]> Git Repo - linux.git/blame - fs/kernfs/dir.c
Merge tag 'driver-core-6.10-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux.git] / fs / kernfs / dir.c
CommitLineData
55716d26 1// SPDX-License-Identifier: GPL-2.0-only
b8441ed2
TH
2/*
3 * fs/kernfs/dir.c - kernfs directory implementation
4 *
5 * Copyright (c) 2001-3 Patrick Mochel
6 * Copyright (c) 2007 SUSE Linux Products GmbH
7 * Copyright (c) 2007, 2013 Tejun Heo <[email protected]>
b8441ed2 8 */
fd7b9f7b 9
abd54f02 10#include <linux/sched.h>
fd7b9f7b
TH
11#include <linux/fs.h>
12#include <linux/namei.h>
13#include <linux/idr.h>
14#include <linux/slab.h>
15#include <linux/security.h>
16#include <linux/hash.h>
17
18#include "kernfs-internal.h"
19
06fb4736 20static DEFINE_RWLOCK(kernfs_rename_lock); /* kn->parent and ->name */
1a702dc8
HL
21/*
22 * Don't use rename_lock to piggy back on pr_cont_buf. We don't want to
23 * call pr_cont() while holding rename_lock. Because sometimes pr_cont()
24 * will perform wakeups when releasing console_sem. Holding rename_lock
25 * will introduce deadlock if the scheduler reads the kernfs_name in the
26 * wakeup path.
27 */
28static DEFINE_SPINLOCK(kernfs_pr_cont_lock);
29static char kernfs_pr_cont_buf[PATH_MAX]; /* protected by pr_cont_lock */
e3977e06 30static DEFINE_SPINLOCK(kernfs_idr_lock); /* root->ino_idr */
fd7b9f7b 31
adc5e8b5 32#define rb_to_kn(X) rb_entry((X), struct kernfs_node, rb)
fd7b9f7b 33
1edfe4ea
TH
34static bool __kernfs_active(struct kernfs_node *kn)
35{
36 return atomic_read(&kn->active) >= 0;
37}
38
81c173cb
TH
39static bool kernfs_active(struct kernfs_node *kn)
40{
393c3714 41 lockdep_assert_held(&kernfs_root(kn)->kernfs_rwsem);
1edfe4ea 42 return __kernfs_active(kn);
81c173cb
TH
43}
44
182fd64b
TH
45static bool kernfs_lockdep(struct kernfs_node *kn)
46{
47#ifdef CONFIG_DEBUG_LOCK_ALLOC
48 return kn->flags & KERNFS_LOCKDEP;
49#else
50 return false;
51#endif
52}
53
3eef34ad
TH
54static int kernfs_name_locked(struct kernfs_node *kn, char *buf, size_t buflen)
55{
17627157 56 if (!kn)
5b56bf5c 57 return strscpy(buf, "(null)", buflen);
17627157 58
5b56bf5c 59 return strscpy(buf, kn->parent ? kn->name : "/", buflen);
3eef34ad
TH
60}
61
9f6df573
AK
62/* kernfs_node_depth - compute depth from @from to @to */
63static size_t kernfs_depth(struct kernfs_node *from, struct kernfs_node *to)
3eef34ad 64{
9f6df573 65 size_t depth = 0;
3eef34ad 66
9f6df573
AK
67 while (to->parent && to != from) {
68 depth++;
69 to = to->parent;
70 }
71 return depth;
72}
3eef34ad 73
9f6df573
AK
74static struct kernfs_node *kernfs_common_ancestor(struct kernfs_node *a,
75 struct kernfs_node *b)
76{
77 size_t da, db;
78 struct kernfs_root *ra = kernfs_root(a), *rb = kernfs_root(b);
79
80 if (ra != rb)
81 return NULL;
82
83 da = kernfs_depth(ra->kn, a);
84 db = kernfs_depth(rb->kn, b);
85
86 while (da > db) {
87 a = a->parent;
88 da--;
89 }
90 while (db > da) {
91 b = b->parent;
92 db--;
93 }
94
95 /* worst case b and a will be the same at root */
96 while (b != a) {
97 b = b->parent;
98 a = a->parent;
99 }
100
101 return a;
102}
103
104/**
105 * kernfs_path_from_node_locked - find a pseudo-absolute path to @kn_to,
106 * where kn_from is treated as root of the path.
107 * @kn_from: kernfs node which should be treated as root for the path
108 * @kn_to: kernfs node to which path is needed
109 * @buf: buffer to copy the path into
110 * @buflen: size of @buf
111 *
112 * We need to handle couple of scenarios here:
113 * [1] when @kn_from is an ancestor of @kn_to at some level
114 * kn_from: /n1/n2/n3
115 * kn_to: /n1/n2/n3/n4/n5
116 * result: /n4/n5
117 *
118 * [2] when @kn_from is on a different hierarchy and we need to find common
119 * ancestor between @kn_from and @kn_to.
120 * kn_from: /n1/n2/n3/n4
121 * kn_to: /n1/n2/n5
122 * result: /../../n5
123 * OR
124 * kn_from: /n1/n2/n3/n4/n5 [depth=5]
125 * kn_to: /n1/n2/n3 [depth=3]
126 * result: /../..
127 *
24b3e3dd 128 * [3] when @kn_to is %NULL result will be "(null)"
17627157 129 *
ff6d413b 130 * Return: the length of the constructed path. If the path would have been
3abb1d90
TH
131 * greater than @buflen, @buf contains the truncated path with the trailing
132 * '\0'. On error, -errno is returned.
9f6df573
AK
133 */
134static int kernfs_path_from_node_locked(struct kernfs_node *kn_to,
135 struct kernfs_node *kn_from,
136 char *buf, size_t buflen)
137{
138 struct kernfs_node *kn, *common;
139 const char parent_str[] = "/..";
3abb1d90 140 size_t depth_from, depth_to, len = 0;
ff6d413b 141 ssize_t copied;
3abb1d90 142 int i, j;
9f6df573 143
17627157 144 if (!kn_to)
ff6d413b 145 return strscpy(buf, "(null)", buflen);
17627157 146
9f6df573
AK
147 if (!kn_from)
148 kn_from = kernfs_root(kn_to)->kn;
149
150 if (kn_from == kn_to)
ff6d413b 151 return strscpy(buf, "/", buflen);
9f6df573
AK
152
153 common = kernfs_common_ancestor(kn_from, kn_to);
154 if (WARN_ON(!common))
3abb1d90 155 return -EINVAL;
9f6df573
AK
156
157 depth_to = kernfs_depth(common, kn_to);
158 depth_from = kernfs_depth(common, kn_from);
159
bbe70e4e 160 buf[0] = '\0';
9f6df573 161
ff6d413b
KC
162 for (i = 0; i < depth_from; i++) {
163 copied = strscpy(buf + len, parent_str, buflen - len);
164 if (copied < 0)
165 return copied;
166 len += copied;
167 }
9f6df573
AK
168
169 /* Calculate how many bytes we need for the rest */
3abb1d90
TH
170 for (i = depth_to - 1; i >= 0; i--) {
171 for (kn = kn_to, j = 0; j < i; j++)
172 kn = kn->parent;
ff6d413b
KC
173
174 len += scnprintf(buf + len, buflen - len, "/%s", kn->name);
9f6df573 175 }
3eef34ad 176
3abb1d90 177 return len;
3eef34ad
TH
178}
179
180/**
181 * kernfs_name - obtain the name of a given node
182 * @kn: kernfs_node of interest
183 * @buf: buffer to copy @kn's name into
184 * @buflen: size of @buf
185 *
186 * Copies the name of @kn into @buf of @buflen bytes. The behavior is
5b56bf5c 187 * similar to strscpy().
3eef34ad 188 *
24b3e3dd
RD
189 * Fills buffer with "(null)" if @kn is %NULL.
190 *
5b56bf5c
KC
191 * Return: the resulting length of @buf. If @buf isn't long enough,
192 * it's filled up to @buflen-1 and nul terminated, and returns -E2BIG.
17627157 193 *
3eef34ad
TH
194 * This function can be called from any context.
195 */
196int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
197{
198 unsigned long flags;
199 int ret;
200
06fb4736 201 read_lock_irqsave(&kernfs_rename_lock, flags);
3eef34ad 202 ret = kernfs_name_locked(kn, buf, buflen);
06fb4736 203 read_unlock_irqrestore(&kernfs_rename_lock, flags);
3eef34ad
TH
204 return ret;
205}
206
9f6df573
AK
207/**
208 * kernfs_path_from_node - build path of node @to relative to @from.
209 * @from: parent kernfs_node relative to which we need to build the path
210 * @to: kernfs_node of interest
211 * @buf: buffer to copy @to's path into
212 * @buflen: size of @buf
213 *
214 * Builds @to's path relative to @from in @buf. @from and @to must
215 * be on the same kernfs-root. If @from is not parent of @to, then a relative
216 * path (which includes '..'s) as needed to reach from @from to @to is
217 * returned.
218 *
ff6d413b 219 * Return: the length of the constructed path. If the path would have been
3abb1d90
TH
220 * greater than @buflen, @buf contains the truncated path with the trailing
221 * '\0'. On error, -errno is returned.
9f6df573
AK
222 */
223int kernfs_path_from_node(struct kernfs_node *to, struct kernfs_node *from,
224 char *buf, size_t buflen)
225{
226 unsigned long flags;
227 int ret;
228
06fb4736 229 read_lock_irqsave(&kernfs_rename_lock, flags);
9f6df573 230 ret = kernfs_path_from_node_locked(to, from, buf, buflen);
06fb4736 231 read_unlock_irqrestore(&kernfs_rename_lock, flags);
9f6df573
AK
232 return ret;
233}
234EXPORT_SYMBOL_GPL(kernfs_path_from_node);
235
3eef34ad
TH
236/**
237 * pr_cont_kernfs_name - pr_cont name of a kernfs_node
238 * @kn: kernfs_node of interest
239 *
240 * This function can be called from any context.
