]> git.ipfire.org Git - thirdparty/linux.git/blame - include/linux/fs.h
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
[thirdparty/linux.git] / include / linux / fs.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
1da177e4
LT
2#ifndef _LINUX_FS_H
3#define _LINUX_FS_H
4
8b17e540 5#include <linux/vfsdebug.h>
1da177e4 6#include <linux/linkage.h>
5dd43ce2 7#include <linux/wait_bit.h>
1da177e4
LT
8#include <linux/kdev_t.h>
9#include <linux/dcache.h>
3f8206d4 10#include <linux/path.h>
1da177e4
LT
11#include <linux/stat.h>
12#include <linux/cache.h>
1da177e4 13#include <linux/list.h>
bc3b14cb 14#include <linux/list_lru.h>
4f5e65a1 15#include <linux/llist.h>
1da177e4 16#include <linux/radix-tree.h>
b93b0163 17#include <linux/xarray.h>
6b2dbba8 18#include <linux/rbtree.h>
1da177e4 19#include <linux/init.h>
914e2637 20#include <linux/pid.h>
187f1882 21#include <linux/bug.h>
1b1dcc1b 22#include <linux/mutex.h>
c8c06efa 23#include <linux/rwsem.h>
baabda26 24#include <linux/mm_types.h>
3bd858ab 25#include <linux/capability.h>
6188e10d 26#include <linux/semaphore.h>
c75b1d94 27#include <linux/fcntl.h>
ceb5bdc2 28#include <linux/rculist_bl.h>
07b8ce1e 29#include <linux/atomic.h>
83aeeada 30#include <linux/shrinker.h>
c1aab02d 31#include <linux/migrate_mode.h>
92361636 32#include <linux/uidgid.h>
5accdf82 33#include <linux/lockdep.h>
c2b1ad80 34#include <linux/percpu-rwsem.h>
853b39a7 35#include <linux/workqueue.h>
fceef393 36#include <linux/delayed_call.h>
85787090 37#include <linux/uuid.h>
5660e13d 38#include <linux/errseq.h>
d9a08a9e 39#include <linux/ioprio.h>
bbe7449e 40#include <linux/fs_types.h>
f1fffbd4
RV
41#include <linux/build_bug.h>
42#include <linux/stddef.h>
a6435940 43#include <linux/mount.h>
e6c9a714 44#include <linux/cred.h>
a793d79e 45#include <linux/mnt_idmapping.h>
8b9f3ac5 46#include <linux/slab.h>
0e4a8621 47#include <linux/maple_tree.h>
fe3944fb 48#include <linux/rw_hint.h>
90ee6ed7 49#include <linux/file_ref.h>
0e152beb 50#include <linux/unicode.h>
1da177e4 51
1da177e4 52#include <asm/byteorder.h>
607ca46e 53#include <uapi/linux/fs.h>
1da177e4 54
b83ae6d4 55struct backing_dev_info;
52ebea74 56struct bdi_writeback;
2f8b5444 57struct bio;
5a72e899 58struct io_comp_batch;
a5694255 59struct export_operations;
10c5db28 60struct fiemap_extent_info;
a885c8c4 61struct hd_geometry;
1da177e4 62struct iovec;
92198f7e 63struct kiocb;
57cc7215 64struct kobject;
1da177e4
LT
65struct pipe_inode_info;
66struct poll_table_struct;
67struct kstatfs;
68struct vm_area_struct;
69struct vfsmount;
745ca247 70struct cred;
a509bc1a 71struct swap_info_struct;
55985dd7 72struct seq_file;
7b7a8665 73struct workqueue_struct;
3b93f911 74struct iov_iter;
3e7807d5 75struct fscrypt_inode_info;
0b81d077 76struct fscrypt_operations;
5585f2af
EB
77struct fsverity_info;
78struct fsverity_operations;
07a3b8d0
AG
79struct fsnotify_mark_connector;
80struct fsnotify_sb_info;
f3a09c92 81struct fs_context;
d7167b14 82struct fs_parameter_spec;
ca115d7e 83struct file_kattr;
6f7db389 84struct iomap_ops;
1da177e4 85
74bf17cf 86extern void __init inode_init(void);
1da177e4 87extern void __init inode_init_early(void);
4248b0da
MG
88extern void __init files_init(void);
89extern void __init files_maxfiles_init(void);
1da177e4 90
518de9b3 91extern unsigned long get_max_files(void);
9b80a184 92extern unsigned int sysctl_nr_open;
dded4f4d 93
ddef7ed2
CH
94typedef __kernel_rwf_t rwf_t;
95
1da177e4
LT
96struct buffer_head;
97typedef int (get_block_t)(struct inode *inode, sector_t iblock,
98 struct buffer_head *bh_result, int create);
187372a3 99typedef int (dio_iodone_t)(struct kiocb *iocb, loff_t offset,
7b7a8665 100 ssize_t bytes, void *private);
1da177e4 101
bbc1096a
DH
102#define MAY_EXEC 0x00000001
103#define MAY_WRITE 0x00000002
104#define MAY_READ 0x00000004
105#define MAY_APPEND 0x00000008
106#define MAY_ACCESS 0x00000010
107#define MAY_OPEN 0x00000020
108#define MAY_CHDIR 0x00000040
109/* called from RCU mode, don't block */
110#define MAY_NOT_BLOCK 0x00000080
111
112/*
113 * flags in file.f_mode. Note that FMODE_READ and FMODE_WRITE must correspond
75abe329 114 * to O_WRONLY and O_RDWR via the strange trick in do_dentry_open()
bbc1096a
DH
115 */
116
117/* file is open for reading */
0a4f544d 118#define FMODE_READ ((__force fmode_t)(1 << 0))
bbc1096a 119/* file is open for writing */
0a4f544d 120#define FMODE_WRITE ((__force fmode_t)(1 << 1))
bbc1096a 121/* file is seekable */
0a4f544d 122#define FMODE_LSEEK ((__force fmode_t)(1 << 2))
bbc1096a 123/* file can be accessed using pread */
0a4f544d 124#define FMODE_PREAD ((__force fmode_t)(1 << 3))
bbc1096a 125/* file can be accessed using pwrite */
0a4f544d 126#define FMODE_PWRITE ((__force fmode_t)(1 << 4))
bbc1096a 127/* File is opened for execution with sys_execve / sys_uselib */
0a4f544d 128#define FMODE_EXEC ((__force fmode_t)(1 << 5))
ddd65e19 129/* File writes are restricted (block device specific) */
1b0aabcc 130#define FMODE_WRITE_RESTRICTED ((__force fmode_t)(1 << 6))
c34fc6f2
PS
131/* File supports atomic writes */
132#define FMODE_CAN_ATOMIC_WRITE ((__force fmode_t)(1 << 7))
0a4f544d 133
c34fc6f2 134/* FMODE_* bit 8 */
0a4f544d 135
bbc1096a 136/* 32bit hashes as llseek() offset (for directories) */
0a4f544d 137#define FMODE_32BITHASH ((__force fmode_t)(1 << 9))
bbc1096a 138/* 64bit hashes as llseek() offset (for directories) */
0a4f544d 139#define FMODE_64BITHASH ((__force fmode_t)(1 << 10))
bbc1096a
DH
140
141/*
142 * Don't update ctime and mtime.
143 *
144 * Currently a special hack for the XFS open_by_handle ioctl, but we'll
145 * hopefully graduate it to a proper O_CMTIME flag supported by open(2) soon.
146 */
0a4f544d 147#define FMODE_NOCMTIME ((__force fmode_t)(1 << 11))
bbc1096a
DH
148
149/* Expect random access pattern */
0a4f544d 150#define FMODE_RANDOM ((__force fmode_t)(1 << 12))
bbc1096a 151
d072148a
CH
152/* Supports IOCB_HAS_METADATA */
153#define FMODE_HAS_METADATA ((__force fmode_t)(1 << 13))
bbc1096a
DH
154
155/* File is opened with O_PATH; almost nothing can be done with it */
0a4f544d 156#define FMODE_PATH ((__force fmode_t)(1 << 14))
bbc1096a 157
2be7d348 158/* File needs atomic accesses to f_pos */
0a4f544d 159#define FMODE_ATOMIC_POS ((__force fmode_t)(1 << 15))
83f936c7 160/* Write access to underlying fs */
0a4f544d 161#define FMODE_WRITER ((__force fmode_t)(1 << 16))
7f7f25e8 162/* Has read method(s) */
0a4f544d 163#define FMODE_CAN_READ ((__force fmode_t)(1 << 17))
7f7f25e8 164/* Has write method(s) */
0a4f544d 165#define FMODE_CAN_WRITE ((__force fmode_t)(1 << 18))
9c225f26 166
0a4f544d
CB
167#define FMODE_OPENED ((__force fmode_t)(1 << 19))
168#define FMODE_CREATED ((__force fmode_t)(1 << 20))
f5d11409 169
10dce8af 170/* File is stream-like */
0a4f544d 171#define FMODE_STREAM ((__force fmode_t)(1 << 21))
10dce8af 172
a2ad63da 173/* File supports DIRECT IO */
0a4f544d 174#define FMODE_CAN_ODIRECT ((__force fmode_t)(1 << 22))
a2ad63da 175
0a4f544d 176#define FMODE_NOREUSE ((__force fmode_t)(1 << 23))
17e81022 177
62d53c4a 178/* File is embedded in backing_file object */
a94204f4
AG
179#define FMODE_BACKING ((__force fmode_t)(1 << 24))
180
181/*
182 * Together with FMODE_NONOTIFY_PERM defines which fsnotify events shouldn't be
183 * generated (see below)
184 */
185#define FMODE_NONOTIFY ((__force fmode_t)(1 << 25))
62d53c4a 186
a94204f4
AG
187/*
188 * Together with FMODE_NONOTIFY defines which fsnotify events shouldn't be
189 * generated (see below)
190 */
191#define FMODE_NONOTIFY_PERM ((__force fmode_t)(1 << 26))
bbc1096a 192
91f9943e 193/* File is capable of returning -EAGAIN if I/O will block */
0a4f544d 194#define FMODE_NOWAIT ((__force fmode_t)(1 << 27))
a07b2000
AV
195
196/* File represents mount that needs unmounting */
0a4f544d 197#define FMODE_NEED_UNMOUNT ((__force fmode_t)(1 << 28))
b745fafa 198
d3b1084d 199/* File does not contribute to nr_files count */
0a4f544d 200#define FMODE_NOACCOUNT ((__force fmode_t)(1 << 29))
80175539 201
a94204f4
AG
202/*
203 * The two FMODE_NONOTIFY* define which fsnotify events should not be generated
0d4c4d4e
AG
204 * for an open file. These are the possible values of
205 * (f->f_mode & FMODE_FSNOTIFY_MASK) and their meaning:
a94204f4
AG
206 *
207 * FMODE_NONOTIFY - suppress all (incl. non-permission) events.
208 * FMODE_NONOTIFY_PERM - suppress permission (incl. pre-content) events.
0d4c4d4e 209 * FMODE_NONOTIFY | FMODE_NONOTIFY_PERM - suppress only FAN_ACCESS_PERM.
a94204f4
AG
210 */
211#define FMODE_FSNOTIFY_MASK \
212 (FMODE_NONOTIFY | FMODE_NONOTIFY_PERM)
213
214#define FMODE_FSNOTIFY_NONE(mode) \
215 ((mode & FMODE_FSNOTIFY_MASK) == FMODE_NONOTIFY)
216#ifdef CONFIG_FANOTIFY_ACCESS_PERMISSIONS
0d4c4d4e 217#define FMODE_FSNOTIFY_HSM(mode) \
a94204f4
AG
218 ((mode & FMODE_FSNOTIFY_MASK) == 0 || \
219 (mode & FMODE_FSNOTIFY_MASK) == (FMODE_NONOTIFY | FMODE_NONOTIFY_PERM))
0d4c4d4e 220#define FMODE_FSNOTIFY_ACCESS_PERM(mode) \
a94204f4
AG
221 ((mode & FMODE_FSNOTIFY_MASK) == 0)
222#else
0d4c4d4e 223#define FMODE_FSNOTIFY_ACCESS_PERM(mode) 0
a94204f4
AG
224#define FMODE_FSNOTIFY_HSM(mode) 0
225#endif
226
1da177e4
LT
227/*
228 * Attribute flags. These should be or-ed together to figure out what
229 * has been changed!
230 */
9767d749
MS
231#define ATTR_MODE (1 << 0)
232#define ATTR_UID (1 << 1)
233#define ATTR_GID (1 << 2)
234#define ATTR_SIZE (1 << 3)
235#define ATTR_ATIME (1 << 4)
236#define ATTR_MTIME (1 << 5)
237#define ATTR_CTIME (1 << 6)
238#define ATTR_ATIME_SET (1 << 7)
239#define ATTR_MTIME_SET (1 << 8)
240#define ATTR_FORCE (1 << 9) /* Not a change, but a change it */
9767d749
MS
241#define ATTR_KILL_SUID (1 << 11)
242#define ATTR_KILL_SGID (1 << 12)
243#define ATTR_FILE (1 << 13)
244#define ATTR_KILL_PRIV (1 << 14)
245#define ATTR_OPEN (1 << 15) /* Truncating from open(O_TRUNC) */
246#define ATTR_TIMES_SET (1 << 16)
f2b20f6e 247#define ATTR_TOUCH (1 << 17)
7e8ae848 248#define ATTR_DELEG (1 << 18) /* Delegated attrs. Don't break write delegations */
1da177e4 249
787fb6bc
MS
250/*
251 * Whiteout is represented by a char device. The following constants define the
252 * mode and device number to use.
253 */
254#define WHITEOUT_MODE 0
255#define WHITEOUT_DEV 0
256
1da177e4
LT
257/*
258 * This is the Inode Attributes structure, used for notify_change(). It
259 * uses the above definitions as flags, to know which values have changed.
260 * Also, in this manner, a Filesystem can look at only the values it cares
261 * about. Basically, these are the attributes that the VFS layer can
262 * request to change from the FS layer.
263 *
264 * Derek Atkins <warlord@MIT.EDU> 94-10-20
265 */
266struct iattr {
267 unsigned int ia_valid;
268 umode_t ia_mode;
45c31150
CB
269 /*
270 * The two anonymous unions wrap structures with the same member.
271 *
272 * Filesystems raising FS_ALLOW_IDMAP need to use ia_vfs{g,u}id which
273 * are a dedicated type requiring the filesystem to use the dedicated
274 * helpers. Other filesystem can continue to use ia_{g,u}id until they
275 * have been ported.
b27c82e1
CB
276 *
277 * They always contain the same value. In other words FS_ALLOW_IDMAP
278 * pass down the same value on idmapped mounts as they would on regular
279 * mounts.
45c31150
CB
280 */
281 union {
282 kuid_t ia_uid;
283 vfsuid_t ia_vfsuid;
284 };
285 union {
286 kgid_t ia_gid;
287 vfsgid_t ia_vfsgid;
288 };
1da177e4 289 loff_t ia_size;
95582b00
DD
290 struct timespec64 ia_atime;
291 struct timespec64 ia_mtime;
292 struct timespec64 ia_ctime;
cc4e69de
MS
293
294 /*
25985edc 295 * Not an attribute, but an auxiliary info for filesystems wanting to
cc4e69de
MS
296 * implement an ftruncate() like method. NOTE: filesystem should
297 * check for (ia_valid & ATTR_FILE), and not for (ia_file != NULL).
298 */
299 struct file *ia_file;
1da177e4
LT
300};
301
1da177e4
LT
302/*
303 * Includes for diskquotas.
304 */
305#include <linux/quota.h>
306
69c433ed
MS
307/*
308 * Maximum number of layers of fs stack. Needs to be limited to
309 * prevent kernel stack overflow
310 */
311#define FILESYSTEM_MAX_STACK_DEPTH 2
312
994fc28c
ZB
313/**
314 * enum positive_aop_returns - aop return codes with specific semantics
315 *
316 * @AOP_WRITEPAGE_ACTIVATE: Informs the caller that page writeback has
317 * completed, that the page is still locked, and
318 * should be considered active. The VM uses this hint
319 * to return the page to the active list -- it won't
320 * be a candidate for writeback again in the near
321 * future. Other callers must be careful to unlock
322 * the page if they get this return. Returned by
323 * writepage();
324 *
325 * @AOP_TRUNCATED_PAGE: The AOP method that was handed a locked page has
326 * unlocked it and the page might have been truncated.
327 * The caller should back up to acquiring a new page and
328 * trying again. The aop will be taking reasonable
329 * precautions not to livelock. If the caller held a page
330 * reference, it should drop it before retrying. Returned
7e0a1265 331 * by read_folio().
994fc28c
ZB
332 *
333 * address_space_operation functions return these large constants to indicate
334 * special semantics to the caller. These are much larger than the bytes in a
335 * page to allow for functions that return the number of bytes operated on in a
336 * given page.
337 */
338
339enum positive_aop_returns {
340 AOP_WRITEPAGE_ACTIVATE = 0x80000,
341 AOP_TRUNCATED_PAGE = 0x80001,
342};
343
1da177e4
LT
344/*
345 * oh the beauties of C type declarations.
346 */
347struct page;
348struct address_space;
349struct writeback_control;
8151b4c8 350struct readahead_control;
1da177e4 351
ce71bfea
JA
352/* Match RWF_* bits to IOCB bits */
353#define IOCB_HIPRI (__force int) RWF_HIPRI
354#define IOCB_DSYNC (__force int) RWF_DSYNC
355#define IOCB_SYNC (__force int) RWF_SYNC
356#define IOCB_NOWAIT (__force int) RWF_NOWAIT
357#define IOCB_APPEND (__force int) RWF_APPEND
c34fc6f2 358#define IOCB_ATOMIC (__force int) RWF_ATOMIC
af6505e5 359#define IOCB_DONTCACHE (__force int) RWF_DONTCACHE
ce71bfea
JA
360
361/* non-RWF related bits - start at 16 */
362#define IOCB_EVENTFD (1 << 16)
363#define IOCB_DIRECT (1 << 17)
364#define IOCB_WRITE (1 << 18)
dd3e6d50 365/* iocb->ki_waitq is valid */
ce71bfea
JA
366#define IOCB_WAITQ (1 << 19)
367#define IOCB_NOIO (1 << 20)
6c7ef543
JA
368/* can use bio alloc cache */
369#define IOCB_ALLOC_CACHE (1 << 21)
9cf3516c
JA
370/*
371 * IOCB_DIO_CALLER_COMP can be set by the iocb owner, to indicate that the
372 * iocb completion can be passed back to the owner for execution from a safe
373 * context rather than needing to be punted through a workqueue. If this
374 * flag is set, the bio completion handling may set iocb->dio_complete to a
375 * handler function and iocb->private to context information for that handler.
376 * The issuer should call the handler with that context information from task
377 * context to complete the processing of the iocb. Note that while this
378 * provides a task context for the dio_complete() callback, it should only be
379 * used on the completion side for non-IO generating completions. It's fine to
380 * call blocking functions from this callback, but they should not wait for
381 * unrelated IO (like cache flushing, new IO generation, etc).
382 */
383#define IOCB_DIO_CALLER_COMP (1 << 22)
b820de74
BVA
384/* kiocb is a read or write operation submitted by fs/aio.c. */
385#define IOCB_AIO_RW (1 << 23)
4de2ce04 386#define IOCB_HAS_METADATA (1 << 24)
e2e40f2c 387
f6c73a11
RHI
388/* for use in trace events */
389#define TRACE_IOCB_STRINGS \
390 { IOCB_HIPRI, "HIPRI" }, \
391 { IOCB_DSYNC, "DSYNC" }, \
392 { IOCB_SYNC, "SYNC" }, \
393 { IOCB_NOWAIT, "NOWAIT" }, \
394 { IOCB_APPEND, "APPEND" }, \
af6505e5
JA
395 { IOCB_ATOMIC, "ATOMIC" }, \
396 { IOCB_DONTCACHE, "DONTCACHE" }, \
f6c73a11
RHI
397 { IOCB_EVENTFD, "EVENTFD"}, \
398 { IOCB_DIRECT, "DIRECT" }, \
399 { IOCB_WRITE, "WRITE" }, \
400 { IOCB_WAITQ, "WAITQ" }, \
401 { IOCB_NOIO, "NOIO" }, \
9cf3516c 402 { IOCB_ALLOC_CACHE, "ALLOC_CACHE" }, \
6bdd3a01
CH
403 { IOCB_DIO_CALLER_COMP, "CALLER_COMP" }, \
404 { IOCB_AIO_RW, "AIO_RW" }, \
405 { IOCB_HAS_METADATA, "AIO_HAS_METADATA" }
f6c73a11 406
e2e40f2c
CH
407struct kiocb {
408 struct file *ki_filp;
409 loff_t ki_pos;
6b19b766 410 void (*ki_complete)(struct kiocb *iocb, long ret);
e2e40f2c
CH
411 void *private;
412 int ki_flags;
d9a08a9e 413 u16 ki_ioprio; /* See linux/ioprio.h */
732f25a2 414 u8 ki_write_stream;
9cf3516c
JA
415 union {
416 /*
417 * Only used for async buffered reads, where it denotes the
418 * page waitqueue associated with completing the read. Valid
419 * IFF IOCB_WAITQ is set.
420 */
421 struct wait_page_queue *ki_waitq;
422 /*
423 * Can be used for O_DIRECT IO, where the completion handling
424 * is punted back to the issuer of the IO. May only be set
425 * if IOCB_DIO_CALLER_COMP is set by the issuer, and the issuer
426 * must then check for presence of this handler when ki_complete
427 * is invoked. The data passed in to this handler must be
428 * assigned to ->private when dio_complete is assigned.
429 */
430 ssize_t (*dio_complete)(void *data);
431 };
84c4e1f8 432};
e2e40f2c
CH
433
434static inline bool is_sync_kiocb(struct kiocb *kiocb)
435{
436 return kiocb->ki_complete == NULL;
437}
438
1da177e4 439struct address_space_operations {
5efe7448 440 int (*read_folio)(struct file *, struct folio *);
1da177e4
LT
441
442 /* Write back some dirty pages from this mapping. */
443 int (*writepages)(struct address_space *, struct writeback_control *);
444
3a3bae50 445 /* Mark a folio dirty. Return true if this dirtied it */
6f31a5a2 446 bool (*dirty_folio)(struct address_space *, struct folio *);
1da177e4 447
8151b4c8 448 void (*readahead)(struct readahead_control *);
1da177e4 449
e9d8e2bf 450 int (*write_begin)(const struct kiocb *, struct address_space *mapping,
9d6b0cd7 451 loff_t pos, unsigned len,
1da86618 452 struct folio **foliop, void **fsdata);
e9d8e2bf 453 int (*write_end)(const struct kiocb *, struct address_space *mapping,
afddba49 454 loff_t pos, unsigned len, unsigned copied,
a225800f 455 struct folio *folio, void *fsdata);
afddba49 456
1da177e4
LT
457 /* Unfortunately this kludge is needed for FIBMAP. Don't use it */
458 sector_t (*bmap)(struct address_space *, sector_t);
128d1f82 459 void (*invalidate_folio) (struct folio *, size_t offset, size_t len);
fa29000b 460 bool (*release_folio)(struct folio *, gfp_t);
d2329aa0 461 void (*free_folio)(struct folio *folio);
c8b8e32d 462 ssize_t (*direct_IO)(struct kiocb *, struct iov_iter *iter);
b969c4ab 463 /*
5490da4f 464 * migrate the contents of a folio to the specified target. If
ef277c73 465 * migrate_mode is MIGRATE_ASYNC, it must not block.
b969c4ab 466 */
5490da4f
MWO
467 int (*migrate_folio)(struct address_space *, struct folio *dst,
468 struct folio *src, enum migrate_mode);
072acba6 469 int (*launder_folio)(struct folio *);
2e7e80f7
MWO
470 bool (*is_partially_uptodate) (struct folio *, size_t from,
471 size_t count);
520f301c 472 void (*is_dirty_writeback) (struct folio *, bool *dirty, bool *wb);
af7628d6 473 int (*error_remove_folio)(struct address_space *, struct folio *);
62c230bc
MG
474
475 /* swapfile support */
a509bc1a
MG
476 int (*swap_activate)(struct swap_info_struct *sis, struct file *file,
477 sector_t *span);
478 void (*swap_deactivate)(struct file *file);
e1209d3a 479 int (*swap_rw)(struct kiocb *iocb, struct iov_iter *iter);
1da177e4
LT
480};
481
7dcda1c9
JA
482extern const struct address_space_operations empty_aops;
483
eb797a8e
MW
484/**
485 * struct address_space - Contents of a cacheable, mappable object.
486 * @host: Owner, either the inode or the block_device.
487 * @i_pages: Cached pages.
730633f0
JK
488 * @invalidate_lock: Guards coherency between page cache contents and
489 * file offset->disk block mappings in the filesystem during invalidates.
490 * It is also used to block modification of page cache contents through
491 * memory mappings.
eb797a8e 492 * @gfp_mask: Memory allocation flags to use for allocating pages.
e8e17ee9 493 * @i_mmap_writable: Number of VM_SHARED, VM_MAYWRITE mappings.
