fuse: cleanup request_end()
[deliverable/linux.git] / fs / fuse / dev.c
CommitLineData
334f485d
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
334f485d
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/init.h>
12#include <linux/module.h>
13#include <linux/poll.h>
14#include <linux/uio.h>
15#include <linux/miscdevice.h>
16#include <linux/pagemap.h>
17#include <linux/file.h>
18#include <linux/slab.h>
dd3bb14f 19#include <linux/pipe_fs_i.h>
ce534fb0
MS
20#include <linux/swap.h>
21#include <linux/splice.h>
334f485d
MS
22
23MODULE_ALIAS_MISCDEV(FUSE_MINOR);
578454ff 24MODULE_ALIAS("devname:fuse");
334f485d 25
e18b890b 26static struct kmem_cache *fuse_req_cachep;
334f485d 27
8bfc016d 28static struct fuse_conn *fuse_get_conn(struct file *file)
334f485d 29{
0720b315
MS
30 /*
31 * Lockless access is OK, because file->private data is set
32 * once during mount and is valid until the file is released.
33 */
34 return file->private_data;
334f485d
MS
35}
36
4250c066 37static void fuse_request_init(struct fuse_req *req, struct page **pages,
b2430d75 38 struct fuse_page_desc *page_descs,
4250c066 39 unsigned npages)
334f485d
MS
40{
41 memset(req, 0, sizeof(*req));
4250c066 42 memset(pages, 0, sizeof(*pages) * npages);
b2430d75 43 memset(page_descs, 0, sizeof(*page_descs) * npages);
334f485d 44 INIT_LIST_HEAD(&req->list);
a4d27e75 45 INIT_LIST_HEAD(&req->intr_entry);
334f485d
MS
46 init_waitqueue_head(&req->waitq);
47 atomic_set(&req->count, 1);
4250c066 48 req->pages = pages;
b2430d75 49 req->page_descs = page_descs;
4250c066 50 req->max_pages = npages;
33e14b4d 51 __set_bit(FR_PENDING, &req->flags);
334f485d
MS
52}
53
4250c066 54static struct fuse_req *__fuse_request_alloc(unsigned npages, gfp_t flags)
334f485d 55{
4250c066
MP
56 struct fuse_req *req = kmem_cache_alloc(fuse_req_cachep, flags);
57 if (req) {
58 struct page **pages;
b2430d75 59 struct fuse_page_desc *page_descs;
4250c066 60
b2430d75 61 if (npages <= FUSE_REQ_INLINE_PAGES) {
4250c066 62 pages = req->inline_pages;
b2430d75
MP
63 page_descs = req->inline_page_descs;
64 } else {
4250c066 65 pages = kmalloc(sizeof(struct page *) * npages, flags);
b2430d75
MP
66 page_descs = kmalloc(sizeof(struct fuse_page_desc) *
67 npages, flags);
68 }
4250c066 69
b2430d75
MP
70 if (!pages || !page_descs) {
71 kfree(pages);
72 kfree(page_descs);
4250c066
MP
73 kmem_cache_free(fuse_req_cachep, req);
74 return NULL;
75 }
76
b2430d75 77 fuse_request_init(req, pages, page_descs, npages);
4250c066 78 }
334f485d
MS
79 return req;
80}
4250c066
MP
81
82struct fuse_req *fuse_request_alloc(unsigned npages)
83{
84 return __fuse_request_alloc(npages, GFP_KERNEL);
85}
08cbf542 86EXPORT_SYMBOL_GPL(fuse_request_alloc);
334f485d 87
4250c066 88struct fuse_req *fuse_request_alloc_nofs(unsigned npages)
3be5a52b 89{
4250c066 90 return __fuse_request_alloc(npages, GFP_NOFS);
3be5a52b
MS
91}
92
334f485d
MS
93void fuse_request_free(struct fuse_req *req)
94{
b2430d75 95 if (req->pages != req->inline_pages) {
4250c066 96 kfree(req->pages);
b2430d75
MP
97 kfree(req->page_descs);
98 }
334f485d
MS
99 kmem_cache_free(fuse_req_cachep, req);
100}
101
8bfc016d 102static void block_sigs(sigset_t *oldset)
334f485d
MS
103{
104 sigset_t mask;
105
106 siginitsetinv(&mask, sigmask(SIGKILL));
107 sigprocmask(SIG_BLOCK, &mask, oldset);
108}
109
8bfc016d 110static void restore_sigs(sigset_t *oldset)
334f485d
MS
111{
112 sigprocmask(SIG_SETMASK, oldset, NULL);
113}
114
36cf66ed 115void __fuse_get_request(struct fuse_req *req)
334f485d
MS
116{
117 atomic_inc(&req->count);
118}
119
120/* Must be called with > 1 refcount */
121static void __fuse_put_request(struct fuse_req *req)
122{
123 BUG_ON(atomic_read(&req->count) < 2);
124 atomic_dec(&req->count);
125}
126
33649c91
MS
127static void fuse_req_init_context(struct fuse_req *req)
128{
499dcf20
EB
129 req->in.h.uid = from_kuid_munged(&init_user_ns, current_fsuid());
130 req->in.h.gid = from_kgid_munged(&init_user_ns, current_fsgid());
33649c91
MS
131 req->in.h.pid = current->pid;
132}
133
9759bd51
MS
134void fuse_set_initialized(struct fuse_conn *fc)
135{
136 /* Make sure stores before this are seen on another CPU */
137 smp_wmb();
138 fc->initialized = 1;
139}
140
0aada884
MP
141static bool fuse_block_alloc(struct fuse_conn *fc, bool for_background)
142{
143 return !fc->initialized || (for_background && fc->blocked);
144}
145
8b41e671
MP
146static struct fuse_req *__fuse_get_req(struct fuse_conn *fc, unsigned npages,
147 bool for_background)
334f485d 148{
08a53cdc 149 struct fuse_req *req;
08a53cdc 150 int err;
9bc5ddda 151 atomic_inc(&fc->num_waiting);
0aada884
MP
152
153 if (fuse_block_alloc(fc, for_background)) {
154 sigset_t oldset;
155 int intr;
156
157 block_sigs(&oldset);
722d2bea 158 intr = wait_event_interruptible_exclusive(fc->blocked_waitq,
0aada884
MP
159 !fuse_block_alloc(fc, for_background));
160 restore_sigs(&oldset);
161 err = -EINTR;
162 if (intr)
163 goto out;
164 }
9759bd51
MS
165 /* Matches smp_wmb() in fuse_set_initialized() */
166 smp_rmb();
08a53cdc 167
51eb01e7
MS
168 err = -ENOTCONN;
169 if (!fc->connected)
170 goto out;
171
de155226
MS
172 err = -ECONNREFUSED;
173 if (fc->conn_error)
174 goto out;
175
b111c8c0 176 req = fuse_request_alloc(npages);
9bc5ddda 177 err = -ENOMEM;
722d2bea
MP
178 if (!req) {
179 if (for_background)
180 wake_up(&fc->blocked_waitq);
9bc5ddda 181 goto out;
722d2bea 182 }
334f485d 183
33649c91 184 fuse_req_init_context(req);
825d6d33
MS
185 __set_bit(FR_WAITING, &req->flags);
186 if (for_background)
187 __set_bit(FR_BACKGROUND, &req->flags);
188
334f485d 189 return req;
9bc5ddda
MS
190
191 out:
192 atomic_dec(&fc->num_waiting);
193 return ERR_PTR(err);
334f485d 194}
8b41e671
MP
195
196struct fuse_req *fuse_get_req(struct fuse_conn *fc, unsigned npages)
197{
198 return __fuse_get_req(fc, npages, false);
199}
08cbf542 200EXPORT_SYMBOL_GPL(fuse_get_req);
334f485d 201
8b41e671
MP
202struct fuse_req *fuse_get_req_for_background(struct fuse_conn *fc,
203 unsigned npages)
204{
205 return __fuse_get_req(fc, npages, true);
206}
207EXPORT_SYMBOL_GPL(fuse_get_req_for_background);
208
33649c91
MS
209/*
210 * Return request in fuse_file->reserved_req. However that may
211 * currently be in use. If that is the case, wait for it to become
212 * available.
213 */
214static struct fuse_req *get_reserved_req(struct fuse_conn *fc,
215 struct file *file)
216{
217 struct fuse_req *req = NULL;
218 struct fuse_file *ff = file->private_data;
219
220 do {
de5e3dec 221 wait_event(fc->reserved_req_waitq, ff->reserved_req);
33649c91
MS
222 spin_lock(&fc->lock);
223 if (ff->reserved_req) {
224 req = ff->reserved_req;
225 ff->reserved_req = NULL;
cb0942b8 226 req->stolen_file = get_file(file);
33649c91
MS
227 }
228 spin_unlock(&fc->lock);
229 } while (!req);
230
231 return req;
232}
233
234/*
235 * Put stolen request back into fuse_file->reserved_req
236 */
237static void put_reserved_req(struct fuse_conn *fc, struct fuse_req *req)
238{
239 struct file *file = req->stolen_file;
240 struct fuse_file *ff = file->private_data;
241
242 spin_lock(&fc->lock);
b2430d75 243 fuse_request_init(req, req->pages, req->page_descs, req->max_pages);
33649c91
MS
244 BUG_ON(ff->reserved_req);
245 ff->reserved_req = req;
de5e3dec 246 wake_up_all(&fc->reserved_req_waitq);
33649c91
MS
247 spin_unlock(&fc->lock);
248 fput(file);
249}
250
251/*
252 * Gets a requests for a file operation, always succeeds
253 *
254 * This is used for sending the FLUSH request, which must get to
255 * userspace, due to POSIX locks which may need to be unlocked.
256 *
257 * If allocation fails due to OOM, use the reserved request in
258 * fuse_file.
259 *
260 * This is very unlikely to deadlock accidentally, since the
261 * filesystem should not have it's own file open. If deadlock is
262 * intentional, it can still be broken by "aborting" the filesystem.
