blob: bab7a0db81dd440ccbb15015d1ce9489941b3772 [file] [log] [blame]
Thomas Gleixner55716d22019-06-01 10:08:42 +02001// SPDX-License-Identifier: GPL-2.0-only
Tejun Heo151060a2009-04-14 10:54:54 +09002/*
3 * CUSE: Character device in Userspace
4 *
5 * Copyright (C) 2008-2009 SUSE Linux Products GmbH
6 * Copyright (C) 2008-2009 Tejun Heo <tj@kernel.org>
7 *
Tejun Heo151060a2009-04-14 10:54:54 +09008 * CUSE enables character devices to be implemented from userland much
9 * like FUSE allows filesystems. On initialization /dev/cuse is
10 * created. By opening the file and replying to the CUSE_INIT request
11 * userland CUSE server can create a character device. After that the
12 * operation is very similar to FUSE.
13 *
14 * A CUSE instance involves the following objects.
15 *
16 * cuse_conn : contains fuse_conn and serves as bonding structure
17 * channel : file handle connected to the userland CUSE server
18 * cdev : the implemented character device
19 * dev : generic device for cdev
20 *
21 * Note that 'channel' is what 'dev' is in FUSE. As CUSE deals with
22 * devices, it's called 'channel' to reduce confusion.
23 *
24 * channel determines when the character device dies. When channel is
25 * closed, everything begins to destruct. The cuse_conn is taken off
26 * the lookup table preventing further access from cdev, cdev and
27 * generic device are removed and the base reference of cuse_conn is
28 * put.
29 *
30 * On each open, the matching cuse_conn is looked up and if found an
31 * additional reference is taken which is released when the file is
32 * closed.
33 */
34
Kirill Smelkovf2294482019-03-27 09:15:17 +000035#define pr_fmt(fmt) "CUSE: " fmt
36
Tejun Heo151060a2009-04-14 10:54:54 +090037#include <linux/fuse.h>
38#include <linux/cdev.h>
39#include <linux/device.h>
40#include <linux/file.h>
41#include <linux/fs.h>
42#include <linux/kdev_t.h>
43#include <linux/kthread.h>
44#include <linux/list.h>
45#include <linux/magic.h>
46#include <linux/miscdevice.h>
47#include <linux/mutex.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090048#include <linux/slab.h>
Tejun Heo151060a2009-04-14 10:54:54 +090049#include <linux/stat.h>
Paul Gortmaker143cb492011-07-01 14:23:34 -040050#include <linux/module.h>
Christoph Hellwige2e40f22015-02-22 08:58:50 -080051#include <linux/uio.h>
Eric W. Biederman8cb08322018-02-21 11:18:07 -060052#include <linux/user_namespace.h>
Tejun Heo151060a2009-04-14 10:54:54 +090053
54#include "fuse_i.h"
55
56#define CUSE_CONNTBL_LEN 64
57
58struct cuse_conn {
59 struct list_head list; /* linked on cuse_conntbl */
60 struct fuse_conn fc; /* fuse connection */
61 struct cdev *cdev; /* associated character device */
62 struct device *dev; /* device representing @cdev */
63
64 /* init parameters, set once during initialization */
65 bool unrestricted_ioctl;
66};
67
David Herrmann8ce03fd2012-11-17 12:45:47 +010068static DEFINE_MUTEX(cuse_lock); /* protects registration */
Tejun Heo151060a2009-04-14 10:54:54 +090069static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
70static struct class *cuse_class;
71
72static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
73{
74 return container_of(fc, struct cuse_conn, fc);
75}
76
77static struct list_head *cuse_conntbl_head(dev_t devt)
78{
79 return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
80}
81
82
83/**************************************************************************
84 * CUSE frontend operations
85 *
86 * These are file operations for the character device.
87 *
88 * On open, CUSE opens a file from the FUSE mnt and stores it to
89 * private_data of the open file. All other ops call FUSE ops on the
90 * FUSE file.
91 */
92
Al Virocfa86a72015-03-21 09:01:45 -040093static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
Tejun Heo151060a2009-04-14 10:54:54 +090094{
Miklos Szeredie1c0eec2017-09-12 16:57:53 +020095 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
Tejun Heo151060a2009-04-14 10:54:54 +090096 loff_t pos = 0;
97
Al Virocfa86a72015-03-21 09:01:45 -040098 return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
Tejun Heo151060a2009-04-14 10:54:54 +090099}
100
Al Virocfa86a72015-03-21 09:01:45 -0400101static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
Tejun Heo151060a2009-04-14 10:54:54 +0900102{
Miklos Szeredie1c0eec2017-09-12 16:57:53 +0200103 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
Tejun Heo151060a2009-04-14 10:54:54 +0900104 loff_t pos = 0;
105 /*
106 * No locking or generic_write_checks(), the server is
107 * responsible for locking and sanity checks.
