]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - fs/file_table.c
Merge tag 'for-v6.9-rc' of git://git.kernel.org/pub/scm/linux/kernel/git/sre/linux...
[thirdparty/kernel/stable.git] / fs / file_table.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * linux/fs/file_table.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
7 */
8
9#include <linux/string.h>
10#include <linux/slab.h>
11#include <linux/file.h>
9f3acc31 12#include <linux/fdtable.h>
1da177e4
LT
13#include <linux/init.h>
14#include <linux/module.h>
1da177e4 15#include <linux/fs.h>
5970e15d 16#include <linux/filelock.h>
1da177e4 17#include <linux/security.h>
5b825c3a 18#include <linux/cred.h>
1da177e4 19#include <linux/eventpoll.h>
ab2af1f5 20#include <linux/rcupdate.h>
1da177e4 21#include <linux/mount.h>
16f7e0fe 22#include <linux/capability.h>
1da177e4 23#include <linux/cdev.h>
0eeca283 24#include <linux/fsnotify.h>
529bf6be
DS
25#include <linux/sysctl.h>
26#include <linux/percpu_counter.h>
6416ccb7 27#include <linux/percpu.h>
4a9d4b02 28#include <linux/task_work.h>
4248b0da 29#include <linux/swap.h>
a3580ac9 30#include <linux/kmemleak.h>
529bf6be 31
60063497 32#include <linux/atomic.h>
1da177e4 33
e81e3f4d
EP
34#include "internal.h"
35
1da177e4 36/* sysctl tunables... */
204d5a24 37static struct files_stat_struct files_stat = {
1da177e4
LT
38 .max_files = NR_FILE
39};
40
b6b3fdea 41/* SLAB cache for file structures */
68279f9c 42static struct kmem_cache *filp_cachep __ro_after_init;
b6b3fdea 43
529bf6be 44static struct percpu_counter nr_files __cacheline_aligned_in_smp;
1da177e4 45
def3ae83 46/* Container for backing file with optional user path */
62d53c4a
AG
47struct backing_file {
48 struct file file;
def3ae83 49 struct path user_path;
62d53c4a
AG
50};
51
52static inline struct backing_file *backing_file(struct file *f)
53{
54 return container_of(f, struct backing_file, file);
55}
56
def3ae83 57struct path *backing_file_user_path(struct file *f)
62d53c4a 58{
def3ae83 59 return &backing_file(f)->user_path;
62d53c4a 60}
def3ae83 61EXPORT_SYMBOL_GPL(backing_file_user_path);
62d53c4a 62
529bf6be 63static inline void file_free(struct file *f)
1da177e4 64{
e8cff84f 65 security_file_free(f);
62d53c4a 66 if (likely(!(f->f_mode & FMODE_NOACCOUNT)))
d3b1084d 67 percpu_counter_dec(&nr_files);
0ede61d8
CB
68 put_cred(f->f_cred);
69 if (unlikely(f->f_mode & FMODE_BACKING)) {
def3ae83 70 path_put(backing_file_user_path(f));
6cf41fcf 71 kfree(backing_file(f));
0ede61d8
CB
72 } else {
73 kmem_cache_free(filp_cachep, f);
74 }
1da177e4
LT
75}
76
529bf6be
DS
77/*
78 * Return the total number of open files in the system
79 */
518de9b3 80static long get_nr_files(void)
1da177e4 81{
529bf6be 82 return percpu_counter_read_positive(&nr_files);
1da177e4
LT
83}
84
529bf6be
DS
85/*
86 * Return the maximum number of open files in the system
87 */
518de9b3 88unsigned long get_max_files(void)
ab2af1f5 89{
529bf6be 90 return files_stat.max_files;
ab2af1f5 91}
529bf6be
DS
92EXPORT_SYMBOL_GPL(get_max_files);
93
204d5a24
LC
94#if defined(CONFIG_SYSCTL) && defined(CONFIG_PROC_FS)
95
529bf6be
DS
96/*
97 * Handle nr_files sysctl
98 */
204d5a24
LC
99static int proc_nr_files(struct ctl_table *table, int write, void *buffer,
100 size_t *lenp, loff_t *ppos)
529bf6be
DS
101{
102 files_stat.nr_files = get_nr_files();
518de9b3 103 return proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
529bf6be 104}
204d5a24
LC
105
106static struct ctl_table fs_stat_sysctls[] = {
107 {
108 .procname = "file-nr",
109 .data = &files_stat,
110 .maxlen = sizeof(files_stat),
111 .mode = 0444,
112 .proc_handler = proc_nr_files,
113 },
114 {
