Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
90586523 EP |
2 | /* |
3 | * Filesystem access notification for Linux | |
4 | * | |
5 | * Copyright (C) 2008 Red Hat, Inc., Eric Paris <eparis@redhat.com> | |
6 | */ | |
7 | ||
8 | #ifndef __LINUX_FSNOTIFY_BACKEND_H | |
9 | #define __LINUX_FSNOTIFY_BACKEND_H | |
10 | ||
11 | #ifdef __KERNEL__ | |
12 | ||
63c882a0 | 13 | #include <linux/idr.h> /* inotify uses this */ |
90586523 EP |
14 | #include <linux/fs.h> /* struct inode */ |
15 | #include <linux/list.h> | |
16 | #include <linux/path.h> /* struct path */ | |
17 | #include <linux/spinlock.h> | |
18 | #include <linux/types.h> | |
60063497 | 19 | #include <linux/atomic.h> |
1cce1eea | 20 | #include <linux/user_namespace.h> |
7761daa6 | 21 | #include <linux/refcount.h> |
90586523 EP |
22 | |
23 | /* | |
24 | * IN_* from inotfy.h lines up EXACTLY with FS_*, this is so we can easily | |
25 | * convert between them. dnotify only needs conversion at watch creation | |
26 | * so no perf loss there. fanotify isn't defined yet, so it can use the | |
27 | * wholes if it needs more events. | |
28 | */ | |
29 | #define FS_ACCESS 0x00000001 /* File was accessed */ | |
30 | #define FS_MODIFY 0x00000002 /* File was modified */ | |
31 | #define FS_ATTRIB 0x00000004 /* Metadata changed */ | |
32 | #define FS_CLOSE_WRITE 0x00000008 /* Writtable file was closed */ | |
33 | #define FS_CLOSE_NOWRITE 0x00000010 /* Unwrittable file closed */ | |
34 | #define FS_OPEN 0x00000020 /* File was opened */ | |
35 | #define FS_MOVED_FROM 0x00000040 /* File was moved from X */ | |
36 | #define FS_MOVED_TO 0x00000080 /* File was moved to Y */ | |
37 | #define FS_CREATE 0x00000100 /* Subfile was created */ | |
38 | #define FS_DELETE 0x00000200 /* Subfile was deleted */ | |
39 | #define FS_DELETE_SELF 0x00000400 /* Self was deleted */ | |
40 | #define FS_MOVE_SELF 0x00000800 /* Self was moved */ | |
9b076f1c | 41 | #define FS_OPEN_EXEC 0x00001000 /* File was opened for exec */ |
90586523 EP |
42 | |
43 | #define FS_UNMOUNT 0x00002000 /* inode on umount fs */ | |
44 | #define FS_Q_OVERFLOW 0x00004000 /* Event queued overflowed */ | |
45 | #define FS_IN_IGNORED 0x00008000 /* last inotify event here */ | |
46 | ||
c4ec54b4 EP |
47 | #define FS_OPEN_PERM 0x00010000 /* open event in an permission hook */ |
48 | #define FS_ACCESS_PERM 0x00020000 /* access event in a permissions hook */ | |
66917a31 | 49 | #define FS_OPEN_EXEC_PERM 0x00040000 /* open/exec event in a permission hook */ |
9e2ba2c3 | 50 | #define FS_DIR_MODIFY 0x00080000 /* Directory entry was modified */ |
c4ec54b4 | 51 | |
8c1934c8 | 52 | #define FS_EXCL_UNLINK 0x04000000 /* do not send events if object is unlinked */ |
c28f7e56 EP |
53 | /* This inode cares about things that happen to its children. Always set for |
54 | * dnotify and inotify. */ | |
55 | #define FS_EVENT_ON_CHILD 0x08000000 | |
56 | ||
6473ea76 AG |
57 | #define FS_DN_RENAME 0x10000000 /* file renamed */ |
58 | #define FS_DN_MULTISHOT 0x20000000 /* dnotify multishot */ | |
59 | #define FS_ISDIR 0x40000000 /* event occurred against dir */ | |
60 | #define FS_IN_ONESHOT 0x80000000 /* only send event once */ | |
61 | ||
e9fd702a EP |
62 | #define FS_MOVE (FS_MOVED_FROM | FS_MOVED_TO) |
63 | ||
e220140f AG |
64 | /* |
65 | * Directory entry modification events - reported only to directory | |
66 | * where entry is modified and not to a watching parent. | |
67 | * The watching parent may get an FS_ATTRIB|FS_EVENT_ON_CHILD event | |
68 | * when a directory entry inside a child subdir changes. | |
69 | */ | |
9e2ba2c3 AG |
