blob: 6f9feddc3674a8e34da9aee8be08b2c38aa2a59b [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * linux/fs/file_table.c
4 *
5 * Copyright (C) 1991, 1992 Linus Torvalds
6 * Copyright (C) 1997 David S. Miller ([email protected])
7 */
8
9#include <linux/string.h>
10#include <linux/slab.h>
11#include <linux/file.h>
Al Viro9f3acc32008-04-24 07:44:08 -040012#include <linux/fdtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070013#include <linux/init.h>
14#include <linux/module.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/fs.h>
Jeff Layton5970e152022-11-20 09:15:34 -050016#include <linux/filelock.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070017#include <linux/security.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +010018#include <linux/cred.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <linux/eventpoll.h>
Dipankar Sarmaab2af1f2005-09-09 13:04:13 -070020#include <linux/rcupdate.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021#include <linux/mount.h>
Randy Dunlap16f7e0f2006-01-11 12:17:46 -080022#include <linux/capability.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023#include <linux/cdev.h>
Robert Love0eeca282005-07-12 17:06:03 -040024#include <linux/fsnotify.h>
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080025#include <linux/sysctl.h>
26#include <linux/percpu_counter.h>
Nick Piggin6416ccb2010-08-18 04:37:38 +100027#include <linux/percpu.h>
Al Viro4a9d4b02012-06-24 09:56:45 +040028#include <linux/task_work.h>
Al Viro0552f872009-12-16 04:53:03 -050029#include <linux/ima.h>
Mel Gorman4248b0d2015-08-06 15:46:20 -070030#include <linux/swap.h>
Luis Chamberlaina3580ac2022-02-14 18:08:28 -080031#include <linux/kmemleak.h>
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080032
Arun Sharma600634972011-07-26 16:09:06 -070033#include <linux/atomic.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070034
Eric Parise81e3f42009-12-04 15:47:36 -050035#include "internal.h"
36
Linus Torvalds1da177e2005-04-16 15:20:36 -070037/* sysctl tunables... */
Luis Chamberlain204d5a22022-01-21 22:12:56 -080038static struct files_stat_struct files_stat = {
Linus Torvalds1da177e2005-04-16 15:20:36 -070039 .max_files = NR_FILE
40};
41
Eric Dumazetb6b3fde2008-12-10 09:35:45 -080042/* SLAB cache for file structures */
43static struct kmem_cache *filp_cachep __read_mostly;
44
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080045static struct percpu_counter nr_files __cacheline_aligned_in_smp;
Linus Torvalds1da177e2005-04-16 15:20:36 -070046
Amir Goldstein62d53c42023-06-15 14:22:28 +030047/* Container for backing file with optional real path */
48struct backing_file {
49 struct file file;
50 struct path real_path;
51};
52
53static inline struct backing_file *backing_file(struct file *f)
54{
55 return container_of(f, struct backing_file, file);
56}
57
58struct path *backing_file_real_path(struct file *f)
59{
60 return &backing_file(f)->real_path;
61}
62EXPORT_SYMBOL_GPL(backing_file_real_path);
63
Al Viro5c33b182012-07-20 23:05:59 +040064static void file_free_rcu(struct rcu_head *head)
Dipankar Sarmaab2af1f2005-09-09 13:04:13 -070065{
Al Viroe87f2c22022-05-22 09:28:12 -040066 struct file *f = container_of(head, struct file, f_rcuhead);
David Howellsd76b0d92008-11-14 10:39:25 +110067
68 put_cred(f->f_cred);
Amir Goldstein62d53c42023-06-15 14:22:28 +030069 if (unlikely(f->f_mode & FMODE_BACKING))
70 kfree(backing_file(f));
71 else
72 kmem_cache_free(filp_cachep, f);
Dipankar Sarmaab2af1f2005-09-09 13:04:13 -070073}
74
Linus Torvalds1da177e2005-04-16 15:20:36 -070075static inline void file_free(struct file *f)
76{
Al Viroe8cff842018-07-09 11:24:21 -040077 security_file_free(f);
Amir Goldstein62d53c42023-06-15 14:22:28 +030078 if (unlikely(f->f_mode & FMODE_BACKING))
79 path_put(backing_file_real_path(f));
80 if (likely(!(f->f_mode & FMODE_NOACCOUNT)))
Miklos Szeredid3b10842018-07-18 15:44:40 +020081 percpu_counter_dec(&nr_files);
Al Viroe87f2c22022-05-22 09:28:12 -040082 call_rcu(&f->f_rcuhead, file_free_rcu);
Linus Torvalds1da177e2005-04-16 15:20:36 -070083}
84
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080085/*
