diff options
Diffstat (limited to 'fs')
44 files changed, 887 insertions, 719 deletions
diff --git a/fs/afs/proc.c b/fs/afs/proc.c index 7578c1ab9e0b..8630615e57fe 100644 --- a/fs/afs/proc.c +++ b/fs/afs/proc.c | |||
@@ -146,7 +146,6 @@ int afs_proc_init(void) | |||
146 | proc_afs = proc_mkdir("fs/afs", NULL); | 146 | proc_afs = proc_mkdir("fs/afs", NULL); |
147 | if (!proc_afs) | 147 | if (!proc_afs) |
148 | goto error_dir; | 148 | goto error_dir; |
149 | proc_afs->owner = THIS_MODULE; | ||
150 | 149 | ||
151 | p = proc_create("cells", 0, proc_afs, &afs_proc_cells_fops); | 150 | p = proc_create("cells", 0, proc_afs, &afs_proc_cells_fops); |
152 | if (!p) | 151 | if (!p) |
diff --git a/fs/autofs4/autofs_i.h b/fs/autofs4/autofs_i.h index a76803108d06..b7ff33c63101 100644 --- a/fs/autofs4/autofs_i.h +++ b/fs/autofs4/autofs_i.h | |||
@@ -186,6 +186,8 @@ int autofs4_expire_wait(struct dentry *dentry); | |||
186 | int autofs4_expire_run(struct super_block *, struct vfsmount *, | 186 | int autofs4_expire_run(struct super_block *, struct vfsmount *, |
187 | struct autofs_sb_info *, | 187 | struct autofs_sb_info *, |
188 | struct autofs_packet_expire __user *); | 188 | struct autofs_packet_expire __user *); |
189 | int autofs4_do_expire_multi(struct super_block *sb, struct vfsmount *mnt, | ||
190 | struct autofs_sb_info *sbi, int when); | ||
189 | int autofs4_expire_multi(struct super_block *, struct vfsmount *, | 191 | int autofs4_expire_multi(struct super_block *, struct vfsmount *, |
190 | struct autofs_sb_info *, int __user *); | 192 | struct autofs_sb_info *, int __user *); |
191 | struct dentry *autofs4_expire_direct(struct super_block *sb, | 193 | struct dentry *autofs4_expire_direct(struct super_block *sb, |
diff --git a/fs/autofs4/dev-ioctl.c b/fs/autofs4/dev-ioctl.c index 025e105bffea..9e5ae8a4f5c8 100644 --- a/fs/autofs4/dev-ioctl.c +++ b/fs/autofs4/dev-ioctl.c | |||
@@ -525,40 +525,13 @@ static int autofs_dev_ioctl_expire(struct file *fp, | |||
525 | struct autofs_sb_info *sbi, | 525 | struct autofs_sb_info *sbi, |
526 | struct autofs_dev_ioctl *param) | 526 | struct autofs_dev_ioctl *param) |
527 | { | 527 | { |
528 | struct dentry *dentry; | ||
529 | struct vfsmount *mnt; | 528 | struct vfsmount *mnt; |
530 | int err = -EAGAIN; | ||
531 | int how; | 529 | int how; |
532 | 530 | ||
533 | how = param->expire.how; | 531 | how = param->expire.how; |
534 | mnt = fp->f_path.mnt; | 532 | mnt = fp->f_path.mnt; |
535 | 533 | ||
536 | if (autofs_type_trigger(sbi->type)) | 534 | return autofs4_do_expire_multi(sbi->sb, mnt, sbi, how); |
537 | dentry = autofs4_expire_direct(sbi->sb, mnt, sbi, how); | ||
538 | else | ||
539 | dentry = autofs4_expire_indirect(sbi->sb, mnt, sbi, how); | ||
540 | |||
541 | if (dentry) { | ||
542 | struct autofs_info *ino = autofs4_dentry_ino(dentry); | ||
543 | |||
544 | /* | ||
545 | * This is synchronous because it makes the daemon a | ||
546 | * little easier | ||
547 | */ | ||
548 | err = autofs4_wait(sbi, dentry, NFY_EXPIRE); | ||
549 | |||
550 | spin_lock(&sbi->fs_lock); | ||
551 | if (ino->flags & AUTOFS_INF_MOUNTPOINT) { | ||
552 | ino->flags &= ~AUTOFS_INF_MOUNTPOINT; | ||
553 | sbi->sb->s_root->d_mounted++; | ||
554 | } | ||
555 | ino->flags &= ~AUTOFS_INF_EXPIRING; | ||
556 | complete_all(&ino->expire_complete); | ||
557 | spin_unlock(&sbi->fs_lock); | ||
558 | dput(dentry); | ||
559 | } | ||
560 | |||
561 | return err; | ||
562 | } | 535 | } |
563 | 536 | ||
564 | /* Check if autofs mount point is in use */ | 537 | /* Check if autofs mount point is in use */ |
diff --git a/fs/autofs4/expire.c b/fs/autofs4/expire.c index e3bd50776f9e..75f7ddacf7d6 100644 --- a/fs/autofs4/expire.c +++ b/fs/autofs4/expire.c | |||
@@ -478,22 +478,16 @@ int autofs4_expire_run(struct super_block *sb, | |||
478 | return ret; | 478 | return ret; |
479 | } | 479 | } |
480 | 480 | ||
481 | /* Call repeatedly until it returns -EAGAIN, meaning there's nothing | 481 | int autofs4_do_expire_multi(struct super_block *sb, struct vfsmount *mnt, |
482 | more to be done */ | 482 | struct autofs_sb_info *sbi, int when) |
483 | int autofs4_expire_multi(struct super_block *sb, struct vfsmount *mnt, | ||
484 | struct autofs_sb_info *sbi, int __user *arg) | ||
485 | { | 483 | { |
486 | struct dentry *dentry; | 484 | struct dentry *dentry; |
487 | int ret = -EAGAIN; | 485 | int ret = -EAGAIN; |
488 | int do_now = 0; | ||
489 | |||
490 | if (arg && get_user(do_now, arg)) | ||
491 | return -EFAULT; | ||
492 | 486 | ||
493 | if (autofs_type_trigger(sbi->type)) | 487 | if (autofs_type_trigger(sbi->type)) |
494 | dentry = autofs4_expire_direct(sb, mnt, sbi, do_now); | 488 | dentry = autofs4_expire_direct(sb, mnt, sbi, when); |
495 | else | 489 | else |
496 | dentry = autofs4_expire_indirect(sb, mnt, sbi, do_now); | 490 | dentry = autofs4_expire_indirect(sb, mnt, sbi, when); |
497 | 491 | ||
498 | if (dentry) { | 492 | if (dentry) { |
499 | struct autofs_info *ino = autofs4_dentry_ino(dentry); | 493 | struct autofs_info *ino = autofs4_dentry_ino(dentry); |
@@ -516,3 +510,16 @@ int autofs4_expire_multi(struct super_block *sb, struct vfsmount *mnt, | |||
516 | return ret; | 510 | return ret; |
517 | } | 511 | } |
518 | 512 | ||
513 | /* Call repeatedly until it returns -EAGAIN, meaning there's nothing | ||
514 | more to be done */ | ||
515 | int autofs4_expire_multi(struct super_block *sb, struct vfsmount *mnt, | ||
516 | struct autofs_sb_info *sbi, int __user *arg) | ||
517 | { | ||
518 | int do_now = 0; | ||
519 | |||
520 | if (arg && get_user(do_now, arg)) | ||
521 | return -EFAULT; | ||
522 | |||
523 | return autofs4_do_expire_multi(sb, mnt, sbi, do_now); | ||
524 | } | ||
525 | |||
diff --git a/fs/autofs4/root.c b/fs/autofs4/root.c index 74b1469a9504..e383bf0334f1 100644 --- a/fs/autofs4/root.c +++ b/fs/autofs4/root.c | |||
@@ -485,22 +485,6 @@ static struct dentry *autofs4_lookup(struct inode *dir, struct dentry *dentry, s | |||
485 | DPRINTK("pid = %u, pgrp = %u, catatonic = %d, oz_mode = %d", | 485 | DPRINTK("pid = %u, pgrp = %u, catatonic = %d, oz_mode = %d", |
486 | current->pid, task_pgrp_nr(current), sbi->catatonic, oz_mode); | 486 | current->pid, task_pgrp_nr(current), sbi->catatonic, oz_mode); |
487 | 487 | ||
488 | expiring = autofs4_lookup_expiring(sbi, dentry->d_parent, &dentry->d_name); | ||
489 | if (expiring) { | ||
490 | /* | ||
491 | * If we are racing with expire the request might not | ||
492 | * be quite complete but the directory has been removed | ||
493 | * so it must have been successful, so just wait for it. | ||
494 | */ | ||
495 | ino = autofs4_dentry_ino(expiring); | ||
496 | autofs4_expire_wait(expiring); | ||
497 | spin_lock(&sbi->lookup_lock); | ||
498 | if (!list_empty(&ino->expiring)) | ||
499 | list_del_init(&ino->expiring); | ||
500 | spin_unlock(&sbi->lookup_lock); | ||
501 | dput(expiring); | ||
502 | } | ||
503 | |||
504 | unhashed = autofs4_lookup_active(sbi, dentry->d_parent, &dentry->d_name); | 488 | unhashed = autofs4_lookup_active(sbi, dentry->d_parent, &dentry->d_name); |
505 | if (unhashed) | 489 | if (unhashed) |
506 | dentry = unhashed; | 490 | dentry = unhashed; |
@@ -538,14 +522,31 @@ static struct dentry *autofs4_lookup(struct inode *dir, struct dentry *dentry, s | |||
538 | } | 522 | } |
539 | 523 | ||
540 | if (!oz_mode) { | 524 | if (!oz_mode) { |
525 | mutex_unlock(&dir->i_mutex); | ||
526 | expiring = autofs4_lookup_expiring(sbi, | ||
527 | dentry->d_parent, | ||
528 | &dentry->d_name); | ||
529 | if (expiring) { | ||
530 | /* | ||
531 | * If we are racing with expire the request might not | ||
532 | * be quite complete but the directory has been removed | ||
533 | * so it must have been successful, so just wait for it. | ||
534 | */ | ||
535 | ino = autofs4_dentry_ino(expiring); | ||
536 | autofs4_expire_wait(expiring); | ||
537 | spin_lock(&sbi->lookup_lock); | ||
538 | if (!list_empty(&ino->expiring)) | ||
539 | list_del_init(&ino->expiring); | ||
540 | spin_unlock(&sbi->lookup_lock); | ||
541 | dput(expiring); | ||
542 | } | ||
543 | |||
541 | spin_lock(&dentry->d_lock); | 544 | spin_lock(&dentry->d_lock); |
542 | dentry->d_flags |= DCACHE_AUTOFS_PENDING; | 545 | dentry->d_flags |= DCACHE_AUTOFS_PENDING; |
543 | spin_unlock(&dentry->d_lock); | 546 | spin_unlock(&dentry->d_lock); |
544 | if (dentry->d_op && dentry->d_op->d_revalidate) { | 547 | if (dentry->d_op && dentry->d_op->d_revalidate) |
545 | mutex_unlock(&dir->i_mutex); | ||
546 | (dentry->d_op->d_revalidate)(dentry, nd); | 548 | (dentry->d_op->d_revalidate)(dentry, nd); |
547 | mutex_lock(&dir->i_mutex); | 549 | mutex_lock(&dir->i_mutex); |
548 | } | ||
549 | } | 550 | } |
550 | 551 | ||
551 | /* | 552 | /* |
diff --git a/fs/btrfs/ctree.h b/fs/btrfs/ctree.h index 5e1d4e30e9d8..7dd1b6d0bf32 100644 --- a/fs/btrfs/ctree.h +++ b/fs/btrfs/ctree.h | |||
@@ -2060,7 +2060,7 @@ int btrfs_merge_bio_hook(struct page *page, unsigned long offset, | |||
2060 | unsigned long btrfs_force_ra(struct address_space *mapping, | 2060 | unsigned long btrfs_force_ra(struct address_space *mapping, |
2061 | struct file_ra_state *ra, struct file *file, | 2061 | struct file_ra_state *ra, struct file *file, |
2062 | pgoff_t offset, pgoff_t last_index); | 2062 | pgoff_t offset, pgoff_t last_index); |
2063 | int btrfs_page_mkwrite(struct vm_area_struct *vma, struct page *page); | 2063 | int btrfs_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf); |
2064 | int btrfs_readpage(struct file *file, struct page *page); | 2064 | int btrfs_readpage(struct file *file, struct page *page); |
2065 | void btrfs_delete_inode(struct inode *inode); | 2065 | void btrfs_delete_inode(struct inode *inode); |
2066 | void btrfs_put_inode(struct inode *inode); | 2066 | void btrfs_put_inode(struct inode *inode); |
diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c index 7d4f948bc22a..17e608c4dc70 100644 --- a/fs/btrfs/inode.c +++ b/fs/btrfs/inode.c | |||
@@ -4292,8 +4292,9 @@ static void btrfs_invalidatepage(struct page *page, unsigned long offset) | |||
4292 | * beyond EOF, then the page is guaranteed safe against truncation until we | 4292 | * beyond EOF, then the page is guaranteed safe against truncation until we |
4293 | * unlock the page. | 4293 | * unlock the page. |
4294 | */ | 4294 | */ |
4295 | int btrfs_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 4295 | int btrfs_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
4296 | { | 4296 | { |
4297 | struct page *page = vmf->page; | ||
4297 | struct inode *inode = fdentry(vma->vm_file)->d_inode; | 4298 | struct inode *inode = fdentry(vma->vm_file)->d_inode; |
4298 | struct btrfs_root *root = BTRFS_I(inode)->root; | 4299 | struct btrfs_root *root = BTRFS_I(inode)->root; |
4299 | struct extent_io_tree *io_tree = &BTRFS_I(inode)->io_tree; | 4300 | struct extent_io_tree *io_tree = &BTRFS_I(inode)->io_tree; |
@@ -4306,10 +4307,15 @@ int btrfs_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
4306 | u64 page_end; | 4307 | u64 page_end; |
4307 | 4308 | ||
4308 | ret = btrfs_check_data_free_space(root, inode, PAGE_CACHE_SIZE); | 4309 | ret = btrfs_check_data_free_space(root, inode, PAGE_CACHE_SIZE); |
4309 | if (ret) | 4310 | if (ret) { |
4311 | if (ret == -ENOMEM) | ||
4312 | ret = VM_FAULT_OOM; | ||
4313 | else /* -ENOSPC, -EIO, etc */ | ||
4314 | ret = VM_FAULT_SIGBUS; | ||
4310 | goto out; | 4315 | goto out; |
4316 | } | ||
4311 | 4317 | ||
4312 | ret = -EINVAL; | 4318 | ret = VM_FAULT_NOPAGE; /* make the VM retry the fault */ |
4313 | again: | 4319 | again: |
4314 | lock_page(page); | 4320 | lock_page(page); |
4315 | size = i_size_read(inode); | 4321 | size = i_size_read(inode); |
diff --git a/fs/buffer.c b/fs/buffer.c index a2fd743d97cb..f5f8b15a6e40 100644 --- a/fs/buffer.c +++ b/fs/buffer.c | |||
@@ -290,7 +290,7 @@ static void free_more_memory(void) | |||
290 | &zone); | 290 | &zone); |
291 | if (zone) | 291 | if (zone) |
292 | try_to_free_pages(node_zonelist(nid, GFP_NOFS), 0, | 292 | try_to_free_pages(node_zonelist(nid, GFP_NOFS), 0, |
293 | GFP_NOFS); | 293 | GFP_NOFS, NULL); |
294 | } | 294 | } |
295 | } | 295 | } |
296 | 296 | ||
@@ -547,6 +547,39 @@ repeat: | |||
547 | return err; | 547 | return err; |
548 | } | 548 | } |
549 | 549 | ||
550 | void do_thaw_all(unsigned long unused) | ||
551 | { | ||
552 | struct super_block *sb; | ||
553 | char b[BDEVNAME_SIZE]; | ||
554 | |||
555 | spin_lock(&sb_lock); | ||
556 | restart: | ||
557 | list_for_each_entry(sb, &super_blocks, s_list) { | ||
558 | sb->s_count++; | ||
559 | spin_unlock(&sb_lock); | ||
560 | down_read(&sb->s_umount); | ||
561 | while (sb->s_bdev && !thaw_bdev(sb->s_bdev, sb)) | ||
562 | printk(KERN_WARNING "Emergency Thaw on %s\n", | ||
563 | bdevname(sb->s_bdev, b)); | ||
564 | up_read(&sb->s_umount); | ||
565 | spin_lock(&sb_lock); | ||
566 | if (__put_super_and_need_restart(sb)) | ||
567 | goto restart; | ||
568 | } | ||
569 | spin_unlock(&sb_lock); | ||
570 | printk(KERN_WARNING "Emergency Thaw complete\n"); | ||
571 | } | ||
572 | |||
573 | /** | ||
574 | * emergency_thaw_all -- forcibly thaw every frozen filesystem | ||
575 | * | ||
576 | * Used for emergency unfreeze of all filesystems via SysRq | ||
577 | */ | ||
578 | void emergency_thaw_all(void) | ||
579 | { | ||
580 | pdflush_operation(do_thaw_all, 0); | ||
581 | } | ||
582 | |||
550 | /** | 583 | /** |
551 | * sync_mapping_buffers - write out & wait upon a mapping's "associated" buffers | 584 | * sync_mapping_buffers - write out & wait upon a mapping's "associated" buffers |
552 | * @mapping: the mapping which wants those buffers written | 585 | * @mapping: the mapping which wants those buffers written |
@@ -621,14 +654,7 @@ static void __set_page_dirty(struct page *page, | |||
621 | spin_lock_irq(&mapping->tree_lock); | 654 | spin_lock_irq(&mapping->tree_lock); |
622 | if (page->mapping) { /* Race with truncate? */ | 655 | if (page->mapping) { /* Race with truncate? */ |
623 | WARN_ON_ONCE(warn && !PageUptodate(page)); | 656 | WARN_ON_ONCE(warn && !PageUptodate(page)); |
624 | 657 | account_page_dirtied(page, mapping); | |
625 | if (mapping_cap_account_dirty(mapping)) { | ||
626 | __inc_zone_page_state(page, NR_FILE_DIRTY); | ||
627 | __inc_bdi_stat(mapping->backing_dev_info, | ||
628 | BDI_RECLAIMABLE); | ||
629 | task_dirty_inc(current); | ||
630 | task_io_account_write(PAGE_CACHE_SIZE); | ||
631 | } | ||
632 | radix_tree_tag_set(&mapping->page_tree, | 658 | radix_tree_tag_set(&mapping->page_tree, |
633 | page_index(page), PAGECACHE_TAG_DIRTY); | 659 | page_index(page), PAGECACHE_TAG_DIRTY); |
634 | } | 660 | } |
@@ -2320,13 +2346,14 @@ int block_commit_write(struct page *page, unsigned from, unsigned to) | |||
2320 | * unlock the page. | 2346 | * unlock the page. |
2321 | */ | 2347 | */ |
2322 | int | 2348 | int |
2323 | block_page_mkwrite(struct vm_area_struct *vma, struct page *page, | 2349 | block_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf, |
2324 | get_block_t get_block) | 2350 | get_block_t get_block) |
2325 | { | 2351 | { |
2352 | struct page *page = vmf->page; | ||
2326 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; | 2353 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; |
2327 | unsigned long end; | 2354 | unsigned long end; |
2328 | loff_t size; | 2355 | loff_t size; |
2329 | int ret = -EINVAL; | 2356 | int ret = VM_FAULT_NOPAGE; /* make the VM retry the fault */ |
2330 | 2357 | ||
2331 | lock_page(page); | 2358 | lock_page(page); |
2332 | size = i_size_read(inode); | 2359 | size = i_size_read(inode); |
@@ -2346,6 +2373,13 @@ block_page_mkwrite(struct vm_area_struct *vma, struct page *page, | |||
2346 | if (!ret) | 2373 | if (!ret) |
2347 | ret = block_commit_write(page, 0, end); | 2374 | ret = block_commit_write(page, 0, end); |
2348 | 2375 | ||
2376 | if (unlikely(ret)) { | ||
2377 | if (ret == -ENOMEM) | ||
2378 | ret = VM_FAULT_OOM; | ||
2379 | else /* -ENOSPC, -EIO, etc */ | ||
2380 | ret = VM_FAULT_SIGBUS; | ||
2381 | } | ||
2382 | |||
2349 | out_unlock: | 2383 | out_unlock: |
2350 | unlock_page(page); | 2384 | unlock_page(page); |
2351 | return ret; | 2385 | return ret; |
diff --git a/fs/cifs/cifs_debug.c b/fs/cifs/cifs_debug.c index 877e4d9a1159..7f19fefd3d45 100644 --- a/fs/cifs/cifs_debug.c +++ b/fs/cifs/cifs_debug.c | |||
@@ -404,7 +404,6 @@ cifs_proc_init(void) | |||
404 | if (proc_fs_cifs == NULL) | 404 | if (proc_fs_cifs == NULL) |
405 | return; | 405 | return; |
406 | 406 | ||
407 | proc_fs_cifs->owner = THIS_MODULE; | ||
408 | proc_create("DebugData", 0, proc_fs_cifs, &cifs_debug_data_proc_fops); | 407 | proc_create("DebugData", 0, proc_fs_cifs, &cifs_debug_data_proc_fops); |
409 | 408 | ||
410 | #ifdef CONFIG_CIFS_STATS | 409 | #ifdef CONFIG_CIFS_STATS |
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c index e4a6223c3145..af737bb56cb7 100644 --- a/fs/ecryptfs/keystore.c +++ b/fs/ecryptfs/keystore.c | |||
@@ -740,8 +740,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
740 | out_release_free_unlock: | 740 | out_release_free_unlock: |
741 | crypto_free_hash(s->hash_desc.tfm); | 741 | crypto_free_hash(s->hash_desc.tfm); |
742 | out_free_unlock: | 742 | out_free_unlock: |
743 | memset(s->block_aligned_filename, 0, s->block_aligned_filename_size); | 743 | kzfree(s->block_aligned_filename); |
744 | kfree(s->block_aligned_filename); | ||
745 | out_unlock: | 744 | out_unlock: |
746 | mutex_unlock(s->tfm_mutex); | 745 | mutex_unlock(s->tfm_mutex); |
747 | out: | 746 | out: |
diff --git a/fs/ecryptfs/messaging.c b/fs/ecryptfs/messaging.c index 96ef51489e01..295e7fa56755 100644 --- a/fs/ecryptfs/messaging.c +++ b/fs/ecryptfs/messaging.c | |||
@@ -291,8 +291,7 @@ int ecryptfs_exorcise_daemon(struct ecryptfs_daemon *daemon) | |||
291 | if (daemon->user_ns) | 291 | if (daemon->user_ns) |
292 | put_user_ns(daemon->user_ns); | 292 | put_user_ns(daemon->user_ns); |
293 | mutex_unlock(&daemon->mux); | 293 | mutex_unlock(&daemon->mux); |
294 | memset(daemon, 0, sizeof(*daemon)); | 294 | kzfree(daemon); |
295 | kfree(daemon); | ||
296 | out: | 295 | out: |
297 | return rc; | 296 | return rc; |
298 | } | 297 | } |
diff --git a/fs/eventfd.c b/fs/eventfd.c index 5de2c2db3aa2..2a701d593d35 100644 --- a/fs/eventfd.c +++ b/fs/eventfd.c | |||
@@ -28,6 +28,7 @@ struct eventfd_ctx { | |||
28 | * issue a wakeup. | 28 | * issue a wakeup. |
29 | */ | 29 | */ |
30 | __u64 count; | 30 | __u64 count; |
31 | unsigned int flags; | ||
31 | }; | 32 | }; |
32 | 33 | ||
33 | /* | 34 | /* |
@@ -50,7 +51,7 @@ int eventfd_signal(struct file *file, int n) | |||
50 | n = (int) (ULLONG_MAX - ctx->count); | 51 | n = (int) (ULLONG_MAX - ctx->count); |
51 | ctx->count += n; | 52 | ctx->count += n; |
52 | if (waitqueue_active(&ctx->wqh)) | 53 | if (waitqueue_active(&ctx->wqh)) |
53 | wake_up_locked(&ctx->wqh); | 54 | wake_up_locked_poll(&ctx->wqh, POLLIN); |
54 | spin_unlock_irqrestore(&ctx->wqh.lock, flags); | 55 | spin_unlock_irqrestore(&ctx->wqh.lock, flags); |
55 | 56 | ||
56 | return n; | 57 | return n; |
@@ -87,22 +88,20 @@ static ssize_t eventfd_read(struct file *file, char __user *buf, size_t count, | |||
87 | { | 88 | { |
88 | struct eventfd_ctx *ctx = file->private_data; | 89 | struct eventfd_ctx *ctx = file->private_data; |
89 | ssize_t res; | 90 | ssize_t res; |
90 | __u64 ucnt; | 91 | __u64 ucnt = 0; |
91 | DECLARE_WAITQUEUE(wait, current); | 92 | DECLARE_WAITQUEUE(wait, current); |
92 | 93 | ||
93 | if (count < sizeof(ucnt)) | 94 | if (count < sizeof(ucnt)) |
94 | return -EINVAL; | 95 | return -EINVAL; |