70 | #define ALL_FSNOTIFY_DIRENT_EVENTS (FS_CREATE | FS_DELETE | FS_MOVE | \ |
71 | FS_DIR_MODIFY) | |
e220140f | 72 | |
66917a31 MB |
73 | #define ALL_FSNOTIFY_PERM_EVENTS (FS_OPEN_PERM | FS_ACCESS_PERM | \ |
74 | FS_OPEN_EXEC_PERM) | |
ff8bcbd0 | 75 | |
e220140f AG |
76 | /* |
77 | * This is a list of all events that may get sent to a parent based on fs event | |
78 | * happening to inodes inside that directory. | |
79 | */ | |
80 | #define FS_EVENTS_POSS_ON_CHILD (ALL_FSNOTIFY_PERM_EVENTS | \ | |
81 | FS_ACCESS | FS_MODIFY | FS_ATTRIB | \ | |
82 | FS_CLOSE_WRITE | FS_CLOSE_NOWRITE | \ | |
83 | FS_OPEN | FS_OPEN_EXEC) | |
84 | ||
007d1e83 | 85 | /* Events that can be reported to backends */ |
e220140f AG |
86 | #define ALL_FSNOTIFY_EVENTS (ALL_FSNOTIFY_DIRENT_EVENTS | \ |
87 | FS_EVENTS_POSS_ON_CHILD | \ | |
88 | FS_DELETE_SELF | FS_MOVE_SELF | FS_DN_RENAME | \ | |
89 | FS_UNMOUNT | FS_Q_OVERFLOW | FS_IN_IGNORED) | |
007d1e83 AG |
90 | |
91 | /* Extra flags that may be reported with event or control handling of events */ | |
92 | #define ALL_FSNOTIFY_FLAGS (FS_EXCL_UNLINK | FS_ISDIR | FS_IN_ONESHOT | \ | |
20dee624 EP |
93 | FS_DN_MULTISHOT | FS_EVENT_ON_CHILD) |
94 | ||
007d1e83 AG |
95 | #define ALL_FSNOTIFY_BITS (ALL_FSNOTIFY_EVENTS | ALL_FSNOTIFY_FLAGS) |
96 | ||
90586523 EP |
97 | struct fsnotify_group; |
98 | struct fsnotify_event; | |
e61ce867 | 99 | struct fsnotify_mark; |
e4aff117 | 100 | struct fsnotify_event_private_data; |
7053aee2 | 101 | struct fsnotify_fname; |
abc77577 | 102 | struct fsnotify_iter_info; |
90586523 | 103 | |
d46eb14b SB |
104 | struct mem_cgroup; |
105 | ||
90586523 EP |
106 | /* |
107 | * Each group much define these ops. The fsnotify infrastructure will call | |
108 | * these operations for each relevant group. | |
109 | * | |
110 | * handle_event - main call for a group to handle an fs event | |
111 | * free_group_priv - called when a group refcnt hits 0 to clean up the private union | |
6960b0d9 LS |
112 | * freeing_mark - called when a mark is being destroyed for some reason. The group |
113 | * MUST be holding a reference on each mark and that reference must be | |
114 | * dropped in this function. inotify uses this function to send | |
115 | * userspace messages that marks have been removed. | |
90586523 EP |
116 | */ |
117 | struct fsnotify_ops { | |
ce8f76fb | 118 | int (*handle_event)(struct fsnotify_group *group, |
7053aee2 | 119 | struct inode *inode, |
3cd5eca8 | 120 | u32 mask, const void *data, int data_type, |
e43e9c33 | 121 | const struct qstr *file_name, u32 cookie, |
9385a84d | 122 | struct fsnotify_iter_info *iter_info); |
90586523 | 123 | void (*free_group_priv)(struct fsnotify_group *group); |
841bdc10 | 124 | void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group); |
7053aee2 | 125 | void (*free_event)(struct fsnotify_event *event); |
054c636e JK |
126 | /* called on final put+free to free memory */ |
127 | void (*free_mark)(struct fsnotify_mark *mark); | |
7053aee2 JK |
128 | }; |
129 | ||
130 | /* | |
131 | * all of the information about the original object we want to now send to | |
132 | * a group. If you want to carry more info from the accessing task to the | |
133 | * listener this structure is where you need to be adding fields. | |
134 | */ | |
135 | struct fsnotify_event { | |
136 | struct list_head list; | |
dfc2d259 | 137 | unsigned long objectid; /* identifier for queue merges */ |
90586523 EP |
138 | }; |
139 | ||
140 | /* | |
141 | * A group is a "thing" that wants to receive notification about filesystem | |
