1 // SPDX-License-Identifier: GPL-2.0
3 * linux/fs/read_write.c
5 * Copyright (C) 1991, 1992 Linus Torvalds
8 #include <linux/slab.h>
9 #include <linux/stat.h>
10 #include <linux/sched/xacct.h>
11 #include <linux/fcntl.h>
12 #include <linux/file.h>
13 #include <linux/uio.h>
14 #include <linux/fsnotify.h>
15 #include <linux/security.h>
16 #include <linux/export.h>
17 #include <linux/syscalls.h>
18 #include <linux/pagemap.h>
19 #include <linux/splice.h>
20 #include <linux/compat.h>
21 #include <linux/mount.h>
25 #include <linux/uaccess.h>
26 #include <asm/unistd.h>
28 const struct file_operations generic_ro_fops = {
29 .llseek = generic_file_llseek,
30 .read_iter = generic_file_read_iter,
31 .mmap = generic_file_readonly_mmap,
32 .splice_read = generic_file_splice_read,
35 EXPORT_SYMBOL(generic_ro_fops);
37 static inline bool unsigned_offsets(struct file *file)
39 return file->f_mode & FMODE_UNSIGNED_OFFSET;
43 * vfs_setpos - update the file offset for lseek
44 * @file: file structure in question
45 * @offset: file offset to seek to
46 * @maxsize: maximum file size
48 * This is a low-level filesystem helper for updating the file offset to
49 * the value specified by @offset if the given offset is valid and it is
50 * not equal to the current file offset.
52 * Return the specified offset on success and -EINVAL on invalid offset.
54 loff_t vfs_setpos(struct file *file, loff_t offset, loff_t maxsize)
56 if (offset < 0 && !unsigned_offsets(file))
61 if (offset != file->f_pos) {
67 EXPORT_SYMBOL(vfs_setpos);
70 * generic_file_llseek_size - generic llseek implementation for regular files
71 * @file: file structure to seek on
72 * @offset: file offset to seek to
73 * @whence: type of seek
74 * @size: max size of this file in file system
75 * @eof: offset used for SEEK_END position
77 * This is a variant of generic_file_llseek that allows passing in a custom
78 * maximum file size and a custom EOF position, for e.g. hashed directories
81 * SEEK_SET and SEEK_END are unsynchronized (but atomic on 64bit platforms)
82 * SEEK_CUR is synchronized against other SEEK_CURs, but not read/writes.
83 * read/writes behave like SEEK_SET against seeks.
86 generic_file_llseek_size(struct file *file, loff_t offset, int whence,
87 loff_t maxsize, loff_t eof)
95 * Here we special-case the lseek(fd, 0, SEEK_CUR)
96 * position-querying operation. Avoid rewriting the "same"
97 * f_pos value back to the file because a concurrent read(),
98 * write() or lseek() might have altered it
103 * f_lock protects against read/modify/write race with other
104 * SEEK_CURs. Note that parallel writes and reads behave
107 spin_lock(&file->f_lock);
108 offset = vfs_setpos(file, file->f_pos + offset, maxsize);
109 spin_unlock(&file->f_lock);
113 * In the generic case the entire file is data, so as long as
114 * offset isn't at the end of the file then the offset is data.
116 if ((unsigned long long)offset >= eof)
121 * There is a virtual hole at the end of the file, so as long as
122 * offset isn't i_size or larger, return i_size.
124 if ((unsigned long long)offset >= eof)
130 return vfs_setpos(file, offset, maxsize);
132 EXPORT_SYMBOL(generic_file_llseek_size);
135 * generic_file_llseek - generic llseek implementation for regular files
136 * @file: file structure to seek on
137 * @offset: file offset to seek to
138 * @whence: type of seek
140 * This is a generic implemenation of ->llseek useable for all normal local
141 * filesystems. It just updates the file offset to the value specified by
142 * @offset and @whence.
144 loff_t generic_file_llseek(struct file *file, loff_t offset, int whence)
146 struct inode *inode = file->f_mapping->host;
148 return generic_file_llseek_size(file, offset, whence,
149 inode->i_sb->s_maxbytes,
152 EXPORT_SYMBOL(generic_file_llseek);
155 * fixed_size_llseek - llseek implementation for fixed-sized devices
156 * @file: file structure to seek on
157 * @offset: file offset to seek to
158 * @whence: type of seek
159 * @size: size of the file
162 loff_t fixed_size_llseek(struct file *file, loff_t offset, int whence, loff_t size)
165 case SEEK_SET: case SEEK_CUR: case SEEK_END:
166 return generic_file_llseek_size(file, offset, whence,
172 EXPORT_SYMBOL(fixed_size_llseek);
175 * no_seek_end_llseek - llseek implementation for fixed-sized devices
176 * @file: file structure to seek on
177 * @offset: file offset to seek to
178 * @whence: type of seek
181 loff_t no_seek_end_llseek(struct file *file, loff_t offset, int whence)
184 case SEEK_SET: case SEEK_CUR:
185 return generic_file_llseek_size(file, offset, whence,
191 EXPORT_SYMBOL(no_seek_end_llseek);
194 * no_seek_end_llseek_size - llseek implementation for fixed-sized devices
195 * @file: file structure to seek on
196 * @offset: file offset to seek to
197 * @whence: type of seek
198 * @size: maximal offset allowed
201 loff_t no_seek_end_llseek_size(struct file *file, loff_t offset, int whence, loff_t size)
204 case SEEK_SET: case SEEK_CUR:
205 return generic_file_llseek_size(file, offset, whence,
211 EXPORT_SYMBOL(no_seek_end_llseek_size);
214 * noop_llseek - No Operation Performed llseek implementation
215 * @file: file structure to seek on
216 * @offset: file offset to seek to
217 * @whence: type of seek
219 * This is an implementation of ->llseek useable for the rare special case when
220 * userspace expects the seek to succeed but the (device) file is actually not
221 * able to perform the seek. In this case you use noop_llseek() instead of
222 * falling back to the default implementation of ->llseek.
