]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/kernfs/dir.c
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/trivial
[mirror_ubuntu-artful-kernel.git] / fs / kernfs / dir.c
CommitLineData
b8441ed2
TH
1/*
2 * fs/kernfs/dir.c - kernfs directory implementation
3 *
4 * Copyright (c) 2001-3 Patrick Mochel
5 * Copyright (c) 2007 SUSE Linux Products GmbH
6 * Copyright (c) 2007, 2013 Tejun Heo <tj@kernel.org>
7 *
8 * This file is released under the GPLv2.
9 */
fd7b9f7b 10
abd54f02 11#include <linux/sched.h>
fd7b9f7b
TH
12#include <linux/fs.h>
13#include <linux/namei.h>
14#include <linux/idr.h>
15#include <linux/slab.h>
16#include <linux/security.h>
17#include <linux/hash.h>
18
19#include "kernfs-internal.h"
20
a797bfc3 21DEFINE_MUTEX(kernfs_mutex);
3eef34ad
TH
22static DEFINE_SPINLOCK(kernfs_rename_lock); /* kn->parent and ->name */
23static char kernfs_pr_cont_buf[PATH_MAX]; /* protected by rename_lock */
fd7b9f7b 24
adc5e8b5 25#define rb_to_kn(X) rb_entry((X), struct kernfs_node, rb)
fd7b9f7b 26
81c173cb
TH
27static bool kernfs_active(struct kernfs_node *kn)
28{
29 lockdep_assert_held(&kernfs_mutex);
30 return atomic_read(&kn->active) >= 0;
31}
32
182fd64b
TH
33static bool kernfs_lockdep(struct kernfs_node *kn)
34{
35#ifdef CONFIG_DEBUG_LOCK_ALLOC
36 return kn->flags & KERNFS_LOCKDEP;
37#else
38 return false;
39#endif
40}
41
3eef34ad
TH
42static int kernfs_name_locked(struct kernfs_node *kn, char *buf, size_t buflen)
43{
44 return strlcpy(buf, kn->parent ? kn->name : "/", buflen);
45}
46
47static char * __must_check kernfs_path_locked(struct kernfs_node *kn, char *buf,
48 size_t buflen)
49{
50 char *p = buf + buflen;
51 int len;
52
53 *--p = '\0';
54
55 do {
56 len = strlen(kn->name);
57 if (p - buf < len + 1) {
58 buf[0] = '\0';
59 p = NULL;
60 break;
61 }
62 p -= len;
63 memcpy(p, kn->name, len);
64 *--p = '/';
65 kn = kn->parent;
66 } while (kn && kn->parent);
67
68 return p;
69}
70
71/**
72 * kernfs_name - obtain the name of a given node
73 * @kn: kernfs_node of interest
74 * @buf: buffer to copy @kn's name into
75 * @buflen: size of @buf
76 *
77 * Copies the name of @kn into @buf of @buflen bytes. The behavior is
78 * similar to strlcpy(). It returns the length of @kn's name and if @buf
79 * isn't long enough, it's filled upto @buflen-1 and nul terminated.
80 *
81 * This function can be called from any context.
82 */
83int kernfs_name(struct kernfs_node *kn, char *buf, size_t buflen)
84{
85 unsigned long flags;
86 int ret;
87
88 spin_lock_irqsave(&kernfs_rename_lock, flags);
89 ret = kernfs_name_locked(kn, buf, buflen);
90 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
91 return ret;
92}
93
94/**
95 * kernfs_path - build full path of a given node
96 * @kn: kernfs_node of interest
97 * @buf: buffer to copy @kn's name into
98 * @buflen: size of @buf
99 *
100 * Builds and returns the full path of @kn in @buf of @buflen bytes. The
101 * path is built from the end of @buf so the returned pointer usually
102 * doesn't match @buf. If @buf isn't long enough, @buf is nul terminated
103 * and %NULL is returned.
104 */
105char *kernfs_path(struct kernfs_node *kn, char *buf, size_t buflen)
106{
107 unsigned long flags;
108 char *p;
109
110 spin_lock_irqsave(&kernfs_rename_lock, flags);
111 p = kernfs_path_locked(kn, buf, buflen);
112 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
113 return p;
114}
e61734c5 115EXPORT_SYMBOL_GPL(kernfs_path);
3eef34ad
TH
116
117/**
118 * pr_cont_kernfs_name - pr_cont name of a kernfs_node
119 * @kn: kernfs_node of interest
120 *
121 * This function can be called from any context.
122 */
123void pr_cont_kernfs_name(struct kernfs_node *kn)
124{
125 unsigned long flags;
126
127 spin_lock_irqsave(&kernfs_rename_lock, flags);
128
129 kernfs_name_locked(kn, kernfs_pr_cont_buf, sizeof(kernfs_pr_cont_buf));
130 pr_cont("%s", kernfs_pr_cont_buf);
131
132 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
133}
134
135/**
136 * pr_cont_kernfs_path - pr_cont path of a kernfs_node
137 * @kn: kernfs_node of interest
138 *
139 * This function can be called from any context.
140 */
141void pr_cont_kernfs_path(struct kernfs_node *kn)
142{
143 unsigned long flags;
144 char *p;
145
146 spin_lock_irqsave(&kernfs_rename_lock, flags);
147
148 p = kernfs_path_locked(kn, kernfs_pr_cont_buf,
149 sizeof(kernfs_pr_cont_buf));
150 if (p)
151 pr_cont("%s", p);
152 else
153 pr_cont("<name too long>");
154
155 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
156}
157
158/**
159 * kernfs_get_parent - determine the parent node and pin it
160 * @kn: kernfs_node of interest
161 *
162 * Determines @kn's parent, pins and returns it. This function can be
163 * called from any context.
164 */
165struct kernfs_node *kernfs_get_parent(struct kernfs_node *kn)
166{
167 struct kernfs_node *parent;
168 unsigned long flags;
169
170 spin_lock_irqsave(&kernfs_rename_lock, flags);
171 parent = kn->parent;
172 kernfs_get(parent);
173 spin_unlock_irqrestore(&kernfs_rename_lock, flags);
174
175 return parent;
176}
177
fd7b9f7b 178/**
c637b8ac 179 * kernfs_name_hash
fd7b9f7b
TH
180 * @name: Null terminated string to hash
181 * @ns: Namespace tag to hash
182 *
183 * Returns 31 bit hash of ns + name (so it fits in an off_t )
184 */
c637b8ac 185static unsigned int kernfs_name_hash(const char *name, const void *ns)
fd7b9f7b
TH
186{
187 unsigned long hash = init_name_hash();
188 unsigned int len = strlen(name);
189 while (len--)
190 hash = partial_name_hash(*name++, hash);
191 hash = (end_name_hash(hash) ^ hash_ptr((void *)ns, 31));
192 hash &= 0x7fffffffU;
193 /* Reserve hash numbers 0, 1 and INT_MAX for magic directory entries */
88391d49 194 if (hash < 2)
fd7b9f7b
TH
195 hash += 2;
196 if (hash >= INT_MAX)
197 hash = INT_MAX - 1;
198 return hash;
199}
200
c637b8ac
TH
201static int kernfs_name_compare(unsigned int hash, const char *name,
202 const void *ns, const struct kernfs_node *kn)
fd7b9f7b 203{
adc5e8b5
TH
204 if (hash != kn->hash)
205 return hash - kn->hash;
206 if (ns != kn->ns)
207 return ns - kn->ns;
208 return strcmp(name, kn->name);
fd7b9f7b
TH
209}
210
c637b8ac
TH
211static int kernfs_sd_compare(const struct kernfs_node *left,
212 const struct kernfs_node *right)
fd7b9f7b 213{
c637b8ac 214 return kernfs_name_compare(left->hash, left->name, left->ns, right);
fd7b9f7b
TH
215}
216
217/**
c637b8ac 218 * kernfs_link_sibling - link kernfs_node into sibling rbtree
324a56e1 219 * @kn: kernfs_node of interest
fd7b9f7b 220 *
324a56e1 221 * Link @kn into its sibling rbtree which starts from
adc5e8b5 222 * @kn->parent->dir.children.
fd7b9f7b
TH
223 *
224 * Locking:
a797bfc3 225 * mutex_lock(kernfs_mutex)
fd7b9f7b
TH
226 *
227 * RETURNS:
228 * 0 on susccess -EEXIST on failure.
