Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
[linux-2.6-block.git] / fs / kernfs / dir.c
CommitLineData
b8441ed2
TH
1/*
2 * fs/kernfs/dir.c - kernfs directory implementation
3 *
4 * Copyright (c) 2001-3 Patrick Mochel
5 * Copyright (c) 2007 SUSE Linux Products GmbH
6 * Copyright (c) 2007, 2013 Tejun Heo <tj@kernel.org>
7 *
8 * This file is released under the GPLv2.
9 */
fd7b9f7b 10
abd54f02 11#include <linux/sched.h>
fd7b9f7b
TH
12#include <linux/fs.h>
13#include <linux/namei.h>
14#include <linux/idr.h>
15#include <linux/slab.h>
16#include <linux/security.h>
17#include <linux/hash.h>
18
19#include "kernfs-internal.h"
20
a797bfc3 21DEFINE_MUTEX(kernfs_mutex);
3eef34ad
TH
22static DEFINE_SPINLOCK(kernfs_rename_lock); /* kn->parent and ->name */
23static char kernfs_pr_cont_buf[PATH_MAX]; /* protected by rename_lock */
fd7b9f7b 24
adc5e8b5 25#define rb_to_kn(X) rb_entry((X), struct kernfs_node, rb)
fd7b9f7b 26
81c173cb
TH
27static bool kernfs_active(struct kernfs_node *kn)
28{
29 lockdep_assert_held(&kernfs_mutex);
30 return atomic_read(&kn->active) >= 0;
31}
32
182fd64b
TH
33static bool kernfs_lockdep(struct kernfs_node *kn)
34{
35#ifdef CONFIG_DEBUG_LOCK_ALLOC
36 return kn->flags & KERNFS_LOCKDEP;
37#else
38 return false;
39#endif
40}
41
3eef34ad
TH
42static int kernfs_name_locked(struct kernfs_node *kn, char *buf, size_t buflen)
43{
44 return strlcpy(buf, kn->parent ? kn->name : "/", buflen);
45}
46
47static char * __must_check kernfs_path_locked(struct kernfs_node *kn, char *buf,
48 size_t buflen)
49{
50 char *p = buf + buflen;
51 int len;
52
53 *--p = '\0';
54
55 do {
56 len = strlen(kn->name);
57 if (p - buf < len + 1) {
58 buf[0] = '\0';
59 p = NULL;
60 break;
61 }
62 p -= len;
63 memcpy(p, kn->name, len);
64 *--p = '/';
65 kn = kn->parent;
66 } while (kn && kn->parent);
67
68 return p;
69}
70
71/**
72 * kernfs_name - obtain the name of a given node
73 * @kn: kernfs_node of interest
74 * @buf: buffer to copy @kn's name into
75 * @buflen: size of @buf
76 *
77 * Copies the name of @kn into @buf of @buflen bytes. The behavior is
78 * similar to strlcpy(). It returns the length of @kn's name and if @buf
79 * isn't long enough, it's filled upto @buflen-1 and nul terminated.
80 *
81 * This function can be called from any context.
82 */
83int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
84{
85 unsigned long flags;
86 int ret;
87
88 spin_lock_irqsave(&kernfs_rename_lock, flags);
89 ret = kernfs_name_locked(kn, buf, buflen);
90 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
91 return ret;
92}
93
9acee9c5
TH
94/**
95 * kernfs_path_len - determine the length of the full path of a given node
96 * @kn: kernfs_node of interest
97 *
98 * The returned length doesn't include the space for the terminating '\0'.
99 */
100size_t kernfs_path_len(struct kernfs_node *kn)
101{
102 size_t len = 0;
103 unsigned long flags;
104
105 spin_lock_irqsave(&kernfs_rename_lock, flags);
106
107 do {
108 len += strlen(kn->name) + 1;
109 kn = kn->parent;
110 } while (kn && kn->parent);
111
112 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
113
114 return len;
115}
116
3eef34ad
TH
117/**
118 * kernfs_path - build full path of a given node
119 * @kn: kernfs_node of interest
120 * @buf: buffer to copy @kn's name into
121 * @buflen: size of @buf
122 *
123 * Builds and returns the full path of @kn in @buf of @buflen bytes. The
124 * path is built from the end of @buf so the returned pointer usually
125 * doesn't match @buf. If @buf isn't long enough, @buf is nul terminated
126 * and %NULL is returned.
127 */
128char *kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
129{
130 unsigned long flags;
131 char *p;
132
133 spin_lock_irqsave(&kernfs_rename_lock, flags);
134 p = kernfs_path_locked(kn, buf, buflen);
135 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
136 return p;
137}
e61734c5 138EXPORT_SYMBOL_GPL(kernfs_path);
3eef34ad
TH
139
140/**
141 * pr_cont_kernfs_name - pr_cont name of a kernfs_node
142 * @kn: kernfs_node of interest
143 *
144 * This function can be called from any context.
145 */
146void pr_cont_kernfs_name(struct kernfs_node *kn)
147{
148 unsigned long flags;
149
150 spin_lock_irqsave(&kernfs_rename_lock, flags);
151
152 kernfs_name_locked(kn, kernfs_pr_cont_buf, sizeof(kernfs_pr_cont_buf));
153 pr_cont("%s", kernfs_pr_cont_buf);
154
155 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
156}
157
158/**
159 * pr_cont_kernfs_path - pr_cont path of a kernfs_node
160 * @kn: kernfs_node of interest
161 *
162 * This function can be called from any context.
163 */
164void pr_cont_kernfs_path(struct kernfs_node *kn)
165{
166 unsigned long flags;
167 char *p;
168
169 spin_lock_irqsave(&kernfs_rename_lock, flags);
170
171 p = kernfs_path_locked(kn, kernfs_pr_cont_buf,
172 sizeof(kernfs_pr_cont_buf));
173 if (p)
174 pr_cont("%s", p);
175 else
176 pr_cont("<name too long>");
177
178 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
179}
180
181/**
182 * kernfs_get_parent - determine the parent node and pin it
183 * @kn: kernfs_node of interest
184 *
185 * Determines @kn's parent, pins and returns it. This function can be
186 * called from any context.
187 */
188struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
189{
190 struct kernfs_node *parent;
191 unsigned long flags;
192
193 spin_lock_irqsave(&kernfs_rename_lock, flags);
194 parent = kn->parent;
195 kernfs_get(parent);
196 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
197
198 return parent;
199}
200
fd7b9f7b 201/**
c637b8ac 202 * kernfs_name_hash
fd7b9f7b
TH
203 * @name: Null terminated string to hash
204 * @ns: Namespace tag to hash
205 *
206 * Returns 31 bit hash of ns + name (so it fits in an off_t )
207 */
c637b8ac 208static unsigned int kernfs_name_hash(const char *name, const void *ns)
fd7b9f7b
TH
209{
210 unsigned long hash = init_name_hash();
211 unsigned int len = strlen(name);
212 while (len--)
213 hash = partial_name_hash(*name++, hash);
214 hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31));
215 hash &= 0x7fffffffU;
216 /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
88391d49 217 if (hash < 2)
fd7b9f7b
TH
218 hash += 2;
219 if (hash >= INT_MAX)
220 hash = INT_MAX - 1;
221 return hash;
222}
223
c637b8ac
TH
224static int kernfs_name_compare(unsigned int hash, const char *name,
225 const void *ns, const struct kernfs_node *kn)
fd7b9f7b 226{
72392ed0
RV
227 if (hash < kn->hash)
228 return -1;
229 if (hash > kn->hash)
230 return 1;
231 if (ns < kn->ns)
232 return -1;
233 if (ns > kn->ns)
234 return 1;
adc5e8b5 235 return strcmp(name, kn->name);
fd7b9f7b
TH
236}
237
c637b8ac
TH
238static int kernfs_sd_compare(const struct kernfs_node *left,
239 const struct kernfs_node *right)
fd7b9f7b 240{
c637b8ac 241 return kernfs_name_compare(left->hash, left->name, left->ns, right);
fd7b9f7b
TH
242}
243
244/**
c637b8ac 245 * kernfs_link_sibling - link kernfs_node into sibling rbtree
324a56e1 246 * @kn: kernfs_node of interest
fd7b9f7b 247 *
324a56e1 248 * Link @kn into its sibling rbtree which starts from
adc5e8b5 249 * @kn->parent->dir.children.
fd7b9f7b
TH
250 *
251 * Locking:
a797bfc3 252 * mutex_lock(kernfs_mutex)
fd7b9f7b
TH
253 *
254 * RETURNS:
255 * 0 on susccess -EEXIST on failure.