224 loff_t noop_llseek(struct file *file, loff_t offset, int whence)
228 EXPORT_SYMBOL(noop_llseek);
230 loff_t no_llseek(struct file *file, loff_t offset, int whence)
234 EXPORT_SYMBOL(no_llseek);
236 loff_t default_llseek(struct file *file, loff_t offset, int whence)
238 struct inode *inode = file_inode(file);
244 offset += i_size_read(inode);
248 retval = file->f_pos;
251 offset += file->f_pos;
255 * In the generic case the entire file is data, so as
256 * long as offset isn't at the end of the file then the
259 if (offset >= inode->i_size) {
266 * There is a virtual hole at the end of the file, so
267 * as long as offset isn't i_size or larger, return
270 if (offset >= inode->i_size) {
274 offset = inode->i_size;
278 if (offset >= 0 || unsigned_offsets(file)) {
279 if (offset != file->f_pos) {
280 file->f_pos = offset;
289 EXPORT_SYMBOL(default_llseek);
291 loff_t vfs_llseek(struct file *file, loff_t offset, int whence)
293 loff_t (*fn)(struct file *, loff_t, int);
296 if (file->f_mode & FMODE_LSEEK) {
297 if (file->f_op->llseek)
298 fn = file->f_op->llseek;
300 return fn(file, offset, whence);
302 EXPORT_SYMBOL(vfs_llseek);
304 off_t ksys_lseek(unsigned int fd, off_t offset, unsigned int whence)
307 struct fd f = fdget_pos(fd);
312 if (whence <= SEEK_MAX) {
313 loff_t res = vfs_llseek(f.file, offset, whence);
315 if (res != (loff_t)retval)
316 retval = -EOVERFLOW; /* LFS: should only happen on 32 bit platforms */
322 SYSCALL_DEFINE3(lseek, unsigned int, fd, off_t, offset, unsigned int, whence)
324 return ksys_lseek(fd, offset, whence);
328 COMPAT_SYSCALL_DEFINE3(lseek, unsigned int, fd, compat_off_t, offset, unsigned int, whence)
330 return ksys_lseek(fd, offset, whence);
334 #if !defined(CONFIG_64BIT) || defined(CONFIG_COMPAT) || \
335 defined(__ARCH_WANT_SYS_LLSEEK)
336 SYSCALL_DEFINE5(llseek, unsigned int, fd, unsigned long, offset_high,
337 unsigned long, offset_low, loff_t __user *, result,
338 unsigned int, whence)
341 struct fd f = fdget_pos(fd);
348 if (whence > SEEK_MAX)
351 offset = vfs_llseek(f.file, ((loff_t) offset_high << 32) | offset_low,
354 retval = (int)offset;
357 if (!copy_to_user(result, &offset, sizeof(offset)))
366 int rw_verify_area(int read_write, struct file *file, const loff_t *ppos, size_t count)
369 int retval = -EINVAL;
371 inode = file_inode(file);
372 if (unlikely((ssize_t) count < 0))
376 * ranged mandatory locking does not apply to streams - it makes sense
377 * only for files where position has a meaning.
382 if (unlikely(pos < 0)) {
383 if (!unsigned_offsets(file))
385 if (count >= -pos) /* both values are in 0..LLONG_MAX */
387 } else if (unlikely((loff_t) (pos + count) < 0)) {
388 if (!unsigned_offsets(file))
392 if (unlikely(inode->i_flctx && mandatory_lock(inode))) {
393 retval = locks_mandatory_area(inode, file, pos, pos + count - 1,
394 read_write == READ ? F_RDLCK : F_WRLCK);
400 return security_file_permission(file,
401 read_write == READ ? MAY_READ : MAY_WRITE);
404 static ssize_t new_sync_read(struct file *filp, char __user *buf, size_t len, loff_t *ppos)
406 struct iovec iov = { .iov_base = buf, .iov_len = len };
408 struct iov_iter iter;
411 init_sync_kiocb(&kiocb, filp);
412 kiocb.ki_pos = (ppos ? *ppos : 0);
413 iov_iter_init(&iter, READ, &iov, 1, len);
415 ret = call_read_iter(filp, &kiocb, &iter);
416 BUG_ON(ret == -EIOCBQUEUED);
418 *ppos = kiocb.ki_pos;
422 ssize_t __vfs_read(struct file *file, char __user *buf, size_t count,
425 if (file->f_op->read)
426 return file->f_op->read(file, buf, count, pos);
427 else if (file->f_op->read_iter)
428 return new_sync_read(file, buf, count, pos);
433 ssize_t kernel_read(struct file *file, void *buf, size_t count, loff_t *pos)
440 /* The cast to a user pointer is valid due to the set_fs() */
441 result = vfs_read(file, (void __user *)buf, count, pos);
445 EXPORT_SYMBOL(kernel_read);
447 ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
451 if (!(file->f_mode & FMODE_READ))
453 if (!(file->f_mode & FMODE_CAN_READ))
455 if (unlikely(!access_ok(buf, count)))
458 ret = rw_verify_area(READ, file, pos, count);
460 if (count > MAX_RW_COUNT)
461 count = MAX_RW_COUNT;
462 ret = __vfs_read(file, buf, count, pos);
464 fsnotify_access(file);
465 add_rchar(current, ret);
473 static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
475 struct iovec iov = { .iov_base = (void __user *)buf, .iov_len = len };
477 struct iov_iter iter;
480 init_sync_kiocb(&kiocb, filp);
481 kiocb.ki_pos = (ppos ? *ppos : 0);
482 iov_iter_init(&iter, WRITE, &iov, 1, len);
484 ret = call_write_iter(filp, &kiocb, &iter);
485 BUG_ON(ret == -EIOCBQUEUED);
487 *ppos = kiocb.ki_pos;
491 static ssize_t __vfs_write(struct file *file, const char __user *p,
492 size_t count, loff_t *pos)
494 if (file->f_op->write)
495 return file->f_op->write(file, p, count, pos);
496 else if (file->f_op->write_iter)
497 return new_sync_write(file, p, count, pos);
502 ssize_t __kernel_write(struct file *file, const void *buf, size_t count, loff_t *pos)
505 const char __user *p;
508 if (WARN_ON_ONCE(!(file->f_mode & FMODE_WRITE)))
510 if (!(file->f_mode & FMODE_CAN_WRITE))
515 p = (__force const char __user *)buf;
516 if (count > MAX_RW_COUNT)
517 count = MAX_RW_COUNT;
518 ret = __vfs_write(file, p, count, pos);
521 fsnotify_modify(file);
522 add_wchar(current, ret);
528 ssize_t kernel_write(struct file *file, const void *buf, size_t count,
536 /* The cast to a user pointer is valid due to the set_fs() */
537 res = vfs_write(file, (__force const char __user *)buf, count, pos);
542 EXPORT_SYMBOL(kernel_write);
544 ssize_t vfs_write(struct file *file, const char __user *buf, size_t count, loff_t *pos)
548 if (!(file->f_mode & FMODE_WRITE))
550 if (!(file->f_mode & FMODE_CAN_WRITE))
552 if (unlikely(!access_ok(buf, count)))
555 ret = rw_verify_area(WRITE, file, pos, count);
557 if (count > MAX_RW_COUNT)
558 count = MAX_RW_COUNT;
559 file_start_write(file);
560 ret = __vfs_write(file, buf, count, pos);
562 fsnotify_modify(file);
563 add_wchar(current, ret);
566 file_end_write(file);
