Merge branch 'locking-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-2.6-block.git] / mm / shmem.c
CommitLineData
1da177e4
LT
1/*
2 * Resizable virtual memory filesystem for Linux.
3 *
4 * Copyright (C) 2000 Linus Torvalds.
5 * 2000 Transmeta Corp.
6 * 2000-2001 Christoph Rohland
7 * 2000-2001 SAP AG
8 * 2002 Red Hat Inc.
6922c0c7
HD
9 * Copyright (C) 2002-2011 Hugh Dickins.
10 * Copyright (C) 2011 Google Inc.
0edd73b3 11 * Copyright (C) 2002-2005 VERITAS Software Corporation.
1da177e4
LT
12 * Copyright (C) 2004 Andi Kleen, SuSE Labs
13 *
14 * Extended attribute support for tmpfs:
15 * Copyright (c) 2004, Luke Kenneth Casson Leighton <lkcl@lkcl.net>
16 * Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
17 *
853ac43a
MM
18 * tiny-shmem:
19 * Copyright (c) 2004, 2008 Matt Mackall <mpm@selenic.com>
20 *
1da177e4
LT
21 * This file is released under the GPL.
22 */
23
853ac43a
MM
24#include <linux/fs.h>
25#include <linux/init.h>
26#include <linux/vfs.h>
27#include <linux/mount.h>
250297ed 28#include <linux/ramfs.h>
caefba17 29#include <linux/pagemap.h>
853ac43a
MM
30#include <linux/file.h>
31#include <linux/mm.h>
b95f1b31 32#include <linux/export.h>
853ac43a 33#include <linux/swap.h>
e2e40f2c 34#include <linux/uio.h>
853ac43a
MM
35
36static struct vfsmount *shm_mnt;
37
38#ifdef CONFIG_SHMEM
1da177e4
LT
39/*
40 * This virtual memory filesystem is heavily based on the ramfs. It
41 * extends ramfs by the ability to use swap and honor resource limits
42 * which makes it a completely usable filesystem.
43 */
44
39f0247d 45#include <linux/xattr.h>
a5694255 46#include <linux/exportfs.h>
1c7c474c 47#include <linux/posix_acl.h>
feda821e 48#include <linux/posix_acl_xattr.h>
1da177e4 49#include <linux/mman.h>
1da177e4
LT
50#include <linux/string.h>
51#include <linux/slab.h>
52#include <linux/backing-dev.h>
53#include <linux/shmem_fs.h>
1da177e4 54#include <linux/writeback.h>
1da177e4 55#include <linux/blkdev.h>
bda97eab 56#include <linux/pagevec.h>
41ffe5d5 57#include <linux/percpu_counter.h>
83e4fa9c 58#include <linux/falloc.h>
708e3508 59#include <linux/splice.h>
1da177e4
LT
60#include <linux/security.h>
61#include <linux/swapops.h>
62#include <linux/mempolicy.h>
63#include <linux/namei.h>
b00dc3ad 64#include <linux/ctype.h>
304dbdb7 65#include <linux/migrate.h>
c1f60a5a 66#include <linux/highmem.h>
680d794b 67#include <linux/seq_file.h>
92562927 68#include <linux/magic.h>
9183df25 69#include <linux/syscalls.h>
40e041a2 70#include <linux/fcntl.h>
9183df25 71#include <uapi/linux/memfd.h>
304dbdb7 72
1da177e4 73#include <asm/uaccess.h>
1da177e4
LT
74#include <asm/pgtable.h>
75
dd56b046
MG
76#include "internal.h"
77
09cbfeaf
KS
78#define BLOCKS_PER_PAGE (PAGE_SIZE/512)
79#define VM_ACCT(size) (PAGE_ALIGN(size) >> PAGE_SHIFT)
1da177e4 80
1da177e4
LT
81/* Pretend that each entry is of this size in directory's i_size */
82#define BOGO_DIRENT_SIZE 20
83
69f07ec9
HD
84/* Symlink up to this size is kmalloc'ed instead of using a swappable page */
85#define SHORT_SYMLINK_LEN 128
86
1aac1400 87/*
f00cdc6d
HD
88 * shmem_fallocate communicates with shmem_fault or shmem_writepage via
89 * inode->i_private (with i_mutex making sure that it has only one user at
90 * a time): we would prefer not to enlarge the shmem inode just for that.
1aac1400
HD
91 */
92struct shmem_falloc {
8e205f77 93 wait_queue_head_t *waitq; /* faults into hole wait for punch to end */
1aac1400
HD
94 pgoff_t start; /* start of range currently being fallocated */
95 pgoff_t next; /* the next page offset to be fallocated */
96 pgoff_t nr_falloced; /* how many new pages have been fallocated */
97 pgoff_t nr_unswapped; /* how often writepage refused to swap out */
98};
99
285b2c4f 100/* Flag allocation requirements to shmem_getpage */
1da177e4 101enum sgp_type {
1da177e4
LT
102 SGP_READ, /* don't exceed i_size, don't allocate page */
103 SGP_CACHE, /* don't exceed i_size, may allocate page */
a0ee5ec5 104 SGP_DIRTY, /* like SGP_CACHE, but set new page dirty */
1635f6a7
HD
105 SGP_WRITE, /* may exceed i_size, may allocate !Uptodate page */
106 SGP_FALLOC, /* like SGP_WRITE, but make existing page Uptodate */
1da177e4
LT
107};
108
b76db735 109#ifdef CONFIG_TMPFS
680d794b 110static unsigned long shmem_default_max_blocks(void)
111{
112 return totalram_pages / 2;
113}
114
115static unsigned long shmem_default_max_inodes(void)
116{
117 return min(totalram_pages - totalhigh_pages, totalram_pages / 2);
118}
b76db735 119#endif
680d794b 120
bde05d1c
HD
121static bool shmem_should_replace_page(struct page *page, gfp_t gfp);
122static int shmem_replace_page(struct page **pagep, gfp_t gfp,
123 struct shmem_inode_info *info, pgoff_t index);
68da9f05
HD
124static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
125 struct page **pagep, enum sgp_type sgp, gfp_t gfp, int *fault_type);
126
127static inline int shmem_getpage(struct inode *inode, pgoff_t index,
128 struct page **pagep, enum sgp_type sgp, int *fault_type)
129{
130 return shmem_getpage_gfp(inode, index, pagep, sgp,
131 mapping_gfp_mask(inode->i_mapping), fault_type);
132}
1da177e4 133
1da177e4
LT
134static inline struct shmem_sb_info *SHMEM_SB(struct super_block *sb)
135{
136 return sb->s_fs_info;
137}
138
139/*
140 * shmem_file_setup pre-accounts the whole fixed size of a VM object,
141 * for shared memory and for shared anonymous (/dev/zero) mappings
142 * (unless MAP_NORESERVE and sysctl_overcommit_memory <= 1),
143 * consistent with the pre-accounting of private mappings ...
144 */
145static inline int shmem_acct_size(unsigned long flags, loff_t size)
146{
0b0a0806 147 return (flags & VM_NORESERVE) ?
191c5424 148 0 : security_vm_enough_memory_mm(current->mm, VM_ACCT(size));
1da177e4
LT
149}
150
151static inline void shmem_unacct_size(unsigned long flags, loff_t size)
152{
0b0a0806 153 if (!(flags & VM_NORESERVE))
1da177e4
LT
154 vm_unacct_memory(VM_ACCT(size));
155}
156
77142517
KK
157static inline int shmem_reacct_size(unsigned long flags,
158 loff_t oldsize, loff_t newsize)
159{
160 if (!(flags & VM_NORESERVE)) {
161 if (VM_ACCT(newsize) > VM_ACCT(oldsize))
162 return security_vm_enough_memory_mm(current->mm,
163 VM_ACCT(newsize) - VM_ACCT(oldsize));
164 else if (VM_ACCT(newsize) < VM_ACCT(oldsize))
165 vm_unacct_memory(VM_ACCT(oldsize) - VM_ACCT(newsize));
166 }
167 return 0;
168}
169
1da177e4
LT
170/*
171 * ... whereas tmpfs objects are accounted incrementally as
172 * pages are allocated, in order to allow huge sparse files.
173 * shmem_getpage reports shmem_acct_block failure as -ENOSPC not -ENOMEM,
174 * so that a failure on a sparse tmpfs mapping will give SIGBUS not OOM.
175 */
176static inline int shmem_acct_block(unsigned long flags)
177{
0b0a0806 178 return (flags & VM_NORESERVE) ?
09cbfeaf 179 security_vm_enough_memory_mm(current->mm, VM_ACCT(PAGE_SIZE)) : 0;
1da177e4
LT
180}
181
182static inline void shmem_unacct_blocks(unsigned long flags, long pages)
183{
0b0a0806 184 if (flags & VM_NORESERVE)
09cbfeaf 185 vm_unacct_memory(pages * VM_ACCT(PAGE_SIZE));
1da177e4
LT
186}
187
759b9775 188static const struct super_operations shmem_ops;
f5e54d6e 189static const struct address_space_operations shmem_aops;
15ad7cdc 190static const struct file_operations shmem_file_operations;
92e1d5be
AV
191static const struct inode_operations shmem_inode_operations;
192static const struct inode_operations shmem_dir_inode_operations;
193static const struct inode_operations shmem_special_inode_operations;
f0f37e2f 194static const struct vm_operations_struct shmem_vm_ops;
1da177e4 195
1da177e4 196static LIST_HEAD(shmem_swaplist);
cb5f7b9a 197static DEFINE_MUTEX(shmem_swaplist_mutex);
1da177e4 198
5b04c689
PE
199static int shmem_reserve_inode(struct super_block *sb)
200{
201 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
202 if (sbinfo->max_inodes) {
203 spin_lock(&sbinfo->stat_lock);
204 if (!sbinfo->free_inodes) {
205 spin_unlock(&sbinfo->stat_lock);
206 return -ENOSPC;
207 }
208 sbinfo->free_inodes--;
209 spin_unlock(&sbinfo->stat_lock);
210 }
211 return 0;
212}
213
214static void shmem_free_inode(struct super_block *sb)
215{
216 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
217 if (sbinfo->max_inodes) {
218 spin_lock(&sbinfo->stat_lock);
219 sbinfo->free_inodes++;
220 spin_unlock(&sbinfo->stat_lock);
221 }
222}
223
46711810 224/**
41ffe5d5 225 * shmem_recalc_inode - recalculate the block usage of an inode
1da177e4
LT
226 * @inode: inode to recalc
227 *
228 * We have to calculate the free blocks since the mm can drop
229 * undirtied hole pages behind our back.
230 *
231 * But normally info->alloced == inode->i_mapping->nrpages + info->swapped
232 * So mm freed is info->alloced - (inode->i_mapping->nrpages + info->swapped)
233 *
234 * It has to be called with the spinlock held.
235 */
236static void shmem_recalc_inode(struct inode *inode)
237{
238 struct shmem_inode_info *info = SHMEM_I(inode);
239 long freed;
240
241 freed = info->alloced - info->swapped - inode->i_mapping->nrpages;
242 if (freed > 0) {
54af6042
HD
243 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
244 if (sbinfo->max_blocks)
245 percpu_counter_add(&sbinfo->used_blocks, -freed);
1da177e4 246 info->alloced -= freed;
54af6042 247 inode->i_blocks -= freed * BLOCKS_PER_PAGE;
1da177e4 248 shmem_unacct_blocks(info->flags, freed);
1da177e4
LT
249 }
250}
251
7a5d0fbb
HD
252/*
253 * Replace item expected in radix tree by a new item, while holding tree lock.
254 */
255static int shmem_radix_tree_replace(struct address_space *mapping,
256 pgoff_t index, void *expected, void *replacement)
257{
258 void **pslot;
6dbaf22c 259 void *item;
7a5d0fbb
HD
260
261 VM_BUG_ON(!expected);
6dbaf22c 262 VM_BUG_ON(!replacement);
7a5d0fbb 263 pslot = radix_tree_lookup_slot(&mapping->page_tree, index);
6dbaf22c
JW
264 if (!pslot)
265 return -ENOENT;
266 item = radix_tree_deref_slot_protected(pslot, &mapping->tree_lock);
7a5d0fbb
HD
267 if (item != expected)
268 return -ENOENT;
6dbaf22c 269 radix_tree_replace_slot(pslot, replacement);
7a5d0fbb
HD
270 return 0;
271}
272
d1899228
HD
273/*
274 * Sometimes, before we decide whether to proceed or to fail, we must check
275 * that an entry was not already brought back from swap by a racing thread.
276 *
277 * Checking page is not enough: by the time a SwapCache page is locked, it
278 * might be reused, and again be SwapCache, using the same swap as before.
279 */
280static bool shmem_confirm_swap(struct address_space *mapping,
281 pgoff_t index, swp_entry_t swap)
282{
283 void *item;
284
285 rcu_read_lock();
286 item = radix_tree_lookup(&mapping->page_tree, index);
287 rcu_read_unlock();
288 return item == swp_to_radix_entry(swap);
289}
290
46f65ec1
HD
291/*
292 * Like add_to_page_cache_locked, but error if expected item has gone.
293 */
294static int shmem_add_to_page_cache(struct page *page,
295 struct address_space *mapping,
fed400a1 296 pgoff_t index, void *expected)
46f65ec1 297{
b065b432 298 int error;
46f65ec1 299
309381fe
SL
300 VM_BUG_ON_PAGE(!PageLocked(page), page);
301 VM_BUG_ON_PAGE(!PageSwapBacked(page), page);
46f65ec1 302
09cbfeaf 303 get_page(page);
b065b432
HD
304 page->mapping = mapping;
305 page->index = index;
306
307 spin_lock_irq(&mapping->tree_lock);
46f65ec1 308 if (!expected)
b065b432
HD
309 error = radix_tree_insert(&mapping->page_tree, index, page);
310 else
311 error = shmem_radix_tree_replace(mapping, index, expected,
312 page);
46f65ec1 313 if (!error) {
b065b432
HD
314 mapping->nrpages++;
315 __inc_zone_page_state(page, NR_FILE_PAGES);
316 __inc_zone_page_state(page, NR_SHMEM);
317 spin_unlock_irq(&mapping->tree_lock);
318 } else {
319 page->mapping = NULL;
320 spin_unlock_irq(&mapping->tree_lock);
09cbfeaf 321 put_page(page);
46f65ec1 322 }
46f65ec1
HD
323 return error;
324}
325
6922c0c7
HD
326/*
327 * Like delete_from_page_cache, but substitutes swap for page.
328 */
329static void shmem_delete_from_page_cache(struct page *page, void *radswap)
330{
331 struct address_space *mapping = page->mapping;
332 int error;
333
334 spin_lock_irq(&mapping->tree_lock);
335 error = shmem_radix_tree_replace(mapping, page->index, page, radswap);
336 page->mapping = NULL;
337 mapping->nrpages--;
338 __dec_zone_page_state(page, NR_FILE_PAGES);
339 __dec_zone_page_state(page, NR_SHMEM);
340 spin_unlock_irq(&mapping->tree_lock);
09cbfeaf 341 put_page(page);
6922c0c7
HD
342 BUG_ON(error);
343}
344
7a5d0fbb
HD
345/*
346 * Remove swap entry from radix tree, free the swap and its page cache.
347 */
348static int shmem_free_swap(struct address_space *mapping,
349 pgoff_t index, void *radswap)
350{
6dbaf22c 351 void *old;
7a5d0fbb
HD
352
353 spin_lock_irq(&mapping->tree_lock);
6dbaf22c 354 old = radix_tree_delete_item(&mapping->page_tree, index, radswap);
7a5d0fbb 355 spin_unlock_irq(&mapping->tree_lock);
6dbaf22c
JW
356 if (old != radswap)
357 return -ENOENT;
358 free_swap_and_cache(radix_to_swp_entry(radswap));
359 return 0;
7a5d0fbb
HD
360}
361
6a15a370
VB
362/*
363 * Determine (in bytes) how many of the shmem object's pages mapped by the
48131e03 364 * given offsets are swapped out.
6a15a370
VB
365 *
366 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
367 * as long as the inode doesn't go away and racy results are not a problem.
368 */
48131e03
VB
369unsigned long shmem_partial_swap_usage(struct address_space *mapping,
370 pgoff_t start, pgoff_t end)
6a15a370 371{
6a15a370
VB
372 struct radix_tree_iter iter;
373 void **slot;
374 struct page *page;
48131e03 375 unsigned long swapped = 0;
6a15a370
VB
376
377 rcu_read_lock();
378
6a15a370
VB
379 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
380 if (iter.index >= end)
381 break;
382
383 page = radix_tree_deref_slot(slot);
384
2cf938aa
MW
385 if (radix_tree_deref_retry(page)) {
386 slot = radix_tree_iter_retry(&iter);
387 continue;
388 }
6a15a370
VB
389
390 if (radix_tree_exceptional_entry(page))
391 swapped++;
392
393 if (need_resched()) {
394 cond_resched_rcu();
7165092f 395 slot = radix_tree_iter_next(&iter);
6a15a370
VB
396 }
397 }
398
399 rcu_read_unlock();
400
401 return swapped << PAGE_SHIFT;
402}
403
48131e03
VB
404/*
405 * Determine (in bytes) how many of the shmem object's pages mapped by the
406 * given vma is swapped out.
407 *
408 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
409 * as long as the inode doesn't go away and racy results are not a problem.
410 */
411unsigned long shmem_swap_usage(struct vm_area_struct *vma)
412{
413 struct inode *inode = file_inode(vma->vm_file);
414 struct shmem_inode_info *info = SHMEM_I(inode);
415 struct address_space *mapping = inode->i_mapping;
416 unsigned long swapped;
417
418 /* Be careful as we don't hold info->lock */
419 swapped = READ_ONCE(info->swapped);
420
421 /*
422 * The easier cases are when the shmem object has nothing in swap, or
423 * the vma maps it whole. Then we can simply use the stats that we
424 * already track.
425 */
426 if (!swapped)
427 return 0;
428
429 if (!vma->vm_pgoff && vma->vm_end - vma->vm_start >= inode->i_size)
430 return swapped << PAGE_SHIFT;
431
432 /* Here comes the more involved part */
433 return shmem_partial_swap_usage(mapping,
434 linear_page_index(vma, vma->vm_start),
435 linear_page_index(vma, vma->vm_end));
436}
437
24513264
HD
438/*
439 * SysV IPC SHM_UNLOCK restore Unevictable pages to their evictable lists.
440 */
441void shmem_unlock_mapping(struct address_space *mapping)
442{
443 struct pagevec pvec;
444 pgoff_t indices[PAGEVEC_SIZE];
445 pgoff_t index = 0;
446
447 pagevec_init(&pvec, 0);
448 /*
449 * Minor point, but we might as well stop if someone else SHM_LOCKs it.