115 .procname = "file-max",
116 .data = &files_stat.max_files,
117 .maxlen = sizeof(files_stat.max_files),
118 .mode = 0644,
119 .proc_handler = proc_doulongvec_minmax,
120 .extra1 = SYSCTL_LONG_ZERO,
121 .extra2 = SYSCTL_LONG_MAX,
122 },
123 {
124 .procname = "nr_open",
125 .data = &sysctl_nr_open,
126 .maxlen = sizeof(unsigned int),
127 .mode = 0644,
128 .proc_handler = proc_dointvec_minmax,
129 .extra1 = &sysctl_nr_open_min,
130 .extra2 = &sysctl_nr_open_max,
131 },
204d5a24
LC
132};
133
134static int __init init_fs_stat_sysctls(void)
529bf6be 135{
204d5a24 136 register_sysctl_init("fs", fs_stat_sysctls);
a3580ac9
LC
137 if (IS_ENABLED(CONFIG_BINFMT_MISC)) {
138 struct ctl_table_header *hdr;
139 hdr = register_sysctl_mount_point("fs/binfmt_misc");
140 kmemleak_not_leak(hdr);
141 }
204d5a24 142 return 0;
529bf6be 143}
204d5a24 144fs_initcall(init_fs_stat_sysctls);
529bf6be 145#endif
ab2af1f5 146
8a05a8c3 147static int init_file(struct file *f, int flags, const struct cred *cred)
d3b1084d 148{
d3b1084d
MS
149 int error;
150
d3b1084d
MS
151 f->f_cred = get_cred(cred);
152 error = security_file_alloc(f);
153 if (unlikely(error)) {
dff745c1 154 put_cred(f->f_cred);
8a05a8c3 155 return error;
d3b1084d
MS
156 }
157
d3b1084d
MS
158 rwlock_init(&f->f_owner.lock);
159 spin_lock_init(&f->f_lock);
160 mutex_init(&f->f_pos_lock);
d3b1084d
MS
161 f->f_flags = flags;
162 f->f_mode = OPEN_FMODE(flags);
163 /* f->f_version: 0 */
164
0ede61d8
CB
165 /*
166 * We're SLAB_TYPESAFE_BY_RCU so initialize f_count last. While
167 * fget-rcu pattern users need to be able to handle spurious
168 * refcount bumps we should reinitialize the reused file first.
169 */
170 atomic_long_set(&f->f_count, 1);
8a05a8c3 171 return 0;
d3b1084d
MS
172}
173
1da177e4 174/* Find an unused file structure and return a pointer to it.
1afc99be
AV
175 * Returns an error pointer if some error happend e.g. we over file
176 * structures limit, run out of memory or operation is not permitted.
430e285e
DH
177 *
178 * Be very careful using this. You are responsible for
179 * getting write access to any mount that you might assign
180 * to this filp, if it is opened for write. If this is not
181 * done, you will imbalance int the mount's writer count
182 * and a warning at __fput() time.
1da177e4 183 */
ea73ea72 184struct file *alloc_empty_file(int flags, const struct cred *cred)
1da177e4 185{
518de9b3 186 static long old_max;
1afc99be 187 struct file *f;
8a05a8c3 188 int error;
1da177e4
LT
189
190 /*
191 * Privileged users can go above max_files
192 */
529bf6be
DS
193 if (get_nr_files() >= files_stat.max_files && !capable(CAP_SYS_ADMIN)) {
194 /*
195 * percpu_counters are inaccurate. Do an expensive check before
196 * we go and fail.
197 */
52d9f3b4 198 if (percpu_counter_sum_positive(&nr_files) >= files_stat.max_files)
529bf6be
DS
199 goto over;
200 }
af4d2ecb 201
8a05a8c3
AG
202 f = kmem_cache_zalloc(filp_cachep, GFP_KERNEL);
203 if (unlikely(!f))
204 return ERR_PTR(-ENOMEM);
205
206 error = init_file(f, flags, cred);
dff745c1
AG
207 if (unlikely(error)) {
208 kmem_cache_free(filp_cachep, f);
8a05a8c3 209 return ERR_PTR(error);
dff745c1 210 }
8a05a8c3
AG
211
212 percpu_counter_inc(&nr_files);
1da177e4 213
af4d2ecb
KK
214 return f;
215
216over:
1da177e4 217 /* Ran out of filps - report that */
529bf6be 218 if (get_nr_files() > old_max) {
518de9b3 219 pr_info("VFS: file-max limit %lu reached\n", get_max_files());
529bf6be 220 old_max = get_nr_files();
1da177e4 221 }
1afc99be 222 return ERR_PTR(-ENFILE);
1da177e4
LT
223}
224
d3b1084d
MS
225/*
226 * Variant of alloc_empty_file() that doesn't check and modify nr_files.
