fuse: fix stat call on 32 bit platforms
[linux-block.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
e5e5558e 16
0a0898cf
MS
17#if BITS_PER_LONG >= 64
18static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
19{
20 entry->d_time = time;
21}
22
23static inline u64 fuse_dentry_time(struct dentry *entry)
24{
25 return entry->d_time;
26}
27#else
28/*
29 * On 32 bit archs store the high 32 bits of time in d_fsdata
30 */
31static void fuse_dentry_settime(struct dentry *entry, u64 time)
32{
33 entry->d_time = time;
34 entry->d_fsdata = (void *) (unsigned long) (time >> 32);
35}
36
37static u64 fuse_dentry_time(struct dentry *entry)
38{
39 return (u64) entry->d_time +
40 ((u64) (unsigned long) entry->d_fsdata << 32);
41}
42#endif
43
6f9f1180
MS
44/*
45 * FUSE caches dentries and attributes with separate timeout. The
46 * time in jiffies until the dentry/attributes are valid is stored in
47 * dentry->d_time and fuse_inode->i_time respectively.
48 */
49
50/*
51 * Calculate the time in jiffies until a dentry/attributes are valid
52 */
0a0898cf 53static u64 time_to_jiffies(unsigned long sec, unsigned long nsec)
e5e5558e 54{
685d16dd
MS
55 if (sec || nsec) {
56 struct timespec ts = {sec, nsec};
0a0898cf 57 return get_jiffies_64() + timespec_to_jiffies(&ts);
685d16dd 58 } else
0a0898cf 59 return 0;
e5e5558e
MS
60}
61
6f9f1180
MS
62/*
63 * Set dentry and possibly attribute timeouts from the lookup/mk*
64 * replies
65 */
1fb69e78
MS
66static void fuse_change_entry_timeout(struct dentry *entry,
67 struct fuse_entry_out *o)
0aa7c699 68{
0a0898cf
MS
69 fuse_dentry_settime(entry,
70 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
71}
72
73static u64 attr_timeout(struct fuse_attr_out *o)
74{
75 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
76}
77
78static u64 entry_attr_timeout(struct fuse_entry_out *o)
79{
80 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
81}
82
6f9f1180
MS
83/*
84 * Mark the attributes as stale, so that at the next call to
85 * ->getattr() they will be fetched from userspace
86 */
8cbdf1e6
MS
87void fuse_invalidate_attr(struct inode *inode)
88{
0a0898cf 89 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
90}
91
6f9f1180
MS
92/*
93 * Just mark the entry as stale, so that a next attempt to look it up
94 * will result in a new lookup call to userspace
95 *
96 * This is called when a dentry is about to become negative and the
97 * timeout is unknown (unlink, rmdir, rename and in some cases
98 * lookup)
99 */
dbd561d2 100void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 101{
0a0898cf 102 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
103}
104
6f9f1180
MS
105/*
106 * Same as fuse_invalidate_entry_cache(), but also try to remove the
107 * dentry from the hash
108 */
8cbdf1e6
MS
109static void fuse_invalidate_entry(struct dentry *entry)
110{
111 d_invalidate(entry);
112 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
113}
114
c180eebe
MS
115static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_req *req,
116 u64 nodeid, struct qstr *name,
e5e5558e
MS
117 struct fuse_entry_out *outarg)
118{
0e9663ee 119 memset(outarg, 0, sizeof(struct fuse_entry_out));
e5e5558e 120 req->in.h.opcode = FUSE_LOOKUP;
c180eebe 121 req->in.h.nodeid = nodeid;
e5e5558e 122 req->in.numargs = 1;
c180eebe
MS
123 req->in.args[0].size = name->len + 1;
124 req->in.args[0].value = name->name;
e5e5558e 125 req->out.numargs = 1;
0e9663ee
MS
126 if (fc->minor < 9)
127 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
128 else
129 req->out.args[0].size = sizeof(struct fuse_entry_out);
e5e5558e
MS
130 req->out.args[0].value = outarg;
131}
132
5c5c5e51 133u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
134{
135 u64 curr_version;
136
137 /*
138 * The spin lock isn't actually needed on 64bit archs, but we
139 * don't yet care too much about such optimizations.
140 */
141 spin_lock(&fc->lock);
142 curr_version = fc->attr_version;
143 spin_unlock(&fc->lock);
144
145 return curr_version;
146}
147
6f9f1180
MS
148/*
149 * Check whether the dentry is still valid
150 *
151 * If the entry validity timeout has expired and the dentry is
152 * positive, try to redo the lookup. If the lookup results in a
153 * different inode, then let the VFS invalidate the dentry and redo
154 * the lookup once more. If the lookup results in the same inode,
155 * then refresh the attributes, timeouts and mark the dentry valid.
156 */
e5e5558e
MS
157static int fuse_dentry_revalidate(struct dentry *entry, struct nameidata *nd)
158{
34286d66 159 struct inode *inode;
8cbdf1e6 160
e7c0a167 161 inode = ACCESS_ONCE(entry->d_inode);
8cbdf1e6 162 if (inode && is_bad_inode(inode))
e5e5558e 163 return 0;
0a0898cf 164 else if (fuse_dentry_time(entry) < get_jiffies_64()) {
e5e5558e 165 int err;
e5e5558e 166 struct fuse_entry_out outarg;
8cbdf1e6
MS
167 struct fuse_conn *fc;
168 struct fuse_req *req;
07e77dca 169 struct fuse_forget_link *forget;
e956edd0 170 struct dentry *parent;
1fb69e78 171 u64 attr_version;
8cbdf1e6 172
50322fe7 173 /* For negative dentries, always do a fresh lookup */
8cbdf1e6
MS
174 if (!inode)
175 return 0;
176
d2433905 177 if (nd && (nd->flags & LOOKUP_RCU))
e7c0a167
MS
178 return -ECHILD;
179
8cbdf1e6 180 fc = get_fuse_conn(inode);
ce1d5a49
MS
181 req = fuse_get_req(fc);
182 if (IS_ERR(req))
e5e5558e
MS
183 return 0;
184
07e77dca
MS
185 forget = fuse_alloc_forget();
186 if (!forget) {
2d51013e
MS
187 fuse_put_request(fc, req);
188 return 0;
189 }
190
7dca9fd3 191 attr_version = fuse_get_attr_version(fc);
1fb69e78 192
e956edd0 193 parent = dget_parent(entry);
c180eebe
MS
194 fuse_lookup_init(fc, req, get_node_id(parent->d_inode),
195 &entry->d_name, &outarg);
b93f858a 196 fuse_request_send(fc, req);
e956edd0 197 dput(parent);
e5e5558e 198 err = req->out.h.error;
2d51013e 199 fuse_put_request(fc, req);
50322fe7
MS
200 /* Zero nodeid is same as -ENOENT */
201 if (!err && !outarg.nodeid)
202 err = -ENOENT;
9e6268db 203 if (!err) {
8cbdf1e6 204 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 205 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 206 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
207 return 0;
208 }
8da5ff23 209 spin_lock(&fc->lock);
1729a16c 210 fi->nlookup++;
8da5ff23 211 spin_unlock(&fc->lock);
9e6268db 212 }
07e77dca 213 kfree(forget);
9e6268db 214 if (err || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e5e5558e
MS
215 return 0;
216
1fb69e78
MS
217 fuse_change_attributes(inode, &outarg.attr,
218 entry_attr_timeout(&outarg),
219 attr_version);
220 fuse_change_entry_timeout(entry, &outarg);
e5e5558e
MS
221 }
222 return 1;
223}
224
8bfc016d 225static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
226{
227 return !nodeid || nodeid == FUSE_ROOT_ID;
228}
229
4269590a 230const struct dentry_operations fuse_dentry_operations = {
e5e5558e
MS
231 .d_revalidate = fuse_dentry_revalidate,
232};
233
a5bfffac 234int fuse_valid_type(int m)
39ee059a
MS
235{
236 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
237 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
238}
239
d2a85164
MS
240/*
241 * Add a directory inode to a dentry, ensuring that no other dentry
242 * refers to this inode. Called with fc->inst_mutex.
