| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396 |
- /*
- FUSE: Filesystem in Userspace
- Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
- This program can be distributed under the terms of the GNU GPL.
- See the file COPYING.
- */
- #include "fuse_i.h"
- #include <linux/pagemap.h>
- #include <linux/slab.h>
- #include <linux/kernel.h>
- #include <linux/sched.h>
- #include <linux/sched/signal.h>
- #include <linux/module.h>
- #include <linux/swap.h>
- #include <linux/falloc.h>
- #include <linux/uio.h>
- #include <linux/fs.h>
- #include <linux/filelock.h>
- #include <linux/splice.h>
- #include <linux/task_io_accounting_ops.h>
- static int fuse_send_open(struct fuse_mount *fm, u64 nodeid,
- unsigned int open_flags, int opcode,
- struct fuse_open_out *outargp)
- {
- struct fuse_open_in inarg;
- FUSE_ARGS(args);
- memset(&inarg, 0, sizeof(inarg));
- inarg.flags = open_flags & ~(O_CREAT | O_EXCL | O_NOCTTY);
- if (!fm->fc->atomic_o_trunc)
- inarg.flags &= ~O_TRUNC;
- if (fm->fc->handle_killpriv_v2 &&
- (inarg.flags & O_TRUNC) && !capable(CAP_FSETID)) {
- inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
- }
- args.opcode = opcode;
- args.nodeid = nodeid;
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(*outargp);
- args.out_args[0].value = outargp;
- return fuse_simple_request(fm, &args);
- }
- struct fuse_file *fuse_file_alloc(struct fuse_mount *fm, bool release)
- {
- struct fuse_file *ff;
- ff = kzalloc(sizeof(struct fuse_file), GFP_KERNEL_ACCOUNT);
- if (unlikely(!ff))
- return NULL;
- ff->fm = fm;
- if (release) {
- ff->args = kzalloc(sizeof(*ff->args), GFP_KERNEL_ACCOUNT);
- if (!ff->args) {
- kfree(ff);
- return NULL;
- }
- }
- INIT_LIST_HEAD(&ff->write_entry);
- refcount_set(&ff->count, 1);
- RB_CLEAR_NODE(&ff->polled_node);
- init_waitqueue_head(&ff->poll_wait);
- ff->kh = atomic64_inc_return(&fm->fc->khctr);
- return ff;
- }
- void fuse_file_free(struct fuse_file *ff)
- {
- kfree(ff->args);
- kfree(ff);
- }
- static struct fuse_file *fuse_file_get(struct fuse_file *ff)
- {
- refcount_inc(&ff->count);
- return ff;
- }
- static void fuse_release_end(struct fuse_mount *fm, struct fuse_args *args,
- int error)
- {
- struct fuse_release_args *ra = container_of(args, typeof(*ra), args);
- iput(ra->inode);
- kfree(ra);
- }
- static void fuse_file_put(struct fuse_file *ff, bool sync)
- {
- if (refcount_dec_and_test(&ff->count)) {
- struct fuse_release_args *ra = &ff->args->release_args;
- struct fuse_args *args = (ra ? &ra->args : NULL);
- if (ra && ra->inode)
- fuse_file_io_release(ff, ra->inode);
- if (!args) {
- /* Do nothing when server does not implement 'open' */
- } else if (sync) {
- fuse_simple_request(ff->fm, args);
- fuse_release_end(ff->fm, args, 0);
- } else {
- args->end = fuse_release_end;
- if (fuse_simple_background(ff->fm, args,
- GFP_KERNEL | __GFP_NOFAIL))
- fuse_release_end(ff->fm, args, -ENOTCONN);
- }
- kfree(ff);
- }
- }
- struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid,
- unsigned int open_flags, bool isdir)
- {
- struct fuse_conn *fc = fm->fc;
- struct fuse_file *ff;
- int opcode = isdir ? FUSE_OPENDIR : FUSE_OPEN;
- bool open = isdir ? !fc->no_opendir : !fc->no_open;
- ff = fuse_file_alloc(fm, open);
- if (!ff)
- return ERR_PTR(-ENOMEM);
- ff->fh = 0;
- /* Default for no-open */
- ff->open_flags = FOPEN_KEEP_CACHE | (isdir ? FOPEN_CACHE_DIR : 0);
- if (open) {
- /* Store outarg for fuse_finish_open() */
- struct fuse_open_out *outargp = &ff->args->open_outarg;
- int err;
- err = fuse_send_open(fm, nodeid, open_flags, opcode, outargp);
- if (!err) {
- ff->fh = outargp->fh;
- ff->open_flags = outargp->open_flags;
- } else if (err != -ENOSYS) {
- fuse_file_free(ff);
- return ERR_PTR(err);
- } else {
- /* No release needed */
- kfree(ff->args);
- ff->args = NULL;
- if (isdir)
- fc->no_opendir = 1;
- else
- fc->no_open = 1;
- }
- }
- if (isdir)
- ff->open_flags &= ~FOPEN_DIRECT_IO;
- ff->nodeid = nodeid;
- return ff;
- }
- int fuse_do_open(struct fuse_mount *fm, u64 nodeid, struct file *file,
- bool isdir)
- {
- struct fuse_file *ff = fuse_file_open(fm, nodeid, file->f_flags, isdir);
- if (!IS_ERR(ff))
- file->private_data = ff;
- return PTR_ERR_OR_ZERO(ff);
- }
- EXPORT_SYMBOL_GPL(fuse_do_open);
- static void fuse_link_write_file(struct file *file)
- {
- struct inode *inode = file_inode(file);
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_file *ff = file->private_data;
- /*
- * file may be written through mmap, so chain it onto the
- * inodes's write_file list
- */
- spin_lock(&fi->lock);
- if (list_empty(&ff->write_entry))
- list_add(&ff->write_entry, &fi->write_files);
- spin_unlock(&fi->lock);
- }
- int fuse_finish_open(struct inode *inode, struct file *file)
- {
- struct fuse_file *ff = file->private_data;
- struct fuse_conn *fc = get_fuse_conn(inode);
- int err;
- err = fuse_file_io_open(file, inode);
- if (err)
- return err;
- if (ff->open_flags & FOPEN_STREAM)
- stream_open(inode, file);
- else if (ff->open_flags & FOPEN_NONSEEKABLE)
- nonseekable_open(inode, file);
- if ((file->f_mode & FMODE_WRITE) && fc->writeback_cache)
- fuse_link_write_file(file);
- return 0;
- }
- static void fuse_truncate_update_attr(struct inode *inode, struct file *file)
- {
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- spin_lock(&fi->lock);
- fi->attr_version = atomic64_inc_return(&fc->attr_version);
- i_size_write(inode, 0);
- spin_unlock(&fi->lock);
- file_update_time(file);
- fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
- }
- static int fuse_open(struct inode *inode, struct file *file)
- {
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_conn *fc = fm->fc;
- struct fuse_file *ff;
- int err;
- bool is_truncate = (file->f_flags & O_TRUNC) && fc->atomic_o_trunc;
- bool is_wb_truncate = is_truncate && fc->writeback_cache;
- bool dax_truncate = is_truncate && FUSE_IS_DAX(inode);
- if (fuse_is_bad(inode))
- return -EIO;
- err = generic_file_open(inode, file);
- if (err)
- return err;
- if (is_wb_truncate || dax_truncate)
- inode_lock(inode);
- if (dax_truncate) {
- filemap_invalidate_lock(inode->i_mapping);
- err = fuse_dax_break_layouts(inode, 0, -1);
- if (err)
- goto out_inode_unlock;
- }
- if (is_wb_truncate || dax_truncate)
- fuse_set_nowrite(inode);
- err = fuse_do_open(fm, get_node_id(inode), file, false);
- if (!err) {
- ff = file->private_data;
- err = fuse_finish_open(inode, file);
- if (err)
- fuse_sync_release(fi, ff, file->f_flags);
- else if (is_truncate)
- fuse_truncate_update_attr(inode, file);
- }
- if (is_wb_truncate || dax_truncate)
- fuse_release_nowrite(inode);
- if (!err) {
- if (is_truncate)
- truncate_pagecache(inode, 0);
- else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
- invalidate_inode_pages2(inode->i_mapping);
- }
- if (dax_truncate)
- filemap_invalidate_unlock(inode->i_mapping);
- out_inode_unlock:
- if (is_wb_truncate || dax_truncate)
- inode_unlock(inode);
- return err;
- }
- static void fuse_prepare_release(struct fuse_inode *fi, struct fuse_file *ff,
- unsigned int flags, int opcode, bool sync)
- {
- struct fuse_conn *fc = ff->fm->fc;
- struct fuse_release_args *ra = &ff->args->release_args;
- if (fuse_file_passthrough(ff))
- fuse_passthrough_release(ff, fuse_inode_backing(fi));
- /* Inode is NULL on error path of fuse_create_open() */
- if (likely(fi)) {
- spin_lock(&fi->lock);
- list_del(&ff->write_entry);
- spin_unlock(&fi->lock);
- }
- spin_lock(&fc->lock);
- if (!RB_EMPTY_NODE(&ff->polled_node))
- rb_erase(&ff->polled_node, &fc->polled_files);
- spin_unlock(&fc->lock);
- wake_up_interruptible_all(&ff->poll_wait);
- if (!ra)
- return;
- /* ff->args was used for open outarg */
- memset(ff->args, 0, sizeof(*ff->args));
- ra->inarg.fh = ff->fh;
- ra->inarg.flags = flags;
- ra->args.in_numargs = 1;
- ra->args.in_args[0].size = sizeof(struct fuse_release_in);
- ra->args.in_args[0].value = &ra->inarg;
- ra->args.opcode = opcode;
- ra->args.nodeid = ff->nodeid;
- ra->args.force = true;
- ra->args.nocreds = true;
- /*
- * Hold inode until release is finished.
- * From fuse_sync_release() the refcount is 1 and everything's
- * synchronous, so we are fine with not doing igrab() here.
- */
- ra->inode = sync ? NULL : igrab(&fi->inode);
- }
- void fuse_file_release(struct inode *inode, struct fuse_file *ff,
- unsigned int open_flags, fl_owner_t id, bool isdir)
- {
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_release_args *ra = &ff->args->release_args;
- int opcode = isdir ? FUSE_RELEASEDIR : FUSE_RELEASE;
- fuse_prepare_release(fi, ff, open_flags, opcode, false);
- if (ra && ff->flock) {
- ra->inarg.release_flags |= FUSE_RELEASE_FLOCK_UNLOCK;
- ra->inarg.lock_owner = fuse_lock_owner_id(ff->fm->fc, id);
- }
- /*
- * Normally this will send the RELEASE request, however if
- * some asynchronous READ or WRITE requests are outstanding,
- * the sending will be delayed.
- *
- * Make the release synchronous if this is a fuseblk mount,
- * synchronous RELEASE is allowed (and desirable) in this case
- * because the server can be trusted not to screw up.
- *
- * Always use the asynchronous file put because the current thread
- * might be the fuse server. This can happen if a process starts some
- * aio and closes the fd before the aio completes. Since aio takes its
- * own ref to the file, the IO completion has to drop the ref, which is
- * how the fuse server can end up closing its clients' files.
- */
- fuse_file_put(ff, false);
- }
- void fuse_release_common(struct file *file, bool isdir)
- {
- fuse_file_release(file_inode(file), file->private_data, file->f_flags,
- (fl_owner_t) file, isdir);
- }
- static int fuse_release(struct inode *inode, struct file *file)
- {
- struct fuse_conn *fc = get_fuse_conn(inode);
- /*
- * Dirty pages might remain despite write_inode_now() call from
- * fuse_flush() due to writes racing with the close.
- */
- if (fc->writeback_cache)
- write_inode_now(inode, 1);
- fuse_release_common(file, false);
- /* return value is ignored by VFS */
- return 0;
- }
- void fuse_sync_release(struct fuse_inode *fi, struct fuse_file *ff,
- unsigned int flags)
- {
- WARN_ON(refcount_read(&ff->count) > 1);
- fuse_prepare_release(fi, ff, flags, FUSE_RELEASE, true);
- fuse_file_put(ff, true);
- }
- EXPORT_SYMBOL_GPL(fuse_sync_release);
- /*
- * Scramble the ID space with XTEA, so that the value of the files_struct
- * pointer is not exposed to userspace.