256 */
c637b8ac 257static int kernfs_link_sibling(struct kernfs_node *kn)
fd7b9f7b 258{
adc5e8b5 259 struct rb_node **node = &kn->parent->dir.children.rb_node;
fd7b9f7b
TH
260 struct rb_node *parent = NULL;
261
fd7b9f7b 262 while (*node) {
324a56e1 263 struct kernfs_node *pos;
fd7b9f7b
TH
264 int result;
265
324a56e1 266 pos = rb_to_kn(*node);
fd7b9f7b 267 parent = *node;
c637b8ac 268 result = kernfs_sd_compare(kn, pos);
fd7b9f7b 269 if (result < 0)
adc5e8b5 270 node = &pos->rb.rb_left;
fd7b9f7b 271 else if (result > 0)
adc5e8b5 272 node = &pos->rb.rb_right;
fd7b9f7b
TH
273 else
274 return -EEXIST;
275 }
c1befb88 276
fd7b9f7b 277 /* add new node and rebalance the tree */
adc5e8b5
TH
278 rb_link_node(&kn->rb, parent, node);
279 rb_insert_color(&kn->rb, &kn->parent->dir.children);
c1befb88
JZ
280
281 /* successfully added, account subdir number */
282 if (kernfs_type(kn) == KERNFS_DIR)
283 kn->parent->dir.subdirs++;
284
fd7b9f7b
TH
285 return 0;
286}
287
288/**
c637b8ac 289 * kernfs_unlink_sibling - unlink kernfs_node from sibling rbtree
324a56e1 290 * @kn: kernfs_node of interest
fd7b9f7b 291 *
35beab06
TH
292 * Try to unlink @kn from its sibling rbtree which starts from
293 * kn->parent->dir.children. Returns %true if @kn was actually
294 * removed, %false if @kn wasn't on the rbtree.
fd7b9f7b
TH
295 *
296 * Locking:
a797bfc3 297 * mutex_lock(kernfs_mutex)
fd7b9f7b 298 */
35beab06 299static bool kernfs_unlink_sibling(struct kernfs_node *kn)
fd7b9f7b 300{
35beab06
TH
301 if (RB_EMPTY_NODE(&kn->rb))
302 return false;
303
df23fc39 304 if (kernfs_type(kn) == KERNFS_DIR)
adc5e8b5 305 kn->parent->dir.subdirs--;
fd7b9f7b 306
adc5e8b5 307 rb_erase(&kn->rb, &kn->parent->dir.children);
35beab06
TH
308 RB_CLEAR_NODE(&kn->rb);
309 return true;
fd7b9f7b
TH
310}
311
312/**
c637b8ac 313 * kernfs_get_active - get an active reference to kernfs_node
324a56e1 314 * @kn: kernfs_node to get an active reference to
fd7b9f7b 315 *
324a56e1 316 * Get an active reference of @kn. This function is noop if @kn
fd7b9f7b
TH
317 * is NULL.
318 *
319 * RETURNS:
324a56e1 320 * Pointer to @kn on success, NULL on failure.
fd7b9f7b 321 */
c637b8ac 322struct kernfs_node *kernfs_get_active(struct kernfs_node *kn)
fd7b9f7b 323{
324a56e1 324 if (unlikely(!kn))
fd7b9f7b
TH
325 return NULL;
326
f4b3e631
GKH
327 if (!atomic_inc_unless_negative(&kn->active))
328 return NULL;
895a068a 329
182fd64b 330 if (kernfs_lockdep(kn))
f4b3e631
GKH
331 rwsem_acquire_read(&kn->dep_map, 0, 1, _RET_IP_);
332 return kn;
fd7b9f7b
TH
333}
334
335/**
c637b8ac 336 * kernfs_put_active - put an active reference to kernfs_node
324a56e1 337 * @kn: kernfs_node to put an active reference to
fd7b9f7b 338 *
324a56e1 339 * Put an active reference to @kn. This function is noop if @kn
fd7b9f7b
TH
340 * is NULL.
341 */
c637b8ac 342void kernfs_put_active(struct kernfs_node *kn)
fd7b9f7b 343{
abd54f02 344 struct kernfs_root *root = kernfs_root(kn);
fd7b9f7b
TH
345 int v;
346
324a56e1 347 if (unlikely(!kn))
fd7b9f7b
TH
348 return;
349
182fd64b 350 if (kernfs_lockdep(kn))
324a56e1 351 rwsem_release(&kn->dep_map, 1, _RET_IP_);
adc5e8b5 352 v = atomic_dec_return(&kn->active);
df23fc39 353 if (likely(v != KN_DEACTIVATED_BIAS))
fd7b9f7b
TH
354 return;
355
abd54f02 356 wake_up_all(&root->deactivate_waitq);
fd7b9f7b
TH
357}
358
359/**
81c173cb
TH
360 * kernfs_drain - drain kernfs_node
361 * @kn: kernfs_node to drain
fd7b9f7b 362 *
81c173cb
TH
363 * Drain existing usages and nuke all existing mmaps of @kn. Mutiple
364 * removers may invoke this function concurrently on @kn and all will
365 * return after draining is complete.
fd7b9f7b 366 */
81c173cb 367static void kernfs_drain(struct kernfs_node *kn)
35beab06 368 __releases(&kernfs_mutex) __acquires(&kernfs_mutex)
fd7b9f7b 369{
abd54f02 370 struct kernfs_root *root = kernfs_root(kn);
fd7b9f7b 371
35beab06 372 lockdep_assert_held(&kernfs_mutex);
81c173cb 373 WARN_ON_ONCE(kernfs_active(kn));
ea1c472d 374
35beab06 375 mutex_unlock(&kernfs_mutex);
abd54f02 376
182fd64b 377 if (kernfs_lockdep(kn)) {
35beab06
TH
378 rwsem_acquire(&kn->dep_map, 0, 0, _RET_IP_);
379 if (atomic_read(&kn->active) != KN_DEACTIVATED_BIAS)
380 lock_contended(&kn->dep_map, _RET_IP_);
381 }
abd54f02 382
35beab06 383 /* but everyone should wait for draining */
abd54f02
TH
384 wait_event(root->deactivate_waitq,
385 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS);
fd7b9f7b 386
182fd64b 387 if (kernfs_lockdep(kn)) {
a6607930
TH
388 lock_acquired(&kn->dep_map, _RET_IP_);
389 rwsem_release(&kn->dep_map, 1, _RET_IP_);
390 }
35beab06 391
ccf02aaf
TH
392 kernfs_unmap_bin_file(kn);
393
35beab06 394 mutex_lock(&kernfs_mutex);
fd7b9f7b
TH
395}
396
fd7b9f7b 397/**
324a56e1
TH
398 * kernfs_get - get a reference count on a kernfs_node
399 * @kn: the target kernfs_node
fd7b9f7b 400 */
324a56e1 401void kernfs_get(struct kernfs_node *kn)
fd7b9f7b 402{
324a56e1 403 if (kn) {
adc5e8b5
TH
404 WARN_ON(!atomic_read(&kn->count));
405 atomic_inc(&kn->count);
fd7b9f7b
TH
406 }
407}
408EXPORT_SYMBOL_GPL(kernfs_get);
409
410/**
324a56e1
TH
411 * kernfs_put - put a reference count on a kernfs_node
412 * @kn: the target kernfs_node
fd7b9f7b 413 *
324a56e1 414 * Put a reference count of @kn and destroy it if it reached zero.
