inotify_user.c 20.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
/*
 * fs/inotify_user.c - inotify support for userspace
 *
 * Authors:
 *	John McCutchan	<ttb@tentacle.dhs.org>
 *	Robert Love	<rml@novell.com>
 *
 * Copyright (C) 2005 John McCutchan
 * Copyright 2006 Hewlett-Packard Development Company, L.P.
 *
11 12 13
 * Copyright (C) 2009 Eric Paris <Red Hat Inc>
 * inotify was largely rewriten to make use of the fsnotify infrastructure
 *
14 15 16 17 18 19 20 21 22 23 24 25
 * This program is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the
 * Free Software Foundation; either version 2, or (at your option) any
 * later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * General Public License for more details.
 */

#include <linux/file.h>
26 27 28 29
#include <linux/fs.h> /* struct inode */
#include <linux/fsnotify_backend.h>
#include <linux/idr.h>
#include <linux/init.h> /* module_init */
30
#include <linux/inotify.h>
31 32 33 34 35 36 37
#include <linux/kernel.h> /* roundup() */
#include <linux/magic.h> /* superblock magic number */
#include <linux/mount.h> /* mntget */
#include <linux/namei.h> /* LOOKUP_FOLLOW */
#include <linux/path.h> /* struct path */
#include <linux/sched.h> /* struct user */
#include <linux/slab.h> /* struct kmem_cache */
38
#include <linux/syscalls.h>
39 40 41 42
#include <linux/types.h>
#include <linux/uaccess.h>
#include <linux/poll.h>
#include <linux/wait.h>
43

44
#include "inotify.h"
45

46
#include <asm/ioctls.h>
47 48 49 50

static struct vfsmount *inotify_mnt __read_mostly;

/* these are configurable via /proc/sys/fs/inotify/ */
51 52
static int inotify_max_user_instances __read_mostly;
static int inotify_max_queued_events __read_mostly;
53
int inotify_max_user_watches __read_mostly;
54

55 56
static struct kmem_cache *inotify_inode_mark_cachep __read_mostly;
struct kmem_cache *event_priv_cachep __read_mostly;
57 58

/*
59 60
 * When inotify registers a new group it increments this and uses that
 * value as an offset to set the fsnotify group "name" and priority.
61
 */
62
static atomic_t inotify_grp_num;
63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104

#ifdef CONFIG_SYSCTL

#include <linux/sysctl.h>

static int zero;

ctl_table inotify_table[] = {
	{
		.ctl_name	= INOTIFY_MAX_USER_INSTANCES,
		.procname	= "max_user_instances",
		.data		= &inotify_max_user_instances,
		.maxlen		= sizeof(int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &zero,
	},
	{
		.ctl_name	= INOTIFY_MAX_USER_WATCHES,
		.procname	= "max_user_watches",
		.data		= &inotify_max_user_watches,
		.maxlen		= sizeof(int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &zero,
	},
	{
		.ctl_name	= INOTIFY_MAX_QUEUED_EVENTS,
		.procname	= "max_queued_events",
		.data		= &inotify_max_queued_events,
		.maxlen		= sizeof(int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &zero
	},
	{ .ctl_name = 0 }
};
#endif /* CONFIG_SYSCTL */

105
static inline __u32 inotify_arg_to_mask(u32 arg)
Y
Yan Zheng 已提交
106
{
107
	__u32 mask;
Y
Yan Zheng 已提交
108

109 110
	/* everything should accept their own ignored and cares about children */
	mask = (FS_IN_IGNORED | FS_EVENT_ON_CHILD);
111

112 113
	/* mask off the flags used to open the fd */
	mask |= (arg & (IN_ALL_EVENTS | IN_ONESHOT));
114

115
	return mask;
116 117
}

118
static inline u32 inotify_mask_to_arg(__u32 mask)
119
{
120 121
	return mask & (IN_ALL_EVENTS | IN_ISDIR | IN_UNMOUNT | IN_IGNORED |
		       IN_Q_OVERFLOW);
122 123
}

