]> Git Repo - linux.git/blame - fs/fuse/dir.c
fuse: don't use ->d_time
[linux.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <[email protected]>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
703c7362 16#include <linux/xattr.h>
60bcc88a 17#include <linux/posix_acl.h>
e5e5558e 18
8d3af7f3 19static bool fuse_use_readdirplus(struct inode *dir, struct dir_context *ctx)
4582a4ab
FS
20{
21 struct fuse_conn *fc = get_fuse_conn(dir);
22 struct fuse_inode *fi = get_fuse_inode(dir);
23
24 if (!fc->do_readdirplus)
25 return false;
634734b6
EW
26 if (!fc->readdirplus_auto)
27 return true;
4582a4ab
FS
28 if (test_and_clear_bit(FUSE_I_ADVISE_RDPLUS, &fi->state))
29 return true;
8d3af7f3 30 if (ctx->pos == 0)
4582a4ab
FS
31 return true;
32 return false;
33}
34
35static void fuse_advise_use_readdirplus(struct inode *dir)
36{
37 struct fuse_inode *fi = get_fuse_inode(dir);
38
39 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
40}
41
f75fdf22
MS
42union fuse_dentry {
43 u64 time;
44 struct rcu_head rcu;
45};
46
0a0898cf
MS
47static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
48{
f75fdf22 49 ((union fuse_dentry *) entry->d_fsdata)->time = time;
0a0898cf
MS
50}
51
52static inline u64 fuse_dentry_time(struct dentry *entry)
53{
f75fdf22 54 return ((union fuse_dentry *) entry->d_fsdata)->time;
0a0898cf 55}
0a0898cf 56
6f9f1180
MS
57/*
58 * FUSE caches dentries and attributes with separate timeout. The
59 * time in jiffies until the dentry/attributes are valid is stored in
f75fdf22 60 * dentry->d_fsdata and fuse_inode->i_time respectively.
6f9f1180
MS
61 */
62
63/*
64 * Calculate the time in jiffies until a dentry/attributes are valid
65 */
0a0898cf 66static u64 time_to_jiffies(unsigned long sec, unsigned long nsec)
e5e5558e 67{
685d16dd
MS
68 if (sec || nsec) {
69 struct timespec ts = {sec, nsec};
0a0898cf 70 return get_jiffies_64() + timespec_to_jiffies(&ts);
685d16dd 71 } else
0a0898cf 72 return 0;
e5e5558e
MS
73}
74
6f9f1180
MS
75/*
76 * Set dentry and possibly attribute timeouts from the lookup/mk*
77 * replies
78 */
1fb69e78
MS
79static void fuse_change_entry_timeout(struct dentry *entry,
80 struct fuse_entry_out *o)
0aa7c699 81{
0a0898cf
MS
82 fuse_dentry_settime(entry,
83 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
84}
85
86static u64 attr_timeout(struct fuse_attr_out *o)
87{
88 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
89}
90
91static u64 entry_attr_timeout(struct fuse_entry_out *o)
92{
93 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
94}
95
6f9f1180
MS
96/*
97 * Mark the attributes as stale, so that at the next call to
98 * ->getattr() they will be fetched from userspace
99 */
8cbdf1e6
MS
100void fuse_invalidate_attr(struct inode *inode)
101{
0a0898cf 102 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
103}
104
451418fc
AG
105/**
106 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
107 * atime is not used.
108 */
109void fuse_invalidate_atime(struct inode *inode)
110{
111 if (!IS_RDONLY(inode))
112 fuse_invalidate_attr(inode);
113}
114
6f9f1180
MS
115/*
116 * Just mark the entry as stale, so that a next attempt to look it up
117 * will result in a new lookup call to userspace
118 *
119 * This is called when a dentry is about to become negative and the
120 * timeout is unknown (unlink, rmdir, rename and in some cases
121 * lookup)
122 */
dbd561d2 123void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 124{
0a0898cf 125 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
126}
127
6f9f1180
MS
128/*
129 * Same as fuse_invalidate_entry_cache(), but also try to remove the
130 * dentry from the hash
131 */
8cbdf1e6
MS
132static void fuse_invalidate_entry(struct dentry *entry)
133{
134 d_invalidate(entry);
135 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
136}
137
7078187a 138static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
13983d06 139 u64 nodeid, const struct qstr *name,
e5e5558e
MS
140 struct fuse_entry_out *outarg)
141{
0e9663ee 142 memset(outarg, 0, sizeof(struct fuse_entry_out));
7078187a
MS
143 args->in.h.opcode = FUSE_LOOKUP;
144 args->in.h.nodeid = nodeid;
145 args->in.numargs = 1;
146 args->in.args[0].size = name->len + 1;
147 args->in.args[0].value = name->name;
148 args->out.numargs = 1;
21f62174 149 args->out.args[0].size = sizeof(struct fuse_entry_out);
7078187a 150 args->out.args[0].value = outarg;
e5e5558e
MS
151}
152
5c5c5e51 153u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
154{
155 u64 curr_version;
156
157 /*
158 * The spin lock isn't actually needed on 64bit archs, but we
159 * don't yet care too much about such optimizations.
160 */
161 spin_lock(&fc->lock);
162 curr_version = fc->attr_version;
163 spin_unlock(&fc->lock);
164
165 return curr_version;
166}
167
6f9f1180
MS
168/*
169 * Check whether the dentry is still valid
170 *
171 * If the entry validity timeout has expired and the dentry is
172 * positive, try to redo the lookup. If the lookup results in a
173 * different inode, then let the VFS invalidate the dentry and redo
174 * the lookup once more. If the lookup results in the same inode,
175 * then refresh the attributes, timeouts and mark the dentry valid.
