Commit | Line | Data |
---|---|---|
c82ee6d3 | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
90586523 EP |
2 | /* |
3 | * Copyright (C) 2008 Red Hat, Inc., Eric Paris <eparis@redhat.com> | |
90586523 EP |
4 | */ |
5 | ||
6 | #include <linux/dcache.h> | |
7 | #include <linux/fs.h> | |
5a0e3ad6 | 8 | #include <linux/gfp.h> |
90586523 EP |
9 | #include <linux/init.h> |
10 | #include <linux/module.h> | |
7131485a | 11 | #include <linux/mount.h> |
90586523 EP |
12 | #include <linux/srcu.h> |
13 | ||
14 | #include <linux/fsnotify_backend.h> | |
15 | #include "fsnotify.h" | |
16 | ||
3be25f49 EP |
17 | /* |
18 | * Clear all of the marks on an inode when it is being evicted from core | |
19 | */ | |
20 | void __fsnotify_inode_delete(struct inode *inode) | |
21 | { | |
22 | fsnotify_clear_marks_by_inode(inode); | |
23 | } | |
24 | EXPORT_SYMBOL_GPL(__fsnotify_inode_delete); | |
25 | ||
ca9c726e AG |
26 | void __fsnotify_vfsmount_delete(struct vfsmount *mnt) |
27 | { | |
28 | fsnotify_clear_marks_by_mount(mnt); | |
29 | } | |
30 | ||
ebb3b47e JK |
31 | /** |
32 | * fsnotify_unmount_inodes - an sb is unmounting. handle any watched inodes. | |
33 | * @sb: superblock being unmounted. | |
34 | * | |
35 | * Called during unmount with no locks held, so needs to be safe against | |
36 | * concurrent modifiers. We temporarily drop sb->s_inode_list_lock and CAN block. | |
37 | */ | |
1e6cb723 | 38 | static void fsnotify_unmount_inodes(struct super_block *sb) |
ebb3b47e JK |
39 | { |
40 | struct inode *inode, *iput_inode = NULL; | |
41 | ||
42 | spin_lock(&sb->s_inode_list_lock); | |
43 | list_for_each_entry(inode, &sb->s_inodes, i_sb_list) { | |
44 | /* | |
45 | * We cannot __iget() an inode in state I_FREEING, | |
46 | * I_WILL_FREE, or I_NEW which is fine because by that point | |
47 | * the inode cannot have any associated watches. | |
48 | */ | |
49 | spin_lock(&inode->i_lock); | |
50 | if (inode->i_state & (I_FREEING|I_WILL_FREE|I_NEW)) { | |
51 | spin_unlock(&inode->i_lock); | |
52 | continue; | |
53 | } | |
54 | ||
55 | /* | |
56 | * If i_count is zero, the inode cannot have any watches and | |
1751e8a6 | 57 | * doing an __iget/iput with SB_ACTIVE clear would actually |
ebb3b47e JK |
58 | * evict all inodes with zero i_count from icache which is |
59 | * unnecessarily violent and may in fact be illegal to do. | |
1edc8eb2 ES |
60 | * However, we should have been called /after/ evict_inodes |
61 | * removed all zero refcount inodes, in any case. Test to | |
62 | * be sure. | |
ebb3b47e JK |
63 | */ |
64 | if (!atomic_read(&inode->i_count)) { | |
65 | spin_unlock(&inode->i_lock); | |
66 | continue; | |
67 | } | |
68 | ||
69 | __iget(inode); | |
70 | spin_unlock(&inode->i_lock); | |
71 | spin_unlock(&sb->s_inode_list_lock); | |
72 | ||
f92ca72b | 73 | iput(iput_inode); |
ebb3b47e JK |
74 | |
75 | /* for each watch, send FS_UNMOUNT and then remove it */ | |
82ace1ef | 76 | fsnotify_inode(inode, FS_UNMOUNT); |
ebb3b47e JK |
77 | |
78 | fsnotify_inode_delete(inode); | |
79 | ||
80 | iput_inode = inode; | |
81 | ||
04646aeb | 82 | cond_resched(); |
ebb3b47e JK |
83 | spin_lock(&sb->s_inode_list_lock); |
