]> Git Repo - linux.git/blame - fs/fuse/file.c
Linux 6.14-rc3
[linux.git] / fs / fuse / file.c
CommitLineData
b6aeaded
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <[email protected]>
b6aeaded
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/slab.h>
13#include <linux/kernel.h>
e8edc6e0 14#include <linux/sched.h>
7a36094d 15#include <linux/sched/signal.h>
08cbf542 16#include <linux/module.h>
478e0841 17#include <linux/swap.h>
3634a632 18#include <linux/falloc.h>
e2e40f2c 19#include <linux/uio.h>
31070f6c 20#include <linux/fs.h>
5970e15d 21#include <linux/filelock.h>
705bcfcb 22#include <linux/splice.h>
2e3f7dd0 23#include <linux/task_io_accounting_ops.h>
b6aeaded 24
b9d54c6f
MS
25static int fuse_send_open(struct fuse_mount *fm, u64 nodeid,
26 unsigned int open_flags, int opcode,
27 struct fuse_open_out *outargp)
b6aeaded 28{
b6aeaded 29 struct fuse_open_in inarg;
7078187a 30 FUSE_ARGS(args);
fd72faac
MS
31
32 memset(&inarg, 0, sizeof(inarg));
b9d54c6f 33 inarg.flags = open_flags & ~(O_CREAT | O_EXCL | O_NOCTTY);
fcee216b 34 if (!fm->fc->atomic_o_trunc)
6ff958ed 35 inarg.flags &= ~O_TRUNC;
643a666a
VG
36
37 if (fm->fc->handle_killpriv_v2 &&
38 (inarg.flags & O_TRUNC) && !capable(CAP_FSETID)) {
39 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
40 }
41
d5b48543
MS
42 args.opcode = opcode;
43 args.nodeid = nodeid;
44 args.in_numargs = 1;
45 args.in_args[0].size = sizeof(inarg);
46 args.in_args[0].value = &inarg;
47 args.out_numargs = 1;
48 args.out_args[0].size = sizeof(*outargp);
49 args.out_args[0].value = outargp;
fd72faac 50
fcee216b 51 return fuse_simple_request(fm, &args);
fd72faac
MS
52}
53
e26ee4ef 54struct fuse_file *fuse_file_alloc(struct fuse_mount *fm, bool release)
fd72faac
MS
55{
56 struct fuse_file *ff;
6b2db28a 57
dc69e98c 58 ff = kzalloc(sizeof(struct fuse_file), GFP_KERNEL_ACCOUNT);
6b2db28a
TH
59 if (unlikely(!ff))
60 return NULL;
61
fcee216b 62 ff->fm = fm;
e26ee4ef 63 if (release) {
fc8ff397
AG
64 ff->args = kzalloc(sizeof(*ff->args), GFP_KERNEL_ACCOUNT);
65 if (!ff->args) {
e26ee4ef
AG
66 kfree(ff);
67 return NULL;
68 }
fd72faac 69 }
6b2db28a
TH
70
71 INIT_LIST_HEAD(&ff->write_entry);
4e8c2eb5 72 refcount_set(&ff->count, 1);
6b2db28a
TH
73 RB_CLEAR_NODE(&ff->polled_node);
74 init_waitqueue_head(&ff->poll_wait);
75
fcee216b 76 ff->kh = atomic64_inc_return(&fm->fc->khctr);
6b2db28a 77
fd72faac
MS
78 return ff;
79}
80
81void fuse_file_free(struct fuse_file *ff)
82{
fc8ff397 83 kfree(ff->args);
fd72faac
MS
84 kfree(ff);
85}
86
267d8444 87static struct fuse_file *fuse_file_get(struct fuse_file *ff)
c756e0a4 88{
4e8c2eb5 89 refcount_inc(&ff->count);
c756e0a4
MS
90 return ff;
91}
92
fcee216b 93static void fuse_release_end(struct fuse_mount *fm, struct fuse_args *args,
4cb54866 94 int error)
819c4b3b 95{
4cb54866
MS
96 struct fuse_release_args *ra = container_of(args, typeof(*ra), args);
97
98 iput(ra->inode);
99 kfree(ra);
819c4b3b
MS
100}
101
e26ee4ef 102static void fuse_file_put(struct fuse_file *ff, bool sync)
c756e0a4 103{
4e8c2eb5 104 if (refcount_dec_and_test(&ff->count)) {
fc8ff397 105 struct fuse_release_args *ra = &ff->args->release_args;
e26ee4ef 106 struct fuse_args *args = (ra ? &ra->args : NULL);
8b0797a4 107
cb098dd2
AG
108 if (ra && ra->inode)
109 fuse_file_io_release(ff, ra->inode);
110
e26ee4ef
AG
111 if (!args) {
112 /* Do nothing when server does not implement 'open' */
7678ac50 113 } else if (sync) {
fcee216b
MR
114 fuse_simple_request(ff->fm, args);
115 fuse_release_end(ff->fm, args, 0);
5a18ec17 116 } else {
4cb54866 117 args->end = fuse_release_end;
fcee216b 118 if (fuse_simple_background(ff->fm, args,
4cb54866 119 GFP_KERNEL | __GFP_NOFAIL))
fcee216b 120 fuse_release_end(ff->fm, args, -ENOTCONN);
5a18ec17 121 }
c756e0a4
MS
122 kfree(ff);
123 }
124}
125
b9d54c6f
MS
126struct fuse_file *fuse_file_open(struct fuse_mount *fm, u64 nodeid,
127 unsigned int open_flags, bool isdir)
91fe96b4 128{
fcee216b 129 struct fuse_conn *fc = fm->fc;
91fe96b4 130 struct fuse_file *ff;
91fe96b4 131 int opcode = isdir ? FUSE_OPENDIR : FUSE_OPEN;
e26ee4ef 132 bool open = isdir ? !fc->no_opendir : !fc->no_open;
91fe96b4 133
e26ee4ef 134 ff = fuse_file_alloc(fm, open);
91fe96b4 135 if (!ff)
b9d54c6f 136 return ERR_PTR(-ENOMEM);
91fe96b4 137
7678ac50 138 ff->fh = 0;
fabf7e02
CA
139 /* Default for no-open */
140 ff->open_flags = FOPEN_KEEP_CACHE | (isdir ? FOPEN_CACHE_DIR : 0);
e26ee4ef 141 if (open) {
fc8ff397
AG
142 /* Store outarg for fuse_finish_open() */
143 struct fuse_open_out *outargp = &ff->args->open_outarg;
7678ac50
AG
144 int err;
145
fc8ff397 146 err = fuse_send_open(fm, nodeid, open_flags, opcode, outargp);
7678ac50 147 if (!err) {
fc8ff397
AG
148 ff->fh = outargp->fh;
149 ff->open_flags = outargp->open_flags;
d9a9ea94 150 } else if (err != -ENOSYS) {
7678ac50 151 fuse_file_free(ff);
b9d54c6f 152 return ERR_PTR(err);
7678ac50 153 } else {
e26ee4ef 154 /* No release needed */
fc8ff397
AG
155 kfree(ff->args);
156 ff->args = NULL;
d9a9ea94
CA
157 if (isdir)
158 fc->no_opendir = 1;
159 else
160 fc->no_open = 1;
7678ac50 161 }
91fe96b4
MS
162 }
163
164 if (isdir)
7678ac50 165 ff->open_flags &= ~FOPEN_DIRECT_IO;
91fe96b4 166
91fe96b4 167 ff->nodeid = nodeid;
91fe96b4 168
b9d54c6f
MS
169 return ff;
170}
171
172int fuse_do_open(struct fuse_mount *fm, u64 nodeid, struct file *file,
173 bool isdir)
174{
175 struct fuse_file *ff = fuse_file_open(fm, nodeid, file->f_flags, isdir);
176
177 if (!IS_ERR(ff))
178 file->private_data = ff;
179
180 return PTR_ERR_OR_ZERO(ff);
91fe96b4 181}
08cbf542 182EXPORT_SYMBOL_GPL(fuse_do_open);
91fe96b4 183
650b22b9
PE
184static void fuse_link_write_file(struct file *file)
185{
186 struct inode *inode = file_inode(file);
650b22b9
PE
187 struct fuse_inode *fi = get_fuse_inode(inode);
188 struct fuse_file *ff = file->private_data;
189 /*
190 * file may be written through mmap, so chain it onto the
191 * inodes's write_file list
192 */
f15ecfef 193 spin_lock(&fi->lock);
650b22b9
PE
194 if (list_empty(&ff->write_entry))
195 list_add(&ff->write_entry, &fi->write_files);
f15ecfef 196 spin_unlock(&fi->lock);
650b22b9
PE
197}
198
d2c487f1 199int fuse_finish_open(struct inode *inode, struct file *file)
fd72faac 200{
c7b7143c 201 struct fuse_file *ff = file->private_data;
a0822c55 202 struct fuse_conn *fc = get_fuse_conn(inode);
cb098dd2
AG
203 int err;
204
205 err = fuse_file_io_open(file, inode);
206 if (err)
207 return err;
c7b7143c 208
bbd84f33
KS
209 if (ff->open_flags & FOPEN_STREAM)
210 stream_open(inode, file);
211 else if (ff->open_flags & FOPEN_NONSEEKABLE)
a7c1b990 212 nonseekable_open(inode, file);
76224355 213
4d99ff8f
PE
214 if ((file->f_mode & FMODE_WRITE) && fc->writeback_cache)
215 fuse_link_write_file(file);
d2c487f1
AG
216
217 return 0;
fd72faac
MS
218}
219
0c9d7089
AG
220static void fuse_truncate_update_attr(struct inode *inode, struct file *file)
221{
222 struct fuse_conn *fc = get_fuse_conn(inode);
223 struct fuse_inode *fi = get_fuse_inode(inode);
224
225 spin_lock(&fi->lock);
226 fi->attr_version = atomic64_inc_return(&fc->attr_version);
227 i_size_write(inode, 0);
228 spin_unlock(&fi->lock);
229 file_update_time(file);
230 fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
231}
232
7de64d52 233static int fuse_open(struct inode *inode, struct file *file)
fd72faac 234{
fcee216b 235 struct fuse_mount *fm = get_fuse_mount(inode);
d2c487f1 236 struct fuse_inode *fi = get_fuse_inode(inode);
fcee216b 237 struct fuse_conn *fc = fm->fc;
d2c487f1 238 struct fuse_file *ff;
b6aeaded 239 int err;
0c9d7089
AG
240 bool is_truncate = (file->f_flags & O_TRUNC) && fc->atomic_o_trunc;
241 bool is_wb_truncate = is_truncate && fc->writeback_cache;
242 bool dax_truncate = is_truncate && FUSE_IS_DAX(inode);
b6aeaded 243
5d069dbe
MS
244 if (fuse_is_bad(inode))
245 return -EIO;
246
b6aeaded
MS
247 err = generic_file_open(inode, file);
248 if (err)
249 return err;
250
2fdbb8dd 251 if (is_wb_truncate || dax_truncate)
5955102c 252 inode_lock(inode);
75caeecd 253
6ae330ca 254 if (dax_truncate) {
8bcbbe9c 255 filemap_invalidate_lock(inode->i_mapping);
6ae330ca
VG
256 err = fuse_dax_break_layouts(inode, 0, 0);
257 if (err)
2fdbb8dd 258 goto out_inode_unlock;
6ae330ca 259 }
b6aeaded 260
2fdbb8dd
MS
261 if (is_wb_truncate || dax_truncate)
262 fuse_set_nowrite(inode);
263
7de64d52 264 err = fuse_do_open(fm, get_node_id(inode), file, false);
0c9d7089 265 if (!err) {
d2c487f1
AG
266 ff = file->private_data;
267 err = fuse_finish_open(inode, file);
268 if (err)
269 fuse_sync_release(fi, ff, file->f_flags);
270 else if (is_truncate)
0c9d7089
AG
271 fuse_truncate_update_attr(inode, file);
272 }
91fe96b4 273
2fdbb8dd
MS
274 if (is_wb_truncate || dax_truncate)
275 fuse_release_nowrite(inode);
276 if (!err) {
0c9d7089 277 if (is_truncate)
2fdbb8dd
MS
278 truncate_pagecache(inode, 0);
279 else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
280 invalidate_inode_pages2(inode->i_mapping);
281 }
6ae330ca 282 if (dax_truncate)
8bcbbe9c 283 filemap_invalidate_unlock(inode->i_mapping);
2fdbb8dd
MS
284out_inode_unlock:
285 if (is_wb_truncate || dax_truncate)
5955102c 286 inode_unlock(inode);
75caeecd
MP
287
288 return err;
b6aeaded
MS
289}
290
ebf84d0c 291static void fuse_prepare_release(struct fuse_inode *fi, struct fuse_file *ff,
e26ee4ef 292 unsigned int flags, int opcode, bool sync)
64c6d8ed 293{
fcee216b 294 struct fuse_conn *fc = ff->fm->fc;
fc8ff397 295 struct fuse_release_args *ra = &ff->args->release_args;
b6aeaded 296
4a90451b
AG
297 if (fuse_file_passthrough(ff))
298 fuse_passthrough_release(ff, fuse_inode_backing(fi));
b6aeaded 299
f15ecfef
KT
300 /* Inode is NULL on error path of fuse_create_open() */
301 if (likely(fi)) {
302 spin_lock(&fi->lock);
303 list_del(&ff->write_entry);
304 spin_unlock(&fi->lock);
305 }
8b0797a4 306 spin_lock(&fc->lock);
8b0797a4
MS
307 if (!RB_EMPTY_NODE(&ff->polled_node))
308 rb_erase(&ff->polled_node, &fc->polled_files);
309 spin_unlock(&fc->lock);
310
357ccf2b 311 wake_up_interruptible_all(&ff->poll_wait);
8b0797a4 312
e26ee4ef
AG
313 if (!ra)
314 return;
315
fc8ff397
AG
316 /* ff->args was used for open outarg */
317 memset(ff->args, 0, sizeof(*ff->args));
4cb54866
MS
318 ra->inarg.fh = ff->fh;
319 ra->inarg.flags = flags;
320 ra->args.in_numargs = 1;
321 ra->args.in_args[0].size = sizeof(struct fuse_release_in);
322 ra->args.in_args[0].value = &ra->inarg;
323 ra->args.opcode = opcode;
324 ra->args.nodeid = ff->nodeid;
325 ra->args.force = true;
326 ra->args.nocreds = true;
e26ee4ef
AG
327
328 /*
329 * Hold inode until release is finished.
330 * From fuse_sync_release() the refcount is 1 and everything's
331 * synchronous, so we are fine with not doing igrab() here.
332 */
333 ra->inode = sync ? NULL : igrab(&fi->inode);
fd72faac
MS
334}
335
b9d54c6f
MS
336void fuse_file_release(struct inode *inode, struct fuse_file *ff,
337 unsigned int open_flags, fl_owner_t id, bool isdir)
fd72faac 338{
b9d54c6f 339 struct fuse_inode *fi = get_fuse_inode(inode);
fc8ff397 340 struct fuse_release_args *ra = &ff->args->release_args;
2e64ff15 341 int opcode = isdir ? FUSE_RELEASEDIR : FUSE_RELEASE;
6b2db28a 342
e26ee4ef 343 fuse_prepare_release(fi, ff, open_flags, opcode, false);
6b2db28a 344
e26ee4ef 345 if (ra && ff->flock) {
4cb54866 346 ra->inarg.release_flags |= FUSE_RELEASE_FLOCK_UNLOCK;
b9d54c6f 347 ra->inarg.lock_owner = fuse_lock_owner_id(ff->fm->fc, id);
37fb3a30 348 }
6b2db28a 349
6b2db28a
TH
350 /*
351 * Normally this will send the RELEASE request, however if
352 * some asynchronous READ or WRITE requests are outstanding,
353 * the sending will be delayed.
5a18ec17
MS
354 *
355 * Make the release synchronous if this is a fuseblk mount,
356 * synchronous RELEASE is allowed (and desirable) in this case
357 * because the server can be trusted not to screw up.
6b2db28a 358 */
e26ee4ef 359 fuse_file_put(ff, ff->fm->fc->destroy);
b6aeaded
MS
360}
361
b9d54c6f
MS
362void fuse_release_common(struct file *file, bool isdir)
363{
364 fuse_file_release(file_inode(file), file->private_data, file->f_flags,
365 (fl_owner_t) file, isdir);
366}
367
04730fef
MS
368static int fuse_release(struct inode *inode, struct file *file)
369{
035ff33c
MS
370 struct fuse_conn *fc = get_fuse_conn(inode);
371
372 /*
373 * Dirty pages might remain despite write_inode_now() call from
374 * fuse_flush() due to writes racing with the close.
375 */
376 if (fc->writeback_cache)
377 write_inode_now(inode, 1);
378
2e64ff15 379 fuse_release_common(file, false);
8b0797a4
MS
380
381 /* return value is ignored by VFS */
382 return 0;
383}
384
54d601cb
MS
385void fuse_sync_release(struct fuse_inode *fi, struct fuse_file *ff,
386 unsigned int flags)
8b0797a4 387{
4e8c2eb5 388 WARN_ON(refcount_read(&ff->count) > 1);
e26ee4ef
AG
389 fuse_prepare_release(fi, ff, flags, FUSE_RELEASE, true);
390 fuse_file_put(ff, true);
04730fef 391}
08cbf542 392EXPORT_SYMBOL_GPL(fuse_sync_release);
04730fef 393
71421259 394/*
9c8ef561
MS
395 * Scramble the ID space with XTEA, so that the value of the files_struct
396 * pointer is not exposed to userspace.
71421259 397 */
f3332114 398u64 fuse_lock_owner_id(struct fuse_conn *fc, fl_owner_t id)
71421259 399{
9c8ef561
MS
400 u32 *k = fc->scramble_key;
401 u64 v = (unsigned long) id;
402 u32 v0 = v;
403 u32 v1 = v >> 32;
404 u32 sum = 0;
405 int i;
406
407 for (i = 0; i < 32; i++) {
408 v0 += ((v1 << 4 ^ v1 >> 5) + v1) ^ (sum + k[sum & 3]);
409 sum += 0x9E3779B9;
410 v1 += ((v0 << 4 ^ v0 >> 5) + v0) ^ (sum + k[sum>>11 & 3]);
411 }
412
413 return (u64) v0 + ((u64) v1 << 32);
71421259
MS
414}
415
33826ebb
MS
416struct fuse_writepage_args {
417 struct fuse_io_args ia;
6b2fb799 418 struct rb_node writepages_entry;
33826ebb
MS
419 struct list_head queue_entry;
420 struct fuse_writepage_args *next;
421 struct inode *inode;
660585b5 422 struct fuse_sync_bucket *bucket;
33826ebb
MS
423};
424
425static struct fuse_writepage_args *fuse_find_writeback(struct fuse_inode *fi,
2fe93bd4
MS
426 pgoff_t idx_from, pgoff_t idx_to)
427{
6b2fb799
MP
428 struct rb_node *n;
429
430 n = fi->writepages.rb_node;
2fe93bd4 431
6b2fb799
MP
432 while (n) {
433 struct fuse_writepage_args *wpa;
2fe93bd4
MS
434 pgoff_t curr_index;
435
6b2fb799 436 wpa = rb_entry(n, struct fuse_writepage_args, writepages_entry);
33826ebb
MS
437 WARN_ON(get_fuse_inode(wpa->inode) != fi);
438 curr_index = wpa->ia.write.in.offset >> PAGE_SHIFT;
cbe9c115 439 if (idx_from >= curr_index + wpa->ia.ap.num_folios)
6b2fb799
MP
440 n = n->rb_right;
441 else if (idx_to < curr_index)
442 n = n->rb_left;
443 else
33826ebb 444 return wpa;
2fe93bd4
MS
445 }
446 return NULL;
447}
448
3be5a52b 449/*
ea8cd333 450 * Check if any page in a range is under writeback
3be5a52b 451 */
ea8cd333
PE
452static bool fuse_range_is_writeback(struct inode *inode, pgoff_t idx_from,
453 pgoff_t idx_to)
3be5a52b 454{
3be5a52b 455 struct fuse_inode *fi = get_fuse_inode(inode);
2fe93bd4 456 bool found;
3be5a52b 457
ac5cffec 458 if (RB_EMPTY_ROOT(&fi->writepages))
459 return false;
460
f15ecfef 461 spin_lock(&fi->lock);
2fe93bd4 462 found = fuse_find_writeback(fi, idx_from, idx_to);
f15ecfef 463 spin_unlock(&fi->lock);
3be5a52b
MS
464
465 return found;
466}
467
ea8cd333
PE
468static inline bool fuse_page_is_writeback(struct inode *inode, pgoff_t index)
469{
470 return fuse_range_is_writeback(inode, index, index);
471}
472
3be5a52b
MS
473/*
474 * Wait for page writeback to be completed.