fd7b9f7b 415 */
324a56e1 416void kernfs_put(struct kernfs_node *kn)
fd7b9f7b 417{
324a56e1 418 struct kernfs_node *parent;
ba7443bc 419 struct kernfs_root *root;
fd7b9f7b 420
adc5e8b5 421 if (!kn || !atomic_dec_and_test(&kn->count))
fd7b9f7b 422 return;
324a56e1 423 root = kernfs_root(kn);
fd7b9f7b 424 repeat:
81c173cb
TH
425 /*
426 * Moving/renaming is always done while holding reference.
adc5e8b5 427 * kn->parent won't change beneath us.
fd7b9f7b 428 */
adc5e8b5 429 parent = kn->parent;
fd7b9f7b 430
81c173cb
TH
431 WARN_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS,
432 "kernfs_put: %s/%s: released with incorrect active_ref %d\n",
433 parent ? parent->name : "", kn->name, atomic_read(&kn->active));
324a56e1 434
df23fc39 435 if (kernfs_type(kn) == KERNFS_LINK)
adc5e8b5 436 kernfs_put(kn->symlink.target_kn);
dfeb0750
TH
437
438 kfree_const(kn->name);
439
adc5e8b5
TH
440 if (kn->iattr) {
441 if (kn->iattr->ia_secdata)
442 security_release_secctx(kn->iattr->ia_secdata,
443 kn->iattr->ia_secdata_len);
444 simple_xattrs_free(&kn->iattr->xattrs);
2322392b 445 }
adc5e8b5
TH
446 kfree(kn->iattr);
447 ida_simple_remove(&root->ino_ida, kn->ino);
a797bfc3 448 kmem_cache_free(kernfs_node_cache, kn);
fd7b9f7b 449
324a56e1
TH
450 kn = parent;
451 if (kn) {
adc5e8b5 452 if (atomic_dec_and_test(&kn->count))
ba7443bc
TH
453 goto repeat;
454 } else {
324a56e1 455 /* just released the root kn, free @root too */
bc755553 456 ida_destroy(&root->ino_ida);
ba7443bc
TH
457 kfree(root);
458 }
fd7b9f7b
TH
459}
460EXPORT_SYMBOL_GPL(kernfs_put);
461
c637b8ac 462static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags)
fd7b9f7b 463{
324a56e1 464 struct kernfs_node *kn;
fd7b9f7b
TH
465
466 if (flags & LOOKUP_RCU)
467 return -ECHILD;
468
19bbb926 469 /* Always perform fresh lookup for negatives */
2b0143b5 470 if (d_really_is_negative(dentry))
19bbb926
TH
471 goto out_bad_unlocked;
472
324a56e1 473 kn = dentry->d_fsdata;
a797bfc3 474 mutex_lock(&kernfs_mutex);
fd7b9f7b 475
81c173cb
TH
476 /* The kernfs node has been deactivated */
477 if (!kernfs_active(kn))
fd7b9f7b
TH
478 goto out_bad;
479
c637b8ac 480 /* The kernfs node has been moved? */
adc5e8b5 481 if (dentry->d_parent->d_fsdata != kn->parent)
fd7b9f7b
TH
482 goto out_bad;
483
c637b8ac 484 /* The kernfs node has been renamed */
adc5e8b5 485 if (strcmp(dentry->d_name.name, kn->name) != 0)
fd7b9f7b
TH
486 goto out_bad;
487
c637b8ac 488 /* The kernfs node has been moved to a different namespace */
adc5e8b5 489 if (kn->parent && kernfs_ns_enabled(kn->parent) &&
c525aadd 490 kernfs_info(dentry->d_sb)->ns != kn->ns)
fd7b9f7b
TH
491 goto out_bad;
492
a797bfc3 493 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
494 return 1;
495out_bad:
a797bfc3 496 mutex_unlock(&kernfs_mutex);
19bbb926 497out_bad_unlocked:
fd7b9f7b
TH
498 return 0;
499}
500
c637b8ac 501static void kernfs_dop_release(struct dentry *dentry)
fd7b9f7b
TH
502{
503 kernfs_put(dentry->d_fsdata);
504}
505
a797bfc3 506const struct dentry_operations kernfs_dops = {
c637b8ac 507 .d_revalidate = kernfs_dop_revalidate,
c637b8ac 508 .d_release = kernfs_dop_release,
fd7b9f7b
TH
509};
510
0c23b225
TH
511/**
512 * kernfs_node_from_dentry - determine kernfs_node associated with a dentry
513 * @dentry: the dentry in question
514 *
515 * Return the kernfs_node associated with @dentry. If @dentry is not a
516 * kernfs one, %NULL is returned.
517 *
518 * While the returned kernfs_node will stay accessible as long as @dentry
519 * is accessible, the returned node can be in any state and the caller is
520 * fully responsible for determining what's accessible.
521 */
522struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
523{
f41c5934 524 if (dentry->d_sb->s_op == &kernfs_sops)
0c23b225
TH
525 return dentry->d_fsdata;
526 return NULL;
527}
528
db4aad20
TH
529static struct kernfs_node *__kernfs_new_node(struct kernfs_root *root,
530 const char *name, umode_t mode,
531 unsigned flags)
fd7b9f7b 532{
324a56e1 533 struct kernfs_node *kn;
bc755553 534 int ret;
fd7b9f7b 535
dfeb0750
TH
536 name = kstrdup_const(name, GFP_KERNEL);
537 if (!name)
538 return NULL;
fd7b9f7b 539
a797bfc3 540 kn = kmem_cache_zalloc(kernfs_node_cache, GFP_KERNEL);
324a56e1 541 if (!kn)
fd7b9f7b
TH
542 goto err_out1;
543
b2a209ff 544 ret = ida_simple_get(&root->ino_ida, 1, 0, GFP_KERNEL);
bc755553 545 if (ret < 0)
fd7b9f7b 546 goto err_out2;
adc5e8b5 547 kn->ino = ret;
fd7b9f7b 548
adc5e8b5 549 atomic_set(&kn->count, 1);
81c173cb 550 atomic_set(&kn->active, KN_DEACTIVATED_BIAS);
35beab06 551 RB_CLEAR_NODE(&kn->rb);
fd7b9f7b 552
adc5e8b5
TH
553 kn->name = name;
554 kn->mode = mode;
81c173cb 555 kn->flags = flags;
fd7b9f7b 556
324a56e1 557 return kn;
fd7b9f7b
TH
558
559 err_out2:
a797bfc3 560 kmem_cache_free(kernfs_node_cache, kn);
fd7b9f7b 561 err_out1:
dfeb0750 562 kfree_const(name);
fd7b9f7b
TH
563 return NULL;
564}
565
db4aad20
TH
566struct kernfs_node *kernfs_new_node(struct kernfs_node *parent,
567 const char *name, umode_t mode,
568 unsigned flags)
569{
570 struct kernfs_node *kn;
571
572 kn = __kernfs_new_node(kernfs_root(parent), name, mode, flags);
573 if (kn) {
574 kernfs_get(parent);
575 kn->parent = parent;
576 }
577 return kn;
578}
579
fd7b9f7b 580/**
c637b8ac 581 * kernfs_add_one - add kernfs_node to parent without warning
324a56e1 582 * @kn: kernfs_node to be added
fd7b9f7b 583 *
db4aad20
TH
584 * The caller must already have initialized @kn->parent. This
585 * function increments nlink of the parent's inode if @kn is a
586 * directory and link into the children list of the parent.
fd7b9f7b 587 *
fd7b9f7b
TH
588 * RETURNS:
589 * 0 on success, -EEXIST if entry with the given name already
590 * exists.