142 | * events. The mask holds the subset of event types this group cares about. | |
143 | * refcnt on a group is up to the implementor and at any moment if it goes 0 | |
144 | * everything will be cleaned up. | |
145 | */ | |
146 | struct fsnotify_group { | |
d46eb14b SB |
147 | const struct fsnotify_ops *ops; /* how this group handles things */ |
148 | ||
90586523 EP |
149 | /* |
150 | * How the refcnt is used is up to each group. When the refcnt hits 0 | |
151 | * fsnotify will clean up all of the resources associated with this group. | |
152 | * As an example, the dnotify group will always have a refcnt=1 and that | |
153 | * will never change. Inotify, on the other hand, has a group per | |
154 | * inotify_init() and the refcnt will hit 0 only when that fd has been | |
155 | * closed. | |
156 | */ | |
7761daa6 | 157 | refcount_t refcnt; /* things with interest in this group */ |
90586523 | 158 | |
a2d8bc6c | 159 | /* needed to send notification to userspace */ |
c21dbe20 | 160 | spinlock_t notification_lock; /* protect the notification_list */ |
a2d8bc6c EP |
161 | struct list_head notification_list; /* list of event_holder this group needs to send to userspace */ |
162 | wait_queue_head_t notification_waitq; /* read() on the notification file blocks on this waitq */ | |
163 | unsigned int q_len; /* events on the queue */ | |
164 | unsigned int max_events; /* maximum events allowed on the list */ | |
6ad2d4e3 EP |
165 | /* |
166 | * Valid fsnotify group priorities. Events are send in order from highest | |
167 | * priority to lowest priority. We default to the lowest priority. | |
168 | */ | |
169 | #define FS_PRIO_0 0 /* normal notifiers, no permissions */ | |
170 | #define FS_PRIO_1 1 /* fanotify content based access control */ | |
171 | #define FS_PRIO_2 2 /* fanotify pre-content access */ | |
172 | unsigned int priority; | |
12703dbf | 173 | bool shutdown; /* group is being shut down, don't queue more events */ |
a2d8bc6c | 174 | |
e61ce867 | 175 | /* stores all fastpath marks assoc with this group so they can be cleaned on unregister */ |
986ab098 | 176 | struct mutex mark_mutex; /* protect marks_list */ |
841bdc10 | 177 | atomic_t num_marks; /* 1 for each mark and 1 for not being |
3be25f49 EP |
178 | * past the point of no return when freeing |
179 | * a group */ | |
d46eb14b SB |
180 | atomic_t user_waits; /* Number of tasks waiting for user |
181 | * response */ | |
e61ce867 | 182 | struct list_head marks_list; /* all inode marks for this group */ |
3be25f49 | 183 | |
7053aee2 JK |
184 | struct fasync_struct *fsn_fa; /* async notification */ |
185 | ||
ff57cd58 | 186 | struct fsnotify_event *overflow_event; /* Event we queue when the |
7053aee2 JK |
187 | * notification list is too |
188 | * full */ | |
d46eb14b SB |
189 | |
190 | struct mem_cgroup *memcg; /* memcg to charge allocations */ | |
0a6b6bd5 | 191 | |
90586523 EP |
192 | /* groups can define private fields here or use the void *private */ |
193 | union { | |
194 | void *private; | |
63c882a0 EP |
195 | #ifdef CONFIG_INOTIFY_USER |
196 | struct inotify_group_private_data { | |
197 | spinlock_t idr_lock; | |
198 | struct idr idr; | |
1cce1eea | 199 | struct ucounts *ucounts; |
63c882a0 | 200 | } inotify_data; |
9e66e423 | 201 | #endif |
80af2588 | 202 | #ifdef CONFIG_FANOTIFY |
9e66e423 EP |
203 | struct fanotify_group_private_data { |
204 | /* allows a group to block waiting for a userspace response */ | |
9e66e423 EP |
205 | struct list_head access_list; |
206 | wait_queue_head_t access_waitq; | |
96a71f21 AG |
207 | int flags; /* flags from fanotify_init() */ |
