Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    1) // SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    3)  * fs/dcache.c
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    4)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    5)  * Complete reimplementation
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    6)  * (C) 1997 Thomas Schoebel-Theuer,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    7)  * with heavy changes by Linus Torvalds
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    8)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    9) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   10) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   11)  * Notes on the allocation strategy:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   12)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   13)  * The dcache is a master of the icache - whenever a dcache entry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   14)  * exists, the inode will always exist. "iput()" is done either when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   15)  * the dcache entry is deleted or garbage collected.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   16)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   17) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   18) #include <linux/ratelimit.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   19) #include <linux/string.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   20) #include <linux/mm.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   21) #include <linux/fs.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   22) #include <linux/fscrypt.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   23) #include <linux/fsnotify.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   24) #include <linux/slab.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   25) #include <linux/init.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   26) #include <linux/hash.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   27) #include <linux/cache.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   28) #include <linux/export.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   29) #include <linux/security.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   30) #include <linux/seqlock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   31) #include <linux/memblock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   32) #include <linux/bit_spinlock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   33) #include <linux/rculist_bl.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   34) #include <linux/list_lru.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   35) #include "internal.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   36) #include "mount.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   37) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   38) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   39)  * Usage:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   40)  * dcache->d_inode->i_lock protects:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   41)  *   - i_dentry, d_u.d_alias, d_inode of aliases
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   42)  * dcache_hash_bucket lock protects:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   43)  *   - the dcache hash table
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   44)  * s_roots bl list spinlock protects:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   45)  *   - the s_roots list (see __d_drop)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   46)  * dentry->d_sb->s_dentry_lru_lock protects:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   47)  *   - the dcache lru lists and counters
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   48)  * d_lock protects:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   49)  *   - d_flags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   50)  *   - d_name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   51)  *   - d_lru
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   52)  *   - d_count
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   53)  *   - d_unhashed()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   54)  *   - d_parent and d_subdirs
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   55)  *   - childrens' d_child and d_parent
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   56)  *   - d_u.d_alias, d_inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   57)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   58)  * Ordering:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   59)  * dentry->d_inode->i_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   60)  *   dentry->d_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   61)  *     dentry->d_sb->s_dentry_lru_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   62)  *     dcache_hash_bucket lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   63)  *     s_roots lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   64)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   65)  * If there is an ancestor relationship:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   66)  * dentry->d_parent->...->d_parent->d_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   67)  *   ...
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   68)  *     dentry->d_parent->d_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   69)  *       dentry->d_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   70)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   71)  * If no ancestor relationship:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   72)  * arbitrary, since it's serialized on rename_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   73)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   74) int sysctl_vfs_cache_pressure __read_mostly = 100;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   75) EXPORT_SYMBOL_GPL(sysctl_vfs_cache_pressure);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   76) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   77) __cacheline_aligned_in_smp DEFINE_SEQLOCK(rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   78) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   79) EXPORT_SYMBOL(rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   80) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   81) static struct kmem_cache *dentry_cache __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   82) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   83) const struct qstr empty_name = QSTR_INIT("", 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   84) EXPORT_SYMBOL(empty_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   85) const struct qstr slash_name = QSTR_INIT("/", 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   86) EXPORT_SYMBOL(slash_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   87) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   88) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   89)  * This is the single most critical data structure when it comes
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   90)  * to the dcache: the hashtable for lookups. Somebody should try
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   91)  * to make this good - I've just made it work.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   92)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   93)  * This hash-function tries to avoid losing too many bits of hash
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   94)  * information, yet avoid using a prime hash-size or similar.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   95)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   96) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   97) static unsigned int d_hash_shift __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   98) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   99) static struct hlist_bl_head *dentry_hashtable __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  100) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  101) static inline struct hlist_bl_head *d_hash(unsigned int hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  102) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  103) 	return dentry_hashtable + (hash >> d_hash_shift);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  104) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  105) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  106) #define IN_LOOKUP_SHIFT 10
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  107) static struct hlist_bl_head in_lookup_hashtable[1 << IN_LOOKUP_SHIFT];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  108) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  109) static inline struct hlist_bl_head *in_lookup_hash(const struct dentry *parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  110) 					unsigned int hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  111) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  112) 	hash += (unsigned long) parent / L1_CACHE_BYTES;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  113) 	return in_lookup_hashtable + hash_32(hash, IN_LOOKUP_SHIFT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  114) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  115) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  116) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  117) /* Statistics gathering. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  118) struct dentry_stat_t dentry_stat = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  119) 	.age_limit = 45,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  120) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  121) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  122) static DEFINE_PER_CPU(long, nr_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  123) static DEFINE_PER_CPU(long, nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  124) static DEFINE_PER_CPU(long, nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  125) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  126) #if defined(CONFIG_SYSCTL) && defined(CONFIG_PROC_FS)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  127) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  128) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  129)  * Here we resort to our own counters instead of using generic per-cpu counters
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  130)  * for consistency with what the vfs inode code does. We are expected to harvest
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  131)  * better code and performance by having our own specialized counters.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  132)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  133)  * Please note that the loop is done over all possible CPUs, not over all online
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  134)  * CPUs. The reason for this is that we don't want to play games with CPUs going
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  135)  * on and off. If one of them goes off, we will just keep their counters.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  136)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  137)  * glommer: See cffbc8a for details, and if you ever intend to change this,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  138)  * please update all vfs counters to match.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  139)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  140) static long get_nr_dentry(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  141) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  142) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  143) 	long sum = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  144) 	for_each_possible_cpu(i)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  145) 		sum += per_cpu(nr_dentry, i);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  146) 	return sum < 0 ? 0 : sum;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  147) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  148) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  149) static long get_nr_dentry_unused(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  150) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  151) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  152) 	long sum = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  153) 	for_each_possible_cpu(i)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  154) 		sum += per_cpu(nr_dentry_unused, i);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  155) 	return sum < 0 ? 0 : sum;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  156) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  157) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  158) static long get_nr_dentry_negative(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  159) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  160) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  161) 	long sum = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  162) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  163) 	for_each_possible_cpu(i)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  164) 		sum += per_cpu(nr_dentry_negative, i);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  165) 	return sum < 0 ? 0 : sum;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  166) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  167) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  168) int proc_nr_dentry(struct ctl_table *table, int write, void *buffer,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  169) 		   size_t *lenp, loff_t *ppos)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  170) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  171) 	dentry_stat.nr_dentry = get_nr_dentry();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  172) 	dentry_stat.nr_unused = get_nr_dentry_unused();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  173) 	dentry_stat.nr_negative = get_nr_dentry_negative();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  174) 	return proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  175) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  176) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  177) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  178) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  179)  * Compare 2 name strings, return 0 if they match, otherwise non-zero.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  180)  * The strings are both count bytes long, and count is non-zero.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  181)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  182) #ifdef CONFIG_DCACHE_WORD_ACCESS
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  183) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  184) #include <asm/word-at-a-time.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  185) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  186)  * NOTE! 'cs' and 'scount' come from a dentry, so it has a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  187)  * aligned allocation for this particular component. We don't
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  188)  * strictly need the load_unaligned_zeropad() safety, but it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  189)  * doesn't hurt either.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  190)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  191)  * In contrast, 'ct' and 'tcount' can be from a pathname, and do
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  192)  * need the careful unaligned handling.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  193)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  194) static inline int dentry_string_cmp(const unsigned char *cs, const unsigned char *ct, unsigned tcount)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  195) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  196) 	unsigned long a,b,mask;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  197) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  198) 	for (;;) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  199) 		a = read_word_at_a_time(cs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  200) 		b = load_unaligned_zeropad(ct);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  201) 		if (tcount < sizeof(unsigned long))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  202) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  203) 		if (unlikely(a != b))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  204) 			return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  205) 		cs += sizeof(unsigned long);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  206) 		ct += sizeof(unsigned long);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  207) 		tcount -= sizeof(unsigned long);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  208) 		if (!tcount)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  209) 			return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  210) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  211) 	mask = bytemask_from_count(tcount);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  212) 	return unlikely(!!((a ^ b) & mask));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  213) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  214) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  215) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  216) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  217) static inline int dentry_string_cmp(const unsigned char *cs, const unsigned char *ct, unsigned tcount)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  218) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  219) 	do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  220) 		if (*cs != *ct)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  221) 			return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  222) 		cs++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  223) 		ct++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  224) 		tcount--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  225) 	} while (tcount);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  226) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  227) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  228) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  229) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  230) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  231) static inline int dentry_cmp(const struct dentry *dentry, const unsigned char *ct, unsigned tcount)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  232) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  233) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  234) 	 * Be careful about RCU walk racing with rename:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  235) 	 * use 'READ_ONCE' to fetch the name pointer.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  236) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  237) 	 * NOTE! Even if a rename will mean that the length
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  238) 	 * was not loaded atomically, we don't care. The
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  239) 	 * RCU walk will check the sequence count eventually,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  240) 	 * and catch it. And we won't overrun the buffer,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  241) 	 * because we're reading the name pointer atomically,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  242) 	 * and a dentry name is guaranteed to be properly
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  243) 	 * terminated with a NUL byte.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  244) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  245) 	 * End result: even if 'len' is wrong, we'll exit
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  246) 	 * early because the data cannot match (there can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  247) 	 * be no NUL in the ct/tcount data)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  248) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  249) 	const unsigned char *cs = READ_ONCE(dentry->d_name.name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  250) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  251) 	return dentry_string_cmp(cs, ct, tcount);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  252) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  253) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  254) struct external_name {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  255) 	union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  256) 		atomic_t count;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  257) 		struct rcu_head head;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  258) 	} u;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  259) 	unsigned char name[];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  260) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  261) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  262) static inline struct external_name *external_name(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  263) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  264) 	return container_of(dentry->d_name.name, struct external_name, name[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  265) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  266) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  267) static void __d_free(struct rcu_head *head)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  268) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  269) 	struct dentry *dentry = container_of(head, struct dentry, d_u.d_rcu);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  270) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  271) 	kmem_cache_free(dentry_cache, dentry); 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  272) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  273) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  274) static void __d_free_external(struct rcu_head *head)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  275) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  276) 	struct dentry *dentry = container_of(head, struct dentry, d_u.d_rcu);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  277) 	kfree(external_name(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  278) 	kmem_cache_free(dentry_cache, dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  279) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  280) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  281) static inline int dname_external(const struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  282) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  283) 	return dentry->d_name.name != dentry->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  284) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  285) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  286) void take_dentry_name_snapshot(struct name_snapshot *name, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  287) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  288) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  289) 	name->name = dentry->d_name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  290) 	if (unlikely(dname_external(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  291) 		atomic_inc(&external_name(dentry)->u.count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  292) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  293) 		memcpy(name->inline_name, dentry->d_iname,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  294) 		       dentry->d_name.len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  295) 		name->name.name = name->inline_name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  296) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  297) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  298) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  299) EXPORT_SYMBOL(take_dentry_name_snapshot);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  300) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  301) void release_dentry_name_snapshot(struct name_snapshot *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  302) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  303) 	if (unlikely(name->name.name != name->inline_name)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  304) 		struct external_name *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  305) 		p = container_of(name->name.name, struct external_name, name[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  306) 		if (unlikely(atomic_dec_and_test(&p->u.count)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  307) 			kfree_rcu(p, u.head);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  308) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  309) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  310) EXPORT_SYMBOL(release_dentry_name_snapshot);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  311) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  312) static inline void __d_set_inode_and_type(struct dentry *dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  313) 					  struct inode *inode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  314) 					  unsigned type_flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  315) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  316) 	unsigned flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  317) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  318) 	dentry->d_inode = inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  319) 	flags = READ_ONCE(dentry->d_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  320) 	flags &= ~(DCACHE_ENTRY_TYPE | DCACHE_FALLTHRU);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  321) 	flags |= type_flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  322) 	smp_store_release(&dentry->d_flags, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  323) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  324) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  325) static inline void __d_clear_type_and_inode(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  326) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  327) 	unsigned flags = READ_ONCE(dentry->d_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  328) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  329) 	flags &= ~(DCACHE_ENTRY_TYPE | DCACHE_FALLTHRU);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  330) 	WRITE_ONCE(dentry->d_flags, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  331) 	dentry->d_inode = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  332) 	if (dentry->d_flags & DCACHE_LRU_LIST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  333) 		this_cpu_inc(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  334) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  335) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  336) static void dentry_free(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  337) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  338) 	WARN_ON(!hlist_unhashed(&dentry->d_u.d_alias));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  339) 	if (unlikely(dname_external(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  340) 		struct external_name *p = external_name(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  341) 		if (likely(atomic_dec_and_test(&p->u.count))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  342) 			call_rcu(&dentry->d_u.d_rcu, __d_free_external);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  343) 			return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  344) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  345) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  346) 	/* if dentry was never visible to RCU, immediate free is OK */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  347) 	if (dentry->d_flags & DCACHE_NORCU)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  348) 		__d_free(&dentry->d_u.d_rcu);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  349) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  350) 		call_rcu(&dentry->d_u.d_rcu, __d_free);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  351) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  352) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  353) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  354)  * Release the dentry's inode, using the filesystem