243 */
0de6256d
MS
244static struct dentry *fuse_d_add_directory(struct dentry *entry,
245 struct inode *inode)
d2a85164
MS
246{
247 struct dentry *alias = d_find_alias(inode);
0de6256d 248 if (alias && !(alias->d_flags & DCACHE_DISCONNECTED)) {
d2a85164
MS
249 /* This tries to shrink the subtree below alias */
250 fuse_invalidate_entry(alias);
251 dput(alias);
252 if (!list_empty(&inode->i_dentry))
0de6256d
MS
253 return ERR_PTR(-EBUSY);
254 } else {
255 dput(alias);
d2a85164 256 }
0de6256d 257 return d_splice_alias(inode, entry);
d2a85164
MS
258}
259
c180eebe
MS
260int fuse_lookup_name(struct super_block *sb, u64 nodeid, struct qstr *name,
261 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 262{
c180eebe 263 struct fuse_conn *fc = get_fuse_conn_super(sb);
e5e5558e 264 struct fuse_req *req;
07e77dca 265 struct fuse_forget_link *forget;
1fb69e78 266 u64 attr_version;
c180eebe 267 int err;
e5e5558e 268
c180eebe
MS
269 *inode = NULL;
270 err = -ENAMETOOLONG;
271 if (name->len > FUSE_NAME_MAX)
272 goto out;
e5e5558e 273
ce1d5a49 274 req = fuse_get_req(fc);
c180eebe 275 err = PTR_ERR(req);
ce1d5a49 276 if (IS_ERR(req))
c180eebe 277 goto out;
e5e5558e 278
07e77dca
MS
279 forget = fuse_alloc_forget();
280 err = -ENOMEM;
281 if (!forget) {
2d51013e 282 fuse_put_request(fc, req);
c180eebe 283 goto out;
2d51013e
MS
284 }
285
7dca9fd3 286 attr_version = fuse_get_attr_version(fc);
1fb69e78 287
c180eebe 288 fuse_lookup_init(fc, req, nodeid, name, outarg);
b93f858a 289 fuse_request_send(fc, req);
e5e5558e 290 err = req->out.h.error;
2d51013e 291 fuse_put_request(fc, req);
50322fe7 292 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
293 if (err || !outarg->nodeid)
294 goto out_put_forget;
295
296 err = -EIO;
297 if (!outarg->nodeid)
298 goto out_put_forget;
299 if (!fuse_valid_type(outarg->attr.mode))
300 goto out_put_forget;
301
302 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
303 &outarg->attr, entry_attr_timeout(outarg),
304 attr_version);
305 err = -ENOMEM;
306 if (!*inode) {
07e77dca 307 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 308 goto out;
e5e5558e 309 }
c180eebe
MS
310 err = 0;
311
312 out_put_forget:
07e77dca 313 kfree(forget);
c180eebe
MS
314 out:
315 return err;
316}
317
318static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
319 struct nameidata *nd)
320{
321 int err;
322 struct fuse_entry_out outarg;
323 struct inode *inode;
324 struct dentry *newent;
325 struct fuse_conn *fc = get_fuse_conn(dir);
326 bool outarg_valid = true;
327
328 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
329 &outarg, &inode);
330 if (err == -ENOENT) {
331 outarg_valid = false;
332 err = 0;
333 }
334 if (err)
335 goto out_err;
336
337 err = -EIO;
338 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
339 goto out_iput;
e5e5558e 340
d2a85164
MS
341 if (inode && S_ISDIR(inode->i_mode)) {
342 mutex_lock(&fc->inst_mutex);
0de6256d 343 newent = fuse_d_add_directory(entry, inode);
d2a85164 344 mutex_unlock(&fc->inst_mutex);
c180eebe
MS
345 err = PTR_ERR(newent);
346 if (IS_ERR(newent))
347 goto out_iput;
348 } else {
0de6256d 349 newent = d_splice_alias(inode, entry);
c180eebe 350 }
d2a85164 351
0de6256d 352 entry = newent ? newent : entry;
c180eebe 353 if (outarg_valid)
1fb69e78 354 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
355 else
356 fuse_invalidate_entry_cache(entry);
c180eebe 357
0de6256d 358 return newent;
c180eebe
MS
359
360 out_iput:
361 iput(inode);
362 out_err:
363 return ERR_PTR(err);
e5e5558e
MS
364}
365
6f9f1180
MS
366/*
367 * Atomic create+open operation
368 *
369 * If the filesystem doesn't support this, then fall back to separate
370 * 'mknod' + 'open' requests.
371 */
541af6a0
AV
372static int fuse_create_open(struct inode *dir, struct dentry *entry,
373 umode_t mode, struct nameidata *nd)
fd72faac
MS
374{
375 int err;
376 struct inode *inode;
377 struct fuse_conn *fc = get_fuse_conn(dir);
378 struct fuse_req *req;
07e77dca 379 struct fuse_forget_link *forget;
e0a43ddc 380 struct fuse_create_in inarg;
fd72faac
MS
381 struct fuse_open_out outopen;
382 struct fuse_entry_out outentry;
fd72faac
MS
383 struct fuse_file *ff;
384 struct file *file;
8a5e929d 385 int flags = nd->intent.open.flags;
fd72faac 386
fd72faac 387 if (fc->no_create)
ce1d5a49 388 return -ENOSYS;
fd72faac 389
07e77dca
MS
390 forget = fuse_alloc_forget();
391 if (!forget)
392 return -ENOMEM;
51eb01e7 393
ce1d5a49 394 req = fuse_get_req(fc);
51eb01e7 395 err = PTR_ERR(req);
ce1d5a49 396 if (IS_ERR(req))
51eb01e7 397 goto out_put_forget_req;
fd72faac 398
ce1d5a49 399 err = -ENOMEM;
acf99433 400 ff = fuse_file_alloc(fc);
fd72faac
MS
401 if (!ff)
402 goto out_put_request;
403
e0a43ddc
MS
404 if (!fc->dont_mask)
405 mode &= ~current_umask();
406
fd72faac
MS
407 flags &= ~O_NOCTTY;
408 memset(&inarg, 0, sizeof(inarg));
0e9663ee 409 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
410 inarg.flags = flags;
411 inarg.mode = mode;
e0a43ddc 412 inarg.umask = current_umask();
fd72faac
MS
413 req->in.h.opcode = FUSE_CREATE;
414 req->in.h.nodeid = get_node_id(dir);
fd72faac 415 req->in.numargs = 2;
e0a43ddc
MS
416 req->in.args[0].size = fc->minor < 12 ? sizeof(struct fuse_open_in) :
417 sizeof(inarg);
fd72faac
MS
418 req->in.args[0].value = &inarg;
419 req->in.args[1].size = entry->d_name.len + 1;
420 req->in.args[1].value = entry->d_name.name;
421 req->out.numargs = 2;
0e9663ee
MS
422 if (fc->minor < 9)
423 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
424 else
425 req->out.args[0].size = sizeof(outentry);
fd72faac
MS
426 req->out.args[0].value = &outentry;
427 req->out.args[1].size = sizeof(outopen);
428 req->out.args[1].value = &outopen;
b93f858a 429 fuse_request_send(fc, req);
fd72faac
MS
430 err = req->out.h.error;
431 if (err) {
432 if (err == -ENOSYS)
433 fc->no_create = 1;
434 goto out_free_ff;
435 }
436
437 err = -EIO;
2827d0b2 438 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
439 goto out_free_ff;
440
51eb01e7 441 fuse_put_request(fc, req);
c7b7143c
MS
442 ff->fh = outopen.fh;
443 ff->nodeid = outentry.nodeid;
444 ff->open_flags = outopen.open_flags;
