]> Git Repo - linux.git/blame - fs/fuse/cuse.c
Linux 6.14-rc3
[linux.git] / fs / fuse / cuse.c
CommitLineData
55716d26 1// SPDX-License-Identifier: GPL-2.0-only
151060ac
TH
2/*
3 * CUSE: Character device in Userspace
4 *
5 * Copyright (C) 2008-2009 SUSE Linux Products GmbH
6 * Copyright (C) 2008-2009 Tejun Heo <[email protected]>
7 *
151060ac
TH
8 * CUSE enables character devices to be implemented from userland much
9 * like FUSE allows filesystems. On initialization /dev/cuse is
10 * created. By opening the file and replying to the CUSE_INIT request
11 * userland CUSE server can create a character device. After that the
12 * operation is very similar to FUSE.
13 *
14 * A CUSE instance involves the following objects.
15 *
16 * cuse_conn : contains fuse_conn and serves as bonding structure
17 * channel : file handle connected to the userland CUSE server
18 * cdev : the implemented character device
19 * dev : generic device for cdev
20 *
21 * Note that 'channel' is what 'dev' is in FUSE. As CUSE deals with
22 * devices, it's called 'channel' to reduce confusion.
23 *
24 * channel determines when the character device dies. When channel is
25 * closed, everything begins to destruct. The cuse_conn is taken off
26 * the lookup table preventing further access from cdev, cdev and
27 * generic device are removed and the base reference of cuse_conn is
28 * put.
29 *
30 * On each open, the matching cuse_conn is looked up and if found an
31 * additional reference is taken which is released when the file is
32 * closed.
33 */
34
f2294482
KS
35#define pr_fmt(fmt) "CUSE: " fmt
36
151060ac
TH
37#include <linux/fuse.h>
38#include <linux/cdev.h>
39#include <linux/device.h>
40#include <linux/file.h>
41#include <linux/fs.h>
42#include <linux/kdev_t.h>
43#include <linux/kthread.h>
44#include <linux/list.h>
45#include <linux/magic.h>
46#include <linux/miscdevice.h>
47#include <linux/mutex.h>
5a0e3ad6 48#include <linux/slab.h>
151060ac 49#include <linux/stat.h>
143cb494 50#include <linux/module.h>
e2e40f2c 51#include <linux/uio.h>
8cb08329 52#include <linux/user_namespace.h>
151060ac
TH
53
54#include "fuse_i.h"
55
56#define CUSE_CONNTBL_LEN 64
57
58struct cuse_conn {
59 struct list_head list; /* linked on cuse_conntbl */
fcee216b 60 struct fuse_mount fm; /* Dummy mount referencing fc */
151060ac
TH
61 struct fuse_conn fc; /* fuse connection */
62 struct cdev *cdev; /* associated character device */
63 struct device *dev; /* device representing @cdev */
64
65 /* init parameters, set once during initialization */
66 bool unrestricted_ioctl;
67};
68
8ce03fd7 69static DEFINE_MUTEX(cuse_lock); /* protects registration */
151060ac
TH
70static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
71static struct class *cuse_class;
72
73static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
74{
75 return container_of(fc, struct cuse_conn, fc);
76}
77
78static struct list_head *cuse_conntbl_head(dev_t devt)
79{
80 return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
81}
82
83
84/**************************************************************************
85 * CUSE frontend operations
86 *
87 * These are file operations for the character device.
88 *
89 * On open, CUSE opens a file from the FUSE mnt and stores it to
90 * private_data of the open file. All other ops call FUSE ops on the
91 * FUSE file.
92 */
93
cfa86a74 94static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
151060ac 95{
e1c0eecb 96 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
151060ac
TH
97 loff_t pos = 0;
98
cfa86a74 99 return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
151060ac
TH
100}
101
cfa86a74 102static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
151060ac 103{
e1c0eecb 104 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
151060ac
TH
105 loff_t pos = 0;
106 /*
107 * No locking or generic_write_checks(), the server is
108 * responsible for locking and sanity checks.
