->atomic_open() prototype change - pass int * instead of bool *
[deliverable/linux.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
e5e5558e 16
0a0898cf
MS
17#if BITS_PER_LONG >= 64
18static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
19{
20 entry->d_time = time;
21}
22
23static inline u64 fuse_dentry_time(struct dentry *entry)
24{
25 return entry->d_time;
26}
27#else
28/*
29 * On 32 bit archs store the high 32 bits of time in d_fsdata
30 */
31static void fuse_dentry_settime(struct dentry *entry, u64 time)
32{
33 entry->d_time = time;
34 entry->d_fsdata = (void *) (unsigned long) (time >> 32);
35}
36
37static u64 fuse_dentry_time(struct dentry *entry)
38{
39 return (u64) entry->d_time +
40 ((u64) (unsigned long) entry->d_fsdata << 32);
41}
42#endif
43
6f9f1180
MS
44/*
45 * FUSE caches dentries and attributes with separate timeout. The
46 * time in jiffies until the dentry/attributes are valid is stored in
47 * dentry->d_time and fuse_inode->i_time respectively.
48 */
49
50/*
51 * Calculate the time in jiffies until a dentry/attributes are valid
52 */
0a0898cf 53static u64 time_to_jiffies(unsigned long sec, unsigned long nsec)
e5e5558e 54{
685d16dd
MS
55 if (sec || nsec) {
56 struct timespec ts = {sec, nsec};
0a0898cf 57 return get_jiffies_64() + timespec_to_jiffies(&ts);
685d16dd 58 } else
0a0898cf 59 return 0;
e5e5558e
MS
60}
61
6f9f1180
MS
62/*
63 * Set dentry and possibly attribute timeouts from the lookup/mk*
64 * replies
65 */
1fb69e78
MS
66static void fuse_change_entry_timeout(struct dentry *entry,
67 struct fuse_entry_out *o)
0aa7c699 68{
0a0898cf
MS
69 fuse_dentry_settime(entry,
70 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
71}
72
73static u64 attr_timeout(struct fuse_attr_out *o)
74{
75 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
76}
77
78static u64 entry_attr_timeout(struct fuse_entry_out *o)
79{
80 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
81}
82
6f9f1180
MS
83/*
84 * Mark the attributes as stale, so that at the next call to
85 * ->getattr() they will be fetched from userspace
86 */
8cbdf1e6
MS
87void fuse_invalidate_attr(struct inode *inode)
88{
0a0898cf 89 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
90}
91
6f9f1180
MS
92/*
93 * Just mark the entry as stale, so that a next attempt to look it up
94 * will result in a new lookup call to userspace
95 *
96 * This is called when a dentry is about to become negative and the
97 * timeout is unknown (unlink, rmdir, rename and in some cases
98 * lookup)
99 */
dbd561d2 100void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 101{
0a0898cf 102 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
103}
104
6f9f1180
MS
105/*
106 * Same as fuse_invalidate_entry_cache(), but also try to remove the
107 * dentry from the hash
108 */
8cbdf1e6
MS
109static void fuse_invalidate_entry(struct dentry *entry)
110{
111 d_invalidate(entry);
112 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
113}
114
c180eebe
MS
115static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_req *req,
116 u64 nodeid, struct qstr *name,
e5e5558e
MS
117 struct fuse_entry_out *outarg)
118{
0e9663ee 119 memset(outarg, 0, sizeof(struct fuse_entry_out));
e5e5558e 120 req->in.h.opcode = FUSE_LOOKUP;
c180eebe 121 req->in.h.nodeid = nodeid;
e5e5558e 122 req->in.numargs = 1;
c180eebe
MS
123 req->in.args[0].size = name->len + 1;
124 req->in.args[0].value = name->name;
e5e5558e 125 req->out.numargs = 1;
0e9663ee
MS
126 if (fc->minor < 9)
127 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
128 else
129 req->out.args[0].size = sizeof(struct fuse_entry_out);
e5e5558e
MS
130 req->out.args[0].value = outarg;
131}
132
5c5c5e51 133u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
134{
135 u64 curr_version;
136
137 /*
138 * The spin lock isn't actually needed on 64bit archs, but we
139 * don't yet care too much about such optimizations.
140 */
141 spin_lock(&fc->lock);
142 curr_version = fc->attr_version;
143 spin_unlock(&fc->lock);
144
145 return curr_version;
146}
147
6f9f1180
MS
148/*
149 * Check whether the dentry is still valid
150 *
151 * If the entry validity timeout has expired and the dentry is
152 * positive, try to redo the lookup. If the lookup results in a
153 * different inode, then let the VFS invalidate the dentry and redo
154 * the lookup once more. If the lookup results in the same inode,
155 * then refresh the attributes, timeouts and mark the dentry valid.
156 */
e5e5558e
MS
157static int fuse_dentry_revalidate(struct dentry *entry, struct nameidata *nd)
158{
34286d66 159 struct inode *inode;
8cbdf1e6 160
e7c0a167 161 inode = ACCESS_ONCE(entry->d_inode);
8cbdf1e6 162 if (inode && is_bad_inode(inode))
e5e5558e 163 return 0;
0a0898cf 164 else if (fuse_dentry_time(entry) < get_jiffies_64()) {
e5e5558e 165 int err;
e5e5558e 166 struct fuse_entry_out outarg;
8cbdf1e6
MS
167 struct fuse_conn *fc;
168 struct fuse_req *req;
07e77dca 169 struct fuse_forget_link *forget;
e956edd0 170 struct dentry *parent;
1fb69e78 171 u64 attr_version;
8cbdf1e6 172
50322fe7 173 /* For negative dentries, always do a fresh lookup */
8cbdf1e6
MS
174 if (!inode)
175 return 0;
176
d2433905 177 if (nd && (nd->flags & LOOKUP_RCU))
e7c0a167
MS
178 return -ECHILD;
179
8cbdf1e6 180 fc = get_fuse_conn(inode);
ce1d5a49
MS
181 req = fuse_get_req(fc);
182 if (IS_ERR(req))
e5e5558e
MS
183 return 0;
184
07e77dca
MS
185 forget = fuse_alloc_forget();
186 if (!forget) {
2d51013e
MS
187 fuse_put_request(fc, req);
188 return 0;
189 }
190
7dca9fd3 191 attr_version = fuse_get_attr_version(fc);
1fb69e78 192
e956edd0 193 parent = dget_parent(entry);
c180eebe
MS
194 fuse_lookup_init(fc, req, get_node_id(parent->d_inode),
195 &entry->d_name, &outarg);
b93f858a 196 fuse_request_send(fc, req);
e956edd0 197 dput(parent);
e5e5558e 198 err = req->out.h.error;
2d51013e 199 fuse_put_request(fc, req);
50322fe7
MS
200 /* Zero nodeid is same as -ENOENT */
201 if (!err && !outarg.nodeid)
202 err = -ENOENT;
9e6268db 203 if (!err) {
8cbdf1e6 204 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 205 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 206 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
207 return 0;
208 }
8da5ff23 209 spin_lock(&fc->lock);
1729a16c 210 fi->nlookup++;
8da5ff23 211 spin_unlock(&fc->lock);
9e6268db 212 }
07e77dca 213 kfree(forget);
9e6268db 214 if (err || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e5e5558e
MS
215 return 0;
216
1fb69e78
MS
217 fuse_change_attributes(inode, &outarg.attr,
218 entry_attr_timeout(&outarg),
219 attr_version);
220 fuse_change_entry_timeout(entry, &outarg);
e5e5558e
MS
221 }
222 return 1;
223}
224
8bfc016d 225static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
226{
227 return !nodeid || nodeid == FUSE_ROOT_ID;
228}
229
4269590a 230const struct dentry_operations fuse_dentry_operations = {
e5e5558e
MS
231 .d_revalidate = fuse_dentry_revalidate,
232};
233
a5bfffac 234int fuse_valid_type(int m)
39ee059a
MS
235{
236 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
237 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
238}
239
d2a85164
MS
240/*
241 * Add a directory inode to a dentry, ensuring that no other dentry
242 * refers to this inode. Called with fc->inst_mutex.
