Merge tag 'perf-urgent-2020-02-09' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux-2.6-block.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
703c7362 16#include <linux/xattr.h>
261aaba7 17#include <linux/iversion.h>
60bcc88a 18#include <linux/posix_acl.h>
e5e5558e 19
4582a4ab
FS
20static void fuse_advise_use_readdirplus(struct inode *dir)
21{
22 struct fuse_inode *fi = get_fuse_inode(dir);
23
24 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
25}
26
30c6a23d
KK
27#if BITS_PER_LONG >= 64
28static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
29{
30 entry->d_fsdata = (void *) time;
31}
32
33static inline u64 fuse_dentry_time(const struct dentry *entry)
34{
35 return (u64)entry->d_fsdata;
36}
37
38#else
f75fdf22
MS
39union fuse_dentry {
40 u64 time;
41 struct rcu_head rcu;
42};
43
30c6a23d
KK
44static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
45{
46 ((union fuse_dentry *) dentry->d_fsdata)->time = time;
47}
48
49static inline u64 fuse_dentry_time(const struct dentry *entry)
50{
51 return ((union fuse_dentry *) entry->d_fsdata)->time;
52}
53#endif
54
8fab0106 55static void fuse_dentry_settime(struct dentry *dentry, u64 time)
0a0898cf 56{
8fab0106
MS
57 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
58 bool delete = !time && fc->delete_stale;
59 /*
60 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
61 * Don't care about races, either way it's just an optimization
62 */
63 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
64 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
65 spin_lock(&dentry->d_lock);
66 if (!delete)
67 dentry->d_flags &= ~DCACHE_OP_DELETE;
68 else
69 dentry->d_flags |= DCACHE_OP_DELETE;
70 spin_unlock(&dentry->d_lock);
71 }
72
30c6a23d 73 __fuse_dentry_settime(dentry, time);
0a0898cf 74}
0a0898cf 75
6f9f1180
MS
76/*
77 * FUSE caches dentries and attributes with separate timeout. The
78 * time in jiffies until the dentry/attributes are valid is stored in
f75fdf22 79 * dentry->d_fsdata and fuse_inode->i_time respectively.
6f9f1180
MS
80 */
81
82/*
83 * Calculate the time in jiffies until a dentry/attributes are valid
84 */
bcb6f6d2 85static u64 time_to_jiffies(u64 sec, u32 nsec)
e5e5558e 86{
685d16dd 87 if (sec || nsec) {
bcb6f6d2
MS
88 struct timespec64 ts = {
89 sec,
21067527 90 min_t(u32, nsec, NSEC_PER_SEC - 1)
bcb6f6d2
MS
91 };
92
93 return get_jiffies_64() + timespec64_to_jiffies(&ts);
685d16dd 94 } else
0a0898cf 95 return 0;
e5e5558e
MS
96}
97
6f9f1180
MS
98/*
99 * Set dentry and possibly attribute timeouts from the lookup/mk*
100 * replies
101 */
d123d8e1 102void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
0aa7c699 103{
0a0898cf
MS
104 fuse_dentry_settime(entry,
105 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
106}
107
108static u64 attr_timeout(struct fuse_attr_out *o)
109{
110 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
111}
112
d123d8e1 113u64 entry_attr_timeout(struct fuse_entry_out *o)
1fb69e78
MS
114{
115 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
116}
117
2f1e8196
MS
118static void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
119{
120 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
121}
122
6f9f1180
MS
123/*
124 * Mark the attributes as stale, so that at the next call to
125 * ->getattr() they will be fetched from userspace
126 */
8cbdf1e6
MS
127void fuse_invalidate_attr(struct inode *inode)
128{
2f1e8196 129 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
8cbdf1e6
MS
130}
131
261aaba7
MS
132static void fuse_dir_changed(struct inode *dir)
133{
134 fuse_invalidate_attr(dir);
135 inode_maybe_inc_iversion(dir, false);
136}
137
451418fc
AG
138/**
139 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
140 * atime is not used.
141 */
142void fuse_invalidate_atime(struct inode *inode)
143{
144 if (!IS_RDONLY(inode))
2f1e8196 145 fuse_invalidate_attr_mask(inode, STATX_ATIME);
451418fc
AG
146}
147
6f9f1180
MS
148/*
149 * Just mark the entry as stale, so that a next attempt to look it up
150 * will result in a new lookup call to userspace
151 *
152 * This is called when a dentry is about to become negative and the
153 * timeout is unknown (unlink, rmdir, rename and in some cases
154 * lookup)
155 */
dbd561d2 156void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 157{
0a0898cf 158 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
159}
160
6f9f1180
MS
161/*
162 * Same as fuse_invalidate_entry_cache(), but also try to remove the
163 * dentry from the hash
164 */
8cbdf1e6
MS
165static void fuse_invalidate_entry(struct dentry *entry)
166{
167 d_invalidate(entry);
168 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
169}
170
7078187a 171static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
13983d06 172 u64 nodeid, const struct qstr *name,
e5e5558e
MS
173 struct fuse_entry_out *outarg)
174{
0e9663ee 175 memset(outarg, 0, sizeof(struct fuse_entry_out));
d5b48543
MS
176 args->opcode = FUSE_LOOKUP;
177 args->nodeid = nodeid;
178 args->in_numargs = 1;
179 args->in_args[0].size = name->len + 1;
180 args->in_args[0].value = name->name;
181 args->out_numargs = 1;
182 args->out_args[0].size = sizeof(struct fuse_entry_out);
183 args->out_args[0].value = outarg;
e5e5558e
MS
184}
185
6f9f1180
MS
186/*
187 * Check whether the dentry is still valid
188 *
189 * If the entry validity timeout has expired and the dentry is
190 * positive, try to redo the lookup. If the lookup results in a
191 * different inode, then let the VFS invalidate the dentry and redo
192 * the lookup once more. If the lookup results in the same inode,
193 * then refresh the attributes, timeouts and mark the dentry valid.
