2019-06-04 01:11:33 -07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2013-02-08 09:27:24 -07:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Red Hat, Inc.
|
|
|
|
* Copyright (C) 2012 Jeremy Kerr <jeremy.kerr@canonical.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/ctype.h>
|
|
|
|
#include <linux/efi.h>
|
|
|
|
#include <linux/fs.h>
|
2019-03-25 09:38:29 -07:00
|
|
|
#include <linux/fs_context.h>
|
2023-10-19 15:46:39 -07:00
|
|
|
#include <linux/fs_parser.h>
|
2013-02-08 09:27:24 -07:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/pagemap.h>
|
2013-04-30 03:30:24 -07:00
|
|
|
#include <linux/ucs2_string.h>
|
2013-05-01 17:51:54 -07:00
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/magic.h>
|
2023-05-17 08:38:12 -07:00
|
|
|
#include <linux/statfs.h>
|
2023-11-06 22:40:55 -07:00
|
|
|
#include <linux/notifier.h>
|
2023-11-06 22:40:56 -07:00
|
|
|
#include <linux/printk.h>
|
2013-02-08 09:27:24 -07:00
|
|
|
|
|
|
|
#include "internal.h"
|
|
|
|
|
2023-11-06 22:40:55 -07:00
|
|
|
static int efivarfs_ops_notifier(struct notifier_block *nb, unsigned long event,
|
|
|
|
void *data)
|
|
|
|
{
|
|
|
|
struct efivarfs_fs_info *sfi = container_of(nb, struct efivarfs_fs_info, nb);
|
|
|
|
|
|
|
|
switch (event) {
|
|
|
|
case EFIVAR_OPS_RDONLY:
|
|
|
|
sfi->sb->s_flags |= SB_RDONLY;
|
|
|
|
break;
|
|
|
|
case EFIVAR_OPS_RDWR:
|
|
|
|
sfi->sb->s_flags &= ~SB_RDONLY;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NOTIFY_OK;
|
|
|
|
}
|
|
|
|
|
2013-02-08 09:27:24 -07:00
|
|
|
static void efivarfs_evict_inode(struct inode *inode)
|
|
|
|
{
|
|
|
|
clear_inode(inode);
|
|
|
|
}
|
|
|
|
|
2023-10-19 15:46:39 -07:00
|
|
|
static int efivarfs_show_options(struct seq_file *m, struct dentry *root)
|
|
|
|
{
|
|
|
|
struct super_block *sb = root->d_sb;
|
|
|
|
struct efivarfs_fs_info *sbi = sb->s_fs_info;
|
|
|
|
struct efivarfs_mount_opts *opts = &sbi->mount_opts;
|
|
|
|
|
|
|
|
if (!uid_eq(opts->uid, GLOBAL_ROOT_UID))
|
|
|
|
seq_printf(m, ",uid=%u",
|
|
|
|
from_kuid_munged(&init_user_ns, opts->uid));
|
|
|
|
if (!gid_eq(opts->gid, GLOBAL_ROOT_GID))
|
|
|
|
seq_printf(m, ",gid=%u",
|
|
|
|
from_kgid_munged(&init_user_ns, opts->gid));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-05-17 08:38:12 -07:00
|
|
|
static int efivarfs_statfs(struct dentry *dentry, struct kstatfs *buf)
|
|
|
|
{
|
|
|
|
const u32 attr = EFI_VARIABLE_NON_VOLATILE |
|
|
|
|
EFI_VARIABLE_BOOTSERVICE_ACCESS |
|
|
|
|
EFI_VARIABLE_RUNTIME_ACCESS;
|
|
|
|
u64 storage_space, remaining_space, max_variable_size;
|
fs: report f_fsid from s_dev for "simple" filesystems
There are many "simple" filesystems (*) that report null f_fsid in
statfs(2). Those "simple" filesystems report sb->s_dev as the st_dev
field of the stat syscalls for all inodes of the filesystem (**).
In order to enable fanotify reporting of events with fsid on those
"simple" filesystems, report the sb->s_dev number in f_fsid field of
statfs(2).