09d91cda 494 * @nr_thps: Number of THPs in the pagecache (non-shmem only).
eb797a8e
MW
495 * @i_mmap: Tree of private and shared mappings.
496 * @i_mmap_rwsem: Protects @i_mmap and @i_mmap_writable.
497 * @nrpages: Number of page entries, protected by the i_pages lock.
eb797a8e
MW
498 * @writeback_index: Writeback starts here.
499 * @a_ops: Methods.
500 * @flags: Error bits and flags (AS_*).
501 * @wb_err: The most recent error which has occurred.
600f111e
MWO
502 * @i_private_lock: For use by the owner of the address_space.
503 * @i_private_list: For use by the owner of the address_space.
504 * @i_private_data: For use by the owner of the address_space.
eb797a8e 505 */
1da177e4 506struct address_space {
eb797a8e
MW
507 struct inode *host;
508 struct xarray i_pages;
730633f0 509 struct rw_semaphore invalidate_lock;
eb797a8e
MW
510 gfp_t gfp_mask;
511 atomic_t i_mmap_writable;
09d91cda
SL
512#ifdef CONFIG_READ_ONLY_THP_FOR_FS
513 /* number of thp, only for non-shmem files */
514 atomic_t nr_thps;
515#endif
eb797a8e 516 struct rb_root_cached i_mmap;
eb797a8e 517 unsigned long nrpages;
eb797a8e
MW
518 pgoff_t writeback_index;
519 const struct address_space_operations *a_ops;
520 unsigned long flags;
5660e13d 521 errseq_t wb_err;
600f111e
MWO
522 spinlock_t i_private_lock;
523 struct list_head i_private_list;
d3b1a9a7 524 struct rw_semaphore i_mmap_rwsem;
600f111e 525 void * i_private_data;
3859a271 526} __attribute__((aligned(sizeof(long)))) __randomize_layout;
1da177e4
LT
527 /*
528 * On most architectures that alignment is already the case; but
25985edc 529 * must be enforced here for CRIS, to let the least significant bit
df25569d 530 * of struct folio's "mapping" pointer be used for FOLIO_MAPPING_ANON.
1da177e4 531 */
1da177e4 532
ff9c745b
MW
533/* XArray tags, for tagging dirty and writeback pages in the pagecache. */
534#define PAGECACHE_TAG_DIRTY XA_MARK_0
535#define PAGECACHE_TAG_WRITEBACK XA_MARK_1
536#define PAGECACHE_TAG_TOWRITE XA_MARK_2
537
1da177e4 538/*
ff9c745b 539 * Returns true if any of the pages in the mapping are marked with the tag.
1da177e4 540 */
ff9c745b
MW
541static inline bool mapping_tagged(struct address_space *mapping, xa_mark_t tag)
542{
543 return xa_marked(&mapping->i_pages, tag);
544}
1da177e4 545
8b28f621
DB
546static inline void i_mmap_lock_write(struct address_space *mapping)
547{
c8c06efa 548 down_write(&mapping->i_mmap_rwsem);
8b28f621
DB
549}
550
c0d0381a
MK
551static inline int i_mmap_trylock_write(struct address_space *mapping)
552{
553 return down_write_trylock(&mapping->i_mmap_rwsem);
554}
555
8b28f621
DB
556static inline void i_mmap_unlock_write(struct address_space *mapping)
557{
c8c06efa 558 up_write(&mapping->i_mmap_rwsem);
8b28f621
DB
559}
560
6d4675e6
MK
561static inline int i_mmap_trylock_read(struct address_space *mapping)
562{
563 return down_read_trylock(&mapping->i_mmap_rwsem);
564}
565
3dec0ba0
DB
566static inline void i_mmap_lock_read(struct address_space *mapping)
567{
568 down_read(&mapping->i_mmap_rwsem);
569}
570
571static inline void i_mmap_unlock_read(struct address_space *mapping)
572{
573 up_read(&mapping->i_mmap_rwsem);
574}
575
34ae204f
MK
576static inline void i_mmap_assert_locked(struct address_space *mapping)
577{
578 lockdep_assert_held(&mapping->i_mmap_rwsem);
579}
580
581static inline void i_mmap_assert_write_locked(struct address_space *mapping)
582{
583 lockdep_assert_held_write(&mapping->i_mmap_rwsem);
584}
585
1da177e4
LT
586/*
587 * Might pages of this file be mapped into userspace?
588 */
589static inline int mapping_mapped(struct address_space *mapping)
590{
f808c13f 591 return !RB_EMPTY_ROOT(&mapping->i_mmap.rb_root);
1da177e4
LT
592}
593
594/*
595 * Might pages of this file have been modified in userspace?
e8e17ee9 596 * Note that i_mmap_writable counts all VM_SHARED, VM_MAYWRITE vmas: do_mmap
1da177e4
LT
597 * marks vma as VM_SHARED if it is shared, and the file was opened for
598 * writing i.e. vma may be mprotected writable even if now readonly.
4bb5f5d9
DR
599 *
600 * If i_mmap_writable is negative, no new writable mappings are allowed. You
601 * can only deny writable mappings, if none exists right now.
1da177e4
LT
602 */
603static inline int mapping_writably_mapped(struct address_space *mapping)
604{
4bb5f5d9
DR
605 return atomic_read(&mapping->i_mmap_writable) > 0;
606}
607
608static inline int mapping_map_writable(struct address_space *mapping)
609{
610 return atomic_inc_unless_negative(&mapping->i_mmap_writable) ?
611 0 : -EPERM;
612}
613
614static inline void mapping_unmap_writable(struct address_space *mapping)
615{
616 atomic_dec(&mapping->i_mmap_writable);
617}
618
619static inline int mapping_deny_writable(struct address_space *mapping)
620{
621 return atomic_dec_unless_positive(&mapping->i_mmap_writable) ?
622 0 : -EBUSY;
623}
624
625static inline void mapping_allow_writable(struct address_space *mapping)
626{
627 atomic_inc(&mapping->i_mmap_writable);
1da177e4
LT
628}
629
630/*
631 * Use sequence counter to get consistent i_size on 32-bit processors.
632 */
633#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
634#include <linux/seqlock.h>
635#define __NEED_I_SIZE_ORDERED
636#define i_size_ordered_init(inode) seqcount_init(&inode->i_size_seqcount)
637#else
638#define i_size_ordered_init(inode) do { } while (0)
639#endif
640
f19d4a8f
AV
641struct posix_acl;
642#define ACL_NOT_CACHED ((void *)(-1))
332f606b
MS
643/*
644 * ACL_DONT_CACHE is for stacked filesystems, that rely on underlying fs to
cac2f8b8
CB
645 * cache the ACL. This also means that ->get_inode_acl() can be called in RCU
646 * mode with the LOOKUP_RCU flag.
332f606b 647 */
2a3a2a3f 648#define ACL_DONT_CACHE ((void *)(-3))
f19d4a8f 649
b8a7a3a6
AG
650static inline struct posix_acl *
651uncached_acl_sentinel(struct task_struct *task)
652{
653 return (void *)task + 1;
654}
655
656static inline bool
657is_uncached_acl(struct posix_acl *acl)
658{
659 return (long)acl & 1;
660}
661
3ddcd056
LT
662#define IOP_FASTPERM 0x0001
663#define IOP_LOOKUP 0x0002
664#define IOP_NOFOLLOW 0x0004
d0a5b995 665#define IOP_XATTR 0x0008
76fca90e 666#define IOP_DEFAULT_READLINK 0x0010
9fed2c0f 667#define IOP_MGTIME 0x0020
ea382199 668#define IOP_CACHED_LINK 0x0040
3ddcd056
LT
669
670/*
671 * Keep mostly read-only and often accessed (especially for
672 * the RCU path lookup and 'stat' data) fields at the beginning
673 * of the 'struct inode'
674 */
1da177e4 675struct inode {
44a7d7a8 676 umode_t i_mode;
3ddcd056 677 unsigned short i_opflags;
92361636
EB
678 kuid_t i_uid;
679 kgid_t i_gid;
3ddcd056
LT
680 unsigned int i_flags;
681
682#ifdef CONFIG_FS_POSIX_ACL
683 struct posix_acl *i_acl;
684 struct posix_acl *i_default_acl;
685#endif
686
44a7d7a8
NP
687 const struct inode_operations *i_op;
688 struct super_block *i_sb;
3ddcd056 689 struct address_space *i_mapping;
44a7d7a8 690
13e12d14
LT
691#ifdef CONFIG_SECURITY
692 void *i_security;
693#endif
44a7d7a8 694
3ddcd056
LT
695 /* Stat data, not accessed from path walking */
696 unsigned long i_ino;
a78ef704
MS
697 /*
698 * Filesystems may only read i_nlink directly. They shall use the
699 * following functions for modification:
700 *
701 * (set|clear|inc|drop)_nlink
702 * inode_(inc|dec)_link_count
703 */
704 union {
705 const unsigned int i_nlink;
706 unsigned int __i_nlink;
707 };
3ddcd056 708 dev_t i_rdev;
2f9d3df8 709 loff_t i_size;
3aa63a56
JL
710 time64_t i_atime_sec;
711 time64_t i_mtime_sec;
712 time64_t i_ctime_sec;
713 u32 i_atime_nsec;
714 u32 i_mtime_nsec;
715 u32 i_ctime_nsec;
716 u32 i_generation;
6cdbb0ef
TT
717 spinlock_t i_lock; /* i_blocks, i_bytes, maybe i_size */
718 unsigned short i_bytes;
69448867 719 u8 i_blkbits;
fe3944fb 720 enum rw_hint i_write_hint;
3ddcd056
LT
721 blkcnt_t i_blocks;
722
723#ifdef __NEED_I_SIZE_ORDERED
724 seqcount_t i_size_seqcount;
725#endif
726
727 /* Misc */
2b111edb
CB
728 u32 i_state;
729 /* 32-bit hole */
9902af79 730 struct rw_semaphore i_rwsem;
13e12d14 731
44a7d7a8 732 unsigned long dirtied_when; /* jiffies of first dirtying */
a2f48706 733 unsigned long dirtied_time_when;
44a7d7a8 734
1da177e4 735 struct hlist_node i_hash;
c7f54084 736 struct list_head i_io_list; /* backing dev IO list */
52ebea74
TH
737#ifdef CONFIG_CGROUP_WRITEBACK
738 struct bdi_writeback *i_wb; /* the associated cgroup wb */
2a814908
TH
739
740 /* foreign inode detection, see wbc_detach_inode() */
741 int i_wb_frn_winner;
742 u16 i_wb_frn_avg_time;
743 u16 i_wb_frn_history;
52ebea74 744#endif
7ccf19a8 745 struct list_head i_lru; /* inode LRU list */
1da177e4 746 struct list_head i_sb_list;
6c60d2b5 747 struct list_head i_wb_list; /* backing dev writeback list */
fa0d7e3d 748 union {
b3d9b7a3 749 struct hlist_head i_dentry;
fa0d7e3d
NP
750 struct rcu_head i_rcu;
751 };
f02a9ad1 752 atomic64_t i_version;
8019ad13 753 atomic64_t i_sequence; /* see futex */
2f9d3df8 754 atomic_t i_count;
bd5fe6c5 755 atomic_t i_dio_count;
6cdbb0ef 756 atomic_t i_writecount;
387e3746 757#if defined(CONFIG_IMA) || defined(CONFIG_FILE_LOCKING)
d984ea60
MZ
758 atomic_t i_readcount; /* struct files open RO */
759#endif
fdb0da89
AV
760 union {
761 const struct file_operations *i_fop; /* former ->i_op->default_file_ops */
762 void (*free_inode)(struct inode *);
763 };
4a075e39 764 struct file_lock_context *i_flctx;
1da177e4 765 struct address_space i_data;
ea382199
MG
766 union {
767 struct list_head i_devices;
768 int i_linklen;
769 };
4c154168
TT
770 union {
771 struct pipe_inode_info *i_pipe;
577c4eb0 772 struct cdev *i_cdev;
61ba64fc 773 char *i_link;
84e710da 774 unsigned i_dir_seq;
4c154168 775 };
1da177e4 776
1da177e4 777
3be25f49
EP
778#ifdef CONFIG_FSNOTIFY
779 __u32 i_fsnotify_mask; /* all events this inode cares about */
3aa63a56 780 /* 32-bit hole reserved for expanding i_fsnotify_mask */
08991e83 781 struct fsnotify_mark_connector __rcu *i_fsnotify_marks;
0eeca283
RL
782#endif
783
643fa961 784#ifdef CONFIG_FS_ENCRYPTION
3e7807d5 785 struct fscrypt_inode_info *i_crypt_info;
0b81d077
JK
786#endif
787
5585f2af
EB
788#ifdef CONFIG_FS_VERITY
789 struct fsverity_info *i_verity_info;
790#endif
791
8e18e294 792 void *i_private; /* fs or device private pointer */
3859a271 793} __randomize_layout;
1da177e4 794
ea382199
MG
795static inline void inode_set_cached_link(struct inode *inode, char *link, int linklen)
796{
3eb7e951
MG
797 VFS_WARN_ON_INODE(strlen(link) != linklen, inode);
798 VFS_WARN_ON_INODE(inode->i_opflags & IOP_CACHED_LINK, inode);
ea382199
MG
799 inode->i_link = link;
800 inode->i_linklen = linklen;
801 inode->i_opflags |= IOP_CACHED_LINK;
802}
803
da18ecbf
CB
804/*
805 * Get bit address from inode->i_state to use with wait_var_event()
806 * infrastructre.
807 */
808#define inode_state_wait_address(inode, bit) ((char *)&(inode)->i_state + (bit))
809
810struct wait_queue_head *inode_bit_waitqueue(struct wait_bit_queue_entry *wqe,
811 struct inode *inode, u32 bit);
812
813static inline void inode_wake_up_bit(struct inode *inode, u32 bit)
814{
815 /* Caller is responsible for correct memory barriers. */
816 wake_up_var(inode_state_wait_address(inode, bit));
817}
818
50e17c00
DD
819struct timespec64 timestamp_truncate(struct timespec64 t, struct inode *inode);
820
93407472
FF
821static inline unsigned int i_blocksize(const struct inode *node)
822{
823 return (1 << node->i_blkbits);
824}
825
1d3382cb
AV
826static inline int inode_unhashed(struct inode *inode)
827{
828 return hlist_unhashed(&inode->i_hash);
829}
830
5bef9151
AV
831/*
832 * __mark_inode_dirty expects inodes to be hashed. Since we don't
833 * want special inodes in the fileset inode space, we make them
834 * appear hashed, but do not put on any lists. hlist_del()
835 * will work fine and require no locking.
836 */
837static inline void inode_fake_hash(struct inode *inode)
838{
839 hlist_add_fake(&inode->i_hash);
840}
841
f2eace23 842/*
2773d282 843 * inode->i_rwsem nesting subclasses for the lock validator:
f2eace23
IM
844 *
845 * 0: the object of the current VFS operation
846 * 1: parent
847 * 2: child/target
40bd22c9
BF
848 * 3: xattr
849 * 4: second non-directory
d1b72cc6
MS
850 * 5: second parent (when locking independent directories in rename)
851 *
852 * I_MUTEX_NONDIR2 is for certain operations (such as rename) which lock two
40bd22c9 853 * non-directories at once.
f2eace23
IM
854 *
855 * The locking order between these classes is
d1b72cc6 856 * parent[2] -> child -> grandchild -> normal -> xattr -> second non-directory
f2eace23
IM
857 */
858enum inode_i_mutex_lock_class
859{
860 I_MUTEX_NORMAL,
861 I_MUTEX_PARENT,
862 I_MUTEX_CHILD,
4df46240 863 I_MUTEX_XATTR,
d1b72cc6
MS
864 I_MUTEX_NONDIR2,
865 I_MUTEX_PARENT2,
f2eace23
IM
866};
867
5955102c
AV
868static inline void inode_lock(struct inode *inode)
869{
9902af79 870 down_write(&inode->i_rwsem);
5955102c
AV
871}
872
d8c5507c
MK
873static inline __must_check int inode_lock_killable(struct inode *inode)
874{
875 return down_write_killable(&inode->i_rwsem);
876}
877
5955102c
AV
878static inline void inode_unlock(struct inode *inode)
879{
9902af79
AV
880 up_write(&inode->i_rwsem);
881}
882
883static inline void inode_lock_shared(struct inode *inode)
884{
885 down_read(&inode->i_rwsem);
886}
887
d8c5507c
MK
888static inline __must_check int inode_lock_shared_killable(struct inode *inode)
889{
890 return down_read_killable(&inode->i_rwsem);
891}
892
9902af79
AV
893static inline void inode_unlock_shared(struct inode *inode)
894{
895 up_read(&inode->i_rwsem);
5955102c
AV
896}
897
898static inline int inode_trylock(struct inode *inode)
899{
9902af79
AV
900 return down_write_trylock(&inode->i_rwsem);
901}
902
903static inline int inode_trylock_shared(struct inode *inode)
904{
905 return down_read_trylock(&inode->i_rwsem);
5955102c
AV
906}
907
908static inline int inode_is_locked(struct inode *inode)
909{
9902af79 910 return rwsem_is_locked(&inode->i_rwsem);
5955102c
AV
911}
912
913static inline void inode_lock_nested(struct inode *inode, unsigned subclass)
914{
9902af79 915 down_write_nested(&inode->i_rwsem, subclass);
5955102c
AV
916}
917
01c2e13d
DW
918static inline void inode_lock_shared_nested(struct inode *inode, unsigned subclass)
919{
920 down_read_nested(&inode->i_rwsem, subclass);
921}
922
730633f0
JK
923static inline void filemap_invalidate_lock(struct address_space *mapping)
924{
925 down_write(&mapping->invalidate_lock);
926}
927
928static inline void filemap_invalidate_unlock(struct address_space *mapping)
929{
930 up_write(&mapping->invalidate_lock);
931}
932
933static inline void filemap_invalidate_lock_shared(struct address_space *mapping)
934{
935 down_read(&mapping->invalidate_lock);
936}
937
938static inline int filemap_invalidate_trylock_shared(
939 struct address_space *mapping)
940{
941 return down_read_trylock(&mapping->invalidate_lock);
942}
943
944static inline void filemap_invalidate_unlock_shared(
945 struct address_space *mapping)
946{
947 up_read(&mapping->invalidate_lock);
948}
949
375e289e
BF
950void lock_two_nondirectories(struct inode *, struct inode*);
951void unlock_two_nondirectories(struct inode *, struct inode*);
952
7506ae6a
JK
953void filemap_invalidate_lock_two(struct address_space *mapping1,
954 struct address_space *mapping2);
955void filemap_invalidate_unlock_two(struct address_space *mapping1,
956 struct address_space *mapping2);
957
958
1da177e4
LT
959/*
960 * NOTE: in a 32bit arch with a preemptable kernel and
961 * an UP compile the i_size_read/write must be atomic
962 * with respect to the local cpu (unlike with preempt disabled),
963 * but they don't need to be atomic with respect to other cpus like in
964 * true SMP (so they need either to either locally disable irq around
965 * the read or for example on x86 they can be still implemented as a
966 * cmpxchg8b without the need of the lock prefix). For SMP compiles
967 * and 64bit archs it makes no difference if preempt is enabled or not.
968 */
48ed214d 969static inline loff_t i_size_read(const struct inode *inode)
1da177e4
LT
970{
971#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
972 loff_t i_size;
973 unsigned int seq;
974
975 do {
976 seq = read_seqcount_begin(&inode->i_size_seqcount);
977 i_size = inode->i_size;
978 } while (read_seqcount_retry(&inode->i_size_seqcount, seq));
979 return i_size;
2496396f 980#elif BITS_PER_LONG==32 && defined(CONFIG_PREEMPTION)
1da177e4
LT
981 loff_t i_size;
982
983 preempt_disable();
984 i_size = inode->i_size;
985 preempt_enable();
986 return i_size;
987#else
d8f899d1
BL
988 /* Pairs with smp_store_release() in i_size_write() */
989 return smp_load_acquire(&inode->i_size);
1da177e4
LT
990#endif
991}
992
7762f5a0
MS
993/*
994 * NOTE: unlike i_size_read(), i_size_write() does need locking around it
2773d282 995 * (normally i_rwsem), otherwise on 32bit/SMP an update of i_size_seqcount
7762f5a0
MS
996 * can be lost, resulting in subsequent i_size_read() calls spinning forever.
997 */
1da177e4
LT
998static inline void i_size_write(struct inode *inode, loff_t i_size)
999{
1000#if BITS_PER_LONG==32 && defined(CONFIG_SMP)
74e3d1e1 1001 preempt_disable();
1da177e4
LT
1002 write_seqcount_begin(&inode->i_size_seqcount);
1003 inode->i_size = i_size;
1004 write_seqcount_end(&inode->i_size_seqcount);
74e3d1e1 1005 preempt_enable();
2496396f 1006#elif BITS_PER_LONG==32 && defined(CONFIG_PREEMPTION)
1da177e4
LT
1007 preempt_disable();
1008 inode->i_size = i_size;
1009 preempt_enable();
1010#else
d8f899d1
BL
1011 /*
1012 * Pairs with smp_load_acquire() in i_size_read() to ensure
1013 * changes related to inode size (such as page contents) are
1014 * visible before we see the changed inode size.
1015 */
1016 smp_store_release(&inode->i_size, i_size);
1da177e4
LT
1017#endif
1018}
1019
48ed214d 1020static inline unsigned iminor(const struct inode *inode)
1da177e4
LT
1021{
1022 return MINOR(inode->i_rdev);
1023}
1024
48ed214d 1025static inline unsigned imajor(const struct inode *inode)
1da177e4
LT
1026{
1027 return MAJOR(inode->i_rdev);
1028}
1029
1da177e4 1030struct fown_struct {
1934b212 1031 struct file *file; /* backpointer for security modules */
1da177e4 1032 rwlock_t lock; /* protects pid, uid, euid fields */
609d7fa9
EB
1033 struct pid *pid; /* pid or -pgrp where SIGIO should be sent */
1034 enum pid_type pid_type; /* Kind of process group SIGIO should be sent to */
92361636 1035 kuid_t uid, euid; /* uid/euid of process setting the owner */
1da177e4
LT
1036 int signum; /* posix.1b rt signal to be delivered on IO */
1037};
1038
c790fbf2
MWO
1039/**
1040 * struct file_ra_state - Track a file's readahead state.
1041 * @start: Where the most recent readahead started.
1042 * @size: Number of pages read in the most recent readahead.
84dacdbd
N
1043 * @async_size: Numer of pages that were/are not needed immediately
1044 * and so were/are genuinely "ahead". Start next readahead when
1045 * the first of these pages is accessed.
1046 * @ra_pages: Maximum size of a readahead request, copied from the bdi.
c4602f9f 1047 * @order: Preferred folio order used for most recent readahead.
c790fbf2
MWO
1048 * @mmap_miss: How many mmap accesses missed in the page cache.
1049 * @prev_pos: The last byte in the most recent read request.
84dacdbd
N
1050 *
1051 * When this structure is passed to ->readahead(), the "most recent"
1052 * readahead means the current readahead.
1da177e4
LT
1053 */
1054struct file_ra_state {
c790fbf2
MWO
1055 pgoff_t start;
1056 unsigned int size;
1057 unsigned int async_size;
1058 unsigned int ra_pages;
c4602f9f 1059 unsigned short order;
f5e8b140 1060 unsigned short mmap_miss;
c790fbf2 1061 loff_t prev_pos;
1da177e4 1062};
1da177e4 1063
5ce1110b
FW
1064/*
1065 * Check if @index falls in the readahead windows.
1066 */
1067static inline int ra_has_index(struct file_ra_state *ra, pgoff_t index)
1068{
f9acc8c7
FW
1069 return (index >= ra->start &&
1070 index < ra->start + ra->size);
5ce1110b
FW
1071}
1072
c0390d54
CB
1073/**
1074 * struct file - Represents a file
c0390d54
CB
1075 * @f_lock: Protects f_ep, f_flags. Must not be taken from IRQ context.
1076 * @f_mode: FMODE_* flags often used in hotpaths
1077 * @f_op: file operations
1078 * @f_mapping: Contents of a cacheable, mappable object.