450 */
451 while (!mapping_unevictable(mapping)) {
452 /*
453 * Avoid pagevec_lookup(): find_get_pages() returns 0 as if it
454 * has finished, if it hits a row of PAGEVEC_SIZE swap entries.
455 */
0cd6144a
JW
456 pvec.nr = find_get_entries(mapping, index,
457 PAGEVEC_SIZE, pvec.pages, indices);
24513264
HD
458 if (!pvec.nr)
459 break;
460 index = indices[pvec.nr - 1] + 1;
0cd6144a 461 pagevec_remove_exceptionals(&pvec);
24513264
HD
462 check_move_unevictable_pages(pvec.pages, pvec.nr);
463 pagevec_release(&pvec);
464 cond_resched();
465 }
7a5d0fbb
HD
466}
467
468/*
469 * Remove range of pages and swap entries from radix tree, and free them.
1635f6a7 470 * If !unfalloc, truncate or punch hole; if unfalloc, undo failed fallocate.
7a5d0fbb 471 */
1635f6a7
HD
472static void shmem_undo_range(struct inode *inode, loff_t lstart, loff_t lend,
473 bool unfalloc)
1da177e4 474{
285b2c4f 475 struct address_space *mapping = inode->i_mapping;
1da177e4 476 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf
KS
477 pgoff_t start = (lstart + PAGE_SIZE - 1) >> PAGE_SHIFT;
478 pgoff_t end = (lend + 1) >> PAGE_SHIFT;
479 unsigned int partial_start = lstart & (PAGE_SIZE - 1);
480 unsigned int partial_end = (lend + 1) & (PAGE_SIZE - 1);
bda97eab 481 struct pagevec pvec;
7a5d0fbb
HD
482 pgoff_t indices[PAGEVEC_SIZE];
483 long nr_swaps_freed = 0;
285b2c4f 484 pgoff_t index;
bda97eab
HD
485 int i;
486
83e4fa9c
HD
487 if (lend == -1)
488 end = -1; /* unsigned, so actually very big */
bda97eab
HD
489
490 pagevec_init(&pvec, 0);
491 index = start;
83e4fa9c 492 while (index < end) {
0cd6144a
JW
493 pvec.nr = find_get_entries(mapping, index,
494 min(end - index, (pgoff_t)PAGEVEC_SIZE),
495 pvec.pages, indices);
7a5d0fbb
HD
496 if (!pvec.nr)
497 break;
bda97eab
HD
498 for (i = 0; i < pagevec_count(&pvec); i++) {
499 struct page *page = pvec.pages[i];
500
7a5d0fbb 501 index = indices[i];
83e4fa9c 502 if (index >= end)
bda97eab
HD
503 break;
504
7a5d0fbb 505 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
506 if (unfalloc)
507 continue;
7a5d0fbb
HD
508 nr_swaps_freed += !shmem_free_swap(mapping,
509 index, page);
bda97eab 510 continue;
7a5d0fbb
HD
511 }
512
513 if (!trylock_page(page))
bda97eab 514 continue;
1635f6a7
HD
515 if (!unfalloc || !PageUptodate(page)) {
516 if (page->mapping == mapping) {
309381fe 517 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7
HD
518 truncate_inode_page(mapping, page);
519 }
bda97eab 520 }
bda97eab
HD
521 unlock_page(page);
522 }
0cd6144a 523 pagevec_remove_exceptionals(&pvec);
24513264 524 pagevec_release(&pvec);
bda97eab
HD
525 cond_resched();
526 index++;
527 }
1da177e4 528
83e4fa9c 529 if (partial_start) {
bda97eab
HD
530 struct page *page = NULL;
531 shmem_getpage(inode, start - 1, &page, SGP_READ, NULL);
532 if (page) {
09cbfeaf 533 unsigned int top = PAGE_SIZE;
83e4fa9c
HD
534 if (start > end) {
535 top = partial_end;
536 partial_end = 0;
537 }
538 zero_user_segment(page, partial_start, top);
539 set_page_dirty(page);
540 unlock_page(page);
09cbfeaf 541 put_page(page);
83e4fa9c
HD
542 }
543 }
544 if (partial_end) {
545 struct page *page = NULL;
546 shmem_getpage(inode, end, &page, SGP_READ, NULL);
547 if (page) {
548 zero_user_segment(page, 0, partial_end);
bda97eab
HD
549 set_page_dirty(page);
550 unlock_page(page);
09cbfeaf 551 put_page(page);
bda97eab
HD
552 }
553 }
83e4fa9c
HD
554 if (start >= end)
555 return;
bda97eab
HD
556
557 index = start;
b1a36650 558 while (index < end) {
bda97eab 559 cond_resched();
0cd6144a
JW
560
561 pvec.nr = find_get_entries(mapping, index,
83e4fa9c 562 min(end - index, (pgoff_t)PAGEVEC_SIZE),
0cd6144a 563 pvec.pages, indices);
7a5d0fbb 564 if (!pvec.nr) {
b1a36650
HD
565 /* If all gone or hole-punch or unfalloc, we're done */
566 if (index == start || end != -1)
bda97eab 567 break;
b1a36650 568 /* But if truncating, restart to make sure all gone */
bda97eab
HD
569 index = start;
570 continue;
571 }
bda97eab
HD
572 for (i = 0; i < pagevec_count(&pvec); i++) {
573 struct page *page = pvec.pages[i];
574
7a5d0fbb 575 index = indices[i];
83e4fa9c 576 if (index >= end)
bda97eab
HD
577 break;
578
7a5d0fbb 579 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
580 if (unfalloc)
581 continue;
b1a36650
HD
582 if (shmem_free_swap(mapping, index, page)) {
583 /* Swap was replaced by page: retry */
584 index--;
585 break;
586 }
587 nr_swaps_freed++;
7a5d0fbb
HD
588 continue;
589 }
590
bda97eab 591 lock_page(page);
1635f6a7
HD
592 if (!unfalloc || !PageUptodate(page)) {
593 if (page->mapping == mapping) {
309381fe 594 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7 595 truncate_inode_page(mapping, page);
b1a36650
HD
596 } else {
597 /* Page was replaced by swap: retry */
598 unlock_page(page);
599 index--;
600 break;
1635f6a7 601 }
7a5d0fbb 602 }
bda97eab
HD
603 unlock_page(page);
604 }
0cd6144a 605 pagevec_remove_exceptionals(&pvec);
24513264 606 pagevec_release(&pvec);
bda97eab
HD
607 index++;
608 }
94c1e62d 609
1da177e4 610 spin_lock(&info->lock);
7a5d0fbb 611 info->swapped -= nr_swaps_freed;
1da177e4
LT
612 shmem_recalc_inode(inode);
613 spin_unlock(&info->lock);
1635f6a7 614}
1da177e4 615
1635f6a7
HD
616void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
617{
618 shmem_undo_range(inode, lstart, lend, false);
285b2c4f 619 inode->i_ctime = inode->i_mtime = CURRENT_TIME;
1da177e4 620}
94c1e62d 621EXPORT_SYMBOL_GPL(shmem_truncate_range);
1da177e4 622
44a30220
YZ
623static int shmem_getattr(struct vfsmount *mnt, struct dentry *dentry,
624 struct kstat *stat)
625{
626 struct inode *inode = dentry->d_inode;
627 struct shmem_inode_info *info = SHMEM_I(inode);
628
d0424c42
HD
629 if (info->alloced - info->swapped != inode->i_mapping->nrpages) {
630 spin_lock(&info->lock);
631 shmem_recalc_inode(inode);
632 spin_unlock(&info->lock);
633 }
44a30220 634 generic_fillattr(inode, stat);
44a30220
YZ
635 return 0;
636}
637
94c1e62d 638static int shmem_setattr(struct dentry *dentry, struct iattr *attr)
1da177e4 639{
75c3cfa8 640 struct inode *inode = d_inode(dentry);
40e041a2 641 struct shmem_inode_info *info = SHMEM_I(inode);
1da177e4
LT
642 int error;
643
db78b877
CH
644 error = inode_change_ok(inode, attr);
645 if (error)
646 return error;
647
94c1e62d
HD
648 if (S_ISREG(inode->i_mode) && (attr->ia_valid & ATTR_SIZE)) {
649 loff_t oldsize = inode->i_size;
650 loff_t newsize = attr->ia_size;
3889e6e7 651
40e041a2
DH
652 /* protected by i_mutex */
653 if ((newsize < oldsize && (info->seals & F_SEAL_SHRINK)) ||
654 (newsize > oldsize && (info->seals & F_SEAL_GROW)))
655 return -EPERM;
656
94c1e62d 657 if (newsize != oldsize) {
77142517
KK
658 error = shmem_reacct_size(SHMEM_I(inode)->flags,
659 oldsize, newsize);
660 if (error)
661 return error;
94c1e62d
HD
662 i_size_write(inode, newsize);
663 inode->i_ctime = inode->i_mtime = CURRENT_TIME;
664 }
afa2db2f 665 if (newsize <= oldsize) {
94c1e62d 666 loff_t holebegin = round_up(newsize, PAGE_SIZE);
d0424c42
HD
667 if (oldsize > holebegin)
668 unmap_mapping_range(inode->i_mapping,
669 holebegin, 0, 1);
670 if (info->alloced)
671 shmem_truncate_range(inode,
672 newsize, (loff_t)-1);
94c1e62d 673 /* unmap again to remove racily COWed private pages */
d0424c42
HD
674 if (oldsize > holebegin)
675 unmap_mapping_range(inode->i_mapping,
676 holebegin, 0, 1);
94c1e62d 677 }
1da177e4
LT
678 }
679
db78b877 680 setattr_copy(inode, attr);
db78b877 681 if (attr->ia_valid & ATTR_MODE)
feda821e 682 error = posix_acl_chmod(inode, inode->i_mode);
1da177e4
LT
683 return error;
684}
685
1f895f75 686static void shmem_evict_inode(struct inode *inode)
1da177e4 687{
1da177e4
LT
688 struct shmem_inode_info *info = SHMEM_I(inode);
689
3889e6e7 690 if (inode->i_mapping->a_ops == &shmem_aops) {
1da177e4
LT
691 shmem_unacct_size(info->flags, inode->i_size);
692 inode->i_size = 0;
3889e6e7 693 shmem_truncate_range(inode, 0, (loff_t)-1);
1da177e4 694 if (!list_empty(&info->swaplist)) {
cb5f7b9a 695 mutex_lock(&shmem_swaplist_mutex);
1da177e4 696 list_del_init(&info->swaplist);
cb5f7b9a 697 mutex_unlock(&shmem_swaplist_mutex);
1da177e4 698 }
3ed47db3 699 }
b09e0fa4 700
38f38657 701 simple_xattrs_free(&info->xattrs);
0f3c42f5 702 WARN_ON(inode->i_blocks);
5b04c689 703 shmem_free_inode(inode->i_sb);
dbd5768f 704 clear_inode(inode);
1da177e4
LT
705}
706
46f65ec1
HD
707/*
708 * If swap found in inode, free it and move page from swapcache to filecache.
709 */
41ffe5d5 710static int shmem_unuse_inode(struct shmem_inode_info *info,
bde05d1c 711 swp_entry_t swap, struct page **pagep)
1da177e4 712{
285b2c4f 713 struct address_space *mapping = info->vfs_inode.i_mapping;
46f65ec1 714 void *radswap;
41ffe5d5 715 pgoff_t index;
bde05d1c
HD
716 gfp_t gfp;
717 int error = 0;
1da177e4 718
46f65ec1 719 radswap = swp_to_radix_entry(swap);
e504f3fd 720 index = radix_tree_locate_item(&mapping->page_tree, radswap);
46f65ec1 721 if (index == -1)
00501b53 722 return -EAGAIN; /* tell shmem_unuse we found nothing */
2e0e26c7 723
1b1b32f2
HD
724 /*
725 * Move _head_ to start search for next from here.
1f895f75 726 * But be careful: shmem_evict_inode checks list_empty without taking
1b1b32f2 727 * mutex, and there's an instant in list_move_tail when info->swaplist
285b2c4f 728 * would appear empty, if it were the only one on shmem_swaplist.
1b1b32f2
HD
729 */
730 if (shmem_swaplist.next != &info->swaplist)
731 list_move_tail(&shmem_swaplist, &info->swaplist);
2e0e26c7 732
bde05d1c
HD
733 gfp = mapping_gfp_mask(mapping);
734 if (shmem_should_replace_page(*pagep, gfp)) {
735 mutex_unlock(&shmem_swaplist_mutex);
736 error = shmem_replace_page(pagep, gfp, info, index);
737 mutex_lock(&shmem_swaplist_mutex);
738 /*
739 * We needed to drop mutex to make that restrictive page
0142ef6c
HD
740 * allocation, but the inode might have been freed while we
741 * dropped it: although a racing shmem_evict_inode() cannot
742 * complete without emptying the radix_tree, our page lock
743 * on this swapcache page is not enough to prevent that -
744 * free_swap_and_cache() of our swap entry will only
745 * trylock_page(), removing swap from radix_tree whatever.
746 *
747 * We must not proceed to shmem_add_to_page_cache() if the
748 * inode has been freed, but of course we cannot rely on
749 * inode or mapping or info to check that. However, we can
750 * safely check if our swap entry is still in use (and here
751 * it can't have got reused for another page): if it's still
752 * in use, then the inode cannot have been freed yet, and we
753 * can safely proceed (if it's no longer in use, that tells
754 * nothing about the inode, but we don't need to unuse swap).
bde05d1c
HD
755 */
756 if (!page_swapcount(*pagep))
757 error = -ENOENT;
758 }
759
d13d1443 760 /*
778dd893
HD
761 * We rely on shmem_swaplist_mutex, not only to protect the swaplist,
762 * but also to hold up shmem_evict_inode(): so inode cannot be freed
763 * beneath us (pagelock doesn't help until the page is in pagecache).
d13d1443 764 */
bde05d1c
HD
765 if (!error)
766 error = shmem_add_to_page_cache(*pagep, mapping, index,
fed400a1 767 radswap);
48f170fb 768 if (error != -ENOMEM) {
46f65ec1
HD
769 /*
770 * Truncation and eviction use free_swap_and_cache(), which
771 * only does trylock page: if we raced, best clean up here.
772 */
bde05d1c
HD
773 delete_from_swap_cache(*pagep);
774 set_page_dirty(*pagep);
46f65ec1
HD
775 if (!error) {
776 spin_lock(&info->lock);
777 info->swapped--;
778 spin_unlock(&info->lock);
779 swap_free(swap);
780 }
1da177e4 781 }
2e0e26c7 782 return error;
1da177e4
LT
783}
784
785/*
46f65ec1 786 * Search through swapped inodes to find and replace swap by page.
1da177e4 787 */
41ffe5d5 788int shmem_unuse(swp_entry_t swap, struct page *page)
1da177e4 789{
41ffe5d5 790 struct list_head *this, *next;
1da177e4 791 struct shmem_inode_info *info;
00501b53 792 struct mem_cgroup *memcg;
bde05d1c
HD
793 int error = 0;
794
795 /*
796 * There's a faint possibility that swap page was replaced before
0142ef6c 797 * caller locked it: caller will come back later with the right page.
bde05d1c 798 */
0142ef6c 799 if (unlikely(!PageSwapCache(page) || page_private(page) != swap.val))
bde05d1c 800 goto out;
778dd893
HD
801
802 /*
803 * Charge page using GFP_KERNEL while we can wait, before taking
804 * the shmem_swaplist_mutex which might hold up shmem_writepage().
805 * Charged back to the user (not to caller) when swap account is used.
778dd893 806 */
f627c2f5
KS
807 error = mem_cgroup_try_charge(page, current->mm, GFP_KERNEL, &memcg,
808 false);
778dd893
HD
809 if (error)
810 goto out;
46f65ec1 811 /* No radix_tree_preload: swap entry keeps a place for page in tree */
00501b53 812 error = -EAGAIN;
1da177e4 813
cb5f7b9a 814 mutex_lock(&shmem_swaplist_mutex);
41ffe5d5
HD
815 list_for_each_safe(this, next, &shmem_swaplist) {
816 info = list_entry(this, struct shmem_inode_info, swaplist);
285b2c4f 817 if (info->swapped)
00501b53 818 error = shmem_unuse_inode(info, swap, &page);
6922c0c7
HD
819 else
820 list_del_init(&info->swaplist);
cb5f7b9a 821 cond_resched();
00501b53 822 if (error != -EAGAIN)
778dd893 823 break;
00501b53 824 /* found nothing in this: move on to search the next */
1da177e4 825 }
cb5f7b9a 826 mutex_unlock(&shmem_swaplist_mutex);
778dd893 827
00501b53
JW
828 if (error) {
829 if (error != -ENOMEM)
830 error = 0;
f627c2f5 831 mem_cgroup_cancel_charge(page, memcg, false);
00501b53 832 } else
f627c2f5 833 mem_cgroup_commit_charge(page, memcg, true, false);
778dd893 834out:
aaa46865 835 unlock_page(page);
09cbfeaf 836 put_page(page);
778dd893 837 return error;
1da177e4
LT
838}
839
840/*
841 * Move the page from the page cache to the swap cache.
842 */
843static int shmem_writepage(struct page *page, struct writeback_control *wbc)
844{
845 struct shmem_inode_info *info;
1da177e4 846 struct address_space *mapping;
1da177e4 847 struct inode *inode;
6922c0c7
HD
848 swp_entry_t swap;
849 pgoff_t index;
1da177e4
LT
850
851 BUG_ON(!PageLocked(page));
1da177e4
LT
852 mapping = page->mapping;
853 index = page->index;
854 inode = mapping->host;
855 info = SHMEM_I(inode);
856 if (info->flags & VM_LOCKED)
857 goto redirty;
d9fe526a 858 if (!total_swap_pages)
1da177e4
LT
859 goto redirty;
860
d9fe526a 861 /*
97b713ba
CH
862 * Our capabilities prevent regular writeback or sync from ever calling
863 * shmem_writepage; but a stacking filesystem might use ->writepage of
864 * its underlying filesystem, in which case tmpfs should write out to
865 * swap only in response to memory pressure, and not for the writeback
866 * threads or sync.
d9fe526a 867 */
48f170fb
HD
868 if (!wbc->for_reclaim) {
869 WARN_ON_ONCE(1); /* Still happens? Tell us about it! */
870 goto redirty;
871 }
1635f6a7
HD
872
873 /*
874 * This is somewhat ridiculous, but without plumbing a SWAP_MAP_FALLOC
875 * value into swapfile.c, the only way we can correctly account for a
876 * fallocated page arriving here is now to initialize it and write it.
1aac1400
HD
877 *
878 * That's okay for a page already fallocated earlier, but if we have
879 * not yet completed the fallocation, then (a) we want to keep track
880 * of this page in case we have to undo it, and (b) it may not be a
881 * good idea to continue anyway, once we're pushing into swap. So
882 * reactivate the page, and let shmem_fallocate() quit when too many.