263 */
b111c8c0
MP
264struct fuse_req *fuse_get_req_nofail_nopages(struct fuse_conn *fc,
265 struct file *file)
33649c91
MS
266{
267 struct fuse_req *req;
268
269 atomic_inc(&fc->num_waiting);
0aada884 270 wait_event(fc->blocked_waitq, fc->initialized);
9759bd51
MS
271 /* Matches smp_wmb() in fuse_set_initialized() */
272 smp_rmb();
b111c8c0 273 req = fuse_request_alloc(0);
33649c91
MS
274 if (!req)
275 req = get_reserved_req(fc, file);
276
277 fuse_req_init_context(req);
825d6d33
MS
278 __set_bit(FR_WAITING, &req->flags);
279 __clear_bit(FR_BACKGROUND, &req->flags);
33649c91
MS
280 return req;
281}
282
334f485d 283void fuse_put_request(struct fuse_conn *fc, struct fuse_req *req)
7128ec2a
MS
284{
285 if (atomic_dec_and_test(&req->count)) {
825d6d33 286 if (test_bit(FR_BACKGROUND, &req->flags)) {
722d2bea
MP
287 /*
288 * We get here in the unlikely case that a background
289 * request was allocated but not sent
290 */
291 spin_lock(&fc->lock);
292 if (!fc->blocked)
293 wake_up(&fc->blocked_waitq);
294 spin_unlock(&fc->lock);
295 }
296
825d6d33
MS
297 if (test_bit(FR_WAITING, &req->flags)) {
298 __clear_bit(FR_WAITING, &req->flags);
9bc5ddda 299 atomic_dec(&fc->num_waiting);
73e0e738 300 }
33649c91
MS
301
302 if (req->stolen_file)
303 put_reserved_req(fc, req);
304 else
305 fuse_request_free(req);
7128ec2a
MS
306 }
307}
08cbf542 308EXPORT_SYMBOL_GPL(fuse_put_request);
7128ec2a 309
d12def1b
MS
310static unsigned len_args(unsigned numargs, struct fuse_arg *args)
311{
312 unsigned nbytes = 0;
313 unsigned i;
314
315 for (i = 0; i < numargs; i++)
316 nbytes += args[i].size;
317
318 return nbytes;
319}
320
f88996a9 321static u64 fuse_get_unique(struct fuse_iqueue *fiq)
d12def1b 322{
f88996a9 323 return ++fiq->reqctr;
d12def1b
MS
324}
325
f88996a9 326static void queue_request(struct fuse_iqueue *fiq, struct fuse_req *req)
d12def1b 327{
d12def1b
MS
328 req->in.h.len = sizeof(struct fuse_in_header) +
329 len_args(req->in.numargs, (struct fuse_arg *) req->in.args);
f88996a9 330 list_add_tail(&req->list, &fiq->pending);
4ce60812 331 wake_up_locked(&fiq->waitq);
f88996a9 332 kill_fasync(&fiq->fasync, SIGIO, POLL_IN);
d12def1b
MS
333}
334
07e77dca
MS
335void fuse_queue_forget(struct fuse_conn *fc, struct fuse_forget_link *forget,
336 u64 nodeid, u64 nlookup)
337{
f88996a9
MS
338 struct fuse_iqueue *fiq = &fc->iq;
339
02c048b9
MS
340 forget->forget_one.nodeid = nodeid;
341 forget->forget_one.nlookup = nlookup;
07e77dca 342
4ce60812 343 spin_lock(&fiq->waitq.lock);
e16714d8 344 if (fiq->connected) {
f88996a9
MS
345 fiq->forget_list_tail->next = forget;
346 fiq->forget_list_tail = forget;
4ce60812 347 wake_up_locked(&fiq->waitq);
f88996a9 348 kill_fasync(&fiq->fasync, SIGIO, POLL_IN);
5dfcc87f
MS
349 } else {
350 kfree(forget);
351 }
4ce60812 352 spin_unlock(&fiq->waitq.lock);
07e77dca
MS
353}
354
d12def1b
MS
355static void flush_bg_queue(struct fuse_conn *fc)
356{
7a6d3c8b 357 while (fc->active_background < fc->max_background &&
d12def1b
MS
358 !list_empty(&fc->bg_queue)) {
359 struct fuse_req *req;
f88996a9 360 struct fuse_iqueue *fiq = &fc->iq;
d12def1b
MS
361
362 req = list_entry(fc->bg_queue.next, struct fuse_req, list);
363 list_del(&req->list);
364 fc->active_background++;
4ce60812 365 spin_lock(&fiq->waitq.lock);
f88996a9
MS
366 req->in.h.unique = fuse_get_unique(fiq);
367 queue_request(fiq, req);
4ce60812 368 spin_unlock(&fiq->waitq.lock);
d12def1b
MS
369 }
370}
371
334f485d
MS
372/*
373 * This function is called when a request is finished. Either a reply
f9a2842e 374 * has arrived or it was aborted (and not yet sent) or some error
f43b155a 375 * occurred during communication with userspace, or the device file
51eb01e7
MS
376 * was closed. The requester thread is woken up (if still waiting),
377 * the 'end' callback is called if given, else the reference to the
378 * request is released
7128ec2a 379 *
d7133114 380 * Called with fc->lock, unlocks it
334f485d
MS
381 */
382static void request_end(struct fuse_conn *fc, struct fuse_req *req)
b9ca67b2 383__releases(fc->lock)
334f485d 384{
4ce60812 385 struct fuse_iqueue *fiq = &fc->iq;
365ae710
MS
386
387 if (test_and_set_bit(FR_FINISHED, &req->flags)) {
388 spin_unlock(&fc->lock);
389 return;
390 }
391
4ce60812 392 spin_lock(&fiq->waitq.lock);
0d8e84b0 393 list_del_init(&req->intr_entry);
4ce60812 394 spin_unlock(&fiq->waitq.lock);
33e14b4d
MS
395 WARN_ON(test_bit(FR_PENDING, &req->flags));
396 WARN_ON(test_bit(FR_SENT, &req->flags));
825d6d33
MS
397 if (test_bit(FR_BACKGROUND, &req->flags)) {
398 clear_bit(FR_BACKGROUND, &req->flags);
722d2bea 399 if (fc->num_background == fc->max_background)
51eb01e7 400 fc->blocked = 0;
722d2bea
MP
401
402 /* Wake up next waiter, if any */
3c18ef81 403 if (!fc->blocked && waitqueue_active(&fc->blocked_waitq))
722d2bea
MP
404 wake_up(&fc->blocked_waitq);
405
7a6d3c8b 406 if (fc->num_background == fc->congestion_threshold &&
a325f9b9 407 fc->connected && fc->bdi_initialized) {
8aa7e847
JA
408 clear_bdi_congested(&fc->bdi, BLK_RW_SYNC);
409 clear_bdi_congested(&fc->bdi, BLK_RW_ASYNC);
f92b99b9 410 }
51eb01e7 411 fc->num_background--;
d12def1b
MS
412 fc->active_background--;
413 flush_bg_queue(fc);
334f485d 414 }
51eb01e7 415 spin_unlock(&fc->lock);
51eb01e7 416 wake_up(&req->waitq);
1e6881c3
MS
417 if (req->end)
418 req->end(fc, req);
e9bb09dd 419 fuse_put_request(fc, req);
334f485d
MS
420}
421
f88996a9 422static void queue_interrupt(struct fuse_iqueue *fiq, struct fuse_req *req)
a4d27e75 423{
4ce60812 424 spin_lock(&fiq->waitq.lock);
8f7bb368
MS
425 if (list_empty(&req->intr_entry)) {
426 list_add_tail(&req->intr_entry, &fiq->interrupts);
427 wake_up_locked(&fiq->waitq);
428 }
4ce60812 429 spin_unlock(&fiq->waitq.lock);
f88996a9 430 kill_fasync(&fiq->fasync, SIGIO, POLL_IN);
a4d27e75
MS
431}
432
7c352bdf 433static void request_wait_answer(struct fuse_conn *fc, struct fuse_req *req)
334f485d 434{
4ce60812 435 struct fuse_iqueue *fiq = &fc->iq;
c4775267
MS
436 int err;
437
a4d27e75
MS
438 if (!fc->no_interrupt) {
439 /* Any signal may interrupt this */
c4775267 440 err = wait_event_interruptible(req->waitq,
33e14b4d 441 test_bit(FR_FINISHED, &req->flags));
c4775267 442 if (!err)
a4d27e75
MS
443 return;
444
825d6d33 445 set_bit(FR_INTERRUPTED, &req->flags);
8f7bb368
MS
446 /* matches barrier in fuse_dev_do_read() */
447 smp_mb__after_atomic();
33e14b4d 448 if (test_bit(FR_SENT, &req->flags))
4ce60812 449 queue_interrupt(fiq, req);
a4d27e75
MS
450 }
451
825d6d33 452 if (!test_bit(FR_FORCE, &req->flags)) {
a4d27e75
MS
453 sigset_t oldset;
454
455 /* Only fatal signals may interrupt this */
51eb01e7 456 block_sigs(&oldset);
c4775267 457 err = wait_event_interruptible(req->waitq,
33e14b4d 458 test_bit(FR_FINISHED, &req->flags));
51eb01e7 459 restore_sigs(&oldset);
a131de0a 460
c4775267 461 if (!err)
a131de0a
MS
462 return;
463
4ce60812 464 spin_lock(&fiq->waitq.lock);
a131de0a 465 /* Request is not yet in userspace, bail out */
33e14b4d 466 if (test_bit(FR_PENDING, &req->flags)) {
a131de0a 467 list_del(&req->list);
4ce60812 468 spin_unlock(&fiq->waitq.lock);
a131de0a
MS
469 __fuse_put_request(req);
470 req->out.h.error = -EINTR;
471 return;
472 }
4ce60812 473 spin_unlock(&fiq->waitq.lock);
51eb01e7 474 }
334f485d 475
a131de0a
MS
476 /*
477 * Either request is already in userspace, or it was forced.
478 * Wait it out.