124
/* intofiy userspace file descriptor functions */
125 126
static unsigned int inotify_poll(struct file *file, poll_table *wait)
{
127
	struct fsnotify_group *group = file->private_data;
128 129
	int ret = 0;

130 131 132
	poll_wait(file, &group->notification_waitq, wait);
	mutex_lock(&group->notification_mutex);
	if (!fsnotify_notify_queue_is_empty(group))
133
		ret = POLLIN | POLLRDNORM;
134
	mutex_unlock(&group->notification_mutex);
135 136 137 138

	return ret;
}

139 140 141 142 143
/*
 * Get an inotify_kernel_event if one exists and is small
 * enough to fit in "count". Return an error pointer if
 * not large enough.
 *
144
 * Called with the group->notification_mutex held.
145
 */
146 147
static struct fsnotify_event *get_one_event(struct fsnotify_group *group,
					    size_t count)
148 149
{
	size_t event_size = sizeof(struct inotify_event);
150
	struct fsnotify_event *event;
151

152
	if (fsnotify_notify_queue_is_empty(group))
153 154
		return NULL;

155 156 157
	event = fsnotify_peek_notify_event(group);

	event_size += roundup(event->name_len, event_size);
158 159 160 161

	if (event_size > count)
		return ERR_PTR(-EINVAL);

162 163 164 165 166
	/* held the notification_mutex the whole time, so this is the
	 * same event we peeked above */
	fsnotify_remove_notify_event(group);

	return event;
167 168 169 170 171 172 173 174
}

/*
 * Copy an event to user space, returning how much we copied.
 *
 * We already checked that the event size is smaller than the
 * buffer we had in "get_one_event()" above.
 */
175 176
static ssize_t copy_event_to_user(struct fsnotify_group *group,
				  struct fsnotify_event *event,
177 178
				  char __user *buf)
{
179 180 181
	struct inotify_event inotify_event;
	struct fsnotify_event_private_data *fsn_priv;
	struct inotify_event_private_data *priv;
182
	size_t event_size = sizeof(struct inotify_event);
183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198
	size_t name_len;

	/* we get the inotify watch descriptor from the event private data */
	spin_lock(&event->lock);
	fsn_priv = fsnotify_remove_priv_from_event(group, event);
	spin_unlock(&event->lock);

	if (!fsn_priv)
		inotify_event.wd = -1;
	else {
		priv = container_of(fsn_priv, struct inotify_event_private_data,
				    fsnotify_event_priv_data);
		inotify_event.wd = priv->wd;
		inotify_free_event_priv(fsn_priv);
	}

199 200 201 202
	/* round up event->name_len so it is a multiple of event_size
	 * plus an extra byte for the terminating '\0'.
	 */
	name_len = roundup(event->name_len + 1, event_size);
203 204 205 206
	inotify_event.len = name_len;

	inotify_event.mask = inotify_mask_to_arg(event->mask);
	inotify_event.cookie = event->sync_cookie;
207

208 209
	/* send the main event */
	if (copy_to_user(buf, &inotify_event, event_size))
210 211
		return -EFAULT;

212
	buf += event_size;
213

214 215 216 217 218 219 220 221 222
	/*
	 * fsnotify only stores the pathname, so here we have to send the pathname
	 * and then pad that pathname out to a multiple of sizeof(inotify_event)
	 * with zeros.  I get my zeros from the nul_inotify_event.
	 */
	if (name_len) {
		unsigned int len_to_zero = name_len - event->name_len;
		/* copy the path name */
		if (copy_to_user(buf, event->file_name, event->name_len))
223
			return -EFAULT;
224
		buf += event->name_len;
225

226 227
		/* fill userspace with 0's */
		if (clear_user(buf, len_to_zero))
228 229 230
			return -EFAULT;
		buf += len_to_zero;
		event_size += name_len;
231
	}
232