86 * Return the total number of open files in the system
87 */
Eric Dumazet518de9b2010-10-26 14:22:44 -070088static long get_nr_files(void)
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080089{
90 return percpu_counter_read_positive(&nr_files);
91}
92
93/*
94 * Return the maximum number of open files in the system
95 */
Eric Dumazet518de9b2010-10-26 14:22:44 -070096unsigned long get_max_files(void)
Dipankar Sarma529bf6b2006-03-07 21:55:35 -080097{
98 return files_stat.max_files;
99}
100EXPORT_SYMBOL_GPL(get_max_files);
101
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800102#if defined(CONFIG_SYSCTL) && defined(CONFIG_PROC_FS)
103
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800104/*
105 * Handle nr_files sysctl
106 */
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800107static int proc_nr_files(struct ctl_table *table, int write, void *buffer,
108 size_t *lenp, loff_t *ppos)
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800109{
110 files_stat.nr_files = get_nr_files();
Eric Dumazet518de9b2010-10-26 14:22:44 -0700111 return proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800112}
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800113
114static struct ctl_table fs_stat_sysctls[] = {
115 {
116 .procname = "file-nr",
117 .data = &files_stat,
118 .maxlen = sizeof(files_stat),
119 .mode = 0444,
120 .proc_handler = proc_nr_files,
121 },
122 {
123 .procname = "file-max",
124 .data = &files_stat.max_files,
125 .maxlen = sizeof(files_stat.max_files),
126 .mode = 0644,
127 .proc_handler = proc_doulongvec_minmax,
128 .extra1 = SYSCTL_LONG_ZERO,
129 .extra2 = SYSCTL_LONG_MAX,
130 },
131 {
132 .procname = "nr_open",
133 .data = &sysctl_nr_open,
134 .maxlen = sizeof(unsigned int),
135 .mode = 0644,
Jinliang Zheng5aa2d3a2024-11-24 11:46:36 +0800136 .proc_handler = proc_douintvec_minmax,
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800137 .extra1 = &sysctl_nr_open_min,
138 .extra2 = &sysctl_nr_open_max,
139 },
140 { }
141};
142
143static int __init init_fs_stat_sysctls(void)
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800144{
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800145 register_sysctl_init("fs", fs_stat_sysctls);
Luis Chamberlaina3580ac2022-02-14 18:08:28 -0800146 if (IS_ENABLED(CONFIG_BINFMT_MISC)) {
147 struct ctl_table_header *hdr;
148 hdr = register_sysctl_mount_point("fs/binfmt_misc");
149 kmemleak_not_leak(hdr);
150 }
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800151 return 0;
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800152}
Luis Chamberlain204d5a22022-01-21 22:12:56 -0800153fs_initcall(init_fs_stat_sysctls);
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800154#endif
155
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300156static int init_file(struct file *f, int flags, const struct cred *cred)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700157{
Al Viro1afc99b2013-02-14 20:41:04 -0500158 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700159
Tetsuo Handa78d29782011-02-04 18:13:24 +0000160 f->f_cred = get_cred(cred);
Al Viro1afc99b2013-02-14 20:41:04 -0500161 error = security_file_alloc(f);
162 if (unlikely(error)) {
Amir Goldsteindff745c2023-07-01 20:11:34 +0300163 put_cred(f->f_cred);
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300164 return error;
Al Viro1afc99b2013-02-14 20:41:04 -0500165 }
Kirill Korotaevaf4d2ec2005-06-23 00:09:50 -0700166
Al Viro516e0cc2008-07-26 00:39:17 -0400167 atomic_long_set(&f->f_count, 1);
Benjamin LaHaise5a6b7952006-03-23 03:01:03 -0800168 rwlock_init(&f->f_owner.lock);
Jonathan Corbet68499912009-02-06 13:52:43 -0700169 spin_lock_init(&f->f_lock);
Linus Torvalds9c225f22014-03-03 09:36:58 -0800170 mutex_init(&f->f_pos_lock);
Al Viroea73ea72018-07-11 15:00:04 -0400171 f->f_flags = flags;
172 f->f_mode = OPEN_FMODE(flags);
Benjamin LaHaise5a6b7952006-03-23 03:01:03 -0800173 /* f->f_version: 0 */
Miklos Szeredid3b10842018-07-18 15:44:40 +0200174
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300175 return 0;
Miklos Szeredid3b10842018-07-18 15:44:40 +0200176}
177
178/* Find an unused file structure and return a pointer to it.