591 */
988cd7af 592int kernfs_add_one(struct kernfs_node *kn)
fd7b9f7b 593{
db4aad20 594 struct kernfs_node *parent = kn->parent;
c525aadd 595 struct kernfs_iattrs *ps_iattr;
988cd7af 596 bool has_ns;
fd7b9f7b
TH
597 int ret;
598
988cd7af
TH
599 mutex_lock(&kernfs_mutex);
600
601 ret = -EINVAL;
602 has_ns = kernfs_ns_enabled(parent);
603 if (WARN(has_ns != (bool)kn->ns, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
604 has_ns ? "required" : "invalid", parent->name, kn->name))
605 goto out_unlock;
fd7b9f7b 606
df23fc39 607 if (kernfs_type(parent) != KERNFS_DIR)
988cd7af 608 goto out_unlock;
fd7b9f7b 609
988cd7af 610 ret = -ENOENT;
ea015218
EB
611 if (parent->flags & KERNFS_EMPTY_DIR)
612 goto out_unlock;
613
d35258ef 614 if ((parent->flags & KERNFS_ACTIVATED) && !kernfs_active(parent))
988cd7af 615 goto out_unlock;
798c75a0 616
c637b8ac 617 kn->hash = kernfs_name_hash(kn->name, kn->ns);
fd7b9f7b 618
c637b8ac 619 ret = kernfs_link_sibling(kn);
fd7b9f7b 620 if (ret)
988cd7af 621 goto out_unlock;
fd7b9f7b
TH
622
623 /* Update timestamps on the parent */
adc5e8b5 624 ps_iattr = parent->iattr;
fd7b9f7b
TH
625 if (ps_iattr) {
626 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
627 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
628 }
629
d35258ef
TH
630 mutex_unlock(&kernfs_mutex);
631
632 /*
633 * Activate the new node unless CREATE_DEACTIVATED is requested.
634 * If not activated here, the kernfs user is responsible for
635 * activating the node with kernfs_activate(). A node which hasn't
636 * been activated is not visible to userland and its removal won't
637 * trigger deactivation.
638 */
639 if (!(kernfs_root(kn)->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
640 kernfs_activate(kn);
641 return 0;
642
988cd7af 643out_unlock:
a797bfc3 644 mutex_unlock(&kernfs_mutex);
988cd7af 645 return ret;
fd7b9f7b
TH
646}
647
648/**
324a56e1
TH
649 * kernfs_find_ns - find kernfs_node with the given name
650 * @parent: kernfs_node to search under
fd7b9f7b
TH
651 * @name: name to look for
652 * @ns: the namespace tag to use
653 *
324a56e1
TH
654 * Look for kernfs_node with name @name under @parent. Returns pointer to
655 * the found kernfs_node on success, %NULL on failure.
fd7b9f7b 656 */
324a56e1
TH
657static struct kernfs_node *kernfs_find_ns(struct kernfs_node *parent,
658 const unsigned char *name,
659 const void *ns)
fd7b9f7b 660{
adc5e8b5 661 struct rb_node *node = parent->dir.children.rb_node;
ac9bba03 662 bool has_ns = kernfs_ns_enabled(parent);
fd7b9f7b
TH
663 unsigned int hash;
664
a797bfc3 665 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b
TH
666
667 if (has_ns != (bool)ns) {
c637b8ac 668 WARN(1, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
adc5e8b5 669 has_ns ? "required" : "invalid", parent->name, name);
fd7b9f7b
TH
670 return NULL;
671 }
672
c637b8ac 673 hash = kernfs_name_hash(name, ns);
fd7b9f7b 674 while (node) {
324a56e1 675 struct kernfs_node *kn;
fd7b9f7b
TH
676 int result;
677
324a56e1 678 kn = rb_to_kn(node);
c637b8ac 679 result = kernfs_name_compare(hash, name, ns, kn);
fd7b9f7b
TH
680 if (result < 0)
681 node = node->rb_left;
682 else if (result > 0)
683 node = node->rb_right;
684 else
324a56e1 685 return kn;
fd7b9f7b
TH
686 }
687 return NULL;
688}
689
bd96f76a
TH
690static struct kernfs_node *kernfs_walk_ns(struct kernfs_node *parent,
691 const unsigned char *path,
692 const void *ns)
693{
e56ed358
TH
694 size_t len;
695 char *p, *name;
bd96f76a
TH
696
697 lockdep_assert_held(&kernfs_mutex);
698
e56ed358
TH
699 /* grab kernfs_rename_lock to piggy back on kernfs_pr_cont_buf */
700 spin_lock_irq(&kernfs_rename_lock);
701
702 len = strlcpy(kernfs_pr_cont_buf, path, sizeof(kernfs_pr_cont_buf));
703
704 if (len >= sizeof(kernfs_pr_cont_buf)) {
705 spin_unlock_irq(&kernfs_rename_lock);
bd96f76a 706 return NULL;
e56ed358
TH
707 }
708
709 p = kernfs_pr_cont_buf;
bd96f76a
TH
710
711 while ((name = strsep(&p, "/")) && parent) {
712 if (*name == '\0')
713 continue;
714 parent = kernfs_find_ns(parent, name, ns);
715 }
716
e56ed358
TH
717 spin_unlock_irq(&kernfs_rename_lock);
718
bd96f76a
TH
719 return parent;
720}
721
fd7b9f7b 722/**
324a56e1
TH
723 * kernfs_find_and_get_ns - find and get kernfs_node with the given name
724 * @parent: kernfs_node to search under
fd7b9f7b
TH
725 * @name: name to look for
726 * @ns: the namespace tag to use
727 *
324a56e1 728 * Look for kernfs_node with name @name under @parent and get a reference
fd7b9f7b 729 * if found. This function may sleep and returns pointer to the found
324a56e1 730 * kernfs_node on success, %NULL on failure.
fd7b9f7b 731 */
324a56e1
TH
732struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
733 const char *name, const void *ns)
fd7b9f7b 734{
324a56e1 735 struct kernfs_node *kn;
fd7b9f7b 736
a797bfc3 737 mutex_lock(&kernfs_mutex);
324a56e1
TH
738 kn = kernfs_find_ns(parent, name, ns);
739 kernfs_get(kn);
a797bfc3 740 mutex_unlock(&kernfs_mutex);
fd7b9f7b 741
324a56e1 742 return kn;
fd7b9f7b
TH
743}
744EXPORT_SYMBOL_GPL(kernfs_find_and_get_ns);
745
bd96f76a
TH
746/**
747 * kernfs_walk_and_get_ns - find and get kernfs_node with the given path
748 * @parent: kernfs_node to search under
749 * @path: path to look for
750 * @ns: the namespace tag to use
751 *
752 * Look for kernfs_node with path @path under @parent and get a reference
753 * if found. This function may sleep and returns pointer to the found
754 * kernfs_node on success, %NULL on failure.
755 */
756struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
757 const char *path, const void *ns)
758{
759 struct kernfs_node *kn;
760
761 mutex_lock(&kernfs_mutex);
762 kn = kernfs_walk_ns(parent, path, ns);
763 kernfs_get(kn);
764 mutex_unlock(&kernfs_mutex);
765
766 return kn;
767}
768
ba7443bc
TH
769/**
770 * kernfs_create_root - create a new kernfs hierarchy
90c07c89 771 * @scops: optional syscall operations for the hierarchy
d35258ef 772 * @flags: KERNFS_ROOT_* flags
ba7443bc
TH
773 * @priv: opaque data associated with the new directory
774 *
775 * Returns the root of the new hierarchy on success, ERR_PTR() value on
776 * failure.
