blob: 78f9f209078cf03551c5e1d3c9390cd59e519734 [file] [log] [blame]
Miklos Szeredie5e55582005-09-09 13:10:28 -07001/*
2 FUSE: Filesystem in Userspace
Miklos Szeredi1729a162008-11-26 12:03:54 +01003 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
Miklos Szeredie5e55582005-09-09 13:10:28 -07004
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
Max Reitzbf109c62020-04-21 14:47:15 +020013#include <linux/fs_context.h>
Miklos Szeredie5e55582005-09-09 13:10:28 -070014#include <linux/sched.h>
15#include <linux/namei.h>
Miklos Szeredi07e77dc2010-12-07 20:16:56 +010016#include <linux/slab.h>
Seth Forshee703c7362016-08-29 08:46:36 -050017#include <linux/xattr.h>
Miklos Szeredi261aaba72018-10-01 10:07:05 +020018#include <linux/iversion.h>
Seth Forshee60bcc882016-08-29 08:46:37 -050019#include <linux/posix_acl.h>
Miklos Szeredie5e55582005-09-09 13:10:28 -070020
Feng Shuo4582a4a2013-01-15 11:23:28 +080021static void fuse_advise_use_readdirplus(struct inode *dir)
22{
23 struct fuse_inode *fi = get_fuse_inode(dir);
24
25 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
26}
27
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -070028#if BITS_PER_LONG >= 64
29static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
30{
31 entry->d_fsdata = (void *) time;
32}
33
34static inline u64 fuse_dentry_time(const struct dentry *entry)
35{
36 return (u64)entry->d_fsdata;
37}
38
39#else
Miklos Szeredif75fdf22016-10-01 07:32:32 +020040union fuse_dentry {
41 u64 time;
42 struct rcu_head rcu;
43};
44
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -070045static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
46{
47 ((union fuse_dentry *) dentry->d_fsdata)->time = time;
48}
49
50static inline u64 fuse_dentry_time(const struct dentry *entry)
51{
52 return ((union fuse_dentry *) entry->d_fsdata)->time;
53}
54#endif
55
Miklos Szeredi8fab0102018-08-15 17:42:34 +020056static void fuse_dentry_settime(struct dentry *dentry, u64 time)
Miklos Szeredi0a0898c2006-07-30 03:04:10 -070057{
Miklos Szeredi8fab0102018-08-15 17:42:34 +020058 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
59 bool delete = !time && fc->delete_stale;
60 /*
61 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
62 * Don't care about races, either way it's just an optimization
63 */
64 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
65 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
66 spin_lock(&dentry->d_lock);
67 if (!delete)
68 dentry->d_flags &= ~DCACHE_OP_DELETE;
69 else
70 dentry->d_flags |= DCACHE_OP_DELETE;
71 spin_unlock(&dentry->d_lock);
72 }
73
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -070074 __fuse_dentry_settime(dentry, time);
Miklos Szeredi0a0898c2006-07-30 03:04:10 -070075}
Miklos Szeredi0a0898c2006-07-30 03:04:10 -070076
Miklos Szeredi6f9f1182006-01-06 00:19:39 -080077/*
78 * FUSE caches dentries and attributes with separate timeout. The
79 * time in jiffies until the dentry/attributes are valid is stored in
Miklos Szeredif75fdf22016-10-01 07:32:32 +020080 * dentry->d_fsdata and fuse_inode->i_time respectively.
Miklos Szeredi6f9f1182006-01-06 00:19:39 -080081 */
82
83/*
84 * Calculate the time in jiffies until a dentry/attributes are valid
85 */
Miklos Szeredibcb6f6d2016-10-01 07:32:32 +020086static u64 time_to_jiffies(u64 sec, u32 nsec)
Miklos Szeredie5e55582005-09-09 13:10:28 -070087{
Miklos Szeredi685d16d2006-07-30 03:04:08 -070088 if (sec || nsec) {
Miklos Szeredibcb6f6d2016-10-01 07:32:32 +020089 struct timespec64 ts = {
90 sec,
David Sheets21067522017-01-13 15:58:30 +000091 min_t(u32, nsec, NSEC_PER_SEC - 1)
Miklos Szeredibcb6f6d2016-10-01 07:32:32 +020092 };
93
94 return get_jiffies_64() + timespec64_to_jiffies(&ts);
Miklos Szeredi685d16d2006-07-30 03:04:08 -070095 } else
Miklos Szeredi0a0898c2006-07-30 03:04:10 -070096 return 0;
Miklos Szeredie5e55582005-09-09 13:10:28 -070097}
98
Miklos Szeredi6f9f1182006-01-06 00:19:39 -080099/*
100 * Set dentry and possibly attribute timeouts from the lookup/mk*
101 * replies
102 */
Miklos Szeredid123d8e2018-09-28 16:43:23 +0200103void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
Miklos Szeredi0aa7c692006-01-06 00:19:34 -0800104{
Miklos Szeredi0a0898c2006-07-30 03:04:10 -0700105 fuse_dentry_settime(entry,
106 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700107}
108
109static u64 attr_timeout(struct fuse_attr_out *o)
110{
111 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
112}
113
Miklos Szeredid123d8e2018-09-28 16:43:23 +0200114u64 entry_attr_timeout(struct fuse_entry_out *o)
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700115{
116 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800117}
118
Miklos Szeredi2f1e8192018-10-15 15:43:06 +0200119static void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
120{
121 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
122}
123
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800124/*
125 * Mark the attributes as stale, so that at the next call to
126 * ->getattr() they will be fetched from userspace
127 */
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800128void fuse_invalidate_attr(struct inode *inode)
129{
Miklos Szeredi2f1e8192018-10-15 15:43:06 +0200130 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800131}
132
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200133static void fuse_dir_changed(struct inode *dir)
134{
135 fuse_invalidate_attr(dir);
136 inode_maybe_inc_iversion(dir, false);
137}
138
Andrew Gallagher451418f2013-11-05 03:55:43 -0800139/**
140 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
141 * atime is not used.
142 */
143void fuse_invalidate_atime(struct inode *inode)
144{
145 if (!IS_RDONLY(inode))
Miklos Szeredi2f1e8192018-10-15 15:43:06 +0200146 fuse_invalidate_attr_mask(inode, STATX_ATIME);
Andrew Gallagher451418f2013-11-05 03:55:43 -0800147}
148
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800149/*
150 * Just mark the entry as stale, so that a next attempt to look it up
151 * will result in a new lookup call to userspace
152 *
153 * This is called when a dentry is about to become negative and the
154 * timeout is unknown (unlink, rmdir, rename and in some cases
155 * lookup)
156 */
Miklos Szeredidbd561d2008-07-25 01:49:00 -0700157void fuse_invalidate_entry_cache(struct dentry *entry)
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800158{
Miklos Szeredi0a0898c2006-07-30 03:04:10 -0700159 fuse_dentry_settime(entry, 0);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800160}
161
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800162/*
163 * Same as fuse_invalidate_entry_cache(), but also try to remove the
164 * dentry from the hash
165 */
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800166static void fuse_invalidate_entry(struct dentry *entry)
167{
168 d_invalidate(entry);
169 fuse_invalidate_entry_cache(entry);
Miklos Szeredi0aa7c692006-01-06 00:19:34 -0800170}
171
Miklos Szeredi70781872014-12-12 09:49:05 +0100172static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
Al Viro13983d02016-07-20 22:34:44 -0400173 u64 nodeid, const struct qstr *name,
Miklos Szeredie5e55582005-09-09 13:10:28 -0700174 struct fuse_entry_out *outarg)
175{
Miklos Szeredi0e9663e2007-10-18 03:07:05 -0700176 memset(outarg, 0, sizeof(struct fuse_entry_out));
Miklos Szeredid5b48542019-09-10 15:04:08 +0200177 args->opcode = FUSE_LOOKUP;
178 args->nodeid = nodeid;
179 args->in_numargs = 1;
180 args->in_args[0].size = name->len + 1;
181 args->in_args[0].value = name->name;
182 args->out_numargs = 1;
183 args->out_args[0].size = sizeof(struct fuse_entry_out);
184 args->out_args[0].value = outarg;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700185}
186
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800187/*
188 * Check whether the dentry is still valid
189 *
190 * If the entry validity timeout has expired and the dentry is
191 * positive, try to redo the lookup. If the lookup results in a
192 * different inode, then let the VFS invalidate the dentry and redo
193 * the lookup once more. If the lookup results in the same inode,
194 * then refresh the attributes, timeouts and mark the dentry valid.
195 */
Al Viro0b728e12012-06-10 16:03:43 -0400196static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
Miklos Szeredie5e55582005-09-09 13:10:28 -0700197{
Nick Piggin34286d62011-01-07 17:49:57 +1100198 struct inode *inode;
Miklos Szeredi28420da2013-06-03 14:40:22 +0200199 struct dentry *parent;
Max Reitzfcee2162020-05-06 17:44:12 +0200200 struct fuse_mount *fm;
Miklos Szeredi6314efe2013-10-01 16:41:22 +0200201 struct fuse_inode *fi;
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200202 int ret;
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800203
David Howells2b0143b2015-03-17 22:25:59 +0000204 inode = d_inode_rcu(entry);
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100205 if (inode && fuse_is_bad(inode))
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200206 goto invalid;
Anand Avati154210c2014-06-26 20:21:57 -0400207 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
Miklos Szeredidf8629a2020-11-11 17:22:32 +0100208 (flags & (LOOKUP_EXCL | LOOKUP_REVAL))) {
Miklos Szeredie5e55582005-09-09 13:10:28 -0700209 struct fuse_entry_out outarg;
Miklos Szeredi70781872014-12-12 09:49:05 +0100210 FUSE_ARGS(args);
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100211 struct fuse_forget_link *forget;
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700212 u64 attr_version;
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800213
Miklos Szeredi50322fe2006-02-28 16:59:03 -0800214 /* For negative dentries, always do a fresh lookup */
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800215 if (!inode)
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200216 goto invalid;
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800217
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200218 ret = -ECHILD;
Al Viro0b728e12012-06-10 16:03:43 -0400219 if (flags & LOOKUP_RCU)
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200220 goto out;
Miklos Szeredie7c0a162011-03-21 13:58:06 +0100221
Max Reitzfcee2162020-05-06 17:44:12 +0200222 fm = get_fuse_mount(inode);
Miklos Szeredie5e55582005-09-09 13:10:28 -0700223
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100224 forget = fuse_alloc_forget();
Miklos Szeredi70781872014-12-12 09:49:05 +0100225 ret = -ENOMEM;
226 if (!forget)
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200227 goto out;
Miklos Szeredi2d510132006-11-25 11:09:20 -0800228
Max Reitzfcee2162020-05-06 17:44:12 +0200229 attr_version = fuse_get_attr_version(fm->fc);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700230
Miklos Szeredie956edd2006-10-17 00:10:12 -0700231 parent = dget_parent(entry);
Max Reitzfcee2162020-05-06 17:44:12 +0200232 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700233 &entry->d_name, &outarg);
Max Reitzfcee2162020-05-06 17:44:12 +0200234 ret = fuse_simple_request(fm, &args);
Miklos Szeredie956edd2006-10-17 00:10:12 -0700235 dput(parent);
Miklos Szeredi50322fe2006-02-28 16:59:03 -0800236 /* Zero nodeid is same as -ENOENT */
Miklos Szeredi70781872014-12-12 09:49:05 +0100237 if (!ret && !outarg.nodeid)
238 ret = -ENOENT;
239 if (!ret) {
Miklos Szeredi6314efe2013-10-01 16:41:22 +0200240 fi = get_fuse_inode(inode);
Max Reitzbf109c62020-04-21 14:47:15 +0200241 if (outarg.nodeid != get_node_id(inode) ||
242 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
Max Reitzfcee2162020-05-06 17:44:12 +0200243 fuse_queue_forget(fm->fc, forget,
244 outarg.nodeid, 1);
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200245 goto invalid;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700246 }
Kirill Tkhaic9d8f5f2018-11-09 13:33:27 +0300247 spin_lock(&fi->lock);
Miklos Szeredi1729a162008-11-26 12:03:54 +0100248 fi->nlookup++;
Kirill Tkhaic9d8f5f2018-11-09 13:33:27 +0300249 spin_unlock(&fi->lock);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700250 }
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100251 kfree(forget);
Miklos Szeredi70781872014-12-12 09:49:05 +0100252 if (ret == -ENOMEM)
253 goto out;
Miklos Szeredieb59bd12019-11-12 11:49:04 +0100254 if (ret || fuse_invalid_attr(&outarg.attr) ||
255 (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200256 goto invalid;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700257
Seth Forshee60bcc882016-08-29 08:46:37 -0500258 forget_all_cached_acls(inode);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700259 fuse_change_attributes(inode, &outarg.attr,
260 entry_attr_timeout(&outarg),
261 attr_version);
262 fuse_change_entry_timeout(entry, &outarg);
Miklos Szeredi28420da2013-06-03 14:40:22 +0200263 } else if (inode) {
Miklos Szeredi6314efe2013-10-01 16:41:22 +0200264 fi = get_fuse_inode(inode);
265 if (flags & LOOKUP_RCU) {
266 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
267 return -ECHILD;
268 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
Miklos Szeredi28420da2013-06-03 14:40:22 +0200269 parent = dget_parent(entry);
David Howells2b0143b2015-03-17 22:25:59 +0000270 fuse_advise_use_readdirplus(d_inode(parent));
Miklos Szeredi28420da2013-06-03 14:40:22 +0200271 dput(parent);
272 }
Miklos Szeredie5e55582005-09-09 13:10:28 -0700273 }
Miklos Szeredie2a6b952013-09-05 11:44:43 +0200274 ret = 1;
275out:
276 return ret;
277
278invalid:
279 ret = 0;
280 goto out;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700281}
282
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700283#if BITS_PER_LONG < 64
Miklos Szeredif75fdf22016-10-01 07:32:32 +0200284static int fuse_dentry_init(struct dentry *dentry)
285{
Khazhismel Kumykovdc69e982019-09-17 12:35:33 -0700286 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
287 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
Miklos Szeredif75fdf22016-10-01 07:32:32 +0200288
289 return dentry->d_fsdata ? 0 : -ENOMEM;
290}
291static void fuse_dentry_release(struct dentry *dentry)
292{
293 union fuse_dentry *fd = dentry->d_fsdata;
294
295 kfree_rcu(fd, rcu);
296}
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700297#endif
Miklos Szeredif75fdf22016-10-01 07:32:32 +0200298
Miklos Szeredi8fab0102018-08-15 17:42:34 +0200299static int fuse_dentry_delete(const struct dentry *dentry)
300{
301 return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
302}
303
Max Reitzbf109c62020-04-21 14:47:15 +0200304/*
305 * Create a fuse_mount object with a new superblock (with path->dentry
306 * as the root), and return that mount so it can be auto-mounted on
307 * @path.
