VFS: Uninline the function put_mnt_ns()
[deliverable/linux.git] / fs / fuse / dev.c
CommitLineData
334f485d
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
334f485d
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/init.h>
12#include <linux/module.h>
13#include <linux/poll.h>
14#include <linux/uio.h>
15#include <linux/miscdevice.h>
16#include <linux/pagemap.h>
17#include <linux/file.h>
18#include <linux/slab.h>
19
20MODULE_ALIAS_MISCDEV(FUSE_MINOR);
21
e18b890b 22static struct kmem_cache *fuse_req_cachep;
334f485d 23
8bfc016d 24static struct fuse_conn *fuse_get_conn(struct file *file)
334f485d 25{
0720b315
MS
26 /*
27 * Lockless access is OK, because file->private data is set
28 * once during mount and is valid until the file is released.
29 */
30 return file->private_data;
334f485d
MS
31}
32
8bfc016d 33static void fuse_request_init(struct fuse_req *req)
334f485d
MS
34{
35 memset(req, 0, sizeof(*req));
36 INIT_LIST_HEAD(&req->list);
a4d27e75 37 INIT_LIST_HEAD(&req->intr_entry);
334f485d
MS
38 init_waitqueue_head(&req->waitq);
39 atomic_set(&req->count, 1);
40}
41
42struct fuse_req *fuse_request_alloc(void)
43{
e94b1766 44 struct fuse_req *req = kmem_cache_alloc(fuse_req_cachep, GFP_KERNEL);
334f485d
MS
45 if (req)
46 fuse_request_init(req);
47 return req;
48}
08cbf542 49EXPORT_SYMBOL_GPL(fuse_request_alloc);
334f485d 50
3be5a52b
MS
51struct fuse_req *fuse_request_alloc_nofs(void)
52{
53 struct fuse_req *req = kmem_cache_alloc(fuse_req_cachep, GFP_NOFS);
54 if (req)
55 fuse_request_init(req);
56 return req;
57}
58
334f485d
MS
59void fuse_request_free(struct fuse_req *req)
60{
61 kmem_cache_free(fuse_req_cachep, req);
62}
63
8bfc016d 64static void block_sigs(sigset_t *oldset)
334f485d
MS
65{
66 sigset_t mask;
67
68 siginitsetinv(&mask, sigmask(SIGKILL));
69 sigprocmask(SIG_BLOCK, &mask, oldset);
70}
71
8bfc016d 72static void restore_sigs(sigset_t *oldset)
334f485d
MS
73{
74 sigprocmask(SIG_SETMASK, oldset, NULL);
75}
76
334f485d
MS
77static void __fuse_get_request(struct fuse_req *req)
78{
79 atomic_inc(&req->count);
80}
81
82/* Must be called with > 1 refcount */
83static void __fuse_put_request(struct fuse_req *req)
84{
85 BUG_ON(atomic_read(&req->count) < 2);
86 atomic_dec(&req->count);
87}
88
33649c91
MS
89static void fuse_req_init_context(struct fuse_req *req)
90{
2186a71c
DH
91 req->in.h.uid = current_fsuid();
92 req->in.h.gid = current_fsgid();
33649c91
MS
93 req->in.h.pid = current->pid;
94}
95
ce1d5a49 96struct fuse_req *fuse_get_req(struct fuse_conn *fc)
334f485d 97{
08a53cdc
MS
98 struct fuse_req *req;
99 sigset_t oldset;
9bc5ddda 100 int intr;
08a53cdc
MS
101 int err;
102
9bc5ddda 103 atomic_inc(&fc->num_waiting);
08a53cdc 104 block_sigs(&oldset);
9bc5ddda 105 intr = wait_event_interruptible(fc->blocked_waitq, !fc->blocked);
08a53cdc 106 restore_sigs(&oldset);
9bc5ddda
MS
107 err = -EINTR;
108 if (intr)
109 goto out;
08a53cdc 110
51eb01e7
MS
111 err = -ENOTCONN;
112 if (!fc->connected)
113 goto out;
114
08a53cdc 115 req = fuse_request_alloc();
9bc5ddda 116 err = -ENOMEM;
ce1d5a49 117 if (!req)
9bc5ddda 118 goto out;
334f485d 119
33649c91 120 fuse_req_init_context(req);
9bc5ddda 121 req->waiting = 1;
334f485d 122 return req;
9bc5ddda
MS
123
124 out:
125 atomic_dec(&fc->num_waiting);
126 return ERR_PTR(err);
334f485d 127}
08cbf542 128EXPORT_SYMBOL_GPL(fuse_get_req);
334f485d 129
33649c91
MS
130/*
131 * Return request in fuse_file->reserved_req. However that may
132 * currently be in use. If that is the case, wait for it to become
133 * available.
134 */
135static struct fuse_req *get_reserved_req(struct fuse_conn *fc,
136 struct file *file)
137{
138 struct fuse_req *req = NULL;
139 struct fuse_file *ff = file->private_data;
140
141 do {
de5e3dec 142 wait_event(fc->reserved_req_waitq, ff->reserved_req);
33649c91
MS
143 spin_lock(&fc->lock);
144 if (ff->reserved_req) {
145 req = ff->reserved_req;
146 ff->reserved_req = NULL;
147 get_file(file);
148 req->stolen_file = file;
149 }
150 spin_unlock(&fc->lock);
151 } while (!req);
152
153 return req;
154}
155
156/*
157 * Put stolen request back into fuse_file->reserved_req
158 */
159static void put_reserved_req(struct fuse_conn *fc, struct fuse_req *req)
160{
161 struct file *file = req->stolen_file;
162 struct fuse_file *ff = file->private_data;
163
164 spin_lock(&fc->lock);
165 fuse_request_init(req);
166 BUG_ON(ff->reserved_req);
167 ff->reserved_req = req;
de5e3dec 168 wake_up_all(&fc->reserved_req_waitq);
33649c91
MS
169 spin_unlock(&fc->lock);
170 fput(file);
171}
172
173/*
174 * Gets a requests for a file operation, always succeeds
175 *
176 * This is used for sending the FLUSH request, which must get to
177 * userspace, due to POSIX locks which may need to be unlocked.