572 /* file_ppos returns &file->f_pos or NULL if file is stream */
573 static inline loff_t *file_ppos(struct file *file)
575 return file->f_mode & FMODE_STREAM ? NULL : &file->f_pos;
578 ssize_t ksys_read(unsigned int fd, char __user *buf, size_t count)
580 struct fd f = fdget_pos(fd);
581 ssize_t ret = -EBADF;
584 loff_t pos, *ppos = file_ppos(f.file);
589 ret = vfs_read(f.file, buf, count, ppos);
590 if (ret >= 0 && ppos)
597 SYSCALL_DEFINE3(read, unsigned int, fd, char __user *, buf, size_t, count)
599 return ksys_read(fd, buf, count);
602 ssize_t ksys_write(unsigned int fd, const char __user *buf, size_t count)
604 struct fd f = fdget_pos(fd);
605 ssize_t ret = -EBADF;
608 loff_t pos, *ppos = file_ppos(f.file);
613 ret = vfs_write(f.file, buf, count, ppos);
614 if (ret >= 0 && ppos)
622 SYSCALL_DEFINE3(write, unsigned int, fd, const char __user *, buf,
625 return ksys_write(fd, buf, count);
628 ssize_t ksys_pread64(unsigned int fd, char __user *buf, size_t count,
632 ssize_t ret = -EBADF;
640 if (f.file->f_mode & FMODE_PREAD)
641 ret = vfs_read(f.file, buf, count, &pos);
648 SYSCALL_DEFINE4(pread64, unsigned int, fd, char __user *, buf,
649 size_t, count, loff_t, pos)
651 return ksys_pread64(fd, buf, count, pos);
654 ssize_t ksys_pwrite64(unsigned int fd, const char __user *buf,
655 size_t count, loff_t pos)
658 ssize_t ret = -EBADF;
666 if (f.file->f_mode & FMODE_PWRITE)
667 ret = vfs_write(f.file, buf, count, &pos);
674 SYSCALL_DEFINE4(pwrite64, unsigned int, fd, const char __user *, buf,
675 size_t, count, loff_t, pos)
677 return ksys_pwrite64(fd, buf, count, pos);
680 static ssize_t do_iter_readv_writev(struct file *filp, struct iov_iter *iter,
681 loff_t *ppos, int type, rwf_t flags)
686 init_sync_kiocb(&kiocb, filp);
687 ret = kiocb_set_rw_flags(&kiocb, flags);
690 kiocb.ki_pos = (ppos ? *ppos : 0);
693 ret = call_read_iter(filp, &kiocb, iter);
695 ret = call_write_iter(filp, &kiocb, iter);
696 BUG_ON(ret == -EIOCBQUEUED);
698 *ppos = kiocb.ki_pos;
702 /* Do it by hand, with file-ops */
703 static ssize_t do_loop_readv_writev(struct file *filp, struct iov_iter *iter,
704 loff_t *ppos, int type, rwf_t flags)
708 if (flags & ~RWF_HIPRI)
711 while (iov_iter_count(iter)) {
712 struct iovec iovec = iov_iter_iovec(iter);
716 nr = filp->f_op->read(filp, iovec.iov_base,
717 iovec.iov_len, ppos);
719 nr = filp->f_op->write(filp, iovec.iov_base,
720 iovec.iov_len, ppos);
729 if (nr != iovec.iov_len)
731 iov_iter_advance(iter, nr);
738 * rw_copy_check_uvector() - Copy an array of &struct iovec from userspace
739 * into the kernel and check that it is valid.
741 * @type: One of %CHECK_IOVEC_ONLY, %READ, or %WRITE.
742 * @uvector: Pointer to the userspace array.
743 * @nr_segs: Number of elements in userspace array.
744 * @fast_segs: Number of elements in @fast_pointer.
745 * @fast_pointer: Pointer to (usually small on-stack) kernel array.
746 * @ret_pointer: (output parameter) Pointer to a variable that will point to
747 * either @fast_pointer, a newly allocated kernel array, or NULL,
748 * depending on which array was used.
750 * This function copies an array of &struct iovec of @nr_segs from
751 * userspace into the kernel and checks that each element is valid (e.g.
752 * it does not point to a kernel address or cause overflow by being too
755 * As an optimization, the caller may provide a pointer to a small
756 * on-stack array in @fast_pointer, typically %UIO_FASTIOV elements long
757 * (the size of this array, or 0 if unused, should be given in @fast_segs).
759 * @ret_pointer will always point to the array that was used, so the
760 * caller must take care not to call kfree() on it e.g. in case the
761 * @fast_pointer array was used and it was allocated on the stack.
763 * Return: The total number of bytes covered by the iovec array on success
764 * or a negative error code on error.
766 ssize_t rw_copy_check_uvector(int type, const struct iovec __user * uvector,
767 unsigned long nr_segs, unsigned long fast_segs,
768 struct iovec *fast_pointer,
769 struct iovec **ret_pointer)
773 struct iovec *iov = fast_pointer;
776 * SuS says "The readv() function *may* fail if the iovcnt argument
777 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
778 * traditionally returned zero for zero segments, so...
786 * First get the "struct iovec" from user memory and
787 * verify all the pointers
789 if (nr_segs > UIO_MAXIOV) {
793 if (nr_segs > fast_segs) {
794 iov = kmalloc_array(nr_segs, sizeof(struct iovec), GFP_KERNEL);
800 if (copy_from_user(iov, uvector, nr_segs*sizeof(*uvector))) {
806 * According to the Single Unix Specification we should return EINVAL
807 * if an element length is < 0 when cast to ssize_t or if the
808 * total length would overflow the ssize_t return value of the
811 * Linux caps all read/write calls to MAX_RW_COUNT, and avoids the
815 for (seg = 0; seg < nr_segs; seg++) {
816 void __user *buf = iov[seg].iov_base;
817 ssize_t len = (ssize_t)iov[seg].iov_len;
819 /* see if we we're about to use an invalid len or if
820 * it's about to overflow ssize_t */
826 && unlikely(!access_ok(buf, len))) {
830 if (len > MAX_RW_COUNT - ret) {
831 len = MAX_RW_COUNT - ret;
832 iov[seg].iov_len = len;
842 ssize_t compat_rw_copy_check_uvector(int type,
843 const struct compat_iovec __user *uvector, unsigned long nr_segs,
844 unsigned long fast_segs, struct iovec *fast_pointer,
845 struct iovec **ret_pointer)
847 compat_ssize_t tot_len;
848 struct iovec *iov = *ret_pointer = fast_pointer;
853 * SuS says "The readv() function *may* fail if the iovcnt argument
854 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
855 * traditionally returned zero for zero segments, so...
861 if (nr_segs > UIO_MAXIOV)
863 if (nr_segs > fast_segs) {
865 iov = kmalloc_array(nr_segs, sizeof(struct iovec), GFP_KERNEL);
872 if (!access_ok(uvector, nr_segs*sizeof(*uvector)))
876 * Single unix specification:
877 * We should -EINVAL if an element length is not >= 0 and fitting an
880 * In Linux, the total length is limited to MAX_RW_COUNT, there is
881 * no overflow possibility.