194 */
0b728e19 195static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
e5e5558e 196{
34286d66 197 struct inode *inode;
28420dad
MS
198 struct dentry *parent;
199 struct fuse_conn *fc;
6314efee 200 struct fuse_inode *fi;
e2a6b952 201 int ret;
8cbdf1e6 202
2b0143b5 203 inode = d_inode_rcu(entry);
8cbdf1e6 204 if (inode && is_bad_inode(inode))
e2a6b952 205 goto invalid;
154210cc
AA
206 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
207 (flags & LOOKUP_REVAL)) {
e5e5558e 208 struct fuse_entry_out outarg;
7078187a 209 FUSE_ARGS(args);
07e77dca 210 struct fuse_forget_link *forget;
1fb69e78 211 u64 attr_version;
8cbdf1e6 212
50322fe7 213 /* For negative dentries, always do a fresh lookup */
8cbdf1e6 214 if (!inode)
e2a6b952 215 goto invalid;
8cbdf1e6 216
e2a6b952 217 ret = -ECHILD;
0b728e19 218 if (flags & LOOKUP_RCU)
e2a6b952 219 goto out;
e7c0a167 220
8cbdf1e6 221 fc = get_fuse_conn(inode);
e5e5558e 222
07e77dca 223 forget = fuse_alloc_forget();
7078187a
MS
224 ret = -ENOMEM;
225 if (!forget)
e2a6b952 226 goto out;
2d51013e 227
7dca9fd3 228 attr_version = fuse_get_attr_version(fc);
1fb69e78 229
e956edd0 230 parent = dget_parent(entry);
2b0143b5 231 fuse_lookup_init(fc, &args, get_node_id(d_inode(parent)),
c180eebe 232 &entry->d_name, &outarg);
7078187a 233 ret = fuse_simple_request(fc, &args);
e956edd0 234 dput(parent);
50322fe7 235 /* Zero nodeid is same as -ENOENT */
7078187a
MS
236 if (!ret && !outarg.nodeid)
237 ret = -ENOENT;
238 if (!ret) {
6314efee 239 fi = get_fuse_inode(inode);
9e6268db 240 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 241 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
e2a6b952 242 goto invalid;
9e6268db 243 }
c9d8f5f0 244 spin_lock(&fi->lock);
1729a16c 245 fi->nlookup++;
c9d8f5f0 246 spin_unlock(&fi->lock);
9e6268db 247 }
07e77dca 248 kfree(forget);
7078187a
MS
249 if (ret == -ENOMEM)
250 goto out;
eb59bd17
MS
251 if (ret || fuse_invalid_attr(&outarg.attr) ||
252 (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e2a6b952 253 goto invalid;
e5e5558e 254
60bcc88a 255 forget_all_cached_acls(inode);
1fb69e78
MS
256 fuse_change_attributes(inode, &outarg.attr,
257 entry_attr_timeout(&outarg),
258 attr_version);
259 fuse_change_entry_timeout(entry, &outarg);
28420dad 260 } else if (inode) {
6314efee
MS
261 fi = get_fuse_inode(inode);
262 if (flags & LOOKUP_RCU) {
263 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
264 return -ECHILD;
265 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
28420dad 266 parent = dget_parent(entry);
2b0143b5 267 fuse_advise_use_readdirplus(d_inode(parent));
28420dad
MS
268 dput(parent);
269 }
e5e5558e 270 }
e2a6b952
MS
271 ret = 1;
272out:
273 return ret;
274
275invalid:
276 ret = 0;
277 goto out;
e5e5558e
MS
278}
279
30c6a23d 280#if BITS_PER_LONG < 64
f75fdf22
MS
281static int fuse_dentry_init(struct dentry *dentry)
282{
dc69e98c
KK
283 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
284 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
f75fdf22
MS
285
286 return dentry->d_fsdata ? 0 : -ENOMEM;
287}
288static void fuse_dentry_release(struct dentry *dentry)
289{
290 union fuse_dentry *fd = dentry->d_fsdata;
291
292 kfree_rcu(fd, rcu);
293}
30c6a23d 294#endif
f75fdf22 295
8fab0106
MS
296static int fuse_dentry_delete(const struct dentry *dentry)
297{
298 return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
299}
300
4269590a 301const struct dentry_operations fuse_dentry_operations = {
e5e5558e 302 .d_revalidate = fuse_dentry_revalidate,
8fab0106 303 .d_delete = fuse_dentry_delete,
30c6a23d 304#if BITS_PER_LONG < 64
f75fdf22
MS
305 .d_init = fuse_dentry_init,
306 .d_release = fuse_dentry_release,
30c6a23d 307#endif
e5e5558e
MS
308};
309
0ce267ff 310const struct dentry_operations fuse_root_dentry_operations = {
30c6a23d 311#if BITS_PER_LONG < 64
0ce267ff
MS
312 .d_init = fuse_dentry_init,
313 .d_release = fuse_dentry_release,
30c6a23d 314#endif
0ce267ff
MS
315};
316
a5bfffac 317int fuse_valid_type(int m)
39ee059a
MS
318{
319 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
320 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
321}
322
eb59bd17
MS
323bool fuse_invalid_attr(struct fuse_attr *attr)
324{
325 return !fuse_valid_type(attr->mode) ||
326 attr->size > LLONG_MAX;
327}
328
13983d06 329int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
c180eebe 330 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 331{
c180eebe 332 struct fuse_conn *fc = get_fuse_conn_super(sb);
7078187a 333 FUSE_ARGS(args);
07e77dca 334 struct fuse_forget_link *forget;
1fb69e78 335 u64 attr_version;
c180eebe 336 int err;
e5e5558e 337
c180eebe
MS
338 *inode = NULL;
339 err = -ENAMETOOLONG;
340 if (name->len > FUSE_NAME_MAX)
341 goto out;
e5e5558e 342
e5e5558e 343
07e77dca
MS
344 forget = fuse_alloc_forget();
345 err = -ENOMEM;
7078187a 346 if (!forget)
c180eebe 347 goto out;
2d51013e 348
7dca9fd3 349 attr_version = fuse_get_attr_version(fc);
1fb69e78 350
7078187a
MS
351 fuse_lookup_init(fc, &args, nodeid, name, outarg);
352 err = fuse_simple_request(fc, &args);
50322fe7 353 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
354 if (err || !outarg->nodeid)
355 goto out_put_forget;
356
357 err = -EIO;
358 if (!outarg->nodeid)
359 goto out_put_forget;
eb59bd17 360 if (fuse_invalid_attr(&outarg->attr))
c180eebe
MS
361 goto out_put_forget;
362
363 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
364 &outarg->attr, entry_attr_timeout(outarg),
365 attr_version);
366 err = -ENOMEM;
367 if (!*inode) {
07e77dca 368 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 369 goto out;
e5e5558e 370 }
c180eebe
MS
371 err = 0;
372
373 out_put_forget:
07e77dca 374 kfree(forget);
c180eebe
MS
375 out:
376 return err;
377}
378
379static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
00cd8dd3 380 unsigned int flags)
c180eebe
MS
381{
382 int err;
383 struct fuse_entry_out outarg;
384 struct inode *inode;
385 struct dentry *newent;
c180eebe 386 bool outarg_valid = true;
63576c13 387 bool locked;
c180eebe 388
63576c13 389 locked = fuse_lock_inode(dir);
c180eebe
MS
390 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
391 &outarg, &inode);
63576c13 392 fuse_unlock_inode(dir, locked);
c180eebe
MS
393 if (err == -ENOENT) {
394 outarg_valid = false;
395 err = 0;
396 }
397 if (err)
398 goto out_err;
399
400 err = -EIO;
401 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
402 goto out_iput;
e5e5558e 403
41d28bca 404 newent = d_splice_alias(inode, entry);
5835f339
MS
405 err = PTR_ERR(newent);
406 if (IS_ERR(newent))
407 goto out_err;
d2a85164 408
0de6256d 409 entry = newent ? newent : entry;
c180eebe 410 if (outarg_valid)
1fb69e78 411 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
412 else
413 fuse_invalidate_entry_cache(entry);
c180eebe 414
6c26f717
MS
415 if (inode)
416 fuse_advise_use_readdirplus(dir);
0de6256d 417 return newent;
c180eebe
MS
418
419 out_iput:
420 iput(inode);
421 out_err:
422 return ERR_PTR(err);
e5e5558e
MS
423}
424
6f9f1180
MS
425/*
426 * Atomic create+open operation
427 *
428 * If the filesystem doesn't support this, then fall back to separate
429 * 'mknod' + 'open' requests.