475 *
476 * Since fuse doesn't rely on the VM writeback tracking, this has to
477 * use some other means.
478 */
17b2cbe2 479static void fuse_wait_on_page_writeback(struct inode *inode, pgoff_t index)
3be5a52b
MS
480{
481 struct fuse_inode *fi = get_fuse_inode(inode);
482
483 wait_event(fi->page_waitq, !fuse_page_is_writeback(inode, index));
3be5a52b
MS
484}
485
6930b8da
JB
486static inline bool fuse_folio_is_writeback(struct inode *inode,
487 struct folio *folio)
488{
489 pgoff_t last = folio_next_index(folio) - 1;
490 return fuse_range_is_writeback(inode, folio_index(folio), last);
491}
492
184b6eb3
JB
493static void fuse_wait_on_folio_writeback(struct inode *inode,
494 struct folio *folio)
495{
496 struct fuse_inode *fi = get_fuse_inode(inode);
184b6eb3 497
6930b8da 498 wait_event(fi->page_waitq, !fuse_folio_is_writeback(inode, folio));
184b6eb3
JB
499}
500
fe38d7df
MP
501/*
502 * Wait for all pending writepages on the inode to finish.
503 *
504 * This is currently done by blocking further writes with FUSE_NOWRITE
505 * and waiting for all sent writes to complete.
506 *
507 * This must be called under i_mutex, otherwise the FUSE_NOWRITE usage
508 * could conflict with truncation.
509 */
510static void fuse_sync_writes(struct inode *inode)
511{
512 fuse_set_nowrite(inode);
513 fuse_release_nowrite(inode);
514}
515
91ec6c85 516static int fuse_flush(struct file *file, fl_owner_t id)
5a8bee63 517{
91ec6c85 518 struct inode *inode = file_inode(file);
5a8bee63 519 struct fuse_mount *fm = get_fuse_mount(inode);
91ec6c85
MS
520 struct fuse_file *ff = file->private_data;
521 struct fuse_flush_in inarg;
522 FUSE_ARGS(args);
523 int err;
524
525 if (fuse_is_bad(inode))
526 return -EIO;
527
528 if (ff->open_flags & FOPEN_NOFLUSH && !fm->fc->writeback_cache)
529 return 0;
a390ccb3 530
1e18bda8 531 err = write_inode_now(inode, 1);
fe38d7df 532 if (err)
91ec6c85 533 return err;
fe38d7df 534
5955102c 535 inode_lock(inode);
fe38d7df 536 fuse_sync_writes(inode);
5955102c 537 inode_unlock(inode);
fe38d7df 538
91ec6c85 539 err = filemap_check_errors(file->f_mapping);
9ebce595 540 if (err)
91ec6c85 541 return err;
9ebce595 542
614c026e 543 err = 0;
fcee216b 544 if (fm->fc->no_flush)
614c026e
MS
545 goto inval_attr_out;
546
91ec6c85
MS
547 memset(&inarg, 0, sizeof(inarg));
548 inarg.fh = ff->fh;
549 inarg.lock_owner = fuse_lock_owner_id(fm->fc, id);
550 args.opcode = FUSE_FLUSH;
551 args.nodeid = get_node_id(inode);
552 args.in_numargs = 1;
553 args.in_args[0].size = sizeof(inarg);
554 args.in_args[0].value = &inarg;
555 args.force = true;
556
557 err = fuse_simple_request(fm, &args);
b6aeaded 558 if (err == -ENOSYS) {
fcee216b 559 fm->fc->no_flush = 1;
b6aeaded
MS
560 err = 0;
561 }
cf576c58
EG
562
563inval_attr_out:
564 /*
565 * In memory i_blocks is not maintained by fuse, if writeback cache is
566 * enabled, i_blocks from cached attr may not be accurate.
567 */
fcee216b 568 if (!err && fm->fc->writeback_cache)
fa5eee57 569 fuse_invalidate_attr_mask(inode, STATX_BLOCKS);
b6aeaded
MS
570 return err;
571}
572
02c24a82 573int fuse_fsync_common(struct file *file, loff_t start, loff_t end,
a9c2d1e8 574 int datasync, int opcode)
b6aeaded 575{
7ea80859 576 struct inode *inode = file->f_mapping->host;
fcee216b 577 struct fuse_mount *fm = get_fuse_mount(inode);
b6aeaded 578 struct fuse_file *ff = file->private_data;
7078187a 579 FUSE_ARGS(args);
b6aeaded 580 struct fuse_fsync_in inarg;
a9c2d1e8
MS
581
582 memset(&inarg, 0, sizeof(inarg));
583 inarg.fh = ff->fh;
154603fe 584 inarg.fsync_flags = datasync ? FUSE_FSYNC_FDATASYNC : 0;
d5b48543
MS
585 args.opcode = opcode;
586 args.nodeid = get_node_id(inode);
587 args.in_numargs = 1;
588 args.in_args[0].size = sizeof(inarg);
589 args.in_args[0].value = &inarg;
fcee216b 590 return fuse_simple_request(fm, &args);
a9c2d1e8
MS
591}
592
593static int fuse_fsync(struct file *file, loff_t start, loff_t end,
594 int datasync)
595{
596 struct inode *inode = file->f_mapping->host;
597 struct fuse_conn *fc = get_fuse_conn(inode);
b6aeaded
MS
598 int err;
599
5d069dbe 600 if (fuse_is_bad(inode))
248d86e8
MS
601 return -EIO;
602
5955102c 603 inode_lock(inode);
02c24a82 604
3be5a52b
MS
605 /*
606 * Start writeback against all dirty pages of the inode, then
607 * wait for all outstanding writes, before sending the FSYNC
608 * request.
609 */
7e51fe1d 610 err = file_write_and_wait_range(file, start, end);
3be5a52b 611 if (err)
02c24a82 612 goto out;
3be5a52b
MS
613
614 fuse_sync_writes(inode);
ac7f052b
AK
615
616 /*
617 * Due to implementation of fuse writeback
7e51fe1d 618 * file_write_and_wait_range() does not catch errors.
ac7f052b
AK
619 * We have to do this directly after fuse_sync_writes()
620 */
7e51fe1d 621 err = file_check_and_advance_wb_err(file);
ac7f052b
AK
622 if (err)
623 goto out;
624
1e18bda8
MS
625 err = sync_inode_metadata(inode, 1);
626 if (err)
627 goto out;
3be5a52b 628
a9c2d1e8 629 if (fc->no_fsync)
22401e7b 630 goto out;
b0aa7606 631
a9c2d1e8 632 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNC);
b6aeaded 633 if (err == -ENOSYS) {
a9c2d1e8 634 fc->no_fsync = 1;
b6aeaded
MS
635 err = 0;
636 }
02c24a82 637out:
5955102c 638 inode_unlock(inode);
b6aeaded 639
a9c2d1e8 640 return err;
82547981
MS
641}
642
00793ca5
MS
643void fuse_read_args_fill(struct fuse_io_args *ia, struct file *file, loff_t pos,
644 size_t count, int opcode)
645{
646 struct fuse_file *ff = file->private_data;
647 struct fuse_args *args = &ia->ap.args;
648
649 ia->read.in.fh = ff->fh;
650 ia->read.in.offset = pos;
651 ia->read.in.size = count;
652 ia->read.in.flags = file->f_flags;
653 args->opcode = opcode;
654 args->nodeid = ff->nodeid;
655 args->in_numargs = 1;
656 args->in_args[0].size = sizeof(ia->read.in);
657 args->in_args[0].value = &ia->read.in;
658 args->out_argvar = true;
659 args->out_numargs = 1;
660 args->out_args[0].size = count;
661}
662
41748675 663static void fuse_release_user_pages(struct fuse_args_pages *ap, ssize_t nres,
45ac96ed 664 bool should_dirty)
187c5c36 665{
45ac96ed 666 unsigned int i;
187c5c36 667
3b97c365 668 for (i = 0; i < ap->num_folios; i++) {
8fba54ae 669 if (should_dirty)
3b97c365 670 folio_mark_dirty_lock(ap->folios[i]);
738adade 671 if (ap->args.is_pinned)
3b97c365 672 unpin_folio(ap->folios[i]);
187c5c36 673 }
41748675
HT
674
675 if (nres > 0 && ap->args.invalidate_vmap)
676 invalidate_kernel_vmap_range(ap->args.vmap_base, nres);
187c5c36
MP
677}
678
744742d6
SF
679static void fuse_io_release(struct kref *kref)
680{
681 kfree(container_of(kref, struct fuse_io_priv, refcnt));
682}
683
9d5722b7
CH
684static ssize_t fuse_get_res_by_io(struct fuse_io_priv *io)
685{
686 if (io->err)
687 return io->err;
688
689 if (io->bytes >= 0 && io->write)
690 return -EIO;
691
692 return io->bytes < 0 ? io->size : io->bytes;
693}
694
06bbb761 695/*
01e9d11a
MP
696 * In case of short read, the caller sets 'pos' to the position of
697 * actual end of fuse request in IO request. Otherwise, if bytes_requested
698 * == bytes_transferred or rw == WRITE, the caller sets 'pos' to -1.
699 *
700 * An example:
c4e0cd4e 701 * User requested DIO read of 64K. It was split into two 32K fuse requests,
01e9d11a
MP
702 * both submitted asynchronously. The first of them was ACKed by userspace as
703 * fully completed (req->out.args[0].size == 32K) resulting in pos == -1. The
704 * second request was ACKed as short, e.g. only 1K was read, resulting in
705 * pos == 33K.
706 *
707 * Thus, when all fuse requests are completed, the minimal non-negative 'pos'
708 * will be equal to the length of the longest contiguous fragment of
709 * transferred data starting from the beginning of IO request.
710 */
711static void fuse_aio_complete(struct fuse_io_priv *io, int err, ssize_t pos)
712{
713 int left;
714
715 spin_lock(&io->lock);
716 if (err)
717 io->err = io->err ? : err;
718 else if (pos >= 0 && (io->bytes < 0 || pos < io->bytes))
719 io->bytes = pos;
720
721 left = --io->reqs;
7879c4e5 722 if (!left && io->blocking)
9d5722b7 723 complete(io->done);
01e9d11a
MP
724 spin_unlock(&io->lock);
725
7879c4e5 726 if (!left && !io->blocking) {
9d5722b7 727 ssize_t res = fuse_get_res_by_io(io);
01e9d11a 728
9d5722b7
CH
729 if (res >= 0) {
730 struct inode *inode = file_inode(io->iocb->ki_filp);
731 struct fuse_conn *fc = get_fuse_conn(inode);
732 struct fuse_inode *fi = get_fuse_inode(inode);
01e9d11a 733
f15ecfef 734 spin_lock(&fi->lock);
4510d86f 735 fi->attr_version = atomic64_inc_return(&fc->attr_version);
f15ecfef 736 spin_unlock(&fi->lock);
01e9d11a
MP
737 }
738
6b19b766 739 io->iocb->ki_complete(io->iocb, res);
01e9d11a 740 }
744742d6
SF
741
742 kref_put(&io->refcnt, fuse_io_release);
01e9d11a
MP
743}
744
68bfb7eb 745static struct fuse_io_args *fuse_io_alloc(struct fuse_io_priv *io,
51b02530
JK
746 unsigned int nfolios)
747{
748 struct fuse_io_args *ia;
749
750 ia = kzalloc(sizeof(*ia), GFP_KERNEL);
751 if (ia) {
752 ia->io = io;
51b02530 753 ia->ap.folios = fuse_folios_alloc(nfolios, GFP_KERNEL,
68bfb7eb 754 &ia->ap.descs);
51b02530
JK
755 if (!ia->ap.folios) {
756 kfree(ia);
757 ia = NULL;
758 }
759 }
760 return ia;
761}
762
68bfb7eb 763static void fuse_io_free(struct fuse_io_args *ia)
51b02530
JK
764{
765 kfree(ia->ap.folios);
766 kfree(ia);
767}
768
fcee216b 769static void fuse_aio_complete_req(struct fuse_mount *fm, struct fuse_args *args,
45ac96ed
MS
770 int err)
771{
772 struct fuse_io_args *ia = container_of(args, typeof(*ia), ap.args);
773 struct fuse_io_priv *io = ia->io;
01e9d11a 774 ssize_t pos = -1;
41748675 775 size_t nres;
01e9d11a 776
45ac96ed
MS
777 if (err) {
778 /* Nothing */
779 } else if (io->write) {
780 if (ia->write.out.size > ia->write.in.size) {
781 err = -EIO;
41748675
HT
782 } else {
783 nres = ia->write.out.size;
784 if (ia->write.in.size != ia->write.out.size)
785 pos = ia->write.in.offset - io->offset +
786 ia->write.out.size;
45ac96ed 787 }
01e9d11a 788 } else {
45ac96ed
MS
789 u32 outsize = args->out_args[0].size;
790
41748675 791 nres = outsize;
45ac96ed
MS
792 if (ia->read.in.size != outsize)
793 pos = ia->read.in.offset - io->offset + outsize;
01e9d11a
MP
794 }
795
41748675
HT
796 fuse_release_user_pages(&ia->ap, err ?: nres, io->should_dirty);
797
45ac96ed 798 fuse_aio_complete(io, err, pos);
68bfb7eb 799 fuse_io_free(ia);
01e9d11a
MP
800}
801
fcee216b 802static ssize_t fuse_async_req_send(struct fuse_mount *fm,
45ac96ed 803 struct fuse_io_args *ia, size_t num_bytes)
01e9d11a 804{
45ac96ed
MS
805 ssize_t err;
806 struct fuse_io_priv *io = ia->io;
807
01e9d11a 808 spin_lock(&io->lock);
744742d6 809 kref_get(&io->refcnt);
01e9d11a
MP
810 io->size += num_bytes;
811 io->reqs++;
812 spin_unlock(&io->lock);
813
45ac96ed 814 ia->ap.args.end = fuse_aio_complete_req;
bb737bbe 815 ia->ap.args.may_block = io->should_dirty;
fcee216b 816 err = fuse_simple_background(fm, &ia->ap.args, GFP_KERNEL);
f1ebdeff 817 if (err)
fcee216b 818 fuse_aio_complete_req(fm, &ia->ap.args, err);
01e9d11a 819
f1ebdeff 820 return num_bytes;
01e9d11a
MP
821}
822
45ac96ed
MS
823static ssize_t fuse_send_read(struct fuse_io_args *ia, loff_t pos, size_t count,
824 fl_owner_t owner)
04730fef 825{
45ac96ed 826 struct file *file = ia->io->iocb->ki_filp;
2106cb18 827 struct fuse_file *ff = file->private_data;
fcee216b 828 struct fuse_mount *fm = ff->fm;
f3332114 829
45ac96ed 830 fuse_read_args_fill(ia, file, pos, count, FUSE_READ);
f3332114 831 if (owner != NULL) {
45ac96ed 832 ia->read.in.read_flags |= FUSE_READ_LOCKOWNER;
fcee216b 833 ia->read.in.lock_owner = fuse_lock_owner_id(fm->fc, owner);
f3332114 834 }
36cf66ed 835
45ac96ed 836 if (ia->io->async)
fcee216b 837 return fuse_async_req_send(fm, ia, count);
36cf66ed 838
fcee216b 839 return fuse_simple_request(fm, &ia->ap.args);
04730fef
MS
840}
841
5c5c5e51
MS
842static void fuse_read_update_size(struct inode *inode, loff_t size,
843 u64 attr_ver)
844{
845 struct fuse_conn *fc = get_fuse_conn(inode);
846 struct fuse_inode *fi = get_fuse_inode(inode);
847
f15ecfef 848 spin_lock(&fi->lock);
484ce657 849 if (attr_ver >= fi->attr_version && size < inode->i_size &&
06a7c3c2 850 !test_bit(FUSE_I_SIZE_UNSTABLE, &fi->state)) {
4510d86f 851 fi->attr_version = atomic64_inc_return(&fc->attr_version);
5c5c5e51
MS
852 i_size_write(inode, size);
853 }
f15ecfef 854 spin_unlock(&fi->lock);
5c5c5e51
MS
855}
856
a0d45d84 857static void fuse_short_read(struct inode *inode, u64 attr_ver, size_t num_read,
134831e3 858 struct fuse_args_pages *ap)
a92adc82 859{
8373200b
PE
860 struct fuse_conn *fc = get_fuse_conn(inode);
861
a73d47f5
MS
862 /*
863 * If writeback_cache is enabled, a short read means there's a hole in
864 * the file. Some data after the hole is in page cache, but has not
865 * reached the client fs yet. So the hole is not present there.
866 */
867 if (!fc->writeback_cache) {
51b02530 868 loff_t pos = folio_pos(ap->folios[0]) + num_read;
8373200b
PE
869 fuse_read_update_size(inode, pos, attr_ver);
870 }
a92adc82
PE
871}
872
65fe891d 873static int fuse_do_readfolio(struct file *file, struct folio *folio)
b6aeaded 874{
65fe891d 875 struct inode *inode = folio->mapping->host;
fcee216b 876 struct fuse_mount *fm = get_fuse_mount(inode);
65fe891d 877 loff_t pos = folio_pos(folio);
51b02530 878 struct fuse_folio_desc desc = { .length = PAGE_SIZE };
00793ca5
MS
879 struct fuse_io_args ia = {
880 .ap.args.page_zeroing = true,
881 .ap.args.out_pages = true,
51b02530
JK
882 .ap.num_folios = 1,
883 .ap.folios = &folio,
68bfb7eb 884 .ap.descs = &desc,
00793ca5
MS
885 };
886 ssize_t res;
5c5c5e51 887 u64 attr_ver;
248d86e8 888
3be5a52b 889 /*
65fe891d
JB
890 * With the temporary pages that are used to complete writeback, we can
891 * have writeback that extends beyond the lifetime of the folio. So
892 * make sure we read a properly synced folio.