241 */
242void pr_cont_kernfs_name(struct kernfs_node *kn)
243{
244 unsigned long flags;
245
1a702dc8 246 spin_lock_irqsave(&kernfs_pr_cont_lock, flags);
3eef34ad 247
1a702dc8 248 kernfs_name(kn, kernfs_pr_cont_buf, sizeof(kernfs_pr_cont_buf));
3eef34ad
TH
249 pr_cont("%s", kernfs_pr_cont_buf);
250
1a702dc8 251 spin_unlock_irqrestore(&kernfs_pr_cont_lock, flags);
3eef34ad
TH
252}
253
254/**
255 * pr_cont_kernfs_path - pr_cont path of a kernfs_node
256 * @kn: kernfs_node of interest
257 *
258 * This function can be called from any context.
259 */
260void pr_cont_kernfs_path(struct kernfs_node *kn)
261{
262 unsigned long flags;
9f6df573 263 int sz;
3eef34ad 264
1a702dc8 265 spin_lock_irqsave(&kernfs_pr_cont_lock, flags);
3eef34ad 266
1a702dc8
HL
267 sz = kernfs_path_from_node(kn, NULL, kernfs_pr_cont_buf,
268 sizeof(kernfs_pr_cont_buf));
9f6df573 269 if (sz < 0) {
ff6d413b
KC
270 if (sz == -E2BIG)
271 pr_cont("(name too long)");
272 else
273 pr_cont("(error)");
9f6df573
AK
274 goto out;
275 }
276
277 pr_cont("%s", kernfs_pr_cont_buf);
3eef34ad 278
9f6df573 279out:
1a702dc8 280 spin_unlock_irqrestore(&kernfs_pr_cont_lock, flags);
3eef34ad
TH
281}
282
283/**
284 * kernfs_get_parent - determine the parent node and pin it
285 * @kn: kernfs_node of interest
286 *
287 * Determines @kn's parent, pins and returns it. This function can be
288 * called from any context.
24b3e3dd
RD
289 *
290 * Return: parent node of @kn
3eef34ad
TH
291 */
292struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
293{
294 struct kernfs_node *parent;
295 unsigned long flags;
296
06fb4736 297 read_lock_irqsave(&kernfs_rename_lock, flags);
3eef34ad
TH
298 parent = kn->parent;
299 kernfs_get(parent);
06fb4736 300 read_unlock_irqrestore(&kernfs_rename_lock, flags);
3eef34ad
TH
301
302 return parent;
303}
304
fd7b9f7b 305/**
24b3e3dd 306 * kernfs_name_hash - calculate hash of @ns + @name
fd7b9f7b
TH
307 * @name: Null terminated string to hash
308 * @ns: Namespace tag to hash
309 *
24b3e3dd 310 * Return: 31-bit hash of ns + name (so it fits in an off_t)
fd7b9f7b 311 */
c637b8ac 312static unsigned int kernfs_name_hash(const char *name, const void *ns)
fd7b9f7b 313{
8387ff25 314 unsigned long hash = init_name_hash(ns);
fd7b9f7b
TH
315 unsigned int len = strlen(name);
316 while (len--)
317 hash = partial_name_hash(*name++, hash);
8387ff25 318 hash = end_name_hash(hash);
fd7b9f7b
TH
319 hash &= 0x7fffffffU;
320 /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
88391d49 321 if (hash < 2)
fd7b9f7b
TH
322 hash += 2;
323 if (hash >= INT_MAX)
324 hash = INT_MAX - 1;
325 return hash;
326}
327
c637b8ac
TH
328static int kernfs_name_compare(unsigned int hash, const char *name,
329 const void *ns, const struct kernfs_node *kn)
fd7b9f7b 330{
72392ed0
RV
331 if (hash < kn->hash)
332 return -1;
333 if (hash > kn->hash)
334 return 1;
335 if (ns < kn->ns)
336 return -1;
337 if (ns > kn->ns)
338 return 1;
adc5e8b5 339 return strcmp(name, kn->name);
fd7b9f7b
TH
340}
341
c637b8ac
TH
342static int kernfs_sd_compare(const struct kernfs_node *left,
343 const struct kernfs_node *right)
fd7b9f7b 344{
c637b8ac 345 return kernfs_name_compare(left->hash, left->name, left->ns, right);
fd7b9f7b
TH
346}
347
348/**
c637b8ac 349 * kernfs_link_sibling - link kernfs_node into sibling rbtree
324a56e1 350 * @kn: kernfs_node of interest
fd7b9f7b 351 *
324a56e1 352 * Link @kn into its sibling rbtree which starts from
adc5e8b5 353 * @kn->parent->dir.children.
fd7b9f7b
TH
354 *
355 * Locking:
7ba0273b 356 * kernfs_rwsem held exclusive
fd7b9f7b 357 *
24b3e3dd
RD
358 * Return:
359 * %0 on success, -EEXIST on failure.
fd7b9f7b 360 */
c637b8ac 361static int kernfs_link_sibling(struct kernfs_node *kn)
fd7b9f7b 362{
adc5e8b5 363 struct rb_node **node = &kn->parent->dir.children.rb_node;
fd7b9f7b
TH
364 struct rb_node *parent = NULL;
365
fd7b9f7b 366 while (*node) {
324a56e1 367 struct kernfs_node *pos;
fd7b9f7b
TH
368 int result;
369
324a56e1 370 pos = rb_to_kn(*node);
fd7b9f7b 371 parent = *node;
c637b8ac 372 result = kernfs_sd_compare(kn, pos);
fd7b9f7b 373 if (result < 0)
adc5e8b5 374 node = &pos->rb.rb_left;
fd7b9f7b 375 else if (result > 0)
adc5e8b5 376 node = &pos->rb.rb_right;
fd7b9f7b
TH
377 else
378 return -EEXIST;
379 }
c1befb88 380
fd7b9f7b 381 /* add new node and rebalance the tree */
adc5e8b5
TH
382 rb_link_node(&kn->rb, parent, node);
383 rb_insert_color(&kn->rb, &kn->parent->dir.children);
c1befb88
JZ
384
385 /* successfully added, account subdir number */
0559f630 386 down_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
c1befb88
JZ
387 if (kernfs_type(kn) == KERNFS_DIR)
388 kn->parent->dir.subdirs++;
895adbec 389 kernfs_inc_rev(kn->parent);
0559f630 390 up_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
c1befb88 391
fd7b9f7b
TH
392 return 0;
393}
394
395/**
c637b8ac 396 * kernfs_unlink_sibling - unlink kernfs_node from sibling rbtree
324a56e1 397 * @kn: kernfs_node of interest
fd7b9f7b 398 *
35beab06 399 * Try to unlink @kn from its sibling rbtree which starts from
24b3e3dd
RD
400 * kn->parent->dir.children.
401 *
402 * Return: %true if @kn was actually removed,
403 * %false if @kn wasn't on the rbtree.
fd7b9f7b
TH
404 *
405 * Locking:
7ba0273b 406 * kernfs_rwsem held exclusive
fd7b9f7b 407 */
35beab06 408static bool kernfs_unlink_sibling(struct kernfs_node *kn)
fd7b9f7b 409{
35beab06
TH
410 if (RB_EMPTY_NODE(&kn->rb))
411 return false;
412
0559f630 413 down_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
df23fc39 414 if (kernfs_type(kn) == KERNFS_DIR)
adc5e8b5 415 kn->parent->dir.subdirs--;
895adbec 416 kernfs_inc_rev(kn->parent);
0559f630 417 up_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
fd7b9f7b 418
adc5e8b5 419 rb_erase(&kn->rb, &kn->parent->dir.children);
35beab06
TH
420 RB_CLEAR_NODE(&kn->rb);
421 return true;
fd7b9f7b
TH
422}
423
424/**
c637b8ac 425 * kernfs_get_active - get an active reference to kernfs_node
324a56e1 426 * @kn: kernfs_node to get an active reference to
fd7b9f7b 427 *
324a56e1 428 * Get an active reference of @kn. This function is noop if @kn
24b3e3dd 429 * is %NULL.
fd7b9f7b 430 *
24b3e3dd
RD
431 * Return:
432 * Pointer to @kn on success, %NULL on failure.
fd7b9f7b 433 */
c637b8ac 434struct kernfs_node *kernfs_get_active(struct kernfs_node *kn)
fd7b9f7b 435{
324a56e1 436 if (unlikely(!kn))
fd7b9f7b
TH
437 return NULL;
438
f4b3e631
GKH
439 if (!atomic_inc_unless_negative(&kn->active))
440 return NULL;
895a068a 441
182fd64b 442 if (kernfs_lockdep(kn))
f4b3e631
GKH
443 rwsem_acquire_read(&kn->dep_map, 0, 1, _RET_IP_);
444 return kn;
fd7b9f7b
TH
445}
446
447/**
c637b8ac 448 * kernfs_put_active - put an active reference to kernfs_node
324a56e1 449 * @kn: kernfs_node to put an active reference to
fd7b9f7b 450 *
324a56e1 451 * Put an active reference to @kn. This function is noop if @kn
24b3e3dd 452 * is %NULL.
fd7b9f7b 453 */
c637b8ac 454void kernfs_put_active(struct kernfs_node *kn)
fd7b9f7b
TH
455{
456 int v;
457
324a56e1 458 if (unlikely(!kn))
fd7b9f7b
TH
459 return;
460
182fd64b 461 if (kernfs_lockdep(kn))
5facae4f 462 rwsem_release(&kn->dep_map, _RET_IP_);
adc5e8b5 463 v = atomic_dec_return(&kn->active);
df23fc39 464 if (likely(v != KN_DEACTIVATED_BIAS))
fd7b9f7b
TH
465 return;
466
2fd60da4 467 wake_up_all(&kernfs_root(kn)->deactivate_waitq);
fd7b9f7b
TH
468}
469
470/**
81c173cb
TH
471 * kernfs_drain - drain kernfs_node
472 * @kn: kernfs_node to drain
fd7b9f7b 473 *
24b3e3dd 474 * Drain existing usages and nuke all existing mmaps of @kn. Multiple
81c173cb
TH
475 * removers may invoke this function concurrently on @kn and all will
476 * return after draining is complete.
fd7b9f7b 477 */
81c173cb 478static void kernfs_drain(struct kernfs_node *kn)
393c3714
MK
479 __releases(&kernfs_root(kn)->kernfs_rwsem)
480 __acquires(&kernfs_root(kn)->kernfs_rwsem)
fd7b9f7b 481{
abd54f02 482 struct kernfs_root *root = kernfs_root(kn);
fd7b9f7b 483
393c3714 484 lockdep_assert_held_write(&root->kernfs_rwsem);
81c173cb 485 WARN_ON_ONCE(kernfs_active(kn));
ea1c472d 486
2d7f9f8c
TH
487 /*
488 * Skip draining if already fully drained. This avoids draining and its
489 * lockdep annotations for nodes which have never been activated
490 * allowing embedding kernfs_remove() in create error paths without
491 * worrying about draining.
