]> git.ipfire.org Git - thirdparty/linux.git/blame - fs/inode.c
netfs: Allocate multipage folios in the writepath
[thirdparty/linux.git] / fs / inode.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4 2/*
1da177e4 3 * (C) 1997 Linus Torvalds
4b4563dc 4 * (C) 1999 Andrea Arcangeli <andrea@suse.de> (dynamic inode allocation)
1da177e4 5 */
e59cc473 6#include <linux/export.h>
1da177e4 7#include <linux/fs.h>
5970e15d 8#include <linux/filelock.h>
1da177e4 9#include <linux/mm.h>
1da177e4 10#include <linux/backing-dev.h>
1da177e4
LT
11#include <linux/hash.h>
12#include <linux/swap.h>
13#include <linux/security.h>
1da177e4 14#include <linux/cdev.h>
57c8a661 15#include <linux/memblock.h>
3be25f49 16#include <linux/fsnotify.h>
fc33a7bb 17#include <linux/mount.h>
f19d4a8f 18#include <linux/posix_acl.h>
4b4563dc 19#include <linux/buffer_head.h> /* for inode_has_buffers */
7ada4db8 20#include <linux/ratelimit.h>
bc3b14cb 21#include <linux/list_lru.h>
ae5e165d 22#include <linux/iversion.h>
0ae45f63 23#include <trace/events/writeback.h>
a66979ab 24#include "internal.h"
1da177e4 25
250df6ed 26/*
4b4563dc 27 * Inode locking rules:
250df6ed
DC
28 *
29 * inode->i_lock protects:
10e14073 30 * inode->i_state, inode->i_hash, __iget(), inode->i_io_list
bc3b14cb 31 * Inode LRU list locks protect:
98b745c6 32 * inode->i_sb->s_inode_lru, inode->i_lru
74278da9
DC
33 * inode->i_sb->s_inode_list_lock protects:
34 * inode->i_sb->s_inodes, inode->i_sb_list
f758eeab 35 * bdi->wb.list_lock protects:
c7f54084 36 * bdi->wb.b_{dirty,io,more_io,dirty_time}, inode->i_io_list
67a23c49
DC
37 * inode_hash_lock protects:
38 * inode_hashtable, inode->i_hash
250df6ed
DC
39 *
40 * Lock ordering:
55fa6091 41 *
74278da9 42 * inode->i_sb->s_inode_list_lock
55fa6091 43 * inode->i_lock
bc3b14cb 44 * Inode LRU list locks
a66979ab 45 *
f758eeab 46 * bdi->wb.list_lock
a66979ab 47 * inode->i_lock
67a23c49
DC
48 *
49 * inode_hash_lock
74278da9 50 * inode->i_sb->s_inode_list_lock
67a23c49
DC
51 * inode->i_lock
52 *
53 * iunique_lock
54 * inode_hash_lock
250df6ed
DC
55 */
56
68279f9c
AD
57static unsigned int i_hash_mask __ro_after_init;
58static unsigned int i_hash_shift __ro_after_init;
59static struct hlist_head *inode_hashtable __ro_after_init;
67a23c49 60static __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_hash_lock);
1da177e4 61
7dcda1c9
JA
62/*
63 * Empty aops. Can be used for the cases where the user does not
64 * define any of the address_space operations.
65 */
66const struct address_space_operations empty_aops = {
67};
68EXPORT_SYMBOL(empty_aops);
69
3942c07c
GC
70static DEFINE_PER_CPU(unsigned long, nr_inodes);
71static DEFINE_PER_CPU(unsigned long, nr_unused);
cffbc8aa 72
68279f9c 73static struct kmem_cache *inode_cachep __ro_after_init;
1da177e4 74
3942c07c 75static long get_nr_inodes(void)
cffbc8aa 76{
3e880fb5 77 int i;
3942c07c 78 long sum = 0;
3e880fb5
NP
79 for_each_possible_cpu(i)
80 sum += per_cpu(nr_inodes, i);
81 return sum < 0 ? 0 : sum;
cffbc8aa
DC
82}
83
3942c07c 84static inline long get_nr_inodes_unused(void)
cffbc8aa 85{
fcb94f72 86 int i;
3942c07c 87 long sum = 0;
fcb94f72
DC
88 for_each_possible_cpu(i)
89 sum += per_cpu(nr_unused, i);
90 return sum < 0 ? 0 : sum;
cffbc8aa
DC
91}
92
3942c07c 93long get_nr_dirty_inodes(void)
cffbc8aa 94{
3e880fb5 95 /* not actually dirty inodes, but a wild approximation */
3942c07c 96 long nr_dirty = get_nr_inodes() - get_nr_inodes_unused();
cffbc8aa 97 return nr_dirty > 0 ? nr_dirty : 0;
cffbc8aa
DC
98}
99
100/*
101 * Handle nr_inode sysctl
102 */
103#ifdef CONFIG_SYSCTL
1d67fe58
LC
104/*
105 * Statistics gathering..
106 */
107static struct inodes_stat_t inodes_stat;
108
109static int proc_nr_inodes(struct ctl_table *table, int write, void *buffer,
110 size_t *lenp, loff_t *ppos)
cffbc8aa
DC
111{
112 inodes_stat.nr_inodes = get_nr_inodes();
fcb94f72 113 inodes_stat.nr_unused = get_nr_inodes_unused();
3942c07c 114 return proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
cffbc8aa 115}
1d67fe58
LC
116
117static struct ctl_table inodes_sysctls[] = {
118 {
119 .procname = "inode-nr",
120 .data = &inodes_stat,
121 .maxlen = 2*sizeof(long),
122 .mode = 0444,
123 .proc_handler = proc_nr_inodes,
124 },
125 {
126 .procname = "inode-state",
127 .data = &inodes_stat,
128 .maxlen = 7*sizeof(long),
129 .mode = 0444,
130 .proc_handler = proc_nr_inodes,
131 },
132 { }
133};
134
135static int __init init_fs_inode_sysctls(void)
136{
137 register_sysctl_init("fs", inodes_sysctls);
138 return 0;
139}
140early_initcall(init_fs_inode_sysctls);
cffbc8aa
DC
141#endif
142
bd9b51e7
AV
143static int no_open(struct inode *inode, struct file *file)
144{
145 return -ENXIO;
146}
147
2cb1599f 148/**
6e7c2b4d 149 * inode_init_always - perform inode structure initialisation
0bc02f3f
RD
150 * @sb: superblock inode belongs to
151 * @inode: inode to initialise
2cb1599f
DC
152 *
153 * These are initializations that need to be done on every inode
154 * allocation as the fields are not initialised by slab allocation.
155 */
54e34621 156int inode_init_always(struct super_block *sb, struct inode *inode)
1da177e4 157{
6e1d5dcc 158 static const struct inode_operations empty_iops;
bd9b51e7 159 static const struct file_operations no_open_fops = {.open = no_open};
6b3304b5 160 struct address_space *const mapping = &inode->i_data;
2cb1599f
DC
161
162 inode->i_sb = sb;
163 inode->i_blkbits = sb->s_blocksize_bits;
164 inode->i_flags = 0;
8019ad13 165 atomic64_set(&inode->i_sequence, 0);
2cb1599f
DC
166 atomic_set(&inode->i_count, 1);
167 inode->i_op = &empty_iops;
bd9b51e7 168 inode->i_fop = &no_open_fops;
edbb35cc 169 inode->i_ino = 0;
a78ef704 170 inode->__i_nlink = 1;
3ddcd056 171 inode->i_opflags = 0;
d0a5b995
AG
172 if (sb->s_xattr)
173 inode->i_opflags |= IOP_XATTR;
92361636
EB
174 i_uid_write(inode, 0);
175 i_gid_write(inode, 0);
2cb1599f
DC
176 atomic_set(&inode->i_writecount, 0);
177 inode->i_size = 0;
c75b1d94 178 inode->i_write_hint = WRITE_LIFE_NOT_SET;
2cb1599f
DC
179 inode->i_blocks = 0;
180 inode->i_bytes = 0;
181 inode->i_generation = 0;
2cb1599f 182 inode->i_pipe = NULL;
2cb1599f 183 inode->i_cdev = NULL;
61ba64fc 184 inode->i_link = NULL;
84e710da 185 inode->i_dir_seq = 0;
2cb1599f
DC
186 inode->i_rdev = 0;
187 inode->dirtied_when = 0;
6146f0d5 188
3d65ae46
TE
189#ifdef CONFIG_CGROUP_WRITEBACK
190 inode->i_wb_frn_winner = 0;
191 inode->i_wb_frn_avg_time = 0;
192 inode->i_wb_frn_history = 0;
193#endif
194
2cb1599f
DC
195 spin_lock_init(&inode->i_lock);
196 lockdep_set_class(&inode->i_lock, &sb->s_type->i_lock_key);
197
9902af79
AV
198 init_rwsem(&inode->i_rwsem);
199 lockdep_set_class(&inode->i_rwsem, &sb->s_type->i_mutex_key);
2cb1599f 200
bd5fe6c5 201 atomic_set(&inode->i_dio_count, 0);
2cb1599f
DC
202
203 mapping->a_ops = &empty_aops;
204 mapping->host = inode;
205 mapping->flags = 0;
829bc787 206 mapping->wb_err = 0;
4bb5f5d9 207 atomic_set(&mapping->i_mmap_writable, 0);
09d91cda
SL
208#ifdef CONFIG_READ_ONLY_THP_FOR_FS
209 atomic_set(&mapping->nr_thps, 0);
210#endif
3c1d4378 211 mapping_set_gfp_mask(mapping, GFP_HIGHUSER_MOVABLE);
252aa6f5 212 mapping->private_data = NULL;
2cb1599f 213 mapping->writeback_index = 0;
23ca067b
SAS
214 init_rwsem(&mapping->invalidate_lock);
215 lockdep_set_class_and_name(&mapping->invalidate_lock,
216 &sb->s_type->invalidate_lock_key,
217 "mapping.invalidate_lock");
762321da
CH
218 if (sb->s_iflags & SB_I_STABLE_WRITES)
219 mapping_set_stable_writes(mapping);
2cb1599f
DC
220 inode->i_private = NULL;
221 inode->i_mapping = mapping;
b3d9b7a3 222 INIT_HLIST_HEAD(&inode->i_dentry); /* buggered by rcu freeing */
f19d4a8f
AV
223#ifdef CONFIG_FS_POSIX_ACL
224 inode->i_acl = inode->i_default_acl = ACL_NOT_CACHED;
225#endif
2cb1599f 226
3be25f49
EP
227#ifdef CONFIG_FSNOTIFY
228 inode->i_fsnotify_mask = 0;
229#endif
4a075e39 230 inode->i_flctx = NULL;
2e488f13
DM
231
232 if (unlikely(security_inode_alloc(inode)))
233 return -ENOMEM;
3e880fb5 234 this_cpu_inc(nr_inodes);
cffbc8aa 235
54e34621 236 return 0;
1da177e4 237}
2cb1599f
DC
238EXPORT_SYMBOL(inode_init_always);
239
fdb0da89
AV
240void free_inode_nonrcu(struct inode *inode)
241{
242 kmem_cache_free(inode_cachep, inode);
243}
244EXPORT_SYMBOL(free_inode_nonrcu);
245
246static void i_callback(struct rcu_head *head)
247{
248 struct inode *inode = container_of(head, struct inode, i_rcu);
249 if (inode->free_inode)
250 inode->free_inode(inode);
251 else
252 free_inode_nonrcu(inode);
253}
254
2cb1599f
DC
255static struct inode *alloc_inode(struct super_block *sb)
256{
fdb0da89 257 const struct super_operations *ops = sb->s_op;
2cb1599f
DC
258 struct inode *inode;
259
fdb0da89
AV
260 if (ops->alloc_inode)
261 inode = ops->alloc_inode(sb);
2cb1599f 262 else
8b9f3ac5 263 inode = alloc_inode_sb(sb, inode_cachep, GFP_KERNEL);
2cb1599f 264
54e34621
CH
265 if (!inode)
266 return NULL;
267
268 if (unlikely(inode_init_always(sb, inode))) {
fdb0da89
AV
269 if (ops->destroy_inode) {
270 ops->destroy_inode(inode);
271 if (!ops->free_inode)
272 return NULL;
273 }
274 inode->free_inode = ops->free_inode;
275 i_callback(&inode->i_rcu);
54e34621
CH
276 return NULL;
277 }
278
279 return inode;
2cb1599f 280}
1da177e4 281
2e00c97e 282void __destroy_inode(struct inode *inode)
1da177e4 283{
b7542f8c 284 BUG_ON(inode_has_buffers(inode));
52ebea74 285 inode_detach_wb(inode);
1da177e4 286 security_inode_free(inode);
3be25f49 287 fsnotify_inode_delete(inode);
f27a0fe0 288 locks_free_lock_context(inode);
7ada4db8
MS
289 if (!inode->i_nlink) {
290 WARN_ON(atomic_long_read(&inode->i_sb->s_remove_count) == 0);
291 atomic_long_dec(&inode->i_sb->s_remove_count);
292 }
293
f19d4a8f 294#ifdef CONFIG_FS_POSIX_ACL
b8a7a3a6 295 if (inode->i_acl && !is_uncached_acl(inode->i_acl))
f19d4a8f 296 posix_acl_release(inode->i_acl);
b8a7a3a6 297 if (inode->i_default_acl && !is_uncached_acl(inode->i_default_acl))
f19d4a8f
AV
298 posix_acl_release(inode->i_default_acl);
299#endif
3e880fb5 300 this_cpu_dec(nr_inodes);
2e00c97e
CH
301}
302EXPORT_SYMBOL(__destroy_inode);
303
56b0dacf 304static void destroy_inode(struct inode *inode)
2e00c97e 305{
fdb0da89
AV
306 const struct super_operations *ops = inode->i_sb->s_op;
307
7ccf19a8 308 BUG_ON(!list_empty(&inode->i_lru));
2e00c97e 309 __destroy_inode(inode);
fdb0da89
AV
310 if (ops->destroy_inode) {
311 ops->destroy_inode(inode);
312 if (!ops->free_inode)
313 return;
314 }
315 inode->free_inode = ops->free_inode;
316 call_rcu(&inode->i_rcu, i_callback);
1da177e4 317}
1da177e4 318
7ada4db8
MS
319/**
320 * drop_nlink - directly drop an inode's link count
321 * @inode: inode
322 *
323 * This is a low-level filesystem helper to replace any
324 * direct filesystem manipulation of i_nlink. In cases
325 * where we are attempting to track writes to the
326 * filesystem, a decrement to zero means an imminent
327 * write when the file is truncated and actually unlinked
328 * on the filesystem.