1635f6a7
HD
883 */
884 if (!PageUptodate(page)) {
1aac1400
HD
885 if (inode->i_private) {
886 struct shmem_falloc *shmem_falloc;
887 spin_lock(&inode->i_lock);
888 shmem_falloc = inode->i_private;
889 if (shmem_falloc &&
8e205f77 890 !shmem_falloc->waitq &&
1aac1400
HD
891 index >= shmem_falloc->start &&
892 index < shmem_falloc->next)
893 shmem_falloc->nr_unswapped++;
894 else
895 shmem_falloc = NULL;
896 spin_unlock(&inode->i_lock);
897 if (shmem_falloc)
898 goto redirty;
899 }
1635f6a7
HD
900 clear_highpage(page);
901 flush_dcache_page(page);
902 SetPageUptodate(page);
903 }
904
48f170fb
HD
905 swap = get_swap_page();
906 if (!swap.val)
907 goto redirty;
d9fe526a 908
37e84351
VD
909 if (mem_cgroup_try_charge_swap(page, swap))
910 goto free_swap;
911
b1dea800
HD
912 /*
913 * Add inode to shmem_unuse()'s list of swapped-out inodes,
6922c0c7
HD
914 * if it's not already there. Do it now before the page is
915 * moved to swap cache, when its pagelock no longer protects
b1dea800 916 * the inode from eviction. But don't unlock the mutex until
6922c0c7
HD
917 * we've incremented swapped, because shmem_unuse_inode() will
918 * prune a !swapped inode from the swaplist under this mutex.
b1dea800 919 */
48f170fb
HD
920 mutex_lock(&shmem_swaplist_mutex);
921 if (list_empty(&info->swaplist))
922 list_add_tail(&info->swaplist, &shmem_swaplist);
b1dea800 923
48f170fb 924 if (add_to_swap_cache(page, swap, GFP_ATOMIC) == 0) {
6922c0c7 925 spin_lock(&info->lock);
6922c0c7 926 shmem_recalc_inode(inode);
267a4c76 927 info->swapped++;
826267cf 928 spin_unlock(&info->lock);
6922c0c7 929
267a4c76
HD
930 swap_shmem_alloc(swap);
931 shmem_delete_from_page_cache(page, swp_to_radix_entry(swap));
932
6922c0c7 933 mutex_unlock(&shmem_swaplist_mutex);
d9fe526a 934 BUG_ON(page_mapped(page));
9fab5619 935 swap_writepage(page, wbc);
1da177e4
LT
936 return 0;
937 }
938
6922c0c7 939 mutex_unlock(&shmem_swaplist_mutex);
37e84351 940free_swap:
0a31bc97 941 swapcache_free(swap);
1da177e4
LT
942redirty:
943 set_page_dirty(page);
d9fe526a
HD
944 if (wbc->for_reclaim)
945 return AOP_WRITEPAGE_ACTIVATE; /* Return with page locked */
946 unlock_page(page);
947 return 0;
1da177e4
LT
948}
949
950#ifdef CONFIG_NUMA
680d794b 951#ifdef CONFIG_TMPFS
71fe804b 952static void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
680d794b 953{
095f1fc4 954 char buffer[64];
680d794b 955
71fe804b 956 if (!mpol || mpol->mode == MPOL_DEFAULT)
095f1fc4 957 return; /* show nothing */
680d794b 958
a7a88b23 959 mpol_to_str(buffer, sizeof(buffer), mpol);
095f1fc4
LS
960
961 seq_printf(seq, ",mpol=%s", buffer);
680d794b 962}
71fe804b
LS
963
964static struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
965{
966 struct mempolicy *mpol = NULL;
967 if (sbinfo->mpol) {
968 spin_lock(&sbinfo->stat_lock); /* prevent replace/use races */
969 mpol = sbinfo->mpol;
970 mpol_get(mpol);
971 spin_unlock(&sbinfo->stat_lock);
972 }
973 return mpol;
974}
680d794b 975#endif /* CONFIG_TMPFS */
976
41ffe5d5
HD
977static struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,
978 struct shmem_inode_info *info, pgoff_t index)
1da177e4 979{
1da177e4 980 struct vm_area_struct pvma;
18a2f371 981 struct page *page;
52cd3b07 982
1da177e4 983 /* Create a pseudo vma that just contains the policy */
c4cc6d07 984 pvma.vm_start = 0;
09c231cb
NZ
985 /* Bias interleave by inode number to distribute better across nodes */
986 pvma.vm_pgoff = index + info->vfs_inode.i_ino;
c4cc6d07 987 pvma.vm_ops = NULL;
18a2f371
MG
988 pvma.vm_policy = mpol_shared_policy_lookup(&info->policy, index);
989
990 page = swapin_readahead(swap, gfp, &pvma, 0);
991
992 /* Drop reference taken by mpol_shared_policy_lookup() */
993 mpol_cond_put(pvma.vm_policy);
994
995 return page;
1da177e4
LT
996}
997
02098fea 998static struct page *shmem_alloc_page(gfp_t gfp,
41ffe5d5 999 struct shmem_inode_info *info, pgoff_t index)
1da177e4
LT
1000{
1001 struct vm_area_struct pvma;
18a2f371 1002 struct page *page;
1da177e4 1003
c4cc6d07
HD
1004 /* Create a pseudo vma that just contains the policy */
1005 pvma.vm_start = 0;
09c231cb
NZ
1006 /* Bias interleave by inode number to distribute better across nodes */
1007 pvma.vm_pgoff = index + info->vfs_inode.i_ino;
c4cc6d07 1008 pvma.vm_ops = NULL;
41ffe5d5 1009 pvma.vm_policy = mpol_shared_policy_lookup(&info->policy, index);
52cd3b07 1010
18a2f371
MG
1011 page = alloc_page_vma(gfp, &pvma, 0);
1012
1013 /* Drop reference taken by mpol_shared_policy_lookup() */
1014 mpol_cond_put(pvma.vm_policy);
1015
1016 return page;
1da177e4 1017}
680d794b 1018#else /* !CONFIG_NUMA */
1019#ifdef CONFIG_TMPFS
41ffe5d5 1020static inline void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
680d794b 1021{
1022}
1023#endif /* CONFIG_TMPFS */
1024
41ffe5d5
HD
1025static inline struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,
1026 struct shmem_inode_info *info, pgoff_t index)
1da177e4 1027{
41ffe5d5 1028 return swapin_readahead(swap, gfp, NULL, 0);
1da177e4
LT
1029}
1030
02098fea 1031static inline struct page *shmem_alloc_page(gfp_t gfp,
41ffe5d5 1032 struct shmem_inode_info *info, pgoff_t index)
1da177e4 1033{
e84e2e13 1034 return alloc_page(gfp);
1da177e4 1035}
680d794b 1036#endif /* CONFIG_NUMA */
1da177e4 1037
71fe804b
LS
1038#if !defined(CONFIG_NUMA) || !defined(CONFIG_TMPFS)
1039static inline struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
1040{
1041 return NULL;
1042}
1043#endif
1044
bde05d1c
HD
1045/*
1046 * When a page is moved from swapcache to shmem filecache (either by the
1047 * usual swapin of shmem_getpage_gfp(), or by the less common swapoff of
1048 * shmem_unuse_inode()), it may have been read in earlier from swap, in
1049 * ignorance of the mapping it belongs to. If that mapping has special
1050 * constraints (like the gma500 GEM driver, which requires RAM below 4GB),
1051 * we may need to copy to a suitable page before moving to filecache.
1052 *
1053 * In a future release, this may well be extended to respect cpuset and
1054 * NUMA mempolicy, and applied also to anonymous pages in do_swap_page();
1055 * but for now it is a simple matter of zone.
1056 */
1057static bool shmem_should_replace_page(struct page *page, gfp_t gfp)
1058{
1059 return page_zonenum(page) > gfp_zone(gfp);
1060}
1061
1062static int shmem_replace_page(struct page **pagep, gfp_t gfp,
1063 struct shmem_inode_info *info, pgoff_t index)
1064{
1065 struct page *oldpage, *newpage;
1066 struct address_space *swap_mapping;
1067 pgoff_t swap_index;
1068 int error;
1069
1070 oldpage = *pagep;
1071 swap_index = page_private(oldpage);
1072 swap_mapping = page_mapping(oldpage);
1073
1074 /*
1075 * We have arrived here because our zones are constrained, so don't
1076 * limit chance of success by further cpuset and node constraints.
1077 */
1078 gfp &= ~GFP_CONSTRAINT_MASK;
1079 newpage = shmem_alloc_page(gfp, info, index);
1080 if (!newpage)
1081 return -ENOMEM;
bde05d1c 1082
09cbfeaf 1083 get_page(newpage);
bde05d1c 1084 copy_highpage(newpage, oldpage);
0142ef6c 1085 flush_dcache_page(newpage);
bde05d1c 1086
48c935ad 1087 __SetPageLocked(newpage);
bde05d1c 1088 SetPageUptodate(newpage);
bde05d1c 1089 SetPageSwapBacked(newpage);
bde05d1c 1090 set_page_private(newpage, swap_index);
bde05d1c
HD
1091 SetPageSwapCache(newpage);
1092
1093 /*
1094 * Our caller will very soon move newpage out of swapcache, but it's
1095 * a nice clean interface for us to replace oldpage by newpage there.
1096 */
1097 spin_lock_irq(&swap_mapping->tree_lock);
1098 error = shmem_radix_tree_replace(swap_mapping, swap_index, oldpage,
1099 newpage);
0142ef6c
HD
1100 if (!error) {
1101 __inc_zone_page_state(newpage, NR_FILE_PAGES);
1102 __dec_zone_page_state(oldpage, NR_FILE_PAGES);
1103 }
bde05d1c 1104 spin_unlock_irq(&swap_mapping->tree_lock);
bde05d1c 1105
0142ef6c
HD
1106 if (unlikely(error)) {
1107 /*
1108 * Is this possible? I think not, now that our callers check
1109 * both PageSwapCache and page_private after getting page lock;
1110 * but be defensive. Reverse old to newpage for clear and free.
1111 */
1112 oldpage = newpage;
1113 } else {
6a93ca8f 1114 mem_cgroup_migrate(oldpage, newpage);
0142ef6c
HD
1115 lru_cache_add_anon(newpage);
1116 *pagep = newpage;
1117 }
bde05d1c
HD
1118
1119 ClearPageSwapCache(oldpage);
1120 set_page_private(oldpage, 0);
1121
1122 unlock_page(oldpage);
09cbfeaf
KS
1123 put_page(oldpage);
1124 put_page(oldpage);
0142ef6c 1125 return error;
bde05d1c
HD
1126}
1127
1da177e4 1128/*
68da9f05 1129 * shmem_getpage_gfp - find page in cache, or get from swap, or allocate
1da177e4
LT
1130 *
1131 * If we allocate a new one we do not mark it dirty. That's up to the
1132 * vm. If we swap it in we mark it dirty since we also free the swap
1133 * entry since a page cannot live in both the swap and page cache
1134 */
41ffe5d5 1135static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
68da9f05 1136 struct page **pagep, enum sgp_type sgp, gfp_t gfp, int *fault_type)
1da177e4
LT
1137{
1138 struct address_space *mapping = inode->i_mapping;
54af6042 1139 struct shmem_inode_info *info;
1da177e4 1140 struct shmem_sb_info *sbinfo;
00501b53 1141 struct mem_cgroup *memcg;
27ab7006 1142 struct page *page;
1da177e4
LT
1143 swp_entry_t swap;
1144 int error;
54af6042 1145 int once = 0;
1635f6a7 1146 int alloced = 0;
1da177e4 1147
09cbfeaf 1148 if (index > (MAX_LFS_FILESIZE >> PAGE_SHIFT))
1da177e4 1149 return -EFBIG;
1da177e4 1150repeat:
54af6042 1151 swap.val = 0;
0cd6144a 1152 page = find_lock_entry(mapping, index);
54af6042
HD
1153 if (radix_tree_exceptional_entry(page)) {
1154 swap = radix_to_swp_entry(page);
1155 page = NULL;
1156 }
1157
1635f6a7 1158 if (sgp != SGP_WRITE && sgp != SGP_FALLOC &&
09cbfeaf 1159 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
54af6042 1160 error = -EINVAL;
267a4c76 1161 goto unlock;
54af6042
HD
1162 }
1163
66d2f4d2
HD
1164 if (page && sgp == SGP_WRITE)
1165 mark_page_accessed(page);
1166
1635f6a7
HD
1167 /* fallocated page? */
1168 if (page && !PageUptodate(page)) {
1169 if (sgp != SGP_READ)
1170 goto clear;
1171 unlock_page(page);
09cbfeaf 1172 put_page(page);
1635f6a7
HD
1173 page = NULL;
1174 }
54af6042 1175 if (page || (sgp == SGP_READ && !swap.val)) {
54af6042
HD
1176 *pagep = page;
1177 return 0;
27ab7006
HD
1178 }
1179
1180 /*
54af6042
HD
1181 * Fast cache lookup did not find it:
1182 * bring it back from swap or allocate.
27ab7006 1183 */
54af6042
HD
1184 info = SHMEM_I(inode);
1185 sbinfo = SHMEM_SB(inode->i_sb);
1da177e4 1186
1da177e4
LT
1187 if (swap.val) {
1188 /* Look it up and read it in.. */
27ab7006
HD
1189 page = lookup_swap_cache(swap);
1190 if (!page) {
1da177e4 1191 /* here we actually do the io */
68da9f05
HD
1192 if (fault_type)
1193 *fault_type |= VM_FAULT_MAJOR;
41ffe5d5 1194 page = shmem_swapin(swap, gfp, info, index);
27ab7006 1195 if (!page) {
54af6042
HD
1196 error = -ENOMEM;
1197 goto failed;
1da177e4 1198 }
1da177e4
LT
1199 }
1200
1201 /* We have to do this with page locked to prevent races */
54af6042 1202 lock_page(page);
0142ef6c 1203 if (!PageSwapCache(page) || page_private(page) != swap.val ||
d1899228 1204 !shmem_confirm_swap(mapping, index, swap)) {
bde05d1c 1205 error = -EEXIST; /* try again */
d1899228 1206 goto unlock;
bde05d1c 1207 }
27ab7006 1208 if (!PageUptodate(page)) {
1da177e4 1209 error = -EIO;
54af6042 1210 goto failed;
1da177e4 1211 }
54af6042
HD
1212 wait_on_page_writeback(page);
1213
bde05d1c
HD
1214 if (shmem_should_replace_page(page, gfp)) {
1215 error = shmem_replace_page(&page, gfp, info, index);
1216 if (error)
1217 goto failed;
1da177e4 1218 }
27ab7006 1219
f627c2f5
KS
1220 error = mem_cgroup_try_charge(page, current->mm, gfp, &memcg,
1221 false);
d1899228 1222 if (!error) {
aa3b1895 1223 error = shmem_add_to_page_cache(page, mapping, index,
fed400a1 1224 swp_to_radix_entry(swap));
215c02bc
HD
1225 /*
1226 * We already confirmed swap under page lock, and make
1227 * no memory allocation here, so usually no possibility
1228 * of error; but free_swap_and_cache() only trylocks a
1229 * page, so it is just possible that the entry has been
1230 * truncated or holepunched since swap was confirmed.
1231 * shmem_undo_range() will have done some of the
1232 * unaccounting, now delete_from_swap_cache() will do
93aa7d95 1233 * the rest.
215c02bc
HD
1234 * Reset swap.val? No, leave it so "failed" goes back to
1235 * "repeat": reading a hole and writing should succeed.
1236 */
00501b53 1237 if (error) {
f627c2f5 1238 mem_cgroup_cancel_charge(page, memcg, false);
215c02bc 1239 delete_from_swap_cache(page);
00501b53 1240 }
d1899228 1241 }
54af6042
HD
1242 if (error)
1243 goto failed;
1244
f627c2f5 1245 mem_cgroup_commit_charge(page, memcg, true, false);
00501b53 1246
54af6042 1247 spin_lock(&info->lock);
285b2c4f 1248 info->swapped--;
54af6042 1249 shmem_recalc_inode(inode);
27ab7006 1250 spin_unlock(&info->lock);
54af6042 1251
66d2f4d2
HD
1252 if (sgp == SGP_WRITE)
1253 mark_page_accessed(page);
1254
54af6042 1255 delete_from_swap_cache(page);
27ab7006
HD
1256 set_page_dirty(page);
1257 swap_free(swap);
1258
54af6042
HD
1259 } else {
1260 if (shmem_acct_block(info->flags)) {
1261 error = -ENOSPC;
1262 goto failed;
1da177e4 1263 }
0edd73b3 1264 if (sbinfo->max_blocks) {
fc5da22a 1265 if (percpu_counter_compare(&sbinfo->used_blocks,
54af6042
HD
1266 sbinfo->max_blocks) >= 0) {
1267 error = -ENOSPC;
1268 goto unacct;
1269 }
7e496299 1270 percpu_counter_inc(&sbinfo->used_blocks);
54af6042 1271 }
1da177e4 1272
54af6042
HD
1273 page = shmem_alloc_page(gfp, info, index);
1274 if (!page) {
1275 error = -ENOMEM;
1276 goto decused;
1da177e4
LT
1277 }
1278
07a42788 1279 __SetPageSwapBacked(page);
48c935ad 1280 __SetPageLocked(page);
66d2f4d2 1281 if (sgp == SGP_WRITE)
eb39d618 1282 __SetPageReferenced(page);
66d2f4d2 1283
f627c2f5
KS
1284 error = mem_cgroup_try_charge(page, current->mm, gfp, &memcg,
1285 false);
54af6042
HD
1286 if (error)
1287 goto decused;
5e4c0d97 1288 error = radix_tree_maybe_preload(gfp & GFP_RECLAIM_MASK);
b065b432
HD
1289 if (!error) {
1290 error = shmem_add_to_page_cache(page, mapping, index,
fed400a1 1291 NULL);
b065b432
HD
1292 radix_tree_preload_end();
1293 }
1294 if (error) {
f627c2f5 1295 mem_cgroup_cancel_charge(page, memcg, false);
b065b432
HD
1296 goto decused;
1297 }
f627c2f5 1298 mem_cgroup_commit_charge(page, memcg, false, false);
54af6042
HD
1299 lru_cache_add_anon(page);
1300
1301 spin_lock(&info->lock);
1da177e4 1302 info->alloced++;
54af6042
HD
1303 inode->i_blocks += BLOCKS_PER_PAGE;
1304 shmem_recalc_inode(inode);
1da177e4 1305 spin_unlock(&info->lock);
1635f6a7 1306 alloced = true;
54af6042 1307
ec9516fb 1308 /*
1635f6a7
HD
1309 * Let SGP_FALLOC use the SGP_WRITE optimization on a new page.