95 | spin_lock_irq(&ctx->wqh.lock); | 96 | spin_lock_irq(&ctx->wqh.lock); |
96 | res = -EAGAIN; | 97 | res = -EAGAIN; |
97 | ucnt = ctx->count; | 98 | if (ctx->count > 0) |
98 | if (ucnt > 0) | ||
99 | res = sizeof(ucnt); | 99 | res = sizeof(ucnt); |
100 | else if (!(file->f_flags & O_NONBLOCK)) { | 100 | else if (!(file->f_flags & O_NONBLOCK)) { |
101 | __add_wait_queue(&ctx->wqh, &wait); | 101 | __add_wait_queue(&ctx->wqh, &wait); |
102 | for (res = 0;;) { | 102 | for (res = 0;;) { |
103 | set_current_state(TASK_INTERRUPTIBLE); | 103 | set_current_state(TASK_INTERRUPTIBLE); |
104 | if (ctx->count > 0) { | 104 | if (ctx->count > 0) { |
105 | ucnt = ctx->count; | ||
106 | res = sizeof(ucnt); | 105 | res = sizeof(ucnt); |
107 | break; | 106 | break; |
108 | } | 107 | } |
@@ -117,10 +116,11 @@ static ssize_t eventfd_read(struct file *file, char __user *buf, size_t count, | |||
117 | __remove_wait_queue(&ctx->wqh, &wait); | 116 | __remove_wait_queue(&ctx->wqh, &wait); |
118 | __set_current_state(TASK_RUNNING); | 117 | __set_current_state(TASK_RUNNING); |
119 | } | 118 | } |
120 | if (res > 0) { | 119 | if (likely(res > 0)) { |
121 | ctx->count = 0; | 120 | ucnt = (ctx->flags & EFD_SEMAPHORE) ? 1 : ctx->count; |
121 | ctx->count -= ucnt; | ||
122 | if (waitqueue_active(&ctx->wqh)) | 122 | if (waitqueue_active(&ctx->wqh)) |
123 | wake_up_locked(&ctx->wqh); | 123 | wake_up_locked_poll(&ctx->wqh, POLLOUT); |
124 | } | 124 | } |
125 | spin_unlock_irq(&ctx->wqh.lock); | 125 | spin_unlock_irq(&ctx->wqh.lock); |
126 | if (res > 0 && put_user(ucnt, (__u64 __user *) buf)) | 126 | if (res > 0 && put_user(ucnt, (__u64 __user *) buf)) |
@@ -166,10 +166,10 @@ static ssize_t eventfd_write(struct file *file, const char __user *buf, size_t c | |||
166 | __remove_wait_queue(&ctx->wqh, &wait); | 166 | __remove_wait_queue(&ctx->wqh, &wait); |
167 | __set_current_state(TASK_RUNNING); | 167 | __set_current_state(TASK_RUNNING); |
168 | } | 168 | } |
169 | if (res > 0) { | 169 | if (likely(res > 0)) { |
170 | ctx->count += ucnt; | 170 | ctx->count += ucnt; |
171 | if (waitqueue_active(&ctx->wqh)) | 171 | if (waitqueue_active(&ctx->wqh)) |
172 | wake_up_locked(&ctx->wqh); | 172 | wake_up_locked_poll(&ctx->wqh, POLLIN); |
173 | } | 173 | } |
174 | spin_unlock_irq(&ctx->wqh.lock); | 174 | spin_unlock_irq(&ctx->wqh.lock); |
175 | 175 | ||
@@ -207,7 +207,7 @@ SYSCALL_DEFINE2(eventfd2, unsigned int, count, int, flags) | |||
207 | BUILD_BUG_ON(EFD_CLOEXEC != O_CLOEXEC); | 207 | BUILD_BUG_ON(EFD_CLOEXEC != O_CLOEXEC); |
208 | BUILD_BUG_ON(EFD_NONBLOCK != O_NONBLOCK); | 208 | BUILD_BUG_ON(EFD_NONBLOCK != O_NONBLOCK); |
209 | 209 | ||
210 | if (flags & ~(EFD_CLOEXEC | EFD_NONBLOCK)) | 210 | if (flags & ~EFD_FLAGS_SET) |
211 | return -EINVAL; | 211 | return -EINVAL; |
212 | 212 | ||
213 | ctx = kmalloc(sizeof(*ctx), GFP_KERNEL); | 213 | ctx = kmalloc(sizeof(*ctx), GFP_KERNEL); |
@@ -216,13 +216,14 @@ SYSCALL_DEFINE2(eventfd2, unsigned int, count, int, flags) | |||
216 | 216 | ||
217 | init_waitqueue_head(&ctx->wqh); | 217 | init_waitqueue_head(&ctx->wqh); |
218 | ctx->count = count; | 218 | ctx->count = count; |
219 | ctx->flags = flags; | ||
219 | 220 | ||
220 | /* | 221 | /* |
221 | * When we call this, the initialization must be complete, since | 222 | * When we call this, the initialization must be complete, since |
222 | * anon_inode_getfd() will install the fd. | 223 | * anon_inode_getfd() will install the fd. |
223 | */ | 224 | */ |
224 | fd = anon_inode_getfd("[eventfd]", &eventfd_fops, ctx, | 225 | fd = anon_inode_getfd("[eventfd]", &eventfd_fops, ctx, |
225 | flags & (O_CLOEXEC | O_NONBLOCK)); | 226 | flags & EFD_SHARED_FCNTL_FLAGS); |
226 | if (fd < 0) | 227 | if (fd < 0) |
227 | kfree(ctx); | 228 | kfree(ctx); |
228 | return fd; | 229 | return fd; |
@@ -232,3 +233,4 @@ SYSCALL_DEFINE1(eventfd, unsigned int, count) | |||
232 | { | 233 | { |
233 | return sys_eventfd2(count, 0); | 234 | return sys_eventfd2(count, 0); |
234 | } | 235 | } |
236 | |||
diff --git a/fs/eventpoll.c b/fs/eventpoll.c index c5c424f23fd5..a89f370fadb5 100644 --- a/fs/eventpoll.c +++ b/fs/eventpoll.c | |||
@@ -1,6 +1,6 @@ | |||
1 | /* | 1 | /* |
2 | * fs/eventpoll.c (Efficent event polling implementation) | 2 | * fs/eventpoll.c (Efficient event retrieval implementation) |
3 | * Copyright (C) 2001,...,2007 Davide Libenzi | 3 | * Copyright (C) 2001,...,2009 Davide Libenzi |
4 | * | 4 | * |
5 | * This program is free software; you can redistribute it and/or modify | 5 | * This program is free software; you can redistribute it and/or modify |
6 | * it under the terms of the GNU General Public License as published by | 6 | * it under the terms of the GNU General Public License as published by |
@@ -71,29 +71,11 @@ | |||
71 | * a better scalability. | 71 | * a better scalability. |
72 | */ | 72 | */ |
73 | 73 | ||
74 | #define DEBUG_EPOLL 0 | ||
75 | |||
76 | #if DEBUG_EPOLL > 0 | ||
77 | #define DPRINTK(x) printk x | ||
78 | #define DNPRINTK(n, x) do { if ((n) <= DEBUG_EPOLL) printk x; } while (0) | ||
79 | #else /* #if DEBUG_EPOLL > 0 */ | ||
80 | #define DPRINTK(x) (void) 0 | ||
81 | #define DNPRINTK(n, x) (void) 0 | ||
82 | #endif /* #if DEBUG_EPOLL > 0 */ | ||
83 | |||
84 | #define DEBUG_EPI 0 | ||
85 | |||
86 | #if DEBUG_EPI != 0 | ||
87 | #define EPI_SLAB_DEBUG (SLAB_DEBUG_FREE | SLAB_RED_ZONE /* | SLAB_POISON */) | ||
88 | #else /* #if DEBUG_EPI != 0 */ | ||
89 | #define EPI_SLAB_DEBUG 0 | ||
90 | #endif /* #if DEBUG_EPI != 0 */ | ||
91 | |||
92 | /* Epoll private bits inside the event mask */ | 74 | /* Epoll private bits inside the event mask */ |
93 | #define EP_PRIVATE_BITS (EPOLLONESHOT | EPOLLET) | 75 | #define EP_PRIVATE_BITS (EPOLLONESHOT | EPOLLET) |
94 | 76 | ||
95 | /* Maximum number of poll wake up nests we are allowing */ | 77 | /* Maximum number of nesting allowed inside epoll sets */ |
96 | #define EP_MAX_POLLWAKE_NESTS 4 | 78 | #define EP_MAX_NESTS 4 |
97 | 79 | ||
98 | /* Maximum msec timeout value storeable in a long int */ | 80 | /* Maximum msec timeout value storeable in a long int */ |
99 | #define EP_MAX_MSTIMEO min(1000ULL * MAX_SCHEDULE_TIMEOUT / HZ, (LONG_MAX - 999ULL) / HZ) | 81 | #define EP_MAX_MSTIMEO min(1000ULL * MAX_SCHEDULE_TIMEOUT / HZ, (LONG_MAX - 999ULL) / HZ) |
@@ -110,24 +92,21 @@ struct epoll_filefd { | |||
110 | }; | 92 | }; |
111 | 93 | ||
112 | /* | 94 | /* |
113 | * Node that is linked into the "wake_task_list" member of the "struct poll_safewake". | 95 | * Structure used to track possible nested calls, for too deep recursions |
114 | * It is used to keep track on all tasks that are currently inside the wake_up() code | 96 | * and loop cycles. |
115 | * to 1) short-circuit the one coming from the same task and same wait queue head | ||
116 | * (loop) 2) allow a maximum number of epoll descriptors inclusion nesting | ||
117 | * 3) let go the ones coming from other tasks. | ||
118 | */ | 97 | */ |
119 | struct wake_task_node { | 98 | struct nested_call_node { |
120 | struct list_head llink; | 99 | struct list_head llink; |
121 | struct task_struct *task; | 100 | void *cookie; |
122 | wait_queue_head_t *wq; | 101 | int cpu; |
123 | }; | 102 | }; |
124 | 103 | ||
125 | /* | 104 | /* |
126 | * This is used to implement the safe poll wake up avoiding to reenter | 105 | * This structure is used as collector for nested calls, to check for |
127 | * the poll callback from inside wake_up(). | 106 | * maximum recursion dept and loop cycles. |
128 | */ | 107 | */ |
129 | struct poll_safewake { | 108 | struct nested_calls { |
130 | struct list_head wake_task_list; | 109 | struct list_head tasks_call_list; |
131 | spinlock_t lock; | 110 | spinlock_t lock; |
132 | }; | 111 | }; |
133 | 112 | ||
@@ -213,7 +192,7 @@ struct eppoll_entry { | |||
213 | struct list_head llink; | 192 | struct list_head llink; |
214 | 193 | ||
215 | /* The "base" pointer is set to the container "struct epitem" */ | 194 | /* The "base" pointer is set to the container "struct epitem" */ |
216 | void *base; | 195 | struct epitem *base; |
217 | 196 | ||
218 | /* | 197 | /* |
219 | * Wait queue item that will be linked to the target file wait | 198 | * Wait queue item that will be linked to the target file wait |
@@ -231,6 +210,12 @@ struct ep_pqueue { | |||
231 | struct epitem *epi; | 210 | struct epitem *epi; |
232 | }; | 211 | }; |
233 | 212 | ||
213 | /* Used by the ep_send_events() function as callback private data */ | ||
214 | struct ep_send_events_data { | ||
215 | int maxevents; | ||
216 | struct epoll_event __user *events; | ||
217 | }; | ||
218 | |||
234 | /* | 219 | /* |
235 | * Configuration options available inside /proc/sys/fs/epoll/ | 220 | * Configuration options available inside /proc/sys/fs/epoll/ |
236 | */ | 221 | */ |
@@ -242,8 +227,11 @@ static int max_user_watches __read_mostly; | |||
242 | */ | 227 | */ |
243 | static DEFINE_MUTEX(epmutex); | 228 | static DEFINE_MUTEX(epmutex); |
244 | 229 | ||
245 | /* Safe wake up implementation */ | 230 | /* Used for safe wake up implementation */ |
246 | static struct poll_safewake psw; | 231 | static struct nested_calls poll_safewake_ncalls; |
232 | |||
233 | /* Used to call file's f_op->poll() under the nested calls boundaries */ | ||
234 | static struct nested_calls poll_readywalk_ncalls; | ||
247 | 235 | ||
248 | /* Slab cache used to allocate "struct epitem" */ | 236 | /* Slab cache used to allocate "struct epitem" */ |
249 | static struct kmem_cache *epi_cache __read_mostly; | 237 | static struct kmem_cache *epi_cache __read_mostly; |
@@ -312,89 +300,230 @@ static inline int ep_op_has_event(int op) | |||
312 | } | 300 | } |
313 | 301 | ||
314 | /* Initialize the poll safe wake up structure */ | 302 | /* Initialize the poll safe wake up structure */ |
315 | static void ep_poll_safewake_init(struct poll_safewake *psw) | 303 | static void ep_nested_calls_init(struct nested_calls *ncalls) |
316 | { | 304 | { |
317 | 305 | INIT_LIST_HEAD(&ncalls->tasks_call_list); | |
318 | INIT_LIST_HEAD(&psw->wake_task_list); | 306 | spin_lock_init(&ncalls->lock); |
319 | spin_lock_init(&psw->lock); | ||
320 | } | 307 | } |
321 | 308 | ||
322 | /* | 309 | /** |
323 | * Perform a safe wake up of the poll wait list. The problem is that | 310 | * ep_call_nested - Perform a bound (possibly) nested call, by checking |
324 | * with the new callback'd wake up system, it is possible that the | 311 | * that the recursion limit is not exceeded, and that |
325 | * poll callback is reentered from inside the call to wake_up() done | 312 | * the same nested call (by the meaning of same cookie) is |
326 | * on the poll wait queue head. The rule is that we cannot reenter the | 313 | * no re-entered. |
327 | * wake up code from the same task more than EP_MAX_POLLWAKE_NESTS times, | 314 | * |
328 | * and we cannot reenter the same wait queue head at all. This will | 315 | * @ncalls: Pointer to the nested_calls structure to be used for this call. |
329 | * enable to have a hierarchy of epoll file descriptor of no more than | 316 | * @max_nests: Maximum number of allowed nesting calls. |
330 | * EP_MAX_POLLWAKE_NESTS deep. We need the irq version of the spin lock | 317 | * @nproc: Nested call core function pointer. |
331 | * because this one gets called by the poll callback, that in turn is called | 318 | * @priv: Opaque data to be passed to the @nproc callback. |
332 | * from inside a wake_up(), that might be called from irq context. | 319 | * @cookie: Cookie to be used to identify this nested call. |
320 | * | ||
321 | * Returns: Returns the code returned by the @nproc callback, or -1 if | ||
322 | * the maximum recursion limit has been exceeded. | ||
333 | */ | 323 | */ |
334 | static void ep_poll_safewake(struct poll_safewake *psw, wait_queue_head_t *wq) | 324 | static int ep_call_nested(struct nested_calls *ncalls, int max_nests, |
325 | int (*nproc)(void *, void *, int), void *priv, | ||
326 | void *cookie) | ||
335 | { | 327 | { |
336 | int wake_nests = 0; | 328 | int error, call_nests = 0; |
337 | unsigned long flags; | 329 | unsigned long flags; |
338 | struct task_struct *this_task = current; | 330 | int this_cpu = get_cpu(); |
339 | struct list_head *lsthead = &psw->wake_task_list; | 331 | struct list_head *lsthead = &ncalls->tasks_call_list; |
340 | struct wake_task_node *tncur; | 332 | struct nested_call_node *tncur; |
341 | struct wake_task_node tnode; | 333 | struct nested_call_node tnode; |
342 | 334 | ||
343 | spin_lock_irqsave(&psw->lock, flags); | 335 | spin_lock_irqsave(&ncalls->lock, flags); |
344 | 336 | ||
345 | /* Try to see if the current task is already inside this wakeup call */ | 337 | /* |
338 | * Try to see if the current task is already inside this wakeup call. | ||
339 | * We use a list here, since the population inside this set is always | ||
340 | * very much limited. | ||
341 | */ | ||
346 | list_for_each_entry(tncur, lsthead, llink) { | 342 | list_for_each_entry(tncur, lsthead, llink) { |
347 | 343 | if (tncur->cpu == this_cpu && | |
348 | if (tncur->wq == wq || | 344 | (tncur->cookie == cookie || ++call_nests > max_nests)) { |
349 | (tncur->task == this_task && ++wake_nests > EP_MAX_POLLWAKE_NESTS)) { | ||
350 | /* | 345 | /* |
351 | * Ops ... loop detected or maximum nest level reached. | 346 | * Ops ... loop detected or maximum nest level reached. |
352 | * We abort this wake by breaking the cycle itself. | 347 | * We abort this wake by breaking the cycle itself. |
353 | */ | 348 | */ |
354 | spin_unlock_irqrestore(&psw->lock, flags); | 349 | error = -1; |
355 | return; | 350 | goto out_unlock; |
356 | } | 351 | } |
357 | } | 352 | } |
358 | 353 | ||
359 | /* Add the current task to the list */ | 354 | /* Add the current task and cookie to the list */ |
360 | tnode.task = this_task; | 355 | tnode.cpu = this_cpu; |
361 | tnode.wq = wq; | 356 | tnode.cookie = cookie; |
362 | list_add(&tnode.llink, lsthead); | 357 | list_add(&tnode.llink, lsthead); |
363 | 358 | ||
364 | spin_unlock_irqrestore(&psw->lock, flags); | 359 | spin_unlock_irqrestore(&ncalls->lock, flags); |
365 | 360 | ||
366 | /* Do really wake up now */ | 361 | /* Call the nested function */ |
367 | wake_up_nested(wq, 1 + wake_nests); | 362 | error = (*nproc)(priv, cookie, call_nests); |
368 | 363 | ||
369 | /* Remove the current task from the list */ | 364 | /* Remove the current task from the list */ |
370 | spin_lock_irqsave(&psw->lock, flags); | 365 | spin_lock_irqsave(&ncalls->lock, flags); |
371 | list_del(&tnode.llink); | 366 | list_del(&tnode.llink); |
372 | spin_unlock_irqrestore(&psw->lock, flags); | 367 | out_unlock: |
368 | spin_unlock_irqrestore(&ncalls->lock, flags); | ||
369 | |||
370 | put_cpu(); | ||
371 | return error; | ||
372 | } | ||
373 | |||
374 | #ifdef CONFIG_DEBUG_LOCK_ALLOC | ||
375 | static inline void ep_wake_up_nested(wait_queue_head_t *wqueue, | ||
376 | unsigned long events, int subclass) | ||
377 | { | ||
378 | unsigned long flags; | ||
379 | |||
380 | spin_lock_irqsave_nested(&wqueue->lock, flags, subclass); | ||
381 | wake_up_locked_poll(wqueue, events); | ||
382 | spin_unlock_irqrestore(&wqueue->lock, flags); | ||
383 | } | ||
384 | #else | ||
385 | static inline void ep_wake_up_nested(wait_queue_head_t *wqueue, | ||
386 | unsigned long events, int subclass) | ||
387 | { | ||
388 | wake_up_poll(wqueue, events); | ||
389 | } | ||
390 | #endif | ||
391 | |||
392 | static int ep_poll_wakeup_proc(void *priv, void *cookie, int call_nests) | ||
393 | { | ||
394 | ep_wake_up_nested((wait_queue_head_t *) cookie, POLLIN, | ||
395 | 1 + call_nests); | ||
396 | return 0; | ||
397 | } | ||
398 | |||
399 | /* | ||
400 | * Perform a safe wake up of the poll wait list. The problem is that | ||
401 | * with the new callback'd wake up system, it is possible that the | ||
402 | * poll callback is reentered from inside the call to wake_up() done | ||
403 | * on the poll wait queue head. The rule is that we cannot reenter the | ||
404 | * wake up code from the same task more than EP_MAX_NESTS times, | ||
405 | * and we cannot reenter the same wait queue head at all. This will | ||
406 | * enable to have a hierarchy of epoll file descriptor of no more than | ||
407 | * EP_MAX_NESTS deep. | ||
408 | */ | ||
409 | static void ep_poll_safewake(wait_queue_head_t *wq) | ||
410 | { | ||
411 | ep_call_nested(&poll_safewake_ncalls, EP_MAX_NESTS, | ||
412 | ep_poll_wakeup_proc, NULL, wq); | ||
373 | } | 413 | } |
374 | 414 | ||
375 | /* | 415 | /* |
376 | * This function unregister poll callbacks from the associated file descriptor. | 416 | * This function unregisters poll callbacks from the associated file |
377 | * Since this must be called without holding "ep->lock" the atomic exchange trick | 417 | * descriptor. Must be called with "mtx" held (or "epmutex" if called from |
378 | * will protect us from multiple unregister. | 418 | * ep_free). |
379 | */ | 419 | */ |
380 | static void ep_unregister_pollwait(struct eventpoll *ep, struct epitem *epi) | 420 | static void ep_unregister_pollwait(struct eventpoll *ep, struct epitem *epi) |
381 | { | 421 | { |
382 | int nwait; | ||
383 | struct list_head *lsthead = &epi->pwqlist; | 422 | struct list_head *lsthead = &epi->pwqlist; |
384 | struct eppoll_entry *pwq; | 423 | struct eppoll_entry *pwq; |
385 | 424 | ||
386 | /* This is called without locks, so we need the atomic exchange */ | 425 | while (!list_empty(lsthead)) { |
387 | nwait = xchg(&epi->nwait, 0); | 426 | pwq = list_first_entry(lsthead, struct eppoll_entry, llink); |
388 | 427 | ||
389 | if (nwait) { | 428 | list_del(&pwq->llink); |
390 | while (!list_empty(lsthead)) { | 429 | remove_wait_queue(pwq->whead, &pwq->wait); |
391 | pwq = list_first_entry(lsthead, struct eppoll_entry, llink); | 430 | kmem_cache_free(pwq_cache, pwq); |
431 | } | ||
432 | } | ||
392 | 433 | ||
393 | list_del_init(&pwq->llink); | 434 | /** |
394 | remove_wait_queue(pwq->whead, &pwq->wait); | 435 | * ep_scan_ready_list - Scans the ready list in a way that makes possible for |
395 | kmem_cache_free(pwq_cache, pwq); | 436 | * the scan code, to call f_op->poll(). Also allows for |
396 | } | 437 | * O(NumReady) performance. |
438 | * | ||
439 | * @ep: Pointer to the epoll private data structure. | ||
440 | * @sproc: Pointer to the scan callback. | ||
441 | * @priv: Private opaque data passed to the @sproc callback. | ||
442 | * | ||
443 | * Returns: The same integer error code returned by the @sproc callback. | ||
444 | */ | ||
445 | static int ep_scan_ready_list(struct eventpoll *ep, | ||
446 | int (*sproc)(struct eventpoll *, | ||
447 | struct list_head *, void *), | ||
448 | void *priv) | ||
449 | { | ||
450 | int error, pwake = 0; | ||
451 | unsigned long flags; | ||
452 | struct epitem *epi, *nepi; | ||
453 | LIST_HEAD(txlist); | ||
454 | |||
455 | /* | ||
456 | * We need to lock this because we could be hit by | ||
457 | * eventpoll_release_file() and epoll_ctl(). | ||
458 | */ | ||
459 | mutex_lock(&ep->mtx); | ||
460 | |||
461 | /* | ||
462 | * Steal the ready list, and re-init the original one to the | ||
463 | * empty list. Also, set ep->ovflist to NULL so that events | ||
464 | * happening while looping w/out locks, are not lost. We cannot | ||
465 | * have the poll callback to queue directly on ep->rdllist, | ||
466 | * because we want the "sproc" callback to be able to do it | ||
467 | * in a lockless way. | ||
468 | */ | ||
469 | spin_lock_irqsave(&ep->lock, flags); | ||
470 | list_splice_init(&ep->rdllist, &txlist); | ||
471 | ep->ovflist = NULL; | ||