308 */
309static struct vfsmount *fuse_dentry_automount(struct path *path)
310{
311 struct fs_context *fsc;
312 struct fuse_mount *parent_fm = get_fuse_mount_super(path->mnt->mnt_sb);
313 struct fuse_conn *fc = parent_fm->fc;
314 struct fuse_mount *fm;
315 struct vfsmount *mnt;
316 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
317 struct super_block *sb;
318 int err;
319
320 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
321 if (IS_ERR(fsc)) {
322 err = PTR_ERR(fsc);
323 goto out;
324 }
325
326 err = -ENOMEM;
327 fm = kzalloc(sizeof(struct fuse_mount), GFP_KERNEL);
328 if (!fm)
329 goto out_put_fsc;
330
Max Reitzbf109c62020-04-21 14:47:15 +0200331 fsc->s_fs_info = fm;
332 sb = sget_fc(fsc, NULL, set_anon_super_fc);
333 if (IS_ERR(sb)) {
334 err = PTR_ERR(sb);
Miklos Szeredi514b5e32020-11-11 17:22:32 +0100335 kfree(fm);
Max Reitzbf109c62020-04-21 14:47:15 +0200336 goto out_put_fsc;
337 }
338 fm->fc = fuse_conn_get(fc);
339
340 /* Initialize superblock, making @mp_fi its root */
341 err = fuse_fill_super_submount(sb, mp_fi);
342 if (err)
343 goto out_put_sb;
344
345 sb->s_flags |= SB_ACTIVE;
346 fsc->root = dget(sb->s_root);
347 /* We are done configuring the superblock, so unlock it */
348 up_write(&sb->s_umount);
349
350 down_write(&fc->killsb);
351 list_add_tail(&fm->fc_entry, &fc->mounts);
352 up_write(&fc->killsb);
353
354 /* Create the submount */
355 mnt = vfs_create_mount(fsc);
356 if (IS_ERR(mnt)) {
357 err = PTR_ERR(mnt);
358 goto out_put_fsc;
359 }
360 mntget(mnt);
361 put_fs_context(fsc);
362 return mnt;
363
364out_put_sb:
365 /*
366 * Only jump here when fsc->root is NULL and sb is still locked
367 * (otherwise put_fs_context() will put the superblock)
368 */
369 deactivate_locked_super(sb);
370out_put_fsc:
371 put_fs_context(fsc);
372out:
373 return ERR_PTR(err);
374}
375
Al Viro42695902009-02-20 05:59:13 +0000376const struct dentry_operations fuse_dentry_operations = {
Miklos Szeredie5e55582005-09-09 13:10:28 -0700377 .d_revalidate = fuse_dentry_revalidate,
Miklos Szeredi8fab0102018-08-15 17:42:34 +0200378 .d_delete = fuse_dentry_delete,
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700379#if BITS_PER_LONG < 64
Miklos Szeredif75fdf22016-10-01 07:32:32 +0200380 .d_init = fuse_dentry_init,
381 .d_release = fuse_dentry_release,
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700382#endif
Max Reitzbf109c62020-04-21 14:47:15 +0200383 .d_automount = fuse_dentry_automount,
Miklos Szeredie5e55582005-09-09 13:10:28 -0700384};
385
Miklos Szeredi0ce267f2016-10-18 15:36:48 +0200386const struct dentry_operations fuse_root_dentry_operations = {
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700387#if BITS_PER_LONG < 64
Miklos Szeredi0ce267f2016-10-18 15:36:48 +0200388 .d_init = fuse_dentry_init,
389 .d_release = fuse_dentry_release,
Khazhismel Kumykov30c6a232019-09-16 16:56:41 -0700390#endif
Miklos Szeredi0ce267f2016-10-18 15:36:48 +0200391};
392
Timo Savolaa5bfffac2007-04-08 16:04:00 -0700393int fuse_valid_type(int m)
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800394{
395 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
396 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
397}
398
Miklos Szeredieb59bd12019-11-12 11:49:04 +0100399bool fuse_invalid_attr(struct fuse_attr *attr)
400{
401 return !fuse_valid_type(attr->mode) ||
402 attr->size > LLONG_MAX;
403}
404
Al Viro13983d02016-07-20 22:34:44 -0400405int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700406 struct fuse_entry_out *outarg, struct inode **inode)
407{
Max Reitzfcee2162020-05-06 17:44:12 +0200408 struct fuse_mount *fm = get_fuse_mount_super(sb);
Miklos Szeredi70781872014-12-12 09:49:05 +0100409 FUSE_ARGS(args);
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100410 struct fuse_forget_link *forget;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700411 u64 attr_version;
412 int err;
413
414 *inode = NULL;
415 err = -ENAMETOOLONG;
416 if (name->len > FUSE_NAME_MAX)
417 goto out;
418
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700419
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100420 forget = fuse_alloc_forget();
421 err = -ENOMEM;
Miklos Szeredi70781872014-12-12 09:49:05 +0100422 if (!forget)
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700423 goto out;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700424
Max Reitzfcee2162020-05-06 17:44:12 +0200425 attr_version = fuse_get_attr_version(fm->fc);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700426
Max Reitzfcee2162020-05-06 17:44:12 +0200427 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
428 err = fuse_simple_request(fm, &args);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700429 /* Zero nodeid is same as -ENOENT, but with valid timeout */
430 if (err || !outarg->nodeid)
431 goto out_put_forget;
432
433 err = -EIO;
434 if (!outarg->nodeid)
435 goto out_put_forget;
Miklos Szeredieb59bd12019-11-12 11:49:04 +0100436 if (fuse_invalid_attr(&outarg->attr))
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700437 goto out_put_forget;
438
439 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
440 &outarg->attr, entry_attr_timeout(outarg),
441 attr_version);
442 err = -ENOMEM;
443 if (!*inode) {
Max Reitzfcee2162020-05-06 17:44:12 +0200444 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700445 goto out;
446 }
447 err = 0;
448
449 out_put_forget:
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100450 kfree(forget);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700451 out:
452 return err;
453}
454
Miklos Szeredi0aa7c692006-01-06 00:19:34 -0800455static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
Al Viro00cd8dd2012-06-10 17:13:09 -0400456 unsigned int flags)
Miklos Szeredie5e55582005-09-09 13:10:28 -0700457{
458 int err;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700459 struct fuse_entry_out outarg;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700460 struct inode *inode;
Miklos Szeredi0de62562008-07-25 01:48:59 -0700461 struct dentry *newent;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700462 bool outarg_valid = true;
Miklos Szeredi63576c12018-07-26 16:13:11 +0200463 bool locked;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700464
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100465 if (fuse_is_bad(dir))
466 return ERR_PTR(-EIO);
467
Miklos Szeredi63576c12018-07-26 16:13:11 +0200468 locked = fuse_lock_inode(dir);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700469 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
470 &outarg, &inode);
Miklos Szeredi63576c12018-07-26 16:13:11 +0200471 fuse_unlock_inode(dir, locked);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700472 if (err == -ENOENT) {
473 outarg_valid = false;
474 err = 0;
Miklos Szeredi2d510132006-11-25 11:09:20 -0800475 }
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700476 if (err)
477 goto out_err;
Miklos Szeredi2d510132006-11-25 11:09:20 -0800478
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700479 err = -EIO;
480 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
481 goto out_iput;
Miklos Szeredie5e55582005-09-09 13:10:28 -0700482
Al Viro41d28bc2014-10-12 22:24:21 -0400483 newent = d_splice_alias(inode, entry);
Miklos Szeredi5835f332013-09-05 11:44:42 +0200484 err = PTR_ERR(newent);
485 if (IS_ERR(newent))
486 goto out_err;
Miklos Szeredid2a85162006-10-17 00:10:11 -0700487
Miklos Szeredi0de62562008-07-25 01:48:59 -0700488 entry = newent ? newent : entry;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700489 if (outarg_valid)
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700490 fuse_change_entry_timeout(entry, &outarg);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800491 else
492 fuse_invalidate_entry_cache(entry);
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700493
Miklos Szeredi6c26f712019-10-21 15:57:07 +0200494 if (inode)
495 fuse_advise_use_readdirplus(dir);
Miklos Szeredi0de62562008-07-25 01:48:59 -0700496 return newent;
Miklos Szeredic180eeb2008-07-25 01:49:01 -0700497
498 out_iput:
499 iput(inode);
500 out_err:
501 return ERR_PTR(err);
Miklos Szeredie5e55582005-09-09 13:10:28 -0700502}
503
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800504/*
505 * Atomic create+open operation
506 *
507 * If the filesystem doesn't support this, then fall back to separate
508 * 'mknod' + 'open' requests.
