fuse: Fix oops at process_init_reply()
[linux-2.6-block.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
703c7362 16#include <linux/xattr.h>
60bcc88a 17#include <linux/posix_acl.h>
e5e5558e 18
8d3af7f3 19static bool fuse_use_readdirplus(struct inode *dir, struct dir_context *ctx)
4582a4ab
FS
20{
21 struct fuse_conn *fc = get_fuse_conn(dir);
22 struct fuse_inode *fi = get_fuse_inode(dir);
23
24 if (!fc->do_readdirplus)
25 return false;
634734b6
EW
26 if (!fc->readdirplus_auto)
27 return true;
4582a4ab
FS
28 if (test_and_clear_bit(FUSE_I_ADVISE_RDPLUS, &fi->state))
29 return true;
8d3af7f3 30 if (ctx->pos == 0)
4582a4ab
FS
31 return true;
32 return false;
33}
34
35static void fuse_advise_use_readdirplus(struct inode *dir)
36{
37 struct fuse_inode *fi = get_fuse_inode(dir);
38
39 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
40}
41
f75fdf22
MS
42union fuse_dentry {
43 u64 time;
44 struct rcu_head rcu;
45};
46
0a0898cf
MS
47static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
48{
f75fdf22 49 ((union fuse_dentry *) entry->d_fsdata)->time = time;
0a0898cf
MS
50}
51
52static inline u64 fuse_dentry_time(struct dentry *entry)
53{
f75fdf22 54 return ((union fuse_dentry *) entry->d_fsdata)->time;
0a0898cf 55}
0a0898cf 56
6f9f1180
MS
57/*
58 * FUSE caches dentries and attributes with separate timeout. The
59 * time in jiffies until the dentry/attributes are valid is stored in
f75fdf22 60 * dentry->d_fsdata and fuse_inode->i_time respectively.
6f9f1180
MS
61 */
62
63/*
64 * Calculate the time in jiffies until a dentry/attributes are valid
65 */
bcb6f6d2 66static u64 time_to_jiffies(u64 sec, u32 nsec)
e5e5558e 67{
685d16dd 68 if (sec || nsec) {
bcb6f6d2
MS
69 struct timespec64 ts = {
70 sec,
21067527 71 min_t(u32, nsec, NSEC_PER_SEC - 1)
bcb6f6d2
MS
72 };
73
74 return get_jiffies_64() + timespec64_to_jiffies(&ts);
685d16dd 75 } else
0a0898cf 76 return 0;
e5e5558e
MS
77}
78
6f9f1180
MS
79/*
80 * Set dentry and possibly attribute timeouts from the lookup/mk*
81 * replies
82 */
1fb69e78
MS
83static void fuse_change_entry_timeout(struct dentry *entry,
84 struct fuse_entry_out *o)
0aa7c699 85{
0a0898cf
MS
86 fuse_dentry_settime(entry,
87 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
88}
89
90static u64 attr_timeout(struct fuse_attr_out *o)
91{
92 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
93}
94
95static u64 entry_attr_timeout(struct fuse_entry_out *o)
96{
97 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
98}
99
6f9f1180
MS
100/*
101 * Mark the attributes as stale, so that at the next call to
102 * ->getattr() they will be fetched from userspace
103 */
8cbdf1e6
MS
104void fuse_invalidate_attr(struct inode *inode)
105{
0a0898cf 106 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
107}
108
451418fc
AG
109/**
110 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
111 * atime is not used.
112 */
113void fuse_invalidate_atime(struct inode *inode)
114{
115 if (!IS_RDONLY(inode))
116 fuse_invalidate_attr(inode);
117}
118
6f9f1180
MS
119/*
120 * Just mark the entry as stale, so that a next attempt to look it up
121 * will result in a new lookup call to userspace
122 *
123 * This is called when a dentry is about to become negative and the
124 * timeout is unknown (unlink, rmdir, rename and in some cases
125 * lookup)
126 */
dbd561d2 127void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 128{
0a0898cf 129 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
130}
131
6f9f1180
MS
132/*
133 * Same as fuse_invalidate_entry_cache(), but also try to remove the
134 * dentry from the hash
135 */
8cbdf1e6
MS
136static void fuse_invalidate_entry(struct dentry *entry)
137{
138 d_invalidate(entry);
139 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
140}
141
7078187a 142static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
13983d06 143 u64 nodeid, const struct qstr *name,
e5e5558e
MS
144 struct fuse_entry_out *outarg)
145{
0e9663ee 146 memset(outarg, 0, sizeof(struct fuse_entry_out));
7078187a
MS
147 args->in.h.opcode = FUSE_LOOKUP;
148 args->in.h.nodeid = nodeid;
149 args->in.numargs = 1;
150 args->in.args[0].size = name->len + 1;
151 args->in.args[0].value = name->name;
152 args->out.numargs = 1;
21f62174 153 args->out.args[0].size = sizeof(struct fuse_entry_out);
7078187a 154 args->out.args[0].value = outarg;
e5e5558e
MS
155}
156
5c5c5e51 157u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
158{
159 u64 curr_version;
160
161 /*
162 * The spin lock isn't actually needed on 64bit archs, but we
163 * don't yet care too much about such optimizations.
164 */
165 spin_lock(&fc->lock);
166 curr_version = fc->attr_version;
167 spin_unlock(&fc->lock);
168
169 return curr_version;
170}
171
6f9f1180
MS
172/*
173 * Check whether the dentry is still valid
174 *
175 * If the entry validity timeout has expired and the dentry is
176 * positive, try to redo the lookup. If the lookup results in a
177 * different inode, then let the VFS invalidate the dentry and redo
178 * the lookup once more. If the lookup results in the same inode,
179 * then refresh the attributes, timeouts and mark the dentry valid.
180 */
0b728e19 181static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
e5e5558e 182{
34286d66 183 struct inode *inode;
28420dad
MS
184 struct dentry *parent;
185 struct fuse_conn *fc;
6314efee 186 struct fuse_inode *fi;
e2a6b952 187 int ret;
8cbdf1e6 188
2b0143b5 189 inode = d_inode_rcu(entry);
8cbdf1e6 190 if (inode && is_bad_inode(inode))
e2a6b952 191 goto invalid;
154210cc
AA
192 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
193 (flags & LOOKUP_REVAL)) {
e5e5558e 194 struct fuse_entry_out outarg;
7078187a 195 FUSE_ARGS(args);
07e77dca 196 struct fuse_forget_link *forget;
1fb69e78 197 u64 attr_version;
8cbdf1e6 198
50322fe7 199 /* For negative dentries, always do a fresh lookup */
8cbdf1e6 200 if (!inode)
e2a6b952 201 goto invalid;
8cbdf1e6 202
e2a6b952 203 ret = -ECHILD;
0b728e19 204 if (flags & LOOKUP_RCU)
e2a6b952 205 goto out;
e7c0a167 206
8cbdf1e6 207 fc = get_fuse_conn(inode);
e5e5558e 208
07e77dca 209 forget = fuse_alloc_forget();
7078187a
MS
210 ret = -ENOMEM;
211 if (!forget)
e2a6b952 212 goto out;
2d51013e 213
7dca9fd3 214 attr_version = fuse_get_attr_version(fc);
1fb69e78 215
e956edd0 216 parent = dget_parent(entry);
2b0143b5 217 fuse_lookup_init(fc, &args, get_node_id(d_inode(parent)),
c180eebe 218 &entry->d_name, &outarg);
7078187a 219 ret = fuse_simple_request(fc, &args);
e956edd0 220 dput(parent);
50322fe7 221 /* Zero nodeid is same as -ENOENT */
7078187a
MS
222 if (!ret && !outarg.nodeid)
223 ret = -ENOENT;
224 if (!ret) {
6314efee 225 fi = get_fuse_inode(inode);
9e6268db 226 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 227 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
e2a6b952 228 goto invalid;
9e6268db 229 }
8da5ff23 230 spin_lock(&fc->lock);
1729a16c 231 fi->nlookup++;
8da5ff23 232 spin_unlock(&fc->lock);
9e6268db 233 }
07e77dca 234 kfree(forget);
7078187a
MS
235 if (ret == -ENOMEM)
236 goto out;
237 if (ret || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e2a6b952 238 goto invalid;
e5e5558e 239
60bcc88a 240 forget_all_cached_acls(inode);
1fb69e78
MS
241 fuse_change_attributes(inode, &outarg.attr,
242 entry_attr_timeout(&outarg),
243 attr_version);
244 fuse_change_entry_timeout(entry, &outarg);
28420dad 245 } else if (inode) {
6314efee
MS
246 fi = get_fuse_inode(inode);
247 if (flags & LOOKUP_RCU) {
248 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
249 return -ECHILD;
250 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
28420dad 251 parent = dget_parent(entry);
2b0143b5 252 fuse_advise_use_readdirplus(d_inode(parent));
28420dad
MS
