fs: provide rcu-walk aware permission i_ops
[deliverable/linux.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
13#include <linux/gfp.h>
14#include <linux/sched.h>
15#include <linux/namei.h>
16
0a0898cf
MS
17#if BITS_PER_LONG >= 64
18static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
19{
20 entry->d_time = time;
21}
22
23static inline u64 fuse_dentry_time(struct dentry *entry)
24{
25 return entry->d_time;
26}
27#else
28/*
29 * On 32 bit archs store the high 32 bits of time in d_fsdata
30 */
31static void fuse_dentry_settime(struct dentry *entry, u64 time)
32{
33 entry->d_time = time;
34 entry->d_fsdata = (void *) (unsigned long) (time >> 32);
35}
36
37static u64 fuse_dentry_time(struct dentry *entry)
38{
39 return (u64) entry->d_time +
40 ((u64) (unsigned long) entry->d_fsdata << 32);
41}
42#endif
43
6f9f1180
MS
44/*
45 * FUSE caches dentries and attributes with separate timeout. The
46 * time in jiffies until the dentry/attributes are valid is stored in
47 * dentry->d_time and fuse_inode->i_time respectively.
48 */
49
50/*
51 * Calculate the time in jiffies until a dentry/attributes are valid
52 */
0a0898cf 53static u64 time_to_jiffies(unsigned long sec, unsigned long nsec)
e5e5558e 54{
685d16dd
MS
55 if (sec || nsec) {
56 struct timespec ts = {sec, nsec};
0a0898cf 57 return get_jiffies_64() + timespec_to_jiffies(&ts);
685d16dd 58 } else
0a0898cf 59 return 0;
e5e5558e
MS
60}
61
6f9f1180
MS
62/*
63 * Set dentry and possibly attribute timeouts from the lookup/mk*
64 * replies
65 */
1fb69e78
MS
66static void fuse_change_entry_timeout(struct dentry *entry,
67 struct fuse_entry_out *o)
0aa7c699 68{
0a0898cf
MS
69 fuse_dentry_settime(entry,
70 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
71}
72
73static u64 attr_timeout(struct fuse_attr_out *o)
74{
75 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
76}
77
78static u64 entry_attr_timeout(struct fuse_entry_out *o)
79{
80 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
81}
82
6f9f1180
MS
83/*
84 * Mark the attributes as stale, so that at the next call to
85 * ->getattr() they will be fetched from userspace
86 */
8cbdf1e6
MS
87void fuse_invalidate_attr(struct inode *inode)
88{
0a0898cf 89 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
90}
91
6f9f1180
MS
92/*
93 * Just mark the entry as stale, so that a next attempt to look it up
94 * will result in a new lookup call to userspace
95 *
96 * This is called when a dentry is about to become negative and the
97 * timeout is unknown (unlink, rmdir, rename and in some cases
98 * lookup)
99 */
dbd561d2 100void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 101{
0a0898cf 102 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
103}
104
6f9f1180
MS
105/*
106 * Same as fuse_invalidate_entry_cache(), but also try to remove the
107 * dentry from the hash
108 */
8cbdf1e6
MS
109static void fuse_invalidate_entry(struct dentry *entry)
110{
111 d_invalidate(entry);
112 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
113}
114
c180eebe
MS
115static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_req *req,
116 u64 nodeid, struct qstr *name,
e5e5558e
MS
117 struct fuse_entry_out *outarg)
118{
0e9663ee 119 memset(outarg, 0, sizeof(struct fuse_entry_out));
e5e5558e 120 req->in.h.opcode = FUSE_LOOKUP;
c180eebe 121 req->in.h.nodeid = nodeid;
e5e5558e 122 req->in.numargs = 1;
c180eebe
MS
123 req->in.args[0].size = name->len + 1;
124 req->in.args[0].value = name->name;
e5e5558e 125 req->out.numargs = 1;
0e9663ee
MS
126 if (fc->minor < 9)
127 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
128 else
129 req->out.args[0].size = sizeof(struct fuse_entry_out);
e5e5558e
MS
130 req->out.args[0].value = outarg;
131}
132
5c5c5e51 133u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
134{
135 u64 curr_version;
136
137 /*
138 * The spin lock isn't actually needed on 64bit archs, but we
139 * don't yet care too much about such optimizations.
140 */
141 spin_lock(&fc->lock);
142 curr_version = fc->attr_version;
143 spin_unlock(&fc->lock);
144
145 return curr_version;
146}
147
6f9f1180
MS
148/*
149 * Check whether the dentry is still valid
150 *
151 * If the entry validity timeout has expired and the dentry is
152 * positive, try to redo the lookup. If the lookup results in a
153 * different inode, then let the VFS invalidate the dentry and redo
154 * the lookup once more. If the lookup results in the same inode,
155 * then refresh the attributes, timeouts and mark the dentry valid.
156 */
e5e5558e
MS
157static int fuse_dentry_revalidate(struct dentry *entry, struct nameidata *nd)
158{
34286d66 159 struct inode *inode;
8cbdf1e6 160
34286d66
NP
161 if (nd->flags & LOOKUP_RCU)
162 return -ECHILD;
163
164 inode = entry->d_inode;
8cbdf1e6 165 if (inode && is_bad_inode(inode))
e5e5558e 166 return 0;
0a0898cf 167 else if (fuse_dentry_time(entry) < get_jiffies_64()) {
e5e5558e 168 int err;
e5e5558e 169 struct fuse_entry_out outarg;
8cbdf1e6
MS
170 struct fuse_conn *fc;
171 struct fuse_req *req;
2d51013e 172 struct fuse_req *forget_req;
e956edd0 173 struct dentry *parent;
1fb69e78 174 u64 attr_version;
8cbdf1e6 175
50322fe7 176 /* For negative dentries, always do a fresh lookup */
8cbdf1e6
MS
177 if (!inode)
178 return 0;
179
180 fc = get_fuse_conn(inode);
ce1d5a49
MS
181 req = fuse_get_req(fc);
182 if (IS_ERR(req))
e5e5558e
MS
183 return 0;
184
2d51013e
MS
185 forget_req = fuse_get_req(fc);
186 if (IS_ERR(forget_req)) {
187 fuse_put_request(fc, req);
188 return 0;
189 }
190
7dca9fd3 191 attr_version = fuse_get_attr_version(fc);
1fb69e78 192
e956edd0 193 parent = dget_parent(entry);
c180eebe
MS
194 fuse_lookup_init(fc, req, get_node_id(parent->d_inode),
195 &entry->d_name, &outarg);
b93f858a 196 fuse_request_send(fc, req);
e956edd0 197 dput(parent);
e5e5558e 198 err = req->out.h.error;
2d51013e 199 fuse_put_request(fc, req);
50322fe7
MS
200 /* Zero nodeid is same as -ENOENT */
201 if (!err && !outarg.nodeid)
202 err = -ENOENT;
9e6268db 203 if (!err) {
8cbdf1e6 204 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 205 if (outarg.nodeid != get_node_id(inode)) {
2d51013e
MS
206 fuse_send_forget(fc, forget_req,
207 outarg.nodeid, 1);
9e6268db
MS
208 return 0;
209 }
8da5ff23 210 spin_lock(&fc->lock);
1729a16c 211 fi->nlookup++;
8da5ff23 212 spin_unlock(&fc->lock);
9e6268db 213 }
2d51013e 214 fuse_put_request(fc, forget_req);
9e6268db 215 if (err || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e5e5558e
MS
216 return 0;
217
1fb69e78
MS
218 fuse_change_attributes(inode, &outarg.attr,
219 entry_attr_timeout(&outarg),
220 attr_version);
221 fuse_change_entry_timeout(entry, &outarg);
e5e5558e
MS
222 }
223 return 1;
224}
225
8bfc016d 226static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
227{
228 return !nodeid || nodeid == FUSE_ROOT_ID;
229}
230
4269590a 231const struct dentry_operations fuse_dentry_operations = {
e5e5558e
MS
232 .d_revalidate = fuse_dentry_revalidate,
233};
234
a5bfffac 235int fuse_valid_type(int m)
39ee059a
MS
236{
237 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
238 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
239}
240
d2a85164
MS
241/*
242 * Add a directory inode to a dentry, ensuring that no other dentry
243 * refers to this inode. Called with fc->inst_mutex.
