blob: e3e855ff0dd85f47e76ea08db89f01dea837ece8 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Directory notifications for Linux.
3 *
4 * Copyright (C) 2000,2001,2002 Stephen Rothwell
5 *
Eric Paris3c5119c2009-05-21 17:01:33 -04006 * Copyright (C) 2009 Eric Paris <Red Hat Inc>
7 * dnotify was largly rewritten to use the new fsnotify infrastructure
8 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the
11 * Free Software Foundation; either version 2, or (at your option) any
12 * later version.
13 *
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
18 */
19#include <linux/fs.h>
20#include <linux/module.h>
21#include <linux/sched.h>
22#include <linux/dnotify.h>
23#include <linux/init.h>
24#include <linux/spinlock.h>
25#include <linux/slab.h>
Al Viro9f3acc32008-04-24 07:44:08 -040026#include <linux/fdtable.h>
Eric Paris3c5119c2009-05-21 17:01:33 -040027#include <linux/fsnotify_backend.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028
Eric Dumazetfa3536c2006-03-26 01:37:24 -080029int dir_notify_enable __read_mostly = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Eric Paris3c5119c2009-05-21 17:01:33 -040031static struct kmem_cache *dnotify_struct_cache __read_mostly;
Eric Parisef5e2b72009-12-17 21:24:24 -050032static struct kmem_cache *dnotify_mark_cache __read_mostly;
Eric Paris3c5119c2009-05-21 17:01:33 -040033static struct fsnotify_group *dnotify_group __read_mostly;
34static DEFINE_MUTEX(dnotify_mark_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
Eric Paris3c5119c2009-05-21 17:01:33 -040036/*
Eric Parise61ce862009-12-17 21:24:24 -050037 * dnotify will attach one of these to each inode (i_fsnotify_marks) which
Eric Paris3c5119c2009-05-21 17:01:33 -040038 * is being watched by dnotify. If multiple userspace applications are watching
39 * the same directory with dnotify their information is chained in dn
40 */
Eric Parisef5e2b72009-12-17 21:24:24 -050041struct dnotify_mark {
42 struct fsnotify_mark fsn_mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -070043 struct dnotify_struct *dn;
Eric Paris3c5119c2009-05-21 17:01:33 -040044};
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Eric Paris3c5119c2009-05-21 17:01:33 -040046/*
47 * When a process starts or stops watching an inode the set of events which
48 * dnotify cares about for that inode may change. This function runs the
49 * list of everything receiving dnotify events about this directory and calculates
50 * the set of all those events. After it updates what dnotify is interested in
51 * it calls the fsnotify function so it can update the set of all events relevant
52 * to this inode.
53 */
Eric Parisef5e2b72009-12-17 21:24:24 -050054static void dnotify_recalc_inode_mask(struct fsnotify_mark *fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -040055{
56 __u32 new_mask, old_mask;
57 struct dnotify_struct *dn;
Eric Parisef5e2b72009-12-17 21:24:24 -050058 struct dnotify_mark *dn_mark = container_of(fsn_mark,
59 struct dnotify_mark,
60 fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -040061
Eric Parisef5e2b72009-12-17 21:24:24 -050062 assert_spin_locked(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -040063
Eric Parisef5e2b72009-12-17 21:24:24 -050064 old_mask = fsn_mark->mask;
Linus Torvalds1da177e2005-04-16 15:20:36 -070065 new_mask = 0;
Eric Parisef5e2b72009-12-17 21:24:24 -050066 for (dn = dn_mark->dn; dn != NULL; dn = dn->dn_next)
Eric Paris3c5119c2009-05-21 17:01:33 -040067 new_mask |= (dn->dn_mask & ~FS_DN_MULTISHOT);
Eric Paris90b1e7a2009-12-17 21:24:33 -050068 fsnotify_set_mark_mask_locked(fsn_mark, new_mask);
Linus Torvalds1da177e2005-04-16 15:20:36 -070069
Eric Paris3c5119c2009-05-21 17:01:33 -040070 if (old_mask == new_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -070071 return;
Eric Paris3c5119c2009-05-21 17:01:33 -040072
Eric Parisef5e2b72009-12-17 21:24:24 -050073 if (fsn_mark->i.inode)
74 fsnotify_recalc_inode_mask(fsn_mark->i.inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070075}
76
Eric Paris3c5119c2009-05-21 17:01:33 -040077/*
78 * Mains fsnotify call where events are delivered to dnotify.
79 * Find the dnotify mark on the relevant inode, run the list of dnotify structs
80 * on that mark and determine which of them has expressed interest in receiving
81 * events of this type. When found send the correct process and signal and
82 * destroy the dnotify struct if it was not registered to receive multiple
83 * events.
