SYNC)
3402 res |= IOCB_SYNC;
2ba48ce5
AV
3403 return res;
3404}
3405
ddef7ed2 3406static inline int kiocb_set_rw_flags(struct kiocb *ki, rwf_t flags)
fdd2f5b7 3407{
1752f0ad
PB
3408 int kiocb_flags = 0;
3409
ce71bfea
JA
3410 /* make sure there's no overlap between RWF and private IOCB flags */
3411 BUILD_BUG_ON((__force int) RWF_SUPPORTED & IOCB_EVENTFD);
3412
1752f0ad
PB
3413 if (!flags)
3414 return 0;
fdd2f5b7
GR
3415 if (unlikely(flags & ~RWF_SUPPORTED))
3416 return -EOPNOTSUPP;
73fa7547
RF
3417 if (unlikely((flags & RWF_APPEND) && (flags & RWF_NOAPPEND)))
3418 return -EINVAL;
fdd2f5b7 3419
b745fafa 3420 if (flags & RWF_NOWAIT) {
91f9943e 3421 if (!(ki->ki_filp->f_mode & FMODE_NOWAIT))
b745fafa 3422 return -EOPNOTSUPP;
ce71bfea 3423 kiocb_flags |= IOCB_NOIO;
b745fafa 3424 }
ce71bfea 3425 kiocb_flags |= (__force int) (flags & RWF_SUPPORTED);
fdd2f5b7 3426 if (flags & RWF_SYNC)
ce71bfea 3427 kiocb_flags |= IOCB_DSYNC;
1752f0ad 3428
73fa7547
RF
3429 if ((flags & RWF_NOAPPEND) && (ki->ki_flags & IOCB_APPEND)) {
3430 if (IS_APPEND(file_inode(ki->ki_filp)))
3431 return -EPERM;
3432 ki->ki_flags &= ~IOCB_APPEND;
3433 }
3434
1752f0ad 3435 ki->ki_flags |= kiocb_flags;
fdd2f5b7
GR
3436 return 0;
3437}
3438
1da177e4
LT
3439static inline ino_t parent_ino(struct dentry *dentry)
3440{
3441 ino_t res;
3442
b5c84bf6
NP
3443 /*
3444 * Don't strictly need d_lock here? If the parent ino could change
3445 * then surely we'd have a deeper race in the caller?
3446 */
1da177e4
LT
3447 spin_lock(&dentry->d_lock);
3448 res = dentry->d_parent->d_inode->i_ino;
3449 spin_unlock(&dentry->d_lock);
3450 return res;
3451}
3452
1da177e4
LT
3453/* Transaction based IO helpers */
3454
3455/*
3456 * An argresp is stored in an allocated page and holds the
3457 * size of the argument or response, along with its content
3458 */
3459struct simple_transaction_argresp {
3460 ssize_t size;
5e01fdff 3461 char data[];
1da177e4
LT
3462};
3463
3464#define SIMPLE_TRANSACTION_LIMIT (PAGE_SIZE - sizeof(struct simple_transaction_argresp))
3465
3466char *simple_transaction_get(struct file *file, const char __user *buf,
3467 size_t size);
3468ssize_t simple_transaction_read(struct file *file, char __user *buf,
3469 size_t size, loff_t *pos);
3470int simple_transaction_release(struct inode *inode, struct file *file);
3471
76791ab2 3472void simple_transaction_set(struct file *file, size_t n);
1da177e4 3473
acaefc25
AB
3474/*
3475 * simple attribute files
3476 *
3477 * These attributes behave similar to those in sysfs:
3478 *
3479 * Writing to an attribute immediately sets a value, an open file can be
3480 * written to multiple times.
3481 *
3482 * Reading from an attribute creates a buffer from the value that might get
3483 * read with multiple read calls. When the attribute has been read
3484 * completely, no further read calls are possible until the file is opened
3485 * again.
3486 *
3487 * All attributes contain a text representation of a numeric value
3488 * that are accessed with the get() and set() functions.
3489 */
2e41f274 3490#define DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, __is_signed) \
acaefc25
AB
3491static int __fops ## _open(struct inode *inode, struct file *file) \
3492{ \
3493 __simple_attr_check_format(__fmt, 0ull); \
3494 return simple_attr_open(inode, file, __get, __set, __fmt); \
3495} \
828c0950 3496static const struct file_operations __fops = { \
acaefc25
AB
3497 .owner = THIS_MODULE, \
3498 .open = __fops ## _open, \
74bedc4d 3499 .release = simple_attr_release, \
acaefc25 3500 .read = simple_attr_read, \
2e41f274 3501 .write = (__is_signed) ? simple_attr_write_signed : simple_attr_write, \
1ec5584e 3502 .llseek = generic_file_llseek, \
68be3029 3503}
acaefc25 3504
2e41f274
AM
3505#define DEFINE_SIMPLE_ATTRIBUTE(__fops, __get, __set, __fmt) \
3506 DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, false)
3507
3508#define DEFINE_SIMPLE_ATTRIBUTE_SIGNED(__fops, __get, __set, __fmt) \
3509 DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, true)
3510
b9075fa9
JP
3511static inline __printf(1, 2)
3512void __simple_attr_check_format(const char *fmt, ...)