84 | } | |
85 | spin_unlock(&sb->s_inode_list_lock); | |
86 | ||
f92ca72b | 87 | iput(iput_inode); |
ebb3b47e JK |
88 | } |
89 | ||
1e6cb723 AG |
90 | void fsnotify_sb_delete(struct super_block *sb) |
91 | { | |
92 | fsnotify_unmount_inodes(sb); | |
93 | fsnotify_clear_marks_by_sb(sb); | |
ec44610f AG |
94 | /* Wait for outstanding object references from connectors */ |
95 | wait_var_event(&sb->s_fsnotify_connectors, | |
96 | !atomic_long_read(&sb->s_fsnotify_connectors)); | |
1e6cb723 AG |
97 | } |
98 | ||
c28f7e56 EP |
99 | /* |
100 | * Given an inode, first check if we care what happens to our children. Inotify | |
101 | * and dnotify both tell their parents about events. If we care about any event | |
102 | * on a child we run all of our children and set a dentry flag saying that the | |
103 | * parent cares. Thus when an event happens on a child it can quickly tell if | |
104 | * if there is a need to find a parent and send the event to the parent. | |
105 | */ | |
106 | void __fsnotify_update_child_dentry_flags(struct inode *inode) | |
107 | { | |
108 | struct dentry *alias; | |
109 | int watched; | |
110 | ||
111 | if (!S_ISDIR(inode->i_mode)) | |
112 | return; | |
113 | ||
114 | /* determine if the children should tell inode about their events */ | |
115 | watched = fsnotify_inode_watches_children(inode); | |
116 | ||
873feea0 | 117 | spin_lock(&inode->i_lock); |
c28f7e56 EP |
118 | /* run all of the dentries associated with this inode. Since this is a |
119 | * directory, there damn well better only be one item on this list */ | |
946e51f2 | 120 | hlist_for_each_entry(alias, &inode->i_dentry, d_u.d_alias) { |
c28f7e56 EP |
121 | struct dentry *child; |
122 | ||
123 | /* run all of the children of the original inode and fix their | |
124 | * d_flags to indicate parental interest (their parent is the | |
125 | * original inode) */ | |
2fd6b7f5 | 126 | spin_lock(&alias->d_lock); |
946e51f2 | 127 | list_for_each_entry(child, &alias->d_subdirs, d_child) { |
c28f7e56 EP |
128 | if (!child->d_inode) |
129 | continue; | |
130 | ||
2fd6b7f5 | 131 | spin_lock_nested(&child->d_lock, DENTRY_D_LOCK_NESTED); |
c28f7e56 EP |
132 | if (watched) |
133 | child->d_flags |= DCACHE_FSNOTIFY_PARENT_WATCHED; | |
134 | else | |
135 | child->d_flags &= ~DCACHE_FSNOTIFY_PARENT_WATCHED; | |
136 | spin_unlock(&child->d_lock); | |
137 | } | |
2fd6b7f5 | 138 | spin_unlock(&alias->d_lock); |
c28f7e56 | 139 | } |
873feea0 | 140 | spin_unlock(&inode->i_lock); |
c28f7e56 EP |
141 | } |
142 | ||
9b93f331 AG |
143 | /* Are inode/sb/mount interested in parent and name info with this event? */ |
144 | static bool fsnotify_event_needs_parent(struct inode *inode, struct mount *mnt, | |
145 | __u32 mask) | |
146 | { | |
147 | __u32 marks_mask = 0; | |
148 | ||
149 | /* We only send parent/name to inode/sb/mount for events on non-dir */ | |
150 | if (mask & FS_ISDIR) | |
151 | return false; | |
152 | ||
fecc4559 AG |
153 | /* |
154 | * All events that are possible on child can also may be reported with | |
155 | * parent/name info to inode/sb/mount. Otherwise, a watching parent | |