885 for (seg = 0; seg < nr_segs; seg++) {
889 if (__get_user(len, &uvector->iov_len) ||
890 __get_user(buf, &uvector->iov_base)) {
894 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
897 !access_ok(compat_ptr(buf), len)) {
901 if (len > MAX_RW_COUNT - tot_len)
902 len = MAX_RW_COUNT - tot_len;
904 iov->iov_base = compat_ptr(buf);
905 iov->iov_len = (compat_size_t) len;
916 static ssize_t do_iter_read(struct file *file, struct iov_iter *iter,
917 loff_t *pos, rwf_t flags)
922 if (!(file->f_mode & FMODE_READ))
924 if (!(file->f_mode & FMODE_CAN_READ))
927 tot_len = iov_iter_count(iter);
930 ret = rw_verify_area(READ, file, pos, tot_len);
934 if (file->f_op->read_iter)
935 ret = do_iter_readv_writev(file, iter, pos, READ, flags);
937 ret = do_loop_readv_writev(file, iter, pos, READ, flags);
940 fsnotify_access(file);
944 ssize_t vfs_iocb_iter_read(struct file *file, struct kiocb *iocb,
945 struct iov_iter *iter)
950 if (!file->f_op->read_iter)
952 if (!(file->f_mode & FMODE_READ))
954 if (!(file->f_mode & FMODE_CAN_READ))
957 tot_len = iov_iter_count(iter);
960 ret = rw_verify_area(READ, file, &iocb->ki_pos, tot_len);
964 ret = call_read_iter(file, iocb, iter);
967 fsnotify_access(file);
970 EXPORT_SYMBOL(vfs_iocb_iter_read);
972 ssize_t vfs_iter_read(struct file *file, struct iov_iter *iter, loff_t *ppos,
975 if (!file->f_op->read_iter)
977 return do_iter_read(file, iter, ppos, flags);
979 EXPORT_SYMBOL(vfs_iter_read);
981 static ssize_t do_iter_write(struct file *file, struct iov_iter *iter,
982 loff_t *pos, rwf_t flags)
987 if (!(file->f_mode & FMODE_WRITE))
989 if (!(file->f_mode & FMODE_CAN_WRITE))
992 tot_len = iov_iter_count(iter);
995 ret = rw_verify_area(WRITE, file, pos, tot_len);
999 if (file->f_op->write_iter)
1000 ret = do_iter_readv_writev(file, iter, pos, WRITE, flags);
1002 ret = do_loop_readv_writev(file, iter, pos, WRITE, flags);
1004 fsnotify_modify(file);
1008 ssize_t vfs_iocb_iter_write(struct file *file, struct kiocb *iocb,
1009 struct iov_iter *iter)
1014 if (!file->f_op->write_iter)
1016 if (!(file->f_mode & FMODE_WRITE))
1018 if (!(file->f_mode & FMODE_CAN_WRITE))
1021 tot_len = iov_iter_count(iter);
1024 ret = rw_verify_area(WRITE, file, &iocb->ki_pos, tot_len);
1028 ret = call_write_iter(file, iocb, iter);
1030 fsnotify_modify(file);
1034 EXPORT_SYMBOL(vfs_iocb_iter_write);
1036 ssize_t vfs_iter_write(struct file *file, struct iov_iter *iter, loff_t *ppos,
1039 if (!file->f_op->write_iter)
1041 return do_iter_write(file, iter, ppos, flags);
1043 EXPORT_SYMBOL(vfs_iter_write);
1045 ssize_t vfs_readv(struct file *file, const struct iovec __user *vec,
1046 unsigned long vlen, loff_t *pos, rwf_t flags)
1048 struct iovec iovstack[UIO_FASTIOV];
1049 struct iovec *iov = iovstack;
1050 struct iov_iter iter;
1053 ret = import_iovec(READ, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter);
1055 ret = do_iter_read(file, &iter, pos, flags);
1062 static ssize_t vfs_writev(struct file *file, const struct iovec __user *vec,
1063 unsigned long vlen, loff_t *pos, rwf_t flags)
1065 struct iovec iovstack[UIO_FASTIOV];
1066 struct iovec *iov = iovstack;
1067 struct iov_iter iter;
1070 ret = import_iovec(WRITE, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter);
1072 file_start_write(file);
1073 ret = do_iter_write(file, &iter, pos, flags);
1074 file_end_write(file);
1080 static ssize_t do_readv(unsigned long fd, const struct iovec __user *vec,
1081 unsigned long vlen, rwf_t flags)
1083 struct fd f = fdget_pos(fd);
1084 ssize_t ret = -EBADF;
1087 loff_t pos, *ppos = file_ppos(f.file);
1092 ret = vfs_readv(f.file, vec, vlen, ppos, flags);
1093 if (ret >= 0 && ppos)
1094 f.file->f_pos = pos;
1099 add_rchar(current, ret);
1104 static ssize_t do_writev(unsigned long fd, const struct iovec __user *vec,
1105 unsigned long vlen, rwf_t flags)
1107 struct fd f = fdget_pos(fd);
1108 ssize_t ret = -EBADF;
1111 loff_t pos, *ppos = file_ppos(f.file);
1116 ret = vfs_writev(f.file, vec, vlen, ppos, flags);
1117 if (ret >= 0 && ppos)
1118 f.file->f_pos = pos;
1123 add_wchar(current, ret);
1128 static inline loff_t pos_from_hilo(unsigned long high, unsigned long low)
1130 #define HALF_LONG_BITS (BITS_PER_LONG / 2)
1131 return (((loff_t)high << HALF_LONG_BITS) << HALF_LONG_BITS) | low;
1134 static ssize_t do_preadv(unsigned long fd, const struct iovec __user *vec,
1135 unsigned long vlen, loff_t pos, rwf_t flags)
1138 ssize_t ret = -EBADF;
1146 if (f.file->f_mode & FMODE_PREAD)
1147 ret = vfs_readv(f.file, vec, vlen, &pos, flags);
1152 add_rchar(current, ret);
1157 static ssize_t do_pwritev(unsigned long fd, const struct iovec __user *vec,
1158 unsigned long vlen, loff_t pos, rwf_t flags)
1161 ssize_t ret = -EBADF;
1169 if (f.file->f_mode & FMODE_PWRITE)
1170 ret = vfs_writev(f.file, vec, vlen, &pos, flags);
1175 add_wchar(current, ret);
1180 SYSCALL_DEFINE3(readv, unsigned long, fd, const struct iovec __user *, vec,
1181 unsigned long, vlen)
1183 return do_readv(fd, vec, vlen, 0);
1186 SYSCALL_DEFINE3(writev, unsigned long, fd, const struct iovec __user *, vec,
1187 unsigned long, vlen)
1189 return do_writev(fd, vec, vlen, 0);
1192 SYSCALL_DEFINE5(preadv, unsigned long, fd, const struct iovec __user *, vec,
1193 unsigned long, vlen, unsigned long, pos_l, unsigned long, pos_h)
1195 loff_t pos = pos_from_hilo(pos_h, pos_l);
1197 return do_preadv(fd, vec, vlen, pos, 0);
1200 SYSCALL_DEFINE6(preadv2, unsigned long, fd, const struct iovec __user *, vec,
1201 unsigned long, vlen, unsigned long, pos_l, unsigned long, pos_h,