509 */
Al Virod9585272012-06-22 12:39:14 +0400510static int fuse_create_open(struct inode *dir, struct dentry *entry,
Al Viro30d90492012-06-22 12:40:19 +0400511 struct file *file, unsigned flags,
Al Virob452a452018-06-08 13:06:28 -0400512 umode_t mode)
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800513{
514 int err;
515 struct inode *inode;
Max Reitzfcee2162020-05-06 17:44:12 +0200516 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100517 FUSE_ARGS(args);
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100518 struct fuse_forget_link *forget;
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200519 struct fuse_create_in inarg;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800520 struct fuse_open_out outopen;
521 struct fuse_entry_out outentry;
Kirill Tkhaiebf84d02018-11-09 13:33:11 +0300522 struct fuse_inode *fi;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800523 struct fuse_file *ff;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800524
Miklos Szerediaf109bc2012-08-15 13:01:24 +0200525 /* Userspace expects S_IFREG in create mode */
526 BUG_ON((mode & S_IFMT) != S_IFREG);
527
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100528 forget = fuse_alloc_forget();
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200529 err = -ENOMEM;
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100530 if (!forget)
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200531 goto out_err;
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700532
Miklos Szeredice1d5a42006-04-10 22:54:58 -0700533 err = -ENOMEM;
Max Reitzfcee2162020-05-06 17:44:12 +0200534 ff = fuse_file_alloc(fm);
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800535 if (!ff)
Miklos Szeredi70781872014-12-12 09:49:05 +0100536 goto out_put_forget_req;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800537
Max Reitzfcee2162020-05-06 17:44:12 +0200538 if (!fm->fc->dont_mask)
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200539 mode &= ~current_umask();
540
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800541 flags &= ~O_NOCTTY;
542 memset(&inarg, 0, sizeof(inarg));
Miklos Szeredi0e9663e2007-10-18 03:07:05 -0700543 memset(&outentry, 0, sizeof(outentry));
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800544 inarg.flags = flags;
545 inarg.mode = mode;
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200546 inarg.umask = current_umask();
Vivek Goyal643a6662020-10-09 14:15:11 -0400547
548 if (fm->fc->handle_killpriv_v2 && (flags & O_TRUNC) &&
549 !(flags & O_EXCL) && !capable(CAP_FSETID)) {
550 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
551 }
552
Miklos Szeredid5b48542019-09-10 15:04:08 +0200553 args.opcode = FUSE_CREATE;
554 args.nodeid = get_node_id(dir);
555 args.in_numargs = 2;
556 args.in_args[0].size = sizeof(inarg);
557 args.in_args[0].value = &inarg;
558 args.in_args[1].size = entry->d_name.len + 1;
559 args.in_args[1].value = entry->d_name.name;
560 args.out_numargs = 2;
561 args.out_args[0].size = sizeof(outentry);
562 args.out_args[0].value = &outentry;
563 args.out_args[1].size = sizeof(outopen);
564 args.out_args[1].value = &outopen;
Max Reitzfcee2162020-05-06 17:44:12 +0200565 err = fuse_simple_request(fm, &args);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200566 if (err)
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800567 goto out_free_ff;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800568
569 err = -EIO;
Miklos Szeredieb59bd12019-11-12 11:49:04 +0100570 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
571 fuse_invalid_attr(&outentry.attr))
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800572 goto out_free_ff;
573
Miklos Szeredic7b71432009-04-28 16:56:37 +0200574 ff->fh = outopen.fh;
575 ff->nodeid = outentry.nodeid;
576 ff->open_flags = outopen.open_flags;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800577 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700578 &outentry.attr, entry_attr_timeout(&outentry), 0);
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800579 if (!inode) {
580 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
Kirill Tkhaiebf84d02018-11-09 13:33:11 +0300581 fuse_sync_release(NULL, ff, flags);
Max Reitzfcee2162020-05-06 17:44:12 +0200582 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200583 err = -ENOMEM;
584 goto out_err;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800585 }
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100586 kfree(forget);
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800587 d_instantiate(entry, inode);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700588 fuse_change_entry_timeout(entry, &outentry);
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200589 fuse_dir_changed(dir);
Al Virobe12af32018-06-08 11:44:56 -0400590 err = finish_open(file, entry, generic_file_open);
Al Viro30d90492012-06-22 12:40:19 +0400591 if (err) {
Kirill Tkhaiebf84d02018-11-09 13:33:11 +0300592 fi = get_fuse_inode(inode);
593 fuse_sync_release(fi, ff, flags);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200594 } else {
Miklos Szeredi267d8442017-02-22 20:08:25 +0100595 file->private_data = ff;
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200596 fuse_finish_open(inode, file);
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800597 }
Al Virod9585272012-06-22 12:39:14 +0400598 return err;
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800599
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200600out_free_ff:
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800601 fuse_file_free(ff);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200602out_put_forget_req:
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100603 kfree(forget);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200604out_err:
Al Virod9585272012-06-22 12:39:14 +0400605 return err;
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200606}
607
608static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
Al Virod9585272012-06-22 12:39:14 +0400609static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
Al Viro30d90492012-06-22 12:40:19 +0400610 struct file *file, unsigned flags,
Al Viro44907d72018-06-08 13:32:02 -0400611 umode_t mode)
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200612{
613 int err;
614 struct fuse_conn *fc = get_fuse_conn(dir);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200615 struct dentry *res = NULL;
616
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100617 if (fuse_is_bad(dir))
618 return -EIO;
619
Al Viro00699ad2016-07-05 09:44:53 -0400620 if (d_in_lookup(entry)) {
Al Viro00cd8dd2012-06-10 17:13:09 -0400621 res = fuse_lookup(dir, entry, 0);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200622 if (IS_ERR(res))
Al Virod9585272012-06-22 12:39:14 +0400623 return PTR_ERR(res);
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200624
625 if (res)
626 entry = res;
627 }
628
David Howells2b0143b2015-03-17 22:25:59 +0000629 if (!(flags & O_CREAT) || d_really_is_positive(entry))
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200630 goto no_open;
631
632 /* Only creates */
Al Viro73a09dd2018-06-08 13:22:02 -0400633 file->f_mode |= FMODE_CREATED;
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200634
635 if (fc->no_create)
636 goto mknod;
637
Al Virob452a452018-06-08 13:06:28 -0400638 err = fuse_create_open(dir, entry, file, flags, mode);
Al Virod9585272012-06-22 12:39:14 +0400639 if (err == -ENOSYS) {
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200640 fc->no_create = 1;
641 goto mknod;
642 }
643out_dput:
644 dput(res);
Al Virod9585272012-06-22 12:39:14 +0400645 return err;
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200646
647mknod:
648 err = fuse_mknod(dir, entry, mode, 0);
Al Virod9585272012-06-22 12:39:14 +0400649 if (err)
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200650 goto out_dput;
Miklos Szeredic8ccbe02012-06-05 15:10:22 +0200651no_open:
Al Viroe45198a2012-06-10 06:48:09 -0400652 return finish_no_open(file, res);
Miklos Szeredifd72faa2005-11-07 00:59:51 -0800653}
654
Miklos Szeredi6f9f1182006-01-06 00:19:39 -0800655/*
656 * Code shared between mknod, mkdir, symlink and link
657 */
Max Reitzfcee2162020-05-06 17:44:12 +0200658static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args,
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700659 struct inode *dir, struct dentry *entry,
Al Viro541af6a2011-07-26 03:17:33 -0400660 umode_t mode)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700661{
662 struct fuse_entry_out outarg;
663 struct inode *inode;
Al Viroc971e6a2018-05-28 18:27:19 -0400664 struct dentry *d;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700665 int err;
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100666 struct fuse_forget_link *forget;
Miklos Szeredi2d510132006-11-25 11:09:20 -0800667
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100668 if (fuse_is_bad(dir))
669 return -EIO;
670
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100671 forget = fuse_alloc_forget();
Miklos Szeredi70781872014-12-12 09:49:05 +0100672 if (!forget)
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100673 return -ENOMEM;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700674
Miklos Szeredi0e9663e2007-10-18 03:07:05 -0700675 memset(&outarg, 0, sizeof(outarg));
Miklos Szeredid5b48542019-09-10 15:04:08 +0200676 args->nodeid = get_node_id(dir);
677 args->out_numargs = 1;
678 args->out_args[0].size = sizeof(outarg);
679 args->out_args[0].value = &outarg;
Max Reitzfcee2162020-05-06 17:44:12 +0200680 err = fuse_simple_request(fm, args);
Miklos Szeredi2d510132006-11-25 11:09:20 -0800681 if (err)
682 goto out_put_forget_req;
683
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800684 err = -EIO;
Miklos Szeredieb59bd12019-11-12 11:49:04 +0100685 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
Miklos Szeredi2d510132006-11-25 11:09:20 -0800686 goto out_put_forget_req;
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800687
688 if ((outarg.attr.mode ^ mode) & S_IFMT)
Miklos Szeredi2d510132006-11-25 11:09:20 -0800689 goto out_put_forget_req;
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800690
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700691 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700692 &outarg.attr, entry_attr_timeout(&outarg), 0);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700693 if (!inode) {
Max Reitzfcee2162020-05-06 17:44:12 +0200694 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700695 return -ENOMEM;
696 }
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100697 kfree(forget);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700698
Al Viroc971e6a2018-05-28 18:27:19 -0400699 d_drop(entry);
700 d = d_splice_alias(inode, entry);
701 if (IS_ERR(d))
702 return PTR_ERR(d);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700703
Al Viroc971e6a2018-05-28 18:27:19 -0400704 if (d) {
705 fuse_change_entry_timeout(d, &outarg);
706 dput(d);
707 } else {
708 fuse_change_entry_timeout(entry, &outarg);
709 }
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200710 fuse_dir_changed(dir);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700711 return 0;
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800712
Miklos Szeredi2d510132006-11-25 11:09:20 -0800713 out_put_forget_req:
Miklos Szeredi07e77dc2010-12-07 20:16:56 +0100714 kfree(forget);
Miklos Szeredi39ee0592006-01-06 00:19:43 -0800715 return err;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700716}
717
Al Viro1a67aaf2011-07-26 01:52:52 -0400718static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700719 dev_t rdev)
720{
721 struct fuse_mknod_in inarg;
Max Reitzfcee2162020-05-06 17:44:12 +0200722 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100723 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700724
Max Reitzfcee2162020-05-06 17:44:12 +0200725 if (!fm->fc->dont_mask)
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200726 mode &= ~current_umask();
727
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700728 memset(&inarg, 0, sizeof(inarg));