178 *
179 * If allocation fails due to OOM, use the reserved request in
180 * fuse_file.
181 *
182 * This is very unlikely to deadlock accidentally, since the
183 * filesystem should not have it's own file open. If deadlock is
184 * intentional, it can still be broken by "aborting" the filesystem.
185 */
186struct fuse_req *fuse_get_req_nofail(struct fuse_conn *fc, struct file *file)
187{
188 struct fuse_req *req;
189
190 atomic_inc(&fc->num_waiting);
191 wait_event(fc->blocked_waitq, !fc->blocked);
192 req = fuse_request_alloc();
193 if (!req)
194 req = get_reserved_req(fc, file);
195
196 fuse_req_init_context(req);
197 req->waiting = 1;
198 return req;
199}
200
334f485d 201void fuse_put_request(struct fuse_conn *fc, struct fuse_req *req)
7128ec2a
MS
202{
203 if (atomic_dec_and_test(&req->count)) {
9bc5ddda
MS
204 if (req->waiting)
205 atomic_dec(&fc->num_waiting);
33649c91
MS
206
207 if (req->stolen_file)
208 put_reserved_req(fc, req);
209 else
210 fuse_request_free(req);
7128ec2a
MS
211 }
212}
08cbf542 213EXPORT_SYMBOL_GPL(fuse_put_request);
7128ec2a 214
d12def1b
MS
215static unsigned len_args(unsigned numargs, struct fuse_arg *args)
216{
217 unsigned nbytes = 0;
218 unsigned i;
219
220 for (i = 0; i < numargs; i++)
221 nbytes += args[i].size;
222
223 return nbytes;
224}
225
226static u64 fuse_get_unique(struct fuse_conn *fc)
227{
228 fc->reqctr++;
229 /* zero is special */
230 if (fc->reqctr == 0)
231 fc->reqctr = 1;
232
233 return fc->reqctr;
234}
235
236static void queue_request(struct fuse_conn *fc, struct fuse_req *req)
237{
238 req->in.h.unique = fuse_get_unique(fc);
239 req->in.h.len = sizeof(struct fuse_in_header) +
240 len_args(req->in.numargs, (struct fuse_arg *) req->in.args);
241 list_add_tail(&req->list, &fc->pending);
242 req->state = FUSE_REQ_PENDING;
243 if (!req->waiting) {
244 req->waiting = 1;
245 atomic_inc(&fc->num_waiting);
246 }
247 wake_up(&fc->waitq);
248 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
249}
250
251static void flush_bg_queue(struct fuse_conn *fc)
252{
253 while (fc->active_background < FUSE_MAX_BACKGROUND &&
254 !list_empty(&fc->bg_queue)) {
255 struct fuse_req *req;
256
257 req = list_entry(fc->bg_queue.next, struct fuse_req, list);
258 list_del(&req->list);
259 fc->active_background++;
260 queue_request(fc, req);
261 }
262}
263
334f485d
MS
264/*
265 * This function is called when a request is finished. Either a reply
f9a2842e 266 * has arrived or it was aborted (and not yet sent) or some error
f43b155a 267 * occurred during communication with userspace, or the device file
51eb01e7
MS
268 * was closed. The requester thread is woken up (if still waiting),
269 * the 'end' callback is called if given, else the reference to the
270 * request is released
7128ec2a 271 *
d7133114 272 * Called with fc->lock, unlocks it
334f485d
MS
273 */
274static void request_end(struct fuse_conn *fc, struct fuse_req *req)
5d9ec854 275__releases(&fc->lock)
334f485d 276{
51eb01e7
MS
277 void (*end) (struct fuse_conn *, struct fuse_req *) = req->end;
278 req->end = NULL;
d77a1d5b 279 list_del(&req->list);
a4d27e75 280 list_del(&req->intr_entry);
83cfd493 281 req->state = FUSE_REQ_FINISHED;
51eb01e7
MS
282 if (req->background) {
283 if (fc->num_background == FUSE_MAX_BACKGROUND) {
284 fc->blocked = 0;
285 wake_up_all(&fc->blocked_waitq);
286 }
26c36791 287 if (fc->num_background == FUSE_CONGESTION_THRESHOLD &&
a325f9b9 288 fc->connected && fc->bdi_initialized) {
f92b99b9
MS
289 clear_bdi_congested(&fc->bdi, READ);
290 clear_bdi_congested(&fc->bdi, WRITE);
291 }
51eb01e7 292 fc->num_background--;
d12def1b
MS
293 fc->active_background--;
294 flush_bg_queue(fc);
334f485d 295 }
51eb01e7 296 spin_unlock(&fc->lock);
51eb01e7
MS
297 wake_up(&req->waitq);
298 if (end)
299 end(fc, req);
e9bb09dd 300 fuse_put_request(fc, req);
334f485d
MS
301}
302
a4d27e75
MS
303static void wait_answer_interruptible(struct fuse_conn *fc,
304 struct fuse_req *req)
5d9ec854
HH
305__releases(&fc->lock)
306__acquires(&fc->lock)
a4d27e75
MS
307{
308 if (signal_pending(current))
309 return;
310
311 spin_unlock(&fc->lock);
312 wait_event_interruptible(req->waitq, req->state == FUSE_REQ_FINISHED);
313 spin_lock(&fc->lock);
314}
315
316static void queue_interrupt(struct fuse_conn *fc, struct fuse_req *req)
317{
318 list_add_tail(&req->intr_entry, &fc->interrupts);
319 wake_up(&fc->waitq);
320 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
321}
322
7c352bdf 323static void request_wait_answer(struct fuse_conn *fc, struct fuse_req *req)
5d9ec854
HH
324__releases(&fc->lock)
325__acquires(&fc->lock)
334f485d 326{
a4d27e75
MS
327 if (!fc->no_interrupt) {
328 /* Any signal may interrupt this */
329 wait_answer_interruptible(fc, req);
334f485d 330
a4d27e75
MS
331 if (req->aborted)
332 goto aborted;
333 if (req->state == FUSE_REQ_FINISHED)
334 return;
335
336 req->interrupted = 1;
337 if (req->state == FUSE_REQ_SENT)
338 queue_interrupt(fc, req);
339 }
340
a131de0a 341 if (!req->force) {
a4d27e75
MS
342 sigset_t oldset;
343
344 /* Only fatal signals may interrupt this */
51eb01e7 345 block_sigs(&oldset);
a4d27e75 346 wait_answer_interruptible(fc, req);
51eb01e7 347 restore_sigs(&oldset);
a131de0a
MS
348
349 if (req->aborted)
350 goto aborted;
351 if (req->state == FUSE_REQ_FINISHED)
352 return;
353
354 /* Request is not yet in userspace, bail out */
355 if (req->state == FUSE_REQ_PENDING) {
356 list_del(&req->list);
357 __fuse_put_request(req);
358 req->out.h.error = -EINTR;
359 return;
360 }
51eb01e7 361 }
334f485d 362
a131de0a
MS
363 /*
364 * Either request is already in userspace, or it was forced.
