]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/pipe.c
s390/crypto: Fix return code checking in cbc_paes_crypt()
[mirror_ubuntu-bionic-kernel.git] / fs / pipe.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/pipe.c
4 *
5 * Copyright (C) 1991, 1992, 1999 Linus Torvalds
6 */
7
8#include <linux/mm.h>
9#include <linux/file.h>
10#include <linux/poll.h>
11#include <linux/slab.h>
12#include <linux/module.h>
13#include <linux/init.h>
14#include <linux/fs.h>
35f3d14d 15#include <linux/log2.h>
1da177e4 16#include <linux/mount.h>
b502bd11 17#include <linux/magic.h>
1da177e4
LT
18#include <linux/pipe_fs_i.h>
19#include <linux/uio.h>
20#include <linux/highmem.h>
5274f052 21#include <linux/pagemap.h>
db349509 22#include <linux/audit.h>
ba719bae 23#include <linux/syscalls.h>
b492e95b 24#include <linux/fcntl.h>
d86133bd 25#include <linux/memcontrol.h>
1da177e4 26
7c0f6ba6 27#include <linux/uaccess.h>
1da177e4
LT
28#include <asm/ioctls.h>
29
599a0ac1
AV
30#include "internal.h"
31
b492e95b
JA
32/*
33 * The max size that a non-root user is allowed to grow the pipe. Can
ff9da691 34 * be set by root in /proc/sys/fs/pipe-max-size
b492e95b 35 */
ff9da691
JA
36unsigned int pipe_max_size = 1048576;
37
38/*
39 * Minimum pipe size, as required by POSIX
40 */
41unsigned int pipe_min_size = PAGE_SIZE;
b492e95b 42
759c0114
WT
43/* Maximum allocatable pages per user. Hard limit is unset by default, soft
44 * matches default values.
45 */
46unsigned long pipe_user_pages_hard;
47unsigned long pipe_user_pages_soft = PIPE_DEF_BUFFERS * INR_OPEN_CUR;
48
1da177e4
LT
49/*
50 * We use a start+len construction, which provides full use of the
51 * allocated memory.
52 * -- Florian Coosmann (FGC)
53 *
54 * Reads with count = 0 should always return 0.
55 * -- Julian Bradfield 1999-06-07.
56 *
57 * FIFOs and Pipes now generate SIGIO for both readers and writers.
58 * -- Jeremy Elson <jelson@circlemud.org> 2001-08-16
59 *
60 * pipe_read & write cleanup
61 * -- Manfred Spraul <manfred@colorfullife.com> 2002-05-09
62 */
63
61e0d47c
MS
64static void pipe_lock_nested(struct pipe_inode_info *pipe, int subclass)
65{
6447a3cf 66 if (pipe->files)
72b0d9aa 67 mutex_lock_nested(&pipe->mutex, subclass);
61e0d47c
MS
68}
69
70void pipe_lock(struct pipe_inode_info *pipe)
71{
72 /*
73 * pipe_lock() nests non-pipe inode locks (for writing to a file)
74 */
75 pipe_lock_nested(pipe, I_MUTEX_PARENT);
76}
77EXPORT_SYMBOL(pipe_lock);
78
79void pipe_unlock(struct pipe_inode_info *pipe)
80{
6447a3cf 81 if (pipe->files)
72b0d9aa 82 mutex_unlock(&pipe->mutex);
61e0d47c
MS
83}
84EXPORT_SYMBOL(pipe_unlock);
85
ebec73f4
AV
86static inline void __pipe_lock(struct pipe_inode_info *pipe)
87{
88 mutex_lock_nested(&pipe->mutex, I_MUTEX_PARENT);
89}
90
91static inline void __pipe_unlock(struct pipe_inode_info *pipe)
92{
93 mutex_unlock(&pipe->mutex);
94}
95
61e0d47c
MS
96void pipe_double_lock(struct pipe_inode_info *pipe1,
97 struct pipe_inode_info *pipe2)
98{
99 BUG_ON(pipe1 == pipe2);
100
101 if (pipe1 < pipe2) {
102 pipe_lock_nested(pipe1, I_MUTEX_PARENT);
103 pipe_lock_nested(pipe2, I_MUTEX_CHILD);
104 } else {
023d43c7
PZ
105 pipe_lock_nested(pipe2, I_MUTEX_PARENT);
106 pipe_lock_nested(pipe1, I_MUTEX_CHILD);
61e0d47c
MS
107 }
108}
109
1da177e4 110/* Drop the inode semaphore and wait for a pipe event, atomically */
3a326a2c 111void pipe_wait(struct pipe_inode_info *pipe)
1da177e4
LT
112{
113 DEFINE_WAIT(wait);
114
d79fc0fc
IM
115 /*
116 * Pipes are system-local resources, so sleeping on them
117 * is considered a noninteractive wait:
118 */
af927232 119 prepare_to_wait(&pipe->wait, &wait, TASK_INTERRUPTIBLE);
61e0d47c 120 pipe_unlock(pipe);
1da177e4 121 schedule();
3a326a2c 122 finish_wait(&pipe->wait, &wait);
61e0d47c 123 pipe_lock(pipe);
1da177e4
LT
124}
125
341b446b
IM
126static void anon_pipe_buf_release(struct pipe_inode_info *pipe,
127 struct pipe_buffer *buf)
1da177e4
LT
128{
129 struct page *page = buf->page;
130
5274f052
JA
131 /*
132 * If nobody else uses this page, and we don't already have a
133 * temporary page, let's keep track of it as a one-deep
341b446b 134 * allocation cache. (Otherwise just release our reference to it)
5274f052 135 */
341b446b 136 if (page_count(page) == 1 && !pipe->tmp_page)
923f4f23 137 pipe->tmp_page = page;
341b446b 138 else
09cbfeaf 139 put_page(page);
1da177e4
LT
140}
141
d86133bd
VD
142static int anon_pipe_buf_steal(struct pipe_inode_info *pipe,
143 struct pipe_buffer *buf)
144{
145 struct page *page = buf->page;
146
147 if (page_count(page) == 1) {
c4159a75 148 if (memcg_kmem_enabled())
d86133bd 149 memcg_kmem_uncharge(page, 0);
d86133bd
VD
150 __SetPageLocked(page);
151 return 0;
152 }
153 return 1;
154}
155
0845718d 156/**
b51d63c6 157 * generic_pipe_buf_steal - attempt to take ownership of a &pipe_buffer
0845718d
JA
158 * @pipe: the pipe that the buffer belongs to
159 * @buf: the buffer to attempt to steal
160 *
161 * Description:
b51d63c6 162 * This function attempts to steal the &struct page attached to
0845718d
JA
163 * @buf. If successful, this function returns 0 and returns with
164 * the page locked. The caller may then reuse the page for whatever
b51d63c6 165 * he wishes; the typical use is insertion into a different file
0845718d
JA
166 * page cache.