156 | * could result in events reported with unexpected name info to sb/mount. | |
157 | */ | |
158 | BUILD_BUG_ON(FS_EVENTS_POSS_ON_CHILD & ~FS_EVENTS_POSS_TO_PARENT); | |
159 | ||
9b93f331 AG |
160 | /* Did either inode/sb/mount subscribe for events with parent/name? */ |
161 | marks_mask |= fsnotify_parent_needed_mask(inode->i_fsnotify_mask); | |
162 | marks_mask |= fsnotify_parent_needed_mask(inode->i_sb->s_fsnotify_mask); | |
163 | if (mnt) | |
164 | marks_mask |= fsnotify_parent_needed_mask(mnt->mnt_fsnotify_mask); | |
165 | ||
166 | /* Did they subscribe for this event with parent/name info? */ | |
167 | return mask & marks_mask; | |
168 | } | |
169 | ||
c738fbab AG |
170 | /* |
171 | * Notify this dentry's parent about a child's events with child name info | |
9b93f331 AG |
172 | * if parent is watching or if inode/sb/mount are interested in events with |
173 | * parent and name info. | |
174 | * | |
175 | * Notify only the child without name info if parent is not watching and | |
176 | * inode/sb/mount are not interested in events with parent and name info. | |
c738fbab | 177 | */ |
71d73410 | 178 | int __fsnotify_parent(struct dentry *dentry, __u32 mask, const void *data, |
c738fbab | 179 | int data_type) |
c28f7e56 | 180 | { |
9b93f331 AG |
181 | const struct path *path = fsnotify_data_path(data, data_type); |
182 | struct mount *mnt = path ? real_mount(path->mnt) : NULL; | |
497b0c5a | 183 | struct inode *inode = d_inode(dentry); |
c28f7e56 | 184 | struct dentry *parent; |
9b93f331 | 185 | bool parent_watched = dentry->d_flags & DCACHE_FSNOTIFY_PARENT_WATCHED; |
7372e79c | 186 | bool parent_needed, parent_interested; |
9b93f331 | 187 | __u32 p_mask; |
40a100d3 | 188 | struct inode *p_inode = NULL; |
497b0c5a AG |
189 | struct name_snapshot name; |
190 | struct qstr *file_name = NULL; | |
52420392 | 191 | int ret = 0; |
c28f7e56 | 192 | |
9b93f331 AG |
193 | /* |
194 | * Do inode/sb/mount care about parent and name info on non-dir? | |
195 | * Do they care about any event at all? | |
196 | */ | |
197 | if (!inode->i_fsnotify_marks && !inode->i_sb->s_fsnotify_marks && | |
198 | (!mnt || !mnt->mnt_fsnotify_marks) && !parent_watched) | |
199 | return 0; | |
200 | ||
497b0c5a | 201 | parent = NULL; |
7372e79c AG |
202 | parent_needed = fsnotify_event_needs_parent(inode, mnt, mask); |
203 | if (!parent_watched && !parent_needed) | |
497b0c5a | 204 | goto notify; |
c28f7e56 | 205 | |
9b93f331 | 206 | /* Does parent inode care about events on children? */ |
4d4eb366 | 207 | parent = dget_parent(dentry); |
c28f7e56 | 208 | p_inode = parent->d_inode; |
9b93f331 AG |
209 | p_mask = fsnotify_inode_watches_children(p_inode); |
210 | if (unlikely(parent_watched && !p_mask)) | |
4d4eb366 | 211 | __fsnotify_update_child_dentry_flags(p_inode); |
9b93f331 AG |
212 | |
213 | /* | |
214 | * Include parent/name in notification either if some notification | |
7372e79c | 215 | * groups require parent info or the parent is interested in this event. |
9b93f331 | 216 | */ |
7372e79c AG |
217 | parent_interested = mask & p_mask & ALL_FSNOTIFY_EVENTS; |
218 | if (parent_needed || parent_interested) { | |
497b0c5a AG |