1079 * @private_data: filesystem or driver specific data
1080 * @f_inode: cached inode
1081 * @f_flags: file flags
1082 * @f_iocb_flags: iocb flags
1083 * @f_cred: stashed credentials of creator/opener
e249056c 1084 * @f_owner: file owner
c0390d54
CB
1085 * @f_path: path of the file
1086 * @f_pos_lock: lock protecting file position
5e9b50de 1087 * @f_pipe: specific to pipes
c0390d54 1088 * @f_pos: file position
c0390d54 1089 * @f_security: LSM security context of this file
c0390d54
CB
1090 * @f_wb_err: writeback error
1091 * @f_sb_err: per sb writeback errors
1092 * @f_ep: link of all epoll hooks for this file
1093 * @f_task_work: task work entry point
1094 * @f_llist: work queue entrypoint
1095 * @f_ra: file's readahead state
ea566e18 1096 * @f_freeptr: Pointer used by SLAB_TYPESAFE_BY_RCU file cache (don't touch.)
e249056c 1097 * @f_ref: reference count
a7bc2e8d 1098 */
1da177e4 1099struct file {
c0390d54
CB
1100 spinlock_t f_lock;
1101 fmode_t f_mode;
a7bc2e8d 1102 const struct file_operations *f_op;
c0390d54
CB
1103 struct address_space *f_mapping;
1104 void *private_data;
1105 struct inode *f_inode;
1106 unsigned int f_flags;
1107 unsigned int f_iocb_flags;
1108 const struct cred *f_cred;
e249056c 1109 struct fown_struct *f_owner;
c0390d54
CB
1110 /* --- cacheline 1 boundary (64 bytes) --- */
1111 struct path f_path;
2f512016 1112 union {
5e9b50de
CB
1113 /* regular files (with FMODE_ATOMIC_POS) and directories */
1114 struct mutex f_pos_lock;
1115 /* pipes */
1116 u64 f_pipe;
e87f2c26 1117 };
c0390d54 1118 loff_t f_pos;
50462062 1119#ifdef CONFIG_SECURITY
c0390d54 1120 void *f_security;
50462062 1121#endif
11068e0b 1122 /* --- cacheline 2 boundary (128 bytes) --- */
c0390d54
CB
1123 errseq_t f_wb_err;
1124 errseq_t f_sb_err;
1da177e4 1125#ifdef CONFIG_EPOLL
c0390d54
CB
1126 struct hlist_head *f_ep;
1127#endif
1128 union {
1129 struct callback_head f_task_work;
1130 struct llist_node f_llist;
1131 struct file_ra_state f_ra;
ea566e18 1132 freeptr_t f_freeptr;
c0390d54 1133 };
e249056c 1134 file_ref_t f_ref;
c0390d54 1135 /* --- cacheline 3 boundary (192 bytes) --- */
3859a271
KC
1136} __randomize_layout
1137 __attribute__((aligned(4))); /* lest something weird decides that 2 is OK */
1da177e4 1138
990d6c2d
AK
1139struct file_handle {
1140 __u32 handle_bytes;
1141 int handle_type;
1142 /* file identifier */
68d6f4f3 1143 unsigned char f_handle[] __counted_by(handle_bytes);
990d6c2d
AK
1144};
1145
cb0942b8
AV
1146static inline struct file *get_file(struct file *f)
1147{
90ee6ed7 1148 file_ref_inc(&f->f_ref);
cb0942b8
AV
1149 return f;
1150}
0ede61d8
CB
1151
1152struct file *get_file_rcu(struct file __rcu **f);
61d4fb0b 1153struct file *get_file_active(struct file **f);
0ede61d8 1154
90ee6ed7 1155#define file_count(f) file_ref_read(&(f)->f_ref)
1da177e4
LT
1156
1157#define MAX_NON_LFS ((1UL<<31) - 1)
1158
1159/* Page cache limit. The filesystems should put that into their s_maxbytes
1160 limits, otherwise bad things can happen in VM. */
1161#if BITS_PER_LONG==32
0cc3b0ec 1162#define MAX_LFS_FILESIZE ((loff_t)ULONG_MAX << PAGE_SHIFT)
1da177e4 1163#elif BITS_PER_LONG==64
0cc3b0ec 1164#define MAX_LFS_FILESIZE ((loff_t)LLONG_MAX)
1da177e4
LT
1165#endif
1166
7ca76311 1167/* legacy typedef, should eventually be removed */
17fa388d 1168typedef void *fl_owner_t;
1da177e4 1169
a7231a97 1170struct file_lock;
c69ff407 1171struct file_lease;
a7231a97 1172
1da177e4
LT
1173/* The following constant reflects the upper bound of the file/locking space */
1174#ifndef OFFSET_MAX
ea258f15
ZL
1175#define OFFSET_MAX type_max(loff_t)
1176#define OFFT_OFFSET_MAX type_max(off_t)
1da177e4
LT
1177#endif
1178
1934b212
CB
1179int file_f_owner_allocate(struct file *file);
1180static inline struct fown_struct *file_f_owner(const struct file *file)
1181{
1182 return READ_ONCE(file->f_owner);
1183}
1184
bfcd17a6
TP
1185extern void send_sigio(struct fown_struct *fown, int fd, int band);
1186
ee296d7c
JL
1187static inline struct inode *file_inode(const struct file *f)
1188{
1189 return f->f_inode;
1190}
1191
3058fca1
AG
1192/*
1193 * file_dentry() is a relic from the days that overlayfs was using files with a
1194 * "fake" path, meaning, f_path on overlayfs and f_inode on underlying fs.
1195 * In those days, file_dentry() was needed to get the underlying fs dentry that
1196 * matches f_inode.
1197 * Files with "fake" path should not exist nowadays, so use an assertion to make
1198 * sure that file_dentry() was not papering over filesystem bugs.
1199 */
d101a125
MS
1200static inline struct dentry *file_dentry(const struct file *file)
1201{
3058fca1
AG
1202 struct dentry *dentry = file->f_path.dentry;
1203
1204 WARN_ON_ONCE(d_inode(dentry) != file_inode(file));
1205 return dentry;
d101a125
MS
1206}
1207
1da177e4 1208struct fasync_struct {
7a107c0f 1209 rwlock_t fa_lock;
989a2979
ED
1210 int magic;
1211 int fa_fd;
1212 struct fasync_struct *fa_next; /* singly linked list */
1213 struct file *fa_file;
1214 struct rcu_head fa_rcu;
1da177e4
LT
1215};
1216
1217#define FASYNC_MAGIC 0x4601
1218
1219/* SMP safe fasync helpers: */
1220extern int fasync_helper(int, struct file *, int, struct fasync_struct **);
f7347ce4
LT
1221extern struct fasync_struct *fasync_insert_entry(int, struct file *, struct fasync_struct **, struct fasync_struct *);
1222extern int fasync_remove_entry(struct file *, struct fasync_struct **);
1223extern struct fasync_struct *fasync_alloc(void);
1224extern void fasync_free(struct fasync_struct *);
1225
1da177e4
LT
1226/* can be called from interrupts */
1227extern void kill_fasync(struct fasync_struct **, int, int);
1da177e4 1228
e0b93edd 1229extern void __f_setown(struct file *filp, struct pid *, enum pid_type, int force);
bccb5c39 1230extern int f_setown(struct file *filp, int who, int force);
1da177e4 1231extern void f_delown(struct file *filp);
609d7fa9 1232extern pid_t f_getown(struct file *filp);
1934b212 1233extern int send_sigurg(struct file *file);
1da177e4 1234
e462ec50
DH
1235/*
1236 * sb->s_flags. Note that these mirror the equivalent MS_* flags where
1237 * represented in both.
1238 */
f15afbd3
HG
1239#define SB_RDONLY BIT(0) /* Mount read-only */
1240#define SB_NOSUID BIT(1) /* Ignore suid and sgid bits */
1241#define SB_NODEV BIT(2) /* Disallow access to device special files */
1242#define SB_NOEXEC BIT(3) /* Disallow program execution */
1243#define SB_SYNCHRONOUS BIT(4) /* Writes are synced at once */
1244#define SB_MANDLOCK BIT(6) /* Allow mandatory locks on an FS */
1245#define SB_DIRSYNC BIT(7) /* Directory modifications are synchronous */
1246#define SB_NOATIME BIT(10) /* Do not update access times. */
1247#define SB_NODIRATIME BIT(11) /* Do not update directory access times */
1248#define SB_SILENT BIT(15)
5aa8fd9c 1249#define SB_POSIXACL BIT(16) /* Supports POSIX ACLs */
f15afbd3
HG
1250#define SB_INLINECRYPT BIT(17) /* Use blk-crypto for encrypted files */
1251#define SB_KERNMOUNT BIT(22) /* this is a kern_mount call */
1252#define SB_I_VERSION BIT(23) /* Update inode I_version field */
1253#define SB_LAZYTIME BIT(25) /* Update the on-disk [acm]times lazily */
e462ec50
DH
1254
1255/* These sb flags are internal to the kernel */
2c18a63b 1256#define SB_DEAD BIT(21)
5e874914 1257#define SB_DYING BIT(24)
f15afbd3
HG
1258#define SB_FORCE BIT(27)
1259#define SB_NOSEC BIT(28)
1260#define SB_BORN BIT(29)
1261#define SB_ACTIVE BIT(30)
1262#define SB_NOUSER BIT(31)
e462ec50 1263
c843843e 1264/* These flags relate to encoding and casefolding */
9e28059d
TT
1265#define SB_ENC_STRICT_MODE_FL (1 << 0)
1266#define SB_ENC_NO_COMPAT_FALLBACK_FL (1 << 1)
c843843e
DR
1267
1268#define sb_has_strict_encoding(sb) \
1269 (sb->s_encoding_flags & SB_ENC_STRICT_MODE_FL)
1270
9e28059d
TT
1271#if IS_ENABLED(CONFIG_UNICODE)
1272#define sb_no_casefold_compat_fallback(sb) \
1273 (sb->s_encoding_flags & SB_ENC_NO_COMPAT_FALLBACK_FL)
1274#else
1275#define sb_no_casefold_compat_fallback(sb) (1)
1276#endif
1277
1da177e4
LT
1278/*
1279 * Umount options
1280 */
1281
1282#define MNT_FORCE 0x00000001 /* Attempt to forcibily umount */
1283#define MNT_DETACH 0x00000002 /* Just detach from the tree */
1284#define MNT_EXPIRE 0x00000004 /* Mark for expiry */
db1f05bb
MS
1285#define UMOUNT_NOFOLLOW 0x00000008 /* Don't follow symlink on umount */
1286#define UMOUNT_UNUSED 0x80000000 /* Flag guaranteed to be unused */
1da177e4 1287
46b15caa
TH
1288/* sb->s_iflags */
1289#define SB_I_CGROUPWB 0x00000001 /* cgroup-aware writeback enabled */
90f8572b 1290#define SB_I_NOEXEC 0x00000002 /* Ignore executables on this fs */
a2982cc9 1291#define SB_I_NODEV 0x00000004 /* Ignore devices on this fs */
1cb039f3 1292#define SB_I_STABLE_WRITES 0x00000008 /* don't modify blks until WB is done */
1da177e4 1293
8654df4e
EB
1294/* sb->s_iflags to limit user namespace mounts */
1295#define SB_I_USERNS_VISIBLE 0x00000010 /* fstype already mounted */
57b56ac6
MZ
1296#define SB_I_IMA_UNVERIFIABLE_SIGNATURE 0x00000020
1297#define SB_I_UNTRUSTED_MOUNTER 0x00000040
1f65e57d 1298#define SB_I_EVM_HMAC_UNSUPPORTED 0x00000080
1da177e4 1299
32b1924b 1300#define SB_I_SKIP_SYNC 0x00000100 /* Skip superblock at global sync */
0b3ea092 1301#define SB_I_PERSB_BDI 0x00000200 /* has a per-sb bdi */
a128b054 1302#define SB_I_TS_EXPIRY_WARNED 0x00000400 /* warned about timestamp range expiry */
04b94071 1303#define SB_I_RETIRED 0x00000800 /* superblock shouldn't be reused */
5aa8fd9c 1304#define SB_I_NOUMASK 0x00001000 /* VFS does not apply umask */
2097154a 1305#define SB_I_NOIDMAP 0x00002000 /* No idmapped mounts on this superblock */
f156524e 1306#define SB_I_ALLOW_HSM 0x00004000 /* Allow HSM events on this superblock */
32b1924b 1307
5accdf82
JK
1308/* Possible states of 'frozen' field */
1309enum {
1310 SB_UNFROZEN = 0, /* FS is unfrozen */
1311 SB_FREEZE_WRITE = 1, /* Writes, dir ops, ioctls frozen */
5accdf82
JK
1312 SB_FREEZE_PAGEFAULT = 2, /* Page faults stopped as well */
1313 SB_FREEZE_FS = 3, /* For internal FS use (e.g. to stop
1314 * internal threads if needed) */
1315 SB_FREEZE_COMPLETE = 4, /* ->freeze_fs finished successfully */
1316};
1317
1318#define SB_FREEZE_LEVELS (SB_FREEZE_COMPLETE - 1)
1319
1320struct sb_writers {
880b9577 1321 unsigned short frozen; /* Is sb frozen? */
7366f8b6
CB
1322 int freeze_kcount; /* How many kernel freeze requests? */
1323 int freeze_ucount; /* How many userspace freeze requests? */
1af33317 1324 const void *freeze_owner; /* Owner of the freeze */
8129ed29 1325 struct percpu_rw_semaphore rw_sem[SB_FREEZE_LEVELS];
5accdf82
JK
1326};
1327
1da177e4
LT
1328struct super_block {
1329 struct list_head s_list; /* Keep this first */
1330 dev_t s_dev; /* search index; _not_ kdev_t */
270ba5f7
RK
1331 unsigned char s_blocksize_bits;
1332 unsigned long s_blocksize;
42cb56ae 1333 loff_t s_maxbytes; /* Max file size */
1da177e4 1334 struct file_system_type *s_type;
ee9b6d61 1335 const struct super_operations *s_op;
61e225dc 1336 const struct dquot_operations *dq_op;
0d54b217 1337 const struct quotactl_ops *s_qcop;
39655164 1338 const struct export_operations *s_export_op;
1da177e4 1339 unsigned long s_flags;
46b15caa 1340 unsigned long s_iflags; /* internal SB_I_* flags */
1da177e4
LT
1341 unsigned long s_magic;
1342 struct dentry *s_root;
1343 struct rw_semaphore s_umount;
1da177e4 1344 int s_count;
1da177e4 1345 atomic_t s_active;
50462062 1346#ifdef CONFIG_SECURITY
1da177e4 1347 void *s_security;
50462062 1348#endif
e346fb6d 1349 const struct xattr_handler * const *s_xattr;
643fa961 1350#ifdef CONFIG_FS_ENCRYPTION
0b81d077 1351 const struct fscrypt_operations *s_cop;
d7e7b9af 1352 struct fscrypt_keyring *s_master_keys; /* master crypto keys in use */
5585f2af
EB
1353#endif
1354#ifdef CONFIG_FS_VERITY
1355 const struct fsverity_operations *s_vop;
c843843e 1356#endif
5298d4bf 1357#if IS_ENABLED(CONFIG_UNICODE)
c843843e
DR
1358 struct unicode_map *s_encoding;
1359 __u16 s_encoding_flags;
bbbc3fb6 1360#endif
f1ee6162 1361 struct hlist_bl_head s_roots; /* alternate root dentries for NFS */
39f7c4db 1362 struct list_head s_mounts; /* list of mounts; _not_ for fs use */
f3a60882
CB
1363 struct block_device *s_bdev; /* can go away once we use an accessor for @s_bdev_file */
1364 struct file *s_bdev_file;
32a88aa1 1365 struct backing_dev_info *s_bdi;
acaebfd8 1366 struct mtd_info *s_mtd;
a5166169 1367 struct hlist_node s_instances;
2c5f648a 1368 unsigned int s_quota_types; /* Bitmask of supported quota types */
1da177e4
LT
1369 struct quota_info s_dquot; /* Diskquota specific options */
1370
5accdf82 1371 struct sb_writers s_writers;
1da177e4 1372
99c228a9
AG
1373 /*
1374 * Keep s_fs_info, s_time_gran, s_fsnotify_mask, and
07a3b8d0 1375 * s_fsnotify_info together for cache efficiency. They are frequently
99c228a9
AG
1376 * accessed and rarely modified.
1377 */
1378 void *s_fs_info; /* Filesystem private info */
1379
1380 /* Granularity of c/m/atime in ns (cannot be worse than a second) */
1381 u32 s_time_gran;
188d20bc
DD
1382 /* Time limits for c/m/atime in seconds */
1383 time64_t s_time_min;
1384 time64_t s_time_max;
99c228a9 1385#ifdef CONFIG_FSNOTIFY
71ff58ce 1386 u32 s_fsnotify_mask;
07a3b8d0 1387 struct fsnotify_sb_info *s_fsnotify_info;
99c228a9
AG
1388#endif
1389
ae8c5117
KO
1390 /*
1391 * q: why are s_id and s_sysfs_name not the same? both are human
1392 * readable strings that identify the filesystem
1393 * a: s_id is allowed to change at runtime; it's used in log messages,
1394 * and we want to when a device starts out as single device (s_id is dev
1395 * name) but then a device is hot added and we have to switch to
1396 * identifying it by UUID
1397 * but s_sysfs_name is a handle for programmatic access, and can't
1398 * change at runtime
1399 */
85787090
CH
1400 char s_id[32]; /* Informational name */
1401 uuid_t s_uuid; /* UUID */
a4af51ce 1402 u8 s_uuid_len; /* Default 16, possibly smaller for weird filesystems */
1da177e4 1403
ae8c5117
KO
1404 /* if set, fs shows up under sysfs at /sys/fs/$FSTYP/s_sysfs_name */
1405 char s_sysfs_name[UUID_STRING_LEN + 1];
1da177e4 1406
8de52778 1407 unsigned int s_max_links;
2fa8bf42 1408 unsigned int s_d_flags; /* default d_flags for dentries */
1da177e4
LT
1409
1410 /*
1411 * The next field is for VFS *only*. No filesystems have any business
1412 * even looking at it. You had been warned.
1413 */
a11f3a05 1414 struct mutex s_vfs_rename_mutex; /* Kludge */
1da177e4 1415
79c0b2df
MS
1416 /*
1417 * Filesystem subtype. If non-empty the filesystem type field
1418 * in /proc/mounts will be "type.subtype"
1419 */
a0c9a8b8 1420 const char *s_subtype;
b3b304a2 1421
05fb0e66 1422 const struct dentry_operations *__s_d_op; /* default d_op for dentries */
9fdfdcf1 1423
1720f5dd 1424 struct shrinker *s_shrink; /* per-sb shrinker handle */
4ed5e82f 1425
7ada4db8
MS
1426 /* Number of inodes with nlink == 0 but still referenced */
1427 atomic_long_t s_remove_count;
1428
d7439fb1 1429 /* Read-only state of the superblock is being changed */
4ed5e82f 1430 int s_readonly_remount;
7b7a8665 1431
735e4ae5
JL
1432 /* per-sb errseq_t for reporting writeback errors via syncfs */
1433 errseq_t s_wb_err;
1434
7b7a8665
CH
1435 /* AIO completions deferred from interrupt context */
1436 struct workqueue_struct *s_dio_done_wq;
215752fc 1437 struct hlist_head s_pins;
f6041567 1438
6e4eab57
EB
1439 /*
1440 * Owning user namespace and default context in which to
1441 * interpret filesystem uids, gids, quotas, device nodes,
1442 * xattrs and security labels.
1443 */
1444 struct user_namespace *s_user_ns;
1445
f6041567 1446 /*
7d10f70f
WL
1447 * The list_lru structure is essentially just a pointer to a table
1448 * of per-node lru lists, each of which has its own spinlock.
1449 * There is no need to put them into separate cachelines.
f6041567 1450 */
7d10f70f
WL
1451 struct list_lru s_dentry_lru;
1452 struct list_lru s_inode_lru;
e2fec7c3 1453 struct rcu_head rcu;
853b39a7 1454 struct work_struct destroy_work;
69c433ed 1455
e97fedb9 1456 struct mutex s_sync_lock; /* sync serialisation lock */
69c433ed
MS
1457
1458 /*
1459 * Indicates how deep in a filesystem stack this SB is
1460 */
1461 int s_stack_depth;
74278da9
DC
1462
1463 /* s_inode_list_lock protects s_inodes */
1464 spinlock_t s_inode_list_lock ____cacheline_aligned_in_smp;
1465 struct list_head s_inodes; /* all inodes */
6c60d2b5
DC
1466
1467 spinlock_t s_inode_wblist_lock;
1468 struct list_head s_inodes_wb; /* writeback inodes */
3859a271 1469} __randomize_layout;
1da177e4 1470
a1ec9040
CB
1471static inline struct user_namespace *i_user_ns(const struct inode *inode)
1472{
1473 return inode->i_sb->s_user_ns;
1474}
1475
81754357
SF
1476/* Helper functions so that in most cases filesystems will
1477 * not need to deal directly with kuid_t and kgid_t and can
1478 * instead deal with the raw numeric values that are stored
1479 * in the filesystem.
1480 */
1481static inline uid_t i_uid_read(const struct inode *inode)
1482{
a1ec9040 1483 return from_kuid(i_user_ns(inode), inode->i_uid);
81754357
SF
1484}
1485
1486static inline gid_t i_gid_read(const struct inode *inode)
1487{
a1ec9040 1488 return from_kgid(i_user_ns(inode), inode->i_gid);
81754357
SF
1489}
1490
1491static inline void i_uid_write(struct inode *inode, uid_t uid)
1492{
a1ec9040 1493 inode->i_uid = make_kuid(i_user_ns(inode), uid);
81754357
SF
1494}
1495
1496static inline void i_gid_write(struct inode *inode, gid_t gid)
1497{
a1ec9040 1498 inode->i_gid = make_kgid(i_user_ns(inode), gid);
81754357
SF
1499}
1500
234a3113 1501/**
e67fe633
CB
1502 * i_uid_into_vfsuid - map an inode's i_uid down according to an idmapping
1503 * @idmap: idmap of the mount the inode was found from
234a3113
CB
1504 * @inode: inode to map
1505 *
e67fe633 1506 * Return: whe inode's i_uid mapped down according to @idmap.
234a3113
CB
1507 * If the inode's i_uid has no mapping INVALID_VFSUID is returned.
1508 */
e67fe633 1509static inline vfsuid_t i_uid_into_vfsuid(struct mnt_idmap *idmap,
234a3113
CB
1510 const struct inode *inode)
1511{
4d7ca409 1512 return make_vfsuid(idmap, i_user_ns(inode), inode->i_uid);
e6c9a714
CB
1513}
1514
1f36146a
CB
1515/**
1516 * i_uid_needs_update - check whether inode's i_uid needs to be updated
0dbe12f2 1517 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1518 * @attr: the new attributes of @inode
1519 * @inode: the inode to update
1520 *
1521 * Check whether the $inode's i_uid field needs to be updated taking idmapped
1522 * mounts into account if the filesystem supports it.
1523 *
1524 * Return: true if @inode's i_uid field needs to be updated, false if not.
1525 */
0dbe12f2 1526static inline bool i_uid_needs_update(struct mnt_idmap *idmap,
1f36146a
CB
1527 const struct iattr *attr,
1528 const struct inode *inode)
1529{
1530 return ((attr->ia_valid & ATTR_UID) &&
1531 !vfsuid_eq(attr->ia_vfsuid,
e67fe633 1532 i_uid_into_vfsuid(idmap, inode)));
1f36146a
CB
1533}
1534
1535/**
1536 * i_uid_update - update @inode's i_uid field
0dbe12f2 1537 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1538 * @attr: the new attributes of @inode
1539 * @inode: the inode to update
1540 *
1541 * Safely update @inode's i_uid field translating the vfsuid of any idmapped
1542 * mount into the filesystem kuid.
1543 */
0dbe12f2 1544static inline void i_uid_update(struct mnt_idmap *idmap,
1f36146a
CB
1545 const struct iattr *attr,
1546 struct inode *inode)
1547{
1548 if (attr->ia_valid & ATTR_UID)
4d7ca409 1549 inode->i_uid = from_vfsuid(idmap, i_user_ns(inode),
1f36146a
CB
1550 attr->ia_vfsuid);
1551}
1552
234a3113 1553/**
e67fe633
CB
1554 * i_gid_into_vfsgid - map an inode's i_gid down according to an idmapping
1555 * @idmap: idmap of the mount the inode was found from
234a3113
CB
1556 * @inode: inode to map
1557 *
e67fe633 1558 * Return: the inode's i_gid mapped down according to @idmap.
234a3113
CB
1559 * If the inode's i_gid has no mapping INVALID_VFSGID is returned.
1560 */
e67fe633 1561static inline vfsgid_t i_gid_into_vfsgid(struct mnt_idmap *idmap,
234a3113
CB
1562 const struct inode *inode)
1563{
4d7ca409 1564 return make_vfsgid(idmap, i_user_ns(inode), inode->i_gid);
e6c9a714
CB
1565}
1566
1f36146a
CB
1567/**
1568 * i_gid_needs_update - check whether inode's i_gid needs to be updated
0dbe12f2 1569 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1570 * @attr: the new attributes of @inode
1571 * @inode: the inode to update
1572 *
1573 * Check whether the $inode's i_gid field needs to be updated taking idmapped
1574 * mounts into account if the filesystem supports it.
1575 *
1576 * Return: true if @inode's i_gid field needs to be updated, false if not.
1577 */
0dbe12f2 1578static inline bool i_gid_needs_update(struct mnt_idmap *idmap,
1f36146a
CB
1579 const struct iattr *attr,
1580 const struct inode *inode)
1581{
1582 return ((attr->ia_valid & ATTR_GID) &&
1583 !vfsgid_eq(attr->ia_vfsgid,
e67fe633 1584 i_gid_into_vfsgid(idmap, inode)));
1f36146a
CB
1585}
1586
1587/**
1588 * i_gid_update - update @inode's i_gid field
0dbe12f2 1589 * @idmap: idmap of the mount the inode was found from
1f36146a
CB
1590 * @attr: the new attributes of @inode
1591 * @inode: the inode to update
1592 *
1593 * Safely update @inode's i_gid field translating the vfsgid of any idmapped
1594 * mount into the filesystem kgid.