253 dput(parent);
254 }
e5e5558e 255 }
e2a6b952
MS
256 ret = 1;
257out:
258 return ret;
259
260invalid:
261 ret = 0;
262 goto out;
e5e5558e
MS
263}
264
8bfc016d 265static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
266{
267 return !nodeid || nodeid == FUSE_ROOT_ID;
268}
269
f75fdf22
MS
270static int fuse_dentry_init(struct dentry *dentry)
271{
272 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), GFP_KERNEL);
273
274 return dentry->d_fsdata ? 0 : -ENOMEM;
275}
276static void fuse_dentry_release(struct dentry *dentry)
277{
278 union fuse_dentry *fd = dentry->d_fsdata;
279
280 kfree_rcu(fd, rcu);
281}
282
4269590a 283const struct dentry_operations fuse_dentry_operations = {
e5e5558e 284 .d_revalidate = fuse_dentry_revalidate,
f75fdf22
MS
285 .d_init = fuse_dentry_init,
286 .d_release = fuse_dentry_release,
e5e5558e
MS
287};
288
0ce267ff
MS
289const struct dentry_operations fuse_root_dentry_operations = {
290 .d_init = fuse_dentry_init,
291 .d_release = fuse_dentry_release,
292};
293
a5bfffac 294int fuse_valid_type(int m)
39ee059a
MS
295{
296 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
297 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
298}
299
13983d06 300int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
c180eebe 301 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 302{
c180eebe 303 struct fuse_conn *fc = get_fuse_conn_super(sb);
7078187a 304 FUSE_ARGS(args);
07e77dca 305 struct fuse_forget_link *forget;
1fb69e78 306 u64 attr_version;
c180eebe 307 int err;
e5e5558e 308
c180eebe
MS
309 *inode = NULL;
310 err = -ENAMETOOLONG;
311 if (name->len > FUSE_NAME_MAX)
312 goto out;
e5e5558e 313
e5e5558e 314
07e77dca
MS
315 forget = fuse_alloc_forget();
316 err = -ENOMEM;
7078187a 317 if (!forget)
c180eebe 318 goto out;
2d51013e 319
7dca9fd3 320 attr_version = fuse_get_attr_version(fc);
1fb69e78 321
7078187a
MS
322 fuse_lookup_init(fc, &args, nodeid, name, outarg);
323 err = fuse_simple_request(fc, &args);
50322fe7 324 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
325 if (err || !outarg->nodeid)
326 goto out_put_forget;
327
328 err = -EIO;
329 if (!outarg->nodeid)
330 goto out_put_forget;
331 if (!fuse_valid_type(outarg->attr.mode))
332 goto out_put_forget;
333
334 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
335 &outarg->attr, entry_attr_timeout(outarg),
336 attr_version);
337 err = -ENOMEM;
338 if (!*inode) {
07e77dca 339 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 340 goto out;
e5e5558e 341 }
c180eebe
MS
342 err = 0;
343
344 out_put_forget:
07e77dca 345 kfree(forget);
c180eebe
MS
346 out:
347 return err;
348}
349
350static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
00cd8dd3 351 unsigned int flags)
c180eebe
MS
352{
353 int err;
354 struct fuse_entry_out outarg;
355 struct inode *inode;
356 struct dentry *newent;
c180eebe
MS
357 bool outarg_valid = true;
358
5c672ab3 359 fuse_lock_inode(dir);
c180eebe
MS
360 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
361 &outarg, &inode);
5c672ab3 362 fuse_unlock_inode(dir);
c180eebe
MS
363 if (err == -ENOENT) {
364 outarg_valid = false;
365 err = 0;
366 }
367 if (err)
368 goto out_err;
369
370 err = -EIO;
371 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
372 goto out_iput;
e5e5558e 373
41d28bca 374 newent = d_splice_alias(inode, entry);
5835f339
MS
375 err = PTR_ERR(newent);
376 if (IS_ERR(newent))
377 goto out_err;
d2a85164 378
0de6256d 379 entry = newent ? newent : entry;
c180eebe 380 if (outarg_valid)
1fb69e78 381 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
382 else
383 fuse_invalidate_entry_cache(entry);
c180eebe 384
4582a4ab 385 fuse_advise_use_readdirplus(dir);
0de6256d 386 return newent;
c180eebe
MS
387
388 out_iput:
389 iput(inode);
390 out_err:
391 return ERR_PTR(err);
e5e5558e
MS
392}
393
6f9f1180
MS
394/*
395 * Atomic create+open operation
396 *
397 * If the filesystem doesn't support this, then fall back to separate
398 * 'mknod' + 'open' requests.
399 */
d9585277 400static int fuse_create_open(struct inode *dir, struct dentry *entry,
30d90494 401 struct file *file, unsigned flags,
d9585277 402 umode_t mode, int *opened)
fd72faac
MS
403{
404 int err;
405 struct inode *inode;
406 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 407 FUSE_ARGS(args);
07e77dca 408 struct fuse_forget_link *forget;
e0a43ddc 409 struct fuse_create_in inarg;
fd72faac
MS
410 struct fuse_open_out outopen;
411 struct fuse_entry_out outentry;
fd72faac 412 struct fuse_file *ff;
fd72faac 413
af109bca
MS
414 /* Userspace expects S_IFREG in create mode */
415 BUG_ON((mode & S_IFMT) != S_IFREG);
416
07e77dca 417 forget = fuse_alloc_forget();
c8ccbe03 418 err = -ENOMEM;
07e77dca 419 if (!forget)
c8ccbe03 420 goto out_err;
51eb01e7 421
ce1d5a49 422 err = -ENOMEM;
acf99433 423 ff = fuse_file_alloc(fc);
fd72faac 424 if (!ff)
7078187a 425 goto out_put_forget_req;
fd72faac 426
e0a43ddc
MS
427 if (!fc->dont_mask)
428 mode &= ~current_umask();
429
fd72faac
MS
430 flags &= ~O_NOCTTY;
431 memset(&inarg, 0, sizeof(inarg));
0e9663ee 432 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
433 inarg.flags = flags;
434 inarg.mode = mode;
e0a43ddc 435 inarg.umask = current_umask();
7078187a
MS
436 args.in.h.opcode = FUSE_CREATE;
437 args.in.h.nodeid = get_node_id(dir);
438 args.in.numargs = 2;
21f62174 439 args.in.args[0].size = sizeof(inarg);
7078187a
MS
440 args.in.args[0].value = &inarg;
441 args.in.args[1].size = entry->d_name.len + 1;
442 args.in.args[1].value = entry->d_name.name;
443 args.out.numargs = 2;
21f62174 444 args.out.args[0].size = sizeof(outentry);
7078187a
MS
445 args.out.args[0].value = &outentry;
446 args.out.args[1].size = sizeof(outopen);
447 args.out.args[1].value = &outopen;
448 err = fuse_simple_request(fc, &args);
c8ccbe03 449 if (err)
fd72faac 450 goto out_free_ff;
fd72faac
MS
451
452 err = -EIO;
2827d0b2 453 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
454 goto out_free_ff;
455
c7b7143c
MS
456 ff->fh = outopen.fh;
457 ff->nodeid = outentry.nodeid;
458 ff->open_flags = outopen.open_flags;
fd72faac 459 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 460 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
461 if (!inode) {
462 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 463 fuse_sync_release(ff, flags);
07e77dca 464 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
465 err = -ENOMEM;
466 goto out_err;
fd72faac 467 }
07e77dca 468 kfree(forget);
fd72faac 469 d_instantiate(entry, inode);
1fb69e78 470 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 471 fuse_invalidate_attr(dir);
30d90494
AV
472 err = finish_open(file, entry, generic_file_open, opened);
473 if (err) {
8b0797a4 474 fuse_sync_release(ff, flags);
c8ccbe03 475 } else {
267d8444 476 file->private_data = ff;
c8ccbe03 477 fuse_finish_open(inode, file);
fd72faac 478 }
d9585277 479 return err;
fd72faac 480
c8ccbe03 481out_free_ff:
fd72faac 482 fuse_file_free(ff);
c8ccbe03 483out_put_forget_req:
07e77dca 484 kfree(forget);
c8ccbe03 485out_err:
d9585277 486 return err;
c8ccbe03
MS
487}
488
489static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
d9585277 490static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
30d90494 491 struct file *file, unsigned flags,
d9585277 492 umode_t mode, int *opened)
c8ccbe03
MS
493{
494 int err;
495 struct fuse_conn *fc = get_fuse_conn(dir);
c8ccbe03
MS
496 struct dentry *res = NULL;
497
00699ad8 498 if (d_in_lookup(entry)) {
00cd8dd3 499 res = fuse_lookup(dir, entry, 0);
c8ccbe03 500 if (IS_ERR(res))
d9585277 501 return PTR_ERR(res);
c8ccbe03
MS
502
503 if (res)
504 entry = res;
505 }
506
2b0143b5 507 if (!(flags & O_CREAT) || d_really_is_positive(entry))
c8ccbe03
MS