233 234 235
	return event_size;
}

236 237 238
static ssize_t inotify_read(struct file *file, char __user *buf,
			    size_t count, loff_t *pos)
{
239 240
	struct fsnotify_group *group;
	struct fsnotify_event *kevent;
241 242 243 244 245
	char __user *start;
	int ret;
	DEFINE_WAIT(wait);

	start = buf;
246
	group = file->private_data;
247 248

	while (1) {
249
		prepare_to_wait(&group->notification_waitq, &wait, TASK_INTERRUPTIBLE);
250

251 252 253
		mutex_lock(&group->notification_mutex);
		kevent = get_one_event(group, count);
		mutex_unlock(&group->notification_mutex);
254

255 256 257 258
		if (kevent) {
			ret = PTR_ERR(kevent);
			if (IS_ERR(kevent))
				break;
259 260
			ret = copy_event_to_user(group, kevent, buf);
			fsnotify_put_event(kevent);
261 262 263 264 265
			if (ret < 0)
				break;
			buf += ret;
			count -= ret;
			continue;
266 267
		}

268 269
		ret = -EAGAIN;
		if (file->f_flags & O_NONBLOCK)
270
			break;
271 272
		ret = -EINTR;
		if (signal_pending(current))
273
			break;
274

275
		if (start != buf)
276
			break;
277

278
		schedule();
279 280
	}

281
	finish_wait(&group->notification_waitq, &wait);
282 283
	if (start != buf && ret != -EFAULT)
		ret = buf - start;
284 285 286
	return ret;
}

287 288
static int inotify_fasync(int fd, struct file *file, int on)
{
289
	struct fsnotify_group *group = file->private_data;
290

291
	return fasync_helper(fd, file, on, &group->inotify_data.fa) >= 0 ? 0 : -EIO;
292 293
}

294 295
static int inotify_release(struct inode *ignored, struct file *file)
{
296
	struct fsnotify_group *group = file->private_data;
297
	struct user_struct *user = group->inotify_data.user;
298

299
	fsnotify_clear_marks_by_group(group);
300

301 302
	/* free this group, matching get was inotify_init->fsnotify_obtain_group */
	fsnotify_put_group(group);
303

304 305
	atomic_dec(&user->inotify_devs);

306 307 308 309 310 311
	return 0;
}

static long inotify_ioctl(struct file *file, unsigned int cmd,
			  unsigned long arg)
{
312 313 314
	struct fsnotify_group *group;
	struct fsnotify_event_holder *holder;
	struct fsnotify_event *event;
315 316
	void __user *p;
	int ret = -ENOTTY;
317
	size_t send_len = 0;
318

319
	group = file->private_data;
320 321 322 323
	p = (void __user *) arg;

	switch (cmd) {
	case FIONREAD:
324 325 326 327 328 329 330 331 332
		mutex_lock(&group->notification_mutex);
		list_for_each_entry(holder, &group->notification_list, event_list) {
			event = holder->event;
			send_len += sizeof(struct inotify_event);
			send_len += roundup(event->name_len,
					     sizeof(struct inotify_event));
		}
		mutex_unlock(&group->notification_mutex);
		ret = put_user(send_len, (int __user *) p);
333 334 335 336 337 338 339
		break;
	}

	return ret;
}

static const struct file_operations inotify_fops = {
340 341 342 343 344
	.poll		= inotify_poll,
	.read		= inotify_read,
	.fasync		= inotify_fasync,
	.release	= inotify_release,
	.unlocked_ioctl	= inotify_ioctl,
345 346 347 348
	.compat_ioctl	= inotify_ioctl,
};


349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365
/*
 * find_inode - resolve a user-given path to a specific inode
 */
static int inotify_find_inode(const char __user *dirname, struct path *path, unsigned flags)
{
	int error;

	error = user_path_at(AT_FDCWD, dirname, flags, path);
	if (error)
		return error;
	/* you can only watch an inode if you have read permissions on it */
	error = inode_permission(path->dentry->d_inode, MAY_READ);
	if (error)
		path_put(path);
	return error;
}