430 */
d9585277 431static int fuse_create_open(struct inode *dir, struct dentry *entry,
30d90494 432 struct file *file, unsigned flags,
b452a458 433 umode_t mode)
fd72faac
MS
434{
435 int err;
436 struct inode *inode;
437 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 438 FUSE_ARGS(args);
07e77dca 439 struct fuse_forget_link *forget;
e0a43ddc 440 struct fuse_create_in inarg;
fd72faac
MS
441 struct fuse_open_out outopen;
442 struct fuse_entry_out outentry;
ebf84d0c 443 struct fuse_inode *fi;
fd72faac 444 struct fuse_file *ff;
fd72faac 445
af109bca
MS
446 /* Userspace expects S_IFREG in create mode */
447 BUG_ON((mode & S_IFMT) != S_IFREG);
448
07e77dca 449 forget = fuse_alloc_forget();
c8ccbe03 450 err = -ENOMEM;
07e77dca 451 if (!forget)
c8ccbe03 452 goto out_err;
51eb01e7 453
ce1d5a49 454 err = -ENOMEM;
acf99433 455 ff = fuse_file_alloc(fc);
fd72faac 456 if (!ff)
7078187a 457 goto out_put_forget_req;
fd72faac 458
e0a43ddc
MS
459 if (!fc->dont_mask)
460 mode &= ~current_umask();
461
fd72faac
MS
462 flags &= ~O_NOCTTY;
463 memset(&inarg, 0, sizeof(inarg));
0e9663ee 464 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
465 inarg.flags = flags;
466 inarg.mode = mode;
e0a43ddc 467 inarg.umask = current_umask();
d5b48543
MS
468 args.opcode = FUSE_CREATE;
469 args.nodeid = get_node_id(dir);
470 args.in_numargs = 2;
471 args.in_args[0].size = sizeof(inarg);
472 args.in_args[0].value = &inarg;
473 args.in_args[1].size = entry->d_name.len + 1;
474 args.in_args[1].value = entry->d_name.name;
475 args.out_numargs = 2;
476 args.out_args[0].size = sizeof(outentry);
477 args.out_args[0].value = &outentry;
478 args.out_args[1].size = sizeof(outopen);
479 args.out_args[1].value = &outopen;
7078187a 480 err = fuse_simple_request(fc, &args);
c8ccbe03 481 if (err)
fd72faac 482 goto out_free_ff;
fd72faac
MS
483
484 err = -EIO;
eb59bd17
MS
485 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
486 fuse_invalid_attr(&outentry.attr))
fd72faac
MS
487 goto out_free_ff;
488
c7b7143c
MS
489 ff->fh = outopen.fh;
490 ff->nodeid = outentry.nodeid;
491 ff->open_flags = outopen.open_flags;
fd72faac 492 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 493 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
494 if (!inode) {
495 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
ebf84d0c 496 fuse_sync_release(NULL, ff, flags);
07e77dca 497 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
498 err = -ENOMEM;
499 goto out_err;
fd72faac 500 }
07e77dca 501 kfree(forget);
fd72faac 502 d_instantiate(entry, inode);
1fb69e78 503 fuse_change_entry_timeout(entry, &outentry);
261aaba7 504 fuse_dir_changed(dir);
be12af3e 505 err = finish_open(file, entry, generic_file_open);
30d90494 506 if (err) {
ebf84d0c
KT
507 fi = get_fuse_inode(inode);
508 fuse_sync_release(fi, ff, flags);
c8ccbe03 509 } else {
267d8444 510 file->private_data = ff;
c8ccbe03 511 fuse_finish_open(inode, file);
fd72faac 512 }
d9585277 513 return err;
fd72faac 514
c8ccbe03 515out_free_ff:
fd72faac 516 fuse_file_free(ff);
c8ccbe03 517out_put_forget_req:
07e77dca 518 kfree(forget);
c8ccbe03 519out_err:
d9585277 520 return err;
c8ccbe03
MS
521}
522
523static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
d9585277 524static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
30d90494 525 struct file *file, unsigned flags,
44907d79 526 umode_t mode)
c8ccbe03
MS
527{
528 int err;
529 struct fuse_conn *fc = get_fuse_conn(dir);
c8ccbe03
MS
530 struct dentry *res = NULL;
531
00699ad8 532 if (d_in_lookup(entry)) {
00cd8dd3 533 res = fuse_lookup(dir, entry, 0);
c8ccbe03 534 if (IS_ERR(res))
d9585277 535 return PTR_ERR(res);
c8ccbe03
MS
536
537 if (res)
538 entry = res;
539 }
540
2b0143b5 541 if (!(flags & O_CREAT) || d_really_is_positive(entry))
c8ccbe03
MS
542 goto no_open;
543
544 /* Only creates */
73a09dd9 545 file->f_mode |= FMODE_CREATED;
c8ccbe03
MS
546
547 if (fc->no_create)
548 goto mknod;
549
b452a458 550 err = fuse_create_open(dir, entry, file, flags, mode);
d9585277 551 if (err == -ENOSYS) {
c8ccbe03
MS
552 fc->no_create = 1;
553 goto mknod;
554 }
555out_dput:
556 dput(res);
d9585277 557 return err;
c8ccbe03
MS
558
559mknod:
560 err = fuse_mknod(dir, entry, mode, 0);
d9585277 561 if (err)
c8ccbe03 562 goto out_dput;
c8ccbe03 563no_open:
e45198a6 564 return finish_no_open(file, res);
fd72faac
MS
565}
566
6f9f1180
MS
567/*
568 * Code shared between mknod, mkdir, symlink and link
569 */
7078187a 570static int create_new_entry(struct fuse_conn *fc, struct fuse_args *args,
9e6268db 571 struct inode *dir, struct dentry *entry,
541af6a0 572 umode_t mode)
9e6268db
MS
573{
574 struct fuse_entry_out outarg;
575 struct inode *inode;
c971e6a0 576 struct dentry *d;
9e6268db 577 int err;
07e77dca 578 struct fuse_forget_link *forget;
2d51013e 579
07e77dca 580 forget = fuse_alloc_forget();
7078187a 581 if (!forget)
07e77dca 582 return -ENOMEM;
9e6268db 583
0e9663ee 584 memset(&outarg, 0, sizeof(outarg));
d5b48543
MS
585 args->nodeid = get_node_id(dir);
586 args->out_numargs = 1;
587 args->out_args[0].size = sizeof(outarg);
588 args->out_args[0].value = &outarg;
7078187a 589 err = fuse_simple_request(fc, args);
2d51013e
MS
590 if (err)
591 goto out_put_forget_req;
592
39ee059a 593 err = -EIO;
eb59bd17 594 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
2d51013e 595 goto out_put_forget_req;
39ee059a
MS
596
597 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 598 goto out_put_forget_req;
39ee059a 599
9e6268db 600 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 601 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 602 if (!inode) {
07e77dca 603 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
604 return -ENOMEM;
605 }
07e77dca 606 kfree(forget);
9e6268db 607
c971e6a0
AV
608 d_drop(entry);
609 d = d_splice_alias(inode, entry);
610 if (IS_ERR(d))
611 return PTR_ERR(d);
9e6268db 612
c971e6a0
AV
613 if (d) {
614 fuse_change_entry_timeout(d, &outarg);
615 dput(d);
616 } else {
617 fuse_change_entry_timeout(entry, &outarg);
618 }
261aaba7 619 fuse_dir_changed(dir);
9e6268db 620 return 0;
39ee059a 621
2d51013e 622 out_put_forget_req:
07e77dca 623 kfree(forget);
39ee059a 624 return err;
9e6268db
MS
625}
626
1a67aafb 627static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
628 dev_t rdev)
629{
630 struct fuse_mknod_in inarg;
631 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 632 FUSE_ARGS(args);
9e6268db 633
e0a43ddc
MS
634 if (!fc->dont_mask)
635 mode &= ~current_umask();
636
9e6268db
MS
637 memset(&inarg, 0, sizeof(inarg));
638 inarg.mode = mode;
639 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 640 inarg.umask = current_umask();
d5b48543
MS
641 args.opcode = FUSE_MKNOD;
642 args.in_numargs = 2;
643 args.in_args[0].size = sizeof(inarg);
644 args.in_args[0].value = &inarg;
645 args.in_args[1].size = entry->d_name.len + 1;
646 args.in_args[1].value = entry->d_name.name;
7078187a 647 return create_new_entry(fc, &args, dir, entry, mode);
9e6268db
MS
648}
649
4acdaf27 650static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
ebfc3b49 651 bool excl)
9e6268db
MS
652{
653 return fuse_mknod(dir, entry, mode, 0);
654}
655
18bb1db3 656static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
657{
658 struct fuse_mkdir_in inarg;