729 inarg.mode = mode;
730 inarg.rdev = new_encode_dev(rdev);
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200731 inarg.umask = current_umask();
Miklos Szeredid5b48542019-09-10 15:04:08 +0200732 args.opcode = FUSE_MKNOD;
733 args.in_numargs = 2;
734 args.in_args[0].size = sizeof(inarg);
735 args.in_args[0].value = &inarg;
736 args.in_args[1].size = entry->d_name.len + 1;
737 args.in_args[1].value = entry->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200738 return create_new_entry(fm, &args, dir, entry, mode);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700739}
740
Al Viro4acdaf22011-07-26 01:42:34 -0400741static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
Al Viroebfc3b42012-06-10 18:05:36 -0400742 bool excl)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700743{
744 return fuse_mknod(dir, entry, mode, 0);
745}
746
Al Viro18bb1db2011-07-26 01:41:39 -0400747static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700748{
749 struct fuse_mkdir_in inarg;
Max Reitzfcee2162020-05-06 17:44:12 +0200750 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100751 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700752
Max Reitzfcee2162020-05-06 17:44:12 +0200753 if (!fm->fc->dont_mask)
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200754 mode &= ~current_umask();
755
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700756 memset(&inarg, 0, sizeof(inarg));
757 inarg.mode = mode;
Miklos Szeredie0a43dd2009-06-30 20:12:23 +0200758 inarg.umask = current_umask();
Miklos Szeredid5b48542019-09-10 15:04:08 +0200759 args.opcode = FUSE_MKDIR;
760 args.in_numargs = 2;
761 args.in_args[0].size = sizeof(inarg);
762 args.in_args[0].value = &inarg;
763 args.in_args[1].size = entry->d_name.len + 1;
764 args.in_args[1].value = entry->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200765 return create_new_entry(fm, &args, dir, entry, S_IFDIR);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700766}
767
768static int fuse_symlink(struct inode *dir, struct dentry *entry,
769 const char *link)
770{
Max Reitzfcee2162020-05-06 17:44:12 +0200771 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700772 unsigned len = strlen(link) + 1;
Miklos Szeredi70781872014-12-12 09:49:05 +0100773 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700774
Miklos Szeredid5b48542019-09-10 15:04:08 +0200775 args.opcode = FUSE_SYMLINK;
776 args.in_numargs = 2;
777 args.in_args[0].size = entry->d_name.len + 1;
778 args.in_args[0].value = entry->d_name.name;
779 args.in_args[1].size = len;
780 args.in_args[1].value = link;
Max Reitzfcee2162020-05-06 17:44:12 +0200781 return create_new_entry(fm, &args, dir, entry, S_IFLNK);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700782}
783
Seth Forshee703c7362016-08-29 08:46:36 -0500784void fuse_update_ctime(struct inode *inode)
Maxim Patlasov31f32672014-04-28 14:19:24 +0200785{
786 if (!IS_NOCMTIME(inode)) {
Deepa Dinamanic2050a42016-09-14 07:48:06 -0700787 inode->i_ctime = current_time(inode);
Maxim Patlasov31f32672014-04-28 14:19:24 +0200788 mark_inode_dirty_sync(inode);
789 }
790}
791
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700792static int fuse_unlink(struct inode *dir, struct dentry *entry)
793{
794 int err;
Max Reitzfcee2162020-05-06 17:44:12 +0200795 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100796 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700797
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100798 if (fuse_is_bad(dir))
799 return -EIO;
800
Miklos Szeredid5b48542019-09-10 15:04:08 +0200801 args.opcode = FUSE_UNLINK;
802 args.nodeid = get_node_id(dir);
803 args.in_numargs = 1;
804 args.in_args[0].size = entry->d_name.len + 1;
805 args.in_args[0].value = entry->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200806 err = fuse_simple_request(fm, &args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700807 if (!err) {
David Howells2b0143b2015-03-17 22:25:59 +0000808 struct inode *inode = d_inode(entry);
Miklos Szerediac45d612012-03-05 15:48:11 +0100809 struct fuse_inode *fi = get_fuse_inode(inode);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700810
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +0300811 spin_lock(&fi->lock);
Max Reitzfcee2162020-05-06 17:44:12 +0200812 fi->attr_version = atomic64_inc_return(&fm->fc->attr_version);
Miklos Szeredidfca7ce2013-02-04 15:57:42 +0100813 /*
814 * If i_nlink == 0 then unlink doesn't make sense, yet this can
815 * happen if userspace filesystem is careless. It would be
816 * difficult to enforce correct nlink usage so just ignore this
817 * condition here
818 */
819 if (inode->i_nlink > 0)
820 drop_nlink(inode);
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +0300821 spin_unlock(&fi->lock);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700822 fuse_invalidate_attr(inode);
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200823 fuse_dir_changed(dir);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800824 fuse_invalidate_entry_cache(entry);
Maxim Patlasov31f32672014-04-28 14:19:24 +0200825 fuse_update_ctime(inode);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700826 } else if (err == -EINTR)
827 fuse_invalidate_entry(entry);
828 return err;
829}
830
831static int fuse_rmdir(struct inode *dir, struct dentry *entry)
832{
833 int err;
Max Reitzfcee2162020-05-06 17:44:12 +0200834 struct fuse_mount *fm = get_fuse_mount(dir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100835 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700836
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100837 if (fuse_is_bad(dir))
838 return -EIO;
839
Miklos Szeredid5b48542019-09-10 15:04:08 +0200840 args.opcode = FUSE_RMDIR;
841 args.nodeid = get_node_id(dir);
842 args.in_numargs = 1;
843 args.in_args[0].size = entry->d_name.len + 1;
844 args.in_args[0].value = entry->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200845 err = fuse_simple_request(fm, &args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700846 if (!err) {
David Howells2b0143b2015-03-17 22:25:59 +0000847 clear_nlink(d_inode(entry));
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200848 fuse_dir_changed(dir);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800849 fuse_invalidate_entry_cache(entry);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700850 } else if (err == -EINTR)
851 fuse_invalidate_entry(entry);
852 return err;
853}
854
Miklos Szeredi1560c972014-04-28 16:43:44 +0200855static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
856 struct inode *newdir, struct dentry *newent,
857 unsigned int flags, int opcode, size_t argsize)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700858{
859 int err;
Miklos Szeredi1560c972014-04-28 16:43:44 +0200860 struct fuse_rename2_in inarg;
Max Reitzfcee2162020-05-06 17:44:12 +0200861 struct fuse_mount *fm = get_fuse_mount(olddir);
Miklos Szeredi70781872014-12-12 09:49:05 +0100862 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700863
Miklos Szeredi1560c972014-04-28 16:43:44 +0200864 memset(&inarg, 0, argsize);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700865 inarg.newdir = get_node_id(newdir);
Miklos Szeredi1560c972014-04-28 16:43:44 +0200866 inarg.flags = flags;
Miklos Szeredid5b48542019-09-10 15:04:08 +0200867 args.opcode = opcode;
868 args.nodeid = get_node_id(olddir);
869 args.in_numargs = 3;
870 args.in_args[0].size = argsize;
871 args.in_args[0].value = &inarg;
872 args.in_args[1].size = oldent->d_name.len + 1;
873 args.in_args[1].value = oldent->d_name.name;
874 args.in_args[2].size = newent->d_name.len + 1;
875 args.in_args[2].value = newent->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200876 err = fuse_simple_request(fm, &args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700877 if (!err) {
Miklos Szeredi08b63302007-11-28 16:22:03 -0800878 /* ctime changes */
David Howells2b0143b2015-03-17 22:25:59 +0000879 fuse_invalidate_attr(d_inode(oldent));
880 fuse_update_ctime(d_inode(oldent));
Miklos Szeredi08b63302007-11-28 16:22:03 -0800881
Miklos Szeredi1560c972014-04-28 16:43:44 +0200882 if (flags & RENAME_EXCHANGE) {
David Howells2b0143b2015-03-17 22:25:59 +0000883 fuse_invalidate_attr(d_inode(newent));
884 fuse_update_ctime(d_inode(newent));
Miklos Szeredi1560c972014-04-28 16:43:44 +0200885 }
886
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200887 fuse_dir_changed(olddir);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700888 if (olddir != newdir)
Miklos Szeredi261aaba72018-10-01 10:07:05 +0200889 fuse_dir_changed(newdir);
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800890
891 /* newent will end up negative */
David Howells2b0143b2015-03-17 22:25:59 +0000892 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) {
893 fuse_invalidate_attr(d_inode(newent));
Miklos Szeredi8cbdf1e2006-01-06 00:19:38 -0800894 fuse_invalidate_entry_cache(newent);
David Howells2b0143b2015-03-17 22:25:59 +0000895 fuse_update_ctime(d_inode(newent));
Miklos Szeredi5219f342009-11-04 10:24:52 +0100896 }
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700897 } else if (err == -EINTR) {
898 /* If request was interrupted, DEITY only knows if the
899 rename actually took place. If the invalidation
900 fails (e.g. some process has CWD under the renamed
901 directory), then there can be inconsistency between
902 the dcache and the real filesystem. Tough luck. */
903 fuse_invalidate_entry(oldent);
David Howells2b0143b2015-03-17 22:25:59 +0000904 if (d_really_is_positive(newent))
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700905 fuse_invalidate_entry(newent);
906 }
907
908 return err;
909}
910
Miklos Szeredi1560c972014-04-28 16:43:44 +0200911static int fuse_rename2(struct inode *olddir, struct dentry *oldent,
912 struct inode *newdir, struct dentry *newent,
913 unsigned int flags)
914{
915 struct fuse_conn *fc = get_fuse_conn(olddir);
916 int err;
917
Miklos Szeredi5d069db2020-12-10 15:33:14 +0100918 if (fuse_is_bad(olddir))
919 return -EIO;
920
Vivek Goyal519525f2020-02-05 08:15:46 -0500921 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
Miklos Szeredi1560c972014-04-28 16:43:44 +0200922 return -EINVAL;
923
Miklos Szeredi4237ba42014-07-10 10:50:19 +0200924 if (flags) {
925 if (fc->no_rename2 || fc->minor < 23)
926 return -EINVAL;
Miklos Szeredi1560c972014-04-28 16:43:44 +0200927
Miklos Szeredi4237ba42014-07-10 10:50:19 +0200928 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
929 FUSE_RENAME2,
930 sizeof(struct fuse_rename2_in));
931 if (err == -ENOSYS) {
932 fc->no_rename2 = 1;
933 err = -EINVAL;
934 }
935 } else {
936 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
937 FUSE_RENAME,
938 sizeof(struct fuse_rename_in));
Miklos Szeredi1560c972014-04-28 16:43:44 +0200939 }
Miklos Szeredi1560c972014-04-28 16:43:44 +0200940
Miklos Szeredi4237ba42014-07-10 10:50:19 +0200941 return err;
942}
943
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700944static int fuse_link(struct dentry *entry, struct inode *newdir,
945 struct dentry *newent)
946{
947 int err;
948 struct fuse_link_in inarg;
David Howells2b0143b2015-03-17 22:25:59 +0000949 struct inode *inode = d_inode(entry);
Max Reitzfcee2162020-05-06 17:44:12 +0200950 struct fuse_mount *fm = get_fuse_mount(inode);
Miklos Szeredi70781872014-12-12 09:49:05 +0100951 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700952
953 memset(&inarg, 0, sizeof(inarg));
954 inarg.oldnodeid = get_node_id(inode);
Miklos Szeredid5b48542019-09-10 15:04:08 +0200955 args.opcode = FUSE_LINK;
956 args.in_numargs = 2;
957 args.in_args[0].size = sizeof(inarg);
958 args.in_args[0].value = &inarg;
959 args.in_args[1].size = newent->d_name.len + 1;
960 args.in_args[1].value = newent->d_name.name;
Max Reitzfcee2162020-05-06 17:44:12 +0200961 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700962 /* Contrary to "normal" filesystems it can happen that link
963 makes two "logical" inodes point to the same "physical"
964 inode. We invalidate the attributes of the old one, so it
965 will reflect changes in the backing inode (link count,
966 etc.)