109 */
cfa86a74 110 return fuse_direct_io(&io, from, &pos,
ea8cd333 111 FUSE_DIO_WRITE | FUSE_DIO_CUSE);
151060ac
TH
112}
113
114static int cuse_open(struct inode *inode, struct file *file)
115{
116 dev_t devt = inode->i_cdev->dev;
117 struct cuse_conn *cc = NULL, *pos;
118 int rc;
119
120 /* look up and get the connection */
8ce03fd7 121 mutex_lock(&cuse_lock);
151060ac
TH
122 list_for_each_entry(pos, cuse_conntbl_head(devt), list)
123 if (pos->dev->devt == devt) {
124 fuse_conn_get(&pos->fc);
125 cc = pos;
126 break;
127 }
8ce03fd7 128 mutex_unlock(&cuse_lock);
151060ac
TH
129
130 /* dead? */
131 if (!cc)
132 return -ENODEV;
133
134 /*
135 * Generic permission check is already done against the chrdev
136 * file, proceed to open.
137 */
fcee216b 138 rc = fuse_do_open(&cc->fm, 0, file, 0);
151060ac
TH
139 if (rc)
140 fuse_conn_put(&cc->fc);
141 return rc;
142}
143
144static int cuse_release(struct inode *inode, struct file *file)
145{
146 struct fuse_file *ff = file->private_data;
fcee216b 147 struct fuse_mount *fm = ff->fm;
151060ac 148
56d250ef 149 fuse_sync_release(NULL, ff, file->f_flags);
fcee216b 150 fuse_conn_put(fm->fc);
151060ac
TH
151
152 return 0;
153}
154
155static long cuse_file_ioctl(struct file *file, unsigned int cmd,
156 unsigned long arg)
157{
158 struct fuse_file *ff = file->private_data;
fcee216b 159 struct cuse_conn *cc = fc_to_cc(ff->fm->fc);
151060ac
TH
160 unsigned int flags = 0;
161
162 if (cc->unrestricted_ioctl)
163 flags |= FUSE_IOCTL_UNRESTRICTED;
164
165 return fuse_do_ioctl(file, cmd, arg, flags);
166}
167
168static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
169 unsigned long arg)
170{
171 struct fuse_file *ff = file->private_data;
fcee216b 172 struct cuse_conn *cc = fc_to_cc(ff->fm->fc);
151060ac
TH
173 unsigned int flags = FUSE_IOCTL_COMPAT;
174
175 if (cc->unrestricted_ioctl)
176 flags |= FUSE_IOCTL_UNRESTRICTED;
177
178 return fuse_do_ioctl(file, cmd, arg, flags);
179}
180
181static const struct file_operations cuse_frontend_fops = {
182 .owner = THIS_MODULE,
cfa86a74
AV
183 .read_iter = cuse_read_iter,
184 .write_iter = cuse_write_iter,
151060ac
TH
185 .open = cuse_open,
186 .release = cuse_release,
187 .unlocked_ioctl = cuse_file_ioctl,
188 .compat_ioctl = cuse_file_compat_ioctl,
189 .poll = fuse_file_poll,
6038f373 190 .llseek = noop_llseek,
151060ac
TH
191};
192
193
194/**************************************************************************
195 * CUSE channel initialization and destruction
196 */
197
198struct cuse_devinfo {
199 const char *name;
200};
201
202/**
203 * cuse_parse_one - parse one key=value pair
204 * @pp: i/o parameter for the current position
205 * @end: points to one past the end of the packed string
206 * @keyp: out parameter for key
207 * @valp: out parameter for value
208 *
209 * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
210 * at @end - 1. This function parses one pair and set *@keyp to the
211 * start of the key and *@valp to the start of the value. Note that
212 * the original string is modified such that the key string is
213 * terminated with '\0'. *@pp is updated to point to the next string.
214 *
215 * RETURNS:
216 * 1 on successful parse, 0 on EOF, -errno on failure.