659 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 660 FUSE_ARGS(args);
9e6268db 661
e0a43ddc
MS
662 if (!fc->dont_mask)
663 mode &= ~current_umask();
664
9e6268db
MS
665 memset(&inarg, 0, sizeof(inarg));
666 inarg.mode = mode;
e0a43ddc 667 inarg.umask = current_umask();
d5b48543
MS
668 args.opcode = FUSE_MKDIR;
669 args.in_numargs = 2;
670 args.in_args[0].size = sizeof(inarg);
671 args.in_args[0].value = &inarg;
672 args.in_args[1].size = entry->d_name.len + 1;
673 args.in_args[1].value = entry->d_name.name;
7078187a 674 return create_new_entry(fc, &args, dir, entry, S_IFDIR);
9e6268db
MS
675}
676
677static int fuse_symlink(struct inode *dir, struct dentry *entry,
678 const char *link)
679{
680 struct fuse_conn *fc = get_fuse_conn(dir);
681 unsigned len = strlen(link) + 1;
7078187a 682 FUSE_ARGS(args);
9e6268db 683
d5b48543
MS
684 args.opcode = FUSE_SYMLINK;
685 args.in_numargs = 2;
686 args.in_args[0].size = entry->d_name.len + 1;
687 args.in_args[0].value = entry->d_name.name;
688 args.in_args[1].size = len;
689 args.in_args[1].value = link;
7078187a 690 return create_new_entry(fc, &args, dir, entry, S_IFLNK);
9e6268db
MS
691}
692
703c7362 693void fuse_update_ctime(struct inode *inode)
31f3267b
MP
694{
695 if (!IS_NOCMTIME(inode)) {
c2050a45 696 inode->i_ctime = current_time(inode);
31f3267b
MP
697 mark_inode_dirty_sync(inode);
698 }
699}
700
9e6268db
MS
701static int fuse_unlink(struct inode *dir, struct dentry *entry)
702{
703 int err;
704 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
705 FUSE_ARGS(args);
706
d5b48543
MS
707 args.opcode = FUSE_UNLINK;
708 args.nodeid = get_node_id(dir);
709 args.in_numargs = 1;
710 args.in_args[0].size = entry->d_name.len + 1;
711 args.in_args[0].value = entry->d_name.name;
7078187a 712 err = fuse_simple_request(fc, &args);
9e6268db 713 if (!err) {
2b0143b5 714 struct inode *inode = d_inode(entry);
ac45d613 715 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 716
f15ecfef 717 spin_lock(&fi->lock);
4510d86f 718 fi->attr_version = atomic64_inc_return(&fc->attr_version);
dfca7ceb
MS
719 /*
720 * If i_nlink == 0 then unlink doesn't make sense, yet this can
721 * happen if userspace filesystem is careless. It would be
722 * difficult to enforce correct nlink usage so just ignore this
723 * condition here
724 */
725 if (inode->i_nlink > 0)
726 drop_nlink(inode);
f15ecfef 727 spin_unlock(&fi->lock);
9e6268db 728 fuse_invalidate_attr(inode);
261aaba7 729 fuse_dir_changed(dir);
8cbdf1e6 730 fuse_invalidate_entry_cache(entry);
31f3267b 731 fuse_update_ctime(inode);
9e6268db
MS
732 } else if (err == -EINTR)
733 fuse_invalidate_entry(entry);
734 return err;
735}
736
737static int fuse_rmdir(struct inode *dir, struct dentry *entry)
738{
739 int err;
740 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
741 FUSE_ARGS(args);
742
d5b48543
MS
743 args.opcode = FUSE_RMDIR;
744 args.nodeid = get_node_id(dir);
745 args.in_numargs = 1;
746 args.in_args[0].size = entry->d_name.len + 1;
747 args.in_args[0].value = entry->d_name.name;
7078187a 748 err = fuse_simple_request(fc, &args);
9e6268db 749 if (!err) {
2b0143b5 750 clear_nlink(d_inode(entry));
261aaba7 751 fuse_dir_changed(dir);
8cbdf1e6 752 fuse_invalidate_entry_cache(entry);
9e6268db
MS
753 } else if (err == -EINTR)
754 fuse_invalidate_entry(entry);
755 return err;
756}
757
1560c974
MS
758static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
759 struct inode *newdir, struct dentry *newent,
760 unsigned int flags, int opcode, size_t argsize)
9e6268db
MS
761{
762 int err;
1560c974 763 struct fuse_rename2_in inarg;
9e6268db 764 struct fuse_conn *fc = get_fuse_conn(olddir);
7078187a 765 FUSE_ARGS(args);
9e6268db 766
1560c974 767 memset(&inarg, 0, argsize);
9e6268db 768 inarg.newdir = get_node_id(newdir);
1560c974 769 inarg.flags = flags;
d5b48543
MS
770 args.opcode = opcode;
771 args.nodeid = get_node_id(olddir);
772 args.in_numargs = 3;
773 args.in_args[0].size = argsize;
774 args.in_args[0].value = &inarg;
775 args.in_args[1].size = oldent->d_name.len + 1;
776 args.in_args[1].value = oldent->d_name.name;
777 args.in_args[2].size = newent->d_name.len + 1;
778 args.in_args[2].value = newent->d_name.name;
7078187a 779 err = fuse_simple_request(fc, &args);
9e6268db 780 if (!err) {
08b63307 781 /* ctime changes */
2b0143b5
DH
782 fuse_invalidate_attr(d_inode(oldent));
783 fuse_update_ctime(d_inode(oldent));
08b63307 784
1560c974 785 if (flags & RENAME_EXCHANGE) {
2b0143b5
DH
786 fuse_invalidate_attr(d_inode(newent));
787 fuse_update_ctime(d_inode(newent));
1560c974
MS
788 }
789
261aaba7 790 fuse_dir_changed(olddir);
9e6268db 791 if (olddir != newdir)
261aaba7 792 fuse_dir_changed(newdir);
8cbdf1e6
MS
793
794 /* newent will end up negative */
2b0143b5
DH
795 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) {
796 fuse_invalidate_attr(d_inode(newent));
8cbdf1e6 797 fuse_invalidate_entry_cache(newent);
2b0143b5 798 fuse_update_ctime(d_inode(newent));
5219f346 799 }
9e6268db
MS
800 } else if (err == -EINTR) {
801 /* If request was interrupted, DEITY only knows if the
802 rename actually took place. If the invalidation
803 fails (e.g. some process has CWD under the renamed
804 directory), then there can be inconsistency between
805 the dcache and the real filesystem. Tough luck. */
806 fuse_invalidate_entry(oldent);
2b0143b5 807 if (d_really_is_positive(newent))
9e6268db
MS
808 fuse_invalidate_entry(newent);
809 }
810
811 return err;
812}
813
1560c974
MS
814static int fuse_rename2(struct inode *olddir, struct dentry *oldent,
815 struct inode *newdir, struct dentry *newent,
816 unsigned int flags)
817{
818 struct fuse_conn *fc = get_fuse_conn(olddir);
819 int err;
820
519525fa 821 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
1560c974
MS
822 return -EINVAL;
823
4237ba43
MS
824 if (flags) {
825 if (fc->no_rename2 || fc->minor < 23)
826 return -EINVAL;
1560c974 827
4237ba43
MS
828 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
829 FUSE_RENAME2,
830 sizeof(struct fuse_rename2_in));
831 if (err == -ENOSYS) {
832 fc->no_rename2 = 1;
833 err = -EINVAL;
834 }
835 } else {
836 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
837 FUSE_RENAME,
838 sizeof(struct fuse_rename_in));
1560c974 839 }
4237ba43 840
1560c974 841 return err;
4237ba43 842}
1560c974 843
9e6268db
MS
844static int fuse_link(struct dentry *entry, struct inode *newdir,
845 struct dentry *newent)
846{
847 int err;
848 struct fuse_link_in inarg;
2b0143b5 849 struct inode *inode = d_inode(entry);
9e6268db 850 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 851 FUSE_ARGS(args);
9e6268db
MS
852
853 memset(&inarg, 0, sizeof(inarg));
854 inarg.oldnodeid = get_node_id(inode);
d5b48543
MS
855 args.opcode = FUSE_LINK;
856 args.in_numargs = 2;
857 args.in_args[0].size = sizeof(inarg);
858 args.in_args[0].value = &inarg;
859 args.in_args[1].size = newent->d_name.len + 1;
860 args.in_args[1].value = newent->d_name.name;
7078187a 861 err = create_new_entry(fc, &args, newdir, newent, inode->i_mode);
9e6268db
MS
862 /* Contrary to "normal" filesystems it can happen that link
863 makes two "logical" inodes point to the same "physical"
864 inode. We invalidate the attributes of the old one, so it
865 will reflect changes in the backing inode (link count,
866 etc.)
