]> git.ipfire.org Git - thirdparty/kernel/stable.git/blame - fs/inode.c
Merge tag 'kvm-x86-docs-6.7' of https://github.com/kvm-x86/linux into HEAD
[thirdparty/kernel/stable.git] / fs / inode.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4 2/*
1da177e4 3 * (C) 1997 Linus Torvalds
4b4563dc 4 * (C) 1999 Andrea Arcangeli <andrea@suse.de> (dynamic inode allocation)
1da177e4 5 */
e59cc473 6#include <linux/export.h>
1da177e4 7#include <linux/fs.h>
5970e15d 8#include <linux/filelock.h>
1da177e4 9#include <linux/mm.h>
1da177e4 10#include <linux/backing-dev.h>
1da177e4
LT
11#include <linux/hash.h>
12#include <linux/swap.h>
13#include <linux/security.h>
1da177e4 14#include <linux/cdev.h>
57c8a661 15#include <linux/memblock.h>
3be25f49 16#include <linux/fsnotify.h>
fc33a7bb 17#include <linux/mount.h>
f19d4a8f 18#include <linux/posix_acl.h>
4b4563dc 19#include <linux/buffer_head.h> /* for inode_has_buffers */
7ada4db8 20#include <linux/ratelimit.h>
bc3b14cb 21#include <linux/list_lru.h>
ae5e165d 22#include <linux/iversion.h>
0ae45f63 23#include <trace/events/writeback.h>
a66979ab 24#include "internal.h"
1da177e4 25
250df6ed 26/*
4b4563dc 27 * Inode locking rules:
250df6ed
DC
28 *
29 * inode->i_lock protects:
10e14073 30 * inode->i_state, inode->i_hash, __iget(), inode->i_io_list
bc3b14cb 31 * Inode LRU list locks protect:
98b745c6 32 * inode->i_sb->s_inode_lru, inode->i_lru
74278da9
DC
33 * inode->i_sb->s_inode_list_lock protects:
34 * inode->i_sb->s_inodes, inode->i_sb_list
f758eeab 35 * bdi->wb.list_lock protects:
c7f54084 36 * bdi->wb.b_{dirty,io,more_io,dirty_time}, inode->i_io_list
67a23c49
DC
37 * inode_hash_lock protects:
38 * inode_hashtable, inode->i_hash
250df6ed
DC
39 *
40 * Lock ordering:
55fa6091 41 *
74278da9 42 * inode->i_sb->s_inode_list_lock
55fa6091 43 * inode->i_lock
bc3b14cb 44 * Inode LRU list locks
a66979ab 45 *
f758eeab 46 * bdi->wb.list_lock
a66979ab 47 * inode->i_lock
67a23c49
DC
48 *
49 * inode_hash_lock
74278da9 50 * inode->i_sb->s_inode_list_lock
67a23c49
DC
51 * inode->i_lock
52 *
53 * iunique_lock
54 * inode_hash_lock
250df6ed
DC
55 */
56
fa3536cc
ED
57static unsigned int i_hash_mask __read_mostly;
58static unsigned int i_hash_shift __read_mostly;
67a23c49
DC
59static struct hlist_head *inode_hashtable __read_mostly;
60static __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_hash_lock);
1da177e4 61
7dcda1c9
JA
62/*
63 * Empty aops. Can be used for the cases where the user does not
64 * define any of the address_space operations.
65 */
66const struct address_space_operations empty_aops = {
67};
68EXPORT_SYMBOL(empty_aops);
69
3942c07c
GC
70static DEFINE_PER_CPU(unsigned long, nr_inodes);
71static DEFINE_PER_CPU(unsigned long, nr_unused);
cffbc8aa 72
6b3304b5 73static struct kmem_cache *inode_cachep __read_mostly;
1da177e4 74
3942c07c 75static long get_nr_inodes(void)
cffbc8aa 76{
3e880fb5 77 int i;
3942c07c 78 long sum = 0;
3e880fb5
NP
79 for_each_possible_cpu(i)
80 sum += per_cpu(nr_inodes, i);
81 return sum < 0 ? 0 : sum;
cffbc8aa
DC
82}
83
3942c07c 84static inline long get_nr_inodes_unused(void)
cffbc8aa 85{
fcb94f72 86 int i;
3942c07c 87 long sum = 0;
fcb94f72
DC
88 for_each_possible_cpu(i)
89 sum += per_cpu(nr_unused, i);
90 return sum < 0 ? 0 : sum;
cffbc8aa
DC
91}
92
3942c07c 93long get_nr_dirty_inodes(void)
cffbc8aa 94{
3e880fb5 95 /* not actually dirty inodes, but a wild approximation */
3942c07c 96 long nr_dirty = get_nr_inodes() - get_nr_inodes_unused();
cffbc8aa 97 return nr_dirty > 0 ? nr_dirty : 0;
cffbc8aa
DC
98}
99
100/*
101 * Handle nr_inode sysctl
102 */
103#ifdef CONFIG_SYSCTL
1d67fe58
LC
104/*
105 * Statistics gathering..
106 */
107static struct inodes_stat_t inodes_stat;
108
109static int proc_nr_inodes(struct ctl_table *table, int write, void *buffer,
110 size_t *lenp, loff_t *ppos)
cffbc8aa
DC
111{
112 inodes_stat.nr_inodes = get_nr_inodes();
fcb94f72 113 inodes_stat.nr_unused = get_nr_inodes_unused();
3942c07c 114 return proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
cffbc8aa 115}
1d67fe58
LC
116
117static struct ctl_table inodes_sysctls[] = {
118 {
119 .procname = "inode-nr",
120 .data = &inodes_stat,
121 .maxlen = 2*sizeof(long),
122 .mode = 0444,
123 .proc_handler = proc_nr_inodes,
124 },
125 {
126 .procname = "inode-state",
127 .data = &inodes_stat,
128 .maxlen = 7*sizeof(long),
129 .mode = 0444,
130 .proc_handler = proc_nr_inodes,
131 },
132 { }
133};
134
135static int __init init_fs_inode_sysctls(void)
136{
137 register_sysctl_init("fs", inodes_sysctls);
138 return 0;
139}
140early_initcall(init_fs_inode_sysctls);
cffbc8aa
DC
141#endif
142
bd9b51e7
AV
143static int no_open(struct inode *inode, struct file *file)
144{
145 return -ENXIO;
146}
147
2cb1599f 148/**
6e7c2b4d 149 * inode_init_always - perform inode structure initialisation
0bc02f3f
RD
150 * @sb: superblock inode belongs to
151 * @inode: inode to initialise
2cb1599f
DC
152 *
153 * These are initializations that need to be done on every inode
154 * allocation as the fields are not initialised by slab allocation.
155 */
54e34621 156int inode_init_always(struct super_block *sb, struct inode *inode)
1da177e4 157{
6e1d5dcc 158 static const struct inode_operations empty_iops;
bd9b51e7 159 static const struct file_operations no_open_fops = {.open = no_open};
6b3304b5 160 struct address_space *const mapping = &inode->i_data;
2cb1599f
DC
161
162 inode->i_sb = sb;
163 inode->i_blkbits = sb->s_blocksize_bits;
164 inode->i_flags = 0;
8019ad13 165 atomic64_set(&inode->i_sequence, 0);
2cb1599f
DC
166 atomic_set(&inode->i_count, 1);
167 inode->i_op = &empty_iops;
bd9b51e7 168 inode->i_fop = &no_open_fops;
edbb35cc 169 inode->i_ino = 0;
a78ef704 170 inode->__i_nlink = 1;
3ddcd056 171 inode->i_opflags = 0;
d0a5b995
AG
172 if (sb->s_xattr)
173 inode->i_opflags |= IOP_XATTR;
92361636
EB
174 i_uid_write(inode, 0);
175 i_gid_write(inode, 0);
2cb1599f
DC
176 atomic_set(&inode->i_writecount, 0);
177 inode->i_size = 0;
c75b1d94 178 inode->i_write_hint = WRITE_LIFE_NOT_SET;
2cb1599f
DC
179 inode->i_blocks = 0;
180 inode->i_bytes = 0;
181 inode->i_generation = 0;
2cb1599f 182 inode->i_pipe = NULL;
2cb1599f 183 inode->i_cdev = NULL;
61ba64fc 184 inode->i_link = NULL;
84e710da 185 inode->i_dir_seq = 0;
2cb1599f
DC
186 inode->i_rdev = 0;
187 inode->dirtied_when = 0;
6146f0d5 188
3d65ae46
TE
189#ifdef CONFIG_CGROUP_WRITEBACK
190 inode->i_wb_frn_winner = 0;
191 inode->i_wb_frn_avg_time = 0;
192 inode->i_wb_frn_history = 0;
193#endif
194
2cb1599f
DC
195 spin_lock_init(&inode->i_lock);
196 lockdep_set_class(&inode->i_lock, &sb->s_type->i_lock_key);
197
9902af79
AV
198 init_rwsem(&inode->i_rwsem);
199 lockdep_set_class(&inode->i_rwsem, &sb->s_type->i_mutex_key);
2cb1599f 200
bd5fe6c5 201 atomic_set(&inode->i_dio_count, 0);
2cb1599f
DC
202
203 mapping->a_ops = &empty_aops;
204 mapping->host = inode;
205 mapping->flags = 0;
829bc787 206 mapping->wb_err = 0;
4bb5f5d9 207 atomic_set(&mapping->i_mmap_writable, 0);
09d91cda
SL
208#ifdef CONFIG_READ_ONLY_THP_FOR_FS
209 atomic_set(&mapping->nr_thps, 0);
210#endif
3c1d4378 211 mapping_set_gfp_mask(mapping, GFP_HIGHUSER_MOVABLE);
252aa6f5 212 mapping->private_data = NULL;
2cb1599f 213 mapping->writeback_index = 0;
23ca067b
SAS
214 init_rwsem(&mapping->invalidate_lock);
215 lockdep_set_class_and_name(&mapping->invalidate_lock,
216 &sb->s_type->invalidate_lock_key,
217 "mapping.invalidate_lock");
2cb1599f
DC
218 inode->i_private = NULL;
219 inode->i_mapping = mapping;
b3d9b7a3 220 INIT_HLIST_HEAD(&inode->i_dentry); /* buggered by rcu freeing */
f19d4a8f
AV
221#ifdef CONFIG_FS_POSIX_ACL
222 inode->i_acl = inode->i_default_acl = ACL_NOT_CACHED;
223#endif
2cb1599f 224
3be25f49
EP
225#ifdef CONFIG_FSNOTIFY
226 inode->i_fsnotify_mask = 0;
227#endif
4a075e39 228 inode->i_flctx = NULL;
2e488f13
DM
229
230 if (unlikely(security_inode_alloc(inode)))
231 return -ENOMEM;
3e880fb5 232 this_cpu_inc(nr_inodes);
cffbc8aa 233
54e34621 234 return 0;
1da177e4 235}
2cb1599f
DC
236EXPORT_SYMBOL(inode_init_always);
237
fdb0da89
AV
238void free_inode_nonrcu(struct inode *inode)
239{
240 kmem_cache_free(inode_cachep, inode);
241}
242EXPORT_SYMBOL(free_inode_nonrcu);
243
244static void i_callback(struct rcu_head *head)
245{
246 struct inode *inode = container_of(head, struct inode, i_rcu);
247 if (inode->free_inode)
248 inode->free_inode(inode);
249 else
250 free_inode_nonrcu(inode);
251}
252
2cb1599f
DC
253static struct inode *alloc_inode(struct super_block *sb)
254{
fdb0da89 255 const struct super_operations *ops = sb->s_op;
2cb1599f
DC
256 struct inode *inode;
257
fdb0da89
AV
258 if (ops->alloc_inode)
259 inode = ops->alloc_inode(sb);
2cb1599f 260 else
8b9f3ac5 261 inode = alloc_inode_sb(sb, inode_cachep, GFP_KERNEL);
2cb1599f 262
54e34621
CH
263 if (!inode)
264 return NULL;
265
266 if (unlikely(inode_init_always(sb, inode))) {
fdb0da89
AV
267 if (ops->destroy_inode) {
268 ops->destroy_inode(inode);
269 if (!ops->free_inode)
270 return NULL;
271 }
272 inode->free_inode = ops->free_inode;
273 i_callback(&inode->i_rcu);
54e34621
CH
274 return NULL;
275 }
276
277 return inode;
2cb1599f 278}
1da177e4 279
2e00c97e 280void __destroy_inode(struct inode *inode)
1da177e4 281{
b7542f8c 282 BUG_ON(inode_has_buffers(inode));
52ebea74 283 inode_detach_wb(inode);
1da177e4 284 security_inode_free(inode);
3be25f49 285 fsnotify_inode_delete(inode);
f27a0fe0 286 locks_free_lock_context(inode);
7ada4db8
MS
287 if (!inode->i_nlink) {
288 WARN_ON(atomic_long_read(&inode->i_sb->s_remove_count) == 0);
289 atomic_long_dec(&inode->i_sb->s_remove_count);
290 }
291
f19d4a8f 292#ifdef CONFIG_FS_POSIX_ACL
b8a7a3a6 293 if (inode->i_acl && !is_uncached_acl(inode->i_acl))
f19d4a8f 294 posix_acl_release(inode->i_acl);
b8a7a3a6 295 if (inode->i_default_acl && !is_uncached_acl(inode->i_default_acl))
f19d4a8f
AV
296 posix_acl_release(inode->i_default_acl);
297#endif
3e880fb5 298 this_cpu_dec(nr_inodes);
2e00c97e
CH
299}
300EXPORT_SYMBOL(__destroy_inode);
301
56b0dacf 302static void destroy_inode(struct inode *inode)
2e00c97e 303{
fdb0da89
AV
304 const struct super_operations *ops = inode->i_sb->s_op;
305
7ccf19a8 306 BUG_ON(!list_empty(&inode->i_lru));
2e00c97e 307 __destroy_inode(inode);
fdb0da89
AV
308 if (ops->destroy_inode) {
309 ops->destroy_inode(inode);
310 if (!ops->free_inode)
311 return;
312 }
313 inode->free_inode = ops->free_inode;
314 call_rcu(&inode->i_rcu, i_callback);
1da177e4 315}
1da177e4 316
7ada4db8
MS
317/**
318 * drop_nlink - directly drop an inode's link count
319 * @inode: inode
320 *
321 * This is a low-level filesystem helper to replace any
322 * direct filesystem manipulation of i_nlink. In cases
323 * where we are attempting to track writes to the
324 * filesystem, a decrement to zero means an imminent
325 * write when the file is truncated and actually unlinked
326 * on the filesystem.
