Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/benh/powerpc
[linux-2.6-block.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
e5e5558e 16
8d3af7f3 17static bool fuse_use_readdirplus(struct inode *dir, struct dir_context *ctx)
4582a4ab
FS
18{
19 struct fuse_conn *fc = get_fuse_conn(dir);
20 struct fuse_inode *fi = get_fuse_inode(dir);
21
22 if (!fc->do_readdirplus)
23 return false;
634734b6
EW
24 if (!fc->readdirplus_auto)
25 return true;
4582a4ab
FS
26 if (test_and_clear_bit(FUSE_I_ADVISE_RDPLUS, &fi->state))
27 return true;
8d3af7f3 28 if (ctx->pos == 0)
4582a4ab
FS
29 return true;
30 return false;
31}
32
33static void fuse_advise_use_readdirplus(struct inode *dir)
34{
35 struct fuse_inode *fi = get_fuse_inode(dir);
36
37 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
38}
39
0a0898cf
MS
40#if BITS_PER_LONG >= 64
41static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
42{
43 entry->d_time = time;
44}
45
46static inline u64 fuse_dentry_time(struct dentry *entry)
47{
48 return entry->d_time;
49}
50#else
51/*
52 * On 32 bit archs store the high 32 bits of time in d_fsdata
53 */
54static void fuse_dentry_settime(struct dentry *entry, u64 time)
55{
56 entry->d_time = time;
57 entry->d_fsdata = (void *) (unsigned long) (time >> 32);
58}
59
60static u64 fuse_dentry_time(struct dentry *entry)
61{
62 return (u64) entry->d_time +
63 ((u64) (unsigned long) entry->d_fsdata << 32);
64}
65#endif
66
6f9f1180
MS
67/*
68 * FUSE caches dentries and attributes with separate timeout. The
69 * time in jiffies until the dentry/attributes are valid is stored in
70 * dentry->d_time and fuse_inode->i_time respectively.
71 */
72
73/*
74 * Calculate the time in jiffies until a dentry/attributes are valid
75 */
0a0898cf 76static u64 time_to_jiffies(unsigned long sec, unsigned long nsec)
e5e5558e 77{
685d16dd
MS
78 if (sec || nsec) {
79 struct timespec ts = {sec, nsec};
0a0898cf 80 return get_jiffies_64() + timespec_to_jiffies(&ts);
685d16dd 81 } else
0a0898cf 82 return 0;
e5e5558e
MS
83}
84
6f9f1180
MS
85/*
86 * Set dentry and possibly attribute timeouts from the lookup/mk*
87 * replies
88 */
1fb69e78
MS
89static void fuse_change_entry_timeout(struct dentry *entry,
90 struct fuse_entry_out *o)
0aa7c699 91{
0a0898cf
MS
92 fuse_dentry_settime(entry,
93 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
94}
95
96static u64 attr_timeout(struct fuse_attr_out *o)
97{
98 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
99}
100
101static u64 entry_attr_timeout(struct fuse_entry_out *o)
102{
103 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
104}
105
6f9f1180
MS
106/*
107 * Mark the attributes as stale, so that at the next call to
108 * ->getattr() they will be fetched from userspace
109 */
8cbdf1e6
MS
110void fuse_invalidate_attr(struct inode *inode)
111{
0a0898cf 112 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
113}
114
451418fc
AG
115/**
116 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
117 * atime is not used.
118 */
119void fuse_invalidate_atime(struct inode *inode)
120{
121 if (!IS_RDONLY(inode))
122 fuse_invalidate_attr(inode);
123}
124
6f9f1180
MS
125/*
126 * Just mark the entry as stale, so that a next attempt to look it up
127 * will result in a new lookup call to userspace
128 *
129 * This is called when a dentry is about to become negative and the
130 * timeout is unknown (unlink, rmdir, rename and in some cases
131 * lookup)
132 */
dbd561d2 133void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 134{
0a0898cf 135 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
136}
137
6f9f1180
MS
138/*
139 * Same as fuse_invalidate_entry_cache(), but also try to remove the
140 * dentry from the hash
141 */
8cbdf1e6
MS
142static void fuse_invalidate_entry(struct dentry *entry)
143{
144 d_invalidate(entry);
145 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
146}
147
c180eebe
MS
148static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_req *req,
149 u64 nodeid, struct qstr *name,
e5e5558e
MS
150 struct fuse_entry_out *outarg)
151{
0e9663ee 152 memset(outarg, 0, sizeof(struct fuse_entry_out));
e5e5558e 153 req->in.h.opcode = FUSE_LOOKUP;
c180eebe 154 req->in.h.nodeid = nodeid;
e5e5558e 155 req->in.numargs = 1;
c180eebe
MS
156 req->in.args[0].size = name->len + 1;
157 req->in.args[0].value = name->name;
e5e5558e 158 req->out.numargs = 1;
0e9663ee
MS
159 if (fc->minor < 9)
160 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
161 else
162 req->out.args[0].size = sizeof(struct fuse_entry_out);
e5e5558e
MS
163 req->out.args[0].value = outarg;
164}
165
5c5c5e51 166u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
167{
168 u64 curr_version;
169
170 /*
171 * The spin lock isn't actually needed on 64bit archs, but we
172 * don't yet care too much about such optimizations.
173 */
174 spin_lock(&fc->lock);
175 curr_version = fc->attr_version;
176 spin_unlock(&fc->lock);
177
178 return curr_version;
179}
180
6f9f1180
MS
181/*
182 * Check whether the dentry is still valid
183 *
184 * If the entry validity timeout has expired and the dentry is
185 * positive, try to redo the lookup. If the lookup results in a
186 * different inode, then let the VFS invalidate the dentry and redo
187 * the lookup once more. If the lookup results in the same inode,
188 * then refresh the attributes, timeouts and mark the dentry valid.
189 */
0b728e19 190static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
e5e5558e 191{
34286d66 192 struct inode *inode;
28420dad
MS
193 struct dentry *parent;
194 struct fuse_conn *fc;
6314efee 195 struct fuse_inode *fi;
e2a6b952 196 int ret;
8cbdf1e6 197
e7c0a167 198 inode = ACCESS_ONCE(entry->d_inode);
8cbdf1e6 199 if (inode && is_bad_inode(inode))
e2a6b952 200 goto invalid;
0a0898cf 201 else if (fuse_dentry_time(entry) < get_jiffies_64()) {
e5e5558e 202 int err;
e5e5558e 203 struct fuse_entry_out outarg;
8cbdf1e6 204 struct fuse_req *req;
07e77dca 205 struct fuse_forget_link *forget;
1fb69e78 206 u64 attr_version;
8cbdf1e6 207
50322fe7 208 /* For negative dentries, always do a fresh lookup */
8cbdf1e6 209 if (!inode)
e2a6b952 210 goto invalid;
8cbdf1e6 211
e2a6b952 212 ret = -ECHILD;
0b728e19 213 if (flags & LOOKUP_RCU)
e2a6b952 214 goto out;
e7c0a167 215
8cbdf1e6 216 fc = get_fuse_conn(inode);
b111c8c0 217 req = fuse_get_req_nopages(fc);
e2a6b952 218 ret = PTR_ERR(req);
ce1d5a49 219 if (IS_ERR(req))
e2a6b952 220 goto out;
e5e5558e 221
07e77dca
MS
222 forget = fuse_alloc_forget();
223 if (!forget) {
2d51013e 224 fuse_put_request(fc, req);
e2a6b952
MS
225 ret = -ENOMEM;
226 goto out;
2d51013e
MS
227 }
228
7dca9fd3 229 attr_version = fuse_get_attr_version(fc);
1fb69e78 230
e956edd0 231 parent = dget_parent(entry);
c180eebe
MS
232 fuse_lookup_init(fc, req, get_node_id(parent->d_inode),
233 &entry->d_name, &outarg);
b93f858a 234 fuse_request_send(fc, req);
e956edd0 235 dput(parent);
e5e5558e 236 err = req->out.h.error;
2d51013e 237 fuse_put_request(fc, req);
50322fe7
MS
238 /* Zero nodeid is same as -ENOENT */
239 if (!err && !outarg.nodeid)
240 err = -ENOENT;
9e6268db 241 if (!err) {
6314efee 242 fi = get_fuse_inode(inode);
9e6268db 243 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 244 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
e2a6b952 245 goto invalid;
9e6268db 246 }
8da5ff23 247 spin_lock(&fc->lock);
1729a16c 248 fi->nlookup++;
8da5ff23 249 spin_unlock(&fc->lock);
9e6268db 250 }
07e77dca 251 kfree(forget);
9e6268db 252 if (err || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e2a6b952 253 goto invalid;
e5e5558e 254
1fb69e78
MS
255 fuse_change_attributes(inode, &outarg.attr,
256 entry_attr_timeout(&outarg),
257 attr_version);
258 fuse_change_entry_timeout(entry, &outarg);
28420dad 259 } else if (inode) {
6314efee
MS
260 fi = get_fuse_inode(inode);
261 if (flags & LOOKUP_RCU) {
262 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