208 | int f_flags; /* event_f_flags from fanotify_init() */ | |
e7099d8a | 209 | unsigned int max_marks; |
4afeff85 | 210 | struct user_struct *user; |
9e66e423 | 211 | } fanotify_data; |
80af2588 | 212 | #endif /* CONFIG_FANOTIFY */ |
90586523 EP |
213 | }; |
214 | }; | |
215 | ||
aa93bdc5 AG |
216 | /* When calling fsnotify tell it if the data is a path or inode */ |
217 | enum fsnotify_data_type { | |
218 | FSNOTIFY_EVENT_NONE, | |
219 | FSNOTIFY_EVENT_PATH, | |
220 | FSNOTIFY_EVENT_INODE, | |
221 | }; | |
222 | ||
cbcf47ad | 223 | static inline struct inode *fsnotify_data_inode(const void *data, int data_type) |
aa93bdc5 AG |
224 | { |
225 | switch (data_type) { | |
226 | case FSNOTIFY_EVENT_INODE: | |
cbcf47ad | 227 | return (struct inode *)data; |
aa93bdc5 AG |
228 | case FSNOTIFY_EVENT_PATH: |
229 | return d_inode(((const struct path *)data)->dentry); | |
230 | default: | |
231 | return NULL; | |
232 | } | |
233 | } | |
234 | ||
235 | static inline const struct path *fsnotify_data_path(const void *data, | |
236 | int data_type) | |
237 | { | |
238 | switch (data_type) { | |
239 | case FSNOTIFY_EVENT_PATH: | |
240 | return data; | |
241 | default: | |
242 | return NULL; | |
243 | } | |
244 | } | |
90586523 | 245 | |
d6f7b98b AG |
246 | enum fsnotify_obj_type { |
247 | FSNOTIFY_OBJ_TYPE_INODE, | |
248 | FSNOTIFY_OBJ_TYPE_VFSMOUNT, | |
1e6cb723 | 249 | FSNOTIFY_OBJ_TYPE_SB, |
d6f7b98b AG |
250 | FSNOTIFY_OBJ_TYPE_COUNT, |
251 | FSNOTIFY_OBJ_TYPE_DETACHED = FSNOTIFY_OBJ_TYPE_COUNT | |
252 | }; | |
253 | ||
254 | #define FSNOTIFY_OBJ_TYPE_INODE_FL (1U << FSNOTIFY_OBJ_TYPE_INODE) | |
255 | #define FSNOTIFY_OBJ_TYPE_VFSMOUNT_FL (1U << FSNOTIFY_OBJ_TYPE_VFSMOUNT) | |
1e6cb723 | 256 | #define FSNOTIFY_OBJ_TYPE_SB_FL (1U << FSNOTIFY_OBJ_TYPE_SB) |
d6f7b98b AG |
257 | #define FSNOTIFY_OBJ_ALL_TYPES_MASK ((1U << FSNOTIFY_OBJ_TYPE_COUNT) - 1) |
258 | ||
b812a9f5 AG |
259 | static inline bool fsnotify_valid_obj_type(unsigned int type) |
260 | { | |
261 | return (type < FSNOTIFY_OBJ_TYPE_COUNT); | |
262 | } | |
263 | ||
5b0457ad | 264 | struct fsnotify_iter_info { |
47d9c7cc | 265 | struct fsnotify_mark *marks[FSNOTIFY_OBJ_TYPE_COUNT]; |
5b0457ad AG |
266 | unsigned int report_mask; |
267 | int srcu_idx; | |
268 | }; | |
269 | ||
47d9c7cc AG |
270 | static inline bool fsnotify_iter_should_report_type( |
271 | struct fsnotify_iter_info *iter_info, int type) | |
272 | { | |
273 | return (iter_info->report_mask & (1U << type)); | |
274 | } | |
275 | ||
276 | static inline void fsnotify_iter_set_report_type( | |
277 | struct fsnotify_iter_info *iter_info, int type) | |
278 | { | |
279 | iter_info->report_mask |= (1U << type); | |
280 | } | |
281 | ||
282 | static inline void fsnotify_iter_set_report_type_mark( | |
283 | struct fsnotify_iter_info *iter_info, int type, | |
284 | struct fsnotify_mark *mark) | |
285 | { | |
286 | iter_info->marks[type] = mark; | |
287 | iter_info->report_mask |= (1U << type); | |
288 | } | |
289 | ||
5b0457ad AG |
290 | #define FSNOTIFY_ITER_FUNCS(name, NAME) \ |
291 | static inline struct fsnotify_mark *fsnotify_iter_##name##_mark( \ | |
292 | struct fsnotify_iter_info *iter_info) \ | |
293 | { \ | |
294 | return (iter_info->report_mask & FSNOTIFY_OBJ_TYPE_##NAME##_FL) ? \ | |
47d9c7cc | 295 | iter_info->marks[FSNOTIFY_OBJ_TYPE_##NAME] : NULL; \ |
5b0457ad AG |
296 | } |
297 | ||
298 | FSNOTIFY_ITER_FUNCS(inode, INODE) | |
299 | FSNOTIFY_ITER_FUNCS(vfsmount, VFSMOUNT) | |
1e6cb723 | 300 | FSNOTIFY_ITER_FUNCS(sb, SB) |
5b0457ad | 301 | |
47d9c7cc AG |
302 | #define fsnotify_foreach_obj_type(type) \ |