492 */
493 if (atomic_read(&kn->active) == KN_DEACTIVATED_BIAS &&
494 !kernfs_should_drain_open_files(kn))
495 return;
496
393c3714 497 up_write(&root->kernfs_rwsem);
abd54f02 498
182fd64b 499 if (kernfs_lockdep(kn)) {
35beab06
TH
500 rwsem_acquire(&kn->dep_map, 0, 0, _RET_IP_);
501 if (atomic_read(&kn->active) != KN_DEACTIVATED_BIAS)
502 lock_contended(&kn->dep_map, _RET_IP_);
503 }
abd54f02
TH
504
505 wait_event(root->deactivate_waitq,
506 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS);
fd7b9f7b 507
182fd64b 508 if (kernfs_lockdep(kn)) {
a6607930 509 lock_acquired(&kn->dep_map, _RET_IP_);
5facae4f 510 rwsem_release(&kn->dep_map, _RET_IP_);
a6607930 511 }
35beab06 512
bdb2fd7f
TH
513 if (kernfs_should_drain_open_files(kn))
514 kernfs_drain_open_files(kn);
ccf02aaf 515
393c3714 516 down_write(&root->kernfs_rwsem);
fd7b9f7b
TH
517}
518
fd7b9f7b 519/**
324a56e1
TH
520 * kernfs_get - get a reference count on a kernfs_node
521 * @kn: the target kernfs_node
fd7b9f7b 522 */
324a56e1 523void kernfs_get(struct kernfs_node *kn)
fd7b9f7b 524{
324a56e1 525 if (kn) {
adc5e8b5
TH
526 WARN_ON(!atomic_read(&kn->count));
527 atomic_inc(&kn->count);
fd7b9f7b
TH
528 }
529}
530EXPORT_SYMBOL_GPL(kernfs_get);
531
4207b556
TH
532static void kernfs_free_rcu(struct rcu_head *rcu)
533{
534 struct kernfs_node *kn = container_of(rcu, struct kernfs_node, rcu);
535
536 kfree_const(kn->name);
537
538 if (kn->iattr) {
539 simple_xattrs_free(&kn->iattr->xattrs, NULL);
540 kmem_cache_free(kernfs_iattrs_cache, kn->iattr);
541 }
542
543 kmem_cache_free(kernfs_node_cache, kn);
544}
545
fd7b9f7b 546/**
324a56e1
TH
547 * kernfs_put - put a reference count on a kernfs_node
548 * @kn: the target kernfs_node
fd7b9f7b 549 *
324a56e1 550 * Put a reference count of @kn and destroy it if it reached zero.
fd7b9f7b 551 */
324a56e1 552void kernfs_put(struct kernfs_node *kn)
fd7b9f7b 553{
324a56e1 554 struct kernfs_node *parent;
ba7443bc 555 struct kernfs_root *root;
fd7b9f7b 556
adc5e8b5 557 if (!kn || !atomic_dec_and_test(&kn->count))
fd7b9f7b 558 return;
324a56e1 559 root = kernfs_root(kn);
fd7b9f7b 560 repeat:
81c173cb
TH
561 /*
562 * Moving/renaming is always done while holding reference.
adc5e8b5 563 * kn->parent won't change beneath us.
fd7b9f7b 564 */
adc5e8b5 565 parent = kn->parent;
fd7b9f7b 566
81c173cb
TH
567 WARN_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS,
568 "kernfs_put: %s/%s: released with incorrect active_ref %d\n",
569 parent ? parent->name : "", kn->name, atomic_read(&kn->active));
324a56e1 570
df23fc39 571 if (kernfs_type(kn) == KERNFS_LINK)
adc5e8b5 572 kernfs_put(kn->symlink.target_kn);
dfeb0750 573
e3977e06 574 spin_lock(&kernfs_idr_lock);
40430452 575 idr_remove(&root->ino_idr, (u32)kernfs_ino(kn));
e3977e06 576 spin_unlock(&kernfs_idr_lock);
4207b556
TH
577
578 call_rcu(&kn->rcu, kernfs_free_rcu);
fd7b9f7b 579
324a56e1
TH
580 kn = parent;
581 if (kn) {
adc5e8b5 582 if (atomic_dec_and_test(&kn->count))
ba7443bc
TH
583 goto repeat;
584 } else {
324a56e1 585 /* just released the root kn, free @root too */
7d35079f 586 idr_destroy(&root->ino_idr);
4207b556 587 kfree_rcu(root, rcu);
ba7443bc 588 }
fd7b9f7b
TH
589}
590EXPORT_SYMBOL_GPL(kernfs_put);
591
0c23b225
TH
592/**
593 * kernfs_node_from_dentry - determine kernfs_node associated with a dentry
594 * @dentry: the dentry in question
595 *
24b3e3dd 596 * Return: the kernfs_node associated with @dentry. If @dentry is not a
0c23b225
TH
597 * kernfs one, %NULL is returned.
598 *
599 * While the returned kernfs_node will stay accessible as long as @dentry
600 * is accessible, the returned node can be in any state and the caller is
601 * fully responsible for determining what's accessible.
602 */
603struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
604{
0288e7fa 605 if (dentry->d_sb->s_op == &kernfs_sops)
319ba91d 606 return kernfs_dentry_node(dentry);
0c23b225
TH
607 return NULL;
608}
609
db4aad20 610static struct kernfs_node *__kernfs_new_node(struct kernfs_root *root,
e19dfdc8 611 struct kernfs_node *parent,
db4aad20 612 const char *name, umode_t mode,
488dee96 613 kuid_t uid, kgid_t gid,
db4aad20 614 unsigned flags)
fd7b9f7b 615{
324a56e1 616 struct kernfs_node *kn;
40430452 617 u32 id_highbits;
bc755553 618 int ret;
fd7b9f7b 619
dfeb0750
TH
620 name = kstrdup_const(name, GFP_KERNEL);
621 if (!name)
622 return NULL;
fd7b9f7b 623
a797bfc3 624 kn = kmem_cache_zalloc(kernfs_node_cache, GFP_KERNEL);
324a56e1 625 if (!kn)
fd7b9f7b
TH
626 goto err_out1;
627
7d35079f 628 idr_preload(GFP_KERNEL);
e3977e06 629 spin_lock(&kernfs_idr_lock);
4a3ef68a 630 ret = idr_alloc_cyclic(&root->ino_idr, kn, 1, 0, GFP_ATOMIC);
40430452
TH
631 if (ret >= 0 && ret < root->last_id_lowbits)
632 root->id_highbits++;
633 id_highbits = root->id_highbits;
634 root->last_id_lowbits = ret;
e3977e06 635 spin_unlock(&kernfs_idr_lock);
7d35079f 636 idr_preload_end();
bc755553 637 if (ret < 0)
fd7b9f7b 638 goto err_out2;
67c0496e 639
40430452 640 kn->id = (u64)id_highbits << 32 | ret;
fd7b9f7b 641
b680b081 642 atomic_set(&kn->count, 1);
81c173cb 643 atomic_set(&kn->active, KN_DEACTIVATED_BIAS);
35beab06 644 RB_CLEAR_NODE(&kn->rb);
fd7b9f7b 645
adc5e8b5
TH
646 kn->name = name;
647 kn->mode = mode;
81c173cb 648 kn->flags = flags;
fd7b9f7b 649
488dee96
DT
650 if (!uid_eq(uid, GLOBAL_ROOT_UID) || !gid_eq(gid, GLOBAL_ROOT_GID)) {
651 struct iattr iattr = {
652 .ia_valid = ATTR_UID | ATTR_GID,
653 .ia_uid = uid,
654 .ia_gid = gid,
655 };
656
657 ret = __kernfs_setattr(kn, &iattr);
658 if (ret < 0)
659 goto err_out3;
660 }
661
e19dfdc8
OM
662 if (parent) {
663 ret = security_kernfs_init_security(parent, kn);
664 if (ret)
665 goto err_out3;
666 }
667
324a56e1 668 return kn;
fd7b9f7b 669
488dee96 670 err_out3:
e3977e06 671 spin_lock(&kernfs_idr_lock);
40430452 672 idr_remove(&root->ino_idr, (u32)kernfs_ino(kn));
e3977e06 673 spin_unlock(&kernfs_idr_lock);
fd7b9f7b 674 err_out2:
a797bfc3 675 kmem_cache_free(kernfs_node_cache, kn);
fd7b9f7b 676 err_out1:
dfeb0750 677 kfree_const(name);
fd7b9f7b
TH
678 return NULL;
679}
680
db4aad20
TH
681struct kernfs_node *kernfs_new_node(struct kernfs_node *parent,
682 const char *name, umode_t mode,
488dee96 683 kuid_t uid, kgid_t gid,
db4aad20
TH
684 unsigned flags)
685{
686 struct kernfs_node *kn;
687
5133bee6
MK
688 if (parent->mode & S_ISGID) {
689 /* this code block imitates inode_init_owner() for
690 * kernfs
691 */
692
693 if (parent->iattr)
694 gid = parent->iattr->ia_gid;
695
696 if (flags & KERNFS_DIR)
697 mode |= S_ISGID;
698 }
699
e19dfdc8 700 kn = __kernfs_new_node(kernfs_root(parent), parent,
488dee96 701 name, mode, uid, gid, flags);
db4aad20
TH
702 if (kn) {
703 kernfs_get(parent);
704 kn->parent = parent;
705 }
706 return kn;
707}
708
ba16b284 709/*
fe0f726c 710 * kernfs_find_and_get_node_by_id - get kernfs_node from node id
ba16b284 711 * @root: the kernfs root
fe0f726c
TH
712 * @id: the target node id
713 *
714 * @id's lower 32bits encode ino and upper gen. If the gen portion is
715 * zero, all generations are matched.
ba16b284 716 *
24b3e3dd
RD
717 * Return: %NULL on failure,
718 * otherwise a kernfs node with reference counter incremented.
ba16b284 719 */
fe0f726c
TH
720struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
721 u64 id)
ba16b284
SL
722{
723 struct kernfs_node *kn;
fe0f726c
TH
724 ino_t ino = kernfs_id_ino(id);
725 u32 gen = kernfs_id_gen(id);
ba16b284 726
4207b556 727 rcu_read_lock();
b680b081 728
40430452 729 kn = idr_find(&root->ino_idr, (u32)ino);
ba16b284 730 if (!kn)
b680b081 731 goto err_unlock;
ba16b284 732
40430452
TH
733 if (sizeof(ino_t) >= sizeof(u64)) {
734 /* we looked up with the low 32bits, compare the whole */
735 if (kernfs_ino(kn) != ino)
736 goto err_unlock;
737 } else {
738 /* 0 matches all generations */
739 if (unlikely(gen && kernfs_gen(kn) != gen))
740 goto err_unlock;
741 }
fe0f726c 742
1edfe4ea
TH
743 /*
744 * We should fail if @kn has never been activated and guarantee success
745 * if the caller knows that @kn is active. Both can be achieved by
746 * __kernfs_active() which tests @kn->active without kernfs_rwsem.