227 *
8a05a8c3
AG
228 * This is only for kernel internal use, and the allocate file must not be
229 * installed into file tables or such.
d3b1084d
MS
230 */
231struct file *alloc_empty_file_noaccount(int flags, const struct cred *cred)
232{
8a05a8c3
AG
233 struct file *f;
234 int error;
235
236 f = kmem_cache_zalloc(filp_cachep, GFP_KERNEL);
237 if (unlikely(!f))
238 return ERR_PTR(-ENOMEM);
239
240 error = init_file(f, flags, cred);
dff745c1
AG
241 if (unlikely(error)) {
242 kmem_cache_free(filp_cachep, f);
8a05a8c3 243 return ERR_PTR(error);
dff745c1 244 }
d3b1084d 245
8a05a8c3 246 f->f_mode |= FMODE_NOACCOUNT;
d3b1084d
MS
247
248 return f;
249}
250
62d53c4a
AG
251/*
252 * Variant of alloc_empty_file() that allocates a backing_file container
253 * and doesn't check and modify nr_files.
254 *
255 * This is only for kernel internal use, and the allocate file must not be
256 * installed into file tables or such.
257 */
258struct file *alloc_empty_backing_file(int flags, const struct cred *cred)
259{
260 struct backing_file *ff;
261 int error;
262
263 ff = kzalloc(sizeof(struct backing_file), GFP_KERNEL);
264 if (unlikely(!ff))
265 return ERR_PTR(-ENOMEM);
266
267 error = init_file(&ff->file, flags, cred);
dff745c1
AG
268 if (unlikely(error)) {
269 kfree(ff);
62d53c4a 270 return ERR_PTR(error);
dff745c1 271 }
62d53c4a
AG
272
273 ff->file.f_mode |= FMODE_BACKING | FMODE_NOACCOUNT;
274 return &ff->file;
275}
276
ce8d2cdf 277/**
0873add0 278 * file_init_path - initialize a 'struct file' based on path
a457606a 279 *
0873add0 280 * @file: the file to set up
a457606a 281 * @path: the (dentry, vfsmount) pair for the new file
ce8d2cdf 282 * @fop: the 'struct file_operations' for the new file
ce8d2cdf 283 */
0873add0
CB
284static void file_init_path(struct file *file, const struct path *path,
285 const struct file_operations *fop)
ce8d2cdf 286{
2c48b9c4 287 file->f_path = *path;
dd37978c 288 file->f_inode = path->dentry->d_inode;
2c48b9c4 289 file->f_mapping = path->dentry->d_inode->i_mapping;
5660e13d 290 file->f_wb_err = filemap_sample_wb_err(file->f_mapping);
735e4ae5 291 file->f_sb_err = file_sample_sb_err(file);
868941b1 292 if (fop->llseek)
e7478158 293 file->f_mode |= FMODE_LSEEK;
c9c554f2 294 if ((file->f_mode & FMODE_READ) &&
84363182 295 likely(fop->read || fop->read_iter))
c9c554f2
AV
296 file->f_mode |= FMODE_CAN_READ;
297 if ((file->f_mode & FMODE_WRITE) &&
84363182 298 likely(fop->write || fop->write_iter))
c9c554f2 299 file->f_mode |= FMODE_CAN_WRITE;
164f4064 300 file->f_iocb_flags = iocb_flags(file);
f5d11409 301 file->f_mode |= FMODE_OPENED;
ce8d2cdf 302 file->f_op = fop;
c9c554f2 303 if ((file->f_mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ)
890275b5 304 i_readcount_inc(path->dentry->d_inode);
0873add0
CB
305}
306
307/**
308 * alloc_file - allocate and initialize a 'struct file'
309 *
310 * @path: the (dentry, vfsmount) pair for the new file
311 * @flags: O_... flags with which the new file will be opened
312 * @fop: the 'struct file_operations' for the new file
313 */
314static struct file *alloc_file(const struct path *path, int flags,
315 const struct file_operations *fop)
316{
317 struct file *file;
318
319 file = alloc_empty_file(flags, current_cred());
320 if (!IS_ERR(file))
321 file_init_path(file, path, fop);
3d1e4631 322 return file;
ce8d2cdf 323}
ce8d2cdf 324
0873add0
CB
325static inline int alloc_path_pseudo(const char *name, struct inode *inode,
326 struct vfsmount *mnt, struct path *path)
d93aa9d8 327{
d93aa9d8 328 struct qstr this = QSTR_INIT(name, strlen(name));
0873add0
CB
329
330 path->dentry = d_alloc_pseudo(mnt->mnt_sb, &this);
331 if (!path->dentry)
332 return -ENOMEM;
333 path->mnt = mntget(mnt);
334 d_instantiate(path->dentry, inode);
335 return 0;
336}
337
338struct file *alloc_file_pseudo(struct inode *inode, struct vfsmount *mnt,
