blob: bfca53dbbf34c0ccc5cf023894b43b1940029881 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Directory notifications for Linux.
3 *
4 * Copyright (C) 2000,2001,2002 Stephen Rothwell
5 *
Eric Paris3c5119c2009-05-21 17:01:33 -04006 * Copyright (C) 2009 Eric Paris <Red Hat Inc>
7 * dnotify was largly rewritten to use the new fsnotify infrastructure
8 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 * This program is free software; you can redistribute it and/or modify it
10 * under the terms of the GNU General Public License as published by the
11 * Free Software Foundation; either version 2, or (at your option) any
12 * later version.
13 *
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
18 */
19#include <linux/fs.h>
20#include <linux/module.h>
21#include <linux/sched.h>
22#include <linux/dnotify.h>
23#include <linux/init.h>
24#include <linux/spinlock.h>
25#include <linux/slab.h>
Al Viro9f3acc32008-04-24 07:44:08 -040026#include <linux/fdtable.h>
Eric Paris3c5119c2009-05-21 17:01:33 -040027#include <linux/fsnotify_backend.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070028
Eric Dumazetfa3536c2006-03-26 01:37:24 -080029int dir_notify_enable __read_mostly = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -070030
Eric Paris3c5119c2009-05-21 17:01:33 -040031static struct kmem_cache *dnotify_struct_cache __read_mostly;
Eric Parisef5e2b72009-12-17 21:24:24 -050032static struct kmem_cache *dnotify_mark_cache __read_mostly;
Eric Paris3c5119c2009-05-21 17:01:33 -040033static struct fsnotify_group *dnotify_group __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070034
Eric Paris3c5119c2009-05-21 17:01:33 -040035/*
Eric Parise61ce862009-12-17 21:24:24 -050036 * dnotify will attach one of these to each inode (i_fsnotify_marks) which
Eric Paris3c5119c2009-05-21 17:01:33 -040037 * is being watched by dnotify. If multiple userspace applications are watching
38 * the same directory with dnotify their information is chained in dn
39 */
Eric Parisef5e2b72009-12-17 21:24:24 -050040struct dnotify_mark {
41 struct fsnotify_mark fsn_mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -070042 struct dnotify_struct *dn;
Eric Paris3c5119c2009-05-21 17:01:33 -040043};
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
Eric Paris3c5119c2009-05-21 17:01:33 -040045/*
46 * When a process starts or stops watching an inode the set of events which
47 * dnotify cares about for that inode may change. This function runs the
48 * list of everything receiving dnotify events about this directory and calculates
49 * the set of all those events. After it updates what dnotify is interested in
50 * it calls the fsnotify function so it can update the set of all events relevant
51 * to this inode.
52 */
Eric Parisef5e2b72009-12-17 21:24:24 -050053static void dnotify_recalc_inode_mask(struct fsnotify_mark *fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -040054{
55 __u32 new_mask, old_mask;
56 struct dnotify_struct *dn;
Eric Parisef5e2b72009-12-17 21:24:24 -050057 struct dnotify_mark *dn_mark = container_of(fsn_mark,
58 struct dnotify_mark,
59 fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -040060
Eric Parisef5e2b72009-12-17 21:24:24 -050061 assert_spin_locked(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -040062
Eric Parisef5e2b72009-12-17 21:24:24 -050063 old_mask = fsn_mark->mask;
Linus Torvalds1da177e2005-04-16 15:20:36 -070064 new_mask = 0;
Eric Parisef5e2b72009-12-17 21:24:24 -050065 for (dn = dn_mark->dn; dn != NULL; dn = dn->dn_next)
Eric Paris3c5119c2009-05-21 17:01:33 -040066 new_mask |= (dn->dn_mask & ~FS_DN_MULTISHOT);
Eric Paris90b1e7a2009-12-17 21:24:33 -050067 fsnotify_set_mark_mask_locked(fsn_mark, new_mask);
Linus Torvalds1da177e2005-04-16 15:20:36 -070068
Eric Paris3c5119c2009-05-21 17:01:33 -040069 if (old_mask == new_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -070070 return;
Eric Paris3c5119c2009-05-21 17:01:33 -040071
Eric Parisef5e2b72009-12-17 21:24:24 -050072 if (fsn_mark->i.inode)
73 fsnotify_recalc_inode_mask(fsn_mark->i.inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -070074}
75
Eric Paris3c5119c2009-05-21 17:01:33 -040076/*
77 * Mains fsnotify call where events are delivered to dnotify.