108 */
Al Virocfa86a72015-03-21 09:01:45 -0400109 return fuse_direct_io(&io, from, &pos,
Pavel Emelyanovea8cd332013-10-10 17:12:05 +0400110 FUSE_DIO_WRITE | FUSE_DIO_CUSE);
Tejun Heo151060a2009-04-14 10:54:54 +0900111}
112
113static int cuse_open(struct inode *inode, struct file *file)
114{
115 dev_t devt = inode->i_cdev->dev;
116 struct cuse_conn *cc = NULL, *pos;
117 int rc;
118
119 /* look up and get the connection */
David Herrmann8ce03fd2012-11-17 12:45:47 +0100120 mutex_lock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900121 list_for_each_entry(pos, cuse_conntbl_head(devt), list)
122 if (pos->dev->devt == devt) {
123 fuse_conn_get(&pos->fc);
124 cc = pos;
125 break;
126 }
David Herrmann8ce03fd2012-11-17 12:45:47 +0100127 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900128
129 /* dead? */
130 if (!cc)
131 return -ENODEV;
132
133 /*
134 * Generic permission check is already done against the chrdev
135 * file, proceed to open.
136 */
137 rc = fuse_do_open(&cc->fc, 0, file, 0);
138 if (rc)
139 fuse_conn_put(&cc->fc);
140 return rc;
141}
142
143static int cuse_release(struct inode *inode, struct file *file)
144{
Kirill Tkhaiebf84d02018-11-09 13:33:11 +0300145 struct fuse_inode *fi = get_fuse_inode(inode);
Tejun Heo151060a2009-04-14 10:54:54 +0900146 struct fuse_file *ff = file->private_data;
147 struct fuse_conn *fc = ff->fc;
148
Kirill Tkhaiebf84d02018-11-09 13:33:11 +0300149 fuse_sync_release(fi, ff, file->f_flags);
Tejun Heo151060a2009-04-14 10:54:54 +0900150 fuse_conn_put(fc);
151
152 return 0;
153}
154
155static long cuse_file_ioctl(struct file *file, unsigned int cmd,
156 unsigned long arg)
157{
158 struct fuse_file *ff = file->private_data;
159 struct cuse_conn *cc = fc_to_cc(ff->fc);
160 unsigned int flags = 0;
161
162 if (cc->unrestricted_ioctl)
163 flags |= FUSE_IOCTL_UNRESTRICTED;
164
165 return fuse_do_ioctl(file, cmd, arg, flags);
166}
167
168static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
169 unsigned long arg)
170{
171 struct fuse_file *ff = file->private_data;
172 struct cuse_conn *cc = fc_to_cc(ff->fc);
173 unsigned int flags = FUSE_IOCTL_COMPAT;
174
175 if (cc->unrestricted_ioctl)
176 flags |= FUSE_IOCTL_UNRESTRICTED;
177
178 return fuse_do_ioctl(file, cmd, arg, flags);
179}
180
181static const struct file_operations cuse_frontend_fops = {
182 .owner = THIS_MODULE,
Al Virocfa86a72015-03-21 09:01:45 -0400183 .read_iter = cuse_read_iter,
184 .write_iter = cuse_write_iter,
Tejun Heo151060a2009-04-14 10:54:54 +0900185 .open = cuse_open,
186 .release = cuse_release,
187 .unlocked_ioctl = cuse_file_ioctl,
188 .compat_ioctl = cuse_file_compat_ioctl,
189 .poll = fuse_file_poll,
Arnd Bergmann6038f372010-08-15 18:52:59 +0200190 .llseek = noop_llseek,
Tejun Heo151060a2009-04-14 10:54:54 +0900191};
192
193
194/**************************************************************************
195 * CUSE channel initialization and destruction
196 */
197
198struct cuse_devinfo {
199 const char *name;
200};
201
202/**
203 * cuse_parse_one - parse one key=value pair
204 * @pp: i/o parameter for the current position
205 * @end: points to one past the end of the packed string
206 * @keyp: out parameter for key
207 * @valp: out parameter for value
208 *
209 * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
210 * at @end - 1. This function parses one pair and set *@keyp to the
211 * start of the key and *@valp to the start of the value. Note that
212 * the original string is modified such that the key string is
213 * terminated with '\0'. *@pp is updated to point to the next string.