327 */
328void drop_nlink(struct inode *inode)
329{
330 WARN_ON(inode->i_nlink == 0);
331 inode->__i_nlink--;
332 if (!inode->i_nlink)
333 atomic_long_inc(&inode->i_sb->s_remove_count);
334}
335EXPORT_SYMBOL(drop_nlink);
336
337/**
338 * clear_nlink - directly zero an inode's link count
339 * @inode: inode
340 *
341 * This is a low-level filesystem helper to replace any
342 * direct filesystem manipulation of i_nlink. See
343 * drop_nlink() for why we care about i_nlink hitting zero.
344 */
345void clear_nlink(struct inode *inode)
346{
347 if (inode->i_nlink) {
348 inode->__i_nlink = 0;
349 atomic_long_inc(&inode->i_sb->s_remove_count);
350 }
351}
352EXPORT_SYMBOL(clear_nlink);
353
354/**
355 * set_nlink - directly set an inode's link count
356 * @inode: inode
357 * @nlink: new nlink (should be non-zero)
358 *
359 * This is a low-level filesystem helper to replace any
360 * direct filesystem manipulation of i_nlink.
361 */
362void set_nlink(struct inode *inode, unsigned int nlink)
363{
364 if (!nlink) {
7ada4db8
MS
365 clear_nlink(inode);
366 } else {
367 /* Yes, some filesystems do change nlink from zero to one */
368 if (inode->i_nlink == 0)
369 atomic_long_dec(&inode->i_sb->s_remove_count);
370
371 inode->__i_nlink = nlink;
372 }
373}
374EXPORT_SYMBOL(set_nlink);
375
376/**
377 * inc_nlink - directly increment an inode's link count
378 * @inode: inode
379 *
380 * This is a low-level filesystem helper to replace any
381 * direct filesystem manipulation of i_nlink. Currently,
382 * it is only here for parity with dec_nlink().
383 */
384void inc_nlink(struct inode *inode)
385{
f4e0c30c
AV
386 if (unlikely(inode->i_nlink == 0)) {
387 WARN_ON(!(inode->i_state & I_LINKABLE));
7ada4db8 388 atomic_long_dec(&inode->i_sb->s_remove_count);
f4e0c30c 389 }
7ada4db8
MS
390
391 inode->__i_nlink++;
392}
393EXPORT_SYMBOL(inc_nlink);
394
ae23395d 395static void __address_space_init_once(struct address_space *mapping)
2aa15890 396{
7b785645 397 xa_init_flags(&mapping->i_pages, XA_FLAGS_LOCK_IRQ | XA_FLAGS_ACCOUNT);
c8c06efa 398 init_rwsem(&mapping->i_mmap_rwsem);
2aa15890
MS
399 INIT_LIST_HEAD(&mapping->private_list);
400 spin_lock_init(&mapping->private_lock);
f808c13f 401 mapping->i_mmap = RB_ROOT_CACHED;
2aa15890 402}
ae23395d
DC
403
404void address_space_init_once(struct address_space *mapping)
405{
406 memset(mapping, 0, sizeof(*mapping));
407 __address_space_init_once(mapping);
408}
2aa15890
MS
409EXPORT_SYMBOL(address_space_init_once);
410
1da177e4
LT
411/*
412 * These are initializations that only need to be done
413 * once, because the fields are idempotent across use
414 * of the inode, so let the slab aware of that.
415 */
416void inode_init_once(struct inode *inode)
417{
418 memset(inode, 0, sizeof(*inode));
419 INIT_HLIST_NODE(&inode->i_hash);
1da177e4 420 INIT_LIST_HEAD(&inode->i_devices);
c7f54084 421 INIT_LIST_HEAD(&inode->i_io_list);
6c60d2b5 422 INIT_LIST_HEAD(&inode->i_wb_list);
7ccf19a8 423 INIT_LIST_HEAD(&inode->i_lru);
18cc912b 424 INIT_LIST_HEAD(&inode->i_sb_list);
ae23395d 425 __address_space_init_once(&inode->i_data);
1da177e4
LT
426 i_size_ordered_init(inode);
427}
1da177e4
LT
428EXPORT_SYMBOL(inode_init_once);
429
51cc5068 430static void init_once(void *foo)
1da177e4 431{
6b3304b5 432 struct inode *inode = (struct inode *) foo;
1da177e4 433
a35afb83 434 inode_init_once(inode);
1da177e4
LT
435}
436
437/*
250df6ed 438 * inode->i_lock must be held
1da177e4 439 */
6b3304b5 440void __iget(struct inode *inode)
1da177e4 441{
9e38d86f
NP
442 atomic_inc(&inode->i_count);
443}
2e147f1e 444
7de9c6ee
AV
445/*
446 * get additional reference to inode; caller must already hold one.
447 */
448void ihold(struct inode *inode)
449{
450 WARN_ON(atomic_inc_return(&inode->i_count) < 2);
451}
452EXPORT_SYMBOL(ihold);
453
51b8c1fe 454static void __inode_add_lru(struct inode *inode, bool rotate)
9e38d86f 455{
51b8c1fe
JW
456 if (inode->i_state & (I_DIRTY_ALL | I_SYNC | I_FREEING | I_WILL_FREE))
457 return;
458 if (atomic_read(&inode->i_count))
459 return;
460 if (!(inode->i_sb->s_flags & SB_ACTIVE))
461 return;
462 if (!mapping_shrinkable(&inode->i_data))
463 return;
464
bc3b14cb 465 if (list_lru_add(&inode->i_sb->s_inode_lru, &inode->i_lru))
fcb94f72 466 this_cpu_inc(nr_unused);
51b8c1fe 467 else if (rotate)
563f4001 468 inode->i_state |= I_REFERENCED;
9e38d86f 469}
2e147f1e 470
4eff96dd
JK
471/*
472 * Add inode to LRU if needed (inode is unused and clean).
473 *
474 * Needs inode->i_lock held.
475 */
476void inode_add_lru(struct inode *inode)
477{
51b8c1fe 478 __inode_add_lru(inode, false);
4eff96dd
JK
479}
480
9e38d86f
NP
481static void inode_lru_list_del(struct inode *inode)
482{
bc3b14cb 483 if (list_lru_del(&inode->i_sb->s_inode_lru, &inode->i_lru))
fcb94f72 484 this_cpu_dec(nr_unused);
1da177e4
LT
485}
486
646ec461
CH
487/**
488 * inode_sb_list_add - add inode to the superblock list of inodes
489 * @inode: inode to add
490 */
491void inode_sb_list_add(struct inode *inode)
492{
74278da9 493 spin_lock(&inode->i_sb->s_inode_list_lock);
55fa6091 494 list_add(&inode->i_sb_list, &inode->i_sb->s_inodes);
74278da9 495 spin_unlock(&inode->i_sb->s_inode_list_lock);
646ec461
CH
496}
497EXPORT_SYMBOL_GPL(inode_sb_list_add);
498
55fa6091 499static inline void inode_sb_list_del(struct inode *inode)
646ec461 500{
a209dfc7 501 if (!list_empty(&inode->i_sb_list)) {
74278da9 502 spin_lock(&inode->i_sb->s_inode_list_lock);
a209dfc7 503 list_del_init(&inode->i_sb_list);
74278da9 504 spin_unlock(&inode->i_sb->s_inode_list_lock);
a209dfc7 505 }
646ec461
CH
506}
507
4c51acbc
DC
508static unsigned long hash(struct super_block *sb, unsigned long hashval)
509{
510 unsigned long tmp;
511
512 tmp = (hashval * (unsigned long)sb) ^ (GOLDEN_RATIO_PRIME + hashval) /
513 L1_CACHE_BYTES;
4b4563dc
CH
514 tmp = tmp ^ ((tmp ^ GOLDEN_RATIO_PRIME) >> i_hash_shift);
515 return tmp & i_hash_mask;
4c51acbc
DC
516}
517
518/**
519 * __insert_inode_hash - hash an inode
520 * @inode: unhashed inode
521 * @hashval: unsigned long value used to locate this object in the
522 * inode_hashtable.
523 *
524 * Add an inode to the inode hash for this superblock.
525 */
526void __insert_inode_hash(struct inode *inode, unsigned long hashval)
527{
646ec461
CH
528 struct hlist_head *b = inode_hashtable + hash(inode->i_sb, hashval);
529
67a23c49 530 spin_lock(&inode_hash_lock);
250df6ed 531 spin_lock(&inode->i_lock);
3f19b2ab 532 hlist_add_head_rcu(&inode->i_hash, b);
250df6ed 533 spin_unlock(&inode->i_lock);
67a23c49 534 spin_unlock(&inode_hash_lock);
4c51acbc
DC
535}
536EXPORT_SYMBOL(__insert_inode_hash);
537
4c51acbc 538/**
f2ee7abf 539 * __remove_inode_hash - remove an inode from the hash
4c51acbc
DC
540 * @inode: inode to unhash
541 *
542 * Remove an inode from the superblock.
543 */
f2ee7abf 544void __remove_inode_hash(struct inode *inode)
4c51acbc 545{
67a23c49 546 spin_lock(&inode_hash_lock);
250df6ed 547 spin_lock(&inode->i_lock);
3f19b2ab 548 hlist_del_init_rcu(&inode->i_hash);
250df6ed 549 spin_unlock(&inode->i_lock);
67a23c49 550 spin_unlock(&inode_hash_lock);
4c51acbc 551}
f2ee7abf 552EXPORT_SYMBOL(__remove_inode_hash);
4c51acbc 553
3e9d80a8
MWO
554void dump_mapping(const struct address_space *mapping)
555{
556 struct inode *host;
557 const struct address_space_operations *a_ops;
558 struct hlist_node *dentry_first;
559 struct dentry *dentry_ptr;
560 struct dentry dentry;
561 unsigned long ino;
562
563 /*
564 * If mapping is an invalid pointer, we don't want to crash
565 * accessing it, so probe everything depending on it carefully.
566 */
567 if (get_kernel_nofault(host, &mapping->host) ||
568 get_kernel_nofault(a_ops, &mapping->a_ops)) {
569 pr_warn("invalid mapping:%px\n", mapping);
570 return;
571 }
572
573 if (!host) {
574 pr_warn("aops:%ps\n", a_ops);
575 return;
576 }
577
578 if (get_kernel_nofault(dentry_first, &host->i_dentry.first) ||
579 get_kernel_nofault(ino, &host->i_ino)) {
580 pr_warn("aops:%ps invalid inode:%px\n", a_ops, host);
581 return;
582 }
583
584 if (!dentry_first) {
585 pr_warn("aops:%ps ino:%lx\n", a_ops, ino);
586 return;
587 }
588
589 dentry_ptr = container_of(dentry_first, struct dentry, d_u.d_alias);
590 if (get_kernel_nofault(dentry, dentry_ptr)) {
591 pr_warn("aops:%ps ino:%lx invalid dentry:%px\n",
592 a_ops, ino, dentry_ptr);
593 return;
594 }
595
596 /*
597 * if dentry is corrupted, the %pd handler may still crash,
598 * but it's unlikely that we reach here with a corrupt mapping
599 */
600 pr_warn("aops:%ps ino:%lx dentry name:\"%pd\"\n", a_ops, ino, &dentry);
601}
602
dbd5768f 603void clear_inode(struct inode *inode)
b0683aa6 604{
08142579 605 /*
b93b0163 606 * We have to cycle the i_pages lock here because reclaim can be in the
6ffcd825 607 * process of removing the last page (in __filemap_remove_folio())
b93b0163 608 * and we must not free the mapping under it.
08142579 609 */
b93b0163 610 xa_lock_irq(&inode->i_data.i_pages);
b0683aa6 611 BUG_ON(inode->i_data.nrpages);
786b3112
HD
612 /*
613 * Almost always, mapping_empty(&inode->i_data) here; but there are
614 * two known and long-standing ways in which nodes may get left behind
615 * (when deep radix-tree node allocation failed partway; or when THP
616 * collapse_file() failed). Until those two known cases are cleaned up,
617 * or a cleanup function is called here, do not BUG_ON(!mapping_empty),
618 * nor even WARN_ON(!mapping_empty).
619 */
b93b0163 620 xa_unlock_irq(&inode->i_data.i_pages);
b0683aa6
AV
621 BUG_ON(!list_empty(&inode->i_data.private_list));
622 BUG_ON(!(inode->i_state & I_FREEING));
623 BUG_ON(inode->i_state & I_CLEAR);
6c60d2b5 624 BUG_ON(!list_empty(&inode->i_wb_list));
fa0d7e3d 625 /* don't need i_lock here, no concurrent mods to i_state */
b0683aa6
AV
626 inode->i_state = I_FREEING | I_CLEAR;
627}
dbd5768f 628EXPORT_SYMBOL(clear_inode);
b0683aa6 629
b2b2af8e
DC
630/*
631 * Free the inode passed in, removing it from the lists it is still connected
632 * to. We remove any pages still attached to the inode and wait for any IO that
633 * is still in progress before finally destroying the inode.
634 *
635 * An inode must already be marked I_FREEING so that we avoid the inode being
636 * moved back onto lists if we race with other code that manipulates the lists
637 * (e.g. writeback_single_inode). The caller is responsible for setting this.
638 *
639 * An inode must already be removed from the LRU list before being evicted from
640 * the cache. This should occur atomically with setting the I_FREEING state
641 * flag, so no inodes here should ever be on the LRU when being evicted.