(*) For most of the "simple" filesystem refered to in this commit, the
->statfs() operation is simple_statfs(). Some of those fs assign the
simple_statfs() method directly in their ->s_op struct and some assign it
indirectly via a call to simple_fill_super() or to pseudo_fs_fill_super()
with either custom or "simple" s_op.
We also make the same change to efivarfs and hugetlbfs, although they do
not use simple_statfs(), because they use the simple_* inode opreations
(e.g. simple_lookup()).
(**) For most of the "simple" filesystems, the ->getattr() method is not
assigned, so stat() is implemented by generic_fillattr(). A few "simple"
filesystem use the simple_getattr() method which also calls
generic_fillattr() to fill most of the stat struct.
The two exceptions are procfs and 9p. procfs implements several different
->getattr() methods, but they all end up calling generic_fillattr() to
fill the st_dev field from sb->s_dev.
9p has more complicated ->getattr() methods, but they too, end up calling
generic_fillattr() to fill the st_dev field from sb->s_dev.
Note that 9p and kernfs also call simple_statfs() from custom ->statfs()
methods which already fill the f_fsid field, but v9fs_statfs() calls
simple_statfs() only in case f_fsid was not filled and kenrfs_statfs()
overwrites f_fsid after calling simple_statfs().
Link: https://lore.kernel.org/r/20230919094820.g5bwharbmy2dq46w@quack3/
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Link: https://lore.kernel.org/r/20231023143049.2944970-1-amir73il@gmail.com
Reviewed-by: Jan Kara <jack@suse.cz>
Signed-off-by: Christian Brauner <brauner@kernel.org>
2023-10-23 07:30:49 -07:00
|
|
|
u64 id = huge_encode_dev(dentry->d_sb->s_dev);
|
2023-05-17 08:38:12 -07:00
|
|
|
efi_status_t status;
|
|
|
|
|
2023-09-09 21:54:45 -07:00
|
|
|
/* Some UEFI firmware does not implement QueryVariableInfo() */
|
|
|
|
storage_space = remaining_space = 0;
|
|
|
|
if (efi_rt_services_supported(EFI_RT_SUPPORTED_QUERY_VARIABLE_INFO)) {
|
|
|
|
status = efivar_query_variable_info(attr, &storage_space,
|
|
|
|
&remaining_space,
|
|
|
|
&max_variable_size);
|
|
|
|
if (status != EFI_SUCCESS && status != EFI_UNSUPPORTED)
|
|
|
|
pr_warn_ratelimited("query_variable_info() failed: 0x%lx\n",
|
|
|
|
status);
|
|
|
|
}
|
2023-05-17 08:38:12 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* This is not a normal filesystem, so no point in pretending it has a block
|
|
|
|
* size; we declare f_bsize to 1, so that we can then report the exact value
|
|
|
|
* sent by EFI QueryVariableInfo in f_blocks and f_bfree
|
|
|
|
*/
|
|
|
|
buf->f_bsize = 1;
|
|
|
|
buf->f_namelen = NAME_MAX;
|
|
|
|
buf->f_blocks = storage_space;
|
|
|
|
buf->f_bfree = remaining_space;
|
|
|
|
buf->f_type = dentry->d_sb->s_magic;
|
fs: report f_fsid from s_dev for "simple" filesystems
There are many "simple" filesystems (*) that report null f_fsid in
statfs(2). Those "simple" filesystems report sb->s_dev as the st_dev
field of the stat syscalls for all inodes of the filesystem (**).
In order to enable fanotify reporting of events with fsid on those
"simple" filesystems, report the sb->s_dev number in f_fsid field of
statfs(2).
(*) For most of the "simple" filesystem refered to in this commit, the
->statfs() operation is simple_statfs(). Some of those fs assign the
simple_statfs() method directly in their ->s_op struct and some assign it
indirectly via a call to simple_fill_super() or to pseudo_fs_fill_super()
with either custom or "simple" s_op.
We also make the same change to efivarfs and hugetlbfs, although they do
not use simple_statfs(), because they use the simple_* inode opreations
(e.g. simple_lookup()).