263 return -ECHILD;
264 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
28420dad
MS
265 parent = dget_parent(entry);
266 fuse_advise_use_readdirplus(parent->d_inode);
267 dput(parent);
268 }
e5e5558e 269 }
e2a6b952
MS
270 ret = 1;
271out:
272 return ret;
273
274invalid:
275 ret = 0;
3c70b8ee
MS
276
277 if (!(flags & LOOKUP_RCU) && check_submounts_and_drop(entry) != 0)
46ea1562 278 ret = 1;
e2a6b952 279 goto out;
e5e5558e
MS
280}
281
8bfc016d 282static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
283{
284 return !nodeid || nodeid == FUSE_ROOT_ID;
285}
286
4269590a 287const struct dentry_operations fuse_dentry_operations = {
e5e5558e
MS
288 .d_revalidate = fuse_dentry_revalidate,
289};
290
a5bfffac 291int fuse_valid_type(int m)
39ee059a
MS
292{
293 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
294 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
295}
296
c180eebe
MS
297int fuse_lookup_name(struct super_block *sb, u64 nodeid, struct qstr *name,
298 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 299{
c180eebe 300 struct fuse_conn *fc = get_fuse_conn_super(sb);
e5e5558e 301 struct fuse_req *req;
07e77dca 302 struct fuse_forget_link *forget;
1fb69e78 303 u64 attr_version;
c180eebe 304 int err;
e5e5558e 305
c180eebe
MS
306 *inode = NULL;
307 err = -ENAMETOOLONG;
308 if (name->len > FUSE_NAME_MAX)
309 goto out;
e5e5558e 310
b111c8c0 311 req = fuse_get_req_nopages(fc);
c180eebe 312 err = PTR_ERR(req);
ce1d5a49 313 if (IS_ERR(req))
c180eebe 314 goto out;
e5e5558e 315
07e77dca
MS
316 forget = fuse_alloc_forget();
317 err = -ENOMEM;
318 if (!forget) {
2d51013e 319 fuse_put_request(fc, req);
c180eebe 320 goto out;
2d51013e
MS
321 }
322
7dca9fd3 323 attr_version = fuse_get_attr_version(fc);
1fb69e78 324
c180eebe 325 fuse_lookup_init(fc, req, nodeid, name, outarg);
b93f858a 326 fuse_request_send(fc, req);
e5e5558e 327 err = req->out.h.error;
2d51013e 328 fuse_put_request(fc, req);
50322fe7 329 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
330 if (err || !outarg->nodeid)
331 goto out_put_forget;
332
333 err = -EIO;
334 if (!outarg->nodeid)
335 goto out_put_forget;
336 if (!fuse_valid_type(outarg->attr.mode))
337 goto out_put_forget;
338
339 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
340 &outarg->attr, entry_attr_timeout(outarg),
341 attr_version);
342 err = -ENOMEM;
343 if (!*inode) {
07e77dca 344 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 345 goto out;
e5e5558e 346 }
c180eebe
MS
347 err = 0;
348
349 out_put_forget:
07e77dca 350 kfree(forget);
c180eebe
MS
351 out:
352 return err;
353}
354
355static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
00cd8dd3 356 unsigned int flags)
c180eebe
MS
357{
358 int err;
359 struct fuse_entry_out outarg;
360 struct inode *inode;
361 struct dentry *newent;
c180eebe
MS
362 bool outarg_valid = true;
363
364 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
365 &outarg, &inode);
366 if (err == -ENOENT) {
367 outarg_valid = false;
368 err = 0;
369 }
370 if (err)
371 goto out_err;
372
373 err = -EIO;
374 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
375 goto out_iput;
e5e5558e 376
b70a80e7 377 newent = d_materialise_unique(entry, inode);
5835f339
MS
378 err = PTR_ERR(newent);
379 if (IS_ERR(newent))
380 goto out_err;
d2a85164 381
0de6256d 382 entry = newent ? newent : entry;
c180eebe 383 if (outarg_valid)
1fb69e78 384 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
385 else
386 fuse_invalidate_entry_cache(entry);
c180eebe 387
4582a4ab 388 fuse_advise_use_readdirplus(dir);
0de6256d 389 return newent;
c180eebe
MS
390
391 out_iput:
392 iput(inode);
393 out_err:
394 return ERR_PTR(err);
e5e5558e
MS
395}
396
6f9f1180
MS
397/*
398 * Atomic create+open operation
399 *
400 * If the filesystem doesn't support this, then fall back to separate
401 * 'mknod' + 'open' requests.
402 */
d9585277 403static int fuse_create_open(struct inode *dir, struct dentry *entry,
30d90494 404 struct file *file, unsigned flags,
d9585277 405 umode_t mode, int *opened)
fd72faac
MS
406{
407 int err;
408 struct inode *inode;
409 struct fuse_conn *fc = get_fuse_conn(dir);
410 struct fuse_req *req;
07e77dca 411 struct fuse_forget_link *forget;
e0a43ddc 412 struct fuse_create_in inarg;
fd72faac
MS
413 struct fuse_open_out outopen;
414 struct fuse_entry_out outentry;
fd72faac 415 struct fuse_file *ff;
fd72faac 416
af109bca
MS
417 /* Userspace expects S_IFREG in create mode */
418 BUG_ON((mode & S_IFMT) != S_IFREG);
419
07e77dca 420 forget = fuse_alloc_forget();
c8ccbe03 421 err = -ENOMEM;
07e77dca 422 if (!forget)
c8ccbe03 423 goto out_err;
51eb01e7 424
b111c8c0 425 req = fuse_get_req_nopages(fc);
51eb01e7 426 err = PTR_ERR(req);
ce1d5a49 427 if (IS_ERR(req))
51eb01e7 428 goto out_put_forget_req;
fd72faac 429
ce1d5a49 430 err = -ENOMEM;
acf99433 431 ff = fuse_file_alloc(fc);
fd72faac
MS
432 if (!ff)
433 goto out_put_request;
434
e0a43ddc
MS
435 if (!fc->dont_mask)
436 mode &= ~current_umask();
437
fd72faac
MS
438 flags &= ~O_NOCTTY;
439 memset(&inarg, 0, sizeof(inarg));
0e9663ee 440 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
441 inarg.flags = flags;
442 inarg.mode = mode;
e0a43ddc 443 inarg.umask = current_umask();
fd72faac
MS
444 req->in.h.opcode = FUSE_CREATE;
445 req->in.h.nodeid = get_node_id(dir);
fd72faac 446 req->in.numargs = 2;
e0a43ddc
MS
447 req->in.args[0].size = fc->minor < 12 ? sizeof(struct fuse_open_in) :
448 sizeof(inarg);
fd72faac
MS
449 req->in.args[0].value = &inarg;
450 req->in.args[1].size = entry->d_name.len + 1;
451 req->in.args[1].value = entry->d_name.name;
452 req->out.numargs = 2;
0e9663ee
MS
453 if (fc->minor < 9)
454 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
455 else
456 req->out.args[0].size = sizeof(outentry);
fd72faac
MS
457 req->out.args[0].value = &outentry;
458 req->out.args[1].size = sizeof(outopen);
459 req->out.args[1].value = &outopen;
b93f858a 460 fuse_request_send(fc, req);
fd72faac 461 err = req->out.h.error;
c8ccbe03 462 if (err)
fd72faac 463 goto out_free_ff;
fd72faac
MS
464
465 err = -EIO;
2827d0b2 466 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
467 goto out_free_ff;
468
51eb01e7 469 fuse_put_request(fc, req);
c7b7143c
MS
470 ff->fh = outopen.fh;
471 ff->nodeid = outentry.nodeid;
472 ff->open_flags = outopen.open_flags;
fd72faac 473 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 474 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
475 if (!inode) {
476 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 477 fuse_sync_release(ff, flags);
07e77dca 478 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
479 err = -ENOMEM;
480 goto out_err;
fd72faac 481 }
07e77dca 482 kfree(forget);
fd72faac 483 d_instantiate(entry, inode);
1fb69e78 484 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 485 fuse_invalidate_attr(dir);
30d90494
AV
486 err = finish_open(file, entry, generic_file_open, opened);
487 if (err) {
8b0797a4 488 fuse_sync_release(ff, flags);
c8ccbe03
MS
489 } else {
490 file->private_data = fuse_file_get(ff);
491 fuse_finish_open(inode, file);
fd72faac 492 }
d9585277 493 return err;
fd72faac 494
c8ccbe03 495out_free_ff:
fd72faac 496 fuse_file_free(ff);
c8ccbe03 497out_put_request:
fd72faac 498 fuse_put_request(fc, req);
c8ccbe03 499out_put_forget_req:
07e77dca 500 kfree(forget);
c8ccbe03 501out_err:
d9585277 502 return err;
c8ccbe03
MS
503}
504
505static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
d9585277 506static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
30d90494 507 struct file *file, unsigned flags,
d9585277 508 umode_t mode, int *opened)
c8ccbe03
MS
509{
510 int err;
511 struct fuse_conn *fc = get_fuse_conn(dir);
c8ccbe03
MS
512 struct dentry *res = NULL;
513
514 if (d_unhashed(entry)) {
00cd8dd3 515 res = fuse_lookup(dir, entry, 0);
c8ccbe03 516 if (IS_ERR(res))
d9585277 517 return PTR_ERR(res);
c8ccbe03
MS
518
519 if (res)
