shmem: prepare huge= mount option and sysfs knob
[deliverable/linux.git] / mm / shmem.c
CommitLineData
1da177e4
LT
1/*
2 * Resizable virtual memory filesystem for Linux.
3 *
4 * Copyright (C) 2000 Linus Torvalds.
5 * 2000 Transmeta Corp.
6 * 2000-2001 Christoph Rohland
7 * 2000-2001 SAP AG
8 * 2002 Red Hat Inc.
6922c0c7
HD
9 * Copyright (C) 2002-2011 Hugh Dickins.
10 * Copyright (C) 2011 Google Inc.
0edd73b3 11 * Copyright (C) 2002-2005 VERITAS Software Corporation.
1da177e4
LT
12 * Copyright (C) 2004 Andi Kleen, SuSE Labs
13 *
14 * Extended attribute support for tmpfs:
15 * Copyright (c) 2004, Luke Kenneth Casson Leighton <lkcl@lkcl.net>
16 * Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
17 *
853ac43a
MM
18 * tiny-shmem:
19 * Copyright (c) 2004, 2008 Matt Mackall <mpm@selenic.com>
20 *
1da177e4
LT
21 * This file is released under the GPL.
22 */
23
853ac43a
MM
24#include <linux/fs.h>
25#include <linux/init.h>
26#include <linux/vfs.h>
27#include <linux/mount.h>
250297ed 28#include <linux/ramfs.h>
caefba17 29#include <linux/pagemap.h>
853ac43a
MM
30#include <linux/file.h>
31#include <linux/mm.h>
b95f1b31 32#include <linux/export.h>
853ac43a 33#include <linux/swap.h>
e2e40f2c 34#include <linux/uio.h>
853ac43a
MM
35
36static struct vfsmount *shm_mnt;
37
38#ifdef CONFIG_SHMEM
1da177e4
LT
39/*
40 * This virtual memory filesystem is heavily based on the ramfs. It
41 * extends ramfs by the ability to use swap and honor resource limits
42 * which makes it a completely usable filesystem.
43 */
44
39f0247d 45#include <linux/xattr.h>
a5694255 46#include <linux/exportfs.h>
1c7c474c 47#include <linux/posix_acl.h>
feda821e 48#include <linux/posix_acl_xattr.h>
1da177e4 49#include <linux/mman.h>
1da177e4
LT
50#include <linux/string.h>
51#include <linux/slab.h>
52#include <linux/backing-dev.h>
53#include <linux/shmem_fs.h>
1da177e4 54#include <linux/writeback.h>
1da177e4 55#include <linux/blkdev.h>
bda97eab 56#include <linux/pagevec.h>
41ffe5d5 57#include <linux/percpu_counter.h>
83e4fa9c 58#include <linux/falloc.h>
708e3508 59#include <linux/splice.h>
1da177e4
LT
60#include <linux/security.h>
61#include <linux/swapops.h>
62#include <linux/mempolicy.h>
63#include <linux/namei.h>
b00dc3ad 64#include <linux/ctype.h>
304dbdb7 65#include <linux/migrate.h>
c1f60a5a 66#include <linux/highmem.h>
680d794b 67#include <linux/seq_file.h>
92562927 68#include <linux/magic.h>
9183df25 69#include <linux/syscalls.h>
40e041a2 70#include <linux/fcntl.h>
9183df25 71#include <uapi/linux/memfd.h>
304dbdb7 72
1da177e4 73#include <asm/uaccess.h>
1da177e4
LT
74#include <asm/pgtable.h>
75
dd56b046
MG
76#include "internal.h"
77
09cbfeaf
KS
78#define BLOCKS_PER_PAGE (PAGE_SIZE/512)
79#define VM_ACCT(size) (PAGE_ALIGN(size) >> PAGE_SHIFT)
1da177e4 80
1da177e4
LT
81/* Pretend that each entry is of this size in directory's i_size */
82#define BOGO_DIRENT_SIZE 20
83
69f07ec9
HD
84/* Symlink up to this size is kmalloc'ed instead of using a swappable page */
85#define SHORT_SYMLINK_LEN 128
86
1aac1400 87/*
f00cdc6d
HD
88 * shmem_fallocate communicates with shmem_fault or shmem_writepage via
89 * inode->i_private (with i_mutex making sure that it has only one user at
90 * a time): we would prefer not to enlarge the shmem inode just for that.
1aac1400
HD
91 */
92struct shmem_falloc {
8e205f77 93 wait_queue_head_t *waitq; /* faults into hole wait for punch to end */
1aac1400
HD
94 pgoff_t start; /* start of range currently being fallocated */
95 pgoff_t next; /* the next page offset to be fallocated */
96 pgoff_t nr_falloced; /* how many new pages have been fallocated */
97 pgoff_t nr_unswapped; /* how often writepage refused to swap out */
98};
99
285b2c4f 100/* Flag allocation requirements to shmem_getpage */
1da177e4 101enum sgp_type {
1da177e4
LT
102 SGP_READ, /* don't exceed i_size, don't allocate page */
103 SGP_CACHE, /* don't exceed i_size, may allocate page */
1635f6a7
HD
104 SGP_WRITE, /* may exceed i_size, may allocate !Uptodate page */
105 SGP_FALLOC, /* like SGP_WRITE, but make existing page Uptodate */
1da177e4
LT
106};
107
b76db735 108#ifdef CONFIG_TMPFS
680d794b 109static unsigned long shmem_default_max_blocks(void)
110{
111 return totalram_pages / 2;
112}
113
114static unsigned long shmem_default_max_inodes(void)
115{
116 return min(totalram_pages - totalhigh_pages, totalram_pages / 2);
117}
b76db735 118#endif
680d794b 119
bde05d1c
HD
120static bool shmem_should_replace_page(struct page *page, gfp_t gfp);
121static int shmem_replace_page(struct page **pagep, gfp_t gfp,
122 struct shmem_inode_info *info, pgoff_t index);
68da9f05 123static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
9e18eb29
ALC
124 struct page **pagep, enum sgp_type sgp,
125 gfp_t gfp, struct mm_struct *fault_mm, int *fault_type);
68da9f05
HD
126
127static inline int shmem_getpage(struct inode *inode, pgoff_t index,
9e18eb29 128 struct page **pagep, enum sgp_type sgp)
68da9f05
HD
129{
130 return shmem_getpage_gfp(inode, index, pagep, sgp,
9e18eb29 131 mapping_gfp_mask(inode->i_mapping), NULL, NULL);
68da9f05 132}
1da177e4 133
1da177e4
LT
134static inline struct shmem_sb_info *SHMEM_SB(struct super_block *sb)
135{
136 return sb->s_fs_info;
137}
138
139/*
140 * shmem_file_setup pre-accounts the whole fixed size of a VM object,
141 * for shared memory and for shared anonymous (/dev/zero) mappings
142 * (unless MAP_NORESERVE and sysctl_overcommit_memory <= 1),
143 * consistent with the pre-accounting of private mappings ...
144 */
145static inline int shmem_acct_size(unsigned long flags, loff_t size)
146{
0b0a0806 147 return (flags & VM_NORESERVE) ?
191c5424 148 0 : security_vm_enough_memory_mm(current->mm, VM_ACCT(size));
1da177e4
LT
149}
150
151static inline void shmem_unacct_size(unsigned long flags, loff_t size)
152{
0b0a0806 153 if (!(flags & VM_NORESERVE))
1da177e4
LT
154 vm_unacct_memory(VM_ACCT(size));
155}
156
77142517
KK
157static inline int shmem_reacct_size(unsigned long flags,
158 loff_t oldsize, loff_t newsize)
159{
160 if (!(flags & VM_NORESERVE)) {
161 if (VM_ACCT(newsize) > VM_ACCT(oldsize))
162 return security_vm_enough_memory_mm(current->mm,
163 VM_ACCT(newsize) - VM_ACCT(oldsize));
164 else if (VM_ACCT(newsize) < VM_ACCT(oldsize))
165 vm_unacct_memory(VM_ACCT(oldsize) - VM_ACCT(newsize));
166 }
167 return 0;
168}
169
1da177e4
LT
170/*
171 * ... whereas tmpfs objects are accounted incrementally as
75edd345 172 * pages are allocated, in order to allow large sparse files.
1da177e4
LT
173 * shmem_getpage reports shmem_acct_block failure as -ENOSPC not -ENOMEM,
174 * so that a failure on a sparse tmpfs mapping will give SIGBUS not OOM.
175 */
176static inline int shmem_acct_block(unsigned long flags)
177{
0b0a0806 178 return (flags & VM_NORESERVE) ?
09cbfeaf 179 security_vm_enough_memory_mm(current->mm, VM_ACCT(PAGE_SIZE)) : 0;
1da177e4
LT
180}
181
182static inline void shmem_unacct_blocks(unsigned long flags, long pages)
183{
0b0a0806 184 if (flags & VM_NORESERVE)
09cbfeaf 185 vm_unacct_memory(pages * VM_ACCT(PAGE_SIZE));
1da177e4
LT
186}
187
759b9775 188static const struct super_operations shmem_ops;
f5e54d6e 189static const struct address_space_operations shmem_aops;
15ad7cdc 190static const struct file_operations shmem_file_operations;
92e1d5be
AV
191static const struct inode_operations shmem_inode_operations;
192static const struct inode_operations shmem_dir_inode_operations;
193static const struct inode_operations shmem_special_inode_operations;
f0f37e2f 194static const struct vm_operations_struct shmem_vm_ops;
1da177e4 195
1da177e4 196static LIST_HEAD(shmem_swaplist);
cb5f7b9a 197static DEFINE_MUTEX(shmem_swaplist_mutex);
1da177e4 198
5b04c689
PE
199static int shmem_reserve_inode(struct super_block *sb)
200{
201 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
202 if (sbinfo->max_inodes) {
203 spin_lock(&sbinfo->stat_lock);
204 if (!sbinfo->free_inodes) {
205 spin_unlock(&sbinfo->stat_lock);
206 return -ENOSPC;
207 }
208 sbinfo->free_inodes--;
209 spin_unlock(&sbinfo->stat_lock);
210 }
211 return 0;
212}
213
214static void shmem_free_inode(struct super_block *sb)
215{
216 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
217 if (sbinfo->max_inodes) {
218 spin_lock(&sbinfo->stat_lock);
219 sbinfo->free_inodes++;
220 spin_unlock(&sbinfo->stat_lock);
221 }
222}
223
46711810 224/**
41ffe5d5 225 * shmem_recalc_inode - recalculate the block usage of an inode
1da177e4
LT
226 * @inode: inode to recalc
227 *
228 * We have to calculate the free blocks since the mm can drop
229 * undirtied hole pages behind our back.
230 *
231 * But normally info->alloced == inode->i_mapping->nrpages + info->swapped
232 * So mm freed is info->alloced - (inode->i_mapping->nrpages + info->swapped)
233 *
234 * It has to be called with the spinlock held.
235 */
236static void shmem_recalc_inode(struct inode *inode)
237{
238 struct shmem_inode_info *info = SHMEM_I(inode);
239 long freed;
240
241 freed = info->alloced - info->swapped - inode->i_mapping->nrpages;
242 if (freed > 0) {
54af6042
HD
243 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
244 if (sbinfo->max_blocks)
245 percpu_counter_add(&sbinfo->used_blocks, -freed);
1da177e4 246 info->alloced -= freed;
54af6042 247 inode->i_blocks -= freed * BLOCKS_PER_PAGE;
1da177e4 248 shmem_unacct_blocks(info->flags, freed);
1da177e4
LT
249 }
250}
251
7a5d0fbb
HD
252/*
253 * Replace item expected in radix tree by a new item, while holding tree lock.
254 */
255static int shmem_radix_tree_replace(struct address_space *mapping,
256 pgoff_t index, void *expected, void *replacement)
257{
258 void **pslot;
6dbaf22c 259 void *item;
7a5d0fbb
HD
260
261 VM_BUG_ON(!expected);
6dbaf22c 262 VM_BUG_ON(!replacement);
7a5d0fbb 263 pslot = radix_tree_lookup_slot(&mapping->page_tree, index);
6dbaf22c
JW
264 if (!pslot)
265 return -ENOENT;
266 item = radix_tree_deref_slot_protected(pslot, &mapping->tree_lock);
7a5d0fbb
HD
267 if (item != expected)
268 return -ENOENT;
6dbaf22c 269 radix_tree_replace_slot(pslot, replacement);
7a5d0fbb
HD
270 return 0;
271}
272
d1899228
HD
273/*
274 * Sometimes, before we decide whether to proceed or to fail, we must check
275 * that an entry was not already brought back from swap by a racing thread.
276 *
277 * Checking page is not enough: by the time a SwapCache page is locked, it
278 * might be reused, and again be SwapCache, using the same swap as before.
279 */
280static bool shmem_confirm_swap(struct address_space *mapping,
281 pgoff_t index, swp_entry_t swap)
282{
283 void *item;
284
285 rcu_read_lock();
286 item = radix_tree_lookup(&mapping->page_tree, index);
287 rcu_read_unlock();
288 return item == swp_to_radix_entry(swap);
289}
290
5a6e75f8
KS
291/*
292 * Definitions for "huge tmpfs": tmpfs mounted with the huge= option
293 *
294 * SHMEM_HUGE_NEVER:
295 * disables huge pages for the mount;
296 * SHMEM_HUGE_ALWAYS:
297 * enables huge pages for the mount;
298 * SHMEM_HUGE_WITHIN_SIZE:
299 * only allocate huge pages if the page will be fully within i_size,
300 * also respect fadvise()/madvise() hints;
301 * SHMEM_HUGE_ADVISE:
302 * only allocate huge pages if requested with fadvise()/madvise();
303 */
304
305#define SHMEM_HUGE_NEVER 0
306#define SHMEM_HUGE_ALWAYS 1
307#define SHMEM_HUGE_WITHIN_SIZE 2
308#define SHMEM_HUGE_ADVISE 3
309
310/*
311 * Special values.
312 * Only can be set via /sys/kernel/mm/transparent_hugepage/shmem_enabled:
313 *
314 * SHMEM_HUGE_DENY:
315 * disables huge on shm_mnt and all mounts, for emergency use;
316 * SHMEM_HUGE_FORCE:
317 * enables huge on shm_mnt and all mounts, w/o needing option, for testing;
318 *
319 */
320#define SHMEM_HUGE_DENY (-1)
321#define SHMEM_HUGE_FORCE (-2)
322
323#ifdef CONFIG_TRANSPARENT_HUGEPAGE
324/* ifdef here to avoid bloating shmem.o when not necessary */
325
326int shmem_huge __read_mostly;
327
328static int shmem_parse_huge(const char *str)
329{
330 if (!strcmp(str, "never"))
331 return SHMEM_HUGE_NEVER;
332 if (!strcmp(str, "always"))
333 return SHMEM_HUGE_ALWAYS;
334 if (!strcmp(str, "within_size"))
335 return SHMEM_HUGE_WITHIN_SIZE;
336 if (!strcmp(str, "advise"))
337 return SHMEM_HUGE_ADVISE;
338 if (!strcmp(str, "deny"))
339 return SHMEM_HUGE_DENY;
340 if (!strcmp(str, "force"))
341 return SHMEM_HUGE_FORCE;
342 return -EINVAL;
343}
344
345static const char *shmem_format_huge(int huge)
346{
347 switch (huge) {
348 case SHMEM_HUGE_NEVER:
349 return "never";
350 case SHMEM_HUGE_ALWAYS:
351 return "always";
352 case SHMEM_HUGE_WITHIN_SIZE:
353 return "within_size";
354 case SHMEM_HUGE_ADVISE:
355 return "advise";
356 case SHMEM_HUGE_DENY:
357 return "deny";
358 case SHMEM_HUGE_FORCE:
359 return "force";
360 default:
361 VM_BUG_ON(1);
362 return "bad_val";
363 }
364}
365
366#else /* !CONFIG_TRANSPARENT_HUGEPAGE */
367
368#define shmem_huge SHMEM_HUGE_DENY
369
370#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
371
46f65ec1
HD
372/*
373 * Like add_to_page_cache_locked, but error if expected item has gone.
374 */
375static int shmem_add_to_page_cache(struct page *page,
376 struct address_space *mapping,
fed400a1 377 pgoff_t index, void *expected)
46f65ec1 378{
b065b432 379 int error;
46f65ec1 380
309381fe
SL
381 VM_BUG_ON_PAGE(!PageLocked(page), page);
382 VM_BUG_ON_PAGE(!PageSwapBacked(page), page);
46f65ec1 383
09cbfeaf 384 get_page(page);
b065b432
HD
385 page->mapping = mapping;
386 page->index = index;
387
388 spin_lock_irq(&mapping->tree_lock);
46f65ec1 389 if (!expected)
b065b432
HD
390 error = radix_tree_insert(&mapping->page_tree, index, page);
391 else
392 error = shmem_radix_tree_replace(mapping, index, expected,
393 page);
46f65ec1 394 if (!error) {
b065b432
HD
395 mapping->nrpages++;
396 __inc_zone_page_state(page, NR_FILE_PAGES);
397 __inc_zone_page_state(page, NR_SHMEM);
398 spin_unlock_irq(&mapping->tree_lock);
399 } else {
400 page->mapping = NULL;
401 spin_unlock_irq(&mapping->tree_lock);
09cbfeaf 402 put_page(page);
46f65ec1 403 }
46f65ec1
HD
404 return error;
405}
406
6922c0c7
HD
407/*
408 * Like delete_from_page_cache, but substitutes swap for page.
409 */
410static void shmem_delete_from_page_cache(struct page *page, void *radswap)
411{
412 struct address_space *mapping = page->mapping;
413 int error;
414
415 spin_lock_irq(&mapping->tree_lock);
416 error = shmem_radix_tree_replace(mapping, page->index, page, radswap);
417 page->mapping = NULL;
418 mapping->nrpages--;
419 __dec_zone_page_state(page, NR_FILE_PAGES);
420 __dec_zone_page_state(page, NR_SHMEM);
421 spin_unlock_irq(&mapping->tree_lock);
09cbfeaf 422 put_page(page);
6922c0c7
HD
423 BUG_ON(error);
424}
425
7a5d0fbb
HD
426/*
427 * Remove swap entry from radix tree, free the swap and its page cache.
428 */
429static int shmem_free_swap(struct address_space *mapping,
430 pgoff_t index, void *radswap)
431{
6dbaf22c 432 void *old;
7a5d0fbb
HD
433
434 spin_lock_irq(&mapping->tree_lock);
6dbaf22c 435 old = radix_tree_delete_item(&mapping->page_tree, index, radswap);
7a5d0fbb 436 spin_unlock_irq(&mapping->tree_lock);
6dbaf22c
JW
437 if (old != radswap)
438 return -ENOENT;
439 free_swap_and_cache(radix_to_swp_entry(radswap));
440 return 0;
7a5d0fbb
HD
441}
442
6a15a370
VB
443/*
444 * Determine (in bytes) how many of the shmem object's pages mapped by the
48131e03 445 * given offsets are swapped out.
6a15a370
VB
446 *
447 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
448 * as long as the inode doesn't go away and racy results are not a problem.
449 */
48131e03
VB
450unsigned long shmem_partial_swap_usage(struct address_space *mapping,
451 pgoff_t start, pgoff_t end)
6a15a370 452{
6a15a370
VB
453 struct radix_tree_iter iter;
454 void **slot;
455 struct page *page;
48131e03 456 unsigned long swapped = 0;
6a15a370
VB
457
458 rcu_read_lock();
459
6a15a370
VB
460 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
461 if (iter.index >= end)
462 break;
463
464 page = radix_tree_deref_slot(slot);
465
2cf938aa
MW
466 if (radix_tree_deref_retry(page)) {
467 slot = radix_tree_iter_retry(&iter);
468 continue;
469 }
6a15a370
VB
470
471 if (radix_tree_exceptional_entry(page))
472 swapped++;
473
474 if (need_resched()) {
475 cond_resched_rcu();
7165092f 476 slot = radix_tree_iter_next(&iter);
6a15a370
VB
477 }
478 }
479
480 rcu_read_unlock();
481
482 return swapped << PAGE_SHIFT;
483}
484
48131e03
VB
485/*
486 * Determine (in bytes) how many of the shmem object's pages mapped by the
487 * given vma is swapped out.