(**) For most of the "simple" filesystems, the ->getattr() method is not
assigned, so stat() is implemented by generic_fillattr(). A few "simple"
filesystem use the simple_getattr() method which also calls
generic_fillattr() to fill most of the stat struct.
The two exceptions are procfs and 9p. procfs implements several different
->getattr() methods, but they all end up calling generic_fillattr() to
fill the st_dev field from sb->s_dev.
9p has more complicated ->getattr() methods, but they too, end up calling
generic_fillattr() to fill the st_dev field from sb->s_dev.
Note that 9p and kernfs also call simple_statfs() from custom ->statfs()
methods which already fill the f_fsid field, but v9fs_statfs() calls
simple_statfs() only in case f_fsid was not filled and kenrfs_statfs()
overwrites f_fsid after calling simple_statfs().
Link: https://lore.kernel.org/r/20230919094820.g5bwharbmy2dq46w@quack3/
Signed-off-by: Amir Goldstein <amir73il@gmail.com>
Link: https://lore.kernel.org/r/20231023143049.2944970-1-amir73il@gmail.com
Reviewed-by: Jan Kara <jack@suse.cz>
Signed-off-by: Christian Brauner <brauner@kernel.org>
2023-10-23 07:30:49 -07:00
|
|
|
buf->f_fsid = u64_to_fsid(id);
|
2023-05-17 08:38:12 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* In f_bavail we declare the free space that the kernel will allow writing
|
|
|
|
* when the storage_paranoia x86 quirk is active. To use more, users
|
|
|
|
* should boot the kernel with efi_no_storage_paranoia.
|
|
|
|
*/
|
|
|
|
if (remaining_space > efivar_reserved_space())
|
|
|
|
buf->f_bavail = remaining_space - efivar_reserved_space();
|
|
|
|
else
|
|
|
|
buf->f_bavail = 0;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-02-08 09:27:24 -07:00
|
|
|
static const struct super_operations efivarfs_ops = {
|
2023-05-17 08:38:12 -07:00
|
|
|
.statfs = efivarfs_statfs,
|
2013-02-08 09:27:24 -07:00
|
|
|
.drop_inode = generic_delete_inode,
|
|
|
|
.evict_inode = efivarfs_evict_inode,
|
2023-10-19 15:46:39 -07:00
|
|
|
.show_options = efivarfs_show_options,
|
2013-02-08 09:27:24 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Compare two efivarfs file names.
|
|
|
|
*
|
|
|
|
* An efivarfs filename is composed of two parts,
|
|
|
|
*
|
|
|
|
* 1. A case-sensitive variable name
|
|
|
|
* 2. A case-insensitive GUID
|
|
|
|
*
|
|
|
|
* So we need to perform a case-sensitive match on part 1 and a
|
|
|
|
* case-insensitive match on part 2.
|
|
|
|
*/
|
2016-07-31 13:37:25 -07:00
|
|
|
static int efivarfs_d_compare(const struct dentry *dentry,
|
2013-02-08 09:27:24 -07:00
|
|
|
unsigned int len, const char *str,
|
|
|
|
const struct qstr *name)
|
|
|
|
{
|
|
|
|
int guid = len - EFI_VARIABLE_GUID_LEN;
|
|
|
|
|
|
|
|
if (name->len != len)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Case-sensitive compare for the variable name */
|
|
|
|
if (memcmp(str, name->name, guid))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/* Case-insensitive compare for the GUID */
|
|
|
|
return strncasecmp(name->name + guid, str + guid, EFI_VARIABLE_GUID_LEN);
