fs: add FSCONFIG_CMD_CREATE_EXCL
[linux-block.git] / fs / super.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/super.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 *
7 * super.c contains code to handle: - mount structures
8 * - super-block tables
9 * - filesystem drivers list
10 * - mount system call
11 * - umount system call
12 * - ustat system call
13 *
14 * GK 2/5/95 - Changed to support mounting the root fs via NFS
15 *
16 * Added kerneld support: Jacques Gelinas and Bjorn Ekwall
17 * Added change_root: Werner Almesberger & Hans Lermen, Feb '96
18 * Added options to /proc/mounts:
96de0e25 19 * Torbjörn Lindh (torbjorn.lindh@gopta.se), April 14, 1996.
1da177e4
LT
20 * Added devfs support: Richard Gooch <rgooch@atnf.csiro.au>, 13-JAN-1998
21 * Heavily rewritten for 'one fs - one tree' dcache architecture. AV, Mar 2000
22 */
23
630d9c47 24#include <linux/export.h>
1da177e4 25#include <linux/slab.h>
1da177e4 26#include <linux/blkdev.h>
1da177e4
LT
27#include <linux/mount.h>
28#include <linux/security.h>
1da177e4
LT
29#include <linux/writeback.h> /* for the emergency remount stuff */
30#include <linux/idr.h>
353ab6e9 31#include <linux/mutex.h>
5477d0fa 32#include <linux/backing-dev.h>
ceb5bdc2 33#include <linux/rculist_bl.h>
22d94f49 34#include <linux/fscrypt.h>
40401530 35#include <linux/fsnotify.h>
5accdf82 36#include <linux/lockdep.h>
6e4eab57 37#include <linux/user_namespace.h>
9bc61ab1 38#include <linux/fs_context.h>
e262e32d 39#include <uapi/linux/mount.h>
6d59e7f5 40#include "internal.h"
1da177e4 41
08fdc8a0 42static int thaw_super_locked(struct super_block *sb);
1da177e4 43
15d0f5ea
AV
44static LIST_HEAD(super_blocks);
45static DEFINE_SPINLOCK(sb_lock);
1da177e4 46
5accdf82
JK
47static char *sb_writers_name[SB_FREEZE_LEVELS] = {
48 "sb_writers",
49 "sb_pagefaults",
50 "sb_internal",
51};
52
b0d40c92
DC
53/*
54 * One thing we have to be careful of with a per-sb shrinker is that we don't
55 * drop the last active reference to the superblock from within the shrinker.
56 * If that happens we could trigger unregistering the shrinker from within the
47a7c01c 57 * shrinker path and that leads to deadlock on the shrinker_rwsem. Hence we
b0d40c92
DC
58 * take a passive reference to the superblock to avoid this from occurring.
59 */
0a234c6d
DC
60static unsigned long super_cache_scan(struct shrinker *shrink,
61 struct shrink_control *sc)
b0d40c92
DC
62{
63 struct super_block *sb;
0a234c6d
DC
64 long fs_objects = 0;
65 long total_objects;
66 long freed = 0;
67 long dentries;
68 long inodes;
b0d40c92
DC
69
70 sb = container_of(shrink, struct super_block, s_shrink);
71
72 /*
73 * Deadlock avoidance. We may hold various FS locks, and we don't want
74 * to recurse into the FS that called us in clear_inode() and friends..
75 */
0a234c6d
DC
76 if (!(sc->gfp_mask & __GFP_FS))
77 return SHRINK_STOP;
b0d40c92 78
eb6ef3df 79 if (!trylock_super(sb))
0a234c6d 80 return SHRINK_STOP;
b0d40c92 81
d0407903 82 if (sb->s_op->nr_cached_objects)
4101b624 83 fs_objects = sb->s_op->nr_cached_objects(sb, sc);
0e1fdafd 84
503c358c
VD
85 inodes = list_lru_shrink_count(&sb->s_inode_lru, sc);
86 dentries = list_lru_shrink_count(&sb->s_dentry_lru, sc);
f6041567 87 total_objects = dentries + inodes + fs_objects + 1;
475d0db7
TH
88 if (!total_objects)
89 total_objects = 1;
0e1fdafd 90
0a234c6d 91 /* proportion the scan between the caches */
f6041567 92 dentries = mult_frac(sc->nr_to_scan, dentries, total_objects);
bc3b14cb 93 inodes = mult_frac(sc->nr_to_scan, inodes, total_objects);
503c358c 94 fs_objects = mult_frac(sc->nr_to_scan, fs_objects, total_objects);
b0d40c92 95
0a234c6d
DC
96 /*
97 * prune the dcache first as the icache is pinned by it, then
98 * prune the icache, followed by the filesystem specific caches
49e7e7ff
VD
99 *
100 * Ensure that we always scan at least one object - memcg kmem
101 * accounting uses this to fully empty the caches.
0a234c6d 102 */
49e7e7ff 103 sc->nr_to_scan = dentries + 1;
503c358c 104 freed = prune_dcache_sb(sb, sc);
49e7e7ff 105 sc->nr_to_scan = inodes + 1;
503c358c 106 freed += prune_icache_sb(sb, sc);
0a234c6d
DC
107
108 if (fs_objects) {
49e7e7ff 109 sc->nr_to_scan = fs_objects + 1;
4101b624 110 freed += sb->s_op->free_cached_objects(sb, sc);
b0d40c92
DC
111 }
112
eb6ef3df 113 up_read(&sb->s_umount);
0a234c6d
DC
114 return freed;
115}
116
117static unsigned long super_cache_count(struct shrinker *shrink,
118 struct shrink_control *sc)
119{
120 struct super_block *sb;
121 long total_objects = 0;
122
123 sb = container_of(shrink, struct super_block, s_shrink);
124
d23da150 125 /*
79f546a6
DC
126 * We don't call trylock_super() here as it is a scalability bottleneck,
127 * so we're exposed to partial setup state. The shrinker rwsem does not
128 * protect filesystem operations backing list_lru_shrink_count() or
129 * s_op->nr_cached_objects(). Counts can change between
130 * super_cache_count and super_cache_scan, so we really don't need locks
131 * here.
132 *
133 * However, if we are currently mounting the superblock, the underlying
134 * filesystem might be in a state of partial construction and hence it
135 * is dangerous to access it. trylock_super() uses a SB_BORN check to
136 * avoid this situation, so do the same here. The memory barrier is
137 * matched with the one in mount_fs() as we don't hold locks here.
d23da150 138 */
79f546a6
DC
139 if (!(sb->s_flags & SB_BORN))
140 return 0;
141 smp_rmb();
142
0a234c6d 143 if (sb->s_op && sb->s_op->nr_cached_objects)
4101b624 144 total_objects = sb->s_op->nr_cached_objects(sb, sc);
0a234c6d 145
503c358c
VD
146 total_objects += list_lru_shrink_count(&sb->s_dentry_lru, sc);
147 total_objects += list_lru_shrink_count(&sb->s_inode_lru, sc);
0a234c6d 148
9b996468
KT
149 if (!total_objects)
150 return SHRINK_EMPTY;
151
55f841ce 152 total_objects = vfs_pressure_ratio(total_objects);
0e1fdafd 153 return total_objects;
b0d40c92
DC
154}
155
853b39a7
ON
156static void destroy_super_work(struct work_struct *work)
157{
158 struct super_block *s = container_of(work, struct super_block,
159 destroy_work);
160 int i;
161
162 for (i = 0; i < SB_FREEZE_LEVELS; i++)
8129ed29 163 percpu_free_rwsem(&s->s_writers.rw_sem[i]);
853b39a7
ON
164 kfree(s);
165}
166
167static void destroy_super_rcu(struct rcu_head *head)
168{
169 struct super_block *s = container_of(head, struct super_block, rcu);
170 INIT_WORK(&s->destroy_work, destroy_super_work);
171 schedule_work(&s->destroy_work);
172}
173
0200894d
AV
174/* Free a superblock that has never been seen by anyone */
175static void destroy_unused_super(struct super_block *s)
5accdf82 176{
0200894d
AV
177 if (!s)
178 return;
179 up_write(&s->s_umount);
7eb5e882
AV
180 list_lru_destroy(&s->s_dentry_lru);
181 list_lru_destroy(&s->s_inode_lru);
7eb5e882 182 security_sb_free(s);
6e4eab57 183 put_user_ns(s->s_user_ns);
7eb5e882 184 kfree(s->s_subtype);
8e04944f 185 free_prealloced_shrinker(&s->s_shrink);
0200894d
AV
186 /* no delays needed */
187 destroy_super_work(&s->destroy_work);
5accdf82
JK
188}
189
1da177e4
LT
190/**
191 * alloc_super - create new superblock
fe2bbc48 192 * @type: filesystem type superblock should belong to
9249e17f 193 * @flags: the mount flags
6e4eab57 194 * @user_ns: User namespace for the super_block
1da177e4
LT
195 *
196 * Allocates and initializes a new &struct super_block. alloc_super()
197 * returns a pointer new superblock or %NULL if allocation had failed.
198 */
6e4eab57
EB
199static struct super_block *alloc_super(struct file_system_type *type, int flags,
200 struct user_namespace *user_ns)
1da177e4 201{
11b0b5ab 202 struct super_block *s = kzalloc(sizeof(struct super_block), GFP_USER);
b87221de 203 static const struct super_operations default_op;
7eb5e882
AV
204 int i;
205
206 if (!s)
207 return NULL;
1da177e4 208
b5bd856a 209 INIT_LIST_HEAD(&s->s_mounts);
6e4eab57 210 s->s_user_ns = get_user_ns(user_ns);
ca0168e8
AV
211 init_rwsem(&s->s_umount);
212 lockdep_set_class(&s->s_umount, &type->s_umount_key);
213 /*
214 * sget() can have s_umount recursion.