3be5a52b 893 */
65fe891d 894 fuse_wait_on_folio_writeback(inode, folio);
3be5a52b 895
fcee216b 896 attr_ver = fuse_get_attr_version(fm->fc);
5c5c5e51 897
2f139829
MS
898 /* Don't overflow end offset */
899 if (pos + (desc.length - 1) == LLONG_MAX)
900 desc.length--;
901
00793ca5 902 fuse_read_args_fill(&ia, file, pos, desc.length, FUSE_READ);
fcee216b 903 res = fuse_simple_request(fm, &ia.ap.args);
00793ca5
MS
904 if (res < 0)
905 return res;
906 /*
907 * Short read means EOF. If file size is larger, truncate it
908 */
909 if (res < desc.length)
134831e3 910 fuse_short_read(inode, attr_ver, res, &ia.ap);
5c5c5e51 911
65fe891d 912 folio_mark_uptodate(folio);
482fce55 913
00793ca5 914 return 0;
482fce55
MP
915}
916
5efd00e4 917static int fuse_read_folio(struct file *file, struct folio *folio)
482fce55 918{
65fe891d 919 struct inode *inode = folio->mapping->host;
482fce55
MP
920 int err;
921
922 err = -EIO;
5d069dbe 923 if (fuse_is_bad(inode))
482fce55
MP
924 goto out;
925
65fe891d 926 err = fuse_do_readfolio(file, folio);
451418fc 927 fuse_invalidate_atime(inode);
b6aeaded 928 out:
65fe891d 929 folio_unlock(folio);
b6aeaded
MS
930 return err;
931}
932
fcee216b 933static void fuse_readpages_end(struct fuse_mount *fm, struct fuse_args *args,
134831e3 934 int err)
db50b96c 935{
c1aa96a5 936 int i;
134831e3
MS
937 struct fuse_io_args *ia = container_of(args, typeof(*ia), ap.args);
938 struct fuse_args_pages *ap = &ia->ap;
939 size_t count = ia->read.in.size;
940 size_t num_read = args->out_args[0].size;
ce534fb0 941 struct address_space *mapping = NULL;
c1aa96a5 942
51b02530
JK
943 for (i = 0; mapping == NULL && i < ap->num_folios; i++)
944 mapping = ap->folios[i]->mapping;
5c5c5e51 945
ce534fb0
MS
946 if (mapping) {
947 struct inode *inode = mapping->host;
948
949 /*
950 * Short read means EOF. If file size is larger, truncate it
951 */
134831e3
MS
952 if (!err && num_read < count)
953 fuse_short_read(inode, ia->read.attr_ver, num_read, ap);
ce534fb0 954
451418fc 955 fuse_invalidate_atime(inode);
ce534fb0 956 }
c1aa96a5 957
51b02530
JK
958 for (i = 0; i < ap->num_folios; i++)
959 folio_end_read(ap->folios[i], !err);
134831e3 960 if (ia->ff)
e26ee4ef 961 fuse_file_put(ia->ff, false);
134831e3 962
68bfb7eb 963 fuse_io_free(ia);
c1aa96a5
MS
964}
965
134831e3 966static void fuse_send_readpages(struct fuse_io_args *ia, struct file *file)
c1aa96a5 967{
2106cb18 968 struct fuse_file *ff = file->private_data;
fcee216b 969 struct fuse_mount *fm = ff->fm;
134831e3 970 struct fuse_args_pages *ap = &ia->ap;
51b02530
JK
971 loff_t pos = folio_pos(ap->folios[0]);
972 /* Currently, all folios in FUSE are one page */
973 size_t count = ap->num_folios << PAGE_SHIFT;
7df1e988 974 ssize_t res;
134831e3
MS
975 int err;
976
977 ap->args.out_pages = true;
978 ap->args.page_zeroing = true;
979 ap->args.page_replace = true;
2f139829
MS
980
981 /* Don't overflow end offset */
982 if (pos + (count - 1) == LLONG_MAX) {
983 count--;
68bfb7eb 984 ap->descs[ap->num_folios - 1].length--;
2f139829
MS
985 }
986 WARN_ON((loff_t) (pos + count) < 0);
987
134831e3 988 fuse_read_args_fill(ia, file, pos, count, FUSE_READ);
fcee216b
MR
989 ia->read.attr_ver = fuse_get_attr_version(fm->fc);
990 if (fm->fc->async_read) {
134831e3
MS
991 ia->ff = fuse_file_get(ff);
992 ap->args.end = fuse_readpages_end;
fcee216b 993 err = fuse_simple_background(fm, &ap->args, GFP_KERNEL);
134831e3
MS
994 if (!err)
995 return;
9cd68455 996 } else {
fcee216b 997 res = fuse_simple_request(fm, &ap->args);
7df1e988 998 err = res < 0 ? res : 0;
9cd68455 999 }
fcee216b 1000 fuse_readpages_end(fm, &ap->args, err);
db50b96c
MS
1001}
1002
76a0294e 1003static void fuse_readahead(struct readahead_control *rac)
db50b96c 1004{
76a0294e 1005 struct inode *inode = rac->mapping->host;
aaa32429 1006 struct fuse_inode *fi = get_fuse_inode(inode);
db50b96c 1007 struct fuse_conn *fc = get_fuse_conn(inode);
3eab9d7b 1008 unsigned int max_pages, nr_pages;
aaa32429
JB
1009 pgoff_t first = readahead_index(rac);
1010 pgoff_t last = first + readahead_count(rac) - 1;
db50b96c 1011
5d069dbe 1012 if (fuse_is_bad(inode))
76a0294e 1013 return;
248d86e8 1014
aaa32429
JB
1015 wait_event(fi->page_waitq, !fuse_range_is_writeback(inode, first, last));
1016
76a0294e
MWO
1017 max_pages = min_t(unsigned int, fc->max_pages,
1018 fc->max_read / PAGE_SIZE);
db50b96c 1019
3eab9d7b
JB
1020 /*
1021 * This is only accurate the first time through, since readahead_folio()
1022 * doesn't update readahead_count() from the previous folio until the
1023 * next call. Grab nr_pages here so we know how many pages we're going
1024 * to have to process. This means that we will exit here with
1025 * readahead_count() == folio_nr_pages(last_folio), but we will have
1026 * consumed all of the folios, and read_pages() will call
1027 * readahead_folio() again which will clean up the rac.
1028 */
1029 nr_pages = readahead_count(rac);
1030
1031 while (nr_pages) {
76a0294e
MWO
1032 struct fuse_io_args *ia;
1033 struct fuse_args_pages *ap;
3eab9d7b
JB
1034 struct folio *folio;
1035 unsigned cur_pages = min(max_pages, nr_pages);
76a0294e 1036
670d21c6
N
1037 if (fc->num_background >= fc->congestion_threshold &&
1038 rac->ra->async_size >= readahead_count(rac))
1039 /*
1040 * Congested and only async pages left, so skip the
1041 * rest.
1042 */
1043 break;
1044
68bfb7eb 1045 ia = fuse_io_alloc(NULL, cur_pages);
76a0294e
MWO
1046 if (!ia)
1047 return;
1048 ap = &ia->ap;
3eab9d7b 1049
51b02530 1050 while (ap->num_folios < cur_pages) {
3eab9d7b 1051 folio = readahead_folio(rac);
51b02530 1052 ap->folios[ap->num_folios] = folio;
68bfb7eb 1053 ap->descs[ap->num_folios].length = folio_size(folio);
51b02530 1054 ap->num_folios++;
76a0294e 1055 }
76a0294e 1056 fuse_send_readpages(ia, rac->file);
3eab9d7b 1057 nr_pages -= cur_pages;
d3406ffa 1058 }
db50b96c
MS
1059}
1060
55752a3a 1061static ssize_t fuse_cache_read_iter(struct kiocb *iocb, struct iov_iter *to)
bcb4be80
MS
1062{
1063 struct inode *inode = iocb->ki_filp->f_mapping->host;
a8894274 1064 struct fuse_conn *fc = get_fuse_conn(inode);
bcb4be80 1065
a8894274
BF
1066 /*
1067 * In auto invalidate mode, always update attributes on read.
1068 * Otherwise, only update if we attempt to read past EOF (to ensure
1069 * i_size is up to date).
1070 */
1071 if (fc->auto_inval_data ||
37c20f16 1072 (iocb->ki_pos + iov_iter_count(to) > i_size_read(inode))) {
bcb4be80 1073 int err;
c6c745b8 1074 err = fuse_update_attributes(inode, iocb->ki_filp, STATX_SIZE);
bcb4be80
MS
1075 if (err)
1076 return err;
1077 }
1078
37c20f16 1079 return generic_file_read_iter(iocb, to);
bcb4be80
MS
1080}
1081
338f2e3f
MS
1082static void fuse_write_args_fill(struct fuse_io_args *ia, struct fuse_file *ff,
1083 loff_t pos, size_t count)
1084{
1085 struct fuse_args *args = &ia->ap.args;
1086
1087 ia->write.in.fh = ff->fh;
1088 ia->write.in.offset = pos;
1089 ia->write.in.size = count;
1090 args->opcode = FUSE_WRITE;
1091 args->nodeid = ff->nodeid;
1092 args->in_numargs = 2;
fcee216b 1093 if (ff->fm->fc->minor < 9)
338f2e3f
MS
1094 args->in_args[0].size = FUSE_COMPAT_WRITE_IN_SIZE;
1095 else
1096 args->in_args[0].size = sizeof(ia->write.in);
1097 args->in_args[0].value = &ia->write.in;
1098 args->in_args[1].size = count;
1099 args->out_numargs = 1;
1100 args->out_args[0].size = sizeof(ia->write.out);
1101 args->out_args[0].value = &ia->write.out;
1102}
1103
1104static unsigned int fuse_write_flags(struct kiocb *iocb)
1105{
1106 unsigned int flags = iocb->ki_filp->f_flags;
1107
91b94c5d 1108 if (iocb_is_dsync(iocb))
338f2e3f
MS
1109 flags |= O_DSYNC;
1110 if (iocb->ki_flags & IOCB_SYNC)
1111 flags |= O_SYNC;
1112
1113 return flags;
1114}
1115
45ac96ed
MS
1116static ssize_t fuse_send_write(struct fuse_io_args *ia, loff_t pos,
1117 size_t count, fl_owner_t owner)
b25e82e5 1118{
45ac96ed 1119 struct kiocb *iocb = ia->io->iocb;
e1c0eecb 1120 struct file *file = iocb->ki_filp;
2106cb18 1121 struct fuse_file *ff = file->private_data;
fcee216b 1122 struct fuse_mount *fm = ff->fm;
45ac96ed
MS
1123 struct fuse_write_in *inarg = &ia->write.in;
1124 ssize_t err;
2d698b07 1125
45ac96ed 1126 fuse_write_args_fill(ia, ff, pos, count);
338f2e3f 1127 inarg->flags = fuse_write_flags(iocb);
f3332114 1128 if (owner != NULL) {
f3332114 1129 inarg->write_flags |= FUSE_WRITE_LOCKOWNER;
fcee216b 1130 inarg->lock_owner = fuse_lock_owner_id(fm->fc, owner);
f3332114 1131 }
36cf66ed 1132
45ac96ed 1133 if (ia->io->async)
fcee216b 1134 return fuse_async_req_send(fm, ia, count);
45ac96ed 1135
fcee216b 1136 err = fuse_simple_request(fm, &ia->ap.args);
45ac96ed
MS
1137 if (!err && ia->write.out.size > count)
1138 err = -EIO;
36cf66ed 1139
45ac96ed 1140 return err ?: ia->write.out.size;
b6aeaded
MS
1141}
1142
d347739a 1143bool fuse_write_update_attr(struct inode *inode, loff_t pos, ssize_t written)
854512ec
MS
1144{
1145 struct fuse_conn *fc = get_fuse_conn(inode);
1146 struct fuse_inode *fi = get_fuse_inode(inode);
b0aa7606 1147 bool ret = false;
854512ec 1148
f15ecfef 1149 spin_lock(&fi->lock);
4510d86f 1150 fi->attr_version = atomic64_inc_return(&fc->attr_version);
d347739a 1151 if (written > 0 && pos > inode->i_size) {
854512ec 1152 i_size_write(inode, pos);
b0aa7606
MP
1153 ret = true;
1154 }
f15ecfef 1155 spin_unlock(&fi->lock);
b0aa7606 1156
d347739a
MS
1157 fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
1158
b0aa7606 1159 return ret;
854512ec
MS
1160}
1161
338f2e3f
MS
1162static ssize_t fuse_send_write_pages(struct fuse_io_args *ia,
1163 struct kiocb *iocb, struct inode *inode,
1164 loff_t pos, size_t count)
ea9b9907 1165{
338f2e3f
MS
1166 struct fuse_args_pages *ap = &ia->ap;
1167 struct file *file = iocb->ki_filp;
1168 struct fuse_file *ff = file->private_data;
fcee216b 1169 struct fuse_mount *fm = ff->fm;
338f2e3f 1170 unsigned int offset, i;
4f06dd92 1171 bool short_write;
338f2e3f 1172 int err;
ea9b9907 1173
f2ef459b
JK
1174 for (i = 0; i < ap->num_folios; i++)
1175 fuse_wait_on_folio_writeback(inode, ap->folios[i]);
ea9b9907 1176
338f2e3f
MS
1177 fuse_write_args_fill(ia, ff, pos, count);
1178 ia->write.in.flags = fuse_write_flags(iocb);
b8667395
VG
1179 if (fm->fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1180 ia->write.in.write_flags |= FUSE_WRITE_KILL_SUIDGID;
ea9b9907 1181
fcee216b 1182 err = fuse_simple_request(fm, &ap->args);
8aab336b
MS
1183 if (!err && ia->write.out.size > count)
1184 err = -EIO;
338f2e3f 1185
4f06dd92 1186 short_write = ia->write.out.size < count;
68bfb7eb 1187 offset = ap->descs[0].offset;
338f2e3f 1188 count = ia->write.out.size;
f2ef459b
JK
1189 for (i = 0; i < ap->num_folios; i++) {
1190 struct folio *folio = ap->folios[i];
ea9b9907 1191
4f06dd92 1192 if (err) {
785d06af 1193 folio_clear_uptodate(folio);
4f06dd92 1194 } else {
785d06af
JB
1195 if (count >= folio_size(folio) - offset)
1196 count -= folio_size(folio) - offset;
4f06dd92
VG
1197 else {
1198 if (short_write)
785d06af 1199 folio_clear_uptodate(folio);
4f06dd92
VG
1200 count = 0;
1201 }
1202 offset = 0;
1203 }
f2ef459b 1204 if (ia->write.folio_locked && (i == ap->num_folios - 1))
785d06af
JB
1205 folio_unlock(folio);
1206 folio_put(folio);
ea9b9907
NP
1207 }
1208
338f2e3f 1209 return err;
ea9b9907
NP
1210}
1211
4f06dd92 1212static ssize_t fuse_fill_write_pages(struct fuse_io_args *ia,
338f2e3f
MS
1213 struct address_space *mapping,
1214 struct iov_iter *ii, loff_t pos,
1215 unsigned int max_pages)
ea9b9907 1216{
4f06dd92 1217 struct fuse_args_pages *ap = &ia->ap;
ea9b9907 1218 struct fuse_conn *fc = get_fuse_conn(mapping->host);
09cbfeaf 1219 unsigned offset = pos & (PAGE_SIZE - 1);
f2ef459b 1220 unsigned int nr_pages = 0;
ea9b9907
NP
1221 size_t count = 0;
1222 int err;
1223
338f2e3f 1224 ap->args.in_pages = true;
68bfb7eb 1225 ap->descs[0].offset = offset;
ea9b9907
NP
1226
1227 do {
1228 size_t tmp;
9bafbe7a 1229 struct folio *folio;
09cbfeaf
KS
1230 pgoff_t index = pos >> PAGE_SHIFT;
1231 size_t bytes = min_t(size_t, PAGE_SIZE - offset,
ea9b9907
NP
1232 iov_iter_count(ii));
1233
1234 bytes = min_t(size_t, bytes, fc->max_write - count);
1235
1236 again:
1237 err = -EFAULT;
a6294593 1238 if (fault_in_iov_iter_readable(ii, bytes))
ea9b9907
NP
1239 break;
1240
9bafbe7a
JB
1241 folio = __filemap_get_folio(mapping, index, FGP_WRITEBEGIN,
1242 mapping_gfp_mask(mapping));
1243 if (IS_ERR(folio)) {
1244 err = PTR_ERR(folio);
ea9b9907 1245 break;
9bafbe7a 1246 }
ea9b9907 1247
931e80e4 1248 if (mapping_writably_mapped(mapping))
9bafbe7a 1249 flush_dcache_folio(folio);
931e80e4 1250
9bafbe7a
JB
1251 tmp = copy_folio_from_iter_atomic(folio, offset, bytes, ii);
1252 flush_dcache_folio(folio);
ea9b9907
NP
1253
1254 if (!tmp) {
9bafbe7a
JB
1255 folio_unlock(folio);
1256 folio_put(folio);
ea9b9907
NP
1257 goto again;
1258 }
1259
1260 err = 0;
f2ef459b 1261 ap->folios[ap->num_folios] = folio;
68bfb7eb 1262 ap->descs[ap->num_folios].length = tmp;
f2ef459b
JK
1263 ap->num_folios++;
1264 nr_pages++;
ea9b9907 1265
ea9b9907
NP
1266 count += tmp;
1267 pos += tmp;
1268 offset += tmp;
09cbfeaf 1269 if (offset == PAGE_SIZE)
ea9b9907
NP
1270 offset = 0;
1271
4f06dd92
VG
1272 /* If we copied full page, mark it uptodate */
1273 if (tmp == PAGE_SIZE)
9bafbe7a 1274 folio_mark_uptodate(folio);
4f06dd92 1275
9bafbe7a
JB
1276 if (folio_test_uptodate(folio)) {
1277 folio_unlock(folio);
4f06dd92 1278 } else {
f2ef459b 1279 ia->write.folio_locked = true;
4f06dd92
VG
1280 break;
1281 }
78bb6cb9
MS
1282 if (!fc->big_writes)
1283 break;
ea9b9907 1284 } while (iov_iter_count(ii) && count < fc->max_write &&
f2ef459b 1285 nr_pages < max_pages && offset == 0);
ea9b9907
NP
1286
1287 return count > 0 ? count : err;
1288}
1289
5da784cc
CS
1290static inline unsigned int fuse_wr_pages(loff_t pos, size_t len,
1291 unsigned int max_pages)
d07f09f5 1292{
5da784cc 1293 return min_t(unsigned int,
09cbfeaf
KS
1294 ((pos + len - 1) >> PAGE_SHIFT) -
1295 (pos >> PAGE_SHIFT) + 1,
5da784cc 1296 max_pages);
d07f09f5
MP
1297}
1298
596df33d 1299static ssize_t fuse_perform_write(struct kiocb *iocb, struct iov_iter *ii)
ea9b9907 1300{
596df33d 1301 struct address_space *mapping = iocb->ki_filp->f_mapping;
ea9b9907
NP
1302 struct inode *inode = mapping->host;
1303 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1304 struct fuse_inode *fi = get_fuse_inode(inode);
596df33d 1305 loff_t pos = iocb->ki_pos;
ea9b9907
NP
1306 int err = 0;
1307 ssize_t res = 0;
1308
06a7c3c2
MP
1309 if (inode->i_size < pos + iov_iter_count(ii))
1310 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1311
ea9b9907 1312 do {
ea9b9907 1313 ssize_t count;
338f2e3f
MS
1314 struct fuse_io_args ia = {};
1315 struct fuse_args_pages *ap = &ia.ap;
5da784cc
CS
1316 unsigned int nr_pages = fuse_wr_pages(pos, iov_iter_count(ii),
1317 fc->max_pages);
ea9b9907 1318
68bfb7eb 1319 ap->folios = fuse_folios_alloc(nr_pages, GFP_KERNEL, &ap->descs);
f2ef459b 1320 if (!ap->folios) {
338f2e3f 1321 err = -ENOMEM;
ea9b9907
NP
1322 break;
1323 }
1324
4f06dd92 1325 count = fuse_fill_write_pages(&ia, mapping, ii, pos, nr_pages);
ea9b9907
NP
1326 if (count <= 0) {
1327 err = count;
1328 } else {
338f2e3f
MS
1329 err = fuse_send_write_pages(&ia, iocb, inode,
1330 pos, count);
ea9b9907 1331 if (!err) {
338f2e3f
MS
1332 size_t num_written = ia.write.out.size;
1333
ea9b9907
NP
1334 res += num_written;
1335 pos += num_written;
1336
1337 /* break out of the loop on short write */
1338 if (num_written != count)
1339 err = -EIO;
1340 }
1341 }
f2ef459b 1342 kfree(ap->folios);
ea9b9907
NP
1343 } while (!err && iov_iter_count(ii));
1344
d347739a 1345 fuse_write_update_attr(inode, pos, res);
06a7c3c2 1346 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
ea9b9907 1347
70e986c3
CH
1348 if (!res)
1349 return err;
1350 iocb->ki_pos += res;
1351 return res;
ea9b9907
NP
1352}
1353
699cf824
BS
1354static bool fuse_io_past_eof(struct kiocb *iocb, struct iov_iter *iter)
1355{
1356 struct inode *inode = file_inode(iocb->ki_filp);
1357
1358 return iocb->ki_pos + iov_iter_count(iter) > i_size_read(inode);
1359}
1360
1361/*
1362 * @return true if an exclusive lock for direct IO writes is needed
1363 */
1364static bool fuse_dio_wr_exclusive_lock(struct kiocb *iocb, struct iov_iter *from)
1365{
1366 struct file *file = iocb->ki_filp;
1367 struct fuse_file *ff = file->private_data;
1368 struct inode *inode = file_inode(iocb->ki_filp);
205c1d80 1369 struct fuse_inode *fi = get_fuse_inode(inode);
699cf824
BS
1370
1371 /* Server side has to advise that it supports parallel dio writes. */
1372 if (!(ff->open_flags & FOPEN_PARALLEL_DIRECT_WRITES))
1373 return true;
1374
1375 /*
1376 * Append will need to know the eventual EOF - always needs an
1377 * exclusive lock.