472 | spin_unlock_irqrestore(&ep->lock, flags); | ||
473 | |||
474 | /* | ||
475 | * Now call the callback function. | ||
476 | */ | ||
477 | error = (*sproc)(ep, &txlist, priv); | ||
478 | |||
479 | spin_lock_irqsave(&ep->lock, flags); | ||
480 | /* | ||
481 | * During the time we spent inside the "sproc" callback, some | ||
482 | * other events might have been queued by the poll callback. | ||
483 | * We re-insert them inside the main ready-list here. | ||
484 | */ | ||
485 | for (nepi = ep->ovflist; (epi = nepi) != NULL; | ||
486 | nepi = epi->next, epi->next = EP_UNACTIVE_PTR) { | ||
487 | /* | ||
488 | * We need to check if the item is already in the list. | ||
489 | * During the "sproc" callback execution time, items are | ||
490 | * queued into ->ovflist but the "txlist" might already | ||
491 | * contain them, and the list_splice() below takes care of them. | ||
492 | */ | ||
493 | if (!ep_is_linked(&epi->rdllink)) | ||
494 | list_add_tail(&epi->rdllink, &ep->rdllist); | ||
495 | } | ||
496 | /* | ||
497 | * We need to set back ep->ovflist to EP_UNACTIVE_PTR, so that after | ||
498 | * releasing the lock, events will be queued in the normal way inside | ||
499 | * ep->rdllist. | ||
500 | */ | ||
501 | ep->ovflist = EP_UNACTIVE_PTR; | ||
502 | |||
503 | /* | ||
504 | * Quickly re-inject items left on "txlist". | ||
505 | */ | ||
506 | list_splice(&txlist, &ep->rdllist); | ||
507 | |||
508 | if (!list_empty(&ep->rdllist)) { | ||
509 | /* | ||
510 | * Wake up (if active) both the eventpoll wait list and | ||
511 | * the ->poll() wait list (delayed after we release the lock). | ||
512 | */ | ||
513 | if (waitqueue_active(&ep->wq)) | ||
514 | wake_up_locked(&ep->wq); | ||
515 | if (waitqueue_active(&ep->poll_wait)) | ||
516 | pwake++; | ||
397 | } | 517 | } |
518 | spin_unlock_irqrestore(&ep->lock, flags); | ||
519 | |||
520 | mutex_unlock(&ep->mtx); | ||
521 | |||
522 | /* We have to call this outside the lock */ | ||
523 | if (pwake) | ||
524 | ep_poll_safewake(&ep->poll_wait); | ||
525 | |||
526 | return error; | ||
398 | } | 527 | } |
399 | 528 | ||
400 | /* | 529 | /* |
@@ -434,9 +563,6 @@ static int ep_remove(struct eventpoll *ep, struct epitem *epi) | |||
434 | 563 | ||
435 | atomic_dec(&ep->user->epoll_watches); | 564 | atomic_dec(&ep->user->epoll_watches); |
436 | 565 | ||
437 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: ep_remove(%p, %p)\n", | ||
438 | current, ep, file)); | ||
439 | |||
440 | return 0; | 566 | return 0; |
441 | } | 567 | } |
442 | 568 | ||
@@ -447,7 +573,7 @@ static void ep_free(struct eventpoll *ep) | |||
447 | 573 | ||
448 | /* We need to release all tasks waiting for these file */ | 574 | /* We need to release all tasks waiting for these file */ |
449 | if (waitqueue_active(&ep->poll_wait)) | 575 | if (waitqueue_active(&ep->poll_wait)) |
450 | ep_poll_safewake(&psw, &ep->poll_wait); | 576 | ep_poll_safewake(&ep->poll_wait); |
451 | 577 | ||
452 | /* | 578 | /* |
453 | * We need to lock this because we could be hit by | 579 | * We need to lock this because we could be hit by |
@@ -492,26 +618,54 @@ static int ep_eventpoll_release(struct inode *inode, struct file *file) | |||
492 | if (ep) | 618 | if (ep) |
493 | ep_free(ep); | 619 | ep_free(ep); |
494 | 620 | ||
495 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: close() ep=%p\n", current, ep)); | ||
496 | return 0; | 621 | return 0; |
497 | } | 622 | } |
498 | 623 | ||
624 | static int ep_read_events_proc(struct eventpoll *ep, struct list_head *head, | ||
625 | void *priv) | ||
626 | { | ||
627 | struct epitem *epi, *tmp; | ||
628 | |||
629 | list_for_each_entry_safe(epi, tmp, head, rdllink) { | ||
630 | if (epi->ffd.file->f_op->poll(epi->ffd.file, NULL) & | ||
631 | epi->event.events) | ||
632 | return POLLIN | POLLRDNORM; | ||
633 | else { | ||
634 | /* | ||
635 | * Item has been dropped into the ready list by the poll | ||
636 | * callback, but it's not actually ready, as far as | ||
637 | * caller requested events goes. We can remove it here. | ||
638 | */ | ||
639 | list_del_init(&epi->rdllink); | ||
640 | } | ||
641 | } | ||
642 | |||
643 | return 0; | ||
644 | } | ||
645 | |||
646 | static int ep_poll_readyevents_proc(void *priv, void *cookie, int call_nests) | ||
647 | { | ||
648 | return ep_scan_ready_list(priv, ep_read_events_proc, NULL); | ||
649 | } | ||
650 | |||
499 | static unsigned int ep_eventpoll_poll(struct file *file, poll_table *wait) | 651 | static unsigned int ep_eventpoll_poll(struct file *file, poll_table *wait) |
500 | { | 652 | { |
501 | unsigned int pollflags = 0; | 653 | int pollflags; |
502 | unsigned long flags; | ||
503 | struct eventpoll *ep = file->private_data; | 654 | struct eventpoll *ep = file->private_data; |
504 | 655 | ||
505 | /* Insert inside our poll wait queue */ | 656 | /* Insert inside our poll wait queue */ |
506 | poll_wait(file, &ep->poll_wait, wait); | 657 | poll_wait(file, &ep->poll_wait, wait); |
507 | 658 | ||
508 | /* Check our condition */ | 659 | /* |
509 | spin_lock_irqsave(&ep->lock, flags); | 660 | * Proceed to find out if wanted events are really available inside |
510 | if (!list_empty(&ep->rdllist)) | 661 | * the ready list. This need to be done under ep_call_nested() |
511 | pollflags = POLLIN | POLLRDNORM; | 662 | * supervision, since the call to f_op->poll() done on listed files |
512 | spin_unlock_irqrestore(&ep->lock, flags); | 663 | * could re-enter here. |
664 | */ | ||
665 | pollflags = ep_call_nested(&poll_readywalk_ncalls, EP_MAX_NESTS, | ||
666 | ep_poll_readyevents_proc, ep, ep); | ||
513 | 667 | ||
514 | return pollflags; | 668 | return pollflags != -1 ? pollflags : 0; |
515 | } | 669 | } |
516 | 670 | ||
517 | /* File callbacks that implement the eventpoll file behaviour */ | 671 | /* File callbacks that implement the eventpoll file behaviour */ |
@@ -541,7 +695,7 @@ void eventpoll_release_file(struct file *file) | |||
541 | * We don't want to get "file->f_lock" because it is not | 695 | * We don't want to get "file->f_lock" because it is not |
542 | * necessary. It is not necessary because we're in the "struct file" | 696 | * necessary. It is not necessary because we're in the "struct file" |
543 | * cleanup path, and this means that noone is using this file anymore. | 697 | * cleanup path, and this means that noone is using this file anymore. |
544 | * So, for example, epoll_ctl() cannot hit here sicne if we reach this | 698 | * So, for example, epoll_ctl() cannot hit here since if we reach this |
545 | * point, the file counter already went to zero and fget() would fail. | 699 | * point, the file counter already went to zero and fget() would fail. |
546 | * The only hit might come from ep_free() but by holding the mutex | 700 | * The only hit might come from ep_free() but by holding the mutex |
547 | * will correctly serialize the operation. We do need to acquire | 701 | * will correctly serialize the operation. We do need to acquire |
@@ -588,8 +742,6 @@ static int ep_alloc(struct eventpoll **pep) | |||
588 | 742 | ||
589 | *pep = ep; | 743 | *pep = ep; |
590 | 744 | ||
591 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: ep_alloc() ep=%p\n", | ||
592 | current, ep)); | ||
593 | return 0; | 745 | return 0; |
594 | 746 | ||
595 | free_uid: | 747 | free_uid: |
@@ -623,9 +775,6 @@ static struct epitem *ep_find(struct eventpoll *ep, struct file *file, int fd) | |||
623 | } | 775 | } |
624 | } | 776 | } |
625 | 777 | ||
626 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: ep_find(%p) -> %p\n", | ||
627 | current, file, epir)); | ||
628 | |||
629 | return epir; | 778 | return epir; |
630 | } | 779 | } |
631 | 780 | ||
@@ -641,9 +790,6 @@ static int ep_poll_callback(wait_queue_t *wait, unsigned mode, int sync, void *k | |||
641 | struct epitem *epi = ep_item_from_wait(wait); | 790 | struct epitem *epi = ep_item_from_wait(wait); |
642 | struct eventpoll *ep = epi->ep; | 791 | struct eventpoll *ep = epi->ep; |
643 | 792 | ||
644 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: poll_callback(%p) epi=%p ep=%p\n", | ||
645 | current, epi->ffd.file, epi, ep)); | ||
646 | |||
647 | spin_lock_irqsave(&ep->lock, flags); | 793 | spin_lock_irqsave(&ep->lock, flags); |
648 | 794 | ||
649 | /* | 795 | /* |
@@ -656,6 +802,15 @@ static int ep_poll_callback(wait_queue_t *wait, unsigned mode, int sync, void *k | |||
656 | goto out_unlock; | 802 | goto out_unlock; |
657 | 803 | ||
658 | /* | 804 | /* |
805 | * Check the events coming with the callback. At this stage, not | ||
806 | * every device reports the events in the "key" parameter of the | ||
807 | * callback. We need to be able to handle both cases here, hence the | ||
808 | * test for "key" != NULL before the event match test. | ||
809 | */ | ||
810 | if (key && !((unsigned long) key & epi->event.events)) | ||
811 | goto out_unlock; | ||
812 | |||
813 | /* | ||
659 | * If we are trasfering events to userspace, we can hold no locks | 814 | * If we are trasfering events to userspace, we can hold no locks |
660 | * (because we're accessing user memory, and because of linux f_op->poll() | 815 | * (because we're accessing user memory, and because of linux f_op->poll() |
661 | * semantics). All the events that happens during that period of time are | 816 | * semantics). All the events that happens during that period of time are |
@@ -670,12 +825,9 @@ static int ep_poll_callback(wait_queue_t *wait, unsigned mode, int sync, void *k | |||
670 | } | 825 | } |
671 | 826 | ||
672 | /* If this file is already in the ready list we exit soon */ | 827 | /* If this file is already in the ready list we exit soon */ |
673 | if (ep_is_linked(&epi->rdllink)) | 828 | if (!ep_is_linked(&epi->rdllink)) |
674 | goto is_linked; | 829 | list_add_tail(&epi->rdllink, &ep->rdllist); |
675 | |||
676 | list_add_tail(&epi->rdllink, &ep->rdllist); | ||
677 | 830 | ||
678 | is_linked: | ||
679 | /* | 831 | /* |
680 | * Wake up ( if active ) both the eventpoll wait list and the ->poll() | 832 | * Wake up ( if active ) both the eventpoll wait list and the ->poll() |
681 | * wait list. | 833 | * wait list. |
@@ -690,7 +842,7 @@ out_unlock: | |||
690 | 842 | ||
691 | /* We have to call this outside the lock */ | 843 | /* We have to call this outside the lock */ |
692 | if (pwake) | 844 | if (pwake) |
693 | ep_poll_safewake(&psw, &ep->poll_wait); | 845 | ep_poll_safewake(&ep->poll_wait); |
694 | 846 | ||
695 | return 1; | 847 | return 1; |
696 | } | 848 | } |
@@ -817,10 +969,7 @@ static int ep_insert(struct eventpoll *ep, struct epoll_event *event, | |||
817 | 969 | ||
818 | /* We have to call this outside the lock */ | 970 | /* We have to call this outside the lock */ |
819 | if (pwake) | 971 | if (pwake) |
820 | ep_poll_safewake(&psw, &ep->poll_wait); | 972 | ep_poll_safewake(&ep->poll_wait); |
821 | |||
822 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: ep_insert(%p, %p, %d)\n", | ||
823 | current, ep, tfile, fd)); | ||
824 | 973 | ||
825 | return 0; | 974 | return 0; |
826 | 975 | ||
@@ -851,15 +1000,14 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, struct epoll_even | |||
851 | { | 1000 | { |
852 | int pwake = 0; | 1001 | int pwake = 0; |
853 | unsigned int revents; | 1002 | unsigned int revents; |
854 | unsigned long flags; | ||
855 | 1003 | ||
856 | /* | 1004 | /* |
857 | * Set the new event interest mask before calling f_op->poll(), otherwise | 1005 | * Set the new event interest mask before calling f_op->poll(); |
858 | * a potential race might occur. In fact if we do this operation inside | 1006 | * otherwise we might miss an event that happens between the |
859 | * the lock, an event might happen between the f_op->poll() call and the | 1007 | * f_op->poll() call and the new event set registering. |
860 | * new event set registering. | ||
861 | */ | 1008 | */ |
862 | epi->event.events = event->events; | 1009 | epi->event.events = event->events; |
1010 | epi->event.data = event->data; /* protected by mtx */ | ||
863 | 1011 | ||
864 | /* | 1012 | /* |
865 | * Get current event bits. We can safely use the file* here because | 1013 | * Get current event bits. We can safely use the file* here because |
@@ -867,16 +1015,12 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, struct epoll_even | |||
867 | */ | 1015 | */ |
868 | revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL); | 1016 | revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL); |
869 | 1017 | ||
870 | spin_lock_irqsave(&ep->lock, flags); | ||
871 | |||
872 | /* Copy the data member from inside the lock */ | ||
873 | epi->event.data = event->data; | ||
874 | |||
875 | /* | 1018 | /* |
876 | * If the item is "hot" and it is not registered inside the ready | 1019 | * If the item is "hot" and it is not registered inside the ready |
877 | * list, push it inside. | 1020 | * list, push it inside. |
878 | */ | 1021 | */ |
879 | if (revents & event->events) { | 1022 | if (revents & event->events) { |
1023 | spin_lock_irq(&ep->lock); | ||
880 | if (!ep_is_linked(&epi->rdllink)) { | 1024 | if (!ep_is_linked(&epi->rdllink)) { |
881 | list_add_tail(&epi->rdllink, &ep->rdllist); | 1025 | list_add_tail(&epi->rdllink, &ep->rdllist); |
882 | 1026 | ||
@@ -886,142 +1030,84 @@ static int ep_modify(struct eventpoll *ep, struct epitem *epi, struct epoll_even | |||
886 | if (waitqueue_active(&ep->poll_wait)) | 1030 | if (waitqueue_active(&ep->poll_wait)) |
887 | pwake++; | 1031 | pwake++; |
888 | } | 1032 | } |
1033 | spin_unlock_irq(&ep->lock); | ||
889 | } | 1034 | } |
890 | spin_unlock_irqrestore(&ep->lock, flags); | ||
891 | 1035 | ||
892 | /* We have to call this outside the lock */ | 1036 | /* We have to call this outside the lock */ |
893 | if (pwake) | 1037 | if (pwake) |
894 | ep_poll_safewake(&psw, &ep->poll_wait); | 1038 | ep_poll_safewake(&ep->poll_wait); |
895 | 1039 | ||
896 | return 0; | 1040 | return 0; |
897 | } | 1041 | } |
898 | 1042 | ||
899 | static int ep_send_events(struct eventpoll *ep, struct epoll_event __user *events, | 1043 | static int ep_send_events_proc(struct eventpoll *ep, struct list_head *head, |
900 | int maxevents) | 1044 | void *priv) |
901 | { | 1045 | { |
902 | int eventcnt, error = -EFAULT, pwake = 0; | 1046 | struct ep_send_events_data *esed = priv; |
1047 | int eventcnt; | ||
903 | unsigned int revents; | 1048 | unsigned int revents; |
904 | unsigned long flags; | 1049 | struct epitem *epi; |
905 | struct epitem *epi, *nepi; | 1050 | struct epoll_event __user *uevent; |
906 | struct list_head txlist; | ||
907 | |||
908 | INIT_LIST_HEAD(&txlist); | ||
909 | |||
910 | /* | ||
911 | * We need to lock this because we could be hit by | ||
912 | * eventpoll_release_file() and epoll_ctl(EPOLL_CTL_DEL). | ||
913 | */ | ||
914 | mutex_lock(&ep->mtx); | ||
915 | |||
916 | /* | ||
917 | * Steal the ready list, and re-init the original one to the | ||
918 | * empty list. Also, set ep->ovflist to NULL so that events | ||
919 | * happening while looping w/out locks, are not lost. We cannot | ||
920 | * have the poll callback to queue directly on ep->rdllist, | ||
921 | * because we are doing it in the loop below, in a lockless way. | ||
922 | */ | ||
923 | spin_lock_irqsave(&ep->lock, flags); | ||
924 | list_splice(&ep->rdllist, &txlist); | ||
925 | INIT_LIST_HEAD(&ep->rdllist); | ||
926 | ep->ovflist = NULL; | ||
927 | spin_unlock_irqrestore(&ep->lock, flags); | ||
928 | 1051 | ||
929 | /* | 1052 | /* |
930 | * We can loop without lock because this is a task private list. | 1053 | * We can loop without lock because we are passed a task private list. |
931 | * We just splice'd out the ep->rdllist in ep_collect_ready_items(). | 1054 | * Items cannot vanish during the loop because ep_scan_ready_list() is |
932 | * Items cannot vanish during the loop because we are holding "mtx". | 1055 | * holding "mtx" during this call. |
933 | */ | 1056 | */ |
934 | for (eventcnt = 0; !list_empty(&txlist) && eventcnt < maxevents;) { | 1057 | for (eventcnt = 0, uevent = esed->events; |
935 | epi = list_first_entry(&txlist, struct epitem, rdllink); | 1058 | !list_empty(head) && eventcnt < esed->maxevents;) { |
1059 | epi = list_first_entry(head, struct epitem, rdllink); | ||
936 | 1060 | ||
937 | list_del_init(&epi->rdllink); | 1061 | list_del_init(&epi->rdllink); |
938 | 1062 | ||
939 | /* | 1063 | revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL) & |
940 | * Get the ready file event set. We can safely use the file | 1064 | epi->event.events; |
941 | * because we are holding the "mtx" and this will guarantee | ||
942 | * that both the file and the item will not vanish. | ||
943 | */ | ||
944 | revents = epi->ffd.file->f_op->poll(epi->ffd.file, NULL); | ||
945 | revents &= epi->event.events; | ||
946 | 1065 | ||
947 | /* | 1066 | /* |
948 | * Is the event mask intersect the caller-requested one, | 1067 | * If the event mask intersect the caller-requested one, |
949 | * deliver the event to userspace. Again, we are holding | 1068 | * deliver the event to userspace. Again, ep_scan_ready_list() |
950 | * "mtx", so no operations coming from userspace can change | 1069 | * is holding "mtx", so no operations coming from userspace |
951 | * the item. | 1070 | * can change the item. |
952 | */ | 1071 | */ |
953 | if (revents) { | 1072 | if (revents) { |
954 | if (__put_user(revents, | 1073 | if (__put_user(revents, &uevent->events) || |
955 | &events[eventcnt].events) || | 1074 | __put_user(epi->event.data, &uevent->data)) { |
956 | __put_user(epi->event.data, | 1075 | list_add(&epi->rdllink, head); |
957 | &events[eventcnt].data)) | 1076 | return eventcnt ? eventcnt : -EFAULT; |
958 | goto errxit; | 1077 | } |
1078 | eventcnt++; | ||
1079 | uevent++; | ||
959 | if (epi->event.events & EPOLLONESHOT) | 1080 | if (epi->event.events & EPOLLONESHOT) |
960 | epi->event.events &= EP_PRIVATE_BITS; | 1081 | epi->event.events &= EP_PRIVATE_BITS; |
961 | eventcnt++; | 1082 | else if (!(epi->event.events & EPOLLET)) { |
1083 | /* | ||
1084 | * If this file has been added with Level | ||
1085 | * Trigger mode, we need to insert back inside | ||
1086 | * the ready list, so that the next call to | ||
1087 | * epoll_wait() will check again the events | ||
1088 | * availability. At this point, noone can insert | ||
1089 | * into ep->rdllist besides us. The epoll_ctl() | ||
1090 | * callers are locked out by | ||
1091 | * ep_scan_ready_list() holding "mtx" and the | ||
1092 | * poll callback will queue them in ep->ovflist. | ||
1093 | */ | ||
1094 | list_add_tail(&epi->rdllink, &ep->rdllist); | ||
1095 | } | ||
962 | } | 1096 | } |
963 | /* | ||
964 | * At this point, noone can insert into ep->rdllist besides | ||
965 | * us. The epoll_ctl() callers are locked out by us holding | ||
966 | * "mtx" and the poll callback will queue them in ep->ovflist. | ||
967 | */ | ||
968 | if (!(epi->event.events & EPOLLET) && | ||
969 | (revents & epi->event.events)) | ||
970 | list_add_tail(&epi->rdllink, &ep->rdllist); | ||
971 | } | ||
972 | error = 0; | ||
973 | |||
974 | errxit: | ||
975 | |||
976 | spin_lock_irqsave(&ep->lock, flags); | ||
977 | /* | ||
978 | * During the time we spent in the loop above, some other events | ||
979 | * might have been queued by the poll callback. We re-insert them | ||
980 | * inside the main ready-list here. | ||
981 | */ | ||
982 | for (nepi = ep->ovflist; (epi = nepi) != NULL; | ||
983 | nepi = epi->next, epi->next = EP_UNACTIVE_PTR) { | ||
984 | /* | ||
985 | * If the above loop quit with errors, the epoll item might still | ||
