dir.c 56 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268
  1. /*
  2. FUSE: Filesystem in Userspace
  3. Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
  4. This program can be distributed under the terms of the GNU GPL.
  5. See the file COPYING.
  6. */
  7. #include "fuse_i.h"
  8. #include <linux/pagemap.h>
  9. #include <linux/file.h>
  10. #include <linux/fs_context.h>
  11. #include <linux/moduleparam.h>
  12. #include <linux/sched.h>
  13. #include <linux/namei.h>
  14. #include <linux/slab.h>
  15. #include <linux/xattr.h>
  16. #include <linux/iversion.h>
  17. #include <linux/posix_acl.h>
  18. #include <linux/security.h>
  19. #include <linux/types.h>
  20. #include <linux/kernel.h>
  21. static bool __read_mostly allow_sys_admin_access;
  22. module_param(allow_sys_admin_access, bool, 0644);
  23. MODULE_PARM_DESC(allow_sys_admin_access,
  24. "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check");
  25. static void fuse_advise_use_readdirplus(struct inode *dir)
  26. {
  27. struct fuse_inode *fi = get_fuse_inode(dir);
  28. set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
  29. }
  30. #if BITS_PER_LONG >= 64
  31. static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
  32. {
  33. entry->d_fsdata = (void *) time;
  34. }
  35. static inline u64 fuse_dentry_time(const struct dentry *entry)
  36. {
  37. return (u64)entry->d_fsdata;
  38. }
  39. #else
  40. union fuse_dentry {
  41. u64 time;
  42. struct rcu_head rcu;
  43. };
  44. static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
  45. {
  46. ((union fuse_dentry *) dentry->d_fsdata)->time = time;
  47. }
  48. static inline u64 fuse_dentry_time(const struct dentry *entry)
  49. {
  50. return ((union fuse_dentry *) entry->d_fsdata)->time;
  51. }
  52. #endif
  53. static void fuse_dentry_settime(struct dentry *dentry, u64 time)
  54. {
  55. struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
  56. bool delete = !time && fc->delete_stale;
  57. /*
  58. * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
  59. * Don't care about races, either way it's just an optimization
  60. */
  61. if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
  62. (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
  63. spin_lock(&dentry->d_lock);
  64. if (!delete)
  65. dentry->d_flags &= ~DCACHE_OP_DELETE;
  66. else
  67. dentry->d_flags |= DCACHE_OP_DELETE;
  68. spin_unlock(&dentry->d_lock);
  69. }
  70. __fuse_dentry_settime(dentry, time);
  71. }
  72. /*
  73. * FUSE caches dentries and attributes with separate timeout. The
  74. * time in jiffies until the dentry/attributes are valid is stored in
  75. * dentry->d_fsdata and fuse_inode->i_time respectively.
  76. */
  77. /*
  78. * Calculate the time in jiffies until a dentry/attributes are valid
  79. */
  80. u64 fuse_time_to_jiffies(u64 sec, u32 nsec)
  81. {
  82. if (sec || nsec) {
  83. struct timespec64 ts = {
  84. sec,
  85. min_t(u32, nsec, NSEC_PER_SEC - 1)
  86. };
  87. return get_jiffies_64() + timespec64_to_jiffies(&ts);
  88. } else
  89. return 0;
  90. }
  91. /*
  92. * Set dentry and possibly attribute timeouts from the lookup/mk*
  93. * replies
  94. */
  95. void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
  96. {
  97. fuse_dentry_settime(entry,
  98. fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
  99. }
  100. void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
  101. {
  102. set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
  103. }
  104. /*
  105. * Mark the attributes as stale, so that at the next call to
  106. * ->getattr() they will be fetched from userspace
  107. */
  108. void fuse_invalidate_attr(struct inode *inode)
  109. {
  110. fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
  111. }
  112. static void fuse_dir_changed(struct inode *dir)
  113. {
  114. fuse_invalidate_attr(dir);
  115. inode_maybe_inc_iversion(dir, false);
  116. }
  117. /*
  118. * Mark the attributes as stale due to an atime change. Avoid the invalidate if
  119. * atime is not used.
  120. */
  121. void fuse_invalidate_atime(struct inode *inode)
  122. {
  123. if (!IS_RDONLY(inode))
  124. fuse_invalidate_attr_mask(inode, STATX_ATIME);
  125. }
  126. /*
  127. * Just mark the entry as stale, so that a next attempt to look it up
  128. * will result in a new lookup call to userspace
  129. *
  130. * This is called when a dentry is about to become negative and the
  131. * timeout is unknown (unlink, rmdir, rename and in some cases
  132. * lookup)
  133. */
  134. void fuse_invalidate_entry_cache(struct dentry *entry)
  135. {
  136. fuse_dentry_settime(entry, 0);
  137. }
  138. /*
  139. * Same as fuse_invalidate_entry_cache(), but also try to remove the
  140. * dentry from the hash
  141. */
  142. static void fuse_invalidate_entry(struct dentry *entry)
  143. {
  144. d_invalidate(entry);
  145. fuse_invalidate_entry_cache(entry);
  146. }
  147. static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
  148. u64 nodeid, const struct qstr *name,
  149. struct fuse_entry_out *outarg)
  150. {
  151. memset(outarg, 0, sizeof(struct fuse_entry_out));
  152. args->opcode = FUSE_LOOKUP;
  153. args->nodeid = nodeid;
  154. args->in_numargs = 1;
  155. args->in_args[0].size = name->len + 1;
  156. args->in_args[0].value = name->name;
  157. args->out_numargs = 1;
  158. args->out_args[0].size = sizeof(struct fuse_entry_out);
  159. args->out_args[0].value = outarg;
  160. }
  161. /*
  162. * Check whether the dentry is still valid
  163. *
  164. * If the entry validity timeout has expired and the dentry is
  165. * positive, try to redo the lookup. If the lookup results in a
  166. * different inode, then let the VFS invalidate the dentry and redo
  167. * the lookup once more. If the lookup results in the same inode,
  168. * then refresh the attributes, timeouts and mark the dentry valid.
  169. */
  170. static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
  171. {
  172. struct inode *inode;
  173. struct dentry *parent;
  174. struct fuse_mount *fm;
  175. struct fuse_inode *fi;
  176. int ret;
  177. inode = d_inode_rcu(entry);
  178. if (inode && fuse_is_bad(inode))
  179. goto invalid;
  180. else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
  181. (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) {
  182. struct fuse_entry_out outarg;
  183. FUSE_ARGS(args);
  184. struct fuse_forget_link *forget;
  185. u64 attr_version;
  186. /* For negative dentries, always do a fresh lookup */
  187. if (!inode)
  188. goto invalid;
  189. ret = -ECHILD;
  190. if (flags & LOOKUP_RCU)
  191. goto out;
  192. fm = get_fuse_mount(inode);
  193. forget = fuse_alloc_forget();
  194. ret = -ENOMEM;
  195. if (!forget)
  196. goto out;
  197. attr_version = fuse_get_attr_version(fm->fc);
  198. parent = dget_parent(entry);
  199. fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
  200. &entry->d_name, &outarg);
  201. ret = fuse_simple_request(fm, &args);
  202. dput(parent);
  203. /* Zero nodeid is same as -ENOENT */
  204. if (!ret && !outarg.nodeid)
  205. ret = -ENOENT;
  206. if (!ret) {
  207. fi = get_fuse_inode(inode);
  208. if (outarg.nodeid != get_node_id(inode) ||
  209. (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
  210. fuse_queue_forget(fm->fc, forget,
  211. outarg.nodeid, 1);
  212. goto invalid;
  213. }
  214. spin_lock(&fi->lock);
  215. fi->nlookup++;
  216. spin_unlock(&fi->lock);
  217. }
  218. kfree(forget);
  219. if (ret == -ENOMEM || ret == -EINTR)
  220. goto out;
  221. if (ret || fuse_invalid_attr(&outarg.attr) ||
  222. fuse_stale_inode(inode, outarg.generation, &outarg.attr))
  223. goto invalid;
  224. forget_all_cached_acls(inode);
  225. fuse_change_attributes(inode, &outarg.attr, NULL,
  226. ATTR_TIMEOUT(&outarg),
  227. attr_version);
  228. fuse_change_entry_timeout(entry, &outarg);
  229. } else if (inode) {
  230. fi = get_fuse_inode(inode);
  231. if (flags & LOOKUP_RCU) {
  232. if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
  233. return -ECHILD;
  234. } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
  235. parent = dget_parent(entry);
  236. fuse_advise_use_readdirplus(d_inode(parent));
  237. dput(parent);
  238. }
  239. }
  240. ret = 1;
  241. out:
  242. return ret;
  243. invalid:
  244. ret = 0;
  245. goto out;
  246. }
  247. #if BITS_PER_LONG < 64
  248. static int fuse_dentry_init(struct dentry *dentry)
  249. {
  250. dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
  251. GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
  252. return dentry->d_fsdata ? 0 : -ENOMEM;
  253. }
  254. static void fuse_dentry_release(struct dentry *dentry)
  255. {
  256. union fuse_dentry *fd = dentry->d_fsdata;
  257. kfree_rcu(fd, rcu);
  258. }
  259. #endif
  260. static int fuse_dentry_delete(const struct dentry *dentry)
  261. {
  262. return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
  263. }
  264. /*
  265. * Create a fuse_mount object with a new superblock (with path->dentry
  266. * as the root), and return that mount so it can be auto-mounted on
  267. * @path.