303 | for (type = 0; type < FSNOTIFY_OBJ_TYPE_COUNT; type++) | |
304 | ||
36f10f55 AG |
305 | /* |
306 | * fsnotify_connp_t is what we embed in objects which connector can be attached | |
307 | * to. fsnotify_connp_t * is how we refer from connector back to object. | |
308 | */ | |
309 | struct fsnotify_mark_connector; | |
310 | typedef struct fsnotify_mark_connector __rcu *fsnotify_connp_t; | |
311 | ||
9dd813c1 | 312 | /* |
1e6cb723 AG |
313 | * Inode/vfsmount/sb point to this structure which tracks all marks attached to |
314 | * the inode/vfsmount/sb. The reference to inode/vfsmount/sb is held by this | |
08991e83 JK |
315 | * structure. We destroy this structure when there are no more marks attached |
316 | * to it. The structure is protected by fsnotify_mark_srcu. | |
9dd813c1 JK |
317 | */ |
318 | struct fsnotify_mark_connector { | |
04662cab | 319 | spinlock_t lock; |
c285a2f0 AG |
320 | unsigned short type; /* Type of object [lock] */ |
321 | #define FSNOTIFY_CONN_FLAG_HAS_FSID 0x01 | |
322 | unsigned short flags; /* flags [lock] */ | |
77115225 | 323 | __kernel_fsid_t fsid; /* fsid of filesystem containing object */ |
36f10f55 AG |
324 | union { |
325 | /* Object pointer [lock] */ | |
326 | fsnotify_connp_t *obj; | |
08991e83 JK |
327 | /* Used listing heads to free after srcu period expires */ |
328 | struct fsnotify_mark_connector *destroy_next; | |
329 | }; | |
d90a10e2 | 330 | struct hlist_head list; |
9dd813c1 JK |
331 | }; |
332 | ||
3be25f49 | 333 | /* |
1e39fc01 | 334 | * A mark is simply an object attached to an in core inode which allows an |
3be25f49 EP |
335 | * fsnotify listener to indicate they are either no longer interested in events |
336 | * of a type matching mask or only interested in those events. | |
337 | * | |
1e39fc01 JK |
338 | * These are flushed when an inode is evicted from core and may be flushed |
339 | * when the inode is modified (as seen by fsnotify_access). Some fsnotify | |
340 | * users (such as dnotify) will flush these when the open fd is closed and not | |
341 | * at inode eviction or modification. | |
342 | * | |
343 | * Text in brackets is showing the lock(s) protecting modifications of a | |
344 | * particular entry. obj_lock means either inode->i_lock or | |
345 | * mnt->mnt_root->d_lock depending on the mark type. | |
3be25f49 | 346 | */ |
e61ce867 | 347 | struct fsnotify_mark { |
1e39fc01 JK |
348 | /* Mask this mark is for [mark->lock, group->mark_mutex] */ |
349 | __u32 mask; | |
350 | /* We hold one for presence in g_list. Also one ref for each 'thing' | |
3be25f49 | 351 | * in kernel that found and may be using this mark. */ |
ab97f873 | 352 | refcount_t refcnt; |
1e39fc01 JK |
353 | /* Group this mark is for. Set on mark creation, stable until last ref |
354 | * is dropped */ | |
355 | struct fsnotify_group *group; | |
8e984f86 | 356 | /* List of marks by group->marks_list. Also reused for queueing |
1e39fc01 JK |
357 | * mark into destroy_list when it's waiting for the end of SRCU period |
358 | * before it can be freed. [group->mark_mutex] */ | |
13d34ac6 | 359 | struct list_head g_list; |
1e39fc01 JK |
360 | /* Protects inode / mnt pointers, flags, masks */ |
361 | spinlock_t lock; | |
6b3f05d2 | 362 | /* List of marks for inode / vfsmount [connector->lock, mark ref] */ |
1e39fc01 | 363 | struct hlist_node obj_list; |
6b3f05d2 | 364 | /* Head of list of marks for an object [mark ref] */ |
86ffe245 | 365 | struct fsnotify_mark_connector *connector; |
1e39fc01 JK |
366 | /* Events types to ignore [mark->lock, group->mark_mutex] */ |
367 | __u32 ignored_mask; | |