986 | * be linked to "txlist", and the list_splice() done below will | ||
987 | * take care of those cases. | ||
988 | */ | ||
989 | if (!ep_is_linked(&epi->rdllink)) | ||
990 | list_add_tail(&epi->rdllink, &ep->rdllist); | ||
991 | } | 1097 | } |
992 | /* | ||
993 | * We need to set back ep->ovflist to EP_UNACTIVE_PTR, so that after | ||
994 | * releasing the lock, events will be queued in the normal way inside | ||
995 | * ep->rdllist. | ||
996 | */ | ||
997 | ep->ovflist = EP_UNACTIVE_PTR; | ||
998 | 1098 | ||
999 | /* | 1099 | return eventcnt; |
1000 | * In case of error in the event-send loop, or in case the number of | 1100 | } |
1001 | * ready events exceeds the userspace limit, we need to splice the | ||
1002 | * "txlist" back inside ep->rdllist. | ||
1003 | */ | ||
1004 | list_splice(&txlist, &ep->rdllist); | ||
1005 | |||
1006 | if (!list_empty(&ep->rdllist)) { | ||
1007 | /* | ||
1008 | * Wake up (if active) both the eventpoll wait list and the ->poll() | ||
1009 | * wait list (delayed after we release the lock). | ||
1010 | */ | ||
1011 | if (waitqueue_active(&ep->wq)) | ||
1012 | wake_up_locked(&ep->wq); | ||
1013 | if (waitqueue_active(&ep->poll_wait)) | ||
1014 | pwake++; | ||
1015 | } | ||
1016 | spin_unlock_irqrestore(&ep->lock, flags); | ||
1017 | 1101 | ||
1018 | mutex_unlock(&ep->mtx); | 1102 | static int ep_send_events(struct eventpoll *ep, |
1103 | struct epoll_event __user *events, int maxevents) | ||
1104 | { | ||
1105 | struct ep_send_events_data esed; | ||
1019 | 1106 | ||
1020 | /* We have to call this outside the lock */ | 1107 | esed.maxevents = maxevents; |
1021 | if (pwake) | 1108 | esed.events = events; |
1022 | ep_poll_safewake(&psw, &ep->poll_wait); | ||
1023 | 1109 | ||
1024 | return eventcnt == 0 ? error: eventcnt; | 1110 | return ep_scan_ready_list(ep, ep_send_events_proc, &esed); |
1025 | } | 1111 | } |
1026 | 1112 | ||
1027 | static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, | 1113 | static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, |
@@ -1033,7 +1119,7 @@ static int ep_poll(struct eventpoll *ep, struct epoll_event __user *events, | |||
1033 | wait_queue_t wait; | 1119 | wait_queue_t wait; |
1034 | 1120 | ||
1035 | /* | 1121 | /* |
1036 | * Calculate the timeout by checking for the "infinite" value ( -1 ) | 1122 | * Calculate the timeout by checking for the "infinite" value (-1) |
1037 | * and the overflow condition. The passed timeout is in milliseconds, | 1123 | * and the overflow condition. The passed timeout is in milliseconds, |
1038 | * that why (t * HZ) / 1000. | 1124 | * that why (t * HZ) / 1000. |
1039 | */ | 1125 | */ |
@@ -1076,9 +1162,8 @@ retry: | |||
1076 | 1162 | ||
1077 | set_current_state(TASK_RUNNING); | 1163 | set_current_state(TASK_RUNNING); |
1078 | } | 1164 | } |
1079 | |||
1080 | /* Is it worth to try to dig for events ? */ | 1165 | /* Is it worth to try to dig for events ? */ |
1081 | eavail = !list_empty(&ep->rdllist); | 1166 | eavail = !list_empty(&ep->rdllist) || ep->ovflist != EP_UNACTIVE_PTR; |
1082 | 1167 | ||
1083 | spin_unlock_irqrestore(&ep->lock, flags); | 1168 | spin_unlock_irqrestore(&ep->lock, flags); |
1084 | 1169 | ||
@@ -1099,41 +1184,30 @@ retry: | |||
1099 | */ | 1184 | */ |
1100 | SYSCALL_DEFINE1(epoll_create1, int, flags) | 1185 | SYSCALL_DEFINE1(epoll_create1, int, flags) |
1101 | { | 1186 | { |
1102 | int error, fd = -1; | 1187 | int error; |
1103 | struct eventpoll *ep; | 1188 | struct eventpoll *ep = NULL; |
1104 | 1189 | ||
1105 | /* Check the EPOLL_* constant for consistency. */ | 1190 | /* Check the EPOLL_* constant for consistency. */ |
1106 | BUILD_BUG_ON(EPOLL_CLOEXEC != O_CLOEXEC); | 1191 | BUILD_BUG_ON(EPOLL_CLOEXEC != O_CLOEXEC); |
1107 | 1192 | ||
1108 | if (flags & ~EPOLL_CLOEXEC) | 1193 | if (flags & ~EPOLL_CLOEXEC) |
1109 | return -EINVAL; | 1194 | return -EINVAL; |
1110 | |||
1111 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_create(%d)\n", | ||
1112 | current, flags)); | ||
1113 | |||
1114 | /* | 1195 | /* |
1115 | * Create the internal data structure ( "struct eventpoll" ). | 1196 | * Create the internal data structure ("struct eventpoll"). |
1116 | */ | 1197 | */ |
1117 | error = ep_alloc(&ep); | 1198 | error = ep_alloc(&ep); |
1118 | if (error < 0) { | 1199 | if (error < 0) |
1119 | fd = error; | 1200 | return error; |
1120 | goto error_return; | ||
1121 | } | ||
1122 | |||
1123 | /* | 1201 | /* |
1124 | * Creates all the items needed to setup an eventpoll file. That is, | 1202 | * Creates all the items needed to setup an eventpoll file. That is, |
1125 | * a file structure and a free file descriptor. | 1203 | * a file structure and a free file descriptor. |
1126 | */ | 1204 | */ |
1127 | fd = anon_inode_getfd("[eventpoll]", &eventpoll_fops, ep, | 1205 | error = anon_inode_getfd("[eventpoll]", &eventpoll_fops, ep, |
1128 | flags & O_CLOEXEC); | 1206 | flags & O_CLOEXEC); |
1129 | if (fd < 0) | 1207 | if (error < 0) |
1130 | ep_free(ep); | 1208 | ep_free(ep); |
1131 | 1209 | ||
1132 | error_return: | 1210 | return error; |
1133 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_create(%d) = %d\n", | ||
1134 | current, flags, fd)); | ||
1135 | |||
1136 | return fd; | ||
1137 | } | 1211 | } |
1138 | 1212 | ||
1139 | SYSCALL_DEFINE1(epoll_create, int, size) | 1213 | SYSCALL_DEFINE1(epoll_create, int, size) |
@@ -1158,9 +1232,6 @@ SYSCALL_DEFINE4(epoll_ctl, int, epfd, int, op, int, fd, | |||
1158 | struct epitem *epi; | 1232 | struct epitem *epi; |
1159 | struct epoll_event epds; | 1233 | struct epoll_event epds; |
1160 | 1234 | ||
1161 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_ctl(%d, %d, %d, %p)\n", | ||
1162 | current, epfd, op, fd, event)); | ||
1163 | |||
1164 | error = -EFAULT; | 1235 | error = -EFAULT; |
1165 | if (ep_op_has_event(op) && | 1236 | if (ep_op_has_event(op) && |
1166 | copy_from_user(&epds, event, sizeof(struct epoll_event))) | 1237 | copy_from_user(&epds, event, sizeof(struct epoll_event))) |
@@ -1211,7 +1282,6 @@ SYSCALL_DEFINE4(epoll_ctl, int, epfd, int, op, int, fd, | |||
1211 | case EPOLL_CTL_ADD: | 1282 | case EPOLL_CTL_ADD: |
1212 | if (!epi) { | 1283 | if (!epi) { |
1213 | epds.events |= POLLERR | POLLHUP; | 1284 | epds.events |= POLLERR | POLLHUP; |
1214 | |||
1215 | error = ep_insert(ep, &epds, tfile, fd); | 1285 | error = ep_insert(ep, &epds, tfile, fd); |
1216 | } else | 1286 | } else |
1217 | error = -EEXIST; | 1287 | error = -EEXIST; |
@@ -1237,8 +1307,6 @@ error_tgt_fput: | |||
1237 | error_fput: | 1307 | error_fput: |
1238 | fput(file); | 1308 | fput(file); |
1239 | error_return: | 1309 | error_return: |
1240 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_ctl(%d, %d, %d, %p) = %d\n", | ||
1241 | current, epfd, op, fd, event, error)); | ||
1242 | 1310 | ||
1243 | return error; | 1311 | return error; |
1244 | } | 1312 | } |
@@ -1254,9 +1322,6 @@ SYSCALL_DEFINE4(epoll_wait, int, epfd, struct epoll_event __user *, events, | |||
1254 | struct file *file; | 1322 | struct file *file; |
1255 | struct eventpoll *ep; | 1323 | struct eventpoll *ep; |
1256 | 1324 | ||
1257 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_wait(%d, %p, %d, %d)\n", | ||
1258 | current, epfd, events, maxevents, timeout)); | ||
1259 | |||
1260 | /* The maximum number of event must be greater than zero */ | 1325 | /* The maximum number of event must be greater than zero */ |
1261 | if (maxevents <= 0 || maxevents > EP_MAX_EVENTS) | 1326 | if (maxevents <= 0 || maxevents > EP_MAX_EVENTS) |
1262 | return -EINVAL; | 1327 | return -EINVAL; |
@@ -1293,8 +1358,6 @@ SYSCALL_DEFINE4(epoll_wait, int, epfd, struct epoll_event __user *, events, | |||
1293 | error_fput: | 1358 | error_fput: |
1294 | fput(file); | 1359 | fput(file); |
1295 | error_return: | 1360 | error_return: |
1296 | DNPRINTK(3, (KERN_INFO "[%p] eventpoll: sys_epoll_wait(%d, %p, %d, %d) = %d\n", | ||
1297 | current, epfd, events, maxevents, timeout, error)); | ||
1298 | 1361 | ||
1299 | return error; | 1362 | return error; |
1300 | } | 1363 | } |
@@ -1359,17 +1422,18 @@ static int __init eventpoll_init(void) | |||
1359 | EP_ITEM_COST; | 1422 | EP_ITEM_COST; |
1360 | 1423 | ||
1361 | /* Initialize the structure used to perform safe poll wait head wake ups */ | 1424 | /* Initialize the structure used to perform safe poll wait head wake ups */ |
1362 | ep_poll_safewake_init(&psw); | 1425 | ep_nested_calls_init(&poll_safewake_ncalls); |
1426 | |||
1427 | /* Initialize the structure used to perform file's f_op->poll() calls */ | ||
1428 | ep_nested_calls_init(&poll_readywalk_ncalls); | ||
1363 | 1429 | ||
1364 | /* Allocates slab cache used to allocate "struct epitem" items */ | 1430 | /* Allocates slab cache used to allocate "struct epitem" items */ |
1365 | epi_cache = kmem_cache_create("eventpoll_epi", sizeof(struct epitem), | 1431 | epi_cache = kmem_cache_create("eventpoll_epi", sizeof(struct epitem), |
1366 | 0, SLAB_HWCACHE_ALIGN|EPI_SLAB_DEBUG|SLAB_PANIC, | 1432 | 0, SLAB_HWCACHE_ALIGN | SLAB_PANIC, NULL); |
1367 | NULL); | ||
1368 | 1433 | ||
1369 | /* Allocates slab cache used to allocate "struct eppoll_entry" */ | 1434 | /* Allocates slab cache used to allocate "struct eppoll_entry" */ |
1370 | pwq_cache = kmem_cache_create("eventpoll_pwq", | 1435 | pwq_cache = kmem_cache_create("eventpoll_pwq", |
1371 | sizeof(struct eppoll_entry), 0, | 1436 | sizeof(struct eppoll_entry), 0, SLAB_PANIC, NULL); |
1372 | EPI_SLAB_DEBUG|SLAB_PANIC, NULL); | ||
1373 | 1437 | ||
1374 | return 0; | 1438 | return 0; |
1375 | } | 1439 | } |
diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h index 6083bb38057b..990c94000924 100644 --- a/fs/ext4/ext4.h +++ b/fs/ext4/ext4.h | |||
@@ -1098,7 +1098,7 @@ extern int ext4_meta_trans_blocks(struct inode *, int nrblocks, int idxblocks); | |||
1098 | extern int ext4_chunk_trans_blocks(struct inode *, int nrblocks); | 1098 | extern int ext4_chunk_trans_blocks(struct inode *, int nrblocks); |
1099 | extern int ext4_block_truncate_page(handle_t *handle, | 1099 | extern int ext4_block_truncate_page(handle_t *handle, |
1100 | struct address_space *mapping, loff_t from); | 1100 | struct address_space *mapping, loff_t from); |
1101 | extern int ext4_page_mkwrite(struct vm_area_struct *vma, struct page *page); | 1101 | extern int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf); |
1102 | extern qsize_t ext4_get_reserved_space(struct inode *inode); | 1102 | extern qsize_t ext4_get_reserved_space(struct inode *inode); |
1103 | 1103 | ||
1104 | /* ioctl.c */ | 1104 | /* ioctl.c */ |
diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c index 71d3ecd5db79..dd82ff390067 100644 --- a/fs/ext4/inode.c +++ b/fs/ext4/inode.c | |||
@@ -5146,8 +5146,9 @@ static int ext4_bh_unmapped(handle_t *handle, struct buffer_head *bh) | |||
5146 | return !buffer_mapped(bh); | 5146 | return !buffer_mapped(bh); |
5147 | } | 5147 | } |
5148 | 5148 | ||
5149 | int ext4_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 5149 | int ext4_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
5150 | { | 5150 | { |
5151 | struct page *page = vmf->page; | ||
5151 | loff_t size; | 5152 | loff_t size; |
5152 | unsigned long len; | 5153 | unsigned long len; |
5153 | int ret = -EINVAL; | 5154 | int ret = -EINVAL; |
@@ -5199,6 +5200,8 @@ int ext4_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
5199 | goto out_unlock; | 5200 | goto out_unlock; |
5200 | ret = 0; | 5201 | ret = 0; |
5201 | out_unlock: | 5202 | out_unlock: |
5203 | if (ret) | ||
5204 | ret = VM_FAULT_SIGBUS; | ||
5202 | up_read(&inode->i_alloc_sem); | 5205 | up_read(&inode->i_alloc_sem); |
5203 | return ret; | 5206 | return ret; |
5204 | } | 5207 | } |
diff --git a/fs/fuse/file.c b/fs/fuse/file.c index 821d10f719bd..4e340fedf768 100644 --- a/fs/fuse/file.c +++ b/fs/fuse/file.c | |||
@@ -1234,8 +1234,9 @@ static void fuse_vma_close(struct vm_area_struct *vma) | |||
1234 | * - sync(2) | 1234 | * - sync(2) |
1235 | * - try_to_free_pages() with order > PAGE_ALLOC_COSTLY_ORDER | 1235 | * - try_to_free_pages() with order > PAGE_ALLOC_COSTLY_ORDER |
1236 | */ | 1236 | */ |
1237 | static int fuse_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 1237 | static int fuse_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
1238 | { | 1238 | { |
1239 | struct page *page = vmf->page; | ||
1239 | /* | 1240 | /* |
1240 | * Don't use page->mapping as it may become NULL from a | 1241 | * Don't use page->mapping as it may become NULL from a |
1241 | * concurrent truncate. | 1242 | * concurrent truncate. |
diff --git a/fs/gfs2/ops_file.c b/fs/gfs2/ops_file.c index 3b9e8de3500b..70b9b8548945 100644 --- a/fs/gfs2/ops_file.c +++ b/fs/gfs2/ops_file.c | |||
@@ -337,8 +337,9 @@ static int gfs2_allocate_page_backing(struct page *page) | |||
337 | * blocks allocated on disk to back that page. | 337 | * blocks allocated on disk to back that page. |
338 | */ | 338 | */ |
339 | 339 | ||
340 | static int gfs2_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 340 | static int gfs2_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
341 | { | 341 | { |
342 | struct page *page = vmf->page; | ||
342 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; | 343 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; |
343 | struct gfs2_inode *ip = GFS2_I(inode); | 344 | struct gfs2_inode *ip = GFS2_I(inode); |
344 | struct gfs2_sbd *sdp = GFS2_SB(inode); | 345 | struct gfs2_sbd *sdp = GFS2_SB(inode); |
@@ -412,6 +413,8 @@ out_unlock: | |||
412 | gfs2_glock_dq(&gh); | 413 | gfs2_glock_dq(&gh); |
413 | out: | 414 | out: |
414 | gfs2_holder_uninit(&gh); | 415 | gfs2_holder_uninit(&gh); |
416 | if (ret) | ||
417 | ret = VM_FAULT_SIGBUS; | ||
415 | return ret; | 418 | return ret; |
416 | } | 419 | } |
417 | 420 | ||
diff --git a/fs/hugetlbfs/inode.c b/fs/hugetlbfs/inode.c index 9b800d97a687..23a3c76711e0 100644 --- a/fs/hugetlbfs/inode.c +++ b/fs/hugetlbfs/inode.c | |||
@@ -943,14 +943,13 @@ static struct vfsmount *hugetlbfs_vfsmount; | |||
943 | 943 | ||
944 | static int can_do_hugetlb_shm(void) | 944 | static int can_do_hugetlb_shm(void) |
945 | { | 945 | { |
946 | return likely(capable(CAP_IPC_LOCK) || | 946 | return capable(CAP_IPC_LOCK) || in_group_p(sysctl_hugetlb_shm_group); |
947 | in_group_p(sysctl_hugetlb_shm_group) || | ||
948 | can_do_mlock()); | ||
949 | } | 947 | } |
950 | 948 | ||
951 | struct file *hugetlb_file_setup(const char *name, size_t size, int acctflag) | 949 | struct file *hugetlb_file_setup(const char *name, size_t size, int acctflag) |
952 | { | 950 | { |
953 | int error = -ENOMEM; | 951 | int error = -ENOMEM; |
952 | int unlock_shm = 0; | ||
954 | struct file *file; | 953 | struct file *file; |
955 | struct inode *inode; | 954 | struct inode *inode; |
956 | struct dentry *dentry, *root; | 955 | struct dentry *dentry, *root; |
@@ -960,11 +959,14 @@ struct file *hugetlb_file_setup(const char *name, size_t size, int acctflag) | |||
960 | if (!hugetlbfs_vfsmount) | 959 | if (!hugetlbfs_vfsmount) |
961 | return ERR_PTR(-ENOENT); | 960 | return ERR_PTR(-ENOENT); |
962 | 961 | ||
963 | if (!can_do_hugetlb_shm()) | 962 | if (!can_do_hugetlb_shm()) { |
964 | return ERR_PTR(-EPERM); | 963 | if (user_shm_lock(size, user)) { |
965 | 964 | unlock_shm = 1; | |
966 | if (!user_shm_lock(size, user)) | 965 | WARN_ONCE(1, |
967 | return ERR_PTR(-ENOMEM); | 966 | "Using mlock ulimits for SHM_HUGETLB deprecated\n"); |
967 | } else | ||
968 | return ERR_PTR(-EPERM); | ||
969 | } | ||
968 | 970 | ||
969 | root = hugetlbfs_vfsmount->mnt_root; | 971 | root = hugetlbfs_vfsmount->mnt_root; |
970 | quick_string.name = name; | 972 | quick_string.name = name; |
@@ -1004,7 +1006,8 @@ out_inode: | |||
1004 | out_dentry: | 1006 | out_dentry: |
1005 | dput(dentry); | 1007 | dput(dentry); |
1006 | out_shm_unlock: | 1008 | out_shm_unlock: |
1007 | user_shm_unlock(size, user); | 1009 | if (unlock_shm) |
1010 | user_shm_unlock(size, user); | ||
1008 | return ERR_PTR(error); | 1011 | return ERR_PTR(error); |
1009 | } | 1012 | } |
1010 | 1013 | ||
diff --git a/fs/jfs/jfs_debug.c b/fs/jfs/jfs_debug.c index 6a73de84bcef..dd824d9b0b1a 100644 --- a/fs/jfs/jfs_debug.c +++ b/fs/jfs/jfs_debug.c | |||
@@ -90,7 +90,6 @@ void jfs_proc_init(void) | |||
90 | 90 | ||
91 | if (!(base = proc_mkdir("fs/jfs", NULL))) | 91 | if (!(base = proc_mkdir("fs/jfs", NULL))) |
92 | return; | 92 | return; |
93 | base->owner = THIS_MODULE; | ||
94 | 93 | ||
95 | for (i = 0; i < NPROCENT; i++) | 94 | for (i = 0; i < NPROCENT; i++) |
96 | proc_create(Entries[i].name, 0, base, Entries[i].proc_fops); | 95 | proc_create(Entries[i].name, 0, base, Entries[i].proc_fops); |
diff --git a/fs/nfs/client.c b/fs/nfs/client.c index 574158ae2398..2277421656e7 100644 --- a/fs/nfs/client.c +++ b/fs/nfs/client.c | |||
@@ -1606,8 +1606,6 @@ int __init nfs_fs_proc_init(void) | |||
1606 | if (!proc_fs_nfs) | 1606 | if (!proc_fs_nfs) |
1607 | goto error_0; | 1607 | goto error_0; |
1608 | 1608 | ||
1609 | proc_fs_nfs->owner = THIS_MODULE; | ||
1610 | |||
1611 | /* a file of servers with which we're dealing */ | 1609 | /* a file of servers with which we're dealing */ |
1612 | p = proc_create("servers", S_IFREG|S_IRUGO, | 1610 | p = proc_create("servers", S_IFREG|S_IRUGO, |
1613 | proc_fs_nfs, &nfs_server_list_fops); | 1611 | proc_fs_nfs, &nfs_server_list_fops); |
diff --git a/fs/nfs/file.c b/fs/nfs/file.c index 90f292b520d2..cec79392e4ba 100644 --- a/fs/nfs/file.c +++ b/fs/nfs/file.c | |||
@@ -451,8 +451,9 @@ const struct address_space_operations nfs_file_aops = { | |||
451 | .launder_page = nfs_launder_page, | 451 | .launder_page = nfs_launder_page, |
452 | }; | 452 | }; |
453 | 453 | ||
454 | static int nfs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 454 | static int nfs_vm_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
455 | { | 455 | { |
456 | struct page *page = vmf->page; | ||
456 | struct file *filp = vma->vm_file; | 457 | struct file *filp = vma->vm_file; |
457 | struct dentry *dentry = filp->f_path.dentry; | 458 | struct dentry *dentry = filp->f_path.dentry; |
458 | unsigned pagelen; | 459 | unsigned pagelen; |
@@ -483,6 +484,8 @@ static int nfs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
483 | ret = pagelen; | 484 | ret = pagelen; |
484 | out_unlock: | 485 | out_unlock: |
485 | unlock_page(page); | 486 | unlock_page(page); |
487 | if (ret) | ||
488 | ret = VM_FAULT_SIGBUS; | ||
486 | return ret; | 489 | return ret; |
487 | } | 490 | } |
488 | 491 | ||
diff --git a/fs/ntfs/dir.c b/fs/ntfs/dir.c index 34314b33dbd4..5a9e34475e37 100644 --- a/fs/ntfs/dir.c +++ b/fs/ntfs/dir.c | |||
@@ -32,8 +32,8 @@ | |||
32 | /** | 32 | /** |
33 | * The little endian Unicode string $I30 as a global constant. | 33 | * The little endian Unicode string $I30 as a global constant. |
34 | */ | 34 | */ |
35 | ntfschar I30[5] = { const_cpu_to_le16('$'), const_cpu_to_le16('I'), | 35 | ntfschar I30[5] = { cpu_to_le16('$'), cpu_to_le16('I'), |
36 | const_cpu_to_le16('3'), const_cpu_to_le16('0'), 0 }; | 36 | cpu_to_le16('3'), cpu_to_le16('0'), 0 }; |
37 | 37 | ||
38 | /** | 38 | /** |
39 | * ntfs_lookup_inode_by_name - find an inode in a directory given its name | 39 | * ntfs_lookup_inode_by_name - find an inode in a directory given its name |
diff --git a/fs/ntfs/inode.c b/fs/ntfs/inode.c index 86bef156cf0a..82c5085559c6 100644 --- a/fs/ntfs/inode.c +++ b/fs/ntfs/inode.c | |||
@@ -1975,8 +1975,7 @@ int ntfs_read_inode_mount(struct inode *vi) | |||
1975 | goto em_put_err_out; | 1975 | goto em_put_err_out; |