329 */
330void drop_nlink(struct inode *inode)
331{
332 WARN_ON(inode->i_nlink == 0);
333 inode->__i_nlink--;
334 if (!inode->i_nlink)
335 atomic_long_inc(&inode->i_sb->s_remove_count);
336}
337EXPORT_SYMBOL(drop_nlink);
338
339/**
340 * clear_nlink - directly zero an inode's link count
341 * @inode: inode
342 *
343 * This is a low-level filesystem helper to replace any
344 * direct filesystem manipulation of i_nlink. See
345 * drop_nlink() for why we care about i_nlink hitting zero.
346 */
347void clear_nlink(struct inode *inode)
348{
349 if (inode->i_nlink) {
350 inode->__i_nlink = 0;
351 atomic_long_inc(&inode->i_sb->s_remove_count);
352 }
353}
354EXPORT_SYMBOL(clear_nlink);
355
356/**
357 * set_nlink - directly set an inode's link count
358 * @inode: inode
359 * @nlink: new nlink (should be non-zero)
360 *
361 * This is a low-level filesystem helper to replace any
362 * direct filesystem manipulation of i_nlink.
363 */
364void set_nlink(struct inode *inode, unsigned int nlink)
365{
366 if (!nlink) {
7ada4db8
MS
367 clear_nlink(inode);
368 } else {
369 /* Yes, some filesystems do change nlink from zero to one */
370 if (inode->i_nlink == 0)
371 atomic_long_dec(&inode->i_sb->s_remove_count);
372
373 inode->__i_nlink = nlink;
374 }
375}
376EXPORT_SYMBOL(set_nlink);
377
378/**
379 * inc_nlink - directly increment an inode's link count
380 * @inode: inode
381 *
382 * This is a low-level filesystem helper to replace any
383 * direct filesystem manipulation of i_nlink. Currently,
384 * it is only here for parity with dec_nlink().
385 */
386void inc_nlink(struct inode *inode)
387{
f4e0c30c
AV
388 if (unlikely(inode->i_nlink == 0)) {
389 WARN_ON(!(inode->i_state & I_LINKABLE));
7ada4db8 390 atomic_long_dec(&inode->i_sb->s_remove_count);
f4e0c30c 391 }
7ada4db8
MS
392
393 inode->__i_nlink++;
394}
395EXPORT_SYMBOL(inc_nlink);
396
ae23395d 397static void __address_space_init_once(struct address_space *mapping)
2aa15890 398{
7b785645 399 xa_init_flags(&mapping->i_pages, XA_FLAGS_LOCK_IRQ | XA_FLAGS_ACCOUNT);
c8c06efa 400 init_rwsem(&mapping->i_mmap_rwsem);
2aa15890
MS
401 INIT_LIST_HEAD(&mapping->private_list);
402 spin_lock_init(&mapping->private_lock);
f808c13f 403 mapping->i_mmap = RB_ROOT_CACHED;
2aa15890 404}
ae23395d
DC
405
406void address_space_init_once(struct address_space *mapping)
407{
408 memset(mapping, 0, sizeof(*mapping));
409 __address_space_init_once(mapping);
410}
2aa15890
MS
411EXPORT_SYMBOL(address_space_init_once);
412
1da177e4
LT
413/*
414 * These are initializations that only need to be done
415 * once, because the fields are idempotent across use
416 * of the inode, so let the slab aware of that.
417 */
418void inode_init_once(struct inode *inode)
419{
420 memset(inode, 0, sizeof(*inode));
421 INIT_HLIST_NODE(&inode->i_hash);
1da177e4 422 INIT_LIST_HEAD(&inode->i_devices);
c7f54084 423 INIT_LIST_HEAD(&inode->i_io_list);
6c60d2b5 424 INIT_LIST_HEAD(&inode->i_wb_list);
7ccf19a8 425 INIT_LIST_HEAD(&inode->i_lru);
18cc912b 426 INIT_LIST_HEAD(&inode->i_sb_list);
ae23395d 427 __address_space_init_once(&inode->i_data);
1da177e4
LT
428 i_size_ordered_init(inode);
429}
1da177e4
LT
430EXPORT_SYMBOL(inode_init_once);
431
51cc5068 432static void init_once(void *foo)
1da177e4 433{
6b3304b5 434 struct inode *inode = (struct inode *) foo;
1da177e4 435
a35afb83 436 inode_init_once(inode);
1da177e4
LT
437}
438
439/*
250df6ed 440 * inode->i_lock must be held
1da177e4 441 */
6b3304b5 442void __iget(struct inode *inode)
1da177e4 443{
9e38d86f
NP
444 atomic_inc(&inode->i_count);
445}
2e147f1e 446
7de9c6ee
AV
447/*
448 * get additional reference to inode; caller must already hold one.
449 */
450void ihold(struct inode *inode)
451{
452 WARN_ON(atomic_inc_return(&inode->i_count) < 2);
453}
454EXPORT_SYMBOL(ihold);
455
51b8c1fe 456static void __inode_add_lru(struct inode *inode, bool rotate)
9e38d86f 457{
51b8c1fe
JW
458 if (inode->i_state & (I_DIRTY_ALL | I_SYNC | I_FREEING | I_WILL_FREE))
459 return;
460 if (atomic_read(&inode->i_count))
461 return;
462 if (!(inode->i_sb->s_flags & SB_ACTIVE))
463 return;
464 if (!mapping_shrinkable(&inode->i_data))
465 return;
466
bc3b14cb 467 if (list_lru_add(&inode->i_sb->s_inode_lru, &inode->i_lru))
fcb94f72 468 this_cpu_inc(nr_unused);
51b8c1fe 469 else if (rotate)
563f4001 470 inode->i_state |= I_REFERENCED;
9e38d86f 471}
2e147f1e 472
4eff96dd
JK
473/*
474 * Add inode to LRU if needed (inode is unused and clean).
475 *
476 * Needs inode->i_lock held.
477 */
478void inode_add_lru(struct inode *inode)
479{
51b8c1fe 480 __inode_add_lru(inode, false);
4eff96dd
JK
481}
482
9e38d86f
NP
483static void inode_lru_list_del(struct inode *inode)
484{
bc3b14cb 485 if (list_lru_del(&inode->i_sb->s_inode_lru, &inode->i_lru))
fcb94f72 486 this_cpu_dec(nr_unused);
1da177e4
LT
487}
488
646ec461
CH
489/**
490 * inode_sb_list_add - add inode to the superblock list of inodes
491 * @inode: inode to add
492 */
493void inode_sb_list_add(struct inode *inode)
494{
74278da9 495 spin_lock(&inode->i_sb->s_inode_list_lock);
55fa6091 496 list_add(&inode->i_sb_list, &inode->i_sb->s_inodes);
74278da9 497 spin_unlock(&inode->i_sb->s_inode_list_lock);
646ec461
CH
498}
499EXPORT_SYMBOL_GPL(inode_sb_list_add);
500
55fa6091 501static inline void inode_sb_list_del(struct inode *inode)
646ec461 502{
a209dfc7 503 if (!list_empty(&inode->i_sb_list)) {
74278da9 504 spin_lock(&inode->i_sb->s_inode_list_lock);
a209dfc7 505 list_del_init(&inode->i_sb_list);
74278da9 506 spin_unlock(&inode->i_sb->s_inode_list_lock);
a209dfc7 507 }
646ec461
CH
508}
509
4c51acbc
DC
510static unsigned long hash(struct super_block *sb, unsigned long hashval)
511{
512 unsigned long tmp;
513
514 tmp = (hashval * (unsigned long)sb) ^ (GOLDEN_RATIO_PRIME + hashval) /
515 L1_CACHE_BYTES;
4b4563dc
CH
516 tmp = tmp ^ ((tmp ^ GOLDEN_RATIO_PRIME) >> i_hash_shift);
517 return tmp & i_hash_mask;
4c51acbc
DC
518}
519
520/**
521 * __insert_inode_hash - hash an inode
522 * @inode: unhashed inode
523 * @hashval: unsigned long value used to locate this object in the
524 * inode_hashtable.
525 *
526 * Add an inode to the inode hash for this superblock.
527 */
528void __insert_inode_hash(struct inode *inode, unsigned long hashval)
529{
646ec461
CH
530 struct hlist_head *b = inode_hashtable + hash(inode->i_sb, hashval);
531
67a23c49 532 spin_lock(&inode_hash_lock);
250df6ed 533 spin_lock(&inode->i_lock);
3f19b2ab 534 hlist_add_head_rcu(&inode->i_hash, b);
250df6ed 535 spin_unlock(&inode->i_lock);
67a23c49 536 spin_unlock(&inode_hash_lock);
4c51acbc
DC
537}
538EXPORT_SYMBOL(__insert_inode_hash);
539
4c51acbc 540/**
f2ee7abf 541 * __remove_inode_hash - remove an inode from the hash
4c51acbc
DC
542 * @inode: inode to unhash
543 *
544 * Remove an inode from the superblock.
545 */
f2ee7abf 546void __remove_inode_hash(struct inode *inode)
4c51acbc 547{
67a23c49 548 spin_lock(&inode_hash_lock);
250df6ed 549 spin_lock(&inode->i_lock);
3f19b2ab 550 hlist_del_init_rcu(&inode->i_hash);
250df6ed 551 spin_unlock(&inode->i_lock);
67a23c49 552 spin_unlock(&inode_hash_lock);
4c51acbc 553}
f2ee7abf 554EXPORT_SYMBOL(__remove_inode_hash);
4c51acbc 555
3e9d80a8
MWO
556void dump_mapping(const struct address_space *mapping)
557{
558 struct inode *host;
559 const struct address_space_operations *a_ops;
560 struct hlist_node *dentry_first;
561 struct dentry *dentry_ptr;
562 struct dentry dentry;
563 unsigned long ino;
564
565 /*
566 * If mapping is an invalid pointer, we don't want to crash
567 * accessing it, so probe everything depending on it carefully.
568 */
569 if (get_kernel_nofault(host, &mapping->host) ||
570 get_kernel_nofault(a_ops, &mapping->a_ops)) {
571 pr_warn("invalid mapping:%px\n", mapping);
572 return;
573 }
574
575 if (!host) {
576 pr_warn("aops:%ps\n", a_ops);
577 return;
578 }
579
580 if (get_kernel_nofault(dentry_first, &host->i_dentry.first) ||
581 get_kernel_nofault(ino, &host->i_ino)) {
582 pr_warn("aops:%ps invalid inode:%px\n", a_ops, host);
583 return;
584 }
585
586 if (!dentry_first) {
587 pr_warn("aops:%ps ino:%lx\n", a_ops, ino);
588 return;
589 }
590
591 dentry_ptr = container_of(dentry_first, struct dentry, d_u.d_alias);
592 if (get_kernel_nofault(dentry, dentry_ptr)) {
593 pr_warn("aops:%ps ino:%lx invalid dentry:%px\n",
594 a_ops, ino, dentry_ptr);
595 return;
596 }
597
598 /*
599 * if dentry is corrupted, the %pd handler may still crash,
600 * but it's unlikely that we reach here with a corrupt mapping
601 */
602 pr_warn("aops:%ps ino:%lx dentry name:\"%pd\"\n", a_ops, ino, &dentry);
603}
604
dbd5768f 605void clear_inode(struct inode *inode)
b0683aa6 606{
08142579 607 /*
b93b0163 608 * We have to cycle the i_pages lock here because reclaim can be in the
6ffcd825 609 * process of removing the last page (in __filemap_remove_folio())
b93b0163 610 * and we must not free the mapping under it.
08142579 611 */
b93b0163 612 xa_lock_irq(&inode->i_data.i_pages);
b0683aa6 613 BUG_ON(inode->i_data.nrpages);
786b3112
HD
614 /*
615 * Almost always, mapping_empty(&inode->i_data) here; but there are
616 * two known and long-standing ways in which nodes may get left behind
617 * (when deep radix-tree node allocation failed partway; or when THP
618 * collapse_file() failed). Until those two known cases are cleaned up,
619 * or a cleanup function is called here, do not BUG_ON(!mapping_empty),
620 * nor even WARN_ON(!mapping_empty).
621 */
b93b0163 622 xa_unlock_irq(&inode->i_data.i_pages);
b0683aa6
AV
623 BUG_ON(!list_empty(&inode->i_data.private_list));
624 BUG_ON(!(inode->i_state & I_FREEING));
625 BUG_ON(inode->i_state & I_CLEAR);
6c60d2b5 626 BUG_ON(!list_empty(&inode->i_wb_list));
fa0d7e3d 627 /* don't need i_lock here, no concurrent mods to i_state */
b0683aa6
AV
628 inode->i_state = I_FREEING | I_CLEAR;
629}
dbd5768f 630EXPORT_SYMBOL(clear_inode);
b0683aa6 631
b2b2af8e
DC
632/*
633 * Free the inode passed in, removing it from the lists it is still connected
634 * to. We remove any pages still attached to the inode and wait for any IO that
635 * is still in progress before finally destroying the inode.
636 *
637 * An inode must already be marked I_FREEING so that we avoid the inode being
638 * moved back onto lists if we race with other code that manipulates the lists
639 * (e.g. writeback_single_inode). The caller is responsible for setting this.
640 *
641 * An inode must already be removed from the LRU list before being evicted from
642 * the cache. This should occur atomically with setting the I_FREEING state
643 * flag, so no inodes here should ever be on the LRU when being evicted.
644 */
644da596 645static void evict(struct inode *inode)
b4272d4c
AV
646{
647 const struct super_operations *op = inode->i_sb->s_op;
648
b2b2af8e
DC
649 BUG_ON(!(inode->i_state & I_FREEING));
650 BUG_ON(!list_empty(&inode->i_lru));
651
c7f54084
DC
652 if (!list_empty(&inode->i_io_list))
653 inode_io_list_del(inode);
b12362bd 654
55fa6091
DC
655 inode_sb_list_del(inode);
656
169ebd90
JK
657 /*
658 * Wait for flusher thread to be done with the inode so that filesystem
659 * does not start destroying it while writeback is still running. Since
660 * the inode has I_FREEING set, flusher thread won't start new work on
661 * the inode. We just have to wait for running writeback to finish.