642 */
644da596 643static void evict(struct inode *inode)
b4272d4c
AV
644{
645 const struct super_operations *op = inode->i_sb->s_op;
646
b2b2af8e
DC
647 BUG_ON(!(inode->i_state & I_FREEING));
648 BUG_ON(!list_empty(&inode->i_lru));
649
c7f54084
DC
650 if (!list_empty(&inode->i_io_list))
651 inode_io_list_del(inode);
b12362bd 652
55fa6091
DC
653 inode_sb_list_del(inode);
654
169ebd90
JK
655 /*
656 * Wait for flusher thread to be done with the inode so that filesystem
657 * does not start destroying it while writeback is still running. Since
658 * the inode has I_FREEING set, flusher thread won't start new work on
659 * the inode. We just have to wait for running writeback to finish.
660 */
661 inode_wait_for_writeback(inode);
7994e6f7 662
be7ce416
AV
663 if (op->evict_inode) {
664 op->evict_inode(inode);
b4272d4c 665 } else {
91b0abe3 666 truncate_inode_pages_final(&inode->i_data);
dbd5768f 667 clear_inode(inode);
b4272d4c 668 }
661074e9
AV
669 if (S_ISCHR(inode->i_mode) && inode->i_cdev)
670 cd_forget(inode);
b2b2af8e
DC
671
672 remove_inode_hash(inode);
673
674 spin_lock(&inode->i_lock);
675 wake_up_bit(&inode->i_state, __I_NEW);
676 BUG_ON(inode->i_state != (I_FREEING | I_CLEAR));
677 spin_unlock(&inode->i_lock);
678
679 destroy_inode(inode);
b4272d4c
AV
680}
681
1da177e4
LT
682/*
683 * dispose_list - dispose of the contents of a local list
684 * @head: the head of the list to free
685 *
686 * Dispose-list gets a local list with local inodes in it, so it doesn't
687 * need to worry about list corruption and SMP locks.
688 */
689static void dispose_list(struct list_head *head)
690{
1da177e4
LT
691 while (!list_empty(head)) {
692 struct inode *inode;
693
7ccf19a8
NP
694 inode = list_first_entry(head, struct inode, i_lru);
695 list_del_init(&inode->i_lru);
1da177e4 696
644da596 697 evict(inode);
ac05fbb4 698 cond_resched();
1da177e4 699 }
1da177e4
LT
700}
701
63997e98
AV
702/**
703 * evict_inodes - evict all evictable inodes for a superblock
704 * @sb: superblock to operate on
705 *
706 * Make sure that no inodes with zero refcount are retained. This is
1751e8a6 707 * called by superblock shutdown after having SB_ACTIVE flag removed,
63997e98
AV
708 * so any inode reaching zero refcount during or after that call will
709 * be immediately evicted.
1da177e4 710 */
63997e98 711void evict_inodes(struct super_block *sb)
1da177e4 712{
63997e98
AV
713 struct inode *inode, *next;
714 LIST_HEAD(dispose);
1da177e4 715
ac05fbb4 716again:
74278da9 717 spin_lock(&sb->s_inode_list_lock);
63997e98
AV
718 list_for_each_entry_safe(inode, next, &sb->s_inodes, i_sb_list) {
719 if (atomic_read(&inode->i_count))
aabb8fdb 720 continue;
250df6ed
DC
721
722 spin_lock(&inode->i_lock);
723 if (inode->i_state & (I_NEW | I_FREEING | I_WILL_FREE)) {
724 spin_unlock(&inode->i_lock);
1da177e4 725 continue;
250df6ed 726 }
63997e98
AV
727
728 inode->i_state |= I_FREEING;
02afc410 729 inode_lru_list_del(inode);
250df6ed 730 spin_unlock(&inode->i_lock);
02afc410 731 list_add(&inode->i_lru, &dispose);
ac05fbb4
JB
732
733 /*
734 * We can have a ton of inodes to evict at unmount time given
735 * enough memory, check to see if we need to go to sleep for a
736 * bit so we don't livelock.
737 */
738 if (need_resched()) {
739 spin_unlock(&sb->s_inode_list_lock);
740 cond_resched();
741 dispose_list(&dispose);
742 goto again;
743 }
1da177e4 744 }
74278da9 745 spin_unlock(&sb->s_inode_list_lock);
63997e98
AV
746
747 dispose_list(&dispose);
1da177e4 748}
799ea9e9 749EXPORT_SYMBOL_GPL(evict_inodes);
1da177e4 750
1da177e4 751/**
a0318786
CH
752 * invalidate_inodes - attempt to free all inodes on a superblock
753 * @sb: superblock to operate on
1da177e4 754 *
e127b9bc 755 * Attempts to free all inodes (including dirty inodes) for a given superblock.
1da177e4 756 */
e127b9bc 757void invalidate_inodes(struct super_block *sb)
1da177e4 758{
a0318786
CH
759 struct inode *inode, *next;
760 LIST_HEAD(dispose);
1da177e4 761
04646aeb 762again:
74278da9 763 spin_lock(&sb->s_inode_list_lock);
a0318786 764 list_for_each_entry_safe(inode, next, &sb->s_inodes, i_sb_list) {
250df6ed
DC
765 spin_lock(&inode->i_lock);
766 if (inode->i_state & (I_NEW | I_FREEING | I_WILL_FREE)) {
767 spin_unlock(&inode->i_lock);
aabb8fdb 768 continue;
250df6ed 769 }
99a38919 770 if (atomic_read(&inode->i_count)) {
250df6ed 771 spin_unlock(&inode->i_lock);
1da177e4
LT
772 continue;
773 }
99a38919 774
99a38919 775 inode->i_state |= I_FREEING;
02afc410 776 inode_lru_list_del(inode);
250df6ed 777 spin_unlock(&inode->i_lock);
02afc410 778 list_add(&inode->i_lru, &dispose);
04646aeb
ES
779 if (need_resched()) {
780 spin_unlock(&sb->s_inode_list_lock);
781 cond_resched();
782 dispose_list(&dispose);
783 goto again;
784 }
1da177e4 785 }
74278da9 786 spin_unlock(&sb->s_inode_list_lock);
1da177e4 787
a0318786 788 dispose_list(&dispose);
1da177e4 789}
1da177e4 790
1da177e4 791/*
bc3b14cb 792 * Isolate the inode from the LRU in preparation for freeing it.
1da177e4 793 *
9e38d86f
NP
794 * If the inode has the I_REFERENCED flag set, then it means that it has been
795 * used recently - the flag is set in iput_final(). When we encounter such an
796 * inode, clear the flag and move it to the back of the LRU so it gets another
797 * pass through the LRU before it gets reclaimed. This is necessary because of
798 * the fact we are doing lazy LRU updates to minimise lock contention so the
799 * LRU does not have strict ordering. Hence we don't want to reclaim inodes
800 * with this flag set because they are the inodes that are out of order.
1da177e4 801 */
3f97b163
VD
802static enum lru_status inode_lru_isolate(struct list_head *item,
803 struct list_lru_one *lru, spinlock_t *lru_lock, void *arg)
1da177e4 804{
bc3b14cb
DC
805 struct list_head *freeable = arg;
806 struct inode *inode = container_of(item, struct inode, i_lru);
1da177e4 807
bc3b14cb 808 /*
51b8c1fe
JW
809 * We are inverting the lru lock/inode->i_lock here, so use a
810 * trylock. If we fail to get the lock, just skip it.
bc3b14cb
DC
811 */
812 if (!spin_trylock(&inode->i_lock))
813 return LRU_SKIP;
1da177e4 814
bc3b14cb 815 /*
51b8c1fe
JW
816 * Inodes can get referenced, redirtied, or repopulated while
817 * they're already on the LRU, and this can make them
818 * unreclaimable for a while. Remove them lazily here; iput,
819 * sync, or the last page cache deletion will requeue them.
bc3b14cb
DC
820 */
821 if (atomic_read(&inode->i_count) ||
51b8c1fe
JW
822 (inode->i_state & ~I_REFERENCED) ||
823 !mapping_shrinkable(&inode->i_data)) {
3f97b163 824 list_lru_isolate(lru, &inode->i_lru);
bc3b14cb
DC
825 spin_unlock(&inode->i_lock);
826 this_cpu_dec(nr_unused);
827 return LRU_REMOVED;
828 }
1da177e4 829
51b8c1fe 830 /* Recently referenced inodes get one more pass */
69056ee6 831 if (inode->i_state & I_REFERENCED) {
bc3b14cb
DC
832 inode->i_state &= ~I_REFERENCED;
833 spin_unlock(&inode->i_lock);
834 return LRU_ROTATE;
835 }
1da177e4 836
51b8c1fe
JW
837 /*
838 * On highmem systems, mapping_shrinkable() permits dropping
839 * page cache in order to free up struct inodes: lowmem might
840 * be under pressure before the cache inside the highmem zone.
841 */
7ae12c80 842 if (inode_has_buffers(inode) || !mapping_empty(&inode->i_data)) {
bc3b14cb
DC
843 __iget(inode);
844 spin_unlock(&inode->i_lock);
845 spin_unlock(lru_lock);
846 if (remove_inode_buffers(inode)) {
847 unsigned long reap;
848 reap = invalidate_mapping_pages(&inode->i_data, 0, -1);
849 if (current_is_kswapd())
850 __count_vm_events(KSWAPD_INODESTEAL, reap);
851 else
852 __count_vm_events(PGINODESTEAL, reap);
c7b23b68 853 mm_account_reclaimed_pages(reap);
02afc410 854 }
bc3b14cb
DC
855 iput(inode);
856 spin_lock(lru_lock);
857 return LRU_RETRY;
858 }
02afc410 859
bc3b14cb
DC
860 WARN_ON(inode->i_state & I_NEW);
861 inode->i_state |= I_FREEING;
3f97b163 862 list_lru_isolate_move(lru, &inode->i_lru, freeable);
bc3b14cb 863 spin_unlock(&inode->i_lock);
9e38d86f 864
bc3b14cb
DC
865 this_cpu_dec(nr_unused);
866 return LRU_REMOVED;
867}
7ccf19a8 868
bc3b14cb
DC
869/*
870 * Walk the superblock inode LRU for freeable inodes and attempt to free them.
871 * This is called from the superblock shrinker function with a number of inodes
872 * to trim from the LRU. Inodes to be freed are moved to a temporary list and
873 * then are freed outside inode_lock by dispose_list().
874 */
503c358c 875long prune_icache_sb(struct super_block *sb, struct shrink_control *sc)
bc3b14cb
DC
876{
877 LIST_HEAD(freeable);
878 long freed;
1da177e4 879
503c358c
VD
880 freed = list_lru_shrink_walk(&sb->s_inode_lru, sc,
881 inode_lru_isolate, &freeable);
1da177e4 882 dispose_list(&freeable);
0a234c6d 883 return freed;
1da177e4
LT
884}
885
1da177e4
LT
886static void __wait_on_freeing_inode(struct inode *inode);
887/*
888 * Called with the inode lock held.
1da177e4 889 */
6b3304b5
MK
890static struct inode *find_inode(struct super_block *sb,
891 struct hlist_head *head,
892 int (*test)(struct inode *, void *),
893 void *data)
1da177e4 894{
6b3304b5 895 struct inode *inode = NULL;
1da177e4
LT
896
897repeat:
b67bfe0d 898 hlist_for_each_entry(inode, head, i_hash) {
5a3cd992 899 if (inode->i_sb != sb)
1da177e4 900 continue;
5a3cd992 901 if (!test(inode, data))
1da177e4 902 continue;
5a3cd992 903 spin_lock(&inode->i_lock);
a4ffdde6 904 if (inode->i_state & (I_FREEING|I_WILL_FREE)) {
1da177e4
LT
905 __wait_on_freeing_inode(inode);
906 goto repeat;
907 }
c2b6d621
AV
908 if (unlikely(inode->i_state & I_CREATING)) {
909 spin_unlock(&inode->i_lock);
910 return ERR_PTR(-ESTALE);
911 }
f7899bd5 912 __iget(inode);
250df6ed 913 spin_unlock(&inode->i_lock);
f7899bd5 914 return inode;
1da177e4 915 }
f7899bd5 916 return NULL;
1da177e4
LT
917}
918
919/*
920 * find_inode_fast is the fast path version of find_inode, see the comment at
921 * iget_locked for details.
922 */
6b3304b5
MK
923static struct inode *find_inode_fast(struct super_block *sb,
924 struct hlist_head *head, unsigned long ino)
1da177e4 925{
6b3304b5 926 struct inode *inode = NULL;
1da177e4
LT
927
928repeat:
b67bfe0d 929 hlist_for_each_entry(inode, head, i_hash) {
5a3cd992 930 if (inode->i_ino != ino)
1da177e4 931 continue;
5a3cd992 932 if (inode->i_sb != sb)
1da177e4 933 continue;
5a3cd992 934 spin_lock(&inode->i_lock);
a4ffdde6 935 if (inode->i_state & (I_FREEING|I_WILL_FREE)) {
1da177e4
LT
936 __wait_on_freeing_inode(inode);
937 goto repeat;
938 }
c2b6d621
AV
939 if (unlikely(inode->i_state & I_CREATING)) {
940 spin_unlock(&inode->i_lock);
941 return ERR_PTR(-ESTALE);
942 }
f7899bd5 943 __iget(inode);
250df6ed 944 spin_unlock(&inode->i_lock);
f7899bd5 945 return inode;
1da177e4 946 }
f7899bd5 947 return NULL;
8290c35f
DC
948}
949
f991bd2e
ED
950/*
951 * Each cpu owns a range of LAST_INO_BATCH numbers.
952 * 'shared_last_ino' is dirtied only once out of LAST_INO_BATCH allocations,
953 * to renew the exhausted range.
8290c35f 954 *
f991bd2e
ED
955 * This does not significantly increase overflow rate because every CPU can
956 * consume at most LAST_INO_BATCH-1 unused inode numbers. So there is
957 * NR_CPUS*(LAST_INO_BATCH-1) wastage. At 4096 and 1024, this is ~0.1% of the
958 * 2^32 range, and is a worst-case. Even a 50% wastage would only increase
959 * overflow rate by 2x, which does not seem too significant.
960 *
961 * On a 32bit, non LFS stat() call, glibc will generate an EOVERFLOW
962 * error if st_ino won't fit in target struct field. Use 32bit counter
963 * here to attempt to avoid that.