1204 loff_t pos = pos_from_hilo(pos_h, pos_l);
1207 return do_readv(fd, vec, vlen, flags);
1209 return do_preadv(fd, vec, vlen, pos, flags);
1212 SYSCALL_DEFINE5(pwritev, unsigned long, fd, const struct iovec __user *, vec,
1213 unsigned long, vlen, unsigned long, pos_l, unsigned long, pos_h)
1215 loff_t pos = pos_from_hilo(pos_h, pos_l);
1217 return do_pwritev(fd, vec, vlen, pos, 0);
1220 SYSCALL_DEFINE6(pwritev2, unsigned long, fd, const struct iovec __user *, vec,
1221 unsigned long, vlen, unsigned long, pos_l, unsigned long, pos_h,
1224 loff_t pos = pos_from_hilo(pos_h, pos_l);
1227 return do_writev(fd, vec, vlen, flags);
1229 return do_pwritev(fd, vec, vlen, pos, flags);
1232 #ifdef CONFIG_COMPAT
1233 static size_t compat_readv(struct file *file,
1234 const struct compat_iovec __user *vec,
1235 unsigned long vlen, loff_t *pos, rwf_t flags)
1237 struct iovec iovstack[UIO_FASTIOV];
1238 struct iovec *iov = iovstack;
1239 struct iov_iter iter;
1242 ret = compat_import_iovec(READ, vec, vlen, UIO_FASTIOV, &iov, &iter);
1244 ret = do_iter_read(file, &iter, pos, flags);
1248 add_rchar(current, ret);
1253 static size_t do_compat_readv(compat_ulong_t fd,
1254 const struct compat_iovec __user *vec,
1255 compat_ulong_t vlen, rwf_t flags)
1257 struct fd f = fdget_pos(fd);
1263 pos = f.file->f_pos;
1264 ret = compat_readv(f.file, vec, vlen, &pos, flags);
1266 f.file->f_pos = pos;
1272 COMPAT_SYSCALL_DEFINE3(readv, compat_ulong_t, fd,
1273 const struct compat_iovec __user *,vec,
1274 compat_ulong_t, vlen)
1276 return do_compat_readv(fd, vec, vlen, 0);
1279 static long do_compat_preadv64(unsigned long fd,
1280 const struct compat_iovec __user *vec,
1281 unsigned long vlen, loff_t pos, rwf_t flags)
1292 if (f.file->f_mode & FMODE_PREAD)
1293 ret = compat_readv(f.file, vec, vlen, &pos, flags);
1298 #ifdef __ARCH_WANT_COMPAT_SYS_PREADV64
1299 COMPAT_SYSCALL_DEFINE4(preadv64, unsigned long, fd,
1300 const struct compat_iovec __user *,vec,
1301 unsigned long, vlen, loff_t, pos)
1303 return do_compat_preadv64(fd, vec, vlen, pos, 0);
1307 COMPAT_SYSCALL_DEFINE5(preadv, compat_ulong_t, fd,
1308 const struct compat_iovec __user *,vec,
1309 compat_ulong_t, vlen, u32, pos_low, u32, pos_high)
1311 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1313 return do_compat_preadv64(fd, vec, vlen, pos, 0);
1316 #ifdef __ARCH_WANT_COMPAT_SYS_PREADV64V2
1317 COMPAT_SYSCALL_DEFINE5(preadv64v2, unsigned long, fd,
1318 const struct compat_iovec __user *,vec,
1319 unsigned long, vlen, loff_t, pos, rwf_t, flags)
1322 return do_compat_readv(fd, vec, vlen, flags);
1324 return do_compat_preadv64(fd, vec, vlen, pos, flags);
1328 COMPAT_SYSCALL_DEFINE6(preadv2, compat_ulong_t, fd,
1329 const struct compat_iovec __user *,vec,
1330 compat_ulong_t, vlen, u32, pos_low, u32, pos_high,
1333 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1336 return do_compat_readv(fd, vec, vlen, flags);
1338 return do_compat_preadv64(fd, vec, vlen, pos, flags);
1341 static size_t compat_writev(struct file *file,
1342 const struct compat_iovec __user *vec,
1343 unsigned long vlen, loff_t *pos, rwf_t flags)
1345 struct iovec iovstack[UIO_FASTIOV];
1346 struct iovec *iov = iovstack;
1347 struct iov_iter iter;
1350 ret = compat_import_iovec(WRITE, vec, vlen, UIO_FASTIOV, &iov, &iter);
1352 file_start_write(file);
1353 ret = do_iter_write(file, &iter, pos, flags);
1354 file_end_write(file);
1358 add_wchar(current, ret);
1363 static size_t do_compat_writev(compat_ulong_t fd,
1364 const struct compat_iovec __user* vec,
1365 compat_ulong_t vlen, rwf_t flags)
1367 struct fd f = fdget_pos(fd);
1373 pos = f.file->f_pos;
1374 ret = compat_writev(f.file, vec, vlen, &pos, flags);
1376 f.file->f_pos = pos;
1381 COMPAT_SYSCALL_DEFINE3(writev, compat_ulong_t, fd,
1382 const struct compat_iovec __user *, vec,
1383 compat_ulong_t, vlen)
1385 return do_compat_writev(fd, vec, vlen, 0);
1388 static long do_compat_pwritev64(unsigned long fd,
1389 const struct compat_iovec __user *vec,
1390 unsigned long vlen, loff_t pos, rwf_t flags)
1401 if (f.file->f_mode & FMODE_PWRITE)
1402 ret = compat_writev(f.file, vec, vlen, &pos, flags);
1407 #ifdef __ARCH_WANT_COMPAT_SYS_PWRITEV64
1408 COMPAT_SYSCALL_DEFINE4(pwritev64, unsigned long, fd,
1409 const struct compat_iovec __user *,vec,
1410 unsigned long, vlen, loff_t, pos)
1412 return do_compat_pwritev64(fd, vec, vlen, pos, 0);
1416 COMPAT_SYSCALL_DEFINE5(pwritev, compat_ulong_t, fd,
1417 const struct compat_iovec __user *,vec,
1418 compat_ulong_t, vlen, u32, pos_low, u32, pos_high)
1420 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1422 return do_compat_pwritev64(fd, vec, vlen, pos, 0);
1425 #ifdef __ARCH_WANT_COMPAT_SYS_PWRITEV64V2
1426 COMPAT_SYSCALL_DEFINE5(pwritev64v2, unsigned long, fd,
1427 const struct compat_iovec __user *,vec,
1428 unsigned long, vlen, loff_t, pos, rwf_t, flags)
1431 return do_compat_writev(fd, vec, vlen, flags);
1433 return do_compat_pwritev64(fd, vec, vlen, pos, flags);
1437 COMPAT_SYSCALL_DEFINE6(pwritev2, compat_ulong_t, fd,
1438 const struct compat_iovec __user *,vec,
1439 compat_ulong_t, vlen, u32, pos_low, u32, pos_high, rwf_t, flags)
1441 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1444 return do_compat_writev(fd, vec, vlen, flags);
1446 return do_compat_pwritev64(fd, vec, vlen, pos, flags);
1451 static ssize_t do_sendfile(int out_fd, int in_fd, loff_t *ppos,
1452 size_t count, loff_t max)
1455 struct inode *in_inode, *out_inode;
1462 * Get input file, and verify that it is ok..
