Commit | Line | Data |
---|---|---|
b2441318 | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
90586523 EP |
2 | /* |
3 | * Filesystem access notification for Linux | |
4 | * | |
5 | * Copyright (C) 2008 Red Hat, Inc., Eric Paris <eparis@redhat.com> | |
6 | */ | |
7 | ||
8 | #ifndef __LINUX_FSNOTIFY_BACKEND_H | |
9 | #define __LINUX_FSNOTIFY_BACKEND_H | |
10 | ||
11 | #ifdef __KERNEL__ | |
12 | ||
63c882a0 | 13 | #include <linux/idr.h> /* inotify uses this */ |
90586523 EP |
14 | #include <linux/fs.h> /* struct inode */ |
15 | #include <linux/list.h> | |
16 | #include <linux/path.h> /* struct path */ | |
17 | #include <linux/spinlock.h> | |
18 | #include <linux/types.h> | |
60063497 | 19 | #include <linux/atomic.h> |
1cce1eea | 20 | #include <linux/user_namespace.h> |
7761daa6 | 21 | #include <linux/refcount.h> |
90586523 EP |
22 | |
23 | /* | |
24 | * IN_* from inotfy.h lines up EXACTLY with FS_*, this is so we can easily | |
25 | * convert between them. dnotify only needs conversion at watch creation | |
26 | * so no perf loss there. fanotify isn't defined yet, so it can use the | |
27 | * wholes if it needs more events. | |
28 | */ | |
29 | #define FS_ACCESS 0x00000001 /* File was accessed */ | |
30 | #define FS_MODIFY 0x00000002 /* File was modified */ | |
31 | #define FS_ATTRIB 0x00000004 /* Metadata changed */ | |
32 | #define FS_CLOSE_WRITE 0x00000008 /* Writtable file was closed */ | |
33 | #define FS_CLOSE_NOWRITE 0x00000010 /* Unwrittable file closed */ | |
34 | #define FS_OPEN 0x00000020 /* File was opened */ | |
35 | #define FS_MOVED_FROM 0x00000040 /* File was moved from X */ | |
36 | #define FS_MOVED_TO 0x00000080 /* File was moved to Y */ | |
37 | #define FS_CREATE 0x00000100 /* Subfile was created */ | |
38 | #define FS_DELETE 0x00000200 /* Subfile was deleted */ | |
39 | #define FS_DELETE_SELF 0x00000400 /* Self was deleted */ | |
40 | #define FS_MOVE_SELF 0x00000800 /* Self was moved */ | |
9b076f1c | 41 | #define FS_OPEN_EXEC 0x00001000 /* File was opened for exec */ |
90586523 EP |
42 | |
43 | #define FS_UNMOUNT 0x00002000 /* inode on umount fs */ | |
44 | #define FS_Q_OVERFLOW 0x00004000 /* Event queued overflowed */ | |
45 | #define FS_IN_IGNORED 0x00008000 /* last inotify event here */ | |
46 | ||
c4ec54b4 EP |
47 | #define FS_OPEN_PERM 0x00010000 /* open event in an permission hook */ |
48 | #define FS_ACCESS_PERM 0x00020000 /* access event in a permissions hook */ | |
66917a31 | 49 | #define FS_OPEN_EXEC_PERM 0x00040000 /* open/exec event in a permission hook */ |
c4ec54b4 | 50 | |
8c1934c8 | 51 | #define FS_EXCL_UNLINK 0x04000000 /* do not send events if object is unlinked */ |
c28f7e56 EP |
52 | /* This inode cares about things that happen to its children. Always set for |
53 | * dnotify and inotify. */ | |
54 | #define FS_EVENT_ON_CHILD 0x08000000 | |
55 | ||
6473ea76 AG |
56 | #define FS_DN_RENAME 0x10000000 /* file renamed */ |
57 | #define FS_DN_MULTISHOT 0x20000000 /* dnotify multishot */ | |
58 | #define FS_ISDIR 0x40000000 /* event occurred against dir */ | |
59 | #define FS_IN_ONESHOT 0x80000000 /* only send event once */ | |
60 | ||
e9fd702a EP |
61 | #define FS_MOVE (FS_MOVED_FROM | FS_MOVED_TO) |
62 | ||
e220140f AG |
63 | /* |
64 | * Directory entry modification events - reported only to directory | |
65 | * where entry is modified and not to a watching parent. | |
66 | * The watching parent may get an FS_ATTRIB|FS_EVENT_ON_CHILD event | |
67 | * when a directory entry inside a child subdir changes. | |
68 | */ | |
69 | #define ALL_FSNOTIFY_DIRENT_EVENTS (FS_CREATE | FS_DELETE | FS_MOVE) | |
