]>
Commit | Line | Data |
---|---|---|
55716d26 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
151060ac TH |
2 | /* |
3 | * CUSE: Character device in Userspace | |
4 | * | |
5 | * Copyright (C) 2008-2009 SUSE Linux Products GmbH | |
6 | * Copyright (C) 2008-2009 Tejun Heo <[email protected]> | |
7 | * | |
151060ac TH |
8 | * CUSE enables character devices to be implemented from userland much |
9 | * like FUSE allows filesystems. On initialization /dev/cuse is | |
10 | * created. By opening the file and replying to the CUSE_INIT request | |
11 | * userland CUSE server can create a character device. After that the | |
12 | * operation is very similar to FUSE. | |
13 | * | |
14 | * A CUSE instance involves the following objects. | |
15 | * | |
16 | * cuse_conn : contains fuse_conn and serves as bonding structure | |
17 | * channel : file handle connected to the userland CUSE server | |
18 | * cdev : the implemented character device | |
19 | * dev : generic device for cdev | |
20 | * | |
21 | * Note that 'channel' is what 'dev' is in FUSE. As CUSE deals with | |
22 | * devices, it's called 'channel' to reduce confusion. | |
23 | * | |
24 | * channel determines when the character device dies. When channel is | |
25 | * closed, everything begins to destruct. The cuse_conn is taken off | |
26 | * the lookup table preventing further access from cdev, cdev and | |
27 | * generic device are removed and the base reference of cuse_conn is | |
28 | * put. | |
29 | * | |
30 | * On each open, the matching cuse_conn is looked up and if found an | |
31 | * additional reference is taken which is released when the file is | |
32 | * closed. | |
33 | */ | |
34 | ||
f2294482 KS |
35 | #define pr_fmt(fmt) "CUSE: " fmt |
36 | ||
151060ac TH |
37 | #include <linux/fuse.h> |
38 | #include <linux/cdev.h> | |
39 | #include <linux/device.h> | |
40 | #include <linux/file.h> | |
41 | #include <linux/fs.h> | |
42 | #include <linux/kdev_t.h> | |
43 | #include <linux/kthread.h> | |
44 | #include <linux/list.h> | |
45 | #include <linux/magic.h> | |
46 | #include <linux/miscdevice.h> | |
47 | #include <linux/mutex.h> | |
5a0e3ad6 | 48 | #include <linux/slab.h> |
151060ac | 49 | #include <linux/stat.h> |
143cb494 | 50 | #include <linux/module.h> |
e2e40f2c | 51 | #include <linux/uio.h> |
8cb08329 | 52 | #include <linux/user_namespace.h> |
151060ac TH |
53 | |
54 | #include "fuse_i.h" | |
55 | ||
56 | #define CUSE_CONNTBL_LEN 64 | |
57 | ||
58 | struct cuse_conn { | |
59 | struct list_head list; /* linked on cuse_conntbl */ | |
fcee216b | 60 | struct fuse_mount fm; /* Dummy mount referencing fc */ |
151060ac TH |
61 | struct fuse_conn fc; /* fuse connection */ |
62 | struct cdev *cdev; /* associated character device */ | |
63 | struct device *dev; /* device representing @cdev */ | |
64 | ||
65 | /* init parameters, set once during initialization */ | |
66 | bool unrestricted_ioctl; | |
67 | }; | |
68 | ||
8ce03fd7 | 69 | static DEFINE_MUTEX(cuse_lock); /* protects registration */ |
151060ac TH |
70 | static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN]; |
71 | static struct class *cuse_class; | |
72 | ||
73 | static struct cuse_conn *fc_to_cc(struct fuse_conn *fc) | |
74 | { | |
75 | return container_of(fc, struct cuse_conn, fc); | |
76 | } | |
77 | ||
78 | static struct list_head *cuse_conntbl_head(dev_t devt) | |
79 | { | |