244 */
0de6256d
MS
245static struct dentry *fuse_d_add_directory(struct dentry *entry,
246 struct inode *inode)
d2a85164
MS
247{
248 struct dentry *alias = d_find_alias(inode);
0de6256d 249 if (alias && !(alias->d_flags & DCACHE_DISCONNECTED)) {
d2a85164
MS
250 /* This tries to shrink the subtree below alias */
251 fuse_invalidate_entry(alias);
252 dput(alias);
253 if (!list_empty(&inode->i_dentry))
0de6256d
MS
254 return ERR_PTR(-EBUSY);
255 } else {
256 dput(alias);
d2a85164 257 }
0de6256d 258 return d_splice_alias(inode, entry);
d2a85164
MS
259}
260
c180eebe
MS
261int fuse_lookup_name(struct super_block *sb, u64 nodeid, struct qstr *name,
262 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 263{
c180eebe 264 struct fuse_conn *fc = get_fuse_conn_super(sb);
e5e5558e 265 struct fuse_req *req;
2d51013e 266 struct fuse_req *forget_req;
1fb69e78 267 u64 attr_version;
c180eebe 268 int err;
e5e5558e 269
c180eebe
MS
270 *inode = NULL;
271 err = -ENAMETOOLONG;
272 if (name->len > FUSE_NAME_MAX)
273 goto out;
e5e5558e 274
ce1d5a49 275 req = fuse_get_req(fc);
c180eebe 276 err = PTR_ERR(req);
ce1d5a49 277 if (IS_ERR(req))
c180eebe 278 goto out;
e5e5558e 279
2d51013e 280 forget_req = fuse_get_req(fc);
c180eebe 281 err = PTR_ERR(forget_req);
2d51013e
MS
282 if (IS_ERR(forget_req)) {
283 fuse_put_request(fc, req);
c180eebe 284 goto out;
2d51013e
MS
285 }
286
7dca9fd3 287 attr_version = fuse_get_attr_version(fc);
1fb69e78 288
c180eebe 289 fuse_lookup_init(fc, req, nodeid, name, outarg);
b93f858a 290 fuse_request_send(fc, req);
e5e5558e 291 err = req->out.h.error;
2d51013e 292 fuse_put_request(fc, req);
50322fe7 293 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
294 if (err || !outarg->nodeid)
295 goto out_put_forget;
296
297 err = -EIO;
298 if (!outarg->nodeid)
299 goto out_put_forget;
300 if (!fuse_valid_type(outarg->attr.mode))
301 goto out_put_forget;
302
303 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
304 &outarg->attr, entry_attr_timeout(outarg),
305 attr_version);
306 err = -ENOMEM;
307 if (!*inode) {
308 fuse_send_forget(fc, forget_req, outarg->nodeid, 1);
309 goto out;
e5e5558e 310 }
c180eebe
MS
311 err = 0;
312
313 out_put_forget:
2d51013e 314 fuse_put_request(fc, forget_req);
c180eebe
MS
315 out:
316 return err;
317}
318
319static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
320 struct nameidata *nd)
321{
322 int err;
323 struct fuse_entry_out outarg;
324 struct inode *inode;
325 struct dentry *newent;
326 struct fuse_conn *fc = get_fuse_conn(dir);
327 bool outarg_valid = true;
328
329 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
330 &outarg, &inode);
331 if (err == -ENOENT) {
332 outarg_valid = false;
333 err = 0;
334 }
335 if (err)
336 goto out_err;
337
338 err = -EIO;
339 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
340 goto out_iput;
e5e5558e 341
d2a85164
MS
342 if (inode && S_ISDIR(inode->i_mode)) {
343 mutex_lock(&fc->inst_mutex);
0de6256d 344 newent = fuse_d_add_directory(entry, inode);
d2a85164 345 mutex_unlock(&fc->inst_mutex);
c180eebe
MS
346 err = PTR_ERR(newent);
347 if (IS_ERR(newent))
348 goto out_iput;
349 } else {
0de6256d 350 newent = d_splice_alias(inode, entry);
c180eebe 351 }
d2a85164 352
0de6256d 353 entry = newent ? newent : entry;
fb045adb 354 d_set_d_op(entry, &fuse_dentry_operations);
c180eebe 355 if (outarg_valid)
1fb69e78 356 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
357 else
358 fuse_invalidate_entry_cache(entry);
c180eebe 359
0de6256d 360 return newent;
c180eebe
MS
361
362 out_iput:
363 iput(inode);
364 out_err:
365 return ERR_PTR(err);
e5e5558e
MS
366}
367
6f9f1180
MS
368/*
369 * Atomic create+open operation
370 *
371 * If the filesystem doesn't support this, then fall back to separate
372 * 'mknod' + 'open' requests.