365 * Wait it out.
366 */
367 spin_unlock(&fc->lock);
368 wait_event(req->waitq, req->state == FUSE_REQ_FINISHED);
369 spin_lock(&fc->lock);
a4d27e75 370
a131de0a
MS
371 if (!req->aborted)
372 return;
a4d27e75
MS
373
374 aborted:
a131de0a 375 BUG_ON(req->state != FUSE_REQ_FINISHED);
334f485d
MS
376 if (req->locked) {
377 /* This is uninterruptible sleep, because data is
378 being copied to/from the buffers of req. During
379 locked state, there mustn't be any filesystem
380 operation (e.g. page fault), since that could lead
381 to deadlock */
d7133114 382 spin_unlock(&fc->lock);
334f485d 383 wait_event(req->waitq, !req->locked);
d7133114 384 spin_lock(&fc->lock);
334f485d 385 }
334f485d
MS
386}
387
b93f858a 388void fuse_request_send(struct fuse_conn *fc, struct fuse_req *req)
334f485d
MS
389{
390 req->isreply = 1;
d7133114 391 spin_lock(&fc->lock);
1e9a4ed9 392 if (!fc->connected)
334f485d
MS
393 req->out.h.error = -ENOTCONN;
394 else if (fc->conn_error)
395 req->out.h.error = -ECONNREFUSED;
396 else {
397 queue_request(fc, req);
398 /* acquire extra reference, since request is still needed
399 after request_end() */
400 __fuse_get_request(req);
401
7c352bdf 402 request_wait_answer(fc, req);
334f485d 403 }
d7133114 404 spin_unlock(&fc->lock);
334f485d 405}
08cbf542 406EXPORT_SYMBOL_GPL(fuse_request_send);
334f485d 407
b93f858a
TH
408static void fuse_request_send_nowait_locked(struct fuse_conn *fc,
409 struct fuse_req *req)
d12def1b
MS
410{
411 req->background = 1;
412 fc->num_background++;
413 if (fc->num_background == FUSE_MAX_BACKGROUND)
414 fc->blocked = 1;
a325f9b9
TH
415 if (fc->num_background == FUSE_CONGESTION_THRESHOLD &&
416 fc->bdi_initialized) {
d12def1b
MS
417 set_bdi_congested(&fc->bdi, READ);
418 set_bdi_congested(&fc->bdi, WRITE);
419 }
420 list_add_tail(&req->list, &fc->bg_queue);
421 flush_bg_queue(fc);
422}
423
b93f858a 424static void fuse_request_send_nowait(struct fuse_conn *fc, struct fuse_req *req)
334f485d 425{
d7133114 426 spin_lock(&fc->lock);
1e9a4ed9 427 if (fc->connected) {
b93f858a 428 fuse_request_send_nowait_locked(fc, req);
d7133114 429 spin_unlock(&fc->lock);
334f485d
MS
430 } else {
431 req->out.h.error = -ENOTCONN;
432 request_end(fc, req);
433 }
434}
435
b93f858a 436void fuse_request_send_noreply(struct fuse_conn *fc, struct fuse_req *req)
334f485d
MS
437{
438 req->isreply = 0;
b93f858a 439 fuse_request_send_nowait(fc, req);
334f485d
MS
440}
441
b93f858a 442void fuse_request_send_background(struct fuse_conn *fc, struct fuse_req *req)
334f485d
MS
443{
444 req->isreply = 1;
b93f858a 445 fuse_request_send_nowait(fc, req);
334f485d 446}
08cbf542 447EXPORT_SYMBOL_GPL(fuse_request_send_background);
334f485d 448
3be5a52b
MS
449/*
450 * Called under fc->lock
451 *
452 * fc->connected must have been checked previously
453 */
b93f858a
TH
454void fuse_request_send_background_locked(struct fuse_conn *fc,
455 struct fuse_req *req)
3be5a52b
MS
456{
457 req->isreply = 1;
b93f858a 458 fuse_request_send_nowait_locked(fc, req);
3be5a52b
MS
459}
460
334f485d
MS
461/*
462 * Lock the request. Up to the next unlock_request() there mustn't be
463 * anything that could cause a page-fault. If the request was already
f9a2842e 464 * aborted bail out.