  268. */
  269. static struct vfsmount *fuse_dentry_automount(struct path *path)
  270. {
  271. struct fs_context *fsc;
  272. struct vfsmount *mnt;
  273. struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
  274. fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
  275. if (IS_ERR(fsc))
  276. return ERR_CAST(fsc);
  277. /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */
  278. fsc->fs_private = mp_fi;
  279. /* Create the submount */
  280. mnt = fc_mount(fsc);
  281. if (!IS_ERR(mnt))
  282. mntget(mnt);
  283. put_fs_context(fsc);
  284. return mnt;
  285. }
  286. const struct dentry_operations fuse_dentry_operations = {
  287. .d_revalidate = fuse_dentry_revalidate,
  288. .d_delete = fuse_dentry_delete,
  289. #if BITS_PER_LONG < 64
  290. .d_init = fuse_dentry_init,
  291. .d_release = fuse_dentry_release,
  292. #endif
  293. .d_automount = fuse_dentry_automount,
  294. };
  295. const struct dentry_operations fuse_root_dentry_operations = {
  296. #if BITS_PER_LONG < 64
  297. .d_init = fuse_dentry_init,
  298. .d_release = fuse_dentry_release,
  299. #endif
  300. };
  301. int fuse_valid_type(int m)
  302. {
  303. return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
  304. S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
  305. }
  306. static bool fuse_valid_size(u64 size)
  307. {
  308. return size <= LLONG_MAX;
  309. }
  310. bool fuse_invalid_attr(struct fuse_attr *attr)
  311. {
  312. return !fuse_valid_type(attr->mode) || !fuse_valid_size(attr->size);
  313. }
  314. int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
  315. struct fuse_entry_out *outarg, struct inode **inode)
  316. {
  317. struct fuse_mount *fm = get_fuse_mount_super(sb);
  318. FUSE_ARGS(args);
  319. struct fuse_forget_link *forget;
  320. u64 attr_version;
  321. int err;
  322. *inode = NULL;
  323. err = -ENAMETOOLONG;
  324. if (name->len > FUSE_NAME_MAX)
  325. goto out;
  326. forget = fuse_alloc_forget();
  327. err = -ENOMEM;
  328. if (!forget)
  329. goto out;
  330. attr_version = fuse_get_attr_version(fm->fc);
  331. fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
  332. err = fuse_simple_request(fm, &args);
  333. /* Zero nodeid is same as -ENOENT, but with valid timeout */
  334. if (err || !outarg->nodeid)
  335. goto out_put_forget;
  336. err = -EIO;
  337. if (fuse_invalid_attr(&outarg->attr))
  338. goto out_put_forget;
  339. if (outarg->nodeid == FUSE_ROOT_ID && outarg->generation != 0) {
  340. pr_warn_once("root generation should be zero\n");
  341. outarg->generation = 0;
  342. }
  343. *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
  344. &outarg->attr, ATTR_TIMEOUT(outarg),
  345. attr_version);
  346. err = -ENOMEM;
  347. if (!*inode) {
  348. fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
  349. goto out;
  350. }
  351. err = 0;
  352. out_put_forget:
  353. kfree(forget);
  354. out:
  355. return err;
  356. }
  357. static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
  358. unsigned int flags)
  359. {
  360. int err;
  361. struct fuse_entry_out outarg;
  362. struct inode *inode;
  363. struct dentry *newent;
  364. bool outarg_valid = true;
  365. bool locked;
  366. if (fuse_is_bad(dir))
  367. return ERR_PTR(-EIO);
  368. locked = fuse_lock_inode(dir);
  369. err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
  370. &outarg, &inode);
  371. fuse_unlock_inode(dir, locked);
  372. if (err == -ENOENT) {
  373. outarg_valid = false;
  374. err = 0;
  375. }
  376. if (err)
  377. goto out_err;
  378. err = -EIO;
  379. if (inode && get_node_id(inode) == FUSE_ROOT_ID)
  380. goto out_iput;
  381. newent = d_splice_alias(inode, entry);
  382. err = PTR_ERR(newent);
  383. if (IS_ERR(newent))
  384. goto out_err;
  385. entry = newent ? newent : entry;
  386. if (outarg_valid)
  387. fuse_change_entry_timeout(entry, &outarg);
  388. else
  389. fuse_invalidate_entry_cache(entry);
  390. if (inode)
  391. fuse_advise_use_readdirplus(dir);
  392. return newent;
  393. out_iput:
  394. iput(inode);
  395. out_err:
  396. return ERR_PTR(err);
  397. }
  398. static int get_security_context(struct dentry *entry, umode_t mode,
  399. struct fuse_in_arg *ext)
  400. {
  401. struct fuse_secctx *fctx;
  402. struct fuse_secctx_header *header;
  403. void *ctx = NULL, *ptr;
  404. u32 ctxlen, total_len = sizeof(*header);
  405. int err, nr_ctx = 0;
  406. const char *name;
  407. size_t namelen;
  408. err = security_dentry_init_security(entry, mode, &entry->d_name,
  409. &name, &ctx, &ctxlen);
  410. if (err) {
  411. if (err != -EOPNOTSUPP)
  412. goto out_err;
  413. /* No LSM is supporting this security hook. Ignore error */
  414. ctxlen = 0;
  415. ctx = NULL;
  416. }
  417. if (ctxlen) {
  418. nr_ctx = 1;
  419. namelen = strlen(name) + 1;
  420. err = -EIO;
  421. if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX))
  422. goto out_err;
  423. total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen);
  424. }
  425. err = -ENOMEM;
  426. header = ptr = kzalloc(total_len, GFP_KERNEL);
  427. if (!ptr)
  428. goto out_err;
  429. header->nr_secctx = nr_ctx;
  430. header->size = total_len;
  431. ptr += sizeof(*header);
  432. if (nr_ctx) {
  433. fctx = ptr;
  434. fctx->size = ctxlen;
  435. ptr += sizeof(*fctx);
  436. strcpy(ptr, name);
  437. ptr += namelen;
  438. memcpy(ptr, ctx, ctxlen);
  439. }
  440. ext->size = total_len;
  441. ext->value = header;
  442. err = 0;
  443. out_err:
  444. kfree(ctx);
  445. return err;
  446. }
  447. static void *extend_arg(struct fuse_in_arg *buf, u32 bytes)
  448. {
  449. void *p;
  450. u32 newlen = buf->size + bytes;
  451. p = krealloc(buf->value, newlen, GFP_KERNEL);
  452. if (!p) {
  453. kfree(buf->value);
  454. buf->size = 0;
  455. buf->value = NULL;
  456. return NULL;
  457. }
  458. memset(p + buf->size, 0, bytes);
  459. buf->value = p;
  460. buf->size = newlen;
  461. return p + newlen - bytes;
  462. }
  463. static u32 fuse_ext_size(size_t size)
  464. {
  465. return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size);
  466. }
  467. /*
  468. * This adds just a single supplementary group that matches the parent's group.
  469. */
  470. static int get_create_supp_group(struct mnt_idmap *idmap,
  471. struct inode *dir,
  472. struct fuse_in_arg *ext)
  473. {
  474. struct fuse_conn *fc = get_fuse_conn(dir);
  475. struct fuse_ext_header *xh;
  476. struct fuse_supp_groups *sg;
  477. kgid_t kgid = dir->i_gid;
  478. vfsgid_t vfsgid = make_vfsgid(idmap, fc->user_ns, kgid);
  479. gid_t parent_gid = from_kgid(fc->user_ns, kgid);
  480. u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0]));
  481. if (parent_gid == (gid_t) -1 || vfsgid_eq_kgid(vfsgid, current_fsgid()) ||
  482. !vfsgid_in_group_p(vfsgid))
  483. return 0;
  484. xh = extend_arg(ext, sg_len);
  485. if (!xh)
  486. return -ENOMEM;
  487. xh->size = sg_len;
  488. xh->type = FUSE_EXT_GROUPS;
  489. sg = (struct fuse_supp_groups *) &xh[1];
  490. sg->nr_groups = 1;
  491. sg->groups[0] = parent_gid;
  492. return 0;
  493. }
  494. static int get_create_ext(struct mnt_idmap *idmap,
  495. struct fuse_args *args,
  496. struct inode *dir, struct dentry *dentry,
  497. umode_t mode)
  498. {
  499. struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
  500. struct fuse_in_arg ext = { .size = 0, .value = NULL };
  501. int err = 0;
  502. if (fc->init_security)
  503. err = get_security_context(dentry, mode, &ext);
  504. if (!err && fc->create_supp_group)
  505. err = get_create_supp_group(idmap, dir, &ext);
  506. if (!err && ext.size) {
  507. WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args));
  508. args->is_ext = true;
  509. args->ext_idx = args->in_numargs++;
  510. args->in_args[args->ext_idx] = ext;
  511. } else {
  512. kfree(ext.value);
  513. }
  514. return err;
  515. }
  516. static void free_ext_value(struct fuse_args *args)
  517. {
  518. if (args->is_ext)
  519. kfree(args->in_args[args->ext_idx].value);
  520. }
  521. /*
  522. * Atomic create+open operation
  523. *
  524. * If the filesystem doesn't support this, then fall back to separate
  525. * 'mknod' + 'open' requests.