1468 if (!(in.file->f_mode & FMODE_READ))
1472 pos = in.file->f_pos;
1475 if (!(in.file->f_mode & FMODE_PREAD))
1478 retval = rw_verify_area(READ, in.file, &pos, count);
1481 if (count > MAX_RW_COUNT)
1482 count = MAX_RW_COUNT;
1485 * Get output file, and verify that it is ok..
1488 out = fdget(out_fd);
1491 if (!(out.file->f_mode & FMODE_WRITE))
1493 in_inode = file_inode(in.file);
1494 out_inode = file_inode(out.file);
1495 out_pos = out.file->f_pos;
1496 retval = rw_verify_area(WRITE, out.file, &out_pos, count);
1501 max = min(in_inode->i_sb->s_maxbytes, out_inode->i_sb->s_maxbytes);
1503 if (unlikely(pos + count > max)) {
1504 retval = -EOVERFLOW;
1513 * We need to debate whether we can enable this or not. The
1514 * man page documents EAGAIN return for the output at least,
1515 * and the application is arguably buggy if it doesn't expect
1516 * EAGAIN on a non-blocking file descriptor.
1518 if (in.file->f_flags & O_NONBLOCK)
1519 fl = SPLICE_F_NONBLOCK;
1521 file_start_write(out.file);
1522 retval = do_splice_direct(in.file, &pos, out.file, &out_pos, count, fl);
1523 file_end_write(out.file);
1526 add_rchar(current, retval);
1527 add_wchar(current, retval);
1528 fsnotify_access(in.file);
1529 fsnotify_modify(out.file);
1530 out.file->f_pos = out_pos;
1534 in.file->f_pos = pos;
1540 retval = -EOVERFLOW;
1550 SYSCALL_DEFINE4(sendfile, int, out_fd, int, in_fd, off_t __user *, offset, size_t, count)
1557 if (unlikely(get_user(off, offset)))
1560 ret = do_sendfile(out_fd, in_fd, &pos, count, MAX_NON_LFS);
1561 if (unlikely(put_user(pos, offset)))
1566 return do_sendfile(out_fd, in_fd, NULL, count, 0);
1569 SYSCALL_DEFINE4(sendfile64, int, out_fd, int, in_fd, loff_t __user *, offset, size_t, count)
1575 if (unlikely(copy_from_user(&pos, offset, sizeof(loff_t))))
1577 ret = do_sendfile(out_fd, in_fd, &pos, count, 0);
1578 if (unlikely(put_user(pos, offset)))
1583 return do_sendfile(out_fd, in_fd, NULL, count, 0);
1586 #ifdef CONFIG_COMPAT
1587 COMPAT_SYSCALL_DEFINE4(sendfile, int, out_fd, int, in_fd,
1588 compat_off_t __user *, offset, compat_size_t, count)
1595 if (unlikely(get_user(off, offset)))
1598 ret = do_sendfile(out_fd, in_fd, &pos, count, MAX_NON_LFS);
1599 if (unlikely(put_user(pos, offset)))
1604 return do_sendfile(out_fd, in_fd, NULL, count, 0);
1607 COMPAT_SYSCALL_DEFINE4(sendfile64, int, out_fd, int, in_fd,
1608 compat_loff_t __user *, offset, compat_size_t, count)
1614 if (unlikely(copy_from_user(&pos, offset, sizeof(loff_t))))
1616 ret = do_sendfile(out_fd, in_fd, &pos, count, 0);
1617 if (unlikely(put_user(pos, offset)))
1622 return do_sendfile(out_fd, in_fd, NULL, count, 0);
1627 * generic_copy_file_range - copy data between two files
1628 * @file_in: file structure to read from
1629 * @pos_in: file offset to read from
1630 * @file_out: file structure to write data to
1631 * @pos_out: file offset to write data to
1632 * @len: amount of data to copy
1633 * @flags: copy flags
1635 * This is a generic filesystem helper to copy data from one file to another.
1636 * It has no constraints on the source or destination file owners - the files
1637 * can belong to different superblocks and different filesystem types. Short
1638 * copies are allowed.
1640 * This should be called from the @file_out filesystem, as per the
1641 * ->copy_file_range() method.
1643 * Returns the number of bytes copied or a negative error indicating the
1647 ssize_t generic_copy_file_range(struct file *file_in, loff_t pos_in,
1648 struct file *file_out, loff_t pos_out,
1649 size_t len, unsigned int flags)
1651 return do_splice_direct(file_in, &pos_in, file_out, &pos_out,
1652 len > MAX_RW_COUNT ? MAX_RW_COUNT : len, 0);
1654 EXPORT_SYMBOL(generic_copy_file_range);
1656 static ssize_t do_copy_file_range(struct file *file_in, loff_t pos_in,
1657 struct file *file_out, loff_t pos_out,
1658 size_t len, unsigned int flags)
1661 * Although we now allow filesystems to handle cross sb copy, passing
1662 * a file of the wrong filesystem type to filesystem driver can result
1663 * in an attempt to dereference the wrong type of ->private_data, so
1664 * avoid doing that until we really have a good reason. NFS defines
1665 * several different file_system_type structures, but they all end up
1666 * using the same ->copy_file_range() function pointer.
1668 if (file_out->f_op->copy_file_range &&
1669 file_out->f_op->copy_file_range == file_in->f_op->copy_file_range)
1670 return file_out->f_op->copy_file_range(file_in, pos_in,
1674 return generic_copy_file_range(file_in, pos_in, file_out, pos_out, len,
1679 * copy_file_range() differs from regular file read and write in that it
1680 * specifically allows return partial success. When it does so is up to
1681 * the copy_file_range method.
