]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * linux/fs/pipe.c | |
4 | * | |
5 | * Copyright (C) 1991, 1992, 1999 Linus Torvalds | |
6 | */ | |
7 | ||
8 | #include <linux/mm.h> | |
9 | #include <linux/file.h> | |
10 | #include <linux/poll.h> | |
11 | #include <linux/slab.h> | |
12 | #include <linux/module.h> | |
13 | #include <linux/init.h> | |
14 | #include <linux/fs.h> | |
35f3d14d | 15 | #include <linux/log2.h> |
1da177e4 | 16 | #include <linux/mount.h> |
4fa7ec5d | 17 | #include <linux/pseudo_fs.h> |
b502bd11 | 18 | #include <linux/magic.h> |
1da177e4 LT |
19 | #include <linux/pipe_fs_i.h> |
20 | #include <linux/uio.h> | |
21 | #include <linux/highmem.h> | |
5274f052 | 22 | #include <linux/pagemap.h> |
db349509 | 23 | #include <linux/audit.h> |
ba719bae | 24 | #include <linux/syscalls.h> |
b492e95b | 25 | #include <linux/fcntl.h> |
d86133bd | 26 | #include <linux/memcontrol.h> |
1da177e4 | 27 | |
7c0f6ba6 | 28 | #include <linux/uaccess.h> |
1da177e4 LT |
29 | #include <asm/ioctls.h> |
30 | ||
599a0ac1 AV |
31 | #include "internal.h" |
32 | ||
b492e95b JA |
33 | /* |
34 | * The max size that a non-root user is allowed to grow the pipe. Can | |
ff9da691 | 35 | * be set by root in /proc/sys/fs/pipe-max-size |
b492e95b | 36 | */ |
ff9da691 JA |
37 | unsigned int pipe_max_size = 1048576; |
38 | ||
759c0114 WT |
39 | /* Maximum allocatable pages per user. Hard limit is unset by default, soft |
40 | * matches default values. | |
41 | */ | |
42 | unsigned long pipe_user_pages_hard; | |
43 | unsigned long pipe_user_pages_soft = PIPE_DEF_BUFFERS * INR_OPEN_CUR; | |
44 | ||
1da177e4 | 45 | /* |
8cefc107 DH |
46 | * We use head and tail indices that aren't masked off, except at the point of |
47 | * dereference, but rather they're allowed to wrap naturally. This means there | |
48 | * isn't a dead spot in the buffer, but the ring has to be a power of two and | |
49 | * <= 2^31. | |
50 | * -- David Howells 2019-09-23. | |
51 | * | |
1da177e4 LT |
52 | * Reads with count = 0 should always return 0. |
53 | * -- Julian Bradfield 1999-06-07. | |
54 | * | |
55 | * FIFOs and Pipes now generate SIGIO for both readers and writers. | |
56 | * -- Jeremy Elson <[email protected]> 2001-08-16 | |
57 | * | |
58 | * pipe_read & write cleanup | |
59 | * -- Manfred Spraul <[email protected]> 2002-05-09 | |
60 | */ | |
61 | ||
61e0d47c MS |
62 | static void pipe_lock_nested(struct pipe_inode_info *pipe, int subclass) |
63 | { | |
6447a3cf | 64 | if (pipe->files) |
72b0d9aa | 65 | mutex_lock_nested(&pipe->mutex, subclass); |
61e0d47c MS |
66 | } |
67 | ||
68 | void pipe_lock(struct pipe_inode_info *pipe) | |
69 | { | |
70 | /* | |
71 | * pipe_lock() nests non-pipe inode locks (for writing to a file) | |
72 | */ | |
73 | pipe_lock_nested(pipe, I_MUTEX_PARENT); | |
74 | } | |
75 | EXPORT_SYMBOL(pipe_lock); | |
76 | ||
77 | void pipe_unlock(struct pipe_inode_info *pipe) | |
78 | { | |
6447a3cf | 79 | if (pipe->files) |
72b0d9aa | 80 | mutex_unlock(&pipe->mutex); |
61e0d47c MS |
81 | } |
82 | EXPORT_SYMBOL(pipe_unlock); | |
83 | ||
ebec73f4 AV |
84 | static inline void __pipe_lock(struct pipe_inode_info *pipe) |
85 | { | |
86 | mutex_lock_nested(&pipe->mutex, I_MUTEX_PARENT); | |
87 | } | |
88 | ||
89 | static inline void __pipe_unlock(struct pipe_inode_info *pipe) | |
90 | { | |
91 | mutex_unlock(&pipe->mutex); | |
92 | } | |
93 | ||
61e0d47c MS |
94 | void pipe_double_lock(struct pipe_inode_info *pipe1, |
95 | struct pipe_inode_info *pipe2) | |
96 | { | |
97 | BUG_ON(pipe1 == pipe2); | |
98 | ||
99 | if (pipe1 < pipe2) { | |
100 | pipe_lock_nested(pipe1, I_MUTEX_PARENT); | |
101 | pipe_lock_nested(pipe2, I_MUTEX_CHILD); | |
102 | } else { | |
023d43c7 PZ |
103 | pipe_lock_nested(pipe2, I_MUTEX_PARENT); |
104 | pipe_lock_nested(pipe1, I_MUTEX_CHILD); | |
61e0d47c MS |
105 | } |
106 | } | |
107 | ||
1da177e4 | 108 | /* Drop the inode semaphore and wait for a pipe event, atomically */ |
3a326a2c | 109 | void pipe_wait(struct pipe_inode_info *pipe) |
1da177e4 LT |
110 | { |
111 | DEFINE_WAIT(wait); | |
112 | ||
d79fc0fc IM |
113 | /* |
114 | * Pipes are system-local resources, so sleeping on them | |
115 | * is considered a noninteractive wait: | |
116 | */ | |
af927232 | 117 | prepare_to_wait(&pipe->wait, &wait, TASK_INTERRUPTIBLE); |
61e0d47c | 118 | pipe_unlock(pipe); |
1da177e4 | 119 | schedule(); |
3a326a2c | 120 | finish_wait(&pipe->wait, &wait); |
61e0d47c | 121 | pipe_lock(pipe); |
1da177e4 LT |
122 | } |
123 | ||
341b446b IM |
124 | static void anon_pipe_buf_release(struct pipe_inode_info *pipe, |
125 | struct pipe_buffer *buf) | |
1da177e4 LT |
126 | { |
127 | struct page *page = buf->page; | |
128 | ||
5274f052 JA |
129 | /* |
130 | * If nobody else uses this page, and we don't already have a | |
131 | * temporary page, let's keep track of it as a one-deep | |
341b446b | 132 | * allocation cache. (Otherwise just release our reference to it) |
5274f052 | 133 | */ |
341b446b | 134 | if (page_count(page) == 1 && !pipe->tmp_page) |
923f4f23 | 135 | pipe->tmp_page = page; |
341b446b | 136 | else |
09cbfeaf | 137 | put_page(page); |
1da177e4 LT |
138 | } |
139 | ||
d86133bd VD |
140 | static int anon_pipe_buf_steal(struct pipe_inode_info *pipe, |
141 | struct pipe_buffer *buf) | |
142 | { | |
143 | struct page *page = buf->page; | |
144 | ||
145 | if (page_count(page) == 1) { | |
60cd4bcd | 146 | memcg_kmem_uncharge(page, 0); |
d86133bd VD |
147 | __SetPageLocked(page); |
148 | return 0; | |
149 | } | |
150 | return 1; | |
151 | } | |
152 | ||
0845718d | 153 | /** |
b51d63c6 | 154 | * generic_pipe_buf_steal - attempt to take ownership of a &pipe_buffer |
0845718d JA |
155 | * @pipe: the pipe that the buffer belongs to |
156 | * @buf: the buffer to attempt to steal | |
157 | * | |
