Commit | Line | Data |
---|---|---|
90586523 EP |
1 | /* |
2 | * Filesystem access notification for Linux | |
3 | * | |
4 | * Copyright (C) 2008 Red Hat, Inc., Eric Paris <eparis@redhat.com> | |
5 | */ | |
6 | ||
7 | #ifndef __LINUX_FSNOTIFY_BACKEND_H | |
8 | #define __LINUX_FSNOTIFY_BACKEND_H | |
9 | ||
10 | #ifdef __KERNEL__ | |
11 | ||
63c882a0 | 12 | #include <linux/idr.h> /* inotify uses this */ |
90586523 EP |
13 | #include <linux/fs.h> /* struct inode */ |
14 | #include <linux/list.h> | |
15 | #include <linux/path.h> /* struct path */ | |
16 | #include <linux/spinlock.h> | |
17 | #include <linux/types.h> | |
18 | ||
19 | #include <asm/atomic.h> | |
20 | ||
21 | /* | |
22 | * IN_* from inotfy.h lines up EXACTLY with FS_*, this is so we can easily | |
23 | * convert between them. dnotify only needs conversion at watch creation | |
24 | * so no perf loss there. fanotify isn't defined yet, so it can use the | |
25 | * wholes if it needs more events. | |
26 | */ | |
27 | #define FS_ACCESS 0x00000001 /* File was accessed */ | |
28 | #define FS_MODIFY 0x00000002 /* File was modified */ | |
29 | #define FS_ATTRIB 0x00000004 /* Metadata changed */ | |
30 | #define FS_CLOSE_WRITE 0x00000008 /* Writtable file was closed */ | |
31 | #define FS_CLOSE_NOWRITE 0x00000010 /* Unwrittable file closed */ | |
32 | #define FS_OPEN 0x00000020 /* File was opened */ | |
33 | #define FS_MOVED_FROM 0x00000040 /* File was moved from X */ | |
34 | #define FS_MOVED_TO 0x00000080 /* File was moved to Y */ | |
35 | #define FS_CREATE 0x00000100 /* Subfile was created */ | |
36 | #define FS_DELETE 0x00000200 /* Subfile was deleted */ | |
37 | #define FS_DELETE_SELF 0x00000400 /* Self was deleted */ | |
38 | #define FS_MOVE_SELF 0x00000800 /* Self was moved */ | |
39 | ||
40 | #define FS_UNMOUNT 0x00002000 /* inode on umount fs */ | |
41 | #define FS_Q_OVERFLOW 0x00004000 /* Event queued overflowed */ | |
42 | #define FS_IN_IGNORED 0x00008000 /* last inotify event here */ | |
43 | ||
c4ec54b4 EP |
44 | #define FS_OPEN_PERM 0x00010000 /* open event in an permission hook */ |
45 | #define FS_ACCESS_PERM 0x00020000 /* access event in a permissions hook */ | |
46 | ||
8c1934c8 | 47 | #define FS_EXCL_UNLINK 0x04000000 /* do not send events if object is unlinked */ |
90586523 EP |
48 | #define FS_IN_ISDIR 0x40000000 /* event occurred against dir */ |
49 | #define FS_IN_ONESHOT 0x80000000 /* only send event once */ | |
50 | ||
51 | #define FS_DN_RENAME 0x10000000 /* file renamed */ | |
52 | #define FS_DN_MULTISHOT 0x20000000 /* dnotify multishot */ | |
53 | ||
c28f7e56 EP |
54 | /* This inode cares about things that happen to its children. Always set for |
55 | * dnotify and inotify. */ | |
56 | #define FS_EVENT_ON_CHILD 0x08000000 | |
57 | ||
58 | /* This is a list of all events that may get sent to a parernt based on fs event | |
59 | * happening to inodes inside that directory */ | |
60 | #define FS_EVENTS_POSS_ON_CHILD (FS_ACCESS | FS_MODIFY | FS_ATTRIB |\ | |
61 | FS_CLOSE_WRITE | FS_CLOSE_NOWRITE | FS_OPEN |\ | |
62 | FS_MOVED_FROM | FS_MOVED_TO | FS_CREATE |\ | |
63 | FS_DELETE) | |
64 | ||
e9fd702a EP |
65 | #define FS_MOVE (FS_MOVED_FROM | FS_MOVED_TO) |
66 | ||
ff8bcbd0 EP |
67 | #define ALL_FSNOTIFY_PERM_EVENTS (FS_OPEN_PERM | FS_ACCESS_PERM) |
68 | ||
20dee624 EP |
69 | #define ALL_FSNOTIFY_EVENTS (FS_ACCESS | FS_MODIFY | FS_ATTRIB | \ |
70 | FS_CLOSE_WRITE | FS_CLOSE_NOWRITE | FS_OPEN | \ | |
71 | FS_MOVED_FROM | FS_MOVED_TO | FS_CREATE | \ | |