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  355)  * d_iput() operation if defined.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  356)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  357) static void dentry_unlink_inode(struct dentry * dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  358) 	__releases(dentry->d_lock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  359) 	__releases(dentry->d_inode->i_lock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  360) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  361) 	struct inode *inode = dentry->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  362) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  363) 	raw_write_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  364) 	__d_clear_type_and_inode(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  365) 	hlist_del_init(&dentry->d_u.d_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  366) 	raw_write_seqcount_end(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  367) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  368) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  369) 	if (!inode->i_nlink)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  370) 		fsnotify_inoderemove(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  371) 	if (dentry->d_op && dentry->d_op->d_iput)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  372) 		dentry->d_op->d_iput(dentry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  373) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  374) 		iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  375) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  376) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  377) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  378)  * The DCACHE_LRU_LIST bit is set whenever the 'd_lru' entry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  379)  * is in use - which includes both the "real" per-superblock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  380)  * LRU list _and_ the DCACHE_SHRINK_LIST use.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  381)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  382)  * The DCACHE_SHRINK_LIST bit is set whenever the dentry is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  383)  * on the shrink list (ie not on the superblock LRU list).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  384)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  385)  * The per-cpu "nr_dentry_unused" counters are updated with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  386)  * the DCACHE_LRU_LIST bit.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  387)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  388)  * The per-cpu "nr_dentry_negative" counters are only updated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  389)  * when deleted from or added to the per-superblock LRU list, not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  390)  * from/to the shrink list. That is to avoid an unneeded dec/inc
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  391)  * pair when moving from LRU to shrink list in select_collect().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  392)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  393)  * These helper functions make sure we always follow the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  394)  * rules. d_lock must be held by the caller.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  395)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  396) #define D_FLAG_VERIFY(dentry,x) WARN_ON_ONCE(((dentry)->d_flags & (DCACHE_LRU_LIST | DCACHE_SHRINK_LIST)) != (x))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  397) static void d_lru_add(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  398) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  399) 	D_FLAG_VERIFY(dentry, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  400) 	dentry->d_flags |= DCACHE_LRU_LIST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  401) 	this_cpu_inc(nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  402) 	if (d_is_negative(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  403) 		this_cpu_inc(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  404) 	WARN_ON_ONCE(!list_lru_add(&dentry->d_sb->s_dentry_lru, &dentry->d_lru));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  405) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  406) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  407) static void d_lru_del(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  408) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  409) 	D_FLAG_VERIFY(dentry, DCACHE_LRU_LIST);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  410) 	dentry->d_flags &= ~DCACHE_LRU_LIST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  411) 	this_cpu_dec(nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  412) 	if (d_is_negative(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  413) 		this_cpu_dec(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  414) 	WARN_ON_ONCE(!list_lru_del(&dentry->d_sb->s_dentry_lru, &dentry->d_lru));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  415) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  416) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  417) static void d_shrink_del(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  418) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  419) 	D_FLAG_VERIFY(dentry, DCACHE_SHRINK_LIST | DCACHE_LRU_LIST);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  420) 	list_del_init(&dentry->d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  421) 	dentry->d_flags &= ~(DCACHE_SHRINK_LIST | DCACHE_LRU_LIST);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  422) 	this_cpu_dec(nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  423) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  424) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  425) static void d_shrink_add(struct dentry *dentry, struct list_head *list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  426) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  427) 	D_FLAG_VERIFY(dentry, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  428) 	list_add(&dentry->d_lru, list);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  429) 	dentry->d_flags |= DCACHE_SHRINK_LIST | DCACHE_LRU_LIST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  430) 	this_cpu_inc(nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  431) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  432) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  433) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  434)  * These can only be called under the global LRU lock, ie during the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  435)  * callback for freeing the LRU list. "isolate" removes it from the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  436)  * LRU lists entirely, while shrink_move moves it to the indicated
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  437)  * private list.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  438)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  439) static void d_lru_isolate(struct list_lru_one *lru, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  440) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  441) 	D_FLAG_VERIFY(dentry, DCACHE_LRU_LIST);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  442) 	dentry->d_flags &= ~DCACHE_LRU_LIST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  443) 	this_cpu_dec(nr_dentry_unused);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  444) 	if (d_is_negative(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  445) 		this_cpu_dec(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  446) 	list_lru_isolate(lru, &dentry->d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  447) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  448) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  449) static void d_lru_shrink_move(struct list_lru_one *lru, struct dentry *dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  450) 			      struct list_head *list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  451) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  452) 	D_FLAG_VERIFY(dentry, DCACHE_LRU_LIST);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  453) 	dentry->d_flags |= DCACHE_SHRINK_LIST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  454) 	if (d_is_negative(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  455) 		this_cpu_dec(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  456) 	list_lru_isolate_move(lru, &dentry->d_lru, list);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  457) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  458) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  459) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  460)  * d_drop - drop a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  461)  * @dentry: dentry to drop
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  462)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  463)  * d_drop() unhashes the entry from the parent dentry hashes, so that it won't
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  464)  * be found through a VFS lookup any more. Note that this is different from
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  465)  * deleting the dentry - d_delete will try to mark the dentry negative if
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  466)  * possible, giving a successful _negative_ lookup, while d_drop will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  467)  * just make the cache lookup fail.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  468)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  469)  * d_drop() is used mainly for stuff that wants to invalidate a dentry for some
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  470)  * reason (NFS timeouts or autofs deletes).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  471)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  472)  * __d_drop requires dentry->d_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  473)  * ___d_drop doesn't mark dentry as "unhashed"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  474)  *   (dentry->d_hash.pprev will be LIST_POISON2, not NULL).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  475)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  476) static void ___d_drop(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  477) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  478) 	struct hlist_bl_head *b;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  479) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  480) 	 * Hashed dentries are normally on the dentry hashtable,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  481) 	 * with the exception of those newly allocated by
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  482) 	 * d_obtain_root, which are always IS_ROOT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  483) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  484) 	if (unlikely(IS_ROOT(dentry)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  485) 		b = &dentry->d_sb->s_roots;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  486) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  487) 		b = d_hash(dentry->d_name.hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  488) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  489) 	hlist_bl_lock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  490) 	__hlist_bl_del(&dentry->d_hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  491) 	hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  492) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  493) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  494) void __d_drop(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  495) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  496) 	if (!d_unhashed(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  497) 		___d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  498) 		dentry->d_hash.pprev = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  499) 		write_seqcount_invalidate(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  500) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  501) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  502) EXPORT_SYMBOL(__d_drop);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  503) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  504) void d_drop(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  505) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  506) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  507) 	__d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  508) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  509) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  510) EXPORT_SYMBOL(d_drop);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  511) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  512) static inline void dentry_unlist(struct dentry *dentry, struct dentry *parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  513) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  514) 	struct dentry *next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  515) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  516) 	 * Inform d_walk() and shrink_dentry_list() that we are no longer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  517) 	 * attached to the dentry tree
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  518) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  519) 	dentry->d_flags |= DCACHE_DENTRY_KILLED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  520) 	if (unlikely(list_empty(&dentry->d_child)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  521) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  522) 	__list_del_entry(&dentry->d_child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  523) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  524) 	 * Cursors can move around the list of children.  While we'd been
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  525) 	 * a normal list member, it didn't matter - ->d_child.next would've
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  526) 	 * been updated.  However, from now on it won't be and for the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  527) 	 * things like d_walk() it might end up with a nasty surprise.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  528) 	 * Normally d_walk() doesn't care about cursors moving around -
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  529) 	 * ->d_lock on parent prevents that and since a cursor has no children
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  530) 	 * of its own, we get through it without ever unlocking the parent.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  531) 	 * There is one exception, though - if we ascend from a child that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  532) 	 * gets killed as soon as we unlock it, the next sibling is found
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  533) 	 * using the value left in its ->d_child.next.  And if _that_
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  534) 	 * pointed to a cursor, and cursor got moved (e.g. by lseek())
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  535) 	 * before d_walk() regains parent->d_lock, we'll end up skipping
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  536) 	 * everything the cursor had been moved past.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  537) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  538) 	 * Solution: make sure that the pointer left behind in ->d_child.next
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  539) 	 * points to something that won't be moving around.  I.e. skip the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  540) 	 * cursors.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  541) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  542) 	while (dentry->d_child.next != &parent->d_subdirs) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  543) 		next = list_entry(dentry->d_child.next, struct dentry, d_child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  544) 		if (likely(!(next->d_flags & DCACHE_DENTRY_CURSOR)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  545) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  546) 		dentry->d_child.next = next->d_child.next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  547) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  548) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  549) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  550) static void __dentry_kill(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  551) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  552) 	struct dentry *parent = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  553) 	bool can_free = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  554) 	if (!IS_ROOT(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  555) 		parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  556) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  557) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  558) 	 * The dentry is now unrecoverably dead to the world.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  559) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  560) 	lockref_mark_dead(&dentry->d_lockref);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  561) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  562) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  563) 	 * inform the fs via d_prune that this dentry is about to be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  564) 	 * unhashed and destroyed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  565) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  566) 	if (dentry->d_flags & DCACHE_OP_PRUNE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  567) 		dentry->d_op->d_prune(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  568) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  569) 	if (dentry->d_flags & DCACHE_LRU_LIST) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  570) 		if (!(dentry->d_flags & DCACHE_SHRINK_LIST))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  571) 			d_lru_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  572) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  573) 	/* if it was on the hash then remove it */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  574) 	__d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  575) 	dentry_unlist(dentry, parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  576) 	if (parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  577) 		spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  578) 	if (dentry->d_inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  579) 		dentry_unlink_inode(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  580) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  581) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  582) 	this_cpu_dec(nr_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  583) 	if (dentry->d_op && dentry->d_op->d_release)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  584) 		dentry->d_op->d_release(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  585) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  586) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  587) 	if (dentry->d_flags & DCACHE_SHRINK_LIST) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  588) 		dentry->d_flags |= DCACHE_MAY_FREE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  589) 		can_free = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  590) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  591) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  592) 	if (likely(can_free))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  593) 		dentry_free(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  594) 	cond_resched();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  595) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  596) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  597) static struct dentry *__lock_parent(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  598) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  599) 	struct dentry *parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  600) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  601) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  602) again:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  603) 	parent = READ_ONCE(dentry->d_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  604) 	spin_lock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  605) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  606) 	 * We can't blindly lock dentry until we are sure
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  607) 	 * that we won't violate the locking order.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  608) 	 * Any changes of dentry->d_parent must have
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  609) 	 * been done with parent->d_lock held, so
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  610) 	 * spin_lock() above is enough of a barrier
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  611) 	 * for checking if it's still our child.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  612) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  613) 	if (unlikely(parent != dentry->d_parent)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  614) 		spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  615) 		goto again;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  616) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  617) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  618) 	if (parent != dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  619) 		spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  620) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  621) 		parent = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  622) 	return parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  623) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  624) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  625) static inline struct dentry *lock_parent(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  626) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  627) 	struct dentry *parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  628) 	if (IS_ROOT(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  629) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  630) 	if (likely(spin_trylock(&parent->d_lock)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  631) 		return parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  632) 	return __lock_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  633) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  634) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  635) static inline bool retain_dentry(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  636) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  637) 	WARN_ON(d_in_lookup(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  638) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  639) 	/* Unreachable? Get rid of it */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  640) 	if (unlikely(d_unhashed(dentry)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  641) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  642) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  643) 	if (unlikely(dentry->d_flags & DCACHE_DISCONNECTED))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  644) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  645) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  646) 	if (unlikely(dentry->d_flags & DCACHE_OP_DELETE)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  647) 		if (dentry->d_op->d_delete(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  648) 			return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  649) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  650) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  651) 	if (unlikely(dentry->d_flags & DCACHE_DONTCACHE))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  652) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  653) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  654) 	/* retain; LRU fodder */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  655) 	dentry->d_lockref.count--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  656) 	if (unlikely(!(dentry->d_flags & DCACHE_LRU_LIST)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  657) 		d_lru_add(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  658) 	else if (unlikely(!(dentry->d_flags & DCACHE_REFERENCED)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  659) 		dentry->d_flags |= DCACHE_REFERENCED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  660) 	return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  661) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  662) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  663) void d_mark_dontcache(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  664) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  665) 	struct dentry *de;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  666) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  667) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  668) 	hlist_for_each_entry(de, &inode->i_dentry, d_u.d_alias) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  669) 		spin_lock(&de->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  670) 		de->d_flags |= DCACHE_DONTCACHE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  671) 		spin_unlock(&de->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  672) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  673) 	inode->i_state |= I_DONTCACHE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  674) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  675) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  676) EXPORT_SYMBOL(d_mark_dontcache);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  677) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  678) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  679)  * Finish off a dentry we've decided to kill.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  680)  * dentry->d_lock must be held, returns with it unlocked.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  681)  * Returns dentry requiring refcount drop, or NULL if we're done.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  682)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  683) static struct dentry *dentry_kill(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  684) 	__releases(dentry->d_lock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  685) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  686) 	struct inode *inode = dentry->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  687) 	struct dentry *parent = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  688) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  689) 	if (inode && unlikely(!spin_trylock(&inode->i_lock)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  690) 		goto slow_positive;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  691) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  692) 	if (!IS_ROOT(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  693) 		parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  694) 		if (unlikely(!spin_trylock(&parent->d_lock))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  695) 			parent = __lock_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  696) 			if (likely(inode || !dentry->d_inode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  697) 				goto got_locks;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  698) 			/* negative that became positive */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  699) 			if (parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  700) 				spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  701) 			inode = dentry->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  702) 			goto slow_positive;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  703) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  704) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  705) 	__dentry_kill(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  706) 	return parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  707) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  708) slow_positive:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  709) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  710) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  711) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  712) 	parent = lock_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  713) got_locks:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  714) 	if (unlikely(dentry->d_lockref.count != 1)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  715) 		dentry->d_lockref.count--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  716) 	} else if (likely(!retain_dentry(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  717) 		__dentry_kill(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  718) 		return parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  719) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  720) 	/* we are keeping it, after all */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  721) 	if (inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  722) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  723) 	if (parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  724) 		spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  725) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  726) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  727) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  728) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  729) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  730)  * Try to do a lockless dput(), and return whether that was successful.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  731)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  732)  * If unsuccessful, we return false, having already taken the dentry lock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  733)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  734)  * The caller needs to hold the RCU read lock, so that the dentry is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  735)  * guaranteed to stay around even if the refcount goes down to zero!
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  736)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  737) static inline bool fast_dput(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  738) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  739) 	int ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  740) 	unsigned int d_flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  741) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  742) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  743) 	 * If we have a d_op->d_delete() operation, we sould not
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  744) 	 * let the dentry count go to zero, so use "put_or_lock".