fd72faac 445 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 446 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
447 if (!inode) {
448 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 449 fuse_sync_release(ff, flags);
07e77dca 450 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
51eb01e7 451 return -ENOMEM;
fd72faac 452 }
07e77dca 453 kfree(forget);
fd72faac 454 d_instantiate(entry, inode);
1fb69e78 455 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 456 fuse_invalidate_attr(dir);
fd72faac
MS
457 file = lookup_instantiate_filp(nd, entry, generic_file_open);
458 if (IS_ERR(file)) {
8b0797a4 459 fuse_sync_release(ff, flags);
fd72faac
MS
460 return PTR_ERR(file);
461 }
c7b7143c
MS
462 file->private_data = fuse_file_get(ff);
463 fuse_finish_open(inode, file);
fd72faac
MS
464 return 0;
465
466 out_free_ff:
467 fuse_file_free(ff);
468 out_put_request:
469 fuse_put_request(fc, req);
51eb01e7 470 out_put_forget_req:
07e77dca 471 kfree(forget);
fd72faac
MS
472 return err;
473}
474
6f9f1180
MS
475/*
476 * Code shared between mknod, mkdir, symlink and link
477 */
9e6268db
MS
478static int create_new_entry(struct fuse_conn *fc, struct fuse_req *req,
479 struct inode *dir, struct dentry *entry,
541af6a0 480 umode_t mode)
9e6268db
MS
481{
482 struct fuse_entry_out outarg;
483 struct inode *inode;
9e6268db 484 int err;
07e77dca 485 struct fuse_forget_link *forget;
2d51013e 486
07e77dca
MS
487 forget = fuse_alloc_forget();
488 if (!forget) {
2d51013e 489 fuse_put_request(fc, req);
07e77dca 490 return -ENOMEM;
2d51013e 491 }
9e6268db 492
0e9663ee 493 memset(&outarg, 0, sizeof(outarg));
9e6268db 494 req->in.h.nodeid = get_node_id(dir);
9e6268db 495 req->out.numargs = 1;
0e9663ee
MS
496 if (fc->minor < 9)
497 req->out.args[0].size = FUSE_COMPAT_ENTRY_OUT_SIZE;
498 else
499 req->out.args[0].size = sizeof(outarg);
9e6268db 500 req->out.args[0].value = &outarg;
b93f858a 501 fuse_request_send(fc, req);
9e6268db 502 err = req->out.h.error;
2d51013e
MS
503 fuse_put_request(fc, req);
504 if (err)
505 goto out_put_forget_req;
506
39ee059a
MS
507 err = -EIO;
508 if (invalid_nodeid(outarg.nodeid))
2d51013e 509 goto out_put_forget_req;
39ee059a
MS
510
511 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 512 goto out_put_forget_req;
39ee059a 513
9e6268db 514 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 515 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 516 if (!inode) {
07e77dca 517 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
518 return -ENOMEM;
519 }
07e77dca 520 kfree(forget);
9e6268db 521
d2a85164
MS
522 if (S_ISDIR(inode->i_mode)) {
523 struct dentry *alias;
524 mutex_lock(&fc->inst_mutex);
525 alias = d_find_alias(inode);
526 if (alias) {
527 /* New directory must have moved since mkdir */
528 mutex_unlock(&fc->inst_mutex);
529 dput(alias);
530 iput(inode);
531 return -EBUSY;
532 }
533 d_instantiate(entry, inode);
534 mutex_unlock(&fc->inst_mutex);
535 } else
536 d_instantiate(entry, inode);
9e6268db 537
1fb69e78 538 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
539 fuse_invalidate_attr(dir);
540 return 0;
39ee059a 541
2d51013e 542 out_put_forget_req:
07e77dca 543 kfree(forget);
39ee059a 544 return err;
9e6268db
MS
545}
546
1a67aafb 547static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
548 dev_t rdev)
549{
550 struct fuse_mknod_in inarg;
551 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
552 struct fuse_req *req = fuse_get_req(fc);
553 if (IS_ERR(req))
554 return PTR_ERR(req);
9e6268db 555
e0a43ddc
MS
556 if (!fc->dont_mask)
557 mode &= ~current_umask();
558
9e6268db
MS
559 memset(&inarg, 0, sizeof(inarg));
560 inarg.mode = mode;
561 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 562 inarg.umask = current_umask();
9e6268db
MS
563 req->in.h.opcode = FUSE_MKNOD;
564 req->in.numargs = 2;
e0a43ddc
MS
565 req->in.args[0].size = fc->minor < 12 ? FUSE_COMPAT_MKNOD_IN_SIZE :
566 sizeof(inarg);
9e6268db
MS
567 req->in.args[0].value = &inarg;
568 req->in.args[1].size = entry->d_name.len + 1;
569 req->in.args[1].value = entry->d_name.name;
570 return create_new_entry(fc, req, dir, entry, mode);
571}
572
4acdaf27 573static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
574 struct nameidata *nd)
575{
dd7dd556 576 if (nd) {
fd72faac
MS
577 int err = fuse_create_open(dir, entry, mode, nd);
578 if (err != -ENOSYS)
579 return err;
580 /* Fall back on mknod */
581 }
9e6268db
MS
582 return fuse_mknod(dir, entry, mode, 0);
583}
584
18bb1db3 585static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
586{
587 struct fuse_mkdir_in inarg;
588 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
589 struct fuse_req *req = fuse_get_req(fc);
590 if (IS_ERR(req))
591 return PTR_ERR(req);
9e6268db 592
e0a43ddc
MS
593 if (!fc->dont_mask)
594 mode &= ~current_umask();
595
9e6268db
MS
596 memset(&inarg, 0, sizeof(inarg));
597 inarg.mode = mode;
e0a43ddc 598 inarg.umask = current_umask();
9e6268db
MS
599 req->in.h.opcode = FUSE_MKDIR;
600 req->in.numargs = 2;
601 req->in.args[0].size = sizeof(inarg);
602 req->in.args[0].value = &inarg;
603 req->in.args[1].size = entry->d_name.len + 1;
604 req->in.args[1].value = entry->d_name.name;
605 return create_new_entry(fc, req, dir, entry, S_IFDIR);
606}
607
608static int fuse_symlink(struct inode *dir, struct dentry *entry,
609 const char *link)
610{
611 struct fuse_conn *fc = get_fuse_conn(dir);
612 unsigned len = strlen(link) + 1;
ce1d5a49
MS
613 struct fuse_req *req = fuse_get_req(fc);
614 if (IS_ERR(req))
615 return PTR_ERR(req);
9e6268db
MS
616
617 req->in.h.opcode = FUSE_SYMLINK;
618 req->in.numargs = 2;
619 req->in.args[0].size = entry->d_name.len + 1;
620 req->in.args[0].value = entry->d_name.name;
621 req->in.args[1].size = len;
622 req->in.args[1].value = link;
623 return create_new_entry(fc, req, dir, entry, S_IFLNK);
624}
625
626static int fuse_unlink(struct inode *dir, struct dentry *entry)
627{
628 int err;
629 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
630 struct fuse_req *req = fuse_get_req(fc);
631 if (IS_ERR(req))
632 return PTR_ERR(req);
9e6268db
MS
633
634 req->in.h.opcode = FUSE_UNLINK;
635 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
