From: Khalid Aziz <khalid.aziz@oracle.com>
To: akpm@linux-foundation.org, willy@infradead.org
Cc: Khalid Aziz <khalid.aziz@oracle.com>,
aneesh.kumar@linux.ibm.com, arnd@arndb.de, 21cnbao@gmail.com,
corbet@lwn.net, dave.hansen@linux.intel.com, david@redhat.com,
ebiederm@xmission.com, hagen@jauu.net, jack@suse.cz,
keescook@chromium.org, kirill@shutemov.name, kucharsk@gmail.com,
linkinjeon@kernel.org, linux-fsdevel@vger.kernel.org,
linux-kernel@vger.kernel.org, linux-mm@kvack.org,
longpeng2@huawei.com, luto@kernel.org, markhemm@googlemail.com,
pcc@google.com, rppt@kernel.org, sieberf@amazon.com,
sjpark@amazon.de, surenb@google.com, tst@schoebel-theuer.de,
yzaikin@google.com
Subject: [PATCH v1 04/14] mm/mshare: implement mshare_unlink syscall
Date: Mon, 11 Apr 2022 10:05:48 -0600 [thread overview]
Message-ID: <378f51749fd4d0bbe303f1a1b942cf1c7f5ea480.1649370874.git.khalid.aziz@oracle.com> (raw)
In-Reply-To: <cover.1649370874.git.khalid.aziz@oracle.com>
Add code to allow mshare syscall to be made for an exisitng mshare'd
region. Complete the implementation for mshare_unlink syscall. Make
reading mshare resource name from userspace safer. Fix code to allow
msharefs to be unmounted cleanly.
Signed-off-by: Khalid Aziz <khalid.aziz@oracle.com>
---
mm/mshare.c | 144 +++++++++++++++++++++++++++++++++++++++++-----------
1 file changed, 113 insertions(+), 31 deletions(-)
diff --git a/mm/mshare.c b/mm/mshare.c
index 0247275aac50..b9d7836f9bd1 100644
--- a/mm/mshare.c
+++ b/mm/mshare.c
@@ -23,11 +23,24 @@
struct mshare_data {
struct mm_struct *mm;
+ mode_t mode;
refcount_t refcnt;
};
static struct super_block *msharefs_sb;
+static void
+msharefs_evict_inode(struct inode *inode)
+{
+ clear_inode(inode);
+}
+
+static const struct super_operations msharefs_ops = {
+ .statfs = simple_statfs,
+ .drop_inode = generic_delete_inode,
+ .evict_inode = msharefs_evict_inode,
+};
+
static ssize_t
mshare_read(struct kiocb *iocb, struct iov_iter *iov)
{
@@ -115,7 +128,7 @@ static struct inode
}
static int
-mshare_file_create(const char *name, unsigned long flags,
+mshare_file_create(struct filename *fname, int flags,
struct mshare_data *info)
{
struct inode *inode;
@@ -124,13 +137,16 @@ mshare_file_create(const char *name, unsigned long flags,
root = msharefs_sb->s_root;
+ /*
+ * This is a read only file.