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  745) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  746) 	if (unlikely(dentry->d_flags & DCACHE_OP_DELETE))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  747) 		return lockref_put_or_lock(&dentry->d_lockref);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  748) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  749) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  750) 	 * .. otherwise, we can try to just decrement the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  751) 	 * lockref optimistically.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  752) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  753) 	ret = lockref_put_return(&dentry->d_lockref);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  754) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  755) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  756) 	 * If the lockref_put_return() failed due to the lock being held
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  757) 	 * by somebody else, the fast path has failed. We will need to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  758) 	 * get the lock, and then check the count again.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  759) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  760) 	if (unlikely(ret < 0)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  761) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  762) 		if (dentry->d_lockref.count > 1) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  763) 			dentry->d_lockref.count--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  764) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  765) 			return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  766) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  767) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  768) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  769) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  770) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  771) 	 * If we weren't the last ref, we're done.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  772) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  773) 	if (ret)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  774) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  775) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  776) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  777) 	 * Careful, careful. The reference count went down
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  778) 	 * to zero, but we don't hold the dentry lock, so
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  779) 	 * somebody else could get it again, and do another
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  780) 	 * dput(), and we need to not race with that.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  781) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  782) 	 * However, there is a very special and common case
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  783) 	 * where we don't care, because there is nothing to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  784) 	 * do: the dentry is still hashed, it does not have
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  785) 	 * a 'delete' op, and it's referenced and already on
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  786) 	 * the LRU list.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  787) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  788) 	 * NOTE! Since we aren't locked, these values are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  789) 	 * not "stable". However, it is sufficient that at
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  790) 	 * some point after we dropped the reference the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  791) 	 * dentry was hashed and the flags had the proper
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  792) 	 * value. Other dentry users may have re-gotten
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  793) 	 * a reference to the dentry and change that, but
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  794) 	 * our work is done - we can leave the dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  795) 	 * around with a zero refcount.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  796) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  797) 	smp_rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  798) 	d_flags = READ_ONCE(dentry->d_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  799) 	d_flags &= DCACHE_REFERENCED | DCACHE_LRU_LIST | DCACHE_DISCONNECTED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  800) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  801) 	/* Nothing to do? Dropping the reference was all we needed? */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  802) 	if (d_flags == (DCACHE_REFERENCED | DCACHE_LRU_LIST) && !d_unhashed(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  803) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  804) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  805) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  806) 	 * Not the fast normal case? Get the lock. We've already decremented
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  807) 	 * the refcount, but we'll need to re-check the situation after
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  808) 	 * getting the lock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  809) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  810) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  811) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  812) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  813) 	 * Did somebody else grab a reference to it in the meantime, and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  814) 	 * we're no longer the last user after all? Alternatively, somebody
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  815) 	 * else could have killed it and marked it dead. Either way, we
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  816) 	 * don't need to do anything else.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  817) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  818) 	if (dentry->d_lockref.count) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  819) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  820) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  821) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  822) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  823) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  824) 	 * Re-get the reference we optimistically dropped. We hold the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  825) 	 * lock, and we just tested that it was zero, so we can just
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  826) 	 * set it to 1.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  827) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  828) 	dentry->d_lockref.count = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  829) 	return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  830) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  831) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  832) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  833) /* 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  834)  * This is dput
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  835)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  836)  * This is complicated by the fact that we do not want to put
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  837)  * dentries that are no longer on any hash chain on the unused
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  838)  * list: we'd much rather just get rid of them immediately.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  839)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  840)  * However, that implies that we have to traverse the dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  841)  * tree upwards to the parents which might _also_ now be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  842)  * scheduled for deletion (it may have been only waiting for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  843)  * its last child to go away).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  844)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  845)  * This tail recursion is done by hand as we don't want to depend
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  846)  * on the compiler to always get this right (gcc generally doesn't).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  847)  * Real recursion would eat up our stack space.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  848)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  849) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  850) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  851)  * dput - release a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  852)  * @dentry: dentry to release 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  853)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  854)  * Release a dentry. This will drop the usage count and if appropriate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  855)  * call the dentry unlink method as well as removing it from the queues and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  856)  * releasing its resources. If the parent dentries were scheduled for release
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  857)  * they too may now get deleted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  858)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  859) void dput(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  860) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  861) 	while (dentry) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  862) 		might_sleep();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  863) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  864) 		rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  865) 		if (likely(fast_dput(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  866) 			rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  867) 			return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  868) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  869) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  870) 		/* Slow case: now with the dentry lock held */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  871) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  872) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  873) 		if (likely(retain_dentry(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  874) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  875) 			return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  876) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  877) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  878) 		dentry = dentry_kill(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  879) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  880) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  881) EXPORT_SYMBOL(dput);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  882) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  883) static void __dput_to_list(struct dentry *dentry, struct list_head *list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  884) __must_hold(&dentry->d_lock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  885) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  886) 	if (dentry->d_flags & DCACHE_SHRINK_LIST) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  887) 		/* let the owner of the list it's on deal with it */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  888) 		--dentry->d_lockref.count;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  889) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  890) 		if (dentry->d_flags & DCACHE_LRU_LIST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  891) 			d_lru_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  892) 		if (!--dentry->d_lockref.count)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  893) 			d_shrink_add(dentry, list);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  894) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  895) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  896) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  897) void dput_to_list(struct dentry *dentry, struct list_head *list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  898) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  899) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  900) 	if (likely(fast_dput(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  901) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  902) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  903) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  904) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  905) 	if (!retain_dentry(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  906) 		__dput_to_list(dentry, list);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  907) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  908) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  909) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  910) /* This must be called with d_lock held */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  911) static inline void __dget_dlock(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  912) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  913) 	dentry->d_lockref.count++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  914) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  915) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  916) static inline void __dget(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  917) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  918) 	lockref_get(&dentry->d_lockref);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  919) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  920) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  921) struct dentry *dget_parent(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  922) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  923) 	int gotref;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  924) 	struct dentry *ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  925) 	unsigned seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  926) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  927) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  928) 	 * Do optimistic parent lookup without any
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  929) 	 * locking.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  930) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  931) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  932) 	seq = raw_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  933) 	ret = READ_ONCE(dentry->d_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  934) 	gotref = lockref_get_not_zero(&ret->d_lockref);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  935) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  936) 	if (likely(gotref)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  937) 		if (!read_seqcount_retry(&dentry->d_seq, seq))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  938) 			return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  939) 		dput(ret);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  940) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  941) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  942) repeat:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  943) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  944) 	 * Don't need rcu_dereference because we re-check it was correct under
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  945) 	 * the lock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  946) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  947) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  948) 	ret = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  949) 	spin_lock(&ret->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  950) 	if (unlikely(ret != dentry->d_parent)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  951) 		spin_unlock(&ret->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  952) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  953) 		goto repeat;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  954) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  955) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  956) 	BUG_ON(!ret->d_lockref.count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  957) 	ret->d_lockref.count++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  958) 	spin_unlock(&ret->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  959) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  960) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  961) EXPORT_SYMBOL(dget_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  962) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  963) static struct dentry * __d_find_any_alias(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  964) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  965) 	struct dentry *alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  966) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  967) 	if (hlist_empty(&inode->i_dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  968) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  969) 	alias = hlist_entry(inode->i_dentry.first, struct dentry, d_u.d_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  970) 	__dget(alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  971) 	return alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  972) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  973) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  974) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  975)  * d_find_any_alias - find any alias for a given inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  976)  * @inode: inode to find an alias for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  977)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  978)  * If any aliases exist for the given inode, take and return a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  979)  * reference for one of them.  If no aliases exist, return %NULL.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  980)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  981) struct dentry *d_find_any_alias(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  982) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  983) 	struct dentry *de;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  984) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  985) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  986) 	de = __d_find_any_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  987) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  988) 	return de;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  989) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  990) EXPORT_SYMBOL(d_find_any_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  991) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  992) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  993)  * d_find_alias - grab a hashed alias of inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  994)  * @inode: inode in question
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  995)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  996)  * If inode has a hashed alias, or is a directory and has any alias,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  997)  * acquire the reference to alias and return it. Otherwise return NULL.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  998)  * Notice that if inode is a directory there can be only one alias and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  999)  * it can be unhashed only if it has no children, or if it is the root
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1000)  * of a filesystem, or if the directory was renamed and d_revalidate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1001)  * was the first vfs operation to notice.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1002)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1003)  * If the inode has an IS_ROOT, DCACHE_DISCONNECTED alias, then prefer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1004)  * any other hashed alias over that one.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1005)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1006) static struct dentry *__d_find_alias(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1007) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1008) 	struct dentry *alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1009) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1010) 	if (S_ISDIR(inode->i_mode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1011) 		return __d_find_any_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1012) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1013) 	hlist_for_each_entry(alias, &inode->i_dentry, d_u.d_alias) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1014) 		spin_lock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1015)  		if (!d_unhashed(alias)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1016) 			__dget_dlock(alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1017) 			spin_unlock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1018) 			return alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1019) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1020) 		spin_unlock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1021) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1022) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1023) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1024) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1025) struct dentry *d_find_alias(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1026) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1027) 	struct dentry *de = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1028) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1029) 	if (!hlist_empty(&inode->i_dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1030) 		spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1031) 		de = __d_find_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1032) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1033) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1034) 	return de;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1035) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1036) EXPORT_SYMBOL(d_find_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1037) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1038) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1039)  *	Try to kill dentries associated with this inode.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1040)  * WARNING: you must own a reference to inode.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1041)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1042) void d_prune_aliases(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1043) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1044) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1045) restart:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1046) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1047) 	hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1048) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1049) 		if (!dentry->d_lockref.count) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1050) 			struct dentry *parent = lock_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1051) 			if (likely(!dentry->d_lockref.count)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1052) 				__dentry_kill(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1053) 				dput(parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1054) 				goto restart;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1055) 			}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1056) 			if (parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1057) 				spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1058) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1059) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1060) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1061) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1062) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1063) EXPORT_SYMBOL(d_prune_aliases);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1064) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1065) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1066)  * Lock a dentry from shrink list.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1067)  * Called under rcu_read_lock() and dentry->d_lock; the former
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1068)  * guarantees that nothing we access will be freed under us.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1069)  * Note that dentry is *not* protected from concurrent dentry_kill(),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1070)  * d_delete(), etc.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1071)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1072)  * Return false if dentry has been disrupted or grabbed, leaving
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1073)  * the caller to kick it off-list.  Otherwise, return true and have
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1074)  * that dentry's inode and parent both locked.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1075)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1076) static bool shrink_lock_dentry(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1077) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1078) 	struct inode *inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1079) 	struct dentry *parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1080) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1081) 	if (dentry->d_lockref.count)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1082) 		return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1083) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1084) 	inode = dentry->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1085) 	if (inode && unlikely(!spin_trylock(&inode->i_lock))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1086) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1087) 		spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1088) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1089) 		if (unlikely(dentry->d_lockref.count))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1090) 			goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1091) 		/* changed inode means that somebody had grabbed it */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1092) 		if (unlikely(inode != dentry->d_inode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1093) 			goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1094) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1095) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1096) 	parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1097) 	if (IS_ROOT(dentry) || likely(spin_trylock(&parent->d_lock)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1098) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1099) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1100) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1101) 	spin_lock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1102) 	if (unlikely(parent != dentry->d_parent)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1103) 		spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1104) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1105) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1106) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1107) 	spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1108) 	if (likely(!dentry->d_lockref.count))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1109) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1110) 	spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1111) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1112) 	if (inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1113) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1114) 	return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1115) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1116) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1117) void shrink_dentry_list(struct list_head *list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1118) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1119) 	while (!list_empty(list)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1120) 		struct dentry *dentry, *parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1121) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1122) 		dentry = list_entry(list->prev, struct dentry, d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1123) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1124) 		rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1125) 		if (!shrink_lock_dentry(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1126) 			bool can_free = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1127) 			rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1128) 			d_shrink_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1129) 			if (dentry->d_lockref.count < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1130) 				can_free = dentry->d_flags & DCACHE_MAY_FREE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1131) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1132) 			if (can_free)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1133) 				dentry_free(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1134) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1135) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1136) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1137) 		d_shrink_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1138) 		parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1139) 		if (parent != dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1140) 			__dput_to_list(parent, list);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1141) 		__dentry_kill(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1142) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1143) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1144) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1145) static enum lru_status dentry_lru_isolate(struct list_head *item,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1146) 		struct list_lru_one *lru, spinlock_t *lru_lock, void *arg)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1147) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1148) 	struct list_head *freeable = arg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1149) 	struct dentry	*dentry = container_of(item, struct dentry, d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1150) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1151) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1152) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1153) 	 * we are inverting the lru lock/dentry->d_lock here,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1154) 	 * so use a trylock. If we fail to get the lock, just skip
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1155) 	 * it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1156) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1157) 	if (!spin_trylock(&dentry->d_lock))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1158) 		return LRU_SKIP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1159) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1160) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1161) 	 * Referenced dentries are still in use. If they have active
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1162) 	 * counts, just remove them from the LRU. Otherwise give them