72 | FS_DELETE | FS_DELETE_SELF | FS_MOVE_SELF | \ | |
73 | FS_UNMOUNT | FS_Q_OVERFLOW | FS_IN_IGNORED | \ | |
74 | FS_OPEN_PERM | FS_ACCESS_PERM | FS_EXCL_UNLINK | \ | |
75 | FS_IN_ISDIR | FS_IN_ONESHOT | FS_DN_RENAME | \ | |
76 | FS_DN_MULTISHOT | FS_EVENT_ON_CHILD) | |
77 | ||
90586523 EP |
78 | struct fsnotify_group; |
79 | struct fsnotify_event; | |
e61ce867 | 80 | struct fsnotify_mark; |
e4aff117 | 81 | struct fsnotify_event_private_data; |
90586523 EP |
82 | |
83 | /* | |
84 | * Each group much define these ops. The fsnotify infrastructure will call | |
85 | * these operations for each relevant group. | |
86 | * | |
3be25f49 EP |
87 | * should_send_event - given a group, inode, and mask this function determines |
88 | * if the group is interested in this event. | |
90586523 EP |
89 | * handle_event - main call for a group to handle an fs event |
90 | * free_group_priv - called when a group refcnt hits 0 to clean up the private union | |
3be25f49 EP |
91 | * freeing-mark - this means that a mark has been flagged to die when everything |
92 | * finishes using it. The function is supplied with what must be a | |
93 | * valid group and inode to use to clean up. | |
90586523 EP |
94 | */ |
95 | struct fsnotify_ops { | |
7b0a04fb | 96 | bool (*should_send_event)(struct fsnotify_group *group, struct inode *inode, |
1968f5ee | 97 | struct fsnotify_mark *inode_mark, |
ce8f76fb | 98 | struct fsnotify_mark *vfsmount_mark, |
3a9b16b4 | 99 | __u32 mask, void *data, int data_type); |
ce8f76fb EP |
100 | int (*handle_event)(struct fsnotify_group *group, |
101 | struct fsnotify_mark *inode_mark, | |
102 | struct fsnotify_mark *vfsmount_mark, | |
3a9b16b4 | 103 | struct fsnotify_event *event); |
90586523 | 104 | void (*free_group_priv)(struct fsnotify_group *group); |
841bdc10 | 105 | void (*freeing_mark)(struct fsnotify_mark *mark, struct fsnotify_group *group); |
e4aff117 | 106 | void (*free_event_priv)(struct fsnotify_event_private_data *priv); |
90586523 EP |
107 | }; |
108 | ||
109 | /* | |
110 | * A group is a "thing" that wants to receive notification about filesystem | |
111 | * events. The mask holds the subset of event types this group cares about. | |
112 | * refcnt on a group is up to the implementor and at any moment if it goes 0 | |
113 | * everything will be cleaned up. | |
114 | */ | |
115 | struct fsnotify_group { | |
90586523 EP |
116 | /* |
117 | * How the refcnt is used is up to each group. When the refcnt hits 0 | |
118 | * fsnotify will clean up all of the resources associated with this group. | |
119 | * As an example, the dnotify group will always have a refcnt=1 and that | |
120 | * will never change. Inotify, on the other hand, has a group per | |
121 | * inotify_init() and the refcnt will hit 0 only when that fd has been | |
122 | * closed. | |
123 | */ | |
124 | atomic_t refcnt; /* things with interest in this group */ | |
90586523 EP |
125 | |
126 | const struct fsnotify_ops *ops; /* how this group handles things */ | |
127 | ||
a2d8bc6c EP |
128 | /* needed to send notification to userspace */ |
129 | struct mutex notification_mutex; /* protect the notification_list */ | |
130 | struct list_head notification_list; /* list of event_holder this group needs to send to userspace */ | |
131 | wait_queue_head_t notification_waitq; /* read() on the notification file blocks on this waitq */ | |
132 | unsigned int q_len; /* events on the queue */ | |
133 | unsigned int max_events; /* maximum events allowed on the list */ | |
6ad2d4e3 EP |
