]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - mm/shmem.c
xfrm: policy: make policy backend const
[mirror_ubuntu-artful-kernel.git] / mm / shmem.c
CommitLineData
1da177e4
LT
1/*
2 * Resizable virtual memory filesystem for Linux.
3 *
4 * Copyright (C) 2000 Linus Torvalds.
5 * 2000 Transmeta Corp.
6 * 2000-2001 Christoph Rohland
7 * 2000-2001 SAP AG
8 * 2002 Red Hat Inc.
6922c0c7
HD
9 * Copyright (C) 2002-2011 Hugh Dickins.
10 * Copyright (C) 2011 Google Inc.
0edd73b3 11 * Copyright (C) 2002-2005 VERITAS Software Corporation.
1da177e4
LT
12 * Copyright (C) 2004 Andi Kleen, SuSE Labs
13 *
14 * Extended attribute support for tmpfs:
15 * Copyright (c) 2004, Luke Kenneth Casson Leighton <lkcl@lkcl.net>
16 * Copyright (c) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
17 *
853ac43a
MM
18 * tiny-shmem:
19 * Copyright (c) 2004, 2008 Matt Mackall <mpm@selenic.com>
20 *
1da177e4
LT
21 * This file is released under the GPL.
22 */
23
853ac43a
MM
24#include <linux/fs.h>
25#include <linux/init.h>
26#include <linux/vfs.h>
27#include <linux/mount.h>
250297ed 28#include <linux/ramfs.h>
caefba17 29#include <linux/pagemap.h>
853ac43a
MM
30#include <linux/file.h>
31#include <linux/mm.h>
b95f1b31 32#include <linux/export.h>
853ac43a 33#include <linux/swap.h>
e2e40f2c 34#include <linux/uio.h>
f3f0e1d2 35#include <linux/khugepaged.h>
853ac43a
MM
36
37static struct vfsmount *shm_mnt;
38
39#ifdef CONFIG_SHMEM
1da177e4
LT
40/*
41 * This virtual memory filesystem is heavily based on the ramfs. It
42 * extends ramfs by the ability to use swap and honor resource limits
43 * which makes it a completely usable filesystem.
44 */
45
39f0247d 46#include <linux/xattr.h>
a5694255 47#include <linux/exportfs.h>
1c7c474c 48#include <linux/posix_acl.h>
feda821e 49#include <linux/posix_acl_xattr.h>
1da177e4 50#include <linux/mman.h>
1da177e4
LT
51#include <linux/string.h>
52#include <linux/slab.h>
53#include <linux/backing-dev.h>
54#include <linux/shmem_fs.h>
1da177e4 55#include <linux/writeback.h>
1da177e4 56#include <linux/blkdev.h>
bda97eab 57#include <linux/pagevec.h>
41ffe5d5 58#include <linux/percpu_counter.h>
83e4fa9c 59#include <linux/falloc.h>
708e3508 60#include <linux/splice.h>
1da177e4
LT
61#include <linux/security.h>
62#include <linux/swapops.h>
63#include <linux/mempolicy.h>
64#include <linux/namei.h>
b00dc3ad 65#include <linux/ctype.h>
304dbdb7 66#include <linux/migrate.h>
c1f60a5a 67#include <linux/highmem.h>
680d794b 68#include <linux/seq_file.h>
92562927 69#include <linux/magic.h>
9183df25 70#include <linux/syscalls.h>
40e041a2 71#include <linux/fcntl.h>
9183df25 72#include <uapi/linux/memfd.h>
304dbdb7 73
7c0f6ba6 74#include <linux/uaccess.h>
1da177e4
LT
75#include <asm/pgtable.h>
76
dd56b046
MG
77#include "internal.h"
78
09cbfeaf
KS
79#define BLOCKS_PER_PAGE (PAGE_SIZE/512)
80#define VM_ACCT(size) (PAGE_ALIGN(size) >> PAGE_SHIFT)
1da177e4 81
1da177e4
LT
82/* Pretend that each entry is of this size in directory's i_size */
83#define BOGO_DIRENT_SIZE 20
84
69f07ec9
HD
85/* Symlink up to this size is kmalloc'ed instead of using a swappable page */
86#define SHORT_SYMLINK_LEN 128
87
1aac1400 88/*
f00cdc6d
HD
89 * shmem_fallocate communicates with shmem_fault or shmem_writepage via
90 * inode->i_private (with i_mutex making sure that it has only one user at
91 * a time): we would prefer not to enlarge the shmem inode just for that.
1aac1400
HD
92 */
93struct shmem_falloc {
8e205f77 94 wait_queue_head_t *waitq; /* faults into hole wait for punch to end */
1aac1400
HD
95 pgoff_t start; /* start of range currently being fallocated */
96 pgoff_t next; /* the next page offset to be fallocated */
97 pgoff_t nr_falloced; /* how many new pages have been fallocated */
98 pgoff_t nr_unswapped; /* how often writepage refused to swap out */
99};
100
b76db735 101#ifdef CONFIG_TMPFS
680d794b
AM
102static unsigned long shmem_default_max_blocks(void)
103{
104 return totalram_pages / 2;
105}
106
107static unsigned long shmem_default_max_inodes(void)
108{
109 return min(totalram_pages - totalhigh_pages, totalram_pages / 2);
110}
b76db735 111#endif
680d794b 112
bde05d1c
HD
113static bool shmem_should_replace_page(struct page *page, gfp_t gfp);
114static int shmem_replace_page(struct page **pagep, gfp_t gfp,
115 struct shmem_inode_info *info, pgoff_t index);
68da9f05 116static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
9e18eb29
ALC
117 struct page **pagep, enum sgp_type sgp,
118 gfp_t gfp, struct mm_struct *fault_mm, int *fault_type);
68da9f05 119
f3f0e1d2 120int shmem_getpage(struct inode *inode, pgoff_t index,
9e18eb29 121 struct page **pagep, enum sgp_type sgp)
68da9f05
HD
122{
123 return shmem_getpage_gfp(inode, index, pagep, sgp,
9e18eb29 124 mapping_gfp_mask(inode->i_mapping), NULL, NULL);
68da9f05 125}
1da177e4 126
1da177e4
LT
127static inline struct shmem_sb_info *SHMEM_SB(struct super_block *sb)
128{
129 return sb->s_fs_info;
130}
131
132/*
133 * shmem_file_setup pre-accounts the whole fixed size of a VM object,
134 * for shared memory and for shared anonymous (/dev/zero) mappings
135 * (unless MAP_NORESERVE and sysctl_overcommit_memory <= 1),
136 * consistent with the pre-accounting of private mappings ...
137 */
138static inline int shmem_acct_size(unsigned long flags, loff_t size)
139{
0b0a0806 140 return (flags & VM_NORESERVE) ?
191c5424 141 0 : security_vm_enough_memory_mm(current->mm, VM_ACCT(size));
1da177e4
LT
142}
143
144static inline void shmem_unacct_size(unsigned long flags, loff_t size)
145{
0b0a0806 146 if (!(flags & VM_NORESERVE))
1da177e4
LT
147 vm_unacct_memory(VM_ACCT(size));
148}
149
77142517
KK
150static inline int shmem_reacct_size(unsigned long flags,
151 loff_t oldsize, loff_t newsize)
152{
153 if (!(flags & VM_NORESERVE)) {
154 if (VM_ACCT(newsize) > VM_ACCT(oldsize))
155 return security_vm_enough_memory_mm(current->mm,
156 VM_ACCT(newsize) - VM_ACCT(oldsize));
157 else if (VM_ACCT(newsize) < VM_ACCT(oldsize))
158 vm_unacct_memory(VM_ACCT(oldsize) - VM_ACCT(newsize));
159 }
160 return 0;
161}
162
1da177e4
LT
163/*
164 * ... whereas tmpfs objects are accounted incrementally as
75edd345 165 * pages are allocated, in order to allow large sparse files.
1da177e4
LT
166 * shmem_getpage reports shmem_acct_block failure as -ENOSPC not -ENOMEM,
167 * so that a failure on a sparse tmpfs mapping will give SIGBUS not OOM.
168 */
800d8c63 169static inline int shmem_acct_block(unsigned long flags, long pages)
1da177e4 170{
800d8c63
KS
171 if (!(flags & VM_NORESERVE))
172 return 0;
173
174 return security_vm_enough_memory_mm(current->mm,
175 pages * VM_ACCT(PAGE_SIZE));
1da177e4
LT
176}
177
178static inline void shmem_unacct_blocks(unsigned long flags, long pages)
179{
0b0a0806 180 if (flags & VM_NORESERVE)
09cbfeaf 181 vm_unacct_memory(pages * VM_ACCT(PAGE_SIZE));
1da177e4
LT
182}
183
759b9775 184static const struct super_operations shmem_ops;
f5e54d6e 185static const struct address_space_operations shmem_aops;
15ad7cdc 186static const struct file_operations shmem_file_operations;
92e1d5be
AV
187static const struct inode_operations shmem_inode_operations;
188static const struct inode_operations shmem_dir_inode_operations;
189static const struct inode_operations shmem_special_inode_operations;
f0f37e2f 190static const struct vm_operations_struct shmem_vm_ops;
779750d2 191static struct file_system_type shmem_fs_type;
1da177e4 192
1da177e4 193static LIST_HEAD(shmem_swaplist);
cb5f7b9a 194static DEFINE_MUTEX(shmem_swaplist_mutex);
1da177e4 195
5b04c689
PE
196static int shmem_reserve_inode(struct super_block *sb)
197{
198 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
199 if (sbinfo->max_inodes) {
200 spin_lock(&sbinfo->stat_lock);
201 if (!sbinfo->free_inodes) {
202 spin_unlock(&sbinfo->stat_lock);
203 return -ENOSPC;
204 }
205 sbinfo->free_inodes--;
206 spin_unlock(&sbinfo->stat_lock);
207 }
208 return 0;
209}
210
211static void shmem_free_inode(struct super_block *sb)
212{
213 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
214 if (sbinfo->max_inodes) {
215 spin_lock(&sbinfo->stat_lock);
216 sbinfo->free_inodes++;
217 spin_unlock(&sbinfo->stat_lock);
218 }
219}
220
46711810 221/**
41ffe5d5 222 * shmem_recalc_inode - recalculate the block usage of an inode
1da177e4
LT
223 * @inode: inode to recalc
224 *
225 * We have to calculate the free blocks since the mm can drop
226 * undirtied hole pages behind our back.
227 *
228 * But normally info->alloced == inode->i_mapping->nrpages + info->swapped
229 * So mm freed is info->alloced - (inode->i_mapping->nrpages + info->swapped)
230 *
231 * It has to be called with the spinlock held.
232 */
233static void shmem_recalc_inode(struct inode *inode)
234{
235 struct shmem_inode_info *info = SHMEM_I(inode);
236 long freed;
237
238 freed = info->alloced - info->swapped - inode->i_mapping->nrpages;
239 if (freed > 0) {
54af6042
HD
240 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
241 if (sbinfo->max_blocks)
242 percpu_counter_add(&sbinfo->used_blocks, -freed);
1da177e4 243 info->alloced -= freed;
54af6042 244 inode->i_blocks -= freed * BLOCKS_PER_PAGE;
1da177e4 245 shmem_unacct_blocks(info->flags, freed);
1da177e4
LT
246 }
247}
248
800d8c63
KS
249bool shmem_charge(struct inode *inode, long pages)
250{
251 struct shmem_inode_info *info = SHMEM_I(inode);
252 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
4595ef88 253 unsigned long flags;
800d8c63
KS
254
255 if (shmem_acct_block(info->flags, pages))
256 return false;
4595ef88 257 spin_lock_irqsave(&info->lock, flags);
800d8c63
KS
258 info->alloced += pages;
259 inode->i_blocks += pages * BLOCKS_PER_PAGE;
260 shmem_recalc_inode(inode);
4595ef88 261 spin_unlock_irqrestore(&info->lock, flags);
800d8c63
KS
262 inode->i_mapping->nrpages += pages;
263
264 if (!sbinfo->max_blocks)
265 return true;
266 if (percpu_counter_compare(&sbinfo->used_blocks,
267 sbinfo->max_blocks - pages) > 0) {
268 inode->i_mapping->nrpages -= pages;
4595ef88 269 spin_lock_irqsave(&info->lock, flags);
800d8c63
KS
270 info->alloced -= pages;
271 shmem_recalc_inode(inode);
4595ef88 272 spin_unlock_irqrestore(&info->lock, flags);
71664665 273 shmem_unacct_blocks(info->flags, pages);
800d8c63
KS
274 return false;
275 }
276 percpu_counter_add(&sbinfo->used_blocks, pages);
277 return true;
278}
279
280void shmem_uncharge(struct inode *inode, long pages)
281{
282 struct shmem_inode_info *info = SHMEM_I(inode);
283 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
4595ef88 284 unsigned long flags;
800d8c63 285
4595ef88 286 spin_lock_irqsave(&info->lock, flags);
800d8c63
KS
287 info->alloced -= pages;
288 inode->i_blocks -= pages * BLOCKS_PER_PAGE;
289 shmem_recalc_inode(inode);
4595ef88 290 spin_unlock_irqrestore(&info->lock, flags);
800d8c63
KS
291
292 if (sbinfo->max_blocks)
293 percpu_counter_sub(&sbinfo->used_blocks, pages);
71664665 294 shmem_unacct_blocks(info->flags, pages);
800d8c63
KS
295}
296
7a5d0fbb
HD
297/*
298 * Replace item expected in radix tree by a new item, while holding tree lock.
299 */
300static int shmem_radix_tree_replace(struct address_space *mapping,
301 pgoff_t index, void *expected, void *replacement)
302{
f7942430 303 struct radix_tree_node *node;
7a5d0fbb 304 void **pslot;
6dbaf22c 305 void *item;
7a5d0fbb
HD
306
307 VM_BUG_ON(!expected);
6dbaf22c 308 VM_BUG_ON(!replacement);
f7942430
JW
309 item = __radix_tree_lookup(&mapping->page_tree, index, &node, &pslot);
310 if (!item)
6dbaf22c 311 return -ENOENT;
7a5d0fbb
HD
312 if (item != expected)
313 return -ENOENT;
4d693d08
JW
314 __radix_tree_replace(&mapping->page_tree, node, pslot,
315 replacement, NULL, NULL);
7a5d0fbb
HD
316 return 0;
317}
318
d1899228
HD
319/*
320 * Sometimes, before we decide whether to proceed or to fail, we must check
321 * that an entry was not already brought back from swap by a racing thread.
322 *
323 * Checking page is not enough: by the time a SwapCache page is locked, it
324 * might be reused, and again be SwapCache, using the same swap as before.
325 */
326static bool shmem_confirm_swap(struct address_space *mapping,
327 pgoff_t index, swp_entry_t swap)
328{
329 void *item;
330
331 rcu_read_lock();
332 item = radix_tree_lookup(&mapping->page_tree, index);
333 rcu_read_unlock();
334 return item == swp_to_radix_entry(swap);
335}
336
5a6e75f8
KS
337/*
338 * Definitions for "huge tmpfs": tmpfs mounted with the huge= option
339 *
340 * SHMEM_HUGE_NEVER:
341 * disables huge pages for the mount;
342 * SHMEM_HUGE_ALWAYS:
343 * enables huge pages for the mount;
344 * SHMEM_HUGE_WITHIN_SIZE:
345 * only allocate huge pages if the page will be fully within i_size,
346 * also respect fadvise()/madvise() hints;
347 * SHMEM_HUGE_ADVISE:
348 * only allocate huge pages if requested with fadvise()/madvise();
349 */
350
351#define SHMEM_HUGE_NEVER 0
352#define SHMEM_HUGE_ALWAYS 1
353#define SHMEM_HUGE_WITHIN_SIZE 2
354#define SHMEM_HUGE_ADVISE 3
355
356/*
357 * Special values.
358 * Only can be set via /sys/kernel/mm/transparent_hugepage/shmem_enabled:
359 *
360 * SHMEM_HUGE_DENY:
361 * disables huge on shm_mnt and all mounts, for emergency use;
362 * SHMEM_HUGE_FORCE:
363 * enables huge on shm_mnt and all mounts, w/o needing option, for testing;
364 *
365 */
366#define SHMEM_HUGE_DENY (-1)
367#define SHMEM_HUGE_FORCE (-2)
368
e496cf3d 369#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
5a6e75f8
KS
370/* ifdef here to avoid bloating shmem.o when not necessary */
371
372int shmem_huge __read_mostly;
373
f1f5929c 374#if defined(CONFIG_SYSFS) || defined(CONFIG_TMPFS)
5a6e75f8
KS
375static int shmem_parse_huge(const char *str)
376{
377 if (!strcmp(str, "never"))
378 return SHMEM_HUGE_NEVER;
379 if (!strcmp(str, "always"))
380 return SHMEM_HUGE_ALWAYS;
381 if (!strcmp(str, "within_size"))
382 return SHMEM_HUGE_WITHIN_SIZE;
383 if (!strcmp(str, "advise"))
384 return SHMEM_HUGE_ADVISE;
385 if (!strcmp(str, "deny"))
386 return SHMEM_HUGE_DENY;
387 if (!strcmp(str, "force"))
388 return SHMEM_HUGE_FORCE;
389 return -EINVAL;
390}
391
392static const char *shmem_format_huge(int huge)
393{
394 switch (huge) {
395 case SHMEM_HUGE_NEVER:
396 return "never";
397 case SHMEM_HUGE_ALWAYS:
398 return "always";
399 case SHMEM_HUGE_WITHIN_SIZE:
400 return "within_size";
401 case SHMEM_HUGE_ADVISE:
402 return "advise";
403 case SHMEM_HUGE_DENY:
404 return "deny";
405 case SHMEM_HUGE_FORCE:
406 return "force";
407 default:
408 VM_BUG_ON(1);
409 return "bad_val";
410 }
411}
f1f5929c 412#endif
5a6e75f8 413
779750d2
KS
414static unsigned long shmem_unused_huge_shrink(struct shmem_sb_info *sbinfo,
415 struct shrink_control *sc, unsigned long nr_to_split)
416{
417 LIST_HEAD(list), *pos, *next;
418 struct inode *inode;
419 struct shmem_inode_info *info;
420 struct page *page;
421 unsigned long batch = sc ? sc->nr_to_scan : 128;
422 int removed = 0, split = 0;
423
424 if (list_empty(&sbinfo->shrinklist))
425 return SHRINK_STOP;
426
427 spin_lock(&sbinfo->shrinklist_lock);
428 list_for_each_safe(pos, next, &sbinfo->shrinklist) {
429 info = list_entry(pos, struct shmem_inode_info, shrinklist);
430
431 /* pin the inode */
432 inode = igrab(&info->vfs_inode);
433
434 /* inode is about to be evicted */
435 if (!inode) {
436 list_del_init(&info->shrinklist);
437 removed++;
438 goto next;
439 }
440
441 /* Check if there's anything to gain */
442 if (round_up(inode->i_size, PAGE_SIZE) ==
443 round_up(inode->i_size, HPAGE_PMD_SIZE)) {
444 list_del_init(&info->shrinklist);
445 removed++;
446 iput(inode);
447 goto next;
448 }
449
450 list_move(&info->shrinklist, &list);
451next:
452 if (!--batch)
453 break;
454 }
455 spin_unlock(&sbinfo->shrinklist_lock);
456
457 list_for_each_safe(pos, next, &list) {
458 int ret;
459
460 info = list_entry(pos, struct shmem_inode_info, shrinklist);
461 inode = &info->vfs_inode;
462
463 if (nr_to_split && split >= nr_to_split) {
464 iput(inode);
465 continue;
466 }
467
468 page = find_lock_page(inode->i_mapping,
469 (inode->i_size & HPAGE_PMD_MASK) >> PAGE_SHIFT);
470 if (!page)
471 goto drop;
472
473 if (!PageTransHuge(page)) {
474 unlock_page(page);
475 put_page(page);
476 goto drop;
477 }
478
479 ret = split_huge_page(page);
480 unlock_page(page);
481 put_page(page);
482
483 if (ret) {
484 /* split failed: leave it on the list */
485 iput(inode);
486 continue;
487 }
488
489 split++;
490drop:
491 list_del_init(&info->shrinklist);
492 removed++;
493 iput(inode);
494 }
495
496 spin_lock(&sbinfo->shrinklist_lock);
497 list_splice_tail(&list, &sbinfo->shrinklist);
498 sbinfo->shrinklist_len -= removed;
499 spin_unlock(&sbinfo->shrinklist_lock);
500
501 return split;
502}
503
504static long shmem_unused_huge_scan(struct super_block *sb,
505 struct shrink_control *sc)
506{
507 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
508
509 if (!READ_ONCE(sbinfo->shrinklist_len))
510 return SHRINK_STOP;
511
512 return shmem_unused_huge_shrink(sbinfo, sc, 0);
513}
514
515static long shmem_unused_huge_count(struct super_block *sb,
516 struct shrink_control *sc)
517{
518 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
519 return READ_ONCE(sbinfo->shrinklist_len);
520}
e496cf3d 521#else /* !CONFIG_TRANSPARENT_HUGE_PAGECACHE */
5a6e75f8
KS
522
523#define shmem_huge SHMEM_HUGE_DENY
524
779750d2
KS
525static unsigned long shmem_unused_huge_shrink(struct shmem_sb_info *sbinfo,
526 struct shrink_control *sc, unsigned long nr_to_split)
527{
528 return 0;
529}
e496cf3d 530#endif /* CONFIG_TRANSPARENT_HUGE_PAGECACHE */
5a6e75f8 531
46f65ec1
HD
532/*
533 * Like add_to_page_cache_locked, but error if expected item has gone.