867 */
ac45d613
MS
868 if (!err) {
869 struct fuse_inode *fi = get_fuse_inode(inode);
870
f15ecfef 871 spin_lock(&fi->lock);
4510d86f 872 fi->attr_version = atomic64_inc_return(&fc->attr_version);
c634da71
MS
873 if (likely(inode->i_nlink < UINT_MAX))
874 inc_nlink(inode);
f15ecfef 875 spin_unlock(&fi->lock);
9e6268db 876 fuse_invalidate_attr(inode);
31f3267b 877 fuse_update_ctime(inode);
ac45d613
MS
878 } else if (err == -EINTR) {
879 fuse_invalidate_attr(inode);
880 }
9e6268db
MS
881 return err;
882}
883
1fb69e78
MS
884static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
885 struct kstat *stat)
886{
203627bb 887 unsigned int blkbits;
8373200b
PE
888 struct fuse_conn *fc = get_fuse_conn(inode);
889
890 /* see the comment in fuse_change_attributes() */
b0aa7606 891 if (fc->writeback_cache && S_ISREG(inode->i_mode)) {
8373200b 892 attr->size = i_size_read(inode);
b0aa7606
MP
893 attr->mtime = inode->i_mtime.tv_sec;
894 attr->mtimensec = inode->i_mtime.tv_nsec;
31f3267b
MP
895 attr->ctime = inode->i_ctime.tv_sec;
896 attr->ctimensec = inode->i_ctime.tv_nsec;
b0aa7606 897 }
203627bb 898
1fb69e78
MS
899 stat->dev = inode->i_sb->s_dev;
900 stat->ino = attr->ino;
901 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
902 stat->nlink = attr->nlink;
8cb08329
EB
903 stat->uid = make_kuid(fc->user_ns, attr->uid);
904 stat->gid = make_kgid(fc->user_ns, attr->gid);
1fb69e78
MS
905 stat->rdev = inode->i_rdev;
906 stat->atime.tv_sec = attr->atime;
907 stat->atime.tv_nsec = attr->atimensec;
908 stat->mtime.tv_sec = attr->mtime;
909 stat->mtime.tv_nsec = attr->mtimensec;
910 stat->ctime.tv_sec = attr->ctime;
911 stat->ctime.tv_nsec = attr->ctimensec;
912 stat->size = attr->size;
913 stat->blocks = attr->blocks;
203627bb
MS
914
915 if (attr->blksize != 0)
916 blkbits = ilog2(attr->blksize);
917 else
918 blkbits = inode->i_sb->s_blocksize_bits;
919
920 stat->blksize = 1 << blkbits;
1fb69e78
MS
921}
922
c79e322f
MS
923static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
924 struct file *file)
e5e5558e
MS
925{
926 int err;
c79e322f
MS
927 struct fuse_getattr_in inarg;
928 struct fuse_attr_out outarg;
e5e5558e 929 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 930 FUSE_ARGS(args);
1fb69e78
MS
931 u64 attr_version;
932
7dca9fd3 933 attr_version = fuse_get_attr_version(fc);
1fb69e78 934
c79e322f 935 memset(&inarg, 0, sizeof(inarg));
0e9663ee 936 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
937 /* Directories have separate file-handle space */
938 if (file && S_ISREG(inode->i_mode)) {
939 struct fuse_file *ff = file->private_data;
940
941 inarg.getattr_flags |= FUSE_GETATTR_FH;
942 inarg.fh = ff->fh;
943 }
d5b48543
MS
944 args.opcode = FUSE_GETATTR;
945 args.nodeid = get_node_id(inode);
946 args.in_numargs = 1;
947 args.in_args[0].size = sizeof(inarg);
948 args.in_args[0].value = &inarg;
949 args.out_numargs = 1;
950 args.out_args[0].size = sizeof(outarg);
951 args.out_args[0].value = &outarg;
7078187a 952 err = fuse_simple_request(fc, &args);
e5e5558e 953 if (!err) {
eb59bd17
MS
954 if (fuse_invalid_attr(&outarg.attr) ||
955 (inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
956 make_bad_inode(inode);
957 err = -EIO;
958 } else {
c79e322f
MS
959 fuse_change_attributes(inode, &outarg.attr,
960 attr_timeout(&outarg),
1fb69e78
MS
961 attr_version);
962 if (stat)
c79e322f 963 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
964 }
965 }
966 return err;
967}
968
5b97eeac 969static int fuse_update_get_attr(struct inode *inode, struct file *file,
2f1e8196
MS
970 struct kstat *stat, u32 request_mask,
971 unsigned int flags)
bcb4be80
MS
972{
973 struct fuse_inode *fi = get_fuse_inode(inode);
5b97eeac 974 int err = 0;
bf5c1898 975 bool sync;
bcb4be80 976
bf5c1898
MS
977 if (flags & AT_STATX_FORCE_SYNC)
978 sync = true;
979 else if (flags & AT_STATX_DONT_SYNC)
980 sync = false;
2f1e8196
MS
981 else if (request_mask & READ_ONCE(fi->inval_mask))
982 sync = true;
bf5c1898
MS
983 else
984 sync = time_before64(fi->i_time, get_jiffies_64());
985
986 if (sync) {
60bcc88a 987 forget_all_cached_acls(inode);
bcb4be80 988 err = fuse_do_getattr(inode, stat, file);
5b97eeac
MS
989 } else if (stat) {
990 generic_fillattr(inode, stat);
991 stat->mode = fi->orig_i_mode;
992 stat->ino = fi->orig_ino;
bcb4be80
MS
993 }
994
bcb4be80
MS
995 return err;
996}
997
5b97eeac
MS
998int fuse_update_attributes(struct inode *inode, struct file *file)
999{
802dc049
MS
1000 /* Do *not* need to get atime for internal purposes */
1001 return fuse_update_get_attr(inode, file, NULL,
1002 STATX_BASIC_STATS & ~STATX_ATIME, 0);
5b97eeac
MS
1003}
1004
3b463ae0 1005int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 1006 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
1007{
1008 int err = -ENOTDIR;
1009 struct inode *parent;
1010 struct dentry *dir;
1011 struct dentry *entry;
1012
1013 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
1014 if (!parent)
1015 return -ENOENT;
1016
5955102c 1017 inode_lock(parent);
3b463ae0
JM
1018 if (!S_ISDIR(parent->i_mode))
1019 goto unlock;
1020
1021 err = -ENOENT;
1022 dir = d_find_alias(parent);
1023 if (!dir)
1024 goto unlock;
1025
8387ff25 1026 name->hash = full_name_hash(dir, name->name, name->len);
3b463ae0
JM
1027 entry = d_lookup(dir, name);
1028 dput(dir);
1029 if (!entry)
1030 goto unlock;
1031
261aaba7 1032 fuse_dir_changed(parent);
3b463ae0 1033 fuse_invalidate_entry(entry);
451d0f59 1034
2b0143b5 1035 if (child_nodeid != 0 && d_really_is_positive(entry)) {
5955102c 1036 inode_lock(d_inode(entry));
2b0143b5 1037 if (get_node_id(d_inode(entry)) != child_nodeid) {
451d0f59
JM
1038 err = -ENOENT;
1039 goto badentry;
1040 }
1041 if (d_mountpoint(entry)) {
1042 err = -EBUSY;
1043 goto badentry;
1044 }
e36cb0b8 1045 if (d_is_dir(entry)) {
451d0f59
JM
1046 shrink_dcache_parent(entry);
1047 if (!simple_empty(entry)) {
1048 err = -ENOTEMPTY;
1049 goto badentry;
1050 }
2b0143b5 1051 d_inode(entry)->i_flags |= S_DEAD;
451d0f59
JM
1052 }
1053 dont_mount(entry);
2b0143b5 1054 clear_nlink(d_inode(entry));
451d0f59
JM
1055 err = 0;
1056 badentry:
5955102c 1057 inode_unlock(d_inode(entry));
451d0f59
JM
1058 if (!err)
1059 d_delete(entry);
1060 } else {
1061 err = 0;
1062 }
3b463ae0 1063 dput(entry);
3b463ae0
JM
1064
1065 unlock:
5955102c 1066 inode_unlock(parent);
3b463ae0
JM
1067 iput(parent);
1068 return err;
1069}
1070
87729a55
MS
1071/*
1072 * Calling into a user-controlled filesystem gives the filesystem
c2132c1b 1073 * daemon ptrace-like capabilities over the current process. This
87729a55
MS
1074 * means, that the filesystem daemon is able to record the exact
1075 * filesystem operations performed, and can also control the behavior
1076 * of the requester process in otherwise impossible ways. For example
1077 * it can delay the operation for arbitrary length of time allowing
1078 * DoS against the requester.
1079 *
1080 * For this reason only those processes can call into the filesystem,
1081 * for which the owner of the mount has ptrace privilege. This
1082 * excludes processes started by other users, suid or sgid processes.