215 *
216 * When it cannot find a suitable sb, it allocates a new
217 * one (this one), and tries again to find a suitable old
218 * one.
219 *
220 * In case that succeeds, it will acquire the s_umount
221 * lock of the old one. Since these are clearly distrinct
222 * locks, and this object isn't exposed yet, there's no
223 * risk of deadlocks.
224 *
225 * Annotate this by putting this lock in a different
226 * subclass.
227 */
228 down_write_nested(&s->s_umount, SINGLE_DEPTH_NESTING);
b5bd856a 229
7eb5e882
AV
230 if (security_sb_alloc(s))
231 goto fail;
7b7a8665 232
7eb5e882 233 for (i = 0; i < SB_FREEZE_LEVELS; i++) {
8129ed29
ON
234 if (__percpu_init_rwsem(&s->s_writers.rw_sem[i],
235 sb_writers_name[i],
236 &type->s_writers_key[i]))
7eb5e882 237 goto fail;
1da177e4 238 }
df0ce26c 239 s->s_bdi = &noop_backing_dev_info;
7eb5e882 240 s->s_flags = flags;
cc50a07a 241 if (s->s_user_ns != &init_user_ns)
67690f93 242 s->s_iflags |= SB_I_NODEV;
7eb5e882 243 INIT_HLIST_NODE(&s->s_instances);
f1ee6162 244 INIT_HLIST_BL_HEAD(&s->s_roots);
e97fedb9 245 mutex_init(&s->s_sync_lock);
7eb5e882 246 INIT_LIST_HEAD(&s->s_inodes);
74278da9 247 spin_lock_init(&s->s_inode_list_lock);
6c60d2b5
DC
248 INIT_LIST_HEAD(&s->s_inodes_wb);
249 spin_lock_init(&s->s_inode_wblist_lock);
7eb5e882 250
7eb5e882
AV
251 s->s_count = 1;
252 atomic_set(&s->s_active, 1);
253 mutex_init(&s->s_vfs_rename_mutex);
254 lockdep_set_class(&s->s_vfs_rename_mutex, &type->s_vfs_rename_key);
bc8230ee 255 init_rwsem(&s->s_dquot.dqio_sem);
7eb5e882
AV
256 s->s_maxbytes = MAX_NON_LFS;
257 s->s_op = &default_op;
258 s->s_time_gran = 1000000000;
188d20bc
DD
259 s->s_time_min = TIME64_MIN;
260 s->s_time_max = TIME64_MAX;
7eb5e882
AV
261
262 s->s_shrink.seeks = DEFAULT_SEEKS;
263 s->s_shrink.scan_objects = super_cache_scan;
264 s->s_shrink.count_objects = super_cache_count;
265 s->s_shrink.batch = 1024;
2acb60a0 266 s->s_shrink.flags = SHRINKER_NUMA_AWARE | SHRINKER_MEMCG_AWARE;
e33c267a 267 if (prealloc_shrinker(&s->s_shrink, "sb-%s", type->name))
8e04944f 268 goto fail;
c92e8e10 269 if (list_lru_init_memcg(&s->s_dentry_lru, &s->s_shrink))
2b3648a6 270 goto fail;
c92e8e10 271 if (list_lru_init_memcg(&s->s_inode_lru, &s->s_shrink))
2b3648a6 272 goto fail;
1da177e4 273 return s;
5ca302c8 274
7eb5e882 275fail:
0200894d 276 destroy_unused_super(s);
7eb5e882 277 return NULL;
1da177e4
LT
278}
279
280/* Superblock refcounting */
281
282/*
35cf7ba0 283 * Drop a superblock's refcount. The caller must hold sb_lock.
1da177e4 284 */
c645b930 285static void __put_super(struct super_block *s)
1da177e4 286{
c645b930
AV
287 if (!--s->s_count) {
288 list_del_init(&s->s_list);
289 WARN_ON(s->s_dentry_lru.node);
290 WARN_ON(s->s_inode_lru.node);
291 WARN_ON(!list_empty(&s->s_mounts));
292 security_sb_free(s);
293 put_user_ns(s->s_user_ns);
294 kfree(s->s_subtype);
295 call_rcu(&s->rcu, destroy_super_rcu);
1da177e4 296 }
1da177e4
LT
297}
298
299/**
300 * put_super - drop a temporary reference to superblock
301 * @sb: superblock in question
302 *
303 * Drops a temporary reference, frees superblock if there's no
304 * references left.
305 */
60b49885 306void put_super(struct super_block *sb)
1da177e4
LT
307{
308 spin_lock(&sb_lock);
309 __put_super(sb);
310 spin_unlock(&sb_lock);
311}
312
313
314/**
1712ac8f 315 * deactivate_locked_super - drop an active reference to superblock
1da177e4
LT
316 * @s: superblock to deactivate
317 *
bd7ced98 318 * Drops an active reference to superblock, converting it into a temporary
1712ac8f 319 * one if there is no other active references left. In that case we
1da177e4
LT
320 * tell fs driver to shut it down and drop the temporary reference we
321 * had just acquired.
1712ac8f
AV
322 *
323 * Caller holds exclusive lock on superblock; that lock is released.
1da177e4 324 */
1712ac8f 325void deactivate_locked_super(struct super_block *s)
1da177e4
LT
326{
327 struct file_system_type *fs = s->s_type;
b20bd1a5 328 if (atomic_dec_and_test(&s->s_active)) {
b0d40c92 329 unregister_shrinker(&s->s_shrink);
28f2cd4f 330 fs->kill_sb(s);
f5e1dd34 331
c0a5b560
VD
332 /*
333 * Since list_lru_destroy() may sleep, we cannot call it from
334 * put_super(), where we hold the sb_lock. Therefore we destroy
335 * the lru lists right now.
336 */
337 list_lru_destroy(&s->s_dentry_lru);
338 list_lru_destroy(&s->s_inode_lru);
339
1da177e4
LT
340 put_filesystem(fs);
341 put_super(s);
1712ac8f
AV
342 } else {
343 up_write(&s->s_umount);
1da177e4
LT
344 }
345}
346
1712ac8f 347EXPORT_SYMBOL(deactivate_locked_super);
1da177e4 348
74dbbdd7 349/**
1712ac8f 350 * deactivate_super - drop an active reference to superblock
74dbbdd7
AV
351 * @s: superblock to deactivate
352 *
1712ac8f
AV
353 * Variant of deactivate_locked_super(), except that superblock is *not*
354 * locked by caller. If we are going to drop the final active reference,
355 * lock will be acquired prior to that.
74dbbdd7 356 */
1712ac8f 357void deactivate_super(struct super_block *s)
74dbbdd7 358{
cc23402c 359 if (!atomic_add_unless(&s->s_active, -1, 1)) {
1712ac8f
AV
360 down_write(&s->s_umount);
361 deactivate_locked_super(s);
74dbbdd7
AV
362 }
363}
364
1712ac8f 365EXPORT_SYMBOL(deactivate_super);
74dbbdd7 366
1da177e4
LT
367/**
368 * grab_super - acquire an active reference
369 * @s: reference we are trying to make active
370 *
371 * Tries to acquire an active reference. grab_super() is used when we
372 * had just found a superblock in super_blocks or fs_type->fs_supers
373 * and want to turn it into a full-blown active reference. grab_super()
374 * is called with sb_lock held and drops it. Returns 1 in case of
375 * success, 0 if we had failed (superblock contents was already dead or
acfec9a5
AV
376 * dying when grab_super() had been called). Note that this is only
377 * called for superblocks not in rundown mode (== ones still on ->fs_supers
378 * of their type), so increment of ->s_count is OK here.
1da177e4 379 */
9c4dbee7 380static int grab_super(struct super_block *s) __releases(sb_lock)
1da177e4
LT
381{
382 s->s_count++;
383 spin_unlock(&sb_lock);
384 down_write(&s->s_umount);
e462ec50 385 if ((s->s_flags & SB_BORN) && atomic_inc_not_zero(&s->s_active)) {
acfec9a5
AV
386 put_super(s);
387 return 1;
388 }
1da177e4
LT
389 up_write(&s->s_umount);
390 put_super(s);
1da177e4
LT
391 return 0;
392}
393
12ad3ab6 394/*
eb6ef3df 395 * trylock_super - try to grab ->s_umount shared
331cbdee 396 * @sb: reference we are trying to grab
12ad3ab6 397 *
eb6ef3df 398 * Try to prevent fs shutdown. This is used in places where we
12ad3ab6 399 * cannot take an active reference but we need to ensure that the
eb6ef3df
KK
400 * filesystem is not shut down while we are working on it. It returns
401 * false if we cannot acquire s_umount or if we lose the race and
402 * filesystem already got into shutdown, and returns true with the s_umount
403 * lock held in read mode in case of success. On successful return,
404 * the caller must drop the s_umount lock when done.
405 *
406 * Note that unlike get_super() et.al. this one does *not* bump ->s_count.
407 * The reason why it's safe is that we are OK with doing trylock instead
408 * of down_read(). There's a couple of places that are OK with that, but
409 * it's very much not a general-purpose interface.
12ad3ab6 410 */
eb6ef3df 411bool trylock_super(struct super_block *sb)
12ad3ab6 412{
12ad3ab6 413 if (down_read_trylock(&sb->s_umount)) {
eb6ef3df 414 if (!hlist_unhashed(&sb->s_instances) &&
e462ec50 415 sb->s_root && (sb->s_flags & SB_BORN))
12ad3ab6
DC
416 return true;
417 up_read(&sb->s_umount);
418 }
419
12ad3ab6
DC
420 return false;
421}
422
04b94071
DL
423/**
424 * retire_super - prevents superblock from being reused
425 * @sb: superblock to retire
426 *
427 * The function marks superblock to be ignored in superblock test, which
428 * prevents it from being reused for any new mounts. If the superblock has
429 * a private bdi, it also unregisters it, but doesn't reduce the refcount
430 * of the superblock to prevent potential races. The refcount is reduced
431 * by generic_shutdown_super(). The function can not be called
432 * concurrently with generic_shutdown_super(). It is safe to call the
433 * function multiple times, subsequent calls have no effect.