777 */
90c07c89 778struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 779 unsigned int flags, void *priv)
ba7443bc
TH
780{
781 struct kernfs_root *root;
324a56e1 782 struct kernfs_node *kn;
ba7443bc
TH
783
784 root = kzalloc(sizeof(*root), GFP_KERNEL);
785 if (!root)
786 return ERR_PTR(-ENOMEM);
787
bc755553 788 ida_init(&root->ino_ida);
7d568a83 789 INIT_LIST_HEAD(&root->supers);
bc755553 790
db4aad20
TH
791 kn = __kernfs_new_node(root, "", S_IFDIR | S_IRUGO | S_IXUGO,
792 KERNFS_DIR);
324a56e1 793 if (!kn) {
bc755553 794 ida_destroy(&root->ino_ida);
ba7443bc
TH
795 kfree(root);
796 return ERR_PTR(-ENOMEM);
797 }
798
324a56e1 799 kn->priv = priv;
adc5e8b5 800 kn->dir.root = root;
ba7443bc 801
90c07c89 802 root->syscall_ops = scops;
d35258ef 803 root->flags = flags;
324a56e1 804 root->kn = kn;
abd54f02 805 init_waitqueue_head(&root->deactivate_waitq);
ba7443bc 806
d35258ef
TH
807 if (!(root->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
808 kernfs_activate(kn);
809
ba7443bc
TH
810 return root;
811}
812
813/**
814 * kernfs_destroy_root - destroy a kernfs hierarchy
815 * @root: root of the hierarchy to destroy
816 *
817 * Destroy the hierarchy anchored at @root by removing all existing
818 * directories and destroying @root.
819 */
820void kernfs_destroy_root(struct kernfs_root *root)
821{
324a56e1 822 kernfs_remove(root->kn); /* will also free @root */
ba7443bc
TH
823}
824
fd7b9f7b
TH
825/**
826 * kernfs_create_dir_ns - create a directory
827 * @parent: parent in which to create a new directory
828 * @name: name of the new directory
bb8b9d09 829 * @mode: mode of the new directory
fd7b9f7b
TH
830 * @priv: opaque data associated with the new directory
831 * @ns: optional namespace tag of the directory
832 *
833 * Returns the created node on success, ERR_PTR() value on failure.
834 */
324a56e1 835struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09
TH
836 const char *name, umode_t mode,
837 void *priv, const void *ns)
fd7b9f7b 838{
324a56e1 839 struct kernfs_node *kn;
fd7b9f7b
TH
840 int rc;
841
842 /* allocate */
db4aad20 843 kn = kernfs_new_node(parent, name, mode | S_IFDIR, KERNFS_DIR);
324a56e1 844 if (!kn)
fd7b9f7b
TH
845 return ERR_PTR(-ENOMEM);
846
adc5e8b5
TH
847 kn->dir.root = parent->dir.root;
848 kn->ns = ns;
324a56e1 849 kn->priv = priv;
fd7b9f7b
TH
850
851 /* link in */
988cd7af 852 rc = kernfs_add_one(kn);
fd7b9f7b 853 if (!rc)
324a56e1 854 return kn;
fd7b9f7b 855
324a56e1 856 kernfs_put(kn);
fd7b9f7b
TH
857 return ERR_PTR(rc);
858}
859
ea015218
EB
860/**
861 * kernfs_create_empty_dir - create an always empty directory
862 * @parent: parent in which to create a new directory
863 * @name: name of the new directory
864 *
865 * Returns the created node on success, ERR_PTR() value on failure.
866 */
867struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
868 const char *name)
869{
870 struct kernfs_node *kn;
871 int rc;
872
873 /* allocate */
874 kn = kernfs_new_node(parent, name, S_IRUGO|S_IXUGO|S_IFDIR, KERNFS_DIR);
875 if (!kn)
876 return ERR_PTR(-ENOMEM);
877
878 kn->flags |= KERNFS_EMPTY_DIR;
879 kn->dir.root = parent->dir.root;
880 kn->ns = NULL;
881 kn->priv = NULL;
882
883 /* link in */
884 rc = kernfs_add_one(kn);
885 if (!rc)
886 return kn;
887
888 kernfs_put(kn);
889 return ERR_PTR(rc);
890}
891
c637b8ac
TH
892static struct dentry *kernfs_iop_lookup(struct inode *dir,
893 struct dentry *dentry,
894 unsigned int flags)
fd7b9f7b 895{
19bbb926 896 struct dentry *ret;
324a56e1
TH
897 struct kernfs_node *parent = dentry->d_parent->d_fsdata;
898 struct kernfs_node *kn;
fd7b9f7b
TH
899 struct inode *inode;
900 const void *ns = NULL;
901
a797bfc3 902 mutex_lock(&kernfs_mutex);
fd7b9f7b 903
324a56e1 904 if (kernfs_ns_enabled(parent))
c525aadd 905 ns = kernfs_info(dir->i_sb)->ns;
fd7b9f7b 906
324a56e1 907 kn = kernfs_find_ns(parent, dentry->d_name.name, ns);
fd7b9f7b
TH
908
909 /* no such entry */
b9c9dad0 910 if (!kn || !kernfs_active(kn)) {
19bbb926 911 ret = NULL;
fd7b9f7b
TH
912 goto out_unlock;
913 }
324a56e1
TH
914 kernfs_get(kn);
915 dentry->d_fsdata = kn;
fd7b9f7b
TH
916
917 /* attach dentry and inode */
c637b8ac 918 inode = kernfs_get_inode(dir->i_sb, kn);
fd7b9f7b
TH
919 if (!inode) {
920 ret = ERR_PTR(-ENOMEM);
921 goto out_unlock;
922 }
923
924 /* instantiate and hash dentry */
41d28bca 925 ret = d_splice_alias(inode, dentry);
fd7b9f7b 926 out_unlock:
a797bfc3 927 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
928 return ret;
929}
930
80b9bbef
TH
931static int kernfs_iop_mkdir(struct inode *dir, struct dentry *dentry,
932 umode_t mode)
933{
934 struct kernfs_node *parent = dir->i_private;
90c07c89 935 struct kernfs_syscall_ops *scops = kernfs_root(parent)->syscall_ops;
07c7530d 936 int ret;
80b9bbef 937
90c07c89 938 if (!scops || !scops->mkdir)
80b9bbef
TH
939 return -EPERM;
940
07c7530d
TH
941 if (!kernfs_get_active(parent))
942 return -ENODEV;
943
90c07c89 944 ret = scops->mkdir(parent, dentry->d_name.name, mode);
07c7530d
TH
945
946 kernfs_put_active(parent);
947 return ret;
80b9bbef
TH
948}
949
950static int kernfs_iop_rmdir(struct inode *dir, struct dentry *dentry)
951{
952 struct kernfs_node *kn = dentry->d_fsdata;
90c07c89 953 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 954 int ret;
80b9bbef 955
90c07c89 956 if (!scops || !scops->rmdir)
80b9bbef
TH
957 return -EPERM;
958
07c7530d
TH
959 if (!kernfs_get_active(kn))
960 return -ENODEV;
961
90c07c89 962 ret = scops->rmdir(kn);
07c7530d
TH
963
964 kernfs_put_active(kn);
965 return ret;
80b9bbef
TH
966}
967
968static int kernfs_iop_rename(struct inode *old_dir, struct dentry *old_dentry,
969 struct inode *new_dir, struct dentry *new_dentry)
970{
971 struct kernfs_node *kn = old_dentry->d_fsdata;
972 struct kernfs_node *new_parent = new_dir->i_private;
90c07c89 973 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 974 int ret;
80b9bbef 975
90c07c89 976 if (!scops || !scops->rename)
80b9bbef
TH
977 return -EPERM;
978
07c7530d
TH
979 if (!kernfs_get_active(kn))
980 return -ENODEV;
981
982 if (!kernfs_get_active(new_parent)) {
983 kernfs_put_active(kn);
984 return -ENODEV;
985 }
986
90c07c89 987 ret = scops->rename(kn, new_parent, new_dentry->d_name.name);
07c7530d
TH
988
989 kernfs_put_active(new_parent);
990 kernfs_put_active(kn);
991 return ret;
80b9bbef
TH
992}
993
a797bfc3 994const struct inode_operations kernfs_dir_iops = {
c637b8ac
TH
995 .lookup = kernfs_iop_lookup,
996 .permission = kernfs_iop_permission,
997 .setattr = kernfs_iop_setattr,
998 .getattr = kernfs_iop_getattr,
999 .setxattr = kernfs_iop_setxattr,
1000 .removexattr = kernfs_iop_removexattr,
1001 .getxattr = kernfs_iop_getxattr,
1002 .listxattr = kernfs_iop_listxattr,
80b9bbef
TH
1003
1004 .mkdir = kernfs_iop_mkdir,
1005 .rmdir = kernfs_iop_rmdir,
1006 .rename = kernfs_iop_rename,
fd7b9f7b
TH
1007};
1008
c637b8ac 1009static struct kernfs_node *kernfs_leftmost_descendant(struct kernfs_node *pos)
fd7b9f7b 1010{
324a56e1 1011 struct kernfs_node *last;
fd7b9f7b
TH
1012
1013 while (true) {
1014 struct rb_node *rbn;
1015
1016 last = pos;
1017
df23fc39 1018 if (kernfs_type(pos) != KERNFS_DIR)
fd7b9f7b
TH
1019 break;
1020
adc5e8b5 1021 rbn = rb_first(&pos->dir.children);
fd7b9f7b
TH
1022 if (!rbn)
1023 break;
1024
324a56e1 1025 pos = rb_to_kn(rbn);
fd7b9f7b
TH
1026 }
1027
1028 return last;
1029}
1030
1031/**
c637b8ac 1032 * kernfs_next_descendant_post - find the next descendant for post-order walk
fd7b9f7b 1033 * @pos: the current position (%NULL to initiate traversal)
324a56e1 1034 * @root: kernfs_node whose descendants to walk
fd7b9f7b
TH
1035 *
1036 * Find the next descendant to visit for post-order traversal of @root's
1037 * descendants. @root is included in the iteration and the last node to be
1038 * visited.