70 | ||
66917a31 MB |
71 | #define ALL_FSNOTIFY_PERM_EVENTS (FS_OPEN_PERM | FS_ACCESS_PERM | \ |
72 | FS_OPEN_EXEC_PERM) | |
ff8bcbd0 | 73 | |
e220140f AG |
74 | /* |
75 | * This is a list of all events that may get sent to a parent based on fs event | |
76 | * happening to inodes inside that directory. | |
77 | */ | |
78 | #define FS_EVENTS_POSS_ON_CHILD (ALL_FSNOTIFY_PERM_EVENTS | \ | |
79 | FS_ACCESS | FS_MODIFY | FS_ATTRIB | \ | |
80 | FS_CLOSE_WRITE | FS_CLOSE_NOWRITE | \ | |
81 | FS_OPEN | FS_OPEN_EXEC) | |
82 | ||
007d1e83 | 83 | /* Events that can be reported to backends */ |
e220140f AG |
84 | #define ALL_FSNOTIFY_EVENTS (ALL_FSNOTIFY_DIRENT_EVENTS | \ |
85 | FS_EVENTS_POSS_ON_CHILD | \ | |
86 | FS_DELETE_SELF | FS_MOVE_SELF | FS_DN_RENAME | \ | |
87 | FS_UNMOUNT | FS_Q_OVERFLOW | FS_IN_IGNORED) | |
007d1e83 AG |
88 | |
89 | /* Extra flags that may be reported with event or control handling of events */ | |
90 | #define ALL_FSNOTIFY_FLAGS (FS_EXCL_UNLINK | FS_ISDIR | FS_IN_ONESHOT | \ | |
20dee624 EP |
91 | FS_DN_MULTISHOT | FS_EVENT_ON_CHILD) |
92 | ||
007d1e83 AG |
93 | #define ALL_FSNOTIFY_BITS (ALL_FSNOTIFY_EVENTS | ALL_FSNOTIFY_FLAGS) |
94 | ||
90586523 EP |
95 | struct fsnotify_group; |
96 | struct fsnotify_event; | |
e61ce867 | 97 | struct fsnotify_mark; |
e4aff117 | 98 | struct fsnotify_event_private_data; |
7053aee2 | 99 | struct fsnotify_fname; |
abc77577 | 100 | struct fsnotify_iter_info; |
90586523 | 101 | |
d46eb14b SB |
102 | struct mem_cgroup; |
103 | ||
90586523 EP |
104 | /* |
105 | * Each group much define these ops. The fsnotify infrastructure will call | |
106 | * these operations for each relevant group. | |
107 | * | |
108 | * handle_event - main call for a group to handle an fs event | |
109 | * free_group_priv - called when a group refcnt hits 0 to clean up the private union | |
6960b0d9 LS |
110 | * freeing_mark - called when a mark is being destroyed for some reason. The group |
111 | * MUST be holding a reference on each mark and that reference must be | |
112 | * dropped in this function. inotify uses this function to send | |
113 | * userspace messages that marks have been removed. | |
90586523 EP |
114 | */ |
115 | struct fsnotify_ops { | |
ce8f76fb | 116 | int (*handle_event)(struct fsnotify_group *group, |
7053aee2 | 117 | struct inode *inode, |
3cd5eca8 | 118 | u32 mask, const void *data, int data_type, |
e43e9c33 | 119 | const struct qstr *file_name, u32 cookie, |
9385a84d | 120 | struct fsnotify_iter_info *iter_info); |
90586523 | 121 | void (*free_group_priv)(struct fsnotify_group *group); |
841bdc10 | 122 | void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group); |
7053aee2 | 123 | void (*free_event)(struct fsnotify_event *event); |
054c636e JK |
124 | /* called on final put+free to free memory */ |
125 | void (*free_mark)(struct fsnotify_mark *mark); | |
7053aee2 JK |
126 | }; |
127 | ||
128 | /* | |
129 | * all of the information about the original object we want to now send to | |
130 | * a group. If you want to carry more info from the accessing task to the | |
131 | * listener this structure is where you need to be adding fields. | |
132 | */ | |
133 | struct fsnotify_event { | |
134 | struct list_head list; | |
135 | /* inode may ONLY be dereferenced during handle_event(). */ | |
136 | struct inode *inode; /* either the inode the event happened to or its parent */ | |
90586523 EP |
137 | }; |
138 | ||
139 | /* | |
140 | * A group is a "thing" that wants to receive notification about filesystem | |