434 *
435 * The marker will affect the re-use only for block-device-based
436 * superblocks. Other superblocks will still get marked if this function
437 * is used, but that will not affect their reusability.
438 */
439void retire_super(struct super_block *sb)
440{
441 WARN_ON(!sb->s_bdev);
442 down_write(&sb->s_umount);
443 if (sb->s_iflags & SB_I_PERSB_BDI) {
444 bdi_unregister(sb->s_bdi);
445 sb->s_iflags &= ~SB_I_PERSB_BDI;
446 }
447 sb->s_iflags |= SB_I_RETIRED;
448 up_write(&sb->s_umount);
449}
450EXPORT_SYMBOL(retire_super);
451
1da177e4
LT
452/**
453 * generic_shutdown_super - common helper for ->kill_sb()
454 * @sb: superblock to kill
455 *
456 * generic_shutdown_super() does all fs-independent work on superblock
457 * shutdown. Typical ->kill_sb() should pick all fs-specific objects
458 * that need destruction out of superblock, call generic_shutdown_super()
459 * and release aforementioned objects. Note: dentries and inodes _are_
460 * taken care of and do not need specific handling.
c636ebdb
DH
461 *
462 * Upon calling this function, the filesystem may no longer alter or
463 * rearrange the set of dentries belonging to this super_block, nor may it
464 * change the attachments of dentries to inodes.
1da177e4
LT
465 */
466void generic_shutdown_super(struct super_block *sb)
467{
ee9b6d61 468 const struct super_operations *sop = sb->s_op;
1da177e4 469
c636ebdb
DH
470 if (sb->s_root) {
471 shrink_dcache_for_umount(sb);
60b0680f 472 sync_filesystem(sb);
e462ec50 473 sb->s_flags &= ~SB_ACTIVE;
efaee192 474
a1a0e23e 475 cgroup_writeback_umount();
63997e98 476
ccb820dc 477 /* Evict all inodes with zero refcount. */
63997e98 478 evict_inodes(sb);
ccb820dc
EB
479
480 /*
481 * Clean up and evict any inodes that still have references due
482 * to fsnotify or the security policy.
483 */
1edc8eb2 484 fsnotify_sb_delete(sb);
83e804f0 485 security_sb_delete(sb);
1da177e4 486
ccb820dc
EB
487 /*
488 * Now that all potentially-encrypted inodes have been evicted,
489 * the fscrypt keyring can be destroyed.
490 */
491 fscrypt_destroy_keyring(sb);
492
7b7a8665
CH
493 if (sb->s_dio_done_wq) {
494 destroy_workqueue(sb->s_dio_done_wq);
495 sb->s_dio_done_wq = NULL;
496 }
497
1da177e4
LT
498 if (sop->put_super)
499 sop->put_super(sb);
500
47d58691
JH
501 if (CHECK_DATA_CORRUPTION(!list_empty(&sb->s_inodes),
502 "VFS: Busy inodes after unmount of %s (%s)",
503 sb->s_id, sb->s_type->name)) {
504 /*
505 * Adding a proper bailout path here would be hard, but
506 * we can at least make it more likely that a later
507 * iput_final() or such crashes cleanly.
508 */
509 struct inode *inode;
510
511 spin_lock(&sb->s_inode_list_lock);
512 list_for_each_entry(inode, &sb->s_inodes, i_sb_list) {
513 inode->i_op = VFS_PTR_POISON;
514 inode->i_sb = VFS_PTR_POISON;
515 inode->i_mapping = VFS_PTR_POISON;
516 }
517 spin_unlock(&sb->s_inode_list_lock);
1da177e4 518 }
1da177e4
LT
519 }
520 spin_lock(&sb_lock);
521 /* should be initialized for __put_super_and_need_restart() */
a5166169 522 hlist_del_init(&sb->s_instances);
1da177e4
LT
523 spin_unlock(&sb_lock);
524 up_write(&sb->s_umount);
c1844d53 525 if (sb->s_bdi != &noop_backing_dev_info) {
0b3ea092
CH
526 if (sb->s_iflags & SB_I_PERSB_BDI)
527 bdi_unregister(sb->s_bdi);
fca39346
JK
528 bdi_put(sb->s_bdi);
529 sb->s_bdi = &noop_backing_dev_info;
fca39346 530 }
1da177e4
LT
531}
532
533EXPORT_SYMBOL(generic_shutdown_super);
534
20284ab7 535bool mount_capable(struct fs_context *fc)
0ce0cf12 536{
20284ab7 537 if (!(fc->fs_type->fs_flags & FS_USERNS_MOUNT))
0ce0cf12
AV
538 return capable(CAP_SYS_ADMIN);
539 else
c2c44ec2 540 return ns_capable(fc->user_ns, CAP_SYS_ADMIN);
0ce0cf12
AV
541}
542
cb50b348
AV
543/**
544 * sget_fc - Find or create a superblock
545 * @fc: Filesystem context.
546 * @test: Comparison callback
547 * @set: Setup callback
548 *
22ed7ecd 549 * Create a new superblock or find an existing one.
cb50b348 550 *
22ed7ecd
CB
551 * The @test callback is used to find a matching existing superblock.
552 * Whether or not the requested parameters in @fc are taken into account
553 * is specific to the @test callback that is used. They may even be
554 * completely ignored.
555 *
556 * If an extant superblock is matched, it will be returned unless:
557 *
558 * (1) the namespace the filesystem context @fc and the extant
559 * superblock's namespace differ
560 *
561 * (2) the filesystem context @fc has requested that reusing an extant
562 * superblock is not allowed
563 *
564 * In both cases EBUSY will be returned.
cb50b348
AV
565 *
566 * If no match is made, a new superblock will be allocated and basic
22ed7ecd
CB
567 * initialisation will be performed (s_type, s_fs_info and s_id will be
568 * set and the @set callback will be invoked), the superblock will be
569 * published and it will be returned in a partially constructed state
570 * with SB_BORN and SB_ACTIVE as yet unset.
571 *
572 * Return: On success, an extant or newly created superblock is
573 * returned. On failure an error pointer is returned.
cb50b348
AV
574 */
575struct super_block *sget_fc(struct fs_context *fc,
576 int (*test)(struct super_block *, struct fs_context *),
577 int (*set)(struct super_block *, struct fs_context *))
578{
579 struct super_block *s = NULL;
580 struct super_block *old;
581 struct user_namespace *user_ns = fc->global ? &init_user_ns : fc->user_ns;
582 int err;
583
cb50b348
AV
584retry:
585 spin_lock(&sb_lock);
586 if (test) {
587 hlist_for_each_entry(old, &fc->fs_type->fs_supers, s_instances) {
588 if (test(old, fc))
589 goto share_extant_sb;
590 }
591 }
592 if (!s) {
593 spin_unlock(&sb_lock);
594 s = alloc_super(fc->fs_type, fc->sb_flags, user_ns);
595 if (!s)
596 return ERR_PTR(-ENOMEM);
597 goto retry;
598 }
599
600 s->s_fs_info = fc->s_fs_info;
601 err = set(s, fc);
602 if (err) {
603 s->s_fs_info = NULL;
604 spin_unlock(&sb_lock);
605 destroy_unused_super(s);
606 return ERR_PTR(err);
607 }
608 fc->s_fs_info = NULL;
609 s->s_type = fc->fs_type;
c80fa7c8 610 s->s_iflags |= fc->s_iflags;
c642256b 611 strscpy(s->s_id, s->s_type->name, sizeof(s->s_id));
cb50b348
AV
612 list_add_tail(&s->s_list, &super_blocks);
613 hlist_add_head(&s->s_instances, &s->s_type->fs_supers);
614 spin_unlock(&sb_lock);
615 get_filesystem(s->s_type);
616 register_shrinker_prepared(&s->s_shrink);
617 return s;
618
619share_extant_sb:
22ed7ecd 620 if (user_ns != old->s_user_ns || fc->exclusive) {
cb50b348
AV
621 spin_unlock(&sb_lock);
622 destroy_unused_super(s);
22ed7ecd
CB
623 if (fc->exclusive)
624 warnfc(fc, "reusing existing filesystem not allowed");
625 else
626 warnfc(fc, "reusing existing filesystem in another namespace not allowed");
cb50b348
AV
627 return ERR_PTR(-EBUSY);
628 }
629 if (!grab_super(old))
630 goto retry;
631 destroy_unused_super(s);
632 return old;
633}
634EXPORT_SYMBOL(sget_fc);
635
1da177e4 636/**
023d066a
DH
637 * sget - find or create a superblock
638 * @type: filesystem type superblock should belong to
639 * @test: comparison callback
640 * @set: setup callback
641 * @flags: mount flags
642 * @data: argument to each of them
1da177e4 643 */
023d066a 644struct super_block *sget(struct file_system_type *type,
1da177e4
LT
645 int (*test)(struct super_block *,void *),
646 int (*set)(struct super_block *,void *),
023d066a 647 int flags,
1da177e4
LT
648 void *data)
649{
023d066a 650 struct user_namespace *user_ns = current_user_ns();
1da177e4 651 struct super_block *s = NULL;
d4730127 652 struct super_block *old;
1da177e4
LT
653 int err;
654
023d066a
DH
655 /* We don't yet pass the user namespace of the parent
656 * mount through to here so always use &init_user_ns
657 * until that changes.