179 * Returns an error pointer if some error happend e.g. we over file
180 * structures limit, run out of memory or operation is not permitted.
181 *
182 * Be very careful using this. You are responsible for
183 * getting write access to any mount that you might assign
184 * to this filp, if it is opened for write. If this is not
185 * done, you will imbalance int the mount's writer count
186 * and a warning at __fput() time.
187 */
188struct file *alloc_empty_file(int flags, const struct cred *cred)
189{
190 static long old_max;
191 struct file *f;
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300192 int error;
Miklos Szeredid3b10842018-07-18 15:44:40 +0200193
194 /*
195 * Privileged users can go above max_files
196 */
197 if (get_nr_files() >= files_stat.max_files && !capable(CAP_SYS_ADMIN)) {
198 /*
199 * percpu_counters are inaccurate. Do an expensive check before
200 * we go and fail.
201 */
202 if (percpu_counter_sum_positive(&nr_files) >= files_stat.max_files)
203 goto over;
204 }
205
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300206 f = kmem_cache_zalloc(filp_cachep, GFP_KERNEL);
207 if (unlikely(!f))
208 return ERR_PTR(-ENOMEM);
209
210 error = init_file(f, flags, cred);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300211 if (unlikely(error)) {
212 kmem_cache_free(filp_cachep, f);
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300213 return ERR_PTR(error);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300214 }
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300215
216 percpu_counter_inc(&nr_files);
Miklos Szeredid3b10842018-07-18 15:44:40 +0200217
Kirill Korotaevaf4d2ec2005-06-23 00:09:50 -0700218 return f;
219
220over:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700221 /* Ran out of filps - report that */
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800222 if (get_nr_files() > old_max) {
Eric Dumazet518de9b2010-10-26 14:22:44 -0700223 pr_info("VFS: file-max limit %lu reached\n", get_max_files());
Dipankar Sarma529bf6b2006-03-07 21:55:35 -0800224 old_max = get_nr_files();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700225 }
Al Viro1afc99b2013-02-14 20:41:04 -0500226 return ERR_PTR(-ENFILE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227}
228
Miklos Szeredid3b10842018-07-18 15:44:40 +0200229/*
230 * Variant of alloc_empty_file() that doesn't check and modify nr_files.
231 *
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300232 * This is only for kernel internal use, and the allocate file must not be
233 * installed into file tables or such.
Miklos Szeredid3b10842018-07-18 15:44:40 +0200234 */
235struct file *alloc_empty_file_noaccount(int flags, const struct cred *cred)
236{
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300237 struct file *f;
238 int error;
Miklos Szeredid3b10842018-07-18 15:44:40 +0200239
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300240 f = kmem_cache_zalloc(filp_cachep, GFP_KERNEL);
241 if (unlikely(!f))
242 return ERR_PTR(-ENOMEM);
243
244 error = init_file(f, flags, cred);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300245 if (unlikely(error)) {
246 kmem_cache_free(filp_cachep, f);
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300247 return ERR_PTR(error);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300248 }
Amir Goldstein8a05a8c2023-06-15 14:22:27 +0300249
250 f->f_mode |= FMODE_NOACCOUNT;
Miklos Szeredid3b10842018-07-18 15:44:40 +0200251
252 return f;
253}
254
Amir Goldstein62d53c42023-06-15 14:22:28 +0300255/*
256 * Variant of alloc_empty_file() that allocates a backing_file container
257 * and doesn't check and modify nr_files.