1310 */
1311 if (sgp == SGP_FALLOC)
1312 sgp = SGP_WRITE;
1313clear:
1314 /*
1315 * Let SGP_WRITE caller clear ends if write does not fill page;
1316 * but SGP_FALLOC on a page fallocated earlier must initialize
1317 * it now, lest undo on failure cancel our earlier guarantee.
ec9516fb
HD
1318 */
1319 if (sgp != SGP_WRITE) {
1320 clear_highpage(page);
1321 flush_dcache_page(page);
1322 SetPageUptodate(page);
1323 }
a0ee5ec5 1324 if (sgp == SGP_DIRTY)
27ab7006 1325 set_page_dirty(page);
1da177e4 1326 }
bde05d1c 1327
54af6042 1328 /* Perhaps the file has been truncated since we checked */
1635f6a7 1329 if (sgp != SGP_WRITE && sgp != SGP_FALLOC &&
09cbfeaf 1330 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
267a4c76
HD
1331 if (alloced) {
1332 ClearPageDirty(page);
1333 delete_from_page_cache(page);
1334 spin_lock(&info->lock);
1335 shmem_recalc_inode(inode);
1336 spin_unlock(&info->lock);
1337 }
54af6042 1338 error = -EINVAL;
267a4c76 1339 goto unlock;
e83c32e8 1340 }
54af6042
HD
1341 *pagep = page;
1342 return 0;
1da177e4 1343
59a16ead 1344 /*
54af6042 1345 * Error recovery.
59a16ead 1346 */
54af6042
HD
1347decused:
1348 if (sbinfo->max_blocks)
1349 percpu_counter_add(&sbinfo->used_blocks, -1);
1350unacct:
1351 shmem_unacct_blocks(info->flags, 1);
1352failed:
267a4c76 1353 if (swap.val && !shmem_confirm_swap(mapping, index, swap))
d1899228
HD
1354 error = -EEXIST;
1355unlock:
27ab7006 1356 if (page) {
54af6042 1357 unlock_page(page);
09cbfeaf 1358 put_page(page);
54af6042
HD
1359 }
1360 if (error == -ENOSPC && !once++) {
1361 info = SHMEM_I(inode);
1362 spin_lock(&info->lock);
1363 shmem_recalc_inode(inode);
1364 spin_unlock(&info->lock);
27ab7006 1365 goto repeat;
ff36b801 1366 }
d1899228 1367 if (error == -EEXIST) /* from above or from radix_tree_insert */
54af6042
HD
1368 goto repeat;
1369 return error;
1da177e4
LT
1370}
1371
d0217ac0 1372static int shmem_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
1da177e4 1373{
496ad9aa 1374 struct inode *inode = file_inode(vma->vm_file);
1da177e4 1375 int error;
68da9f05 1376 int ret = VM_FAULT_LOCKED;
1da177e4 1377
f00cdc6d
HD
1378 /*
1379 * Trinity finds that probing a hole which tmpfs is punching can
1380 * prevent the hole-punch from ever completing: which in turn
1381 * locks writers out with its hold on i_mutex. So refrain from
8e205f77
HD
1382 * faulting pages into the hole while it's being punched. Although
1383 * shmem_undo_range() does remove the additions, it may be unable to
1384 * keep up, as each new page needs its own unmap_mapping_range() call,
1385 * and the i_mmap tree grows ever slower to scan if new vmas are added.
1386 *
1387 * It does not matter if we sometimes reach this check just before the
1388 * hole-punch begins, so that one fault then races with the punch:
1389 * we just need to make racing faults a rare case.
1390 *
1391 * The implementation below would be much simpler if we just used a
1392 * standard mutex or completion: but we cannot take i_mutex in fault,
1393 * and bloating every shmem inode for this unlikely case would be sad.
f00cdc6d
HD
1394 */
1395 if (unlikely(inode->i_private)) {
1396 struct shmem_falloc *shmem_falloc;
1397
1398 spin_lock(&inode->i_lock);
1399 shmem_falloc = inode->i_private;
8e205f77
HD
1400 if (shmem_falloc &&
1401 shmem_falloc->waitq &&
1402 vmf->pgoff >= shmem_falloc->start &&
1403 vmf->pgoff < shmem_falloc->next) {
1404 wait_queue_head_t *shmem_falloc_waitq;
1405 DEFINE_WAIT(shmem_fault_wait);
1406
1407 ret = VM_FAULT_NOPAGE;
f00cdc6d
HD
1408 if ((vmf->flags & FAULT_FLAG_ALLOW_RETRY) &&
1409 !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
8e205f77 1410 /* It's polite to up mmap_sem if we can */
f00cdc6d 1411 up_read(&vma->vm_mm->mmap_sem);
8e205f77 1412 ret = VM_FAULT_RETRY;
f00cdc6d 1413 }
8e205f77
HD
1414
1415 shmem_falloc_waitq = shmem_falloc->waitq;
1416 prepare_to_wait(shmem_falloc_waitq, &shmem_fault_wait,
1417 TASK_UNINTERRUPTIBLE);
1418 spin_unlock(&inode->i_lock);
1419 schedule();
1420
1421 /*
1422 * shmem_falloc_waitq points into the shmem_fallocate()
1423 * stack of the hole-punching task: shmem_falloc_waitq
1424 * is usually invalid by the time we reach here, but
1425 * finish_wait() does not dereference it in that case;
1426 * though i_lock needed lest racing with wake_up_all().
1427 */
1428 spin_lock(&inode->i_lock);
1429 finish_wait(shmem_falloc_waitq, &shmem_fault_wait);
1430 spin_unlock(&inode->i_lock);
1431 return ret;
f00cdc6d 1432 }
8e205f77 1433 spin_unlock(&inode->i_lock);
f00cdc6d
HD
1434 }
1435
27d54b39 1436 error = shmem_getpage(inode, vmf->pgoff, &vmf->page, SGP_CACHE, &ret);
d0217ac0
NP
1437 if (error)
1438 return ((error == -ENOMEM) ? VM_FAULT_OOM : VM_FAULT_SIGBUS);
68da9f05 1439
456f998e
YH
1440 if (ret & VM_FAULT_MAJOR) {
1441 count_vm_event(PGMAJFAULT);
1442 mem_cgroup_count_vm_event(vma->vm_mm, PGMAJFAULT);
1443 }
68da9f05 1444 return ret;
1da177e4
LT
1445}
1446
1da177e4 1447#ifdef CONFIG_NUMA
41ffe5d5 1448static int shmem_set_policy(struct vm_area_struct *vma, struct mempolicy *mpol)
1da177e4 1449{
496ad9aa 1450 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 1451 return mpol_set_shared_policy(&SHMEM_I(inode)->policy, vma, mpol);
1da177e4
LT
1452}
1453
d8dc74f2
AB
1454static struct mempolicy *shmem_get_policy(struct vm_area_struct *vma,
1455 unsigned long addr)
1da177e4 1456{
496ad9aa 1457 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 1458 pgoff_t index;
1da177e4 1459
41ffe5d5
HD
1460 index = ((addr - vma->vm_start) >> PAGE_SHIFT) + vma->vm_pgoff;
1461 return mpol_shared_policy_lookup(&SHMEM_I(inode)->policy, index);
1da177e4
LT
1462}
1463#endif
1464
1465int shmem_lock(struct file *file, int lock, struct user_struct *user)
1466{
496ad9aa 1467 struct inode *inode = file_inode(file);
1da177e4
LT
1468 struct shmem_inode_info *info = SHMEM_I(inode);
1469 int retval = -ENOMEM;
1470
1471 spin_lock(&info->lock);
1472 if (lock && !(info->flags & VM_LOCKED)) {
1473 if (!user_shm_lock(inode->i_size, user))
1474 goto out_nomem;
1475 info->flags |= VM_LOCKED;
89e004ea 1476 mapping_set_unevictable(file->f_mapping);
1da177e4
LT
1477 }
1478 if (!lock && (info->flags & VM_LOCKED) && user) {
1479 user_shm_unlock(inode->i_size, user);
1480 info->flags &= ~VM_LOCKED;
89e004ea 1481 mapping_clear_unevictable(file->f_mapping);
1da177e4
LT
1482 }
1483 retval = 0;
89e004ea 1484
1da177e4
LT
1485out_nomem:
1486 spin_unlock(&info->lock);
1487 return retval;
1488}
1489
9b83a6a8 1490static int shmem_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
1491{
1492 file_accessed(file);
1493 vma->vm_ops = &shmem_vm_ops;
1494 return 0;
1495}
1496
454abafe 1497static struct inode *shmem_get_inode(struct super_block *sb, const struct inode *dir,
09208d15 1498 umode_t mode, dev_t dev, unsigned long flags)
1da177e4
LT
1499{
1500 struct inode *inode;
1501 struct shmem_inode_info *info;
1502 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
1503
5b04c689
PE
1504 if (shmem_reserve_inode(sb))
1505 return NULL;
1da177e4
LT
1506
1507 inode = new_inode(sb);
1508 if (inode) {
85fe4025 1509 inode->i_ino = get_next_ino();
454abafe 1510 inode_init_owner(inode, dir, mode);
1da177e4 1511 inode->i_blocks = 0;
1da177e4 1512 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
91828a40 1513 inode->i_generation = get_seconds();
1da177e4
LT
1514 info = SHMEM_I(inode);
1515 memset(info, 0, (char *)inode - (char *)info);
1516 spin_lock_init(&info->lock);
40e041a2 1517 info->seals = F_SEAL_SEAL;
0b0a0806 1518 info->flags = flags & VM_NORESERVE;
1da177e4 1519 INIT_LIST_HEAD(&info->swaplist);
38f38657 1520 simple_xattrs_init(&info->xattrs);
72c04902 1521 cache_no_acl(inode);
1da177e4
LT
1522
1523 switch (mode & S_IFMT) {
1524 default:
39f0247d 1525 inode->i_op = &shmem_special_inode_operations;
1da177e4
LT
1526 init_special_inode(inode, mode, dev);
1527 break;
1528 case S_IFREG:
14fcc23f 1529 inode->i_mapping->a_ops = &shmem_aops;
1da177e4
LT
1530 inode->i_op = &shmem_inode_operations;
1531 inode->i_fop = &shmem_file_operations;
71fe804b
LS
1532 mpol_shared_policy_init(&info->policy,
1533 shmem_get_sbmpol(sbinfo));
1da177e4
LT
1534 break;
1535 case S_IFDIR:
d8c76e6f 1536 inc_nlink(inode);
1da177e4
LT
1537 /* Some things misbehave if size == 0 on a directory */
1538 inode->i_size = 2 * BOGO_DIRENT_SIZE;
1539 inode->i_op = &shmem_dir_inode_operations;
1540 inode->i_fop = &simple_dir_operations;
1541 break;
1542 case S_IFLNK:
1543 /*
1544 * Must not load anything in the rbtree,
1545 * mpol_free_shared_policy will not be called.
1546 */
71fe804b 1547 mpol_shared_policy_init(&info->policy, NULL);
1da177e4
LT
1548 break;
1549 }
5b04c689
PE
1550 } else
1551 shmem_free_inode(sb);
1da177e4
LT
1552 return inode;
1553}
1554
0cd6144a
JW
1555bool shmem_mapping(struct address_space *mapping)
1556{
f0774d88
SL
1557 if (!mapping->host)
1558 return false;
1559
97b713ba 1560 return mapping->host->i_sb->s_op == &shmem_ops;
0cd6144a
JW
1561}
1562
1da177e4 1563#ifdef CONFIG_TMPFS
92e1d5be 1564static const struct inode_operations shmem_symlink_inode_operations;
69f07ec9 1565static const struct inode_operations shmem_short_symlink_operations;
1da177e4 1566
6d9d88d0
JS
1567#ifdef CONFIG_TMPFS_XATTR
1568static int shmem_initxattrs(struct inode *, const struct xattr *, void *);
1569#else
1570#define shmem_initxattrs NULL
1571#endif
1572
1da177e4 1573static int
800d15a5
NP
1574shmem_write_begin(struct file *file, struct address_space *mapping,
1575 loff_t pos, unsigned len, unsigned flags,
1576 struct page **pagep, void **fsdata)
1da177e4 1577{
800d15a5 1578 struct inode *inode = mapping->host;
40e041a2 1579 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf 1580 pgoff_t index = pos >> PAGE_SHIFT;
40e041a2
DH
1581
1582 /* i_mutex is held by caller */
1583 if (unlikely(info->seals)) {
1584 if (info->seals & F_SEAL_WRITE)
1585 return -EPERM;
1586 if ((info->seals & F_SEAL_GROW) && pos + len > inode->i_size)
1587 return -EPERM;
1588 }
1589
66d2f4d2 1590 return shmem_getpage(inode, index, pagep, SGP_WRITE, NULL);
800d15a5
NP
1591}
1592
1593static int
1594shmem_write_end(struct file *file, struct address_space *mapping,
1595 loff_t pos, unsigned len, unsigned copied,
1596 struct page *page, void *fsdata)
1597{
1598 struct inode *inode = mapping->host;
1599
d3602444
HD
1600 if (pos + copied > inode->i_size)
1601 i_size_write(inode, pos + copied);
1602
ec9516fb 1603 if (!PageUptodate(page)) {
09cbfeaf
KS
1604 if (copied < PAGE_SIZE) {
1605 unsigned from = pos & (PAGE_SIZE - 1);
ec9516fb 1606 zero_user_segments(page, 0, from,
09cbfeaf 1607 from + copied, PAGE_SIZE);
ec9516fb
HD
1608 }
1609 SetPageUptodate(page);
1610 }
800d15a5 1611 set_page_dirty(page);
6746aff7 1612 unlock_page(page);
09cbfeaf 1613 put_page(page);
800d15a5 1614
800d15a5 1615 return copied;
1da177e4
LT
1616}
1617
2ba5bbed 1618static ssize_t shmem_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1da177e4 1619{
6e58e79d
AV
1620 struct file *file = iocb->ki_filp;
1621 struct inode *inode = file_inode(file);
1da177e4 1622 struct address_space *mapping = inode->i_mapping;
41ffe5d5
HD
1623 pgoff_t index;
1624 unsigned long offset;
a0ee5ec5 1625 enum sgp_type sgp = SGP_READ;
f7c1d074 1626 int error = 0;
cb66a7a1 1627 ssize_t retval = 0;
6e58e79d 1628 loff_t *ppos = &iocb->ki_pos;
a0ee5ec5
HD
1629
1630 /*
1631 * Might this read be for a stacking filesystem? Then when reading
1632 * holes of a sparse file, we actually need to allocate those pages,
1633 * and even mark them dirty, so it cannot exceed the max_blocks limit.
1634 */
777eda2c 1635 if (!iter_is_iovec(to))
a0ee5ec5 1636 sgp = SGP_DIRTY;
1da177e4 1637
09cbfeaf
KS
1638 index = *ppos >> PAGE_SHIFT;
1639 offset = *ppos & ~PAGE_MASK;
1da177e4
LT
1640
1641 for (;;) {
1642 struct page *page = NULL;
41ffe5d5
HD
1643 pgoff_t end_index;
1644 unsigned long nr, ret;
1da177e4
LT
1645 loff_t i_size = i_size_read(inode);
1646
09cbfeaf 1647 end_index = i_size >> PAGE_SHIFT;
1da177e4
LT
1648 if (index > end_index)
1649 break;
1650 if (index == end_index) {
09cbfeaf 1651 nr = i_size & ~PAGE_MASK;
1da177e4
LT
1652 if (nr <= offset)
1653 break;
1654 }
1655
6e58e79d
AV
1656 error = shmem_getpage(inode, index, &page, sgp, NULL);
1657 if (error) {
1658 if (error == -EINVAL)
1659 error = 0;
1da177e4
LT
1660 break;
1661 }
d3602444
HD
1662 if (page)
1663 unlock_page(page);
1da177e4
LT
1664
1665 /*
1666 * We must evaluate after, since reads (unlike writes)
1b1dcc1b 1667 * are called without i_mutex protection against truncate
1da177e4 1668 */
09cbfeaf 1669 nr = PAGE_SIZE;
1da177e4 1670 i_size = i_size_read(inode);
09cbfeaf 1671 end_index = i_size >> PAGE_SHIFT;
1da177e4 1672 if (index == end_index) {
09cbfeaf 1673 nr = i_size & ~PAGE_MASK;
1da177e4
LT
1674 if (nr <= offset) {
1675 if (page)
09cbfeaf 1676 put_page(page);
1da177e4
LT
1677 break;
1678 }
1679 }
1680 nr -= offset;
1681
1682 if (page) {
1683 /*
1684 * If users can be writing to this page using arbitrary
1685 * virtual addresses, take care about potential aliasing
1686 * before reading the page on the kernel side.
1687 */
1688 if (mapping_writably_mapped(mapping))
1689 flush_dcache_page(page);
1690 /*
1691 * Mark the page accessed if we read the beginning.
1692 */
1693 if (!offset)
1694 mark_page_accessed(page);
b5810039 1695 } else {
1da177e4 1696 page = ZERO_PAGE(0);
09cbfeaf 1697 get_page(page);
b5810039 1698 }
1da177e4
LT
1699
1700 /*
1701 * Ok, we have the page, and it's up-to-date, so
1702 * now we can copy it to user space...