658 */
659 if (flags & SB_SUBMOUNT)
660 user_ns = &init_user_ns;
661
1da177e4
LT
662retry:
663 spin_lock(&sb_lock);
d4730127 664 if (test) {
b67bfe0d 665 hlist_for_each_entry(old, &type->fs_supers, s_instances) {
d4730127
MK
666 if (!test(old, data))
667 continue;
6e4eab57
EB
668 if (user_ns != old->s_user_ns) {
669 spin_unlock(&sb_lock);
0200894d 670 destroy_unused_super(s);
6e4eab57
EB
671 return ERR_PTR(-EBUSY);
672 }
d4730127
MK
673 if (!grab_super(old))
674 goto retry;
0200894d 675 destroy_unused_super(s);
d4730127
MK
676 return old;
677 }
1da177e4
LT
678 }
679 if (!s) {
680 spin_unlock(&sb_lock);
e462ec50 681 s = alloc_super(type, (flags & ~SB_SUBMOUNT), user_ns);
1da177e4
LT
682 if (!s)
683 return ERR_PTR(-ENOMEM);
684 goto retry;
685 }
dd111b31 686
1da177e4
LT
687 err = set(s, data);
688 if (err) {
689 spin_unlock(&sb_lock);
0200894d 690 destroy_unused_super(s);
1da177e4
LT
691 return ERR_PTR(err);
692 }
693 s->s_type = type;
c642256b 694 strscpy(s->s_id, type->name, sizeof(s->s_id));
1da177e4 695 list_add_tail(&s->s_list, &super_blocks);
a5166169 696 hlist_add_head(&s->s_instances, &type->fs_supers);
1da177e4
LT
697 spin_unlock(&sb_lock);
698 get_filesystem(type);
8e04944f 699 register_shrinker_prepared(&s->s_shrink);
1da177e4
LT
700 return s;
701}
1da177e4
LT
702EXPORT_SYMBOL(sget);
703
704void drop_super(struct super_block *sb)
705{
706 up_read(&sb->s_umount);
707 put_super(sb);
708}
709
710EXPORT_SYMBOL(drop_super);
711
ba6379f7
JK
712void drop_super_exclusive(struct super_block *sb)
713{
714 up_write(&sb->s_umount);
715 put_super(sb);
716}
717EXPORT_SYMBOL(drop_super_exclusive);
718
fa7c1d50
MG
719static void __iterate_supers(void (*f)(struct super_block *))
720{
721 struct super_block *sb, *p = NULL;
722
723 spin_lock(&sb_lock);
724 list_for_each_entry(sb, &super_blocks, s_list) {
725 if (hlist_unhashed(&sb->s_instances))
726 continue;
727 sb->s_count++;
728 spin_unlock(&sb_lock);
729
730 f(sb);
731
732 spin_lock(&sb_lock);
733 if (p)
734 __put_super(p);
735 p = sb;
736 }
737 if (p)
738 __put_super(p);
739 spin_unlock(&sb_lock);
740}
01a05b33
AV
741/**
742 * iterate_supers - call function for all active superblocks
743 * @f: function to call
744 * @arg: argument to pass to it
745 *
746 * Scans the superblock list and calls given function, passing it
747 * locked superblock and given argument.
748 */
749void iterate_supers(void (*f)(struct super_block *, void *), void *arg)
750{
dca33252 751 struct super_block *sb, *p = NULL;
01a05b33
AV
752
753 spin_lock(&sb_lock);
dca33252 754 list_for_each_entry(sb, &super_blocks, s_list) {
a5166169 755 if (hlist_unhashed(&sb->s_instances))
01a05b33
AV
756 continue;
757 sb->s_count++;
758 spin_unlock(&sb_lock);
759
760 down_read(&sb->s_umount);
e462ec50 761 if (sb->s_root && (sb->s_flags & SB_BORN))
01a05b33
AV
762 f(sb, arg);
763 up_read(&sb->s_umount);
764
765 spin_lock(&sb_lock);
dca33252
AV
766 if (p)
767 __put_super(p);
768 p = sb;
01a05b33 769 }
dca33252
AV
770 if (p)
771 __put_super(p);
01a05b33
AV
772 spin_unlock(&sb_lock);
773}
774
43e15cdb
AV
775/**
776 * iterate_supers_type - call function for superblocks of given type
777 * @type: fs type
778 * @f: function to call
779 * @arg: argument to pass to it
780 *
781 * Scans the superblock list and calls given function, passing it
782 * locked superblock and given argument.
783 */
784void iterate_supers_type(struct file_system_type *type,
785 void (*f)(struct super_block *, void *), void *arg)
786{
787 struct super_block *sb, *p = NULL;
788
789 spin_lock(&sb_lock);
b67bfe0d 790 hlist_for_each_entry(sb, &type->fs_supers, s_instances) {
43e15cdb
AV
791 sb->s_count++;
792 spin_unlock(&sb_lock);
793
794 down_read(&sb->s_umount);
e462ec50 795 if (sb->s_root && (sb->s_flags & SB_BORN))
43e15cdb
AV
796 f(sb, arg);
797 up_read(&sb->s_umount);
798
799 spin_lock(&sb_lock);
800 if (p)
801 __put_super(p);
802 p = sb;
803 }
804 if (p)
805 __put_super(p);
806 spin_unlock(&sb_lock);
807}
808
809EXPORT_SYMBOL(iterate_supers_type);
810
4e7b5671
CH
811/**
812 * get_super - get the superblock of a device
813 * @bdev: device to get the superblock for
814 *
815 * Scans the superblock list and finds the superblock of the file system
816 * mounted on the device given. %NULL is returned if no match is found.
817 */
818struct super_block *get_super(struct block_device *bdev)
1da177e4 819{
618f0636
KK
820 struct super_block *sb;
821
1da177e4
LT
822 if (!bdev)
823 return NULL;
618f0636 824
1da177e4 825 spin_lock(&sb_lock);
618f0636
KK
826rescan:
827 list_for_each_entry(sb, &super_blocks, s_list) {
a5166169 828 if (hlist_unhashed(&sb->s_instances))
551de6f3 829 continue;
618f0636
KK
830 if (sb->s_bdev == bdev) {
831 sb->s_count++;
1da177e4 832 spin_unlock(&sb_lock);
4e7b5671 833 down_read(&sb->s_umount);
df40c01a 834 /* still alive? */
e462ec50 835 if (sb->s_root && (sb->s_flags & SB_BORN))
618f0636 836 return sb;
4e7b5671 837 up_read(&sb->s_umount);
df40c01a 838 /* nope, got unmounted */
618f0636 839 spin_lock(&sb_lock);
df40c01a
AV
840 __put_super(sb);
841 goto rescan;
1da177e4
LT
842 }
843 }
844 spin_unlock(&sb_lock);
845 return NULL;
846}
847
4504230a
CH
848/**
849 * get_active_super - get an active reference to the superblock of a device
850 * @bdev: device to get the superblock for
851 *
852 * Scans the superblock list and finds the superblock of the file system
853 * mounted on the device given. Returns the superblock with an active
d3f21473 854 * reference or %NULL if none was found.
4504230a
CH
855 */
856struct super_block *get_active_super(struct block_device *bdev)
857{
858 struct super_block *sb;
859
860 if (!bdev)
861 return NULL;
862
1494583d 863restart:
4504230a
CH
864 spin_lock(&sb_lock);
865 list_for_each_entry(sb, &super_blocks, s_list) {
a5166169 866 if (hlist_unhashed(&sb->s_instances))
551de6f3 867 continue;
1494583d 868 if (sb->s_bdev == bdev) {
acfec9a5 869 if (!grab_super(sb))
1494583d 870 goto restart;
acfec9a5
AV
871 up_write(&sb->s_umount);
872 return sb;
1494583d 873 }
4504230a
CH
874 }
875 spin_unlock(&sb_lock);
876 return NULL;
877}
dd111b31 878
4e7b5671 879struct super_block *user_get_super(dev_t dev, bool excl)
1da177e4 880{
618f0636 881 struct super_block *sb;
1da177e4 882
1da177e4 883 spin_lock(&sb_lock);
618f0636
KK
884rescan:
885 list_for_each_entry(sb, &super_blocks, s_list) {
a5166169 886 if (hlist_unhashed(&sb->s_instances))
551de6f3 887 continue;
618f0636
KK
888 if (sb->s_dev == dev) {
889 sb->s_count++;
1da177e4 890 spin_unlock(&sb_lock);
4e7b5671
CH
891 if (excl)
892 down_write(&sb->s_umount);
893 else
894 down_read(&sb->s_umount);
df40c01a 895 /* still alive? */
e462ec50 896 if (sb->s_root && (sb->s_flags & SB_BORN))
618f0636 897 return sb;
4e7b5671
CH
898 if (excl)
899 up_write(&sb->s_umount);
900 else
901 up_read(&sb->s_umount);
df40c01a 902 /* nope, got unmounted */
618f0636 903 spin_lock(&sb_lock);
df40c01a
AV
904 __put_super(sb);
905 goto rescan;
1da177e4
LT
906 }
907 }
908 spin_unlock(&sb_lock);
909 return NULL;
910}
911
1da177e4 912/**
8d0347f6
DH
913 * reconfigure_super - asks filesystem to change superblock parameters
914 * @fc: The superblock and configuration
1da177e4 915 *
8d0347f6 916 * Alters the configuration parameters of a live superblock.