- */
- u64 fuse_lock_owner_id(struct fuse_conn *fc, fl_owner_t id)
- {
- u32 *k = fc->scramble_key;
- u64 v = (unsigned long) id;
- u32 v0 = v;
- u32 v1 = v >> 32;
- u32 sum = 0;
- int i;
- for (i = 0; i < 32; i++) {
- v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ (sum + k[sum & 3]);
- sum += 0x9E3779B9;
- v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ (sum + k[sum>>11 & 3]);
- }
- return (u64) v0 + ((u64) v1 << 32);
- }
- struct fuse_writepage_args {
- struct fuse_io_args ia;
- struct rb_node writepages_entry;
- struct list_head queue_entry;
- struct fuse_writepage_args *next;
- struct inode *inode;
- struct fuse_sync_bucket *bucket;
- };
- static struct fuse_writepage_args *fuse_find_writeback(struct fuse_inode *fi,
- pgoff_t idx_from, pgoff_t idx_to)
- {
- struct rb_node *n;
- n = fi->writepages.rb_node;
- while (n) {
- struct fuse_writepage_args *wpa;
- pgoff_t curr_index;
- wpa = rb_entry(n, struct fuse_writepage_args, writepages_entry);
- WARN_ON(get_fuse_inode(wpa->inode) != fi);
- curr_index = wpa->ia.write.in.offset >> PAGE_SHIFT;
- if (idx_from >= curr_index + wpa->ia.ap.num_pages)
- n = n->rb_right;
- else if (idx_to < curr_index)
- n = n->rb_left;
- else
- return wpa;
- }
- return NULL;
- }
- /*
- * Check if any page in a range is under writeback
- */
- static bool fuse_range_is_writeback(struct inode *inode, pgoff_t idx_from,
- pgoff_t idx_to)
- {
- struct fuse_inode *fi = get_fuse_inode(inode);
- bool found;
- if (RB_EMPTY_ROOT(&fi->writepages))
- return false;
- spin_lock(&fi->lock);
- found = fuse_find_writeback(fi, idx_from, idx_to);
- spin_unlock(&fi->lock);
- return found;
- }
- static inline bool fuse_page_is_writeback(struct inode *inode, pgoff_t index)
- {
- return fuse_range_is_writeback(inode, index, index);
- }
- /*
- * Wait for page writeback to be completed.
- *
- * Since fuse doesn't rely on the VM writeback tracking, this has to
- * use some other means.
- */
- static void fuse_wait_on_page_writeback(struct inode *inode, pgoff_t index)
- {
- struct fuse_inode *fi = get_fuse_inode(inode);
- wait_event(fi->page_waitq, !fuse_page_is_writeback(inode, index));
- }
- /*
- * Wait for all pending writepages on the inode to finish.
- *
- * This is currently done by blocking further writes with FUSE_NOWRITE
- * and waiting for all sent writes to complete.
- *
- * This must be called under i_mutex, otherwise the FUSE_NOWRITE usage
- * could conflict with truncation.
- */
- static void fuse_sync_writes(struct inode *inode)
- {
- fuse_set_nowrite(inode);
- fuse_release_nowrite(inode);
- }
- static int fuse_flush(struct file *file, fl_owner_t id)
- {
- struct inode *inode = file_inode(file);
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_file *ff = file->private_data;
- struct fuse_flush_in inarg;
- FUSE_ARGS(args);
- int err;
- if (fuse_is_bad(inode))
- return -EIO;
- if (ff->open_flags & FOPEN_NOFLUSH && !fm->fc->writeback_cache)
- return 0;
- err = write_inode_now(inode, 1);
- if (err)
- return err;
- inode_lock(inode);
- fuse_sync_writes(inode);
- inode_unlock(inode);
- err = filemap_check_errors(file->f_mapping);
- if (err)
- return err;
- err = 0;
- if (fm->fc->no_flush)
- goto inval_attr_out;
- memset(&inarg, 0, sizeof(inarg));
- inarg.fh = ff->fh;
- inarg.lock_owner = fuse_lock_owner_id(fm->fc, id);
- args.opcode = FUSE_FLUSH;
- args.nodeid = get_node_id(inode);
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.force = true;
- err = fuse_simple_request(fm, &args);
- if (err == -ENOSYS) {
- fm->fc->no_flush = 1;
- err = 0;
- }
- inval_attr_out:
- /*
- * In memory i_blocks is not maintained by fuse, if writeback cache is
- * enabled, i_blocks from cached attr may not be accurate.
- */
- if (!err && fm->fc->writeback_cache)
- fuse_invalidate_attr_mask(inode, STATX_BLOCKS);
- return err;
- }
- int fuse_fsync_common(struct file *file, loff_t start, loff_t end,
- int datasync, int opcode)
- {
- struct inode *inode = file->f_mapping->host;
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_file *ff = file->private_data;
- FUSE_ARGS(args);
- struct fuse_fsync_in inarg;
- memset(&inarg, 0, sizeof(inarg));
- inarg.fh = ff->fh;
- inarg.fsync_flags = datasync ? FUSE_FSYNC_FDATASYNC : 0;
- args.opcode = opcode;
- args.nodeid = get_node_id(inode);
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- return fuse_simple_request(fm, &args);
- }
- static int fuse_fsync(struct file *file, loff_t start, loff_t end,
- int datasync)
- {
- struct inode *inode = file->f_mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- int err;
- if (fuse_is_bad(inode))
- return -EIO;
- inode_lock(inode);
- /*
- * Start writeback against all dirty pages of the inode, then
- * wait for all outstanding writes, before sending the FSYNC
- * request.
- */
- err = file_write_and_wait_range(file, start, end);
- if (err)
- goto out;
- fuse_sync_writes(inode);
- /*
- * Due to implementation of fuse writeback
- * file_write_and_wait_range() does not catch errors.
- * We have to do this directly after fuse_sync_writes()
- */
- err = file_check_and_advance_wb_err(file);
- if (err)
- goto out;
- err = sync_inode_metadata(inode, 1);
- if (err)
- goto out;
- if (fc->no_fsync)
- goto out;
- err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNC);
- if (err == -ENOSYS) {
- fc->no_fsync = 1;
- err = 0;
- }
- out:
- inode_unlock(inode);
- return err;
- }
- void fuse_read_args_fill(struct fuse_io_args *ia, struct file *file, loff_t pos,
- size_t count, int opcode)
- {
- struct fuse_file *ff = file->private_data;
- struct fuse_args *args = &ia->ap.args;
- ia->read.in.fh = ff->fh;
- ia->read.in.offset = pos;
- ia->read.in.size = count;
- ia->read.in.flags = file->f_flags;
- args->opcode = opcode;
- args->nodeid = ff->nodeid;
- args->in_numargs = 1;
- args->in_args[0].size = sizeof(ia->read.in);
- args->in_args[0].value = &ia->read.in;
- args->out_argvar = true;
- args->out_numargs = 1;
- args->out_args[0].size = count;
- }
- static void fuse_release_user_pages(struct fuse_args_pages *ap, ssize_t nres,
- bool should_dirty)
- {
- unsigned int i;
- for (i = 0; i < ap->num_pages; i++) {
- if (should_dirty)
- set_page_dirty_lock(ap->pages[i]);
- if (ap->args.is_pinned)
- unpin_user_page(ap->pages[i]);
- }
- if (nres > 0 && ap->args.invalidate_vmap)
- invalidate_kernel_vmap_range(ap->args.vmap_base, nres);
- }
- static void fuse_io_release(struct kref *kref)
- {
- kfree(container_of(kref, struct fuse_io_priv, refcnt));
- }
- static ssize_t fuse_get_res_by_io(struct fuse_io_priv *io)
- {
- if (io->err)
- return io->err;
- if (io->bytes >= 0 && io->write)
- return -EIO;
- return io->bytes < 0 ? io->size : io->bytes;
- }
- /*
- * In case of short read, the caller sets 'pos' to the position of
- * actual end of fuse request in IO request. Otherwise, if bytes_requested
- * == bytes_transferred or rw == WRITE, the caller sets 'pos' to -1.
- *
- * An example:
- * User requested DIO read of 64K. It was split into two 32K fuse requests,
- * both submitted asynchronously. The first of them was ACKed by userspace as
- * fully completed (req->out.args[0].size == 32K) resulting in pos == -1. The
- * second request was ACKed as short, e.g. only 1K was read, resulting in
- * pos == 33K.
- *
- * Thus, when all fuse requests are completed, the minimal non-negative 'pos'
- * will be equal to the length of the longest contiguous fragment of
- * transferred data starting from the beginning of IO request.
- */
- static void fuse_aio_complete(struct fuse_io_priv *io, int err, ssize_t pos)
- {
- int left;
- spin_lock(&io->lock);
- if (err)
- io->err = io->err ? : err;
- else if (pos >= 0 && (io->bytes < 0 || pos < io->bytes))
- io->bytes = pos;
- left = --io->reqs;
- if (!left && io->blocking)
- complete(io->done);
- spin_unlock(&io->lock);
- if (!left && !io->blocking) {
- ssize_t res = fuse_get_res_by_io(io);
- if (res >= 0) {
- struct inode *inode = file_inode(io->iocb->ki_filp);
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- spin_lock(&fi->lock);
- fi->attr_version = atomic64_inc_return(&fc->attr_version);
- spin_unlock(&fi->lock);
- }
- io->iocb->ki_complete(io->iocb, res);
- }
- kref_put(&io->refcnt, fuse_io_release);
- }
- static struct fuse_io_args *fuse_io_alloc(struct fuse_io_priv *io,
- unsigned int npages)
- {
- struct fuse_io_args *ia;
- ia = kzalloc(sizeof(*ia), GFP_KERNEL);
- if (ia) {
- ia->io = io;
- ia->ap.pages = fuse_pages_alloc(npages, GFP_KERNEL,
- &ia->ap.descs);
- if (!ia->ap.pages) {
- kfree(ia);
- ia = NULL;
- }
- }
- return ia;
- }
- static void fuse_io_free(struct fuse_io_args *ia)
- {
- kfree(ia->ap.pages);
- kfree(ia);
- }
- static void fuse_aio_complete_req(struct fuse_mount *fm, struct fuse_args *args,
- int err)
- {
- struct fuse_io_args *ia = container_of(args, typeof(*ia), ap.args);
- struct fuse_io_priv *io = ia->io;
- ssize_t pos = -1;
- size_t nres;
- if (err) {
- /* Nothing */
- } else if (io->write) {
- if (ia->write.out.size > ia->write.in.size) {
- err = -EIO;
- } else {
- nres = ia->write.out.size;
- if (ia->write.in.size != ia->write.out.size)
- pos = ia->write.in.offset - io->offset +
- ia->write.out.size;
- }
- } else {
- u32 outsize = args->out_args[0].size;
- nres = outsize;
- if (ia->read.in.size != outsize)
- pos = ia->read.in.offset - io->offset + outsize;
- }
- fuse_release_user_pages(&ia->ap, err ?: nres, io->should_dirty);
- fuse_aio_complete(io, err, pos);
- fuse_io_free(ia);
- }
- static ssize_t fuse_async_req_send(struct fuse_mount *fm,
- struct fuse_io_args *ia, size_t num_bytes)
- {
- ssize_t err;
- struct fuse_io_priv *io = ia->io;
- spin_lock(&io->lock);
- kref_get(&io->refcnt);
- io->size += num_bytes;
- io->reqs++;
- spin_unlock(&io->lock);
- ia->ap.args.end = fuse_aio_complete_req;
- ia->ap.args.may_block = io->should_dirty;
- err = fuse_simple_background(fm, &ia->ap.args, GFP_KERNEL);
- if (err)
- fuse_aio_complete_req(fm, &ia->ap.args, err);
- return num_bytes;
- }
- static ssize_t fuse_send_read(struct fuse_io_args *ia, loff_t pos, size_t count,
- fl_owner_t owner)
- {
- struct file *file = ia->io->iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct fuse_mount *fm = ff->fm;
- fuse_read_args_fill(ia, file, pos, count, FUSE_READ);
- if (owner != NULL) {
- ia->read.in.read_flags |= FUSE_READ_LOCKOWNER;
- ia->read.in.lock_owner = fuse_lock_owner_id(fm->fc, owner);
- }
- if (ia->io->async)
- return fuse_async_req_send(fm, ia, count);
- return fuse_simple_request(fm, &ia->ap.args);
- }
- static void fuse_read_update_size(struct inode *inode, loff_t size,
- u64 attr_ver)
- {
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- spin_lock(&fi->lock);
- if (attr_ver >= fi->attr_version && size < inode->i_size &&
- !test_bit(FUSE_I_SIZE_UNSTABLE, &fi->state)) {
- fi->attr_version = atomic64_inc_return(&fc->attr_version);
- i_size_write(inode, size);
- }
- spin_unlock(&fi->lock);
- }
- static void fuse_short_read(struct inode *inode, u64 attr_ver, size_t num_read,
- struct fuse_args_pages *ap)
- {
- struct fuse_conn *fc = get_fuse_conn(inode);
- /*
- * If writeback_cache is enabled, a short read means there's a hole in
- * the file. Some data after the hole is in page cache, but has not
- * reached the client fs yet. So the hole is not present there.
- */
- if (!fc->writeback_cache) {
- loff_t pos = page_offset(ap->pages[0]) + num_read;
- fuse_read_update_size(inode, pos, attr_ver);
- }
- }
- static int fuse_do_readpage(struct file *file, struct page *page)
- {
- struct inode *inode = page->mapping->host;
- struct fuse_mount *fm = get_fuse_mount(inode);
- loff_t pos = page_offset(page);
- struct fuse_page_desc desc = { .length = PAGE_SIZE };
- struct fuse_io_args ia = {
- .ap.args.page_zeroing = true,
- .ap.args.out_pages = true,
- .ap.num_pages = 1,
- .ap.pages = &page,
- .ap.descs = &desc,
- };
- ssize_t res;
- u64 attr_ver;
- /*
- * Page writeback can extend beyond the lifetime of the
- * page-cache page, so make sure we read a properly synced
- * page.