78 * Find the dnotify mark on the relevant inode, run the list of dnotify structs
79 * on that mark and determine which of them has expressed interest in receiving
80 * events of this type. When found send the correct process and signal and
81 * destroy the dnotify struct if it was not registered to receive multiple
82 * events.
83 */
84static int dnotify_handle_event(struct fsnotify_group *group,
Jan Kara7053aee2014-01-21 15:48:14 -080085 struct inode *inode,
Eric Parisce8f76f2010-07-28 10:18:39 -040086 struct fsnotify_mark *inode_mark,
87 struct fsnotify_mark *vfsmount_mark,
Jan Kara7053aee2014-01-21 15:48:14 -080088 u32 mask, void *data, int data_type,
89 const unsigned char *file_name)
Linus Torvalds1da177e2005-04-16 15:20:36 -070090{
Eric Parisef5e2b72009-12-17 21:24:24 -050091 struct dnotify_mark *dn_mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -070092 struct dnotify_struct *dn;
Linus Torvalds1da177e2005-04-16 15:20:36 -070093 struct dnotify_struct **prev;
Eric Paris3c5119c2009-05-21 17:01:33 -040094 struct fown_struct *fown;
Jan Kara7053aee2014-01-21 15:48:14 -080095 __u32 test_mask = mask & ~FS_EVENT_ON_CHILD;
Linus Torvalds1da177e2005-04-16 15:20:36 -070096
Eric Parisce8f76f2010-07-28 10:18:39 -040097 BUG_ON(vfsmount_mark);
98
Eric Parisce8f76f2010-07-28 10:18:39 -040099 dn_mark = container_of(inode_mark, struct dnotify_mark, fsn_mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700100
Eric Parisce8f76f2010-07-28 10:18:39 -0400101 spin_lock(&inode_mark->lock);
Eric Parisef5e2b72009-12-17 21:24:24 -0500102 prev = &dn_mark->dn;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103 while ((dn = *prev) != NULL) {
Andreas Gruenbacher94552682009-10-15 00:13:23 +0200104 if ((dn->dn_mask & test_mask) == 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105 prev = &dn->dn_next;
106 continue;
107 }
108 fown = &dn->dn_filp->f_owner;
109 send_sigio(fown, dn->dn_fd, POLL_MSG);
Eric Paris3c5119c2009-05-21 17:01:33 -0400110 if (dn->dn_mask & FS_DN_MULTISHOT)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111 prev = &dn->dn_next;
112 else {
113 *prev = dn->dn_next;
Eric Paris3c5119c2009-05-21 17:01:33 -0400114 kmem_cache_free(dnotify_struct_cache, dn);
Eric Parisce8f76f2010-07-28 10:18:39 -0400115 dnotify_recalc_inode_mask(inode_mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116 }
117 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118
Eric Parisce8f76f2010-07-28 10:18:39 -0400119 spin_unlock(&inode_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400120
121 return 0;
122}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123
124/*
Eric Paris3c5119c2009-05-21 17:01:33 -0400125 * Given an inode and mask determine if dnotify would be interested in sending
126 * userspace notification for that pair.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127 */
Eric Paris3c5119c2009-05-21 17:01:33 -0400128static bool dnotify_should_send_event(struct fsnotify_group *group,
Eric Paris1968f5e2010-07-28 10:18:39 -0400129 struct inode *inode,
Eric Parisce8f76f2010-07-28 10:18:39 -0400130 struct fsnotify_mark *inode_mark,
131 struct fsnotify_mark *vfsmount_mark,