366 367 368 369
/*
 * Remove the mark from the idr (if present) and drop the reference
 * on the mark because it was in the idr.
 */
370 371 372 373
static void inotify_remove_from_idr(struct fsnotify_group *group,
				    struct inotify_inode_mark_entry *ientry)
{
	struct idr *idr;
374 375 376
	struct fsnotify_mark_entry *entry;
	struct inotify_inode_mark_entry *found_ientry;
	int wd;
377 378 379

	spin_lock(&group->inotify_data.idr_lock);
	idr = &group->inotify_data.idr;
380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402
	wd = ientry->wd;

	if (wd == -1)
		goto out;

	entry = idr_find(&group->inotify_data.idr, wd);
	if (unlikely(!entry))
		goto out;

	found_ientry = container_of(entry, struct inotify_inode_mark_entry, fsn_entry);
	if (unlikely(found_ientry != ientry)) {
		/* We found an entry in the idr with the right wd, but it's
		 * not the entry we were told to remove.  eparis seriously
		 * fucked up somewhere. */
		WARN_ON(1);
		ientry->wd = -1;
		goto out;
	}

	/* One ref for being in the idr, one ref held by the caller */
	BUG_ON(atomic_read(&entry->refcnt) < 2);

	idr_remove(idr, wd);
403
	ientry->wd = -1;
404 405 406 407 408

	/* removed from the idr, drop that ref */
	fsnotify_put_mark(entry);
out:
	spin_unlock(&group->inotify_data.idr_lock);
409
}
410

411
/*
412
 * Send IN_IGNORED for this wd, remove this wd from the idr.
413
 */
414 415
void inotify_ignored_and_remove_idr(struct fsnotify_mark_entry *entry,
				    struct fsnotify_group *group)
416 417
{
	struct inotify_inode_mark_entry *ientry;
418
	struct fsnotify_event *ignored_event;
419 420
	struct inotify_event_private_data *event_priv;
	struct fsnotify_event_private_data *fsn_event_priv;
E
Eric Paris 已提交
421
	int ret;
422

423 424 425 426 427 428
	ignored_event = fsnotify_create_event(NULL, FS_IN_IGNORED, NULL,
					      FSNOTIFY_EVENT_NONE, NULL, 0,
					      GFP_NOFS);
	if (!ignored_event)
		return;

429 430
	ientry = container_of(entry, struct inotify_inode_mark_entry, fsn_entry);

431
	event_priv = kmem_cache_alloc(event_priv_cachep, GFP_NOFS);
432 433 434 435 436 437 438 439
	if (unlikely(!event_priv))
		goto skip_send_ignore;

	fsn_event_priv = &event_priv->fsnotify_event_priv_data;

	fsn_event_priv->group = group;
	event_priv->wd = ientry->wd;

E
Eric Paris 已提交
440 441
	ret = fsnotify_add_notify_event(group, ignored_event, fsn_event_priv);
	if (ret)
442 443 444 445
		inotify_free_event_priv(fsn_event_priv);

skip_send_ignore:

446 447 448
	/* matches the reference taken when the event was created */
	fsnotify_put_event(ignored_event);

449
	/* remove this entry from the idr */
450
	inotify_remove_from_idr(group, ientry);
451

452
	atomic_dec(&group->inotify_data.user->inotify_watches);
453 454 455 456 457 458 459 460 461 462
}

/* ding dong the mark is dead */
static void inotify_free_mark(struct fsnotify_mark_entry *entry)
{
	struct inotify_inode_mark_entry *ientry = (struct inotify_inode_mark_entry *)entry;

	kmem_cache_free(inotify_inode_mark_cachep, ientry);
}

463 464 465
static int inotify_update_existing_watch(struct fsnotify_group *group,
					 struct inode *inode,
					 u32 arg)
466
{
467
	struct fsnotify_mark_entry *entry;
468 469
	struct inotify_inode_mark_entry *ientry;
	__u32 old_mask, new_mask;
470 471 472
	__u32 mask;
	int add = (arg & IN_MASK_ADD);
	int ret;
473 474 475 476 477 478 479 480 481