214 *
215 * RETURNS:
216 * 1 on successful parse, 0 on EOF, -errno on failure.
217 */
218static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
219{
220 char *p = *pp;
221 char *key, *val;
222
223 while (p < end && *p == '\0')
224 p++;
225 if (p == end)
226 return 0;
227
228 if (end[-1] != '\0') {
Kirill Smelkovf2294482019-03-27 09:15:17 +0000229 pr_err("info not properly terminated\n");
Tejun Heo151060a2009-04-14 10:54:54 +0900230 return -EINVAL;
231 }
232
233 key = val = p;
234 p += strlen(p);
235
236 if (valp) {
237 strsep(&val, "=");
238 if (!val)
239 val = key + strlen(key);
240 key = strstrip(key);
241 val = strstrip(val);
242 } else
243 key = strstrip(key);
244
245 if (!strlen(key)) {
Kirill Smelkovf2294482019-03-27 09:15:17 +0000246 pr_err("zero length info key specified\n");
Tejun Heo151060a2009-04-14 10:54:54 +0900247 return -EINVAL;
248 }
249
250 *pp = p;
251 *keyp = key;
252 if (valp)
253 *valp = val;
254
255 return 1;
256}
257
258/**
259 * cuse_parse_dev_info - parse device info
260 * @p: device info string
261 * @len: length of device info string
262 * @devinfo: out parameter for parsed device info
263 *
264 * Parse @p to extract device info and store it into @devinfo. String
265 * pointed to by @p is modified by parsing and @devinfo points into
266 * them, so @p shouldn't be freed while @devinfo is in use.
267 *
268 * RETURNS:
269 * 0 on success, -errno on failure.
270 */
271static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
272{
273 char *end = p + len;
Miklos Szeredie2560362013-01-15 12:24:46 +0100274 char *uninitialized_var(key), *uninitialized_var(val);
Tejun Heo151060a2009-04-14 10:54:54 +0900275 int rc;
276
277 while (true) {
278 rc = cuse_parse_one(&p, end, &key, &val);
279 if (rc < 0)
280 return rc;
281 if (!rc)
282 break;
283 if (strcmp(key, "DEVNAME") == 0)
284 devinfo->name = val;
285 else
Kirill Smelkovf2294482019-03-27 09:15:17 +0000286 pr_warn("unknown device info \"%s\"\n", key);
Tejun Heo151060a2009-04-14 10:54:54 +0900287 }
288
289 if (!devinfo->name || !strlen(devinfo->name)) {
Kirill Smelkovf2294482019-03-27 09:15:17 +0000290 pr_err("DEVNAME unspecified\n");
Tejun Heo151060a2009-04-14 10:54:54 +0900291 return -EINVAL;
292 }
293
294 return 0;
295}
296
297static void cuse_gendev_release(struct device *dev)
298{
299 kfree(dev);
300}
301
302/**
303 * cuse_process_init_reply - finish initializing CUSE channel
304 *
305 * This function creates the character device and sets up all the
306 * required data structures for it. Please read the comment at the
307 * top of this file for high level overview.