243 */
0de6256d
MS
244static struct dentry *fuse_d_add_directory(struct dentry *entry,
245 struct inode *inode)
d2a85164
MS
246{
247 struct dentry *alias = d_find_alias(inode);
0de6256d 248 if (alias && !(alias->d_flags & DCACHE_DISCONNECTED)) {
d2a85164
MS
249 /* This tries to shrink the subtree below alias */
250 fuse_invalidate_entry(alias);
251 dput(alias);
b3d9b7a3 252 if (!hlist_empty(&inode->i_dentry))
0de6256d
MS
253 return ERR_PTR(-EBUSY);
254 } else {
255 dput(alias);
d2a85164 256 }
0de6256d 257 return d_splice_alias(inode, entry);
d2a85164
MS
258}
259
c180eebe
MS
260int fuse_lookup_name(struct super_block *sb, u64 nodeid, struct qstr *name,
261 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 262{
c180eebe 263 struct fuse_conn *fc = get_fuse_conn_super(sb);
e5e5558e 264 struct fuse_req *req;
07e77dca 265 struct fuse_forget_link *forget;
1fb69e78 266 u64 attr_version;
c180eebe 267 int err;
e5e5558e 268
c180eebe
MS
269 *inode = NULL;
270 err = -ENAMETOOLONG;
271 if (name->len > FUSE_NAME_MAX)
272 goto out;
e5e5558e 273
ce1d5a49 274 req = fuse_get_req(fc);
c180eebe 275 err = PTR_ERR(req);
ce1d5a49 276 if (IS_ERR(req))
c180eebe 277 goto out;
e5e5558e 278
07e77dca
MS
279 forget = fuse_alloc_forget();
280 err = -ENOMEM;
281 if (!forget) {
2d51013e 282 fuse_put_request(fc, req);
c180eebe 283 goto out;
2d51013e
MS
284 }
285
7dca9fd3 286 attr_version = fuse_get_attr_version(fc);
1fb69e78 287
c180eebe 288 fuse_lookup_init(fc, req, nodeid, name, outarg);
b93f858a 289 fuse_request_send(fc, req);
e5e5558e 290 err = req->out.h.error;
2d51013e 291 fuse_put_request(fc, req);
50322fe7 292 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
293 if (err || !outarg->nodeid)
294 goto out_put_forget;
295
296 err = -EIO;
297 if (!outarg->nodeid)
298 goto out_put_forget;
299 if (!fuse_valid_type(outarg->attr.mode))
300 goto out_put_forget;
301
302 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
303 &outarg->attr, entry_attr_timeout(outarg),
304 attr_version);
305 err = -ENOMEM;
306 if (!*inode) {
07e77dca 307 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 308 goto out;
e5e5558e 309 }
c180eebe
MS
310 err = 0;
311
312 out_put_forget:
07e77dca 313 kfree(forget);
c180eebe
MS
314 out:
315 return err;
316}
317
318static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
319 struct nameidata *nd)
320{
321 int err;
322 struct fuse_entry_out outarg;
323 struct inode *inode;
324 struct dentry *newent;
325 struct fuse_conn *fc = get_fuse_conn(dir);
326 bool outarg_valid = true;
327
328 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
329 &outarg, &inode);
330 if (err == -ENOENT) {
331 outarg_valid = false;
332 err = 0;
333 }
334 if (err)
335 goto out_err;
336
337 err = -EIO;
338 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
339 goto out_iput;
e5e5558e 340
d2a85164
MS
341 if (inode && S_ISDIR(inode->i_mode)) {
342 mutex_lock(&fc->inst_mutex);
0de6256d 343 newent = fuse_d_add_directory(entry, inode);
d2a85164 344 mutex_unlock(&fc->inst_mutex);
c180eebe
MS
345 err = PTR_ERR(newent);
346 if (IS_ERR(newent))
347 goto out_iput;
348 } else {
0de6256d 349 newent = d_splice_alias(inode, entry);
c180eebe 350 }
d2a85164 351
0de6256d 352 entry = newent ? newent : entry;
c180eebe 353 if (outarg_valid)
1fb69e78 354 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
355 else
356 fuse_invalidate_entry_cache(entry);
c180eebe 357
0de6256d 358 return newent;
c180eebe
MS
359
360 out_iput:
361 iput(inode);
362 out_err:
363 return ERR_PTR(err);
e5e5558e
MS
364}
365
6f9f1180
MS
366/*
367 * Atomic create+open operation
368 *
369 * If the filesystem doesn't support this, then fall back to separate
370 * 'mknod' + 'open' requests.
371 */
c8ccbe03
MS
372static struct file *fuse_create_open(struct inode *dir, struct dentry *entry,
373 struct opendata *od, unsigned flags,
47237687 374 umode_t mode, int *opened)
fd72faac
MS
375{
376 int err;
377 struct inode *inode;
378 struct fuse_conn *fc = get_fuse_conn(dir);
379 struct fuse_req *req;
07e77dca 380 struct fuse_forget_link *forget;
e0a43ddc 381 struct fuse_create_in inarg;
fd72faac
MS
382 struct fuse_open_out outopen;
383 struct fuse_entry_out outentry;
fd72faac
MS
384 struct fuse_file *ff;
385 struct file *file;
fd72faac 386
07e77dca 387 forget = fuse_alloc_forget();
c8ccbe03 388 err = -ENOMEM;
07e77dca 389 if (!forget)
c8ccbe03 390 goto out_err;
51eb01e7 391
ce1d5a49 392 req = fuse_get_req(fc);
51eb01e7 393 err = PTR_ERR(req);
ce1d5a49 394 if (IS_ERR(req))
51eb01e7 395 goto out_put_forget_req;
fd72faac 396
ce1d5a49 397 err = -ENOMEM;
acf99433 398 ff = fuse_file_alloc(fc);
fd72faac
MS
399 if (!ff)
400 goto out_put_request;
401
e0a43ddc
MS
402 if (!fc->dont_mask)
403 mode &= ~current_umask();
404
fd72faac
MS
405 flags &= ~O_NOCTTY;
406 memset(&inarg, 0, sizeof(inarg));
0e9663ee 407 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
408 inarg.flags = flags;
409 inarg.mode = mode;
e0a43ddc 410 inarg.umask = current_umask();
fd72faac
MS
411 req->in.h.opcode = FUSE_CREATE;
412 req->in.h.nodeid = get_node_id(dir);
fd72faac 413 req->in.numargs = 2;
e0a43ddc
MS
414 req->in.args[0].size = fc->minor < 12 ? sizeof(struct fuse_open_in) :
415 sizeof(inarg);
fd72faac
MS
416 req->in.args[0].value = &inarg;
417 req->in.args[1].size = entry->d_name.len + 1;
418 req->in.args[1].value = entry->d_name.name;
419 req->out.numargs = 2;
0e9663ee
MS
420 if (fc->minor < 9)
421 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
422 else
423 req->out.args[0].size = sizeof(outentry);
fd72faac
MS
424 req->out.args[0].value = &outentry;
425 req->out.args[1].size = sizeof(outopen);
426 req->out.args[1].value = &outopen;
b93f858a 427 fuse_request_send(fc, req);
fd72faac 428 err = req->out.h.error;
c8ccbe03 429 if (err)
fd72faac 430 goto out_free_ff;
fd72faac
MS
431
432 err = -EIO;
2827d0b2 433 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