80 | return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN]; | |
81 | } | |
82 | ||
83 | ||
84 | /************************************************************************** | |
85 | * CUSE frontend operations | |
86 | * | |
87 | * These are file operations for the character device. | |
88 | * | |
89 | * On open, CUSE opens a file from the FUSE mnt and stores it to | |
90 | * private_data of the open file. All other ops call FUSE ops on the | |
91 | * FUSE file. | |
92 | */ | |
93 | ||
cfa86a74 | 94 | static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to) |
151060ac | 95 | { |
e1c0eecb | 96 | struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb); |
151060ac TH |
97 | loff_t pos = 0; |
98 | ||
cfa86a74 | 99 | return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE); |
151060ac TH |
100 | } |
101 | ||
cfa86a74 | 102 | static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from) |
151060ac | 103 | { |
e1c0eecb | 104 | struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb); |
151060ac TH |
105 | loff_t pos = 0; |
106 | /* | |
107 | * No locking or generic_write_checks(), the server is | |
108 | * responsible for locking and sanity checks. | |
109 | */ | |
cfa86a74 | 110 | return fuse_direct_io(&io, from, &pos, |
ea8cd333 | 111 | FUSE_DIO_WRITE | FUSE_DIO_CUSE); |
151060ac TH |
112 | } |
113 | ||
114 | static int cuse_open(struct inode *inode, struct file *file) | |
115 | { | |
116 | dev_t devt = inode->i_cdev->dev; | |
117 | struct cuse_conn *cc = NULL, *pos; | |
118 | int rc; | |
119 | ||
120 | /* look up and get the connection */ | |
8ce03fd7 | 121 | mutex_lock(&cuse_lock); |
151060ac TH |
122 | list_for_each_entry(pos, cuse_conntbl_head(devt), list) |
123 | if (pos->dev->devt == devt) { | |
124 | fuse_conn_get(&pos->fc); | |
125 | cc = pos; | |
126 | break; | |
127 | } | |
8ce03fd7 | 128 | mutex_unlock(&cuse_lock); |
151060ac TH |
129 | |
130 | /* dead? */ | |
131 | if (!cc) | |
132 | return -ENODEV; | |
133 | ||
134 | /* | |
135 | * Generic permission check is already done against the chrdev | |
136 | * file, proceed to open. | |
137 | */ | |
fcee216b | 138 | rc = fuse_do_open(&cc->fm, 0, file, 0); |
151060ac TH |
139 | if (rc) |
140 | fuse_conn_put(&cc->fc); | |
141 | return rc; | |
142 | } | |
143 | ||
144 | static int cuse_release(struct inode *inode, struct file *file) | |
145 | { | |
146 | struct fuse_file *ff = file->private_data; | |
fcee216b | 147 | struct fuse_mount *fm = ff->fm; |
151060ac | 148 | |
56d250ef | 149 | fuse_sync_release(NULL, ff, file->f_flags); |
fcee216b | 150 | fuse_conn_put(fm->fc); |
151060ac TH |
151 | |
152 | return 0; | |
153 | } | |
154 | ||
155 | static long cuse_file_ioctl(struct file *file, unsigned int cmd, | |
156 | unsigned long arg) | |
157 | { | |
158 | struct fuse_file *ff = file->private_data; | |
fcee216b | 159 | struct cuse_conn *cc = fc_to_cc(ff->fm->fc); |
151060ac TH |
160 | unsigned int flags = 0; |
161 | ||
162 | if (cc->unrestricted_ioctl) | |
163 | flags |= FUSE_IOCTL_UNRESTRICTED; | |
164 | ||
165 | return fuse_do_ioctl(file, cmd, arg, flags); | |
166 | } | |
167 | ||
168 | static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd, | |
169 | unsigned long arg) | |
170 | { | |
171 | struct fuse_file *ff = file->private_data; | |
fcee216b | 172 | struct cuse_conn *cc = fc_to_cc(ff->fm->fc); |
151060ac TH |
173 | unsigned int flags = FUSE_IOCTL_COMPAT; |
174 | ||