84 */
85static int dnotify_handle_event(struct fsnotify_group *group,
Eric Paris3a9b16b2010-07-28 10:18:38 -040086 struct fsnotify_mark *mark,
Eric Paris3c5119c2009-05-21 17:01:33 -040087 struct fsnotify_event *event)
Linus Torvalds1da177e2005-04-16 15:20:36 -070088{
Eric Parisef5e2b72009-12-17 21:24:24 -050089 struct dnotify_mark *dn_mark;
Eric Paris3c5119c2009-05-21 17:01:33 -040090 struct inode *to_tell;
Linus Torvalds1da177e2005-04-16 15:20:36 -070091 struct dnotify_struct *dn;
Linus Torvalds1da177e2005-04-16 15:20:36 -070092 struct dnotify_struct **prev;
Eric Paris3c5119c2009-05-21 17:01:33 -040093 struct fown_struct *fown;
Andreas Gruenbacher94552682009-10-15 00:13:23 +020094 __u32 test_mask = event->mask & ~FS_EVENT_ON_CHILD;
Linus Torvalds1da177e2005-04-16 15:20:36 -070095
Eric Paris3c5119c2009-05-21 17:01:33 -040096 to_tell = event->to_tell;
97
Eric Parisc4963132010-07-28 10:18:38 -040098 dn_mark = container_of(mark, struct dnotify_mark, fsn_mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -070099
Eric Parisc4963132010-07-28 10:18:38 -0400100 spin_lock(&mark->lock);
Eric Parisef5e2b72009-12-17 21:24:24 -0500101 prev = &dn_mark->dn;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102 while ((dn = *prev) != NULL) {
Andreas Gruenbacher94552682009-10-15 00:13:23 +0200103 if ((dn->dn_mask & test_mask) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 prev = &dn->dn_next;
105 continue;
106 }
107 fown = &dn->dn_filp->f_owner;
108 send_sigio(fown, dn->dn_fd, POLL_MSG);
Eric Paris3c5119c2009-05-21 17:01:33 -0400109 if (dn->dn_mask & FS_DN_MULTISHOT)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110 prev = &dn->dn_next;
111 else {
112 *prev = dn->dn_next;
Eric Paris3c5119c2009-05-21 17:01:33 -0400113 kmem_cache_free(dnotify_struct_cache, dn);
Eric Parisc4963132010-07-28 10:18:38 -0400114 dnotify_recalc_inode_mask(mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115 }
116 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700117
Eric Parisc4963132010-07-28 10:18:38 -0400118 spin_unlock(&mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400119
120 return 0;
121}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122
123/*
Eric Paris3c5119c2009-05-21 17:01:33 -0400124 * Given an inode and mask determine if dnotify would be interested in sending
125 * userspace notification for that pair.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 */
Eric Paris3c5119c2009-05-21 17:01:33 -0400127static bool dnotify_should_send_event(struct fsnotify_group *group,
Eric Paris3a9fb892009-12-17 21:24:23 -0500128 struct inode *inode, struct vfsmount *mnt,
Eric Paris3a9b16b2010-07-28 10:18:38 -0400129 struct fsnotify_mark *mark, __u32 mask,
130 void *data, int data_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131{
Eric Paris3c5119c2009-05-21 17:01:33 -0400132 bool send;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133
Eric Paris3c5119c2009-05-21 17:01:33 -0400134 /* !dir_notify_enable should never get here, don't waste time checking
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135 if (!dir_notify_enable)
Eric Paris3c5119c2009-05-21 17:01:33 -0400136 return 0; */
137
138 /* not a dir, dnotify doesn't care */
139 if (!S_ISDIR(inode->i_mode))
140 return false;
141
Eric Parise42e2772009-06-11 11:09:47 -0400142 mask = (mask & ~FS_EVENT_ON_CHILD);
Eric Parisc4963132010-07-28 10:18:38 -0400143 send = (mask & mark->mask);
Eric Paris3c5119c2009-05-21 17:01:33 -0400144
145 return send;
146}
147
Eric Parisef5e2b72009-12-17 21:24:24 -0500148static void dnotify_free_mark(struct fsnotify_mark *fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400149{
Eric Parisef5e2b72009-12-17 21:24:24 -0500150 struct dnotify_mark *dn_mark = container_of(fsn_mark,
151 struct dnotify_mark,
152 fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400153
Eric Parisef5e2b72009-12-17 21:24:24 -0500154 BUG_ON(dn_mark->dn);
Eric Paris3c5119c2009-05-21 17:01:33 -0400155
Eric Parisef5e2b72009-12-17 21:24:24 -0500156 kmem_cache_free(dnotify_mark_cache, dn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400157}
158
159static struct fsnotify_ops dnotify_fsnotify_ops = {
160 .handle_event = dnotify_handle_event,
161 .should_send_event = dnotify_should_send_event,
162 .free_group_priv = NULL,
Eric Parisa092ee22009-06-11 11:09:48 -0400163 .freeing_mark = NULL,
Eric Parise4aff112009-05-21 17:01:50 -0400164 .free_event_priv = NULL,
Eric Paris3c5119c2009-05-21 17:01:33 -0400165};
166
167/*
168 * Called every time a file is closed. Looks first for a dnotify mark on the
Eric Parise61ce862009-12-17 21:24:24 -0500169 * inode. If one is found run all of the ->dn structures attached to that
Eric Paris3c5119c2009-05-21 17:01:33 -0400170 * mark for one relevant to this process closing the file and remove that
171 * dnotify_struct. If that was the last dnotify_struct also remove the
Eric Parise61ce862009-12-17 21:24:24 -0500172 * fsnotify_mark.