434 goto out_free_ff;
435
51eb01e7 436 fuse_put_request(fc, req);
c7b7143c
MS
437 ff->fh = outopen.fh;
438 ff->nodeid = outentry.nodeid;
439 ff->open_flags = outopen.open_flags;
fd72faac 440 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 441 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
442 if (!inode) {
443 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 444 fuse_sync_release(ff, flags);
07e77dca 445 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
446 err = -ENOMEM;
447 goto out_err;
fd72faac 448 }
07e77dca 449 kfree(forget);
fd72faac 450 d_instantiate(entry, inode);
1fb69e78 451 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 452 fuse_invalidate_attr(dir);
47237687 453 file = finish_open(od, entry, generic_file_open, opened);
fd72faac 454 if (IS_ERR(file)) {
8b0797a4 455 fuse_sync_release(ff, flags);
c8ccbe03
MS
456 } else {
457 file->private_data = fuse_file_get(ff);
458 fuse_finish_open(inode, file);
fd72faac 459 }
c8ccbe03 460 return file;
fd72faac 461
c8ccbe03 462out_free_ff:
fd72faac 463 fuse_file_free(ff);
c8ccbe03 464out_put_request:
fd72faac 465 fuse_put_request(fc, req);
c8ccbe03 466out_put_forget_req:
07e77dca 467 kfree(forget);
c8ccbe03
MS
468out_err:
469 return ERR_PTR(err);
470}
471
472static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
473static struct file *fuse_atomic_open(struct inode *dir, struct dentry *entry,
474 struct opendata *od, unsigned flags,
47237687 475 umode_t mode, int *opened)
c8ccbe03
MS
476{
477 int err;
478 struct fuse_conn *fc = get_fuse_conn(dir);
479 struct file *file;
480 struct dentry *res = NULL;
481
482 if (d_unhashed(entry)) {
483 res = fuse_lookup(dir, entry, NULL);
484 if (IS_ERR(res))
485 return ERR_CAST(res);
486
487 if (res)
488 entry = res;
489 }
490
491 if (!(flags & O_CREAT) || entry->d_inode)
492 goto no_open;
493
494 /* Only creates */
47237687 495 *opened |= FILE_CREATED;
c8ccbe03
MS
496
497 if (fc->no_create)
498 goto mknod;
499
47237687 500 file = fuse_create_open(dir, entry, od, flags, mode, opened);
c8ccbe03
MS
501 if (PTR_ERR(file) == -ENOSYS) {
502 fc->no_create = 1;
503 goto mknod;
504 }
505out_dput:
506 dput(res);
507 return file;
508
509mknod:
510 err = fuse_mknod(dir, entry, mode, 0);
511 if (err) {
512 file = ERR_PTR(err);
513 goto out_dput;
514 }
515no_open:
516 finish_no_open(od, res);
517 return NULL;
fd72faac
MS
518}
519
6f9f1180
MS
520/*
521 * Code shared between mknod, mkdir, symlink and link
522 */
9e6268db
MS
523static int create_new_entry(struct fuse_conn *fc, struct fuse_req *req,
524 struct inode *dir, struct dentry *entry,
541af6a0 525 umode_t mode)
9e6268db
MS
526{
527 struct fuse_entry_out outarg;
528 struct inode *inode;
9e6268db 529 int err;
07e77dca 530 struct fuse_forget_link *forget;
2d51013e 531
07e77dca
MS
532 forget = fuse_alloc_forget();
533 if (!forget) {
2d51013e 534 fuse_put_request(fc, req);
07e77dca 535 return -ENOMEM;
2d51013e 536 }
9e6268db 537
0e9663ee 538 memset(&outarg, 0, sizeof(outarg));
9e6268db 539 req->in.h.nodeid = get_node_id(dir);
9e6268db 540 req->out.numargs = 1;
0e9663ee
MS
541 if (fc->minor < 9)
542 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
543 else
544 req->out.args[0].size = sizeof(outarg);
9e6268db 545 req->out.args[0].value = &outarg;
b93f858a 546 fuse_request_send(fc, req);
9e6268db 547 err = req->out.h.error;
2d51013e
MS
548 fuse_put_request(fc, req);
549 if (err)
550 goto out_put_forget_req;
551
39ee059a
MS
552 err = -EIO;
553 if (invalid_nodeid(outarg.nodeid))
2d51013e 554 goto out_put_forget_req;
39ee059a
MS
555
556 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 557 goto out_put_forget_req;
39ee059a 558
9e6268db 559 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 560 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 561 if (!inode) {
07e77dca 562 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
563 return -ENOMEM;
564 }
07e77dca 565 kfree(forget);
9e6268db 566
d2a85164
MS
567 if (S_ISDIR(inode->i_mode)) {
568 struct dentry *alias;
569 mutex_lock(&fc->inst_mutex);
570 alias = d_find_alias(inode);
571 if (alias) {
572 /* New directory must have moved since mkdir */
573 mutex_unlock(&fc->inst_mutex);
574 dput(alias);
575 iput(inode);
576 return -EBUSY;
577 }
578 d_instantiate(entry, inode);
579 mutex_unlock(&fc->inst_mutex);
580 } else
581 d_instantiate(entry, inode);
9e6268db 582
1fb69e78 583 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
584 fuse_invalidate_attr(dir);
585 return 0;
39ee059a 586
2d51013e 587 out_put_forget_req:
07e77dca 588 kfree(forget);
39ee059a 589 return err;
9e6268db
MS
590}
591
1a67aafb 592static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
593 dev_t rdev)
594{
595 struct fuse_mknod_in inarg;
596 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
597 struct fuse_req *req = fuse_get_req(fc);
598 if (IS_ERR(req))
599 return PTR_ERR(req);
9e6268db 600
e0a43ddc
MS
601 if (!fc->dont_mask)
602 mode &= ~current_umask();
603
9e6268db
MS
604 memset(&inarg, 0, sizeof(inarg));
605 inarg.mode = mode;
606 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 607 inarg.umask = current_umask();
9e6268db
MS
608 req->in.h.opcode = FUSE_MKNOD;
609 req->in.numargs = 2;
e0a43ddc
MS
610 req->in.args[0].size = fc->minor < 12 ? FUSE_COMPAT_MKNOD_IN_SIZE :
611 sizeof(inarg);
9e6268db
MS
612 req->in.args[0].value = &inarg;
613 req->in.args[1].size = entry->d_name.len + 1;
614 req->in.args[1].value = entry->d_name.name;
615 return create_new_entry(fc, req, dir, entry, mode);
616}
617
4acdaf27 618static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
619 struct nameidata *nd)
620{
621 return fuse_mknod(dir, entry, mode, 0);
622}
623
18bb1db3 624static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
625{
626 struct fuse_mkdir_in inarg;
627 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
628 struct fuse_req *req = fuse_get_req(fc);