1da177e4 1703 */
2ba5bbed 1704 ret = copy_page_to_iter(page, offset, nr, to);
6e58e79d 1705 retval += ret;
1da177e4 1706 offset += ret;
09cbfeaf
KS
1707 index += offset >> PAGE_SHIFT;
1708 offset &= ~PAGE_MASK;
1da177e4 1709
09cbfeaf 1710 put_page(page);
2ba5bbed 1711 if (!iov_iter_count(to))
1da177e4 1712 break;
6e58e79d
AV
1713 if (ret < nr) {
1714 error = -EFAULT;
1715 break;
1716 }
1da177e4
LT
1717 cond_resched();
1718 }
1719
09cbfeaf 1720 *ppos = ((loff_t) index << PAGE_SHIFT) + offset;
6e58e79d
AV
1721 file_accessed(file);
1722 return retval ? retval : error;
1da177e4
LT
1723}
1724
708e3508
HD
1725static ssize_t shmem_file_splice_read(struct file *in, loff_t *ppos,
1726 struct pipe_inode_info *pipe, size_t len,
1727 unsigned int flags)
1728{
1729 struct address_space *mapping = in->f_mapping;
71f0e07a 1730 struct inode *inode = mapping->host;
708e3508
HD
1731 unsigned int loff, nr_pages, req_pages;
1732 struct page *pages[PIPE_DEF_BUFFERS];
1733 struct partial_page partial[PIPE_DEF_BUFFERS];
1734 struct page *page;
1735 pgoff_t index, end_index;
1736 loff_t isize, left;
1737 int error, page_nr;
1738 struct splice_pipe_desc spd = {
1739 .pages = pages,
1740 .partial = partial,
047fe360 1741 .nr_pages_max = PIPE_DEF_BUFFERS,
708e3508
HD
1742 .flags = flags,
1743 .ops = &page_cache_pipe_buf_ops,
1744 .spd_release = spd_release_page,
1745 };
1746
71f0e07a 1747 isize = i_size_read(inode);
708e3508
HD
1748 if (unlikely(*ppos >= isize))
1749 return 0;
1750
1751 left = isize - *ppos;
1752 if (unlikely(left < len))
1753 len = left;
1754
1755 if (splice_grow_spd(pipe, &spd))
1756 return -ENOMEM;
1757
09cbfeaf
KS
1758 index = *ppos >> PAGE_SHIFT;
1759 loff = *ppos & ~PAGE_MASK;
1760 req_pages = (len + loff + PAGE_SIZE - 1) >> PAGE_SHIFT;
a786c06d 1761 nr_pages = min(req_pages, spd.nr_pages_max);
708e3508 1762
708e3508
HD
1763 spd.nr_pages = find_get_pages_contig(mapping, index,
1764 nr_pages, spd.pages);
1765 index += spd.nr_pages;
708e3508 1766 error = 0;
708e3508 1767
71f0e07a 1768 while (spd.nr_pages < nr_pages) {
71f0e07a
HD
1769 error = shmem_getpage(inode, index, &page, SGP_CACHE, NULL);
1770 if (error)
1771 break;
1772 unlock_page(page);
708e3508
HD
1773 spd.pages[spd.nr_pages++] = page;
1774 index++;
1775 }
1776
09cbfeaf 1777 index = *ppos >> PAGE_SHIFT;
708e3508
HD
1778 nr_pages = spd.nr_pages;
1779 spd.nr_pages = 0;
71f0e07a 1780
708e3508
HD
1781 for (page_nr = 0; page_nr < nr_pages; page_nr++) {
1782 unsigned int this_len;
1783
1784 if (!len)
1785 break;
1786
09cbfeaf 1787 this_len = min_t(unsigned long, len, PAGE_SIZE - loff);
708e3508
HD
1788 page = spd.pages[page_nr];
1789
71f0e07a 1790 if (!PageUptodate(page) || page->mapping != mapping) {
71f0e07a
HD
1791 error = shmem_getpage(inode, index, &page,
1792 SGP_CACHE, NULL);
1793 if (error)
708e3508 1794 break;
71f0e07a 1795 unlock_page(page);
09cbfeaf 1796 put_page(spd.pages[page_nr]);
71f0e07a 1797 spd.pages[page_nr] = page;
708e3508 1798 }
71f0e07a
HD
1799
1800 isize = i_size_read(inode);
09cbfeaf 1801 end_index = (isize - 1) >> PAGE_SHIFT;
708e3508
HD
1802 if (unlikely(!isize || index > end_index))
1803 break;
1804
708e3508
HD
1805 if (end_index == index) {
1806 unsigned int plen;
1807
09cbfeaf 1808 plen = ((isize - 1) & ~PAGE_MASK) + 1;
708e3508
HD
1809 if (plen <= loff)
1810 break;
1811
708e3508
HD
1812 this_len = min(this_len, plen - loff);
1813 len = this_len;
1814 }
1815
1816 spd.partial[page_nr].offset = loff;
1817 spd.partial[page_nr].len = this_len;
1818 len -= this_len;
1819 loff = 0;
1820 spd.nr_pages++;
1821 index++;
1822 }
1823
708e3508 1824 while (page_nr < nr_pages)
09cbfeaf 1825 put_page(spd.pages[page_nr++]);
708e3508
HD
1826
1827 if (spd.nr_pages)
1828 error = splice_to_pipe(pipe, &spd);
1829
047fe360 1830 splice_shrink_spd(&spd);
708e3508
HD
1831
1832 if (error > 0) {
1833 *ppos += error;
1834 file_accessed(in);
1835 }
1836 return error;
1837}
1838
220f2ac9
HD
1839/*
1840 * llseek SEEK_DATA or SEEK_HOLE through the radix_tree.
1841 */
1842static pgoff_t shmem_seek_hole_data(struct address_space *mapping,
965c8e59 1843 pgoff_t index, pgoff_t end, int whence)
220f2ac9
HD
1844{
1845 struct page *page;
1846 struct pagevec pvec;
1847 pgoff_t indices[PAGEVEC_SIZE];
1848 bool done = false;
1849 int i;
1850
1851 pagevec_init(&pvec, 0);
1852 pvec.nr = 1; /* start small: we may be there already */
1853 while (!done) {
0cd6144a 1854 pvec.nr = find_get_entries(mapping, index,
220f2ac9
HD
1855 pvec.nr, pvec.pages, indices);
1856 if (!pvec.nr) {
965c8e59 1857 if (whence == SEEK_DATA)
220f2ac9
HD
1858 index = end;
1859 break;
1860 }
1861 for (i = 0; i < pvec.nr; i++, index++) {
1862 if (index < indices[i]) {
965c8e59 1863 if (whence == SEEK_HOLE) {
220f2ac9
HD
1864 done = true;
1865 break;
1866 }
1867 index = indices[i];
1868 }
1869 page = pvec.pages[i];
1870 if (page && !radix_tree_exceptional_entry(page)) {
1871 if (!PageUptodate(page))
1872 page = NULL;
1873 }
1874 if (index >= end ||
965c8e59
AM
1875 (page && whence == SEEK_DATA) ||
1876 (!page && whence == SEEK_HOLE)) {
220f2ac9
HD
1877 done = true;
1878 break;
1879 }
1880 }
0cd6144a 1881 pagevec_remove_exceptionals(&pvec);
220f2ac9
HD
1882 pagevec_release(&pvec);
1883 pvec.nr = PAGEVEC_SIZE;
1884 cond_resched();
1885 }
1886 return index;
1887}
1888
965c8e59 1889static loff_t shmem_file_llseek(struct file *file, loff_t offset, int whence)
220f2ac9
HD
1890{
1891 struct address_space *mapping = file->f_mapping;
1892 struct inode *inode = mapping->host;
1893 pgoff_t start, end;
1894 loff_t new_offset;
1895
965c8e59
AM
1896 if (whence != SEEK_DATA && whence != SEEK_HOLE)
1897 return generic_file_llseek_size(file, offset, whence,
220f2ac9 1898 MAX_LFS_FILESIZE, i_size_read(inode));
5955102c 1899 inode_lock(inode);
220f2ac9
HD
1900 /* We're holding i_mutex so we can access i_size directly */
1901
1902 if (offset < 0)
1903 offset = -EINVAL;
1904 else if (offset >= inode->i_size)
1905 offset = -ENXIO;
1906 else {
09cbfeaf
KS
1907 start = offset >> PAGE_SHIFT;
1908 end = (inode->i_size + PAGE_SIZE - 1) >> PAGE_SHIFT;
965c8e59 1909 new_offset = shmem_seek_hole_data(mapping, start, end, whence);
09cbfeaf 1910 new_offset <<= PAGE_SHIFT;
220f2ac9
HD
1911 if (new_offset > offset) {
1912 if (new_offset < inode->i_size)
1913 offset = new_offset;
965c8e59 1914 else if (whence == SEEK_DATA)
220f2ac9
HD
1915 offset = -ENXIO;
1916 else
1917 offset = inode->i_size;
1918 }
1919 }
1920
387aae6f
HD
1921 if (offset >= 0)
1922 offset = vfs_setpos(file, offset, MAX_LFS_FILESIZE);
5955102c 1923 inode_unlock(inode);
220f2ac9
HD
1924 return offset;
1925}
1926
05f65b5c
DH
1927/*
1928 * We need a tag: a new tag would expand every radix_tree_node by 8 bytes,
1929 * so reuse a tag which we firmly believe is never set or cleared on shmem.
1930 */
1931#define SHMEM_TAG_PINNED PAGECACHE_TAG_TOWRITE
1932#define LAST_SCAN 4 /* about 150ms max */
1933
1934static void shmem_tag_pins(struct address_space *mapping)
1935{
1936 struct radix_tree_iter iter;
1937 void **slot;
1938 pgoff_t start;
1939 struct page *page;
1940
1941 lru_add_drain();
1942 start = 0;
1943 rcu_read_lock();
1944
05f65b5c
DH
1945 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
1946 page = radix_tree_deref_slot(slot);
1947 if (!page || radix_tree_exception(page)) {
2cf938aa
MW
1948 if (radix_tree_deref_retry(page)) {
1949 slot = radix_tree_iter_retry(&iter);
1950 continue;
1951 }
05f65b5c
DH
1952 } else if (page_count(page) - page_mapcount(page) > 1) {
1953 spin_lock_irq(&mapping->tree_lock);
1954 radix_tree_tag_set(&mapping->page_tree, iter.index,
1955 SHMEM_TAG_PINNED);
1956 spin_unlock_irq(&mapping->tree_lock);
1957 }
1958
1959 if (need_resched()) {
1960 cond_resched_rcu();
7165092f 1961 slot = radix_tree_iter_next(&iter);
05f65b5c
DH
1962 }
1963 }
1964 rcu_read_unlock();
1965}
1966
1967/*
1968 * Setting SEAL_WRITE requires us to verify there's no pending writer. However,
1969 * via get_user_pages(), drivers might have some pending I/O without any active
1970 * user-space mappings (eg., direct-IO, AIO). Therefore, we look at all pages
1971 * and see whether it has an elevated ref-count. If so, we tag them and wait for
1972 * them to be dropped.
1973 * The caller must guarantee that no new user will acquire writable references
1974 * to those pages to avoid races.
1975 */
40e041a2
DH
1976static int shmem_wait_for_pins(struct address_space *mapping)
1977{
05f65b5c
DH
1978 struct radix_tree_iter iter;
1979 void **slot;
1980 pgoff_t start;
1981 struct page *page;
1982 int error, scan;
1983
1984 shmem_tag_pins(mapping);
1985
1986 error = 0;
1987 for (scan = 0; scan <= LAST_SCAN; scan++) {
1988 if (!radix_tree_tagged(&mapping->page_tree, SHMEM_TAG_PINNED))
1989 break;
1990
1991 if (!scan)
1992 lru_add_drain_all();
1993 else if (schedule_timeout_killable((HZ << scan) / 200))
1994 scan = LAST_SCAN;
1995
1996 start = 0;
1997 rcu_read_lock();
05f65b5c
DH
1998 radix_tree_for_each_tagged(slot, &mapping->page_tree, &iter,
1999 start, SHMEM_TAG_PINNED) {
2000
2001 page = radix_tree_deref_slot(slot);
2002 if (radix_tree_exception(page)) {
2cf938aa
MW
2003 if (radix_tree_deref_retry(page)) {
2004 slot = radix_tree_iter_retry(&iter);
2005 continue;
2006 }
05f65b5c
DH
2007
2008 page = NULL;
2009 }
2010
2011 if (page &&
2012 page_count(page) - page_mapcount(page) != 1) {
2013 if (scan < LAST_SCAN)
2014 goto continue_resched;
2015
2016 /*
2017 * On the last scan, we clean up all those tags
2018 * we inserted; but make a note that we still
2019 * found pages pinned.
2020 */
2021 error = -EBUSY;
2022 }
2023
2024 spin_lock_irq(&mapping->tree_lock);
2025 radix_tree_tag_clear(&mapping->page_tree,
2026 iter.index, SHMEM_TAG_PINNED);
2027 spin_unlock_irq(&mapping->tree_lock);
2028continue_resched:
2029 if (need_resched()) {
2030 cond_resched_rcu();
7165092f 2031 slot = radix_tree_iter_next(&iter);
05f65b5c
DH
2032 }
2033 }
2034 rcu_read_unlock();
2035 }
2036
2037 return error;
40e041a2
DH
2038}
2039
2040#define F_ALL_SEALS (F_SEAL_SEAL | \
2041 F_SEAL_SHRINK | \
2042 F_SEAL_GROW | \
2043 F_SEAL_WRITE)
2044
2045int shmem_add_seals(struct file *file, unsigned int seals)
2046{
2047 struct inode *inode = file_inode(file);
2048 struct shmem_inode_info *info = SHMEM_I(inode);
2049 int error;
2050
2051 /*
2052 * SEALING
2053 * Sealing allows multiple parties to share a shmem-file but restrict
2054 * access to a specific subset of file operations. Seals can only be
2055 * added, but never removed. This way, mutually untrusted parties can
2056 * share common memory regions with a well-defined policy. A malicious
2057 * peer can thus never perform unwanted operations on a shared object.
2058 *
2059 * Seals are only supported on special shmem-files and always affect
2060 * the whole underlying inode. Once a seal is set, it may prevent some
2061 * kinds of access to the file. Currently, the following seals are
2062 * defined:
2063 * SEAL_SEAL: Prevent further seals from being set on this file
2064 * SEAL_SHRINK: Prevent the file from shrinking
2065 * SEAL_GROW: Prevent the file from growing
2066 * SEAL_WRITE: Prevent write access to the file
2067 *
2068 * As we don't require any trust relationship between two parties, we
2069 * must prevent seals from being removed. Therefore, sealing a file
2070 * only adds a given set of seals to the file, it never touches
2071 * existing seals. Furthermore, the "setting seals"-operation can be
2072 * sealed itself, which basically prevents any further seal from being
2073 * added.
2074 *
2075 * Semantics of sealing are only defined on volatile files. Only
2076 * anonymous shmem files support sealing. More importantly, seals are
2077 * never written to disk. Therefore, there's no plan to support it on
2078 * other file types.
2079 */
2080
2081 if (file->f_op != &shmem_file_operations)
2082 return -EINVAL;
2083 if (!(file->f_mode & FMODE_WRITE))
2084 return -EPERM;
2085 if (seals & ~(unsigned int)F_ALL_SEALS)
2086 return -EINVAL;
2087
5955102c 2088 inode_lock(inode);
40e041a2
DH
2089
2090 if (info->seals & F_SEAL_SEAL) {
2091 error = -EPERM;
2092 goto unlock;
2093 }
2094
2095 if ((seals & F_SEAL_WRITE) && !(info->seals & F_SEAL_WRITE)) {
2096 error = mapping_deny_writable(file->f_mapping);
2097 if (error)
2098 goto unlock;
2099
2100 error = shmem_wait_for_pins(file->f_mapping);
2101 if (error) {
2102 mapping_allow_writable(file->f_mapping);
2103 goto unlock;
2104 }
2105 }
2106
2107 info->seals |= seals;
2108 error = 0;
2109
2110unlock:
5955102c 2111 inode_unlock(inode);
40e041a2
DH
2112 return error;
2113}
2114EXPORT_SYMBOL_GPL(shmem_add_seals);
2115
2116int shmem_get_seals(struct file *file)
2117{
2118 if (file->f_op != &shmem_file_operations)
2119 return -EINVAL;
2120
2121 return SHMEM_I(file_inode(file))->seals;
2122}
2123EXPORT_SYMBOL_GPL(shmem_get_seals);
2124
2125long shmem_fcntl(struct file *file, unsigned int cmd, unsigned long arg)
2126{
2127 long error;
2128
2129 switch (cmd) {
2130 case F_ADD_SEALS:
2131 /* disallow upper 32bit */
2132 if (arg > UINT_MAX)
2133 return -EINVAL;
2134
2135 error = shmem_add_seals(file, arg);
2136 break;
2137 case F_GET_SEALS:
2138 error = shmem_get_seals(file);
2139 break;
2140 default:
2141 error = -EINVAL;
2142 break;
2143 }
2144
2145 return error;
2146}
2147
83e4fa9c
HD
2148static long shmem_fallocate(struct file *file, int mode, loff_t offset,
2149 loff_t len)
2150{
496ad9aa 2151 struct inode *inode = file_inode(file);
e2d12e22 2152 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
40e041a2 2153 struct shmem_inode_info *info = SHMEM_I(inode);
1aac1400 2154 struct shmem_falloc shmem_falloc;
e2d12e22
HD
2155 pgoff_t start, index, end;
2156 int error;
83e4fa9c 2157
13ace4d0
HD
2158 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
2159 return -EOPNOTSUPP;
2160
5955102c 2161 inode_lock(inode);
83e4fa9c
HD
2162
2163 if (mode & FALLOC_FL_PUNCH_HOLE) {
2164 struct address_space *mapping = file->f_mapping;
2165 loff_t unmap_start = round_up(offset, PAGE_SIZE);
2166 loff_t unmap_end = round_down(offset + len, PAGE_SIZE) - 1;
8e205f77 2167 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(shmem_falloc_waitq);
83e4fa9c 2168
40e041a2
DH
2169 /* protected by i_mutex */
2170 if (info->seals & F_SEAL_WRITE) {
2171 error = -EPERM;
2172 goto out;
2173 }
2174
8e205f77 2175 shmem_falloc.waitq = &shmem_falloc_waitq;
f00cdc6d
HD
2176 shmem_falloc.start = unmap_start >> PAGE_SHIFT;
2177 shmem_falloc.next = (unmap_end + 1) >> PAGE_SHIFT;
2178 spin_lock(&inode->i_lock);
2179 inode->i_private = &shmem_falloc;
2180 spin_unlock(&inode->i_lock);
2181
83e4fa9c
HD
2182 if ((u64)unmap_end > (u64)unmap_start)
2183 unmap_mapping_range(mapping, unmap_start,
2184 1 + unmap_end - unmap_start, 0);
2185 shmem_truncate_range(inode, offset, offset + len - 1);
2186 /* No need to unmap again: hole-punching leaves COWed pages */
8e205f77
HD
2187
2188 spin_lock(&inode->i_lock);
2189 inode->i_private = NULL;
2190 wake_up_all(&shmem_falloc_waitq);
2191 spin_unlock(&inode->i_lock);
83e4fa9c 2192 error = 0;
8e205f77 2193 goto out;
e2d12e22
HD
2194 }
2195
2196 /* We need to check rlimit even when FALLOC_FL_KEEP_SIZE */
2197 error = inode_newsize_ok(inode, offset + len);
2198 if (error)
2199 goto out;
2200
40e041a2
DH
2201 if ((info->seals & F_SEAL_GROW) && offset + len > inode->i_size) {
2202 error = -EPERM;
2203 goto out;
2204 }
2205
09cbfeaf
KS
2206 start = offset >> PAGE_SHIFT;
2207 end = (offset + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
e2d12e22
HD
2208 /* Try to avoid a swapstorm if len is impossible to satisfy */
2209 if (sbinfo->max_blocks && end - start > sbinfo->max_blocks) {
2210 error = -ENOSPC;
2211 goto out;
83e4fa9c
HD
2212 }
2213
8e205f77 2214 shmem_falloc.waitq = NULL;
1aac1400
HD
2215 shmem_falloc.start = start;
2216 shmem_falloc.next = start;
2217 shmem_falloc.nr_falloced = 0;
2218 shmem_falloc.nr_unswapped = 0;
2219 spin_lock(&inode->i_lock);
2220 inode->i_private = &shmem_falloc;
2221 spin_unlock(&inode->i_lock);
2222
e2d12e22
HD
2223 for (index = start; index < end; index++) {
2224 struct page *page;
2225
2226 /*
2227 * Good, the fallocate(2) manpage permits EINTR: we may have
2228 * been interrupted because we are using up too much memory.