258 *
259 * This is only for kernel internal use, and the allocate file must not be
260 * installed into file tables or such.
261 */
262struct file *alloc_empty_backing_file(int flags, const struct cred *cred)
263{
264 struct backing_file *ff;
265 int error;
266
267 ff = kzalloc(sizeof(struct backing_file), GFP_KERNEL);
268 if (unlikely(!ff))
269 return ERR_PTR(-ENOMEM);
270
271 error = init_file(&ff->file, flags, cred);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300272 if (unlikely(error)) {
273 kfree(ff);
Amir Goldstein62d53c42023-06-15 14:22:28 +0300274 return ERR_PTR(error);
Amir Goldsteindff745c2023-07-01 20:11:34 +0300275 }
Amir Goldstein62d53c42023-06-15 14:22:28 +0300276
277 ff->file.f_mode |= FMODE_BACKING | FMODE_NOACCOUNT;
278 return &ff->file;
279}
280
Dave Hansence8d2cd2007-10-16 23:31:13 -0700281/**
282 * alloc_file - allocate and initialize a 'struct file'
Eric Biggersa4576062014-10-12 14:29:29 -0500283 *
284 * @path: the (dentry, vfsmount) pair for the new file
Al Viroc9c554f2018-07-11 14:19:04 -0400285 * @flags: O_... flags with which the new file will be opened
Dave Hansence8d2cd2007-10-16 23:31:13 -0700286 * @fop: the 'struct file_operations' for the new file
Dave Hansence8d2cd2007-10-16 23:31:13 -0700287 */
Al Viroee1904b2018-06-17 14:21:27 -0400288static struct file *alloc_file(const struct path *path, int flags,
Al Viro2c48b9c2009-08-09 00:52:35 +0400289 const struct file_operations *fop)
Dave Hansence8d2cd2007-10-16 23:31:13 -0700290{
291 struct file *file;
Dave Hansence8d2cd2007-10-16 23:31:13 -0700292
Al Viroea73ea72018-07-11 15:00:04 -0400293 file = alloc_empty_file(flags, current_cred());
Al Viro1afc99b2013-02-14 20:41:04 -0500294 if (IS_ERR(file))
Anatol Pomozov39b652522012-09-12 20:11:55 -0700295 return file;
Dave Hansence8d2cd2007-10-16 23:31:13 -0700296
Al Viro2c48b9c2009-08-09 00:52:35 +0400297 file->f_path = *path;
Al Virodd379782013-03-01 19:48:30 -0500298 file->f_inode = path->dentry->d_inode;
Al Viro2c48b9c2009-08-09 00:52:35 +0400299 file->f_mapping = path->dentry->d_inode->i_mapping;
Jeff Layton5660e132017-07-06 07:02:25 -0400300 file->f_wb_err = filemap_sample_wb_err(file->f_mapping);
Jeff Layton735e4ae2020-06-01 21:45:36 -0700301 file->f_sb_err = file_sample_sb_err(file);
Jason A. Donenfeld868941b2022-06-29 15:07:00 +0200302 if (fop->llseek)
Jason A. Donenfelde7478152022-06-29 15:06:57 +0200303 file->f_mode |= FMODE_LSEEK;
Al Viroc9c554f2018-07-11 14:19:04 -0400304 if ((file->f_mode & FMODE_READ) &&
Al Viro84363182015-04-04 01:14:53 -0400305 likely(fop->read || fop->read_iter))
Al Viroc9c554f2018-07-11 14:19:04 -0400306 file->f_mode |= FMODE_CAN_READ;
307 if ((file->f_mode & FMODE_WRITE) &&
Al Viro84363182015-04-04 01:14:53 -0400308 likely(fop->write || fop->write_iter))
Al Viroc9c554f2018-07-11 14:19:04 -0400309 file->f_mode |= FMODE_CAN_WRITE;