|
|
|
|
}
|
|
|
|
|
2013-05-21 15:22:44 -07:00
|
|
|
static int efivarfs_d_hash(const struct dentry *dentry, struct qstr *qstr)
|
2013-02-08 09:27:24 -07:00
|
|
|
{
|
2016-06-10 07:51:30 -07:00
|
|
|
unsigned long hash = init_name_hash(dentry);
|
2013-02-08 09:27:24 -07:00
|
|
|
const unsigned char *s = qstr->name;
|
|
|
|
unsigned int len = qstr->len;
|
|
|
|
|
|
|
|
if (!efivarfs_valid_name(s, len))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
while (len-- > EFI_VARIABLE_GUID_LEN)
|
|
|
|
hash = partial_name_hash(*s++, hash);
|
|
|
|
|
|
|
|
/* GUID is case-insensitive. */
|
|
|
|
while (len--)
|
|
|
|
hash = partial_name_hash(tolower(*s++), hash);
|
|
|
|
|
|
|
|
qstr->hash = end_name_hash(hash);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-04 16:11:14 -07:00
|
|
|
static const struct dentry_operations efivarfs_d_ops = {
|
2013-02-08 09:27:24 -07:00
|
|
|
.d_compare = efivarfs_d_compare,
|
|
|
|
.d_hash = efivarfs_d_hash,
|
2013-10-25 15:47:37 -07:00
|
|
|
.d_delete = always_delete_dentry,
|
2013-02-08 09:27:24 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct dentry *efivarfs_alloc_dentry(struct dentry *parent, char *name)
|
|
|
|
{
|
|
|
|
struct dentry *d;
|
|
|
|
struct qstr q;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
q.name = name;
|
|
|
|
q.len = strlen(name);
|
|
|
|
|
2016-06-10 07:51:30 -07:00
|
|
|
err = efivarfs_d_hash(parent, &q);
|
2013-02-08 09:27:24 -07:00
|
|
|
if (err)
|
|
|
|
return ERR_PTR(err);
|
|
|
|
|
|
|
|
d = d_alloc(parent, &q);
|
|
|
|
if (d)
|
|
|
|
return d;
|
|
|
|
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int efivarfs_callback(efi_char16_t *name16, efi_guid_t vendor,
|
2023-12-08 09:39:29 -07:00
|
|
|
unsigned long name_size, void *data,
|
|
|
|
struct list_head *list)
|
2013-02-08 09:27:24 -07:00
|
|
|
{
|
|
|
|
struct super_block *sb = (struct super_block *)data;
|
|
|
|
struct efivar_entry *entry;
|
|
|
|
struct inode *inode = NULL;
|
|
|
|
struct dentry *dentry, *root = sb->s_root;
|
|
|
|
unsigned long size = 0;
|
|
|
|
char *name;
|
2016-02-08 12:48:12 -07:00
|
|
|
int len;
|
2013-02-08 09:27:24 -07:00
|
|
|
int err = -ENOMEM;
|
2016-02-08 12:48:15 -07:00
|
|
|
bool is_removable = false;
|
2013-02-08 09:27:24 -07:00
|
|
|
|
2022-11-21 19:04:00 -07:00
|
|
|
if (guid_equal(&vendor, &LINUX_EFI_RANDOM_SEED_TABLE_GUID))
|
|
|
|
return 0;
|
|
|
|
|
2015-04-02 00:39:00 -07:00
|
|
|
entry = kzalloc(sizeof(*entry), GFP_KERNEL);
|
2013-02-08 09:27:24 -07:00
|
|
|
if (!entry)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
memcpy(entry->var.VariableName, name16, name_size);
|
|
|
|
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
|
|
|
|
|
2016-02-08 12:48:12 -07:00
|
|
|
len = ucs2_utf8size(entry->var.VariableName);
|
2013-02-08 09:27:24 -07:00
|
|
|
|
|
|
|
/* name, plus '-', plus GUID, plus NUL*/
|
|
|
|
name = kmalloc(len + 1 + EFI_VARIABLE_GUID_LEN + 1, GFP_KERNEL);
|
|
|
|
if (!name)
|
|
|
|
goto fail;
|
|
|
|
|
2016-02-08 12:48:12 -07:00
|
|
|
ucs2_as_utf8(name, entry->var.VariableName, len);
|