141 | * events. The mask holds the subset of event types this group cares about. | |
142 | * refcnt on a group is up to the implementor and at any moment if it goes 0 | |
143 | * everything will be cleaned up. | |
144 | */ | |
145 | struct fsnotify_group { | |
d46eb14b SB |
146 | const struct fsnotify_ops *ops; /* how this group handles things */ |
147 | ||
90586523 EP |
148 | /* |
149 | * How the refcnt is used is up to each group. When the refcnt hits 0 | |
150 | * fsnotify will clean up all of the resources associated with this group. | |
151 | * As an example, the dnotify group will always have a refcnt=1 and that | |
152 | * will never change. Inotify, on the other hand, has a group per | |
153 | * inotify_init() and the refcnt will hit 0 only when that fd has been | |
154 | * closed. | |
155 | */ | |
7761daa6 | 156 | refcount_t refcnt; /* things with interest in this group */ |
90586523 | 157 | |
a2d8bc6c | 158 | /* needed to send notification to userspace */ |
c21dbe20 | 159 | spinlock_t notification_lock; /* protect the notification_list */ |
a2d8bc6c EP |
160 | struct list_head notification_list; /* list of event_holder this group needs to send to userspace */ |
161 | wait_queue_head_t notification_waitq; /* read() on the notification file blocks on this waitq */ | |
162 | unsigned int q_len; /* events on the queue */ | |
163 | unsigned int max_events; /* maximum events allowed on the list */ | |
6ad2d4e3 EP |
164 | /* |
165 | * Valid fsnotify group priorities. Events are send in order from highest | |
166 | * priority to lowest priority. We default to the lowest priority. | |
167 | */ | |
168 | #define FS_PRIO_0 0 /* normal notifiers, no permissions */ | |
169 | #define FS_PRIO_1 1 /* fanotify content based access control */ | |
170 | #define FS_PRIO_2 2 /* fanotify pre-content access */ | |
171 | unsigned int priority; | |
12703dbf | 172 | bool shutdown; /* group is being shut down, don't queue more events */ |
a2d8bc6c | 173 | |
e61ce867 | 174 | /* stores all fastpath marks assoc with this group so they can be cleaned on unregister */ |
986ab098 | 175 | struct mutex mark_mutex; /* protect marks_list */ |
841bdc10 | 176 | atomic_t num_marks; /* 1 for each mark and 1 for not being |
3be25f49 EP |
177 | * past the point of no return when freeing |
178 | * a group */ | |
d46eb14b SB |
179 | atomic_t user_waits; /* Number of tasks waiting for user |
180 | * response */ | |
e61ce867 | 181 | struct list_head marks_list; /* all inode marks for this group */ |
3be25f49 | 182 | |
7053aee2 JK |
183 | struct fasync_struct *fsn_fa; /* async notification */ |
184 | ||
ff57cd58 | 185 | struct fsnotify_event *overflow_event; /* Event we queue when the |
7053aee2 JK |
186 | * notification list is too |
187 | * full */ | |
d46eb14b SB |
188 | |
189 | struct mem_cgroup *memcg; /* memcg to charge allocations */ | |
0a6b6bd5 | 190 | |
90586523 EP |
191 | /* groups can define private fields here or use the void *private */ |
192 | union { | |
193 | void *private; | |
63c882a0 EP |
194 | #ifdef CONFIG_INOTIFY_USER |
195 | struct inotify_group_private_data { | |
196 | spinlock_t idr_lock; | |
197 | struct idr idr; | |
1cce1eea | 198 | struct ucounts *ucounts; |
63c882a0 | 199 | } inotify_data; |
9e66e423 | 200 | #endif |
80af2588 | 201 | #ifdef CONFIG_FANOTIFY |
9e66e423 EP |
202 | struct fanotify_group_private_data { |
203 | /* allows a group to block waiting for a userspace response */ | |
9e66e423 EP |
204 | struct list_head access_list; |
205 | wait_queue_head_t access_waitq; | |
96a71f21 AG |