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1163) 	 * another pass through the LRU.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1164) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1165) 	if (dentry->d_lockref.count) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1166) 		d_lru_isolate(lru, dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1167) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1168) 		return LRU_REMOVED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1169) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1170) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1171) 	if (dentry->d_flags & DCACHE_REFERENCED) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1172) 		dentry->d_flags &= ~DCACHE_REFERENCED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1173) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1174) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1175) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1176) 		 * The list move itself will be made by the common LRU code. At
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1177) 		 * this point, we've dropped the dentry->d_lock but keep the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1178) 		 * lru lock. This is safe to do, since every list movement is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1179) 		 * protected by the lru lock even if both locks are held.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1180) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1181) 		 * This is guaranteed by the fact that all LRU management
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1182) 		 * functions are intermediated by the LRU API calls like
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1183) 		 * list_lru_add and list_lru_del. List movement in this file
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1184) 		 * only ever occur through this functions or through callbacks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1185) 		 * like this one, that are called from the LRU API.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1186) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1187) 		 * The only exceptions to this are functions like
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1188) 		 * shrink_dentry_list, and code that first checks for the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1189) 		 * DCACHE_SHRINK_LIST flag.  Those are guaranteed to be
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1190) 		 * operating only with stack provided lists after they are
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1191) 		 * properly isolated from the main list.  It is thus, always a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1192) 		 * local access.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1193) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1194) 		return LRU_ROTATE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1195) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1196) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1197) 	d_lru_shrink_move(lru, dentry, freeable);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1198) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1199) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1200) 	return LRU_REMOVED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1201) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1202) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1203) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1204)  * prune_dcache_sb - shrink the dcache
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1205)  * @sb: superblock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1206)  * @sc: shrink control, passed to list_lru_shrink_walk()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1207)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1208)  * Attempt to shrink the superblock dcache LRU by @sc->nr_to_scan entries. This
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1209)  * is done when we need more memory and called from the superblock shrinker
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1210)  * function.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1211)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1212)  * This function may fail to free any resources if all the dentries are in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1213)  * use.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1214)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1215) long prune_dcache_sb(struct super_block *sb, struct shrink_control *sc)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1216) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1217) 	LIST_HEAD(dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1218) 	long freed;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1219) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1220) 	freed = list_lru_shrink_walk(&sb->s_dentry_lru, sc,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1221) 				     dentry_lru_isolate, &dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1222) 	shrink_dentry_list(&dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1223) 	return freed;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1224) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1225) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1226) static enum lru_status dentry_lru_isolate_shrink(struct list_head *item,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1227) 		struct list_lru_one *lru, spinlock_t *lru_lock, void *arg)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1228) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1229) 	struct list_head *freeable = arg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1230) 	struct dentry	*dentry = container_of(item, struct dentry, d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1231) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1232) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1233) 	 * we are inverting the lru lock/dentry->d_lock here,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1234) 	 * so use a trylock. If we fail to get the lock, just skip
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1235) 	 * it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1236) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1237) 	if (!spin_trylock(&dentry->d_lock))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1238) 		return LRU_SKIP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1239) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1240) 	d_lru_shrink_move(lru, dentry, freeable);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1241) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1242) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1243) 	return LRU_REMOVED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1244) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1245) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1246) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1247) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1248)  * shrink_dcache_sb - shrink dcache for a superblock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1249)  * @sb: superblock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1250)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1251)  * Shrink the dcache for the specified super block. This is used to free
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1252)  * the dcache before unmounting a file system.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1253)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1254) void shrink_dcache_sb(struct super_block *sb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1255) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1256) 	do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1257) 		LIST_HEAD(dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1258) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1259) 		list_lru_walk(&sb->s_dentry_lru,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1260) 			dentry_lru_isolate_shrink, &dispose, 1024);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1261) 		shrink_dentry_list(&dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1262) 	} while (list_lru_count(&sb->s_dentry_lru) > 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1263) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1264) EXPORT_SYMBOL(shrink_dcache_sb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1265) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1266) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1267)  * enum d_walk_ret - action to talke during tree walk
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1268)  * @D_WALK_CONTINUE:	contrinue walk
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1269)  * @D_WALK_QUIT:	quit walk
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1270)  * @D_WALK_NORETRY:	quit when retry is needed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1271)  * @D_WALK_SKIP:	skip this dentry and its children
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1272)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1273) enum d_walk_ret {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1274) 	D_WALK_CONTINUE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1275) 	D_WALK_QUIT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1276) 	D_WALK_NORETRY,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1277) 	D_WALK_SKIP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1278) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1279) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1280) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1281)  * d_walk - walk the dentry tree
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1282)  * @parent:	start of walk
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1283)  * @data:	data passed to @enter() and @finish()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1284)  * @enter:	callback when first entering the dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1285)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1286)  * The @enter() callbacks are called with d_lock held.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1287)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1288) static void d_walk(struct dentry *parent, void *data,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1289) 		   enum d_walk_ret (*enter)(void *, struct dentry *))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1290) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1291) 	struct dentry *this_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1292) 	struct list_head *next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1293) 	unsigned seq = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1294) 	enum d_walk_ret ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1295) 	bool retry = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1296) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1297) again:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1298) 	read_seqbegin_or_lock(&rename_lock, &seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1299) 	this_parent = parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1300) 	spin_lock(&this_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1301) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1302) 	ret = enter(data, this_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1303) 	switch (ret) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1304) 	case D_WALK_CONTINUE:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1305) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1306) 	case D_WALK_QUIT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1307) 	case D_WALK_SKIP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1308) 		goto out_unlock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1309) 	case D_WALK_NORETRY:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1310) 		retry = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1311) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1312) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1313) repeat:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1314) 	next = this_parent->d_subdirs.next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1315) resume:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1316) 	while (next != &this_parent->d_subdirs) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1317) 		struct list_head *tmp = next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1318) 		struct dentry *dentry = list_entry(tmp, struct dentry, d_child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1319) 		next = tmp->next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1320) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1321) 		if (unlikely(dentry->d_flags & DCACHE_DENTRY_CURSOR))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1322) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1323) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1324) 		spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1325) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1326) 		ret = enter(data, dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1327) 		switch (ret) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1328) 		case D_WALK_CONTINUE:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1329) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1330) 		case D_WALK_QUIT:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1331) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1332) 			goto out_unlock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1333) 		case D_WALK_NORETRY:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1334) 			retry = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1335) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1336) 		case D_WALK_SKIP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1337) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1338) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1339) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1340) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1341) 		if (!list_empty(&dentry->d_subdirs)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1342) 			spin_unlock(&this_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1343) 			spin_release(&dentry->d_lock.dep_map, _RET_IP_);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1344) 			this_parent = dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1345) 			spin_acquire(&this_parent->d_lock.dep_map, 0, 1, _RET_IP_);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1346) 			goto repeat;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1347) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1348) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1349) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1350) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1351) 	 * All done at this level ... ascend and resume the search.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1352) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1353) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1354) ascend:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1355) 	if (this_parent != parent) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1356) 		struct dentry *child = this_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1357) 		this_parent = child->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1358) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1359) 		spin_unlock(&child->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1360) 		spin_lock(&this_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1361) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1362) 		/* might go back up the wrong parent if we have had a rename. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1363) 		if (need_seqretry(&rename_lock, seq))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1364) 			goto rename_retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1365) 		/* go into the first sibling still alive */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1366) 		do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1367) 			next = child->d_child.next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1368) 			if (next == &this_parent->d_subdirs)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1369) 				goto ascend;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1370) 			child = list_entry(next, struct dentry, d_child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1371) 		} while (unlikely(child->d_flags & DCACHE_DENTRY_KILLED));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1372) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1373) 		goto resume;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1374) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1375) 	if (need_seqretry(&rename_lock, seq))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1376) 		goto rename_retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1377) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1378) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1379) out_unlock:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1380) 	spin_unlock(&this_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1381) 	done_seqretry(&rename_lock, seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1382) 	return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1383) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1384) rename_retry:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1385) 	spin_unlock(&this_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1386) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1387) 	BUG_ON(seq & 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1388) 	if (!retry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1389) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1390) 	seq = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1391) 	goto again;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1392) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1393) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1394) struct check_mount {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1395) 	struct vfsmount *mnt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1396) 	unsigned int mounted;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1397) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1398) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1399) static enum d_walk_ret path_check_mount(void *data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1400) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1401) 	struct check_mount *info = data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1402) 	struct path path = { .mnt = info->mnt, .dentry = dentry };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1403) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1404) 	if (likely(!d_mountpoint(dentry)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1405) 		return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1406) 	if (__path_is_mountpoint(&path)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1407) 		info->mounted = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1408) 		return D_WALK_QUIT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1409) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1410) 	return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1411) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1412) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1413) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1414)  * path_has_submounts - check for mounts over a dentry in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1415)  *                      current namespace.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1416)  * @parent: path to check.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1417)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1418)  * Return true if the parent or its subdirectories contain
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1419)  * a mount point in the current namespace.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1420)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1421) int path_has_submounts(const struct path *parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1422) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1423) 	struct check_mount data = { .mnt = parent->mnt, .mounted = 0 };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1424) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1425) 	read_seqlock_excl(&mount_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1426) 	d_walk(parent->dentry, &data, path_check_mount);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1427) 	read_sequnlock_excl(&mount_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1428) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1429) 	return data.mounted;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1430) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1431) EXPORT_SYMBOL(path_has_submounts);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1432) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1433) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1434)  * Called by mount code to set a mountpoint and check if the mountpoint is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1435)  * reachable (e.g. NFS can unhash a directory dentry and then the complete
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1436)  * subtree can become unreachable).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1437)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1438)  * Only one of d_invalidate() and d_set_mounted() must succeed.  For
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1439)  * this reason take rename_lock and d_lock on dentry and ancestors.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1440)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1441) int d_set_mounted(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1442) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1443) 	struct dentry *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1444) 	int ret = -ENOENT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1445) 	write_seqlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1446) 	for (p = dentry->d_parent; !IS_ROOT(p); p = p->d_parent) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1447) 		/* Need exclusion wrt. d_invalidate() */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1448) 		spin_lock(&p->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1449) 		if (unlikely(d_unhashed(p))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1450) 			spin_unlock(&p->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1451) 			goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1452) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1453) 		spin_unlock(&p->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1454) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1455) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1456) 	if (!d_unlinked(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1457) 		ret = -EBUSY;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1458) 		if (!d_mountpoint(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1459) 			dentry->d_flags |= DCACHE_MOUNTED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1460) 			ret = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1461) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1462) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1463)  	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1464) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1465) 	write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1466) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1467) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1468) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1469) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1470)  * Search the dentry child list of the specified parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1471)  * and move any unused dentries to the end of the unused
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1472)  * list for prune_dcache(). We descend to the next level
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1473)  * whenever the d_subdirs list is non-empty and continue
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1474)  * searching.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1475)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1476)  * It returns zero iff there are no unused children,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1477)  * otherwise  it returns the number of children moved to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1478)  * the end of the unused list. This may not be the total
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1479)  * number of unused children, because select_parent can
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1480)  * drop the lock and return early due to latency
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1481)  * constraints.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1482)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1483) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1484) struct select_data {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1485) 	struct dentry *start;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1486) 	union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1487) 		long found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1488) 		struct dentry *victim;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1489) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1490) 	struct list_head dispose;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1491) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1492) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1493) static enum d_walk_ret select_collect(void *_data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1494) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1495) 	struct select_data *data = _data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1496) 	enum d_walk_ret ret = D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1497) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1498) 	if (data->start == dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1499) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1500) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1501) 	if (dentry->d_flags & DCACHE_SHRINK_LIST) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1502) 		data->found++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1503) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1504) 		if (dentry->d_flags & DCACHE_LRU_LIST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1505) 			d_lru_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1506) 		if (!dentry->d_lockref.count) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1507) 			d_shrink_add(dentry, &data->dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1508) 			data->found++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1509) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1510) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1511) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1512) 	 * We can return to the caller if we have found some (this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1513) 	 * ensures forward progress). We'll be coming back to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1514) 	 * the rest.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1515) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1516) 	if (!list_empty(&data->dispose))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1517) 		ret = need_resched() ? D_WALK_QUIT : D_WALK_NORETRY;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1518) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1519) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1520) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1521) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1522) static enum d_walk_ret select_collect2(void *_data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1523) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1524) 	struct select_data *data = _data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1525) 	enum d_walk_ret ret = D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1526) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1527) 	if (data->start == dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1528) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1529) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1530) 	if (dentry->d_flags & DCACHE_SHRINK_LIST) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1531) 		if (!dentry->d_lockref.count) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1532) 			rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1533) 			data->victim = dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1534) 			return D_WALK_QUIT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1535) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1536) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1537) 		if (dentry->d_flags & DCACHE_LRU_LIST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1538) 			d_lru_del(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1539) 		if (!dentry->d_lockref.count)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1540) 			d_shrink_add(dentry, &data->dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1541) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1542) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1543) 	 * We can return to the caller if we have found some (this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1544) 	 * ensures forward progress). We'll be coming back to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1545) 	 * the rest.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1546) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1547) 	if (!list_empty(&data->dispose))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1548) 		ret = need_resched() ? D_WALK_QUIT : D_WALK_NORETRY;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1549) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1550) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1551) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1552) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1553) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1554)  * shrink_dcache_parent - prune dcache
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1555)  * @parent: parent of entries to prune
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1556)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1557)  * Prune the dcache to remove unused children of the parent dentry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1558)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1559) void shrink_dcache_parent(struct dentry *parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1560) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1561) 	for (;;) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1562) 		struct select_data data = {.start = parent};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1563) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1564) 		INIT_LIST_HEAD(&data.dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1565) 		d_walk(parent, &data, select_collect);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1566) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1567) 		if (!list_empty(&data.dispose)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1568) 			shrink_dentry_list(&data.dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1569) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1570) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1571) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1572) 		cond_resched();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1573) 		if (!data.found)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1574) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1575) 		data.victim = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1576) 		d_walk(parent, &data, select_collect2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1577) 		if (data.victim) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1578) 			struct dentry *parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1579) 			spin_lock(&data.victim->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1580) 			if (!shrink_lock_dentry(data.victim)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1581) 				spin_unlock(&data.victim->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1582) 				rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1583) 			} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1584) 				rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1585) 				parent = data.victim->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1586) 				if (parent != data.victim)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1587) 					__dput_to_list(parent, &data.dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1588) 				__dentry_kill(data.victim);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1589) 			}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1590) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1591) 		if (!list_empty(&data.dispose))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1592) 			shrink_dentry_list(&data.dispose);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1593) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1594) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1595) EXPORT_SYMBOL(shrink_dcache_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1596) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1597) static enum d_walk_ret umount_check(void *_data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1598) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1599) 	/* it has busy descendents; complain about those instead */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1600) 	if (!list_empty(&dentry->d_subdirs))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1601) 		return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1602) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1603) 	/* root with refcount 1 is fine */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1604) 	if (dentry == _data && dentry->d_lockref.count == 1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1605) 		return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1606) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1607) 	printk(KERN_ERR "BUG: Dentry %p{i=%lx,n=%pd} "