167 */
330ab716
JA
168int generic_pipe_buf_steal(struct pipe_inode_info *pipe,
169 struct pipe_buffer *buf)
5abc97aa 170{
46e678c9
JA
171 struct page *page = buf->page;
172
0845718d
JA
173 /*
174 * A reference of one is golden, that means that the owner of this
175 * page is the only one holding a reference to it. lock the page
176 * and return OK.
177 */
46e678c9 178 if (page_count(page) == 1) {
46e678c9
JA
179 lock_page(page);
180 return 0;
181 }
182
183 return 1;
5abc97aa 184}
51921cb7 185EXPORT_SYMBOL(generic_pipe_buf_steal);
5abc97aa 186
0845718d 187/**
b51d63c6 188 * generic_pipe_buf_get - get a reference to a &struct pipe_buffer
0845718d
JA
189 * @pipe: the pipe that the buffer belongs to
190 * @buf: the buffer to get a reference to
191 *
192 * Description:
193 * This function grabs an extra reference to @buf. It's used in
194 * in the tee() system call, when we duplicate the buffers in one
195 * pipe into another.
196 */
197void generic_pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf)
70524490 198{
09cbfeaf 199 get_page(buf->page);
70524490 200}
51921cb7 201EXPORT_SYMBOL(generic_pipe_buf_get);
70524490 202
0845718d
JA
203/**
204 * generic_pipe_buf_confirm - verify contents of the pipe buffer
79685b8d 205 * @info: the pipe that the buffer belongs to
0845718d
JA
206 * @buf: the buffer to confirm
207 *
208 * Description:
209 * This function does nothing, because the generic pipe code uses
210 * pages that are always good when inserted into the pipe.
211 */
cac36bb0
JA
212int generic_pipe_buf_confirm(struct pipe_inode_info *info,
213 struct pipe_buffer *buf)
f84d7519
JA
214{
215 return 0;
216}
51921cb7 217EXPORT_SYMBOL(generic_pipe_buf_confirm);
f84d7519 218
6818173b
MS
219/**
220 * generic_pipe_buf_release - put a reference to a &struct pipe_buffer
221 * @pipe: the pipe that the buffer belongs to
222 * @buf: the buffer to put a reference to
223 *
224 * Description:
225 * This function releases a reference to @buf.
226 */
227void generic_pipe_buf_release(struct pipe_inode_info *pipe,
228 struct pipe_buffer *buf)
229{
09cbfeaf 230 put_page(buf->page);
6818173b 231}
51921cb7 232EXPORT_SYMBOL(generic_pipe_buf_release);
6818173b 233
d4c3cca9 234static const struct pipe_buf_operations anon_pipe_buf_ops = {
1da177e4 235 .can_merge = 1,
cac36bb0 236 .confirm = generic_pipe_buf_confirm,
1da177e4 237 .release = anon_pipe_buf_release,
d86133bd 238 .steal = anon_pipe_buf_steal,
f84d7519 239 .get = generic_pipe_buf_get,
1da177e4
LT
240};
241
9883035a
LT
242static const struct pipe_buf_operations packet_pipe_buf_ops = {
243 .can_merge = 0,
9883035a
LT
244 .confirm = generic_pipe_buf_confirm,
245 .release = anon_pipe_buf_release,
d86133bd 246 .steal = anon_pipe_buf_steal,
9883035a
LT
247 .get = generic_pipe_buf_get,
248};
249
1da177e4 250static ssize_t
fb9096a3 251pipe_read(struct kiocb *iocb, struct iov_iter *to)
1da177e4 252{
fb9096a3 253 size_t total_len = iov_iter_count(to);
ee0b3e67 254 struct file *filp = iocb->ki_filp;
de32ec4c 255 struct pipe_inode_info *pipe = filp->private_data;
1da177e4
LT
256 int do_wakeup;
257 ssize_t ret;
1da177e4 258
1da177e4
LT
259 /* Null read succeeds. */
260 if (unlikely(total_len == 0))
261 return 0;
262
263 do_wakeup = 0;
264 ret = 0;
ebec73f4 265 __pipe_lock(pipe);
1da177e4 266 for (;;) {
923f4f23 267 int bufs = pipe->nrbufs;
1da177e4 268 if (bufs) {
923f4f23
IM
269 int curbuf = pipe->curbuf;
270 struct pipe_buffer *buf = pipe->bufs + curbuf;
1da177e4 271 size_t chars = buf->len;
637b58c2
AV
272 size_t written;
273 int error;
1da177e4
LT
274
275 if (chars > total_len)
276 chars = total_len;
277
fba597db 278 error = pipe_buf_confirm(pipe, buf);
f84d7519 279 if (error) {
5274f052 280 if (!ret)
e5953cbd 281 ret = error;
5274f052
JA
282 break;
283 }
f84d7519 284
fb9096a3 285 written = copy_page_to_iter(buf->page, buf->offset, chars, to);
637b58c2 286 if (unlikely(written < chars)) {
341b446b 287 if (!ret)
637b58c2 288 ret = -EFAULT;
1da177e4
LT
289 break;
290 }
291 ret += chars;
292 buf->offset += chars;
293 buf->len -= chars;
9883035a
LT
294
295 /* Was it a packet buffer? Clean up and exit */
296 if (buf->flags & PIPE_BUF_FLAG_PACKET) {
297 total_len = chars;
298 buf->len = 0;
299 }
300
1da177e4 301 if (!buf->len) {
a779638c 302 pipe_buf_release(pipe, buf);
35f3d14d 303 curbuf = (curbuf + 1) & (pipe->buffers - 1);
923f4f23
IM
304 pipe->curbuf = curbuf;
305 pipe->nrbufs = --bufs;
1da177e4
LT
306 do_wakeup = 1;
307 }
308 total_len -= chars;
309 if (!total_len)
310 break; /* common path: read succeeded */
311 }
312 if (bufs) /* More to do? */
313 continue;
923f4f23 314 if (!pipe->writers)
1da177e4 315 break;
923f4f23 316 if (!pipe->waiting_writers) {
1da177e4
LT
317 /* syscall merging: Usually we must not sleep
318 * if O_NONBLOCK is set, or if we got some data.
