]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/notify/inotify/inotify_fsnotify.c
inotify: allow users to request not to recieve events on unlinked children
[net-next-2.6.git] / fs / notify / inotify / inotify_fsnotify.c
CommitLineData
63c882a0
EP
1/*
2 * fs/inotify_user.c - inotify support for userspace
3 *
4 * Authors:
5 * John McCutchan <ttb@tentacle.dhs.org>
6 * Robert Love <rml@novell.com>
7 *
8 * Copyright (C) 2005 John McCutchan
9 * Copyright 2006 Hewlett-Packard Development Company, L.P.
10 *
11 * Copyright (C) 2009 Eric Paris <Red Hat Inc>
12 * inotify was largely rewriten to make use of the fsnotify infrastructure
13 *
14 * This program is free software; you can redistribute it and/or modify it
15 * under the terms of the GNU General Public License as published by the
16 * Free Software Foundation; either version 2, or (at your option) any
17 * later version.
18 *
19 * This program is distributed in the hope that it will be useful, but
20 * WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
22 * General Public License for more details.
23 */
24
8c1934c8 25#include <linux/dcache.h> /* d_unlinked */
63c882a0
EP
26#include <linux/fs.h> /* struct inode */
27#include <linux/fsnotify_backend.h>
28#include <linux/inotify.h>
29#include <linux/path.h> /* struct path */
30#include <linux/slab.h> /* kmem_* */
31#include <linux/types.h>
b3b38d84 32#include <linux/sched.h>
63c882a0
EP
33
34#include "inotify.h"
35
74766bbf
EP
36/*
37 * Check if 2 events contain the same information. We do not compare private data
38 * but at this moment that isn't a problem for any know fsnotify listeners.
39 */
40static bool event_compare(struct fsnotify_event *old, struct fsnotify_event *new)
41{
42 if ((old->mask == new->mask) &&
43 (old->to_tell == new->to_tell) &&
44 (old->data_type == new->data_type) &&
45 (old->name_len == new->name_len)) {
46 switch (old->data_type) {
47 case (FSNOTIFY_EVENT_INODE):
48 /* remember, after old was put on the wait_q we aren't
49 * allowed to look at the inode any more, only thing
50 * left to check was if the file_name is the same */
51 if (!old->name_len ||
52 !strcmp(old->file_name, new->file_name))
53 return true;
54 break;
55 case (FSNOTIFY_EVENT_PATH):
56 if ((old->path.mnt == new->path.mnt) &&
57 (old->path.dentry == new->path.dentry))
58 return true;
59 break;
60 case (FSNOTIFY_EVENT_NONE):
61 if (old->mask & FS_Q_OVERFLOW)
62 return true;
63 else if (old->mask & FS_IN_IGNORED)
64 return false;
65 return true;
66 };
67 }
68 return false;
69}
70
6e5f77b3
EP
71static int inotify_merge(struct list_head *list,
72 struct fsnotify_event *event,
73 void **arg)
74766bbf
EP
74{
75 struct fsnotify_event_holder *last_holder;
76 struct fsnotify_event *last_event;
77 int ret = 0;
78
79 /* and the list better be locked by something too */
80 spin_lock(&event->lock);
81
82 last_holder = list_entry(list->prev, struct fsnotify_event_holder, event_list);
83 last_event = last_holder->event;
84 if (event_compare(last_event, event))
85 ret = -EEXIST;
86
87 spin_unlock(&event->lock);
88
89 return ret;
90}
91
63c882a0
EP
92static int inotify_handle_event(struct fsnotify_group *group, struct fsnotify_event *event)
93{
000285de
EP
94 struct fsnotify_mark *fsn_mark;
95 struct inotify_inode_mark *i_mark;
63c882a0
EP
96 struct inode *to_tell;
97 struct inotify_event_private_data *event_priv;
98 struct fsnotify_event_private_data *fsn_event_priv;
99 int wd, ret;
100
101 to_tell = event->to_tell;
102
5444e298 103 fsn_mark = fsnotify_find_inode_mark(group, to_tell);
63c882a0 104 /* race with watch removal? We already passes should_send */
000285de 105 if (unlikely(!fsn_mark))
63c882a0 106 return 0;
000285de
EP
107 i_mark = container_of(fsn_mark, struct inotify_inode_mark,
108 fsn_mark);
109 wd = i_mark->wd;
63c882a0
EP
110
111 event_priv = kmem_cache_alloc(event_priv_cachep, GFP_KERNEL);
112 if (unlikely(!event_priv))
113 return -ENOMEM;
114
115 fsn_event_priv = &event_priv->fsnotify_event_priv_data;
116
117 fsn_event_priv->group = group;
118 event_priv->wd = wd;
119