520 entry = res;
521 }
522
523 if (!(flags & O_CREAT) || entry->d_inode)
524 goto no_open;
525
526 /* Only creates */
47237687 527 *opened |= FILE_CREATED;
c8ccbe03
MS
528
529 if (fc->no_create)
530 goto mknod;
531
30d90494 532 err = fuse_create_open(dir, entry, file, flags, mode, opened);
d9585277 533 if (err == -ENOSYS) {
c8ccbe03
MS
534 fc->no_create = 1;
535 goto mknod;
536 }
537out_dput:
538 dput(res);
d9585277 539 return err;
c8ccbe03
MS
540
541mknod:
542 err = fuse_mknod(dir, entry, mode, 0);
d9585277 543 if (err)
c8ccbe03 544 goto out_dput;
c8ccbe03 545no_open:
e45198a6 546 return finish_no_open(file, res);
fd72faac
MS
547}
548
6f9f1180
MS
549/*
550 * Code shared between mknod, mkdir, symlink and link
551 */
9e6268db
MS
552static int create_new_entry(struct fuse_conn *fc, struct fuse_req *req,
553 struct inode *dir, struct dentry *entry,
541af6a0 554 umode_t mode)
9e6268db
MS
555{
556 struct fuse_entry_out outarg;
557 struct inode *inode;
9e6268db 558 int err;
07e77dca 559 struct fuse_forget_link *forget;
2d51013e 560
07e77dca
MS
561 forget = fuse_alloc_forget();
562 if (!forget) {
2d51013e 563 fuse_put_request(fc, req);
07e77dca 564 return -ENOMEM;
2d51013e 565 }
9e6268db 566
0e9663ee 567 memset(&outarg, 0, sizeof(outarg));
9e6268db 568 req->in.h.nodeid = get_node_id(dir);
9e6268db 569 req->out.numargs = 1;
0e9663ee
MS
570 if (fc->minor < 9)
571 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
572 else
573 req->out.args[0].size = sizeof(outarg);
9e6268db 574 req->out.args[0].value = &outarg;
b93f858a 575 fuse_request_send(fc, req);
9e6268db 576 err = req->out.h.error;
2d51013e
MS
577 fuse_put_request(fc, req);
578 if (err)
579 goto out_put_forget_req;
580
39ee059a
MS
581 err = -EIO;
582 if (invalid_nodeid(outarg.nodeid))
2d51013e 583 goto out_put_forget_req;
39ee059a
MS
584
585 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 586 goto out_put_forget_req;
39ee059a 587
9e6268db 588 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 589 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 590 if (!inode) {
07e77dca 591 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
592 return -ENOMEM;
593 }
07e77dca 594 kfree(forget);
9e6268db 595
b70a80e7
MS
596 err = d_instantiate_no_diralias(entry, inode);
597 if (err)
598 return err;
9e6268db 599
1fb69e78 600 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
601 fuse_invalidate_attr(dir);
602 return 0;
39ee059a 603
2d51013e 604 out_put_forget_req:
07e77dca 605 kfree(forget);
39ee059a 606 return err;
9e6268db
MS
607}
608
1a67aafb 609static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
610 dev_t rdev)
611{
612 struct fuse_mknod_in inarg;
613 struct fuse_conn *fc = get_fuse_conn(dir);
b111c8c0 614 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
615 if (IS_ERR(req))
616 return PTR_ERR(req);
9e6268db 617
e0a43ddc
MS
618 if (!fc->dont_mask)
619 mode &= ~current_umask();
620
9e6268db
MS
621 memset(&inarg, 0, sizeof(inarg));
622 inarg.mode = mode;
623 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 624 inarg.umask = current_umask();
9e6268db
MS
625 req->in.h.opcode = FUSE_MKNOD;
626 req->in.numargs = 2;
e0a43ddc
MS
627 req->in.args[0].size = fc->minor < 12 ? FUSE_COMPAT_MKNOD_IN_SIZE :
628 sizeof(inarg);
9e6268db
MS
629 req->in.args[0].value = &inarg;
630 req->in.args[1].size = entry->d_name.len + 1;
631 req->in.args[1].value = entry->d_name.name;
632 return create_new_entry(fc, req, dir, entry, mode);
633}
634
4acdaf27 635static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
ebfc3b49 636 bool excl)
9e6268db
MS
637{
638 return fuse_mknod(dir, entry, mode, 0);
639}
640
18bb1db3 641static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
642{
643 struct fuse_mkdir_in inarg;
644 struct fuse_conn *fc = get_fuse_conn(dir);
b111c8c0 645 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
646 if (IS_ERR(req))
647 return PTR_ERR(req);
9e6268db 648
e0a43ddc
MS
649 if (!fc->dont_mask)
650 mode &= ~current_umask();
651
9e6268db
MS
652 memset(&inarg, 0, sizeof(inarg));
653 inarg.mode = mode;
e0a43ddc 654 inarg.umask = current_umask();
9e6268db
MS
655 req->in.h.opcode = FUSE_MKDIR;
656 req->in.numargs = 2;
657 req->in.args[0].size = sizeof(inarg);
658 req->in.args[0].value = &inarg;
659 req->in.args[1].size = entry->d_name.len + 1;
660 req->in.args[1].value = entry->d_name.name;
661 return create_new_entry(fc, req, dir, entry, S_IFDIR);
662}
663
664static int fuse_symlink(struct inode *dir, struct dentry *entry,
665 const char *link)
666{
667 struct fuse_conn *fc = get_fuse_conn(dir);
668 unsigned len = strlen(link) + 1;
b111c8c0 669 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
670 if (IS_ERR(req))
671 return PTR_ERR(req);
9e6268db
MS
672
673 req->in.h.opcode = FUSE_SYMLINK;
674 req->in.numargs = 2;
675 req->in.args[0].size = entry->d_name.len + 1;
676 req->in.args[0].value = entry->d_name.name;
677 req->in.args[1].size = len;
678 req->in.args[1].value = link;
679 return create_new_entry(fc, req, dir, entry, S_IFLNK);
680}
681
682static int fuse_unlink(struct inode *dir, struct dentry *entry)
683{
684 int err;
685 struct fuse_conn *fc = get_fuse_conn(dir);
b111c8c0 686 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
687 if (IS_ERR(req))
688 return PTR_ERR(req);
9e6268db
MS
689
690 req->in.h.opcode = FUSE_UNLINK;
691 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
692 req->in.numargs = 1;
693 req->in.args[0].size = entry->d_name.len + 1;
694 req->in.args[0].value = entry->d_name.name;
b93f858a 695 fuse_request_send(fc, req);
9e6268db
MS
696 err = req->out.h.error;
697 fuse_put_request(fc, req);
698 if (!err) {
699 struct inode *inode = entry->d_inode;
ac45d613 700 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 701
ac45d613
MS
702 spin_lock(&fc->lock);
703 fi->attr_version = ++fc->attr_version;
dfca7ceb
MS
704 /*
705 * If i_nlink == 0 then unlink doesn't make sense, yet this can
706 * happen if userspace filesystem is careless. It would be
707 * difficult to enforce correct nlink usage so just ignore this
708 * condition here
709 */
710 if (inode->i_nlink > 0)
711 drop_nlink(inode);
ac45d613 712 spin_unlock(&fc->lock);
9e6268db
MS
713 fuse_invalidate_attr(inode);
714 fuse_invalidate_attr(dir);
8cbdf1e6 715 fuse_invalidate_entry_cache(entry);
9e6268db
MS
716 } else if (err == -EINTR)
717 fuse_invalidate_entry(entry);
718 return err;
719}
720
721static int fuse_rmdir(struct inode *dir, struct dentry *entry)
722{
723 int err;
724 struct fuse_conn *fc = get_fuse_conn(dir);
b111c8c0 725 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
726 if (IS_ERR(req))
727 return PTR_ERR(req);
9e6268db
MS
728
729 req->in.h.opcode = FUSE_RMDIR;
730 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
731 req->in.numargs = 1;
732 req->in.args[0].size = entry->d_name.len + 1;
733 req->in.args[0].value = entry->d_name.name;
b93f858a 734 fuse_request_send(fc, req);
9e6268db
MS
735 err = req->out.h.error;
736 fuse_put_request(fc, req);
737 if (!err) {
ce71ec36 738 clear_nlink(entry->d_inode);
9e6268db 739 fuse_invalidate_attr(dir);
8cbdf1e6 740 fuse_invalidate_entry_cache(entry);
9e6268db
MS
741 } else if (err == -EINTR)
742 fuse_invalidate_entry(entry);
743 return err;
744}
745
746static int fuse_rename(struct inode *olddir, struct dentry *oldent,
747 struct inode *newdir, struct dentry *newent)
748{
749 int err;
750 struct fuse_rename_in inarg;
751 struct fuse_conn *fc = get_fuse_conn(olddir);
b111c8c0 752 struct fuse_req *req = fuse_get_req_nopages(fc);
e4eaac06 753
ce1d5a49
MS
754 if (IS_ERR(req))
755 return PTR_ERR(req);
9e6268db
MS
756
757 memset(&inarg, 0, sizeof(inarg));
758 inarg.newdir = get_node_id(newdir);
759 req->in.h.opcode = FUSE_RENAME;
760 req->in.h.nodeid = get_node_id(olddir);
9e6268db
MS
761 req->in.numargs = 3;
762 req->in.args[0].size = sizeof(inarg);
763 req->in.args[0].value = &inarg;