308 */
309static void cuse_process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
310{
David Herrmann30783582012-11-17 12:45:48 +0100311 struct cuse_conn *cc = fc_to_cc(fc), *pos;
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100312 struct cuse_init_out *arg = req->out.args[0].value;
Tejun Heo151060a2009-04-14 10:54:54 +0900313 struct page *page = req->pages[0];
314 struct cuse_devinfo devinfo = { };
315 struct device *dev;
316 struct cdev *cdev;
317 dev_t devt;
David Herrmann30783582012-11-17 12:45:48 +0100318 int rc, i;
Tejun Heo151060a2009-04-14 10:54:54 +0900319
320 if (req->out.h.error ||
321 arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) {
322 goto err;
323 }
324
325 fc->minor = arg->minor;
326 fc->max_read = max_t(unsigned, arg->max_read, 4096);
327 fc->max_write = max_t(unsigned, arg->max_write, 4096);
328
329 /* parse init reply */
330 cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
331
332 rc = cuse_parse_devinfo(page_address(page), req->out.args[1].size,
333 &devinfo);
334 if (rc)
335 goto err;
336
337 /* determine and reserve devt */
338 devt = MKDEV(arg->dev_major, arg->dev_minor);
339 if (!MAJOR(devt))
340 rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
341 else
342 rc = register_chrdev_region(devt, 1, devinfo.name);
343 if (rc) {
Kirill Smelkovf2294482019-03-27 09:15:17 +0000344 pr_err("failed to register chrdev region\n");
Tejun Heo151060a2009-04-14 10:54:54 +0900345 goto err;
346 }
347
348 /* devt determined, create device */
349 rc = -ENOMEM;
350 dev = kzalloc(sizeof(*dev), GFP_KERNEL);
351 if (!dev)
352 goto err_region;
353
354 device_initialize(dev);
355 dev_set_uevent_suppress(dev, 1);
356 dev->class = cuse_class;
357 dev->devt = devt;
358 dev->release = cuse_gendev_release;
359 dev_set_drvdata(dev, cc);
360 dev_set_name(dev, "%s", devinfo.name);
361
David Herrmann30783582012-11-17 12:45:48 +0100362 mutex_lock(&cuse_lock);
363
364 /* make sure the device-name is unique */
365 for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
366 list_for_each_entry(pos, &cuse_conntbl[i], list)
367 if (!strcmp(dev_name(pos->dev), dev_name(dev)))
368 goto err_unlock;
369 }
370
Tejun Heo151060a2009-04-14 10:54:54 +0900371 rc = device_add(dev);
372 if (rc)
David Herrmann30783582012-11-17 12:45:48 +0100373 goto err_unlock;
Tejun Heo151060a2009-04-14 10:54:54 +0900374
375 /* register cdev */
376 rc = -ENOMEM;
377 cdev = cdev_alloc();
378 if (!cdev)
David Herrmann30783582012-11-17 12:45:48 +0100379 goto err_unlock;
Tejun Heo151060a2009-04-14 10:54:54 +0900380
381 cdev->owner = THIS_MODULE;
382 cdev->ops = &cuse_frontend_fops;
383
384 rc = cdev_add(cdev, devt, 1);
385 if (rc)
386 goto err_cdev;
387
388 cc->dev = dev;
389 cc->cdev = cdev;
390
391 /* make the device available */
Tejun Heo151060a2009-04-14 10:54:54 +0900392 list_add(&cc->list, cuse_conntbl_head(devt));
David Herrmann8ce03fd2012-11-17 12:45:47 +0100393 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900394
395 /* announce device availability */
396 dev_set_uevent_suppress(dev, 0);
397 kobject_uevent(&dev->kobj, KOBJ_ADD);
398out:
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100399 kfree(arg);
Tejun Heo151060a2009-04-14 10:54:54 +0900400 __free_page(page);
401 return;
402
403err_cdev:
404 cdev_del(cdev);
David Herrmann30783582012-11-17 12:45:48 +0100405err_unlock:
406 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900407 put_device(dev);
408err_region:
409 unregister_chrdev_region(devt, 1);
410err:
Miklos Szeredieb98e3bd2019-01-24 10:40:16 +0100411 fuse_abort_conn(fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900412 goto out;
413}
414
415static int cuse_send_init(struct cuse_conn *cc)
416{
417 int rc;
418 struct fuse_req *req;
419 struct page *page;
420 struct fuse_conn *fc = &cc->fc;
421 struct cuse_init_in *arg;
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100422 void *outarg;
Tejun Heo151060a2009-04-14 10:54:54 +0900423
424 BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
425
Maxim Patlasov8b41e672013-03-21 18:02:04 +0400426 req = fuse_get_req_for_background(fc, 1);