219 | /* When notifying parent, child should be passed as data */ |
220 | WARN_ON_ONCE(inode != fsnotify_data_inode(data, data_type)); | |
49d31c2f | 221 | |
497b0c5a | 222 | /* Notify both parent and child with child name info */ |
49d31c2f | 223 | take_dentry_name_snapshot(&name, dentry); |
497b0c5a | 224 | file_name = &name.name; |
7372e79c | 225 | if (parent_interested) |
9b93f331 | 226 | mask |= FS_EVENT_ON_CHILD; |
c28f7e56 EP |
227 | } |
228 | ||
497b0c5a | 229 | notify: |
40a100d3 | 230 | ret = fsnotify(mask, data, data_type, p_inode, file_name, inode, 0); |
52420392 | 231 | |
497b0c5a AG |
232 | if (file_name) |
233 | release_dentry_name_snapshot(&name); | |
234 | dput(parent); | |
c738fbab | 235 | |
497b0c5a | 236 | return ret; |
c28f7e56 | 237 | } |
71d73410 | 238 | EXPORT_SYMBOL_GPL(__fsnotify_parent); |
c28f7e56 | 239 | |
950cc0d2 AG |
240 | static int fsnotify_handle_inode_event(struct fsnotify_group *group, |
241 | struct fsnotify_mark *inode_mark, | |
242 | u32 mask, const void *data, int data_type, | |
243 | struct inode *dir, const struct qstr *name, | |
244 | u32 cookie) | |
245 | { | |
246 | const struct path *path = fsnotify_data_path(data, data_type); | |
247 | struct inode *inode = fsnotify_data_inode(data, data_type); | |
248 | const struct fsnotify_ops *ops = group->ops; | |
249 | ||
250 | if (WARN_ON_ONCE(!ops->handle_inode_event)) | |
251 | return 0; | |
252 | ||
24dca905 GKB |
253 | if (WARN_ON_ONCE(!inode && !dir)) |
254 | return 0; | |
255 | ||
950cc0d2 AG |
256 | if ((inode_mark->mask & FS_EXCL_UNLINK) && |
257 | path && d_unlinked(path->dentry)) | |
258 | return 0; | |
259 | ||
fecc4559 AG |
260 | /* Check interest of this mark in case event was sent with two marks */ |
261 | if (!(mask & inode_mark->mask & ALL_FSNOTIFY_EVENTS)) | |
262 | return 0; | |
263 | ||
950cc0d2 AG |
264 | return ops->handle_inode_event(inode_mark, mask, inode, dir, name, cookie); |
265 | } | |
266 | ||
b9a1b977 AG |
267 | static int fsnotify_handle_event(struct fsnotify_group *group, __u32 mask, |
268 | const void *data, int data_type, | |
269 | struct inode *dir, const struct qstr *name, | |
270 | u32 cookie, struct fsnotify_iter_info *iter_info) | |
271 | { | |
272 | struct fsnotify_mark *inode_mark = fsnotify_iter_inode_mark(iter_info); | |
fecc4559 | 273 | struct fsnotify_mark *parent_mark = fsnotify_iter_parent_mark(iter_info); |
b9a1b977 AG |
274 | int ret; |
275 | ||
b9a1b977 AG |
276 | if (WARN_ON_ONCE(fsnotify_iter_sb_mark(iter_info)) || |
277 | WARN_ON_ONCE(fsnotify_iter_vfsmount_mark(iter_info))) | |
278 | return 0; | |
279 | ||
e54183fa AG |
280 | /* |
281 | * For FS_RENAME, 'dir' is old dir and 'data' is new dentry. | |
282 | * The only ->handle_inode_event() backend that supports FS_RENAME is | |
283 | * dnotify, where it means file was renamed within same parent. | |
284 | */ | |
285 | if (mask & FS_RENAME) { | |
286 | struct dentry *moved = fsnotify_data_dentry(data, data_type); | |
287 | ||
288 | if (dir != moved->d_parent->d_inode) | |
289 | return 0; | |
290 | } | |
291 | ||
fecc4559 AG |
292 | if (parent_mark) { |
293 | /* | |
294 | * parent_mark indicates that the parent inode is watching | |