764 req->in.args[1].size = oldent->d_name.len + 1;
765 req->in.args[1].value = oldent->d_name.name;
766 req->in.args[2].size = newent->d_name.len + 1;
767 req->in.args[2].value = newent->d_name.name;
b93f858a 768 fuse_request_send(fc, req);
9e6268db
MS
769 err = req->out.h.error;
770 fuse_put_request(fc, req);
771 if (!err) {
08b63307
MS
772 /* ctime changes */
773 fuse_invalidate_attr(oldent->d_inode);
774
9e6268db
MS
775 fuse_invalidate_attr(olddir);
776 if (olddir != newdir)
777 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
778
779 /* newent will end up negative */
5219f346
MS
780 if (newent->d_inode) {
781 fuse_invalidate_attr(newent->d_inode);
8cbdf1e6 782 fuse_invalidate_entry_cache(newent);
5219f346 783 }
9e6268db
MS
784 } else if (err == -EINTR) {
785 /* If request was interrupted, DEITY only knows if the
786 rename actually took place. If the invalidation
787 fails (e.g. some process has CWD under the renamed
788 directory), then there can be inconsistency between
789 the dcache and the real filesystem. Tough luck. */
790 fuse_invalidate_entry(oldent);
791 if (newent->d_inode)
792 fuse_invalidate_entry(newent);
793 }
794
795 return err;
796}
797
798static int fuse_link(struct dentry *entry, struct inode *newdir,
799 struct dentry *newent)
800{
801 int err;
802 struct fuse_link_in inarg;
803 struct inode *inode = entry->d_inode;
804 struct fuse_conn *fc = get_fuse_conn(inode);
b111c8c0 805 struct fuse_req *req = fuse_get_req_nopages(fc);
ce1d5a49
MS
806 if (IS_ERR(req))
807 return PTR_ERR(req);
9e6268db
MS
808
809 memset(&inarg, 0, sizeof(inarg));
810 inarg.oldnodeid = get_node_id(inode);
811 req->in.h.opcode = FUSE_LINK;
9e6268db
MS
812 req->in.numargs = 2;
813 req->in.args[0].size = sizeof(inarg);
814 req->in.args[0].value = &inarg;
815 req->in.args[1].size = newent->d_name.len + 1;
816 req->in.args[1].value = newent->d_name.name;
817 err = create_new_entry(fc, req, newdir, newent, inode->i_mode);
818 /* Contrary to "normal" filesystems it can happen that link
819 makes two "logical" inodes point to the same "physical"
820 inode. We invalidate the attributes of the old one, so it
821 will reflect changes in the backing inode (link count,
822 etc.)
823 */
ac45d613
MS
824 if (!err) {
825 struct fuse_inode *fi = get_fuse_inode(inode);
826
827 spin_lock(&fc->lock);
828 fi->attr_version = ++fc->attr_version;
829 inc_nlink(inode);
830 spin_unlock(&fc->lock);
9e6268db 831 fuse_invalidate_attr(inode);
ac45d613
MS
832 } else if (err == -EINTR) {
833 fuse_invalidate_attr(inode);
834 }
9e6268db
MS
835 return err;
836}
837
1fb69e78
MS
838static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
839 struct kstat *stat)
840{
203627bb
MS
841 unsigned int blkbits;
842
1fb69e78
MS
843 stat->dev = inode->i_sb->s_dev;
844 stat->ino = attr->ino;
845 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
846 stat->nlink = attr->nlink;
499dcf20
EB
847 stat->uid = make_kuid(&init_user_ns, attr->uid);
848 stat->gid = make_kgid(&init_user_ns, attr->gid);
1fb69e78
MS
849 stat->rdev = inode->i_rdev;
850 stat->atime.tv_sec = attr->atime;
851 stat->atime.tv_nsec = attr->atimensec;
852 stat->mtime.tv_sec = attr->mtime;
853 stat->mtime.tv_nsec = attr->mtimensec;
854 stat->ctime.tv_sec = attr->ctime;
855 stat->ctime.tv_nsec = attr->ctimensec;
856 stat->size = attr->size;
857 stat->blocks = attr->blocks;
203627bb
MS
858
859 if (attr->blksize != 0)
860 blkbits = ilog2(attr->blksize);
861 else
862 blkbits = inode->i_sb->s_blocksize_bits;
863
864 stat->blksize = 1 << blkbits;
1fb69e78
MS
865}
866
c79e322f
MS
867static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
868 struct file *file)
e5e5558e
MS
869{
870 int err;
c79e322f
MS
871 struct fuse_getattr_in inarg;
872 struct fuse_attr_out outarg;
e5e5558e 873 struct fuse_conn *fc = get_fuse_conn(inode);
1fb69e78
MS
874 struct fuse_req *req;
875 u64 attr_version;
876
b111c8c0 877 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
878 if (IS_ERR(req))
879 return PTR_ERR(req);
e5e5558e 880
7dca9fd3 881 attr_version = fuse_get_attr_version(fc);
1fb69e78 882
c79e322f 883 memset(&inarg, 0, sizeof(inarg));
0e9663ee 884 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
885 /* Directories have separate file-handle space */
886 if (file && S_ISREG(inode->i_mode)) {
887 struct fuse_file *ff = file->private_data;
888
889 inarg.getattr_flags |= FUSE_GETATTR_FH;
890 inarg.fh = ff->fh;
891 }
e5e5558e
MS
892 req->in.h.opcode = FUSE_GETATTR;
893 req->in.h.nodeid = get_node_id(inode);
c79e322f
MS
894 req->in.numargs = 1;
895 req->in.args[0].size = sizeof(inarg);
896 req->in.args[0].value = &inarg;
e5e5558e 897 req->out.numargs = 1;
0e9663ee
MS
898 if (fc->minor < 9)
899 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
900 else
901 req->out.args[0].size = sizeof(outarg);
c79e322f 902 req->out.args[0].value = &outarg;
b93f858a 903 fuse_request_send(fc, req);
e5e5558e
MS
904 err = req->out.h.error;
905 fuse_put_request(fc, req);
906 if (!err) {
c79e322f 907 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
908 make_bad_inode(inode);
909 err = -EIO;
910 } else {
c79e322f
MS
911 fuse_change_attributes(inode, &outarg.attr,
912 attr_timeout(&outarg),
1fb69e78
MS
913 attr_version);
914 if (stat)
c79e322f 915 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
916 }
917 }
918 return err;
919}
920
bcb4be80
MS
921int fuse_update_attributes(struct inode *inode, struct kstat *stat,
922 struct file *file, bool *refreshed)
923{
924 struct fuse_inode *fi = get_fuse_inode(inode);
925 int err;
926 bool r;
927
928 if (fi->i_time < get_jiffies_64()) {
929 r = true;
930 err = fuse_do_getattr(inode, stat, file);
931 } else {
932 r = false;
933 err = 0;
934 if (stat) {
935 generic_fillattr(inode, stat);
936 stat->mode = fi->orig_i_mode;
45c72cd7 937 stat->ino = fi->orig_ino;
bcb4be80
MS
938 }
939 }
940
941 if (refreshed != NULL)
942 *refreshed = r;
943
944 return err;
945}
946
3b463ae0 947int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 948 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
949{
950 int err = -ENOTDIR;
951 struct inode *parent;
952 struct dentry *dir;
953 struct dentry *entry;
954
955 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
956 if (!parent)
957 return -ENOENT;
958
959 mutex_lock(&parent->i_mutex);
960 if (!S_ISDIR(parent->i_mode))
961 goto unlock;
962
963 err = -ENOENT;
964 dir = d_find_alias(parent);
965 if (!dir)
966 goto unlock;
967
968 entry = d_lookup(dir, name);
969 dput(dir);
970 if (!entry)
971 goto unlock;
972
973 fuse_invalidate_attr(parent);
974 fuse_invalidate_entry(entry);
451d0f59
JM
975
976 if (child_nodeid != 0 && entry->d_inode) {
977 mutex_lock(&entry->d_inode->i_mutex);
978 if (get_node_id(entry->d_inode) != child_nodeid) {
979 err = -ENOENT;
980 goto badentry;
981 }
982 if (d_mountpoint(entry)) {
983 err = -EBUSY;
984 goto badentry;
985 }
986 if (S_ISDIR(entry->d_inode->i_mode)) {
987 shrink_dcache_parent(entry);
988 if (!simple_empty(entry)) {
989 err = -ENOTEMPTY;
990 goto badentry;
991 }
992 entry->d_inode->i_flags |= S_DEAD;
993 }
994 dont_mount(entry);
995 clear_nlink(entry->d_inode);
996 err = 0;
997 badentry:
998 mutex_unlock(&entry->d_inode->i_mutex);
999 if (!err)
1000 d_delete(entry);
1001 } else {
1002 err = 0;
1003 }
3b463ae0 1004 dput(entry);
3b463ae0
JM
1005
1006 unlock:
1007 mutex_unlock(&parent->i_mutex);
1008 iput(parent);
1009 return err;
1010}
1011
87729a55
MS
1012/*
1013 * Calling into a user-controlled filesystem gives the filesystem
c2132c1b 1014 * daemon ptrace-like capabilities over the current process. This
87729a55
MS
1015 * means, that the filesystem daemon is able to record the exact
1016 * filesystem operations performed, and can also control the behavior
1017 * of the requester process in otherwise impossible ways. For example
1018 * it can delay the operation for arbitrary length of time allowing
1019 * DoS against the requester.