534 */
535static int shmem_add_to_page_cache(struct page *page,
536 struct address_space *mapping,
fed400a1 537 pgoff_t index, void *expected)
46f65ec1 538{
800d8c63 539 int error, nr = hpage_nr_pages(page);
46f65ec1 540
800d8c63
KS
541 VM_BUG_ON_PAGE(PageTail(page), page);
542 VM_BUG_ON_PAGE(index != round_down(index, nr), page);
309381fe
SL
543 VM_BUG_ON_PAGE(!PageLocked(page), page);
544 VM_BUG_ON_PAGE(!PageSwapBacked(page), page);
800d8c63 545 VM_BUG_ON(expected && PageTransHuge(page));
46f65ec1 546
800d8c63 547 page_ref_add(page, nr);
b065b432
HD
548 page->mapping = mapping;
549 page->index = index;
550
551 spin_lock_irq(&mapping->tree_lock);
800d8c63
KS
552 if (PageTransHuge(page)) {
553 void __rcu **results;
554 pgoff_t idx;
555 int i;
556
557 error = 0;
558 if (radix_tree_gang_lookup_slot(&mapping->page_tree,
559 &results, &idx, index, 1) &&
560 idx < index + HPAGE_PMD_NR) {
561 error = -EEXIST;
562 }
563
564 if (!error) {
565 for (i = 0; i < HPAGE_PMD_NR; i++) {
566 error = radix_tree_insert(&mapping->page_tree,
567 index + i, page + i);
568 VM_BUG_ON(error);
569 }
570 count_vm_event(THP_FILE_ALLOC);
571 }
572 } else if (!expected) {
b065b432 573 error = radix_tree_insert(&mapping->page_tree, index, page);
800d8c63 574 } else {
b065b432
HD
575 error = shmem_radix_tree_replace(mapping, index, expected,
576 page);
800d8c63
KS
577 }
578
46f65ec1 579 if (!error) {
800d8c63
KS
580 mapping->nrpages += nr;
581 if (PageTransHuge(page))
11fb9989
MG
582 __inc_node_page_state(page, NR_SHMEM_THPS);
583 __mod_node_page_state(page_pgdat(page), NR_FILE_PAGES, nr);
584 __mod_node_page_state(page_pgdat(page), NR_SHMEM, nr);
b065b432
HD
585 spin_unlock_irq(&mapping->tree_lock);
586 } else {
587 page->mapping = NULL;
588 spin_unlock_irq(&mapping->tree_lock);
800d8c63 589 page_ref_sub(page, nr);
46f65ec1 590 }
46f65ec1
HD
591 return error;
592}
593
6922c0c7
HD
594/*
595 * Like delete_from_page_cache, but substitutes swap for page.
596 */
597static void shmem_delete_from_page_cache(struct page *page, void *radswap)
598{
599 struct address_space *mapping = page->mapping;
600 int error;
601
800d8c63
KS
602 VM_BUG_ON_PAGE(PageCompound(page), page);
603
6922c0c7
HD
604 spin_lock_irq(&mapping->tree_lock);
605 error = shmem_radix_tree_replace(mapping, page->index, page, radswap);
606 page->mapping = NULL;
607 mapping->nrpages--;
11fb9989
MG
608 __dec_node_page_state(page, NR_FILE_PAGES);
609 __dec_node_page_state(page, NR_SHMEM);
6922c0c7 610 spin_unlock_irq(&mapping->tree_lock);
09cbfeaf 611 put_page(page);
6922c0c7
HD
612 BUG_ON(error);
613}
614
7a5d0fbb
HD
615/*
616 * Remove swap entry from radix tree, free the swap and its page cache.
617 */
618static int shmem_free_swap(struct address_space *mapping,
619 pgoff_t index, void *radswap)
620{
6dbaf22c 621 void *old;
7a5d0fbb
HD
622
623 spin_lock_irq(&mapping->tree_lock);
6dbaf22c 624 old = radix_tree_delete_item(&mapping->page_tree, index, radswap);
7a5d0fbb 625 spin_unlock_irq(&mapping->tree_lock);
6dbaf22c
JW
626 if (old != radswap)
627 return -ENOENT;
628 free_swap_and_cache(radix_to_swp_entry(radswap));
629 return 0;
7a5d0fbb
HD
630}
631
6a15a370
VB
632/*
633 * Determine (in bytes) how many of the shmem object's pages mapped by the
48131e03 634 * given offsets are swapped out.
6a15a370
VB
635 *
636 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
637 * as long as the inode doesn't go away and racy results are not a problem.
638 */
48131e03
VB
639unsigned long shmem_partial_swap_usage(struct address_space *mapping,
640 pgoff_t start, pgoff_t end)
6a15a370 641{
6a15a370
VB
642 struct radix_tree_iter iter;
643 void **slot;
644 struct page *page;
48131e03 645 unsigned long swapped = 0;
6a15a370
VB
646
647 rcu_read_lock();
648
6a15a370
VB
649 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
650 if (iter.index >= end)
651 break;
652
653 page = radix_tree_deref_slot(slot);
654
2cf938aa
MW
655 if (radix_tree_deref_retry(page)) {
656 slot = radix_tree_iter_retry(&iter);
657 continue;
658 }
6a15a370
VB
659
660 if (radix_tree_exceptional_entry(page))
661 swapped++;
662
663 if (need_resched()) {
148deab2 664 slot = radix_tree_iter_resume(slot, &iter);
6a15a370 665 cond_resched_rcu();
6a15a370
VB
666 }
667 }
668
669 rcu_read_unlock();
670
671 return swapped << PAGE_SHIFT;
672}
673
48131e03
VB
674/*
675 * Determine (in bytes) how many of the shmem object's pages mapped by the
676 * given vma is swapped out.
677 *
678 * This is safe to call without i_mutex or mapping->tree_lock thanks to RCU,
679 * as long as the inode doesn't go away and racy results are not a problem.
680 */
681unsigned long shmem_swap_usage(struct vm_area_struct *vma)
682{
683 struct inode *inode = file_inode(vma->vm_file);
684 struct shmem_inode_info *info = SHMEM_I(inode);
685 struct address_space *mapping = inode->i_mapping;
686 unsigned long swapped;
687
688 /* Be careful as we don't hold info->lock */
689 swapped = READ_ONCE(info->swapped);
690
691 /*
692 * The easier cases are when the shmem object has nothing in swap, or
693 * the vma maps it whole. Then we can simply use the stats that we
694 * already track.
695 */
696 if (!swapped)
697 return 0;
698
699 if (!vma->vm_pgoff && vma->vm_end - vma->vm_start >= inode->i_size)
700 return swapped << PAGE_SHIFT;
701
702 /* Here comes the more involved part */
703 return shmem_partial_swap_usage(mapping,
704 linear_page_index(vma, vma->vm_start),
705 linear_page_index(vma, vma->vm_end));
706}
707
24513264
HD
708/*
709 * SysV IPC SHM_UNLOCK restore Unevictable pages to their evictable lists.
710 */
711void shmem_unlock_mapping(struct address_space *mapping)
712{
713 struct pagevec pvec;
714 pgoff_t indices[PAGEVEC_SIZE];
715 pgoff_t index = 0;
716
717 pagevec_init(&pvec, 0);
718 /*
719 * Minor point, but we might as well stop if someone else SHM_LOCKs it.
720 */
721 while (!mapping_unevictable(mapping)) {
722 /*
723 * Avoid pagevec_lookup(): find_get_pages() returns 0 as if it
724 * has finished, if it hits a row of PAGEVEC_SIZE swap entries.
725 */
0cd6144a
JW
726 pvec.nr = find_get_entries(mapping, index,
727 PAGEVEC_SIZE, pvec.pages, indices);
24513264
HD
728 if (!pvec.nr)
729 break;
730 index = indices[pvec.nr - 1] + 1;
0cd6144a 731 pagevec_remove_exceptionals(&pvec);
24513264
HD
732 check_move_unevictable_pages(pvec.pages, pvec.nr);
733 pagevec_release(&pvec);
734 cond_resched();
735 }
7a5d0fbb
HD
736}
737
738/*
739 * Remove range of pages and swap entries from radix tree, and free them.
1635f6a7 740 * If !unfalloc, truncate or punch hole; if unfalloc, undo failed fallocate.
7a5d0fbb 741 */
1635f6a7
HD
742static void shmem_undo_range(struct inode *inode, loff_t lstart, loff_t lend,
743 bool unfalloc)
1da177e4 744{
285b2c4f 745 struct address_space *mapping = inode->i_mapping;
1da177e4 746 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf
KS
747 pgoff_t start = (lstart + PAGE_SIZE - 1) >> PAGE_SHIFT;
748 pgoff_t end = (lend + 1) >> PAGE_SHIFT;
749 unsigned int partial_start = lstart & (PAGE_SIZE - 1);
750 unsigned int partial_end = (lend + 1) & (PAGE_SIZE - 1);
bda97eab 751 struct pagevec pvec;
7a5d0fbb
HD
752 pgoff_t indices[PAGEVEC_SIZE];
753 long nr_swaps_freed = 0;
285b2c4f 754 pgoff_t index;
bda97eab
HD
755 int i;
756
83e4fa9c
HD
757 if (lend == -1)
758 end = -1; /* unsigned, so actually very big */
bda97eab
HD
759
760 pagevec_init(&pvec, 0);
761 index = start;
83e4fa9c 762 while (index < end) {
0cd6144a
JW
763 pvec.nr = find_get_entries(mapping, index,
764 min(end - index, (pgoff_t)PAGEVEC_SIZE),
765 pvec.pages, indices);
7a5d0fbb
HD
766 if (!pvec.nr)
767 break;
bda97eab
HD
768 for (i = 0; i < pagevec_count(&pvec); i++) {
769 struct page *page = pvec.pages[i];
770
7a5d0fbb 771 index = indices[i];
83e4fa9c 772 if (index >= end)
bda97eab
HD
773 break;
774
7a5d0fbb 775 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
776 if (unfalloc)
777 continue;
7a5d0fbb
HD
778 nr_swaps_freed += !shmem_free_swap(mapping,
779 index, page);
bda97eab 780 continue;
7a5d0fbb
HD
781 }
782
800d8c63
KS
783 VM_BUG_ON_PAGE(page_to_pgoff(page) != index, page);
784
7a5d0fbb 785 if (!trylock_page(page))
bda97eab 786 continue;
800d8c63
KS
787
788 if (PageTransTail(page)) {
789 /* Middle of THP: zero out the page */
790 clear_highpage(page);
791 unlock_page(page);
792 continue;
793 } else if (PageTransHuge(page)) {
794 if (index == round_down(end, HPAGE_PMD_NR)) {
795 /*
796 * Range ends in the middle of THP:
797 * zero out the page
798 */
799 clear_highpage(page);
800 unlock_page(page);
801 continue;
802 }
803 index += HPAGE_PMD_NR - 1;
804 i += HPAGE_PMD_NR - 1;
805 }
806
1635f6a7 807 if (!unfalloc || !PageUptodate(page)) {
800d8c63
KS
808 VM_BUG_ON_PAGE(PageTail(page), page);
809 if (page_mapping(page) == mapping) {
309381fe 810 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7
HD
811 truncate_inode_page(mapping, page);
812 }
bda97eab 813 }
bda97eab
HD
814 unlock_page(page);
815 }
0cd6144a 816 pagevec_remove_exceptionals(&pvec);
24513264 817 pagevec_release(&pvec);
bda97eab
HD
818 cond_resched();
819 index++;
820 }
1da177e4 821
83e4fa9c 822 if (partial_start) {
bda97eab 823 struct page *page = NULL;
9e18eb29 824 shmem_getpage(inode, start - 1, &page, SGP_READ);
bda97eab 825 if (page) {
09cbfeaf 826 unsigned int top = PAGE_SIZE;
83e4fa9c
HD
827 if (start > end) {
828 top = partial_end;
829 partial_end = 0;
830 }
831 zero_user_segment(page, partial_start, top);
832 set_page_dirty(page);
833 unlock_page(page);
09cbfeaf 834 put_page(page);
83e4fa9c
HD
835 }
836 }
837 if (partial_end) {
838 struct page *page = NULL;
9e18eb29 839 shmem_getpage(inode, end, &page, SGP_READ);
83e4fa9c
HD
840 if (page) {
841 zero_user_segment(page, 0, partial_end);
bda97eab
HD
842 set_page_dirty(page);
843 unlock_page(page);
09cbfeaf 844 put_page(page);
bda97eab
HD
845 }
846 }
83e4fa9c
HD
847 if (start >= end)
848 return;
bda97eab
HD
849
850 index = start;
b1a36650 851 while (index < end) {
bda97eab 852 cond_resched();
0cd6144a
JW
853
854 pvec.nr = find_get_entries(mapping, index,
83e4fa9c 855 min(end - index, (pgoff_t)PAGEVEC_SIZE),
0cd6144a 856 pvec.pages, indices);
7a5d0fbb 857 if (!pvec.nr) {
b1a36650
HD
858 /* If all gone or hole-punch or unfalloc, we're done */
859 if (index == start || end != -1)
bda97eab 860 break;
b1a36650 861 /* But if truncating, restart to make sure all gone */
bda97eab
HD
862 index = start;
863 continue;
864 }
bda97eab
HD
865 for (i = 0; i < pagevec_count(&pvec); i++) {
866 struct page *page = pvec.pages[i];
867
7a5d0fbb 868 index = indices[i];
83e4fa9c 869 if (index >= end)
bda97eab
HD
870 break;
871
7a5d0fbb 872 if (radix_tree_exceptional_entry(page)) {
1635f6a7
HD
873 if (unfalloc)
874 continue;
b1a36650
HD
875 if (shmem_free_swap(mapping, index, page)) {
876 /* Swap was replaced by page: retry */
877 index--;
878 break;
879 }
880 nr_swaps_freed++;
7a5d0fbb
HD
881 continue;
882 }
883
bda97eab 884 lock_page(page);
800d8c63
KS
885
886 if (PageTransTail(page)) {
887 /* Middle of THP: zero out the page */
888 clear_highpage(page);
889 unlock_page(page);
890 /*
891 * Partial thp truncate due 'start' in middle
892 * of THP: don't need to look on these pages
893 * again on !pvec.nr restart.
894 */
895 if (index != round_down(end, HPAGE_PMD_NR))
896 start++;
897 continue;
898 } else if (PageTransHuge(page)) {
899 if (index == round_down(end, HPAGE_PMD_NR)) {
900 /*
901 * Range ends in the middle of THP:
902 * zero out the page
903 */
904 clear_highpage(page);
905 unlock_page(page);
906 continue;
907 }
908 index += HPAGE_PMD_NR - 1;
909 i += HPAGE_PMD_NR - 1;
910 }
911
1635f6a7 912 if (!unfalloc || !PageUptodate(page)) {
800d8c63
KS
913 VM_BUG_ON_PAGE(PageTail(page), page);
914 if (page_mapping(page) == mapping) {
309381fe 915 VM_BUG_ON_PAGE(PageWriteback(page), page);
1635f6a7 916 truncate_inode_page(mapping, page);
b1a36650
HD
917 } else {
918 /* Page was replaced by swap: retry */
919 unlock_page(page);
920 index--;
921 break;
1635f6a7 922 }
7a5d0fbb 923 }
bda97eab
HD
924 unlock_page(page);
925 }
0cd6144a 926 pagevec_remove_exceptionals(&pvec);
24513264 927 pagevec_release(&pvec);
bda97eab
HD
928 index++;
929 }
94c1e62d 930
4595ef88 931 spin_lock_irq(&info->lock);
7a5d0fbb 932 info->swapped -= nr_swaps_freed;
1da177e4 933 shmem_recalc_inode(inode);
4595ef88 934 spin_unlock_irq(&info->lock);
1635f6a7 935}
1da177e4 936
1635f6a7
HD
937void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
938{
939 shmem_undo_range(inode, lstart, lend, false);
078cd827 940 inode->i_ctime = inode->i_mtime = current_time(inode);
1da177e4 941}
94c1e62d 942EXPORT_SYMBOL_GPL(shmem_truncate_range);
1da177e4 943
44a30220
YZ
944static int shmem_getattr(struct vfsmount *mnt, struct dentry *dentry,
945 struct kstat *stat)
946{
947 struct inode *inode = dentry->d_inode;
948 struct shmem_inode_info *info = SHMEM_I(inode);
949
d0424c42 950 if (info->alloced - info->swapped != inode->i_mapping->nrpages) {
4595ef88 951 spin_lock_irq(&info->lock);
d0424c42 952 shmem_recalc_inode(inode);
4595ef88 953 spin_unlock_irq(&info->lock);
d0424c42 954 }
44a30220 955 generic_fillattr(inode, stat);
44a30220
YZ
956 return 0;
957}
958
94c1e62d 959static int shmem_setattr(struct dentry *dentry, struct iattr *attr)
1da177e4 960{
75c3cfa8 961 struct inode *inode = d_inode(dentry);
40e041a2 962 struct shmem_inode_info *info = SHMEM_I(inode);
779750d2 963 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
1da177e4
LT
964 int error;
965
31051c85 966 error = setattr_prepare(dentry, attr);
db78b877
CH
967 if (error)
968 return error;
969
94c1e62d
HD
970 if (S_ISREG(inode->i_mode) && (attr->ia_valid & ATTR_SIZE)) {
971 loff_t oldsize = inode->i_size;
972 loff_t newsize = attr->ia_size;
3889e6e7 973
40e041a2
DH
974 /* protected by i_mutex */
975 if ((newsize < oldsize && (info->seals & F_SEAL_SHRINK)) ||
976 (newsize > oldsize && (info->seals & F_SEAL_GROW)))
977 return -EPERM;
978
94c1e62d 979 if (newsize != oldsize) {
77142517
KK
980 error = shmem_reacct_size(SHMEM_I(inode)->flags,
981 oldsize, newsize);
982 if (error)
983 return error;
94c1e62d 984 i_size_write(inode, newsize);
078cd827 985 inode->i_ctime = inode->i_mtime = current_time(inode);
94c1e62d 986 }
afa2db2f 987 if (newsize <= oldsize) {
94c1e62d 988 loff_t holebegin = round_up(newsize, PAGE_SIZE);
d0424c42
HD
989 if (oldsize > holebegin)
990 unmap_mapping_range(inode->i_mapping,
991 holebegin, 0, 1);
992 if (info->alloced)
993 shmem_truncate_range(inode,
994 newsize, (loff_t)-1);
94c1e62d 995 /* unmap again to remove racily COWed private pages */
d0424c42
HD
996 if (oldsize > holebegin)
997 unmap_mapping_range(inode->i_mapping,
998 holebegin, 0, 1);
779750d2
KS
999
1000 /*
1001 * Part of the huge page can be beyond i_size: subject
1002 * to shrink under memory pressure.
1003 */
1004 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE)) {
1005 spin_lock(&sbinfo->shrinklist_lock);
1006 if (list_empty(&info->shrinklist)) {
1007 list_add_tail(&info->shrinklist,
1008 &sbinfo->shrinklist);
1009 sbinfo->shrinklist_len++;
1010 }
1011 spin_unlock(&sbinfo->shrinklist_lock);
1012 }
94c1e62d 1013 }
1da177e4
LT
1014 }
1015
db78b877 1016 setattr_copy(inode, attr);
db78b877 1017 if (attr->ia_valid & ATTR_MODE)
feda821e 1018 error = posix_acl_chmod(inode, inode->i_mode);
1da177e4
LT
1019 return error;
1020}
1021
1f895f75 1022static void shmem_evict_inode(struct inode *inode)
1da177e4 1023{
1da177e4 1024 struct shmem_inode_info *info = SHMEM_I(inode);
779750d2 1025 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
1da177e4 1026
3889e6e7 1027 if (inode->i_mapping->a_ops == &shmem_aops) {
1da177e4
LT
1028 shmem_unacct_size(info->flags, inode->i_size);
1029 inode->i_size = 0;
3889e6e7 1030 shmem_truncate_range(inode, 0, (loff_t)-1);
779750d2
KS
1031 if (!list_empty(&info->shrinklist)) {
1032 spin_lock(&sbinfo->shrinklist_lock);
1033 if (!list_empty(&info->shrinklist)) {
1034 list_del_init(&info->shrinklist);
1035 sbinfo->shrinklist_len--;
1036 }
1037 spin_unlock(&sbinfo->shrinklist_lock);
1038 }
1da177e4 1039 if (!list_empty(&info->swaplist)) {
cb5f7b9a 1040 mutex_lock(&shmem_swaplist_mutex);
1da177e4 1041 list_del_init(&info->swaplist);
cb5f7b9a 1042 mutex_unlock(&shmem_swaplist_mutex);
1da177e4 1043 }
3ed47db3 1044 }
b09e0fa4 1045
38f38657 1046 simple_xattrs_free(&info->xattrs);
0f3c42f5 1047 WARN_ON(inode->i_blocks);
5b04c689 1048 shmem_free_inode(inode->i_sb);
dbd5768f 1049 clear_inode(inode);
1da177e4
LT
1050}
1051
478922e2
MW
1052static unsigned long find_swap_entry(struct radix_tree_root *root, void *item)
1053{
1054 struct radix_tree_iter iter;
1055 void **slot;
1056 unsigned long found = -1;
1057 unsigned int checked = 0;
1058
1059 rcu_read_lock();
1060 radix_tree_for_each_slot(slot, root, &iter, 0) {
1061 if (*slot == item) {
1062 found = iter.index;
1063 break;
1064 }
1065 checked++;
1066 if ((checked % 4096) != 0)
1067 continue;
1068 slot = radix_tree_iter_resume(slot, &iter);
1069 cond_resched_rcu();
1070 }
1071
1072 rcu_read_unlock();
1073 return found;
1074}
1075
46f65ec1
HD
1076/*
1077 * If swap found in inode, free it and move page from swapcache to filecache.
1078 */
41ffe5d5 1079static int shmem_unuse_inode(struct shmem_inode_info *info,
bde05d1c 1080 swp_entry_t swap, struct page **pagep)
1da177e4 1081{
285b2c4f 1082 struct address_space *mapping = info->vfs_inode.i_mapping;
46f65ec1 1083 void *radswap;
41ffe5d5 1084 pgoff_t index;
bde05d1c
HD
1085 gfp_t gfp;
1086 int error = 0;
1da177e4 1087
46f65ec1 1088 radswap = swp_to_radix_entry(swap);
478922e2 1089 index = find_swap_entry(&mapping->page_tree, radswap);
46f65ec1 1090 if (index == -1)
00501b53 1091 return -EAGAIN; /* tell shmem_unuse we found nothing */
2e0e26c7 1092
1b1b32f2
HD
1093 /*
1094 * Move _head_ to start search for next from here.
1f895f75 1095 * But be careful: shmem_evict_inode checks list_empty without taking
1b1b32f2 1096 * mutex, and there's an instant in list_move_tail when info->swaplist
285b2c4f 1097 * would appear empty, if it were the only one on shmem_swaplist.