132 __u32 mask, void *data, int data_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133{
Eric Paris3c5119c2009-05-21 17:01:33 -0400134 /* not a dir, dnotify doesn't care */
135 if (!S_ISDIR(inode->i_mode))
136 return false;
137
Eric Paris2612abb2010-07-28 10:18:39 -0400138 return true;
Eric Paris3c5119c2009-05-21 17:01:33 -0400139}
140
Eric Parisef5e2b72009-12-17 21:24:24 -0500141static void dnotify_free_mark(struct fsnotify_mark *fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400142{
Eric Parisef5e2b72009-12-17 21:24:24 -0500143 struct dnotify_mark *dn_mark = container_of(fsn_mark,
144 struct dnotify_mark,
145 fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400146
Eric Parisef5e2b72009-12-17 21:24:24 -0500147 BUG_ON(dn_mark->dn);
Eric Paris3c5119c2009-05-21 17:01:33 -0400148
Eric Parisef5e2b72009-12-17 21:24:24 -0500149 kmem_cache_free(dnotify_mark_cache, dn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400150}
151
152static struct fsnotify_ops dnotify_fsnotify_ops = {
153 .handle_event = dnotify_handle_event,
154 .should_send_event = dnotify_should_send_event,
155 .free_group_priv = NULL,
Eric Parisa092ee22009-06-11 11:09:48 -0400156 .freeing_mark = NULL,
Jan Kara7053aee2014-01-21 15:48:14 -0800157 .free_event = NULL,
Eric Paris3c5119c2009-05-21 17:01:33 -0400158};
159
160/*
161 * Called every time a file is closed. Looks first for a dnotify mark on the
Eric Parise61ce862009-12-17 21:24:24 -0500162 * inode. If one is found run all of the ->dn structures attached to that
Eric Paris3c5119c2009-05-21 17:01:33 -0400163 * mark for one relevant to this process closing the file and remove that
164 * dnotify_struct. If that was the last dnotify_struct also remove the
Eric Parise61ce862009-12-17 21:24:24 -0500165 * fsnotify_mark.
Eric Paris3c5119c2009-05-21 17:01:33 -0400166 */
167void dnotify_flush(struct file *filp, fl_owner_t id)
168{
Eric Parisef5e2b72009-12-17 21:24:24 -0500169 struct fsnotify_mark *fsn_mark;
170 struct dnotify_mark *dn_mark;
Eric Paris3c5119c2009-05-21 17:01:33 -0400171 struct dnotify_struct *dn;
172 struct dnotify_struct **prev;
173 struct inode *inode;
174
Al Viro496ad9a2013-01-23 17:07:38 -0500175 inode = file_inode(filp);
Eric Paris3c5119c2009-05-21 17:01:33 -0400176 if (!S_ISDIR(inode->i_mode))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700177 return;
178
Eric Paris5444e292009-12-17 21:24:27 -0500179 fsn_mark = fsnotify_find_inode_mark(dnotify_group, inode);
Eric Parisef5e2b72009-12-17 21:24:24 -0500180 if (!fsn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400181 return;
Eric Parisef5e2b72009-12-17 21:24:24 -0500182 dn_mark = container_of(fsn_mark, struct dnotify_mark, fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400183
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700184 mutex_lock(&dnotify_group->mark_mutex);
Eric Paris3c5119c2009-05-21 17:01:33 -0400185
Eric Parisef5e2b72009-12-17 21:24:24 -0500186 spin_lock(&fsn_mark->lock);
187 prev = &dn_mark->dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400188 while ((dn = *prev) != NULL) {
189 if ((dn->dn_owner == id) && (dn->dn_filp == filp)) {
190 *prev = dn->dn_next;
191 kmem_cache_free(dnotify_struct_cache, dn);