1976 | next_al_entry = (ATTR_LIST_ENTRY*)((u8*)al_entry + | 1976 | next_al_entry = (ATTR_LIST_ENTRY*)((u8*)al_entry + |
1977 | le16_to_cpu(al_entry->length)); | 1977 | le16_to_cpu(al_entry->length)); |
1978 | if (le32_to_cpu(al_entry->type) > | 1978 | if (le32_to_cpu(al_entry->type) > le32_to_cpu(AT_DATA)) |
1979 | const_le32_to_cpu(AT_DATA)) | ||
1980 | goto em_put_err_out; | 1979 | goto em_put_err_out; |
1981 | if (AT_DATA != al_entry->type) | 1980 | if (AT_DATA != al_entry->type) |
1982 | continue; | 1981 | continue; |
diff --git a/fs/ntfs/layout.h b/fs/ntfs/layout.h index 1e383328eceb..50931b1ce4b9 100644 --- a/fs/ntfs/layout.h +++ b/fs/ntfs/layout.h | |||
@@ -31,19 +31,8 @@ | |||
31 | 31 | ||
32 | #include "types.h" | 32 | #include "types.h" |
33 | 33 | ||
34 | /* | ||
35 | * Constant endianness conversion defines. | ||
36 | */ | ||
37 | #define const_le16_to_cpu(x) __constant_le16_to_cpu(x) | ||
38 | #define const_le32_to_cpu(x) __constant_le32_to_cpu(x) | ||
39 | #define const_le64_to_cpu(x) __constant_le64_to_cpu(x) | ||
40 | |||
41 | #define const_cpu_to_le16(x) __constant_cpu_to_le16(x) | ||
42 | #define const_cpu_to_le32(x) __constant_cpu_to_le32(x) | ||
43 | #define const_cpu_to_le64(x) __constant_cpu_to_le64(x) | ||
44 | |||
45 | /* The NTFS oem_id "NTFS " */ | 34 | /* The NTFS oem_id "NTFS " */ |
46 | #define magicNTFS const_cpu_to_le64(0x202020205346544eULL) | 35 | #define magicNTFS cpu_to_le64(0x202020205346544eULL) |
47 | 36 | ||
48 | /* | 37 | /* |
49 | * Location of bootsector on partition: | 38 | * Location of bootsector on partition: |
@@ -114,25 +103,25 @@ typedef struct { | |||
114 | */ | 103 | */ |
115 | enum { | 104 | enum { |
116 | /* Found in $MFT/$DATA. */ | 105 | /* Found in $MFT/$DATA. */ |
117 | magic_FILE = const_cpu_to_le32(0x454c4946), /* Mft entry. */ | 106 | magic_FILE = cpu_to_le32(0x454c4946), /* Mft entry. */ |
118 | magic_INDX = const_cpu_to_le32(0x58444e49), /* Index buffer. */ | 107 | magic_INDX = cpu_to_le32(0x58444e49), /* Index buffer. */ |
119 | magic_HOLE = const_cpu_to_le32(0x454c4f48), /* ? (NTFS 3.0+?) */ | 108 | magic_HOLE = cpu_to_le32(0x454c4f48), /* ? (NTFS 3.0+?) */ |
120 | 109 | ||
121 | /* Found in $LogFile/$DATA. */ | 110 | /* Found in $LogFile/$DATA. */ |
122 | magic_RSTR = const_cpu_to_le32(0x52545352), /* Restart page. */ | 111 | magic_RSTR = cpu_to_le32(0x52545352), /* Restart page. */ |
123 | magic_RCRD = const_cpu_to_le32(0x44524352), /* Log record page. */ | 112 | magic_RCRD = cpu_to_le32(0x44524352), /* Log record page. */ |
124 | 113 | ||
125 | /* Found in $LogFile/$DATA. (May be found in $MFT/$DATA, also?) */ | 114 | /* Found in $LogFile/$DATA. (May be found in $MFT/$DATA, also?) */ |
126 | magic_CHKD = const_cpu_to_le32(0x444b4843), /* Modified by chkdsk. */ | 115 | magic_CHKD = cpu_to_le32(0x444b4843), /* Modified by chkdsk. */ |
127 | 116 | ||
128 | /* Found in all ntfs record containing records. */ | 117 | /* Found in all ntfs record containing records. */ |
129 | magic_BAAD = const_cpu_to_le32(0x44414142), /* Failed multi sector | 118 | magic_BAAD = cpu_to_le32(0x44414142), /* Failed multi sector |
130 | transfer was detected. */ | 119 | transfer was detected. */ |
131 | /* | 120 | /* |
132 | * Found in $LogFile/$DATA when a page is full of 0xff bytes and is | 121 | * Found in $LogFile/$DATA when a page is full of 0xff bytes and is |
133 | * thus not initialized. Page must be initialized before using it. | 122 | * thus not initialized. Page must be initialized before using it. |
134 | */ | 123 | */ |
135 | magic_empty = const_cpu_to_le32(0xffffffff) /* Record is empty. */ | 124 | magic_empty = cpu_to_le32(0xffffffff) /* Record is empty. */ |
136 | }; | 125 | }; |
137 | 126 | ||
138 | typedef le32 NTFS_RECORD_TYPE; | 127 | typedef le32 NTFS_RECORD_TYPE; |
@@ -258,8 +247,8 @@ typedef enum { | |||
258 | * information about the mft record in which they are present. | 247 | * information about the mft record in which they are present. |
259 | */ | 248 | */ |
260 | enum { | 249 | enum { |
261 | MFT_RECORD_IN_USE = const_cpu_to_le16(0x0001), | 250 | MFT_RECORD_IN_USE = cpu_to_le16(0x0001), |
262 | MFT_RECORD_IS_DIRECTORY = const_cpu_to_le16(0x0002), | 251 | MFT_RECORD_IS_DIRECTORY = cpu_to_le16(0x0002), |
263 | } __attribute__ ((__packed__)); | 252 | } __attribute__ ((__packed__)); |
264 | 253 | ||
265 | typedef le16 MFT_RECORD_FLAGS; | 254 | typedef le16 MFT_RECORD_FLAGS; |
@@ -309,7 +298,7 @@ typedef le16 MFT_RECORD_FLAGS; | |||
309 | * Note: The _LE versions will return a CPU endian formatted value! | 298 | * Note: The _LE versions will return a CPU endian formatted value! |
310 | */ | 299 | */ |
311 | #define MFT_REF_MASK_CPU 0x0000ffffffffffffULL | 300 | #define MFT_REF_MASK_CPU 0x0000ffffffffffffULL |
312 | #define MFT_REF_MASK_LE const_cpu_to_le64(MFT_REF_MASK_CPU) | 301 | #define MFT_REF_MASK_LE cpu_to_le64(MFT_REF_MASK_CPU) |
313 | 302 | ||
314 | typedef u64 MFT_REF; | 303 | typedef u64 MFT_REF; |
315 | typedef le64 leMFT_REF; | 304 | typedef le64 leMFT_REF; |
@@ -477,25 +466,25 @@ typedef struct { | |||
477 | * a revealing choice of symbol I do not know what is... (-; | 466 | * a revealing choice of symbol I do not know what is... (-; |
478 | */ | 467 | */ |
479 | enum { | 468 | enum { |
480 | AT_UNUSED = const_cpu_to_le32( 0), | 469 | AT_UNUSED = cpu_to_le32( 0), |
481 | AT_STANDARD_INFORMATION = const_cpu_to_le32( 0x10), | 470 | AT_STANDARD_INFORMATION = cpu_to_le32( 0x10), |
482 | AT_ATTRIBUTE_LIST = const_cpu_to_le32( 0x20), | 471 | AT_ATTRIBUTE_LIST = cpu_to_le32( 0x20), |
483 | AT_FILE_NAME = const_cpu_to_le32( 0x30), | 472 | AT_FILE_NAME = cpu_to_le32( 0x30), |
484 | AT_OBJECT_ID = const_cpu_to_le32( 0x40), | 473 | AT_OBJECT_ID = cpu_to_le32( 0x40), |
485 | AT_SECURITY_DESCRIPTOR = const_cpu_to_le32( 0x50), | 474 | AT_SECURITY_DESCRIPTOR = cpu_to_le32( 0x50), |
486 | AT_VOLUME_NAME = const_cpu_to_le32( 0x60), | 475 | AT_VOLUME_NAME = cpu_to_le32( 0x60), |
487 | AT_VOLUME_INFORMATION = const_cpu_to_le32( 0x70), | 476 | AT_VOLUME_INFORMATION = cpu_to_le32( 0x70), |
488 | AT_DATA = const_cpu_to_le32( 0x80), | 477 | AT_DATA = cpu_to_le32( 0x80), |
489 | AT_INDEX_ROOT = const_cpu_to_le32( 0x90), | 478 | AT_INDEX_ROOT = cpu_to_le32( 0x90), |
490 | AT_INDEX_ALLOCATION = const_cpu_to_le32( 0xa0), | 479 | AT_INDEX_ALLOCATION = cpu_to_le32( 0xa0), |
491 | AT_BITMAP = const_cpu_to_le32( 0xb0), | 480 | AT_BITMAP = cpu_to_le32( 0xb0), |
492 | AT_REPARSE_POINT = const_cpu_to_le32( 0xc0), | 481 | AT_REPARSE_POINT = cpu_to_le32( 0xc0), |
493 | AT_EA_INFORMATION = const_cpu_to_le32( 0xd0), | 482 | AT_EA_INFORMATION = cpu_to_le32( 0xd0), |
494 | AT_EA = const_cpu_to_le32( 0xe0), | 483 | AT_EA = cpu_to_le32( 0xe0), |
495 | AT_PROPERTY_SET = const_cpu_to_le32( 0xf0), | 484 | AT_PROPERTY_SET = cpu_to_le32( 0xf0), |
496 | AT_LOGGED_UTILITY_STREAM = const_cpu_to_le32( 0x100), | 485 | AT_LOGGED_UTILITY_STREAM = cpu_to_le32( 0x100), |
497 | AT_FIRST_USER_DEFINED_ATTRIBUTE = const_cpu_to_le32( 0x1000), | 486 | AT_FIRST_USER_DEFINED_ATTRIBUTE = cpu_to_le32( 0x1000), |
498 | AT_END = const_cpu_to_le32(0xffffffff) | 487 | AT_END = cpu_to_le32(0xffffffff) |
499 | }; | 488 | }; |
500 | 489 | ||
501 | typedef le32 ATTR_TYPE; | 490 | typedef le32 ATTR_TYPE; |
@@ -539,13 +528,13 @@ typedef le32 ATTR_TYPE; | |||
539 | * equal then the second le32 values would be compared, etc. | 528 | * equal then the second le32 values would be compared, etc. |
540 | */ | 529 | */ |
541 | enum { | 530 | enum { |
542 | COLLATION_BINARY = const_cpu_to_le32(0x00), | 531 | COLLATION_BINARY = cpu_to_le32(0x00), |
543 | COLLATION_FILE_NAME = const_cpu_to_le32(0x01), | 532 | COLLATION_FILE_NAME = cpu_to_le32(0x01), |
544 | COLLATION_UNICODE_STRING = const_cpu_to_le32(0x02), | 533 | COLLATION_UNICODE_STRING = cpu_to_le32(0x02), |
545 | COLLATION_NTOFS_ULONG = const_cpu_to_le32(0x10), | 534 | COLLATION_NTOFS_ULONG = cpu_to_le32(0x10), |
546 | COLLATION_NTOFS_SID = const_cpu_to_le32(0x11), | 535 | COLLATION_NTOFS_SID = cpu_to_le32(0x11), |
547 | COLLATION_NTOFS_SECURITY_HASH = const_cpu_to_le32(0x12), | 536 | COLLATION_NTOFS_SECURITY_HASH = cpu_to_le32(0x12), |
548 | COLLATION_NTOFS_ULONGS = const_cpu_to_le32(0x13), | 537 | COLLATION_NTOFS_ULONGS = cpu_to_le32(0x13), |
549 | }; | 538 | }; |
550 | 539 | ||
551 | typedef le32 COLLATION_RULE; | 540 | typedef le32 COLLATION_RULE; |
@@ -559,25 +548,25 @@ typedef le32 COLLATION_RULE; | |||
559 | * NT4. | 548 | * NT4. |
560 | */ | 549 | */ |
561 | enum { | 550 | enum { |
562 | ATTR_DEF_INDEXABLE = const_cpu_to_le32(0x02), /* Attribute can be | 551 | ATTR_DEF_INDEXABLE = cpu_to_le32(0x02), /* Attribute can be |
563 | indexed. */ | 552 | indexed. */ |
564 | ATTR_DEF_MULTIPLE = const_cpu_to_le32(0x04), /* Attribute type | 553 | ATTR_DEF_MULTIPLE = cpu_to_le32(0x04), /* Attribute type |
565 | can be present multiple times in the | 554 | can be present multiple times in the |
566 | mft records of an inode. */ | 555 | mft records of an inode. */ |
567 | ATTR_DEF_NOT_ZERO = const_cpu_to_le32(0x08), /* Attribute value | 556 | ATTR_DEF_NOT_ZERO = cpu_to_le32(0x08), /* Attribute value |
568 | must contain at least one non-zero | 557 | must contain at least one non-zero |
569 | byte. */ | 558 | byte. */ |
570 | ATTR_DEF_INDEXED_UNIQUE = const_cpu_to_le32(0x10), /* Attribute must be | 559 | ATTR_DEF_INDEXED_UNIQUE = cpu_to_le32(0x10), /* Attribute must be |
571 | indexed and the attribute value must be | 560 | indexed and the attribute value must be |
572 | unique for the attribute type in all of | 561 | unique for the attribute type in all of |
573 | the mft records of an inode. */ | 562 | the mft records of an inode. */ |
574 | ATTR_DEF_NAMED_UNIQUE = const_cpu_to_le32(0x20), /* Attribute must be | 563 | ATTR_DEF_NAMED_UNIQUE = cpu_to_le32(0x20), /* Attribute must be |
575 | named and the name must be unique for | 564 | named and the name must be unique for |
576 | the attribute type in all of the mft | 565 | the attribute type in all of the mft |
577 | records of an inode. */ | 566 | records of an inode. */ |
578 | ATTR_DEF_RESIDENT = const_cpu_to_le32(0x40), /* Attribute must be | 567 | ATTR_DEF_RESIDENT = cpu_to_le32(0x40), /* Attribute must be |
579 | resident. */ | 568 | resident. */ |
580 | ATTR_DEF_ALWAYS_LOG = const_cpu_to_le32(0x80), /* Always log | 569 | ATTR_DEF_ALWAYS_LOG = cpu_to_le32(0x80), /* Always log |
581 | modifications to this attribute, | 570 | modifications to this attribute, |
582 | regardless of whether it is resident or | 571 | regardless of whether it is resident or |
583 | non-resident. Without this, only log | 572 | non-resident. Without this, only log |
@@ -614,12 +603,12 @@ typedef struct { | |||
614 | * Attribute flags (16-bit). | 603 | * Attribute flags (16-bit). |
615 | */ | 604 | */ |
616 | enum { | 605 | enum { |
617 | ATTR_IS_COMPRESSED = const_cpu_to_le16(0x0001), | 606 | ATTR_IS_COMPRESSED = cpu_to_le16(0x0001), |
618 | ATTR_COMPRESSION_MASK = const_cpu_to_le16(0x00ff), /* Compression method | 607 | ATTR_COMPRESSION_MASK = cpu_to_le16(0x00ff), /* Compression method |
619 | mask. Also, first | 608 | mask. Also, first |
620 | illegal value. */ | 609 | illegal value. */ |
621 | ATTR_IS_ENCRYPTED = const_cpu_to_le16(0x4000), | 610 | ATTR_IS_ENCRYPTED = cpu_to_le16(0x4000), |
622 | ATTR_IS_SPARSE = const_cpu_to_le16(0x8000), | 611 | ATTR_IS_SPARSE = cpu_to_le16(0x8000), |
623 | } __attribute__ ((__packed__)); | 612 | } __attribute__ ((__packed__)); |
624 | 613 | ||
625 | typedef le16 ATTR_FLAGS; | 614 | typedef le16 ATTR_FLAGS; |
@@ -811,32 +800,32 @@ typedef ATTR_RECORD ATTR_REC; | |||
811 | * flags appear in all of the above. | 800 | * flags appear in all of the above. |
812 | */ | 801 | */ |
813 | enum { | 802 | enum { |
814 | FILE_ATTR_READONLY = const_cpu_to_le32(0x00000001), | 803 | FILE_ATTR_READONLY = cpu_to_le32(0x00000001), |
815 | FILE_ATTR_HIDDEN = const_cpu_to_le32(0x00000002), | 804 | FILE_ATTR_HIDDEN = cpu_to_le32(0x00000002), |
816 | FILE_ATTR_SYSTEM = const_cpu_to_le32(0x00000004), | 805 | FILE_ATTR_SYSTEM = cpu_to_le32(0x00000004), |
817 | /* Old DOS volid. Unused in NT. = const_cpu_to_le32(0x00000008), */ | 806 | /* Old DOS volid. Unused in NT. = cpu_to_le32(0x00000008), */ |
818 | 807 | ||
819 | FILE_ATTR_DIRECTORY = const_cpu_to_le32(0x00000010), | 808 | FILE_ATTR_DIRECTORY = cpu_to_le32(0x00000010), |
820 | /* Note, FILE_ATTR_DIRECTORY is not considered valid in NT. It is | 809 | /* Note, FILE_ATTR_DIRECTORY is not considered valid in NT. It is |
821 | reserved for the DOS SUBDIRECTORY flag. */ | 810 | reserved for the DOS SUBDIRECTORY flag. */ |
822 | FILE_ATTR_ARCHIVE = const_cpu_to_le32(0x00000020), | 811 | FILE_ATTR_ARCHIVE = cpu_to_le32(0x00000020), |
823 | FILE_ATTR_DEVICE = const_cpu_to_le32(0x00000040), | 812 | FILE_ATTR_DEVICE = cpu_to_le32(0x00000040), |
824 | FILE_ATTR_NORMAL = const_cpu_to_le32(0x00000080), | 813 | FILE_ATTR_NORMAL = cpu_to_le32(0x00000080), |
825 | 814 | ||
826 | FILE_ATTR_TEMPORARY = const_cpu_to_le32(0x00000100), | 815 | FILE_ATTR_TEMPORARY = cpu_to_le32(0x00000100), |
827 | FILE_ATTR_SPARSE_FILE = const_cpu_to_le32(0x00000200), | 816 | FILE_ATTR_SPARSE_FILE = cpu_to_le32(0x00000200), |
828 | FILE_ATTR_REPARSE_POINT = const_cpu_to_le32(0x00000400), | 817 | FILE_ATTR_REPARSE_POINT = cpu_to_le32(0x00000400), |
829 | FILE_ATTR_COMPRESSED = const_cpu_to_le32(0x00000800), | 818 | FILE_ATTR_COMPRESSED = cpu_to_le32(0x00000800), |
830 | 819 | ||
831 | FILE_ATTR_OFFLINE = const_cpu_to_le32(0x00001000), | 820 | FILE_ATTR_OFFLINE = cpu_to_le32(0x00001000), |
832 | FILE_ATTR_NOT_CONTENT_INDEXED = const_cpu_to_le32(0x00002000), | 821 | FILE_ATTR_NOT_CONTENT_INDEXED = cpu_to_le32(0x00002000), |
833 | FILE_ATTR_ENCRYPTED = const_cpu_to_le32(0x00004000), | 822 | FILE_ATTR_ENCRYPTED = cpu_to_le32(0x00004000), |
834 | 823 | ||
835 | FILE_ATTR_VALID_FLAGS = const_cpu_to_le32(0x00007fb7), | 824 | FILE_ATTR_VALID_FLAGS = cpu_to_le32(0x00007fb7), |
836 | /* Note, FILE_ATTR_VALID_FLAGS masks out the old DOS VolId and the | 825 | /* Note, FILE_ATTR_VALID_FLAGS masks out the old DOS VolId and the |
837 | FILE_ATTR_DEVICE and preserves everything else. This mask is used | 826 | FILE_ATTR_DEVICE and preserves everything else. This mask is used |
838 | to obtain all flags that are valid for reading. */ | 827 | to obtain all flags that are valid for reading. */ |
839 | FILE_ATTR_VALID_SET_FLAGS = const_cpu_to_le32(0x000031a7), | 828 | FILE_ATTR_VALID_SET_FLAGS = cpu_to_le32(0x000031a7), |
840 | /* Note, FILE_ATTR_VALID_SET_FLAGS masks out the old DOS VolId, the | 829 | /* Note, FILE_ATTR_VALID_SET_FLAGS masks out the old DOS VolId, the |
841 | F_A_DEVICE, F_A_DIRECTORY, F_A_SPARSE_FILE, F_A_REPARSE_POINT, | 830 | F_A_DEVICE, F_A_DIRECTORY, F_A_SPARSE_FILE, F_A_REPARSE_POINT, |
842 | F_A_COMPRESSED, and F_A_ENCRYPTED and preserves the rest. This mask | 831 | F_A_COMPRESSED, and F_A_ENCRYPTED and preserves the rest. This mask |
@@ -846,11 +835,11 @@ enum { | |||
846 | * FILENAME_ATTR attributes but not in the STANDARD_INFORMATION | 835 | * FILENAME_ATTR attributes but not in the STANDARD_INFORMATION |
847 | * attribute of an mft record. | 836 | * attribute of an mft record. |
848 | */ | 837 | */ |
849 | FILE_ATTR_DUP_FILE_NAME_INDEX_PRESENT = const_cpu_to_le32(0x10000000), | 838 | FILE_ATTR_DUP_FILE_NAME_INDEX_PRESENT = cpu_to_le32(0x10000000), |
850 | /* Note, this is a copy of the corresponding bit from the mft record, | 839 | /* Note, this is a copy of the corresponding bit from the mft record, |
851 | telling us whether this is a directory or not, i.e. whether it has | 840 | telling us whether this is a directory or not, i.e. whether it has |
852 | an index root attribute or not. */ | 841 | an index root attribute or not. */ |
853 | FILE_ATTR_DUP_VIEW_INDEX_PRESENT = const_cpu_to_le32(0x20000000), | 842 | FILE_ATTR_DUP_VIEW_INDEX_PRESENT = cpu_to_le32(0x20000000), |
854 | /* Note, this is a copy of the corresponding bit from the mft record, | 843 | /* Note, this is a copy of the corresponding bit from the mft record, |
855 | telling us whether this file has a view index present (eg. object id | 844 | telling us whether this file has a view index present (eg. object id |
856 | index, quota index, one of the security indexes or the encrypting | 845 | index, quota index, one of the security indexes or the encrypting |
@@ -1446,42 +1435,42 @@ enum { | |||
1446 | /* Specific rights for files and directories are as follows: */ | 1435 | /* Specific rights for files and directories are as follows: */ |
1447 | 1436 | ||
1448 | /* Right to read data from the file. (FILE) */ | 1437 | /* Right to read data from the file. (FILE) */ |
1449 | FILE_READ_DATA = const_cpu_to_le32(0x00000001), | 1438 | FILE_READ_DATA = cpu_to_le32(0x00000001), |
1450 | /* Right to list contents of a directory. (DIRECTORY) */ | 1439 | /* Right to list contents of a directory. (DIRECTORY) */ |
1451 | FILE_LIST_DIRECTORY = const_cpu_to_le32(0x00000001), | 1440 | FILE_LIST_DIRECTORY = cpu_to_le32(0x00000001), |
1452 | 1441 | ||
1453 | /* Right to write data to the file. (FILE) */ | 1442 | /* Right to write data to the file. (FILE) */ |
1454 | FILE_WRITE_DATA = const_cpu_to_le32(0x00000002), | 1443 | FILE_WRITE_DATA = cpu_to_le32(0x00000002), |
1455 | /* Right to create a file in the directory. (DIRECTORY) */ | 1444 | /* Right to create a file in the directory. (DIRECTORY) */ |
1456 | FILE_ADD_FILE = const_cpu_to_le32(0x00000002), | 1445 | FILE_ADD_FILE = cpu_to_le32(0x00000002), |
1457 | 1446 | ||
1458 | /* Right to append data to the file. (FILE) */ | 1447 | /* Right to append data to the file. (FILE) */ |
1459 | FILE_APPEND_DATA = const_cpu_to_le32(0x00000004), | 1448 | FILE_APPEND_DATA = cpu_to_le32(0x00000004), |
1460 | /* Right to create a subdirectory. (DIRECTORY) */ | 1449 | /* Right to create a subdirectory. (DIRECTORY) */ |
1461 | FILE_ADD_SUBDIRECTORY = const_cpu_to_le32(0x00000004), | 1450 | FILE_ADD_SUBDIRECTORY = cpu_to_le32(0x00000004), |
1462 | 1451 | ||
1463 | /* Right to read extended attributes. (FILE/DIRECTORY) */ | 1452 | /* Right to read extended attributes. (FILE/DIRECTORY) */ |
1464 | FILE_READ_EA = const_cpu_to_le32(0x00000008), | 1453 | FILE_READ_EA = cpu_to_le32(0x00000008), |
1465 | 1454 | ||
1466 | /* Right to write extended attributes. (FILE/DIRECTORY) */ | 1455 | /* Right to write extended attributes. (FILE/DIRECTORY) */ |
1467 | FILE_WRITE_EA = const_cpu_to_le32(0x00000010), | 1456 | FILE_WRITE_EA = cpu_to_le32(0x00000010), |
1468 | 1457 | ||
1469 | /* Right to execute a file. (FILE) */ | 1458 | /* Right to execute a file. (FILE) */ |
1470 | FILE_EXECUTE = const_cpu_to_le32(0x00000020), | 1459 | FILE_EXECUTE = cpu_to_le32(0x00000020), |
1471 | /* Right to traverse the directory. (DIRECTORY) */ | 1460 | /* Right to traverse the directory. (DIRECTORY) */ |
1472 | FILE_TRAVERSE = const_cpu_to_le32(0x00000020), | 1461 | FILE_TRAVERSE = cpu_to_le32(0x00000020), |
1473 | 1462 | ||
1474 | /* | 1463 | /* |
1475 | * Right to delete a directory and all the files it contains (its | 1464 | * Right to delete a directory and all the files it contains (its |
1476 | * children), even if the files are read-only. (DIRECTORY) | 1465 | * children), even if the files are read-only. (DIRECTORY) |
1477 | */ | 1466 | */ |
1478 | FILE_DELETE_CHILD = const_cpu_to_le32(0x00000040), | 1467 | FILE_DELETE_CHILD = cpu_to_le32(0x00000040), |
1479 | 1468 | ||
1480 | /* Right to read file attributes. (FILE/DIRECTORY) */ | 1469 | /* Right to read file attributes. (FILE/DIRECTORY) */ |