158 | * Description: | |
b51d63c6 | 159 | * This function attempts to steal the &struct page attached to |
0845718d JA |
160 | * @buf. If successful, this function returns 0 and returns with |
161 | * the page locked. The caller may then reuse the page for whatever | |
b51d63c6 | 162 | * he wishes; the typical use is insertion into a different file |
0845718d JA |
163 | * page cache. |
164 | */ | |
330ab716 JA |
165 | int generic_pipe_buf_steal(struct pipe_inode_info *pipe, |
166 | struct pipe_buffer *buf) | |
5abc97aa | 167 | { |
46e678c9 JA |
168 | struct page *page = buf->page; |
169 | ||
0845718d JA |
170 | /* |
171 | * A reference of one is golden, that means that the owner of this | |
172 | * page is the only one holding a reference to it. lock the page | |
173 | * and return OK. | |
174 | */ | |
46e678c9 | 175 | if (page_count(page) == 1) { |
46e678c9 JA |
176 | lock_page(page); |
177 | return 0; | |
178 | } | |
179 | ||
180 | return 1; | |
5abc97aa | 181 | } |
51921cb7 | 182 | EXPORT_SYMBOL(generic_pipe_buf_steal); |
5abc97aa | 183 | |
0845718d | 184 | /** |
b51d63c6 | 185 | * generic_pipe_buf_get - get a reference to a &struct pipe_buffer |
0845718d JA |
186 | * @pipe: the pipe that the buffer belongs to |
187 | * @buf: the buffer to get a reference to | |
188 | * | |
189 | * Description: | |
190 | * This function grabs an extra reference to @buf. It's used in | |
191 | * in the tee() system call, when we duplicate the buffers in one | |
192 | * pipe into another. | |
193 | */ | |
15fab63e | 194 | bool generic_pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf) |
70524490 | 195 | { |
15fab63e | 196 | return try_get_page(buf->page); |
70524490 | 197 | } |
51921cb7 | 198 | EXPORT_SYMBOL(generic_pipe_buf_get); |
70524490 | 199 | |
0845718d JA |
200 | /** |
201 | * generic_pipe_buf_confirm - verify contents of the pipe buffer | |
79685b8d | 202 | * @info: the pipe that the buffer belongs to |
0845718d JA |
203 | * @buf: the buffer to confirm |
204 | * | |
205 | * Description: | |
206 | * This function does nothing, because the generic pipe code uses | |
207 | * pages that are always good when inserted into the pipe. | |
208 | */ | |
cac36bb0 JA |
209 | int generic_pipe_buf_confirm(struct pipe_inode_info *info, |
210 | struct pipe_buffer *buf) | |
f84d7519 JA |
211 | { |
212 | return 0; | |
213 | } | |
51921cb7 | 214 | EXPORT_SYMBOL(generic_pipe_buf_confirm); |
f84d7519 | 215 | |
6818173b MS |
216 | /** |
217 | * generic_pipe_buf_release - put a reference to a &struct pipe_buffer | |
218 | * @pipe: the pipe that the buffer belongs to | |
219 | * @buf: the buffer to put a reference to | |
220 | * | |
221 | * Description: | |
222 | * This function releases a reference to @buf. | |
223 | */ | |
224 | void generic_pipe_buf_release(struct pipe_inode_info *pipe, | |
225 | struct pipe_buffer *buf) | |
226 | { | |
09cbfeaf | 227 | put_page(buf->page); |
6818173b | 228 | } |
51921cb7 | 229 | EXPORT_SYMBOL(generic_pipe_buf_release); |
6818173b | 230 | |
01e7187b | 231 | /* New data written to a pipe may be appended to a buffer with this type. */ |
d4c3cca9 | 232 | static const struct pipe_buf_operations anon_pipe_buf_ops = { |
cac36bb0 | 233 | .confirm = generic_pipe_buf_confirm, |
1da177e4 | 234 | .release = anon_pipe_buf_release, |
d86133bd | 235 | .steal = anon_pipe_buf_steal, |
f84d7519 | 236 | .get = generic_pipe_buf_get, |
1da177e4 LT |
237 | }; |
238 | ||
a0ce2f0a | 239 | static const struct pipe_buf_operations anon_pipe_buf_nomerge_ops = { |
cac36bb0 | 240 | .confirm = generic_pipe_buf_confirm, |
1da177e4 | 241 | .release = anon_pipe_buf_release, |
d86133bd | 242 | .steal = anon_pipe_buf_steal, |
f84d7519 | 243 | .get = generic_pipe_buf_get, |
1da177e4 LT |
244 | }; |
245 | ||
9883035a | 246 | static const struct pipe_buf_operations packet_pipe_buf_ops = { |
9883035a LT |
247 | .confirm = generic_pipe_buf_confirm, |
248 | .release = anon_pipe_buf_release, | |
d86133bd | 249 | .steal = anon_pipe_buf_steal, |
9883035a LT |
250 | .get = generic_pipe_buf_get, |
251 | }; | |
252 | ||
01e7187b JH |
253 | /** |
254 | * pipe_buf_mark_unmergeable - mark a &struct pipe_buffer as unmergeable | |
255 | * @buf: the buffer to mark | |
256 | * | |
257 | * Description: | |
258 | * This function ensures that no future writes will be merged into the | |
259 | * given &struct pipe_buffer. This is necessary when multiple pipe buffers | |
260 | * share the same backing page. | |
261 | */ | |
a0ce2f0a JH |
262 | void pipe_buf_mark_unmergeable(struct pipe_buffer *buf) |
263 | { | |
264 | if (buf->ops == &anon_pipe_buf_ops) | |
265 | buf->ops = &anon_pipe_buf_nomerge_ops; | |
266 | } | |
267 | ||
01e7187b JH |
268 | static bool pipe_buf_can_merge(struct pipe_buffer *buf) |
269 | { | |
270 | return buf->ops == &anon_pipe_buf_ops; | |
271 | } | |
272 | ||
1da177e4 | 273 | static ssize_t |
fb9096a3 | 274 | pipe_read(struct kiocb *iocb, struct iov_iter *to) |
1da177e4 | 275 | { |
fb9096a3 | 276 | size_t total_len = iov_iter_count(to); |
ee0b3e67 | 277 | struct file *filp = iocb->ki_filp; |
de32ec4c | 278 | struct pipe_inode_info *pipe = filp->private_data; |
1da177e4 LT |
279 | int do_wakeup; |
280 | ssize_t ret; | |
1da177e4 | 281 | |
1da177e4 LT |
282 | /* Null read succeeds. */ |
283 | if (unlikely(total_len == 0)) | |
284 | return 0; | |
285 | ||
286 | do_wakeup = 0; | |
287 | ret = 0; | |
ebec73f4 | 288 | __pipe_lock(pipe); |
1da177e4 | 289 | for (;;) { |
8cefc107 DH |
290 | unsigned int head = pipe->head; |
291 | unsigned int tail = pipe->tail; | |
292 | unsigned int mask = pipe->ring_size - 1; | |
293 | ||
294 | if (!pipe_empty(head, tail)) { | |
295 | struct pipe_buffer *buf = &pipe->bufs[tail & mask]; | |
1da177e4 | 296 | size_t chars = buf->len; |
637b58c2 AV |