acaefc25
AB
3513{
3514 /* don't do anything, just let the compiler check the arguments; */
3515}
3516
3517int simple_attr_open(struct inode *inode, struct file *file,
8b88b099 3518 int (*get)(void *, u64 *), int (*set)(void *, u64),
acaefc25 3519 const char *fmt);
74bedc4d 3520int simple_attr_release(struct inode *inode, struct file *file);
acaefc25
AB
3521ssize_t simple_attr_read(struct file *file, char __user *buf,
3522 size_t len, loff_t *ppos);
3523ssize_t simple_attr_write(struct file *file, const char __user *buf,
3524 size_t len, loff_t *ppos);
2e41f274
AM
3525ssize_t simple_attr_write_signed(struct file *file, const char __user *buf,
3526 size_t len, loff_t *ppos);
acaefc25 3527
4be28540 3528struct ctl_table;
6e7c1770 3529int __init list_bdev_fs_names(char *buf, size_t size);
62239ac2 3530
3cd90ea4 3531#define __FMODE_EXEC ((__force int) FMODE_EXEC)
1a44bc8c
NK
3532#define __FMODE_NONOTIFY ((__force int) FMODE_NONOTIFY)
3533
6d125529 3534#define ACC_MODE(x) ("\004\002\006\006"[(x)&O_ACCMODE])
ecf081d1 3535#define OPEN_FMODE(flag) ((__force fmode_t)(((flag + 1) & O_ACCMODE) | \
1a44bc8c 3536 (flag & __FMODE_NONOTIFY)))
5300990c 3537
d37177ba 3538static inline bool is_sxid(umode_t mode)
69b45732 3539{
8d84e39d 3540 return mode & (S_ISUID | S_ISGID);
69b45732
AK
3541}
3542
9452e93e 3543static inline int check_sticky(struct mnt_idmap *idmap,
ba73d987 3544 struct inode *dir, struct inode *inode)
cbdf35bc
MS
3545{
3546 if (!(dir->i_mode & S_ISVTX))
3547 return 0;
3548
9452e93e 3549 return __check_sticky(idmap, dir, inode);
cbdf35bc
MS
3550}
3551
69b45732
AK
3552static inline void inode_has_no_xattr(struct inode *inode)
3553{
e462ec50 3554 if (!is_sxid(inode->i_mode) && (inode->i_sb->s_flags & SB_NOSEC))
69b45732
AK
3555 inode->i_flags |= S_NOSEC;
3556}
3557
a7400222
AV
3558static inline bool is_root_inode(struct inode *inode)
3559{
3560 return inode == inode->i_sb->s_root->d_inode;
3561}
3562
5f99f4e7
AV
3563static inline bool dir_emit(struct dir_context *ctx,
3564 const char *name, int namelen,
3565 u64 ino, unsigned type)
3566{
25885a35 3567 return ctx->actor(ctx, name, namelen, ctx->pos, ino, type);
5f99f4e7
AV
3568}
3569static inline bool dir_emit_dot(struct file *file, struct dir_context *ctx)
3570{
3571 return ctx->actor(ctx, ".", 1, ctx->pos,
25885a35 3572 file->f_path.dentry->d_inode->i_ino, DT_DIR);
5f99f4e7
AV
3573}
3574static inline bool dir_emit_dotdot(struct file *file, struct dir_context *ctx)
3575{
3576 return ctx->actor(ctx, "..", 2, ctx->pos,
25885a35 3577 parent_ino(file->f_path.dentry), DT_DIR);
5f99f4e7
AV
3578}
3579static inline bool dir_emit_dots(struct file *file, struct dir_context *ctx)
3580{
3581 if (ctx->pos == 0) {
3582 if (!dir_emit_dot(file, ctx))
3583 return false;
3584 ctx->pos = 1;
3585 }
3586 if (ctx->pos == 1) {
3587 if (!dir_emit_dotdot(file, ctx))
3588 return false;
3589 ctx->pos = 2;
3590 }
3591 return true;
3592}
5ded75ec
AV
3593static inline bool dir_relax(struct inode *inode)
3594{
5955102c
AV
3595 inode_unlock(inode);
3596 inode_lock(inode);
5ded75ec
AV
3597 return !IS_DEADDIR(inode);
3598}
5f99f4e7 3599
ae05327a
AV
3600static inline bool dir_relax_shared(struct inode *inode)
3601{
3602 inode_unlock_shared(inode);
3603 inode_lock_shared(inode);
3604 return !IS_DEADDIR(inode);
3605}
3606
90f8572b 3607extern bool path_noexec(const struct path *path);
21fc61c7 3608extern void inode_nohighmem(struct inode *inode);
90f8572b 3609
45cd0faa
AG
3610/* mm/fadvise.c */
3611extern int vfs_fadvise(struct file *file, loff_t offset, loff_t len,
3612 int advice);
cf1ea059
JK
3613extern int generic_fadvise(struct file *file, loff_t offset, loff_t len,
3614 int advice);
45cd0faa 3615
1da177e4 3616#endif /* _LINUX_FS_H */