508 goto no_open;
509
510 /* Only creates */
47237687 511 *opened |= FILE_CREATED;
c8ccbe03
MS
512
513 if (fc->no_create)
514 goto mknod;
515
30d90494 516 err = fuse_create_open(dir, entry, file, flags, mode, opened);
d9585277 517 if (err == -ENOSYS) {
c8ccbe03
MS
518 fc->no_create = 1;
519 goto mknod;
520 }
521out_dput:
522 dput(res);
d9585277 523 return err;
c8ccbe03
MS
524
525mknod:
526 err = fuse_mknod(dir, entry, mode, 0);
d9585277 527 if (err)
c8ccbe03 528 goto out_dput;
c8ccbe03 529no_open:
e45198a6 530 return finish_no_open(file, res);
fd72faac
MS
531}
532
6f9f1180
MS
533/*
534 * Code shared between mknod, mkdir, symlink and link
535 */
7078187a 536static int create_new_entry(struct fuse_conn *fc, struct fuse_args *args,
9e6268db 537 struct inode *dir, struct dentry *entry,
541af6a0 538 umode_t mode)
9e6268db
MS
539{
540 struct fuse_entry_out outarg;
541 struct inode *inode;
9e6268db 542 int err;
07e77dca 543 struct fuse_forget_link *forget;
2d51013e 544
07e77dca 545 forget = fuse_alloc_forget();
7078187a 546 if (!forget)
07e77dca 547 return -ENOMEM;
9e6268db 548
0e9663ee 549 memset(&outarg, 0, sizeof(outarg));
7078187a
MS
550 args->in.h.nodeid = get_node_id(dir);
551 args->out.numargs = 1;
21f62174 552 args->out.args[0].size = sizeof(outarg);
7078187a
MS
553 args->out.args[0].value = &outarg;
554 err = fuse_simple_request(fc, args);
2d51013e
MS
555 if (err)
556 goto out_put_forget_req;
557
39ee059a
MS
558 err = -EIO;
559 if (invalid_nodeid(outarg.nodeid))
2d51013e 560 goto out_put_forget_req;
39ee059a
MS
561
562 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 563 goto out_put_forget_req;
39ee059a 564
9e6268db 565 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 566 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 567 if (!inode) {
07e77dca 568 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
569 return -ENOMEM;
570 }
07e77dca 571 kfree(forget);
9e6268db 572
b70a80e7
MS
573 err = d_instantiate_no_diralias(entry, inode);
574 if (err)
575 return err;
9e6268db 576
1fb69e78 577 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
578 fuse_invalidate_attr(dir);
579 return 0;
39ee059a 580
2d51013e 581 out_put_forget_req:
07e77dca 582 kfree(forget);
39ee059a 583 return err;
9e6268db
MS
584}
585
1a67aafb 586static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
587 dev_t rdev)
588{
589 struct fuse_mknod_in inarg;
590 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 591 FUSE_ARGS(args);
9e6268db 592
e0a43ddc
MS
593 if (!fc->dont_mask)
594 mode &= ~current_umask();
595
9e6268db
MS
596 memset(&inarg, 0, sizeof(inarg));
597 inarg.mode = mode;
598 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 599 inarg.umask = current_umask();
7078187a
MS
600 args.in.h.opcode = FUSE_MKNOD;
601 args.in.numargs = 2;
21f62174 602 args.in.args[0].size = sizeof(inarg);
7078187a
MS
603 args.in.args[0].value = &inarg;
604 args.in.args[1].size = entry->d_name.len + 1;
605 args.in.args[1].value = entry->d_name.name;
606 return create_new_entry(fc, &args, dir, entry, mode);
9e6268db
MS
607}
608
4acdaf27 609static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
ebfc3b49 610 bool excl)
9e6268db
MS
611{
612 return fuse_mknod(dir, entry, mode, 0);
613}
614
18bb1db3 615static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
616{
617 struct fuse_mkdir_in inarg;
618 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 619 FUSE_ARGS(args);
9e6268db 620
e0a43ddc
MS
621 if (!fc->dont_mask)
622 mode &= ~current_umask();
623
9e6268db
MS
624 memset(&inarg, 0, sizeof(inarg));
625 inarg.mode = mode;
e0a43ddc 626 inarg.umask = current_umask();
7078187a
MS
627 args.in.h.opcode = FUSE_MKDIR;
628 args.in.numargs = 2;
629 args.in.args[0].size = sizeof(inarg);
630 args.in.args[0].value = &inarg;
631 args.in.args[1].size = entry->d_name.len + 1;
632 args.in.args[1].value = entry->d_name.name;
633 return create_new_entry(fc, &args, dir, entry, S_IFDIR);
9e6268db
MS
634}
635
636static int fuse_symlink(struct inode *dir, struct dentry *entry,
637 const char *link)
638{
639 struct fuse_conn *fc = get_fuse_conn(dir);
640 unsigned len = strlen(link) + 1;
7078187a 641 FUSE_ARGS(args);
9e6268db 642
7078187a
MS
643 args.in.h.opcode = FUSE_SYMLINK;
644 args.in.numargs = 2;
645 args.in.args[0].size = entry->d_name.len + 1;
646 args.in.args[0].value = entry->d_name.name;
647 args.in.args[1].size = len;
648 args.in.args[1].value = link;
649 return create_new_entry(fc, &args, dir, entry, S_IFLNK);
9e6268db
MS
650}
651
703c7362 652void fuse_update_ctime(struct inode *inode)
31f3267b
MP
653{
654 if (!IS_NOCMTIME(inode)) {
c2050a45 655 inode->i_ctime = current_time(inode);
31f3267b
MP
656 mark_inode_dirty_sync(inode);
657 }
658}
659
9e6268db
MS
660static int fuse_unlink(struct inode *dir, struct dentry *entry)
661{
662 int err;
663 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
664 FUSE_ARGS(args);
665
666 args.in.h.opcode = FUSE_UNLINK;
667 args.in.h.nodeid = get_node_id(dir);
668 args.in.numargs = 1;
669 args.in.args[0].size = entry->d_name.len + 1;
670 args.in.args[0].value = entry->d_name.name;
671 err = fuse_simple_request(fc, &args);
9e6268db 672 if (!err) {
2b0143b5 673 struct inode *inode = d_inode(entry);
ac45d613 674 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 675
ac45d613
MS
676 spin_lock(&fc->lock);
677 fi->attr_version = ++fc->attr_version;
dfca7ceb
MS
678 /*
679 * If i_nlink == 0 then unlink doesn't make sense, yet this can
680 * happen if userspace filesystem is careless. It would be
681 * difficult to enforce correct nlink usage so just ignore this
682 * condition here
683 */
684 if (inode->i_nlink > 0)
685 drop_nlink(inode);
ac45d613 686 spin_unlock(&fc->lock);
9e6268db
MS
687 fuse_invalidate_attr(inode);
688 fuse_invalidate_attr(dir);
8cbdf1e6 689 fuse_invalidate_entry_cache(entry);
31f3267b 690 fuse_update_ctime(inode);
9e6268db
MS
691 } else if (err == -EINTR)
692 fuse_invalidate_entry(entry);
693 return err;
694}
695
696static int fuse_rmdir(struct inode *dir, struct dentry *entry)
697{
698 int err;
699 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
700 FUSE_ARGS(args);
701
702 args.in.h.opcode = FUSE_RMDIR;
703 args.in.h.nodeid = get_node_id(dir);
704 args.in.numargs = 1;
705 args.in.args[0].size = entry->d_name.len + 1;
706 args.in.args[0].value = entry->d_name.name;
707 err = fuse_simple_request(fc, &args);
9e6268db 708 if (!err) {
2b0143b5 709 clear_nlink(d_inode(entry));
9e6268db 710 fuse_invalidate_attr(dir);
8cbdf1e6 711 fuse_invalidate_entry_cache(entry);
9e6268db
MS
712 } else if (err == -EINTR)
713 fuse_invalidate_entry(entry);
714 return err;
715}
716
1560c974
MS
717static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
718 struct inode *newdir, struct dentry *newent,
719 unsigned int flags, int opcode, size_t argsize)
9e6268db
MS
720{
721 int err;
1560c974 722 struct fuse_rename2_in inarg;
9e6268db 723 struct fuse_conn *fc = get_fuse_conn(olddir);
7078187a 724 FUSE_ARGS(args);
9e6268db 725
1560c974 726 memset(&inarg, 0, argsize);
9e6268db 727 inarg.newdir = get_node_id(newdir);
1560c974 728 inarg.flags = flags;
7078187a
MS
729 args.in.h.opcode = opcode;
730 args.in.h.nodeid = get_node_id(olddir);
731 args.in.numargs = 3;
732 args.in.args[0].size = argsize;
733 args.in.args[0].value = &inarg;
734 args.in.args[1].size = oldent->d_name.len + 1;
735 args.in.args[1].value = oldent->d_name.name;
736 args.in.args[2].size = newent->d_name.len + 1;
737 args.in.args[2].value = newent->d_name.name;
738 err = fuse_simple_request(fc, &args);
9e6268db 739 if (!err) {
08b63307 740 /* ctime changes */
2b0143b5
DH
741 fuse_invalidate_attr(d_inode(oldent));
742 fuse_update_ctime(d_inode(oldent));
08b63307 743