1020 *
1021 * For this reason only those processes can call into the filesystem,
1022 * for which the owner of the mount has ptrace privilege. This
1023 * excludes processes started by other users, suid or sgid processes.
1024 */
c2132c1b 1025int fuse_allow_current_process(struct fuse_conn *fc)
87729a55 1026{
c69e8d9c 1027 const struct cred *cred;
87729a55 1028
c69e8d9c 1029 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
1030 return 1;
1031
c2132c1b 1032 cred = current_cred();
499dcf20
EB
1033 if (uid_eq(cred->euid, fc->user_id) &&
1034 uid_eq(cred->suid, fc->user_id) &&
1035 uid_eq(cred->uid, fc->user_id) &&
1036 gid_eq(cred->egid, fc->group_id) &&
1037 gid_eq(cred->sgid, fc->group_id) &&
1038 gid_eq(cred->gid, fc->group_id))
c2132c1b 1039 return 1;
c69e8d9c 1040
c2132c1b 1041 return 0;
87729a55
MS
1042}
1043
31d40d74
MS
1044static int fuse_access(struct inode *inode, int mask)
1045{
1046 struct fuse_conn *fc = get_fuse_conn(inode);
1047 struct fuse_req *req;
1048 struct fuse_access_in inarg;
1049 int err;
1050
698fa1d1
MS
1051 BUG_ON(mask & MAY_NOT_BLOCK);
1052
31d40d74
MS
1053 if (fc->no_access)
1054 return 0;
1055
b111c8c0 1056 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1057 if (IS_ERR(req))
1058 return PTR_ERR(req);
31d40d74
MS
1059
1060 memset(&inarg, 0, sizeof(inarg));
e6305c43 1061 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
31d40d74
MS
1062 req->in.h.opcode = FUSE_ACCESS;
1063 req->in.h.nodeid = get_node_id(inode);
31d40d74
MS
1064 req->in.numargs = 1;
1065 req->in.args[0].size = sizeof(inarg);
1066 req->in.args[0].value = &inarg;
b93f858a 1067 fuse_request_send(fc, req);
31d40d74
MS
1068 err = req->out.h.error;
1069 fuse_put_request(fc, req);
1070 if (err == -ENOSYS) {
1071 fc->no_access = 1;
1072 err = 0;
1073 }
1074 return err;
1075}
1076
10556cb2 1077static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1078{
10556cb2 1079 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1080 return -ECHILD;
1081
1082 return fuse_do_getattr(inode, NULL, NULL);
1083}
1084
6f9f1180
MS
1085/*
1086 * Check permission. The two basic access models of FUSE are:
1087 *
1088 * 1) Local access checking ('default_permissions' mount option) based
1089 * on file mode. This is the plain old disk filesystem permission
1090 * modell.
1091 *
1092 * 2) "Remote" access checking, where server is responsible for
1093 * checking permission in each inode operation. An exception to this
1094 * is if ->permission() was invoked from sys_access() in which case an
1095 * access request is sent. Execute permission is still checked
1096 * locally based on file mode.
1097 */
10556cb2 1098static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1099{
1100 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1101 bool refreshed = false;
1102 int err = 0;
e5e5558e 1103
c2132c1b 1104 if (!fuse_allow_current_process(fc))
e5e5558e 1105 return -EACCES;
244f6385
MS
1106
1107 /*
e8e96157 1108 * If attributes are needed, refresh them before proceeding
244f6385 1109 */
e8e96157
MS
1110 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1111 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1112 struct fuse_inode *fi = get_fuse_inode(inode);
1113
1114 if (fi->i_time < get_jiffies_64()) {
1115 refreshed = true;
1116
10556cb2 1117 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1118 if (err)
1119 return err;
1120 }
244f6385
MS
1121 }
1122
1123 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
2830ba7f 1124 err = generic_permission(inode, mask);
1e9a4ed9
MS
1125
1126 /* If permission is denied, try to refresh file
1127 attributes. This is also needed, because the root
1128 node will at first have no permissions */
244f6385 1129 if (err == -EACCES && !refreshed) {
10556cb2 1130 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1131 if (!err)
2830ba7f 1132 err = generic_permission(inode, mask);
1e9a4ed9
MS
1133 }
1134
6f9f1180
MS
1135 /* Note: the opposite of the above test does not
1136 exist. So if permissions are revoked this won't be
1137 noticed immediately, only after the attribute
1138 timeout has expired */
9cfcac81 1139 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1140 err = fuse_access(inode, mask);
1141 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1142 if (!(inode->i_mode & S_IXUGO)) {
1143 if (refreshed)
1144 return -EACCES;
1145
10556cb2 1146 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1147 if (!err && !(inode->i_mode & S_IXUGO))
1148 return -EACCES;
1149 }
e5e5558e 1150 }
244f6385 1151 return err;
e5e5558e
MS
1152}
1153
1154static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1155 struct dir_context *ctx)
e5e5558e
MS
1156{
1157 while (nbytes >= FUSE_NAME_OFFSET) {
1158 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1159 size_t reclen = FUSE_DIRENT_SIZE(dirent);
e5e5558e
MS
1160 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1161 return -EIO;
1162 if (reclen > nbytes)
1163 break;
efeb9e60
MS
1164 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1165 return -EIO;
e5e5558e 1166
8d3af7f3
AV
1167 if (!dir_emit(ctx, dirent->name, dirent->namelen,
1168 dirent->ino, dirent->type))
e5e5558e
MS
1169 break;
1170
1171 buf += reclen;
1172 nbytes -= reclen;
8d3af7f3 1173 ctx->pos = dirent->off;
e5e5558e
MS
1174 }
1175
1176 return 0;
1177}
1178
0b05b183
AA
1179static int fuse_direntplus_link(struct file *file,
1180 struct fuse_direntplus *direntplus,
1181 u64 attr_version)
1182{
1183 int err;
1184 struct fuse_entry_out *o = &direntplus->entry_out;
1185 struct fuse_dirent *dirent = &direntplus->dirent;
1186 struct dentry *parent = file->f_path.dentry;
1187 struct qstr name = QSTR_INIT(dirent->name, dirent->namelen);
1188 struct dentry *dentry;
1189 struct dentry *alias;
1190 struct inode *dir = parent->d_inode;
1191 struct fuse_conn *fc;
1192 struct inode *inode;
1193
1194 if (!o->nodeid) {
1195 /*
1196 * Unlike in the case of fuse_lookup, zero nodeid does not mean
1197 * ENOENT. Instead, it only means the userspace filesystem did
1198 * not want to return attributes/handle for this entry.
1199 *
1200 * So do nothing.
1201 */
1202 return 0;
1203 }
1204
1205 if (name.name[0] == '.') {
1206 /*
1207 * We could potentially refresh the attributes of the directory
1208 * and its parent?