229 */
c637b8ac 230static int kernfs_link_sibling(struct kernfs_node *kn)
fd7b9f7b 231{
adc5e8b5 232 struct rb_node **node = &kn->parent->dir.children.rb_node;
fd7b9f7b
TH
233 struct rb_node *parent = NULL;
234
fd7b9f7b 235 while (*node) {
324a56e1 236 struct kernfs_node *pos;
fd7b9f7b
TH
237 int result;
238
324a56e1 239 pos = rb_to_kn(*node);
fd7b9f7b 240 parent = *node;
c637b8ac 241 result = kernfs_sd_compare(kn, pos);
fd7b9f7b 242 if (result < 0)
adc5e8b5 243 node = &pos->rb.rb_left;
fd7b9f7b 244 else if (result > 0)
adc5e8b5 245 node = &pos->rb.rb_right;
fd7b9f7b
TH
246 else
247 return -EEXIST;
248 }
c1befb88 249
fd7b9f7b 250 /* add new node and rebalance the tree */
adc5e8b5
TH
251 rb_link_node(&kn->rb, parent, node);
252 rb_insert_color(&kn->rb, &kn->parent->dir.children);
c1befb88
JZ
253
254 /* successfully added, account subdir number */
255 if (kernfs_type(kn) == KERNFS_DIR)
256 kn->parent->dir.subdirs++;
257
fd7b9f7b
TH
258 return 0;
259}
260
261/**
c637b8ac 262 * kernfs_unlink_sibling - unlink kernfs_node from sibling rbtree
324a56e1 263 * @kn: kernfs_node of interest
fd7b9f7b 264 *
35beab06
TH
265 * Try to unlink @kn from its sibling rbtree which starts from
266 * kn->parent->dir.children. Returns %true if @kn was actually
267 * removed, %false if @kn wasn't on the rbtree.
fd7b9f7b
TH
268 *
269 * Locking:
a797bfc3 270 * mutex_lock(kernfs_mutex)
fd7b9f7b 271 */
35beab06 272static bool kernfs_unlink_sibling(struct kernfs_node *kn)
fd7b9f7b 273{
35beab06
TH
274 if (RB_EMPTY_NODE(&kn->rb))
275 return false;
276
df23fc39 277 if (kernfs_type(kn) == KERNFS_DIR)
adc5e8b5 278 kn->parent->dir.subdirs--;
fd7b9f7b 279
adc5e8b5 280 rb_erase(&kn->rb, &kn->parent->dir.children);
35beab06
TH
281 RB_CLEAR_NODE(&kn->rb);
282 return true;
fd7b9f7b
TH
283}
284
285/**
c637b8ac 286 * kernfs_get_active - get an active reference to kernfs_node
324a56e1 287 * @kn: kernfs_node to get an active reference to
fd7b9f7b 288 *
324a56e1 289 * Get an active reference of @kn. This function is noop if @kn
fd7b9f7b
TH
290 * is NULL.
291 *
292 * RETURNS:
324a56e1 293 * Pointer to @kn on success, NULL on failure.
fd7b9f7b 294 */
c637b8ac 295struct kernfs_node *kernfs_get_active(struct kernfs_node *kn)
fd7b9f7b 296{
324a56e1 297 if (unlikely(!kn))
fd7b9f7b
TH
298 return NULL;
299
f4b3e631
GKH
300 if (!atomic_inc_unless_negative(&kn->active))
301 return NULL;
895a068a 302
182fd64b 303 if (kernfs_lockdep(kn))
f4b3e631
GKH
304 rwsem_acquire_read(&kn->dep_map, 0, 1, _RET_IP_);
305 return kn;
fd7b9f7b
TH
306}
307
308/**
c637b8ac 309 * kernfs_put_active - put an active reference to kernfs_node
324a56e1 310 * @kn: kernfs_node to put an active reference to
fd7b9f7b 311 *
324a56e1 312 * Put an active reference to @kn. This function is noop if @kn
fd7b9f7b
TH
313 * is NULL.
314 */
c637b8ac 315void kernfs_put_active(struct kernfs_node *kn)
fd7b9f7b 316{
abd54f02 317 struct kernfs_root *root = kernfs_root(kn);
fd7b9f7b
TH
318 int v;
319
324a56e1 320 if (unlikely(!kn))
fd7b9f7b
TH
321 return;
322
182fd64b 323 if (kernfs_lockdep(kn))
324a56e1 324 rwsem_release(&kn->dep_map, 1, _RET_IP_);
adc5e8b5 325 v = atomic_dec_return(&kn->active);
df23fc39 326 if (likely(v != KN_DEACTIVATED_BIAS))
fd7b9f7b
TH
327 return;
328
abd54f02 329 wake_up_all(&root->deactivate_waitq);
fd7b9f7b
TH
330}
331
332/**
81c173cb
TH
333 * kernfs_drain - drain kernfs_node
334 * @kn: kernfs_node to drain
fd7b9f7b 335 *
81c173cb
TH
336 * Drain existing usages and nuke all existing mmaps of @kn. Mutiple
337 * removers may invoke this function concurrently on @kn and all will
338 * return after draining is complete.
fd7b9f7b 339 */
81c173cb 340static void kernfs_drain(struct kernfs_node *kn)
35beab06 341 __releases(&kernfs_mutex) __acquires(&kernfs_mutex)
fd7b9f7b 342{
abd54f02 343 struct kernfs_root *root = kernfs_root(kn);
fd7b9f7b 344
35beab06 345 lockdep_assert_held(&kernfs_mutex);
81c173cb 346 WARN_ON_ONCE(kernfs_active(kn));
ea1c472d 347
35beab06 348 mutex_unlock(&kernfs_mutex);
abd54f02 349
182fd64b 350 if (kernfs_lockdep(kn)) {
35beab06
TH
351 rwsem_acquire(&kn->dep_map, 0, 0, _RET_IP_);
352 if (atomic_read(&kn->active) != KN_DEACTIVATED_BIAS)
353 lock_contended(&kn->dep_map, _RET_IP_);
354 }
abd54f02 355
35beab06 356 /* but everyone should wait for draining */
abd54f02
TH
357 wait_event(root->deactivate_waitq,
358 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS);
fd7b9f7b 359
182fd64b 360 if (kernfs_lockdep(kn)) {
a6607930
TH
361 lock_acquired(&kn->dep_map, _RET_IP_);
362 rwsem_release(&kn->dep_map, 1, _RET_IP_);
363 }
35beab06 364
ccf02aaf
TH
365 kernfs_unmap_bin_file(kn);
366
35beab06 367 mutex_lock(&kernfs_mutex);
fd7b9f7b
TH
368}
369
fd7b9f7b 370/**
324a56e1
TH
371 * kernfs_get - get a reference count on a kernfs_node
372 * @kn: the target kernfs_node
fd7b9f7b 373 */
324a56e1 374void kernfs_get(struct kernfs_node *kn)
fd7b9f7b 375{
324a56e1 376 if (kn) {
adc5e8b5
TH
377 WARN_ON(!atomic_read(&kn->count));
378 atomic_inc(&kn->count);
fd7b9f7b
TH
379 }
380}
381EXPORT_SYMBOL_GPL(kernfs_get);
382
383/**
324a56e1
TH
384 * kernfs_put - put a reference count on a kernfs_node
385 * @kn: the target kernfs_node
fd7b9f7b 386 *
324a56e1 387 * Put a reference count of @kn and destroy it if it reached zero.