1083 */
c2132c1b 1084int fuse_allow_current_process(struct fuse_conn *fc)
87729a55 1085{
c69e8d9c 1086 const struct cred *cred;
87729a55 1087
29433a29 1088 if (fc->allow_other)
73f03c2b 1089 return current_in_userns(fc->user_ns);
87729a55 1090
c2132c1b 1091 cred = current_cred();
499dcf20
EB
1092 if (uid_eq(cred->euid, fc->user_id) &&
1093 uid_eq(cred->suid, fc->user_id) &&
1094 uid_eq(cred->uid, fc->user_id) &&
1095 gid_eq(cred->egid, fc->group_id) &&
1096 gid_eq(cred->sgid, fc->group_id) &&
1097 gid_eq(cred->gid, fc->group_id))
c2132c1b 1098 return 1;
c69e8d9c 1099
c2132c1b 1100 return 0;
87729a55
MS
1101}
1102
31d40d74
MS
1103static int fuse_access(struct inode *inode, int mask)
1104{
1105 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1106 FUSE_ARGS(args);
31d40d74
MS
1107 struct fuse_access_in inarg;
1108 int err;
1109
698fa1d1
MS
1110 BUG_ON(mask & MAY_NOT_BLOCK);
1111
31d40d74
MS
1112 if (fc->no_access)
1113 return 0;
1114
31d40d74 1115 memset(&inarg, 0, sizeof(inarg));
e6305c43 1116 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
d5b48543
MS
1117 args.opcode = FUSE_ACCESS;
1118 args.nodeid = get_node_id(inode);
1119 args.in_numargs = 1;
1120 args.in_args[0].size = sizeof(inarg);
1121 args.in_args[0].value = &inarg;
7078187a 1122 err = fuse_simple_request(fc, &args);
31d40d74
MS
1123 if (err == -ENOSYS) {
1124 fc->no_access = 1;
1125 err = 0;
1126 }
1127 return err;
1128}
1129
10556cb2 1130static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1131{
10556cb2 1132 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1133 return -ECHILD;
1134
60bcc88a 1135 forget_all_cached_acls(inode);
19690ddb
MS
1136 return fuse_do_getattr(inode, NULL, NULL);
1137}
1138
6f9f1180
MS
1139/*
1140 * Check permission. The two basic access models of FUSE are:
1141 *
1142 * 1) Local access checking ('default_permissions' mount option) based
1143 * on file mode. This is the plain old disk filesystem permission
1144 * modell.
1145 *
1146 * 2) "Remote" access checking, where server is responsible for
1147 * checking permission in each inode operation. An exception to this
1148 * is if ->permission() was invoked from sys_access() in which case an
1149 * access request is sent. Execute permission is still checked
1150 * locally based on file mode.
1151 */
10556cb2 1152static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1153{
1154 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1155 bool refreshed = false;
1156 int err = 0;
e5e5558e 1157
c2132c1b 1158 if (!fuse_allow_current_process(fc))
e5e5558e 1159 return -EACCES;
244f6385
MS
1160
1161 /*
e8e96157 1162 * If attributes are needed, refresh them before proceeding
244f6385 1163 */
29433a29 1164 if (fc->default_permissions ||
e8e96157 1165 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb 1166 struct fuse_inode *fi = get_fuse_inode(inode);
d233c7dd 1167 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
19690ddb 1168
d233c7dd
MS
1169 if (perm_mask & READ_ONCE(fi->inval_mask) ||
1170 time_before64(fi->i_time, get_jiffies_64())) {
19690ddb
MS
1171 refreshed = true;
1172
10556cb2 1173 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1174 if (err)
1175 return err;
1176 }
244f6385
MS
1177 }
1178
29433a29 1179 if (fc->default_permissions) {
2830ba7f 1180 err = generic_permission(inode, mask);
1e9a4ed9
MS
1181
1182 /* If permission is denied, try to refresh file
1183 attributes. This is also needed, because the root
1184 node will at first have no permissions */
244f6385 1185 if (err == -EACCES && !refreshed) {
10556cb2 1186 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1187 if (!err)
2830ba7f 1188 err = generic_permission(inode, mask);
1e9a4ed9
MS
1189 }
1190
6f9f1180
MS
1191 /* Note: the opposite of the above test does not
1192 exist. So if permissions are revoked this won't be
1193 noticed immediately, only after the attribute
1194 timeout has expired */
9cfcac81 1195 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1196 err = fuse_access(inode, mask);
1197 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1198 if (!(inode->i_mode & S_IXUGO)) {
1199 if (refreshed)
1200 return -EACCES;
1201
10556cb2 1202 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1203 if (!err && !(inode->i_mode & S_IXUGO))
1204 return -EACCES;
1205 }
e5e5558e 1206 }
244f6385 1207 return err;
e5e5558e
MS
1208}
1209
5571f1e6 1210static int fuse_readlink_page(struct inode *inode, struct page *page)
e5e5558e 1211{
e5e5558e 1212 struct fuse_conn *fc = get_fuse_conn(inode);
4c29afec
MS
1213 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1214 struct fuse_args_pages ap = {
1215 .num_pages = 1,
1216 .pages = &page,
1217 .descs = &desc,
1218 };
1219 char *link;
1220 ssize_t res;
1221
1222 ap.args.opcode = FUSE_READLINK;
1223 ap.args.nodeid = get_node_id(inode);
1224 ap.args.out_pages = true;
1225 ap.args.out_argvar = true;
1226 ap.args.page_zeroing = true;
1227 ap.args.out_numargs = 1;
1228 ap.args.out_args[0].size = desc.length;
1229 res = fuse_simple_request(fc, &ap.args);
e5e5558e 1230
4c29afec 1231 fuse_invalidate_atime(inode);
6b255391 1232
4c29afec
MS
1233 if (res < 0)
1234 return res;
7078187a 1235
4c29afec
MS
1236 if (WARN_ON(res >= PAGE_SIZE))
1237 return -EIO;
5571f1e6 1238
4c29afec
MS
1239 link = page_address(page);
1240 link[res] = '\0';
5571f1e6 1241
4c29afec 1242 return 0;
5571f1e6
DS
1243}
1244
1245static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1246 struct delayed_call *callback)
1247{
1248 struct fuse_conn *fc = get_fuse_conn(inode);
1249 struct page *page;
1250 int err;
1251
1252 err = -EIO;
1253 if (is_bad_inode(inode))
1254 goto out_err;
1255
1256 if (fc->cache_symlinks)
1257 return page_get_link(dentry, inode, callback);
1258
1259 err = -ECHILD;
1260 if (!dentry)
1261 goto out_err;
1262
1263 page = alloc_page(GFP_KERNEL);
1264 err = -ENOMEM;
1265 if (!page)
1266 goto out_err;
1267
1268 err = fuse_readlink_page(inode, page);
1269 if (err) {
1270 __free_page(page);
1271 goto out_err;
1272 }
1273
1274 set_delayed_call(callback, page_put_link, page);
1275
1276 return page_address(page);
1277
1278out_err:
1279 return ERR_PTR(err);
e5e5558e
MS
1280}
1281
e5e5558e
MS
1282static int fuse_dir_open(struct inode *inode, struct file *file)
1283{
91fe96b4 1284 return fuse_open_common(inode, file, true);
e5e5558e
MS
1285}
1286
1287static int fuse_dir_release(struct inode *inode, struct file *file)
1288{
2e64ff15 1289 fuse_release_common(file, true);
8b0797a4
MS
1290
1291 return 0;
e5e5558e
MS
1292}
1293
02c24a82
JB
1294static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1295 int datasync)
82547981 1296{
a9c2d1e8
MS
1297 struct inode *inode = file->f_mapping->host;
1298 struct fuse_conn *fc = get_fuse_conn(inode);
1299 int err;
1300
1301 if (is_bad_inode(inode))
1302 return -EIO;
1303
1304 if (fc->no_fsyncdir)
1305 return 0;
1306
1307 inode_lock(inode);
1308 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1309 if (err == -ENOSYS) {
1310 fc->no_fsyncdir = 1;
1311 err = 0;
1312 }
1313 inode_unlock(inode);
1314
1315 return err;
82547981
MS
1316}
1317
b18da0c5
MS
1318static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1319 unsigned long arg)
1320{
1321 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1322
1323 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1324 if (fc->minor < 18)
1325 return -ENOTTY;
1326
1327 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1328}
1329
1330static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1331 unsigned long arg)
1332{
1333 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1334
1335 if (fc->minor < 18)
1336 return -ENOTTY;
1337
1338 return fuse_ioctl_common(file, cmd, arg,
1339 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1340}
1341
b0aa7606 1342static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
17637cba
MS
1343{
1344 /* Always update if mtime is explicitly set */
1345 if (ivalid & ATTR_MTIME_SET)
1346 return true;
1347
b0aa7606
MP
1348 /* Or if kernel i_mtime is the official one */
1349 if (trust_local_mtime)
1350 return true;
1351
17637cba
MS
1352 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1353 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1354 return false;
1355
1356 /* In all other cases update */
1357 return true;
1358}
1359
8cb08329
EB
1360static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1361 struct fuse_setattr_in *arg, bool trust_local_cmtime)
9e6268db
MS
1362{
1363 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1364
1365 if (ivalid & ATTR_MODE)
befc649c 1366 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1367 if (ivalid & ATTR_UID)
8cb08329 1368 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
9e6268db 1369 if (ivalid & ATTR_GID)
8cb08329 1370 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
9e6268db 1371 if (ivalid & ATTR_SIZE)
befc649c 1372 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1373 if (ivalid & ATTR_ATIME) {
1374 arg->valid |= FATTR_ATIME;
befc649c 1375 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1376 arg->atimensec = iattr->ia_atime.tv_nsec;
1377 if (!(ivalid & ATTR_ATIME_SET))
1378 arg->valid |= FATTR_ATIME_NOW;
1379 }
3ad22c62 1380 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
17637cba 1381 arg->valid |= FATTR_MTIME;
befc649c 1382 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba 1383 arg->mtimensec = iattr->ia_mtime.tv_nsec;
3ad22c62 1384 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
17637cba 1385 arg->valid |= FATTR_MTIME_NOW;
befc649c 1386 }
3ad22c62
MP
1387 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1388 arg->valid |= FATTR_CTIME;
1389 arg->ctime = iattr->ia_ctime.tv_sec;
1390 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1391 }
9e6268db
MS
1392}
1393
3be5a52b
MS
1394/*
1395 * Prevent concurrent writepages on inode
1396 *
1397 * This is done by adding a negative bias to the inode write counter
1398 * and waiting for all pending writes to finish.