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1608) 			" still in use (%d) [unmount of %s %s]\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1609) 		       dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1610) 		       dentry->d_inode ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1611) 		       dentry->d_inode->i_ino : 0UL,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1612) 		       dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1613) 		       dentry->d_lockref.count,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1614) 		       dentry->d_sb->s_type->name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1615) 		       dentry->d_sb->s_id);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1616) 	WARN_ON(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1617) 	return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1618) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1619) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1620) static void do_one_tree(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1621) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1622) 	shrink_dcache_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1623) 	d_walk(dentry, dentry, umount_check);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1624) 	d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1625) 	dput(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1626) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1627) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1628) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1629)  * destroy the dentries attached to a superblock on unmounting
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1630)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1631) void shrink_dcache_for_umount(struct super_block *sb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1632) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1633) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1634) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1635) 	WARN(down_read_trylock(&sb->s_umount), "s_umount should've been locked");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1636) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1637) 	dentry = sb->s_root;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1638) 	sb->s_root = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1639) 	do_one_tree(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1640) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1641) 	while (!hlist_bl_empty(&sb->s_roots)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1642) 		dentry = dget(hlist_bl_entry(hlist_bl_first(&sb->s_roots), struct dentry, d_hash));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1643) 		do_one_tree(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1644) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1645) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1646) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1647) static enum d_walk_ret find_submount(void *_data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1648) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1649) 	struct dentry **victim = _data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1650) 	if (d_mountpoint(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1651) 		__dget_dlock(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1652) 		*victim = dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1653) 		return D_WALK_QUIT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1654) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1655) 	return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1656) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1657) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1658) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1659)  * d_invalidate - detach submounts, prune dcache, and drop
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1660)  * @dentry: dentry to invalidate (aka detach, prune and drop)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1661)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1662) void d_invalidate(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1663) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1664) 	bool had_submounts = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1665) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1666) 	if (d_unhashed(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1667) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1668) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1669) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1670) 	__d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1671) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1672) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1673) 	/* Negative dentries can be dropped without further checks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1674) 	if (!dentry->d_inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1675) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1676) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1677) 	shrink_dcache_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1678) 	for (;;) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1679) 		struct dentry *victim = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1680) 		d_walk(dentry, &victim, find_submount);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1681) 		if (!victim) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1682) 			if (had_submounts)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1683) 				shrink_dcache_parent(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1684) 			return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1685) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1686) 		had_submounts = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1687) 		detach_mounts(victim);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1688) 		dput(victim);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1689) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1690) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1691) EXPORT_SYMBOL(d_invalidate);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1692) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1693) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1694)  * __d_alloc	-	allocate a dcache entry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1695)  * @sb: filesystem it will belong to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1696)  * @name: qstr of the name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1697)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1698)  * Allocates a dentry. It returns %NULL if there is insufficient memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1699)  * available. On a success the dentry is returned. The name passed in is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1700)  * copied and the copy passed in may be reused after this call.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1701)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1702)  
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1703) static struct dentry *__d_alloc(struct super_block *sb, const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1704) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1705) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1706) 	char *dname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1707) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1708) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1709) 	dentry = kmem_cache_alloc(dentry_cache, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1710) 	if (!dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1711) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1712) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1713) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1714) 	 * We guarantee that the inline name is always NUL-terminated.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1715) 	 * This way the memcpy() done by the name switching in rename
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1716) 	 * will still always have a NUL at the end, even if we might
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1717) 	 * be overwriting an internal NUL character
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1718) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1719) 	dentry->d_iname[DNAME_INLINE_LEN-1] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1720) 	if (unlikely(!name)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1721) 		name = &slash_name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1722) 		dname = dentry->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1723) 	} else if (name->len > DNAME_INLINE_LEN-1) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1724) 		size_t size = offsetof(struct external_name, name[1]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1725) 		struct external_name *p = kmalloc(size + name->len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1726) 						  GFP_KERNEL_ACCOUNT |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1727) 						  __GFP_RECLAIMABLE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1728) 		if (!p) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1729) 			kmem_cache_free(dentry_cache, dentry); 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1730) 			return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1731) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1732) 		atomic_set(&p->u.count, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1733) 		dname = p->name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1734) 	} else  {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1735) 		dname = dentry->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1736) 	}	
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1737) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1738) 	dentry->d_name.len = name->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1739) 	dentry->d_name.hash = name->hash;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1740) 	memcpy(dname, name->name, name->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1741) 	dname[name->len] = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1742) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1743) 	/* Make sure we always see the terminating NUL character */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1744) 	smp_store_release(&dentry->d_name.name, dname); /* ^^^ */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1745) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1746) 	dentry->d_lockref.count = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1747) 	dentry->d_flags = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1748) 	spin_lock_init(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1749) 	seqcount_spinlock_init(&dentry->d_seq, &dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1750) 	dentry->d_inode = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1751) 	dentry->d_parent = dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1752) 	dentry->d_sb = sb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1753) 	dentry->d_op = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1754) 	dentry->d_fsdata = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1755) 	INIT_HLIST_BL_NODE(&dentry->d_hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1756) 	INIT_LIST_HEAD(&dentry->d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1757) 	INIT_LIST_HEAD(&dentry->d_subdirs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1758) 	INIT_HLIST_NODE(&dentry->d_u.d_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1759) 	INIT_LIST_HEAD(&dentry->d_child);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1760) 	d_set_d_op(dentry, dentry->d_sb->s_d_op);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1761) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1762) 	if (dentry->d_op && dentry->d_op->d_init) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1763) 		err = dentry->d_op->d_init(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1764) 		if (err) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1765) 			if (dname_external(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1766) 				kfree(external_name(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1767) 			kmem_cache_free(dentry_cache, dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1768) 			return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1769) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1770) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1771) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1772) 	this_cpu_inc(nr_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1773) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1774) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1775) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1776) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1777) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1778)  * d_alloc	-	allocate a dcache entry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1779)  * @parent: parent of entry to allocate
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1780)  * @name: qstr of the name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1781)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1782)  * Allocates a dentry. It returns %NULL if there is insufficient memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1783)  * available. On a success the dentry is returned. The name passed in is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1784)  * copied and the copy passed in may be reused after this call.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1785)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1786) struct dentry *d_alloc(struct dentry * parent, const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1787) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1788) 	struct dentry *dentry = __d_alloc(parent->d_sb, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1789) 	if (!dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1790) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1791) 	spin_lock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1792) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1793) 	 * don't need child lock because it is not subject
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1794) 	 * to concurrency here
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1795) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1796) 	__dget_dlock(parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1797) 	dentry->d_parent = parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1798) 	list_add(&dentry->d_child, &parent->d_subdirs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1799) 	spin_unlock(&parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1800) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1801) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1802) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1803) EXPORT_SYMBOL(d_alloc);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1804) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1805) struct dentry *d_alloc_anon(struct super_block *sb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1806) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1807) 	return __d_alloc(sb, NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1808) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1809) EXPORT_SYMBOL(d_alloc_anon);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1810) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1811) struct dentry *d_alloc_cursor(struct dentry * parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1812) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1813) 	struct dentry *dentry = d_alloc_anon(parent->d_sb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1814) 	if (dentry) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1815) 		dentry->d_flags |= DCACHE_DENTRY_CURSOR;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1816) 		dentry->d_parent = dget(parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1817) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1818) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1819) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1820) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1821) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1822)  * d_alloc_pseudo - allocate a dentry (for lookup-less filesystems)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1823)  * @sb: the superblock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1824)  * @name: qstr of the name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1825)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1826)  * For a filesystem that just pins its dentries in memory and never
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1827)  * performs lookups at all, return an unhashed IS_ROOT dentry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1828)  * This is used for pipes, sockets et.al. - the stuff that should
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1829)  * never be anyone's children or parents.  Unlike all other
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1830)  * dentries, these will not have RCU delay between dropping the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1831)  * last reference and freeing them.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1832)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1833)  * The only user is alloc_file_pseudo() and that's what should
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1834)  * be considered a public interface.  Don't use directly.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1835)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1836) struct dentry *d_alloc_pseudo(struct super_block *sb, const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1837) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1838) 	struct dentry *dentry = __d_alloc(sb, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1839) 	if (likely(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1840) 		dentry->d_flags |= DCACHE_NORCU;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1841) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1842) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1843) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1844) struct dentry *d_alloc_name(struct dentry *parent, const char *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1845) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1846) 	struct qstr q;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1847) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1848) 	q.name = name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1849) 	q.hash_len = hashlen_string(parent, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1850) 	return d_alloc(parent, &q);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1851) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1852) EXPORT_SYMBOL(d_alloc_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1853) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1854) void d_set_d_op(struct dentry *dentry, const struct dentry_operations *op)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1855) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1856) 	WARN_ON_ONCE(dentry->d_op);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1857) 	WARN_ON_ONCE(dentry->d_flags & (DCACHE_OP_HASH	|
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1858) 				DCACHE_OP_COMPARE	|
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1859) 				DCACHE_OP_REVALIDATE	|
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1860) 				DCACHE_OP_WEAK_REVALIDATE	|
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1861) 				DCACHE_OP_DELETE	|
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1862) 				DCACHE_OP_REAL));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1863) 	dentry->d_op = op;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1864) 	if (!op)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1865) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1866) 	if (op->d_hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1867) 		dentry->d_flags |= DCACHE_OP_HASH;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1868) 	if (op->d_compare)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1869) 		dentry->d_flags |= DCACHE_OP_COMPARE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1870) 	if (op->d_revalidate)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1871) 		dentry->d_flags |= DCACHE_OP_REVALIDATE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1872) 	if (op->d_weak_revalidate)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1873) 		dentry->d_flags |= DCACHE_OP_WEAK_REVALIDATE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1874) 	if (op->d_delete)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1875) 		dentry->d_flags |= DCACHE_OP_DELETE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1876) 	if (op->d_prune)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1877) 		dentry->d_flags |= DCACHE_OP_PRUNE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1878) 	if (op->d_real)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1879) 		dentry->d_flags |= DCACHE_OP_REAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1880) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1881) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1882) EXPORT_SYMBOL(d_set_d_op);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1883) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1884) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1885) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1886)  * d_set_fallthru - Mark a dentry as falling through to a lower layer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1887)  * @dentry - The dentry to mark
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1888)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1889)  * Mark a dentry as falling through to the lower layer (as set with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1890)  * d_pin_lower()).  This flag may be recorded on the medium.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1891)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1892) void d_set_fallthru(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1893) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1894) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1895) 	dentry->d_flags |= DCACHE_FALLTHRU;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1896) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1897) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1898) EXPORT_SYMBOL(d_set_fallthru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1899) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1900) static unsigned d_flags_for_inode(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1901) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1902) 	unsigned add_flags = DCACHE_REGULAR_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1903) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1904) 	if (!inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1905) 		return DCACHE_MISS_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1906) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1907) 	if (S_ISDIR(inode->i_mode)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1908) 		add_flags = DCACHE_DIRECTORY_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1909) 		if (unlikely(!(inode->i_opflags & IOP_LOOKUP))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1910) 			if (unlikely(!inode->i_op->lookup))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1911) 				add_flags = DCACHE_AUTODIR_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1912) 			else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1913) 				inode->i_opflags |= IOP_LOOKUP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1914) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1915) 		goto type_determined;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1916) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1917) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1918) 	if (unlikely(!(inode->i_opflags & IOP_NOFOLLOW))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1919) 		if (unlikely(inode->i_op->get_link)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1920) 			add_flags = DCACHE_SYMLINK_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1921) 			goto type_determined;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1922) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1923) 		inode->i_opflags |= IOP_NOFOLLOW;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1924) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1925) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1926) 	if (unlikely(!S_ISREG(inode->i_mode)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1927) 		add_flags = DCACHE_SPECIAL_TYPE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1928) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1929) type_determined:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1930) 	if (unlikely(IS_AUTOMOUNT(inode)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1931) 		add_flags |= DCACHE_NEED_AUTOMOUNT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1932) 	return add_flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1933) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1934) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1935) static void __d_instantiate(struct dentry *dentry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1936) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1937) 	unsigned add_flags = d_flags_for_inode(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1938) 	WARN_ON(d_in_lookup(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1939) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1940) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1941) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1942) 	 * Decrement negative dentry count if it was in the LRU list.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1943) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1944) 	if (dentry->d_flags & DCACHE_LRU_LIST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1945) 		this_cpu_dec(nr_dentry_negative);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1946) 	hlist_add_head(&dentry->d_u.d_alias, &inode->i_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1947) 	raw_write_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1948) 	__d_set_inode_and_type(dentry, inode, add_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1949) 	raw_write_seqcount_end(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1950) 	fsnotify_update_flags(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1951) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1952) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1953) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1954) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1955)  * d_instantiate - fill in inode information for a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1956)  * @entry: dentry to complete
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1957)  * @inode: inode to attach to this dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1958)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1959)  * Fill in inode information in the entry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1960)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1961)  * This turns negative dentries into productive full members
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1962)  * of society.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1963)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1964)  * NOTE! This assumes that the inode count has been incremented
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1965)  * (or otherwise set) by the caller to indicate that it is now
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1966)  * in use by the dcache.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1967)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1968)  
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1969) void d_instantiate(struct dentry *entry, struct inode * inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1970) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1971) 	BUG_ON(!hlist_unhashed(&entry->d_u.d_alias));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1972) 	if (inode) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1973) 		security_d_instantiate(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1974) 		spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1975) 		__d_instantiate(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1976) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1977) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1978) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1979) EXPORT_SYMBOL(d_instantiate);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1980) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1981) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1982)  * This should be equivalent to d_instantiate() + unlock_new_inode(),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1983)  * with lockdep-related part of unlock_new_inode() done before
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1984)  * anything else.  Use that instead of open-coding d_instantiate()/