1378 */
1379 if (iocb->ki_flags & IOCB_APPEND)
1380 return true;
1381
205c1d80
AG
1382 /* shared locks are not allowed with parallel page cache IO */
1383 if (test_bit(FUSE_I_CACHE_IO_MODE, &fi->state))
2f3d8ff4 1384 return true;
699cf824
BS
1385
1386 /* Parallel dio beyond EOF is not supported, at least for now. */
1387 if (fuse_io_past_eof(iocb, from))
1388 return true;
1389
1390 return false;
1391}
1392
9bbb6717
BS
1393static void fuse_dio_lock(struct kiocb *iocb, struct iov_iter *from,
1394 bool *exclusive)
1395{
1396 struct inode *inode = file_inode(iocb->ki_filp);
4864a6dd 1397 struct fuse_inode *fi = get_fuse_inode(inode);
9bbb6717
BS
1398
1399 *exclusive = fuse_dio_wr_exclusive_lock(iocb, from);
1400 if (*exclusive) {
1401 inode_lock(inode);
1402 } else {
1403 inode_lock_shared(inode);
1404 /*
205c1d80
AG
1405 * New parallal dio allowed only if inode is not in caching
1406 * mode and denies new opens in caching mode. This check
1407 * should be performed only after taking shared inode lock.
1408 * Previous past eof check was without inode lock and might
1409 * have raced, so check it again.
9bbb6717 1410 */
205c1d80 1411 if (fuse_io_past_eof(iocb, from) ||
4864a6dd 1412 fuse_inode_uncached_io_start(fi, NULL) != 0) {
9bbb6717
BS
1413 inode_unlock_shared(inode);
1414 inode_lock(inode);
1415 *exclusive = true;
1416 }
1417 }
1418}
1419
205c1d80 1420static void fuse_dio_unlock(struct kiocb *iocb, bool exclusive)
9bbb6717 1421{
205c1d80 1422 struct inode *inode = file_inode(iocb->ki_filp);
4864a6dd 1423 struct fuse_inode *fi = get_fuse_inode(inode);
205c1d80 1424
9bbb6717
BS
1425 if (exclusive) {
1426 inode_unlock(inode);
1427 } else {
205c1d80 1428 /* Allow opens in caching mode after last parallel dio end */
4864a6dd 1429 fuse_inode_uncached_io_end(fi);
9bbb6717
BS
1430 inode_unlock_shared(inode);
1431 }
1432}
1433
55752a3a 1434static ssize_t fuse_cache_write_iter(struct kiocb *iocb, struct iov_iter *from)
ea9b9907
NP
1435{
1436 struct file *file = iocb->ki_filp;
5b8ca5a5 1437 struct mnt_idmap *idmap = file_mnt_idmap(file);
ea9b9907 1438 struct address_space *mapping = file->f_mapping;
ea9b9907
NP
1439 ssize_t written = 0;
1440 struct inode *inode = mapping->host;
2e3f7dd0 1441 ssize_t err, count;
8981bdfd 1442 struct fuse_conn *fc = get_fuse_conn(inode);
ea9b9907 1443
8981bdfd 1444 if (fc->writeback_cache) {
4d99ff8f 1445 /* Update size (EOF optimization) and mode (SUID clearing) */
c6c745b8
MS
1446 err = fuse_update_attributes(mapping->host, file,
1447 STATX_SIZE | STATX_MODE);
4d99ff8f
PE
1448 if (err)
1449 return err;
1450
8981bdfd 1451 if (fc->handle_killpriv_v2 &&
5b8ca5a5 1452 setattr_should_drop_suidgid(idmap,
9452e93e 1453 file_inode(file))) {
8981bdfd
VG
1454 goto writethrough;
1455 }
1456
84c3d55c 1457 return generic_file_write_iter(iocb, from);
4d99ff8f
PE
1458 }
1459
8981bdfd 1460writethrough:
5955102c 1461 inode_lock(inode);
ea9b9907 1462
2e3f7dd0 1463 err = count = generic_write_checks(iocb, from);
3309dd04 1464 if (err <= 0)
ea9b9907
NP
1465 goto out;
1466
2e3f7dd0
ZJ
1467 task_io_account_write(count);
1468
e6befec5 1469 err = kiocb_modified(iocb);
c3b2da31
JB
1470 if (err)
1471 goto out;
ea9b9907 1472
2ba48ce5 1473 if (iocb->ki_flags & IOCB_DIRECT) {
1af5bb49 1474 written = generic_file_direct_write(iocb, from);
84c3d55c 1475 if (written < 0 || !iov_iter_count(from))
4273b793 1476 goto out;
64d1b4dd
CH
1477 written = direct_write_fallback(iocb, from, written,
1478 fuse_perform_write(iocb, from));
4273b793 1479 } else {
596df33d 1480 written = fuse_perform_write(iocb, from);
4273b793 1481 }
ea9b9907 1482out:
5955102c 1483 inode_unlock(inode);
e1c0eecb
MS
1484 if (written > 0)
1485 written = generic_write_sync(iocb, written);
ea9b9907
NP
1486
1487 return written ? written : err;
1488}
1489
7c190c8b
MP
1490static inline unsigned long fuse_get_user_addr(const struct iov_iter *ii)
1491{
de4f5fed 1492 return (unsigned long)iter_iov(ii)->iov_base + ii->iov_offset;
7c190c8b
MP
1493}
1494
1495static inline size_t fuse_get_frag_size(const struct iov_iter *ii,
1496 size_t max_size)
1497{
1498 return min(iov_iter_single_seg_count(ii), max_size);
1499}
1500
45ac96ed
MS
1501static int fuse_get_user_pages(struct fuse_args_pages *ap, struct iov_iter *ii,
1502 size_t *nbytesp, int write,
41748675
HT
1503 unsigned int max_pages,
1504 bool use_pages_for_kvec_io)
413ef8cb 1505{
41748675 1506 bool flush_or_invalidate = false;
3b97c365 1507 unsigned int nr_pages = 0;
7c190c8b 1508 size_t nbytes = 0; /* # bytes already packed in req */
742f9927 1509 ssize_t ret = 0;
b98d023a 1510
41748675
HT
1511 /* Special case for kernel I/O: can copy directly into the buffer.
1512 * However if the implementation of fuse_conn requires pages instead of
1513 * pointer (e.g., virtio-fs), use iov_iter_extract_pages() instead.
1514 */
00e23707 1515 if (iov_iter_is_kvec(ii)) {
41748675 1516 void *user_addr = (void *)fuse_get_user_addr(ii);
7c190c8b 1517
41748675
HT
1518 if (!use_pages_for_kvec_io) {
1519 size_t frag_size = fuse_get_frag_size(ii, *nbytesp);
f4975c67 1520
41748675
HT
1521 if (write)
1522 ap->args.in_args[1].value = user_addr;
1523 else
1524 ap->args.out_args[0].value = user_addr;
1525
1526 iov_iter_advance(ii, frag_size);
1527 *nbytesp = frag_size;
1528 return 0;
1529 }
1530
1531 if (is_vmalloc_addr(user_addr)) {
1532 ap->args.vmap_base = user_addr;
1533 flush_or_invalidate = true;
1534 }
f4975c67 1535 }
413ef8cb 1536
3b97c365
JK
1537 /*
1538 * Until there is support for iov_iter_extract_folios(), we have to
1539 * manually extract pages using iov_iter_extract_pages() and then
1540 * copy that to a folios array.
1541 */
1542 struct page **pages = kzalloc(max_pages * sizeof(struct page *),
1543 GFP_KERNEL);
78f2560f
BS
1544 if (!pages) {
1545 ret = -ENOMEM;
1546 goto out;
1547 }
3b97c365
JK
1548
1549 while (nbytes < *nbytesp && nr_pages < max_pages) {
1550 unsigned nfolios, i;
f67da30c 1551 size_t start;
738adade 1552
3b97c365 1553 ret = iov_iter_extract_pages(ii, &pages,
738adade 1554 *nbytesp - nbytes,
3b97c365 1555 max_pages - nr_pages,
738adade 1556 0, &start);
7c190c8b 1557 if (ret < 0)
742f9927 1558 break;
7c190c8b 1559
c9c37e2e 1560 nbytes += ret;
7c190c8b 1561
7a4f5418
JK
1562 nfolios = DIV_ROUND_UP(ret + start, PAGE_SIZE);
1563
1564 for (i = 0; i < nfolios; i++) {
1565 struct folio *folio = page_folio(pages[i]);
1566 unsigned int offset = start +
1567 (folio_page_idx(folio, pages[i]) << PAGE_SHIFT);
1568 unsigned int len = min_t(unsigned int, ret, PAGE_SIZE - start);
1569
1570 ap->descs[ap->num_folios].offset = offset;
1571 ap->descs[ap->num_folios].length = len;
1572 ap->folios[ap->num_folios] = folio;
1573 start = 0;
1574 ret -= len;
1575 ap->num_folios++;
1576 }
1577
3b97c365 1578 nr_pages += nfolios;
7c190c8b 1579 }
3b97c365 1580 kfree(pages);
f4975c67 1581
41748675
HT
1582 if (write && flush_or_invalidate)
1583 flush_kernel_vmap_range(ap->args.vmap_base, nbytes);
1584
1585 ap->args.invalidate_vmap = !write && flush_or_invalidate;
738adade 1586 ap->args.is_pinned = iov_iter_extract_will_pin(ii);
0c4bcfde 1587 ap->args.user_pages = true;
f4975c67 1588 if (write)
cabdb4fa 1589 ap->args.in_pages = true;
f4975c67 1590 else
cabdb4fa 1591 ap->args.out_pages = true;
f4975c67 1592
78f2560f 1593out:
7c190c8b 1594 *nbytesp = nbytes;
f4975c67 1595
2c932d4c 1596 return ret < 0 ? ret : 0;
413ef8cb
MS
1597}
1598
d22a943f
AV
1599ssize_t fuse_direct_io(struct fuse_io_priv *io, struct iov_iter *iter,
1600 loff_t *ppos, int flags)
413ef8cb 1601{
ea8cd333
PE
1602 int write = flags & FUSE_DIO_WRITE;
1603 int cuse = flags & FUSE_DIO_CUSE;
e1c0eecb 1604 struct file *file = io->iocb->ki_filp;
80e4f252
HX
1605 struct address_space *mapping = file->f_mapping;
1606 struct inode *inode = mapping->host;
2106cb18 1607 struct fuse_file *ff = file->private_data;
fcee216b 1608 struct fuse_conn *fc = ff->fm->fc;
413ef8cb
MS
1609 size_t nmax = write ? fc->max_write : fc->max_read;
1610 loff_t pos = *ppos;
d22a943f 1611 size_t count = iov_iter_count(iter);
09cbfeaf
KS
1612 pgoff_t idx_from = pos >> PAGE_SHIFT;
1613 pgoff_t idx_to = (pos + count - 1) >> PAGE_SHIFT;
413ef8cb 1614 ssize_t res = 0;
742f9927 1615 int err = 0;
45ac96ed
MS
1616 struct fuse_io_args *ia;
1617 unsigned int max_pages;
80e4f252 1618 bool fopen_direct_io = ff->open_flags & FOPEN_DIRECT_IO;
248d86e8 1619
45ac96ed 1620 max_pages = iov_iter_npages(iter, fc->max_pages);
68bfb7eb 1621 ia = fuse_io_alloc(io, max_pages);
45ac96ed
MS
1622 if (!ia)
1623 return -ENOMEM;
413ef8cb 1624
c55e0a55 1625 if (fopen_direct_io && fc->direct_io_allow_mmap) {
b5a2a3a0
HX
1626 res = filemap_write_and_wait_range(mapping, pos, pos + count - 1);
1627 if (res) {
68bfb7eb 1628 fuse_io_free(ia);
b5a2a3a0
HX
1629 return res;
1630 }
1631 }
ea8cd333
PE
1632 if (!cuse && fuse_range_is_writeback(inode, idx_from, idx_to)) {
1633 if (!write)
5955102c 1634 inode_lock(inode);
ea8cd333
PE
1635 fuse_sync_writes(inode);
1636 if (!write)
5955102c 1637 inode_unlock(inode);
ea8cd333
PE
1638 }
1639
80e4f252
HX
1640 if (fopen_direct_io && write) {
1641 res = invalidate_inode_pages2_range(mapping, idx_from, idx_to);
1642 if (res) {
68bfb7eb 1643 fuse_io_free(ia);
80e4f252
HX
1644 return res;
1645 }
1646 }
1647
fcb14cb1 1648 io->should_dirty = !write && user_backed_iter(iter);
413ef8cb 1649 while (count) {
45ac96ed 1650 ssize_t nres;
2106cb18 1651 fl_owner_t owner = current->files;
f4975c67 1652 size_t nbytes = min(count, nmax);
45ac96ed
MS
1653
1654 err = fuse_get_user_pages(&ia->ap, iter, &nbytes, write,
41748675 1655 max_pages, fc->use_pages_for_kvec_io);
742f9927 1656 if (err && !nbytes)
413ef8cb 1657 break;
f4975c67 1658
4a2abf99 1659 if (write) {
45ac96ed 1660 if (!capable(CAP_FSETID))
10c52c84 1661 ia->write.in.write_flags |= FUSE_WRITE_KILL_SUIDGID;
4a2abf99 1662
45ac96ed 1663 nres = fuse_send_write(ia, pos, nbytes, owner);
4a2abf99 1664 } else {
45ac96ed 1665 nres = fuse_send_read(ia, pos, nbytes, owner);
4a2abf99 1666 }
2106cb18 1667
45ac96ed 1668 if (!io->async || nres < 0) {
41748675 1669 fuse_release_user_pages(&ia->ap, nres, io->should_dirty);
68bfb7eb 1670 fuse_io_free(ia);
45ac96ed
MS
1671 }
1672 ia = NULL;
1673 if (nres < 0) {
f658adee 1674 iov_iter_revert(iter, nbytes);
45ac96ed 1675 err = nres;
413ef8cb
MS
1676 break;
1677 }
45ac96ed
MS
1678 WARN_ON(nres > nbytes);
1679
413ef8cb
MS
1680 count -= nres;
1681 res += nres;
1682 pos += nres;
f658adee
MS
1683 if (nres != nbytes) {
1684 iov_iter_revert(iter, nbytes - nres);
413ef8cb 1685 break;
f658adee 1686 }
56cf34ff 1687 if (count) {
45ac96ed 1688 max_pages = iov_iter_npages(iter, fc->max_pages);
68bfb7eb 1689 ia = fuse_io_alloc(io, max_pages);
45ac96ed 1690 if (!ia)
56cf34ff
MS
1691 break;
1692 }
413ef8cb 1693 }
45ac96ed 1694 if (ia)
68bfb7eb 1695 fuse_io_free(ia);
d09cb9d7 1696 if (res > 0)
413ef8cb 1697 *ppos = pos;
413ef8cb 1698
742f9927 1699 return res > 0 ? res : err;
413ef8cb 1700}
08cbf542 1701EXPORT_SYMBOL_GPL(fuse_direct_io);
413ef8cb 1702
36cf66ed 1703static ssize_t __fuse_direct_read(struct fuse_io_priv *io,
d22a943f
AV
1704 struct iov_iter *iter,
1705 loff_t *ppos)
413ef8cb 1706{
d09cb9d7 1707 ssize_t res;
e1c0eecb 1708 struct inode *inode = file_inode(io->iocb->ki_filp);
d09cb9d7 1709
d22a943f 1710 res = fuse_direct_io(io, iter, ppos, 0);
d09cb9d7 1711
9a2eb24d 1712 fuse_invalidate_atime(inode);
d09cb9d7
MS
1713
1714 return res;
413ef8cb
MS
1715}
1716
23c94e1c
MR
1717static ssize_t fuse_direct_IO(struct kiocb *iocb, struct iov_iter *iter);
1718
15316263 1719static ssize_t fuse_direct_read_iter(struct kiocb *iocb, struct iov_iter *to)
b98d023a 1720{
23c94e1c
MR
1721 ssize_t res;
1722
cc23d537 1723 if (!is_sync_kiocb(iocb)) {
23c94e1c
MR
1724 res = fuse_direct_IO(iocb, to);
1725 } else {
1726 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(iocb);
1727
1728 res = __fuse_direct_read(&io, to, &iocb->ki_pos);
1729 }
1730
1731 return res;
b98d023a
MP
1732}
1733
15316263 1734static ssize_t fuse_direct_write_iter(struct kiocb *iocb, struct iov_iter *from)
4273b793 1735{
e1c0eecb 1736 struct inode *inode = file_inode(iocb->ki_filp);
15316263 1737 ssize_t res;
9bbb6717 1738 bool exclusive;
4273b793 1739
9bbb6717 1740 fuse_dio_lock(iocb, from, &exclusive);
3309dd04 1741 res = generic_write_checks(iocb, from);
23c94e1c 1742 if (res > 0) {
2e3f7dd0 1743 task_io_account_write(res);
cc23d537 1744 if (!is_sync_kiocb(iocb)) {
23c94e1c
MR
1745 res = fuse_direct_IO(iocb, from);