Eric Parisef5e2b72009-12-17 21:24:24 -0500192 dnotify_recalc_inode_mask(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400193 break;
194 }
195 prev = &dn->dn_next;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196 }
Eric Paris3c5119c2009-05-21 17:01:33 -0400197
Eric Parisef5e2b72009-12-17 21:24:24 -0500198 spin_unlock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400199
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700200 /* nothing else could have found us thanks to the dnotify_groups
201 mark_mutex */
Eric Parisef5e2b72009-12-17 21:24:24 -0500202 if (dn_mark->dn == NULL)
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700203 fsnotify_destroy_mark_locked(fsn_mark, dnotify_group);
Eric Paris3c5119c2009-05-21 17:01:33 -0400204
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700205 mutex_unlock(&dnotify_group->mark_mutex);
Eric Paris3c5119c2009-05-21 17:01:33 -0400206
Eric Parisef5e2b72009-12-17 21:24:24 -0500207 fsnotify_put_mark(fsn_mark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700208}
Eric Paris3c5119c2009-05-21 17:01:33 -0400209
210/* this conversion is done only at watch creation */
211static __u32 convert_arg(unsigned long arg)
212{
213 __u32 new_mask = FS_EVENT_ON_CHILD;
214
215 if (arg & DN_MULTISHOT)
216 new_mask |= FS_DN_MULTISHOT;
217 if (arg & DN_DELETE)
218 new_mask |= (FS_DELETE | FS_MOVED_FROM);
219 if (arg & DN_MODIFY)
220 new_mask |= FS_MODIFY;
221 if (arg & DN_ACCESS)
222 new_mask |= FS_ACCESS;
223 if (arg & DN_ATTRIB)
224 new_mask |= FS_ATTRIB;
225 if (arg & DN_RENAME)
226 new_mask |= FS_DN_RENAME;
227 if (arg & DN_CREATE)
228 new_mask |= (FS_CREATE | FS_MOVED_TO);
229
230 return new_mask;
231}
232
233/*
234 * If multiple processes watch the same inode with dnotify there is only one
Eric Parise61ce862009-12-17 21:24:24 -0500235 * dnotify mark in inode->i_fsnotify_marks but we chain a dnotify_struct
Eric Paris3c5119c2009-05-21 17:01:33 -0400236 * onto that mark. This function either attaches the new dnotify_struct onto
237 * that list, or it |= the mask onto an existing dnofiy_struct.
238 */
Eric Parisef5e2b72009-12-17 21:24:24 -0500239static int attach_dn(struct dnotify_struct *dn, struct dnotify_mark *dn_mark,
Eric Paris3c5119c2009-05-21 17:01:33 -0400240 fl_owner_t id, int fd, struct file *filp, __u32 mask)
241{
242 struct dnotify_struct *odn;
243
Eric Parisef5e2b72009-12-17 21:24:24 -0500244 odn = dn_mark->dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400245 while (odn != NULL) {
246 /* adding more events to existing dnofiy_struct? */
247 if ((odn->dn_owner == id) && (odn->dn_filp == filp)) {
248 odn->dn_fd = fd;
249 odn->dn_mask |= mask;
250 return -EEXIST;
251 }
252 odn = odn->dn_next;
253 }
254
255 dn->dn_mask = mask;
256 dn->dn_fd = fd;
257 dn->dn_filp = filp;
258 dn->dn_owner = id;
Eric Parisef5e2b72009-12-17 21:24:24 -0500259 dn->dn_next = dn_mark->dn;
260 dn_mark->dn = dn;
Eric Paris3c5119c2009-05-21 17:01:33 -0400261
262 return 0;
263}
264
265/*
266 * When a process calls fcntl to attach a dnotify watch to a directory it ends
267 * up here. Allocate both a mark for fsnotify to add and a dnotify_struct to be
268 * attached to the fsnotify_mark.