334f485d 465 */
d7133114 466static int lock_request(struct fuse_conn *fc, struct fuse_req *req)
334f485d
MS
467{
468 int err = 0;
469 if (req) {
d7133114 470 spin_lock(&fc->lock);
f9a2842e 471 if (req->aborted)
334f485d
MS
472 err = -ENOENT;
473 else
474 req->locked = 1;
d7133114 475 spin_unlock(&fc->lock);
334f485d
MS
476 }
477 return err;
478}
479
480/*
f9a2842e 481 * Unlock request. If it was aborted during being locked, the
334f485d
MS
482 * requester thread is currently waiting for it to be unlocked, so
483 * wake it up.
484 */
d7133114 485static void unlock_request(struct fuse_conn *fc, struct fuse_req *req)
334f485d
MS
486{
487 if (req) {
d7133114 488 spin_lock(&fc->lock);
334f485d 489 req->locked = 0;
f9a2842e 490 if (req->aborted)
334f485d 491 wake_up(&req->waitq);
d7133114 492 spin_unlock(&fc->lock);
334f485d
MS
493 }
494}
495
496struct fuse_copy_state {
d7133114 497 struct fuse_conn *fc;
334f485d
MS
498 int write;
499 struct fuse_req *req;
500 const struct iovec *iov;
501 unsigned long nr_segs;
502 unsigned long seglen;
503 unsigned long addr;
504 struct page *pg;
505 void *mapaddr;
506 void *buf;
507 unsigned len;
508};
509
d7133114
MS
510static void fuse_copy_init(struct fuse_copy_state *cs, struct fuse_conn *fc,
511 int write, struct fuse_req *req,
512 const struct iovec *iov, unsigned long nr_segs)
334f485d
MS
513{
514 memset(cs, 0, sizeof(*cs));
d7133114 515 cs->fc = fc;
334f485d
MS
516 cs->write = write;
517 cs->req = req;
518 cs->iov = iov;
519 cs->nr_segs = nr_segs;
520}
521
522/* Unmap and put previous page of userspace buffer */
8bfc016d 523static void fuse_copy_finish(struct fuse_copy_state *cs)
334f485d
MS
524{
525 if (cs->mapaddr) {
526 kunmap_atomic(cs->mapaddr, KM_USER0);
527 if (cs->write) {
528 flush_dcache_page(cs->pg);
529 set_page_dirty_lock(cs->pg);
530 }
531 put_page(cs->pg);
532 cs->mapaddr = NULL;
533 }
534}
535
536/*
537 * Get another pagefull of userspace buffer, and map it to kernel
538 * address space, and lock request
539 */
540static int fuse_copy_fill(struct fuse_copy_state *cs)
541{
542 unsigned long offset;
543 int err;
544
d7133114 545 unlock_request(cs->fc, cs->req);
334f485d
MS
546 fuse_copy_finish(cs);
547 if (!cs->seglen) {
548 BUG_ON(!cs->nr_segs);
549 cs->seglen = cs->iov[0].iov_len;
550 cs->addr = (unsigned long) cs->iov[0].iov_base;
1729a16c
MS
551 cs->iov++;
552 cs->nr_segs--;
334f485d
MS
553 }
554 down_read(&current->mm->mmap_sem);
555 err = get_user_pages(current, current->mm, cs->addr, 1, cs->write, 0,
556 &cs->pg, NULL);
557 up_read(&current->mm->mmap_sem);
558 if (err < 0)
559 return err;
560 BUG_ON(err != 1);
561 offset = cs->addr % PAGE_SIZE;
562 cs->mapaddr = kmap_atomic(cs->pg, KM_USER0);
563 cs->buf = cs->mapaddr + offset;
564 cs->len = min(PAGE_SIZE - offset, cs->seglen);
565 cs->seglen -= cs->len;
566 cs->addr += cs->len;
567
d7133114 568 return lock_request(cs->fc, cs->req);
334f485d
MS
569}
570
571/* Do as much copy to/from userspace buffer as we can */
8bfc016d 572static int fuse_copy_do(struct fuse_copy_state *cs, void **val, unsigned *size)
334f485d
MS
573{
574 unsigned ncpy = min(*size, cs->len);
575 if (val) {
576 if (cs->write)
577 memcpy(cs->buf, *val, ncpy);
578 else
579 memcpy(*val, cs->buf, ncpy);
580 *val += ncpy;
581 }
582 *size -= ncpy;
583 cs->len -= ncpy;
584 cs->buf += ncpy;
585 return ncpy;
586}
587
588/*
589 * Copy a page in the request to/from the userspace buffer. Must be
590 * done atomically
591 */
8bfc016d
MS
592static int fuse_copy_page(struct fuse_copy_state *cs, struct page *page,
593 unsigned offset, unsigned count, int zeroing)
334f485d
MS
594{
595 if (page && zeroing && count < PAGE_SIZE) {
596 void *mapaddr = kmap_atomic(page, KM_USER1);
597 memset(mapaddr, 0, PAGE_SIZE);
598 kunmap_atomic(mapaddr, KM_USER1);
599 }
600 while (count) {
1729a16c
MS
601 if (!cs->len) {
602 int err = fuse_copy_fill(cs);
603 if (err)
604 return err;
605 }
334f485d
MS
606 if (page) {
607 void *mapaddr = kmap_atomic(page, KM_USER1);
608 void *buf = mapaddr + offset;
609 offset += fuse_copy_do(cs, &buf, &count);
610 kunmap_atomic(mapaddr, KM_USER1);
611 } else