1481 | FILE_READ_ATTRIBUTES = const_cpu_to_le32(0x00000080), | 1470 | FILE_READ_ATTRIBUTES = cpu_to_le32(0x00000080), |
1482 | 1471 | ||
1483 | /* Right to change file attributes. (FILE/DIRECTORY) */ | 1472 | /* Right to change file attributes. (FILE/DIRECTORY) */ |
1484 | FILE_WRITE_ATTRIBUTES = const_cpu_to_le32(0x00000100), | 1473 | FILE_WRITE_ATTRIBUTES = cpu_to_le32(0x00000100), |
1485 | 1474 | ||
1486 | /* | 1475 | /* |
1487 | * The standard rights (bits 16 to 23). These are independent of the | 1476 | * The standard rights (bits 16 to 23). These are independent of the |
@@ -1489,27 +1478,27 @@ enum { | |||
1489 | */ | 1478 | */ |
1490 | 1479 | ||
1491 | /* Right to delete the object. */ | 1480 | /* Right to delete the object. */ |
1492 | DELETE = const_cpu_to_le32(0x00010000), | 1481 | DELETE = cpu_to_le32(0x00010000), |
1493 | 1482 | ||
1494 | /* | 1483 | /* |
1495 | * Right to read the information in the object's security descriptor, | 1484 | * Right to read the information in the object's security descriptor, |
1496 | * not including the information in the SACL, i.e. right to read the | 1485 | * not including the information in the SACL, i.e. right to read the |
1497 | * security descriptor and owner. | 1486 | * security descriptor and owner. |
1498 | */ | 1487 | */ |
1499 | READ_CONTROL = const_cpu_to_le32(0x00020000), | 1488 | READ_CONTROL = cpu_to_le32(0x00020000), |
1500 | 1489 | ||
1501 | /* Right to modify the DACL in the object's security descriptor. */ | 1490 | /* Right to modify the DACL in the object's security descriptor. */ |
1502 | WRITE_DAC = const_cpu_to_le32(0x00040000), | 1491 | WRITE_DAC = cpu_to_le32(0x00040000), |
1503 | 1492 | ||
1504 | /* Right to change the owner in the object's security descriptor. */ | 1493 | /* Right to change the owner in the object's security descriptor. */ |
1505 | WRITE_OWNER = const_cpu_to_le32(0x00080000), | 1494 | WRITE_OWNER = cpu_to_le32(0x00080000), |
1506 | 1495 | ||
1507 | /* | 1496 | /* |
1508 | * Right to use the object for synchronization. Enables a process to | 1497 | * Right to use the object for synchronization. Enables a process to |
1509 | * wait until the object is in the signalled state. Some object types | 1498 | * wait until the object is in the signalled state. Some object types |
1510 | * do not support this access right. | 1499 | * do not support this access right. |
1511 | */ | 1500 | */ |
1512 | SYNCHRONIZE = const_cpu_to_le32(0x00100000), | 1501 | SYNCHRONIZE = cpu_to_le32(0x00100000), |
1513 | 1502 | ||
1514 | /* | 1503 | /* |
1515 | * The following STANDARD_RIGHTS_* are combinations of the above for | 1504 | * The following STANDARD_RIGHTS_* are combinations of the above for |
@@ -1517,25 +1506,25 @@ enum { | |||
1517 | */ | 1506 | */ |
1518 | 1507 | ||
1519 | /* These are currently defined to READ_CONTROL. */ | 1508 | /* These are currently defined to READ_CONTROL. */ |
1520 | STANDARD_RIGHTS_READ = const_cpu_to_le32(0x00020000), | 1509 | STANDARD_RIGHTS_READ = cpu_to_le32(0x00020000), |
1521 | STANDARD_RIGHTS_WRITE = const_cpu_to_le32(0x00020000), | 1510 | STANDARD_RIGHTS_WRITE = cpu_to_le32(0x00020000), |
1522 | STANDARD_RIGHTS_EXECUTE = const_cpu_to_le32(0x00020000), | 1511 | STANDARD_RIGHTS_EXECUTE = cpu_to_le32(0x00020000), |
1523 | 1512 | ||
1524 | /* Combines DELETE, READ_CONTROL, WRITE_DAC, and WRITE_OWNER access. */ | 1513 | /* Combines DELETE, READ_CONTROL, WRITE_DAC, and WRITE_OWNER access. */ |
1525 | STANDARD_RIGHTS_REQUIRED = const_cpu_to_le32(0x000f0000), | 1514 | STANDARD_RIGHTS_REQUIRED = cpu_to_le32(0x000f0000), |
1526 | 1515 | ||
1527 | /* | 1516 | /* |
1528 | * Combines DELETE, READ_CONTROL, WRITE_DAC, WRITE_OWNER, and | 1517 | * Combines DELETE, READ_CONTROL, WRITE_DAC, WRITE_OWNER, and |
1529 | * SYNCHRONIZE access. | 1518 | * SYNCHRONIZE access. |
1530 | */ | 1519 | */ |
1531 | STANDARD_RIGHTS_ALL = const_cpu_to_le32(0x001f0000), | 1520 | STANDARD_RIGHTS_ALL = cpu_to_le32(0x001f0000), |
1532 | 1521 | ||
1533 | /* | 1522 | /* |
1534 | * The access system ACL and maximum allowed access types (bits 24 to | 1523 | * The access system ACL and maximum allowed access types (bits 24 to |
1535 | * 25, bits 26 to 27 are reserved). | 1524 | * 25, bits 26 to 27 are reserved). |
1536 | */ | 1525 | */ |
1537 | ACCESS_SYSTEM_SECURITY = const_cpu_to_le32(0x01000000), | 1526 | ACCESS_SYSTEM_SECURITY = cpu_to_le32(0x01000000), |
1538 | MAXIMUM_ALLOWED = const_cpu_to_le32(0x02000000), | 1527 | MAXIMUM_ALLOWED = cpu_to_le32(0x02000000), |
1539 | 1528 | ||
1540 | /* | 1529 | /* |
1541 | * The generic rights (bits 28 to 31). These map onto the standard and | 1530 | * The generic rights (bits 28 to 31). These map onto the standard and |
@@ -1543,10 +1532,10 @@ enum { | |||
1543 | */ | 1532 | */ |
1544 | 1533 | ||
1545 | /* Read, write, and execute access. */ | 1534 | /* Read, write, and execute access. */ |
1546 | GENERIC_ALL = const_cpu_to_le32(0x10000000), | 1535 | GENERIC_ALL = cpu_to_le32(0x10000000), |
1547 | 1536 | ||
1548 | /* Execute access. */ | 1537 | /* Execute access. */ |
1549 | GENERIC_EXECUTE = const_cpu_to_le32(0x20000000), | 1538 | GENERIC_EXECUTE = cpu_to_le32(0x20000000), |
1550 | 1539 | ||
1551 | /* | 1540 | /* |
1552 | * Write access. For files, this maps onto: | 1541 | * Write access. For files, this maps onto: |
@@ -1555,7 +1544,7 @@ enum { | |||
1555 | * For directories, the mapping has the same numerical value. See | 1544 | * For directories, the mapping has the same numerical value. See |
1556 | * above for the descriptions of the rights granted. | 1545 | * above for the descriptions of the rights granted. |
1557 | */ | 1546 | */ |
1558 | GENERIC_WRITE = const_cpu_to_le32(0x40000000), | 1547 | GENERIC_WRITE = cpu_to_le32(0x40000000), |
1559 | 1548 | ||
1560 | /* | 1549 | /* |
1561 | * Read access. For files, this maps onto: | 1550 | * Read access. For files, this maps onto: |
@@ -1564,7 +1553,7 @@ enum { | |||
1564 | * For directories, the mapping has the same numberical value. See | 1553 | * For directories, the mapping has the same numberical value. See |
1565 | * above for the descriptions of the rights granted. | 1554 | * above for the descriptions of the rights granted. |
1566 | */ | 1555 | */ |
1567 | GENERIC_READ = const_cpu_to_le32(0x80000000), | 1556 | GENERIC_READ = cpu_to_le32(0x80000000), |
1568 | }; | 1557 | }; |
1569 | 1558 | ||
1570 | typedef le32 ACCESS_MASK; | 1559 | typedef le32 ACCESS_MASK; |
@@ -1604,8 +1593,8 @@ typedef struct { | |||
1604 | * The object ACE flags (32-bit). | 1593 | * The object ACE flags (32-bit). |
1605 | */ | 1594 | */ |
1606 | enum { | 1595 | enum { |
1607 | ACE_OBJECT_TYPE_PRESENT = const_cpu_to_le32(1), | 1596 | ACE_OBJECT_TYPE_PRESENT = cpu_to_le32(1), |
1608 | ACE_INHERITED_OBJECT_TYPE_PRESENT = const_cpu_to_le32(2), | 1597 | ACE_INHERITED_OBJECT_TYPE_PRESENT = cpu_to_le32(2), |
1609 | }; | 1598 | }; |
1610 | 1599 | ||
1611 | typedef le32 OBJECT_ACE_FLAGS; | 1600 | typedef le32 OBJECT_ACE_FLAGS; |
@@ -1706,23 +1695,23 @@ typedef enum { | |||
1706 | * expressed as offsets from the beginning of the security descriptor. | 1695 | * expressed as offsets from the beginning of the security descriptor. |
1707 | */ | 1696 | */ |
1708 | enum { | 1697 | enum { |
1709 | SE_OWNER_DEFAULTED = const_cpu_to_le16(0x0001), | 1698 | SE_OWNER_DEFAULTED = cpu_to_le16(0x0001), |
1710 | SE_GROUP_DEFAULTED = const_cpu_to_le16(0x0002), | 1699 | SE_GROUP_DEFAULTED = cpu_to_le16(0x0002), |
1711 | SE_DACL_PRESENT = const_cpu_to_le16(0x0004), | 1700 | SE_DACL_PRESENT = cpu_to_le16(0x0004), |
1712 | SE_DACL_DEFAULTED = const_cpu_to_le16(0x0008), | 1701 | SE_DACL_DEFAULTED = cpu_to_le16(0x0008), |
1713 | 1702 | ||
1714 | SE_SACL_PRESENT = const_cpu_to_le16(0x0010), | 1703 | SE_SACL_PRESENT = cpu_to_le16(0x0010), |
1715 | SE_SACL_DEFAULTED = const_cpu_to_le16(0x0020), | 1704 | SE_SACL_DEFAULTED = cpu_to_le16(0x0020), |
1716 | 1705 | ||
1717 | SE_DACL_AUTO_INHERIT_REQ = const_cpu_to_le16(0x0100), | 1706 | SE_DACL_AUTO_INHERIT_REQ = cpu_to_le16(0x0100), |
1718 | SE_SACL_AUTO_INHERIT_REQ = const_cpu_to_le16(0x0200), | 1707 | SE_SACL_AUTO_INHERIT_REQ = cpu_to_le16(0x0200), |
1719 | SE_DACL_AUTO_INHERITED = const_cpu_to_le16(0x0400), | 1708 | SE_DACL_AUTO_INHERITED = cpu_to_le16(0x0400), |
1720 | SE_SACL_AUTO_INHERITED = const_cpu_to_le16(0x0800), | 1709 | SE_SACL_AUTO_INHERITED = cpu_to_le16(0x0800), |
1721 | 1710 | ||
1722 | SE_DACL_PROTECTED = const_cpu_to_le16(0x1000), | 1711 | SE_DACL_PROTECTED = cpu_to_le16(0x1000), |
1723 | SE_SACL_PROTECTED = const_cpu_to_le16(0x2000), | 1712 | SE_SACL_PROTECTED = cpu_to_le16(0x2000), |
1724 | SE_RM_CONTROL_VALID = const_cpu_to_le16(0x4000), | 1713 | SE_RM_CONTROL_VALID = cpu_to_le16(0x4000), |
1725 | SE_SELF_RELATIVE = const_cpu_to_le16(0x8000) | 1714 | SE_SELF_RELATIVE = cpu_to_le16(0x8000) |
1726 | } __attribute__ ((__packed__)); | 1715 | } __attribute__ ((__packed__)); |
1727 | 1716 | ||
1728 | typedef le16 SECURITY_DESCRIPTOR_CONTROL; | 1717 | typedef le16 SECURITY_DESCRIPTOR_CONTROL; |
@@ -1910,21 +1899,21 @@ typedef struct { | |||
1910 | * Possible flags for the volume (16-bit). | 1899 | * Possible flags for the volume (16-bit). |
1911 | */ | 1900 | */ |
1912 | enum { | 1901 | enum { |
1913 | VOLUME_IS_DIRTY = const_cpu_to_le16(0x0001), | 1902 | VOLUME_IS_DIRTY = cpu_to_le16(0x0001), |
1914 | VOLUME_RESIZE_LOG_FILE = const_cpu_to_le16(0x0002), | 1903 | VOLUME_RESIZE_LOG_FILE = cpu_to_le16(0x0002), |
1915 | VOLUME_UPGRADE_ON_MOUNT = const_cpu_to_le16(0x0004), | 1904 | VOLUME_UPGRADE_ON_MOUNT = cpu_to_le16(0x0004), |
1916 | VOLUME_MOUNTED_ON_NT4 = const_cpu_to_le16(0x0008), | 1905 | VOLUME_MOUNTED_ON_NT4 = cpu_to_le16(0x0008), |
1917 | 1906 | ||
1918 | VOLUME_DELETE_USN_UNDERWAY = const_cpu_to_le16(0x0010), | 1907 | VOLUME_DELETE_USN_UNDERWAY = cpu_to_le16(0x0010), |
1919 | VOLUME_REPAIR_OBJECT_ID = const_cpu_to_le16(0x0020), | 1908 | VOLUME_REPAIR_OBJECT_ID = cpu_to_le16(0x0020), |
1920 | 1909 | ||
1921 | VOLUME_CHKDSK_UNDERWAY = const_cpu_to_le16(0x4000), | 1910 | VOLUME_CHKDSK_UNDERWAY = cpu_to_le16(0x4000), |
1922 | VOLUME_MODIFIED_BY_CHKDSK = const_cpu_to_le16(0x8000), | 1911 | VOLUME_MODIFIED_BY_CHKDSK = cpu_to_le16(0x8000), |
1923 | 1912 | ||
1924 | VOLUME_FLAGS_MASK = const_cpu_to_le16(0xc03f), | 1913 | VOLUME_FLAGS_MASK = cpu_to_le16(0xc03f), |
1925 | 1914 | ||
1926 | /* To make our life easier when checking if we must mount read-only. */ | 1915 | /* To make our life easier when checking if we must mount read-only. */ |
1927 | VOLUME_MUST_MOUNT_RO_MASK = const_cpu_to_le16(0xc027), | 1916 | VOLUME_MUST_MOUNT_RO_MASK = cpu_to_le16(0xc027), |
1928 | } __attribute__ ((__packed__)); | 1917 | } __attribute__ ((__packed__)); |
1929 | 1918 | ||
1930 | typedef le16 VOLUME_FLAGS; | 1919 | typedef le16 VOLUME_FLAGS; |
@@ -2109,26 +2098,26 @@ typedef struct { | |||
2109 | * The user quota flags. Names explain meaning. | 2098 | * The user quota flags. Names explain meaning. |
2110 | */ | 2099 | */ |
2111 | enum { | 2100 | enum { |
2112 | QUOTA_FLAG_DEFAULT_LIMITS = const_cpu_to_le32(0x00000001), | 2101 | QUOTA_FLAG_DEFAULT_LIMITS = cpu_to_le32(0x00000001), |
2113 | QUOTA_FLAG_LIMIT_REACHED = const_cpu_to_le32(0x00000002), | 2102 | QUOTA_FLAG_LIMIT_REACHED = cpu_to_le32(0x00000002), |
2114 | QUOTA_FLAG_ID_DELETED = const_cpu_to_le32(0x00000004), | 2103 | QUOTA_FLAG_ID_DELETED = cpu_to_le32(0x00000004), |
2115 | 2104 | ||
2116 | QUOTA_FLAG_USER_MASK = const_cpu_to_le32(0x00000007), | 2105 | QUOTA_FLAG_USER_MASK = cpu_to_le32(0x00000007), |
2117 | /* This is a bit mask for the user quota flags. */ | 2106 | /* This is a bit mask for the user quota flags. */ |
2118 | 2107 | ||
2119 | /* | 2108 | /* |
2120 | * These flags are only present in the quota defaults index entry, i.e. | 2109 | * These flags are only present in the quota defaults index entry, i.e. |
2121 | * in the entry where owner_id = QUOTA_DEFAULTS_ID. | 2110 | * in the entry where owner_id = QUOTA_DEFAULTS_ID. |
2122 | */ | 2111 | */ |
2123 | QUOTA_FLAG_TRACKING_ENABLED = const_cpu_to_le32(0x00000010), | 2112 | QUOTA_FLAG_TRACKING_ENABLED = cpu_to_le32(0x00000010), |
2124 | QUOTA_FLAG_ENFORCEMENT_ENABLED = const_cpu_to_le32(0x00000020), | 2113 | QUOTA_FLAG_ENFORCEMENT_ENABLED = cpu_to_le32(0x00000020), |
2125 | QUOTA_FLAG_TRACKING_REQUESTED = const_cpu_to_le32(0x00000040), | 2114 | QUOTA_FLAG_TRACKING_REQUESTED = cpu_to_le32(0x00000040), |
2126 | QUOTA_FLAG_LOG_THRESHOLD = const_cpu_to_le32(0x00000080), | 2115 | QUOTA_FLAG_LOG_THRESHOLD = cpu_to_le32(0x00000080), |
2127 | 2116 | ||
2128 | QUOTA_FLAG_LOG_LIMIT = const_cpu_to_le32(0x00000100), | 2117 | QUOTA_FLAG_LOG_LIMIT = cpu_to_le32(0x00000100), |
2129 | QUOTA_FLAG_OUT_OF_DATE = const_cpu_to_le32(0x00000200), | 2118 | QUOTA_FLAG_OUT_OF_DATE = cpu_to_le32(0x00000200), |
2130 | QUOTA_FLAG_CORRUPT = const_cpu_to_le32(0x00000400), | 2119 | QUOTA_FLAG_CORRUPT = cpu_to_le32(0x00000400), |
2131 | QUOTA_FLAG_PENDING_DELETES = const_cpu_to_le32(0x00000800), | 2120 | QUOTA_FLAG_PENDING_DELETES = cpu_to_le32(0x00000800), |
2132 | }; | 2121 | }; |
2133 | 2122 | ||
2134 | typedef le32 QUOTA_FLAGS; | 2123 | typedef le32 QUOTA_FLAGS; |
@@ -2172,9 +2161,9 @@ typedef struct { | |||
2172 | * Predefined owner_id values (32-bit). | 2161 | * Predefined owner_id values (32-bit). |
2173 | */ | 2162 | */ |
2174 | enum { | 2163 | enum { |
2175 | QUOTA_INVALID_ID = const_cpu_to_le32(0x00000000), | 2164 | QUOTA_INVALID_ID = cpu_to_le32(0x00000000), |
2176 | QUOTA_DEFAULTS_ID = const_cpu_to_le32(0x00000001), | 2165 | QUOTA_DEFAULTS_ID = cpu_to_le32(0x00000001), |
2177 | QUOTA_FIRST_USER_ID = const_cpu_to_le32(0x00000100), | 2166 | QUOTA_FIRST_USER_ID = cpu_to_le32(0x00000100), |
2178 | }; | 2167 | }; |
2179 | 2168 | ||
2180 | /* | 2169 | /* |
@@ -2189,14 +2178,14 @@ typedef enum { | |||
2189 | * Index entry flags (16-bit). | 2178 | * Index entry flags (16-bit). |
2190 | */ | 2179 | */ |
2191 | enum { | 2180 | enum { |
2192 | INDEX_ENTRY_NODE = const_cpu_to_le16(1), /* This entry contains a | 2181 | INDEX_ENTRY_NODE = cpu_to_le16(1), /* This entry contains a |
2193 | sub-node, i.e. a reference to an index block in form of | 2182 | sub-node, i.e. a reference to an index block in form of |
2194 | a virtual cluster number (see below). */ | 2183 | a virtual cluster number (see below). */ |
2195 | INDEX_ENTRY_END = const_cpu_to_le16(2), /* This signifies the last | 2184 | INDEX_ENTRY_END = cpu_to_le16(2), /* This signifies the last |
2196 | entry in an index block. The index entry does not | 2185 | entry in an index block. The index entry does not |
2197 | represent a file but it can point to a sub-node. */ | 2186 | represent a file but it can point to a sub-node. */ |
2198 | 2187 | ||
2199 | INDEX_ENTRY_SPACE_FILLER = const_cpu_to_le16(0xffff), /* gcc: Force | 2188 | INDEX_ENTRY_SPACE_FILLER = cpu_to_le16(0xffff), /* gcc: Force |
2200 | enum bit width to 16-bit. */ | 2189 | enum bit width to 16-bit. */ |
2201 | } __attribute__ ((__packed__)); | 2190 | } __attribute__ ((__packed__)); |
2202 | 2191 | ||
@@ -2334,26 +2323,26 @@ typedef struct { | |||
2334 | * These are the predefined reparse point tags: | 2323 | * These are the predefined reparse point tags: |
2335 | */ | 2324 | */ |
2336 | enum { | 2325 | enum { |
2337 | IO_REPARSE_TAG_IS_ALIAS = const_cpu_to_le32(0x20000000), | 2326 | IO_REPARSE_TAG_IS_ALIAS = cpu_to_le32(0x20000000), |
2338 | IO_REPARSE_TAG_IS_HIGH_LATENCY = const_cpu_to_le32(0x40000000), | 2327 | IO_REPARSE_TAG_IS_HIGH_LATENCY = cpu_to_le32(0x40000000), |
2339 | IO_REPARSE_TAG_IS_MICROSOFT = const_cpu_to_le32(0x80000000), | 2328 | IO_REPARSE_TAG_IS_MICROSOFT = cpu_to_le32(0x80000000), |
2340 | 2329 | ||
2341 | IO_REPARSE_TAG_RESERVED_ZERO = const_cpu_to_le32(0x00000000), | 2330 | IO_REPARSE_TAG_RESERVED_ZERO = cpu_to_le32(0x00000000), |
2342 | IO_REPARSE_TAG_RESERVED_ONE = const_cpu_to_le32(0x00000001), | 2331 | IO_REPARSE_TAG_RESERVED_ONE = cpu_to_le32(0x00000001), |
2343 | IO_REPARSE_TAG_RESERVED_RANGE = const_cpu_to_le32(0x00000001), | 2332 | IO_REPARSE_TAG_RESERVED_RANGE = cpu_to_le32(0x00000001), |
2344 | 2333 | ||
2345 | IO_REPARSE_TAG_NSS = const_cpu_to_le32(0x68000005), | 2334 | IO_REPARSE_TAG_NSS = cpu_to_le32(0x68000005), |
2346 | IO_REPARSE_TAG_NSS_RECOVER = const_cpu_to_le32(0x68000006), | 2335 | IO_REPARSE_TAG_NSS_RECOVER = cpu_to_le32(0x68000006), |
2347 | IO_REPARSE_TAG_SIS = const_cpu_to_le32(0x68000007), | 2336 | IO_REPARSE_TAG_SIS = cpu_to_le32(0x68000007), |
2348 | IO_REPARSE_TAG_DFS = const_cpu_to_le32(0x68000008), | 2337 | IO_REPARSE_TAG_DFS = cpu_to_le32(0x68000008), |
2349 | 2338 | ||
2350 | IO_REPARSE_TAG_MOUNT_POINT = const_cpu_to_le32(0x88000003), | 2339 | IO_REPARSE_TAG_MOUNT_POINT = cpu_to_le32(0x88000003), |
2351 | 2340 | ||
2352 | IO_REPARSE_TAG_HSM = const_cpu_to_le32(0xa8000004), | 2341 | IO_REPARSE_TAG_HSM = cpu_to_le32(0xa8000004), |
2353 | 2342 | ||
2354 | IO_REPARSE_TAG_SYMBOLIC_LINK = const_cpu_to_le32(0xe8000000), | 2343 | IO_REPARSE_TAG_SYMBOLIC_LINK = cpu_to_le32(0xe8000000), |
2355 | 2344 | ||
2356 | IO_REPARSE_TAG_VALID_VALUES = const_cpu_to_le32(0xe000ffff), | 2345 | IO_REPARSE_TAG_VALID_VALUES = cpu_to_le32(0xe000ffff), |
2357 | }; | 2346 | }; |
2358 | 2347 | ||
2359 | /* | 2348 | /* |
diff --git a/fs/ntfs/logfile.h b/fs/ntfs/logfile.h index 9468e1c45ae3..b5a6f08bd35c 100644 --- a/fs/ntfs/logfile.h +++ b/fs/ntfs/logfile.h | |||
@@ -104,7 +104,7 @@ typedef struct { | |||
104 | * in this particular client array. Also inside the client records themselves, | 104 | * in this particular client array. Also inside the client records themselves, |
105 | * this means that there are no client records preceding or following this one. | 105 | * this means that there are no client records preceding or following this one. |
106 | */ | 106 | */ |
107 | #define LOGFILE_NO_CLIENT const_cpu_to_le16(0xffff) | 107 | #define LOGFILE_NO_CLIENT cpu_to_le16(0xffff) |
108 | #define LOGFILE_NO_CLIENT_CPU 0xffff | 108 | #define LOGFILE_NO_CLIENT_CPU 0xffff |
109 | 109 | ||
110 | /* | 110 | /* |
@@ -112,8 +112,8 @@ typedef struct { | |||
112 | * information about the log file in which they are present. | 112 | * information about the log file in which they are present. |
113 | */ | 113 | */ |
114 | enum { | 114 | enum { |
115 | RESTART_VOLUME_IS_CLEAN = const_cpu_to_le16(0x0002), | 115 | RESTART_VOLUME_IS_CLEAN = cpu_to_le16(0x0002), |
116 | RESTART_SPACE_FILLER = const_cpu_to_le16(0xffff), /* gcc: Force enum bit width to 16. */ | 116 | RESTART_SPACE_FILLER = cpu_to_le16(0xffff), /* gcc: Force enum bit width to 16. */ |
117 | } __attribute__ ((__packed__)); | 117 | } __attribute__ ((__packed__)); |
118 | 118 | ||
119 | typedef le16 RESTART_AREA_FLAGS; | 119 | typedef le16 RESTART_AREA_FLAGS; |
diff --git a/fs/ntfs/mft.c b/fs/ntfs/mft.c index 17d32ca6bc35..23bf68453d7d 100644 --- a/fs/ntfs/mft.c +++ b/fs/ntfs/mft.c | |||
@@ -2839,7 +2839,7 @@ int ntfs_extent_mft_record_free(ntfs_inode *ni, MFT_RECORD *m) | |||
2839 | */ | 2839 | */ |
2840 | 2840 | ||
2841 | /* Mark the mft record as not in use. */ | 2841 | /* Mark the mft record as not in use. */ |
2842 | m->flags &= const_cpu_to_le16(~const_le16_to_cpu(MFT_RECORD_IN_USE)); | 2842 | m->flags &= ~MFT_RECORD_IN_USE; |
2843 | 2843 | ||
2844 | /* Increment the sequence number, skipping zero, if it is not zero. */ | 2844 | /* Increment the sequence number, skipping zero, if it is not zero. */ |
2845 | old_seq_no = m->sequence_number; | 2845 | old_seq_no = m->sequence_number; |