269 */
270int fcntl_dirnotify(int fd, struct file *filp, unsigned long arg)
271{
Eric Parisef5e2b72009-12-17 21:24:24 -0500272 struct dnotify_mark *new_dn_mark, *dn_mark;
273 struct fsnotify_mark *new_fsn_mark, *fsn_mark;
Eric Paris3c5119c2009-05-21 17:01:33 -0400274 struct dnotify_struct *dn;
275 struct inode *inode;
276 fl_owner_t id = current->files;
277 struct file *f;
278 int destroy = 0, error = 0;
279 __u32 mask;
280
281 /* we use these to tell if we need to kfree */
Eric Parisef5e2b72009-12-17 21:24:24 -0500282 new_fsn_mark = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400283 dn = NULL;
284
285 if (!dir_notify_enable) {
286 error = -EINVAL;
287 goto out_err;
288 }
289
290 /* a 0 mask means we are explicitly removing the watch */
291 if ((arg & ~DN_MULTISHOT) == 0) {
292 dnotify_flush(filp, id);
293 error = 0;
294 goto out_err;
295 }
296
297 /* dnotify only works on directories */
Al Viro496ad9a2013-01-23 17:07:38 -0500298 inode = file_inode(filp);
Eric Paris3c5119c2009-05-21 17:01:33 -0400299 if (!S_ISDIR(inode->i_mode)) {
300 error = -ENOTDIR;
301 goto out_err;
302 }
303
304 /* expect most fcntl to add new rather than augment old */
305 dn = kmem_cache_alloc(dnotify_struct_cache, GFP_KERNEL);
306 if (!dn) {
307 error = -ENOMEM;
308 goto out_err;
309 }
310
311 /* new fsnotify mark, we expect most fcntl calls to add a new mark */
Eric Parisef5e2b72009-12-17 21:24:24 -0500312 new_dn_mark = kmem_cache_alloc(dnotify_mark_cache, GFP_KERNEL);
313 if (!new_dn_mark) {
Eric Paris3c5119c2009-05-21 17:01:33 -0400314 error = -ENOMEM;
315 goto out_err;
316 }
317
318 /* convert the userspace DN_* "arg" to the internal FS_* defines in fsnotify */
319 mask = convert_arg(arg);
320
Eric Parisef5e2b72009-12-17 21:24:24 -0500321 /* set up the new_fsn_mark and new_dn_mark */
322 new_fsn_mark = &new_dn_mark->fsn_mark;
323 fsnotify_init_mark(new_fsn_mark, dnotify_free_mark);
324 new_fsn_mark->mask = mask;
325 new_dn_mark->dn = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400326
327 /* this is needed to prevent the fcntl/close race described below */
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700328 mutex_lock(&dnotify_group->mark_mutex);
Eric Paris3c5119c2009-05-21 17:01:33 -0400329
Eric Parisef5e2b72009-12-17 21:24:24 -0500330 /* add the new_fsn_mark or find an old one. */
Eric Paris5444e292009-12-17 21:24:27 -0500331 fsn_mark = fsnotify_find_inode_mark(dnotify_group, inode);
Eric Parisef5e2b72009-12-17 21:24:24 -0500332 if (fsn_mark) {
333 dn_mark = container_of(fsn_mark, struct dnotify_mark, fsn_mark);
334 spin_lock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400335 } else {
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700336 fsnotify_add_mark_locked(new_fsn_mark, dnotify_group, inode,
337 NULL, 0);
Eric Parisef5e2b72009-12-17 21:24:24 -0500338 spin_lock(&new_fsn_mark->lock);
339 fsn_mark = new_fsn_mark;
340 dn_mark = new_dn_mark;
341 /* we used new_fsn_mark, so don't free it */
342 new_fsn_mark = NULL;
Eric Paris3c5119c2009-05-21 17:01:33 -0400343 }
344
345 rcu_read_lock();
346 f = fcheck(fd);
347 rcu_read_unlock();
348
349 /* if (f != filp) means that we lost a race and another task/thread
350 * actually closed the fd we are still playing with before we grabbed
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700351 * the dnotify_groups mark_mutex and fsn_mark->lock. Since closing the
352 * fd is the only time we clean up the marks we need to get our mark
353 * off the list. */
Eric Paris3c5119c2009-05-21 17:01:33 -0400354 if (f != filp) {
355 /* if we added ourselves, shoot ourselves, it's possible that
Eric Parisef5e2b72009-12-17 21:24:24 -0500356 * the flush actually did shoot this fsn_mark. That's fine too
Eric Paris3c5119c2009-05-21 17:01:33 -0400357 * since multiple calls to destroy_mark is perfectly safe, if
Eric Parisef5e2b72009-12-17 21:24:24 -0500358 * we found a dn_mark already attached to the inode, just sod
Eric Paris3c5119c2009-05-21 17:01:33 -0400359 * off silently as the flush at close time dealt with it.