1560c974 744 if (flags & RENAME_EXCHANGE) {
2b0143b5
DH
745 fuse_invalidate_attr(d_inode(newent));
746 fuse_update_ctime(d_inode(newent));
1560c974
MS
747 }
748
9e6268db
MS
749 fuse_invalidate_attr(olddir);
750 if (olddir != newdir)
751 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
752
753 /* newent will end up negative */
2b0143b5
DH
754 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) {
755 fuse_invalidate_attr(d_inode(newent));
8cbdf1e6 756 fuse_invalidate_entry_cache(newent);
2b0143b5 757 fuse_update_ctime(d_inode(newent));
5219f346 758 }
9e6268db
MS
759 } else if (err == -EINTR) {
760 /* If request was interrupted, DEITY only knows if the
761 rename actually took place. If the invalidation
762 fails (e.g. some process has CWD under the renamed
763 directory), then there can be inconsistency between
764 the dcache and the real filesystem. Tough luck. */
765 fuse_invalidate_entry(oldent);
2b0143b5 766 if (d_really_is_positive(newent))
9e6268db
MS
767 fuse_invalidate_entry(newent);
768 }
769
770 return err;
771}
772
1560c974
MS
773static int fuse_rename2(struct inode *olddir, struct dentry *oldent,
774 struct inode *newdir, struct dentry *newent,
775 unsigned int flags)
776{
777 struct fuse_conn *fc = get_fuse_conn(olddir);
778 int err;
779
780 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE))
781 return -EINVAL;
782
4237ba43
MS
783 if (flags) {
784 if (fc->no_rename2 || fc->minor < 23)
785 return -EINVAL;
1560c974 786
4237ba43
MS
787 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
788 FUSE_RENAME2,
789 sizeof(struct fuse_rename2_in));
790 if (err == -ENOSYS) {
791 fc->no_rename2 = 1;
792 err = -EINVAL;
793 }
794 } else {
795 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
796 FUSE_RENAME,
797 sizeof(struct fuse_rename_in));
1560c974 798 }
4237ba43 799
1560c974 800 return err;
4237ba43 801}
1560c974 802
9e6268db
MS
803static int fuse_link(struct dentry *entry, struct inode *newdir,
804 struct dentry *newent)
805{
806 int err;
807 struct fuse_link_in inarg;
2b0143b5 808 struct inode *inode = d_inode(entry);
9e6268db 809 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 810 FUSE_ARGS(args);
9e6268db
MS
811
812 memset(&inarg, 0, sizeof(inarg));
813 inarg.oldnodeid = get_node_id(inode);
7078187a
MS
814 args.in.h.opcode = FUSE_LINK;
815 args.in.numargs = 2;
816 args.in.args[0].size = sizeof(inarg);
817 args.in.args[0].value = &inarg;
818 args.in.args[1].size = newent->d_name.len + 1;
819 args.in.args[1].value = newent->d_name.name;
820 err = create_new_entry(fc, &args, newdir, newent, inode->i_mode);
9e6268db
MS
821 /* Contrary to "normal" filesystems it can happen that link
822 makes two "logical" inodes point to the same "physical"
823 inode. We invalidate the attributes of the old one, so it
824 will reflect changes in the backing inode (link count,
825 etc.)
826 */
ac45d613
MS
827 if (!err) {
828 struct fuse_inode *fi = get_fuse_inode(inode);
829
830 spin_lock(&fc->lock);
831 fi->attr_version = ++fc->attr_version;
832 inc_nlink(inode);
833 spin_unlock(&fc->lock);
9e6268db 834 fuse_invalidate_attr(inode);
31f3267b 835 fuse_update_ctime(inode);
ac45d613
MS
836 } else if (err == -EINTR) {
837 fuse_invalidate_attr(inode);
838 }
9e6268db
MS
839 return err;
840}
841
1fb69e78
MS
842static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
843 struct kstat *stat)
844{
203627bb 845 unsigned int blkbits;
8373200b
PE
846 struct fuse_conn *fc = get_fuse_conn(inode);
847
848 /* see the comment in fuse_change_attributes() */
b0aa7606 849 if (fc->writeback_cache && S_ISREG(inode->i_mode)) {
8373200b 850 attr->size = i_size_read(inode);
b0aa7606
MP
851 attr->mtime = inode->i_mtime.tv_sec;
852 attr->mtimensec = inode->i_mtime.tv_nsec;
31f3267b
MP
853 attr->ctime = inode->i_ctime.tv_sec;
854 attr->ctimensec = inode->i_ctime.tv_nsec;
b0aa7606 855 }
203627bb 856
1fb69e78
MS
857 stat->dev = inode->i_sb->s_dev;
858 stat->ino = attr->ino;
859 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
860 stat->nlink = attr->nlink;
8cb08329
EB
861 stat->uid = make_kuid(fc->user_ns, attr->uid);
862 stat->gid = make_kgid(fc->user_ns, attr->gid);
1fb69e78
MS
863 stat->rdev = inode->i_rdev;
864 stat->atime.tv_sec = attr->atime;
865 stat->atime.tv_nsec = attr->atimensec;
866 stat->mtime.tv_sec = attr->mtime;
867 stat->mtime.tv_nsec = attr->mtimensec;
868 stat->ctime.tv_sec = attr->ctime;
869 stat->ctime.tv_nsec = attr->ctimensec;
870 stat->size = attr->size;
871 stat->blocks = attr->blocks;
203627bb
MS
872
873 if (attr->blksize != 0)
874 blkbits = ilog2(attr->blksize);
875 else
876 blkbits = inode->i_sb->s_blocksize_bits;
877
878 stat->blksize = 1 << blkbits;
1fb69e78
MS
879}
880
c79e322f
MS
881static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
882 struct file *file)
e5e5558e
MS
883{
884 int err;
c79e322f
MS
885 struct fuse_getattr_in inarg;
886 struct fuse_attr_out outarg;
e5e5558e 887 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 888 FUSE_ARGS(args);
1fb69e78
MS
889 u64 attr_version;
890
7dca9fd3 891 attr_version = fuse_get_attr_version(fc);
1fb69e78 892
c79e322f 893 memset(&inarg, 0, sizeof(inarg));
0e9663ee 894 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
895 /* Directories have separate file-handle space */
896 if (file && S_ISREG(inode->i_mode)) {
897 struct fuse_file *ff = file->private_data;
898
899 inarg.getattr_flags |= FUSE_GETATTR_FH;
900 inarg.fh = ff->fh;
901 }
7078187a
MS
902 args.in.h.opcode = FUSE_GETATTR;
903 args.in.h.nodeid = get_node_id(inode);
904 args.in.numargs = 1;
905 args.in.args[0].size = sizeof(inarg);
906 args.in.args[0].value = &inarg;
907 args.out.numargs = 1;
21f62174 908 args.out.args[0].size = sizeof(outarg);
7078187a
MS
909 args.out.args[0].value = &outarg;
910 err = fuse_simple_request(fc, &args);
e5e5558e 911 if (!err) {
c79e322f 912 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
913 make_bad_inode(inode);
914 err = -EIO;
915 } else {
c79e322f
MS
916 fuse_change_attributes(inode, &outarg.attr,
917 attr_timeout(&outarg),
1fb69e78
MS
918 attr_version);
919 if (stat)
c79e322f 920 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
921 }
922 }
923 return err;
924}
925
5b97eeac 926static int fuse_update_get_attr(struct inode *inode, struct file *file,
ff1b89f3 927 struct kstat *stat, unsigned int flags)
bcb4be80
MS
928{
929 struct fuse_inode *fi = get_fuse_inode(inode);
5b97eeac 930 int err = 0;
bf5c1898 931 bool sync;
bcb4be80 932
bf5c1898
MS
933 if (flags & AT_STATX_FORCE_SYNC)
934 sync = true;
935 else if (flags & AT_STATX_DONT_SYNC)
936 sync = false;
937 else
938 sync = time_before64(fi->i_time, get_jiffies_64());
939
940 if (sync) {
60bcc88a 941 forget_all_cached_acls(inode);
bcb4be80 942 err = fuse_do_getattr(inode, stat, file);
5b97eeac
MS
943 } else if (stat) {
944 generic_fillattr(inode, stat);
945 stat->mode = fi->orig_i_mode;
946 stat->ino = fi->orig_ino;
bcb4be80
MS
947 }
948
bcb4be80
MS
949 return err;
950}
951
5b97eeac
MS
952int fuse_update_attributes(struct inode *inode, struct file *file)
953{
ff1b89f3 954 return fuse_update_get_attr(inode, file, NULL, 0);
5b97eeac
MS
955}
956
3b463ae0 957int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 958 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
959{
960 int err = -ENOTDIR;
961 struct inode *parent;
962 struct dentry *dir;
963 struct dentry *entry;
964
965 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
966 if (!parent)
967 return -ENOENT;
968
5955102c 969 inode_lock(parent);
3b463ae0
JM
970 if (!S_ISDIR(parent->i_mode))
971 goto unlock;
972
973 err = -ENOENT;
974 dir = d_find_alias(parent);
975 if (!dir)
976 goto unlock;
977
8387ff25 978 name->hash = full_name_hash(dir, name->name, name->len);