Al Viro164f40642022-05-22 11:38:11 -0400310 file->f_iocb_flags = iocb_flags(file);
Al Virof5d11402018-07-09 02:35:08 -0400311 file->f_mode |= FMODE_OPENED;
Dave Hansence8d2cd2007-10-16 23:31:13 -0700312 file->f_op = fop;
Al Viroc9c554f2018-07-11 14:19:04 -0400313 if ((file->f_mode & (FMODE_READ | FMODE_WRITE)) == FMODE_READ)
Mimi Zohar890275b52010-11-02 10:13:07 -0400314 i_readcount_inc(path->dentry->d_inode);
Al Viro3d1e4632009-08-08 23:56:29 +0400315 return file;
Dave Hansence8d2cd2007-10-16 23:31:13 -0700316}
Dave Hansence8d2cd2007-10-16 23:31:13 -0700317
Al Virod93aa9d2018-06-09 09:40:05 -0400318struct file *alloc_file_pseudo(struct inode *inode, struct vfsmount *mnt,
319 const char *name, int flags,
320 const struct file_operations *fops)
321{
322 static const struct dentry_operations anon_ops = {
323 .d_dname = simple_dname
324 };
325 struct qstr this = QSTR_INIT(name, strlen(name));
326 struct path path;
327 struct file *file;
328
329 path.dentry = d_alloc_pseudo(mnt->mnt_sb, &this);
330 if (!path.dentry)
331 return ERR_PTR(-ENOMEM);
332 if (!mnt->mnt_sb->s_d_op)
333 d_set_d_op(path.dentry, &anon_ops);
334 path.mnt = mntget(mnt);
335 d_instantiate(path.dentry, inode);
Mel Gormanb6509f6a2020-06-29 15:41:45 +0100336 file = alloc_file(&path, flags, fops);
Al Virod93aa9d2018-06-09 09:40:05 -0400337 if (IS_ERR(file)) {
338 ihold(inode);
339 path_put(&path);
340 }
341 return file;
342}
343EXPORT_SYMBOL(alloc_file_pseudo);
344
Al Viro183266f2018-06-17 14:15:10 -0400345struct file *alloc_file_clone(struct file *base, int flags,
346 const struct file_operations *fops)
347{
348 struct file *f = alloc_file(&base->f_path, flags, fops);
349 if (!IS_ERR(f)) {
350 path_get(&f->f_path);
351 f->f_mapping = base->f_mapping;
352 }
353 return f;
354}
355
Al Virod7065da2010-05-26 15:13:55 -0400356/* the real guts of fput() - releasing the last reference to file
Linus Torvalds1da177e2005-04-16 15:20:36 -0700357 */
Al Virod7065da2010-05-26 15:13:55 -0400358static void __fput(struct file *file)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700359{
Josef "Jeff" Sipek0f7fc9e2006-12-08 02:36:35 -0800360 struct dentry *dentry = file->f_path.dentry;
361 struct vfsmount *mnt = file->f_path.mnt;
David Howellsc77cece2013-06-13 23:37:49 +0100362 struct inode *inode = file->f_inode;
Al Viroa07b2002018-11-05 17:40:30 +0000363 fmode_t mode = file->f_mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364
Al Viro4d27f322018-07-09 11:14:39 -0400365 if (unlikely(!(file->f_mode & FMODE_OPENED)))
366 goto out;
367
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368 might_sleep();
Robert Love0eeca282005-07-12 17:06:03 -0400369
370 fsnotify_close(file);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700371 /*
372 * The function eventpoll_release() should be the first called
373 * in the file cleanup chain.