Tejun Heo151060a2009-04-14 10:54:54 +0900427 if (IS_ERR(req)) {
428 rc = PTR_ERR(req);
429 goto err;
430 }
431
432 rc = -ENOMEM;
433 page = alloc_page(GFP_KERNEL | __GFP_ZERO);
434 if (!page)
435 goto err_put_req;
436
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100437 outarg = kzalloc(sizeof(struct cuse_init_out), GFP_KERNEL);
438 if (!outarg)
439 goto err_free_page;
440
Tejun Heo151060a2009-04-14 10:54:54 +0900441 arg = &req->misc.cuse_init_in;
442 arg->major = FUSE_KERNEL_VERSION;
443 arg->minor = FUSE_KERNEL_MINOR_VERSION;
444 arg->flags |= CUSE_UNRESTRICTED_IOCTL;
445 req->in.h.opcode = CUSE_INIT;
446 req->in.numargs = 1;
447 req->in.args[0].size = sizeof(struct cuse_init_in);
448 req->in.args[0].value = arg;
449 req->out.numargs = 2;
450 req->out.args[0].size = sizeof(struct cuse_init_out);
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100451 req->out.args[0].value = outarg;
Tejun Heo151060a2009-04-14 10:54:54 +0900452 req->out.args[1].size = CUSE_INIT_INFO_MAX;
453 req->out.argvar = 1;
454 req->out.argpages = 1;
455 req->pages[0] = page;
Maxim Patlasov85f40ae2012-10-26 19:49:33 +0400456 req->page_descs[0].length = req->out.args[1].size;
Tejun Heo151060a2009-04-14 10:54:54 +0900457 req->num_pages = 1;
458 req->end = cuse_process_init_reply;
459 fuse_request_send_background(fc, req);
460
461 return 0;
462
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100463err_free_page:
464 __free_page(page);
Tejun Heo151060a2009-04-14 10:54:54 +0900465err_put_req:
466 fuse_put_request(fc, req);
467err:
468 return rc;
469}
470
471static void cuse_fc_release(struct fuse_conn *fc)
472{
473 struct cuse_conn *cc = fc_to_cc(fc);
Al Virodd3e2c552013-10-03 21:21:39 -0400474 kfree_rcu(cc, fc.rcu);
Tejun Heo151060a2009-04-14 10:54:54 +0900475}
476
477/**
478 * cuse_channel_open - open method for /dev/cuse
479 * @inode: inode for /dev/cuse
480 * @file: file struct being opened
481 *
482 * Userland CUSE server can create a CUSE device by opening /dev/cuse
Paul Bolle8272f4c2011-02-15 00:05:34 +0100483 * and replying to the initialization request kernel sends. This
Tejun Heo151060a2009-04-14 10:54:54 +0900484 * function is responsible for handling CUSE device initialization.
485 * Because the fd opened by this function is used during
486 * initialization, this function only creates cuse_conn and sends
487 * init. The rest is delegated to a kthread.
488 *
489 * RETURNS:
490 * 0 on success, -errno on failure.
491 */
492static int cuse_channel_open(struct inode *inode, struct file *file)
493{
Miklos Szeredicc080e92015-07-01 16:26:08 +0200494 struct fuse_dev *fud;
Tejun Heo151060a2009-04-14 10:54:54 +0900495 struct cuse_conn *cc;
496 int rc;
497
498 /* set up cuse_conn */
499 cc = kzalloc(sizeof(*cc), GFP_KERNEL);
500 if (!cc)
501 return -ENOMEM;
502
Eric W. Biederman8cb08322018-02-21 11:18:07 -0600503 /*
504 * Limit the cuse channel to requests that can
505 * be represented in file->f_cred->user_ns.
506 */
507 fuse_conn_init(&cc->fc, file->f_cred->user_ns);
Tejun Heo151060a2009-04-14 10:54:54 +0900508
Miklos Szeredicc080e92015-07-01 16:26:08 +0200509 fud = fuse_dev_alloc(&cc->fc);
510 if (!fud) {
511 kfree(cc);
512 return -ENOMEM;
513 }
514
Tejun Heo151060a2009-04-14 10:54:54 +0900515 INIT_LIST_HEAD(&cc->list);
516 cc->fc.release = cuse_fc_release;
517
Maxim Patlasov796523fb2013-03-21 18:02:15 +0400518 cc->fc.initialized = 1;
Tejun Heo151060a2009-04-14 10:54:54 +0900519 rc = cuse_send_init(cc);
520 if (rc) {
Miklos Szeredicc080e92015-07-01 16:26:08 +0200521 fuse_dev_free(fud);
Tejun Heo151060a2009-04-14 10:54:54 +0900522 return rc;
523 }
Miklos Szeredicc080e92015-07-01 16:26:08 +0200524 file->private_data = fud;
Tejun Heo151060a2009-04-14 10:54:54 +0900525
526 return 0;
527}
528
529/**
530 * cuse_channel_release - release method for /dev/cuse
531 * @inode: inode for /dev/cuse
532 * @file: file struct being closed
533 *
534 * Disconnect the channel, deregister CUSE device and initiate
535 * destruction by putting the default reference.
536 *
537 * RETURNS:
538 * 0 on success, -errno on failure.