  526. */
  527. static int fuse_create_open(struct mnt_idmap *idmap, struct inode *dir,
  528. struct dentry *entry, struct file *file,
  529. unsigned int flags, umode_t mode, u32 opcode)
  530. {
  531. int err;
  532. struct inode *inode;
  533. struct fuse_mount *fm = get_fuse_mount(dir);
  534. FUSE_ARGS(args);
  535. struct fuse_forget_link *forget;
  536. struct fuse_create_in inarg;
  537. struct fuse_open_out *outopenp;
  538. struct fuse_entry_out outentry;
  539. struct fuse_inode *fi;
  540. struct fuse_file *ff;
  541. bool trunc = flags & O_TRUNC;
  542. /* Userspace expects S_IFREG in create mode */
  543. BUG_ON((mode & S_IFMT) != S_IFREG);
  544. forget = fuse_alloc_forget();
  545. err = -ENOMEM;
  546. if (!forget)
  547. goto out_err;
  548. err = -ENOMEM;
  549. ff = fuse_file_alloc(fm, true);
  550. if (!ff)
  551. goto out_put_forget_req;
  552. if (!fm->fc->dont_mask)
  553. mode &= ~current_umask();
  554. flags &= ~O_NOCTTY;
  555. memset(&inarg, 0, sizeof(inarg));
  556. memset(&outentry, 0, sizeof(outentry));
  557. inarg.flags = flags;
  558. inarg.mode = mode;
  559. inarg.umask = current_umask();
  560. if (fm->fc->handle_killpriv_v2 && trunc &&
  561. !(flags & O_EXCL) && !capable(CAP_FSETID)) {
  562. inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
  563. }
  564. args.opcode = opcode;
  565. args.nodeid = get_node_id(dir);
  566. args.in_numargs = 2;
  567. args.in_args[0].size = sizeof(inarg);
  568. args.in_args[0].value = &inarg;
  569. args.in_args[1].size = entry->d_name.len + 1;
  570. args.in_args[1].value = entry->d_name.name;
  571. args.out_numargs = 2;
  572. args.out_args[0].size = sizeof(outentry);
  573. args.out_args[0].value = &outentry;
  574. /* Store outarg for fuse_finish_open() */
  575. outopenp = &ff->args->open_outarg;
  576. args.out_args[1].size = sizeof(*outopenp);
  577. args.out_args[1].value = outopenp;
  578. err = get_create_ext(idmap, &args, dir, entry, mode);
  579. if (err)
  580. goto out_free_ff;
  581. err = fuse_simple_idmap_request(idmap, fm, &args);
  582. free_ext_value(&args);
  583. if (err)
  584. goto out_free_ff;
  585. err = -EIO;
  586. if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
  587. fuse_invalid_attr(&outentry.attr))
  588. goto out_free_ff;
  589. ff->fh = outopenp->fh;
  590. ff->nodeid = outentry.nodeid;
  591. ff->open_flags = outopenp->open_flags;
  592. inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
  593. &outentry.attr, ATTR_TIMEOUT(&outentry), 0);
  594. if (!inode) {
  595. flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
  596. fuse_sync_release(NULL, ff, flags);
  597. fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
  598. err = -ENOMEM;
  599. goto out_err;
  600. }
  601. kfree(forget);
  602. d_instantiate(entry, inode);
  603. fuse_change_entry_timeout(entry, &outentry);
  604. fuse_dir_changed(dir);
  605. err = generic_file_open(inode, file);
  606. if (!err) {
  607. file->private_data = ff;
  608. err = finish_open(file, entry, fuse_finish_open);
  609. }
  610. if (err) {
  611. fi = get_fuse_inode(inode);
  612. fuse_sync_release(fi, ff, flags);
  613. } else {
  614. if (fm->fc->atomic_o_trunc && trunc)
  615. truncate_pagecache(inode, 0);
  616. else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
  617. invalidate_inode_pages2(inode->i_mapping);
  618. }
  619. return err;
  620. out_free_ff:
  621. fuse_file_free(ff);
  622. out_put_forget_req:
  623. kfree(forget);
  624. out_err:
  625. return err;
  626. }
  627. static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
  628. umode_t, dev_t);
  629. static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
  630. struct file *file, unsigned flags,
  631. umode_t mode)
  632. {
  633. int err;
  634. struct mnt_idmap *idmap = file_mnt_idmap(file);
  635. struct fuse_conn *fc = get_fuse_conn(dir);
  636. struct dentry *res = NULL;
  637. if (fuse_is_bad(dir))
  638. return -EIO;
  639. if (d_in_lookup(entry)) {
  640. res = fuse_lookup(dir, entry, 0);
  641. if (IS_ERR(res))
  642. return PTR_ERR(res);
  643. if (res)
  644. entry = res;
  645. }
  646. if (!(flags & O_CREAT) || d_really_is_positive(entry))
  647. goto no_open;
  648. /* Only creates */
  649. file->f_mode |= FMODE_CREATED;
  650. if (fc->no_create)
  651. goto mknod;
  652. err = fuse_create_open(idmap, dir, entry, file, flags, mode, FUSE_CREATE);
  653. if (err == -ENOSYS) {
  654. fc->no_create = 1;
  655. goto mknod;
  656. } else if (err == -EEXIST)
  657. fuse_invalidate_entry(entry);
  658. out_dput:
  659. dput(res);
  660. return err;
  661. mknod:
  662. err = fuse_mknod(idmap, dir, entry, mode, 0);
  663. if (err)
  664. goto out_dput;
  665. no_open:
  666. return finish_no_open(file, res);
  667. }
  668. /*
  669. * Code shared between mknod, mkdir, symlink and link
  670. */
  671. static int create_new_entry(struct mnt_idmap *idmap, struct fuse_mount *fm,
  672. struct fuse_args *args, struct inode *dir,
  673. struct dentry *entry, umode_t mode)
  674. {
  675. struct fuse_entry_out outarg;
  676. struct inode *inode;
  677. struct dentry *d;
  678. int err;
  679. struct fuse_forget_link *forget;
  680. if (fuse_is_bad(dir))
  681. return -EIO;
  682. forget = fuse_alloc_forget();
  683. if (!forget)
  684. return -ENOMEM;
  685. memset(&outarg, 0, sizeof(outarg));
  686. args->nodeid = get_node_id(dir);
  687. args->out_numargs = 1;
  688. args->out_args[0].size = sizeof(outarg);
  689. args->out_args[0].value = &outarg;
  690. if (args->opcode != FUSE_LINK) {
  691. err = get_create_ext(idmap, args, dir, entry, mode);
  692. if (err)
  693. goto out_put_forget_req;
  694. }
  695. err = fuse_simple_idmap_request(idmap, fm, args);
  696. free_ext_value(args);
  697. if (err)
  698. goto out_put_forget_req;
  699. err = -EIO;
  700. if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
  701. goto out_put_forget_req;
  702. if ((outarg.attr.mode ^ mode) & S_IFMT)
  703. goto out_put_forget_req;
  704. inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
  705. &outarg.attr, ATTR_TIMEOUT(&outarg), 0);
  706. if (!inode) {
  707. fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
  708. return -ENOMEM;
  709. }
  710. kfree(forget);
  711. d_drop(entry);
  712. d = d_splice_alias(inode, entry);
  713. if (IS_ERR(d))
  714. return PTR_ERR(d);
  715. if (d) {
  716. fuse_change_entry_timeout(d, &outarg);
  717. dput(d);
  718. } else {
  719. fuse_change_entry_timeout(entry, &outarg);
  720. }
  721. fuse_dir_changed(dir);
  722. return 0;
  723. out_put_forget_req:
  724. if (err == -EEXIST)
  725. fuse_invalidate_entry(entry);
  726. kfree(forget);
  727. return err;
  728. }
  729. static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir,
  730. struct dentry *entry, umode_t mode, dev_t rdev)
  731. {
  732. struct fuse_mknod_in inarg;
  733. struct fuse_mount *fm = get_fuse_mount(dir);
  734. FUSE_ARGS(args);
  735. if (!fm->fc->dont_mask)
  736. mode &= ~current_umask();
  737. memset(&inarg, 0, sizeof(inarg));
  738. inarg.mode = mode;
  739. inarg.rdev = new_encode_dev(rdev);
  740. inarg.umask = current_umask();
  741. args.opcode = FUSE_MKNOD;
  742. args.in_numargs = 2;
  743. args.in_args[0].size = sizeof(inarg);
  744. args.in_args[0].value = &inarg;
  745. args.in_args[1].size = entry->d_name.len + 1;
  746. args.in_args[1].value = entry->d_name.name;
  747. return create_new_entry(idmap, fm, &args, dir, entry, mode);
  748. }
  749. static int fuse_create(struct mnt_idmap *idmap, struct inode *dir,
  750. struct dentry *entry, umode_t mode, bool excl)
  751. {
  752. return fuse_mknod(idmap, dir, entry, mode, 0);
  753. }
  754. static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir,
  755. struct file *file, umode_t mode)
  756. {
  757. struct fuse_conn *fc = get_fuse_conn(dir);
  758. int err;
  759. if (fc->no_tmpfile)
  760. return -EOPNOTSUPP;
  761. err = fuse_create_open(idmap, dir, file->f_path.dentry, file,
  762. file->f_flags, mode, FUSE_TMPFILE);
  763. if (err == -ENOSYS) {
  764. fc->no_tmpfile = 1;
  765. err = -EOPNOTSUPP;
  766. }
  767. return err;
  768. }
  769. static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir,
  770. struct dentry *entry, umode_t mode)
  771. {
  772. struct fuse_mkdir_in inarg;
  773. struct fuse_mount *fm = get_fuse_mount(dir);
  774. FUSE_ARGS(args);
  775. if (!fm->fc->dont_mask)
  776. mode &= ~current_umask();
  777. memset(&inarg, 0, sizeof(inarg));
  778. inarg.mode = mode;
  779. inarg.umask = current_umask();
  780. args.opcode = FUSE_MKDIR;
  781. args.in_numargs = 2;
  782. args.in_args[0].size = sizeof(inarg);
  783. args.in_args[0].value = &inarg;
  784. args.in_args[1].size = entry->d_name.len + 1;
  785. args.in_args[1].value = entry->d_name.name;
  786. return create_new_entry(idmap, fm, &args, dir, entry, S_IFDIR);
  787. }
  788. static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir,
  789. struct dentry *entry, const char *link)
  790. {
  791. struct fuse_mount *fm = get_fuse_mount(dir);
  792. unsigned len = strlen(link) + 1;
  793. FUSE_ARGS(args);
  794. args.opcode = FUSE_SYMLINK;
  795. args.in_numargs = 2;
  796. args.in_args[0].size = entry->d_name.len + 1;
  797. args.in_args[0].value = entry->d_name.name;
  798. args.in_args[1].size = len;
  799. args.in_args[1].value = link;
  800. return create_new_entry(idmap, fm, &args, dir, entry, S_IFLNK);
  801. }
  802. void fuse_flush_time_update(struct inode *inode)
  803. {
  804. int err = sync_inode_metadata(inode, 1);
  805. mapping_set_error(inode->i_mapping, err);
  806. }
  807. static void fuse_update_ctime_in_cache(struct inode *inode)
  808. {
  809. if (!IS_NOCMTIME(inode)) {
  810. inode_set_ctime_current(inode);
  811. mark_inode_dirty_sync(inode);
  812. fuse_flush_time_update(inode);
  813. }
  814. }
  815. void fuse_update_ctime(struct inode *inode)
  816. {
  817. fuse_invalidate_attr_mask(inode, STATX_CTIME);
  818. fuse_update_ctime_in_cache(inode);
  819. }
  820. static void fuse_entry_unlinked(struct dentry *entry)
  821. {
  822. struct inode *inode = d_inode(entry);
  823. struct fuse_conn *fc = get_fuse_conn(inode);
  824. struct fuse_inode *fi = get_fuse_inode(inode);
  825. spin_lock(&fi->lock);
  826. fi->attr_version = atomic64_inc_return(&fc->attr_version);
  827. /*
  828. * If i_nlink == 0 then unlink doesn't make sense, yet this can
  829. * happen if userspace filesystem is careless. It would be
  830. * difficult to enforce correct nlink usage so just ignore this
  831. * condition here
  832. */
  833. if (S_ISDIR(inode->i_mode))
  834. clear_nlink(inode);
  835. else if (inode->i_nlink > 0)
  836. drop_nlink(inode);
  837. spin_unlock(&fi->lock);
  838. fuse_invalidate_entry_cache(entry);
  839. fuse_update_ctime(inode);
  840. }
  841. static int fuse_unlink(struct inode *dir, struct dentry *entry)
  842. {
  843. int err;
  844. struct fuse_mount *fm = get_fuse_mount(dir);
  845. FUSE_ARGS(args);
  846. if (fuse_is_bad(dir))
  847. return -EIO;
  848. args.opcode = FUSE_UNLINK;
  849. args.nodeid = get_node_id(dir);
  850. args.in_numargs = 1;
  851. args.in_args[0].size = entry->d_name.len + 1;
  852. args.in_args[0].value = entry->d_name.name;
  853. err = fuse_simple_request(fm, &args);
  854. if (!err) {
  855. fuse_dir_changed(dir);
  856. fuse_entry_unlinked(entry);
  857. } else if (err == -EINTR || err == -ENOENT)
  858. fuse_invalidate_entry(entry);
  859. return err;
  860. }
  861. static int fuse_rmdir(struct inode *dir, struct dentry *entry)
  862. {
  863. int err;
  864. struct fuse_mount *fm = get_fuse_mount(dir);
  865. FUSE_ARGS(args);
  866. if (fuse_is_bad(dir))
  867. return -EIO;
  868. args.opcode = FUSE_RMDIR;
  869. args.nodeid = get_node_id(dir);
  870. args.in_numargs = 1;
  871. args.in_args[0].size = entry->d_name.len + 1;
  872. args.in_args[0].value = entry->d_name.name;
  873. err = fuse_simple_request(fm, &args);
  874. if (!err) {
  875. fuse_dir_changed(dir);
  876. fuse_entry_unlinked(entry);
  877. } else if (err == -EINTR || err == -ENOENT)
  878. fuse_invalidate_entry(entry);
  879. return err;
  880. }
  881. static int fuse_rename_common(struct mnt_idmap *idmap, struct inode *olddir, struct dentry *oldent,
  882. struct inode *newdir, struct dentry *newent,
  883. unsigned int flags, int opcode, size_t argsize)
  884. {
  885. int err;
  886. struct fuse_rename2_in inarg;
  887. struct fuse_mount *fm = get_fuse_mount(olddir);
  888. FUSE_ARGS(args);
  889. memset(&inarg, 0, argsize);
  890. inarg.newdir = get_node_id(newdir);
  891. inarg.flags = flags;
  892. args.opcode = opcode;
  893. args.nodeid = get_node_id(olddir);
  894. args.in_numargs = 3;
  895. args.in_args[0].size = argsize;
  896. args.in_args[0].value = &inarg;
  897. args.in_args[1].size = oldent->d_name.len + 1;
  898. args.in_args[1].value = oldent->d_name.name;
  899. args.in_args[2].size = newent->d_name.len + 1;
  900. args.in_args[2].value = newent->d_name.name;
  901. err = fuse_simple_idmap_request(idmap, fm, &args);
  902. if (!err) {
  903. /* ctime changes */
  904. fuse_update_ctime(d_inode(oldent));
  905. if (flags & RENAME_EXCHANGE)
  906. fuse_update_ctime(d_inode(newent));
  907. fuse_dir_changed(olddir);
  908. if (olddir != newdir)
  909. fuse_dir_changed(newdir);
  910. /* newent will end up negative */
  911. if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent))
  912. fuse_entry_unlinked(newent);
  913. } else if (err == -EINTR || err == -ENOENT) {
  914. /* If request was interrupted, DEITY only knows if the
  915. rename actually took place. If the invalidation
  916. fails (e.g. some process has CWD under the renamed
  917. directory), then there can be inconsistency between
  918. the dcache and the real filesystem. Tough luck. */
  919. fuse_invalidate_entry(oldent);
  920. if (d_really_is_positive(newent))
  921. fuse_invalidate_entry(newent);
  922. }
  923. return err;
  924. }
  925. static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir,
  926. struct dentry *oldent, struct inode *newdir,
  927. struct dentry *newent, unsigned int flags)
  928. {
  929. struct fuse_conn *fc = get_fuse_conn(olddir);
  930. int err;
  931. if (fuse_is_bad(olddir))
  932. return -EIO;
  933. if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
  934. return -EINVAL;
  935. if (flags) {
  936. if (fc->no_rename2 || fc->minor < 23)
  937. return -EINVAL;
  938. err = fuse_rename_common((flags & RENAME_WHITEOUT) ? idmap : &invalid_mnt_idmap,
  939. olddir, oldent, newdir, newent, flags,
  940. FUSE_RENAME2,
  941. sizeof(struct fuse_rename2_in));
  942. if (err == -ENOSYS) {
  943. fc->no_rename2 = 1;
  944. err = -EINVAL;
  945. }
  946. } else {
  947. err = fuse_rename_common(&invalid_mnt_idmap, olddir, oldent, newdir, newent, 0,
  948. FUSE_RENAME,
  949. sizeof(struct fuse_rename_in));
  950. }
  951. return err;
  952. }
  953. static int fuse_link(struct dentry *entry, struct inode *newdir,
  954. struct dentry *newent)
  955. {
  956. int err;
  957. struct fuse_link_in inarg;
  958. struct inode *inode = d_inode(entry);
  959. struct fuse_mount *fm = get_fuse_mount(inode);
  960. FUSE_ARGS(args);
  961. memset(&inarg, 0, sizeof(inarg));
  962. inarg.oldnodeid = get_node_id(inode);
  963. args.opcode = FUSE_LINK;
  964. args.in_numargs = 2;
  965. args.in_args[0].size = sizeof(inarg);
  966. args.in_args[0].value = &inarg;
  967. args.in_args[1].size = newent->d_name.len + 1;
  968. args.in_args[1].value = newent->d_name.name;
  969. err = create_new_entry(&invalid_mnt_idmap, fm, &args, newdir, newent, inode->i_mode);
  970. if (!err)
  971. fuse_update_ctime_in_cache(inode);
  972. else if (err == -EINTR)
  973. fuse_invalidate_attr(inode);
  974. if (err == -ENOSYS)
  975. err = -EPERM;
  976. return err;
  977. }
  978. static void fuse_fillattr(struct mnt_idmap *idmap, struct inode *inode,
  979. struct fuse_attr *attr, struct kstat *stat)
  980. {
  981. unsigned int blkbits;
  982. struct fuse_conn *fc = get_fuse_conn(inode);
  983. vfsuid_t vfsuid = make_vfsuid(idmap, fc->user_ns,
  984. make_kuid(fc->user_ns, attr->uid));
  985. vfsgid_t vfsgid = make_vfsgid(idmap, fc->user_ns,
  986. make_kgid(fc->user_ns, attr->gid));
  987. stat->dev = inode->i_sb->s_dev;
  988. stat->ino = attr->ino;
  989. stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
  990. stat->nlink = attr->nlink;
  991. stat->uid = vfsuid_into_kuid(vfsuid);
  992. stat->gid = vfsgid_into_kgid(vfsgid);
  993. stat->rdev = inode->i_rdev;
  994. stat->atime.tv_sec = attr->atime;
  995. stat->atime.tv_nsec = attr->atimensec;
  996. stat->mtime.tv_sec = attr->mtime;
  997. stat->mtime.tv_nsec = attr->mtimensec;
  998. stat->ctime.tv_sec = attr->ctime;
  999. stat->ctime.tv_nsec = attr->ctimensec;
  1000. stat->size = attr->size;
  1001. stat->blocks = attr->blocks;
  1002. if (attr->blksize != 0)
  1003. blkbits = ilog2(attr->blksize);
  1004. else
  1005. blkbits = inode->i_sb->s_blocksize_bits;
  1006. stat->blksize = 1 << blkbits;
  1007. }
  1008. static void fuse_statx_to_attr(struct fuse_statx *sx, struct fuse_attr *attr)
  1009. {
  1010. memset(attr, 0, sizeof(*attr));
  1011. attr->ino = sx->ino;
  1012. attr->size = sx->size;
  1013. attr->blocks = sx->blocks;
  1014. attr->atime = sx->atime.tv_sec;
  1015. attr->mtime = sx->mtime.tv_sec;
  1016. attr->ctime = sx->ctime.tv_sec;
  1017. attr->atimensec = sx->atime.tv_nsec;
  1018. attr->mtimensec = sx->mtime.tv_nsec;
  1019. attr->ctimensec = sx->ctime.tv_nsec;
  1020. attr->mode = sx->mode;
  1021. attr->nlink = sx->nlink;
  1022. attr->uid = sx->uid;
  1023. attr->gid = sx->gid;
  1024. attr->rdev = new_encode_dev(MKDEV(sx->rdev_major, sx->rdev_minor));
  1025. attr->blksize = sx->blksize;
  1026. }
  1027. static int fuse_do_statx(struct mnt_idmap *idmap, struct inode *inode,
  1028. struct file *file, struct kstat *stat)
  1029. {
  1030. int err;
  1031. struct fuse_attr attr;
  1032. struct fuse_statx *sx;
  1033. struct fuse_statx_in inarg;
  1034. struct fuse_statx_out outarg;
  1035. struct fuse_mount *fm = get_fuse_mount(inode);
  1036. u64 attr_version = fuse_get_attr_version(fm->fc);
  1037. FUSE_ARGS(args);
  1038. memset(&inarg, 0, sizeof(inarg));
  1039. memset(&outarg, 0, sizeof(outarg));
  1040. /* Directories have separate file-handle space */
  1041. if (file && S_ISREG(inode->i_mode)) {
  1042. struct fuse_file *ff = file->private_data;
  1043. inarg.getattr_flags |= FUSE_GETATTR_FH;
  1044. inarg.fh = ff->fh;
  1045. }
  1046. /* For now leave sync hints as the default, request all stats. */
  1047. inarg.sx_flags = 0;
  1048. inarg.sx_mask = STATX_BASIC_STATS | STATX_BTIME;
  1049. args.opcode = FUSE_STATX;
  1050. args.nodeid = get_node_id(inode);
  1051. args.in_numargs = 1;
  1052. args.in_args[0].size = sizeof(inarg);
  1053. args.in_args[0].value = &inarg;
  1054. args.out_numargs = 1;
  1055. args.out_args[0].size = sizeof(outarg);
  1056. args.out_args[0].value = &outarg;
  1057. err = fuse_simple_request(fm, &args);
  1058. if (err)
  1059. return err;
  1060. sx = &outarg.stat;
  1061. if (((sx->mask & STATX_SIZE) && !fuse_valid_size(sx->size)) ||
  1062. ((sx->mask & STATX_TYPE) && (!fuse_valid_type(sx->mode) ||
  1063. inode_wrong_type(inode, sx->mode)))) {
  1064. fuse_make_bad(inode);
  1065. return -EIO;
  1066. }
  1067. fuse_statx_to_attr(&outarg.stat, &attr);
  1068. if ((sx->mask & STATX_BASIC_STATS) == STATX_BASIC_STATS) {
  1069. fuse_change_attributes(inode, &attr, &outarg.stat,
  1070. ATTR_TIMEOUT(&outarg), attr_version);
  1071. }
  1072. if (stat) {
  1073. stat->result_mask = sx->mask & (STATX_BASIC_STATS | STATX_BTIME);
  1074. stat->btime.tv_sec = sx->btime.tv_sec;
  1075. stat->btime.tv_nsec = min_t(u32, sx->btime.tv_nsec, NSEC_PER_SEC - 1);
  1076. fuse_fillattr(idmap, inode, &attr, stat);
  1077. stat->result_mask |= STATX_TYPE;
  1078. }
  1079. return 0;
  1080. }
  1081. static int fuse_do_getattr(struct mnt_idmap *idmap, struct inode *inode,
  1082. struct kstat *stat, struct file *file)
  1083. {
  1084. int err;
  1085. struct fuse_getattr_in inarg;
  1086. struct fuse_attr_out outarg;
  1087. struct fuse_mount *fm = get_fuse_mount(inode);
  1088. FUSE_ARGS(args);
  1089. u64 attr_version;
  1090. attr_version = fuse_get_attr_version(fm->fc);
  1091. memset(&inarg, 0, sizeof(inarg));
  1092. memset(&outarg, 0, sizeof(outarg));
  1093. /* Directories have separate file-handle space */
  1094. if (file && S_ISREG(inode->i_mode)) {
  1095. struct fuse_file *ff = file->private_data;
  1096. inarg.getattr_flags |= FUSE_GETATTR_FH;
  1097. inarg.fh = ff->fh;
  1098. }
  1099. args.opcode = FUSE_GETATTR;
  1100. args.nodeid = get_node_id(inode);
  1101. args.in_numargs = 1;
  1102. args.in_args[0].size = sizeof(inarg);
  1103. args.in_args[0].value = &inarg;
  1104. args.out_numargs = 1;
  1105. args.out_args[0].size = sizeof(outarg);
  1106. args.out_args[0].value = &outarg;
  1107. err = fuse_simple_request(fm, &args);
  1108. if (!err) {
  1109. if (fuse_invalid_attr(&outarg.attr) ||
  1110. inode_wrong_type(inode, outarg.attr.mode)) {
  1111. fuse_make_bad(inode);
  1112. err = -EIO;
  1113. } else {
  1114. fuse_change_attributes(inode, &outarg.attr, NULL,
  1115. ATTR_TIMEOUT(&outarg),
  1116. attr_version);
  1117. if (stat)
  1118. fuse_fillattr(idmap, inode, &outarg.attr, stat);
  1119. }
  1120. }
  1121. return err;
  1122. }
  1123. static int fuse_update_get_attr(struct mnt_idmap *idmap, struct inode *inode,
  1124. struct file *file, struct kstat *stat,
  1125. u32 request_mask, unsigned int flags)
  1126. {
  1127. struct fuse_inode *fi = get_fuse_inode(inode);
  1128. struct fuse_conn *fc = get_fuse_conn(inode);
  1129. int err = 0;
  1130. bool sync;
  1131. u32 inval_mask = READ_ONCE(fi->inval_mask);
  1132. u32 cache_mask = fuse_get_cache_mask(inode);
  1133. /* FUSE only supports basic stats and possibly btime */
  1134. request_mask &= STATX_BASIC_STATS | STATX_BTIME;
  1135. retry:
  1136. if (fc->no_statx)
  1137. request_mask &= STATX_BASIC_STATS;
  1138. if (!request_mask)
  1139. sync = false;
  1140. else if (flags & AT_STATX_FORCE_SYNC)
  1141. sync = true;
  1142. else if (flags & AT_STATX_DONT_SYNC)
  1143. sync = false;
  1144. else if (request_mask & inval_mask & ~cache_mask)
  1145. sync = true;
  1146. else
  1147. sync = time_before64(fi->i_time, get_jiffies_64());
  1148. if (sync) {
  1149. forget_all_cached_acls(inode);
  1150. /* Try statx if BTIME is requested */
  1151. if (!fc->no_statx && (request_mask & ~STATX_BASIC_STATS)) {
  1152. err = fuse_do_statx(idmap, inode, file, stat);
  1153. if (err == -ENOSYS) {
  1154. fc->no_statx = 1;
  1155. err = 0;
  1156. goto retry;
  1157. }
  1158. } else {
  1159. err = fuse_do_getattr(idmap, inode, stat, file);
  1160. }
  1161. } else if (stat) {
  1162. generic_fillattr(idmap, request_mask, inode, stat);
  1163. stat->mode = fi->orig_i_mode;
  1164. stat->ino = fi->orig_ino;
  1165. if (test_bit(FUSE_I_BTIME, &fi->state)) {
  1166. stat->btime = fi->i_btime;
  1167. stat->result_mask |= STATX_BTIME;
  1168. }
  1169. }
  1170. return err;
  1171. }
  1172. int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask)
  1173. {
  1174. return fuse_update_get_attr(&nop_mnt_idmap, inode, file, NULL, mask, 0);
  1175. }
  1176. int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
  1177. u64 child_nodeid, struct qstr *name, u32 flags)
  1178. {
  1179. int err = -ENOTDIR;
  1180. struct inode *parent;
  1181. struct dentry *dir;
  1182. struct dentry *entry;
  1183. parent = fuse_ilookup(fc, parent_nodeid, NULL);
  1184. if (!parent)
  1185. return -ENOENT;
  1186. inode_lock_nested(parent, I_MUTEX_PARENT);
  1187. if (!S_ISDIR(parent->i_mode))
  1188. goto unlock;
  1189. err = -ENOENT;
  1190. dir = d_find_alias(parent);
  1191. if (!dir)
  1192. goto unlock;
  1193. name->hash = full_name_hash(dir, name->name, name->len);
  1194. entry = d_lookup(dir, name);
  1195. dput(dir);
  1196. if (!entry)
  1197. goto unlock;
  1198. fuse_dir_changed(parent);
  1199. if (!(flags & FUSE_EXPIRE_ONLY))
  1200. d_invalidate(entry);
  1201. fuse_invalidate_entry_cache(entry);
  1202. if (child_nodeid != 0 && d_really_is_positive(entry)) {
  1203. inode_lock(d_inode(entry));
  1204. if (get_node_id(d_inode(entry)) != child_nodeid) {
  1205. err = -ENOENT;
  1206. goto badentry;
  1207. }
  1208. if (d_mountpoint(entry)) {
  1209. err = -EBUSY;
  1210. goto badentry;
  1211. }
  1212. if (d_is_dir(entry)) {
  1213. shrink_dcache_parent(entry);
  1214. if (!simple_empty(entry)) {
  1215. err = -ENOTEMPTY;
  1216. goto badentry;
  1217. }
  1218. d_inode(entry)->i_flags |= S_DEAD;
  1219. }
  1220. dont_mount(entry);
  1221. clear_nlink(d_inode(entry));
  1222. err = 0;
  1223. badentry:
  1224. inode_unlock(d_inode(entry));
  1225. if (!err)
  1226. d_delete(entry);
  1227. } else {
  1228. err = 0;
  1229. }
  1230. dput(entry);
  1231. unlock:
  1232. inode_unlock(parent);
  1233. iput(parent);
  1234. return err;
  1235. }
  1236. static inline bool fuse_permissible_uidgid(struct fuse_conn *fc)
  1237. {
  1238. const struct cred *cred = current_cred();
  1239. return (uid_eq(cred->euid, fc->user_id) &&
  1240. uid_eq(cred->suid, fc->user_id) &&
  1241. uid_eq(cred->uid, fc->user_id) &&
  1242. gid_eq(cred->egid, fc->group_id) &&
  1243. gid_eq(cred->sgid, fc->group_id) &&
  1244. gid_eq(cred->gid, fc->group_id));
  1245. }
  1246. /*
  1247. * Calling into a user-controlled filesystem gives the filesystem
  1248. * daemon ptrace-like capabilities over the current process. This
  1249. * means, that the filesystem daemon is able to record the exact
  1250. * filesystem operations performed, and can also control the behavior
  1251. * of the requester process in otherwise impossible ways. For example
  1252. * it can delay the operation for arbitrary length of time allowing
  1253. * DoS against the requester.
  1254. *
  1255. * For this reason only those processes can call into the filesystem,
  1256. * for which the owner of the mount has ptrace privilege. This
  1257. * excludes processes started by other users, suid or sgid processes.
  1258. */
  1259. bool fuse_allow_current_process(struct fuse_conn *fc)
  1260. {
  1261. bool allow;
  1262. if (fc->allow_other)
  1263. allow = current_in_userns(fc->user_ns);
  1264. else
  1265. allow = fuse_permissible_uidgid(fc);
  1266. if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN))
  1267. allow = true;
  1268. return allow;
  1269. }
  1270. static int fuse_access(struct inode *inode, int mask)
  1271. {
  1272. struct fuse_mount *fm = get_fuse_mount(inode);
  1273. FUSE_ARGS(args);
  1274. struct fuse_access_in inarg;
  1275. int err;
  1276. BUG_ON(mask & MAY_NOT_BLOCK);
  1277. /*
  1278. * We should not send FUSE_ACCESS to the userspace
  1279. * when idmapped mounts are enabled as for this case
  1280. * we have fc->default_permissions = 1 and access
  1281. * permission checks are done on the kernel side.
  1282. */
  1283. WARN_ON_ONCE(!(fm->sb->s_iflags & SB_I_NOIDMAP));
  1284. if (fm->fc->no_access)
  1285. return 0;
  1286. memset(&inarg, 0, sizeof(inarg));
  1287. inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
  1288. args.opcode = FUSE_ACCESS;
  1289. args.nodeid = get_node_id(inode);
  1290. args.in_numargs = 1;
  1291. args.in_args[0].size = sizeof(inarg);
  1292. args.in_args[0].value = &inarg;
  1293. err = fuse_simple_request(fm, &args);
  1294. if (err == -ENOSYS) {
  1295. fm->fc->no_access = 1;
  1296. err = 0;
  1297. }
  1298. return err;
  1299. }
  1300. static int fuse_perm_getattr(struct inode *inode, int mask)
  1301. {
  1302. if (mask & MAY_NOT_BLOCK)
  1303. return -ECHILD;
  1304. forget_all_cached_acls(inode);
  1305. return fuse_do_getattr(&nop_mnt_idmap, inode, NULL, NULL);
  1306. }
  1307. /*
  1308. * Check permission. The two basic access models of FUSE are:
  1309. *
  1310. * 1) Local access checking ('default_permissions' mount option) based
  1311. * on file mode. This is the plain old disk filesystem permission
  1312. * model.
  1313. *
  1314. * 2) "Remote" access checking, where server is responsible for
  1315. * checking permission in each inode operation. An exception to this
  1316. * is if ->permission() was invoked from sys_access() in which case an
  1317. * access request is sent. Execute permission is still checked
  1318. * locally based on file mode.
  1319. */
  1320. static int fuse_permission(struct mnt_idmap *idmap,
  1321. struct inode *inode, int mask)
  1322. {
  1323. struct fuse_conn *fc = get_fuse_conn(inode);
  1324. bool refreshed = false;
  1325. int err = 0;
  1326. if (fuse_is_bad(inode))
  1327. return -EIO;
  1328. if (!fuse_allow_current_process(fc))
  1329. return -EACCES;
  1330. /*
  1331. * If attributes are needed, refresh them before proceeding
  1332. */
  1333. if (fc->default_permissions ||
  1334. ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
  1335. struct fuse_inode *fi = get_fuse_inode(inode);
  1336. u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
  1337. if (perm_mask & READ_ONCE(fi->inval_mask) ||
  1338. time_before64(fi->i_time, get_jiffies_64())) {
  1339. refreshed = true;
  1340. err = fuse_perm_getattr(inode, mask);
  1341. if (err)
  1342. return err;
  1343. }
  1344. }
  1345. if (fc->default_permissions) {
  1346. err = generic_permission(idmap, inode, mask);
  1347. /* If permission is denied, try to refresh file
  1348. attributes. This is also needed, because the root
  1349. node will at first have no permissions */
  1350. if (err == -EACCES && !refreshed) {
  1351. err = fuse_perm_getattr(inode, mask);
  1352. if (!err)
  1353. err = generic_permission(idmap,
  1354. inode, mask);
  1355. }
  1356. /* Note: the opposite of the above test does not
  1357. exist. So if permissions are revoked this won't be
  1358. noticed immediately, only after the attribute
  1359. timeout has expired */
  1360. } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
  1361. err = fuse_access(inode, mask);
  1362. } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
  1363. if (!(inode->i_mode & S_IXUGO)) {
  1364. if (refreshed)
  1365. return -EACCES;
  1366. err = fuse_perm_getattr(inode, mask);
  1367. if (!err && !(inode->i_mode & S_IXUGO))
  1368. return -EACCES;
  1369. }
  1370. }
  1371. return err;
  1372. }
  1373. static int fuse_readlink_page(struct inode *inode, struct page *page)
  1374. {
  1375. struct fuse_mount *fm = get_fuse_mount(inode);
  1376. struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
  1377. struct fuse_args_pages ap = {
  1378. .num_pages = 1,
  1379. .pages = &page,
  1380. .descs = &desc,
  1381. };
  1382. char *link;
  1383. ssize_t res;
  1384. ap.args.opcode = FUSE_READLINK;
  1385. ap.args.nodeid = get_node_id(inode);
  1386. ap.args.out_pages = true;
  1387. ap.args.out_argvar = true;
  1388. ap.args.page_zeroing = true;
  1389. ap.args.out_numargs = 1;
  1390. ap.args.out_args[0].size = desc.length;
  1391. res = fuse_simple_request(fm, &ap.args);
  1392. fuse_invalidate_atime(inode);
  1393. if (res < 0)
  1394. return res;
  1395. if (WARN_ON(res >= PAGE_SIZE))
  1396. return -EIO;
  1397. link = page_address(page);
  1398. link[res] = '\0';
  1399. return 0;
  1400. }
  1401. static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
  1402. struct delayed_call *callback)
  1403. {
  1404. struct fuse_conn *fc = get_fuse_conn(inode);
  1405. struct page *page;
  1406. int err;
  1407. err = -EIO;
  1408. if (fuse_is_bad(inode))
  1409. goto out_err;
  1410. if (fc->cache_symlinks)
  1411. return page_get_link_raw(dentry, inode, callback);
  1412. err = -ECHILD;
  1413. if (!dentry)
  1414. goto out_err;
  1415. page = alloc_page(GFP_KERNEL);
  1416. err = -ENOMEM;
  1417. if (!page)
  1418. goto out_err;
  1419. err = fuse_readlink_page(inode, page);
  1420. if (err) {
  1421. __free_page(page);
  1422. goto out_err;
  1423. }
  1424. set_delayed_call(callback, page_put_link, page);
  1425. return page_address(page);
  1426. out_err:
  1427. return ERR_PTR(err);
  1428. }
  1429. static int fuse_dir_open(struct inode *inode, struct file *file)
  1430. {
  1431. struct fuse_mount *fm = get_fuse_mount(inode);
  1432. int err;
  1433. if (fuse_is_bad(inode))
  1434. return -EIO;
  1435. err = generic_file_open(inode, file);
  1436. if (err)
  1437. return err;
  1438. err = fuse_do_open(fm, get_node_id(inode), file, true);
  1439. if (!err) {
  1440. struct fuse_file *ff = file->private_data;
  1441. /*
  1442. * Keep handling FOPEN_STREAM and FOPEN_NONSEEKABLE for
  1443. * directories for backward compatibility, though it's unlikely
  1444. * to be useful.
  1445. */
  1446. if (ff->open_flags & (FOPEN_STREAM | FOPEN_NONSEEKABLE))
  1447. nonseekable_open(inode, file);
  1448. if (!(ff->open_flags & FOPEN_KEEP_CACHE))
  1449. invalidate_inode_pages2(inode->i_mapping);
  1450. }
  1451. return err;
  1452. }
  1453. static int fuse_dir_release(struct inode *inode, struct file *file)
  1454. {
  1455. fuse_release_common(file, true);
  1456. return 0;
  1457. }
  1458. static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
  1459. int datasync)
  1460. {
  1461. struct inode *inode = file->f_mapping->host;
  1462. struct fuse_conn *fc = get_fuse_conn(inode);
  1463. int err;
  1464. if (fuse_is_bad(inode))
  1465. return -EIO;
  1466. if (fc->no_fsyncdir)
  1467. return 0;
  1468. inode_lock(inode);
  1469. err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
  1470. if (err == -ENOSYS) {
  1471. fc->no_fsyncdir = 1;
  1472. err = 0;
  1473. }
  1474. inode_unlock(inode);
  1475. return err;
  1476. }
  1477. static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
  1478. unsigned long arg)
  1479. {
  1480. struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
  1481. /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
  1482. if (fc->minor < 18)
  1483. return -ENOTTY;
  1484. return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
  1485. }
  1486. static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
  1487. unsigned long arg)
  1488. {
  1489. struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
  1490. if (fc->minor < 18)
  1491. return -ENOTTY;
  1492. return fuse_ioctl_common(file, cmd, arg,
  1493. FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
  1494. }
  1495. static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
  1496. {
  1497. /* Always update if mtime is explicitly set */
  1498. if (ivalid & ATTR_MTIME_SET)
  1499. return true;
  1500. /* Or if kernel i_mtime is the official one */
  1501. if (trust_local_mtime)
  1502. return true;
  1503. /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
  1504. if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
  1505. return false;
  1506. /* In all other cases update */
  1507. return true;
  1508. }
  1509. static void iattr_to_fattr(struct mnt_idmap *idmap, struct fuse_conn *fc,
  1510. struct iattr *iattr, struct fuse_setattr_in *arg,
  1511. bool trust_local_cmtime)
  1512. {
  1513. unsigned ivalid = iattr->ia_valid;
  1514. if (ivalid & ATTR_MODE)
  1515. arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
  1516. if (ivalid & ATTR_UID) {
  1517. kuid_t fsuid = from_vfsuid(idmap, fc->user_ns, iattr->ia_vfsuid);
  1518. arg->valid |= FATTR_UID;
  1519. arg->uid = from_kuid(fc->user_ns, fsuid);
  1520. }
  1521. if (ivalid & ATTR_GID) {
  1522. kgid_t fsgid = from_vfsgid(idmap, fc->user_ns, iattr->ia_vfsgid);
  1523. arg->valid |= FATTR_GID;
  1524. arg->gid = from_kgid(fc->user_ns, fsgid);
  1525. }
  1526. if (ivalid & ATTR_SIZE)
  1527. arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
  1528. if (ivalid & ATTR_ATIME) {
  1529. arg->valid |= FATTR_ATIME;
  1530. arg->atime = iattr->ia_atime.tv_sec;
  1531. arg->atimensec = iattr->ia_atime.tv_nsec;
  1532. if (!(ivalid & ATTR_ATIME_SET))
  1533. arg->valid |= FATTR_ATIME_NOW;
  1534. }
  1535. if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
  1536. arg->valid |= FATTR_MTIME;
  1537. arg->mtime = iattr->ia_mtime.tv_sec;
  1538. arg->mtimensec = iattr->ia_mtime.tv_nsec;
  1539. if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
  1540. arg->valid |= FATTR_MTIME_NOW;
  1541. }
  1542. if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
  1543. arg->valid |= FATTR_CTIME;
  1544. arg->ctime = iattr->ia_ctime.tv_sec;
  1545. arg->ctimensec = iattr->ia_ctime.tv_nsec;
  1546. }
  1547. }
  1548. /*
  1549. * Prevent concurrent writepages on inode
  1550. *
  1551. * This is done by adding a negative bias to the inode write counter
  1552. * and waiting for all pending writes to finish.
  1553. */
  1554. void fuse_set_nowrite(struct inode *inode)
  1555. {
  1556. struct fuse_inode *fi = get_fuse_inode(inode);
  1557. BUG_ON(!inode_is_locked(inode));
  1558. spin_lock(&fi->lock);
  1559. BUG_ON(fi->writectr < 0);
  1560. fi->writectr += FUSE_NOWRITE;
  1561. spin_unlock(&fi->lock);
  1562. wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
  1563. }
  1564. /*
  1565. * Allow writepages on inode
  1566. *
  1567. * Remove the bias from the writecounter and send any queued
  1568. * writepages.
  1569. */
  1570. static void __fuse_release_nowrite(struct inode *inode)
  1571. {
  1572. struct fuse_inode *fi = get_fuse_inode(inode);
  1573. BUG_ON(fi->writectr != FUSE_NOWRITE);
  1574. fi->writectr = 0;
  1575. fuse_flush_writepages(inode);
  1576. }
  1577. void fuse_release_nowrite(struct inode *inode)
  1578. {
  1579. struct fuse_inode *fi = get_fuse_inode(inode);
  1580. spin_lock(&fi->lock);
  1581. __fuse_release_nowrite(inode);
  1582. spin_unlock(&fi->lock);
  1583. }
  1584. static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
  1585. struct inode *inode,
  1586. struct fuse_setattr_in *inarg_p,
  1587. struct fuse_attr_out *outarg_p)
  1588. {
  1589. args->opcode = FUSE_SETATTR;
  1590. args->nodeid = get_node_id(inode);
  1591. args->in_numargs = 1;
  1592. args->in_args[0].size = sizeof(*inarg_p);
  1593. args->in_args[0].value = inarg_p;
  1594. args->out_numargs = 1;
  1595. args->out_args[0].size = sizeof(*outarg_p);
  1596. args->out_args[0].value = outarg_p;
  1597. }
  1598. /*
  1599. * Flush inode->i_mtime to the server
  1600. */
  1601. int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
  1602. {
  1603. struct fuse_mount *fm = get_fuse_mount(inode);
  1604. FUSE_ARGS(args);
  1605. struct fuse_setattr_in inarg;
  1606. struct fuse_attr_out outarg;
  1607. memset(&inarg, 0, sizeof(inarg));
  1608. memset(&outarg, 0, sizeof(outarg));
  1609. inarg.valid = FATTR_MTIME;
  1610. inarg.mtime = inode_get_mtime_sec(inode);
  1611. inarg.mtimensec = inode_get_mtime_nsec(inode);
  1612. if (fm->fc->minor >= 23) {
  1613. inarg.valid |= FATTR_CTIME;
  1614. inarg.ctime = inode_get_ctime_sec(inode);
  1615. inarg.ctimensec = inode_get_ctime_nsec(inode);
  1616. }
  1617. if (ff) {
  1618. inarg.valid |= FATTR_FH;
  1619. inarg.fh = ff->fh;
  1620. }
  1621. fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
  1622. return fuse_simple_request(fm, &args);
  1623. }
  1624. /*
  1625. * Set attributes, and at the same time refresh them.
  1626. *
  1627. * Truncation is slightly complicated, because the 'truncate' request
  1628. * may fail, in which case we don't want to touch the mapping.
  1629. * vmtruncate() doesn't allow for this case, so do the rlimit checking
  1630. * and the actual truncation by hand.
  1631. */
  1632. int fuse_do_setattr(struct mnt_idmap *idmap, struct dentry *dentry,
  1633. struct iattr *attr, struct file *file)
  1634. {
  1635. struct inode *inode = d_inode(dentry);
  1636. struct fuse_mount *fm = get_fuse_mount(inode);
  1637. struct fuse_conn *fc = fm->fc;
  1638. struct fuse_inode *fi = get_fuse_inode(inode);
  1639. struct address_space *mapping = inode->i_mapping;
  1640. FUSE_ARGS(args);
  1641. struct fuse_setattr_in inarg;
  1642. struct fuse_attr_out outarg;
  1643. bool is_truncate = false;
  1644. bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode);
  1645. loff_t oldsize;
  1646. int err;
  1647. bool trust_local_cmtime = is_wb;
  1648. bool fault_blocked = false;
  1649. u64 attr_version;
  1650. if (!fc->default_permissions)
  1651. attr->ia_valid |= ATTR_FORCE;
  1652. err = setattr_prepare(idmap, dentry, attr);
  1653. if (err)
  1654. return err;
  1655. if (attr->ia_valid & ATTR_SIZE) {
  1656. if (WARN_ON(!S_ISREG(inode->i_mode)))
  1657. return -EIO;
  1658. is_truncate = true;
  1659. }
  1660. if (FUSE_IS_DAX(inode) && is_truncate) {
  1661. filemap_invalidate_lock(mapping);
  1662. fault_blocked = true;
  1663. err = fuse_dax_break_layouts(inode, 0, -1);
  1664. if (err) {
  1665. filemap_invalidate_unlock(mapping);
  1666. return err;
  1667. }
  1668. }
  1669. if (attr->ia_valid & ATTR_OPEN) {
  1670. /* This is coming from open(..., ... | O_TRUNC); */
  1671. WARN_ON(!(attr->ia_valid & ATTR_SIZE));
  1672. WARN_ON(attr->ia_size != 0);
  1673. if (fc->atomic_o_trunc) {
  1674. /*
  1675. * No need to send request to userspace, since actual
  1676. * truncation has already been done by OPEN. But still
  1677. * need to truncate page cache.