636 req->in.numargs = 1;
637 req->in.args[0].size = entry->d_name.len + 1;
638 req->in.args[0].value = entry->d_name.name;
b93f858a 639 fuse_request_send(fc, req);
9e6268db
MS
640 err = req->out.h.error;
641 fuse_put_request(fc, req);
642 if (!err) {
643 struct inode *inode = entry->d_inode;
ac45d613 644 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 645
ac45d613
MS
646 spin_lock(&fc->lock);
647 fi->attr_version = ++fc->attr_version;
648 drop_nlink(inode);
649 spin_unlock(&fc->lock);
9e6268db
MS
650 fuse_invalidate_attr(inode);
651 fuse_invalidate_attr(dir);
8cbdf1e6 652 fuse_invalidate_entry_cache(entry);
9e6268db
MS
653 } else if (err == -EINTR)
654 fuse_invalidate_entry(entry);
655 return err;
656}
657
658static int fuse_rmdir(struct inode *dir, struct dentry *entry)
659{
660 int err;
661 struct fuse_conn *fc = get_fuse_conn(dir);
ce1d5a49
MS
662 struct fuse_req *req = fuse_get_req(fc);
663 if (IS_ERR(req))
664 return PTR_ERR(req);
9e6268db
MS
665
666 req->in.h.opcode = FUSE_RMDIR;
667 req->in.h.nodeid = get_node_id(dir);
9e6268db
MS
668 req->in.numargs = 1;
669 req->in.args[0].size = entry->d_name.len + 1;
670 req->in.args[0].value = entry->d_name.name;
b93f858a 671 fuse_request_send(fc, req);
9e6268db
MS
672 err = req->out.h.error;
673 fuse_put_request(fc, req);
674 if (!err) {
ce71ec36 675 clear_nlink(entry->d_inode);
9e6268db 676 fuse_invalidate_attr(dir);
8cbdf1e6 677 fuse_invalidate_entry_cache(entry);
9e6268db
MS
678 } else if (err == -EINTR)
679 fuse_invalidate_entry(entry);
680 return err;
681}
682
683static int fuse_rename(struct inode *olddir, struct dentry *oldent,
684 struct inode *newdir, struct dentry *newent)
685{
686 int err;
687 struct fuse_rename_in inarg;
688 struct fuse_conn *fc = get_fuse_conn(olddir);
ce1d5a49 689 struct fuse_req *req = fuse_get_req(fc);
e4eaac06 690
ce1d5a49
MS
691 if (IS_ERR(req))
692 return PTR_ERR(req);
9e6268db
MS
693
694 memset(&inarg, 0, sizeof(inarg));
695 inarg.newdir = get_node_id(newdir);
696 req->in.h.opcode = FUSE_RENAME;
697 req->in.h.nodeid = get_node_id(olddir);
9e6268db
MS
698 req->in.numargs = 3;
699 req->in.args[0].size = sizeof(inarg);
700 req->in.args[0].value = &inarg;
701 req->in.args[1].size = oldent->d_name.len + 1;
702 req->in.args[1].value = oldent->d_name.name;
703 req->in.args[2].size = newent->d_name.len + 1;
704 req->in.args[2].value = newent->d_name.name;
b93f858a 705 fuse_request_send(fc, req);
9e6268db
MS
706 err = req->out.h.error;
707 fuse_put_request(fc, req);
708 if (!err) {
08b63307
MS
709 /* ctime changes */
710 fuse_invalidate_attr(oldent->d_inode);
711
9e6268db
MS
712 fuse_invalidate_attr(olddir);
713 if (olddir != newdir)
714 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
715
716 /* newent will end up negative */
5219f346
MS
717 if (newent->d_inode) {
718 fuse_invalidate_attr(newent->d_inode);
8cbdf1e6 719 fuse_invalidate_entry_cache(newent);
5219f346 720 }
9e6268db
MS
721 } else if (err == -EINTR) {
722 /* If request was interrupted, DEITY only knows if the
723 rename actually took place. If the invalidation
724 fails (e.g. some process has CWD under the renamed
725 directory), then there can be inconsistency between
726 the dcache and the real filesystem. Tough luck. */
727 fuse_invalidate_entry(oldent);
728 if (newent->d_inode)
729 fuse_invalidate_entry(newent);
730 }
731
732 return err;
733}
734
735static int fuse_link(struct dentry *entry, struct inode *newdir,
736 struct dentry *newent)
737{
738 int err;
739 struct fuse_link_in inarg;
740 struct inode *inode = entry->d_inode;
741 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49
MS
742 struct fuse_req *req = fuse_get_req(fc);
743 if (IS_ERR(req))
744 return PTR_ERR(req);
9e6268db
MS
745
746 memset(&inarg, 0, sizeof(inarg));
747 inarg.oldnodeid = get_node_id(inode);
748 req->in.h.opcode = FUSE_LINK;
9e6268db
MS
749 req->in.numargs = 2;
750 req->in.args[0].size = sizeof(inarg);
751 req->in.args[0].value = &inarg;
752 req->in.args[1].size = newent->d_name.len + 1;
753 req->in.args[1].value = newent->d_name.name;
754 err = create_new_entry(fc, req, newdir, newent, inode->i_mode);
755 /* Contrary to "normal" filesystems it can happen that link
756 makes two "logical" inodes point to the same "physical"
757 inode. We invalidate the attributes of the old one, so it
758 will reflect changes in the backing inode (link count,
759 etc.)
760 */
ac45d613
MS
761 if (!err) {
762 struct fuse_inode *fi = get_fuse_inode(inode);
763
764 spin_lock(&fc->lock);
765 fi->attr_version = ++fc->attr_version;
766 inc_nlink(inode);
767 spin_unlock(&fc->lock);
9e6268db 768 fuse_invalidate_attr(inode);
ac45d613
MS
769 } else if (err == -EINTR) {
770 fuse_invalidate_attr(inode);
771 }
9e6268db
MS
772 return err;
773}
774
1fb69e78
MS
775static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
776 struct kstat *stat)
777{
778 stat->dev = inode->i_sb->s_dev;
779 stat->ino = attr->ino;
780 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
781 stat->nlink = attr->nlink;
782 stat->uid = attr->uid;
783 stat->gid = attr->gid;
784 stat->rdev = inode->i_rdev;
785 stat->atime.tv_sec = attr->atime;
786 stat->atime.tv_nsec = attr->atimensec;
787 stat->mtime.tv_sec = attr->mtime;
788 stat->mtime.tv_nsec = attr->mtimensec;
789 stat->ctime.tv_sec = attr->ctime;
790 stat->ctime.tv_nsec = attr->ctimensec;
791 stat->size = attr->size;
792 stat->blocks = attr->blocks;
793 stat->blksize = (1 << inode->i_blkbits);
794}
795
c79e322f
MS
796static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
797 struct file *file)
e5e5558e
MS
798{
799 int err;
c79e322f
MS
800 struct fuse_getattr_in inarg;
801 struct fuse_attr_out outarg;
e5e5558e 802 struct fuse_conn *fc = get_fuse_conn(inode);
1fb69e78
MS
803 struct fuse_req *req;
804 u64 attr_version;
805
806 req = fuse_get_req(fc);
ce1d5a49
MS
807 if (IS_ERR(req))
808 return PTR_ERR(req);
e5e5558e 809
7dca9fd3 810 attr_version = fuse_get_attr_version(fc);
1fb69e78 811
c79e322f 812 memset(&inarg, 0, sizeof(inarg));
0e9663ee 813 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
814 /* Directories have separate file-handle space */