629 if (IS_ERR(req))
630 return PTR_ERR(req);
9e6268db 631
e0a43ddc
MS
632 if (!fc->dont_mask)
633 mode &= ~current_umask();
634
9e6268db
MS
635 memset(&inarg, 0, sizeof(inarg));
636 inarg.mode = mode;
e0a43ddc 637 inarg.umask = current_umask();
9e6268db
MS
638 req->in.h.opcode = FUSE_MKDIR;
639 req->in.numargs = 2;
640 req->in.args[0].size = sizeof(inarg);
641 req->in.args[0].value = &inarg;
642 req->in.args[1].size = entry->d_name.len + 1;
643 req->in.args[1].value = entry->d_name.name;
644 return create_new_entry(fc, req, dir, entry, S_IFDIR);
645}
646
647static int fuse_symlink(struct inode *dir, struct dentry *entry,
648 const char *link)
649{
650 struct fuse_conn *fc = get_fuse_conn(dir);
651 unsigned len = strlen(link) + 1;
ce1d5a49
MS
652 struct fuse_req *req = fuse_get_req(fc);
653 if (IS_ERR(req))
654 return PTR_ERR(req);
9e6268db
MS
655
656 req->in.h.opcode = FUSE_SYMLINK;
657 req->in.numargs = 2;
658 req->in.args[0].size = entry->d_name.len + 1;
659 req->in.args[0].value = entry->d_name.name;
660 req->in.args[1].size = len;
661 req->in.args[1].value = link;
662 return create_new_entry(fc, req, dir, entry, S_IFLNK);
663}
664
665static int fuse_unlink(struct inode *dir, struct dentry *entry)
666{
667 int err;
668 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
669 struct fuse_req *req = fuse_get_req(fc);
670 if (IS_ERR(req))
671 return PTR_ERR(req);
9e6268db
MS
672
673 req->in.h.opcode = FUSE_UNLINK;
674 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
675 req->in.numargs = 1;
676 req->in.args[0].size = entry->d_name.len + 1;
677 req->in.args[0].value = entry->d_name.name;
b93f858a 678 fuse_request_send(fc, req);
9e6268db
MS
679 err = req->out.h.error;
680 fuse_put_request(fc, req);
681 if (!err) {
682 struct inode *inode = entry->d_inode;
ac45d613 683 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 684
ac45d613
MS
685 spin_lock(&fc->lock);
686 fi->attr_version = ++fc->attr_version;
687 drop_nlink(inode);
688 spin_unlock(&fc->lock);
9e6268db
MS
689 fuse_invalidate_attr(inode);
690 fuse_invalidate_attr(dir);
8cbdf1e6 691 fuse_invalidate_entry_cache(entry);
9e6268db
MS
692 } else if (err == -EINTR)
693 fuse_invalidate_entry(entry);
694 return err;
695}
696
697static int fuse_rmdir(struct inode *dir, struct dentry *entry)
698{
699 int err;
700 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
701 struct fuse_req *req = fuse_get_req(fc);
702 if (IS_ERR(req))
703 return PTR_ERR(req);
9e6268db
MS
704
705 req->in.h.opcode = FUSE_RMDIR;
706 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
707 req->in.numargs = 1;
708 req->in.args[0].size = entry->d_name.len + 1;
709 req->in.args[0].value = entry->d_name.name;
b93f858a 710 fuse_request_send(fc, req);
9e6268db
MS
711 err = req->out.h.error;
712 fuse_put_request(fc, req);
713 if (!err) {
ce71ec36 714 clear_nlink(entry->d_inode);
9e6268db 715 fuse_invalidate_attr(dir);
8cbdf1e6 716 fuse_invalidate_entry_cache(entry);
9e6268db
MS
717 } else if (err == -EINTR)
718 fuse_invalidate_entry(entry);
719 return err;
720}
721
722static int fuse_rename(struct inode *olddir, struct dentry *oldent,
723 struct inode *newdir, struct dentry *newent)
724{
725 int err;
726 struct fuse_rename_in inarg;
727 struct fuse_conn *fc = get_fuse_conn(olddir);
ce1d5a49 728 struct fuse_req *req = fuse_get_req(fc);
e4eaac06 729
ce1d5a49
MS
730 if (IS_ERR(req))
731 return PTR_ERR(req);
9e6268db
MS
732
733 memset(&inarg, 0, sizeof(inarg));
734 inarg.newdir = get_node_id(newdir);
735 req->in.h.opcode = FUSE_RENAME;
736 req->in.h.nodeid = get_node_id(olddir);
9e6268db
MS
737 req->in.numargs = 3;
738 req->in.args[0].size = sizeof(inarg);
739 req->in.args[0].value = &inarg;
740 req->in.args[1].size = oldent->d_name.len + 1;
741 req->in.args[1].value = oldent->d_name.name;
742 req->in.args[2].size = newent->d_name.len + 1;
743 req->in.args[2].value = newent->d_name.name;
b93f858a 744 fuse_request_send(fc, req);
9e6268db
MS
745 err = req->out.h.error;
746 fuse_put_request(fc, req);
747 if (!err) {
08b63307
MS
748 /* ctime changes */
749 fuse_invalidate_attr(oldent->d_inode);
750
9e6268db
MS
751 fuse_invalidate_attr(olddir);
752 if (olddir != newdir)
753 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
754
755 /* newent will end up negative */
5219f346
MS
756 if (newent->d_inode) {
757 fuse_invalidate_attr(newent->d_inode);
8cbdf1e6 758 fuse_invalidate_entry_cache(newent);
5219f346 759 }
9e6268db
MS
760 } else if (err == -EINTR) {
761 /* If request was interrupted, DEITY only knows if the
762 rename actually took place. If the invalidation
763 fails (e.g. some process has CWD under the renamed
764 directory), then there can be inconsistency between
765 the dcache and the real filesystem. Tough luck. */
766 fuse_invalidate_entry(oldent);
767 if (newent->d_inode)
768 fuse_invalidate_entry(newent);
769 }
770
771 return err;
772}
773
774static int fuse_link(struct dentry *entry, struct inode *newdir,
775 struct dentry *newent)
776{
777 int err;
778 struct fuse_link_in inarg;
779 struct inode *inode = entry->d_inode;
780 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49
MS
781 struct fuse_req *req = fuse_get_req(fc);
782 if (IS_ERR(req))
783 return PTR_ERR(req);
9e6268db
MS
784
785 memset(&inarg, 0, sizeof(inarg));
786 inarg.oldnodeid = get_node_id(inode);
787 req->in.h.opcode = FUSE_LINK;
9e6268db
MS
788 req->in.numargs = 2;
789 req->in.args[0].size = sizeof(inarg);
790 req->in.args[0].value = &inarg;
791 req->in.args[1].size = newent->d_name.len + 1;
792 req->in.args[1].value = newent->d_name.name;
793 err = create_new_entry(fc, req, newdir, newent, inode->i_mode);
794 /* Contrary to "normal" filesystems it can happen that link
795 makes two "logical" inodes point to the same "physical"
796 inode. We invalidate the attributes of the old one, so it
797 will reflect changes in the backing inode (link count,
798 etc.)