134 | /* |
135 | * Valid fsnotify group priorities. Events are send in order from highest | |
136 | * priority to lowest priority. We default to the lowest priority. | |
137 | */ | |
138 | #define FS_PRIO_0 0 /* normal notifiers, no permissions */ | |
139 | #define FS_PRIO_1 1 /* fanotify content based access control */ | |
140 | #define FS_PRIO_2 2 /* fanotify pre-content access */ | |
141 | unsigned int priority; | |
a2d8bc6c | 142 | |
e61ce867 EP |
143 | /* stores all fastpath marks assoc with this group so they can be cleaned on unregister */ |
144 | spinlock_t mark_lock; /* protect marks_list */ | |
841bdc10 | 145 | atomic_t num_marks; /* 1 for each mark and 1 for not being |
3be25f49 EP |
146 | * past the point of no return when freeing |
147 | * a group */ | |
e61ce867 | 148 | struct list_head marks_list; /* all inode marks for this group */ |
3be25f49 | 149 | |
90586523 EP |
150 | /* groups can define private fields here or use the void *private */ |
151 | union { | |
152 | void *private; | |
63c882a0 EP |
153 | #ifdef CONFIG_INOTIFY_USER |
154 | struct inotify_group_private_data { | |
155 | spinlock_t idr_lock; | |
156 | struct idr idr; | |
157 | u32 last_wd; | |
158 | struct fasync_struct *fa; /* async notification */ | |
159 | struct user_struct *user; | |
160 | } inotify_data; | |
9e66e423 | 161 | #endif |
80af2588 | 162 | #ifdef CONFIG_FANOTIFY |
9e66e423 | 163 | struct fanotify_group_private_data { |
80af2588 | 164 | #ifdef CONFIG_FANOTIFY_ACCESS_PERMISSIONS |
9e66e423 EP |
165 | /* allows a group to block waiting for a userspace response */ |
166 | struct mutex access_mutex; | |
167 | struct list_head access_list; | |
168 | wait_queue_head_t access_waitq; | |
2eebf582 | 169 | bool bypass_perm; /* protected by access_mutex */ |
80af2588 EP |
170 | #endif /* CONFIG_FANOTIFY_ACCESS_PERMISSIONS */ |
171 | int f_flags; | |
e7099d8a | 172 | unsigned int max_marks; |
9e66e423 | 173 | } fanotify_data; |
80af2588 | 174 | #endif /* CONFIG_FANOTIFY */ |
90586523 EP |
175 | }; |
176 | }; | |
177 | ||
a2d8bc6c EP |
178 | /* |
179 | * A single event can be queued in multiple group->notification_lists. | |
180 | * | |
181 | * each group->notification_list will point to an event_holder which in turns points | |
182 | * to the actual event that needs to be sent to userspace. | |
183 | * | |
184 | * Seemed cheaper to create a refcnt'd event and a small holder for every group | |
185 | * than create a different event for every group | |
186 | * | |
187 | */ | |
188 | struct fsnotify_event_holder { | |
189 | struct fsnotify_event *event; | |
190 | struct list_head event_list; | |
191 | }; | |
192 | ||
e4aff117 EP |
193 | /* |
194 | * Inotify needs to tack data onto an event. This struct lets us later find the | |
195 | * correct private data of the correct group. | |
196 | */ | |
197 | struct fsnotify_event_private_data { | |
198 | struct fsnotify_group *group; | |
199 | struct list_head event_list; | |
200 | }; | |
201 | ||
90586523 EP |
202 | /* |
203 | * all of the information about the original object we want to now send to | |
204 | * a group. If you want to carry more info from the accessing task to the | |
205 | * listener this structure is where you need to be adding fields. | |
206 | */ | |
207 | struct fsnotify_event { | |
a2d8bc6c EP |
208 | /* |
209 | * If we create an event we are also likely going to need a holder | |
210 | * to link to a group. So embed one holder in the event. Means only | |
211 | * one allocation for the common case where we only have one group | |