662 */
663 inode_wait_for_writeback(inode);
7994e6f7 664
be7ce416
AV
665 if (op->evict_inode) {
666 op->evict_inode(inode);
b4272d4c 667 } else {
91b0abe3 668 truncate_inode_pages_final(&inode->i_data);
dbd5768f 669 clear_inode(inode);
b4272d4c 670 }
661074e9
AV
671 if (S_ISCHR(inode->i_mode) && inode->i_cdev)
672 cd_forget(inode);
b2b2af8e
DC
673
674 remove_inode_hash(inode);
675
676 spin_lock(&inode->i_lock);
677 wake_up_bit(&inode->i_state, __I_NEW);
678 BUG_ON(inode->i_state != (I_FREEING | I_CLEAR));
679 spin_unlock(&inode->i_lock);
680
681 destroy_inode(inode);
b4272d4c
AV
682}
683
1da177e4
LT
684/*
685 * dispose_list - dispose of the contents of a local list
686 * @head: the head of the list to free
687 *
688 * Dispose-list gets a local list with local inodes in it, so it doesn't
689 * need to worry about list corruption and SMP locks.
690 */
691static void dispose_list(struct list_head *head)
692{
1da177e4
LT
693 while (!list_empty(head)) {
694 struct inode *inode;
695
7ccf19a8
NP
696 inode = list_first_entry(head, struct inode, i_lru);
697 list_del_init(&inode->i_lru);
1da177e4 698
644da596 699 evict(inode);
ac05fbb4 700 cond_resched();
1da177e4 701 }
1da177e4
LT
702}
703
63997e98
AV
704/**
705 * evict_inodes - evict all evictable inodes for a superblock
706 * @sb: superblock to operate on
707 *
708 * Make sure that no inodes with zero refcount are retained. This is
1751e8a6 709 * called by superblock shutdown after having SB_ACTIVE flag removed,
63997e98
AV
710 * so any inode reaching zero refcount during or after that call will
711 * be immediately evicted.
1da177e4 712 */
63997e98 713void evict_inodes(struct super_block *sb)
1da177e4 714{
63997e98
AV
715 struct inode *inode, *next;
716 LIST_HEAD(dispose);
1da177e4 717
ac05fbb4 718again:
74278da9 719 spin_lock(&sb->s_inode_list_lock);
63997e98
AV
720 list_for_each_entry_safe(inode, next, &sb->s_inodes, i_sb_list) {
721 if (atomic_read(&inode->i_count))
aabb8fdb 722 continue;
250df6ed
DC
723
724 spin_lock(&inode->i_lock);
725 if (inode->i_state & (I_NEW | I_FREEING | I_WILL_FREE)) {
726 spin_unlock(&inode->i_lock);
1da177e4 727 continue;
250df6ed 728 }
63997e98
AV
729
730 inode->i_state |= I_FREEING;
02afc410 731 inode_lru_list_del(inode);
250df6ed 732 spin_unlock(&inode->i_lock);
02afc410 733 list_add(&inode->i_lru, &dispose);
ac05fbb4
JB
734
735 /*
736 * We can have a ton of inodes to evict at unmount time given
737 * enough memory, check to see if we need to go to sleep for a
738 * bit so we don't livelock.
739 */
740 if (need_resched()) {
741 spin_unlock(&sb->s_inode_list_lock);
742 cond_resched();
743 dispose_list(&dispose);
744 goto again;
745 }
1da177e4 746 }
74278da9 747 spin_unlock(&sb->s_inode_list_lock);
63997e98
AV
748
749 dispose_list(&dispose);
1da177e4 750}
799ea9e9 751EXPORT_SYMBOL_GPL(evict_inodes);
1da177e4 752
1da177e4 753/**
a0318786
CH
754 * invalidate_inodes - attempt to free all inodes on a superblock
755 * @sb: superblock to operate on
1da177e4 756 *
e127b9bc 757 * Attempts to free all inodes (including dirty inodes) for a given superblock.
1da177e4 758 */
e127b9bc 759void invalidate_inodes(struct super_block *sb)
1da177e4 760{
a0318786
CH
761 struct inode *inode, *next;
762 LIST_HEAD(dispose);
1da177e4 763
04646aeb 764again:
74278da9 765 spin_lock(&sb->s_inode_list_lock);
a0318786 766 list_for_each_entry_safe(inode, next, &sb->s_inodes, i_sb_list) {
250df6ed
DC
767 spin_lock(&inode->i_lock);
768 if (inode->i_state & (I_NEW | I_FREEING | I_WILL_FREE)) {
769 spin_unlock(&inode->i_lock);
aabb8fdb 770 continue;
250df6ed 771 }
99a38919 772 if (atomic_read(&inode->i_count)) {
250df6ed 773 spin_unlock(&inode->i_lock);
1da177e4
LT
774 continue;
775 }
99a38919 776
99a38919 777 inode->i_state |= I_FREEING;
02afc410 778 inode_lru_list_del(inode);
250df6ed 779 spin_unlock(&inode->i_lock);
02afc410 780 list_add(&inode->i_lru, &dispose);
04646aeb
ES
781 if (need_resched()) {
782 spin_unlock(&sb->s_inode_list_lock);
783 cond_resched();
784 dispose_list(&dispose);
785 goto again;
786 }
1da177e4 787 }
74278da9 788 spin_unlock(&sb->s_inode_list_lock);
1da177e4 789
a0318786 790 dispose_list(&dispose);
1da177e4 791}
1da177e4 792
1da177e4 793/*
bc3b14cb 794 * Isolate the inode from the LRU in preparation for freeing it.
1da177e4 795 *
9e38d86f
NP
796 * If the inode has the I_REFERENCED flag set, then it means that it has been
797 * used recently - the flag is set in iput_final(). When we encounter such an
798 * inode, clear the flag and move it to the back of the LRU so it gets another
799 * pass through the LRU before it gets reclaimed. This is necessary because of
800 * the fact we are doing lazy LRU updates to minimise lock contention so the
801 * LRU does not have strict ordering. Hence we don't want to reclaim inodes
802 * with this flag set because they are the inodes that are out of order.
1da177e4 803 */
3f97b163
VD
804static enum lru_status inode_lru_isolate(struct list_head *item,
805 struct list_lru_one *lru, spinlock_t *lru_lock, void *arg)
1da177e4 806{
bc3b14cb
DC
807 struct list_head *freeable = arg;
808 struct inode *inode = container_of(item, struct inode, i_lru);
1da177e4 809
bc3b14cb 810 /*
51b8c1fe
JW
811 * We are inverting the lru lock/inode->i_lock here, so use a
812 * trylock. If we fail to get the lock, just skip it.
bc3b14cb
DC
813 */
814 if (!spin_trylock(&inode->i_lock))
815 return LRU_SKIP;
1da177e4 816
bc3b14cb 817 /*
51b8c1fe
JW
818 * Inodes can get referenced, redirtied, or repopulated while
819 * they're already on the LRU, and this can make them
820 * unreclaimable for a while. Remove them lazily here; iput,
821 * sync, or the last page cache deletion will requeue them.
bc3b14cb
DC
822 */
823 if (atomic_read(&inode->i_count) ||
51b8c1fe
JW
824 (inode->i_state & ~I_REFERENCED) ||
825 !mapping_shrinkable(&inode->i_data)) {
3f97b163 826 list_lru_isolate(lru, &inode->i_lru);
bc3b14cb
DC
827 spin_unlock(&inode->i_lock);
828 this_cpu_dec(nr_unused);
829 return LRU_REMOVED;
830 }
1da177e4 831
51b8c1fe 832 /* Recently referenced inodes get one more pass */
69056ee6 833 if (inode->i_state & I_REFERENCED) {
bc3b14cb
DC
834 inode->i_state &= ~I_REFERENCED;
835 spin_unlock(&inode->i_lock);
836 return LRU_ROTATE;
837 }
1da177e4 838
51b8c1fe
JW
839 /*
840 * On highmem systems, mapping_shrinkable() permits dropping
841 * page cache in order to free up struct inodes: lowmem might
842 * be under pressure before the cache inside the highmem zone.
843 */
7ae12c80 844 if (inode_has_buffers(inode) || !mapping_empty(&inode->i_data)) {
bc3b14cb
DC
845 __iget(inode);
846 spin_unlock(&inode->i_lock);
847 spin_unlock(lru_lock);
848 if (remove_inode_buffers(inode)) {
849 unsigned long reap;
850 reap = invalidate_mapping_pages(&inode->i_data, 0, -1);
851 if (current_is_kswapd())
852 __count_vm_events(KSWAPD_INODESTEAL, reap);
853 else
854 __count_vm_events(PGINODESTEAL, reap);
c7b23b68 855 mm_account_reclaimed_pages(reap);
02afc410 856 }
bc3b14cb
DC
857 iput(inode);
858 spin_lock(lru_lock);
859 return LRU_RETRY;
860 }
02afc410 861
bc3b14cb
DC
862 WARN_ON(inode->i_state & I_NEW);
863 inode->i_state |= I_FREEING;
3f97b163 864 list_lru_isolate_move(lru, &inode->i_lru, freeable);
bc3b14cb 865 spin_unlock(&inode->i_lock);
9e38d86f 866
bc3b14cb
DC
867 this_cpu_dec(nr_unused);
868 return LRU_REMOVED;
869}
7ccf19a8 870
bc3b14cb
DC
871/*
872 * Walk the superblock inode LRU for freeable inodes and attempt to free them.
873 * This is called from the superblock shrinker function with a number of inodes
874 * to trim from the LRU. Inodes to be freed are moved to a temporary list and
875 * then are freed outside inode_lock by dispose_list().
876 */
503c358c 877long prune_icache_sb(struct super_block *sb, struct shrink_control *sc)
bc3b14cb
DC
878{
879 LIST_HEAD(freeable);
880 long freed;
1da177e4 881
503c358c
VD
882 freed = list_lru_shrink_walk(&sb->s_inode_lru, sc,
883 inode_lru_isolate, &freeable);
1da177e4 884 dispose_list(&freeable);
0a234c6d 885 return freed;
1da177e4
LT
886}
887
1da177e4
LT
888static void __wait_on_freeing_inode(struct inode *inode);
889/*
890 * Called with the inode lock held.
1da177e4 891 */
6b3304b5
MK
892static struct inode *find_inode(struct super_block *sb,
893 struct hlist_head *head,
894 int (*test)(struct inode *, void *),
895 void *data)
1da177e4 896{
6b3304b5 897 struct inode *inode = NULL;
1da177e4
LT
898
899repeat:
b67bfe0d 900 hlist_for_each_entry(inode, head, i_hash) {
5a3cd992 901 if (inode->i_sb != sb)
1da177e4 902 continue;
5a3cd992 903 if (!test(inode, data))
1da177e4 904 continue;
5a3cd992 905 spin_lock(&inode->i_lock);
a4ffdde6 906 if (inode->i_state & (I_FREEING|I_WILL_FREE)) {
1da177e4
LT
907 __wait_on_freeing_inode(inode);
908 goto repeat;
909 }
c2b6d621
AV
910 if (unlikely(inode->i_state & I_CREATING)) {
911 spin_unlock(&inode->i_lock);
912 return ERR_PTR(-ESTALE);
913 }
f7899bd5 914 __iget(inode);
250df6ed 915 spin_unlock(&inode->i_lock);
f7899bd5 916 return inode;
1da177e4 917 }
f7899bd5 918 return NULL;
1da177e4
LT
919}
920
921/*
922 * find_inode_fast is the fast path version of find_inode, see the comment at
923 * iget_locked for details.
924 */
6b3304b5
MK
925static struct inode *find_inode_fast(struct super_block *sb,
926 struct hlist_head *head, unsigned long ino)
1da177e4 927{
6b3304b5 928 struct inode *inode = NULL;
1da177e4
LT
929
930repeat:
b67bfe0d 931 hlist_for_each_entry(inode, head, i_hash) {
5a3cd992 932 if (inode->i_ino != ino)
1da177e4 933 continue;
5a3cd992 934 if (inode->i_sb != sb)
1da177e4 935 continue;
5a3cd992 936 spin_lock(&inode->i_lock);
a4ffdde6 937 if (inode->i_state & (I_FREEING|I_WILL_FREE)) {
1da177e4
LT
938 __wait_on_freeing_inode(inode);
939 goto repeat;
940 }
c2b6d621
AV
941 if (unlikely(inode->i_state & I_CREATING)) {
942 spin_unlock(&inode->i_lock);
943 return ERR_PTR(-ESTALE);
944 }
f7899bd5 945 __iget(inode);
250df6ed 946 spin_unlock(&inode->i_lock);
f7899bd5 947 return inode;
1da177e4 948 }
f7899bd5 949 return NULL;
8290c35f
DC
950}
951
f991bd2e
ED
952/*
953 * Each cpu owns a range of LAST_INO_BATCH numbers.
954 * 'shared_last_ino' is dirtied only once out of LAST_INO_BATCH allocations,
955 * to renew the exhausted range.
8290c35f 956 *
f991bd2e
ED
957 * This does not significantly increase overflow rate because every CPU can
958 * consume at most LAST_INO_BATCH-1 unused inode numbers. So there is
959 * NR_CPUS*(LAST_INO_BATCH-1) wastage. At 4096 and 1024, this is ~0.1% of the
960 * 2^32 range, and is a worst-case. Even a 50% wastage would only increase
961 * overflow rate by 2x, which does not seem too significant.
962 *
963 * On a 32bit, non LFS stat() call, glibc will generate an EOVERFLOW
964 * error if st_ino won't fit in target struct field. Use 32bit counter
965 * here to attempt to avoid that.