295 | * children and interested in this event, which is an event | |
296 | * possible on child. But is *this mark* watching children and | |
297 | * interested in this event? | |
298 | */ | |
299 | if (parent_mark->mask & FS_EVENT_ON_CHILD) { | |
300 | ret = fsnotify_handle_inode_event(group, parent_mark, mask, | |
301 | data, data_type, dir, name, 0); | |
302 | if (ret) | |
303 | return ret; | |
304 | } | |
305 | if (!inode_mark) | |
306 | return 0; | |
307 | } | |
308 | ||
309 | if (mask & FS_EVENT_ON_CHILD) { | |
310 | /* | |
311 | * Some events can be sent on both parent dir and child marks | |
312 | * (e.g. FS_ATTRIB). If both parent dir and child are | |
313 | * watching, report the event once to parent dir with name (if | |
314 | * interested) and once to child without name (if interested). | |
315 | * The child watcher is expecting an event without a file name | |
316 | * and without the FS_EVENT_ON_CHILD flag. | |
317 | */ | |
318 | mask &= ~FS_EVENT_ON_CHILD; | |
b9a1b977 AG |
319 | dir = NULL; |
320 | name = NULL; | |
321 | } | |
322 | ||
fecc4559 AG |
323 | return fsnotify_handle_inode_event(group, inode_mark, mask, data, data_type, |
324 | dir, name, cookie); | |
b9a1b977 AG |
325 | } |
326 | ||
b54cecf5 AG |
327 | static int send_to_group(__u32 mask, const void *data, int data_type, |
328 | struct inode *dir, const struct qstr *file_name, | |
329 | u32 cookie, struct fsnotify_iter_info *iter_info) | |
7131485a | 330 | { |
faa9560a | 331 | struct fsnotify_group *group = NULL; |
007d1e83 | 332 | __u32 test_mask = (mask & ALL_FSNOTIFY_EVENTS); |
92183a42 AG |
333 | __u32 marks_mask = 0; |
334 | __u32 marks_ignored_mask = 0; | |
3dca1a74 AG |
335 | struct fsnotify_mark *mark; |
336 | int type; | |
613a807f | 337 | |
5b0457ad | 338 | if (WARN_ON(!iter_info->report_mask)) |
faa9560a | 339 | return 0; |
ce8f76fb EP |
340 | |
341 | /* clear ignored on inode modification */ | |
342 | if (mask & FS_MODIFY) { | |
1c9007d6 | 343 | fsnotify_foreach_iter_type(type) { |
3dca1a74 AG |
344 | if (!fsnotify_iter_should_report_type(iter_info, type)) |
345 | continue; | |
346 | mark = iter_info->marks[type]; | |
347 | if (mark && | |
348 | !(mark->flags & FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY)) | |
349 | mark->ignored_mask = 0; | |
350 | } | |
ce8f76fb | 351 | } |
613a807f | 352 | |
1c9007d6 | 353 | fsnotify_foreach_iter_type(type) { |
3dca1a74 AG |
354 | if (!fsnotify_iter_should_report_type(iter_info, type)) |
355 | continue; | |
356 | mark = iter_info->marks[type]; | |
357 | /* does the object mark tell us to do something? */ | |
358 | if (mark) { | |
359 | group = mark->group; | |
360 | marks_mask |= mark->mask; | |
361 | marks_ignored_mask |= mark->ignored_mask; | |
362 | } | |
ce8f76fb EP |
363 | } |
364 | ||
b54cecf5 AG |
365 | pr_debug("%s: group=%p mask=%x marks_mask=%x marks_ignored_mask=%x data=%p data_type=%d dir=%p cookie=%d\n", |
366 | __func__, group, mask, marks_mask, marks_ignored_mask, | |
367 | data, data_type, dir, cookie); | |
faa9560a | 368 | |
92183a42 | 369 | if (!(test_mask & marks_mask & ~marks_ignored_mask)) |
613a807f EP |
370 | return 0; |
371 | ||