8290c35f 964 */
f991bd2e
ED
965#define LAST_INO_BATCH 1024
966static DEFINE_PER_CPU(unsigned int, last_ino);
967
85fe4025 968unsigned int get_next_ino(void)
8290c35f 969{
f991bd2e
ED
970 unsigned int *p = &get_cpu_var(last_ino);
971 unsigned int res = *p;
8290c35f 972
f991bd2e
ED
973#ifdef CONFIG_SMP
974 if (unlikely((res & (LAST_INO_BATCH-1)) == 0)) {
975 static atomic_t shared_last_ino;
976 int next = atomic_add_return(LAST_INO_BATCH, &shared_last_ino);
977
978 res = next - LAST_INO_BATCH;
979 }
980#endif
981
2adc376c
CM
982 res++;
983 /* get_next_ino should not provide a 0 inode number */
984 if (unlikely(!res))
985 res++;
986 *p = res;
f991bd2e
ED
987 put_cpu_var(last_ino);
988 return res;
8290c35f 989}
85fe4025 990EXPORT_SYMBOL(get_next_ino);
8290c35f 991
a209dfc7
ED
992/**
993 * new_inode_pseudo - obtain an inode
994 * @sb: superblock
995 *
996 * Allocates a new inode for given superblock.
997 * Inode wont be chained in superblock s_inodes list
998 * This means :
999 * - fs can't be unmount
1000 * - quotas, fsnotify, writeback can't work
1001 */
1002struct inode *new_inode_pseudo(struct super_block *sb)
1003{
1004 struct inode *inode = alloc_inode(sb);
1005
1006 if (inode) {
1007 spin_lock(&inode->i_lock);
1008 inode->i_state = 0;
1009 spin_unlock(&inode->i_lock);
a209dfc7
ED
1010 }
1011 return inode;
1012}
1013
1da177e4
LT
1014/**
1015 * new_inode - obtain an inode
1016 * @sb: superblock
1017 *
769848c0 1018 * Allocates a new inode for given superblock. The default gfp_mask
3c1d4378 1019 * for allocations related to inode->i_mapping is GFP_HIGHUSER_MOVABLE.
769848c0
MG
1020 * If HIGHMEM pages are unsuitable or it is known that pages allocated
1021 * for the page cache are not reclaimable or migratable,
1022 * mapping_set_gfp_mask() must be called with suitable flags on the
1023 * newly created inode's mapping
1024 *
1da177e4
LT
1025 */
1026struct inode *new_inode(struct super_block *sb)
1027{
6b3304b5 1028 struct inode *inode;
1da177e4 1029
a209dfc7
ED
1030 inode = new_inode_pseudo(sb);
1031 if (inode)
55fa6091 1032 inode_sb_list_add(inode);
1da177e4
LT
1033 return inode;
1034}
1da177e4
LT
1035EXPORT_SYMBOL(new_inode);
1036
14358e6d 1037#ifdef CONFIG_DEBUG_LOCK_ALLOC
e096d0c7
JB
1038void lockdep_annotate_inode_mutex_key(struct inode *inode)
1039{
a3314a0e 1040 if (S_ISDIR(inode->i_mode)) {
1e89a5e1
PZ
1041 struct file_system_type *type = inode->i_sb->s_type;
1042
9a7aa12f 1043 /* Set new key only if filesystem hasn't already changed it */
9902af79 1044 if (lockdep_match_class(&inode->i_rwsem, &type->i_mutex_key)) {
9a7aa12f
JK
1045 /*
1046 * ensure nobody is actually holding i_mutex
1047 */
9902af79
AV
1048 // mutex_destroy(&inode->i_mutex);
1049 init_rwsem(&inode->i_rwsem);
1050 lockdep_set_class(&inode->i_rwsem,
9a7aa12f
JK
1051 &type->i_mutex_dir_key);
1052 }
1e89a5e1 1053 }
e096d0c7
JB
1054}
1055EXPORT_SYMBOL(lockdep_annotate_inode_mutex_key);
14358e6d 1056#endif
e096d0c7
JB
1057
1058/**
1059 * unlock_new_inode - clear the I_NEW state and wake up any waiters
1060 * @inode: new inode to unlock
1061 *
1062 * Called when the inode is fully initialised to clear the new state of the
1063 * inode and wake up anyone waiting for the inode to finish initialisation.
1064 */
1065void unlock_new_inode(struct inode *inode)
1066{
1067 lockdep_annotate_inode_mutex_key(inode);
250df6ed 1068 spin_lock(&inode->i_lock);
eaff8079 1069 WARN_ON(!(inode->i_state & I_NEW));
c2b6d621 1070 inode->i_state &= ~I_NEW & ~I_CREATING;
310fa7a3 1071 smp_mb();
250df6ed
DC
1072 wake_up_bit(&inode->i_state, __I_NEW);
1073 spin_unlock(&inode->i_lock);
1da177e4 1074}
1da177e4
LT
1075EXPORT_SYMBOL(unlock_new_inode);
1076
c2b6d621
AV
1077void discard_new_inode(struct inode *inode)
1078{
1079 lockdep_annotate_inode_mutex_key(inode);
1080 spin_lock(&inode->i_lock);
1081 WARN_ON(!(inode->i_state & I_NEW));
1082 inode->i_state &= ~I_NEW;
1083 smp_mb();
1084 wake_up_bit(&inode->i_state, __I_NEW);
1085 spin_unlock(&inode->i_lock);
1086 iput(inode);
1087}
1088EXPORT_SYMBOL(discard_new_inode);
1089
f23ce757
JK
1090/**
1091 * lock_two_inodes - lock two inodes (may be regular files but also dirs)
1092 *
1093 * Lock any non-NULL argument. The caller must make sure that if he is passing
1094 * in two directories, one is not ancestor of the other. Zero, one or two
1095 * objects may be locked by this function.
1096 *
1097 * @inode1: first inode to lock
1098 * @inode2: second inode to lock
1099 * @subclass1: inode lock subclass for the first lock obtained
1100 * @subclass2: inode lock subclass for the second lock obtained
1101 */
1102void lock_two_inodes(struct inode *inode1, struct inode *inode2,
1103 unsigned subclass1, unsigned subclass2)
1104{
1105 if (!inode1 || !inode2) {
1106 /*
1107 * Make sure @subclass1 will be used for the acquired lock.
1108 * This is not strictly necessary (no current caller cares) but
1109 * let's keep things consistent.
1110 */
1111 if (!inode1)
1112 swap(inode1, inode2);
1113 goto lock;
1114 }
1115
1116 /*
1117 * If one object is directory and the other is not, we must make sure
1118 * to lock directory first as the other object may be its child.
1119 */
1120 if (S_ISDIR(inode2->i_mode) == S_ISDIR(inode1->i_mode)) {
1121 if (inode1 > inode2)
1122 swap(inode1, inode2);
1123 } else if (!S_ISDIR(inode1->i_mode))
1124 swap(inode1, inode2);
1125lock:
1126 if (inode1)
1127 inode_lock_nested(inode1, subclass1);
1128 if (inode2 && inode2 != inode1)
1129 inode_lock_nested(inode2, subclass2);
1130}
1131
375e289e
BF
1132/**
1133 * lock_two_nondirectories - take two i_mutexes on non-directory objects
4fd699ae 1134 *
2454ad83 1135 * Lock any non-NULL argument. Passed objects must not be directories.
4fd699ae
BF
1136 * Zero, one or two objects may be locked by this function.
1137 *
375e289e
BF
1138 * @inode1: first inode to lock
1139 * @inode2: second inode to lock
1140 */
1141void lock_two_nondirectories(struct inode *inode1, struct inode *inode2)
1142{
33ab231f
CB
1143 if (inode1)
1144 WARN_ON_ONCE(S_ISDIR(inode1->i_mode));
1145 if (inode2)
1146 WARN_ON_ONCE(S_ISDIR(inode2->i_mode));
2454ad83 1147 lock_two_inodes(inode1, inode2, I_MUTEX_NORMAL, I_MUTEX_NONDIR2);
375e289e
BF
1148}
1149EXPORT_SYMBOL(lock_two_nondirectories);
1150
1151/**
1152 * unlock_two_nondirectories - release locks from lock_two_nondirectories()
1153 * @inode1: first inode to unlock
1154 * @inode2: second inode to unlock
1155 */
1156void unlock_two_nondirectories(struct inode *inode1, struct inode *inode2)
1157{
2454ad83
JK
1158 if (inode1) {
1159 WARN_ON_ONCE(S_ISDIR(inode1->i_mode));
5955102c 1160 inode_unlock(inode1);
2454ad83
JK
1161 }
1162 if (inode2 && inode2 != inode1) {
1163 WARN_ON_ONCE(S_ISDIR(inode2->i_mode));
5955102c 1164 inode_unlock(inode2);
2454ad83 1165 }
375e289e
BF
1166}
1167EXPORT_SYMBOL(unlock_two_nondirectories);
1168
80ea09a0
MS
1169/**
1170 * inode_insert5 - obtain an inode from a mounted file system
1171 * @inode: pre-allocated inode to use for insert to cache
1172 * @hashval: hash value (usually inode number) to get
1173 * @test: callback used for comparisons between inodes
1174 * @set: callback used to initialize a new struct inode
1175 * @data: opaque data pointer to pass to @test and @set
1176 *
1177 * Search for the inode specified by @hashval and @data in the inode cache,
1178 * and if present it is return it with an increased reference count. This is
1179 * a variant of iget5_locked() for callers that don't want to fail on memory
1180 * allocation of inode.
1181 *
1182 * If the inode is not in cache, insert the pre-allocated inode to cache and
1183 * return it locked, hashed, and with the I_NEW flag set. The file system gets
1184 * to fill it in before unlocking it via unlock_new_inode().
1185 *
1186 * Note both @test and @set are called with the inode_hash_lock held, so can't
1187 * sleep.
1188 */
1189struct inode *inode_insert5(struct inode *inode, unsigned long hashval,
1190 int (*test)(struct inode *, void *),
1191 int (*set)(struct inode *, void *), void *data)
1192{
1193 struct hlist_head *head = inode_hashtable + hash(inode->i_sb, hashval);
1194 struct inode *old;
1195
1196again:
1197 spin_lock(&inode_hash_lock);
1198 old = find_inode(inode->i_sb, head, test, data);
1199 if (unlikely(old)) {
1200 /*
1201 * Uhhuh, somebody else created the same inode under us.
1202 * Use the old inode instead of the preallocated one.
1203 */
1204 spin_unlock(&inode_hash_lock);
c2b6d621
AV
1205 if (IS_ERR(old))
1206 return NULL;
80ea09a0
MS
1207 wait_on_inode(old);
1208 if (unlikely(inode_unhashed(old))) {
1209 iput(old);
1210 goto again;
1211 }
1212 return old;
1213 }
1214
1215 if (set && unlikely(set(inode, data))) {
1216 inode = NULL;
1217 goto unlock;
1218 }
1219
1220 /*
1221 * Return the locked inode with I_NEW set, the
1222 * caller is responsible for filling in the contents
1223 */
1224 spin_lock(&inode->i_lock);
1225 inode->i_state |= I_NEW;
3f19b2ab 1226 hlist_add_head_rcu(&inode->i_hash, head);
80ea09a0 1227 spin_unlock(&inode->i_lock);
18cc912b
JL
1228
1229 /*
1230 * Add inode to the sb list if it's not already. It has I_NEW at this
1231 * point, so it should be safe to test i_sb_list locklessly.
1232 */
1233 if (list_empty(&inode->i_sb_list))
e950564b 1234 inode_sb_list_add(inode);
80ea09a0
MS
1235unlock:
1236 spin_unlock(&inode_hash_lock);
1237
1238 return inode;
1239}
1240EXPORT_SYMBOL(inode_insert5);
1241
0b2d0724
CH
1242/**
1243 * iget5_locked - obtain an inode from a mounted file system
1244 * @sb: super block of file system
1245 * @hashval: hash value (usually inode number) to get
1246 * @test: callback used for comparisons between inodes
1247 * @set: callback used to initialize a new struct inode
1248 * @data: opaque data pointer to pass to @test and @set
1249 *
1250 * Search for the inode specified by @hashval and @data in the inode cache,
1251 * and if present it is return it with an increased reference count. This is
1252 * a generalized version of iget_locked() for file systems where the inode
1253 * number is not sufficient for unique identification of an inode.
1254 *
1255 * If the inode is not in cache, allocate a new inode and return it locked,
1256 * hashed, and with the I_NEW flag set. The file system gets to fill it in
1257 * before unlocking it via unlock_new_inode().
1da177e4 1258 *
0b2d0724
CH
1259 * Note both @test and @set are called with the inode_hash_lock held, so can't
1260 * sleep.
1da177e4 1261 */
0b2d0724
CH
1262struct inode *iget5_locked(struct super_block *sb, unsigned long hashval,
1263 int (*test)(struct inode *, void *),
1264 int (*set)(struct inode *, void *), void *data)
1da177e4 1265{
80ea09a0 1266 struct inode *inode = ilookup5(sb, hashval, test, data);
0b2d0724 1267
80ea09a0 1268 if (!inode) {
e950564b 1269 struct inode *new = alloc_inode(sb);
0b2d0724 1270
80ea09a0 1271 if (new) {
e950564b 1272 new->i_state = 0;
80ea09a0
MS
1273 inode = inode_insert5(new, hashval, test, set, data);
1274 if (unlikely(inode != new))
e950564b 1275 destroy_inode(new);
2864f301 1276 }
1da177e4
LT
1277 }
1278 return inode;
1da177e4 1279}
0b2d0724 1280EXPORT_SYMBOL(iget5_locked);
1da177e4 1281
0b2d0724
CH
1282/**
1283 * iget_locked - obtain an inode from a mounted file system
1284 * @sb: super block of file system
1285 * @ino: inode number to get
1286 *
1287 * Search for the inode specified by @ino in the inode cache and if present
1288 * return it with an increased reference count. This is for file systems
1289 * where the inode number is sufficient for unique identification of an inode.
1290 *
1291 * If the inode is not in cache, allocate a new inode and return it locked,
1292 * hashed, and with the I_NEW flag set. The file system gets to fill it in
1293 * before unlocking it via unlock_new_inode().