175 | if (cc->unrestricted_ioctl) | |
176 | flags |= FUSE_IOCTL_UNRESTRICTED; | |
177 | ||
178 | return fuse_do_ioctl(file, cmd, arg, flags); | |
179 | } | |
180 | ||
181 | static const struct file_operations cuse_frontend_fops = { | |
182 | .owner = THIS_MODULE, | |
cfa86a74 AV |
183 | .read_iter = cuse_read_iter, |
184 | .write_iter = cuse_write_iter, | |
151060ac TH |
185 | .open = cuse_open, |
186 | .release = cuse_release, | |
187 | .unlocked_ioctl = cuse_file_ioctl, | |
188 | .compat_ioctl = cuse_file_compat_ioctl, | |
189 | .poll = fuse_file_poll, | |
6038f373 | 190 | .llseek = noop_llseek, |
151060ac TH |
191 | }; |
192 | ||
193 | ||
194 | /************************************************************************** | |
195 | * CUSE channel initialization and destruction | |
196 | */ | |
197 | ||
198 | struct cuse_devinfo { | |
199 | const char *name; | |
200 | }; | |
201 | ||
202 | /** | |
203 | * cuse_parse_one - parse one key=value pair | |
204 | * @pp: i/o parameter for the current position | |
205 | * @end: points to one past the end of the packed string | |
206 | * @keyp: out parameter for key | |
207 | * @valp: out parameter for value | |
208 | * | |
209 | * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends | |
210 | * at @end - 1. This function parses one pair and set *@keyp to the | |
211 | * start of the key and *@valp to the start of the value. Note that | |
212 | * the original string is modified such that the key string is | |
213 | * terminated with '\0'. *@pp is updated to point to the next string. | |
214 | * | |
215 | * RETURNS: | |
216 | * 1 on successful parse, 0 on EOF, -errno on failure. | |
217 | */ | |
218 | static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp) | |
219 | { | |
220 | char *p = *pp; | |
221 | char *key, *val; | |
222 | ||
223 | while (p < end && *p == '\0') | |
224 | p++; | |
225 | if (p == end) | |
226 | return 0; | |
227 | ||
228 | if (end[-1] != '\0') { | |
f2294482 | 229 | pr_err("info not properly terminated\n"); |
151060ac TH |
230 | return -EINVAL; |
231 | } | |
232 | ||
233 | key = val = p; | |
234 | p += strlen(p); | |
235 | ||
236 | if (valp) { | |
237 | strsep(&val, "="); | |
238 | if (!val) | |
239 | val = key + strlen(key); | |
240 | key = strstrip(key); | |
241 | val = strstrip(val); | |
242 | } else | |
243 | key = strstrip(key); | |
244 | ||
245 | if (!strlen(key)) { | |
f2294482 | 246 | pr_err("zero length info key specified\n"); |
151060ac TH |
247 | return -EINVAL; |
248 | } | |
249 | ||
250 | *pp = p; | |
251 | *keyp = key; | |
252 | if (valp) | |
253 | *valp = val; | |
254 | ||
255 | return 1; | |
256 | } | |
257 | ||
258 | /** | |
06bbb761 | 259 | * cuse_parse_devinfo - parse device info |
151060ac TH |
260 | * @p: device info string |
261 | * @len: length of device info string | |
262 | * @devinfo: out parameter for parsed device info | |
263 | * | |
264 | * Parse @p to extract device info and store it into @devinfo. String | |
265 | * pointed to by @p is modified by parsing and @devinfo points into | |
266 | * them, so @p shouldn't be freed while @devinfo is in use. | |
267 | * | |
268 | * RETURNS: | |
269 | * 0 on success, -errno on failure. | |
270 | */ | |
271 | static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo) | |
272 | { | |
273 | char *end = p + len; | |
3f649ab7 | 274 | char *key, *val; |
151060ac TH |
275 | int rc; |
276 | ||
277 | while (true) { | |