1595 */
0dbe12f2 1596static inline void i_gid_update(struct mnt_idmap *idmap,
1f36146a
CB
1597 const struct iattr *attr,
1598 struct inode *inode)
1599{
1600 if (attr->ia_valid & ATTR_GID)
4d7ca409 1601 inode->i_gid = from_vfsgid(idmap, i_user_ns(inode),
1f36146a
CB
1602 attr->ia_vfsgid);
1603}
1604
db998553
CB
1605/**
1606 * inode_fsuid_set - initialize inode's i_uid field with callers fsuid
1607 * @inode: inode to initialize
c14329d3 1608 * @idmap: idmap of the mount the inode was found from
db998553
CB
1609 *
1610 * Initialize the i_uid field of @inode. If the inode was found/created via
c14329d3 1611 * an idmapped mount map the caller's fsuid according to @idmap.
db998553
CB
1612 */
1613static inline void inode_fsuid_set(struct inode *inode,
c14329d3 1614 struct mnt_idmap *idmap)
db998553 1615{
c14329d3 1616 inode->i_uid = mapped_fsuid(idmap, i_user_ns(inode));
db998553
CB
1617}
1618
1619/**
1620 * inode_fsgid_set - initialize inode's i_gid field with callers fsgid
1621 * @inode: inode to initialize
c14329d3 1622 * @idmap: idmap of the mount the inode was found from
db998553
CB
1623 *
1624 * Initialize the i_gid field of @inode. If the inode was found/created via
c14329d3 1625 * an idmapped mount map the caller's fsgid according to @idmap.
db998553
CB
1626 */
1627static inline void inode_fsgid_set(struct inode *inode,
c14329d3 1628 struct mnt_idmap *idmap)
db998553 1629{
c14329d3 1630 inode->i_gid = mapped_fsgid(idmap, i_user_ns(inode));
db998553
CB
1631}
1632
8e538913
CB
1633/**
1634 * fsuidgid_has_mapping() - check whether caller's fsuid/fsgid is mapped
1635 * @sb: the superblock we want a mapping in
4609e1f1 1636 * @idmap: idmap of the relevant mount
8e538913
CB
1637 *
1638 * Check whether the caller's fsuid and fsgid have a valid mapping in the
1639 * s_user_ns of the superblock @sb. If the caller is on an idmapped mount map
4609e1f1 1640 * the caller's fsuid and fsgid according to the @idmap first.
8e538913
CB
1641 *
1642 * Return: true if fsuid and fsgid is mapped, false if not.
1643 */
1644static inline bool fsuidgid_has_mapping(struct super_block *sb,
4609e1f1 1645 struct mnt_idmap *idmap)
8e538913 1646{
476860b3
CB
1647 struct user_namespace *fs_userns = sb->s_user_ns;
1648 kuid_t kuid;
1649 kgid_t kgid;
1650
c14329d3 1651 kuid = mapped_fsuid(idmap, fs_userns);
476860b3
CB
1652 if (!uid_valid(kuid))
1653 return false;
c14329d3 1654 kgid = mapped_fsgid(idmap, fs_userns);
476860b3
CB
1655 if (!gid_valid(kgid))
1656 return false;
1657 return kuid_has_mapping(fs_userns, kuid) &&
1658 kgid_has_mapping(fs_userns, kgid);
8e538913
CB
1659}
1660
9b6304c1
JL
1661struct timespec64 current_time(struct inode *inode);
1662struct timespec64 inode_set_ctime_current(struct inode *inode);
7f2c86cb
JL
1663struct timespec64 inode_set_ctime_deleg(struct inode *inode,
1664 struct timespec64 update);
9b6304c1 1665
077c212f
JL
1666static inline time64_t inode_get_atime_sec(const struct inode *inode)
1667{
3aa63a56 1668 return inode->i_atime_sec;
077c212f
JL
1669}
1670
1671static inline long inode_get_atime_nsec(const struct inode *inode)
1672{
3aa63a56 1673 return inode->i_atime_nsec;
077c212f
JL
1674}
1675
1676static inline struct timespec64 inode_get_atime(const struct inode *inode)
1677{
3aa63a56
JL
1678 struct timespec64 ts = { .tv_sec = inode_get_atime_sec(inode),
1679 .tv_nsec = inode_get_atime_nsec(inode) };
1680
1681 return ts;
077c212f
JL
1682}
1683
1684static inline struct timespec64 inode_set_atime_to_ts(struct inode *inode,
1685 struct timespec64 ts)
1686{
3aa63a56
JL
1687 inode->i_atime_sec = ts.tv_sec;
1688 inode->i_atime_nsec = ts.tv_nsec;
077c212f
JL
1689 return ts;
1690}
1691
1692static inline struct timespec64 inode_set_atime(struct inode *inode,
1693 time64_t sec, long nsec)
1694{
1695 struct timespec64 ts = { .tv_sec = sec,
1696 .tv_nsec = nsec };
3aa63a56 1697
077c212f
JL
1698 return inode_set_atime_to_ts(inode, ts);
1699}
1700
1701static inline time64_t inode_get_mtime_sec(const struct inode *inode)
1702{
3aa63a56 1703 return inode->i_mtime_sec;
077c212f
JL
1704}
1705
1706static inline long inode_get_mtime_nsec(const struct inode *inode)
1707{
3aa63a56 1708 return inode->i_mtime_nsec;
077c212f
JL
1709}
1710
1711static inline struct timespec64 inode_get_mtime(const struct inode *inode)
1712{
3aa63a56
JL
1713 struct timespec64 ts = { .tv_sec = inode_get_mtime_sec(inode),
1714 .tv_nsec = inode_get_mtime_nsec(inode) };
1715 return ts;
077c212f
JL
1716}
1717
1718static inline struct timespec64 inode_set_mtime_to_ts(struct inode *inode,
1719 struct timespec64 ts)
1720{
3aa63a56
JL
1721 inode->i_mtime_sec = ts.tv_sec;
1722 inode->i_mtime_nsec = ts.tv_nsec;
077c212f
JL
1723 return ts;
1724}
1725
1726static inline struct timespec64 inode_set_mtime(struct inode *inode,
1727 time64_t sec, long nsec)
1728{
1729 struct timespec64 ts = { .tv_sec = sec,
1730 .tv_nsec = nsec };
1731 return inode_set_mtime_to_ts(inode, ts);
1732}
1733
4e40eff0
JL
1734/*
1735 * Multigrain timestamps
1736 *
1737 * Conditionally use fine-grained ctime and mtime timestamps when there
1738 * are users actively observing them via getattr. The primary use-case
1739 * for this is NFS clients that use the ctime to distinguish between
1740 * different states of the file, and that are often fooled by multiple
1741 * operations that occur in the same coarse-grained timer tick.
1742 */
1743#define I_CTIME_QUERIED ((u32)BIT(31))
1744
077c212f
JL
1745static inline time64_t inode_get_ctime_sec(const struct inode *inode)
1746{
3aa63a56 1747 return inode->i_ctime_sec;
077c212f
JL
1748}
1749
1750static inline long inode_get_ctime_nsec(const struct inode *inode)
1751{
4e40eff0 1752 return inode->i_ctime_nsec & ~I_CTIME_QUERIED;
077c212f
JL
1753}
1754
9b6304c1
JL
1755static inline struct timespec64 inode_get_ctime(const struct inode *inode)
1756{
3aa63a56
JL
1757 struct timespec64 ts = { .tv_sec = inode_get_ctime_sec(inode),
1758 .tv_nsec = inode_get_ctime_nsec(inode) };
1759
1760 return ts;
9b6304c1
JL
1761}
1762
4e40eff0 1763struct timespec64 inode_set_ctime_to_ts(struct inode *inode, struct timespec64 ts);
9b6304c1
JL
1764
1765/**
1766 * inode_set_ctime - set the ctime in the inode
1767 * @inode: inode in which to set the ctime
1768 * @sec: tv_sec value to set
1769 * @nsec: tv_nsec value to set
1770 *
1771 * Set the ctime in @inode to { @sec, @nsec }
1772 */
1773static inline struct timespec64 inode_set_ctime(struct inode *inode,
1774 time64_t sec, long nsec)
1775{
1776 struct timespec64 ts = { .tv_sec = sec,
1777 .tv_nsec = nsec };
1778
1779 return inode_set_ctime_to_ts(inode, ts);
1780}
1da177e4 1781
077c212f
JL
1782struct timespec64 simple_inode_init_ts(struct inode *inode);
1783
1da177e4
LT
1784/*
1785 * Snapshotting support.
1786 */
1da177e4 1787
9b852342
DW
1788/*
1789 * These are internal functions, please use sb_start_{write,pagefault,intwrite}
1790 * instead.
1791 */
1792static inline void __sb_end_write(struct super_block *sb, int level)
1793{
1794 percpu_up_read(sb->s_writers.rw_sem + level-1);
1795}
1796
1797static inline void __sb_start_write(struct super_block *sb, int level)
1798{
f73bae83 1799 percpu_down_read_freezable(sb->s_writers.rw_sem + level - 1, true);
9b852342
DW
1800}
1801
1802static inline bool __sb_start_write_trylock(struct super_block *sb, int level)
1803{
1804 return percpu_down_read_trylock(sb->s_writers.rw_sem + level - 1);
1805}
5accdf82 1806
bee9182d 1807#define __sb_writers_acquired(sb, lev) \
8129ed29 1808 percpu_rwsem_acquire(&(sb)->s_writers.rw_sem[(lev)-1], 1, _THIS_IP_)
bee9182d 1809#define __sb_writers_release(sb, lev) \
c01a5d89 1810 percpu_rwsem_release(&(sb)->s_writers.rw_sem[(lev)-1], _THIS_IP_)
bee9182d 1811
8802e580
AG
1812/**
1813 * __sb_write_started - check if sb freeze level is held
1814 * @sb: the super we write to
1815 * @level: the freeze level
1816 *
c39e2ae3
VN
1817 * * > 0 - sb freeze level is held
1818 * * 0 - sb freeze level is not held
1819 * * < 0 - !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN
8802e580
AG
1820 */
1821static inline int __sb_write_started(const struct super_block *sb, int level)
1822{
1823 return lockdep_is_held_type(sb->s_writers.rw_sem + level - 1, 1);
1824}
1825
3d5cd491
AG
1826/**
1827 * sb_write_started - check if SB_FREEZE_WRITE is held
1828 * @sb: the super we write to
1829 *
1830 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1831 */
7f8d12ea
NA
1832static inline bool sb_write_started(const struct super_block *sb)
1833{
8802e580 1834 return __sb_write_started(sb, SB_FREEZE_WRITE);
7f8d12ea
NA
1835}
1836
21b32e6a
AG
1837/**
1838 * sb_write_not_started - check if SB_FREEZE_WRITE is not held
1839 * @sb: the super we write to
1840 *
1841 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1842 */
1843static inline bool sb_write_not_started(const struct super_block *sb)
1844{
1845 return __sb_write_started(sb, SB_FREEZE_WRITE) <= 0;
1846}
1847
3d5cd491
AG
1848/**
1849 * file_write_started - check if SB_FREEZE_WRITE is held
1850 * @file: the file we write to
1851 *
1852 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1853 * May be false positive with !S_ISREG, because file_start_write() has
1854 * no effect on !S_ISREG.
1855 */
1856static inline bool file_write_started(const struct file *file)
1857{
1858 if (!S_ISREG(file_inode(file)->i_mode))
1859 return true;
1860 return sb_write_started(file_inode(file)->i_sb);
1861}
1862
21b32e6a
AG
1863/**
1864 * file_write_not_started - check if SB_FREEZE_WRITE is not held
1865 * @file: the file we write to
1866 *
1867 * May be false positive with !CONFIG_LOCKDEP/LOCK_STATE_UNKNOWN.
1868 * May be false positive with !S_ISREG, because file_start_write() has
1869 * no effect on !S_ISREG.
1870 */
1871static inline bool file_write_not_started(const struct file *file)
1872{
1873 if (!S_ISREG(file_inode(file)->i_mode))
1874 return true;
1875 return sb_write_not_started(file_inode(file)->i_sb);
7f8d12ea
NA
1876}
1877
5accdf82
JK
1878/**
1879 * sb_end_write - drop write access to a superblock
1880 * @sb: the super we wrote to
1881 *
1882 * Decrement number of writers to the filesystem. Wake up possible waiters
1883 * wanting to freeze the filesystem.
1884 */
1885static inline void sb_end_write(struct super_block *sb)
1886{
1887 __sb_end_write(sb, SB_FREEZE_WRITE);
1888}
1889
1890/**
1891 * sb_end_pagefault - drop write access to a superblock from a page fault
1892 * @sb: the super we wrote to
1893 *
1894 * Decrement number of processes handling write page fault to the filesystem.
1895 * Wake up possible waiters wanting to freeze the filesystem.
1896 */
1897static inline void sb_end_pagefault(struct super_block *sb)
1898{
1899 __sb_end_write(sb, SB_FREEZE_PAGEFAULT);
1900}
1901
1902/**
1903 * sb_end_intwrite - drop write access to a superblock for internal fs purposes
1904 * @sb: the super we wrote to
1905 *
1906 * Decrement fs-internal number of writers to the filesystem. Wake up possible
1907 * waiters wanting to freeze the filesystem.
1908 */
1909static inline void sb_end_intwrite(struct super_block *sb)
1910{
1911 __sb_end_write(sb, SB_FREEZE_FS);
1912}
1913
1914/**
1915 * sb_start_write - get write access to a superblock
1916 * @sb: the super we write to
1917 *
1918 * When a process wants to write data or metadata to a file system (i.e. dirty
1919 * a page or an inode), it should embed the operation in a sb_start_write() -
1920 * sb_end_write() pair to get exclusion against file system freezing. This
1921 * function increments number of writers preventing freezing. If the file
1922 * system is already frozen, the function waits until the file system is
1923 * thawed.
1924 *
1925 * Since freeze protection behaves as a lock, users have to preserve
1926 * ordering of freeze protection and other filesystem locks. Generally,
1927 * freeze protection should be the outermost lock. In particular, we have:
1928 *
1929 * sb_start_write
2773d282 1930 * -> i_rwsem (write path, truncate, directory ops, ...)
5accdf82
JK
1931 * -> s_umount (freeze_super, thaw_super)
1932 */
1933static inline void sb_start_write(struct super_block *sb)
1934{
8a3c84b6 1935 __sb_start_write(sb, SB_FREEZE_WRITE);
5accdf82
JK
1936}
1937
8a3c84b6 1938static inline bool sb_start_write_trylock(struct super_block *sb)
5accdf82 1939{
8a3c84b6 1940 return __sb_start_write_trylock(sb, SB_FREEZE_WRITE);
5accdf82
JK
1941}
1942
1943/**
1944 * sb_start_pagefault - get write access to a superblock from a page fault
1945 * @sb: the super we write to
1946 *
1947 * When a process starts handling write page fault, it should embed the
1948 * operation into sb_start_pagefault() - sb_end_pagefault() pair to get
1949 * exclusion against file system freezing. This is needed since the page fault
1950 * is going to dirty a page. This function increments number of running page
1951 * faults preventing freezing. If the file system is already frozen, the
1952 * function waits until the file system is thawed.
1953 *
1954 * Since page fault freeze protection behaves as a lock, users have to preserve
1955 * ordering of freeze protection and other filesystem locks. It is advised to
c1e8d7c6 1956 * put sb_start_pagefault() close to mmap_lock in lock ordering. Page fault
5accdf82
JK
1957 * handling code implies lock dependency:
1958 *
c1e8d7c6 1959 * mmap_lock
5accdf82
JK
1960 * -> sb_start_pagefault
1961 */
1962static inline void sb_start_pagefault(struct super_block *sb)
1963{
8a3c84b6 1964 __sb_start_write(sb, SB_FREEZE_PAGEFAULT);
5accdf82
JK
1965}
1966
39015399 1967/**
5accdf82
JK
1968 * sb_start_intwrite - get write access to a superblock for internal fs purposes
1969 * @sb: the super we write to
1970 *
1971 * This is the third level of protection against filesystem freezing. It is
1972 * free for use by a filesystem. The only requirement is that it must rank
1973 * below sb_start_pagefault.
1974 *
1975 * For example filesystem can call sb_start_intwrite() when starting a
1976 * transaction which somewhat eases handling of freezing for internal sources
1977 * of filesystem changes (internal fs threads, discarding preallocation on file
1978 * close, etc.).
1979 */
1980static inline void sb_start_intwrite(struct super_block *sb)
1981{
8a3c84b6 1982 __sb_start_write(sb, SB_FREEZE_FS);
5accdf82 1983}
1da177e4 1984
8a3c84b6 1985static inline bool sb_start_intwrite_trylock(struct super_block *sb)
0c8e3fe3 1986{
8a3c84b6 1987 return __sb_start_write_trylock(sb, SB_FREEZE_FS);
0c8e3fe3
AG
1988}
1989
01beba79 1990bool inode_owner_or_capable(struct mnt_idmap *idmap,
21cb47be 1991 const struct inode *inode);
3bd858ab 1992
1da177e4
LT
1993/*
1994 * VFS helper functions..
1995 */
abf08576 1996int vfs_create(struct mnt_idmap *, struct inode *,
6521f891 1997 struct dentry *, umode_t, bool);
c54b3869
N
1998struct dentry *vfs_mkdir(struct mnt_idmap *, struct inode *,
1999 struct dentry *, umode_t);
abf08576 2000int vfs_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
6521f891 2001 umode_t, dev_t);
abf08576 2002int vfs_symlink(struct mnt_idmap *, struct inode *,
6521f891 2003 struct dentry *, const char *);
abf08576 2004int vfs_link(struct dentry *, struct mnt_idmap *, struct inode *,
6521f891 2005 struct dentry *, struct inode **);
abf08576
CB
2006int vfs_rmdir(struct mnt_idmap *, struct inode *, struct dentry *);
2007int vfs_unlink(struct mnt_idmap *, struct inode *, struct dentry *,
6521f891 2008 struct inode **);
9fe61450 2009
92cb01c7
CB
2010/**
2011 * struct renamedata - contains all information required for renaming
abf08576 2012 * @old_mnt_idmap: idmap of the old mount the inode was found from
bc924136 2013 * @old_parent: parent of source
92cb01c7 2014 * @old_dentry: source
abf08576 2015 * @new_mnt_idmap: idmap of the new mount the inode was found from
bc924136 2016 * @new_parent: parent of destination
92cb01c7
CB
2017 * @new_dentry: destination
2018 * @delegated_inode: returns an inode needing a delegation break
2019 * @flags: rename flags
2020 */
9fe61450 2021struct renamedata {
abf08576 2022 struct mnt_idmap *old_mnt_idmap;
bc924136 2023 struct dentry *old_parent;
9fe61450 2024 struct dentry *old_dentry;
abf08576 2025 struct mnt_idmap *new_mnt_idmap;
bc924136 2026 struct dentry *new_parent;
9fe61450
CB
2027 struct dentry *new_dentry;
2028 struct inode **delegated_inode;
2029 unsigned int flags;
2030} __randomize_layout;
a3c751a5 2031
9fe61450 2032int vfs_rename(struct renamedata *);
a3c751a5 2033
abf08576 2034static inline int vfs_whiteout(struct mnt_idmap *idmap,
6521f891 2035 struct inode *dir, struct dentry *dentry)
a3c751a5 2036{
abf08576 2037 return vfs_mknod(idmap, dir, dentry, S_IFCHR | WHITEOUT_MODE,
6521f891 2038 WHITEOUT_DEV);
a3c751a5 2039}
1da177e4 2040
d56e0ddb
AG
2041struct file *kernel_tmpfile_open(struct mnt_idmap *idmap,
2042 const struct path *parentpath,
2043 umode_t mode, int open_flag,
2044 const struct cred *cred);
cbb0b9d4 2045struct file *kernel_file_open(const struct path *path, int flags,
af58dc1f 2046 const struct cred *cred);
af7bd4dc 2047
8e6c848e
AV
2048int vfs_mkobj(struct dentry *, umode_t,
2049 int (*f)(struct dentry *, umode_t, void *),
2050 void *);
2051
c04011fe 2052int vfs_fchown(struct file *file, uid_t user, gid_t group);
9e96c8c0 2053int vfs_fchmod(struct file *file, umode_t mode);
fd5ad30c 2054int vfs_utimes(const struct path *path, struct timespec64 *times);
c04011fe 2055
f326565c 2056int vfs_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
9df6702a 2057
2952db0f
AB
2058#ifdef CONFIG_COMPAT
2059extern long compat_ptr_ioctl(struct file *file, unsigned int cmd,
2060 unsigned long arg);
2061#else
2062#define compat_ptr_ioctl NULL
2063#endif
2064
8c744fb8
CH
2065/*
2066 * VFS file helper functions.
2067 */
f2d40141 2068void inode_init_owner(struct mnt_idmap *idmap, struct inode *inode,
21cb47be 2069 const struct inode *dir, umode_t mode);
a2982cc9 2070extern bool may_open_dev(const struct path *path);
9452e93e 2071umode_t mode_strip_sgid(struct mnt_idmap *idmap,
2b3416ce 2072 const struct inode *dir, umode_t mode);
9b6a14f0
YT
2073bool in_group_or_capable(struct mnt_idmap *idmap,
2074 const struct inode *inode, vfsgid_t vfsgid);
c4b929b8 2075
1da177e4
LT
2076/*
2077 * This is the "filldir" function type, used by readdir() to let
2078 * the kernel specify what kind of dirent layout it wants to have.
2079 * This allows the kernel to read directories into kernel space or
2080 * to have different dirent layouts depending on the binary type.
25885a35 2081 * Return 'true' to keep going and 'false' if there are no more entries.
1da177e4 2082 */
ac7576f4 2083struct dir_context;
25885a35 2084typedef bool (*filldir_t)(struct dir_context *, const char *, int, loff_t, u64,
ac7576f4
MS
2085 unsigned);
2086
5c0ba4e0 2087struct dir_context {
a09acf4b 2088 filldir_t actor;
bb6f619b 2089 loff_t pos;
e0410e95
MS
2090 /*
2091 * Filesystems MUST NOT MODIFY count, but may use as a hint:
2092 * 0 unknown
2093 * > 0 space in buffer (assume at least one entry)
2094 * INT_MAX unlimited
2095 */
2096 int count;
5c0ba4e0 2097};
bb6f619b 2098
8d911700
MS
2099/* If OR-ed with d_type, pending signals are not checked */
2100#define FILLDIR_FLAG_NOINTR 0x1000
2101
b4caecd4
CH
2102/*
2103 * These flags let !MMU mmap() govern direct device mapping vs immediate
2104 * copying more easily for MAP_PRIVATE, especially for ROM filesystems.
2105 *
2106 * NOMMU_MAP_COPY: Copy can be mapped (MAP_PRIVATE)
2107 * NOMMU_MAP_DIRECT: Can be mapped directly (MAP_SHARED)
2108 * NOMMU_MAP_READ: Can be mapped for reading
2109 * NOMMU_MAP_WRITE: Can be mapped for writing
2110 * NOMMU_MAP_EXEC: Can be mapped for execution
2111 */
2112#define NOMMU_MAP_COPY 0x00000001
2113#define NOMMU_MAP_DIRECT 0x00000008
2114#define NOMMU_MAP_READ VM_MAYREAD
2115#define NOMMU_MAP_WRITE VM_MAYWRITE
2116#define NOMMU_MAP_EXEC VM_MAYEXEC
2117
2118#define NOMMU_VMFLAGS \
2119 (NOMMU_MAP_READ | NOMMU_MAP_WRITE | NOMMU_MAP_EXEC)
2120
2e5dfc99
DW
2121/*
2122 * These flags control the behavior of the remap_file_range function pointer.
2123 * If it is called with len == 0 that means "remap to end of source file".
5c437fa2 2124 * See Documentation/filesystems/vfs.rst for more details about this call.
2e5dfc99
DW
2125 *
2126 * REMAP_FILE_DEDUP: only remap if contents identical (i.e. deduplicate)
eca3654e 2127 * REMAP_FILE_CAN_SHORTEN: caller can handle a shortened request
2e5dfc99
DW
2128 */
2129#define REMAP_FILE_DEDUP (1 << 0)
eca3654e 2130#define REMAP_FILE_CAN_SHORTEN (1 << 1)
2e5dfc99
DW
2131
2132/*
2133 * These flags signal that the caller is ok with altering various aspects of
2134 * the behavior of the remap operation. The changes must be made by the
2135 * implementation; the vfs remap helper functions can take advantage of them.
2136 * Flags in this category exist to preserve the quirky behavior of the hoisted
2137 * btrfs clone/dedupe ioctls.
2e5dfc99 2138 */
eca3654e 2139#define REMAP_FILE_ADVISORY (REMAP_FILE_CAN_SHORTEN)
b4caecd4 2140
10bc8e4a
AG
2141/*
2142 * These flags control the behavior of vfs_copy_file_range().
2143 * They are not available to the user via syscall.