479 */
33e14b4d 480 wait_event(req->waitq, test_bit(FR_FINISHED, &req->flags));
334f485d
MS
481}
482
6a4e922c 483static void __fuse_request_send(struct fuse_conn *fc, struct fuse_req *req)
334f485d 484{
e16714d8
MS
485 struct fuse_iqueue *fiq = &fc->iq;
486
825d6d33 487 BUG_ON(test_bit(FR_BACKGROUND, &req->flags));
4ce60812 488 spin_lock(&fiq->waitq.lock);
e16714d8 489 if (!fiq->connected) {
4ce60812 490 spin_unlock(&fiq->waitq.lock);
334f485d 491 req->out.h.error = -ENOTCONN;
c4775267 492 } else {
f88996a9
MS
493 req->in.h.unique = fuse_get_unique(fiq);
494 queue_request(fiq, req);
334f485d
MS
495 /* acquire extra reference, since request is still needed
496 after request_end() */
497 __fuse_get_request(req);
4ce60812 498 spin_unlock(&fiq->waitq.lock);
334f485d 499
7c352bdf 500 request_wait_answer(fc, req);
c4775267
MS
501 /* Pairs with smp_wmb() in request_end() */
502 smp_rmb();
334f485d 503 }
334f485d 504}
6a4e922c
EW
505
506void fuse_request_send(struct fuse_conn *fc, struct fuse_req *req)
507{
825d6d33
MS
508 __set_bit(FR_ISREPLY, &req->flags);
509 if (!test_bit(FR_WAITING, &req->flags)) {
510 __set_bit(FR_WAITING, &req->flags);
5437f241
MS
511 atomic_inc(&fc->num_waiting);
512 }
6a4e922c
EW
513 __fuse_request_send(fc, req);
514}
08cbf542 515EXPORT_SYMBOL_GPL(fuse_request_send);
334f485d 516
21f62174
MS
517static void fuse_adjust_compat(struct fuse_conn *fc, struct fuse_args *args)
518{
519 if (fc->minor < 4 && args->in.h.opcode == FUSE_STATFS)
520 args->out.args[0].size = FUSE_COMPAT_STATFS_SIZE;
521
522 if (fc->minor < 9) {
523 switch (args->in.h.opcode) {
524 case FUSE_LOOKUP:
525 case FUSE_CREATE:
526 case FUSE_MKNOD:
527 case FUSE_MKDIR:
528 case FUSE_SYMLINK:
529 case FUSE_LINK:
530 args->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
531 break;
532 case FUSE_GETATTR:
533 case FUSE_SETATTR:
534 args->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
535 break;
536 }
537 }
538 if (fc->minor < 12) {
539 switch (args->in.h.opcode) {
540 case FUSE_CREATE:
541 args->in.args[0].size = sizeof(struct fuse_open_in);
542 break;
543 case FUSE_MKNOD:
544 args->in.args[0].size = FUSE_COMPAT_MKNOD_IN_SIZE;
545 break;
546 }
547 }
548}
549
7078187a
MS
550ssize_t fuse_simple_request(struct fuse_conn *fc, struct fuse_args *args)
551{
552 struct fuse_req *req;
553 ssize_t ret;
554
555 req = fuse_get_req(fc, 0);
556 if (IS_ERR(req))
557 return PTR_ERR(req);
558
21f62174
MS
559 /* Needs to be done after fuse_get_req() so that fc->minor is valid */
560 fuse_adjust_compat(fc, args);
561
7078187a
MS
562 req->in.h.opcode = args->in.h.opcode;
563 req->in.h.nodeid = args->in.h.nodeid;
564 req->in.numargs = args->in.numargs;
565 memcpy(req->in.args, args->in.args,
566 args->in.numargs * sizeof(struct fuse_in_arg));
567 req->out.argvar = args->out.argvar;
568 req->out.numargs = args->out.numargs;
569 memcpy(req->out.args, args->out.args,
570 args->out.numargs * sizeof(struct fuse_arg));
571 fuse_request_send(fc, req);
572 ret = req->out.h.error;
573 if (!ret && args->out.argvar) {
574 BUG_ON(args->out.numargs != 1);
575 ret = req->out.args[0].size;
576 }
577 fuse_put_request(fc, req);
578
579 return ret;
580}
581
f0139aa8
MS
582/*
583 * Called under fc->lock
584 *
585 * fc->connected must have been checked previously
586 */
587void fuse_request_send_background_locked(struct fuse_conn *fc,
588 struct fuse_req *req)
d12def1b 589{
825d6d33
MS
590 BUG_ON(!test_bit(FR_BACKGROUND, &req->flags));
591 if (!test_bit(FR_WAITING, &req->flags)) {
592 __set_bit(FR_WAITING, &req->flags);
5437f241
MS
593 atomic_inc(&fc->num_waiting);
594 }
825d6d33 595 __set_bit(FR_ISREPLY, &req->flags);
d12def1b 596 fc->num_background++;
7a6d3c8b 597 if (fc->num_background == fc->max_background)
d12def1b 598 fc->blocked = 1;
7a6d3c8b 599 if (fc->num_background == fc->congestion_threshold &&
a325f9b9 600 fc->bdi_initialized) {
8aa7e847
JA
601 set_bdi_congested(&fc->bdi, BLK_RW_SYNC);
602 set_bdi_congested(&fc->bdi, BLK_RW_ASYNC);
d12def1b
MS
603 }
604 list_add_tail(&req->list, &fc->bg_queue);
605 flush_bg_queue(fc);
606}
607
f0139aa8 608void fuse_request_send_background(struct fuse_conn *fc, struct fuse_req *req)
334f485d 609{
42dc6211 610 BUG_ON(!req->end);
d7133114 611 spin_lock(&fc->lock);
1e9a4ed9 612 if (fc->connected) {
f0139aa8 613 fuse_request_send_background_locked(fc, req);
d7133114 614 spin_unlock(&fc->lock);
334f485d 615 } else {
42dc6211 616 spin_unlock(&fc->lock);
334f485d 617 req->out.h.error = -ENOTCONN;
42dc6211
MS
618 req->end(fc, req);
619 fuse_put_request(fc, req);
334f485d
MS
620 }
621}
08cbf542 622EXPORT_SYMBOL_GPL(fuse_request_send_background);
334f485d 623
2d45ba38
MS
624static int fuse_request_send_notify_reply(struct fuse_conn *fc,
625 struct fuse_req *req, u64 unique)
626{
627 int err = -ENODEV;
f88996a9 628 struct fuse_iqueue *fiq = &fc->iq;
2d45ba38 629
825d6d33 630 __clear_bit(FR_ISREPLY, &req->flags);
2d45ba38 631 req->in.h.unique = unique;
4ce60812 632 spin_lock(&fiq->waitq.lock);
e16714d8 633 if (fiq->connected) {
f88996a9 634 queue_request(fiq, req);
2d45ba38
MS
635 err = 0;
636 }
4ce60812 637 spin_unlock(&fiq->waitq.lock);
2d45ba38
MS
638
639 return err;
640}
641
0b05b183
AA
642void fuse_force_forget(struct file *file, u64 nodeid)
643{
6131ffaa 644 struct inode *inode = file_inode(file);
0b05b183
AA
645 struct fuse_conn *fc = get_fuse_conn(inode);
646 struct fuse_req *req;
647 struct fuse_forget_in inarg;
648
649 memset(&inarg, 0, sizeof(inarg));
650 inarg.nlookup = 1;
b111c8c0 651 req = fuse_get_req_nofail_nopages(fc, file);
0b05b183
AA
652 req->in.h.opcode = FUSE_FORGET;
653 req->in.h.nodeid = nodeid;
654 req->in.numargs = 1;
655 req->in.args[0].size = sizeof(inarg);
656 req->in.args[0].value = &inarg;
825d6d33 657 __clear_bit(FR_ISREPLY, &req->flags);
6a4e922c
EW
658 __fuse_request_send(fc, req);
659 /* ignore errors */
660 fuse_put_request(fc, req);
0b05b183
AA
661}
662
334f485d
MS
663/*
664 * Lock the request. Up to the next unlock_request() there mustn't be
665 * anything that could cause a page-fault. If the request was already
f9a2842e 666 * aborted bail out.
334f485d 667 */
dc00809a 668static int lock_request(struct fuse_req *req)
334f485d
MS
669{
670 int err = 0;
671 if (req) {
dc00809a 672 spin_lock(&req->waitq.lock);
825d6d33 673 if (test_bit(FR_ABORTED, &req->flags))
334f485d
MS
674 err = -ENOENT;
675 else
825d6d33 676 set_bit(FR_LOCKED, &req->flags);
dc00809a 677 spin_unlock(&req->waitq.lock);
334f485d
MS
678 }
679 return err;
680}
681
682/*
0d8e84b0
MS
683 * Unlock request. If it was aborted while locked, caller is responsible
684 * for unlocking and ending the request.
334f485d 685 */
dc00809a 686static int unlock_request(struct fuse_req *req)
334f485d 687{
0d8e84b0 688 int err = 0;
334f485d 689 if (req) {
dc00809a 690 spin_lock(&req->waitq.lock);
825d6d33 691 if (test_bit(FR_ABORTED, &req->flags))
0d8e84b0
MS
692 err = -ENOENT;
693 else
825d6d33 694 clear_bit(FR_LOCKED, &req->flags);
dc00809a 695 spin_unlock(&req->waitq.lock);
334f485d 696 }
0d8e84b0 697 return err;
334f485d
MS
698}
699
700struct fuse_copy_state {
701 int write;
702 struct fuse_req *req;
6c09e94a 703 struct iov_iter *iter;
dd3bb14f
MS
704 struct pipe_buffer *pipebufs;
705 struct pipe_buffer *currbuf;
706 struct pipe_inode_info *pipe;
334f485d 707 unsigned long nr_segs;
334f485d 708 struct page *pg;
334f485d 709 unsigned len;
c55a01d3 710 unsigned offset;
ce534fb0 711 unsigned move_pages:1;
334f485d
MS
712};
713
dc00809a 714static void fuse_copy_init(struct fuse_copy_state *cs, int write,
6c09e94a 715 struct iov_iter *iter)
334f485d
MS
716{
717 memset(cs, 0, sizeof(*cs));
718 cs->write = write;
6c09e94a 719 cs->iter = iter;
334f485d
MS
720}
721
722/* Unmap and put previous page of userspace buffer */
8bfc016d 723static void fuse_copy_finish(struct fuse_copy_state *cs)
334f485d 724{
dd3bb14f
MS
725 if (cs->currbuf) {
726 struct pipe_buffer *buf = cs->currbuf;
727
c55a01d3 728 if (cs->write)
c3021629 729 buf->len = PAGE_SIZE - cs->len;
dd3bb14f 730 cs->currbuf = NULL;
c55a01d3 731 } else if (cs->pg) {
334f485d
MS
732 if (cs->write) {
733 flush_dcache_page(cs->pg);
734 set_page_dirty_lock(cs->pg);
735 }
736 put_page(cs->pg);
334f485d 737 }
c55a01d3 738 cs->pg = NULL;
334f485d
MS
739}
740
741/*
742 * Get another pagefull of userspace buffer, and map it to kernel
743 * address space, and lock request
744 */
745static int fuse_copy_fill(struct fuse_copy_state *cs)
746{
c55a01d3 747 struct page *page;
334f485d
MS
748 int err;
749
dc00809a 750 err = unlock_request(cs->req);
0d8e84b0
MS
751 if (err)
752 return err;
753
334f485d 754 fuse_copy_finish(cs);
dd3bb14f
MS
755 if (cs->pipebufs) {
756 struct pipe_buffer *buf = cs->pipebufs;