373 */
fd72faac
MS
374static int fuse_create_open(struct inode *dir, struct dentry *entry, int mode,
375 struct nameidata *nd)
376{
377 int err;
378 struct inode *inode;
379 struct fuse_conn *fc = get_fuse_conn(dir);
380 struct fuse_req *req;
51eb01e7 381 struct fuse_req *forget_req;
e0a43ddc 382 struct fuse_create_in inarg;
fd72faac
MS
383 struct fuse_open_out outopen;
384 struct fuse_entry_out outentry;
fd72faac
MS
385 struct fuse_file *ff;
386 struct file *file;
387 int flags = nd->intent.open.flags - 1;
388
fd72faac 389 if (fc->no_create)
ce1d5a49 390 return -ENOSYS;
fd72faac 391
1b732396
CH
392 if (flags & O_DIRECT)
393 return -EINVAL;
394
51eb01e7
MS
395 forget_req = fuse_get_req(fc);
396 if (IS_ERR(forget_req))
397 return PTR_ERR(forget_req);
398
ce1d5a49 399 req = fuse_get_req(fc);
51eb01e7 400 err = PTR_ERR(req);
ce1d5a49 401 if (IS_ERR(req))
51eb01e7 402 goto out_put_forget_req;
fd72faac 403
ce1d5a49 404 err = -ENOMEM;
acf99433 405 ff = fuse_file_alloc(fc);
fd72faac
MS
406 if (!ff)
407 goto out_put_request;
408
e0a43ddc
MS
409 if (!fc->dont_mask)
410 mode &= ~current_umask();
411
fd72faac
MS
412 flags &= ~O_NOCTTY;
413 memset(&inarg, 0, sizeof(inarg));
0e9663ee 414 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
415 inarg.flags = flags;
416 inarg.mode = mode;
e0a43ddc 417 inarg.umask = current_umask();
fd72faac
MS
418 req->in.h.opcode = FUSE_CREATE;
419 req->in.h.nodeid = get_node_id(dir);
fd72faac 420 req->in.numargs = 2;
e0a43ddc
MS
421 req->in.args[0].size = fc->minor < 12 ? sizeof(struct fuse_open_in) :
422 sizeof(inarg);
fd72faac
MS
423 req->in.args[0].value = &inarg;
424 req->in.args[1].size = entry->d_name.len + 1;
425 req->in.args[1].value = entry->d_name.name;
426 req->out.numargs = 2;
0e9663ee
MS
427 if (fc->minor < 9)
428 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
429 else
430 req->out.args[0].size = sizeof(outentry);
fd72faac
MS
431 req->out.args[0].value = &outentry;
432 req->out.args[1].size = sizeof(outopen);
433 req->out.args[1].value = &outopen;
b93f858a 434 fuse_request_send(fc, req);
fd72faac
MS
435 err = req->out.h.error;
436 if (err) {
437 if (err == -ENOSYS)
438 fc->no_create = 1;
439 goto out_free_ff;
440 }
441
442 err = -EIO;
2827d0b2 443 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
444 goto out_free_ff;
445
51eb01e7 446 fuse_put_request(fc, req);
c7b7143c
MS
447 ff->fh = outopen.fh;
448 ff->nodeid = outentry.nodeid;
449 ff->open_flags = outopen.open_flags;
fd72faac 450 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 451 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
452 if (!inode) {
453 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 454 fuse_sync_release(ff, flags);
51eb01e7
MS
455 fuse_send_forget(fc, forget_req, outentry.nodeid, 1);
456 return -ENOMEM;
fd72faac 457 }
51eb01e7 458 fuse_put_request(fc, forget_req);
fd72faac 459 d_instantiate(entry, inode);
1fb69e78 460 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 461 fuse_invalidate_attr(dir);
fd72faac
MS
462 file = lookup_instantiate_filp(nd, entry, generic_file_open);
463 if (IS_ERR(file)) {
8b0797a4 464 fuse_sync_release(ff, flags);
fd72faac
MS
465 return PTR_ERR(file);
466 }
c7b7143c
MS
467 file->private_data = fuse_file_get(ff);
468 fuse_finish_open(inode, file);
fd72faac
MS
469 return 0;
470
471 out_free_ff:
472 fuse_file_free(ff);
473 out_put_request:
474 fuse_put_request(fc, req);
51eb01e7
MS
475 out_put_forget_req:
476 fuse_put_request(fc, forget_req);
fd72faac
MS
477 return err;
478}
479
6f9f1180
MS
480/*
481 * Code shared between mknod, mkdir, symlink and link
482 */
9e6268db
MS
483static int create_new_entry(struct fuse_conn *fc, struct fuse_req *req,
484 struct inode *dir, struct dentry *entry,
485 int mode)
486{
487 struct fuse_entry_out outarg;
488 struct inode *inode;
9e6268db 489 int err;
2d51013e
MS
490 struct fuse_req *forget_req;
491
492 forget_req = fuse_get_req(fc);
493 if (IS_ERR(forget_req)) {
494 fuse_put_request(fc, req);
495 return PTR_ERR(forget_req);
496 }
9e6268db 497
0e9663ee 498 memset(&outarg, 0, sizeof(outarg));
9e6268db 499 req->in.h.nodeid = get_node_id(dir);
9e6268db 500 req->out.numargs = 1;
0e9663ee
MS
501 if (fc->minor < 9)
502 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
503 else
504 req->out.args[0].size = sizeof(outarg);
9e6268db 505 req->out.args[0].value = &outarg;
b93f858a 506 fuse_request_send(fc, req);
9e6268db 507 err = req->out.h.error;
2d51013e
MS
508 fuse_put_request(fc, req);
509 if (err)
510 goto out_put_forget_req;
511
39ee059a
MS
512 err = -EIO;
513 if (invalid_nodeid(outarg.nodeid))
2d51013e 514 goto out_put_forget_req;
39ee059a
MS
515
516 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 517 goto out_put_forget_req;
39ee059a 518
9e6268db 519 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 520 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 521 if (!inode) {
2d51013e 522 fuse_send_forget(fc, forget_req, outarg.nodeid, 1);
9e6268db
MS
523 return -ENOMEM;
524 }
2d51013e 525 fuse_put_request(fc, forget_req);
9e6268db 526
d2a85164
MS
527 if (S_ISDIR(inode->i_mode)) {
528 struct dentry *alias;
529 mutex_lock(&fc->inst_mutex);
530 alias = d_find_alias(inode);
531 if (alias) {
532 /* New directory must have moved since mkdir */
533 mutex_unlock(&fc->inst_mutex);
534 dput(alias);
535 iput(inode);
536 return -EBUSY;
537 }
538 d_instantiate(entry, inode);
539 mutex_unlock(&fc->inst_mutex);
540 } else
541 d_instantiate(entry, inode);
9e6268db 542
1fb69e78 543 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
544 fuse_invalidate_attr(dir);
545 return 0;
39ee059a 546
2d51013e
MS
547 out_put_forget_req:
548 fuse_put_request(fc, forget_req);
39ee059a 549 return err;
9e6268db
MS
550}
551
552static int fuse_mknod(struct inode *dir, struct dentry *entry, int mode,
553 dev_t rdev)
554{
555 struct fuse_mknod_in inarg;
556 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
557 struct fuse_req *req = fuse_get_req(fc);
558 if (IS_ERR(req))
559 return PTR_ERR(req);
9e6268db 560
e0a43ddc
MS
561 if (!fc->dont_mask)
562 mode &= ~current_umask();
563
9e6268db
MS
564 memset(&inarg, 0, sizeof(inarg));
565 inarg.mode = mode;
566 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 567 inarg.umask = current_umask();
9e6268db
MS
568 req->in.h.opcode = FUSE_MKNOD;
569 req->in.numargs = 2;
e0a43ddc
MS
570 req->in.args[0].size = fc->minor < 12 ? FUSE_COMPAT_MKNOD_IN_SIZE :
571 sizeof(inarg);
9e6268db
MS
572 req->in.args[0].value = &inarg;
573 req->in.args[1].size = entry->d_name.len + 1;
574 req->in.args[1].value = entry->d_name.name;
575 return create_new_entry(fc, req, dir, entry, mode);
576}
577
578static int fuse_create(struct inode *dir, struct dentry *entry, int mode,
579 struct nameidata *nd)
580{
b9ba347f 581 if (nd && (nd->flags & LOOKUP_OPEN)) {
fd72faac
MS
582 int err = fuse_create_open(dir, entry, mode, nd);
583 if (err != -ENOSYS)
584 return err;
585 /* Fall back on mknod */
586 }
9e6268db
MS
587 return fuse_mknod(dir, entry, mode, 0);
588}
589
590static int fuse_mkdir(struct inode *dir, struct dentry *entry, int mode)
591{
592 struct fuse_mkdir_in inarg;
593 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
594 struct fuse_req *req = fuse_get_req(fc);
595 if (IS_ERR(req))
596 return PTR_ERR(req);
9e6268db 597
e0a43ddc
MS
598 if (!fc->dont_mask)
599 mode &= ~current_umask();
600
9e6268db
MS
601 memset(&inarg, 0, sizeof(inarg));
602 inarg.mode = mode;
e0a43ddc 603 inarg.umask = current_umask();
9e6268db
MS
604 req->in.h.opcode = FUSE_MKDIR;
605 req->in.numargs = 2;
606 req->in.args[0].size = sizeof(inarg);
607 req->in.args[0].value = &inarg;
608 req->in.args[1].size = entry->d_name.len + 1;
609 req->in.args[1].value = entry->d_name.name;
610 return create_new_entry(fc, req, dir, entry, S_IFDIR);
611}
612
613static int fuse_symlink(struct inode *dir, struct dentry *entry,
614 const char *link)
615{
616 struct fuse_conn *fc = get_fuse_conn(dir);
617 unsigned len = strlen(link) + 1;
ce1d5a49
MS
618 struct fuse_req *req = fuse_get_req(fc);
619 if (IS_ERR(req))
620 return PTR_ERR(req);
9e6268db
MS
621
622 req->in.h.opcode = FUSE_SYMLINK;
623 req->in.numargs = 2;
624 req->in.args[0].size = entry->d_name.len + 1;
625 req->in.args[0].value = entry->d_name.name;
626 req->in.args[1].size = len;
627 req->in.args[1].value = link;
628 return create_new_entry(fc, req, dir, entry, S_IFLNK);
629}
630
631static int fuse_unlink(struct inode *dir, struct dentry *entry)
632{
633 int err;
634 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
635 struct fuse_req *req = fuse_get_req(fc);
636 if (IS_ERR(req))
637 return PTR_ERR(req);
9e6268db
MS
638
639 req->in.h.opcode = FUSE_UNLINK;
640 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
641 req->in.numargs = 1;
642 req->in.args[0].size = entry->d_name.len + 1;
643 req->in.args[0].value = entry->d_name.name;
b93f858a 644 fuse_request_send(fc, req);
9e6268db
MS
645 err = req->out.h.error;
646 fuse_put_request(fc, req);
647 if (!err) {
648 struct inode *inode = entry->d_inode;
649
1729a16c
MS
650 /*
651 * Set nlink to zero so the inode can be cleared, if the inode
652 * does have more links this will be discovered at the next
653 * lookup/getattr.