3b463ae0
JM
979 entry = d_lookup(dir, name);
980 dput(dir);
981 if (!entry)
982 goto unlock;
983
984 fuse_invalidate_attr(parent);
985 fuse_invalidate_entry(entry);
451d0f59 986
2b0143b5 987 if (child_nodeid != 0 && d_really_is_positive(entry)) {
5955102c 988 inode_lock(d_inode(entry));
2b0143b5 989 if (get_node_id(d_inode(entry)) != child_nodeid) {
451d0f59
JM
990 err = -ENOENT;
991 goto badentry;
992 }
993 if (d_mountpoint(entry)) {
994 err = -EBUSY;
995 goto badentry;
996 }
e36cb0b8 997 if (d_is_dir(entry)) {
451d0f59
JM
998 shrink_dcache_parent(entry);
999 if (!simple_empty(entry)) {
1000 err = -ENOTEMPTY;
1001 goto badentry;
1002 }
2b0143b5 1003 d_inode(entry)->i_flags |= S_DEAD;
451d0f59
JM
1004 }
1005 dont_mount(entry);
2b0143b5 1006 clear_nlink(d_inode(entry));
451d0f59
JM
1007 err = 0;
1008 badentry:
5955102c 1009 inode_unlock(d_inode(entry));
451d0f59
JM
1010 if (!err)
1011 d_delete(entry);
1012 } else {
1013 err = 0;
1014 }
3b463ae0 1015 dput(entry);
3b463ae0
JM
1016
1017 unlock:
5955102c 1018 inode_unlock(parent);
3b463ae0
JM
1019 iput(parent);
1020 return err;
1021}
1022
87729a55
MS
1023/*
1024 * Calling into a user-controlled filesystem gives the filesystem
c2132c1b 1025 * daemon ptrace-like capabilities over the current process. This
87729a55
MS
1026 * means, that the filesystem daemon is able to record the exact
1027 * filesystem operations performed, and can also control the behavior
1028 * of the requester process in otherwise impossible ways. For example
1029 * it can delay the operation for arbitrary length of time allowing
1030 * DoS against the requester.
1031 *
1032 * For this reason only those processes can call into the filesystem,
1033 * for which the owner of the mount has ptrace privilege. This
1034 * excludes processes started by other users, suid or sgid processes.
1035 */
c2132c1b 1036int fuse_allow_current_process(struct fuse_conn *fc)
87729a55 1037{
c69e8d9c 1038 const struct cred *cred;
87729a55 1039
29433a29 1040 if (fc->allow_other)
73f03c2b 1041 return current_in_userns(fc->user_ns);
87729a55 1042
c2132c1b 1043 cred = current_cred();
499dcf20
EB
1044 if (uid_eq(cred->euid, fc->user_id) &&
1045 uid_eq(cred->suid, fc->user_id) &&
1046 uid_eq(cred->uid, fc->user_id) &&
1047 gid_eq(cred->egid, fc->group_id) &&
1048 gid_eq(cred->sgid, fc->group_id) &&
1049 gid_eq(cred->gid, fc->group_id))
c2132c1b 1050 return 1;
c69e8d9c 1051
c2132c1b 1052 return 0;
87729a55
MS
1053}
1054
31d40d74
MS
1055static int fuse_access(struct inode *inode, int mask)
1056{
1057 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1058 FUSE_ARGS(args);
31d40d74
MS
1059 struct fuse_access_in inarg;
1060 int err;
1061
698fa1d1
MS
1062 BUG_ON(mask & MAY_NOT_BLOCK);
1063
31d40d74
MS
1064 if (fc->no_access)
1065 return 0;
1066
31d40d74 1067 memset(&inarg, 0, sizeof(inarg));
e6305c43 1068 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
7078187a
MS
1069 args.in.h.opcode = FUSE_ACCESS;
1070 args.in.h.nodeid = get_node_id(inode);
1071 args.in.numargs = 1;
1072 args.in.args[0].size = sizeof(inarg);
1073 args.in.args[0].value = &inarg;
1074 err = fuse_simple_request(fc, &args);
31d40d74
MS
1075 if (err == -ENOSYS) {
1076 fc->no_access = 1;
1077 err = 0;
1078 }
1079 return err;
1080}
1081
10556cb2 1082static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1083{
10556cb2 1084 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1085 return -ECHILD;
1086
60bcc88a 1087 forget_all_cached_acls(inode);
19690ddb
MS
1088 return fuse_do_getattr(inode, NULL, NULL);
1089}
1090
6f9f1180
MS
1091/*
1092 * Check permission. The two basic access models of FUSE are:
1093 *
1094 * 1) Local access checking ('default_permissions' mount option) based
1095 * on file mode. This is the plain old disk filesystem permission
1096 * modell.
1097 *
1098 * 2) "Remote" access checking, where server is responsible for
1099 * checking permission in each inode operation. An exception to this
1100 * is if ->permission() was invoked from sys_access() in which case an
1101 * access request is sent. Execute permission is still checked
1102 * locally based on file mode.
1103 */
10556cb2 1104static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1105{
1106 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1107 bool refreshed = false;
1108 int err = 0;
e5e5558e 1109
c2132c1b 1110 if (!fuse_allow_current_process(fc))
e5e5558e 1111 return -EACCES;
244f6385
MS
1112
1113 /*
e8e96157 1114 * If attributes are needed, refresh them before proceeding
244f6385 1115 */
29433a29 1116 if (fc->default_permissions ||
e8e96157 1117 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1118 struct fuse_inode *fi = get_fuse_inode(inode);
1119
126b9d43 1120 if (time_before64(fi->i_time, get_jiffies_64())) {
19690ddb
MS
1121 refreshed = true;
1122
10556cb2 1123 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1124 if (err)
1125 return err;
1126 }
244f6385
MS
1127 }
1128
29433a29 1129 if (fc->default_permissions) {
2830ba7f 1130 err = generic_permission(inode, mask);
1e9a4ed9
MS
1131
1132 /* If permission is denied, try to refresh file
1133 attributes. This is also needed, because the root
1134 node will at first have no permissions */
244f6385 1135 if (err == -EACCES && !refreshed) {
10556cb2 1136 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1137 if (!err)
2830ba7f 1138 err = generic_permission(inode, mask);
1e9a4ed9
MS
1139 }
1140
6f9f1180
MS
1141 /* Note: the opposite of the above test does not
1142 exist. So if permissions are revoked this won't be
1143 noticed immediately, only after the attribute
1144 timeout has expired */
9cfcac81 1145 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1146 err = fuse_access(inode, mask);
1147 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1148 if (!(inode->i_mode & S_IXUGO)) {
1149 if (refreshed)
1150 return -EACCES;
1151
10556cb2 1152 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1153 if (!err && !(inode->i_mode & S_IXUGO))
1154 return -EACCES;
1155 }
e5e5558e 1156 }
244f6385 1157 return err;
e5e5558e
MS
1158}
1159
1160static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1161 struct dir_context *ctx)
e5e5558e
MS
1162{
1163 while (nbytes >= FUSE_NAME_OFFSET) {
1164 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1165 size_t reclen = FUSE_DIRENT_SIZE(dirent);
e5e5558e
MS
1166 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1167 return -EIO;
1168 if (reclen > nbytes)
1169 break;
efeb9e60
MS
1170 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1171 return -EIO;
e5e5558e 1172
8d3af7f3
AV
1173 if (!dir_emit(ctx, dirent->name, dirent->namelen,
1174 dirent->ino, dirent->type))
e5e5558e
MS
1175 break;
1176
1177 buf += reclen;
1178 nbytes -= reclen;
8d3af7f3 1179 ctx->pos = dirent->off;
e5e5558e
MS
1180 }
1181
1182 return 0;
1183}
1184
0b05b183
AA
1185static int fuse_direntplus_link(struct file *file,
1186 struct fuse_direntplus *direntplus,
1187 u64 attr_version)
1188{
0b05b183
AA
1189 struct fuse_entry_out *o = &direntplus->entry_out;
1190 struct fuse_dirent *dirent = &direntplus->dirent;
1191 struct dentry *parent = file->f_path.dentry;
1192 struct qstr name = QSTR_INIT(dirent->name, dirent->namelen);
1193 struct dentry *dentry;
1194 struct dentry *alias;
2b0143b5 1195 struct inode *dir = d_inode(parent);
0b05b183
AA
1196 struct fuse_conn *fc;
1197 struct inode *inode;
d9b3dbdc 1198 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
0b05b183
AA
1199
1200 if (!o->nodeid) {
1201 /*
1202 * Unlike in the case of fuse_lookup, zero nodeid does not mean
1203 * ENOENT. Instead, it only means the userspace filesystem did
1204 * not want to return attributes/handle for this entry.