297 | size_t written; |
298 | int error; | |
1da177e4 LT |
299 | |
300 | if (chars > total_len) | |
301 | chars = total_len; | |
302 | ||
fba597db | 303 | error = pipe_buf_confirm(pipe, buf); |
f84d7519 | 304 | if (error) { |
5274f052 | 305 | if (!ret) |
e5953cbd | 306 | ret = error; |
5274f052 JA |
307 | break; |
308 | } | |
f84d7519 | 309 | |
fb9096a3 | 310 | written = copy_page_to_iter(buf->page, buf->offset, chars, to); |
637b58c2 | 311 | if (unlikely(written < chars)) { |
341b446b | 312 | if (!ret) |
637b58c2 | 313 | ret = -EFAULT; |
1da177e4 LT |
314 | break; |
315 | } | |
316 | ret += chars; | |
317 | buf->offset += chars; | |
318 | buf->len -= chars; | |
9883035a LT |
319 | |
320 | /* Was it a packet buffer? Clean up and exit */ | |
321 | if (buf->flags & PIPE_BUF_FLAG_PACKET) { | |
322 | total_len = chars; | |
323 | buf->len = 0; | |
324 | } | |
325 | ||
1da177e4 | 326 | if (!buf->len) { |
a779638c | 327 | pipe_buf_release(pipe, buf); |
b667b867 | 328 | spin_lock_irq(&pipe->wait.lock); |
8cefc107 DH |
329 | tail++; |
330 | pipe->tail = tail; | |
b667b867 DH |
331 | do_wakeup = 0; |
332 | wake_up_interruptible_sync_poll_locked( | |
333 | &pipe->wait, EPOLLOUT | EPOLLWRNORM); | |
334 | spin_unlock_irq(&pipe->wait.lock); | |
335 | kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT); | |
1da177e4 LT |
336 | } |
337 | total_len -= chars; | |
338 | if (!total_len) | |
339 | break; /* common path: read succeeded */ | |
8cefc107 DH |
340 | if (!pipe_empty(head, tail)) /* More to do? */ |
341 | continue; | |
1da177e4 | 342 | } |
8cefc107 | 343 | |
923f4f23 | 344 | if (!pipe->writers) |
1da177e4 | 345 | break; |
923f4f23 | 346 | if (!pipe->waiting_writers) { |
1da177e4 LT |
347 | /* syscall merging: Usually we must not sleep |
348 | * if O_NONBLOCK is set, or if we got some data. | |
349 | * But if a writer sleeps in kernel space, then | |
350 | * we can wait for that data without violating POSIX. | |
351 | */ | |
352 | if (ret) | |
353 | break; | |
354 | if (filp->f_flags & O_NONBLOCK) { | |
355 | ret = -EAGAIN; | |
356 | break; | |
357 | } | |
358 | } | |
359 | if (signal_pending(current)) { | |
341b446b IM |
360 | if (!ret) |
361 | ret = -ERESTARTSYS; | |
1da177e4 LT |
362 | break; |
363 | } | |
364 | if (do_wakeup) { | |
a9a08845 | 365 | wake_up_interruptible_sync_poll(&pipe->wait, EPOLLOUT | EPOLLWRNORM); |
923f4f23 | 366 | kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT); |
b667b867 | 367 | do_wakeup = 0; |
1da177e4 | 368 | } |
923f4f23 | 369 | pipe_wait(pipe); |
1da177e4 | 370 | } |
ebec73f4 | 371 | __pipe_unlock(pipe); |
341b446b IM |
372 | |
373 | /* Signal writers asynchronously that there is more room. */ | |
1da177e4 | 374 | if (do_wakeup) { |
a9a08845 | 375 | wake_up_interruptible_sync_poll(&pipe->wait, EPOLLOUT | EPOLLWRNORM); |
923f4f23 | 376 | kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT); |
1da177e4 LT |
377 | } |
378 | if (ret > 0) | |
379 | file_accessed(filp); | |
380 | return ret; | |
381 | } | |
382 | ||
9883035a LT |
383 | static inline int is_packetized(struct file *file) |
384 | { | |
385 | return (file->f_flags & O_DIRECT) != 0; | |
386 | } | |
387 | ||
1da177e4 | 388 | static ssize_t |
f0d1bec9 | 389 | pipe_write(struct kiocb *iocb, struct iov_iter *from) |
1da177e4 | 390 | { |
ee0b3e67 | 391 | struct file *filp = iocb->ki_filp; |
de32ec4c | 392 | struct pipe_inode_info *pipe = filp->private_data; |
8cefc107 | 393 | unsigned int head, tail, max_usage, mask; |
f0d1bec9 AV |
394 | ssize_t ret = 0; |
395 | int do_wakeup = 0; | |
396 | size_t total_len = iov_iter_count(from); | |
1da177e4 LT |
397 | ssize_t chars; |
398 | ||
1da177e4 LT |
399 | /* Null write succeeds. */ |
400 | if (unlikely(total_len == 0)) | |
401 | return 0; | |
402 | ||
ebec73f4 | 403 | __pipe_lock(pipe); |
1da177e4 | 404 | |
923f4f23 | 405 | if (!pipe->readers) { |
1da177e4 LT |
406 | send_sig(SIGPIPE, current, 0); |
407 | ret = -EPIPE; | |
408 | goto out; | |
409 | } | |
410 | ||
8cefc107 DH |
411 | tail = pipe->tail; |
412 | head = pipe->head; | |
6718b6f8 | 413 | max_usage = pipe->max_usage; |
8cefc107 DH |
414 | mask = pipe->ring_size - 1; |
415 | ||
1da177e4 LT |
416 | /* We try to merge small writes */ |
417 | chars = total_len & (PAGE_SIZE-1); /* size of the last buffer */ | |
8cefc107 DH |
418 | if (!pipe_empty(head, tail) && chars != 0) { |
419 | struct pipe_buffer *buf = &pipe->bufs[(head - 1) & mask]; | |
1da177e4 | 420 | int offset = buf->offset + buf->len; |
341b446b | 421 | |
01e7187b | 422 | if (pipe_buf_can_merge(buf) && offset + chars <= PAGE_SIZE) { |
fba597db | 423 | ret = pipe_buf_confirm(pipe, buf); |
6ae08069 | 424 | if (ret) |
5274f052 | 425 | goto out; |
f84d7519 | 426 | |
f0d1bec9 AV |
427 | ret = copy_page_from_iter(buf->page, offset, chars, from); |
428 | if (unlikely(ret < chars)) { | |
6ae08069 | 429 | ret = -EFAULT; |
1da177e4 | 430 | goto out; |
f6762b7a | 431 | } |
f0d1bec9 | 432 | do_wakeup = 1; |
6ae08069 | 433 | buf->len += ret; |
f0d1bec9 | 434 | if (!iov_iter_count(from)) |
1da177e4 LT |
435 | goto out; |
436 | } | |
437 | } | |
438 | ||
439 | for (;;) { | |
923f4f23 | 440 | if (!pipe->readers) { |
1da177e4 | 441 | send_sig(SIGPIPE, current, 0); |
341b446b IM |
442 | if (!ret) |
443 | ret = -EPIPE; | |
1da177e4 LT |
444 | break; |
445 | } | |
8cefc107 DH |
446 | |
447 | tail = pipe->tail; | |
448 | if (!pipe_full(head, tail, max_usage)) { | |
449 | struct pipe_buffer *buf = &pipe->bufs[head & mask]; | |
923f4f23 | 450 | struct page *page = pipe->tmp_page; |
f0d1bec9 | 451 | int copied; |
1da177e4 LT |
452 | |
453 | if (!page) { | |
d86133bd | 454 | page = alloc_page(GFP_HIGHUSER | __GFP_ACCOUNT); |
1da177e4 LT |
455 | if (unlikely(!page)) { |
456 | ret = ret ? : -ENOMEM; | |
457 | break; | |
458 | } | |