339 const char *name, int flags,
340 const struct file_operations *fops)
341{
342 int ret;
d93aa9d8
AV
343 struct path path;
344 struct file *file;
345
0873add0
CB
346 ret = alloc_path_pseudo(name, inode, mnt, &path);
347 if (ret)
348 return ERR_PTR(ret);
349
b6509f6a 350 file = alloc_file(&path, flags, fops);
d93aa9d8
AV
351 if (IS_ERR(file)) {
352 ihold(inode);
353 path_put(&path);
354 }
355 return file;
356}
357EXPORT_SYMBOL(alloc_file_pseudo);
358
bac0a9e5
CB
359struct file *alloc_file_pseudo_noaccount(struct inode *inode,
360 struct vfsmount *mnt, const char *name,
361 int flags,
362 const struct file_operations *fops)
363{
364 int ret;
365 struct path path;
366 struct file *file;
367
368 ret = alloc_path_pseudo(name, inode, mnt, &path);
369 if (ret)
370 return ERR_PTR(ret);
371
372 file = alloc_empty_file_noaccount(flags, current_cred());
373 if (IS_ERR(file)) {
374 ihold(inode);
375 path_put(&path);
376 return file;
377 }
378 file_init_path(file, &path, fops);
379 return file;
380}
381EXPORT_SYMBOL_GPL(alloc_file_pseudo_noaccount);
382
183266f2
AV
383struct file *alloc_file_clone(struct file *base, int flags,
384 const struct file_operations *fops)
385{
386 struct file *f = alloc_file(&base->f_path, flags, fops);
387 if (!IS_ERR(f)) {
388 path_get(&f->f_path);
389 f->f_mapping = base->f_mapping;
390 }
391 return f;
392}
393
d7065da0 394/* the real guts of fput() - releasing the last reference to file
1da177e4 395 */
d7065da0 396static void __fput(struct file *file)
1da177e4 397{
0f7fc9e4
JJS
398 struct dentry *dentry = file->f_path.dentry;
399 struct vfsmount *mnt = file->f_path.mnt;
c77cecee 400 struct inode *inode = file->f_inode;
a07b2000 401 fmode_t mode = file->f_mode;
1da177e4 402
4d27f326
AV
403 if (unlikely(!(file->f_mode & FMODE_OPENED)))
404 goto out;
405
1da177e4 406 might_sleep();
0eeca283
RL
407
408 fsnotify_close(file);
1da177e4
LT
409 /*
410 * The function eventpoll_release() should be the first called
411 * in the file cleanup chain.
412 */
413 eventpoll_release(file);
78ed8a13 414 locks_remove_file(file);
1da177e4 415
f09068b5 416 security_file_release(file);
233e70f4 417 if (unlikely(file->f_flags & FASYNC)) {
72c2d531 418 if (file->f_op->fasync)
233e70f4
AV
419 file->f_op->fasync(-1, file, 0);
420 }
72c2d531 421 if (file->f_op->release)
1da177e4 422 file->f_op->release(inode, file);
60ed8cf7 423 if (unlikely(S_ISCHR(inode->i_mode) && inode->i_cdev != NULL &&
a07b2000 424 !(mode & FMODE_PATH))) {
1da177e4 425 cdev_put(inode->i_cdev);
60ed8cf7 426 }
1da177e4 427 fops_put(file->f_op);
609d7fa9 428 put_pid(file->f_owner.pid);
d6da19c9 429 put_file_access(file);
1da177e4 430 dput(dentry);
a07b2000
AV
431 if (unlikely(mode & FMODE_NEED_UNMOUNT))
432 dissolve_on_fput(mnt);
1da177e4 433 mntput(mnt);
4d27f326
AV
434out:
435 file_free(file);
1da177e4
LT
436}
437
4f5e65a1 438static LLIST_HEAD(delayed_fput_list);
4a9d4b02
AV
439static void delayed_fput(struct work_struct *unused)
440{
4f5e65a1 441 struct llist_node *node = llist_del_all(&delayed_fput_list);
b9ea557e 442 struct file *f, *t;
4f5e65a1 443
e87f2c26 444 llist_for_each_entry_safe(f, t, node, f_llist)
b9ea557e 445 __fput(f);
4a9d4b02
AV
446}
447
448static void ____fput(struct callback_head *work)
449{
372a34e6 450 __fput(container_of(work, struct file, f_task_work));
4a9d4b02
AV
451}
452
453/*
454 * If kernel thread really needs to have the final fput() it has done
455 * to complete, call this. The only user right now is the boot - we
456 * *do* need to make sure our writes to binaries on initramfs has
457 * not left us with opened struct file waiting for __fput() - execve()
458 * won't work without that. Please, don't add more callers without
459 * very good reasons; in particular, never call that with locks
460 * held and never call that from a thread that might need to do
461 * some work on any kind of umount.