fd7b9f7b 388 */
324a56e1 389void kernfs_put(struct kernfs_node *kn)
fd7b9f7b 390{
324a56e1 391 struct kernfs_node *parent;
ba7443bc 392 struct kernfs_root *root;
fd7b9f7b 393
adc5e8b5 394 if (!kn || !atomic_dec_and_test(&kn->count))
fd7b9f7b 395 return;
324a56e1 396 root = kernfs_root(kn);
fd7b9f7b 397 repeat:
81c173cb
TH
398 /*
399 * Moving/renaming is always done while holding reference.
adc5e8b5 400 * kn->parent won't change beneath us.
fd7b9f7b 401 */
adc5e8b5 402 parent = kn->parent;
fd7b9f7b 403
81c173cb
TH
404 WARN_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS,
405 "kernfs_put: %s/%s: released with incorrect active_ref %d\n",
406 parent ? parent->name : "", kn->name, atomic_read(&kn->active));
324a56e1 407
df23fc39 408 if (kernfs_type(kn) == KERNFS_LINK)
adc5e8b5 409 kernfs_put(kn->symlink.target_kn);
2063d608 410 if (!(kn->flags & KERNFS_STATIC_NAME))
adc5e8b5
TH
411 kfree(kn->name);
412 if (kn->iattr) {
413 if (kn->iattr->ia_secdata)
414 security_release_secctx(kn->iattr->ia_secdata,
415 kn->iattr->ia_secdata_len);
416 simple_xattrs_free(&kn->iattr->xattrs);
2322392b 417 }
adc5e8b5
TH
418 kfree(kn->iattr);
419 ida_simple_remove(&root->ino_ida, kn->ino);
a797bfc3 420 kmem_cache_free(kernfs_node_cache, kn);
fd7b9f7b 421
324a56e1
TH
422 kn = parent;
423 if (kn) {
adc5e8b5 424 if (atomic_dec_and_test(&kn->count))
ba7443bc
TH
425 goto repeat;
426 } else {
324a56e1 427 /* just released the root kn, free @root too */
bc755553 428 ida_destroy(&root->ino_ida);
ba7443bc
TH
429 kfree(root);
430 }
fd7b9f7b
TH
431}
432EXPORT_SYMBOL_GPL(kernfs_put);
433
c637b8ac 434static int kernfs_dop_revalidate(struct dentry *dentry, unsigned int flags)
fd7b9f7b 435{
324a56e1 436 struct kernfs_node *kn;
fd7b9f7b
TH
437
438 if (flags & LOOKUP_RCU)
439 return -ECHILD;
440
19bbb926
TH
441 /* Always perform fresh lookup for negatives */
442 if (!dentry->d_inode)
443 goto out_bad_unlocked;
444
324a56e1 445 kn = dentry->d_fsdata;
a797bfc3 446 mutex_lock(&kernfs_mutex);
fd7b9f7b 447
81c173cb
TH
448 /* The kernfs node has been deactivated */
449 if (!kernfs_active(kn))
fd7b9f7b
TH
450 goto out_bad;
451
c637b8ac 452 /* The kernfs node has been moved? */
adc5e8b5 453 if (dentry->d_parent->d_fsdata != kn->parent)
fd7b9f7b
TH
454 goto out_bad;
455
c637b8ac 456 /* The kernfs node has been renamed */
adc5e8b5 457 if (strcmp(dentry->d_name.name, kn->name) != 0)
fd7b9f7b
TH
458 goto out_bad;
459
c637b8ac 460 /* The kernfs node has been moved to a different namespace */
adc5e8b5 461 if (kn->parent && kernfs_ns_enabled(kn->parent) &&
c525aadd 462 kernfs_info(dentry->d_sb)->ns != kn->ns)
fd7b9f7b
TH
463 goto out_bad;
464
a797bfc3 465 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
466 return 1;
467out_bad:
a797bfc3 468 mutex_unlock(&kernfs_mutex);
19bbb926 469out_bad_unlocked:
fd7b9f7b
TH
470 return 0;
471}
472
c637b8ac 473static void kernfs_dop_release(struct dentry *dentry)
fd7b9f7b
TH
474{
475 kernfs_put(dentry->d_fsdata);
476}
477
a797bfc3 478const struct dentry_operations kernfs_dops = {
c637b8ac 479 .d_revalidate = kernfs_dop_revalidate,
c637b8ac 480 .d_release = kernfs_dop_release,
fd7b9f7b
TH
481};
482
0c23b225
TH
483/**
484 * kernfs_node_from_dentry - determine kernfs_node associated with a dentry
485 * @dentry: the dentry in question
486 *
487 * Return the kernfs_node associated with @dentry. If @dentry is not a
488 * kernfs one, %NULL is returned.
489 *
490 * While the returned kernfs_node will stay accessible as long as @dentry
491 * is accessible, the returned node can be in any state and the caller is
492 * fully responsible for determining what's accessible.
493 */
494struct kernfs_node *kernfs_node_from_dentry(struct dentry *dentry)
495{
f41c5934 496 if (dentry->d_sb->s_op == &kernfs_sops)
0c23b225
TH
497 return dentry->d_fsdata;
498 return NULL;
499}
500
db4aad20
TH
501static struct kernfs_node *__kernfs_new_node(struct kernfs_root *root,
502 const char *name, umode_t mode,
503 unsigned flags)
fd7b9f7b
TH
504{
505 char *dup_name = NULL;
324a56e1 506 struct kernfs_node *kn;
bc755553 507 int ret;
fd7b9f7b 508
2063d608 509 if (!(flags & KERNFS_STATIC_NAME)) {
fd7b9f7b
TH
510 name = dup_name = kstrdup(name, GFP_KERNEL);
511 if (!name)
512 return NULL;
513 }
514
a797bfc3 515 kn = kmem_cache_zalloc(kernfs_node_cache, GFP_KERNEL);
324a56e1 516 if (!kn)
fd7b9f7b
TH
517 goto err_out1;
518
bc755553
TH
519 ret = ida_simple_get(&root->ino_ida, 1, 0, GFP_KERNEL);
520 if (ret < 0)
fd7b9f7b 521 goto err_out2;
adc5e8b5 522 kn->ino = ret;
fd7b9f7b 523
adc5e8b5 524 atomic_set(&kn->count, 1);
81c173cb 525 atomic_set(&kn->active, KN_DEACTIVATED_BIAS);
35beab06 526 RB_CLEAR_NODE(&kn->rb);
fd7b9f7b 527
adc5e8b5
TH
528 kn->name = name;
529 kn->mode = mode;
81c173cb 530 kn->flags = flags;
fd7b9f7b 531
324a56e1 532 return kn;
fd7b9f7b
TH
533
534 err_out2:
a797bfc3 535 kmem_cache_free(kernfs_node_cache, kn);
fd7b9f7b
TH
536 err_out1:
537 kfree(dup_name);
538 return NULL;
539}
540
db4aad20
TH
541struct kernfs_node *kernfs_new_node(struct kernfs_node *parent,
542 const char *name, umode_t mode,
543 unsigned flags)
544{
545 struct kernfs_node *kn;
546
547 kn = __kernfs_new_node(kernfs_root(parent), name, mode, flags);
548 if (kn) {
549 kernfs_get(parent);
550 kn->parent = parent;
551 }
552 return kn;
553}
554
fd7b9f7b 555/**
c637b8ac 556 * kernfs_add_one - add kernfs_node to parent without warning
324a56e1 557 * @kn: kernfs_node to be added
fd7b9f7b 558 *
db4aad20
TH
559 * The caller must already have initialized @kn->parent. This
560 * function increments nlink of the parent's inode if @kn is a
561 * directory and link into the children list of the parent.
fd7b9f7b 562 *
fd7b9f7b
TH
563 * RETURNS:
564 * 0 on success, -EEXIST if entry with the given name already
565 * exists.