Eric Paris3c5119c2009-05-21 17:01:33 -0400173 */
174void dnotify_flush(struct file *filp, fl_owner_t id)
175{
Eric Parisef5e2b72009-12-17 21:24:24 -0500176 struct fsnotify_mark *fsn_mark;
177 struct dnotify_mark *dn_mark;
Eric Paris3c5119c2009-05-21 17:01:33 -0400178 struct dnotify_struct *dn;
179 struct dnotify_struct **prev;
180 struct inode *inode;
181
182 inode = filp->f_path.dentry->d_inode;
183 if (!S_ISDIR(inode->i_mode))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700184 return;
185
Eric Paris5444e292009-12-17 21:24:27 -0500186 fsn_mark = fsnotify_find_inode_mark(dnotify_group, inode);
Eric Parisef5e2b72009-12-17 21:24:24 -0500187 if (!fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400188 return;
Eric Parisef5e2b72009-12-17 21:24:24 -0500189 dn_mark = container_of(fsn_mark, struct dnotify_mark, fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400190
191 mutex_lock(&dnotify_mark_mutex);
192
Eric Parisef5e2b72009-12-17 21:24:24 -0500193 spin_lock(&fsn_mark->lock);
194 prev = &dn_mark->dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400195 while ((dn = *prev) != NULL) {
196 if ((dn->dn_owner == id) && (dn->dn_filp == filp)) {
197 *prev = dn->dn_next;
198 kmem_cache_free(dnotify_struct_cache, dn);
Eric Parisef5e2b72009-12-17 21:24:24 -0500199 dnotify_recalc_inode_mask(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400200 break;
201 }
202 prev = &dn->dn_next;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203 }
Eric Paris3c5119c2009-05-21 17:01:33 -0400204
Eric Parisef5e2b72009-12-17 21:24:24 -0500205 spin_unlock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400206
207 /* nothing else could have found us thanks to the dnotify_mark_mutex */
Eric Parisef5e2b72009-12-17 21:24:24 -0500208 if (dn_mark->dn == NULL)
209 fsnotify_destroy_mark(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400210
211 fsnotify_recalc_group_mask(dnotify_group);
212
213 mutex_unlock(&dnotify_mark_mutex);
214
Eric Parisef5e2b72009-12-17 21:24:24 -0500215 fsnotify_put_mark(fsn_mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216}
Eric Paris3c5119c2009-05-21 17:01:33 -0400217
218/* this conversion is done only at watch creation */
219static __u32 convert_arg(unsigned long arg)
220{
221 __u32 new_mask = FS_EVENT_ON_CHILD;
222
223 if (arg & DN_MULTISHOT)
224 new_mask |= FS_DN_MULTISHOT;
225 if (arg & DN_DELETE)
226 new_mask |= (FS_DELETE | FS_MOVED_FROM);
227 if (arg & DN_MODIFY)
228 new_mask |= FS_MODIFY;
229 if (arg & DN_ACCESS)
230 new_mask |= FS_ACCESS;
231 if (arg & DN_ATTRIB)
232 new_mask |= FS_ATTRIB;
233 if (arg & DN_RENAME)
234 new_mask |= FS_DN_RENAME;
235 if (arg & DN_CREATE)
236 new_mask |= (FS_CREATE | FS_MOVED_TO);
237
238 return new_mask;
239}
240
241/*
242 * If multiple processes watch the same inode with dnotify there is only one
Eric Parise61ce862009-12-17 21:24:24 -0500243 * dnotify mark in inode->i_fsnotify_marks but we chain a dnotify_struct
Eric Paris3c5119c2009-05-21 17:01:33 -0400244 * onto that mark. This function either attaches the new dnotify_struct onto
245 * that list, or it |= the mask onto an existing dnofiy_struct.