e911d8af JK |
368 | #define FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY 0x01 |
369 | #define FSNOTIFY_MARK_FLAG_ALIVE 0x02 | |
370 | #define FSNOTIFY_MARK_FLAG_ATTACHED 0x04 | |
1e39fc01 | 371 | unsigned int flags; /* flags [mark->lock] */ |
3be25f49 EP |
372 | }; |
373 | ||
90586523 EP |
374 | #ifdef CONFIG_FSNOTIFY |
375 | ||
376 | /* called from the vfs helpers */ | |
377 | ||
378 | /* main fsnotify call to send events */ | |
017de65f AG |
379 | extern int fsnotify(struct inode *to_tell, __u32 mask, const void *data, |
380 | int data_type, const struct qstr *name, u32 cookie); | |
71d73410 | 381 | extern int __fsnotify_parent(struct dentry *dentry, __u32 mask, const void *data, |
017de65f | 382 | int data_type); |
3be25f49 | 383 | extern void __fsnotify_inode_delete(struct inode *inode); |
ca9c726e | 384 | extern void __fsnotify_vfsmount_delete(struct vfsmount *mnt); |
1e6cb723 | 385 | extern void fsnotify_sb_delete(struct super_block *sb); |
47882c6f | 386 | extern u32 fsnotify_get_cookie(void); |
90586523 | 387 | |
c28f7e56 EP |
388 | static inline int fsnotify_inode_watches_children(struct inode *inode) |
389 | { | |
390 | /* FS_EVENT_ON_CHILD is set if the inode may care */ | |
391 | if (!(inode->i_fsnotify_mask & FS_EVENT_ON_CHILD)) | |
392 | return 0; | |
393 | /* this inode might care about child events, does it care about the | |
394 | * specific set of events that can happen on a child? */ | |
395 | return inode->i_fsnotify_mask & FS_EVENTS_POSS_ON_CHILD; | |
396 | } | |
397 | ||
398 | /* | |
399 | * Update the dentry with a flag indicating the interest of its parent to receive | |
400 | * filesystem events when those events happens to this dentry->d_inode. | |
401 | */ | |
affda484 | 402 | static inline void fsnotify_update_flags(struct dentry *dentry) |
c28f7e56 | 403 | { |
c28f7e56 EP |
404 | assert_spin_locked(&dentry->d_lock); |
405 | ||
b5c84bf6 NP |
406 | /* |
407 | * Serialisation of setting PARENT_WATCHED on the dentries is provided | |
408 | * by d_lock. If inotify_inode_watched changes after we have taken | |
409 | * d_lock, the following __fsnotify_update_child_dentry_flags call will | |
410 | * find our entry, so it will spin until we complete here, and update | |
411 | * us with the new state. | |
412 | */ | |
affda484 | 413 | if (fsnotify_inode_watches_children(dentry->d_parent->d_inode)) |
c28f7e56 EP |
414 | dentry->d_flags |= DCACHE_FSNOTIFY_PARENT_WATCHED; |
415 | else | |
416 | dentry->d_flags &= ~DCACHE_FSNOTIFY_PARENT_WATCHED; | |
417 | } | |
418 | ||
90586523 EP |
419 | /* called from fsnotify listeners, such as fanotify or dnotify */ |
420 | ||
98612952 | 421 | /* create a new group */ |
0d2e2a1d | 422 | extern struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops); |
98612952 LS |
423 | /* get reference to a group */ |
424 | extern void fsnotify_get_group(struct fsnotify_group *group); | |
ffab8340 | 425 | /* drop reference on a group from fsnotify_alloc_group */ |
90586523 | 426 | extern void fsnotify_put_group(struct fsnotify_group *group); |
12703dbf JK |
427 | /* group destruction begins, stop queuing new events */ |
428 | extern void fsnotify_group_stop_queueing(struct fsnotify_group *group); | |
d8153d4d LS |
429 | /* destroy group */ |
430 | extern void fsnotify_destroy_group(struct fsnotify_group *group); | |
0a6b6bd5 EP |
431 | /* fasync handler function */ |
432 | extern int fsnotify_fasync(int fd, struct file *file, int on); | |
7053aee2 JK |
433 | /* Free event from memory */ |
434 | extern void fsnotify_destroy_event(struct fsnotify_group *group, | |