923f4f23 | 459 | pipe->tmp_page = page; |
1da177e4 | 460 | } |
341b446b | 461 | /* Always wake up, even if the copy fails. Otherwise |
1da177e4 LT |
462 | * we lock up (O_NONBLOCK-)readers that sleep due to |
463 | * syscall merging. | |
464 | * FIXME! Is this really true? | |
465 | */ | |
466 | do_wakeup = 1; | |
f0d1bec9 AV |
467 | copied = copy_page_from_iter(page, 0, PAGE_SIZE, from); |
468 | if (unlikely(copied < PAGE_SIZE && iov_iter_count(from))) { | |
341b446b | 469 | if (!ret) |
f0d1bec9 | 470 | ret = -EFAULT; |
1da177e4 LT |
471 | break; |
472 | } | |
f0d1bec9 | 473 | ret += copied; |
1da177e4 LT |
474 | |
475 | /* Insert it into the buffer array */ | |
476 | buf->page = page; | |
477 | buf->ops = &anon_pipe_buf_ops; | |
478 | buf->offset = 0; | |
f0d1bec9 | 479 | buf->len = copied; |
9883035a LT |
480 | buf->flags = 0; |
481 | if (is_packetized(filp)) { | |
482 | buf->ops = &packet_pipe_buf_ops; | |
483 | buf->flags = PIPE_BUF_FLAG_PACKET; | |
484 | } | |
8cefc107 DH |
485 | |
486 | head++; | |
487 | pipe->head = head; | |
923f4f23 | 488 | pipe->tmp_page = NULL; |
1da177e4 | 489 | |
f0d1bec9 | 490 | if (!iov_iter_count(from)) |
1da177e4 LT |
491 | break; |
492 | } | |
8cefc107 DH |
493 | |
494 | if (!pipe_full(head, tail, max_usage)) | |
1da177e4 | 495 | continue; |
8cefc107 DH |
496 | |
497 | /* Wait for buffer space to become available. */ | |
1da177e4 | 498 | if (filp->f_flags & O_NONBLOCK) { |
341b446b IM |
499 | if (!ret) |
500 | ret = -EAGAIN; | |
1da177e4 LT |
501 | break; |
502 | } | |
503 | if (signal_pending(current)) { | |
341b446b IM |
504 | if (!ret) |
505 | ret = -ERESTARTSYS; | |
1da177e4 LT |
506 | break; |
507 | } | |
508 | if (do_wakeup) { | |
a9a08845 | 509 | wake_up_interruptible_sync_poll(&pipe->wait, EPOLLIN | EPOLLRDNORM); |
923f4f23 | 510 | kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN); |
1da177e4 LT |
511 | do_wakeup = 0; |
512 | } | |
923f4f23 IM |
513 | pipe->waiting_writers++; |
514 | pipe_wait(pipe); | |
515 | pipe->waiting_writers--; | |
1da177e4 LT |
516 | } |
517 | out: | |
ebec73f4 | 518 | __pipe_unlock(pipe); |
1da177e4 | 519 | if (do_wakeup) { |
a9a08845 | 520 | wake_up_interruptible_sync_poll(&pipe->wait, EPOLLIN | EPOLLRDNORM); |
923f4f23 | 521 | kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN); |
1da177e4 | 522 | } |
7e775f46 | 523 | if (ret > 0 && sb_start_write_trylock(file_inode(filp)->i_sb)) { |
c3b2da31 JB |
524 | int err = file_update_time(filp); |
525 | if (err) | |
526 | ret = err; | |
7e775f46 | 527 | sb_end_write(file_inode(filp)->i_sb); |
c3b2da31 | 528 | } |
1da177e4 LT |
529 | return ret; |
530 | } | |
531 | ||
d59d0b1b | 532 | static long pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) |
1da177e4 | 533 | { |
de32ec4c | 534 | struct pipe_inode_info *pipe = filp->private_data; |
8cefc107 | 535 | int count, head, tail, mask; |
1da177e4 LT |
536 | |
537 | switch (cmd) { | |
538 | case FIONREAD: | |
ebec73f4 | 539 | __pipe_lock(pipe); |
1da177e4 | 540 | count = 0; |
8cefc107 DH |
541 | head = pipe->head; |
542 | tail = pipe->tail; | |
543 | mask = pipe->ring_size - 1; | |
544 | ||
545 | while (tail != head) { | |
546 | count += pipe->bufs[tail & mask].len; | |
547 | tail++; | |
1da177e4 | 548 | } |
ebec73f4 | 549 | __pipe_unlock(pipe); |
923f4f23 | 550 | |
1da177e4 LT |
551 | return put_user(count, (int __user *)arg); |
552 | default: | |
46ce341b | 553 | return -ENOIOCTLCMD; |
1da177e4 LT |
554 | } |
555 | } | |
556 | ||
dd67081b | 557 | /* No kernel lock held - fine */ |
a11e1d43 LT |
558 | static __poll_t |
559 | pipe_poll(struct file *filp, poll_table *wait) | |
dd67081b | 560 | { |
a11e1d43 | 561 | __poll_t mask; |
dd67081b | 562 | struct pipe_inode_info *pipe = filp->private_data; |
8cefc107 DH |
563 | unsigned int head = READ_ONCE(pipe->head); |
564 | unsigned int tail = READ_ONCE(pipe->tail); | |
a11e1d43 LT |
565 | |
566 | poll_wait(filp, &pipe->wait, wait); | |
1da177e4 | 567 | |
8cefc107 DH |
568 | BUG_ON(pipe_occupancy(head, tail) > pipe->ring_size); |
569 | ||
1da177e4 | 570 | /* Reading only -- no need for acquiring the semaphore. */ |
a11e1d43 | 571 | mask = 0; |
1da177e4 | 572 | if (filp->f_mode & FMODE_READ) { |
8cefc107 DH |
573 | if (!pipe_empty(head, tail)) |
574 | mask |= EPOLLIN | EPOLLRDNORM; | |
923f4f23 | 575 | if (!pipe->writers && filp->f_version != pipe->w_counter) |
a9a08845 | 576 | mask |= EPOLLHUP; |
1da177e4 LT |
577 | } |
578 | ||
579 | if (filp->f_mode & FMODE_WRITE) { | |
6718b6f8 | 580 | if (!pipe_full(head, tail, pipe->max_usage)) |
8cefc107 | 581 | mask |= EPOLLOUT | EPOLLWRNORM; |
5e5d7a22 | 582 | /* |
a9a08845 | 583 | * Most Unices do not set EPOLLERR for FIFOs but on Linux they |
5e5d7a22 PE |
584 | * behave exactly like pipes for poll(). |
585 | */ | |
923f4f23 | 586 | if (!pipe->readers) |
a9a08845 | 587 | mask |= EPOLLERR; |
1da177e4 LT |
588 | } |
589 | ||
590 | return mask; | |
591 | } | |
592 | ||
b0d8d229 LT |
593 | static void put_pipe_info(struct inode *inode, struct pipe_inode_info *pipe) |
594 | { | |
595 | int kill = 0; | |
596 | ||
597 | spin_lock(&inode->i_lock); | |
598 | if (!--pipe->files) { | |
599 | inode->i_pipe = NULL; | |
600 | kill = 1; | |
601 | } | |
602 | spin_unlock(&inode->i_lock); | |
603 | ||
604 | if (kill) | |
605 | free_pipe_info(pipe); | |
606 | } | |
607 | ||
1da177e4 | 608 | static int |
599a0ac1 | 609 | pipe_release(struct inode *inode, struct file *file) |
1da177e4 | 610 | { |
b0d8d229 | 611 | struct pipe_inode_info *pipe = file->private_data; |
923f4f23 | 612 | |
ebec73f4 | 613 | __pipe_lock(pipe); |
599a0ac1 AV |
614 | if (file->f_mode & FMODE_READ) |
615 | pipe->readers--; | |
616 | if (file->f_mode & FMODE_WRITE) | |
617 | pipe->writers--; | |
341b446b | 618 | |