1b1b32f2
HD
1098 */
1099 if (shmem_swaplist.next != &info->swaplist)
1100 list_move_tail(&shmem_swaplist, &info->swaplist);
2e0e26c7 1101
bde05d1c
HD
1102 gfp = mapping_gfp_mask(mapping);
1103 if (shmem_should_replace_page(*pagep, gfp)) {
1104 mutex_unlock(&shmem_swaplist_mutex);
1105 error = shmem_replace_page(pagep, gfp, info, index);
1106 mutex_lock(&shmem_swaplist_mutex);
1107 /*
1108 * We needed to drop mutex to make that restrictive page
0142ef6c
HD
1109 * allocation, but the inode might have been freed while we
1110 * dropped it: although a racing shmem_evict_inode() cannot
1111 * complete without emptying the radix_tree, our page lock
1112 * on this swapcache page is not enough to prevent that -
1113 * free_swap_and_cache() of our swap entry will only
1114 * trylock_page(), removing swap from radix_tree whatever.
1115 *
1116 * We must not proceed to shmem_add_to_page_cache() if the
1117 * inode has been freed, but of course we cannot rely on
1118 * inode or mapping or info to check that. However, we can
1119 * safely check if our swap entry is still in use (and here
1120 * it can't have got reused for another page): if it's still
1121 * in use, then the inode cannot have been freed yet, and we
1122 * can safely proceed (if it's no longer in use, that tells
1123 * nothing about the inode, but we don't need to unuse swap).
bde05d1c
HD
1124 */
1125 if (!page_swapcount(*pagep))
1126 error = -ENOENT;
1127 }
1128
d13d1443 1129 /*
778dd893
HD
1130 * We rely on shmem_swaplist_mutex, not only to protect the swaplist,
1131 * but also to hold up shmem_evict_inode(): so inode cannot be freed
1132 * beneath us (pagelock doesn't help until the page is in pagecache).
d13d1443 1133 */
bde05d1c
HD
1134 if (!error)
1135 error = shmem_add_to_page_cache(*pagep, mapping, index,
fed400a1 1136 radswap);
48f170fb 1137 if (error != -ENOMEM) {
46f65ec1
HD
1138 /*
1139 * Truncation and eviction use free_swap_and_cache(), which
1140 * only does trylock page: if we raced, best clean up here.
1141 */
bde05d1c
HD
1142 delete_from_swap_cache(*pagep);
1143 set_page_dirty(*pagep);
46f65ec1 1144 if (!error) {
4595ef88 1145 spin_lock_irq(&info->lock);
46f65ec1 1146 info->swapped--;
4595ef88 1147 spin_unlock_irq(&info->lock);
46f65ec1
HD
1148 swap_free(swap);
1149 }
1da177e4 1150 }
2e0e26c7 1151 return error;
1da177e4
LT
1152}
1153
1154/*
46f65ec1 1155 * Search through swapped inodes to find and replace swap by page.
1da177e4 1156 */
41ffe5d5 1157int shmem_unuse(swp_entry_t swap, struct page *page)
1da177e4 1158{
41ffe5d5 1159 struct list_head *this, *next;
1da177e4 1160 struct shmem_inode_info *info;
00501b53 1161 struct mem_cgroup *memcg;
bde05d1c
HD
1162 int error = 0;
1163
1164 /*
1165 * There's a faint possibility that swap page was replaced before
0142ef6c 1166 * caller locked it: caller will come back later with the right page.
bde05d1c 1167 */
0142ef6c 1168 if (unlikely(!PageSwapCache(page) || page_private(page) != swap.val))
bde05d1c 1169 goto out;
778dd893
HD
1170
1171 /*
1172 * Charge page using GFP_KERNEL while we can wait, before taking
1173 * the shmem_swaplist_mutex which might hold up shmem_writepage().
1174 * Charged back to the user (not to caller) when swap account is used.
778dd893 1175 */
f627c2f5
KS
1176 error = mem_cgroup_try_charge(page, current->mm, GFP_KERNEL, &memcg,
1177 false);
778dd893
HD
1178 if (error)
1179 goto out;
46f65ec1 1180 /* No radix_tree_preload: swap entry keeps a place for page in tree */
00501b53 1181 error = -EAGAIN;
1da177e4 1182
cb5f7b9a 1183 mutex_lock(&shmem_swaplist_mutex);
41ffe5d5
HD
1184 list_for_each_safe(this, next, &shmem_swaplist) {
1185 info = list_entry(this, struct shmem_inode_info, swaplist);
285b2c4f 1186 if (info->swapped)
00501b53 1187 error = shmem_unuse_inode(info, swap, &page);
6922c0c7
HD
1188 else
1189 list_del_init(&info->swaplist);
cb5f7b9a 1190 cond_resched();
00501b53 1191 if (error != -EAGAIN)
778dd893 1192 break;
00501b53 1193 /* found nothing in this: move on to search the next */
1da177e4 1194 }
cb5f7b9a 1195 mutex_unlock(&shmem_swaplist_mutex);
778dd893 1196
00501b53
JW
1197 if (error) {
1198 if (error != -ENOMEM)
1199 error = 0;
f627c2f5 1200 mem_cgroup_cancel_charge(page, memcg, false);
00501b53 1201 } else
f627c2f5 1202 mem_cgroup_commit_charge(page, memcg, true, false);
778dd893 1203out:
aaa46865 1204 unlock_page(page);
09cbfeaf 1205 put_page(page);
778dd893 1206 return error;
1da177e4
LT
1207}
1208
1209/*
1210 * Move the page from the page cache to the swap cache.
1211 */
1212static int shmem_writepage(struct page *page, struct writeback_control *wbc)
1213{
1214 struct shmem_inode_info *info;
1da177e4 1215 struct address_space *mapping;
1da177e4 1216 struct inode *inode;
6922c0c7
HD
1217 swp_entry_t swap;
1218 pgoff_t index;
1da177e4 1219
800d8c63 1220 VM_BUG_ON_PAGE(PageCompound(page), page);
1da177e4 1221 BUG_ON(!PageLocked(page));
1da177e4
LT
1222 mapping = page->mapping;
1223 index = page->index;
1224 inode = mapping->host;
1225 info = SHMEM_I(inode);
1226 if (info->flags & VM_LOCKED)
1227 goto redirty;
d9fe526a 1228 if (!total_swap_pages)
1da177e4
LT
1229 goto redirty;
1230
d9fe526a 1231 /*
97b713ba
CH
1232 * Our capabilities prevent regular writeback or sync from ever calling
1233 * shmem_writepage; but a stacking filesystem might use ->writepage of
1234 * its underlying filesystem, in which case tmpfs should write out to
1235 * swap only in response to memory pressure, and not for the writeback
1236 * threads or sync.
d9fe526a 1237 */
48f170fb
HD
1238 if (!wbc->for_reclaim) {
1239 WARN_ON_ONCE(1); /* Still happens? Tell us about it! */
1240 goto redirty;
1241 }
1635f6a7
HD
1242
1243 /*
1244 * This is somewhat ridiculous, but without plumbing a SWAP_MAP_FALLOC
1245 * value into swapfile.c, the only way we can correctly account for a
1246 * fallocated page arriving here is now to initialize it and write it.
1aac1400
HD
1247 *
1248 * That's okay for a page already fallocated earlier, but if we have
1249 * not yet completed the fallocation, then (a) we want to keep track
1250 * of this page in case we have to undo it, and (b) it may not be a
1251 * good idea to continue anyway, once we're pushing into swap. So
1252 * reactivate the page, and let shmem_fallocate() quit when too many.
1635f6a7
HD
1253 */
1254 if (!PageUptodate(page)) {
1aac1400
HD
1255 if (inode->i_private) {
1256 struct shmem_falloc *shmem_falloc;
1257 spin_lock(&inode->i_lock);
1258 shmem_falloc = inode->i_private;
1259 if (shmem_falloc &&
8e205f77 1260 !shmem_falloc->waitq &&
1aac1400
HD
1261 index >= shmem_falloc->start &&
1262 index < shmem_falloc->next)
1263 shmem_falloc->nr_unswapped++;
1264 else
1265 shmem_falloc = NULL;
1266 spin_unlock(&inode->i_lock);
1267 if (shmem_falloc)
1268 goto redirty;
1269 }
1635f6a7
HD
1270 clear_highpage(page);
1271 flush_dcache_page(page);
1272 SetPageUptodate(page);
1273 }
1274
48f170fb
HD
1275 swap = get_swap_page();
1276 if (!swap.val)
1277 goto redirty;
d9fe526a 1278
37e84351
VD
1279 if (mem_cgroup_try_charge_swap(page, swap))
1280 goto free_swap;
1281
b1dea800
HD
1282 /*
1283 * Add inode to shmem_unuse()'s list of swapped-out inodes,
6922c0c7
HD
1284 * if it's not already there. Do it now before the page is
1285 * moved to swap cache, when its pagelock no longer protects
b1dea800 1286 * the inode from eviction. But don't unlock the mutex until
6922c0c7
HD
1287 * we've incremented swapped, because shmem_unuse_inode() will
1288 * prune a !swapped inode from the swaplist under this mutex.
b1dea800 1289 */
48f170fb
HD
1290 mutex_lock(&shmem_swaplist_mutex);
1291 if (list_empty(&info->swaplist))
1292 list_add_tail(&info->swaplist, &shmem_swaplist);
b1dea800 1293
48f170fb 1294 if (add_to_swap_cache(page, swap, GFP_ATOMIC) == 0) {
4595ef88 1295 spin_lock_irq(&info->lock);
6922c0c7 1296 shmem_recalc_inode(inode);
267a4c76 1297 info->swapped++;
4595ef88 1298 spin_unlock_irq(&info->lock);
6922c0c7 1299
267a4c76
HD
1300 swap_shmem_alloc(swap);
1301 shmem_delete_from_page_cache(page, swp_to_radix_entry(swap));
1302
6922c0c7 1303 mutex_unlock(&shmem_swaplist_mutex);
d9fe526a 1304 BUG_ON(page_mapped(page));
9fab5619 1305 swap_writepage(page, wbc);
1da177e4
LT
1306 return 0;
1307 }
1308
6922c0c7 1309 mutex_unlock(&shmem_swaplist_mutex);
37e84351 1310free_swap:
0a31bc97 1311 swapcache_free(swap);
1da177e4
LT
1312redirty:
1313 set_page_dirty(page);
d9fe526a
HD
1314 if (wbc->for_reclaim)
1315 return AOP_WRITEPAGE_ACTIVATE; /* Return with page locked */
1316 unlock_page(page);
1317 return 0;
1da177e4
LT
1318}
1319
75edd345 1320#if defined(CONFIG_NUMA) && defined(CONFIG_TMPFS)
71fe804b 1321static void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
680d794b 1322{
095f1fc4 1323 char buffer[64];
680d794b 1324
71fe804b 1325 if (!mpol || mpol->mode == MPOL_DEFAULT)
095f1fc4 1326 return; /* show nothing */
680d794b 1327
a7a88b23 1328 mpol_to_str(buffer, sizeof(buffer), mpol);
095f1fc4
LS
1329
1330 seq_printf(seq, ",mpol=%s", buffer);
680d794b 1331}
71fe804b
LS
1332
1333static struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
1334{
1335 struct mempolicy *mpol = NULL;
1336 if (sbinfo->mpol) {
1337 spin_lock(&sbinfo->stat_lock); /* prevent replace/use races */
1338 mpol = sbinfo->mpol;
1339 mpol_get(mpol);
1340 spin_unlock(&sbinfo->stat_lock);
1341 }
1342 return mpol;
1343}
75edd345
HD
1344#else /* !CONFIG_NUMA || !CONFIG_TMPFS */
1345static inline void shmem_show_mpol(struct seq_file *seq, struct mempolicy *mpol)
1346{
1347}
1348static inline struct mempolicy *shmem_get_sbmpol(struct shmem_sb_info *sbinfo)
1349{
1350 return NULL;
1351}
1352#endif /* CONFIG_NUMA && CONFIG_TMPFS */
1353#ifndef CONFIG_NUMA
1354#define vm_policy vm_private_data
1355#endif
680d794b 1356
800d8c63
KS
1357static void shmem_pseudo_vma_init(struct vm_area_struct *vma,
1358 struct shmem_inode_info *info, pgoff_t index)
1359{
1360 /* Create a pseudo vma that just contains the policy */
1361 vma->vm_start = 0;
1362 /* Bias interleave by inode number to distribute better across nodes */
1363 vma->vm_pgoff = index + info->vfs_inode.i_ino;
1364 vma->vm_ops = NULL;
1365 vma->vm_policy = mpol_shared_policy_lookup(&info->policy, index);
1366}
1367
1368static void shmem_pseudo_vma_destroy(struct vm_area_struct *vma)
1369{
1370 /* Drop reference taken by mpol_shared_policy_lookup() */
1371 mpol_cond_put(vma->vm_policy);
1372}
1373
41ffe5d5
HD
1374static struct page *shmem_swapin(swp_entry_t swap, gfp_t gfp,
1375 struct shmem_inode_info *info, pgoff_t index)
1da177e4 1376{
1da177e4 1377 struct vm_area_struct pvma;
18a2f371 1378 struct page *page;
52cd3b07 1379
800d8c63 1380 shmem_pseudo_vma_init(&pvma, info, index);
18a2f371 1381 page = swapin_readahead(swap, gfp, &pvma, 0);
800d8c63 1382 shmem_pseudo_vma_destroy(&pvma);
18a2f371 1383
800d8c63
KS
1384 return page;
1385}
1386
1387static struct page *shmem_alloc_hugepage(gfp_t gfp,
1388 struct shmem_inode_info *info, pgoff_t index)
1389{
1390 struct vm_area_struct pvma;
1391 struct inode *inode = &info->vfs_inode;
1392 struct address_space *mapping = inode->i_mapping;
4620a06e 1393 pgoff_t idx, hindex;
800d8c63
KS
1394 void __rcu **results;
1395 struct page *page;
1396
e496cf3d 1397 if (!IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE))
800d8c63
KS
1398 return NULL;
1399
4620a06e 1400 hindex = round_down(index, HPAGE_PMD_NR);
800d8c63
KS
1401 rcu_read_lock();
1402 if (radix_tree_gang_lookup_slot(&mapping->page_tree, &results, &idx,
1403 hindex, 1) && idx < hindex + HPAGE_PMD_NR) {
1404 rcu_read_unlock();
1405 return NULL;
1406 }
1407 rcu_read_unlock();
18a2f371 1408
800d8c63
KS
1409 shmem_pseudo_vma_init(&pvma, info, hindex);
1410 page = alloc_pages_vma(gfp | __GFP_COMP | __GFP_NORETRY | __GFP_NOWARN,
1411 HPAGE_PMD_ORDER, &pvma, 0, numa_node_id(), true);
1412 shmem_pseudo_vma_destroy(&pvma);
1413 if (page)
1414 prep_transhuge_page(page);
18a2f371 1415 return page;
1da177e4
LT
1416}
1417
02098fea 1418static struct page *shmem_alloc_page(gfp_t gfp,
41ffe5d5 1419 struct shmem_inode_info *info, pgoff_t index)
1da177e4
LT
1420{
1421 struct vm_area_struct pvma;
18a2f371 1422 struct page *page;
1da177e4 1423
800d8c63
KS
1424 shmem_pseudo_vma_init(&pvma, info, index);
1425 page = alloc_page_vma(gfp, &pvma, 0);
1426 shmem_pseudo_vma_destroy(&pvma);
1427
1428 return page;
1429}
1430
1431static struct page *shmem_alloc_and_acct_page(gfp_t gfp,
1432 struct shmem_inode_info *info, struct shmem_sb_info *sbinfo,
1433 pgoff_t index, bool huge)
1434{
1435 struct page *page;
1436 int nr;
1437 int err = -ENOSPC;
52cd3b07 1438
e496cf3d 1439 if (!IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE))
800d8c63
KS
1440 huge = false;
1441 nr = huge ? HPAGE_PMD_NR : 1;
1442
1443 if (shmem_acct_block(info->flags, nr))
1444 goto failed;
1445 if (sbinfo->max_blocks) {
1446 if (percpu_counter_compare(&sbinfo->used_blocks,
1447 sbinfo->max_blocks - nr) > 0)
1448 goto unacct;
1449 percpu_counter_add(&sbinfo->used_blocks, nr);
1450 }
1451
1452 if (huge)
1453 page = shmem_alloc_hugepage(gfp, info, index);
1454 else
1455 page = shmem_alloc_page(gfp, info, index);
75edd345
HD
1456 if (page) {
1457 __SetPageLocked(page);
1458 __SetPageSwapBacked(page);
800d8c63 1459 return page;
75edd345 1460 }
18a2f371 1461
800d8c63
KS
1462 err = -ENOMEM;
1463 if (sbinfo->max_blocks)
1464 percpu_counter_add(&sbinfo->used_blocks, -nr);
1465unacct:
1466 shmem_unacct_blocks(info->flags, nr);
1467failed:
1468 return ERR_PTR(err);
1da177e4 1469}
71fe804b 1470
bde05d1c
HD
1471/*
1472 * When a page is moved from swapcache to shmem filecache (either by the
1473 * usual swapin of shmem_getpage_gfp(), or by the less common swapoff of
1474 * shmem_unuse_inode()), it may have been read in earlier from swap, in
1475 * ignorance of the mapping it belongs to. If that mapping has special
1476 * constraints (like the gma500 GEM driver, which requires RAM below 4GB),
1477 * we may need to copy to a suitable page before moving to filecache.
1478 *
1479 * In a future release, this may well be extended to respect cpuset and
1480 * NUMA mempolicy, and applied also to anonymous pages in do_swap_page();
1481 * but for now it is a simple matter of zone.
1482 */
1483static bool shmem_should_replace_page(struct page *page, gfp_t gfp)
1484{
1485 return page_zonenum(page) > gfp_zone(gfp);
1486}
1487
1488static int shmem_replace_page(struct page **pagep, gfp_t gfp,
1489 struct shmem_inode_info *info, pgoff_t index)
1490{
1491 struct page *oldpage, *newpage;
1492 struct address_space *swap_mapping;
1493 pgoff_t swap_index;
1494 int error;
1495
1496 oldpage = *pagep;
1497 swap_index = page_private(oldpage);
1498 swap_mapping = page_mapping(oldpage);
1499
1500 /*
1501 * We have arrived here because our zones are constrained, so don't
1502 * limit chance of success by further cpuset and node constraints.
1503 */
1504 gfp &= ~GFP_CONSTRAINT_MASK;
1505 newpage = shmem_alloc_page(gfp, info, index);
1506 if (!newpage)
1507 return -ENOMEM;
bde05d1c 1508
09cbfeaf 1509 get_page(newpage);
bde05d1c 1510 copy_highpage(newpage, oldpage);
0142ef6c 1511 flush_dcache_page(newpage);
bde05d1c 1512
9956edf3
HD
1513 __SetPageLocked(newpage);
1514 __SetPageSwapBacked(newpage);
bde05d1c 1515 SetPageUptodate(newpage);
bde05d1c 1516 set_page_private(newpage, swap_index);
bde05d1c
HD
1517 SetPageSwapCache(newpage);
1518
1519 /*
1520 * Our caller will very soon move newpage out of swapcache, but it's
1521 * a nice clean interface for us to replace oldpage by newpage there.
1522 */
1523 spin_lock_irq(&swap_mapping->tree_lock);
1524 error = shmem_radix_tree_replace(swap_mapping, swap_index, oldpage,
1525 newpage);
0142ef6c 1526 if (!error) {
11fb9989
MG
1527 __inc_node_page_state(newpage, NR_FILE_PAGES);
1528 __dec_node_page_state(oldpage, NR_FILE_PAGES);
0142ef6c 1529 }
bde05d1c 1530 spin_unlock_irq(&swap_mapping->tree_lock);
bde05d1c 1531
0142ef6c
HD
1532 if (unlikely(error)) {
1533 /*
1534 * Is this possible? I think not, now that our callers check
1535 * both PageSwapCache and page_private after getting page lock;
1536 * but be defensive. Reverse old to newpage for clear and free.
1537 */
1538 oldpage = newpage;
1539 } else {
6a93ca8f 1540 mem_cgroup_migrate(oldpage, newpage);
0142ef6c
HD
1541 lru_cache_add_anon(newpage);
1542 *pagep = newpage;
1543 }
bde05d1c
HD
1544
1545 ClearPageSwapCache(oldpage);
1546 set_page_private(oldpage, 0);
1547
1548 unlock_page(oldpage);
09cbfeaf
KS
1549 put_page(oldpage);
1550 put_page(oldpage);
0142ef6c 1551 return error;
bde05d1c
HD
1552}
1553
1da177e4 1554/*
68da9f05 1555 * shmem_getpage_gfp - find page in cache, or get from swap, or allocate
1da177e4
LT
1556 *
1557 * If we allocate a new one we do not mark it dirty. That's up to the
1558 * vm. If we swap it in we mark it dirty since we also free the swap
9e18eb29
ALC
1559 * entry since a page cannot live in both the swap and page cache.
1560 *
1561 * fault_mm and fault_type are only supplied by shmem_fault:
1562 * otherwise they are NULL.
1da177e4 1563 */
41ffe5d5 1564static int shmem_getpage_gfp(struct inode *inode, pgoff_t index,
9e18eb29
ALC
1565 struct page **pagep, enum sgp_type sgp, gfp_t gfp,
1566 struct mm_struct *fault_mm, int *fault_type)
1da177e4
LT
1567{
1568 struct address_space *mapping = inode->i_mapping;
23f919d4 1569 struct shmem_inode_info *info = SHMEM_I(inode);
1da177e4 1570 struct shmem_sb_info *sbinfo;
9e18eb29 1571 struct mm_struct *charge_mm;
00501b53 1572 struct mem_cgroup *memcg;
27ab7006 1573 struct page *page;
1da177e4 1574 swp_entry_t swap;
657e3038 1575 enum sgp_type sgp_huge = sgp;
800d8c63 1576 pgoff_t hindex = index;
1da177e4 1577 int error;
54af6042 1578 int once = 0;
1635f6a7 1579 int alloced = 0;
1da177e4 1580
09cbfeaf 1581 if (index > (MAX_LFS_FILESIZE >> PAGE_SHIFT))
1da177e4 1582 return -EFBIG;
657e3038
KS
1583 if (sgp == SGP_NOHUGE || sgp == SGP_HUGE)
1584 sgp = SGP_CACHE;
1da177e4 1585repeat:
54af6042 1586 swap.val = 0;
0cd6144a 1587 page = find_lock_entry(mapping, index);
54af6042
HD
1588 if (radix_tree_exceptional_entry(page)) {
1589 swap = radix_to_swp_entry(page);
1590 page = NULL;
1591 }
1592
75edd345 1593 if (sgp <= SGP_CACHE &&
09cbfeaf 1594 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
54af6042 1595 error = -EINVAL;
267a4c76 1596 goto unlock;
54af6042
HD
1597 }
1598
66d2f4d2
HD
1599 if (page && sgp == SGP_WRITE)
1600 mark_page_accessed(page);
1601
1635f6a7
HD
1602 /* fallocated page? */
1603 if (page && !PageUptodate(page)) {
1604 if (sgp != SGP_READ)
1605 goto clear;
1606 unlock_page(page);
09cbfeaf 1607 put_page(page);
1635f6a7
HD
1608 page = NULL;
1609 }
54af6042 1610 if (page || (sgp == SGP_READ && !swap.val)) {
54af6042
HD
1611 *pagep = page;
1612 return 0;
27ab7006
HD
1613 }
1614
1615 /*
54af6042
HD
1616 * Fast cache lookup did not find it:
1617 * bring it back from swap or allocate.