206 | int flags; /* flags from fanotify_init() */ |
207 | int f_flags; /* event_f_flags from fanotify_init() */ | |
e7099d8a | 208 | unsigned int max_marks; |
4afeff85 | 209 | struct user_struct *user; |
9e66e423 | 210 | } fanotify_data; |
80af2588 | 211 | #endif /* CONFIG_FANOTIFY */ |
90586523 EP |
212 | }; |
213 | }; | |
214 | ||
aa93bdc5 AG |
215 | /* When calling fsnotify tell it if the data is a path or inode */ |
216 | enum fsnotify_data_type { | |
217 | FSNOTIFY_EVENT_NONE, | |
218 | FSNOTIFY_EVENT_PATH, | |
219 | FSNOTIFY_EVENT_INODE, | |
220 | }; | |
221 | ||
222 | static inline const struct inode *fsnotify_data_inode(const void *data, | |
223 | int data_type) | |
224 | { | |
225 | switch (data_type) { | |
226 | case FSNOTIFY_EVENT_INODE: | |
227 | return data; | |
228 | case FSNOTIFY_EVENT_PATH: | |
229 | return d_inode(((const struct path *)data)->dentry); | |
230 | default: | |
231 | return NULL; | |
232 | } | |
233 | } | |
234 | ||
235 | static inline const struct path *fsnotify_data_path(const void *data, | |
236 | int data_type) | |
237 | { | |
238 | switch (data_type) { | |
239 | case FSNOTIFY_EVENT_PATH: | |
240 | return data; | |
241 | default: | |
242 | return NULL; | |
243 | } | |
244 | } | |
90586523 | 245 | |
d6f7b98b AG |
246 | enum fsnotify_obj_type { |
247 | FSNOTIFY_OBJ_TYPE_INODE, | |
248 | FSNOTIFY_OBJ_TYPE_VFSMOUNT, | |
1e6cb723 | 249 | FSNOTIFY_OBJ_TYPE_SB, |
d6f7b98b AG |
250 | FSNOTIFY_OBJ_TYPE_COUNT, |
251 | FSNOTIFY_OBJ_TYPE_DETACHED = FSNOTIFY_OBJ_TYPE_COUNT | |
252 | }; | |
253 | ||
254 | #define FSNOTIFY_OBJ_TYPE_INODE_FL (1U << FSNOTIFY_OBJ_TYPE_INODE) | |
255 | #define FSNOTIFY_OBJ_TYPE_VFSMOUNT_FL (1U << FSNOTIFY_OBJ_TYPE_VFSMOUNT) | |
1e6cb723 | 256 | #define FSNOTIFY_OBJ_TYPE_SB_FL (1U << FSNOTIFY_OBJ_TYPE_SB) |
d6f7b98b AG |
257 | #define FSNOTIFY_OBJ_ALL_TYPES_MASK ((1U << FSNOTIFY_OBJ_TYPE_COUNT) - 1) |
258 | ||
b812a9f5 AG |
259 | static inline bool fsnotify_valid_obj_type(unsigned int type) |
260 | { | |
261 | return (type < FSNOTIFY_OBJ_TYPE_COUNT); | |
262 | } | |
263 | ||
5b0457ad | 264 | struct fsnotify_iter_info { |
47d9c7cc | 265 | struct fsnotify_mark *marks[FSNOTIFY_OBJ_TYPE_COUNT]; |
5b0457ad AG |
266 | unsigned int report_mask; |
267 | int srcu_idx; | |
268 | }; | |
269 | ||
47d9c7cc AG |
270 | static inline bool fsnotify_iter_should_report_type( |
271 | struct fsnotify_iter_info *iter_info, int type) | |
272 | { | |
273 | return (iter_info->report_mask & (1U << type)); | |
274 | } | |
275 | ||
276 | static inline void fsnotify_iter_set_report_type( | |
277 | struct fsnotify_iter_info *iter_info, int type) | |
278 | { | |
279 | iter_info->report_mask |= (1U << type); | |
280 | } | |
281 | ||
282 | static inline void fsnotify_iter_set_report_type_mark( | |
283 | struct fsnotify_iter_info *iter_info, int type, | |
284 | struct fsnotify_mark *mark) | |
285 | { | |
286 | iter_info->marks[type] = mark; | |
287 | iter_info->report_mask |= (1U << type); | |
288 | } | |
289 | ||
5b0457ad AG |
290 | #define FSNOTIFY_ITER_FUNCS(name, NAME) \ |
291 | static inline struct fsnotify_mark *fsnotify_iter_##name##_mark( \ | |
292 | struct fsnotify_iter_info *iter_info) \ | |
293 | { \ | |
294 | return (iter_info->report_mask & FSNOTIFY_OBJ_TYPE_##NAME##_FL) ? \ | |
47d9c7cc | 295 | iter_info->marks[FSNOTIFY_OBJ_TYPE_##NAME] : NULL; \ |
5b0457ad AG |
296 | } |
297 | ||
298 | FSNOTIFY_ITER_FUNCS(inode, INODE) | |
299 | FSNOTIFY_ITER_FUNCS(vfsmount, VFSMOUNT) | |
1e6cb723 | 300 | FSNOTIFY_ITER_FUNCS(sb, SB) |
5b0457ad | 301 | |
47d9c7cc AG |
302 | #define fsnotify_foreach_obj_type(type) \ |