488 *
489 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
490 * as long as the inode doesn't go away and racy results are not a problem.
491 */
492unsigned long shmem_swap_usage(struct vm_area_struct *vma)
493{
494 struct inode *inode = file_inode(vma->vm_file);
495 struct shmem_inode_info *info = SHMEM_I(inode);
496 struct address_space *mapping = inode->i_mapping;
497 unsigned long swapped;
498
499 /* Be careful as we don't hold info->lock */
500 swapped = READ_ONCE(info->swapped);
501
502 /*
503 * The easier cases are when the shmem object has nothing in swap, or
504 * the vma maps it whole. Then we can simply use the stats that we
505 * already track.
506 */
507 if (!swapped)
508 return 0;
509
510 if (!vma->vm_pgoff && vma->vm_end - vma->vm_start >= inode->i_size)
511 return swapped << PAGE_SHIFT;
512
513 /* Here comes the more involved part */
514 return shmem_partial_swap_usage(mapping,
515 linear_page_index(vma, vma->vm_start),
516 linear_page_index(vma, vma->vm_end));
517}
518
24513264
HD
519/*
520 * SysV IPC SHM_UNLOCK restore Unevictable pages to their evictable lists.
521 */
522void shmem_unlock_mapping(struct address_space *mapping)
523{
524 struct pagevec pvec;
525 pgoff_t indices[PAGEVEC_SIZE];
526 pgoff_t index = 0;
527
528 pagevec_init(&pvec, 0);
529 /*
530 * Minor point, but we might as well stop if someone else SHM_LOCKs it.
531 */
532 while (!mapping_unevictable(mapping)) {
533 /*
534 * Avoid pagevec_lookup(): find_get_pages() returns 0 as if it
535 * has finished, if it hits a row of PAGEVEC_SIZE swap entries.
536 */
0cd6144a
JW
537 pvec.nr = find_get_entries(mapping, index,
538 PAGEVEC_SIZE, pvec.pages, indices);
24513264
HD
539 if (!pvec.nr)
540 break;
541 index = indices[pvec.nr - 1] + 1;
0cd6144a 542 pagevec_remove_exceptionals(&pvec);
24513264
HD
543 check_move_unevictable_pages(pvec.pages, pvec.nr);
544 pagevec_release(&pvec);
545 cond_resched();
546 }
7a5d0fbb
HD
547}
548
549/*
550 * Remove range of pages and swap entries from radix tree, and free them.
1635f6a7 551 * If !unfalloc, truncate or punch hole; if unfalloc, undo failed fallocate.
7a5d0fbb 552 */
1635f6a7
HD
553static void shmem_undo_range(struct inode *inode, loff_t lstart, loff_t lend,
554 bool unfalloc)
1da177e4 555{
285b2c4f 556 struct address_space *mapping = inode->i_mapping;
1da177e4 557 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf
KS
558 pgoff_t start = (lstart + PAGE_SIZE - 1) >> PAGE_SHIFT;
559 pgoff_t end = (lend + 1) >> PAGE_SHIFT;
560 unsigned int partial_start = lstart & (PAGE_SIZE - 1);
561 unsigned int partial_end = (lend + 1) & (PAGE_SIZE - 1);
bda97eab 562 struct pagevec pvec;
7a5d0fbb
HD
563 pgoff_t indices[PAGEVEC_SIZE];
564 long nr_swaps_freed = 0;
285b2c4f 565 pgoff_t index;
bda97eab
HD
566 int i;
567
83e4fa9c
HD
568 if (lend == -1)
569 end = -1; /* unsigned, so actually very big */
bda97eab
HD
570
571 pagevec_init(&pvec, 0);
572 index = start;
83e4fa9c 573 while (index < end) {
0cd6144a
JW
574 pvec.nr = find_get_entries(mapping, index,
575 min(end - index, (pgoff_t)PAGEVEC_SIZE),
576 pvec.pages, indices);
7a5d0fbb
HD
577 if (!pvec.nr)
578 break;
bda97eab
HD
579 for (i = 0; i < pagevec_count(&pvec); i++) {
580 struct page *page = pvec.pages[i];
581
7a5d0fbb 582 index = indices[i];
83e4fa9c 583 if (index >= end)
bda97eab
HD
584 break;
585
7a5d0fbb 586 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
587 if (unfalloc)
588 continue;
7a5d0fbb
HD
589 nr_swaps_freed += !shmem_free_swap(mapping,
590 index, page);
bda97eab 591 continue;
7a5d0fbb
HD
592 }
593
594 if (!trylock_page(page))
bda97eab 595 continue;
1635f6a7
HD
596 if (!unfalloc || !PageUptodate(page)) {
597 if (page->mapping == mapping) {
309381fe 598 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7
HD
599 truncate_inode_page(mapping, page);
600 }
bda97eab 601 }
bda97eab
HD
602 unlock_page(page);
603 }
0cd6144a 604 pagevec_remove_exceptionals(&pvec);
24513264 605 pagevec_release(&pvec);
bda97eab
HD
606 cond_resched();
607 index++;
608 }
1da177e4 609
83e4fa9c 610 if (partial_start) {
bda97eab 611 struct page *page = NULL;
9e18eb29 612 shmem_getpage(inode, start - 1, &page, SGP_READ);
bda97eab 613 if (page) {
09cbfeaf 614 unsigned int top = PAGE_SIZE;
83e4fa9c
HD
615 if (start > end) {
616 top = partial_end;
617 partial_end = 0;
618 }
619 zero_user_segment(page, partial_start, top);
620 set_page_dirty(page);
621 unlock_page(page);
09cbfeaf 622 put_page(page);
83e4fa9c
HD
623 }
624 }
625 if (partial_end) {
626 struct page *page = NULL;
9e18eb29 627 shmem_getpage(inode, end, &page, SGP_READ);
83e4fa9c
HD
628 if (page) {
629 zero_user_segment(page, 0, partial_end);
bda97eab
HD
630 set_page_dirty(page);
631 unlock_page(page);
09cbfeaf 632 put_page(page);
bda97eab
HD
633 }
634 }
83e4fa9c
HD
635 if (start >= end)
636 return;
bda97eab
HD
637
638 index = start;
b1a36650 639 while (index < end) {
bda97eab 640 cond_resched();
0cd6144a
JW
641
642 pvec.nr = find_get_entries(mapping, index,
83e4fa9c 643 min(end - index, (pgoff_t)PAGEVEC_SIZE),
0cd6144a 644 pvec.pages, indices);
7a5d0fbb 645 if (!pvec.nr) {
b1a36650
HD
646 /* If all gone or hole-punch or unfalloc, we're done */
647 if (index == start || end != -1)
bda97eab 648 break;
b1a36650 649 /* But if truncating, restart to make sure all gone */
bda97eab
HD
650 index = start;
651 continue;
652 }
bda97eab
HD
653 for (i = 0; i < pagevec_count(&pvec); i++) {
654 struct page *page = pvec.pages[i];
655
7a5d0fbb 656 index = indices[i];
83e4fa9c 657 if (index >= end)
bda97eab
HD
658 break;
659
7a5d0fbb 660 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
661 if (unfalloc)
662 continue;
b1a36650
HD
663 if (shmem_free_swap(mapping, index, page)) {
664 /* Swap was replaced by page: retry */
665 index--;
666 break;
667 }
668 nr_swaps_freed++;
7a5d0fbb
HD
669 continue;
670 }
671
bda97eab 672 lock_page(page);
1635f6a7
HD
673 if (!unfalloc || !PageUptodate(page)) {
674 if (page->mapping == mapping) {
309381fe 675 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7 676 truncate_inode_page(mapping, page);
b1a36650
HD
677 } else {
678 /* Page was replaced by swap: retry */
679 unlock_page(page);
680 index--;
681 break;
1635f6a7 682 }
7a5d0fbb 683 }
bda97eab
HD
684 unlock_page(page);
685 }
0cd6144a 686 pagevec_remove_exceptionals(&pvec);
24513264 687 pagevec_release(&pvec);
bda97eab
HD
688 index++;
689 }
94c1e62d 690
1da177e4 691 spin_lock(&info->lock);
7a5d0fbb 692 info->swapped -= nr_swaps_freed;
1da177e4
LT
693 shmem_recalc_inode(inode);
694 spin_unlock(&info->lock);
1635f6a7 695}
1da177e4 696
1635f6a7
HD
697void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
698{
699 shmem_undo_range(inode, lstart, lend, false);
285b2c4f 700 inode->i_ctime = inode->i_mtime = CURRENT_TIME;
1da177e4 701}
94c1e62d 702EXPORT_SYMBOL_GPL(shmem_truncate_range);
1da177e4 703
44a30220
YZ
704static int shmem_getattr(struct vfsmount *mnt, struct dentry *dentry,
705 struct kstat *stat)
706{
707 struct inode *inode = dentry->d_inode;
708 struct shmem_inode_info *info = SHMEM_I(inode);
709
d0424c42
HD
710 if (info->alloced - info->swapped != inode->i_mapping->nrpages) {
711 spin_lock(&info->lock);
712 shmem_recalc_inode(inode);
713 spin_unlock(&info->lock);
714 }
44a30220 715 generic_fillattr(inode, stat);
44a30220
YZ
716 return 0;
717}
718
94c1e62d 719static int shmem_setattr(struct dentry *dentry, struct iattr *attr)
1da177e4 720{
75c3cfa8 721 struct inode *inode = d_inode(dentry);
40e041a2 722 struct shmem_inode_info *info = SHMEM_I(inode);
1da177e4
LT
723 int error;
724
db78b877
CH
725 error = inode_change_ok(inode, attr);
726 if (error)
727 return error;
728
94c1e62d
HD
729 if (S_ISREG(inode->i_mode) && (attr->ia_valid & ATTR_SIZE)) {
730 loff_t oldsize = inode->i_size;
731 loff_t newsize = attr->ia_size;
3889e6e7 732
40e041a2
DH
733 /* protected by i_mutex */
734 if ((newsize < oldsize && (info->seals & F_SEAL_SHRINK)) ||
735 (newsize > oldsize && (info->seals & F_SEAL_GROW)))
736 return -EPERM;
737
94c1e62d 738 if (newsize != oldsize) {
77142517
KK
739 error = shmem_reacct_size(SHMEM_I(inode)->flags,
740 oldsize, newsize);
741 if (error)
742 return error;
94c1e62d
HD
743 i_size_write(inode, newsize);
744 inode->i_ctime = inode->i_mtime = CURRENT_TIME;
745 }
afa2db2f 746 if (newsize <= oldsize) {
94c1e62d 747 loff_t holebegin = round_up(newsize, PAGE_SIZE);
d0424c42
HD
748 if (oldsize > holebegin)
749 unmap_mapping_range(inode->i_mapping,
750 holebegin, 0, 1);
751 if (info->alloced)
752 shmem_truncate_range(inode,
753 newsize, (loff_t)-1);
94c1e62d 754 /* unmap again to remove racily COWed private pages */
d0424c42
HD
755 if (oldsize > holebegin)
756 unmap_mapping_range(inode->i_mapping,
757 holebegin, 0, 1);
94c1e62d 758 }
1da177e4
LT
759 }
760
db78b877 761 setattr_copy(inode, attr);
db78b877 762 if (attr->ia_valid & ATTR_MODE)
feda821e 763 error = posix_acl_chmod(inode, inode->i_mode);
1da177e4
LT
764 return error;
765}
766
1f895f75 767static void shmem_evict_inode(struct inode *inode)
1da177e4 768{
1da177e4
LT
769 struct shmem_inode_info *info = SHMEM_I(inode);
770
3889e6e7 771 if (inode->i_mapping->a_ops == &shmem_aops) {
1da177e4
LT
772 shmem_unacct_size(info->flags, inode->i_size);
773 inode->i_size = 0;
3889e6e7 774 shmem_truncate_range(inode, 0, (loff_t)-1);
1da177e4 775 if (!list_empty(&info->swaplist)) {
cb5f7b9a 776 mutex_lock(&shmem_swaplist_mutex);
1da177e4 777 list_del_init(&info->swaplist);
cb5f7b9a 778 mutex_unlock(&shmem_swaplist_mutex);
1da177e4 779 }
3ed47db3 780 }
b09e0fa4 781
38f38657 782 simple_xattrs_free(&info->xattrs);
0f3c42f5 783 WARN_ON(inode->i_blocks);
5b04c689 784 shmem_free_inode(inode->i_sb);
dbd5768f 785 clear_inode(inode);
1da177e4
LT
786}
787
46f65ec1
HD
788/*
789 * If swap found in inode, free it and move page from swapcache to filecache.
790 */
41ffe5d5 791static int shmem_unuse_inode(struct shmem_inode_info *info,
bde05d1c 792 swp_entry_t swap, struct page **pagep)
1da177e4 793{
285b2c4f 794 struct address_space *mapping = info->vfs_inode.i_mapping;
46f65ec1 795 void *radswap;
41ffe5d5 796 pgoff_t index;
bde05d1c
HD
797 gfp_t gfp;
798 int error = 0;
1da177e4 799
46f65ec1 800 radswap = swp_to_radix_entry(swap);
e504f3fd 801 index = radix_tree_locate_item(&mapping->page_tree, radswap);
46f65ec1 802 if (index == -1)
00501b53 803 return -EAGAIN; /* tell shmem_unuse we found nothing */
2e0e26c7 804
1b1b32f2
HD
805 /*
806 * Move _head_ to start search for next from here.
1f895f75 807 * But be careful: shmem_evict_inode checks list_empty without taking
1b1b32f2 808 * mutex, and there's an instant in list_move_tail when info->swaplist
285b2c4f 809 * would appear empty, if it were the only one on shmem_swaplist.
1b1b32f2
HD
810 */
811 if (shmem_swaplist.next != &info->swaplist)
812 list_move_tail(&shmem_swaplist, &info->swaplist);
2e0e26c7 813
bde05d1c
HD
814 gfp = mapping_gfp_mask(mapping);
815 if (shmem_should_replace_page(*pagep, gfp)) {
816 mutex_unlock(&shmem_swaplist_mutex);
817 error = shmem_replace_page(pagep, gfp, info, index);
818 mutex_lock(&shmem_swaplist_mutex);
819 /*
820 * We needed to drop mutex to make that restrictive page
0142ef6c
HD
821 * allocation, but the inode might have been freed while we
822 * dropped it: although a racing shmem_evict_inode() cannot
823 * complete without emptying the radix_tree, our page lock
824 * on this swapcache page is not enough to prevent that -
825 * free_swap_and_cache() of our swap entry will only
826 * trylock_page(), removing swap from radix_tree whatever.
827 *
828 * We must not proceed to shmem_add_to_page_cache() if the
829 * inode has been freed, but of course we cannot rely on
830 * inode or mapping or info to check that. However, we can
831 * safely check if our swap entry is still in use (and here
832 * it can't have got reused for another page): if it's still
833 * in use, then the inode cannot have been freed yet, and we
834 * can safely proceed (if it's no longer in use, that tells
835 * nothing about the inode, but we don't need to unuse swap).
bde05d1c
HD
836 */
837 if (!page_swapcount(*pagep))
838 error = -ENOENT;
839 }
840
d13d1443 841 /*
778dd893
HD
842 * We rely on shmem_swaplist_mutex, not only to protect the swaplist,
843 * but also to hold up shmem_evict_inode(): so inode cannot be freed
844 * beneath us (pagelock doesn't help until the page is in pagecache).
d13d1443 845 */
bde05d1c
HD
846 if (!error)
847 error = shmem_add_to_page_cache(*pagep, mapping, index,
fed400a1 848 radswap);
48f170fb 849 if (error != -ENOMEM) {
46f65ec1
HD
850 /*
851 * Truncation and eviction use free_swap_and_cache(), which
852 * only does trylock page: if we raced, best clean up here.
853 */
bde05d1c
HD
854 delete_from_swap_cache(*pagep);
855 set_page_dirty(*pagep);
46f65ec1
HD
856 if (!error) {
857 spin_lock(&info->lock);
858 info->swapped--;
859 spin_unlock(&info->lock);
860 swap_free(swap);
861 }
1da177e4 862 }
2e0e26c7 863 return error;
1da177e4
LT
864}
865
866/*
46f65ec1 867 * Search through swapped inodes to find and replace swap by page.
1da177e4 868 */
41ffe5d5 869int shmem_unuse(swp_entry_t swap, struct page *page)
1da177e4 870{
41ffe5d5 871 struct list_head *this, *next;
1da177e4 872 struct shmem_inode_info *info;
00501b53 873 struct mem_cgroup *memcg;
bde05d1c
HD
874 int error = 0;
875
876 /*
877 * There's a faint possibility that swap page was replaced before
0142ef6c 878 * caller locked it: caller will come back later with the right page.
bde05d1c 879 */
0142ef6c 880 if (unlikely(!PageSwapCache(page) || page_private(page) != swap.val))
bde05d1c 881 goto out;
778dd893
HD
882
883 /*
884 * Charge page using GFP_KERNEL while we can wait, before taking
885 * the shmem_swaplist_mutex which might hold up shmem_writepage().
886 * Charged back to the user (not to caller) when swap account is used.
778dd893 887 */
f627c2f5
KS
888 error = mem_cgroup_try_charge(page, current->mm, GFP_KERNEL, &memcg,
889 false);
778dd893
HD
890 if (error)
891 goto out;
46f65ec1 892 /* No radix_tree_preload: swap entry keeps a place for page in tree */
00501b53 893 error = -EAGAIN;
1da177e4 894
cb5f7b9a 895 mutex_lock(&shmem_swaplist_mutex);
41ffe5d5
HD
896 list_for_each_safe(this, next, &shmem_swaplist) {
897 info = list_entry(this, struct shmem_inode_info, swaplist);
285b2c4f 898 if (info->swapped)
00501b53 899 error = shmem_unuse_inode(info, swap, &page);
6922c0c7
HD
900 else
901 list_del_init(&info->swaplist);
cb5f7b9a 902 cond_resched();
00501b53 903 if (error != -EAGAIN)
778dd893 904 break;
00501b53 905 /* found nothing in this: move on to search the next */
1da177e4 906 }
cb5f7b9a 907 mutex_unlock(&shmem_swaplist_mutex);
778dd893 908
00501b53
JW
909 if (error) {
910 if (error != -ENOMEM)
911 error = 0;
f627c2f5 912 mem_cgroup_cancel_charge(page, memcg, false);
00501b53 913 } else
f627c2f5 914 mem_cgroup_commit_charge(page, memcg, true, false);
778dd893 915out:
aaa46865 916 unlock_page(page);
09cbfeaf 917 put_page(page);
778dd893 918 return error;
1da177e4
LT
919}
920
921/*
922 * Move the page from the page cache to the swap cache.