8290c35f 966 */
f991bd2e
ED
967#define LAST_INO_BATCH 1024
968static DEFINE_PER_CPU(unsigned int, last_ino);
969
85fe4025 970unsigned int get_next_ino(void)
8290c35f 971{
f991bd2e
ED
972 unsigned int *p = &get_cpu_var(last_ino);
973 unsigned int res = *p;
8290c35f 974
f991bd2e
ED
975#ifdef CONFIG_SMP
976 if (unlikely((res & (LAST_INO_BATCH-1)) == 0)) {
977 static atomic_t shared_last_ino;
978 int next = atomic_add_return(LAST_INO_BATCH, &shared_last_ino);
979
980 res = next - LAST_INO_BATCH;
981 }
982#endif
983
2adc376c
CM
984 res++;
985 /* get_next_ino should not provide a 0 inode number */
986 if (unlikely(!res))
987 res++;
988 *p = res;
f991bd2e
ED
989 put_cpu_var(last_ino);
990 return res;
8290c35f 991}
85fe4025 992EXPORT_SYMBOL(get_next_ino);
8290c35f 993
a209dfc7
ED
994/**
995 * new_inode_pseudo - obtain an inode
996 * @sb: superblock
997 *
998 * Allocates a new inode for given superblock.
999 * Inode wont be chained in superblock s_inodes list
1000 * This means :
1001 * - fs can't be unmount
1002 * - quotas, fsnotify, writeback can't work
1003 */
1004struct inode *new_inode_pseudo(struct super_block *sb)
1005{
1006 struct inode *inode = alloc_inode(sb);
1007
1008 if (inode) {
1009 spin_lock(&inode->i_lock);
1010 inode->i_state = 0;
1011 spin_unlock(&inode->i_lock);
a209dfc7
ED
1012 }
1013 return inode;
1014}
1015
1da177e4
LT
1016/**
1017 * new_inode - obtain an inode
1018 * @sb: superblock
1019 *
769848c0 1020 * Allocates a new inode for given superblock. The default gfp_mask
3c1d4378 1021 * for allocations related to inode->i_mapping is GFP_HIGHUSER_MOVABLE.
769848c0
MG
1022 * If HIGHMEM pages are unsuitable or it is known that pages allocated
1023 * for the page cache are not reclaimable or migratable,
1024 * mapping_set_gfp_mask() must be called with suitable flags on the
1025 * newly created inode's mapping
1026 *
1da177e4
LT
1027 */
1028struct inode *new_inode(struct super_block *sb)
1029{
6b3304b5 1030 struct inode *inode;
1da177e4 1031
a209dfc7
ED
1032 inode = new_inode_pseudo(sb);
1033 if (inode)
55fa6091 1034 inode_sb_list_add(inode);
1da177e4
LT
1035 return inode;
1036}
1da177e4
LT
1037EXPORT_SYMBOL(new_inode);
1038
14358e6d 1039#ifdef CONFIG_DEBUG_LOCK_ALLOC
e096d0c7
JB
1040void lockdep_annotate_inode_mutex_key(struct inode *inode)
1041{
a3314a0e 1042 if (S_ISDIR(inode->i_mode)) {
1e89a5e1
PZ
1043 struct file_system_type *type = inode->i_sb->s_type;
1044
9a7aa12f 1045 /* Set new key only if filesystem hasn't already changed it */
9902af79 1046 if (lockdep_match_class(&inode->i_rwsem, &type->i_mutex_key)) {
9a7aa12f
JK
1047 /*
1048 * ensure nobody is actually holding i_mutex
1049 */
9902af79
AV
1050 // mutex_destroy(&inode->i_mutex);
1051 init_rwsem(&inode->i_rwsem);
1052 lockdep_set_class(&inode->i_rwsem,
9a7aa12f
JK
1053 &type->i_mutex_dir_key);
1054 }
1e89a5e1 1055 }
e096d0c7
JB
1056}
1057EXPORT_SYMBOL(lockdep_annotate_inode_mutex_key);
14358e6d 1058#endif
e096d0c7
JB
1059
1060/**
1061 * unlock_new_inode - clear the I_NEW state and wake up any waiters
1062 * @inode: new inode to unlock
1063 *
1064 * Called when the inode is fully initialised to clear the new state of the
1065 * inode and wake up anyone waiting for the inode to finish initialisation.
1066 */
1067void unlock_new_inode(struct inode *inode)
1068{
1069 lockdep_annotate_inode_mutex_key(inode);
250df6ed 1070 spin_lock(&inode->i_lock);
eaff8079 1071 WARN_ON(!(inode->i_state & I_NEW));
c2b6d621 1072 inode->i_state &= ~I_NEW & ~I_CREATING;
310fa7a3 1073 smp_mb();
250df6ed
DC
1074 wake_up_bit(&inode->i_state, __I_NEW);
1075 spin_unlock(&inode->i_lock);
1da177e4 1076}
1da177e4
LT
1077EXPORT_SYMBOL(unlock_new_inode);
1078
c2b6d621
AV
1079void discard_new_inode(struct inode *inode)
1080{
1081 lockdep_annotate_inode_mutex_key(inode);
1082 spin_lock(&inode->i_lock);
1083 WARN_ON(!(inode->i_state & I_NEW));
1084 inode->i_state &= ~I_NEW;
1085 smp_mb();
1086 wake_up_bit(&inode->i_state, __I_NEW);
1087 spin_unlock(&inode->i_lock);
1088 iput(inode);
1089}
1090EXPORT_SYMBOL(discard_new_inode);
1091
f23ce757
JK
1092/**
1093 * lock_two_inodes - lock two inodes (may be regular files but also dirs)
1094 *
1095 * Lock any non-NULL argument. The caller must make sure that if he is passing
1096 * in two directories, one is not ancestor of the other. Zero, one or two
1097 * objects may be locked by this function.
1098 *
1099 * @inode1: first inode to lock
1100 * @inode2: second inode to lock
1101 * @subclass1: inode lock subclass for the first lock obtained
1102 * @subclass2: inode lock subclass for the second lock obtained
1103 */
1104void lock_two_inodes(struct inode *inode1, struct inode *inode2,
1105 unsigned subclass1, unsigned subclass2)
1106{
1107 if (!inode1 || !inode2) {
1108 /*
1109 * Make sure @subclass1 will be used for the acquired lock.
1110 * This is not strictly necessary (no current caller cares) but
1111 * let's keep things consistent.
1112 */
1113 if (!inode1)
1114 swap(inode1, inode2);
1115 goto lock;
1116 }
1117
1118 /*
1119 * If one object is directory and the other is not, we must make sure
1120 * to lock directory first as the other object may be its child.
1121 */
1122 if (S_ISDIR(inode2->i_mode) == S_ISDIR(inode1->i_mode)) {
1123 if (inode1 > inode2)
1124 swap(inode1, inode2);
1125 } else if (!S_ISDIR(inode1->i_mode))
1126 swap(inode1, inode2);
1127lock:
1128 if (inode1)
1129 inode_lock_nested(inode1, subclass1);
1130 if (inode2 && inode2 != inode1)
1131 inode_lock_nested(inode2, subclass2);
1132}
1133
375e289e
BF
1134/**
1135 * lock_two_nondirectories - take two i_mutexes on non-directory objects
4fd699ae 1136 *
2454ad83 1137 * Lock any non-NULL argument. Passed objects must not be directories.
4fd699ae
BF
1138 * Zero, one or two objects may be locked by this function.
1139 *
375e289e
BF
1140 * @inode1: first inode to lock
1141 * @inode2: second inode to lock
1142 */
1143void lock_two_nondirectories(struct inode *inode1, struct inode *inode2)
1144{
33ab231f
CB
1145 if (inode1)
1146 WARN_ON_ONCE(S_ISDIR(inode1->i_mode));
1147 if (inode2)
1148 WARN_ON_ONCE(S_ISDIR(inode2->i_mode));
2454ad83 1149 lock_two_inodes(inode1, inode2, I_MUTEX_NORMAL, I_MUTEX_NONDIR2);
375e289e
BF
1150}
1151EXPORT_SYMBOL(lock_two_nondirectories);
1152
1153/**
1154 * unlock_two_nondirectories - release locks from lock_two_nondirectories()
1155 * @inode1: first inode to unlock
1156 * @inode2: second inode to unlock
1157 */
1158void unlock_two_nondirectories(struct inode *inode1, struct inode *inode2)
1159{
2454ad83
JK
1160 if (inode1) {
1161 WARN_ON_ONCE(S_ISDIR(inode1->i_mode));
5955102c 1162 inode_unlock(inode1);
2454ad83
JK
1163 }
1164 if (inode2 && inode2 != inode1) {
1165 WARN_ON_ONCE(S_ISDIR(inode2->i_mode));
5955102c 1166 inode_unlock(inode2);
2454ad83 1167 }
375e289e
BF
1168}
1169EXPORT_SYMBOL(unlock_two_nondirectories);
1170
80ea09a0
MS
1171/**
1172 * inode_insert5 - obtain an inode from a mounted file system
1173 * @inode: pre-allocated inode to use for insert to cache
1174 * @hashval: hash value (usually inode number) to get
1175 * @test: callback used for comparisons between inodes
1176 * @set: callback used to initialize a new struct inode
1177 * @data: opaque data pointer to pass to @test and @set
1178 *
1179 * Search for the inode specified by @hashval and @data in the inode cache,
1180 * and if present it is return it with an increased reference count. This is
1181 * a variant of iget5_locked() for callers that don't want to fail on memory
1182 * allocation of inode.
1183 *
1184 * If the inode is not in cache, insert the pre-allocated inode to cache and
1185 * return it locked, hashed, and with the I_NEW flag set. The file system gets
1186 * to fill it in before unlocking it via unlock_new_inode().
1187 *
1188 * Note both @test and @set are called with the inode_hash_lock held, so can't
1189 * sleep.
1190 */
1191struct inode *inode_insert5(struct inode *inode, unsigned long hashval,
1192 int (*test)(struct inode *, void *),
1193 int (*set)(struct inode *, void *), void *data)
1194{
1195 struct hlist_head *head = inode_hashtable + hash(inode->i_sb, hashval);
1196 struct inode *old;
1197
1198again:
1199 spin_lock(&inode_hash_lock);
1200 old = find_inode(inode->i_sb, head, test, data);
1201 if (unlikely(old)) {
1202 /*
1203 * Uhhuh, somebody else created the same inode under us.
1204 * Use the old inode instead of the preallocated one.
1205 */
1206 spin_unlock(&inode_hash_lock);
c2b6d621
AV
1207 if (IS_ERR(old))
1208 return NULL;
80ea09a0
MS
1209 wait_on_inode(old);
1210 if (unlikely(inode_unhashed(old))) {
1211 iput(old);
1212 goto again;
1213 }
1214 return old;
1215 }
1216
1217 if (set && unlikely(set(inode, data))) {
1218 inode = NULL;
1219 goto unlock;
1220 }
1221
1222 /*
1223 * Return the locked inode with I_NEW set, the
1224 * caller is responsible for filling in the contents
1225 */
1226 spin_lock(&inode->i_lock);
1227 inode->i_state |= I_NEW;
3f19b2ab 1228 hlist_add_head_rcu(&inode->i_hash, head);
80ea09a0 1229 spin_unlock(&inode->i_lock);
18cc912b
JL
1230
1231 /*
1232 * Add inode to the sb list if it's not already. It has I_NEW at this
1233 * point, so it should be safe to test i_sb_list locklessly.
1234 */
1235 if (list_empty(&inode->i_sb_list))
e950564b 1236 inode_sb_list_add(inode);
80ea09a0
MS
1237unlock:
1238 spin_unlock(&inode_hash_lock);
1239
1240 return inode;
1241}
1242EXPORT_SYMBOL(inode_insert5);
1243
0b2d0724
CH
1244/**
1245 * iget5_locked - obtain an inode from a mounted file system
1246 * @sb: super block of file system
1247 * @hashval: hash value (usually inode number) to get
1248 * @test: callback used for comparisons between inodes
1249 * @set: callback used to initialize a new struct inode
1250 * @data: opaque data pointer to pass to @test and @set
1251 *
1252 * Search for the inode specified by @hashval and @data in the inode cache,
1253 * and if present it is return it with an increased reference count. This is
1254 * a generalized version of iget_locked() for file systems where the inode
1255 * number is not sufficient for unique identification of an inode.
1256 *
1257 * If the inode is not in cache, allocate a new inode and return it locked,
1258 * hashed, and with the I_NEW flag set. The file system gets to fill it in
1259 * before unlocking it via unlock_new_inode().
1da177e4 1260 *
0b2d0724
CH
1261 * Note both @test and @set are called with the inode_hash_lock held, so can't
1262 * sleep.
1da177e4 1263 */
0b2d0724
CH
1264struct inode *iget5_locked(struct super_block *sb, unsigned long hashval,
1265 int (*test)(struct inode *, void *),
1266 int (*set)(struct inode *, void *), void *data)
1da177e4 1267{
80ea09a0 1268 struct inode *inode = ilookup5(sb, hashval, test, data);
0b2d0724 1269
80ea09a0 1270 if (!inode) {
e950564b 1271 struct inode *new = alloc_inode(sb);
0b2d0724 1272
80ea09a0 1273 if (new) {
e950564b 1274 new->i_state = 0;
80ea09a0
MS
1275 inode = inode_insert5(new, hashval, test, set, data);
1276 if (unlikely(inode != new))
e950564b 1277 destroy_inode(new);
2864f301 1278 }
1da177e4
LT
1279 }
1280 return inode;
1da177e4 1281}
0b2d0724 1282EXPORT_SYMBOL(iget5_locked);
1da177e4 1283
0b2d0724
CH
1284/**
1285 * iget_locked - obtain an inode from a mounted file system
1286 * @sb: super block of file system
1287 * @ino: inode number to get
1288 *
1289 * Search for the inode specified by @ino in the inode cache and if present
1290 * return it with an increased reference count. This is for file systems
1291 * where the inode number is sufficient for unique identification of an inode.
1292 *
1293 * If the inode is not in cache, allocate a new inode and return it locked,
1294 * hashed, and with the I_NEW flag set. The file system gets to fill it in
1295 * before unlocking it via unlock_new_inode().