612 offset += fuse_copy_do(cs, NULL, &count);
613 }
614 if (page && !cs->write)
615 flush_dcache_page(page);
616 return 0;
617}
618
619/* Copy pages in the request to/from userspace buffer */
620static int fuse_copy_pages(struct fuse_copy_state *cs, unsigned nbytes,
621 int zeroing)
622{
623 unsigned i;
624 struct fuse_req *req = cs->req;
625 unsigned offset = req->page_offset;
626 unsigned count = min(nbytes, (unsigned) PAGE_SIZE - offset);
627
628 for (i = 0; i < req->num_pages && (nbytes || zeroing); i++) {
629 struct page *page = req->pages[i];
630 int err = fuse_copy_page(cs, page, offset, count, zeroing);
631 if (err)
632 return err;
633
634 nbytes -= count;
635 count = min(nbytes, (unsigned) PAGE_SIZE);
636 offset = 0;
637 }
638 return 0;
639}
640
641/* Copy a single argument in the request to/from userspace buffer */
642static int fuse_copy_one(struct fuse_copy_state *cs, void *val, unsigned size)
643{
644 while (size) {
1729a16c
MS
645 if (!cs->len) {
646 int err = fuse_copy_fill(cs);
647 if (err)
648 return err;
649 }
334f485d
MS
650 fuse_copy_do(cs, &val, &size);
651 }
652 return 0;
653}
654
655/* Copy request arguments to/from userspace buffer */
656static int fuse_copy_args(struct fuse_copy_state *cs, unsigned numargs,
657 unsigned argpages, struct fuse_arg *args,
658 int zeroing)
659{
660 int err = 0;
661 unsigned i;
662
663 for (i = 0; !err && i < numargs; i++) {
664 struct fuse_arg *arg = &args[i];
665 if (i == numargs - 1 && argpages)
666 err = fuse_copy_pages(cs, arg->size, zeroing);
667 else
668 err = fuse_copy_one(cs, arg->value, arg->size);
669 }
670 return err;
671}
672
a4d27e75
MS
673static int request_pending(struct fuse_conn *fc)
674{
675 return !list_empty(&fc->pending) || !list_empty(&fc->interrupts);
676}
677
334f485d
MS
678/* Wait until a request is available on the pending list */
679static void request_wait(struct fuse_conn *fc)
5d9ec854
HH
680__releases(&fc->lock)
681__acquires(&fc->lock)
334f485d
MS
682{
683 DECLARE_WAITQUEUE(wait, current);
684
685 add_wait_queue_exclusive(&fc->waitq, &wait);
a4d27e75 686 while (fc->connected && !request_pending(fc)) {
334f485d
MS
687 set_current_state(TASK_INTERRUPTIBLE);
688 if (signal_pending(current))
689 break;
690
d7133114 691 spin_unlock(&fc->lock);
334f485d 692 schedule();
d7133114 693 spin_lock(&fc->lock);
334f485d
MS
694 }
695 set_current_state(TASK_RUNNING);
696 remove_wait_queue(&fc->waitq, &wait);
697}
698
a4d27e75
MS
699/*
700 * Transfer an interrupt request to userspace
701 *
702 * Unlike other requests this is assembled on demand, without a need
703 * to allocate a separate fuse_req structure.
704 *
705 * Called with fc->lock held, releases it
706 */
707static int fuse_read_interrupt(struct fuse_conn *fc, struct fuse_req *req,
708 const struct iovec *iov, unsigned long nr_segs)
5d9ec854 709__releases(&fc->lock)
a4d27e75
MS
710{
711 struct fuse_copy_state cs;
712 struct fuse_in_header ih;
713 struct fuse_interrupt_in arg;
714 unsigned reqsize = sizeof(ih) + sizeof(arg);
715 int err;
716
717 list_del_init(&req->intr_entry);
718 req->intr_unique = fuse_get_unique(fc);
719 memset(&ih, 0, sizeof(ih));
720 memset(&arg, 0, sizeof(arg));
721 ih.len = reqsize;
722 ih.opcode = FUSE_INTERRUPT;
723 ih.unique = req->intr_unique;
724 arg.unique = req->in.h.unique;
725
726 spin_unlock(&fc->lock);
727 if (iov_length(iov, nr_segs) < reqsize)
728 return -EINVAL;
729
730 fuse_copy_init(&cs, fc, 1, NULL, iov, nr_segs);
731 err = fuse_copy_one(&cs, &ih, sizeof(ih));
732 if (!err)
733 err = fuse_copy_one(&cs, &arg, sizeof(arg));
734 fuse_copy_finish(&cs);
735
736 return err ? err : reqsize;
737}
738
334f485d
MS
739/*
740 * Read a single request into the userspace filesystem's buffer. This
741 * function waits until a request is available, then removes it from
742 * the pending list and copies request data to userspace buffer. If
f9a2842e
MS
743 * no reply is needed (FORGET) or request has been aborted or there
744 * was an error during the copying then it's finished by calling
334f485d
MS
745 * request_end(). Otherwise add it to the processing list, and set
746 * the 'sent' flag.