747 */
748 if (unlikely(!__kernfs_active(kn) || !atomic_inc_not_zero(&kn->count)))
b680b081 749 goto err_unlock;
ba16b284 750
4207b556 751 rcu_read_unlock();
ba16b284 752 return kn;
b680b081 753err_unlock:
4207b556 754 rcu_read_unlock();
ba16b284
SL
755 return NULL;
756}
757
fd7b9f7b 758/**
c637b8ac 759 * kernfs_add_one - add kernfs_node to parent without warning
324a56e1 760 * @kn: kernfs_node to be added
fd7b9f7b 761 *
db4aad20
TH
762 * The caller must already have initialized @kn->parent. This
763 * function increments nlink of the parent's inode if @kn is a
764 * directory and link into the children list of the parent.
fd7b9f7b 765 *
24b3e3dd
RD
766 * Return:
767 * %0 on success, -EEXIST if entry with the given name already
fd7b9f7b
TH
768 * exists.
769 */
988cd7af 770int kernfs_add_one(struct kernfs_node *kn)
fd7b9f7b 771{
db4aad20 772 struct kernfs_node *parent = kn->parent;
393c3714 773 struct kernfs_root *root = kernfs_root(parent);
c525aadd 774 struct kernfs_iattrs *ps_iattr;
988cd7af 775 bool has_ns;
fd7b9f7b
TH
776 int ret;
777
393c3714 778 down_write(&root->kernfs_rwsem);
988cd7af
TH
779
780 ret = -EINVAL;
781 has_ns = kernfs_ns_enabled(parent);
782 if (WARN(has_ns != (bool)kn->ns, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
783 has_ns ? "required" : "invalid", parent->name, kn->name))
784 goto out_unlock;
fd7b9f7b 785
df23fc39 786 if (kernfs_type(parent) != KERNFS_DIR)
988cd7af 787 goto out_unlock;
fd7b9f7b 788
988cd7af 789 ret = -ENOENT;
c2549174 790 if (parent->flags & (KERNFS_REMOVING | KERNFS_EMPTY_DIR))
988cd7af 791 goto out_unlock;
798c75a0 792
c637b8ac 793 kn->hash = kernfs_name_hash(kn->name, kn->ns);
fd7b9f7b 794
c637b8ac 795 ret = kernfs_link_sibling(kn);
fd7b9f7b 796 if (ret)
988cd7af 797 goto out_unlock;
fd7b9f7b
TH
798
799 /* Update timestamps on the parent */
9caf6961
IK
800 down_write(&root->kernfs_iattr_rwsem);
801
adc5e8b5 802 ps_iattr = parent->iattr;
fd7b9f7b 803 if (ps_iattr) {
05895219
OM
804 ktime_get_real_ts64(&ps_iattr->ia_ctime);
805 ps_iattr->ia_mtime = ps_iattr->ia_ctime;
fd7b9f7b
TH
806 }
807
9caf6961 808 up_write(&root->kernfs_iattr_rwsem);
393c3714 809 up_write(&root->kernfs_rwsem);
d35258ef
TH
810
811 /*
812 * Activate the new node unless CREATE_DEACTIVATED is requested.
813 * If not activated here, the kernfs user is responsible for
814 * activating the node with kernfs_activate(). A node which hasn't
815 * been activated is not visible to userland and its removal won't
816 * trigger deactivation.
817 */
818 if (!(kernfs_root(kn)->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
819 kernfs_activate(kn);
820 return 0;
821
988cd7af 822out_unlock:
393c3714 823 up_write(&root->kernfs_rwsem);
988cd7af 824 return ret;
fd7b9f7b
TH
825}
826
827/**
324a56e1
TH
828 * kernfs_find_ns - find kernfs_node with the given name
829 * @parent: kernfs_node to search under
fd7b9f7b
TH
830 * @name: name to look for
831 * @ns: the namespace tag to use
832 *
24b3e3dd
RD
833 * Look for kernfs_node with name @name under @parent.
834 *
835 * Return: pointer to the found kernfs_node on success, %NULL on failure.
fd7b9f7b 836 */
324a56e1
TH
837static struct kernfs_node *kernfs_find_ns(struct kernfs_node *parent,
838 const unsigned char *name,
839 const void *ns)
fd7b9f7b 840{
adc5e8b5 841 struct rb_node *node = parent->dir.children.rb_node;
ac9bba03 842 bool has_ns = kernfs_ns_enabled(parent);
fd7b9f7b
TH
843 unsigned int hash;
844
393c3714 845 lockdep_assert_held(&kernfs_root(parent)->kernfs_rwsem);
fd7b9f7b
TH
846
847 if (has_ns != (bool)ns) {
c637b8ac 848 WARN(1, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
adc5e8b5 849 has_ns ? "required" : "invalid", parent->name, name);
fd7b9f7b
TH
850 return NULL;
851 }
852
c637b8ac 853 hash = kernfs_name_hash(name, ns);
fd7b9f7b 854 while (node) {
324a56e1 855 struct kernfs_node *kn;
fd7b9f7b
TH
856 int result;
857
324a56e1 858 kn = rb_to_kn(node);
c637b8ac 859 result = kernfs_name_compare(hash, name, ns, kn);
fd7b9f7b
TH
860 if (result < 0)
861 node = node->rb_left;
862 else if (result > 0)
863 node = node->rb_right;
864 else
324a56e1 865 return kn;
fd7b9f7b
TH
866 }
867 return NULL;
868}
869
bd96f76a
TH
870static struct kernfs_node *kernfs_walk_ns(struct kernfs_node *parent,
871 const unsigned char *path,
872 const void *ns)
873{
792e0476 874 ssize_t len;
e56ed358 875 char *p, *name;
bd96f76a 876
393c3714 877 lockdep_assert_held_read(&kernfs_root(parent)->kernfs_rwsem);
bd96f76a 878
1a702dc8 879 spin_lock_irq(&kernfs_pr_cont_lock);
e56ed358 880
792e0476 881 len = strscpy(kernfs_pr_cont_buf, path, sizeof(kernfs_pr_cont_buf));
e56ed358 882
792e0476 883 if (len < 0) {
1a702dc8 884 spin_unlock_irq(&kernfs_pr_cont_lock);
bd96f76a 885 return NULL;
e56ed358
TH
886 }
887
888 p = kernfs_pr_cont_buf;
bd96f76a
TH
889
890 while ((name = strsep(&p, "/")) && parent) {
891 if (*name == '\0')
892 continue;
893 parent = kernfs_find_ns(parent, name, ns);
894 }
895
1a702dc8 896 spin_unlock_irq(&kernfs_pr_cont_lock);
e56ed358 897
bd96f76a
TH
898 return parent;
899}
900
fd7b9f7b 901/**
324a56e1
TH
902 * kernfs_find_and_get_ns - find and get kernfs_node with the given name
903 * @parent: kernfs_node to search under
fd7b9f7b
TH
904 * @name: name to look for
905 * @ns: the namespace tag to use
906 *
324a56e1 907 * Look for kernfs_node with name @name under @parent and get a reference
24b3e3dd
RD
908 * if found. This function may sleep.
909 *
910 * Return: pointer to the found kernfs_node on success, %NULL on failure.
fd7b9f7b 911 */
324a56e1
TH
912struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
913 const char *name, const void *ns)
fd7b9f7b 914{
324a56e1 915 struct kernfs_node *kn;
393c3714 916 struct kernfs_root *root = kernfs_root(parent);
fd7b9f7b 917
393c3714 918 down_read(&root->kernfs_rwsem);
324a56e1
TH
919 kn = kernfs_find_ns(parent, name, ns);
920 kernfs_get(kn);
393c3714 921 up_read(&root->kernfs_rwsem);
fd7b9f7b 922
324a56e1 923 return kn;
fd7b9f7b
TH
924}
925EXPORT_SYMBOL_GPL(kernfs_find_and_get_ns);
926
bd96f76a
TH
927/**
928 * kernfs_walk_and_get_ns - find and get kernfs_node with the given path
929 * @parent: kernfs_node to search under
930 * @path: path to look for
931 * @ns: the namespace tag to use
932 *
933 * Look for kernfs_node with path @path under @parent and get a reference
24b3e3dd
RD
934 * if found. This function may sleep.
935 *
936 * Return: pointer to the found kernfs_node on success, %NULL on failure.
bd96f76a
TH
937 */
938struct kernfs_node *kernfs_walk_and_get_ns(struct kernfs_node *parent,
939 const char *path, const void *ns)
940{
941 struct kernfs_node *kn;
393c3714 942 struct kernfs_root *root = kernfs_root(parent);
bd96f76a 943
393c3714 944 down_read(&root->kernfs_rwsem);
bd96f76a
TH
945 kn = kernfs_walk_ns(parent, path, ns);
946 kernfs_get(kn);
393c3714 947 up_read(&root->kernfs_rwsem);
bd96f76a
TH
948
949 return kn;
950}
951
ba7443bc
TH
952/**
953 * kernfs_create_root - create a new kernfs hierarchy
90c07c89 954 * @scops: optional syscall operations for the hierarchy
d35258ef 955 * @flags: KERNFS_ROOT_* flags
ba7443bc
TH
956 * @priv: opaque data associated with the new directory
957 *
24b3e3dd 958 * Return: the root of the new hierarchy on success, ERR_PTR() value on
ba7443bc
TH
959 * failure.