2013-02-08 09:27:24 -07:00
|
|
|
|
2016-02-08 12:48:15 -07:00
|
|
|
if (efivar_variable_is_removable(entry->var.VendorGuid, name, len))
|
|
|
|
is_removable = true;
|
|
|
|
|
2013-02-08 09:27:24 -07:00
|
|
|
name[len] = '-';
|
|
|
|
|
2014-12-18 08:02:17 -07:00
|
|
|
efi_guid_to_str(&entry->var.VendorGuid, name + len + 1);
|
2013-02-08 09:27:24 -07:00
|
|
|
|
|
|
|
name[len + EFI_VARIABLE_GUID_LEN+1] = '\0';
|
|
|
|
|
2020-09-25 00:45:02 -07:00
|
|
|
/* replace invalid slashes like kobject_set_name_vargs does for /sys/firmware/efi/vars. */
|
|
|
|
strreplace(name, '/', '!');
|
|
|
|
|
2016-02-08 12:48:15 -07:00
|
|
|
inode = efivarfs_get_inode(sb, d_inode(root), S_IFREG | 0644, 0,
|
|
|
|
is_removable);
|
2013-02-08 09:27:24 -07:00
|
|
|
if (!inode)
|
|
|
|
goto fail_name;
|
|
|
|
|
|
|
|
dentry = efivarfs_alloc_dentry(root, name);
|
|
|
|
if (IS_ERR(dentry)) {
|
|
|
|
err = PTR_ERR(dentry);
|
|
|
|
goto fail_inode;
|
|
|
|
}
|
|
|
|
|
efi: vars: Don't drop lock in the middle of efivar_init()
Even though the efivars_lock lock is documented as protecting the
efivars->ops pointer (among other things), efivar_init() happily
releases and reacquires the lock for every EFI variable that it
enumerates. This used to be needed because the lock was originally a
spinlock, which prevented the callback that is invoked for every
variable from being able to sleep. However, releasing the lock could
potentially invalidate the ops pointer, but more importantly, it might
allow a SetVariable() runtime service call to take place concurrently,
and the UEFI spec does not define how this affects an enumeration that
is running in parallel using the GetNextVariable() runtime service,
which is what efivar_init() uses.
In the meantime, the lock has been converted into a semaphore, and the
only reason we need to drop the lock is because the efivarfs pseudo
filesystem driver will otherwise deadlock when it invokes the efivars
API from the callback to create the efivar_entry items and insert them
into the linked list. (EFI pstore is affected in a similar way)
So let's switch to helpers that can be used while the lock is already
taken. This way, we can hold on to the lock throughout the enumeration.
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
2022-06-20 08:04:32 -07:00
|
|
|
__efivar_entry_get(entry, NULL, &size, NULL);
|
2023-12-08 09:39:29 -07:00
|
|
|
__efivar_entry_add(entry, list);
|
2013-02-08 09:27:24 -07:00
|
|
|
|
2016-08-15 07:29:20 -07:00
|
|
|
/* copied by the above to local storage in the dentry. */
|
|
|
|
kfree(name);
|
|
|
|
|
2016-01-22 13:40:57 -07:00
|
|
|
inode_lock(inode);
|
2013-02-08 09:27:24 -07:00
|
|
|
inode->i_private = entry;
|
|
|
|
i_size_write(inode, size + sizeof(entry->var.Attributes));
|
2016-01-22 13:40:57 -07:00
|
|
|
inode_unlock(inode);
|
2013-02-08 09:27:24 -07:00
|
|
|
d_add(dentry, inode);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fail_inode:
|
|
|
|
iput(inode);
|
|
|
|
fail_name:
|
|
|
|
kfree(name);
|
|
|
|
fail:
|
|
|
|