319 * But if a writer sleeps in kernel space, then
320 * we can wait for that data without violating POSIX.
321 */
322 if (ret)
323 break;
324 if (filp->f_flags & O_NONBLOCK) {
325 ret = -EAGAIN;
326 break;
327 }
328 }
329 if (signal_pending(current)) {
341b446b
IM
330 if (!ret)
331 ret = -ERESTARTSYS;
1da177e4
LT
332 break;
333 }
334 if (do_wakeup) {
28e58ee8 335 wake_up_interruptible_sync_poll(&pipe->wait, POLLOUT | POLLWRNORM);
923f4f23 336 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
1da177e4 337 }
923f4f23 338 pipe_wait(pipe);
1da177e4 339 }
ebec73f4 340 __pipe_unlock(pipe);
341b446b
IM
341
342 /* Signal writers asynchronously that there is more room. */
1da177e4 343 if (do_wakeup) {
28e58ee8 344 wake_up_interruptible_sync_poll(&pipe->wait, POLLOUT | POLLWRNORM);
923f4f23 345 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
1da177e4
LT
346 }
347 if (ret > 0)
348 file_accessed(filp);
349 return ret;
350}
351
9883035a
LT
352static inline int is_packetized(struct file *file)
353{
354 return (file->f_flags & O_DIRECT) != 0;
355}
356
1da177e4 357static ssize_t
f0d1bec9 358pipe_write(struct kiocb *iocb, struct iov_iter *from)
1da177e4 359{
ee0b3e67 360 struct file *filp = iocb->ki_filp;
de32ec4c 361 struct pipe_inode_info *pipe = filp->private_data;
f0d1bec9
AV
362 ssize_t ret = 0;
363 int do_wakeup = 0;
364 size_t total_len = iov_iter_count(from);
1da177e4
LT
365 ssize_t chars;
366
1da177e4
LT
367 /* Null write succeeds. */
368 if (unlikely(total_len == 0))
369 return 0;
370
ebec73f4 371 __pipe_lock(pipe);
1da177e4 372
923f4f23 373 if (!pipe->readers) {
1da177e4
LT
374 send_sig(SIGPIPE, current, 0);
375 ret = -EPIPE;
376 goto out;
377 }
378
379 /* We try to merge small writes */
380 chars = total_len & (PAGE_SIZE-1); /* size of the last buffer */
923f4f23 381 if (pipe->nrbufs && chars != 0) {
341b446b 382 int lastbuf = (pipe->curbuf + pipe->nrbufs - 1) &
35f3d14d 383 (pipe->buffers - 1);
923f4f23 384 struct pipe_buffer *buf = pipe->bufs + lastbuf;
1da177e4 385 int offset = buf->offset + buf->len;
341b446b 386
fba597db
MS
387 if (buf->ops->can_merge && offset + chars <= PAGE_SIZE) {
388 ret = pipe_buf_confirm(pipe, buf);
6ae08069 389 if (ret)
5274f052 390 goto out;
f84d7519 391
f0d1bec9
AV
392 ret = copy_page_from_iter(buf->page, offset, chars, from);
393 if (unlikely(ret < chars)) {
6ae08069 394 ret = -EFAULT;
1da177e4 395 goto out;
f6762b7a 396 }
f0d1bec9 397 do_wakeup = 1;
6ae08069 398 buf->len += ret;
f0d1bec9 399 if (!iov_iter_count(from))
1da177e4
LT
400 goto out;
401 }
402 }
403
404 for (;;) {
405 int bufs;
341b446b 406
923f4f23 407 if (!pipe->readers) {
1da177e4 408 send_sig(SIGPIPE, current, 0);
341b446b
IM
409 if (!ret)
410 ret = -EPIPE;
1da177e4
LT
411 break;
412 }
923f4f23 413 bufs = pipe->nrbufs;
35f3d14d
JA
414 if (bufs < pipe->buffers) {
415 int newbuf = (pipe->curbuf + bufs) & (pipe->buffers-1);
923f4f23
IM
416 struct pipe_buffer *buf = pipe->bufs + newbuf;
417 struct page *page = pipe->tmp_page;
f0d1bec9 418 int copied;
1da177e4
LT
419
420 if (!page) {
d86133bd 421 page = alloc_page(GFP_HIGHUSER | __GFP_ACCOUNT);
1da177e4
LT
422 if (unlikely(!page)) {
423 ret = ret ? : -ENOMEM;
424 break;
425 }
923f4f23 426 pipe->tmp_page = page;
1da177e4 427 }
341b446b 428 /* Always wake up, even if the copy fails. Otherwise
1da177e4
LT
429 * we lock up (O_NONBLOCK-)readers that sleep due to
430 * syscall merging.
431 * FIXME! Is this really true?