757
c3021629
MS
758 if (!cs->write) {
759 err = buf->ops->confirm(cs->pipe, buf);
760 if (err)
761 return err;
762
763 BUG_ON(!cs->nr_segs);
764 cs->currbuf = buf;
c55a01d3
MS
765 cs->pg = buf->page;
766 cs->offset = buf->offset;
c3021629 767 cs->len = buf->len;
c3021629
MS
768 cs->pipebufs++;
769 cs->nr_segs--;
770 } else {
c3021629
MS
771 if (cs->nr_segs == cs->pipe->buffers)
772 return -EIO;
773
774 page = alloc_page(GFP_HIGHUSER);
775 if (!page)
776 return -ENOMEM;
777
778 buf->page = page;
779 buf->offset = 0;
780 buf->len = 0;
781
782 cs->currbuf = buf;
c55a01d3
MS
783 cs->pg = page;
784 cs->offset = 0;
c3021629
MS
785 cs->len = PAGE_SIZE;
786 cs->pipebufs++;
787 cs->nr_segs++;
788 }
dd3bb14f 789 } else {
6c09e94a
AV
790 size_t off;
791 err = iov_iter_get_pages(cs->iter, &page, PAGE_SIZE, 1, &off);
dd3bb14f
MS
792 if (err < 0)
793 return err;
6c09e94a
AV
794 BUG_ON(!err);
795 cs->len = err;
796 cs->offset = off;
c55a01d3 797 cs->pg = page;
6c09e94a
AV
798 cs->offset = off;
799 iov_iter_advance(cs->iter, err);
334f485d 800 }
334f485d 801
dc00809a 802 return lock_request(cs->req);
334f485d
MS
803}
804
805/* Do as much copy to/from userspace buffer as we can */
8bfc016d 806static int fuse_copy_do(struct fuse_copy_state *cs, void **val, unsigned *size)
334f485d
MS
807{
808 unsigned ncpy = min(*size, cs->len);
809 if (val) {
c55a01d3
MS
810 void *pgaddr = kmap_atomic(cs->pg);
811 void *buf = pgaddr + cs->offset;
812
334f485d 813 if (cs->write)
c55a01d3 814 memcpy(buf, *val, ncpy);
334f485d 815 else
c55a01d3
MS
816 memcpy(*val, buf, ncpy);
817
818 kunmap_atomic(pgaddr);
334f485d
MS
819 *val += ncpy;
820 }
821 *size -= ncpy;
822 cs->len -= ncpy;
c55a01d3 823 cs->offset += ncpy;
334f485d
MS
824 return ncpy;
825}
826
ce534fb0
MS
827static int fuse_check_page(struct page *page)
828{
829 if (page_mapcount(page) ||
830 page->mapping != NULL ||
831 page_count(page) != 1 ||
832 (page->flags & PAGE_FLAGS_CHECK_AT_PREP &
833 ~(1 << PG_locked |
834 1 << PG_referenced |
835 1 << PG_uptodate |
836 1 << PG_lru |
837 1 << PG_active |
838 1 << PG_reclaim))) {
839 printk(KERN_WARNING "fuse: trying to steal weird page\n");
840 printk(KERN_WARNING " page=%p index=%li flags=%08lx, count=%i, mapcount=%i, mapping=%p\n", page, page->index, page->flags, page_count(page), page_mapcount(page), page->mapping);
841 return 1;
842 }
843 return 0;
844}
845
846static int fuse_try_move_page(struct fuse_copy_state *cs, struct page **pagep)
847{
848 int err;
849 struct page *oldpage = *pagep;
850 struct page *newpage;
851 struct pipe_buffer *buf = cs->pipebufs;
ce534fb0 852
dc00809a 853 err = unlock_request(cs->req);
0d8e84b0
MS
854 if (err)
855 return err;
856
ce534fb0
MS
857 fuse_copy_finish(cs);
858
859 err = buf->ops->confirm(cs->pipe, buf);
860 if (err)
861 return err;
862
863 BUG_ON(!cs->nr_segs);
864 cs->currbuf = buf;
865 cs->len = buf->len;
866 cs->pipebufs++;
867 cs->nr_segs--;
868
869 if (cs->len != PAGE_SIZE)
870 goto out_fallback;
871
872 if (buf->ops->steal(cs->pipe, buf) != 0)
873 goto out_fallback;
874
875 newpage = buf->page;
876
aa991b3b
MS
877 if (!PageUptodate(newpage))
878 SetPageUptodate(newpage);
ce534fb0
MS
879
880 ClearPageMappedToDisk(newpage);
881
882 if (fuse_check_page(newpage) != 0)
883 goto out_fallback_unlock;
884
ce534fb0
MS
885 /*
886 * This is a new and locked page, it shouldn't be mapped or
887 * have any special flags on it
888 */
889 if (WARN_ON(page_mapped(oldpage)))
890 goto out_fallback_unlock;
891 if (WARN_ON(page_has_private(oldpage)))
892 goto out_fallback_unlock;
893 if (WARN_ON(PageDirty(oldpage) || PageWriteback(oldpage)))
894 goto out_fallback_unlock;
895 if (WARN_ON(PageMlocked(oldpage)))
896 goto out_fallback_unlock;
897
ef6a3c63 898 err = replace_page_cache_page(oldpage, newpage, GFP_KERNEL);
ce534fb0 899 if (err) {
ef6a3c63
MS
900 unlock_page(newpage);
901 return err;
ce534fb0 902 }
ef6a3c63 903
ce534fb0
MS
904 page_cache_get(newpage);
905
906 if (!(buf->flags & PIPE_BUF_FLAG_LRU))
907 lru_cache_add_file(newpage);
908
909 err = 0;
dc00809a 910 spin_lock(&cs->req->waitq.lock);
825d6d33 911 if (test_bit(FR_ABORTED, &cs->req->flags))
ce534fb0
MS
912 err = -ENOENT;
913 else
914 *pagep = newpage;
dc00809a 915 spin_unlock(&cs->req->waitq.lock);
ce534fb0
MS
916
917 if (err) {
918 unlock_page(newpage);
919 page_cache_release(newpage);
920 return err;
921 }
922
923 unlock_page(oldpage);
924 page_cache_release(oldpage);
925 cs->len = 0;
926
927 return 0;
928
929out_fallback_unlock:
930 unlock_page(newpage);
931out_fallback:
c55a01d3
MS
932 cs->pg = buf->page;
933 cs->offset = buf->offset;
ce534fb0 934
dc00809a 935 err = lock_request(cs->req);
ce534fb0
MS
936 if (err)
937 return err;
938
939 return 1;
940}
941
c3021629
MS
942static int fuse_ref_page(struct fuse_copy_state *cs, struct page *page,
943 unsigned offset, unsigned count)
944{
945 struct pipe_buffer *buf;
0d8e84b0 946 int err;
c3021629
MS
947
948 if (cs->nr_segs == cs->pipe->buffers)
949 return -EIO;
950
dc00809a 951 err = unlock_request(cs->req);
0d8e84b0
MS
952 if (err)
953 return err;
954
c3021629
MS
955 fuse_copy_finish(cs);
956
957 buf = cs->pipebufs;
958 page_cache_get(page);
959 buf->page = page;
960 buf->offset = offset;
961 buf->len = count;
962
963 cs->pipebufs++;
964 cs->nr_segs++;
965 cs->len = 0;
966
967 return 0;
968}
969
334f485d
MS
970/*
971 * Copy a page in the request to/from the userspace buffer. Must be
972 * done atomically
973 */
ce534fb0 974static int fuse_copy_page(struct fuse_copy_state *cs, struct page **pagep,
8bfc016d 975 unsigned offset, unsigned count, int zeroing)
334f485d 976{
ce534fb0
MS
977 int err;
978 struct page *page = *pagep;
979
b6777c40
MS
980 if (page && zeroing && count < PAGE_SIZE)
981 clear_highpage(page);
982
334f485d 983 while (count) {
c3021629
MS
984 if (cs->write && cs->pipebufs && page) {
985 return fuse_ref_page(cs, page, offset, count);
986 } else if (!cs->len) {
ce534fb0
MS
987 if (cs->move_pages && page &&
988 offset == 0 && count == PAGE_SIZE) {
989 err = fuse_try_move_page(cs, pagep);
990 if (err <= 0)
991 return err;
992 } else {
993 err = fuse_copy_fill(cs);
994 if (err)
995 return err;
996 }
1729a16c 997 }
334f485d 998 if (page) {
2408f6ef 999 void *mapaddr = kmap_atomic(page);
334f485d
MS
1000 void *buf = mapaddr + offset;
1001 offset += fuse_copy_do(cs, &buf, &count);
2408f6ef 1002 kunmap_atomic(mapaddr);
334f485d
MS
1003 } else
1004 offset += fuse_copy_do(cs, NULL, &count);
1005 }
1006 if (page && !cs->write)
1007 flush_dcache_page(page);
1008 return 0;
1009}
1010
1011/* Copy pages in the request to/from userspace buffer */
1012static int fuse_copy_pages(struct fuse_copy_state *cs, unsigned nbytes,
1013 int zeroing)
1014{
1015 unsigned i;
1016 struct fuse_req *req = cs->req;
334f485d
MS
1017
1018 for (i = 0; i < req->num_pages && (nbytes || zeroing); i++) {
ce534fb0 1019 int err;
85f40aec
MP
1020 unsigned offset = req->page_descs[i].offset;
1021 unsigned count = min(nbytes, req->page_descs[i].length);
ce534fb0
MS
1022
1023 err = fuse_copy_page(cs, &req->pages[i], offset, count,
1024 zeroing);
334f485d
MS
1025 if (err)
1026 return err;
1027
1028 nbytes -= count;
334f485d
MS
1029 }
1030 return 0;
1031}
1032
1033/* Copy a single argument in the request to/from userspace buffer */
1034static int fuse_copy_one(struct fuse_copy_state *cs, void *val, unsigned size)
1035{
1036 while (size) {
1729a16c
MS
1037 if (!cs->len) {
1038 int err = fuse_copy_fill(cs);
1039 if (err)
1040 return err;
1041 }
334f485d
MS
1042 fuse_copy_do(cs, &val, &size);
1043 }
1044 return 0;
1045}
1046
1047/* Copy request arguments to/from userspace buffer */
1048static int fuse_copy_args(struct fuse_copy_state *cs, unsigned numargs,
1049 unsigned argpages, struct fuse_arg *args,
1050 int zeroing)
1051{
1052 int err = 0;
1053 unsigned i;
1054
1055 for (i = 0; !err && i < numargs; i++) {
1056 struct fuse_arg *arg = &args[i];
1057 if (i == numargs - 1 && argpages)
1058 err = fuse_copy_pages(cs, arg->size, zeroing);
1059 else
1060 err = fuse_copy_one(cs, arg->value, arg->size);
1061 }
1062 return err;
1063}
1064
f88996a9 1065static int forget_pending(struct fuse_iqueue *fiq)
07e77dca 1066{
f88996a9 1067 return fiq->forget_list_head.next != NULL;
07e77dca
MS
1068}
1069
f88996a9 1070static int request_pending(struct fuse_iqueue *fiq)
a4d27e75 1071{
f88996a9
MS
1072 return !list_empty(&fiq->pending) || !list_empty(&fiq->interrupts) ||
1073 forget_pending(fiq);
a4d27e75
MS
1074}
1075
a4d27e75
MS
1076/*
1077 * Transfer an interrupt request to userspace
1078 *
1079 * Unlike other requests this is assembled on demand, without a need
1080 * to allocate a separate fuse_req structure.