176 */
0b728e19 177static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
e5e5558e 178{
34286d66 179 struct inode *inode;
28420dad
MS
180 struct dentry *parent;
181 struct fuse_conn *fc;
6314efee 182 struct fuse_inode *fi;
e2a6b952 183 int ret;
8cbdf1e6 184
2b0143b5 185 inode = d_inode_rcu(entry);
8cbdf1e6 186 if (inode && is_bad_inode(inode))
e2a6b952 187 goto invalid;
154210cc
AA
188 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
189 (flags & LOOKUP_REVAL)) {
e5e5558e 190 struct fuse_entry_out outarg;
7078187a 191 FUSE_ARGS(args);
07e77dca 192 struct fuse_forget_link *forget;
1fb69e78 193 u64 attr_version;
8cbdf1e6 194
50322fe7 195 /* For negative dentries, always do a fresh lookup */
8cbdf1e6 196 if (!inode)
e2a6b952 197 goto invalid;
8cbdf1e6 198
e2a6b952 199 ret = -ECHILD;
0b728e19 200 if (flags & LOOKUP_RCU)
e2a6b952 201 goto out;
e7c0a167 202
8cbdf1e6 203 fc = get_fuse_conn(inode);
e5e5558e 204
07e77dca 205 forget = fuse_alloc_forget();
7078187a
MS
206 ret = -ENOMEM;
207 if (!forget)
e2a6b952 208 goto out;
2d51013e 209
7dca9fd3 210 attr_version = fuse_get_attr_version(fc);
1fb69e78 211
e956edd0 212 parent = dget_parent(entry);
2b0143b5 213 fuse_lookup_init(fc, &args, get_node_id(d_inode(parent)),
c180eebe 214 &entry->d_name, &outarg);
7078187a 215 ret = fuse_simple_request(fc, &args);
e956edd0 216 dput(parent);
50322fe7 217 /* Zero nodeid is same as -ENOENT */
7078187a
MS
218 if (!ret && !outarg.nodeid)
219 ret = -ENOENT;
220 if (!ret) {
6314efee 221 fi = get_fuse_inode(inode);
9e6268db 222 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 223 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
e2a6b952 224 goto invalid;
9e6268db 225 }
8da5ff23 226 spin_lock(&fc->lock);
1729a16c 227 fi->nlookup++;
8da5ff23 228 spin_unlock(&fc->lock);
9e6268db 229 }
07e77dca 230 kfree(forget);
7078187a
MS
231 if (ret == -ENOMEM)
232 goto out;
233 if (ret || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e2a6b952 234 goto invalid;
e5e5558e 235
60bcc88a 236 forget_all_cached_acls(inode);
1fb69e78
MS
237 fuse_change_attributes(inode, &outarg.attr,
238 entry_attr_timeout(&outarg),
239 attr_version);
240 fuse_change_entry_timeout(entry, &outarg);
28420dad 241 } else if (inode) {
6314efee
MS
242 fi = get_fuse_inode(inode);
243 if (flags & LOOKUP_RCU) {
244 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
245 return -ECHILD;
246 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
28420dad 247 parent = dget_parent(entry);
2b0143b5 248 fuse_advise_use_readdirplus(d_inode(parent));
28420dad
MS
249 dput(parent);
250 }
e5e5558e 251 }
e2a6b952
MS
252 ret = 1;
253out:
254 return ret;
255
256invalid:
257 ret = 0;
258 goto out;
e5e5558e
MS
259}
260
8bfc016d 261static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
262{
263 return !nodeid || nodeid == FUSE_ROOT_ID;
264}
265
f75fdf22
MS
266static int fuse_dentry_init(struct dentry *dentry)
267{
268 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), GFP_KERNEL);
269
270 return dentry->d_fsdata ? 0 : -ENOMEM;
271}
272static void fuse_dentry_release(struct dentry *dentry)
273{
274 union fuse_dentry *fd = dentry->d_fsdata;
275
276 kfree_rcu(fd, rcu);
277}
278
4269590a 279const struct dentry_operations fuse_dentry_operations = {
e5e5558e 280 .d_revalidate = fuse_dentry_revalidate,
f75fdf22
MS
281 .d_init = fuse_dentry_init,
282 .d_release = fuse_dentry_release,
e5e5558e
MS
283};
284
a5bfffac 285int fuse_valid_type(int m)
39ee059a
MS
286{
287 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
288 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
289}
290
13983d06 291int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
c180eebe 292 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 293{
c180eebe 294 struct fuse_conn *fc = get_fuse_conn_super(sb);
7078187a 295 FUSE_ARGS(args);
07e77dca 296 struct fuse_forget_link *forget;
1fb69e78 297 u64 attr_version;
c180eebe 298 int err;
e5e5558e 299
c180eebe
MS
300 *inode = NULL;
301 err = -ENAMETOOLONG;
302 if (name->len > FUSE_NAME_MAX)
303 goto out;
e5e5558e 304
e5e5558e 305
07e77dca
MS
306 forget = fuse_alloc_forget();
307 err = -ENOMEM;
7078187a 308 if (!forget)
c180eebe 309 goto out;
2d51013e 310
7dca9fd3 311 attr_version = fuse_get_attr_version(fc);
1fb69e78 312
7078187a
MS
313 fuse_lookup_init(fc, &args, nodeid, name, outarg);
314 err = fuse_simple_request(fc, &args);
50322fe7 315 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
316 if (err || !outarg->nodeid)
317 goto out_put_forget;
318
319 err = -EIO;
320 if (!outarg->nodeid)
321 goto out_put_forget;
322 if (!fuse_valid_type(outarg->attr.mode))
323 goto out_put_forget;
324
325 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
326 &outarg->attr, entry_attr_timeout(outarg),
327 attr_version);
328 err = -ENOMEM;
329 if (!*inode) {
07e77dca 330 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 331 goto out;
e5e5558e 332 }
c180eebe
MS
333 err = 0;
334
335 out_put_forget:
07e77dca 336 kfree(forget);
c180eebe
MS
337 out:
338 return err;
339}
340
341static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
00cd8dd3 342 unsigned int flags)
c180eebe
MS
343{
344 int err;
345 struct fuse_entry_out outarg;
346 struct inode *inode;
347 struct dentry *newent;
c180eebe
MS
348 bool outarg_valid = true;
349
5c672ab3 350 fuse_lock_inode(dir);
c180eebe
MS
351 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
352 &outarg, &inode);
5c672ab3 353 fuse_unlock_inode(dir);
c180eebe
MS
354 if (err == -ENOENT) {
355 outarg_valid = false;
356 err = 0;
357 }
358 if (err)
359 goto out_err;
360
361 err = -EIO;
362 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
363 goto out_iput;
e5e5558e 364
41d28bca 365 newent = d_splice_alias(inode, entry);
5835f339
MS
366 err = PTR_ERR(newent);
367 if (IS_ERR(newent))
368 goto out_err;
d2a85164 369
0de6256d 370 entry = newent ? newent : entry;
c180eebe 371 if (outarg_valid)
1fb69e78 372 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
373 else
374 fuse_invalidate_entry_cache(entry);
c180eebe 375
4582a4ab 376 fuse_advise_use_readdirplus(dir);
0de6256d 377 return newent;
c180eebe
MS
378
379 out_iput:
380 iput(inode);
381 out_err:
382 return ERR_PTR(err);
e5e5558e
MS
383}
384
6f9f1180
MS
385/*
386 * Atomic create+open operation
387 *
388 * If the filesystem doesn't support this, then fall back to separate
389 * 'mknod' + 'open' requests.