1683 ssize_t vfs_copy_file_range(struct file *file_in, loff_t pos_in,
1684 struct file *file_out, loff_t pos_out,
1685 size_t len, unsigned int flags)
1692 ret = generic_copy_file_checks(file_in, pos_in, file_out, pos_out, &len,
1697 ret = rw_verify_area(READ, file_in, &pos_in, len);
1701 ret = rw_verify_area(WRITE, file_out, &pos_out, len);
1708 file_start_write(file_out);
1711 * Try cloning first, this is supported by more file systems, and
1712 * more efficient if both clone and copy are supported (e.g. NFS).
1714 if (file_in->f_op->remap_file_range &&
1715 file_inode(file_in)->i_sb == file_inode(file_out)->i_sb) {
1718 cloned = file_in->f_op->remap_file_range(file_in, pos_in,
1720 min_t(loff_t, MAX_RW_COUNT, len),
1721 REMAP_FILE_CAN_SHORTEN);
1728 ret = do_copy_file_range(file_in, pos_in, file_out, pos_out, len,
1730 WARN_ON_ONCE(ret == -EOPNOTSUPP);
1733 fsnotify_access(file_in);
1734 add_rchar(current, ret);
1735 fsnotify_modify(file_out);
1736 add_wchar(current, ret);
1742 file_end_write(file_out);
1746 EXPORT_SYMBOL(vfs_copy_file_range);
1748 SYSCALL_DEFINE6(copy_file_range, int, fd_in, loff_t __user *, off_in,
1749 int, fd_out, loff_t __user *, off_out,
1750 size_t, len, unsigned int, flags)
1756 ssize_t ret = -EBADF;
1758 f_in = fdget(fd_in);
1762 f_out = fdget(fd_out);
1768 if (copy_from_user(&pos_in, off_in, sizeof(loff_t)))
1771 pos_in = f_in.file->f_pos;
1775 if (copy_from_user(&pos_out, off_out, sizeof(loff_t)))
1778 pos_out = f_out.file->f_pos;
1781 ret = vfs_copy_file_range(f_in.file, pos_in, f_out.file, pos_out, len,
1788 if (copy_to_user(off_in, &pos_in, sizeof(loff_t)))
1791 f_in.file->f_pos = pos_in;
1795 if (copy_to_user(off_out, &pos_out, sizeof(loff_t)))
1798 f_out.file->f_pos = pos_out;
1810 static int remap_verify_area(struct file *file, loff_t pos, loff_t len,
1813 struct inode *inode = file_inode(file);
1815 if (unlikely(pos < 0 || len < 0))
1818 if (unlikely((loff_t) (pos + len) < 0))
1821 if (unlikely(inode->i_flctx && mandatory_lock(inode))) {
1822 loff_t end = len ? pos + len - 1 : OFFSET_MAX;
1825 retval = locks_mandatory_area(inode, file, pos, end,
1826 write ? F_WRLCK : F_RDLCK);
1831 return security_file_permission(file, write ? MAY_WRITE : MAY_READ);
1834 * Ensure that we don't remap a partial EOF block in the middle of something
1835 * else. Assume that the offsets have already been checked for block
1838 * For clone we only link a partial EOF block above or at the destination file's
1839 * EOF. For deduplication we accept a partial EOF block only if it ends at the
1840 * destination file's EOF (can not link it into the middle of a file).
1842 * Shorten the request if possible.
1844 static int generic_remap_check_len(struct inode *inode_in,
1845 struct inode *inode_out,
1848 unsigned int remap_flags)
1850 u64 blkmask = i_blocksize(inode_in) - 1;
1851 loff_t new_len = *len;
1853 if ((*len & blkmask) == 0)
1856 if (pos_out + *len < i_size_read(inode_out))
1857 new_len &= ~blkmask;
1859 if (new_len == *len)
1862 if (remap_flags & REMAP_FILE_CAN_SHORTEN) {
1867 return (remap_flags & REMAP_FILE_DEDUP) ? -EBADE : -EINVAL;
1870 /* Read a page's worth of file data into the page cache. */
1871 static struct page *vfs_dedupe_get_page(struct inode *inode, loff_t offset)
1875 page = read_mapping_page(inode->i_mapping, offset >> PAGE_SHIFT, NULL);
1878 if (!PageUptodate(page)) {
1880 return ERR_PTR(-EIO);
1886 * Lock two pages, ensuring that we lock in offset order if the pages are from
1889 static void vfs_lock_two_pages(struct page *page1, struct page *page2)
1891 /* Always lock in order of increasing index. */
1892 if (page1->index > page2->index)
1900 /* Unlock two pages, being careful not to unlock the same page twice. */
1901 static void vfs_unlock_two_pages(struct page *page1, struct page *page2)
1909 * Compare extents of two files to see if they are the same.
1910 * Caller must have locked both inodes to prevent write races.
1912 static int vfs_dedupe_file_range_compare(struct inode *src, loff_t srcoff,
1913 struct inode *dest, loff_t destoff,
1914 loff_t len, bool *is_same)
1920 struct page *src_page;
1921 struct page *dest_page;
1929 src_poff = srcoff & (PAGE_SIZE - 1);
1930 dest_poff = destoff & (PAGE_SIZE - 1);
1931 cmp_len = min(PAGE_SIZE - src_poff,
1932 PAGE_SIZE - dest_poff);
1933 cmp_len = min(cmp_len, len);
1937 src_page = vfs_dedupe_get_page(src, srcoff);
1938 if (IS_ERR(src_page)) {
1939 error = PTR_ERR(src_page);
1942 dest_page = vfs_dedupe_get_page(dest, destoff);
1943 if (IS_ERR(dest_page)) {
1944 error = PTR_ERR(dest_page);
1949 vfs_lock_two_pages(src_page, dest_page);
1952 * Now that we've locked both pages, make sure they're still
1953 * mapped to the file data we're interested in. If not,
1954 * someone is invalidating pages on us and we lose.
1956 if (!PageUptodate(src_page) || !PageUptodate(dest_page) ||
1957 src_page->mapping != src->i_mapping ||
1958 dest_page->mapping != dest->i_mapping) {
1963 src_addr = kmap_atomic(src_page);
1964 dest_addr = kmap_atomic(dest_page);
1966 flush_dcache_page(src_page);
1967 flush_dcache_page(dest_page);
1969 if (memcmp(src_addr + src_poff, dest_addr + dest_poff, cmp_len))
1972 kunmap_atomic(dest_addr);
1973 kunmap_atomic(src_addr);
1975 vfs_unlock_two_pages(src_page, dest_page);
1976 put_page(dest_page);
1995 * Check that the two inodes are eligible for cloning, the ranges make
1996 * sense, and then flush all dirty data. Caller must ensure that the
1997 * inodes have been locked against any other modifications.
1999 * If there's an error, then the usual negative error code is returned.
2000 * Otherwise returns 0 with *len set to the request length.