1081 *
fd22d62e 1082 * Called with fiq->waitq.lock held, releases it
a4d27e75 1083 */
fd22d62e
MS
1084static int fuse_read_interrupt(struct fuse_iqueue *fiq,
1085 struct fuse_copy_state *cs,
c3021629 1086 size_t nbytes, struct fuse_req *req)
fd22d62e 1087__releases(fiq->waitq.lock)
a4d27e75 1088{
a4d27e75
MS
1089 struct fuse_in_header ih;
1090 struct fuse_interrupt_in arg;
1091 unsigned reqsize = sizeof(ih) + sizeof(arg);
1092 int err;
1093
1094 list_del_init(&req->intr_entry);
4ce60812 1095 req->intr_unique = fuse_get_unique(fiq);
a4d27e75
MS
1096 memset(&ih, 0, sizeof(ih));
1097 memset(&arg, 0, sizeof(arg));
1098 ih.len = reqsize;
1099 ih.opcode = FUSE_INTERRUPT;
1100 ih.unique = req->intr_unique;
1101 arg.unique = req->in.h.unique;
1102
4ce60812 1103 spin_unlock(&fiq->waitq.lock);
c3021629 1104 if (nbytes < reqsize)
a4d27e75
MS
1105 return -EINVAL;
1106
c3021629 1107 err = fuse_copy_one(cs, &ih, sizeof(ih));
a4d27e75 1108 if (!err)
c3021629
MS
1109 err = fuse_copy_one(cs, &arg, sizeof(arg));
1110 fuse_copy_finish(cs);
a4d27e75
MS
1111
1112 return err ? err : reqsize;
1113}
1114
f88996a9 1115static struct fuse_forget_link *dequeue_forget(struct fuse_iqueue *fiq,
02c048b9
MS
1116 unsigned max,
1117 unsigned *countp)
07e77dca 1118{
f88996a9 1119 struct fuse_forget_link *head = fiq->forget_list_head.next;
02c048b9
MS
1120 struct fuse_forget_link **newhead = &head;
1121 unsigned count;
07e77dca 1122
02c048b9
MS
1123 for (count = 0; *newhead != NULL && count < max; count++)
1124 newhead = &(*newhead)->next;
1125
f88996a9 1126 fiq->forget_list_head.next = *newhead;
02c048b9 1127 *newhead = NULL;
f88996a9
MS
1128 if (fiq->forget_list_head.next == NULL)
1129 fiq->forget_list_tail = &fiq->forget_list_head;
07e77dca 1130
02c048b9
MS
1131 if (countp != NULL)
1132 *countp = count;
1133
1134 return head;
07e77dca
MS
1135}
1136
fd22d62e 1137static int fuse_read_single_forget(struct fuse_iqueue *fiq,
07e77dca
MS
1138 struct fuse_copy_state *cs,
1139 size_t nbytes)
fd22d62e 1140__releases(fiq->waitq.lock)
07e77dca
MS
1141{
1142 int err;
f88996a9 1143 struct fuse_forget_link *forget = dequeue_forget(fiq, 1, NULL);
07e77dca 1144 struct fuse_forget_in arg = {
02c048b9 1145 .nlookup = forget->forget_one.nlookup,
07e77dca
MS
1146 };
1147 struct fuse_in_header ih = {
1148 .opcode = FUSE_FORGET,
02c048b9 1149 .nodeid = forget->forget_one.nodeid,
f88996a9 1150 .unique = fuse_get_unique(fiq),
07e77dca
MS
1151 .len = sizeof(ih) + sizeof(arg),
1152 };
1153
4ce60812 1154 spin_unlock(&fiq->waitq.lock);
07e77dca
MS
1155 kfree(forget);
1156 if (nbytes < ih.len)
1157 return -EINVAL;
1158
1159 err = fuse_copy_one(cs, &ih, sizeof(ih));
1160 if (!err)
1161 err = fuse_copy_one(cs, &arg, sizeof(arg));
1162 fuse_copy_finish(cs);
1163
1164 if (err)
1165 return err;
1166
1167 return ih.len;
1168}
1169
fd22d62e 1170static int fuse_read_batch_forget(struct fuse_iqueue *fiq,
02c048b9 1171 struct fuse_copy_state *cs, size_t nbytes)
fd22d62e 1172__releases(fiq->waitq.lock)
02c048b9
MS
1173{
1174 int err;
1175 unsigned max_forgets;
1176 unsigned count;
1177 struct fuse_forget_link *head;
1178 struct fuse_batch_forget_in arg = { .count = 0 };
1179 struct fuse_in_header ih = {
1180 .opcode = FUSE_BATCH_FORGET,
f88996a9 1181 .unique = fuse_get_unique(fiq),
02c048b9
MS
1182 .len = sizeof(ih) + sizeof(arg),
1183 };
1184
1185 if (nbytes < ih.len) {
4ce60812 1186 spin_unlock(&fiq->waitq.lock);
02c048b9
MS
1187 return -EINVAL;
1188 }
1189
1190 max_forgets = (nbytes - ih.len) / sizeof(struct fuse_forget_one);
f88996a9 1191 head = dequeue_forget(fiq, max_forgets, &count);
4ce60812 1192 spin_unlock(&fiq->waitq.lock);
02c048b9
MS
1193
1194 arg.count = count;
1195 ih.len += count * sizeof(struct fuse_forget_one);
1196 err = fuse_copy_one(cs, &ih, sizeof(ih));
1197 if (!err)
1198 err = fuse_copy_one(cs, &arg, sizeof(arg));
1199
1200 while (head) {
1201 struct fuse_forget_link *forget = head;
1202
1203 if (!err) {
1204 err = fuse_copy_one(cs, &forget->forget_one,
1205 sizeof(forget->forget_one));
1206 }
1207 head = forget->next;
1208 kfree(forget);
1209 }
1210
1211 fuse_copy_finish(cs);
1212
1213 if (err)
1214 return err;
1215
1216 return ih.len;
1217}
1218
fd22d62e
MS
1219static int fuse_read_forget(struct fuse_conn *fc, struct fuse_iqueue *fiq,
1220 struct fuse_copy_state *cs,
02c048b9 1221 size_t nbytes)
fd22d62e 1222__releases(fiq->waitq.lock)
02c048b9 1223{
f88996a9 1224 if (fc->minor < 16 || fiq->forget_list_head.next->next == NULL)
fd22d62e 1225 return fuse_read_single_forget(fiq, cs, nbytes);
02c048b9 1226 else
fd22d62e 1227 return fuse_read_batch_forget(fiq, cs, nbytes);
02c048b9
MS
1228}
1229
334f485d
MS
1230/*
1231 * Read a single request into the userspace filesystem's buffer. This
1232 * function waits until a request is available, then removes it from
1233 * the pending list and copies request data to userspace buffer. If
f9a2842e
MS
1234 * no reply is needed (FORGET) or request has been aborted or there
1235 * was an error during the copying then it's finished by calling
334f485d
MS
1236 * request_end(). Otherwise add it to the processing list, and set
1237 * the 'sent' flag.
1238 */
c3021629
MS
1239static ssize_t fuse_dev_do_read(struct fuse_conn *fc, struct file *file,
1240 struct fuse_copy_state *cs, size_t nbytes)
334f485d 1241{
82cbdcd3 1242 ssize_t err;
f88996a9 1243 struct fuse_iqueue *fiq = &fc->iq;
3a2b5b9c 1244 struct fuse_pqueue *fpq = &fc->pq;
334f485d
MS
1245 struct fuse_req *req;
1246 struct fuse_in *in;
334f485d
MS
1247 unsigned reqsize;
1248
1d3d752b 1249 restart:
4ce60812 1250 spin_lock(&fiq->waitq.lock);
e5ac1d1e 1251 err = -EAGAIN;
e16714d8 1252 if ((file->f_flags & O_NONBLOCK) && fiq->connected &&
f88996a9 1253 !request_pending(fiq))
e5ac1d1e
JD
1254 goto err_unlock;
1255
5250921b
MS
1256 err = wait_event_interruptible_exclusive_locked(fiq->waitq,
1257 !fiq->connected || request_pending(fiq));
1258 if (err)
1259 goto err_unlock;
1260
334f485d 1261 err = -ENODEV;
e16714d8 1262 if (!fiq->connected)
334f485d 1263 goto err_unlock;
334f485d 1264
f88996a9
MS
1265 if (!list_empty(&fiq->interrupts)) {
1266 req = list_entry(fiq->interrupts.next, struct fuse_req,
a4d27e75 1267 intr_entry);
fd22d62e 1268 return fuse_read_interrupt(fiq, cs, nbytes, req);
a4d27e75
MS
1269 }
1270
f88996a9
MS
1271 if (forget_pending(fiq)) {
1272 if (list_empty(&fiq->pending) || fiq->forget_batch-- > 0)
fd22d62e 1273 return fuse_read_forget(fc, fiq, cs, nbytes);
07e77dca 1274
f88996a9
MS
1275 if (fiq->forget_batch <= -8)
1276 fiq->forget_batch = 16;
07e77dca
MS
1277 }
1278
f88996a9 1279 req = list_entry(fiq->pending.next, struct fuse_req, list);
33e14b4d 1280 clear_bit(FR_PENDING, &req->flags);
ef759258 1281 list_del_init(&req->list);
4ce60812
MS
1282 spin_unlock(&fiq->waitq.lock);
1283
fd22d62e 1284 spin_lock(&fc->lock);
334f485d 1285 in = &req->in;
1d3d752b
MS
1286 reqsize = in->h.len;
1287 /* If request is too large, reply with an error and restart the read */
c3021629 1288 if (nbytes < reqsize) {
1d3d752b
MS
1289 req->out.h.error = -EIO;
1290 /* SETXATTR is special, since it may contain too large data */
1291 if (in->h.opcode == FUSE_SETXATTR)
1292 req->out.h.error = -E2BIG;
1293 request_end(fc, req);
1294 goto restart;
334f485d 1295 }
45a91cb1 1296 spin_lock(&fpq->lock);
82cbdcd3 1297 list_add(&req->list, &fpq->io);
45a91cb1 1298 spin_unlock(&fpq->lock);
d7133114 1299 spin_unlock(&fc->lock);
c3021629
MS
1300 cs->req = req;
1301 err = fuse_copy_one(cs, &in->h, sizeof(in->h));
1d3d752b 1302 if (!err)
c3021629 1303 err = fuse_copy_args(cs, in->numargs, in->argpages,
1d3d752b 1304 (struct fuse_arg *) in->args, 0);
c3021629 1305 fuse_copy_finish(cs);
d7133114 1306 spin_lock(&fc->lock);
45a91cb1 1307 spin_lock(&fpq->lock);
825d6d33 1308 clear_bit(FR_LOCKED, &req->flags);
e96edd94 1309 if (!fpq->connected) {
82cbdcd3
MS
1310 err = -ENODEV;
1311 goto out_end;
c9c9d7df 1312 }
334f485d 1313 if (err) {
c9c9d7df 1314 req->out.h.error = -EIO;
82cbdcd3 1315 goto out_end;
334f485d 1316 }
825d6d33 1317 if (!test_bit(FR_ISREPLY, &req->flags)) {
82cbdcd3
MS
1318 err = reqsize;
1319 goto out_end;
334f485d 1320 }
82cbdcd3 1321 list_move_tail(&req->list, &fpq->processing);
45a91cb1 1322 spin_unlock(&fpq->lock);
82cbdcd3
MS
1323 set_bit(FR_SENT, &req->flags);
1324 /* matches barrier in request_wait_answer() */
1325 smp_mb__after_atomic();
1326 if (test_bit(FR_INTERRUPTED, &req->flags))
1327 queue_interrupt(fiq, req);
1328 spin_unlock(&fc->lock);
1329
334f485d
MS
1330 return reqsize;
1331
82cbdcd3 1332out_end:
77cd9d48
MS
1333 if (!test_bit(FR_PRIVATE, &req->flags))
1334 list_del_init(&req->list);
45a91cb1 1335 spin_unlock(&fpq->lock);
82cbdcd3
MS
1336 request_end(fc, req);
1337 return err;
1338
334f485d 1339 err_unlock:
4ce60812 1340 spin_unlock(&fiq->waitq.lock);
334f485d
MS
1341 return err;
1342}
1343
94e4fe2c
TVB
1344static int fuse_dev_open(struct inode *inode, struct file *file)
1345{
1346 /*
1347 * The fuse device's file's private_data is used to hold
1348 * the fuse_conn(ection) when it is mounted, and is used to
1349 * keep track of whether the file has been mounted already.
1350 */
1351 file->private_data = NULL;
1352 return 0;
1353}
1354
fbdbacca 1355static ssize_t fuse_dev_read(struct kiocb *iocb, struct iov_iter *to)
c3021629
MS
1356{
1357 struct fuse_copy_state cs;
1358 struct file *file = iocb->ki_filp;
1359 struct fuse_conn *fc = fuse_get_conn(file);
1360 if (!fc)
1361 return -EPERM;
1362
fbdbacca
AV
1363 if (!iter_is_iovec(to))
1364 return -EINVAL;
1365
dc00809a 1366 fuse_copy_init(&cs, 1, to);
c3021629 1367
fbdbacca 1368 return fuse_dev_do_read(fc, file, &cs, iov_iter_count(to));
c3021629
MS
1369}
1370
c3021629
MS
1371static ssize_t fuse_dev_splice_read(struct file *in, loff_t *ppos,
1372 struct pipe_inode_info *pipe,
1373 size_t len, unsigned int flags)
1374{
1375 int ret;
1376 int page_nr = 0;
1377 int do_wakeup = 0;
1378 struct pipe_buffer *bufs;
1379 struct fuse_copy_state cs;
1380 struct fuse_conn *fc = fuse_get_conn(in);
1381 if (!fc)
1382 return -EPERM;
1383
07e77dca 1384 bufs = kmalloc(pipe->buffers * sizeof(struct pipe_buffer), GFP_KERNEL);
c3021629
MS
1385 if (!bufs)
1386 return -ENOMEM;
1387
dc00809a 1388 fuse_copy_init(&cs, 1, NULL);
c3021629
MS
1389 cs.pipebufs = bufs;
1390 cs.pipe = pipe;
1391 ret = fuse_dev_do_read(fc, in, &cs, len);
1392 if (ret < 0)
1393 goto out;
1394
1395 ret = 0;
1396 pipe_lock(pipe);
1397
1398 if (!pipe->readers) {
1399 send_sig(SIGPIPE, current, 0);
1400 if (!ret)
1401 ret = -EPIPE;
1402 goto out_unlock;
1403 }
1404
1405 if (pipe->nrbufs + cs.nr_segs > pipe->buffers) {
1406 ret = -EIO;
1407 goto out_unlock;
1408 }
1409
1410 while (page_nr < cs.nr_segs) {
1411 int newbuf = (pipe->curbuf + pipe->nrbufs) & (pipe->buffers - 1);
1412 struct pipe_buffer *buf = pipe->bufs + newbuf;
1413
1414 buf->page = bufs[page_nr].page;
1415 buf->offset = bufs[page_nr].offset;
1416 buf->len = bufs[page_nr].len;
28a625cb
MS
1417 /*
1418 * Need to be careful about this. Having buf->ops in module
1419 * code can Oops if the buffer persists after module unload.