1da177e4 1296 */
0b2d0724 1297struct inode *iget_locked(struct super_block *sb, unsigned long ino)
1da177e4 1298{
0b2d0724 1299 struct hlist_head *head = inode_hashtable + hash(sb, ino);
6b3304b5 1300 struct inode *inode;
2864f301 1301again:
0b2d0724
CH
1302 spin_lock(&inode_hash_lock);
1303 inode = find_inode_fast(sb, head, ino);
1304 spin_unlock(&inode_hash_lock);
1305 if (inode) {
c2b6d621
AV
1306 if (IS_ERR(inode))
1307 return NULL;
0b2d0724 1308 wait_on_inode(inode);
2864f301
AV
1309 if (unlikely(inode_unhashed(inode))) {
1310 iput(inode);
1311 goto again;
1312 }
0b2d0724
CH
1313 return inode;
1314 }
1315
1da177e4
LT
1316 inode = alloc_inode(sb);
1317 if (inode) {
6b3304b5 1318 struct inode *old;
1da177e4 1319
67a23c49 1320 spin_lock(&inode_hash_lock);
1da177e4
LT
1321 /* We released the lock, so.. */
1322 old = find_inode_fast(sb, head, ino);
1323 if (!old) {
1324 inode->i_ino = ino;
250df6ed
DC
1325 spin_lock(&inode->i_lock);
1326 inode->i_state = I_NEW;
3f19b2ab 1327 hlist_add_head_rcu(&inode->i_hash, head);
250df6ed 1328 spin_unlock(&inode->i_lock);
55fa6091 1329 inode_sb_list_add(inode);
67a23c49 1330 spin_unlock(&inode_hash_lock);
1da177e4
LT
1331
1332 /* Return the locked inode with I_NEW set, the
1333 * caller is responsible for filling in the contents
1334 */
1335 return inode;
1336 }
1337
1338 /*
1339 * Uhhuh, somebody else created the same inode under
1340 * us. Use the old inode instead of the one we just
1341 * allocated.
1342 */
67a23c49 1343 spin_unlock(&inode_hash_lock);
1da177e4 1344 destroy_inode(inode);
c2b6d621
AV
1345 if (IS_ERR(old))
1346 return NULL;
1da177e4
LT
1347 inode = old;
1348 wait_on_inode(inode);
2864f301
AV
1349 if (unlikely(inode_unhashed(inode))) {
1350 iput(inode);
1351 goto again;
1352 }
1da177e4
LT
1353 }
1354 return inode;
1355}
0b2d0724 1356EXPORT_SYMBOL(iget_locked);
1da177e4 1357
ad5e195a
CH
1358/*
1359 * search the inode cache for a matching inode number.
1360 * If we find one, then the inode number we are trying to
1361 * allocate is not unique and so we should not use it.
1362 *
1363 * Returns 1 if the inode number is unique, 0 if it is not.
1364 */
1365static int test_inode_iunique(struct super_block *sb, unsigned long ino)
1366{
1367 struct hlist_head *b = inode_hashtable + hash(sb, ino);
ad5e195a
CH
1368 struct inode *inode;
1369
3f19b2ab
DH
1370 hlist_for_each_entry_rcu(inode, b, i_hash) {
1371 if (inode->i_ino == ino && inode->i_sb == sb)
ad5e195a
CH
1372 return 0;
1373 }
ad5e195a
CH
1374 return 1;
1375}
1376
1da177e4
LT
1377/**
1378 * iunique - get a unique inode number
1379 * @sb: superblock
1380 * @max_reserved: highest reserved inode number
1381 *
1382 * Obtain an inode number that is unique on the system for a given
1383 * superblock. This is used by file systems that have no natural
1384 * permanent inode numbering system. An inode number is returned that
1385 * is higher than the reserved limit but unique.
1386 *
1387 * BUGS:
1388 * With a large number of inodes live on the file system this function
1389 * currently becomes quite slow.
1390 */
1391ino_t iunique(struct super_block *sb, ino_t max_reserved)
1392{
866b04fc
JL
1393 /*
1394 * On a 32bit, non LFS stat() call, glibc will generate an EOVERFLOW
1395 * error if st_ino won't fit in target struct field. Use 32bit counter
1396 * here to attempt to avoid that.
1397 */
ad5e195a 1398 static DEFINE_SPINLOCK(iunique_lock);
866b04fc 1399 static unsigned int counter;
1da177e4 1400 ino_t res;
3361c7be 1401
3f19b2ab 1402 rcu_read_lock();
ad5e195a 1403 spin_lock(&iunique_lock);
3361c7be
JL
1404 do {
1405 if (counter <= max_reserved)
1406 counter = max_reserved + 1;
1da177e4 1407 res = counter++;
ad5e195a
CH
1408 } while (!test_inode_iunique(sb, res));
1409 spin_unlock(&iunique_lock);
3f19b2ab 1410 rcu_read_unlock();
1da177e4 1411
3361c7be
JL
1412 return res;
1413}
1da177e4
LT
1414EXPORT_SYMBOL(iunique);
1415
1416struct inode *igrab(struct inode *inode)
1417{
250df6ed
DC
1418 spin_lock(&inode->i_lock);
1419 if (!(inode->i_state & (I_FREEING|I_WILL_FREE))) {
1da177e4 1420 __iget(inode);
250df6ed
DC
1421 spin_unlock(&inode->i_lock);
1422 } else {
1423 spin_unlock(&inode->i_lock);
1da177e4
LT
1424 /*
1425 * Handle the case where s_op->clear_inode is not been
1426 * called yet, and somebody is calling igrab
1427 * while the inode is getting freed.
1428 */
1429 inode = NULL;
250df6ed 1430 }
1da177e4
LT
1431 return inode;
1432}
1da177e4
LT
1433EXPORT_SYMBOL(igrab);
1434
1435/**
0b2d0724 1436 * ilookup5_nowait - search for an inode in the inode cache
1da177e4 1437 * @sb: super block of file system to search
0b2d0724 1438 * @hashval: hash value (usually inode number) to search for
1da177e4
LT
1439 * @test: callback used for comparisons between inodes
1440 * @data: opaque data pointer to pass to @test
1da177e4 1441 *
0b2d0724 1442 * Search for the inode specified by @hashval and @data in the inode cache.
1da177e4
LT
1443 * If the inode is in the cache, the inode is returned with an incremented
1444 * reference count.
1445 *
0b2d0724
CH
1446 * Note: I_NEW is not waited upon so you have to be very careful what you do
1447 * with the returned inode. You probably should be using ilookup5() instead.
1da177e4 1448 *
b6d0ad68 1449 * Note2: @test is called with the inode_hash_lock held, so can't sleep.
1da177e4 1450 */
0b2d0724
CH
1451struct inode *ilookup5_nowait(struct super_block *sb, unsigned long hashval,
1452 int (*test)(struct inode *, void *), void *data)
1da177e4 1453{
0b2d0724 1454 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1da177e4
LT
1455 struct inode *inode;
1456
67a23c49 1457 spin_lock(&inode_hash_lock);
1da177e4 1458 inode = find_inode(sb, head, test, data);
67a23c49 1459 spin_unlock(&inode_hash_lock);
88bd5121 1460
c2b6d621 1461 return IS_ERR(inode) ? NULL : inode;
88bd5121 1462}
88bd5121
AA
1463EXPORT_SYMBOL(ilookup5_nowait);
1464
1465/**
1466 * ilookup5 - search for an inode in the inode cache
1467 * @sb: super block of file system to search
1468 * @hashval: hash value (usually inode number) to search for
1469 * @test: callback used for comparisons between inodes
1470 * @data: opaque data pointer to pass to @test
1471 *
0b2d0724
CH
1472 * Search for the inode specified by @hashval and @data in the inode cache,
1473 * and if the inode is in the cache, return the inode with an incremented
1474 * reference count. Waits on I_NEW before returning the inode.
88bd5121 1475 * returned with an incremented reference count.
1da177e4 1476 *
0b2d0724
CH
1477 * This is a generalized version of ilookup() for file systems where the
1478 * inode number is not sufficient for unique identification of an inode.
1da177e4 1479 *
0b2d0724 1480 * Note: @test is called with the inode_hash_lock held, so can't sleep.
1da177e4
LT
1481 */
1482struct inode *ilookup5(struct super_block *sb, unsigned long hashval,
1483 int (*test)(struct inode *, void *), void *data)
1484{
2864f301
AV
1485 struct inode *inode;
1486again:
1487 inode = ilookup5_nowait(sb, hashval, test, data);
1488 if (inode) {
0b2d0724 1489 wait_on_inode(inode);
2864f301
AV
1490 if (unlikely(inode_unhashed(inode))) {
1491 iput(inode);
1492 goto again;
1493 }
1494 }
0b2d0724 1495 return inode;
1da177e4 1496}
1da177e4
LT
1497EXPORT_SYMBOL(ilookup5);
1498
1499/**
1500 * ilookup - search for an inode in the inode cache
1501 * @sb: super block of file system to search
1502 * @ino: inode number to search for
1503 *
0b2d0724
CH
1504 * Search for the inode @ino in the inode cache, and if the inode is in the
1505 * cache, the inode is returned with an incremented reference count.
1da177e4
LT
1506 */
1507struct inode *ilookup(struct super_block *sb, unsigned long ino)
1508{
1509 struct hlist_head *head = inode_hashtable + hash(sb, ino);
1da177e4 1510 struct inode *inode;
2864f301 1511again:
0b2d0724
CH
1512 spin_lock(&inode_hash_lock);
1513 inode = find_inode_fast(sb, head, ino);
1514 spin_unlock(&inode_hash_lock);
1da177e4 1515
2864f301 1516 if (inode) {
c2b6d621
AV
1517 if (IS_ERR(inode))
1518 return NULL;
0b2d0724 1519 wait_on_inode(inode);
2864f301
AV
1520 if (unlikely(inode_unhashed(inode))) {
1521 iput(inode);
1522 goto again;
1523 }
1524 }
0b2d0724 1525 return inode;
1da177e4 1526}
0b2d0724 1527EXPORT_SYMBOL(ilookup);
1da177e4 1528
fe032c42
TT
1529/**
1530 * find_inode_nowait - find an inode in the inode cache
1531 * @sb: super block of file system to search
1532 * @hashval: hash value (usually inode number) to search for
1533 * @match: callback used for comparisons between inodes
1534 * @data: opaque data pointer to pass to @match
1535 *
1536 * Search for the inode specified by @hashval and @data in the inode
1537 * cache, where the helper function @match will return 0 if the inode
1538 * does not match, 1 if the inode does match, and -1 if the search
1539 * should be stopped. The @match function must be responsible for
1540 * taking the i_lock spin_lock and checking i_state for an inode being
1541 * freed or being initialized, and incrementing the reference count
1542 * before returning 1. It also must not sleep, since it is called with
1543 * the inode_hash_lock spinlock held.
1544 *
1545 * This is a even more generalized version of ilookup5() when the
1546 * function must never block --- find_inode() can block in
1547 * __wait_on_freeing_inode() --- or when the caller can not increment
1548 * the reference count because the resulting iput() might cause an
1549 * inode eviction. The tradeoff is that the @match funtion must be
1550 * very carefully implemented.
1551 */
1552struct inode *find_inode_nowait(struct super_block *sb,
1553 unsigned long hashval,
1554 int (*match)(struct inode *, unsigned long,
1555 void *),
1556 void *data)
1557{
1558 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1559 struct inode *inode, *ret_inode = NULL;
1560 int mval;
1561
1562 spin_lock(&inode_hash_lock);
1563 hlist_for_each_entry(inode, head, i_hash) {
1564 if (inode->i_sb != sb)
1565 continue;
1566 mval = match(inode, hashval, data);
1567 if (mval == 0)
1568 continue;
1569 if (mval == 1)
1570 ret_inode = inode;
1571 goto out;
1572 }
1573out:
1574 spin_unlock(&inode_hash_lock);
1575 return ret_inode;
1576}
1577EXPORT_SYMBOL(find_inode_nowait);
1578
3f19b2ab
DH
1579/**
1580 * find_inode_rcu - find an inode in the inode cache
1581 * @sb: Super block of file system to search
1582 * @hashval: Key to hash
1583 * @test: Function to test match on an inode
1584 * @data: Data for test function
1585 *
1586 * Search for the inode specified by @hashval and @data in the inode cache,
1587 * where the helper function @test will return 0 if the inode does not match
1588 * and 1 if it does. The @test function must be responsible for taking the
1589 * i_lock spin_lock and checking i_state for an inode being freed or being
1590 * initialized.
1591 *
1592 * If successful, this will return the inode for which the @test function
1593 * returned 1 and NULL otherwise.
1594 *
1595 * The @test function is not permitted to take a ref on any inode presented.
1596 * It is also not permitted to sleep.
1597 *
1598 * The caller must hold the RCU read lock.
1599 */
1600struct inode *find_inode_rcu(struct super_block *sb, unsigned long hashval,
1601 int (*test)(struct inode *, void *), void *data)
1602{
1603 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1604 struct inode *inode;
1605
1606 RCU_LOCKDEP_WARN(!rcu_read_lock_held(),
1607 "suspicious find_inode_rcu() usage");
1608
1609 hlist_for_each_entry_rcu(inode, head, i_hash) {
1610 if (inode->i_sb == sb &&
1611 !(READ_ONCE(inode->i_state) & (I_FREEING | I_WILL_FREE)) &&
1612 test(inode, data))
1613 return inode;
1614 }
1615 return NULL;
1616}
1617EXPORT_SYMBOL(find_inode_rcu);
1618
1619/**
961f3c89 1620 * find_inode_by_ino_rcu - Find an inode in the inode cache
3f19b2ab
DH
1621 * @sb: Super block of file system to search
1622 * @ino: The inode number to match
1623 *
1624 * Search for the inode specified by @hashval and @data in the inode cache,
1625 * where the helper function @test will return 0 if the inode does not match
1626 * and 1 if it does. The @test function must be responsible for taking the
1627 * i_lock spin_lock and checking i_state for an inode being freed or being
1628 * initialized.
1629 *
1630 * If successful, this will return the inode for which the @test function
1631 * returned 1 and NULL otherwise.
1632 *
1633 * The @test function is not permitted to take a ref on any inode presented.
1634 * It is also not permitted to sleep.
1635 *
1636 * The caller must hold the RCU read lock.