374 */
375 eventpoll_release(file);
Jeff Layton78ed8a12014-02-03 12:13:08 -0500376 locks_remove_file(file);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700377
Mimi Zoharbb02b182017-06-21 21:13:18 -0400378 ima_file_free(file);
Al Viro233e70f2008-10-31 23:28:30 +0000379 if (unlikely(file->f_flags & FASYNC)) {
Al Viro72c2d532013-09-22 16:27:52 -0400380 if (file->f_op->fasync)
Al Viro233e70f2008-10-31 23:28:30 +0000381 file->f_op->fasync(-1, file, 0);
382 }
Al Viro72c2d532013-09-22 16:27:52 -0400383 if (file->f_op->release)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384 file->f_op->release(inode, file);
Ken Hofsassc39c14c2022-06-28 10:16:10 -0700385 security_file_pre_free(file);
Miklos Szeredi60ed8cf2011-03-16 18:17:54 +0100386 if (unlikely(S_ISCHR(inode->i_mode) && inode->i_cdev != NULL &&
Al Viroa07b2002018-11-05 17:40:30 +0000387 !(mode & FMODE_PATH))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700388 cdev_put(inode->i_cdev);
Miklos Szeredi60ed8cf2011-03-16 18:17:54 +0100389 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700390 fops_put(file->f_op);
Eric W. Biederman609d7fa2006-10-02 02:17:15 -0700391 put_pid(file->f_owner.pid);
Amir Goldsteind6da19c2022-08-16 17:53:17 +0300392 put_file_access(file);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 dput(dentry);
Al Viroa07b2002018-11-05 17:40:30 +0000394 if (unlikely(mode & FMODE_NEED_UNMOUNT))
395 dissolve_on_fput(mnt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700396 mntput(mnt);
Al Viro4d27f322018-07-09 11:14:39 -0400397out:
398 file_free(file);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700399}
400
Oleg Nesterov4f5e65a2013-07-08 14:24:16 -0700401static LLIST_HEAD(delayed_fput_list);
Al Viro4a9d4b02012-06-24 09:56:45 +0400402static void delayed_fput(struct work_struct *unused)
403{
Oleg Nesterov4f5e65a2013-07-08 14:24:16 -0700404 struct llist_node *node = llist_del_all(&delayed_fput_list);
Byungchul Parkb9ea5572017-08-07 17:45:39 +0900405 struct file *f, *t;
Oleg Nesterov4f5e65a2013-07-08 14:24:16 -0700406
Al Viroe87f2c22022-05-22 09:28:12 -0400407 llist_for_each_entry_safe(f, t, node, f_llist)
Byungchul Parkb9ea5572017-08-07 17:45:39 +0900408 __fput(f);
Al Viro4a9d4b02012-06-24 09:56:45 +0400409}
410
411static void ____fput(struct callback_head *work)
412{
Al Viroe87f2c22022-05-22 09:28:12 -0400413 __fput(container_of(work, struct file, f_rcuhead));
Al Viro4a9d4b02012-06-24 09:56:45 +0400414}
415
416/*
417 * If kernel thread really needs to have the final fput() it has done
418 * to complete, call this. The only user right now is the boot - we
419 * *do* need to make sure our writes to binaries on initramfs has
420 * not left us with opened struct file waiting for __fput() - execve()
421 * won't work without that. Please, don't add more callers without
422 * very good reasons; in particular, never call that with locks
423 * held and never call that from a thread that might need to do
424 * some work on any kind of umount.
425 */
426void flush_delayed_fput(void)
427{
428 delayed_fput(NULL);
429}
Trond Myklebust7239a402019-08-18 14:18:47 -0400430EXPORT_SYMBOL_GPL(flush_delayed_fput);
Al Viro4a9d4b02012-06-24 09:56:45 +0400431
Al Viroc7314d72013-10-20 08:44:39 -0400432static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput);
Al Viro4a9d4b02012-06-24 09:56:45 +0400433
Gou Hao81132a32021-11-02 10:46:48 +0800434void fput(struct file *file)
Al Virod7065da2010-05-26 15:13:55 -0400435{
Gou Hao81132a32021-11-02 10:46:48 +0800436 if (atomic_long_dec_and_test(&file->f_count)) {
Al Viro4a9d4b02012-06-24 09:56:45 +0400437 struct task_struct *task = current;
Oleg Nesterove7b2c402013-06-14 21:09:47 +0200438
Oleg Nesterove7b2c402013-06-14 21:09:47 +0200439 if (likely(!in_interrupt() && !(task->flags & PF_KTHREAD))) {
Al Viroe87f2c22022-05-22 09:28:12 -0400440 init_task_work(&file->f_rcuhead, ____fput);
441 if (!task_work_add(task, &file->f_rcuhead, TWA_RESUME))
Oleg Nesterove7b2c402013-06-14 21:09:47 +0200442 return;
Andrew Morton64372502013-07-08 14:24:15 -0700443 /*
444 * After this task has run exit_task_work(),
Andrew Mortonbe49b302013-09-11 14:24:34 -0700445 * task_work_add() will fail. Fall through to delayed
Andrew Morton64372502013-07-08 14:24:15 -0700446 * fput to avoid leaking *file.