212 | */ | |
213 | struct fsnotify_event_holder holder; | |
90586523 EP |
214 | spinlock_t lock; /* protection for the associated event_holder and private_list */ |
215 | /* to_tell may ONLY be dereferenced during handle_event(). */ | |
216 | struct inode *to_tell; /* either the inode the event happened to or its parent */ | |
217 | /* | |
2069601b LT |
218 | * depending on the event type we should have either a path or inode |
219 | * We hold a reference on path, but NOT on inode. Since we have the ref on | |
220 | * the path, it may be dereferenced at any point during this object's | |
90586523 | 221 | * lifetime. That reference is dropped when this object's refcnt hits |
2069601b | 222 | * 0. If this event contains an inode instead of a path, the inode may |
90586523 EP |
223 | * ONLY be used during handle_event(). |
224 | */ | |
225 | union { | |
2069601b | 226 | struct path path; |
90586523 EP |
227 | struct inode *inode; |
228 | }; | |
229 | /* when calling fsnotify tell it if the data is a path or inode */ | |
230 | #define FSNOTIFY_EVENT_NONE 0 | |
2069601b | 231 | #define FSNOTIFY_EVENT_PATH 1 |
90586523 | 232 | #define FSNOTIFY_EVENT_INODE 2 |
90586523 EP |
233 | int data_type; /* which of the above union we have */ |
234 | atomic_t refcnt; /* how many groups still are using/need to send this event */ | |
235 | __u32 mask; /* the type of access, bitwise OR for FS_* event types */ | |
62ffe5df | 236 | |
47882c6f | 237 | u32 sync_cookie; /* used to corrolate events, namely inotify mv events */ |
59b0df21 | 238 | const unsigned char *file_name; |
62ffe5df | 239 | size_t name_len; |
32c32632 | 240 | struct pid *tgid; |
e4aff117 | 241 | |
9e66e423 EP |
242 | #ifdef CONFIG_FANOTIFY_ACCESS_PERMISSIONS |
243 | __u32 response; /* userspace answer to question */ | |
244 | #endif /* CONFIG_FANOTIFY_ACCESS_PERMISSIONS */ | |
245 | ||
e4aff117 | 246 | struct list_head private_data_list; /* groups can store private data here */ |
90586523 EP |
247 | }; |
248 | ||
2823e04d | 249 | /* |
e61ce867 | 250 | * Inode specific fields in an fsnotify_mark |
2823e04d EP |
251 | */ |
252 | struct fsnotify_inode_mark { | |
841bdc10 | 253 | struct inode *inode; /* inode this mark is associated with */ |
e61ce867 | 254 | struct hlist_node i_list; /* list of marks by inode->i_fsnotify_marks */ |
2823e04d EP |
255 | struct list_head free_i_list; /* tmp list used when freeing this mark */ |
256 | }; | |
257 | ||
4136510d | 258 | /* |
e61ce867 | 259 | * Mount point specific fields in an fsnotify_mark |
4136510d EP |
260 | */ |
261 | struct fsnotify_vfsmount_mark { | |
841bdc10 | 262 | struct vfsmount *mnt; /* vfsmount this mark is associated with */ |
e61ce867 | 263 | struct hlist_node m_list; /* list of marks by inode->i_fsnotify_marks */ |
4136510d EP |
264 | struct list_head free_m_list; /* tmp list used when freeing this mark */ |
265 | }; | |
266 | ||
3be25f49 | 267 | /* |
841bdc10 | 268 | * a mark is simply an object attached to an in core inode which allows an |
3be25f49 EP |
269 | * fsnotify listener to indicate they are either no longer interested in events |
270 | * of a type matching mask or only interested in those events. | |
271 | * | |
272 | * these are flushed when an inode is evicted from core and may be flushed | |
273 | * when the inode is modified (as seen by fsnotify_access). Some fsnotify users | |
274 | * (such as dnotify) will flush these when the open fd is closed and not at | |
275 | * inode eviction or modification. | |