278 | rc = cuse_parse_one(&p, end, &key, &val); | |
279 | if (rc < 0) | |
280 | return rc; | |
281 | if (!rc) | |
282 | break; | |
283 | if (strcmp(key, "DEVNAME") == 0) | |
284 | devinfo->name = val; | |
285 | else | |
f2294482 | 286 | pr_warn("unknown device info \"%s\"\n", key); |
151060ac TH |
287 | } |
288 | ||
289 | if (!devinfo->name || !strlen(devinfo->name)) { | |
f2294482 | 290 | pr_err("DEVNAME unspecified\n"); |
151060ac TH |
291 | return -EINVAL; |
292 | } | |
293 | ||
294 | return 0; | |
295 | } | |
296 | ||
297 | static void cuse_gendev_release(struct device *dev) | |
298 | { | |
299 | kfree(dev); | |
300 | } | |
301 | ||
b50ef7c5 MS |
302 | struct cuse_init_args { |
303 | struct fuse_args_pages ap; | |
304 | struct cuse_init_in in; | |
305 | struct cuse_init_out out; | |
ee80369a JK |
306 | struct folio *folio; |
307 | struct fuse_folio_desc desc; | |
b50ef7c5 MS |
308 | }; |
309 | ||
151060ac TH |
310 | /** |
311 | * cuse_process_init_reply - finish initializing CUSE channel | |
312 | * | |
09492cb4 YL |
313 | * @fm: The fuse mount information containing the CUSE connection. |
314 | * @args: The arguments passed to the init reply. | |
315 | * @error: The error code signifying if any error occurred during the process. | |
316 | * | |
151060ac TH |
317 | * This function creates the character device and sets up all the |
318 | * required data structures for it. Please read the comment at the | |
319 | * top of this file for high level overview. | |
320 | */ | |
fcee216b | 321 | static void cuse_process_init_reply(struct fuse_mount *fm, |
b50ef7c5 | 322 | struct fuse_args *args, int error) |
151060ac | 323 | { |
fcee216b | 324 | struct fuse_conn *fc = fm->fc; |
b50ef7c5 MS |
325 | struct cuse_init_args *ia = container_of(args, typeof(*ia), ap.args); |
326 | struct fuse_args_pages *ap = &ia->ap; | |
30783587 | 327 | struct cuse_conn *cc = fc_to_cc(fc), *pos; |
b50ef7c5 | 328 | struct cuse_init_out *arg = &ia->out; |
ee80369a | 329 | struct folio *folio = ap->folios[0]; |
151060ac TH |
330 | struct cuse_devinfo devinfo = { }; |
331 | struct device *dev; | |
332 | struct cdev *cdev; | |
333 | dev_t devt; | |
30783587 | 334 | int rc, i; |
151060ac | 335 | |
b50ef7c5 | 336 | if (error || arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) |
151060ac | 337 | goto err; |
151060ac TH |
338 | |
339 | fc->minor = arg->minor; | |
340 | fc->max_read = max_t(unsigned, arg->max_read, 4096); | |
341 | fc->max_write = max_t(unsigned, arg->max_write, 4096); | |
342 | ||
343 | /* parse init reply */ | |
344 | cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL; | |
345 | ||
ee80369a | 346 | rc = cuse_parse_devinfo(folio_address(folio), ap->args.out_args[1].size, |
151060ac TH |
347 | &devinfo); |
348 | if (rc) | |
349 | goto err; | |
350 | ||
351 | /* determine and reserve devt */ | |
352 | devt = MKDEV(arg->dev_major, arg->dev_minor); | |
353 | if (!MAJOR(devt)) | |
354 | rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name); | |
355 | else | |
356 | rc = register_chrdev_region(devt, 1, devinfo.name); | |
357 | if (rc) { | |
f2294482 | 358 | pr_err("failed to register chrdev region\n"); |
151060ac TH |
359 | goto err; |
360 | } | |
361 | ||
362 | /* devt determined, create device */ | |
363 | rc = -ENOMEM; | |
364 | dev = kzalloc(sizeof(*dev), GFP_KERNEL); | |
365 | if (!dev) | |
366 | goto err_region; | |
367 | ||