b9a1b977 AG |
372 | if (group->ops->handle_event) { |
373 | return group->ops->handle_event(group, mask, data, data_type, dir, | |
374 | file_name, cookie, iter_info); | |
375 | } | |
376 | ||
377 | return fsnotify_handle_event(group, mask, data, data_type, dir, | |
378 | file_name, cookie, iter_info); | |
7131485a EP |
379 | } |
380 | ||
3427ce71 MS |
381 | static struct fsnotify_mark *fsnotify_first_mark(struct fsnotify_mark_connector **connp) |
382 | { | |
383 | struct fsnotify_mark_connector *conn; | |
384 | struct hlist_node *node = NULL; | |
385 | ||
386 | conn = srcu_dereference(*connp, &fsnotify_mark_srcu); | |
387 | if (conn) | |
388 | node = srcu_dereference(conn->list.first, &fsnotify_mark_srcu); | |
389 | ||
390 | return hlist_entry_safe(node, struct fsnotify_mark, obj_list); | |
391 | } | |
392 | ||
393 | static struct fsnotify_mark *fsnotify_next_mark(struct fsnotify_mark *mark) | |
394 | { | |
395 | struct hlist_node *node = NULL; | |
396 | ||
397 | if (mark) | |
398 | node = srcu_dereference(mark->obj_list.next, | |
399 | &fsnotify_mark_srcu); | |
400 | ||
401 | return hlist_entry_safe(node, struct fsnotify_mark, obj_list); | |
402 | } | |
403 | ||
d9a6f30b AG |
404 | /* |
405 | * iter_info is a multi head priority queue of marks. | |
406 | * Pick a subset of marks from queue heads, all with the | |
407 | * same group and set the report_mask for selected subset. | |
408 | * Returns the report_mask of the selected subset. | |
409 | */ | |
410 | static unsigned int fsnotify_iter_select_report_types( | |
411 | struct fsnotify_iter_info *iter_info) | |
412 | { | |
47d9c7cc AG |
413 | struct fsnotify_group *max_prio_group = NULL; |
414 | struct fsnotify_mark *mark; | |
415 | int type; | |
416 | ||
417 | /* Choose max prio group among groups of all queue heads */ | |
1c9007d6 | 418 | fsnotify_foreach_iter_type(type) { |
47d9c7cc AG |
419 | mark = iter_info->marks[type]; |
420 | if (mark && | |
421 | fsnotify_compare_groups(max_prio_group, mark->group) > 0) | |
422 | max_prio_group = mark->group; | |
423 | } | |
d9a6f30b | 424 | |
47d9c7cc | 425 | if (!max_prio_group) |
d9a6f30b AG |
426 | return 0; |
427 | ||
47d9c7cc | 428 | /* Set the report mask for marks from same group as max prio group */ |
d9a6f30b | 429 | iter_info->report_mask = 0; |
1c9007d6 | 430 | fsnotify_foreach_iter_type(type) { |
47d9c7cc AG |
431 | mark = iter_info->marks[type]; |
432 | if (mark && | |
433 | fsnotify_compare_groups(max_prio_group, mark->group) == 0) | |
434 | fsnotify_iter_set_report_type(iter_info, type); | |
435 | } | |
d9a6f30b AG |
436 | |
437 | return iter_info->report_mask; | |
438 | } | |
439 | ||
440 | /* | |
441 | * Pop from iter_info multi head queue, the marks that were iterated in the | |
442 | * current iteration step. | |
443 | */ | |
444 | static void fsnotify_iter_next(struct fsnotify_iter_info *iter_info) | |
445 | { | |
47d9c7cc | 446 | int type; |
d9a6f30b | 447 | |
1c9007d6 | 448 | fsnotify_foreach_iter_type(type) { |
47d9c7cc AG |
449 | if (fsnotify_iter_should_report_type(iter_info, type)) |
450 | iter_info->marks[type] = | |
451 | fsnotify_next_mark(iter_info->marks[type]); | |