1637 */
1638struct inode *find_inode_by_ino_rcu(struct super_block *sb,
1639 unsigned long ino)
1640{
1641 struct hlist_head *head = inode_hashtable + hash(sb, ino);
1642 struct inode *inode;
1643
1644 RCU_LOCKDEP_WARN(!rcu_read_lock_held(),
1645 "suspicious find_inode_by_ino_rcu() usage");
1646
1647 hlist_for_each_entry_rcu(inode, head, i_hash) {
1648 if (inode->i_ino == ino &&
1649 inode->i_sb == sb &&
1650 !(READ_ONCE(inode->i_state) & (I_FREEING | I_WILL_FREE)))
1651 return inode;
1652 }
1653 return NULL;
1654}
1655EXPORT_SYMBOL(find_inode_by_ino_rcu);
1656
261bca86
AV
1657int insert_inode_locked(struct inode *inode)
1658{
1659 struct super_block *sb = inode->i_sb;
1660 ino_t ino = inode->i_ino;
1661 struct hlist_head *head = inode_hashtable + hash(sb, ino);
261bca86 1662
261bca86 1663 while (1) {
72a43d63 1664 struct inode *old = NULL;
67a23c49 1665 spin_lock(&inode_hash_lock);
b67bfe0d 1666 hlist_for_each_entry(old, head, i_hash) {
72a43d63
AV
1667 if (old->i_ino != ino)
1668 continue;
1669 if (old->i_sb != sb)
1670 continue;
250df6ed
DC
1671 spin_lock(&old->i_lock);
1672 if (old->i_state & (I_FREEING|I_WILL_FREE)) {
1673 spin_unlock(&old->i_lock);
72a43d63 1674 continue;
250df6ed 1675 }
72a43d63
AV
1676 break;
1677 }
b67bfe0d 1678 if (likely(!old)) {
250df6ed 1679 spin_lock(&inode->i_lock);
c2b6d621 1680 inode->i_state |= I_NEW | I_CREATING;
3f19b2ab 1681 hlist_add_head_rcu(&inode->i_hash, head);
250df6ed 1682 spin_unlock(&inode->i_lock);
67a23c49 1683 spin_unlock(&inode_hash_lock);
261bca86
AV
1684 return 0;
1685 }
c2b6d621
AV
1686 if (unlikely(old->i_state & I_CREATING)) {
1687 spin_unlock(&old->i_lock);
1688 spin_unlock(&inode_hash_lock);
1689 return -EBUSY;
1690 }
261bca86 1691 __iget(old);
250df6ed 1692 spin_unlock(&old->i_lock);
67a23c49 1693 spin_unlock(&inode_hash_lock);
261bca86 1694 wait_on_inode(old);
1d3382cb 1695 if (unlikely(!inode_unhashed(old))) {
261bca86
AV
1696 iput(old);
1697 return -EBUSY;
1698 }
1699 iput(old);
1700 }
1701}
261bca86
AV
1702EXPORT_SYMBOL(insert_inode_locked);
1703
1704int insert_inode_locked4(struct inode *inode, unsigned long hashval,
1705 int (*test)(struct inode *, void *), void *data)
1706{
c2b6d621
AV
1707 struct inode *old;
1708
1709 inode->i_state |= I_CREATING;
1710 old = inode_insert5(inode, hashval, test, NULL, data);
261bca86 1711
80ea09a0 1712 if (old != inode) {
261bca86 1713 iput(old);
80ea09a0 1714 return -EBUSY;
261bca86 1715 }
80ea09a0 1716 return 0;
261bca86 1717}
261bca86
AV
1718EXPORT_SYMBOL(insert_inode_locked4);
1719
1da177e4 1720
45321ac5
AV
1721int generic_delete_inode(struct inode *inode)
1722{
1723 return 1;
1724}
1725EXPORT_SYMBOL(generic_delete_inode);
1726
45321ac5
AV
1727/*
1728 * Called when we're dropping the last reference
1729 * to an inode.
22fe4042 1730 *
45321ac5
AV
1731 * Call the FS "drop_inode()" function, defaulting to
1732 * the legacy UNIX filesystem behaviour. If it tells
1733 * us to evict inode, do so. Otherwise, retain inode
1734 * in cache if fs is alive, sync and evict if fs is
1735 * shutting down.
22fe4042 1736 */
45321ac5 1737static void iput_final(struct inode *inode)
1da177e4
LT
1738{
1739 struct super_block *sb = inode->i_sb;
45321ac5 1740 const struct super_operations *op = inode->i_sb->s_op;
3f19b2ab 1741 unsigned long state;
45321ac5
AV
1742 int drop;
1743
250df6ed
DC
1744 WARN_ON(inode->i_state & I_NEW);
1745
e7f59097 1746 if (op->drop_inode)
45321ac5
AV
1747 drop = op->drop_inode(inode);
1748 else
1749 drop = generic_drop_inode(inode);
1da177e4 1750
88149082
HL
1751 if (!drop &&
1752 !(inode->i_state & I_DONTCACHE) &&
1753 (sb->s_flags & SB_ACTIVE)) {
51b8c1fe 1754 __inode_add_lru(inode, true);
b2b2af8e 1755 spin_unlock(&inode->i_lock);
b2b2af8e
DC
1756 return;
1757 }
1758
3f19b2ab 1759 state = inode->i_state;
45321ac5 1760 if (!drop) {
3f19b2ab 1761 WRITE_ONCE(inode->i_state, state | I_WILL_FREE);
250df6ed 1762 spin_unlock(&inode->i_lock);
3f19b2ab 1763
1da177e4 1764 write_inode_now(inode, 1);
3f19b2ab 1765
250df6ed 1766 spin_lock(&inode->i_lock);
3f19b2ab
DH
1767 state = inode->i_state;
1768 WARN_ON(state & I_NEW);
1769 state &= ~I_WILL_FREE;
1da177e4 1770 }
7ccf19a8 1771
3f19b2ab 1772 WRITE_ONCE(inode->i_state, state | I_FREEING);
c4ae0c65
ED
1773 if (!list_empty(&inode->i_lru))
1774 inode_lru_list_del(inode);
b2b2af8e 1775 spin_unlock(&inode->i_lock);
b2b2af8e 1776
644da596 1777 evict(inode);
1da177e4
LT
1778}
1779
1da177e4 1780/**
6b3304b5 1781 * iput - put an inode
1da177e4
LT
1782 * @inode: inode to put
1783 *
1784 * Puts an inode, dropping its usage count. If the inode use count hits
1785 * zero, the inode is then freed and may also be destroyed.
1786 *
1787 * Consequently, iput() can sleep.
1788 */
1789void iput(struct inode *inode)
1790{
0ae45f63
TT
1791 if (!inode)
1792 return;
1793 BUG_ON(inode->i_state & I_CLEAR);
1794retry:
1795 if (atomic_dec_and_lock(&inode->i_count, &inode->i_lock)) {
1796 if (inode->i_nlink && (inode->i_state & I_DIRTY_TIME)) {
1797 atomic_inc(&inode->i_count);
0ae45f63
TT
1798 spin_unlock(&inode->i_lock);
1799 trace_writeback_lazytime_iput(inode);
1800 mark_inode_dirty_sync(inode);
1801 goto retry;
1802 }
1803 iput_final(inode);
1da177e4
LT
1804 }
1805}
1da177e4
LT
1806EXPORT_SYMBOL(iput);
1807
30460e1e 1808#ifdef CONFIG_BLOCK
1da177e4
LT
1809/**
1810 * bmap - find a block number in a file
30460e1e
CM
1811 * @inode: inode owning the block number being requested
1812 * @block: pointer containing the block to find
1da177e4 1813 *
2b8e8b55 1814 * Replaces the value in ``*block`` with the block number on the device holding
30460e1e
CM
1815 * corresponding to the requested block number in the file.
1816 * That is, asked for block 4 of inode 1 the function will replace the
2b8e8b55 1817 * 4 in ``*block``, with disk block relative to the disk start that holds that
30460e1e
CM
1818 * block of the file.
1819 *
1820 * Returns -EINVAL in case of error, 0 otherwise. If mapping falls into a
2b8e8b55 1821 * hole, returns 0 and ``*block`` is also set to 0.
1da177e4 1822 */
30460e1e 1823int bmap(struct inode *inode, sector_t *block)
1da177e4 1824{
30460e1e
CM
1825 if (!inode->i_mapping->a_ops->bmap)
1826 return -EINVAL;
1827
1828 *block = inode->i_mapping->a_ops->bmap(inode->i_mapping, *block);
1829 return 0;
1da177e4 1830}
1da177e4 1831EXPORT_SYMBOL(bmap);
30460e1e 1832#endif
1da177e4 1833
11ff6f05
MG
1834/*
1835 * With relative atime, only update atime if the previous atime is
d98ffa1a
SK
1836 * earlier than or equal to either the ctime or mtime,
1837 * or if at least a day has passed since the last atime update.
11ff6f05 1838 */
c6718543 1839static int relatime_need_update(struct vfsmount *mnt, struct inode *inode,
6f22b664 1840 struct timespec64 now)
11ff6f05 1841{
16a94965 1842 struct timespec64 atime, mtime, ctime;
11ff6f05 1843
c6718543 1844 if (!(mnt->mnt_flags & MNT_RELATIME))
11ff6f05
MG
1845 return 1;
1846 /*
d98ffa1a 1847 * Is mtime younger than or equal to atime? If yes, update atime:
11ff6f05 1848 */
16a94965
JL
1849 atime = inode_get_atime(inode);
1850 mtime = inode_get_mtime(inode);
1851 if (timespec64_compare(&mtime, &atime) >= 0)
11ff6f05
MG
1852 return 1;
1853 /*
d98ffa1a 1854 * Is ctime younger than or equal to atime? If yes, update atime:
11ff6f05 1855 */
2276e5ba 1856 ctime = inode_get_ctime(inode);
16a94965 1857 if (timespec64_compare(&ctime, &atime) >= 0)
11ff6f05
MG
1858 return 1;
1859
1860 /*
1861 * Is the previous atime value older than a day? If yes,
1862 * update atime:
1863 */
16a94965 1864 if ((long)(now.tv_sec - atime.tv_sec) >= 24*60*60)
11ff6f05
MG
1865 return 1;
1866 /*
1867 * Good, we can skip the atime update:
1868 */
1869 return 0;
1870}
1871
541d4c79
JL
1872/**
1873 * inode_update_timestamps - update the timestamps on the inode
1874 * @inode: inode to be updated
1875 * @flags: S_* flags that needed to be updated
1876 *
1877 * The update_time function is called when an inode's timestamps need to be
1878 * updated for a read or write operation. This function handles updating the
1879 * actual timestamps. It's up to the caller to ensure that the inode is marked
1880 * dirty appropriately.
1881 *
1882 * In the case where any of S_MTIME, S_CTIME, or S_VERSION need to be updated,
1883 * attempt to update all three of them. S_ATIME updates can be handled
1884 * independently of the rest.
1885 *
1886 * Returns a set of S_* flags indicating which values changed.
1887 */
1888int inode_update_timestamps(struct inode *inode, int flags)
c3b2da31 1889{
541d4c79
JL
1890 int updated = 0;
1891 struct timespec64 now;
e20b14db 1892
541d4c79
JL
1893 if (flags & (S_MTIME|S_CTIME|S_VERSION)) {
1894 struct timespec64 ctime = inode_get_ctime(inode);
16a94965 1895 struct timespec64 mtime = inode_get_mtime(inode);
e20b14db 1896
541d4c79
JL
1897 now = inode_set_ctime_current(inode);
1898 if (!timespec64_equal(&now, &ctime))
1899 updated |= S_CTIME;
16a94965
JL
1900 if (!timespec64_equal(&now, &mtime)) {
1901 inode_set_mtime_to_ts(inode, now);
541d4c79
JL
1902 updated |= S_MTIME;
1903 }
1904 if (IS_I_VERSION(inode) && inode_maybe_inc_iversion(inode, updated))
1905 updated |= S_VERSION;
1906 } else {
1907 now = current_time(inode);
e20b14db
EB
1908 }
1909
541d4c79 1910 if (flags & S_ATIME) {
16a94965
JL
1911 struct timespec64 atime = inode_get_atime(inode);
1912
1913 if (!timespec64_equal(&now, &atime)) {
1914 inode_set_atime_to_ts(inode, now);
541d4c79
JL
1915 updated |= S_ATIME;
1916 }
1917 }
1918 return updated;
1919}
1920EXPORT_SYMBOL(inode_update_timestamps);
e20b14db 1921
541d4c79
JL
1922/**
1923 * generic_update_time - update the timestamps on the inode
1924 * @inode: inode to be updated
1925 * @flags: S_* flags that needed to be updated
1926 *
1927 * The update_time function is called when an inode's timestamps need to be
1928 * updated for a read or write operation. In the case where any of S_MTIME, S_CTIME,
1929 * or S_VERSION need to be updated we attempt to update all three of them. S_ATIME
1930 * updates can be handled done independently of the rest.
1931 *
1932 * Returns a S_* mask indicating which fields were updated.
1933 */
1934int generic_update_time(struct inode *inode, int flags)
1935{
1936 int updated = inode_update_timestamps(inode, flags);
1937 int dirty_flags = 0;
e20b14db 1938
541d4c79
JL
1939 if (updated & (S_ATIME|S_MTIME|S_CTIME))
1940 dirty_flags = inode->i_sb->s_flags & SB_LAZYTIME ? I_DIRTY_TIME : I_DIRTY_SYNC;
1941 if (updated & S_VERSION)
1942 dirty_flags |= I_DIRTY_SYNC;
e20b14db 1943 __mark_inode_dirty(inode, dirty_flags);
541d4c79 1944 return updated;
c3b2da31 1945}
0ae45f63
TT
1946EXPORT_SYMBOL(generic_update_time);
1947
1948/*
1949 * This does the actual work of updating an inodes time or version. Must have
1950 * had called mnt_want_write() before calling this.
1951 */
913e9928 1952int inode_update_time(struct inode *inode, int flags)
0ae45f63 1953{
23b424d9 1954 if (inode->i_op->update_time)
913e9928 1955 return inode->i_op->update_time(inode, flags);
541d4c79
JL
1956 generic_update_time(inode, flags);
1957 return 0;
0ae45f63 1958}
e60feb44 1959EXPORT_SYMBOL(inode_update_time);
c3b2da31 1960
1da177e4 1961/**
961f3c89 1962 * atime_needs_update - update the access time
185553b2 1963 * @path: the &struct path to update
30fdc8ee 1964 * @inode: inode to update
1da177e4
LT
1965 *
1966 * Update the accessed time on an inode and mark it for writeback.