1420 */
1421 buf->ops = &nosteal_pipe_buf_ops;
c3021629
MS
1422
1423 pipe->nrbufs++;
1424 page_nr++;
1425 ret += buf->len;
1426
6447a3cf 1427 if (pipe->files)
c3021629
MS
1428 do_wakeup = 1;
1429 }
1430
1431out_unlock:
1432 pipe_unlock(pipe);
1433
1434 if (do_wakeup) {
1435 smp_mb();
1436 if (waitqueue_active(&pipe->wait))
1437 wake_up_interruptible(&pipe->wait);
1438 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
1439 }
1440
1441out:
1442 for (; page_nr < cs.nr_segs; page_nr++)
1443 page_cache_release(bufs[page_nr].page);
1444
1445 kfree(bufs);
1446 return ret;
1447}
1448
95668a69
TH
1449static int fuse_notify_poll(struct fuse_conn *fc, unsigned int size,
1450 struct fuse_copy_state *cs)
1451{
1452 struct fuse_notify_poll_wakeup_out outarg;
f6d47a17 1453 int err = -EINVAL;
95668a69
TH
1454
1455 if (size != sizeof(outarg))
f6d47a17 1456 goto err;
95668a69
TH
1457
1458 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1459 if (err)
f6d47a17 1460 goto err;
95668a69 1461
f6d47a17 1462 fuse_copy_finish(cs);
95668a69 1463 return fuse_notify_poll_wakeup(fc, &outarg);
f6d47a17
MS
1464
1465err:
1466 fuse_copy_finish(cs);
1467 return err;
95668a69
TH
1468}
1469
3b463ae0
JM
1470static int fuse_notify_inval_inode(struct fuse_conn *fc, unsigned int size,
1471 struct fuse_copy_state *cs)
1472{
1473 struct fuse_notify_inval_inode_out outarg;
1474 int err = -EINVAL;
1475
1476 if (size != sizeof(outarg))
1477 goto err;
1478
1479 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1480 if (err)
1481 goto err;
1482 fuse_copy_finish(cs);
1483
1484 down_read(&fc->killsb);
1485 err = -ENOENT;
b21dda43
MS
1486 if (fc->sb) {
1487 err = fuse_reverse_inval_inode(fc->sb, outarg.ino,
1488 outarg.off, outarg.len);
1489 }
3b463ae0
JM
1490 up_read(&fc->killsb);
1491 return err;
1492
1493err:
1494 fuse_copy_finish(cs);
1495 return err;
1496}
1497
1498static int fuse_notify_inval_entry(struct fuse_conn *fc, unsigned int size,
1499 struct fuse_copy_state *cs)
1500{
1501 struct fuse_notify_inval_entry_out outarg;
b2d82ee3
FW
1502 int err = -ENOMEM;
1503 char *buf;
3b463ae0
JM
1504 struct qstr name;
1505
b2d82ee3
FW
1506 buf = kzalloc(FUSE_NAME_MAX + 1, GFP_KERNEL);
1507 if (!buf)
1508 goto err;
1509
1510 err = -EINVAL;
3b463ae0
JM
1511 if (size < sizeof(outarg))
1512 goto err;
1513
1514 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1515 if (err)
1516 goto err;
1517
1518 err = -ENAMETOOLONG;
1519 if (outarg.namelen > FUSE_NAME_MAX)
1520 goto err;
1521
c2183d1e
MS
1522 err = -EINVAL;
1523 if (size != sizeof(outarg) + outarg.namelen + 1)
1524 goto err;
1525
3b463ae0
JM
1526 name.name = buf;
1527 name.len = outarg.namelen;
1528 err = fuse_copy_one(cs, buf, outarg.namelen + 1);
1529 if (err)
1530 goto err;
1531 fuse_copy_finish(cs);
1532 buf[outarg.namelen] = 0;
1533 name.hash = full_name_hash(name.name, name.len);
1534
1535 down_read(&fc->killsb);
1536 err = -ENOENT;
b21dda43 1537 if (fc->sb)
451d0f59
JM
1538 err = fuse_reverse_inval_entry(fc->sb, outarg.parent, 0, &name);
1539 up_read(&fc->killsb);
1540 kfree(buf);
1541 return err;
1542
1543err:
1544 kfree(buf);
1545 fuse_copy_finish(cs);
1546 return err;
1547}
1548
1549static int fuse_notify_delete(struct fuse_conn *fc, unsigned int size,
1550 struct fuse_copy_state *cs)
1551{
1552 struct fuse_notify_delete_out outarg;
1553 int err = -ENOMEM;
1554 char *buf;
1555 struct qstr name;
1556
1557 buf = kzalloc(FUSE_NAME_MAX + 1, GFP_KERNEL);
1558 if (!buf)
1559 goto err;
1560
1561 err = -EINVAL;
1562 if (size < sizeof(outarg))
1563 goto err;
1564
1565 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1566 if (err)
1567 goto err;
1568
1569 err = -ENAMETOOLONG;
1570 if (outarg.namelen > FUSE_NAME_MAX)
1571 goto err;
1572
1573 err = -EINVAL;
1574 if (size != sizeof(outarg) + outarg.namelen + 1)
1575 goto err;
1576
1577 name.name = buf;
1578 name.len = outarg.namelen;
1579 err = fuse_copy_one(cs, buf, outarg.namelen + 1);
1580 if (err)
1581 goto err;
1582 fuse_copy_finish(cs);
1583 buf[outarg.namelen] = 0;
1584 name.hash = full_name_hash(name.name, name.len);
1585
1586 down_read(&fc->killsb);
1587 err = -ENOENT;
1588 if (fc->sb)
1589 err = fuse_reverse_inval_entry(fc->sb, outarg.parent,
1590 outarg.child, &name);
3b463ae0 1591 up_read(&fc->killsb);
b2d82ee3 1592 kfree(buf);
3b463ae0
JM
1593 return err;
1594
1595err:
b2d82ee3 1596 kfree(buf);
3b463ae0
JM
1597 fuse_copy_finish(cs);
1598 return err;
1599}
1600
a1d75f25
MS
1601static int fuse_notify_store(struct fuse_conn *fc, unsigned int size,
1602 struct fuse_copy_state *cs)
1603{
1604 struct fuse_notify_store_out outarg;
1605 struct inode *inode;
1606 struct address_space *mapping;
1607 u64 nodeid;
1608 int err;
1609 pgoff_t index;
1610 unsigned int offset;
1611 unsigned int num;
1612 loff_t file_size;
1613 loff_t end;
1614
1615 err = -EINVAL;
1616 if (size < sizeof(outarg))
1617 goto out_finish;
1618
1619 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1620 if (err)
1621 goto out_finish;
1622
1623 err = -EINVAL;
1624 if (size - sizeof(outarg) != outarg.size)
1625 goto out_finish;
1626
1627 nodeid = outarg.nodeid;
1628
1629 down_read(&fc->killsb);
1630
1631 err = -ENOENT;
1632 if (!fc->sb)
1633 goto out_up_killsb;
1634
1635 inode = ilookup5(fc->sb, nodeid, fuse_inode_eq, &nodeid);
1636 if (!inode)
1637 goto out_up_killsb;
1638
1639 mapping = inode->i_mapping;
1640 index = outarg.offset >> PAGE_CACHE_SHIFT;
1641 offset = outarg.offset & ~PAGE_CACHE_MASK;
1642 file_size = i_size_read(inode);
1643 end = outarg.offset + outarg.size;
1644 if (end > file_size) {
1645 file_size = end;
1646 fuse_write_update_size(inode, file_size);
1647 }
1648
1649 num = outarg.size;
1650 while (num) {
1651 struct page *page;
1652 unsigned int this_num;
1653
1654 err = -ENOMEM;
1655 page = find_or_create_page(mapping, index,
1656 mapping_gfp_mask(mapping));
1657 if (!page)
1658 goto out_iput;
1659
1660 this_num = min_t(unsigned, num, PAGE_CACHE_SIZE - offset);
1661 err = fuse_copy_page(cs, &page, offset, this_num, 0);
063ec1e5
MS
1662 if (!err && offset == 0 &&
1663 (this_num == PAGE_CACHE_SIZE || file_size == end))
a1d75f25
MS
1664 SetPageUptodate(page);
1665 unlock_page(page);
1666 page_cache_release(page);
1667
1668 if (err)
1669 goto out_iput;
1670
1671 num -= this_num;
1672 offset = 0;
1673 index++;
1674 }
1675
1676 err = 0;
1677
1678out_iput:
1679 iput(inode);
1680out_up_killsb:
1681 up_read(&fc->killsb);
1682out_finish:
1683 fuse_copy_finish(cs);
1684 return err;
1685}
1686
2d45ba38
MS
1687static void fuse_retrieve_end(struct fuse_conn *fc, struct fuse_req *req)
1688{
b745bc85 1689 release_pages(req->pages, req->num_pages, false);
2d45ba38
MS
1690}
1691
1692static int fuse_retrieve(struct fuse_conn *fc, struct inode *inode,
1693 struct fuse_notify_retrieve_out *outarg)
1694{
1695 int err;
1696 struct address_space *mapping = inode->i_mapping;
1697 struct fuse_req *req;
1698 pgoff_t index;
1699 loff_t file_size;
1700 unsigned int num;
1701 unsigned int offset;
0157443c 1702 size_t total_len = 0;
4d53dc99 1703 int num_pages;
2d45ba38 1704
4d53dc99
MP
1705 offset = outarg->offset & ~PAGE_CACHE_MASK;
1706 file_size = i_size_read(inode);
1707
1708 num = outarg->size;
1709 if (outarg->offset > file_size)
1710 num = 0;
1711 else if (outarg->offset + num > file_size)
1712 num = file_size - outarg->offset;
1713
1714 num_pages = (num + offset + PAGE_SIZE - 1) >> PAGE_SHIFT;
1715 num_pages = min(num_pages, FUSE_MAX_PAGES_PER_REQ);
1716
1717 req = fuse_get_req(fc, num_pages);
2d45ba38
MS
1718 if (IS_ERR(req))
1719 return PTR_ERR(req);
1720
2d45ba38
MS
1721 req->in.h.opcode = FUSE_NOTIFY_REPLY;
1722 req->in.h.nodeid = outarg->nodeid;
1723 req->in.numargs = 2;
1724 req->in.argpages = 1;
b2430d75 1725 req->page_descs[0].offset = offset;
2d45ba38
MS
1726 req->end = fuse_retrieve_end;
1727
1728 index = outarg->offset >> PAGE_CACHE_SHIFT;
2d45ba38 1729
4d53dc99 1730 while (num && req->num_pages < num_pages) {
2d45ba38
MS
1731 struct page *page;
1732 unsigned int this_num;
1733
1734 page = find_get_page(mapping, index);
1735 if (!page)
1736 break;
1737