- */
- fuse_wait_on_page_writeback(inode, page->index);
- attr_ver = fuse_get_attr_version(fm->fc);
- /* Don't overflow end offset */
- if (pos + (desc.length - 1) == LLONG_MAX)
- desc.length--;
- fuse_read_args_fill(&ia, file, pos, desc.length, FUSE_READ);
- res = fuse_simple_request(fm, &ia.ap.args);
- if (res < 0)
- return res;
- /*
- * Short read means EOF. If file size is larger, truncate it
- */
- if (res < desc.length)
- fuse_short_read(inode, attr_ver, res, &ia.ap);
- SetPageUptodate(page);
- return 0;
- }
- static int fuse_read_folio(struct file *file, struct folio *folio)
- {
- struct page *page = &folio->page;
- struct inode *inode = page->mapping->host;
- int err;
- err = -EIO;
- if (fuse_is_bad(inode))
- goto out;
- err = fuse_do_readpage(file, page);
- fuse_invalidate_atime(inode);
- out:
- unlock_page(page);
- return err;
- }
- static void fuse_readpages_end(struct fuse_mount *fm, struct fuse_args *args,
- int err)
- {
- int i;
- struct fuse_io_args *ia = container_of(args, typeof(*ia), ap.args);
- struct fuse_args_pages *ap = &ia->ap;
- size_t count = ia->read.in.size;
- size_t num_read = args->out_args[0].size;
- struct address_space *mapping = NULL;
- for (i = 0; mapping == NULL && i < ap->num_pages; i++)
- mapping = ap->pages[i]->mapping;
- if (mapping) {
- struct inode *inode = mapping->host;
- /*
- * Short read means EOF. If file size is larger, truncate it
- */
- if (!err && num_read < count)
- fuse_short_read(inode, ia->read.attr_ver, num_read, ap);
- fuse_invalidate_atime(inode);
- }
- for (i = 0; i < ap->num_pages; i++) {
- struct folio *folio = page_folio(ap->pages[i]);
- folio_end_read(folio, !err);
- folio_put(folio);
- }
- if (ia->ff)
- fuse_file_put(ia->ff, false);
- fuse_io_free(ia);
- }
- static void fuse_send_readpages(struct fuse_io_args *ia, struct file *file)
- {
- struct fuse_file *ff = file->private_data;
- struct fuse_mount *fm = ff->fm;
- struct fuse_args_pages *ap = &ia->ap;
- loff_t pos = page_offset(ap->pages[0]);
- size_t count = ap->num_pages << PAGE_SHIFT;
- ssize_t res;
- int err;
- ap->args.out_pages = true;
- ap->args.page_zeroing = true;
- ap->args.page_replace = true;
- /* Don't overflow end offset */
- if (pos + (count - 1) == LLONG_MAX) {
- count--;
- ap->descs[ap->num_pages - 1].length--;
- }
- WARN_ON((loff_t) (pos + count) < 0);
- fuse_read_args_fill(ia, file, pos, count, FUSE_READ);
- ia->read.attr_ver = fuse_get_attr_version(fm->fc);
- if (fm->fc->async_read) {
- ia->ff = fuse_file_get(ff);
- ap->args.end = fuse_readpages_end;
- err = fuse_simple_background(fm, &ap->args, GFP_KERNEL);
- if (!err)
- return;
- } else {
- res = fuse_simple_request(fm, &ap->args);
- err = res < 0 ? res : 0;
- }
- fuse_readpages_end(fm, &ap->args, err);
- }
- static void fuse_readahead(struct readahead_control *rac)
- {
- struct inode *inode = rac->mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- unsigned int i, max_pages, nr_pages = 0;
- if (fuse_is_bad(inode))
- return;
- max_pages = min_t(unsigned int, fc->max_pages,
- fc->max_read / PAGE_SIZE);
- for (;;) {
- struct fuse_io_args *ia;
- struct fuse_args_pages *ap;
- if (fc->num_background >= fc->congestion_threshold &&
- rac->ra->async_size >= readahead_count(rac))
- /*
- * Congested and only async pages left, so skip the
- * rest.
- */
- break;
- nr_pages = readahead_count(rac) - nr_pages;
- if (nr_pages > max_pages)
- nr_pages = max_pages;
- if (nr_pages == 0)
- break;
- ia = fuse_io_alloc(NULL, nr_pages);
- if (!ia)
- return;
- ap = &ia->ap;
- nr_pages = __readahead_batch(rac, ap->pages, nr_pages);
- for (i = 0; i < nr_pages; i++) {
- fuse_wait_on_page_writeback(inode,
- readahead_index(rac) + i);
- ap->descs[i].length = PAGE_SIZE;
- }
- ap->num_pages = nr_pages;
- fuse_send_readpages(ia, rac->file);
- }
- }
- static ssize_t fuse_cache_read_iter(struct kiocb *iocb, struct iov_iter *to)
- {
- struct inode *inode = iocb->ki_filp->f_mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- /*
- * In auto invalidate mode, always update attributes on read.
- * Otherwise, only update if we attempt to read past EOF (to ensure
- * i_size is up to date).
- */
- if (fc->auto_inval_data ||
- (iocb->ki_pos + iov_iter_count(to) > i_size_read(inode))) {
- int err;
- err = fuse_update_attributes(inode, iocb->ki_filp, STATX_SIZE);
- if (err)
- return err;
- }
- return generic_file_read_iter(iocb, to);
- }
- static void fuse_write_args_fill(struct fuse_io_args *ia, struct fuse_file *ff,
- loff_t pos, size_t count)
- {
- struct fuse_args *args = &ia->ap.args;
- ia->write.in.fh = ff->fh;
- ia->write.in.offset = pos;
- ia->write.in.size = count;
- args->opcode = FUSE_WRITE;
- args->nodeid = ff->nodeid;
- args->in_numargs = 2;
- if (ff->fm->fc->minor < 9)
- args->in_args[0].size = FUSE_COMPAT_WRITE_IN_SIZE;
- else
- args->in_args[0].size = sizeof(ia->write.in);
- args->in_args[0].value = &ia->write.in;
- args->in_args[1].size = count;
- args->out_numargs = 1;
- args->out_args[0].size = sizeof(ia->write.out);
- args->out_args[0].value = &ia->write.out;
- }
- static unsigned int fuse_write_flags(struct kiocb *iocb)
- {
- unsigned int flags = iocb->ki_filp->f_flags;
- if (iocb_is_dsync(iocb))
- flags |= O_DSYNC;
- if (iocb->ki_flags & IOCB_SYNC)
- flags |= O_SYNC;
- return flags;
- }
- static ssize_t fuse_send_write(struct fuse_io_args *ia, loff_t pos,
- size_t count, fl_owner_t owner)
- {
- struct kiocb *iocb = ia->io->iocb;
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct fuse_mount *fm = ff->fm;
- struct fuse_write_in *inarg = &ia->write.in;
- ssize_t err;
- fuse_write_args_fill(ia, ff, pos, count);
- inarg->flags = fuse_write_flags(iocb);
- if (owner != NULL) {
- inarg->write_flags |= FUSE_WRITE_LOCKOWNER;
- inarg->lock_owner = fuse_lock_owner_id(fm->fc, owner);
- }
- if (ia->io->async)
- return fuse_async_req_send(fm, ia, count);
- err = fuse_simple_request(fm, &ia->ap.args);
- if (!err && ia->write.out.size > count)
- err = -EIO;
- return err ?: ia->write.out.size;
- }
- bool fuse_write_update_attr(struct inode *inode, loff_t pos, ssize_t written)
- {
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- bool ret = false;
- spin_lock(&fi->lock);
- fi->attr_version = atomic64_inc_return(&fc->attr_version);
- if (written > 0 && pos > inode->i_size) {
- i_size_write(inode, pos);
- ret = true;
- }
- spin_unlock(&fi->lock);
- fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
- return ret;
- }
- static ssize_t fuse_send_write_pages(struct fuse_io_args *ia,
- struct kiocb *iocb, struct inode *inode,
- loff_t pos, size_t count)
- {
- struct fuse_args_pages *ap = &ia->ap;
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct fuse_mount *fm = ff->fm;
- unsigned int offset, i;
- bool short_write;
- int err;
- for (i = 0; i < ap->num_pages; i++)
- fuse_wait_on_page_writeback(inode, ap->pages[i]->index);
- fuse_write_args_fill(ia, ff, pos, count);
- ia->write.in.flags = fuse_write_flags(iocb);
- if (fm->fc->handle_killpriv_v2 && !capable(CAP_FSETID))
- ia->write.in.write_flags |= FUSE_WRITE_KILL_SUIDGID;
- err = fuse_simple_request(fm, &ap->args);
- if (!err && ia->write.out.size > count)
- err = -EIO;
- short_write = ia->write.out.size < count;
- offset = ap->descs[0].offset;
- count = ia->write.out.size;
- for (i = 0; i < ap->num_pages; i++) {
- struct page *page = ap->pages[i];
- if (err) {
- ClearPageUptodate(page);
- } else {
- if (count >= PAGE_SIZE - offset)
- count -= PAGE_SIZE - offset;
- else {
- if (short_write)
- ClearPageUptodate(page);
- count = 0;
- }
- offset = 0;
- }
- if (ia->write.page_locked && (i == ap->num_pages - 1))
- unlock_page(page);
- put_page(page);
- }
- return err;
- }
- static ssize_t fuse_fill_write_pages(struct fuse_io_args *ia,
- struct address_space *mapping,
- struct iov_iter *ii, loff_t pos,
- unsigned int max_pages)
- {
- struct fuse_args_pages *ap = &ia->ap;
- struct fuse_conn *fc = get_fuse_conn(mapping->host);
- unsigned offset = pos & (PAGE_SIZE - 1);
- size_t count = 0;
- int err;
- ap->args.in_pages = true;
- ap->descs[0].offset = offset;
- do {
- size_t tmp;
- struct page *page;
- pgoff_t index = pos >> PAGE_SHIFT;
- size_t bytes = min_t(size_t, PAGE_SIZE - offset,
- iov_iter_count(ii));
- bytes = min_t(size_t, bytes, fc->max_write - count);
- again:
- err = -EFAULT;
- if (fault_in_iov_iter_readable(ii, bytes))
- break;
- err = -ENOMEM;
- page = grab_cache_page_write_begin(mapping, index);
- if (!page)
- break;
- if (mapping_writably_mapped(mapping))
- flush_dcache_page(page);
- tmp = copy_page_from_iter_atomic(page, offset, bytes, ii);
- flush_dcache_page(page);
- if (!tmp) {
- unlock_page(page);
- put_page(page);
- goto again;
- }
- err = 0;
- ap->pages[ap->num_pages] = page;
- ap->descs[ap->num_pages].length = tmp;
- ap->num_pages++;
- count += tmp;
- pos += tmp;
- offset += tmp;
- if (offset == PAGE_SIZE)
- offset = 0;
- /* If we copied full page, mark it uptodate */
- if (tmp == PAGE_SIZE)
- SetPageUptodate(page);
- if (PageUptodate(page)) {
- unlock_page(page);
- } else {
- ia->write.page_locked = true;
- break;
- }
- if (!fc->big_writes)
- break;
- } while (iov_iter_count(ii) && count < fc->max_write &&
- ap->num_pages < max_pages && offset == 0);
- return count > 0 ? count : err;
- }
- static inline unsigned int fuse_wr_pages(loff_t pos, size_t len,
- unsigned int max_pages)
- {
- return min_t(unsigned int,
- ((pos + len - 1) >> PAGE_SHIFT) -
- (pos >> PAGE_SHIFT) + 1,
- max_pages);
- }
- static ssize_t fuse_perform_write(struct kiocb *iocb, struct iov_iter *ii)
- {
- struct address_space *mapping = iocb->ki_filp->f_mapping;
- struct inode *inode = mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- loff_t pos = iocb->ki_pos;
- int err = 0;
- ssize_t res = 0;
- if (inode->i_size < pos + iov_iter_count(ii))
- set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
- do {
- ssize_t count;
- struct fuse_io_args ia = {};
- struct fuse_args_pages *ap = &ia.ap;
- unsigned int nr_pages = fuse_wr_pages(pos, iov_iter_count(ii),
- fc->max_pages);
- ap->pages = fuse_pages_alloc(nr_pages, GFP_KERNEL, &ap->descs);
- if (!ap->pages) {
- err = -ENOMEM;
- break;
- }
- count = fuse_fill_write_pages(&ia, mapping, ii, pos, nr_pages);
- if (count <= 0) {
- err = count;
- } else {
- err = fuse_send_write_pages(&ia, iocb, inode,
- pos, count);
- if (!err) {
- size_t num_written = ia.write.out.size;
- res += num_written;
- pos += num_written;
- /* break out of the loop on short write */
- if (num_written != count)
- err = -EIO;
- }
- }
- kfree(ap->pages);
- } while (!err && iov_iter_count(ii));
- fuse_write_update_attr(inode, pos, res);
- clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
- if (!res)
- return err;
- iocb->ki_pos += res;
- return res;
- }
- static bool fuse_io_past_eof(struct kiocb *iocb, struct iov_iter *iter)
- {
- struct inode *inode = file_inode(iocb->ki_filp);
- return iocb->ki_pos + iov_iter_count(iter) > i_size_read(inode);
- }
- /*
- * @return true if an exclusive lock for direct IO writes is needed
- */
- static bool fuse_dio_wr_exclusive_lock(struct kiocb *iocb, struct iov_iter *from)
- {
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct inode *inode = file_inode(iocb->ki_filp);
- struct fuse_inode *fi = get_fuse_inode(inode);
- /* Server side has to advise that it supports parallel dio writes. */
- if (!(ff->open_flags & FOPEN_PARALLEL_DIRECT_WRITES))
- return true;
- /*
- * Append will need to know the eventual EOF - always needs an
- * exclusive lock.