276 | */ | |
e61ce867 | 277 | struct fsnotify_mark { |
841bdc10 | 278 | __u32 mask; /* mask this mark is for */ |
3be25f49 EP |
279 | /* we hold ref for each i_list and g_list. also one ref for each 'thing' |
280 | * in kernel that found and may be using this mark. */ | |
281 | atomic_t refcnt; /* active things looking at this mark */ | |
841bdc10 | 282 | struct fsnotify_group *group; /* group this mark is for */ |
e61ce867 | 283 | struct list_head g_list; /* list of marks by group->i_fsnotify_marks */ |
2823e04d EP |
284 | spinlock_t lock; /* protect group and inode */ |
285 | union { | |
286 | struct fsnotify_inode_mark i; | |
4136510d | 287 | struct fsnotify_vfsmount_mark m; |
2823e04d | 288 | }; |
33af5e32 | 289 | __u32 ignored_mask; /* events types to ignore */ |
3be25f49 | 290 | struct list_head free_g_list; /* tmp list used when freeing this mark */ |
90b1e7a5 EP |
291 | #define FSNOTIFY_MARK_FLAG_INODE 0x01 |
292 | #define FSNOTIFY_MARK_FLAG_VFSMOUNT 0x02 | |
293 | #define FSNOTIFY_MARK_FLAG_OBJECT_PINNED 0x04 | |
c908370f | 294 | #define FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY 0x08 |
700307a2 | 295 | #define FSNOTIFY_MARK_FLAG_ALIVE 0x10 |
098cf2fc | 296 | unsigned int flags; /* vfsmount or inode mark? */ |
75c1be48 | 297 | struct list_head destroy_list; |
841bdc10 | 298 | void (*free_mark)(struct fsnotify_mark *mark); /* called on final put+free */ |
3be25f49 EP |
299 | }; |
300 | ||
90586523 EP |
301 | #ifdef CONFIG_FSNOTIFY |
302 | ||
303 | /* called from the vfs helpers */ | |
304 | ||
305 | /* main fsnotify call to send events */ | |
c4ec54b4 EP |
306 | extern int fsnotify(struct inode *to_tell, __u32 mask, void *data, int data_is, |
307 | const unsigned char *name, u32 cookie); | |
52420392 | 308 | extern int __fsnotify_parent(struct path *path, struct dentry *dentry, __u32 mask); |
3be25f49 | 309 | extern void __fsnotify_inode_delete(struct inode *inode); |
ca9c726e | 310 | extern void __fsnotify_vfsmount_delete(struct vfsmount *mnt); |
47882c6f | 311 | extern u32 fsnotify_get_cookie(void); |
90586523 | 312 | |
c28f7e56 EP |
313 | static inline int fsnotify_inode_watches_children(struct inode *inode) |
314 | { | |
315 | /* FS_EVENT_ON_CHILD is set if the inode may care */ | |
316 | if (!(inode->i_fsnotify_mask & FS_EVENT_ON_CHILD)) | |
317 | return 0; | |
318 | /* this inode might care about child events, does it care about the | |
319 | * specific set of events that can happen on a child? */ | |
320 | return inode->i_fsnotify_mask & FS_EVENTS_POSS_ON_CHILD; | |
321 | } | |
322 | ||
323 | /* | |
324 | * Update the dentry with a flag indicating the interest of its parent to receive | |
325 | * filesystem events when those events happens to this dentry->d_inode. | |
326 | */ | |
327 | static inline void __fsnotify_update_dcache_flags(struct dentry *dentry) | |
328 | { | |
329 | struct dentry *parent; | |
330 | ||
331 | assert_spin_locked(&dcache_lock); | |
332 | assert_spin_locked(&dentry->d_lock); | |
333 | ||
334 | parent = dentry->d_parent; | |
e6ce3066 | 335 | if (parent->d_inode && fsnotify_inode_watches_children(parent->d_inode)) |
c28f7e56 EP |
336 | dentry->d_flags |= DCACHE_FSNOTIFY_PARENT_WATCHED; |
337 | else | |
338 | dentry->d_flags &= ~DCACHE_FSNOTIFY_PARENT_WATCHED; | |
339 | } | |
340 | ||
341 | /* | |
342 | * fsnotify_d_instantiate - instantiate a dentry for inode | |
343 | * Called with dcache_lock held. | |
344 | */ | |
345 | static inline void __fsnotify_d_instantiate(struct dentry *dentry, struct inode *inode) | |