747 */
ee0b3e67
BP
748static ssize_t fuse_dev_read(struct kiocb *iocb, const struct iovec *iov,
749 unsigned long nr_segs, loff_t pos)
334f485d
MS
750{
751 int err;
334f485d
MS
752 struct fuse_req *req;
753 struct fuse_in *in;
754 struct fuse_copy_state cs;
755 unsigned reqsize;
ee0b3e67 756 struct file *file = iocb->ki_filp;
0720b315
MS
757 struct fuse_conn *fc = fuse_get_conn(file);
758 if (!fc)
759 return -EPERM;
334f485d 760
1d3d752b 761 restart:
d7133114 762 spin_lock(&fc->lock);
e5ac1d1e
JD
763 err = -EAGAIN;
764 if ((file->f_flags & O_NONBLOCK) && fc->connected &&
a4d27e75 765 !request_pending(fc))
e5ac1d1e
JD
766 goto err_unlock;
767
334f485d
MS
768 request_wait(fc);
769 err = -ENODEV;
9ba7cbba 770 if (!fc->connected)
334f485d
MS
771 goto err_unlock;
772 err = -ERESTARTSYS;
a4d27e75 773 if (!request_pending(fc))
334f485d
MS
774 goto err_unlock;
775
a4d27e75
MS
776 if (!list_empty(&fc->interrupts)) {
777 req = list_entry(fc->interrupts.next, struct fuse_req,
778 intr_entry);
779 return fuse_read_interrupt(fc, req, iov, nr_segs);
780 }
781
334f485d 782 req = list_entry(fc->pending.next, struct fuse_req, list);
83cfd493 783 req->state = FUSE_REQ_READING;
d77a1d5b 784 list_move(&req->list, &fc->io);
334f485d
MS
785
786 in = &req->in;
1d3d752b
MS
787 reqsize = in->h.len;
788 /* If request is too large, reply with an error and restart the read */
789 if (iov_length(iov, nr_segs) < reqsize) {
790 req->out.h.error = -EIO;
791 /* SETXATTR is special, since it may contain too large data */
792 if (in->h.opcode == FUSE_SETXATTR)
793 req->out.h.error = -E2BIG;
794 request_end(fc, req);
795 goto restart;
334f485d 796 }
d7133114
MS
797 spin_unlock(&fc->lock);
798 fuse_copy_init(&cs, fc, 1, req, iov, nr_segs);
1d3d752b
MS
799 err = fuse_copy_one(&cs, &in->h, sizeof(in->h));
800 if (!err)
801 err = fuse_copy_args(&cs, in->numargs, in->argpages,
802 (struct fuse_arg *) in->args, 0);
334f485d 803 fuse_copy_finish(&cs);
d7133114 804 spin_lock(&fc->lock);
334f485d 805 req->locked = 0;
c9c9d7df
MS
806 if (req->aborted) {
807 request_end(fc, req);
808 return -ENODEV;
809 }
334f485d 810 if (err) {
c9c9d7df 811 req->out.h.error = -EIO;
334f485d
MS
812 request_end(fc, req);
813 return err;
814 }
815 if (!req->isreply)
816 request_end(fc, req);
817 else {
83cfd493 818 req->state = FUSE_REQ_SENT;
d77a1d5b 819 list_move_tail(&req->list, &fc->processing);
a4d27e75
MS
820 if (req->interrupted)
821 queue_interrupt(fc, req);
d7133114 822 spin_unlock(&fc->lock);
334f485d
MS
823 }
824 return reqsize;
825
826 err_unlock:
d7133114 827 spin_unlock(&fc->lock);
334f485d
MS
828 return err;
829}
830
95668a69
TH
831static int fuse_notify_poll(struct fuse_conn *fc, unsigned int size,
832 struct fuse_copy_state *cs)
833{
834 struct fuse_notify_poll_wakeup_out outarg;
f6d47a17 835 int err = -EINVAL;
95668a69
TH
836
837 if (size != sizeof(outarg))
f6d47a17 838 goto err;
95668a69
TH
839
840 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
841 if (err)
f6d47a17 842 goto err;
95668a69 843
f6d47a17 844 fuse_copy_finish(cs);
95668a69 845 return fuse_notify_poll_wakeup(fc, &outarg);
f6d47a17
MS
846
847err:
848 fuse_copy_finish(cs);
849 return err;
95668a69
TH
850}
851
8599396b
TH
852static int fuse_notify(struct fuse_conn *fc, enum fuse_notify_code code,
853 unsigned int size, struct fuse_copy_state *cs)
854{
855 switch (code) {
95668a69
TH
856 case FUSE_NOTIFY_POLL:
857 return fuse_notify_poll(fc, size, cs);
858
8599396b 859 default:
f6d47a17 860 fuse_copy_finish(cs);
8599396b
TH
861 return -EINVAL;
862 }
863}
864
334f485d
MS
865/* Look up request on processing list by unique ID */
866static struct fuse_req *request_find(struct fuse_conn *fc, u64 unique)
867{
868 struct list_head *entry;
869
870 list_for_each(entry, &fc->processing) {
871 struct fuse_req *req;
872 req = list_entry(entry, struct fuse_req, list);
a4d27e75 873 if (req->in.h.unique == unique || req->intr_unique == unique)
334f485d
MS
874 return req;
875 }
876 return NULL;
877}
878
879static int copy_out_args(struct fuse_copy_state *cs, struct fuse_out *out,
880 unsigned nbytes)
881{
882 unsigned reqsize = sizeof(struct fuse_out_header);
883
884 if (out->h.error)
885 return nbytes != reqsize ? -EINVAL : 0;
886
887 reqsize += len_args(out->numargs, out->args);
888
889 if (reqsize < nbytes || (reqsize > nbytes && !out->argvar))
890 return -EINVAL;
891 else if (reqsize > nbytes) {
892 struct fuse_arg *lastarg = &out->args[out->numargs-1];
893 unsigned diffsize = reqsize - nbytes;
894 if (diffsize > lastarg->size)
895 return -EINVAL;
896 lastarg->size -= diffsize;
897 }
898 return fuse_copy_args(cs, out->numargs, out->argpages, out->args,
899 out->page_zeroing);
900}
901
902/*
903 * Write a single reply to a request. First the header is copied from
904 * the write buffer. The request is then searched on the processing
905 * list by the unique ID found in the header. If found, then remove
906 * it from the list and copy the rest of the buffer to the request.