654 */
ce71ec36 655 clear_nlink(inode);
9e6268db
MS
656 fuse_invalidate_attr(inode);
657 fuse_invalidate_attr(dir);
8cbdf1e6 658 fuse_invalidate_entry_cache(entry);
9e6268db
MS
659 } else if (err == -EINTR)
660 fuse_invalidate_entry(entry);
661 return err;
662}
663
664static int fuse_rmdir(struct inode *dir, struct dentry *entry)
665{
666 int err;
667 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
668 struct fuse_req *req = fuse_get_req(fc);
669 if (IS_ERR(req))
670 return PTR_ERR(req);
9e6268db
MS
671
672 req->in.h.opcode = FUSE_RMDIR;
673 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
674 req->in.numargs = 1;
675 req->in.args[0].size = entry->d_name.len + 1;
676 req->in.args[0].value = entry->d_name.name;
b93f858a 677 fuse_request_send(fc, req);
9e6268db
MS
678 err = req->out.h.error;
679 fuse_put_request(fc, req);
680 if (!err) {
ce71ec36 681 clear_nlink(entry->d_inode);
9e6268db 682 fuse_invalidate_attr(dir);
8cbdf1e6 683 fuse_invalidate_entry_cache(entry);
9e6268db
MS
684 } else if (err == -EINTR)
685 fuse_invalidate_entry(entry);
686 return err;
687}
688
689static int fuse_rename(struct inode *olddir, struct dentry *oldent,
690 struct inode *newdir, struct dentry *newent)
691{
692 int err;
693 struct fuse_rename_in inarg;
694 struct fuse_conn *fc = get_fuse_conn(olddir);
ce1d5a49
MS
695 struct fuse_req *req = fuse_get_req(fc);
696 if (IS_ERR(req))
697 return PTR_ERR(req);
9e6268db
MS
698
699 memset(&inarg, 0, sizeof(inarg));
700 inarg.newdir = get_node_id(newdir);
701 req->in.h.opcode = FUSE_RENAME;
702 req->in.h.nodeid = get_node_id(olddir);
9e6268db
MS
703 req->in.numargs = 3;
704 req->in.args[0].size = sizeof(inarg);
705 req->in.args[0].value = &inarg;
706 req->in.args[1].size = oldent->d_name.len + 1;
707 req->in.args[1].value = oldent->d_name.name;
708 req->in.args[2].size = newent->d_name.len + 1;
709 req->in.args[2].value = newent->d_name.name;
b93f858a 710 fuse_request_send(fc, req);
9e6268db
MS
711 err = req->out.h.error;
712 fuse_put_request(fc, req);
713 if (!err) {
08b63307
MS
714 /* ctime changes */
715 fuse_invalidate_attr(oldent->d_inode);
716
9e6268db
MS
717 fuse_invalidate_attr(olddir);
718 if (olddir != newdir)
719 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
720
721 /* newent will end up negative */
5219f346
MS
722 if (newent->d_inode) {
723 fuse_invalidate_attr(newent->d_inode);
8cbdf1e6 724 fuse_invalidate_entry_cache(newent);
5219f346 725 }
9e6268db
MS
726 } else if (err == -EINTR) {
727 /* If request was interrupted, DEITY only knows if the
728 rename actually took place. If the invalidation
729 fails (e.g. some process has CWD under the renamed
730 directory), then there can be inconsistency between
731 the dcache and the real filesystem. Tough luck. */
732 fuse_invalidate_entry(oldent);
733 if (newent->d_inode)
734 fuse_invalidate_entry(newent);
735 }
736
737 return err;
738}
739
740static int fuse_link(struct dentry *entry, struct inode *newdir,
741 struct dentry *newent)
742{
743 int err;
744 struct fuse_link_in inarg;
745 struct inode *inode = entry->d_inode;
746 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49
MS
747 struct fuse_req *req = fuse_get_req(fc);
748 if (IS_ERR(req))
749 return PTR_ERR(req);
9e6268db
MS
750
751 memset(&inarg, 0, sizeof(inarg));
752 inarg.oldnodeid = get_node_id(inode);
753 req->in.h.opcode = FUSE_LINK;
9e6268db
MS
754 req->in.numargs = 2;
755 req->in.args[0].size = sizeof(inarg);
756 req->in.args[0].value = &inarg;
757 req->in.args[1].size = newent->d_name.len + 1;
758 req->in.args[1].value = newent->d_name.name;
759 err = create_new_entry(fc, req, newdir, newent, inode->i_mode);
760 /* Contrary to "normal" filesystems it can happen that link
761 makes two "logical" inodes point to the same "physical"
762 inode. We invalidate the attributes of the old one, so it
763 will reflect changes in the backing inode (link count,
764 etc.)