	/* don't allow invalid bits: we don't want flags set */
	mask = inotify_arg_to_mask(arg);
	if (unlikely(!mask))
		return -EINVAL;

	spin_lock(&inode->i_lock);
	entry = fsnotify_find_mark_entry(group, inode);
	spin_unlock(&inode->i_lock);
482 483
	if (!entry)
		return -ENOENT;
484

485
	ientry = container_of(entry, struct inotify_inode_mark_entry, fsn_entry);
486

487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516
	spin_lock(&entry->lock);

	old_mask = entry->mask;
	if (add) {
		entry->mask |= mask;
		new_mask = entry->mask;
	} else {
		entry->mask = mask;
		new_mask = entry->mask;
	}

	spin_unlock(&entry->lock);

	if (old_mask != new_mask) {
		/* more bits in old than in new? */
		int dropped = (old_mask & ~new_mask);
		/* more bits in this entry than the inode's mask? */
		int do_inode = (new_mask & ~inode->i_fsnotify_mask);
		/* more bits in this entry than the group? */
		int do_group = (new_mask & ~group->mask);

		/* update the inode with this new entry */
		if (dropped || do_inode)
			fsnotify_recalc_inode_mask(inode);

		/* update the group mask with the new mask */
		if (dropped || do_group)
			fsnotify_recalc_group_mask(group);
	}

517 518 519 520
	/* return the wd */
	ret = ientry->wd;

	/* match the get from fsnotify_find_mark_entry() */
521 522
	fsnotify_put_mark(entry);

523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566
	return ret;
}

static int inotify_new_watch(struct fsnotify_group *group,
			     struct inode *inode,
			     u32 arg)
{
	struct inotify_inode_mark_entry *tmp_ientry;
	__u32 mask;
	int ret;

	/* don't allow invalid bits: we don't want flags set */
	mask = inotify_arg_to_mask(arg);
	if (unlikely(!mask))
		return -EINVAL;

	tmp_ientry = kmem_cache_alloc(inotify_inode_mark_cachep, GFP_KERNEL);
	if (unlikely(!tmp_ientry))
		return -ENOMEM;

	fsnotify_init_mark(&tmp_ientry->fsn_entry, inotify_free_mark);
	tmp_ientry->fsn_entry.mask = mask;
	tmp_ientry->wd = -1;

	ret = -ENOSPC;
	if (atomic_read(&group->inotify_data.user->inotify_watches) >= inotify_max_user_watches)
		goto out_err;
retry:
	ret = -ENOMEM;
	if (unlikely(!idr_pre_get(&group->inotify_data.idr, GFP_KERNEL)))
		goto out_err;

	spin_lock(&group->inotify_data.idr_lock);
	ret = idr_get_new_above(&group->inotify_data.idr, &tmp_ientry->fsn_entry,
				group->inotify_data.last_wd,
				&tmp_ientry->wd);
	spin_unlock(&group->inotify_data.idr_lock);
	if (ret) {
		/* idr was out of memory allocate and try again */
		if (ret == -EAGAIN)
			goto retry;
		goto out_err;
	}

567 568 569
	/* we put the mark on the idr, take a reference */
	fsnotify_get_mark(&tmp_ientry->fsn_entry);

570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589
	/* we are on the idr, now get on the inode */
	ret = fsnotify_add_mark(&tmp_ientry->fsn_entry, group, inode);
	if (ret) {
		/* we failed to get on the inode, get off the idr */
		inotify_remove_from_idr(group, tmp_ientry);
		goto out_err;
	}

	/* update the idr hint, who cares about races, it's just a hint */
	group->inotify_data.last_wd = tmp_ientry->wd;

	/* increment the number of watches the user has */
	atomic_inc(&group->inotify_data.user->inotify_watches);

	/* return the watch descriptor for this new entry */
	ret = tmp_ientry->wd;

	/* match the ref from fsnotify_init_markentry() */
	fsnotify_put_mark(&tmp_ientry->fsn_entry);