diff --git a/fs/ntfs/super.c b/fs/ntfs/super.c index 4a46743b5077..f76951dcd4a6 100644 --- a/fs/ntfs/super.c +++ b/fs/ntfs/super.c | |||
@@ -618,7 +618,7 @@ static bool is_boot_sector_ntfs(const struct super_block *sb, | |||
618 | * many BIOSes will refuse to boot from a bootsector if the magic is | 618 | * many BIOSes will refuse to boot from a bootsector if the magic is |
619 | * incorrect, so we emit a warning. | 619 | * incorrect, so we emit a warning. |
620 | */ | 620 | */ |
621 | if (!silent && b->end_of_sector_marker != const_cpu_to_le16(0xaa55)) | 621 | if (!silent && b->end_of_sector_marker != cpu_to_le16(0xaa55)) |
622 | ntfs_warning(sb, "Invalid end of sector marker."); | 622 | ntfs_warning(sb, "Invalid end of sector marker."); |
623 | return true; | 623 | return true; |
624 | not_ntfs: | 624 | not_ntfs: |
@@ -1242,13 +1242,13 @@ static int check_windows_hibernation_status(ntfs_volume *vol) | |||
1242 | u32 *kaddr, *kend; | 1242 | u32 *kaddr, *kend; |
1243 | ntfs_name *name = NULL; | 1243 | ntfs_name *name = NULL; |
1244 | int ret = 1; | 1244 | int ret = 1; |
1245 | static const ntfschar hiberfil[13] = { const_cpu_to_le16('h'), | 1245 | static const ntfschar hiberfil[13] = { cpu_to_le16('h'), |
1246 | const_cpu_to_le16('i'), const_cpu_to_le16('b'), | 1246 | cpu_to_le16('i'), cpu_to_le16('b'), |
1247 | const_cpu_to_le16('e'), const_cpu_to_le16('r'), | 1247 | cpu_to_le16('e'), cpu_to_le16('r'), |
1248 | const_cpu_to_le16('f'), const_cpu_to_le16('i'), | 1248 | cpu_to_le16('f'), cpu_to_le16('i'), |
1249 | const_cpu_to_le16('l'), const_cpu_to_le16('.'), | 1249 | cpu_to_le16('l'), cpu_to_le16('.'), |
1250 | const_cpu_to_le16('s'), const_cpu_to_le16('y'), | 1250 | cpu_to_le16('s'), cpu_to_le16('y'), |
1251 | const_cpu_to_le16('s'), 0 }; | 1251 | cpu_to_le16('s'), 0 }; |
1252 | 1252 | ||
1253 | ntfs_debug("Entering."); | 1253 | ntfs_debug("Entering."); |
1254 | /* | 1254 | /* |
@@ -1296,7 +1296,7 @@ static int check_windows_hibernation_status(ntfs_volume *vol) | |||
1296 | goto iput_out; | 1296 | goto iput_out; |
1297 | } | 1297 | } |
1298 | kaddr = (u32*)page_address(page); | 1298 | kaddr = (u32*)page_address(page); |
1299 | if (*(le32*)kaddr == const_cpu_to_le32(0x72626968)/*'hibr'*/) { | 1299 | if (*(le32*)kaddr == cpu_to_le32(0x72626968)/*'hibr'*/) { |
1300 | ntfs_debug("Magic \"hibr\" found in hiberfil.sys. Windows is " | 1300 | ntfs_debug("Magic \"hibr\" found in hiberfil.sys. Windows is " |
1301 | "hibernated on the volume. This is the " | 1301 | "hibernated on the volume. This is the " |
1302 | "system volume."); | 1302 | "system volume."); |
@@ -1337,12 +1337,12 @@ static bool load_and_init_quota(ntfs_volume *vol) | |||
1337 | MFT_REF mref; | 1337 | MFT_REF mref; |
1338 | struct inode *tmp_ino; | 1338 | struct inode *tmp_ino; |
1339 | ntfs_name *name = NULL; | 1339 | ntfs_name *name = NULL; |
1340 | static const ntfschar Quota[7] = { const_cpu_to_le16('$'), | 1340 | static const ntfschar Quota[7] = { cpu_to_le16('$'), |
1341 | const_cpu_to_le16('Q'), const_cpu_to_le16('u'), | 1341 | cpu_to_le16('Q'), cpu_to_le16('u'), |
1342 | const_cpu_to_le16('o'), const_cpu_to_le16('t'), | 1342 | cpu_to_le16('o'), cpu_to_le16('t'), |
1343 | const_cpu_to_le16('a'), 0 }; | 1343 | cpu_to_le16('a'), 0 }; |
1344 | static ntfschar Q[3] = { const_cpu_to_le16('$'), | 1344 | static ntfschar Q[3] = { cpu_to_le16('$'), |
1345 | const_cpu_to_le16('Q'), 0 }; | 1345 | cpu_to_le16('Q'), 0 }; |
1346 | 1346 | ||
1347 | ntfs_debug("Entering."); | 1347 | ntfs_debug("Entering."); |
1348 | /* | 1348 | /* |
@@ -1416,16 +1416,16 @@ static bool load_and_init_usnjrnl(ntfs_volume *vol) | |||
1416 | struct page *page; | 1416 | struct page *page; |
1417 | ntfs_name *name = NULL; | 1417 | ntfs_name *name = NULL; |
1418 | USN_HEADER *uh; | 1418 | USN_HEADER *uh; |
1419 | static const ntfschar UsnJrnl[9] = { const_cpu_to_le16('$'), | 1419 | static const ntfschar UsnJrnl[9] = { cpu_to_le16('$'), |
1420 | const_cpu_to_le16('U'), const_cpu_to_le16('s'), | 1420 | cpu_to_le16('U'), cpu_to_le16('s'), |
1421 | const_cpu_to_le16('n'), const_cpu_to_le16('J'), | 1421 | cpu_to_le16('n'), cpu_to_le16('J'), |
1422 | const_cpu_to_le16('r'), const_cpu_to_le16('n'), | 1422 | cpu_to_le16('r'), cpu_to_le16('n'), |
1423 | const_cpu_to_le16('l'), 0 }; | 1423 | cpu_to_le16('l'), 0 }; |
1424 | static ntfschar Max[5] = { const_cpu_to_le16('$'), | 1424 | static ntfschar Max[5] = { cpu_to_le16('$'), |
1425 | const_cpu_to_le16('M'), const_cpu_to_le16('a'), | 1425 | cpu_to_le16('M'), cpu_to_le16('a'), |
1426 | const_cpu_to_le16('x'), 0 }; | 1426 | cpu_to_le16('x'), 0 }; |
1427 | static ntfschar J[3] = { const_cpu_to_le16('$'), | 1427 | static ntfschar J[3] = { cpu_to_le16('$'), |
1428 | const_cpu_to_le16('J'), 0 }; | 1428 | cpu_to_le16('J'), 0 }; |
1429 | 1429 | ||
1430 | ntfs_debug("Entering."); | 1430 | ntfs_debug("Entering."); |
1431 | /* | 1431 | /* |
diff --git a/fs/ntfs/usnjrnl.h b/fs/ntfs/usnjrnl.h index 4087fbdac327..00d8e6bd7c36 100644 --- a/fs/ntfs/usnjrnl.h +++ b/fs/ntfs/usnjrnl.h | |||
@@ -116,27 +116,27 @@ typedef struct { | |||
116 | * documentation: http://www.linux-ntfs.org/ | 116 | * documentation: http://www.linux-ntfs.org/ |
117 | */ | 117 | */ |
118 | enum { | 118 | enum { |
119 | USN_REASON_DATA_OVERWRITE = const_cpu_to_le32(0x00000001), | 119 | USN_REASON_DATA_OVERWRITE = cpu_to_le32(0x00000001), |
120 | USN_REASON_DATA_EXTEND = const_cpu_to_le32(0x00000002), | 120 | USN_REASON_DATA_EXTEND = cpu_to_le32(0x00000002), |
121 | USN_REASON_DATA_TRUNCATION = const_cpu_to_le32(0x00000004), | 121 | USN_REASON_DATA_TRUNCATION = cpu_to_le32(0x00000004), |
122 | USN_REASON_NAMED_DATA_OVERWRITE = const_cpu_to_le32(0x00000010), | 122 | USN_REASON_NAMED_DATA_OVERWRITE = cpu_to_le32(0x00000010), |
123 | USN_REASON_NAMED_DATA_EXTEND = const_cpu_to_le32(0x00000020), | 123 | USN_REASON_NAMED_DATA_EXTEND = cpu_to_le32(0x00000020), |
124 | USN_REASON_NAMED_DATA_TRUNCATION= const_cpu_to_le32(0x00000040), | 124 | USN_REASON_NAMED_DATA_TRUNCATION= cpu_to_le32(0x00000040), |
125 | USN_REASON_FILE_CREATE = const_cpu_to_le32(0x00000100), | 125 | USN_REASON_FILE_CREATE = cpu_to_le32(0x00000100), |
126 | USN_REASON_FILE_DELETE = const_cpu_to_le32(0x00000200), | 126 | USN_REASON_FILE_DELETE = cpu_to_le32(0x00000200), |
127 | USN_REASON_EA_CHANGE = const_cpu_to_le32(0x00000400), | 127 | USN_REASON_EA_CHANGE = cpu_to_le32(0x00000400), |
128 | USN_REASON_SECURITY_CHANGE = const_cpu_to_le32(0x00000800), | 128 | USN_REASON_SECURITY_CHANGE = cpu_to_le32(0x00000800), |
129 | USN_REASON_RENAME_OLD_NAME = const_cpu_to_le32(0x00001000), | 129 | USN_REASON_RENAME_OLD_NAME = cpu_to_le32(0x00001000), |
130 | USN_REASON_RENAME_NEW_NAME = const_cpu_to_le32(0x00002000), | 130 | USN_REASON_RENAME_NEW_NAME = cpu_to_le32(0x00002000), |
131 | USN_REASON_INDEXABLE_CHANGE = const_cpu_to_le32(0x00004000), | 131 | USN_REASON_INDEXABLE_CHANGE = cpu_to_le32(0x00004000), |
132 | USN_REASON_BASIC_INFO_CHANGE = const_cpu_to_le32(0x00008000), | 132 | USN_REASON_BASIC_INFO_CHANGE = cpu_to_le32(0x00008000), |
133 | USN_REASON_HARD_LINK_CHANGE = const_cpu_to_le32(0x00010000), | 133 | USN_REASON_HARD_LINK_CHANGE = cpu_to_le32(0x00010000), |
134 | USN_REASON_COMPRESSION_CHANGE = const_cpu_to_le32(0x00020000), | 134 | USN_REASON_COMPRESSION_CHANGE = cpu_to_le32(0x00020000), |
135 | USN_REASON_ENCRYPTION_CHANGE = const_cpu_to_le32(0x00040000), | 135 | USN_REASON_ENCRYPTION_CHANGE = cpu_to_le32(0x00040000), |
136 | USN_REASON_OBJECT_ID_CHANGE = const_cpu_to_le32(0x00080000), | 136 | USN_REASON_OBJECT_ID_CHANGE = cpu_to_le32(0x00080000), |
137 | USN_REASON_REPARSE_POINT_CHANGE = const_cpu_to_le32(0x00100000), | 137 | USN_REASON_REPARSE_POINT_CHANGE = cpu_to_le32(0x00100000), |
138 | USN_REASON_STREAM_CHANGE = const_cpu_to_le32(0x00200000), | 138 | USN_REASON_STREAM_CHANGE = cpu_to_le32(0x00200000), |
139 | USN_REASON_CLOSE = const_cpu_to_le32(0x80000000), | 139 | USN_REASON_CLOSE = cpu_to_le32(0x80000000), |
140 | }; | 140 | }; |
141 | 141 | ||
142 | typedef le32 USN_REASON_FLAGS; | 142 | typedef le32 USN_REASON_FLAGS; |
@@ -148,9 +148,9 @@ typedef le32 USN_REASON_FLAGS; | |||
148 | * http://www.linux-ntfs.org/ | 148 | * http://www.linux-ntfs.org/ |
149 | */ | 149 | */ |
150 | enum { | 150 | enum { |
151 | USN_SOURCE_DATA_MANAGEMENT = const_cpu_to_le32(0x00000001), | 151 | USN_SOURCE_DATA_MANAGEMENT = cpu_to_le32(0x00000001), |
152 | USN_SOURCE_AUXILIARY_DATA = const_cpu_to_le32(0x00000002), | 152 | USN_SOURCE_AUXILIARY_DATA = cpu_to_le32(0x00000002), |
153 | USN_SOURCE_REPLICATION_MANAGEMENT = const_cpu_to_le32(0x00000004), | 153 | USN_SOURCE_REPLICATION_MANAGEMENT = cpu_to_le32(0x00000004), |
154 | }; | 154 | }; |
155 | 155 | ||
156 | typedef le32 USN_SOURCE_INFO_FLAGS; | 156 | typedef le32 USN_SOURCE_INFO_FLAGS; |
diff --git a/fs/ocfs2/mmap.c b/fs/ocfs2/mmap.c index eea1d24713ea..b606496b72ec 100644 --- a/fs/ocfs2/mmap.c +++ b/fs/ocfs2/mmap.c | |||
@@ -154,8 +154,9 @@ out: | |||
154 | return ret; | 154 | return ret; |
155 | } | 155 | } |
156 | 156 | ||
157 | static int ocfs2_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 157 | static int ocfs2_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
158 | { | 158 | { |
159 | struct page *page = vmf->page; | ||
159 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; | 160 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; |
160 | struct buffer_head *di_bh = NULL; | 161 | struct buffer_head *di_bh = NULL; |
161 | sigset_t blocked, oldset; | 162 | sigset_t blocked, oldset; |
@@ -196,7 +197,8 @@ out: | |||
196 | ret2 = ocfs2_vm_op_unblock_sigs(&oldset); | 197 | ret2 = ocfs2_vm_op_unblock_sigs(&oldset); |
197 | if (ret2 < 0) | 198 | if (ret2 < 0) |
198 | mlog_errno(ret2); | 199 | mlog_errno(ret2); |
199 | 200 | if (ret) | |
201 | ret = VM_FAULT_SIGBUS; | ||
200 | return ret; | 202 | return ret; |
201 | } | 203 | } |
202 | 204 | ||
diff --git a/fs/proc/generic.c b/fs/proc/generic.c index 5d2989e9dcc1..fa678abc9db1 100644 --- a/fs/proc/generic.c +++ b/fs/proc/generic.c | |||
@@ -37,7 +37,7 @@ static int proc_match(int len, const char *name, struct proc_dir_entry *de) | |||
37 | #define PROC_BLOCK_SIZE (PAGE_SIZE - 1024) | 37 | #define PROC_BLOCK_SIZE (PAGE_SIZE - 1024) |
38 | 38 | ||
39 | static ssize_t | 39 | static ssize_t |
40 | proc_file_read(struct file *file, char __user *buf, size_t nbytes, | 40 | __proc_file_read(struct file *file, char __user *buf, size_t nbytes, |
41 | loff_t *ppos) | 41 | loff_t *ppos) |
42 | { | 42 | { |
43 | struct inode * inode = file->f_path.dentry->d_inode; | 43 | struct inode * inode = file->f_path.dentry->d_inode; |
@@ -183,19 +183,47 @@ proc_file_read(struct file *file, char __user *buf, size_t nbytes, | |||
183 | } | 183 | } |
184 | 184 | ||
185 | static ssize_t | 185 | static ssize_t |
186 | proc_file_read(struct file *file, char __user *buf, size_t nbytes, | ||
187 | loff_t *ppos) | ||
188 | { | ||
189 | struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode); | ||
190 | ssize_t rv = -EIO; | ||
191 | |||
192 | spin_lock(&pde->pde_unload_lock); | ||
193 | if (!pde->proc_fops) { | ||
194 | spin_unlock(&pde->pde_unload_lock); | ||
195 | return rv; | ||
196 | } | ||
197 | pde->pde_users++; | ||
198 | spin_unlock(&pde->pde_unload_lock); | ||
199 | |||
200 | rv = __proc_file_read(file, buf, nbytes, ppos); | ||
201 | |||
202 | pde_users_dec(pde); | ||
203 | return rv; | ||
204 | } | ||
205 | |||
206 | static ssize_t | ||
186 | proc_file_write(struct file *file, const char __user *buffer, | 207 | proc_file_write(struct file *file, const char __user *buffer, |
187 | size_t count, loff_t *ppos) | 208 | size_t count, loff_t *ppos) |
188 | { | 209 | { |
189 | struct inode *inode = file->f_path.dentry->d_inode; | 210 | struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode); |
190 | struct proc_dir_entry * dp; | 211 | ssize_t rv = -EIO; |
191 | 212 | ||
192 | dp = PDE(inode); | 213 | if (pde->write_proc) { |
193 | 214 | spin_lock(&pde->pde_unload_lock); | |
194 | if (!dp->write_proc) | 215 | if (!pde->proc_fops) { |
195 | return -EIO; | 216 | spin_unlock(&pde->pde_unload_lock); |
217 | return rv; | ||
218 | } | ||
219 | pde->pde_users++; | ||
220 | spin_unlock(&pde->pde_unload_lock); | ||
196 | 221 | ||
197 | /* FIXME: does this routine need ppos? probably... */ | 222 | /* FIXME: does this routine need ppos? probably... */ |
198 | return dp->write_proc(file, buffer, count, dp->data); | 223 | rv = pde->write_proc(file, buffer, count, pde->data); |
224 | pde_users_dec(pde); | ||
225 | } | ||
226 | return rv; | ||
199 | } | 227 | } |
200 | 228 | ||
201 | 229 | ||
@@ -307,6 +335,21 @@ static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */ | |||
307 | /* | 335 | /* |
308 | * Return an inode number between PROC_DYNAMIC_FIRST and | 336 | * Return an inode number between PROC_DYNAMIC_FIRST and |
309 | * 0xffffffff, or zero on failure. | 337 | * 0xffffffff, or zero on failure. |
338 | * | ||
339 | * Current inode allocations in the proc-fs (hex-numbers): | ||
340 | * | ||
341 | * 00000000 reserved | ||
342 | * 00000001-00000fff static entries (goners) | ||
343 | * 001 root-ino | ||
344 | * | ||
345 | * 00001000-00001fff unused | ||
346 | * 0001xxxx-7fffxxxx pid-dir entries for pid 1-7fff | ||
347 | * 80000000-efffffff unused | ||
348 | * f0000000-ffffffff dynamic entries | ||
349 | * | ||
350 | * Goal: | ||
351 | * Once we split the thing into several virtual filesystems, | ||
352 | * we will get rid of magical ranges (and this comment, BTW). | ||
310 | */ | 353 | */ |
311 | static unsigned int get_inode_number(void) | 354 | static unsigned int get_inode_number(void) |
312 | { | 355 | { |
diff --git a/fs/proc/inode-alloc.txt b/fs/proc/inode-alloc.txt deleted file mode 100644 index 77212f938c2c..000000000000 --- a/fs/proc/inode-alloc.txt +++ /dev/null | |||
@@ -1,14 +0,0 @@ | |||
1 | Current inode allocations in the proc-fs (hex-numbers): | ||
2 | |||
3 | 00000000 reserved | ||
4 | 00000001-00000fff static entries (goners) | ||
5 | 001 root-ino | ||
6 | |||
7 | 00001000-00001fff unused | ||
8 | 0001xxxx-7fffxxxx pid-dir entries for pid 1-7fff | ||
9 | 80000000-efffffff unused | ||
10 | f0000000-ffffffff dynamic entries | ||
11 | |||
12 | Goal: | ||
13 | a) once we'll split the thing into several virtual filesystems we | ||
14 | will get rid of magical ranges (and this file, BTW). | ||
diff --git a/fs/proc/inode.c b/fs/proc/inode.c index d8bb5c671f42..d78ade305541 100644 --- a/fs/proc/inode.c +++ b/fs/proc/inode.c | |||
@@ -58,11 +58,8 @@ static void proc_delete_inode(struct inode *inode) | |||
58 | 58 | ||
59 | /* Let go of any associated proc directory entry */ | 59 | /* Let go of any associated proc directory entry */ |
60 | de = PROC_I(inode)->pde; | 60 | de = PROC_I(inode)->pde; |
61 | if (de) { | 61 | if (de) |
62 | if (de->owner) | ||
63 | module_put(de->owner); | ||
64 | de_put(de); | 62 | de_put(de); |
65 | } | ||
66 | if (PROC_I(inode)->sysctl) | 63 | if (PROC_I(inode)->sysctl) |
67 | sysctl_head_put(PROC_I(inode)->sysctl); | 64 | sysctl_head_put(PROC_I(inode)->sysctl); |
68 | clear_inode(inode); | 65 | clear_inode(inode); |
@@ -127,7 +124,7 @@ static void __pde_users_dec(struct proc_dir_entry *pde) | |||
127 | complete(pde->pde_unload_completion); | 124 | complete(pde->pde_unload_completion); |
128 | } | 125 | } |
129 | 126 | ||
130 | static void pde_users_dec(struct proc_dir_entry *pde) | 127 | void pde_users_dec(struct proc_dir_entry *pde) |
131 | { | 128 | { |
132 | spin_lock(&pde->pde_unload_lock); | 129 | spin_lock(&pde->pde_unload_lock); |
133 | __pde_users_dec(pde); | 130 | __pde_users_dec(pde); |
@@ -449,12 +446,9 @@ struct inode *proc_get_inode(struct super_block *sb, unsigned int ino, | |||
449 | { | 446 | { |
450 | struct inode * inode; | 447 | struct inode * inode; |
451 | 448 | ||
452 | if (!try_module_get(de->owner)) | ||
453 | goto out_mod; | ||
454 | |||
455 | inode = iget_locked(sb, ino); | 449 | inode = iget_locked(sb, ino); |
456 | if (!inode) | 450 | if (!inode) |
457 | goto out_ino; | 451 | return NULL; |
458 | if (inode->i_state & I_NEW) { | 452 | if (inode->i_state & I_NEW) { |
459 | inode->i_mtime = inode->i_atime = inode->i_ctime = CURRENT_TIME; | 453 | inode->i_mtime = inode->i_atime = inode->i_ctime = CURRENT_TIME; |
460 | PROC_I(inode)->fd = 0; | 454 | PROC_I(inode)->fd = 0; |
@@ -485,16 +479,9 @@ struct inode *proc_get_inode(struct super_block *sb, unsigned int ino, | |||
485 | } | 479 | } |
486 | } | 480 | } |
487 | unlock_new_inode(inode); | 481 | unlock_new_inode(inode); |
488 | } else { | 482 | } else |
489 | module_put(de->owner); | ||
490 | de_put(de); | 483 | de_put(de); |
491 | } | ||
492 | return inode; | 484 | return inode; |
493 | |||
494 | out_ino: | ||
495 | module_put(de->owner); | ||
496 | out_mod: | ||
497 | return NULL; | ||
498 | } | 485 | } |
499 | 486 | ||
500 | int proc_fill_super(struct super_block *s) | 487 | int proc_fill_super(struct super_block *s) |
diff --git a/fs/proc/internal.h b/fs/proc/internal.h index cd53ff838498..f6db9618a888 100644 --- a/fs/proc/internal.h +++ b/fs/proc/internal.h | |||
@@ -91,3 +91,4 @@ struct pde_opener { | |||
91 | int (*release)(struct inode *, struct file *); | 91 | int (*release)(struct inode *, struct file *); |
92 | struct list_head lh; | 92 | struct list_head lh; |
93 | }; | 93 | }; |
94 | void pde_users_dec(struct proc_dir_entry *pde); | ||
diff --git a/fs/proc/proc_tty.c b/fs/proc/proc_tty.c index d153946d6d15..83adcc869437 100644 --- a/fs/proc/proc_tty.c +++ b/fs/proc/proc_tty.c | |||
@@ -144,17 +144,12 @@ void proc_tty_register_driver(struct tty_driver *driver) | |||
144 | { | 144 | { |
145 | struct proc_dir_entry *ent; | 145 | struct proc_dir_entry *ent; |
146 | 146 | ||
147 | if (!driver->ops->read_proc || !driver->driver_name || | 147 | if (!driver->driver_name || driver->proc_entry || |
148 | driver->proc_entry) | 148 | !driver->ops->proc_fops) |
149 | return; | 149 | return; |
150 | 150 | ||
151 | ent = create_proc_entry(driver->driver_name, 0, proc_tty_driver); | 151 | ent = proc_create_data(driver->driver_name, 0, proc_tty_driver, |
152 | if (!ent) | 152 | driver->ops->proc_fops, driver); |
153 | return; | ||
154 | ent->read_proc = driver->ops->read_proc; | ||
155 | ent->owner = driver->owner; | ||
156 | ent->data = driver; | ||
157 | |||
158 | driver->proc_entry = ent; | 153 | driver->proc_entry = ent; |
159 | } | 154 | } |
160 | 155 | ||
diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c index 94063840832a..b0ae0be4801f 100644 --- a/fs/proc/task_mmu.c +++ b/fs/proc/task_mmu.c | |||
@@ -693,8 +693,8 @@ static ssize_t pagemap_read(struct file *file, char __user *buf, | |||
693 | goto out_pages; | 693 | goto out_pages; |
694 | } | 694 | } |
695 | 695 | ||
696 | pm.out = (u64 *)buf; | 696 | pm.out = (u64 __user *)buf; |
697 | pm.end = (u64 *)(buf + count); | 697 | pm.end = (u64 __user *)(buf + count); |
698 | 698 | ||
699 | pagemap_walk.pmd_entry = pagemap_pte_range; | 699 | pagemap_walk.pmd_entry = pagemap_pte_range; |
700 | pagemap_walk.pte_hole = pagemap_pte_hole; | 700 | pagemap_walk.pte_hole = pagemap_pte_hole; |
@@ -720,9 +720,9 @@ static ssize_t pagemap_read(struct file *file, char __user *buf, | |||
720 | if (ret == PM_END_OF_BUFFER) | 720 | if (ret == PM_END_OF_BUFFER) |
721 | ret = 0; | 721 | ret = 0; |
722 | /* don't need mmap_sem for these, but this looks cleaner */ | 722 | /* don't need mmap_sem for these, but this looks cleaner */ |
723 | *ppos += (char *)pm.out - buf; | 723 | *ppos += (char __user *)pm.out - buf; |