1205 *
1206 * So do nothing.
1207 */
1208 return 0;
1209 }
1210
1211 if (name.name[0] == '.') {
1212 /*
1213 * We could potentially refresh the attributes of the directory
1214 * and its parent?
1215 */
1216 if (name.len == 1)
1217 return 0;
1218 if (name.name[1] == '.' && name.len == 2)
1219 return 0;
1220 }
a28ef45c
MS
1221
1222 if (invalid_nodeid(o->nodeid))
1223 return -EIO;
1224 if (!fuse_valid_type(o->attr.mode))
1225 return -EIO;
1226
0b05b183
AA
1227 fc = get_fuse_conn(dir);
1228
8387ff25 1229 name.hash = full_name_hash(parent, name.name, name.len);
0b05b183 1230 dentry = d_lookup(parent, &name);
d9b3dbdc
AV
1231 if (!dentry) {
1232retry:
1233 dentry = d_alloc_parallel(parent, &name, &wq);
1234 if (IS_ERR(dentry))
1235 return PTR_ERR(dentry);
1236 }
1237 if (!d_in_lookup(dentry)) {
1238 struct fuse_inode *fi;
2b0143b5 1239 inode = d_inode(dentry);
d9b3dbdc
AV
1240 if (!inode ||
1241 get_node_id(inode) != o->nodeid ||
1242 ((o->attr.mode ^ inode->i_mode) & S_IFMT)) {
5542aa2f 1243 d_invalidate(dentry);
d9b3dbdc
AV
1244 dput(dentry);
1245 goto retry;
1246 }
1247 if (is_bad_inode(inode)) {
1248 dput(dentry);
1249 return -EIO;
0b05b183 1250 }
0b05b183 1251
d9b3dbdc
AV
1252 fi = get_fuse_inode(inode);
1253 spin_lock(&fc->lock);
1254 fi->nlookup++;
1255 spin_unlock(&fc->lock);
0b05b183 1256
60bcc88a 1257 forget_all_cached_acls(inode);
d9b3dbdc
AV
1258 fuse_change_attributes(inode, &o->attr,
1259 entry_attr_timeout(o),
1260 attr_version);
1261 /*
1262 * The other branch comes via fuse_iget()
1263 * which bumps nlookup inside
1264 */
1265 } else {
1266 inode = fuse_iget(dir->i_sb, o->nodeid, o->generation,
1267 &o->attr, entry_attr_timeout(o),
1268 attr_version);
1269 if (!inode)
1270 inode = ERR_PTR(-ENOMEM);
2914941e 1271
d9b3dbdc
AV
1272 alias = d_splice_alias(inode, dentry);
1273 d_lookup_done(dentry);
1274 if (alias) {
1275 dput(dentry);
1276 dentry = alias;
1277 }
1278 if (IS_ERR(dentry))
1279 return PTR_ERR(dentry);
0b05b183 1280 }
6314efee
MS
1281 if (fc->readdirplus_auto)
1282 set_bit(FUSE_I_INIT_RDPLUS, &get_fuse_inode(inode)->state);
0b05b183
AA
1283 fuse_change_entry_timeout(dentry, o);
1284
c7263bcd 1285 dput(dentry);
d9b3dbdc 1286 return 0;
0b05b183
AA
1287}
1288
1289static int parse_dirplusfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1290 struct dir_context *ctx, u64 attr_version)
0b05b183
AA
1291{
1292 struct fuse_direntplus *direntplus;
1293 struct fuse_dirent *dirent;
1294 size_t reclen;
1295 int over = 0;
1296 int ret;
1297
1298 while (nbytes >= FUSE_NAME_OFFSET_DIRENTPLUS) {
1299 direntplus = (struct fuse_direntplus *) buf;
1300 dirent = &direntplus->dirent;
1301 reclen = FUSE_DIRENTPLUS_SIZE(direntplus);
1302
1303 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1304 return -EIO;
1305 if (reclen > nbytes)
1306 break;
efeb9e60
MS
1307 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1308 return -EIO;
0b05b183
AA
1309
1310 if (!over) {
1311 /* We fill entries into dstbuf only as much as
1312 it can hold. But we still continue iterating
1313 over remaining entries to link them. If not,
1314 we need to send a FORGET for each of those
1315 which we did not link.
1316 */
8d3af7f3
AV
1317 over = !dir_emit(ctx, dirent->name, dirent->namelen,
1318 dirent->ino, dirent->type);
c6cdd514
MS
1319 if (!over)
1320 ctx->pos = dirent->off;
0b05b183
AA
1321 }
1322
1323 buf += reclen;
1324 nbytes -= reclen;
1325
1326 ret = fuse_direntplus_link(file, direntplus, attr_version);
1327 if (ret)
1328 fuse_force_forget(file, direntplus->entry_out.nodeid);
1329 }
1330
1331 return 0;
1332}
1333
8d3af7f3 1334static int fuse_readdir(struct file *file, struct dir_context *ctx)
e5e5558e 1335{
4582a4ab 1336 int plus, err;
04730fef
MS
1337 size_t nbytes;
1338 struct page *page;
496ad9aa 1339 struct inode *inode = file_inode(file);
e5e5558e 1340 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8 1341 struct fuse_req *req;
0b05b183 1342 u64 attr_version = 0;
248d86e8
MS
1343
1344 if (is_bad_inode(inode))
1345 return -EIO;
1346
b111c8c0 1347 req = fuse_get_req(fc, 1);
ce1d5a49
MS
1348 if (IS_ERR(req))
1349 return PTR_ERR(req);
e5e5558e 1350
04730fef
MS
1351 page = alloc_page(GFP_KERNEL);
1352 if (!page) {
1353 fuse_put_request(fc, req);
1354 return -ENOMEM;
1355 }
4582a4ab 1356
8d3af7f3 1357 plus = fuse_use_readdirplus(inode, ctx);
f4975c67 1358 req->out.argpages = 1;
04730fef
MS
1359 req->num_pages = 1;
1360 req->pages[0] = page;
85f40aec 1361 req->page_descs[0].length = PAGE_SIZE;
4582a4ab 1362 if (plus) {
0b05b183 1363 attr_version = fuse_get_attr_version(fc);
8d3af7f3 1364 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1365 FUSE_READDIRPLUS);
1366 } else {
8d3af7f3 1367 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1368 FUSE_READDIR);
1369 }
5c672ab3 1370 fuse_lock_inode(inode);
b93f858a 1371 fuse_request_send(fc, req);
5c672ab3 1372 fuse_unlock_inode(inode);
361b1eb5 1373 nbytes = req->out.args[0].size;
e5e5558e
MS
1374 err = req->out.h.error;
1375 fuse_put_request(fc, req);
0b05b183 1376 if (!err) {
4582a4ab 1377 if (plus) {
0b05b183 1378 err = parse_dirplusfile(page_address(page), nbytes,
8d3af7f3 1379 file, ctx,
0b05b183
AA
1380 attr_version);
1381 } else {
1382 err = parse_dirfile(page_address(page), nbytes, file,
8d3af7f3 1383 ctx);
0b05b183
AA
1384 }
1385 }
e5e5558e 1386
04730fef 1387 __free_page(page);
451418fc 1388 fuse_invalidate_atime(inode);
04730fef 1389 return err;
e5e5558e
MS
1390}
1391
6b255391 1392static const char *fuse_get_link(struct dentry *dentry,
fceef393
AV
1393 struct inode *inode,
1394 struct delayed_call *done)
e5e5558e 1395{
e5e5558e 1396 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1397 FUSE_ARGS(args);
e5e5558e 1398 char *link;
7078187a 1399 ssize_t ret;
e5e5558e 1400
6b255391
AV
1401 if (!dentry)
1402 return ERR_PTR(-ECHILD);
1403
cd3417c8 1404 link = kmalloc(PAGE_SIZE, GFP_KERNEL);
7078187a
MS
1405 if (!link)
1406 return ERR_PTR(-ENOMEM);
1407
1408 args.in.h.opcode = FUSE_READLINK;
1409 args.in.h.nodeid = get_node_id(inode);
1410 args.out.argvar = 1;
1411 args.out.numargs = 1;
1412 args.out.args[0].size = PAGE_SIZE - 1;
1413 args.out.args[0].value = link;
1414 ret = fuse_simple_request(fc, &args);
1415 if (ret < 0) {
cd3417c8 1416 kfree(link);
7078187a
MS
1417 link = ERR_PTR(ret);
1418 } else {
1419 link[ret] = '\0';
fceef393 1420 set_delayed_call(done, kfree_link, link);
7078187a 1421 }
451418fc 1422 fuse_invalidate_atime(inode);
e5e5558e
MS
1423 return link;
1424}
1425
e5e5558e
MS
1426static int fuse_dir_open(struct inode *inode, struct file *file)
1427{
91fe96b4 1428 return fuse_open_common(inode, file, true);
e5e5558e
MS
1429}
1430
1431static int fuse_dir_release(struct inode *inode, struct file *file)
1432{
8b0797a4
MS
1433 fuse_release_common(file, FUSE_RELEASEDIR);
1434
1435 return 0;
e5e5558e
MS
1436}
1437
02c24a82
JB
1438static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1439 int datasync)
82547981 1440{
02c24a82 1441 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1442}