590
out_err:
591
	if (ret < 0)
592
		kmem_cache_free(inotify_inode_mark_cachep, tmp_ientry);
593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613

	return ret;
}

static int inotify_update_watch(struct fsnotify_group *group, struct inode *inode, u32 arg)
{
	int ret = 0;

retry:
	/* try to update and existing watch with the new arg */
	ret = inotify_update_existing_watch(group, inode, arg);
	/* no mark present, try to add a new one */
	if (ret == -ENOENT)
		ret = inotify_new_watch(group, inode, arg);
	/*
	 * inotify_new_watch could race with another thread which did an
	 * inotify_new_watch between the update_existing and the add watch
	 * here, go back and try to update an existing mark again.
	 */
	if (ret == -EEXIST)
		goto retry;
614

615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632
	return ret;
}

static struct fsnotify_group *inotify_new_group(struct user_struct *user, unsigned int max_events)
{
	struct fsnotify_group *group;
	unsigned int grp_num;

	/* fsnotify_obtain_group took a reference to group, we put this when we kill the file in the end */
	grp_num = (INOTIFY_GROUP_NUM - atomic_inc_return(&inotify_grp_num));
	group = fsnotify_obtain_group(grp_num, 0, &inotify_fsnotify_ops);
	if (IS_ERR(group))
		return group;

	group->max_events = max_events;

	spin_lock_init(&group->inotify_data.idr_lock);
	idr_init(&group->inotify_data.idr);
633
	group->inotify_data.last_wd = 1;
634 635 636 637 638 639 640 641
	group->inotify_data.user = user;
	group->inotify_data.fa = NULL;

	return group;
}


/* inotify syscalls */
642
SYSCALL_DEFINE1(inotify_init1, int, flags)
643
{
644
	struct fsnotify_group *group;
645 646 647 648
	struct user_struct *user;
	struct file *filp;
	int fd, ret;

649 650 651 652
	/* Check the IN_* constants for consistency.  */
	BUILD_BUG_ON(IN_CLOEXEC != O_CLOEXEC);
	BUILD_BUG_ON(IN_NONBLOCK != O_NONBLOCK);

653
	if (flags & ~(IN_CLOEXEC | IN_NONBLOCK))
U
Ulrich Drepper 已提交
654 655 656
		return -EINVAL;

	fd = get_unused_fd_flags(flags & O_CLOEXEC);
657 658 659 660 661 662 663 664 665
	if (fd < 0)
		return fd;

	filp = get_empty_filp();
	if (!filp) {
		ret = -ENFILE;
		goto out_put_fd;
	}

666
	user = get_current_user();
667 668 669 670 671 672
	if (unlikely(atomic_read(&user->inotify_devs) >=
			inotify_max_user_instances)) {
		ret = -EMFILE;
		goto out_free_uid;
	}

673 674 675 676
	/* fsnotify_obtain_group took a reference to group, we put this when we kill the file in the end */
	group = inotify_new_group(user, inotify_max_queued_events);
	if (IS_ERR(group)) {
		ret = PTR_ERR(group);
677 678 679 680
		goto out_free_uid;
	}

	filp->f_op = &inotify_fops;
681 682 683
	filp->f_path.mnt = mntget(inotify_mnt);
	filp->f_path.dentry = dget(inotify_mnt->mnt_root);
	filp->f_mapping = filp->f_path.dentry->d_inode->i_mapping;
684
	filp->f_mode = FMODE_READ;
685
	filp->f_flags = O_RDONLY | (flags & O_NONBLOCK);
686 687
	filp->private_data = group;

688
	atomic_inc(&user->inotify_devs);
689

690 691 692
	fd_install(fd, filp);

	return fd;
693

694 695 696 697 698 699 700 701
out_free_uid:
	free_uid(user);
	put_filp(filp);
out_put_fd:
	put_unused_fd(fd);
	return ret;
}

702
SYSCALL_DEFINE0(inotify_init)
U
Ulrich Drepper 已提交
703 704 705 706
{
	return sys_inotify_init1(0);
}

707 708
SYSCALL_DEFINE3(inotify_add_watch, int, fd, const char __user *, pathname,
		u32, mask)
709
{
710
	struct fsnotify_group *group;
711
	struct inode *inode;
712
	struct path path;
713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731
	struct file *filp;
	int ret, fput_needed;
	unsigned flags = 0;

	filp = fget_light(fd, &fput_needed);
	if (unlikely(!filp))
		return -EBADF;