2144 *
2145 * COPY_FILE_SPLICE: call splice direct instead of fs clone/copy ops
2146 */
2147#define COPY_FILE_SPLICE (1 << 0)
2148
293bc982 2149struct iov_iter;
ee692a21 2150struct io_uring_cmd;
6faddda6 2151struct offset_ctx;
293bc982 2152
210a03c9
CB
2153typedef unsigned int __bitwise fop_flags_t;
2154
1da177e4
LT
2155struct file_operations {
2156 struct module *owner;
210a03c9 2157 fop_flags_t fop_flags;
1da177e4
LT
2158 loff_t (*llseek) (struct file *, loff_t, int);
2159 ssize_t (*read) (struct file *, char __user *, size_t, loff_t *);
1da177e4 2160 ssize_t (*write) (struct file *, const char __user *, size_t, loff_t *);
293bc982
AV
2161 ssize_t (*read_iter) (struct kiocb *, struct iov_iter *);
2162 ssize_t (*write_iter) (struct kiocb *, struct iov_iter *);
5a72e899
JA
2163 int (*iopoll)(struct kiocb *kiocb, struct io_comp_batch *,
2164 unsigned int flags);
61922694 2165 int (*iterate_shared) (struct file *, struct dir_context *);
a3f8683b 2166 __poll_t (*poll) (struct file *, struct poll_table_struct *);
1da177e4
LT
2167 long (*unlocked_ioctl) (struct file *, unsigned int, unsigned long);
2168 long (*compat_ioctl) (struct file *, unsigned int, unsigned long);
2169 int (*mmap) (struct file *, struct vm_area_struct *);
2170 int (*open) (struct inode *, struct file *);
75e1fcc0 2171 int (*flush) (struct file *, fl_owner_t id);
1da177e4 2172 int (*release) (struct inode *, struct file *);
02c24a82 2173 int (*fsync) (struct file *, loff_t, loff_t, int datasync);
1da177e4
LT
2174 int (*fasync) (int, struct file *, int);
2175 int (*lock) (struct file *, int, struct file_lock *);
1da177e4
LT
2176 unsigned long (*get_unmapped_area)(struct file *, unsigned long, unsigned long, unsigned long, unsigned long);
2177 int (*check_flags)(int);
1da177e4 2178 int (*flock) (struct file *, int, struct file_lock *);
cbb7e577
JA
2179 ssize_t (*splice_write)(struct pipe_inode_info *, struct file *, loff_t *, size_t, unsigned int);
2180 ssize_t (*splice_read)(struct file *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
2bfc6685 2181 void (*splice_eof)(struct file *file);
c69ff407 2182 int (*setlease)(struct file *, int, struct file_lease **, void **);
2fe17c10
CH
2183 long (*fallocate)(struct file *file, int mode, loff_t offset,
2184 loff_t len);
a3816ab0 2185 void (*show_fdinfo)(struct seq_file *m, struct file *f);
b4caecd4
CH
2186#ifndef CONFIG_MMU
2187 unsigned (*mmap_capabilities)(struct file *);
2188#endif
04b38d60
CH
2189 ssize_t (*copy_file_range)(struct file *, loff_t, struct file *,
2190 loff_t, size_t, unsigned int);
42ec3d4c
DW
2191 loff_t (*remap_file_range)(struct file *file_in, loff_t pos_in,
2192 struct file *file_out, loff_t pos_out,
2193 loff_t len, unsigned int remap_flags);
45cd0faa 2194 int (*fadvise)(struct file *, loff_t, loff_t, int);
ee692a21 2195 int (*uring_cmd)(struct io_uring_cmd *ioucmd, unsigned int issue_flags);
de97fcb3
JA
2196 int (*uring_cmd_iopoll)(struct io_uring_cmd *, struct io_comp_batch *,
2197 unsigned int poll_flags);
c84bf6dd 2198 int (*mmap_prepare)(struct vm_area_desc *);
3859a271 2199} __randomize_layout;
1da177e4 2200
210a03c9
CB
2201/* Supports async buffered reads */
2202#define FOP_BUFFER_RASYNC ((__force fop_flags_t)(1 << 0))
2203/* Supports async buffered writes */
2204#define FOP_BUFFER_WASYNC ((__force fop_flags_t)(1 << 1))
2205/* Supports synchronous page faults for mappings */
2206#define FOP_MMAP_SYNC ((__force fop_flags_t)(1 << 2))
2207/* Supports non-exclusive O_DIRECT writes from multiple threads */
2208#define FOP_DIO_PARALLEL_WRITE ((__force fop_flags_t)(1 << 3))
886b94d2
MWO
2209/* Contains huge pages */
2210#define FOP_HUGE_PAGES ((__force fop_flags_t)(1 << 4))
641bb439
CB
2211/* Treat loff_t as unsigned (e.g., /dev/mem) */
2212#define FOP_UNSIGNED_OFFSET ((__force fop_flags_t)(1 << 5))
8cf9a01e 2213/* Supports asynchronous lock callbacks */
09ee2a67 2214#define FOP_ASYNC_LOCK ((__force fop_flags_t)(1 << 6))
af6505e5 2215/* File system supports uncached read/write buffered IO */
7b2b67db 2216#define FOP_DONTCACHE ((__force fop_flags_t)(1 << 7))
210a03c9 2217
3e327154
LT
2218/* Wrap a directory iterator that needs exclusive inode access */
2219int wrap_directory_iterator(struct file *, struct dir_context *,
2220 int (*) (struct file *, struct dir_context *));
2221#define WRAP_DIR_ITER(x) \
2222 static int shared_##x(struct file *file , struct dir_context *ctx) \
2223 { return wrap_directory_iterator(file, ctx, x); }
2224
1da177e4 2225struct inode_operations {
00cd8dd3 2226 struct dentry * (*lookup) (struct inode *,struct dentry *, unsigned int);
fceef393 2227 const char * (*get_link) (struct dentry *, struct inode *, struct delayed_call *);
4609e1f1 2228 int (*permission) (struct mnt_idmap *, struct inode *, int);
cac2f8b8 2229 struct posix_acl * (*get_inode_acl)(struct inode *, int, bool);
44a7d7a8
NP
2230
2231 int (*readlink) (struct dentry *, char __user *,int);
44a7d7a8 2232
6c960e68 2233 int (*create) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2234 umode_t, bool);
1da177e4
LT
2235 int (*link) (struct dentry *,struct inode *,struct dentry *);
2236 int (*unlink) (struct inode *,struct dentry *);
7a77db95 2237 int (*symlink) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2238 const char *);
88d5baf6
N
2239 struct dentry *(*mkdir) (struct mnt_idmap *, struct inode *,
2240 struct dentry *, umode_t);
1da177e4 2241 int (*rmdir) (struct inode *,struct dentry *);
5ebb29be 2242 int (*mknod) (struct mnt_idmap *, struct inode *,struct dentry *,
549c7297 2243 umode_t,dev_t);
e18275ae 2244 int (*rename) (struct mnt_idmap *, struct inode *, struct dentry *,
520c8b16 2245 struct inode *, struct dentry *, unsigned int);
c1632a0f 2246 int (*setattr) (struct mnt_idmap *, struct dentry *, struct iattr *);
b74d24f7 2247 int (*getattr) (struct mnt_idmap *, const struct path *,
549c7297 2248 struct kstat *, u32, unsigned int);
1da177e4 2249 ssize_t (*listxattr) (struct dentry *, char *, size_t);
c4b929b8
MF
2250 int (*fiemap)(struct inode *, struct fiemap_extent_info *, u64 start,
2251 u64 len);
913e9928 2252 int (*update_time)(struct inode *, int);
d9585277 2253 int (*atomic_open)(struct inode *, struct dentry *,
30d90494 2254 struct file *, unsigned open_flag,
44907d79 2255 umode_t create_mode);
011e2b71 2256 int (*tmpfile) (struct mnt_idmap *, struct inode *,
863f144f 2257 struct file *, umode_t);
77435322 2258 struct posix_acl *(*get_acl)(struct mnt_idmap *, struct dentry *,
7420332a 2259 int);
13e83a49 2260 int (*set_acl)(struct mnt_idmap *, struct dentry *,
549c7297 2261 struct posix_acl *, int);
8782a9ae 2262 int (*fileattr_set)(struct mnt_idmap *idmap,
ca115d7e
CB
2263 struct dentry *dentry, struct file_kattr *fa);
2264 int (*fileattr_get)(struct dentry *dentry, struct file_kattr *fa);
6faddda6 2265 struct offset_ctx *(*get_offset_ctx)(struct inode *inode);
44a7d7a8 2266} ____cacheline_aligned;
1da177e4 2267
c84bf6dd 2268/* Did the driver provide valid mmap hook configuration? */
b013ed40 2269static inline bool can_mmap_file(struct file *file)
c84bf6dd
LS
2270{
2271 bool has_mmap = file->f_op->mmap;
2272 bool has_mmap_prepare = file->f_op->mmap_prepare;
2273
2274 /* Hooks are mutually exclusive. */
2275 if (WARN_ON_ONCE(has_mmap && has_mmap_prepare))
2276 return false;
6669d1aa 2277 if (!has_mmap && !has_mmap_prepare)
c84bf6dd
LS
2278 return false;
2279
2280 return true;
2281}
2282
bb666b7c
LS
2283int compat_vma_mmap_prepare(struct file *file, struct vm_area_struct *vma);
2284
20ca475d 2285static inline int vfs_mmap(struct file *file, struct vm_area_struct *vma)
f74ac015 2286{
bb666b7c
LS
2287 if (file->f_op->mmap_prepare)
2288 return compat_vma_mmap_prepare(file, vma);
c84bf6dd 2289
f74ac015
MS
2290 return file->f_op->mmap(file, vma);
2291}
2292
20ca475d 2293static inline int vfs_mmap_prepare(struct file *file, struct vm_area_desc *desc)
c84bf6dd
LS
2294{
2295 return file->f_op->mmap_prepare(desc);
2296}
2297
1da177e4
LT
2298extern ssize_t vfs_read(struct file *, char __user *, size_t, loff_t *);
2299extern ssize_t vfs_write(struct file *, const char __user *, size_t, loff_t *);
29732938
ZB
2300extern ssize_t vfs_copy_file_range(struct file *, loff_t , struct file *,
2301 loff_t, size_t, unsigned int);
5b9932f6 2302int remap_verify_area(struct file *file, loff_t pos, loff_t len, bool write);
6f7db389
SR
2303int __generic_remap_file_range_prep(struct file *file_in, loff_t pos_in,
2304 struct file *file_out, loff_t pos_out,
2305 loff_t *len, unsigned int remap_flags,
2306 const struct iomap_ops *dax_read_ops);
2307int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in,
2308 struct file *file_out, loff_t pos_out,
2309 loff_t *count, unsigned int remap_flags);
42ec3d4c
DW
2310extern loff_t vfs_clone_file_range(struct file *file_in, loff_t pos_in,
2311 struct file *file_out, loff_t pos_out,
452ce659 2312 loff_t len, unsigned int remap_flags);
54dbc151
DW
2313extern int vfs_dedupe_file_range(struct file *file,
2314 struct file_dedupe_range *same);
42ec3d4c
DW
2315extern loff_t vfs_dedupe_file_range_one(struct file *src_file, loff_t src_pos,
2316 struct file *dst_file, loff_t dst_pos,
df365836 2317 loff_t len, unsigned int remap_flags);
f1825366 2318
7366f8b6
CB
2319/**
2320 * enum freeze_holder - holder of the freeze
2321 * @FREEZE_HOLDER_KERNEL: kernel wants to freeze or thaw filesystem
2322 * @FREEZE_HOLDER_USERSPACE: userspace wants to freeze or thaw filesystem
2323 * @FREEZE_MAY_NEST: whether nesting freeze and thaw requests is allowed
1af33317 2324 * @FREEZE_EXCL: a freeze that can only be undone by the owner
7366f8b6
CB
2325 *
2326 * Indicate who the owner of the freeze or thaw request is and whether
2327 * the freeze needs to be exclusive or can nest.
2328 * Without @FREEZE_MAY_NEST, multiple freeze and thaw requests from the
2329 * same holder aren't allowed. It is however allowed to hold a single
2330 * @FREEZE_HOLDER_USERSPACE and a single @FREEZE_HOLDER_KERNEL freeze at
2331 * the same time. This is relied upon by some filesystems during online
2332 * repair or similar.
2333 */
880b9577
DW
2334enum freeze_holder {
2335 FREEZE_HOLDER_KERNEL = (1U << 0),
2336 FREEZE_HOLDER_USERSPACE = (1U << 1),
7366f8b6 2337 FREEZE_MAY_NEST = (1U << 2),
1af33317 2338 FREEZE_EXCL = (1U << 3),
880b9577 2339};
1da177e4 2340
1da177e4
LT
2341struct super_operations {
2342 struct inode *(*alloc_inode)(struct super_block *sb);
2343 void (*destroy_inode)(struct inode *);
fdb0da89 2344 void (*free_inode)(struct inode *);
1da177e4 2345
aa385729 2346 void (*dirty_inode) (struct inode *, int flags);
a9185b41 2347 int (*write_inode) (struct inode *, struct writeback_control *wbc);
45321ac5 2348 int (*drop_inode) (struct inode *);
be7ce416 2349 void (*evict_inode) (struct inode *);
1da177e4 2350 void (*put_super) (struct super_block *);
1da177e4 2351 int (*sync_fs)(struct super_block *sb, int wait);
1af33317 2352 int (*freeze_super) (struct super_block *, enum freeze_holder who, const void *owner);
c4be0c1d 2353 int (*freeze_fs) (struct super_block *);
1af33317 2354 int (*thaw_super) (struct super_block *, enum freeze_holder who, const void *owner);
c4be0c1d 2355 int (*unfreeze_fs) (struct super_block *);
726c3342 2356 int (*statfs) (struct dentry *, struct kstatfs *);
1da177e4 2357 int (*remount_fs) (struct super_block *, int *, char *);
42faad99 2358 void (*umount_begin) (struct super_block *);
1da177e4 2359
34c80b1d 2360 int (*show_options)(struct seq_file *, struct dentry *);
d861c630 2361 int (*show_devname)(struct seq_file *, struct dentry *);
a6322de6 2362 int (*show_path)(struct seq_file *, struct dentry *);
64132379 2363 int (*show_stats)(struct seq_file *, struct dentry *);
0e51a720 2364#ifdef CONFIG_QUOTA
1da177e4
LT
2365 ssize_t (*quota_read)(struct super_block *, int, char *, size_t, loff_t);
2366 ssize_t (*quota_write)(struct super_block *, int, const char *, size_t, loff_t);
ccb49011 2367 struct dquot __rcu **(*get_dquots)(struct inode *);
0e51a720 2368#endif
4101b624
VD
2369 long (*nr_cached_objects)(struct super_block *,
2370 struct shrink_control *);
2371 long (*free_cached_objects)(struct super_block *,
2372 struct shrink_control *);
d9c37a49
QW
2373 /*
2374 * If a filesystem can support graceful removal of a device and
2375 * continue read-write operations, implement this callback.
2376 *
2377 * Return 0 if the filesystem can continue read-write.
2378 * Non-zero return value or no such callback means the fs will be shutdown
2379 * as usual.
2380 */
2381 int (*remove_bdev)(struct super_block *sb, struct block_device *bdev);
87efb390 2382 void (*shutdown)(struct super_block *sb);
1da177e4
LT
2383};
2384
bbc1096a
DH
2385/*
2386 * Inode flags - they have no relation to superblock flags now
2387 */
6414e9b0
EB
2388#define S_SYNC (1 << 0) /* Writes are synced at once */
2389#define S_NOATIME (1 << 1) /* Do not update access times */
2390#define S_APPEND (1 << 2) /* Append-only file */
2391#define S_IMMUTABLE (1 << 3) /* Immutable file */
2392#define S_DEAD (1 << 4) /* removed, but still open directory */
2393#define S_NOQUOTA (1 << 5) /* Inode is not counted to quota */
2394#define S_DIRSYNC (1 << 6) /* Directory modifications are synchronous */
2395#define S_NOCMTIME (1 << 7) /* Do not update file c/mtime */
2396#define S_SWAPFILE (1 << 8) /* Do not truncate: swapon got its bmaps */
2397#define S_PRIVATE (1 << 9) /* Inode is fs-internal */
2398#define S_IMA (1 << 10) /* Inode has an associated IMA struct */
2399#define S_AUTOMOUNT (1 << 11) /* Automount/referral quasi-directory */
2400#define S_NOSEC (1 << 12) /* no suid or xattr security attributes */
6cd176a5 2401#ifdef CONFIG_FS_DAX
6414e9b0 2402#define S_DAX (1 << 13) /* Direct Access, avoiding the page cache */
fbbbad4b 2403#else
6414e9b0 2404#define S_DAX 0 /* Make all the DAX code disappear */
fbbbad4b 2405#endif
6414e9b0
EB
2406#define S_ENCRYPTED (1 << 14) /* Encrypted file (using fs/crypto/) */
2407#define S_CASEFOLD (1 << 15) /* Casefolded file */
2408#define S_VERITY (1 << 16) /* Verity file (using fs/verity/) */
1bd9c4e4 2409#define S_KERNEL_FILE (1 << 17) /* File is in use by the kernel (eg. fs/cachefiles) */
19bbfe7b 2410#define S_ANON_INODE (1 << 19) /* Inode is an anonymous inode */
bbc1096a
DH
2411
2412/*
2413 * Note that nosuid etc flags are inode-specific: setting some file-system
2414 * flags just means all the inodes inherit those flags by default. It might be
2415 * possible to override it selectively if you really wanted to with some
2416 * ioctl() that is not currently implemented.
2417 *
e462ec50 2418 * Exception: SB_RDONLY is always applied to the entire file system.
bbc1096a
DH
2419 *
2420 * Unfortunately, it is possible to change a filesystems flags with it mounted
2421 * with files in use. This means that all of the inodes will not have their
2422 * i_flags updated. Hence, i_flags no longer inherit the superblock mount
2423 * flags, so these have to be checked separately. -- rmk@arm.uk.linux.org
2424 */
2425#define __IS_FLG(inode, flg) ((inode)->i_sb->s_flags & (flg))
2426
1751e8a6 2427static inline bool sb_rdonly(const struct super_block *sb) { return sb->s_flags & SB_RDONLY; }
94e92e7a 2428#define IS_RDONLY(inode) sb_rdonly((inode)->i_sb)
e462ec50 2429#define IS_SYNC(inode) (__IS_FLG(inode, SB_SYNCHRONOUS) || \
bbc1096a 2430 ((inode)->i_flags & S_SYNC))
e462ec50 2431#define IS_DIRSYNC(inode) (__IS_FLG(inode, SB_SYNCHRONOUS|SB_DIRSYNC) || \
bbc1096a 2432 ((inode)->i_flags & (S_SYNC|S_DIRSYNC)))
e462ec50
DH
2433#define IS_MANDLOCK(inode) __IS_FLG(inode, SB_MANDLOCK)
2434#define IS_NOATIME(inode) __IS_FLG(inode, SB_RDONLY|SB_NOATIME)
2435#define IS_I_VERSION(inode) __IS_FLG(inode, SB_I_VERSION)
bbc1096a
DH
2436
2437#define IS_NOQUOTA(inode) ((inode)->i_flags & S_NOQUOTA)
2438#define IS_APPEND(inode) ((inode)->i_flags & S_APPEND)
2439#define IS_IMMUTABLE(inode) ((inode)->i_flags & S_IMMUTABLE)
e4e8b47a
MK
2440
2441#ifdef CONFIG_FS_POSIX_ACL
e462ec50 2442#define IS_POSIXACL(inode) __IS_FLG(inode, SB_POSIXACL)
e4e8b47a
MK
2443#else
2444#define IS_POSIXACL(inode) 0
2445#endif
bbc1096a
DH
2446
2447#define IS_DEADDIR(inode) ((inode)->i_flags & S_DEAD)
2448#define IS_NOCMTIME(inode) ((inode)->i_flags & S_NOCMTIME)
e964fc77
AD
2449
2450#ifdef CONFIG_SWAP
bbc1096a 2451#define IS_SWAPFILE(inode) ((inode)->i_flags & S_SWAPFILE)
e964fc77
AD
2452#else
2453#define IS_SWAPFILE(inode) ((void)(inode), 0U)
2454#endif
2455
bbc1096a
DH
2456#define IS_PRIVATE(inode) ((inode)->i_flags & S_PRIVATE)
2457#define IS_IMA(inode) ((inode)->i_flags & S_IMA)
2458#define IS_AUTOMOUNT(inode) ((inode)->i_flags & S_AUTOMOUNT)
2459#define IS_NOSEC(inode) ((inode)->i_flags & S_NOSEC)
fbbbad4b 2460#define IS_DAX(inode) ((inode)->i_flags & S_DAX)
2ee6a576 2461#define IS_ENCRYPTED(inode) ((inode)->i_flags & S_ENCRYPTED)
b886ee3e 2462#define IS_CASEFOLDED(inode) ((inode)->i_flags & S_CASEFOLD)
5585f2af 2463#define IS_VERITY(inode) ((inode)->i_flags & S_VERITY)
bbc1096a 2464
787fb6bc
MS
2465#define IS_WHITEOUT(inode) (S_ISCHR(inode->i_mode) && \
2466 (inode)->i_rdev == WHITEOUT_DEV)
19bbfe7b 2467#define IS_ANON_FILE(inode) ((inode)->i_flags & S_ANON_INODE)
787fb6bc 2468
4609e1f1 2469static inline bool HAS_UNMAPPED_ID(struct mnt_idmap *idmap,
ba73d987 2470 struct inode *inode)
0bd23d09 2471{
e67fe633
CB
2472 return !vfsuid_valid(i_uid_into_vfsuid(idmap, inode)) ||
2473 !vfsgid_valid(i_gid_into_vfsgid(idmap, inode));
0bd23d09
EB
2474}
2475
c75b1d94
JA
2476static inline void init_sync_kiocb(struct kiocb *kiocb, struct file *filp)
2477{
2478 *kiocb = (struct kiocb) {
2479 .ki_filp = filp,
164f4064 2480 .ki_flags = filp->f_iocb_flags,
20578bdf 2481 .ki_ioprio = get_current_ioprio(),
c75b1d94
JA
2482 };
2483}
2484
5dcdc43e
JX
2485static inline void kiocb_clone(struct kiocb *kiocb, struct kiocb *kiocb_src,
2486 struct file *filp)
2487{
2488 *kiocb = (struct kiocb) {
2489 .ki_filp = filp,
2490 .ki_flags = kiocb_src->ki_flags,
5dcdc43e
JX
2491 .ki_ioprio = kiocb_src->ki_ioprio,
2492 .ki_pos = kiocb_src->ki_pos,
2493 };
2494}
2495
1c0eeaf5 2496/*
250df6ed 2497 * Inode state bits. Protected by inode->i_lock
1c0eeaf5 2498 *
1e9d6333
EB
2499 * Four bits determine the dirty state of the inode: I_DIRTY_SYNC,
2500 * I_DIRTY_DATASYNC, I_DIRTY_PAGES, and I_DIRTY_TIME.
1c0eeaf5
JE
2501 *
2502 * Four bits define the lifetime of an inode. Initially, inodes are I_NEW,
2503 * until that flag is cleared. I_WILL_FREE, I_FREEING and I_CLEAR are set at
2504 * various stages of removing an inode.
2505 *
eaff8079 2506 * Two bits are used for locking and completion notification, I_NEW and I_SYNC.
1c0eeaf5 2507 *
e7ca2d41 2508 * I_DIRTY_SYNC Inode is dirty, but doesn't have to be written on
1e9d6333
EB
2509 * fdatasync() (unless I_DIRTY_DATASYNC is also set).
2510 * Timestamp updates are the usual cause.
2511 * I_DIRTY_DATASYNC Data-related inode changes pending. We keep track of
000cb48e
JK
2512 * these changes separately from I_DIRTY_SYNC so that we
2513 * don't have to write inode on fdatasync() when only
1e9d6333 2514 * e.g. the timestamps have changed.
1c0eeaf5 2515 * I_DIRTY_PAGES Inode has dirty pages. Inode itself may be clean.
cbfecb92 2516 * I_DIRTY_TIME The inode itself has dirty timestamps, and the
1e9d6333
EB
2517 * lazytime mount option is enabled. We keep track of this
2518 * separately from I_DIRTY_SYNC in order to implement
2519 * lazytime. This gets cleared if I_DIRTY_INODE
cbfecb92
LC
2520 * (I_DIRTY_SYNC and/or I_DIRTY_DATASYNC) gets set. But
2521 * I_DIRTY_TIME can still be set if I_DIRTY_SYNC is already
2522 * in place because writeback might already be in progress
2523 * and we don't want to lose the time update
eaff8079
CH
2524 * I_NEW Serves as both a mutex and completion notification.
2525 * New inodes set I_NEW. If two processes both create
2526 * the same inode, one of them will release its inode and
2527 * wait for I_NEW to be released before returning.
2528 * Inodes in I_WILL_FREE, I_FREEING or I_CLEAR state can
2529 * also cause waiting on I_NEW, without I_NEW actually
2530 * being set. find_inode() uses this to prevent returning
2531 * nearly-dead inodes.