kfree(entry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int efivarfs_destroy(struct efivar_entry *entry, void *data)
|
|
|
|
{
|
2022-06-21 06:48:29 -07:00
|
|
|
efivar_entry_remove(entry);
|
2013-02-08 09:27:24 -07:00
|
|
|
kfree(entry);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-10-19 15:46:39 -07:00
|
|
|
enum {
|
|
|
|
Opt_uid, Opt_gid,
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct fs_parameter_spec efivarfs_parameters[] = {
|
2024-06-27 17:30:56 -07:00
|
|
|
fsparam_uid("uid", Opt_uid),
|
|
|
|
fsparam_gid("gid", Opt_gid),
|
2023-10-19 15:46:39 -07:00
|
|
|
{},
|
|
|
|
};
|
|
|
|
|
|
|
|
static int efivarfs_parse_param(struct fs_context *fc, struct fs_parameter *param)
|
|
|
|
{
|
|
|
|
struct efivarfs_fs_info *sbi = fc->s_fs_info;
|
|
|
|
struct efivarfs_mount_opts *opts = &sbi->mount_opts;
|
|
|
|
struct fs_parse_result result;
|
|
|
|
int opt;
|
|
|
|
|
|
|
|
opt = fs_parse(fc, efivarfs_parameters, param, &result);
|
|
|
|
if (opt < 0)
|
|
|
|
return opt;
|
|
|
|
|
|
|
|
switch (opt) {
|
|
|
|
case Opt_uid:
|
2024-06-27 17:30:56 -07:00
|
|
|
opts->uid = result.uid;
|
2023-10-19 15:46:39 -07:00
|
|
|
break;
|
|
|
|
case Opt_gid:
|
2024-06-27 17:30:56 -07:00
|
|
|
opts->gid = result.gid;
|
2023-10-19 15:46:39 -07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-03-25 09:38:29 -07:00
|
|
|
static int efivarfs_fill_super(struct super_block *sb, struct fs_context *fc)
|
2013-02-08 09:27:24 -07:00
|
|
|
{
|
2023-12-08 09:39:29 -07:00
|
|
|
struct efivarfs_fs_info *sfi = sb->s_fs_info;
|
2013-02-08 09:27:24 -07:00
|
|
|
struct inode *inode = NULL;
|
|
|
|
struct dentry *root;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
sb->s_maxbytes = MAX_LFS_FILESIZE;
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 05:29:47 -07:00
|
|
|
sb->s_blocksize = PAGE_SIZE;
|
|
|
|
sb->s_blocksize_bits = PAGE_SHIFT;
|
2013-02-08 09:27:24 -07:00
|
|
|
sb->s_magic = EFIVARFS_MAGIC;
|
|
|
|
sb->s_op = &efivarfs_ops;
|
|
|
|
sb->s_d_op = &efivarfs_d_ops;
|
|
|
|
sb->s_time_gran = 1;
|
|
|
|
|
2020-07-08 03:01:57 -07:00
|
|
|
if (!efivar_supports_writes())
|
|
|
|
sb->s_flags |= SB_RDONLY;
|
|
|
|
|
2016-02-08 12:48:15 -07:00
|
|
|
inode = efivarfs_get_inode(sb, NULL, S_IFDIR | 0755, 0, true);
|
2013-02-08 09:27:24 -07:00
|
|
|
if (!inode)
|
|
|
|
return -ENOMEM;
|
|
|
|
inode->i_op = &efivarfs_dir_inode_operations;
|
|
|
|
|
|
|
|
root = d_make_root(inode);
|
|
|
|
sb->s_root = root;
|
|
|
|
if (!root)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2023-11-06 22:40:55 -07:00
|
|
|
sfi->sb = sb;
|
|
|
|
sfi->nb.notifier_call = efivarfs_ops_notifier;
|
|
|
|
err = blocking_notifier_chain_register(&efivar_ops_nh, &sfi->nb);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2024-02-24 10:48:14 -07:00
|
|
|
return efivar_init(efivarfs_callback, sb, &sfi->efivarfs_list);
|
2013-02-08 09:27:24 -07:00
|
|
|
}
|
|
|
|
|
2019-03-25 09:38:29 -07:00
|
|
|
static int efivarfs_get_tree(struct fs_context *fc)
|
|
|
|
{
|
|
|
|
return get_tree_single(fc, efivarfs_fill_super);
|
|
|
|
}
|
|
|
|
|
2023-11-06 22:40:56 -07:00
|
|
|