27ab7006 1618 */
54af6042 1619 sbinfo = SHMEM_SB(inode->i_sb);
9e18eb29 1620 charge_mm = fault_mm ? : current->mm;
1da177e4 1621
1da177e4
LT
1622 if (swap.val) {
1623 /* Look it up and read it in.. */
27ab7006
HD
1624 page = lookup_swap_cache(swap);
1625 if (!page) {
9e18eb29
ALC
1626 /* Or update major stats only when swapin succeeds?? */
1627 if (fault_type) {
68da9f05 1628 *fault_type |= VM_FAULT_MAJOR;
9e18eb29
ALC
1629 count_vm_event(PGMAJFAULT);
1630 mem_cgroup_count_vm_event(fault_mm, PGMAJFAULT);
1631 }
1632 /* Here we actually start the io */
41ffe5d5 1633 page = shmem_swapin(swap, gfp, info, index);
27ab7006 1634 if (!page) {
54af6042
HD
1635 error = -ENOMEM;
1636 goto failed;
1da177e4 1637 }
1da177e4
LT
1638 }
1639
1640 /* We have to do this with page locked to prevent races */
54af6042 1641 lock_page(page);
0142ef6c 1642 if (!PageSwapCache(page) || page_private(page) != swap.val ||
d1899228 1643 !shmem_confirm_swap(mapping, index, swap)) {
bde05d1c 1644 error = -EEXIST; /* try again */
d1899228 1645 goto unlock;
bde05d1c 1646 }
27ab7006 1647 if (!PageUptodate(page)) {
1da177e4 1648 error = -EIO;
54af6042 1649 goto failed;
1da177e4 1650 }
54af6042
HD
1651 wait_on_page_writeback(page);
1652
bde05d1c
HD
1653 if (shmem_should_replace_page(page, gfp)) {
1654 error = shmem_replace_page(&page, gfp, info, index);
1655 if (error)
1656 goto failed;
1da177e4 1657 }
27ab7006 1658
9e18eb29 1659 error = mem_cgroup_try_charge(page, charge_mm, gfp, &memcg,
f627c2f5 1660 false);
d1899228 1661 if (!error) {
aa3b1895 1662 error = shmem_add_to_page_cache(page, mapping, index,
fed400a1 1663 swp_to_radix_entry(swap));
215c02bc
HD
1664 /*
1665 * We already confirmed swap under page lock, and make
1666 * no memory allocation here, so usually no possibility
1667 * of error; but free_swap_and_cache() only trylocks a
1668 * page, so it is just possible that the entry has been
1669 * truncated or holepunched since swap was confirmed.
1670 * shmem_undo_range() will have done some of the
1671 * unaccounting, now delete_from_swap_cache() will do
93aa7d95 1672 * the rest.
215c02bc
HD
1673 * Reset swap.val? No, leave it so "failed" goes back to
1674 * "repeat": reading a hole and writing should succeed.
1675 */
00501b53 1676 if (error) {
f627c2f5 1677 mem_cgroup_cancel_charge(page, memcg, false);
215c02bc 1678 delete_from_swap_cache(page);
00501b53 1679 }
d1899228 1680 }
54af6042
HD
1681 if (error)
1682 goto failed;
1683
f627c2f5 1684 mem_cgroup_commit_charge(page, memcg, true, false);
00501b53 1685
4595ef88 1686 spin_lock_irq(&info->lock);
285b2c4f 1687 info->swapped--;
54af6042 1688 shmem_recalc_inode(inode);
4595ef88 1689 spin_unlock_irq(&info->lock);
54af6042 1690
66d2f4d2
HD
1691 if (sgp == SGP_WRITE)
1692 mark_page_accessed(page);
1693
54af6042 1694 delete_from_swap_cache(page);
27ab7006
HD
1695 set_page_dirty(page);
1696 swap_free(swap);
1697
54af6042 1698 } else {
800d8c63
KS
1699 /* shmem_symlink() */
1700 if (mapping->a_ops != &shmem_aops)
1701 goto alloc_nohuge;
657e3038 1702 if (shmem_huge == SHMEM_HUGE_DENY || sgp_huge == SGP_NOHUGE)
800d8c63
KS
1703 goto alloc_nohuge;
1704 if (shmem_huge == SHMEM_HUGE_FORCE)
1705 goto alloc_huge;
1706 switch (sbinfo->huge) {
1707 loff_t i_size;
1708 pgoff_t off;
1709 case SHMEM_HUGE_NEVER:
1710 goto alloc_nohuge;
1711 case SHMEM_HUGE_WITHIN_SIZE:
1712 off = round_up(index, HPAGE_PMD_NR);
1713 i_size = round_up(i_size_read(inode), PAGE_SIZE);
1714 if (i_size >= HPAGE_PMD_SIZE &&
1715 i_size >> PAGE_SHIFT >= off)
1716 goto alloc_huge;
1717 /* fallthrough */
1718 case SHMEM_HUGE_ADVISE:
657e3038
KS
1719 if (sgp_huge == SGP_HUGE)
1720 goto alloc_huge;
1721 /* TODO: implement fadvise() hints */
800d8c63 1722 goto alloc_nohuge;
54af6042 1723 }
1da177e4 1724
800d8c63
KS
1725alloc_huge:
1726 page = shmem_alloc_and_acct_page(gfp, info, sbinfo,
1727 index, true);
1728 if (IS_ERR(page)) {
1729alloc_nohuge: page = shmem_alloc_and_acct_page(gfp, info, sbinfo,
1730 index, false);
1da177e4 1731 }
800d8c63 1732 if (IS_ERR(page)) {
779750d2 1733 int retry = 5;
800d8c63
KS
1734 error = PTR_ERR(page);
1735 page = NULL;
779750d2
KS
1736 if (error != -ENOSPC)
1737 goto failed;
1738 /*
1739 * Try to reclaim some spece by splitting a huge page
1740 * beyond i_size on the filesystem.
1741 */
1742 while (retry--) {
1743 int ret;
1744 ret = shmem_unused_huge_shrink(sbinfo, NULL, 1);
1745 if (ret == SHRINK_STOP)
1746 break;
1747 if (ret)
1748 goto alloc_nohuge;
1749 }
800d8c63
KS
1750 goto failed;
1751 }
1752
1753 if (PageTransHuge(page))
1754 hindex = round_down(index, HPAGE_PMD_NR);
1755 else
1756 hindex = index;
1757
66d2f4d2 1758 if (sgp == SGP_WRITE)
eb39d618 1759 __SetPageReferenced(page);
66d2f4d2 1760
9e18eb29 1761 error = mem_cgroup_try_charge(page, charge_mm, gfp, &memcg,
800d8c63 1762 PageTransHuge(page));
54af6042 1763 if (error)
800d8c63
KS
1764 goto unacct;
1765 error = radix_tree_maybe_preload_order(gfp & GFP_RECLAIM_MASK,
1766 compound_order(page));
b065b432 1767 if (!error) {
800d8c63 1768 error = shmem_add_to_page_cache(page, mapping, hindex,
fed400a1 1769 NULL);
b065b432
HD
1770 radix_tree_preload_end();
1771 }
1772 if (error) {
800d8c63
KS
1773 mem_cgroup_cancel_charge(page, memcg,
1774 PageTransHuge(page));
1775 goto unacct;
b065b432 1776 }
800d8c63
KS
1777 mem_cgroup_commit_charge(page, memcg, false,
1778 PageTransHuge(page));
54af6042
HD
1779 lru_cache_add_anon(page);
1780
4595ef88 1781 spin_lock_irq(&info->lock);
800d8c63
KS
1782 info->alloced += 1 << compound_order(page);
1783 inode->i_blocks += BLOCKS_PER_PAGE << compound_order(page);
54af6042 1784 shmem_recalc_inode(inode);
4595ef88 1785 spin_unlock_irq(&info->lock);
1635f6a7 1786 alloced = true;
54af6042 1787
779750d2
KS
1788 if (PageTransHuge(page) &&
1789 DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE) <
1790 hindex + HPAGE_PMD_NR - 1) {
1791 /*
1792 * Part of the huge page is beyond i_size: subject
1793 * to shrink under memory pressure.
1794 */
1795 spin_lock(&sbinfo->shrinklist_lock);
1796 if (list_empty(&info->shrinklist)) {
1797 list_add_tail(&info->shrinklist,
1798 &sbinfo->shrinklist);
1799 sbinfo->shrinklist_len++;
1800 }
1801 spin_unlock(&sbinfo->shrinklist_lock);
1802 }
1803
ec9516fb 1804 /*
1635f6a7
HD
1805 * Let SGP_FALLOC use the SGP_WRITE optimization on a new page.
1806 */
1807 if (sgp == SGP_FALLOC)
1808 sgp = SGP_WRITE;
1809clear:
1810 /*
1811 * Let SGP_WRITE caller clear ends if write does not fill page;
1812 * but SGP_FALLOC on a page fallocated earlier must initialize
1813 * it now, lest undo on failure cancel our earlier guarantee.
ec9516fb 1814 */
800d8c63
KS
1815 if (sgp != SGP_WRITE && !PageUptodate(page)) {
1816 struct page *head = compound_head(page);
1817 int i;
1818
1819 for (i = 0; i < (1 << compound_order(head)); i++) {
1820 clear_highpage(head + i);
1821 flush_dcache_page(head + i);
1822 }
1823 SetPageUptodate(head);
ec9516fb 1824 }
1da177e4 1825 }
bde05d1c 1826
54af6042 1827 /* Perhaps the file has been truncated since we checked */
75edd345 1828 if (sgp <= SGP_CACHE &&
09cbfeaf 1829 ((loff_t)index << PAGE_SHIFT) >= i_size_read(inode)) {
267a4c76
HD
1830 if (alloced) {
1831 ClearPageDirty(page);
1832 delete_from_page_cache(page);
4595ef88 1833 spin_lock_irq(&info->lock);
267a4c76 1834 shmem_recalc_inode(inode);
4595ef88 1835 spin_unlock_irq(&info->lock);
267a4c76 1836 }
54af6042 1837 error = -EINVAL;
267a4c76 1838 goto unlock;
e83c32e8 1839 }
800d8c63 1840 *pagep = page + index - hindex;
54af6042 1841 return 0;
1da177e4 1842
59a16ead 1843 /*
54af6042 1844 * Error recovery.
59a16ead 1845 */
54af6042 1846unacct:
800d8c63
KS
1847 if (sbinfo->max_blocks)
1848 percpu_counter_sub(&sbinfo->used_blocks,
1849 1 << compound_order(page));
1850 shmem_unacct_blocks(info->flags, 1 << compound_order(page));
1851
1852 if (PageTransHuge(page)) {
1853 unlock_page(page);
1854 put_page(page);
1855 goto alloc_nohuge;
1856 }
54af6042 1857failed:
267a4c76 1858 if (swap.val && !shmem_confirm_swap(mapping, index, swap))
d1899228
HD
1859 error = -EEXIST;
1860unlock:
27ab7006 1861 if (page) {
54af6042 1862 unlock_page(page);
09cbfeaf 1863 put_page(page);
54af6042
HD
1864 }
1865 if (error == -ENOSPC && !once++) {
4595ef88 1866 spin_lock_irq(&info->lock);
54af6042 1867 shmem_recalc_inode(inode);
4595ef88 1868 spin_unlock_irq(&info->lock);
27ab7006 1869 goto repeat;
ff36b801 1870 }
d1899228 1871 if (error == -EEXIST) /* from above or from radix_tree_insert */
54af6042
HD
1872 goto repeat;
1873 return error;
1da177e4
LT
1874}
1875
10d20bd2
LT
1876/*
1877 * This is like autoremove_wake_function, but it removes the wait queue
1878 * entry unconditionally - even if something else had already woken the
1879 * target.
1880 */
1881static int synchronous_wake_function(wait_queue_t *wait, unsigned mode, int sync, void *key)
1882{
1883 int ret = default_wake_function(wait, mode, sync, key);
1884 list_del_init(&wait->task_list);
1885 return ret;
1886}
1887
d0217ac0 1888static int shmem_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
1da177e4 1889{
496ad9aa 1890 struct inode *inode = file_inode(vma->vm_file);
9e18eb29 1891 gfp_t gfp = mapping_gfp_mask(inode->i_mapping);
657e3038 1892 enum sgp_type sgp;
1da177e4 1893 int error;
68da9f05 1894 int ret = VM_FAULT_LOCKED;
1da177e4 1895
f00cdc6d
HD
1896 /*
1897 * Trinity finds that probing a hole which tmpfs is punching can
1898 * prevent the hole-punch from ever completing: which in turn
1899 * locks writers out with its hold on i_mutex. So refrain from
8e205f77
HD
1900 * faulting pages into the hole while it's being punched. Although
1901 * shmem_undo_range() does remove the additions, it may be unable to
1902 * keep up, as each new page needs its own unmap_mapping_range() call,
1903 * and the i_mmap tree grows ever slower to scan if new vmas are added.
1904 *
1905 * It does not matter if we sometimes reach this check just before the
1906 * hole-punch begins, so that one fault then races with the punch:
1907 * we just need to make racing faults a rare case.
1908 *
1909 * The implementation below would be much simpler if we just used a
1910 * standard mutex or completion: but we cannot take i_mutex in fault,
1911 * and bloating every shmem inode for this unlikely case would be sad.
f00cdc6d
HD
1912 */
1913 if (unlikely(inode->i_private)) {
1914 struct shmem_falloc *shmem_falloc;
1915
1916 spin_lock(&inode->i_lock);
1917 shmem_falloc = inode->i_private;
8e205f77
HD
1918 if (shmem_falloc &&
1919 shmem_falloc->waitq &&
1920 vmf->pgoff >= shmem_falloc->start &&
1921 vmf->pgoff < shmem_falloc->next) {
1922 wait_queue_head_t *shmem_falloc_waitq;
10d20bd2 1923 DEFINE_WAIT_FUNC(shmem_fault_wait, synchronous_wake_function);
8e205f77
HD
1924
1925 ret = VM_FAULT_NOPAGE;
f00cdc6d
HD
1926 if ((vmf->flags & FAULT_FLAG_ALLOW_RETRY) &&
1927 !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
8e205f77 1928 /* It's polite to up mmap_sem if we can */
f00cdc6d 1929 up_read(&vma->vm_mm->mmap_sem);
8e205f77 1930 ret = VM_FAULT_RETRY;
f00cdc6d 1931 }
8e205f77
HD
1932
1933 shmem_falloc_waitq = shmem_falloc->waitq;
1934 prepare_to_wait(shmem_falloc_waitq, &shmem_fault_wait,
1935 TASK_UNINTERRUPTIBLE);
1936 spin_unlock(&inode->i_lock);
1937 schedule();
1938
1939 /*
1940 * shmem_falloc_waitq points into the shmem_fallocate()
1941 * stack of the hole-punching task: shmem_falloc_waitq
1942 * is usually invalid by the time we reach here, but
1943 * finish_wait() does not dereference it in that case;
1944 * though i_lock needed lest racing with wake_up_all().
1945 */
1946 spin_lock(&inode->i_lock);
1947 finish_wait(shmem_falloc_waitq, &shmem_fault_wait);
1948 spin_unlock(&inode->i_lock);
1949 return ret;
f00cdc6d 1950 }
8e205f77 1951 spin_unlock(&inode->i_lock);
f00cdc6d
HD
1952 }
1953
657e3038
KS
1954 sgp = SGP_CACHE;
1955 if (vma->vm_flags & VM_HUGEPAGE)
1956 sgp = SGP_HUGE;
1957 else if (vma->vm_flags & VM_NOHUGEPAGE)
1958 sgp = SGP_NOHUGE;
1959
1960 error = shmem_getpage_gfp(inode, vmf->pgoff, &vmf->page, sgp,
9e18eb29 1961 gfp, vma->vm_mm, &ret);
d0217ac0
NP
1962 if (error)
1963 return ((error == -ENOMEM) ? VM_FAULT_OOM : VM_FAULT_SIGBUS);
68da9f05 1964 return ret;
1da177e4
LT
1965}
1966
c01d5b30
HD
1967unsigned long shmem_get_unmapped_area(struct file *file,
1968 unsigned long uaddr, unsigned long len,
1969 unsigned long pgoff, unsigned long flags)
1970{
1971 unsigned long (*get_area)(struct file *,
1972 unsigned long, unsigned long, unsigned long, unsigned long);
1973 unsigned long addr;
1974 unsigned long offset;
1975 unsigned long inflated_len;
1976 unsigned long inflated_addr;
1977 unsigned long inflated_offset;
1978
1979 if (len > TASK_SIZE)
1980 return -ENOMEM;
1981
1982 get_area = current->mm->get_unmapped_area;
1983 addr = get_area(file, uaddr, len, pgoff, flags);
1984
e496cf3d 1985 if (!IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE))
c01d5b30
HD
1986 return addr;
1987 if (IS_ERR_VALUE(addr))
1988 return addr;
1989 if (addr & ~PAGE_MASK)
1990 return addr;
1991 if (addr > TASK_SIZE - len)
1992 return addr;
1993
1994 if (shmem_huge == SHMEM_HUGE_DENY)
1995 return addr;
1996 if (len < HPAGE_PMD_SIZE)
1997 return addr;
1998 if (flags & MAP_FIXED)
1999 return addr;
2000 /*
2001 * Our priority is to support MAP_SHARED mapped hugely;
2002 * and support MAP_PRIVATE mapped hugely too, until it is COWed.
2003 * But if caller specified an address hint, respect that as before.
2004 */
2005 if (uaddr)
2006 return addr;
2007
2008 if (shmem_huge != SHMEM_HUGE_FORCE) {
2009 struct super_block *sb;
2010
2011 if (file) {
2012 VM_BUG_ON(file->f_op != &shmem_file_operations);
2013 sb = file_inode(file)->i_sb;
2014 } else {
2015 /*
2016 * Called directly from mm/mmap.c, or drivers/char/mem.c
2017 * for "/dev/zero", to create a shared anonymous object.
2018 */
2019 if (IS_ERR(shm_mnt))
2020 return addr;
2021 sb = shm_mnt->mnt_sb;
2022 }
3089bf61 2023 if (SHMEM_SB(sb)->huge == SHMEM_HUGE_NEVER)
c01d5b30
HD
2024 return addr;
2025 }
2026
2027 offset = (pgoff << PAGE_SHIFT) & (HPAGE_PMD_SIZE-1);
2028 if (offset && offset + len < 2 * HPAGE_PMD_SIZE)
2029 return addr;
2030 if ((addr & (HPAGE_PMD_SIZE-1)) == offset)
2031 return addr;
2032
2033 inflated_len = len + HPAGE_PMD_SIZE - PAGE_SIZE;
2034 if (inflated_len > TASK_SIZE)
2035 return addr;
2036 if (inflated_len < len)
2037 return addr;
2038
2039 inflated_addr = get_area(NULL, 0, inflated_len, 0, flags);
2040 if (IS_ERR_VALUE(inflated_addr))
2041 return addr;
2042 if (inflated_addr & ~PAGE_MASK)
2043 return addr;
2044
2045 inflated_offset = inflated_addr & (HPAGE_PMD_SIZE-1);
2046 inflated_addr += offset - inflated_offset;
2047 if (inflated_offset > offset)
2048 inflated_addr += HPAGE_PMD_SIZE;
2049
2050 if (inflated_addr > TASK_SIZE - len)
2051 return addr;
2052 return inflated_addr;
2053}
2054
1da177e4 2055#ifdef CONFIG_NUMA
41ffe5d5 2056static int shmem_set_policy(struct vm_area_struct *vma, struct mempolicy *mpol)
1da177e4 2057{
496ad9aa 2058 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 2059 return mpol_set_shared_policy(&SHMEM_I(inode)->policy, vma, mpol);
1da177e4
LT
2060}
2061
d8dc74f2
AB
2062static struct mempolicy *shmem_get_policy(struct vm_area_struct *vma,
2063 unsigned long addr)
1da177e4 2064{
496ad9aa 2065 struct inode *inode = file_inode(vma->vm_file);
41ffe5d5 2066 pgoff_t index;
1da177e4 2067
41ffe5d5
HD
2068 index = ((addr - vma->vm_start) >> PAGE_SHIFT) + vma->vm_pgoff;
2069 return mpol_shared_policy_lookup(&SHMEM_I(inode)->policy, index);
1da177e4
LT
2070}
2071#endif
2072
2073int shmem_lock(struct file *file, int lock, struct user_struct *user)
2074{
496ad9aa 2075 struct inode *inode = file_inode(file);
1da177e4
LT
2076 struct shmem_inode_info *info = SHMEM_I(inode);
2077 int retval = -ENOMEM;
2078
4595ef88 2079 spin_lock_irq(&info->lock);
1da177e4
LT
2080 if (lock && !(info->flags & VM_LOCKED)) {
2081 if (!user_shm_lock(inode->i_size, user))
2082 goto out_nomem;
2083 info->flags |= VM_LOCKED;
89e004ea 2084 mapping_set_unevictable(file->f_mapping);
1da177e4
LT
2085 }
2086 if (!lock && (info->flags & VM_LOCKED) && user) {
2087 user_shm_unlock(inode->i_size, user);
2088 info->flags &= ~VM_LOCKED;
89e004ea 2089 mapping_clear_unevictable(file->f_mapping);
1da177e4
LT
2090 }
2091 retval = 0;
89e004ea 2092
1da177e4 2093out_nomem:
4595ef88 2094 spin_unlock_irq(&info->lock);
1da177e4
LT
2095 return retval;
2096}
2097
9b83a6a8 2098static int shmem_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
2099{
2100 file_accessed(file);
2101 vma->vm_ops = &shmem_vm_ops;
e496cf3d 2102 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE) &&
f3f0e1d2
KS
2103 ((vma->vm_start + ~HPAGE_PMD_MASK) & HPAGE_PMD_MASK) <
2104 (vma->vm_end & HPAGE_PMD_MASK)) {
2105 khugepaged_enter(vma, vma->vm_flags);
2106 }
1da177e4
LT
2107 return 0;
2108}
2109
454abafe 2110static struct inode *shmem_get_inode(struct super_block *sb, const struct inode *dir,
09208d15 2111 umode_t mode, dev_t dev, unsigned long flags)
1da177e4
LT
2112{
2113 struct inode *inode;
2114 struct shmem_inode_info *info;
2115 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
2116
5b04c689
PE
2117 if (shmem_reserve_inode(sb))
2118 return NULL;
1da177e4
LT
2119
2120 inode = new_inode(sb);
2121 if (inode) {
85fe4025 2122 inode->i_ino = get_next_ino();
454abafe 2123 inode_init_owner(inode, dir, mode);
1da177e4 2124 inode->i_blocks = 0;
078cd827 2125 inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode);
91828a40 2126 inode->i_generation = get_seconds();
1da177e4
LT
2127 info = SHMEM_I(inode);
2128 memset(info, 0, (char *)inode - (char *)info);
2129 spin_lock_init(&info->lock);
40e041a2 2130 info->seals = F_SEAL_SEAL;
0b0a0806 2131 info->flags = flags & VM_NORESERVE;
779750d2 2132 INIT_LIST_HEAD(&info->shrinklist);
1da177e4 2133 INIT_LIST_HEAD(&info->swaplist);
38f38657 2134 simple_xattrs_init(&info->xattrs);
72c04902 2135 cache_no_acl(inode);
1da177e4
LT
2136
2137 switch (mode & S_IFMT) {
2138 default:
39f0247d 2139 inode->i_op = &shmem_special_inode_operations;
1da177e4
LT
2140 init_special_inode(inode, mode, dev);
2141 break;
2142 case S_IFREG:
14fcc23f 2143 inode->i_mapping->a_ops = &shmem_aops;
1da177e4
LT
2144 inode->i_op = &shmem_inode_operations;
2145 inode->i_fop = &shmem_file_operations;
71fe804b
LS
2146 mpol_shared_policy_init(&info->policy,
2147 shmem_get_sbmpol(sbinfo));
1da177e4
LT
2148 break;
2149 case S_IFDIR:
d8c76e6f 2150 inc_nlink(inode);
1da177e4
LT
2151 /* Some things misbehave if size == 0 on a directory */
2152 inode->i_size = 2 * BOGO_DIRENT_SIZE;
2153 inode->i_op = &shmem_dir_inode_operations;
2154 inode->i_fop = &simple_dir_operations;
2155 break;
2156 case S_IFLNK:
2157 /*
2158 * Must not load anything in the rbtree,
2159 * mpol_free_shared_policy will not be called.