967 */
Miklos Szerediac45d612012-03-05 15:48:11 +0100968 if (!err) {
969 struct fuse_inode *fi = get_fuse_inode(inode);
970
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +0300971 spin_lock(&fi->lock);
Max Reitzfcee2162020-05-06 17:44:12 +0200972 fi->attr_version = atomic64_inc_return(&fm->fc->attr_version);
Miklos Szeredic634da72019-11-12 11:49:04 +0100973 if (likely(inode->i_nlink < UINT_MAX))
974 inc_nlink(inode);
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +0300975 spin_unlock(&fi->lock);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700976 fuse_invalidate_attr(inode);
Maxim Patlasov31f32672014-04-28 14:19:24 +0200977 fuse_update_ctime(inode);
Miklos Szerediac45d612012-03-05 15:48:11 +0100978 } else if (err == -EINTR) {
979 fuse_invalidate_attr(inode);
980 }
Miklos Szeredi9e6268d2005-09-09 13:10:29 -0700981 return err;
982}
983
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700984static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
985 struct kstat *stat)
986{
Miklos Szeredi203627b2012-05-10 19:49:38 +0400987 unsigned int blkbits;
Pavel Emelyanov83732002013-10-10 17:10:46 +0400988 struct fuse_conn *fc = get_fuse_conn(inode);
989
990 /* see the comment in fuse_change_attributes() */
Maxim Patlasovb0aa7602013-12-26 19:51:11 +0400991 if (fc->writeback_cache && S_ISREG(inode->i_mode)) {
Pavel Emelyanov83732002013-10-10 17:10:46 +0400992 attr->size = i_size_read(inode);
Maxim Patlasovb0aa7602013-12-26 19:51:11 +0400993 attr->mtime = inode->i_mtime.tv_sec;
994 attr->mtimensec = inode->i_mtime.tv_nsec;
Maxim Patlasov31f32672014-04-28 14:19:24 +0200995 attr->ctime = inode->i_ctime.tv_sec;
996 attr->ctimensec = inode->i_ctime.tv_nsec;
Maxim Patlasovb0aa7602013-12-26 19:51:11 +0400997 }
Miklos Szeredi203627b2012-05-10 19:49:38 +0400998
Miklos Szeredi1fb69e72007-10-18 03:06:58 -0700999 stat->dev = inode->i_sb->s_dev;
1000 stat->ino = attr->ino;
1001 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
1002 stat->nlink = attr->nlink;
Eric W. Biederman8cb08322018-02-21 11:18:07 -06001003 stat->uid = make_kuid(fc->user_ns, attr->uid);
1004 stat->gid = make_kgid(fc->user_ns, attr->gid);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -07001005 stat->rdev = inode->i_rdev;
1006 stat->atime.tv_sec = attr->atime;
1007 stat->atime.tv_nsec = attr->atimensec;
1008 stat->mtime.tv_sec = attr->mtime;
1009 stat->mtime.tv_nsec = attr->mtimensec;
1010 stat->ctime.tv_sec = attr->ctime;
1011 stat->ctime.tv_nsec = attr->ctimensec;
1012 stat->size = attr->size;
1013 stat->blocks = attr->blocks;
Miklos Szeredi203627b2012-05-10 19:49:38 +04001014
1015 if (attr->blksize != 0)
1016 blkbits = ilog2(attr->blksize);
1017 else
1018 blkbits = inode->i_sb->s_blocksize_bits;
1019
1020 stat->blksize = 1 << blkbits;
Miklos Szeredi1fb69e72007-10-18 03:06:58 -07001021}
1022
Miklos Szeredic79e3222007-10-18 03:06:59 -07001023static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
1024 struct file *file)
Miklos Szeredie5e55582005-09-09 13:10:28 -07001025{
1026 int err;
Miklos Szeredic79e3222007-10-18 03:06:59 -07001027 struct fuse_getattr_in inarg;
1028 struct fuse_attr_out outarg;
Max Reitzfcee2162020-05-06 17:44:12 +02001029 struct fuse_mount *fm = get_fuse_mount(inode);
Miklos Szeredi70781872014-12-12 09:49:05 +01001030 FUSE_ARGS(args);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -07001031 u64 attr_version;
1032
Max Reitzfcee2162020-05-06 17:44:12 +02001033 attr_version = fuse_get_attr_version(fm->fc);
Miklos Szeredi1fb69e72007-10-18 03:06:58 -07001034
Miklos Szeredic79e3222007-10-18 03:06:59 -07001035 memset(&inarg, 0, sizeof(inarg));
Miklos Szeredi0e9663e2007-10-18 03:07:05 -07001036 memset(&outarg, 0, sizeof(outarg));
Miklos Szeredic79e3222007-10-18 03:06:59 -07001037 /* Directories have separate file-handle space */
1038 if (file && S_ISREG(inode->i_mode)) {
1039 struct fuse_file *ff = file->private_data;
1040
1041 inarg.getattr_flags |= FUSE_GETATTR_FH;
1042 inarg.fh = ff->fh;
1043 }
Miklos Szeredid5b48542019-09-10 15:04:08 +02001044 args.opcode = FUSE_GETATTR;
1045 args.nodeid = get_node_id(inode);
1046 args.in_numargs = 1;
1047 args.in_args[0].size = sizeof(inarg);
1048 args.in_args[0].value = &inarg;
1049 args.out_numargs = 1;
1050 args.out_args[0].size = sizeof(outarg);
1051 args.out_args[0].value = &outarg;
Max Reitzfcee2162020-05-06 17:44:12 +02001052 err = fuse_simple_request(fm, &args);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001053 if (!err) {
Miklos Szeredieb59bd12019-11-12 11:49:04 +01001054 if (fuse_invalid_attr(&outarg.attr) ||
1055 (inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001056 fuse_make_bad(inode);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001057 err = -EIO;
1058 } else {
Miklos Szeredic79e3222007-10-18 03:06:59 -07001059 fuse_change_attributes(inode, &outarg.attr,
1060 attr_timeout(&outarg),
Miklos Szeredi1fb69e72007-10-18 03:06:58 -07001061 attr_version);
1062 if (stat)
Miklos Szeredic79e3222007-10-18 03:06:59 -07001063 fuse_fillattr(inode, &outarg.attr, stat);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001064 }
1065 }
1066 return err;
1067}
1068
Miklos Szeredi5b97eea2017-09-12 16:57:54 +02001069static int fuse_update_get_attr(struct inode *inode, struct file *file,
Miklos Szeredi2f1e8192018-10-15 15:43:06 +02001070 struct kstat *stat, u32 request_mask,
1071 unsigned int flags)
Miklos Szeredibcb4be82007-11-28 16:21:59 -08001072{
1073 struct fuse_inode *fi = get_fuse_inode(inode);
Miklos Szeredi5b97eea2017-09-12 16:57:54 +02001074 int err = 0;
Miklos Szeredibf5c1892018-03-20 17:11:44 +01001075 bool sync;
Miklos Szeredibcb4be82007-11-28 16:21:59 -08001076
Miklos Szeredibf5c1892018-03-20 17:11:44 +01001077 if (flags & AT_STATX_FORCE_SYNC)
1078 sync = true;
1079 else if (flags & AT_STATX_DONT_SYNC)
1080 sync = false;
Miklos Szeredi2f1e8192018-10-15 15:43:06 +02001081 else if (request_mask & READ_ONCE(fi->inval_mask))
1082 sync = true;
Miklos Szeredibf5c1892018-03-20 17:11:44 +01001083 else
1084 sync = time_before64(fi->i_time, get_jiffies_64());
1085
1086 if (sync) {
Seth Forshee60bcc882016-08-29 08:46:37 -05001087 forget_all_cached_acls(inode);
Miklos Szeredibcb4be82007-11-28 16:21:59 -08001088 err = fuse_do_getattr(inode, stat, file);
Miklos Szeredi5b97eea2017-09-12 16:57:54 +02001089 } else if (stat) {
1090 generic_fillattr(inode, stat);
1091 stat->mode = fi->orig_i_mode;
1092 stat->ino = fi->orig_ino;
Miklos Szeredibcb4be82007-11-28 16:21:59 -08001093 }
1094
Miklos Szeredibcb4be82007-11-28 16:21:59 -08001095 return err;
1096}
1097
Miklos Szeredi5b97eea2017-09-12 16:57:54 +02001098int fuse_update_attributes(struct inode *inode, struct file *file)
1099{
Miklos Szeredi802dc042018-10-15 15:43:06 +02001100 /* Do *not* need to get atime for internal purposes */
1101 return fuse_update_get_attr(inode, file, NULL,
1102 STATX_BASIC_STATS & ~STATX_ATIME, 0);
Miklos Szeredi5b97eea2017-09-12 16:57:54 +02001103}
1104
Max Reitzfcee2162020-05-06 17:44:12 +02001105int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
John Muir451d0f52011-12-06 21:50:06 +01001106 u64 child_nodeid, struct qstr *name)
John Muir3b463ae2009-05-31 11:13:57 -04001107{
1108 int err = -ENOTDIR;
1109 struct inode *parent;
1110 struct dentry *dir;
1111 struct dentry *entry;
1112
Max Reitzfcee2162020-05-06 17:44:12 +02001113 parent = fuse_ilookup(fc, parent_nodeid, NULL);
John Muir3b463ae2009-05-31 11:13:57 -04001114 if (!parent)
1115 return -ENOENT;
1116
Al Viro59551022016-01-22 15:40:57 -05001117 inode_lock(parent);
John Muir3b463ae2009-05-31 11:13:57 -04001118 if (!S_ISDIR(parent->i_mode))
1119 goto unlock;
1120
1121 err = -ENOENT;
1122 dir = d_find_alias(parent);
1123 if (!dir)
1124 goto unlock;
1125
Linus Torvalds8387ff22016-06-10 07:51:30 -07001126 name->hash = full_name_hash(dir, name->name, name->len);
John Muir3b463ae2009-05-31 11:13:57 -04001127 entry = d_lookup(dir, name);
1128 dput(dir);
1129 if (!entry)
1130 goto unlock;
1131
Miklos Szeredi261aaba72018-10-01 10:07:05 +02001132 fuse_dir_changed(parent);
John Muir3b463ae2009-05-31 11:13:57 -04001133 fuse_invalidate_entry(entry);
John Muir451d0f52011-12-06 21:50:06 +01001134
David Howells2b0143b2015-03-17 22:25:59 +00001135 if (child_nodeid != 0 && d_really_is_positive(entry)) {
Al Viro59551022016-01-22 15:40:57 -05001136 inode_lock(d_inode(entry));
David Howells2b0143b2015-03-17 22:25:59 +00001137 if (get_node_id(d_inode(entry)) != child_nodeid) {
John Muir451d0f52011-12-06 21:50:06 +01001138 err = -ENOENT;
1139 goto badentry;
1140 }
1141 if (d_mountpoint(entry)) {
1142 err = -EBUSY;
1143 goto badentry;
1144 }
David Howellse36cb0b2015-01-29 12:02:35 +00001145 if (d_is_dir(entry)) {
John Muir451d0f52011-12-06 21:50:06 +01001146 shrink_dcache_parent(entry);
1147 if (!simple_empty(entry)) {
1148 err = -ENOTEMPTY;
1149 goto badentry;
1150 }
David Howells2b0143b2015-03-17 22:25:59 +00001151 d_inode(entry)->i_flags |= S_DEAD;
John Muir451d0f52011-12-06 21:50:06 +01001152 }
1153 dont_mount(entry);
David Howells2b0143b2015-03-17 22:25:59 +00001154 clear_nlink(d_inode(entry));
John Muir451d0f52011-12-06 21:50:06 +01001155 err = 0;
1156 badentry:
Al Viro59551022016-01-22 15:40:57 -05001157 inode_unlock(d_inode(entry));
John Muir451d0f52011-12-06 21:50:06 +01001158 if (!err)
1159 d_delete(entry);
1160 } else {
1161 err = 0;
1162 }
John Muir3b463ae2009-05-31 11:13:57 -04001163 dput(entry);
John Muir3b463ae2009-05-31 11:13:57 -04001164
1165 unlock:
Al Viro59551022016-01-22 15:40:57 -05001166 inode_unlock(parent);
John Muir3b463ae2009-05-31 11:13:57 -04001167 iput(parent);
1168 return err;
1169}
1170
Miklos Szeredi87729a52005-09-09 13:10:34 -07001171/*
1172 * Calling into a user-controlled filesystem gives the filesystem
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001173 * daemon ptrace-like capabilities over the current process. This
Miklos Szeredi87729a52005-09-09 13:10:34 -07001174 * means, that the filesystem daemon is able to record the exact
1175 * filesystem operations performed, and can also control the behavior
1176 * of the requester process in otherwise impossible ways. For example
1177 * it can delay the operation for arbitrary length of time allowing
1178 * DoS against the requester.
1179 *
1180 * For this reason only those processes can call into the filesystem,
1181 * for which the owner of the mount has ptrace privilege. This
1182 * excludes processes started by other users, suid or sgid processes.