765 */
766 if (!err || err == -EINTR)
767 fuse_invalidate_attr(inode);
768 return err;
769}
770
1fb69e78
MS
771static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
772 struct kstat *stat)
773{
774 stat->dev = inode->i_sb->s_dev;
775 stat->ino = attr->ino;
776 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
777 stat->nlink = attr->nlink;
778 stat->uid = attr->uid;
779 stat->gid = attr->gid;
780 stat->rdev = inode->i_rdev;
781 stat->atime.tv_sec = attr->atime;
782 stat->atime.tv_nsec = attr->atimensec;
783 stat->mtime.tv_sec = attr->mtime;
784 stat->mtime.tv_nsec = attr->mtimensec;
785 stat->ctime.tv_sec = attr->ctime;
786 stat->ctime.tv_nsec = attr->ctimensec;
787 stat->size = attr->size;
788 stat->blocks = attr->blocks;
789 stat->blksize = (1 << inode->i_blkbits);
790}
791
c79e322f
MS
792static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
793 struct file *file)
e5e5558e
MS
794{
795 int err;
c79e322f
MS
796 struct fuse_getattr_in inarg;
797 struct fuse_attr_out outarg;
e5e5558e 798 struct fuse_conn *fc = get_fuse_conn(inode);
1fb69e78
MS
799 struct fuse_req *req;
800 u64 attr_version;
801
802 req = fuse_get_req(fc);
ce1d5a49
MS
803 if (IS_ERR(req))
804 return PTR_ERR(req);
e5e5558e 805
7dca9fd3 806 attr_version = fuse_get_attr_version(fc);
1fb69e78 807
c79e322f 808 memset(&inarg, 0, sizeof(inarg));
0e9663ee 809 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
810 /* Directories have separate file-handle space */
811 if (file && S_ISREG(inode->i_mode)) {
812 struct fuse_file *ff = file->private_data;
813
814 inarg.getattr_flags |= FUSE_GETATTR_FH;
815 inarg.fh = ff->fh;
816 }
e5e5558e
MS
817 req->in.h.opcode = FUSE_GETATTR;
818 req->in.h.nodeid = get_node_id(inode);
c79e322f
MS
819 req->in.numargs = 1;
820 req->in.args[0].size = sizeof(inarg);
821 req->in.args[0].value = &inarg;
e5e5558e 822 req->out.numargs = 1;
0e9663ee
MS
823 if (fc->minor < 9)
824 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
825 else
826 req->out.args[0].size = sizeof(outarg);
c79e322f 827 req->out.args[0].value = &outarg;
b93f858a 828 fuse_request_send(fc, req);
e5e5558e
MS
829 err = req->out.h.error;
830 fuse_put_request(fc, req);
831 if (!err) {
c79e322f 832 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
833 make_bad_inode(inode);
834 err = -EIO;
835 } else {
c79e322f
MS
836 fuse_change_attributes(inode, &outarg.attr,
837 attr_timeout(&outarg),
1fb69e78
MS
838 attr_version);
839 if (stat)
c79e322f 840 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
841 }
842 }
843 return err;
844}
845
bcb4be80
MS
846int fuse_update_attributes(struct inode *inode, struct kstat *stat,
847 struct file *file, bool *refreshed)
848{
849 struct fuse_inode *fi = get_fuse_inode(inode);
850 int err;
851 bool r;
852
853 if (fi->i_time < get_jiffies_64()) {
854 r = true;
855 err = fuse_do_getattr(inode, stat, file);
856 } else {
857 r = false;
858 err = 0;
859 if (stat) {
860 generic_fillattr(inode, stat);
861 stat->mode = fi->orig_i_mode;
862 }
863 }
864
865 if (refreshed != NULL)
866 *refreshed = r;
867
868 return err;
869}
870
3b463ae0
JM
871int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
872 struct qstr *name)
873{
874 int err = -ENOTDIR;
875 struct inode *parent;
876 struct dentry *dir;
877 struct dentry *entry;
878
879 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
880 if (!parent)
881 return -ENOENT;
882
883 mutex_lock(&parent->i_mutex);
884 if (!S_ISDIR(parent->i_mode))
885 goto unlock;
886
887 err = -ENOENT;
888 dir = d_find_alias(parent);
889 if (!dir)
890 goto unlock;
891
892 entry = d_lookup(dir, name);
893 dput(dir);
894 if (!entry)
895 goto unlock;
896
897 fuse_invalidate_attr(parent);
898 fuse_invalidate_entry(entry);
899 dput(entry);
900 err = 0;
901
902 unlock:
903 mutex_unlock(&parent->i_mutex);
904 iput(parent);
905 return err;
906}
907
87729a55
MS
908/*
909 * Calling into a user-controlled filesystem gives the filesystem
910 * daemon ptrace-like capabilities over the requester process. This
911 * means, that the filesystem daemon is able to record the exact
912 * filesystem operations performed, and can also control the behavior
913 * of the requester process in otherwise impossible ways. For example
914 * it can delay the operation for arbitrary length of time allowing
915 * DoS against the requester.
916 *
917 * For this reason only those processes can call into the filesystem,
918 * for which the owner of the mount has ptrace privilege. This
919 * excludes processes started by other users, suid or sgid processes.
920 */
e57ac683 921int fuse_allow_task(struct fuse_conn *fc, struct task_struct *task)
87729a55 922{
c69e8d9c
DH
923 const struct cred *cred;
924 int ret;
87729a55 925
c69e8d9c 926 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
927 return 1;
928
c69e8d9c
DH
929 rcu_read_lock();
930 ret = 0;
931 cred = __task_cred(task);
932 if (cred->euid == fc->user_id &&
933 cred->suid == fc->user_id &&
934 cred->uid == fc->user_id &&
935 cred->egid == fc->group_id &&
936 cred->sgid == fc->group_id &&
937 cred->gid == fc->group_id)
938 ret = 1;
939 rcu_read_unlock();
940
941 return ret;
87729a55
MS
942}
943
31d40d74
MS
944static int fuse_access(struct inode *inode, int mask)
945{
946 struct fuse_conn *fc = get_fuse_conn(inode);
947 struct fuse_req *req;
948 struct fuse_access_in inarg;
949 int err;
950
951 if (fc->no_access)
952 return 0;
953
ce1d5a49
MS
954 req = fuse_get_req(fc);
955 if (IS_ERR(req))
956 return PTR_ERR(req);
31d40d74
MS
957
958 memset(&inarg, 0, sizeof(inarg));
e6305c43 959 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
31d40d74
MS
960 req->in.h.opcode = FUSE_ACCESS;
961 req->in.h.nodeid = get_node_id(inode);
31d40d74
MS
962 req->in.numargs = 1;
963 req->in.args[0].size = sizeof(inarg);
964 req->in.args[0].value = &inarg;
b93f858a 965 fuse_request_send(fc, req);
31d40d74
MS
966 err = req->out.h.error;
967 fuse_put_request(fc, req);
968 if (err == -ENOSYS) {
969 fc->no_access = 1;
970 err = 0;
971 }
972 return err;
973}
974
6f9f1180
MS
975/*
976 * Check permission. The two basic access models of FUSE are:
977 *
978 * 1) Local access checking ('default_permissions' mount option) based
979 * on file mode. This is the plain old disk filesystem permission
980 * modell.
981 *
982 * 2) "Remote" access checking, where server is responsible for
983 * checking permission in each inode operation. An exception to this
984 * is if ->permission() was invoked from sys_access() in which case an
985 * access request is sent. Execute permission is still checked
986 * locally based on file mode.