390 */
d9585277 391static int fuse_create_open(struct inode *dir, struct dentry *entry,
30d90494 392 struct file *file, unsigned flags,
d9585277 393 umode_t mode, int *opened)
fd72faac
MS
394{
395 int err;
396 struct inode *inode;
397 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 398 FUSE_ARGS(args);
07e77dca 399 struct fuse_forget_link *forget;
e0a43ddc 400 struct fuse_create_in inarg;
fd72faac
MS
401 struct fuse_open_out outopen;
402 struct fuse_entry_out outentry;
fd72faac 403 struct fuse_file *ff;
fd72faac 404
af109bca
MS
405 /* Userspace expects S_IFREG in create mode */
406 BUG_ON((mode & S_IFMT) != S_IFREG);
407
07e77dca 408 forget = fuse_alloc_forget();
c8ccbe03 409 err = -ENOMEM;
07e77dca 410 if (!forget)
c8ccbe03 411 goto out_err;
51eb01e7 412
ce1d5a49 413 err = -ENOMEM;
acf99433 414 ff = fuse_file_alloc(fc);
fd72faac 415 if (!ff)
7078187a 416 goto out_put_forget_req;
fd72faac 417
e0a43ddc
MS
418 if (!fc->dont_mask)
419 mode &= ~current_umask();
420
fd72faac
MS
421 flags &= ~O_NOCTTY;
422 memset(&inarg, 0, sizeof(inarg));
0e9663ee 423 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
424 inarg.flags = flags;
425 inarg.mode = mode;
e0a43ddc 426 inarg.umask = current_umask();
7078187a
MS
427 args.in.h.opcode = FUSE_CREATE;
428 args.in.h.nodeid = get_node_id(dir);
429 args.in.numargs = 2;
21f62174 430 args.in.args[0].size = sizeof(inarg);
7078187a
MS
431 args.in.args[0].value = &inarg;
432 args.in.args[1].size = entry->d_name.len + 1;
433 args.in.args[1].value = entry->d_name.name;
434 args.out.numargs = 2;
21f62174 435 args.out.args[0].size = sizeof(outentry);
7078187a
MS
436 args.out.args[0].value = &outentry;
437 args.out.args[1].size = sizeof(outopen);
438 args.out.args[1].value = &outopen;
439 err = fuse_simple_request(fc, &args);
c8ccbe03 440 if (err)
fd72faac 441 goto out_free_ff;
fd72faac
MS
442
443 err = -EIO;
2827d0b2 444 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
445 goto out_free_ff;
446
c7b7143c
MS
447 ff->fh = outopen.fh;
448 ff->nodeid = outentry.nodeid;
449 ff->open_flags = outopen.open_flags;
fd72faac 450 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 451 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
452 if (!inode) {
453 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 454 fuse_sync_release(ff, flags);
07e77dca 455 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
456 err = -ENOMEM;
457 goto out_err;
fd72faac 458 }
07e77dca 459 kfree(forget);
fd72faac 460 d_instantiate(entry, inode);
1fb69e78 461 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 462 fuse_invalidate_attr(dir);
30d90494
AV
463 err = finish_open(file, entry, generic_file_open, opened);
464 if (err) {
8b0797a4 465 fuse_sync_release(ff, flags);
c8ccbe03
MS
466 } else {
467 file->private_data = fuse_file_get(ff);
468 fuse_finish_open(inode, file);
fd72faac 469 }
d9585277 470 return err;
fd72faac 471
c8ccbe03 472out_free_ff:
fd72faac 473 fuse_file_free(ff);
c8ccbe03 474out_put_forget_req:
07e77dca 475 kfree(forget);
c8ccbe03 476out_err:
d9585277 477 return err;
c8ccbe03
MS
478}
479
480static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
d9585277 481static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
30d90494 482 struct file *file, unsigned flags,
d9585277 483 umode_t mode, int *opened)
c8ccbe03
MS
484{
485 int err;
486 struct fuse_conn *fc = get_fuse_conn(dir);
c8ccbe03
MS
487 struct dentry *res = NULL;
488
00699ad8 489 if (d_in_lookup(entry)) {
00cd8dd3 490 res = fuse_lookup(dir, entry, 0);
c8ccbe03 491 if (IS_ERR(res))
d9585277 492 return PTR_ERR(res);
c8ccbe03
MS
493
494 if (res)
495 entry = res;
496 }
497
2b0143b5 498 if (!(flags & O_CREAT) || d_really_is_positive(entry))
c8ccbe03
MS
499 goto no_open;
500
501 /* Only creates */
47237687 502 *opened |= FILE_CREATED;
c8ccbe03
MS
503
504 if (fc->no_create)
505 goto mknod;
506
30d90494 507 err = fuse_create_open(dir, entry, file, flags, mode, opened);
d9585277 508 if (err == -ENOSYS) {
c8ccbe03
MS
509 fc->no_create = 1;
510 goto mknod;
511 }
512out_dput:
513 dput(res);
d9585277 514 return err;
c8ccbe03
MS
515
516mknod:
517 err = fuse_mknod(dir, entry, mode, 0);
d9585277 518 if (err)
c8ccbe03 519 goto out_dput;
c8ccbe03 520no_open:
e45198a6 521 return finish_no_open(file, res);
fd72faac
MS
522}
523
6f9f1180
MS
524/*
525 * Code shared between mknod, mkdir, symlink and link
526 */
7078187a 527static int create_new_entry(struct fuse_conn *fc, struct fuse_args *args,
9e6268db 528 struct inode *dir, struct dentry *entry,
541af6a0 529 umode_t mode)
9e6268db
MS
530{
531 struct fuse_entry_out outarg;
532 struct inode *inode;
9e6268db 533 int err;
07e77dca 534 struct fuse_forget_link *forget;
2d51013e 535
07e77dca 536 forget = fuse_alloc_forget();
7078187a 537 if (!forget)
07e77dca 538 return -ENOMEM;
9e6268db 539
0e9663ee 540 memset(&outarg, 0, sizeof(outarg));
7078187a
MS
541 args->in.h.nodeid = get_node_id(dir);
542 args->out.numargs = 1;
21f62174 543 args->out.args[0].size = sizeof(outarg);
7078187a
MS
544 args->out.args[0].value = &outarg;
545 err = fuse_simple_request(fc, args);
2d51013e
MS
546 if (err)
547 goto out_put_forget_req;
548
39ee059a
MS
549 err = -EIO;
550 if (invalid_nodeid(outarg.nodeid))
2d51013e 551 goto out_put_forget_req;
39ee059a
MS
552
553 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 554 goto out_put_forget_req;
39ee059a 555
9e6268db 556 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 557 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 558 if (!inode) {
07e77dca 559 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
560 return -ENOMEM;
561 }
07e77dca 562 kfree(forget);
9e6268db 563
b70a80e7
MS
564 err = d_instantiate_no_diralias(entry, inode);
565 if (err)
566 return err;
9e6268db 567
1fb69e78 568 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
569 fuse_invalidate_attr(dir);
570 return 0;
39ee059a 571
2d51013e 572 out_put_forget_req:
07e77dca 573 kfree(forget);
39ee059a 574 return err;
9e6268db
MS
575}
576
1a67aafb 577static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
578 dev_t rdev)
579{
580 struct fuse_mknod_in inarg;
581 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 582 FUSE_ARGS(args);
9e6268db 583
e0a43ddc
MS
584 if (!fc->dont_mask)
585 mode &= ~current_umask();
586
9e6268db
MS
587 memset(&inarg, 0, sizeof(inarg));
588 inarg.mode = mode;
589 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 590 inarg.umask = current_umask();
7078187a
MS
591 args.in.h.opcode = FUSE_MKNOD;
592 args.in.numargs = 2;
21f62174 593 args.in.args[0].size = sizeof(inarg);
7078187a
MS
594 args.in.args[0].value = &inarg;
595 args.in.args[1].size = entry->d_name.len + 1;
596 args.in.args[1].value = entry->d_name.name;
597 return create_new_entry(fc, &args, dir, entry, mode);
9e6268db
MS
598}
599
4acdaf27 600static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
ebfc3b49 601 bool excl)
9e6268db
MS
602{
603 return fuse_mknod(dir, entry, mode, 0);
604}
605
18bb1db3 606static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
607{
608 struct fuse_mkdir_in inarg;
609 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 610 FUSE_ARGS(args);