368 | device_initialize(dev); | |
369 | dev_set_uevent_suppress(dev, 1); | |
370 | dev->class = cuse_class; | |
371 | dev->devt = devt; | |
372 | dev->release = cuse_gendev_release; | |
373 | dev_set_drvdata(dev, cc); | |
374 | dev_set_name(dev, "%s", devinfo.name); | |
375 | ||
30783587 DR |
376 | mutex_lock(&cuse_lock); |
377 | ||
378 | /* make sure the device-name is unique */ | |
379 | for (i = 0; i < CUSE_CONNTBL_LEN; ++i) { | |
380 | list_for_each_entry(pos, &cuse_conntbl[i], list) | |
381 | if (!strcmp(dev_name(pos->dev), dev_name(dev))) | |
382 | goto err_unlock; | |
383 | } | |
384 | ||
151060ac TH |
385 | rc = device_add(dev); |
386 | if (rc) | |
30783587 | 387 | goto err_unlock; |
151060ac TH |
388 | |
389 | /* register cdev */ | |
390 | rc = -ENOMEM; | |
391 | cdev = cdev_alloc(); | |
392 | if (!cdev) | |
30783587 | 393 | goto err_unlock; |
151060ac TH |
394 | |
395 | cdev->owner = THIS_MODULE; | |
396 | cdev->ops = &cuse_frontend_fops; | |
397 | ||
398 | rc = cdev_add(cdev, devt, 1); | |
399 | if (rc) | |
400 | goto err_cdev; | |
401 | ||
402 | cc->dev = dev; | |
403 | cc->cdev = cdev; | |
404 | ||
405 | /* make the device available */ | |
151060ac | 406 | list_add(&cc->list, cuse_conntbl_head(devt)); |
8ce03fd7 | 407 | mutex_unlock(&cuse_lock); |
151060ac TH |
408 | |
409 | /* announce device availability */ | |
410 | dev_set_uevent_suppress(dev, 0); | |
411 | kobject_uevent(&dev->kobj, KOBJ_ADD); | |
412 | out: | |
b50ef7c5 | 413 | kfree(ia); |
ee80369a | 414 | folio_put(folio); |
151060ac TH |
415 | return; |
416 | ||
417 | err_cdev: | |
418 | cdev_del(cdev); | |
30783587 DR |
419 | err_unlock: |
420 | mutex_unlock(&cuse_lock); | |
151060ac TH |
421 | put_device(dev); |
422 | err_region: | |
423 | unregister_chrdev_region(devt, 1); | |
424 | err: | |
eb98e3bd | 425 | fuse_abort_conn(fc); |
151060ac TH |
426 | goto out; |
427 | } | |
428 | ||
429 | static int cuse_send_init(struct cuse_conn *cc) | |
430 | { | |
431 | int rc; | |
ee80369a | 432 | struct folio *folio; |
fcee216b | 433 | struct fuse_mount *fm = &cc->fm; |
b50ef7c5 MS |
434 | struct cuse_init_args *ia; |
435 | struct fuse_args_pages *ap; | |
151060ac TH |
436 | |
437 | BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE); | |
438 | ||
151060ac | 439 | rc = -ENOMEM; |
ee80369a JK |
440 | |
441 | folio = folio_alloc(GFP_KERNEL | __GFP_ZERO, 0); | |
442 | if (!folio) | |
b50ef7c5 | 443 | goto err; |
151060ac | 444 | |
b50ef7c5 MS |
445 | ia = kzalloc(sizeof(*ia), GFP_KERNEL); |
446 | if (!ia) | |
ee80369a | 447 | goto err_free_folio; |
07d5f69b | 448 | |
b50ef7c5 MS |
449 | ap = &ia->ap; |
450 | ia->in.major = FUSE_KERNEL_VERSION; | |
451 | ia->in.minor = FUSE_KERNEL_MINOR_VERSION; | |
452 | ia->in.flags |= CUSE_UNRESTRICTED_IOCTL; | |
453 | ap->args.opcode = CUSE_INIT; | |
454 | ap->args.in_numargs = 1; | |
455 | ap->args.in_args[0].size = sizeof(ia->in); | |
456 | ap->args.in_args[0].value = &ia->in; | |
457 | ap->args.out_numargs = 2; | |
458 | ap->args.out_args[0].size = sizeof(ia->out); | |
459 | ap->args.out_args[0].value = &ia->out; | |
460 | ap->args.out_args[1].size = CUSE_INIT_INFO_MAX; | |
cabdb4fa | 461 | ap->args.out_argvar = true; |
462 | ap->args.out_pages = true; | |
ee80369a JK |
463 | ap->num_folios = 1; |
464 | ap->folios = &ia->folio; | |
68bfb7eb | 465 | ap->descs = &ia->desc; |
ee80369a | 466 | ia->folio = folio; |
b50ef7c5 MS |