217 */
218static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
219{
220 char *p = *pp;
221 char *key, *val;
222
223 while (p < end && *p == '\0')
224 p++;
225 if (p == end)
226 return 0;
227
228 if (end[-1] != '\0') {
f2294482 229 pr_err("info not properly terminated\n");
151060ac
TH
230 return -EINVAL;
231 }
232
233 key = val = p;
234 p += strlen(p);
235
236 if (valp) {
237 strsep(&val, "=");
238 if (!val)
239 val = key + strlen(key);
240 key = strstrip(key);
241 val = strstrip(val);
242 } else
243 key = strstrip(key);
244
245 if (!strlen(key)) {
f2294482 246 pr_err("zero length info key specified\n");
151060ac
TH
247 return -EINVAL;
248 }
249
250 *pp = p;
251 *keyp = key;
252 if (valp)
253 *valp = val;
254
255 return 1;
256}
257
258/**
06bbb761 259 * cuse_parse_devinfo - parse device info
151060ac
TH
260 * @p: device info string
261 * @len: length of device info string
262 * @devinfo: out parameter for parsed device info
263 *
264 * Parse @p to extract device info and store it into @devinfo. String
265 * pointed to by @p is modified by parsing and @devinfo points into
266 * them, so @p shouldn't be freed while @devinfo is in use.
267 *
268 * RETURNS:
269 * 0 on success, -errno on failure.
270 */
271static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
272{
273 char *end = p + len;
3f649ab7 274 char *key, *val;
151060ac
TH
275 int rc;
276
277 while (true) {
278 rc = cuse_parse_one(&p, end, &key, &val);
279 if (rc < 0)
280 return rc;
281 if (!rc)
282 break;
283 if (strcmp(key, "DEVNAME") == 0)
284 devinfo->name = val;
285 else
f2294482 286 pr_warn("unknown device info \"%s\"\n", key);
151060ac
TH
287 }
288
289 if (!devinfo->name || !strlen(devinfo->name)) {
f2294482 290 pr_err("DEVNAME unspecified\n");
151060ac
TH
291 return -EINVAL;
292 }
293
294 return 0;
295}
296
297static void cuse_gendev_release(struct device *dev)
298{
299 kfree(dev);
300}
301
b50ef7c5
MS
302struct cuse_init_args {
303 struct fuse_args_pages ap;
304 struct cuse_init_in in;
305 struct cuse_init_out out;
ee80369a
JK
306 struct folio *folio;
307 struct fuse_folio_desc desc;
b50ef7c5
MS
308};
309
151060ac
TH
310/**
311 * cuse_process_init_reply - finish initializing CUSE channel
312 *
09492cb4
YL
313 * @fm: The fuse mount information containing the CUSE connection.
314 * @args: The arguments passed to the init reply.
315 * @error: The error code signifying if any error occurred during the process.
316 *
151060ac
TH
317 * This function creates the character device and sets up all the
318 * required data structures for it. Please read the comment at the
319 * top of this file for high level overview.