1da177e4 1294 */
0b2d0724 1295struct inode *iget_locked(struct super_block *sb, unsigned long ino)
1da177e4 1296{
0b2d0724 1297 struct hlist_head *head = inode_hashtable + hash(sb, ino);
6b3304b5 1298 struct inode *inode;
2864f301 1299again:
0b2d0724
CH
1300 spin_lock(&inode_hash_lock);
1301 inode = find_inode_fast(sb, head, ino);
1302 spin_unlock(&inode_hash_lock);
1303 if (inode) {
c2b6d621
AV
1304 if (IS_ERR(inode))
1305 return NULL;
0b2d0724 1306 wait_on_inode(inode);
2864f301
AV
1307 if (unlikely(inode_unhashed(inode))) {
1308 iput(inode);
1309 goto again;
1310 }
0b2d0724
CH
1311 return inode;
1312 }
1313
1da177e4
LT
1314 inode = alloc_inode(sb);
1315 if (inode) {
6b3304b5 1316 struct inode *old;
1da177e4 1317
67a23c49 1318 spin_lock(&inode_hash_lock);
1da177e4
LT
1319 /* We released the lock, so.. */
1320 old = find_inode_fast(sb, head, ino);
1321 if (!old) {
1322 inode->i_ino = ino;
250df6ed
DC
1323 spin_lock(&inode->i_lock);
1324 inode->i_state = I_NEW;
3f19b2ab 1325 hlist_add_head_rcu(&inode->i_hash, head);
250df6ed 1326 spin_unlock(&inode->i_lock);
55fa6091 1327 inode_sb_list_add(inode);
67a23c49 1328 spin_unlock(&inode_hash_lock);
1da177e4
LT
1329
1330 /* Return the locked inode with I_NEW set, the
1331 * caller is responsible for filling in the contents
1332 */
1333 return inode;
1334 }
1335
1336 /*
1337 * Uhhuh, somebody else created the same inode under
1338 * us. Use the old inode instead of the one we just
1339 * allocated.
1340 */
67a23c49 1341 spin_unlock(&inode_hash_lock);
1da177e4 1342 destroy_inode(inode);
c2b6d621
AV
1343 if (IS_ERR(old))
1344 return NULL;
1da177e4
LT
1345 inode = old;
1346 wait_on_inode(inode);
2864f301
AV
1347 if (unlikely(inode_unhashed(inode))) {
1348 iput(inode);
1349 goto again;
1350 }
1da177e4
LT
1351 }
1352 return inode;
1353}
0b2d0724 1354EXPORT_SYMBOL(iget_locked);
1da177e4 1355
ad5e195a
CH
1356/*
1357 * search the inode cache for a matching inode number.
1358 * If we find one, then the inode number we are trying to
1359 * allocate is not unique and so we should not use it.
1360 *
1361 * Returns 1 if the inode number is unique, 0 if it is not.
1362 */
1363static int test_inode_iunique(struct super_block *sb, unsigned long ino)
1364{
1365 struct hlist_head *b = inode_hashtable + hash(sb, ino);
ad5e195a
CH
1366 struct inode *inode;
1367
3f19b2ab
DH
1368 hlist_for_each_entry_rcu(inode, b, i_hash) {
1369 if (inode->i_ino == ino && inode->i_sb == sb)
ad5e195a
CH
1370 return 0;
1371 }
ad5e195a
CH
1372 return 1;
1373}
1374
1da177e4
LT
1375/**
1376 * iunique - get a unique inode number
1377 * @sb: superblock
1378 * @max_reserved: highest reserved inode number
1379 *
1380 * Obtain an inode number that is unique on the system for a given
1381 * superblock. This is used by file systems that have no natural
1382 * permanent inode numbering system. An inode number is returned that
1383 * is higher than the reserved limit but unique.
1384 *
1385 * BUGS:
1386 * With a large number of inodes live on the file system this function
1387 * currently becomes quite slow.
1388 */
1389ino_t iunique(struct super_block *sb, ino_t max_reserved)
1390{
866b04fc
JL
1391 /*
1392 * On a 32bit, non LFS stat() call, glibc will generate an EOVERFLOW
1393 * error if st_ino won't fit in target struct field. Use 32bit counter
1394 * here to attempt to avoid that.
1395 */
ad5e195a 1396 static DEFINE_SPINLOCK(iunique_lock);
866b04fc 1397 static unsigned int counter;
1da177e4 1398 ino_t res;
3361c7be 1399
3f19b2ab 1400 rcu_read_lock();
ad5e195a 1401 spin_lock(&iunique_lock);
3361c7be
JL
1402 do {
1403 if (counter <= max_reserved)
1404 counter = max_reserved + 1;
1da177e4 1405 res = counter++;
ad5e195a
CH
1406 } while (!test_inode_iunique(sb, res));
1407 spin_unlock(&iunique_lock);
3f19b2ab 1408 rcu_read_unlock();
1da177e4 1409
3361c7be
JL
1410 return res;
1411}
1da177e4
LT
1412EXPORT_SYMBOL(iunique);
1413
1414struct inode *igrab(struct inode *inode)
1415{
250df6ed
DC
1416 spin_lock(&inode->i_lock);
1417 if (!(inode->i_state & (I_FREEING|I_WILL_FREE))) {
1da177e4 1418 __iget(inode);
250df6ed
DC
1419 spin_unlock(&inode->i_lock);
1420 } else {
1421 spin_unlock(&inode->i_lock);
1da177e4
LT
1422 /*
1423 * Handle the case where s_op->clear_inode is not been
1424 * called yet, and somebody is calling igrab
1425 * while the inode is getting freed.
1426 */
1427 inode = NULL;
250df6ed 1428 }
1da177e4
LT
1429 return inode;
1430}
1da177e4
LT
1431EXPORT_SYMBOL(igrab);
1432
1433/**
0b2d0724 1434 * ilookup5_nowait - search for an inode in the inode cache
1da177e4 1435 * @sb: super block of file system to search
0b2d0724 1436 * @hashval: hash value (usually inode number) to search for
1da177e4
LT
1437 * @test: callback used for comparisons between inodes
1438 * @data: opaque data pointer to pass to @test
1da177e4 1439 *
0b2d0724 1440 * Search for the inode specified by @hashval and @data in the inode cache.
1da177e4
LT
1441 * If the inode is in the cache, the inode is returned with an incremented
1442 * reference count.
1443 *
0b2d0724
CH
1444 * Note: I_NEW is not waited upon so you have to be very careful what you do
1445 * with the returned inode. You probably should be using ilookup5() instead.
1da177e4 1446 *
b6d0ad68 1447 * Note2: @test is called with the inode_hash_lock held, so can't sleep.
1da177e4 1448 */
0b2d0724
CH
1449struct inode *ilookup5_nowait(struct super_block *sb, unsigned long hashval,
1450 int (*test)(struct inode *, void *), void *data)
1da177e4 1451{
0b2d0724 1452 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1da177e4
LT
1453 struct inode *inode;
1454
67a23c49 1455 spin_lock(&inode_hash_lock);
1da177e4 1456 inode = find_inode(sb, head, test, data);
67a23c49 1457 spin_unlock(&inode_hash_lock);
88bd5121 1458
c2b6d621 1459 return IS_ERR(inode) ? NULL : inode;
88bd5121 1460}
88bd5121
AA
1461EXPORT_SYMBOL(ilookup5_nowait);
1462
1463/**
1464 * ilookup5 - search for an inode in the inode cache
1465 * @sb: super block of file system to search
1466 * @hashval: hash value (usually inode number) to search for
1467 * @test: callback used for comparisons between inodes
1468 * @data: opaque data pointer to pass to @test
1469 *
0b2d0724
CH
1470 * Search for the inode specified by @hashval and @data in the inode cache,
1471 * and if the inode is in the cache, return the inode with an incremented
1472 * reference count. Waits on I_NEW before returning the inode.
88bd5121 1473 * returned with an incremented reference count.
1da177e4 1474 *
0b2d0724
CH
1475 * This is a generalized version of ilookup() for file systems where the
1476 * inode number is not sufficient for unique identification of an inode.
1da177e4 1477 *
0b2d0724 1478 * Note: @test is called with the inode_hash_lock held, so can't sleep.
1da177e4
LT
1479 */
1480struct inode *ilookup5(struct super_block *sb, unsigned long hashval,
1481 int (*test)(struct inode *, void *), void *data)
1482{
2864f301
AV
1483 struct inode *inode;
1484again:
1485 inode = ilookup5_nowait(sb, hashval, test, data);
1486 if (inode) {
0b2d0724 1487 wait_on_inode(inode);
2864f301
AV
1488 if (unlikely(inode_unhashed(inode))) {
1489 iput(inode);
1490 goto again;
1491 }
1492 }
0b2d0724 1493 return inode;
1da177e4 1494}
1da177e4
LT
1495EXPORT_SYMBOL(ilookup5);
1496
1497/**
1498 * ilookup - search for an inode in the inode cache
1499 * @sb: super block of file system to search
1500 * @ino: inode number to search for
1501 *
0b2d0724
CH
1502 * Search for the inode @ino in the inode cache, and if the inode is in the
1503 * cache, the inode is returned with an incremented reference count.
1da177e4
LT
1504 */
1505struct inode *ilookup(struct super_block *sb, unsigned long ino)
1506{
1507 struct hlist_head *head = inode_hashtable + hash(sb, ino);
1da177e4 1508 struct inode *inode;
2864f301 1509again:
0b2d0724
CH
1510 spin_lock(&inode_hash_lock);
1511 inode = find_inode_fast(sb, head, ino);
1512 spin_unlock(&inode_hash_lock);
1da177e4 1513
2864f301 1514 if (inode) {
c2b6d621
AV
1515 if (IS_ERR(inode))
1516 return NULL;
0b2d0724 1517 wait_on_inode(inode);
2864f301
AV
1518 if (unlikely(inode_unhashed(inode))) {
1519 iput(inode);
1520 goto again;
1521 }
1522 }
0b2d0724 1523 return inode;
1da177e4 1524}
0b2d0724 1525EXPORT_SYMBOL(ilookup);
1da177e4 1526
fe032c42
TT
1527/**
1528 * find_inode_nowait - find an inode in the inode cache
1529 * @sb: super block of file system to search
1530 * @hashval: hash value (usually inode number) to search for
1531 * @match: callback used for comparisons between inodes
1532 * @data: opaque data pointer to pass to @match
1533 *
1534 * Search for the inode specified by @hashval and @data in the inode
1535 * cache, where the helper function @match will return 0 if the inode
1536 * does not match, 1 if the inode does match, and -1 if the search
1537 * should be stopped. The @match function must be responsible for
1538 * taking the i_lock spin_lock and checking i_state for an inode being
1539 * freed or being initialized, and incrementing the reference count
1540 * before returning 1. It also must not sleep, since it is called with
1541 * the inode_hash_lock spinlock held.
1542 *
1543 * This is a even more generalized version of ilookup5() when the
1544 * function must never block --- find_inode() can block in
1545 * __wait_on_freeing_inode() --- or when the caller can not increment
1546 * the reference count because the resulting iput() might cause an
1547 * inode eviction. The tradeoff is that the @match funtion must be
1548 * very carefully implemented.
1549 */
1550struct inode *find_inode_nowait(struct super_block *sb,
1551 unsigned long hashval,
1552 int (*match)(struct inode *, unsigned long,
1553 void *),
1554 void *data)
1555{
1556 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1557 struct inode *inode, *ret_inode = NULL;
1558 int mval;
1559
1560 spin_lock(&inode_hash_lock);
1561 hlist_for_each_entry(inode, head, i_hash) {
1562 if (inode->i_sb != sb)
1563 continue;
1564 mval = match(inode, hashval, data);
1565 if (mval == 0)
1566 continue;
1567 if (mval == 1)
1568 ret_inode = inode;
1569 goto out;
1570 }
1571out:
1572 spin_unlock(&inode_hash_lock);
1573 return ret_inode;
1574}
1575EXPORT_SYMBOL(find_inode_nowait);
1576
3f19b2ab
DH
1577/**
1578 * find_inode_rcu - find an inode in the inode cache
1579 * @sb: Super block of file system to search
1580 * @hashval: Key to hash
1581 * @test: Function to test match on an inode
1582 * @data: Data for test function
1583 *
1584 * Search for the inode specified by @hashval and @data in the inode cache,
1585 * where the helper function @test will return 0 if the inode does not match
1586 * and 1 if it does. The @test function must be responsible for taking the
1587 * i_lock spin_lock and checking i_state for an inode being freed or being
1588 * initialized.
1589 *
1590 * If successful, this will return the inode for which the @test function
1591 * returned 1 and NULL otherwise.
1592 *
1593 * The @test function is not permitted to take a ref on any inode presented.
1594 * It is also not permitted to sleep.
1595 *
1596 * The caller must hold the RCU read lock.
1597 */
1598struct inode *find_inode_rcu(struct super_block *sb, unsigned long hashval,
1599 int (*test)(struct inode *, void *), void *data)
1600{
1601 struct hlist_head *head = inode_hashtable + hash(sb, hashval);
1602 struct inode *inode;
1603
1604 RCU_LOCKDEP_WARN(!rcu_read_lock_held(),
1605 "suspicious find_inode_rcu() usage");
1606
1607 hlist_for_each_entry_rcu(inode, head, i_hash) {
1608 if (inode->i_sb == sb &&
1609 !(READ_ONCE(inode->i_state) & (I_FREEING | I_WILL_FREE)) &&
1610 test(inode, data))
1611 return inode;
1612 }
1613 return NULL;
1614}
1615EXPORT_SYMBOL(find_inode_rcu);
1616
1617/**
961f3c89 1618 * find_inode_by_ino_rcu - Find an inode in the inode cache
3f19b2ab
DH
1619 * @sb: Super block of file system to search
1620 * @ino: The inode number to match
1621 *
1622 * Search for the inode specified by @hashval and @data in the inode cache,
1623 * where the helper function @test will return 0 if the inode does not match
1624 * and 1 if it does. The @test function must be responsible for taking the
1625 * i_lock spin_lock and checking i_state for an inode being freed or being
1626 * initialized.
1627 *
1628 * If successful, this will return the inode for which the @test function
1629 * returned 1 and NULL otherwise.
1630 *
1631 * The @test function is not permitted to take a ref on any inode presented.