923 */
924static int shmem_writepage(struct page *page, struct writeback_control *wbc)
925{
926 struct shmem_inode_info *info;
1da177e4 927 struct address_space *mapping;
1da177e4 928 struct inode *inode;
6922c0c7
HD
929 swp_entry_t swap;
930 pgoff_t index;
1da177e4
LT
931
932 BUG_ON(!PageLocked(page));
1da177e4
LT
933 mapping = page->mapping;
934 index = page->index;
935 inode = mapping->host;
936 info = SHMEM_I(inode);
937 if (info->flags & VM_LOCKED)
938 goto redirty;
d9fe526a 939 if (!total_swap_pages)
1da177e4
LT
940 goto redirty;
941
d9fe526a 942 /*
97b713ba
CH
943 * Our capabilities prevent regular writeback or sync from ever calling
944 * shmem_writepage; but a stacking filesystem might use ->writepage of
945 * its underlying filesystem, in which case tmpfs should write out to
946 * swap only in response to memory pressure, and not for the writeback
947 * threads or sync.
d9fe526a 948 */
48f170fb
HD
949 if (!wbc->for_reclaim) {
950 WARN_ON_ONCE(1); /* Still happens? Tell us about it! */
951 goto redirty;
952 }
1635f6a7
HD
953
954 /*
955 * This is somewhat ridiculous, but without plumbing a SWAP_MAP_FALLOC
956 * value into swapfile.c, the only way we can correctly account for a
957 * fallocated page arriving here is now to initialize it and write it.
1aac1400
HD
958 *
959 * That's okay for a page already fallocated earlier, but if we have
960 * not yet completed the fallocation, then (a) we want to keep track
961 * of this page in case we have to undo it, and (b) it may not be a
962 * good idea to continue anyway, once we're pushing into swap. So
963 * reactivate the page, and let shmem_fallocate() quit when too many.
1635f6a7
HD
964 */
965 if (!PageUptodate(page)) {
1aac1400
HD
966 if (inode->i_private) {
967 struct shmem_falloc *shmem_falloc;
968 spin_lock(&inode->i_lock);
969 shmem_falloc = inode->i_private;
970 if (shmem_falloc &&
8e205f77 971 !shmem_falloc->waitq &&
1aac1400
HD
972 index >= shmem_falloc->start &&
973 index < shmem_falloc->next)
974 shmem_falloc->nr_unswapped++;
975 else
976 shmem_falloc = NULL;
977 spin_unlock(&inode->i_lock);
978 if (shmem_falloc)
979 goto redirty;
980 }
1635f6a7
HD
981 clear_highpage(page);
982 flush_dcache_page(page);
983 SetPageUptodate(page);
984 }
985
48f170fb
HD
986 swap = get_swap_page();
987 if (!swap.val)
988 goto redirty;
d9fe526a 989
37e84351
VD
990 if (mem_cgroup_try_charge_swap(page, swap))
991 goto free_swap;
992
b1dea800
HD
993 /*
994 * Add inode to shmem_unuse()'s list of swapped-out inodes,
6922c0c7
HD
995 * if it's not already there. Do it now before the page is
996 * moved to swap cache, when its pagelock no longer protects
b1dea800 997 * the inode from eviction. But don't unlock the mutex until
6922c0c7
HD
998 * we've incremented swapped, because shmem_unuse_inode() will
999 * prune a !swapped inode from the swaplist under this mutex.
b1dea800 1000 */
48f170fb
HD
1001 mutex_lock(&shmem_swaplist_mutex);
1002 if (list_empty(&info->swaplist))
1003 list_add_tail(&info->swaplist, &shmem_swaplist);
b1dea800 1004
48f170fb 1005 if (add_to_swap_cache(page, swap, GFP_ATOMIC) == 0) {
6922c0c7 1006 spin_lock(&info->lock);
6922c0c7 1007 shmem_recalc_inode(inode);
267a4c76 1008 info->swapped++;
826267cf 1009 spin_unlock(&info->lock);
6922c0c7 1010
267a4c76
HD
1011 swap_shmem_alloc(swap);
1012 shmem_delete_from_page_cache(page, swp_to_radix_entry(swap));
1013
6922c0c7 1014 mutex_unlock(&shmem_swaplist_mutex);
d9fe526a 1015 BUG_ON(page_mapped(page));
9fab5619 1016 swap_writepage(page, wbc);
1da177e4
LT
1017 return 0;
1018 }
1019
6922c0c7 1020 mutex_unlock(&shmem_swaplist_mutex);
37e84351 1021free_swap:
0a31bc97 1022 swapcache_free(swap);
1da177e4
LT
1023redirty:
1024 set_page_dirty(page);
d9fe526a
HD
1025 if (wbc->for_reclaim)
1026 return AOP_WRITEPAGE_ACTIVATE; /* Return with page locked */
1027 unlock_page(page);
1028 return 0;
1da177e4
LT
1029}
1030
75edd345 1031#if defined(CONFIG_NUMA) && defined(CONFIG_TMPFS)
71fe804b 1032static void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
680d794b 1033{
095f1fc4 1034 char buffer[64];
680d794b 1035
71fe804b 1036 if (!mpol || mpol->mode == MPOL_DEFAULT)
095f1fc4 1037 return; /* show nothing */
680d794b 1038
a7a88b23 1039 mpol_to_str(buffer, sizeof(buffer), mpol);
095f1fc4
LS
1040
1041 seq_printf(seq, ",mpol=%s", buffer);
680d794b 1042}
71fe804b
LS
1043
1044static struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
1045{
1046 struct mempolicy *mpol = NULL;
1047 if (sbinfo->mpol) {
1048 spin_lock(&sbinfo->stat_lock); /* prevent replace/use races */
1049 mpol = sbinfo->mpol;
1050 mpol_get(mpol);
1051 spin_unlock(&sbinfo->stat_lock);
1052 }
1053 return mpol;
1054}
75edd345
HD
1055#else /* !CONFIG_NUMA || !CONFIG_TMPFS */
1056static inline void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
1057{
1058}
1059static inline struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
1060{
1061 return NULL;
1062}
1063#endif /* CONFIG_NUMA && CONFIG_TMPFS */
1064#ifndef CONFIG_NUMA
1065#define vm_policy vm_private_data
1066#endif
680d794b 1067
41ffe5d5
HD
1068static struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,
1069 struct shmem_inode_info *info, pgoff_t index)
1da177e4 1070{
1da177e4 1071 struct vm_area_struct pvma;
18a2f371 1072 struct page *page;
52cd3b07 1073
1da177e4 1074 /* Create a pseudo vma that just contains the policy */
c4cc6d07 1075 pvma.vm_start = 0;
09c231cb
NZ
1076 /* Bias interleave by inode number to distribute better across nodes */
1077 pvma.vm_pgoff = index + info->vfs_inode.i_ino;
c4cc6d07 1078 pvma.vm_ops = NULL;
18a2f371
MG
1079 pvma.vm_policy = mpol_shared_policy_lookup(&info->policy, index);
1080
1081 page = swapin_readahead(swap, gfp, &pvma, 0);
1082
1083 /* Drop reference taken by mpol_shared_policy_lookup() */
1084 mpol_cond_put(pvma.vm_policy);
1085
1086 return page;
1da177e4
LT
1087}
1088
02098fea 1089static struct page *shmem_alloc_page(gfp_t gfp,
41ffe5d5 1090 struct shmem_inode_info *info, pgoff_t index)
1da177e4
LT
1091{
1092 struct vm_area_struct pvma;
18a2f371 1093 struct page *page;
1da177e4 1094
c4cc6d07
HD
1095 /* Create a pseudo vma that just contains the policy */
1096 pvma.vm_start = 0;
09c231cb
NZ
1097 /* Bias interleave by inode number to distribute better across nodes */
1098 pvma.vm_pgoff = index + info->vfs_inode.i_ino;
c4cc6d07 1099 pvma.vm_ops = NULL;
41ffe5d5 1100 pvma.vm_policy = mpol_shared_policy_lookup(&info->policy, index);
52cd3b07 1101
75edd345
HD
1102 page = alloc_pages_vma(gfp, 0, &pvma, 0, numa_node_id(), false);
1103 if (page) {
1104 __SetPageLocked(page);
1105 __SetPageSwapBacked(page);
1106 }
18a2f371
MG
1107
1108 /* Drop reference taken by mpol_shared_policy_lookup() */
1109 mpol_cond_put(pvma.vm_policy);
1110
1111 return page;
1da177e4 1112}
71fe804b 1113
bde05d1c
HD
1114/*
1115 * When a page is moved from swapcache to shmem filecache (either by the
1116 * usual swapin of shmem_getpage_gfp(), or by the less common swapoff of
1117 * shmem_unuse_inode()), it may have been read in earlier from swap, in
1118 * ignorance of the mapping it belongs to. If that mapping has special
1119 * constraints (like the gma500 GEM driver, which requires RAM below 4GB),
1120 * we may need to copy to a suitable page before moving to filecache.
1121 *
1122 * In a future release, this may well be extended to respect cpuset and
1123 * NUMA mempolicy, and applied also to anonymous pages in do_swap_page();
1124 * but for now it is a simple matter of zone.
1125 */
1126static bool shmem_should_replace_page(struct page *page, gfp_t gfp)
1127{
1128 return page_zonenum(page) > gfp_zone(gfp);
1129}
1130
1131static int shmem_replace_page(struct page **pagep, gfp_t gfp,
1132 struct shmem_inode_info *info, pgoff_t index)
1133{
1134 struct page *oldpage, *newpage;
1135 struct address_space *swap_mapping;
1136 pgoff_t swap_index;
1137 int error;
1138
1139 oldpage = *pagep;
1140 swap_index = page_private(oldpage);
1141 swap_mapping = page_mapping(oldpage);
1142
1143 /*
1144 * We have arrived here because our zones are constrained, so don't
1145 * limit chance of success by further cpuset and node constraints.
1146 */
1147 gfp &= ~GFP_CONSTRAINT_MASK;
1148 newpage = shmem_alloc_page(gfp, info, index);
1149 if (!newpage)
1150 return -ENOMEM;
bde05d1c 1151
09cbfeaf 1152 get_page(newpage);
bde05d1c 1153 copy_highpage(newpage, oldpage);
0142ef6c 1154 flush_dcache_page(newpage);
bde05d1c 1155
bde05d1c 1156 SetPageUptodate(newpage);
bde05d1c 1157 set_page_private(newpage, swap_index);
bde05d1c
HD
1158 SetPageSwapCache(newpage);
1159
1160 /*
1161 * Our caller will very soon move newpage out of swapcache, but it's
1162 * a nice clean interface for us to replace oldpage by newpage there.
1163 */
1164 spin_lock_irq(&swap_mapping->tree_lock);
1165 error = shmem_radix_tree_replace(swap_mapping, swap_index, oldpage,
1166 newpage);
0142ef6c
HD
1167 if (!error) {
1168 __inc_zone_page_state(newpage, NR_FILE_PAGES);
1169 __dec_zone_page_state(oldpage, NR_FILE_PAGES);
1170 }
bde05d1c 1171 spin_unlock_irq(&swap_mapping->tree_lock);
bde05d1c 1172
0142ef6c
HD
1173 if (unlikely(error)) {
1174 /*
1175 * Is this possible? I think not, now that our callers check
1176 * both PageSwapCache and page_private after getting page lock;
1177 * but be defensive. Reverse old to newpage for clear and free.
1178 */
1179 oldpage = newpage;
1180 } else {
6a93ca8f 1181 mem_cgroup_migrate(oldpage, newpage);
0142ef6c
HD
1182 lru_cache_add_anon(newpage);
1183 *pagep = newpage;
1184 }
bde05d1c
HD
1185
1186 ClearPageSwapCache(oldpage);
1187 set_page_private(oldpage, 0);
1188
1189 unlock_page(oldpage);
09cbfeaf
KS
1190 put_page(oldpage);
1191 put_page(oldpage);
0142ef6c 1192 return error;
bde05d1c
HD
1193}
1194
1da177e4 1195/*
68da9f05 1196 * shmem_getpage_gfp - find page in cache, or get from swap, or allocate
1da177e4
LT
1197 *
1198 * If we allocate a new one we do not mark it dirty. That's up to the
1199 * vm. If we swap it in we mark it dirty since we also free the swap
9e18eb29
ALC
1200 * entry since a page cannot live in both the swap and page cache.
1201 *
1202 * fault_mm and fault_type are only supplied by shmem_fault:
1203 * otherwise they are NULL.
1da177e4 1204 */
41ffe5d5 1205static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
9e18eb29
ALC
1206 struct page **pagep, enum sgp_type sgp, gfp_t gfp,
1207 struct mm_struct *fault_mm, int *fault_type)
1da177e4
LT
1208{
1209 struct address_space *mapping = inode->i_mapping;
54af6042 1210 struct shmem_inode_info *info;
1da177e4 1211 struct shmem_sb_info *sbinfo;
9e18eb29 1212 struct mm_struct *charge_mm;
00501b53 1213 struct mem_cgroup *memcg;
27ab7006 1214 struct page *page;
1da177e4
LT
1215 swp_entry_t swap;
1216 int error;
54af6042 1217 int once = 0;
1635f6a7 1218 int alloced = 0;
1da177e4 1219
09cbfeaf 1220 if (index > (MAX_LFS_FILESIZE >> PAGE_SHIFT))
1da177e4 1221 return -EFBIG;
1da177e4 1222repeat:
54af6042 1223 swap.val = 0;
0cd6144a 1224 page = find_lock_entry(mapping, index);
54af6042
HD
1225 if (radix_tree_exceptional_entry(page)) {
1226 swap = radix_to_swp_entry(page);
1227 page = NULL;
1228 }
1229
75edd345 1230 if (sgp <= SGP_CACHE &&
09cbfeaf 1231 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
54af6042 1232 error = -EINVAL;
267a4c76 1233 goto unlock;
54af6042
HD
1234 }
1235
66d2f4d2
HD
1236 if (page && sgp == SGP_WRITE)
1237 mark_page_accessed(page);
1238
1635f6a7
HD
1239 /* fallocated page? */
1240 if (page && !PageUptodate(page)) {
1241 if (sgp != SGP_READ)
1242 goto clear;
1243 unlock_page(page);
09cbfeaf 1244 put_page(page);
1635f6a7
HD
1245 page = NULL;
1246 }
54af6042 1247 if (page || (sgp == SGP_READ && !swap.val)) {
54af6042
HD
1248 *pagep = page;
1249 return 0;
27ab7006
HD
1250 }
1251
1252 /*
54af6042
HD
1253 * Fast cache lookup did not find it:
1254 * bring it back from swap or allocate.
27ab7006 1255 */
54af6042
HD
1256 info = SHMEM_I(inode);
1257 sbinfo = SHMEM_SB(inode->i_sb);
9e18eb29 1258 charge_mm = fault_mm ? : current->mm;
1da177e4 1259
1da177e4
LT
1260 if (swap.val) {
1261 /* Look it up and read it in.. */
27ab7006
HD
1262 page = lookup_swap_cache(swap);
1263 if (!page) {
9e18eb29
ALC
1264 /* Or update major stats only when swapin succeeds?? */
1265 if (fault_type) {
68da9f05 1266 *fault_type |= VM_FAULT_MAJOR;
9e18eb29
ALC
1267 count_vm_event(PGMAJFAULT);
1268 mem_cgroup_count_vm_event(fault_mm, PGMAJFAULT);
1269 }
1270 /* Here we actually start the io */
41ffe5d5 1271 page = shmem_swapin(swap, gfp, info, index);
27ab7006 1272 if (!page) {
54af6042
HD
1273 error = -ENOMEM;
1274 goto failed;
1da177e4 1275 }
1da177e4
LT
1276 }
1277
1278 /* We have to do this with page locked to prevent races */
54af6042 1279 lock_page(page);
0142ef6c 1280 if (!PageSwapCache(page) || page_private(page) != swap.val ||
d1899228 1281 !shmem_confirm_swap(mapping, index, swap)) {
bde05d1c 1282 error = -EEXIST; /* try again */
d1899228 1283 goto unlock;
bde05d1c 1284 }
27ab7006 1285 if (!PageUptodate(page)) {
1da177e4 1286 error = -EIO;
54af6042 1287 goto failed;
1da177e4 1288 }
54af6042
HD
1289 wait_on_page_writeback(page);
1290
bde05d1c
HD
1291 if (shmem_should_replace_page(page, gfp)) {
1292 error = shmem_replace_page(&page, gfp, info, index);
1293 if (error)
1294 goto failed;
1da177e4 1295 }
27ab7006 1296
9e18eb29 1297 error = mem_cgroup_try_charge(page, charge_mm, gfp, &memcg,
f627c2f5 1298 false);
d1899228 1299 if (!error) {
aa3b1895 1300 error = shmem_add_to_page_cache(page, mapping, index,
fed400a1 1301 swp_to_radix_entry(swap));
215c02bc
HD
1302 /*
1303 * We already confirmed swap under page lock, and make
1304 * no memory allocation here, so usually no possibility
1305 * of error; but free_swap_and_cache() only trylocks a
1306 * page, so it is just possible that the entry has been
1307 * truncated or holepunched since swap was confirmed.
1308 * shmem_undo_range() will have done some of the
1309 * unaccounting, now delete_from_swap_cache() will do
93aa7d95 1310 * the rest.
215c02bc
HD
1311 * Reset swap.val? No, leave it so "failed" goes back to
1312 * "repeat": reading a hole and writing should succeed.
1313 */
00501b53 1314 if (error) {
f627c2f5 1315 mem_cgroup_cancel_charge(page, memcg, false);
215c02bc 1316 delete_from_swap_cache(page);
00501b53 1317 }
d1899228 1318 }
54af6042
HD
1319 if (error)
1320 goto failed;
1321
f627c2f5 1322 mem_cgroup_commit_charge(page, memcg, true, false);
00501b53 1323
54af6042 1324 spin_lock(&info->lock);
285b2c4f 1325 info->swapped--;
54af6042 1326 shmem_recalc_inode(inode);
27ab7006 1327 spin_unlock(&info->lock);
54af6042 1328
66d2f4d2
HD
1329 if (sgp == SGP_WRITE)
1330 mark_page_accessed(page);
1331
54af6042 1332 delete_from_swap_cache(page);
27ab7006
HD
1333 set_page_dirty(page);
1334 swap_free(swap);
1335
54af6042
HD
1336 } else {
1337 if (shmem_acct_block(info->flags)) {
1338 error = -ENOSPC;
1339 goto failed;
1da177e4 1340 }
0edd73b3 1341 if (sbinfo->max_blocks) {
fc5da22a 1342 if (percpu_counter_compare(&sbinfo->used_blocks,
54af6042
HD
1343 sbinfo->max_blocks) >= 0) {
1344 error = -ENOSPC;
1345 goto unacct;
1346 }
7e496299 1347 percpu_counter_inc(&sbinfo->used_blocks);
54af6042 1348 }
1da177e4 1349
54af6042
HD
1350 page = shmem_alloc_page(gfp, info, index);
1351 if (!page) {
1352 error = -ENOMEM;
1353 goto decused;
1da177e4 1354 }
66d2f4d2 1355 if (sgp == SGP_WRITE)
eb39d618 1356 __SetPageReferenced(page);
66d2f4d2 1357
9e18eb29 1358 error = mem_cgroup_try_charge(page, charge_mm, gfp, &memcg,
f627c2f5 1359 false);
54af6042
HD
1360 if (error)
1361 goto decused;
5e4c0d97 1362 error = radix_tree_maybe_preload(gfp & GFP_RECLAIM_MASK);
b065b432
HD
1363 if (!error) {
1364 error = shmem_add_to_page_cache(page, mapping, index,
fed400a1 1365 NULL);
b065b432
HD
1366 radix_tree_preload_end();
1367 }
1368 if (error) {
f627c2f5 1369 mem_cgroup_cancel_charge(page, memcg, false);
b065b432
HD
1370 goto decused;
1371 }
f627c2f5 1372 mem_cgroup_commit_charge(page, memcg, false, false);
54af6042
HD
1373 lru_cache_add_anon(page);
1374
1375 spin_lock(&info->lock);
1da177e4 1376 info->alloced++;
54af6042
HD
1377 inode->i_blocks += BLOCKS_PER_PAGE;
1378 shmem_recalc_inode(inode);
1da177e4 1379 spin_unlock(&info->lock);
1635f6a7 1380 alloced = true;
54af6042 1381
ec9516fb 1382 /*
1635f6a7
HD
1383 * Let SGP_FALLOC use the SGP_WRITE optimization on a new page.