- */
- if (iocb->ki_flags & IOCB_APPEND)
- return true;
- /* shared locks are not allowed with parallel page cache IO */
- if (test_bit(FUSE_I_CACHE_IO_MODE, &fi->state))
- return true;
- /* Parallel dio beyond EOF is not supported, at least for now. */
- if (fuse_io_past_eof(iocb, from))
- return true;
- return false;
- }
- static void fuse_dio_lock(struct kiocb *iocb, struct iov_iter *from,
- bool *exclusive)
- {
- struct inode *inode = file_inode(iocb->ki_filp);
- struct fuse_inode *fi = get_fuse_inode(inode);
- *exclusive = fuse_dio_wr_exclusive_lock(iocb, from);
- if (*exclusive) {
- inode_lock(inode);
- } else {
- inode_lock_shared(inode);
- /*
- * New parallal dio allowed only if inode is not in caching
- * mode and denies new opens in caching mode. This check
- * should be performed only after taking shared inode lock.
- * Previous past eof check was without inode lock and might
- * have raced, so check it again.
- */
- if (fuse_io_past_eof(iocb, from) ||
- fuse_inode_uncached_io_start(fi, NULL) != 0) {
- inode_unlock_shared(inode);
- inode_lock(inode);
- *exclusive = true;
- }
- }
- }
- static void fuse_dio_unlock(struct kiocb *iocb, bool exclusive)
- {
- struct inode *inode = file_inode(iocb->ki_filp);
- struct fuse_inode *fi = get_fuse_inode(inode);
- if (exclusive) {
- inode_unlock(inode);
- } else {
- /* Allow opens in caching mode after last parallel dio end */
- fuse_inode_uncached_io_end(fi);
- inode_unlock_shared(inode);
- }
- }
- static ssize_t fuse_cache_write_iter(struct kiocb *iocb, struct iov_iter *from)
- {
- struct file *file = iocb->ki_filp;
- struct mnt_idmap *idmap = file_mnt_idmap(file);
- struct address_space *mapping = file->f_mapping;
- ssize_t written = 0;
- struct inode *inode = mapping->host;
- ssize_t err, count;
- struct fuse_conn *fc = get_fuse_conn(inode);
- if (fc->writeback_cache) {
- /* Update size (EOF optimization) and mode (SUID clearing) */
- err = fuse_update_attributes(mapping->host, file,
- STATX_SIZE | STATX_MODE);
- if (err)
- return err;
- if (fc->handle_killpriv_v2 &&
- setattr_should_drop_suidgid(idmap,
- file_inode(file))) {
- goto writethrough;
- }
- return generic_file_write_iter(iocb, from);
- }
- writethrough:
- inode_lock(inode);
- err = count = generic_write_checks(iocb, from);
- if (err <= 0)
- goto out;
- task_io_account_write(count);
- err = file_remove_privs(file);
- if (err)
- goto out;
- err = file_update_time(file);
- if (err)
- goto out;
- if (iocb->ki_flags & IOCB_DIRECT) {
- written = generic_file_direct_write(iocb, from);
- if (written < 0 || !iov_iter_count(from))
- goto out;
- written = direct_write_fallback(iocb, from, written,
- fuse_perform_write(iocb, from));
- } else {
- written = fuse_perform_write(iocb, from);
- }
- out:
- inode_unlock(inode);
- if (written > 0)
- written = generic_write_sync(iocb, written);
- return written ? written : err;
- }
- static inline unsigned long fuse_get_user_addr(const struct iov_iter *ii)
- {
- return (unsigned long)iter_iov(ii)->iov_base + ii->iov_offset;
- }
- static inline size_t fuse_get_frag_size(const struct iov_iter *ii,
- size_t max_size)
- {
- return min(iov_iter_single_seg_count(ii), max_size);
- }
- static int fuse_get_user_pages(struct fuse_args_pages *ap, struct iov_iter *ii,
- size_t *nbytesp, int write,
- unsigned int max_pages,
- bool use_pages_for_kvec_io)
- {
- bool flush_or_invalidate = false;
- size_t nbytes = 0; /* # bytes already packed in req */
- ssize_t ret = 0;
- /* Special case for kernel I/O: can copy directly into the buffer.
- * However if the implementation of fuse_conn requires pages instead of
- * pointer (e.g., virtio-fs), use iov_iter_extract_pages() instead.
- */
- if (iov_iter_is_kvec(ii)) {
- void *user_addr = (void *)fuse_get_user_addr(ii);
- if (!use_pages_for_kvec_io) {
- size_t frag_size = fuse_get_frag_size(ii, *nbytesp);
- if (write)
- ap->args.in_args[1].value = user_addr;
- else
- ap->args.out_args[0].value = user_addr;
- iov_iter_advance(ii, frag_size);
- *nbytesp = frag_size;
- return 0;
- }
- if (is_vmalloc_addr(user_addr)) {
- ap->args.vmap_base = user_addr;
- flush_or_invalidate = true;
- }
- }
- while (nbytes < *nbytesp && ap->num_pages < max_pages) {
- unsigned npages;
- size_t start;
- struct page **pt_pages;
- pt_pages = &ap->pages[ap->num_pages];
- ret = iov_iter_extract_pages(ii, &pt_pages,
- *nbytesp - nbytes,
- max_pages - ap->num_pages,
- 0, &start);
- if (ret < 0)
- break;
- nbytes += ret;
- ret += start;
- npages = DIV_ROUND_UP(ret, PAGE_SIZE);
- ap->descs[ap->num_pages].offset = start;
- fuse_page_descs_length_init(ap->descs, ap->num_pages, npages);
- ap->num_pages += npages;
- ap->descs[ap->num_pages - 1].length -=
- (PAGE_SIZE - ret) & (PAGE_SIZE - 1);
- }
- if (write && flush_or_invalidate)
- flush_kernel_vmap_range(ap->args.vmap_base, nbytes);
- ap->args.invalidate_vmap = !write && flush_or_invalidate;
- ap->args.is_pinned = iov_iter_extract_will_pin(ii);
- ap->args.user_pages = true;
- if (write)
- ap->args.in_pages = true;
- else
- ap->args.out_pages = true;
- *nbytesp = nbytes;
- return ret < 0 ? ret : 0;
- }
- ssize_t fuse_direct_io(struct fuse_io_priv *io, struct iov_iter *iter,
- loff_t *ppos, int flags)
- {
- int write = flags & FUSE_DIO_WRITE;
- int cuse = flags & FUSE_DIO_CUSE;
- struct file *file = io->iocb->ki_filp;
- struct address_space *mapping = file->f_mapping;
- struct inode *inode = mapping->host;
- struct fuse_file *ff = file->private_data;
- struct fuse_conn *fc = ff->fm->fc;
- size_t nmax = write ? fc->max_write : fc->max_read;
- loff_t pos = *ppos;
- size_t count = iov_iter_count(iter);
- pgoff_t idx_from = pos >> PAGE_SHIFT;
- pgoff_t idx_to = (pos + count - 1) >> PAGE_SHIFT;
- ssize_t res = 0;
- int err = 0;
- struct fuse_io_args *ia;
- unsigned int max_pages;
- bool fopen_direct_io = ff->open_flags & FOPEN_DIRECT_IO;
- max_pages = iov_iter_npages(iter, fc->max_pages);
- ia = fuse_io_alloc(io, max_pages);
- if (!ia)
- return -ENOMEM;
- if (fopen_direct_io && fc->direct_io_allow_mmap) {
- res = filemap_write_and_wait_range(mapping, pos, pos + count - 1);
- if (res) {
- fuse_io_free(ia);
- return res;
- }
- }
- if (!cuse && fuse_range_is_writeback(inode, idx_from, idx_to)) {
- if (!write)
- inode_lock(inode);
- fuse_sync_writes(inode);
- if (!write)
- inode_unlock(inode);
- }
- if (fopen_direct_io && write) {
- res = invalidate_inode_pages2_range(mapping, idx_from, idx_to);
- if (res) {
- fuse_io_free(ia);
- return res;
- }
- }
- io->should_dirty = !write && user_backed_iter(iter);
- while (count) {
- ssize_t nres;
- fl_owner_t owner = current->files;
- size_t nbytes = min(count, nmax);
- err = fuse_get_user_pages(&ia->ap, iter, &nbytes, write,
- max_pages, fc->use_pages_for_kvec_io);
- if (err && !nbytes)
- break;
- if (write) {
- if (!capable(CAP_FSETID))
- ia->write.in.write_flags |= FUSE_WRITE_KILL_SUIDGID;
- nres = fuse_send_write(ia, pos, nbytes, owner);
- } else {
- nres = fuse_send_read(ia, pos, nbytes, owner);
- }
- if (!io->async || nres < 0) {
- fuse_release_user_pages(&ia->ap, nres, io->should_dirty);
- fuse_io_free(ia);
- }
- ia = NULL;
- if (nres < 0) {
- iov_iter_revert(iter, nbytes);
- err = nres;
- break;
- }
- WARN_ON(nres > nbytes);
- count -= nres;
- res += nres;
- pos += nres;
- if (nres != nbytes) {
- iov_iter_revert(iter, nbytes - nres);
- break;
- }
- if (count) {
- max_pages = iov_iter_npages(iter, fc->max_pages);
- ia = fuse_io_alloc(io, max_pages);
- if (!ia)
- break;
- }
- }
- if (ia)
- fuse_io_free(ia);
- if (res > 0)
- *ppos = pos;
- return res > 0 ? res : err;
- }
- EXPORT_SYMBOL_GPL(fuse_direct_io);
- static ssize_t __fuse_direct_read(struct fuse_io_priv *io,
- struct iov_iter *iter,
- loff_t *ppos)
- {
- ssize_t res;
- struct inode *inode = file_inode(io->iocb->ki_filp);
- res = fuse_direct_io(io, iter, ppos, 0);
- fuse_invalidate_atime(inode);
- return res;
- }
- static ssize_t fuse_direct_IO(struct kiocb *iocb, struct iov_iter *iter);
- static ssize_t fuse_direct_read_iter(struct kiocb *iocb, struct iov_iter *to)
- {
- ssize_t res;
- if (!is_sync_kiocb(iocb) && iocb->ki_flags & IOCB_DIRECT) {
- res = fuse_direct_IO(iocb, to);
- } else {
- struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(iocb);
- res = __fuse_direct_read(&io, to, &iocb->ki_pos);
- }
- return res;
- }
- static ssize_t fuse_direct_write_iter(struct kiocb *iocb, struct iov_iter *from)
- {
- struct inode *inode = file_inode(iocb->ki_filp);
- struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(iocb);
- ssize_t res;
- bool exclusive;
- fuse_dio_lock(iocb, from, &exclusive);
- res = generic_write_checks(iocb, from);
- if (res > 0) {
- task_io_account_write(res);
- if (!is_sync_kiocb(iocb) && iocb->ki_flags & IOCB_DIRECT) {
- res = fuse_direct_IO(iocb, from);
- } else {
- res = fuse_direct_io(&io, from, &iocb->ki_pos,
- FUSE_DIO_WRITE);
- fuse_write_update_attr(inode, iocb->ki_pos, res);
- }
- }
- fuse_dio_unlock(iocb, exclusive);
- return res;
- }
- static ssize_t fuse_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
- {
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct inode *inode = file_inode(file);