1da177e4 917 */
8d0347f6 918int reconfigure_super(struct fs_context *fc)
1da177e4 919{
8d0347f6 920 struct super_block *sb = fc->root->d_sb;
1da177e4 921 int retval;
8d0347f6 922 bool remount_ro = false;
c541dce8 923 bool remount_rw = false;
8d0347f6 924 bool force = fc->sb_flags & SB_FORCE;
4504230a 925
8d0347f6
DH
926 if (fc->sb_flags_mask & ~MS_RMT_MASK)
927 return -EINVAL;
5accdf82 928 if (sb->s_writers.frozen != SB_UNFROZEN)
4504230a
CH
929 return -EBUSY;
930
8d0347f6
DH
931 retval = security_sb_remount(sb, fc->security);
932 if (retval)
933 return retval;
934
935 if (fc->sb_flags_mask & SB_RDONLY) {
9361401e 936#ifdef CONFIG_BLOCK
6f0d9689
CH
937 if (!(fc->sb_flags & SB_RDONLY) && sb->s_bdev &&
938 bdev_read_only(sb->s_bdev))
8d0347f6 939 return -EACCES;
9361401e 940#endif
c541dce8 941 remount_rw = !(fc->sb_flags & SB_RDONLY) && sb_rdonly(sb);
8d0347f6
DH
942 remount_ro = (fc->sb_flags & SB_RDONLY) && !sb_rdonly(sb);
943 }
d208bbdd 944
0aec09d0 945 if (remount_ro) {
fdab684d 946 if (!hlist_empty(&sb->s_pins)) {
0aec09d0 947 up_write(&sb->s_umount);
fdab684d 948 group_pin_kill(&sb->s_pins);
0aec09d0
AV
949 down_write(&sb->s_umount);
950 if (!sb->s_root)
951 return 0;
952 if (sb->s_writers.frozen != SB_UNFROZEN)
953 return -EBUSY;
8d0347f6 954 remount_ro = !sb_rdonly(sb);
0aec09d0
AV
955 }
956 }
957 shrink_dcache_sb(sb);
958
8d0347f6
DH
959 /* If we are reconfiguring to RDONLY and current sb is read/write,
960 * make sure there are no files open for writing.
961 */
d208bbdd 962 if (remount_ro) {
4ed5e82f 963 if (force) {
d7439fb1 964 sb_start_ro_state_change(sb);
4ed5e82f
MS
965 } else {
966 retval = sb_prepare_remount_readonly(sb);
967 if (retval)
968 return retval;
4ed5e82f 969 }
c541dce8
JK
970 } else if (remount_rw) {
971 /*
d7439fb1
JK
972 * Protect filesystem's reconfigure code from writes from
973 * userspace until reconfigure finishes.
c541dce8 974 */
d7439fb1 975 sb_start_ro_state_change(sb);
1da177e4
LT
976 }
977
f3a09c92
AV
978 if (fc->ops->reconfigure) {
979 retval = fc->ops->reconfigure(fc);
980 if (retval) {
981 if (!force)
982 goto cancel_readonly;
983 /* If forced remount, go ahead despite any errors */
984 WARN(1, "forced remount of a %s fs returned %i\n",
985 sb->s_type->name, retval);
986 }
1da177e4 987 }
8d0347f6
DH
988
989 WRITE_ONCE(sb->s_flags, ((sb->s_flags & ~fc->sb_flags_mask) |
990 (fc->sb_flags & fc->sb_flags_mask)));
d7439fb1 991 sb_end_ro_state_change(sb);
c79d967d 992
d208bbdd
NP
993 /*
994 * Some filesystems modify their metadata via some other path than the
995 * bdev buffer cache (eg. use a private mapping, or directories in
996 * pagecache, etc). Also file data modifications go via their own
997 * mappings. So If we try to mount readonly then copy the filesystem
998 * from bdev, we could get stale data, so invalidate it to give a best
999 * effort at coherency.
1000 */
1001 if (remount_ro && sb->s_bdev)
1002 invalidate_bdev(sb->s_bdev);
1da177e4 1003 return 0;
4ed5e82f
MS
1004
1005cancel_readonly:
d7439fb1 1006 sb_end_ro_state_change(sb);
4ed5e82f 1007 return retval;
1da177e4
LT
1008}
1009
fa7c1d50 1010static void do_emergency_remount_callback(struct super_block *sb)
1da177e4 1011{
fa7c1d50
MG
1012 down_write(&sb->s_umount);
1013 if (sb->s_root && sb->s_bdev && (sb->s_flags & SB_BORN) &&
1014 !sb_rdonly(sb)) {
8d0347f6
DH
1015 struct fs_context *fc;
1016
1017 fc = fs_context_for_reconfigure(sb->s_root,
1018 SB_RDONLY | SB_FORCE, SB_RDONLY);
1019 if (!IS_ERR(fc)) {
1020 if (parse_monolithic_mount_data(fc, NULL) == 0)
1021 (void)reconfigure_super(fc);
1022 put_fs_context(fc);
1023 }
1da177e4 1024 }
fa7c1d50
MG
1025 up_write(&sb->s_umount);
1026}
1027
1028static void do_emergency_remount(struct work_struct *work)
1029{
1030 __iterate_supers(do_emergency_remount_callback);
a2a9537a 1031 kfree(work);
1da177e4
LT
1032 printk("Emergency Remount complete\n");
1033}
1034
1035void emergency_remount(void)
1036{
a2a9537a
JA
1037 struct work_struct *work;
1038
1039 work = kmalloc(sizeof(*work), GFP_ATOMIC);
1040 if (work) {
1041 INIT_WORK(work, do_emergency_remount);
1042 schedule_work(work);
1043 }
1da177e4
LT
1044}
1045
08fdc8a0
MG
1046static void do_thaw_all_callback(struct super_block *sb)
1047{
1048 down_write(&sb->s_umount);
1c18d2a1 1049 if (sb->s_root && sb->s_flags & SB_BORN) {
08fdc8a0
MG
1050 emergency_thaw_bdev(sb);
1051 thaw_super_locked(sb);
1052 } else {
1053 up_write(&sb->s_umount);
1054 }
1055}
1056
1057static void do_thaw_all(struct work_struct *work)
1058{
1059 __iterate_supers(do_thaw_all_callback);
1060 kfree(work);
1061 printk(KERN_WARNING "Emergency Thaw complete\n");
1062}
1063
1064/**
1065 * emergency_thaw_all -- forcibly thaw every frozen filesystem
1066 *
1067 * Used for emergency unfreeze of all filesystems via SysRq
1068 */
1069void emergency_thaw_all(void)
1070{
1071 struct work_struct *work;
1072
1073 work = kmalloc(sizeof(*work), GFP_ATOMIC);
1074 if (work) {
1075 INIT_WORK(work, do_thaw_all);
1076 schedule_work(work);
1077 }
1078}
1079
ad76cbc6 1080static DEFINE_IDA(unnamed_dev_ida);
1da177e4 1081
5a66847e
MW
1082/**
1083 * get_anon_bdev - Allocate a block device for filesystems which don't have one.
1084 * @p: Pointer to a dev_t.
1085 *
1086 * Filesystems which don't use real block devices can call this function
1087 * to allocate a virtual block device.
1088 *
1089 * Context: Any context. Frequently called while holding sb_lock.
1090 * Return: 0 on success, -EMFILE if there are no anonymous bdevs left
1091 * or -ENOMEM if memory allocation failed.
1092 */
0ee5dc67 1093int get_anon_bdev(dev_t *p)
1da177e4
LT
1094{
1095 int dev;
5a66847e
MW
1096
1097 /*
1098 * Many userspace utilities consider an FSID of 0 invalid.
1099 * Always return at least 1 from get_anon_bdev.