320 */
fcee216b 321static void cuse_process_init_reply(struct fuse_mount *fm,
b50ef7c5 322 struct fuse_args *args, int error)
151060ac 323{
fcee216b 324 struct fuse_conn *fc = fm->fc;
b50ef7c5
MS
325 struct cuse_init_args *ia = container_of(args, typeof(*ia), ap.args);
326 struct fuse_args_pages *ap = &ia->ap;
30783587 327 struct cuse_conn *cc = fc_to_cc(fc), *pos;
b50ef7c5 328 struct cuse_init_out *arg = &ia->out;
ee80369a 329 struct folio *folio = ap->folios[0];
151060ac
TH
330 struct cuse_devinfo devinfo = { };
331 struct device *dev;
332 struct cdev *cdev;
333 dev_t devt;
30783587 334 int rc, i;
151060ac 335
b50ef7c5 336 if (error || arg->major != FUSE_KERNEL_VERSION || arg->minor < 11)
151060ac 337 goto err;
151060ac
TH
338
339 fc->minor = arg->minor;
340 fc->max_read = max_t(unsigned, arg->max_read, 4096);
341 fc->max_write = max_t(unsigned, arg->max_write, 4096);
342
343 /* parse init reply */
344 cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
345
ee80369a 346 rc = cuse_parse_devinfo(folio_address(folio), ap->args.out_args[1].size,
151060ac
TH
347 &devinfo);
348 if (rc)
349 goto err;
350
351 /* determine and reserve devt */
352 devt = MKDEV(arg->dev_major, arg->dev_minor);
353 if (!MAJOR(devt))
354 rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
355 else
356 rc = register_chrdev_region(devt, 1, devinfo.name);
357 if (rc) {
f2294482 358 pr_err("failed to register chrdev region\n");
151060ac
TH
359 goto err;
360 }
361
362 /* devt determined, create device */
363 rc = -ENOMEM;
364 dev = kzalloc(sizeof(*dev), GFP_KERNEL);
365 if (!dev)
366 goto err_region;
367
368 device_initialize(dev);
369 dev_set_uevent_suppress(dev, 1);
370 dev->class = cuse_class;
371 dev->devt = devt;
372 dev->release = cuse_gendev_release;
373 dev_set_drvdata(dev, cc);
374 dev_set_name(dev, "%s", devinfo.name);
375
30783587
DR
376 mutex_lock(&cuse_lock);
377
378 /* make sure the device-name is unique */
379 for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
380 list_for_each_entry(pos, &cuse_conntbl[i], list)
381 if (!strcmp(dev_name(pos->dev), dev_name(dev)))
382 goto err_unlock;
383 }
384
151060ac
TH
385 rc = device_add(dev);
386 if (rc)
30783587 387 goto err_unlock;
151060ac
TH
388
389 /* register cdev */
390 rc = -ENOMEM;
391 cdev = cdev_alloc();
392 if (!cdev)
30783587 393 goto err_unlock;
151060ac
TH
394
395 cdev->owner = THIS_MODULE;
396 cdev->ops = &cuse_frontend_fops;
397
398 rc = cdev_add(cdev, devt, 1);
399 if (rc)
400 goto err_cdev;
401
402 cc->dev = dev;
403 cc->cdev = cdev;
404
405 /* make the device available */
151060ac 406 list_add(&cc->list, cuse_conntbl_head(devt));
8ce03fd7 407 mutex_unlock(&cuse_lock);
151060ac
TH
408
409 /* announce device availability */
410 dev_set_uevent_suppress(dev, 0);
411 kobject_uevent(&dev->kobj, KOBJ_ADD);
412out:
b50ef7c5 413 kfree(ia);
ee80369a 414 folio_put(folio);
151060ac
TH
415 return;
416
417err_cdev:
418 cdev_del(cdev);
30783587
DR
419err_unlock:
420 mutex_unlock(&cuse_lock);
151060ac
TH
421 put_device(dev);
422err_region:
423 unregister_chrdev_region(devt, 1);
424err:
eb98e3bd 425 fuse_abort_conn(fc);
151060ac
TH
426 goto out;
427}
428
429static int cuse_send_init(struct cuse_conn *cc)
430{
431 int rc;
ee80369a 432 struct folio *folio;
fcee216b 433 struct fuse_mount *fm = &cc->fm;
b50ef7c5
MS
434 struct cuse_init_args *ia;
435 struct fuse_args_pages *ap;
151060ac
TH
436
437 BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
438
151060ac 439 rc = -ENOMEM;
ee80369a
JK
440
441 folio = folio_alloc(GFP_KERNEL | __GFP_ZERO, 0);
442 if (!folio)
b50ef7c5 443 goto err;
151060ac 444
b50ef7c5
MS
445 ia = kzalloc(sizeof(*ia), GFP_KERNEL);
446 if (!ia)
ee80369a 447 goto err_free_folio;
07d5f69b 448
b50ef7c5
MS
449 ap = &ia->ap;
450 ia->in.major = FUSE_KERNEL_VERSION;
451 ia->in.minor = FUSE_KERNEL_MINOR_VERSION;
452 ia->in.flags |= CUSE_UNRESTRICTED_IOCTL;
453 ap->args.opcode = CUSE_INIT;
454 ap->args.in_numargs = 1;
455 ap->args.in_args[0].size = sizeof(ia->in);
456 ap->args.in_args[0].value = &ia->in;
457 ap->args.out_numargs = 2;
458 ap->args.out_args[0].size = sizeof(ia->out);
459 ap->args.out_args[0].value = &ia->out;
460 ap->args.out_args[1].size = CUSE_INIT_INFO_MAX;
cabdb4fa 461 ap->args.out_argvar = true;
462 ap->args.out_pages = true;
ee80369a
JK
463 ap->num_folios = 1;
464 ap->folios = &ia->folio;
68bfb7eb 465 ap->descs = &ia->desc;
ee80369a 466 ia->folio = folio;
b50ef7c5
MS
467 ia->desc.length = ap->args.out_args[1].size;
468 ap->args.end = cuse_process_init_reply;
469
fcee216b 470 rc = fuse_simple_background(fm, &ap->args, GFP_KERNEL);
b50ef7c5
MS
471 if (rc) {
472 kfree(ia);
ee80369a
JK
473err_free_folio:
474 folio_put(folio);
b50ef7c5 475 }
151060ac
TH
476err:
477 return rc;
478}
479
480static void cuse_fc_release(struct fuse_conn *fc)
481{
053fc4f7 482 kfree(fc_to_cc(fc));
151060ac
TH
483}
484
485/**
486 * cuse_channel_open - open method for /dev/cuse
487 * @inode: inode for /dev/cuse
488 * @file: file struct being opened
489 *
490 * Userland CUSE server can create a CUSE device by opening /dev/cuse
8272f4c9 491 * and replying to the initialization request kernel sends. This
151060ac
TH
492 * function is responsible for handling CUSE device initialization.
493 * Because the fd opened by this function is used during
494 * initialization, this function only creates cuse_conn and sends
495 * init. The rest is delegated to a kthread.
496 *
497 * RETURNS:
498 * 0 on success, -errno on failure.
499 */
500static int cuse_channel_open(struct inode *inode, struct file *file)
501{
cc080e9e 502 struct fuse_dev *fud;
151060ac
TH
503 struct cuse_conn *cc;
504 int rc;
505
506 /* set up cuse_conn */
507 cc = kzalloc(sizeof(*cc), GFP_KERNEL);
508 if (!cc)
509 return -ENOMEM;
510
8cb08329
EB
511 /*
512 * Limit the cuse channel to requests that can
513 * be represented in file->f_cred->user_ns.
514 */
fcee216b
MR
515 fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns,
516 &fuse_dev_fiq_ops, NULL);
151060ac 517
3c9c1433 518 cc->fc.release = cuse_fc_release;
0cd1eb9a 519 fud = fuse_dev_alloc_install(&cc->fc);
3c9c1433
MS
520 fuse_conn_put(&cc->fc);
521 if (!fud)
cc080e9e 522 return -ENOMEM;
cc080e9e 523
151060ac 524 INIT_LIST_HEAD(&cc->list);
151060ac 525
796523fb 526 cc->fc.initialized = 1;
151060ac
TH
527 rc = cuse_send_init(cc);
528 if (rc) {
cc080e9e 529 fuse_dev_free(fud);
151060ac
TH
530 return rc;
531 }
cc080e9e 532 file->private_data = fud;
151060ac
TH
533
534 return 0;
535}
536
537/**
538 * cuse_channel_release - release method for /dev/cuse
539 * @inode: inode for /dev/cuse
540 * @file: file struct being closed
541 *
542 * Disconnect the channel, deregister CUSE device and initiate
543 * destruction by putting the default reference.
544 *
545 * RETURNS:
546 * 0 on success, -errno on failure.