1632 * It is also not permitted to sleep.
1633 *
1634 * The caller must hold the RCU read lock.
1635 */
1636struct inode *find_inode_by_ino_rcu(struct super_block *sb,
1637 unsigned long ino)
1638{
1639 struct hlist_head *head = inode_hashtable + hash(sb, ino);
1640 struct inode *inode;
1641
1642 RCU_LOCKDEP_WARN(!rcu_read_lock_held(),
1643 "suspicious find_inode_by_ino_rcu() usage");
1644
1645 hlist_for_each_entry_rcu(inode, head, i_hash) {
1646 if (inode->i_ino == ino &&
1647 inode->i_sb == sb &&
1648 !(READ_ONCE(inode->i_state) & (I_FREEING | I_WILL_FREE)))
1649 return inode;
1650 }
1651 return NULL;
1652}
1653EXPORT_SYMBOL(find_inode_by_ino_rcu);
1654
261bca86
AV
1655int insert_inode_locked(struct inode *inode)
1656{
1657 struct super_block *sb = inode->i_sb;
1658 ino_t ino = inode->i_ino;
1659 struct hlist_head *head = inode_hashtable + hash(sb, ino);
261bca86 1660
261bca86 1661 while (1) {
72a43d63 1662 struct inode *old = NULL;
67a23c49 1663 spin_lock(&inode_hash_lock);
b67bfe0d 1664 hlist_for_each_entry(old, head, i_hash) {
72a43d63
AV
1665 if (old->i_ino != ino)
1666 continue;
1667 if (old->i_sb != sb)
1668 continue;
250df6ed
DC
1669 spin_lock(&old->i_lock);
1670 if (old->i_state & (I_FREEING|I_WILL_FREE)) {
1671 spin_unlock(&old->i_lock);
72a43d63 1672 continue;
250df6ed 1673 }
72a43d63
AV
1674 break;
1675 }
b67bfe0d 1676 if (likely(!old)) {
250df6ed 1677 spin_lock(&inode->i_lock);
c2b6d621 1678 inode->i_state |= I_NEW | I_CREATING;
3f19b2ab 1679 hlist_add_head_rcu(&inode->i_hash, head);
250df6ed 1680 spin_unlock(&inode->i_lock);
67a23c49 1681 spin_unlock(&inode_hash_lock);
261bca86
AV
1682 return 0;
1683 }
c2b6d621
AV
1684 if (unlikely(old->i_state & I_CREATING)) {
1685 spin_unlock(&old->i_lock);
1686 spin_unlock(&inode_hash_lock);
1687 return -EBUSY;
1688 }
261bca86 1689 __iget(old);
250df6ed 1690 spin_unlock(&old->i_lock);
67a23c49 1691 spin_unlock(&inode_hash_lock);
261bca86 1692 wait_on_inode(old);
1d3382cb 1693 if (unlikely(!inode_unhashed(old))) {
261bca86
AV
1694 iput(old);
1695 return -EBUSY;
1696 }
1697 iput(old);
1698 }
1699}
261bca86
AV
1700EXPORT_SYMBOL(insert_inode_locked);
1701
1702int insert_inode_locked4(struct inode *inode, unsigned long hashval,
1703 int (*test)(struct inode *, void *), void *data)
1704{
c2b6d621
AV
1705 struct inode *old;
1706
1707 inode->i_state |= I_CREATING;
1708 old = inode_insert5(inode, hashval, test, NULL, data);
261bca86 1709
80ea09a0 1710 if (old != inode) {
261bca86 1711 iput(old);
80ea09a0 1712 return -EBUSY;
261bca86 1713 }
80ea09a0 1714 return 0;
261bca86 1715}
261bca86
AV
1716EXPORT_SYMBOL(insert_inode_locked4);
1717
1da177e4 1718
45321ac5
AV
1719int generic_delete_inode(struct inode *inode)
1720{
1721 return 1;
1722}
1723EXPORT_SYMBOL(generic_delete_inode);
1724
45321ac5
AV
1725/*
1726 * Called when we're dropping the last reference
1727 * to an inode.
22fe4042 1728 *
45321ac5
AV
1729 * Call the FS "drop_inode()" function, defaulting to
1730 * the legacy UNIX filesystem behaviour. If it tells
1731 * us to evict inode, do so. Otherwise, retain inode
1732 * in cache if fs is alive, sync and evict if fs is
1733 * shutting down.
22fe4042 1734 */
45321ac5 1735static void iput_final(struct inode *inode)
1da177e4
LT
1736{
1737 struct super_block *sb = inode->i_sb;
45321ac5 1738 const struct super_operations *op = inode->i_sb->s_op;
3f19b2ab 1739 unsigned long state;
45321ac5
AV
1740 int drop;
1741
250df6ed
DC
1742 WARN_ON(inode->i_state & I_NEW);
1743
e7f59097 1744 if (op->drop_inode)
45321ac5
AV
1745 drop = op->drop_inode(inode);
1746 else
1747 drop = generic_drop_inode(inode);
1da177e4 1748
88149082
HL
1749 if (!drop &&
1750 !(inode->i_state & I_DONTCACHE) &&
1751 (sb->s_flags & SB_ACTIVE)) {
51b8c1fe 1752 __inode_add_lru(inode, true);
b2b2af8e 1753 spin_unlock(&inode->i_lock);
b2b2af8e
DC
1754 return;
1755 }
1756
3f19b2ab 1757 state = inode->i_state;
45321ac5 1758 if (!drop) {
3f19b2ab 1759 WRITE_ONCE(inode->i_state, state | I_WILL_FREE);
250df6ed 1760 spin_unlock(&inode->i_lock);
3f19b2ab 1761
1da177e4 1762 write_inode_now(inode, 1);
3f19b2ab 1763
250df6ed 1764 spin_lock(&inode->i_lock);
3f19b2ab
DH
1765 state = inode->i_state;
1766 WARN_ON(state & I_NEW);
1767 state &= ~I_WILL_FREE;
1da177e4 1768 }
7ccf19a8 1769
3f19b2ab 1770 WRITE_ONCE(inode->i_state, state | I_FREEING);
c4ae0c65
ED
1771 if (!list_empty(&inode->i_lru))
1772 inode_lru_list_del(inode);
b2b2af8e 1773 spin_unlock(&inode->i_lock);
b2b2af8e 1774
644da596 1775 evict(inode);
1da177e4
LT
1776}
1777
1da177e4 1778/**
6b3304b5 1779 * iput - put an inode
1da177e4
LT
1780 * @inode: inode to put
1781 *
1782 * Puts an inode, dropping its usage count. If the inode use count hits
1783 * zero, the inode is then freed and may also be destroyed.
1784 *
1785 * Consequently, iput() can sleep.
1786 */
1787void iput(struct inode *inode)
1788{
0ae45f63
TT
1789 if (!inode)
1790 return;
1791 BUG_ON(inode->i_state & I_CLEAR);
1792retry:
1793 if (atomic_dec_and_lock(&inode->i_count, &inode->i_lock)) {
1794 if (inode->i_nlink && (inode->i_state & I_DIRTY_TIME)) {
1795 atomic_inc(&inode->i_count);
0ae45f63
TT
1796 spin_unlock(&inode->i_lock);
1797 trace_writeback_lazytime_iput(inode);
1798 mark_inode_dirty_sync(inode);
1799 goto retry;
1800 }
1801 iput_final(inode);
1da177e4
LT
1802 }
1803}
1da177e4
LT
1804EXPORT_SYMBOL(iput);
1805
30460e1e 1806#ifdef CONFIG_BLOCK
1da177e4
LT
1807/**
1808 * bmap - find a block number in a file
30460e1e
CM
1809 * @inode: inode owning the block number being requested
1810 * @block: pointer containing the block to find
1da177e4 1811 *
2b8e8b55 1812 * Replaces the value in ``*block`` with the block number on the device holding
30460e1e
CM
1813 * corresponding to the requested block number in the file.
1814 * That is, asked for block 4 of inode 1 the function will replace the
2b8e8b55 1815 * 4 in ``*block``, with disk block relative to the disk start that holds that
30460e1e
CM
1816 * block of the file.
1817 *
1818 * Returns -EINVAL in case of error, 0 otherwise. If mapping falls into a
2b8e8b55 1819 * hole, returns 0 and ``*block`` is also set to 0.
1da177e4 1820 */
30460e1e 1821int bmap(struct inode *inode, sector_t *block)
1da177e4 1822{
30460e1e
CM
1823 if (!inode->i_mapping->a_ops->bmap)
1824 return -EINVAL;
1825
1826 *block = inode->i_mapping->a_ops->bmap(inode->i_mapping, *block);
1827 return 0;
1da177e4 1828}
1da177e4 1829EXPORT_SYMBOL(bmap);
30460e1e 1830#endif
1da177e4 1831
11ff6f05
MG
1832/*
1833 * With relative atime, only update atime if the previous atime is
d98ffa1a
SK
1834 * earlier than or equal to either the ctime or mtime,
1835 * or if at least a day has passed since the last atime update.
11ff6f05 1836 */
c6718543 1837static int relatime_need_update(struct vfsmount *mnt, struct inode *inode,
6f22b664 1838 struct timespec64 now)
11ff6f05 1839{
2276e5ba 1840 struct timespec64 ctime;
11ff6f05 1841
c6718543 1842 if (!(mnt->mnt_flags & MNT_RELATIME))
11ff6f05
MG
1843 return 1;
1844 /*
d98ffa1a 1845 * Is mtime younger than or equal to atime? If yes, update atime:
11ff6f05 1846 */
95582b00 1847 if (timespec64_compare(&inode->i_mtime, &inode->i_atime) >= 0)
11ff6f05
MG
1848 return 1;
1849 /*
d98ffa1a 1850 * Is ctime younger than or equal to atime? If yes, update atime:
11ff6f05 1851 */
2276e5ba
JL
1852 ctime = inode_get_ctime(inode);
1853 if (timespec64_compare(&ctime, &inode->i_atime) >= 0)
11ff6f05
MG
1854 return 1;
1855
1856 /*
1857 * Is the previous atime value older than a day? If yes,
1858 * update atime:
1859 */
1860 if ((long)(now.tv_sec - inode->i_atime.tv_sec) >= 24*60*60)
1861 return 1;
1862 /*
1863 * Good, we can skip the atime update:
1864 */
1865 return 0;
1866}
1867
541d4c79
JL
1868/**
1869 * inode_update_timestamps - update the timestamps on the inode
1870 * @inode: inode to be updated
1871 * @flags: S_* flags that needed to be updated
1872 *
1873 * The update_time function is called when an inode's timestamps need to be
1874 * updated for a read or write operation. This function handles updating the
1875 * actual timestamps. It's up to the caller to ensure that the inode is marked
1876 * dirty appropriately.
1877 *
1878 * In the case where any of S_MTIME, S_CTIME, or S_VERSION need to be updated,
1879 * attempt to update all three of them. S_ATIME updates can be handled
1880 * independently of the rest.
1881 *
1882 * Returns a set of S_* flags indicating which values changed.
1883 */
1884int inode_update_timestamps(struct inode *inode, int flags)
c3b2da31 1885{
541d4c79
JL
1886 int updated = 0;
1887 struct timespec64 now;
e20b14db 1888
541d4c79
JL
1889 if (flags & (S_MTIME|S_CTIME|S_VERSION)) {
1890 struct timespec64 ctime = inode_get_ctime(inode);
e20b14db 1891
541d4c79
JL
1892 now = inode_set_ctime_current(inode);
1893 if (!timespec64_equal(&now, &ctime))
1894 updated |= S_CTIME;
1895 if (!timespec64_equal(&now, &inode->i_mtime)) {
1896 inode->i_mtime = now;
1897 updated |= S_MTIME;
1898 }
1899 if (IS_I_VERSION(inode) && inode_maybe_inc_iversion(inode, updated))
1900 updated |= S_VERSION;
1901 } else {
1902 now = current_time(inode);
e20b14db
EB
1903 }
1904
541d4c79
JL
1905 if (flags & S_ATIME) {
1906 if (!timespec64_equal(&now, &inode->i_atime)) {
1907 inode->i_atime = now;
1908 updated |= S_ATIME;
1909 }
1910 }
1911 return updated;
1912}
1913EXPORT_SYMBOL(inode_update_timestamps);
e20b14db 1914
541d4c79
JL
1915/**
1916 * generic_update_time - update the timestamps on the inode
1917 * @inode: inode to be updated
1918 * @flags: S_* flags that needed to be updated
1919 *
1920 * The update_time function is called when an inode's timestamps need to be
1921 * updated for a read or write operation. In the case where any of S_MTIME, S_CTIME,
1922 * or S_VERSION need to be updated we attempt to update all three of them. S_ATIME
1923 * updates can be handled done independently of the rest.
1924 *
1925 * Returns a S_* mask indicating which fields were updated.
1926 */
1927int generic_update_time(struct inode *inode, int flags)
1928{
1929 int updated = inode_update_timestamps(inode, flags);
1930 int dirty_flags = 0;
e20b14db 1931
541d4c79
JL
1932 if (updated & (S_ATIME|S_MTIME|S_CTIME))
1933 dirty_flags = inode->i_sb->s_flags & SB_LAZYTIME ? I_DIRTY_TIME : I_DIRTY_SYNC;
1934 if (updated & S_VERSION)
1935 dirty_flags |= I_DIRTY_SYNC;
e20b14db 1936 __mark_inode_dirty(inode, dirty_flags);
541d4c79 1937 return updated;
c3b2da31 1938}
0ae45f63
TT
1939EXPORT_SYMBOL(generic_update_time);
1940
1941/*
1942 * This does the actual work of updating an inodes time or version. Must have
1943 * had called mnt_want_write() before calling this.
1944 */
913e9928 1945int inode_update_time(struct inode *inode, int flags)
0ae45f63 1946{
23b424d9 1947 if (inode->i_op->update_time)
913e9928 1948 return inode->i_op->update_time(inode, flags);
541d4c79
JL
1949 generic_update_time(inode, flags);
1950 return 0;
0ae45f63 1951}
e60feb44 1952EXPORT_SYMBOL(inode_update_time);
c3b2da31 1953
1da177e4 1954/**
961f3c89 1955 * atime_needs_update - update the access time
185553b2 1956 * @path: the &struct path to update
30fdc8ee 1957 * @inode: inode to update
1da177e4
LT
1958 *
1959 * Update the accessed time on an inode and mark it for writeback.