+ */
inode = msharefs_get_inode(msharefs_sb, S_IFREG | 0400);
if (IS_ERR(inode))
return PTR_ERR(inode);
inode->i_private = info;
- dentry = msharefs_alloc_dentry(root, name);
+ dentry = msharefs_alloc_dentry(root, fname->name);
if (IS_ERR(dentry)) {
err = PTR_ERR(dentry);
goto fail_inode;
@@ -138,6 +154,7 @@ mshare_file_create(const char *name, unsigned long flags,
d_add(dentry, inode);
+ dput(dentry);
return err;
fail_inode:
@@ -151,10 +168,13 @@ mshare_file_create(const char *name, unsigned long flags,
SYSCALL_DEFINE5(mshare, const char __user *, name, unsigned long, addr,
unsigned long, len, int, oflag, mode_t, mode)
{
- char mshare_name[NAME_MAX];
struct mshare_data *info;
struct mm_struct *mm;
- int err;
+ struct filename *fname = getname(name);
+ struct dentry *dentry;
+ struct inode *inode;
+ struct qstr namestr;
+ int err = PTR_ERR(fname);
/*
* Address range being shared must be aligned to pgdir
@@ -163,29 +183,56 @@ SYSCALL_DEFINE5(mshare, const char __user *, name, unsigned long, addr,
if ((addr | len) & (PGDIR_SIZE - 1))
return -EINVAL;
- err = copy_from_user(mshare_name, name, NAME_MAX);
+ if (IS_ERR(fname))
+ goto err_out;
+
+ /*
+ * Does this mshare entry exist already? If it does, calling
+ * mshare with O_EXCL|O_CREAT is an error
+ */
+ namestr.name = fname->name;
+ namestr.len = strlen(fname->name);
+ err = msharefs_d_hash(msharefs_sb->s_root, &namestr);
if (err)
goto err_out;
+ dentry = d_lookup(msharefs_sb->s_root, &namestr);
+ if (dentry && (oflag & (O_EXCL|O_CREAT))) {
+ err = -EEXIST;
+ dput(dentry);
+ goto err_out;
+ }
- mm = mm_alloc();
- if (!mm)
- return -ENOMEM;
- info = kzalloc(sizeof(*info), GFP_KERNEL);
- if (!info) {
- err = -ENOMEM;
- goto err_relmm;
+ if (dentry) {
+ inode = d_inode(dentry);
+ if (inode == NULL) {
+ err = -EINVAL;
+ goto err_out;
+ }
+ info = inode->i_private;
+ refcount_inc(&info->refcnt);
+ dput(dentry);
+ } else {
+ mm = mm_alloc();
+ if (!mm)
+ return -ENOMEM;
+ info = kzalloc(sizeof(*info), GFP_KERNEL);
+ if (!info) {
+ err = -ENOMEM;
+ goto err_relmm;
+ }
+ mm->mmap_base = addr;
+ mm->task_size = addr + len;
+ if (!mm->task_size)
+ mm->task_size--;
+ info->mm = mm;
+ info->mode = mode;
+ refcount_set(&info->refcnt, 1);
+ err = mshare_file_create(fname, oflag, info);
+ if (err)
+ goto err_relinfo;
}
- mm->mmap_base = addr;
- mm->task_size = addr + len;
- if (!mm->task_size)
- mm->task_size--;
- info->mm = mm;
- refcount_set(&info->refcnt, 1);
-
- err = mshare_file_create(mshare_name, oflag, info);
- if (err)
- goto err_relinfo;
+ putname(fname);
return 0;
err_relinfo:
@@ -193,6 +240,7 @@ SYSCALL_DEFINE5(mshare, const char __user *, name, unsigned long, addr,
err_relmm:
mmput(mm);
err_out:
+ putname(fname);
return err;
}
@@ -201,21 +249,54 @@ SYSCALL_DEFINE5(mshare, const char __user *, name, unsigned long, addr,
*/
SYSCALL_DEFINE1(mshare_unlink, const char *, name)
{
- char mshare_name[NAME_MAX];
- int err;
+ struct filename *fname = getname(name);
+ int err = PTR_ERR(fname);
+ struct dentry *dentry;
+ struct inode *inode;
+ struct mshare_data *info;
+ struct qstr namestr;
- /*
- * Delete the named object
- *
- * TODO: Mark mshare'd range for deletion
- *
- */
- err = copy_from_user(mshare_name, name, NAME_MAX);
+ if (IS_ERR(fname))
+ goto err_out;
+
+ namestr.name = fname->name;
+ namestr.len = strlen(fname->name);
+ err = msharefs_d_hash(msharefs_sb->s_root, &namestr);
if (err)
goto err_out;
+ dentry = d_lookup(msharefs_sb->s_root, &namestr);
+ if (dentry == NULL) {
+ err = -EINVAL;
+ goto err_out;
+ }
+
+ inode = d_inode(dentry);
+ if (inode == NULL) {
+ err = -EINVAL;
+ goto err_dput;
+ }
+ info = inode->i_private;
+
+ /*
+ * Is this the last reference?