566 */
988cd7af 567int kernfs_add_one(struct kernfs_node *kn)
fd7b9f7b 568{
db4aad20 569 struct kernfs_node *parent = kn->parent;
c525aadd 570 struct kernfs_iattrs *ps_iattr;
988cd7af 571 bool has_ns;
fd7b9f7b
TH
572 int ret;
573
988cd7af
TH
574 mutex_lock(&kernfs_mutex);
575
576 ret = -EINVAL;
577 has_ns = kernfs_ns_enabled(parent);
578 if (WARN(has_ns != (bool)kn->ns, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
579 has_ns ? "required" : "invalid", parent->name, kn->name))
580 goto out_unlock;
fd7b9f7b 581
df23fc39 582 if (kernfs_type(parent) != KERNFS_DIR)
988cd7af 583 goto out_unlock;
fd7b9f7b 584
988cd7af 585 ret = -ENOENT;
d35258ef 586 if ((parent->flags & KERNFS_ACTIVATED) && !kernfs_active(parent))
988cd7af 587 goto out_unlock;
798c75a0 588
c637b8ac 589 kn->hash = kernfs_name_hash(kn->name, kn->ns);
fd7b9f7b 590
c637b8ac 591 ret = kernfs_link_sibling(kn);
fd7b9f7b 592 if (ret)
988cd7af 593 goto out_unlock;
fd7b9f7b
TH
594
595 /* Update timestamps on the parent */
adc5e8b5 596 ps_iattr = parent->iattr;
fd7b9f7b
TH
597 if (ps_iattr) {
598 struct iattr *ps_iattrs = &ps_iattr->ia_iattr;
599 ps_iattrs->ia_ctime = ps_iattrs->ia_mtime = CURRENT_TIME;
600 }
601
d35258ef
TH
602 mutex_unlock(&kernfs_mutex);
603
604 /*
605 * Activate the new node unless CREATE_DEACTIVATED is requested.
606 * If not activated here, the kernfs user is responsible for
607 * activating the node with kernfs_activate(). A node which hasn't
608 * been activated is not visible to userland and its removal won't
609 * trigger deactivation.
610 */
611 if (!(kernfs_root(kn)->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
612 kernfs_activate(kn);
613 return 0;
614
988cd7af 615out_unlock:
a797bfc3 616 mutex_unlock(&kernfs_mutex);
988cd7af 617 return ret;
fd7b9f7b
TH
618}
619
620/**
324a56e1
TH
621 * kernfs_find_ns - find kernfs_node with the given name
622 * @parent: kernfs_node to search under
fd7b9f7b
TH
623 * @name: name to look for
624 * @ns: the namespace tag to use
625 *
324a56e1
TH
626 * Look for kernfs_node with name @name under @parent. Returns pointer to
627 * the found kernfs_node on success, %NULL on failure.
fd7b9f7b 628 */
324a56e1
TH
629static struct kernfs_node *kernfs_find_ns(struct kernfs_node *parent,
630 const unsigned char *name,
631 const void *ns)
fd7b9f7b 632{
adc5e8b5 633 struct rb_node *node = parent->dir.children.rb_node;
ac9bba03 634 bool has_ns = kernfs_ns_enabled(parent);
fd7b9f7b
TH
635 unsigned int hash;
636
a797bfc3 637 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b
TH
638
639 if (has_ns != (bool)ns) {
c637b8ac 640 WARN(1, KERN_WARNING "kernfs: ns %s in '%s' for '%s'\n",
adc5e8b5 641 has_ns ? "required" : "invalid", parent->name, name);
fd7b9f7b
TH
642 return NULL;
643 }
644
c637b8ac 645 hash = kernfs_name_hash(name, ns);
fd7b9f7b 646 while (node) {
324a56e1 647 struct kernfs_node *kn;
fd7b9f7b
TH
648 int result;
649
324a56e1 650 kn = rb_to_kn(node);
c637b8ac 651 result = kernfs_name_compare(hash, name, ns, kn);
fd7b9f7b
TH
652 if (result < 0)
653 node = node->rb_left;
654 else if (result > 0)
655 node = node->rb_right;
656 else
324a56e1 657 return kn;
fd7b9f7b
TH
658 }
659 return NULL;
660}
661
662/**
324a56e1
TH
663 * kernfs_find_and_get_ns - find and get kernfs_node with the given name
664 * @parent: kernfs_node to search under
fd7b9f7b
TH
665 * @name: name to look for
666 * @ns: the namespace tag to use
667 *
324a56e1 668 * Look for kernfs_node with name @name under @parent and get a reference
fd7b9f7b 669 * if found. This function may sleep and returns pointer to the found
324a56e1 670 * kernfs_node on success, %NULL on failure.
fd7b9f7b 671 */
324a56e1
TH
672struct kernfs_node *kernfs_find_and_get_ns(struct kernfs_node *parent,
673 const char *name, const void *ns)
fd7b9f7b 674{
324a56e1 675 struct kernfs_node *kn;
fd7b9f7b 676
a797bfc3 677 mutex_lock(&kernfs_mutex);
324a56e1
TH
678 kn = kernfs_find_ns(parent, name, ns);
679 kernfs_get(kn);
a797bfc3 680 mutex_unlock(&kernfs_mutex);
fd7b9f7b 681
324a56e1 682 return kn;
fd7b9f7b
TH
683}
684EXPORT_SYMBOL_GPL(kernfs_find_and_get_ns);
685
ba7443bc
TH
686/**
687 * kernfs_create_root - create a new kernfs hierarchy
90c07c89 688 * @scops: optional syscall operations for the hierarchy
d35258ef 689 * @flags: KERNFS_ROOT_* flags
ba7443bc
TH
690 * @priv: opaque data associated with the new directory
691 *
692 * Returns the root of the new hierarchy on success, ERR_PTR() value on
693 * failure.
694 */
90c07c89 695struct kernfs_root *kernfs_create_root(struct kernfs_syscall_ops *scops,
d35258ef 696 unsigned int flags, void *priv)
ba7443bc
TH
697{
698 struct kernfs_root *root;
324a56e1 699 struct kernfs_node *kn;
ba7443bc
TH
700
701 root = kzalloc(sizeof(*root), GFP_KERNEL);
702 if (!root)
703 return ERR_PTR(-ENOMEM);
704
bc755553 705 ida_init(&root->ino_ida);
7d568a83 706 INIT_LIST_HEAD(&root->supers);
bc755553 707
db4aad20
TH
708 kn = __kernfs_new_node(root, "", S_IFDIR | S_IRUGO | S_IXUGO,
709 KERNFS_DIR);
324a56e1 710 if (!kn) {
bc755553 711 ida_destroy(&root->ino_ida);
ba7443bc
TH
712 kfree(root);
713 return ERR_PTR(-ENOMEM);
714 }
715
324a56e1 716 kn->priv = priv;
adc5e8b5 717 kn->dir.root = root;
ba7443bc 718
90c07c89 719 root->syscall_ops = scops;
d35258ef 720 root->flags = flags;
324a56e1 721 root->kn = kn;
abd54f02 722 init_waitqueue_head(&root->deactivate_waitq);
ba7443bc 723
d35258ef
TH
724 if (!(root->flags & KERNFS_ROOT_CREATE_DEACTIVATED))
725 kernfs_activate(kn);
726
ba7443bc
TH
727 return root;
728}
729
730/**
731 * kernfs_destroy_root - destroy a kernfs hierarchy
732 * @root: root of the hierarchy to destroy
733 *
734 * Destroy the hierarchy anchored at @root by removing all existing
735 * directories and destroying @root.
736 */
737void kernfs_destroy_root(struct kernfs_root *root)
738{
324a56e1 739 kernfs_remove(root->kn); /* will also free @root */
ba7443bc
TH
740}
741
fd7b9f7b
TH
742/**
743 * kernfs_create_dir_ns - create a directory
744 * @parent: parent in which to create a new directory
745 * @name: name of the new directory
bb8b9d09 746 * @mode: mode of the new directory
fd7b9f7b
TH
747 * @priv: opaque data associated with the new directory
748 * @ns: optional namespace tag of the directory
749 *
750 * Returns the created node on success, ERR_PTR() value on failure.
751 */
324a56e1 752struct kernfs_node *kernfs_create_dir_ns(struct kernfs_node *parent,
bb8b9d09
TH
753 const char *name, umode_t mode,
754 void *priv, const void *ns)
fd7b9f7b 755{
324a56e1 756 struct kernfs_node *kn;
fd7b9f7b
TH
757 int rc;
758
759 /* allocate */
db4aad20 760 kn = kernfs_new_node(parent, name, mode | S_IFDIR, KERNFS_DIR);
324a56e1 761 if (!kn)
fd7b9f7b
TH
762 return ERR_PTR(-ENOMEM);
763
adc5e8b5
TH
764 kn->dir.root = parent->dir.root;
765 kn->ns = ns;
324a56e1 766 kn->priv = priv;
fd7b9f7b
TH
767
768 /* link in */
988cd7af 769 rc = kernfs_add_one(kn);
fd7b9f7b 770 if (!rc)
324a56e1 771 return kn;
fd7b9f7b 772
324a56e1 773 kernfs_put(kn);
fd7b9f7b
TH
774 return ERR_PTR(rc);
775}
776
c637b8ac
TH
777static struct dentry *kernfs_iop_lookup(struct inode *dir,
778 struct dentry *dentry,
779 unsigned int flags)
fd7b9f7b 780{
19bbb926 781 struct dentry *ret;
324a56e1
TH
782 struct kernfs_node *parent = dentry->d_parent->d_fsdata;
783 struct kernfs_node *kn;
fd7b9f7b
TH
784 struct inode *inode;
785 const void *ns = NULL;
786
a797bfc3 787 mutex_lock(&kernfs_mutex);
fd7b9f7b 788
324a56e1 789 if (kernfs_ns_enabled(parent))
c525aadd 790 ns = kernfs_info(dir->i_sb)->ns;
fd7b9f7b 791
324a56e1 792 kn = kernfs_find_ns(parent, dentry->d_name.name, ns);
fd7b9f7b
TH
793
794 /* no such entry */
b9c9dad0 795 if (!kn || !kernfs_active(kn)) {
19bbb926 796 ret = NULL;
fd7b9f7b
TH
797 goto out_unlock;
798 }
324a56e1
TH
799 kernfs_get(kn);
800 dentry->d_fsdata = kn;
fd7b9f7b
TH
801
802 /* attach dentry and inode */
c637b8ac 803 inode = kernfs_get_inode(dir->i_sb, kn);
fd7b9f7b
TH
804 if (!inode) {
805 ret = ERR_PTR(-ENOMEM);
806 goto out_unlock;
807 }
808
809 /* instantiate and hash dentry */
41d28bca 810 ret = d_splice_alias(inode, dentry);
fd7b9f7b 811 out_unlock:
a797bfc3 812 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
813 return ret;
814}
815
80b9bbef
TH
816static int kernfs_iop_mkdir(struct inode *dir, struct dentry *dentry,
817 umode_t mode)
818{
819 struct kernfs_node *parent = dir->i_private;
90c07c89 820 struct kernfs_syscall_ops *scops = kernfs_root(parent)->syscall_ops;
07c7530d 821 int ret;
80b9bbef 822
90c07c89 823 if (!scops || !scops->mkdir)
80b9bbef
TH
824 return -EPERM;
825
07c7530d
TH
826 if (!kernfs_get_active(parent))
827 return -ENODEV;
828
90c07c89 829 ret = scops->mkdir(parent, dentry->d_name.name, mode);
07c7530d
TH
830
831 kernfs_put_active(parent);
832 return ret;
80b9bbef
TH
833}
834
835static int kernfs_iop_rmdir(struct inode *dir, struct dentry *dentry)
836{
837 struct kernfs_node *kn = dentry->d_fsdata;
90c07c89 838 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 839 int ret;
80b9bbef 840
90c07c89 841 if (!scops || !scops->rmdir)
80b9bbef
TH
842 return -EPERM;
843
07c7530d
TH
844 if (!kernfs_get_active(kn))
845 return -ENODEV;
846
90c07c89 847 ret = scops->rmdir(kn);
07c7530d
TH
848
849 kernfs_put_active(kn);
850 return ret;
80b9bbef
TH
851}
852
853static int kernfs_iop_rename(struct inode *old_dir, struct dentry *old_dentry,
854 struct inode *new_dir, struct dentry *new_dentry)
855{
856 struct kernfs_node *kn = old_dentry->d_fsdata;
857 struct kernfs_node *new_parent = new_dir->i_private;
90c07c89 858 struct kernfs_syscall_ops *scops = kernfs_root(kn)->syscall_ops;
07c7530d 859 int ret;
80b9bbef 860
90c07c89 861 if (!scops || !scops->rename)
80b9bbef
TH
862 return -EPERM;
863
07c7530d
TH
864 if (!kernfs_get_active(kn))
865 return -ENODEV;
866
867 if (!kernfs_get_active(new_parent)) {
868 kernfs_put_active(kn);
869 return -ENODEV;
870 }
871
90c07c89 872 ret = scops->rename(kn, new_parent, new_dentry->d_name.name);
07c7530d
TH
873
874 kernfs_put_active(new_parent);
875 kernfs_put_active(kn);
876 return ret;
80b9bbef
TH
877}
878
a797bfc3 879const struct inode_operations kernfs_dir_iops = {
c637b8ac
TH
880 .lookup = kernfs_iop_lookup,
881 .permission = kernfs_iop_permission,
882 .setattr = kernfs_iop_setattr,
883 .getattr = kernfs_iop_getattr,
884 .setxattr = kernfs_iop_setxattr,
885 .removexattr = kernfs_iop_removexattr,
886 .getxattr = kernfs_iop_getxattr,
887 .listxattr = kernfs_iop_listxattr,
80b9bbef
TH
888
889 .mkdir = kernfs_iop_mkdir,
890 .rmdir = kernfs_iop_rmdir,
891 .rename = kernfs_iop_rename,
fd7b9f7b
TH
892};
893
c637b8ac 894static struct kernfs_node *kernfs_leftmost_descendant(struct kernfs_node *pos)
fd7b9f7b 895{
324a56e1 896 struct kernfs_node *last;
fd7b9f7b
TH
897
898 while (true) {
899 struct rb_node *rbn;
900
901 last = pos;
902
df23fc39 903 if (kernfs_type(pos) != KERNFS_DIR)
fd7b9f7b
TH
904 break;
905
adc5e8b5 906 rbn = rb_first(&pos->dir.children);
fd7b9f7b
TH
907 if (!rbn)
908 break;
909
324a56e1 910 pos = rb_to_kn(rbn);
fd7b9f7b
TH
911 }
912
913 return last;
914}
915
916/**
c637b8ac 917 * kernfs_next_descendant_post - find the next descendant for post-order walk
fd7b9f7b 918 * @pos: the current position (%NULL to initiate traversal)
324a56e1 919 * @root: kernfs_node whose descendants to walk
fd7b9f7b
TH
920 *
921 * Find the next descendant to visit for post-order traversal of @root's
922 * descendants. @root is included in the iteration and the last node to be
923 * visited.