1967 * This function automatically handles read only file systems and media,
1968 * as well as the "noatime" flag and inode specific "noatime" markers.
1969 */
c6718543 1970bool atime_needs_update(const struct path *path, struct inode *inode)
1da177e4 1971{
68ac1234 1972 struct vfsmount *mnt = path->mnt;
16a94965 1973 struct timespec64 now, atime;
1da177e4 1974
cdb70f3f 1975 if (inode->i_flags & S_NOATIME)
8fa9dd24 1976 return false;
0bd23d09
EB
1977
1978 /* Atime updates will likely cause i_uid and i_gid to be written
1979 * back improprely if their true value is unknown to the vfs.
1980 */
4609e1f1 1981 if (HAS_UNMAPPED_ID(mnt_idmap(mnt), inode))
0bd23d09
EB
1982 return false;
1983
37756ced 1984 if (IS_NOATIME(inode))
8fa9dd24 1985 return false;
1751e8a6 1986 if ((inode->i_sb->s_flags & SB_NODIRATIME) && S_ISDIR(inode->i_mode))
8fa9dd24 1987 return false;
47ae32d6 1988
cdb70f3f 1989 if (mnt->mnt_flags & MNT_NOATIME)
8fa9dd24 1990 return false;
cdb70f3f 1991 if ((mnt->mnt_flags & MNT_NODIRATIME) && S_ISDIR(inode->i_mode))
8fa9dd24 1992 return false;
1da177e4 1993
c2050a45 1994 now = current_time(inode);
11ff6f05 1995
6f22b664 1996 if (!relatime_need_update(mnt, inode, now))
8fa9dd24 1997 return false;
11ff6f05 1998
16a94965
JL
1999 atime = inode_get_atime(inode);
2000 if (timespec64_equal(&atime, &now))
8fa9dd24
N
2001 return false;
2002
2003 return true;
2004}
2005
2006void touch_atime(const struct path *path)
2007{
2008 struct vfsmount *mnt = path->mnt;
2009 struct inode *inode = d_inode(path->dentry);
8fa9dd24 2010
c6718543 2011 if (!atime_needs_update(path, inode))
b12536c2
AK
2012 return;
2013
5d37e9e6 2014 if (!sb_start_write_trylock(inode->i_sb))
b12536c2 2015 return;
47ae32d6 2016
3e15dcf7 2017 if (mnt_get_write_access(mnt) != 0)
5d37e9e6 2018 goto skip_update;
c3b2da31
JB
2019 /*
2020 * File systems can error out when updating inodes if they need to
2021 * allocate new space to modify an inode (such is the case for
2022 * Btrfs), but since we touch atime while walking down the path we
2023 * really don't care if we failed to update the atime of the file,
2024 * so just ignore the return value.
2bc55652
AB
2025 * We may also fail on filesystems that have the ability to make parts
2026 * of the fs read only, e.g. subvolumes in Btrfs.
c3b2da31 2027 */
913e9928 2028 inode_update_time(inode, S_ATIME);
3e15dcf7 2029 mnt_put_write_access(mnt);
5d37e9e6
JK
2030skip_update:
2031 sb_end_write(inode->i_sb);
1da177e4 2032}
869243a0 2033EXPORT_SYMBOL(touch_atime);
1da177e4 2034
dbfae0cd
JK
2035/*
2036 * Return mask of changes for notify_change() that need to be done as a
2037 * response to write or truncate. Return 0 if nothing has to be changed.
2038 * Negative value on error (change should be denied).
2039 */
9452e93e 2040int dentry_needs_remove_privs(struct mnt_idmap *idmap,
ed5a7047 2041 struct dentry *dentry)
dbfae0cd 2042{
dbfae0cd
JK
2043 struct inode *inode = d_inode(dentry);
2044 int mask = 0;
2045 int ret;
2046
2047 if (IS_NOSEC(inode))
2048 return 0;
2049
9452e93e 2050 mask = setattr_should_drop_suidgid(idmap, inode);
dbfae0cd
JK
2051 ret = security_inode_need_killpriv(dentry);
2052 if (ret < 0)
2053 return ret;
2054 if (ret)
2055 mask |= ATTR_KILL_PRIV;
2056 return mask;
2057}
dbfae0cd 2058
abf08576 2059static int __remove_privs(struct mnt_idmap *idmap,
643fe55a 2060 struct dentry *dentry, int kill)
3ed37648
CW
2061{
2062 struct iattr newattrs;
2063
2064 newattrs.ia_valid = ATTR_FORCE | kill;
27ac0ffe
BF
2065 /*
2066 * Note we call this on write, so notify_change will not
2067 * encounter any conflicting delegations:
2068 */
abf08576 2069 return notify_change(idmap, dentry, &newattrs, NULL);
3ed37648
CW
2070}
2071
faf99b56 2072static int __file_remove_privs(struct file *file, unsigned int flags)
3ed37648 2073{
c1892c37
MS
2074 struct dentry *dentry = file_dentry(file);
2075 struct inode *inode = file_inode(file);
41191cf6 2076 int error = 0;
dbfae0cd 2077 int kill;
3ed37648 2078
f69e749a 2079 if (IS_NOSEC(inode) || !S_ISREG(inode->i_mode))
3ed37648
CW
2080 return 0;
2081
9452e93e 2082 kill = dentry_needs_remove_privs(file_mnt_idmap(file), dentry);
41191cf6 2083 if (kill < 0)
dbfae0cd 2084 return kill;
faf99b56 2085
41191cf6
SR
2086 if (kill) {
2087 if (flags & IOCB_NOWAIT)
2088 return -EAGAIN;
2089
abf08576 2090 error = __remove_privs(file_mnt_idmap(file), dentry, kill);
41191cf6 2091 }
faf99b56 2092
2426f391
JK
2093 if (!error)
2094 inode_has_no_xattr(inode);
3ed37648
CW
2095 return error;
2096}
faf99b56
SR
2097
2098/**
2099 * file_remove_privs - remove special file privileges (suid, capabilities)
2100 * @file: file to remove privileges from
2101 *
2102 * When file is modified by a write or truncation ensure that special
2103 * file privileges are removed.
2104 *
2105 * Return: 0 on success, negative errno on failure.
2106 */
2107int file_remove_privs(struct file *file)
2108{
2109 return __file_remove_privs(file, 0);
2110}
5fa8e0a1 2111EXPORT_SYMBOL(file_remove_privs);
3ed37648 2112
913e9928 2113static int inode_needs_update_time(struct inode *inode)
1da177e4 2114{
c3b2da31 2115 int sync_it = 0;
647aa768 2116 struct timespec64 now = current_time(inode);
16a94965 2117 struct timespec64 ts;
1da177e4 2118
ce06e0b2 2119 /* First try to exhaust all avenues to not sync */
1da177e4 2120 if (IS_NOCMTIME(inode))
c3b2da31 2121 return 0;
20ddee2c 2122
16a94965
JL
2123 ts = inode_get_mtime(inode);
2124 if (!timespec64_equal(&ts, &now))
ce06e0b2 2125 sync_it = S_MTIME;
1da177e4 2126
16a94965
JL
2127 ts = inode_get_ctime(inode);
2128 if (!timespec64_equal(&ts, &now))
ce06e0b2 2129 sync_it |= S_CTIME;
870f4817 2130
e38cf302 2131 if (IS_I_VERSION(inode) && inode_iversion_need_inc(inode))
ce06e0b2 2132 sync_it |= S_VERSION;
7a224228 2133
6a2aa5d8
SR
2134 return sync_it;
2135}
2136
913e9928 2137static int __file_update_time(struct file *file, int sync_mode)
6a2aa5d8
SR
2138{
2139 int ret = 0;
2140 struct inode *inode = file_inode(file);
ce06e0b2 2141
6a2aa5d8 2142 /* try to update time settings */
3e15dcf7 2143 if (!mnt_get_write_access_file(file)) {
913e9928 2144 ret = inode_update_time(inode, sync_mode);
3e15dcf7 2145 mnt_put_write_access_file(file);
6a2aa5d8 2146 }
c3b2da31
JB
2147
2148 return ret;
1da177e4 2149}
6a2aa5d8
SR
2150
2151/**
2152 * file_update_time - update mtime and ctime time
2153 * @file: file accessed
2154 *
2155 * Update the mtime and ctime members of an inode and mark the inode for
2156 * writeback. Note that this function is meant exclusively for usage in
2157 * the file write path of filesystems, and filesystems may choose to
2158 * explicitly ignore updates via this function with the _NOCMTIME inode
2159 * flag, e.g. for network filesystem where these imestamps are handled
2160 * by the server. This can return an error for file systems who need to
2161 * allocate space in order to update an inode.
2162 *
2163 * Return: 0 on success, negative errno on failure.
2164 */
2165int file_update_time(struct file *file)
2166{
2167 int ret;
2168 struct inode *inode = file_inode(file);
6a2aa5d8 2169
913e9928 2170 ret = inode_needs_update_time(inode);
6a2aa5d8
SR
2171 if (ret <= 0)
2172 return ret;
2173
913e9928 2174 return __file_update_time(file, ret);
6a2aa5d8 2175}
870f4817 2176EXPORT_SYMBOL(file_update_time);
1da177e4 2177
faf99b56 2178/**
66fa3ced 2179 * file_modified_flags - handle mandated vfs changes when modifying a file
faf99b56 2180 * @file: file that was modified
66fa3ced 2181 * @flags: kiocb flags
faf99b56
SR
2182 *
2183 * When file has been modified ensure that special
2184 * file privileges are removed and time settings are updated.
2185 *
66fa3ced
SR
2186 * If IOCB_NOWAIT is set, special file privileges will not be removed and
2187 * time settings will not be updated. It will return -EAGAIN.
2188 *
faf99b56
SR
2189 * Context: Caller must hold the file's inode lock.
2190 *
2191 * Return: 0 on success, negative errno on failure.
2192 */
66fa3ced 2193static int file_modified_flags(struct file *file, int flags)
e38f7f53 2194{
faf99b56 2195 int ret;
6a2aa5d8 2196 struct inode *inode = file_inode(file);
e38f7f53
AG
2197
2198 /*
2199 * Clear the security bits if the process is not being run by root.
2200 * This keeps people from modifying setuid and setgid binaries.
2201 */
66fa3ced 2202 ret = __file_remove_privs(file, flags);
faf99b56
SR
2203 if (ret)
2204 return ret;
e38f7f53
AG
2205
2206 if (unlikely(file->f_mode & FMODE_NOCMTIME))
2207 return 0;
2208
913e9928 2209 ret = inode_needs_update_time(inode);
6a2aa5d8
SR
2210 if (ret <= 0)
2211 return ret;
66fa3ced
SR
2212 if (flags & IOCB_NOWAIT)
2213 return -EAGAIN;
6a2aa5d8 2214
913e9928 2215 return __file_update_time(file, ret);
e38f7f53 2216}
66fa3ced
SR
2217
2218/**
2219 * file_modified - handle mandated vfs changes when modifying a file
2220 * @file: file that was modified
2221 *
2222 * When file has been modified ensure that special
2223 * file privileges are removed and time settings are updated.
2224 *
2225 * Context: Caller must hold the file's inode lock.
2226 *
2227 * Return: 0 on success, negative errno on failure.
2228 */
2229int file_modified(struct file *file)
2230{
2231 return file_modified_flags(file, 0);
2232}
e38f7f53
AG
2233EXPORT_SYMBOL(file_modified);
2234
66fa3ced
SR
2235/**
2236 * kiocb_modified - handle mandated vfs changes when modifying a file
2237 * @iocb: iocb that was modified
2238 *
2239 * When file has been modified ensure that special
2240 * file privileges are removed and time settings are updated.
2241 *
2242 * Context: Caller must hold the file's inode lock.
2243 *
2244 * Return: 0 on success, negative errno on failure.
2245 */
2246int kiocb_modified(struct kiocb *iocb)
2247{
2248 return file_modified_flags(iocb->ki_filp, iocb->ki_flags);
2249}
2250EXPORT_SYMBOL_GPL(kiocb_modified);
2251
1da177e4
LT
2252int inode_needs_sync(struct inode *inode)
2253{
2254 if (IS_SYNC(inode))
2255 return 1;
2256 if (S_ISDIR(inode->i_mode) && IS_DIRSYNC(inode))
2257 return 1;
2258 return 0;
2259}
1da177e4
LT
2260EXPORT_SYMBOL(inode_needs_sync);
2261
1da177e4 2262/*
168a9fd6
MS
2263 * If we try to find an inode in the inode hash while it is being
2264 * deleted, we have to wait until the filesystem completes its
2265 * deletion before reporting that it isn't found. This function waits
2266 * until the deletion _might_ have completed. Callers are responsible
2267 * to recheck inode state.
2268 *
eaff8079 2269 * It doesn't matter if I_NEW is not set initially, a call to
250df6ed
DC
2270 * wake_up_bit(&inode->i_state, __I_NEW) after removing from the hash list
2271 * will DTRT.
1da177e4
LT
2272 */
2273static void __wait_on_freeing_inode(struct inode *inode)
2274{
2275 wait_queue_head_t *wq;
eaff8079
CH
2276 DEFINE_WAIT_BIT(wait, &inode->i_state, __I_NEW);
2277 wq = bit_waitqueue(&inode->i_state, __I_NEW);
21417136 2278 prepare_to_wait(wq, &wait.wq_entry, TASK_UNINTERRUPTIBLE);
250df6ed 2279 spin_unlock(&inode->i_lock);
67a23c49 2280 spin_unlock(&inode_hash_lock);
1da177e4 2281 schedule();
21417136 2282 finish_wait(wq, &wait.wq_entry);
67a23c49 2283 spin_lock(&inode_hash_lock);
1da177e4
LT
2284}
2285
1da177e4
LT
2286static __initdata unsigned long ihash_entries;
2287static int __init set_ihash_entries(char *str)
2288{
2289 if (!str)
2290 return 0;
2291 ihash_entries = simple_strtoul(str, &str, 0);
2292 return 1;
2293}
2294__setup("ihash_entries=", set_ihash_entries);
2295
2296/*
2297 * Initialize the waitqueues and inode hash table.