799 */
ac45d613
MS
800 if (!err) {
801 struct fuse_inode *fi = get_fuse_inode(inode);
802
803 spin_lock(&fc->lock);
804 fi->attr_version = ++fc->attr_version;
805 inc_nlink(inode);
806 spin_unlock(&fc->lock);
9e6268db 807 fuse_invalidate_attr(inode);
ac45d613
MS
808 } else if (err == -EINTR) {
809 fuse_invalidate_attr(inode);
810 }
9e6268db
MS
811 return err;
812}
813
1fb69e78
MS
814static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
815 struct kstat *stat)
816{
203627bb
MS
817 unsigned int blkbits;
818
1fb69e78
MS
819 stat->dev = inode->i_sb->s_dev;
820 stat->ino = attr->ino;
821 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
822 stat->nlink = attr->nlink;
823 stat->uid = attr->uid;
824 stat->gid = attr->gid;
825 stat->rdev = inode->i_rdev;
826 stat->atime.tv_sec = attr->atime;
827 stat->atime.tv_nsec = attr->atimensec;
828 stat->mtime.tv_sec = attr->mtime;
829 stat->mtime.tv_nsec = attr->mtimensec;
830 stat->ctime.tv_sec = attr->ctime;
831 stat->ctime.tv_nsec = attr->ctimensec;
832 stat->size = attr->size;
833 stat->blocks = attr->blocks;
203627bb
MS
834
835 if (attr->blksize != 0)
836 blkbits = ilog2(attr->blksize);
837 else
838 blkbits = inode->i_sb->s_blocksize_bits;
839
840 stat->blksize = 1 << blkbits;
1fb69e78
MS
841}
842
c79e322f
MS
843static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
844 struct file *file)
e5e5558e
MS
845{
846 int err;
c79e322f
MS
847 struct fuse_getattr_in inarg;
848 struct fuse_attr_out outarg;
e5e5558e 849 struct fuse_conn *fc = get_fuse_conn(inode);
1fb69e78
MS
850 struct fuse_req *req;
851 u64 attr_version;
852
853 req = fuse_get_req(fc);
ce1d5a49
MS
854 if (IS_ERR(req))
855 return PTR_ERR(req);
e5e5558e 856
7dca9fd3 857 attr_version = fuse_get_attr_version(fc);
1fb69e78 858
c79e322f 859 memset(&inarg, 0, sizeof(inarg));
0e9663ee 860 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
861 /* Directories have separate file-handle space */
862 if (file && S_ISREG(inode->i_mode)) {
863 struct fuse_file *ff = file->private_data;
864
865 inarg.getattr_flags |= FUSE_GETATTR_FH;
866 inarg.fh = ff->fh;
867 }
e5e5558e
MS
868 req->in.h.opcode = FUSE_GETATTR;
869 req->in.h.nodeid = get_node_id(inode);
c79e322f
MS
870 req->in.numargs = 1;
871 req->in.args[0].size = sizeof(inarg);
872 req->in.args[0].value = &inarg;
e5e5558e 873 req->out.numargs = 1;
0e9663ee
MS
874 if (fc->minor < 9)
875 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
876 else
877 req->out.args[0].size = sizeof(outarg);
c79e322f 878 req->out.args[0].value = &outarg;
b93f858a 879 fuse_request_send(fc, req);
e5e5558e
MS
880 err = req->out.h.error;
881 fuse_put_request(fc, req);
882 if (!err) {
c79e322f 883 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
884 make_bad_inode(inode);
885 err = -EIO;
886 } else {
c79e322f
MS
887 fuse_change_attributes(inode, &outarg.attr,
888 attr_timeout(&outarg),
1fb69e78
MS
889 attr_version);
890 if (stat)
c79e322f 891 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
892 }
893 }
894 return err;
895}
896
bcb4be80
MS
897int fuse_update_attributes(struct inode *inode, struct kstat *stat,
898 struct file *file, bool *refreshed)
899{
900 struct fuse_inode *fi = get_fuse_inode(inode);
901 int err;
902 bool r;
903
904 if (fi->i_time < get_jiffies_64()) {
905 r = true;
906 err = fuse_do_getattr(inode, stat, file);
907 } else {
908 r = false;
909 err = 0;
910 if (stat) {
911 generic_fillattr(inode, stat);
912 stat->mode = fi->orig_i_mode;
45c72cd7 913 stat->ino = fi->orig_ino;
bcb4be80
MS
914 }
915 }
916
917 if (refreshed != NULL)
918 *refreshed = r;
919
920 return err;
921}
922
3b463ae0 923int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 924 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
925{
926 int err = -ENOTDIR;
927 struct inode *parent;
928 struct dentry *dir;
929 struct dentry *entry;
930
931 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
932 if (!parent)
933 return -ENOENT;
934
935 mutex_lock(&parent->i_mutex);
936 if (!S_ISDIR(parent->i_mode))
937 goto unlock;
938
939 err = -ENOENT;
940 dir = d_find_alias(parent);
941 if (!dir)
942 goto unlock;
943
944 entry = d_lookup(dir, name);
945 dput(dir);
946 if (!entry)
947 goto unlock;
948
949 fuse_invalidate_attr(parent);
950 fuse_invalidate_entry(entry);
451d0f59
JM
951
952 if (child_nodeid != 0 && entry->d_inode) {
953 mutex_lock(&entry->d_inode->i_mutex);
954 if (get_node_id(entry->d_inode) != child_nodeid) {
955 err = -ENOENT;
956 goto badentry;
957 }
958 if (d_mountpoint(entry)) {
959 err = -EBUSY;
960 goto badentry;
961 }
962 if (S_ISDIR(entry->d_inode->i_mode)) {
963 shrink_dcache_parent(entry);
964 if (!simple_empty(entry)) {
965 err = -ENOTEMPTY;
966 goto badentry;
967 }
968 entry->d_inode->i_flags |= S_DEAD;
969 }
970 dont_mount(entry);
971 clear_nlink(entry->d_inode);
972 err = 0;
973 badentry:
974 mutex_unlock(&entry->d_inode->i_mutex);
975 if (!err)
976 d_delete(entry);
977 } else {
978 err = 0;
979 }
3b463ae0 980 dput(entry);
3b463ae0
JM
981
982 unlock:
983 mutex_unlock(&parent->i_mutex);
984 iput(parent);
985 return err;
986}
987
87729a55
MS
988/*
989 * Calling into a user-controlled filesystem gives the filesystem
990 * daemon ptrace-like capabilities over the requester process. This
991 * means, that the filesystem daemon is able to record the exact
992 * filesystem operations performed, and can also control the behavior
993 * of the requester process in otherwise impossible ways. For example
994 * it can delay the operation for arbitrary length of time allowing
995 * DoS against the requester.
996 *
997 * For this reason only those processes can call into the filesystem,
998 * for which the owner of the mount has ptrace privilege. This
999 * excludes processes started by other users, suid or sgid processes.
1000 */
e57ac683 1001int fuse_allow_task(struct fuse_conn *fc, struct task_struct *task)
87729a55 1002{
c69e8d9c
DH
1003 const struct cred *cred;
1004 int ret;
87729a55 1005
c69e8d9c 1006 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
1007 return 1;
1008
c69e8d9c
DH
1009 rcu_read_lock();
1010 ret = 0;
1011 cred = __task_cred(task);
1012 if (cred->euid == fc->user_id &&
1013 cred->suid == fc->user_id &&
1014 cred->uid == fc->user_id &&
1015 cred->egid == fc->group_id &&
1016 cred->sgid == fc->group_id &&
1017 cred->gid == fc->group_id)
1018 ret = 1;
1019 rcu_read_unlock();
1020
1021 return ret;
87729a55
MS
1022}
1023
31d40d74
MS
1024static int fuse_access(struct inode *inode, int mask)
1025{
1026 struct fuse_conn *fc = get_fuse_conn(inode);
1027 struct fuse_req *req;
1028 struct fuse_access_in inarg;
1029 int err;
1030
1031 if (fc->no_access)
1032 return 0;
1033
ce1d5a49
MS
1034 req = fuse_get_req(fc);
1035 if (IS_ERR(req))
1036 return PTR_ERR(req);
31d40d74
MS
1037
1038 memset(&inarg, 0, sizeof(inarg));
e6305c43 1039 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
31d40d74
MS
1040 req->in.h.opcode = FUSE_ACCESS;
1041 req->in.h.nodeid = get_node_id(inode);
31d40d74
MS
1042 req->in.numargs = 1;
1043 req->in.args[0].size = sizeof(inarg);
1044 req->in.args[0].value = &inarg;
b93f858a 1045 fuse_request_send(fc, req);
31d40d74
MS
1046 err = req->out.h.error;
1047 fuse_put_request(fc, req);
1048 if (err == -ENOSYS) {
1049 fc->no_access = 1;
1050 err = 0;
1051 }
1052 return err;
1053}
1054
10556cb2 1055static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1056{
10556cb2 1057 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1058 return -ECHILD;
1059
1060 return fuse_do_getattr(inode, NULL, NULL);
1061}
1062
6f9f1180
MS
1063/*
1064 * Check permission. The two basic access models of FUSE are:
1065 *
1066 * 1) Local access checking ('default_permissions' mount option) based
1067 * on file mode. This is the plain old disk filesystem permission
1068 * modell.
1069 *
1070 * 2) "Remote" access checking, where server is responsible for
1071 * checking permission in each inode operation. An exception to this
1072 * is if ->permission() was invoked from sys_access() in which case an
1073 * access request is sent. Execute permission is still checked
1074 * locally based on file mode.