+ */
+ if (refcount_dec_and_test(&info->refcnt)) {
+ simple_unlink(d_inode(msharefs_sb->s_root), dentry);
+ d_drop(dentry);
+ d_delete(dentry);
+ mmput(info->mm);
+ kfree(info);
+ } else {
+ dput(dentry);
+ }
+
+ putname(fname);
return 0;
+err_dput:
+ dput(dentry);
err_out:
+ putname(fname);
return err;
}
@@ -229,6 +310,7 @@ msharefs_fill_super(struct super_block *sb, struct fs_context *fc)
static const struct tree_descr empty_descr = {""};
int err;
+ sb->s_op = &msharefs_ops;
sb->s_d_op = &msharefs_d_ops;
err = simple_fill_super(sb, MSHARE_MAGIC, &empty_descr);
if (err)
--
2.32.0
next prev parent reply other threads:[~2022-04-11 16:07 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-11 16:05 [PATCH v1 00/14] Add support for shared PTEs across processes Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 01/14] mm: Add new system calls mshare, mshare_unlink Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 02/14] mm/mshare: Add msharefs filesystem Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 03/14] mm/mshare: Add read for msharefs Khalid Aziz
2022-04-11 16:05 ` Khalid Aziz [this message]
2022-04-11 16:05 ` [PATCH v1 05/14] mm/mshare: Add locking to msharefs syscalls Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 06/14] mm/mshare: Check for mounted filesystem Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 07/14] mm/mshare: Add vm flag for shared PTE Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 08/14] mm/mshare: Add basic page table sharing using mshare Khalid Aziz
2022-04-11 18:48 ` Dave Hansen
2022-04-11 20:39 ` Khalid Aziz
2022-05-30 11:11 ` Barry Song
2022-06-28 20:11 ` Khalid Aziz
2022-05-31 3:46 ` Barry Song
2022-06-28 20:16 ` Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 09/14] mm/mshare: Do not free PTEs for mshare'd PTEs Khalid Aziz
2022-05-31 4:24 ` Barry Song
2022-06-29 17:38 ` Khalid Aziz
2022-07-03 20:54 ` Andy Lutomirski
2022-07-06 20:33 ` Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 10/14] mm/mshare: Check for mapped vma when mshare'ing existing mshare'd range Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 11/14] mm/mshare: unmap vmas in mshare_unlink Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 12/14] mm/mshare: Add a proc file with mshare alignment/size information Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 13/14] mm/mshare: Enforce mshare'd region permissions Khalid Aziz
2022-04-11 16:05 ` [PATCH v1 14/14] mm/mshare: Copy PTEs to host mm Khalid Aziz
2022-04-11 17:37 ` [PATCH v1 00/14] Add support for shared PTEs across processes Matthew Wilcox
2022-04-11 18:51 ` Dave Hansen
2022-04-11 19:08 ` Matthew Wilcox
2022-04-11 19:52 ` Khalid Aziz
2022-04-11 18:47 ` Dave Hansen
2022-04-11 20:10 ` Eric W. Biederman
2022-04-11 22:21 ` Khalid Aziz
2022-05-30 10:48 ` Barry Song
2022-05-30 11:18 ` David Hildenbrand
2022-05-30 11:49 ` Barry Song
2022-06-29 17:48 ` Khalid Aziz
2022-06-29 17:40 ` Khalid Aziz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=378f51749fd4d0bbe303f1a1b942cf1c7f5ea480.1649370874.git.khalid.aziz@oracle.com \
--to=khalid.aziz@oracle.com \
--cc=21cnbao@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=aneesh.kumar@linux.ibm.com \
--cc=arnd@arndb.de \
--cc=corbet@lwn.net \
--cc=dave.hansen@linux.intel.com \
--cc=david@redhat.com \
--cc=ebiederm@xmission.com \
--cc=hagen@jauu.net \
--cc=jack@suse.cz \
--cc=keescook@chromium.org \
--cc=kirill@shutemov.name \
--cc=kucharsk@gmail.com \
--cc=linkinjeon@kernel.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=longpeng2@huawei.com \
--cc=luto@kernel.org \
--cc=markhemm@googlemail.com \
--cc=pcc@google.com \
--cc=rppt@kernel.org \
--cc=sieberf@amazon.com \
--cc=sjpark@amazon.de \
--cc=surenb@google.com \
--cc=tst@schoebel-theuer.de \
--cc=willy@infradead.org \
--cc=yzaikin@google.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox