1 /* 1 /* 2 FUSE: Filesystem in Userspace 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <mik 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 4 5 This program can be distributed under the te 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 6 See the file COPYING. 7 */ 7 */ 8 8 9 #include "fuse_i.h" 9 #include "fuse_i.h" 10 10 11 #include <linux/pagemap.h> 11 #include <linux/pagemap.h> 12 #include <linux/file.h> 12 #include <linux/file.h> 13 #include <linux/fs_context.h> << 14 #include <linux/moduleparam.h> << 15 #include <linux/sched.h> 13 #include <linux/sched.h> 16 #include <linux/namei.h> 14 #include <linux/namei.h> 17 #include <linux/slab.h> 15 #include <linux/slab.h> 18 #include <linux/xattr.h> 16 #include <linux/xattr.h> 19 #include <linux/iversion.h> 17 #include <linux/iversion.h> 20 #include <linux/posix_acl.h> 18 #include <linux/posix_acl.h> 21 #include <linux/security.h> << 22 #include <linux/types.h> << 23 #include <linux/kernel.h> << 24 << 25 static bool __read_mostly allow_sys_admin_acce << 26 module_param(allow_sys_admin_access, bool, 064 << 27 MODULE_PARM_DESC(allow_sys_admin_access, << 28 "Allow users with CAP_SYS_ADM << 29 19 30 static void fuse_advise_use_readdirplus(struct 20 static void fuse_advise_use_readdirplus(struct inode *dir) 31 { 21 { 32 struct fuse_inode *fi = get_fuse_inode 22 struct fuse_inode *fi = get_fuse_inode(dir); 33 23 34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->sta 24 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 35 } 25 } 36 26 37 #if BITS_PER_LONG >= 64 << 38 static inline void __fuse_dentry_settime(struc << 39 { << 40 entry->d_fsdata = (void *) time; << 41 } << 42 << 43 static inline u64 fuse_dentry_time(const struc << 44 { << 45 return (u64)entry->d_fsdata; << 46 } << 47 << 48 #else << 49 union fuse_dentry { 27 union fuse_dentry { 50 u64 time; 28 u64 time; 51 struct rcu_head rcu; 29 struct rcu_head rcu; 52 }; 30 }; 53 31 54 static inline void __fuse_dentry_settime(struc !! 32 static inline void fuse_dentry_settime(struct dentry *entry, u64 time) 55 { 33 { 56 ((union fuse_dentry *) dentry->d_fsdat !! 34 ((union fuse_dentry *) entry->d_fsdata)->time = time; 57 } 35 } 58 36 59 static inline u64 fuse_dentry_time(const struc !! 37 static inline u64 fuse_dentry_time(struct dentry *entry) 60 { 38 { 61 return ((union fuse_dentry *) entry->d 39 return ((union fuse_dentry *) entry->d_fsdata)->time; 62 } 40 } 63 #endif << 64 << 65 static void fuse_dentry_settime(struct dentry << 66 { << 67 struct fuse_conn *fc = get_fuse_conn_s << 68 bool delete = !time && fc->delete_stal << 69 /* << 70 * Mess with DCACHE_OP_DELETE because << 71 * Don't care about races, either way << 72 */ << 73 if ((!delete && (dentry->d_flags & DCA << 74 (delete && !(dentry->d_flags & DCA << 75 spin_lock(&dentry->d_lock); << 76 if (!delete) << 77 dentry->d_flags &= ~DC << 78 else << 79 dentry->d_flags |= DCA << 80 spin_unlock(&dentry->d_lock); << 81 } << 82 << 83 __fuse_dentry_settime(dentry, time); << 84 } << 85 41 86 /* 42 /* 87 * FUSE caches dentries and attributes with se 43 * FUSE caches dentries and attributes with separate timeout. The 88 * time in jiffies until the dentry/attributes 44 * time in jiffies until the dentry/attributes are valid is stored in 89 * dentry->d_fsdata and fuse_inode->i_time res 45 * dentry->d_fsdata and fuse_inode->i_time respectively. 90 */ 46 */ 91 47 92 /* 48 /* 93 * Calculate the time in jiffies until a dentr 49 * Calculate the time in jiffies until a dentry/attributes are valid 94 */ 50 */ 95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec) !! 51 static u64 time_to_jiffies(u64 sec, u32 nsec) 96 { 52 { 97 if (sec || nsec) { 53 if (sec || nsec) { 98 struct timespec64 ts = { 54 struct timespec64 ts = { 99 sec, 55 sec, 100 min_t(u32, nsec, NSEC_ 56 min_t(u32, nsec, NSEC_PER_SEC - 1) 101 }; 57 }; 102 58 103 return get_jiffies_64() + time 59 return get_jiffies_64() + timespec64_to_jiffies(&ts); 104 } else 60 } else 105 return 0; 61 return 0; 106 } 62 } 107 63 108 /* 64 /* 109 * Set dentry and possibly attribute timeouts 65 * Set dentry and possibly attribute timeouts from the lookup/mk* 110 * replies 66 * replies 111 */ 67 */ 112 void fuse_change_entry_timeout(struct dentry * 68 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 113 { 69 { 114 fuse_dentry_settime(entry, 70 fuse_dentry_settime(entry, 115 fuse_time_to_jiffies(o->entry_ !! 71 time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); >> 72 } >> 73 >> 74 static u64 attr_timeout(struct fuse_attr_out *o) >> 75 { >> 76 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); >> 77 } >> 78 >> 79 u64 entry_attr_timeout(struct fuse_entry_out *o) >> 80 { >> 81 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); 116 } 82 } 117 83 118 void fuse_invalidate_attr_mask(struct inode *i !! 84 static void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 119 { 85 { 120 set_mask_bits(&get_fuse_inode(inode)-> 86 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 121 } 87 } 122 88 123 /* 89 /* 124 * Mark the attributes as stale, so that at th 90 * Mark the attributes as stale, so that at the next call to 125 * ->getattr() they will be fetched from users 91 * ->getattr() they will be fetched from userspace 126 */ 92 */ 127 void fuse_invalidate_attr(struct inode *inode) 93 void fuse_invalidate_attr(struct inode *inode) 128 { 94 { 129 fuse_invalidate_attr_mask(inode, STATX 95 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 130 } 96 } 131 97 132 static void fuse_dir_changed(struct inode *dir 98 static void fuse_dir_changed(struct inode *dir) 133 { 99 { 134 fuse_invalidate_attr(dir); 100 fuse_invalidate_attr(dir); 135 inode_maybe_inc_iversion(dir, false); 101 inode_maybe_inc_iversion(dir, false); 136 } 102 } 137 103 138 /* !! 104 /** 139 * Mark the attributes as stale due to an atim 105 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 140 * atime is not used. 106 * atime is not used. 141 */ 107 */ 142 void fuse_invalidate_atime(struct inode *inode 108 void fuse_invalidate_atime(struct inode *inode) 143 { 109 { 144 if (!IS_RDONLY(inode)) 110 if (!IS_RDONLY(inode)) 145 fuse_invalidate_attr_mask(inod 111 fuse_invalidate_attr_mask(inode, STATX_ATIME); 146 } 112 } 147 113 148 /* 114 /* 149 * Just mark the entry as stale, so that a nex 115 * Just mark the entry as stale, so that a next attempt to look it up 150 * will result in a new lookup call to userspa 116 * will result in a new lookup call to userspace 151 * 117 * 152 * This is called when a dentry is about to be 118 * This is called when a dentry is about to become negative and the 153 * timeout is unknown (unlink, rmdir, rename a 119 * timeout is unknown (unlink, rmdir, rename and in some cases 154 * lookup) 120 * lookup) 155 */ 121 */ 156 void fuse_invalidate_entry_cache(struct dentry 122 void fuse_invalidate_entry_cache(struct dentry *entry) 157 { 123 { 158 fuse_dentry_settime(entry, 0); 124 fuse_dentry_settime(entry, 0); 159 } 125 } 160 126 161 /* 127 /* 162 * Same as fuse_invalidate_entry_cache(), but 128 * Same as fuse_invalidate_entry_cache(), but also try to remove the 163 * dentry from the hash 129 * dentry from the hash 164 */ 130 */ 165 static void fuse_invalidate_entry(struct dentr 131 static void fuse_invalidate_entry(struct dentry *entry) 166 { 132 { 167 d_invalidate(entry); 133 d_invalidate(entry); 168 fuse_invalidate_entry_cache(entry); 134 fuse_invalidate_entry_cache(entry); 169 } 135 } 170 136 171 static void fuse_lookup_init(struct fuse_conn 137 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 172 u64 nodeid, const 138 u64 nodeid, const struct qstr *name, 173 struct fuse_entry 139 struct fuse_entry_out *outarg) 174 { 140 { 175 memset(outarg, 0, sizeof(struct fuse_e 141 memset(outarg, 0, sizeof(struct fuse_entry_out)); 176 args->opcode = FUSE_LOOKUP; !! 142 args->in.h.opcode = FUSE_LOOKUP; 177 args->nodeid = nodeid; !! 143 args->in.h.nodeid = nodeid; 178 args->in_numargs = 1; !! 144 args->in.numargs = 1; 179 args->in_args[0].size = name->len + 1; !! 145 args->in.args[0].size = name->len + 1; 180 args->in_args[0].value = name->name; !! 146 args->in.args[0].value = name->name; 181 args->out_numargs = 1; !! 147 args->out.numargs = 1; 182 args->out_args[0].size = sizeof(struct !! 148 args->out.args[0].size = sizeof(struct fuse_entry_out); 183 args->out_args[0].value = outarg; !! 149 args->out.args[0].value = outarg; 184 } 150 } 185 151 186 /* 152 /* 187 * Check whether the dentry is still valid 153 * Check whether the dentry is still valid 188 * 154 * 189 * If the entry validity timeout has expired a 155 * If the entry validity timeout has expired and the dentry is 190 * positive, try to redo the lookup. If the l 156 * positive, try to redo the lookup. If the lookup results in a 191 * different inode, then let the VFS invalidat 157 * different inode, then let the VFS invalidate the dentry and redo 192 * the lookup once more. If the lookup result 158 * the lookup once more. If the lookup results in the same inode, 193 * then refresh the attributes, timeouts and m 159 * then refresh the attributes, timeouts and mark the dentry valid. 194 */ 160 */ 195 static int fuse_dentry_revalidate(struct dentr 161 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 196 { 162 { 197 struct inode *inode; 163 struct inode *inode; 198 struct dentry *parent; 164 struct dentry *parent; 199 struct fuse_mount *fm; !! 165 struct fuse_conn *fc; 200 struct fuse_inode *fi; 166 struct fuse_inode *fi; 201 int ret; 167 int ret; 202 168 203 inode = d_inode_rcu(entry); 169 inode = d_inode_rcu(entry); 204 if (inode && fuse_is_bad(inode)) !! 170 if (inode && is_bad_inode(inode)) 205 goto invalid; 171 goto invalid; 206 else if (time_before64(fuse_dentry_tim 172 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 207 (flags & (LOOKUP_EXCL | LOOKU !! 173 (flags & LOOKUP_REVAL)) { 208 struct fuse_entry_out outarg; 174 struct fuse_entry_out outarg; 209 FUSE_ARGS(args); 175 FUSE_ARGS(args); 210 struct fuse_forget_link *forge 176 struct fuse_forget_link *forget; 211 u64 attr_version; 177 u64 attr_version; 212 178 213 /* For negative dentries, alwa 179 /* For negative dentries, always do a fresh lookup */ 214 if (!inode) 180 if (!inode) 215 goto invalid; 181 goto invalid; 216 182 217 ret = -ECHILD; 183 ret = -ECHILD; 218 if (flags & LOOKUP_RCU) 184 if (flags & LOOKUP_RCU) 219 goto out; 185 goto out; 220 186 221 fm = get_fuse_mount(inode); !! 187 fc = get_fuse_conn(inode); 222 188 223 forget = fuse_alloc_forget(); 189 forget = fuse_alloc_forget(); 224 ret = -ENOMEM; 190 ret = -ENOMEM; 225 if (!forget) 191 if (!forget) 226 goto out; 192 goto out; 227 193 228 attr_version = fuse_get_attr_v !! 194 attr_version = fuse_get_attr_version(fc); 229 195 230 parent = dget_parent(entry); 196 parent = dget_parent(entry); 231 fuse_lookup_init(fm->fc, &args !! 197 fuse_lookup_init(fc, &args, get_node_id(d_inode(parent)), 232 &entry->d_nam 198 &entry->d_name, &outarg); 233 ret = fuse_simple_request(fm, !! 199 ret = fuse_simple_request(fc, &args); 234 dput(parent); 200 dput(parent); 235 /* Zero nodeid is same as -ENO 201 /* Zero nodeid is same as -ENOENT */ 236 if (!ret && !outarg.nodeid) 202 if (!ret && !outarg.nodeid) 237 ret = -ENOENT; 203 ret = -ENOENT; 238 if (!ret) { 204 if (!ret) { 239 fi = get_fuse_inode(in 205 fi = get_fuse_inode(inode); 240 if (outarg.nodeid != g !! 206 if (outarg.nodeid != get_node_id(inode)) { 241 (bool) IS_AUTOMOUN !! 207 fuse_queue_forget(fc, forget, outarg.nodeid, 1); 242 fuse_queue_for << 243 << 244 goto invalid; 208 goto invalid; 245 } 209 } 246 spin_lock(&fi->lock); 210 spin_lock(&fi->lock); 247 fi->nlookup++; 211 fi->nlookup++; 248 spin_unlock(&fi->lock) 212 spin_unlock(&fi->lock); 249 } 213 } 250 kfree(forget); 214 kfree(forget); 251 if (ret == -ENOMEM || ret == - !! 215 if (ret == -ENOMEM) 252 goto out; 216 goto out; 253 if (ret || fuse_invalid_attr(& !! 217 if (ret || (outarg.attr.mode ^ inode->i_mode) & S_IFMT) 254 fuse_stale_inode(inode, ou << 255 goto invalid; 218 goto invalid; 256 219 257 forget_all_cached_acls(inode); 220 forget_all_cached_acls(inode); 258 fuse_change_attributes(inode, !! 221 fuse_change_attributes(inode, &outarg.attr, 259 ATTR_TI !! 222 entry_attr_timeout(&outarg), 260 attr_ve 223 attr_version); 261 fuse_change_entry_timeout(entr 224 fuse_change_entry_timeout(entry, &outarg); 262 } else if (inode) { 225 } else if (inode) { 263 fi = get_fuse_inode(inode); 226 fi = get_fuse_inode(inode); 264 if (flags & LOOKUP_RCU) { 227 if (flags & LOOKUP_RCU) { 265 if (test_bit(FUSE_I_IN 228 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 266 return -ECHILD 229 return -ECHILD; 267 } else if (test_and_clear_bit( 230 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 268 parent = dget_parent(e 231 parent = dget_parent(entry); 269 fuse_advise_use_readdi 232 fuse_advise_use_readdirplus(d_inode(parent)); 270 dput(parent); 233 dput(parent); 271 } 234 } 272 } 235 } 273 ret = 1; 236 ret = 1; 274 out: 237 out: 275 return ret; 238 return ret; 276 239 277 invalid: 240 invalid: 278 ret = 0; 241 ret = 0; 279 goto out; 242 goto out; 280 } 243 } 281 244 282 #if BITS_PER_LONG < 64 << 283 static int fuse_dentry_init(struct dentry *den 245 static int fuse_dentry_init(struct dentry *dentry) 284 { 246 { 285 dentry->d_fsdata = kzalloc(sizeof(unio !! 247 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), GFP_KERNEL); 286 GFP_KERNEL_ << 287 248 288 return dentry->d_fsdata ? 0 : -ENOMEM; 249 return dentry->d_fsdata ? 0 : -ENOMEM; 289 } 250 } 290 static void fuse_dentry_release(struct dentry 251 static void fuse_dentry_release(struct dentry *dentry) 291 { 252 { 292 union fuse_dentry *fd = dentry->d_fsda 253 union fuse_dentry *fd = dentry->d_fsdata; 293 254 294 kfree_rcu(fd, rcu); 255 kfree_rcu(fd, rcu); 295 } 256 } 296 #endif << 297 << 298 static int fuse_dentry_delete(const struct den << 299 { << 300 return time_before64(fuse_dentry_time( << 301 } << 302 << 303 /* << 304 * Create a fuse_mount object with a new super << 305 * as the root), and return that mount so it c << 306 * @path. << 307 */ << 308 static struct vfsmount *fuse_dentry_automount( << 309 { << 310 struct fs_context *fsc; << 311 struct vfsmount *mnt; << 312 struct fuse_inode *mp_fi = get_fuse_in << 313 << 314 fsc = fs_context_for_submount(path->mn << 315 if (IS_ERR(fsc)) << 316 return ERR_CAST(fsc); << 317 << 318 /* Pass the FUSE inode of the mount fo << 319 fsc->fs_private = mp_fi; << 320 << 321 /* Create the submount */ << 322 mnt = fc_mount(fsc); << 323 if (!IS_ERR(mnt)) << 324 mntget(mnt); << 325 << 326 put_fs_context(fsc); << 327 return mnt; << 328 } << 329 257 330 const struct dentry_operations fuse_dentry_ope 258 const struct dentry_operations fuse_dentry_operations = { 331 .d_revalidate = fuse_dentry_revalida 259 .d_revalidate = fuse_dentry_revalidate, 332 .d_delete = fuse_dentry_delete, << 333 #if BITS_PER_LONG < 64 << 334 .d_init = fuse_dentry_init, 260 .d_init = fuse_dentry_init, 335 .d_release = fuse_dentry_release, 261 .d_release = fuse_dentry_release, 336 #endif << 337 .d_automount = fuse_dentry_automoun << 338 }; 262 }; 339 263 340 const struct dentry_operations fuse_root_dentr 264 const struct dentry_operations fuse_root_dentry_operations = { 341 #if BITS_PER_LONG < 64 << 342 .d_init = fuse_dentry_init, 265 .d_init = fuse_dentry_init, 343 .d_release = fuse_dentry_release, 266 .d_release = fuse_dentry_release, 344 #endif << 345 }; 267 }; 346 268 347 int fuse_valid_type(int m) 269 int fuse_valid_type(int m) 348 { 270 { 349 return S_ISREG(m) || S_ISDIR(m) || S_I 271 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 350 S_ISBLK(m) || S_ISFIFO(m) || S 272 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 351 } 273 } 352 274 353 static bool fuse_valid_size(u64 size) << 354 { << 355 return size <= LLONG_MAX; << 356 } << 357 << 358 bool fuse_invalid_attr(struct fuse_attr *attr) << 359 { << 360 return !fuse_valid_type(attr->mode) || << 361 } << 362 << 363 int fuse_lookup_name(struct super_block *sb, u 275 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 364 struct fuse_entry_out *ou 276 struct fuse_entry_out *outarg, struct inode **inode) 365 { 277 { 366 struct fuse_mount *fm = get_fuse_mount !! 278 struct fuse_conn *fc = get_fuse_conn_super(sb); 367 FUSE_ARGS(args); 279 FUSE_ARGS(args); 368 struct fuse_forget_link *forget; 280 struct fuse_forget_link *forget; 369 u64 attr_version; 281 u64 attr_version; 370 int err; 282 int err; 371 283 372 *inode = NULL; 284 *inode = NULL; 373 err = -ENAMETOOLONG; 285 err = -ENAMETOOLONG; 374 if (name->len > FUSE_NAME_MAX) 286 if (name->len > FUSE_NAME_MAX) 375 goto out; 287 goto out; 376 288 377 289 378 forget = fuse_alloc_forget(); 290 forget = fuse_alloc_forget(); 379 err = -ENOMEM; 291 err = -ENOMEM; 380 if (!forget) 292 if (!forget) 381 goto out; 293 goto out; 382 294 383 attr_version = fuse_get_attr_version(f !! 295 attr_version = fuse_get_attr_version(fc); 384 296 385 fuse_lookup_init(fm->fc, &args, nodeid !! 297 fuse_lookup_init(fc, &args, nodeid, name, outarg); 386 err = fuse_simple_request(fm, &args); !! 298 err = fuse_simple_request(fc, &args); 387 /* Zero nodeid is same as -ENOENT, but 299 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 388 if (err || !outarg->nodeid) 300 if (err || !outarg->nodeid) 389 goto out_put_forget; 301 goto out_put_forget; 390 302 391 err = -EIO; 303 err = -EIO; 392 if (fuse_invalid_attr(&outarg->attr)) !! 304 if (!outarg->nodeid) >> 305 goto out_put_forget; >> 306 if (!fuse_valid_type(outarg->attr.mode)) 393 goto out_put_forget; 307 goto out_put_forget; 394 if (outarg->nodeid == FUSE_ROOT_ID && << 395 pr_warn_once("root generation << 396 outarg->generation = 0; << 397 } << 398 308 399 *inode = fuse_iget(sb, outarg->nodeid, 309 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 400 &outarg->attr, ATTR !! 310 &outarg->attr, entry_attr_timeout(outarg), 401 attr_version); 311 attr_version); 402 err = -ENOMEM; 312 err = -ENOMEM; 403 if (!*inode) { 313 if (!*inode) { 404 fuse_queue_forget(fm->fc, forg !! 314 fuse_queue_forget(fc, forget, outarg->nodeid, 1); 405 goto out; 315 goto out; 406 } 316 } 407 err = 0; 317 err = 0; 408 318 409 out_put_forget: 319 out_put_forget: 410 kfree(forget); 320 kfree(forget); 411 out: 321 out: 412 return err; 322 return err; 413 } 323 } 414 324 415 static struct dentry *fuse_lookup(struct inode 325 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 416 unsigned int 326 unsigned int flags) 417 { 327 { 418 int err; 328 int err; 419 struct fuse_entry_out outarg; 329 struct fuse_entry_out outarg; 420 struct inode *inode; 330 struct inode *inode; 421 struct dentry *newent; 331 struct dentry *newent; 422 bool outarg_valid = true; 332 bool outarg_valid = true; 423 bool locked; 333 bool locked; 424 334 425 if (fuse_is_bad(dir)) << 426 return ERR_PTR(-EIO); << 427 << 428 locked = fuse_lock_inode(dir); 335 locked = fuse_lock_inode(dir); 429 err = fuse_lookup_name(dir->i_sb, get_ 336 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 430 &outarg, &inode 337 &outarg, &inode); 431 fuse_unlock_inode(dir, locked); 338 fuse_unlock_inode(dir, locked); 432 if (err == -ENOENT) { 339 if (err == -ENOENT) { 433 outarg_valid = false; 340 outarg_valid = false; 434 err = 0; 341 err = 0; 435 } 342 } 436 if (err) 343 if (err) 437 goto out_err; 344 goto out_err; 438 345 439 err = -EIO; 346 err = -EIO; 440 if (inode && get_node_id(inode) == FUS 347 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 441 goto out_iput; 348 goto out_iput; 442 349 443 newent = d_splice_alias(inode, entry); 350 newent = d_splice_alias(inode, entry); 444 err = PTR_ERR(newent); 351 err = PTR_ERR(newent); 445 if (IS_ERR(newent)) 352 if (IS_ERR(newent)) 446 goto out_err; 353 goto out_err; 447 354 448 entry = newent ? newent : entry; 355 entry = newent ? newent : entry; 449 if (outarg_valid) 356 if (outarg_valid) 450 fuse_change_entry_timeout(entr 357 fuse_change_entry_timeout(entry, &outarg); 451 else 358 else 452 fuse_invalidate_entry_cache(en 359 fuse_invalidate_entry_cache(entry); 453 360 454 if (inode) !! 361 fuse_advise_use_readdirplus(dir); 455 fuse_advise_use_readdirplus(di << 456 return newent; 362 return newent; 457 363 458 out_iput: 364 out_iput: 459 iput(inode); 365 iput(inode); 460 out_err: 366 out_err: 461 return ERR_PTR(err); 367 return ERR_PTR(err); 462 } 368 } 463 369 464 static int get_security_context(struct dentry << 465 struct fuse_in << 466 { << 467 struct fuse_secctx *fctx; << 468 struct fuse_secctx_header *header; << 469 void *ctx = NULL, *ptr; << 470 u32 ctxlen, total_len = sizeof(*header << 471 int err, nr_ctx = 0; << 472 const char *name; << 473 size_t namelen; << 474 << 475 err = security_dentry_init_security(en << 476 &n << 477 if (err) { << 478 if (err != -EOPNOTSUPP) << 479 goto out_err; << 480 /* No LSM is supporting this s << 481 ctxlen = 0; << 482 ctx = NULL; << 483 } << 484 << 485 if (ctxlen) { << 486 nr_ctx = 1; << 487 namelen = strlen(name) + 1; << 488 err = -EIO; << 489 if (WARN_ON(namelen > XATTR_NA << 490 goto out_err; << 491 total_len += FUSE_REC_ALIGN(si << 492 } << 493 << 494 err = -ENOMEM; << 495 header = ptr = kzalloc(total_len, GFP_ << 496 if (!ptr) << 497 goto out_err; << 498 << 499 header->nr_secctx = nr_ctx; << 500 header->size = total_len; << 501 ptr += sizeof(*header); << 502 if (nr_ctx) { << 503 fctx = ptr; << 504 fctx->size = ctxlen; << 505 ptr += sizeof(*fctx); << 506 << 507 strcpy(ptr, name); << 508 ptr += namelen; << 509 << 510 memcpy(ptr, ctx, ctxlen); << 511 } << 512 ext->size = total_len; << 513 ext->value = header; << 514 err = 0; << 515 out_err: << 516 kfree(ctx); << 517 return err; << 518 } << 519 << 520 static void *extend_arg(struct fuse_in_arg *bu << 521 { << 522 void *p; << 523 u32 newlen = buf->size + bytes; << 524 << 525 p = krealloc(buf->value, newlen, GFP_K << 526 if (!p) { << 527 kfree(buf->value); << 528 buf->size = 0; << 529 buf->value = NULL; << 530 return NULL; << 531 } << 532 << 533 memset(p + buf->size, 0, bytes); << 534 buf->value = p; << 535 buf->size = newlen; << 536 << 537 return p + newlen - bytes; << 538 } << 539 << 540 static u32 fuse_ext_size(size_t size) << 541 { << 542 return FUSE_REC_ALIGN(sizeof(struct fu << 543 } << 544 << 545 /* << 546 * This adds just a single supplementary group << 547 */ << 548 static int get_create_supp_group(struct inode << 549 { << 550 struct fuse_conn *fc = get_fuse_conn(d << 551 struct fuse_ext_header *xh; << 552 struct fuse_supp_groups *sg; << 553 kgid_t kgid = dir->i_gid; << 554 gid_t parent_gid = from_kgid(fc->user_ << 555 u32 sg_len = fuse_ext_size(sizeof(*sg) << 556 << 557 if (parent_gid == (gid_t) -1 || gid_eq << 558 !in_group_p(kgid)) << 559 return 0; << 560 << 561 xh = extend_arg(ext, sg_len); << 562 if (!xh) << 563 return -ENOMEM; << 564 << 565 xh->size = sg_len; << 566 xh->type = FUSE_EXT_GROUPS; << 567 << 568 sg = (struct fuse_supp_groups *) &xh[1 << 569 sg->nr_groups = 1; << 570 sg->groups[0] = parent_gid; << 571 << 572 return 0; << 573 } << 574 << 575 static int get_create_ext(struct fuse_args *ar << 576 struct inode *dir, s << 577 umode_t mode) << 578 { << 579 struct fuse_conn *fc = get_fuse_conn_s << 580 struct fuse_in_arg ext = { .size = 0, << 581 int err = 0; << 582 << 583 if (fc->init_security) << 584 err = get_security_context(den << 585 if (!err && fc->create_supp_group) << 586 err = get_create_supp_group(di << 587 << 588 if (!err && ext.size) { << 589 WARN_ON(args->in_numargs >= AR << 590 args->is_ext = true; << 591 args->ext_idx = args->in_numar << 592 args->in_args[args->ext_idx] = << 593 } else { << 594 kfree(ext.value); << 595 } << 596 << 597 return err; << 598 } << 599 << 600 static void free_ext_value(struct fuse_args *a << 601 { << 602 if (args->is_ext) << 603 kfree(args->in_args[args->ext_ << 604 } << 605 << 606 /* 370 /* 607 * Atomic create+open operation 371 * Atomic create+open operation 608 * 372 * 609 * If the filesystem doesn't support this, the 373 * If the filesystem doesn't support this, then fall back to separate 610 * 'mknod' + 'open' requests. 374 * 'mknod' + 'open' requests. 611 */ 375 */ 612 static int fuse_create_open(struct inode *dir, 376 static int fuse_create_open(struct inode *dir, struct dentry *entry, 613 struct file *file, !! 377 struct file *file, unsigned flags, 614 umode_t mode, u32 !! 378 umode_t mode) 615 { 379 { 616 int err; 380 int err; 617 struct inode *inode; 381 struct inode *inode; 618 struct fuse_mount *fm = get_fuse_mount !! 382 struct fuse_conn *fc = get_fuse_conn(dir); 619 FUSE_ARGS(args); 383 FUSE_ARGS(args); 620 struct fuse_forget_link *forget; 384 struct fuse_forget_link *forget; 621 struct fuse_create_in inarg; 385 struct fuse_create_in inarg; 622 struct fuse_open_out *outopenp; !! 386 struct fuse_open_out outopen; 623 struct fuse_entry_out outentry; 387 struct fuse_entry_out outentry; 624 struct fuse_inode *fi; 388 struct fuse_inode *fi; 625 struct fuse_file *ff; 389 struct fuse_file *ff; 626 bool trunc = flags & O_TRUNC; << 627 390 628 /* Userspace expects S_IFREG in create 391 /* Userspace expects S_IFREG in create mode */ 629 BUG_ON((mode & S_IFMT) != S_IFREG); 392 BUG_ON((mode & S_IFMT) != S_IFREG); 630 393 631 forget = fuse_alloc_forget(); 394 forget = fuse_alloc_forget(); 632 err = -ENOMEM; 395 err = -ENOMEM; 633 if (!forget) 396 if (!forget) 634 goto out_err; 397 goto out_err; 635 398 636 err = -ENOMEM; 399 err = -ENOMEM; 637 ff = fuse_file_alloc(fm, true); !! 400 ff = fuse_file_alloc(fc); 638 if (!ff) 401 if (!ff) 639 goto out_put_forget_req; 402 goto out_put_forget_req; 640 403 641 if (!fm->fc->dont_mask) !! 404 if (!fc->dont_mask) 642 mode &= ~current_umask(); 405 mode &= ~current_umask(); 643 406 644 flags &= ~O_NOCTTY; 407 flags &= ~O_NOCTTY; 645 memset(&inarg, 0, sizeof(inarg)); 408 memset(&inarg, 0, sizeof(inarg)); 646 memset(&outentry, 0, sizeof(outentry)) 409 memset(&outentry, 0, sizeof(outentry)); 647 inarg.flags = flags; 410 inarg.flags = flags; 648 inarg.mode = mode; 411 inarg.mode = mode; 649 inarg.umask = current_umask(); 412 inarg.umask = current_umask(); 650 !! 