2160 */
71fe804b 2161 mpol_shared_policy_init(&info->policy, NULL);
1da177e4
LT
2162 break;
2163 }
5b04c689
PE
2164 } else
2165 shmem_free_inode(sb);
1da177e4
LT
2166 return inode;
2167}
2168
0cd6144a
JW
2169bool shmem_mapping(struct address_space *mapping)
2170{
f0774d88
SL
2171 if (!mapping->host)
2172 return false;
2173
97b713ba 2174 return mapping->host->i_sb->s_op == &shmem_ops;
0cd6144a
JW
2175}
2176
1da177e4 2177#ifdef CONFIG_TMPFS
92e1d5be 2178static const struct inode_operations shmem_symlink_inode_operations;
69f07ec9 2179static const struct inode_operations shmem_short_symlink_operations;
1da177e4 2180
6d9d88d0
JS
2181#ifdef CONFIG_TMPFS_XATTR
2182static int shmem_initxattrs(struct inode *, const struct xattr *, void *);
2183#else
2184#define shmem_initxattrs NULL
2185#endif
2186
1da177e4 2187static int
800d15a5
NP
2188shmem_write_begin(struct file *file, struct address_space *mapping,
2189 loff_t pos, unsigned len, unsigned flags,
2190 struct page **pagep, void **fsdata)
1da177e4 2191{
800d15a5 2192 struct inode *inode = mapping->host;
40e041a2 2193 struct shmem_inode_info *info = SHMEM_I(inode);
09cbfeaf 2194 pgoff_t index = pos >> PAGE_SHIFT;
40e041a2
DH
2195
2196 /* i_mutex is held by caller */
2197 if (unlikely(info->seals)) {
2198 if (info->seals & F_SEAL_WRITE)
2199 return -EPERM;
2200 if ((info->seals & F_SEAL_GROW) && pos + len > inode->i_size)
2201 return -EPERM;
2202 }
2203
9e18eb29 2204 return shmem_getpage(inode, index, pagep, SGP_WRITE);
800d15a5
NP
2205}
2206
2207static int
2208shmem_write_end(struct file *file, struct address_space *mapping,
2209 loff_t pos, unsigned len, unsigned copied,
2210 struct page *page, void *fsdata)
2211{
2212 struct inode *inode = mapping->host;
2213
d3602444
HD
2214 if (pos + copied > inode->i_size)
2215 i_size_write(inode, pos + copied);
2216
ec9516fb 2217 if (!PageUptodate(page)) {
800d8c63
KS
2218 struct page *head = compound_head(page);
2219 if (PageTransCompound(page)) {
2220 int i;
2221
2222 for (i = 0; i < HPAGE_PMD_NR; i++) {
2223 if (head + i == page)
2224 continue;
2225 clear_highpage(head + i);
2226 flush_dcache_page(head + i);
2227 }
2228 }
09cbfeaf
KS
2229 if (copied < PAGE_SIZE) {
2230 unsigned from = pos & (PAGE_SIZE - 1);
ec9516fb 2231 zero_user_segments(page, 0, from,
09cbfeaf 2232 from + copied, PAGE_SIZE);
ec9516fb 2233 }
800d8c63 2234 SetPageUptodate(head);
ec9516fb 2235 }
800d15a5 2236 set_page_dirty(page);
6746aff7 2237 unlock_page(page);
09cbfeaf 2238 put_page(page);
800d15a5 2239
800d15a5 2240 return copied;
1da177e4
LT
2241}
2242
2ba5bbed 2243static ssize_t shmem_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1da177e4 2244{
6e58e79d
AV
2245 struct file *file = iocb->ki_filp;
2246 struct inode *inode = file_inode(file);
1da177e4 2247 struct address_space *mapping = inode->i_mapping;
41ffe5d5
HD
2248 pgoff_t index;
2249 unsigned long offset;
a0ee5ec5 2250 enum sgp_type sgp = SGP_READ;
f7c1d074 2251 int error = 0;
cb66a7a1 2252 ssize_t retval = 0;
6e58e79d 2253 loff_t *ppos = &iocb->ki_pos;
a0ee5ec5
HD
2254
2255 /*
2256 * Might this read be for a stacking filesystem? Then when reading
2257 * holes of a sparse file, we actually need to allocate those pages,
2258 * and even mark them dirty, so it cannot exceed the max_blocks limit.
2259 */
777eda2c 2260 if (!iter_is_iovec(to))
75edd345 2261 sgp = SGP_CACHE;
1da177e4 2262
09cbfeaf
KS
2263 index = *ppos >> PAGE_SHIFT;
2264 offset = *ppos & ~PAGE_MASK;
1da177e4
LT
2265
2266 for (;;) {
2267 struct page *page = NULL;
41ffe5d5
HD
2268 pgoff_t end_index;
2269 unsigned long nr, ret;
1da177e4
LT
2270 loff_t i_size = i_size_read(inode);
2271
09cbfeaf 2272 end_index = i_size >> PAGE_SHIFT;
1da177e4
LT
2273 if (index > end_index)
2274 break;
2275 if (index == end_index) {
09cbfeaf 2276 nr = i_size & ~PAGE_MASK;
1da177e4
LT
2277 if (nr <= offset)
2278 break;
2279 }
2280
9e18eb29 2281 error = shmem_getpage(inode, index, &page, sgp);
6e58e79d
AV
2282 if (error) {
2283 if (error == -EINVAL)
2284 error = 0;
1da177e4
LT
2285 break;
2286 }
75edd345
HD
2287 if (page) {
2288 if (sgp == SGP_CACHE)
2289 set_page_dirty(page);
d3602444 2290 unlock_page(page);
75edd345 2291 }
1da177e4
LT
2292
2293 /*
2294 * We must evaluate after, since reads (unlike writes)
1b1dcc1b 2295 * are called without i_mutex protection against truncate
1da177e4 2296 */
09cbfeaf 2297 nr = PAGE_SIZE;
1da177e4 2298 i_size = i_size_read(inode);
09cbfeaf 2299 end_index = i_size >> PAGE_SHIFT;
1da177e4 2300 if (index == end_index) {
09cbfeaf 2301 nr = i_size & ~PAGE_MASK;
1da177e4
LT
2302 if (nr <= offset) {
2303 if (page)
09cbfeaf 2304 put_page(page);
1da177e4
LT
2305 break;
2306 }
2307 }
2308 nr -= offset;
2309
2310 if (page) {
2311 /*
2312 * If users can be writing to this page using arbitrary
2313 * virtual addresses, take care about potential aliasing
2314 * before reading the page on the kernel side.
2315 */
2316 if (mapping_writably_mapped(mapping))
2317 flush_dcache_page(page);
2318 /*
2319 * Mark the page accessed if we read the beginning.
2320 */
2321 if (!offset)
2322 mark_page_accessed(page);
b5810039 2323 } else {
1da177e4 2324 page = ZERO_PAGE(0);
09cbfeaf 2325 get_page(page);
b5810039 2326 }
1da177e4
LT
2327
2328 /*
2329 * Ok, we have the page, and it's up-to-date, so
2330 * now we can copy it to user space...
1da177e4 2331 */
2ba5bbed 2332 ret = copy_page_to_iter(page, offset, nr, to);
6e58e79d 2333 retval += ret;
1da177e4 2334 offset += ret;
09cbfeaf
KS
2335 index += offset >> PAGE_SHIFT;
2336 offset &= ~PAGE_MASK;
1da177e4 2337
09cbfeaf 2338 put_page(page);
2ba5bbed 2339 if (!iov_iter_count(to))
1da177e4 2340 break;
6e58e79d
AV
2341 if (ret < nr) {
2342 error = -EFAULT;
2343 break;
2344 }
1da177e4
LT
2345 cond_resched();
2346 }
2347
09cbfeaf 2348 *ppos = ((loff_t) index << PAGE_SHIFT) + offset;
6e58e79d
AV
2349 file_accessed(file);
2350 return retval ? retval : error;
1da177e4
LT
2351}
2352
220f2ac9
HD
2353/*
2354 * llseek SEEK_DATA or SEEK_HOLE through the radix_tree.
2355 */
2356static pgoff_t shmem_seek_hole_data(struct address_space *mapping,
965c8e59 2357 pgoff_t index, pgoff_t end, int whence)
220f2ac9
HD
2358{
2359 struct page *page;
2360 struct pagevec pvec;
2361 pgoff_t indices[PAGEVEC_SIZE];
2362 bool done = false;
2363 int i;
2364
2365 pagevec_init(&pvec, 0);
2366 pvec.nr = 1; /* start small: we may be there already */
2367 while (!done) {
0cd6144a 2368 pvec.nr = find_get_entries(mapping, index,
220f2ac9
HD
2369 pvec.nr, pvec.pages, indices);
2370 if (!pvec.nr) {
965c8e59 2371 if (whence == SEEK_DATA)
220f2ac9
HD
2372 index = end;
2373 break;
2374 }
2375 for (i = 0; i < pvec.nr; i++, index++) {
2376 if (index < indices[i]) {
965c8e59 2377 if (whence == SEEK_HOLE) {
220f2ac9
HD
2378 done = true;
2379 break;
2380 }
2381 index = indices[i];
2382 }
2383 page = pvec.pages[i];
2384 if (page && !radix_tree_exceptional_entry(page)) {
2385 if (!PageUptodate(page))
2386 page = NULL;
2387 }
2388 if (index >= end ||
965c8e59
AM
2389 (page && whence == SEEK_DATA) ||
2390 (!page && whence == SEEK_HOLE)) {
220f2ac9
HD
2391 done = true;
2392 break;
2393 }
2394 }
0cd6144a 2395 pagevec_remove_exceptionals(&pvec);
220f2ac9
HD
2396 pagevec_release(&pvec);
2397 pvec.nr = PAGEVEC_SIZE;
2398 cond_resched();
2399 }
2400 return index;
2401}
2402
965c8e59 2403static loff_t shmem_file_llseek(struct file *file, loff_t offset, int whence)
220f2ac9
HD
2404{
2405 struct address_space *mapping = file->f_mapping;
2406 struct inode *inode = mapping->host;
2407 pgoff_t start, end;
2408 loff_t new_offset;
2409
965c8e59
AM
2410 if (whence != SEEK_DATA && whence != SEEK_HOLE)
2411 return generic_file_llseek_size(file, offset, whence,
220f2ac9 2412 MAX_LFS_FILESIZE, i_size_read(inode));
5955102c 2413 inode_lock(inode);
220f2ac9
HD
2414 /* We're holding i_mutex so we can access i_size directly */
2415
2416 if (offset < 0)
2417 offset = -EINVAL;
2418 else if (offset >= inode->i_size)
2419 offset = -ENXIO;
2420 else {
09cbfeaf
KS
2421 start = offset >> PAGE_SHIFT;
2422 end = (inode->i_size + PAGE_SIZE - 1) >> PAGE_SHIFT;
965c8e59 2423 new_offset = shmem_seek_hole_data(mapping, start, end, whence);
09cbfeaf 2424 new_offset <<= PAGE_SHIFT;
220f2ac9
HD
2425 if (new_offset > offset) {
2426 if (new_offset < inode->i_size)
2427 offset = new_offset;
965c8e59 2428 else if (whence == SEEK_DATA)
220f2ac9
HD
2429 offset = -ENXIO;
2430 else
2431 offset = inode->i_size;
2432 }
2433 }
2434
387aae6f
HD
2435 if (offset >= 0)
2436 offset = vfs_setpos(file, offset, MAX_LFS_FILESIZE);
5955102c 2437 inode_unlock(inode);
220f2ac9
HD
2438 return offset;
2439}
2440
05f65b5c
DH
2441/*
2442 * We need a tag: a new tag would expand every radix_tree_node by 8 bytes,
2443 * so reuse a tag which we firmly believe is never set or cleared on shmem.
2444 */
2445#define SHMEM_TAG_PINNED PAGECACHE_TAG_TOWRITE
2446#define LAST_SCAN 4 /* about 150ms max */
2447
2448static void shmem_tag_pins(struct address_space *mapping)
2449{
2450 struct radix_tree_iter iter;
2451 void **slot;
2452 pgoff_t start;
2453 struct page *page;
2454
2455 lru_add_drain();
2456 start = 0;
2457 rcu_read_lock();
2458
05f65b5c
DH
2459 radix_tree_for_each_slot(slot, &mapping->page_tree, &iter, start) {
2460 page = radix_tree_deref_slot(slot);
2461 if (!page || radix_tree_exception(page)) {
2cf938aa
MW
2462 if (radix_tree_deref_retry(page)) {
2463 slot = radix_tree_iter_retry(&iter);
2464 continue;
2465 }
05f65b5c
DH
2466 } else if (page_count(page) - page_mapcount(page) > 1) {
2467 spin_lock_irq(&mapping->tree_lock);
2468 radix_tree_tag_set(&mapping->page_tree, iter.index,
2469 SHMEM_TAG_PINNED);
2470 spin_unlock_irq(&mapping->tree_lock);
2471 }
2472
2473 if (need_resched()) {
148deab2 2474 slot = radix_tree_iter_resume(slot, &iter);
05f65b5c 2475 cond_resched_rcu();
05f65b5c
DH
2476 }
2477 }
2478 rcu_read_unlock();
2479}
2480
2481/*
2482 * Setting SEAL_WRITE requires us to verify there's no pending writer. However,
2483 * via get_user_pages(), drivers might have some pending I/O without any active
2484 * user-space mappings (eg., direct-IO, AIO). Therefore, we look at all pages
2485 * and see whether it has an elevated ref-count. If so, we tag them and wait for
2486 * them to be dropped.
2487 * The caller must guarantee that no new user will acquire writable references
2488 * to those pages to avoid races.
2489 */
40e041a2
DH
2490static int shmem_wait_for_pins(struct address_space *mapping)
2491{
05f65b5c
DH
2492 struct radix_tree_iter iter;
2493 void **slot;
2494 pgoff_t start;
2495 struct page *page;
2496 int error, scan;
2497
2498 shmem_tag_pins(mapping);
2499
2500 error = 0;
2501 for (scan = 0; scan <= LAST_SCAN; scan++) {
2502 if (!radix_tree_tagged(&mapping->page_tree, SHMEM_TAG_PINNED))
2503 break;
2504
2505 if (!scan)
2506 lru_add_drain_all();
2507 else if (schedule_timeout_killable((HZ << scan) / 200))
2508 scan = LAST_SCAN;
2509
2510 start = 0;
2511 rcu_read_lock();
05f65b5c
DH
2512 radix_tree_for_each_tagged(slot, &mapping->page_tree, &iter,
2513 start, SHMEM_TAG_PINNED) {
2514
2515 page = radix_tree_deref_slot(slot);
2516 if (radix_tree_exception(page)) {
2cf938aa
MW
2517 if (radix_tree_deref_retry(page)) {
2518 slot = radix_tree_iter_retry(&iter);
2519 continue;
2520 }
05f65b5c
DH
2521
2522 page = NULL;
2523 }
2524
2525 if (page &&
2526 page_count(page) - page_mapcount(page) != 1) {
2527 if (scan < LAST_SCAN)
2528 goto continue_resched;
2529
2530 /*
2531 * On the last scan, we clean up all those tags
2532 * we inserted; but make a note that we still
2533 * found pages pinned.
2534 */
2535 error = -EBUSY;
2536 }
2537
2538 spin_lock_irq(&mapping->tree_lock);
2539 radix_tree_tag_clear(&mapping->page_tree,
2540 iter.index, SHMEM_TAG_PINNED);
2541 spin_unlock_irq(&mapping->tree_lock);
2542continue_resched:
2543 if (need_resched()) {
148deab2 2544 slot = radix_tree_iter_resume(slot, &iter);
05f65b5c 2545 cond_resched_rcu();
05f65b5c
DH
2546 }
2547 }
2548 rcu_read_unlock();
2549 }
2550
2551 return error;
40e041a2
DH
2552}
2553
2554#define F_ALL_SEALS (F_SEAL_SEAL | \
2555 F_SEAL_SHRINK | \
2556 F_SEAL_GROW | \
2557 F_SEAL_WRITE)
2558
2559int shmem_add_seals(struct file *file, unsigned int seals)
2560{
2561 struct inode *inode = file_inode(file);
2562 struct shmem_inode_info *info = SHMEM_I(inode);
2563 int error;
2564
2565 /*
2566 * SEALING
2567 * Sealing allows multiple parties to share a shmem-file but restrict
2568 * access to a specific subset of file operations. Seals can only be
2569 * added, but never removed. This way, mutually untrusted parties can
2570 * share common memory regions with a well-defined policy. A malicious
2571 * peer can thus never perform unwanted operations on a shared object.
2572 *
2573 * Seals are only supported on special shmem-files and always affect
2574 * the whole underlying inode. Once a seal is set, it may prevent some
2575 * kinds of access to the file. Currently, the following seals are
2576 * defined:
2577 * SEAL_SEAL: Prevent further seals from being set on this file
2578 * SEAL_SHRINK: Prevent the file from shrinking
2579 * SEAL_GROW: Prevent the file from growing
2580 * SEAL_WRITE: Prevent write access to the file
2581 *
2582 * As we don't require any trust relationship between two parties, we
2583 * must prevent seals from being removed. Therefore, sealing a file
2584 * only adds a given set of seals to the file, it never touches
2585 * existing seals. Furthermore, the "setting seals"-operation can be
2586 * sealed itself, which basically prevents any further seal from being
2587 * added.
2588 *
2589 * Semantics of sealing are only defined on volatile files. Only
2590 * anonymous shmem files support sealing. More importantly, seals are
2591 * never written to disk. Therefore, there's no plan to support it on
2592 * other file types.