815 if (file && S_ISREG(inode->i_mode)) {
816 struct fuse_file *ff = file->private_data;
817
818 inarg.getattr_flags |= FUSE_GETATTR_FH;
819 inarg.fh = ff->fh;
820 }
e5e5558e
MS
821 req->in.h.opcode = FUSE_GETATTR;
822 req->in.h.nodeid = get_node_id(inode);
c79e322f
MS
823 req->in.numargs = 1;
824 req->in.args[0].size = sizeof(inarg);
825 req->in.args[0].value = &inarg;
e5e5558e 826 req->out.numargs = 1;
0e9663ee
MS
827 if (fc->minor < 9)
828 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
829 else
830 req->out.args[0].size = sizeof(outarg);
c79e322f 831 req->out.args[0].value = &outarg;
b93f858a 832 fuse_request_send(fc, req);
e5e5558e
MS
833 err = req->out.h.error;
834 fuse_put_request(fc, req);
835 if (!err) {
c79e322f 836 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
837 make_bad_inode(inode);
838 err = -EIO;
839 } else {
c79e322f
MS
840 fuse_change_attributes(inode, &outarg.attr,
841 attr_timeout(&outarg),
1fb69e78
MS
842 attr_version);
843 if (stat)
c79e322f 844 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
845 }
846 }
847 return err;
848}
849
bcb4be80
MS
850int fuse_update_attributes(struct inode *inode, struct kstat *stat,
851 struct file *file, bool *refreshed)
852{
853 struct fuse_inode *fi = get_fuse_inode(inode);
854 int err;
855 bool r;
856
857 if (fi->i_time < get_jiffies_64()) {
858 r = true;
859 err = fuse_do_getattr(inode, stat, file);
860 } else {
861 r = false;
862 err = 0;
863 if (stat) {
864 generic_fillattr(inode, stat);
865 stat->mode = fi->orig_i_mode;
45c72cd7 866 stat->ino = fi->orig_ino;
bcb4be80
MS
867 }
868 }
869
870 if (refreshed != NULL)
871 *refreshed = r;
872
873 return err;
874}
875
3b463ae0 876int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 877 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
878{
879 int err = -ENOTDIR;
880 struct inode *parent;
881 struct dentry *dir;
882 struct dentry *entry;
883
884 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
885 if (!parent)
886 return -ENOENT;
887
888 mutex_lock(&parent->i_mutex);
889 if (!S_ISDIR(parent->i_mode))
890 goto unlock;
891
892 err = -ENOENT;
893 dir = d_find_alias(parent);
894 if (!dir)
895 goto unlock;
896
897 entry = d_lookup(dir, name);
898 dput(dir);
899 if (!entry)
900 goto unlock;
901
902 fuse_invalidate_attr(parent);
903 fuse_invalidate_entry(entry);
451d0f59
JM
904
905 if (child_nodeid != 0 && entry->d_inode) {
906 mutex_lock(&entry->d_inode->i_mutex);
907 if (get_node_id(entry->d_inode) != child_nodeid) {
908 err = -ENOENT;
909 goto badentry;
910 }
911 if (d_mountpoint(entry)) {
912 err = -EBUSY;
913 goto badentry;
914 }
915 if (S_ISDIR(entry->d_inode->i_mode)) {
916 shrink_dcache_parent(entry);
917 if (!simple_empty(entry)) {
918 err = -ENOTEMPTY;
919 goto badentry;
920 }
921 entry->d_inode->i_flags |= S_DEAD;
922 }
923 dont_mount(entry);
924 clear_nlink(entry->d_inode);
925 err = 0;
926 badentry:
927 mutex_unlock(&entry->d_inode->i_mutex);
928 if (!err)
929 d_delete(entry);
930 } else {
931 err = 0;
932 }
3b463ae0 933 dput(entry);
3b463ae0
JM
934
935 unlock:
936 mutex_unlock(&parent->i_mutex);
937 iput(parent);
938 return err;
939}
940
87729a55
MS
941/*
942 * Calling into a user-controlled filesystem gives the filesystem
943 * daemon ptrace-like capabilities over the requester process. This
944 * means, that the filesystem daemon is able to record the exact
945 * filesystem operations performed, and can also control the behavior
946 * of the requester process in otherwise impossible ways. For example
947 * it can delay the operation for arbitrary length of time allowing
948 * DoS against the requester.
949 *
950 * For this reason only those processes can call into the filesystem,
951 * for which the owner of the mount has ptrace privilege. This
952 * excludes processes started by other users, suid or sgid processes.
953 */
e57ac683 954int fuse_allow_task(struct fuse_conn *fc, struct task_struct *task)
87729a55 955{
c69e8d9c
DH
956 const struct cred *cred;
957 int ret;
87729a55 958
c69e8d9c 959 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
960 return 1;
961
c69e8d9c
DH
962 rcu_read_lock();
963 ret = 0;
964 cred = __task_cred(task);
965 if (cred->euid == fc->user_id &&
966 cred->suid == fc->user_id &&
967 cred->uid == fc->user_id &&
968 cred->egid == fc->group_id &&
969 cred->sgid == fc->group_id &&
970 cred->gid == fc->group_id)
971 ret = 1;
972 rcu_read_unlock();
973
974 return ret;
87729a55
MS
975}
976
31d40d74
MS
977static int fuse_access(struct inode *inode, int mask)
978{
979 struct fuse_conn *fc = get_fuse_conn(inode);
980 struct fuse_req *req;
981 struct fuse_access_in inarg;
982 int err;
983
984 if (fc->no_access)
985 return 0;
986
ce1d5a49
MS
987 req = fuse_get_req(fc);
988 if (IS_ERR(req))
989 return PTR_ERR(req);
31d40d74
MS
990
991 memset(&inarg, 0, sizeof(inarg));
e6305c43 992 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
31d40d74
MS
993 req->in.h.opcode = FUSE_ACCESS;
994 req->in.h.nodeid = get_node_id(inode);
31d40d74
MS
995 req->in.numargs = 1;
996 req->in.args[0].size = sizeof(inarg);
997 req->in.args[0].value = &inarg;
b93f858a 998 fuse_request_send(fc, req);
31d40d74
MS
999 err = req->out.h.error;
1000 fuse_put_request(fc, req);
1001 if (err == -ENOSYS) {
1002 fc->no_access = 1;
1003 err = 0;
1004 }
1005 return err;
1006}
1007
10556cb2 1008static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1009{
10556cb2 1010 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1011 return -ECHILD;
1012
1013 return fuse_do_getattr(inode, NULL, NULL);
1014}
1015
6f9f1180
MS
1016/*
1017 * Check permission. The two basic access models of FUSE are:
1018 *
1019 * 1) Local access checking ('default_permissions' mount option) based
1020 * on file mode. This is the plain old disk filesystem permission
1021 * modell.
1022 *
1023 * 2) "Remote" access checking, where server is responsible for
1024 * checking permission in each inode operation. An exception to this
1025 * is if ->permission() was invoked from sys_access() in which case an
1026 * access request is sent. Execute permission is still checked
1027 * locally based on file mode.