1384 */
1385 if (sgp == SGP_FALLOC)
1386 sgp = SGP_WRITE;
1387clear:
1388 /*
1389 * Let SGP_WRITE caller clear ends if write does not fill page;
1390 * but SGP_FALLOC on a page fallocated earlier must initialize
1391 * it now, lest undo on failure cancel our earlier guarantee.
ec9516fb
HD
1392 */
1393 if (sgp != SGP_WRITE) {
1394 clear_highpage(page);
1395 flush_dcache_page(page);
1396 SetPageUptodate(page);
1397 }
1da177e4 1398 }
bde05d1c 1399
54af6042 1400 /* Perhaps the file has been truncated since we checked */
75edd345 1401 if (sgp <= SGP_CACHE &&
09cbfeaf 1402 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
267a4c76
HD
1403 if (alloced) {
1404 ClearPageDirty(page);
1405 delete_from_page_cache(page);
1406 spin_lock(&info->lock);
1407 shmem_recalc_inode(inode);
1408 spin_unlock(&info->lock);
1409 }
54af6042 1410 error = -EINVAL;
267a4c76 1411 goto unlock;
e83c32e8 1412 }
54af6042
HD
1413 *pagep = page;
1414 return 0;
1da177e4 1415
59a16ead 1416 /*
54af6042 1417 * Error recovery.
59a16ead 1418 */
54af6042
HD
1419decused:
1420 if (sbinfo->max_blocks)
1421 percpu_counter_add(&sbinfo->used_blocks, -1);
1422unacct:
1423 shmem_unacct_blocks(info->flags, 1);
1424failed:
267a4c76 1425 if (swap.val && !shmem_confirm_swap(mapping, index, swap))
d1899228
HD
1426 error = -EEXIST;
1427unlock:
27ab7006 1428 if (page) {
54af6042 1429 unlock_page(page);
09cbfeaf 1430 put_page(page);
54af6042
HD
1431 }
1432 if (error == -ENOSPC && !once++) {
1433 info = SHMEM_I(inode);
1434 spin_lock(&info->lock);
1435 shmem_recalc_inode(inode);
1436 spin_unlock(&info->lock);
27ab7006 1437 goto repeat;
ff36b801 1438 }
d1899228 1439 if (error == -EEXIST) /* from above or from radix_tree_insert */
54af6042
HD
1440 goto repeat;
1441 return error;
1da177e4
LT
1442}
1443
d0217ac0 1444static int shmem_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
1da177e4 1445{
496ad9aa 1446 struct inode *inode = file_inode(vma->vm_file);
9e18eb29 1447 gfp_t gfp = mapping_gfp_mask(inode->i_mapping);
1da177e4 1448 int error;
68da9f05 1449 int ret = VM_FAULT_LOCKED;
1da177e4 1450
f00cdc6d
HD
1451 /*
1452 * Trinity finds that probing a hole which tmpfs is punching can
1453 * prevent the hole-punch from ever completing: which in turn
1454 * locks writers out with its hold on i_mutex. So refrain from
8e205f77
HD
1455 * faulting pages into the hole while it's being punched. Although
1456 * shmem_undo_range() does remove the additions, it may be unable to
1457 * keep up, as each new page needs its own unmap_mapping_range() call,
1458 * and the i_mmap tree grows ever slower to scan if new vmas are added.
1459 *
1460 * It does not matter if we sometimes reach this check just before the
1461 * hole-punch begins, so that one fault then races with the punch:
1462 * we just need to make racing faults a rare case.
1463 *
1464 * The implementation below would be much simpler if we just used a
1465 * standard mutex or completion: but we cannot take i_mutex in fault,
1466 * and bloating every shmem inode for this unlikely case would be sad.
f00cdc6d
HD
1467 */
1468 if (unlikely(inode->i_private)) {
1469 struct shmem_falloc *shmem_falloc;
1470
1471 spin_lock(&inode->i_lock);
1472 shmem_falloc = inode->i_private;
8e205f77
HD
1473 if (shmem_falloc &&
1474 shmem_falloc->waitq &&
1475 vmf->pgoff >= shmem_falloc->start &&
1476 vmf->pgoff < shmem_falloc->next) {
1477 wait_queue_head_t *shmem_falloc_waitq;
1478 DEFINE_WAIT(shmem_fault_wait);
1479
1480 ret = VM_FAULT_NOPAGE;
f00cdc6d
HD
1481 if ((vmf->flags & FAULT_FLAG_ALLOW_RETRY) &&
1482 !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
8e205f77 1483 /* It's polite to up mmap_sem if we can */
f00cdc6d 1484 up_read(&vma->vm_mm->mmap_sem);
8e205f77 1485 ret = VM_FAULT_RETRY;
f00cdc6d 1486 }
8e205f77
HD
1487
1488 shmem_falloc_waitq = shmem_falloc->waitq;
1489 prepare_to_wait(shmem_falloc_waitq, &shmem_fault_wait,
1490 TASK_UNINTERRUPTIBLE);
1491 spin_unlock(&inode->i_lock);
1492 schedule();
1493
1494 /*
1495 * shmem_falloc_waitq points into the shmem_fallocate()
1496 * stack of the hole-punching task: shmem_falloc_waitq
1497 * is usually invalid by the time we reach here, but
1498 * finish_wait() does not dereference it in that case;
1499 * though i_lock needed lest racing with wake_up_all().
1500 */
1501 spin_lock(&inode->i_lock);
1502 finish_wait(shmem_falloc_waitq, &shmem_fault_wait);
1503 spin_unlock(&inode->i_lock);
1504 return ret;
f00cdc6d 1505 }
8e205f77 1506 spin_unlock(&inode->i_lock);
f00cdc6d
HD
1507 }
1508
9e18eb29
ALC
1509 error = shmem_getpage_gfp(inode, vmf->pgoff, &vmf->page, SGP_CACHE,
1510 gfp, vma->vm_mm, &ret);
d0217ac0
NP
1511 if (error)
1512 return ((error == -ENOMEM) ? VM_FAULT_OOM : VM_FAULT_SIGBUS);
68da9f05 1513 return ret;
1da177e4
LT
1514}
1515
1da177e4 1516#ifdef CONFIG_NUMA
41ffe5d5 1517static int shmem_set_policy(struct vm_area_struct *vma, struct mempolicy *mpol)
1da177e4 1518{
496ad9aa 1519 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 1520 return mpol_set_shared_policy(&SHMEM_I(inode)->policy, vma, mpol);
1da177e4
LT
1521}
1522
d8dc74f2
AB
1523static struct mempolicy *shmem_get_policy(struct vm_area_struct *vma,
1524 unsigned long addr)
1da177e4 1525{
496ad9aa 1526 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 1527 pgoff_t index;
1da177e4 1528
41ffe5d5
HD
1529 index = ((addr - vma->vm_start) >> PAGE_SHIFT) + vma->vm_pgoff;
1530 return mpol_shared_policy_lookup(&SHMEM_I(inode)->policy, index);
1da177e4
LT
1531}
1532#endif
1533
1534int shmem_lock(struct file *file, int lock, struct user_struct *user)
1535{
496ad9aa 1536 struct inode *inode = file_inode(file);
1da177e4
LT
1537 struct shmem_inode_info *info = SHMEM_I(inode);
1538 int retval = -ENOMEM;
1539
1540 spin_lock(&info->lock);
1541 if (lock && !(info->flags & VM_LOCKED)) {
1542 if (!user_shm_lock(inode->i_size, user))
1543 goto out_nomem;
1544 info->flags |= VM_LOCKED;
89e004ea 1545 mapping_set_unevictable(file->f_mapping);
1da177e4
LT
1546 }
1547 if (!lock && (info->flags & VM_LOCKED) && user) {
1548 user_shm_unlock(inode->i_size, user);
1549 info->flags &= ~VM_LOCKED;
89e004ea 1550 mapping_clear_unevictable(file->f_mapping);
1da177e4
LT
1551 }
1552 retval = 0;
89e004ea 1553
1da177e4
LT
1554out_nomem:
1555 spin_unlock(&info->lock);
1556 return retval;
1557}
1558
9b83a6a8 1559static int shmem_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
1560{
1561 file_accessed(file);
1562 vma->vm_ops = &shmem_vm_ops;
1563 return 0;
1564}
1565
454abafe 1566static struct inode *shmem_get_inode(struct super_block *sb, const struct inode *dir,
09208d15 1567 umode_t mode, dev_t dev, unsigned long flags)
1da177e4
LT
1568{
1569 struct inode *inode;
1570 struct shmem_inode_info *info;
1571 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
1572
5b04c689
PE
1573 if (shmem_reserve_inode(sb))
1574 return NULL;
1da177e4
LT
1575
1576 inode = new_inode(sb);
1577 if (inode) {
85fe4025 1578 inode->i_ino = get_next_ino();
454abafe 1579 inode_init_owner(inode, dir, mode);
1da177e4 1580 inode->i_blocks = 0;
1da177e4 1581 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
91828a40 1582 inode->i_generation = get_seconds();
1da177e4
LT
1583 info = SHMEM_I(inode);
1584 memset(info, 0, (char *)inode - (char *)info);
1585 spin_lock_init(&info->lock);
40e041a2 1586 info->seals = F_SEAL_SEAL;
0b0a0806 1587 info->flags = flags & VM_NORESERVE;
1da177e4 1588 INIT_LIST_HEAD(&info->swaplist);
38f38657 1589 simple_xattrs_init(&info->xattrs);
72c04902 1590 cache_no_acl(inode);
1da177e4
LT
1591
1592 switch (mode & S_IFMT) {
1593 default:
39f0247d 1594 inode->i_op = &shmem_special_inode_operations;
1da177e4
LT
1595 init_special_inode(inode, mode, dev);
1596 break;
1597 case S_IFREG:
14fcc23f 1598 inode->i_mapping->a_ops = &shmem_aops;
1da177e4
LT
1599 inode->i_op = &shmem_inode_operations;
1600 inode->i_fop = &shmem_file_operations;
71fe804b
LS
1601 mpol_shared_policy_init(&info->policy,
1602 shmem_get_sbmpol(sbinfo));
1da177e4
LT
1603 break;
1604 case S_IFDIR:
d8c76e6f 1605 inc_nlink(inode);
1da177e4
LT
1606 /* Some things misbehave if size == 0 on a directory */
1607 inode->i_size = 2 * BOGO_DIRENT_SIZE;
1608 inode->i_op = &shmem_dir_inode_operations;
1609 inode->i_fop = &simple_dir_operations;
1610 break;
1611 case S_IFLNK:
1612 /*
1613 * Must not load anything in the rbtree,
1614 * mpol_free_shared_policy will not be called.
1615 */
71fe804b 1616 mpol_shared_policy_init(&info->policy, NULL);
1da177e4
LT
1617 break;
1618 }
5b04c689
PE
1619 } else
1620 shmem_free_inode(sb);
1da177e4
LT
1621 return inode;
1622}
1623
0cd6144a
JW
1624bool shmem_mapping(struct address_space *mapping)
1625{
f0774d88
SL
1626 if (!mapping->host)
1627 return false;
1628
97b713ba 1629 return mapping->host->i_sb->s_op == &shmem_ops;
0cd6144a
JW
1630}
1631
1da177e4 1632#ifdef CONFIG_TMPFS
92e1d5be 1633static const struct inode_operations shmem_symlink_inode_operations;
69f07ec9 1634static const struct inode_operations shmem_short_symlink_operations;
1da177e4 1635
6d9d88d0
JS
1636#ifdef CONFIG_TMPFS_XATTR
1637static int shmem_initxattrs(struct inode *, const struct xattr *, void *);
1638#else
1639#define shmem_initxattrs NULL
1640#endif
1641
1da177e4 1642static int
800d15a5
NP
1643shmem_write_begin(struct file *file, struct address_space *mapping,
1644 loff_t pos, unsigned len, unsigned flags,
1645 struct page **pagep, void **fsdata)
1da177e4 1646{
800d15a5 1647 struct inode *inode = mapping->host;
40e041a2 1648 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf 1649 pgoff_t index = pos >> PAGE_SHIFT;
40e041a2
DH
1650
1651 /* i_mutex is held by caller */
1652 if (unlikely(info->seals)) {
1653 if (info->seals & F_SEAL_WRITE)
1654 return -EPERM;
1655 if ((info->seals & F_SEAL_GROW) && pos + len > inode->i_size)
1656 return -EPERM;
1657 }
1658
9e18eb29 1659 return shmem_getpage(inode, index, pagep, SGP_WRITE);
800d15a5
NP
1660}
1661
1662static int
1663shmem_write_end(struct file *file, struct address_space *mapping,
1664 loff_t pos, unsigned len, unsigned copied,
1665 struct page *page, void *fsdata)
1666{
1667 struct inode *inode = mapping->host;
1668
d3602444
HD
1669 if (pos + copied > inode->i_size)
1670 i_size_write(inode, pos + copied);
1671
ec9516fb 1672 if (!PageUptodate(page)) {
09cbfeaf
KS
1673 if (copied < PAGE_SIZE) {
1674 unsigned from = pos & (PAGE_SIZE - 1);
ec9516fb 1675 zero_user_segments(page, 0, from,
09cbfeaf 1676 from + copied, PAGE_SIZE);
ec9516fb
HD
1677 }
1678 SetPageUptodate(page);
1679 }
800d15a5 1680 set_page_dirty(page);
6746aff7 1681 unlock_page(page);
09cbfeaf 1682 put_page(page);
800d15a5 1683
800d15a5 1684 return copied;
1da177e4
LT
1685}
1686
2ba5bbed 1687static ssize_t shmem_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1da177e4 1688{
6e58e79d
AV
1689 struct file *file = iocb->ki_filp;
1690 struct inode *inode = file_inode(file);
1da177e4 1691 struct address_space *mapping = inode->i_mapping;
41ffe5d5
HD
1692 pgoff_t index;
1693 unsigned long offset;
a0ee5ec5 1694 enum sgp_type sgp = SGP_READ;
f7c1d074 1695 int error = 0;
cb66a7a1 1696 ssize_t retval = 0;
6e58e79d 1697 loff_t *ppos = &iocb->ki_pos;
a0ee5ec5
HD
1698
1699 /*
1700 * Might this read be for a stacking filesystem? Then when reading
1701 * holes of a sparse file, we actually need to allocate those pages,
1702 * and even mark them dirty, so it cannot exceed the max_blocks limit.
1703 */
777eda2c 1704 if (!iter_is_iovec(to))
75edd345 1705 sgp = SGP_CACHE;
1da177e4 1706
09cbfeaf
KS
1707 index = *ppos >> PAGE_SHIFT;
1708 offset = *ppos & ~PAGE_MASK;
1da177e4
LT
1709
1710 for (;;) {
1711 struct page *page = NULL;
41ffe5d5
HD
1712 pgoff_t end_index;
1713 unsigned long nr, ret;
1da177e4
LT
1714 loff_t i_size = i_size_read(inode);
1715
09cbfeaf 1716 end_index = i_size >> PAGE_SHIFT;
1da177e4
LT
1717 if (index > end_index)
1718 break;
1719 if (index == end_index) {
09cbfeaf 1720 nr = i_size & ~PAGE_MASK;
1da177e4
LT
1721 if (nr <= offset)
1722 break;
1723 }
1724
9e18eb29 1725 error = shmem_getpage(inode, index, &page, sgp);
6e58e79d
AV
1726 if (error) {
1727 if (error == -EINVAL)
1728 error = 0;
1da177e4
LT
1729 break;
1730 }
75edd345
HD
1731 if (page) {
1732 if (sgp == SGP_CACHE)
1733 set_page_dirty(page);
d3602444 1734 unlock_page(page);
75edd345 1735 }
1da177e4
LT
1736
1737 /*
1738 * We must evaluate after, since reads (unlike writes)
1b1dcc1b 1739 * are called without i_mutex protection against truncate
1da177e4 1740 */
09cbfeaf 1741 nr = PAGE_SIZE;
1da177e4 1742 i_size = i_size_read(inode);
09cbfeaf 1743 end_index = i_size >> PAGE_SHIFT;
1da177e4 1744 if (index == end_index) {
09cbfeaf 1745 nr = i_size & ~PAGE_MASK;
1da177e4
LT
1746 if (nr <= offset) {
1747 if (page)
09cbfeaf 1748 put_page(page);
1da177e4
LT
1749 break;
1750 }
1751 }
1752 nr -= offset;
1753
1754 if (page) {
1755 /*
1756 * If users can be writing to this page using arbitrary
1757 * virtual addresses, take care about potential aliasing
1758 * before reading the page on the kernel side.
1759 */
1760 if (mapping_writably_mapped(mapping))
1761 flush_dcache_page(page);
1762 /*
1763 * Mark the page accessed if we read the beginning.
1764 */
1765 if (!offset)
1766 mark_page_accessed(page);
b5810039 1767 } else {
1da177e4 1768 page = ZERO_PAGE(0);
09cbfeaf 1769 get_page(page);
b5810039 1770 }
1da177e4
LT
1771
1772 /*
1773 * Ok, we have the page, and it's up-to-date, so
1774 * now we can copy it to user space...