ba5bb147 | 619 | if (pipe->readers || pipe->writers) { |
a9a08845 | 620 | wake_up_interruptible_sync_poll(&pipe->wait, EPOLLIN | EPOLLOUT | EPOLLRDNORM | EPOLLWRNORM | EPOLLERR | EPOLLHUP); |
923f4f23 IM |
621 | kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN); |
622 | kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT); | |
1da177e4 | 623 | } |
ebec73f4 | 624 | __pipe_unlock(pipe); |
ba5bb147 | 625 | |
b0d8d229 | 626 | put_pipe_info(inode, pipe); |
1da177e4 LT |
627 | return 0; |
628 | } | |
629 | ||
630 | static int | |
599a0ac1 | 631 | pipe_fasync(int fd, struct file *filp, int on) |
1da177e4 | 632 | { |
de32ec4c | 633 | struct pipe_inode_info *pipe = filp->private_data; |
599a0ac1 | 634 | int retval = 0; |
1da177e4 | 635 | |
ebec73f4 | 636 | __pipe_lock(pipe); |
599a0ac1 AV |
637 | if (filp->f_mode & FMODE_READ) |
638 | retval = fasync_helper(fd, filp, on, &pipe->fasync_readers); | |
639 | if ((filp->f_mode & FMODE_WRITE) && retval >= 0) { | |
341b446b | 640 | retval = fasync_helper(fd, filp, on, &pipe->fasync_writers); |
599a0ac1 AV |
641 | if (retval < 0 && (filp->f_mode & FMODE_READ)) |
642 | /* this can happen only if on == T */ | |
e5bc49ba ON |
643 | fasync_helper(-1, filp, 0, &pipe->fasync_readers); |
644 | } | |
ebec73f4 | 645 | __pipe_unlock(pipe); |
60aa4924 | 646 | return retval; |
1da177e4 LT |
647 | } |
648 | ||
9c87bcf0 | 649 | static unsigned long account_pipe_buffers(struct user_struct *user, |
759c0114 WT |
650 | unsigned long old, unsigned long new) |
651 | { | |
9c87bcf0 | 652 | return atomic_long_add_return(new - old, &user->pipe_bufs); |
759c0114 WT |
653 | } |
654 | ||
9c87bcf0 | 655 | static bool too_many_pipe_buffers_soft(unsigned long user_bufs) |
759c0114 | 656 | { |
f7340761 EB |
657 | unsigned long soft_limit = READ_ONCE(pipe_user_pages_soft); |
658 | ||
659 | return soft_limit && user_bufs > soft_limit; | |
759c0114 WT |
660 | } |
661 | ||
9c87bcf0 | 662 | static bool too_many_pipe_buffers_hard(unsigned long user_bufs) |
759c0114 | 663 | { |
f7340761 EB |
664 | unsigned long hard_limit = READ_ONCE(pipe_user_pages_hard); |
665 | ||
666 | return hard_limit && user_bufs > hard_limit; | |
759c0114 WT |
667 | } |
668 | ||
85c2dd54 EB |
669 | static bool is_unprivileged_user(void) |
670 | { | |
671 | return !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN); | |
672 | } | |
673 | ||
7bee130e | 674 | struct pipe_inode_info *alloc_pipe_info(void) |
3a326a2c | 675 | { |
923f4f23 | 676 | struct pipe_inode_info *pipe; |
09b4d199 MK |
677 | unsigned long pipe_bufs = PIPE_DEF_BUFFERS; |
678 | struct user_struct *user = get_current_user(); | |
9c87bcf0 | 679 | unsigned long user_bufs; |
f7340761 | 680 | unsigned int max_size = READ_ONCE(pipe_max_size); |
3a326a2c | 681 | |
d86133bd | 682 | pipe = kzalloc(sizeof(struct pipe_inode_info), GFP_KERNEL_ACCOUNT); |
09b4d199 MK |
683 | if (pipe == NULL) |
684 | goto out_free_uid; | |
685 | ||
f7340761 EB |
686 | if (pipe_bufs * PAGE_SIZE > max_size && !capable(CAP_SYS_RESOURCE)) |
687 | pipe_bufs = max_size >> PAGE_SHIFT; | |
086e774a | 688 | |
9c87bcf0 | 689 | user_bufs = account_pipe_buffers(user, 0, pipe_bufs); |
a005ca0e | 690 | |
85c2dd54 | 691 | if (too_many_pipe_buffers_soft(user_bufs) && is_unprivileged_user()) { |
9c87bcf0 | 692 | user_bufs = account_pipe_buffers(user, pipe_bufs, 1); |
a005ca0e | 693 | pipe_bufs = 1; |
09b4d199 | 694 | } |
759c0114 | 695 | |
85c2dd54 | 696 | if (too_many_pipe_buffers_hard(user_bufs) && is_unprivileged_user()) |
a005ca0e MK |
697 | goto out_revert_acct; |
698 | ||
699 | pipe->bufs = kcalloc(pipe_bufs, sizeof(struct pipe_buffer), | |
700 | GFP_KERNEL_ACCOUNT); | |
701 | ||
09b4d199 MK |
702 | if (pipe->bufs) { |
703 | init_waitqueue_head(&pipe->wait); | |
704 | pipe->r_counter = pipe->w_counter = 1; | |
6718b6f8 | 705 | pipe->max_usage = pipe_bufs; |
8cefc107 | 706 | pipe->ring_size = pipe_bufs; |
09b4d199 | 707 | pipe->user = user; |
09b4d199 MK |
708 | mutex_init(&pipe->mutex); |
709 | return pipe; | |
3a326a2c IM |
710 | } |
711 | ||
a005ca0e | 712 | out_revert_acct: |
9c87bcf0 | 713 | (void) account_pipe_buffers(user, pipe_bufs, 0); |
09b4d199 MK |
714 | kfree(pipe); |
715 | out_free_uid: | |
716 | free_uid(user); | |
35f3d14d | 717 | return NULL; |
3a326a2c IM |
718 | } |
719 | ||
4b8a8f1e | 720 | void free_pipe_info(struct pipe_inode_info *pipe) |
1da177e4 LT |
721 | { |
722 | int i; | |
1da177e4 | 723 | |
8cefc107 | 724 | (void) account_pipe_buffers(pipe->user, pipe->ring_size, 0); |
759c0114 | 725 | free_uid(pipe->user); |
8cefc107 | 726 | for (i = 0; i < pipe->ring_size; i++) { |
923f4f23 | 727 | struct pipe_buffer *buf = pipe->bufs + i; |
1da177e4 | 728 | if (buf->ops) |
a779638c | 729 | pipe_buf_release(pipe, buf); |
1da177e4 | 730 | } |
923f4f23 IM |
731 | if (pipe->tmp_page) |
732 | __free_page(pipe->tmp_page); | |
35f3d14d | 733 | kfree(pipe->bufs); |
923f4f23 | 734 | kfree(pipe); |
1da177e4 LT |
735 | } |
736 | ||
fa3536cc | 737 | static struct vfsmount *pipe_mnt __read_mostly; |
341b446b | 738 | |
c23fbb6b ED |
739 | /* |
740 | * pipefs_dname() is called from d_path(). | |
741 | */ | |
742 | static char *pipefs_dname(struct dentry *dentry, char *buffer, int buflen) | |
743 | { | |
744 | return dynamic_dname(dentry, buffer, buflen, "pipe:[%lu]", | |
75c3cfa8 | 745 | d_inode(dentry)->i_ino); |
c23fbb6b ED |
746 | } |
747 | ||
3ba13d17 | 748 | static const struct dentry_operations pipefs_dentry_operations = { |
c23fbb6b | 749 | .d_dname = pipefs_dname, |
1da177e4 LT |
750 | }; |
751 | ||
752 | static struct inode * get_pipe_inode(void) | |
753 | { | |
a209dfc7 | 754 | struct inode *inode = new_inode_pseudo(pipe_mnt->mnt_sb); |
923f4f23 | 755 | struct pipe_inode_info *pipe; |
1da177e4 LT |
756 | |
757 | if (!inode) | |
758 | goto fail_inode; | |