  1678. */
  1679. i_size_write(inode, 0);
  1680. truncate_pagecache(inode, 0);
  1681. goto out;
  1682. }
  1683. file = NULL;
  1684. }
  1685. /* Flush dirty data/metadata before non-truncate SETATTR */
  1686. if (is_wb &&
  1687. attr->ia_valid &
  1688. (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
  1689. ATTR_TIMES_SET)) {
  1690. err = write_inode_now(inode, true);
  1691. if (err)
  1692. return err;
  1693. fuse_set_nowrite(inode);
  1694. fuse_release_nowrite(inode);
  1695. }
  1696. if (is_truncate) {
  1697. fuse_set_nowrite(inode);
  1698. set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
  1699. if (trust_local_cmtime && attr->ia_size != inode->i_size)
  1700. attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
  1701. }
  1702. memset(&inarg, 0, sizeof(inarg));
  1703. memset(&outarg, 0, sizeof(outarg));
  1704. iattr_to_fattr(idmap, fc, attr, &inarg, trust_local_cmtime);
  1705. if (file) {
  1706. struct fuse_file *ff = file->private_data;
  1707. inarg.valid |= FATTR_FH;
  1708. inarg.fh = ff->fh;
  1709. }
  1710. /* Kill suid/sgid for non-directory chown unconditionally */
  1711. if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
  1712. attr->ia_valid & (ATTR_UID | ATTR_GID))
  1713. inarg.valid |= FATTR_KILL_SUIDGID;
  1714. if (attr->ia_valid & ATTR_SIZE) {
  1715. /* For mandatory locking in truncate */
  1716. inarg.valid |= FATTR_LOCKOWNER;
  1717. inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
  1718. /* Kill suid/sgid for truncate only if no CAP_FSETID */
  1719. if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
  1720. inarg.valid |= FATTR_KILL_SUIDGID;
  1721. }
  1722. attr_version = fuse_get_attr_version(fm->fc);
  1723. fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
  1724. err = fuse_simple_request(fm, &args);
  1725. if (err) {
  1726. if (err == -EINTR)
  1727. fuse_invalidate_attr(inode);
  1728. goto error;
  1729. }
  1730. if (fuse_invalid_attr(&outarg.attr) ||
  1731. inode_wrong_type(inode, outarg.attr.mode)) {
  1732. fuse_make_bad(inode);
  1733. err = -EIO;
  1734. goto error;
  1735. }
  1736. spin_lock(&fi->lock);
  1737. /* the kernel maintains i_mtime locally */
  1738. if (trust_local_cmtime) {
  1739. if (attr->ia_valid & ATTR_MTIME)
  1740. inode_set_mtime_to_ts(inode, attr->ia_mtime);
  1741. if (attr->ia_valid & ATTR_CTIME)
  1742. inode_set_ctime_to_ts(inode, attr->ia_ctime);
  1743. /* FIXME: clear I_DIRTY_SYNC? */
  1744. }
  1745. if (fi->attr_version > attr_version) {
  1746. /*
  1747. * Apply attributes, for example for fsnotify_change(), but set
  1748. * attribute timeout to zero.
  1749. */
  1750. outarg.attr_valid = outarg.attr_valid_nsec = 0;
  1751. }
  1752. fuse_change_attributes_common(inode, &outarg.attr, NULL,
  1753. ATTR_TIMEOUT(&outarg),
  1754. fuse_get_cache_mask(inode));
  1755. oldsize = inode->i_size;
  1756. /* see the comment in fuse_change_attributes() */
  1757. if (!is_wb || is_truncate)
  1758. i_size_write(inode, outarg.attr.size);
  1759. if (is_truncate) {
  1760. /* NOTE: this may release/reacquire fi->lock */
  1761. __fuse_release_nowrite(inode);
  1762. }
  1763. spin_unlock(&fi->lock);
  1764. /*
  1765. * Only call invalidate_inode_pages2() after removing
  1766. * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock.
  1767. */
  1768. if ((is_truncate || !is_wb) &&
  1769. S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
  1770. truncate_pagecache(inode, outarg.attr.size);
  1771. invalidate_inode_pages2(mapping);
  1772. }
  1773. clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
  1774. out:
  1775. if (fault_blocked)
  1776. filemap_invalidate_unlock(mapping);
  1777. return 0;
  1778. error:
  1779. if (is_truncate)
  1780. fuse_release_nowrite(inode);
  1781. clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
  1782. if (fault_blocked)
  1783. filemap_invalidate_unlock(mapping);
  1784. return err;
  1785. }
  1786. static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry,
  1787. struct iattr *attr)
  1788. {
  1789. struct inode *inode = d_inode(entry);
  1790. struct fuse_conn *fc = get_fuse_conn(inode);
  1791. struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
  1792. int ret;
  1793. if (fuse_is_bad(inode))
  1794. return -EIO;
  1795. if (!fuse_allow_current_process(get_fuse_conn(inode)))
  1796. return -EACCES;
  1797. if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
  1798. attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
  1799. ATTR_MODE);
  1800. /*
  1801. * The only sane way to reliably kill suid/sgid is to do it in
  1802. * the userspace filesystem
  1803. *
  1804. * This should be done on write(), truncate() and chown().
  1805. */
  1806. if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
  1807. /*
  1808. * ia_mode calculation may have used stale i_mode.
  1809. * Refresh and recalculate.
  1810. */
  1811. ret = fuse_do_getattr(idmap, inode, NULL, file);
  1812. if (ret)
  1813. return ret;
  1814. attr->ia_mode = inode->i_mode;
  1815. if (inode->i_mode & S_ISUID) {
  1816. attr->ia_valid |= ATTR_MODE;
  1817. attr->ia_mode &= ~S_ISUID;
  1818. }
  1819. if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
  1820. attr->ia_valid |= ATTR_MODE;
  1821. attr->ia_mode &= ~S_ISGID;
  1822. }
  1823. }
  1824. }
  1825. if (!attr->ia_valid)
  1826. return 0;
  1827. ret = fuse_do_setattr(idmap, entry, attr, file);
  1828. if (!ret) {
  1829. /*
  1830. * If filesystem supports acls it may have updated acl xattrs in
  1831. * the filesystem, so forget cached acls for the inode.
  1832. */
  1833. if (fc->posix_acl)
  1834. forget_all_cached_acls(inode);
  1835. /* Directory mode changed, may need to revalidate access */
  1836. if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
  1837. fuse_invalidate_entry_cache(entry);
  1838. }
  1839. return ret;
  1840. }
  1841. static int fuse_getattr(struct mnt_idmap *idmap,
  1842. const struct path *path, struct kstat *stat,
  1843. u32 request_mask, unsigned int flags)
  1844. {
  1845. struct inode *inode = d_inode(path->dentry);
  1846. struct fuse_conn *fc = get_fuse_conn(inode);
  1847. if (fuse_is_bad(inode))
  1848. return -EIO;
  1849. if (!fuse_allow_current_process(fc)) {
  1850. if (!request_mask) {
  1851. /*
  1852. * If user explicitly requested *nothing* then don't
  1853. * error out, but return st_dev only.
  1854. */
  1855. stat->result_mask = 0;
  1856. stat->dev = inode->i_sb->s_dev;
  1857. return 0;
  1858. }
  1859. return -EACCES;
  1860. }
  1861. return fuse_update_get_attr(idmap, inode, NULL, stat, request_mask, flags);
  1862. }
  1863. static const struct inode_operations fuse_dir_inode_operations = {
  1864. .lookup = fuse_lookup,
  1865. .mkdir = fuse_mkdir,
  1866. .symlink = fuse_symlink,
  1867. .unlink = fuse_unlink,
  1868. .rmdir = fuse_rmdir,
  1869. .rename = fuse_rename2,
  1870. .link = fuse_link,
  1871. .setattr = fuse_setattr,
  1872. .create = fuse_create,
  1873. .atomic_open = fuse_atomic_open,
  1874. .tmpfile = fuse_tmpfile,
  1875. .mknod = fuse_mknod,
  1876. .permission = fuse_permission,
  1877. .getattr = fuse_getattr,
  1878. .listxattr = fuse_listxattr,
  1879. .get_inode_acl = fuse_get_inode_acl,
  1880. .get_acl = fuse_get_acl,
  1881. .set_acl = fuse_set_acl,
  1882. .fileattr_get = fuse_fileattr_get,
  1883. .fileattr_set = fuse_fileattr_set,
  1884. };
  1885. static const struct file_operations fuse_dir_operations = {
  1886. .llseek = generic_file_llseek,
  1887. .read = generic_read_dir,
  1888. .iterate_shared = fuse_readdir,
  1889. .open = fuse_dir_open,
  1890. .release = fuse_dir_release,
  1891. .fsync = fuse_dir_fsync,
  1892. .unlocked_ioctl = fuse_dir_ioctl,
  1893. .compat_ioctl = fuse_dir_compat_ioctl,
  1894. };
  1895. static const struct inode_operations fuse_common_inode_operations = {
  1896. .setattr = fuse_setattr,
  1897. .permission = fuse_permission,
  1898. .getattr = fuse_getattr,
  1899. .listxattr = fuse_listxattr,
  1900. .get_inode_acl = fuse_get_inode_acl,
  1901. .get_acl = fuse_get_acl,
  1902. .set_acl = fuse_set_acl,
  1903. .fileattr_get = fuse_fileattr_get,
  1904. .fileattr_set = fuse_fileattr_set,
  1905. };
  1906. static const struct inode_operations fuse_symlink_inode_operations = {
  1907. .setattr = fuse_setattr,
  1908. .get_link = fuse_get_link,
  1909. .getattr = fuse_getattr,
  1910. .listxattr = fuse_listxattr,
  1911. };
  1912. void fuse_init_common(struct inode *inode)
  1913. {
  1914. inode->i_op = &fuse_common_inode_operations;
  1915. }
  1916. void fuse_init_dir(struct inode *inode)
  1917. {
  1918. struct fuse_inode *fi = get_fuse_inode(inode);
  1919. inode->i_op = &fuse_dir_inode_operations;
  1920. inode->i_fop = &fuse_dir_operations;
  1921. spin_lock_init(&fi->rdc.lock);
  1922. fi->rdc.cached = false;
  1923. fi->rdc.size = 0;
  1924. fi->rdc.pos = 0;
  1925. fi->rdc.version = 0;
  1926. }
  1927. static int fuse_symlink_read_folio(struct file *null, struct folio *folio)
  1928. {
  1929. int err = fuse_readlink_page(folio->mapping->host, &folio->page);
  1930. if (!err)
  1931. folio_mark_uptodate(folio);
  1932. folio_unlock(folio);
  1933. return err;
  1934. }
  1935. static const struct address_space_operations fuse_symlink_aops = {
  1936. .read_folio = fuse_symlink_read_folio,
  1937. };
  1938. void fuse_init_symlink(struct inode *inode)
  1939. {
  1940. inode->i_op = &fuse_symlink_inode_operations;
  1941. inode->i_data.a_ops = &fuse_symlink_aops;
  1942. inode_nohighmem(inode);
  1943. }