1399 */
1400void fuse_set_nowrite(struct inode *inode)
1401{
3be5a52b
MS
1402 struct fuse_inode *fi = get_fuse_inode(inode);
1403
5955102c 1404 BUG_ON(!inode_is_locked(inode));
3be5a52b 1405
f15ecfef 1406 spin_lock(&fi->lock);
3be5a52b
MS
1407 BUG_ON(fi->writectr < 0);
1408 fi->writectr += FUSE_NOWRITE;
f15ecfef 1409 spin_unlock(&fi->lock);
3be5a52b
MS
1410 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1411}
1412
1413/*
1414 * Allow writepages on inode
1415 *
1416 * Remove the bias from the writecounter and send any queued
1417 * writepages.
1418 */
1419static void __fuse_release_nowrite(struct inode *inode)
1420{
1421 struct fuse_inode *fi = get_fuse_inode(inode);
1422
1423 BUG_ON(fi->writectr != FUSE_NOWRITE);
1424 fi->writectr = 0;
1425 fuse_flush_writepages(inode);
1426}
1427
1428void fuse_release_nowrite(struct inode *inode)
1429{
f15ecfef 1430 struct fuse_inode *fi = get_fuse_inode(inode);
3be5a52b 1431
f15ecfef 1432 spin_lock(&fi->lock);
3be5a52b 1433 __fuse_release_nowrite(inode);
f15ecfef 1434 spin_unlock(&fi->lock);
3be5a52b
MS
1435}
1436
7078187a 1437static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
b0aa7606
MP
1438 struct inode *inode,
1439 struct fuse_setattr_in *inarg_p,
1440 struct fuse_attr_out *outarg_p)
1441{
d5b48543
MS
1442 args->opcode = FUSE_SETATTR;
1443 args->nodeid = get_node_id(inode);
1444 args->in_numargs = 1;
1445 args->in_args[0].size = sizeof(*inarg_p);
1446 args->in_args[0].value = inarg_p;
1447 args->out_numargs = 1;
1448 args->out_args[0].size = sizeof(*outarg_p);
1449 args->out_args[0].value = outarg_p;
b0aa7606
MP
1450}
1451
1452/*
1453 * Flush inode->i_mtime to the server
1454 */
ab9e13f7 1455int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
b0aa7606 1456{
b0aa7606 1457 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1458 FUSE_ARGS(args);
b0aa7606
MP
1459 struct fuse_setattr_in inarg;
1460 struct fuse_attr_out outarg;
b0aa7606
MP
1461
1462 memset(&inarg, 0, sizeof(inarg));
1463 memset(&outarg, 0, sizeof(outarg));
1464
ab9e13f7 1465 inarg.valid = FATTR_MTIME;
b0aa7606
MP
1466 inarg.mtime = inode->i_mtime.tv_sec;
1467 inarg.mtimensec = inode->i_mtime.tv_nsec;
ab9e13f7
MP
1468 if (fc->minor >= 23) {
1469 inarg.valid |= FATTR_CTIME;
1470 inarg.ctime = inode->i_ctime.tv_sec;
1471 inarg.ctimensec = inode->i_ctime.tv_nsec;
1472 }
1e18bda8
MS
1473 if (ff) {
1474 inarg.valid |= FATTR_FH;
1475 inarg.fh = ff->fh;
1476 }
7078187a 1477 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
b0aa7606 1478
7078187a 1479 return fuse_simple_request(fc, &args);
b0aa7606
MP
1480}
1481
6f9f1180
MS
1482/*
1483 * Set attributes, and at the same time refresh them.
1484 *
1485 * Truncation is slightly complicated, because the 'truncate' request
1486 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1487 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1488 * and the actual truncation by hand.
6f9f1180 1489 */
62490330 1490int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
efb9fa9e 1491 struct file *file)
9e6268db 1492{
62490330 1493 struct inode *inode = d_inode(dentry);
9e6268db 1494 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1495 struct fuse_inode *fi = get_fuse_inode(inode);
7078187a 1496 FUSE_ARGS(args);
9e6268db
MS
1497 struct fuse_setattr_in inarg;
1498 struct fuse_attr_out outarg;
3be5a52b 1499 bool is_truncate = false;
8373200b 1500 bool is_wb = fc->writeback_cache;
3be5a52b 1501 loff_t oldsize;
9e6268db 1502 int err;
3ad22c62 1503 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
9e6268db 1504
29433a29 1505 if (!fc->default_permissions)
db78b877
CH
1506 attr->ia_valid |= ATTR_FORCE;
1507
31051c85 1508 err = setattr_prepare(dentry, attr);
db78b877
CH
1509 if (err)
1510 return err;
1e9a4ed9 1511
8d56addd 1512 if (attr->ia_valid & ATTR_OPEN) {
df0e91d4
MS
1513 /* This is coming from open(..., ... | O_TRUNC); */
1514 WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1515 WARN_ON(attr->ia_size != 0);
1516 if (fc->atomic_o_trunc) {
1517 /*
1518 * No need to send request to userspace, since actual
1519 * truncation has already been done by OPEN. But still
1520 * need to truncate page cache.