432 */
433 do_wakeup = 1;
f0d1bec9
AV
434 copied = copy_page_from_iter(page, 0, PAGE_SIZE, from);
435 if (unlikely(copied < PAGE_SIZE && iov_iter_count(from))) {
341b446b 436 if (!ret)
f0d1bec9 437 ret = -EFAULT;
1da177e4
LT
438 break;
439 }
f0d1bec9 440 ret += copied;
1da177e4
LT
441
442 /* Insert it into the buffer array */
443 buf->page = page;
444 buf->ops = &anon_pipe_buf_ops;
445 buf->offset = 0;
f0d1bec9 446 buf->len = copied;
9883035a
LT
447 buf->flags = 0;
448 if (is_packetized(filp)) {
449 buf->ops = &packet_pipe_buf_ops;
450 buf->flags = PIPE_BUF_FLAG_PACKET;
451 }
923f4f23
IM
452 pipe->nrbufs = ++bufs;
453 pipe->tmp_page = NULL;
1da177e4 454
f0d1bec9 455 if (!iov_iter_count(from))
1da177e4
LT
456 break;
457 }
35f3d14d 458 if (bufs < pipe->buffers)
1da177e4
LT
459 continue;
460 if (filp->f_flags & O_NONBLOCK) {
341b446b
IM
461 if (!ret)
462 ret = -EAGAIN;
1da177e4
LT
463 break;
464 }
465 if (signal_pending(current)) {
341b446b
IM
466 if (!ret)
467 ret = -ERESTARTSYS;
1da177e4
LT
468 break;
469 }
470 if (do_wakeup) {
28e58ee8 471 wake_up_interruptible_sync_poll(&pipe->wait, POLLIN | POLLRDNORM);
923f4f23 472 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
1da177e4
LT
473 do_wakeup = 0;
474 }
923f4f23
IM
475 pipe->waiting_writers++;
476 pipe_wait(pipe);
477 pipe->waiting_writers--;
1da177e4
LT
478 }
479out:
ebec73f4 480 __pipe_unlock(pipe);
1da177e4 481 if (do_wakeup) {
28e58ee8 482 wake_up_interruptible_sync_poll(&pipe->wait, POLLIN | POLLRDNORM);
923f4f23 483 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
1da177e4 484 }
7e775f46 485 if (ret > 0 && sb_start_write_trylock(file_inode(filp)->i_sb)) {
c3b2da31
JB
486 int err = file_update_time(filp);
487 if (err)
488 ret = err;
7e775f46 489 sb_end_write(file_inode(filp)->i_sb);
c3b2da31 490 }
1da177e4
LT
491 return ret;
492}
493
d59d0b1b 494static long pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
1da177e4 495{
de32ec4c 496 struct pipe_inode_info *pipe = filp->private_data;
1da177e4
LT
497 int count, buf, nrbufs;
498
499 switch (cmd) {
500 case FIONREAD:
ebec73f4 501 __pipe_lock(pipe);
1da177e4 502 count = 0;
923f4f23
IM
503 buf = pipe->curbuf;
504 nrbufs = pipe->nrbufs;
1da177e4 505 while (--nrbufs >= 0) {
923f4f23 506 count += pipe->bufs[buf].len;
35f3d14d 507 buf = (buf+1) & (pipe->buffers - 1);
1da177e4 508 }
ebec73f4 509 __pipe_unlock(pipe);
923f4f23 510
1da177e4
LT
511 return put_user(count, (int __user *)arg);
512 default:
46ce341b 513 return -ENOIOCTLCMD;
1da177e4
LT
514 }
515}
516
517/* No kernel lock held - fine */
518static unsigned int
519pipe_poll(struct file *filp, poll_table *wait)
520{
521 unsigned int mask;
de32ec4c 522 struct pipe_inode_info *pipe = filp->private_data;
1da177e4
LT
523 int nrbufs;
524
923f4f23 525 poll_wait(filp, &pipe->wait, wait);
1da177e4
LT
526
527 /* Reading only -- no need for acquiring the semaphore. */
923f4f23 528 nrbufs = pipe->nrbufs;
1da177e4
LT
529 mask = 0;
530 if (filp->f_mode & FMODE_READ) {
531 mask = (nrbufs > 0) ? POLLIN | POLLRDNORM : 0;
923f4f23 532 if (!pipe->writers && filp->f_version != pipe->w_counter)
1da177e4
LT
533 mask |= POLLHUP;
534 }
535
536 if (filp->f_mode & FMODE_WRITE) {
35f3d14d 537 mask |= (nrbufs < pipe->buffers) ? POLLOUT | POLLWRNORM : 0;
5e5d7a22
PE
538 /*
539 * Most Unices do not set POLLERR for FIFOs but on Linux they
540 * behave exactly like pipes for poll().
541 */
923f4f23 542 if (!pipe->readers)
1da177e4
LT
543 mask |= POLLERR;
544 }
545
546 return mask;
547}
548
b0d8d229
LT
549static void put_pipe_info(struct inode *inode, struct pipe_inode_info *pipe)
550{
551 int kill = 0;
552
553 spin_lock(&inode->i_lock);
554 if (!--pipe->files) {
555 inode->i_pipe = NULL;
556 kill = 1;
557 }
558 spin_unlock(&inode->i_lock);
559
560 if (kill)
561 free_pipe_info(pipe);
562}
563
1da177e4 564static int
599a0ac1 565pipe_release(struct inode *inode, struct file *file)
1da177e4 566{
b0d8d229 567 struct pipe_inode_info *pipe = file->private_data;
923f4f23 568
ebec73f4 569 __pipe_lock(pipe);
599a0ac1
AV
570 if (file->f_mode & FMODE_READ)
571 pipe->readers--;
572 if (file->f_mode & FMODE_WRITE)
573 pipe->writers--;
341b446b 574
ba5bb147 575 if (pipe->readers || pipe->writers) {
28e58ee8 576 wake_up_interruptible_sync_poll(&pipe->wait, POLLIN | POLLOUT | POLLRDNORM | POLLWRNORM | POLLERR | POLLHUP);
923f4f23
IM
577 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
578 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
1da177e4 579 }
ebec73f4 580 __pipe_unlock(pipe);
ba5bb147 581
b0d8d229 582 put_pipe_info(inode, pipe);
1da177e4
LT
583 return 0;
584}
585
586static int
599a0ac1 587pipe_fasync(int fd, struct file *filp, int on)
1da177e4 588{