924 */
c637b8ac
TH
925static struct kernfs_node *kernfs_next_descendant_post(struct kernfs_node *pos,
926 struct kernfs_node *root)
fd7b9f7b
TH
927{
928 struct rb_node *rbn;
929
a797bfc3 930 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b
TH
931
932 /* if first iteration, visit leftmost descendant which may be root */
933 if (!pos)
c637b8ac 934 return kernfs_leftmost_descendant(root);
fd7b9f7b
TH
935
936 /* if we visited @root, we're done */
937 if (pos == root)
938 return NULL;
939
940 /* if there's an unvisited sibling, visit its leftmost descendant */
adc5e8b5 941 rbn = rb_next(&pos->rb);
fd7b9f7b 942 if (rbn)
c637b8ac 943 return kernfs_leftmost_descendant(rb_to_kn(rbn));
fd7b9f7b
TH
944
945 /* no sibling left, visit parent */
adc5e8b5 946 return pos->parent;
fd7b9f7b
TH
947}
948
d35258ef
TH
949/**
950 * kernfs_activate - activate a node which started deactivated
951 * @kn: kernfs_node whose subtree is to be activated
952 *
953 * If the root has KERNFS_ROOT_CREATE_DEACTIVATED set, a newly created node
954 * needs to be explicitly activated. A node which hasn't been activated
955 * isn't visible to userland and deactivation is skipped during its
956 * removal. This is useful to construct atomic init sequences where
957 * creation of multiple nodes should either succeed or fail atomically.
958 *
959 * The caller is responsible for ensuring that this function is not called
960 * after kernfs_remove*() is invoked on @kn.
961 */
962void kernfs_activate(struct kernfs_node *kn)
963{
964 struct kernfs_node *pos;
965
966 mutex_lock(&kernfs_mutex);
967
968 pos = NULL;
969 while ((pos = kernfs_next_descendant_post(pos, kn))) {
970 if (!pos || (pos->flags & KERNFS_ACTIVATED))
971 continue;
972
973 WARN_ON_ONCE(pos->parent && RB_EMPTY_NODE(&pos->rb));
974 WARN_ON_ONCE(atomic_read(&pos->active) != KN_DEACTIVATED_BIAS);
975
976 atomic_sub(KN_DEACTIVATED_BIAS, &pos->active);
977 pos->flags |= KERNFS_ACTIVATED;
978 }
979
980 mutex_unlock(&kernfs_mutex);
981}
982
988cd7af 983static void __kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 984{
35beab06
TH
985 struct kernfs_node *pos;
986
987 lockdep_assert_held(&kernfs_mutex);
fd7b9f7b 988
6b0afc2a
TH
989 /*
990 * Short-circuit if non-root @kn has already finished removal.
991 * This is for kernfs_remove_self() which plays with active ref
992 * after removal.
993 */
994 if (!kn || (kn->parent && RB_EMPTY_NODE(&kn->rb)))
ce9b499c
GKH
995 return;
996
c637b8ac 997 pr_debug("kernfs %s: removing\n", kn->name);
fd7b9f7b 998
81c173cb 999 /* prevent any new usage under @kn by deactivating all nodes */
35beab06
TH
1000 pos = NULL;
1001 while ((pos = kernfs_next_descendant_post(pos, kn)))
81c173cb
TH
1002 if (kernfs_active(pos))
1003 atomic_add(KN_DEACTIVATED_BIAS, &pos->active);
35beab06
TH
1004
1005 /* deactivate and unlink the subtree node-by-node */
fd7b9f7b 1006 do {
35beab06
TH
1007 pos = kernfs_leftmost_descendant(kn);
1008
1009 /*
81c173cb
TH
1010 * kernfs_drain() drops kernfs_mutex temporarily and @pos's
1011 * base ref could have been put by someone else by the time
1012 * the function returns. Make sure it doesn't go away
1013 * underneath us.
35beab06
TH
1014 */
1015 kernfs_get(pos);
1016
d35258ef
TH
1017 /*
1018 * Drain iff @kn was activated. This avoids draining and
1019 * its lockdep annotations for nodes which have never been
1020 * activated and allows embedding kernfs_remove() in create
1021 * error paths without worrying about draining.
1022 */
1023 if (kn->flags & KERNFS_ACTIVATED)
1024 kernfs_drain(pos);
1025 else
1026 WARN_ON_ONCE(atomic_read(&kn->active) != KN_DEACTIVATED_BIAS);
35beab06
TH
1027
1028 /*
1029 * kernfs_unlink_sibling() succeeds once per node. Use it
1030 * to decide who's responsible for cleanups.
1031 */
1032 if (!pos->parent || kernfs_unlink_sibling(pos)) {
1033 struct kernfs_iattrs *ps_iattr =
1034 pos->parent ? pos->parent->iattr : NULL;
1035
1036 /* update timestamps on the parent */
1037 if (ps_iattr) {
1038 ps_iattr->ia_iattr.ia_ctime = CURRENT_TIME;
1039 ps_iattr->ia_iattr.ia_mtime = CURRENT_TIME;
1040 }
1041
988cd7af 1042 kernfs_put(pos);
35beab06
TH
1043 }
1044
1045 kernfs_put(pos);
1046 } while (pos != kn);
fd7b9f7b
TH
1047}
1048
1049/**
324a56e1
TH
1050 * kernfs_remove - remove a kernfs_node recursively
1051 * @kn: the kernfs_node to remove
fd7b9f7b 1052 *
324a56e1 1053 * Remove @kn along with all its subdirectories and files.
fd7b9f7b 1054 */
324a56e1 1055void kernfs_remove(struct kernfs_node *kn)
fd7b9f7b 1056{
988cd7af
TH
1057 mutex_lock(&kernfs_mutex);
1058 __kernfs_remove(kn);
1059 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1060}
1061
6b0afc2a
TH
1062/**
1063 * kernfs_break_active_protection - break out of active protection
1064 * @kn: the self kernfs_node
1065 *
1066 * The caller must be running off of a kernfs operation which is invoked
1067 * with an active reference - e.g. one of kernfs_ops. Each invocation of
1068 * this function must also be matched with an invocation of
1069 * kernfs_unbreak_active_protection().
1070 *
1071 * This function releases the active reference of @kn the caller is
1072 * holding. Once this function is called, @kn may be removed at any point
1073 * and the caller is solely responsible for ensuring that the objects it
1074 * dereferences are accessible.
1075 */
1076void kernfs_break_active_protection(struct kernfs_node *kn)
1077{
1078 /*
1079 * Take out ourself out of the active ref dependency chain. If
1080 * we're called without an active ref, lockdep will complain.