759 | ||
85fe4025 CH |
760 | inode->i_ino = get_next_ino(); |
761 | ||
7bee130e | 762 | pipe = alloc_pipe_info(); |
923f4f23 | 763 | if (!pipe) |
1da177e4 | 764 | goto fail_iput; |
3a326a2c | 765 | |
ba5bb147 AV |
766 | inode->i_pipe = pipe; |
767 | pipe->files = 2; | |
923f4f23 | 768 | pipe->readers = pipe->writers = 1; |
599a0ac1 | 769 | inode->i_fop = &pipefifo_fops; |
1da177e4 LT |
770 | |
771 | /* | |
772 | * Mark the inode dirty from the very beginning, | |
773 | * that way it will never be moved to the dirty | |
774 | * list because "mark_inode_dirty()" will think | |
775 | * that it already _is_ on the dirty list. | |
776 | */ | |
777 | inode->i_state = I_DIRTY; | |
778 | inode->i_mode = S_IFIFO | S_IRUSR | S_IWUSR; | |
da9592ed DH |
779 | inode->i_uid = current_fsuid(); |
780 | inode->i_gid = current_fsgid(); | |
078cd827 | 781 | inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode); |
923f4f23 | 782 | |
1da177e4 LT |
783 | return inode; |
784 | ||
785 | fail_iput: | |
786 | iput(inode); | |
341b446b | 787 | |
1da177e4 LT |
788 | fail_inode: |
789 | return NULL; | |
790 | } | |
791 | ||
e4fad8e5 | 792 | int create_pipe_files(struct file **res, int flags) |
1da177e4 | 793 | { |
e4fad8e5 | 794 | struct inode *inode = get_pipe_inode(); |
d6cbd281 | 795 | struct file *f; |
1da177e4 | 796 | |
1da177e4 | 797 | if (!inode) |
e4fad8e5 | 798 | return -ENFILE; |
1da177e4 | 799 | |
152b6372 AV |
800 | f = alloc_file_pseudo(inode, pipe_mnt, "", |
801 | O_WRONLY | (flags & (O_NONBLOCK | O_DIRECT)), | |
802 | &pipefifo_fops); | |
e9bb1f9b | 803 | if (IS_ERR(f)) { |
152b6372 AV |
804 | free_pipe_info(inode->i_pipe); |
805 | iput(inode); | |
806 | return PTR_ERR(f); | |
e9bb1f9b | 807 | } |
341b446b | 808 | |
de32ec4c | 809 | f->private_data = inode->i_pipe; |
d6cbd281 | 810 | |
183266f2 AV |
811 | res[0] = alloc_file_clone(f, O_RDONLY | (flags & O_NONBLOCK), |
812 | &pipefifo_fops); | |
e9bb1f9b | 813 | if (IS_ERR(res[0])) { |
b10a4a9f AV |
814 | put_pipe_info(inode, inode->i_pipe); |
815 | fput(f); | |
816 | return PTR_ERR(res[0]); | |
e9bb1f9b | 817 | } |
de32ec4c | 818 | res[0]->private_data = inode->i_pipe; |
e4fad8e5 AV |
819 | res[1] = f; |
820 | return 0; | |
d6cbd281 AK |
821 | } |
822 | ||
5b249b1b | 823 | static int __do_pipe_flags(int *fd, struct file **files, int flags) |
d6cbd281 | 824 | { |
d6cbd281 AK |
825 | int error; |
826 | int fdw, fdr; | |
827 | ||
9883035a | 828 | if (flags & ~(O_CLOEXEC | O_NONBLOCK | O_DIRECT)) |
ed8cae8b UD |
829 | return -EINVAL; |
830 | ||
e4fad8e5 AV |
831 | error = create_pipe_files(files, flags); |
832 | if (error) | |
833 | return error; | |
d6cbd281 | 834 | |
ed8cae8b | 835 | error = get_unused_fd_flags(flags); |
d6cbd281 AK |
836 | if (error < 0) |
837 | goto err_read_pipe; | |
838 | fdr = error; | |
839 | ||
ed8cae8b | 840 | error = get_unused_fd_flags(flags); |
d6cbd281 AK |
841 | if (error < 0) |
842 | goto err_fdr; | |
843 | fdw = error; | |
844 | ||
157cf649 | 845 | audit_fd_pair(fdr, fdw); |
d6cbd281 AK |
846 | fd[0] = fdr; |
847 | fd[1] = fdw; | |
d6cbd281 AK |
848 | return 0; |
849 | ||
850 | err_fdr: | |
851 | put_unused_fd(fdr); | |
852 | err_read_pipe: | |
e4fad8e5 AV |
853 | fput(files[0]); |
854 | fput(files[1]); | |
d6cbd281 | 855 | return error; |
1da177e4 LT |
856 | } |
857 | ||
5b249b1b AV |
858 | int do_pipe_flags(int *fd, int flags) |
859 | { | |
860 | struct file *files[2]; | |
861 | int error = __do_pipe_flags(fd, files, flags); | |
862 | if (!error) { | |
863 | fd_install(fd[0], files[0]); | |
864 | fd_install(fd[1], files[1]); | |
865 | } | |
866 | return error; | |
867 | } | |
868 | ||
d35c7b0e UD |
869 | /* |
870 | * sys_pipe() is the normal C calling standard for creating | |
871 | * a pipe. It's not the way Unix traditionally does this, though. | |
872 | */ | |
0a216dd1 | 873 | static int do_pipe2(int __user *fildes, int flags) |
d35c7b0e | 874 | { |
5b249b1b | 875 | struct file *files[2]; |
d35c7b0e UD |
876 | int fd[2]; |
877 | int error; | |
878 | ||
5b249b1b | 879 | error = __do_pipe_flags(fd, files, flags); |
d35c7b0e | 880 | if (!error) { |
5b249b1b AV |
881 | if (unlikely(copy_to_user(fildes, fd, sizeof(fd)))) { |
882 | fput(files[0]); | |
883 | fput(files[1]); | |
884 | put_unused_fd(fd[0]); | |
885 | put_unused_fd(fd[1]); | |
d35c7b0e | 886 | error = -EFAULT; |
5b249b1b AV |
887 | } else { |
888 | fd_install(fd[0], files[0]); | |
889 | fd_install(fd[1], files[1]); | |
ba719bae | 890 | } |
d35c7b0e UD |
891 | } |
892 | return error; | |
893 | } | |
894 | ||
0a216dd1 DB |
895 | SYSCALL_DEFINE2(pipe2, int __user *, fildes, int, flags) |
896 | { | |
897 | return do_pipe2(fildes, flags); | |
898 | } | |
899 | ||
2b664219 | 900 | SYSCALL_DEFINE1(pipe, int __user *, fildes) |
ed8cae8b | 901 | { |
0a216dd1 | 902 | return do_pipe2(fildes, 0); |
ed8cae8b UD |
903 | } |
904 | ||
fc7478a2 | 905 | static int wait_for_partner(struct pipe_inode_info *pipe, unsigned int *cnt) |
f776c738 | 906 | { |
8cefc107 | 907 | int cur = *cnt; |
f776c738 AV |
908 | |
909 | while (cur == *cnt) { | |
fc7478a2 | 910 | pipe_wait(pipe); |
f776c738 AV |
911 | if (signal_pending(current)) |
912 | break; | |
913 | } | |
914 | return cur == *cnt ? -ERESTARTSYS : 0; | |
915 | } | |
916 | ||
fc7478a2 | 917 | static void wake_up_partner(struct pipe_inode_info *pipe) |
f776c738 | 918 | { |
fc7478a2 | 919 | wake_up_interruptible(&pipe->wait); |
f776c738 AV |
920 | } |
921 | ||
922 | static int fifo_open(struct inode *inode, struct file *filp) | |
923 | { | |
924 | struct pipe_inode_info *pipe; | |
599a0ac1 | 925 | bool is_pipe = inode->i_sb->s_magic == PIPEFS_MAGIC; |
f776c738 AV |
926 | int ret; |
927 | ||
ba5bb147 AV |
928 | filp->f_version = 0; |
929 | ||
930 | spin_lock(&inode->i_lock); | |
931 | if (inode->i_pipe) { | |