360 */
Eric Parisef5e2b72009-12-17 21:24:24 -0500361 if (dn_mark == new_dn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400362 destroy = 1;
363 goto out;
364 }
365
366 error = __f_setown(filp, task_pid(current), PIDTYPE_PID, 0);
367 if (error) {
368 /* if we added, we must shoot */
Eric Parisef5e2b72009-12-17 21:24:24 -0500369 if (dn_mark == new_dn_mark)
Eric Paris3c5119c2009-05-21 17:01:33 -0400370 destroy = 1;
371 goto out;
372 }
373
Eric Parisef5e2b72009-12-17 21:24:24 -0500374 error = attach_dn(dn, dn_mark, id, fd, filp, mask);
375 /* !error means that we attached the dn to the dn_mark, so don't free it */
Eric Paris3c5119c2009-05-21 17:01:33 -0400376 if (!error)
377 dn = NULL;
378 /* -EEXIST means that we didn't add this new dn and used an old one.
379 * that isn't an error (and the unused dn should be freed) */
380 else if (error == -EEXIST)
381 error = 0;
382
Eric Parisef5e2b72009-12-17 21:24:24 -0500383 dnotify_recalc_inode_mask(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400384out:
Eric Parisef5e2b72009-12-17 21:24:24 -0500385 spin_unlock(&fsn_mark->lock);
Eric Paris3c5119c2009-05-21 17:01:33 -0400386
387 if (destroy)
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700388 fsnotify_destroy_mark_locked(fsn_mark, dnotify_group);
Eric Paris3c5119c2009-05-21 17:01:33 -0400389
Lino Sanfilippo52f85722013-07-08 15:59:44 -0700390 mutex_unlock(&dnotify_group->mark_mutex);
Eric Parisef5e2b72009-12-17 21:24:24 -0500391 fsnotify_put_mark(fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400392out_err:
Eric Parisef5e2b72009-12-17 21:24:24 -0500393 if (new_fsn_mark)
394 fsnotify_put_mark(new_fsn_mark);
Eric Paris3c5119c2009-05-21 17:01:33 -0400395 if (dn)
396 kmem_cache_free(dnotify_struct_cache, dn);
397 return error;
398}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700399
400static int __init dnotify_init(void)
401{
Eric Paris3c5119c2009-05-21 17:01:33 -0400402 dnotify_struct_cache = KMEM_CACHE(dnotify_struct, SLAB_PANIC);
Eric Parisef5e2b72009-12-17 21:24:24 -0500403 dnotify_mark_cache = KMEM_CACHE(dnotify_mark, SLAB_PANIC);
Eric Paris3c5119c2009-05-21 17:01:33 -0400404
Eric Paris0d2e2a12009-12-17 21:24:22 -0500405 dnotify_group = fsnotify_alloc_group(&dnotify_fsnotify_ops);
Eric Paris3c5119c2009-05-21 17:01:33 -0400406 if (IS_ERR(dnotify_group))
407 panic("unable to allocate fsnotify group for dnotify\n");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700408 return 0;
409}
410
411module_init(dnotify_init)