1738 this_num = min_t(unsigned, num, PAGE_CACHE_SIZE - offset);
1739 req->pages[req->num_pages] = page;
85f40aec 1740 req->page_descs[req->num_pages].length = this_num;
2d45ba38
MS
1741 req->num_pages++;
1742
c9e67d48 1743 offset = 0;
2d45ba38
MS
1744 num -= this_num;
1745 total_len += this_num;
48706d0a 1746 index++;
2d45ba38
MS
1747 }
1748 req->misc.retrieve_in.offset = outarg->offset;
1749 req->misc.retrieve_in.size = total_len;
1750 req->in.args[0].size = sizeof(req->misc.retrieve_in);
1751 req->in.args[0].value = &req->misc.retrieve_in;
1752 req->in.args[1].size = total_len;
1753
1754 err = fuse_request_send_notify_reply(fc, req, outarg->notify_unique);
1755 if (err)
1756 fuse_retrieve_end(fc, req);
1757
1758 return err;
1759}
1760
1761static int fuse_notify_retrieve(struct fuse_conn *fc, unsigned int size,
1762 struct fuse_copy_state *cs)
1763{
1764 struct fuse_notify_retrieve_out outarg;
1765 struct inode *inode;
1766 int err;
1767
1768 err = -EINVAL;
1769 if (size != sizeof(outarg))
1770 goto copy_finish;
1771
1772 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
1773 if (err)
1774 goto copy_finish;
1775
1776 fuse_copy_finish(cs);
1777
1778 down_read(&fc->killsb);
1779 err = -ENOENT;
1780 if (fc->sb) {
1781 u64 nodeid = outarg.nodeid;
1782
1783 inode = ilookup5(fc->sb, nodeid, fuse_inode_eq, &nodeid);
1784 if (inode) {
1785 err = fuse_retrieve(fc, inode, &outarg);
1786 iput(inode);
1787 }
1788 }
1789 up_read(&fc->killsb);
1790
1791 return err;
1792
1793copy_finish:
1794 fuse_copy_finish(cs);
1795 return err;
1796}
1797
8599396b
TH
1798static int fuse_notify(struct fuse_conn *fc, enum fuse_notify_code code,
1799 unsigned int size, struct fuse_copy_state *cs)
1800{
0d278362
MS
1801 /* Don't try to move pages (yet) */
1802 cs->move_pages = 0;
1803
8599396b 1804 switch (code) {
95668a69
TH
1805 case FUSE_NOTIFY_POLL:
1806 return fuse_notify_poll(fc, size, cs);
1807
3b463ae0
JM
1808 case FUSE_NOTIFY_INVAL_INODE:
1809 return fuse_notify_inval_inode(fc, size, cs);
1810
1811 case FUSE_NOTIFY_INVAL_ENTRY:
1812 return fuse_notify_inval_entry(fc, size, cs);
1813
a1d75f25
MS
1814 case FUSE_NOTIFY_STORE:
1815 return fuse_notify_store(fc, size, cs);
1816
2d45ba38
MS
1817 case FUSE_NOTIFY_RETRIEVE:
1818 return fuse_notify_retrieve(fc, size, cs);
1819
451d0f59
JM
1820 case FUSE_NOTIFY_DELETE:
1821 return fuse_notify_delete(fc, size, cs);
1822
8599396b 1823 default:
f6d47a17 1824 fuse_copy_finish(cs);
8599396b
TH
1825 return -EINVAL;
1826 }
1827}
1828
334f485d 1829/* Look up request on processing list by unique ID */
3a2b5b9c 1830static struct fuse_req *request_find(struct fuse_pqueue *fpq, u64 unique)
334f485d 1831{
05726aca 1832 struct fuse_req *req;
334f485d 1833
3a2b5b9c 1834 list_for_each_entry(req, &fpq->processing, list) {
a4d27e75 1835 if (req->in.h.unique == unique || req->intr_unique == unique)
334f485d
MS
1836 return req;
1837 }
1838 return NULL;
1839}
1840
1841static int copy_out_args(struct fuse_copy_state *cs, struct fuse_out *out,
1842 unsigned nbytes)
1843{
1844 unsigned reqsize = sizeof(struct fuse_out_header);
1845
1846 if (out->h.error)
1847 return nbytes != reqsize ? -EINVAL : 0;
1848
1849 reqsize += len_args(out->numargs, out->args);
1850
1851 if (reqsize < nbytes || (reqsize > nbytes && !out->argvar))
1852 return -EINVAL;
1853 else if (reqsize > nbytes) {
1854 struct fuse_arg *lastarg = &out->args[out->numargs-1];
1855 unsigned diffsize = reqsize - nbytes;
1856 if (diffsize > lastarg->size)
1857 return -EINVAL;
1858 lastarg->size -= diffsize;
1859 }
1860 return fuse_copy_args(cs, out->numargs, out->argpages, out->args,
1861 out->page_zeroing);
1862}
1863
1864/*
1865 * Write a single reply to a request. First the header is copied from
1866 * the write buffer. The request is then searched on the processing
1867 * list by the unique ID found in the header. If found, then remove
1868 * it from the list and copy the rest of the buffer to the request.
1869 * The request is finished by calling request_end()
1870 */
dd3bb14f
MS
1871static ssize_t fuse_dev_do_write(struct fuse_conn *fc,
1872 struct fuse_copy_state *cs, size_t nbytes)
334f485d
MS
1873{
1874 int err;
3a2b5b9c 1875 struct fuse_pqueue *fpq = &fc->pq;
334f485d
MS
1876 struct fuse_req *req;
1877 struct fuse_out_header oh;
334f485d 1878
334f485d
MS
1879 if (nbytes < sizeof(struct fuse_out_header))
1880 return -EINVAL;
1881
dd3bb14f 1882 err = fuse_copy_one(cs, &oh, sizeof(oh));
334f485d
MS
1883 if (err)
1884 goto err_finish;
8599396b
TH
1885
1886 err = -EINVAL;
1887 if (oh.len != nbytes)
1888 goto err_finish;
1889
1890 /*
1891 * Zero oh.unique indicates unsolicited notification message
1892 * and error contains notification code.
1893 */
1894 if (!oh.unique) {
dd3bb14f 1895 err = fuse_notify(fc, oh.error, nbytes - sizeof(oh), cs);
8599396b
TH
1896 return err ? err : nbytes;
1897 }
1898
334f485d 1899 err = -EINVAL;
8599396b 1900 if (oh.error <= -1000 || oh.error > 0)
334f485d
MS
1901 goto err_finish;
1902
d7133114 1903 spin_lock(&fc->lock);
45a91cb1 1904 spin_lock(&fpq->lock);
69a53bf2 1905 err = -ENOENT;
e96edd94 1906 if (!fpq->connected)
45a91cb1 1907 goto err_unlock_pq;
69a53bf2 1908
3a2b5b9c 1909 req = request_find(fpq, oh.unique);
334f485d 1910 if (!req)
45a91cb1 1911 goto err_unlock_pq;
334f485d 1912
a4d27e75
MS
1913 /* Is it an interrupt reply? */
1914 if (req->intr_unique == oh.unique) {
45a91cb1
MS
1915 spin_unlock(&fpq->lock);
1916
a4d27e75
MS
1917 err = -EINVAL;
1918 if (nbytes != sizeof(struct fuse_out_header))
1919 goto err_unlock;
1920
1921 if (oh.error == -ENOSYS)
1922 fc->no_interrupt = 1;
1923 else if (oh.error == -EAGAIN)
f88996a9 1924 queue_interrupt(&fc->iq, req);
a4d27e75
MS
1925
1926 spin_unlock(&fc->lock);
dd3bb14f 1927 fuse_copy_finish(cs);
a4d27e75
MS
1928 return nbytes;
1929 }
1930
33e14b4d 1931 clear_bit(FR_SENT, &req->flags);
3a2b5b9c 1932 list_move(&req->list, &fpq->io);
334f485d 1933 req->out.h = oh;
825d6d33 1934 set_bit(FR_LOCKED, &req->flags);
45a91cb1 1935 spin_unlock(&fpq->lock);
dd3bb14f 1936 cs->req = req;
ce534fb0
MS
1937 if (!req->out.page_replace)
1938 cs->move_pages = 0;
d7133114 1939 spin_unlock(&fc->lock);
334f485d 1940
dd3bb14f
MS
1941 err = copy_out_args(cs, &req->out, nbytes);
1942 fuse_copy_finish(cs);
334f485d 1943
d7133114 1944 spin_lock(&fc->lock);
45a91cb1 1945 spin_lock(&fpq->lock);
825d6d33 1946 clear_bit(FR_LOCKED, &req->flags);
e96edd94 1947 if (!fpq->connected)
0d8e84b0
MS
1948 err = -ENOENT;
1949 else if (err)
334f485d 1950 req->out.h.error = -EIO;
77cd9d48
MS
1951 if (!test_bit(FR_PRIVATE, &req->flags))
1952 list_del_init(&req->list);
45a91cb1 1953 spin_unlock(&fpq->lock);
334f485d
MS
1954 request_end(fc, req);
1955
1956 return err ? err : nbytes;
1957
45a91cb1
MS
1958 err_unlock_pq:
1959 spin_unlock(&fpq->lock);
334f485d 1960 err_unlock:
d7133114 1961 spin_unlock(&fc->lock);
334f485d 1962 err_finish:
dd3bb14f 1963 fuse_copy_finish(cs);
334f485d
MS
1964 return err;
1965}
1966
fbdbacca 1967static ssize_t fuse_dev_write(struct kiocb *iocb, struct iov_iter *from)
dd3bb14f
MS
1968{
1969 struct fuse_copy_state cs;
1970 struct fuse_conn *fc = fuse_get_conn(iocb->ki_filp);
1971 if (!fc)
1972 return -EPERM;
1973
fbdbacca
AV
1974 if (!iter_is_iovec(from))
1975 return -EINVAL;
1976
dc00809a 1977 fuse_copy_init(&cs, 0, from);
dd3bb14f 1978
fbdbacca 1979 return fuse_dev_do_write(fc, &cs, iov_iter_count(from));
dd3bb14f
MS
1980}
1981
1982static ssize_t fuse_dev_splice_write(struct pipe_inode_info *pipe,
1983 struct file *out, loff_t *ppos,
1984 size_t len, unsigned int flags)
1985{
1986 unsigned nbuf;
1987 unsigned idx;
1988 struct pipe_buffer *bufs;
1989 struct fuse_copy_state cs;
1990 struct fuse_conn *fc;
1991 size_t rem;
1992 ssize_t ret;
1993
1994 fc = fuse_get_conn(out);
1995 if (!fc)
1996 return -EPERM;
1997
07e77dca 1998 bufs = kmalloc(pipe->buffers * sizeof(struct pipe_buffer), GFP_KERNEL);
dd3bb14f
MS
1999 if (!bufs)
2000 return -ENOMEM;
2001
2002 pipe_lock(pipe);
2003 nbuf = 0;
2004 rem = 0;
2005 for (idx = 0; idx < pipe->nrbufs && rem < len; idx++)
2006 rem += pipe->bufs[(pipe->curbuf + idx) & (pipe->buffers - 1)].len;