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1985)  * unlock_new_inode() combinations.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1986)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1987) void d_instantiate_new(struct dentry *entry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1988) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1989) 	BUG_ON(!hlist_unhashed(&entry->d_u.d_alias));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1990) 	BUG_ON(!inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1991) 	lockdep_annotate_inode_mutex_key(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1992) 	security_d_instantiate(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1993) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1994) 	__d_instantiate(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1995) 	WARN_ON(!(inode->i_state & I_NEW));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1996) 	inode->i_state &= ~I_NEW & ~I_CREATING;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1997) 	smp_mb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1998) 	wake_up_bit(&inode->i_state, __I_NEW);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1999) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2000) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2001) EXPORT_SYMBOL(d_instantiate_new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2002) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2003) struct dentry *d_make_root(struct inode *root_inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2004) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2005) 	struct dentry *res = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2006) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2007) 	if (root_inode) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2008) 		res = d_alloc_anon(root_inode->i_sb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2009) 		if (res)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2010) 			d_instantiate(res, root_inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2011) 		else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2012) 			iput(root_inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2013) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2014) 	return res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2015) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2016) EXPORT_SYMBOL(d_make_root);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2017) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2018) static struct dentry *__d_instantiate_anon(struct dentry *dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2019) 					   struct inode *inode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2020) 					   bool disconnected)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2021) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2022) 	struct dentry *res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2023) 	unsigned add_flags;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2024) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2025) 	security_d_instantiate(dentry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2026) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2027) 	res = __d_find_any_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2028) 	if (res) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2029) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2030) 		dput(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2031) 		goto out_iput;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2032) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2033) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2034) 	/* attach a disconnected dentry */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2035) 	add_flags = d_flags_for_inode(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2036) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2037) 	if (disconnected)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2038) 		add_flags |= DCACHE_DISCONNECTED;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2039) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2040) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2041) 	__d_set_inode_and_type(dentry, inode, add_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2042) 	hlist_add_head(&dentry->d_u.d_alias, &inode->i_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2043) 	if (!disconnected) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2044) 		hlist_bl_lock(&dentry->d_sb->s_roots);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2045) 		hlist_bl_add_head(&dentry->d_hash, &dentry->d_sb->s_roots);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2046) 		hlist_bl_unlock(&dentry->d_sb->s_roots);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2047) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2048) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2049) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2050) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2051) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2052) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2053)  out_iput:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2054) 	iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2055) 	return res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2056) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2057) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2058) struct dentry *d_instantiate_anon(struct dentry *dentry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2059) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2060) 	return __d_instantiate_anon(dentry, inode, true);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2061) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2062) EXPORT_SYMBOL(d_instantiate_anon);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2063) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2064) static struct dentry *__d_obtain_alias(struct inode *inode, bool disconnected)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2065) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2066) 	struct dentry *tmp;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2067) 	struct dentry *res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2068) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2069) 	if (!inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2070) 		return ERR_PTR(-ESTALE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2071) 	if (IS_ERR(inode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2072) 		return ERR_CAST(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2073) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2074) 	res = d_find_any_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2075) 	if (res)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2076) 		goto out_iput;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2077) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2078) 	tmp = d_alloc_anon(inode->i_sb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2079) 	if (!tmp) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2080) 		res = ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2081) 		goto out_iput;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2082) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2083) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2084) 	return __d_instantiate_anon(tmp, inode, disconnected);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2085) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2086) out_iput:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2087) 	iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2088) 	return res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2089) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2090) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2091) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2092)  * d_obtain_alias - find or allocate a DISCONNECTED dentry for a given inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2093)  * @inode: inode to allocate the dentry for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2094)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2095)  * Obtain a dentry for an inode resulting from NFS filehandle conversion or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2096)  * similar open by handle operations.  The returned dentry may be anonymous,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2097)  * or may have a full name (if the inode was already in the cache).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2098)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2099)  * When called on a directory inode, we must ensure that the inode only ever
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2100)  * has one dentry.  If a dentry is found, that is returned instead of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2101)  * allocating a new one.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2102)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2103)  * On successful return, the reference to the inode has been transferred
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2104)  * to the dentry.  In case of an error the reference on the inode is released.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2105)  * To make it easier to use in export operations a %NULL or IS_ERR inode may
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2106)  * be passed in and the error will be propagated to the return value,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2107)  * with a %NULL @inode replaced by ERR_PTR(-ESTALE).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2108)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2109) struct dentry *d_obtain_alias(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2110) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2111) 	return __d_obtain_alias(inode, true);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2112) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2113) EXPORT_SYMBOL_NS(d_obtain_alias, ANDROID_GKI_VFS_EXPORT_ONLY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2114) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2115) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2116)  * d_obtain_root - find or allocate a dentry for a given inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2117)  * @inode: inode to allocate the dentry for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2118)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2119)  * Obtain an IS_ROOT dentry for the root of a filesystem.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2120)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2121)  * We must ensure that directory inodes only ever have one dentry.  If a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2122)  * dentry is found, that is returned instead of allocating a new one.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2123)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2124)  * On successful return, the reference to the inode has been transferred
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2125)  * to the dentry.  In case of an error the reference on the inode is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2126)  * released.  A %NULL or IS_ERR inode may be passed in and will be the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2127)  * error will be propagate to the return value, with a %NULL @inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2128)  * replaced by ERR_PTR(-ESTALE).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2129)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2130) struct dentry *d_obtain_root(struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2131) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2132) 	return __d_obtain_alias(inode, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2133) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2134) EXPORT_SYMBOL(d_obtain_root);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2135) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2136) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2137)  * d_add_ci - lookup or allocate new dentry with case-exact name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2138)  * @inode:  the inode case-insensitive lookup has found
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2139)  * @dentry: the negative dentry that was passed to the parent's lookup func
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2140)  * @name:   the case-exact name to be associated with the returned dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2141)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2142)  * This is to avoid filling the dcache with case-insensitive names to the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2143)  * same inode, only the actual correct case is stored in the dcache for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2144)  * case-insensitive filesystems.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2145)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2146)  * For a case-insensitive lookup match and if the the case-exact dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2147)  * already exists in in the dcache, use it and return it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2148)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2149)  * If no entry exists with the exact case name, allocate new dentry with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2150)  * the exact case, and return the spliced entry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2151)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2152) struct dentry *d_add_ci(struct dentry *dentry, struct inode *inode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2153) 			struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2154) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2155) 	struct dentry *found, *res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2156) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2157) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2158) 	 * First check if a dentry matching the name already exists,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2159) 	 * if not go ahead and create it now.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2160) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2161) 	found = d_hash_and_lookup(dentry->d_parent, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2162) 	if (found) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2163) 		iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2164) 		return found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2165) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2166) 	if (d_in_lookup(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2167) 		found = d_alloc_parallel(dentry->d_parent, name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2168) 					dentry->d_wait);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2169) 		if (IS_ERR(found) || !d_in_lookup(found)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2170) 			iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2171) 			return found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2172) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2173) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2174) 		found = d_alloc(dentry->d_parent, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2175) 		if (!found) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2176) 			iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2177) 			return ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2178) 		} 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2179) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2180) 	res = d_splice_alias(inode, found);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2181) 	if (res) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2182) 		dput(found);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2183) 		return res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2184) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2185) 	return found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2186) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2187) EXPORT_SYMBOL_NS(d_add_ci, ANDROID_GKI_VFS_EXPORT_ONLY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2188) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2189) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2190) static inline bool d_same_name(const struct dentry *dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2191) 				const struct dentry *parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2192) 				const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2193) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2194) 	if (likely(!(parent->d_flags & DCACHE_OP_COMPARE))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2195) 		if (dentry->d_name.len != name->len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2196) 			return false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2197) 		return dentry_cmp(dentry, name->name, name->len) == 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2198) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2199) 	return parent->d_op->d_compare(dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2200) 				       dentry->d_name.len, dentry->d_name.name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2201) 				       name) == 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2202) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2203) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2204) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2205)  * __d_lookup_rcu - search for a dentry (racy, store-free)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2206)  * @parent: parent dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2207)  * @name: qstr of name we wish to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2208)  * @seqp: returns d_seq value at the point where the dentry was found
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2209)  * Returns: dentry, or NULL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2210)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2211)  * __d_lookup_rcu is the dcache lookup function for rcu-walk name
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2212)  * resolution (store-free path walking) design described in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2213)  * Documentation/filesystems/path-lookup.txt.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2214)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2215)  * This is not to be used outside core vfs.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2216)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2217)  * __d_lookup_rcu must only be used in rcu-walk mode, ie. with vfsmount lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2218)  * held, and rcu_read_lock held. The returned dentry must not be stored into
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2219)  * without taking d_lock and checking d_seq sequence count against @seq
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2220)  * returned here.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2221)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2222)  * A refcount may be taken on the found dentry with the d_rcu_to_refcount
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2223)  * function.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2224)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2225)  * Alternatively, __d_lookup_rcu may be called again to look up the child of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2226)  * the returned dentry, so long as its parent's seqlock is checked after the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2227)  * child is looked up. Thus, an interlocking stepping of sequence lock checks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2228)  * is formed, giving integrity down the path walk.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2229)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2230)  * NOTE! The caller *has* to check the resulting dentry against the sequence
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2231)  * number we've returned before using any of the resulting dentry state!
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2232)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2233) struct dentry *__d_lookup_rcu(const struct dentry *parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2234) 				const struct qstr *name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2235) 				unsigned *seqp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2236) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2237) 	u64 hashlen = name->hash_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2238) 	const unsigned char *str = name->name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2239) 	struct hlist_bl_head *b = d_hash(hashlen_hash(hashlen));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2240) 	struct hlist_bl_node *node;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2241) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2242) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2243) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2244) 	 * Note: There is significant duplication with __d_lookup_rcu which is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2245) 	 * required to prevent single threaded performance regressions
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2246) 	 * especially on architectures where smp_rmb (in seqcounts) are costly.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2247) 	 * Keep the two functions in sync.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2248) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2249) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2250) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2251) 	 * The hash list is protected using RCU.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2252) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2253) 	 * Carefully use d_seq when comparing a candidate dentry, to avoid
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2254) 	 * races with d_move().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2255) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2256) 	 * It is possible that concurrent renames can mess up our list
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2257) 	 * walk here and result in missing our dentry, resulting in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2258) 	 * false-negative result. d_lookup() protects against concurrent
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2259) 	 * renames using rename_lock seqlock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2260) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2261) 	 * See Documentation/filesystems/path-lookup.txt for more details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2262) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2263) 	hlist_bl_for_each_entry_rcu(dentry, node, b, d_hash) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2264) 		unsigned seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2265) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2266) seqretry:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2267) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2268) 		 * The dentry sequence count protects us from concurrent
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2269) 		 * renames, and thus protects parent and name fields.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2270) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2271) 		 * The caller must perform a seqcount check in order
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2272) 		 * to do anything useful with the returned dentry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2273) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2274) 		 * NOTE! We do a "raw" seqcount_begin here. That means that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2275) 		 * we don't wait for the sequence count to stabilize if it
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2276) 		 * is in the middle of a sequence change. If we do the slow
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2277) 		 * dentry compare, we will do seqretries until it is stable,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2278) 		 * and if we end up with a successful lookup, we actually
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2279) 		 * want to exit RCU lookup anyway.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2280) 		 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2281) 		 * Note that raw_seqcount_begin still *does* smp_rmb(), so
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2282) 		 * we are still guaranteed NUL-termination of ->d_name.name.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2283) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2284) 		seq = raw_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2285) 		if (dentry->d_parent != parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2286) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2287) 		if (d_unhashed(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2288) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2289) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2290) 		if (unlikely(parent->d_flags & DCACHE_OP_COMPARE)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2291) 			int tlen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2292) 			const char *tname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2293) 			if (dentry->d_name.hash != hashlen_hash(hashlen))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2294) 				continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2295) 			tlen = dentry->d_name.len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2296) 			tname = dentry->d_name.name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2297) 			/* we want a consistent (name,len) pair */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2298) 			if (read_seqcount_retry(&dentry->d_seq, seq)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2299) 				cpu_relax();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2300) 				goto seqretry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2301) 			}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2302) 			if (parent->d_op->d_compare(dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2303) 						    tlen, tname, name) != 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2304) 				continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2305) 		} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2306) 			if (dentry->d_name.hash_len != hashlen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2307) 				continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2308) 			if (dentry_cmp(dentry, str, hashlen_len(hashlen)) != 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2309) 				continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2310) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2311) 		*seqp = seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2312) 		return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2313) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2314) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2315) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2316) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2317) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2318)  * d_lookup - search for a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2319)  * @parent: parent dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2320)  * @name: qstr of name we wish to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2321)  * Returns: dentry, or NULL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2322)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2323)  * d_lookup searches the children of the parent dentry for the name in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2324)  * question. If the dentry is found its reference count is incremented and the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2325)  * dentry is returned. The caller must use dput to free the entry when it has
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2326)  * finished using it. %NULL is returned if the dentry does not exist.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2327)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2328) struct dentry *d_lookup(const struct dentry *parent, const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2329) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2330) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2331) 	unsigned seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2332) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2333) 	do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2334) 		seq = read_seqbegin(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2335) 		dentry = __d_lookup(parent, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2336) 		if (dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2337) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2338) 	} while (read_seqretry(&rename_lock, seq));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2339) 	return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2340) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2341) EXPORT_SYMBOL(d_lookup);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2342) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2343) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2344)  * __d_lookup - search for a dentry (racy)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2345)  * @parent: parent dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2346)  * @name: qstr of name we wish to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2347)  * Returns: dentry, or NULL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2348)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2349)  * __d_lookup is like d_lookup, however it may (rarely) return a
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2350)  * false-negative result due to unrelated rename activity.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2351)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2352)  * __d_lookup is slightly faster by avoiding rename_lock read seqlock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2353)  * however it must be used carefully, eg. with a following d_lookup in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2354)  * the case of failure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2355)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2356)  * __d_lookup callers must be commented.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2357)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2358) struct dentry *__d_lookup(const struct dentry *parent, const struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2359) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2360) 	unsigned int hash = name->hash;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2361) 	struct hlist_bl_head *b = d_hash(hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2362) 	struct hlist_bl_node *node;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2363) 	struct dentry *found = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2364) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2365) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2366) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2367) 	 * Note: There is significant duplication with __d_lookup_rcu which is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2368) 	 * required to prevent single threaded performance regressions
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2369) 	 * especially on architectures where smp_rmb (in seqcounts) are costly.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2370) 	 * Keep the two functions in sync.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2371) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2372) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2373) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2374) 	 * The hash list is protected using RCU.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2375) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2376) 	 * Take d_lock when comparing a candidate dentry, to avoid races
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2377) 	 * with d_move().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2378) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2379) 	 * It is possible that concurrent renames can mess up our list
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2380) 	 * walk here and result in missing our dentry, resulting in the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2381) 	 * false-negative result. d_lookup() protects against concurrent
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2382) 	 * renames using rename_lock seqlock.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2383) 	 *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2384) 	 * See Documentation/filesystems/path-lookup.txt for more details.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2385) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2386) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2387) 	