452 | } | |
d9a6f30b AG |
453 | } |
454 | ||
90586523 | 455 | /* |
40a100d3 AG |
456 | * fsnotify - This is the main call to fsnotify. |
457 | * | |
458 | * The VFS calls into hook specific functions in linux/fsnotify.h. | |
459 | * Those functions then in turn call here. Here will call out to all of the | |
460 | * registered fsnotify_group. Those groups can then use the notification event | |
461 | * in whatever means they feel necessary. | |
462 | * | |
463 | * @mask: event type and flags | |
464 | * @data: object that event happened on | |
465 | * @data_type: type of object for fanotify_data_XXX() accessors | |
466 | * @dir: optional directory associated with event - | |
467 | * if @file_name is not NULL, this is the directory that | |
468 | * @file_name is relative to | |
469 | * @file_name: optional file name associated with event | |
470 | * @inode: optional inode associated with event - | |
29335033 GKB |
471 | * If @dir and @inode are both non-NULL, event may be |
472 | * reported to both. | |
40a100d3 | 473 | * @cookie: inotify rename cookie |
90586523 | 474 | */ |
40a100d3 AG |
475 | int fsnotify(__u32 mask, const void *data, int data_type, struct inode *dir, |
476 | const struct qstr *file_name, struct inode *inode, u32 cookie) | |
90586523 | 477 | { |
b54cecf5 | 478 | const struct path *path = fsnotify_data_path(data, data_type); |
29335033 | 479 | struct super_block *sb = fsnotify_data_sb(data, data_type); |
3427ce71 | 480 | struct fsnotify_iter_info iter_info = {}; |
60f7ed8c | 481 | struct mount *mnt = NULL; |
e54183fa AG |
482 | struct inode *inode2 = NULL; |
483 | struct dentry *moved; | |
484 | int inode2_type; | |
9385a84d | 485 | int ret = 0; |
71d73410 | 486 | __u32 test_mask, marks_mask; |
90586523 | 487 | |
71d73410 | 488 | if (path) |
aa93bdc5 | 489 | mnt = real_mount(path->mnt); |
613a807f | 490 | |
40a100d3 AG |
491 | if (!inode) { |
492 | /* Dirent event - report on TYPE_INODE to dir */ | |
493 | inode = dir; | |
e54183fa AG |
494 | /* For FS_RENAME, inode is old_dir and inode2 is new_dir */ |
495 | if (mask & FS_RENAME) { | |
496 | moved = fsnotify_data_dentry(data, data_type); | |
497 | inode2 = moved->d_parent->d_inode; | |
498 | inode2_type = FSNOTIFY_ITER_TYPE_INODE2; | |
499 | } | |
40a100d3 AG |
500 | } else if (mask & FS_EVENT_ON_CHILD) { |
501 | /* | |
fecc4559 AG |
502 | * Event on child - report on TYPE_PARENT to dir if it is |
503 | * watching children and on TYPE_INODE to child. | |
40a100d3 | 504 | */ |
e54183fa AG |
505 | inode2 = dir; |
506 | inode2_type = FSNOTIFY_ITER_TYPE_PARENT; | |
40a100d3 | 507 | } |
497b0c5a | 508 | |
7c49b861 DH |
509 | /* |
510 | * Optimization: srcu_read_lock() has a memory barrier which can | |
511 | * be expensive. It protects walking the *_fsnotify_marks lists. | |
512 | * However, if we do not walk the lists, we do not have to do | |
513 | * SRCU because we have no references to any objects and do not | |
514 | * need SRCU to keep them "alive". | |
515 | */ | |
9b93f331 | 516 | if (!sb->s_fsnotify_marks && |
497b0c5a | 517 | (!mnt || !mnt->mnt_fsnotify_marks) && |
9b93f331 | 518 | (!inode || !inode->i_fsnotify_marks) && |