9e6268db 611
e0a43ddc
MS
612 if (!fc->dont_mask)
613 mode &= ~current_umask();
614
9e6268db
MS
615 memset(&inarg, 0, sizeof(inarg));
616 inarg.mode = mode;
e0a43ddc 617 inarg.umask = current_umask();
7078187a
MS
618 args.in.h.opcode = FUSE_MKDIR;
619 args.in.numargs = 2;
620 args.in.args[0].size = sizeof(inarg);
621 args.in.args[0].value = &inarg;
622 args.in.args[1].size = entry->d_name.len + 1;
623 args.in.args[1].value = entry->d_name.name;
624 return create_new_entry(fc, &args, dir, entry, S_IFDIR);
9e6268db
MS
625}
626
627static int fuse_symlink(struct inode *dir, struct dentry *entry,
628 const char *link)
629{
630 struct fuse_conn *fc = get_fuse_conn(dir);
631 unsigned len = strlen(link) + 1;
7078187a 632 FUSE_ARGS(args);
9e6268db 633
7078187a
MS
634 args.in.h.opcode = FUSE_SYMLINK;
635 args.in.numargs = 2;
636 args.in.args[0].size = entry->d_name.len + 1;
637 args.in.args[0].value = entry->d_name.name;
638 args.in.args[1].size = len;
639 args.in.args[1].value = link;
640 return create_new_entry(fc, &args, dir, entry, S_IFLNK);
9e6268db
MS
641}
642
703c7362 643void fuse_update_ctime(struct inode *inode)
31f3267b
MP
644{
645 if (!IS_NOCMTIME(inode)) {
646 inode->i_ctime = current_fs_time(inode->i_sb);
647 mark_inode_dirty_sync(inode);
648 }
649}
650
9e6268db
MS
651static int fuse_unlink(struct inode *dir, struct dentry *entry)
652{
653 int err;
654 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
655 FUSE_ARGS(args);
656
657 args.in.h.opcode = FUSE_UNLINK;
658 args.in.h.nodeid = get_node_id(dir);
659 args.in.numargs = 1;
660 args.in.args[0].size = entry->d_name.len + 1;
661 args.in.args[0].value = entry->d_name.name;
662 err = fuse_simple_request(fc, &args);
9e6268db 663 if (!err) {
2b0143b5 664 struct inode *inode = d_inode(entry);
ac45d613 665 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 666
ac45d613
MS
667 spin_lock(&fc->lock);
668 fi->attr_version = ++fc->attr_version;
dfca7ceb
MS
669 /*
670 * If i_nlink == 0 then unlink doesn't make sense, yet this can
671 * happen if userspace filesystem is careless. It would be
672 * difficult to enforce correct nlink usage so just ignore this
673 * condition here
674 */
675 if (inode->i_nlink > 0)
676 drop_nlink(inode);
ac45d613 677 spin_unlock(&fc->lock);
9e6268db
MS
678 fuse_invalidate_attr(inode);
679 fuse_invalidate_attr(dir);
8cbdf1e6 680 fuse_invalidate_entry_cache(entry);
31f3267b 681 fuse_update_ctime(inode);
9e6268db
MS
682 } else if (err == -EINTR)
683 fuse_invalidate_entry(entry);
684 return err;
685}
686
687static int fuse_rmdir(struct inode *dir, struct dentry *entry)
688{
689 int err;
690 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
691 FUSE_ARGS(args);
692
693 args.in.h.opcode = FUSE_RMDIR;
694 args.in.h.nodeid = get_node_id(dir);
695 args.in.numargs = 1;
696 args.in.args[0].size = entry->d_name.len + 1;
697 args.in.args[0].value = entry->d_name.name;
698 err = fuse_simple_request(fc, &args);
9e6268db 699 if (!err) {
2b0143b5 700 clear_nlink(d_inode(entry));
9e6268db 701 fuse_invalidate_attr(dir);
8cbdf1e6 702 fuse_invalidate_entry_cache(entry);
9e6268db
MS
703 } else if (err == -EINTR)
704 fuse_invalidate_entry(entry);
705 return err;
706}
707
1560c974
MS
708static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
709 struct inode *newdir, struct dentry *newent,
710 unsigned int flags, int opcode, size_t argsize)
9e6268db
MS
711{
712 int err;
1560c974 713 struct fuse_rename2_in inarg;
9e6268db 714 struct fuse_conn *fc = get_fuse_conn(olddir);
7078187a 715 FUSE_ARGS(args);
9e6268db 716
1560c974 717 memset(&inarg, 0, argsize);
9e6268db 718 inarg.newdir = get_node_id(newdir);
1560c974 719 inarg.flags = flags;
7078187a
MS
720 args.in.h.opcode = opcode;
721 args.in.h.nodeid = get_node_id(olddir);
722 args.in.numargs = 3;
723 args.in.args[0].size = argsize;
724 args.in.args[0].value = &inarg;
725 args.in.args[1].size = oldent->d_name.len + 1;
726 args.in.args[1].value = oldent->d_name.name;
727 args.in.args[2].size = newent->d_name.len + 1;
728 args.in.args[2].value = newent->d_name.name;
729 err = fuse_simple_request(fc, &args);
9e6268db 730 if (!err) {
08b63307 731 /* ctime changes */
2b0143b5
DH
732 fuse_invalidate_attr(d_inode(oldent));
733 fuse_update_ctime(d_inode(oldent));
08b63307 734
1560c974 735 if (flags & RENAME_EXCHANGE) {
2b0143b5
DH
736 fuse_invalidate_attr(d_inode(newent));
737 fuse_update_ctime(d_inode(newent));
1560c974
MS
738 }
739
9e6268db
MS
740 fuse_invalidate_attr(olddir);
741 if (olddir != newdir)
742 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
743
744 /* newent will end up negative */
2b0143b5
DH
745 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) {
746 fuse_invalidate_attr(d_inode(newent));
8cbdf1e6 747 fuse_invalidate_entry_cache(newent);
2b0143b5 748 fuse_update_ctime(d_inode(newent));
5219f346 749 }
9e6268db
MS
750 } else if (err == -EINTR) {
751 /* If request was interrupted, DEITY only knows if the
752 rename actually took place. If the invalidation
753 fails (e.g. some process has CWD under the renamed
754 directory), then there can be inconsistency between
755 the dcache and the real filesystem. Tough luck. */
756 fuse_invalidate_entry(oldent);
2b0143b5 757 if (d_really_is_positive(newent))
9e6268db
MS
758 fuse_invalidate_entry(newent);
759 }
760
761 return err;
762}
763
1560c974
MS
764static int fuse_rename2(struct inode *olddir, struct dentry *oldent,
765 struct inode *newdir, struct dentry *newent,
766 unsigned int flags)
767{
768 struct fuse_conn *fc = get_fuse_conn(olddir);
769 int err;
770
771 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE))
772 return -EINVAL;
773
4237ba43
MS
774 if (flags) {
775 if (fc->no_rename2 || fc->minor < 23)
776 return -EINVAL;
1560c974 777
4237ba43
MS
778 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
779 FUSE_RENAME2,
780 sizeof(struct fuse_rename2_in));
781 if (err == -ENOSYS) {
782 fc->no_rename2 = 1;
783 err = -EINVAL;
784 }
785 } else {
786 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
787 FUSE_RENAME,
788 sizeof(struct fuse_rename_in));
1560c974 789 }
4237ba43 790
1560c974 791 return err;
4237ba43 792}
1560c974 793
9e6268db
MS
794static int fuse_link(struct dentry *entry, struct inode *newdir,
795 struct dentry *newent)
796{
797 int err;
798 struct fuse_link_in inarg;
2b0143b5 799 struct inode *inode = d_inode(entry);
9e6268db 800 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 801 FUSE_ARGS(args);
9e6268db
MS
802
803 memset(&inarg, 0, sizeof(inarg));
804 inarg.oldnodeid = get_node_id(inode);
7078187a
MS
805 args.in.h.opcode = FUSE_LINK;
806 args.in.numargs = 2;
807 args.in.args[0].size = sizeof(inarg);
808 args.in.args[0].value = &inarg;
809 args.in.args[1].size = newent->d_name.len + 1;
810 args.in.args[1].value = newent->d_name.name;
811 err = create_new_entry(fc, &args, newdir, newent, inode->i_mode);
9e6268db
MS
812 /* Contrary to "normal" filesystems it can happen that link
813 makes two "logical" inodes point to the same "physical"
814 inode. We invalidate the attributes of the old one, so it
815 will reflect changes in the backing inode (link count,
816 etc.)