987 */
b74c79e9 988static int fuse_permission(struct inode *inode, int mask, unsigned int flags)
e5e5558e
MS
989{
990 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
991 bool refreshed = false;
992 int err = 0;
e5e5558e 993
b74c79e9
NP
994 if (flags & IPERM_FLAG_RCU)
995 return -ECHILD;
996
87729a55 997 if (!fuse_allow_task(fc, current))
e5e5558e 998 return -EACCES;
244f6385
MS
999
1000 /*
e8e96157 1001 * If attributes are needed, refresh them before proceeding
244f6385 1002 */
e8e96157
MS
1003 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1004 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
bcb4be80
MS
1005 err = fuse_update_attributes(inode, NULL, NULL, &refreshed);
1006 if (err)
1007 return err;
244f6385
MS
1008 }
1009
1010 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
b74c79e9 1011 err = generic_permission(inode, mask, flags, NULL);
1e9a4ed9
MS
1012
1013 /* If permission is denied, try to refresh file
1014 attributes. This is also needed, because the root
1015 node will at first have no permissions */
244f6385 1016 if (err == -EACCES && !refreshed) {
c79e322f 1017 err = fuse_do_getattr(inode, NULL, NULL);
1e9a4ed9 1018 if (!err)
b74c79e9
NP
1019 err = generic_permission(inode, mask,
1020 flags, NULL);
1e9a4ed9
MS
1021 }
1022
6f9f1180
MS
1023 /* Note: the opposite of the above test does not
1024 exist. So if permissions are revoked this won't be
1025 noticed immediately, only after the attribute
1026 timeout has expired */
9cfcac81 1027 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1028 err = fuse_access(inode, mask);
1029 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1030 if (!(inode->i_mode & S_IXUGO)) {
1031 if (refreshed)
1032 return -EACCES;
1033
c79e322f 1034 err = fuse_do_getattr(inode, NULL, NULL);
e8e96157
MS
1035 if (!err && !(inode->i_mode & S_IXUGO))
1036 return -EACCES;
1037 }
e5e5558e 1038 }
244f6385 1039 return err;
e5e5558e
MS
1040}
1041
1042static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
1043 void *dstbuf, filldir_t filldir)
1044{
1045 while (nbytes >= FUSE_NAME_OFFSET) {
1046 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1047 size_t reclen = FUSE_DIRENT_SIZE(dirent);
1048 int over;
1049 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1050 return -EIO;
1051 if (reclen > nbytes)
1052 break;
1053
1054 over = filldir(dstbuf, dirent->name, dirent->namelen,
1055 file->f_pos, dirent->ino, dirent->type);
1056 if (over)
1057 break;
1058
1059 buf += reclen;
1060 nbytes -= reclen;
1061 file->f_pos = dirent->off;
1062 }
1063
1064 return 0;
1065}
1066
04730fef 1067static int fuse_readdir(struct file *file, void *dstbuf, filldir_t filldir)
e5e5558e 1068{
04730fef
MS
1069 int err;
1070 size_t nbytes;
1071 struct page *page;
7706a9d6 1072 struct inode *inode = file->f_path.dentry->d_inode;
e5e5558e 1073 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8
MS
1074 struct fuse_req *req;
1075
1076 if (is_bad_inode(inode))
1077 return -EIO;
1078
ce1d5a49
MS
1079 req = fuse_get_req(fc);
1080 if (IS_ERR(req))
1081 return PTR_ERR(req);
e5e5558e 1082
04730fef
MS
1083 page = alloc_page(GFP_KERNEL);
1084 if (!page) {
1085 fuse_put_request(fc, req);
1086 return -ENOMEM;
1087 }
f4975c67 1088 req->out.argpages = 1;
04730fef
MS
1089 req->num_pages = 1;
1090 req->pages[0] = page;
2106cb18 1091 fuse_read_fill(req, file, file->f_pos, PAGE_SIZE, FUSE_READDIR);
b93f858a 1092 fuse_request_send(fc, req);
361b1eb5 1093 nbytes = req->out.args[0].size;
e5e5558e
MS
1094 err = req->out.h.error;
1095 fuse_put_request(fc, req);
1096 if (!err)
04730fef
MS
1097 err = parse_dirfile(page_address(page), nbytes, file, dstbuf,
1098 filldir);
e5e5558e 1099
04730fef 1100 __free_page(page);
b36c31ba 1101 fuse_invalidate_attr(inode); /* atime changed */
04730fef 1102 return err;
e5e5558e
MS
1103}
1104
1105static char *read_link(struct dentry *dentry)
1106{
1107 struct inode *inode = dentry->d_inode;
1108 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49 1109 struct fuse_req *req = fuse_get_req(fc);
e5e5558e
MS
1110 char *link;
1111
ce1d5a49 1112 if (IS_ERR(req))
e231c2ee 1113 return ERR_CAST(req);
e5e5558e
MS
1114
1115 link = (char *) __get_free_page(GFP_KERNEL);
1116 if (!link) {
1117 link = ERR_PTR(-ENOMEM);
1118 goto out;
1119 }
1120 req->in.h.opcode = FUSE_READLINK;
1121 req->in.h.nodeid = get_node_id(inode);
e5e5558e
MS
1122 req->out.argvar = 1;
1123 req->out.numargs = 1;
1124 req->out.args[0].size = PAGE_SIZE - 1;
1125 req->out.args[0].value = link;
b93f858a 1126 fuse_request_send(fc, req);
e5e5558e
MS
1127 if (req->out.h.error) {
1128 free_page((unsigned long) link);
1129 link = ERR_PTR(req->out.h.error);
1130 } else
1131 link[req->out.args[0].size] = '\0';
1132 out:
1133 fuse_put_request(fc, req);
b36c31ba 1134 fuse_invalidate_attr(inode); /* atime changed */
e5e5558e
MS
1135 return link;
1136}
1137
1138static void free_link(char *link)
1139{
1140 if (!IS_ERR(link))
1141 free_page((unsigned long) link);
1142}
1143
1144static void *fuse_follow_link(struct dentry *dentry, struct nameidata *nd)
1145{
1146 nd_set_link(nd, read_link(dentry));
1147 return NULL;
1148}
1149
1150static void fuse_put_link(struct dentry *dentry, struct nameidata *nd, void *c)
1151{
1152 free_link(nd_get_link(nd));
1153}
1154
1155static int fuse_dir_open(struct inode *inode, struct file *file)
1156{
91fe96b4 1157 return fuse_open_common(inode, file, true);
e5e5558e
MS
1158}
1159
1160static int fuse_dir_release(struct inode *inode, struct file *file)
1161{
8b0797a4
MS
1162 fuse_release_common(file, FUSE_RELEASEDIR);
1163
1164 return 0;
e5e5558e
MS
1165}
1166
7ea80859 1167static int fuse_dir_fsync(struct file *file, int datasync)
82547981 1168{
7ea80859 1169 return fuse_fsync_common(file, datasync, 1);
82547981
MS
1170}
1171
17637cba
MS
1172static bool update_mtime(unsigned ivalid)
1173{
1174 /* Always update if mtime is explicitly set */
1175 if (ivalid & ATTR_MTIME_SET)
1176 return true;
1177
1178 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1179 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1180 return false;
1181
1182 /* In all other cases update */
1183 return true;
1184}
1185
befc649c 1186static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg)
9e6268db
MS
1187{
1188 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1189
1190 if (ivalid & ATTR_MODE)
befc649c 1191 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1192 if (ivalid & ATTR_UID)
befc649c 1193 arg->valid |= FATTR_UID, arg->uid = iattr->ia_uid;
9e6268db 1194 if (ivalid & ATTR_GID)
befc649c 1195 arg->valid |= FATTR_GID, arg->gid = iattr->ia_gid;
9e6268db 1196 if (ivalid & ATTR_SIZE)
befc649c 1197 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1198 if (ivalid & ATTR_ATIME) {
1199 arg->valid |= FATTR_ATIME;
befc649c 1200 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1201 arg->atimensec = iattr->ia_atime.tv_nsec;
1202 if (!(ivalid & ATTR_ATIME_SET))
1203 arg->valid |= FATTR_ATIME_NOW;
1204 }
1205 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid)) {
1206 arg->valid |= FATTR_MTIME;
befc649c 1207 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba
MS
1208 arg->mtimensec = iattr->ia_mtime.tv_nsec;
1209 if (!(ivalid & ATTR_MTIME_SET))
1210 arg->valid |= FATTR_MTIME_NOW;
befc649c 1211 }
9e6268db
MS
1212}
1213
3be5a52b
MS
1214/*
1215 * Prevent concurrent writepages on inode
1216 *
1217 * This is done by adding a negative bias to the inode write counter
1218 * and waiting for all pending writes to finish.