932 | pipe = inode->i_pipe; | |
933 | pipe->files++; | |
934 | spin_unlock(&inode->i_lock); | |
935 | } else { | |
936 | spin_unlock(&inode->i_lock); | |
7bee130e | 937 | pipe = alloc_pipe_info(); |
f776c738 | 938 | if (!pipe) |
ba5bb147 AV |
939 | return -ENOMEM; |
940 | pipe->files = 1; | |
941 | spin_lock(&inode->i_lock); | |
942 | if (unlikely(inode->i_pipe)) { | |
943 | inode->i_pipe->files++; | |
944 | spin_unlock(&inode->i_lock); | |
4b8a8f1e | 945 | free_pipe_info(pipe); |
ba5bb147 AV |
946 | pipe = inode->i_pipe; |
947 | } else { | |
948 | inode->i_pipe = pipe; | |
949 | spin_unlock(&inode->i_lock); | |
950 | } | |
f776c738 | 951 | } |
de32ec4c | 952 | filp->private_data = pipe; |
ba5bb147 AV |
953 | /* OK, we have a pipe and it's pinned down */ |
954 | ||
ebec73f4 | 955 | __pipe_lock(pipe); |
f776c738 AV |
956 | |
957 | /* We can only do regular read/write on fifos */ | |
958 | filp->f_mode &= (FMODE_READ | FMODE_WRITE); | |
959 | ||
960 | switch (filp->f_mode) { | |
961 | case FMODE_READ: | |
962 | /* | |
963 | * O_RDONLY | |
964 | * POSIX.1 says that O_NONBLOCK means return with the FIFO | |
965 | * opened, even when there is no process writing the FIFO. | |
966 | */ | |
f776c738 AV |
967 | pipe->r_counter++; |
968 | if (pipe->readers++ == 0) | |
fc7478a2 | 969 | wake_up_partner(pipe); |
f776c738 | 970 | |
599a0ac1 | 971 | if (!is_pipe && !pipe->writers) { |
f776c738 | 972 | if ((filp->f_flags & O_NONBLOCK)) { |
a9a08845 | 973 | /* suppress EPOLLHUP until we have |
f776c738 AV |
974 | * seen a writer */ |
975 | filp->f_version = pipe->w_counter; | |
976 | } else { | |
fc7478a2 | 977 | if (wait_for_partner(pipe, &pipe->w_counter)) |
f776c738 AV |
978 | goto err_rd; |
979 | } | |
980 | } | |
981 | break; | |
8cefc107 | 982 | |
f776c738 AV |
983 | case FMODE_WRITE: |
984 | /* | |
985 | * O_WRONLY | |
986 | * POSIX.1 says that O_NONBLOCK means return -1 with | |
987 | * errno=ENXIO when there is no process reading the FIFO. | |
988 | */ | |
989 | ret = -ENXIO; | |
599a0ac1 | 990 | if (!is_pipe && (filp->f_flags & O_NONBLOCK) && !pipe->readers) |
f776c738 AV |
991 | goto err; |
992 | ||
f776c738 AV |
993 | pipe->w_counter++; |
994 | if (!pipe->writers++) | |
fc7478a2 | 995 | wake_up_partner(pipe); |
f776c738 | 996 | |
599a0ac1 | 997 | if (!is_pipe && !pipe->readers) { |
fc7478a2 | 998 | if (wait_for_partner(pipe, &pipe->r_counter)) |
f776c738 AV |
999 | goto err_wr; |
1000 | } | |
1001 | break; | |
8cefc107 | 1002 | |
f776c738 AV |
1003 | case FMODE_READ | FMODE_WRITE: |
1004 | /* | |
1005 | * O_RDWR | |
1006 | * POSIX.1 leaves this case "undefined" when O_NONBLOCK is set. | |
1007 | * This implementation will NEVER block on a O_RDWR open, since | |
1008 | * the process can at least talk to itself. | |
1009 | */ | |
f776c738 AV |
1010 | |
1011 | pipe->readers++; | |
1012 | pipe->writers++; | |
1013 | pipe->r_counter++; | |
1014 | pipe->w_counter++; | |
1015 | if (pipe->readers == 1 || pipe->writers == 1) | |
fc7478a2 | 1016 | wake_up_partner(pipe); |
f776c738 AV |
1017 | break; |
1018 | ||
1019 | default: | |
1020 | ret = -EINVAL; | |
1021 | goto err; | |
1022 | } | |
1023 | ||
1024 | /* Ok! */ | |
ebec73f4 | 1025 | __pipe_unlock(pipe); |
f776c738 AV |
1026 | return 0; |
1027 | ||
1028 | err_rd: | |
1029 | if (!--pipe->readers) | |
1030 | wake_up_interruptible(&pipe->wait); | |
1031 | ret = -ERESTARTSYS; | |
1032 | goto err; | |
1033 | ||
1034 | err_wr: | |
1035 | if (!--pipe->writers) | |
1036 | wake_up_interruptible(&pipe->wait); | |
1037 | ret = -ERESTARTSYS; | |
1038 | goto err; | |
1039 | ||
1040 | err: | |
ebec73f4 | 1041 | __pipe_unlock(pipe); |
b0d8d229 LT |
1042 | |
1043 | put_pipe_info(inode, pipe); | |
f776c738 AV |
1044 | return ret; |
1045 | } | |
1046 | ||
599a0ac1 AV |
1047 | const struct file_operations pipefifo_fops = { |
1048 | .open = fifo_open, | |
1049 | .llseek = no_llseek, | |
fb9096a3 | 1050 | .read_iter = pipe_read, |
f0d1bec9 | 1051 | .write_iter = pipe_write, |
a11e1d43 | 1052 | .poll = pipe_poll, |
599a0ac1 AV |
1053 | .unlocked_ioctl = pipe_ioctl, |
1054 | .release = pipe_release, | |
1055 | .fasync = pipe_fasync, | |
f776c738 AV |
1056 | }; |
1057 | ||
f491bd71 MK |
1058 | /* |
1059 | * Currently we rely on the pipe array holding a power-of-2 number | |
d3f14c48 | 1060 | * of pages. Returns 0 on error. |
f491bd71 | 1061 | */ |
96e99be4 | 1062 | unsigned int round_pipe_size(unsigned long size) |
f491bd71 | 1063 | { |
c4fed5a9 | 1064 | if (size > (1U << 31)) |
96e99be4 EB |
1065 | return 0; |
1066 | ||
4c2e4bef EB |
1067 | /* Minimum pipe size, as required by POSIX */ |
1068 | if (size < PAGE_SIZE) | |
c4fed5a9 | 1069 | return PAGE_SIZE; |
d3f14c48 | 1070 | |
c4fed5a9 | 1071 | return roundup_pow_of_two(size); |
f491bd71 MK |
1072 | } |
1073 | ||
35f3d14d JA |
1074 | /* |
1075 | * Allocate a new array of pipe buffers and copy the info over. Returns the | |
1076 | * pipe size if successful, or return -ERROR on error. | |
1077 | */ | |
d37d4166 | 1078 | static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) |
35f3d14d JA |
1079 | { |
1080 | struct pipe_buffer *bufs; | |
8cefc107 | 1081 | unsigned int size, nr_slots, head, tail, mask, n; |
9c87bcf0 | 1082 | unsigned long user_bufs; |
b0b91d18 | 1083 | long ret = 0; |
d37d4166 MK |
1084 | |
1085 | size = round_pipe_size(arg); | |
8cefc107 | 1086 | nr_slots = size >> PAGE_SHIFT; |
d37d4166 | 1087 | |
8cefc107 | 1088 | if (!nr_slots) |
d37d4166 MK |
1089 | return -EINVAL; |
1090 | ||
b0b91d18 MK |
1091 | /* |
1092 | * If trying to increase the pipe capacity, check that an | |
1093 | * unprivileged user is not trying to exceed various limits | |
1094 | * (soft limit check here, hard limit check just below). | |
1095 | * Decreasing the pipe capacity is always permitted, even | |