2593 */
2594
2595 if (file->f_op != &shmem_file_operations)
2596 return -EINVAL;
2597 if (!(file->f_mode & FMODE_WRITE))
2598 return -EPERM;
2599 if (seals & ~(unsigned int)F_ALL_SEALS)
2600 return -EINVAL;
2601
5955102c 2602 inode_lock(inode);
40e041a2
DH
2603
2604 if (info->seals & F_SEAL_SEAL) {
2605 error = -EPERM;
2606 goto unlock;
2607 }
2608
2609 if ((seals & F_SEAL_WRITE) && !(info->seals & F_SEAL_WRITE)) {
2610 error = mapping_deny_writable(file->f_mapping);
2611 if (error)
2612 goto unlock;
2613
2614 error = shmem_wait_for_pins(file->f_mapping);
2615 if (error) {
2616 mapping_allow_writable(file->f_mapping);
2617 goto unlock;
2618 }
2619 }
2620
2621 info->seals |= seals;
2622 error = 0;
2623
2624unlock:
5955102c 2625 inode_unlock(inode);
40e041a2
DH
2626 return error;
2627}
2628EXPORT_SYMBOL_GPL(shmem_add_seals);
2629
2630int shmem_get_seals(struct file *file)
2631{
2632 if (file->f_op != &shmem_file_operations)
2633 return -EINVAL;
2634
2635 return SHMEM_I(file_inode(file))->seals;
2636}
2637EXPORT_SYMBOL_GPL(shmem_get_seals);
2638
2639long shmem_fcntl(struct file *file, unsigned int cmd, unsigned long arg)
2640{
2641 long error;
2642
2643 switch (cmd) {
2644 case F_ADD_SEALS:
2645 /* disallow upper 32bit */
2646 if (arg > UINT_MAX)
2647 return -EINVAL;
2648
2649 error = shmem_add_seals(file, arg);
2650 break;
2651 case F_GET_SEALS:
2652 error = shmem_get_seals(file);
2653 break;
2654 default:
2655 error = -EINVAL;
2656 break;
2657 }
2658
2659 return error;
2660}
2661
83e4fa9c
HD
2662static long shmem_fallocate(struct file *file, int mode, loff_t offset,
2663 loff_t len)
2664{
496ad9aa 2665 struct inode *inode = file_inode(file);
e2d12e22 2666 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
40e041a2 2667 struct shmem_inode_info *info = SHMEM_I(inode);
1aac1400 2668 struct shmem_falloc shmem_falloc;
e2d12e22
HD
2669 pgoff_t start, index, end;
2670 int error;
83e4fa9c 2671
13ace4d0
HD
2672 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE))
2673 return -EOPNOTSUPP;
2674
5955102c 2675 inode_lock(inode);
83e4fa9c
HD
2676
2677 if (mode & FALLOC_FL_PUNCH_HOLE) {
2678 struct address_space *mapping = file->f_mapping;
2679 loff_t unmap_start = round_up(offset, PAGE_SIZE);
2680 loff_t unmap_end = round_down(offset + len, PAGE_SIZE) - 1;
8e205f77 2681 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(shmem_falloc_waitq);
83e4fa9c 2682
40e041a2
DH
2683 /* protected by i_mutex */
2684 if (info->seals & F_SEAL_WRITE) {
2685 error = -EPERM;
2686 goto out;
2687 }
2688
8e205f77 2689 shmem_falloc.waitq = &shmem_falloc_waitq;
f00cdc6d
HD
2690 shmem_falloc.start = unmap_start >> PAGE_SHIFT;
2691 shmem_falloc.next = (unmap_end + 1) >> PAGE_SHIFT;
2692 spin_lock(&inode->i_lock);
2693 inode->i_private = &shmem_falloc;
2694 spin_unlock(&inode->i_lock);
2695
83e4fa9c
HD
2696 if ((u64)unmap_end > (u64)unmap_start)
2697 unmap_mapping_range(mapping, unmap_start,
2698 1 + unmap_end - unmap_start, 0);
2699 shmem_truncate_range(inode, offset, offset + len - 1);
2700 /* No need to unmap again: hole-punching leaves COWed pages */
8e205f77
HD
2701
2702 spin_lock(&inode->i_lock);
2703 inode->i_private = NULL;
2704 wake_up_all(&shmem_falloc_waitq);
10d20bd2 2705 WARN_ON_ONCE(!list_empty(&shmem_falloc_waitq.task_list));
8e205f77 2706 spin_unlock(&inode->i_lock);
83e4fa9c 2707 error = 0;
8e205f77 2708 goto out;
e2d12e22
HD
2709 }
2710
2711 /* We need to check rlimit even when FALLOC_FL_KEEP_SIZE */
2712 error = inode_newsize_ok(inode, offset + len);
2713 if (error)
2714 goto out;
2715
40e041a2
DH
2716 if ((info->seals & F_SEAL_GROW) && offset + len > inode->i_size) {
2717 error = -EPERM;
2718 goto out;
2719 }
2720
09cbfeaf
KS
2721 start = offset >> PAGE_SHIFT;
2722 end = (offset + len + PAGE_SIZE - 1) >> PAGE_SHIFT;
e2d12e22
HD
2723 /* Try to avoid a swapstorm if len is impossible to satisfy */
2724 if (sbinfo->max_blocks && end - start > sbinfo->max_blocks) {
2725 error = -ENOSPC;
2726 goto out;
83e4fa9c
HD
2727 }
2728
8e205f77 2729 shmem_falloc.waitq = NULL;
1aac1400
HD
2730 shmem_falloc.start = start;
2731 shmem_falloc.next = start;
2732 shmem_falloc.nr_falloced = 0;
2733 shmem_falloc.nr_unswapped = 0;
2734 spin_lock(&inode->i_lock);
2735 inode->i_private = &shmem_falloc;
2736 spin_unlock(&inode->i_lock);
2737
e2d12e22
HD
2738 for (index = start; index < end; index++) {
2739 struct page *page;
2740
2741 /*
2742 * Good, the fallocate(2) manpage permits EINTR: we may have
2743 * been interrupted because we are using up too much memory.
2744 */
2745 if (signal_pending(current))
2746 error = -EINTR;
1aac1400
HD
2747 else if (shmem_falloc.nr_unswapped > shmem_falloc.nr_falloced)
2748 error = -ENOMEM;
e2d12e22 2749 else
9e18eb29 2750 error = shmem_getpage(inode, index, &page, SGP_FALLOC);
e2d12e22 2751 if (error) {
1635f6a7 2752 /* Remove the !PageUptodate pages we added */
7f556567
HD
2753 if (index > start) {
2754 shmem_undo_range(inode,
2755 (loff_t)start << PAGE_SHIFT,
2756 ((loff_t)index << PAGE_SHIFT) - 1, true);
2757 }
1aac1400 2758 goto undone;
e2d12e22
HD
2759 }
2760
1aac1400
HD
2761 /*
2762 * Inform shmem_writepage() how far we have reached.
2763 * No need for lock or barrier: we have the page lock.
2764 */
2765 shmem_falloc.next++;
2766 if (!PageUptodate(page))
2767 shmem_falloc.nr_falloced++;
2768
e2d12e22 2769 /*
1635f6a7
HD
2770 * If !PageUptodate, leave it that way so that freeable pages
2771 * can be recognized if we need to rollback on error later.
2772 * But set_page_dirty so that memory pressure will swap rather
e2d12e22
HD
2773 * than free the pages we are allocating (and SGP_CACHE pages
2774 * might still be clean: we now need to mark those dirty too).
2775 */
2776 set_page_dirty(page);
2777 unlock_page(page);
09cbfeaf 2778 put_page(page);
e2d12e22
HD
2779 cond_resched();
2780 }
2781
2782 if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + len > inode->i_size)
2783 i_size_write(inode, offset + len);
078cd827 2784 inode->i_ctime = current_time(inode);
1aac1400
HD
2785undone:
2786 spin_lock(&inode->i_lock);
2787 inode->i_private = NULL;
2788 spin_unlock(&inode->i_lock);
e2d12e22 2789out:
5955102c 2790 inode_unlock(inode);
83e4fa9c
HD
2791 return error;
2792}
2793
726c3342 2794static int shmem_statfs(struct dentry *dentry, struct kstatfs *buf)
1da177e4 2795{
726c3342 2796 struct shmem_sb_info *sbinfo = SHMEM_SB(dentry->d_sb);
1da177e4
LT
2797
2798 buf->f_type = TMPFS_MAGIC;
09cbfeaf 2799 buf->f_bsize = PAGE_SIZE;
1da177e4 2800 buf->f_namelen = NAME_MAX;
0edd73b3 2801 if (sbinfo->max_blocks) {
1da177e4 2802 buf->f_blocks = sbinfo->max_blocks;
41ffe5d5
HD
2803 buf->f_bavail =
2804 buf->f_bfree = sbinfo->max_blocks -
2805 percpu_counter_sum(&sbinfo->used_blocks);
0edd73b3
HD
2806 }
2807 if (sbinfo->max_inodes) {
1da177e4
LT
2808 buf->f_files = sbinfo->max_inodes;
2809 buf->f_ffree = sbinfo->free_inodes;
1da177e4
LT
2810 }
2811 /* else leave those fields 0 like simple_statfs */
2812 return 0;
2813}
2814
2815/*
2816 * File creation. Allocate an inode, and we're done..
2817 */
2818static int
1a67aafb 2819shmem_mknod(struct inode *dir, struct dentry *dentry, umode_t mode, dev_t dev)
1da177e4 2820{
0b0a0806 2821 struct inode *inode;
1da177e4
LT
2822 int error = -ENOSPC;
2823
454abafe 2824 inode = shmem_get_inode(dir->i_sb, dir, mode, dev, VM_NORESERVE);
1da177e4 2825 if (inode) {
feda821e
CH
2826 error = simple_acl_create(dir, inode);
2827 if (error)
2828 goto out_iput;
2a7dba39 2829 error = security_inode_init_security(inode, dir,
9d8f13ba 2830 &dentry->d_name,
6d9d88d0 2831 shmem_initxattrs, NULL);
feda821e
CH
2832 if (error && error != -EOPNOTSUPP)
2833 goto out_iput;
37ec43cd 2834
718deb6b 2835 error = 0;
1da177e4 2836 dir->i_size += BOGO_DIRENT_SIZE;
078cd827 2837 dir->i_ctime = dir->i_mtime = current_time(dir);
1da177e4
LT
2838 d_instantiate(dentry, inode);
2839 dget(dentry); /* Extra count - pin the dentry in core */
1da177e4
LT
2840 }
2841 return error;
feda821e
CH
2842out_iput:
2843 iput(inode);
2844 return error;
1da177e4
LT
2845}
2846
60545d0d
AV
2847static int
2848shmem_tmpfile(struct inode *dir, struct dentry *dentry, umode_t mode)
2849{
2850 struct inode *inode;
2851 int error = -ENOSPC;
2852
2853 inode = shmem_get_inode(dir->i_sb, dir, mode, 0, VM_NORESERVE);
2854 if (inode) {
2855 error = security_inode_init_security(inode, dir,
2856 NULL,
2857 shmem_initxattrs, NULL);
feda821e
CH
2858 if (error && error != -EOPNOTSUPP)
2859 goto out_iput;
2860 error = simple_acl_create(dir, inode);
2861 if (error)
2862 goto out_iput;
60545d0d
AV
2863 d_tmpfile(dentry, inode);
2864 }
2865 return error;
feda821e
CH
2866out_iput:
2867 iput(inode);
2868 return error;
60545d0d
AV
2869}
2870
18bb1db3 2871static int shmem_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
1da177e4
LT
2872{
2873 int error;
2874
2875 if ((error = shmem_mknod(dir, dentry, mode | S_IFDIR, 0)))
2876 return error;
d8c76e6f 2877 inc_nlink(dir);
1da177e4
LT
2878 return 0;
2879}
2880
4acdaf27 2881static int shmem_create(struct inode *dir, struct dentry *dentry, umode_t mode,
ebfc3b49 2882 bool excl)
1da177e4
LT
2883{
2884 return shmem_mknod(dir, dentry, mode | S_IFREG, 0);
2885}
2886
2887/*
2888 * Link a file..
2889 */
2890static int shmem_link(struct dentry *old_dentry, struct inode *dir, struct dentry *dentry)
2891{
75c3cfa8 2892 struct inode *inode = d_inode(old_dentry);
5b04c689 2893 int ret;
1da177e4
LT
2894
2895 /*
2896 * No ordinary (disk based) filesystem counts links as inodes;
2897 * but each new link needs a new dentry, pinning lowmem, and
2898 * tmpfs dentries cannot be pruned until they are unlinked.
2899 */
5b04c689
PE
2900 ret = shmem_reserve_inode(inode->i_sb);
2901 if (ret)
2902 goto out;
1da177e4
LT
2903
2904 dir->i_size += BOGO_DIRENT_SIZE;
078cd827 2905 inode->i_ctime = dir->i_ctime = dir->i_mtime = current_time(inode);
d8c76e6f 2906 inc_nlink(inode);
7de9c6ee 2907 ihold(inode); /* New dentry reference */
1da177e4
LT
2908 dget(dentry); /* Extra pinning count for the created dentry */
2909 d_instantiate(dentry, inode);
5b04c689
PE
2910out:
2911 return ret;
1da177e4
LT
2912}
2913
2914static int shmem_unlink(struct inode *dir, struct dentry *dentry)
2915{
75c3cfa8 2916 struct inode *inode = d_inode(dentry);
1da177e4 2917
5b04c689
PE
2918 if (inode->i_nlink > 1 && !S_ISDIR(inode->i_mode))
2919 shmem_free_inode(inode->i_sb);
1da177e4
LT
2920
2921 dir->i_size -= BOGO_DIRENT_SIZE;
078cd827 2922 inode->i_ctime = dir->i_ctime = dir->i_mtime = current_time(inode);
9a53c3a7 2923 drop_nlink(inode);
1da177e4
LT
2924 dput(dentry); /* Undo the count from "create" - this does all the work */
2925 return 0;
2926}
2927
2928static int shmem_rmdir(struct inode *dir, struct dentry *dentry)
2929{
2930 if (!simple_empty(dentry))
2931 return -ENOTEMPTY;
2932
75c3cfa8 2933 drop_nlink(d_inode(dentry));
9a53c3a7 2934 drop_nlink(dir);
1da177e4
LT
2935 return shmem_unlink(dir, dentry);
2936}
2937
37456771
MS
2938static int shmem_exchange(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry)
2939{
e36cb0b8
DH
2940 bool old_is_dir = d_is_dir(old_dentry);
2941 bool new_is_dir = d_is_dir(new_dentry);
37456771
MS
2942
2943 if (old_dir != new_dir && old_is_dir != new_is_dir) {
2944 if (old_is_dir) {
2945 drop_nlink(old_dir);
2946 inc_nlink(new_dir);
2947 } else {
2948 drop_nlink(new_dir);
2949 inc_nlink(old_dir);
2950 }
2951 }
2952 old_dir->i_ctime = old_dir->i_mtime =
2953 new_dir->i_ctime = new_dir->i_mtime =
75c3cfa8 2954 d_inode(old_dentry)->i_ctime =
078cd827 2955 d_inode(new_dentry)->i_ctime = current_time(old_dir);
37456771
MS
2956
2957 return 0;
2958}
2959
46fdb794
MS
2960static int shmem_whiteout(struct inode *old_dir, struct dentry *old_dentry)
2961{
2962 struct dentry *whiteout;
2963 int error;
2964
2965 whiteout = d_alloc(old_dentry->d_parent, &old_dentry->d_name);
2966 if (!whiteout)
2967 return -ENOMEM;
2968
2969 error = shmem_mknod(old_dir, whiteout,
2970 S_IFCHR | WHITEOUT_MODE, WHITEOUT_DEV);
2971 dput(whiteout);
2972 if (error)
2973 return error;
2974
2975 /*
2976 * Cheat and hash the whiteout while the old dentry is still in
2977 * place, instead of playing games with FS_RENAME_DOES_D_MOVE.
2978 *
2979 * d_lookup() will consistently find one of them at this point,
2980 * not sure which one, but that isn't even important.
2981 */
2982 d_rehash(whiteout);
2983 return 0;
2984}
2985
1da177e4
LT
2986/*
2987 * The VFS layer already does all the dentry stuff for rename,
2988 * we just have to decrement the usage count for the target if
2989 * it exists so that the VFS layer correctly free's it when it
2990 * gets overwritten.
2991 */
3b69ff51 2992static int shmem_rename2(struct inode *old_dir, struct dentry *old_dentry, struct inode *new_dir, struct dentry *new_dentry, unsigned int flags)
1da177e4 2993{
75c3cfa8 2994 struct inode *inode = d_inode(old_dentry);
1da177e4
LT
2995 int they_are_dirs = S_ISDIR(inode->i_mode);
2996
46fdb794 2997 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
3b69ff51
MS
2998 return -EINVAL;
2999
37456771
MS
3000 if (flags & RENAME_EXCHANGE)
3001 return shmem_exchange(old_dir, old_dentry, new_dir, new_dentry);
3002
1da177e4
LT
3003 if (!simple_empty(new_dentry))
3004 return -ENOTEMPTY;
3005
46fdb794
MS
3006 if (flags & RENAME_WHITEOUT) {
3007 int error;
3008
3009 error = shmem_whiteout(old_dir, old_dentry);
3010 if (error)
3011 return error;
3012 }
3013
75c3cfa8 3014 if (d_really_is_positive(new_dentry)) {
1da177e4 3015 (void) shmem_unlink(new_dir, new_dentry);
b928095b 3016 if (they_are_dirs) {
75c3cfa8 3017 drop_nlink(d_inode(new_dentry));
9a53c3a7 3018 drop_nlink(old_dir);
b928095b 3019 }
1da177e4 3020 } else if (they_are_dirs) {
9a53c3a7 3021 drop_nlink(old_dir);
d8c76e6f 3022 inc_nlink(new_dir);
1da177e4
LT
3023 }
3024
3025 old_dir->i_size -= BOGO_DIRENT_SIZE;
3026 new_dir->i_size += BOGO_DIRENT_SIZE;
3027 old_dir->i_ctime = old_dir->i_mtime =
3028 new_dir->i_ctime = new_dir->i_mtime =
078cd827 3029 inode->i_ctime = current_time(old_dir);
1da177e4
LT
3030 return 0;
3031}
3032
3033static int shmem_symlink(struct inode *dir, struct dentry *dentry, const char *symname)
3034{
3035 int error;
3036 int len;
3037 struct inode *inode;
9276aad6 3038 struct page *page;
1da177e4
LT
3039 struct shmem_inode_info *info;
3040
3041 len = strlen(symname) + 1;
09cbfeaf 3042 if (len > PAGE_SIZE)
1da177e4
LT
3043 return -ENAMETOOLONG;
3044
454abafe 3045 inode = shmem_get_inode(dir->i_sb, dir, S_IFLNK|S_IRWXUGO, 0, VM_NORESERVE);
1da177e4
LT
3046 if (!inode)
3047 return -ENOSPC;
3048
9d8f13ba 3049 error = security_inode_init_security(inode, dir, &dentry->d_name,
6d9d88d0 3050 shmem_initxattrs, NULL);
570bc1c2
SS
3051 if (error) {
3052 if (error != -EOPNOTSUPP) {
3053 iput(inode);
3054 return error;
3055 }
3056 error = 0;
3057 }
3058
1da177e4
LT
3059 info = SHMEM_I(inode);
3060 inode->i_size = len-1;
69f07ec9 3061 if (len <= SHORT_SYMLINK_LEN) {
3ed47db3
AV
3062 inode->i_link = kmemdup(symname, len, GFP_KERNEL);
3063 if (!inode->i_link) {
69f07ec9
HD
3064 iput(inode);
3065 return -ENOMEM;
3066 }
3067 inode->i_op = &shmem_short_symlink_operations;
1da177e4 3068 } else {
e8ecde25 3069 inode_nohighmem(inode);
9e18eb29 3070 error = shmem_getpage(inode, 0, &page, SGP_WRITE);
1da177e4
LT
3071 if (error) {
3072 iput(inode);
3073 return error;
3074 }
14fcc23f 3075 inode->i_mapping->a_ops = &shmem_aops;
1da177e4 3076 inode->i_op = &shmem_symlink_inode_operations;
21fc61c7 3077 memcpy(page_address(page), symname, len);
ec9516fb 3078 SetPageUptodate(page);
1da177e4 3079 set_page_dirty(page);
6746aff7 3080 unlock_page(page);
09cbfeaf 3081 put_page(page);
1da177e4 3082 }
1da177e4 3083 dir->i_size += BOGO_DIRENT_SIZE;
078cd827 3084 dir->i_ctime = dir->i_mtime = current_time(dir);
1da177e4
LT
3085 d_instantiate(dentry, inode);
3086 dget(dentry);
3087 return 0;
3088}
3089
fceef393 3090static void shmem_put_link(void *arg)
1da177e4 3091{
fceef393
AV
3092 mark_page_accessed(arg);
3093 put_page(arg);
1da177e4
LT
3094}
3095
6b255391 3096static const char *shmem_get_link(struct dentry *dentry,
fceef393
AV
3097 struct inode *inode,
3098 struct delayed_call *done)
1da177e4 3099{
1da177e4 3100 struct page *page = NULL;
6b255391 3101 int error;
6a6c9904
AV
3102 if (!dentry) {
3103 page = find_get_page(inode->i_mapping, 0);
3104 if (!page)
3105 return ERR_PTR(-ECHILD);
3106 if (!PageUptodate(page)) {
3107 put_page(page);
3108 return ERR_PTR(-ECHILD);
3109 }
3110 } else {
9e18eb29 3111 error = shmem_getpage(inode, 0, &page, SGP_READ);
6a6c9904
AV
3112 if (error)
3113 return ERR_PTR(error);
3114 unlock_page(page);
3115 }
fceef393 3116 set_delayed_call(done, shmem_put_link, page);
21fc61c7 3117 return page_address(page);
1da177e4
LT
3118}
3119
b09e0fa4 3120#ifdef CONFIG_TMPFS_XATTR
46711810 3121/*
b09e0fa4
EP
3122 * Superblocks without xattr inode operations may get some security.* xattr
3123 * support from the LSM "for free". As soon as we have any other xattrs
39f0247d
AG
3124 * like ACLs, we also need to implement the security.* handlers at
3125 * filesystem level, though.
3126 */
3127
6d9d88d0
JS
3128/*
3129 * Callback for security_inode_init_security() for acquiring xattrs.