- if (fuse_is_bad(inode))
- return -EIO;
- if (FUSE_IS_DAX(inode))
- return fuse_dax_read_iter(iocb, to);
- /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
- if (ff->open_flags & FOPEN_DIRECT_IO)
- return fuse_direct_read_iter(iocb, to);
- else if (fuse_file_passthrough(ff))
- return fuse_passthrough_read_iter(iocb, to);
- else
- return fuse_cache_read_iter(iocb, to);
- }
- static ssize_t fuse_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
- {
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- struct inode *inode = file_inode(file);
- if (fuse_is_bad(inode))
- return -EIO;
- if (FUSE_IS_DAX(inode))
- return fuse_dax_write_iter(iocb, from);
- /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
- if (ff->open_flags & FOPEN_DIRECT_IO)
- return fuse_direct_write_iter(iocb, from);
- else if (fuse_file_passthrough(ff))
- return fuse_passthrough_write_iter(iocb, from);
- else
- return fuse_cache_write_iter(iocb, from);
- }
- static ssize_t fuse_splice_read(struct file *in, loff_t *ppos,
- struct pipe_inode_info *pipe, size_t len,
- unsigned int flags)
- {
- struct fuse_file *ff = in->private_data;
- /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
- if (fuse_file_passthrough(ff) && !(ff->open_flags & FOPEN_DIRECT_IO))
- return fuse_passthrough_splice_read(in, ppos, pipe, len, flags);
- else
- return filemap_splice_read(in, ppos, pipe, len, flags);
- }
- static ssize_t fuse_splice_write(struct pipe_inode_info *pipe, struct file *out,
- loff_t *ppos, size_t len, unsigned int flags)
- {
- struct fuse_file *ff = out->private_data;
- /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
- if (fuse_file_passthrough(ff) && !(ff->open_flags & FOPEN_DIRECT_IO))
- return fuse_passthrough_splice_write(pipe, out, ppos, len, flags);
- else
- return iter_file_splice_write(pipe, out, ppos, len, flags);
- }
- static void fuse_writepage_free(struct fuse_writepage_args *wpa)
- {
- struct fuse_args_pages *ap = &wpa->ia.ap;
- int i;
- if (wpa->bucket)
- fuse_sync_bucket_dec(wpa->bucket);
- for (i = 0; i < ap->num_pages; i++)
- __free_page(ap->pages[i]);
- fuse_file_put(wpa->ia.ff, false);
- kfree(ap->pages);
- kfree(wpa);
- }
- static void fuse_writepage_finish_stat(struct inode *inode, struct page *page)
- {
- struct backing_dev_info *bdi = inode_to_bdi(inode);
- dec_wb_stat(&bdi->wb, WB_WRITEBACK);
- dec_node_page_state(page, NR_WRITEBACK_TEMP);
- wb_writeout_inc(&bdi->wb);
- }
- static void fuse_writepage_finish(struct fuse_writepage_args *wpa)
- {
- struct fuse_args_pages *ap = &wpa->ia.ap;
- struct inode *inode = wpa->inode;
- struct fuse_inode *fi = get_fuse_inode(inode);
- int i;
- for (i = 0; i < ap->num_pages; i++)
- fuse_writepage_finish_stat(inode, ap->pages[i]);
- wake_up(&fi->page_waitq);
- }
- /* Called under fi->lock, may release and reacquire it */
- static void fuse_send_writepage(struct fuse_mount *fm,
- struct fuse_writepage_args *wpa, loff_t size)
- __releases(fi->lock)
- __acquires(fi->lock)
- {
- struct fuse_writepage_args *aux, *next;
- struct fuse_inode *fi = get_fuse_inode(wpa->inode);
- struct fuse_write_in *inarg = &wpa->ia.write.in;
- struct fuse_args *args = &wpa->ia.ap.args;
- __u64 data_size = wpa->ia.ap.num_pages * PAGE_SIZE;
- int err;
- fi->writectr++;
- if (inarg->offset + data_size <= size) {
- inarg->size = data_size;
- } else if (inarg->offset < size) {
- inarg->size = size - inarg->offset;
- } else {
- /* Got truncated off completely */
- goto out_free;
- }
- args->in_args[1].size = inarg->size;
- args->force = true;
- args->nocreds = true;
- err = fuse_simple_background(fm, args, GFP_ATOMIC);
- if (err == -ENOMEM) {
- spin_unlock(&fi->lock);
- err = fuse_simple_background(fm, args, GFP_NOFS | __GFP_NOFAIL);
- spin_lock(&fi->lock);
- }
- /* Fails on broken connection only */
- if (unlikely(err))
- goto out_free;
- return;
- out_free:
- fi->writectr--;
- rb_erase(&wpa->writepages_entry, &fi->writepages);
- fuse_writepage_finish(wpa);
- spin_unlock(&fi->lock);
- /* After rb_erase() aux request list is private */
- for (aux = wpa->next; aux; aux = next) {
- next = aux->next;
- aux->next = NULL;
- fuse_writepage_finish_stat(aux->inode, aux->ia.ap.pages[0]);
- fuse_writepage_free(aux);
- }
- fuse_writepage_free(wpa);
- spin_lock(&fi->lock);
- }
- /*
- * If fi->writectr is positive (no truncate or fsync going on) send
- * all queued writepage requests.
- *
- * Called with fi->lock
- */
- void fuse_flush_writepages(struct inode *inode)
- __releases(fi->lock)
- __acquires(fi->lock)
- {
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_inode *fi = get_fuse_inode(inode);
- loff_t crop = i_size_read(inode);
- struct fuse_writepage_args *wpa;
- while (fi->writectr >= 0 && !list_empty(&fi->queued_writes)) {
- wpa = list_entry(fi->queued_writes.next,
- struct fuse_writepage_args, queue_entry);
- list_del_init(&wpa->queue_entry);
- fuse_send_writepage(fm, wpa, crop);
- }
- }
- static struct fuse_writepage_args *fuse_insert_writeback(struct rb_root *root,
- struct fuse_writepage_args *wpa)
- {
- pgoff_t idx_from = wpa->ia.write.in.offset >> PAGE_SHIFT;
- pgoff_t idx_to = idx_from + wpa->ia.ap.num_pages - 1;
- struct rb_node **p = &root->rb_node;
- struct rb_node *parent = NULL;
- WARN_ON(!wpa->ia.ap.num_pages);
- while (*p) {
- struct fuse_writepage_args *curr;
- pgoff_t curr_index;
- parent = *p;
- curr = rb_entry(parent, struct fuse_writepage_args,
- writepages_entry);
- WARN_ON(curr->inode != wpa->inode);
- curr_index = curr->ia.write.in.offset >> PAGE_SHIFT;
- if (idx_from >= curr_index + curr->ia.ap.num_pages)
- p = &(*p)->rb_right;
- else if (idx_to < curr_index)
- p = &(*p)->rb_left;
- else
- return curr;
- }
- rb_link_node(&wpa->writepages_entry, parent, p);
- rb_insert_color(&wpa->writepages_entry, root);
- return NULL;
- }
- static void tree_insert(struct rb_root *root, struct fuse_writepage_args *wpa)
- {
- WARN_ON(fuse_insert_writeback(root, wpa));
- }
- static void fuse_writepage_end(struct fuse_mount *fm, struct fuse_args *args,
- int error)
- {
- struct fuse_writepage_args *wpa =
- container_of(args, typeof(*wpa), ia.ap.args);
- struct inode *inode = wpa->inode;
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_conn *fc = get_fuse_conn(inode);
- mapping_set_error(inode->i_mapping, error);
- /*
- * A writeback finished and this might have updated mtime/ctime on
- * server making local mtime/ctime stale. Hence invalidate attrs.
- * Do this only if writeback_cache is not enabled. If writeback_cache
- * is enabled, we trust local ctime/mtime.
- */
- if (!fc->writeback_cache)
- fuse_invalidate_attr_mask(inode, FUSE_STATX_MODIFY);
- spin_lock(&fi->lock);
- rb_erase(&wpa->writepages_entry, &fi->writepages);
- while (wpa->next) {
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_write_in *inarg = &wpa->ia.write.in;
- struct fuse_writepage_args *next = wpa->next;
- wpa->next = next->next;
- next->next = NULL;
- tree_insert(&fi->writepages, next);
- /*
- * Skip fuse_flush_writepages() to make it easy to crop requests
- * based on primary request size.
- *
- * 1st case (trivial): there are no concurrent activities using
- * fuse_set/release_nowrite. Then we're on safe side because
- * fuse_flush_writepages() would call fuse_send_writepage()
- * anyway.
- *
- * 2nd case: someone called fuse_set_nowrite and it is waiting
- * now for completion of all in-flight requests. This happens
- * rarely and no more than once per page, so this should be
- * okay.
- *
- * 3rd case: someone (e.g. fuse_do_setattr()) is in the middle
- * of fuse_set_nowrite..fuse_release_nowrite section. The fact
- * that fuse_set_nowrite returned implies that all in-flight
- * requests were completed along with all of their secondary
- * requests. Further primary requests are blocked by negative
- * writectr. Hence there cannot be any in-flight requests and
- * no invocations of fuse_writepage_end() while we're in
- * fuse_set_nowrite..fuse_release_nowrite section.
- */
- fuse_send_writepage(fm, next, inarg->offset + inarg->size);
- }
- fi->writectr--;
- fuse_writepage_finish(wpa);
- spin_unlock(&fi->lock);
- fuse_writepage_free(wpa);
- }
- static struct fuse_file *__fuse_write_file_get(struct fuse_inode *fi)
- {
- struct fuse_file *ff;
- spin_lock(&fi->lock);
- ff = list_first_entry_or_null(&fi->write_files, struct fuse_file,
- write_entry);
- if (ff)
- fuse_file_get(ff);
- spin_unlock(&fi->lock);
- return ff;
- }
- static struct fuse_file *fuse_write_file_get(struct fuse_inode *fi)
- {
- struct fuse_file *ff = __fuse_write_file_get(fi);
- WARN_ON(!ff);
- return ff;
- }
- int fuse_write_inode(struct inode *inode, struct writeback_control *wbc)
- {
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_file *ff;
- int err;
- /*
- * Inode is always written before the last reference is dropped and
- * hence this should not be reached from reclaim.
- *
- * Writing back the inode from reclaim can deadlock if the request
- * processing itself needs an allocation. Allocations triggering
- * reclaim while serving a request can't be prevented, because it can
- * involve any number of unrelated userspace processes.