1960 * This function automatically handles read only file systems and media,
1961 * as well as the "noatime" flag and inode specific "noatime" markers.
1962 */
c6718543 1963bool atime_needs_update(const struct path *path, struct inode *inode)
1da177e4 1964{
68ac1234 1965 struct vfsmount *mnt = path->mnt;
95582b00 1966 struct timespec64 now;
1da177e4 1967
cdb70f3f 1968 if (inode->i_flags & S_NOATIME)
8fa9dd24 1969 return false;
0bd23d09
EB
1970
1971 /* Atime updates will likely cause i_uid and i_gid to be written
1972 * back improprely if their true value is unknown to the vfs.
1973 */
4609e1f1 1974 if (HAS_UNMAPPED_ID(mnt_idmap(mnt), inode))
0bd23d09
EB
1975 return false;
1976
37756ced 1977 if (IS_NOATIME(inode))
8fa9dd24 1978 return false;
1751e8a6 1979 if ((inode->i_sb->s_flags & SB_NODIRATIME) && S_ISDIR(inode->i_mode))
8fa9dd24 1980 return false;
47ae32d6 1981
cdb70f3f 1982 if (mnt->mnt_flags & MNT_NOATIME)
8fa9dd24 1983 return false;
cdb70f3f 1984 if ((mnt->mnt_flags & MNT_NODIRATIME) && S_ISDIR(inode->i_mode))
8fa9dd24 1985 return false;
1da177e4 1986
c2050a45 1987 now = current_time(inode);
11ff6f05 1988
6f22b664 1989 if (!relatime_need_update(mnt, inode, now))
8fa9dd24 1990 return false;
11ff6f05 1991
95582b00 1992 if (timespec64_equal(&inode->i_atime, &now))
8fa9dd24
N
1993 return false;
1994
1995 return true;
1996}
1997
1998void touch_atime(const struct path *path)
1999{
2000 struct vfsmount *mnt = path->mnt;
2001 struct inode *inode = d_inode(path->dentry);
8fa9dd24 2002
c6718543 2003 if (!atime_needs_update(path, inode))
b12536c2
AK
2004 return;
2005
5d37e9e6 2006 if (!sb_start_write_trylock(inode->i_sb))
b12536c2 2007 return;
47ae32d6 2008
8fa9dd24 2009 if (__mnt_want_write(mnt) != 0)
5d37e9e6 2010 goto skip_update;
c3b2da31
JB
2011 /*
2012 * File systems can error out when updating inodes if they need to
2013 * allocate new space to modify an inode (such is the case for
2014 * Btrfs), but since we touch atime while walking down the path we
2015 * really don't care if we failed to update the atime of the file,
2016 * so just ignore the return value.
2bc55652
AB
2017 * We may also fail on filesystems that have the ability to make parts
2018 * of the fs read only, e.g. subvolumes in Btrfs.
c3b2da31 2019 */
913e9928 2020 inode_update_time(inode, S_ATIME);
5d37e9e6
JK
2021 __mnt_drop_write(mnt);
2022skip_update:
2023 sb_end_write(inode->i_sb);
1da177e4 2024}
869243a0 2025EXPORT_SYMBOL(touch_atime);
1da177e4 2026
dbfae0cd
JK
2027/*
2028 * Return mask of changes for notify_change() that need to be done as a
2029 * response to write or truncate. Return 0 if nothing has to be changed.
2030 * Negative value on error (change should be denied).
2031 */
9452e93e 2032int dentry_needs_remove_privs(struct mnt_idmap *idmap,
ed5a7047 2033 struct dentry *dentry)
dbfae0cd 2034{
dbfae0cd
JK
2035 struct inode *inode = d_inode(dentry);
2036 int mask = 0;
2037 int ret;
2038
2039 if (IS_NOSEC(inode))
2040 return 0;
2041
9452e93e 2042 mask = setattr_should_drop_suidgid(idmap, inode);
dbfae0cd
JK
2043 ret = security_inode_need_killpriv(dentry);
2044 if (ret < 0)
2045 return ret;
2046 if (ret)
2047 mask |= ATTR_KILL_PRIV;
2048 return mask;
2049}
dbfae0cd 2050
abf08576 2051static int __remove_privs(struct mnt_idmap *idmap,
643fe55a 2052 struct dentry *dentry, int kill)
3ed37648
CW
2053{
2054 struct iattr newattrs;
2055
2056 newattrs.ia_valid = ATTR_FORCE | kill;
27ac0ffe
BF
2057 /*
2058 * Note we call this on write, so notify_change will not
2059 * encounter any conflicting delegations:
2060 */
abf08576 2061 return notify_change(idmap, dentry, &newattrs, NULL);
3ed37648
CW
2062}
2063
faf99b56 2064static int __file_remove_privs(struct file *file, unsigned int flags)
3ed37648 2065{
c1892c37
MS
2066 struct dentry *dentry = file_dentry(file);
2067 struct inode *inode = file_inode(file);
41191cf6 2068 int error = 0;
dbfae0cd 2069 int kill;
3ed37648 2070
f69e749a 2071 if (IS_NOSEC(inode) || !S_ISREG(inode->i_mode))
3ed37648
CW
2072 return 0;
2073
9452e93e 2074 kill = dentry_needs_remove_privs(file_mnt_idmap(file), dentry);
41191cf6 2075 if (kill < 0)
dbfae0cd 2076 return kill;
faf99b56 2077
41191cf6
SR
2078 if (kill) {
2079 if (flags & IOCB_NOWAIT)
2080 return -EAGAIN;
2081
abf08576 2082 error = __remove_privs(file_mnt_idmap(file), dentry, kill);
41191cf6 2083 }
faf99b56 2084
2426f391
JK
2085 if (!error)
2086 inode_has_no_xattr(inode);
3ed37648
CW
2087 return error;
2088}
faf99b56
SR
2089
2090/**
2091 * file_remove_privs - remove special file privileges (suid, capabilities)
2092 * @file: file to remove privileges from
2093 *
2094 * When file is modified by a write or truncation ensure that special
2095 * file privileges are removed.
2096 *
2097 * Return: 0 on success, negative errno on failure.
2098 */
2099int file_remove_privs(struct file *file)
2100{
2101 return __file_remove_privs(file, 0);
2102}
5fa8e0a1 2103EXPORT_SYMBOL(file_remove_privs);
3ed37648 2104
913e9928 2105static int inode_needs_update_time(struct inode *inode)
1da177e4 2106{
c3b2da31 2107 int sync_it = 0;
647aa768 2108 struct timespec64 now = current_time(inode);
2276e5ba 2109 struct timespec64 ctime;
1da177e4 2110
ce06e0b2 2111 /* First try to exhaust all avenues to not sync */
1da177e4 2112 if (IS_NOCMTIME(inode))
c3b2da31 2113 return 0;
20ddee2c 2114
913e9928 2115 if (!timespec64_equal(&inode->i_mtime, &now))
ce06e0b2 2116 sync_it = S_MTIME;
1da177e4 2117
2276e5ba 2118 ctime = inode_get_ctime(inode);
913e9928 2119 if (!timespec64_equal(&ctime, &now))
ce06e0b2 2120 sync_it |= S_CTIME;
870f4817 2121
e38cf302 2122 if (IS_I_VERSION(inode) && inode_iversion_need_inc(inode))
ce06e0b2 2123 sync_it |= S_VERSION;
7a224228 2124
6a2aa5d8
SR
2125 return sync_it;
2126}
2127
913e9928 2128static int __file_update_time(struct file *file, int sync_mode)
6a2aa5d8
SR
2129{
2130 int ret = 0;
2131 struct inode *inode = file_inode(file);
ce06e0b2 2132
6a2aa5d8
SR
2133 /* try to update time settings */
2134 if (!__mnt_want_write_file(file)) {
913e9928 2135 ret = inode_update_time(inode, sync_mode);
6a2aa5d8
SR
2136 __mnt_drop_write_file(file);
2137 }
c3b2da31
JB
2138
2139 return ret;
1da177e4 2140}
6a2aa5d8
SR
2141
2142/**
2143 * file_update_time - update mtime and ctime time
2144 * @file: file accessed
2145 *
2146 * Update the mtime and ctime members of an inode and mark the inode for
2147 * writeback. Note that this function is meant exclusively for usage in
2148 * the file write path of filesystems, and filesystems may choose to
2149 * explicitly ignore updates via this function with the _NOCMTIME inode
2150 * flag, e.g. for network filesystem where these imestamps are handled
2151 * by the server. This can return an error for file systems who need to
2152 * allocate space in order to update an inode.
2153 *
2154 * Return: 0 on success, negative errno on failure.
2155 */
2156int file_update_time(struct file *file)
2157{
2158 int ret;
2159 struct inode *inode = file_inode(file);
6a2aa5d8 2160
913e9928 2161 ret = inode_needs_update_time(inode);
6a2aa5d8
SR
2162 if (ret <= 0)
2163 return ret;
2164
913e9928 2165 return __file_update_time(file, ret);
6a2aa5d8 2166}
870f4817 2167EXPORT_SYMBOL(file_update_time);
1da177e4 2168
faf99b56 2169/**
66fa3ced 2170 * file_modified_flags - handle mandated vfs changes when modifying a file
faf99b56 2171 * @file: file that was modified
66fa3ced 2172 * @flags: kiocb flags
faf99b56
SR
2173 *
2174 * When file has been modified ensure that special
2175 * file privileges are removed and time settings are updated.
2176 *
66fa3ced
SR
2177 * If IOCB_NOWAIT is set, special file privileges will not be removed and
2178 * time settings will not be updated. It will return -EAGAIN.
2179 *
faf99b56
SR
2180 * Context: Caller must hold the file's inode lock.
2181 *
2182 * Return: 0 on success, negative errno on failure.
2183 */
66fa3ced 2184static int file_modified_flags(struct file *file, int flags)
e38f7f53 2185{
faf99b56 2186 int ret;
6a2aa5d8 2187 struct inode *inode = file_inode(file);
e38f7f53
AG
2188
2189 /*
2190 * Clear the security bits if the process is not being run by root.
2191 * This keeps people from modifying setuid and setgid binaries.
2192 */
66fa3ced 2193 ret = __file_remove_privs(file, flags);
faf99b56
SR
2194 if (ret)
2195 return ret;
e38f7f53
AG
2196
2197 if (unlikely(file->f_mode & FMODE_NOCMTIME))
2198 return 0;
2199
913e9928 2200 ret = inode_needs_update_time(inode);
6a2aa5d8
SR
2201 if (ret <= 0)
2202 return ret;
66fa3ced
SR
2203 if (flags & IOCB_NOWAIT)
2204 return -EAGAIN;
6a2aa5d8 2205
913e9928 2206 return __file_update_time(file, ret);
e38f7f53 2207}
66fa3ced
SR
2208
2209/**
2210 * file_modified - handle mandated vfs changes when modifying a file
2211 * @file: file that was modified
2212 *
2213 * When file has been modified ensure that special
2214 * file privileges are removed and time settings are updated.
2215 *
2216 * Context: Caller must hold the file's inode lock.
2217 *
2218 * Return: 0 on success, negative errno on failure.
2219 */
2220int file_modified(struct file *file)
2221{
2222 return file_modified_flags(file, 0);
2223}
e38f7f53
AG
2224EXPORT_SYMBOL(file_modified);
2225
66fa3ced
SR
2226/**
2227 * kiocb_modified - handle mandated vfs changes when modifying a file
2228 * @iocb: iocb that was modified
2229 *
2230 * When file has been modified ensure that special
2231 * file privileges are removed and time settings are updated.
2232 *
2233 * Context: Caller must hold the file's inode lock.
2234 *
2235 * Return: 0 on success, negative errno on failure.
2236 */
2237int kiocb_modified(struct kiocb *iocb)
2238{
2239 return file_modified_flags(iocb->ki_filp, iocb->ki_flags);
2240}
2241EXPORT_SYMBOL_GPL(kiocb_modified);
2242
1da177e4
LT
2243int inode_needs_sync(struct inode *inode)
2244{
2245 if (IS_SYNC(inode))
2246 return 1;
2247 if (S_ISDIR(inode->i_mode) && IS_DIRSYNC(inode))
2248 return 1;
2249 return 0;
2250}
1da177e4
LT
2251EXPORT_SYMBOL(inode_needs_sync);
2252
1da177e4 2253/*
168a9fd6
MS
2254 * If we try to find an inode in the inode hash while it is being
2255 * deleted, we have to wait until the filesystem completes its
2256 * deletion before reporting that it isn't found. This function waits
2257 * until the deletion _might_ have completed. Callers are responsible
2258 * to recheck inode state.
2259 *
eaff8079 2260 * It doesn't matter if I_NEW is not set initially, a call to
250df6ed
DC
2261 * wake_up_bit(&inode->i_state, __I_NEW) after removing from the hash list
2262 * will DTRT.
1da177e4
LT
2263 */
2264static void __wait_on_freeing_inode(struct inode *inode)
2265{
2266 wait_queue_head_t *wq;
eaff8079
CH
2267 DEFINE_WAIT_BIT(wait, &inode->i_state, __I_NEW);
2268 wq = bit_waitqueue(&inode->i_state, __I_NEW);
21417136 2269 prepare_to_wait(wq, &wait.wq_entry, TASK_UNINTERRUPTIBLE);
250df6ed 2270 spin_unlock(&inode->i_lock);
67a23c49 2271 spin_unlock(&inode_hash_lock);
1da177e4 2272 schedule();
21417136 2273 finish_wait(wq, &wait.wq_entry);
67a23c49 2274 spin_lock(&inode_hash_lock);
1da177e4
LT
2275}
2276
1da177e4
LT
2277static __initdata unsigned long ihash_entries;
2278static int __init set_ihash_entries(char *str)
2279{
2280 if (!str)
2281 return 0;
2282 ihash_entries = simple_strtoul(str, &str, 0);
2283 return 1;
2284}
2285__setup("ihash_entries=", set_ihash_entries);
2286
2287/*
2288 * Initialize the waitqueues and inode hash table.