1183 */
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001184int fuse_allow_current_process(struct fuse_conn *fc)
Miklos Szeredi87729a52005-09-09 13:10:34 -07001185{
David Howellsc69e8d92008-11-14 10:39:19 +11001186 const struct cred *cred;
David Howellsc69e8d92008-11-14 10:39:19 +11001187
Miklos Szeredi29433a22016-10-01 07:32:32 +02001188 if (fc->allow_other)
Seth Forshee73f03c22017-12-22 15:32:33 +01001189 return current_in_userns(fc->user_ns);
Miklos Szeredi87729a52005-09-09 13:10:34 -07001190
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001191 cred = current_cred();
Eric W. Biederman499dcf22012-02-07 16:26:03 -08001192 if (uid_eq(cred->euid, fc->user_id) &&
1193 uid_eq(cred->suid, fc->user_id) &&
1194 uid_eq(cred->uid, fc->user_id) &&
1195 gid_eq(cred->egid, fc->group_id) &&
1196 gid_eq(cred->sgid, fc->group_id) &&
1197 gid_eq(cred->gid, fc->group_id))
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001198 return 1;
Miklos Szeredi87729a52005-09-09 13:10:34 -07001199
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001200 return 0;
Miklos Szeredi87729a52005-09-09 13:10:34 -07001201}
1202
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001203static int fuse_access(struct inode *inode, int mask)
1204{
Max Reitzfcee2162020-05-06 17:44:12 +02001205 struct fuse_mount *fm = get_fuse_mount(inode);
Miklos Szeredi70781872014-12-12 09:49:05 +01001206 FUSE_ARGS(args);
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001207 struct fuse_access_in inarg;
1208 int err;
1209
Miklos Szeredi698fa1d2013-10-01 16:41:23 +02001210 BUG_ON(mask & MAY_NOT_BLOCK);
1211
Max Reitzfcee2162020-05-06 17:44:12 +02001212 if (fm->fc->no_access)
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001213 return 0;
1214
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001215 memset(&inarg, 0, sizeof(inarg));
Al Viroe6305c42008-07-15 21:03:57 -04001216 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
Miklos Szeredid5b48542019-09-10 15:04:08 +02001217 args.opcode = FUSE_ACCESS;
1218 args.nodeid = get_node_id(inode);
1219 args.in_numargs = 1;
1220 args.in_args[0].size = sizeof(inarg);
1221 args.in_args[0].value = &inarg;
Max Reitzfcee2162020-05-06 17:44:12 +02001222 err = fuse_simple_request(fm, &args);
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001223 if (err == -ENOSYS) {
Max Reitzfcee2162020-05-06 17:44:12 +02001224 fm->fc->no_access = 1;
Miklos Szeredi31d40d72005-11-07 00:59:50 -08001225 err = 0;
1226 }
1227 return err;
1228}
1229
Al Viro10556cb22011-06-20 19:28:19 -04001230static int fuse_perm_getattr(struct inode *inode, int mask)
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001231{
Al Viro10556cb22011-06-20 19:28:19 -04001232 if (mask & MAY_NOT_BLOCK)
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001233 return -ECHILD;
1234
Seth Forshee60bcc882016-08-29 08:46:37 -05001235 forget_all_cached_acls(inode);
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001236 return fuse_do_getattr(inode, NULL, NULL);
1237}
1238
Miklos Szeredi6f9f1182006-01-06 00:19:39 -08001239/*
1240 * Check permission. The two basic access models of FUSE are:
1241 *
1242 * 1) Local access checking ('default_permissions' mount option) based
1243 * on file mode. This is the plain old disk filesystem permission
1244 * modell.
1245 *
1246 * 2) "Remote" access checking, where server is responsible for
1247 * checking permission in each inode operation. An exception to this
1248 * is if ->permission() was invoked from sys_access() in which case an
1249 * access request is sent. Execute permission is still checked
1250 * locally based on file mode.
1251 */
Al Viro10556cb22011-06-20 19:28:19 -04001252static int fuse_permission(struct inode *inode, int mask)
Miklos Szeredie5e55582005-09-09 13:10:28 -07001253{
1254 struct fuse_conn *fc = get_fuse_conn(inode);
Miklos Szeredi244f6382007-10-16 23:31:02 -07001255 bool refreshed = false;
1256 int err = 0;
Miklos Szeredie5e55582005-09-09 13:10:28 -07001257
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001258 if (fuse_is_bad(inode))
1259 return -EIO;
1260
Anatol Pomozovc2132c12013-01-14 22:30:00 -08001261 if (!fuse_allow_current_process(fc))
Miklos Szeredie5e55582005-09-09 13:10:28 -07001262 return -EACCES;
Miklos Szeredi244f6382007-10-16 23:31:02 -07001263
1264 /*
Miklos Szeredie8e96152007-10-16 23:31:06 -07001265 * If attributes are needed, refresh them before proceeding
Miklos Szeredi244f6382007-10-16 23:31:02 -07001266 */
Miklos Szeredi29433a22016-10-01 07:32:32 +02001267 if (fc->default_permissions ||
Miklos Szeredie8e96152007-10-16 23:31:06 -07001268 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001269 struct fuse_inode *fi = get_fuse_inode(inode);
Miklos Szeredid233c7d2018-12-03 10:14:43 +01001270 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001271
Miklos Szeredid233c7d2018-12-03 10:14:43 +01001272 if (perm_mask & READ_ONCE(fi->inval_mask) ||
1273 time_before64(fi->i_time, get_jiffies_64())) {
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001274 refreshed = true;
1275
Al Viro10556cb22011-06-20 19:28:19 -04001276 err = fuse_perm_getattr(inode, mask);
Miklos Szeredi19690dd2011-03-21 13:58:06 +01001277 if (err)
1278 return err;
1279 }
Miklos Szeredi244f6382007-10-16 23:31:02 -07001280 }
1281
Miklos Szeredi29433a22016-10-01 07:32:32 +02001282 if (fc->default_permissions) {
Al Viro2830ba72011-06-20 19:16:29 -04001283 err = generic_permission(inode, mask);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001284
1285 /* If permission is denied, try to refresh file
1286 attributes. This is also needed, because the root
1287 node will at first have no permissions */
Miklos Szeredi244f6382007-10-16 23:31:02 -07001288 if (err == -EACCES && !refreshed) {
Al Viro10556cb22011-06-20 19:28:19 -04001289 err = fuse_perm_getattr(inode, mask);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001290 if (!err)
Al Viro2830ba72011-06-20 19:16:29 -04001291 err = generic_permission(inode, mask);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001292 }
1293
Miklos Szeredi6f9f1182006-01-06 00:19:39 -08001294 /* Note: the opposite of the above test does not
1295 exist. So if permissions are revoked this won't be
1296 noticed immediately, only after the attribute
1297 timeout has expired */
Eric Paris9cfcac82010-07-23 11:43:51 -04001298 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
Miklos Szeredie8e96152007-10-16 23:31:06 -07001299 err = fuse_access(inode, mask);
1300 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1301 if (!(inode->i_mode & S_IXUGO)) {
1302 if (refreshed)
1303 return -EACCES;
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001304
Al Viro10556cb22011-06-20 19:28:19 -04001305 err = fuse_perm_getattr(inode, mask);
Miklos Szeredie8e96152007-10-16 23:31:06 -07001306 if (!err && !(inode->i_mode & S_IXUGO))
1307 return -EACCES;
1308 }
Miklos Szeredie5e55582005-09-09 13:10:28 -07001309 }
Miklos Szeredi244f6382007-10-16 23:31:02 -07001310 return err;
Miklos Szeredie5e55582005-09-09 13:10:28 -07001311}
1312
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001313static int fuse_readlink_page(struct inode *inode, struct page *page)
Miklos Szeredie5e55582005-09-09 13:10:28 -07001314{
Max Reitzfcee2162020-05-06 17:44:12 +02001315 struct fuse_mount *fm = get_fuse_mount(inode);
Miklos Szeredi4c29afe2019-09-10 15:04:09 +02001316 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1317 struct fuse_args_pages ap = {
1318 .num_pages = 1,
1319 .pages = &page,
1320 .descs = &desc,
1321 };
1322 char *link;
1323 ssize_t res;
Miklos Szeredie5e55582005-09-09 13:10:28 -07001324
Miklos Szeredi4c29afe2019-09-10 15:04:09 +02001325 ap.args.opcode = FUSE_READLINK;
1326 ap.args.nodeid = get_node_id(inode);
1327 ap.args.out_pages = true;
1328 ap.args.out_argvar = true;
1329 ap.args.page_zeroing = true;
1330 ap.args.out_numargs = 1;
1331 ap.args.out_args[0].size = desc.length;
Max Reitzfcee2162020-05-06 17:44:12 +02001332 res = fuse_simple_request(fm, &ap.args);
Al Viro6b255392015-11-17 10:20:54 -05001333
Andrew Gallagher451418f2013-11-05 03:55:43 -08001334 fuse_invalidate_atime(inode);
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001335
Miklos Szeredi4c29afe2019-09-10 15:04:09 +02001336 if (res < 0)
1337 return res;
1338
1339 if (WARN_ON(res >= PAGE_SIZE))
1340 return -EIO;
1341
1342 link = page_address(page);
1343 link[res] = '\0';
1344
1345 return 0;
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001346}
1347
1348static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1349 struct delayed_call *callback)
1350{
1351 struct fuse_conn *fc = get_fuse_conn(inode);
1352 struct page *page;
1353 int err;
1354
1355 err = -EIO;
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001356 if (fuse_is_bad(inode))
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001357 goto out_err;
1358
1359 if (fc->cache_symlinks)
1360 return page_get_link(dentry, inode, callback);
1361
1362 err = -ECHILD;
1363 if (!dentry)
1364 goto out_err;
1365
1366 page = alloc_page(GFP_KERNEL);
1367 err = -ENOMEM;
1368 if (!page)
1369 goto out_err;
1370
1371 err = fuse_readlink_page(inode, page);
1372 if (err) {
1373 __free_page(page);
1374 goto out_err;
1375 }
1376
1377 set_delayed_call(callback, page_put_link, page);
1378
1379 return page_address(page);
1380
1381out_err:
1382 return ERR_PTR(err);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001383}
1384
Miklos Szeredie5e55582005-09-09 13:10:28 -07001385static int fuse_dir_open(struct inode *inode, struct file *file)
1386{
Miklos Szeredi91fe96b2009-04-28 16:56:37 +02001387 return fuse_open_common(inode, file, true);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001388}
1389
1390static int fuse_dir_release(struct inode *inode, struct file *file)
1391{
Chad Austin2e64ff12018-12-10 10:54:52 -08001392 fuse_release_common(file, true);
Miklos Szeredi8b0797a2009-04-28 16:56:39 +02001393
1394 return 0;
Miklos Szeredie5e55582005-09-09 13:10:28 -07001395}
1396
Josef Bacik02c24a82011-07-16 20:44:56 -04001397static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1398 int datasync)
Miklos Szeredi82547982005-09-09 13:10:38 -07001399{
Miklos Szeredia9c2d1e2018-12-03 10:14:43 +01001400 struct inode *inode = file->f_mapping->host;
1401 struct fuse_conn *fc = get_fuse_conn(inode);
1402 int err;
1403
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001404 if (fuse_is_bad(inode))
Miklos Szeredia9c2d1e2018-12-03 10:14:43 +01001405 return -EIO;
1406
1407 if (fc->no_fsyncdir)
1408 return 0;
1409
1410 inode_lock(inode);
1411 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1412 if (err == -ENOSYS) {
1413 fc->no_fsyncdir = 1;
1414 err = 0;
1415 }
1416 inode_unlock(inode);
1417
1418 return err;
Miklos Szeredi82547982005-09-09 13:10:38 -07001419}
1420
Miklos Szeredib18da0c2011-12-13 11:58:49 +01001421static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1422 unsigned long arg)
1423{
1424 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1425
1426 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1427 if (fc->minor < 18)
1428 return -ENOTTY;
1429
1430 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1431}
1432
1433static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1434 unsigned long arg)
1435{
1436 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1437
1438 if (fc->minor < 18)
1439 return -ENOTTY;
1440
1441 return fuse_ioctl_common(file, cmd, arg,
1442 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1443}
1444
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001445static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001446{
1447 /* Always update if mtime is explicitly set */
1448 if (ivalid & ATTR_MTIME_SET)
1449 return true;
1450
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001451 /* Or if kernel i_mtime is the official one */
1452 if (trust_local_mtime)
1453 return true;
1454
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001455 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1456 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1457 return false;
1458
1459 /* In all other cases update */
1460 return true;
1461}
1462
Eric W. Biederman8cb08322018-02-21 11:18:07 -06001463static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1464 struct fuse_setattr_in *arg, bool trust_local_cmtime)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001465{
1466 unsigned ivalid = iattr->ia_valid;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001467
1468 if (ivalid & ATTR_MODE)
Miklos Szeredibefc6492005-11-07 00:59:52 -08001469 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001470 if (ivalid & ATTR_UID)
Eric W. Biederman8cb08322018-02-21 11:18:07 -06001471 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001472 if (ivalid & ATTR_GID)
Eric W. Biederman8cb08322018-02-21 11:18:07 -06001473 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001474 if (ivalid & ATTR_SIZE)
Miklos Szeredibefc6492005-11-07 00:59:52 -08001475 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001476 if (ivalid & ATTR_ATIME) {
1477 arg->valid |= FATTR_ATIME;
Miklos Szeredibefc6492005-11-07 00:59:52 -08001478 arg->atime = iattr->ia_atime.tv_sec;
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001479 arg->atimensec = iattr->ia_atime.tv_nsec;
1480 if (!(ivalid & ATTR_ATIME_SET))
1481 arg->valid |= FATTR_ATIME_NOW;
1482 }
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001483 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001484 arg->valid |= FATTR_MTIME;
Miklos Szeredibefc6492005-11-07 00:59:52 -08001485 arg->mtime = iattr->ia_mtime.tv_sec;
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001486 arg->mtimensec = iattr->ia_mtime.tv_nsec;
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001487 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
Miklos Szeredi17637cb2007-10-18 03:07:01 -07001488 arg->valid |= FATTR_MTIME_NOW;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001489 }
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001490 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1491 arg->valid |= FATTR_CTIME;
1492 arg->ctime = iattr->ia_ctime.tv_sec;
1493 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1494 }
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001495}
1496
Miklos Szeredi6f9f1182006-01-06 00:19:39 -08001497/*
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001498 * Prevent concurrent writepages on inode
1499 *
1500 * This is done by adding a negative bias to the inode write counter
1501 * and waiting for all pending writes to finish.