1746 } else {
cc23d537 1747 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(iocb);
1748
23c94e1c
MR
1749 res = fuse_direct_io(&io, from, &iocb->ki_pos,
1750 FUSE_DIO_WRITE);
d347739a 1751 fuse_write_update_attr(inode, iocb->ki_pos, res);
23c94e1c
MR
1752 }
1753 }
205c1d80 1754 fuse_dio_unlock(iocb, exclusive);
4273b793
AA
1755
1756 return res;
1757}
1758
55752a3a
MS
1759static ssize_t fuse_file_read_iter(struct kiocb *iocb, struct iov_iter *to)
1760{
2f7b6f5b
MS
1761 struct file *file = iocb->ki_filp;
1762 struct fuse_file *ff = file->private_data;
c2d0ad00 1763 struct inode *inode = file_inode(file);
2f7b6f5b 1764
5d069dbe 1765 if (fuse_is_bad(inode))
2f7b6f5b 1766 return -EIO;
55752a3a 1767
c2d0ad00
VG
1768 if (FUSE_IS_DAX(inode))
1769 return fuse_dax_read_iter(iocb, to);
1770
57e1176e
AG
1771 /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
1772 if (ff->open_flags & FOPEN_DIRECT_IO)
55752a3a 1773 return fuse_direct_read_iter(iocb, to);
57e1176e
AG
1774 else if (fuse_file_passthrough(ff))
1775 return fuse_passthrough_read_iter(iocb, to);
1776 else
1777 return fuse_cache_read_iter(iocb, to);
55752a3a
MS
1778}
1779
1780static ssize_t fuse_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
1781{
2f7b6f5b
MS
1782 struct file *file = iocb->ki_filp;
1783 struct fuse_file *ff = file->private_data;
c2d0ad00 1784 struct inode *inode = file_inode(file);
2f7b6f5b 1785
5d069dbe 1786 if (fuse_is_bad(inode))
2f7b6f5b 1787 return -EIO;
55752a3a 1788
c2d0ad00
VG
1789 if (FUSE_IS_DAX(inode))
1790 return fuse_dax_write_iter(iocb, from);
1791
57e1176e
AG
1792 /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
1793 if (ff->open_flags & FOPEN_DIRECT_IO)
55752a3a 1794 return fuse_direct_write_iter(iocb, from);
57e1176e
AG
1795 else if (fuse_file_passthrough(ff))
1796 return fuse_passthrough_write_iter(iocb, from);
1797 else
55752a3a 1798 return fuse_cache_write_iter(iocb, from);
55752a3a
MS
1799}
1800
5ca73468
AG
1801static ssize_t fuse_splice_read(struct file *in, loff_t *ppos,
1802 struct pipe_inode_info *pipe, size_t len,
1803 unsigned int flags)
1804{
1805 struct fuse_file *ff = in->private_data;
1806
1807 /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
1808 if (fuse_file_passthrough(ff) && !(ff->open_flags & FOPEN_DIRECT_IO))
1809 return fuse_passthrough_splice_read(in, ppos, pipe, len, flags);
55752a3a 1810 else
5ca73468
AG
1811 return filemap_splice_read(in, ppos, pipe, len, flags);
1812}
1813
1814static ssize_t fuse_splice_write(struct pipe_inode_info *pipe, struct file *out,
1815 loff_t *ppos, size_t len, unsigned int flags)
1816{
1817 struct fuse_file *ff = out->private_data;
1818
1819 /* FOPEN_DIRECT_IO overrides FOPEN_PASSTHROUGH */
1820 if (fuse_file_passthrough(ff) && !(ff->open_flags & FOPEN_DIRECT_IO))
1821 return fuse_passthrough_splice_write(pipe, out, ppos, len, flags);
1822 else
1823 return iter_file_splice_write(pipe, out, ppos, len, flags);
55752a3a
MS
1824}
1825
33826ebb 1826static void fuse_writepage_free(struct fuse_writepage_args *wpa)
b6aeaded 1827{
33826ebb 1828 struct fuse_args_pages *ap = &wpa->ia.ap;
385b1268
PE
1829 int i;
1830
660585b5
MS
1831 if (wpa->bucket)
1832 fuse_sync_bucket_dec(wpa->bucket);
1833
cbe9c115
JK
1834 for (i = 0; i < ap->num_folios; i++)
1835 folio_put(ap->folios[i]);
33826ebb 1836
4046d3ad 1837 fuse_file_put(wpa->ia.ff, false);
8b284dc4 1838
cbe9c115 1839 kfree(ap->folios);
33826ebb 1840 kfree(wpa);
3be5a52b
MS
1841}
1842
949d67ac 1843static void fuse_writepage_finish_stat(struct inode *inode, struct folio *folio)
c04e3b21
JK
1844{
1845 struct backing_dev_info *bdi = inode_to_bdi(inode);
1846
1847 dec_wb_stat(&bdi->wb, WB_WRITEBACK);
949d67ac 1848 node_stat_sub_folio(folio, NR_WRITEBACK_TEMP);
c04e3b21
JK
1849 wb_writeout_inc(&bdi->wb);
1850}
1851
509a6458 1852static void fuse_writepage_finish(struct fuse_writepage_args *wpa)
3be5a52b 1853{
33826ebb
MS
1854 struct fuse_args_pages *ap = &wpa->ia.ap;
1855 struct inode *inode = wpa->inode;
3be5a52b 1856 struct fuse_inode *fi = get_fuse_inode(inode);
385b1268 1857 int i;
3be5a52b 1858
cbe9c115
JK
1859 for (i = 0; i < ap->num_folios; i++)
1860 fuse_writepage_finish_stat(inode, ap->folios[i]);
c04e3b21 1861
3be5a52b
MS
1862 wake_up(&fi->page_waitq);
1863}
1864
f15ecfef 1865/* Called under fi->lock, may release and reacquire it */
fcee216b 1866static void fuse_send_writepage(struct fuse_mount *fm,
33826ebb 1867 struct fuse_writepage_args *wpa, loff_t size)
f15ecfef
KT
1868__releases(fi->lock)
1869__acquires(fi->lock)
3be5a52b 1870{
33826ebb
MS
1871 struct fuse_writepage_args *aux, *next;
1872 struct fuse_inode *fi = get_fuse_inode(wpa->inode);
1873 struct fuse_write_in *inarg = &wpa->ia.write.in;
1874 struct fuse_args *args = &wpa->ia.ap.args;
cbe9c115
JK
1875 /* Currently, all folios in FUSE are one page */
1876 __u64 data_size = wpa->ia.ap.num_folios * PAGE_SIZE;
33826ebb 1877 int err;
3be5a52b 1878
33826ebb 1879 fi->writectr++;
385b1268
PE
1880 if (inarg->offset + data_size <= size) {
1881 inarg->size = data_size;
3be5a52b 1882 } else if (inarg->offset < size) {
385b1268 1883 inarg->size = size - inarg->offset;
3be5a52b
MS
1884 } else {
1885 /* Got truncated off completely */
1886 goto out_free;
b6aeaded 1887 }
3be5a52b 1888
33826ebb
MS
1889 args->in_args[1].size = inarg->size;
1890 args->force = true;
1891 args->nocreds = true;
1892
fcee216b 1893 err = fuse_simple_background(fm, args, GFP_ATOMIC);
33826ebb
MS
1894 if (err == -ENOMEM) {
1895 spin_unlock(&fi->lock);
fcee216b 1896 err = fuse_simple_background(fm, args, GFP_NOFS | __GFP_NOFAIL);
33826ebb
MS
1897 spin_lock(&fi->lock);
1898 }
1899
f15ecfef 1900 /* Fails on broken connection only */
33826ebb 1901 if (unlikely(err))
f15ecfef
KT
1902 goto out_free;
1903
3be5a52b
MS
1904 return;
1905
1906 out_free:
33826ebb 1907 fi->writectr--;
69a6487a 1908 rb_erase(&wpa->writepages_entry, &fi->writepages);
509a6458 1909 fuse_writepage_finish(wpa);
f15ecfef 1910 spin_unlock(&fi->lock);
e2653bd5 1911
f7790d67 1912 /* After rb_erase() aux request list is private */
33826ebb
MS
1913 for (aux = wpa->next; aux; aux = next) {
1914 next = aux->next;
1915 aux->next = NULL;
949d67ac 1916 fuse_writepage_finish_stat(aux->inode,
cbe9c115 1917 aux->ia.ap.folios[0]);
33826ebb 1918 fuse_writepage_free(aux);
e2653bd5
MS
1919 }
1920
33826ebb 1921 fuse_writepage_free(wpa);
f15ecfef 1922 spin_lock(&fi->lock);
b6aeaded
MS
1923}
1924
3be5a52b
MS
1925/*
1926 * If fi->writectr is positive (no truncate or fsync going on) send
1927 * all queued writepage requests.
1928 *
f15ecfef 1929 * Called with fi->lock
3be5a52b
MS
1930 */
1931void fuse_flush_writepages(struct inode *inode)
f15ecfef
KT
1932__releases(fi->lock)
1933__acquires(fi->lock)
b6aeaded 1934{
fcee216b 1935 struct fuse_mount *fm = get_fuse_mount(inode);
3be5a52b 1936 struct fuse_inode *fi = get_fuse_inode(inode);
9de5be06 1937 loff_t crop = i_size_read(inode);
33826ebb 1938 struct fuse_writepage_args *wpa;
3be5a52b
MS
1939
1940 while (fi->writectr >= 0 && !list_empty(&fi->queued_writes)) {
33826ebb
MS
1941 wpa = list_entry(fi->queued_writes.next,
1942 struct fuse_writepage_args, queue_entry);
1943 list_del_init(&wpa->queue_entry);
fcee216b 1944 fuse_send_writepage(fm, wpa, crop);
3be5a52b
MS
1945 }
1946}
1947
c146024e
MS
1948static struct fuse_writepage_args *fuse_insert_writeback(struct rb_root *root,
1949 struct fuse_writepage_args *wpa)
6b2fb799
MP
1950{
1951 pgoff_t idx_from = wpa->ia.write.in.offset >> PAGE_SHIFT;
cbe9c115 1952 pgoff_t idx_to = idx_from + wpa->ia.ap.num_folios - 1;
6b2fb799
MP
1953 struct rb_node **p = &root->rb_node;
1954 struct rb_node *parent = NULL;
1955
cbe9c115 1956 WARN_ON(!wpa->ia.ap.num_folios);
6b2fb799
MP
1957 while (*p) {
1958 struct fuse_writepage_args *curr;
1959 pgoff_t curr_index;
1960
1961 parent = *p;
1962 curr = rb_entry(parent, struct fuse_writepage_args,
1963 writepages_entry);
1964 WARN_ON(curr->inode != wpa->inode);
1965 curr_index = curr->ia.write.in.offset >> PAGE_SHIFT;
1966
cbe9c115 1967 if (idx_from >= curr_index + curr->ia.ap.num_folios)
6b2fb799
MP
1968 p = &(*p)->rb_right;
1969 else if (idx_to < curr_index)
1970 p = &(*p)->rb_left;
1971 else
c146024e 1972 return curr;
6b2fb799
MP
1973 }
1974
1975 rb_link_node(&wpa->writepages_entry, parent, p);
1976 rb_insert_color(&wpa->writepages_entry, root);
c146024e
MS
1977 return NULL;
1978}
1979
1980static void tree_insert(struct rb_root *root, struct fuse_writepage_args *wpa)
1981{
1982 WARN_ON(fuse_insert_writeback(root, wpa));
6b2fb799
MP
1983}
1984
fcee216b 1985static void fuse_writepage_end(struct fuse_mount *fm, struct fuse_args *args,
33826ebb 1986 int error)
3be5a52b 1987{
33826ebb
MS
1988 struct fuse_writepage_args *wpa =
1989 container_of(args, typeof(*wpa), ia.ap.args);
1990 struct inode *inode = wpa->inode;
3be5a52b 1991 struct fuse_inode *fi = get_fuse_inode(inode);
3466958b 1992 struct fuse_conn *fc = get_fuse_conn(inode);
3be5a52b 1993
33826ebb 1994 mapping_set_error(inode->i_mapping, error);
3466958b
VG
1995 /*
1996 * A writeback finished and this might have updated mtime/ctime on
1997 * server making local mtime/ctime stale. Hence invalidate attrs.
1998 * Do this only if writeback_cache is not enabled. If writeback_cache
1999 * is enabled, we trust local ctime/mtime.
2000 */
2001 if (!fc->writeback_cache)
fa5eee57 2002 fuse_invalidate_attr_mask(inode, FUSE_STATX_MODIFY);
f15ecfef 2003 spin_lock(&fi->lock);
69a6487a 2004 rb_erase(&wpa->writepages_entry, &fi->writepages);
33826ebb 2005 while (wpa->next) {
fcee216b 2006 struct fuse_mount *fm = get_fuse_mount(inode);
33826ebb
MS
2007 struct fuse_write_in *inarg = &wpa->ia.write.in;
2008 struct fuse_writepage_args *next = wpa->next;
2009
2010 wpa->next = next->next;
2011 next->next = NULL;
6b2fb799 2012 tree_insert(&fi->writepages, next);
6eaf4782
MP
2013
2014 /*
2015 * Skip fuse_flush_writepages() to make it easy to crop requests
2016 * based on primary request size.
2017 *
2018 * 1st case (trivial): there are no concurrent activities using
2019 * fuse_set/release_nowrite. Then we're on safe side because
2020 * fuse_flush_writepages() would call fuse_send_writepage()
2021 * anyway.
2022 *
2023 * 2nd case: someone called fuse_set_nowrite and it is waiting
2024 * now for completion of all in-flight requests. This happens
2025 * rarely and no more than once per page, so this should be
2026 * okay.
2027 *
2028 * 3rd case: someone (e.g. fuse_do_setattr()) is in the middle
2029 * of fuse_set_nowrite..fuse_release_nowrite section. The fact
2030 * that fuse_set_nowrite returned implies that all in-flight
2031 * requests were completed along with all of their secondary
2032 * requests. Further primary requests are blocked by negative
2033 * writectr. Hence there cannot be any in-flight requests and
2034 * no invocations of fuse_writepage_end() while we're in
2035 * fuse_set_nowrite..fuse_release_nowrite section.
2036 */
fcee216b 2037 fuse_send_writepage(fm, next, inarg->offset + inarg->size);
8b284dc4 2038 }
3be5a52b 2039 fi->writectr--;
509a6458 2040 fuse_writepage_finish(wpa);
f15ecfef 2041 spin_unlock(&fi->lock);
33826ebb 2042 fuse_writepage_free(wpa);
3be5a52b
MS
2043}
2044
a9667ac8 2045static struct fuse_file *__fuse_write_file_get(struct fuse_inode *fi)
adcadfa8 2046{
84840efc 2047 struct fuse_file *ff;
adcadfa8 2048
f15ecfef 2049 spin_lock(&fi->lock);
84840efc
MS
2050 ff = list_first_entry_or_null(&fi->write_files, struct fuse_file,
2051 write_entry);
2052 if (ff)
72523425 2053 fuse_file_get(ff);
f15ecfef 2054 spin_unlock(&fi->lock);
adcadfa8
PE
2055
2056 return ff;
2057}
2058
a9667ac8 2059static struct fuse_file *fuse_write_file_get(struct fuse_inode *fi)
1e18bda8 2060{
a9667ac8 2061 struct fuse_file *ff = __fuse_write_file_get(fi);
1e18bda8
MS
2062 WARN_ON(!ff);
2063 return ff;
2064}
2065
2066int fuse_write_inode(struct inode *inode, struct writeback_control *wbc)
2067{
1e18bda8
MS
2068 struct fuse_inode *fi = get_fuse_inode(inode);
2069 struct fuse_file *ff;
2070 int err;
2071
5c791fe1
MS
2072 /*
2073 * Inode is always written before the last reference is dropped and
2074 * hence this should not be reached from reclaim.
2075 *
2076 * Writing back the inode from reclaim can deadlock if the request
2077 * processing itself needs an allocation. Allocations triggering
2078 * reclaim while serving a request can't be prevented, because it can
2079 * involve any number of unrelated userspace processes.