539 */
540static int cuse_channel_release(struct inode *inode, struct file *file)
541{
Miklos Szeredicc080e92015-07-01 16:26:08 +0200542 struct fuse_dev *fud = file->private_data;
543 struct cuse_conn *cc = fc_to_cc(fud->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900544 int rc;
545
546 /* remove from the conntbl, no more access from this point on */
David Herrmann8ce03fd2012-11-17 12:45:47 +0100547 mutex_lock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900548 list_del_init(&cc->list);
David Herrmann8ce03fd2012-11-17 12:45:47 +0100549 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900550
551 /* remove device */
552 if (cc->dev)
553 device_unregister(cc->dev);
554 if (cc->cdev) {
555 unregister_chrdev_region(cc->cdev->dev, 1);
556 cdev_del(cc->cdev);
557 }
Miklos Szeredi2c5816b2015-11-10 10:32:36 +0100558 /* Base reference is now owned by "fud" */
559 fuse_conn_put(&cc->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900560
Tejun Heo151060a2009-04-14 10:54:54 +0900561 rc = fuse_dev_release(inode, file); /* puts the base reference */
562
563 return rc;
564}
565
566static struct file_operations cuse_channel_fops; /* initialized during init */
567
568
569/**************************************************************************
570 * Misc stuff and module initializatiion
571 *
572 * CUSE exports the same set of attributes to sysfs as fusectl.
573 */
574
575static ssize_t cuse_class_waiting_show(struct device *dev,
576 struct device_attribute *attr, char *buf)
577{
578 struct cuse_conn *cc = dev_get_drvdata(dev);
579
580 return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
581}
Rusty Russell58f86cc2014-03-24 12:00:34 +1030582static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
Tejun Heo151060a2009-04-14 10:54:54 +0900583
584static ssize_t cuse_class_abort_store(struct device *dev,
585 struct device_attribute *attr,
586 const char *buf, size_t count)
587{
588 struct cuse_conn *cc = dev_get_drvdata(dev);
589
Miklos Szeredieb98e3bd2019-01-24 10:40:16 +0100590 fuse_abort_conn(&cc->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900591 return count;
592}
Rusty Russell58f86cc2014-03-24 12:00:34 +1030593static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
Tejun Heo151060a2009-04-14 10:54:54 +0900594
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700595static struct attribute *cuse_class_dev_attrs[] = {
596 &dev_attr_waiting.attr,
597 &dev_attr_abort.attr,
598 NULL,
Tejun Heo151060a2009-04-14 10:54:54 +0900599};
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700600ATTRIBUTE_GROUPS(cuse_class_dev);
Tejun Heo151060a2009-04-14 10:54:54 +0900601
602static struct miscdevice cuse_miscdev = {
Tom Gundersencb2ffb22013-09-09 20:18:27 +0200603 .minor = CUSE_MINOR,
Tejun Heo151060a2009-04-14 10:54:54 +0900604 .name = "cuse",
605 .fops = &cuse_channel_fops,
606};
607
Tom Gundersencb2ffb22013-09-09 20:18:27 +0200608MODULE_ALIAS_MISCDEV(CUSE_MINOR);
609MODULE_ALIAS("devname:cuse");
610
Tejun Heo151060a2009-04-14 10:54:54 +0900611static int __init cuse_init(void)
612{
613 int i, rc;
614
615 /* init conntbl */
616 for (i = 0; i < CUSE_CONNTBL_LEN; i++)
617 INIT_LIST_HEAD(&cuse_conntbl[i]);
618
619 /* inherit and extend fuse_dev_operations */
620 cuse_channel_fops = fuse_dev_operations;
621 cuse_channel_fops.owner = THIS_MODULE;
622 cuse_channel_fops.open = cuse_channel_open;
623 cuse_channel_fops.release = cuse_channel_release;
624
625 cuse_class = class_create(THIS_MODULE, "cuse");
626 if (IS_ERR(cuse_class))
627 return PTR_ERR(cuse_class);
628
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700629 cuse_class->dev_groups = cuse_class_dev_groups;
Tejun Heo151060a2009-04-14 10:54:54 +0900630
631 rc = misc_register(&cuse_miscdev);
632 if (rc) {
633 class_destroy(cuse_class);
634 return rc;
635 }
636
637 return 0;
638}
639
640static void __exit cuse_exit(void)
641{
642 misc_deregister(&cuse_miscdev);
643 class_destroy(cuse_class);
644}
645
646module_init(cuse_init);
647module_exit(cuse_exit);
648
649MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
650MODULE_DESCRIPTION("Character device in Userspace");
651MODULE_LICENSE("GPL");