1443
b18da0c5
MS
1444static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1445 unsigned long arg)
1446{
1447 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1448
1449 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1450 if (fc->minor < 18)
1451 return -ENOTTY;
1452
1453 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1454}
1455
1456static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1457 unsigned long arg)
1458{
1459 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1460
1461 if (fc->minor < 18)
1462 return -ENOTTY;
1463
1464 return fuse_ioctl_common(file, cmd, arg,
1465 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1466}
1467
b0aa7606 1468static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
17637cba
MS
1469{
1470 /* Always update if mtime is explicitly set */
1471 if (ivalid & ATTR_MTIME_SET)
1472 return true;
1473
b0aa7606
MP
1474 /* Or if kernel i_mtime is the official one */
1475 if (trust_local_mtime)
1476 return true;
1477
17637cba
MS
1478 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1479 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1480 return false;
1481
1482 /* In all other cases update */
1483 return true;
1484}
1485
8cb08329
EB
1486static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1487 struct fuse_setattr_in *arg, bool trust_local_cmtime)
9e6268db
MS
1488{
1489 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1490
1491 if (ivalid & ATTR_MODE)
befc649c 1492 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1493 if (ivalid & ATTR_UID)
8cb08329 1494 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
9e6268db 1495 if (ivalid & ATTR_GID)
8cb08329 1496 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
9e6268db 1497 if (ivalid & ATTR_SIZE)
befc649c 1498 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1499 if (ivalid & ATTR_ATIME) {
1500 arg->valid |= FATTR_ATIME;
befc649c 1501 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1502 arg->atimensec = iattr->ia_atime.tv_nsec;
1503 if (!(ivalid & ATTR_ATIME_SET))
1504 arg->valid |= FATTR_ATIME_NOW;
1505 }
3ad22c62 1506 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
17637cba 1507 arg->valid |= FATTR_MTIME;
befc649c 1508 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba 1509 arg->mtimensec = iattr->ia_mtime.tv_nsec;
3ad22c62 1510 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
17637cba 1511 arg->valid |= FATTR_MTIME_NOW;
befc649c 1512 }
3ad22c62
MP
1513 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1514 arg->valid |= FATTR_CTIME;
1515 arg->ctime = iattr->ia_ctime.tv_sec;
1516 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1517 }
9e6268db
MS
1518}
1519
3be5a52b
MS
1520/*
1521 * Prevent concurrent writepages on inode
1522 *
1523 * This is done by adding a negative bias to the inode write counter
1524 * and waiting for all pending writes to finish.
1525 */
1526void fuse_set_nowrite(struct inode *inode)
1527{
1528 struct fuse_conn *fc = get_fuse_conn(inode);
1529 struct fuse_inode *fi = get_fuse_inode(inode);
1530
5955102c 1531 BUG_ON(!inode_is_locked(inode));
3be5a52b
MS
1532
1533 spin_lock(&fc->lock);
1534 BUG_ON(fi->writectr < 0);
1535 fi->writectr += FUSE_NOWRITE;
1536 spin_unlock(&fc->lock);
1537 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1538}
1539
1540/*
1541 * Allow writepages on inode
1542 *
1543 * Remove the bias from the writecounter and send any queued
1544 * writepages.
1545 */
1546static void __fuse_release_nowrite(struct inode *inode)
1547{
1548 struct fuse_inode *fi = get_fuse_inode(inode);
1549
1550 BUG_ON(fi->writectr != FUSE_NOWRITE);
1551 fi->writectr = 0;
1552 fuse_flush_writepages(inode);
1553}
1554
1555void fuse_release_nowrite(struct inode *inode)
1556{
1557 struct fuse_conn *fc = get_fuse_conn(inode);
1558
1559 spin_lock(&fc->lock);
1560 __fuse_release_nowrite(inode);
1561 spin_unlock(&fc->lock);
1562}
1563
7078187a 1564static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
b0aa7606
MP
1565 struct inode *inode,
1566 struct fuse_setattr_in *inarg_p,
1567 struct fuse_attr_out *outarg_p)
1568{
7078187a
MS
1569 args->in.h.opcode = FUSE_SETATTR;
1570 args->in.h.nodeid = get_node_id(inode);
1571 args->in.numargs = 1;
1572 args->in.args[0].size = sizeof(*inarg_p);
1573 args->in.args[0].value = inarg_p;
1574 args->out.numargs = 1;
21f62174 1575 args->out.args[0].size = sizeof(*outarg_p);
7078187a 1576 args->out.args[0].value = outarg_p;
b0aa7606
MP
1577}
1578
1579/*
1580 * Flush inode->i_mtime to the server
1581 */
ab9e13f7 1582int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
b0aa7606 1583{
b0aa7606 1584 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1585 FUSE_ARGS(args);
b0aa7606
MP
1586 struct fuse_setattr_in inarg;
1587 struct fuse_attr_out outarg;
b0aa7606
MP
1588
1589 memset(&inarg, 0, sizeof(inarg));
1590 memset(&outarg, 0, sizeof(outarg));
1591
ab9e13f7 1592 inarg.valid = FATTR_MTIME;
b0aa7606
MP
1593 inarg.mtime = inode->i_mtime.tv_sec;
1594 inarg.mtimensec = inode->i_mtime.tv_nsec;
ab9e13f7
MP
1595 if (fc->minor >= 23) {
1596 inarg.valid |= FATTR_CTIME;
1597 inarg.ctime = inode->i_ctime.tv_sec;
1598 inarg.ctimensec = inode->i_ctime.tv_nsec;
1599 }
1e18bda8
MS
1600 if (ff) {
1601 inarg.valid |= FATTR_FH;
1602 inarg.fh = ff->fh;
1603 }
7078187a 1604 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
b0aa7606 1605
7078187a 1606 return fuse_simple_request(fc, &args);
b0aa7606
MP
1607}
1608
6f9f1180
MS
1609/*
1610 * Set attributes, and at the same time refresh them.
1611 *
1612 * Truncation is slightly complicated, because the 'truncate' request
1613 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1614 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1615 * and the actual truncation by hand.
6f9f1180 1616 */
62490330 1617int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
efb9fa9e 1618 struct file *file)
9e6268db 1619{
62490330 1620 struct inode *inode = d_inode(dentry);
9e6268db 1621 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1622 struct fuse_inode *fi = get_fuse_inode(inode);
7078187a 1623 FUSE_ARGS(args);
9e6268db
MS
1624 struct fuse_setattr_in inarg;
1625 struct fuse_attr_out outarg;
3be5a52b 1626 bool is_truncate = false;
8373200b 1627 bool is_wb = fc->writeback_cache;
3be5a52b 1628 loff_t oldsize;
9e6268db 1629 int err;
3ad22c62 1630 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
9e6268db 1631
29433a29 1632 if (!fc->default_permissions)
db78b877
CH
1633 attr->ia_valid |= ATTR_FORCE;
1634
31051c85 1635 err = setattr_prepare(dentry, attr);
db78b877
CH
1636 if (err)
1637 return err;
1e9a4ed9 1638
8d56addd 1639 if (attr->ia_valid & ATTR_OPEN) {
df0e91d4
MS
1640 /* This is coming from open(..., ... | O_TRUNC); */
1641 WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1642 WARN_ON(attr->ia_size != 0);
1643 if (fc->atomic_o_trunc) {
1644 /*
1645 * No need to send request to userspace, since actual
1646 * truncation has already been done by OPEN. But still
1647 * need to truncate page cache.