1da177e4 1775 */
2ba5bbed 1776 ret = copy_page_to_iter(page, offset, nr, to);
6e58e79d 1777 retval += ret;
1da177e4 1778 offset += ret;
09cbfeaf
KS
1779 index += offset >> PAGE_SHIFT;
1780 offset &= ~PAGE_MASK;
1da177e4 1781
09cbfeaf 1782 put_page(page);
2ba5bbed 1783 if (!iov_iter_count(to))
1da177e4 1784 break;
6e58e79d
AV
1785 if (ret < nr) {
1786 error = -EFAULT;
1787 break;
1788 }
1da177e4
LT
1789 cond_resched();
1790 }
1791
09cbfeaf 1792 *ppos = ((loff_t) index << PAGE_SHIFT) + offset;
6e58e79d
AV
1793 file_accessed(file);
1794 return retval ? retval : error;
1da177e4
LT
1795}
1796
708e3508
HD
1797static ssize_t shmem_file_splice_read(struct file *in, loff_t *ppos,
1798 struct pipe_inode_info *pipe, size_t len,
1799 unsigned int flags)
1800{
1801 struct address_space *mapping = in->f_mapping;
71f0e07a 1802 struct inode *inode = mapping->host;
708e3508
HD
1803 unsigned int loff, nr_pages, req_pages;
1804 struct page *pages[PIPE_DEF_BUFFERS];
1805 struct partial_page partial[PIPE_DEF_BUFFERS];
1806 struct page *page;
1807 pgoff_t index, end_index;
1808 loff_t isize, left;
1809 int error, page_nr;
1810 struct splice_pipe_desc spd = {
1811 .pages = pages,
1812 .partial = partial,
047fe360 1813 .nr_pages_max = PIPE_DEF_BUFFERS,
708e3508
HD
1814 .flags = flags,
1815 .ops = &page_cache_pipe_buf_ops,
1816 .spd_release = spd_release_page,
1817 };
1818
71f0e07a 1819 isize = i_size_read(inode);
708e3508
HD
1820 if (unlikely(*ppos >= isize))
1821 return 0;
1822
1823 left = isize - *ppos;
1824 if (unlikely(left < len))
1825 len = left;
1826
1827 if (splice_grow_spd(pipe, &spd))
1828 return -ENOMEM;
1829
09cbfeaf
KS
1830 index = *ppos >> PAGE_SHIFT;
1831 loff = *ppos & ~PAGE_MASK;
1832 req_pages = (len + loff + PAGE_SIZE - 1) >> PAGE_SHIFT;
a786c06d 1833 nr_pages = min(req_pages, spd.nr_pages_max);
708e3508 1834
708e3508
HD
1835 spd.nr_pages = find_get_pages_contig(mapping, index,
1836 nr_pages, spd.pages);
1837 index += spd.nr_pages;
708e3508 1838 error = 0;
708e3508 1839
71f0e07a 1840 while (spd.nr_pages < nr_pages) {
9e18eb29 1841 error = shmem_getpage(inode, index, &page, SGP_CACHE);
71f0e07a
HD
1842 if (error)
1843 break;
1844 unlock_page(page);
708e3508
HD
1845 spd.pages[spd.nr_pages++] = page;
1846 index++;
1847 }
1848
09cbfeaf 1849 index = *ppos >> PAGE_SHIFT;
708e3508
HD
1850 nr_pages = spd.nr_pages;
1851 spd.nr_pages = 0;
71f0e07a 1852
708e3508
HD
1853 for (page_nr = 0; page_nr < nr_pages; page_nr++) {
1854 unsigned int this_len;
1855
1856 if (!len)
1857 break;
1858
09cbfeaf 1859 this_len = min_t(unsigned long, len, PAGE_SIZE - loff);
708e3508
HD
1860 page = spd.pages[page_nr];
1861
71f0e07a 1862 if (!PageUptodate(page) || page->mapping != mapping) {
9e18eb29 1863 error = shmem_getpage(inode, index, &page, SGP_CACHE);
71f0e07a 1864 if (error)
708e3508 1865 break;
71f0e07a 1866 unlock_page(page);
09cbfeaf 1867 put_page(spd.pages[page_nr]);
71f0e07a 1868 spd.pages[page_nr] = page;
708e3508 1869 }
71f0e07a
HD
1870
1871 isize = i_size_read(inode);
09cbfeaf 1872 end_index = (isize - 1) >> PAGE_SHIFT;
708e3508
HD
1873 if (unlikely(!isize || index > end_index))
1874 break;
1875
708e3508
HD
1876 if (end_index == index) {
1877 unsigned int plen;
1878
09cbfeaf 1879 plen = ((isize - 1) & ~PAGE_MASK) + 1;
708e3508
HD
1880 if (plen <= loff)
1881 break;
1882
708e3508
HD
1883 this_len = min(this_len, plen - loff);
1884 len = this_len;
1885 }
1886
1887 spd.partial[page_nr].offset = loff;
1888 spd.partial[page_nr].len = this_len;
1889 len -= this_len;
1890 loff = 0;
1891 spd.nr_pages++;
1892 index++;
1893 }
1894
708e3508 1895 while (page_nr < nr_pages)
09cbfeaf 1896 put_page(spd.pages[page_nr++]);
708e3508
HD
1897
1898 if (spd.nr_pages)
1899 error = splice_to_pipe(pipe, &spd);
1900
047fe360 1901 splice_shrink_spd(&spd);
708e3508
HD
1902
1903 if (error > 0) {
1904 *ppos += error;
1905 file_accessed(in);
1906 }
1907 return error;
1908}
1909
220f2ac9
HD
1910/*
1911 * llseek SEEK_DATA or SEEK_HOLE through the radix_tree.
1912 */
1913static pgoff_t shmem_seek_hole_data(struct address_space *mapping,
965c8e59 1914 pgoff_t index, pgoff_t end, int whence)
220f2ac9
HD
1915{
1916 struct page *page;
1917 struct pagevec pvec;
1918 pgoff_t indices[PAGEVEC_SIZE];
1919 bool done = false;
1920 int i;
1921
1922 pagevec_init(&pvec, 0);
1923 pvec.nr = 1; /* start small: we may be there already */
1924 while (!done) {
0cd6144a 1925 pvec.nr = find_get_entries(mapping, index,
220f2ac9
HD
1926 pvec.nr, pvec.pages, indices);
1927 if (!pvec.nr) {
965c8e59 1928 if (whence == SEEK_DATA)
220f2ac9
HD
1929 index = end;
1930 break;
1931 }
1932 for (i = 0; i < pvec.nr; i++, index++) {
1933 if (index < indices[i]) {
965c8e59 1934 if (whence == SEEK_HOLE) {
220f2ac9
HD
1935 done = true;
1936 break;
1937 }
1938 index = indices[i];
1939 }
1940 page = pvec.pages[i];
1941 if (page && !radix_tree_exceptional_entry(page)) {
1942 if (!PageUptodate(page))
1943 page = NULL;
1944 }
1945 if (index >= end ||
965c8e59
AM
1946 (page && whence == SEEK_DATA) ||
1947 (!page && whence == SEEK_HOLE)) {
220f2ac9
HD
1948 done = true;
1949 break;
1950 }
1951 }
0cd6144a 1952 pagevec_remove_exceptionals(&pvec);
220f2ac9
HD
1953 pagevec_release(&pvec);
1954 pvec.nr = PAGEVEC_SIZE;
1955 cond_resched();
1956 }
1957 return index;
1958}
1959
965c8e59 1960static loff_t shmem_file_llseek(struct file *file, loff_t offset, int whence)
220f2ac9
HD
1961{
1962 struct address_space *mapping = file->f_mapping;
1963 struct inode *inode = mapping->host;
1964 pgoff_t start, end;
1965 loff_t new_offset;
1966
965c8e59
AM
1967 if (whence != SEEK_DATA && whence != SEEK_HOLE)
1968 return generic_file_llseek_size(file, offset, whence,
220f2ac9 1969 MAX_LFS_FILESIZE, i_size_read(inode));
5955102c 1970 inode_lock(inode);
220f2ac9
HD
1971 /* We're holding i_mutex so we can access i_size directly */
1972
1973 if (offset < 0)
1974 offset = -EINVAL;
1975 else if (offset >= inode->i_size)
1976 offset = -ENXIO;
1977 else {
09cbfeaf
KS
1978 start = offset >> PAGE_SHIFT;
1979 end = (inode->i_size + PAGE_SIZE - 1) >> PAGE_SHIFT;
965c8e59 1980 new_offset = shmem_seek_hole_data(mapping, start, end, whence);
09cbfeaf 1981 new_offset <<= PAGE_SHIFT;
220f2ac9
HD
1982 if (new_offset > offset) {
1983 if (new_offset < inode->i_size)
1984 offset = new_offset;
965c8e59 1985 else if (whence == SEEK_DATA)
220f2ac9
HD
1986 offset = -ENXIO;
1987 else
1988 offset = inode->i_size;
1989 }
1990 }
1991
387aae6f
HD
1992 if (offset >= 0)
1993 offset = vfs_setpos(file, offset, MAX_LFS_FILESIZE);
5955102c 1994 inode_unlock(inode);
220f2ac9
HD
1995 return offset;
1996}
1997
05f65b5c
DH
1998/*
1999 * We need a tag: a new tag would expand every radix_tree_node by 8 bytes,
2000 * so reuse a tag which we firmly believe is never set or cleared on shmem.
2001 */
2002#define SHMEM_TAG_PINNED PAGECACHE_TAG_TOWRITE
2003#define LAST_SCAN 4 /* about 150ms max */
2004
2005static void shmem_tag_pins(struct address_space *mapping)
2006{
2007 struct radix_tree_iter iter;
2008 void **slot;
2009 pgoff_t start;
2010 struct page *page;
2011
2012 lru_add_drain();
2013 start = 0;
2014 rcu_read_lock();
2015
05f65b5c
DH
2016 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
2017 page = radix_tree_deref_slot(slot);
2018 if (!page || radix_tree_exception(page)) {
2cf938aa
MW
2019 if (radix_tree_deref_retry(page)) {
2020 slot = radix_tree_iter_retry(&iter);
2021 continue;
2022 }
05f65b5c
DH
2023 } else if (page_count(page) - page_mapcount(page) > 1) {
2024 spin_lock_irq(&mapping->tree_lock);
2025 radix_tree_tag_set(&mapping->page_tree, iter.index,
2026 SHMEM_TAG_PINNED);
2027 spin_unlock_irq(&mapping->tree_lock);
2028 }
2029
2030 if (need_resched()) {
2031 cond_resched_rcu();
7165092f 2032 slot = radix_tree_iter_next(&iter);
05f65b5c
DH
2033 }
2034 }
2035 rcu_read_unlock();
2036}
2037
2038/*
2039 * Setting SEAL_WRITE requires us to verify there's no pending writer. However,
2040 * via get_user_pages(), drivers might have some pending I/O without any active
2041 * user-space mappings (eg., direct-IO, AIO). Therefore, we look at all pages
2042 * and see whether it has an elevated ref-count. If so, we tag them and wait for
2043 * them to be dropped.
2044 * The caller must guarantee that no new user will acquire writable references
2045 * to those pages to avoid races.
2046 */
40e041a2
DH
2047static int shmem_wait_for_pins(struct address_space *mapping)
2048{
05f65b5c
DH
2049 struct radix_tree_iter iter;
2050 void **slot;
2051 pgoff_t start;
2052 struct page *page;
2053 int error, scan;
2054
2055 shmem_tag_pins(mapping);
2056
2057 error = 0;
2058 for (scan = 0; scan <= LAST_SCAN; scan++) {
2059 if (!radix_tree_tagged(&mapping->page_tree, SHMEM_TAG_PINNED))
2060 break;
2061
2062 if (!scan)
2063 lru_add_drain_all();
2064 else if (schedule_timeout_killable((HZ << scan) / 200))
2065 scan = LAST_SCAN;
2066
2067 start = 0;
2068 rcu_read_lock();
05f65b5c
DH
2069 radix_tree_for_each_tagged(slot, &mapping->page_tree, &iter,
2070 start, SHMEM_TAG_PINNED) {
2071
2072 page = radix_tree_deref_slot(slot);
2073 if (radix_tree_exception(page)) {
2cf938aa
MW
2074 if (radix_tree_deref_retry(page)) {
2075 slot = radix_tree_iter_retry(&iter);
2076 continue;
2077 }
05f65b5c
DH
2078
2079 page = NULL;
2080 }
2081
2082 if (page &&
2083 page_count(page) - page_mapcount(page) != 1) {
2084 if (scan < LAST_SCAN)
2085 goto continue_resched;
2086
2087 /*
2088 * On the last scan, we clean up all those tags
2089 * we inserted; but make a note that we still
2090 * found pages pinned.
2091 */
2092 error = -EBUSY;
2093 }
2094
2095 spin_lock_irq(&mapping->tree_lock);
2096 radix_tree_tag_clear(&mapping->page_tree,
2097 iter.index, SHMEM_TAG_PINNED);
2098 spin_unlock_irq(&mapping->tree_lock);
2099continue_resched:
2100 if (need_resched()) {
2101 cond_resched_rcu();
7165092f 2102 slot = radix_tree_iter_next(&iter);
05f65b5c
DH
2103 }
2104 }
2105 rcu_read_unlock();
2106 }
2107
2108 return error;
40e041a2
DH
2109}
2110
2111#define F_ALL_SEALS (F_SEAL_SEAL | \
2112 F_SEAL_SHRINK | \
2113 F_SEAL_GROW | \
2114 F_SEAL_WRITE)
2115
2116int shmem_add_seals(struct file *file, unsigned int seals)
2117{
2118 struct inode *inode = file_inode(file);
2119 struct shmem_inode_info *info = SHMEM_I(inode);
2120 int error;
2121
2122 /*
2123 * SEALING
2124 * Sealing allows multiple parties to share a shmem-file but restrict
2125 * access to a specific subset of file operations. Seals can only be
2126 * added, but never removed. This way, mutually untrusted parties can
2127 * share common memory regions with a well-defined policy. A malicious
2128 * peer can thus never perform unwanted operations on a shared object.
2129 *
2130 * Seals are only supported on special shmem-files and always affect
2131 * the whole underlying inode. Once a seal is set, it may prevent some
2132 * kinds of access to the file. Currently, the following seals are
2133 * defined:
2134 * SEAL_SEAL: Prevent further seals from being set on this file
2135 * SEAL_SHRINK: Prevent the file from shrinking
2136 * SEAL_GROW: Prevent the file from growing
2137 * SEAL_WRITE: Prevent write access to the file
2138 *
2139 * As we don't require any trust relationship between two parties, we
2140 * must prevent seals from being removed. Therefore, sealing a file
2141 * only adds a given set of seals to the file, it never touches
2142 * existing seals. Furthermore, the "setting seals"-operation can be
2143 * sealed itself, which basically prevents any further seal from being
2144 * added.
2145 *
2146 * Semantics of sealing are only defined on volatile files. Only
2147 * anonymous shmem files support sealing. More importantly, seals are
2148 * never written to disk. Therefore, there's no plan to support it on
2149 * other file types.
2150 */
2151
2152 if (file->f_op != &shmem_file_operations)
2153 return -EINVAL;
2154 if (!(file->f_mode & FMODE_WRITE))
2155 return -EPERM;
2156 if (seals & ~(unsigned int)F_ALL_SEALS)
2157 return -EINVAL;
2158
5955102c 2159 inode_lock(inode);
40e041a2
DH
2160
2161 if (info->seals & F_SEAL_SEAL) {
2162 error = -EPERM;
2163 goto unlock;
2164 }
2165
2166 if ((seals & F_SEAL_WRITE) && !(info->seals & F_SEAL_WRITE)) {
2167 error = mapping_deny_writable(file->f_mapping);
2168 if (error)
2169 goto unlock;
2170
2171 error = shmem_wait_for_pins(file->f_mapping);
2172 if (error) {
2173 mapping_allow_writable(file->f_mapping);
2174 goto unlock;
2175 }
2176 }
2177
2178 info->seals |= seals;
2179 error = 0;
2180
2181unlock:
5955102c 2182 inode_unlock(inode);
40e041a2
DH
2183 return error;
2184}
2185EXPORT_SYMBOL_GPL(shmem_add_seals);
2186
2187int shmem_get_seals(struct file *file)
2188{
2189 if (file->f_op != &shmem_file_operations)
2190 return -EINVAL;
2191
2192 return SHMEM_I(file_inode(file))->seals;
2193}
2194EXPORT_SYMBOL_GPL(shmem_get_seals);
2195
2196long shmem_fcntl(struct file *file, unsigned int cmd, unsigned long arg)
2197{
2198 long error;
2199
2200 switch (cmd) {
2201 case F_ADD_SEALS:
2202 /* disallow upper 32bit */
2203 if (arg > UINT_MAX)
2204 return -EINVAL;
2205
2206 error = shmem_add_seals(file, arg);
2207 break;
2208 case F_GET_SEALS:
2209 error = shmem_get_seals(file);
2210 break;
2211 default:
2212 error = -EINVAL;
2213 break;
2214 }
2215
2216 return error;
2217}
2218
83e4fa9c
HD
2219static long shmem_fallocate(struct file *file, int mode, loff_t offset,
2220 loff_t len)
2221{
496ad9aa 2222 struct inode *inode = file_inode(file);
e2d12e22 2223 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
40e041a2 2224 struct shmem_inode_info *info = SHMEM_I(inode);
1aac1400 2225 struct shmem_falloc shmem_falloc;
e2d12e22
HD
2226 pgoff_t start, index, end;
2227 int error;
83e4fa9c 2228
13ace4d0
HD
2229 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
2230 return -EOPNOTSUPP;
2231
5955102c 2232 inode_lock(inode);
83e4fa9c
HD
2233
2234 if (mode & FALLOC_FL_PUNCH_HOLE) {
2235 struct address_space *mapping = file->f_mapping;
2236 loff_t unmap_start = round_up(offset, PAGE_SIZE);
2237 loff_t unmap_end = round_down(offset + len, PAGE_SIZE) - 1;
8e205f77 2238 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(shmem_falloc_waitq);
83e4fa9c 2239
40e041a2
DH
2240 /* protected by i_mutex */
2241 if (info->seals & F_SEAL_WRITE) {
2242 error = -EPERM;
2243 goto out;
2244 }
2245
8e205f77 2246 shmem_falloc.waitq = &shmem_falloc_waitq;
f00cdc6d
HD
2247 shmem_falloc.start = unmap_start >> PAGE_SHIFT;
2248 shmem_falloc.next = (unmap_end + 1) >> PAGE_SHIFT;
2249 spin_lock(&inode->i_lock);
2250 inode->i_private = &shmem_falloc;
2251 spin_unlock(&inode->i_lock);
2252
83e4fa9c
HD
2253 if ((u64)unmap_end > (u64)unmap_start)
2254 unmap_mapping_range(mapping, unmap_start,
2255 1 + unmap_end - unmap_start, 0);
2256 shmem_truncate_range(inode, offset, offset + len - 1);
2257 /* No need to unmap again: hole-punching leaves COWed pages */
8e205f77
HD
2258
2259 spin_lock(&inode->i_lock);
2260 inode->i_private = NULL;
2261 wake_up_all(&shmem_falloc_waitq);
2262 spin_unlock(&inode->i_lock);
83e4fa9c 2263 error = 0;
8e205f77 2264 goto out;
e2d12e22
HD
2265 }
2266
2267 /* We need to check rlimit even when FALLOC_FL_KEEP_SIZE */
2268 error = inode_newsize_ok(inode, offset + len);
2269 if (error)
2270 goto out;
2271
40e041a2
DH
2272 if ((info->seals & F_SEAL_GROW) && offset + len > inode->i_size) {
2273 error = -EPERM;
2274 goto out;
2275 }
2276
09cbfeaf
KS
2277 start = offset >> PAGE_SHIFT;
2278 end = (offset + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
e2d12e22
HD
2279 /* Try to avoid a swapstorm if len is impossible to satisfy */
2280 if (sbinfo->max_blocks && end - start > sbinfo->max_blocks) {
2281 error = -ENOSPC;
2282 goto out;
83e4fa9c
HD
2283 }
2284
8e205f77 2285 shmem_falloc.waitq = NULL;
1aac1400
HD
2286 shmem_falloc.start = start;
2287 shmem_falloc.next = start;
2288 shmem_falloc.nr_falloced = 0;
2289 shmem_falloc.nr_unswapped = 0;
2290 spin_lock(&inode->i_lock);
2291 inode->i_private = &shmem_falloc;
2292 spin_unlock(&inode->i_lock);
2293
e2d12e22
HD
2294 for (index = start; index < end; index++) {
2295 struct page *page;
2296
2297 /*
2298 * Good, the fallocate(2) manpage permits EINTR: we may have
2299 * been interrupted because we are using up too much memory.
2300 */
2301 if (signal_pending(current))
2302 error = -EINTR;
1aac1400
HD
2303 else if (shmem_falloc.nr_unswapped > shmem_falloc.nr_falloced)
2304 error = -ENOMEM;
e2d12e22 2305 else
9e18eb29 2306 error = shmem_getpage(inode, index, &page, SGP_FALLOC);
e2d12e22 2307 if (error) {
1635f6a7 2308 /* Remove the !PageUptodate pages we added */
7f556567
HD
2309 if (index > start) {
2310 shmem_undo_range(inode,
2311 (loff_t)start << PAGE_SHIFT,
2312 ((loff_t)index << PAGE_SHIFT) - 1, true);
2313 }
1aac1400 2314 goto undone;
e2d12e22
HD
2315 }
2316
1aac1400
HD
2317 /*
2318 * Inform shmem_writepage() how far we have reached.
2319 * No need for lock or barrier: we have the page lock.
2320 */
2321 shmem_falloc.next++;
2322 if (!PageUptodate(page))
2323 shmem_falloc.nr_falloced++;
2324
e2d12e22 2325 /*
1635f6a7
HD
2326 * If !PageUptodate, leave it that way so that freeable pages
2327 * can be recognized if we need to rollback on error later.