1081 */
1082 kernfs_put_active(kn);
1083}
1084
1085/**
1086 * kernfs_unbreak_active_protection - undo kernfs_break_active_protection()
1087 * @kn: the self kernfs_node
1088 *
1089 * If kernfs_break_active_protection() was called, this function must be
1090 * invoked before finishing the kernfs operation. Note that while this
1091 * function restores the active reference, it doesn't and can't actually
1092 * restore the active protection - @kn may already or be in the process of
1093 * being removed. Once kernfs_break_active_protection() is invoked, that
1094 * protection is irreversibly gone for the kernfs operation instance.
1095 *
1096 * While this function may be called at any point after
1097 * kernfs_break_active_protection() is invoked, its most useful location
1098 * would be right before the enclosing kernfs operation returns.
1099 */
1100void kernfs_unbreak_active_protection(struct kernfs_node *kn)
1101{
1102 /*
1103 * @kn->active could be in any state; however, the increment we do
1104 * here will be undone as soon as the enclosing kernfs operation
1105 * finishes and this temporary bump can't break anything. If @kn
1106 * is alive, nothing changes. If @kn is being deactivated, the
1107 * soon-to-follow put will either finish deactivation or restore
1108 * deactivated state. If @kn is already removed, the temporary
1109 * bump is guaranteed to be gone before @kn is released.
1110 */
1111 atomic_inc(&kn->active);
1112 if (kernfs_lockdep(kn))
1113 rwsem_acquire(&kn->dep_map, 0, 1, _RET_IP_);
1114}
1115
1116/**
1117 * kernfs_remove_self - remove a kernfs_node from its own method
1118 * @kn: the self kernfs_node to remove
1119 *
1120 * The caller must be running off of a kernfs operation which is invoked
1121 * with an active reference - e.g. one of kernfs_ops. This can be used to
1122 * implement a file operation which deletes itself.
1123 *
1124 * For example, the "delete" file for a sysfs device directory can be
1125 * implemented by invoking kernfs_remove_self() on the "delete" file
1126 * itself. This function breaks the circular dependency of trying to
1127 * deactivate self while holding an active ref itself. It isn't necessary
1128 * to modify the usual removal path to use kernfs_remove_self(). The
1129 * "delete" implementation can simply invoke kernfs_remove_self() on self
1130 * before proceeding with the usual removal path. kernfs will ignore later
1131 * kernfs_remove() on self.
1132 *
1133 * kernfs_remove_self() can be called multiple times concurrently on the
1134 * same kernfs_node. Only the first one actually performs removal and
1135 * returns %true. All others will wait until the kernfs operation which
1136 * won self-removal finishes and return %false. Note that the losers wait
1137 * for the completion of not only the winning kernfs_remove_self() but also
1138 * the whole kernfs_ops which won the arbitration. This can be used to
1139 * guarantee, for example, all concurrent writes to a "delete" file to
1140 * finish only after the whole operation is complete.
1141 */
1142bool kernfs_remove_self(struct kernfs_node *kn)
1143{
1144 bool ret;
1145
1146 mutex_lock(&kernfs_mutex);
1147 kernfs_break_active_protection(kn);
1148
1149 /*
1150 * SUICIDAL is used to arbitrate among competing invocations. Only
1151 * the first one will actually perform removal. When the removal
1152 * is complete, SUICIDED is set and the active ref is restored
1153 * while holding kernfs_mutex. The ones which lost arbitration
1154 * waits for SUICDED && drained which can happen only after the
1155 * enclosing kernfs operation which executed the winning instance
1156 * of kernfs_remove_self() finished.
1157 */
1158 if (!(kn->flags & KERNFS_SUICIDAL)) {
1159 kn->flags |= KERNFS_SUICIDAL;
1160 __kernfs_remove(kn);
1161 kn->flags |= KERNFS_SUICIDED;
1162 ret = true;
1163 } else {
1164 wait_queue_head_t *waitq = &kernfs_root(kn)->deactivate_waitq;
1165 DEFINE_WAIT(wait);
1166
1167 while (true) {
1168 prepare_to_wait(waitq, &wait, TASK_UNINTERRUPTIBLE);
1169
1170 if ((kn->flags & KERNFS_SUICIDED) &&
1171 atomic_read(&kn->active) == KN_DEACTIVATED_BIAS)
1172 break;
1173
1174 mutex_unlock(&kernfs_mutex);
1175 schedule();
1176 mutex_lock(&kernfs_mutex);
1177 }
1178 finish_wait(waitq, &wait);
1179 WARN_ON_ONCE(!RB_EMPTY_NODE(&kn->rb));
1180 ret = false;
1181 }
1182
1183 /*
1184 * This must be done while holding kernfs_mutex; otherwise, waiting
1185 * for SUICIDED && deactivated could finish prematurely.
1186 */
1187 kernfs_unbreak_active_protection(kn);
1188
1189 mutex_unlock(&kernfs_mutex);
1190 return ret;
1191}
1192
fd7b9f7b 1193/**
324a56e1
TH
1194 * kernfs_remove_by_name_ns - find a kernfs_node by name and remove it
1195 * @parent: parent of the target
1196 * @name: name of the kernfs_node to remove
1197 * @ns: namespace tag of the kernfs_node to remove
fd7b9f7b 1198 *
324a56e1
TH
1199 * Look for the kernfs_node with @name and @ns under @parent and remove it.
1200 * Returns 0 on success, -ENOENT if such entry doesn't exist.
fd7b9f7b 1201 */
324a56e1 1202int kernfs_remove_by_name_ns(struct kernfs_node *parent, const char *name,
fd7b9f7b
TH
1203 const void *ns)
1204{
324a56e1 1205 struct kernfs_node *kn;
fd7b9f7b 1206
324a56e1 1207 if (!parent) {
c637b8ac 1208 WARN(1, KERN_WARNING "kernfs: can not remove '%s', no directory\n",
fd7b9f7b
TH
1209 name);
1210 return -ENOENT;
1211 }
1212
988cd7af 1213 mutex_lock(&kernfs_mutex);
fd7b9f7b 1214
324a56e1
TH
1215 kn = kernfs_find_ns(parent, name, ns);
1216 if (kn)
988cd7af 1217 __kernfs_remove(kn);
fd7b9f7b 1218
988cd7af 1219 mutex_unlock(&kernfs_mutex);
fd7b9f7b 1220
324a56e1 1221 if (kn)
fd7b9f7b
TH
1222 return 0;
1223 else
1224 return -ENOENT;
1225}
1226
1227/**
1228 * kernfs_rename_ns - move and rename a kernfs_node
324a56e1 1229 * @kn: target node
fd7b9f7b
TH
1230 * @new_parent: new parent to put @sd under
1231 * @new_name: new name
1232 * @new_ns: new namespace tag
1233 */
324a56e1 1234int kernfs_rename_ns(struct kernfs_node *kn, struct kernfs_node *new_parent,
fd7b9f7b
TH
1235 const char *new_name, const void *new_ns)
1236{
3eef34ad
TH
1237 struct kernfs_node *old_parent;
1238 const char *old_name = NULL;
fd7b9f7b
TH
1239 int error;
1240
3eef34ad
TH
1241 /* can't move or rename root */
1242 if (!kn->parent)
1243 return -EINVAL;
1244
798c75a0
GKH
1245 mutex_lock(&kernfs_mutex);
1246
d0ae3d43 1247 error = -ENOENT;
81c173cb 1248 if (!kernfs_active(kn) || !kernfs_active(new_parent))
d0ae3d43
TH
1249 goto out;
1250
fd7b9f7b 1251 error = 0;
adc5e8b5
TH
1252 if ((kn->parent == new_parent) && (kn->ns == new_ns) &&
1253 (strcmp(kn->name, new_name) == 0))
798c75a0 1254 goto out; /* nothing to rename */
fd7b9f7b
TH
1255
1256 error = -EEXIST;
1257 if (kernfs_find_ns(new_parent, new_name, new_ns))
798c75a0 1258 goto out;
fd7b9f7b 1259
324a56e1 1260 /* rename kernfs_node */
adc5e8b5 1261 if (strcmp(kn->name, new_name) != 0) {
fd7b9f7b
TH
1262 error = -ENOMEM;
1263 new_name = kstrdup(new_name, GFP_KERNEL);
1264 if (!new_name)
798c75a0 1265 goto out;
3eef34ad
TH
1266 } else {
1267 new_name = NULL;
fd7b9f7b
TH
1268 }
1269
1270 /*
1271 * Move to the appropriate place in the appropriate directories rbtree.