1028 */
10556cb2 1029static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1030{
1031 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1032 bool refreshed = false;
1033 int err = 0;
e5e5558e 1034
87729a55 1035 if (!fuse_allow_task(fc, current))
e5e5558e 1036 return -EACCES;
244f6385
MS
1037
1038 /*
e8e96157 1039 * If attributes are needed, refresh them before proceeding
244f6385 1040 */
e8e96157
MS
1041 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1042 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1043 struct fuse_inode *fi = get_fuse_inode(inode);
1044
1045 if (fi->i_time < get_jiffies_64()) {
1046 refreshed = true;
1047
10556cb2 1048 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1049 if (err)
1050 return err;
1051 }
244f6385
MS
1052 }
1053
1054 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
2830ba7f 1055 err = generic_permission(inode, mask);
1e9a4ed9
MS
1056
1057 /* If permission is denied, try to refresh file
1058 attributes. This is also needed, because the root
1059 node will at first have no permissions */
244f6385 1060 if (err == -EACCES && !refreshed) {
10556cb2 1061 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1062 if (!err)
2830ba7f 1063 err = generic_permission(inode, mask);
1e9a4ed9
MS
1064 }
1065
6f9f1180
MS
1066 /* Note: the opposite of the above test does not
1067 exist. So if permissions are revoked this won't be
1068 noticed immediately, only after the attribute
1069 timeout has expired */
9cfcac81 1070 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
10556cb2 1071 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1072 return -ECHILD;
1073
e8e96157
MS
1074 err = fuse_access(inode, mask);
1075 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1076 if (!(inode->i_mode & S_IXUGO)) {
1077 if (refreshed)
1078 return -EACCES;
1079
10556cb2 1080 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1081 if (!err && !(inode->i_mode & S_IXUGO))
1082 return -EACCES;
1083 }
e5e5558e 1084 }
244f6385 1085 return err;
e5e5558e
MS
1086}
1087
1088static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
1089 void *dstbuf, filldir_t filldir)
1090{
1091 while (nbytes >= FUSE_NAME_OFFSET) {
1092 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1093 size_t reclen = FUSE_DIRENT_SIZE(dirent);
1094 int over;
1095 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1096 return -EIO;
1097 if (reclen > nbytes)
1098 break;
1099
1100 over = filldir(dstbuf, dirent->name, dirent->namelen,
1101 file->f_pos, dirent->ino, dirent->type);
1102 if (over)
1103 break;
1104
1105 buf += reclen;
1106 nbytes -= reclen;
1107 file->f_pos = dirent->off;
1108 }
1109
1110 return 0;
1111}
1112
04730fef 1113static int fuse_readdir(struct file *file, void *dstbuf, filldir_t filldir)
e5e5558e 1114{
04730fef
MS
1115 int err;
1116 size_t nbytes;
1117 struct page *page;
7706a9d6 1118 struct inode *inode = file->f_path.dentry->d_inode;
e5e5558e 1119 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8
MS
1120 struct fuse_req *req;
1121
1122 if (is_bad_inode(inode))
1123 return -EIO;
1124
ce1d5a49
MS
1125 req = fuse_get_req(fc);
1126 if (IS_ERR(req))
1127 return PTR_ERR(req);
e5e5558e 1128
04730fef
MS
1129 page = alloc_page(GFP_KERNEL);
1130 if (!page) {
1131 fuse_put_request(fc, req);
1132 return -ENOMEM;
1133 }
f4975c67 1134 req->out.argpages = 1;
04730fef
MS
1135 req->num_pages = 1;
1136 req->pages[0] = page;
2106cb18 1137 fuse_read_fill(req, file, file->f_pos, PAGE_SIZE, FUSE_READDIR);
b93f858a 1138 fuse_request_send(fc, req);
361b1eb5 1139 nbytes = req->out.args[0].size;
e5e5558e
MS
1140 err = req->out.h.error;
1141 fuse_put_request(fc, req);
1142 if (!err)
04730fef
MS
1143 err = parse_dirfile(page_address(page), nbytes, file, dstbuf,
1144 filldir);
e5e5558e 1145
04730fef 1146 __free_page(page);
b36c31ba 1147 fuse_invalidate_attr(inode); /* atime changed */
04730fef 1148 return err;
e5e5558e
MS
1149}
1150
1151static char *read_link(struct dentry *dentry)
1152{
1153 struct inode *inode = dentry->d_inode;
1154 struct fuse_conn *fc = get_fuse_conn(inode);
ce1d5a49 1155 struct fuse_req *req = fuse_get_req(fc);
e5e5558e
MS
1156 char *link;
1157
ce1d5a49 1158 if (IS_ERR(req))
e231c2ee 1159 return ERR_CAST(req);
e5e5558e
MS
1160
1161 link = (char *) __get_free_page(GFP_KERNEL);
1162 if (!link) {
1163 link = ERR_PTR(-ENOMEM);
1164 goto out;
1165 }
1166 req->in.h.opcode = FUSE_READLINK;
1167 req->in.h.nodeid = get_node_id(inode);
e5e5558e
MS
1168 req->out.argvar = 1;
1169 req->out.numargs = 1;
1170 req->out.args[0].size = PAGE_SIZE - 1;
1171 req->out.args[0].value = link;
b93f858a 1172 fuse_request_send(fc, req);
e5e5558e
MS
1173 if (req->out.h.error) {
1174 free_page((unsigned long) link);
1175 link = ERR_PTR(req->out.h.error);
1176 } else
1177 link[req->out.args[0].size] = '\0';
1178 out:
1179 fuse_put_request(fc, req);
b36c31ba 1180 fuse_invalidate_attr(inode); /* atime changed */
e5e5558e
MS
1181 return link;
1182}
1183
1184static void free_link(char *link)
1185{
1186 if (!IS_ERR(link))
1187 free_page((unsigned long) link);
1188}
1189
1190static void *fuse_follow_link(struct dentry *dentry, struct nameidata *nd)
1191{
1192 nd_set_link(nd, read_link(dentry));
1193 return NULL;
1194}
1195
1196static void fuse_put_link(struct dentry *dentry, struct nameidata *nd, void *c)
1197{
1198 free_link(nd_get_link(nd));
1199}
1200
1201static int fuse_dir_open(struct inode *inode, struct file *file)
1202{
91fe96b4 1203 return fuse_open_common(inode, file, true);
e5e5558e
MS
1204}
1205
1206static int fuse_dir_release(struct inode *inode, struct file *file)
1207{
8b0797a4
MS
1208 fuse_release_common(file, FUSE_RELEASEDIR);
1209
1210 return 0;
e5e5558e
MS
1211}
1212
02c24a82
JB
1213static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1214 int datasync)
82547981 1215{
02c24a82 1216 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1217}
1218
b18da0c5
MS
1219static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1220 unsigned long arg)
1221{
1222 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1223
1224 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1225 if (fc->minor < 18)
1226 return -ENOTTY;
1227
1228 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1229}
1230
1231static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1232 unsigned long arg)
1233{
1234 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1235
1236 if (fc->minor < 18)
1237 return -ENOTTY;
1238
1239 return fuse_ioctl_common(file, cmd, arg,
1240 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1241}
1242
17637cba
MS
1243static bool update_mtime(unsigned ivalid)
1244{
1245 /* Always update if mtime is explicitly set */
1246 if (ivalid & ATTR_MTIME_SET)
1247 return true;
1248
1249 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1250 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1251 return false;
1252
1253 /* In all other cases update */
1254 return true;
1255}
1256
befc649c 1257static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg)
9e6268db
MS
1258{
1259 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1260
1261 if (ivalid & ATTR_MODE)
befc649c 1262 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1263 if (ivalid & ATTR_UID)
befc649c 1264 arg->valid |= FATTR_UID, arg->uid = iattr->ia_uid;
9e6268db 1265 if (ivalid & ATTR_GID)
befc649c 1266 arg->valid |= FATTR_GID, arg->gid = iattr->ia_gid;
9e6268db 1267 if (ivalid & ATTR_SIZE)
befc649c 1268 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1269 if (ivalid & ATTR_ATIME) {
1270 arg->valid |= FATTR_ATIME;
befc649c 1271 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1272 arg->atimensec = iattr->ia_atime.tv_nsec;
1273 if (!(ivalid & ATTR_ATIME_SET))
1274 arg->valid |= FATTR_ATIME_NOW;
1275 }
1276 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid)) {
1277 arg->valid |= FATTR_MTIME;
befc649c 1278 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba
MS
1279 arg->mtimensec = iattr->ia_mtime.tv_nsec;
1280 if (!(ivalid & ATTR_MTIME_SET))
1281 arg->valid |= FATTR_MTIME_NOW;
befc649c 1282 }
9e6268db
MS
1283}
1284
3be5a52b
MS
1285/*
1286 * Prevent concurrent writepages on inode
1287 *
1288 * This is done by adding a negative bias to the inode write counter
1289 * and waiting for all pending writes to finish.