6e5f77b3 120 ret = fsnotify_add_notify_event(group, event, fsn_event_priv, inotify_merge, NULL);
eef3a116 121 if (ret) {
63c882a0 122 inotify_free_event_priv(fsn_event_priv);
eef3a116
EP
123 /* EEXIST says we tail matched, EOVERFLOW isn't something
124 * to report up the stack. */
125 if ((ret == -EEXIST) ||
126 (ret == -EOVERFLOW))
127 ret = 0;
128 }
63c882a0 129
ff311008
EP
130 if (fsn_mark->mask & IN_ONESHOT)
131 fsnotify_destroy_mark(fsn_mark);
132
63c882a0 133 /*
000285de 134 * If we hold the fsn_mark until after the event is on the queue
63c882a0
EP
135 * IN_IGNORED won't be able to pass this event in the queue
136 */
000285de 137 fsnotify_put_mark(fsn_mark);
63c882a0
EP
138
139 return ret;
140}
141
000285de 142static void inotify_freeing_mark(struct fsnotify_mark *fsn_mark, struct fsnotify_group *group)
63c882a0 143{
000285de 144 inotify_ignored_and_remove_idr(fsn_mark, group);
63c882a0
EP
145}
146
7b0a04fb 147static bool inotify_should_send_event(struct fsnotify_group *group, struct inode *inode,
3a9fb89f
EP
148 struct vfsmount *mnt, __u32 mask, void *data,
149 int data_type)
63c882a0 150{
000285de 151 struct fsnotify_mark *fsn_mark;
63c882a0
EP
152 bool send;
153
5444e298 154 fsn_mark = fsnotify_find_inode_mark(group, inode);
000285de 155 if (!fsn_mark)
63c882a0
EP
156 return false;
157
e42e2773 158 mask = (mask & ~FS_EVENT_ON_CHILD);
000285de 159 send = (fsn_mark->mask & mask);
63c882a0 160
8c1934c8
EP
161 if (send && (fsn_mark->mask & FS_EXCL_UNLINK) &&
162 (data_type == FSNOTIFY_EVENT_PATH)) {
163 struct path *path = data;
164
165 if (d_unlinked(path->dentry))
166 send = false;
167 }
168
63c882a0 169 /* find took a reference */
000285de 170 fsnotify_put_mark(fsn_mark);
63c882a0
EP
171
172 return send;
173}
174
cf437426
EP
175/*
176 * This is NEVER supposed to be called. Inotify marks should either have been
177 * removed from the idr when the watch was removed or in the
178 * fsnotify_destroy_mark_by_group() call when the inotify instance was being
179 * torn down. This is only called if the idr is about to be freed but there
180 * are still marks in it.
181 */
63c882a0
EP
182static int idr_callback(int id, void *p, void *data)
183{
000285de
EP
184 struct fsnotify_mark *fsn_mark;
185 struct inotify_inode_mark *i_mark;
cf437426
EP
186 static bool warned = false;
187
188 if (warned)
189 return 0;
190
976ae32b 191 warned = true;
000285de
EP
192 fsn_mark = p;
193 i_mark = container_of(fsn_mark, struct inotify_inode_mark, fsn_mark);
cf437426 194
000285de 195 WARN(1, "inotify closing but id=%d for fsn_mark=%p in group=%p still in "
cf437426
EP
196 "idr. Probably leaking memory\n", id, p, data);
197
198 /*
199 * I'm taking the liberty of assuming that the mark in question is a
200 * valid address and I'm dereferencing it. This might help to figure
201 * out why we got here and the panic is no worse than the original
202 * BUG() that was here.
203 */
000285de
EP
204 if (fsn_mark)
205 printk(KERN_WARNING "fsn_mark->group=%p inode=%p wd=%d\n",
206 fsn_mark->group, fsn_mark->i.inode, i_mark->wd);
63c882a0
EP
207 return 0;
208}
209
210static void inotify_free_group_priv(struct fsnotify_group *group)
211{
212 /* ideally the idr is empty and we won't hit the BUG in teh callback */
cf437426 213 idr_for_each(&group->inotify_data.idr, idr_callback, group);
63c882a0
EP
214 idr_remove_all(&group->inotify_data.idr);
215 idr_destroy(&group->inotify_data.idr);
b3b38d84 216 free_uid(group->inotify_data.user);
63c882a0
EP
217}
218
219void inotify_free_event_priv(struct fsnotify_event_private_data *fsn_event_priv)
220{
221 struct inotify_event_private_data *event_priv;
222
223
224 event_priv = container_of(fsn_event_priv, struct inotify_event_private_data,
225 fsnotify_event_priv_data);
226
227 kmem_cache_free(event_priv_cachep, event_priv);
228}
229
230const struct fsnotify_ops inotify_fsnotify_ops = {
231 .handle_event = inotify_handle_event,
232 .should_send_event = inotify_should_send_event,
233 .free_group_priv = inotify_free_group_priv,
234 .free_event_priv = inotify_free_event_priv,
235 .freeing_mark = inotify_freeing_mark,
236};