2298 */
2299void __init inode_init_early(void)
2300{
1da177e4
LT
2301 /* If hashes are distributed across NUMA nodes, defer
2302 * hash allocation until vmalloc space is available.
2303 */
2304 if (hashdist)
2305 return;
2306
2307 inode_hashtable =
2308 alloc_large_system_hash("Inode-cache",
2309 sizeof(struct hlist_head),
2310 ihash_entries,
2311 14,
3d375d78 2312 HASH_EARLY | HASH_ZERO,
1da177e4
LT
2313 &i_hash_shift,
2314 &i_hash_mask,
31fe62b9 2315 0,
1da177e4 2316 0);
1da177e4
LT
2317}
2318
74bf17cf 2319void __init inode_init(void)
1da177e4 2320{
1da177e4 2321 /* inode slab cache */
b0196009
PJ
2322 inode_cachep = kmem_cache_create("inode_cache",
2323 sizeof(struct inode),
2324 0,
2325 (SLAB_RECLAIM_ACCOUNT|SLAB_PANIC|
5d097056 2326 SLAB_MEM_SPREAD|SLAB_ACCOUNT),
20c2df83 2327 init_once);
1da177e4
LT
2328
2329 /* Hash may have been set up in inode_init_early */
2330 if (!hashdist)
2331 return;
2332
2333 inode_hashtable =
2334 alloc_large_system_hash("Inode-cache",
2335 sizeof(struct hlist_head),
2336 ihash_entries,
2337 14,
3d375d78 2338 HASH_ZERO,
1da177e4
LT
2339 &i_hash_shift,
2340 &i_hash_mask,
31fe62b9 2341 0,
1da177e4 2342 0);
1da177e4
LT
2343}
2344
2345void init_special_inode(struct inode *inode, umode_t mode, dev_t rdev)
2346{
2347 inode->i_mode = mode;
2348 if (S_ISCHR(mode)) {
2349 inode->i_fop = &def_chr_fops;
2350 inode->i_rdev = rdev;
2351 } else if (S_ISBLK(mode)) {
bda2795a
CH
2352 if (IS_ENABLED(CONFIG_BLOCK))
2353 inode->i_fop = &def_blk_fops;
1da177e4
LT
2354 inode->i_rdev = rdev;
2355 } else if (S_ISFIFO(mode))
599a0ac1 2356 inode->i_fop = &pipefifo_fops;
1da177e4 2357 else if (S_ISSOCK(mode))
bd9b51e7 2358 ; /* leave it no_open_fops */
1da177e4 2359 else
af0d9ae8
MK
2360 printk(KERN_DEBUG "init_special_inode: bogus i_mode (%o) for"
2361 " inode %s:%lu\n", mode, inode->i_sb->s_id,
2362 inode->i_ino);
1da177e4
LT
2363}
2364EXPORT_SYMBOL(init_special_inode);
a1bd120d
DM
2365
2366/**
eaae668d 2367 * inode_init_owner - Init uid,gid,mode for new inode according to posix standards
f2d40141 2368 * @idmap: idmap of the mount the inode was created from
a1bd120d
DM
2369 * @inode: New inode
2370 * @dir: Directory inode
2371 * @mode: mode of the new inode
21cb47be 2372 *
f2d40141
CB
2373 * If the inode has been created through an idmapped mount the idmap of
2374 * the vfsmount must be passed through @idmap. This function will then take
2375 * care to map the inode according to @idmap before checking permissions
21cb47be 2376 * and initializing i_uid and i_gid. On non-idmapped mounts or if permission
f2d40141 2377 * checking is to be performed on the raw inode simply pass @nop_mnt_idmap.
a1bd120d 2378 */
f2d40141 2379void inode_init_owner(struct mnt_idmap *idmap, struct inode *inode,
21cb47be 2380 const struct inode *dir, umode_t mode)
a1bd120d 2381{
c14329d3 2382 inode_fsuid_set(inode, idmap);
a1bd120d
DM
2383 if (dir && dir->i_mode & S_ISGID) {
2384 inode->i_gid = dir->i_gid;
0fa3ecd8
LT
2385
2386 /* Directories are special, and always inherit S_ISGID */
a1bd120d
DM
2387 if (S_ISDIR(mode))
2388 mode |= S_ISGID;
2389 } else
c14329d3 2390 inode_fsgid_set(inode, idmap);
a1bd120d
DM
2391 inode->i_mode = mode;
2392}
2393EXPORT_SYMBOL(inode_init_owner);
e795b717 2394
2e149670
SH
2395/**
2396 * inode_owner_or_capable - check current task permissions to inode
01beba79 2397 * @idmap: idmap of the mount the inode was found from
2e149670
SH
2398 * @inode: inode being checked
2399 *
23adbe12
AL
2400 * Return true if current either has CAP_FOWNER in a namespace with the
2401 * inode owner uid mapped, or owns the file.
21cb47be 2402 *
01beba79
CB
2403 * If the inode has been found through an idmapped mount the idmap of
2404 * the vfsmount must be passed through @idmap. This function will then take
2405 * care to map the inode according to @idmap before checking permissions.
21cb47be 2406 * On non-idmapped mounts or if permission checking is to be performed on the
01beba79 2407 * raw inode simply passs @nop_mnt_idmap.
e795b717 2408 */
01beba79 2409bool inode_owner_or_capable(struct mnt_idmap *idmap,
21cb47be 2410 const struct inode *inode)
e795b717 2411{
a2bd096f 2412 vfsuid_t vfsuid;
23adbe12
AL
2413 struct user_namespace *ns;
2414
e67fe633 2415 vfsuid = i_uid_into_vfsuid(idmap, inode);
a2bd096f 2416 if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
e795b717 2417 return true;
23adbe12
AL
2418
2419 ns = current_user_ns();
a2bd096f 2420 if (vfsuid_has_mapping(ns, vfsuid) && ns_capable(ns, CAP_FOWNER))
e795b717
SH
2421 return true;
2422 return false;
2423}
2e149670 2424EXPORT_SYMBOL(inode_owner_or_capable);
1d59d61f
TM
2425
2426/*
2427 * Direct i/o helper functions
2428 */
2429static void __inode_dio_wait(struct inode *inode)
2430{
2431 wait_queue_head_t *wq = bit_waitqueue(&inode->i_state, __I_DIO_WAKEUP);
2432 DEFINE_WAIT_BIT(q, &inode->i_state, __I_DIO_WAKEUP);
2433
2434 do {
21417136 2435 prepare_to_wait(wq, &q.wq_entry, TASK_UNINTERRUPTIBLE);
1d59d61f
TM
2436 if (atomic_read(&inode->i_dio_count))
2437 schedule();
2438 } while (atomic_read(&inode->i_dio_count));
21417136 2439 finish_wait(wq, &q.wq_entry);
1d59d61f
TM
2440}
2441
2442/**
2443 * inode_dio_wait - wait for outstanding DIO requests to finish
2444 * @inode: inode to wait for
2445 *
2446 * Waits for all pending direct I/O requests to finish so that we can
2447 * proceed with a truncate or equivalent operation.
2448 *
2449 * Must be called under a lock that serializes taking new references
2450 * to i_dio_count, usually by inode->i_mutex.
2451 */
2452void inode_dio_wait(struct inode *inode)
2453{
2454 if (atomic_read(&inode->i_dio_count))
2455 __inode_dio_wait(inode);
2456}
2457EXPORT_SYMBOL(inode_dio_wait);
2458
5f16f322
TT
2459/*
2460 * inode_set_flags - atomically set some inode flags
2461 *
2462 * Note: the caller should be holding i_mutex, or else be sure that
2463 * they have exclusive access to the inode structure (i.e., while the
2464 * inode is being instantiated). The reason for the cmpxchg() loop
2465 * --- which wouldn't be necessary if all code paths which modify
2466 * i_flags actually followed this rule, is that there is at least one
5fa8e0a1
JK
2467 * code path which doesn't today so we use cmpxchg() out of an abundance
2468 * of caution.
5f16f322
TT
2469 *
2470 * In the long run, i_mutex is overkill, and we should probably look
2471 * at using the i_lock spinlock to protect i_flags, and then make sure
2472 * it is so documented in include/linux/fs.h and that all code follows
2473 * the locking convention!!
2474 */
2475void inode_set_flags(struct inode *inode, unsigned int flags,
2476 unsigned int mask)
2477{
5f16f322 2478 WARN_ON_ONCE(flags & ~mask);
a905737f 2479 set_mask_bits(&inode->i_flags, mask, flags);
5f16f322
TT
2480}
2481EXPORT_SYMBOL(inode_set_flags);
21fc61c7
AV
2482
2483void inode_nohighmem(struct inode *inode)
2484{
2485 mapping_set_gfp_mask(inode->i_mapping, GFP_USER);
2486}
2487EXPORT_SYMBOL(inode_nohighmem);
3cd88666 2488
50e17c00
DD
2489/**
2490 * timestamp_truncate - Truncate timespec to a granularity
2491 * @t: Timespec
2492 * @inode: inode being updated
2493 *
2494 * Truncate a timespec to the granularity supported by the fs
2495 * containing the inode. Always rounds down. gran must
2496 * not be 0 nor greater than a second (NSEC_PER_SEC, or 10^9 ns).
2497 */
2498struct timespec64 timestamp_truncate(struct timespec64 t, struct inode *inode)
2499{
2500 struct super_block *sb = inode->i_sb;
2501 unsigned int gran = sb->s_time_gran;
2502
2503 t.tv_sec = clamp(t.tv_sec, sb->s_time_min, sb->s_time_max);
2504 if (unlikely(t.tv_sec == sb->s_time_max || t.tv_sec == sb->s_time_min))
2505 t.tv_nsec = 0;
2506
2507 /* Avoid division in the common cases 1 ns and 1 s. */
2508 if (gran == 1)
2509 ; /* nothing */
2510 else if (gran == NSEC_PER_SEC)
2511 t.tv_nsec = 0;
2512 else if (gran > 1 && gran < NSEC_PER_SEC)
2513 t.tv_nsec -= t.tv_nsec % gran;
2514 else
2515 WARN(1, "invalid file time granularity: %u", gran);
2516 return t;
2517}
2518EXPORT_SYMBOL(timestamp_truncate);
2519
3cd88666
DD
2520/**
2521 * current_time - Return FS time
2522 * @inode: inode.
2523 *
2524 * Return the current time truncated to the time granularity supported by
2525 * the fs.
2526 *
2527 * Note that inode and inode->sb cannot be NULL.
2528 * Otherwise, the function warns and returns time without truncation.
2529 */
95582b00 2530struct timespec64 current_time(struct inode *inode)
3cd88666 2531{
d651d160
AB
2532 struct timespec64 now;
2533
2534 ktime_get_coarse_real_ts64(&now);
50e17c00 2535 return timestamp_truncate(now, inode);
3cd88666
DD
2536}
2537EXPORT_SYMBOL(current_time);
3cd88666 2538
9b6304c1
JL
2539/**
2540 * inode_set_ctime_current - set the ctime to current_time
2541 * @inode: inode
2542 *
2543 * Set the inode->i_ctime to the current value for the inode. Returns
2544 * the current value that was assigned to i_ctime.
2545 */
2546struct timespec64 inode_set_ctime_current(struct inode *inode)
2547{
647aa768 2548 struct timespec64 now = current_time(inode);
9b6304c1 2549
647aa768 2550 inode_set_ctime(inode, now.tv_sec, now.tv_nsec);
9b6304c1 2551 return now;
3cd88666 2552}
9b6304c1 2553EXPORT_SYMBOL(inode_set_ctime_current);
2b3416ce 2554
11c2a870
CB
2555/**
2556 * in_group_or_capable - check whether caller is CAP_FSETID privileged
9452e93e 2557 * @idmap: idmap of the mount @inode was found from
11c2a870
CB
2558 * @inode: inode to check
2559 * @vfsgid: the new/current vfsgid of @inode
2560 *
2561 * Check wether @vfsgid is in the caller's group list or if the caller is
2562 * privileged with CAP_FSETID over @inode. This can be used to determine
2563 * whether the setgid bit can be kept or must be dropped.
2564 *
2565 * Return: true if the caller is sufficiently privileged, false if not.
2566 */
9452e93e 2567bool in_group_or_capable(struct mnt_idmap *idmap,
11c2a870
CB
2568 const struct inode *inode, vfsgid_t vfsgid)
2569{
2570 if (vfsgid_in_group_p(vfsgid))
2571 return true;
9452e93e 2572 if (capable_wrt_inode_uidgid(idmap, inode, CAP_FSETID))
11c2a870
CB
2573 return true;
2574 return false;
2575}
2576
2b3416ce
YX
2577/**
2578 * mode_strip_sgid - handle the sgid bit for non-directories
9452e93e 2579 * @idmap: idmap of the mount the inode was created from
2b3416ce
YX
2580 * @dir: parent directory inode
2581 * @mode: mode of the file to be created in @dir
2582 *
2583 * If the @mode of the new file has both the S_ISGID and S_IXGRP bit
2584 * raised and @dir has the S_ISGID bit raised ensure that the caller is
2585 * either in the group of the parent directory or they have CAP_FSETID
2586 * in their user namespace and are privileged over the parent directory.
2587 * In all other cases, strip the S_ISGID bit from @mode.
2588 *
2589 * Return: the new mode to use for the file
2590 */
9452e93e 2591umode_t mode_strip_sgid(struct mnt_idmap *idmap,
2b3416ce
YX
2592 const struct inode *dir, umode_t mode)
2593{
2594 if ((mode & (S_ISGID | S_IXGRP)) != (S_ISGID | S_IXGRP))
2595 return mode;
2596 if (S_ISDIR(mode) || !dir || !(dir->i_mode & S_ISGID))
2597 return mode;
e67fe633 2598 if (in_group_or_capable(idmap, dir, i_gid_into_vfsgid(idmap, dir)))
2b3416ce 2599 return mode;
2b3416ce
YX
2600 return mode & ~S_ISGID;
2601}
2602EXPORT_SYMBOL(mode_strip_sgid);