303 | for (type = 0; type < FSNOTIFY_OBJ_TYPE_COUNT; type++) | |
304 | ||
36f10f55 AG |
305 | /* |
306 | * fsnotify_connp_t is what we embed in objects which connector can be attached | |
307 | * to. fsnotify_connp_t * is how we refer from connector back to object. | |
308 | */ | |
309 | struct fsnotify_mark_connector; | |
310 | typedef struct fsnotify_mark_connector __rcu *fsnotify_connp_t; | |
311 | ||
9dd813c1 | 312 | /* |
1e6cb723 AG |
313 | * Inode/vfsmount/sb point to this structure which tracks all marks attached to |
314 | * the inode/vfsmount/sb. The reference to inode/vfsmount/sb is held by this | |
08991e83 JK |
315 | * structure. We destroy this structure when there are no more marks attached |
316 | * to it. The structure is protected by fsnotify_mark_srcu. | |
9dd813c1 JK |
317 | */ |
318 | struct fsnotify_mark_connector { | |
04662cab | 319 | spinlock_t lock; |
c285a2f0 AG |
320 | unsigned short type; /* Type of object [lock] */ |
321 | #define FSNOTIFY_CONN_FLAG_HAS_FSID 0x01 | |
322 | unsigned short flags; /* flags [lock] */ | |
77115225 | 323 | __kernel_fsid_t fsid; /* fsid of filesystem containing object */ |
36f10f55 AG |
324 | union { |
325 | /* Object pointer [lock] */ | |
326 | fsnotify_connp_t *obj; | |
08991e83 JK |
327 | /* Used listing heads to free after srcu period expires */ |
328 | struct fsnotify_mark_connector *destroy_next; | |
329 | }; | |
d90a10e2 | 330 | struct hlist_head list; |
9dd813c1 JK |
331 | }; |
332 | ||
3be25f49 | 333 | /* |
1e39fc01 | 334 | * A mark is simply an object attached to an in core inode which allows an |
3be25f49 EP |
335 | * fsnotify listener to indicate they are either no longer interested in events |
336 | * of a type matching mask or only interested in those events. | |
337 | * | |
1e39fc01 JK |
338 | * These are flushed when an inode is evicted from core and may be flushed |
339 | * when the inode is modified (as seen by fsnotify_access). Some fsnotify | |
340 | * users (such as dnotify) will flush these when the open fd is closed and not | |
341 | * at inode eviction or modification. | |
342 | * | |
343 | * Text in brackets is showing the lock(s) protecting modifications of a | |
344 | * particular entry. obj_lock means either inode->i_lock or | |
345 | * mnt->mnt_root->d_lock depending on the mark type. | |
3be25f49 | 346 | */ |
e61ce867 | 347 | struct fsnotify_mark { |
1e39fc01 JK |
348 | /* Mask this mark is for [mark->lock, group->mark_mutex] */ |
349 | __u32 mask; | |
350 | /* We hold one for presence in g_list. Also one ref for each 'thing' | |
3be25f49 | 351 | * in kernel that found and may be using this mark. */ |
ab97f873 | 352 | refcount_t refcnt; |
1e39fc01 JK |
353 | /* Group this mark is for. Set on mark creation, stable until last ref |
354 | * is dropped */ | |
355 | struct fsnotify_group *group; | |
8e984f86 | 356 | /* List of marks by group->marks_list. Also reused for queueing |
1e39fc01 JK |
357 | * mark into destroy_list when it's waiting for the end of SRCU period |
358 | * before it can be freed. [group->mark_mutex] */ | |
13d34ac6 | 359 | struct list_head g_list; |
1e39fc01 JK |
360 | /* Protects inode / mnt pointers, flags, masks */ |
361 | spinlock_t lock; | |
6b3f05d2 | 362 | /* List of marks for inode / vfsmount [connector->lock, mark ref] */ |
1e39fc01 | 363 | struct hlist_node obj_list; |
6b3f05d2 | 364 | /* Head of list of marks for an object [mark ref] */ |
86ffe245 | 365 | struct fsnotify_mark_connector *connector; |
1e39fc01 JK |
366 | /* Events types to ignore [mark->lock, group->mark_mutex] */ |