1075 */
10556cb2 1076static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1077{
1078 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1079 bool refreshed = false;
1080 int err = 0;
e5e5558e 1081
87729a55 1082 if (!fuse_allow_task(fc, current))
e5e5558e 1083 return -EACCES;
244f6385
MS
1084
1085 /*
e8e96157 1086 * If attributes are needed, refresh them before proceeding
244f6385 1087 */
e8e96157
MS
1088 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1089 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1090 struct fuse_inode *fi = get_fuse_inode(inode);
1091
1092 if (fi->i_time < get_jiffies_64()) {
1093 refreshed = true;
1094
10556cb2 1095 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1096 if (err)
1097 return err;
1098 }
244f6385
MS
1099 }
1100
1101 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
2830ba7f 1102 err = generic_permission(inode, mask);
1e9a4ed9
MS
1103
1104 /* If permission is denied, try to refresh file
1105 attributes. This is also needed, because the root
1106 node will at first have no permissions */
244f6385 1107 if (err == -EACCES && !refreshed) {
10556cb2 1108 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1109 if (!err)
2830ba7f 1110 err = generic_permission(inode, mask);
1e9a4ed9
MS
1111 }
1112
6f9f1180
MS
1113 /* Note: the opposite of the above test does not
1114 exist. So if permissions are revoked this won't be
1115 noticed immediately, only after the attribute
1116 timeout has expired */
9cfcac81 1117 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
10556cb2 1118 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1119 return -ECHILD;
1120
e8e96157
MS
1121 err = fuse_access(inode, mask);
1122 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1123 if (!(inode->i_mode & S_IXUGO)) {
1124 if (refreshed)
1125 return -EACCES;
1126
10556cb2 1127 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1128 if (!err && !(inode->i_mode & S_IXUGO))
1129 return -EACCES;
1130 }
e5e5558e 1131 }
244f6385 1132 return err;
e5e5558e
MS
1133}
1134
1135static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
1136 void *dstbuf, filldir_t filldir)
1137{
1138 while (nbytes >= FUSE_NAME_OFFSET) {
1139 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1140 size_t reclen = FUSE_DIRENT_SIZE(dirent);
1141 int over;
1142 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1143 return -EIO;
1144 if (reclen > nbytes)
1145 break;
1146
1147 over = filldir(dstbuf, dirent->name, dirent->namelen,
1148 file->f_pos, dirent->ino, dirent->type);
1149 if (over)
1150 break;
1151
1152 buf += reclen;
1153 nbytes -= reclen;
1154 file->f_pos = dirent->off;
1155 }
1156
1157 return 0;
1158}
1159
04730fef 1160static int fuse_readdir(struct file *file, void *dstbuf, filldir_t filldir)
e5e5558e 1161{
04730fef
MS
1162 int err;
1163 size_t nbytes;
1164 struct page *page;
7706a9d6 1165 struct inode *inode = file->f_path.dentry->d_inode;
e5e5558e 1166 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8
MS
1167 struct fuse_req *req;
1168
1169 if (is_bad_inode(inode))
1170 return -EIO;
1171
ce1d5a49
MS
1172 req = fuse_get_req(fc);
1173 if (IS_ERR(req))
1174 return PTR_ERR(req);
e5e5558e 1175
04730fef
MS
1176 page = alloc_page(GFP_KERNEL);
1177 if (!page) {
1178 fuse_put_request(fc, req);
1179 return -ENOMEM;
1180 }
f4975c67 1181 req->out.argpages = 1;
04730fef
MS
1182 req->num_pages = 1;
1183 req->pages[0] = page;
2106cb18 1184 fuse_read_fill(req, file, file->f_pos, PAGE_SIZE, FUSE_READDIR);
b93f858a 1185 fuse_request_send(fc, req);
361b1eb5 1186 nbytes = req->out.args[0].size;
e5e5558e
MS
1187 err = req->out.h.error;
1188 fuse_put_request(fc, req);
1189 if (!err)
04730fef
MS
1190 err = parse_dirfile(page_address(page), nbytes, file, dstbuf,
1191 filldir);
e5e5558e 1192
04730fef 1193 __free_page(page);
b36c31ba 1194 fuse_invalidate_attr(inode); /* atime changed */
04730fef 1195 return err;
e5e5558e
MS
1196}
1197
1198static char *read_link(struct dentry *dentry)
1199{
1200 struct inode *inode = dentry->d_inode;
1201 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49 1202 struct fuse_req *req = fuse_get_req(fc);
e5e5558e
MS
1203 char *link;
1204
ce1d5a49 1205 if (IS_ERR(req))
e231c2ee 1206 return ERR_CAST(req);
e5e5558e
MS
1207
1208 link = (char *) __get_free_page(GFP_KERNEL);
1209 if (!link) {
1210 link = ERR_PTR(-ENOMEM);
1211 goto out;
1212 }
1213 req->in.h.opcode = FUSE_READLINK;
1214 req->in.h.nodeid = get_node_id(inode);
e5e5558e
MS
1215 req->out.argvar = 1;
1216 req->out.numargs = 1;
1217 req->out.args[0].size = PAGE_SIZE - 1;
1218 req->out.args[0].value = link;
b93f858a 1219 fuse_request_send(fc, req);
e5e5558e
MS
1220 if (req->out.h.error) {
1221 free_page((unsigned long) link);
1222 link = ERR_PTR(req->out.h.error);
1223 } else
1224 link[req->out.args[0].size] = '\0';
1225 out:
1226 fuse_put_request(fc, req);
b36c31ba 1227 fuse_invalidate_attr(inode); /* atime changed */
e5e5558e
MS
1228 return link;
1229}
1230
1231static void free_link(char *link)
1232{
1233 if (!IS_ERR(link))
1234 free_page((unsigned long) link);
1235}
1236
1237static void *fuse_follow_link(struct dentry *dentry, struct nameidata *nd)
1238{
1239 nd_set_link(nd, read_link(dentry));
1240 return NULL;
1241}
1242
1243static void fuse_put_link(struct dentry *dentry, struct nameidata *nd, void *c)
1244{
1245 free_link(nd_get_link(nd));
1246}
1247
1248static int fuse_dir_open(struct inode *inode, struct file *file)
1249{
91fe96b4 1250 return fuse_open_common(inode, file, true);
e5e5558e
MS
1251}
1252
1253static int fuse_dir_release(struct inode *inode, struct file *file)
1254{
8b0797a4
MS
1255 fuse_release_common(file, FUSE_RELEASEDIR);
1256
1257 return 0;
e5e5558e
MS
1258}
1259
02c24a82
JB
1260static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1261 int datasync)
82547981 1262{
02c24a82 1263 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1264}
1265
b18da0c5
MS
1266static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1267 unsigned long arg)
1268{
1269 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1270
1271 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1272 if (fc->minor < 18)
1273 return -ENOTTY;
1274
1275 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1276}
1277
1278static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1279 unsigned long arg)
1280{
1281 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1282
1283 if (fc->minor < 18)
1284 return -ENOTTY;
1285
1286 return fuse_ioctl_common(file, cmd, arg,
1287 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1288}
1289
17637cba
MS
1290static bool update_mtime(unsigned ivalid)
1291{
1292 /* Always update if mtime is explicitly set */
1293 if (ivalid & ATTR_MTIME_SET)
1294 return true;
1295
1296 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1297 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1298 return false;
1299
1300 /* In all other cases update */
1301 return true;
1302}
1303
befc649c 1304static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg)
9e6268db
MS
1305{
1306 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1307
1308 if (ivalid & ATTR_MODE)
befc649c 1309 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1310 if (ivalid & ATTR_UID)
befc649c 1311 arg->valid |= FATTR_UID, arg->uid = iattr->ia_uid;
9e6268db 1312 if (ivalid & ATTR_GID)
befc649c 1313 arg->valid |= FATTR_GID, arg->gid = iattr->ia_gid;
9e6268db 1314 if (ivalid & ATTR_SIZE)
befc649c 1315 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1316 if (ivalid & ATTR_ATIME) {
1317 arg->valid |= FATTR_ATIME;
befc649c 1318 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1319 arg->atimensec = iattr->ia_atime.tv_nsec;
1320 if (!(ivalid & ATTR_ATIME_SET))
1321 arg->valid |= FATTR_ATIME_NOW;
1322 }
1323 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid)) {
1324 arg->valid |= FATTR_MTIME;
befc649c 1325 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba
MS
1326 arg->mtimensec = iattr->ia_mtime.tv_nsec;
1327 if (!(ivalid & ATTR_MTIME_SET))
1328 arg->valid |= FATTR_MTIME_NOW;
befc649c 1329 }
9e6268db
MS
1330}
1331
3be5a52b
MS
1332/*
1333 * Prevent concurrent writepages on inode
1334 *
1335 * This is done by adding a negative bias to the inode write counter
1336 * and waiting for all pending writes to finish.