907 * The request is finished by calling request_end()
908 */
ee0b3e67
BP
909static ssize_t fuse_dev_write(struct kiocb *iocb, const struct iovec *iov,
910 unsigned long nr_segs, loff_t pos)
334f485d
MS
911{
912 int err;
913 unsigned nbytes = iov_length(iov, nr_segs);
914 struct fuse_req *req;
915 struct fuse_out_header oh;
916 struct fuse_copy_state cs;
ee0b3e67 917 struct fuse_conn *fc = fuse_get_conn(iocb->ki_filp);
334f485d 918 if (!fc)
a87046d8 919 return -EPERM;
334f485d 920
d7133114 921 fuse_copy_init(&cs, fc, 0, NULL, iov, nr_segs);
334f485d
MS
922 if (nbytes < sizeof(struct fuse_out_header))
923 return -EINVAL;
924
925 err = fuse_copy_one(&cs, &oh, sizeof(oh));
926 if (err)
927 goto err_finish;
8599396b
TH
928
929 err = -EINVAL;
930 if (oh.len != nbytes)
931 goto err_finish;
932
933 /*
934 * Zero oh.unique indicates unsolicited notification message
935 * and error contains notification code.
936 */
937 if (!oh.unique) {
938 err = fuse_notify(fc, oh.error, nbytes - sizeof(oh), &cs);
8599396b
TH
939 return err ? err : nbytes;
940 }
941
334f485d 942 err = -EINVAL;
8599396b 943 if (oh.error <= -1000 || oh.error > 0)
334f485d
MS
944 goto err_finish;
945
d7133114 946 spin_lock(&fc->lock);
69a53bf2
MS
947 err = -ENOENT;
948 if (!fc->connected)
949 goto err_unlock;
950
334f485d 951 req = request_find(fc, oh.unique);
334f485d
MS
952 if (!req)
953 goto err_unlock;
954
f9a2842e 955 if (req->aborted) {
d7133114 956 spin_unlock(&fc->lock);
334f485d 957 fuse_copy_finish(&cs);
d7133114 958 spin_lock(&fc->lock);
222f1d69 959 request_end(fc, req);
334f485d
MS
960 return -ENOENT;
961 }
a4d27e75
MS
962 /* Is it an interrupt reply? */
963 if (req->intr_unique == oh.unique) {
964 err = -EINVAL;
965 if (nbytes != sizeof(struct fuse_out_header))
966 goto err_unlock;
967
968 if (oh.error == -ENOSYS)
969 fc->no_interrupt = 1;
970 else if (oh.error == -EAGAIN)
971 queue_interrupt(fc, req);
972
973 spin_unlock(&fc->lock);
974 fuse_copy_finish(&cs);
975 return nbytes;
976 }
977
978 req->state = FUSE_REQ_WRITING;
d77a1d5b 979 list_move(&req->list, &fc->io);
334f485d
MS
980 req->out.h = oh;
981 req->locked = 1;
982 cs.req = req;
d7133114 983 spin_unlock(&fc->lock);
334f485d
MS
984
985 err = copy_out_args(&cs, &req->out, nbytes);
986 fuse_copy_finish(&cs);
987
d7133114 988 spin_lock(&fc->lock);
334f485d
MS
989 req->locked = 0;
990 if (!err) {
f9a2842e 991 if (req->aborted)
334f485d 992 err = -ENOENT;
f9a2842e 993 } else if (!req->aborted)
334f485d
MS
994 req->out.h.error = -EIO;
995 request_end(fc, req);
996
997 return err ? err : nbytes;
998
999 err_unlock:
d7133114 1000 spin_unlock(&fc->lock);
334f485d
MS
1001 err_finish:
1002 fuse_copy_finish(&cs);
1003 return err;
1004}
1005
334f485d
MS
1006static unsigned fuse_dev_poll(struct file *file, poll_table *wait)
1007{
334f485d 1008 unsigned mask = POLLOUT | POLLWRNORM;
7025d9ad 1009 struct fuse_conn *fc = fuse_get_conn(file);
334f485d 1010 if (!fc)
7025d9ad 1011 return POLLERR;
334f485d
MS
1012
1013 poll_wait(file, &fc->waitq, wait);
1014
d7133114 1015 spin_lock(&fc->lock);
7025d9ad
MS
1016 if (!fc->connected)
1017 mask = POLLERR;
a4d27e75 1018 else if (request_pending(fc))
7025d9ad 1019 mask |= POLLIN | POLLRDNORM;
d7133114 1020 spin_unlock(&fc->lock);
334f485d
MS
1021
1022 return mask;
1023}
1024
69a53bf2
MS
1025/*
1026 * Abort all requests on the given list (pending or processing)
1027 *
d7133114 1028 * This function releases and reacquires fc->lock
69a53bf2 1029 */
334f485d 1030static void end_requests(struct fuse_conn *fc, struct list_head *head)
5d9ec854
HH
1031__releases(&fc->lock)
1032__acquires(&fc->lock)
334f485d
MS
1033{
1034 while (!list_empty(head)) {
1035 struct fuse_req *req;
1036 req = list_entry(head->next, struct fuse_req, list);
334f485d
MS
1037 req->out.h.error = -ECONNABORTED;
1038 request_end(fc, req);
d7133114 1039 spin_lock(&fc->lock);
334f485d
MS
1040 }
1041}
1042
69a53bf2
MS
1043/*
1044 * Abort requests under I/O
1045 *
f9a2842e 1046 * The requests are set to aborted and finished, and the request
69a53bf2
MS
1047 * waiter is woken up. This will make request_wait_answer() wait
1048 * until the request is unlocked and then return.
64c6d8ed
MS
1049 *
1050 * If the request is asynchronous, then the end function needs to be
1051 * called after waiting for the request to be unlocked (if it was
1052 * locked).