1219 */
1220void fuse_set_nowrite(struct inode *inode)
1221{
1222 struct fuse_conn *fc = get_fuse_conn(inode);
1223 struct fuse_inode *fi = get_fuse_inode(inode);
1224
1225 BUG_ON(!mutex_is_locked(&inode->i_mutex));
1226
1227 spin_lock(&fc->lock);
1228 BUG_ON(fi->writectr < 0);
1229 fi->writectr += FUSE_NOWRITE;
1230 spin_unlock(&fc->lock);
1231 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1232}
1233
1234/*
1235 * Allow writepages on inode
1236 *
1237 * Remove the bias from the writecounter and send any queued
1238 * writepages.
1239 */
1240static void __fuse_release_nowrite(struct inode *inode)
1241{
1242 struct fuse_inode *fi = get_fuse_inode(inode);
1243
1244 BUG_ON(fi->writectr != FUSE_NOWRITE);
1245 fi->writectr = 0;
1246 fuse_flush_writepages(inode);
1247}
1248
1249void fuse_release_nowrite(struct inode *inode)
1250{
1251 struct fuse_conn *fc = get_fuse_conn(inode);
1252
1253 spin_lock(&fc->lock);
1254 __fuse_release_nowrite(inode);
1255 spin_unlock(&fc->lock);
1256}
1257
6f9f1180
MS
1258/*
1259 * Set attributes, and at the same time refresh them.
1260 *
1261 * Truncation is slightly complicated, because the 'truncate' request
1262 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1263 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1264 * and the actual truncation by hand.
6f9f1180 1265 */
49d4914f
MS
1266static int fuse_do_setattr(struct dentry *entry, struct iattr *attr,
1267 struct file *file)
9e6268db
MS
1268{
1269 struct inode *inode = entry->d_inode;
1270 struct fuse_conn *fc = get_fuse_conn(inode);
9e6268db
MS
1271 struct fuse_req *req;
1272 struct fuse_setattr_in inarg;
1273 struct fuse_attr_out outarg;
3be5a52b
MS
1274 bool is_truncate = false;
1275 loff_t oldsize;
9e6268db 1276 int err;
9e6268db 1277
e57ac683
MS
1278 if (!fuse_allow_task(fc, current))
1279 return -EACCES;
1280
db78b877
CH
1281 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1282 attr->ia_valid |= ATTR_FORCE;
1283
1284 err = inode_change_ok(inode, attr);
1285 if (err)
1286 return err;
1e9a4ed9 1287
6ff958ed
MS
1288 if ((attr->ia_valid & ATTR_OPEN) && fc->atomic_o_trunc)
1289 return 0;
1290
2c27c65e 1291 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1292 is_truncate = true;
9e6268db 1293
ce1d5a49
MS
1294 req = fuse_get_req(fc);
1295 if (IS_ERR(req))
1296 return PTR_ERR(req);
9e6268db 1297
3be5a52b
MS
1298 if (is_truncate)
1299 fuse_set_nowrite(inode);
1300
9e6268db 1301 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1302 memset(&outarg, 0, sizeof(outarg));
befc649c 1303 iattr_to_fattr(attr, &inarg);
49d4914f
MS
1304 if (file) {
1305 struct fuse_file *ff = file->private_data;
1306 inarg.valid |= FATTR_FH;
1307 inarg.fh = ff->fh;
1308 }
f3332114
MS
1309 if (attr->ia_valid & ATTR_SIZE) {
1310 /* For mandatory locking in truncate */
1311 inarg.valid |= FATTR_LOCKOWNER;
1312 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1313 }
9e6268db
MS
1314 req->in.h.opcode = FUSE_SETATTR;
1315 req->in.h.nodeid = get_node_id(inode);
9e6268db
MS
1316 req->in.numargs = 1;
1317 req->in.args[0].size = sizeof(inarg);
1318 req->in.args[0].value = &inarg;
1319 req->out.numargs = 1;
0e9663ee
MS
1320 if (fc->minor < 9)
1321 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
1322 else
1323 req->out.args[0].size = sizeof(outarg);
9e6268db 1324 req->out.args[0].value = &outarg;
b93f858a 1325 fuse_request_send(fc, req);
9e6268db
MS
1326 err = req->out.h.error;
1327 fuse_put_request(fc, req);
e00d2c2d
MS
1328 if (err) {
1329 if (err == -EINTR)
1330 fuse_invalidate_attr(inode);
3be5a52b 1331 goto error;
e00d2c2d 1332 }
9e6268db 1333
e00d2c2d
MS
1334 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1335 make_bad_inode(inode);
3be5a52b
MS
1336 err = -EIO;
1337 goto error;
1338 }
1339
1340 spin_lock(&fc->lock);
1341 fuse_change_attributes_common(inode, &outarg.attr,
1342 attr_timeout(&outarg));
1343 oldsize = inode->i_size;
1344 i_size_write(inode, outarg.attr.size);
1345
1346 if (is_truncate) {
1347 /* NOTE: this may release/reacquire fc->lock */
1348 __fuse_release_nowrite(inode);
1349 }
1350 spin_unlock(&fc->lock);
1351
1352 /*
1353 * Only call invalidate_inode_pages2() after removing
1354 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1355 */
1356 if (S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
c08d3b0e 1357 truncate_pagecache(inode, oldsize, outarg.attr.size);
3be5a52b 1358 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1359 }
1360
e00d2c2d 1361 return 0;
3be5a52b
MS
1362
1363error:
1364 if (is_truncate)
1365 fuse_release_nowrite(inode);
1366
1367 return err;
9e6268db
MS
1368}
1369
49d4914f
MS
1370static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1371{
1372 if (attr->ia_valid & ATTR_FILE)
1373 return fuse_do_setattr(entry, attr, attr->ia_file);
1374 else
1375 return fuse_do_setattr(entry, attr, NULL);
1376}
1377
e5e5558e
MS
1378static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1379 struct kstat *stat)
1380{
1381 struct inode *inode = entry->d_inode;
244f6385 1382 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1383
1384 if (!fuse_allow_task(fc, current))
1385 return -EACCES;
1386
bcb4be80 1387 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1388}
1389
92a8780e
MS
1390static int fuse_setxattr(struct dentry *entry, const char *name,
1391 const void *value, size_t size, int flags)
1392{
1393 struct inode *inode = entry->d_inode;
1394 struct fuse_conn *fc = get_fuse_conn(inode);
1395 struct fuse_req *req;
1396 struct fuse_setxattr_in inarg;
1397 int err;
1398
92a8780e
MS
1399 if (fc->no_setxattr)
1400 return -EOPNOTSUPP;
1401
ce1d5a49
MS
1402 req = fuse_get_req(fc);
1403 if (IS_ERR(req))
1404 return PTR_ERR(req);
92a8780e
MS
1405
1406 memset(&inarg, 0, sizeof(inarg));
1407 inarg.size = size;
1408 inarg.flags = flags;
1409 req->in.h.opcode = FUSE_SETXATTR;
1410 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1411 req->in.numargs = 3;
1412 req->in.args[0].size = sizeof(inarg);
1413 req->in.args[0].value = &inarg;
1414 req->in.args[1].size = strlen(name) + 1;
1415 req->in.args[1].value = name;
1416 req->in.args[2].size = size;
1417 req->in.args[2].value = value;