960 */
90c07c89 961struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 962 unsigned int flags, void *priv)
ba7443bc
TH
963{
964 struct kernfs_root *root;
324a56e1 965 struct kernfs_node *kn;
ba7443bc
TH
966
967 root = kzalloc(sizeof(*root), GFP_KERNEL);
968 if (!root)
969 return ERR_PTR(-ENOMEM);
970
7d35079f 971 idr_init(&root->ino_idr);
393c3714 972 init_rwsem(&root->kernfs_rwsem);
9caf6961 973 init_rwsem(&root->kernfs_iattr_rwsem);
c9f2dfb7 974 init_rwsem(&root->kernfs_supers_rwsem);
7d568a83 975 INIT_LIST_HEAD(&root->supers);
40430452
TH
976
977 /*
978 * On 64bit ino setups, id is ino. On 32bit, low 32bits are ino.
979 * High bits generation. The starting value for both ino and
980 * genenration is 1. Initialize upper 32bit allocation
981 * accordingly.
982 */
983 if (sizeof(ino_t) >= sizeof(u64))
984 root->id_highbits = 0;
985 else
986 root->id_highbits = 1;
bc755553 987
e19dfdc8 988 kn = __kernfs_new_node(root, NULL, "", S_IFDIR | S_IRUGO | S_IXUGO,
488dee96 989 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID,
db4aad20 990 KERNFS_DIR);
324a56e1 991 if (!kn) {
7d35079f 992 idr_destroy(&root->ino_idr);
ba7443bc
TH
993 kfree(root);
994 return ERR_PTR(-ENOMEM);
995 }
996
324a56e1 997 kn->priv = priv;
adc5e8b5 998 kn->dir.root = root;
ba7443bc 999
90c07c89 1000 root->syscall_ops = scops;
d35258ef 1001 root->flags = flags;
324a56e1 1002 root->kn = kn;
abd54f02 1003 init_waitqueue_head(&root->deactivate_waitq);
ba7443bc 1004
d35258ef
TH
1005 if (!(root->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
1006 kernfs_activate(kn);
1007
ba7443bc
TH
1008 return root;
1009}
1010
1011/**
1012 * kernfs_destroy_root - destroy a kernfs hierarchy
1013 * @root: root of the hierarchy to destroy
1014 *
1015 * Destroy the hierarchy anchored at @root by removing all existing
1016 * directories and destroying @root.
1017 */
1018void kernfs_destroy_root(struct kernfs_root *root)
1019{
555a0ce4
MK
1020 /*
1021 * kernfs_remove holds kernfs_rwsem from the root so the root
1022 * shouldn't be freed during the operation.
1023 */
1024 kernfs_get(root->kn);
1025 kernfs_remove(root->kn);
1026 kernfs_put(root->kn); /* will also free @root */
ba7443bc
TH
1027}
1028
f2eb478f
GKH
1029/**
1030 * kernfs_root_to_node - return the kernfs_node associated with a kernfs_root
1031 * @root: root to use to lookup
24b3e3dd
RD
1032 *
1033 * Return: @root's kernfs_node
f2eb478f
GKH
1034 */
1035struct kernfs_node *kernfs_root_to_node(struct kernfs_root *root)
1036{
1037 return root->kn;
1038}
1039
fd7b9f7b
TH
1040/**
1041 * kernfs_create_dir_ns - create a directory
1042 * @parent: parent in which to create a new directory
1043 * @name: name of the new directory
bb8b9d09 1044 * @mode: mode of the new directory
488dee96
DT
1045 * @uid: uid of the new directory
1046 * @gid: gid of the new directory
fd7b9f7b
TH
1047 * @priv: opaque data associated with the new directory
1048 * @ns: optional namespace tag of the directory
1049 *
24b3e3dd 1050 * Return: the created node on success, ERR_PTR() value on failure.
fd7b9f7b 1051 */
324a56e1 1052struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09 1053 const char *name, umode_t mode,
488dee96 1054 kuid_t uid, kgid_t gid,
bb8b9d09 1055 void *priv, const void *ns)
fd7b9f7b 1056{
324a56e1 1057 struct kernfs_node *kn;
fd7b9f7b
TH
1058 int rc;
1059
1060 /* allocate */
488dee96
DT
1061 kn = kernfs_new_node(parent, name, mode | S_IFDIR,
1062 uid, gid, KERNFS_DIR);
324a56e1 1063 if (!kn)
fd7b9f7b
TH
1064 return ERR_PTR(-ENOMEM);
1065
adc5e8b5
TH
1066 kn->dir.root = parent->dir.root;
1067 kn->ns = ns;
324a56e1 1068 kn->priv = priv;
fd7b9f7b
TH
1069
1070 /* link in */
988cd7af 1071 rc = kernfs_add_one(kn);
fd7b9f7b 1072 if (!rc)
324a56e1 1073 return kn;
fd7b9f7b 1074
324a56e1 1075 kernfs_put(kn);
fd7b9f7b
TH
1076 return ERR_PTR(rc);
1077}
1078
ea015218
EB
1079/**
1080 * kernfs_create_empty_dir - create an always empty directory
1081 * @parent: parent in which to create a new directory
1082 * @name: name of the new directory
1083 *
24b3e3dd 1084 * Return: the created node on success, ERR_PTR() value on failure.
ea015218
EB
1085 */
1086struct kernfs_node *kernfs_create_empty_dir(struct kernfs_node *parent,
1087 const char *name)
1088{
1089 struct kernfs_node *kn;
1090 int rc;
1091
1092 /* allocate */
488dee96
DT
1093 kn = kernfs_new_node(parent, name, S_IRUGO|S_IXUGO|S_IFDIR,
1094 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, KERNFS_DIR);
ea015218
EB
1095 if (!kn)
1096 return ERR_PTR(-ENOMEM);
1097
1098 kn->flags |= KERNFS_EMPTY_DIR;
1099 kn->dir.root = parent->dir.root;
1100 kn->ns = NULL;
1101 kn->priv = NULL;
1102
1103 /* link in */
1104 rc = kernfs_add_one(kn);
1105 if (!rc)
1106 return kn;
1107
1108 kernfs_put(kn);
1109 return ERR_PTR(rc);
1110}
1111
d826e036
IK
1112static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags)
1113{
1114 struct kernfs_node *kn;
393c3714 1115 struct kernfs_root *root;
d826e036
IK
1116
1117 if (flags & LOOKUP_RCU)
1118 return -ECHILD;
1119
c7e7c042
IK
1120 /* Negative hashed dentry? */
1121 if (d_really_is_negative(dentry)) {
1122 struct kernfs_node *parent;
1123
1124 /* If the kernfs parent node has changed discard and
1125 * proceed to ->lookup.
92b57842
IK
1126 *
1127 * There's nothing special needed here when getting the
1128 * dentry parent, even if a concurrent rename is in
1129 * progress. That's because the dentry is negative so
1130 * it can only be the target of the rename and it will
1131 * be doing a d_move() not a replace. Consequently the
1132 * dentry d_parent won't change over the d_move().
1133 *
1134 * Also kernfs negative dentries transitioning from
1135 * negative to positive during revalidate won't happen
1136 * because they are invalidated on containing directory
1137 * changes and the lookup re-done so that a new positive
1138 * dentry can be properly created.
c7e7c042 1139 */
92b57842
IK
1140 root = kernfs_root_from_sb(dentry->d_sb);
1141 down_read(&root->kernfs_rwsem);
c7e7c042
IK
1142 parent = kernfs_dentry_node(dentry->d_parent);
1143 if (parent) {
1144 if (kernfs_dir_changed(parent, dentry)) {
393c3714 1145 up_read(&root->kernfs_rwsem);
c7e7c042
IK
1146 return 0;
1147 }
92b57842
IK
1148 }
1149 up_read(&root->kernfs_rwsem);
c7e7c042
IK
1150
1151 /* The kernfs parent node hasn't changed, leave the
1152 * dentry negative and return success.
1153 */
1154 return 1;
1155 }
d826e036
IK
1156
1157 kn = kernfs_dentry_node(dentry);
393c3714
MK
1158 root = kernfs_root(kn);
1159 down_read(&root->kernfs_rwsem);
d826e036
IK
1160
1161 /* The kernfs node has been deactivated */
1162 if (!kernfs_active(kn))
1163 goto out_bad;
1164
1165 /* The kernfs node has been moved? */
1166 if (kernfs_dentry_node(dentry->d_parent) != kn->parent)
1167 goto out_bad;
1168
1169 /* The kernfs node has been renamed */
1170 if (strcmp(dentry->d_name.name, kn->name) != 0)
1171 goto out_bad;
1172
1173 /* The kernfs node has been moved to a different namespace */
1174 if (kn->parent && kernfs_ns_enabled(kn->parent) &&
1175 kernfs_info(dentry->d_sb)->ns != kn->ns)
1176 goto out_bad;
1177
393c3714 1178 up_read(&root->kernfs_rwsem);
d826e036
IK
1179 return 1;
1180out_bad:
393c3714 1181 up_read(&root->kernfs_rwsem);
d826e036
IK
1182 return 0;
1183}
1184
1185const struct dentry_operations kernfs_dops = {
1186 .d_revalidate = kernfs_dop_revalidate,
1187};
1188
c637b8ac
TH
1189static struct dentry *kernfs_iop_lookup(struct inode *dir,
1190 struct dentry *dentry,
1191 unsigned int flags)
fd7b9f7b 1192{
319ba91d 1193 struct kernfs_node *parent = dir->i_private;
324a56e1 1194 struct kernfs_node *kn;
393c3714 1195 struct kernfs_root *root;
c7e7c042 1196 struct inode *inode = NULL;
fd7b9f7b
TH
1197 const void *ns = NULL;
1198
393c3714
MK
1199 root = kernfs_root(parent);
1200 down_read(&root->kernfs_rwsem);
324a56e1 1201 if (kernfs_ns_enabled(parent))
c525aadd 1202 ns = kernfs_info(dir->i_sb)->ns;
fd7b9f7b 1203
324a56e1 1204 kn = kernfs_find_ns(parent, dentry->d_name.name, ns);
fd7b9f7b 1205 /* attach dentry and inode */
410d591a
IK
1206 if (kn) {
1207 /* Inactive nodes are invisible to the VFS so don't
1208 * create a negative.