1c0eeaf5
JE
2532 * I_WILL_FREE Must be set when calling write_inode_now() if i_count
2533 * is zero. I_FREEING must be set when I_WILL_FREE is
2534 * cleared.
2535 * I_FREEING Set when inode is about to be freed but still has dirty
2536 * pages or buffers attached or the inode itself is still
2537 * dirty.
dbd5768f
JK
2538 * I_CLEAR Added by clear_inode(). In this state the inode is
2539 * clean and can be destroyed. Inode keeps I_FREEING.
1c0eeaf5
JE
2540 *
2541 * Inodes that are I_WILL_FREE, I_FREEING or I_CLEAR are
2542 * prohibited for many purposes. iget() must wait for
2543 * the inode to be completely released, then create it
2544 * anew. Other functions will just ignore such inodes,
eaff8079 2545 * if appropriate. I_NEW is used for waiting.
1c0eeaf5 2546 *
169ebd90
JK
2547 * I_SYNC Writeback of inode is running. The bit is set during
2548 * data writeback, and cleared with a wakeup on the bit
2549 * address once it is done. The bit is also used to pin
2550 * the inode in memory for flusher thread.
1c0eeaf5 2551 *
bd5fe6c5
CH
2552 * I_REFERENCED Marks the inode as recently references on the LRU list.
2553 *
682aa8e1
TH
2554 * I_WB_SWITCH Cgroup bdi_writeback switching in progress. Used to
2555 * synchronize competing switching instances and to tell
b93b0163 2556 * wb stat updates to grab the i_pages lock. See
a9519def 2557 * inode_switch_wbs_work_fn() for details.
682aa8e1 2558 *
ad0af710
AG
2559 * I_OVL_INUSE Used by overlayfs to get exclusive ownership on upper
2560 * and work dirs among overlayfs mounts.
2561 *
c2b6d621
AV
2562 * I_CREATING New object's inode in the middle of setting up.
2563 *
dae2f8ed
IW
2564 * I_DONTCACHE Evict inode as soon as it is not used anymore.
2565 *
5afced3b
JK
2566 * I_SYNC_QUEUED Inode is queued in b_io or b_more_io writeback lists.
2567 * Used to detect that mark_inode_dirty() should not move
2568 * inode between dirty lists.
2569 *
08276bda
DH
2570 * I_PINNING_FSCACHE_WB Inode is pinning an fscache object for writeback.
2571 *
2a062983
ZC
2572 * I_LRU_ISOLATING Inode is pinned being isolated from LRU without holding
2573 * i_count.
2574 *
1c0eeaf5 2575 * Q: What is the difference between I_WILL_FREE and I_FREEING?
2ed634c9
CB
2576 *
2577 * __I_{SYNC,NEW,LRU_ISOLATING} are used to derive unique addresses to wait
2578 * upon. There's one free address left.
1c0eeaf5 2579 */
2ed634c9 2580#define __I_NEW 0
eaff8079 2581#define I_NEW (1 << __I_NEW)
2ed634c9 2582#define __I_SYNC 1
1c0eeaf5 2583#define I_SYNC (1 << __I_SYNC)
2ed634c9
CB
2584#define __I_LRU_ISOLATING 2
2585#define I_LRU_ISOLATING (1 << __I_LRU_ISOLATING)
2586
2587#define I_DIRTY_SYNC (1 << 3)
2588#define I_DIRTY_DATASYNC (1 << 4)
2589#define I_DIRTY_PAGES (1 << 5)
2590#define I_WILL_FREE (1 << 6)
2591#define I_FREEING (1 << 7)
2592#define I_CLEAR (1 << 8)
2593#define I_REFERENCED (1 << 9)
f4e0c30c 2594#define I_LINKABLE (1 << 10)
0ae45f63 2595#define I_DIRTY_TIME (1 << 11)
2ed634c9
CB
2596#define I_WB_SWITCH (1 << 12)
2597#define I_OVL_INUSE (1 << 13)
2598#define I_CREATING (1 << 14)
2599#define I_DONTCACHE (1 << 15)
2600#define I_SYNC_QUEUED (1 << 16)
2601#define I_PINNING_NETFS_WB (1 << 17)
1da177e4 2602
0e11f644
CH
2603#define I_DIRTY_INODE (I_DIRTY_SYNC | I_DIRTY_DATASYNC)
2604#define I_DIRTY (I_DIRTY_INODE | I_DIRTY_PAGES)
0ae45f63 2605#define I_DIRTY_ALL (I_DIRTY | I_DIRTY_TIME)
1da177e4
LT
2606
2607extern void __mark_inode_dirty(struct inode *, int);
2608static inline void mark_inode_dirty(struct inode *inode)
2609{
2610 __mark_inode_dirty(inode, I_DIRTY);
2611}
2612
2613static inline void mark_inode_dirty_sync(struct inode *inode)
2614{
2615 __mark_inode_dirty(inode, I_DIRTY_SYNC);
2616}
2617
ed296c6c
EB
2618/*
2619 * Returns true if the given inode itself only has dirty timestamps (its pages
2620 * may still be dirty) and isn't currently being allocated or freed.
2621 * Filesystems should call this if when writing an inode when lazytime is
2622 * enabled, they want to opportunistically write the timestamps of other inodes
2623 * located very nearby on-disk, e.g. in the same inode block. This returns true
2624 * if the given inode is in need of such an opportunistic update. Requires
2625 * i_lock, or at least later re-checking under i_lock.
2626 */
2627static inline bool inode_is_dirtytime_only(struct inode *inode)
2628{
2629 return (inode->i_state & (I_DIRTY_TIME | I_NEW |
2630 I_FREEING | I_WILL_FREE)) == I_DIRTY_TIME;
2631}
2632
7ada4db8
MS
2633extern void inc_nlink(struct inode *inode);
2634extern void drop_nlink(struct inode *inode);
2635extern void clear_nlink(struct inode *inode);
2636extern void set_nlink(struct inode *inode, unsigned int nlink);
d8c76e6f
DH
2637
2638static inline void inode_inc_link_count(struct inode *inode)
2639{
2640 inc_nlink(inode);
66d21730
AD
2641 mark_inode_dirty(inode);
2642}
2643
9a53c3a7
DH
2644static inline void inode_dec_link_count(struct inode *inode)
2645{
2646 drop_nlink(inode);
66d21730
AD
2647 mark_inode_dirty(inode);
2648}
2649
c3b2da31
JB
2650enum file_time_flags {
2651 S_ATIME = 1,
2652 S_MTIME = 2,
2653 S_CTIME = 4,
2654 S_VERSION = 8,
2655};
2656
c6718543 2657extern bool atime_needs_update(const struct path *, struct inode *);
badcf2b7 2658extern void touch_atime(const struct path *);
913e9928 2659int inode_update_time(struct inode *inode, int flags);
e60feb44 2660
1da177e4
LT
2661static inline void file_accessed(struct file *file)
2662{
2663 if (!(file->f_flags & O_NOATIME))
68ac1234 2664 touch_atime(&file->f_path);
1da177e4
LT
2665}
2666
e38f7f53 2667extern int file_modified(struct file *file);
66fa3ced 2668int kiocb_modified(struct kiocb *iocb);
e38f7f53 2669
c3765016 2670int sync_inode_metadata(struct inode *inode, int wait);
1da177e4 2671
1da177e4
LT
2672struct file_system_type {
2673 const char *name;
2674 int fs_flags;
bbc1096a
DH
2675#define FS_REQUIRES_DEV 1
2676#define FS_BINARY_MOUNTDATA 2
2677#define FS_HAS_SUBTYPE 4
0c55cfc4 2678#define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */
0b3b094a 2679#define FS_DISALLOW_NOTIFY_PERM 16 /* Disable fanotify permission events */
a6435940 2680#define FS_ALLOW_IDMAP 32 /* FS has been updated to handle vfs idmappings. */
4e40eff0 2681#define FS_MGTIME 64 /* FS uses multigrain timestamps */
a64e5a59 2682#define FS_LBS 128 /* FS supports LBS */
bbc1096a 2683#define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */
f3a09c92 2684 int (*init_fs_context)(struct fs_context *);
d7167b14 2685 const struct fs_parameter_spec *parameters;
c96e41e9
AV
2686 struct dentry *(*mount) (struct file_system_type *, int,
2687 const char *, void *);
1da177e4
LT
2688 void (*kill_sb) (struct super_block *);
2689 struct module *owner;
2690 struct file_system_type * next;
a5166169 2691 struct hlist_head fs_supers;
d475fd42 2692
cf516249 2693 struct lock_class_key s_lock_key;
897c6ff9 2694 struct lock_class_key s_umount_key;
51ee049e 2695 struct lock_class_key s_vfs_rename_key;
5accdf82 2696 struct lock_class_key s_writers_key[SB_FREEZE_LEVELS];
d475fd42
PZ
2697
2698 struct lock_class_key i_lock_key;
2699 struct lock_class_key i_mutex_key;
730633f0 2700 struct lock_class_key invalidate_lock_key;
14358e6d 2701 struct lock_class_key i_mutex_dir_key;
1da177e4
LT
2702};
2703
7f78e035
EB
2704#define MODULE_ALIAS_FS(NAME) MODULE_ALIAS("fs-" NAME)
2705
4e40eff0
JL
2706/**
2707 * is_mgtime: is this inode using multigrain timestamps
2708 * @inode: inode to test for multigrain timestamps
2709 *
2710 * Return true if the inode uses multigrain timestamps, false otherwise.
2711 */
2712static inline bool is_mgtime(const struct inode *inode)
2713{
9fed2c0f 2714 return inode->i_opflags & IOP_MGTIME;
4e40eff0
JL
2715}
2716
152a0836
AV
2717extern struct dentry *mount_bdev(struct file_system_type *fs_type,
2718 int flags, const char *dev_name, void *data,
2719 int (*fill_super)(struct super_block *, void *, int));
3c26ff6e
AV
2720extern struct dentry *mount_nodev(struct file_system_type *fs_type,
2721 int flags, void *data,
2722 int (*fill_super)(struct super_block *, void *, int));
ea441d11 2723extern struct dentry *mount_subtree(struct vfsmount *mnt, const char *path);
04b94071 2724void retire_super(struct super_block *sb);
1da177e4
LT
2725void generic_shutdown_super(struct super_block *sb);
2726void kill_block_super(struct super_block *sb);
2727void kill_anon_super(struct super_block *sb);
2728void kill_litter_super(struct super_block *sb);
2729void deactivate_super(struct super_block *sb);
74dbbdd7 2730void deactivate_locked_super(struct super_block *sb);
1da177e4 2731int set_anon_super(struct super_block *s, void *data);
cb50b348 2732int set_anon_super_fc(struct super_block *s, struct fs_context *fc);
0ee5dc67
AV
2733int get_anon_bdev(dev_t *);
2734void free_anon_bdev(dev_t);
cb50b348
AV
2735struct super_block *sget_fc(struct fs_context *fc,
2736 int (*test)(struct super_block *, struct fs_context *),
2737 int (*set)(struct super_block *, struct fs_context *));
1da177e4
LT
2738struct super_block *sget(struct file_system_type *type,
2739 int (*test)(struct super_block *,void *),
2740 int (*set)(struct super_block *,void *),
9249e17f 2741 int flags, void *data);
69881be3 2742struct super_block *sget_dev(struct fs_context *fc, dev_t dev);
1da177e4
LT
2743
2744/* Alas, no aliases. Too much hassle with bringing module.h everywhere */
8447d848
MG
2745#define fops_get(fops) ({ \
2746 const struct file_operations *_fops = (fops); \
2747 (((_fops) && try_module_get((_fops)->owner) ? (_fops) : NULL)); \
2748})
2749
2750#define fops_put(fops) ({ \
2751 const struct file_operations *_fops = (fops); \
2752 if (_fops) \
2753 module_put((_fops)->owner); \
2754})
2755
e84f9e57
AV
2756/*
2757 * This one is to be used *ONLY* from ->open() instances.
2758 * fops must be non-NULL, pinned down *and* module dependencies
2759 * should be sufficient to pin the caller down as well.
2760 */
2761#define replace_fops(f, fops) \
2762 do { \
2763 struct file *__file = (f); \
2764 fops_put(__file->f_op); \
2765 BUG_ON(!(__file->f_op = (fops))); \
2766 } while(0)
1da177e4
LT
2767
2768extern int register_filesystem(struct file_system_type *);
2769extern int unregister_filesystem(struct file_system_type *);
f0bb5aaf 2770extern int vfs_statfs(const struct path *, struct kstatfs *);
c8b91acc
AV
2771extern int user_statfs(const char __user *, struct kstatfs *);
2772extern int fd_statfs(int, struct kstatfs *);
1af33317
CB
2773int freeze_super(struct super_block *super, enum freeze_holder who,
2774 const void *freeze_owner);
2775int thaw_super(struct super_block *super, enum freeze_holder who,
2776 const void *freeze_owner);
fca39346
JK
2777extern __printf(2, 3)
2778int super_setup_bdi_name(struct super_block *sb, char *fmt, ...);
2779extern int super_setup_bdi(struct super_block *sb);
1da177e4 2780
a4af51ce
KO
2781static inline void super_set_uuid(struct super_block *sb, const u8 *uuid, unsigned len)
2782{
2783 if (WARN_ON(len > sizeof(sb->s_uuid)))
2784 len = sizeof(sb->s_uuid);
2785 sb->s_uuid_len = len;
2786 memcpy(&sb->s_uuid, uuid, len);
2787}
2788
ae8c5117
KO
2789/* set sb sysfs name based on sb->s_bdev */
2790static inline void super_set_sysfs_name_bdev(struct super_block *sb)
2791{
2792 snprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), "%pg", sb->s_bdev);
2793}
2794
2795/* set sb sysfs name based on sb->s_uuid */
2796static inline void super_set_sysfs_name_uuid(struct super_block *sb)
2797{
2798 WARN_ON(sb->s_uuid_len != sizeof(sb->s_uuid));
2799 snprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), "%pU", sb->s_uuid.b);
2800}
2801
2802/* set sb sysfs name based on sb->s_id */
2803static inline void super_set_sysfs_name_id(struct super_block *sb)
2804{
2805 strscpy(sb->s_sysfs_name, sb->s_id, sizeof(sb->s_sysfs_name));
2806}
2807
2808/* try to use something standard before you use this */
2809__printf(2, 3)
2810static inline void super_set_sysfs_name_generic(struct super_block *sb, const char *fmt, ...)
2811{
2812 va_list args;
2813
2814 va_start(args, fmt);
2815 vsnprintf(sb->s_sysfs_name, sizeof(sb->s_sysfs_name), fmt, args);
2816 va_end(args);
2817}
2818
ce3b0f8d
AV
2819extern int current_umask(void);
2820
5a14696c
BF
2821extern void ihold(struct inode * inode);
2822extern void iput(struct inode *);
541d4c79
JL
2823int inode_update_timestamps(struct inode *inode, int flags);
2824int generic_update_time(struct inode *, int);
5a14696c 2825
f87fd4c2 2826/* /sys/fs */
00d26666 2827extern struct kobject *fs_kobj;
f87fd4c2 2828
09cbfeaf 2829#define MAX_RW_COUNT (INT_MAX & PAGE_MASK)
bfcd17a6 2830
1da177e4 2831/* fs/open.c */
adb5c247 2832struct audit_names;
91a27b2a 2833struct filename {
adb5c247
JL
2834 const char *name; /* pointer to actual string */
2835 const __user char *uptr; /* original userland pointer */
03adc61e 2836 atomic_t refcnt;
1c949843 2837 struct audit_names *aname;
fd2f7cb5 2838 const char iname[];
91a27b2a 2839};
f1fffbd4 2840static_assert(offsetof(struct filename, iname) % sizeof(long) == 0);
1da177e4 2841
4a00c673 2842static inline struct mnt_idmap *file_mnt_idmap(const struct file *file)
256c8aed
CB
2843{
2844 return mnt_idmap(file->f_path.mnt);
2845}
2846
bb49e9e7
CB
2847/**
2848 * is_idmapped_mnt - check whether a mount is mapped
2849 * @mnt: the mount to check
2850 *
256c8aed 2851 * If @mnt has an non @nop_mnt_idmap attached to it then @mnt is mapped.
bb49e9e7
CB
2852 *
2853 * Return: true if mount is mapped, false if not.
2854 */
2855static inline bool is_idmapped_mnt(const struct vfsmount *mnt)
2856{
256c8aed 2857 return mnt_idmap(mnt) != &nop_mnt_idmap;
bb49e9e7
CB
2858}
2859
29d80d50 2860int vfs_truncate(const struct path *, loff_t);
abf08576 2861int do_truncate(struct mnt_idmap *, struct dentry *, loff_t start,
643fe55a 2862 unsigned int time_attrs, struct file *filp);
72c72bdf 2863extern int vfs_fallocate(struct file *file, int mode, loff_t offset,
3e63cbb1 2864 loff_t len);
29d80d50
YT
2865int do_sys_open(int dfd, const char __user *filename, int flags,
2866 umode_t mode);
669abf4e 2867extern struct file *file_open_name(struct filename *, int, umode_t);
a218d0fd 2868extern struct file *filp_open(const char *, int, umode_t);
ffb37ca3 2869extern struct file *file_open_root(const struct path *,
378c6520 2870 const char *, int, umode_t);
ffb37ca3
AV
2871static inline struct file *file_open_root_mnt(struct vfsmount *mnt,
2872 const char *name, int flags, umode_t mode)
2873{
2874 return file_open_root(&(struct path){.mnt = mnt, .dentry = mnt->mnt_root},
2875 name, flags, mode);
2876}
62d53c4a
AG
2877struct file *dentry_open(const struct path *path, int flags,
2878 const struct cred *creds);
ebe55960
AV
2879struct file *dentry_open_nonotify(const struct path *path, int flags,
2880 const struct cred *cred);
62d53c4a
AG
2881struct file *dentry_create(const struct path *path, int flags, umode_t mode,
2882 const struct cred *cred);
4e301d85 2883struct path *backing_file_user_path(const struct file *f);
62d53c4a
AG
2884
2885/*
08582d67
AG
2886 * When mmapping a file on a stackable filesystem (e.g., overlayfs), the file
2887 * stored in ->vm_file is a backing file whose f_inode is on the underlying
3efdc78f
AV
2888 * filesystem. When the mapped file path and inode number are displayed to
2889 * user (e.g. via /proc/<pid>/maps), these helpers should be used to get the
2890 * path and inode number to display to the user, which is the path of the fd
2891 * that user has requested to map and the inode number that would be returned
2892 * by fstat() on that same fd.
08582d67 2893 */
3efdc78f 2894/* Get the path to display in /proc/<pid>/maps */
4e301d85 2895static inline const struct path *file_user_path(const struct file *f)
62d53c4a
AG
2896{
2897 if (unlikely(f->f_mode & FMODE_BACKING))
def3ae83 2898 return backing_file_user_path(f);
62d53c4a
AG
2899 return &f->f_path;
2900}
3efdc78f 2901/* Get the inode whose inode number to display in /proc/<pid>/maps */
4e301d85 2902static inline const struct inode *file_user_inode(const struct file *f)
3efdc78f
AV
2903{
2904 if (unlikely(f->f_mode & FMODE_BACKING))
2905 return d_inode(backing_file_user_path(f)->dentry);
2906 return file_inode(f);
2907}
62d53c4a 2908
19f391eb
AV
2909static inline struct file *file_clone_open(struct file *file)
2910{
2911 return dentry_open(&file->f_path, file->f_flags, file->f_cred);
2912}
1da177e4 2913extern int filp_close(struct file *, fl_owner_t id);
91a27b2a 2914
dff60734 2915extern struct filename *getname_flags(const char __user *, int);
8228e2c3 2916extern struct filename *getname_uflags(const char __user *, int);
1bb77256
MG
2917static inline struct filename *getname(const char __user *name)
2918{
2919 return getname_flags(name, 0);
2920}
c4ad8f98 2921extern struct filename *getname_kernel(const char *);
e896474f
AV
2922extern struct filename *__getname_maybe_null(const char __user *);
2923static inline struct filename *getname_maybe_null(const char __user *name, int flags)
2924{
2925 if (!(flags & AT_EMPTY_PATH))
2926 return getname(name);
2927
2928 if (!name)
2929 return NULL;
2930 return __getname_maybe_null(name);
2931}
55422d0b 2932extern void putname(struct filename *name);
f9fde814 2933DEFINE_FREE(putname, struct filename *, if (!IS_ERR_OR_NULL(_T)) putname(_T))
91a27b2a 2934
61185101
MG
2935static inline struct filename *refname(struct filename *name)
2936{
2937 atomic_inc(&name->refcnt);
2938 return name;
2939}
2940
30d90494 2941extern int finish_open(struct file *file, struct dentry *dentry,
be12af3e 2942 int (*open)(struct inode *, struct file *));
e45198a6 2943extern int finish_no_open(struct file *file, struct dentry *dentry);
1da177e4 2944
9751b338
MS
2945/* Helper for the simple case when original dentry is used */
2946static inline int finish_open_simple(struct file *file, int error)
2947{
2948 if (error)
2949 return error;
2950
2951 return finish_open(file, file->f_path.dentry, NULL);
2952}
2953
1da177e4
LT
2954/* fs/dcache.c */
2955extern void __init vfs_caches_init_early(void);
4248b0da 2956extern void __init vfs_caches_init(void);
1da177e4 2957
b86c089b
CL
2958extern struct kmem_cache *names_cachep;
2959
a608ca21 2960#define __getname() kmem_cache_alloc(names_cachep, GFP_KERNEL)
3446a8aa 2961#define __putname(name) kmem_cache_free(names_cachep, (void *)(name))
1da177e4 2962
a212b105 2963extern struct super_block *blockdev_superblock;
a212b105
TH
2964static inline bool sb_is_blkdev_sb(struct super_block *sb)
2965{
dd0dca22 2966 return IS_ENABLED(CONFIG_BLOCK) && sb == blockdev_superblock;
47e4491b 2967}
5c0d6b60 2968
b818f09e 2969void emergency_thaw_all(void);
60b0680f 2970extern int sync_filesystem(struct super_block *);
9361401e 2971extern const struct file_operations def_blk_fops;
4b6f5d20 2972extern const struct file_operations def_chr_fops;
1da177e4
LT
2973
2974/* fs/char_dev.c */
8a932f73 2975#define CHRDEV_MAJOR_MAX 512
49db08c3
LW
2976/* Marks the bottom of the first segment of free char majors */
2977#define CHRDEV_MAJOR_DYN_END 234
a5d31a3f
LG
2978/* Marks the top and bottom of the second segment of free char majors */
2979#define CHRDEV_MAJOR_DYN_EXT_START 511
2980#define CHRDEV_MAJOR_DYN_EXT_END 384
2981
1da177e4
LT
2982extern int alloc_chrdev_region(dev_t *, unsigned, unsigned, const char *);
2983extern int register_chrdev_region(dev_t, unsigned, const char *);
1905b1bf
TH
2984extern int __register_chrdev(unsigned int major, unsigned int baseminor,
2985 unsigned int count, const char *name,
2986 const struct file_operations *fops);
2987extern void __unregister_chrdev(unsigned int major, unsigned int baseminor,
2988 unsigned int count, const char *name);
1da177e4 2989extern void unregister_chrdev_region(dev_t, unsigned);
68eef3b4 2990extern void chrdev_show(struct seq_file *,off_t);
1da177e4 2991
1905b1bf
TH
2992static inline int register_chrdev(unsigned int major, const char *name,
2993 const struct file_operations *fops)
2994{
2995 return __register_chrdev(major, 0, 256, name, fops);
2996}
2997
2998static inline void unregister_chrdev(unsigned int major, const char *name)
2999{
3000 __unregister_chrdev(major, 0, 256, name);
3001}
3002
1da177e4
LT
3003extern void init_special_inode(struct inode *, umode_t, dev_t);
3004
3005/* Invalid inode operations -- fs/bad_inode.c */
3006extern void make_bad_inode(struct inode *);
0e3ef1fe 3007extern bool is_bad_inode(struct inode *);
1da177e4 3008
a823e458
JL
3009extern int __must_check file_fdatawait_range(struct file *file, loff_t lstart,
3010 loff_t lend);
5660e13d
JL
3011extern int __must_check file_check_and_advance_wb_err(struct file *file);
3012extern int __must_check file_write_and_wait_range(struct file *file,
3013 loff_t start, loff_t end);
dddc559f
JA
3014int filemap_fdatawrite_range_kick(struct address_space *mapping, loff_t start,
3015 loff_t end);
5660e13d 3016
a823e458
JL
3017static inline int file_write_and_wait(struct file *file)
3018{
3019 return file_write_and_wait_range(file, 0, LLONG_MAX);
3020}
3021
8018ab05
CH
3022extern int vfs_fsync_range(struct file *file, loff_t start, loff_t end,
3023 int datasync);
3024extern int vfs_fsync(struct file *file, int datasync);
e2592217 3025
22f96b38
JA
3026extern int sync_file_range(struct file *file, loff_t offset, loff_t nbytes,
3027 unsigned int flags);
3028
91b94c5d
AV
3029static inline bool iocb_is_dsync(const struct kiocb *iocb)
3030{
3031 return (iocb->ki_flags & IOCB_DSYNC) ||
3032 IS_SYNC(iocb->ki_filp->f_mapping->host);
3033}
3034
e2592217
CH
3035/*
3036 * Sync the bytes written if this was a synchronous write. Expect ki_pos
3037 * to already be updated for the write, and will return either the amount
3038 * of bytes passed in, or an error if syncing the file failed.