- */
- WARN_ON(wbc->for_reclaim);
- ff = __fuse_write_file_get(fi);
- err = fuse_flush_times(inode, ff);
- if (ff)
- fuse_file_put(ff, false);
- return err;
- }
- static struct fuse_writepage_args *fuse_writepage_args_alloc(void)
- {
- struct fuse_writepage_args *wpa;
- struct fuse_args_pages *ap;
- wpa = kzalloc(sizeof(*wpa), GFP_NOFS);
- if (wpa) {
- ap = &wpa->ia.ap;
- ap->num_pages = 0;
- ap->pages = fuse_pages_alloc(1, GFP_NOFS, &ap->descs);
- if (!ap->pages) {
- kfree(wpa);
- wpa = NULL;
- }
- }
- return wpa;
- }
- static void fuse_writepage_add_to_bucket(struct fuse_conn *fc,
- struct fuse_writepage_args *wpa)
- {
- if (!fc->sync_fs)
- return;
- rcu_read_lock();
- /* Prevent resurrection of dead bucket in unlikely race with syncfs */
- do {
- wpa->bucket = rcu_dereference(fc->curr_bucket);
- } while (unlikely(!atomic_inc_not_zero(&wpa->bucket->count)));
- rcu_read_unlock();
- }
- static void fuse_writepage_args_page_fill(struct fuse_writepage_args *wpa, struct folio *folio,
- struct folio *tmp_folio, uint32_t page_index)
- {
- struct inode *inode = folio->mapping->host;
- struct fuse_args_pages *ap = &wpa->ia.ap;
- folio_copy(tmp_folio, folio);
- ap->pages[page_index] = &tmp_folio->page;
- ap->descs[page_index].offset = 0;
- ap->descs[page_index].length = PAGE_SIZE;
- inc_wb_stat(&inode_to_bdi(inode)->wb, WB_WRITEBACK);
- inc_node_page_state(&tmp_folio->page, NR_WRITEBACK_TEMP);
- }
- static struct fuse_writepage_args *fuse_writepage_args_setup(struct folio *folio,
- struct fuse_file *ff)
- {
- struct inode *inode = folio->mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_writepage_args *wpa;
- struct fuse_args_pages *ap;
- wpa = fuse_writepage_args_alloc();
- if (!wpa)
- return NULL;
- fuse_writepage_add_to_bucket(fc, wpa);
- fuse_write_args_fill(&wpa->ia, ff, folio_pos(folio), 0);
- wpa->ia.write.in.write_flags |= FUSE_WRITE_CACHE;
- wpa->inode = inode;
- wpa->ia.ff = ff;
- ap = &wpa->ia.ap;
- ap->args.in_pages = true;
- ap->args.end = fuse_writepage_end;
- return wpa;
- }
- static int fuse_writepage_locked(struct folio *folio)
- {
- struct address_space *mapping = folio->mapping;
- struct inode *inode = mapping->host;
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_writepage_args *wpa;
- struct fuse_args_pages *ap;
- struct folio *tmp_folio;
- struct fuse_file *ff;
- int error = -ENOMEM;
- tmp_folio = folio_alloc(GFP_NOFS | __GFP_HIGHMEM, 0);
- if (!tmp_folio)
- goto err;
- error = -EIO;
- ff = fuse_write_file_get(fi);
- if (!ff)
- goto err_nofile;
- wpa = fuse_writepage_args_setup(folio, ff);
- error = -ENOMEM;
- if (!wpa)
- goto err_writepage_args;
- ap = &wpa->ia.ap;
- ap->num_pages = 1;
- folio_start_writeback(folio);
- fuse_writepage_args_page_fill(wpa, folio, tmp_folio, 0);
- spin_lock(&fi->lock);
- tree_insert(&fi->writepages, wpa);
- list_add_tail(&wpa->queue_entry, &fi->queued_writes);
- fuse_flush_writepages(inode);
- spin_unlock(&fi->lock);
- folio_end_writeback(folio);
- return 0;
- err_writepage_args:
- fuse_file_put(ff, false);
- err_nofile:
- folio_put(tmp_folio);
- err:
- mapping_set_error(folio->mapping, error);
- return error;
- }
- struct fuse_fill_wb_data {
- struct fuse_writepage_args *wpa;
- struct fuse_file *ff;
- struct inode *inode;
- struct page **orig_pages;
- unsigned int max_pages;
- };
- static bool fuse_pages_realloc(struct fuse_fill_wb_data *data)
- {
- struct fuse_args_pages *ap = &data->wpa->ia.ap;
- struct fuse_conn *fc = get_fuse_conn(data->inode);
- struct page **pages;
- struct fuse_page_desc *descs;
- unsigned int npages = min_t(unsigned int,
- max_t(unsigned int, data->max_pages * 2,
- FUSE_DEFAULT_MAX_PAGES_PER_REQ),
- fc->max_pages);
- WARN_ON(npages <= data->max_pages);
- pages = fuse_pages_alloc(npages, GFP_NOFS, &descs);
- if (!pages)
- return false;
- memcpy(pages, ap->pages, sizeof(struct page *) * ap->num_pages);
- memcpy(descs, ap->descs, sizeof(struct fuse_page_desc) * ap->num_pages);
- kfree(ap->pages);
- ap->pages = pages;
- ap->descs = descs;
- data->max_pages = npages;
- return true;
- }
- static void fuse_writepages_send(struct fuse_fill_wb_data *data)
- {
- struct fuse_writepage_args *wpa = data->wpa;
- struct inode *inode = data->inode;
- struct fuse_inode *fi = get_fuse_inode(inode);
- int num_pages = wpa->ia.ap.num_pages;
- int i;
- spin_lock(&fi->lock);
- list_add_tail(&wpa->queue_entry, &fi->queued_writes);
- fuse_flush_writepages(inode);
- spin_unlock(&fi->lock);
- for (i = 0; i < num_pages; i++)
- end_page_writeback(data->orig_pages[i]);
- }
- /*
- * Check under fi->lock if the page is under writeback, and insert it onto the
- * rb_tree if not. Otherwise iterate auxiliary write requests, to see if there's
- * one already added for a page at this offset. If there's none, then insert
- * this new request onto the auxiliary list, otherwise reuse the existing one by
- * swapping the new temp page with the old one.
- */
- static bool fuse_writepage_add(struct fuse_writepage_args *new_wpa,
- struct page *page)
- {
- struct fuse_inode *fi = get_fuse_inode(new_wpa->inode);
- struct fuse_writepage_args *tmp;
- struct fuse_writepage_args *old_wpa;
- struct fuse_args_pages *new_ap = &new_wpa->ia.ap;
- WARN_ON(new_ap->num_pages != 0);
- new_ap->num_pages = 1;
- spin_lock(&fi->lock);
- old_wpa = fuse_insert_writeback(&fi->writepages, new_wpa);
- if (!old_wpa) {
- spin_unlock(&fi->lock);
- return true;
- }
- for (tmp = old_wpa->next; tmp; tmp = tmp->next) {
- pgoff_t curr_index;
- WARN_ON(tmp->inode != new_wpa->inode);
- curr_index = tmp->ia.write.in.offset >> PAGE_SHIFT;
- if (curr_index == page->index) {
- WARN_ON(tmp->ia.ap.num_pages != 1);
- swap(tmp->ia.ap.pages[0], new_ap->pages[0]);
- break;
- }
- }
- if (!tmp) {
- new_wpa->next = old_wpa->next;
- old_wpa->next = new_wpa;
- }
- spin_unlock(&fi->lock);
- if (tmp) {
- fuse_writepage_finish_stat(new_wpa->inode, new_ap->pages[0]);
- fuse_writepage_free(new_wpa);
- }
- return false;
- }
- static bool fuse_writepage_need_send(struct fuse_conn *fc, struct page *page,
- struct fuse_args_pages *ap,
- struct fuse_fill_wb_data *data)
- {
- WARN_ON(!ap->num_pages);
- /*
- * Being under writeback is unlikely but possible. For example direct
- * read to an mmaped fuse file will set the page dirty twice; once when
- * the pages are faulted with get_user_pages(), and then after the read
- * completed.
- */
- if (fuse_page_is_writeback(data->inode, page->index))
- return true;
- /* Reached max pages */
- if (ap->num_pages == fc->max_pages)
- return true;
- /* Reached max write bytes */
- if ((ap->num_pages + 1) * PAGE_SIZE > fc->max_write)
- return true;
- /* Discontinuity */
- if (data->orig_pages[ap->num_pages - 1]->index + 1 != page->index)
- return true;
- /* Need to grow the pages array? If so, did the expansion fail? */
- if (ap->num_pages == data->max_pages && !fuse_pages_realloc(data))
- return true;
- return false;
- }
- static int fuse_writepages_fill(struct folio *folio,
- struct writeback_control *wbc, void *_data)
- {
- struct fuse_fill_wb_data *data = _data;
- struct fuse_writepage_args *wpa = data->wpa;
- struct fuse_args_pages *ap = &wpa->ia.ap;
- struct inode *inode = data->inode;
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct folio *tmp_folio;
- int err;
- if (!data->ff) {
- err = -EIO;
- data->ff = fuse_write_file_get(fi);
- if (!data->ff)
- goto out_unlock;
- }
- if (wpa && fuse_writepage_need_send(fc, &folio->page, ap, data)) {
- fuse_writepages_send(data);
- data->wpa = NULL;
- }
- err = -ENOMEM;
- tmp_folio = folio_alloc(GFP_NOFS | __GFP_HIGHMEM, 0);
- if (!tmp_folio)
- goto out_unlock;
- /*
- * The page must not be redirtied until the writeout is completed
- * (i.e. userspace has sent a reply to the write request). Otherwise
- * there could be more than one temporary page instance for each real
- * page.
- *
- * This is ensured by holding the page lock in page_mkwrite() while
- * checking fuse_page_is_writeback(). We already hold the page lock
- * since clear_page_dirty_for_io() and keep it held until we add the
- * request to the fi->writepages list and increment ap->num_pages.
- * After this fuse_page_is_writeback() will indicate that the page is
- * under writeback, so we can release the page lock.
- */
- if (data->wpa == NULL) {
- err = -ENOMEM;
- wpa = fuse_writepage_args_setup(folio, data->ff);
- if (!wpa) {
- folio_put(tmp_folio);
- goto out_unlock;
- }
- fuse_file_get(wpa->ia.ff);
- data->max_pages = 1;
- ap = &wpa->ia.ap;
- }
- folio_start_writeback(folio);
- fuse_writepage_args_page_fill(wpa, folio, tmp_folio, ap->num_pages);
- data->orig_pages[ap->num_pages] = &folio->page;
- err = 0;
- if (data->wpa) {
- /*
- * Protected by fi->lock against concurrent access by
- * fuse_page_is_writeback().
- */
- spin_lock(&fi->lock);
- ap->num_pages++;
- spin_unlock(&fi->lock);
- } else if (fuse_writepage_add(wpa, &folio->page)) {
- data->wpa = wpa;
- } else {
- folio_end_writeback(folio);
- }
- out_unlock:
- folio_unlock(folio);
- return err;
- }
- static int fuse_writepages(struct address_space *mapping,
- struct writeback_control *wbc)
- {
- struct inode *inode = mapping->host;
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_fill_wb_data data;
- int err;
- err = -EIO;
- if (fuse_is_bad(inode))
- goto out;
- if (wbc->sync_mode == WB_SYNC_NONE &&
- fc->num_background >= fc->congestion_threshold)
- return 0;
- data.inode = inode;
- data.wpa = NULL;
- data.ff = NULL;
- err = -ENOMEM;
- data.orig_pages = kcalloc(fc->max_pages,
- sizeof(struct page *),
- GFP_NOFS);
- if (!data.orig_pages)
- goto out;
- err = write_cache_pages(mapping, wbc, fuse_writepages_fill, &data);
- if (data.wpa) {
- WARN_ON(!data.wpa->ia.ap.num_pages);
- fuse_writepages_send(&data);
- }
- if (data.ff)
- fuse_file_put(data.ff, false);
- kfree(data.orig_pages);
- out:
- return err;
- }
- /*
- * It's worthy to make sure that space is reserved on disk for the write,
- * but how to implement it without killing performance need more thinking.
- */
- static int fuse_write_begin(struct file *file, struct address_space *mapping,
- loff_t pos, unsigned len, struct folio **foliop, void **fsdata)
- {
- pgoff_t index = pos >> PAGE_SHIFT;
- struct fuse_conn *fc = get_fuse_conn(file_inode(file));
- struct folio *folio;
- loff_t fsize;
- int err = -ENOMEM;
- WARN_ON(!fc->writeback_cache);
- folio = __filemap_get_folio(mapping, index, FGP_WRITEBEGIN,
- mapping_gfp_mask(mapping));
- if (IS_ERR(folio))
- goto error;
- fuse_wait_on_page_writeback(mapping->host, folio->index);
- if (folio_test_uptodate(folio) || len >= folio_size(folio))
- goto success;
- /*
- * Check if the start of this folio comes after the end of file,
- * in which case the readpage can be optimized away.
- */
- fsize = i_size_read(mapping->host);
- if (fsize <= folio_pos(folio)) {
- size_t off = offset_in_folio(folio, pos);
- if (off)
- folio_zero_segment(folio, 0, off);
- goto success;
- }
- err = fuse_do_readpage(file, &folio->page);
- if (err)
- goto cleanup;
- success:
- *foliop = folio;
- return 0;
- cleanup:
- folio_unlock(folio);
- folio_put(folio);
- error:
- return err;
- }
- static int fuse_write_end(struct file *file, struct address_space *mapping,
- loff_t pos, unsigned len, unsigned copied,
- struct folio *folio, void *fsdata)
- {
- struct inode *inode = folio->mapping->host;
- /* Haven't copied anything? Skip zeroing, size extending, dirtying. */
- if (!copied)
- goto unlock;
- pos += copied;
- if (!folio_test_uptodate(folio)) {
- /* Zero any unwritten bytes at the end of the page */
- size_t endoff = pos & ~PAGE_MASK;
- if (endoff)
- folio_zero_segment(folio, endoff, PAGE_SIZE);
- folio_mark_uptodate(folio);
- }
- if (pos > inode->i_size)
- i_size_write(inode, pos);
- folio_mark_dirty(folio);
- unlock:
- folio_unlock(folio);
- folio_put(folio);
- return copied;
- }
- static int fuse_launder_folio(struct folio *folio)
- {
- int err = 0;
- if (folio_clear_dirty_for_io(folio)) {
- struct inode *inode = folio->mapping->host;
- /* Serialize with pending writeback for the same page */
- fuse_wait_on_page_writeback(inode, folio->index);
- err = fuse_writepage_locked(folio);
- if (!err)
- fuse_wait_on_page_writeback(inode, folio->index);
- }
- return err;
- }
- /*
- * Write back dirty data/metadata now (there may not be any suitable
- * open files later for data)
- */
- static void fuse_vma_close(struct vm_area_struct *vma)
- {
- int err;
- err = write_inode_now(vma->vm_file->f_mapping->host, 1);
- mapping_set_error(vma->vm_file->f_mapping, err);
- }
- /*
- * Wait for writeback against this page to complete before allowing it
- * to be marked dirty again, and hence written back again, possibly
- * before the previous writepage completed.
- *
- * Block here, instead of in ->writepage(), so that the userspace fs
- * can only block processes actually operating on the filesystem.