413 args.in.h.opcode = FUSE_CREATE; 651 if (fm->fc->handle_killpriv_v2 && trun !! 414 args.in.h.nodeid = get_node_id(dir); 652 !(flags & O_EXCL) && !capable(CAP_ !! 415 args.in.numargs = 2; 653 inarg.open_flags |= FUSE_OPEN_ !! 416 args.in.args[0].size = sizeof(inarg); 654 } !! 417 args.in.args[0].value = &inarg; 655 !! 418 args.in.args[1].size = entry->d_name.len + 1; 656 args.opcode = opcode; !! 419 args.in.args[1].value = entry->d_name.name; 657 args.nodeid = get_node_id(dir); !! 420 args.out.numargs = 2; 658 args.in_numargs = 2; !! 421 args.out.args[0].size = sizeof(outentry); 659 args.in_args[0].size = sizeof(inarg); !! 422 args.out.args[0].value = &outentry; 660 args.in_args[0].value = &inarg; !! 423 args.out.args[1].size = sizeof(outopen); 661 args.in_args[1].size = entry->d_name.l !! 424 args.out.args[1].value = &outopen; 662 args.in_args[1].value = entry->d_name. !! 425 err = fuse_simple_request(fc, &args); 663 args.out_numargs = 2; << 664 args.out_args[0].size = sizeof(outentr << 665 args.out_args[0].value = &outentry; << 666 /* Store outarg for fuse_finish_open() << 667 outopenp = &ff->args->open_outarg; << 668 args.out_args[1].size = sizeof(*outope << 669 args.out_args[1].value = outopenp; << 670 << 671 err = get_create_ext(&args, dir, entry << 672 if (err) << 673 goto out_free_ff; << 674 << 675 err = fuse_simple_request(fm, &args); << 676 free_ext_value(&args); << 677 if (err) 426 if (err) 678 goto out_free_ff; 427 goto out_free_ff; 679 428 680 err = -EIO; 429 err = -EIO; 681 if (!S_ISREG(outentry.attr.mode) || in !! 430 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid)) 682 fuse_invalid_attr(&outentry.attr)) << 683 goto out_free_ff; 431 goto out_free_ff; 684 432 685 ff->fh = outopenp->fh; !! 433 ff->fh = outopen.fh; 686 ff->nodeid = outentry.nodeid; 434 ff->nodeid = outentry.nodeid; 687 ff->open_flags = outopenp->open_flags; !! 435 ff->open_flags = outopen.open_flags; 688 inode = fuse_iget(dir->i_sb, outentry. 436 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 689 &outentry.attr, ATTR !! 437 &outentry.attr, entry_attr_timeout(&outentry), 0); 690 if (!inode) { 438 if (!inode) { 691 flags &= ~(O_CREAT | O_EXCL | 439 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 692 fuse_sync_release(NULL, ff, fl 440 fuse_sync_release(NULL, ff, flags); 693 fuse_queue_forget(fm->fc, forg !! 441 fuse_queue_forget(fc, forget, outentry.nodeid, 1); 694 err = -ENOMEM; 442 err = -ENOMEM; 695 goto out_err; 443 goto out_err; 696 } 444 } 697 kfree(forget); 445 kfree(forget); 698 d_instantiate(entry, inode); 446 d_instantiate(entry, inode); 699 fuse_change_entry_timeout(entry, &oute 447 fuse_change_entry_timeout(entry, &outentry); 700 fuse_dir_changed(dir); 448 fuse_dir_changed(dir); 701 err = generic_file_open(inode, file); !! 449 err = finish_open(file, entry, generic_file_open); 702 if (!err) { << 703 file->private_data = ff; << 704 err = finish_open(file, entry, << 705 } << 706 if (err) { 450 if (err) { 707 fi = get_fuse_inode(inode); 451 fi = get_fuse_inode(inode); 708 fuse_sync_release(fi, ff, flag 452 fuse_sync_release(fi, ff, flags); 709 } else { 453 } else { 710 if (fm->fc->atomic_o_trunc && !! 454 file->private_data = ff; 711 truncate_pagecache(ino !! 455 fuse_finish_open(inode, file); 712 else if (!(ff->open_flags & FO << 713 invalidate_inode_pages << 714 } 456 } 715 return err; 457 return err; 716 458 717 out_free_ff: 459 out_free_ff: 718 fuse_file_free(ff); 460 fuse_file_free(ff); 719 out_put_forget_req: 461 out_put_forget_req: 720 kfree(forget); 462 kfree(forget); 721 out_err: 463 out_err: 722 return err; 464 return err; 723 } 465 } 724 466 725 static int fuse_mknod(struct mnt_idmap *, stru !! 467 static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t); 726 umode_t, dev_t); << 727 static int fuse_atomic_open(struct inode *dir, 468 static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 728 struct file *file, 469 struct file *file, unsigned flags, 729 umode_t mode) 470 umode_t mode) 730 { 471 { 731 int err; 472 int err; 732 struct fuse_conn *fc = get_fuse_conn(d 473 struct fuse_conn *fc = get_fuse_conn(dir); 733 struct dentry *res = NULL; 474 struct dentry *res = NULL; 734 475 735 if (fuse_is_bad(dir)) << 736 return -EIO; << 737 << 738 if (d_in_lookup(entry)) { 476 if (d_in_lookup(entry)) { 739 res = fuse_lookup(dir, entry, 477 res = fuse_lookup(dir, entry, 0); 740 if (IS_ERR(res)) 478 if (IS_ERR(res)) 741 return PTR_ERR(res); 479 return PTR_ERR(res); 742 480 743 if (res) 481 if (res) 744 entry = res; 482 entry = res; 745 } 483 } 746 484 747 if (!(flags & O_CREAT) || d_really_is_ 485 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 748 goto no_open; 486 goto no_open; 749 487 750 /* Only creates */ 488 /* Only creates */ 751 file->f_mode |= FMODE_CREATED; 489 file->f_mode |= FMODE_CREATED; 752 490 753 if (fc->no_create) 491 if (fc->no_create) 754 goto mknod; 492 goto mknod; 755 493 756 err = fuse_create_open(dir, entry, fil !! 494 err = fuse_create_open(dir, entry, file, flags, mode); 757 if (err == -ENOSYS) { 495 if (err == -ENOSYS) { 758 fc->no_create = 1; 496 fc->no_create = 1; 759 goto mknod; 497 goto mknod; 760 } else if (err == -EEXIST) !! 498 } 761 fuse_invalidate_entry(entry); << 762 out_dput: 499 out_dput: 763 dput(res); 500 dput(res); 764 return err; 501 return err; 765 502 766 mknod: 503 mknod: 767 err = fuse_mknod(&nop_mnt_idmap, dir, !! 504 err = fuse_mknod(dir, entry, mode, 0); 768 if (err) 505 if (err) 769 goto out_dput; 506 goto out_dput; 770 no_open: 507 no_open: 771 return finish_no_open(file, res); 508 return finish_no_open(file, res); 772 } 509 } 773 510 774 /* 511 /* 775 * Code shared between mknod, mkdir, symlink a 512 * Code shared between mknod, mkdir, symlink and link 776 */ 513 */ 777 static int create_new_entry(struct fuse_mount !! 514 static int create_new_entry(struct fuse_conn *fc, struct fuse_args *args, 778 struct inode *dir, 515 struct inode *dir, struct dentry *entry, 779 umode_t mode) 516 umode_t mode) 780 { 517 { 781 struct fuse_entry_out outarg; 518 struct fuse_entry_out outarg; 782 struct inode *inode; 519 struct inode *inode; 783 struct dentry *d; 520 struct dentry *d; 784 int err; 521 int err; 785 struct fuse_forget_link *forget; 522 struct fuse_forget_link *forget; 786 523 787 if (fuse_is_bad(dir)) << 788 return -EIO; << 789 << 790 forget = fuse_alloc_forget(); 524 forget = fuse_alloc_forget(); 791 if (!forget) 525 if (!forget) 792 return -ENOMEM; 526 return -ENOMEM; 793 527 794 memset(&outarg, 0, sizeof(outarg)); 528 memset(&outarg, 0, sizeof(outarg)); 795 args->nodeid = get_node_id(dir); !! 529 args->in.h.nodeid = get_node_id(dir); 796 args->out_numargs = 1; !! 530 args->out.numargs = 1; 797 args->out_args[0].size = sizeof(outarg !! 531 args->out.args[0].size = sizeof(outarg); 798 args->out_args[0].value = &outarg; !! 532 args->out.args[0].value = &outarg; 799 !! 533 err = fuse_simple_request(fc, args); 800 if (args->opcode != FUSE_LINK) { << 801 err = get_create_ext(args, dir << 802 if (err) << 803 goto out_put_forget_re << 804 } << 805 << 806 err = fuse_simple_request(fm, args); << 807 free_ext_value(args); << 808 if (err) 534 if (err) 809 goto out_put_forget_req; 535 goto out_put_forget_req; 810 536 811 err = -EIO; 537 err = -EIO; 812 if (invalid_nodeid(outarg.nodeid) || f !! 538 if (invalid_nodeid(outarg.nodeid)) 813 goto out_put_forget_req; 539 goto out_put_forget_req; 814 540 815 if ((outarg.attr.mode ^ mode) & S_IFMT 541 if ((outarg.attr.mode ^ mode) & S_IFMT) 816 goto out_put_forget_req; 542 goto out_put_forget_req; 817 543 818 inode = fuse_iget(dir->i_sb, outarg.no 544 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 819 &outarg.attr, ATTR_T !! 545 &outarg.attr, entry_attr_timeout(&outarg), 0); 820 if (!inode) { 546 if (!inode) { 821 fuse_queue_forget(fm->fc, forg !! 547 fuse_queue_forget(fc, forget, outarg.nodeid, 1); 822 return -ENOMEM; 548 return -ENOMEM; 823 } 549 } 824 kfree(forget); 550 kfree(forget); 825 551 826 d_drop(entry); 552 d_drop(entry); 827 d = d_splice_alias(inode, entry); 553 d = d_splice_alias(inode, entry); 828 if (IS_ERR(d)) 554 if (IS_ERR(d)) 829 return PTR_ERR(d); 555 return PTR_ERR(d); 830 556 831 if (d) { 557 if (d) { 832 fuse_change_entry_timeout(d, & 558 fuse_change_entry_timeout(d, &outarg); 833 dput(d); 559 dput(d); 834 } else { 560 } else { 835 fuse_change_entry_timeout(entr 561 fuse_change_entry_timeout(entry, &outarg); 836 } 562 } 837 fuse_dir_changed(dir); 563 fuse_dir_changed(dir); 838 return 0; 564 return 0; 839 565 840 out_put_forget_req: 566 out_put_forget_req: 841 if (err == -EEXIST) << 842 fuse_invalidate_entry(entry); << 843 kfree(forget); 567 kfree(forget); 844 return err; 568 return err; 845 } 569 } 846 570 847 static int fuse_mknod(struct mnt_idmap *idmap, !! 571 static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode, 848 struct dentry *entry, um !! 572 dev_t rdev) 849 { 573 { 850 struct fuse_mknod_in inarg; 574 struct fuse_mknod_in inarg; 851 struct fuse_mount *fm = get_fuse_mount !! 575 struct fuse_conn *fc = get_fuse_conn(dir); 852 FUSE_ARGS(args); 576 FUSE_ARGS(args); 853 577 854 if (!fm->fc->dont_mask) !! 578 if (!fc->dont_mask) 855 mode &= ~current_umask(); 579 mode &= ~current_umask(); 856 580 857 memset(&inarg, 0, sizeof(inarg)); 581 memset(&inarg, 0, sizeof(inarg)); 858 inarg.mode = mode; 582 inarg.mode = mode; 859 inarg.rdev = new_encode_dev(rdev); 583 inarg.rdev = new_encode_dev(rdev); 860 inarg.umask = current_umask(); 584 inarg.umask = current_umask(); 861 args.opcode = FUSE_MKNOD; !! 585 args.in.h.opcode = FUSE_MKNOD; 862 args.in_numargs = 2; !! 586 args.in.numargs = 2; 863 args.in_args[0].size = sizeof(inarg); !! 587 args.in.args[0].size = sizeof(inarg); 864 args.in_args[0].value = &inarg; !! 588 args.in.args[0].value = &inarg; 865 args.in_args[1].size = entry->d_name.l !! 589 args.in.args[1].size = entry->d_name.len + 1; 866 args.in_args[1].value = entry->d_name. !! 590 args.in.args[1].value = entry->d_name.name; 867 return create_new_entry(fm, &args, dir !! 591 return create_new_entry(fc, &args, dir, entry, mode); 868 } << 869 << 870 static int fuse_create(struct mnt_idmap *idmap << 871 struct dentry *entry, u << 872 { << 873 return fuse_mknod(&nop_mnt_idmap, dir, << 874 } 592 } 875 593 876 static int fuse_tmpfile(struct mnt_idmap *idma !! 594 static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode, 877 struct file *file, umo !! 595 bool excl) 878 { 596 { 879 struct fuse_conn *fc = get_fuse_conn(d !! 597 return fuse_mknod(dir, entry, mode, 0); 880 int err; << 881 << 882 if (fc->no_tmpfile) << 883 return -EOPNOTSUPP; << 884 << 885 err = fuse_create_open(dir, file->f_pa << 886 if (err == -ENOSYS) { << 887 fc->no_tmpfile = 1; << 888 err = -EOPNOTSUPP; << 889 } << 890 return err; << 891 } 598 } 892 599 893 static int fuse_mkdir(struct mnt_idmap *idmap, !! 600 static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode) 894 struct dentry *entry, um << 895 { 601 { 896 struct fuse_mkdir_in inarg; 602 struct fuse_mkdir_in inarg; 897 struct fuse_mount *fm = get_fuse_mount !! 603 struct fuse_conn *fc = get_fuse_conn(dir); 898 FUSE_ARGS(args); 604 FUSE_ARGS(args); 899 605 900 if (!fm->fc->dont_mask) !! 606 if (!fc->dont_mask) 901 mode &= ~current_umask(); 607 mode &= ~current_umask(); 902 608 903 memset(&inarg, 0, sizeof(inarg)); 609 memset(&inarg, 0, sizeof(inarg)); 904 inarg.mode = mode; 610 inarg.mode = mode; 905 inarg.umask = current_umask(); 611 inarg.umask = current_umask(); 906 args.opcode = FUSE_MKDIR; !! 612 args.in.h.opcode = FUSE_MKDIR; 907 args.in_numargs = 2; !! 613 args.in.numargs = 2; 908 args.in_args[0].size = sizeof(inarg); !! 614 args.in.args[0].size = sizeof(inarg); 909 args.in_args[0].value = &inarg; !! 615 args.in.args[0].value = &inarg; 910 args.in_args[1].size = entry->d_name.l !! 616 args.in.args[1].size = entry->d_name.len + 1; 911 args.in_args[1].value = entry->d_name. !! 617 args.in.args[1].value = entry->d_name.name; 912 return create_new_entry(fm, &args, dir !! 618 return create_new_entry(fc, &args, dir, entry, S_IFDIR); 913 } 619 } 914 620 915 static int fuse_symlink(struct mnt_idmap *idma !! 621 static int fuse_symlink(struct inode *dir, struct dentry *entry, 916 struct dentry *entry, !! 622 const char *link) 917 { 623 { 918 struct fuse_mount *fm = get_fuse_mount !! 624 struct fuse_conn *fc = get_fuse_conn(dir); 919 unsigned len = strlen(link) + 1; 625 unsigned len = strlen(link) + 1; 920 FUSE_ARGS(args); 626 FUSE_ARGS(args); 921 627 922 args.opcode = FUSE_SYMLINK; !! 628 args.in.h.opcode = FUSE_SYMLINK; 923 args.in_numargs = 2; !! 629 args.in.numargs = 2; 924 args.in_args[0].size = entry->d_name.l !! 630 args.in.args[0].size = entry->d_name.len + 1; 925 args.in_args[0].value = entry->d_name. !! 631 args.in.args[0].value = entry->d_name.name; 926 args.in_args[1].size = len; !! 632 args.in.args[1].size = len; 927 args.in_args[1].value = link; !! 633 args.in.args[1].value = link; 928 return create_new_entry(fm, &args, dir !! 634 return create_new_entry(fc, &args, dir, entry, S_IFLNK); 929 } << 930 << 931 void fuse_flush_time_update(struct inode *inod << 932 { << 933 int err = sync_inode_metadata(inode, 1 << 934 << 935 mapping_set_error(inode->i_mapping, er << 936 } 635 } 937 636 938 static void fuse_update_ctime_in_cache(struct !! 637 void fuse_update_ctime(struct inode *inode) 939 { 638 { 940 if (!IS_NOCMTIME(inode)) { 639 if (!IS_NOCMTIME(inode)) { 941 inode_set_ctime_current(inode) !! 640 inode->i_ctime = current_time(inode); 942 mark_inode_dirty_sync(inode); 641 mark_inode_dirty_sync(inode); 943 fuse_flush_time_update(inode); << 944 } 642 } 945 } 643 } 946 644 947 void fuse_update_ctime(struct inode *inode) << 948 { << 949 fuse_invalidate_attr_mask(inode, STATX << 950 fuse_update_ctime_in_cache(inode); << 951 } << 952 << 953 static void fuse_entry_unlinked(struct dentry << 954 { << 955 struct inode *inode = d_inode(entry); << 956 struct fuse_conn *fc = get_fuse_conn(i << 957 struct fuse_inode *fi = get_fuse_inode << 958 << 959 spin_lock(&fi->lock); << 960 fi->attr_version = atomic64_inc_return << 961 /* << 962 * If i_nlink == 0 then unlink doesn't << 963 * happen if userspace filesystem is c << 964 * difficult to enforce correct nlink << 965 * condition here << 966 */ << 967 if (S_ISDIR(inode->i_mode)) << 968 clear_nlink(inode); << 969 else if (inode->i_nlink > 0) << 970 drop_nlink(inode); << 971 spin_unlock(&fi->lock); << 972 fuse_invalidate_entry_cache(entry); << 973 fuse_update_ctime(inode); << 974 } << 975 << 976 static int fuse_unlink(struct inode *dir, stru 645 static int fuse_unlink(struct inode *dir, struct dentry *entry) 977 { 646 { 978 int err; 647 int err; 979 struct fuse_mount *fm = get_fuse_mount !! 648 struct fuse_conn *fc = get_fuse_conn(dir); 980 FUSE_ARGS(args); 649 FUSE_ARGS(args); 981 650 982 if (fuse_is_bad(dir)) !! 651 args.in.h.opcode = FUSE_UNLINK; 983 return -EIO; !! 652 args.in.h.nodeid = get_node_id(dir); 984 !! 653 args.in.numargs = 1; 985 args.opcode = FUSE_UNLINK; !! 654 args.in.args[0].size = entry->d_name.len + 1; 986 args.nodeid = get_node_id(dir); !! 655 args.in.args[0].value = entry->d_name.name; 987 args.in_numargs = 1; !! 656 err = fuse_simple_request(fc, &args); 988 args.in_args[0].size = entry->d_name.l << 989 args.in_args[0].value = entry->d_name. << 990 err = fuse_simple_request(fm, &args); << 991 if (!err) { 657 if (!err) { >> 658 struct inode *inode = d_inode(entry); >> 659 struct fuse_inode *fi = get_fuse_inode(inode); >> 660 >> 661 spin_lock(&fi->lock); >> 662 fi->attr_version = atomic64_inc_return(&fc->attr_version); >> 663 /* >> 664 * If i_nlink == 0 then unlink doesn't make sense, yet this can >> 665 * happen if userspace filesystem is careless. It would be >> 666 * difficult to enforce correct nlink usage so just ignore this >> 667 * condition here >> 668 */ >> 669 if (inode->i_nlink > 0) >> 670 drop_nlink(inode); >> 671 spin_unlock(&fi->lock); >> 672 fuse_invalidate_attr(inode); 992 fuse_dir_changed(dir); 673 fuse_dir_changed(dir); 993 fuse_entry_unlinked(entry); !! 674 fuse_invalidate_entry_cache(entry); 994 } else if (err == -EINTR || err == -EN !! 675 fuse_update_ctime(inode); >> 676 } else if (err == -EINTR) 995 fuse_invalidate_entry(entry); 677 fuse_invalidate_entry(entry); 996 return err; 678 return err; 997 } 679 } 998 680 999 static int fuse_rmdir(struct inode *dir, struc 681 static int fuse_rmdir(struct inode *dir, struct dentry *entry) 1000 { 682 { 1001 int err; 683 int err; 1002 struct fuse_mount *fm = get_fuse_moun !! 684 struct fuse_conn *fc = get_fuse_conn(dir); 1003 FUSE_ARGS(args); 685 FUSE_ARGS(args); 1004 686 1005 if (fuse_is_bad(dir)) !! 687 args.in.h.opcode = FUSE_RMDIR; 1006 return -EIO; !! 688 args.in.h.nodeid = get_node_id(dir); 1007 !! 689 args.in.numargs = 1; 1008 args.opcode = FUSE_RMDIR; !! 690 args.in.args[0].size = entry->d_name.len + 1; 1009 args.nodeid = get_node_id(dir); !! 691 args.in.args[0].value = entry->d_name.name; 1010 args.in_numargs = 1; !! 692 err = fuse_simple_request(fc, &args); 1011 args.in_args[0].size = entry->d_name. << 1012 args.in_args[0].value = entry->d_name << 1013 err = fuse_simple_request(fm, &args); << 1014 if (!err) { 693 if (!err) { >> 694 clear_nlink(d_inode(entry)); 1015 fuse_dir_changed(dir); 695 fuse_dir_changed(dir); 1016 fuse_entry_unlinked(entry); !! 696 fuse_invalidate_entry_cache(entry); 1017 } else if (err == -EINTR || err == -E !! 697 } else if (err == -EINTR) 1018 fuse_invalidate_entry(entry); 698 fuse_invalidate_entry(entry); 1019 return err; 699 return err; 1020 } 700 } 1021 701 1022 static int fuse_rename_common(struct inode *o 702 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 1023 struct inode *n 703 struct inode *newdir, struct dentry *newent, 1024 unsigned int fl 704 unsigned int flags, int opcode, size_t argsize) 1025 { 705 { 1026 int err; 706 int err; 1027 struct fuse_rename2_in inarg; 707 struct fuse_rename2_in inarg; 1028 struct fuse_mount *fm = get_fuse_moun !! 708 struct fuse_conn *fc = get_fuse_conn(olddir); 1029 FUSE_ARGS(args); 709 FUSE_ARGS(args); 1030 710 1031 memset(&inarg, 0, argsize); 711 memset(&inarg, 0, argsize); 1032 inarg.newdir = get_node_id(newdir); 712 inarg.newdir = get_node_id(newdir); 1033 inarg.flags = flags; 713 inarg.flags = flags; 1034 args.opcode = opcode; !! 714 args.in.h.opcode = opcode; 1035 args.nodeid = get_node_id(olddir); !! 715 args.in.h.nodeid = get_node_id(olddir); 1036 args.in_numargs = 3; !! 716 args.in.numargs = 3; 1037 args.in_args[0].size = argsize; !! 717 args.in.args[0].size = argsize; 1038 args.in_args[0].value = &inarg; !! 718 args.in.args[0].value = &inarg; 1039 args.in_args[1].size = oldent->d_name !! 719 args.in.args[1].size = oldent->d_name.len + 1; 1040 args.in_args[1].value = oldent->d_nam !! 720 args.in.args[1].value = oldent->d_name.name; 1041 args.in_args[2].size = newent->d_name !! 721 args.in.args[2].size = newent->d_name.len + 1; 1042 args.in_args[2].value = newent->d_nam !! 722 args.in.args[2].value = newent->d_name.name; 1043 err = fuse_simple_request(fm, &args); !! 723 err = fuse_simple_request(fc, &args); 1044 if (!err) { 724 if (!err) { 1045 /* ctime changes */ 725 /* ctime changes */ >> 726 fuse_invalidate_attr(d_inode(oldent)); 1046 fuse_update_ctime(d_inode(old 727 fuse_update_ctime(d_inode(oldent)); 1047 728 1048 if (flags & RENAME_EXCHANGE) !! 729 if (flags & RENAME_EXCHANGE) { >> 730 fuse_invalidate_attr(d_inode(newent)); 1049 fuse_update_ctime(d_i 731 fuse_update_ctime(d_inode(newent)); >> 732 } 1050 733 1051 fuse_dir_changed(olddir); 734 fuse_dir_changed(olddir); 1052 if (olddir != newdir) 735 if (olddir != newdir) 1053 fuse_dir_changed(newd 736 fuse_dir_changed(newdir); 1054 737 1055 /* newent will end up negativ 738 /* newent will end up negative */ 1056 if (!(flags & RENAME_EXCHANGE !! 739 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) { 1057 fuse_entry_unlinked(n !! 740 fuse_invalidate_attr(d_inode(newent)); 1058 } else if (err == -EINTR || err == -E !! 741 fuse_invalidate_entry_cache(newent); >> 742 fuse_update_ctime(d_inode(newent)); >> 743 } >> 744 } else if (err == -EINTR) { 1059 /* If request was interrupted 745 /* If request was interrupted, DEITY only knows if the 1060 rename actually took place 746 rename actually took place. If the invalidation 1061 fails (e.g. some process h 747 fails (e.g. some process has CWD under the renamed 1062 directory), then there can 748 directory), then there can be inconsistency between 1063 the dcache and the real fi 749 the dcache and the real filesystem. Tough luck. */ 1064 fuse_invalidate_entry(oldent) 750 fuse_invalidate_entry(oldent); 1065 if (d_really_is_positive(newe 751 if (d_really_is_positive(newent)) 1066 fuse_invalidate_entry 752 fuse_invalidate_entry(newent); 1067 } 753 } 1068 754 1069 return err; 755 return err; 1070 } 756 } 1071 757 1072 static int fuse_rename2(struct mnt_idmap *idm !! 758 static int fuse_rename2(struct inode *olddir, struct dentry *oldent, 1073 struct dentry *oldent !! 759 struct inode *newdir, struct dentry *newent, 1074 struct dentry *newent !! 760 unsigned int flags) 1075 { 761 { 1076 struct fuse_conn *fc = get_fuse_conn( 762 struct fuse_conn *fc = get_fuse_conn(olddir); 1077 int err; 763 int err; 1078 764 1079 if (fuse_is_bad(olddir)) !! 765 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE)) 1080 return -EIO; << 1081 << 1082 if (flags & ~(RENAME_NOREPLACE | RENA << 1083 return -EINVAL; 766 return -EINVAL; 1084 767 1085 if (flags) { 768 if (flags) { 1086 if (fc->no_rename2 || fc->min 769 if (fc->no_rename2 || fc->minor < 23) 1087 return -EINVAL; 770 return -EINVAL; 1088 771 1089 err = fuse_rename_common(oldd 772 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 1090 FUSE 773 FUSE_RENAME2, 1091 size 774 sizeof(struct fuse_rename2_in)); 1092 if (err == -ENOSYS) { 775 if (err == -ENOSYS) { 1093 fc->no_rename2 = 1; 776 fc->no_rename2 = 1; 1094 err = -EINVAL; 777 err = -EINVAL; 1095 } 778 } 1096 } else { 779 } else { 1097 err = fuse_rename_common(oldd 780 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 1098 FUSE 781 FUSE_RENAME, 1099 size 782 sizeof(struct fuse_rename_in)); 1100 } 783 } 1101 784 1102 return err; 785 return err; 1103 } 786 } 1104 787 1105 static int fuse_link(struct dentry *entry, st 788 static int fuse_link(struct dentry *entry, struct inode *newdir, 1106 struct dentry *newent) 789 struct dentry *newent) 1107 { 790 { 1108 int err; 791 int err; 1109 struct fuse_link_in inarg; 792 struct fuse_link_in inarg; 1110 struct inode *inode = d_inode(entry); 793 struct inode *inode = d_inode(entry); 1111 struct fuse_mount *fm = get_fuse_moun !! 794 struct fuse_conn *fc = get_fuse_conn(inode); 1112 FUSE_ARGS(args); 795 FUSE_ARGS(args); 1113 796 1114 memset(&inarg, 0, sizeof(inarg)); 797 memset(&inarg, 0, sizeof(inarg)); 1115 inarg.oldnodeid = get_node_id(inode); 798 inarg.oldnodeid = get_node_id(inode); 1116 args.opcode = FUSE_LINK; !! 799 args.in.h.opcode = FUSE_LINK; 1117 args.in_numargs = 2; !! 800 args.in.numargs = 2; 1118 args.in_args[0].size = sizeof(inarg); !! 801 args.in.args[0].size = sizeof(inarg); 1119 args.in_args[0].value = &inarg; !! 802 args.in.args[0].value = &inarg; 1120 args.in_args[1].size = newent->d_name !! 803 args.in.args[1].size = newent->d_name.len + 1; 1121 args.in_args[1].value = newent->d_nam !! 804 args.in.args[1].value = newent->d_name.name; 1122 err = create_new_entry(fm, &args, new !! 805 err = create_new_entry(fc, &args, newdir, newent, inode->i_mode); 1123 if (!err) !! 806 /* Contrary to "normal" filesystems it can happen that link 1124 fuse_update_ctime_in_cache(in !! 807 makes two "logical" inodes point to the same "physical" 1125 else if (err == -EINTR) !! 808 inode. We invalidate the attributes of the old one, so it 1126 fuse_invalidate_attr(inode); !! 809 will reflect changes in the backing inode (link count, >> 810 etc.) >> 811 */ >> 812 if (!err) { >> 813 struct fuse_inode *fi = get_fuse_inode(inode); 1127 814 >> 815 spin_lock(&fi->lock); >> 816 fi->attr_version = atomic64_inc_return(&fc->attr_version); >> 817 inc_nlink(inode); >> 818 spin_unlock(&fi->lock); >> 819 fuse_invalidate_attr(inode); >> 820 fuse_update_ctime(inode); >> 821 } else if (err == -EINTR) { >> 822 fuse_invalidate_attr(inode); >> 823 } 1128 return err; 824 return err; 1129 } 825 } 1130 826 1131 static void fuse_fillattr(struct inode *inode 827 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1132 struct kstat *stat) 828 struct kstat *stat) 1133 { 829 { 1134 unsigned int blkbits; 830 unsigned int blkbits; 1135 struct fuse_conn *fc = get_fuse_conn( 831 struct fuse_conn *fc = get_fuse_conn(inode); 1136 832 >> 833 /* see the comment in fuse_change_attributes() */ >> 834 if (fc->writeback_cache && S_ISREG(inode->i_mode)) { >> 835 attr->size = i_size_read(inode); >> 836 attr->mtime = inode->i_mtime.tv_sec; >> 837 attr->mtimensec = inode->i_mtime.tv_nsec; >> 838 attr->ctime = inode->i_ctime.tv_sec; >> 839 attr->ctimensec = inode->i_ctime.tv_nsec; >> 840 } >> 841 1137 stat->dev = inode->i_sb->s_dev; 842 stat->dev = inode->i_sb->s_dev; 1138 stat->ino = attr->ino; 843 stat->ino = attr->ino; 1139 stat->mode = (inode->i_mode & S_IFMT) 844 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1140 stat->nlink = attr->nlink; 845 stat->nlink = attr->nlink; 1141 stat->uid = make_kuid(fc->user_ns, at 846 stat->uid = make_kuid(fc->user_ns, attr->uid); 1142 stat->gid = make_kgid(fc->user_ns, at 847 stat->gid = make_kgid(fc->user_ns, attr->gid); 1143 stat->rdev = inode->i_rdev; 848 stat->rdev = inode->i_rdev; 1144 stat->atime.tv_sec = attr->atime; 849 stat->atime.tv_sec = attr->atime; 1145 stat->atime.tv_nsec = attr->atimensec 850 stat->atime.tv_nsec = attr->atimensec; 1146 stat->mtime.tv_sec = attr->mtime; 851 stat->mtime.tv_sec = attr->mtime; 1147 stat->mtime.tv_nsec = attr->mtimensec 852 stat->mtime.tv_nsec = attr->mtimensec; 1148 stat->ctime.tv_sec = attr->ctime; 853 stat->ctime.tv_sec = attr->ctime; 1149 stat->ctime.tv_nsec = attr->ctimensec 854 stat->ctime.tv_nsec = attr->ctimensec; 1150 stat->size = attr->size; 855 stat->size = attr->size; 1151 stat->blocks = attr->blocks; 856 stat->blocks = attr->blocks; 1152 857 1153 if (attr->blksize != 0) 858 if (attr->blksize != 0) 1154 blkbits = ilog2(attr->blksize 859 blkbits = ilog2(attr->blksize); 1155 else 860 else 1156 blkbits = inode->i_sb->s_bloc 861 blkbits = inode->i_sb->s_blocksize_bits; 1157 862 1158 stat->blksize = 1 << blkbits; 863 stat->blksize = 1 << blkbits; 1159 } 864 } 1160 865 1161 static void fuse_statx_to_attr(struct fuse_st << 1162 { << 1163 memset(attr, 0, sizeof(*attr)); << 1164 attr->ino = sx->ino; << 1165 attr->size = sx->size; << 1166 attr->blocks = sx->blocks; << 1167 attr->atime = sx->atime.tv_sec; << 1168 attr->mtime = sx->mtime.tv_sec; << 1169 attr->ctime = sx->ctime.tv_sec; << 1170 attr->atimensec = sx->atime.tv_nsec; << 1171 attr->mtimensec = sx->mtime.tv_nsec; << 1172 attr->ctimensec = sx->ctime.tv_nsec; << 1173 attr->mode = sx->mode; << 1174 attr->nlink = sx->nlink; << 1175 attr->uid = sx->uid; << 1176 attr->gid = sx->gid; << 1177 attr->rdev = new_encode_dev(MKDEV(sx- << 1178 attr->blksize = sx->blksize; << 1179 } << 1180 << 1181 static int fuse_do_statx(struct inode *inode, << 1182 struct kstat *stat) << 1183 { << 1184 int err; << 1185 struct fuse_attr attr; << 1186 struct fuse_statx *sx; << 1187 struct fuse_statx_in inarg; << 1188 struct fuse_statx_out outarg; << 1189 struct fuse_mount *fm = get_fuse_moun << 1190 u64 attr_version = fuse_get_attr_vers << 1191 FUSE_ARGS(args); << 1192 << 1193 memset(&inarg, 0, sizeof(inarg)); << 1194 memset(&outarg, 0, sizeof(outarg)); << 1195 /* Directories have separate file-han << 1196 if (file && S_ISREG(inode->i_mode)) { << 1197 struct fuse_file *ff = file-> << 1198 << 1199 inarg.getattr_flags |= FUSE_G << 1200 inarg.fh = ff->fh; << 1201 } << 1202 /* For now leave sync hints as the de << 1203 inarg.sx_flags = 0; << 1204 inarg.sx_mask = STATX_BASIC_STATS | S << 1205 args.opcode = FUSE_STATX; << 1206 args.nodeid = get_node_id(inode); << 1207 args.in_numargs = 1; << 1208 args.in_args[0].size = sizeof(inarg); << 1209 args.in_args[0].value = &inarg; << 1210 args.out_numargs = 1; << 1211 args.out_args[0].size = sizeof(outarg << 1212 args.out_args[0].value = &outarg; << 1213 err = fuse_simple_request(fm, &args); << 1214 if (err) << 1215 return err; << 1216 << 1217 sx = &outarg.stat; << 1218 if (((sx->mask & STATX_SIZE) && !fuse << 1219 ((sx->mask & STATX_TYPE) && (!fus << 1220 inod << 1221 fuse_make_bad(inode); << 1222 return -EIO; << 1223 } << 1224 << 1225 fuse_statx_to_attr(&outarg.stat, &att << 1226 if ((sx->mask & STATX_BASIC_STATS) == << 1227 fuse_change_attributes(inode, << 1228 ATTR_T << 1229 } << 1230 << 1231 if (stat) { << 1232 stat->result_mask = sx->mask << 1233 stat->btime.tv_sec = sx->btim << 1234 stat->btime.tv_nsec = min_t(u << 1235 fuse_fillattr(inode, &attr, s << 1236 stat->result_mask |= STATX_TY << 1237 } << 1238 << 1239 return 0; << 1240 } << 1241 << 1242 static int fuse_do_getattr(struct inode *inod 866 static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1243 struct file *file) 867 struct file *file) 1244 { 868 { 1245 int err; 869 int err; 1246 struct fuse_getattr_in inarg; 870 struct fuse_getattr_in inarg; 1247 struct fuse_attr_out outarg; 871 struct fuse_attr_out outarg; 1248 struct fuse_mount *fm = get_fuse_moun !! 872 struct fuse_conn *fc = get_fuse_conn(inode); 1249 FUSE_ARGS(args); 873 FUSE_ARGS(args); 1250 u64 attr_version; 874 u64 attr_version; 1251 875 1252 attr_version = fuse_get_attr_version( !! 876 attr_version = fuse_get_attr_version(fc); 1253 877 1254 memset(&inarg, 0, sizeof(inarg)); 878 memset(&inarg, 0, sizeof(inarg)); 1255 memset(&outarg, 0, sizeof(outarg)); 879 memset(&outarg, 0, sizeof(outarg)); 1256 /* Directories have separate file-han 880 /* Directories have separate file-handle space */ 1257 if (file && S_ISREG(inode->i_mode)) { 881 if (file && S_ISREG(inode->i_mode)) { 1258 struct fuse_file *ff = file-> 882 struct fuse_file *ff = file->private_data; 1259 883 1260 inarg.getattr_flags |= FUSE_G 884 inarg.getattr_flags |= FUSE_GETATTR_FH; 1261 inarg.fh = ff->fh; 885 inarg.fh = ff->fh; 1262 } 886 } 1263 args.opcode = FUSE_GETATTR; !! 887 args.in.h.opcode = FUSE_GETATTR; 1264 args.nodeid = get_node_id(inode); !! 888 args.in.h.nodeid = get_node_id(inode); 1265 args.in_numargs = 1; !! 889 args.in.numargs = 1; 1266 args.in_args[0].size = sizeof(inarg); !! 890 args.in.args[0].size = sizeof(inarg); 1267 args.in_args[0].value = &inarg; !! 891 args.in.args[0].value = &inarg; 1268 args.out_numargs = 1; !! 892 args.out.numargs = 1; 1269 args.out_args[0].size = sizeof(outarg !! 893 args.out.args[0].size = sizeof(outarg); 1270 args.out_args[0].value = &outarg; !! 894 args.out.args[0].value = &outarg; 1271 err = fuse_simple_request(fm, &args); !! 895 err = fuse_simple_request(fc, &args); 1272 if (!err) { 896 if (!err) { 1273 if (fuse_invalid_attr(&outarg !! 897 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) { 1274 inode_wrong_type(inode, o !! 898 make_bad_inode(inode); 1275 fuse_make_bad(inode); << 1276 err = -EIO; 899 err = -EIO; 1277 } else { 900 } else { 1278 fuse_change_attribute !! 901 fuse_change_attributes(inode, &outarg.attr, 1279 !! 902 attr_timeout(&outarg), 1280 903 attr_version); 1281 if (stat) 904 if (stat) 1282 fuse_fillattr 905 fuse_fillattr(inode, &outarg.attr, stat); 1283 } 906 } 1284 } 907 } 1285 return err; 908 return err; 1286 } 909 } 1287 910 1288 static int fuse_update_get_attr(struct inode 911 static int fuse_update_get_attr(struct inode *inode, struct file *file, 1289 struct kstat 912 struct kstat *stat, u32 request_mask, 1290 unsigned int 913 unsigned int flags) 1291 { 914 { 1292 struct fuse_inode *fi = get_fuse_inod 915 struct fuse_inode *fi = get_fuse_inode(inode); 1293 struct fuse_conn *fc = get_fuse_conn( << 1294 int err = 0; 916 int err = 0; 1295 bool sync; 917 bool sync; 1296 u32 inval_mask = READ_ONCE(fi->inval_ << 1297 u32 cache_mask = fuse_get_cache_mask( << 1298 << 1299 << 1300 /* FUSE only supports basic stats and << 1301 request_mask &= STATX_BASIC_STATS | S << 1302 retry: << 1303 if (fc->no_statx) << 1304 request_mask &= STATX_BASIC_S << 1305 918 1306 if (!request_mask) !! 919 if (flags & AT_STATX_FORCE_SYNC) 1307 sync = false; << 1308 else if (flags & AT_STATX_FORCE_SYNC) << 1309 sync = true; 920 sync = true; 1310 else if (flags & AT_STATX_DONT_SYNC) 921 else if (flags & AT_STATX_DONT_SYNC) 1311 sync = false; 922 sync = false; 1312 else if (request_mask & inval_mask & !! 923 else if (request_mask & READ_ONCE(fi->inval_mask)) 1313 sync = true; 924 sync = true; 1314 else 925 else 1315 sync = time_before64(fi->i_ti 926 sync = time_before64(fi->i_time, get_jiffies_64()); 1316 927 1317 if (sync) { 928 if (sync) { 1318 forget_all_cached_acls(inode) 929 forget_all_cached_acls(inode); 1319 /* Try statx if BTIME is requ !! 930 err = fuse_do_getattr(inode, stat, file); 1320 if (!fc->no_statx && (request << 1321 err = fuse_do_statx(i << 1322 if (err == -ENOSYS) { << 1323 fc->no_statx << 1324 err = 0; << 1325 goto retry; << 1326 } << 1327 } else { << 1328 err = fuse_do_getattr << 1329 } << 1330 } else if (stat) { 931 } else if (stat) { 1331 generic_fillattr(&nop_mnt_idm !! 932 generic_fillattr(inode, stat); 1332 stat->mode = fi->orig_i_mode; 933 stat->mode = fi->orig_i_mode; 1333 stat->ino = fi->orig_ino; 934 stat->ino = fi->orig_ino; 1334 if (test_bit(FUSE_I_BTIME, &f << 1335 stat->btime = fi->i_b << 1336 stat->result_mask |= << 1337 } << 1338 } 935 } 1339 936 1340 return err; 937 return err; 1341 } 938 } 1342 939 1343 int fuse_update_attributes(struct inode *inod !! 940 int fuse_update_attributes(struct inode *inode, struct file *file) 1344 { 941 { 1345 return fuse_update_get_attr(inode, fi !! 942 /* Do *not* need to get atime for internal purposes */ >> 943 return fuse_update_get_attr(inode, file, NULL, >> 944 STATX_BASIC_STATS & ~STATX_ATIME, 0); 1346 } 945 } 1347 946 1348 int fuse_reverse_inval_entry(struct fuse_conn !! 947 int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid, 1349 u64 child_nodeid !! 948 u64 child_nodeid, struct qstr *name) 1350 { 949 { 1351 int err = -ENOTDIR; 950 int err = -ENOTDIR; 1352 struct inode *parent; 951 struct inode *parent; 1353 struct dentry *dir; 952 struct dentry *dir; 1354 struct dentry *entry; 953 struct dentry *entry; 1355 954 1356 parent = fuse_ilookup(fc, parent_node !! 955 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid); 1357 if (!parent) 956 if (!parent) 1358 return -ENOENT; 957 return -ENOENT; 1359 958 1360 inode_lock_nested(parent, I_MUTEX_PAR !! 959 inode_lock(parent); 1361 if (!S_ISDIR(parent->i_mode)) 960 if (!S_ISDIR(parent->i_mode)) 1362 goto unlock; 961 goto unlock; 1363 962 1364 err = -ENOENT; 963 err = -ENOENT; 1365 dir = d_find_alias(parent); 964 dir = d_find_alias(parent); 1366 if (!dir) 965 if (!dir) 1367 goto unlock; 966 goto unlock; 1368 967 1369 name->hash = full_name_hash(dir, name 968 name->hash = full_name_hash(dir, name->name, name->len); 1370 entry = d_lookup(dir, name); 969 entry = d_lookup(dir, name); 1371 dput(dir); 970 dput(dir); 1372 if (!entry) 971 if (!entry) 1373 goto unlock; 972 goto unlock; 1374 973 1375 fuse_dir_changed(parent); 974 fuse_dir_changed(parent); 1376 if (!(flags & FUSE_EXPIRE_ONLY)) !! 975 fuse_invalidate_entry(entry); 1377 d_invalidate(entry); << 1378 fuse_invalidate_entry_cache(entry); << 1379 976 1380 if (child_nodeid != 0 && d_really_is_ 977 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1381 inode_lock(d_inode(entry)); 978 inode_lock(d_inode(entry)); 1382 if (get_node_id(d_inode(entry 979 if (get_node_id(d_inode(entry)) != child_nodeid) { 1383 err = -ENOENT; 980 err = -ENOENT; 1384 goto badentry; 981 goto badentry; 1385 } 982 } 1386 if (d_mountpoint(entry)) { 983 if (d_mountpoint(entry)) { 1387 err = -EBUSY; 984 err = -EBUSY; 1388 goto badentry; 985 goto badentry; 1389 } 986 } 1390 if (d_is_dir(entry)) { 987 if (d_is_dir(entry)) { 1391 shrink_dcache_parent( 988 shrink_dcache_parent(entry); 1392 if (!simple_empty(ent 989 if (!simple_empty(entry)) { 1393 err = -ENOTEM 990 err = -ENOTEMPTY; 1394 goto badentry 991 goto badentry; 1395 } 992 } 1396 d_inode(entry)->i_fla 993 d_inode(entry)->i_flags |= S_DEAD; 1397 } 994 } 1398 dont_mount(entry); 995 dont_mount(entry); 1399 clear_nlink(d_inode(entry)); 996 clear_nlink(d_inode(entry)); 1400 err = 0; 997 err = 0; 1401 badentry: 998 badentry: 1402 inode_unlock(d_inode(entry)); 999 inode_unlock(d_inode(entry)); 1403 if (!err) 1000 if (!err) 1404 d_delete(entry); 1001 d_delete(entry); 1405 } else { 1002 } else { 1406 err = 0; 1003 err = 0; 1407 } 1004 } 1408 dput(entry); 1005 dput(entry); 1409 1006 1410 unlock: 1007 unlock: 1411 inode_unlock(parent); 1008 inode_unlock(parent); 1412 iput(parent); 1009 iput(parent); 1413 return err; 1010 return err; 1414 } 1011 } 1415 1012 1416 static inline bool fuse_permissible_uidgid(st << 1417 { << 1418 const struct cred *cred = current_cre << 1419 << 1420 return (uid_eq(cred->euid, fc->user_i << 1421 uid_eq(cred->suid, fc->user_i << 1422 uid_eq(cred->uid, fc->user_i << 1423 gid_eq(cred->egid, fc->group_ << 1424 gid_eq(cred->sgid, fc->group_ << 1425 gid_eq(cred->gid, fc->group_ << 1426 } << 1427 << 1428 /* 1013 /* 1429 * Calling into a user-controlled filesystem 1014 * Calling into a user-controlled filesystem gives the filesystem 1430 * daemon ptrace-like capabilities over the c 1015 * daemon ptrace-like capabilities over the current process. This 1431 * means, that the filesystem daemon is able 1016 * means, that the filesystem daemon is able to record the exact 1432 * filesystem operations performed, and can a 1017 * filesystem operations performed, and can also control the behavior 1433 * of the requester process in otherwise impo 1018 * of the requester process in otherwise impossible ways. For example 1434 * it can delay the operation for arbitrary l 1019 * it can delay the operation for arbitrary length of time allowing 1435 * DoS against the requester. 1020 * DoS against the requester. 1436 * 1021 * 1437 * For this reason only those processes can c 1022 * For this reason only those processes can call into the filesystem, 1438 * for which the owner of the mount has ptrac 1023 * for which the owner of the mount has ptrace privilege. This 1439 * excludes processes started by other users, 1024 * excludes processes started by other users, suid or sgid processes. 1440 */ 1025 */ 1441 bool fuse_allow_current_process(struct fuse_c !! 1026 int fuse_allow_current_process(struct fuse_conn *fc) 1442 { 1027 { 1443 bool allow; !! 