1100 */
1101 dev = ida_alloc_range(&unnamed_dev_ida, 1, (1 << MINORBITS) - 1,
1102 GFP_ATOMIC);
1103 if (dev == -ENOSPC)
1104 dev = -EMFILE;
1105 if (dev < 0)
1106 return dev;
1107
1108 *p = MKDEV(0, dev);
1da177e4
LT
1109 return 0;
1110}
0ee5dc67 1111EXPORT_SYMBOL(get_anon_bdev);
1da177e4 1112
0ee5dc67 1113void free_anon_bdev(dev_t dev)
1da177e4 1114{
5a66847e 1115 ida_free(&unnamed_dev_ida, MINOR(dev));
1da177e4 1116}
0ee5dc67
AV
1117EXPORT_SYMBOL(free_anon_bdev);
1118
1119int set_anon_super(struct super_block *s, void *data)
1120{
df0ce26c 1121 return get_anon_bdev(&s->s_dev);
0ee5dc67 1122}
0ee5dc67
AV
1123EXPORT_SYMBOL(set_anon_super);
1124
1125void kill_anon_super(struct super_block *sb)
1126{
1127 dev_t dev = sb->s_dev;
1128 generic_shutdown_super(sb);
1129 free_anon_bdev(dev);
1130}
1da177e4
LT
1131EXPORT_SYMBOL(kill_anon_super);
1132
1da177e4
LT
1133void kill_litter_super(struct super_block *sb)
1134{
1135 if (sb->s_root)
1136 d_genocide(sb->s_root);
1137 kill_anon_super(sb);
1138}
1da177e4
LT
1139EXPORT_SYMBOL(kill_litter_super);
1140
cb50b348
AV
1141int set_anon_super_fc(struct super_block *sb, struct fs_context *fc)
1142{
1143 return set_anon_super(sb, NULL);
1144}
1145EXPORT_SYMBOL(set_anon_super_fc);
1146
1147static int test_keyed_super(struct super_block *sb, struct fs_context *fc)
1148{
1149 return sb->s_fs_info == fc->s_fs_info;
1150}
1151
1152static int test_single_super(struct super_block *s, struct fs_context *fc)
1153{
1154 return 1;
1155}
1156
e062abae 1157static int vfs_get_super(struct fs_context *fc,
cda2ed05
CH
1158 int (*test)(struct super_block *, struct fs_context *),
1159 int (*fill_super)(struct super_block *sb,
1160 struct fs_context *fc))
cb50b348 1161{
cb50b348 1162 struct super_block *sb;
43ce4c1f 1163 int err;
cb50b348 1164
cb50b348
AV
1165 sb = sget_fc(fc, test, set_anon_super_fc);
1166 if (IS_ERR(sb))
1167 return PTR_ERR(sb);
1168
1169 if (!sb->s_root) {
43ce4c1f
DH
1170 err = fill_super(sb, fc);
1171 if (err)
1172 goto error;
cb50b348
AV
1173
1174 sb->s_flags |= SB_ACTIVE;
1175 }
1176
e062abae 1177 fc->root = dget(sb->s_root);
cb50b348 1178 return 0;
43ce4c1f
DH
1179
1180error:
1181 deactivate_locked_super(sb);
1182 return err;
cb50b348 1183}
cb50b348 1184
2ac295d4
AV
1185int get_tree_nodev(struct fs_context *fc,
1186 int (*fill_super)(struct super_block *sb,
1187 struct fs_context *fc))
1188{
e062abae 1189 return vfs_get_super(fc, NULL, fill_super);
2ac295d4
AV
1190}
1191EXPORT_SYMBOL(get_tree_nodev);
1192
c23a0bba
AV
1193int get_tree_single(struct fs_context *fc,
1194 int (*fill_super)(struct super_block *sb,
1195 struct fs_context *fc))
1196{
e062abae 1197 return vfs_get_super(fc, test_single_super, fill_super);
c23a0bba
AV
1198}
1199EXPORT_SYMBOL(get_tree_single);
1200
533770cc
AV
1201int get_tree_keyed(struct fs_context *fc,
1202 int (*fill_super)(struct super_block *sb,
1203 struct fs_context *fc),
1204 void *key)
1205{
1206 fc->s_fs_info = key;
e062abae 1207 return vfs_get_super(fc, test_keyed_super, fill_super);
533770cc
AV
1208}
1209EXPORT_SYMBOL(get_tree_keyed);
1210
9361401e 1211#ifdef CONFIG_BLOCK
87efb390
CH
1212static void fs_mark_dead(struct block_device *bdev)
1213{
1214 struct super_block *sb;
1215
1216 sb = get_super(bdev);
1217 if (!sb)
1218 return;
1219
1220 if (sb->s_op->shutdown)
1221 sb->s_op->shutdown(sb);
1222 drop_super(sb);
1223}
1224
1225static const struct blk_holder_ops fs_holder_ops = {
1226 .mark_dead = fs_mark_dead,
1227};
fe62c3a4 1228
1da177e4
LT
1229static int set_bdev_super(struct super_block *s, void *data)
1230{
1231 s->s_bdev = data;
1232 s->s_dev = s->s_bdev->bd_dev;
a11d7fc2 1233 s->s_bdi = bdi_get(s->s_bdev->bd_disk->bdi);
32a88aa1 1234
36d25489 1235 if (bdev_stable_writes(s->s_bdev))
1cb039f3 1236 s->s_iflags |= SB_I_STABLE_WRITES;
1da177e4
LT
1237 return 0;
1238}
1239
fe62c3a4
DH
1240static int set_bdev_super_fc(struct super_block *s, struct fs_context *fc)
1241{
1242 return set_bdev_super(s, fc->sget_key);
1243}
1244
1245static int test_bdev_super_fc(struct super_block *s, struct fs_context *fc)
1246{
04b94071 1247 return !(s->s_iflags & SB_I_RETIRED) && s->s_bdev == fc->sget_key;
fe62c3a4
DH
1248}
1249
1250/**
1251 * get_tree_bdev - Get a superblock based on a single block device
1252 * @fc: The filesystem context holding the parameters
1253 * @fill_super: Helper to initialise a new superblock
1254 */
1255int get_tree_bdev(struct fs_context *fc,
1256 int (*fill_super)(struct super_block *,
1257 struct fs_context *))
1258{
1259 struct block_device *bdev;
1260 struct super_block *s;
fe62c3a4
DH
1261 int error = 0;
1262
fe62c3a4
DH
1263 if (!fc->source)
1264 return invalf(fc, "No source specified");
1265
3f0b3e78
CH
1266 bdev = blkdev_get_by_path(fc->source, sb_open_mode(fc->sb_flags),
1267 fc->fs_type, &fs_holder_ops);
fe62c3a4
DH
1268 if (IS_ERR(bdev)) {
1269 errorf(fc, "%s: Can't open blockdev", fc->source);
1270 return PTR_ERR(bdev);
1271 }
1272
1273 /* Once the superblock is inserted into the list by sget_fc(), s_umount
1274 * will protect the lockfs code from trying to start a snapshot while
1275 * we are mounting
1276 */
1277 mutex_lock(&bdev->bd_fsfreeze_mutex);
1278 if (bdev->bd_fsfreeze_count > 0) {
1279 mutex_unlock(&bdev->bd_fsfreeze_mutex);
1280 warnf(fc, "%pg: Can't mount, blockdev is frozen", bdev);
2736e8ee 1281 blkdev_put(bdev, fc->fs_type);
fe62c3a4
DH
1282 return -EBUSY;
1283 }
1284
1285 fc->sb_flags |= SB_NOSEC;
1286 fc->sget_key = bdev;
1287 s = sget_fc(fc, test_bdev_super_fc, set_bdev_super_fc);
1288 mutex_unlock(&bdev->bd_fsfreeze_mutex);
6fcf0c72 1289 if (IS_ERR(s)) {
2736e8ee 1290 blkdev_put(bdev, fc->fs_type);
fe62c3a4 1291 return PTR_ERR(s);
6fcf0c72 1292 }
fe62c3a4
DH
1293
1294 if (s->s_root) {
1295 /* Don't summarily change the RO/RW state. */
1296 if ((fc->sb_flags ^ s->s_flags) & SB_RDONLY) {
1297 warnf(fc, "%pg: Can't mount, would change RO state", bdev);
1298 deactivate_locked_super(s);
2736e8ee 1299 blkdev_put(bdev, fc->fs_type);
fe62c3a4
DH
1300 return -EBUSY;
1301 }
1302
1303 /*
a8698707 1304 * s_umount nests inside open_mutex during
fe62c3a4 1305 * __invalidate_device(). blkdev_put() acquires
a8698707 1306 * open_mutex and can't be called under s_umount. Drop
fe62c3a4
DH
1307 * s_umount temporarily. This is safe as we're
1308 * holding an active reference.
1309 */
1310 up_write(&s->s_umount);
2736e8ee 1311 blkdev_put(bdev, fc->fs_type);
fe62c3a4
DH
1312 down_write(&s->s_umount);
1313 } else {
fe62c3a4 1314 snprintf(s->s_id, sizeof(s->s_id), "%pg", bdev);
e33c267a
RG
1315 shrinker_debugfs_rename(&s->s_shrink, "sb-%s:%s",
1316 fc->fs_type->name, s->s_id);
fe62c3a4
DH
1317 sb_set_blocksize(s, block_size(bdev));
1318 error = fill_super(s, fc);
1319 if (error) {
1320 deactivate_locked_super(s);
1321 return error;
1322 }
1323
1324 s->s_flags |= SB_ACTIVE;
1325 bdev->bd_super = s;
1326 }
1327
1328 BUG_ON(fc->root);
1329 fc->root = dget(s->s_root);
1330 return 0;
1331}
1332EXPORT_SYMBOL(get_tree_bdev);
1333
1da177e4
LT
1334static int test_bdev_super(struct super_block *s, void *data)
1335{
04b94071 1336 return !(s->s_iflags & SB_I_RETIRED) && (void *)s->s_bdev == data;
1da177e4
LT
1337}
1338
152a0836 1339struct dentry *mount_bdev(struct file_system_type *fs_type,
1da177e4 1340 int flags, const char *dev_name, void *data,
152a0836 1341 int (*fill_super)(struct super_block *, void *, int))
1da177e4
LT
1342{
1343 struct block_device *bdev;
1344 struct super_block *s;
1345 int error = 0;
1346
3f0b3e78
CH
1347 bdev = blkdev_get_by_path(dev_name, sb_open_mode(flags), fs_type,
1348 &fs_holder_ops);
1da177e4 1349 if (IS_ERR(bdev))
152a0836 1350 return ERR_CAST(bdev);
1da177e4
LT
1351
1352 /*
1353 * once the super is inserted into the list by sget, s_umount
1354 * will protect the lockfs code from trying to start a snapshot
1355 * while we are mounting
1356 */
4fadd7bb
CH
1357 mutex_lock(&bdev->bd_fsfreeze_mutex);
1358 if (bdev->bd_fsfreeze_count > 0) {
1359 mutex_unlock(&bdev->bd_fsfreeze_mutex);
1360 error = -EBUSY;
1361 goto error_bdev;
1362 }
e462ec50 1363 s = sget(fs_type, test_bdev_super, set_bdev_super, flags | SB_NOSEC,
9249e17f 1364 bdev);
4fadd7bb 1365 mutex_unlock(&bdev->bd_fsfreeze_mutex);
1da177e4 1366 if (IS_ERR(s))
454e2398 1367 goto error_s;
1da177e4
LT
1368
1369 if (s->s_root) {
e462ec50 1370 if ((flags ^ s->s_flags) & SB_RDONLY) {
74dbbdd7 1371 deactivate_locked_super(s);
454e2398
DH
1372 error = -EBUSY;
1373 goto error_bdev;
1da177e4 1374 }
454e2398 1375
4f331f01 1376 /*
a8698707 1377 * s_umount nests inside open_mutex during
e525fd89 1378 * __invalidate_device(). blkdev_put() acquires
a8698707 1379 * open_mutex and can't be called under s_umount. Drop
e525fd89
TH
1380 * s_umount temporarily. This is safe as we're
1381 * holding an active reference.