817 */
ac45d613
MS
818 if (!err) {
819 struct fuse_inode *fi = get_fuse_inode(inode);
820
821 spin_lock(&fc->lock);
822 fi->attr_version = ++fc->attr_version;
823 inc_nlink(inode);
824 spin_unlock(&fc->lock);
9e6268db 825 fuse_invalidate_attr(inode);
31f3267b 826 fuse_update_ctime(inode);
ac45d613
MS
827 } else if (err == -EINTR) {
828 fuse_invalidate_attr(inode);
829 }
9e6268db
MS
830 return err;
831}
832
1fb69e78
MS
833static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
834 struct kstat *stat)
835{
203627bb 836 unsigned int blkbits;
8373200b
PE
837 struct fuse_conn *fc = get_fuse_conn(inode);
838
839 /* see the comment in fuse_change_attributes() */
b0aa7606 840 if (fc->writeback_cache && S_ISREG(inode->i_mode)) {
8373200b 841 attr->size = i_size_read(inode);
b0aa7606
MP
842 attr->mtime = inode->i_mtime.tv_sec;
843 attr->mtimensec = inode->i_mtime.tv_nsec;
31f3267b
MP
844 attr->ctime = inode->i_ctime.tv_sec;
845 attr->ctimensec = inode->i_ctime.tv_nsec;
b0aa7606 846 }
203627bb 847
1fb69e78
MS
848 stat->dev = inode->i_sb->s_dev;
849 stat->ino = attr->ino;
850 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
851 stat->nlink = attr->nlink;
499dcf20
EB
852 stat->uid = make_kuid(&init_user_ns, attr->uid);
853 stat->gid = make_kgid(&init_user_ns, attr->gid);
1fb69e78
MS
854 stat->rdev = inode->i_rdev;
855 stat->atime.tv_sec = attr->atime;
856 stat->atime.tv_nsec = attr->atimensec;
857 stat->mtime.tv_sec = attr->mtime;
858 stat->mtime.tv_nsec = attr->mtimensec;
859 stat->ctime.tv_sec = attr->ctime;
860 stat->ctime.tv_nsec = attr->ctimensec;
861 stat->size = attr->size;
862 stat->blocks = attr->blocks;
203627bb
MS
863
864 if (attr->blksize != 0)
865 blkbits = ilog2(attr->blksize);
866 else
867 blkbits = inode->i_sb->s_blocksize_bits;
868
869 stat->blksize = 1 << blkbits;
1fb69e78
MS
870}
871
c79e322f
MS
872static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
873 struct file *file)
e5e5558e
MS
874{
875 int err;
c79e322f
MS
876 struct fuse_getattr_in inarg;
877 struct fuse_attr_out outarg;
e5e5558e 878 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 879 FUSE_ARGS(args);
1fb69e78
MS
880 u64 attr_version;
881
7dca9fd3 882 attr_version = fuse_get_attr_version(fc);
1fb69e78 883
c79e322f 884 memset(&inarg, 0, sizeof(inarg));
0e9663ee 885 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
886 /* Directories have separate file-handle space */
887 if (file && S_ISREG(inode->i_mode)) {
888 struct fuse_file *ff = file->private_data;
889
890 inarg.getattr_flags |= FUSE_GETATTR_FH;
891 inarg.fh = ff->fh;
892 }
7078187a
MS
893 args.in.h.opcode = FUSE_GETATTR;
894 args.in.h.nodeid = get_node_id(inode);
895 args.in.numargs = 1;
896 args.in.args[0].size = sizeof(inarg);
897 args.in.args[0].value = &inarg;
898 args.out.numargs = 1;
21f62174 899 args.out.args[0].size = sizeof(outarg);
7078187a
MS
900 args.out.args[0].value = &outarg;
901 err = fuse_simple_request(fc, &args);
e5e5558e 902 if (!err) {
c79e322f 903 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
904 make_bad_inode(inode);
905 err = -EIO;
906 } else {
c79e322f
MS
907 fuse_change_attributes(inode, &outarg.attr,
908 attr_timeout(&outarg),
1fb69e78
MS
909 attr_version);
910 if (stat)
c79e322f 911 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
912 }
913 }
914 return err;
915}
916
bcb4be80
MS
917int fuse_update_attributes(struct inode *inode, struct kstat *stat,
918 struct file *file, bool *refreshed)
919{
920 struct fuse_inode *fi = get_fuse_inode(inode);
921 int err;
922 bool r;
923
126b9d43 924 if (time_before64(fi->i_time, get_jiffies_64())) {
bcb4be80 925 r = true;
60bcc88a 926 forget_all_cached_acls(inode);
bcb4be80
MS
927 err = fuse_do_getattr(inode, stat, file);
928 } else {
929 r = false;
930 err = 0;
931 if (stat) {
932 generic_fillattr(inode, stat);
933 stat->mode = fi->orig_i_mode;
45c72cd7 934 stat->ino = fi->orig_ino;
bcb4be80
MS
935 }
936 }
937
938 if (refreshed != NULL)
939 *refreshed = r;
940
941 return err;
942}
943
3b463ae0 944int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 945 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
946{
947 int err = -ENOTDIR;
948 struct inode *parent;
949 struct dentry *dir;
950 struct dentry *entry;
951
952 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
953 if (!parent)
954 return -ENOENT;
955
5955102c 956 inode_lock(parent);
3b463ae0
JM
957 if (!S_ISDIR(parent->i_mode))
958 goto unlock;
959
960 err = -ENOENT;
961 dir = d_find_alias(parent);
962 if (!dir)
963 goto unlock;
964
8387ff25 965 name->hash = full_name_hash(dir, name->name, name->len);
3b463ae0
JM
966 entry = d_lookup(dir, name);
967 dput(dir);
968 if (!entry)
969 goto unlock;
970
971 fuse_invalidate_attr(parent);
972 fuse_invalidate_entry(entry);
451d0f59 973
2b0143b5 974 if (child_nodeid != 0 && d_really_is_positive(entry)) {
5955102c 975 inode_lock(d_inode(entry));
2b0143b5 976 if (get_node_id(d_inode(entry)) != child_nodeid) {
451d0f59
JM
977 err = -ENOENT;
978 goto badentry;
979 }
980 if (d_mountpoint(entry)) {
981 err = -EBUSY;
982 goto badentry;
983 }
e36cb0b8 984 if (d_is_dir(entry)) {
451d0f59
JM
985 shrink_dcache_parent(entry);
986 if (!simple_empty(entry)) {
987 err = -ENOTEMPTY;
988 goto badentry;
989 }
2b0143b5 990 d_inode(entry)->i_flags |= S_DEAD;
451d0f59
JM
991 }
992 dont_mount(entry);
2b0143b5 993 clear_nlink(d_inode(entry));
451d0f59
JM
994 err = 0;
995 badentry:
5955102c 996 inode_unlock(d_inode(entry));
451d0f59
JM
997 if (!err)
998 d_delete(entry);
999 } else {
1000 err = 0;
1001 }
3b463ae0 1002 dput(entry);
3b463ae0
JM
1003
1004 unlock:
5955102c 1005 inode_unlock(parent);
3b463ae0
JM
1006 iput(parent);
1007 return err;
1008}
1009
87729a55
MS
1010/*
1011 * Calling into a user-controlled filesystem gives the filesystem
c2132c1b 1012 * daemon ptrace-like capabilities over the current process. This
87729a55
MS
1013 * means, that the filesystem daemon is able to record the exact
1014 * filesystem operations performed, and can also control the behavior
1015 * of the requester process in otherwise impossible ways. For example
1016 * it can delay the operation for arbitrary length of time allowing
1017 * DoS against the requester.