3039 */
3040static inline ssize_t generic_write_sync(struct kiocb *iocb, ssize_t count)
3041{
91b94c5d 3042 if (iocb_is_dsync(iocb)) {
e2592217
CH
3043 int ret = vfs_fsync_range(iocb->ki_filp,
3044 iocb->ki_pos - count, iocb->ki_pos - 1,
3045 (iocb->ki_flags & IOCB_SYNC) ? 0 : 1);
3046 if (ret)
3047 return ret;
1d445757
JA
3048 } else if (iocb->ki_flags & IOCB_DONTCACHE) {
3049 struct address_space *mapping = iocb->ki_filp->f_mapping;
3050
8510edf1
JX
3051 filemap_fdatawrite_range_kick(mapping, iocb->ki_pos - count,
3052 iocb->ki_pos - 1);
e2592217
CH
3053 }
3054
3055 return count;
d311d79d 3056}
e2592217 3057
1da177e4
LT
3058extern void emergency_sync(void);
3059extern void emergency_remount(void);
30460e1e 3060
9361401e 3061#ifdef CONFIG_BLOCK
30460e1e
CM
3062extern int bmap(struct inode *inode, sector_t *block);
3063#else
3064static inline int bmap(struct inode *inode, sector_t *block)
3065{
3066 return -EINVAL;
3067}
9361401e 3068#endif
30460e1e 3069
abf08576 3070int notify_change(struct mnt_idmap *, struct dentry *,
2f221d6f 3071 struct iattr *, struct inode **);
4609e1f1
CB
3072int inode_permission(struct mnt_idmap *, struct inode *, int);
3073int generic_permission(struct mnt_idmap *, struct inode *, int);
02f92b38
CB
3074static inline int file_permission(struct file *file, int mask)
3075{
4609e1f1 3076 return inode_permission(file_mnt_idmap(file),
47291baa 3077 file_inode(file), mask);
02f92b38
CB
3078}
3079static inline int path_permission(const struct path *path, int mask)
3080{
4609e1f1 3081 return inode_permission(mnt_idmap(path->mnt),
47291baa 3082 d_inode(path->dentry), mask);
02f92b38 3083}
9452e93e 3084int __check_sticky(struct mnt_idmap *idmap, struct inode *dir,
ba73d987 3085 struct inode *inode);
1da177e4 3086
f696a365
MS
3087static inline bool execute_ok(struct inode *inode)
3088{
3089 return (inode->i_mode & S_IXUGO) || S_ISDIR(inode->i_mode);
3090}
3091
6e3e2c43
AV
3092static inline bool inode_wrong_type(const struct inode *inode, umode_t mode)
3093{
3094 return (inode->i_mode ^ mode) & S_IFMT;
3095}
3096
f6c05b9e
AG
3097/**
3098 * file_start_write - get write access to a superblock for regular file io
3099 * @file: the file we want to write to
3100 *
3101 * This is a variant of sb_start_write() which is a noop on non-regualr file.
3102 * Should be matched with a call to file_end_write().
3103 */
8d71db4f
AV
3104static inline void file_start_write(struct file *file)
3105{
3106 if (!S_ISREG(file_inode(file)->i_mode))
3107 return;
8a3c84b6 3108 sb_start_write(file_inode(file)->i_sb);
8d71db4f
AV
3109}
3110
5ae98f15
JK
3111static inline bool file_start_write_trylock(struct file *file)
3112{
3113 if (!S_ISREG(file_inode(file)->i_mode))
3114 return true;
8a3c84b6 3115 return sb_start_write_trylock(file_inode(file)->i_sb);
5ae98f15
JK
3116}
3117
f6c05b9e
AG
3118/**
3119 * file_end_write - drop write access to a superblock of a regular file
3120 * @file: the file we wrote to
3121 *
3122 * Should be matched with a call to file_start_write().
3123 */
8d71db4f
AV
3124static inline void file_end_write(struct file *file)
3125{
3126 if (!S_ISREG(file_inode(file)->i_mode))
3127 return;
f6c05b9e 3128 sb_end_write(file_inode(file)->i_sb);
8d71db4f 3129}
bfe219d3 3130
ed0360bb
AG
3131/**
3132 * kiocb_start_write - get write access to a superblock for async file io
3133 * @iocb: the io context we want to submit the write with
3134 *
3135 * This is a variant of sb_start_write() for async io submission.
3136 * Should be matched with a call to kiocb_end_write().
3137 */
3138static inline void kiocb_start_write(struct kiocb *iocb)
3139{
3140 struct inode *inode = file_inode(iocb->ki_filp);
3141
3142 sb_start_write(inode->i_sb);
3143 /*
3144 * Fool lockdep by telling it the lock got released so that it
3145 * doesn't complain about the held lock when we return to userspace.
3146 */
3147 __sb_writers_release(inode->i_sb, SB_FREEZE_WRITE);
3148}
3149
3150/**
3151 * kiocb_end_write - drop write access to a superblock after async file io
3152 * @iocb: the io context we sumbitted the write with
3153 *
3154 * Should be matched with a call to kiocb_start_write().
3155 */
3156static inline void kiocb_end_write(struct kiocb *iocb)
3157{
3158 struct inode *inode = file_inode(iocb->ki_filp);
3159
3160 /*
3161 * Tell lockdep we inherited freeze protection from submission thread.
3162 */
3163 __sb_writers_acquired(inode->i_sb, SB_FREEZE_WRITE);
3164 sb_end_write(inode->i_sb);
8d71db4f 3165}
bfe219d3 3166
07b8ce1e 3167/*
592ca09b
DH
3168 * This is used for regular files where some users -- especially the
3169 * currently executed binary in a process, previously handled via
3170 * VM_DENYWRITE -- cannot handle concurrent write (and maybe mmap
3171 * read-write shared) accesses.
3172 *
07b8ce1e
AV
3173 * get_write_access() gets write permission for a file.
3174 * put_write_access() releases this write permission.
592ca09b
DH
3175 * deny_write_access() denies write access to a file.
3176 * allow_write_access() re-enables write access to a file.
3177 *
3178 * The i_writecount field of an inode can have the following values:
3179 * 0: no write access, no denied write access
3180 * < 0: (-i_writecount) users that denied write access to the file.
3181 * > 0: (i_writecount) users that have write access to the file.
07b8ce1e
AV
3182 *
3183 * Normally we operate on that counter with atomic_{inc,dec} and it's safe
3184 * except for the cases where we don't hold i_writecount yet. Then we need to
3185 * use {get,deny}_write_access() - these functions check the sign and refuse
3186 * to do the change if sign is wrong.
3187 */
3188static inline int get_write_access(struct inode *inode)
3189{
3190 return atomic_inc_unless_negative(&inode->i_writecount) ? 0 : -ETXTBSY;
3191}
3192static inline int deny_write_access(struct file *file)
3193{
496ad9aa 3194 struct inode *inode = file_inode(file);
07b8ce1e
AV
3195 return atomic_dec_unless_positive(&inode->i_writecount) ? 0 : -ETXTBSY;
3196}
1da177e4
LT
3197static inline void put_write_access(struct inode * inode)
3198{
3199 atomic_dec(&inode->i_writecount);
3200}
3201static inline void allow_write_access(struct file *file)
3202{
3203 if (file)
496ad9aa 3204 atomic_inc(&file_inode(file)->i_writecount);
1da177e4 3205}
0357ef03
AG
3206
3207/*
3208 * Do not prevent write to executable file when watched by pre-content events.
3209 *
3210 * Note that FMODE_FSNOTIFY_HSM mode is set depending on pre-content watches at
3211 * the time of file open and remains constant for entire lifetime of the file,
3212 * so if pre-content watches are added post execution or removed before the end
3213 * of the execution, it will not cause i_writecount reference leak.
3214 */
3215static inline int exe_file_deny_write_access(struct file *exe_file)
3216{
3217 if (unlikely(FMODE_FSNOTIFY_HSM(exe_file->f_mode)))
3218 return 0;
3219 return deny_write_access(exe_file);
3220}
3221static inline void exe_file_allow_write_access(struct file *exe_file)
3222{
3223 if (unlikely(!exe_file || FMODE_FSNOTIFY_HSM(exe_file->f_mode)))
3224 return;
3225 allow_write_access(exe_file);
3226}
3227
95101401
AG
3228static inline void file_set_fsnotify_mode(struct file *file, fmode_t mode)
3229{
3230 file->f_mode &= ~FMODE_FSNOTIFY_MASK;
3231 file->f_mode |= mode;
3232}
3233
f1fe29b4
DH
3234static inline bool inode_is_open_for_write(const struct inode *inode)
3235{
3236 return atomic_read(&inode->i_writecount) > 0;
3237}
3238
387e3746 3239#if defined(CONFIG_IMA) || defined(CONFIG_FILE_LOCKING)
a5c96ebf
MZ
3240static inline void i_readcount_dec(struct inode *inode)
3241{
45e0d4b9 3242 BUG_ON(atomic_dec_return(&inode->i_readcount) < 0);
a5c96ebf
MZ
3243}
3244static inline void i_readcount_inc(struct inode *inode)
3245{
3246 atomic_inc(&inode->i_readcount);
3247}
3248#else
3249static inline void i_readcount_dec(struct inode *inode)
3250{
3251 return;
3252}
3253static inline void i_readcount_inc(struct inode *inode)
3254{
3255 return;
3256}
3257#endif
ed8cae8b 3258extern int do_pipe_flags(int *, int);
1da177e4 3259
bdd1d2d3 3260extern ssize_t kernel_read(struct file *, void *, size_t, loff_t *);
61a707c5 3261ssize_t __kernel_read(struct file *file, void *buf, size_t count, loff_t *pos);
e13ec939 3262extern ssize_t kernel_write(struct file *, const void *, size_t, loff_t *);
73e18f7c 3263extern ssize_t __kernel_write(struct file *, const void *, size_t, loff_t *);
1da177e4
LT
3264extern struct file * open_exec(const char *);
3265
3266/* fs/dcache.c -- generic fs support functions */
a6e5787f 3267extern bool is_subdir(struct dentry *, struct dentry *);
640eb7e7 3268extern bool path_is_under(const struct path *, const struct path *);
1da177e4 3269
9bf39ab2
MS
3270extern char *file_path(struct file *, char *, int);
3271
42c3732f
CL
3272/**
3273 * is_dot_dotdot - returns true only if @name is "." or ".."
3274 * @name: file name to check
3275 * @len: length of file name, in bytes
3276 */
3277static inline bool is_dot_dotdot(const char *name, size_t len)
3278{
3279 return len && unlikely(name[0] == '.') &&
3280 (len == 1 || (len == 2 && name[1] == '.'));
3281}
3282
0da3e382
CB
3283/**
3284 * name_contains_dotdot - check if a file name contains ".." path components
3285 *
3286 * Search for ".." surrounded by either '/' or start/end of string.
3287 */
3288static inline bool name_contains_dotdot(const char *name)
3289{
3290 size_t name_len;
3291
3292 name_len = strlen(name);
3293 return strcmp(name, "..") == 0 ||
3294 strncmp(name, "../", 3) == 0 ||
3295 strstr(name, "/../") != NULL ||
3296 (name_len >= 3 && strcmp(name + name_len - 3, "/..") == 0);
3297}
3298
1da177e4
LT
3299#include <linux/err.h>
3300
3301/* needed for stackable file system support */
965c8e59 3302extern loff_t default_llseek(struct file *file, loff_t offset, int whence);
1da177e4 3303
965c8e59 3304extern loff_t vfs_llseek(struct file *file, loff_t offset, int whence);
1da177e4 3305
9897713f
MH
3306extern int inode_init_always_gfp(struct super_block *, struct inode *, gfp_t);
3307static inline int inode_init_always(struct super_block *sb, struct inode *inode)
3308{
3309 return inode_init_always_gfp(sb, inode, GFP_NOFS);
3310}
3311
1da177e4 3312extern void inode_init_once(struct inode *);
2aa15890 3313extern void address_space_init_once(struct address_space *mapping);
1da177e4
LT
3314extern struct inode * igrab(struct inode *);
3315extern ino_t iunique(struct super_block *, ino_t);
3316extern int inode_needs_sync(struct inode *inode);
45321ac5 3317extern int generic_delete_inode(struct inode *inode);
9bcb4b73
AV
3318static inline int generic_drop_inode(struct inode *inode)
3319{
88149082 3320 return !inode->i_nlink || inode_unhashed(inode);
9bcb4b73 3321}
2c567af4 3322extern void d_mark_dontcache(struct inode *inode);
1da177e4 3323
88bd5121
AA
3324extern struct inode *ilookup5_nowait(struct super_block *sb,
3325 unsigned long hashval, int (*test)(struct inode *, void *),
3326 void *data);
1da177e4
LT
3327extern struct inode *ilookup5(struct super_block *sb, unsigned long hashval,
3328 int (*test)(struct inode *, void *), void *data);
3329extern struct inode *ilookup(struct super_block *sb, unsigned long ino);
3330
80ea09a0
MS
3331extern struct inode *inode_insert5(struct inode *inode, unsigned long hashval,
3332 int (*test)(struct inode *, void *),
3333 int (*set)(struct inode *, void *),
3334 void *data);
7180f8d9
MG
3335struct inode *iget5_locked(struct super_block *, unsigned long,
3336 int (*test)(struct inode *, void *),
3337 int (*set)(struct inode *, void *), void *);
3338struct inode *iget5_locked_rcu(struct super_block *, unsigned long,
3339 int (*test)(struct inode *, void *),
3340 int (*set)(struct inode *, void *), void *);
1da177e4 3341extern struct inode * iget_locked(struct super_block *, unsigned long);
fe032c42
TT
3342extern struct inode *find_inode_nowait(struct super_block *,
3343 unsigned long,
3344 int (*match)(struct inode *,
3345 unsigned long, void *),
3346 void *data);
3f19b2ab
DH
3347extern struct inode *find_inode_rcu(struct super_block *, unsigned long,
3348 int (*)(struct inode *, void *), void *);
3349extern struct inode *find_inode_by_ino_rcu(struct super_block *, unsigned long);
261bca86
AV
3350extern int insert_inode_locked4(struct inode *, unsigned long, int (*test)(struct inode *, void *), void *);
3351extern int insert_inode_locked(struct inode *);
e096d0c7
JB
3352#ifdef CONFIG_DEBUG_LOCK_ALLOC
3353extern void lockdep_annotate_inode_mutex_key(struct inode *inode);
3354#else
3355static inline void lockdep_annotate_inode_mutex_key(struct inode *inode) { };
3356#endif
1da177e4 3357extern void unlock_new_inode(struct inode *);
c2b6d621 3358extern void discard_new_inode(struct inode *);
85fe4025 3359extern unsigned int get_next_ino(void);
799ea9e9 3360extern void evict_inodes(struct super_block *sb);
3e9d80a8 3361void dump_mapping(const struct address_space *);
1da177e4 3362
e809d5f0 3363/*
b6334e2c 3364 * Userspace may rely on the inode number being non-zero. For example, glibc
e809d5f0
CD
3365 * simply ignores files with zero i_ino in unlink() and other places.
3366 *
3367 * As an additional complication, if userspace was compiled with
3368 * _FILE_OFFSET_BITS=32 on a 64-bit kernel we'll only end up reading out the
3369 * lower 32 bits, so we need to check that those aren't zero explicitly. With
3370 * _FILE_OFFSET_BITS=64, this may cause some harmless false-negatives, but
3371 * better safe than sorry.
3372 */
3373static inline bool is_zero_ino(ino_t ino)
3374{
3375 return (u32)ino == 0;
3376}
3377
88d2ae0e
KO
3378/*
3379 * inode->i_lock must be held
3380 */
3381static inline void __iget(struct inode *inode)
3382{
3383 atomic_inc(&inode->i_count);
3384}
3385
b46980fe 3386extern void iget_failed(struct inode *);
dbd5768f 3387extern void clear_inode(struct inode *);
2e00c97e 3388extern void __destroy_inode(struct inode *);
1479be62
MG
3389struct inode *alloc_inode(struct super_block *sb);
3390static inline struct inode *new_inode_pseudo(struct super_block *sb)
3391{
3392 return alloc_inode(sb);
3393}
a209dfc7 3394extern struct inode *new_inode(struct super_block *sb);
ff0c7d15 3395extern void free_inode_nonrcu(struct inode *inode);
9452e93e 3396extern int setattr_should_drop_suidgid(struct mnt_idmap *, struct inode *);
66a67c86 3397extern int file_remove_privs_flags(struct file *file, unsigned int flags);
5fa8e0a1 3398extern int file_remove_privs(struct file *);
4f704d9a
CB
3399int setattr_should_drop_sgid(struct mnt_idmap *idmap,
3400 const struct inode *inode);
1da177e4 3401
8b9f3ac5
MS
3402/*
3403 * This must be used for allocating filesystems specific inodes to set
3404 * up the inode reclaim context correctly.
3405 */
a5674119 3406#define alloc_inode_sb(_sb, _cache, _gfp) kmem_cache_alloc_lru(_cache, &_sb->s_inode_lru, _gfp)
8b9f3ac5 3407
1da177e4 3408extern void __insert_inode_hash(struct inode *, unsigned long hashval);
646ec461
CH
3409static inline void insert_inode_hash(struct inode *inode)
3410{
1da177e4
LT
3411 __insert_inode_hash(inode, inode->i_ino);
3412}
f2ee7abf
ED
3413
3414extern void __remove_inode_hash(struct inode *);
3415static inline void remove_inode_hash(struct inode *inode)
3416{
cbedaac6 3417 if (!inode_unhashed(inode) && !hlist_fake(&inode->i_hash))
f2ee7abf
ED
3418 __remove_inode_hash(inode);
3419}
3420
646ec461 3421extern void inode_sb_list_add(struct inode *inode);
51b8c1fe 3422extern void inode_add_lru(struct inode *inode);
1da177e4 3423
1da177e4
LT
3424extern int sb_set_blocksize(struct super_block *, int);
3425extern int sb_min_blocksize(struct super_block *, int);
3426
5b44297b
LS
3427int generic_file_mmap(struct file *, struct vm_area_struct *);
3428int generic_file_mmap_prepare(struct vm_area_desc *desc);
3429int generic_file_readonly_mmap(struct file *, struct vm_area_struct *);
3430int generic_file_readonly_mmap_prepare(struct vm_area_desc *desc);
3309dd04 3431extern ssize_t generic_write_checks(struct kiocb *, struct iov_iter *);
f6f7a25a 3432int generic_write_checks_count(struct kiocb *iocb, loff_t *count);
02e83f46
DW
3433extern int generic_write_check_limits(struct file *file, loff_t pos,
3434 loff_t *count);
a3171351 3435extern int generic_file_rw_checks(struct file *file_in, struct file *file_out);
87fa0f3e
CH
3436ssize_t filemap_read(struct kiocb *iocb, struct iov_iter *to,
3437 ssize_t already_read);
ed978a81 3438extern ssize_t generic_file_read_iter(struct kiocb *, struct iov_iter *);
8174202b 3439extern ssize_t __generic_file_write_iter(struct kiocb *, struct iov_iter *);
8174202b 3440extern ssize_t generic_file_write_iter(struct kiocb *, struct iov_iter *);
1af5bb49 3441extern ssize_t generic_file_direct_write(struct kiocb *, struct iov_iter *);
800ba295 3442ssize_t generic_perform_write(struct kiocb *, struct iov_iter *);
44fff0fa
CH
3443ssize_t direct_write_fallback(struct kiocb *iocb, struct iov_iter *iter,
3444 ssize_t direct_written, ssize_t buffered_written);
88e6faef 3445
18e9710e 3446ssize_t vfs_iter_read(struct file *file, struct iov_iter *iter, loff_t *ppos,
ddef7ed2 3447 rwf_t flags);
abbb6589 3448ssize_t vfs_iter_write(struct file *file, struct iov_iter *iter, loff_t *ppos,
ddef7ed2 3449 rwf_t flags);
5dcdc43e
JX
3450ssize_t vfs_iocb_iter_read(struct file *file, struct kiocb *iocb,
3451 struct iov_iter *iter);
3452ssize_t vfs_iocb_iter_write(struct file *file, struct kiocb *iocb,
3453 struct iov_iter *iter);
dbe4e192 3454
88e6faef 3455/* fs/splice.c */
07073eb0
DH
3456ssize_t filemap_splice_read(struct file *in, loff_t *ppos,
3457 struct pipe_inode_info *pipe,
3458 size_t len, unsigned int flags);
69df79a4
DH
3459ssize_t copy_splice_read(struct file *in, loff_t *ppos,
3460 struct pipe_inode_info *pipe,
3461 size_t len, unsigned int flags);
8d020765 3462extern ssize_t iter_file_splice_write(struct pipe_inode_info *,
cbb7e577 3463 struct file *, loff_t *, size_t, unsigned int);
1c118596 3464
88e6faef 3465
1da177e4
LT
3466extern void
3467file_ra_state_init(struct file_ra_state *ra, struct address_space *mapping);
965c8e59 3468extern loff_t noop_llseek(struct file *file, loff_t offset, int whence);
46a1c2c7 3469extern loff_t vfs_setpos(struct file *file, loff_t offset, loff_t maxsize);
965c8e59 3470extern loff_t generic_file_llseek(struct file *file, loff_t offset, int whence);
5760495a 3471extern loff_t generic_file_llseek_size(struct file *file, loff_t offset,
965c8e59 3472 int whence, loff_t maxsize, loff_t eof);
d688d65a
CB
3473loff_t generic_llseek_cookie(struct file *file, loff_t offset, int whence,
3474 u64 *cookie);
1bf9d14d
AV
3475extern loff_t fixed_size_llseek(struct file *file, loff_t offset,
3476 int whence, loff_t size);
b25472f9
AV
3477extern loff_t no_seek_end_llseek_size(struct file *, loff_t, int, loff_t);
3478extern loff_t no_seek_end_llseek(struct file *, loff_t, int);
87112933 3479int rw_verify_area(int, struct file *, const loff_t *, size_t);
1da177e4
LT
3480extern int generic_file_open(struct inode * inode, struct file * filp);
3481extern int nonseekable_open(struct inode * inode, struct file * filp);
10dce8af 3482extern int stream_open(struct inode * inode, struct file * filp);
1da177e4 3483
9361401e 3484#ifdef CONFIG_BLOCK
8a4c1e42 3485typedef void (dio_submit_t)(struct bio *bio, struct inode *inode,
facd07b0 3486 loff_t file_offset);
1da177e4
LT
3487
3488enum {
1e431f5c
CH
3489 /* need locking between buffered and direct access */
3490 DIO_LOCKING = 0x01,
3491
3492 /* filesystem does not support filling holes */
3493 DIO_SKIP_HOLES = 0x02,
1da177e4
LT
3494};
3495
17f8c842
OS
3496ssize_t __blockdev_direct_IO(struct kiocb *iocb, struct inode *inode,
3497 struct block_device *bdev, struct iov_iter *iter,
c8b8e32d 3498 get_block_t get_block,
0aaf08de 3499 dio_iodone_t end_io,
17f8c842 3500 int flags);
7bb46a67 3501
17f8c842
OS
3502static inline ssize_t blockdev_direct_IO(struct kiocb *iocb,
3503 struct inode *inode,
c8b8e32d 3504 struct iov_iter *iter,
17f8c842 3505 get_block_t get_block)
1da177e4 3506{
17f8c842 3507 return __blockdev_direct_IO(iocb, inode, inode->i_sb->s_bdev, iter,
0aaf08de 3508 get_block, NULL, DIO_LOCKING | DIO_SKIP_HOLES);
1da177e4 3509}
9361401e 3510#endif
1da177e4 3511
1c48d441 3512bool inode_dio_finished(const struct inode *inode);
1d59d61f 3513void inode_dio_wait(struct inode *inode);
1c48d441 3514void inode_dio_wait_interruptible(struct inode *inode);
fe0f07d0 3515
39015399 3516/**
fe0f07d0
JA
3517 * inode_dio_begin - signal start of a direct I/O requests
3518 * @inode: inode the direct I/O happens on
3519 *
3520 * This is called once we've finished processing a direct I/O request,
3521 * and is used to wake up callers waiting for direct I/O to be quiesced.
3522 */
3523static inline void inode_dio_begin(struct inode *inode)
3524{
3525 atomic_inc(&inode->i_dio_count);
3526}
3527
39015399 3528/**
fe0f07d0
JA
3529 * inode_dio_end - signal finish of a direct I/O requests
3530 * @inode: inode the direct I/O happens on
3531 *
3532 * This is called once we've finished processing a direct I/O request,
3533 * and is used to wake up callers waiting for direct I/O to be quiesced.