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2388) 	hlist_bl_for_each_entry_rcu(dentry, node, b, d_hash) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2389) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2390) 		if (dentry->d_name.hash != hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2391) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2392) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2393) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2394) 		if (dentry->d_parent != parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2395) 			goto next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2396) 		if (d_unhashed(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2397) 			goto next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2398) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2399) 		if (!d_same_name(dentry, parent, name))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2400) 			goto next;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2401) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2402) 		dentry->d_lockref.count++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2403) 		found = dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2404) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2405) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2406) next:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2407) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2408)  	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2409)  	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2410) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2411)  	return found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2412) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2413) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2414) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2415)  * d_hash_and_lookup - hash the qstr then search for a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2416)  * @dir: Directory to search in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2417)  * @name: qstr of name we wish to find
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2418)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2419)  * On lookup failure NULL is returned; on bad name - ERR_PTR(-error)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2420)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2421) struct dentry *d_hash_and_lookup(struct dentry *dir, struct qstr *name)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2422) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2423) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2424) 	 * Check for a fs-specific hash function. Note that we must
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2425) 	 * calculate the standard hash first, as the d_op->d_hash()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2426) 	 * routine may choose to leave the hash value unchanged.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2427) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2428) 	name->hash = full_name_hash(dir, name->name, name->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2429) 	if (dir->d_flags & DCACHE_OP_HASH) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2430) 		int err = dir->d_op->d_hash(dir, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2431) 		if (unlikely(err < 0))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2432) 			return ERR_PTR(err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2433) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2434) 	return d_lookup(dir, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2435) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2436) EXPORT_SYMBOL(d_hash_and_lookup);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2437) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2438) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2439)  * When a file is deleted, we have two options:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2440)  * - turn this dentry into a negative dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2441)  * - unhash this dentry and free it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2442)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2443)  * Usually, we want to just turn this into
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2444)  * a negative dentry, but if anybody else is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2445)  * currently using the dentry or the inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2446)  * we can't do that and we fall back on removing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2447)  * it from the hash queues and waiting for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2448)  * it to be deleted later when it has no users
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2449)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2450)  
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2451) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2452)  * d_delete - delete a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2453)  * @dentry: The dentry to delete
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2454)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2455)  * Turn the dentry into a negative dentry if possible, otherwise
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2456)  * remove it from the hash queues so it can be deleted later
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2457)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2458)  
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2459) void d_delete(struct dentry * dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2460) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2461) 	struct inode *inode = dentry->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2462) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2463) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2464) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2465) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2466) 	 * Are we the only user?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2467) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2468) 	if (dentry->d_lockref.count == 1) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2469) 		dentry->d_flags &= ~DCACHE_CANT_MOUNT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2470) 		dentry_unlink_inode(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2471) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2472) 		__d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2473) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2474) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2475) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2476) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2477) EXPORT_SYMBOL(d_delete);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2478) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2479) static void __d_rehash(struct dentry *entry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2480) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2481) 	struct hlist_bl_head *b = d_hash(entry->d_name.hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2482) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2483) 	hlist_bl_lock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2484) 	hlist_bl_add_head_rcu(&entry->d_hash, b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2485) 	hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2486) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2487) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2488) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2489)  * d_rehash	- add an entry back to the hash
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2490)  * @entry: dentry to add to the hash
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2491)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2492)  * Adds a dentry to the hash according to its name.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2493)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2494)  
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2495) void d_rehash(struct dentry * entry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2496) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2497) 	spin_lock(&entry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2498) 	__d_rehash(entry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2499) 	spin_unlock(&entry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2500) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2501) EXPORT_SYMBOL(d_rehash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2502) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2503) static inline unsigned start_dir_add(struct inode *dir)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2504) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2505) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2506) 	for (;;) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2507) 		unsigned n = dir->i_dir_seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2508) 		if (!(n & 1) && cmpxchg(&dir->i_dir_seq, n, n + 1) == n)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2509) 			return n;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2510) 		cpu_relax();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2511) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2512) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2513) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2514) static inline void end_dir_add(struct inode *dir, unsigned n)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2515) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2516) 	smp_store_release(&dir->i_dir_seq, n + 2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2517) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2518) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2519) static void d_wait_lookup(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2520) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2521) 	if (d_in_lookup(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2522) 		DECLARE_WAITQUEUE(wait, current);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2523) 		add_wait_queue(dentry->d_wait, &wait);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2524) 		do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2525) 			set_current_state(TASK_UNINTERRUPTIBLE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2526) 			spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2527) 			schedule();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2528) 			spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2529) 		} while (d_in_lookup(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2530) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2531) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2532) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2533) struct dentry *d_alloc_parallel(struct dentry *parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2534) 				const struct qstr *name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2535) 				wait_queue_head_t *wq)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2536) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2537) 	unsigned int hash = name->hash;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2538) 	struct hlist_bl_head *b = in_lookup_hash(parent, hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2539) 	struct hlist_bl_node *node;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2540) 	struct dentry *new = d_alloc(parent, name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2541) 	struct dentry *dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2542) 	unsigned seq, r_seq, d_seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2543) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2544) 	if (unlikely(!new))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2545) 		return ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2546) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2547) retry:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2548) 	rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2549) 	seq = smp_load_acquire(&parent->d_inode->i_dir_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2550) 	r_seq = read_seqbegin(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2551) 	dentry = __d_lookup_rcu(parent, name, &d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2552) 	if (unlikely(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2553) 		if (!lockref_get_not_dead(&dentry->d_lockref)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2554) 			rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2555) 			goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2556) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2557) 		if (read_seqcount_retry(&dentry->d_seq, d_seq)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2558) 			rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2559) 			dput(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2560) 			goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2561) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2562) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2563) 		dput(new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2564) 		return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2565) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2566) 	if (unlikely(read_seqretry(&rename_lock, r_seq))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2567) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2568) 		goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2569) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2570) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2571) 	if (unlikely(seq & 1)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2572) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2573) 		goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2574) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2575) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2576) 	hlist_bl_lock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2577) 	if (unlikely(READ_ONCE(parent->d_inode->i_dir_seq) != seq)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2578) 		hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2579) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2580) 		goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2581) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2582) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2583) 	 * No changes for the parent since the beginning of d_lookup().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2584) 	 * Since all removals from the chain happen with hlist_bl_lock(),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2585) 	 * any potential in-lookup matches are going to stay here until
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2586) 	 * we unlock the chain.  All fields are stable in everything
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2587) 	 * we encounter.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2588) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2589) 	hlist_bl_for_each_entry(dentry, node, b, d_u.d_in_lookup_hash) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2590) 		if (dentry->d_name.hash != hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2591) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2592) 		if (dentry->d_parent != parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2593) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2594) 		if (!d_same_name(dentry, parent, name))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2595) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2596) 		hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2597) 		/* now we can try to grab a reference */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2598) 		if (!lockref_get_not_dead(&dentry->d_lockref)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2599) 			rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2600) 			goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2601) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2602) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2603) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2604) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2605) 		 * somebody is likely to be still doing lookup for it;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2606) 		 * wait for them to finish
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2607) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2608) 		spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2609) 		d_wait_lookup(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2610) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2611) 		 * it's not in-lookup anymore; in principle we should repeat
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2612) 		 * everything from dcache lookup, but it's likely to be what
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2613) 		 * d_lookup() would've found anyway.  If it is, just return it;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2614) 		 * otherwise we really have to repeat the whole thing.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2615) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2616) 		if (unlikely(dentry->d_name.hash != hash))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2617) 			goto mismatch;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2618) 		if (unlikely(dentry->d_parent != parent))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2619) 			goto mismatch;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2620) 		if (unlikely(d_unhashed(dentry)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2621) 			goto mismatch;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2622) 		if (unlikely(!d_same_name(dentry, parent, name)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2623) 			goto mismatch;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2624) 		/* OK, it *is* a hashed match; return it */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2625) 		spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2626) 		dput(new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2627) 		return dentry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2628) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2629) 	rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2630) 	/* we can't take ->d_lock here; it's OK, though. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2631) 	new->d_flags |= DCACHE_PAR_LOOKUP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2632) 	new->d_wait = wq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2633) 	hlist_bl_add_head_rcu(&new->d_u.d_in_lookup_hash, b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2634) 	hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2635) 	return new;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2636) mismatch:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2637) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2638) 	dput(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2639) 	goto retry;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2640) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2641) EXPORT_SYMBOL(d_alloc_parallel);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2642) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2643) void __d_lookup_done(struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2644) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2645) 	struct hlist_bl_head *b = in_lookup_hash(dentry->d_parent,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2646) 						 dentry->d_name.hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2647) 	hlist_bl_lock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2648) 	dentry->d_flags &= ~DCACHE_PAR_LOOKUP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2649) 	__hlist_bl_del(&dentry->d_u.d_in_lookup_hash);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2650) 	wake_up_all(dentry->d_wait);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2651) 	dentry->d_wait = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2652) 	hlist_bl_unlock(b);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2653) 	INIT_HLIST_NODE(&dentry->d_u.d_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2654) 	INIT_LIST_HEAD(&dentry->d_lru);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2655) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2656) EXPORT_SYMBOL(__d_lookup_done);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2657) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2658) /* inode->i_lock held if inode is non-NULL */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2659) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2660) static inline void __d_add(struct dentry *dentry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2661) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2662) 	struct inode *dir = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2663) 	unsigned n;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2664) 	spin_lock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2665) 	if (unlikely(d_in_lookup(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2666) 		dir = dentry->d_parent->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2667) 		n = start_dir_add(dir);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2668) 		__d_lookup_done(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2669) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2670) 	if (inode) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2671) 		unsigned add_flags = d_flags_for_inode(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2672) 		hlist_add_head(&dentry->d_u.d_alias, &inode->i_dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2673) 		raw_write_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2674) 		__d_set_inode_and_type(dentry, inode, add_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2675) 		raw_write_seqcount_end(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2676) 		fsnotify_update_flags(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2677) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2678) 	__d_rehash(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2679) 	if (dir)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2680) 		end_dir_add(dir, n);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2681) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2682) 	if (inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2683) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2684) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2685) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2686) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2687)  * d_add - add dentry to hash queues
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2688)  * @entry: dentry to add
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2689)  * @inode: The inode to attach to this dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2690)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2691)  * This adds the entry to the hash queues and initializes @inode.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2692)  * The entry was actually filled in earlier during d_alloc().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2693)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2694) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2695) void d_add(struct dentry *entry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2696) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2697) 	if (inode) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2698) 		security_d_instantiate(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2699) 		spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2700) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2701) 	__d_add(entry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2702) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2703) EXPORT_SYMBOL(d_add);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2704) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2705) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2706)  * d_exact_alias - find and hash an exact unhashed alias
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2707)  * @entry: dentry to add
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2708)  * @inode: The inode to go with this dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2709)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2710)  * If an unhashed dentry with the same name/parent and desired
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2711)  * inode already exists, hash and return it.  Otherwise, return
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2712)  * NULL.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2713)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2714)  * Parent directory should be locked.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2715)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2716) struct dentry *d_exact_alias(struct dentry *entry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2717) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2718) 	struct dentry *alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2719) 	unsigned int hash = entry->d_name.hash;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2720) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2721) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2722) 	hlist_for_each_entry(alias, &inode->i_dentry, d_u.d_alias) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2723) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2724) 		 * Don't need alias->d_lock here, because aliases with
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2725) 		 * d_parent == entry->d_parent are not subject to name or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2726) 		 * parent changes, because the parent inode i_mutex is held.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2727) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2728) 		if (alias->d_name.hash != hash)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2729) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2730) 		if (alias->d_parent != entry->d_parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2731) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2732) 		if (!d_same_name(alias, entry->d_parent, &entry->d_name))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2733) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2734) 		spin_lock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2735) 		if (!d_unhashed(alias)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2736) 			spin_unlock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2737) 			alias = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2738) 		} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2739) 			__dget_dlock(alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2740) 			__d_rehash(alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2741) 			spin_unlock(&alias->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2742) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2743) 		spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2744) 		return alias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2745) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2746) 	spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2747) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2748) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2749) EXPORT_SYMBOL(d_exact_alias);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2750) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2751) static void swap_names(struct dentry *dentry, struct dentry *target)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2752) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2753) 	if (unlikely(dname_external(target))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2754) 		if (unlikely(dname_external(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2755) 			/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2756) 			 * Both external: swap the pointers
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2757) 			 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2758) 			swap(target->d_name.name, dentry->d_name.name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2759) 		} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2760) 			/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2761) 			 * dentry:internal, target:external.  Steal target's
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2762) 			 * storage and make target internal.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2763) 			 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2764) 			memcpy(target->d_iname, dentry->d_name.name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2765) 					dentry->d_name.len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2766) 			dentry->d_name.name = target->d_name.name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2767) 			target->d_name.name = target->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2768) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2769) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2770) 		if (unlikely(dname_external(dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2771) 			/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2772) 			 * dentry:external, target:internal.  Give dentry's
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2773) 			 * storage to target and make dentry internal
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2774) 			 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2775) 			memcpy(dentry->d_iname, target->d_name.name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2776) 					target->d_name.len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2777) 			target->d_name.name = dentry->d_name.name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2778) 			dentry->d_name.name = dentry->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2779) 		} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2780) 			/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2781) 			 * Both are internal.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2782) 			 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2783) 			unsigned int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2784) 			BUILD_BUG_ON(!IS_ALIGNED(DNAME_INLINE_LEN, sizeof(long)));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2785) 			for (i = 0; i < DNAME_INLINE_LEN / sizeof(long); i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2786) 				swap(((long *) &dentry->d_iname)[i],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2787) 				     ((long *) &target->d_iname)[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2788) 			}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2789) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2790) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2791) 	swap(dentry->d_name.hash_len, target->d_name.hash_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2792) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2793) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2794) static void copy_name(struct dentry *dentry, struct dentry *target)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2795) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2796) 	struct external_name *old_name = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2797) 	if (unlikely(dname_external(dentry)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2798) 		old_name = external_name(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2799) 	if (unlikely(dname_external(target))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2800) 		atomic_inc(&external_name(target)->u.count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2801) 		dentry->d_name = target->d_name;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2802) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2803) 		memcpy(dentry->d_iname, target->d_name.name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2804) 				target->d_name.len + 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2805) 		dentry->d_name.name = dentry->d_iname;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2806) 		dentry->d_name.hash_len = target->d_name.hash_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2807) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2808) 	if (old_name && likely(atomic_dec_and_test(&old_name->u.count)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2809) 		kfree_rcu(old_name, u.head);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2810) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2811) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2812) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2813)  * __d_move - move a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2814)  * @dentry: entry to move
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2815)  * @target: new dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2816)  * @exchange: exchange the two dentries
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2817)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2818)  * Update the dcache to reflect the move of a file name. Negative
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2819)  * dcache entries should not be moved in this way. Caller must hold
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2820)  * rename_lock, the i_mutex of the source and target directories,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2821)  * and the sb->s_vfs_rename_mutex if they differ. See lock_rename().