1018 *
1019 * For this reason only those processes can call into the filesystem,
1020 * for which the owner of the mount has ptrace privilege. This
1021 * excludes processes started by other users, suid or sgid processes.
1022 */
c2132c1b 1023int fuse_allow_current_process(struct fuse_conn *fc)
87729a55 1024{
c69e8d9c 1025 const struct cred *cred;
87729a55 1026
c69e8d9c 1027 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
1028 return 1;
1029
c2132c1b 1030 cred = current_cred();
499dcf20
EB
1031 if (uid_eq(cred->euid, fc->user_id) &&
1032 uid_eq(cred->suid, fc->user_id) &&
1033 uid_eq(cred->uid, fc->user_id) &&
1034 gid_eq(cred->egid, fc->group_id) &&
1035 gid_eq(cred->sgid, fc->group_id) &&
1036 gid_eq(cred->gid, fc->group_id))
c2132c1b 1037 return 1;
c69e8d9c 1038
c2132c1b 1039 return 0;
87729a55
MS
1040}
1041
31d40d74
MS
1042static int fuse_access(struct inode *inode, int mask)
1043{
1044 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1045 FUSE_ARGS(args);
31d40d74
MS
1046 struct fuse_access_in inarg;
1047 int err;
1048
698fa1d1
MS
1049 BUG_ON(mask & MAY_NOT_BLOCK);
1050
31d40d74
MS
1051 if (fc->no_access)
1052 return 0;
1053
31d40d74 1054 memset(&inarg, 0, sizeof(inarg));
e6305c43 1055 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
7078187a
MS
1056 args.in.h.opcode = FUSE_ACCESS;
1057 args.in.h.nodeid = get_node_id(inode);
1058 args.in.numargs = 1;
1059 args.in.args[0].size = sizeof(inarg);
1060 args.in.args[0].value = &inarg;
1061 err = fuse_simple_request(fc, &args);
31d40d74
MS
1062 if (err == -ENOSYS) {
1063 fc->no_access = 1;
1064 err = 0;
1065 }
1066 return err;
1067}
1068
10556cb2 1069static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1070{
10556cb2 1071 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1072 return -ECHILD;
1073
60bcc88a 1074 forget_all_cached_acls(inode);
19690ddb
MS
1075 return fuse_do_getattr(inode, NULL, NULL);
1076}
1077
6f9f1180
MS
1078/*
1079 * Check permission. The two basic access models of FUSE are:
1080 *
1081 * 1) Local access checking ('default_permissions' mount option) based
1082 * on file mode. This is the plain old disk filesystem permission
1083 * modell.
1084 *
1085 * 2) "Remote" access checking, where server is responsible for
1086 * checking permission in each inode operation. An exception to this
1087 * is if ->permission() was invoked from sys_access() in which case an
1088 * access request is sent. Execute permission is still checked
1089 * locally based on file mode.
1090 */
10556cb2 1091static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1092{
1093 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1094 bool refreshed = false;
1095 int err = 0;
e5e5558e 1096
c2132c1b 1097 if (!fuse_allow_current_process(fc))
e5e5558e 1098 return -EACCES;
244f6385
MS
1099
1100 /*
e8e96157 1101 * If attributes are needed, refresh them before proceeding
244f6385 1102 */
e8e96157
MS
1103 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1104 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1105 struct fuse_inode *fi = get_fuse_inode(inode);
1106
126b9d43 1107 if (time_before64(fi->i_time, get_jiffies_64())) {
19690ddb
MS
1108 refreshed = true;
1109
10556cb2 1110 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1111 if (err)
1112 return err;
1113 }
244f6385
MS
1114 }
1115
1116 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
2830ba7f 1117 err = generic_permission(inode, mask);
1e9a4ed9
MS
1118
1119 /* If permission is denied, try to refresh file
1120 attributes. This is also needed, because the root
1121 node will at first have no permissions */
244f6385 1122 if (err == -EACCES && !refreshed) {
10556cb2 1123 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1124 if (!err)
2830ba7f 1125 err = generic_permission(inode, mask);
1e9a4ed9
MS
1126 }
1127
6f9f1180
MS
1128 /* Note: the opposite of the above test does not
1129 exist. So if permissions are revoked this won't be
1130 noticed immediately, only after the attribute
1131 timeout has expired */
9cfcac81 1132 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1133 err = fuse_access(inode, mask);
1134 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1135 if (!(inode->i_mode & S_IXUGO)) {
1136 if (refreshed)
1137 return -EACCES;
1138
10556cb2 1139 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1140 if (!err && !(inode->i_mode & S_IXUGO))
1141 return -EACCES;
1142 }
e5e5558e 1143 }
244f6385 1144 return err;
e5e5558e
MS
1145}
1146
1147static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1148 struct dir_context *ctx)
e5e5558e
MS
1149{
1150 while (nbytes >= FUSE_NAME_OFFSET) {
1151 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1152 size_t reclen = FUSE_DIRENT_SIZE(dirent);
e5e5558e
MS
1153 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1154 return -EIO;
1155 if (reclen > nbytes)
1156 break;
efeb9e60
MS
1157 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1158 return -EIO;
e5e5558e 1159
8d3af7f3
AV
1160 if (!dir_emit(ctx, dirent->name, dirent->namelen,
1161 dirent->ino, dirent->type))
e5e5558e
MS
1162 break;
1163
1164 buf += reclen;
1165 nbytes -= reclen;
8d3af7f3 1166 ctx->pos = dirent->off;
e5e5558e
MS
1167 }
1168
1169 return 0;
1170}
1171
0b05b183
AA
1172static int fuse_direntplus_link(struct file *file,
1173 struct fuse_direntplus *direntplus,
1174 u64 attr_version)
1175{
0b05b183
AA
1176 struct fuse_entry_out *o = &direntplus->entry_out;
1177 struct fuse_dirent *dirent = &direntplus->dirent;
1178 struct dentry *parent = file->f_path.dentry;
1179 struct qstr name = QSTR_INIT(dirent->name, dirent->namelen);
1180 struct dentry *dentry;
1181 struct dentry *alias;
2b0143b5 1182 struct inode *dir = d_inode(parent);
0b05b183
AA
1183 struct fuse_conn *fc;
1184 struct inode *inode;
d9b3dbdc 1185 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
0b05b183
AA
1186
1187 if (!o->nodeid) {
1188 /*
1189 * Unlike in the case of fuse_lookup, zero nodeid does not mean
1190 * ENOENT. Instead, it only means the userspace filesystem did
1191 * not want to return attributes/handle for this entry.
1192 *
1193 * So do nothing.
1194 */
1195 return 0;
1196 }
1197
1198 if (name.name[0] == '.') {
1199 /*
1200 * We could potentially refresh the attributes of the directory
1201 * and its parent?