b93f858a 1418 fuse_request_send(fc, req);
92a8780e
MS
1419 err = req->out.h.error;
1420 fuse_put_request(fc, req);
1421 if (err == -ENOSYS) {
1422 fc->no_setxattr = 1;
1423 err = -EOPNOTSUPP;
1424 }
1425 return err;
1426}
1427
1428static ssize_t fuse_getxattr(struct dentry *entry, const char *name,
1429 void *value, size_t size)
1430{
1431 struct inode *inode = entry->d_inode;
1432 struct fuse_conn *fc = get_fuse_conn(inode);
1433 struct fuse_req *req;
1434 struct fuse_getxattr_in inarg;
1435 struct fuse_getxattr_out outarg;
1436 ssize_t ret;
1437
1438 if (fc->no_getxattr)
1439 return -EOPNOTSUPP;
1440
ce1d5a49
MS
1441 req = fuse_get_req(fc);
1442 if (IS_ERR(req))
1443 return PTR_ERR(req);
92a8780e
MS
1444
1445 memset(&inarg, 0, sizeof(inarg));
1446 inarg.size = size;
1447 req->in.h.opcode = FUSE_GETXATTR;
1448 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1449 req->in.numargs = 2;
1450 req->in.args[0].size = sizeof(inarg);
1451 req->in.args[0].value = &inarg;
1452 req->in.args[1].size = strlen(name) + 1;
1453 req->in.args[1].value = name;
1454 /* This is really two different operations rolled into one */
1455 req->out.numargs = 1;
1456 if (size) {
1457 req->out.argvar = 1;
1458 req->out.args[0].size = size;
1459 req->out.args[0].value = value;
1460 } else {
1461 req->out.args[0].size = sizeof(outarg);
1462 req->out.args[0].value = &outarg;
1463 }
b93f858a 1464 fuse_request_send(fc, req);
92a8780e
MS
1465 ret = req->out.h.error;
1466 if (!ret)
1467 ret = size ? req->out.args[0].size : outarg.size;
1468 else {
1469 if (ret == -ENOSYS) {
1470 fc->no_getxattr = 1;
1471 ret = -EOPNOTSUPP;
1472 }
1473 }
1474 fuse_put_request(fc, req);
1475 return ret;
1476}
1477
1478static ssize_t fuse_listxattr(struct dentry *entry, char *list, size_t size)
1479{
1480 struct inode *inode = entry->d_inode;
1481 struct fuse_conn *fc = get_fuse_conn(inode);
1482 struct fuse_req *req;
1483 struct fuse_getxattr_in inarg;
1484 struct fuse_getxattr_out outarg;
1485 ssize_t ret;
1486
e57ac683
MS
1487 if (!fuse_allow_task(fc, current))
1488 return -EACCES;
1489
92a8780e
MS
1490 if (fc->no_listxattr)
1491 return -EOPNOTSUPP;
1492
ce1d5a49
MS
1493 req = fuse_get_req(fc);
1494 if (IS_ERR(req))
1495 return PTR_ERR(req);
92a8780e
MS
1496
1497 memset(&inarg, 0, sizeof(inarg));
1498 inarg.size = size;
1499 req->in.h.opcode = FUSE_LISTXATTR;
1500 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1501 req->in.numargs = 1;
1502 req->in.args[0].size = sizeof(inarg);
1503 req->in.args[0].value = &inarg;
1504 /* This is really two different operations rolled into one */
1505 req->out.numargs = 1;
1506 if (size) {
1507 req->out.argvar = 1;
1508 req->out.args[0].size = size;
1509 req->out.args[0].value = list;
1510 } else {
1511 req->out.args[0].size = sizeof(outarg);
1512 req->out.args[0].value = &outarg;
1513 }
b93f858a 1514 fuse_request_send(fc, req);
92a8780e
MS
1515 ret = req->out.h.error;
1516 if (!ret)
1517 ret = size ? req->out.args[0].size : outarg.size;
1518 else {
1519 if (ret == -ENOSYS) {
1520 fc->no_listxattr = 1;
1521 ret = -EOPNOTSUPP;
1522 }
1523 }
1524 fuse_put_request(fc, req);
1525 return ret;
1526}
1527
1528static int fuse_removexattr(struct dentry *entry, const char *name)
1529{
1530 struct inode *inode = entry->d_inode;
1531 struct fuse_conn *fc = get_fuse_conn(inode);
1532 struct fuse_req *req;
1533 int err;
1534
1535 if (fc->no_removexattr)
1536 return -EOPNOTSUPP;
1537
ce1d5a49
MS
1538 req = fuse_get_req(fc);
1539 if (IS_ERR(req))
1540 return PTR_ERR(req);
92a8780e
MS
1541
1542 req->in.h.opcode = FUSE_REMOVEXATTR;
1543 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1544 req->in.numargs = 1;
1545 req->in.args[0].size = strlen(name) + 1;
1546 req->in.args[0].value = name;
b93f858a 1547 fuse_request_send(fc, req);
92a8780e
MS
1548 err = req->out.h.error;
1549 fuse_put_request(fc, req);
1550 if (err == -ENOSYS) {
1551 fc->no_removexattr = 1;
1552 err = -EOPNOTSUPP;
1553 }
1554 return err;
1555}
1556
754661f1 1557static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1558 .lookup = fuse_lookup,
9e6268db
MS
1559 .mkdir = fuse_mkdir,
1560 .symlink = fuse_symlink,
1561 .unlink = fuse_unlink,
1562 .rmdir = fuse_rmdir,
1563 .rename = fuse_rename,
1564 .link = fuse_link,
1565 .setattr = fuse_setattr,
1566 .create = fuse_create,
1567 .mknod = fuse_mknod,
e5e5558e
MS
1568 .permission = fuse_permission,
1569 .getattr = fuse_getattr,
92a8780e
MS
1570 .setxattr = fuse_setxattr,
1571 .getxattr = fuse_getxattr,
1572 .listxattr = fuse_listxattr,
1573 .removexattr = fuse_removexattr,
e5e5558e
MS
1574};
1575
4b6f5d20 1576static const struct file_operations fuse_dir_operations = {
b6aeaded 1577 .llseek = generic_file_llseek,
e5e5558e
MS
1578 .read = generic_read_dir,
1579 .readdir = fuse_readdir,
1580 .open = fuse_dir_open,
1581 .release = fuse_dir_release,
82547981 1582 .fsync = fuse_dir_fsync,
e5e5558e
MS
1583};
1584
754661f1 1585static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1586 .setattr = fuse_setattr,
e5e5558e
MS
1587 .permission = fuse_permission,
1588 .getattr = fuse_getattr,
92a8780e
MS
1589 .setxattr = fuse_setxattr,
1590 .getxattr = fuse_getxattr,
1591 .listxattr = fuse_listxattr,
1592 .removexattr = fuse_removexattr,
e5e5558e
MS
1593};
1594
754661f1 1595static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1596 .setattr = fuse_setattr,
e5e5558e
MS
1597 .follow_link = fuse_follow_link,
1598 .put_link = fuse_put_link,
1599 .readlink = generic_readlink,
1600 .getattr = fuse_getattr,
92a8780e
MS
1601 .setxattr = fuse_setxattr,
1602 .getxattr = fuse_getxattr,
1603 .listxattr = fuse_listxattr,
1604 .removexattr = fuse_removexattr,
e5e5558e
MS
1605};
1606
1607void fuse_init_common(struct inode *inode)
1608{
1609 inode->i_op = &fuse_common_inode_operations;
1610}
1611
1612void fuse_init_dir(struct inode *inode)
1613{
1614 inode->i_op = &fuse_dir_inode_operations;
1615 inode->i_fop = &fuse_dir_operations;
1616}
1617
1618void fuse_init_symlink(struct inode *inode)
1619{
1620 inode->i_op = &fuse_symlink_inode_operations;
1621}
This page took 0.620958 seconds and 5 git commands to generate.