435 | struct fsnotify_event *event); | |
a2d8bc6c | 436 | /* attach the event to the group notification queue */ |
8ba8fa91 JK |
437 | extern int fsnotify_add_event(struct fsnotify_group *group, |
438 | struct fsnotify_event *event, | |
439 | int (*merge)(struct list_head *, | |
440 | struct fsnotify_event *)); | |
7b1f6417 JK |
441 | /* Queue overflow event to a notification group */ |
442 | static inline void fsnotify_queue_overflow(struct fsnotify_group *group) | |
443 | { | |
444 | fsnotify_add_event(group, group->overflow_event, NULL); | |
445 | } | |
446 | ||
a2d8bc6c EP |
447 | /* true if the group notification queue is empty */ |
448 | extern bool fsnotify_notify_queue_is_empty(struct fsnotify_group *group); | |
449 | /* return, but do not dequeue the first event on the notification queue */ | |
8ba8fa91 | 450 | extern struct fsnotify_event *fsnotify_peek_first_event(struct fsnotify_group *group); |
e4aff117 | 451 | /* return AND dequeue the first event on the notification queue */ |
8ba8fa91 | 452 | extern struct fsnotify_event *fsnotify_remove_first_event(struct fsnotify_group *group); |
f7db89ac JK |
453 | /* Remove event queued in the notification list */ |
454 | extern void fsnotify_remove_queued_event(struct fsnotify_group *group, | |
455 | struct fsnotify_event *event); | |
a2d8bc6c | 456 | |
3be25f49 EP |
457 | /* functions used to manipulate the marks attached to inodes */ |
458 | ||
3ac70bfc AG |
459 | /* Get mask of events for a list of marks */ |
460 | extern __u32 fsnotify_conn_mask(struct fsnotify_mark_connector *conn); | |
a242677b JK |
461 | /* Calculate mask of events for a list of marks */ |
462 | extern void fsnotify_recalc_mask(struct fsnotify_mark_connector *conn); | |
7b129323 | 463 | extern void fsnotify_init_mark(struct fsnotify_mark *mark, |
054c636e | 464 | struct fsnotify_group *group); |
b1362edf | 465 | /* Find mark belonging to given group in the list of marks */ |
9b6e5434 AG |
466 | extern struct fsnotify_mark *fsnotify_find_mark(fsnotify_connp_t *connp, |
467 | struct fsnotify_group *group); | |
77115225 AG |
468 | /* Get cached fsid of filesystem containing object */ |
469 | extern int fsnotify_get_conn_fsid(const struct fsnotify_mark_connector *conn, | |
470 | __kernel_fsid_t *fsid); | |
b812a9f5 AG |
471 | /* attach the mark to the object */ |
472 | extern int fsnotify_add_mark(struct fsnotify_mark *mark, | |
473 | fsnotify_connp_t *connp, unsigned int type, | |
77115225 | 474 | int allow_dups, __kernel_fsid_t *fsid); |
7b129323 | 475 | extern int fsnotify_add_mark_locked(struct fsnotify_mark *mark, |
77115225 AG |
476 | fsnotify_connp_t *connp, |
477 | unsigned int type, int allow_dups, | |
478 | __kernel_fsid_t *fsid); | |
479 | ||
b249f5be AG |
480 | /* attach the mark to the inode */ |
481 | static inline int fsnotify_add_inode_mark(struct fsnotify_mark *mark, | |
482 | struct inode *inode, | |
483 | int allow_dups) | |
484 | { | |
b812a9f5 | 485 | return fsnotify_add_mark(mark, &inode->i_fsnotify_marks, |
77115225 | 486 | FSNOTIFY_OBJ_TYPE_INODE, allow_dups, NULL); |
b249f5be AG |
487 | } |
488 | static inline int fsnotify_add_inode_mark_locked(struct fsnotify_mark *mark, | |
489 | struct inode *inode, | |
490 | int allow_dups) | |
491 | { | |
b812a9f5 | 492 | return fsnotify_add_mark_locked(mark, &inode->i_fsnotify_marks, |
77115225 AG |
493 | FSNOTIFY_OBJ_TYPE_INODE, allow_dups, |
494 | NULL); | |
b249f5be | 495 | } |
77115225 | 496 | |
e2a29943 LS |
497 | /* given a group and a mark, flag mark to be freed when all references are dropped */ |