346 | { | |
347 | if (!inode) | |
348 | return; | |
349 | ||
350 | assert_spin_locked(&dcache_lock); | |
351 | ||
352 | spin_lock(&dentry->d_lock); | |
353 | __fsnotify_update_dcache_flags(dentry); | |
354 | spin_unlock(&dentry->d_lock); | |
355 | } | |
90586523 EP |
356 | |
357 | /* called from fsnotify listeners, such as fanotify or dnotify */ | |
358 | ||
90586523 | 359 | /* get a reference to an existing or create a new group */ |
0d2e2a1d | 360 | extern struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops); |
ffab8340 | 361 | /* drop reference on a group from fsnotify_alloc_group */ |
90586523 EP |
362 | extern void fsnotify_put_group(struct fsnotify_group *group); |
363 | ||
364 | /* take a reference to an event */ | |
365 | extern void fsnotify_get_event(struct fsnotify_event *event); | |
366 | extern void fsnotify_put_event(struct fsnotify_event *event); | |
e4aff117 EP |
367 | /* find private data previously attached to an event and unlink it */ |
368 | extern struct fsnotify_event_private_data *fsnotify_remove_priv_from_event(struct fsnotify_group *group, | |
369 | struct fsnotify_event *event); | |
90586523 | 370 | |
a2d8bc6c | 371 | /* attach the event to the group notification queue */ |
f70ab54c EP |
372 | extern struct fsnotify_event *fsnotify_add_notify_event(struct fsnotify_group *group, |
373 | struct fsnotify_event *event, | |
374 | struct fsnotify_event_private_data *priv, | |
375 | struct fsnotify_event *(*merge)(struct list_head *, | |
376 | struct fsnotify_event *)); | |
a2d8bc6c EP |
377 | /* true if the group notification queue is empty */ |
378 | extern bool fsnotify_notify_queue_is_empty(struct fsnotify_group *group); | |
379 | /* return, but do not dequeue the first event on the notification queue */ | |
380 | extern struct fsnotify_event *fsnotify_peek_notify_event(struct fsnotify_group *group); | |
e4aff117 | 381 | /* return AND dequeue the first event on the notification queue */ |
a2d8bc6c EP |
382 | extern struct fsnotify_event *fsnotify_remove_notify_event(struct fsnotify_group *group); |
383 | ||
3be25f49 EP |
384 | /* functions used to manipulate the marks attached to inodes */ |
385 | ||
0d48b7f0 EP |
386 | /* run all marks associated with a vfsmount and update mnt->mnt_fsnotify_mask */ |
387 | extern void fsnotify_recalc_vfsmount_mask(struct vfsmount *mnt); | |
3be25f49 EP |
388 | /* run all marks associated with an inode and update inode->i_fsnotify_mask */ |
389 | extern void fsnotify_recalc_inode_mask(struct inode *inode); | |
841bdc10 | 390 | extern void fsnotify_init_mark(struct fsnotify_mark *mark, void (*free_mark)(struct fsnotify_mark *mark)); |
3be25f49 | 391 | /* find (and take a reference) to a mark associated with group and inode */ |
5444e298 | 392 | extern struct fsnotify_mark *fsnotify_find_inode_mark(struct fsnotify_group *group, struct inode *inode); |
1c529063 EP |
393 | /* find (and take a reference) to a mark associated with group and vfsmount */ |
394 | extern struct fsnotify_mark *fsnotify_find_vfsmount_mark(struct fsnotify_group *group, struct vfsmount *mnt); | |
9e1c7432 | 395 | /* copy the values from old into new */ |
e61ce867 | 396 | extern void fsnotify_duplicate_mark(struct fsnotify_mark *new, struct fsnotify_mark *old); |
33af5e32 EP |
397 | /* set the ignored_mask of a mark */ |
398 | extern void fsnotify_set_mark_ignored_mask_locked(struct fsnotify_mark *mark, __u32 mask); | |
90b1e7a5 EP |