de32ec4c 589 struct pipe_inode_info *pipe = filp->private_data;
599a0ac1 590 int retval = 0;
1da177e4 591
ebec73f4 592 __pipe_lock(pipe);
599a0ac1
AV
593 if (filp->f_mode & FMODE_READ)
594 retval = fasync_helper(fd, filp, on, &pipe->fasync_readers);
595 if ((filp->f_mode & FMODE_WRITE) && retval >= 0) {
341b446b 596 retval = fasync_helper(fd, filp, on, &pipe->fasync_writers);
599a0ac1
AV
597 if (retval < 0 && (filp->f_mode & FMODE_READ))
598 /* this can happen only if on == T */
e5bc49ba
ON
599 fasync_helper(-1, filp, 0, &pipe->fasync_readers);
600 }
ebec73f4 601 __pipe_unlock(pipe);
60aa4924 602 return retval;
1da177e4
LT
603}
604
9c87bcf0 605static unsigned long account_pipe_buffers(struct user_struct *user,
759c0114
WT
606 unsigned long old, unsigned long new)
607{
9c87bcf0 608 return atomic_long_add_return(new - old, &user->pipe_bufs);
759c0114
WT
609}
610
9c87bcf0 611static bool too_many_pipe_buffers_soft(unsigned long user_bufs)
759c0114 612{
a39debee 613 return pipe_user_pages_soft && user_bufs > pipe_user_pages_soft;
759c0114
WT
614}
615
9c87bcf0 616static bool too_many_pipe_buffers_hard(unsigned long user_bufs)
759c0114 617{
a39debee 618 return pipe_user_pages_hard && user_bufs > pipe_user_pages_hard;
759c0114
WT
619}
620
93a91c50
EB
621static bool is_unprivileged_user(void)
622{
623 return !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN);
624}
625
7bee130e 626struct pipe_inode_info *alloc_pipe_info(void)
3a326a2c 627{
923f4f23 628 struct pipe_inode_info *pipe;
09b4d199
MK
629 unsigned long pipe_bufs = PIPE_DEF_BUFFERS;
630 struct user_struct *user = get_current_user();
9c87bcf0 631 unsigned long user_bufs;
3a326a2c 632
d86133bd 633 pipe = kzalloc(sizeof(struct pipe_inode_info), GFP_KERNEL_ACCOUNT);
09b4d199
MK
634 if (pipe == NULL)
635 goto out_free_uid;
636
086e774a
MK
637 if (pipe_bufs * PAGE_SIZE > pipe_max_size && !capable(CAP_SYS_RESOURCE))
638 pipe_bufs = pipe_max_size >> PAGE_SHIFT;
639
9c87bcf0 640 user_bufs = account_pipe_buffers(user, 0, pipe_bufs);
a005ca0e 641
93a91c50 642 if (too_many_pipe_buffers_soft(user_bufs) && is_unprivileged_user()) {
9c87bcf0 643 user_bufs = account_pipe_buffers(user, pipe_bufs, 1);
a005ca0e 644 pipe_bufs = 1;
09b4d199 645 }
759c0114 646
93a91c50 647 if (too_many_pipe_buffers_hard(user_bufs) && is_unprivileged_user())
a005ca0e
MK
648 goto out_revert_acct;
649
650 pipe->bufs = kcalloc(pipe_bufs, sizeof(struct pipe_buffer),
651 GFP_KERNEL_ACCOUNT);
652
09b4d199
MK
653 if (pipe->bufs) {
654 init_waitqueue_head(&pipe->wait);
655 pipe->r_counter = pipe->w_counter = 1;
656 pipe->buffers = pipe_bufs;
657 pipe->user = user;
09b4d199
MK
658 mutex_init(&pipe->mutex);
659 return pipe;
3a326a2c
IM
660 }
661
a005ca0e 662out_revert_acct:
9c87bcf0 663 (void) account_pipe_buffers(user, pipe_bufs, 0);
09b4d199
MK
664 kfree(pipe);
665out_free_uid:
666 free_uid(user);
35f3d14d 667 return NULL;
3a326a2c
IM
668}
669
4b8a8f1e 670void free_pipe_info(struct pipe_inode_info *pipe)
1da177e4
LT
671{
672 int i;
1da177e4 673
9c87bcf0 674 (void) account_pipe_buffers(pipe->user, pipe->buffers, 0);
759c0114 675 free_uid(pipe->user);
35f3d14d 676 for (i = 0; i < pipe->buffers; i++) {
923f4f23 677 struct pipe_buffer *buf = pipe->bufs + i;
1da177e4 678 if (buf->ops)
a779638c 679 pipe_buf_release(pipe, buf);
1da177e4 680 }
923f4f23
IM
681 if (pipe->tmp_page)
682 __free_page(pipe->tmp_page);
35f3d14d 683 kfree(pipe->bufs);
923f4f23 684 kfree(pipe);
1da177e4
LT
685}
686
fa3536cc 687static struct vfsmount *pipe_mnt __read_mostly;
341b446b 688
c23fbb6b
ED
689/*
690 * pipefs_dname() is called from d_path().
691 */
692static char *pipefs_dname(struct dentry *dentry, char *buffer, int buflen)
693{
694 return dynamic_dname(dentry, buffer, buflen, "pipe:[%lu]",
75c3cfa8 695 d_inode(dentry)->i_ino);
c23fbb6b
ED
696}
697
3ba13d17 698static const struct dentry_operations pipefs_dentry_operations = {
c23fbb6b 699 .d_dname = pipefs_dname,
1da177e4
LT
700};
701
702static struct inode * get_pipe_inode(void)
703{
a209dfc7 704 struct inode *inode = new_inode_pseudo(pipe_mnt->mnt_sb);
923f4f23 705 struct pipe_inode_info *pipe;
1da177e4
LT
706
707 if (!inode)
708 goto fail_inode;
709
85fe4025
CH
710 inode->i_ino = get_next_ino();
711
7bee130e 712 pipe = alloc_pipe_info();
923f4f23 713 if (!pipe)
1da177e4 714 goto fail_iput;
3a326a2c 715
ba5bb147
AV
716 inode->i_pipe = pipe;
717 pipe->files = 2;
923f4f23 718 pipe->readers = pipe->writers = 1;
599a0ac1 719 inode->i_fop = &pipefifo_fops;
1da177e4
LT
720
721 /*
722 * Mark the inode dirty from the very beginning,
723 * that way it will never be moved to the dirty
724 * list because "mark_inode_dirty()" will think
725 * that it already _is_ on the dirty list.