498 | extern void fsnotify_destroy_mark(struct fsnotify_mark *mark, | |
499 | struct fsnotify_group *group); | |
4712e722 JK |
500 | /* detach mark from inode / mount list, group list, drop inode reference */ |
501 | extern void fsnotify_detach_mark(struct fsnotify_mark *mark); | |
502 | /* free mark */ | |
503 | extern void fsnotify_free_mark(struct fsnotify_mark *mark); | |
b72679ee TM |
504 | /* Wait until all marks queued for destruction are destroyed */ |
505 | extern void fsnotify_wait_marks_destroyed(void); | |
86ffe245 | 506 | /* run all the marks in a group, and clear all of the marks attached to given object type */ |
18f2e0d3 | 507 | extern void fsnotify_clear_marks_by_group(struct fsnotify_group *group, unsigned int type); |
416bcdbc JK |
508 | /* run all the marks in a group, and clear all of the vfsmount marks */ |
509 | static inline void fsnotify_clear_vfsmount_marks_by_group(struct fsnotify_group *group) | |
510 | { | |
d6f7b98b | 511 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_VFSMOUNT_FL); |
416bcdbc JK |
512 | } |
513 | /* run all the marks in a group, and clear all of the inode marks */ | |
514 | static inline void fsnotify_clear_inode_marks_by_group(struct fsnotify_group *group) | |
515 | { | |
d6f7b98b | 516 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_INODE_FL); |
416bcdbc | 517 | } |
1e6cb723 AG |
518 | /* run all the marks in a group, and clear all of the sn marks */ |
519 | static inline void fsnotify_clear_sb_marks_by_group(struct fsnotify_group *group) | |
520 | { | |
521 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_SB_FL); | |
522 | } | |
841bdc10 EP |
523 | extern void fsnotify_get_mark(struct fsnotify_mark *mark); |
524 | extern void fsnotify_put_mark(struct fsnotify_mark *mark); | |
abc77577 JK |
525 | extern void fsnotify_finish_user_wait(struct fsnotify_iter_info *iter_info); |
526 | extern bool fsnotify_prepare_user_wait(struct fsnotify_iter_info *iter_info); | |
3be25f49 | 527 | |
a0a92d26 | 528 | static inline void fsnotify_init_event(struct fsnotify_event *event, |
dfc2d259 | 529 | unsigned long objectid) |
a0a92d26 AG |
530 | { |
531 | INIT_LIST_HEAD(&event->list); | |
dfc2d259 | 532 | event->objectid = objectid; |
a0a92d26 | 533 | } |
b4e4e140 | 534 | |
90586523 EP |
535 | #else |
536 | ||
017de65f AG |
537 | static inline int fsnotify(struct inode *to_tell, __u32 mask, const void *data, |
538 | int data_type, const struct qstr *name, u32 cookie) | |
c4ec54b4 EP |
539 | { |
540 | return 0; | |
541 | } | |
3be25f49 | 542 | |
71d73410 | 543 | static inline int __fsnotify_parent(struct dentry *dentry, __u32 mask, |
017de65f | 544 | const void *data, int data_type) |
52420392 EP |
545 | { |
546 | return 0; | |
547 | } | |
c28f7e56 | 548 | |
3be25f49 EP |
549 | static inline void __fsnotify_inode_delete(struct inode *inode) |
550 | {} | |
551 | ||
ca9c726e AG |
552 | static inline void __fsnotify_vfsmount_delete(struct vfsmount *mnt) |
553 | {} | |
554 | ||
1e6cb723 AG |
555 | static inline void fsnotify_sb_delete(struct super_block *sb) |
556 | {} | |
557 | ||
affda484 | 558 | static inline void fsnotify_update_flags(struct dentry *dentry) |
c28f7e56 EP |
559 | {} |
560 | ||
47882c6f EP |
561 | static inline u32 fsnotify_get_cookie(void) |
562 | { | |
563 | return 0; | |
564 | } | |
565 | ||
74278da9 | 566 | static inline void fsnotify_unmount_inodes(struct super_block *sb) |
164bc619 EP |
567 | {} |
568 | ||
90586523 EP |
569 | #endif /* CONFIG_FSNOTIFY */ |
570 | ||
571 | #endif /* __KERNEL __ */ | |
572 | ||
573 | #endif /* __LINUX_FSNOTIFY_BACKEND_H */ |