2229 */
2230 if (signal_pending(current))
2231 error = -EINTR;
1aac1400
HD
2232 else if (shmem_falloc.nr_unswapped > shmem_falloc.nr_falloced)
2233 error = -ENOMEM;
e2d12e22 2234 else
1635f6a7 2235 error = shmem_getpage(inode, index, &page, SGP_FALLOC,
e2d12e22
HD
2236 NULL);
2237 if (error) {
1635f6a7
HD
2238 /* Remove the !PageUptodate pages we added */
2239 shmem_undo_range(inode,
09cbfeaf
KS
2240 (loff_t)start << PAGE_SHIFT,
2241 (loff_t)index << PAGE_SHIFT, true);
1aac1400 2242 goto undone;
e2d12e22
HD
2243 }
2244
1aac1400
HD
2245 /*
2246 * Inform shmem_writepage() how far we have reached.
2247 * No need for lock or barrier: we have the page lock.
2248 */
2249 shmem_falloc.next++;
2250 if (!PageUptodate(page))
2251 shmem_falloc.nr_falloced++;
2252
e2d12e22 2253 /*
1635f6a7
HD
2254 * If !PageUptodate, leave it that way so that freeable pages
2255 * can be recognized if we need to rollback on error later.
2256 * But set_page_dirty so that memory pressure will swap rather
e2d12e22
HD
2257 * than free the pages we are allocating (and SGP_CACHE pages
2258 * might still be clean: we now need to mark those dirty too).
2259 */
2260 set_page_dirty(page);
2261 unlock_page(page);
09cbfeaf 2262 put_page(page);
e2d12e22
HD
2263 cond_resched();
2264 }
2265
2266 if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + len > inode->i_size)
2267 i_size_write(inode, offset + len);
e2d12e22 2268 inode->i_ctime = CURRENT_TIME;
1aac1400
HD
2269undone:
2270 spin_lock(&inode->i_lock);
2271 inode->i_private = NULL;
2272 spin_unlock(&inode->i_lock);
e2d12e22 2273out:
5955102c 2274 inode_unlock(inode);
83e4fa9c
HD
2275 return error;
2276}
2277
726c3342 2278static int shmem_statfs(struct dentry *dentry, struct kstatfs *buf)
1da177e4 2279{
726c3342 2280 struct shmem_sb_info *sbinfo = SHMEM_SB(dentry->d_sb);
1da177e4
LT
2281
2282 buf->f_type = TMPFS_MAGIC;
09cbfeaf 2283 buf->f_bsize = PAGE_SIZE;
1da177e4 2284 buf->f_namelen = NAME_MAX;
0edd73b3 2285 if (sbinfo->max_blocks) {
1da177e4 2286 buf->f_blocks = sbinfo->max_blocks;
41ffe5d5
HD
2287 buf->f_bavail =
2288 buf->f_bfree = sbinfo->max_blocks -
2289 percpu_counter_sum(&sbinfo->used_blocks);
0edd73b3
HD
2290 }
2291 if (sbinfo->max_inodes) {
1da177e4
LT
2292 buf->f_files = sbinfo->max_inodes;
2293 buf->f_ffree = sbinfo->free_inodes;
1da177e4
LT
2294 }
2295 /* else leave those fields 0 like simple_statfs */
2296 return 0;
2297}
2298
2299/*
2300 * File creation. Allocate an inode, and we're done..
2301 */
2302static int
1a67aafb 2303shmem_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev)
1da177e4 2304{
0b0a0806 2305 struct inode *inode;
1da177e4
LT
2306 int error = -ENOSPC;
2307
454abafe 2308 inode = shmem_get_inode(dir->i_sb, dir, mode, dev, VM_NORESERVE);
1da177e4 2309 if (inode) {
feda821e
CH
2310 error = simple_acl_create(dir, inode);
2311 if (error)
2312 goto out_iput;
2a7dba39 2313 error = security_inode_init_security(inode, dir,
9d8f13ba 2314 &dentry->d_name,
6d9d88d0 2315 shmem_initxattrs, NULL);
feda821e
CH
2316 if (error && error != -EOPNOTSUPP)
2317 goto out_iput;
37ec43cd 2318
718deb6b 2319 error = 0;
1da177e4
LT
2320 dir->i_size += BOGO_DIRENT_SIZE;
2321 dir->i_ctime = dir->i_mtime = CURRENT_TIME;
2322 d_instantiate(dentry, inode);
2323 dget(dentry); /* Extra count - pin the dentry in core */
1da177e4
LT
2324 }
2325 return error;
feda821e
CH
2326out_iput:
2327 iput(inode);
2328 return error;
1da177e4
LT
2329}
2330
60545d0d
AV
2331static int
2332shmem_tmpfile(struct inode *dir, struct dentry *dentry, umode_t mode)
2333{
2334 struct inode *inode;
2335 int error = -ENOSPC;
2336
2337 inode = shmem_get_inode(dir->i_sb, dir, mode, 0, VM_NORESERVE);
2338 if (inode) {
2339 error = security_inode_init_security(inode, dir,
2340 NULL,
2341 shmem_initxattrs, NULL);
feda821e
CH
2342 if (error && error != -EOPNOTSUPP)
2343 goto out_iput;
2344 error = simple_acl_create(dir, inode);
2345 if (error)
2346 goto out_iput;
60545d0d
AV
2347 d_tmpfile(dentry, inode);
2348 }
2349 return error;
feda821e
CH
2350out_iput:
2351 iput(inode);
2352 return error;
60545d0d
AV
2353}
2354
18bb1db3 2355static int shmem_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
1da177e4
LT
2356{
2357 int error;
2358
2359 if ((error = shmem_mknod(dir, dentry, mode | S_IFDIR, 0)))
2360 return error;
d8c76e6f 2361 inc_nlink(dir);
1da177e4
LT
2362 return 0;
2363}
2364
4acdaf27 2365static int shmem_create(struct inode *dir, struct dentry *dentry, umode_t mode,
ebfc3b49 2366 bool excl)
1da177e4
LT
2367{
2368 return shmem_mknod(dir, dentry, mode | S_IFREG, 0);
2369}
2370
2371/*
2372 * Link a file..
2373 */
2374static int shmem_link(struct dentry *old_dentry, struct inode *dir, struct dentry *dentry)
2375{
75c3cfa8 2376 struct inode *inode = d_inode(old_dentry);
5b04c689 2377 int ret;
1da177e4
LT
2378
2379 /*
2380 * No ordinary (disk based) filesystem counts links as inodes;
2381 * but each new link needs a new dentry, pinning lowmem, and
2382 * tmpfs dentries cannot be pruned until they are unlinked.
2383 */
5b04c689
PE
2384 ret = shmem_reserve_inode(inode->i_sb);
2385 if (ret)
2386 goto out;
1da177e4
LT
2387
2388 dir->i_size += BOGO_DIRENT_SIZE;
2389 inode->i_ctime = dir->i_ctime = dir->i_mtime = CURRENT_TIME;
d8c76e6f 2390 inc_nlink(inode);
7de9c6ee 2391 ihold(inode); /* New dentry reference */
1da177e4
LT
2392 dget(dentry); /* Extra pinning count for the created dentry */
2393 d_instantiate(dentry, inode);
5b04c689
PE
2394out:
2395 return ret;
1da177e4
LT
2396}
2397
2398static int shmem_unlink(struct inode *dir, struct dentry *dentry)
2399{
75c3cfa8 2400 struct inode *inode = d_inode(dentry);
1da177e4 2401
5b04c689
PE
2402 if (inode->i_nlink > 1 && !S_ISDIR(inode->i_mode))
2403 shmem_free_inode(inode->i_sb);
1da177e4
LT
2404
2405 dir->i_size -= BOGO_DIRENT_SIZE;
2406 inode->i_ctime = dir->i_ctime = dir->i_mtime = CURRENT_TIME;
9a53c3a7 2407 drop_nlink(inode);
1da177e4
LT
2408 dput(dentry); /* Undo the count from "create" - this does all the work */
2409 return 0;
2410}
2411
2412static int shmem_rmdir(struct inode *dir, struct dentry *dentry)
2413{
2414 if (!simple_empty(dentry))
2415 return -ENOTEMPTY;
2416
75c3cfa8 2417 drop_nlink(d_inode(dentry));
9a53c3a7 2418 drop_nlink(dir);
1da177e4
LT
2419 return shmem_unlink(dir, dentry);
2420}
2421
37456771
MS
2422static int shmem_exchange(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry)
2423{
e36cb0b8
DH
2424 bool old_is_dir = d_is_dir(old_dentry);
2425 bool new_is_dir = d_is_dir(new_dentry);
37456771
MS
2426
2427 if (old_dir != new_dir && old_is_dir != new_is_dir) {
2428 if (old_is_dir) {
2429 drop_nlink(old_dir);
2430 inc_nlink(new_dir);
2431 } else {
2432 drop_nlink(new_dir);
2433 inc_nlink(old_dir);
2434 }
2435 }
2436 old_dir->i_ctime = old_dir->i_mtime =
2437 new_dir->i_ctime = new_dir->i_mtime =
75c3cfa8
DH
2438 d_inode(old_dentry)->i_ctime =
2439 d_inode(new_dentry)->i_ctime = CURRENT_TIME;
37456771
MS
2440
2441 return 0;
2442}
2443
46fdb794
MS
2444static int shmem_whiteout(struct inode *old_dir, struct dentry *old_dentry)
2445{
2446 struct dentry *whiteout;
2447 int error;
2448
2449 whiteout = d_alloc(old_dentry->d_parent, &old_dentry->d_name);
2450 if (!whiteout)
2451 return -ENOMEM;
2452
2453 error = shmem_mknod(old_dir, whiteout,
2454 S_IFCHR | WHITEOUT_MODE, WHITEOUT_DEV);
2455 dput(whiteout);
2456 if (error)
2457 return error;
2458
2459 /*
2460 * Cheat and hash the whiteout while the old dentry is still in
2461 * place, instead of playing games with FS_RENAME_DOES_D_MOVE.
2462 *
2463 * d_lookup() will consistently find one of them at this point,
2464 * not sure which one, but that isn't even important.
2465 */
2466 d_rehash(whiteout);
2467 return 0;
2468}
2469
1da177e4
LT
2470/*
2471 * The VFS layer already does all the dentry stuff for rename,
2472 * we just have to decrement the usage count for the target if
2473 * it exists so that the VFS layer correctly free's it when it
2474 * gets overwritten.
2475 */
3b69ff51 2476static int shmem_rename2(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry, unsigned int flags)
1da177e4 2477{
75c3cfa8 2478 struct inode *inode = d_inode(old_dentry);
1da177e4
LT
2479 int they_are_dirs = S_ISDIR(inode->i_mode);
2480
46fdb794 2481 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
3b69ff51
MS
2482 return -EINVAL;
2483
37456771
MS
2484 if (flags & RENAME_EXCHANGE)
2485 return shmem_exchange(old_dir, old_dentry, new_dir, new_dentry);
2486
1da177e4
LT
2487 if (!simple_empty(new_dentry))
2488 return -ENOTEMPTY;
2489
46fdb794
MS
2490 if (flags & RENAME_WHITEOUT) {
2491 int error;
2492
2493 error = shmem_whiteout(old_dir, old_dentry);
2494 if (error)
2495 return error;
2496 }
2497
75c3cfa8 2498 if (d_really_is_positive(new_dentry)) {
1da177e4 2499 (void) shmem_unlink(new_dir, new_dentry);
b928095b 2500 if (they_are_dirs) {
75c3cfa8 2501 drop_nlink(d_inode(new_dentry));
9a53c3a7 2502 drop_nlink(old_dir);
b928095b 2503 }
1da177e4 2504 } else if (they_are_dirs) {
9a53c3a7 2505 drop_nlink(old_dir);
d8c76e6f 2506 inc_nlink(new_dir);
1da177e4
LT
2507 }
2508
2509 old_dir->i_size -= BOGO_DIRENT_SIZE;
2510 new_dir->i_size += BOGO_DIRENT_SIZE;
2511 old_dir->i_ctime = old_dir->i_mtime =
2512 new_dir->i_ctime = new_dir->i_mtime =
2513 inode->i_ctime = CURRENT_TIME;
2514 return 0;
2515}
2516
2517static int shmem_symlink(struct inode *dir, struct dentry *dentry, const char *symname)
2518{
2519 int error;
2520 int len;
2521 struct inode *inode;
9276aad6 2522 struct page *page;
1da177e4
LT
2523 struct shmem_inode_info *info;
2524
2525 len = strlen(symname) + 1;
09cbfeaf 2526 if (len > PAGE_SIZE)
1da177e4
LT
2527 return -ENAMETOOLONG;
2528
454abafe 2529 inode = shmem_get_inode(dir->i_sb, dir, S_IFLNK|S_IRWXUGO, 0, VM_NORESERVE);
1da177e4
LT
2530 if (!inode)
2531 return -ENOSPC;
2532
9d8f13ba 2533 error = security_inode_init_security(inode, dir, &dentry->d_name,
6d9d88d0 2534 shmem_initxattrs, NULL);
570bc1c2
SS
2535 if (error) {
2536 if (error != -EOPNOTSUPP) {
2537 iput(inode);
2538 return error;
2539 }
2540 error = 0;
2541 }
2542
1da177e4
LT
2543 info = SHMEM_I(inode);
2544 inode->i_size = len-1;
69f07ec9 2545 if (len <= SHORT_SYMLINK_LEN) {
3ed47db3
AV
2546 inode->i_link = kmemdup(symname, len, GFP_KERNEL);
2547 if (!inode->i_link) {
69f07ec9
HD
2548 iput(inode);
2549 return -ENOMEM;
2550 }
2551 inode->i_op = &shmem_short_symlink_operations;
1da177e4 2552 } else {
e8ecde25 2553 inode_nohighmem(inode);
1da177e4
LT
2554 error = shmem_getpage(inode, 0, &page, SGP_WRITE, NULL);
2555 if (error) {
2556 iput(inode);
2557 return error;
2558 }
14fcc23f 2559 inode->i_mapping->a_ops = &shmem_aops;
1da177e4 2560 inode->i_op = &shmem_symlink_inode_operations;
21fc61c7 2561 memcpy(page_address(page), symname, len);
ec9516fb 2562 SetPageUptodate(page);
1da177e4 2563 set_page_dirty(page);
6746aff7 2564 unlock_page(page);
09cbfeaf 2565 put_page(page);
1da177e4 2566 }
1da177e4
LT
2567 dir->i_size += BOGO_DIRENT_SIZE;
2568 dir->i_ctime = dir->i_mtime = CURRENT_TIME;
2569 d_instantiate(dentry, inode);
2570 dget(dentry);
2571 return 0;
2572}
2573
fceef393 2574static void shmem_put_link(void *arg)
1da177e4 2575{
fceef393
AV
2576 mark_page_accessed(arg);
2577 put_page(arg);
1da177e4
LT
2578}
2579
6b255391 2580static const char *shmem_get_link(struct dentry *dentry,
fceef393
AV
2581 struct inode *inode,
2582 struct delayed_call *done)
1da177e4 2583{
1da177e4 2584 struct page *page = NULL;
6b255391 2585 int error;
6a6c9904
AV
2586 if (!dentry) {
2587 page = find_get_page(inode->i_mapping, 0);
2588 if (!page)
2589 return ERR_PTR(-ECHILD);
2590 if (!PageUptodate(page)) {
2591 put_page(page);
2592 return ERR_PTR(-ECHILD);
2593 }
2594 } else {
2595 error = shmem_getpage(inode, 0, &page, SGP_READ, NULL);
2596 if (error)
2597 return ERR_PTR(error);
2598 unlock_page(page);
2599 }
fceef393 2600 set_delayed_call(done, shmem_put_link, page);
21fc61c7 2601 return page_address(page);
1da177e4
LT
2602}
2603
b09e0fa4 2604#ifdef CONFIG_TMPFS_XATTR
46711810 2605/*
b09e0fa4
EP
2606 * Superblocks without xattr inode operations may get some security.* xattr
2607 * support from the LSM "for free". As soon as we have any other xattrs
39f0247d
AG
2608 * like ACLs, we also need to implement the security.* handlers at
2609 * filesystem level, though.
2610 */
2611
6d9d88d0
JS
2612/*
2613 * Callback for security_inode_init_security() for acquiring xattrs.