726 */
727 inode->i_state = I_DIRTY;
728 inode->i_mode = S_IFIFO | S_IRUSR | S_IWUSR;
da9592ed
DH
729 inode->i_uid = current_fsuid();
730 inode->i_gid = current_fsgid();
078cd827 731 inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode);
923f4f23 732
1da177e4
LT
733 return inode;
734
735fail_iput:
736 iput(inode);
341b446b 737
1da177e4
LT
738fail_inode:
739 return NULL;
740}
741
e4fad8e5 742int create_pipe_files(struct file **res, int flags)
1da177e4 743{
d6cbd281 744 int err;
e4fad8e5 745 struct inode *inode = get_pipe_inode();
d6cbd281 746 struct file *f;
2c48b9c4 747 struct path path;
1da177e4 748
1da177e4 749 if (!inode)
e4fad8e5 750 return -ENFILE;
1da177e4 751
d6cbd281 752 err = -ENOMEM;
cdf01226 753 path.dentry = d_alloc_pseudo(pipe_mnt->mnt_sb, &empty_name);
2c48b9c4 754 if (!path.dentry)
d6cbd281 755 goto err_inode;
2c48b9c4 756 path.mnt = mntget(pipe_mnt);
341b446b 757
2c48b9c4 758 d_instantiate(path.dentry, inode);
430e285e 759
599a0ac1 760 f = alloc_file(&path, FMODE_WRITE, &pipefifo_fops);
e9bb1f9b
EB
761 if (IS_ERR(f)) {
762 err = PTR_ERR(f);
430e285e 763 goto err_dentry;
e9bb1f9b 764 }
341b446b 765
9883035a 766 f->f_flags = O_WRONLY | (flags & (O_NONBLOCK | O_DIRECT));
de32ec4c 767 f->private_data = inode->i_pipe;
d6cbd281 768
599a0ac1 769 res[0] = alloc_file(&path, FMODE_READ, &pipefifo_fops);
e9bb1f9b
EB
770 if (IS_ERR(res[0])) {
771 err = PTR_ERR(res[0]);
e4fad8e5 772 goto err_file;
e9bb1f9b 773 }
e4fad8e5
AV
774
775 path_get(&path);
de32ec4c 776 res[0]->private_data = inode->i_pipe;
e4fad8e5
AV
777 res[0]->f_flags = O_RDONLY | (flags & O_NONBLOCK);
778 res[1] = f;
779 return 0;
1da177e4 780
e4fad8e5
AV
781err_file:
782 put_filp(f);
783err_dentry:
4b8a8f1e 784 free_pipe_info(inode->i_pipe);
2c48b9c4 785 path_put(&path);
e4fad8e5 786 return err;
ed152437 787
e4fad8e5 788err_inode:
4b8a8f1e 789 free_pipe_info(inode->i_pipe);
1da177e4 790 iput(inode);
e4fad8e5 791 return err;
d6cbd281
AK
792}
793
5b249b1b 794static int __do_pipe_flags(int *fd, struct file **files, int flags)
d6cbd281 795{
d6cbd281
AK
796 int error;
797 int fdw, fdr;
798
9883035a 799 if (flags & ~(O_CLOEXEC | O_NONBLOCK | O_DIRECT))
ed8cae8b
UD
800 return -EINVAL;
801
e4fad8e5
AV
802 error = create_pipe_files(files, flags);
803 if (error)
804 return error;
d6cbd281 805
ed8cae8b 806 error = get_unused_fd_flags(flags);
d6cbd281
AK
807 if (error < 0)
808 goto err_read_pipe;
809 fdr = error;
810
ed8cae8b 811 error = get_unused_fd_flags(flags);
d6cbd281
AK
812 if (error < 0)
813 goto err_fdr;
814 fdw = error;
815
157cf649 816 audit_fd_pair(fdr, fdw);
d6cbd281
AK
817 fd[0] = fdr;
818 fd[1] = fdw;
d6cbd281
AK
819 return 0;
820
821 err_fdr:
822 put_unused_fd(fdr);
823 err_read_pipe:
e4fad8e5
AV
824 fput(files[0]);
825 fput(files[1]);
d6cbd281 826 return error;
1da177e4
LT
827}
828
5b249b1b
AV
829int do_pipe_flags(int *fd, int flags)
830{
831 struct file *files[2];
832 int error = __do_pipe_flags(fd, files, flags);
833 if (!error) {
834 fd_install(fd[0], files[0]);
835 fd_install(fd[1], files[1]);
836 }
837 return error;
838}
839
d35c7b0e
UD
840/*
841 * sys_pipe() is the normal C calling standard for creating
842 * a pipe. It's not the way Unix traditionally does this, though.
843 */
d4e82042 844SYSCALL_DEFINE2(pipe2, int __user *, fildes, int, flags)
d35c7b0e 845{
5b249b1b 846 struct file *files[2];
d35c7b0e
UD
847 int fd[2];
848 int error;
849
5b249b1b 850 error = __do_pipe_flags(fd, files, flags);
d35c7b0e 851 if (!error) {
5b249b1b
AV
852 if (unlikely(copy_to_user(fildes, fd, sizeof(fd)))) {
853 fput(files[0]);
854 fput(files[1]);
855 put_unused_fd(fd[0]);
856 put_unused_fd(fd[1]);
d35c7b0e 857 error = -EFAULT;
5b249b1b
AV
858 } else {
859 fd_install(fd[0], files[0]);
860 fd_install(fd[1], files[1]);
ba719bae 861 }
d35c7b0e
UD
862 }
863 return error;
864}
865
2b664219 866SYSCALL_DEFINE1(pipe, int __user *, fildes)
ed8cae8b
UD
867{
868 return sys_pipe2(fildes, 0);
869}
870
fc7478a2 871static int wait_for_partner(struct pipe_inode_info *pipe, unsigned int *cnt)
f776c738
AV
872{
873 int cur = *cnt;
874
875 while (cur == *cnt) {
fc7478a2 876 pipe_wait(pipe);
f776c738
AV
877 if (signal_pending(current))
878 break;
879 }
880 return cur == *cnt ? -ERESTARTSYS : 0;
881}
882
fc7478a2 883static void wake_up_partner(struct pipe_inode_info *pipe)
f776c738 884{
fc7478a2 885 wake_up_interruptible(&pipe->wait);
f776c738
AV
886}
887
888static int fifo_open(struct inode *inode, struct file *filp)
889{
890 struct pipe_inode_info *pipe;
599a0ac1 891 bool is_pipe = inode->i_sb->s_magic == PIPEFS_MAGIC;
f776c738
AV
892 int ret;
893
ba5bb147
AV
894 filp->f_version = 0;
895
896 spin_lock(&inode->i_lock);
897 if (inode->i_pipe) {
898 pipe = inode->i_pipe;
899 pipe->files++;
900 spin_unlock(&inode->i_lock);
901 } else {
902 spin_unlock(&inode->i_lock);
7bee130e 903 pipe = alloc_pipe_info();
f776c738 904 if (!pipe)
ba5bb147
AV
905 return -ENOMEM;
906 pipe->files = 1;
907 spin_lock(&inode->i_lock);
908 if (unlikely(inode->i_pipe)) {
909 inode->i_pipe->files++;
910 spin_unlock(&inode->i_lock);
4b8a8f1e 911 free_pipe_info(pipe);
ba5bb147
AV
912 pipe = inode->i_pipe;
913 } else {
914 inode->i_pipe = pipe;
915 spin_unlock(&inode->i_lock);
916 }
f776c738 917 }
de32ec4c 918 filp->private_data = pipe;
ba5bb147
AV
919 /* OK, we have a pipe and it's pinned down */
920
ebec73f4 921 __pipe_lock(pipe);
f776c738
AV
922
923 /* We can only do regular read/write on fifos */
924 filp->f_mode &= (FMODE_READ | FMODE_WRITE);
925
926 switch (filp->f_mode) {
927 case FMODE_READ:
928 /*
929 * O_RDONLY
930 * POSIX.1 says that O_NONBLOCK means return with the FIFO
931 * opened, even when there is no process writing the FIFO.