- *
- * Otherwise unprivileged userspace fs would be able to block
- * unrelated:
- *
- * - page migration
- * - sync(2)
- * - try_to_free_pages() with order > PAGE_ALLOC_COSTLY_ORDER
- */
- static vm_fault_t fuse_page_mkwrite(struct vm_fault *vmf)
- {
- struct page *page = vmf->page;
- struct inode *inode = file_inode(vmf->vma->vm_file);
- file_update_time(vmf->vma->vm_file);
- lock_page(page);
- if (page->mapping != inode->i_mapping) {
- unlock_page(page);
- return VM_FAULT_NOPAGE;
- }
- fuse_wait_on_page_writeback(inode, page->index);
- return VM_FAULT_LOCKED;
- }
- static const struct vm_operations_struct fuse_file_vm_ops = {
- .close = fuse_vma_close,
- .fault = filemap_fault,
- .map_pages = filemap_map_pages,
- .page_mkwrite = fuse_page_mkwrite,
- };
- static int fuse_file_mmap(struct file *file, struct vm_area_struct *vma)
- {
- struct fuse_file *ff = file->private_data;
- struct fuse_conn *fc = ff->fm->fc;
- struct inode *inode = file_inode(file);
- int rc;
- /* DAX mmap is superior to direct_io mmap */
- if (FUSE_IS_DAX(inode))
- return fuse_dax_mmap(file, vma);
- /*
- * If inode is in passthrough io mode, because it has some file open
- * in passthrough mode, either mmap to backing file or fail mmap,
- * because mixing cached mmap and passthrough io mode is not allowed.
- */
- if (fuse_file_passthrough(ff))
- return fuse_passthrough_mmap(file, vma);
- else if (fuse_inode_backing(get_fuse_inode(inode)))
- return -ENODEV;
- /*
- * FOPEN_DIRECT_IO handling is special compared to O_DIRECT,
- * as does not allow MAP_SHARED mmap without FUSE_DIRECT_IO_ALLOW_MMAP.
- */
- if (ff->open_flags & FOPEN_DIRECT_IO) {
- /*
- * Can't provide the coherency needed for MAP_SHARED
- * if FUSE_DIRECT_IO_ALLOW_MMAP isn't set.
- */
- if ((vma->vm_flags & VM_MAYSHARE) && !fc->direct_io_allow_mmap)
- return -ENODEV;
- invalidate_inode_pages2(file->f_mapping);
- if (!(vma->vm_flags & VM_MAYSHARE)) {
- /* MAP_PRIVATE */
- return generic_file_mmap(file, vma);
- }
- /*
- * First mmap of direct_io file enters caching inode io mode.
- * Also waits for parallel dio writers to go into serial mode
- * (exclusive instead of shared lock).
- * After first mmap, the inode stays in caching io mode until
- * the direct_io file release.
- */
- rc = fuse_file_cached_io_open(inode, ff);
- if (rc)
- return rc;
- }
- if ((vma->vm_flags & VM_SHARED) && (vma->vm_flags & VM_MAYWRITE))
- fuse_link_write_file(file);
- file_accessed(file);
- vma->vm_ops = &fuse_file_vm_ops;
- return 0;
- }
- static int convert_fuse_file_lock(struct fuse_conn *fc,
- const struct fuse_file_lock *ffl,
- struct file_lock *fl)
- {
- switch (ffl->type) {
- case F_UNLCK:
- break;
- case F_RDLCK:
- case F_WRLCK:
- if (ffl->start > OFFSET_MAX || ffl->end > OFFSET_MAX ||
- ffl->end < ffl->start)
- return -EIO;
- fl->fl_start = ffl->start;
- fl->fl_end = ffl->end;
- /*
- * Convert pid into init's pid namespace. The locks API will
- * translate it into the caller's pid namespace.
- */
- rcu_read_lock();
- fl->c.flc_pid = pid_nr_ns(find_pid_ns(ffl->pid, fc->pid_ns), &init_pid_ns);
- rcu_read_unlock();
- break;
- default:
- return -EIO;
- }
- fl->c.flc_type = ffl->type;
- return 0;
- }
- static void fuse_lk_fill(struct fuse_args *args, struct file *file,
- const struct file_lock *fl, int opcode, pid_t pid,
- int flock, struct fuse_lk_in *inarg)
- {
- struct inode *inode = file_inode(file);
- struct fuse_conn *fc = get_fuse_conn(inode);
- struct fuse_file *ff = file->private_data;
- memset(inarg, 0, sizeof(*inarg));
- inarg->fh = ff->fh;
- inarg->owner = fuse_lock_owner_id(fc, fl->c.flc_owner);
- inarg->lk.start = fl->fl_start;
- inarg->lk.end = fl->fl_end;
- inarg->lk.type = fl->c.flc_type;
- inarg->lk.pid = pid;
- if (flock)
- inarg->lk_flags |= FUSE_LK_FLOCK;
- args->opcode = opcode;
- args->nodeid = get_node_id(inode);
- args->in_numargs = 1;
- args->in_args[0].size = sizeof(*inarg);
- args->in_args[0].value = inarg;
- }
- static int fuse_getlk(struct file *file, struct file_lock *fl)
- {
- struct inode *inode = file_inode(file);
- struct fuse_mount *fm = get_fuse_mount(inode);
- FUSE_ARGS(args);
- struct fuse_lk_in inarg;
- struct fuse_lk_out outarg;
- int err;
- fuse_lk_fill(&args, file, fl, FUSE_GETLK, 0, 0, &inarg);
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(outarg);
- args.out_args[0].value = &outarg;
- err = fuse_simple_request(fm, &args);
- if (!err)
- err = convert_fuse_file_lock(fm->fc, &outarg.lk, fl);
- return err;
- }
- static int fuse_setlk(struct file *file, struct file_lock *fl, int flock)
- {
- struct inode *inode = file_inode(file);
- struct fuse_mount *fm = get_fuse_mount(inode);
- FUSE_ARGS(args);
- struct fuse_lk_in inarg;
- int opcode = (fl->c.flc_flags & FL_SLEEP) ? FUSE_SETLKW : FUSE_SETLK;
- struct pid *pid = fl->c.flc_type != F_UNLCK ? task_tgid(current) : NULL;
- pid_t pid_nr = pid_nr_ns(pid, fm->fc->pid_ns);
- int err;
- if (fl->fl_lmops && fl->fl_lmops->lm_grant) {
- /* NLM needs asynchronous locks, which we don't support yet */
- return -ENOLCK;
- }
- fuse_lk_fill(&args, file, fl, opcode, pid_nr, flock, &inarg);
- err = fuse_simple_request(fm, &args);
- /* locking is restartable */
- if (err == -EINTR)
- err = -ERESTARTSYS;
- return err;
- }
- static int fuse_file_lock(struct file *file, int cmd, struct file_lock *fl)
- {
- struct inode *inode = file_inode(file);
- struct fuse_conn *fc = get_fuse_conn(inode);
- int err;
- if (cmd == F_CANCELLK) {
- err = 0;
- } else if (cmd == F_GETLK) {
- if (fc->no_lock) {
- posix_test_lock(file, fl);
- err = 0;
- } else
- err = fuse_getlk(file, fl);
- } else {
- if (fc->no_lock)
- err = posix_lock_file(file, fl, NULL);
- else
- err = fuse_setlk(file, fl, 0);
- }
- return err;
- }
- static int fuse_file_flock(struct file *file, int cmd, struct file_lock *fl)
- {
- struct inode *inode = file_inode(file);
- struct fuse_conn *fc = get_fuse_conn(inode);
- int err;
- if (fc->no_flock) {
- err = locks_lock_file_wait(file, fl);
- } else {
- struct fuse_file *ff = file->private_data;
- /* emulate flock with POSIX locks */
- ff->flock = true;
- err = fuse_setlk(file, fl, 1);
- }
- return err;
- }
- static sector_t fuse_bmap(struct address_space *mapping, sector_t block)
- {
- struct inode *inode = mapping->host;
- struct fuse_mount *fm = get_fuse_mount(inode);
- FUSE_ARGS(args);
- struct fuse_bmap_in inarg;
- struct fuse_bmap_out outarg;
- int err;
- if (!inode->i_sb->s_bdev || fm->fc->no_bmap)
- return 0;
- memset(&inarg, 0, sizeof(inarg));
- inarg.block = block;
- inarg.blocksize = inode->i_sb->s_blocksize;
- args.opcode = FUSE_BMAP;
- args.nodeid = get_node_id(inode);
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(outarg);
- args.out_args[0].value = &outarg;
- err = fuse_simple_request(fm, &args);
- if (err == -ENOSYS)
- fm->fc->no_bmap = 1;
- return err ? 0 : outarg.block;
- }
- static loff_t fuse_lseek(struct file *file, loff_t offset, int whence)
- {
- struct inode *inode = file->f_mapping->host;
- struct fuse_mount *fm = get_fuse_mount(inode);
- struct fuse_file *ff = file->private_data;
- FUSE_ARGS(args);
- struct fuse_lseek_in inarg = {
- .fh = ff->fh,
- .offset = offset,
- .whence = whence
- };
- struct fuse_lseek_out outarg;
- int err;
- if (fm->fc->no_lseek)
- goto fallback;
- args.opcode = FUSE_LSEEK;
- args.nodeid = ff->nodeid;
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(outarg);
- args.out_args[0].value = &outarg;
- err = fuse_simple_request(fm, &args);
- if (err) {
- if (err == -ENOSYS) {
- fm->fc->no_lseek = 1;
- goto fallback;
- }
- return err;
- }
- return vfs_setpos(file, outarg.offset, inode->i_sb->s_maxbytes);
- fallback:
- err = fuse_update_attributes(inode, file, STATX_SIZE);
- if (!err)
- return generic_file_llseek(file, offset, whence);
- else
- return err;
- }
- static loff_t fuse_file_llseek(struct file *file, loff_t offset, int whence)
- {
- loff_t retval;
- struct inode *inode = file_inode(file);
- switch (whence) {
- case SEEK_SET:
- case SEEK_CUR:
- /* No i_mutex protection necessary for SEEK_CUR and SEEK_SET */
- retval = generic_file_llseek(file, offset, whence);
- break;
- case SEEK_END:
- inode_lock(inode);
- retval = fuse_update_attributes(inode, file, STATX_SIZE);
- if (!retval)
- retval = generic_file_llseek(file, offset, whence);
- inode_unlock(inode);
- break;
- case SEEK_HOLE:
- case SEEK_DATA:
- inode_lock(inode);
- retval = fuse_lseek(file, offset, whence);
- inode_unlock(inode);
- break;
- default:
- retval = -EINVAL;
- }
- return retval;
- }
- /*
- * All files which have been polled are linked to RB tree
- * fuse_conn->polled_files which is indexed by kh. Walk the tree and
- * find the matching one.
- */
- static struct rb_node **fuse_find_polled_node(struct fuse_conn *fc, u64 kh,
- struct rb_node **parent_out)
- {
- struct rb_node **link = &fc->polled_files.rb_node;
- struct rb_node *last = NULL;
- while (*link) {
- struct fuse_file *ff;
- last = *link;
- ff = rb_entry(last, struct fuse_file, polled_node);
- if (kh < ff->kh)
- link = &last->rb_left;
- else if (kh > ff->kh)
- link = &last->rb_right;
- else
- return link;
- }
- if (parent_out)
- *parent_out = last;
- return link;
- }
- /*
- * The file is about to be polled. Make sure it's on the polled_files
- * RB tree. Note that files once added to the polled_files tree are
- * not removed before the file is released. This is because a file
- * polled once is likely to be polled again.
- */
- static void fuse_register_polled_file(struct fuse_conn *fc,
- struct fuse_file *ff)
- {
- spin_lock(&fc->lock);
- if (RB_EMPTY_NODE(&ff->polled_node)) {
- struct rb_node **link, *parent;
- link = fuse_find_polled_node(fc, ff->kh, &parent);
- BUG_ON(*link);
- rb_link_node(&ff->polled_node, parent, link);
- rb_insert_color(&ff->polled_node, &fc->polled_files);
- }
- spin_unlock(&fc->lock);
- }
- __poll_t fuse_file_poll(struct file *file, poll_table *wait)
- {
- struct fuse_file *ff = file->private_data;
- struct fuse_mount *fm = ff->fm;
- struct fuse_poll_in inarg = { .fh = ff->fh, .kh = ff->kh };
- struct fuse_poll_out outarg;
- FUSE_ARGS(args);
- int err;
- if (fm->fc->no_poll)
- return DEFAULT_POLLMASK;
- poll_wait(file, &ff->poll_wait, wait);
- inarg.events = mangle_poll(poll_requested_events(wait));
- /*
- * Ask for notification iff there's someone waiting for it.
- * The client may ignore the flag and always notify.
- */
- if (waitqueue_active(&ff->poll_wait)) {
- inarg.flags |= FUSE_POLL_SCHEDULE_NOTIFY;
- fuse_register_polled_file(fm->fc, ff);
- }
- args.opcode = FUSE_POLL;
- args.nodeid = ff->nodeid;
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(outarg);
- args.out_args[0].value = &outarg;
- err = fuse_simple_request(fm, &args);
- if (!err)
- return demangle_poll(outarg.revents);
- if (err == -ENOSYS) {
- fm->fc->no_poll = 1;
- return DEFAULT_POLLMASK;
- }
- return EPOLLERR;
- }
- EXPORT_SYMBOL_GPL(fuse_file_poll);
- /*
- * This is called from fuse_handle_notify() on FUSE_NOTIFY_POLL and
- * wakes up the poll waiters.