69a53bf2
MS
1053 */
1054static void end_io_requests(struct fuse_conn *fc)
5d9ec854
HH
1055__releases(&fc->lock)
1056__acquires(&fc->lock)
69a53bf2
MS
1057{
1058 while (!list_empty(&fc->io)) {
64c6d8ed
MS
1059 struct fuse_req *req =
1060 list_entry(fc->io.next, struct fuse_req, list);
1061 void (*end) (struct fuse_conn *, struct fuse_req *) = req->end;
1062
f9a2842e 1063 req->aborted = 1;
69a53bf2
MS
1064 req->out.h.error = -ECONNABORTED;
1065 req->state = FUSE_REQ_FINISHED;
1066 list_del_init(&req->list);
1067 wake_up(&req->waitq);
64c6d8ed
MS
1068 if (end) {
1069 req->end = NULL;
64c6d8ed 1070 __fuse_get_request(req);
d7133114 1071 spin_unlock(&fc->lock);
64c6d8ed
MS
1072 wait_event(req->waitq, !req->locked);
1073 end(fc, req);
e9bb09dd 1074 fuse_put_request(fc, req);
d7133114 1075 spin_lock(&fc->lock);
64c6d8ed 1076 }
69a53bf2
MS
1077 }
1078}
1079
1080/*
1081 * Abort all requests.
1082 *
1083 * Emergency exit in case of a malicious or accidental deadlock, or
1084 * just a hung filesystem.
1085 *
1086 * The same effect is usually achievable through killing the
1087 * filesystem daemon and all users of the filesystem. The exception
1088 * is the combination of an asynchronous request and the tricky
1089 * deadlock (see Documentation/filesystems/fuse.txt).
1090 *
1091 * During the aborting, progression of requests from the pending and
1092 * processing lists onto the io list, and progression of new requests
1093 * onto the pending list is prevented by req->connected being false.
1094 *
1095 * Progression of requests under I/O to the processing list is
f9a2842e
MS
1096 * prevented by the req->aborted flag being true for these requests.
1097 * For this reason requests on the io list must be aborted first.
69a53bf2
MS
1098 */
1099void fuse_abort_conn(struct fuse_conn *fc)
1100{
d7133114 1101 spin_lock(&fc->lock);
69a53bf2
MS
1102 if (fc->connected) {
1103 fc->connected = 0;
51eb01e7 1104 fc->blocked = 0;
69a53bf2
MS
1105 end_io_requests(fc);
1106 end_requests(fc, &fc->pending);
1107 end_requests(fc, &fc->processing);
1108 wake_up_all(&fc->waitq);
51eb01e7 1109 wake_up_all(&fc->blocked_waitq);
385a17bf 1110 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
69a53bf2 1111 }
d7133114 1112 spin_unlock(&fc->lock);
69a53bf2 1113}
08cbf542 1114EXPORT_SYMBOL_GPL(fuse_abort_conn);
69a53bf2 1115
08cbf542 1116int fuse_dev_release(struct inode *inode, struct file *file)
334f485d 1117{
0720b315 1118 struct fuse_conn *fc = fuse_get_conn(file);
334f485d 1119 if (fc) {
d7133114 1120 spin_lock(&fc->lock);
1e9a4ed9 1121 fc->connected = 0;
334f485d
MS
1122 end_requests(fc, &fc->pending);
1123 end_requests(fc, &fc->processing);
d7133114 1124 spin_unlock(&fc->lock);
bafa9654 1125 fuse_conn_put(fc);
385a17bf 1126 }
f543f253 1127
334f485d
MS
1128 return 0;
1129}
08cbf542 1130EXPORT_SYMBOL_GPL(fuse_dev_release);
334f485d 1131
385a17bf
JD
1132static int fuse_dev_fasync(int fd, struct file *file, int on)
1133{
1134 struct fuse_conn *fc = fuse_get_conn(file);
1135 if (!fc)
a87046d8 1136 return -EPERM;
385a17bf
JD
1137
1138 /* No locking - fasync_helper does its own locking */
1139 return fasync_helper(fd, file, on, &fc->fasync);
1140}
1141
4b6f5d20 1142const struct file_operations fuse_dev_operations = {
334f485d
MS
1143 .owner = THIS_MODULE,
1144 .llseek = no_llseek,
ee0b3e67
BP
1145 .read = do_sync_read,
1146 .aio_read = fuse_dev_read,
1147 .write = do_sync_write,
1148 .aio_write = fuse_dev_write,
334f485d
MS
1149 .poll = fuse_dev_poll,
1150 .release = fuse_dev_release,
385a17bf 1151 .fasync = fuse_dev_fasync,
334f485d 1152};
08cbf542 1153EXPORT_SYMBOL_GPL(fuse_dev_operations);
334f485d
MS
1154
1155static struct miscdevice fuse_miscdevice = {
1156 .minor = FUSE_MINOR,
1157 .name = "fuse",
1158 .fops = &fuse_dev_operations,
1159};
1160
1161int __init fuse_dev_init(void)
1162{
1163 int err = -ENOMEM;
1164 fuse_req_cachep = kmem_cache_create("fuse_request",
1165 sizeof(struct fuse_req),
20c2df83 1166 0, 0, NULL);
334f485d
MS
1167 if (!fuse_req_cachep)
1168 goto out;
1169
1170 err = misc_register(&fuse_miscdevice);
1171 if (err)
1172 goto out_cache_clean;
1173
1174 return 0;
1175
1176 out_cache_clean:
1177 kmem_cache_destroy(fuse_req_cachep);
1178 out:
1179 return err;
1180}
1181
1182void fuse_dev_cleanup(void)
1183{
1184 misc_deregister(&fuse_miscdevice);
1185 kmem_cache_destroy(fuse_req_cachep);
1186}
This page took 0.523925 seconds and 5 git commands to generate.