2080 */
2081 WARN_ON(wbc->for_reclaim);
2082
a9667ac8 2083 ff = __fuse_write_file_get(fi);
ab9e13f7 2084 err = fuse_flush_times(inode, ff);
1e18bda8 2085 if (ff)
e26ee4ef 2086 fuse_file_put(ff, false);
1e18bda8
MS
2087
2088 return err;
2089}
2090
33826ebb
MS
2091static struct fuse_writepage_args *fuse_writepage_args_alloc(void)
2092{
2093 struct fuse_writepage_args *wpa;
2094 struct fuse_args_pages *ap;
2095
2096 wpa = kzalloc(sizeof(*wpa), GFP_NOFS);
2097 if (wpa) {
2098 ap = &wpa->ia.ap;
cbe9c115 2099 ap->num_folios = 0;
68bfb7eb 2100 ap->folios = fuse_folios_alloc(1, GFP_NOFS, &ap->descs);
cbe9c115 2101 if (!ap->folios) {
33826ebb
MS
2102 kfree(wpa);
2103 wpa = NULL;
2104 }
2105 }
2106 return wpa;
2107
2108}
2109
660585b5
MS
2110static void fuse_writepage_add_to_bucket(struct fuse_conn *fc,
2111 struct fuse_writepage_args *wpa)
2112{
2113 if (!fc->sync_fs)
2114 return;
2115
2116 rcu_read_lock();
2117 /* Prevent resurrection of dead bucket in unlikely race with syncfs */
2118 do {
2119 wpa->bucket = rcu_dereference(fc->curr_bucket);
2120 } while (unlikely(!atomic_inc_not_zero(&wpa->bucket->count)));
2121 rcu_read_unlock();
2122}
2123
0acad928 2124static void fuse_writepage_args_page_fill(struct fuse_writepage_args *wpa, struct folio *folio,
cbe9c115 2125 struct folio *tmp_folio, uint32_t folio_index)
0acad928
JK
2126{
2127 struct inode *inode = folio->mapping->host;
2128 struct fuse_args_pages *ap = &wpa->ia.ap;
2129
2130 folio_copy(tmp_folio, folio);
2131
cbe9c115 2132 ap->folios[folio_index] = tmp_folio;
68bfb7eb
JK
2133 ap->descs[folio_index].offset = 0;
2134 ap->descs[folio_index].length = PAGE_SIZE;
0acad928
JK
2135
2136 inc_wb_stat(&inode_to_bdi(inode)->wb, WB_WRITEBACK);
949d67ac 2137 node_stat_add_folio(tmp_folio, NR_WRITEBACK_TEMP);
0acad928
JK
2138}
2139
2140static struct fuse_writepage_args *fuse_writepage_args_setup(struct folio *folio,
2141 struct fuse_file *ff)
2142{
2143 struct inode *inode = folio->mapping->host;
2144 struct fuse_conn *fc = get_fuse_conn(inode);
2145 struct fuse_writepage_args *wpa;
2146 struct fuse_args_pages *ap;
2147
2148 wpa = fuse_writepage_args_alloc();
2149 if (!wpa)
2150 return NULL;
2151
2152 fuse_writepage_add_to_bucket(fc, wpa);
2153 fuse_write_args_fill(&wpa->ia, ff, folio_pos(folio), 0);
2154 wpa->ia.write.in.write_flags |= FUSE_WRITE_CACHE;
2155 wpa->inode = inode;
2156 wpa->ia.ff = ff;
2157
2158 ap = &wpa->ia.ap;
2159 ap->args.in_pages = true;
2160 ap->args.end = fuse_writepage_end;
2161
2162 return wpa;
2163}
2164
e0887e09 2165static int fuse_writepage_locked(struct folio *folio)
3be5a52b 2166{
e0887e09 2167 struct address_space *mapping = folio->mapping;
3be5a52b 2168 struct inode *inode = mapping->host;
3be5a52b 2169 struct fuse_inode *fi = get_fuse_inode(inode);
33826ebb
MS
2170 struct fuse_writepage_args *wpa;
2171 struct fuse_args_pages *ap;
e0887e09 2172 struct folio *tmp_folio;
0acad928 2173 struct fuse_file *ff;
72523425 2174 int error = -ENOMEM;
3be5a52b 2175
e0887e09
MWO
2176 tmp_folio = folio_alloc(GFP_NOFS | __GFP_HIGHMEM, 0);
2177 if (!tmp_folio)
0acad928 2178 goto err;
3be5a52b 2179
72523425 2180 error = -EIO;
0acad928
JK
2181 ff = fuse_write_file_get(fi);
2182 if (!ff)
27f1b363 2183 goto err_nofile;
72523425 2184
0acad928
JK
2185 wpa = fuse_writepage_args_setup(folio, ff);
2186 error = -ENOMEM;
2187 if (!wpa)
2188 goto err_writepage_args;
3be5a52b 2189
0acad928 2190 ap = &wpa->ia.ap;
cbe9c115 2191 ap->num_folios = 1;
3be5a52b 2192
0acad928
JK
2193 folio_start_writeback(folio);
2194 fuse_writepage_args_page_fill(wpa, folio, tmp_folio, 0);
3be5a52b 2195
f15ecfef 2196 spin_lock(&fi->lock);
6b2fb799 2197 tree_insert(&fi->writepages, wpa);
33826ebb 2198 list_add_tail(&wpa->queue_entry, &fi->queued_writes);
3be5a52b 2199 fuse_flush_writepages(inode);
f15ecfef 2200 spin_unlock(&fi->lock);
3be5a52b 2201
e0887e09 2202 folio_end_writeback(folio);
4a4ac4eb 2203
3be5a52b
MS
2204 return 0;
2205
0acad928
JK
2206err_writepage_args:
2207 fuse_file_put(ff, false);
27f1b363 2208err_nofile:
e0887e09 2209 folio_put(tmp_folio);
3be5a52b 2210err:
e0887e09 2211 mapping_set_error(folio->mapping, error);
72523425 2212 return error;
3be5a52b
MS
2213}
2214
26d614df 2215struct fuse_fill_wb_data {
33826ebb 2216 struct fuse_writepage_args *wpa;
26d614df
PE
2217 struct fuse_file *ff;
2218 struct inode *inode;
cbe9c115
JK
2219 struct folio **orig_folios;
2220 unsigned int max_folios;
26d614df
PE
2221};
2222
33826ebb
MS
2223static bool fuse_pages_realloc(struct fuse_fill_wb_data *data)
2224{
2225 struct fuse_args_pages *ap = &data->wpa->ia.ap;
2226 struct fuse_conn *fc = get_fuse_conn(data->inode);
cbe9c115
JK
2227 struct folio **folios;
2228 struct fuse_folio_desc *descs;
2229 unsigned int nfolios = min_t(unsigned int,
2230 max_t(unsigned int, data->max_folios * 2,
2231 FUSE_DEFAULT_MAX_PAGES_PER_REQ),
33826ebb 2232 fc->max_pages);
cbe9c115 2233 WARN_ON(nfolios <= data->max_folios);
33826ebb 2234
cbe9c115
JK
2235 folios = fuse_folios_alloc(nfolios, GFP_NOFS, &descs);
2236 if (!folios)
33826ebb
MS
2237 return false;
2238
cbe9c115 2239 memcpy(folios, ap->folios, sizeof(struct folio *) * ap->num_folios);
68bfb7eb 2240 memcpy(descs, ap->descs, sizeof(struct fuse_folio_desc) * ap->num_folios);
cbe9c115
JK
2241 kfree(ap->folios);
2242 ap->folios = folios;
68bfb7eb 2243 ap->descs = descs;
cbe9c115 2244 data->max_folios = nfolios;
33826ebb
MS
2245
2246 return true;
2247}
2248
26d614df
PE
2249static void fuse_writepages_send(struct fuse_fill_wb_data *data)
2250{
33826ebb 2251 struct fuse_writepage_args *wpa = data->wpa;
26d614df 2252 struct inode *inode = data->inode;
26d614df 2253 struct fuse_inode *fi = get_fuse_inode(inode);
cbe9c115 2254 int num_folios = wpa->ia.ap.num_folios;
2d033eaa 2255 int i;
26d614df 2256
f15ecfef 2257 spin_lock(&fi->lock);
33826ebb 2258 list_add_tail(&wpa->queue_entry, &fi->queued_writes);
26d614df 2259 fuse_flush_writepages(inode);
f15ecfef 2260 spin_unlock(&fi->lock);
2d033eaa 2261
cbe9c115
JK
2262 for (i = 0; i < num_folios; i++)
2263 folio_end_writeback(data->orig_folios[i]);
26d614df
PE
2264}
2265
7f305ca1 2266/*
c146024e
MS
2267 * Check under fi->lock if the page is under writeback, and insert it onto the
2268 * rb_tree if not. Otherwise iterate auxiliary write requests, to see if there's
419234d5
MS
2269 * one already added for a page at this offset. If there's none, then insert
2270 * this new request onto the auxiliary list, otherwise reuse the existing one by
c146024e 2271 * swapping the new temp page with the old one.
7f305ca1 2272 */
c146024e 2273static bool fuse_writepage_add(struct fuse_writepage_args *new_wpa,
cbe9c115 2274 struct folio *folio)
8b284dc4 2275{
33826ebb
MS
2276 struct fuse_inode *fi = get_fuse_inode(new_wpa->inode);
2277 struct fuse_writepage_args *tmp;
2278 struct fuse_writepage_args *old_wpa;
2279 struct fuse_args_pages *new_ap = &new_wpa->ia.ap;
8b284dc4 2280
cbe9c115
JK
2281 WARN_ON(new_ap->num_folios != 0);
2282 new_ap->num_folios = 1;
8b284dc4 2283
f15ecfef 2284 spin_lock(&fi->lock);
c146024e 2285 old_wpa = fuse_insert_writeback(&fi->writepages, new_wpa);
33826ebb 2286 if (!old_wpa) {
f15ecfef 2287 spin_unlock(&fi->lock);
c146024e 2288 return true;
f6011081 2289 }
8b284dc4 2290
33826ebb 2291 for (tmp = old_wpa->next; tmp; tmp = tmp->next) {
7f305ca1
MS
2292 pgoff_t curr_index;
2293
33826ebb
MS
2294 WARN_ON(tmp->inode != new_wpa->inode);
2295 curr_index = tmp->ia.write.in.offset >> PAGE_SHIFT;
cbe9c115
JK
2296 if (curr_index == folio->index) {
2297 WARN_ON(tmp->ia.ap.num_folios != 1);
2298 swap(tmp->ia.ap.folios[0], new_ap->folios[0]);
7f305ca1 2299 break;
8b284dc4
MS
2300 }
2301 }
2302
7f305ca1 2303 if (!tmp) {
33826ebb
MS
2304 new_wpa->next = old_wpa->next;
2305 old_wpa->next = new_wpa;
7f305ca1 2306 }
41b6e41f 2307
f15ecfef 2308 spin_unlock(&fi->lock);
7f305ca1
MS
2309
2310 if (tmp) {
949d67ac 2311 fuse_writepage_finish_stat(new_wpa->inode,
cbe9c115 2312 folio);
33826ebb 2313 fuse_writepage_free(new_wpa);
8b284dc4 2314 }
7f305ca1 2315
c146024e 2316 return false;
8b284dc4
MS
2317}
2318
6930b8da 2319static bool fuse_writepage_need_send(struct fuse_conn *fc, struct folio *folio,
6ddf3af9
MS
2320 struct fuse_args_pages *ap,
2321 struct fuse_fill_wb_data *data)
2322{
cbe9c115 2323 WARN_ON(!ap->num_folios);
6ddf3af9
MS
2324
2325 /*
2326 * Being under writeback is unlikely but possible. For example direct
2327 * read to an mmaped fuse file will set the page dirty twice; once when
2328 * the pages are faulted with get_user_pages(), and then after the read
2329 * completed.
2330 */
6930b8da 2331 if (fuse_folio_is_writeback(data->inode, folio))
6ddf3af9
MS
2332 return true;
2333
2334 /* Reached max pages */
cbe9c115 2335 if (ap->num_folios == fc->max_pages)
6ddf3af9
MS
2336 return true;
2337
2338 /* Reached max write bytes */
cbe9c115 2339 if ((ap->num_folios + 1) * PAGE_SIZE > fc->max_write)
6ddf3af9
MS
2340 return true;
2341
2342 /* Discontinuity */
cbe9c115 2343 if (data->orig_folios[ap->num_folios - 1]->index + 1 != folio_index(folio))
6ddf3af9
MS
2344 return true;
2345
2346 /* Need to grow the pages array? If so, did the expansion fail? */
cbe9c115 2347 if (ap->num_folios == data->max_folios && !fuse_pages_realloc(data))
6ddf3af9
MS
2348 return true;
2349
2350 return false;
2351}
2352
d585bdbe 2353static int fuse_writepages_fill(struct folio *folio,
26d614df
PE
2354 struct writeback_control *wbc, void *_data)
2355{
2356 struct fuse_fill_wb_data *data = _data;
33826ebb
MS
2357 struct fuse_writepage_args *wpa = data->wpa;
2358 struct fuse_args_pages *ap = &wpa->ia.ap;
26d614df 2359 struct inode *inode = data->inode;
f15ecfef 2360 struct fuse_inode *fi = get_fuse_inode(inode);
26d614df 2361 struct fuse_conn *fc = get_fuse_conn(inode);
9a8ebcf5 2362 struct folio *tmp_folio;
26d614df
PE
2363 int err;
2364
184429a1
MS
2365 if (!data->ff) {
2366 err = -EIO;
2367 data->ff = fuse_write_file_get(fi);
2368 if (!data->ff)
2369 goto out_unlock;
2370 }
2371
6930b8da 2372 if (wpa && fuse_writepage_need_send(fc, folio, ap, data)) {
8b284dc4 2373 fuse_writepages_send(data);
33826ebb 2374 data->wpa = NULL;
26d614df 2375 }
e52a8250 2376
26d614df 2377 err = -ENOMEM;
9a8ebcf5
JK
2378 tmp_folio = folio_alloc(GFP_NOFS | __GFP_HIGHMEM, 0);
2379 if (!tmp_folio)
26d614df
PE
2380 goto out_unlock;
2381
2382 /*
2383 * The page must not be redirtied until the writeout is completed
2384 * (i.e. userspace has sent a reply to the write request). Otherwise
2385 * there could be more than one temporary page instance for each real
2386 * page.
2387 *
2388 * This is ensured by holding the page lock in page_mkwrite() while
2389 * checking fuse_page_is_writeback(). We already hold the page lock
2390 * since clear_page_dirty_for_io() and keep it held until we add the
cbe9c115 2391 * request to the fi->writepages list and increment ap->num_folios.
26d614df
PE
2392 * After this fuse_page_is_writeback() will indicate that the page is
2393 * under writeback, so we can release the page lock.
2394 */
33826ebb 2395 if (data->wpa == NULL) {
26d614df 2396 err = -ENOMEM;
0acad928 2397 wpa = fuse_writepage_args_setup(folio, data->ff);
33826ebb 2398 if (!wpa) {
9a8ebcf5 2399 folio_put(tmp_folio);
26d614df
PE
2400 goto out_unlock;
2401 }
0acad928 2402 fuse_file_get(wpa->ia.ff);
cbe9c115 2403 data->max_folios = 1;
33826ebb 2404 ap = &wpa->ia.ap;
26d614df 2405 }
d585bdbe 2406 folio_start_writeback(folio);
26d614df 2407
cbe9c115
JK
2408 fuse_writepage_args_page_fill(wpa, folio, tmp_folio, ap->num_folios);
2409 data->orig_folios[ap->num_folios] = folio;
26d614df 2410
8b284dc4 2411 err = 0;
c146024e
MS
2412 if (data->wpa) {
2413 /*
2414 * Protected by fi->lock against concurrent access by
2415 * fuse_page_is_writeback().
2416 */
2417 spin_lock(&fi->lock);
cbe9c115 2418 ap->num_folios++;
c146024e 2419 spin_unlock(&fi->lock);
cbe9c115 2420 } else if (fuse_writepage_add(wpa, folio)) {
c146024e
MS
2421 data->wpa = wpa;
2422 } else {
d585bdbe 2423 folio_end_writeback(folio);
8b284dc4 2424 }
26d614df 2425out_unlock:
d585bdbe 2426 folio_unlock(folio);
26d614df
PE
2427
2428 return err;
2429}
2430
2431static int fuse_writepages(struct address_space *mapping,
2432 struct writeback_control *wbc)
2433{
2434 struct inode *inode = mapping->host;
5da784cc 2435 struct fuse_conn *fc = get_fuse_conn(inode);
26d614df
PE
2436 struct fuse_fill_wb_data data;
2437 int err;
2438
184429a1 2439 err = -EIO;
5d069dbe 2440 if (fuse_is_bad(inode))
184429a1 2441 goto out;
26d614df 2442
670d21c6
N
2443 if (wbc->sync_mode == WB_SYNC_NONE &&
2444 fc->num_background >= fc->congestion_threshold)
2445 return 0;
2446
26d614df 2447 data.inode = inode;
33826ebb 2448 data.wpa = NULL;
184429a1 2449 data.ff = NULL;
26d614df 2450
2d033eaa 2451 err = -ENOMEM;
cbe9c115
JK
2452 data.orig_folios = kcalloc(fc->max_pages,
2453 sizeof(struct folio *),
2454 GFP_NOFS);
2455 if (!data.orig_folios)
2d033eaa
MP
2456 goto out;
2457
26d614df 2458 err = write_cache_pages(mapping, wbc, fuse_writepages_fill, &data);
33826ebb 2459 if (data.wpa) {
cbe9c115 2460 WARN_ON(!data.wpa->ia.ap.num_folios);
26d614df 2461 fuse_writepages_send(&data);
26d614df 2462 }
184429a1
MS
2463 if (data.ff)
2464 fuse_file_put(data.ff, false);
2d033eaa 2465
cbe9c115 2466 kfree(data.orig_folios);
26d614df
PE
2467out:
2468 return err;
2469}
2470
6b12c1b3
PE
2471/*
2472 * It's worthy to make sure that space is reserved on disk for the write,
2473 * but how to implement it without killing performance need more thinking.
2474 */
2475static int fuse_write_begin(struct file *file, struct address_space *mapping,
1da86618 2476 loff_t pos, unsigned len, struct folio **foliop, void **fsdata)
6b12c1b3 2477{
09cbfeaf 2478 pgoff_t index = pos >> PAGE_SHIFT;
a455589f 2479 struct fuse_conn *fc = get_fuse_conn(file_inode(file));
a060d835 2480 struct folio *folio;
6b12c1b3
PE
2481 loff_t fsize;
2482 int err = -ENOMEM;
2483
2484 WARN_ON(!fc->writeback_cache);
2485
a060d835
MWO
2486 folio = __filemap_get_folio(mapping, index, FGP_WRITEBEGIN,
2487 mapping_gfp_mask(mapping));
2488 if (IS_ERR(folio))
6b12c1b3
PE
2489 goto error;
2490
a060d835 2491 fuse_wait_on_page_writeback(mapping->host, folio->index);
6b12c1b3 2492
a060d835 2493 if (folio_test_uptodate(folio) || len >= folio_size(folio))
6b12c1b3
PE
2494 goto success;
2495 /*
a060d835
MWO
2496 * Check if the start of this folio comes after the end of file,
2497 * in which case the readpage can be optimized away.
6b12c1b3
PE
2498 */
2499 fsize = i_size_read(mapping->host);
a060d835
MWO
2500 if (fsize <= folio_pos(folio)) {
2501 size_t off = offset_in_folio(folio, pos);
6b12c1b3 2502 if (off)
a060d835 2503 folio_zero_segment(folio, 0, off);
6b12c1b3
PE
2504 goto success;
2505 }
65fe891d 2506 err = fuse_do_readfolio(file, folio);
6b12c1b3
PE
2507 if (err)
2508 goto cleanup;
2509success:
1da86618 2510 *foliop = folio;
6b12c1b3
PE
2511 return 0;
2512
2513cleanup:
a060d835
MWO
2514 folio_unlock(folio);
2515 folio_put(folio);
6b12c1b3
PE
2516error:
2517 return err;
2518}
2519
2520static int fuse_write_end(struct file *file, struct address_space *mapping,
2521 loff_t pos, unsigned len, unsigned copied,
a225800f 2522 struct folio *folio, void *fsdata)
6b12c1b3 2523{
556d0ac0 2524 struct inode *inode = folio->mapping->host;
6b12c1b3 2525
59c3b76c
MS
2526 /* Haven't copied anything? Skip zeroing, size extending, dirtying. */
2527 if (!copied)
2528 goto unlock;
2529
8c56e03d 2530 pos += copied;
556d0ac0 2531 if (!folio_test_uptodate(folio)) {
6b12c1b3 2532 /* Zero any unwritten bytes at the end of the page */
8c56e03d 2533 size_t endoff = pos & ~PAGE_MASK;
6b12c1b3 2534 if (endoff)
556d0ac0
MWO
2535 folio_zero_segment(folio, endoff, PAGE_SIZE);
2536 folio_mark_uptodate(folio);
6b12c1b3
PE
2537 }
2538
8c56e03d
MS
2539 if (pos > inode->i_size)
2540 i_size_write(inode, pos);
2541
556d0ac0 2542 folio_mark_dirty(folio);
59c3b76c
MS
2543
2544unlock:
556d0ac0
MWO
2545 folio_unlock(folio);
2546 folio_put(folio);
6b12c1b3
PE
2547
2548 return copied;
2549}
2550
2bf06b8e 2551static int fuse_launder_folio(struct folio *folio)
3be5a52b
MS
2552{
2553 int err = 0;
2bf06b8e
MWO
2554 if (folio_clear_dirty_for_io(folio)) {
2555 struct inode *inode = folio->mapping->host;
3993382b
MS
2556
2557 /* Serialize with pending writeback for the same page */
2bf06b8e 2558 fuse_wait_on_page_writeback(inode, folio->index);
e0887e09 2559 err = fuse_writepage_locked(folio);
3be5a52b 2560 if (!err)
2bf06b8e 2561 fuse_wait_on_page_writeback(inode, folio->index);
3be5a52b
MS
2562 }
2563 return err;
2564}
2565
2566/*
36ea2337
MS
2567 * Write back dirty data/metadata now (there may not be any suitable
2568 * open files later for data)
3be5a52b
MS
2569 */
2570static void fuse_vma_close(struct vm_area_struct *vma)
2571{
36ea2337
MS
2572 int err;
2573
2574 err = write_inode_now(vma->vm_file->f_mapping->host, 1);
2575 mapping_set_error(vma->vm_file->f_mapping, err);
3be5a52b
MS
2576}
2577
2578/*
2579 * Wait for writeback against this page to complete before allowing it
2580 * to be marked dirty again, and hence written back again, possibly
2581 * before the previous writepage completed.