1209 */
1210 if (name.len == 1)
1211 return 0;
1212 if (name.name[1] == '.' && name.len == 2)
1213 return 0;
1214 }
a28ef45c
MS
1215
1216 if (invalid_nodeid(o->nodeid))
1217 return -EIO;
1218 if (!fuse_valid_type(o->attr.mode))
1219 return -EIO;
1220
0b05b183
AA
1221 fc = get_fuse_conn(dir);
1222
1223 name.hash = full_name_hash(name.name, name.len);
1224 dentry = d_lookup(parent, &name);
53ce9a33 1225 if (dentry) {
0b05b183 1226 inode = dentry->d_inode;
53ce9a33
NV
1227 if (!inode) {
1228 d_drop(dentry);
a28ef45c
MS
1229 } else if (get_node_id(inode) != o->nodeid ||
1230 ((o->attr.mode ^ inode->i_mode) & S_IFMT)) {
53ce9a33
NV
1231 err = d_invalidate(dentry);
1232 if (err)
1233 goto out;
a28ef45c
MS
1234 } else if (is_bad_inode(inode)) {
1235 err = -EIO;
1236 goto out;
53ce9a33 1237 } else {
0b05b183
AA
1238 struct fuse_inode *fi;
1239 fi = get_fuse_inode(inode);
1240 spin_lock(&fc->lock);
1241 fi->nlookup++;
1242 spin_unlock(&fc->lock);
1243
fa2b7213
MS
1244 fuse_change_attributes(inode, &o->attr,
1245 entry_attr_timeout(o),
1246 attr_version);
1247
0b05b183
AA
1248 /*
1249 * The other branch to 'found' comes via fuse_iget()
1250 * which bumps nlookup inside
1251 */
1252 goto found;
1253 }
0b05b183 1254 dput(dentry);
0b05b183
AA
1255 }
1256
1257 dentry = d_alloc(parent, &name);
1258 err = -ENOMEM;
1259 if (!dentry)
1260 goto out;
1261
1262 inode = fuse_iget(dir->i_sb, o->nodeid, o->generation,
1263 &o->attr, entry_attr_timeout(o), attr_version);
1264 if (!inode)
1265 goto out;
1266
b70a80e7 1267 alias = d_materialise_unique(dentry, inode);
5835f339
MS
1268 err = PTR_ERR(alias);
1269 if (IS_ERR(alias))
1270 goto out;
2914941e 1271
0b05b183
AA
1272 if (alias) {
1273 dput(dentry);
1274 dentry = alias;
1275 }
1276
1277found:
6314efee
MS
1278 if (fc->readdirplus_auto)
1279 set_bit(FUSE_I_INIT_RDPLUS, &get_fuse_inode(inode)->state);
0b05b183
AA
1280 fuse_change_entry_timeout(dentry, o);
1281
1282 err = 0;
1283out:
c7263bcd 1284 dput(dentry);
0b05b183
AA
1285 return err;
1286}
1287
1288static int parse_dirplusfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1289 struct dir_context *ctx, u64 attr_version)
0b05b183
AA
1290{
1291 struct fuse_direntplus *direntplus;
1292 struct fuse_dirent *dirent;
1293 size_t reclen;
1294 int over = 0;
1295 int ret;
1296
1297 while (nbytes >= FUSE_NAME_OFFSET_DIRENTPLUS) {
1298 direntplus = (struct fuse_direntplus *) buf;
1299 dirent = &direntplus->dirent;
1300 reclen = FUSE_DIRENTPLUS_SIZE(direntplus);
1301
1302 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1303 return -EIO;
1304 if (reclen > nbytes)
1305 break;
efeb9e60
MS
1306 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1307 return -EIO;
0b05b183
AA
1308
1309 if (!over) {
1310 /* We fill entries into dstbuf only as much as
1311 it can hold. But we still continue iterating
1312 over remaining entries to link them. If not,
1313 we need to send a FORGET for each of those
1314 which we did not link.
1315 */
8d3af7f3
AV
1316 over = !dir_emit(ctx, dirent->name, dirent->namelen,
1317 dirent->ino, dirent->type);
1318 ctx->pos = dirent->off;
0b05b183
AA
1319 }
1320
1321 buf += reclen;
1322 nbytes -= reclen;
1323
1324 ret = fuse_direntplus_link(file, direntplus, attr_version);
1325 if (ret)
1326 fuse_force_forget(file, direntplus->entry_out.nodeid);
1327 }
1328
1329 return 0;
1330}
1331
8d3af7f3 1332static int fuse_readdir(struct file *file, struct dir_context *ctx)
e5e5558e 1333{
4582a4ab 1334 int plus, err;
04730fef
MS
1335 size_t nbytes;
1336 struct page *page;
496ad9aa 1337 struct inode *inode = file_inode(file);
e5e5558e 1338 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8 1339 struct fuse_req *req;
0b05b183 1340 u64 attr_version = 0;
248d86e8
MS
1341
1342 if (is_bad_inode(inode))
1343 return -EIO;
1344
b111c8c0 1345 req = fuse_get_req(fc, 1);
ce1d5a49
MS
1346 if (IS_ERR(req))
1347 return PTR_ERR(req);
e5e5558e 1348
04730fef
MS
1349 page = alloc_page(GFP_KERNEL);
1350 if (!page) {
1351 fuse_put_request(fc, req);
1352 return -ENOMEM;
1353 }
4582a4ab 1354
8d3af7f3 1355 plus = fuse_use_readdirplus(inode, ctx);
f4975c67 1356 req->out.argpages = 1;
04730fef
MS
1357 req->num_pages = 1;
1358 req->pages[0] = page;
85f40aec 1359 req->page_descs[0].length = PAGE_SIZE;
4582a4ab 1360 if (plus) {
0b05b183 1361 attr_version = fuse_get_attr_version(fc);
8d3af7f3 1362 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1363 FUSE_READDIRPLUS);
1364 } else {
8d3af7f3 1365 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1366 FUSE_READDIR);
1367 }
b93f858a 1368 fuse_request_send(fc, req);
361b1eb5 1369 nbytes = req->out.args[0].size;
e5e5558e
MS
1370 err = req->out.h.error;
1371 fuse_put_request(fc, req);
0b05b183 1372 if (!err) {
4582a4ab 1373 if (plus) {
0b05b183 1374 err = parse_dirplusfile(page_address(page), nbytes,
8d3af7f3 1375 file, ctx,
0b05b183
AA
1376 attr_version);
1377 } else {
1378 err = parse_dirfile(page_address(page), nbytes, file,
8d3af7f3 1379 ctx);
0b05b183
AA
1380 }
1381 }
e5e5558e 1382
04730fef 1383 __free_page(page);
451418fc 1384 fuse_invalidate_atime(inode);
04730fef 1385 return err;
e5e5558e
MS
1386}
1387
1388static char *read_link(struct dentry *dentry)
1389{
1390 struct inode *inode = dentry->d_inode;
1391 struct fuse_conn *fc = get_fuse_conn(inode);
b111c8c0 1392 struct fuse_req *req = fuse_get_req_nopages(fc);
e5e5558e
MS
1393 char *link;
1394
ce1d5a49 1395 if (IS_ERR(req))
e231c2ee 1396 return ERR_CAST(req);
e5e5558e
MS
1397
1398 link = (char *) __get_free_page(GFP_KERNEL);
1399 if (!link) {
1400 link = ERR_PTR(-ENOMEM);
1401 goto out;
1402 }
1403 req->in.h.opcode = FUSE_READLINK;
1404 req->in.h.nodeid = get_node_id(inode);
e5e5558e
MS
1405 req->out.argvar = 1;
1406 req->out.numargs = 1;
1407 req->out.args[0].size = PAGE_SIZE - 1;
1408 req->out.args[0].value = link;
b93f858a 1409 fuse_request_send(fc, req);
e5e5558e
MS
1410 if (req->out.h.error) {
1411 free_page((unsigned long) link);
1412 link = ERR_PTR(req->out.h.error);
1413 } else
1414 link[req->out.args[0].size] = '\0';
1415 out:
1416 fuse_put_request(fc, req);
451418fc 1417 fuse_invalidate_atime(inode);
e5e5558e
MS
1418 return link;
1419}
1420
1421static void free_link(char *link)
1422{
1423 if (!IS_ERR(link))
1424 free_page((unsigned long) link);
1425}
1426
1427static void *fuse_follow_link(struct dentry *dentry, struct nameidata *nd)
1428{
1429 nd_set_link(nd, read_link(dentry));
1430 return NULL;
1431}
1432
1433static void fuse_put_link(struct dentry *dentry, struct nameidata *nd, void *c)
1434{
1435 free_link(nd_get_link(nd));
1436}
1437
1438static int fuse_dir_open(struct inode *inode, struct file *file)
1439{
91fe96b4 1440 return fuse_open_common(inode, file, true);
e5e5558e
MS
1441}
1442
1443static int fuse_dir_release(struct inode *inode, struct file *file)
1444{
8b0797a4
MS
1445 fuse_release_common(file, FUSE_RELEASEDIR);
1446
1447 return 0;
e5e5558e
MS
1448}
1449
02c24a82
JB
1450static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1451 int datasync)
82547981 1452{
02c24a82 1453 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1454}
1455
b18da0c5
MS
1456static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1457 unsigned long arg)
1458{
1459 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1460
1461 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1462 if (fc->minor < 18)
1463 return -ENOTTY;
1464
1465 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1466}
1467
1468static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1469 unsigned long arg)
1470{
1471 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1472
1473 if (fc->minor < 18)
1474 return -ENOTTY;
1475
1476 return fuse_ioctl_common(file, cmd, arg,
1477 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1478}
1479
17637cba
MS
1480static bool update_mtime(unsigned ivalid)
1481{
1482 /* Always update if mtime is explicitly set */
1483 if (ivalid & ATTR_MTIME_SET)
1484 return true;
1485
1486 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1487 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1488 return false;
1489
1490 /* In all other cases update */
1491 return true;
1492}
1493
befc649c 1494static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg)
9e6268db
MS
1495{
1496 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1497
1498 if (ivalid & ATTR_MODE)
befc649c 1499 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1500 if (ivalid & ATTR_UID)
499dcf20 1501 arg->valid |= FATTR_UID, arg->uid = from_kuid(&init_user_ns, iattr->ia_uid);
9e6268db 1502 if (ivalid & ATTR_GID)
499dcf20 1503 arg->valid |= FATTR_GID, arg->gid = from_kgid(&init_user_ns, iattr->ia_gid);
9e6268db 1504 if (ivalid & ATTR_SIZE)
befc649c 1505 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1506 if (ivalid & ATTR_ATIME) {
1507 arg->valid |= FATTR_ATIME;
befc649c 1508 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1509 arg->atimensec = iattr->ia_atime.tv_nsec;
1510 if (!(ivalid & ATTR_ATIME_SET))
1511 arg->valid |= FATTR_ATIME_NOW;
1512 }
1513 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid)) {
1514 arg->valid |= FATTR_MTIME;
befc649c 1515 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba
MS
1516 arg->mtimensec = iattr->ia_mtime.tv_nsec;
1517 if (!(ivalid & ATTR_MTIME_SET))
1518 arg->valid |= FATTR_MTIME_NOW;
befc649c 1519 }
9e6268db
MS
1520}
1521
3be5a52b
MS
1522/*
1523 * Prevent concurrent writepages on inode
1524 *
1525 * This is done by adding a negative bias to the inode write counter
1526 * and waiting for all pending writes to finish.