1337 */
1338void fuse_set_nowrite(struct inode *inode)
1339{
1340 struct fuse_conn *fc = get_fuse_conn(inode);
1341 struct fuse_inode *fi = get_fuse_inode(inode);
1342
1343 BUG_ON(!mutex_is_locked(&inode->i_mutex));
1344
1345 spin_lock(&fc->lock);
1346 BUG_ON(fi->writectr < 0);
1347 fi->writectr += FUSE_NOWRITE;
1348 spin_unlock(&fc->lock);
1349 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1350}
1351
1352/*
1353 * Allow writepages on inode
1354 *
1355 * Remove the bias from the writecounter and send any queued
1356 * writepages.
1357 */
1358static void __fuse_release_nowrite(struct inode *inode)
1359{
1360 struct fuse_inode *fi = get_fuse_inode(inode);
1361
1362 BUG_ON(fi->writectr != FUSE_NOWRITE);
1363 fi->writectr = 0;
1364 fuse_flush_writepages(inode);
1365}
1366
1367void fuse_release_nowrite(struct inode *inode)
1368{
1369 struct fuse_conn *fc = get_fuse_conn(inode);
1370
1371 spin_lock(&fc->lock);
1372 __fuse_release_nowrite(inode);
1373 spin_unlock(&fc->lock);
1374}
1375
6f9f1180
MS
1376/*
1377 * Set attributes, and at the same time refresh them.
1378 *
1379 * Truncation is slightly complicated, because the 'truncate' request
1380 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1381 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1382 * and the actual truncation by hand.
6f9f1180 1383 */
49d4914f
MS
1384static int fuse_do_setattr(struct dentry *entry, struct iattr *attr,
1385 struct file *file)
9e6268db
MS
1386{
1387 struct inode *inode = entry->d_inode;
1388 struct fuse_conn *fc = get_fuse_conn(inode);
9e6268db
MS
1389 struct fuse_req *req;
1390 struct fuse_setattr_in inarg;
1391 struct fuse_attr_out outarg;
3be5a52b
MS
1392 bool is_truncate = false;
1393 loff_t oldsize;
9e6268db 1394 int err;
9e6268db 1395
e57ac683
MS
1396 if (!fuse_allow_task(fc, current))
1397 return -EACCES;
1398
db78b877
CH
1399 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1400 attr->ia_valid |= ATTR_FORCE;
1401
1402 err = inode_change_ok(inode, attr);
1403 if (err)
1404 return err;
1e9a4ed9 1405
8d56addd
MS
1406 if (attr->ia_valid & ATTR_OPEN) {
1407 if (fc->atomic_o_trunc)
1408 return 0;
1409 file = NULL;
1410 }
6ff958ed 1411
2c27c65e 1412 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1413 is_truncate = true;
9e6268db 1414
ce1d5a49
MS
1415 req = fuse_get_req(fc);
1416 if (IS_ERR(req))
1417 return PTR_ERR(req);
9e6268db 1418
3be5a52b
MS
1419 if (is_truncate)
1420 fuse_set_nowrite(inode);
1421
9e6268db 1422 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1423 memset(&outarg, 0, sizeof(outarg));
befc649c 1424 iattr_to_fattr(attr, &inarg);
49d4914f
MS
1425 if (file) {
1426 struct fuse_file *ff = file->private_data;
1427 inarg.valid |= FATTR_FH;
1428 inarg.fh = ff->fh;
1429 }
f3332114
MS
1430 if (attr->ia_valid & ATTR_SIZE) {
1431 /* For mandatory locking in truncate */
1432 inarg.valid |= FATTR_LOCKOWNER;
1433 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1434 }
9e6268db
MS
1435 req->in.h.opcode = FUSE_SETATTR;
1436 req->in.h.nodeid = get_node_id(inode);
9e6268db
MS
1437 req->in.numargs = 1;
1438 req->in.args[0].size = sizeof(inarg);
1439 req->in.args[0].value = &inarg;
1440 req->out.numargs = 1;
0e9663ee
MS
1441 if (fc->minor < 9)
1442 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
1443 else
1444 req->out.args[0].size = sizeof(outarg);
9e6268db 1445 req->out.args[0].value = &outarg;
b93f858a 1446 fuse_request_send(fc, req);
9e6268db
MS
1447 err = req->out.h.error;
1448 fuse_put_request(fc, req);
e00d2c2d
MS
1449 if (err) {
1450 if (err == -EINTR)
1451 fuse_invalidate_attr(inode);
3be5a52b 1452 goto error;
e00d2c2d 1453 }
9e6268db 1454
e00d2c2d
MS
1455 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1456 make_bad_inode(inode);
3be5a52b
MS
1457 err = -EIO;
1458 goto error;
1459 }
1460
1461 spin_lock(&fc->lock);
1462 fuse_change_attributes_common(inode, &outarg.attr,
1463 attr_timeout(&outarg));
1464 oldsize = inode->i_size;
1465 i_size_write(inode, outarg.attr.size);
1466
1467 if (is_truncate) {
1468 /* NOTE: this may release/reacquire fc->lock */
1469 __fuse_release_nowrite(inode);
1470 }
1471 spin_unlock(&fc->lock);
1472
1473 /*
1474 * Only call invalidate_inode_pages2() after removing
1475 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1476 */
1477 if (S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
c08d3b0e 1478 truncate_pagecache(inode, oldsize, outarg.attr.size);
3be5a52b 1479 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1480 }
1481
e00d2c2d 1482 return 0;
3be5a52b
MS
1483
1484error:
1485 if (is_truncate)
1486 fuse_release_nowrite(inode);
1487
1488 return err;
9e6268db
MS
1489}
1490
49d4914f
MS
1491static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1492{
1493 if (attr->ia_valid & ATTR_FILE)
1494 return fuse_do_setattr(entry, attr, attr->ia_file);
1495 else
1496 return fuse_do_setattr(entry, attr, NULL);
1497}
1498
e5e5558e
MS
1499static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1500 struct kstat *stat)
1501{
1502 struct inode *inode = entry->d_inode;
244f6385 1503 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1504
1505 if (!fuse_allow_task(fc, current))
1506 return -EACCES;
1507
bcb4be80 1508 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1509}
1510
92a8780e
MS
1511static int fuse_setxattr(struct dentry *entry, const char *name,
1512 const void *value, size_t size, int flags)
1513{
1514 struct inode *inode = entry->d_inode;
1515 struct fuse_conn *fc = get_fuse_conn(inode);
1516 struct fuse_req *req;
1517 struct fuse_setxattr_in inarg;
1518 int err;
1519
92a8780e
MS
1520 if (fc->no_setxattr)
1521 return -EOPNOTSUPP;
1522
ce1d5a49
MS
1523 req = fuse_get_req(fc);
1524 if (IS_ERR(req))
1525 return PTR_ERR(req);
92a8780e
MS
1526
1527 memset(&inarg, 0, sizeof(inarg));
1528 inarg.size = size;
1529 inarg.flags = flags;
1530 req->in.h.opcode = FUSE_SETXATTR;
1531 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1532 req->in.numargs = 3;
1533 req->in.args[0].size = sizeof(inarg);
1534 req->in.args[0].value = &inarg;
1535 req->in.args[1].size = strlen(name) + 1;
1536 req->in.args[1].value = name;
1537 req->in.args[2].size = size;
1538 req->in.args[2].value = value;
b93f858a 1539 fuse_request_send(fc, req);