3534 */
3535static inline void inode_dio_end(struct inode *inode)
3536{
3537 if (atomic_dec_and_test(&inode->i_dio_count))
1c48d441 3538 wake_up_var(&inode->i_dio_count);
fe0f07d0 3539}
1d59d61f 3540
5f16f322
TT
3541extern void inode_set_flags(struct inode *inode, unsigned int flags,
3542 unsigned int mask);
3543
4b6f5d20 3544extern const struct file_operations generic_ro_fops;
1da177e4
LT
3545
3546#define special_file(m) (S_ISCHR(m)||S_ISBLK(m)||S_ISFIFO(m)||S_ISSOCK(m))
3547
ea382199 3548extern int readlink_copy(char __user *, int, const char *, int);
1da177e4 3549extern int page_readlink(struct dentry *, char __user *, int);
b4c173df
MS
3550extern const char *page_get_link_raw(struct dentry *, struct inode *,
3551 struct delayed_call *);
fceef393
AV
3552extern const char *page_get_link(struct dentry *, struct inode *,
3553 struct delayed_call *);
3554extern void page_put_link(void *);
1da177e4 3555extern int page_symlink(struct inode *inode, const char *symname, int len);
c5ef1c42 3556extern const struct inode_operations page_symlink_inode_operations;
fceef393 3557extern void kfree_link(void *);
4e40eff0 3558void fill_mg_cmtime(struct kstat *stat, u32 request_mask, struct inode *inode);
0d72b928 3559void generic_fillattr(struct mnt_idmap *, u32, struct inode *, struct kstat *);
4f911138 3560void generic_fill_statx_attr(struct inode *inode, struct kstat *stat);
0f9ca80f
PS
3561void generic_fill_statx_atomic_writes(struct kstat *stat,
3562 unsigned int unit_min,
5d894321
JG
3563 unsigned int unit_max,
3564 unsigned int unit_max_opt);
a528d35e
DH
3565extern int vfs_getattr_nosec(const struct path *, struct kstat *, u32, unsigned int);
3566extern int vfs_getattr(const struct path *, struct kstat *, u32, unsigned int);
b462707e 3567void __inode_add_bytes(struct inode *inode, loff_t bytes);
1da177e4 3568void inode_add_bytes(struct inode *inode, loff_t bytes);
1c8924eb 3569void __inode_sub_bytes(struct inode *inode, loff_t bytes);
1da177e4 3570void inode_sub_bytes(struct inode *inode, loff_t bytes);
f4a8116a
JK
3571static inline loff_t __inode_get_bytes(struct inode *inode)
3572{
3573 return (((loff_t)inode->i_blocks) << 9) + inode->i_bytes;
3574}
1da177e4
LT
3575loff_t inode_get_bytes(struct inode *inode);
3576void inode_set_bytes(struct inode *inode, loff_t bytes);
fceef393
AV
3577const char *simple_get_link(struct dentry *, struct inode *,
3578 struct delayed_call *);
61ba64fc 3579extern const struct inode_operations simple_symlink_inode_operations;
1da177e4 3580
5c0ba4e0 3581extern int iterate_dir(struct file *, struct dir_context *);
1da177e4 3582
09f1bde4
CH
3583int vfs_fstatat(int dfd, const char __user *filename, struct kstat *stat,
3584 int flags);
da9aa5d9 3585int vfs_fstat(int fd, struct kstat *stat);
a528d35e
DH
3586
3587static inline int vfs_stat(const char __user *filename, struct kstat *stat)
3588{
0b2c6693 3589 return vfs_fstatat(AT_FDCWD, filename, stat, 0);
a528d35e
DH
3590}
3591static inline int vfs_lstat(const char __user *name, struct kstat *stat)
3592{
0b2c6693 3593 return vfs_fstatat(AT_FDCWD, name, stat, AT_SYMLINK_NOFOLLOW);
a528d35e 3594}
a528d35e 3595
d60874cd 3596extern const char *vfs_get_link(struct dentry *, struct delayed_call *);
fd4a0edf 3597extern int vfs_readlink(struct dentry *, char __user *, int);
1da177e4 3598
ee416bcd 3599extern struct file_system_type *get_filesystem(struct file_system_type *fs);
c18479fe 3600extern void put_filesystem(struct file_system_type *fs);
1da177e4 3601extern struct file_system_type *get_fs_type(const char *name);
1da177e4 3602extern void drop_super(struct super_block *sb);
ba6379f7 3603extern void drop_super_exclusive(struct super_block *sb);
b47e42d1 3604extern void iterate_supers(void (*f)(struct super_block *, void *), void *arg);
43e15cdb
AV
3605extern void iterate_supers_type(struct file_system_type *,
3606 void (*)(struct super_block *, void *), void *);
1af33317
CB
3607void filesystems_freeze(void);
3608void filesystems_thaw(void);
1da177e4
LT
3609
3610extern int dcache_dir_open(struct inode *, struct file *);
3611extern int dcache_dir_close(struct inode *, struct file *);
3612extern loff_t dcache_dir_lseek(struct file *, loff_t, int);
5f99f4e7 3613extern int dcache_readdir(struct file *, struct dir_context *);
c1632a0f 3614extern int simple_setattr(struct mnt_idmap *, struct dentry *,
549c7297 3615 struct iattr *);
b74d24f7 3616extern int simple_getattr(struct mnt_idmap *, const struct path *,
549c7297 3617 struct kstat *, u32, unsigned int);
726c3342 3618extern int simple_statfs(struct dentry *, struct kstatfs *);
20955e89 3619extern int simple_open(struct inode *inode, struct file *file);
1da177e4
LT
3620extern int simple_link(struct dentry *, struct inode *, struct dentry *);
3621extern int simple_unlink(struct inode *, struct dentry *);
3622extern int simple_rmdir(struct inode *, struct dentry *);
0c476792
JL
3623void simple_rename_timestamp(struct inode *old_dir, struct dentry *old_dentry,
3624 struct inode *new_dir, struct dentry *new_dentry);
6429e463
LB
3625extern int simple_rename_exchange(struct inode *old_dir, struct dentry *old_dentry,
3626 struct inode *new_dir, struct dentry *new_dentry);
e18275ae 3627extern int simple_rename(struct mnt_idmap *, struct inode *,
549c7297
CB
3628 struct dentry *, struct inode *, struct dentry *,
3629 unsigned int);
a3d1e7eb
AV
3630extern void simple_recursive_removal(struct dentry *,
3631 void (*callback)(struct dentry *));
9fd45235
AV
3632extern void locked_recursive_removal(struct dentry *,
3633 void (*callback)(struct dentry *));
02c24a82 3634extern int noop_fsync(struct file *, loff_t, loff_t, int);
f44c7763 3635extern ssize_t noop_direct_IO(struct kiocb *iocb, struct iov_iter *iter);
1da177e4 3636extern int simple_empty(struct dentry *);
e9d8e2bf
TC
3637extern int simple_write_begin(const struct kiocb *iocb,
3638 struct address_space *mapping,
3639 loff_t pos, unsigned len,
3640 struct folio **foliop, void **fsdata);
c1e3dbe9 3641extern const struct address_space_operations ram_aops;
b26d4cd3 3642extern int always_delete_dentry(const struct dentry *);
6987843f 3643extern struct inode *alloc_anon_inode(struct super_block *);
cbe4134e
SG
3644struct inode *anon_inode_make_secure_inode(struct super_block *sb, const char *name,
3645 const struct inode *context_inode);
c69ff407 3646extern int simple_nosetlease(struct file *, int, struct file_lease **, void **);
1da177e4 3647
00cd8dd3 3648extern struct dentry *simple_lookup(struct inode *, struct dentry *, unsigned int flags);
1da177e4 3649extern ssize_t generic_read_dir(struct file *, char __user *, size_t, loff_t *);
4b6f5d20 3650extern const struct file_operations simple_dir_operations;
c5ef1c42 3651extern const struct inode_operations simple_dir_inode_operations;
fbabfd0f
EB
3652extern void make_empty_dir_inode(struct inode *inode);
3653extern bool is_empty_dir_inode(struct inode *inode);
cda37124 3654struct tree_descr { const char *name; const struct file_operations *ops; int mode; };
1da177e4 3655struct dentry *d_alloc_name(struct dentry *, const char *);
cda37124
EB
3656extern int simple_fill_super(struct super_block *, unsigned long,
3657 const struct tree_descr *);
1f5ce9e9 3658extern int simple_pin_fs(struct file_system_type *, struct vfsmount **mount, int *count);
1da177e4 3659extern void simple_release_fs(struct vfsmount **mount, int *count);
59200f45 3660struct dentry *simple_start_creating(struct dentry *, const char *);
1da177e4 3661
93b07113
AM
3662extern ssize_t simple_read_from_buffer(void __user *to, size_t count,
3663 loff_t *ppos, const void *from, size_t available);
6a727b43
JS
3664extern ssize_t simple_write_to_buffer(void *to, size_t available, loff_t *ppos,
3665 const void __user *from, size_t count);
1da177e4 3666
6faddda6 3667struct offset_ctx {
0e4a8621
CL
3668 struct maple_tree mt;
3669 unsigned long next_offset;
6faddda6
CL
3670};
3671
3672void simple_offset_init(struct offset_ctx *octx);
3673int simple_offset_add(struct offset_ctx *octx, struct dentry *dentry);
3674void simple_offset_remove(struct offset_ctx *octx, struct dentry *dentry);
5a1a25be
CL
3675int simple_offset_rename(struct inode *old_dir, struct dentry *old_dentry,
3676 struct inode *new_dir, struct dentry *new_dentry);
6faddda6
CL
3677int simple_offset_rename_exchange(struct inode *old_dir,
3678 struct dentry *old_dentry,
3679 struct inode *new_dir,
3680 struct dentry *new_dentry);
3681void simple_offset_destroy(struct offset_ctx *octx);
3682
3683extern const struct file_operations simple_offset_dir_operations;
3684
ac13a829 3685extern int __generic_file_fsync(struct file *, loff_t, loff_t, int);
02c24a82 3686extern int generic_file_fsync(struct file *, loff_t, loff_t, int);
d5aacad5 3687
30ca22c7
PL
3688extern int generic_check_addressable(unsigned, u64);
3689
70dfe3f0 3690extern void generic_set_sb_d_ops(struct super_block *sb);
6a79a4e1
GKB
3691extern int generic_ci_match(const struct inode *parent,
3692 const struct qstr *name,
3693 const struct qstr *folded_name,
3694 const u8 *de_name, u32 de_name_len);
c843843e 3695
0e152beb 3696#if IS_ENABLED(CONFIG_UNICODE)
458532c8
AA
3697int generic_ci_d_hash(const struct dentry *dentry, struct qstr *str);
3698int generic_ci_d_compare(const struct dentry *dentry, unsigned int len,
3699 const char *str, const struct qstr *name);
3700
0e152beb
AA
3701/**
3702 * generic_ci_validate_strict_name - Check if a given name is suitable
3703 * for a directory
3704 *
3705 * This functions checks if the proposed filename is valid for the
3706 * parent directory. That means that only valid UTF-8 filenames will be
3707 * accepted for casefold directories from filesystems created with the
3708 * strict encoding flag. That also means that any name will be
3709 * accepted for directories that doesn't have casefold enabled, or
3710 * aren't being strict with the encoding.
3711 *
3712 * @dir: inode of the directory where the new file will be created
3713 * @name: name of the new file
3714 *
3715 * Return:
33b091c0
AA
3716 * * True: if the filename is suitable for this directory. It can be
3717 * true if a given name is not suitable for a strict encoding
3718 * directory, but the directory being used isn't strict
0e152beb 3719 * * False if the filename isn't suitable for this directory. This only
33b091c0
AA
3720 * happens when a directory is casefolded and the filesystem is strict
3721 * about its encoding.
0e152beb
AA
3722 */
3723static inline bool generic_ci_validate_strict_name(struct inode *dir, struct qstr *name)
3724{
3725 if (!IS_CASEFOLDED(dir) || !sb_has_strict_encoding(dir->i_sb))
3726 return true;
3727
3728 /*
3729 * A casefold dir must have a encoding set, unless the filesystem
3730 * is corrupted
3731 */
3732 if (WARN_ON_ONCE(!dir->i_sb->s_encoding))
3733 return true;
3734
3735 return !utf8_validate(dir->i_sb->s_encoding, name);
3736}
3737#else
3738static inline bool generic_ci_validate_strict_name(struct inode *dir, struct qstr *name)
3739{
3740 return true;
3741}
3742#endif
3743
2824083d
GKB
3744static inline bool sb_has_encoding(const struct super_block *sb)
3745{
3746#if IS_ENABLED(CONFIG_UNICODE)
3747 return !!sb->s_encoding;
3748#else
3749 return false;
3750#endif
3751}
c843843e 3752
4609e1f1 3753int may_setattr(struct mnt_idmap *idmap, struct inode *inode,
7bb698f0 3754 unsigned int ia_valid);
c1632a0f 3755int setattr_prepare(struct mnt_idmap *, struct dentry *, struct iattr *);
25d9e2d1 3756extern int inode_newsize_ok(const struct inode *, loff_t offset);
c1632a0f 3757void setattr_copy(struct mnt_idmap *, struct inode *inode,
2f221d6f 3758 const struct iattr *attr);
1da177e4 3759
c3b2da31 3760extern int file_update_time(struct file *file);
1da177e4 3761
de195c67
LS
3762static inline bool file_is_dax(const struct file *file)
3763{
3764 return file && IS_DAX(file->f_mapping->host);
3765}
3766
f05a3849 3767static inline bool vma_is_dax(const struct vm_area_struct *vma)
baabda26 3768{
de195c67 3769 return file_is_dax(vma->vm_file);
baabda26
DW
3770}
3771
2bb6d283
DW
3772static inline bool vma_is_fsdax(struct vm_area_struct *vma)
3773{
3774 struct inode *inode;
3775
52650c8b 3776 if (!IS_ENABLED(CONFIG_FS_DAX) || !vma->vm_file)
2bb6d283
DW
3777 return false;
3778 if (!vma_is_dax(vma))
3779 return false;
3780 inode = file_inode(vma->vm_file);
230f5a89 3781 if (S_ISCHR(inode->i_mode))
2bb6d283
DW
3782 return false; /* device-dax */
3783 return true;
3784}
3785
2ba48ce5
AV
3786static inline int iocb_flags(struct file *file)
3787{
3788 int res = 0;
3789 if (file->f_flags & O_APPEND)
3790 res |= IOCB_APPEND;
efbe3c24 3791 if (file->f_flags & O_DIRECT)
2ba48ce5 3792 res |= IOCB_DIRECT;
91b94c5d 3793 if (file->f_flags & O_DSYNC)
dde0c2e7
CH
3794 res |= IOCB_DSYNC;
3795 if (file->f_flags & __O_SYNC)
3796 res |= IOCB_SYNC;
2ba48ce5
AV
3797 return res;
3798}
3799
c34fc6f2
PS
3800static inline int kiocb_set_rw_flags(struct kiocb *ki, rwf_t flags,
3801 int rw_type)
fdd2f5b7 3802{
1752f0ad
PB
3803 int kiocb_flags = 0;
3804
ce71bfea
JA
3805 /* make sure there's no overlap between RWF and private IOCB flags */
3806 BUILD_BUG_ON((__force int) RWF_SUPPORTED & IOCB_EVENTFD);
3807
1752f0ad
PB
3808 if (!flags)
3809 return 0;
fdd2f5b7
GR
3810 if (unlikely(flags & ~RWF_SUPPORTED))
3811 return -EOPNOTSUPP;
73fa7547
RF
3812 if (unlikely((flags & RWF_APPEND) && (flags & RWF_NOAPPEND)))
3813 return -EINVAL;
fdd2f5b7 3814
b745fafa 3815 if (flags & RWF_NOWAIT) {
91f9943e 3816 if (!(ki->ki_filp->f_mode & FMODE_NOWAIT))
b745fafa 3817 return -EOPNOTSUPP;
b745fafa 3818 }
c34fc6f2
PS
3819 if (flags & RWF_ATOMIC) {
3820 if (rw_type != WRITE)
3821 return -EOPNOTSUPP;
3822 if (!(ki->ki_filp->f_mode & FMODE_CAN_ATOMIC_WRITE))
3823 return -EOPNOTSUPP;
3824 }
af6505e5
JA
3825 if (flags & RWF_DONTCACHE) {
3826 /* file system must support it */
3827 if (!(ki->ki_filp->f_op->fop_flags & FOP_DONTCACHE))
3828 return -EOPNOTSUPP;
3829 /* DAX mappings not supported */
3830 if (IS_DAX(ki->ki_filp->f_mapping->host))
3831 return -EOPNOTSUPP;
3832 }
ce71bfea 3833 kiocb_flags |= (__force int) (flags & RWF_SUPPORTED);
fdd2f5b7 3834 if (flags & RWF_SYNC)
ce71bfea 3835 kiocb_flags |= IOCB_DSYNC;
1752f0ad 3836
73fa7547
RF
3837 if ((flags & RWF_NOAPPEND) && (ki->ki_flags & IOCB_APPEND)) {
3838 if (IS_APPEND(file_inode(ki->ki_filp)))
3839 return -EPERM;
3840 ki->ki_flags &= ~IOCB_APPEND;
3841 }
3842
1752f0ad 3843 ki->ki_flags |= kiocb_flags;
fdd2f5b7
GR
3844 return 0;
3845}
3846
1da177e4
LT
3847/* Transaction based IO helpers */
3848
3849/*
3850 * An argresp is stored in an allocated page and holds the
3851 * size of the argument or response, along with its content
3852 */
3853struct simple_transaction_argresp {
3854 ssize_t size;
5e01fdff 3855 char data[];
1da177e4
LT
3856};
3857
3858#define SIMPLE_TRANSACTION_LIMIT (PAGE_SIZE - sizeof(struct simple_transaction_argresp))
3859
3860char *simple_transaction_get(struct file *file, const char __user *buf,
3861 size_t size);
3862ssize_t simple_transaction_read(struct file *file, char __user *buf,
3863 size_t size, loff_t *pos);
3864int simple_transaction_release(struct inode *inode, struct file *file);
3865
76791ab2 3866void simple_transaction_set(struct file *file, size_t n);
1da177e4 3867
acaefc25
AB
3868/*
3869 * simple attribute files
3870 *
3871 * These attributes behave similar to those in sysfs:
3872 *
3873 * Writing to an attribute immediately sets a value, an open file can be
3874 * written to multiple times.
3875 *
3876 * Reading from an attribute creates a buffer from the value that might get
3877 * read with multiple read calls. When the attribute has been read
3878 * completely, no further read calls are possible until the file is opened
3879 * again.
3880 *
3881 * All attributes contain a text representation of a numeric value
3882 * that are accessed with the get() and set() functions.
3883 */
2e41f274 3884#define DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, __is_signed) \
acaefc25
AB
3885static int __fops ## _open(struct inode *inode, struct file *file) \
3886{ \
3887 __simple_attr_check_format(__fmt, 0ull); \
3888 return simple_attr_open(inode, file, __get, __set, __fmt); \
3889} \
828c0950 3890static const struct file_operations __fops = { \
acaefc25
AB
3891 .owner = THIS_MODULE, \
3892 .open = __fops ## _open, \
74bedc4d 3893 .release = simple_attr_release, \
acaefc25 3894 .read = simple_attr_read, \
2e41f274 3895 .write = (__is_signed) ? simple_attr_write_signed : simple_attr_write, \
1ec5584e 3896 .llseek = generic_file_llseek, \
68be3029 3897}
acaefc25 3898
2e41f274
AM
3899#define DEFINE_SIMPLE_ATTRIBUTE(__fops, __get, __set, __fmt) \
3900 DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, false)
3901
3902#define DEFINE_SIMPLE_ATTRIBUTE_SIGNED(__fops, __get, __set, __fmt) \
3903 DEFINE_SIMPLE_ATTRIBUTE_XSIGNED(__fops, __get, __set, __fmt, true)
3904
b9075fa9
JP
3905static inline __printf(1, 2)
3906void __simple_attr_check_format(const char *fmt, ...)
acaefc25
AB
3907{
3908 /* don't do anything, just let the compiler check the arguments; */
3909}
3910
3911int simple_attr_open(struct inode *inode, struct file *file,
8b88b099 3912 int (*get)(void *, u64 *), int (*set)(void *, u64),
acaefc25 3913 const char *fmt);
74bedc4d 3914int simple_attr_release(struct inode *inode, struct file *file);
acaefc25
AB
3915ssize_t simple_attr_read(struct file *file, char __user *buf,
3916 size_t len, loff_t *ppos);
3917ssize_t simple_attr_write(struct file *file, const char __user *buf,
3918 size_t len, loff_t *ppos);
2e41f274
AM
3919ssize_t simple_attr_write_signed(struct file *file, const char __user *buf,
3920 size_t len, loff_t *ppos);
acaefc25 3921
4be28540 3922struct ctl_table;
6e7c1770 3923int __init list_bdev_fs_names(char *buf, size_t size);
62239ac2 3924
3cd90ea4 3925#define __FMODE_EXEC ((__force int) FMODE_EXEC)
1a44bc8c 3926
6d125529 3927#define ACC_MODE(x) ("\004\002\006\006"[(x)&O_ACCMODE])
ebe55960 3928#define OPEN_FMODE(flag) ((__force fmode_t)((flag + 1) & O_ACCMODE))
5300990c 3929
d37177ba 3930static inline bool is_sxid(umode_t mode)
69b45732 3931{
8d84e39d 3932 return mode & (S_ISUID | S_ISGID);
69b45732
AK
3933}
3934
9452e93e 3935static inline int check_sticky(struct mnt_idmap *idmap,
ba73d987 3936 struct inode *dir, struct inode *inode)
cbdf35bc
MS
3937{
3938 if (!(dir->i_mode & S_ISVTX))
3939 return 0;
3940
9452e93e 3941 return __check_sticky(idmap, dir, inode);
cbdf35bc
MS
3942}
3943
69b45732
AK
3944static inline void inode_has_no_xattr(struct inode *inode)
3945{
e462ec50 3946 if (!is_sxid(inode->i_mode) && (inode->i_sb->s_flags & SB_NOSEC))
69b45732
AK
3947 inode->i_flags |= S_NOSEC;
3948}
3949
a7400222
AV
3950static inline bool is_root_inode(struct inode *inode)
3951{
3952 return inode == inode->i_sb->s_root->d_inode;
3953}
3954
5f99f4e7
AV
3955static inline bool dir_emit(struct dir_context *ctx,
3956 const char *name, int namelen,
3957 u64 ino, unsigned type)
3958{
25885a35 3959 return ctx->actor(ctx, name, namelen, ctx->pos, ino, type);
5f99f4e7
AV
3960}
3961static inline bool dir_emit_dot(struct file *file, struct dir_context *ctx)
3962{
3963 return ctx->actor(ctx, ".", 1, ctx->pos,
25885a35 3964 file->f_path.dentry->d_inode->i_ino, DT_DIR);
5f99f4e7
AV
3965}
3966static inline bool dir_emit_dotdot(struct file *file, struct dir_context *ctx)
3967{
3968 return ctx->actor(ctx, "..", 2, ctx->pos,
f378ec4e 3969 d_parent_ino(file->f_path.dentry), DT_DIR);
5f99f4e7
AV
3970}
3971static inline bool dir_emit_dots(struct file *file, struct dir_context *ctx)
3972{
3973 if (ctx->pos == 0) {
3974 if (!dir_emit_dot(file, ctx))
3975 return false;
3976 ctx->pos = 1;
3977 }
3978 if (ctx->pos == 1) {
3979 if (!dir_emit_dotdot(file, ctx))
3980 return false;
3981 ctx->pos = 2;
3982 }
3983 return true;
3984}
5ded75ec
AV
3985static inline bool dir_relax(struct inode *inode)
3986{
5955102c
AV
3987 inode_unlock(inode);
3988 inode_lock(inode);
5ded75ec
AV
3989 return !IS_DEADDIR(inode);
3990}
5f99f4e7 3991
ae05327a
AV
3992static inline bool dir_relax_shared(struct inode *inode)
3993{
3994 inode_unlock_shared(inode);
3995 inode_lock_shared(inode);
3996 return !IS_DEADDIR(inode);
3997}
3998
90f8572b 3999extern bool path_noexec(const struct path *path);
21fc61c7 4000extern void inode_nohighmem(struct inode *inode);
90f8572b 4001
45cd0faa
AG
4002/* mm/fadvise.c */
4003extern int vfs_fadvise(struct file *file, loff_t offset, loff_t len,
4004 int advice);
cf1ea059
JK
4005extern int generic_fadvise(struct file *file, loff_t offset, loff_t len,
4006 int advice);
45cd0faa 4007
1bc6d445
CB
4008static inline bool vfs_empty_path(int dfd, const char __user *path)
4009{
4010 char c;
4011
4012 if (dfd < 0)
4013 return false;
4014
4015 /* We now allow NULL to be used for empty path. */
4016 if (!path)
4017 return true;
4018
4019 if (unlikely(get_user(c, path)))
4020 return false;
4021
4022 return !c;
4023}
4024
c3be7ebb 4025int generic_atomic_write_valid(struct kiocb *iocb, struct iov_iter *iter);
c34fc6f2 4026
1da177e4 4027#endif /* _LINUX_FS_H */