1527 */
1528void fuse_set_nowrite(struct inode *inode)
1529{
1530 struct fuse_conn *fc = get_fuse_conn(inode);
1531 struct fuse_inode *fi = get_fuse_inode(inode);
1532
1533 BUG_ON(!mutex_is_locked(&inode->i_mutex));
1534
1535 spin_lock(&fc->lock);
1536 BUG_ON(fi->writectr < 0);
1537 fi->writectr += FUSE_NOWRITE;
1538 spin_unlock(&fc->lock);
1539 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1540}
1541
1542/*
1543 * Allow writepages on inode
1544 *
1545 * Remove the bias from the writecounter and send any queued
1546 * writepages.
1547 */
1548static void __fuse_release_nowrite(struct inode *inode)
1549{
1550 struct fuse_inode *fi = get_fuse_inode(inode);
1551
1552 BUG_ON(fi->writectr != FUSE_NOWRITE);
1553 fi->writectr = 0;
1554 fuse_flush_writepages(inode);
1555}
1556
1557void fuse_release_nowrite(struct inode *inode)
1558{
1559 struct fuse_conn *fc = get_fuse_conn(inode);
1560
1561 spin_lock(&fc->lock);
1562 __fuse_release_nowrite(inode);
1563 spin_unlock(&fc->lock);
1564}
1565
6f9f1180
MS
1566/*
1567 * Set attributes, and at the same time refresh them.
1568 *
1569 * Truncation is slightly complicated, because the 'truncate' request
1570 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1571 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1572 * and the actual truncation by hand.
6f9f1180 1573 */
efb9fa9e
MP
1574int fuse_do_setattr(struct inode *inode, struct iattr *attr,
1575 struct file *file)
9e6268db 1576{
9e6268db 1577 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1578 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db
MS
1579 struct fuse_req *req;
1580 struct fuse_setattr_in inarg;
1581 struct fuse_attr_out outarg;
3be5a52b
MS
1582 bool is_truncate = false;
1583 loff_t oldsize;
9e6268db 1584 int err;
9e6268db 1585
db78b877
CH
1586 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1587 attr->ia_valid |= ATTR_FORCE;
1588
1589 err = inode_change_ok(inode, attr);
1590 if (err)
1591 return err;
1e9a4ed9 1592
8d56addd
MS
1593 if (attr->ia_valid & ATTR_OPEN) {
1594 if (fc->atomic_o_trunc)
1595 return 0;
1596 file = NULL;
1597 }
6ff958ed 1598
2c27c65e 1599 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1600 is_truncate = true;
9e6268db 1601
b111c8c0 1602 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1603 if (IS_ERR(req))
1604 return PTR_ERR(req);
9e6268db 1605
06a7c3c2 1606 if (is_truncate) {
3be5a52b 1607 fuse_set_nowrite(inode);
06a7c3c2
MP
1608 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1609 }
3be5a52b 1610
9e6268db 1611 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1612 memset(&outarg, 0, sizeof(outarg));
befc649c 1613 iattr_to_fattr(attr, &inarg);
49d4914f
MS
1614 if (file) {
1615 struct fuse_file *ff = file->private_data;
1616 inarg.valid |= FATTR_FH;
1617 inarg.fh = ff->fh;
1618 }
f3332114
MS
1619 if (attr->ia_valid & ATTR_SIZE) {
1620 /* For mandatory locking in truncate */
1621 inarg.valid |= FATTR_LOCKOWNER;
1622 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1623 }
9e6268db
MS
1624 req->in.h.opcode = FUSE_SETATTR;
1625 req->in.h.nodeid = get_node_id(inode);
9e6268db
MS
1626 req->in.numargs = 1;
1627 req->in.args[0].size = sizeof(inarg);
1628 req->in.args[0].value = &inarg;
1629 req->out.numargs = 1;
0e9663ee
MS
1630 if (fc->minor < 9)
1631 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
1632 else
1633 req->out.args[0].size = sizeof(outarg);
9e6268db 1634 req->out.args[0].value = &outarg;
b93f858a 1635 fuse_request_send(fc, req);
9e6268db
MS
1636 err = req->out.h.error;
1637 fuse_put_request(fc, req);
e00d2c2d
MS
1638 if (err) {
1639 if (err == -EINTR)
1640 fuse_invalidate_attr(inode);
3be5a52b 1641 goto error;
e00d2c2d 1642 }
9e6268db 1643
e00d2c2d
MS
1644 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1645 make_bad_inode(inode);
3be5a52b
MS
1646 err = -EIO;
1647 goto error;
1648 }
1649
1650 spin_lock(&fc->lock);
1651 fuse_change_attributes_common(inode, &outarg.attr,
1652 attr_timeout(&outarg));
1653 oldsize = inode->i_size;
1654 i_size_write(inode, outarg.attr.size);
1655
1656 if (is_truncate) {
1657 /* NOTE: this may release/reacquire fc->lock */
1658 __fuse_release_nowrite(inode);
1659 }
1660 spin_unlock(&fc->lock);
1661
1662 /*
1663 * Only call invalidate_inode_pages2() after removing
1664 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1665 */
1666 if (S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
7caef267 1667 truncate_pagecache(inode, outarg.attr.size);
3be5a52b 1668 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1669 }
1670
06a7c3c2 1671 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
e00d2c2d 1672 return 0;
3be5a52b
MS
1673
1674error:
1675 if (is_truncate)
1676 fuse_release_nowrite(inode);
1677
06a7c3c2 1678 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3be5a52b 1679 return err;
9e6268db
MS
1680}
1681
49d4914f
MS
1682static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1683{
efb9fa9e
MP
1684 struct inode *inode = entry->d_inode;
1685
1686 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1687 return -EACCES;
1688
49d4914f 1689 if (attr->ia_valid & ATTR_FILE)
efb9fa9e 1690 return fuse_do_setattr(inode, attr, attr->ia_file);
49d4914f 1691 else
efb9fa9e 1692 return fuse_do_setattr(inode, attr, NULL);
49d4914f
MS
1693}
1694
e5e5558e
MS
1695static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1696 struct kstat *stat)
1697{
1698 struct inode *inode = entry->d_inode;
244f6385 1699 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385 1700
c2132c1b 1701 if (!fuse_allow_current_process(fc))
244f6385
MS
1702 return -EACCES;
1703
bcb4be80 1704 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1705}
1706
92a8780e
MS
1707static int fuse_setxattr(struct dentry *entry, const char *name,
1708 const void *value, size_t size, int flags)
1709{
1710 struct inode *inode = entry->d_inode;
1711 struct fuse_conn *fc = get_fuse_conn(inode);
1712 struct fuse_req *req;
1713 struct fuse_setxattr_in inarg;
1714 int err;
1715
92a8780e
MS
1716 if (fc->no_setxattr)
1717 return -EOPNOTSUPP;
1718
b111c8c0 1719 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1720 if (IS_ERR(req))
1721 return PTR_ERR(req);
92a8780e
MS
1722
1723 memset(&inarg, 0, sizeof(inarg));
1724 inarg.size = size;
1725 inarg.flags = flags;
1726 req->in.h.opcode = FUSE_SETXATTR;
1727 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1728 req->in.numargs = 3;
1729 req->in.args[0].size = sizeof(inarg);
1730 req->in.args[0].value = &inarg;
1731 req->in.args[1].size = strlen(name) + 1;
1732 req->in.args[1].value = name;