1290 */
1291void fuse_set_nowrite(struct inode *inode)
1292{
1293 struct fuse_conn *fc = get_fuse_conn(inode);
1294 struct fuse_inode *fi = get_fuse_inode(inode);
1295
1296 BUG_ON(!mutex_is_locked(&inode->i_mutex));
1297
1298 spin_lock(&fc->lock);
1299 BUG_ON(fi->writectr < 0);
1300 fi->writectr += FUSE_NOWRITE;
1301 spin_unlock(&fc->lock);
1302 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1303}
1304
1305/*
1306 * Allow writepages on inode
1307 *
1308 * Remove the bias from the writecounter and send any queued
1309 * writepages.
1310 */
1311static void __fuse_release_nowrite(struct inode *inode)
1312{
1313 struct fuse_inode *fi = get_fuse_inode(inode);
1314
1315 BUG_ON(fi->writectr != FUSE_NOWRITE);
1316 fi->writectr = 0;
1317 fuse_flush_writepages(inode);
1318}
1319
1320void fuse_release_nowrite(struct inode *inode)
1321{
1322 struct fuse_conn *fc = get_fuse_conn(inode);
1323
1324 spin_lock(&fc->lock);
1325 __fuse_release_nowrite(inode);
1326 spin_unlock(&fc->lock);
1327}
1328
6f9f1180
MS
1329/*
1330 * Set attributes, and at the same time refresh them.
1331 *
1332 * Truncation is slightly complicated, because the 'truncate' request
1333 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1334 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1335 * and the actual truncation by hand.
6f9f1180 1336 */
49d4914f
MS
1337static int fuse_do_setattr(struct dentry *entry, struct iattr *attr,
1338 struct file *file)
9e6268db
MS
1339{
1340 struct inode *inode = entry->d_inode;
1341 struct fuse_conn *fc = get_fuse_conn(inode);
9e6268db
MS
1342 struct fuse_req *req;
1343 struct fuse_setattr_in inarg;
1344 struct fuse_attr_out outarg;
3be5a52b
MS
1345 bool is_truncate = false;
1346 loff_t oldsize;
9e6268db 1347 int err;
9e6268db 1348
e57ac683
MS
1349 if (!fuse_allow_task(fc, current))
1350 return -EACCES;
1351
db78b877
CH
1352 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1353 attr->ia_valid |= ATTR_FORCE;
1354
1355 err = inode_change_ok(inode, attr);
1356 if (err)
1357 return err;
1e9a4ed9 1358
8d56addd
MS
1359 if (attr->ia_valid & ATTR_OPEN) {
1360 if (fc->atomic_o_trunc)
1361 return 0;
1362 file = NULL;
1363 }
6ff958ed 1364
2c27c65e 1365 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1366 is_truncate = true;
9e6268db 1367
ce1d5a49
MS
1368 req = fuse_get_req(fc);
1369 if (IS_ERR(req))
1370 return PTR_ERR(req);
9e6268db 1371
3be5a52b
MS
1372 if (is_truncate)
1373 fuse_set_nowrite(inode);
1374
9e6268db 1375 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1376 memset(&outarg, 0, sizeof(outarg));
befc649c 1377 iattr_to_fattr(attr, &inarg);
49d4914f
MS
1378 if (file) {
1379 struct fuse_file *ff = file->private_data;
1380 inarg.valid |= FATTR_FH;
1381 inarg.fh = ff->fh;
1382 }
f3332114
MS
1383 if (attr->ia_valid & ATTR_SIZE) {
1384 /* For mandatory locking in truncate */
1385 inarg.valid |= FATTR_LOCKOWNER;
1386 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1387 }
9e6268db
MS
1388 req->in.h.opcode = FUSE_SETATTR;
1389 req->in.h.nodeid = get_node_id(inode);
9e6268db
MS
1390 req->in.numargs = 1;
1391 req->in.args[0].size = sizeof(inarg);
1392 req->in.args[0].value = &inarg;
1393 req->out.numargs = 1;
0e9663ee
MS
1394 if (fc->minor < 9)
1395 req->out.args[0].size = FUSE_COMPAT_ATTR_OUT_SIZE;
1396 else
1397 req->out.args[0].size = sizeof(outarg);
9e6268db 1398 req->out.args[0].value = &outarg;
b93f858a 1399 fuse_request_send(fc, req);
9e6268db
MS
1400 err = req->out.h.error;
1401 fuse_put_request(fc, req);
e00d2c2d
MS
1402 if (err) {
1403 if (err == -EINTR)
1404 fuse_invalidate_attr(inode);
3be5a52b 1405 goto error;
e00d2c2d 1406 }
9e6268db 1407
e00d2c2d
MS
1408 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1409 make_bad_inode(inode);
3be5a52b
MS
1410 err = -EIO;
1411 goto error;
1412 }
1413
1414 spin_lock(&fc->lock);
1415 fuse_change_attributes_common(inode, &outarg.attr,
1416 attr_timeout(&outarg));
1417 oldsize = inode->i_size;
1418 i_size_write(inode, outarg.attr.size);
1419
1420 if (is_truncate) {
1421 /* NOTE: this may release/reacquire fc->lock */
1422 __fuse_release_nowrite(inode);
1423 }
1424 spin_unlock(&fc->lock);
1425
1426 /*
1427 * Only call invalidate_inode_pages2() after removing
1428 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1429 */
1430 if (S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
c08d3b0e 1431 truncate_pagecache(inode, oldsize, outarg.attr.size);
3be5a52b 1432 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1433 }
1434
e00d2c2d 1435 return 0;
3be5a52b
MS
1436
1437error:
1438 if (is_truncate)
1439 fuse_release_nowrite(inode);
1440
1441 return err;
9e6268db
MS
1442}
1443
49d4914f
MS
1444static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1445{
1446 if (attr->ia_valid & ATTR_FILE)
1447 return fuse_do_setattr(entry, attr, attr->ia_file);
1448 else
1449 return fuse_do_setattr(entry, attr, NULL);
1450}
1451
e5e5558e
MS
1452static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1453 struct kstat *stat)
1454{
1455 struct inode *inode = entry->d_inode;
244f6385 1456 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1457
1458 if (!fuse_allow_task(fc, current))
1459 return -EACCES;
1460
bcb4be80 1461 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1462}
1463
92a8780e
MS
1464static int fuse_setxattr(struct dentry *entry, const char *name,
1465 const void *value, size_t size, int flags)
1466{
1467 struct inode *inode = entry->d_inode;
1468 struct fuse_conn *fc = get_fuse_conn(inode);
1469 struct fuse_req *req;
1470 struct fuse_setxattr_in inarg;
1471 int err;
1472
92a8780e
MS
1473 if (fc->no_setxattr)
1474 return -EOPNOTSUPP;
1475
ce1d5a49
MS
1476 req = fuse_get_req(fc);
1477 if (IS_ERR(req))
1478 return PTR_ERR(req);
92a8780e
MS
1479
1480 memset(&inarg, 0, sizeof(inarg));
1481 inarg.size = size;
1482 inarg.flags = flags;
1483 req->in.h.opcode = FUSE_SETXATTR;
1484 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1485 req->in.numargs = 3;
1486 req->in.args[0].size = sizeof(inarg);
1487 req->in.args[0].value = &inarg;
1488 req->in.args[1].size = strlen(name) + 1;
1489 req->in.args[1].value = name;
1490 req->in.args[2].size = size;
1491 req->in.args[2].value = value;
