mm: shmem: allow freezing inode mapping
To prepare a shmem inode for live update, its index -> folio mappings must be serialized. Once the mappings are serialized, they cannot change since it would cause the serialized data to become inconsistent. This can be done by pinning the folios to avoid migration, and by making sure no folios can be added to or removed from the inode. While mechanisms to pin folios already exist, the only way to stop folios being added or removed are the grow and shrink file seals. But file seals come with their own semantics, one of which is that they can't be removed. This doesn't work with liveupdate since it can be cancelled or error out, which would need the seals to be removed and the file's normal functionality to be restored. Introduce SHMEM_F_MAPPING_FROZEN to indicate this instead. It is internal to shmem and is not directly exposed to userspace. It functions similar to F_SEAL_GROW | F_SEAL_SHRINK, but additionally disallows hole punching, and can be removed. Link: https://lkml.kernel.org/r/20251125165850.3389713-12-pasha.tatashin@soleen.com Signed-off-by: Pratyush Yadav <ptyadav@amazon.de> Signed-off-by: Pasha Tatashin <pasha.tatashin@soleen.com> Reviewed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> Tested-by: David Matlack <dmatlack@google.com> Cc: Aleksander Lobakin <aleksander.lobakin@intel.com> Cc: Alexander Graf <graf@amazon.com> Cc: Alice Ryhl <aliceryhl@google.com> Cc: Andriy Shevchenko <andriy.shevchenko@linux.intel.com> Cc: anish kumar <yesanishhere@gmail.com> Cc: Anna Schumaker <anna.schumaker@oracle.com> Cc: Bartosz Golaszewski <bartosz.golaszewski@linaro.org> Cc: Bjorn Helgaas <bhelgaas@google.com> Cc: Borislav Betkov <bp@alien8.de> Cc: Chanwoo Choi <cw00.choi@samsung.com> Cc: Chen Ridong <chenridong@huawei.com> Cc: Chris Li <chrisl@kernel.org> Cc: Christian Brauner <brauner@kernel.org> Cc: Daniel Wagner <wagi@kernel.org> Cc: Danilo Krummrich <dakr@kernel.org> Cc: Dan Williams <dan.j.williams@intel.com> Cc: David Hildenbrand <david@redhat.com> Cc: David Jeffery <djeffery@redhat.com> Cc: David Rientjes <rientjes@google.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Guixin Liu <kanie@linux.alibaba.com> Cc: "H. Peter Anvin" <hpa@zytor.com> Cc: Hugh Dickins <hughd@google.com> Cc: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com> Cc: Ingo Molnar <mingo@redhat.com> Cc: Ira Weiny <ira.weiny@intel.com> Cc: Jann Horn <jannh@google.com> Cc: Jason Gunthorpe <jgg@nvidia.com> Cc: Jens Axboe <axboe@kernel.dk> Cc: Joanthan Cameron <Jonathan.Cameron@huawei.com> Cc: Joel Granados <joel.granados@kernel.org> Cc: Johannes Weiner <hannes@cmpxchg.org> Cc: Jonathan Corbet <corbet@lwn.net> Cc: Lennart Poettering <lennart@poettering.net> Cc: Leon Romanovsky <leon@kernel.org> Cc: Leon Romanovsky <leonro@nvidia.com> Cc: Lukas Wunner <lukas@wunner.de> Cc: Marc Rutland <mark.rutland@arm.com> Cc: Masahiro Yamada <masahiroy@kernel.org> Cc: Matthew Maurer <mmaurer@google.com> Cc: Miguel Ojeda <ojeda@kernel.org> Cc: Myugnjoo Ham <myungjoo.ham@samsung.com> Cc: Parav Pandit <parav@nvidia.com> Cc: Pratyush Yadav <pratyush@kernel.org> Cc: Randy Dunlap <rdunlap@infradead.org> Cc: Roman Gushchin <roman.gushchin@linux.dev> Cc: Saeed Mahameed <saeedm@nvidia.com> Cc: Samiullah Khawaja <skhawaja@google.com> Cc: Song Liu <song@kernel.org> Cc: Steven Rostedt <rostedt@goodmis.org> Cc: Stuart Hayes <stuart.w.hayes@gmail.com> Cc: Tejun Heo <tj@kernel.org> Cc: Thomas Gleinxer <tglx@linutronix.de> Cc: Thomas Weißschuh <linux@weissschuh.net> Cc: Vincent Guittot <vincent.guittot@linaro.org> Cc: William Tu <witu@nvidia.com> Cc: Yoann Congal <yoann.congal@smile.fr> Cc: Zhu Yanjun <yanjun.zhu@linux.dev> Cc: Zijun Hu <quic_zijuhu@quicinc.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org>pull/1354/merge
parent
6ff1610ced
commit
e165e2a257
|
|
@ -24,6 +24,14 @@ struct swap_iocb;
|
|||
#define SHMEM_F_NORESERVE BIT(0)
|
||||
/* Disallow swapping. */
|
||||
#define SHMEM_F_LOCKED BIT(1)
|
||||
/*
|
||||
* Disallow growing, shrinking, or hole punching in the inode. Combined with
|
||||
* folio pinning, makes sure the inode's mapping stays fixed.