2328 * But set_page_dirty so that memory pressure will swap rather
e2d12e22
HD
2329 * than free the pages we are allocating (and SGP_CACHE pages
2330 * might still be clean: we now need to mark those dirty too).
2331 */
2332 set_page_dirty(page);
2333 unlock_page(page);
09cbfeaf 2334 put_page(page);
e2d12e22
HD
2335 cond_resched();
2336 }
2337
2338 if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + len > inode->i_size)
2339 i_size_write(inode, offset + len);
e2d12e22 2340 inode->i_ctime = CURRENT_TIME;
1aac1400
HD
2341undone:
2342 spin_lock(&inode->i_lock);
2343 inode->i_private = NULL;
2344 spin_unlock(&inode->i_lock);
e2d12e22 2345out:
5955102c 2346 inode_unlock(inode);
83e4fa9c
HD
2347 return error;
2348}
2349
726c3342 2350static int shmem_statfs(struct dentry *dentry, struct kstatfs *buf)
1da177e4 2351{
726c3342 2352 struct shmem_sb_info *sbinfo = SHMEM_SB(dentry->d_sb);
1da177e4
LT
2353
2354 buf->f_type = TMPFS_MAGIC;
09cbfeaf 2355 buf->f_bsize = PAGE_SIZE;
1da177e4 2356 buf->f_namelen = NAME_MAX;
0edd73b3 2357 if (sbinfo->max_blocks) {
1da177e4 2358 buf->f_blocks = sbinfo->max_blocks;
41ffe5d5
HD
2359 buf->f_bavail =
2360 buf->f_bfree = sbinfo->max_blocks -
2361 percpu_counter_sum(&sbinfo->used_blocks);
0edd73b3
HD
2362 }
2363 if (sbinfo->max_inodes) {
1da177e4
LT
2364 buf->f_files = sbinfo->max_inodes;
2365 buf->f_ffree = sbinfo->free_inodes;
1da177e4
LT
2366 }
2367 /* else leave those fields 0 like simple_statfs */
2368 return 0;
2369}
2370
2371/*
2372 * File creation. Allocate an inode, and we're done..
2373 */
2374static int
1a67aafb 2375shmem_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev)
1da177e4 2376{
0b0a0806 2377 struct inode *inode;
1da177e4
LT
2378 int error = -ENOSPC;
2379
454abafe 2380 inode = shmem_get_inode(dir->i_sb, dir, mode, dev, VM_NORESERVE);
1da177e4 2381 if (inode) {
feda821e
CH
2382 error = simple_acl_create(dir, inode);
2383 if (error)
2384 goto out_iput;
2a7dba39 2385 error = security_inode_init_security(inode, dir,
9d8f13ba 2386 &dentry->d_name,
6d9d88d0 2387 shmem_initxattrs, NULL);
feda821e
CH
2388 if (error && error != -EOPNOTSUPP)
2389 goto out_iput;
37ec43cd 2390
718deb6b 2391 error = 0;
1da177e4
LT
2392 dir->i_size += BOGO_DIRENT_SIZE;
2393 dir->i_ctime = dir->i_mtime = CURRENT_TIME;
2394 d_instantiate(dentry, inode);
2395 dget(dentry); /* Extra count - pin the dentry in core */
1da177e4
LT
2396 }
2397 return error;
feda821e
CH
2398out_iput:
2399 iput(inode);
2400 return error;
1da177e4
LT
2401}
2402
60545d0d
AV
2403static int
2404shmem_tmpfile(struct inode *dir, struct dentry *dentry, umode_t mode)
2405{
2406 struct inode *inode;
2407 int error = -ENOSPC;
2408
2409 inode = shmem_get_inode(dir->i_sb, dir, mode, 0, VM_NORESERVE);
2410 if (inode) {
2411 error = security_inode_init_security(inode, dir,
2412 NULL,
2413 shmem_initxattrs, NULL);
feda821e
CH
2414 if (error && error != -EOPNOTSUPP)
2415 goto out_iput;
2416 error = simple_acl_create(dir, inode);
2417 if (error)
2418 goto out_iput;
60545d0d
AV
2419 d_tmpfile(dentry, inode);
2420 }
2421 return error;
feda821e
CH
2422out_iput:
2423 iput(inode);
2424 return error;
60545d0d
AV
2425}
2426
18bb1db3 2427static int shmem_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
1da177e4
LT
2428{
2429 int error;
2430
2431 if ((error = shmem_mknod(dir, dentry, mode | S_IFDIR, 0)))
2432 return error;
d8c76e6f 2433 inc_nlink(dir);
1da177e4
LT
2434 return 0;
2435}
2436
4acdaf27 2437static int shmem_create(struct inode *dir, struct dentry *dentry, umode_t mode,
ebfc3b49 2438 bool excl)
1da177e4
LT
2439{
2440 return shmem_mknod(dir, dentry, mode | S_IFREG, 0);
2441}
2442
2443/*
2444 * Link a file..
2445 */
2446static int shmem_link(struct dentry *old_dentry, struct inode *dir, struct dentry *dentry)
2447{
75c3cfa8 2448 struct inode *inode = d_inode(old_dentry);
5b04c689 2449 int ret;
1da177e4
LT
2450
2451 /*
2452 * No ordinary (disk based) filesystem counts links as inodes;
2453 * but each new link needs a new dentry, pinning lowmem, and
2454 * tmpfs dentries cannot be pruned until they are unlinked.
2455 */
5b04c689
PE
2456 ret = shmem_reserve_inode(inode->i_sb);
2457 if (ret)
2458 goto out;
1da177e4
LT
2459
2460 dir->i_size += BOGO_DIRENT_SIZE;
2461 inode->i_ctime = dir->i_ctime = dir->i_mtime = CURRENT_TIME;
d8c76e6f 2462 inc_nlink(inode);
7de9c6ee 2463 ihold(inode); /* New dentry reference */
1da177e4
LT
2464 dget(dentry); /* Extra pinning count for the created dentry */
2465 d_instantiate(dentry, inode);
5b04c689
PE
2466out:
2467 return ret;
1da177e4
LT
2468}
2469
2470static int shmem_unlink(struct inode *dir, struct dentry *dentry)
2471{
75c3cfa8 2472 struct inode *inode = d_inode(dentry);
1da177e4 2473
5b04c689
PE
2474 if (inode->i_nlink > 1 && !S_ISDIR(inode->i_mode))
2475 shmem_free_inode(inode->i_sb);
1da177e4
LT
2476
2477 dir->i_size -= BOGO_DIRENT_SIZE;
2478 inode->i_ctime = dir->i_ctime = dir->i_mtime = CURRENT_TIME;
9a53c3a7 2479 drop_nlink(inode);
1da177e4
LT
2480 dput(dentry); /* Undo the count from "create" - this does all the work */
2481 return 0;
2482}
2483
2484static int shmem_rmdir(struct inode *dir, struct dentry *dentry)
2485{
2486 if (!simple_empty(dentry))
2487 return -ENOTEMPTY;
2488
75c3cfa8 2489 drop_nlink(d_inode(dentry));
9a53c3a7 2490 drop_nlink(dir);
1da177e4
LT
2491 return shmem_unlink(dir, dentry);
2492}
2493
37456771
MS
2494static int shmem_exchange(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry)
2495{
e36cb0b8
DH
2496 bool old_is_dir = d_is_dir(old_dentry);
2497 bool new_is_dir = d_is_dir(new_dentry);
37456771
MS
2498
2499 if (old_dir != new_dir && old_is_dir != new_is_dir) {
2500 if (old_is_dir) {
2501 drop_nlink(old_dir);
2502 inc_nlink(new_dir);
2503 } else {
2504 drop_nlink(new_dir);
2505 inc_nlink(old_dir);
2506 }
2507 }
2508 old_dir->i_ctime = old_dir->i_mtime =
2509 new_dir->i_ctime = new_dir->i_mtime =
75c3cfa8
DH
2510 d_inode(old_dentry)->i_ctime =
2511 d_inode(new_dentry)->i_ctime = CURRENT_TIME;
37456771
MS
2512
2513 return 0;
2514}
2515
46fdb794
MS
2516static int shmem_whiteout(struct inode *old_dir, struct dentry *old_dentry)
2517{
2518 struct dentry *whiteout;
2519 int error;
2520
2521 whiteout = d_alloc(old_dentry->d_parent, &old_dentry->d_name);
2522 if (!whiteout)
2523 return -ENOMEM;
2524
2525 error = shmem_mknod(old_dir, whiteout,
2526 S_IFCHR | WHITEOUT_MODE, WHITEOUT_DEV);
2527 dput(whiteout);
2528 if (error)
2529 return error;
2530
2531 /*
2532 * Cheat and hash the whiteout while the old dentry is still in
2533 * place, instead of playing games with FS_RENAME_DOES_D_MOVE.
2534 *
2535 * d_lookup() will consistently find one of them at this point,
2536 * not sure which one, but that isn't even important.
2537 */
2538 d_rehash(whiteout);
2539 return 0;
2540}
2541
1da177e4
LT
2542/*
2543 * The VFS layer already does all the dentry stuff for rename,
2544 * we just have to decrement the usage count for the target if
2545 * it exists so that the VFS layer correctly free's it when it
2546 * gets overwritten.
2547 */
3b69ff51 2548static int shmem_rename2(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry, unsigned int flags)
1da177e4 2549{
75c3cfa8 2550 struct inode *inode = d_inode(old_dentry);
1da177e4
LT
2551 int they_are_dirs = S_ISDIR(inode->i_mode);
2552
46fdb794 2553 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
3b69ff51
MS
2554 return -EINVAL;
2555
37456771
MS
2556 if (flags & RENAME_EXCHANGE)
2557 return shmem_exchange(old_dir, old_dentry, new_dir, new_dentry);
2558
1da177e4
LT
2559 if (!simple_empty(new_dentry))
2560 return -ENOTEMPTY;
2561
46fdb794
MS
2562 if (flags & RENAME_WHITEOUT) {
2563 int error;
2564
2565 error = shmem_whiteout(old_dir, old_dentry);
2566 if (error)
2567 return error;
2568 }
2569
75c3cfa8 2570 if (d_really_is_positive(new_dentry)) {
1da177e4 2571 (void) shmem_unlink(new_dir, new_dentry);
b928095b 2572 if (they_are_dirs) {
75c3cfa8 2573 drop_nlink(d_inode(new_dentry));
9a53c3a7 2574 drop_nlink(old_dir);
b928095b 2575 }
1da177e4 2576 } else if (they_are_dirs) {
9a53c3a7 2577 drop_nlink(old_dir);
d8c76e6f 2578 inc_nlink(new_dir);
1da177e4
LT
2579 }
2580
2581 old_dir->i_size -= BOGO_DIRENT_SIZE;
2582 new_dir->i_size += BOGO_DIRENT_SIZE;
2583 old_dir->i_ctime = old_dir->i_mtime =
2584 new_dir->i_ctime = new_dir->i_mtime =
2585 inode->i_ctime = CURRENT_TIME;
2586 return 0;
2587}
2588
2589static int shmem_symlink(struct inode *dir, struct dentry *dentry, const char *symname)
2590{
2591 int error;
2592 int len;
2593 struct inode *inode;
9276aad6 2594 struct page *page;
1da177e4
LT
2595 struct shmem_inode_info *info;
2596
2597 len = strlen(symname) + 1;
09cbfeaf 2598 if (len > PAGE_SIZE)
1da177e4
LT
2599 return -ENAMETOOLONG;
2600
454abafe 2601 inode = shmem_get_inode(dir->i_sb, dir, S_IFLNK|S_IRWXUGO, 0, VM_NORESERVE);
1da177e4
LT
2602 if (!inode)
2603 return -ENOSPC;
2604
9d8f13ba 2605 error = security_inode_init_security(inode, dir, &dentry->d_name,
6d9d88d0 2606 shmem_initxattrs, NULL);
570bc1c2
SS
2607 if (error) {
2608 if (error != -EOPNOTSUPP) {
2609 iput(inode);
2610 return error;
2611 }
2612 error = 0;
2613 }
2614
1da177e4
LT
2615 info = SHMEM_I(inode);
2616 inode->i_size = len-1;
69f07ec9 2617 if (len <= SHORT_SYMLINK_LEN) {
3ed47db3
AV
2618 inode->i_link = kmemdup(symname, len, GFP_KERNEL);
2619 if (!inode->i_link) {
69f07ec9
HD
2620 iput(inode);
2621 return -ENOMEM;
2622 }
2623 inode->i_op = &shmem_short_symlink_operations;
1da177e4 2624 } else {
e8ecde25 2625 inode_nohighmem(inode);
9e18eb29 2626 error = shmem_getpage(inode, 0, &page, SGP_WRITE);
1da177e4
LT
2627 if (error) {
2628 iput(inode);
2629 return error;
2630 }
14fcc23f 2631 inode->i_mapping->a_ops = &shmem_aops;
1da177e4 2632 inode->i_op = &shmem_symlink_inode_operations;
21fc61c7 2633 memcpy(page_address(page), symname, len);
ec9516fb 2634 SetPageUptodate(page);
1da177e4 2635 set_page_dirty(page);
6746aff7 2636 unlock_page(page);
09cbfeaf 2637 put_page(page);
1da177e4 2638 }
1da177e4
LT
2639 dir->i_size += BOGO_DIRENT_SIZE;
2640 dir->i_ctime = dir->i_mtime = CURRENT_TIME;
2641 d_instantiate(dentry, inode);
2642 dget(dentry);
2643 return 0;
2644}
2645
fceef393 2646static void shmem_put_link(void *arg)
1da177e4 2647{
fceef393
AV
2648 mark_page_accessed(arg);
2649 put_page(arg);
1da177e4
LT
2650}
2651
6b255391 2652static const char *shmem_get_link(struct dentry *dentry,
fceef393
AV
2653 struct inode *inode,
2654 struct delayed_call *done)
1da177e4 2655{
1da177e4 2656 struct page *page = NULL;
6b255391 2657 int error;
6a6c9904
AV
2658 if (!dentry) {
2659 page = find_get_page(inode->i_mapping, 0);
2660 if (!page)
2661 return ERR_PTR(-ECHILD);
2662 if (!PageUptodate(page)) {
2663 put_page(page);
2664 return ERR_PTR(-ECHILD);
2665 }
2666 } else {
9e18eb29 2667 error = shmem_getpage(inode, 0, &page, SGP_READ);
6a6c9904
AV
2668 if (error)
2669 return ERR_PTR(error);
2670 unlock_page(page);
2671 }
fceef393 2672 set_delayed_call(done, shmem_put_link, page);
21fc61c7 2673 return page_address(page);
1da177e4
LT
2674}
2675
b09e0fa4 2676#ifdef CONFIG_TMPFS_XATTR
46711810 2677/*
b09e0fa4
EP
2678 * Superblocks without xattr inode operations may get some security.* xattr
2679 * support from the LSM "for free". As soon as we have any other xattrs
39f0247d
AG
2680 * like ACLs, we also need to implement the security.* handlers at
2681 * filesystem level, though.
2682 */
2683
6d9d88d0
JS
2684/*
2685 * Callback for security_inode_init_security() for acquiring xattrs.
2686 */
2687static int shmem_initxattrs(struct inode *inode,
2688 const struct xattr *xattr_array,
2689 void *fs_info)
2690{
2691 struct shmem_inode_info *info = SHMEM_I(inode);
2692 const struct xattr *xattr;
38f38657 2693 struct simple_xattr *new_xattr;
6d9d88d0
JS
2694 size_t len;
2695
2696 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
38f38657 2697 new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len);
6d9d88d0
JS
2698 if (!new_xattr)
2699 return -ENOMEM;
2700
2701 len = strlen(xattr->name) + 1;
2702 new_xattr->name = kmalloc(XATTR_SECURITY_PREFIX_LEN + len,
2703 GFP_KERNEL);
2704 if (!new_xattr->name) {
2705 kfree(new_xattr);
2706 return -ENOMEM;
2707 }
2708
2709 memcpy(new_xattr->name, XATTR_SECURITY_PREFIX,
2710 XATTR_SECURITY_PREFIX_LEN);
2711 memcpy(new_xattr->name + XATTR_SECURITY_PREFIX_LEN,
2712 xattr->name, len);
2713
38f38657 2714 simple_xattr_list_add(&info->xattrs, new_xattr);
6d9d88d0
JS
2715 }
2716
2717 return 0;
2718}
2719
aa7c5241 2720static int shmem_xattr_handler_get(const struct xattr_handler *handler,
b296821a
AV
2721 struct dentry *unused, struct inode *inode,
2722 const char *name, void *buffer, size_t size)
b09e0fa4 2723{
b296821a 2724 struct shmem_inode_info *info = SHMEM_I(inode);
b09e0fa4 2725
aa7c5241 2726 name = xattr_full_name(handler, name);
38f38657 2727 return simple_xattr_get(&info->xattrs, name, buffer, size);
b09e0fa4
EP
2728}
2729
aa7c5241 2730static int shmem_xattr_handler_set(const struct xattr_handler *handler,
59301226
AV
2731 struct dentry *unused, struct inode *inode,
2732 const char *name, const void *value,
2733 size_t size, int flags)
b09e0fa4 2734{
59301226 2735 struct shmem_inode_info *info = SHMEM_I(inode);
b09e0fa4 2736
aa7c5241 2737 name = xattr_full_name(handler, name);
38f38657 2738 return simple_xattr_set(&info->xattrs, name, value, size, flags);
b09e0fa4
EP
2739}
2740
aa7c5241
AG
2741static const struct xattr_handler shmem_security_xattr_handler = {
2742 .prefix = XATTR_SECURITY_PREFIX,
2743 .get = shmem_xattr_handler_get,
2744 .set = shmem_xattr_handler_set,
2745};
b09e0fa4 2746
aa7c5241
AG
2747static const struct xattr_handler shmem_trusted_xattr_handler = {
2748 .prefix = XATTR_TRUSTED_PREFIX,
2749 .get = shmem_xattr_handler_get,
2750 .set = shmem_xattr_handler_set,
2751};
b09e0fa4 2752
aa7c5241
AG
2753static const struct xattr_handler *shmem_xattr_handlers[] = {
2754#ifdef CONFIG_TMPFS_POSIX_ACL
2755 &posix_acl_access_xattr_handler,
2756 &posix_acl_default_xattr_handler,
2757#endif
2758 &shmem_security_xattr_handler,
2759 &shmem_trusted_xattr_handler,
2760 NULL
2761};
b09e0fa4
EP
2762
2763static ssize_t shmem_listxattr(struct dentry *dentry, char *buffer, size_t size)
2764{
75c3cfa8 2765 struct shmem_inode_info *info = SHMEM_I(d_inode(dentry));
786534b9 2766 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
b09e0fa4
EP
2767}
2768#endif /* CONFIG_TMPFS_XATTR */
2769
69f07ec9 2770static const struct inode_operations shmem_short_symlink_operations = {
b09e0fa4 2771 .readlink = generic_readlink,
6b255391 2772 .get_link = simple_get_link,
b09e0fa4 2773#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
2774 .setxattr = generic_setxattr,
2775 .getxattr = generic_getxattr,
b09e0fa4 2776 .listxattr = shmem_listxattr,
aa7c5241 2777 .removexattr = generic_removexattr,
b09e0fa4
EP
2778#endif
2779};
2780
2781static const struct inode_operations shmem_symlink_inode_operations = {
2782 .readlink = generic_readlink,
6b255391 2783 .get_link = shmem_get_link,
b09e0fa4 2784#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
2785 .setxattr = generic_setxattr,
2786 .getxattr = generic_getxattr,
b09e0fa4 2787 .listxattr = shmem_listxattr,
aa7c5241 2788 .removexattr = generic_removexattr,
39f0247d 2789#endif
b09e0fa4 2790};
39f0247d 2791
91828a40
DG
2792static struct dentry *shmem_get_parent(struct dentry *child)
2793{
2794 return ERR_PTR(-ESTALE);
2795}
2796
2797static int shmem_match(struct inode *ino, void *vfh)
2798{
2799 __u32 *fh = vfh;
2800 __u64 inum = fh[2];
2801 inum = (inum << 32) | fh[1];
2802 return ino->i_ino == inum && fh[0] == ino->i_generation;
2803}
2804
480b116c
CH
2805static struct dentry *shmem_fh_to_dentry(struct super_block *sb,
2806 struct fid *fid, int fh_len, int fh_type)
91828a40 2807{
91828a40 2808 struct inode *inode;
480b116c 2809 struct dentry *dentry = NULL;
35c2a7f4 2810 u64 inum;
480b116c
CH
2811
2812 if (fh_len < 3)
2813 return NULL;
91828a40 2814
35c2a7f4
HD
2815 inum = fid->raw[2];
2816 inum = (inum << 32) | fid->raw[1];
2817
480b116c
CH
2818 inode = ilookup5(sb, (unsigned long)(inum + fid->raw[0]),
2819 shmem_match, fid->raw);
91828a40 2820 if (inode) {
480b116c 2821 dentry = d_find_alias(inode);
91828a40
DG
2822 iput(inode);
2823 }
2824
480b116c 2825 return dentry;
91828a40
DG
2826}
2827
b0b0382b
AV
2828static int shmem_encode_fh(struct inode *inode, __u32 *fh, int *len,
2829 struct inode *parent)
91828a40 2830{
5fe0c237
AK
2831 if (*len < 3) {
2832 *len = 3;
94e07a75 2833 return FILEID_INVALID;
5fe0c237 2834 }
91828a40 2835
1d3382cb 2836 if (inode_unhashed(inode)) {
91828a40
DG
2837 /* Unfortunately insert_inode_hash is not idempotent,
2838 * so as we hash inodes here rather than at creation
2839 * time, we need a lock to ensure we only try
2840 * to do it once
2841 */
2842 static DEFINE_SPINLOCK(lock);
2843 spin_lock(&lock);
1d3382cb 2844 if (inode_unhashed(inode))
91828a40
DG
2845 __insert_inode_hash(inode,
2846 inode->i_ino + inode->i_generation);
2847 spin_unlock(&lock);
2848 }
2849
2850 fh[0] = inode->i_generation;
2851 fh[1] = inode->i_ino;
2852 fh[2] = ((__u64)inode->i_ino) >> 32;
2853
2854 *len = 3;
2855 return 1;
2856}
2857
39655164 2858static const struct export_operations shmem_export_ops = {
91828a40 2859 .get_parent = shmem_get_parent,
91828a40 2860 .encode_fh = shmem_encode_fh,
480b116c 2861 .fh_to_dentry = shmem_fh_to_dentry,
91828a40
DG
2862};
2863
680d794b 2864static int shmem_parse_options(char *options, struct shmem_sb_info *sbinfo,
2865 bool remount)
1da177e4
LT
2866{
2867 char *this_char, *value, *rest;
49cd0a5c 2868 struct mempolicy *mpol = NULL;
8751e039
EB
2869 uid_t uid;
2870 gid_t gid;
1da177e4 2871
b00dc3ad
HD
2872 while (options != NULL) {
2873 this_char = options;
2874 for (;;) {
2875 /*
2876 * NUL-terminate this option: unfortunately,
2877 * mount options form a comma-separated list,
2878 * but mpol's nodelist may also contain commas.