2614 */
2615static int shmem_initxattrs(struct inode *inode,
2616 const struct xattr *xattr_array,
2617 void *fs_info)
2618{
2619 struct shmem_inode_info *info = SHMEM_I(inode);
2620 const struct xattr *xattr;
38f38657 2621 struct simple_xattr *new_xattr;
6d9d88d0
JS
2622 size_t len;
2623
2624 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
38f38657 2625 new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len);
6d9d88d0
JS
2626 if (!new_xattr)
2627 return -ENOMEM;
2628
2629 len = strlen(xattr->name) + 1;
2630 new_xattr->name = kmalloc(XATTR_SECURITY_PREFIX_LEN + len,
2631 GFP_KERNEL);
2632 if (!new_xattr->name) {
2633 kfree(new_xattr);
2634 return -ENOMEM;
2635 }
2636
2637 memcpy(new_xattr->name, XATTR_SECURITY_PREFIX,
2638 XATTR_SECURITY_PREFIX_LEN);
2639 memcpy(new_xattr->name + XATTR_SECURITY_PREFIX_LEN,
2640 xattr->name, len);
2641
38f38657 2642 simple_xattr_list_add(&info->xattrs, new_xattr);
6d9d88d0
JS
2643 }
2644
2645 return 0;
2646}
2647
aa7c5241
AG
2648static int shmem_xattr_handler_get(const struct xattr_handler *handler,
2649 struct dentry *dentry, const char *name,
2650 void *buffer, size_t size)
b09e0fa4 2651{
75c3cfa8 2652 struct shmem_inode_info *info = SHMEM_I(d_inode(dentry));
b09e0fa4 2653
aa7c5241 2654 name = xattr_full_name(handler, name);
38f38657 2655 return simple_xattr_get(&info->xattrs, name, buffer, size);
b09e0fa4
EP
2656}
2657
aa7c5241
AG
2658static int shmem_xattr_handler_set(const struct xattr_handler *handler,
2659 struct dentry *dentry, const char *name,
2660 const void *value, size_t size, int flags)
b09e0fa4 2661{
75c3cfa8 2662 struct shmem_inode_info *info = SHMEM_I(d_inode(dentry));
b09e0fa4 2663
aa7c5241 2664 name = xattr_full_name(handler, name);
38f38657 2665 return simple_xattr_set(&info->xattrs, name, value, size, flags);
b09e0fa4
EP
2666}
2667
aa7c5241
AG
2668static const struct xattr_handler shmem_security_xattr_handler = {
2669 .prefix = XATTR_SECURITY_PREFIX,
2670 .get = shmem_xattr_handler_get,
2671 .set = shmem_xattr_handler_set,
2672};
b09e0fa4 2673
aa7c5241
AG
2674static const struct xattr_handler shmem_trusted_xattr_handler = {
2675 .prefix = XATTR_TRUSTED_PREFIX,
2676 .get = shmem_xattr_handler_get,
2677 .set = shmem_xattr_handler_set,
2678};
b09e0fa4 2679
aa7c5241
AG
2680static const struct xattr_handler *shmem_xattr_handlers[] = {
2681#ifdef CONFIG_TMPFS_POSIX_ACL
2682 &posix_acl_access_xattr_handler,
2683 &posix_acl_default_xattr_handler,
2684#endif
2685 &shmem_security_xattr_handler,
2686 &shmem_trusted_xattr_handler,
2687 NULL
2688};
b09e0fa4
EP
2689
2690static ssize_t shmem_listxattr(struct dentry *dentry, char *buffer, size_t size)
2691{
75c3cfa8 2692 struct shmem_inode_info *info = SHMEM_I(d_inode(dentry));
786534b9 2693 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
b09e0fa4
EP
2694}
2695#endif /* CONFIG_TMPFS_XATTR */
2696
69f07ec9 2697static const struct inode_operations shmem_short_symlink_operations = {
b09e0fa4 2698 .readlink = generic_readlink,
6b255391 2699 .get_link = simple_get_link,
b09e0fa4 2700#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
2701 .setxattr = generic_setxattr,
2702 .getxattr = generic_getxattr,
b09e0fa4 2703 .listxattr = shmem_listxattr,
aa7c5241 2704 .removexattr = generic_removexattr,
b09e0fa4
EP
2705#endif
2706};
2707
2708static const struct inode_operations shmem_symlink_inode_operations = {
2709 .readlink = generic_readlink,
6b255391 2710 .get_link = shmem_get_link,
b09e0fa4 2711#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
2712 .setxattr = generic_setxattr,
2713 .getxattr = generic_getxattr,
b09e0fa4 2714 .listxattr = shmem_listxattr,
aa7c5241 2715 .removexattr = generic_removexattr,
39f0247d 2716#endif
b09e0fa4 2717};
39f0247d 2718
91828a40
DG
2719static struct dentry *shmem_get_parent(struct dentry *child)
2720{
2721 return ERR_PTR(-ESTALE);
2722}
2723
2724static int shmem_match(struct inode *ino, void *vfh)
2725{
2726 __u32 *fh = vfh;
2727 __u64 inum = fh[2];
2728 inum = (inum << 32) | fh[1];
2729 return ino->i_ino == inum && fh[0] == ino->i_generation;
2730}
2731
480b116c
CH
2732static struct dentry *shmem_fh_to_dentry(struct super_block *sb,
2733 struct fid *fid, int fh_len, int fh_type)
91828a40 2734{
91828a40 2735 struct inode *inode;
480b116c 2736 struct dentry *dentry = NULL;
35c2a7f4 2737 u64 inum;
480b116c
CH
2738
2739 if (fh_len < 3)
2740 return NULL;
91828a40 2741
35c2a7f4
HD
2742 inum = fid->raw[2];
2743 inum = (inum << 32) | fid->raw[1];
2744
480b116c
CH
2745 inode = ilookup5(sb, (unsigned long)(inum + fid->raw[0]),
2746 shmem_match, fid->raw);
91828a40 2747 if (inode) {
480b116c 2748 dentry = d_find_alias(inode);
91828a40
DG
2749 iput(inode);
2750 }
2751
480b116c 2752 return dentry;
91828a40
DG
2753}
2754
b0b0382b
AV
2755static int shmem_encode_fh(struct inode *inode, __u32 *fh, int *len,
2756 struct inode *parent)
91828a40 2757{
5fe0c237
AK
2758 if (*len < 3) {
2759 *len = 3;
94e07a75 2760 return FILEID_INVALID;
5fe0c237 2761 }
91828a40 2762
1d3382cb 2763 if (inode_unhashed(inode)) {
91828a40
DG
2764 /* Unfortunately insert_inode_hash is not idempotent,
2765 * so as we hash inodes here rather than at creation
2766 * time, we need a lock to ensure we only try
2767 * to do it once
2768 */
2769 static DEFINE_SPINLOCK(lock);
2770 spin_lock(&lock);
1d3382cb 2771 if (inode_unhashed(inode))
91828a40
DG
2772 __insert_inode_hash(inode,
2773 inode->i_ino + inode->i_generation);
2774 spin_unlock(&lock);
2775 }
2776
2777 fh[0] = inode->i_generation;
2778 fh[1] = inode->i_ino;
2779 fh[2] = ((__u64)inode->i_ino) >> 32;
2780
2781 *len = 3;
2782 return 1;
2783}
2784
39655164 2785static const struct export_operations shmem_export_ops = {
91828a40 2786 .get_parent = shmem_get_parent,
91828a40 2787 .encode_fh = shmem_encode_fh,
480b116c 2788 .fh_to_dentry = shmem_fh_to_dentry,
91828a40
DG
2789};
2790
680d794b 2791static int shmem_parse_options(char *options, struct shmem_sb_info *sbinfo,
2792 bool remount)
1da177e4
LT
2793{
2794 char *this_char, *value, *rest;
49cd0a5c 2795 struct mempolicy *mpol = NULL;
8751e039
EB
2796 uid_t uid;
2797 gid_t gid;
1da177e4 2798
b00dc3ad
HD
2799 while (options != NULL) {
2800 this_char = options;
2801 for (;;) {
2802 /*
2803 * NUL-terminate this option: unfortunately,
2804 * mount options form a comma-separated list,
2805 * but mpol's nodelist may also contain commas.
2806 */
2807 options = strchr(options, ',');
2808 if (options == NULL)
2809 break;
2810 options++;
2811 if (!isdigit(*options)) {
2812 options[-1] = '\0';
2813 break;
2814 }
2815 }
1da177e4
LT
2816 if (!*this_char)
2817 continue;
2818 if ((value = strchr(this_char,'=')) != NULL) {
2819 *value++ = 0;
2820 } else {
1170532b
JP
2821 pr_err("tmpfs: No value for mount option '%s'\n",
2822 this_char);
49cd0a5c 2823 goto error;
1da177e4
LT
2824 }
2825
2826 if (!strcmp(this_char,"size")) {
2827 unsigned long long size;
2828 size = memparse(value,&rest);
2829 if (*rest == '%') {
2830 size <<= PAGE_SHIFT;
2831 size *= totalram_pages;
2832 do_div(size, 100);
2833 rest++;
2834 }
2835 if (*rest)
2836 goto bad_val;
680d794b 2837 sbinfo->max_blocks =
09cbfeaf 2838 DIV_ROUND_UP(size, PAGE_SIZE);
1da177e4 2839 } else if (!strcmp(this_char,"nr_blocks")) {
680d794b 2840 sbinfo->max_blocks = memparse(value, &rest);
1da177e4
LT
2841 if (*rest)
2842 goto bad_val;
2843 } else if (!strcmp(this_char,"nr_inodes")) {
680d794b 2844 sbinfo->max_inodes = memparse(value, &rest);
1da177e4
LT
2845 if (*rest)
2846 goto bad_val;
2847 } else if (!strcmp(this_char,"mode")) {
680d794b 2848 if (remount)
1da177e4 2849 continue;
680d794b 2850 sbinfo->mode = simple_strtoul(value, &rest, 8) & 07777;
1da177e4
LT
2851 if (*rest)
2852 goto bad_val;
2853 } else if (!strcmp(this_char,"uid")) {
680d794b 2854 if (remount)
1da177e4 2855 continue;
8751e039 2856 uid = simple_strtoul(value, &rest, 0);
1da177e4
LT
2857 if (*rest)
2858 goto bad_val;
8751e039
EB
2859 sbinfo->uid = make_kuid(current_user_ns(), uid);
2860 if (!uid_valid(sbinfo->uid))
2861 goto bad_val;
1da177e4 2862 } else if (!strcmp(this_char,"gid")) {
680d794b 2863 if (remount)
1da177e4 2864 continue;
8751e039 2865 gid = simple_strtoul(value, &rest, 0);
1da177e4
LT
2866 if (*rest)
2867 goto bad_val;
8751e039
EB
2868 sbinfo->gid = make_kgid(current_user_ns(), gid);
2869 if (!gid_valid(sbinfo->gid))
2870 goto bad_val;
7339ff83 2871 } else if (!strcmp(this_char,"mpol")) {
49cd0a5c
GT
2872 mpol_put(mpol);
2873 mpol = NULL;
2874 if (mpol_parse_str(value, &mpol))
7339ff83 2875 goto bad_val;
1da177e4 2876 } else {
1170532b 2877 pr_err("tmpfs: Bad mount option %s\n", this_char);
49cd0a5c 2878 goto error;
1da177e4
LT
2879 }
2880 }
49cd0a5c 2881 sbinfo->mpol = mpol;
1da177e4
LT
2882 return 0;
2883
2884bad_val:
1170532b 2885 pr_err("tmpfs: Bad value '%s' for mount option '%s'\n",
1da177e4 2886 value, this_char);
49cd0a5c
GT
2887error:
2888 mpol_put(mpol);
1da177e4
LT
2889 return 1;
2890
2891}
2892
2893static int shmem_remount_fs(struct super_block *sb, int *flags, char *data)
2894{
2895 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
680d794b 2896 struct shmem_sb_info config = *sbinfo;
0edd73b3
HD
2897 unsigned long inodes;
2898 int error = -EINVAL;
2899
5f00110f 2900 config.mpol = NULL;
680d794b 2901 if (shmem_parse_options(data, &config, true))
0edd73b3 2902 return error;
1da177e4 2903
0edd73b3 2904 spin_lock(&sbinfo->stat_lock);
0edd73b3 2905 inodes = sbinfo->max_inodes - sbinfo->free_inodes;
7e496299 2906 if (percpu_counter_compare(&sbinfo->used_blocks, config.max_blocks) > 0)
0edd73b3 2907 goto out;
680d794b 2908 if (config.max_inodes < inodes)
0edd73b3
HD
2909 goto out;
2910 /*
54af6042 2911 * Those tests disallow limited->unlimited while any are in use;
0edd73b3
HD
2912 * but we must separately disallow unlimited->limited, because
2913 * in that case we have no record of how much is already in use.
2914 */
680d794b 2915 if (config.max_blocks && !sbinfo->max_blocks)
0edd73b3 2916 goto out;
680d794b 2917 if (config.max_inodes && !sbinfo->max_inodes)
0edd73b3
HD
2918 goto out;
2919
2920 error = 0;
680d794b 2921 sbinfo->max_blocks = config.max_blocks;
680d794b 2922 sbinfo->max_inodes = config.max_inodes;
2923 sbinfo->free_inodes = config.max_inodes - inodes;
71fe804b 2924
5f00110f
GT
2925 /*
2926 * Preserve previous mempolicy unless mpol remount option was specified.
2927 */
2928 if (config.mpol) {
2929 mpol_put(sbinfo->mpol);
2930 sbinfo->mpol = config.mpol; /* transfers initial ref */
2931 }
0edd73b3
HD
2932out:
2933 spin_unlock(&sbinfo->stat_lock);
2934 return error;
1da177e4 2935}
680d794b 2936
34c80b1d 2937static int shmem_show_options(struct seq_file *seq, struct dentry *root)
680d794b 2938{
34c80b1d 2939 struct shmem_sb_info *sbinfo = SHMEM_SB(root->d_sb);
680d794b 2940
2941 if (sbinfo->max_blocks != shmem_default_max_blocks())
2942 seq_printf(seq, ",size=%luk",
09cbfeaf 2943 sbinfo->max_blocks << (PAGE_SHIFT - 10));
680d794b 2944 if (sbinfo->max_inodes != shmem_default_max_inodes())
2945 seq_printf(seq, ",nr_inodes=%lu", sbinfo->max_inodes);
2946 if (sbinfo->mode != (S_IRWXUGO | S_ISVTX))
09208d15 2947 seq_printf(seq, ",mode=%03ho", sbinfo->mode);
8751e039
EB
2948 if (!uid_eq(sbinfo->uid, GLOBAL_ROOT_UID))
2949 seq_printf(seq, ",uid=%u",
2950 from_kuid_munged(&init_user_ns, sbinfo->uid));
2951 if (!gid_eq(sbinfo->gid, GLOBAL_ROOT_GID))
2952 seq_printf(seq, ",gid=%u",
2953 from_kgid_munged(&init_user_ns, sbinfo->gid));
71fe804b 2954 shmem_show_mpol(seq, sbinfo->mpol);
680d794b 2955 return 0;
2956}
9183df25
DH
2957
2958#define MFD_NAME_PREFIX "memfd:"
2959#define MFD_NAME_PREFIX_LEN (sizeof(MFD_NAME_PREFIX) - 1)
2960#define MFD_NAME_MAX_LEN (NAME_MAX - MFD_NAME_PREFIX_LEN)
2961
2962#define MFD_ALL_FLAGS (MFD_CLOEXEC | MFD_ALLOW_SEALING)
2963
2964SYSCALL_DEFINE2(memfd_create,
2965 const char __user *, uname,
2966 unsigned int, flags)
2967{
2968 struct shmem_inode_info *info;
2969 struct file *file;
2970 int fd, error;
2971 char *name;
2972 long len;
2973
2974 if (flags & ~(unsigned int)MFD_ALL_FLAGS)
2975 return -EINVAL;
2976
2977 /* length includes terminating zero */
2978 len = strnlen_user(uname, MFD_NAME_MAX_LEN + 1);
2979 if (len <= 0)
2980 return -EFAULT;
2981 if (len > MFD_NAME_MAX_LEN + 1)
2982 return -EINVAL;
2983
2984 name = kmalloc(len + MFD_NAME_PREFIX_LEN, GFP_TEMPORARY);
2985 if (!name)
2986 return -ENOMEM;
2987
2988 strcpy(name, MFD_NAME_PREFIX);
2989 if (copy_from_user(&name[MFD_NAME_PREFIX_LEN], uname, len)) {
2990 error = -EFAULT;
2991 goto err_name;
2992 }
2993
2994 /* terminating-zero may have changed after strnlen_user() returned */
2995 if (name[len + MFD_NAME_PREFIX_LEN - 1]) {
2996 error = -EFAULT;
2997 goto err_name;
2998 }
2999
3000 fd = get_unused_fd_flags((flags & MFD_CLOEXEC) ? O_CLOEXEC : 0);
3001 if (fd < 0) {
3002 error = fd;
3003 goto err_name;
3004 }
3005
3006 file = shmem_file_setup(name, 0, VM_NORESERVE);
3007 if (IS_ERR(file)) {
3008 error = PTR_ERR(file);
3009 goto err_fd;
3010 }
3011 info = SHMEM_I(file_inode(file));
3012 file->f_mode |= FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE;
3013 file->f_flags |= O_RDWR | O_LARGEFILE;
3014 if (flags & MFD_ALLOW_SEALING)
3015 info->seals &= ~F_SEAL_SEAL;
3016
3017 fd_install(fd, file);
3018 kfree(name);
3019 return fd;
3020
3021err_fd:
3022 put_unused_fd(fd);
3023err_name:
3024 kfree(name);
3025 return error;
3026}
3027
680d794b 3028#endif /* CONFIG_TMPFS */
1da177e4
LT
3029
3030static void shmem_put_super(struct super_block *sb)
3031{
602586a8
HD
3032 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
3033
3034 percpu_counter_destroy(&sbinfo->used_blocks);
49cd0a5c 3035 mpol_put(sbinfo->mpol);
602586a8 3036 kfree(sbinfo);
1da177e4
LT
3037 sb->s_fs_info = NULL;
3038}
3039
2b2af54a 3040int shmem_fill_super(struct super_block *sb, void *data, int silent)
1da177e4
LT
3041{
3042 struct inode *inode;
0edd73b3 3043 struct shmem_sb_info *sbinfo;
680d794b 3044 int err = -ENOMEM;
3045
3046 /* Round up to L1_CACHE_BYTES to resist false sharing */
425fbf04 3047 sbinfo = kzalloc(max((int)sizeof(struct shmem_sb_info),
680d794b 3048 L1_CACHE_BYTES), GFP_KERNEL);
3049 if (!sbinfo)
3050 return -ENOMEM;
3051
680d794b 3052 sbinfo->mode = S_IRWXUGO | S_ISVTX;
76aac0e9
DH
3053 sbinfo->uid = current_fsuid();
3054 sbinfo->gid = current_fsgid();
680d794b 3055 sb->s_fs_info = sbinfo;
1da177e4 3056
0edd73b3 3057#ifdef CONFIG_TMPFS
1da177e4
LT
3058 /*
3059 * Per default we only allow half of the physical ram per
3060 * tmpfs instance, limiting inodes to one per page of lowmem;
3061 * but the internal instance is left unlimited.