1502 */
1503void fuse_set_nowrite(struct inode *inode)
1504{
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001505 struct fuse_inode *fi = get_fuse_inode(inode);
1506
Al Viro59551022016-01-22 15:40:57 -05001507 BUG_ON(!inode_is_locked(inode));
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001508
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001509 spin_lock(&fi->lock);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001510 BUG_ON(fi->writectr < 0);
1511 fi->writectr += FUSE_NOWRITE;
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001512 spin_unlock(&fi->lock);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001513 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1514}
1515
1516/*
1517 * Allow writepages on inode
1518 *
1519 * Remove the bias from the writecounter and send any queued
1520 * writepages.
1521 */
1522static void __fuse_release_nowrite(struct inode *inode)
1523{
1524 struct fuse_inode *fi = get_fuse_inode(inode);
1525
1526 BUG_ON(fi->writectr != FUSE_NOWRITE);
1527 fi->writectr = 0;
1528 fuse_flush_writepages(inode);
1529}
1530
1531void fuse_release_nowrite(struct inode *inode)
1532{
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001533 struct fuse_inode *fi = get_fuse_inode(inode);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001534
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001535 spin_lock(&fi->lock);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001536 __fuse_release_nowrite(inode);
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001537 spin_unlock(&fi->lock);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001538}
1539
Miklos Szeredi70781872014-12-12 09:49:05 +01001540static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001541 struct inode *inode,
1542 struct fuse_setattr_in *inarg_p,
1543 struct fuse_attr_out *outarg_p)
1544{
Miklos Szeredid5b48542019-09-10 15:04:08 +02001545 args->opcode = FUSE_SETATTR;
1546 args->nodeid = get_node_id(inode);
1547 args->in_numargs = 1;
1548 args->in_args[0].size = sizeof(*inarg_p);
1549 args->in_args[0].value = inarg_p;
1550 args->out_numargs = 1;
1551 args->out_args[0].size = sizeof(*outarg_p);
1552 args->out_args[0].value = outarg_p;
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001553}
1554
1555/*
1556 * Flush inode->i_mtime to the server
1557 */
Maxim Patlasovab9e13f2014-04-28 14:19:24 +02001558int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001559{
Max Reitzfcee2162020-05-06 17:44:12 +02001560 struct fuse_mount *fm = get_fuse_mount(inode);
Miklos Szeredi70781872014-12-12 09:49:05 +01001561 FUSE_ARGS(args);
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001562 struct fuse_setattr_in inarg;
1563 struct fuse_attr_out outarg;
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001564
1565 memset(&inarg, 0, sizeof(inarg));
1566 memset(&outarg, 0, sizeof(outarg));
1567
Maxim Patlasovab9e13f2014-04-28 14:19:24 +02001568 inarg.valid = FATTR_MTIME;
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001569 inarg.mtime = inode->i_mtime.tv_sec;
1570 inarg.mtimensec = inode->i_mtime.tv_nsec;
Max Reitzfcee2162020-05-06 17:44:12 +02001571 if (fm->fc->minor >= 23) {
Maxim Patlasovab9e13f2014-04-28 14:19:24 +02001572 inarg.valid |= FATTR_CTIME;
1573 inarg.ctime = inode->i_ctime.tv_sec;
1574 inarg.ctimensec = inode->i_ctime.tv_nsec;
1575 }
Miklos Szeredi1e18bda2014-04-28 14:19:23 +02001576 if (ff) {
1577 inarg.valid |= FATTR_FH;
1578 inarg.fh = ff->fh;
1579 }
Max Reitzfcee2162020-05-06 17:44:12 +02001580 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001581
Max Reitzfcee2162020-05-06 17:44:12 +02001582 return fuse_simple_request(fm, &args);
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001583}
1584
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001585/*
Miklos Szeredi6f9f1182006-01-06 00:19:39 -08001586 * Set attributes, and at the same time refresh them.
1587 *
1588 * Truncation is slightly complicated, because the 'truncate' request
1589 * may fail, in which case we don't want to touch the mapping.
Miklos Szeredi9ffbb912006-10-17 00:10:06 -07001590 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1591 * and the actual truncation by hand.
Miklos Szeredi6f9f1182006-01-06 00:19:39 -08001592 */
Jan Kara62490332016-05-26 17:12:41 +02001593int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
Maxim Patlasovefb9fa92012-12-18 14:05:08 +04001594 struct file *file)
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001595{
Jan Kara62490332016-05-26 17:12:41 +02001596 struct inode *inode = d_inode(dentry);
Max Reitzfcee2162020-05-06 17:44:12 +02001597 struct fuse_mount *fm = get_fuse_mount(inode);
1598 struct fuse_conn *fc = fm->fc;
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001599 struct fuse_inode *fi = get_fuse_inode(inode);
Miklos Szeredi70781872014-12-12 09:49:05 +01001600 FUSE_ARGS(args);
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001601 struct fuse_setattr_in inarg;
1602 struct fuse_attr_out outarg;
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001603 bool is_truncate = false;
Pavel Emelyanov83732002013-10-10 17:10:46 +04001604 bool is_wb = fc->writeback_cache;
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001605 loff_t oldsize;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001606 int err;
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001607 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
Vivek Goyal6ae330c2020-08-19 18:19:54 -04001608 bool fault_blocked = false;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001609
Miklos Szeredi29433a22016-10-01 07:32:32 +02001610 if (!fc->default_permissions)
Christoph Hellwigdb78b872010-06-04 11:30:03 +02001611 attr->ia_valid |= ATTR_FORCE;
1612
Jan Kara31051c82016-05-26 16:55:18 +02001613 err = setattr_prepare(dentry, attr);
Christoph Hellwigdb78b872010-06-04 11:30:03 +02001614 if (err)
1615 return err;
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001616
Vivek Goyal6ae330c2020-08-19 18:19:54 -04001617 if (attr->ia_valid & ATTR_SIZE) {
1618 if (WARN_ON(!S_ISREG(inode->i_mode)))
1619 return -EIO;
1620 is_truncate = true;
1621 }
1622
1623 if (FUSE_IS_DAX(inode) && is_truncate) {
1624 down_write(&fi->i_mmap_sem);
1625 fault_blocked = true;
1626 err = fuse_dax_break_layouts(inode, 0, 0);
1627 if (err) {
1628 up_write(&fi->i_mmap_sem);
1629 return err;
1630 }
1631 }
1632
Miklos Szeredi8d56add2011-02-25 14:44:58 +01001633 if (attr->ia_valid & ATTR_OPEN) {
Miklos Szeredidf0e91d2018-02-08 15:17:38 +01001634 /* This is coming from open(..., ... | O_TRUNC); */
1635 WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1636 WARN_ON(attr->ia_size != 0);
1637 if (fc->atomic_o_trunc) {
1638 /*
1639 * No need to send request to userspace, since actual
1640 * truncation has already been done by OPEN. But still
1641 * need to truncate page cache.