2582 *
2583 * Block here, instead of in ->writepage(), so that the userspace fs
2584 * can only block processes actually operating on the filesystem.
2585 *
2586 * Otherwise unprivileged userspace fs would be able to block
2587 * unrelated:
2588 *
2589 * - page migration
2590 * - sync(2)
2591 * - try_to_free_pages() with order > PAGE_ALLOC_COSTLY_ORDER
2592 */
46fb504a 2593static vm_fault_t fuse_page_mkwrite(struct vm_fault *vmf)
3be5a52b 2594{
184b6eb3 2595 struct folio *folio = page_folio(vmf->page);
11bac800 2596 struct inode *inode = file_inode(vmf->vma->vm_file);
cca24370 2597
11bac800 2598 file_update_time(vmf->vma->vm_file);
184b6eb3
JB
2599 folio_lock(folio);
2600 if (folio->mapping != inode->i_mapping) {
2601 folio_unlock(folio);
cca24370
MS
2602 return VM_FAULT_NOPAGE;
2603 }
3be5a52b 2604
184b6eb3 2605 fuse_wait_on_folio_writeback(inode, folio);
cca24370 2606 return VM_FAULT_LOCKED;
3be5a52b
MS
2607}
2608
f0f37e2f 2609static const struct vm_operations_struct fuse_file_vm_ops = {
3be5a52b
MS
2610 .close = fuse_vma_close,
2611 .fault = filemap_fault,
f1820361 2612 .map_pages = filemap_map_pages,
3be5a52b
MS
2613 .page_mkwrite = fuse_page_mkwrite,
2614};
2615
2616static int fuse_file_mmap(struct file *file, struct vm_area_struct *vma)
2617{
55752a3a 2618 struct fuse_file *ff = file->private_data;
e78662e8 2619 struct fuse_conn *fc = ff->fm->fc;
fda0b98e 2620 struct inode *inode = file_inode(file);
cb098dd2 2621 int rc;
55752a3a 2622
2a9a609a 2623 /* DAX mmap is superior to direct_io mmap */
fda0b98e 2624 if (FUSE_IS_DAX(inode))
2a9a609a
SH
2625 return fuse_dax_mmap(file, vma);
2626
fda0b98e
AG
2627 /*
2628 * If inode is in passthrough io mode, because it has some file open
2629 * in passthrough mode, either mmap to backing file or fail mmap,
2630 * because mixing cached mmap and passthrough io mode is not allowed.
2631 */
4a90451b 2632 if (fuse_file_passthrough(ff))
fda0b98e
AG
2633 return fuse_passthrough_mmap(file, vma);
2634 else if (fuse_inode_backing(get_fuse_inode(inode)))
4a90451b
AG
2635 return -ENODEV;
2636
205c1d80
AG
2637 /*
2638 * FOPEN_DIRECT_IO handling is special compared to O_DIRECT,
2639 * as does not allow MAP_SHARED mmap without FUSE_DIRECT_IO_ALLOW_MMAP.
2640 */
55752a3a 2641 if (ff->open_flags & FOPEN_DIRECT_IO) {
9511176b
BS
2642 /*
2643 * Can't provide the coherency needed for MAP_SHARED
c55e0a55 2644 * if FUSE_DIRECT_IO_ALLOW_MMAP isn't set.
e78662e8 2645 */
c55e0a55 2646 if ((vma->vm_flags & VM_MAYSHARE) && !fc->direct_io_allow_mmap)
55752a3a
MS
2647 return -ENODEV;
2648
2649 invalidate_inode_pages2(file->f_mapping);
2650
9511176b
BS
2651 if (!(vma->vm_flags & VM_MAYSHARE)) {
2652 /* MAP_PRIVATE */
2653 return generic_file_mmap(file, vma);
2654 }
cb098dd2 2655
205c1d80
AG
2656 /*
2657 * First mmap of direct_io file enters caching inode io mode.
2658 * Also waits for parallel dio writers to go into serial mode
2659 * (exclusive instead of shared lock).
4864a6dd
AG
2660 * After first mmap, the inode stays in caching io mode until
2661 * the direct_io file release.
205c1d80 2662 */
4864a6dd 2663 rc = fuse_file_cached_io_open(inode, ff);
cb098dd2
AG
2664 if (rc)
2665 return rc;
55752a3a
MS
2666 }
2667
650b22b9
PE
2668 if ((vma->vm_flags & VM_SHARED) && (vma->vm_flags & VM_MAYWRITE))
2669 fuse_link_write_file(file);
2670
3be5a52b
MS
2671 file_accessed(file);
2672 vma->vm_ops = &fuse_file_vm_ops;
b6aeaded
MS
2673 return 0;
2674}
2675
0b6e9ea0
SF
2676static int convert_fuse_file_lock(struct fuse_conn *fc,
2677 const struct fuse_file_lock *ffl,
71421259
MS
2678 struct file_lock *fl)
2679{
2680 switch (ffl->type) {
2681 case F_UNLCK:
2682 break;
2683
2684 case F_RDLCK:
2685 case F_WRLCK:
2686 if (ffl->start > OFFSET_MAX || ffl->end > OFFSET_MAX ||
2687 ffl->end < ffl->start)
2688 return -EIO;
2689
2690 fl->fl_start = ffl->start;
2691 fl->fl_end = ffl->end;
0b6e9ea0
SF
2692
2693 /*
9d5b86ac
BC
2694 * Convert pid into init's pid namespace. The locks API will
2695 * translate it into the caller's pid namespace.
0b6e9ea0
SF
2696 */
2697 rcu_read_lock();
9a7eec48 2698 fl->c.flc_pid = pid_nr_ns(find_pid_ns(ffl->pid, fc->pid_ns), &init_pid_ns);
0b6e9ea0 2699 rcu_read_unlock();
71421259
MS
2700 break;
2701
2702 default:
2703 return -EIO;
2704 }
9a7eec48 2705 fl->c.flc_type = ffl->type;
71421259
MS
2706 return 0;
2707}
2708
7078187a 2709static void fuse_lk_fill(struct fuse_args *args, struct file *file,
a9ff4f87 2710 const struct file_lock *fl, int opcode, pid_t pid,
7078187a 2711 int flock, struct fuse_lk_in *inarg)
71421259 2712{
6131ffaa 2713 struct inode *inode = file_inode(file);
9c8ef561 2714 struct fuse_conn *fc = get_fuse_conn(inode);
71421259 2715 struct fuse_file *ff = file->private_data;
7078187a
MS
2716
2717 memset(inarg, 0, sizeof(*inarg));
2718 inarg->fh = ff->fh;
9a7eec48 2719 inarg->owner = fuse_lock_owner_id(fc, fl->c.flc_owner);
7078187a
MS
2720 inarg->lk.start = fl->fl_start;
2721 inarg->lk.end = fl->fl_end;
9a7eec48 2722 inarg->lk.type = fl->c.flc_type;
7078187a 2723 inarg->lk.pid = pid;
a9ff4f87 2724 if (flock)
7078187a 2725 inarg->lk_flags |= FUSE_LK_FLOCK;
d5b48543
MS
2726 args->opcode = opcode;
2727 args->nodeid = get_node_id(inode);
2728 args->in_numargs = 1;
2729 args->in_args[0].size = sizeof(*inarg);
2730 args->in_args[0].value = inarg;
71421259
MS
2731}
2732
2733static int fuse_getlk(struct file *file, struct file_lock *fl)
2734{
6131ffaa 2735 struct inode *inode = file_inode(file);
fcee216b 2736 struct fuse_mount *fm = get_fuse_mount(inode);
7078187a
MS
2737 FUSE_ARGS(args);
2738 struct fuse_lk_in inarg;
71421259
MS
2739 struct fuse_lk_out outarg;
2740 int err;
2741
7078187a 2742 fuse_lk_fill(&args, file, fl, FUSE_GETLK, 0, 0, &inarg);
d5b48543
MS
2743 args.out_numargs = 1;
2744 args.out_args[0].size = sizeof(outarg);
2745 args.out_args[0].value = &outarg;
fcee216b 2746 err = fuse_simple_request(fm, &args);
71421259 2747 if (!err)
fcee216b 2748 err = convert_fuse_file_lock(fm->fc, &outarg.lk, fl);
71421259
MS
2749
2750 return err;
2751}
2752
a9ff4f87 2753static int fuse_setlk(struct file *file, struct file_lock *fl, int flock)
71421259 2754{
6131ffaa 2755 struct inode *inode = file_inode(file);
fcee216b 2756 struct fuse_mount *fm = get_fuse_mount(inode);
7078187a
MS
2757 FUSE_ARGS(args);
2758 struct fuse_lk_in inarg;
9a7eec48
JL
2759 int opcode = (fl->c.flc_flags & FL_SLEEP) ? FUSE_SETLKW : FUSE_SETLK;
2760 struct pid *pid = fl->c.flc_type != F_UNLCK ? task_tgid(current) : NULL;
fcee216b 2761 pid_t pid_nr = pid_nr_ns(pid, fm->fc->pid_ns);
71421259
MS
2762 int err;
2763
8fb47a4f 2764 if (fl->fl_lmops && fl->fl_lmops->lm_grant) {
48e90761
MS
2765 /* NLM needs asynchronous locks, which we don't support yet */
2766 return -ENOLCK;
2767 }
2768
0b6e9ea0 2769 fuse_lk_fill(&args, file, fl, opcode, pid_nr, flock, &inarg);
fcee216b 2770 err = fuse_simple_request(fm, &args);
71421259 2771
a4d27e75
MS
2772 /* locking is restartable */
2773 if (err == -EINTR)
2774 err = -ERESTARTSYS;
7078187a 2775
71421259
MS
2776 return err;
2777}
2778
2779static int fuse_file_lock(struct file *file, int cmd, struct file_lock *fl)
2780{
6131ffaa 2781 struct inode *inode = file_inode(file);
71421259
MS
2782 struct fuse_conn *fc = get_fuse_conn(inode);
2783 int err;
2784
48e90761
MS
2785 if (cmd == F_CANCELLK) {
2786 err = 0;
2787 } else if (cmd == F_GETLK) {
71421259 2788 if (fc->no_lock) {
9d6a8c5c 2789 posix_test_lock(file, fl);
71421259
MS
2790 err = 0;
2791 } else
2792 err = fuse_getlk(file, fl);
2793 } else {
2794 if (fc->no_lock)
48e90761 2795 err = posix_lock_file(file, fl, NULL);
71421259 2796 else
a9ff4f87 2797 err = fuse_setlk(file, fl, 0);
71421259
MS
2798 }
2799 return err;
2800}
2801
a9ff4f87
MS
2802static int fuse_file_flock(struct file *file, int cmd, struct file_lock *fl)
2803{
6131ffaa 2804 struct inode *inode = file_inode(file);
a9ff4f87
MS
2805 struct fuse_conn *fc = get_fuse_conn(inode);
2806 int err;
2807
37fb3a30 2808 if (fc->no_flock) {
4f656367 2809 err = locks_lock_file_wait(file, fl);
a9ff4f87 2810 } else {
37fb3a30
MS
2811 struct fuse_file *ff = file->private_data;
2812
a9ff4f87 2813 /* emulate flock with POSIX locks */
37fb3a30 2814 ff->flock = true;
a9ff4f87
MS
2815 err = fuse_setlk(file, fl, 1);
2816 }
2817
2818 return err;
2819}
2820
b2d2272f
MS
2821static sector_t fuse_bmap(struct address_space *mapping, sector_t block)
2822{
2823 struct inode *inode = mapping->host;
fcee216b 2824 struct fuse_mount *fm = get_fuse_mount(inode);
7078187a 2825 FUSE_ARGS(args);
b2d2272f
MS
2826 struct fuse_bmap_in inarg;
2827 struct fuse_bmap_out outarg;
2828 int err;
2829
fcee216b 2830 if (!inode->i_sb->s_bdev || fm->fc->no_bmap)
b2d2272f
MS
2831 return 0;
2832
b2d2272f
MS
2833 memset(&inarg, 0, sizeof(inarg));
2834 inarg.block = block;
2835 inarg.blocksize = inode->i_sb->s_blocksize;
d5b48543
MS
2836 args.opcode = FUSE_BMAP;
2837 args.nodeid = get_node_id(inode);
2838 args.in_numargs = 1;
2839 args.in_args[0].size = sizeof(inarg);
2840 args.in_args[0].value = &inarg;
2841 args.out_numargs = 1;
2842 args.out_args[0].size = sizeof(outarg);
2843 args.out_args[0].value = &outarg;
fcee216b 2844 err = fuse_simple_request(fm, &args);
b2d2272f 2845 if (err == -ENOSYS)
fcee216b 2846 fm->fc->no_bmap = 1;
b2d2272f
MS
2847
2848 return err ? 0 : outarg.block;
2849}
2850
0b5da8db
R
2851static loff_t fuse_lseek(struct file *file, loff_t offset, int whence)
2852{
2853 struct inode *inode = file->f_mapping->host;
fcee216b 2854 struct fuse_mount *fm = get_fuse_mount(inode);
0b5da8db
R
2855 struct fuse_file *ff = file->private_data;
2856 FUSE_ARGS(args);
2857 struct fuse_lseek_in inarg = {
2858 .fh = ff->fh,
2859 .offset = offset,
2860 .whence = whence
2861 };
2862 struct fuse_lseek_out outarg;
2863 int err;
2864
fcee216b 2865 if (fm->fc->no_lseek)
0b5da8db
R
2866 goto fallback;
2867
d5b48543
MS
2868 args.opcode = FUSE_LSEEK;
2869 args.nodeid = ff->nodeid;
2870 args.in_numargs = 1;
2871 args.in_args[0].size = sizeof(inarg);
2872 args.in_args[0].value = &inarg;
2873 args.out_numargs = 1;
2874 args.out_args[0].size = sizeof(outarg);
2875 args.out_args[0].value = &outarg;
fcee216b 2876 err = fuse_simple_request(fm, &args);
0b5da8db
R
2877 if (err) {
2878 if (err == -ENOSYS) {
fcee216b 2879 fm->fc->no_lseek = 1;
0b5da8db
R
2880 goto fallback;
2881 }
2882 return err;
2883 }
2884
2885 return vfs_setpos(file, outarg.offset, inode->i_sb->s_maxbytes);
2886
2887fallback:
c6c745b8 2888 err = fuse_update_attributes(inode, file, STATX_SIZE);
0b5da8db
R
2889 if (!err)
2890 return generic_file_llseek(file, offset, whence);
2891 else
2892 return err;
2893}
2894
965c8e59 2895static loff_t fuse_file_llseek(struct file *file, loff_t offset, int whence)
5559b8f4
MS
2896{
2897 loff_t retval;
6131ffaa 2898 struct inode *inode = file_inode(file);
5559b8f4 2899
0b5da8db
R
2900 switch (whence) {
2901 case SEEK_SET:
2902 case SEEK_CUR:
2903 /* No i_mutex protection necessary for SEEK_CUR and SEEK_SET */
965c8e59 2904 retval = generic_file_llseek(file, offset, whence);
0b5da8db
R
2905 break;
2906 case SEEK_END:
5955102c 2907 inode_lock(inode);
c6c745b8 2908 retval = fuse_update_attributes(inode, file, STATX_SIZE);
0b5da8db
R
2909 if (!retval)
2910 retval = generic_file_llseek(file, offset, whence);
5955102c 2911 inode_unlock(inode);
0b5da8db
R
2912 break;
2913 case SEEK_HOLE:
2914 case SEEK_DATA:
5955102c 2915 inode_lock(inode);
0b5da8db 2916 retval = fuse_lseek(file, offset, whence);
5955102c 2917 inode_unlock(inode);
0b5da8db
R
2918 break;
2919 default:
2920 retval = -EINVAL;
2921 }
c07c3d19 2922
5559b8f4
MS
2923 return retval;
2924}
2925
95668a69
TH
2926/*
2927 * All files which have been polled are linked to RB tree
2928 * fuse_conn->polled_files which is indexed by kh. Walk the tree and
2929 * find the matching one.
2930 */
2931static struct rb_node **fuse_find_polled_node(struct fuse_conn *fc, u64 kh,
2932 struct rb_node **parent_out)
2933{
2934 struct rb_node **link = &fc->polled_files.rb_node;
2935 struct rb_node *last = NULL;
2936
2937 while (*link) {
2938 struct fuse_file *ff;
2939
2940 last = *link;
2941 ff = rb_entry(last, struct fuse_file, polled_node);
2942
2943 if (kh < ff->kh)
2944 link = &last->rb_left;
2945 else if (kh > ff->kh)
2946 link = &last->rb_right;
2947 else
2948 return link;
2949 }
2950
2951 if (parent_out)
2952 *parent_out = last;
2953 return link;
2954}
2955
2956/*
2957 * The file is about to be polled. Make sure it's on the polled_files
2958 * RB tree. Note that files once added to the polled_files tree are
2959 * not removed before the file is released. This is because a file
2960 * polled once is likely to be polled again.
2961 */
2962static void fuse_register_polled_file(struct fuse_conn *fc,
2963 struct fuse_file *ff)
2964{
2965 spin_lock(&fc->lock);
2966 if (RB_EMPTY_NODE(&ff->polled_node)) {
3f649ab7 2967 struct rb_node **link, *parent;
95668a69
TH
2968
2969 link = fuse_find_polled_node(fc, ff->kh, &parent);
2970 BUG_ON(*link);
2971 rb_link_node(&ff->polled_node, parent, link);
2972 rb_insert_color(&ff->polled_node, &fc->polled_files);
2973 }
2974 spin_unlock(&fc->lock);
2975}
2976
076ccb76 2977__poll_t fuse_file_poll(struct file *file, poll_table *wait)
95668a69 2978{
95668a69 2979 struct fuse_file *ff = file->private_data;
fcee216b 2980 struct fuse_mount *fm = ff->fm;
95668a69
TH
2981 struct fuse_poll_in inarg = { .fh = ff->fh, .kh = ff->kh };
2982 struct fuse_poll_out outarg;
7078187a 2983 FUSE_ARGS(args);
95668a69
TH
2984 int err;
2985
fcee216b 2986 if (fm->fc->no_poll)
95668a69
TH
2987 return DEFAULT_POLLMASK;
2988
2989 poll_wait(file, &ff->poll_wait, wait);
c71d227f 2990 inarg.events = mangle_poll(poll_requested_events(wait));
95668a69
TH
2991
2992 /*
2993 * Ask for notification iff there's someone waiting for it.
2994 * The client may ignore the flag and always notify.
2995 */
2996 if (waitqueue_active(&ff->poll_wait)) {
2997 inarg.flags |= FUSE_POLL_SCHEDULE_NOTIFY;
fcee216b 2998 fuse_register_polled_file(fm->fc, ff);
95668a69
TH
2999 }
3000
d5b48543
MS
3001 args.opcode = FUSE_POLL;
3002 args.nodeid = ff->nodeid;
3003 args.in_numargs = 1;
3004 args.in_args[0].size = sizeof(inarg);
3005 args.in_args[0].value = &inarg;
3006 args.out_numargs = 1;
3007 args.out_args[0].size = sizeof(outarg);
3008 args.out_args[0].value = &outarg;
fcee216b 3009 err = fuse_simple_request(fm, &args);
95668a69
TH
3010
3011 if (!err)
c71d227f 3012 return demangle_poll(outarg.revents);
95668a69 3013 if (err == -ENOSYS) {
fcee216b 3014 fm->fc->no_poll = 1;
95668a69
TH
3015 return DEFAULT_POLLMASK;
3016 }
a9a08845 3017 return EPOLLERR;
95668a69 3018}
08cbf542 3019EXPORT_SYMBOL_GPL(fuse_file_poll);
95668a69
TH
3020
3021/*
3022 * This is called from fuse_handle_notify() on FUSE_NOTIFY_POLL and
3023 * wakes up the poll waiters.