2002 int generic_remap_file_range_prep(struct file *file_in, loff_t pos_in,
2003 struct file *file_out, loff_t pos_out,
2004 loff_t *len, unsigned int remap_flags)
2006 struct inode *inode_in = file_inode(file_in);
2007 struct inode *inode_out = file_inode(file_out);
2008 bool same_inode = (inode_in == inode_out);
2011 /* Don't touch certain kinds of inodes */
2012 if (IS_IMMUTABLE(inode_out))
2015 if (IS_SWAPFILE(inode_in) || IS_SWAPFILE(inode_out))
2018 /* Don't reflink dirs, pipes, sockets... */
2019 if (S_ISDIR(inode_in->i_mode) || S_ISDIR(inode_out->i_mode))
2021 if (!S_ISREG(inode_in->i_mode) || !S_ISREG(inode_out->i_mode))
2024 /* Zero length dedupe exits immediately; reflink goes to EOF. */
2026 loff_t isize = i_size_read(inode_in);
2028 if ((remap_flags & REMAP_FILE_DEDUP) || pos_in == isize)
2032 *len = isize - pos_in;
2037 /* Check that we don't violate system file offset limits. */
2038 ret = generic_remap_checks(file_in, pos_in, file_out, pos_out, len,
2043 /* Wait for the completion of any pending IOs on both files */
2044 inode_dio_wait(inode_in);
2046 inode_dio_wait(inode_out);
2048 ret = filemap_write_and_wait_range(inode_in->i_mapping,
2049 pos_in, pos_in + *len - 1);
2053 ret = filemap_write_and_wait_range(inode_out->i_mapping,
2054 pos_out, pos_out + *len - 1);
2059 * Check that the extents are the same.
2061 if (remap_flags & REMAP_FILE_DEDUP) {
2062 bool is_same = false;
2064 ret = vfs_dedupe_file_range_compare(inode_in, pos_in,
2065 inode_out, pos_out, *len, &is_same);
2072 ret = generic_remap_check_len(inode_in, inode_out, pos_out, len,
2077 /* If can't alter the file contents, we're done. */
2078 if (!(remap_flags & REMAP_FILE_DEDUP))
2079 ret = file_modified(file_out);
2083 EXPORT_SYMBOL(generic_remap_file_range_prep);
2085 loff_t do_clone_file_range(struct file *file_in, loff_t pos_in,
2086 struct file *file_out, loff_t pos_out,
2087 loff_t len, unsigned int remap_flags)
2091 WARN_ON_ONCE(remap_flags & REMAP_FILE_DEDUP);
2094 * FICLONE/FICLONERANGE ioctls enforce that src and dest files are on
2095 * the same mount. Practically, they only need to be on the same file
2098 if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb)
2101 ret = generic_file_rw_checks(file_in, file_out);
2105 if (!file_in->f_op->remap_file_range)
2108 ret = remap_verify_area(file_in, pos_in, len, false);
2112 ret = remap_verify_area(file_out, pos_out, len, true);
2116 ret = file_in->f_op->remap_file_range(file_in, pos_in,
2117 file_out, pos_out, len, remap_flags);
2121 fsnotify_access(file_in);
2122 fsnotify_modify(file_out);
2125 EXPORT_SYMBOL(do_clone_file_range);
2127 loff_t vfs_clone_file_range(struct file *file_in, loff_t pos_in,
2128 struct file *file_out, loff_t pos_out,
2129 loff_t len, unsigned int remap_flags)
2133 file_start_write(file_out);
2134 ret = do_clone_file_range(file_in, pos_in, file_out, pos_out, len,
2136 file_end_write(file_out);
2140 EXPORT_SYMBOL(vfs_clone_file_range);
2142 /* Check whether we are allowed to dedupe the destination file */
2143 static bool allow_file_dedupe(struct file *file)
2145 if (capable(CAP_SYS_ADMIN))
2147 if (file->f_mode & FMODE_WRITE)
2149 if (uid_eq(current_fsuid(), file_inode(file)->i_uid))
2151 if (!inode_permission(file_inode(file), MAY_WRITE))
2156 loff_t vfs_dedupe_file_range_one(struct file *src_file, loff_t src_pos,
2157 struct file *dst_file, loff_t dst_pos,
2158 loff_t len, unsigned int remap_flags)
2162 WARN_ON_ONCE(remap_flags & ~(REMAP_FILE_DEDUP |
2163 REMAP_FILE_CAN_SHORTEN));
2165 ret = mnt_want_write_file(dst_file);
2169 ret = remap_verify_area(dst_file, dst_pos, len, true);
2171 goto out_drop_write;
2174 if (!allow_file_dedupe(dst_file))
2175 goto out_drop_write;
2178 if (src_file->f_path.mnt != dst_file->f_path.mnt)
2179 goto out_drop_write;
2182 if (S_ISDIR(file_inode(dst_file)->i_mode))
2183 goto out_drop_write;
2186 if (!dst_file->f_op->remap_file_range)
2187 goto out_drop_write;
2191 goto out_drop_write;
2194 ret = dst_file->f_op->remap_file_range(src_file, src_pos, dst_file,
2195 dst_pos, len, remap_flags | REMAP_FILE_DEDUP);
2197 mnt_drop_write_file(dst_file);
2201 EXPORT_SYMBOL(vfs_dedupe_file_range_one);
2203 int vfs_dedupe_file_range(struct file *file, struct file_dedupe_range *same)
2205 struct file_dedupe_range_info *info;
2206 struct inode *src = file_inode(file);
2211 u16 count = same->dest_count;
2214 if (!(file->f_mode & FMODE_READ))
2217 if (same->reserved1 || same->reserved2)
2220 off = same->src_offset;
2221 len = same->src_length;
2223 if (S_ISDIR(src->i_mode))
2226 if (!S_ISREG(src->i_mode))
2229 if (!file->f_op->remap_file_range)
2232 ret = remap_verify_area(file, off, len, false);
2237 if (off + len > i_size_read(src))
2240 /* Arbitrary 1G limit on a single dedupe request, can be raised. */
2241 len = min_t(u64, len, 1 << 30);
2243 /* pre-format output fields to sane values */
2244 for (i = 0; i < count; i++) {
2245 same->info[i].bytes_deduped = 0ULL;
2246 same->info[i].status = FILE_DEDUPE_RANGE_SAME;
2249 for (i = 0, info = same->info; i < count; i++, info++) {
2250 struct fd dst_fd = fdget(info->dest_fd);
2251 struct file *dst_file = dst_fd.file;
2254 info->status = -EBADF;
2258 if (info->reserved) {
2259 info->status = -EINVAL;
2263 deduped = vfs_dedupe_file_range_one(file, off, dst_file,
2264 info->dest_offset, len,
2265 REMAP_FILE_CAN_SHORTEN);
2266 if (deduped == -EBADE)
2267 info->status = FILE_DEDUPE_RANGE_DIFFERS;
2268 else if (deduped < 0)
2269 info->status = deduped;
2271 info->bytes_deduped = len;
2276 if (fatal_signal_pending(current))
2281 EXPORT_SYMBOL(vfs_dedupe_file_range);