2007
2008 ret = -EINVAL;
2009 if (rem < len) {
2010 pipe_unlock(pipe);
2011 goto out;
2012 }
2013
2014 rem = len;
2015 while (rem) {
2016 struct pipe_buffer *ibuf;
2017 struct pipe_buffer *obuf;
2018
2019 BUG_ON(nbuf >= pipe->buffers);
2020 BUG_ON(!pipe->nrbufs);
2021 ibuf = &pipe->bufs[pipe->curbuf];
2022 obuf = &bufs[nbuf];
2023
2024 if (rem >= ibuf->len) {
2025 *obuf = *ibuf;
2026 ibuf->ops = NULL;
2027 pipe->curbuf = (pipe->curbuf + 1) & (pipe->buffers - 1);
2028 pipe->nrbufs--;
2029 } else {
2030 ibuf->ops->get(pipe, ibuf);
2031 *obuf = *ibuf;
2032 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
2033 obuf->len = rem;
2034 ibuf->offset += obuf->len;
2035 ibuf->len -= obuf->len;
2036 }
2037 nbuf++;
2038 rem -= obuf->len;
2039 }
2040 pipe_unlock(pipe);
2041
dc00809a 2042 fuse_copy_init(&cs, 0, NULL);
dd3bb14f 2043 cs.pipebufs = bufs;
6c09e94a 2044 cs.nr_segs = nbuf;
dd3bb14f
MS
2045 cs.pipe = pipe;
2046
ce534fb0
MS
2047 if (flags & SPLICE_F_MOVE)
2048 cs.move_pages = 1;
2049
dd3bb14f
MS
2050 ret = fuse_dev_do_write(fc, &cs, len);
2051
2052 for (idx = 0; idx < nbuf; idx++) {
2053 struct pipe_buffer *buf = &bufs[idx];
2054 buf->ops->release(pipe, buf);
2055 }
2056out:
2057 kfree(bufs);
2058 return ret;
2059}
2060
334f485d
MS
2061static unsigned fuse_dev_poll(struct file *file, poll_table *wait)
2062{
334f485d 2063 unsigned mask = POLLOUT | POLLWRNORM;
f88996a9 2064 struct fuse_iqueue *fiq;
7025d9ad 2065 struct fuse_conn *fc = fuse_get_conn(file);
334f485d 2066 if (!fc)
7025d9ad 2067 return POLLERR;
334f485d 2068
f88996a9
MS
2069 fiq = &fc->iq;
2070 poll_wait(file, &fiq->waitq, wait);
334f485d 2071
4ce60812 2072 spin_lock(&fiq->waitq.lock);
e16714d8 2073 if (!fiq->connected)
7025d9ad 2074 mask = POLLERR;
f88996a9 2075 else if (request_pending(fiq))
7025d9ad 2076 mask |= POLLIN | POLLRDNORM;
4ce60812 2077 spin_unlock(&fiq->waitq.lock);
334f485d
MS
2078
2079 return mask;
2080}
2081
69a53bf2
MS
2082/*
2083 * Abort all requests on the given list (pending or processing)
2084 *
d7133114 2085 * This function releases and reacquires fc->lock
69a53bf2 2086 */
334f485d 2087static void end_requests(struct fuse_conn *fc, struct list_head *head)
b9ca67b2
MS
2088__releases(fc->lock)
2089__acquires(fc->lock)
334f485d
MS
2090{
2091 while (!list_empty(head)) {
2092 struct fuse_req *req;
2093 req = list_entry(head->next, struct fuse_req, list);
334f485d 2094 req->out.h.error = -ECONNABORTED;
33e14b4d
MS
2095 clear_bit(FR_PENDING, &req->flags);
2096 clear_bit(FR_SENT, &req->flags);
f377cb79 2097 list_del_init(&req->list);
334f485d 2098 request_end(fc, req);
d7133114 2099 spin_lock(&fc->lock);
334f485d
MS
2100 }
2101}
2102
357ccf2b
BG
2103static void end_polls(struct fuse_conn *fc)
2104{
2105 struct rb_node *p;
2106
2107 p = rb_first(&fc->polled_files);
2108
2109 while (p) {
2110 struct fuse_file *ff;
2111 ff = rb_entry(p, struct fuse_file, polled_node);
2112 wake_up_interruptible_all(&ff->poll_wait);
2113
2114 p = rb_next(p);
2115 }
2116}
2117
69a53bf2
MS
2118/*
2119 * Abort all requests.
2120 *
b716d425
MS
2121 * Emergency exit in case of a malicious or accidental deadlock, or just a hung
2122 * filesystem.
2123 *
2124 * The same effect is usually achievable through killing the filesystem daemon
2125 * and all users of the filesystem. The exception is the combination of an
2126 * asynchronous request and the tricky deadlock (see
2127 * Documentation/filesystems/fuse.txt).
69a53bf2 2128 *
b716d425
MS
2129 * Aborting requests under I/O goes as follows: 1: Separate out unlocked
2130 * requests, they should be finished off immediately. Locked requests will be
2131 * finished after unlock; see unlock_request(). 2: Finish off the unlocked
2132 * requests. It is possible that some request will finish before we can. This
2133 * is OK, the request will in that case be removed from the list before we touch
2134 * it.
69a53bf2
MS
2135 */
2136void fuse_abort_conn(struct fuse_conn *fc)
2137{
f88996a9 2138 struct fuse_iqueue *fiq = &fc->iq;
3a2b5b9c 2139 struct fuse_pqueue *fpq = &fc->pq;
f88996a9 2140
d7133114 2141 spin_lock(&fc->lock);
69a53bf2 2142 if (fc->connected) {
b716d425 2143 struct fuse_req *req, *next;
41f98274
MS
2144 LIST_HEAD(to_end1);
2145 LIST_HEAD(to_end2);
b716d425 2146
69a53bf2 2147 fc->connected = 0;
51eb01e7 2148 fc->blocked = 0;
9759bd51 2149 fuse_set_initialized(fc);
45a91cb1 2150 spin_lock(&fpq->lock);
e96edd94 2151 fpq->connected = 0;
3a2b5b9c 2152 list_for_each_entry_safe(req, next, &fpq->io, list) {
b716d425
MS
2153 req->out.h.error = -ECONNABORTED;
2154 spin_lock(&req->waitq.lock);
2155 set_bit(FR_ABORTED, &req->flags);
77cd9d48
MS
2156 if (!test_bit(FR_LOCKED, &req->flags)) {
2157 set_bit(FR_PRIVATE, &req->flags);
41f98274 2158 list_move(&req->list, &to_end1);
77cd9d48 2159 }
b716d425
MS
2160 spin_unlock(&req->waitq.lock);
2161 }
24b4d33d 2162 list_splice_init(&fpq->processing, &to_end2);
45a91cb1 2163 spin_unlock(&fpq->lock);
41f98274
MS
2164 fc->max_background = UINT_MAX;
2165 flush_bg_queue(fc);
8c91189a 2166
4ce60812 2167 spin_lock(&fiq->waitq.lock);
8c91189a 2168 fiq->connected = 0;
f88996a9 2169 list_splice_init(&fiq->pending, &to_end2);
8c91189a
MS
2170 while (forget_pending(fiq))
2171 kfree(dequeue_forget(fiq, 1, NULL));
4ce60812
MS
2172 wake_up_all_locked(&fiq->waitq);
2173 spin_unlock(&fiq->waitq.lock);
8c91189a
MS
2174 kill_fasync(&fiq->fasync, SIGIO, POLL_IN);
2175
41f98274
MS
2176 while (!list_empty(&to_end1)) {
2177 req = list_first_entry(&to_end1, struct fuse_req, list);
b716d425 2178 __fuse_get_request(req);
f377cb79 2179 list_del_init(&req->list);
b716d425
MS
2180 request_end(fc, req);
2181 spin_lock(&fc->lock);
2182 }
41f98274 2183 end_requests(fc, &to_end2);
357ccf2b 2184 end_polls(fc);
51eb01e7 2185 wake_up_all(&fc->blocked_waitq);
69a53bf2 2186 }
d7133114 2187 spin_unlock(&fc->lock);
69a53bf2 2188}
08cbf542 2189EXPORT_SYMBOL_GPL(fuse_abort_conn);
69a53bf2 2190
08cbf542 2191int fuse_dev_release(struct inode *inode, struct file *file)
334f485d 2192{
0720b315 2193 struct fuse_conn *fc = fuse_get_conn(file);
334f485d 2194 if (fc) {
3a2b5b9c 2195 WARN_ON(!list_empty(&fc->pq.io));
f88996a9 2196 WARN_ON(fc->iq.fasync != NULL);
ccd0a0bd 2197 fuse_abort_conn(fc);
bafa9654 2198 fuse_conn_put(fc);
385a17bf 2199 }
f543f253 2200
334f485d
MS
2201 return 0;
2202}
08cbf542 2203EXPORT_SYMBOL_GPL(fuse_dev_release);
334f485d 2204
385a17bf
JD
2205static int fuse_dev_fasync(int fd, struct file *file, int on)
2206{
2207 struct fuse_conn *fc = fuse_get_conn(file);
2208 if (!fc)
a87046d8 2209 return -EPERM;
385a17bf
JD
2210
2211 /* No locking - fasync_helper does its own locking */
f88996a9 2212 return fasync_helper(fd, file, on, &fc->iq.fasync);
385a17bf
JD
2213}
2214
4b6f5d20 2215const struct file_operations fuse_dev_operations = {
334f485d 2216 .owner = THIS_MODULE,
94e4fe2c 2217 .open = fuse_dev_open,
334f485d 2218 .llseek = no_llseek,
fbdbacca 2219 .read_iter = fuse_dev_read,
c3021629 2220 .splice_read = fuse_dev_splice_read,
fbdbacca 2221 .write_iter = fuse_dev_write,
dd3bb14f 2222 .splice_write = fuse_dev_splice_write,
334f485d
MS
2223 .poll = fuse_dev_poll,
2224 .release = fuse_dev_release,
385a17bf 2225 .fasync = fuse_dev_fasync,
334f485d 2226};
08cbf542 2227EXPORT_SYMBOL_GPL(fuse_dev_operations);
334f485d
MS
2228
2229static struct miscdevice fuse_miscdevice = {
2230 .minor = FUSE_MINOR,
2231 .name = "fuse",
2232 .fops = &fuse_dev_operations,
2233};
2234
2235int __init fuse_dev_init(void)
2236{
2237 int err = -ENOMEM;
2238 fuse_req_cachep = kmem_cache_create("fuse_request",
2239 sizeof(struct fuse_req),
20c2df83 2240 0, 0, NULL);
334f485d
MS
2241 if (!fuse_req_cachep)
2242 goto out;
2243
2244 err = misc_register(&fuse_miscdevice);
2245 if (err)
2246 goto out_cache_clean;
2247
2248 return 0;
2249
2250 out_cache_clean:
2251 kmem_cache_destroy(fuse_req_cachep);
2252 out:
2253 return err;
2254}
2255
2256void fuse_dev_cleanup(void)
2257{
2258 misc_deregister(&fuse_miscdevice);
2259 kmem_cache_destroy(fuse_req_cachep);
2260}
This page took 0.809634 seconds and 5 git commands to generate.