447 */
Al Viro4a9d4b02012-06-24 09:56:45 +0400448 }
Oleg Nesterov4f5e65a2013-07-08 14:24:16 -0700449
Al Viroe87f2c22022-05-22 09:28:12 -0400450 if (llist_add(&file->f_llist, &delayed_fput_list))
Al Viroc7314d72013-10-20 08:44:39 -0400451 schedule_delayed_work(&delayed_fput_work, 1);
Al Viro4a9d4b02012-06-24 09:56:45 +0400452 }
453}
454
455/*
456 * synchronous analog of fput(); for kernel threads that might be needed
457 * in some umount() (and thus can't use flush_delayed_fput() without
458 * risking deadlocks), need to wait for completion of __fput() and know
459 * for this specific struct file it won't involve anything that would
460 * need them. Use only if you really need it - at the very least,
461 * don't blindly convert fput() by kernel thread to that.
462 */
463void __fput_sync(struct file *file)
464{
Linus Torvalds021a1602023-08-08 19:26:35 +0200465 if (atomic_long_dec_and_test(&file->f_count))
Al Virod7065da2010-05-26 15:13:55 -0400466 __fput(file);
467}
468
469EXPORT_SYMBOL(fput);
Trond Myklebustf0043202022-04-03 15:58:11 -0400470EXPORT_SYMBOL(__fput_sync);
Al Virod7065da2010-05-26 15:13:55 -0400471
Mel Gorman4248b0d2015-08-06 15:46:20 -0700472void __init files_init(void)
Byungchul Parkb9ea5572017-08-07 17:45:39 +0900473{
Eric Dumazetb6b3fde2008-12-10 09:35:45 -0800474 filp_cachep = kmem_cache_create("filp", sizeof(struct file), 0,
Shakeel Buttf3f7c092017-11-15 17:35:44 -0800475 SLAB_HWCACHE_ALIGN | SLAB_PANIC | SLAB_ACCOUNT, NULL);
Tejun Heo908c7f12014-09-08 09:51:29 +0900476 percpu_counter_init(&nr_files, 0, GFP_KERNEL);
Mel Gorman4248b0d2015-08-06 15:46:20 -0700477}
478
479/*
480 * One file with associated inode and dcache is very roughly 1K. Per default
481 * do not use more than 10% of our memory for files.
482 */
483void __init files_maxfiles_init(void)
484{
485 unsigned long n;
Arun KSca79b0c2018-12-28 00:34:29 -0800486 unsigned long nr_pages = totalram_pages();
Arun KS3d6357d2018-12-28 00:34:20 -0800487 unsigned long memreserve = (nr_pages - nr_free_pages()) * 3/2;
Mel Gorman4248b0d2015-08-06 15:46:20 -0700488
Arun KS3d6357d2018-12-28 00:34:20 -0800489 memreserve = min(memreserve, nr_pages - 1);
490 n = ((nr_pages - memreserve) * (PAGE_SIZE / 1024)) / 10;
Mel Gorman4248b0d2015-08-06 15:46:20 -0700491
492 files_stat.max_files = max_t(unsigned long, n, NR_FILE);
Byungchul Parkb9ea5572017-08-07 17:45:39 +0900493}