4f331f01
TH
1382 */
1383 up_write(&s->s_umount);
2736e8ee 1384 blkdev_put(bdev, fs_type);
4f331f01 1385 down_write(&s->s_umount);
1da177e4 1386 } else {
a1c6f057 1387 snprintf(s->s_id, sizeof(s->s_id), "%pg", bdev);
e33c267a
RG
1388 shrinker_debugfs_rename(&s->s_shrink, "sb-%s:%s",
1389 fs_type->name, s->s_id);
e78c9a00 1390 sb_set_blocksize(s, block_size(bdev));
e462ec50 1391 error = fill_super(s, data, flags & SB_SILENT ? 1 : 0);
1da177e4 1392 if (error) {
74dbbdd7 1393 deactivate_locked_super(s);
454e2398 1394 goto error;
fa675765 1395 }
454e2398 1396
e462ec50 1397 s->s_flags |= SB_ACTIVE;
87d8fe1e 1398 bdev->bd_super = s;
1da177e4
LT
1399 }
1400
152a0836 1401 return dget(s->s_root);
1da177e4 1402
454e2398
DH
1403error_s:
1404 error = PTR_ERR(s);
1405error_bdev:
2736e8ee 1406 blkdev_put(bdev, fs_type);
454e2398 1407error:
152a0836
AV
1408 return ERR_PTR(error);
1409}
1410EXPORT_SYMBOL(mount_bdev);
1411
1da177e4
LT
1412void kill_block_super(struct super_block *sb)
1413{
1414 struct block_device *bdev = sb->s_bdev;
1415
ddbaaf30 1416 bdev->bd_super = NULL;
1da177e4
LT
1417 generic_shutdown_super(sb);
1418 sync_blockdev(bdev);
2736e8ee 1419 blkdev_put(bdev, sb->s_type);
1da177e4
LT
1420}
1421
1422EXPORT_SYMBOL(kill_block_super);
9361401e 1423#endif
1da177e4 1424
3c26ff6e 1425struct dentry *mount_nodev(struct file_system_type *fs_type,
1da177e4 1426 int flags, void *data,
3c26ff6e 1427 int (*fill_super)(struct super_block *, void *, int))
1da177e4
LT
1428{
1429 int error;
9249e17f 1430 struct super_block *s = sget(fs_type, NULL, set_anon_super, flags, NULL);
1da177e4
LT
1431
1432 if (IS_ERR(s))
3c26ff6e 1433 return ERR_CAST(s);
1da177e4 1434
e462ec50 1435 error = fill_super(s, data, flags & SB_SILENT ? 1 : 0);
1da177e4 1436 if (error) {
74dbbdd7 1437 deactivate_locked_super(s);
3c26ff6e 1438 return ERR_PTR(error);
1da177e4 1439 }
e462ec50 1440 s->s_flags |= SB_ACTIVE;
3c26ff6e 1441 return dget(s->s_root);
1da177e4 1442}
3c26ff6e
AV
1443EXPORT_SYMBOL(mount_nodev);
1444
a6097180
N
1445int reconfigure_single(struct super_block *s,
1446 int flags, void *data)
8d0347f6
DH
1447{
1448 struct fs_context *fc;
1449 int ret;
1450
1451 /* The caller really need to be passing fc down into mount_single(),
1452 * then a chunk of this can be removed. [Bollocks -- AV]
1453 * Better yet, reconfiguration shouldn't happen, but rather the second
1454 * mount should be rejected if the parameters are not compatible.
1455 */
1456 fc = fs_context_for_reconfigure(s->s_root, flags, MS_RMT_MASK);
1457 if (IS_ERR(fc))
1458 return PTR_ERR(fc);
1459
1460 ret = parse_monolithic_mount_data(fc, data);
1461 if (ret < 0)
1462 goto out;
1463
1464 ret = reconfigure_super(fc);
1465out:
1466 put_fs_context(fc);
1467 return ret;
1468}
1469
1da177e4
LT
1470static int compare_single(struct super_block *s, void *p)
1471{
1472 return 1;
1473}
1474
fc14f2fe 1475struct dentry *mount_single(struct file_system_type *fs_type,
1da177e4 1476 int flags, void *data,
fc14f2fe 1477 int (*fill_super)(struct super_block *, void *, int))
1da177e4
LT
1478{
1479 struct super_block *s;
1480 int error;
1481
9249e17f 1482 s = sget(fs_type, compare_single, set_anon_super, flags, NULL);
1da177e4 1483 if (IS_ERR(s))
fc14f2fe 1484 return ERR_CAST(s);
1da177e4 1485 if (!s->s_root) {
e462ec50 1486 error = fill_super(s, data, flags & SB_SILENT ? 1 : 0);
8d0347f6
DH
1487 if (!error)
1488 s->s_flags |= SB_ACTIVE;
9329d1be 1489 } else {
8d0347f6
DH
1490 error = reconfigure_single(s, flags, data);
1491 }
1492 if (unlikely(error)) {
1493 deactivate_locked_super(s);
1494 return ERR_PTR(error);
1da177e4 1495 }
fc14f2fe
AV
1496 return dget(s->s_root);
1497}
1498EXPORT_SYMBOL(mount_single);
1499
9bc61ab1
DH
1500/**
1501 * vfs_get_tree - Get the mountable root
1502 * @fc: The superblock configuration context.
1503 *
1504 * The filesystem is invoked to get or create a superblock which can then later
1505 * be used for mounting. The filesystem places a pointer to the root to be
1506 * used for mounting in @fc->root.
1507 */
1508int vfs_get_tree(struct fs_context *fc)
1da177e4 1509{
9d412a43 1510 struct super_block *sb;
9bc61ab1 1511 int error;
8089352a 1512
f3a09c92
AV
1513 if (fc->root)
1514 return -EBUSY;
1515
1516 /* Get the mountable root in fc->root, with a ref on the root and a ref
1517 * on the superblock.
1518 */
1519 error = fc->ops->get_tree(fc);
9bc61ab1
DH
1520 if (error < 0)
1521 return error;
1da177e4 1522
f3a09c92
AV
1523 if (!fc->root) {
1524 pr_err("Filesystem %s get_tree() didn't set fc->root\n",
1525 fc->fs_type->name);
1526 /* We don't know what the locking state of the superblock is -
1527 * if there is a superblock.
1528 */
1529 BUG();
1530 }
1531
9bc61ab1 1532 sb = fc->root->d_sb;
9d412a43 1533 WARN_ON(!sb->s_bdi);
79f546a6
DC
1534
1535 /*
1536 * Write barrier is for super_cache_count(). We place it before setting
1537 * SB_BORN as the data dependency between the two functions is the
1538 * superblock structure contents that we just set up, not the SB_BORN
1539 * flag.
1540 */
1541 smp_wmb();
e462ec50 1542 sb->s_flags |= SB_BORN;
454e2398 1543
9bc61ab1 1544 error = security_sb_set_mnt_opts(sb, fc->security, 0, NULL);
c9ce29ed
AV
1545 if (unlikely(error)) {
1546 fc_drop_locked(fc);
1547 return error;
a10d7c22
AV
1548 }
1549
42cb56ae
JL
1550 /*
1551 * filesystems should never set s_maxbytes larger than MAX_LFS_FILESIZE
1552 * but s_maxbytes was an unsigned long long for many releases. Throw
1553 * this warning for a little while to try and catch filesystems that
4358b567 1554 * violate this rule.
42cb56ae 1555 */
9d412a43 1556 WARN((sb->s_maxbytes < 0), "%s set sb->s_maxbytes to "
9bc61ab1 1557 "negative value (%lld)\n", fc->fs_type->name, sb->s_maxbytes);
42cb56ae 1558
9bc61ab1 1559 return 0;
1da177e4 1560}
9bc61ab1 1561EXPORT_SYMBOL(vfs_get_tree);
1da177e4 1562
fca39346
JK
1563/*
1564 * Setup private BDI for given superblock. It gets automatically cleaned up
1565 * in generic_shutdown_super().
1566 */
1567int super_setup_bdi_name(struct super_block *sb, char *fmt, ...)
1568{
1569 struct backing_dev_info *bdi;
1570 int err;
1571 va_list args;
1572
aef33c2f 1573 bdi = bdi_alloc(NUMA_NO_NODE);
fca39346
JK
1574 if (!bdi)
1575 return -ENOMEM;
1576
fca39346 1577 va_start(args, fmt);
7c4cc300 1578 err = bdi_register_va(bdi, fmt, args);
fca39346
JK
1579 va_end(args);
1580 if (err) {
1581 bdi_put(bdi);
1582 return err;
1583 }
1584 WARN_ON(sb->s_bdi != &noop_backing_dev_info);
1585 sb->s_bdi = bdi;
0b3ea092 1586 sb->s_iflags |= SB_I_PERSB_BDI;
fca39346
JK
1587
1588 return 0;
1589}
1590EXPORT_SYMBOL(super_setup_bdi_name);
1591
1592/*
1593 * Setup private BDI for given superblock. I gets automatically cleaned up
1594 * in generic_shutdown_super().
1595 */
1596int super_setup_bdi(struct super_block *sb)
1597{
1598 static atomic_long_t bdi_seq = ATOMIC_LONG_INIT(0);
1599
1600 return super_setup_bdi_name(sb, "%.28s-%ld", sb->s_type->name,
1601 atomic_long_inc_return(&bdi_seq));
1602}
1603EXPORT_SYMBOL(super_setup_bdi);
1604
5accdf82
JK
1605/**
1606 * sb_wait_write - wait until all writers to given file system finish
1607 * @sb: the super for which we wait
1608 * @level: type of writers we wait for (normal vs page fault)
1609 *
1610 * This function waits until there are no writers of given type to given file
8129ed29 1611 * system.