1209 */
1210 if (!kernfs_active(kn)) {
393c3714 1211 up_read(&root->kernfs_rwsem);
410d591a
IK
1212 return NULL;
1213 }
c7e7c042
IK
1214 inode = kernfs_get_inode(dir->i_sb, kn);
1215 if (!inode)
1216 inode = ERR_PTR(-ENOMEM);
fd7b9f7b 1217 }
df38d852
HT
1218 /*
1219 * Needed for negative dentry validation.
1220 * The negative dentry can be created in kernfs_iop_lookup()
1221 * or transforms from positive dentry in dentry_unlink_inode()
1222 * called from vfs_rmdir().
1223 */
1224 if (!IS_ERR(inode))
c7e7c042 1225 kernfs_set_rev(parent, dentry);
393c3714 1226 up_read(&root->kernfs_rwsem);
c7e7c042 1227
df6192f4
IK
1228 /* instantiate and hash (possibly negative) dentry */
1229 return d_splice_alias(inode, dentry);
fd7b9f7b
TH
1230}
1231
c54bd91e 1232static int kernfs_iop_mkdir(struct mnt_idmap *idmap,
549c7297 1233 struct inode *dir, struct dentry *dentry,
80b9bbef
TH
1234 umode_t mode)
1235{
1236 struct kernfs_node *parent = dir->i_private;
90c07c89 1237 struct kernfs_syscall_ops *scops = kernfs_root(parent)->syscall_ops;
07c7530d 1238 int ret;
80b9bbef 1239
90c07c89 1240 if (!scops || !scops->mkdir)
80b9bbef
TH
1241 return -EPERM;
1242
07c7530d
TH
1243 if (!kernfs_get_active(parent))
1244 return -ENODEV;
1245
90c07c89 1246 ret = scops->mkdir(parent, dentry->d_name.name, mode);
07c7530d
TH
1247
1248 kernfs_put_active(parent);
1249 return ret;
80b9bbef
TH
1250}
1251
1252static int kernfs_iop_rmdir(struct inode *dir, struct dentry *dentry)
1253{
319ba91d 1254 struct kernfs_node *kn = kernfs_dentry_node(dentry);
90c07c89 1255 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 1256 int ret;
80b9bbef 1257
90c07c89 1258 if (!scops || !scops->rmdir)
80b9bbef
TH
1259 return -EPERM;
1260
07c7530d
TH
1261 if (!kernfs_get_active(kn))
1262 return -ENODEV;
1263
90c07c89 1264 ret = scops->rmdir(kn);
07c7530d
TH
1265
1266 kernfs_put_active(kn);
1267 return ret;
80b9bbef
TH
1268}
1269
e18275ae 1270static int kernfs_iop_rename(struct mnt_idmap *idmap,
549c7297 1271 struct inode *old_dir, struct dentry *old_dentry,
1cd66c93
MS
1272 struct inode *new_dir, struct dentry *new_dentry,
1273 unsigned int flags)
80b9bbef 1274{
319ba91d 1275 struct kernfs_node *kn = kernfs_dentry_node(old_dentry);
80b9bbef 1276 struct kernfs_node *new_parent = new_dir->i_private;
90c07c89 1277 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 1278 int ret;
80b9bbef 1279
1cd66c93
MS
1280 if (flags)
1281 return -EINVAL;
1282
90c07c89 1283 if (!scops || !scops->rename)
80b9bbef
TH
1284 return -EPERM;
1285
07c7530d
TH
1286 if (!kernfs_get_active(kn))
1287 return -ENODEV;
1288
1289 if (!kernfs_get_active(new_parent)) {
1290 kernfs_put_active(kn);
1291 return -ENODEV;
1292 }
1293
90c07c89 1294 ret = scops->rename(kn, new_parent, new_dentry->d_name.name);
07c7530d
TH
1295
1296 kernfs_put_active(new_parent);
1297 kernfs_put_active(kn);
1298 return ret;
80b9bbef
TH
1299}
1300
a797bfc3 1301const struct inode_operations kernfs_dir_iops = {
c637b8ac
TH
1302 .lookup = kernfs_iop_lookup,
1303 .permission = kernfs_iop_permission,
1304 .setattr = kernfs_iop_setattr,
1305 .getattr = kernfs_iop_getattr,
c637b8ac 1306 .listxattr = kernfs_iop_listxattr,
80b9bbef
TH
1307
1308 .mkdir = kernfs_iop_mkdir,
1309 .rmdir = kernfs_iop_rmdir,
1310 .rename = kernfs_iop_rename,
fd7b9f7b
TH
1311};
1312
c637b8ac 1313static struct kernfs_node *kernfs_leftmost_descendant(struct kernfs_node *pos)
fd7b9f7b 1314{
324a56e1 1315 struct kernfs_node *last;
fd7b9f7b
TH
1316
1317 while (true) {
1318 struct rb_node *rbn;
1319
1320 last = pos;
1321
df23fc39 1322 if (kernfs_type(pos) != KERNFS_DIR)
fd7b9f7b
TH
1323 break;
1324
adc5e8b5 1325 rbn = rb_first(&pos->dir.children);
fd7b9f7b
TH
1326 if (!rbn)
1327 break;
1328
324a56e1 1329 pos = rb_to_kn(rbn);
fd7b9f7b
TH
1330 }
1331
1332 return last;
1333}
1334
1335/**
c637b8ac 1336 * kernfs_next_descendant_post - find the next descendant for post-order walk
fd7b9f7b 1337 * @pos: the current position (%NULL to initiate traversal)
324a56e1 1338 * @root: kernfs_node whose descendants to walk
fd7b9f7b
TH
1339 *
1340 * Find the next descendant to visit for post-order traversal of @root's
1341 * descendants. @root is included in the iteration and the last node to be
1342 * visited.
24b3e3dd
RD
1343 *
1344 * Return: the next descendant to visit or %NULL when done.
fd7b9f7b 1345 */
c637b8ac
TH
1346static struct kernfs_node *kernfs_next_descendant_post(struct kernfs_node *pos,
1347 struct kernfs_node *root)
fd7b9f7b
TH
1348{
1349 struct rb_node *rbn;
1350
393c3714 1351 lockdep_assert_held_write(&kernfs_root(root)->kernfs_rwsem);
fd7b9f7b
TH
1352
1353 /* if first iteration, visit leftmost descendant which may be root */
1354 if (!pos)
c637b8ac 1355 return kernfs_leftmost_descendant(root);
fd7b9f7b
TH
1356
1357 /* if we visited @root, we're done */
1358 if (pos == root)
1359 return NULL;
1360
1361 /* if there's an unvisited sibling, visit its leftmost descendant */
adc5e8b5 1362 rbn = rb_next(&pos->rb);
fd7b9f7b 1363 if (rbn)
c637b8ac 1364 return kernfs_leftmost_descendant(rb_to_kn(rbn));
fd7b9f7b
TH
1365
1366 /* no sibling left, visit parent */
adc5e8b5 1367 return pos->parent;
fd7b9f7b
TH
1368}
1369
f8eb145e
TH
1370static void kernfs_activate_one(struct kernfs_node *kn)
1371{
1372 lockdep_assert_held_write(&kernfs_root(kn)->kernfs_rwsem);
1373
1374 kn->flags |= KERNFS_ACTIVATED;
1375
783bd07d 1376 if (kernfs_active(kn) || (kn->flags & (KERNFS_HIDDEN | KERNFS_REMOVING)))
f8eb145e
TH
1377 return;
1378
1379 WARN_ON_ONCE(kn->parent && RB_EMPTY_NODE(&kn->rb));
1380 WARN_ON_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS);
1381
1382 atomic_sub(KN_DEACTIVATED_BIAS, &kn->active);
1383}
1384
d35258ef
TH
1385/**
1386 * kernfs_activate - activate a node which started deactivated
1387 * @kn: kernfs_node whose subtree is to be activated
1388 *
1389 * If the root has KERNFS_ROOT_CREATE_DEACTIVATED set, a newly created node
1390 * needs to be explicitly activated. A node which hasn't been activated
1391 * isn't visible to userland and deactivation is skipped during its
1392 * removal. This is useful to construct atomic init sequences where
1393 * creation of multiple nodes should either succeed or fail atomically.
1394 *
1395 * The caller is responsible for ensuring that this function is not called
1396 * after kernfs_remove*() is invoked on @kn.
1397 */
1398void kernfs_activate(struct kernfs_node *kn)
1399{
1400 struct kernfs_node *pos;
393c3714 1401 struct kernfs_root *root = kernfs_root(kn);
d35258ef 1402
393c3714 1403 down_write(&root->kernfs_rwsem);
d35258ef
TH
1404
1405 pos = NULL;
f8eb145e
TH
1406 while ((pos = kernfs_next_descendant_post(pos, kn)))
1407 kernfs_activate_one(pos);
d35258ef 1408
393c3714 1409 up_write(&root->kernfs_rwsem);
d35258ef
TH
1410}
1411
783bd07d
TH
1412/**
1413 * kernfs_show - show or hide a node
1414 * @kn: kernfs_node to show or hide
1415 * @show: whether to show or hide
1416 *
1417 * If @show is %false, @kn is marked hidden and deactivated. A hidden node is
1418 * ignored in future activaitons. If %true, the mark is removed and activation
1419 * state is restored. This function won't implicitly activate a new node in a
1420 * %KERNFS_ROOT_CREATE_DEACTIVATED root which hasn't been activated yet.
1421 *
1422 * To avoid recursion complexities, directories aren't supported for now.