1272 */
c637b8ac 1273 kernfs_unlink_sibling(kn);
fd7b9f7b 1274 kernfs_get(new_parent);
3eef34ad
TH
1275
1276 /* rename_lock protects ->parent and ->name accessors */
1277 spin_lock_irq(&kernfs_rename_lock);
1278
1279 old_parent = kn->parent;
adc5e8b5 1280 kn->parent = new_parent;
3eef34ad
TH
1281
1282 kn->ns = new_ns;
1283 if (new_name) {
1284 if (!(kn->flags & KERNFS_STATIC_NAME))
1285 old_name = kn->name;
1286 kn->flags &= ~KERNFS_STATIC_NAME;
1287 kn->name = new_name;
1288 }
1289
1290 spin_unlock_irq(&kernfs_rename_lock);
1291
9561a896 1292 kn->hash = kernfs_name_hash(kn->name, kn->ns);
c637b8ac 1293 kernfs_link_sibling(kn);
fd7b9f7b 1294
3eef34ad
TH
1295 kernfs_put(old_parent);
1296 kfree(old_name);
1297
fd7b9f7b 1298 error = 0;
798c75a0 1299 out:
a797bfc3 1300 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1301 return error;
1302}
1303
fd7b9f7b 1304/* Relationship between s_mode and the DT_xxx types */
324a56e1 1305static inline unsigned char dt_type(struct kernfs_node *kn)
fd7b9f7b 1306{
adc5e8b5 1307 return (kn->mode >> 12) & 15;
fd7b9f7b
TH
1308}
1309
c637b8ac 1310static int kernfs_dir_fop_release(struct inode *inode, struct file *filp)
fd7b9f7b
TH
1311{
1312 kernfs_put(filp->private_data);
1313 return 0;
1314}
1315
c637b8ac 1316static struct kernfs_node *kernfs_dir_pos(const void *ns,
324a56e1 1317 struct kernfs_node *parent, loff_t hash, struct kernfs_node *pos)
fd7b9f7b
TH
1318{
1319 if (pos) {
81c173cb 1320 int valid = kernfs_active(pos) &&
798c75a0 1321 pos->parent == parent && hash == pos->hash;
fd7b9f7b
TH
1322 kernfs_put(pos);
1323 if (!valid)
1324 pos = NULL;
1325 }
1326 if (!pos && (hash > 1) && (hash < INT_MAX)) {
adc5e8b5 1327 struct rb_node *node = parent->dir.children.rb_node;
fd7b9f7b 1328 while (node) {
324a56e1 1329 pos = rb_to_kn(node);
fd7b9f7b 1330
adc5e8b5 1331 if (hash < pos->hash)
fd7b9f7b 1332 node = node->rb_left;
adc5e8b5 1333 else if (hash > pos->hash)
fd7b9f7b
TH
1334 node = node->rb_right;
1335 else
1336 break;
1337 }
1338 }
b9c9dad0
TH
1339 /* Skip over entries which are dying/dead or in the wrong namespace */
1340 while (pos && (!kernfs_active(pos) || pos->ns != ns)) {
adc5e8b5 1341 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1342 if (!node)
1343 pos = NULL;
1344 else
324a56e1 1345 pos = rb_to_kn(node);
fd7b9f7b
TH
1346 }
1347 return pos;
1348}
1349
c637b8ac 1350static struct kernfs_node *kernfs_dir_next_pos(const void *ns,
324a56e1 1351 struct kernfs_node *parent, ino_t ino, struct kernfs_node *pos)
fd7b9f7b 1352{
c637b8ac 1353 pos = kernfs_dir_pos(ns, parent, ino, pos);
b9c9dad0 1354 if (pos) {
fd7b9f7b 1355 do {
adc5e8b5 1356 struct rb_node *node = rb_next(&pos->rb);
fd7b9f7b
TH
1357 if (!node)
1358 pos = NULL;
1359 else
324a56e1 1360 pos = rb_to_kn(node);
b9c9dad0
TH
1361 } while (pos && (!kernfs_active(pos) || pos->ns != ns));
1362 }
fd7b9f7b
TH
1363 return pos;
1364}
1365
c637b8ac 1366static int kernfs_fop_readdir(struct file *file, struct dir_context *ctx)
fd7b9f7b
TH
1367{
1368 struct dentry *dentry = file->f_path.dentry;
324a56e1
TH
1369 struct kernfs_node *parent = dentry->d_fsdata;
1370 struct kernfs_node *pos = file->private_data;
fd7b9f7b
TH
1371 const void *ns = NULL;
1372
1373 if (!dir_emit_dots(file, ctx))
1374 return 0;
a797bfc3 1375 mutex_lock(&kernfs_mutex);
fd7b9f7b 1376
324a56e1 1377 if (kernfs_ns_enabled(parent))
c525aadd 1378 ns = kernfs_info(dentry->d_sb)->ns;
fd7b9f7b 1379
c637b8ac 1380 for (pos = kernfs_dir_pos(ns, parent, ctx->pos, pos);
fd7b9f7b 1381 pos;
c637b8ac 1382 pos = kernfs_dir_next_pos(ns, parent, ctx->pos, pos)) {
adc5e8b5 1383 const char *name = pos->name;
fd7b9f7b
TH
1384 unsigned int type = dt_type(pos);
1385 int len = strlen(name);
adc5e8b5 1386 ino_t ino = pos->ino;
fd7b9f7b 1387
adc5e8b5 1388 ctx->pos = pos->hash;
fd7b9f7b
TH
1389 file->private_data = pos;
1390 kernfs_get(pos);
1391
a797bfc3 1392 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1393 if (!dir_emit(ctx, name, len, ino, type))
1394 return 0;
a797bfc3 1395 mutex_lock(&kernfs_mutex);
fd7b9f7b 1396 }
a797bfc3 1397 mutex_unlock(&kernfs_mutex);
fd7b9f7b
TH
1398 file->private_data = NULL;
1399 ctx->pos = INT_MAX;
1400 return 0;
1401}
1402
c637b8ac
TH
1403static loff_t kernfs_dir_fop_llseek(struct file *file, loff_t offset,
1404 int whence)
fd7b9f7b
TH
1405{
1406 struct inode *inode = file_inode(file);
1407 loff_t ret;
1408
1409 mutex_lock(&inode->i_mutex);
1410 ret = generic_file_llseek(file, offset, whence);
1411 mutex_unlock(&inode->i_mutex);
1412
1413 return ret;
1414}
1415
a797bfc3 1416const struct file_operations kernfs_dir_fops = {
fd7b9f7b 1417 .read = generic_read_dir,
c637b8ac
TH
1418 .iterate = kernfs_fop_readdir,
1419 .release = kernfs_dir_fop_release,
1420 .llseek = kernfs_dir_fop_llseek,
fd7b9f7b 1421};