724 | if (!ret) | 724 | if (!ret) |
725 | ret = (char *)pm.out - buf; | 725 | ret = (char __user *)pm.out - buf; |
726 | 726 | ||
727 | out_pages: | 727 | out_pages: |
728 | for (; pagecount; pagecount--) { | 728 | for (; pagecount; pagecount--) { |
diff --git a/fs/proc/uptime.c b/fs/proc/uptime.c index df26aa88fa47..0c10a0b3f146 100644 --- a/fs/proc/uptime.c +++ b/fs/proc/uptime.c | |||
@@ -1,45 +1,43 @@ | |||
1 | #include <linux/fs.h> | ||
1 | #include <linux/init.h> | 2 | #include <linux/init.h> |
2 | #include <linux/proc_fs.h> | 3 | #include <linux/proc_fs.h> |
3 | #include <linux/sched.h> | 4 | #include <linux/sched.h> |
5 | #include <linux/seq_file.h> | ||
4 | #include <linux/time.h> | 6 | #include <linux/time.h> |
5 | #include <asm/cputime.h> | 7 | #include <asm/cputime.h> |
6 | 8 | ||
7 | static int proc_calc_metrics(char *page, char **start, off_t off, | 9 | static int uptime_proc_show(struct seq_file *m, void *v) |
8 | int count, int *eof, int len) | ||
9 | { | ||
10 | if (len <= off + count) | ||
11 | *eof = 1; | ||
12 | *start = page + off; | ||
13 | len -= off; | ||
14 | if (len > count) | ||
15 | len = count; | ||
16 | if (len < 0) | ||
17 | len = 0; | ||
18 | return len; | ||
19 | } | ||
20 | |||
21 | static int uptime_read_proc(char *page, char **start, off_t off, int count, | ||
22 | int *eof, void *data) | ||
23 | { | 10 | { |
24 | struct timespec uptime; | 11 | struct timespec uptime; |
25 | struct timespec idle; | 12 | struct timespec idle; |
26 | int len; | ||
27 | cputime_t idletime = cputime_add(init_task.utime, init_task.stime); | 13 | cputime_t idletime = cputime_add(init_task.utime, init_task.stime); |
28 | 14 | ||
29 | do_posix_clock_monotonic_gettime(&uptime); | 15 | do_posix_clock_monotonic_gettime(&uptime); |
30 | monotonic_to_bootbased(&uptime); | 16 | monotonic_to_bootbased(&uptime); |
31 | cputime_to_timespec(idletime, &idle); | 17 | cputime_to_timespec(idletime, &idle); |
32 | len = sprintf(page, "%lu.%02lu %lu.%02lu\n", | 18 | seq_printf(m, "%lu.%02lu %lu.%02lu\n", |
33 | (unsigned long) uptime.tv_sec, | 19 | (unsigned long) uptime.tv_sec, |
34 | (uptime.tv_nsec / (NSEC_PER_SEC / 100)), | 20 | (uptime.tv_nsec / (NSEC_PER_SEC / 100)), |
35 | (unsigned long) idle.tv_sec, | 21 | (unsigned long) idle.tv_sec, |
36 | (idle.tv_nsec / (NSEC_PER_SEC / 100))); | 22 | (idle.tv_nsec / (NSEC_PER_SEC / 100))); |
37 | return proc_calc_metrics(page, start, off, count, eof, len); | 23 | return 0; |
38 | } | 24 | } |
39 | 25 | ||
26 | static int uptime_proc_open(struct inode *inode, struct file *file) | ||
27 | { | ||
28 | return single_open(file, uptime_proc_show, NULL); | ||
29 | } | ||
30 | |||
31 | static const struct file_operations uptime_proc_fops = { | ||
32 | .open = uptime_proc_open, | ||
33 | .read = seq_read, | ||
34 | .llseek = seq_lseek, | ||
35 | .release = single_release, | ||
36 | }; | ||
37 | |||
40 | static int __init proc_uptime_init(void) | 38 | static int __init proc_uptime_init(void) |
41 | { | 39 | { |
42 | create_proc_read_entry("uptime", 0, NULL, uptime_read_proc, NULL); | 40 | proc_create("uptime", 0, NULL, &uptime_proc_fops); |
43 | return 0; | 41 | return 0; |
44 | } | 42 | } |
45 | module_init(proc_uptime_init); | 43 | module_init(proc_uptime_init); |
diff --git a/fs/ramfs/file-nommu.c b/fs/ramfs/file-nommu.c index 995ef1d6686c..ebb2c417912c 100644 --- a/fs/ramfs/file-nommu.c +++ b/fs/ramfs/file-nommu.c | |||
@@ -59,7 +59,6 @@ const struct inode_operations ramfs_file_inode_operations = { | |||
59 | */ | 59 | */ |
60 | int ramfs_nommu_expand_for_mapping(struct inode *inode, size_t newsize) | 60 | int ramfs_nommu_expand_for_mapping(struct inode *inode, size_t newsize) |
61 | { | 61 | { |
62 | struct pagevec lru_pvec; | ||
63 | unsigned long npages, xpages, loop, limit; | 62 | unsigned long npages, xpages, loop, limit; |
64 | struct page *pages; | 63 | struct page *pages; |
65 | unsigned order; | 64 | unsigned order; |
@@ -102,24 +101,20 @@ int ramfs_nommu_expand_for_mapping(struct inode *inode, size_t newsize) | |||
102 | memset(data, 0, newsize); | 101 | memset(data, 0, newsize); |
103 | 102 | ||
104 | /* attach all the pages to the inode's address space */ | 103 | /* attach all the pages to the inode's address space */ |
105 | pagevec_init(&lru_pvec, 0); | ||
106 | for (loop = 0; loop < npages; loop++) { | 104 | for (loop = 0; loop < npages; loop++) { |
107 | struct page *page = pages + loop; | 105 | struct page *page = pages + loop; |
108 | 106 | ||
109 | ret = add_to_page_cache(page, inode->i_mapping, loop, GFP_KERNEL); | 107 | ret = add_to_page_cache_lru(page, inode->i_mapping, loop, |
108 | GFP_KERNEL); | ||
110 | if (ret < 0) | 109 | if (ret < 0) |
111 | goto add_error; | 110 | goto add_error; |
112 | 111 | ||
113 | if (!pagevec_add(&lru_pvec, page)) | ||
114 | __pagevec_lru_add_file(&lru_pvec); | ||
115 | |||
116 | /* prevent the page from being discarded on memory pressure */ | 112 | /* prevent the page from being discarded on memory pressure */ |
117 | SetPageDirty(page); | 113 | SetPageDirty(page); |
118 | 114 | ||
119 | unlock_page(page); | 115 | unlock_page(page); |
120 | } | 116 | } |
121 | 117 | ||
122 | pagevec_lru_add_file(&lru_pvec); | ||
123 | return 0; | 118 | return 0; |
124 | 119 | ||
125 | fsize_exceeded: | 120 | fsize_exceeded: |
@@ -128,10 +123,8 @@ int ramfs_nommu_expand_for_mapping(struct inode *inode, size_t newsize) | |||
128 | return -EFBIG; | 123 | return -EFBIG; |
129 | 124 | ||
130 | add_error: | 125 | add_error: |
131 | pagevec_lru_add_file(&lru_pvec); | 126 | while (loop < npages) |
132 | page_cache_release(pages + loop); | 127 | __free_page(pages + loop++); |
133 | for (loop++; loop < npages; loop++) | ||
134 | __free_page(pages + loop); | ||
135 | return ret; | 128 | return ret; |
136 | } | 129 | } |
137 | 130 | ||
diff --git a/fs/ramfs/inode.c b/fs/ramfs/inode.c index b7e6ac706b87..a404fb88e456 100644 --- a/fs/ramfs/inode.c +++ b/fs/ramfs/inode.c | |||
@@ -33,12 +33,15 @@ | |||
33 | #include <linux/backing-dev.h> | 33 | #include <linux/backing-dev.h> |
34 | #include <linux/ramfs.h> | 34 | #include <linux/ramfs.h> |
35 | #include <linux/sched.h> | 35 | #include <linux/sched.h> |
36 | #include <linux/parser.h> | ||
36 | #include <asm/uaccess.h> | 37 | #include <asm/uaccess.h> |
37 | #include "internal.h" | 38 | #include "internal.h" |
38 | 39 | ||
39 | /* some random number */ | 40 | /* some random number */ |
40 | #define RAMFS_MAGIC 0x858458f6 | 41 | #define RAMFS_MAGIC 0x858458f6 |
41 | 42 | ||
43 | #define RAMFS_DEFAULT_MODE 0755 | ||
44 | |||
42 | static const struct super_operations ramfs_ops; | 45 | static const struct super_operations ramfs_ops; |
43 | static const struct inode_operations ramfs_dir_inode_operations; | 46 | static const struct inode_operations ramfs_dir_inode_operations; |
44 | 47 | ||
@@ -158,12 +161,75 @@ static const struct inode_operations ramfs_dir_inode_operations = { | |||
158 | static const struct super_operations ramfs_ops = { | 161 | static const struct super_operations ramfs_ops = { |
159 | .statfs = simple_statfs, | 162 | .statfs = simple_statfs, |
160 | .drop_inode = generic_delete_inode, | 163 | .drop_inode = generic_delete_inode, |
164 | .show_options = generic_show_options, | ||
165 | }; | ||
166 | |||
167 | struct ramfs_mount_opts { | ||
168 | umode_t mode; | ||
169 | }; | ||
170 | |||
171 | enum { | ||
172 | Opt_mode, | ||
173 | Opt_err | ||
174 | }; | ||
175 | |||
176 | static const match_table_t tokens = { | ||
177 | {Opt_mode, "mode=%o"}, | ||
178 | {Opt_err, NULL} | ||
179 | }; | ||
180 | |||
181 | struct ramfs_fs_info { | ||
182 | struct ramfs_mount_opts mount_opts; | ||
161 | }; | 183 | }; |
162 | 184 | ||
185 | static int ramfs_parse_options(char *data, struct ramfs_mount_opts *opts) | ||
186 | { | ||
187 | substring_t args[MAX_OPT_ARGS]; | ||
188 | int option; | ||
189 | int token; | ||
190 | char *p; | ||
191 | |||
192 | opts->mode = RAMFS_DEFAULT_MODE; | ||
193 | |||
194 | while ((p = strsep(&data, ",")) != NULL) { | ||
195 | if (!*p) | ||
196 | continue; | ||
197 | |||
198 | token = match_token(p, tokens, args); | ||
199 | switch (token) { | ||
200 | case Opt_mode: | ||
201 | if (match_octal(&args[0], &option)) | ||
202 | return -EINVAL; | ||
203 | opts->mode = option & S_IALLUGO; | ||
204 | break; | ||
205 | default: | ||
206 | printk(KERN_ERR "ramfs: bad mount option: %s\n", p); | ||
207 | return -EINVAL; | ||
208 | } | ||
209 | } | ||
210 | |||
211 | return 0; | ||
212 | } | ||
213 | |||
163 | static int ramfs_fill_super(struct super_block * sb, void * data, int silent) | 214 | static int ramfs_fill_super(struct super_block * sb, void * data, int silent) |
164 | { | 215 | { |
165 | struct inode * inode; | 216 | struct ramfs_fs_info *fsi; |
166 | struct dentry * root; | 217 | struct inode *inode = NULL; |
218 | struct dentry *root; | ||
219 | int err; | ||
220 | |||
221 | save_mount_options(sb, data); | ||
222 | |||
223 | fsi = kzalloc(sizeof(struct ramfs_fs_info), GFP_KERNEL); | ||
224 | if (!fsi) { | ||
225 | err = -ENOMEM; | ||
226 | goto fail; | ||
227 | } | ||
228 | sb->s_fs_info = fsi; | ||
229 | |||
230 | err = ramfs_parse_options(data, &fsi->mount_opts); | ||
231 | if (err) | ||
232 | goto fail; | ||
167 | 233 | ||
168 | sb->s_maxbytes = MAX_LFS_FILESIZE; | 234 | sb->s_maxbytes = MAX_LFS_FILESIZE; |
169 | sb->s_blocksize = PAGE_CACHE_SIZE; | 235 | sb->s_blocksize = PAGE_CACHE_SIZE; |
@@ -171,17 +237,23 @@ static int ramfs_fill_super(struct super_block * sb, void * data, int silent) | |||
171 | sb->s_magic = RAMFS_MAGIC; | 237 | sb->s_magic = RAMFS_MAGIC; |
172 | sb->s_op = &ramfs_ops; | 238 | sb->s_op = &ramfs_ops; |
173 | sb->s_time_gran = 1; | 239 | sb->s_time_gran = 1; |
174 | inode = ramfs_get_inode(sb, S_IFDIR | 0755, 0); | 240 | inode = ramfs_get_inode(sb, S_IFDIR | fsi->mount_opts.mode, 0); |
175 | if (!inode) | 241 | if (!inode) { |
176 | return -ENOMEM; | 242 | err = -ENOMEM; |
243 | goto fail; | ||
244 | } | ||
177 | 245 | ||
178 | root = d_alloc_root(inode); | 246 | root = d_alloc_root(inode); |
179 | if (!root) { | 247 | if (!root) { |
180 | iput(inode); | 248 | err = -ENOMEM; |
181 | return -ENOMEM; | 249 | goto fail; |
182 | } | 250 | } |
183 | sb->s_root = root; | 251 | sb->s_root = root; |
184 | return 0; | 252 | return 0; |
253 | fail: | ||
254 | kfree(fsi); | ||
255 | iput(inode); | ||
256 | return err; | ||
185 | } | 257 | } |
186 | 258 | ||
187 | int ramfs_get_sb(struct file_system_type *fs_type, | 259 | int ramfs_get_sb(struct file_system_type *fs_type, |
@@ -197,10 +269,16 @@ static int rootfs_get_sb(struct file_system_type *fs_type, | |||
197 | mnt); | 269 | mnt); |
198 | } | 270 | } |
199 | 271 | ||
272 | static void ramfs_kill_sb(struct super_block *sb) | ||
273 | { | ||
274 | kfree(sb->s_fs_info); | ||
275 | kill_litter_super(sb); | ||
276 | } | ||
277 | |||
200 | static struct file_system_type ramfs_fs_type = { | 278 | static struct file_system_type ramfs_fs_type = { |
201 | .name = "ramfs", | 279 | .name = "ramfs", |
202 | .get_sb = ramfs_get_sb, | 280 | .get_sb = ramfs_get_sb, |
203 | .kill_sb = kill_litter_super, | 281 | .kill_sb = ramfs_kill_sb, |
204 | }; | 282 | }; |
205 | static struct file_system_type rootfs_fs_type = { | 283 | static struct file_system_type rootfs_fs_type = { |
206 | .name = "rootfs", | 284 | .name = "rootfs", |
diff --git a/fs/reiserfs/procfs.c b/fs/reiserfs/procfs.c index d5066400638a..9229e5514a4e 100644 --- a/fs/reiserfs/procfs.c +++ b/fs/reiserfs/procfs.c | |||
@@ -492,7 +492,6 @@ int reiserfs_proc_info_init(struct super_block *sb) | |||
492 | spin_lock_init(&__PINFO(sb).lock); | 492 | spin_lock_init(&__PINFO(sb).lock); |
493 | REISERFS_SB(sb)->procdir = proc_mkdir(b, proc_info_root); | 493 | REISERFS_SB(sb)->procdir = proc_mkdir(b, proc_info_root); |
494 | if (REISERFS_SB(sb)->procdir) { | 494 | if (REISERFS_SB(sb)->procdir) { |
495 | REISERFS_SB(sb)->procdir->owner = THIS_MODULE; | ||
496 | REISERFS_SB(sb)->procdir->data = sb; | 495 | REISERFS_SB(sb)->procdir->data = sb; |
497 | add_file(sb, "version", show_version); | 496 | add_file(sb, "version", show_version); |
498 | add_file(sb, "super", show_super); | 497 | add_file(sb, "super", show_super); |
@@ -556,9 +555,7 @@ int reiserfs_proc_info_global_init(void) | |||
556 | { | 555 | { |
557 | if (proc_info_root == NULL) { | 556 | if (proc_info_root == NULL) { |
558 | proc_info_root = proc_mkdir(proc_info_root_name, NULL); | 557 | proc_info_root = proc_mkdir(proc_info_root_name, NULL); |
559 | if (proc_info_root) { | 558 | if (!proc_info_root) { |
560 | proc_info_root->owner = THIS_MODULE; | ||
561 | } else { | ||
562 | reiserfs_warning(NULL, "cannot create /proc/%s", | 559 | reiserfs_warning(NULL, "cannot create /proc/%s", |
563 | proc_info_root_name); | 560 | proc_info_root_name); |
564 | return 1; | 561 | return 1; |
diff --git a/fs/reiserfs/xattr.c b/fs/reiserfs/xattr.c index e52743e77000..f83f52bae390 100644 --- a/fs/reiserfs/xattr.c +++ b/fs/reiserfs/xattr.c | |||
@@ -57,12 +57,14 @@ | |||
57 | /* Helpers for inode ops. We do this so that we don't have all the VFS | 57 | /* Helpers for inode ops. We do this so that we don't have all the VFS |
58 | * overhead and also for proper i_mutex annotation. | 58 | * overhead and also for proper i_mutex annotation. |
59 | * dir->i_mutex must be held for all of them. */ | 59 | * dir->i_mutex must be held for all of them. */ |
60 | #ifdef CONFIG_REISERFS_FS_XATTR | ||
60 | static int xattr_create(struct inode *dir, struct dentry *dentry, int mode) | 61 | static int xattr_create(struct inode *dir, struct dentry *dentry, int mode) |
61 | { | 62 | { |
62 | BUG_ON(!mutex_is_locked(&dir->i_mutex)); | 63 | BUG_ON(!mutex_is_locked(&dir->i_mutex)); |
63 | vfs_dq_init(dir); | 64 | vfs_dq_init(dir); |
64 | return dir->i_op->create(dir, dentry, mode, NULL); | 65 | return dir->i_op->create(dir, dentry, mode, NULL); |
65 | } | 66 | } |
67 | #endif | ||
66 | 68 | ||
67 | static int xattr_mkdir(struct inode *dir, struct dentry *dentry, int mode) | 69 | static int xattr_mkdir(struct inode *dir, struct dentry *dentry, int mode) |
68 | { | 70 | { |
diff --git a/fs/seq_file.c b/fs/seq_file.c index a1a4cfe19210..7f40f30c55c5 100644 --- a/fs/seq_file.c +++ b/fs/seq_file.c | |||
@@ -513,7 +513,7 @@ int seq_bitmap(struct seq_file *m, const unsigned long *bits, | |||
513 | } | 513 | } |
514 | EXPORT_SYMBOL(seq_bitmap); | 514 | EXPORT_SYMBOL(seq_bitmap); |
515 | 515 | ||
516 | int seq_bitmap_list(struct seq_file *m, unsigned long *bits, | 516 | int seq_bitmap_list(struct seq_file *m, const unsigned long *bits, |
517 | unsigned int nr_bits) | 517 | unsigned int nr_bits) |
518 | { | 518 | { |
519 | if (m->count < m->size) { | 519 | if (m->count < m->size) { |
diff --git a/fs/sysfs/bin.c b/fs/sysfs/bin.c index 07703d3ff4a1..93e0c0281d45 100644 --- a/fs/sysfs/bin.c +++ b/fs/sysfs/bin.c | |||
@@ -234,7 +234,7 @@ static int bin_fault(struct vm_area_struct *vma, struct vm_fault *vmf) | |||
234 | return ret; | 234 | return ret; |
235 | } | 235 | } |
236 | 236 | ||
237 | static int bin_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 237 | static int bin_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
238 | { | 238 | { |
239 | struct file *file = vma->vm_file; | 239 | struct file *file = vma->vm_file; |
240 | struct bin_buffer *bb = file->private_data; | 240 | struct bin_buffer *bb = file->private_data; |
@@ -242,15 +242,15 @@ static int bin_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
242 | int ret; | 242 | int ret; |
243 | 243 | ||
244 | if (!bb->vm_ops) | 244 | if (!bb->vm_ops) |
245 | return -EINVAL; | 245 | return VM_FAULT_SIGBUS; |
246 | 246 | ||
247 | if (!bb->vm_ops->page_mkwrite) | 247 | if (!bb->vm_ops->page_mkwrite) |
248 | return 0; | 248 | return 0; |
249 | 249 | ||
250 | if (!sysfs_get_active_two(attr_sd)) | 250 | if (!sysfs_get_active_two(attr_sd)) |
251 | return -EINVAL; | 251 | return VM_FAULT_SIGBUS; |
252 | 252 | ||
253 | ret = bb->vm_ops->page_mkwrite(vma, page); | 253 | ret = bb->vm_ops->page_mkwrite(vma, vmf); |
254 | 254 | ||
255 | sysfs_put_active_two(attr_sd); | 255 | sysfs_put_active_two(attr_sd); |
256 | return ret; | 256 | return ret; |
diff --git a/fs/ubifs/file.c b/fs/ubifs/file.c index 93b6de51f261..0ff89fe71e51 100644 --- a/fs/ubifs/file.c +++ b/fs/ubifs/file.c | |||
@@ -1434,8 +1434,9 @@ static int ubifs_releasepage(struct page *page, gfp_t unused_gfp_flags) | |||
1434 | * mmap()d file has taken write protection fault and is being made | 1434 | * mmap()d file has taken write protection fault and is being made |
1435 | * writable. UBIFS must ensure page is budgeted for. | 1435 | * writable. UBIFS must ensure page is budgeted for. |
1436 | */ | 1436 | */ |
1437 | static int ubifs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | 1437 | static int ubifs_vm_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf) |
1438 | { | 1438 | { |
1439 | struct page *page = vmf->page; | ||
1439 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; | 1440 | struct inode *inode = vma->vm_file->f_path.dentry->d_inode; |
1440 | struct ubifs_info *c = inode->i_sb->s_fs_info; | 1441 | struct ubifs_info *c = inode->i_sb->s_fs_info; |
1441 | struct timespec now = ubifs_current_time(inode); | 1442 | struct timespec now = ubifs_current_time(inode); |
@@ -1447,7 +1448,7 @@ static int ubifs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
1447 | ubifs_assert(!(inode->i_sb->s_flags & MS_RDONLY)); | 1448 | ubifs_assert(!(inode->i_sb->s_flags & MS_RDONLY)); |
1448 | 1449 | ||
1449 | if (unlikely(c->ro_media)) | 1450 | if (unlikely(c->ro_media)) |
1450 | return -EROFS; | 1451 | return VM_FAULT_SIGBUS; /* -EROFS */ |
1451 | 1452 | ||
1452 | /* | 1453 | /* |
1453 | * We have not locked @page so far so we may budget for changing the | 1454 | * We have not locked @page so far so we may budget for changing the |
@@ -1480,7 +1481,7 @@ static int ubifs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
1480 | if (err == -ENOSPC) | 1481 | if (err == -ENOSPC) |
1481 | ubifs_warn("out of space for mmapped file " | 1482 | ubifs_warn("out of space for mmapped file " |
1482 | "(inode number %lu)", inode->i_ino); | 1483 | "(inode number %lu)", inode->i_ino); |
1483 | return err; | 1484 | return VM_FAULT_SIGBUS; |
1484 | } | 1485 | } |
1485 | 1486 | ||
1486 | lock_page(page); | 1487 | lock_page(page); |
@@ -1520,6 +1521,8 @@ static int ubifs_vm_page_mkwrite(struct vm_area_struct *vma, struct page *page) | |||
1520 | out_unlock: | 1521 | out_unlock: |
1521 | unlock_page(page); | 1522 | unlock_page(page); |
1522 | ubifs_release_budget(c, &req); | 1523 | ubifs_release_budget(c, &req); |
1524 | if (err) | ||
1525 | err = VM_FAULT_SIGBUS; | ||
1523 | return err; | 1526 | return err; |
1524 | } | 1527 | } |
1525 | 1528 | ||
diff --git a/fs/xfs/linux-2.6/xfs_file.c b/fs/xfs/linux-2.6/xfs_file.c index e14c4e3aea0c..f4e255441574 100644 --- a/fs/xfs/linux-2.6/xfs_file.c +++ b/fs/xfs/linux-2.6/xfs_file.c | |||
@@ -234,9 +234,9 @@ xfs_file_mmap( | |||
234 | STATIC int | 234 | STATIC int |
235 | xfs_vm_page_mkwrite( | 235 | xfs_vm_page_mkwrite( |
236 | struct vm_area_struct *vma, | 236 | struct vm_area_struct *vma, |
237 | struct page *page) | 237 | struct vm_fault *vmf) |
238 | { | 238 | { |
239 | return block_page_mkwrite(vma, page, xfs_get_blocks); | 239 | return block_page_mkwrite(vma, vmf, xfs_get_blocks); |
240 | } | 240 | } |
241 | 241 | ||
242 | const struct file_operations xfs_file_operations = { | 242 | const struct file_operations xfs_file_operations = { |