static int efivarfs_reconfigure(struct fs_context *fc)
|
|
|
|
{
|
|
|
|
if (!efivar_supports_writes() && !(fc->sb_flags & SB_RDONLY)) {
|
|
|
|
pr_err("Firmware does not support SetVariableRT. Can not remount with rw\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-03-25 09:38:29 -07:00
|
|
|
static const struct fs_context_operations efivarfs_context_ops = {
|
|
|
|
.get_tree = efivarfs_get_tree,
|
2023-10-19 15:46:39 -07:00
|
|
|
.parse_param = efivarfs_parse_param,
|
2023-11-06 22:40:56 -07:00
|
|
|
.reconfigure = efivarfs_reconfigure,
|
2019-03-25 09:38:29 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
static int efivarfs_init_fs_context(struct fs_context *fc)
|
2013-02-08 09:27:24 -07:00
|
|
|
{
|
2023-10-19 15:46:39 -07:00
|
|
|
struct efivarfs_fs_info *sfi;
|
|
|
|
|
2023-12-08 09:39:27 -07:00
|
|
|
if (!efivar_is_available())
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
2023-10-19 15:46:39 -07:00
|
|
|
sfi = kzalloc(sizeof(*sfi), GFP_KERNEL);
|
|
|
|
if (!sfi)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2023-12-08 09:39:29 -07:00
|
|
|
INIT_LIST_HEAD(&sfi->efivarfs_list);
|
|
|
|
|
2023-10-19 15:46:39 -07:00
|
|
|
sfi->mount_opts.uid = GLOBAL_ROOT_UID;
|
|
|
|
sfi->mount_opts.gid = GLOBAL_ROOT_GID;
|
|
|
|
|
|
|
|
fc->s_fs_info = sfi;
|
2019-03-25 09:38:29 -07:00
|
|
|
fc->ops = &efivarfs_context_ops;
|
|
|
|
return 0;
|
2013-02-08 09:27:24 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void efivarfs_kill_sb(struct super_block *sb)
|
|
|
|
{
|
2023-12-08 09:39:28 -07:00
|
|
|
struct efivarfs_fs_info *sfi = sb->s_fs_info;
|
|
|
|
|
2023-11-06 22:40:55 -07:00
|
|
|
blocking_notifier_chain_unregister(&efivar_ops_nh, &sfi->nb);
|
2013-02-08 09:27:24 -07:00
|
|
|
kill_litter_super(sb);
|
|
|
|
|
|
|
|
/* Remove all entries and destroy */
|
2023-12-08 09:39:29 -07:00
|
|
|
efivar_entry_iter(efivarfs_destroy, &sfi->efivarfs_list, NULL);
|
2023-12-08 09:39:28 -07:00
|
|
|
kfree(sfi);
|
2013-02-08 09:27:24 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct file_system_type efivarfs_type = {
|
2014-10-23 14:20:37 -07:00
|
|
|
.owner = THIS_MODULE,
|
2013-02-08 09:27:24 -07:00
|
|
|
.name = "efivarfs",
|
2019-03-25 09:38:29 -07:00
|
|
|
.init_fs_context = efivarfs_init_fs_context,
|
2013-02-08 09:27:24 -07:00
|
|
|
.kill_sb = efivarfs_kill_sb,
|
2023-10-19 15:46:39 -07:00
|
|
|
.parameters = efivarfs_parameters,
|
2013-02-08 09:27:24 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
static __init int efivarfs_init(void)
|
|
|
|
{
|
|
|
|
return register_filesystem(&efivarfs_type);
|
|
|
|
}
|
|
|
|
|
2014-10-23 14:20:37 -07:00
|
|
|
static __exit void efivarfs_exit(void)
|
|
|
|
{
|
|
|
|
unregister_filesystem(&efivarfs_type);
|
|
|
|
}
|
|
|
|
|
2013-02-08 09:27:24 -07:00
|
|
|
MODULE_AUTHOR("Matthew Garrett, Jeremy Kerr");
|
|
|
|
MODULE_DESCRIPTION("EFI Variable Filesystem");
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_ALIAS_FS("efivarfs");
|
|
|
|
|
|
|
|
module_init(efivarfs_init);
|
2014-10-23 14:20:37 -07:00
|
|
|
module_exit(efivarfs_exit);
|