2879 */
2880 options = strchr(options, ',');
2881 if (options == NULL)
2882 break;
2883 options++;
2884 if (!isdigit(*options)) {
2885 options[-1] = '\0';
2886 break;
2887 }
2888 }
1da177e4
LT
2889 if (!*this_char)
2890 continue;
2891 if ((value = strchr(this_char,'=')) != NULL) {
2892 *value++ = 0;
2893 } else {
1170532b
JP
2894 pr_err("tmpfs: No value for mount option '%s'\n",
2895 this_char);
49cd0a5c 2896 goto error;
1da177e4
LT
2897 }
2898
2899 if (!strcmp(this_char,"size")) {
2900 unsigned long long size;
2901 size = memparse(value,&rest);
2902 if (*rest == '%') {
2903 size <<= PAGE_SHIFT;
2904 size *= totalram_pages;
2905 do_div(size, 100);
2906 rest++;
2907 }
2908 if (*rest)
2909 goto bad_val;
680d794b 2910 sbinfo->max_blocks =
09cbfeaf 2911 DIV_ROUND_UP(size, PAGE_SIZE);
1da177e4 2912 } else if (!strcmp(this_char,"nr_blocks")) {
680d794b 2913 sbinfo->max_blocks = memparse(value, &rest);
1da177e4
LT
2914 if (*rest)
2915 goto bad_val;
2916 } else if (!strcmp(this_char,"nr_inodes")) {
680d794b 2917 sbinfo->max_inodes = memparse(value, &rest);
1da177e4
LT
2918 if (*rest)
2919 goto bad_val;
2920 } else if (!strcmp(this_char,"mode")) {
680d794b 2921 if (remount)
1da177e4 2922 continue;
680d794b 2923 sbinfo->mode = simple_strtoul(value, &rest, 8) & 07777;
1da177e4
LT
2924 if (*rest)
2925 goto bad_val;
2926 } else if (!strcmp(this_char,"uid")) {
680d794b 2927 if (remount)
1da177e4 2928 continue;
8751e039 2929 uid = simple_strtoul(value, &rest, 0);
1da177e4
LT
2930 if (*rest)
2931 goto bad_val;
8751e039
EB
2932 sbinfo->uid = make_kuid(current_user_ns(), uid);
2933 if (!uid_valid(sbinfo->uid))
2934 goto bad_val;
1da177e4 2935 } else if (!strcmp(this_char,"gid")) {
680d794b 2936 if (remount)
1da177e4 2937 continue;
8751e039 2938 gid = simple_strtoul(value, &rest, 0);
1da177e4
LT
2939 if (*rest)
2940 goto bad_val;
8751e039
EB
2941 sbinfo->gid = make_kgid(current_user_ns(), gid);
2942 if (!gid_valid(sbinfo->gid))
2943 goto bad_val;
5a6e75f8
KS
2944#ifdef CONFIG_TRANSPARENT_HUGEPAGE
2945 } else if (!strcmp(this_char, "huge")) {
2946 int huge;
2947 huge = shmem_parse_huge(value);
2948 if (huge < 0)
2949 goto bad_val;
2950 if (!has_transparent_hugepage() &&
2951 huge != SHMEM_HUGE_NEVER)
2952 goto bad_val;
2953 sbinfo->huge = huge;
2954#endif
2955#ifdef CONFIG_NUMA
7339ff83 2956 } else if (!strcmp(this_char,"mpol")) {
49cd0a5c
GT
2957 mpol_put(mpol);
2958 mpol = NULL;
2959 if (mpol_parse_str(value, &mpol))
7339ff83 2960 goto bad_val;
5a6e75f8 2961#endif
1da177e4 2962 } else {
1170532b 2963 pr_err("tmpfs: Bad mount option %s\n", this_char);
49cd0a5c 2964 goto error;
1da177e4
LT
2965 }
2966 }
49cd0a5c 2967 sbinfo->mpol = mpol;
1da177e4
LT
2968 return 0;
2969
2970bad_val:
1170532b 2971 pr_err("tmpfs: Bad value '%s' for mount option '%s'\n",
1da177e4 2972 value, this_char);
49cd0a5c
GT
2973error:
2974 mpol_put(mpol);
1da177e4
LT
2975 return 1;
2976
2977}
2978
2979static int shmem_remount_fs(struct super_block *sb, int *flags, char *data)
2980{
2981 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
680d794b 2982 struct shmem_sb_info config = *sbinfo;
0edd73b3
HD
2983 unsigned long inodes;
2984 int error = -EINVAL;
2985
5f00110f 2986 config.mpol = NULL;
680d794b 2987 if (shmem_parse_options(data, &config, true))
0edd73b3 2988 return error;
1da177e4 2989
0edd73b3 2990 spin_lock(&sbinfo->stat_lock);
0edd73b3 2991 inodes = sbinfo->max_inodes - sbinfo->free_inodes;
7e496299 2992 if (percpu_counter_compare(&sbinfo->used_blocks, config.max_blocks) > 0)
0edd73b3 2993 goto out;
680d794b 2994 if (config.max_inodes < inodes)
0edd73b3
HD
2995 goto out;
2996 /*
54af6042 2997 * Those tests disallow limited->unlimited while any are in use;
0edd73b3
HD
2998 * but we must separately disallow unlimited->limited, because
2999 * in that case we have no record of how much is already in use.
3000 */
680d794b 3001 if (config.max_blocks && !sbinfo->max_blocks)
0edd73b3 3002 goto out;
680d794b 3003 if (config.max_inodes && !sbinfo->max_inodes)
0edd73b3
HD
3004 goto out;
3005
3006 error = 0;
5a6e75f8 3007 sbinfo->huge = config.huge;
680d794b 3008 sbinfo->max_blocks = config.max_blocks;
680d794b 3009 sbinfo->max_inodes = config.max_inodes;
3010 sbinfo->free_inodes = config.max_inodes - inodes;
71fe804b 3011
5f00110f
GT
3012 /*
3013 * Preserve previous mempolicy unless mpol remount option was specified.
3014 */
3015 if (config.mpol) {
3016 mpol_put(sbinfo->mpol);
3017 sbinfo->mpol = config.mpol; /* transfers initial ref */
3018 }
0edd73b3
HD
3019out:
3020 spin_unlock(&sbinfo->stat_lock);
3021 return error;
1da177e4 3022}
680d794b 3023
34c80b1d 3024static int shmem_show_options(struct seq_file *seq, struct dentry *root)
680d794b 3025{
34c80b1d 3026 struct shmem_sb_info *sbinfo = SHMEM_SB(root->d_sb);
680d794b 3027
3028 if (sbinfo->max_blocks != shmem_default_max_blocks())
3029 seq_printf(seq, ",size=%luk",
09cbfeaf 3030 sbinfo->max_blocks << (PAGE_SHIFT - 10));
680d794b 3031 if (sbinfo->max_inodes != shmem_default_max_inodes())
3032 seq_printf(seq, ",nr_inodes=%lu", sbinfo->max_inodes);
3033 if (sbinfo->mode != (S_IRWXUGO | S_ISVTX))
09208d15 3034 seq_printf(seq, ",mode=%03ho", sbinfo->mode);
8751e039
EB
3035 if (!uid_eq(sbinfo->uid, GLOBAL_ROOT_UID))
3036 seq_printf(seq, ",uid=%u",
3037 from_kuid_munged(&init_user_ns, sbinfo->uid));
3038 if (!gid_eq(sbinfo->gid, GLOBAL_ROOT_GID))
3039 seq_printf(seq, ",gid=%u",
3040 from_kgid_munged(&init_user_ns, sbinfo->gid));
5a6e75f8
KS
3041#ifdef CONFIG_TRANSPARENT_HUGEPAGE
3042 /* Rightly or wrongly, show huge mount option unmasked by shmem_huge */
3043 if (sbinfo->huge)
3044 seq_printf(seq, ",huge=%s", shmem_format_huge(sbinfo->huge));
3045#endif
71fe804b 3046 shmem_show_mpol(seq, sbinfo->mpol);
680d794b 3047 return 0;
3048}
9183df25
DH
3049
3050#define MFD_NAME_PREFIX "memfd:"
3051#define MFD_NAME_PREFIX_LEN (sizeof(MFD_NAME_PREFIX) - 1)
3052#define MFD_NAME_MAX_LEN (NAME_MAX - MFD_NAME_PREFIX_LEN)
3053
3054#define MFD_ALL_FLAGS (MFD_CLOEXEC | MFD_ALLOW_SEALING)
3055
3056SYSCALL_DEFINE2(memfd_create,
3057 const char __user *, uname,
3058 unsigned int, flags)
3059{
3060 struct shmem_inode_info *info;
3061 struct file *file;
3062 int fd, error;
3063 char *name;
3064 long len;
3065
3066 if (flags & ~(unsigned int)MFD_ALL_FLAGS)
3067 return -EINVAL;
3068
3069 /* length includes terminating zero */
3070 len = strnlen_user(uname, MFD_NAME_MAX_LEN + 1);
3071 if (len <= 0)
3072 return -EFAULT;
3073 if (len > MFD_NAME_MAX_LEN + 1)
3074 return -EINVAL;
3075
3076 name = kmalloc(len + MFD_NAME_PREFIX_LEN, GFP_TEMPORARY);
3077 if (!name)
3078 return -ENOMEM;
3079
3080 strcpy(name, MFD_NAME_PREFIX);
3081 if (copy_from_user(&name[MFD_NAME_PREFIX_LEN], uname, len)) {
3082 error = -EFAULT;
3083 goto err_name;
3084 }
3085
3086 /* terminating-zero may have changed after strnlen_user() returned */
3087 if (name[len + MFD_NAME_PREFIX_LEN - 1]) {
3088 error = -EFAULT;
3089 goto err_name;
3090 }
3091
3092 fd = get_unused_fd_flags((flags & MFD_CLOEXEC) ? O_CLOEXEC : 0);
3093 if (fd < 0) {
3094 error = fd;
3095 goto err_name;
3096 }
3097
3098 file = shmem_file_setup(name, 0, VM_NORESERVE);
3099 if (IS_ERR(file)) {
3100 error = PTR_ERR(file);
3101 goto err_fd;
3102 }
3103 info = SHMEM_I(file_inode(file));
3104 file->f_mode |= FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE;
3105 file->f_flags |= O_RDWR | O_LARGEFILE;
3106 if (flags & MFD_ALLOW_SEALING)
3107 info->seals &= ~F_SEAL_SEAL;
3108
3109 fd_install(fd, file);
3110 kfree(name);
3111 return fd;
3112
3113err_fd:
3114 put_unused_fd(fd);
3115err_name:
3116 kfree(name);
3117 return error;
3118}
3119
680d794b 3120#endif /* CONFIG_TMPFS */
1da177e4
LT
3121
3122static void shmem_put_super(struct super_block *sb)
3123{
602586a8
HD
3124 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
3125
3126 percpu_counter_destroy(&sbinfo->used_blocks);
49cd0a5c 3127 mpol_put(sbinfo->mpol);
602586a8 3128 kfree(sbinfo);
1da177e4
LT
3129 sb->s_fs_info = NULL;
3130}
3131
2b2af54a 3132int shmem_fill_super(struct super_block *sb, void *data, int silent)
1da177e4
LT
3133{
3134 struct inode *inode;
0edd73b3 3135 struct shmem_sb_info *sbinfo;
680d794b 3136 int err = -ENOMEM;
3137
3138 /* Round up to L1_CACHE_BYTES to resist false sharing */
425fbf04 3139 sbinfo = kzalloc(max((int)sizeof(struct shmem_sb_info),
680d794b 3140 L1_CACHE_BYTES), GFP_KERNEL);
3141 if (!sbinfo)
3142 return -ENOMEM;
3143
680d794b 3144 sbinfo->mode = S_IRWXUGO | S_ISVTX;
76aac0e9
DH
3145 sbinfo->uid = current_fsuid();
3146 sbinfo->gid = current_fsgid();
680d794b 3147 sb->s_fs_info = sbinfo;
1da177e4 3148
0edd73b3 3149#ifdef CONFIG_TMPFS
1da177e4
LT
3150 /*
3151 * Per default we only allow half of the physical ram per
3152 * tmpfs instance, limiting inodes to one per page of lowmem;
3153 * but the internal instance is left unlimited.