399 | /* set the mask of a mark (might pin the object into memory */ |
400 | extern void fsnotify_set_mark_mask_locked(struct fsnotify_mark *mark, __u32 mask); | |
3be25f49 | 401 | /* attach the mark to both the group and the inode */ |
5444e298 EP |
402 | extern int fsnotify_add_mark(struct fsnotify_mark *mark, struct fsnotify_group *group, |
403 | struct inode *inode, struct vfsmount *mnt, int allow_dups); | |
3be25f49 | 404 | /* given a mark, flag it to be freed when all references are dropped */ |
841bdc10 | 405 | extern void fsnotify_destroy_mark(struct fsnotify_mark *mark); |
4d92604c EP |
406 | /* run all the marks in a group, and clear all of the vfsmount marks */ |
407 | extern void fsnotify_clear_vfsmount_marks_by_group(struct fsnotify_group *group); | |
408 | /* run all the marks in a group, and clear all of the inode marks */ | |
409 | extern void fsnotify_clear_inode_marks_by_group(struct fsnotify_group *group); | |
410 | /* run all the marks in a group, and clear all of the marks where mark->flags & flags is true*/ | |
411 | extern void fsnotify_clear_marks_by_group_flags(struct fsnotify_group *group, unsigned int flags); | |
3be25f49 EP |
412 | /* run all the marks in a group, and flag them to be freed */ |
413 | extern void fsnotify_clear_marks_by_group(struct fsnotify_group *group); | |
841bdc10 EP |
414 | extern void fsnotify_get_mark(struct fsnotify_mark *mark); |
415 | extern void fsnotify_put_mark(struct fsnotify_mark *mark); | |
164bc619 | 416 | extern void fsnotify_unmount_inodes(struct list_head *list); |
3be25f49 | 417 | |
90586523 EP |
418 | /* put here because inotify does some weird stuff when destroying watches */ |
419 | extern struct fsnotify_event *fsnotify_create_event(struct inode *to_tell, __u32 mask, | |
59b0df21 EP |
420 | void *data, int data_is, |
421 | const unsigned char *name, | |
f44aebcc | 422 | u32 cookie, gfp_t gfp); |
62ffe5df | 423 | |
b4e4e140 EP |
424 | /* fanotify likes to change events after they are on lists... */ |
425 | extern struct fsnotify_event *fsnotify_clone_event(struct fsnotify_event *old_event); | |
1201a536 EP |
426 | extern int fsnotify_replace_event(struct fsnotify_event_holder *old_holder, |
427 | struct fsnotify_event *new_event); | |
b4e4e140 | 428 | |
90586523 EP |
429 | #else |
430 | ||
c4ec54b4 EP |
431 | static inline int fsnotify(struct inode *to_tell, __u32 mask, void *data, int data_is, |
432 | const unsigned char *name, u32 cookie) | |
433 | { | |
434 | return 0; | |
435 | } | |
3be25f49 | 436 | |
52420392 EP |
437 | static inline int __fsnotify_parent(struct path *path, struct dentry *dentry, __u32 mask) |
438 | { | |
439 | return 0; | |
440 | } | |
c28f7e56 | 441 | |
3be25f49 EP |
442 | static inline void __fsnotify_inode_delete(struct inode *inode) |
443 | {} | |
444 | ||
ca9c726e AG |
445 | static inline void __fsnotify_vfsmount_delete(struct vfsmount *mnt) |
446 | {} | |
447 | ||
c28f7e56 EP |
448 | static inline void __fsnotify_update_dcache_flags(struct dentry *dentry) |
449 | {} | |
450 | ||
451 | static inline void __fsnotify_d_instantiate(struct dentry *dentry, struct inode *inode) | |
452 | {} | |
453 | ||
47882c6f EP |
454 | static inline u32 fsnotify_get_cookie(void) |
455 | { | |
456 | return 0; | |
457 | } | |
458 | ||
164bc619 EP |
459 | static inline void fsnotify_unmount_inodes(struct list_head *list) |
460 | {} | |
461 | ||
90586523 EP |
462 | #endif /* CONFIG_FSNOTIFY */ |
463 | ||
464 | #endif /* __KERNEL __ */ | |
465 | ||
466 | #endif /* __LINUX_FSNOTIFY_BACKEND_H */ |