547 */
548static int cuse_channel_release(struct inode *inode, struct file *file)
549{
cc080e9e
MS
550 struct fuse_dev *fud = file->private_data;
551 struct cuse_conn *cc = fc_to_cc(fud->fc);
151060ac
TH
552
553 /* remove from the conntbl, no more access from this point on */
8ce03fd7 554 mutex_lock(&cuse_lock);
151060ac 555 list_del_init(&cc->list);
8ce03fd7 556 mutex_unlock(&cuse_lock);
151060ac
TH
557
558 /* remove device */
559 if (cc->dev)
560 device_unregister(cc->dev);
561 if (cc->cdev) {
562 unregister_chrdev_region(cc->cdev->dev, 1);
563 cdev_del(cc->cdev);
564 }
565
e2283a73 566 return fuse_dev_release(inode, file);
151060ac
TH
567}
568
569static struct file_operations cuse_channel_fops; /* initialized during init */
570
571
572/**************************************************************************
573 * Misc stuff and module initializatiion
574 *
575 * CUSE exports the same set of attributes to sysfs as fusectl.
576 */
577
578static ssize_t cuse_class_waiting_show(struct device *dev,
579 struct device_attribute *attr, char *buf)
580{
581 struct cuse_conn *cc = dev_get_drvdata(dev);
582
583 return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
584}
58f86cc8 585static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
151060ac
TH
586
587static ssize_t cuse_class_abort_store(struct device *dev,
588 struct device_attribute *attr,
589 const char *buf, size_t count)
590{
591 struct cuse_conn *cc = dev_get_drvdata(dev);
592
eb98e3bd 593 fuse_abort_conn(&cc->fc);
151060ac
TH
594 return count;
595}
58f86cc8 596static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
151060ac 597
4183fb95
GKH
598static struct attribute *cuse_class_dev_attrs[] = {
599 &dev_attr_waiting.attr,
600 &dev_attr_abort.attr,
601 NULL,
151060ac 602};
4183fb95 603ATTRIBUTE_GROUPS(cuse_class_dev);
151060ac
TH
604
605static struct miscdevice cuse_miscdev = {
cb2ffb26 606 .minor = CUSE_MINOR,
151060ac
TH
607 .name = "cuse",
608 .fops = &cuse_channel_fops,
609};
610
cb2ffb26
TG
611MODULE_ALIAS_MISCDEV(CUSE_MINOR);
612MODULE_ALIAS("devname:cuse");
613
151060ac
TH
614static int __init cuse_init(void)
615{
616 int i, rc;
617
618 /* init conntbl */
619 for (i = 0; i < CUSE_CONNTBL_LEN; i++)
620 INIT_LIST_HEAD(&cuse_conntbl[i]);
621
622 /* inherit and extend fuse_dev_operations */
623 cuse_channel_fops = fuse_dev_operations;
624 cuse_channel_fops.owner = THIS_MODULE;
625 cuse_channel_fops.open = cuse_channel_open;
626 cuse_channel_fops.release = cuse_channel_release;
8217673d
MS
627 /* CUSE is not prepared for FUSE_DEV_IOC_CLONE */
628 cuse_channel_fops.unlocked_ioctl = NULL;
151060ac 629
1aaba11d 630 cuse_class = class_create("cuse");
151060ac
TH
631 if (IS_ERR(cuse_class))
632 return PTR_ERR(cuse_class);
633
4183fb95 634 cuse_class->dev_groups = cuse_class_dev_groups;
151060ac
TH
635
636 rc = misc_register(&cuse_miscdev);
637 if (rc) {
638 class_destroy(cuse_class);
639 return rc;
640 }
641
642 return 0;
643}
644
645static void __exit cuse_exit(void)
646{
647 misc_deregister(&cuse_miscdev);
648 class_destroy(cuse_class);
649}
650
651module_init(cuse_init);
652module_exit(cuse_exit);
653
654MODULE_AUTHOR("Tejun Heo <[email protected]>");
655MODULE_DESCRIPTION("Character device in Userspace");
656MODULE_LICENSE("GPL");
This page took 0.812717 seconds and 4 git commands to generate.