932 */
f776c738
AV
933 pipe->r_counter++;
934 if (pipe->readers++ == 0)
fc7478a2 935 wake_up_partner(pipe);
f776c738 936
599a0ac1 937 if (!is_pipe && !pipe->writers) {
f776c738
AV
938 if ((filp->f_flags & O_NONBLOCK)) {
939 /* suppress POLLHUP until we have
940 * seen a writer */
941 filp->f_version = pipe->w_counter;
942 } else {
fc7478a2 943 if (wait_for_partner(pipe, &pipe->w_counter))
f776c738
AV
944 goto err_rd;
945 }
946 }
947 break;
948
949 case FMODE_WRITE:
950 /*
951 * O_WRONLY
952 * POSIX.1 says that O_NONBLOCK means return -1 with
953 * errno=ENXIO when there is no process reading the FIFO.
954 */
955 ret = -ENXIO;
599a0ac1 956 if (!is_pipe && (filp->f_flags & O_NONBLOCK) && !pipe->readers)
f776c738
AV
957 goto err;
958
f776c738
AV
959 pipe->w_counter++;
960 if (!pipe->writers++)
fc7478a2 961 wake_up_partner(pipe);
f776c738 962
599a0ac1 963 if (!is_pipe && !pipe->readers) {
fc7478a2 964 if (wait_for_partner(pipe, &pipe->r_counter))
f776c738
AV
965 goto err_wr;
966 }
967 break;
968
969 case FMODE_READ | FMODE_WRITE:
970 /*
971 * O_RDWR
972 * POSIX.1 leaves this case "undefined" when O_NONBLOCK is set.
973 * This implementation will NEVER block on a O_RDWR open, since
974 * the process can at least talk to itself.
975 */
f776c738
AV
976
977 pipe->readers++;
978 pipe->writers++;
979 pipe->r_counter++;
980 pipe->w_counter++;
981 if (pipe->readers == 1 || pipe->writers == 1)
fc7478a2 982 wake_up_partner(pipe);
f776c738
AV
983 break;
984
985 default:
986 ret = -EINVAL;
987 goto err;
988 }
989
990 /* Ok! */
ebec73f4 991 __pipe_unlock(pipe);
f776c738
AV
992 return 0;
993
994err_rd:
995 if (!--pipe->readers)
996 wake_up_interruptible(&pipe->wait);
997 ret = -ERESTARTSYS;
998 goto err;
999
1000err_wr:
1001 if (!--pipe->writers)
1002 wake_up_interruptible(&pipe->wait);
1003 ret = -ERESTARTSYS;
1004 goto err;
1005
1006err:
ebec73f4 1007 __pipe_unlock(pipe);
b0d8d229
LT
1008
1009 put_pipe_info(inode, pipe);
f776c738
AV
1010 return ret;
1011}
1012
599a0ac1
AV
1013const struct file_operations pipefifo_fops = {
1014 .open = fifo_open,
1015 .llseek = no_llseek,
fb9096a3 1016 .read_iter = pipe_read,
f0d1bec9 1017 .write_iter = pipe_write,
599a0ac1
AV
1018 .poll = pipe_poll,
1019 .unlocked_ioctl = pipe_ioctl,
1020 .release = pipe_release,
1021 .fasync = pipe_fasync,
f776c738
AV
1022};
1023
f491bd71
MK
1024/*
1025 * Currently we rely on the pipe array holding a power-of-2 number
d3f14c48 1026 * of pages. Returns 0 on error.
f491bd71 1027 */
7a8d1819 1028unsigned int round_pipe_size(unsigned int size)
f491bd71
MK
1029{
1030 unsigned long nr_pages;
1031
d3f14c48
JL
1032 if (size < pipe_min_size)
1033 size = pipe_min_size;
1034
f491bd71 1035 nr_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
d3f14c48
JL
1036 if (nr_pages == 0)
1037 return 0;
1038
f491bd71
MK
1039 return roundup_pow_of_two(nr_pages) << PAGE_SHIFT;
1040}
1041
35f3d14d
JA
1042/*
1043 * Allocate a new array of pipe buffers and copy the info over. Returns the
1044 * pipe size if successful, or return -ERROR on error.
1045 */
d37d4166 1046static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg)
35f3d14d
JA
1047{
1048 struct pipe_buffer *bufs;
d37d4166 1049 unsigned int size, nr_pages;
9c87bcf0 1050 unsigned long user_bufs;
b0b91d18 1051 long ret = 0;
d37d4166
MK
1052
1053 size = round_pipe_size(arg);
d3f14c48
JL
1054 if (size == 0)
1055 return -EINVAL;
d37d4166
MK
1056 nr_pages = size >> PAGE_SHIFT;
1057
1058 if (!nr_pages)
1059 return -EINVAL;
1060
b0b91d18
MK
1061 /*
1062 * If trying to increase the pipe capacity, check that an
1063 * unprivileged user is not trying to exceed various limits
1064 * (soft limit check here, hard limit check just below).
1065 * Decreasing the pipe capacity is always permitted, even
1066 * if the user is currently over a limit.