1202 */
1203 if (name.len == 1)
1204 return 0;
1205 if (name.name[1] == '.' && name.len == 2)
1206 return 0;
1207 }
a28ef45c
MS
1208
1209 if (invalid_nodeid(o->nodeid))
1210 return -EIO;
1211 if (!fuse_valid_type(o->attr.mode))
1212 return -EIO;
1213
0b05b183
AA
1214 fc = get_fuse_conn(dir);
1215
8387ff25 1216 name.hash = full_name_hash(parent, name.name, name.len);
0b05b183 1217 dentry = d_lookup(parent, &name);
d9b3dbdc
AV
1218 if (!dentry) {
1219retry:
1220 dentry = d_alloc_parallel(parent, &name, &wq);
1221 if (IS_ERR(dentry))
1222 return PTR_ERR(dentry);
1223 }
1224 if (!d_in_lookup(dentry)) {
1225 struct fuse_inode *fi;
2b0143b5 1226 inode = d_inode(dentry);
d9b3dbdc
AV
1227 if (!inode ||
1228 get_node_id(inode) != o->nodeid ||
1229 ((o->attr.mode ^ inode->i_mode) & S_IFMT)) {
5542aa2f 1230 d_invalidate(dentry);
d9b3dbdc
AV
1231 dput(dentry);
1232 goto retry;
1233 }
1234 if (is_bad_inode(inode)) {
1235 dput(dentry);
1236 return -EIO;
0b05b183 1237 }
0b05b183 1238
d9b3dbdc
AV
1239 fi = get_fuse_inode(inode);
1240 spin_lock(&fc->lock);
1241 fi->nlookup++;
1242 spin_unlock(&fc->lock);
0b05b183 1243
60bcc88a 1244 forget_all_cached_acls(inode);
d9b3dbdc
AV
1245 fuse_change_attributes(inode, &o->attr,
1246 entry_attr_timeout(o),
1247 attr_version);
1248 /*
1249 * The other branch comes via fuse_iget()
1250 * which bumps nlookup inside
1251 */
1252 } else {
1253 inode = fuse_iget(dir->i_sb, o->nodeid, o->generation,
1254 &o->attr, entry_attr_timeout(o),
1255 attr_version);
1256 if (!inode)
1257 inode = ERR_PTR(-ENOMEM);
2914941e 1258
d9b3dbdc
AV
1259 alias = d_splice_alias(inode, dentry);
1260 d_lookup_done(dentry);
1261 if (alias) {
1262 dput(dentry);
1263 dentry = alias;
1264 }
1265 if (IS_ERR(dentry))
1266 return PTR_ERR(dentry);
0b05b183 1267 }
6314efee
MS
1268 if (fc->readdirplus_auto)
1269 set_bit(FUSE_I_INIT_RDPLUS, &get_fuse_inode(inode)->state);
0b05b183
AA
1270 fuse_change_entry_timeout(dentry, o);
1271
c7263bcd 1272 dput(dentry);
d9b3dbdc 1273 return 0;
0b05b183
AA
1274}
1275
1276static int parse_dirplusfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1277 struct dir_context *ctx, u64 attr_version)
0b05b183
AA
1278{
1279 struct fuse_direntplus *direntplus;
1280 struct fuse_dirent *dirent;
1281 size_t reclen;
1282 int over = 0;
1283 int ret;
1284
1285 while (nbytes >= FUSE_NAME_OFFSET_DIRENTPLUS) {
1286 direntplus = (struct fuse_direntplus *) buf;
1287 dirent = &direntplus->dirent;
1288 reclen = FUSE_DIRENTPLUS_SIZE(direntplus);
1289
1290 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1291 return -EIO;
1292 if (reclen > nbytes)
1293 break;
efeb9e60
MS
1294 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1295 return -EIO;
0b05b183
AA
1296
1297 if (!over) {
1298 /* We fill entries into dstbuf only as much as
1299 it can hold. But we still continue iterating
1300 over remaining entries to link them. If not,
1301 we need to send a FORGET for each of those
1302 which we did not link.
1303 */
8d3af7f3
AV
1304 over = !dir_emit(ctx, dirent->name, dirent->namelen,
1305 dirent->ino, dirent->type);
1306 ctx->pos = dirent->off;
0b05b183
AA
1307 }
1308
1309 buf += reclen;
1310 nbytes -= reclen;
1311
1312 ret = fuse_direntplus_link(file, direntplus, attr_version);
1313 if (ret)
1314 fuse_force_forget(file, direntplus->entry_out.nodeid);
1315 }
1316
1317 return 0;
1318}
1319
8d3af7f3 1320static int fuse_readdir(struct file *file, struct dir_context *ctx)
e5e5558e 1321{
4582a4ab 1322 int plus, err;
04730fef
MS
1323 size_t nbytes;
1324 struct page *page;
496ad9aa 1325 struct inode *inode = file_inode(file);
e5e5558e 1326 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8 1327 struct fuse_req *req;
0b05b183 1328 u64 attr_version = 0;
248d86e8
MS
1329
1330 if (is_bad_inode(inode))
1331 return -EIO;
1332
b111c8c0 1333 req = fuse_get_req(fc, 1);
ce1d5a49
MS
1334 if (IS_ERR(req))
1335 return PTR_ERR(req);
e5e5558e 1336
04730fef
MS
1337 page = alloc_page(GFP_KERNEL);
1338 if (!page) {
1339 fuse_put_request(fc, req);
1340 return -ENOMEM;
1341 }
4582a4ab 1342
8d3af7f3 1343 plus = fuse_use_readdirplus(inode, ctx);
f4975c67 1344 req->out.argpages = 1;
04730fef
MS
1345 req->num_pages = 1;
1346 req->pages[0] = page;
85f40aec 1347 req->page_descs[0].length = PAGE_SIZE;
4582a4ab 1348 if (plus) {
0b05b183 1349 attr_version = fuse_get_attr_version(fc);
8d3af7f3 1350 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1351 FUSE_READDIRPLUS);
1352 } else {
8d3af7f3 1353 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1354 FUSE_READDIR);
1355 }
5c672ab3 1356 fuse_lock_inode(inode);
b93f858a 1357 fuse_request_send(fc, req);
5c672ab3 1358 fuse_unlock_inode(inode);
361b1eb5 1359 nbytes = req->out.args[0].size;
e5e5558e
MS
1360 err = req->out.h.error;
1361 fuse_put_request(fc, req);
0b05b183 1362 if (!err) {
4582a4ab 1363 if (plus) {
0b05b183 1364 err = parse_dirplusfile(page_address(page), nbytes,
8d3af7f3 1365 file, ctx,
0b05b183
AA
1366 attr_version);
1367 } else {
1368 err = parse_dirfile(page_address(page), nbytes, file,
8d3af7f3 1369 ctx);
0b05b183
AA
1370 }
1371 }
e5e5558e 1372
04730fef 1373 __free_page(page);
451418fc 1374 fuse_invalidate_atime(inode);
04730fef 1375 return err;
e5e5558e
MS
1376}
1377
6b255391 1378static const char *fuse_get_link(struct dentry *dentry,
fceef393
AV
1379 struct inode *inode,
1380 struct delayed_call *done)
e5e5558e 1381{
e5e5558e 1382 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1383 FUSE_ARGS(args);
e5e5558e 1384 char *link;
7078187a 1385 ssize_t ret;
e5e5558e 1386
6b255391
AV
1387 if (!dentry)
1388 return ERR_PTR(-ECHILD);
1389
cd3417c8 1390 link = kmalloc(PAGE_SIZE, GFP_KERNEL);
7078187a
MS
1391 if (!link)
1392 return ERR_PTR(-ENOMEM);
1393
1394 args.in.h.opcode = FUSE_READLINK;
1395 args.in.h.nodeid = get_node_id(inode);
1396 args.out.argvar = 1;
1397 args.out.numargs = 1;
1398 args.out.args[0].size = PAGE_SIZE - 1;
1399 args.out.args[0].value = link;
1400 ret = fuse_simple_request(fc, &args);
1401 if (ret < 0) {
cd3417c8 1402 kfree(link);
7078187a