1096 | * if the user is currently over a limit. | |
1097 | */ | |
8cefc107 | 1098 | if (nr_slots > pipe->ring_size && |
b0b91d18 | 1099 | size > pipe_max_size && !capable(CAP_SYS_RESOURCE)) |
d37d4166 MK |
1100 | return -EPERM; |
1101 | ||
8cefc107 | 1102 | user_bufs = account_pipe_buffers(pipe->user, pipe->ring_size, nr_slots); |
b0b91d18 | 1103 | |
8cefc107 | 1104 | if (nr_slots > pipe->ring_size && |
9c87bcf0 MK |
1105 | (too_many_pipe_buffers_hard(user_bufs) || |
1106 | too_many_pipe_buffers_soft(user_bufs)) && | |
85c2dd54 | 1107 | is_unprivileged_user()) { |
b0b91d18 MK |
1108 | ret = -EPERM; |
1109 | goto out_revert_acct; | |
1110 | } | |
35f3d14d | 1111 | |
35f3d14d | 1112 | /* |
8cefc107 DH |
1113 | * We can shrink the pipe, if arg is greater than the ring occupancy. |
1114 | * Since we don't expect a lot of shrink+grow operations, just free and | |
1115 | * allocate again like we would do for growing. If the pipe currently | |
35f3d14d JA |
1116 | * contains more buffers than arg, then return busy. |
1117 | */ | |
8cefc107 DH |
1118 | mask = pipe->ring_size - 1; |
1119 | head = pipe->head; | |
1120 | tail = pipe->tail; | |
1121 | n = pipe_occupancy(pipe->head, pipe->tail); | |
1122 | if (nr_slots < n) { | |
b0b91d18 MK |
1123 | ret = -EBUSY; |
1124 | goto out_revert_acct; | |
1125 | } | |
35f3d14d | 1126 | |
8cefc107 | 1127 | bufs = kcalloc(nr_slots, sizeof(*bufs), |
d86133bd | 1128 | GFP_KERNEL_ACCOUNT | __GFP_NOWARN); |
b0b91d18 MK |
1129 | if (unlikely(!bufs)) { |
1130 | ret = -ENOMEM; | |
1131 | goto out_revert_acct; | |
1132 | } | |
35f3d14d JA |
1133 | |
1134 | /* | |
1135 | * The pipe array wraps around, so just start the new one at zero | |
8cefc107 | 1136 | * and adjust the indices. |
35f3d14d | 1137 | */ |
8cefc107 DH |
1138 | if (n > 0) { |
1139 | unsigned int h = head & mask; | |
1140 | unsigned int t = tail & mask; | |
1141 | if (h > t) { | |
1142 | memcpy(bufs, pipe->bufs + t, | |
1143 | n * sizeof(struct pipe_buffer)); | |
1144 | } else { | |
1145 | unsigned int tsize = pipe->ring_size - t; | |
1146 | if (h > 0) | |
1147 | memcpy(bufs + tsize, pipe->bufs, | |
1148 | h * sizeof(struct pipe_buffer)); | |
1149 | memcpy(bufs, pipe->bufs + t, | |
1150 | tsize * sizeof(struct pipe_buffer)); | |
1151 | } | |
35f3d14d JA |
1152 | } |
1153 | ||
8cefc107 DH |
1154 | head = n; |
1155 | tail = 0; | |
1156 | ||
35f3d14d JA |
1157 | kfree(pipe->bufs); |
1158 | pipe->bufs = bufs; | |
8cefc107 | 1159 | pipe->ring_size = nr_slots; |
6718b6f8 | 1160 | pipe->max_usage = nr_slots; |
8cefc107 DH |
1161 | pipe->tail = tail; |
1162 | pipe->head = head; | |
6718b6f8 | 1163 | return pipe->max_usage * PAGE_SIZE; |
b0b91d18 MK |
1164 | |
1165 | out_revert_acct: | |
8cefc107 | 1166 | (void) account_pipe_buffers(pipe->user, nr_slots, pipe->ring_size); |
b0b91d18 | 1167 | return ret; |
35f3d14d JA |
1168 | } |
1169 | ||
72083646 LT |
1170 | /* |
1171 | * After the inode slimming patch, i_pipe/i_bdev/i_cdev share the same | |
1172 | * location, so checking ->i_pipe is not enough to verify that this is a | |
1173 | * pipe. | |
1174 | */ | |
1175 | struct pipe_inode_info *get_pipe_info(struct file *file) | |
1176 | { | |
de32ec4c | 1177 | return file->f_op == &pipefifo_fops ? file->private_data : NULL; |
72083646 LT |
1178 | } |
1179 | ||
35f3d14d JA |
1180 | long pipe_fcntl(struct file *file, unsigned int cmd, unsigned long arg) |
1181 | { | |
1182 | struct pipe_inode_info *pipe; | |
1183 | long ret; | |
1184 | ||
c66fb347 | 1185 | pipe = get_pipe_info(file); |
35f3d14d JA |
1186 | if (!pipe) |
1187 | return -EBADF; | |
1188 | ||
ebec73f4 | 1189 | __pipe_lock(pipe); |
35f3d14d JA |
1190 | |
1191 | switch (cmd) { | |
d37d4166 MK |
1192 | case F_SETPIPE_SZ: |
1193 | ret = pipe_set_size(pipe, arg); | |
35f3d14d JA |
1194 | break; |
1195 | case F_GETPIPE_SZ: | |
6718b6f8 | 1196 | ret = pipe->max_usage * PAGE_SIZE; |
35f3d14d JA |
1197 | break; |
1198 | default: | |
1199 | ret = -EINVAL; | |
1200 | break; | |
1201 | } | |
1202 | ||
ebec73f4 | 1203 | __pipe_unlock(pipe); |
35f3d14d JA |
1204 | return ret; |
1205 | } | |
1206 | ||
ff0c7d15 NP |
1207 | static const struct super_operations pipefs_ops = { |
1208 | .destroy_inode = free_inode_nonrcu, | |
d70ef97b | 1209 | .statfs = simple_statfs, |
ff0c7d15 NP |
1210 | }; |
1211 | ||
1da177e4 LT |
1212 | /* |
1213 | * pipefs should _never_ be mounted by userland - too much of security hassle, | |
1214 | * no real gain from having the whole whorehouse mounted. So we don't need | |
1215 | * any operations on the root directory. However, we need a non-trivial | |
1216 | * d_name - pipe: will go nicely and kill the special-casing in procfs. | |
1217 | */ | |
4fa7ec5d DH |
1218 | |
1219 | static int pipefs_init_fs_context(struct fs_context *fc) | |
1da177e4 | 1220 | { |
4fa7ec5d DH |
1221 | struct pseudo_fs_context *ctx = init_pseudo(fc, PIPEFS_MAGIC); |
1222 | if (!ctx) | |
1223 | return -ENOMEM; | |
1224 | ctx->ops = &pipefs_ops; | |
1225 | ctx->dops = &pipefs_dentry_operations; | |
1226 | return 0; | |
1da177e4 LT |
1227 | } |
1228 | ||
1229 | static struct file_system_type pipe_fs_type = { | |
1230 | .name = "pipefs", | |
4fa7ec5d | 1231 | .init_fs_context = pipefs_init_fs_context, |
1da177e4 LT |
1232 | .kill_sb = kill_anon_super, |
1233 | }; | |
1234 | ||
1235 | static int __init init_pipe_fs(void) | |
1236 | { | |
1237 | int err = register_filesystem(&pipe_fs_type); | |
341b446b | 1238 | |
1da177e4 LT |
1239 | if (!err) { |
1240 | pipe_mnt = kern_mount(&pipe_fs_type); | |
1241 | if (IS_ERR(pipe_mnt)) { | |
1242 | err = PTR_ERR(pipe_mnt); | |
1243 | unregister_filesystem(&pipe_fs_type); | |
1244 | } | |
1245 | } | |
1246 | return err; | |
1247 | } | |
1248 | ||
1da177e4 | 1249 | fs_initcall(init_pipe_fs); |