462 */
463void flush_delayed_fput(void)
464{
465 delayed_fput(NULL);
466}
7239a40c 467EXPORT_SYMBOL_GPL(flush_delayed_fput);
4a9d4b02 468
c7314d74 469static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput);
4a9d4b02 470
81132a39 471void fput(struct file *file)
d7065da0 472{
81132a39 473 if (atomic_long_dec_and_test(&file->f_count)) {
4a9d4b02 474 struct task_struct *task = current;
e7b2c406 475
7cb537b6
AV
476 if (unlikely(!(file->f_mode & (FMODE_BACKING | FMODE_OPENED)))) {
477 file_free(file);
478 return;
479 }
e7b2c406 480 if (likely(!in_interrupt() && !(task->flags & PF_KTHREAD))) {
372a34e6
CB
481 init_task_work(&file->f_task_work, ____fput);
482 if (!task_work_add(task, &file->f_task_work, TWA_RESUME))
e7b2c406 483 return;
64372501
AM
484 /*
485 * After this task has run exit_task_work(),
be49b30a 486 * task_work_add() will fail. Fall through to delayed
64372501
AM
487 * fput to avoid leaking *file.
488 */
4a9d4b02 489 }
4f5e65a1 490
e87f2c26 491 if (llist_add(&file->f_llist, &delayed_fput_list))
c7314d74 492 schedule_delayed_work(&delayed_fput_work, 1);
4a9d4b02
AV
493 }
494}
495
496/*
497 * synchronous analog of fput(); for kernel threads that might be needed
498 * in some umount() (and thus can't use flush_delayed_fput() without
499 * risking deadlocks), need to wait for completion of __fput() and know
500 * for this specific struct file it won't involve anything that would
501 * need them. Use only if you really need it - at the very least,
502 * don't blindly convert fput() by kernel thread to that.
503 */
504void __fput_sync(struct file *file)
505{
021a160a 506 if (atomic_long_dec_and_test(&file->f_count))
d7065da0
AV
507 __fput(file);
508}
509
510EXPORT_SYMBOL(fput);
f0043206 511EXPORT_SYMBOL(__fput_sync);
d7065da0 512
4248b0da 513void __init files_init(void)
b9ea557e 514{
b6b3fdea 515 filp_cachep = kmem_cache_create("filp", sizeof(struct file), 0,
0ede61d8
CB
516 SLAB_TYPESAFE_BY_RCU | SLAB_HWCACHE_ALIGN |
517 SLAB_PANIC | SLAB_ACCOUNT, NULL);
4248b0da
MG
518 percpu_counter_init(&nr_files, 0, GFP_KERNEL);
519}
b6b3fdea 520
4248b0da
MG
521/*
522 * One file with associated inode and dcache is very roughly 1K. Per default
523 * do not use more than 10% of our memory for files.
524 */
525void __init files_maxfiles_init(void)
526{
527 unsigned long n;
ca79b0c2 528 unsigned long nr_pages = totalram_pages();
3d6357de 529 unsigned long memreserve = (nr_pages - nr_free_pages()) * 3/2;
4248b0da 530
3d6357de
AK
531 memreserve = min(memreserve, nr_pages - 1);
532 n = ((nr_pages - memreserve) * (PAGE_SIZE / 1024)) / 10;
1da177e4 533
518de9b3 534 files_stat.max_files = max_t(unsigned long, n, NR_FILE);
b9ea557e 535}