92a8780e
MS
1540 err = req->out.h.error;
1541 fuse_put_request(fc, req);
1542 if (err == -ENOSYS) {
1543 fc->no_setxattr = 1;
1544 err = -EOPNOTSUPP;
1545 }
1546 return err;
1547}
1548
1549static ssize_t fuse_getxattr(struct dentry *entry, const char *name,
1550 void *value, size_t size)
1551{
1552 struct inode *inode = entry->d_inode;
1553 struct fuse_conn *fc = get_fuse_conn(inode);
1554 struct fuse_req *req;
1555 struct fuse_getxattr_in inarg;
1556 struct fuse_getxattr_out outarg;
1557 ssize_t ret;
1558
1559 if (fc->no_getxattr)
1560 return -EOPNOTSUPP;
1561
ce1d5a49
MS
1562 req = fuse_get_req(fc);
1563 if (IS_ERR(req))
1564 return PTR_ERR(req);
92a8780e
MS
1565
1566 memset(&inarg, 0, sizeof(inarg));
1567 inarg.size = size;
1568 req->in.h.opcode = FUSE_GETXATTR;
1569 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1570 req->in.numargs = 2;
1571 req->in.args[0].size = sizeof(inarg);
1572 req->in.args[0].value = &inarg;
1573 req->in.args[1].size = strlen(name) + 1;
1574 req->in.args[1].value = name;
1575 /* This is really two different operations rolled into one */
1576 req->out.numargs = 1;
1577 if (size) {
1578 req->out.argvar = 1;
1579 req->out.args[0].size = size;
1580 req->out.args[0].value = value;
1581 } else {
1582 req->out.args[0].size = sizeof(outarg);
1583 req->out.args[0].value = &outarg;
1584 }
b93f858a 1585 fuse_request_send(fc, req);
92a8780e
MS
1586 ret = req->out.h.error;
1587 if (!ret)
1588 ret = size ? req->out.args[0].size : outarg.size;
1589 else {
1590 if (ret == -ENOSYS) {
1591 fc->no_getxattr = 1;
1592 ret = -EOPNOTSUPP;
1593 }
1594 }
1595 fuse_put_request(fc, req);
1596 return ret;
1597}
1598
1599static ssize_t fuse_listxattr(struct dentry *entry, char *list, size_t size)
1600{
1601 struct inode *inode = entry->d_inode;
1602 struct fuse_conn *fc = get_fuse_conn(inode);
1603 struct fuse_req *req;
1604 struct fuse_getxattr_in inarg;
1605 struct fuse_getxattr_out outarg;
1606 ssize_t ret;
1607
e57ac683
MS
1608 if (!fuse_allow_task(fc, current))
1609 return -EACCES;
1610
92a8780e
MS
1611 if (fc->no_listxattr)
1612 return -EOPNOTSUPP;
1613
ce1d5a49
MS
1614 req = fuse_get_req(fc);
1615 if (IS_ERR(req))
1616 return PTR_ERR(req);
92a8780e
MS
1617
1618 memset(&inarg, 0, sizeof(inarg));
1619 inarg.size = size;
1620 req->in.h.opcode = FUSE_LISTXATTR;
1621 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1622 req->in.numargs = 1;
1623 req->in.args[0].size = sizeof(inarg);
1624 req->in.args[0].value = &inarg;
1625 /* This is really two different operations rolled into one */
1626 req->out.numargs = 1;
1627 if (size) {
1628 req->out.argvar = 1;
1629 req->out.args[0].size = size;
1630 req->out.args[0].value = list;
1631 } else {
1632 req->out.args[0].size = sizeof(outarg);
1633 req->out.args[0].value = &outarg;
1634 }
b93f858a 1635 fuse_request_send(fc, req);
92a8780e
MS
1636 ret = req->out.h.error;
1637 if (!ret)
1638 ret = size ? req->out.args[0].size : outarg.size;
1639 else {
1640 if (ret == -ENOSYS) {
1641 fc->no_listxattr = 1;
1642 ret = -EOPNOTSUPP;
1643 }
1644 }
1645 fuse_put_request(fc, req);
1646 return ret;
1647}
1648
1649static int fuse_removexattr(struct dentry *entry, const char *name)
1650{
1651 struct inode *inode = entry->d_inode;
1652 struct fuse_conn *fc = get_fuse_conn(inode);
1653 struct fuse_req *req;
1654 int err;
1655
1656 if (fc->no_removexattr)
1657 return -EOPNOTSUPP;
1658
ce1d5a49
MS
1659 req = fuse_get_req(fc);
1660 if (IS_ERR(req))
1661 return PTR_ERR(req);
92a8780e
MS
1662
1663 req->in.h.opcode = FUSE_REMOVEXATTR;
1664 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1665 req->in.numargs = 1;
1666 req->in.args[0].size = strlen(name) + 1;
1667 req->in.args[0].value = name;
b93f858a 1668 fuse_request_send(fc, req);
92a8780e
MS
1669 err = req->out.h.error;
1670 fuse_put_request(fc, req);
1671 if (err == -ENOSYS) {
1672 fc->no_removexattr = 1;
1673 err = -EOPNOTSUPP;
1674 }
1675 return err;
1676}
1677
754661f1 1678static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1679 .lookup = fuse_lookup,
9e6268db
MS
1680 .mkdir = fuse_mkdir,
1681 .symlink = fuse_symlink,
1682 .unlink = fuse_unlink,
1683 .rmdir = fuse_rmdir,
1684 .rename = fuse_rename,
1685 .link = fuse_link,
1686 .setattr = fuse_setattr,
1687 .create = fuse_create,
c8ccbe03 1688 .atomic_open = fuse_atomic_open,
9e6268db 1689 .mknod = fuse_mknod,
e5e5558e
MS
1690 .permission = fuse_permission,
1691 .getattr = fuse_getattr,
92a8780e
MS
1692 .setxattr = fuse_setxattr,
1693 .getxattr = fuse_getxattr,
1694 .listxattr = fuse_listxattr,
1695 .removexattr = fuse_removexattr,
e5e5558e
MS
1696};
1697
4b6f5d20 1698static const struct file_operations fuse_dir_operations = {
b6aeaded 1699 .llseek = generic_file_llseek,
e5e5558e
MS
1700 .read = generic_read_dir,
1701 .readdir = fuse_readdir,
1702 .open = fuse_dir_open,
1703 .release = fuse_dir_release,
82547981 1704 .fsync = fuse_dir_fsync,
b18da0c5
MS
1705 .unlocked_ioctl = fuse_dir_ioctl,
1706 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1707};
1708
754661f1 1709static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1710 .setattr = fuse_setattr,
e5e5558e
MS
1711 .permission = fuse_permission,
1712 .getattr = fuse_getattr,
92a8780e
MS
1713 .setxattr = fuse_setxattr,
1714 .getxattr = fuse_getxattr,
1715 .listxattr = fuse_listxattr,
1716 .removexattr = fuse_removexattr,
e5e5558e
MS
1717};
1718
754661f1 1719static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1720 .setattr = fuse_setattr,
e5e5558e
MS
1721 .follow_link = fuse_follow_link,
1722 .put_link = fuse_put_link,
1723 .readlink = generic_readlink,
1724 .getattr = fuse_getattr,
92a8780e
MS
1725 .setxattr = fuse_setxattr,
1726 .getxattr = fuse_getxattr,
1727 .listxattr = fuse_listxattr,
1728 .removexattr = fuse_removexattr,
e5e5558e
MS
1729};
1730
1731void fuse_init_common(struct inode *inode)
1732{
1733 inode->i_op = &fuse_common_inode_operations;
1734}
1735
1736void fuse_init_dir(struct inode *inode)
1737{
1738 inode->i_op = &fuse_dir_inode_operations;
1739 inode->i_fop = &fuse_dir_operations;
1740}
1741
1742void fuse_init_symlink(struct inode *inode)
1743{
1744 inode->i_op = &fuse_symlink_inode_operations;
1745}
This page took 0.724842 seconds and 5 git commands to generate.