e54183fa | 519 | (!inode2 || !inode2->i_fsnotify_marks)) |
7c49b861 | 520 | return 0; |
71d73410 | 521 | |
9b93f331 | 522 | marks_mask = sb->s_fsnotify_mask; |
497b0c5a AG |
523 | if (mnt) |
524 | marks_mask |= mnt->mnt_fsnotify_mask; | |
9b93f331 AG |
525 | if (inode) |
526 | marks_mask |= inode->i_fsnotify_mask; | |
e54183fa AG |
527 | if (inode2) |
528 | marks_mask |= inode2->i_fsnotify_mask; | |
497b0c5a | 529 | |
71d73410 | 530 | |
613a807f | 531 | /* |
04e317ba AG |
532 | * If this is a modify event we may need to clear some ignored masks. |
533 | * In that case, the object with ignored masks will have the FS_MODIFY | |
534 | * event in its mask. | |
535 | * Otherwise, return if none of the marks care about this type of event. | |
613a807f | 536 | */ |
71d73410 | 537 | test_mask = (mask & ALL_FSNOTIFY_EVENTS); |
04e317ba | 538 | if (!(test_mask & marks_mask)) |
613a807f | 539 | return 0; |
3a9fb89f | 540 | |
9385a84d | 541 | iter_info.srcu_idx = srcu_read_lock(&fsnotify_mark_srcu); |
7131485a | 542 | |
1c9007d6 | 543 | iter_info.marks[FSNOTIFY_ITER_TYPE_SB] = |
45a9fb37 | 544 | fsnotify_first_mark(&sb->s_fsnotify_marks); |
9bdda4e9 | 545 | if (mnt) { |
1c9007d6 | 546 | iter_info.marks[FSNOTIFY_ITER_TYPE_VFSMOUNT] = |
3427ce71 | 547 | fsnotify_first_mark(&mnt->mnt_fsnotify_marks); |
90586523 | 548 | } |
9b93f331 | 549 | if (inode) { |
1c9007d6 | 550 | iter_info.marks[FSNOTIFY_ITER_TYPE_INODE] = |
9b93f331 AG |
551 | fsnotify_first_mark(&inode->i_fsnotify_marks); |
552 | } | |
e54183fa AG |
553 | if (inode2) { |
554 | iter_info.marks[inode2_type] = | |
555 | fsnotify_first_mark(&inode2->i_fsnotify_marks); | |
497b0c5a | 556 | } |
75c1be48 | 557 | |
8edc6e16 | 558 | /* |
60f7ed8c AG |
559 | * We need to merge inode/vfsmount/sb mark lists so that e.g. inode mark |
560 | * ignore masks are properly reflected for mount/sb mark notifications. | |
8edc6e16 JK |
561 | * That's why this traversal is so complicated... |
562 | */ | |
d9a6f30b | 563 | while (fsnotify_iter_select_report_types(&iter_info)) { |
b54cecf5 AG |
564 | ret = send_to_group(mask, data, data_type, dir, file_name, |
565 | cookie, &iter_info); | |
613a807f | 566 | |
ff8bcbd0 EP |
567 | if (ret && (mask & ALL_FSNOTIFY_PERM_EVENTS)) |
568 | goto out; | |
569 | ||
d9a6f30b | 570 | fsnotify_iter_next(&iter_info); |
7131485a | 571 | } |
ff8bcbd0 EP |
572 | ret = 0; |
573 | out: | |
9385a84d | 574 | srcu_read_unlock(&fsnotify_mark_srcu, iter_info.srcu_idx); |
c4ec54b4 | 575 | |
98b5c10d | 576 | return ret; |
90586523 EP |
577 | } |
578 | EXPORT_SYMBOL_GPL(fsnotify); | |
579 | ||
580 | static __init int fsnotify_init(void) | |
581 | { | |
75c1be48 EP |
582 | int ret; |
583 | ||
08b95c33 | 584 | BUILD_BUG_ON(HWEIGHT32(ALL_FSNOTIFY_BITS) != 25); |
20dee624 | 585 | |
75c1be48 EP |
586 | ret = init_srcu_struct(&fsnotify_mark_srcu); |
587 | if (ret) | |
588 | panic("initializing fsnotify_mark_srcu"); | |
589 | ||
9dd813c1 JK |
590 | fsnotify_mark_connector_cachep = KMEM_CACHE(fsnotify_mark_connector, |
591 | SLAB_PANIC); | |
592 | ||
75c1be48 | 593 | return 0; |
90586523 | 594 | } |
75c1be48 | 595 | core_initcall(fsnotify_init); |