1423 */
1424void kernfs_show(struct kernfs_node *kn, bool show)
1425{
1426 struct kernfs_root *root = kernfs_root(kn);
1427
1428 if (WARN_ON_ONCE(kernfs_type(kn) == KERNFS_DIR))
1429 return;
1430
1431 down_write(&root->kernfs_rwsem);
1432
1433 if (show) {
1434 kn->flags &= ~KERNFS_HIDDEN;
1435 if (kn->flags & KERNFS_ACTIVATED)
1436 kernfs_activate_one(kn);
1437 } else {
1438 kn->flags |= KERNFS_HIDDEN;
1439 if (kernfs_active(kn))
1440 atomic_add(KN_DEACTIVATED_BIAS, &kn->active);
1441 kernfs_drain(kn);
1442 }
1443
1444 up_write(&root->kernfs_rwsem);
1445}
1446
988cd7af 1447static void __kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 1448{
35beab06
TH
1449 struct kernfs_node *pos;
1450
72b5d5ae
YZ
1451 /* Short-circuit if non-root @kn has already finished removal. */
1452 if (!kn)
1453 return;
1454
393c3714 1455 lockdep_assert_held_write(&kernfs_root(kn)->kernfs_rwsem);
fd7b9f7b 1456
6b0afc2a 1457 /*
6b0afc2a
TH
1458 * This is for kernfs_remove_self() which plays with active ref
1459 * after removal.
1460 */
72b5d5ae 1461 if (kn->parent && RB_EMPTY_NODE(&kn->rb))
ce9b499c
GKH
1462 return;
1463
c637b8ac 1464 pr_debug("kernfs %s: removing\n", kn->name);
fd7b9f7b 1465
c2549174 1466 /* prevent new usage by marking all nodes removing and deactivating */
35beab06 1467 pos = NULL;
c2549174
TH
1468 while ((pos = kernfs_next_descendant_post(pos, kn))) {
1469 pos->flags |= KERNFS_REMOVING;
81c173cb
TH
1470 if (kernfs_active(pos))
1471 atomic_add(KN_DEACTIVATED_BIAS, &pos->active);
c2549174 1472 }
35beab06
TH
1473
1474 /* deactivate and unlink the subtree node-by-node */
fd7b9f7b 1475 do {
35beab06
TH
1476 pos = kernfs_leftmost_descendant(kn);
1477
1478 /*
2d7f9f8c 1479 * kernfs_drain() may drop kernfs_rwsem temporarily and @pos's
81c173cb
TH
1480 * base ref could have been put by someone else by the time
1481 * the function returns. Make sure it doesn't go away
1482 * underneath us.
35beab06
TH
1483 */
1484 kernfs_get(pos);
1485
2d7f9f8c 1486 kernfs_drain(pos);
35beab06
TH
1487
1488 /*
1489 * kernfs_unlink_sibling() succeeds once per node. Use it
1490 * to decide who's responsible for cleanups.
1491 */
1492 if (!pos->parent || kernfs_unlink_sibling(pos)) {
1493 struct kernfs_iattrs *ps_iattr =
1494 pos->parent ? pos->parent->iattr : NULL;
1495
1496 /* update timestamps on the parent */
9caf6961
IK
1497 down_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
1498
35beab06 1499 if (ps_iattr) {
05895219
OM
1500 ktime_get_real_ts64(&ps_iattr->ia_ctime);
1501 ps_iattr->ia_mtime = ps_iattr->ia_ctime;
35beab06
TH
1502 }
1503
9caf6961 1504 up_write(&kernfs_root(kn)->kernfs_iattr_rwsem);
988cd7af 1505 kernfs_put(pos);
35beab06
TH
1506 }
1507
1508 kernfs_put(pos);
1509 } while (pos != kn);
fd7b9f7b
TH
1510}
1511
1512/**
324a56e1
TH
1513 * kernfs_remove - remove a kernfs_node recursively
1514 * @kn: the kernfs_node to remove
fd7b9f7b 1515 *
324a56e1 1516 * Remove @kn along with all its subdirectories and files.
fd7b9f7b 1517 */
324a56e1 1518void kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 1519{
ad8d8693
MK
1520 struct kernfs_root *root;
1521
1522 if (!kn)
1523 return;
1524
1525 root = kernfs_root(kn);
393c3714
MK
1526
1527 down_write(&root->kernfs_rwsem);
988cd7af 1528 __kernfs_remove(kn);
393c3714 1529 up_write(&root->kernfs_rwsem);
fd7b9f7b
TH
1530}
1531
6b0afc2a
TH
1532/**
1533 * kernfs_break_active_protection - break out of active protection
1534 * @kn: the self kernfs_node
1535 *
1536 * The caller must be running off of a kernfs operation which is invoked
1537 * with an active reference - e.g. one of kernfs_ops. Each invocation of
1538 * this function must also be matched with an invocation of
1539 * kernfs_unbreak_active_protection().
1540 *
1541 * This function releases the active reference of @kn the caller is
1542 * holding. Once this function is called, @kn may be removed at any point
1543 * and the caller is solely responsible for ensuring that the objects it
1544 * dereferences are accessible.
1545 */
1546void kernfs_break_active_protection(struct kernfs_node *kn)
1547{
1548 /*
1549 * Take out ourself out of the active ref dependency chain. If
1550 * we're called without an active ref, lockdep will complain.
1551 */
1552 kernfs_put_active(kn);
1553}
1554
1555/**
1556 * kernfs_unbreak_active_protection - undo kernfs_break_active_protection()
1557 * @kn: the self kernfs_node
1558 *
1559 * If kernfs_break_active_protection() was called, this function must be
1560 * invoked before finishing the kernfs operation. Note that while this
1561 * function restores the active reference, it doesn't and can't actually
1562 * restore the active protection - @kn may already or be in the process of
1563 * being removed. Once kernfs_break_active_protection() is invoked, that
1564 * protection is irreversibly gone for the kernfs operation instance.
1565 *
1566 * While this function may be called at any point after
1567 * kernfs_break_active_protection() is invoked, its most useful location
1568 * would be right before the enclosing kernfs operation returns.
1569 */
1570void kernfs_unbreak_active_protection(struct kernfs_node *kn)
1571{
1572 /*
1573 * @kn->active could be in any state; however, the increment we do
1574 * here will be undone as soon as the enclosing kernfs operation
1575 * finishes and this temporary bump can't break anything. If @kn
1576 * is alive, nothing changes. If @kn is being deactivated, the
1577 * soon-to-follow put will either finish deactivation or restore
1578 * deactivated state. If @kn is already removed, the temporary
1579 * bump is guaranteed to be gone before @kn is released.
1580 */
1581 atomic_inc(&kn->active);
1582 if (kernfs_lockdep(kn))
1583 rwsem_acquire(&kn->dep_map, 0, 1, _RET_IP_);
1584}
1585
1586/**
1587 * kernfs_remove_self - remove a kernfs_node from its own method
1588 * @kn: the self kernfs_node to remove
1589 *
1590 * The caller must be running off of a kernfs operation which is invoked
1591 * with an active reference - e.g. one of kernfs_ops. This can be used to
1592 * implement a file operation which deletes itself.
1593 *
1594 * For example, the "delete" file for a sysfs device directory can be
1595 * implemented by invoking kernfs_remove_self() on the "delete" file
1596 * itself. This function breaks the circular dependency of trying to
1597 * deactivate self while holding an active ref itself. It isn't necessary
1598 * to modify the usual removal path to use kernfs_remove_self(). The
1599 * "delete" implementation can simply invoke kernfs_remove_self() on self
1600 * before proceeding with the usual removal path. kernfs will ignore later
1601 * kernfs_remove() on self.
1602 *
1603 * kernfs_remove_self() can be called multiple times concurrently on the
1604 * same kernfs_node. Only the first one actually performs removal and
1605 * returns %true. All others will wait until the kernfs operation which
1606 * won self-removal finishes and return %false. Note that the losers wait
1607 * for the completion of not only the winning kernfs_remove_self() but also
1608 * the whole kernfs_ops which won the arbitration. This can be used to
1609 * guarantee, for example, all concurrent writes to a "delete" file to
1610 * finish only after the whole operation is complete.
24b3e3dd
RD
1611 *
1612 * Return: %true if @kn is removed by this call, otherwise %false.
6b0afc2a
TH
1613 */
1614bool kernfs_remove_self(struct kernfs_node *kn)
1615{
1616 bool ret;
393c3714 1617 struct kernfs_root *root = kernfs_root(kn);
6b0afc2a 1618
393c3714 1619 down_write(&root->kernfs_rwsem);
6b0afc2a
TH
1620 kernfs_break_active_protection(kn);
1621
1622 /*
1623 * SUICIDAL is used to arbitrate among competing invocations. Only
1624 * the first one will actually perform removal. When the removal
1625 * is complete, SUICIDED is set and the active ref is restored
7ba0273b
IK
1626 * while kernfs_rwsem for held exclusive. The ones which lost
1627 * arbitration waits for SUICIDED && drained which can happen only
1628 * after the enclosing kernfs operation which executed the winning
1629 * instance of kernfs_remove_self() finished.
6b0afc2a
TH
1630 */
1631 if (!(kn->flags & KERNFS_SUICIDAL)) {
1632 kn->flags |= KERNFS_SUICIDAL;
1633 __kernfs_remove(kn);
1634 kn->flags |= KERNFS_SUICIDED;
1635 ret = true;
1636 } else {
1637 wait_queue_head_t *waitq = &kernfs_root(kn)->deactivate_waitq;
1638 DEFINE_WAIT(wait);
1639
1640 while (true) {
1641 prepare_to_wait(waitq, &wait, TASK_UNINTERRUPTIBLE);
1642
1643 if ((kn->flags & KERNFS_SUICIDED) &&
1644 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS)
1645 break;
1646
393c3714 1647 up_write(&root->kernfs_rwsem);
6b0afc2a 1648 schedule();
393c3714 1649 down_write(&root->kernfs_rwsem);
6b0afc2a
TH
1650 }
1651 finish_wait(waitq, &wait);
1652 WARN_ON_ONCE(!RB_EMPTY_NODE(&kn->rb));
1653 ret = false;
1654 }
1655
1656 /*
7ba0273b
IK
1657 * This must be done while kernfs_rwsem held exclusive; otherwise,
1658 * waiting for SUICIDED && deactivated could finish prematurely.