1039 */
c637b8ac
TH
1040static struct kernfs_node *kernfs_next_descendant_post(struct kernfs_node *pos,
1041 struct kernfs_node *root)
fd7b9f7b
TH
1042{
1043 struct rb_node *rbn;
1044
a797bfc3 1045 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b
TH
1046
1047 /* if first iteration, visit leftmost descendant which may be root */
1048 if (!pos)
c637b8ac 1049 return kernfs_leftmost_descendant(root);
fd7b9f7b
TH
1050
1051 /* if we visited @root, we're done */
1052 if (pos == root)
1053 return NULL;
1054
1055 /* if there's an unvisited sibling, visit its leftmost descendant */
adc5e8b5 1056 rbn = rb_next(&pos->rb);
fd7b9f7b 1057 if (rbn)
c637b8ac 1058 return kernfs_leftmost_descendant(rb_to_kn(rbn));
fd7b9f7b
TH
1059
1060 /* no sibling left, visit parent */
adc5e8b5 1061 return pos->parent;
fd7b9f7b
TH
1062}
1063
d35258ef
TH
1064/**
1065 * kernfs_activate - activate a node which started deactivated
1066 * @kn: kernfs_node whose subtree is to be activated
1067 *
1068 * If the root has KERNFS_ROOT_CREATE_DEACTIVATED set, a newly created node
1069 * needs to be explicitly activated. A node which hasn't been activated
1070 * isn't visible to userland and deactivation is skipped during its
1071 * removal. This is useful to construct atomic init sequences where
1072 * creation of multiple nodes should either succeed or fail atomically.
1073 *
1074 * The caller is responsible for ensuring that this function is not called
1075 * after kernfs_remove*() is invoked on @kn.
1076 */
1077void kernfs_activate(struct kernfs_node *kn)
1078{
1079 struct kernfs_node *pos;
1080
1081 mutex_lock(&kernfs_mutex);
1082
1083 pos = NULL;
1084 while ((pos = kernfs_next_descendant_post(pos, kn))) {
1085 if (!pos || (pos->flags & KERNFS_ACTIVATED))
1086 continue;
1087
1088 WARN_ON_ONCE(pos->parent && RB_EMPTY_NODE(&pos->rb));
1089 WARN_ON_ONCE(atomic_read(&pos->active) != KN_DEACTIVATED_BIAS);
1090
1091 atomic_sub(KN_DEACTIVATED_BIAS, &pos->active);
1092 pos->flags |= KERNFS_ACTIVATED;
1093 }
1094
1095 mutex_unlock(&kernfs_mutex);
1096}
1097
988cd7af 1098static void __kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 1099{
35beab06
TH
1100 struct kernfs_node *pos;
1101
1102 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b 1103
6b0afc2a
TH
1104 /*
1105 * Short-circuit if non-root @kn has already finished removal.
1106 * This is for kernfs_remove_self() which plays with active ref
1107 * after removal.
1108 */
1109 if (!kn || (kn->parent && RB_EMPTY_NODE(&kn->rb)))
ce9b499c
GKH
1110 return;
1111
c637b8ac 1112 pr_debug("kernfs %s: removing\n", kn->name);
fd7b9f7b 1113
81c173cb 1114 /* prevent any new usage under @kn by deactivating all nodes */
35beab06
TH
1115 pos = NULL;
1116 while ((pos = kernfs_next_descendant_post(pos, kn)))
81c173cb
TH
1117 if (kernfs_active(pos))
1118 atomic_add(KN_DEACTIVATED_BIAS, &pos->active);
35beab06
TH
1119
1120 /* deactivate and unlink the subtree node-by-node */
fd7b9f7b 1121 do {
35beab06
TH
1122 pos = kernfs_leftmost_descendant(kn);
1123
1124 /*
81c173cb
TH
1125 * kernfs_drain() drops kernfs_mutex temporarily and @pos's
1126 * base ref could have been put by someone else by the time
1127 * the function returns. Make sure it doesn't go away
1128 * underneath us.
35beab06
TH
1129 */
1130 kernfs_get(pos);
1131
d35258ef
TH
1132 /*
1133 * Drain iff @kn was activated. This avoids draining and
1134 * its lockdep annotations for nodes which have never been
1135 * activated and allows embedding kernfs_remove() in create
1136 * error paths without worrying about draining.
1137 */
1138 if (kn->flags & KERNFS_ACTIVATED)
1139 kernfs_drain(pos);
1140 else
1141 WARN_ON_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS);
35beab06
TH
1142
1143 /*
1144 * kernfs_unlink_sibling() succeeds once per node. Use it
1145 * to decide who's responsible for cleanups.
1146 */
1147 if (!pos->parent || kernfs_unlink_sibling(pos)) {
1148 struct kernfs_iattrs *ps_iattr =
1149 pos->parent ? pos->parent->iattr : NULL;
1150
1151 /* update timestamps on the parent */
1152 if (ps_iattr) {
1153 ps_iattr->ia_iattr.ia_ctime = CURRENT_TIME;
1154 ps_iattr->ia_iattr.ia_mtime = CURRENT_TIME;
1155 }
1156
988cd7af 1157 kernfs_put(pos);
35beab06
TH
1158 }
1159
1160 kernfs_put(pos);
1161 } while (pos != kn);
fd7b9f7b
TH
1162}
1163
1164/**
324a56e1
TH
1165 * kernfs_remove - remove a kernfs_node recursively
1166 * @kn: the kernfs_node to remove
fd7b9f7b 1167 *
324a56e1 1168 * Remove @kn along with all its subdirectories and files.
fd7b9f7b 1169 */
324a56e1 1170void kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 1171{
988cd7af
TH
1172 mutex_lock(&kernfs_mutex);
1173 __kernfs_remove(kn);
1174 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1175}
1176
6b0afc2a
TH
1177/**
1178 * kernfs_break_active_protection - break out of active protection
1179 * @kn: the self kernfs_node
1180 *
1181 * The caller must be running off of a kernfs operation which is invoked
1182 * with an active reference - e.g. one of kernfs_ops. Each invocation of
1183 * this function must also be matched with an invocation of
1184 * kernfs_unbreak_active_protection().