246 */
Eric Parisef5e2b72009-12-17 21:24:24 -0500247static int attach_dn(struct dnotify_struct *dn, struct dnotify_mark *dn_mark,
Eric Paris3c5119c2009-05-21 17:01:33 -0400248 fl_owner_t id, int fd, struct file *filp, __u32 mask)
249{
250 struct dnotify_struct *odn;
251
Eric Parisef5e2b72009-12-17 21:24:24 -0500252 odn = dn_mark->dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400253 while (odn != NULL) {
254 /* adding more events to existing dnofiy_struct? */
255 if ((odn->dn_owner == id) && (odn->dn_filp == filp)) {
256 odn->dn_fd = fd;
257 odn->dn_mask |= mask;
258 return -EEXIST;
259 }
260 odn = odn->dn_next;
261 }
262
263 dn->dn_mask = mask;
264 dn->dn_fd = fd;
265 dn->dn_filp = filp;
266 dn->dn_owner = id;
Eric Parisef5e2b72009-12-17 21:24:24 -0500267 dn->dn_next = dn_mark->dn;
268 dn_mark->dn = dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400269
270 return 0;
271}
272
273/*
274 * When a process calls fcntl to attach a dnotify watch to a directory it ends
275 * up here. Allocate both a mark for fsnotify to add and a dnotify_struct to be
276 * attached to the fsnotify_mark.
277 */
278int fcntl_dirnotify(int fd, struct file *filp, unsigned long arg)
279{
Eric Parisef5e2b72009-12-17 21:24:24 -0500280 struct dnotify_mark *new_dn_mark, *dn_mark;
281 struct fsnotify_mark *new_fsn_mark, *fsn_mark;
Eric Paris3c5119c2009-05-21 17:01:33 -0400282 struct dnotify_struct *dn;
283 struct inode *inode;
284 fl_owner_t id = current->files;
285 struct file *f;
286 int destroy = 0, error = 0;
287 __u32 mask;
288
289 /* we use these to tell if we need to kfree */
Eric Parisef5e2b72009-12-17 21:24:24 -0500290 new_fsn_mark = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400291 dn = NULL;
292
293 if (!dir_notify_enable) {
294 error = -EINVAL;
295 goto out_err;
296 }
297
298 /* a 0 mask means we are explicitly removing the watch */
299 if ((arg & ~DN_MULTISHOT) == 0) {
300 dnotify_flush(filp, id);
301 error = 0;
302 goto out_err;
303 }
304
305 /* dnotify only works on directories */
306 inode = filp->f_path.dentry->d_inode;
307 if (!S_ISDIR(inode->i_mode)) {
308 error = -ENOTDIR;
309 goto out_err;
310 }
311
312 /* expect most fcntl to add new rather than augment old */
313 dn = kmem_cache_alloc(dnotify_struct_cache, GFP_KERNEL);
314 if (!dn) {
315 error = -ENOMEM;
316 goto out_err;
317 }
318
319 /* new fsnotify mark, we expect most fcntl calls to add a new mark */
Eric Parisef5e2b72009-12-17 21:24:24 -0500320 new_dn_mark = kmem_cache_alloc(dnotify_mark_cache, GFP_KERNEL);
321 if (!new_dn_mark) {
Eric Paris3c5119c2009-05-21 17:01:33 -0400322 error = -ENOMEM;
323 goto out_err;
324 }
325
326 /* convert the userspace DN_* "arg" to the internal FS_* defines in fsnotify */
327 mask = convert_arg(arg);
328
Eric Parisef5e2b72009-12-17 21:24:24 -0500329 /* set up the new_fsn_mark and new_dn_mark */
330 new_fsn_mark = &new_dn_mark->fsn_mark;
331 fsnotify_init_mark(new_fsn_mark, dnotify_free_mark);
332 new_fsn_mark->mask = mask;
333 new_dn_mark->dn = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400334
335 /* this is needed to prevent the fcntl/close race described below */
336 mutex_lock(&dnotify_mark_mutex);
337
Eric Parisef5e2b72009-12-17 21:24:24 -0500338 /* add the new_fsn_mark or find an old one. */
Eric Paris5444e292009-12-17 21:24:27 -0500339 fsn_mark = fsnotify_find_inode_mark(dnotify_group, inode);
Eric Parisef5e2b72009-12-17 21:24:24 -0500340 if (fsn_mark) {
341 dn_mark = container_of(fsn_mark, struct dnotify_mark, fsn_mark);
342 spin_lock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400343 } else {
Eric Paris5444e292009-12-17 21:24:27 -0500344 fsnotify_add_mark(new_fsn_mark, dnotify_group, inode, NULL, 0);