- */
- int fuse_notify_poll_wakeup(struct fuse_conn *fc,
- struct fuse_notify_poll_wakeup_out *outarg)
- {
- u64 kh = outarg->kh;
- struct rb_node **link;
- spin_lock(&fc->lock);
- link = fuse_find_polled_node(fc, kh, NULL);
- if (*link) {
- struct fuse_file *ff;
- ff = rb_entry(*link, struct fuse_file, polled_node);
- wake_up_interruptible_sync(&ff->poll_wait);
- }
- spin_unlock(&fc->lock);
- return 0;
- }
- static void fuse_do_truncate(struct file *file)
- {
- struct inode *inode = file->f_mapping->host;
- struct iattr attr;
- attr.ia_valid = ATTR_SIZE;
- attr.ia_size = i_size_read(inode);
- attr.ia_file = file;
- attr.ia_valid |= ATTR_FILE;
- fuse_do_setattr(file_mnt_idmap(file), file_dentry(file), &attr, file);
- }
- static inline loff_t fuse_round_up(struct fuse_conn *fc, loff_t off)
- {
- return round_up(off, fc->max_pages << PAGE_SHIFT);
- }
- static ssize_t
- fuse_direct_IO(struct kiocb *iocb, struct iov_iter *iter)
- {
- DECLARE_COMPLETION_ONSTACK(wait);
- ssize_t ret = 0;
- struct file *file = iocb->ki_filp;
- struct fuse_file *ff = file->private_data;
- loff_t pos = 0;
- struct inode *inode;
- loff_t i_size;
- size_t count = iov_iter_count(iter), shortened = 0;
- loff_t offset = iocb->ki_pos;
- struct fuse_io_priv *io;
- pos = offset;
- inode = file->f_mapping->host;
- i_size = i_size_read(inode);
- if ((iov_iter_rw(iter) == READ) && (offset >= i_size))
- return 0;
- io = kmalloc(sizeof(struct fuse_io_priv), GFP_KERNEL);
- if (!io)
- return -ENOMEM;
- spin_lock_init(&io->lock);
- kref_init(&io->refcnt);
- io->reqs = 1;
- io->bytes = -1;
- io->size = 0;
- io->offset = offset;
- io->write = (iov_iter_rw(iter) == WRITE);
- io->err = 0;
- /*
- * By default, we want to optimize all I/Os with async request
- * submission to the client filesystem if supported.
- */
- io->async = ff->fm->fc->async_dio;
- io->iocb = iocb;
- io->blocking = is_sync_kiocb(iocb);
- /* optimization for short read */
- if (io->async && !io->write && offset + count > i_size) {
- iov_iter_truncate(iter, fuse_round_up(ff->fm->fc, i_size - offset));
- shortened = count - iov_iter_count(iter);
- count -= shortened;
- }
- /*
- * We cannot asynchronously extend the size of a file.
- * In such case the aio will behave exactly like sync io.
- */
- if ((offset + count > i_size) && io->write)
- io->blocking = true;
- if (io->async && io->blocking) {
- /*
- * Additional reference to keep io around after
- * calling fuse_aio_complete()
- */
- kref_get(&io->refcnt);
- io->done = &wait;
- }
- if (iov_iter_rw(iter) == WRITE) {
- ret = fuse_direct_io(io, iter, &pos, FUSE_DIO_WRITE);
- fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
- } else {
- ret = __fuse_direct_read(io, iter, &pos);
- }
- iov_iter_reexpand(iter, iov_iter_count(iter) + shortened);
- if (io->async) {
- bool blocking = io->blocking;
- fuse_aio_complete(io, ret < 0 ? ret : 0, -1);
- /* we have a non-extending, async request, so return */
- if (!blocking)
- return -EIOCBQUEUED;
- wait_for_completion(&wait);
- ret = fuse_get_res_by_io(io);
- }
- kref_put(&io->refcnt, fuse_io_release);
- if (iov_iter_rw(iter) == WRITE) {
- fuse_write_update_attr(inode, pos, ret);
- /* For extending writes we already hold exclusive lock */
- if (ret < 0 && offset + count > i_size)
- fuse_do_truncate(file);
- }
- return ret;
- }
- static int fuse_writeback_range(struct inode *inode, loff_t start, loff_t end)
- {
- int err = filemap_write_and_wait_range(inode->i_mapping, start, LLONG_MAX);
- if (!err)
- fuse_sync_writes(inode);
- return err;
- }
- static long fuse_file_fallocate(struct file *file, int mode, loff_t offset,
- loff_t length)
- {
- struct fuse_file *ff = file->private_data;
- struct inode *inode = file_inode(file);
- struct fuse_inode *fi = get_fuse_inode(inode);
- struct fuse_mount *fm = ff->fm;
- FUSE_ARGS(args);
- struct fuse_fallocate_in inarg = {
- .fh = ff->fh,
- .offset = offset,
- .length = length,
- .mode = mode
- };
- int err;
- bool block_faults = FUSE_IS_DAX(inode) &&
- (!(mode & FALLOC_FL_KEEP_SIZE) ||
- (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE)));
- if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE |
- FALLOC_FL_ZERO_RANGE))
- return -EOPNOTSUPP;
- if (fm->fc->no_fallocate)
- return -EOPNOTSUPP;
- inode_lock(inode);
- if (block_faults) {
- filemap_invalidate_lock(inode->i_mapping);
- err = fuse_dax_break_layouts(inode, 0, -1);
- if (err)
- goto out;
- }
- if (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE)) {
- loff_t endbyte = offset + length - 1;
- err = fuse_writeback_range(inode, offset, endbyte);
- if (err)
- goto out;
- }
- if (!(mode & FALLOC_FL_KEEP_SIZE) &&
- offset + length > i_size_read(inode)) {
- err = inode_newsize_ok(inode, offset + length);
- if (err)
- goto out;
- }
- err = file_modified(file);
- if (err)
- goto out;
- if (!(mode & FALLOC_FL_KEEP_SIZE))
- set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
- args.opcode = FUSE_FALLOCATE;
- args.nodeid = ff->nodeid;
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- err = fuse_simple_request(fm, &args);
- if (err == -ENOSYS) {
- fm->fc->no_fallocate = 1;
- err = -EOPNOTSUPP;
- }
- if (err)
- goto out;
- /* we could have extended the file */
- if (!(mode & FALLOC_FL_KEEP_SIZE)) {
- if (fuse_write_update_attr(inode, offset + length, length))
- file_update_time(file);
- }
- if (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE))
- truncate_pagecache_range(inode, offset, offset + length - 1);
- fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
- out:
- if (!(mode & FALLOC_FL_KEEP_SIZE))
- clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
- if (block_faults)
- filemap_invalidate_unlock(inode->i_mapping);
- inode_unlock(inode);
- fuse_flush_time_update(inode);
- return err;
- }
- static ssize_t __fuse_copy_file_range(struct file *file_in, loff_t pos_in,
- struct file *file_out, loff_t pos_out,
- size_t len, unsigned int flags)
- {
- struct fuse_file *ff_in = file_in->private_data;
- struct fuse_file *ff_out = file_out->private_data;
- struct inode *inode_in = file_inode(file_in);
- struct inode *inode_out = file_inode(file_out);
- struct fuse_inode *fi_out = get_fuse_inode(inode_out);
- struct fuse_mount *fm = ff_in->fm;
- struct fuse_conn *fc = fm->fc;
- FUSE_ARGS(args);
- struct fuse_copy_file_range_in inarg = {
- .fh_in = ff_in->fh,
- .off_in = pos_in,
- .nodeid_out = ff_out->nodeid,
- .fh_out = ff_out->fh,
- .off_out = pos_out,
- .len = min_t(size_t, len, UINT_MAX & PAGE_MASK),
- .flags = flags
- };
- struct fuse_write_out outarg;
- ssize_t err;
- /* mark unstable when write-back is not used, and file_out gets
- * extended */
- bool is_unstable = (!fc->writeback_cache) &&
- ((pos_out + len) > inode_out->i_size);
- if (fc->no_copy_file_range)
- return -EOPNOTSUPP;
- if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb)
- return -EXDEV;
- inode_lock(inode_in);
- err = fuse_writeback_range(inode_in, pos_in, pos_in + len - 1);
- inode_unlock(inode_in);
- if (err)
- return err;
- inode_lock(inode_out);
- err = file_modified(file_out);
- if (err)
- goto out;
- /*
- * Write out dirty pages in the destination file before sending the COPY
- * request to userspace. After the request is completed, truncate off
- * pages (including partial ones) from the cache that have been copied,
- * since these contain stale data at that point.
- *
- * This should be mostly correct, but if the COPY writes to partial
- * pages (at the start or end) and the parts not covered by the COPY are
- * written through a memory map after calling fuse_writeback_range(),
- * then these partial page modifications will be lost on truncation.
- *
- * It is unlikely that someone would rely on such mixed style
- * modifications. Yet this does give less guarantees than if the
- * copying was performed with write(2).
- *
- * To fix this a mapping->invalidate_lock could be used to prevent new
- * faults while the copy is ongoing.
- */
- err = fuse_writeback_range(inode_out, pos_out, pos_out + len - 1);
- if (err)
- goto out;
- if (is_unstable)
- set_bit(FUSE_I_SIZE_UNSTABLE, &fi_out->state);
- args.opcode = FUSE_COPY_FILE_RANGE;
- args.nodeid = ff_in->nodeid;
- args.in_numargs = 1;
- args.in_args[0].size = sizeof(inarg);
- args.in_args[0].value = &inarg;
- args.out_numargs = 1;
- args.out_args[0].size = sizeof(outarg);
- args.out_args[0].value = &outarg;
- err = fuse_simple_request(fm, &args);
- if (err == -ENOSYS) {
- fc->no_copy_file_range = 1;
- err = -EOPNOTSUPP;
- }
- if (!err && outarg.size > len)
- err = -EIO;
- if (err)
- goto out;
- truncate_inode_pages_range(inode_out->i_mapping,
- ALIGN_DOWN(pos_out, PAGE_SIZE),
- ALIGN(pos_out + outarg.size, PAGE_SIZE) - 1);
- file_update_time(file_out);
- fuse_write_update_attr(inode_out, pos_out + outarg.size, outarg.size);
- err = outarg.size;
- out:
- if (is_unstable)
- clear_bit(FUSE_I_SIZE_UNSTABLE, &fi_out->state);
- inode_unlock(inode_out);
- file_accessed(file_in);
- fuse_flush_time_update(inode_out);
- return err;
- }
- static ssize_t fuse_copy_file_range(struct file *src_file, loff_t src_off,
- struct file *dst_file, loff_t dst_off,
- size_t len, unsigned int flags)
- {
- ssize_t ret;
- ret = __fuse_copy_file_range(src_file, src_off, dst_file, dst_off,
- len, flags);
- if (ret == -EOPNOTSUPP || ret == -EXDEV)
- ret = splice_copy_file_range(src_file, src_off, dst_file,
- dst_off, len);
- return ret;
- }
- static const struct file_operations fuse_file_operations = {
- .llseek = fuse_file_llseek,
- .read_iter = fuse_file_read_iter,
- .write_iter = fuse_file_write_iter,
- .mmap = fuse_file_mmap,
- .open = fuse_open,
- .flush = fuse_flush,
- .release = fuse_release,
- .fsync = fuse_fsync,
- .lock = fuse_file_lock,
- .get_unmapped_area = thp_get_unmapped_area,
- .flock = fuse_file_flock,
- .splice_read = fuse_splice_read,
- .splice_write = fuse_splice_write,
- .unlocked_ioctl = fuse_file_ioctl,
- .compat_ioctl = fuse_file_compat_ioctl,
- .poll = fuse_file_poll,
- .fallocate = fuse_file_fallocate,
- .copy_file_range = fuse_copy_file_range,
- };
- static const struct address_space_operations fuse_file_aops = {
- .read_folio = fuse_read_folio,
- .readahead = fuse_readahead,
- .writepages = fuse_writepages,
- .launder_folio = fuse_launder_folio,
- .dirty_folio = filemap_dirty_folio,
- .migrate_folio = filemap_migrate_folio,
- .bmap = fuse_bmap,
- .direct_IO = fuse_direct_IO,
- .write_begin = fuse_write_begin,
- .write_end = fuse_write_end,
- };
- void fuse_init_file_inode(struct inode *inode, unsigned int flags)
- {
- struct fuse_inode *fi = get_fuse_inode(inode);
- inode->i_fop = &fuse_file_operations;
- inode->i_data.a_ops = &fuse_file_aops;
- INIT_LIST_HEAD(&fi->write_files);
- INIT_LIST_HEAD(&fi->queued_writes);
- fi->writectr = 0;
- fi->iocachectr = 0;
- init_waitqueue_head(&fi->page_waitq);
- init_waitqueue_head(&fi->direct_io_waitq);
- fi->writepages = RB_ROOT;
- if (IS_ENABLED(CONFIG_FUSE_DAX))
- fuse_dax_inode_init(inode, flags);
- }
|