3062 */
ca4e0519 3063 if (!(sb->s_flags & MS_KERNMOUNT)) {
680d794b 3064 sbinfo->max_blocks = shmem_default_max_blocks();
3065 sbinfo->max_inodes = shmem_default_max_inodes();
3066 if (shmem_parse_options(data, sbinfo, false)) {
3067 err = -EINVAL;
3068 goto failed;
3069 }
ca4e0519
AV
3070 } else {
3071 sb->s_flags |= MS_NOUSER;
1da177e4 3072 }
91828a40 3073 sb->s_export_op = &shmem_export_ops;
2f6e38f3 3074 sb->s_flags |= MS_NOSEC;
1da177e4
LT
3075#else
3076 sb->s_flags |= MS_NOUSER;
3077#endif
3078
0edd73b3 3079 spin_lock_init(&sbinfo->stat_lock);
908c7f19 3080 if (percpu_counter_init(&sbinfo->used_blocks, 0, GFP_KERNEL))
602586a8 3081 goto failed;
680d794b 3082 sbinfo->free_inodes = sbinfo->max_inodes;
0edd73b3 3083
285b2c4f 3084 sb->s_maxbytes = MAX_LFS_FILESIZE;
09cbfeaf
KS
3085 sb->s_blocksize = PAGE_SIZE;
3086 sb->s_blocksize_bits = PAGE_SHIFT;
1da177e4
LT
3087 sb->s_magic = TMPFS_MAGIC;
3088 sb->s_op = &shmem_ops;
cfd95a9c 3089 sb->s_time_gran = 1;
b09e0fa4 3090#ifdef CONFIG_TMPFS_XATTR
39f0247d 3091 sb->s_xattr = shmem_xattr_handlers;
b09e0fa4
EP
3092#endif
3093#ifdef CONFIG_TMPFS_POSIX_ACL
39f0247d
AG
3094 sb->s_flags |= MS_POSIXACL;
3095#endif
0edd73b3 3096
454abafe 3097 inode = shmem_get_inode(sb, NULL, S_IFDIR | sbinfo->mode, 0, VM_NORESERVE);
1da177e4
LT
3098 if (!inode)
3099 goto failed;
680d794b 3100 inode->i_uid = sbinfo->uid;
3101 inode->i_gid = sbinfo->gid;
318ceed0
AV
3102 sb->s_root = d_make_root(inode);
3103 if (!sb->s_root)
48fde701 3104 goto failed;
1da177e4
LT
3105 return 0;
3106
1da177e4
LT
3107failed:
3108 shmem_put_super(sb);
3109 return err;
3110}
3111
fcc234f8 3112static struct kmem_cache *shmem_inode_cachep;
1da177e4
LT
3113
3114static struct inode *shmem_alloc_inode(struct super_block *sb)
3115{
41ffe5d5
HD
3116 struct shmem_inode_info *info;
3117 info = kmem_cache_alloc(shmem_inode_cachep, GFP_KERNEL);
3118 if (!info)
1da177e4 3119 return NULL;
41ffe5d5 3120 return &info->vfs_inode;
1da177e4
LT
3121}
3122
41ffe5d5 3123static void shmem_destroy_callback(struct rcu_head *head)
fa0d7e3d
NP
3124{
3125 struct inode *inode = container_of(head, struct inode, i_rcu);
3ed47db3 3126 kfree(inode->i_link);
fa0d7e3d
NP
3127 kmem_cache_free(shmem_inode_cachep, SHMEM_I(inode));
3128}
3129
1da177e4
LT
3130static void shmem_destroy_inode(struct inode *inode)
3131{
09208d15 3132 if (S_ISREG(inode->i_mode))
1da177e4 3133 mpol_free_shared_policy(&SHMEM_I(inode)->policy);
41ffe5d5 3134 call_rcu(&inode->i_rcu, shmem_destroy_callback);
1da177e4
LT
3135}
3136
41ffe5d5 3137static void shmem_init_inode(void *foo)
1da177e4 3138{
41ffe5d5
HD
3139 struct shmem_inode_info *info = foo;
3140 inode_init_once(&info->vfs_inode);
1da177e4
LT
3141}
3142
41ffe5d5 3143static int shmem_init_inodecache(void)
1da177e4
LT
3144{
3145 shmem_inode_cachep = kmem_cache_create("shmem_inode_cache",
3146 sizeof(struct shmem_inode_info),
5d097056 3147 0, SLAB_PANIC|SLAB_ACCOUNT, shmem_init_inode);
1da177e4
LT
3148 return 0;
3149}
3150
41ffe5d5 3151static void shmem_destroy_inodecache(void)
1da177e4 3152{
1a1d92c1 3153 kmem_cache_destroy(shmem_inode_cachep);
1da177e4
LT
3154}
3155
f5e54d6e 3156static const struct address_space_operations shmem_aops = {
1da177e4 3157 .writepage = shmem_writepage,
76719325 3158 .set_page_dirty = __set_page_dirty_no_writeback,
1da177e4 3159#ifdef CONFIG_TMPFS
800d15a5
NP
3160 .write_begin = shmem_write_begin,
3161 .write_end = shmem_write_end,
1da177e4 3162#endif
1c93923c 3163#ifdef CONFIG_MIGRATION
304dbdb7 3164 .migratepage = migrate_page,
1c93923c 3165#endif
aa261f54 3166 .error_remove_page = generic_error_remove_page,
1da177e4
LT
3167};
3168
15ad7cdc 3169static const struct file_operations shmem_file_operations = {
1da177e4
LT
3170 .mmap = shmem_mmap,
3171#ifdef CONFIG_TMPFS
220f2ac9 3172 .llseek = shmem_file_llseek,
2ba5bbed 3173 .read_iter = shmem_file_read_iter,
8174202b 3174 .write_iter = generic_file_write_iter,
1b061d92 3175 .fsync = noop_fsync,
708e3508 3176 .splice_read = shmem_file_splice_read,
f6cb85d0 3177 .splice_write = iter_file_splice_write,
83e4fa9c 3178 .fallocate = shmem_fallocate,
1da177e4
LT
3179#endif
3180};
3181
92e1d5be 3182static const struct inode_operations shmem_inode_operations = {
44a30220 3183 .getattr = shmem_getattr,
94c1e62d 3184 .setattr = shmem_setattr,
b09e0fa4 3185#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3186 .setxattr = generic_setxattr,
3187 .getxattr = generic_getxattr,
b09e0fa4 3188 .listxattr = shmem_listxattr,
aa7c5241 3189 .removexattr = generic_removexattr,
feda821e 3190 .set_acl = simple_set_acl,
b09e0fa4 3191#endif
1da177e4
LT
3192};
3193
92e1d5be 3194static const struct inode_operations shmem_dir_inode_operations = {
1da177e4
LT
3195#ifdef CONFIG_TMPFS
3196 .create = shmem_create,
3197 .lookup = simple_lookup,
3198 .link = shmem_link,
3199 .unlink = shmem_unlink,
3200 .symlink = shmem_symlink,
3201 .mkdir = shmem_mkdir,
3202 .rmdir = shmem_rmdir,
3203 .mknod = shmem_mknod,
3b69ff51 3204 .rename2 = shmem_rename2,
60545d0d 3205 .tmpfile = shmem_tmpfile,
1da177e4 3206#endif
b09e0fa4 3207#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3208 .setxattr = generic_setxattr,
3209 .getxattr = generic_getxattr,
b09e0fa4 3210 .listxattr = shmem_listxattr,
aa7c5241 3211 .removexattr = generic_removexattr,
b09e0fa4 3212#endif
39f0247d 3213#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3214 .setattr = shmem_setattr,
feda821e 3215 .set_acl = simple_set_acl,
39f0247d
AG
3216#endif
3217};
3218
92e1d5be 3219static const struct inode_operations shmem_special_inode_operations = {
b09e0fa4 3220#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3221 .setxattr = generic_setxattr,
3222 .getxattr = generic_getxattr,
b09e0fa4 3223 .listxattr = shmem_listxattr,
aa7c5241 3224 .removexattr = generic_removexattr,
b09e0fa4 3225#endif
39f0247d 3226#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3227 .setattr = shmem_setattr,
feda821e 3228 .set_acl = simple_set_acl,
39f0247d 3229#endif
1da177e4
LT
3230};
3231
759b9775 3232static const struct super_operations shmem_ops = {
1da177e4
LT
3233 .alloc_inode = shmem_alloc_inode,
3234 .destroy_inode = shmem_destroy_inode,
3235#ifdef CONFIG_TMPFS
3236 .statfs = shmem_statfs,
3237 .remount_fs = shmem_remount_fs,
680d794b 3238 .show_options = shmem_show_options,
1da177e4 3239#endif
1f895f75 3240 .evict_inode = shmem_evict_inode,
1da177e4
LT
3241 .drop_inode = generic_delete_inode,
3242 .put_super = shmem_put_super,
3243};
3244
f0f37e2f 3245static const struct vm_operations_struct shmem_vm_ops = {
54cb8821 3246 .fault = shmem_fault,
d7c17551 3247 .map_pages = filemap_map_pages,
1da177e4
LT
3248#ifdef CONFIG_NUMA
3249 .set_policy = shmem_set_policy,
3250 .get_policy = shmem_get_policy,
3251#endif
3252};
3253
3c26ff6e
AV
3254static struct dentry *shmem_mount(struct file_system_type *fs_type,
3255 int flags, const char *dev_name, void *data)
1da177e4 3256{
3c26ff6e 3257 return mount_nodev(fs_type, flags, data, shmem_fill_super);
1da177e4
LT
3258}
3259
41ffe5d5 3260static struct file_system_type shmem_fs_type = {
1da177e4
LT
3261 .owner = THIS_MODULE,
3262 .name = "tmpfs",
3c26ff6e 3263 .mount = shmem_mount,
1da177e4 3264 .kill_sb = kill_litter_super,
2b8576cb 3265 .fs_flags = FS_USERNS_MOUNT,
1da177e4 3266};
1da177e4 3267
41ffe5d5 3268int __init shmem_init(void)
1da177e4
LT
3269{
3270 int error;
3271
16203a7a
RL
3272 /* If rootfs called this, don't re-init */
3273 if (shmem_inode_cachep)
3274 return 0;
3275
41ffe5d5 3276 error = shmem_init_inodecache();
1da177e4
LT
3277 if (error)
3278 goto out3;
3279
41ffe5d5 3280 error = register_filesystem(&shmem_fs_type);
1da177e4 3281 if (error) {
1170532b 3282 pr_err("Could not register tmpfs\n");
1da177e4
LT
3283 goto out2;
3284 }
95dc112a 3285
ca4e0519 3286 shm_mnt = kern_mount(&shmem_fs_type);
1da177e4
LT
3287 if (IS_ERR(shm_mnt)) {
3288 error = PTR_ERR(shm_mnt);
1170532b 3289 pr_err("Could not kern_mount tmpfs\n");
1da177e4
LT
3290 goto out1;
3291 }
3292 return 0;
3293
3294out1:
41ffe5d5 3295 unregister_filesystem(&shmem_fs_type);
1da177e4 3296out2:
41ffe5d5 3297 shmem_destroy_inodecache();
1da177e4
LT
3298out3:
3299 shm_mnt = ERR_PTR(error);
3300 return error;
3301}
853ac43a
MM
3302
3303#else /* !CONFIG_SHMEM */
3304
3305/*
3306 * tiny-shmem: simple shmemfs and tmpfs using ramfs code
3307 *
3308 * This is intended for small system where the benefits of the full
3309 * shmem code (swap-backed and resource-limited) are outweighed by
3310 * their complexity. On systems without swap this code should be
3311 * effectively equivalent, but much lighter weight.
3312 */
3313
41ffe5d5 3314static struct file_system_type shmem_fs_type = {
853ac43a 3315 .name = "tmpfs",
3c26ff6e 3316 .mount = ramfs_mount,
853ac43a 3317 .kill_sb = kill_litter_super,
2b8576cb 3318 .fs_flags = FS_USERNS_MOUNT,
853ac43a
MM
3319};
3320
41ffe5d5 3321int __init shmem_init(void)
853ac43a 3322{
41ffe5d5 3323 BUG_ON(register_filesystem(&shmem_fs_type) != 0);
853ac43a 3324
41ffe5d5 3325 shm_mnt = kern_mount(&shmem_fs_type);
853ac43a
MM
3326 BUG_ON(IS_ERR(shm_mnt));
3327
3328 return 0;
3329}
3330
41ffe5d5 3331int shmem_unuse(swp_entry_t swap, struct page *page)
853ac43a
MM
3332{
3333 return 0;
3334}
3335
3f96b79a
HD
3336int shmem_lock(struct file *file, int lock, struct user_struct *user)
3337{
3338 return 0;
3339}
3340
24513264
HD
3341void shmem_unlock_mapping(struct address_space *mapping)
3342{
3343}
3344
41ffe5d5 3345void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
94c1e62d 3346{
41ffe5d5 3347 truncate_inode_pages_range(inode->i_mapping, lstart, lend);
94c1e62d
HD
3348}
3349EXPORT_SYMBOL_GPL(shmem_truncate_range);
3350
0b0a0806
HD
3351#define shmem_vm_ops generic_file_vm_ops
3352#define shmem_file_operations ramfs_file_operations
454abafe 3353#define shmem_get_inode(sb, dir, mode, dev, flags) ramfs_get_inode(sb, dir, mode, dev)
0b0a0806
HD
3354#define shmem_acct_size(flags, size) 0
3355#define shmem_unacct_size(flags, size) do {} while (0)
853ac43a
MM
3356
3357#endif /* CONFIG_SHMEM */
3358
3359/* common code */
1da177e4 3360
3451538a 3361static struct dentry_operations anon_ops = {
118b2302 3362 .d_dname = simple_dname
3451538a
AV
3363};
3364
c7277090
EP
3365static struct file *__shmem_file_setup(const char *name, loff_t size,
3366 unsigned long flags, unsigned int i_flags)
1da177e4 3367{
6b4d0b27 3368 struct file *res;
1da177e4 3369 struct inode *inode;
2c48b9c4 3370 struct path path;
3451538a 3371 struct super_block *sb;
1da177e4
LT
3372 struct qstr this;
3373
3374 if (IS_ERR(shm_mnt))
6b4d0b27 3375 return ERR_CAST(shm_mnt);
1da177e4 3376
285b2c4f 3377 if (size < 0 || size > MAX_LFS_FILESIZE)
1da177e4
LT
3378 return ERR_PTR(-EINVAL);
3379
3380 if (shmem_acct_size(flags, size))
3381 return ERR_PTR(-ENOMEM);
3382
6b4d0b27 3383 res = ERR_PTR(-ENOMEM);
1da177e4
LT
3384 this.name = name;
3385 this.len = strlen(name);
3386 this.hash = 0; /* will go */
3451538a 3387 sb = shm_mnt->mnt_sb;
66ee4b88 3388 path.mnt = mntget(shm_mnt);
3451538a 3389 path.dentry = d_alloc_pseudo(sb, &this);
2c48b9c4 3390 if (!path.dentry)
1da177e4 3391 goto put_memory;
3451538a 3392 d_set_d_op(path.dentry, &anon_ops);
1da177e4 3393
6b4d0b27 3394 res = ERR_PTR(-ENOSPC);
3451538a 3395 inode = shmem_get_inode(sb, NULL, S_IFREG | S_IRWXUGO, 0, flags);
1da177e4 3396 if (!inode)
66ee4b88 3397 goto put_memory;
1da177e4 3398
c7277090 3399 inode->i_flags |= i_flags;
2c48b9c4 3400 d_instantiate(path.dentry, inode);
1da177e4 3401 inode->i_size = size;
6d6b77f1 3402 clear_nlink(inode); /* It is unlinked */
26567cdb
AV
3403 res = ERR_PTR(ramfs_nommu_expand_for_mapping(inode, size));
3404 if (IS_ERR(res))
66ee4b88 3405 goto put_path;
4b42af81 3406
6b4d0b27 3407 res = alloc_file(&path, FMODE_WRITE | FMODE_READ,
4b42af81 3408 &shmem_file_operations);
6b4d0b27 3409 if (IS_ERR(res))
66ee4b88 3410 goto put_path;
4b42af81 3411
6b4d0b27 3412 return res;
1da177e4 3413
1da177e4
LT
3414put_memory:
3415 shmem_unacct_size(flags, size);
66ee4b88
KK
3416put_path:
3417 path_put(&path);
6b4d0b27 3418 return res;
1da177e4 3419}
c7277090
EP
3420
3421/**
3422 * shmem_kernel_file_setup - get an unlinked file living in tmpfs which must be
3423 * kernel internal. There will be NO LSM permission checks against the
3424 * underlying inode. So users of this interface must do LSM checks at a
e1832f29
SS
3425 * higher layer. The users are the big_key and shm implementations. LSM
3426 * checks are provided at the key or shm level rather than the inode.
c7277090
EP
3427 * @name: name for dentry (to be seen in /proc/<pid>/maps
3428 * @size: size to be set for the file
3429 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
3430 */
3431struct file *shmem_kernel_file_setup(const char *name, loff_t size, unsigned long flags)
3432{
3433 return __shmem_file_setup(name, size, flags, S_PRIVATE);
3434}
3435
3436/**
3437 * shmem_file_setup - get an unlinked file living in tmpfs
3438 * @name: name for dentry (to be seen in /proc/<pid>/maps
3439 * @size: size to be set for the file
3440 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
3441 */
3442struct file *shmem_file_setup(const char *name, loff_t size, unsigned long flags)
3443{
3444 return __shmem_file_setup(name, size, flags, 0);
3445}
395e0ddc 3446EXPORT_SYMBOL_GPL(shmem_file_setup);
1da177e4 3447
46711810 3448/**
1da177e4 3449 * shmem_zero_setup - setup a shared anonymous mapping
1da177e4
LT
3450 * @vma: the vma to be mmapped is prepared by do_mmap_pgoff
3451 */
3452int shmem_zero_setup(struct vm_area_struct *vma)
3453{
3454 struct file *file;
3455 loff_t size = vma->vm_end - vma->vm_start;
3456
66fc1303
HD
3457 /*
3458 * Cloning a new file under mmap_sem leads to a lock ordering conflict
3459 * between XFS directory reading and selinux: since this file is only
3460 * accessible to the user through its mapping, use S_PRIVATE flag to
3461 * bypass file security, in the same way as shmem_kernel_file_setup().
3462 */
3463 file = __shmem_file_setup("dev/zero", size, vma->vm_flags, S_PRIVATE);
1da177e4
LT
3464 if (IS_ERR(file))
3465 return PTR_ERR(file);
3466
3467 if (vma->vm_file)
3468 fput(vma->vm_file);
3469 vma->vm_file = file;
3470 vma->vm_ops = &shmem_vm_ops;
3471 return 0;
3472}
d9d90e5e
HD
3473
3474/**
3475 * shmem_read_mapping_page_gfp - read into page cache, using specified page allocation flags.
3476 * @mapping: the page's address_space
3477 * @index: the page index
3478 * @gfp: the page allocator flags to use if allocating
3479 *
3480 * This behaves as a tmpfs "read_cache_page_gfp(mapping, index, gfp)",
3481 * with any new page allocations done using the specified allocation flags.
3482 * But read_cache_page_gfp() uses the ->readpage() method: which does not
3483 * suit tmpfs, since it may have pages in swapcache, and needs to find those
3484 * for itself; although drivers/gpu/drm i915 and ttm rely upon this support.
3485 *
68da9f05
HD
3486 * i915_gem_object_get_pages_gtt() mixes __GFP_NORETRY | __GFP_NOWARN in
3487 * with the mapping_gfp_mask(), to avoid OOMing the machine unnecessarily.
d9d90e5e
HD
3488 */
3489struct page *shmem_read_mapping_page_gfp(struct address_space *mapping,
3490 pgoff_t index, gfp_t gfp)
3491{
68da9f05
HD
3492#ifdef CONFIG_SHMEM
3493 struct inode *inode = mapping->host;
9276aad6 3494 struct page *page;
68da9f05
HD
3495 int error;
3496
3497 BUG_ON(mapping->a_ops != &shmem_aops);
3498 error = shmem_getpage_gfp(inode, index, &page, SGP_CACHE, gfp, NULL);
3499 if (error)
3500 page = ERR_PTR(error);
3501 else
3502 unlock_page(page);
3503 return page;
3504#else
3505 /*
3506 * The tiny !SHMEM case uses ramfs without swap
3507 */
d9d90e5e 3508 return read_cache_page_gfp(mapping, index, gfp);
68da9f05 3509#endif
d9d90e5e
HD
3510}
3511EXPORT_SYMBOL_GPL(shmem_read_mapping_page_gfp);