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2822)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2823) static void __d_move(struct dentry *dentry, struct dentry *target,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2824) 		     bool exchange)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2825) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2826) 	struct dentry *old_parent, *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2827) 	struct inode *dir = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2828) 	unsigned n;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2829) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2830) 	WARN_ON(!dentry->d_inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2831) 	if (WARN_ON(dentry == target))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2832) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2833) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2834) 	BUG_ON(d_ancestor(target, dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2835) 	old_parent = dentry->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2836) 	p = d_ancestor(old_parent, target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2837) 	if (IS_ROOT(dentry)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2838) 		BUG_ON(p);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2839) 		spin_lock(&target->d_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2840) 	} else if (!p) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2841) 		/* target is not a descendent of dentry->d_parent */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2842) 		spin_lock(&target->d_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2843) 		spin_lock_nested(&old_parent->d_lock, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2844) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2845) 		BUG_ON(p == dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2846) 		spin_lock(&old_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2847) 		if (p != target)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2848) 			spin_lock_nested(&target->d_parent->d_lock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2849) 					DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2850) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2851) 	spin_lock_nested(&dentry->d_lock, 2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2852) 	spin_lock_nested(&target->d_lock, 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2853) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2854) 	if (unlikely(d_in_lookup(target))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2855) 		dir = target->d_parent->d_inode;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2856) 		n = start_dir_add(dir);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2857) 		__d_lookup_done(target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2858) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2859) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2860) 	write_seqcount_begin(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2861) 	write_seqcount_begin_nested(&target->d_seq, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2862) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2863) 	/* unhash both */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2864) 	if (!d_unhashed(dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2865) 		___d_drop(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2866) 	if (!d_unhashed(target))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2867) 		___d_drop(target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2868) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2869) 	/* ... and switch them in the tree */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2870) 	dentry->d_parent = target->d_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2871) 	if (!exchange) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2872) 		copy_name(dentry, target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2873) 		target->d_hash.pprev = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2874) 		dentry->d_parent->d_lockref.count++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2875) 		if (dentry != old_parent) /* wasn't IS_ROOT */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2876) 			WARN_ON(!--old_parent->d_lockref.count);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2877) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2878) 		target->d_parent = old_parent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2879) 		swap_names(dentry, target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2880) 		list_move(&target->d_child, &target->d_parent->d_subdirs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2881) 		__d_rehash(target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2882) 		fsnotify_update_flags(target);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2883) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2884) 	list_move(&dentry->d_child, &dentry->d_parent->d_subdirs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2885) 	__d_rehash(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2886) 	fsnotify_update_flags(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2887) 	fscrypt_handle_d_move(dentry);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2888) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2889) 	write_seqcount_end(&target->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2890) 	write_seqcount_end(&dentry->d_seq);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2891) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2892) 	if (dir)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2893) 		end_dir_add(dir, n);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2894) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2895) 	if (dentry->d_parent != old_parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2896) 		spin_unlock(&dentry->d_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2897) 	if (dentry != old_parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2898) 		spin_unlock(&old_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2899) 	spin_unlock(&target->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2900) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2901) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2902) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2903) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2904)  * d_move - move a dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2905)  * @dentry: entry to move
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2906)  * @target: new dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2907)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2908)  * Update the dcache to reflect the move of a file name. Negative
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2909)  * dcache entries should not be moved in this way. See the locking
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2910)  * requirements for __d_move.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2911)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2912) void d_move(struct dentry *dentry, struct dentry *target)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2913) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2914) 	write_seqlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2915) 	__d_move(dentry, target, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2916) 	write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2917) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2918) EXPORT_SYMBOL(d_move);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2919) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2920) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2921)  * d_exchange - exchange two dentries
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2922)  * @dentry1: first dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2923)  * @dentry2: second dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2924)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2925) void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2926) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2927) 	write_seqlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2928) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2929) 	WARN_ON(!dentry1->d_inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2930) 	WARN_ON(!dentry2->d_inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2931) 	WARN_ON(IS_ROOT(dentry1));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2932) 	WARN_ON(IS_ROOT(dentry2));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2933) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2934) 	__d_move(dentry1, dentry2, true);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2935) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2936) 	write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2937) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2938) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2939) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2940)  * d_ancestor - search for an ancestor
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2941)  * @p1: ancestor dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2942)  * @p2: child dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2943)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2944)  * Returns the ancestor dentry of p2 which is a child of p1, if p1 is
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2945)  * an ancestor of p2, else NULL.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2946)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2947) struct dentry *d_ancestor(struct dentry *p1, struct dentry *p2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2948) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2949) 	struct dentry *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2950) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2951) 	for (p = p2; !IS_ROOT(p); p = p->d_parent) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2952) 		if (p->d_parent == p1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2953) 			return p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2954) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2955) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2956) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2957) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2958) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2959)  * This helper attempts to cope with remotely renamed directories
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2960)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2961)  * It assumes that the caller is already holding
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2962)  * dentry->d_parent->d_inode->i_mutex, and rename_lock
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2963)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2964)  * Note: If ever the locking in lock_rename() changes, then please
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2965)  * remember to update this too...
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2966)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2967) static int __d_unalias(struct inode *inode,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2968) 		struct dentry *dentry, struct dentry *alias)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2969) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2970) 	struct mutex *m1 = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2971) 	struct rw_semaphore *m2 = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2972) 	int ret = -ESTALE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2973) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2974) 	/* If alias and dentry share a parent, then no extra locks required */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2975) 	if (alias->d_parent == dentry->d_parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2976) 		goto out_unalias;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2977) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2978) 	/* See lock_rename() */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2979) 	if (!mutex_trylock(&dentry->d_sb->s_vfs_rename_mutex))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2980) 		goto out_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2981) 	m1 = &dentry->d_sb->s_vfs_rename_mutex;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2982) 	if (!inode_trylock_shared(alias->d_parent->d_inode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2983) 		goto out_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2984) 	m2 = &alias->d_parent->d_inode->i_rwsem;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2985) out_unalias:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2986) 	__d_move(alias, dentry, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2987) 	ret = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2988) out_err:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2989) 	if (m2)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2990) 		up_read(m2);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2991) 	if (m1)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2992) 		mutex_unlock(m1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2993) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2994) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2995) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2996) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2997)  * d_splice_alias - splice a disconnected dentry into the tree if one exists
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2998)  * @inode:  the inode which may have a disconnected dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2999)  * @dentry: a negative dentry which we want to point to the inode.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3000)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3001)  * If inode is a directory and has an IS_ROOT alias, then d_move that in
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3002)  * place of the given dentry and return it, else simply d_add the inode
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3003)  * to the dentry and return NULL.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3004)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3005)  * If a non-IS_ROOT directory is found, the filesystem is corrupt, and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3006)  * we should error out: directories can't have multiple aliases.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3007)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3008)  * This is needed in the lookup routine of any filesystem that is exportable
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3009)  * (via knfsd) so that we can build dcache paths to directories effectively.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3010)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3011)  * If a dentry was found and moved, then it is returned.  Otherwise NULL
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3012)  * is returned.  This matches the expected return value of ->lookup.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3013)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3014)  * Cluster filesystems may call this function with a negative, hashed dentry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3015)  * In that case, we know that the inode will be a regular file, and also this
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3016)  * will only occur during atomic_open. So we need to check for the dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3017)  * being already hashed only in the final case.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3018)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3019) struct dentry *d_splice_alias(struct inode *inode, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3020) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3021) 	if (IS_ERR(inode))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3022) 		return ERR_CAST(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3023) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3024) 	BUG_ON(!d_unhashed(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3025) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3026) 	if (!inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3027) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3028) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3029) 	security_d_instantiate(dentry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3030) 	spin_lock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3031) 	if (S_ISDIR(inode->i_mode)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3032) 		struct dentry *new = __d_find_any_alias(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3033) 		if (unlikely(new)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3034) 			/* The reference to new ensures it remains an alias */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3035) 			spin_unlock(&inode->i_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3036) 			write_seqlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3037) 			if (unlikely(d_ancestor(new, dentry))) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3038) 				write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3039) 				dput(new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3040) 				new = ERR_PTR(-ELOOP);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3041) 				pr_warn_ratelimited(
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3042) 					"VFS: Lookup of '%s' in %s %s"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3043) 					" would have caused loop\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3044) 					dentry->d_name.name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3045) 					inode->i_sb->s_type->name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3046) 					inode->i_sb->s_id);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3047) 			} else if (!IS_ROOT(new)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3048) 				struct dentry *old_parent = dget(new->d_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3049) 				int err = __d_unalias(inode, dentry, new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3050) 				write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3051) 				if (err) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3052) 					dput(new);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3053) 					new = ERR_PTR(err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3054) 				}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3055) 				dput(old_parent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3056) 			} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3057) 				__d_move(new, dentry, false);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3058) 				write_sequnlock(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3059) 			}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3060) 			iput(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3061) 			return new;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3062) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3063) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3064) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3065) 	__d_add(dentry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3066) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3067) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3068) EXPORT_SYMBOL_NS(d_splice_alias, ANDROID_GKI_VFS_EXPORT_ONLY);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3069) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3070) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3071)  * Test whether new_dentry is a subdirectory of old_dentry.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3072)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3073)  * Trivially implemented using the dcache structure
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3074)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3075) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3076) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3077)  * is_subdir - is new dentry a subdirectory of old_dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3078)  * @new_dentry: new dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3079)  * @old_dentry: old dentry
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3080)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3081)  * Returns true if new_dentry is a subdirectory of the parent (at any depth).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3082)  * Returns false otherwise.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3083)  * Caller must ensure that "new_dentry" is pinned before calling is_subdir()
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3084)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3085)   
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3086) bool is_subdir(struct dentry *new_dentry, struct dentry *old_dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3087) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3088) 	bool result;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3089) 	unsigned seq;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3090) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3091) 	if (new_dentry == old_dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3092) 		return true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3093) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3094) 	do {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3095) 		/* for restarting inner loop in case of seq retry */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3096) 		seq = read_seqbegin(&rename_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3097) 		/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3098) 		 * Need rcu_readlock to protect against the d_parent trashing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3099) 		 * due to d_move
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3100) 		 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3101) 		rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3102) 		if (d_ancestor(old_dentry, new_dentry))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3103) 			result = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3104) 		else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3105) 			result = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3106) 		rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3107) 	} while (read_seqretry(&rename_lock, seq));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3108) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3109) 	return result;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3110) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3111) EXPORT_SYMBOL(is_subdir);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3112) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3113) static enum d_walk_ret d_genocide_kill(void *data, struct dentry *dentry)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3114) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3115) 	struct dentry *root = data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3116) 	if (dentry != root) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3117) 		if (d_unhashed(dentry) || !dentry->d_inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3118) 			return D_WALK_SKIP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3119) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3120) 		if (!(dentry->d_flags & DCACHE_GENOCIDE)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3121) 			dentry->d_flags |= DCACHE_GENOCIDE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3122) 			dentry->d_lockref.count--;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3123) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3124) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3125) 	return D_WALK_CONTINUE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3126) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3127) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3128) void d_genocide(struct dentry *parent)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3129) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3130) 	d_walk(parent, parent, d_genocide_kill);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3131) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3132) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3133) EXPORT_SYMBOL(d_genocide);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3134) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3135) void d_tmpfile(struct dentry *dentry, struct inode *inode)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3136) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3137) 	inode_dec_link_count(inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3138) 	BUG_ON(dentry->d_name.name != dentry->d_iname ||
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3139) 		!hlist_unhashed(&dentry->d_u.d_alias) ||
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3140) 		!d_unlinked(dentry));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3141) 	spin_lock(&dentry->d_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3142) 	spin_lock_nested(&dentry->d_lock, DENTRY_D_LOCK_NESTED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3143) 	dentry->d_name.len = sprintf(dentry->d_iname, "#%llu",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3144) 				(unsigned long long)inode->i_ino);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3145) 	spin_unlock(&dentry->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3146) 	spin_unlock(&dentry->d_parent->d_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3147) 	d_instantiate(dentry, inode);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3148) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3149) EXPORT_SYMBOL(d_tmpfile);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3150) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3151) static __initdata unsigned long dhash_entries;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3152) static int __init set_dhash_entries(char *str)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3153) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3154) 	if (!str)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3155) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3156) 	dhash_entries = simple_strtoul(str, &str, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3157) 	return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3158) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3159) __setup("dhash_entries=", set_dhash_entries);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3160) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3161) static void __init dcache_init_early(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3162) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3163) 	/* If hashes are distributed across NUMA nodes, defer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3164) 	 * hash allocation until vmalloc space is available.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3165) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3166) 	if (hashdist)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3167) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3168) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3169) 	dentry_hashtable =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3170) 		alloc_large_system_hash("Dentry cache",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3171) 					sizeof(struct hlist_bl_head),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3172) 					dhash_entries,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3173) 					13,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3174) 					HASH_EARLY | HASH_ZERO,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3175) 					&d_hash_shift,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3176) 					NULL,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3177) 					0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3178) 					0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3179) 	d_hash_shift = 32 - d_hash_shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3180) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3181) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3182) static void __init dcache_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3183) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3184) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3185) 	 * A constructor could be added for stable state like the lists,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3186) 	 * but it is probably not worth it because of the cache nature
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3187) 	 * of the dcache.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3188) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3189) 	dentry_cache = KMEM_CACHE_USERCOPY(dentry,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3190) 		SLAB_RECLAIM_ACCOUNT|SLAB_PANIC|SLAB_MEM_SPREAD|SLAB_ACCOUNT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3191) 		d_iname);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3192) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3193) 	/* Hash may have been set up in dcache_init_early */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3194) 	if (!hashdist)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3195) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3196) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3197) 	dentry_hashtable =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3198) 		alloc_large_system_hash("Dentry cache",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3199) 					sizeof(struct hlist_bl_head),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3200) 					dhash_entries,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3201) 					13,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3202) 					HASH_ZERO,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3203) 					&d_hash_shift,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3204) 					NULL,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3205) 					0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3206) 					0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3207) 	d_hash_shift = 32 - d_hash_shift;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3208) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3209) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3210) /* SLAB cache for __getname() consumers */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3211) struct kmem_cache *names_cachep __read_mostly;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3212) EXPORT_SYMBOL(names_cachep);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3213) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3214) void __init vfs_caches_init_early(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3215) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3216) 	int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3217) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3218) 	for (i = 0; i < ARRAY_SIZE(in_lookup_hashtable); i++)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3219) 		INIT_HLIST_BL_HEAD(&in_lookup_hashtable[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3220) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3221) 	dcache_init_early();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3222) 	inode_init_early();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3223) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3224) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3225) void __init vfs_caches_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3226) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3227) 	names_cachep = kmem_cache_create_usercopy("names_cache", PATH_MAX, 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3228) 			SLAB_HWCACHE_ALIGN|SLAB_PANIC, 0, PATH_MAX, NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3229) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3230) 	dcache_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3231) 	inode_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3232) 	files_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3233) 	files_maxfiles_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3234) 	mnt_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3235) 	bdev_cache_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3236) 	chrdev_init();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3237) }