1185 *
1186 * This function releases the active reference of @kn the caller is
1187 * holding. Once this function is called, @kn may be removed at any point
1188 * and the caller is solely responsible for ensuring that the objects it
1189 * dereferences are accessible.
1190 */
1191void kernfs_break_active_protection(struct kernfs_node *kn)
1192{
1193 /*
1194 * Take out ourself out of the active ref dependency chain. If
1195 * we're called without an active ref, lockdep will complain.
1196 */
1197 kernfs_put_active(kn);
1198}
1199
1200/**
1201 * kernfs_unbreak_active_protection - undo kernfs_break_active_protection()
1202 * @kn: the self kernfs_node
1203 *
1204 * If kernfs_break_active_protection() was called, this function must be
1205 * invoked before finishing the kernfs operation. Note that while this
1206 * function restores the active reference, it doesn't and can't actually
1207 * restore the active protection - @kn may already or be in the process of
1208 * being removed. Once kernfs_break_active_protection() is invoked, that
1209 * protection is irreversibly gone for the kernfs operation instance.
1210 *
1211 * While this function may be called at any point after
1212 * kernfs_break_active_protection() is invoked, its most useful location
1213 * would be right before the enclosing kernfs operation returns.
1214 */
1215void kernfs_unbreak_active_protection(struct kernfs_node *kn)
1216{
1217 /*
1218 * @kn->active could be in any state; however, the increment we do
1219 * here will be undone as soon as the enclosing kernfs operation
1220 * finishes and this temporary bump can't break anything. If @kn
1221 * is alive, nothing changes. If @kn is being deactivated, the
1222 * soon-to-follow put will either finish deactivation or restore
1223 * deactivated state. If @kn is already removed, the temporary
1224 * bump is guaranteed to be gone before @kn is released.
1225 */
1226 atomic_inc(&kn->active);
1227 if (kernfs_lockdep(kn))
1228 rwsem_acquire(&kn->dep_map, 0, 1, _RET_IP_);
1229}
1230
1231/**
1232 * kernfs_remove_self - remove a kernfs_node from its own method
1233 * @kn: the self kernfs_node to remove
1234 *
1235 * The caller must be running off of a kernfs operation which is invoked
1236 * with an active reference - e.g. one of kernfs_ops. This can be used to
1237 * implement a file operation which deletes itself.
1238 *
1239 * For example, the "delete" file for a sysfs device directory can be
1240 * implemented by invoking kernfs_remove_self() on the "delete" file
1241 * itself. This function breaks the circular dependency of trying to
1242 * deactivate self while holding an active ref itself. It isn't necessary
1243 * to modify the usual removal path to use kernfs_remove_self(). The
1244 * "delete" implementation can simply invoke kernfs_remove_self() on self
1245 * before proceeding with the usual removal path. kernfs will ignore later
1246 * kernfs_remove() on self.
1247 *
1248 * kernfs_remove_self() can be called multiple times concurrently on the
1249 * same kernfs_node. Only the first one actually performs removal and
1250 * returns %true. All others will wait until the kernfs operation which
1251 * won self-removal finishes and return %false. Note that the losers wait
1252 * for the completion of not only the winning kernfs_remove_self() but also
1253 * the whole kernfs_ops which won the arbitration. This can be used to
1254 * guarantee, for example, all concurrent writes to a "delete" file to
1255 * finish only after the whole operation is complete.
1256 */
1257bool kernfs_remove_self(struct kernfs_node *kn)
1258{
1259 bool ret;
1260
1261 mutex_lock(&kernfs_mutex);
1262 kernfs_break_active_protection(kn);
1263
1264 /*
1265 * SUICIDAL is used to arbitrate among competing invocations. Only
1266 * the first one will actually perform removal. When the removal
1267 * is complete, SUICIDED is set and the active ref is restored
1268 * while holding kernfs_mutex. The ones which lost arbitration
1269 * waits for SUICDED && drained which can happen only after the
1270 * enclosing kernfs operation which executed the winning instance
1271 * of kernfs_remove_self() finished.
1272 */
1273 if (!(kn->flags & KERNFS_SUICIDAL)) {
1274 kn->flags |= KERNFS_SUICIDAL;
1275 __kernfs_remove(kn);
1276 kn->flags |= KERNFS_SUICIDED;
1277 ret = true;
1278 } else {
1279 wait_queue_head_t *waitq = &kernfs_root(kn)->deactivate_waitq;
1280 DEFINE_WAIT(wait);
1281
1282 while (true) {
1283 prepare_to_wait(waitq, &wait, TASK_UNINTERRUPTIBLE);
1284
1285 if ((kn->flags & KERNFS_SUICIDED) &&
1286 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS)
1287 break;
1288
1289 mutex_unlock(&kernfs_mutex);
1290 schedule();
1291 mutex_lock(&kernfs_mutex);
1292 }
1293 finish_wait(waitq, &wait);
1294 WARN_ON_ONCE(!RB_EMPTY_NODE(&kn->rb));
1295 ret = false;
1296 }
1297
1298 /*
1299 * This must be done while holding kernfs_mutex; otherwise, waiting
1300 * for SUICIDED && deactivated could finish prematurely.
1301 */
1302 kernfs_unbreak_active_protection(kn);
1303
1304 mutex_unlock(&kernfs_mutex);
1305 return ret;
1306}
1307
fd7b9f7b 1308/**
324a56e1
TH
1309 * kernfs_remove_by_name_ns - find a kernfs_node by name and remove it
1310 * @parent: parent of the target
1311 * @name: name of the kernfs_node to remove
1312 * @ns: namespace tag of the kernfs_node to remove
fd7b9f7b 1313 *
324a56e1
TH
1314 * Look for the kernfs_node with @name and @ns under @parent and remove it.
1315 * Returns 0 on success, -ENOENT if such entry doesn't exist.
fd7b9f7b 1316 */
324a56e1 1317int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
fd7b9f7b
TH
1318 const void *ns)
1319{
324a56e1 1320 struct kernfs_node *kn;
fd7b9f7b 1321
324a56e1 1322 if (!parent) {
c637b8ac 1323 WARN(1, KERN_WARNING "kernfs: can not remove '%s', no directory\n",
fd7b9f7b
TH
1324 name);
1325 return -ENOENT;
1326 }
1327
988cd7af 1328 mutex_lock(&kernfs_mutex);
fd7b9f7b 1329
324a56e1
TH
1330 kn = kernfs_find_ns(parent, name, ns);
1331 if (kn)
988cd7af 1332 __kernfs_remove(kn);
fd7b9f7b 1333
988cd7af 1334 mutex_unlock(&kernfs_mutex);
fd7b9f7b 1335
324a56e1 1336 if (kn)
fd7b9f7b
TH
1337 return 0;
1338 else
1339 return -ENOENT;
1340}
1341
1342/**
1343 * kernfs_rename_ns - move and rename a kernfs_node
324a56e1 1344 * @kn: target node
fd7b9f7b
TH
1345 * @new_parent: new parent to put @sd under
1346 * @new_name: new name
1347 * @new_ns: new namespace tag
1348 */
324a56e1 1349int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
fd7b9f7b
TH
1350 const char *new_name, const void *new_ns)
1351{
3eef34ad
TH
1352 struct kernfs_node *old_parent;
1353 const char *old_name = NULL;
fd7b9f7b
TH
1354 int error;
1355
3eef34ad
TH
1356 /* can't move or rename root */
1357 if (!kn->parent)
1358 return -EINVAL;
1359
798c75a0
GKH
1360 mutex_lock(&kernfs_mutex);
1361
d0ae3d43 1362 error = -ENOENT;
ea015218
EB
1363 if (!kernfs_active(kn) || !kernfs_active(new_parent) ||
1364 (new_parent->flags & KERNFS_EMPTY_DIR))
d0ae3d43
TH
1365 goto out;
1366
fd7b9f7b 1367 error = 0;
adc5e8b5
TH
1368 if ((kn->parent == new_parent) && (kn->ns == new_ns) &&
1369 (strcmp(kn->name, new_name) == 0))
798c75a0 1370 goto out; /* nothing to rename */
fd7b9f7b
TH
1371
1372 error = -EEXIST;
1373 if (kernfs_find_ns(new_parent, new_name, new_ns))
798c75a0 1374 goto out;
fd7b9f7b 1375
324a56e1 1376 /* rename kernfs_node */
adc5e8b5 1377 if (strcmp(kn->name, new_name) != 0) {
fd7b9f7b 1378 error = -ENOMEM;
75287a67 1379 new_name = kstrdup_const(new_name, GFP_KERNEL);
fd7b9f7b 1380 if (!new_name)
798c75a0 1381 goto out;
3eef34ad
TH
1382 } else {
1383 new_name = NULL;
fd7b9f7b
TH
1384 }
1385
1386 /*
1387 * Move to the appropriate place in the appropriate directories rbtree.