2289 */
2290void __init inode_init_early(void)
2291{
1da177e4
LT
2292 /* If hashes are distributed across NUMA nodes, defer
2293 * hash allocation until vmalloc space is available.
2294 */
2295 if (hashdist)
2296 return;
2297
2298 inode_hashtable =
2299 alloc_large_system_hash("Inode-cache",
2300 sizeof(struct hlist_head),
2301 ihash_entries,
2302 14,
3d375d78 2303 HASH_EARLY | HASH_ZERO,
1da177e4
LT
2304 &i_hash_shift,
2305 &i_hash_mask,
31fe62b9 2306 0,
1da177e4 2307 0);
1da177e4
LT
2308}
2309
74bf17cf 2310void __init inode_init(void)
1da177e4 2311{
1da177e4 2312 /* inode slab cache */
b0196009
PJ
2313 inode_cachep = kmem_cache_create("inode_cache",
2314 sizeof(struct inode),
2315 0,
2316 (SLAB_RECLAIM_ACCOUNT|SLAB_PANIC|
5d097056 2317 SLAB_MEM_SPREAD|SLAB_ACCOUNT),
20c2df83 2318 init_once);
1da177e4
LT
2319
2320 /* Hash may have been set up in inode_init_early */
2321 if (!hashdist)
2322 return;
2323
2324 inode_hashtable =
2325 alloc_large_system_hash("Inode-cache",
2326 sizeof(struct hlist_head),
2327 ihash_entries,
2328 14,
3d375d78 2329 HASH_ZERO,
1da177e4
LT
2330 &i_hash_shift,
2331 &i_hash_mask,
31fe62b9 2332 0,
1da177e4 2333 0);
1da177e4
LT
2334}
2335
2336void init_special_inode(struct inode *inode, umode_t mode, dev_t rdev)
2337{
2338 inode->i_mode = mode;
2339 if (S_ISCHR(mode)) {
2340 inode->i_fop = &def_chr_fops;
2341 inode->i_rdev = rdev;
2342 } else if (S_ISBLK(mode)) {
bda2795a
CH
2343 if (IS_ENABLED(CONFIG_BLOCK))
2344 inode->i_fop = &def_blk_fops;
1da177e4
LT
2345 inode->i_rdev = rdev;
2346 } else if (S_ISFIFO(mode))
599a0ac1 2347 inode->i_fop = &pipefifo_fops;
1da177e4 2348 else if (S_ISSOCK(mode))
bd9b51e7 2349 ; /* leave it no_open_fops */
1da177e4 2350 else
af0d9ae8
MK
2351 printk(KERN_DEBUG "init_special_inode: bogus i_mode (%o) for"
2352 " inode %s:%lu\n", mode, inode->i_sb->s_id,
2353 inode->i_ino);
1da177e4
LT
2354}
2355EXPORT_SYMBOL(init_special_inode);
a1bd120d
DM
2356
2357/**
eaae668d 2358 * inode_init_owner - Init uid,gid,mode for new inode according to posix standards
f2d40141 2359 * @idmap: idmap of the mount the inode was created from
a1bd120d
DM
2360 * @inode: New inode
2361 * @dir: Directory inode
2362 * @mode: mode of the new inode
21cb47be 2363 *
f2d40141
CB
2364 * If the inode has been created through an idmapped mount the idmap of
2365 * the vfsmount must be passed through @idmap. This function will then take
2366 * care to map the inode according to @idmap before checking permissions
21cb47be 2367 * and initializing i_uid and i_gid. On non-idmapped mounts or if permission
f2d40141 2368 * checking is to be performed on the raw inode simply pass @nop_mnt_idmap.
a1bd120d 2369 */
f2d40141 2370void inode_init_owner(struct mnt_idmap *idmap, struct inode *inode,
21cb47be 2371 const struct inode *dir, umode_t mode)
a1bd120d 2372{
c14329d3 2373 inode_fsuid_set(inode, idmap);
a1bd120d
DM
2374 if (dir && dir->i_mode & S_ISGID) {
2375 inode->i_gid = dir->i_gid;
0fa3ecd8
LT
2376
2377 /* Directories are special, and always inherit S_ISGID */
a1bd120d
DM
2378 if (S_ISDIR(mode))
2379 mode |= S_ISGID;
2380 } else
c14329d3 2381 inode_fsgid_set(inode, idmap);
a1bd120d
DM
2382 inode->i_mode = mode;
2383}
2384EXPORT_SYMBOL(inode_init_owner);
e795b717 2385
2e149670
SH
2386/**
2387 * inode_owner_or_capable - check current task permissions to inode
01beba79 2388 * @idmap: idmap of the mount the inode was found from
2e149670
SH
2389 * @inode: inode being checked
2390 *
23adbe12
AL
2391 * Return true if current either has CAP_FOWNER in a namespace with the
2392 * inode owner uid mapped, or owns the file.
21cb47be 2393 *
01beba79
CB
2394 * If the inode has been found through an idmapped mount the idmap of
2395 * the vfsmount must be passed through @idmap. This function will then take
2396 * care to map the inode according to @idmap before checking permissions.
21cb47be 2397 * On non-idmapped mounts or if permission checking is to be performed on the
01beba79 2398 * raw inode simply passs @nop_mnt_idmap.
e795b717 2399 */
01beba79 2400bool inode_owner_or_capable(struct mnt_idmap *idmap,
21cb47be 2401 const struct inode *inode)
e795b717 2402{
a2bd096f 2403 vfsuid_t vfsuid;
23adbe12
AL
2404 struct user_namespace *ns;
2405
e67fe633 2406 vfsuid = i_uid_into_vfsuid(idmap, inode);
a2bd096f 2407 if (vfsuid_eq_kuid(vfsuid, current_fsuid()))
e795b717 2408 return true;
23adbe12
AL
2409
2410 ns = current_user_ns();
a2bd096f 2411 if (vfsuid_has_mapping(ns, vfsuid) && ns_capable(ns, CAP_FOWNER))
e795b717
SH
2412 return true;
2413 return false;
2414}
2e149670 2415EXPORT_SYMBOL(inode_owner_or_capable);
1d59d61f
TM
2416
2417/*
2418 * Direct i/o helper functions
2419 */
2420static void __inode_dio_wait(struct inode *inode)
2421{
2422 wait_queue_head_t *wq = bit_waitqueue(&inode->i_state, __I_DIO_WAKEUP);
2423 DEFINE_WAIT_BIT(q, &inode->i_state, __I_DIO_WAKEUP);
2424
2425 do {
21417136 2426 prepare_to_wait(wq, &q.wq_entry, TASK_UNINTERRUPTIBLE);
1d59d61f
TM
2427 if (atomic_read(&inode->i_dio_count))
2428 schedule();
2429 } while (atomic_read(&inode->i_dio_count));
21417136 2430 finish_wait(wq, &q.wq_entry);
1d59d61f
TM
2431}
2432
2433/**
2434 * inode_dio_wait - wait for outstanding DIO requests to finish
2435 * @inode: inode to wait for
2436 *
2437 * Waits for all pending direct I/O requests to finish so that we can
2438 * proceed with a truncate or equivalent operation.
2439 *
2440 * Must be called under a lock that serializes taking new references
2441 * to i_dio_count, usually by inode->i_mutex.
2442 */
2443void inode_dio_wait(struct inode *inode)
2444{
2445 if (atomic_read(&inode->i_dio_count))
2446 __inode_dio_wait(inode);
2447}
2448EXPORT_SYMBOL(inode_dio_wait);
2449
5f16f322
TT
2450/*
2451 * inode_set_flags - atomically set some inode flags
2452 *
2453 * Note: the caller should be holding i_mutex, or else be sure that
2454 * they have exclusive access to the inode structure (i.e., while the
2455 * inode is being instantiated). The reason for the cmpxchg() loop
2456 * --- which wouldn't be necessary if all code paths which modify
2457 * i_flags actually followed this rule, is that there is at least one
5fa8e0a1
JK
2458 * code path which doesn't today so we use cmpxchg() out of an abundance
2459 * of caution.
5f16f322
TT
2460 *
2461 * In the long run, i_mutex is overkill, and we should probably look
2462 * at using the i_lock spinlock to protect i_flags, and then make sure
2463 * it is so documented in include/linux/fs.h and that all code follows
2464 * the locking convention!!
2465 */
2466void inode_set_flags(struct inode *inode, unsigned int flags,
2467 unsigned int mask)
2468{
5f16f322 2469 WARN_ON_ONCE(flags & ~mask);
a905737f 2470 set_mask_bits(&inode->i_flags, mask, flags);
5f16f322
TT
2471}
2472EXPORT_SYMBOL(inode_set_flags);
21fc61c7
AV
2473
2474void inode_nohighmem(struct inode *inode)
2475{
2476 mapping_set_gfp_mask(inode->i_mapping, GFP_USER);
2477}
2478EXPORT_SYMBOL(inode_nohighmem);
3cd88666 2479
50e17c00
DD
2480/**
2481 * timestamp_truncate - Truncate timespec to a granularity
2482 * @t: Timespec
2483 * @inode: inode being updated
2484 *
2485 * Truncate a timespec to the granularity supported by the fs
2486 * containing the inode. Always rounds down. gran must
2487 * not be 0 nor greater than a second (NSEC_PER_SEC, or 10^9 ns).
2488 */
2489struct timespec64 timestamp_truncate(struct timespec64 t, struct inode *inode)
2490{
2491 struct super_block *sb = inode->i_sb;
2492 unsigned int gran = sb->s_time_gran;
2493
2494 t.tv_sec = clamp(t.tv_sec, sb->s_time_min, sb->s_time_max);
2495 if (unlikely(t.tv_sec == sb->s_time_max || t.tv_sec == sb->s_time_min))
2496 t.tv_nsec = 0;
2497
2498 /* Avoid division in the common cases 1 ns and 1 s. */
2499 if (gran == 1)
2500 ; /* nothing */
2501 else if (gran == NSEC_PER_SEC)
2502 t.tv_nsec = 0;
2503 else if (gran > 1 && gran < NSEC_PER_SEC)
2504 t.tv_nsec -= t.tv_nsec % gran;
2505 else
2506 WARN(1, "invalid file time granularity: %u", gran);
2507 return t;
2508}
2509EXPORT_SYMBOL(timestamp_truncate);
2510
3cd88666
DD
2511/**
2512 * current_time - Return FS time
2513 * @inode: inode.
2514 *
2515 * Return the current time truncated to the time granularity supported by
2516 * the fs.
2517 *
2518 * Note that inode and inode->sb cannot be NULL.
2519 * Otherwise, the function warns and returns time without truncation.
2520 */
95582b00 2521struct timespec64 current_time(struct inode *inode)
3cd88666 2522{
d651d160
AB
2523 struct timespec64 now;
2524
2525 ktime_get_coarse_real_ts64(&now);
50e17c00 2526 return timestamp_truncate(now, inode);
3cd88666
DD
2527}
2528EXPORT_SYMBOL(current_time);
3cd88666 2529
9b6304c1
JL
2530/**
2531 * inode_set_ctime_current - set the ctime to current_time
2532 * @inode: inode
2533 *
2534 * Set the inode->i_ctime to the current value for the inode. Returns
2535 * the current value that was assigned to i_ctime.
2536 */
2537struct timespec64 inode_set_ctime_current(struct inode *inode)
2538{
647aa768 2539 struct timespec64 now = current_time(inode);
9b6304c1 2540
647aa768 2541 inode_set_ctime(inode, now.tv_sec, now.tv_nsec);
9b6304c1 2542 return now;
3cd88666 2543}
9b6304c1 2544EXPORT_SYMBOL(inode_set_ctime_current);
2b3416ce 2545
11c2a870
CB
2546/**
2547 * in_group_or_capable - check whether caller is CAP_FSETID privileged
9452e93e 2548 * @idmap: idmap of the mount @inode was found from
11c2a870
CB
2549 * @inode: inode to check
2550 * @vfsgid: the new/current vfsgid of @inode
2551 *
2552 * Check wether @vfsgid is in the caller's group list or if the caller is
2553 * privileged with CAP_FSETID over @inode. This can be used to determine
2554 * whether the setgid bit can be kept or must be dropped.
2555 *
2556 * Return: true if the caller is sufficiently privileged, false if not.
2557 */
9452e93e 2558bool in_group_or_capable(struct mnt_idmap *idmap,
11c2a870
CB
2559 const struct inode *inode, vfsgid_t vfsgid)
2560{
2561 if (vfsgid_in_group_p(vfsgid))
2562 return true;
9452e93e 2563 if (capable_wrt_inode_uidgid(idmap, inode, CAP_FSETID))
11c2a870
CB
2564 return true;
2565 return false;
2566}
2567
2b3416ce
YX
2568/**
2569 * mode_strip_sgid - handle the sgid bit for non-directories
9452e93e 2570 * @idmap: idmap of the mount the inode was created from
2b3416ce
YX
2571 * @dir: parent directory inode
2572 * @mode: mode of the file to be created in @dir
2573 *
2574 * If the @mode of the new file has both the S_ISGID and S_IXGRP bit
2575 * raised and @dir has the S_ISGID bit raised ensure that the caller is
2576 * either in the group of the parent directory or they have CAP_FSETID
2577 * in their user namespace and are privileged over the parent directory.
2578 * In all other cases, strip the S_ISGID bit from @mode.
2579 *
2580 * Return: the new mode to use for the file
2581 */
9452e93e 2582umode_t mode_strip_sgid(struct mnt_idmap *idmap,
2b3416ce
YX
2583 const struct inode *dir, umode_t mode)
2584{
2585 if ((mode & (S_ISGID | S_IXGRP)) != (S_ISGID | S_IXGRP))
2586 return mode;
2587 if (S_ISDIR(mode) || !dir || !(dir->i_mode & S_ISGID))
2588 return mode;
e67fe633 2589 if (in_group_or_capable(idmap, dir, i_gid_into_vfsgid(idmap, dir)))
2b3416ce 2590 return mode;
2b3416ce
YX
2591 return mode & ~S_ISGID;
2592}
2593EXPORT_SYMBOL(mode_strip_sgid);