367 | __u32 ignored_mask; | |
e911d8af JK |
368 | #define FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY 0x01 |
369 | #define FSNOTIFY_MARK_FLAG_ALIVE 0x02 | |
370 | #define FSNOTIFY_MARK_FLAG_ATTACHED 0x04 | |
1e39fc01 | 371 | unsigned int flags; /* flags [mark->lock] */ |
3be25f49 EP |
372 | }; |
373 | ||
90586523 EP |
374 | #ifdef CONFIG_FSNOTIFY |
375 | ||
376 | /* called from the vfs helpers */ | |
377 | ||
378 | /* main fsnotify call to send events */ | |
e637835e | 379 | extern int fsnotify(struct inode *to_tell, __u32 mask, const void *data, int data_is, |
25b229df | 380 | const struct qstr *name, u32 cookie); |
12c7f9dc | 381 | extern int __fsnotify_parent(const struct path *path, struct dentry *dentry, __u32 mask); |
3be25f49 | 382 | extern void __fsnotify_inode_delete(struct inode *inode); |
ca9c726e | 383 | extern void __fsnotify_vfsmount_delete(struct vfsmount *mnt); |
1e6cb723 | 384 | extern void fsnotify_sb_delete(struct super_block *sb); |
47882c6f | 385 | extern u32 fsnotify_get_cookie(void); |
90586523 | 386 | |
c28f7e56 EP |
387 | static inline int fsnotify_inode_watches_children(struct inode *inode) |
388 | { | |
389 | /* FS_EVENT_ON_CHILD is set if the inode may care */ | |
390 | if (!(inode->i_fsnotify_mask & FS_EVENT_ON_CHILD)) | |
391 | return 0; | |
392 | /* this inode might care about child events, does it care about the | |
393 | * specific set of events that can happen on a child? */ | |
394 | return inode->i_fsnotify_mask & FS_EVENTS_POSS_ON_CHILD; | |
395 | } | |
396 | ||
397 | /* | |
398 | * Update the dentry with a flag indicating the interest of its parent to receive | |
399 | * filesystem events when those events happens to this dentry->d_inode. | |
400 | */ | |
affda484 | 401 | static inline void fsnotify_update_flags(struct dentry *dentry) |
c28f7e56 | 402 | { |
c28f7e56 EP |
403 | assert_spin_locked(&dentry->d_lock); |
404 | ||
b5c84bf6 NP |
405 | /* |
406 | * Serialisation of setting PARENT_WATCHED on the dentries is provided | |
407 | * by d_lock. If inotify_inode_watched changes after we have taken | |
408 | * d_lock, the following __fsnotify_update_child_dentry_flags call will | |
409 | * find our entry, so it will spin until we complete here, and update | |
410 | * us with the new state. | |
411 | */ | |
affda484 | 412 | if (fsnotify_inode_watches_children(dentry->d_parent->d_inode)) |
c28f7e56 EP |
413 | dentry->d_flags |= DCACHE_FSNOTIFY_PARENT_WATCHED; |
414 | else | |
415 | dentry->d_flags &= ~DCACHE_FSNOTIFY_PARENT_WATCHED; | |
416 | } | |
417 | ||
90586523 EP |
418 | /* called from fsnotify listeners, such as fanotify or dnotify */ |
419 | ||
98612952 | 420 | /* create a new group */ |
0d2e2a1d | 421 | extern struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops); |
98612952 LS |
422 | /* get reference to a group */ |
423 | extern void fsnotify_get_group(struct fsnotify_group *group); | |
ffab8340 | 424 | /* drop reference on a group from fsnotify_alloc_group */ |
90586523 | 425 | extern void fsnotify_put_group(struct fsnotify_group *group); |
12703dbf JK |
426 | /* group destruction begins, stop queuing new events */ |
427 | extern void fsnotify_group_stop_queueing(struct fsnotify_group *group); | |
d8153d4d LS |
428 | /* destroy group */ |
429 | extern void fsnotify_destroy_group(struct fsnotify_group *group); | |
0a6b6bd5 EP |
430 | /* fasync handler function */ |
431 | extern int fsnotify_fasync(int fd, struct file *file, int on); | |
7053aee2 JK |
432 | /* Free event from memory */ |