467 | ia->desc.length = ap->args.out_args[1].size; |
468 | ap->args.end = cuse_process_init_reply; | |
469 | ||
fcee216b | 470 | rc = fuse_simple_background(fm, &ap->args, GFP_KERNEL); |
b50ef7c5 MS |
471 | if (rc) { |
472 | kfree(ia); | |
ee80369a JK |
473 | err_free_folio: |
474 | folio_put(folio); | |
b50ef7c5 | 475 | } |
151060ac TH |
476 | err: |
477 | return rc; | |
478 | } | |
479 | ||
480 | static void cuse_fc_release(struct fuse_conn *fc) | |
481 | { | |
053fc4f7 | 482 | kfree(fc_to_cc(fc)); |
151060ac TH |
483 | } |
484 | ||
485 | /** | |
486 | * cuse_channel_open - open method for /dev/cuse | |
487 | * @inode: inode for /dev/cuse | |
488 | * @file: file struct being opened | |
489 | * | |
490 | * Userland CUSE server can create a CUSE device by opening /dev/cuse | |
8272f4c9 | 491 | * and replying to the initialization request kernel sends. This |
151060ac TH |
492 | * function is responsible for handling CUSE device initialization. |
493 | * Because the fd opened by this function is used during | |
494 | * initialization, this function only creates cuse_conn and sends | |
495 | * init. The rest is delegated to a kthread. | |
496 | * | |
497 | * RETURNS: | |
498 | * 0 on success, -errno on failure. | |
499 | */ | |
500 | static int cuse_channel_open(struct inode *inode, struct file *file) | |
501 | { | |
cc080e9e | 502 | struct fuse_dev *fud; |
151060ac TH |
503 | struct cuse_conn *cc; |
504 | int rc; | |
505 | ||
506 | /* set up cuse_conn */ | |
507 | cc = kzalloc(sizeof(*cc), GFP_KERNEL); | |
508 | if (!cc) | |
509 | return -ENOMEM; | |
510 | ||
8cb08329 EB |
511 | /* |
512 | * Limit the cuse channel to requests that can | |
513 | * be represented in file->f_cred->user_ns. | |
514 | */ | |
fcee216b MR |
515 | fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns, |
516 | &fuse_dev_fiq_ops, NULL); | |
151060ac | 517 | |
3c9c1433 | 518 | cc->fc.release = cuse_fc_release; |
0cd1eb9a | 519 | fud = fuse_dev_alloc_install(&cc->fc); |
3c9c1433 MS |
520 | fuse_conn_put(&cc->fc); |
521 | if (!fud) | |
cc080e9e | 522 | return -ENOMEM; |
cc080e9e | 523 | |
151060ac | 524 | INIT_LIST_HEAD(&cc->list); |
151060ac | 525 | |
796523fb | 526 | cc->fc.initialized = 1; |
151060ac TH |
527 | rc = cuse_send_init(cc); |
528 | if (rc) { | |
cc080e9e | 529 | fuse_dev_free(fud); |
151060ac TH |
530 | return rc; |
531 | } | |
cc080e9e | 532 | file->private_data = fud; |
151060ac TH |
533 | |
534 | return 0; | |
535 | } | |
536 | ||
537 | /** | |
538 | * cuse_channel_release - release method for /dev/cuse | |
539 | * @inode: inode for /dev/cuse | |
540 | * @file: file struct being closed | |
541 | * | |
542 | * Disconnect the channel, deregister CUSE device and initiate | |
543 | * destruction by putting the default reference. | |
544 | * | |
545 | * RETURNS: | |
546 | * 0 on success, -errno on failure. | |
547 | */ | |
548 | static int cuse_channel_release(struct inode *inode, struct file *file) | |
549 | { | |
cc080e9e MS |
550 | struct fuse_dev *fud = file->private_data; |
551 | struct cuse_conn *cc = fc_to_cc(fud->fc); | |
151060ac TH |
552 | |
553 | /* remove from the conntbl, no more access from this point on */ | |
8ce03fd7 | 554 | mutex_lock(&cuse_lock); |
151060ac | 555 | list_del_init(&cc->list); |
8ce03fd7 | 556 | mutex_unlock(&cuse_lock); |
151060ac TH |
557 | |
558 | /* remove device */ | |
559 | if (cc->dev) | |
560 | device_unregister(cc->dev); | |