3130 */
3131static int shmem_initxattrs(struct inode *inode,
3132 const struct xattr *xattr_array,
3133 void *fs_info)
3134{
3135 struct shmem_inode_info *info = SHMEM_I(inode);
3136 const struct xattr *xattr;
38f38657 3137 struct simple_xattr *new_xattr;
6d9d88d0
JS
3138 size_t len;
3139
3140 for (xattr = xattr_array; xattr->name != NULL; xattr++) {
38f38657 3141 new_xattr = simple_xattr_alloc(xattr->value, xattr->value_len);
6d9d88d0
JS
3142 if (!new_xattr)
3143 return -ENOMEM;
3144
3145 len = strlen(xattr->name) + 1;
3146 new_xattr->name = kmalloc(XATTR_SECURITY_PREFIX_LEN + len,
3147 GFP_KERNEL);
3148 if (!new_xattr->name) {
3149 kfree(new_xattr);
3150 return -ENOMEM;
3151 }
3152
3153 memcpy(new_xattr->name, XATTR_SECURITY_PREFIX,
3154 XATTR_SECURITY_PREFIX_LEN);
3155 memcpy(new_xattr->name + XATTR_SECURITY_PREFIX_LEN,
3156 xattr->name, len);
3157
38f38657 3158 simple_xattr_list_add(&info->xattrs, new_xattr);
6d9d88d0
JS
3159 }
3160
3161 return 0;
3162}
3163
aa7c5241 3164static int shmem_xattr_handler_get(const struct xattr_handler *handler,
b296821a
AV
3165 struct dentry *unused, struct inode *inode,
3166 const char *name, void *buffer, size_t size)
b09e0fa4 3167{
b296821a 3168 struct shmem_inode_info *info = SHMEM_I(inode);
b09e0fa4 3169
aa7c5241 3170 name = xattr_full_name(handler, name);
38f38657 3171 return simple_xattr_get(&info->xattrs, name, buffer, size);
b09e0fa4
EP
3172}
3173
aa7c5241 3174static int shmem_xattr_handler_set(const struct xattr_handler *handler,
59301226
AV
3175 struct dentry *unused, struct inode *inode,
3176 const char *name, const void *value,
3177 size_t size, int flags)
b09e0fa4 3178{
59301226 3179 struct shmem_inode_info *info = SHMEM_I(inode);
b09e0fa4 3180
aa7c5241 3181 name = xattr_full_name(handler, name);
38f38657 3182 return simple_xattr_set(&info->xattrs, name, value, size, flags);
b09e0fa4
EP
3183}
3184
aa7c5241
AG
3185static const struct xattr_handler shmem_security_xattr_handler = {
3186 .prefix = XATTR_SECURITY_PREFIX,
3187 .get = shmem_xattr_handler_get,
3188 .set = shmem_xattr_handler_set,
3189};
b09e0fa4 3190
aa7c5241
AG
3191static const struct xattr_handler shmem_trusted_xattr_handler = {
3192 .prefix = XATTR_TRUSTED_PREFIX,
3193 .get = shmem_xattr_handler_get,
3194 .set = shmem_xattr_handler_set,
3195};
b09e0fa4 3196
aa7c5241
AG
3197static const struct xattr_handler *shmem_xattr_handlers[] = {
3198#ifdef CONFIG_TMPFS_POSIX_ACL
3199 &posix_acl_access_xattr_handler,
3200 &posix_acl_default_xattr_handler,
3201#endif
3202 &shmem_security_xattr_handler,
3203 &shmem_trusted_xattr_handler,
3204 NULL
3205};
b09e0fa4
EP
3206
3207static ssize_t shmem_listxattr(struct dentry *dentry, char *buffer, size_t size)
3208{
75c3cfa8 3209 struct shmem_inode_info *info = SHMEM_I(d_inode(dentry));
786534b9 3210 return simple_xattr_list(d_inode(dentry), &info->xattrs, buffer, size);
b09e0fa4
EP
3211}
3212#endif /* CONFIG_TMPFS_XATTR */
3213
69f07ec9 3214static const struct inode_operations shmem_short_symlink_operations = {
6b255391 3215 .get_link = simple_get_link,
b09e0fa4 3216#ifdef CONFIG_TMPFS_XATTR
b09e0fa4 3217 .listxattr = shmem_listxattr,
b09e0fa4
EP
3218#endif
3219};
3220
3221static const struct inode_operations shmem_symlink_inode_operations = {
6b255391 3222 .get_link = shmem_get_link,
b09e0fa4 3223#ifdef CONFIG_TMPFS_XATTR
b09e0fa4 3224 .listxattr = shmem_listxattr,
39f0247d 3225#endif
b09e0fa4 3226};
39f0247d 3227
91828a40
DG
3228static struct dentry *shmem_get_parent(struct dentry *child)
3229{
3230 return ERR_PTR(-ESTALE);
3231}
3232
3233static int shmem_match(struct inode *ino, void *vfh)
3234{
3235 __u32 *fh = vfh;
3236 __u64 inum = fh[2];
3237 inum = (inum << 32) | fh[1];
3238 return ino->i_ino == inum && fh[0] == ino->i_generation;
3239}
3240
480b116c
CH
3241static struct dentry *shmem_fh_to_dentry(struct super_block *sb,
3242 struct fid *fid, int fh_len, int fh_type)
91828a40 3243{
91828a40 3244 struct inode *inode;
480b116c 3245 struct dentry *dentry = NULL;
35c2a7f4 3246 u64 inum;
480b116c
CH
3247
3248 if (fh_len < 3)
3249 return NULL;
91828a40 3250
35c2a7f4
HD
3251 inum = fid->raw[2];
3252 inum = (inum << 32) | fid->raw[1];
3253
480b116c
CH
3254 inode = ilookup5(sb, (unsigned long)(inum + fid->raw[0]),
3255 shmem_match, fid->raw);
91828a40 3256 if (inode) {
480b116c 3257 dentry = d_find_alias(inode);
91828a40
DG
3258 iput(inode);
3259 }
3260
480b116c 3261 return dentry;
91828a40
DG
3262}
3263
b0b0382b
AV
3264static int shmem_encode_fh(struct inode *inode, __u32 *fh, int *len,
3265 struct inode *parent)
91828a40 3266{
5fe0c237
AK
3267 if (*len < 3) {
3268 *len = 3;
94e07a75 3269 return FILEID_INVALID;
5fe0c237 3270 }
91828a40 3271
1d3382cb 3272 if (inode_unhashed(inode)) {
91828a40
DG
3273 /* Unfortunately insert_inode_hash is not idempotent,
3274 * so as we hash inodes here rather than at creation
3275 * time, we need a lock to ensure we only try
3276 * to do it once
3277 */
3278 static DEFINE_SPINLOCK(lock);
3279 spin_lock(&lock);
1d3382cb 3280 if (inode_unhashed(inode))
91828a40
DG
3281 __insert_inode_hash(inode,
3282 inode->i_ino + inode->i_generation);
3283 spin_unlock(&lock);
3284 }
3285
3286 fh[0] = inode->i_generation;
3287 fh[1] = inode->i_ino;
3288 fh[2] = ((__u64)inode->i_ino) >> 32;
3289
3290 *len = 3;
3291 return 1;
3292}
3293
39655164 3294static const struct export_operations shmem_export_ops = {
91828a40 3295 .get_parent = shmem_get_parent,
91828a40 3296 .encode_fh = shmem_encode_fh,
480b116c 3297 .fh_to_dentry = shmem_fh_to_dentry,
91828a40
DG
3298};
3299
680d794b
AM
3300static int shmem_parse_options(char *options, struct shmem_sb_info *sbinfo,
3301 bool remount)
1da177e4
LT
3302{
3303 char *this_char, *value, *rest;
49cd0a5c 3304 struct mempolicy *mpol = NULL;
8751e039
EB
3305 uid_t uid;
3306 gid_t gid;
1da177e4 3307
b00dc3ad
HD
3308 while (options != NULL) {
3309 this_char = options;
3310 for (;;) {
3311 /*
3312 * NUL-terminate this option: unfortunately,
3313 * mount options form a comma-separated list,
3314 * but mpol's nodelist may also contain commas.
3315 */
3316 options = strchr(options, ',');
3317 if (options == NULL)
3318 break;
3319 options++;
3320 if (!isdigit(*options)) {
3321 options[-1] = '\0';
3322 break;
3323 }
3324 }
1da177e4
LT
3325 if (!*this_char)
3326 continue;
3327 if ((value = strchr(this_char,'=')) != NULL) {
3328 *value++ = 0;
3329 } else {
1170532b
JP
3330 pr_err("tmpfs: No value for mount option '%s'\n",
3331 this_char);
49cd0a5c 3332 goto error;
1da177e4
LT
3333 }
3334
3335 if (!strcmp(this_char,"size")) {
3336 unsigned long long size;
3337 size = memparse(value,&rest);
3338 if (*rest == '%') {
3339 size <<= PAGE_SHIFT;
3340 size *= totalram_pages;
3341 do_div(size, 100);
3342 rest++;
3343 }
3344 if (*rest)
3345 goto bad_val;
680d794b 3346 sbinfo->max_blocks =
09cbfeaf 3347 DIV_ROUND_UP(size, PAGE_SIZE);
1da177e4 3348 } else if (!strcmp(this_char,"nr_blocks")) {
680d794b 3349 sbinfo->max_blocks = memparse(value, &rest);
1da177e4
LT
3350 if (*rest)
3351 goto bad_val;
3352 } else if (!strcmp(this_char,"nr_inodes")) {
680d794b 3353 sbinfo->max_inodes = memparse(value, &rest);
1da177e4
LT
3354 if (*rest)
3355 goto bad_val;
3356 } else if (!strcmp(this_char,"mode")) {
680d794b 3357 if (remount)
1da177e4 3358 continue;
680d794b 3359 sbinfo->mode = simple_strtoul(value, &rest, 8) & 07777;
1da177e4
LT
3360 if (*rest)
3361 goto bad_val;
3362 } else if (!strcmp(this_char,"uid")) {
680d794b 3363 if (remount)
1da177e4 3364 continue;
8751e039 3365 uid = simple_strtoul(value, &rest, 0);
1da177e4
LT
3366 if (*rest)
3367 goto bad_val;
8751e039
EB
3368 sbinfo->uid = make_kuid(current_user_ns(), uid);
3369 if (!uid_valid(sbinfo->uid))
3370 goto bad_val;
1da177e4 3371 } else if (!strcmp(this_char,"gid")) {
680d794b 3372 if (remount)
1da177e4 3373 continue;
8751e039 3374 gid = simple_strtoul(value, &rest, 0);
1da177e4
LT
3375 if (*rest)
3376 goto bad_val;
8751e039
EB
3377 sbinfo->gid = make_kgid(current_user_ns(), gid);
3378 if (!gid_valid(sbinfo->gid))
3379 goto bad_val;
e496cf3d 3380#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
5a6e75f8
KS
3381 } else if (!strcmp(this_char, "huge")) {
3382 int huge;
3383 huge = shmem_parse_huge(value);
3384 if (huge < 0)
3385 goto bad_val;
3386 if (!has_transparent_hugepage() &&
3387 huge != SHMEM_HUGE_NEVER)
3388 goto bad_val;
3389 sbinfo->huge = huge;
3390#endif
3391#ifdef CONFIG_NUMA
7339ff83 3392 } else if (!strcmp(this_char,"mpol")) {
49cd0a5c
GT
3393 mpol_put(mpol);
3394 mpol = NULL;
3395 if (mpol_parse_str(value, &mpol))
7339ff83 3396 goto bad_val;
5a6e75f8 3397#endif
1da177e4 3398 } else {
1170532b 3399 pr_err("tmpfs: Bad mount option %s\n", this_char);
49cd0a5c 3400 goto error;
1da177e4
LT
3401 }
3402 }
49cd0a5c 3403 sbinfo->mpol = mpol;
1da177e4
LT
3404 return 0;
3405
3406bad_val:
1170532b 3407 pr_err("tmpfs: Bad value '%s' for mount option '%s'\n",
1da177e4 3408 value, this_char);
49cd0a5c
GT
3409error:
3410 mpol_put(mpol);
1da177e4
LT
3411 return 1;
3412
3413}
3414
3415static int shmem_remount_fs(struct super_block *sb, int *flags, char *data)
3416{
3417 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
680d794b 3418 struct shmem_sb_info config = *sbinfo;
0edd73b3
HD
3419 unsigned long inodes;
3420 int error = -EINVAL;
3421
5f00110f 3422 config.mpol = NULL;
680d794b 3423 if (shmem_parse_options(data, &config, true))
0edd73b3 3424 return error;
1da177e4 3425
0edd73b3 3426 spin_lock(&sbinfo->stat_lock);
0edd73b3 3427 inodes = sbinfo->max_inodes - sbinfo->free_inodes;
7e496299 3428 if (percpu_counter_compare(&sbinfo->used_blocks, config.max_blocks) > 0)
0edd73b3 3429 goto out;
680d794b 3430 if (config.max_inodes < inodes)
0edd73b3
HD
3431 goto out;
3432 /*
54af6042 3433 * Those tests disallow limited->unlimited while any are in use;
0edd73b3
HD
3434 * but we must separately disallow unlimited->limited, because
3435 * in that case we have no record of how much is already in use.
3436 */
680d794b 3437 if (config.max_blocks && !sbinfo->max_blocks)
0edd73b3 3438 goto out;
680d794b 3439 if (config.max_inodes && !sbinfo->max_inodes)
0edd73b3
HD
3440 goto out;
3441
3442 error = 0;
5a6e75f8 3443 sbinfo->huge = config.huge;
680d794b 3444 sbinfo->max_blocks = config.max_blocks;
680d794b
AM
3445 sbinfo->max_inodes = config.max_inodes;
3446 sbinfo->free_inodes = config.max_inodes - inodes;
71fe804b 3447
5f00110f
GT
3448 /*
3449 * Preserve previous mempolicy unless mpol remount option was specified.
3450 */
3451 if (config.mpol) {
3452 mpol_put(sbinfo->mpol);
3453 sbinfo->mpol = config.mpol; /* transfers initial ref */
3454 }
0edd73b3
HD
3455out:
3456 spin_unlock(&sbinfo->stat_lock);
3457 return error;
1da177e4 3458}
680d794b 3459
34c80b1d 3460static int shmem_show_options(struct seq_file *seq, struct dentry *root)
680d794b 3461{
34c80b1d 3462 struct shmem_sb_info *sbinfo = SHMEM_SB(root->d_sb);
680d794b
AM
3463
3464 if (sbinfo->max_blocks != shmem_default_max_blocks())
3465 seq_printf(seq, ",size=%luk",
09cbfeaf 3466 sbinfo->max_blocks << (PAGE_SHIFT - 10));
680d794b
AM
3467 if (sbinfo->max_inodes != shmem_default_max_inodes())
3468 seq_printf(seq, ",nr_inodes=%lu", sbinfo->max_inodes);
3469 if (sbinfo->mode != (S_IRWXUGO | S_ISVTX))
09208d15 3470 seq_printf(seq, ",mode=%03ho", sbinfo->mode);
8751e039
EB
3471 if (!uid_eq(sbinfo->uid, GLOBAL_ROOT_UID))
3472 seq_printf(seq, ",uid=%u",
3473 from_kuid_munged(&init_user_ns, sbinfo->uid));
3474 if (!gid_eq(sbinfo->gid, GLOBAL_ROOT_GID))
3475 seq_printf(seq, ",gid=%u",
3476 from_kgid_munged(&init_user_ns, sbinfo->gid));
e496cf3d 3477#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
5a6e75f8
KS
3478 /* Rightly or wrongly, show huge mount option unmasked by shmem_huge */
3479 if (sbinfo->huge)
3480 seq_printf(seq, ",huge=%s", shmem_format_huge(sbinfo->huge));
3481#endif
71fe804b 3482 shmem_show_mpol(seq, sbinfo->mpol);
680d794b
AM
3483 return 0;
3484}
9183df25
DH
3485
3486#define MFD_NAME_PREFIX "memfd:"
3487#define MFD_NAME_PREFIX_LEN (sizeof(MFD_NAME_PREFIX) - 1)
3488#define MFD_NAME_MAX_LEN (NAME_MAX - MFD_NAME_PREFIX_LEN)
3489
3490#define MFD_ALL_FLAGS (MFD_CLOEXEC | MFD_ALLOW_SEALING)
3491
3492SYSCALL_DEFINE2(memfd_create,
3493 const char __user *, uname,
3494 unsigned int, flags)
3495{
3496 struct shmem_inode_info *info;
3497 struct file *file;
3498 int fd, error;
3499 char *name;
3500 long len;
3501
3502 if (flags & ~(unsigned int)MFD_ALL_FLAGS)
3503 return -EINVAL;
3504
3505 /* length includes terminating zero */
3506 len = strnlen_user(uname, MFD_NAME_MAX_LEN + 1);
3507 if (len <= 0)
3508 return -EFAULT;
3509 if (len > MFD_NAME_MAX_LEN + 1)
3510 return -EINVAL;
3511
3512 name = kmalloc(len + MFD_NAME_PREFIX_LEN, GFP_TEMPORARY);
3513 if (!name)
3514 return -ENOMEM;
3515
3516 strcpy(name, MFD_NAME_PREFIX);
3517 if (copy_from_user(&name[MFD_NAME_PREFIX_LEN], uname, len)) {
3518 error = -EFAULT;
3519 goto err_name;
3520 }
3521
3522 /* terminating-zero may have changed after strnlen_user() returned */
3523 if (name[len + MFD_NAME_PREFIX_LEN - 1]) {
3524 error = -EFAULT;
3525 goto err_name;
3526 }
3527
3528 fd = get_unused_fd_flags((flags & MFD_CLOEXEC) ? O_CLOEXEC : 0);
3529 if (fd < 0) {
3530 error = fd;
3531 goto err_name;
3532 }
3533
3534 file = shmem_file_setup(name, 0, VM_NORESERVE);
3535 if (IS_ERR(file)) {
3536 error = PTR_ERR(file);
3537 goto err_fd;
3538 }
3539 info = SHMEM_I(file_inode(file));
3540 file->f_mode |= FMODE_LSEEK | FMODE_PREAD | FMODE_PWRITE;
3541 file->f_flags |= O_RDWR | O_LARGEFILE;
3542 if (flags & MFD_ALLOW_SEALING)
3543 info->seals &= ~F_SEAL_SEAL;
3544
3545 fd_install(fd, file);
3546 kfree(name);
3547 return fd;
3548
3549err_fd:
3550 put_unused_fd(fd);
3551err_name:
3552 kfree(name);
3553 return error;
3554}
3555
680d794b 3556#endif /* CONFIG_TMPFS */
1da177e4
LT
3557
3558static void shmem_put_super(struct super_block *sb)
3559{
602586a8
HD
3560 struct shmem_sb_info *sbinfo = SHMEM_SB(sb);
3561
3562 percpu_counter_destroy(&sbinfo->used_blocks);
49cd0a5c 3563 mpol_put(sbinfo->mpol);
602586a8 3564 kfree(sbinfo);
1da177e4
LT
3565 sb->s_fs_info = NULL;
3566}
3567
2b2af54a 3568int shmem_fill_super(struct super_block *sb, void *data, int silent)
1da177e4
LT
3569{
3570 struct inode *inode;
0edd73b3 3571 struct shmem_sb_info *sbinfo;
680d794b
AM
3572 int err = -ENOMEM;
3573
3574 /* Round up to L1_CACHE_BYTES to resist false sharing */
425fbf04 3575 sbinfo = kzalloc(max((int)sizeof(struct shmem_sb_info),
680d794b
AM
3576 L1_CACHE_BYTES), GFP_KERNEL);
3577 if (!sbinfo)
3578 return -ENOMEM;
3579
680d794b 3580 sbinfo->mode = S_IRWXUGO | S_ISVTX;
76aac0e9
DH
3581 sbinfo->uid = current_fsuid();
3582 sbinfo->gid = current_fsgid();
680d794b 3583 sb->s_fs_info = sbinfo;
1da177e4 3584
0edd73b3 3585#ifdef CONFIG_TMPFS
1da177e4
LT
3586 /*
3587 * Per default we only allow half of the physical ram per
3588 * tmpfs instance, limiting inodes to one per page of lowmem;
3589 * but the internal instance is left unlimited.