1067 */
1068 if (nr_pages > pipe->buffers &&
1069 size > pipe_max_size && !capable(CAP_SYS_RESOURCE))
d37d4166
MK
1070 return -EPERM;
1071
9c87bcf0 1072 user_bufs = account_pipe_buffers(pipe->user, pipe->buffers, nr_pages);
b0b91d18
MK
1073
1074 if (nr_pages > pipe->buffers &&
9c87bcf0
MK
1075 (too_many_pipe_buffers_hard(user_bufs) ||
1076 too_many_pipe_buffers_soft(user_bufs)) &&
93a91c50 1077 is_unprivileged_user()) {
b0b91d18
MK
1078 ret = -EPERM;
1079 goto out_revert_acct;
1080 }
35f3d14d 1081
35f3d14d
JA
1082 /*
1083 * We can shrink the pipe, if arg >= pipe->nrbufs. Since we don't
1084 * expect a lot of shrink+grow operations, just free and allocate
1085 * again like we would do for growing. If the pipe currently
1086 * contains more buffers than arg, then return busy.
1087 */
b0b91d18
MK
1088 if (nr_pages < pipe->nrbufs) {
1089 ret = -EBUSY;
1090 goto out_revert_acct;
1091 }
35f3d14d 1092
d86133bd
VD
1093 bufs = kcalloc(nr_pages, sizeof(*bufs),
1094 GFP_KERNEL_ACCOUNT | __GFP_NOWARN);
b0b91d18
MK
1095 if (unlikely(!bufs)) {
1096 ret = -ENOMEM;
1097 goto out_revert_acct;
1098 }
35f3d14d
JA
1099
1100 /*
1101 * The pipe array wraps around, so just start the new one at zero
1102 * and adjust the indexes.
1103 */
1104 if (pipe->nrbufs) {
1d862f41
MS
1105 unsigned int tail;
1106 unsigned int head;
35f3d14d 1107
1d862f41
MS
1108 tail = pipe->curbuf + pipe->nrbufs;
1109 if (tail < pipe->buffers)
1110 tail = 0;
1111 else
1112 tail &= (pipe->buffers - 1);
1113
1114 head = pipe->nrbufs - tail;
35f3d14d
JA
1115 if (head)
1116 memcpy(bufs, pipe->bufs + pipe->curbuf, head * sizeof(struct pipe_buffer));
1117 if (tail)
1d862f41 1118 memcpy(bufs + head, pipe->bufs, tail * sizeof(struct pipe_buffer));
35f3d14d
JA
1119 }
1120
1121 pipe->curbuf = 0;
1122 kfree(pipe->bufs);
1123 pipe->bufs = bufs;
b9598db3
JA
1124 pipe->buffers = nr_pages;
1125 return nr_pages * PAGE_SIZE;
b0b91d18
MK
1126
1127out_revert_acct:
9c87bcf0 1128 (void) account_pipe_buffers(pipe->user, nr_pages, pipe->buffers);
b0b91d18 1129 return ret;
35f3d14d
JA
1130}
1131
ff9da691 1132/*
7a8d1819 1133 * This should work even if CONFIG_PROC_FS isn't set, as proc_dopipe_max_size
ff9da691
JA
1134 * will return an error.
1135 */
1136int pipe_proc_fn(struct ctl_table *table, int write, void __user *buf,
1137 size_t *lenp, loff_t *ppos)
1138{
7a8d1819 1139 return proc_dopipe_max_size(table, write, buf, lenp, ppos);
ff9da691
JA
1140}
1141
72083646
LT
1142/*
1143 * After the inode slimming patch, i_pipe/i_bdev/i_cdev share the same
1144 * location, so checking ->i_pipe is not enough to verify that this is a
1145 * pipe.
1146 */
1147struct pipe_inode_info *get_pipe_info(struct file *file)
1148{
de32ec4c 1149 return file->f_op == &pipefifo_fops ? file->private_data : NULL;
72083646
LT
1150}
1151
35f3d14d
JA
1152long pipe_fcntl(struct file *file, unsigned int cmd, unsigned long arg)
1153{
1154 struct pipe_inode_info *pipe;
1155 long ret;
1156
c66fb347 1157 pipe = get_pipe_info(file);
35f3d14d
JA
1158 if (!pipe)
1159 return -EBADF;
1160
ebec73f4 1161 __pipe_lock(pipe);
35f3d14d
JA
1162
1163 switch (cmd) {
d37d4166
MK
1164 case F_SETPIPE_SZ:
1165 ret = pipe_set_size(pipe, arg);
35f3d14d
JA
1166 break;
1167 case F_GETPIPE_SZ:
b9598db3 1168 ret = pipe->buffers * PAGE_SIZE;
35f3d14d
JA
1169 break;
1170 default:
1171 ret = -EINVAL;
1172 break;
1173 }
1174
ebec73f4 1175 __pipe_unlock(pipe);
35f3d14d
JA
1176 return ret;
1177}
1178
ff0c7d15
NP
1179static const struct super_operations pipefs_ops = {
1180 .destroy_inode = free_inode_nonrcu,
d70ef97b 1181 .statfs = simple_statfs,
ff0c7d15
NP
1182};
1183
1da177e4
LT
1184/*
1185 * pipefs should _never_ be mounted by userland - too much of security hassle,
1186 * no real gain from having the whole whorehouse mounted. So we don't need
1187 * any operations on the root directory. However, we need a non-trivial
1188 * d_name - pipe: will go nicely and kill the special-casing in procfs.
1189 */
51139ada
AV
1190static struct dentry *pipefs_mount(struct file_system_type *fs_type,
1191 int flags, const char *dev_name, void *data)
1da177e4 1192{
c74a1cbb
AV
1193 return mount_pseudo(fs_type, "pipe:", &pipefs_ops,
1194 &pipefs_dentry_operations, PIPEFS_MAGIC);
1da177e4
LT
1195}
1196
1197static struct file_system_type pipe_fs_type = {
1198 .name = "pipefs",
51139ada 1199 .mount = pipefs_mount,
1da177e4
LT
1200 .kill_sb = kill_anon_super,
1201};
1202
1203static int __init init_pipe_fs(void)
1204{
1205 int err = register_filesystem(&pipe_fs_type);
341b446b 1206
1da177e4
LT
1207 if (!err) {
1208 pipe_mnt = kern_mount(&pipe_fs_type);
1209 if (IS_ERR(pipe_mnt)) {
1210 err = PTR_ERR(pipe_mnt);
1211 unregister_filesystem(&pipe_fs_type);
1212 }
1213 }
1214 return err;
1215}
1216
1da177e4 1217fs_initcall(init_pipe_fs);