1028 const struct cred *cred; 1444 1029 1445 if (fc->allow_other) 1030 if (fc->allow_other) 1446 allow = current_in_userns(fc- !! 1031 return current_in_userns(fc->user_ns); 1447 else << 1448 allow = fuse_permissible_uidg << 1449 1032 1450 if (!allow && allow_sys_admin_access !! 1033 cred = current_cred(); 1451 allow = true; !! 1034 if (uid_eq(cred->euid, fc->user_id) && >> 1035 uid_eq(cred->suid, fc->user_id) && >> 1036 uid_eq(cred->uid, fc->user_id) && >> 1037 gid_eq(cred->egid, fc->group_id) && >> 1038 gid_eq(cred->sgid, fc->group_id) && >> 1039 gid_eq(cred->gid, fc->group_id)) >> 1040 return 1; 1452 1041 1453 return allow; !! 1042 return 0; 1454 } 1043 } 1455 1044 1456 static int fuse_access(struct inode *inode, i 1045 static int fuse_access(struct inode *inode, int mask) 1457 { 1046 { 1458 struct fuse_mount *fm = get_fuse_moun !! 1047 struct fuse_conn *fc = get_fuse_conn(inode); 1459 FUSE_ARGS(args); 1048 FUSE_ARGS(args); 1460 struct fuse_access_in inarg; 1049 struct fuse_access_in inarg; 1461 int err; 1050 int err; 1462 1051 1463 BUG_ON(mask & MAY_NOT_BLOCK); 1052 BUG_ON(mask & MAY_NOT_BLOCK); 1464 1053 1465 if (fm->fc->no_access) !! 1054 if (fc->no_access) 1466 return 0; 1055 return 0; 1467 1056 1468 memset(&inarg, 0, sizeof(inarg)); 1057 memset(&inarg, 0, sizeof(inarg)); 1469 inarg.mask = mask & (MAY_READ | MAY_W 1058 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1470 args.opcode = FUSE_ACCESS; !! 1059 args.in.h.opcode = FUSE_ACCESS; 1471 args.nodeid = get_node_id(inode); !! 1060 args.in.h.nodeid = get_node_id(inode); 1472 args.in_numargs = 1; !! 1061 args.in.numargs = 1; 1473 args.in_args[0].size = sizeof(inarg); !! 1062 args.in.args[0].size = sizeof(inarg); 1474 args.in_args[0].value = &inarg; !! 1063 args.in.args[0].value = &inarg; 1475 err = fuse_simple_request(fm, &args); !! 1064 err = fuse_simple_request(fc, &args); 1476 if (err == -ENOSYS) { 1065 if (err == -ENOSYS) { 1477 fm->fc->no_access = 1; !! 1066 fc->no_access = 1; 1478 err = 0; 1067 err = 0; 1479 } 1068 } 1480 return err; 1069 return err; 1481 } 1070 } 1482 1071 1483 static int fuse_perm_getattr(struct inode *in 1072 static int fuse_perm_getattr(struct inode *inode, int mask) 1484 { 1073 { 1485 if (mask & MAY_NOT_BLOCK) 1074 if (mask & MAY_NOT_BLOCK) 1486 return -ECHILD; 1075 return -ECHILD; 1487 1076 1488 forget_all_cached_acls(inode); 1077 forget_all_cached_acls(inode); 1489 return fuse_do_getattr(inode, NULL, N 1078 return fuse_do_getattr(inode, NULL, NULL); 1490 } 1079 } 1491 1080 1492 /* 1081 /* 1493 * Check permission. The two basic access mo 1082 * Check permission. The two basic access models of FUSE are: 1494 * 1083 * 1495 * 1) Local access checking ('default_permiss 1084 * 1) Local access checking ('default_permissions' mount option) based 1496 * on file mode. This is the plain old disk 1085 * on file mode. This is the plain old disk filesystem permission 1497 * model. !! 1086 * modell. 1498 * 1087 * 1499 * 2) "Remote" access checking, where server 1088 * 2) "Remote" access checking, where server is responsible for 1500 * checking permission in each inode operatio 1089 * checking permission in each inode operation. An exception to this 1501 * is if ->permission() was invoked from sys_ 1090 * is if ->permission() was invoked from sys_access() in which case an 1502 * access request is sent. Execute permissio 1091 * access request is sent. Execute permission is still checked 1503 * locally based on file mode. 1092 * locally based on file mode. 1504 */ 1093 */ 1505 static int fuse_permission(struct mnt_idmap * !! 1094 static int fuse_permission(struct inode *inode, int mask) 1506 struct inode *inod << 1507 { 1095 { 1508 struct fuse_conn *fc = get_fuse_conn( 1096 struct fuse_conn *fc = get_fuse_conn(inode); 1509 bool refreshed = false; 1097 bool refreshed = false; 1510 int err = 0; 1098 int err = 0; 1511 1099 1512 if (fuse_is_bad(inode)) << 1513 return -EIO; << 1514 << 1515 if (!fuse_allow_current_process(fc)) 1100 if (!fuse_allow_current_process(fc)) 1516 return -EACCES; 1101 return -EACCES; 1517 1102 1518 /* 1103 /* 1519 * If attributes are needed, refresh 1104 * If attributes are needed, refresh them before proceeding 1520 */ 1105 */ 1521 if (fc->default_permissions || 1106 if (fc->default_permissions || 1522 ((mask & MAY_EXEC) && S_ISREG(ino 1107 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1523 struct fuse_inode *fi = get_f 1108 struct fuse_inode *fi = get_fuse_inode(inode); 1524 u32 perm_mask = STATX_MODE | 1109 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1525 1110 1526 if (perm_mask & READ_ONCE(fi- 1111 if (perm_mask & READ_ONCE(fi->inval_mask) || 1527 time_before64(fi->i_time, 1112 time_before64(fi->i_time, get_jiffies_64())) { 1528 refreshed = true; 1113 refreshed = true; 1529 1114 1530 err = fuse_perm_getat 1115 err = fuse_perm_getattr(inode, mask); 1531 if (err) 1116 if (err) 1532 return err; 1117 return err; 1533 } 1118 } 1534 } 1119 } 1535 1120 1536 if (fc->default_permissions) { 1121 if (fc->default_permissions) { 1537 err = generic_permission(&nop !! 1122 err = generic_permission(inode, mask); 1538 1123 1539 /* If permission is denied, t 1124 /* If permission is denied, try to refresh file 1540 attributes. This is also 1125 attributes. This is also needed, because the root 1541 node will at first have no 1126 node will at first have no permissions */ 1542 if (err == -EACCES && !refres 1127 if (err == -EACCES && !refreshed) { 1543 err = fuse_perm_getat 1128 err = fuse_perm_getattr(inode, mask); 1544 if (!err) 1129 if (!err) 1545 err = generic !! 1130 err = generic_permission(inode, mask); 1546 << 1547 } 1131 } 1548 1132 1549 /* Note: the opposite of the 1133 /* Note: the opposite of the above test does not 1550 exist. So if permissions 1134 exist. So if permissions are revoked this won't be 1551 noticed immediately, only 1135 noticed immediately, only after the attribute 1552 timeout has expired */ 1136 timeout has expired */ 1553 } else if (mask & (MAY_ACCESS | MAY_C 1137 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1554 err = fuse_access(inode, mask 1138 err = fuse_access(inode, mask); 1555 } else if ((mask & MAY_EXEC) && S_ISR 1139 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1556 if (!(inode->i_mode & S_IXUGO 1140 if (!(inode->i_mode & S_IXUGO)) { 1557 if (refreshed) 1141 if (refreshed) 1558 return -EACCE 1142 return -EACCES; 1559 1143 1560 err = fuse_perm_getat 1144 err = fuse_perm_getattr(inode, mask); 1561 if (!err && !(inode-> 1145 if (!err && !(inode->i_mode & S_IXUGO)) 1562 return -EACCE 1146 return -EACCES; 1563 } 1147 } 1564 } 1148 } 1565 return err; 1149 return err; 1566 } 1150 } 1567 1151 1568 static int fuse_readlink_page(struct inode *i 1152 static int fuse_readlink_page(struct inode *inode, struct page *page) 1569 { 1153 { 1570 struct fuse_mount *fm = get_fuse_moun !! 1154 struct fuse_conn *fc = get_fuse_conn(inode); 1571 struct fuse_page_desc desc = { .lengt !! 1155 struct fuse_req *req; 1572 struct fuse_args_pages ap = { !! 1156 int err; 1573 .num_pages = 1, << 1574 .pages = &page, << 1575 .descs = &desc, << 1576 }; << 1577 char *link; << 1578 ssize_t res; << 1579 << 1580 ap.args.opcode = FUSE_READLINK; << 1581 ap.args.nodeid = get_node_id(inode); << 1582 ap.args.out_pages = true; << 1583 ap.args.out_argvar = true; << 1584 ap.args.page_zeroing = true; << 1585 ap.args.out_numargs = 1; << 1586 ap.args.out_args[0].size = desc.lengt << 1587 res = fuse_simple_request(fm, &ap.arg << 1588 1157 1589 fuse_invalidate_atime(inode); !! 1158 req = fuse_get_req(fc, 1); >> 1159 if (IS_ERR(req)) >> 1160 return PTR_ERR(req); >> 1161 >> 1162 req->out.page_zeroing = 1; >> 1163 req->out.argpages = 1; >> 1164 req->num_pages = 1; >> 1165 req->pages[0] = page; >> 1166 req->page_descs[0].length = PAGE_SIZE - 1; >> 1167 req->in.h.opcode = FUSE_READLINK; >> 1168 req->in.h.nodeid = get_node_id(inode); >> 1169 req->out.argvar = 1; >> 1170 req->out.numargs = 1; >> 1171 req->out.args[0].size = PAGE_SIZE - 1; >> 1172 fuse_request_send(fc, req); >> 1173 err = req->out.h.error; 1590 1174 1591 if (res < 0) !! 1175 if (!err) { 1592 return res; !! 1176 char *link = page_address(page); >> 1177 size_t len = req->out.args[0].size; 1593 1178 1594 if (WARN_ON(res >= PAGE_SIZE)) !! 1179 BUG_ON(len >= PAGE_SIZE); 1595 return -EIO; !! 1180 link[len] = '\0'; >> 1181 } 1596 1182 1597 link = page_address(page); !! 1183 fuse_put_request(fc, req); 1598 link[res] = '\0'; !! 1184 fuse_invalidate_atime(inode); 1599 1185 1600 return 0; !! 1186 return err; 1601 } 1187 } 1602 1188 1603 static const char *fuse_get_link(struct dentr 1189 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1604 struct delay 1190 struct delayed_call *callback) 1605 { 1191 { 1606 struct fuse_conn *fc = get_fuse_conn( 1192 struct fuse_conn *fc = get_fuse_conn(inode); 1607 struct page *page; 1193 struct page *page; 1608 int err; 1194 int err; 1609 1195 1610 err = -EIO; 1196 err = -EIO; 1611 if (fuse_is_bad(inode)) !! 1197 if (is_bad_inode(inode)) 1612 goto out_err; 1198 goto out_err; 1613 1199 1614 if (fc->cache_symlinks) 1200 if (fc->cache_symlinks) 1615 return page_get_link(dentry, 1201 return page_get_link(dentry, inode, callback); 1616 1202 1617 err = -ECHILD; 1203 err = -ECHILD; 1618 if (!dentry) 1204 if (!dentry) 1619 goto out_err; 1205 goto out_err; 1620 1206 1621 page = alloc_page(GFP_KERNEL); 1207 page = alloc_page(GFP_KERNEL); 1622 err = -ENOMEM; 1208 err = -ENOMEM; 1623 if (!page) 1209 if (!page) 1624 goto out_err; 1210 goto out_err; 1625 1211 1626 err = fuse_readlink_page(inode, page) 1212 err = fuse_readlink_page(inode, page); 1627 if (err) { 1213 if (err) { 1628 __free_page(page); 1214 __free_page(page); 1629 goto out_err; 1215 goto out_err; 1630 } 1216 } 1631 1217 1632 set_delayed_call(callback, page_put_l 1218 set_delayed_call(callback, page_put_link, page); 1633 1219 1634 return page_address(page); 1220 return page_address(page); 1635 1221 1636 out_err: 1222 out_err: 1637 return ERR_PTR(err); 1223 return ERR_PTR(err); 1638 } 1224 } 1639 1225 1640 static int fuse_dir_open(struct inode *inode, 1226 static int fuse_dir_open(struct inode *inode, struct file *file) 1641 { 1227 { 1642 struct fuse_mount *fm = get_fuse_moun !! 1228 return fuse_open_common(inode, file, true); 1643 int err; << 1644 << 1645 if (fuse_is_bad(inode)) << 1646 return -EIO; << 1647 << 1648 err = generic_file_open(inode, file); << 1649 if (err) << 1650 return err; << 1651 << 1652 err = fuse_do_open(fm, get_node_id(in << 1653 if (!err) { << 1654 struct fuse_file *ff = file-> << 1655 << 1656 /* << 1657 * Keep handling FOPEN_STREAM << 1658 * directories for backward c << 1659 * to be useful. << 1660 */ << 1661 if (ff->open_flags & (FOPEN_S << 1662 nonseekable_open(inod << 1663 } << 1664 << 1665 return err; << 1666 } 1229 } 1667 1230 1668 static int fuse_dir_release(struct inode *ino 1231 static int fuse_dir_release(struct inode *inode, struct file *file) 1669 { 1232 { 1670 fuse_release_common(file, true); 1233 fuse_release_common(file, true); 1671 1234 1672 return 0; 1235 return 0; 1673 } 1236 } 1674 1237 1675 static int fuse_dir_fsync(struct file *file, 1238 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1676 int datasync) 1239 int datasync) 1677 { 1240 { 1678 struct inode *inode = file->f_mapping 1241 struct inode *inode = file->f_mapping->host; 1679 struct fuse_conn *fc = get_fuse_conn( 1242 struct fuse_conn *fc = get_fuse_conn(inode); 1680 int err; 1243 int err; 1681 1244 1682 if (fuse_is_bad(inode)) !! 