433 | extern void fsnotify_destroy_event(struct fsnotify_group *group, | |
434 | struct fsnotify_event *event); | |
a2d8bc6c | 435 | /* attach the event to the group notification queue */ |
8ba8fa91 JK |
436 | extern int fsnotify_add_event(struct fsnotify_group *group, |
437 | struct fsnotify_event *event, | |
438 | int (*merge)(struct list_head *, | |
439 | struct fsnotify_event *)); | |
7b1f6417 JK |
440 | /* Queue overflow event to a notification group */ |
441 | static inline void fsnotify_queue_overflow(struct fsnotify_group *group) | |
442 | { | |
443 | fsnotify_add_event(group, group->overflow_event, NULL); | |
444 | } | |
445 | ||
a2d8bc6c EP |
446 | /* true if the group notification queue is empty */ |
447 | extern bool fsnotify_notify_queue_is_empty(struct fsnotify_group *group); | |
448 | /* return, but do not dequeue the first event on the notification queue */ | |
8ba8fa91 | 449 | extern struct fsnotify_event *fsnotify_peek_first_event(struct fsnotify_group *group); |
e4aff117 | 450 | /* return AND dequeue the first event on the notification queue */ |
8ba8fa91 | 451 | extern struct fsnotify_event *fsnotify_remove_first_event(struct fsnotify_group *group); |
f7db89ac JK |
452 | /* Remove event queued in the notification list */ |
453 | extern void fsnotify_remove_queued_event(struct fsnotify_group *group, | |
454 | struct fsnotify_event *event); | |
a2d8bc6c | 455 | |
3be25f49 EP |
456 | /* functions used to manipulate the marks attached to inodes */ |
457 | ||
3ac70bfc AG |
458 | /* Get mask of events for a list of marks */ |
459 | extern __u32 fsnotify_conn_mask(struct fsnotify_mark_connector *conn); | |
a242677b JK |
460 | /* Calculate mask of events for a list of marks */ |
461 | extern void fsnotify_recalc_mask(struct fsnotify_mark_connector *conn); | |
7b129323 | 462 | extern void fsnotify_init_mark(struct fsnotify_mark *mark, |
054c636e | 463 | struct fsnotify_group *group); |
b1362edf | 464 | /* Find mark belonging to given group in the list of marks */ |
9b6e5434 AG |
465 | extern struct fsnotify_mark *fsnotify_find_mark(fsnotify_connp_t *connp, |
466 | struct fsnotify_group *group); | |
77115225 AG |
467 | /* Get cached fsid of filesystem containing object */ |
468 | extern int fsnotify_get_conn_fsid(const struct fsnotify_mark_connector *conn, | |
469 | __kernel_fsid_t *fsid); | |
b812a9f5 AG |
470 | /* attach the mark to the object */ |
471 | extern int fsnotify_add_mark(struct fsnotify_mark *mark, | |
472 | fsnotify_connp_t *connp, unsigned int type, | |
77115225 | 473 | int allow_dups, __kernel_fsid_t *fsid); |
7b129323 | 474 | extern int fsnotify_add_mark_locked(struct fsnotify_mark *mark, |
77115225 AG |
475 | fsnotify_connp_t *connp, |
476 | unsigned int type, int allow_dups, | |
477 | __kernel_fsid_t *fsid); | |
478 | ||
b249f5be AG |
479 | /* attach the mark to the inode */ |
480 | static inline int fsnotify_add_inode_mark(struct fsnotify_mark *mark, | |
481 | struct inode *inode, | |
482 | int allow_dups) | |
483 | { | |
b812a9f5 | 484 | return fsnotify_add_mark(mark, &inode->i_fsnotify_marks, |
77115225 | 485 | FSNOTIFY_OBJ_TYPE_INODE, allow_dups, NULL); |
b249f5be AG |
486 | } |
487 | static inline int fsnotify_add_inode_mark_locked(struct fsnotify_mark *mark, | |
488 | struct inode *inode, | |
489 | int allow_dups) | |
490 | { | |
b812a9f5 | 491 | return fsnotify_add_mark_locked(mark, &inode->i_fsnotify_marks, |
77115225 AG |
492 | FSNOTIFY_OBJ_TYPE_INODE, allow_dups, |
493 | NULL); | |
b249f5be | 494 | } |
77115225 | 495 | |
e2a29943 LS |
496 | /* given a group and a mark, flag mark to be freed when all references are dropped */ |