1733 req->in.args[2].size = size;
1734 req->in.args[2].value = value;
b93f858a 1735 fuse_request_send(fc, req);
92a8780e
MS
1736 err = req->out.h.error;
1737 fuse_put_request(fc, req);
1738 if (err == -ENOSYS) {
1739 fc->no_setxattr = 1;
1740 err = -EOPNOTSUPP;
1741 }
d331a415
AA
1742 if (!err)
1743 fuse_invalidate_attr(inode);
92a8780e
MS
1744 return err;
1745}
1746
1747static ssize_t fuse_getxattr(struct dentry *entry, const char *name,
1748 void *value, size_t size)
1749{
1750 struct inode *inode = entry->d_inode;
1751 struct fuse_conn *fc = get_fuse_conn(inode);
1752 struct fuse_req *req;
1753 struct fuse_getxattr_in inarg;
1754 struct fuse_getxattr_out outarg;
1755 ssize_t ret;
1756
1757 if (fc->no_getxattr)
1758 return -EOPNOTSUPP;
1759
b111c8c0 1760 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1761 if (IS_ERR(req))
1762 return PTR_ERR(req);
92a8780e
MS
1763
1764 memset(&inarg, 0, sizeof(inarg));
1765 inarg.size = size;
1766 req->in.h.opcode = FUSE_GETXATTR;
1767 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1768 req->in.numargs = 2;
1769 req->in.args[0].size = sizeof(inarg);
1770 req->in.args[0].value = &inarg;
1771 req->in.args[1].size = strlen(name) + 1;
1772 req->in.args[1].value = name;
1773 /* This is really two different operations rolled into one */
1774 req->out.numargs = 1;
1775 if (size) {
1776 req->out.argvar = 1;
1777 req->out.args[0].size = size;
1778 req->out.args[0].value = value;
1779 } else {
1780 req->out.args[0].size = sizeof(outarg);
1781 req->out.args[0].value = &outarg;
1782 }
b93f858a 1783 fuse_request_send(fc, req);
92a8780e
MS
1784 ret = req->out.h.error;
1785 if (!ret)
1786 ret = size ? req->out.args[0].size : outarg.size;
1787 else {
1788 if (ret == -ENOSYS) {
1789 fc->no_getxattr = 1;
1790 ret = -EOPNOTSUPP;
1791 }
1792 }
1793 fuse_put_request(fc, req);
1794 return ret;
1795}
1796
1797static ssize_t fuse_listxattr(struct dentry *entry, char *list, size_t size)
1798{
1799 struct inode *inode = entry->d_inode;
1800 struct fuse_conn *fc = get_fuse_conn(inode);
1801 struct fuse_req *req;
1802 struct fuse_getxattr_in inarg;
1803 struct fuse_getxattr_out outarg;
1804 ssize_t ret;
1805
c2132c1b 1806 if (!fuse_allow_current_process(fc))
e57ac683
MS
1807 return -EACCES;
1808
92a8780e
MS
1809 if (fc->no_listxattr)
1810 return -EOPNOTSUPP;
1811
b111c8c0 1812 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1813 if (IS_ERR(req))
1814 return PTR_ERR(req);
92a8780e
MS
1815
1816 memset(&inarg, 0, sizeof(inarg));
1817 inarg.size = size;
1818 req->in.h.opcode = FUSE_LISTXATTR;
1819 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1820 req->in.numargs = 1;
1821 req->in.args[0].size = sizeof(inarg);
1822 req->in.args[0].value = &inarg;
1823 /* This is really two different operations rolled into one */
1824 req->out.numargs = 1;
1825 if (size) {
1826 req->out.argvar = 1;
1827 req->out.args[0].size = size;
1828 req->out.args[0].value = list;
1829 } else {
1830 req->out.args[0].size = sizeof(outarg);
1831 req->out.args[0].value = &outarg;
1832 }
b93f858a 1833 fuse_request_send(fc, req);
92a8780e
MS
1834 ret = req->out.h.error;
1835 if (!ret)
1836 ret = size ? req->out.args[0].size : outarg.size;
1837 else {
1838 if (ret == -ENOSYS) {
1839 fc->no_listxattr = 1;
1840 ret = -EOPNOTSUPP;
1841 }
1842 }
1843 fuse_put_request(fc, req);
1844 return ret;
1845}
1846
1847static int fuse_removexattr(struct dentry *entry, const char *name)
1848{
1849 struct inode *inode = entry->d_inode;
1850 struct fuse_conn *fc = get_fuse_conn(inode);
1851 struct fuse_req *req;
1852 int err;
1853
1854 if (fc->no_removexattr)
1855 return -EOPNOTSUPP;
1856
b111c8c0 1857 req = fuse_get_req_nopages(fc);
ce1d5a49
MS
1858 if (IS_ERR(req))
1859 return PTR_ERR(req);
92a8780e
MS
1860
1861 req->in.h.opcode = FUSE_REMOVEXATTR;
1862 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1863 req->in.numargs = 1;
1864 req->in.args[0].size = strlen(name) + 1;
1865 req->in.args[0].value = name;
b93f858a 1866 fuse_request_send(fc, req);
92a8780e
MS
1867 err = req->out.h.error;
1868 fuse_put_request(fc, req);
1869 if (err == -ENOSYS) {
1870 fc->no_removexattr = 1;
1871 err = -EOPNOTSUPP;
1872 }
d331a415
AA
1873 if (!err)
1874 fuse_invalidate_attr(inode);
92a8780e
MS
1875 return err;
1876}
1877
754661f1 1878static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1879 .lookup = fuse_lookup,
9e6268db
MS
1880 .mkdir = fuse_mkdir,
1881 .symlink = fuse_symlink,
1882 .unlink = fuse_unlink,
1883 .rmdir = fuse_rmdir,
1884 .rename = fuse_rename,
1885 .link = fuse_link,
1886 .setattr = fuse_setattr,
1887 .create = fuse_create,
c8ccbe03 1888 .atomic_open = fuse_atomic_open,
9e6268db 1889 .mknod = fuse_mknod,
e5e5558e
MS
1890 .permission = fuse_permission,
1891 .getattr = fuse_getattr,
92a8780e
MS
1892 .setxattr = fuse_setxattr,
1893 .getxattr = fuse_getxattr,
1894 .listxattr = fuse_listxattr,
1895 .removexattr = fuse_removexattr,
e5e5558e
MS
1896};
1897
4b6f5d20 1898static const struct file_operations fuse_dir_operations = {
b6aeaded 1899 .llseek = generic_file_llseek,
e5e5558e 1900 .read = generic_read_dir,
8d3af7f3 1901 .iterate = fuse_readdir,
e5e5558e
MS
1902 .open = fuse_dir_open,
1903 .release = fuse_dir_release,
82547981 1904 .fsync = fuse_dir_fsync,
b18da0c5
MS
1905 .unlocked_ioctl = fuse_dir_ioctl,
1906 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1907};
1908
754661f1 1909static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1910 .setattr = fuse_setattr,
e5e5558e
MS
1911 .permission = fuse_permission,
1912 .getattr = fuse_getattr,
92a8780e
MS
1913 .setxattr = fuse_setxattr,
1914 .getxattr = fuse_getxattr,
1915 .listxattr = fuse_listxattr,
1916 .removexattr = fuse_removexattr,
e5e5558e
MS
1917};
1918
754661f1 1919static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1920 .setattr = fuse_setattr,
e5e5558e
MS
1921 .follow_link = fuse_follow_link,
1922 .put_link = fuse_put_link,
1923 .readlink = generic_readlink,
1924 .getattr = fuse_getattr,
92a8780e
MS
1925 .setxattr = fuse_setxattr,
1926 .getxattr = fuse_getxattr,
1927 .listxattr = fuse_listxattr,
1928 .removexattr = fuse_removexattr,
e5e5558e
MS
1929};
1930
1931void fuse_init_common(struct inode *inode)
1932{
1933 inode->i_op = &fuse_common_inode_operations;
1934}
1935
1936void fuse_init_dir(struct inode *inode)
1937{
1938 inode->i_op = &fuse_dir_inode_operations;
1939 inode->i_fop = &fuse_dir_operations;
1940}
1941
1942void fuse_init_symlink(struct inode *inode)
1943{
1944 inode->i_op = &fuse_symlink_inode_operations;
1945}