561 | if (cc->cdev) { | |
562 | unregister_chrdev_region(cc->cdev->dev, 1); | |
563 | cdev_del(cc->cdev); | |
564 | } | |
565 | ||
e2283a73 | 566 | return fuse_dev_release(inode, file); |
151060ac TH |
567 | } |
568 | ||
569 | static struct file_operations cuse_channel_fops; /* initialized during init */ | |
570 | ||
571 | ||
572 | /************************************************************************** | |
573 | * Misc stuff and module initializatiion | |
574 | * | |
575 | * CUSE exports the same set of attributes to sysfs as fusectl. | |
576 | */ | |
577 | ||
578 | static ssize_t cuse_class_waiting_show(struct device *dev, | |
579 | struct device_attribute *attr, char *buf) | |
580 | { | |
581 | struct cuse_conn *cc = dev_get_drvdata(dev); | |
582 | ||
583 | return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting)); | |
584 | } | |
58f86cc8 | 585 | static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL); |
151060ac TH |
586 | |
587 | static ssize_t cuse_class_abort_store(struct device *dev, | |
588 | struct device_attribute *attr, | |
589 | const char *buf, size_t count) | |
590 | { | |
591 | struct cuse_conn *cc = dev_get_drvdata(dev); | |
592 | ||
eb98e3bd | 593 | fuse_abort_conn(&cc->fc); |
151060ac TH |
594 | return count; |
595 | } | |
58f86cc8 | 596 | static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store); |
151060ac | 597 | |
4183fb95 GKH |
598 | static struct attribute *cuse_class_dev_attrs[] = { |
599 | &dev_attr_waiting.attr, | |
600 | &dev_attr_abort.attr, | |
601 | NULL, | |
151060ac | 602 | }; |
4183fb95 | 603 | ATTRIBUTE_GROUPS(cuse_class_dev); |
151060ac TH |
604 | |
605 | static struct miscdevice cuse_miscdev = { | |
cb2ffb26 | 606 | .minor = CUSE_MINOR, |
151060ac TH |
607 | .name = "cuse", |
608 | .fops = &cuse_channel_fops, | |
609 | }; | |
610 | ||
cb2ffb26 TG |
611 | MODULE_ALIAS_MISCDEV(CUSE_MINOR); |
612 | MODULE_ALIAS("devname:cuse"); | |
613 | ||
151060ac TH |
614 | static int __init cuse_init(void) |
615 | { | |
616 | int i, rc; | |
617 | ||
618 | /* init conntbl */ | |
619 | for (i = 0; i < CUSE_CONNTBL_LEN; i++) | |
620 | INIT_LIST_HEAD(&cuse_conntbl[i]); | |
621 | ||
622 | /* inherit and extend fuse_dev_operations */ | |
623 | cuse_channel_fops = fuse_dev_operations; | |
624 | cuse_channel_fops.owner = THIS_MODULE; | |
625 | cuse_channel_fops.open = cuse_channel_open; | |
626 | cuse_channel_fops.release = cuse_channel_release; | |
8217673d MS |
627 | /* CUSE is not prepared for FUSE_DEV_IOC_CLONE */ |
628 | cuse_channel_fops.unlocked_ioctl = NULL; | |
151060ac | 629 | |
1aaba11d | 630 | cuse_class = class_create("cuse"); |
151060ac TH |
631 | if (IS_ERR(cuse_class)) |
632 | return PTR_ERR(cuse_class); | |
633 | ||
4183fb95 | 634 | cuse_class->dev_groups = cuse_class_dev_groups; |
151060ac TH |
635 | |
636 | rc = misc_register(&cuse_miscdev); | |
637 | if (rc) { | |
638 | class_destroy(cuse_class); | |
639 | return rc; | |
640 | } | |
641 | ||
642 | return 0; | |
643 | } | |
644 | ||
645 | static void __exit cuse_exit(void) | |
646 | { | |
647 | misc_deregister(&cuse_miscdev); | |
648 | class_destroy(cuse_class); | |
649 | } | |
650 | ||
651 | module_init(cuse_init); | |
652 | module_exit(cuse_exit); | |
653 | ||
654 | MODULE_AUTHOR("Tejun Heo <[email protected]>"); | |
655 | MODULE_DESCRIPTION("Character device in Userspace"); | |
656 | MODULE_LICENSE("GPL"); |