Eric Parisef5e2b72009-12-17 21:24:24 -0500345 spin_lock(&new_fsn_mark->lock);
346 fsn_mark = new_fsn_mark;
347 dn_mark = new_dn_mark;
348 /* we used new_fsn_mark, so don't free it */
349 new_fsn_mark = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400350 }
351
352 rcu_read_lock();
353 f = fcheck(fd);
354 rcu_read_unlock();
355
356 /* if (f != filp) means that we lost a race and another task/thread
357 * actually closed the fd we are still playing with before we grabbed
Eric Parisef5e2b72009-12-17 21:24:24 -0500358 * the dnotify_mark_mutex and fsn_mark->lock. Since closing the fd is the
Eric Parise61ce862009-12-17 21:24:24 -0500359 * only time we clean up the marks we need to get our mark off
Eric Paris3c5119c2009-05-21 17:01:33 -0400360 * the list. */
361 if (f != filp) {
362 /* if we added ourselves, shoot ourselves, it's possible that
Eric Parisef5e2b72009-12-17 21:24:24 -0500363 * the flush actually did shoot this fsn_mark. That's fine too
Eric Paris3c5119c2009-05-21 17:01:33 -0400364 * since multiple calls to destroy_mark is perfectly safe, if
Eric Parisef5e2b72009-12-17 21:24:24 -0500365 * we found a dn_mark already attached to the inode, just sod
Eric Paris3c5119c2009-05-21 17:01:33 -0400366 * off silently as the flush at close time dealt with it.
367 */
Eric Parisef5e2b72009-12-17 21:24:24 -0500368 if (dn_mark == new_dn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400369 destroy = 1;
370 goto out;
371 }
372
373 error = __f_setown(filp, task_pid(current), PIDTYPE_PID, 0);
374 if (error) {
375 /* if we added, we must shoot */
Eric Parisef5e2b72009-12-17 21:24:24 -0500376 if (dn_mark == new_dn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400377 destroy = 1;
378 goto out;
379 }
380
Eric Parisef5e2b72009-12-17 21:24:24 -0500381 error = attach_dn(dn, dn_mark, id, fd, filp, mask);
382 /* !error means that we attached the dn to the dn_mark, so don't free it */
Eric Paris3c5119c2009-05-21 17:01:33 -0400383 if (!error)
384 dn = NULL;
385 /* -EEXIST means that we didn't add this new dn and used an old one.
386 * that isn't an error (and the unused dn should be freed) */
387 else if (error == -EEXIST)
388 error = 0;
389
Eric Parisef5e2b72009-12-17 21:24:24 -0500390 dnotify_recalc_inode_mask(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400391out:
Eric Parisef5e2b72009-12-17 21:24:24 -0500392 spin_unlock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400393
394 if (destroy)
Eric Parisef5e2b72009-12-17 21:24:24 -0500395 fsnotify_destroy_mark(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400396
397 fsnotify_recalc_group_mask(dnotify_group);
398
399 mutex_unlock(&dnotify_mark_mutex);
Eric Parisef5e2b72009-12-17 21:24:24 -0500400 fsnotify_put_mark(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400401out_err:
Eric Parisef5e2b72009-12-17 21:24:24 -0500402 if (new_fsn_mark)
403 fsnotify_put_mark(new_fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400404 if (dn)
405 kmem_cache_free(dnotify_struct_cache, dn);
406 return error;
407}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408
409static int __init dnotify_init(void)
410{
Eric Paris3c5119c2009-05-21 17:01:33 -0400411 dnotify_struct_cache = KMEM_CACHE(dnotify_struct, SLAB_PANIC);
Eric Parisef5e2b72009-12-17 21:24:24 -0500412 dnotify_mark_cache = KMEM_CACHE(dnotify_mark, SLAB_PANIC);
Eric Paris3c5119c2009-05-21 17:01:33 -0400413
Eric Paris0d2e2a12009-12-17 21:24:22 -0500414 dnotify_group = fsnotify_alloc_group(&dnotify_fsnotify_ops);
Eric Paris3c5119c2009-05-21 17:01:33 -0400415 if (IS_ERR(dnotify_group))
416 panic("unable to allocate fsnotify group for dnotify\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700417 return 0;
418}
419
420module_init(dnotify_init)