1388 */
c637b8ac 1389 kernfs_unlink_sibling(kn);
fd7b9f7b 1390 kernfs_get(new_parent);
3eef34ad
TH
1391
1392 /* rename_lock protects ->parent and ->name accessors */
1393 spin_lock_irq(&kernfs_rename_lock);
1394
1395 old_parent = kn->parent;
adc5e8b5 1396 kn->parent = new_parent;
3eef34ad
TH
1397
1398 kn->ns = new_ns;
1399 if (new_name) {
dfeb0750 1400 old_name = kn->name;
3eef34ad
TH
1401 kn->name = new_name;
1402 }
1403
1404 spin_unlock_irq(&kernfs_rename_lock);
1405
9561a896 1406 kn->hash = kernfs_name_hash(kn->name, kn->ns);
c637b8ac 1407 kernfs_link_sibling(kn);
fd7b9f7b 1408
3eef34ad 1409 kernfs_put(old_parent);
75287a67 1410 kfree_const(old_name);
3eef34ad 1411
fd7b9f7b 1412 error = 0;
798c75a0 1413 out:
a797bfc3 1414 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1415 return error;
1416}
1417
fd7b9f7b 1418/* Relationship between s_mode and the DT_xxx types */
324a56e1 1419static inline unsigned char dt_type(struct kernfs_node *kn)
fd7b9f7b 1420{
adc5e8b5 1421 return (kn->mode >> 12) & 15;
fd7b9f7b
TH
1422}
1423
c637b8ac 1424static int kernfs_dir_fop_release(struct inode *inode, struct file *filp)
fd7b9f7b
TH
1425{
1426 kernfs_put(filp->private_data);
1427 return 0;
1428}
1429
c637b8ac 1430static struct kernfs_node *kernfs_dir_pos(const void *ns,
324a56e1 1431 struct kernfs_node *parent, loff_t hash, struct kernfs_node *pos)
fd7b9f7b
TH
1432{
1433 if (pos) {
81c173cb 1434 int valid = kernfs_active(pos) &&
798c75a0 1435 pos->parent == parent && hash == pos->hash;
fd7b9f7b
TH
1436 kernfs_put(pos);
1437 if (!valid)
1438 pos = NULL;
1439 }
1440 if (!pos && (hash > 1) && (hash < INT_MAX)) {
adc5e8b5 1441 struct rb_node *node = parent->dir.children.rb_node;
fd7b9f7b 1442 while (node) {
324a56e1 1443 pos = rb_to_kn(node);
fd7b9f7b 1444
adc5e8b5 1445 if (hash < pos->hash)
fd7b9f7b 1446 node = node->rb_left;
adc5e8b5 1447 else if (hash > pos->hash)
fd7b9f7b
TH
1448 node = node->rb_right;
1449 else
1450 break;
1451 }
1452 }
b9c9dad0
TH
1453 /* Skip over entries which are dying/dead or in the wrong namespace */
1454 while (pos && (!kernfs_active(pos) || pos->ns != ns)) {
adc5e8b5 1455 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1456 if (!node)
1457 pos = NULL;
1458 else
324a56e1 1459 pos = rb_to_kn(node);
fd7b9f7b
TH
1460 }
1461 return pos;
1462}
1463
c637b8ac 1464static struct kernfs_node *kernfs_dir_next_pos(const void *ns,
324a56e1 1465 struct kernfs_node *parent, ino_t ino, struct kernfs_node *pos)
fd7b9f7b 1466{
c637b8ac 1467 pos = kernfs_dir_pos(ns, parent, ino, pos);
b9c9dad0 1468 if (pos) {
fd7b9f7b 1469 do {
adc5e8b5 1470 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1471 if (!node)
1472 pos = NULL;
1473 else
324a56e1 1474 pos = rb_to_kn(node);
b9c9dad0
TH
1475 } while (pos && (!kernfs_active(pos) || pos->ns != ns));
1476 }
fd7b9f7b
TH
1477 return pos;
1478}
1479
c637b8ac 1480static int kernfs_fop_readdir(struct file *file, struct dir_context *ctx)
fd7b9f7b
TH
1481{
1482 struct dentry *dentry = file->f_path.dentry;
324a56e1
TH
1483 struct kernfs_node *parent = dentry->d_fsdata;
1484 struct kernfs_node *pos = file->private_data;
fd7b9f7b
TH
1485 const void *ns = NULL;
1486
1487 if (!dir_emit_dots(file, ctx))
1488 return 0;
a797bfc3 1489 mutex_lock(&kernfs_mutex);
fd7b9f7b 1490
324a56e1 1491 if (kernfs_ns_enabled(parent))
c525aadd 1492 ns = kernfs_info(dentry->d_sb)->ns;
fd7b9f7b 1493
c637b8ac 1494 for (pos = kernfs_dir_pos(ns, parent, ctx->pos, pos);
fd7b9f7b 1495 pos;
c637b8ac 1496 pos = kernfs_dir_next_pos(ns, parent, ctx->pos, pos)) {
adc5e8b5 1497 const char *name = pos->name;
fd7b9f7b
TH
1498 unsigned int type = dt_type(pos);
1499 int len = strlen(name);
adc5e8b5 1500 ino_t ino = pos->ino;
fd7b9f7b 1501
adc5e8b5 1502 ctx->pos = pos->hash;
fd7b9f7b
TH
1503 file->private_data = pos;
1504 kernfs_get(pos);
1505
a797bfc3 1506 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1507 if (!dir_emit(ctx, name, len, ino, type))
1508 return 0;
a797bfc3 1509 mutex_lock(&kernfs_mutex);
fd7b9f7b 1510 }
a797bfc3 1511 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1512 file->private_data = NULL;
1513 ctx->pos = INT_MAX;
1514 return 0;
1515}
1516
c637b8ac
TH
1517static loff_t kernfs_dir_fop_llseek(struct file *file, loff_t offset,
1518 int whence)
fd7b9f7b
TH
1519{
1520 struct inode *inode = file_inode(file);
1521 loff_t ret;
1522
5955102c 1523 inode_lock(inode);
fd7b9f7b 1524 ret = generic_file_llseek(file, offset, whence);
5955102c 1525 inode_unlock(inode);
fd7b9f7b
TH
1526
1527 return ret;
1528}
1529
a797bfc3 1530const struct file_operations kernfs_dir_fops = {
fd7b9f7b 1531 .read = generic_read_dir,
c637b8ac
TH
1532 .iterate = kernfs_fop_readdir,
1533 .release = kernfs_dir_fop_release,
1534 .llseek = kernfs_dir_fop_llseek,
fd7b9f7b 1535};