1642 */
1643 i_size_write(inode, 0);
1644 truncate_pagecache(inode, 0);
Vivek Goyal6ae330c2020-08-19 18:19:54 -04001645 goto out;
Miklos Szeredidf0e91d2018-02-08 15:17:38 +01001646 }
Miklos Szeredi8d56add2011-02-25 14:44:58 +01001647 file = NULL;
1648 }
Miklos Szeredi6ff958e2007-10-18 03:07:02 -07001649
Miklos Szeredib24e7592019-10-23 14:26:37 +02001650 /* Flush dirty data/metadata before non-truncate SETATTR */
1651 if (is_wb && S_ISREG(inode->i_mode) &&
1652 attr->ia_valid &
1653 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1654 ATTR_TIMES_SET)) {
1655 err = write_inode_now(inode, true);
1656 if (err)
1657 return err;
1658
1659 fuse_set_nowrite(inode);
1660 fuse_release_nowrite(inode);
1661 }
1662
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001663 if (is_truncate) {
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001664 fuse_set_nowrite(inode);
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001665 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001666 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1667 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001668 }
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001669
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001670 memset(&inarg, 0, sizeof(inarg));
Miklos Szeredi0e9663e2007-10-18 03:07:05 -07001671 memset(&outarg, 0, sizeof(outarg));
Eric W. Biederman8cb08322018-02-21 11:18:07 -06001672 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
Miklos Szeredi49d49142007-10-18 03:07:00 -07001673 if (file) {
1674 struct fuse_file *ff = file->private_data;
1675 inarg.valid |= FATTR_FH;
1676 inarg.fh = ff->fh;
1677 }
Vivek Goyal31792162020-10-09 14:15:09 -04001678
1679 /* Kill suid/sgid for non-directory chown unconditionally */
1680 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
1681 attr->ia_valid & (ATTR_UID | ATTR_GID))
1682 inarg.valid |= FATTR_KILL_SUIDGID;
1683
Miklos Szeredif3332112007-10-18 03:07:04 -07001684 if (attr->ia_valid & ATTR_SIZE) {
1685 /* For mandatory locking in truncate */
1686 inarg.valid |= FATTR_LOCKOWNER;
1687 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
Vivek Goyal31792162020-10-09 14:15:09 -04001688
1689 /* Kill suid/sgid for truncate only if no CAP_FSETID */
1690 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1691 inarg.valid |= FATTR_KILL_SUIDGID;
Miklos Szeredif3332112007-10-18 03:07:04 -07001692 }
Miklos Szeredi70781872014-12-12 09:49:05 +01001693 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
Max Reitzfcee2162020-05-06 17:44:12 +02001694 err = fuse_simple_request(fm, &args);
Miklos Szeredie00d2c22007-10-16 23:31:01 -07001695 if (err) {
1696 if (err == -EINTR)
1697 fuse_invalidate_attr(inode);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001698 goto error;
Miklos Szeredie00d2c22007-10-16 23:31:01 -07001699 }
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001700
Miklos Szeredieb59bd12019-11-12 11:49:04 +01001701 if (fuse_invalid_attr(&outarg.attr) ||
1702 (inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001703 fuse_make_bad(inode);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001704 err = -EIO;
1705 goto error;
Miklos Szeredie00d2c22007-10-16 23:31:01 -07001706 }
1707
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001708 spin_lock(&fi->lock);
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001709 /* the kernel maintains i_mtime locally */
Maxim Patlasov3ad22c62014-04-28 14:19:25 +02001710 if (trust_local_cmtime) {
1711 if (attr->ia_valid & ATTR_MTIME)
1712 inode->i_mtime = attr->ia_mtime;
1713 if (attr->ia_valid & ATTR_CTIME)
1714 inode->i_ctime = attr->ia_ctime;
Miklos Szeredi1e18bda2014-04-28 14:19:23 +02001715 /* FIXME: clear I_DIRTY_SYNC? */
Maxim Patlasovb0aa7602013-12-26 19:51:11 +04001716 }
1717
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001718 fuse_change_attributes_common(inode, &outarg.attr,
1719 attr_timeout(&outarg));
1720 oldsize = inode->i_size;
Pavel Emelyanov83732002013-10-10 17:10:46 +04001721 /* see the comment in fuse_change_attributes() */
1722 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode))
1723 i_size_write(inode, outarg.attr.size);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001724
1725 if (is_truncate) {
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001726 /* NOTE: this may release/reacquire fi->lock */
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001727 __fuse_release_nowrite(inode);
1728 }
Kirill Tkhaif15ecfe2018-11-09 13:33:22 +03001729 spin_unlock(&fi->lock);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001730
1731 /*
1732 * Only call invalidate_inode_pages2() after removing
1733 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1734 */
Pavel Emelyanov83732002013-10-10 17:10:46 +04001735 if ((is_truncate || !is_wb) &&
1736 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
Kirill A. Shutemov7caef262013-09-12 15:13:56 -07001737 truncate_pagecache(inode, outarg.attr.size);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001738 invalidate_inode_pages2(inode->i_mapping);
1739 }
1740
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001741 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
Vivek Goyal6ae330c2020-08-19 18:19:54 -04001742out:
1743 if (fault_blocked)
1744 up_write(&fi->i_mmap_sem);
1745
Miklos Szeredie00d2c22007-10-16 23:31:01 -07001746 return 0;
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001747
1748error:
1749 if (is_truncate)
1750 fuse_release_nowrite(inode);
1751
Maxim Patlasov06a7c3c2013-08-30 17:06:04 +04001752 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
Vivek Goyal6ae330c2020-08-19 18:19:54 -04001753
1754 if (fault_blocked)
1755 up_write(&fi->i_mmap_sem);
Miklos Szeredi3be5a522008-04-30 00:54:41 -07001756 return err;
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001757}
1758
Miklos Szeredi49d49142007-10-18 03:07:00 -07001759static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1760{
David Howells2b0143b2015-03-17 22:25:59 +00001761 struct inode *inode = d_inode(entry);
Miklos Szeredi5e940c12016-10-01 07:32:32 +02001762 struct fuse_conn *fc = get_fuse_conn(inode);
Miklos Szeredia09f99e2016-10-01 07:32:32 +02001763 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
Miklos Szeredi5e2b8822016-10-01 07:32:32 +02001764 int ret;
Maxim Patlasovefb9fa92012-12-18 14:05:08 +04001765
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001766 if (fuse_is_bad(inode))
1767 return -EIO;
1768
Maxim Patlasovefb9fa92012-12-18 14:05:08 +04001769 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1770 return -EACCES;
1771
Miklos Szeredia09f99e2016-10-01 07:32:32 +02001772 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
Miklos Szeredia09f99e2016-10-01 07:32:32 +02001773 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1774 ATTR_MODE);
Miklos Szeredia09f99e2016-10-01 07:32:32 +02001775
Miklos Szeredi5e940c12016-10-01 07:32:32 +02001776 /*
1777 * The only sane way to reliably kill suid/sgid is to do it in
1778 * the userspace filesystem
1779 *
1780 * This should be done on write(), truncate() and chown().
1781 */
Vivek Goyal8981bdf2020-10-09 14:15:10 -04001782 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
Miklos Szeredi5e940c12016-10-01 07:32:32 +02001783 /*
1784 * ia_mode calculation may have used stale i_mode.
1785 * Refresh and recalculate.
1786 */
1787 ret = fuse_do_getattr(inode, NULL, file);
1788 if (ret)
1789 return ret;
1790
1791 attr->ia_mode = inode->i_mode;
Miklos Szeredic01638f2016-12-06 16:18:45 +01001792 if (inode->i_mode & S_ISUID) {
Miklos Szeredi5e940c12016-10-01 07:32:32 +02001793 attr->ia_valid |= ATTR_MODE;
1794 attr->ia_mode &= ~S_ISUID;
1795 }
Miklos Szeredic01638f2016-12-06 16:18:45 +01001796 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
Miklos Szeredi5e940c12016-10-01 07:32:32 +02001797 attr->ia_valid |= ATTR_MODE;
1798 attr->ia_mode &= ~S_ISGID;
1799 }
Miklos Szeredia09f99e2016-10-01 07:32:32 +02001800 }
1801 }
1802 if (!attr->ia_valid)
1803 return 0;
1804
Linus Torvaldsabb5a142016-10-10 13:04:49 -07001805 ret = fuse_do_setattr(entry, attr, file);
Miklos Szeredi5e2b8822016-10-01 07:32:32 +02001806 if (!ret) {
Seth Forshee60bcc882016-08-29 08:46:37 -05001807 /*
1808 * If filesystem supports acls it may have updated acl xattrs in
1809 * the filesystem, so forget cached acls for the inode.
1810 */
1811 if (fc->posix_acl)
1812 forget_all_cached_acls(inode);
1813
Miklos Szeredi5e2b8822016-10-01 07:32:32 +02001814 /* Directory mode changed, may need to revalidate access */
1815 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1816 fuse_invalidate_entry_cache(entry);
1817 }
1818 return ret;
Miklos Szeredi49d49142007-10-18 03:07:00 -07001819}
1820
David Howellsa528d352017-01-31 16:46:22 +00001821static int fuse_getattr(const struct path *path, struct kstat *stat,
1822 u32 request_mask, unsigned int flags)
Miklos Szeredie5e55582005-09-09 13:10:28 -07001823{
David Howellsa528d352017-01-31 16:46:22 +00001824 struct inode *inode = d_inode(path->dentry);
Miklos Szeredi244f6382007-10-16 23:31:02 -07001825 struct fuse_conn *fc = get_fuse_conn(inode);
Miklos Szeredi244f6382007-10-16 23:31:02 -07001826
Miklos Szeredi5d069db2020-12-10 15:33:14 +01001827 if (fuse_is_bad(inode))
1828 return -EIO;
1829
Miklos Szeredi5157da22020-05-19 14:50:37 +02001830 if (!fuse_allow_current_process(fc)) {
1831 if (!request_mask) {
1832 /*
1833 * If user explicitly requested *nothing* then don't
1834 * error out, but return st_dev only.
1835 */
1836 stat->result_mask = 0;
1837 stat->dev = inode->i_sb->s_dev;
1838 return 0;
1839 }
Miklos Szeredi244f6382007-10-16 23:31:02 -07001840 return -EACCES;
Miklos Szeredi5157da22020-05-19 14:50:37 +02001841 }
Miklos Szeredi244f6382007-10-16 23:31:02 -07001842
Miklos Szeredi2f1e8192018-10-15 15:43:06 +02001843 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001844}
1845
Arjan van de Ven754661f2007-02-12 00:55:38 -08001846static const struct inode_operations fuse_dir_inode_operations = {
Miklos Szeredie5e55582005-09-09 13:10:28 -07001847 .lookup = fuse_lookup,
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001848 .mkdir = fuse_mkdir,
1849 .symlink = fuse_symlink,
1850 .unlink = fuse_unlink,
1851 .rmdir = fuse_rmdir,
Miklos Szeredi2773bf02016-09-27 11:03:58 +02001852 .rename = fuse_rename2,
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001853 .link = fuse_link,
1854 .setattr = fuse_setattr,
1855 .create = fuse_create,
Miklos Szeredic8ccbe02012-06-05 15:10:22 +02001856 .atomic_open = fuse_atomic_open,
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001857 .mknod = fuse_mknod,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001858 .permission = fuse_permission,
1859 .getattr = fuse_getattr,
Miklos Szeredi92a87802005-09-09 13:10:31 -07001860 .listxattr = fuse_listxattr,
Seth Forshee60bcc882016-08-29 08:46:37 -05001861 .get_acl = fuse_get_acl,
1862 .set_acl = fuse_set_acl,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001863};
1864
Arjan van de Ven4b6f5d22006-03-28 01:56:42 -08001865static const struct file_operations fuse_dir_operations = {
Miklos Szeredib6aeade2005-09-09 13:10:30 -07001866 .llseek = generic_file_llseek,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001867 .read = generic_read_dir,
Al Virod9b3dbd2016-04-20 17:30:32 -04001868 .iterate_shared = fuse_readdir,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001869 .open = fuse_dir_open,
1870 .release = fuse_dir_release,
Miklos Szeredi82547982005-09-09 13:10:38 -07001871 .fsync = fuse_dir_fsync,
Miklos Szeredib18da0c2011-12-13 11:58:49 +01001872 .unlocked_ioctl = fuse_dir_ioctl,
1873 .compat_ioctl = fuse_dir_compat_ioctl,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001874};
1875
Arjan van de Ven754661f2007-02-12 00:55:38 -08001876static const struct inode_operations fuse_common_inode_operations = {
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001877 .setattr = fuse_setattr,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001878 .permission = fuse_permission,
1879 .getattr = fuse_getattr,
Miklos Szeredi92a87802005-09-09 13:10:31 -07001880 .listxattr = fuse_listxattr,
Seth Forshee60bcc882016-08-29 08:46:37 -05001881 .get_acl = fuse_get_acl,
1882 .set_acl = fuse_set_acl,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001883};
1884
Arjan van de Ven754661f2007-02-12 00:55:38 -08001885static const struct inode_operations fuse_symlink_inode_operations = {
Miklos Szeredi9e6268d2005-09-09 13:10:29 -07001886 .setattr = fuse_setattr,
Al Viro6b255392015-11-17 10:20:54 -05001887 .get_link = fuse_get_link,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001888 .getattr = fuse_getattr,
Miklos Szeredi92a87802005-09-09 13:10:31 -07001889 .listxattr = fuse_listxattr,
Miklos Szeredie5e55582005-09-09 13:10:28 -07001890};
1891
1892void fuse_init_common(struct inode *inode)
1893{
1894 inode->i_op = &fuse_common_inode_operations;
1895}
1896
1897void fuse_init_dir(struct inode *inode)
1898{
Miklos Szerediab2257e2018-10-01 10:07:05 +02001899 struct fuse_inode *fi = get_fuse_inode(inode);
1900
Miklos Szeredie5e55582005-09-09 13:10:28 -07001901 inode->i_op = &fuse_dir_inode_operations;
1902 inode->i_fop = &fuse_dir_operations;
Miklos Szerediab2257e2018-10-01 10:07:05 +02001903
1904 spin_lock_init(&fi->rdc.lock);
1905 fi->rdc.cached = false;
1906 fi->rdc.size = 0;
1907 fi->rdc.pos = 0;
1908 fi->rdc.version = 0;
Miklos Szeredie5e55582005-09-09 13:10:28 -07001909}
1910
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001911static int fuse_symlink_readpage(struct file *null, struct page *page)
1912{
1913 int err = fuse_readlink_page(page->mapping->host, page);
1914
1915 if (!err)
1916 SetPageUptodate(page);
1917
1918 unlock_page(page);
1919
1920 return err;
1921}
1922
1923static const struct address_space_operations fuse_symlink_aops = {
1924 .readpage = fuse_symlink_readpage,
1925};
1926
Miklos Szeredie5e55582005-09-09 13:10:28 -07001927void fuse_init_symlink(struct inode *inode)
1928{
1929 inode->i_op = &fuse_symlink_inode_operations;
Dan Schatzberg5571f1e2018-10-11 08:17:00 -07001930 inode->i_data.a_ops = &fuse_symlink_aops;
1931 inode_nohighmem(inode);
Miklos Szeredie5e55582005-09-09 13:10:28 -07001932}