3024 */
3025int fuse_notify_poll_wakeup(struct fuse_conn *fc,
3026 struct fuse_notify_poll_wakeup_out *outarg)
3027{
3028 u64 kh = outarg->kh;
3029 struct rb_node **link;
3030
3031 spin_lock(&fc->lock);
3032
3033 link = fuse_find_polled_node(fc, kh, NULL);
3034 if (*link) {
3035 struct fuse_file *ff;
3036
3037 ff = rb_entry(*link, struct fuse_file, polled_node);
3038 wake_up_interruptible_sync(&ff->poll_wait);
3039 }
3040
3041 spin_unlock(&fc->lock);
3042 return 0;
3043}
3044
efb9fa9e
MP
3045static void fuse_do_truncate(struct file *file)
3046{
3047 struct inode *inode = file->f_mapping->host;
3048 struct iattr attr;
3049
3050 attr.ia_valid = ATTR_SIZE;
3051 attr.ia_size = i_size_read(inode);
3052
3053 attr.ia_file = file;
3054 attr.ia_valid |= ATTR_FILE;
3055
276a0256 3056 fuse_do_setattr(file_mnt_idmap(file), file_dentry(file), &attr, file);
efb9fa9e
MP
3057}
3058
5da784cc 3059static inline loff_t fuse_round_up(struct fuse_conn *fc, loff_t off)
e5c5f05d 3060{
5da784cc 3061 return round_up(off, fc->max_pages << PAGE_SHIFT);
e5c5f05d
MP
3062}
3063
4273b793 3064static ssize_t
c8b8e32d 3065fuse_direct_IO(struct kiocb *iocb, struct iov_iter *iter)
4273b793 3066{
9d5722b7 3067 DECLARE_COMPLETION_ONSTACK(wait);
4273b793 3068 ssize_t ret = 0;
60b9df7a
MS
3069 struct file *file = iocb->ki_filp;
3070 struct fuse_file *ff = file->private_data;
4273b793 3071 loff_t pos = 0;
bcba24cc
MP
3072 struct inode *inode;
3073 loff_t i_size;
933a3752 3074 size_t count = iov_iter_count(iter), shortened = 0;
c8b8e32d 3075 loff_t offset = iocb->ki_pos;
36cf66ed 3076 struct fuse_io_priv *io;
4273b793 3077
4273b793 3078 pos = offset;
bcba24cc
MP
3079 inode = file->f_mapping->host;
3080 i_size = i_size_read(inode);
4273b793 3081
933a3752 3082 if ((iov_iter_rw(iter) == READ) && (offset >= i_size))
9fe55eea
SW
3083 return 0;
3084
bcba24cc 3085 io = kmalloc(sizeof(struct fuse_io_priv), GFP_KERNEL);
36cf66ed
MP
3086 if (!io)
3087 return -ENOMEM;
bcba24cc 3088 spin_lock_init(&io->lock);
744742d6 3089 kref_init(&io->refcnt);
bcba24cc
MP
3090 io->reqs = 1;
3091 io->bytes = -1;
3092 io->size = 0;
3093 io->offset = offset;
6f673763 3094 io->write = (iov_iter_rw(iter) == WRITE);
bcba24cc 3095 io->err = 0;
bcba24cc
MP
3096 /*
3097 * By default, we want to optimize all I/Os with async request
60b9df7a 3098 * submission to the client filesystem if supported.
bcba24cc 3099 */
69456535 3100 io->async = ff->fm->fc->async_dio;
bcba24cc 3101 io->iocb = iocb;
7879c4e5 3102 io->blocking = is_sync_kiocb(iocb);
bcba24cc 3103
933a3752
AV
3104 /* optimization for short read */
3105 if (io->async && !io->write && offset + count > i_size) {
69456535 3106 iov_iter_truncate(iter, fuse_round_up(ff->fm->fc, i_size - offset));
933a3752
AV
3107 shortened = count - iov_iter_count(iter);
3108 count -= shortened;
3109 }
3110
bcba24cc 3111 /*
7879c4e5
AS
3112 * We cannot asynchronously extend the size of a file.
3113 * In such case the aio will behave exactly like sync io.
bcba24cc 3114 */
933a3752 3115 if ((offset + count > i_size) && io->write)
7879c4e5 3116 io->blocking = true;
4273b793 3117
7879c4e5 3118 if (io->async && io->blocking) {
744742d6
SF
3119 /*
3120 * Additional reference to keep io around after
3121 * calling fuse_aio_complete()
3122 */
3123 kref_get(&io->refcnt);
9d5722b7 3124 io->done = &wait;
744742d6 3125 }
9d5722b7 3126
6f673763 3127 if (iov_iter_rw(iter) == WRITE) {
6b775b18 3128 ret = fuse_direct_io(io, iter, &pos, FUSE_DIO_WRITE);
fa5eee57 3129 fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
812408fb 3130 } else {
d22a943f 3131 ret = __fuse_direct_read(io, iter, &pos);
812408fb 3132 }
933a3752 3133 iov_iter_reexpand(iter, iov_iter_count(iter) + shortened);
36cf66ed 3134
bcba24cc 3135 if (io->async) {
ebacb812
LC
3136 bool blocking = io->blocking;
3137
bcba24cc
MP
3138 fuse_aio_complete(io, ret < 0 ? ret : 0, -1);
3139
3140 /* we have a non-extending, async request, so return */
ebacb812 3141 if (!blocking)
bcba24cc
MP
3142 return -EIOCBQUEUED;
3143
9d5722b7
CH
3144 wait_for_completion(&wait);
3145 ret = fuse_get_res_by_io(io);
bcba24cc
MP
3146 }
3147
744742d6 3148 kref_put(&io->refcnt, fuse_io_release);
9d5722b7 3149
6f673763 3150 if (iov_iter_rw(iter) == WRITE) {
d347739a 3151 fuse_write_update_attr(inode, pos, ret);
15352405 3152 /* For extending writes we already hold exclusive lock */
d347739a 3153 if (ret < 0 && offset + count > i_size)
efb9fa9e
MP
3154 fuse_do_truncate(file);
3155 }
4273b793
AA
3156
3157 return ret;
3158}
3159
26eb3bae
MS
3160static int fuse_writeback_range(struct inode *inode, loff_t start, loff_t end)
3161{
e388164e 3162 int err = filemap_write_and_wait_range(inode->i_mapping, start, LLONG_MAX);
26eb3bae
MS
3163
3164 if (!err)
3165 fuse_sync_writes(inode);
3166
3167 return err;
3168}
3169
cdadb11c
MS
3170static long fuse_file_fallocate(struct file *file, int mode, loff_t offset,
3171 loff_t length)
05ba1f08
AP
3172{
3173 struct fuse_file *ff = file->private_data;
1c68271c 3174 struct inode *inode = file_inode(file);
0ab08f57 3175 struct fuse_inode *fi = get_fuse_inode(inode);
fcee216b 3176 struct fuse_mount *fm = ff->fm;
7078187a 3177 FUSE_ARGS(args);
05ba1f08
AP
3178 struct fuse_fallocate_in inarg = {
3179 .fh = ff->fh,
3180 .offset = offset,
3181 .length = length,
3182 .mode = mode
3183 };
3184 int err;
44361e8c
MS
3185 bool block_faults = FUSE_IS_DAX(inode) &&
3186 (!(mode & FALLOC_FL_KEEP_SIZE) ||
3187 (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE)));
6ae330ca 3188
6b1bdb56
RJ
3189 if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE |
3190 FALLOC_FL_ZERO_RANGE))
4adb8302
MS
3191 return -EOPNOTSUPP;
3192
fcee216b 3193 if (fm->fc->no_fallocate)
519c6040
MS
3194 return -EOPNOTSUPP;
3195
44361e8c
MS
3196 inode_lock(inode);
3197 if (block_faults) {
3198 filemap_invalidate_lock(inode->i_mapping);
3199 err = fuse_dax_break_layouts(inode, 0, 0);
3200 if (err)
3201 goto out;
3202 }
6ae330ca 3203
44361e8c
MS
3204 if (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE)) {
3205 loff_t endbyte = offset + length - 1;
26eb3bae 3206
44361e8c
MS
3207 err = fuse_writeback_range(inode, offset, endbyte);
3208 if (err)
3209 goto out;
3634a632
BF
3210 }
3211
0cbade02
LB
3212 if (!(mode & FALLOC_FL_KEEP_SIZE) &&
3213 offset + length > i_size_read(inode)) {
3214 err = inode_newsize_ok(inode, offset + length);
3215 if (err)
35d6fcbb 3216 goto out;
0cbade02
LB
3217 }
3218
4a6f278d
MS
3219 err = file_modified(file);
3220 if (err)
3221 goto out;
3222
0ab08f57
MP
3223 if (!(mode & FALLOC_FL_KEEP_SIZE))
3224 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3225
d5b48543
MS
3226 args.opcode = FUSE_FALLOCATE;
3227 args.nodeid = ff->nodeid;
3228 args.in_numargs = 1;
3229 args.in_args[0].size = sizeof(inarg);
3230 args.in_args[0].value = &inarg;
fcee216b 3231 err = fuse_simple_request(fm, &args);
519c6040 3232 if (err == -ENOSYS) {
fcee216b 3233 fm->fc->no_fallocate = 1;
519c6040
MS
3234 err = -EOPNOTSUPP;
3235 }
bee6c307
BF
3236 if (err)
3237 goto out;
3238
3239 /* we could have extended the file */
b0aa7606 3240 if (!(mode & FALLOC_FL_KEEP_SIZE)) {
20235b43 3241 if (fuse_write_update_attr(inode, offset + length, length))
93d2269d 3242 file_update_time(file);
b0aa7606 3243 }
bee6c307 3244
6b1bdb56 3245 if (mode & (FALLOC_FL_PUNCH_HOLE | FALLOC_FL_ZERO_RANGE))
bee6c307
BF
3246 truncate_pagecache_range(inode, offset, offset + length - 1);
3247
fa5eee57 3248 fuse_invalidate_attr_mask(inode, FUSE_STATX_MODSIZE);
bee6c307 3249
3634a632 3250out:
0ab08f57
MP
3251 if (!(mode & FALLOC_FL_KEEP_SIZE))
3252 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3253
6ae330ca 3254 if (block_faults)
8bcbbe9c 3255 filemap_invalidate_unlock(inode->i_mapping);
6ae330ca 3256
44361e8c 3257 inode_unlock(inode);
3634a632 3258
5c791fe1
MS
3259 fuse_flush_time_update(inode);
3260
05ba1f08
AP
3261 return err;
3262}
05ba1f08 3263
64bf5ff5
DC
3264static ssize_t __fuse_copy_file_range(struct file *file_in, loff_t pos_in,
3265 struct file *file_out, loff_t pos_out,
3266 size_t len, unsigned int flags)
88bc7d50
NV
3267{
3268 struct fuse_file *ff_in = file_in->private_data;
3269 struct fuse_file *ff_out = file_out->private_data;
a2bc9236 3270 struct inode *inode_in = file_inode(file_in);
88bc7d50
NV
3271 struct inode *inode_out = file_inode(file_out);
3272 struct fuse_inode *fi_out = get_fuse_inode(inode_out);
fcee216b
MR
3273 struct fuse_mount *fm = ff_in->fm;
3274 struct fuse_conn *fc = fm->fc;
88bc7d50
NV
3275 FUSE_ARGS(args);
3276 struct fuse_copy_file_range_in inarg = {
3277 .fh_in = ff_in->fh,
3278 .off_in = pos_in,
3279 .nodeid_out = ff_out->nodeid,
3280 .fh_out = ff_out->fh,
3281 .off_out = pos_out,
3282 .len = len,
3283 .flags = flags
3284 };
3285 struct fuse_write_out outarg;
3286 ssize_t err;
3287 /* mark unstable when write-back is not used, and file_out gets
3288 * extended */
3289 bool is_unstable = (!fc->writeback_cache) &&
3290 ((pos_out + len) > inode_out->i_size);
3291
3292 if (fc->no_copy_file_range)
3293 return -EOPNOTSUPP;
3294
5dae222a
AG
3295 if (file_inode(file_in)->i_sb != file_inode(file_out)->i_sb)
3296 return -EXDEV;
3297
2c4656df
MS
3298 inode_lock(inode_in);
3299 err = fuse_writeback_range(inode_in, pos_in, pos_in + len - 1);
3300 inode_unlock(inode_in);
3301 if (err)
3302 return err;
a2bc9236 3303
88bc7d50
NV
3304 inode_lock(inode_out);
3305
fe0da9c0
AG
3306 err = file_modified(file_out);
3307 if (err)
3308 goto out;
3309
9b46418c
MS
3310 /*
3311 * Write out dirty pages in the destination file before sending the COPY
3312 * request to userspace. After the request is completed, truncate off
3313 * pages (including partial ones) from the cache that have been copied,
3314 * since these contain stale data at that point.
3315 *
3316 * This should be mostly correct, but if the COPY writes to partial
3317 * pages (at the start or end) and the parts not covered by the COPY are
3318 * written through a memory map after calling fuse_writeback_range(),
3319 * then these partial page modifications will be lost on truncation.
3320 *
3321 * It is unlikely that someone would rely on such mixed style
3322 * modifications. Yet this does give less guarantees than if the
3323 * copying was performed with write(2).
3324 *
8bcbbe9c 3325 * To fix this a mapping->invalidate_lock could be used to prevent new
9b46418c
MS
3326 * faults while the copy is ongoing.
3327 */
2c4656df
MS
3328 err = fuse_writeback_range(inode_out, pos_out, pos_out + len - 1);
3329 if (err)
3330 goto out;
88bc7d50
NV
3331
3332 if (is_unstable)
3333 set_bit(FUSE_I_SIZE_UNSTABLE, &fi_out->state);
3334
d5b48543
MS
3335 args.opcode = FUSE_COPY_FILE_RANGE;
3336 args.nodeid = ff_in->nodeid;
3337 args.in_numargs = 1;
3338 args.in_args[0].size = sizeof(inarg);
3339 args.in_args[0].value = &inarg;
3340 args.out_numargs = 1;
3341 args.out_args[0].size = sizeof(outarg);
3342 args.out_args[0].value = &outarg;
fcee216b 3343 err = fuse_simple_request(fm, &args);
88bc7d50
NV
3344 if (err == -ENOSYS) {
3345 fc->no_copy_file_range = 1;
3346 err = -EOPNOTSUPP;
3347 }
3348 if (err)
3349 goto out;
3350
9b46418c
MS
3351 truncate_inode_pages_range(inode_out->i_mapping,
3352 ALIGN_DOWN(pos_out, PAGE_SIZE),
3353 ALIGN(pos_out + outarg.size, PAGE_SIZE) - 1);
3354
20235b43
MS
3355 file_update_time(file_out);
3356 fuse_write_update_attr(inode_out, pos_out + outarg.size, outarg.size);
88bc7d50
NV
3357
3358 err = outarg.size;
3359out:
3360 if (is_unstable)
3361 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi_out->state);
3362
3363 inode_unlock(inode_out);
fe0da9c0 3364 file_accessed(file_in);
88bc7d50 3365
5c791fe1
MS
3366 fuse_flush_time_update(inode_out);
3367
88bc7d50
NV
3368 return err;
3369}
3370
64bf5ff5
DC
3371static ssize_t fuse_copy_file_range(struct file *src_file, loff_t src_off,
3372 struct file *dst_file, loff_t dst_off,
3373 size_t len, unsigned int flags)
3374{
3375 ssize_t ret;
3376
3377 ret = __fuse_copy_file_range(src_file, src_off, dst_file, dst_off,
3378 len, flags);
3379
5dae222a 3380 if (ret == -EOPNOTSUPP || ret == -EXDEV)
705bcfcb
AG
3381 ret = splice_copy_file_range(src_file, src_off, dst_file,
3382 dst_off, len);
64bf5ff5
DC
3383 return ret;
3384}
3385
4b6f5d20 3386static const struct file_operations fuse_file_operations = {
5559b8f4 3387 .llseek = fuse_file_llseek,
37c20f16 3388 .read_iter = fuse_file_read_iter,
84c3d55c 3389 .write_iter = fuse_file_write_iter,
b6aeaded
MS
3390 .mmap = fuse_file_mmap,
3391 .open = fuse_open,
3392 .flush = fuse_flush,
3393 .release = fuse_release,
3394 .fsync = fuse_fsync,
71421259 3395 .lock = fuse_file_lock,
2a9a609a 3396 .get_unmapped_area = thp_get_unmapped_area,
a9ff4f87 3397 .flock = fuse_file_flock,
5ca73468
AG
3398 .splice_read = fuse_splice_read,
3399 .splice_write = fuse_splice_write,
59efec7b
TH
3400 .unlocked_ioctl = fuse_file_ioctl,
3401 .compat_ioctl = fuse_file_compat_ioctl,
95668a69 3402 .poll = fuse_file_poll,
05ba1f08 3403 .fallocate = fuse_file_fallocate,
d4136d60 3404 .copy_file_range = fuse_copy_file_range,
413ef8cb
MS
3405};
3406
f5e54d6e 3407static const struct address_space_operations fuse_file_aops = {
5efd00e4 3408 .read_folio = fuse_read_folio,
76a0294e 3409 .readahead = fuse_readahead,
26d614df 3410 .writepages = fuse_writepages,
2bf06b8e 3411 .launder_folio = fuse_launder_folio,
187c82cb 3412 .dirty_folio = filemap_dirty_folio,
e1c420ac 3413 .migrate_folio = filemap_migrate_folio,
b2d2272f 3414 .bmap = fuse_bmap,
4273b793 3415 .direct_IO = fuse_direct_IO,
6b12c1b3
PE
3416 .write_begin = fuse_write_begin,
3417 .write_end = fuse_write_end,
b6aeaded
MS
3418};
3419
93a497b9 3420void fuse_init_file_inode(struct inode *inode, unsigned int flags)
b6aeaded 3421{
ab2257e9
MS
3422 struct fuse_inode *fi = get_fuse_inode(inode);
3423
45323fb7
MS
3424 inode->i_fop = &fuse_file_operations;
3425 inode->i_data.a_ops = &fuse_file_aops;
ab2257e9
MS
3426
3427 INIT_LIST_HEAD(&fi->write_files);
3428 INIT_LIST_HEAD(&fi->queued_writes);
3429 fi->writectr = 0;
cb098dd2 3430 fi->iocachectr = 0;
ab2257e9 3431 init_waitqueue_head(&fi->page_waitq);
205c1d80 3432 init_waitqueue_head(&fi->direct_io_waitq);
6b2fb799 3433 fi->writepages = RB_ROOT;
c2d0ad00
VG
3434
3435 if (IS_ENABLED(CONFIG_FUSE_DAX))
93a497b9 3436 fuse_dax_inode_init(inode, flags);
b6aeaded 3437}
This page took 2.17832 seconds and 4 git commands to generate.