6b0afc2a
TH
1659 */
1660 kernfs_unbreak_active_protection(kn);
1661
393c3714 1662 up_write(&root->kernfs_rwsem);
6b0afc2a
TH
1663 return ret;
1664}
1665
fd7b9f7b 1666/**
324a56e1
TH
1667 * kernfs_remove_by_name_ns - find a kernfs_node by name and remove it
1668 * @parent: parent of the target
1669 * @name: name of the kernfs_node to remove
1670 * @ns: namespace tag of the kernfs_node to remove
fd7b9f7b 1671 *
324a56e1 1672 * Look for the kernfs_node with @name and @ns under @parent and remove it.
24b3e3dd
RD
1673 *
1674 * Return: %0 on success, -ENOENT if such entry doesn't exist.
fd7b9f7b 1675 */
324a56e1 1676int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
fd7b9f7b
TH
1677 const void *ns)
1678{
324a56e1 1679 struct kernfs_node *kn;
393c3714 1680 struct kernfs_root *root;
fd7b9f7b 1681
324a56e1 1682 if (!parent) {
c637b8ac 1683 WARN(1, KERN_WARNING "kernfs: can not remove '%s', no directory\n",
fd7b9f7b
TH
1684 name);
1685 return -ENOENT;
1686 }
1687
393c3714
MK
1688 root = kernfs_root(parent);
1689 down_write(&root->kernfs_rwsem);
fd7b9f7b 1690
324a56e1 1691 kn = kernfs_find_ns(parent, name, ns);
4abc9965
CE
1692 if (kn) {
1693 kernfs_get(kn);
988cd7af 1694 __kernfs_remove(kn);
4abc9965
CE
1695 kernfs_put(kn);
1696 }
fd7b9f7b 1697
393c3714 1698 up_write(&root->kernfs_rwsem);
fd7b9f7b 1699
324a56e1 1700 if (kn)
fd7b9f7b
TH
1701 return 0;
1702 else
1703 return -ENOENT;
1704}
1705
1706/**
1707 * kernfs_rename_ns - move and rename a kernfs_node
324a56e1 1708 * @kn: target node
fd7b9f7b
TH
1709 * @new_parent: new parent to put @sd under
1710 * @new_name: new name
1711 * @new_ns: new namespace tag
24b3e3dd
RD
1712 *
1713 * Return: %0 on success, -errno on failure.
fd7b9f7b 1714 */
324a56e1 1715int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
fd7b9f7b
TH
1716 const char *new_name, const void *new_ns)
1717{
3eef34ad 1718 struct kernfs_node *old_parent;
393c3714 1719 struct kernfs_root *root;
3eef34ad 1720 const char *old_name = NULL;
fd7b9f7b
TH
1721 int error;
1722
3eef34ad
TH
1723 /* can't move or rename root */
1724 if (!kn->parent)
1725 return -EINVAL;
1726
393c3714
MK
1727 root = kernfs_root(kn);
1728 down_write(&root->kernfs_rwsem);
798c75a0 1729
d0ae3d43 1730 error = -ENOENT;
ea015218
EB
1731 if (!kernfs_active(kn) || !kernfs_active(new_parent) ||
1732 (new_parent->flags & KERNFS_EMPTY_DIR))
d0ae3d43
TH
1733 goto out;
1734
fd7b9f7b 1735 error = 0;
adc5e8b5
TH
1736 if ((kn->parent == new_parent) && (kn->ns == new_ns) &&
1737 (strcmp(kn->name, new_name) == 0))
798c75a0 1738 goto out; /* nothing to rename */
fd7b9f7b
TH
1739
1740 error = -EEXIST;
1741 if (kernfs_find_ns(new_parent, new_name, new_ns))
798c75a0 1742 goto out;
fd7b9f7b 1743
324a56e1 1744 /* rename kernfs_node */
adc5e8b5 1745 if (strcmp(kn->name, new_name) != 0) {
fd7b9f7b 1746 error = -ENOMEM;
75287a67 1747 new_name = kstrdup_const(new_name, GFP_KERNEL);
fd7b9f7b 1748 if (!new_name)
798c75a0 1749 goto out;
3eef34ad
TH
1750 } else {
1751 new_name = NULL;
fd7b9f7b
TH
1752 }
1753
1754 /*
1755 * Move to the appropriate place in the appropriate directories rbtree.
1756 */
c637b8ac 1757 kernfs_unlink_sibling(kn);
fd7b9f7b 1758 kernfs_get(new_parent);
3eef34ad
TH
1759
1760 /* rename_lock protects ->parent and ->name accessors */
06fb4736 1761 write_lock_irq(&kernfs_rename_lock);
3eef34ad
TH
1762
1763 old_parent = kn->parent;
adc5e8b5 1764 kn->parent = new_parent;
3eef34ad
TH
1765
1766 kn->ns = new_ns;
1767 if (new_name) {
dfeb0750 1768 old_name = kn->name;
3eef34ad
TH
1769 kn->name = new_name;
1770 }
1771
06fb4736 1772 write_unlock_irq(&kernfs_rename_lock);
3eef34ad 1773
9561a896 1774 kn->hash = kernfs_name_hash(kn->name, kn->ns);
c637b8ac 1775 kernfs_link_sibling(kn);
fd7b9f7b 1776
3eef34ad 1777 kernfs_put(old_parent);
75287a67 1778 kfree_const(old_name);
3eef34ad 1779
fd7b9f7b 1780 error = 0;
798c75a0 1781 out:
393c3714 1782 up_write(&root->kernfs_rwsem);
fd7b9f7b
TH
1783 return error;
1784}
1785
c637b8ac 1786static int kernfs_dir_fop_release(struct inode *inode, struct file *filp)
fd7b9f7b
TH
1787{
1788 kernfs_put(filp->private_data);
1789 return 0;
1790}
1791
c637b8ac 1792static struct kernfs_node *kernfs_dir_pos(const void *ns,
324a56e1 1793 struct kernfs_node *parent, loff_t hash, struct kernfs_node *pos)
fd7b9f7b
TH
1794{
1795 if (pos) {
81c173cb 1796 int valid = kernfs_active(pos) &&
798c75a0 1797 pos->parent == parent && hash == pos->hash;
fd7b9f7b
TH
1798 kernfs_put(pos);
1799 if (!valid)
1800 pos = NULL;
1801 }
1802 if (!pos && (hash > 1) && (hash < INT_MAX)) {
adc5e8b5 1803 struct rb_node *node = parent->dir.children.rb_node;
fd7b9f7b 1804 while (node) {
324a56e1 1805 pos = rb_to_kn(node);
fd7b9f7b 1806
adc5e8b5 1807 if (hash < pos->hash)
fd7b9f7b 1808 node = node->rb_left;
adc5e8b5 1809 else if (hash > pos->hash)
fd7b9f7b
TH
1810 node = node->rb_right;
1811 else
1812 break;
1813 }
1814 }
b9c9dad0
TH
1815 /* Skip over entries which are dying/dead or in the wrong namespace */
1816 while (pos && (!kernfs_active(pos) || pos->ns != ns)) {
adc5e8b5 1817 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1818 if (!node)
1819 pos = NULL;
1820 else
324a56e1 1821 pos = rb_to_kn(node);
fd7b9f7b
TH
1822 }
1823 return pos;
1824}
1825
c637b8ac 1826static struct kernfs_node *kernfs_dir_next_pos(const void *ns,
324a56e1 1827 struct kernfs_node *parent, ino_t ino, struct kernfs_node *pos)
fd7b9f7b 1828{
c637b8ac 1829 pos = kernfs_dir_pos(ns, parent, ino, pos);
b9c9dad0 1830 if (pos) {
fd7b9f7b 1831 do {
adc5e8b5 1832 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1833 if (!node)
1834 pos = NULL;
1835 else
324a56e1 1836 pos = rb_to_kn(node);
b9c9dad0
TH
1837 } while (pos && (!kernfs_active(pos) || pos->ns != ns));
1838 }
fd7b9f7b
TH
1839 return pos;
1840}
1841
c637b8ac 1842static int kernfs_fop_readdir(struct file *file, struct dir_context *ctx)
fd7b9f7b
TH
1843{
1844 struct dentry *dentry = file->f_path.dentry;
319ba91d 1845 struct kernfs_node *parent = kernfs_dentry_node(dentry);
324a56e1 1846 struct kernfs_node *pos = file->private_data;
393c3714 1847 struct kernfs_root *root;
fd7b9f7b
TH
1848 const void *ns = NULL;
1849
1850 if (!dir_emit_dots(file, ctx))
1851 return 0;
393c3714
MK
1852
1853 root = kernfs_root(parent);
1854 down_read(&root->kernfs_rwsem);
fd7b9f7b 1855
324a56e1 1856 if (kernfs_ns_enabled(parent))
c525aadd 1857 ns = kernfs_info(dentry->d_sb)->ns;
fd7b9f7b 1858
c637b8ac 1859 for (pos = kernfs_dir_pos(ns, parent, ctx->pos, pos);
fd7b9f7b 1860 pos;
c637b8ac 1861 pos = kernfs_dir_next_pos(ns, parent, ctx->pos, pos)) {
adc5e8b5 1862 const char *name = pos->name;
364595a6 1863 unsigned int type = fs_umode_to_dtype(pos->mode);
fd7b9f7b 1864 int len = strlen(name);
67c0496e 1865 ino_t ino = kernfs_ino(pos);
fd7b9f7b 1866
adc5e8b5 1867 ctx->pos = pos->hash;
fd7b9f7b
TH
1868 file->private_data = pos;
1869 kernfs_get(pos);
1870
393c3714 1871 up_read(&root->kernfs_rwsem);
fd7b9f7b
TH
1872 if (!dir_emit(ctx, name, len, ino, type))
1873 return 0;
393c3714 1874 down_read(&root->kernfs_rwsem);
fd7b9f7b 1875 }
393c3714 1876 up_read(&root->kernfs_rwsem);
fd7b9f7b
TH
1877 file->private_data = NULL;
1878 ctx->pos = INT_MAX;
1879 return 0;
1880}
1881
a797bfc3 1882const struct file_operations kernfs_dir_fops = {
fd7b9f7b 1883 .read = generic_read_dir,
8cb0d2c1 1884 .iterate_shared = kernfs_fop_readdir,
c637b8ac 1885 .release = kernfs_dir_fop_release,
8cb0d2c1 1886 .llseek = generic_file_llseek,
fd7b9f7b 1887};
This page took 0.792912 seconds and 4 git commands to generate.