3154 */
ca4e0519 3155 if (!(sb->s_flags & MS_KERNMOUNT)) {
680d794b 3156 sbinfo->max_blocks = shmem_default_max_blocks();
3157 sbinfo->max_inodes = shmem_default_max_inodes();
3158 if (shmem_parse_options(data, sbinfo, false)) {
3159 err = -EINVAL;
3160 goto failed;
3161 }
ca4e0519
AV
3162 } else {
3163 sb->s_flags |= MS_NOUSER;
1da177e4 3164 }
91828a40 3165 sb->s_export_op = &shmem_export_ops;
2f6e38f3 3166 sb->s_flags |= MS_NOSEC;
1da177e4
LT
3167#else
3168 sb->s_flags |= MS_NOUSER;
3169#endif
3170
0edd73b3 3171 spin_lock_init(&sbinfo->stat_lock);
908c7f19 3172 if (percpu_counter_init(&sbinfo->used_blocks, 0, GFP_KERNEL))
602586a8 3173 goto failed;
680d794b 3174 sbinfo->free_inodes = sbinfo->max_inodes;
0edd73b3 3175
285b2c4f 3176 sb->s_maxbytes = MAX_LFS_FILESIZE;
09cbfeaf
KS
3177 sb->s_blocksize = PAGE_SIZE;
3178 sb->s_blocksize_bits = PAGE_SHIFT;
1da177e4
LT
3179 sb->s_magic = TMPFS_MAGIC;
3180 sb->s_op = &shmem_ops;
cfd95a9c 3181 sb->s_time_gran = 1;
b09e0fa4 3182#ifdef CONFIG_TMPFS_XATTR
39f0247d 3183 sb->s_xattr = shmem_xattr_handlers;
b09e0fa4
EP
3184#endif
3185#ifdef CONFIG_TMPFS_POSIX_ACL
39f0247d
AG
3186 sb->s_flags |= MS_POSIXACL;
3187#endif
0edd73b3 3188
454abafe 3189 inode = shmem_get_inode(sb, NULL, S_IFDIR | sbinfo->mode, 0, VM_NORESERVE);
1da177e4
LT
3190 if (!inode)
3191 goto failed;
680d794b 3192 inode->i_uid = sbinfo->uid;
3193 inode->i_gid = sbinfo->gid;
318ceed0
AV
3194 sb->s_root = d_make_root(inode);
3195 if (!sb->s_root)
48fde701 3196 goto failed;
1da177e4
LT
3197 return 0;
3198
1da177e4
LT
3199failed:
3200 shmem_put_super(sb);
3201 return err;
3202}
3203
fcc234f8 3204static struct kmem_cache *shmem_inode_cachep;
1da177e4
LT
3205
3206static struct inode *shmem_alloc_inode(struct super_block *sb)
3207{
41ffe5d5
HD
3208 struct shmem_inode_info *info;
3209 info = kmem_cache_alloc(shmem_inode_cachep, GFP_KERNEL);
3210 if (!info)
1da177e4 3211 return NULL;
41ffe5d5 3212 return &info->vfs_inode;
1da177e4
LT
3213}
3214
41ffe5d5 3215static void shmem_destroy_callback(struct rcu_head *head)
fa0d7e3d
NP
3216{
3217 struct inode *inode = container_of(head, struct inode, i_rcu);
84e710da
AV
3218 if (S_ISLNK(inode->i_mode))
3219 kfree(inode->i_link);
fa0d7e3d
NP
3220 kmem_cache_free(shmem_inode_cachep, SHMEM_I(inode));
3221}
3222
1da177e4
LT
3223static void shmem_destroy_inode(struct inode *inode)
3224{
09208d15 3225 if (S_ISREG(inode->i_mode))
1da177e4 3226 mpol_free_shared_policy(&SHMEM_I(inode)->policy);
41ffe5d5 3227 call_rcu(&inode->i_rcu, shmem_destroy_callback);
1da177e4
LT
3228}
3229
41ffe5d5 3230static void shmem_init_inode(void *foo)
1da177e4 3231{
41ffe5d5
HD
3232 struct shmem_inode_info *info = foo;
3233 inode_init_once(&info->vfs_inode);
1da177e4
LT
3234}
3235
41ffe5d5 3236static int shmem_init_inodecache(void)
1da177e4
LT
3237{
3238 shmem_inode_cachep = kmem_cache_create("shmem_inode_cache",
3239 sizeof(struct shmem_inode_info),
5d097056 3240 0, SLAB_PANIC|SLAB_ACCOUNT, shmem_init_inode);
1da177e4
LT
3241 return 0;
3242}
3243
41ffe5d5 3244static void shmem_destroy_inodecache(void)
1da177e4 3245{
1a1d92c1 3246 kmem_cache_destroy(shmem_inode_cachep);
1da177e4
LT
3247}
3248
f5e54d6e 3249static const struct address_space_operations shmem_aops = {
1da177e4 3250 .writepage = shmem_writepage,
76719325 3251 .set_page_dirty = __set_page_dirty_no_writeback,
1da177e4 3252#ifdef CONFIG_TMPFS
800d15a5
NP
3253 .write_begin = shmem_write_begin,
3254 .write_end = shmem_write_end,
1da177e4 3255#endif
1c93923c 3256#ifdef CONFIG_MIGRATION
304dbdb7 3257 .migratepage = migrate_page,
1c93923c 3258#endif
aa261f54 3259 .error_remove_page = generic_error_remove_page,
1da177e4
LT
3260};
3261
15ad7cdc 3262static const struct file_operations shmem_file_operations = {
1da177e4
LT
3263 .mmap = shmem_mmap,
3264#ifdef CONFIG_TMPFS
220f2ac9 3265 .llseek = shmem_file_llseek,
2ba5bbed 3266 .read_iter = shmem_file_read_iter,
8174202b 3267 .write_iter = generic_file_write_iter,
1b061d92 3268 .fsync = noop_fsync,
708e3508 3269 .splice_read = shmem_file_splice_read,
f6cb85d0 3270 .splice_write = iter_file_splice_write,
83e4fa9c 3271 .fallocate = shmem_fallocate,
1da177e4
LT
3272#endif
3273};
3274
92e1d5be 3275static const struct inode_operations shmem_inode_operations = {
44a30220 3276 .getattr = shmem_getattr,
94c1e62d 3277 .setattr = shmem_setattr,
b09e0fa4 3278#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3279 .setxattr = generic_setxattr,
3280 .getxattr = generic_getxattr,
b09e0fa4 3281 .listxattr = shmem_listxattr,
aa7c5241 3282 .removexattr = generic_removexattr,
feda821e 3283 .set_acl = simple_set_acl,
b09e0fa4 3284#endif
1da177e4
LT
3285};
3286
92e1d5be 3287static const struct inode_operations shmem_dir_inode_operations = {
1da177e4
LT
3288#ifdef CONFIG_TMPFS
3289 .create = shmem_create,
3290 .lookup = simple_lookup,
3291 .link = shmem_link,
3292 .unlink = shmem_unlink,
3293 .symlink = shmem_symlink,
3294 .mkdir = shmem_mkdir,
3295 .rmdir = shmem_rmdir,
3296 .mknod = shmem_mknod,
3b69ff51 3297 .rename2 = shmem_rename2,
60545d0d 3298 .tmpfile = shmem_tmpfile,
1da177e4 3299#endif
b09e0fa4 3300#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3301 .setxattr = generic_setxattr,
3302 .getxattr = generic_getxattr,
b09e0fa4 3303 .listxattr = shmem_listxattr,
aa7c5241 3304 .removexattr = generic_removexattr,
b09e0fa4 3305#endif
39f0247d 3306#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3307 .setattr = shmem_setattr,
feda821e 3308 .set_acl = simple_set_acl,
39f0247d
AG
3309#endif
3310};
3311
92e1d5be 3312static const struct inode_operations shmem_special_inode_operations = {
b09e0fa4 3313#ifdef CONFIG_TMPFS_XATTR
aa7c5241
AG
3314 .setxattr = generic_setxattr,
3315 .getxattr = generic_getxattr,
b09e0fa4 3316 .listxattr = shmem_listxattr,
aa7c5241 3317 .removexattr = generic_removexattr,
b09e0fa4 3318#endif
39f0247d 3319#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3320 .setattr = shmem_setattr,
feda821e 3321 .set_acl = simple_set_acl,
39f0247d 3322#endif
1da177e4
LT
3323};
3324
759b9775 3325static const struct super_operations shmem_ops = {
1da177e4
LT
3326 .alloc_inode = shmem_alloc_inode,
3327 .destroy_inode = shmem_destroy_inode,
3328#ifdef CONFIG_TMPFS
3329 .statfs = shmem_statfs,
3330 .remount_fs = shmem_remount_fs,
680d794b 3331 .show_options = shmem_show_options,
1da177e4 3332#endif
1f895f75 3333 .evict_inode = shmem_evict_inode,
1da177e4
LT
3334 .drop_inode = generic_delete_inode,
3335 .put_super = shmem_put_super,
3336};
3337
f0f37e2f 3338static const struct vm_operations_struct shmem_vm_ops = {
54cb8821 3339 .fault = shmem_fault,
d7c17551 3340 .map_pages = filemap_map_pages,
1da177e4
LT
3341#ifdef CONFIG_NUMA
3342 .set_policy = shmem_set_policy,
3343 .get_policy = shmem_get_policy,
3344#endif
3345};
3346
3c26ff6e
AV
3347static struct dentry *shmem_mount(struct file_system_type *fs_type,
3348 int flags, const char *dev_name, void *data)
1da177e4 3349{
3c26ff6e 3350 return mount_nodev(fs_type, flags, data, shmem_fill_super);
1da177e4
LT
3351}
3352
41ffe5d5 3353static struct file_system_type shmem_fs_type = {
1da177e4
LT
3354 .owner = THIS_MODULE,
3355 .name = "tmpfs",
3c26ff6e 3356 .mount = shmem_mount,
1da177e4 3357 .kill_sb = kill_litter_super,
2b8576cb 3358 .fs_flags = FS_USERNS_MOUNT,
1da177e4 3359};
1da177e4 3360
41ffe5d5 3361int __init shmem_init(void)
1da177e4
LT
3362{
3363 int error;
3364
16203a7a
RL
3365 /* If rootfs called this, don't re-init */
3366 if (shmem_inode_cachep)
3367 return 0;
3368
41ffe5d5 3369 error = shmem_init_inodecache();
1da177e4
LT
3370 if (error)
3371 goto out3;
3372
41ffe5d5 3373 error = register_filesystem(&shmem_fs_type);
1da177e4 3374 if (error) {
1170532b 3375 pr_err("Could not register tmpfs\n");
1da177e4
LT
3376 goto out2;
3377 }
95dc112a 3378
ca4e0519 3379 shm_mnt = kern_mount(&shmem_fs_type);
1da177e4
LT
3380 if (IS_ERR(shm_mnt)) {
3381 error = PTR_ERR(shm_mnt);
1170532b 3382 pr_err("Could not kern_mount tmpfs\n");
1da177e4
LT
3383 goto out1;
3384 }
5a6e75f8
KS
3385
3386#ifdef CONFIG_TRANSPARENT_HUGEPAGE
3387 if (has_transparent_hugepage() && shmem_huge < SHMEM_HUGE_DENY)
3388 SHMEM_SB(shm_mnt->mnt_sb)->huge = shmem_huge;
3389 else
3390 shmem_huge = 0; /* just in case it was patched */
3391#endif
1da177e4
LT
3392 return 0;
3393
3394out1:
41ffe5d5 3395 unregister_filesystem(&shmem_fs_type);
1da177e4 3396out2:
41ffe5d5 3397 shmem_destroy_inodecache();
1da177e4
LT
3398out3:
3399 shm_mnt = ERR_PTR(error);
3400 return error;
3401}
853ac43a 3402
5a6e75f8
KS
3403#if defined(CONFIG_TRANSPARENT_HUGEPAGE) && defined(CONFIG_SYSFS)
3404static ssize_t shmem_enabled_show(struct kobject *kobj,
3405 struct kobj_attribute *attr, char *buf)
3406{
3407 int values[] = {
3408 SHMEM_HUGE_ALWAYS,
3409 SHMEM_HUGE_WITHIN_SIZE,
3410 SHMEM_HUGE_ADVISE,
3411 SHMEM_HUGE_NEVER,
3412 SHMEM_HUGE_DENY,
3413 SHMEM_HUGE_FORCE,
3414 };
3415 int i, count;
3416
3417 for (i = 0, count = 0; i < ARRAY_SIZE(values); i++) {
3418 const char *fmt = shmem_huge == values[i] ? "[%s] " : "%s ";
3419
3420 count += sprintf(buf + count, fmt,
3421 shmem_format_huge(values[i]));
3422 }
3423 buf[count - 1] = '\n';
3424 return count;
3425}
3426
3427static ssize_t shmem_enabled_store(struct kobject *kobj,
3428 struct kobj_attribute *attr, const char *buf, size_t count)
3429{
3430 char tmp[16];
3431 int huge;
3432
3433 if (count + 1 > sizeof(tmp))
3434 return -EINVAL;
3435 memcpy(tmp, buf, count);
3436 tmp[count] = '\0';
3437 if (count && tmp[count - 1] == '\n')
3438 tmp[count - 1] = '\0';
3439
3440 huge = shmem_parse_huge(tmp);
3441 if (huge == -EINVAL)
3442 return -EINVAL;
3443 if (!has_transparent_hugepage() &&
3444 huge != SHMEM_HUGE_NEVER && huge != SHMEM_HUGE_DENY)
3445 return -EINVAL;
3446
3447 shmem_huge = huge;
3448 if (shmem_huge < SHMEM_HUGE_DENY)
3449 SHMEM_SB(shm_mnt->mnt_sb)->huge = shmem_huge;
3450 return count;
3451}
3452
3453struct kobj_attribute shmem_enabled_attr =
3454 __ATTR(shmem_enabled, 0644, shmem_enabled_show, shmem_enabled_store);
3455#endif /* CONFIG_TRANSPARENT_HUGEPAGE && CONFIG_SYSFS */
3456
853ac43a
MM
3457#else /* !CONFIG_SHMEM */
3458
3459/*
3460 * tiny-shmem: simple shmemfs and tmpfs using ramfs code
3461 *
3462 * This is intended for small system where the benefits of the full
3463 * shmem code (swap-backed and resource-limited) are outweighed by
3464 * their complexity. On systems without swap this code should be
3465 * effectively equivalent, but much lighter weight.
3466 */
3467
41ffe5d5 3468static struct file_system_type shmem_fs_type = {
853ac43a 3469 .name = "tmpfs",
3c26ff6e 3470 .mount = ramfs_mount,
853ac43a 3471 .kill_sb = kill_litter_super,
2b8576cb 3472 .fs_flags = FS_USERNS_MOUNT,
853ac43a
MM
3473};
3474
41ffe5d5 3475int __init shmem_init(void)
853ac43a 3476{
41ffe5d5 3477 BUG_ON(register_filesystem(&shmem_fs_type) != 0);
853ac43a 3478
41ffe5d5 3479 shm_mnt = kern_mount(&shmem_fs_type);
853ac43a
MM
3480 BUG_ON(IS_ERR(shm_mnt));
3481
3482 return 0;
3483}
3484
41ffe5d5 3485int shmem_unuse(swp_entry_t swap, struct page *page)
853ac43a
MM
3486{
3487 return 0;
3488}
3489
3f96b79a
HD
3490int shmem_lock(struct file *file, int lock, struct user_struct *user)
3491{
3492 return 0;
3493}
3494
24513264
HD
3495void shmem_unlock_mapping(struct address_space *mapping)
3496{
3497}
3498
41ffe5d5 3499void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
94c1e62d 3500{
41ffe5d5 3501 truncate_inode_pages_range(inode->i_mapping, lstart, lend);
94c1e62d
HD
3502}
3503EXPORT_SYMBOL_GPL(shmem_truncate_range);
3504
0b0a0806
HD
3505#define shmem_vm_ops generic_file_vm_ops
3506#define shmem_file_operations ramfs_file_operations
454abafe 3507#define shmem_get_inode(sb, dir, mode, dev, flags) ramfs_get_inode(sb, dir, mode, dev)
0b0a0806
HD
3508#define shmem_acct_size(flags, size) 0
3509#define shmem_unacct_size(flags, size) do {} while (0)
853ac43a
MM
3510
3511#endif /* CONFIG_SHMEM */
3512
3513/* common code */
1da177e4 3514
3451538a 3515static struct dentry_operations anon_ops = {
118b2302 3516 .d_dname = simple_dname
3451538a
AV
3517};
3518
c7277090
EP
3519static struct file *__shmem_file_setup(const char *name, loff_t size,
3520 unsigned long flags, unsigned int i_flags)
1da177e4 3521{
6b4d0b27 3522 struct file *res;
1da177e4 3523 struct inode *inode;
2c48b9c4 3524 struct path path;
3451538a 3525 struct super_block *sb;
1da177e4
LT
3526 struct qstr this;
3527
3528 if (IS_ERR(shm_mnt))
6b4d0b27 3529 return ERR_CAST(shm_mnt);
1da177e4 3530
285b2c4f 3531 if (size < 0 || size > MAX_LFS_FILESIZE)
1da177e4
LT
3532 return ERR_PTR(-EINVAL);
3533
3534 if (shmem_acct_size(flags, size))
3535 return ERR_PTR(-ENOMEM);
3536
6b4d0b27 3537 res = ERR_PTR(-ENOMEM);
1da177e4
LT
3538 this.name = name;
3539 this.len = strlen(name);
3540 this.hash = 0; /* will go */
3451538a 3541 sb = shm_mnt->mnt_sb;
66ee4b88 3542 path.mnt = mntget(shm_mnt);
3451538a 3543 path.dentry = d_alloc_pseudo(sb, &this);
2c48b9c4 3544 if (!path.dentry)
1da177e4 3545 goto put_memory;
3451538a 3546 d_set_d_op(path.dentry, &anon_ops);
1da177e4 3547
6b4d0b27 3548 res = ERR_PTR(-ENOSPC);
3451538a 3549 inode = shmem_get_inode(sb, NULL, S_IFREG | S_IRWXUGO, 0, flags);
1da177e4 3550 if (!inode)
66ee4b88 3551 goto put_memory;
1da177e4 3552
c7277090 3553 inode->i_flags |= i_flags;
2c48b9c4 3554 d_instantiate(path.dentry, inode);
1da177e4 3555 inode->i_size = size;
6d6b77f1 3556 clear_nlink(inode); /* It is unlinked */
26567cdb
AV
3557 res = ERR_PTR(ramfs_nommu_expand_for_mapping(inode, size));
3558 if (IS_ERR(res))
66ee4b88 3559 goto put_path;
4b42af81 3560
6b4d0b27 3561 res = alloc_file(&path, FMODE_WRITE | FMODE_READ,
4b42af81 3562 &shmem_file_operations);
6b4d0b27 3563 if (IS_ERR(res))
66ee4b88 3564 goto put_path;
4b42af81 3565
6b4d0b27 3566 return res;
1da177e4 3567
1da177e4
LT
3568put_memory:
3569 shmem_unacct_size(flags, size);
66ee4b88
KK
3570put_path:
3571 path_put(&path);
6b4d0b27 3572 return res;
1da177e4 3573}
c7277090
EP
3574
3575/**
3576 * shmem_kernel_file_setup - get an unlinked file living in tmpfs which must be
3577 * kernel internal. There will be NO LSM permission checks against the
3578 * underlying inode. So users of this interface must do LSM checks at a
e1832f29
SS
3579 * higher layer. The users are the big_key and shm implementations. LSM
3580 * checks are provided at the key or shm level rather than the inode.
c7277090
EP
3581 * @name: name for dentry (to be seen in /proc/<pid>/maps
3582 * @size: size to be set for the file
3583 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
3584 */
3585struct file *shmem_kernel_file_setup(const char *name, loff_t size, unsigned long flags)
3586{
3587 return __shmem_file_setup(name, size, flags, S_PRIVATE);
3588}
3589
3590/**
3591 * shmem_file_setup - get an unlinked file living in tmpfs
3592 * @name: name for dentry (to be seen in /proc/<pid>/maps
3593 * @size: size to be set for the file
3594 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
3595 */
3596struct file *shmem_file_setup(const char *name, loff_t size, unsigned long flags)
3597{
3598 return __shmem_file_setup(name, size, flags, 0);
3599}
395e0ddc 3600EXPORT_SYMBOL_GPL(shmem_file_setup);
1da177e4 3601
46711810 3602/**
1da177e4 3603 * shmem_zero_setup - setup a shared anonymous mapping
1da177e4
LT
3604 * @vma: the vma to be mmapped is prepared by do_mmap_pgoff
3605 */
3606int shmem_zero_setup(struct vm_area_struct *vma)
3607{
3608 struct file *file;
3609 loff_t size = vma->vm_end - vma->vm_start;
3610
66fc1303
HD
3611 /*
3612 * Cloning a new file under mmap_sem leads to a lock ordering conflict
3613 * between XFS directory reading and selinux: since this file is only
3614 * accessible to the user through its mapping, use S_PRIVATE flag to
3615 * bypass file security, in the same way as shmem_kernel_file_setup().
3616 */
3617 file = __shmem_file_setup("dev/zero", size, vma->vm_flags, S_PRIVATE);
1da177e4
LT
3618 if (IS_ERR(file))
3619 return PTR_ERR(file);
3620
3621 if (vma->vm_file)
3622 fput(vma->vm_file);
3623 vma->vm_file = file;
3624 vma->vm_ops = &shmem_vm_ops;
3625 return 0;
3626}
d9d90e5e
HD
3627
3628/**
3629 * shmem_read_mapping_page_gfp - read into page cache, using specified page allocation flags.
3630 * @mapping: the page's address_space
3631 * @index: the page index
3632 * @gfp: the page allocator flags to use if allocating
3633 *
3634 * This behaves as a tmpfs "read_cache_page_gfp(mapping, index, gfp)",
3635 * with any new page allocations done using the specified allocation flags.
3636 * But read_cache_page_gfp() uses the ->readpage() method: which does not
3637 * suit tmpfs, since it may have pages in swapcache, and needs to find those
3638 * for itself; although drivers/gpu/drm i915 and ttm rely upon this support.
3639 *
68da9f05
HD
3640 * i915_gem_object_get_pages_gtt() mixes __GFP_NORETRY | __GFP_NOWARN in
3641 * with the mapping_gfp_mask(), to avoid OOMing the machine unnecessarily.
d9d90e5e
HD
3642 */
3643struct page *shmem_read_mapping_page_gfp(struct address_space *mapping,
3644 pgoff_t index, gfp_t gfp)
3645{
68da9f05
HD
3646#ifdef CONFIG_SHMEM
3647 struct inode *inode = mapping->host;
9276aad6 3648 struct page *page;
68da9f05
HD
3649 int error;
3650
3651 BUG_ON(mapping->a_ops != &shmem_aops);
9e18eb29
ALC
3652 error = shmem_getpage_gfp(inode, index, &page, SGP_CACHE,
3653 gfp, NULL, NULL);
68da9f05
HD
3654 if (error)
3655 page = ERR_PTR(error);
3656 else
3657 unlock_page(page);
3658 return page;
3659#else
3660 /*
3661 * The tiny !SHMEM case uses ramfs without swap
3662 */
d9d90e5e 3663 return read_cache_page_gfp(mapping, index, gfp);
68da9f05 3664#endif
d9d90e5e
HD
3665}
3666EXPORT_SYMBOL_GPL(shmem_read_mapping_page_gfp);
This page took 1.217213 seconds and 5 git commands to generate.