1648 */
1649 i_size_write(inode, 0);
1650 truncate_pagecache(inode, 0);
8d56addd 1651 return 0;
df0e91d4 1652 }
8d56addd
MS
1653 file = NULL;
1654 }
6ff958ed 1655
2c27c65e 1656 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1657 is_truncate = true;
9e6268db 1658
06a7c3c2 1659 if (is_truncate) {
3be5a52b 1660 fuse_set_nowrite(inode);
06a7c3c2 1661 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3ad22c62
MP
1662 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1663 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
06a7c3c2 1664 }
3be5a52b 1665
9e6268db 1666 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1667 memset(&outarg, 0, sizeof(outarg));
8cb08329 1668 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
49d4914f
MS
1669 if (file) {
1670 struct fuse_file *ff = file->private_data;
1671 inarg.valid |= FATTR_FH;
1672 inarg.fh = ff->fh;
1673 }
f3332114
MS
1674 if (attr->ia_valid & ATTR_SIZE) {
1675 /* For mandatory locking in truncate */
1676 inarg.valid |= FATTR_LOCKOWNER;
1677 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1678 }
7078187a
MS
1679 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1680 err = fuse_simple_request(fc, &args);
e00d2c2d
MS
1681 if (err) {
1682 if (err == -EINTR)
1683 fuse_invalidate_attr(inode);
3be5a52b 1684 goto error;
e00d2c2d 1685 }
9e6268db 1686
e00d2c2d
MS
1687 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1688 make_bad_inode(inode);
3be5a52b
MS
1689 err = -EIO;
1690 goto error;
1691 }
1692
1693 spin_lock(&fc->lock);
b0aa7606 1694 /* the kernel maintains i_mtime locally */
3ad22c62
MP
1695 if (trust_local_cmtime) {
1696 if (attr->ia_valid & ATTR_MTIME)
1697 inode->i_mtime = attr->ia_mtime;
1698 if (attr->ia_valid & ATTR_CTIME)
1699 inode->i_ctime = attr->ia_ctime;
1e18bda8 1700 /* FIXME: clear I_DIRTY_SYNC? */
b0aa7606
MP
1701 }
1702
3be5a52b
MS
1703 fuse_change_attributes_common(inode, &outarg.attr,
1704 attr_timeout(&outarg));
1705 oldsize = inode->i_size;
8373200b
PE
1706 /* see the comment in fuse_change_attributes() */
1707 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode))
1708 i_size_write(inode, outarg.attr.size);
3be5a52b
MS
1709
1710 if (is_truncate) {
1711 /* NOTE: this may release/reacquire fc->lock */
1712 __fuse_release_nowrite(inode);
1713 }
1714 spin_unlock(&fc->lock);
1715
1716 /*
1717 * Only call invalidate_inode_pages2() after removing
1718 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1719 */
8373200b
PE
1720 if ((is_truncate || !is_wb) &&
1721 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
7caef267 1722 truncate_pagecache(inode, outarg.attr.size);
3be5a52b 1723 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1724 }
1725
06a7c3c2 1726 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
e00d2c2d 1727 return 0;
3be5a52b
MS
1728
1729error:
1730 if (is_truncate)
1731 fuse_release_nowrite(inode);
1732
06a7c3c2 1733 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3be5a52b 1734 return err;
9e6268db
MS
1735}
1736
49d4914f
MS
1737static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1738{
2b0143b5 1739 struct inode *inode = d_inode(entry);
5e940c1d 1740 struct fuse_conn *fc = get_fuse_conn(inode);
a09f99ed 1741 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
5e2b8828 1742 int ret;
efb9fa9e
MP
1743
1744 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1745 return -EACCES;
1746
a09f99ed 1747 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
a09f99ed
MS
1748 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1749 ATTR_MODE);
5e940c1d 1750
a09f99ed 1751 /*
5e940c1d
MS
1752 * The only sane way to reliably kill suid/sgid is to do it in
1753 * the userspace filesystem
1754 *
1755 * This should be done on write(), truncate() and chown().
a09f99ed 1756 */
5e940c1d 1757 if (!fc->handle_killpriv) {
5e940c1d
MS
1758 /*
1759 * ia_mode calculation may have used stale i_mode.
1760 * Refresh and recalculate.
1761 */
1762 ret = fuse_do_getattr(inode, NULL, file);
1763 if (ret)
1764 return ret;
1765
1766 attr->ia_mode = inode->i_mode;
c01638f5 1767 if (inode->i_mode & S_ISUID) {
5e940c1d
MS
1768 attr->ia_valid |= ATTR_MODE;
1769 attr->ia_mode &= ~S_ISUID;
1770 }
c01638f5 1771 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
5e940c1d
MS
1772 attr->ia_valid |= ATTR_MODE;
1773 attr->ia_mode &= ~S_ISGID;
1774 }
a09f99ed
MS
1775 }
1776 }
1777 if (!attr->ia_valid)
1778 return 0;
5e2b8828 1779
abb5a14f 1780 ret = fuse_do_setattr(entry, attr, file);
5e2b8828 1781 if (!ret) {
60bcc88a
SF
1782 /*
1783 * If filesystem supports acls it may have updated acl xattrs in
1784 * the filesystem, so forget cached acls for the inode.
1785 */
1786 if (fc->posix_acl)
1787 forget_all_cached_acls(inode);
1788
5e2b8828
MS
1789 /* Directory mode changed, may need to revalidate access */
1790 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1791 fuse_invalidate_entry_cache(entry);
1792 }
1793 return ret;
49d4914f
MS
1794}
1795
a528d35e
DH
1796static int fuse_getattr(const struct path *path, struct kstat *stat,
1797 u32 request_mask, unsigned int flags)
e5e5558e 1798{
a528d35e 1799 struct inode *inode = d_inode(path->dentry);
244f6385 1800 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385 1801
c2132c1b 1802 if (!fuse_allow_current_process(fc))
244f6385
MS
1803 return -EACCES;
1804
ff1b89f3 1805 return fuse_update_get_attr(inode, NULL, stat, flags);
e5e5558e
MS
1806}
1807
754661f1 1808static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1809 .lookup = fuse_lookup,
9e6268db
MS
1810 .mkdir = fuse_mkdir,
1811 .symlink = fuse_symlink,
1812 .unlink = fuse_unlink,
1813 .rmdir = fuse_rmdir,
2773bf00 1814 .rename = fuse_rename2,
9e6268db
MS
1815 .link = fuse_link,
1816 .setattr = fuse_setattr,
1817 .create = fuse_create,
c8ccbe03 1818 .atomic_open = fuse_atomic_open,
9e6268db 1819 .mknod = fuse_mknod,
e5e5558e
MS
1820 .permission = fuse_permission,
1821 .getattr = fuse_getattr,
92a8780e 1822 .listxattr = fuse_listxattr,
60bcc88a
SF
1823 .get_acl = fuse_get_acl,
1824 .set_acl = fuse_set_acl,
e5e5558e
MS
1825};
1826
4b6f5d20 1827static const struct file_operations fuse_dir_operations = {
b6aeaded 1828 .llseek = generic_file_llseek,
e5e5558e 1829 .read = generic_read_dir,
d9b3dbdc 1830 .iterate_shared = fuse_readdir,
e5e5558e
MS
1831 .open = fuse_dir_open,
1832 .release = fuse_dir_release,
82547981 1833 .fsync = fuse_dir_fsync,
b18da0c5
MS
1834 .unlocked_ioctl = fuse_dir_ioctl,
1835 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1836};
1837
754661f1 1838static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1839 .setattr = fuse_setattr,
e5e5558e
MS
1840 .permission = fuse_permission,
1841 .getattr = fuse_getattr,
92a8780e 1842 .listxattr = fuse_listxattr,
60bcc88a
SF
1843 .get_acl = fuse_get_acl,
1844 .set_acl = fuse_set_acl,
e5e5558e
MS
1845};
1846
754661f1 1847static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1848 .setattr = fuse_setattr,
6b255391 1849 .get_link = fuse_get_link,
e5e5558e 1850 .getattr = fuse_getattr,
92a8780e 1851 .listxattr = fuse_listxattr,
e5e5558e
MS
1852};
1853
1854void fuse_init_common(struct inode *inode)
1855{
1856 inode->i_op = &fuse_common_inode_operations;
1857}
1858
1859void fuse_init_dir(struct inode *inode)
1860{
1861 inode->i_op = &fuse_dir_inode_operations;
1862 inode->i_fop = &fuse_dir_operations;
1863}
1864
1865void fuse_init_symlink(struct inode *inode)
1866{
1867 inode->i_op = &fuse_symlink_inode_operations;
1868}