	/* verify that this is indeed an inotify instance */
	if (unlikely(filp->f_op != &inotify_fops)) {
		ret = -EINVAL;
		goto fput_and_out;
	}

	if (!(mask & IN_DONT_FOLLOW))
		flags |= LOOKUP_FOLLOW;
	if (mask & IN_ONLYDIR)
		flags |= LOOKUP_DIRECTORY;

732 733
	ret = inotify_find_inode(pathname, &path, flags);
	if (ret)
734 735
		goto fput_and_out;

736
	/* inode held in place by reference to path; group by fget on fd */
737
	inode = path.dentry->d_inode;
738
	group = filp->private_data;
739

740 741 742 743
	/* create/update an inode mark */
	ret = inotify_update_watch(group, inode, mask);
	if (unlikely(ret))
		goto path_put_and_out;
744

745
path_put_and_out:
746
	path_put(&path);
747 748 749 750 751
fput_and_out:
	fput_light(filp, fput_needed);
	return ret;
}

752
SYSCALL_DEFINE2(inotify_rm_watch, int, fd, __s32, wd)
753
{
754 755
	struct fsnotify_group *group;
	struct fsnotify_mark_entry *entry;
756
	struct file *filp;
757
	int ret = 0, fput_needed;
758 759 760 761 762 763 764 765 766 767 768

	filp = fget_light(fd, &fput_needed);
	if (unlikely(!filp))
		return -EBADF;

	/* verify that this is indeed an inotify instance */
	if (unlikely(filp->f_op != &inotify_fops)) {
		ret = -EINVAL;
		goto out;
	}

769
	group = filp->private_data;
770

771 772 773 774 775 776 777 778 779 780
	spin_lock(&group->inotify_data.idr_lock);
	entry = idr_find(&group->inotify_data.idr, wd);
	if (unlikely(!entry)) {
		spin_unlock(&group->inotify_data.idr_lock);
		ret = -EINVAL;
		goto out;
	}
	fsnotify_get_mark(entry);
	spin_unlock(&group->inotify_data.idr_lock);

781
	fsnotify_destroy_mark_by_entry(entry);
782
	fsnotify_put_mark(entry);
783 784 785 786 787 788

out:
	fput_light(filp, fput_needed);
	return ret;
}

789
static int
790
inotify_get_sb(struct file_system_type *fs_type, int flags,
791
	       const char *dev_name, void *data, struct vfsmount *mnt)
792
{
793 794
	return get_sb_pseudo(fs_type, "inotify", NULL,
			INOTIFYFS_SUPER_MAGIC, mnt);
795 796 797
}

static struct file_system_type inotify_fs_type = {
798 799 800
    .name	= "inotifyfs",
    .get_sb	= inotify_get_sb,
    .kill_sb	= kill_anon_super,
801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819
};

/*
 * inotify_user_setup - Our initialization function.  Note that we cannnot return
 * error because we have compiled-in VFS hooks.  So an (unlikely) failure here
 * must result in panic().
 */
static int __init inotify_user_setup(void)
{
	int ret;

	ret = register_filesystem(&inotify_fs_type);
	if (unlikely(ret))
		panic("inotify: register_filesystem returned %d!\n", ret);

	inotify_mnt = kern_mount(&inotify_fs_type);
	if (IS_ERR(inotify_mnt))
		panic("inotify: kern_mount ret %ld!\n", PTR_ERR(inotify_mnt));

820 821 822
	inotify_inode_mark_cachep = KMEM_CACHE(inotify_inode_mark_entry, SLAB_PANIC);
	event_priv_cachep = KMEM_CACHE(inotify_event_private_data, SLAB_PANIC);

823 824 825 826 827 828 829
	inotify_max_queued_events = 16384;
	inotify_max_user_instances = 128;
	inotify_max_user_watches = 8192;

	return 0;
}
module_init(inotify_user_setup);