1521 */
1522 i_size_write(inode, 0);
1523 truncate_pagecache(inode, 0);
8d56addd 1524 return 0;
df0e91d4 1525 }
8d56addd
MS
1526 file = NULL;
1527 }
6ff958ed 1528
ab2257e9
MS
1529 if (attr->ia_valid & ATTR_SIZE) {
1530 if (WARN_ON(!S_ISREG(inode->i_mode)))
1531 return -EIO;
3be5a52b 1532 is_truncate = true;
ab2257e9 1533 }
9e6268db 1534
b24e7598
MS
1535 /* Flush dirty data/metadata before non-truncate SETATTR */
1536 if (is_wb && S_ISREG(inode->i_mode) &&
1537 attr->ia_valid &
1538 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1539 ATTR_TIMES_SET)) {
1540 err = write_inode_now(inode, true);
1541 if (err)
1542 return err;
1543
1544 fuse_set_nowrite(inode);
1545 fuse_release_nowrite(inode);
1546 }
1547
06a7c3c2 1548 if (is_truncate) {
3be5a52b 1549 fuse_set_nowrite(inode);
06a7c3c2 1550 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3ad22c62
MP
1551 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1552 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
06a7c3c2 1553 }
3be5a52b 1554
9e6268db 1555 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1556 memset(&outarg, 0, sizeof(outarg));
8cb08329 1557 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
49d4914f
MS
1558 if (file) {
1559 struct fuse_file *ff = file->private_data;
1560 inarg.valid |= FATTR_FH;
1561 inarg.fh = ff->fh;
1562 }
f3332114
MS
1563 if (attr->ia_valid & ATTR_SIZE) {
1564 /* For mandatory locking in truncate */
1565 inarg.valid |= FATTR_LOCKOWNER;
1566 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1567 }
7078187a
MS
1568 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1569 err = fuse_simple_request(fc, &args);
e00d2c2d
MS
1570 if (err) {
1571 if (err == -EINTR)
1572 fuse_invalidate_attr(inode);
3be5a52b 1573 goto error;
e00d2c2d 1574 }
9e6268db 1575
eb59bd17
MS
1576 if (fuse_invalid_attr(&outarg.attr) ||
1577 (inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e00d2c2d 1578 make_bad_inode(inode);
3be5a52b
MS
1579 err = -EIO;
1580 goto error;
1581 }
1582
f15ecfef 1583 spin_lock(&fi->lock);
b0aa7606 1584 /* the kernel maintains i_mtime locally */
3ad22c62
MP
1585 if (trust_local_cmtime) {
1586 if (attr->ia_valid & ATTR_MTIME)
1587 inode->i_mtime = attr->ia_mtime;
1588 if (attr->ia_valid & ATTR_CTIME)
1589 inode->i_ctime = attr->ia_ctime;
1e18bda8 1590 /* FIXME: clear I_DIRTY_SYNC? */
b0aa7606
MP
1591 }
1592
3be5a52b
MS
1593 fuse_change_attributes_common(inode, &outarg.attr,
1594 attr_timeout(&outarg));
1595 oldsize = inode->i_size;
8373200b
PE
1596 /* see the comment in fuse_change_attributes() */
1597 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode))
1598 i_size_write(inode, outarg.attr.size);
3be5a52b
MS
1599
1600 if (is_truncate) {
f15ecfef 1601 /* NOTE: this may release/reacquire fi->lock */
3be5a52b
MS
1602 __fuse_release_nowrite(inode);
1603 }
f15ecfef 1604 spin_unlock(&fi->lock);
3be5a52b
MS
1605
1606 /*
1607 * Only call invalidate_inode_pages2() after removing
1608 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1609 */
8373200b
PE
1610 if ((is_truncate || !is_wb) &&
1611 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
7caef267 1612 truncate_pagecache(inode, outarg.attr.size);
3be5a52b 1613 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1614 }
1615
06a7c3c2 1616 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
e00d2c2d 1617 return 0;
3be5a52b
MS
1618
1619error:
1620 if (is_truncate)
1621 fuse_release_nowrite(inode);
1622
06a7c3c2 1623 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3be5a52b 1624 return err;
9e6268db
MS
1625}
1626
49d4914f
MS
1627static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1628{
2b0143b5 1629 struct inode *inode = d_inode(entry);
5e940c1d 1630 struct fuse_conn *fc = get_fuse_conn(inode);
a09f99ed 1631 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
5e2b8828 1632 int ret;
efb9fa9e
MP
1633
1634 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1635 return -EACCES;
1636
a09f99ed 1637 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
a09f99ed
MS
1638 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1639 ATTR_MODE);
5e940c1d 1640
a09f99ed 1641 /*
5e940c1d
MS
1642 * The only sane way to reliably kill suid/sgid is to do it in
1643 * the userspace filesystem
1644 *
1645 * This should be done on write(), truncate() and chown().
a09f99ed 1646 */
5e940c1d 1647 if (!fc->handle_killpriv) {
5e940c1d
MS
1648 /*
1649 * ia_mode calculation may have used stale i_mode.
1650 * Refresh and recalculate.
1651 */
1652 ret = fuse_do_getattr(inode, NULL, file);
1653 if (ret)
1654 return ret;
1655
1656 attr->ia_mode = inode->i_mode;
c01638f5 1657 if (inode->i_mode & S_ISUID) {
5e940c1d
MS
1658 attr->ia_valid |= ATTR_MODE;
1659 attr->ia_mode &= ~S_ISUID;
1660 }
c01638f5 1661 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
5e940c1d
MS
1662 attr->ia_valid |= ATTR_MODE;
1663 attr->ia_mode &= ~S_ISGID;
1664 }
a09f99ed
MS
1665 }
1666 }
1667 if (!attr->ia_valid)
1668 return 0;
5e2b8828 1669
abb5a14f 1670 ret = fuse_do_setattr(entry, attr, file);
5e2b8828 1671 if (!ret) {
60bcc88a
SF
1672 /*
1673 * If filesystem supports acls it may have updated acl xattrs in
1674 * the filesystem, so forget cached acls for the inode.
1675 */
1676 if (fc->posix_acl)
1677 forget_all_cached_acls(inode);
1678
5e2b8828
MS
1679 /* Directory mode changed, may need to revalidate access */
1680 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1681 fuse_invalidate_entry_cache(entry);
1682 }
1683 return ret;
49d4914f
MS
1684}
1685
a528d35e
DH
1686static int fuse_getattr(const struct path *path, struct kstat *stat,
1687 u32 request_mask, unsigned int flags)
e5e5558e 1688{
a528d35e 1689 struct inode *inode = d_inode(path->dentry);
244f6385 1690 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385 1691
c2132c1b 1692 if (!fuse_allow_current_process(fc))
244f6385
MS
1693 return -EACCES;
1694
2f1e8196 1695 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
e5e5558e
MS
1696}
1697
754661f1 1698static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1699 .lookup = fuse_lookup,
9e6268db
MS
1700 .mkdir = fuse_mkdir,
1701 .symlink = fuse_symlink,
1702 .unlink = fuse_unlink,
1703 .rmdir = fuse_rmdir,
2773bf00 1704 .rename = fuse_rename2,
9e6268db
MS
1705 .link = fuse_link,
1706 .setattr = fuse_setattr,
1707 .create = fuse_create,
c8ccbe03 1708 .atomic_open = fuse_atomic_open,
9e6268db 1709 .mknod = fuse_mknod,
e5e5558e
MS
1710 .permission = fuse_permission,
1711 .getattr = fuse_getattr,
92a8780e 1712 .listxattr = fuse_listxattr,
60bcc88a
SF
1713 .get_acl = fuse_get_acl,
1714 .set_acl = fuse_set_acl,
e5e5558e
MS
1715};
1716
4b6f5d20 1717static const struct file_operations fuse_dir_operations = {
b6aeaded 1718 .llseek = generic_file_llseek,
e5e5558e 1719 .read = generic_read_dir,
d9b3dbdc 1720 .iterate_shared = fuse_readdir,
e5e5558e
MS
1721 .open = fuse_dir_open,
1722 .release = fuse_dir_release,
82547981 1723 .fsync = fuse_dir_fsync,
b18da0c5
MS
1724 .unlocked_ioctl = fuse_dir_ioctl,
1725 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1726};
1727
754661f1 1728static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1729 .setattr = fuse_setattr,
e5e5558e
MS
1730 .permission = fuse_permission,
1731 .getattr = fuse_getattr,
92a8780e 1732 .listxattr = fuse_listxattr,
60bcc88a
SF
1733 .get_acl = fuse_get_acl,
1734 .set_acl = fuse_set_acl,
e5e5558e
MS
1735};
1736
754661f1 1737static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1738 .setattr = fuse_setattr,
6b255391 1739 .get_link = fuse_get_link,
e5e5558e 1740 .getattr = fuse_getattr,
92a8780e 1741 .listxattr = fuse_listxattr,
e5e5558e
MS
1742};
1743
1744void fuse_init_common(struct inode *inode)
1745{
1746 inode->i_op = &fuse_common_inode_operations;
1747}
1748
1749void fuse_init_dir(struct inode *inode)
1750{
ab2257e9
MS
1751 struct fuse_inode *fi = get_fuse_inode(inode);
1752
e5e5558e
MS
1753 inode->i_op = &fuse_dir_inode_operations;
1754 inode->i_fop = &fuse_dir_operations;
ab2257e9
MS
1755
1756 spin_lock_init(&fi->rdc.lock);
1757 fi->rdc.cached = false;
1758 fi->rdc.size = 0;
1759 fi->rdc.pos = 0;
1760 fi->rdc.version = 0;
e5e5558e
MS
1761}
1762
5571f1e6
DS
1763static int fuse_symlink_readpage(struct file *null, struct page *page)
1764{
1765 int err = fuse_readlink_page(page->mapping->host, page);
1766
1767 if (!err)
1768 SetPageUptodate(page);
1769
1770 unlock_page(page);
1771
1772 return err;
1773}
1774
1775static const struct address_space_operations fuse_symlink_aops = {
1776 .readpage = fuse_symlink_readpage,
1777};
1778
e5e5558e
MS
1779void fuse_init_symlink(struct inode *inode)
1780{
1781 inode->i_op = &fuse_symlink_inode_operations;
5571f1e6
DS
1782 inode->i_data.a_ops = &fuse_symlink_aops;
1783 inode_nohighmem(inode);
e5e5558e 1784}