b93f858a 1492 fuse_request_send(fc, req);
92a8780e
MS
1493 err = req->out.h.error;
1494 fuse_put_request(fc, req);
1495 if (err == -ENOSYS) {
1496 fc->no_setxattr = 1;
1497 err = -EOPNOTSUPP;
1498 }
1499 return err;
1500}
1501
1502static ssize_t fuse_getxattr(struct dentry *entry, const char *name,
1503 void *value, size_t size)
1504{
1505 struct inode *inode = entry->d_inode;
1506 struct fuse_conn *fc = get_fuse_conn(inode);
1507 struct fuse_req *req;
1508 struct fuse_getxattr_in inarg;
1509 struct fuse_getxattr_out outarg;
1510 ssize_t ret;
1511
1512 if (fc->no_getxattr)
1513 return -EOPNOTSUPP;
1514
ce1d5a49
MS
1515 req = fuse_get_req(fc);
1516 if (IS_ERR(req))
1517 return PTR_ERR(req);
92a8780e
MS
1518
1519 memset(&inarg, 0, sizeof(inarg));
1520 inarg.size = size;
1521 req->in.h.opcode = FUSE_GETXATTR;
1522 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1523 req->in.numargs = 2;
1524 req->in.args[0].size = sizeof(inarg);
1525 req->in.args[0].value = &inarg;
1526 req->in.args[1].size = strlen(name) + 1;
1527 req->in.args[1].value = name;
1528 /* This is really two different operations rolled into one */
1529 req->out.numargs = 1;
1530 if (size) {
1531 req->out.argvar = 1;
1532 req->out.args[0].size = size;
1533 req->out.args[0].value = value;
1534 } else {
1535 req->out.args[0].size = sizeof(outarg);
1536 req->out.args[0].value = &outarg;
1537 }
b93f858a 1538 fuse_request_send(fc, req);
92a8780e
MS
1539 ret = req->out.h.error;
1540 if (!ret)
1541 ret = size ? req->out.args[0].size : outarg.size;
1542 else {
1543 if (ret == -ENOSYS) {
1544 fc->no_getxattr = 1;
1545 ret = -EOPNOTSUPP;
1546 }
1547 }
1548 fuse_put_request(fc, req);
1549 return ret;
1550}
1551
1552static ssize_t fuse_listxattr(struct dentry *entry, char *list, size_t size)
1553{
1554 struct inode *inode = entry->d_inode;
1555 struct fuse_conn *fc = get_fuse_conn(inode);
1556 struct fuse_req *req;
1557 struct fuse_getxattr_in inarg;
1558 struct fuse_getxattr_out outarg;
1559 ssize_t ret;
1560
e57ac683
MS
1561 if (!fuse_allow_task(fc, current))
1562 return -EACCES;
1563
92a8780e
MS
1564 if (fc->no_listxattr)
1565 return -EOPNOTSUPP;
1566
ce1d5a49
MS
1567 req = fuse_get_req(fc);
1568 if (IS_ERR(req))
1569 return PTR_ERR(req);
92a8780e
MS
1570
1571 memset(&inarg, 0, sizeof(inarg));
1572 inarg.size = size;
1573 req->in.h.opcode = FUSE_LISTXATTR;
1574 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1575 req->in.numargs = 1;
1576 req->in.args[0].size = sizeof(inarg);
1577 req->in.args[0].value = &inarg;
1578 /* This is really two different operations rolled into one */
1579 req->out.numargs = 1;
1580 if (size) {
1581 req->out.argvar = 1;
1582 req->out.args[0].size = size;
1583 req->out.args[0].value = list;
1584 } else {
1585 req->out.args[0].size = sizeof(outarg);
1586 req->out.args[0].value = &outarg;
1587 }
b93f858a 1588 fuse_request_send(fc, req);
92a8780e
MS
1589 ret = req->out.h.error;
1590 if (!ret)
1591 ret = size ? req->out.args[0].size : outarg.size;
1592 else {
1593 if (ret == -ENOSYS) {
1594 fc->no_listxattr = 1;
1595 ret = -EOPNOTSUPP;
1596 }
1597 }
1598 fuse_put_request(fc, req);
1599 return ret;
1600}
1601
1602static int fuse_removexattr(struct dentry *entry, const char *name)
1603{
1604 struct inode *inode = entry->d_inode;
1605 struct fuse_conn *fc = get_fuse_conn(inode);
1606 struct fuse_req *req;
1607 int err;
1608
1609 if (fc->no_removexattr)
1610 return -EOPNOTSUPP;
1611
ce1d5a49
MS
1612 req = fuse_get_req(fc);
1613 if (IS_ERR(req))
1614 return PTR_ERR(req);
92a8780e
MS
1615
1616 req->in.h.opcode = FUSE_REMOVEXATTR;
1617 req->in.h.nodeid = get_node_id(inode);
92a8780e
MS
1618 req->in.numargs = 1;
1619 req->in.args[0].size = strlen(name) + 1;
1620 req->in.args[0].value = name;
b93f858a 1621 fuse_request_send(fc, req);
92a8780e
MS
1622 err = req->out.h.error;
1623 fuse_put_request(fc, req);
1624 if (err == -ENOSYS) {
1625 fc->no_removexattr = 1;
1626 err = -EOPNOTSUPP;
1627 }
1628 return err;
1629}
1630
754661f1 1631static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1632 .lookup = fuse_lookup,
9e6268db
MS
1633 .mkdir = fuse_mkdir,
1634 .symlink = fuse_symlink,
1635 .unlink = fuse_unlink,
1636 .rmdir = fuse_rmdir,
1637 .rename = fuse_rename,
1638 .link = fuse_link,
1639 .setattr = fuse_setattr,
1640 .create = fuse_create,
1641 .mknod = fuse_mknod,
e5e5558e
MS
1642 .permission = fuse_permission,
1643 .getattr = fuse_getattr,
92a8780e
MS
1644 .setxattr = fuse_setxattr,
1645 .getxattr = fuse_getxattr,
1646 .listxattr = fuse_listxattr,
1647 .removexattr = fuse_removexattr,
e5e5558e
MS
1648};
1649
4b6f5d20 1650static const struct file_operations fuse_dir_operations = {
b6aeaded 1651 .llseek = generic_file_llseek,
e5e5558e
MS
1652 .read = generic_read_dir,
1653 .readdir = fuse_readdir,
1654 .open = fuse_dir_open,
1655 .release = fuse_dir_release,
82547981 1656 .fsync = fuse_dir_fsync,
b18da0c5
MS
1657 .unlocked_ioctl = fuse_dir_ioctl,
1658 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1659};
1660
754661f1 1661static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1662 .setattr = fuse_setattr,
e5e5558e
MS
1663 .permission = fuse_permission,
1664 .getattr = fuse_getattr,
92a8780e
MS
1665 .setxattr = fuse_setxattr,
1666 .getxattr = fuse_getxattr,
1667 .listxattr = fuse_listxattr,
1668 .removexattr = fuse_removexattr,
e5e5558e
MS
1669};
1670
754661f1 1671static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1672 .setattr = fuse_setattr,
e5e5558e
MS
1673 .follow_link = fuse_follow_link,
1674 .put_link = fuse_put_link,
1675 .readlink = generic_readlink,
1676 .getattr = fuse_getattr,
92a8780e
MS
1677 .setxattr = fuse_setxattr,
1678 .getxattr = fuse_getxattr,
1679 .listxattr = fuse_listxattr,
1680 .removexattr = fuse_removexattr,
e5e5558e
MS
1681};
1682
1683void fuse_init_common(struct inode *inode)
1684{
1685 inode->i_op = &fuse_common_inode_operations;
1686}
1687
1688void fuse_init_dir(struct inode *inode)
1689{
1690 inode->i_op = &fuse_dir_inode_operations;
1691 inode->i_fop = &fuse_dir_operations;
1692}
1693
1694void fuse_init_symlink(struct inode *inode)
1695{
1696 inode->i_op = &fuse_symlink_inode_operations;
1697}