497 | extern void fsnotify_destroy_mark(struct fsnotify_mark *mark, | |
498 | struct fsnotify_group *group); | |
4712e722 JK |
499 | /* detach mark from inode / mount list, group list, drop inode reference */ |
500 | extern void fsnotify_detach_mark(struct fsnotify_mark *mark); | |
501 | /* free mark */ | |
502 | extern void fsnotify_free_mark(struct fsnotify_mark *mark); | |
b72679ee TM |
503 | /* Wait until all marks queued for destruction are destroyed */ |
504 | extern void fsnotify_wait_marks_destroyed(void); | |
86ffe245 | 505 | /* run all the marks in a group, and clear all of the marks attached to given object type */ |
18f2e0d3 | 506 | extern void fsnotify_clear_marks_by_group(struct fsnotify_group *group, unsigned int type); |
416bcdbc JK |
507 | /* run all the marks in a group, and clear all of the vfsmount marks */ |
508 | static inline void fsnotify_clear_vfsmount_marks_by_group(struct fsnotify_group *group) | |
509 | { | |
d6f7b98b | 510 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_VFSMOUNT_FL); |
416bcdbc JK |
511 | } |
512 | /* run all the marks in a group, and clear all of the inode marks */ | |
513 | static inline void fsnotify_clear_inode_marks_by_group(struct fsnotify_group *group) | |
514 | { | |
d6f7b98b | 515 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_INODE_FL); |
416bcdbc | 516 | } |
1e6cb723 AG |
517 | /* run all the marks in a group, and clear all of the sn marks */ |
518 | static inline void fsnotify_clear_sb_marks_by_group(struct fsnotify_group *group) | |
519 | { | |
520 | fsnotify_clear_marks_by_group(group, FSNOTIFY_OBJ_TYPE_SB_FL); | |
521 | } | |
841bdc10 EP |
522 | extern void fsnotify_get_mark(struct fsnotify_mark *mark); |
523 | extern void fsnotify_put_mark(struct fsnotify_mark *mark); | |
abc77577 JK |
524 | extern void fsnotify_finish_user_wait(struct fsnotify_iter_info *iter_info); |
525 | extern bool fsnotify_prepare_user_wait(struct fsnotify_iter_info *iter_info); | |
3be25f49 | 526 | |
a0a92d26 AG |
527 | static inline void fsnotify_init_event(struct fsnotify_event *event, |
528 | struct inode *inode) | |
529 | { | |
530 | INIT_LIST_HEAD(&event->list); | |
531 | event->inode = inode; | |
532 | } | |
b4e4e140 | 533 | |
90586523 EP |
534 | #else |
535 | ||
e637835e | 536 | static inline int fsnotify(struct inode *to_tell, __u32 mask, const void *data, int data_is, |
25b229df | 537 | const struct qstr *name, u32 cookie) |
c4ec54b4 EP |
538 | { |
539 | return 0; | |
540 | } | |
3be25f49 | 541 | |
12c7f9dc | 542 | static inline int __fsnotify_parent(const struct path *path, struct dentry *dentry, __u32 mask) |
52420392 EP |
543 | { |
544 | return 0; | |
545 | } | |
c28f7e56 | 546 | |
3be25f49 EP |
547 | static inline void __fsnotify_inode_delete(struct inode *inode) |
548 | {} | |
549 | ||
ca9c726e AG |
550 | static inline void __fsnotify_vfsmount_delete(struct vfsmount *mnt) |
551 | {} | |
552 | ||
1e6cb723 AG |
553 | static inline void fsnotify_sb_delete(struct super_block *sb) |
554 | {} | |
555 | ||
affda484 | 556 | static inline void fsnotify_update_flags(struct dentry *dentry) |
c28f7e56 EP |
557 | {} |
558 | ||
47882c6f EP |
559 | static inline u32 fsnotify_get_cookie(void) |
560 | { | |
561 | return 0; | |
562 | } | |
563 | ||
74278da9 | 564 | static inline void fsnotify_unmount_inodes(struct super_block *sb) |
164bc619 EP |
565 | {} |
566 | ||
90586523 EP |
567 | #endif /* CONFIG_FSNOTIFY */ |
568 | ||
569 | #endif /* __KERNEL __ */ | |
570 | ||
571 | #endif /* __LINUX_FSNOTIFY_BACKEND_H */ |