1245 if (is_bad_inode(inode)) 1683 return -EIO; 1246 return -EIO; 1684 1247 1685 if (fc->no_fsyncdir) 1248 if (fc->no_fsyncdir) 1686 return 0; 1249 return 0; 1687 1250 1688 inode_lock(inode); 1251 inode_lock(inode); 1689 err = fuse_fsync_common(file, start, 1252 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1690 if (err == -ENOSYS) { 1253 if (err == -ENOSYS) { 1691 fc->no_fsyncdir = 1; 1254 fc->no_fsyncdir = 1; 1692 err = 0; 1255 err = 0; 1693 } 1256 } 1694 inode_unlock(inode); 1257 inode_unlock(inode); 1695 1258 1696 return err; 1259 return err; 1697 } 1260 } 1698 1261 1699 static long fuse_dir_ioctl(struct file *file, 1262 static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1700 unsigned long arg 1263 unsigned long arg) 1701 { 1264 { 1702 struct fuse_conn *fc = get_fuse_conn( 1265 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1703 1266 1704 /* FUSE_IOCTL_DIR only supported for 1267 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1705 if (fc->minor < 18) 1268 if (fc->minor < 18) 1706 return -ENOTTY; 1269 return -ENOTTY; 1707 1270 1708 return fuse_ioctl_common(file, cmd, a 1271 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1709 } 1272 } 1710 1273 1711 static long fuse_dir_compat_ioctl(struct file 1274 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1712 unsigned l 1275 unsigned long arg) 1713 { 1276 { 1714 struct fuse_conn *fc = get_fuse_conn( 1277 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1715 1278 1716 if (fc->minor < 18) 1279 if (fc->minor < 18) 1717 return -ENOTTY; 1280 return -ENOTTY; 1718 1281 1719 return fuse_ioctl_common(file, cmd, a 1282 return fuse_ioctl_common(file, cmd, arg, 1720 FUSE_IOCTL_C 1283 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1721 } 1284 } 1722 1285 1723 static bool update_mtime(unsigned ivalid, boo 1286 static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1724 { 1287 { 1725 /* Always update if mtime is explicit 1288 /* Always update if mtime is explicitly set */ 1726 if (ivalid & ATTR_MTIME_SET) 1289 if (ivalid & ATTR_MTIME_SET) 1727 return true; 1290 return true; 1728 1291 1729 /* Or if kernel i_mtime is the offici 1292 /* Or if kernel i_mtime is the official one */ 1730 if (trust_local_mtime) 1293 if (trust_local_mtime) 1731 return true; 1294 return true; 1732 1295 1733 /* If it's an open(O_TRUNC) or an ftr 1296 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1734 if ((ivalid & ATTR_SIZE) && (ivalid & 1297 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1735 return false; 1298 return false; 1736 1299 1737 /* In all other cases update */ 1300 /* In all other cases update */ 1738 return true; 1301 return true; 1739 } 1302 } 1740 1303 1741 static void iattr_to_fattr(struct fuse_conn * 1304 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1742 struct fuse_setatt 1305 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1743 { 1306 { 1744 unsigned ivalid = iattr->ia_valid; 1307 unsigned ivalid = iattr->ia_valid; 1745 1308 1746 if (ivalid & ATTR_MODE) 1309 if (ivalid & ATTR_MODE) 1747 arg->valid |= FATTR_MODE, a 1310 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1748 if (ivalid & ATTR_UID) 1311 if (ivalid & ATTR_UID) 1749 arg->valid |= FATTR_UID, a 1312 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1750 if (ivalid & ATTR_GID) 1313 if (ivalid & ATTR_GID) 1751 arg->valid |= FATTR_GID, a 1314 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1752 if (ivalid & ATTR_SIZE) 1315 if (ivalid & ATTR_SIZE) 1753 arg->valid |= FATTR_SIZE, a 1316 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1754 if (ivalid & ATTR_ATIME) { 1317 if (ivalid & ATTR_ATIME) { 1755 arg->valid |= FATTR_ATIME; 1318 arg->valid |= FATTR_ATIME; 1756 arg->atime = iattr->ia_atime. 1319 arg->atime = iattr->ia_atime.tv_sec; 1757 arg->atimensec = iattr->ia_at 1320 arg->atimensec = iattr->ia_atime.tv_nsec; 1758 if (!(ivalid & ATTR_ATIME_SET 1321 if (!(ivalid & ATTR_ATIME_SET)) 1759 arg->valid |= FATTR_A 1322 arg->valid |= FATTR_ATIME_NOW; 1760 } 1323 } 1761 if ((ivalid & ATTR_MTIME) && update_m 1324 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1762 arg->valid |= FATTR_MTIME; 1325 arg->valid |= FATTR_MTIME; 1763 arg->mtime = iattr->ia_mtime. 1326 arg->mtime = iattr->ia_mtime.tv_sec; 1764 arg->mtimensec = iattr->ia_mt 1327 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1765 if (!(ivalid & ATTR_MTIME_SET 1328 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1766 arg->valid |= FATTR_M 1329 arg->valid |= FATTR_MTIME_NOW; 1767 } 1330 } 1768 if ((ivalid & ATTR_CTIME) && trust_lo 1331 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1769 arg->valid |= FATTR_CTIME; 1332 arg->valid |= FATTR_CTIME; 1770 arg->ctime = iattr->ia_ctime. 1333 arg->ctime = iattr->ia_ctime.tv_sec; 1771 arg->ctimensec = iattr->ia_ct 1334 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1772 } 1335 } 1773 } 1336 } 1774 1337 1775 /* 1338 /* 1776 * Prevent concurrent writepages on inode 1339 * Prevent concurrent writepages on inode 1777 * 1340 * 1778 * This is done by adding a negative bias to 1341 * This is done by adding a negative bias to the inode write counter 1779 * and waiting for all pending writes to fini 1342 * and waiting for all pending writes to finish. 1780 */ 1343 */ 1781 void fuse_set_nowrite(struct inode *inode) 1344 void fuse_set_nowrite(struct inode *inode) 1782 { 1345 { 1783 struct fuse_inode *fi = get_fuse_inod 1346 struct fuse_inode *fi = get_fuse_inode(inode); 1784 1347 1785 BUG_ON(!inode_is_locked(inode)); 1348 BUG_ON(!inode_is_locked(inode)); 1786 1349 1787 spin_lock(&fi->lock); 1350 spin_lock(&fi->lock); 1788 BUG_ON(fi->writectr < 0); 1351 BUG_ON(fi->writectr < 0); 1789 fi->writectr += FUSE_NOWRITE; 1352 fi->writectr += FUSE_NOWRITE; 1790 spin_unlock(&fi->lock); 1353 spin_unlock(&fi->lock); 1791 wait_event(fi->page_waitq, fi->writec 1354 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1792 } 1355 } 1793 1356 1794 /* 1357 /* 1795 * Allow writepages on inode 1358 * Allow writepages on inode 1796 * 1359 * 1797 * Remove the bias from the writecounter and 1360 * Remove the bias from the writecounter and send any queued 1798 * writepages. 1361 * writepages. 1799 */ 1362 */ 1800 static void __fuse_release_nowrite(struct ino 1363 static void __fuse_release_nowrite(struct inode *inode) 1801 { 1364 { 1802 struct fuse_inode *fi = get_fuse_inod 1365 struct fuse_inode *fi = get_fuse_inode(inode); 1803 1366 1804 BUG_ON(fi->writectr != FUSE_NOWRITE); 1367 BUG_ON(fi->writectr != FUSE_NOWRITE); 1805 fi->writectr = 0; 1368 fi->writectr = 0; 1806 fuse_flush_writepages(inode); 1369 fuse_flush_writepages(inode); 1807 } 1370 } 1808 1371 1809 void fuse_release_nowrite(struct inode *inode 1372 void fuse_release_nowrite(struct inode *inode) 1810 { 1373 { 1811 struct fuse_inode *fi = get_fuse_inod 1374 struct fuse_inode *fi = get_fuse_inode(inode); 1812 1375 1813 spin_lock(&fi->lock); 1376 spin_lock(&fi->lock); 1814 __fuse_release_nowrite(inode); 1377 __fuse_release_nowrite(inode); 1815 spin_unlock(&fi->lock); 1378 spin_unlock(&fi->lock); 1816 } 1379 } 1817 1380 1818 static void fuse_setattr_fill(struct fuse_con 1381 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1819 struct inode *i 1382 struct inode *inode, 1820 struct fuse_set 1383 struct fuse_setattr_in *inarg_p, 1821 struct fuse_att 1384 struct fuse_attr_out *outarg_p) 1822 { 1385 { 1823 args->opcode = FUSE_SETATTR; !! 1386 args->in.h.opcode = FUSE_SETATTR; 1824 args->nodeid = get_node_id(inode); !! 1387 args->in.h.nodeid = get_node_id(inode); 1825 args->in_numargs = 1; !! 1388 args->in.numargs = 1; 1826 args->in_args[0].size = sizeof(*inarg !! 1389 args->in.args[0].size = sizeof(*inarg_p); 1827 args->in_args[0].value = inarg_p; !! 1390 args->in.args[0].value = inarg_p; 1828 args->out_numargs = 1; !! 1391 args->out.numargs = 1; 1829 args->out_args[0].size = sizeof(*outa !! 1392 args->out.args[0].size = sizeof(*outarg_p); 1830 args->out_args[0].value = outarg_p; !! 1393 args->out.args[0].value = outarg_p; 1831 } 1394 } 1832 1395 1833 /* 1396 /* 1834 * Flush inode->i_mtime to the server 1397 * Flush inode->i_mtime to the server 1835 */ 1398 */ 1836 int fuse_flush_times(struct inode *inode, str 1399 int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1837 { 1400 { 1838 struct fuse_mount *fm = get_fuse_moun !! 1401 struct fuse_conn *fc = get_fuse_conn(inode); 1839 FUSE_ARGS(args); 1402 FUSE_ARGS(args); 1840 struct fuse_setattr_in inarg; 1403 struct fuse_setattr_in inarg; 1841 struct fuse_attr_out outarg; 1404 struct fuse_attr_out outarg; 1842 1405 1843 memset(&inarg, 0, sizeof(inarg)); 1406 memset(&inarg, 0, sizeof(inarg)); 1844 memset(&outarg, 0, sizeof(outarg)); 1407 memset(&outarg, 0, sizeof(outarg)); 1845 1408 1846 inarg.valid = FATTR_MTIME; 1409 inarg.valid = FATTR_MTIME; 1847 inarg.mtime = inode_get_mtime_sec(ino !! 1410 inarg.mtime = inode->i_mtime.tv_sec; 1848 inarg.mtimensec = inode_get_mtime_nse !! 1411 inarg.mtimensec = inode->i_mtime.tv_nsec; 1849 if (fm->fc->minor >= 23) { !! 1412 if (fc->minor >= 23) { 1850 inarg.valid |= FATTR_CTIME; 1413 inarg.valid |= FATTR_CTIME; 1851 inarg.ctime = inode_get_ctime !! 1414 inarg.ctime = inode->i_ctime.tv_sec; 1852 inarg.ctimensec = inode_get_c !! 1415 inarg.ctimensec = inode->i_ctime.tv_nsec; 1853 } 1416 } 1854 if (ff) { 1417 if (ff) { 1855 inarg.valid |= FATTR_FH; 1418 inarg.valid |= FATTR_FH; 1856 inarg.fh = ff->fh; 1419 inarg.fh = ff->fh; 1857 } 1420 } 1858 fuse_setattr_fill(fm->fc, &args, inod !! 1421 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1859 1422 1860 return fuse_simple_request(fm, &args) !! 1423 return fuse_simple_request(fc, &args); 1861 } 1424 } 1862 1425 1863 /* 1426 /* 1864 * Set attributes, and at the same time refre 1427 * Set attributes, and at the same time refresh them. 1865 * 1428 * 1866 * Truncation is slightly complicated, becaus 1429 * Truncation is slightly complicated, because the 'truncate' request 1867 * may fail, in which case we don't want to t 1430 * may fail, in which case we don't want to touch the mapping. 1868 * vmtruncate() doesn't allow for this case, 1431 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1869 * and the actual truncation by hand. 1432 * and the actual truncation by hand. 1870 */ 1433 */ 1871 int fuse_do_setattr(struct dentry *dentry, st 1434 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1872 struct file *file) 1435 struct file *file) 1873 { 1436 { 1874 struct inode *inode = d_inode(dentry) 1437 struct inode *inode = d_inode(dentry); 1875 struct fuse_mount *fm = get_fuse_moun !! 1438 struct fuse_conn *fc = get_fuse_conn(inode); 1876 struct fuse_conn *fc = fm->fc; << 1877 struct fuse_inode *fi = get_fuse_inod 1439 struct fuse_inode *fi = get_fuse_inode(inode); 1878 struct address_space *mapping = inode << 1879 FUSE_ARGS(args); 1440 FUSE_ARGS(args); 1880 struct fuse_setattr_in inarg; 1441 struct fuse_setattr_in inarg; 1881 struct fuse_attr_out outarg; 1442 struct fuse_attr_out outarg; 1882 bool is_truncate = false; 1443 bool is_truncate = false; 1883 bool is_wb = fc->writeback_cache && S !! 1444 bool is_wb = fc->writeback_cache; 1884 loff_t oldsize; 1445 loff_t oldsize; 1885 int err; 1446 int err; 1886 bool trust_local_cmtime = is_wb; !! 1447 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode); 1887 bool fault_blocked = false; << 1888 1448 1889 if (!fc->default_permissions) 1449 if (!fc->default_permissions) 1890 attr->ia_valid |= ATTR_FORCE; 1450 attr->ia_valid |= ATTR_FORCE; 1891 1451 1892 err = setattr_prepare(&nop_mnt_idmap, !! 1452 err = setattr_prepare(dentry, attr); 1893 if (err) 1453 if (err) 1894 return err; 1454 return err; 1895 1455 1896 if (attr->ia_valid & ATTR_SIZE) { << 1897 if (WARN_ON(!S_ISREG(inode->i << 1898 return -EIO; << 1899 is_truncate = true; << 1900 } << 1901 << 1902 if (FUSE_IS_DAX(inode) && is_truncate << 1903 filemap_invalidate_lock(mappi << 1904 fault_blocked = true; << 1905 err = fuse_dax_break_layouts( << 1906 if (err) { << 1907 filemap_invalidate_un << 1908 return err; << 1909 } << 1910 } << 1911 << 1912 if (attr->ia_valid & ATTR_OPEN) { 1456 if (attr->ia_valid & ATTR_OPEN) { 1913 /* This is coming from open(. 1457 /* This is coming from open(..., ... | O_TRUNC); */ 1914 WARN_ON(!(attr->ia_valid & AT 1458 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1915 WARN_ON(attr->ia_size != 0); 1459 WARN_ON(attr->ia_size != 0); 1916 if (fc->atomic_o_trunc) { 1460 if (fc->atomic_o_trunc) { 1917 /* 1461 /* 1918 * No need to send re 1462 * No need to send request to userspace, since actual 1919 * truncation has alr 1463 * truncation has already been done by OPEN. But still 1920 * need to truncate p 1464 * need to truncate page cache. 1921 */ 1465 */ 1922 i_size_write(inode, 0 1466 i_size_write(inode, 0); 1923 truncate_pagecache(in 1467 truncate_pagecache(inode, 0); 1924 goto out; !! 1468 return 0; 1925 } 1469 } 1926 file = NULL; 1470 file = NULL; 1927 } 1471 } 1928 1472 1929 /* Flush dirty data/metadata before n !! 1473 if (attr->ia_valid & ATTR_SIZE) { 1930 if (is_wb && !! 1474 if (WARN_ON(!S_ISREG(inode->i_mode))) 1931 attr->ia_valid & !! 1475 return -EIO; 1932 (ATTR_MODE | ATTR_UID !! 1476 is_truncate = true; 1933 ATTR_TIMES_SET)) { << 1934 err = write_inode_now(inode, << 1935 if (err) << 1936 return err; << 1937 << 1938 fuse_set_nowrite(inode); << 1939 fuse_release_nowrite(inode); << 1940 } 1477 } 1941 1478 1942 if (is_truncate) { 1479 if (is_truncate) { 1943 fuse_set_nowrite(inode); 1480 fuse_set_nowrite(inode); 1944 set_bit(FUSE_I_SIZE_UNSTABLE, 1481 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1945 if (trust_local_cmtime && att 1482 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1946 attr->ia_valid |= ATT 1483 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1947 } 1484 } 1948 1485 1949 memset(&inarg, 0, sizeof(inarg)); 1486 memset(&inarg, 0, sizeof(inarg)); 1950 memset(&outarg, 0, sizeof(outarg)); 1487 memset(&outarg, 0, sizeof(outarg)); 1951 iattr_to_fattr(fc, attr, &inarg, trus 1488 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1952 if (file) { 1489 if (file) { 1953 struct fuse_file *ff = file-> 1490 struct fuse_file *ff = file->private_data; 1954 inarg.valid |= FATTR_FH; 1491 inarg.valid |= FATTR_FH; 1955 inarg.fh = ff->fh; 1492 inarg.fh = ff->fh; 1956 } 1493 } 1957 << 1958 /* Kill suid/sgid for non-directory c << 1959 if (fc->handle_killpriv_v2 && !S_ISDI << 1960 attr->ia_valid & (ATTR_UID | ATTR << 1961 inarg.valid |= FATTR_KILL_SUI << 1962 << 1963 if (attr->ia_valid & ATTR_SIZE) { 1494 if (attr->ia_valid & ATTR_SIZE) { 1964 /* For mandatory locking in t 1495 /* For mandatory locking in truncate */ 1965 inarg.valid |= FATTR_LOCKOWNE 1496 inarg.valid |= FATTR_LOCKOWNER; 1966 inarg.lock_owner = fuse_lock_ 1497 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1967 << 1968 /* Kill suid/sgid for truncat << 1969 if (fc->handle_killpriv_v2 && << 1970 inarg.valid |= FATTR_ << 1971 } 1498 } 1972 fuse_setattr_fill(fc, &args, inode, & 1499 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1973 err = fuse_simple_request(fm, &args); !! 