3590 */
ca4e0519 3591 if (!(sb->s_flags & MS_KERNMOUNT)) {
680d794b
AM
3592 sbinfo->max_blocks = shmem_default_max_blocks();
3593 sbinfo->max_inodes = shmem_default_max_inodes();
3594 if (shmem_parse_options(data, sbinfo, false)) {
3595 err = -EINVAL;
3596 goto failed;
3597 }
ca4e0519
AV
3598 } else {
3599 sb->s_flags |= MS_NOUSER;
1da177e4 3600 }
91828a40 3601 sb->s_export_op = &shmem_export_ops;
2f6e38f3 3602 sb->s_flags |= MS_NOSEC;
1da177e4
LT
3603#else
3604 sb->s_flags |= MS_NOUSER;
3605#endif
3606
0edd73b3 3607 spin_lock_init(&sbinfo->stat_lock);
908c7f19 3608 if (percpu_counter_init(&sbinfo->used_blocks, 0, GFP_KERNEL))
602586a8 3609 goto failed;
680d794b 3610 sbinfo->free_inodes = sbinfo->max_inodes;
779750d2
KS
3611 spin_lock_init(&sbinfo->shrinklist_lock);
3612 INIT_LIST_HEAD(&sbinfo->shrinklist);
0edd73b3 3613
285b2c4f 3614 sb->s_maxbytes = MAX_LFS_FILESIZE;
09cbfeaf
KS
3615 sb->s_blocksize = PAGE_SIZE;
3616 sb->s_blocksize_bits = PAGE_SHIFT;
1da177e4
LT
3617 sb->s_magic = TMPFS_MAGIC;
3618 sb->s_op = &shmem_ops;
cfd95a9c 3619 sb->s_time_gran = 1;
b09e0fa4 3620#ifdef CONFIG_TMPFS_XATTR
39f0247d 3621 sb->s_xattr = shmem_xattr_handlers;
b09e0fa4
EP
3622#endif
3623#ifdef CONFIG_TMPFS_POSIX_ACL
39f0247d
AG
3624 sb->s_flags |= MS_POSIXACL;
3625#endif
0edd73b3 3626
454abafe 3627 inode = shmem_get_inode(sb, NULL, S_IFDIR | sbinfo->mode, 0, VM_NORESERVE);
1da177e4
LT
3628 if (!inode)
3629 goto failed;
680d794b
AM
3630 inode->i_uid = sbinfo->uid;
3631 inode->i_gid = sbinfo->gid;
318ceed0
AV
3632 sb->s_root = d_make_root(inode);
3633 if (!sb->s_root)
48fde701 3634 goto failed;
1da177e4
LT
3635 return 0;
3636
1da177e4
LT
3637failed:
3638 shmem_put_super(sb);
3639 return err;
3640}
3641
fcc234f8 3642static struct kmem_cache *shmem_inode_cachep;
1da177e4
LT
3643
3644static struct inode *shmem_alloc_inode(struct super_block *sb)
3645{
41ffe5d5
HD
3646 struct shmem_inode_info *info;
3647 info = kmem_cache_alloc(shmem_inode_cachep, GFP_KERNEL);
3648 if (!info)
1da177e4 3649 return NULL;
41ffe5d5 3650 return &info->vfs_inode;
1da177e4
LT
3651}
3652
41ffe5d5 3653static void shmem_destroy_callback(struct rcu_head *head)
fa0d7e3d
NP
3654{
3655 struct inode *inode = container_of(head, struct inode, i_rcu);
84e710da
AV
3656 if (S_ISLNK(inode->i_mode))
3657 kfree(inode->i_link);
fa0d7e3d
NP
3658 kmem_cache_free(shmem_inode_cachep, SHMEM_I(inode));
3659}
3660
1da177e4
LT
3661static void shmem_destroy_inode(struct inode *inode)
3662{
09208d15 3663 if (S_ISREG(inode->i_mode))
1da177e4 3664 mpol_free_shared_policy(&SHMEM_I(inode)->policy);
41ffe5d5 3665 call_rcu(&inode->i_rcu, shmem_destroy_callback);
1da177e4
LT
3666}
3667
41ffe5d5 3668static void shmem_init_inode(void *foo)
1da177e4 3669{
41ffe5d5
HD
3670 struct shmem_inode_info *info = foo;
3671 inode_init_once(&info->vfs_inode);
1da177e4
LT
3672}
3673
41ffe5d5 3674static int shmem_init_inodecache(void)
1da177e4
LT
3675{
3676 shmem_inode_cachep = kmem_cache_create("shmem_inode_cache",
3677 sizeof(struct shmem_inode_info),
5d097056 3678 0, SLAB_PANIC|SLAB_ACCOUNT, shmem_init_inode);
1da177e4
LT
3679 return 0;
3680}
3681
41ffe5d5 3682static void shmem_destroy_inodecache(void)
1da177e4 3683{
1a1d92c1 3684 kmem_cache_destroy(shmem_inode_cachep);
1da177e4
LT
3685}
3686
f5e54d6e 3687static const struct address_space_operations shmem_aops = {
1da177e4 3688 .writepage = shmem_writepage,
76719325 3689 .set_page_dirty = __set_page_dirty_no_writeback,
1da177e4 3690#ifdef CONFIG_TMPFS
800d15a5
NP
3691 .write_begin = shmem_write_begin,
3692 .write_end = shmem_write_end,
1da177e4 3693#endif
1c93923c 3694#ifdef CONFIG_MIGRATION
304dbdb7 3695 .migratepage = migrate_page,
1c93923c 3696#endif
aa261f54 3697 .error_remove_page = generic_error_remove_page,
1da177e4
LT
3698};
3699
15ad7cdc 3700static const struct file_operations shmem_file_operations = {
1da177e4 3701 .mmap = shmem_mmap,
c01d5b30 3702 .get_unmapped_area = shmem_get_unmapped_area,
1da177e4 3703#ifdef CONFIG_TMPFS
220f2ac9 3704 .llseek = shmem_file_llseek,
2ba5bbed 3705 .read_iter = shmem_file_read_iter,
8174202b 3706 .write_iter = generic_file_write_iter,
1b061d92 3707 .fsync = noop_fsync,
82c156f8 3708 .splice_read = generic_file_splice_read,
f6cb85d0 3709 .splice_write = iter_file_splice_write,
83e4fa9c 3710 .fallocate = shmem_fallocate,
1da177e4
LT
3711#endif
3712};
3713
92e1d5be 3714static const struct inode_operations shmem_inode_operations = {
44a30220 3715 .getattr = shmem_getattr,
94c1e62d 3716 .setattr = shmem_setattr,
b09e0fa4 3717#ifdef CONFIG_TMPFS_XATTR
b09e0fa4 3718 .listxattr = shmem_listxattr,
feda821e 3719 .set_acl = simple_set_acl,
b09e0fa4 3720#endif
1da177e4
LT
3721};
3722
92e1d5be 3723static const struct inode_operations shmem_dir_inode_operations = {
1da177e4
LT
3724#ifdef CONFIG_TMPFS
3725 .create = shmem_create,
3726 .lookup = simple_lookup,
3727 .link = shmem_link,
3728 .unlink = shmem_unlink,
3729 .symlink = shmem_symlink,
3730 .mkdir = shmem_mkdir,
3731 .rmdir = shmem_rmdir,
3732 .mknod = shmem_mknod,
2773bf00 3733 .rename = shmem_rename2,
60545d0d 3734 .tmpfile = shmem_tmpfile,
1da177e4 3735#endif
b09e0fa4 3736#ifdef CONFIG_TMPFS_XATTR
b09e0fa4 3737 .listxattr = shmem_listxattr,
b09e0fa4 3738#endif
39f0247d 3739#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3740 .setattr = shmem_setattr,
feda821e 3741 .set_acl = simple_set_acl,
39f0247d
AG
3742#endif
3743};
3744
92e1d5be 3745static const struct inode_operations shmem_special_inode_operations = {
b09e0fa4 3746#ifdef CONFIG_TMPFS_XATTR
b09e0fa4 3747 .listxattr = shmem_listxattr,
b09e0fa4 3748#endif
39f0247d 3749#ifdef CONFIG_TMPFS_POSIX_ACL
94c1e62d 3750 .setattr = shmem_setattr,
feda821e 3751 .set_acl = simple_set_acl,
39f0247d 3752#endif
1da177e4
LT
3753};
3754
759b9775 3755static const struct super_operations shmem_ops = {
1da177e4
LT
3756 .alloc_inode = shmem_alloc_inode,
3757 .destroy_inode = shmem_destroy_inode,
3758#ifdef CONFIG_TMPFS
3759 .statfs = shmem_statfs,
3760 .remount_fs = shmem_remount_fs,
680d794b 3761 .show_options = shmem_show_options,
1da177e4 3762#endif
1f895f75 3763 .evict_inode = shmem_evict_inode,
1da177e4
LT
3764 .drop_inode = generic_delete_inode,
3765 .put_super = shmem_put_super,
779750d2
KS
3766#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
3767 .nr_cached_objects = shmem_unused_huge_count,
3768 .free_cached_objects = shmem_unused_huge_scan,
3769#endif
1da177e4
LT
3770};
3771
f0f37e2f 3772static const struct vm_operations_struct shmem_vm_ops = {
54cb8821 3773 .fault = shmem_fault,
d7c17551 3774 .map_pages = filemap_map_pages,
1da177e4
LT
3775#ifdef CONFIG_NUMA
3776 .set_policy = shmem_set_policy,
3777 .get_policy = shmem_get_policy,
3778#endif
3779};
3780
3c26ff6e
AV
3781static struct dentry *shmem_mount(struct file_system_type *fs_type,
3782 int flags, const char *dev_name, void *data)
1da177e4 3783{
3c26ff6e 3784 return mount_nodev(fs_type, flags, data, shmem_fill_super);
1da177e4
LT
3785}
3786
41ffe5d5 3787static struct file_system_type shmem_fs_type = {
1da177e4
LT
3788 .owner = THIS_MODULE,
3789 .name = "tmpfs",
3c26ff6e 3790 .mount = shmem_mount,
1da177e4 3791 .kill_sb = kill_litter_super,
2b8576cb 3792 .fs_flags = FS_USERNS_MOUNT,
1da177e4 3793};
1da177e4 3794
41ffe5d5 3795int __init shmem_init(void)
1da177e4
LT
3796{
3797 int error;
3798
16203a7a
RL
3799 /* If rootfs called this, don't re-init */
3800 if (shmem_inode_cachep)
3801 return 0;
3802
41ffe5d5 3803 error = shmem_init_inodecache();
1da177e4
LT
3804 if (error)
3805 goto out3;
3806
41ffe5d5 3807 error = register_filesystem(&shmem_fs_type);
1da177e4 3808 if (error) {
1170532b 3809 pr_err("Could not register tmpfs\n");
1da177e4
LT
3810 goto out2;
3811 }
95dc112a 3812
ca4e0519 3813 shm_mnt = kern_mount(&shmem_fs_type);
1da177e4
LT
3814 if (IS_ERR(shm_mnt)) {
3815 error = PTR_ERR(shm_mnt);
1170532b 3816 pr_err("Could not kern_mount tmpfs\n");
1da177e4
LT
3817 goto out1;
3818 }
5a6e75f8 3819
e496cf3d 3820#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
5a6e75f8
KS
3821 if (has_transparent_hugepage() && shmem_huge < SHMEM_HUGE_DENY)
3822 SHMEM_SB(shm_mnt->mnt_sb)->huge = shmem_huge;
3823 else
3824 shmem_huge = 0; /* just in case it was patched */
3825#endif
1da177e4
LT
3826 return 0;
3827
3828out1:
41ffe5d5 3829 unregister_filesystem(&shmem_fs_type);
1da177e4 3830out2:
41ffe5d5 3831 shmem_destroy_inodecache();
1da177e4
LT
3832out3:
3833 shm_mnt = ERR_PTR(error);
3834 return error;
3835}
853ac43a 3836
e496cf3d 3837#if defined(CONFIG_TRANSPARENT_HUGE_PAGECACHE) && defined(CONFIG_SYSFS)
5a6e75f8
KS
3838static ssize_t shmem_enabled_show(struct kobject *kobj,
3839 struct kobj_attribute *attr, char *buf)
3840{
3841 int values[] = {
3842 SHMEM_HUGE_ALWAYS,
3843 SHMEM_HUGE_WITHIN_SIZE,
3844 SHMEM_HUGE_ADVISE,
3845 SHMEM_HUGE_NEVER,
3846 SHMEM_HUGE_DENY,
3847 SHMEM_HUGE_FORCE,
3848 };
3849 int i, count;
3850
3851 for (i = 0, count = 0; i < ARRAY_SIZE(values); i++) {
3852 const char *fmt = shmem_huge == values[i] ? "[%s] " : "%s ";
3853
3854 count += sprintf(buf + count, fmt,
3855 shmem_format_huge(values[i]));
3856 }
3857 buf[count - 1] = '\n';
3858 return count;
3859}
3860
3861static ssize_t shmem_enabled_store(struct kobject *kobj,
3862 struct kobj_attribute *attr, const char *buf, size_t count)
3863{
3864 char tmp[16];
3865 int huge;
3866
3867 if (count + 1 > sizeof(tmp))
3868 return -EINVAL;
3869 memcpy(tmp, buf, count);
3870 tmp[count] = '\0';
3871 if (count && tmp[count - 1] == '\n')
3872 tmp[count - 1] = '\0';
3873
3874 huge = shmem_parse_huge(tmp);
3875 if (huge == -EINVAL)
3876 return -EINVAL;
3877 if (!has_transparent_hugepage() &&
3878 huge != SHMEM_HUGE_NEVER && huge != SHMEM_HUGE_DENY)
3879 return -EINVAL;
3880
3881 shmem_huge = huge;
3882 if (shmem_huge < SHMEM_HUGE_DENY)
3883 SHMEM_SB(shm_mnt->mnt_sb)->huge = shmem_huge;
3884 return count;
3885}
3886
3887struct kobj_attribute shmem_enabled_attr =
3888 __ATTR(shmem_enabled, 0644, shmem_enabled_show, shmem_enabled_store);
3b33719c 3889#endif /* CONFIG_TRANSPARENT_HUGE_PAGECACHE && CONFIG_SYSFS */
f3f0e1d2 3890
3b33719c 3891#ifdef CONFIG_TRANSPARENT_HUGE_PAGECACHE
f3f0e1d2
KS
3892bool shmem_huge_enabled(struct vm_area_struct *vma)
3893{
3894 struct inode *inode = file_inode(vma->vm_file);
3895 struct shmem_sb_info *sbinfo = SHMEM_SB(inode->i_sb);
3896 loff_t i_size;
3897 pgoff_t off;
3898
3899 if (shmem_huge == SHMEM_HUGE_FORCE)
3900 return true;
3901 if (shmem_huge == SHMEM_HUGE_DENY)
3902 return false;
3903 switch (sbinfo->huge) {
3904 case SHMEM_HUGE_NEVER:
3905 return false;
3906 case SHMEM_HUGE_ALWAYS:
3907 return true;
3908 case SHMEM_HUGE_WITHIN_SIZE:
3909 off = round_up(vma->vm_pgoff, HPAGE_PMD_NR);
3910 i_size = round_up(i_size_read(inode), PAGE_SIZE);
3911 if (i_size >= HPAGE_PMD_SIZE &&
3912 i_size >> PAGE_SHIFT >= off)
3913 return true;
3914 case SHMEM_HUGE_ADVISE:
3915 /* TODO: implement fadvise() hints */
3916 return (vma->vm_flags & VM_HUGEPAGE);
3917 default:
3918 VM_BUG_ON(1);
3919 return false;
3920 }
3921}
3b33719c 3922#endif /* CONFIG_TRANSPARENT_HUGE_PAGECACHE */
5a6e75f8 3923
853ac43a
MM
3924#else /* !CONFIG_SHMEM */
3925
3926/*
3927 * tiny-shmem: simple shmemfs and tmpfs using ramfs code
3928 *
3929 * This is intended for small system where the benefits of the full
3930 * shmem code (swap-backed and resource-limited) are outweighed by
3931 * their complexity. On systems without swap this code should be
3932 * effectively equivalent, but much lighter weight.
3933 */
3934
41ffe5d5 3935static struct file_system_type shmem_fs_type = {
853ac43a 3936 .name = "tmpfs",
3c26ff6e 3937 .mount = ramfs_mount,
853ac43a 3938 .kill_sb = kill_litter_super,
2b8576cb 3939 .fs_flags = FS_USERNS_MOUNT,
853ac43a
MM
3940};
3941
41ffe5d5 3942int __init shmem_init(void)
853ac43a 3943{
41ffe5d5 3944 BUG_ON(register_filesystem(&shmem_fs_type) != 0);
853ac43a 3945
41ffe5d5 3946 shm_mnt = kern_mount(&shmem_fs_type);
853ac43a
MM
3947 BUG_ON(IS_ERR(shm_mnt));
3948
3949 return 0;
3950}
3951
41ffe5d5 3952int shmem_unuse(swp_entry_t swap, struct page *page)
853ac43a
MM
3953{
3954 return 0;
3955}
3956
3f96b79a
HD
3957int shmem_lock(struct file *file, int lock, struct user_struct *user)
3958{
3959 return 0;
3960}
3961
24513264
HD
3962void shmem_unlock_mapping(struct address_space *mapping)
3963{
3964}
3965
c01d5b30
HD
3966#ifdef CONFIG_MMU
3967unsigned long shmem_get_unmapped_area(struct file *file,
3968 unsigned long addr, unsigned long len,
3969 unsigned long pgoff, unsigned long flags)
3970{
3971 return current->mm->get_unmapped_area(file, addr, len, pgoff, flags);
3972}
3973#endif
3974
41ffe5d5 3975void shmem_truncate_range(struct inode *inode, loff_t lstart, loff_t lend)
94c1e62d 3976{
41ffe5d5 3977 truncate_inode_pages_range(inode->i_mapping, lstart, lend);
94c1e62d
HD
3978}
3979EXPORT_SYMBOL_GPL(shmem_truncate_range);
3980
0b0a0806
HD
3981#define shmem_vm_ops generic_file_vm_ops
3982#define shmem_file_operations ramfs_file_operations
454abafe 3983#define shmem_get_inode(sb, dir, mode, dev, flags) ramfs_get_inode(sb, dir, mode, dev)
0b0a0806
HD
3984#define shmem_acct_size(flags, size) 0
3985#define shmem_unacct_size(flags, size) do {} while (0)
853ac43a
MM
3986
3987#endif /* CONFIG_SHMEM */
3988
3989/* common code */
1da177e4 3990
19938e35 3991static const struct dentry_operations anon_ops = {
118b2302 3992 .d_dname = simple_dname
3451538a
AV
3993};
3994
c7277090
EP
3995static struct file *__shmem_file_setup(const char *name, loff_t size,
3996 unsigned long flags, unsigned int i_flags)
1da177e4 3997{
6b4d0b27 3998 struct file *res;
1da177e4 3999 struct inode *inode;
2c48b9c4 4000 struct path path;
3451538a 4001 struct super_block *sb;
1da177e4
LT
4002 struct qstr this;
4003
4004 if (IS_ERR(shm_mnt))
6b4d0b27 4005 return ERR_CAST(shm_mnt);
1da177e4 4006
285b2c4f 4007 if (size < 0 || size > MAX_LFS_FILESIZE)
1da177e4
LT
4008 return ERR_PTR(-EINVAL);
4009
4010 if (shmem_acct_size(flags, size))
4011 return ERR_PTR(-ENOMEM);
4012
6b4d0b27 4013 res = ERR_PTR(-ENOMEM);
1da177e4
LT
4014 this.name = name;
4015 this.len = strlen(name);
4016 this.hash = 0; /* will go */
3451538a 4017 sb = shm_mnt->mnt_sb;
66ee4b88 4018 path.mnt = mntget(shm_mnt);
3451538a 4019 path.dentry = d_alloc_pseudo(sb, &this);
2c48b9c4 4020 if (!path.dentry)
1da177e4 4021 goto put_memory;
3451538a 4022 d_set_d_op(path.dentry, &anon_ops);
1da177e4 4023
6b4d0b27 4024 res = ERR_PTR(-ENOSPC);
3451538a 4025 inode = shmem_get_inode(sb, NULL, S_IFREG | S_IRWXUGO, 0, flags);
1da177e4 4026 if (!inode)
66ee4b88 4027 goto put_memory;
1da177e4 4028
c7277090 4029 inode->i_flags |= i_flags;
2c48b9c4 4030 d_instantiate(path.dentry, inode);
1da177e4 4031 inode->i_size = size;
6d6b77f1 4032 clear_nlink(inode); /* It is unlinked */
26567cdb
AV
4033 res = ERR_PTR(ramfs_nommu_expand_for_mapping(inode, size));
4034 if (IS_ERR(res))
66ee4b88 4035 goto put_path;
4b42af81 4036
6b4d0b27 4037 res = alloc_file(&path, FMODE_WRITE | FMODE_READ,
4b42af81 4038 &shmem_file_operations);
6b4d0b27 4039 if (IS_ERR(res))
66ee4b88 4040 goto put_path;
4b42af81 4041
6b4d0b27 4042 return res;
1da177e4 4043
1da177e4
LT
4044put_memory:
4045 shmem_unacct_size(flags, size);
66ee4b88
KK
4046put_path:
4047 path_put(&path);
6b4d0b27 4048 return res;
1da177e4 4049}
c7277090
EP
4050
4051/**
4052 * shmem_kernel_file_setup - get an unlinked file living in tmpfs which must be
4053 * kernel internal. There will be NO LSM permission checks against the
4054 * underlying inode. So users of this interface must do LSM checks at a
e1832f29
SS
4055 * higher layer. The users are the big_key and shm implementations. LSM
4056 * checks are provided at the key or shm level rather than the inode.
c7277090
EP
4057 * @name: name for dentry (to be seen in /proc/<pid>/maps
4058 * @size: size to be set for the file
4059 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
4060 */
4061struct file *shmem_kernel_file_setup(const char *name, loff_t size, unsigned long flags)
4062{
4063 return __shmem_file_setup(name, size, flags, S_PRIVATE);
4064}
4065
4066/**
4067 * shmem_file_setup - get an unlinked file living in tmpfs
4068 * @name: name for dentry (to be seen in /proc/<pid>/maps
4069 * @size: size to be set for the file
4070 * @flags: VM_NORESERVE suppresses pre-accounting of the entire object size
4071 */
4072struct file *shmem_file_setup(const char *name, loff_t size, unsigned long flags)
4073{
4074 return __shmem_file_setup(name, size, flags, 0);
4075}
395e0ddc 4076EXPORT_SYMBOL_GPL(shmem_file_setup);
1da177e4 4077
46711810 4078/**
1da177e4 4079 * shmem_zero_setup - setup a shared anonymous mapping
1da177e4
LT
4080 * @vma: the vma to be mmapped is prepared by do_mmap_pgoff
4081 */
4082int shmem_zero_setup(struct vm_area_struct *vma)
4083{
4084 struct file *file;
4085 loff_t size = vma->vm_end - vma->vm_start;
4086
66fc1303
HD
4087 /*
4088 * Cloning a new file under mmap_sem leads to a lock ordering conflict
4089 * between XFS directory reading and selinux: since this file is only
4090 * accessible to the user through its mapping, use S_PRIVATE flag to
4091 * bypass file security, in the same way as shmem_kernel_file_setup().
4092 */
4093 file = __shmem_file_setup("dev/zero", size, vma->vm_flags, S_PRIVATE);
1da177e4
LT
4094 if (IS_ERR(file))
4095 return PTR_ERR(file);
4096
4097 if (vma->vm_file)
4098 fput(vma->vm_file);
4099 vma->vm_file = file;
4100 vma->vm_ops = &shmem_vm_ops;
f3f0e1d2 4101
e496cf3d 4102 if (IS_ENABLED(CONFIG_TRANSPARENT_HUGE_PAGECACHE) &&
f3f0e1d2
KS
4103 ((vma->vm_start + ~HPAGE_PMD_MASK) & HPAGE_PMD_MASK) <
4104 (vma->vm_end & HPAGE_PMD_MASK)) {
4105 khugepaged_enter(vma, vma->vm_flags);
4106 }
4107
1da177e4
LT
4108 return 0;
4109}
d9d90e5e
HD
4110
4111/**
4112 * shmem_read_mapping_page_gfp - read into page cache, using specified page allocation flags.
4113 * @mapping: the page's address_space
4114 * @index: the page index
4115 * @gfp: the page allocator flags to use if allocating
4116 *
4117 * This behaves as a tmpfs "read_cache_page_gfp(mapping, index, gfp)",
4118 * with any new page allocations done using the specified allocation flags.
4119 * But read_cache_page_gfp() uses the ->readpage() method: which does not
4120 * suit tmpfs, since it may have pages in swapcache, and needs to find those
4121 * for itself; although drivers/gpu/drm i915 and ttm rely upon this support.
4122 *
68da9f05
HD
4123 * i915_gem_object_get_pages_gtt() mixes __GFP_NORETRY | __GFP_NOWARN in
4124 * with the mapping_gfp_mask(), to avoid OOMing the machine unnecessarily.
d9d90e5e
HD
4125 */
4126struct page *shmem_read_mapping_page_gfp(struct address_space *mapping,
4127 pgoff_t index, gfp_t gfp)
4128{
68da9f05
HD
4129#ifdef CONFIG_SHMEM
4130 struct inode *inode = mapping->host;
9276aad6 4131 struct page *page;
68da9f05
HD
4132 int error;
4133
4134 BUG_ON(mapping->a_ops != &shmem_aops);
9e18eb29
ALC
4135 error = shmem_getpage_gfp(inode, index, &page, SGP_CACHE,
4136 gfp, NULL, NULL);
68da9f05
HD
4137 if (error)
4138 page = ERR_PTR(error);
4139 else
4140 unlock_page(page);
4141 return page;
4142#else
4143 /*
4144 * The tiny !SHMEM case uses ramfs without swap
4145 */
d9d90e5e 4146 return read_cache_page_gfp(mapping, index, gfp);
68da9f05 4147#endif
d9d90e5e
HD
4148}
4149EXPORT_SYMBOL_GPL(shmem_read_mapping_page_gfp);