|
||||
*
|
||||
* In some ways similar to F_SEAL_GROW | F_SEAL_SHRINK, but can be removed and
|
||||
* isn't directly visible to userspace.
|
||||
*/
|
||||
#define SHMEM_F_MAPPING_FROZEN BIT(2)
|
||||
|
||||
struct shmem_inode_info {
|
||||
spinlock_t lock;
|
||||
|
|
@ -186,6 +194,15 @@ static inline bool shmem_file(struct file *file)
|
|||
return shmem_mapping(file->f_mapping);
|
||||
}
|
||||
|
||||
/* Must be called with inode lock taken exclusive. */
|
||||
static inline void shmem_freeze(struct inode *inode, bool freeze)
|
||||
{
|
||||
if (freeze)
|
||||
SHMEM_I(inode)->flags |= SHMEM_F_MAPPING_FROZEN;
|
||||
else
|
||||
SHMEM_I(inode)->flags &= ~SHMEM_F_MAPPING_FROZEN;
|
||||
}
|
||||
|
||||
/*
|
||||
* If fallocate(FALLOC_FL_KEEP_SIZE) has been used, there may be pages
|
||||
* beyond i_size's notion of EOF, which fallocate has committed to reserving:
|
||||
|
|
|
|||
11
mm/shmem.c
11
mm/shmem.c
|
|
@ -1297,6 +1297,8 @@ static int shmem_setattr(struct mnt_idmap *idmap,
|
|||
return -EPERM;
|
||||
|
||||
if (newsize != oldsize) {
|
||||
if (info->flags & SHMEM_F_MAPPING_FROZEN)
|
||||
return -EPERM;
|
||||
error = shmem_reacct_size(SHMEM_I(inode)->flags,
|
||||
oldsize, newsize);
|
||||
if (error)
|
||||
|
|
@ -3289,6 +3291,10 @@ shmem_write_begin(const struct kiocb *iocb, struct address_space *mapping,
|
|||
return -EPERM;
|
||||
}
|
||||
|
||||
if (unlikely((info->flags & SHMEM_F_MAPPING_FROZEN) &&
|
||||
pos + len > inode->i_size))
|
||||
return -EPERM;
|
||||
|
||||
ret = shmem_get_folio(inode, index, pos + len, &folio, SGP_WRITE);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
|
@ -3662,6 +3668,11 @@ static long shmem_fallocate(struct file *file, int mode, loff_t offset,
|
|||
|
||||
inode_lock(inode);
|
||||
|
||||
if (info->flags & SHMEM_F_MAPPING_FROZEN) {
|
||||
error = -EPERM;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (mode & FALLOC_FL_PUNCH_HOLE) {
|
||||
struct address_space *mapping = file->f_mapping;
|
||||
loff_t unmap_start = round_up(offset, PAGE_SIZE);
|
||||
|
|
|
|||
Loading…
Reference in New Issue