1500 err = fuse_simple_request(fc, &args); 1974 if (err) { 1501 if (err) { 1975 if (err == -EINTR) 1502 if (err == -EINTR) 1976 fuse_invalidate_attr( 1503 fuse_invalidate_attr(inode); 1977 goto error; 1504 goto error; 1978 } 1505 } 1979 1506 1980 if (fuse_invalid_attr(&outarg.attr) | !! 1507 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) { 1981 inode_wrong_type(inode, outarg.at !! 1508 make_bad_inode(inode); 1982 fuse_make_bad(inode); << 1983 err = -EIO; 1509 err = -EIO; 1984 goto error; 1510 goto error; 1985 } 1511 } 1986 1512 1987 spin_lock(&fi->lock); 1513 spin_lock(&fi->lock); 1988 /* the kernel maintains i_mtime local 1514 /* the kernel maintains i_mtime locally */ 1989 if (trust_local_cmtime) { 1515 if (trust_local_cmtime) { 1990 if (attr->ia_valid & ATTR_MTI 1516 if (attr->ia_valid & ATTR_MTIME) 1991 inode_set_mtime_to_ts !! 1517 inode->i_mtime = attr->ia_mtime; 1992 if (attr->ia_valid & ATTR_CTI 1518 if (attr->ia_valid & ATTR_CTIME) 1993 inode_set_ctime_to_ts !! 1519 inode->i_ctime = attr->ia_ctime; 1994 /* FIXME: clear I_DIRTY_SYNC? 1520 /* FIXME: clear I_DIRTY_SYNC? */ 1995 } 1521 } 1996 1522 1997 fuse_change_attributes_common(inode, !! 1523 fuse_change_attributes_common(inode, &outarg.attr, 1998 ATTR_TI !! 1524 attr_timeout(&outarg)); 1999 fuse_ge << 2000 oldsize = inode->i_size; 1525 oldsize = inode->i_size; 2001 /* see the comment in fuse_change_att 1526 /* see the comment in fuse_change_attributes() */ 2002 if (!is_wb || is_truncate) !! 1527 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode)) 2003 i_size_write(inode, outarg.at 1528 i_size_write(inode, outarg.attr.size); 2004 1529 2005 if (is_truncate) { 1530 if (is_truncate) { 2006 /* NOTE: this may release/rea 1531 /* NOTE: this may release/reacquire fi->lock */ 2007 __fuse_release_nowrite(inode) 1532 __fuse_release_nowrite(inode); 2008 } 1533 } 2009 spin_unlock(&fi->lock); 1534 spin_unlock(&fi->lock); 2010 1535 2011 /* 1536 /* 2012 * Only call invalidate_inode_pages2( 1537 * Only call invalidate_inode_pages2() after removing 2013 * FUSE_NOWRITE, otherwise fuse_laund !! 1538 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock. 2014 */ 1539 */ 2015 if ((is_truncate || !is_wb) && 1540 if ((is_truncate || !is_wb) && 2016 S_ISREG(inode->i_mode) && oldsize 1541 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 2017 truncate_pagecache(inode, out 1542 truncate_pagecache(inode, outarg.attr.size); 2018 invalidate_inode_pages2(mappi !! 1543 invalidate_inode_pages2(inode->i_mapping); 2019 } 1544 } 2020 1545 2021 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi-> 1546 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 2022 out: << 2023 if (fault_blocked) << 2024 filemap_invalidate_unlock(map << 2025 << 2026 return 0; 1547 return 0; 2027 1548 2028 error: 1549 error: 2029 if (is_truncate) 1550 if (is_truncate) 2030 fuse_release_nowrite(inode); 1551 fuse_release_nowrite(inode); 2031 1552 2032 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi-> 1553 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 2033 << 2034 if (fault_blocked) << 2035 filemap_invalidate_unlock(map << 2036 return err; 1554 return err; 2037 } 1555 } 2038 1556 2039 static int fuse_setattr(struct mnt_idmap *idm !! 1557 static int fuse_setattr(struct dentry *entry, struct iattr *attr) 2040 struct iattr *attr) << 2041 { 1558 { 2042 struct inode *inode = d_inode(entry); 1559 struct inode *inode = d_inode(entry); 2043 struct fuse_conn *fc = get_fuse_conn( 1560 struct fuse_conn *fc = get_fuse_conn(inode); 2044 struct file *file = (attr->ia_valid & 1561 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 2045 int ret; 1562 int ret; 2046 1563 2047 if (fuse_is_bad(inode)) << 2048 return -EIO; << 2049 << 2050 if (!fuse_allow_current_process(get_f 1564 if (!fuse_allow_current_process(get_fuse_conn(inode))) 2051 return -EACCES; 1565 return -EACCES; 2052 1566 2053 if (attr->ia_valid & (ATTR_KILL_SUID 1567 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 2054 attr->ia_valid &= ~(ATTR_KILL 1568 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 2055 ATTR_MODE 1569 ATTR_MODE); 2056 1570 2057 /* 1571 /* 2058 * The only sane way to relia 1572 * The only sane way to reliably kill suid/sgid is to do it in 2059 * the userspace filesystem 1573 * the userspace filesystem 2060 * 1574 * 2061 * This should be done on wri 1575 * This should be done on write(), truncate() and chown(). 2062 */ 1576 */ 2063 if (!fc->handle_killpriv && ! !! 1577 if (!fc->handle_killpriv) { 2064 /* 1578 /* 2065 * ia_mode calculatio 1579 * ia_mode calculation may have used stale i_mode. 2066 * Refresh and recalc 1580 * Refresh and recalculate. 2067 */ 1581 */ 2068 ret = fuse_do_getattr 1582 ret = fuse_do_getattr(inode, NULL, file); 2069 if (ret) 1583 if (ret) 2070 return ret; 1584 return ret; 2071 1585 2072 attr->ia_mode = inode 1586 attr->ia_mode = inode->i_mode; 2073 if (inode->i_mode & S 1587 if (inode->i_mode & S_ISUID) { 2074 attr->ia_vali 1588 attr->ia_valid |= ATTR_MODE; 2075 attr->ia_mode 1589 attr->ia_mode &= ~S_ISUID; 2076 } 1590 } 2077 if ((inode->i_mode & 1591 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 2078 attr->ia_vali 1592 attr->ia_valid |= ATTR_MODE; 2079 attr->ia_mode 1593 attr->ia_mode &= ~S_ISGID; 2080 } 1594 } 2081 } 1595 } 2082 } 1596 } 2083 if (!attr->ia_valid) 1597 if (!attr->ia_valid) 2084 return 0; 1598 return 0; 2085 1599 2086 ret = fuse_do_setattr(entry, attr, fi 1600 ret = fuse_do_setattr(entry, attr, file); 2087 if (!ret) { 1601 if (!ret) { 2088 /* 1602 /* 2089 * If filesystem supports acl 1603 * If filesystem supports acls it may have updated acl xattrs in 2090 * the filesystem, so forget 1604 * the filesystem, so forget cached acls for the inode. 2091 */ 1605 */ 2092 if (fc->posix_acl) 1606 if (fc->posix_acl) 2093 forget_all_cached_acl 1607 forget_all_cached_acls(inode); 2094 1608 2095 /* Directory mode changed, ma 1609 /* Directory mode changed, may need to revalidate access */ 2096 if (d_is_dir(entry) && (attr- 1610 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 2097 fuse_invalidate_entry 1611 fuse_invalidate_entry_cache(entry); 2098 } 1612 } 2099 return ret; 1613 return ret; 2100 } 1614 } 2101 1615 2102 static int fuse_getattr(struct mnt_idmap *idm !! 1616 static int fuse_getattr(const struct path *path, struct kstat *stat, 2103 const struct path *pa << 2104 u32 request_mask, uns 1617 u32 request_mask, unsigned int flags) 2105 { 1618 { 2106 struct inode *inode = d_inode(path->d 1619 struct inode *inode = d_inode(path->dentry); 2107 struct fuse_conn *fc = get_fuse_conn( 1620 struct fuse_conn *fc = get_fuse_conn(inode); 2108 1621 2109 if (fuse_is_bad(inode)) !! 1622 if (!fuse_allow_current_process(fc)) 2110 return -EIO; << 2111 << 2112 if (!fuse_allow_current_process(fc)) << 2113 if (!request_mask) { << 2114 /* << 2115 * If user explicitly << 2116 * error out, but ret << 2117 */ << 2118 stat->result_mask = 0 << 2119 stat->dev = inode->i_ << 2120 return 0; << 2121 } << 2122 return -EACCES; 1623 return -EACCES; 2123 } << 2124 1624 2125 return fuse_update_get_attr(inode, NU 1625 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 2126 } 1626 } 2127 1627 2128 static const struct inode_operations fuse_dir 1628 static const struct inode_operations fuse_dir_inode_operations = { 2129 .lookup = fuse_lookup, 1629 .lookup = fuse_lookup, 2130 .mkdir = fuse_mkdir, 1630 .mkdir = fuse_mkdir, 2131 .symlink = fuse_symlink, 1631 .symlink = fuse_symlink, 2132 .unlink = fuse_unlink, 1632 .unlink = fuse_unlink, 2133 .rmdir = fuse_rmdir, 1633 .rmdir = fuse_rmdir, 2134 .rename = fuse_rename2, 1634 .rename = fuse_rename2, 2135 .link = fuse_link, 1635 .link = fuse_link, 2136 .setattr = fuse_setattr, 1636 .setattr = fuse_setattr, 2137 .create = fuse_create, 1637 .create = fuse_create, 2138 .atomic_open = fuse_atomic_open, 1638 .atomic_open = fuse_atomic_open, 2139 .tmpfile = fuse_tmpfile, << 2140 .mknod = fuse_mknod, 1639 .mknod = fuse_mknod, 2141 .permission = fuse_permission, 1640 .permission = fuse_permission, 2142 .getattr = fuse_getattr, 1641 .getattr = fuse_getattr, 2143 .listxattr = fuse_listxattr, 1642 .listxattr = fuse_listxattr, 2144 .get_inode_acl = fuse_get_inode_acl, << 2145 .get_acl = fuse_get_acl, 1643 .get_acl = fuse_get_acl, 2146 .set_acl = fuse_set_acl, 1644 .set_acl = fuse_set_acl, 2147 .fileattr_get = fuse_fileattr_get, << 2148 .fileattr_set = fuse_fileattr_set, << 2149 }; 1645 }; 2150 1646 2151 static const struct file_operations fuse_dir_ 1647 static const struct file_operations fuse_dir_operations = { 2152 .llseek = generic_file_llseek 1648 .llseek = generic_file_llseek, 2153 .read = generic_read_dir, 1649 .read = generic_read_dir, 2154 .iterate_shared = fuse_readdir, 1650 .iterate_shared = fuse_readdir, 2155 .open = fuse_dir_open, 1651 .open = fuse_dir_open, 2156 .release = fuse_dir_release, 1652 .release = fuse_dir_release, 2157 .fsync = fuse_dir_fsync, 1653 .fsync = fuse_dir_fsync, 2158 .unlocked_ioctl = fuse_dir_ioctl, 1654 .unlocked_ioctl = fuse_dir_ioctl, 2159 .compat_ioctl = fuse_dir_compat_ioc 1655 .compat_ioctl = fuse_dir_compat_ioctl, 2160 }; 1656 }; 2161 1657 2162 static const struct inode_operations fuse_com 1658 static const struct inode_operations fuse_common_inode_operations = { 2163 .setattr = fuse_setattr, 1659 .setattr = fuse_setattr, 2164 .permission = fuse_permission, 1660 .permission = fuse_permission, 2165 .getattr = fuse_getattr, 1661 .getattr = fuse_getattr, 2166 .listxattr = fuse_listxattr, 1662 .listxattr = fuse_listxattr, 2167 .get_inode_acl = fuse_get_inode_acl, << 2168 .get_acl = fuse_get_acl, 1663 .get_acl = fuse_get_acl, 2169 .set_acl = fuse_set_acl, 1664 .set_acl = fuse_set_acl, 2170 .fileattr_get = fuse_fileattr_get, << 2171 .fileattr_set = fuse_fileattr_set, << 2172 }; 1665 }; 2173 1666 2174 static const struct inode_operations fuse_sym 1667 static const struct inode_operations fuse_symlink_inode_operations = { 2175 .setattr = fuse_setattr, 1668 .setattr = fuse_setattr, 2176 .get_link = fuse_get_link, 1669 .get_link = fuse_get_link, 2177 .getattr = fuse_getattr, 1670 .getattr = fuse_getattr, 2178 .listxattr = fuse_listxattr, 1671 .listxattr = fuse_listxattr, 2179 }; 1672 }; 2180 1673 2181 void fuse_init_common(struct inode *inode) 1674 void fuse_init_common(struct inode *inode) 2182 { 1675 { 2183 inode->i_op = &fuse_common_inode_oper 1676 inode->i_op = &fuse_common_inode_operations; 2184 } 1677 } 2185 1678 2186 void fuse_init_dir(struct inode *inode) 1679 void fuse_init_dir(struct inode *inode) 2187 { 1680 { 2188 struct fuse_inode *fi = get_fuse_inod 1681 struct fuse_inode *fi = get_fuse_inode(inode); 2189 1682 2190 inode->i_op = &fuse_dir_inode_operati 1683 inode->i_op = &fuse_dir_inode_operations; 2191 inode->i_fop = &fuse_dir_operations; 1684 inode->i_fop = &fuse_dir_operations; 2192 1685 2193 spin_lock_init(&fi->rdc.lock); 1686 spin_lock_init(&fi->rdc.lock); 2194 fi->rdc.cached = false; 1687 fi->rdc.cached = false; 2195 fi->rdc.size = 0; 1688 fi->rdc.size = 0; 2196 fi->rdc.pos = 0; 1689 fi->rdc.pos = 0; 2197 fi->rdc.version = 0; 1690 fi->rdc.version = 0; 2198 } 1691 } 2199 1692 2200 static int fuse_symlink_read_folio(struct fil !! 1693 static int fuse_symlink_readpage(struct file *null, struct page *page) 2201 { 1694 { 2202 int err = fuse_readlink_page(folio->m !! 1695 int err = fuse_readlink_page(page->mapping->host, page); 2203 1696 2204 if (!err) 1697 if (!err) 2205 folio_mark_uptodate(folio); !! 1698 SetPageUptodate(page); 2206 1699 2207 folio_unlock(folio); !! 1700 unlock_page(page); 2208 1701 2209 return err; 1702 return err; 2210 } 1703 } 2211 1704 2212 static const struct address_space_operations 1705 static const struct address_space_operations fuse_symlink_aops = { 2213 .read_folio = fuse_symlink_read_f !! 1706 .readpage = fuse_symlink_readpage, 2214 }; 1707 }; 2215 1708 2216 void fuse_init_symlink(struct inode *inode) 1709 void fuse_init_symlink(struct inode *inode) 2217 { 1710 { 2218 inode->i_op = &fuse_symlink_inode_ope 1711 inode->i_op = &fuse_symlink_inode_operations; 2219 inode->i_data.a_ops = &fuse_symlink_a 1712 inode->i_data.a_ops = &fuse_symlink_aops; 2220 inode_nohighmem(inode); 1713 inode_nohighmem(inode); 2221 } 1714 } 2222 1715
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.