5accdf82
JK
1612 */
1613static void sb_wait_write(struct super_block *sb, int level)
1614{
8129ed29 1615 percpu_down_write(sb->s_writers.rw_sem + level-1);
8129ed29 1616}
5accdf82 1617
f1a96220
ON
1618/*
1619 * We are going to return to userspace and forget about these locks, the
1620 * ownership goes to the caller of thaw_super() which does unlock().
1621 */
1622static void lockdep_sb_freeze_release(struct super_block *sb)
1623{
1624 int level;
1625
1626 for (level = SB_FREEZE_LEVELS - 1; level >= 0; level--)
1627 percpu_rwsem_release(sb->s_writers.rw_sem + level, 0, _THIS_IP_);
1628}
1629
1630/*
1631 * Tell lockdep we are holding these locks before we call ->unfreeze_fs(sb).
1632 */
1633static void lockdep_sb_freeze_acquire(struct super_block *sb)
8129ed29
ON
1634{
1635 int level;
5accdf82 1636
8129ed29
ON
1637 for (level = 0; level < SB_FREEZE_LEVELS; ++level)
1638 percpu_rwsem_acquire(sb->s_writers.rw_sem + level, 0, _THIS_IP_);
f1a96220
ON
1639}
1640
2719c716 1641static void sb_freeze_unlock(struct super_block *sb, int level)
f1a96220 1642{
2719c716 1643 for (level--; level >= 0; level--)
8129ed29 1644 percpu_up_write(sb->s_writers.rw_sem + level);
5accdf82
JK
1645}
1646
18e9e510 1647/**
7000d3c4
RD
1648 * freeze_super - lock the filesystem and force it into a consistent state
1649 * @sb: the super to lock
18e9e510
JB
1650 *
1651 * Syncs the super to make sure the filesystem is consistent and calls the fs's
1652 * freeze_fs. Subsequent calls to this without first thawing the fs will return
1653 * -EBUSY.
5accdf82
JK
1654 *
1655 * During this function, sb->s_writers.frozen goes through these values:
1656 *
1657 * SB_UNFROZEN: File system is normal, all writes progress as usual.
1658 *
1659 * SB_FREEZE_WRITE: The file system is in the process of being frozen. New
1660 * writes should be blocked, though page faults are still allowed. We wait for
1661 * all writes to complete and then proceed to the next stage.
1662 *
1663 * SB_FREEZE_PAGEFAULT: Freezing continues. Now also page faults are blocked
1664 * but internal fs threads can still modify the filesystem (although they
1665 * should not dirty new pages or inodes), writeback can run etc. After waiting
1666 * for all running page faults we sync the filesystem which will clean all
1667 * dirty pages and inodes (no new dirty pages or inodes can be created when
1668 * sync is running).
1669 *
1670 * SB_FREEZE_FS: The file system is frozen. Now all internal sources of fs
1671 * modification are blocked (e.g. XFS preallocation truncation on inode
1672 * reclaim). This is usually implemented by blocking new transactions for
1673 * filesystems that have them and need this additional guard. After all
1674 * internal writers are finished we call ->freeze_fs() to finish filesystem
1675 * freezing. Then we transition to SB_FREEZE_COMPLETE state. This state is
1676 * mostly auxiliary for filesystems to verify they do not modify frozen fs.
1677 *
1678 * sb->s_writers.frozen is protected by sb->s_umount.
18e9e510
JB
1679 */
1680int freeze_super(struct super_block *sb)
1681{
1682 int ret;
1683
1684 atomic_inc(&sb->s_active);
1685 down_write(&sb->s_umount);
5accdf82 1686 if (sb->s_writers.frozen != SB_UNFROZEN) {
18e9e510
JB
1687 deactivate_locked_super(sb);
1688 return -EBUSY;
1689 }
1690
e462ec50 1691 if (!(sb->s_flags & SB_BORN)) {
dabe0dc1
AV
1692 up_write(&sb->s_umount);
1693 return 0; /* sic - it's "nothing to do" */
1694 }
1695
bc98a42c 1696 if (sb_rdonly(sb)) {
5accdf82
JK
1697 /* Nothing to do really... */
1698 sb->s_writers.frozen = SB_FREEZE_COMPLETE;
18e9e510
JB
1699 up_write(&sb->s_umount);
1700 return 0;
1701 }
1702
5accdf82 1703 sb->s_writers.frozen = SB_FREEZE_WRITE;
5accdf82
JK
1704 /* Release s_umount to preserve sb_start_write -> s_umount ordering */
1705 up_write(&sb->s_umount);
5accdf82 1706 sb_wait_write(sb, SB_FREEZE_WRITE);
8129ed29 1707 down_write(&sb->s_umount);
5accdf82
JK
1708
1709 /* Now we go and block page faults... */
5accdf82 1710 sb->s_writers.frozen = SB_FREEZE_PAGEFAULT;
5accdf82
JK
1711 sb_wait_write(sb, SB_FREEZE_PAGEFAULT);
1712
1713 /* All writers are done so after syncing there won't be dirty data */
2719c716
DW
1714 ret = sync_filesystem(sb);
1715 if (ret) {
1716 sb->s_writers.frozen = SB_UNFROZEN;
1717 sb_freeze_unlock(sb, SB_FREEZE_PAGEFAULT);
2719c716
DW
1718 deactivate_locked_super(sb);
1719 return ret;
1720 }
18e9e510 1721
5accdf82
JK
1722 /* Now wait for internal filesystem counter */
1723 sb->s_writers.frozen = SB_FREEZE_FS;
5accdf82 1724 sb_wait_write(sb, SB_FREEZE_FS);
18e9e510 1725
18e9e510
JB
1726 if (sb->s_op->freeze_fs) {
1727 ret = sb->s_op->freeze_fs(sb);
1728 if (ret) {
1729 printk(KERN_ERR
1730 "VFS:Filesystem freeze failed\n");
5accdf82 1731 sb->s_writers.frozen = SB_UNFROZEN;
2719c716 1732 sb_freeze_unlock(sb, SB_FREEZE_FS);
18e9e510
JB
1733 deactivate_locked_super(sb);
1734 return ret;
1735 }
1736 }
5accdf82 1737 /*
89f39af1
ON
1738 * For debugging purposes so that fs can warn if it sees write activity
1739 * when frozen is set to SB_FREEZE_COMPLETE, and for thaw_super().
5accdf82
JK
1740 */
1741 sb->s_writers.frozen = SB_FREEZE_COMPLETE;
f1a96220 1742 lockdep_sb_freeze_release(sb);
18e9e510
JB
1743 up_write(&sb->s_umount);
1744 return 0;
1745}
1746EXPORT_SYMBOL(freeze_super);
1747
08fdc8a0 1748static int thaw_super_locked(struct super_block *sb)
18e9e510
JB
1749{
1750 int error;
1751
89f39af1 1752 if (sb->s_writers.frozen != SB_FREEZE_COMPLETE) {
18e9e510
JB
1753 up_write(&sb->s_umount);
1754 return -EINVAL;
1755 }
1756
bc98a42c 1757 if (sb_rdonly(sb)) {
8129ed29 1758 sb->s_writers.frozen = SB_UNFROZEN;
18e9e510 1759 goto out;
8129ed29 1760 }
18e9e510 1761
f1a96220
ON
1762 lockdep_sb_freeze_acquire(sb);
1763
18e9e510
JB
1764 if (sb->s_op->unfreeze_fs) {
1765 error = sb->s_op->unfreeze_fs(sb);
1766 if (error) {
1767 printk(KERN_ERR
1768 "VFS:Filesystem thaw failed\n");
f1a96220 1769 lockdep_sb_freeze_release(sb);
18e9e510
JB
1770 up_write(&sb->s_umount);
1771 return error;
1772 }
1773 }
1774
5accdf82 1775 sb->s_writers.frozen = SB_UNFROZEN;
2719c716 1776 sb_freeze_unlock(sb, SB_FREEZE_FS);
8129ed29 1777out:
18e9e510 1778 deactivate_locked_super(sb);
18e9e510
JB
1779 return 0;
1780}
08fdc8a0 1781
961f3c89
MCC
1782/**
1783 * thaw_super -- unlock filesystem
1784 * @sb: the super to thaw
1785 *
1786 * Unlocks the filesystem and marks it writeable again after freeze_super().
1787 */
08fdc8a0
MG
1788int thaw_super(struct super_block *sb)
1789{
1790 down_write(&sb->s_umount);
1791 return thaw_super_locked(sb);
1792}
18e9e510 1793EXPORT_SYMBOL(thaw_super);
439bc39b
CH
1794
1795/*
1796 * Create workqueue for deferred direct IO completions. We allocate the
1797 * workqueue when it's first needed. This avoids creating workqueue for
1798 * filesystems that don't need it and also allows us to create the workqueue
1799 * late enough so the we can include s_id in the name of the workqueue.
1800 */
1801int sb_init_dio_done_wq(struct super_block *sb)
1802{
1803 struct workqueue_struct *old;
1804 struct workqueue_struct *wq = alloc_workqueue("dio/%s",
1805 WQ_MEM_RECLAIM, 0,
1806 sb->s_id);
1807 if (!wq)
1808 return -ENOMEM;
1809 /*
1810 * This has to be atomic as more DIOs can race to create the workqueue
1811 */
1812 old = cmpxchg(&sb->s_dio_done_wq, NULL, wq);
1813 /* Someone created workqueue before us? Free ours... */
1814 if (old)
1815 destroy_workqueue(wq);
1816 return 0;
1817}