MS
1403 link = ERR_PTR(ret);
1404 } else {
1405 link[ret] = '\0';
fceef393 1406 set_delayed_call(done, kfree_link, link);
7078187a 1407 }
451418fc 1408 fuse_invalidate_atime(inode);
e5e5558e
MS
1409 return link;
1410}
1411
e5e5558e
MS
1412static int fuse_dir_open(struct inode *inode, struct file *file)
1413{
91fe96b4 1414 return fuse_open_common(inode, file, true);
e5e5558e
MS
1415}
1416
1417static int fuse_dir_release(struct inode *inode, struct file *file)
1418{
8b0797a4
MS
1419 fuse_release_common(file, FUSE_RELEASEDIR);
1420
1421 return 0;
e5e5558e
MS
1422}
1423
02c24a82
JB
1424static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1425 int datasync)
82547981 1426{
02c24a82 1427 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1428}
1429
b18da0c5
MS
1430static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1431 unsigned long arg)
1432{
1433 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1434
1435 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1436 if (fc->minor < 18)
1437 return -ENOTTY;
1438
1439 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1440}
1441
1442static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1443 unsigned long arg)
1444{
1445 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1446
1447 if (fc->minor < 18)
1448 return -ENOTTY;
1449
1450 return fuse_ioctl_common(file, cmd, arg,
1451 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1452}
1453
b0aa7606 1454static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
17637cba
MS
1455{
1456 /* Always update if mtime is explicitly set */
1457 if (ivalid & ATTR_MTIME_SET)
1458 return true;
1459
b0aa7606
MP
1460 /* Or if kernel i_mtime is the official one */
1461 if (trust_local_mtime)
1462 return true;
1463
17637cba
MS
1464 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1465 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1466 return false;
1467
1468 /* In all other cases update */
1469 return true;
1470}
1471
b0aa7606 1472static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg,
3ad22c62 1473 bool trust_local_cmtime)
9e6268db
MS
1474{
1475 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1476
1477 if (ivalid & ATTR_MODE)
befc649c 1478 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1479 if (ivalid & ATTR_UID)
499dcf20 1480 arg->valid |= FATTR_UID, arg->uid = from_kuid(&init_user_ns, iattr->ia_uid);
9e6268db 1481 if (ivalid & ATTR_GID)
499dcf20 1482 arg->valid |= FATTR_GID, arg->gid = from_kgid(&init_user_ns, iattr->ia_gid);
9e6268db 1483 if (ivalid & ATTR_SIZE)
befc649c 1484 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1485 if (ivalid & ATTR_ATIME) {
1486 arg->valid |= FATTR_ATIME;
befc649c 1487 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1488 arg->atimensec = iattr->ia_atime.tv_nsec;
1489 if (!(ivalid & ATTR_ATIME_SET))
1490 arg->valid |= FATTR_ATIME_NOW;
1491 }
3ad22c62 1492 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
17637cba 1493 arg->valid |= FATTR_MTIME;
befc649c 1494 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba 1495 arg->mtimensec = iattr->ia_mtime.tv_nsec;
3ad22c62 1496 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
17637cba 1497 arg->valid |= FATTR_MTIME_NOW;
befc649c 1498 }
3ad22c62
MP
1499 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1500 arg->valid |= FATTR_CTIME;
1501 arg->ctime = iattr->ia_ctime.tv_sec;
1502 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1503 }
9e6268db
MS
1504}
1505
3be5a52b
MS
1506/*
1507 * Prevent concurrent writepages on inode
1508 *
1509 * This is done by adding a negative bias to the inode write counter
1510 * and waiting for all pending writes to finish.
1511 */
1512void fuse_set_nowrite(struct inode *inode)
1513{
1514 struct fuse_conn *fc = get_fuse_conn(inode);
1515 struct fuse_inode *fi = get_fuse_inode(inode);
1516
5955102c 1517 BUG_ON(!inode_is_locked(inode));
3be5a52b
MS
1518
1519 spin_lock(&fc->lock);
1520 BUG_ON(fi->writectr < 0);
1521 fi->writectr += FUSE_NOWRITE;
1522 spin_unlock(&fc->lock);
1523 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1524}
1525
1526/*
1527 * Allow writepages on inode
1528 *
1529 * Remove the bias from the writecounter and send any queued
1530 * writepages.
1531 */
1532static void __fuse_release_nowrite(struct inode *inode)
1533{
1534 struct fuse_inode *fi = get_fuse_inode(inode);
1535
1536 BUG_ON(fi->writectr != FUSE_NOWRITE);
1537 fi->writectr = 0;
1538 fuse_flush_writepages(inode);
1539}
1540
1541void fuse_release_nowrite(struct inode *inode)
1542{
1543 struct fuse_conn *fc = get_fuse_conn(inode);
1544
1545 spin_lock(&fc->lock);
1546 __fuse_release_nowrite(inode);
1547 spin_unlock(&fc->lock);
1548}
1549
7078187a 1550static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
b0aa7606
MP
1551 struct inode *inode,
1552 struct fuse_setattr_in *inarg_p,
1553 struct fuse_attr_out *outarg_p)
1554{
7078187a
MS
1555 args->in.h.opcode = FUSE_SETATTR;
1556 args->in.h.nodeid = get_node_id(inode);
1557 args->in.numargs = 1;
1558 args->in.args[0].size = sizeof(*inarg_p);
1559 args->in.args[0].value = inarg_p;
1560 args->out.numargs = 1;
21f62174 1561 args->out.args[0].size = sizeof(*outarg_p);
7078187a 1562 args->out.args[0].value = outarg_p;
b0aa7606
MP
1563}
1564
1565/*
1566 * Flush inode->i_mtime to the server
1567 */
ab9e13f7 1568int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
b0aa7606 1569{
b0aa7606 1570 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1571 FUSE_ARGS(args);
b0aa7606
MP
1572 struct fuse_setattr_in inarg;
1573 struct fuse_attr_out outarg;
b0aa7606
MP
1574
1575 memset(&inarg, 0, sizeof(inarg));
1576 memset(&outarg, 0, sizeof(outarg));
1577
ab9e13f7 1578 inarg.valid = FATTR_MTIME;
b0aa7606
MP
1579 inarg.mtime = inode->i_mtime.tv_sec;
1580 inarg.mtimensec = inode->i_mtime.tv_nsec;
ab9e13f7
MP
1581 if (fc->minor >= 23) {
1582 inarg.valid |= FATTR_CTIME;
1583 inarg.ctime = inode->i_ctime.tv_sec;
1584 inarg.ctimensec = inode->i_ctime.tv_nsec;
1585 }
1e18bda8
MS
1586 if (ff) {
1587 inarg.valid |= FATTR_FH;
1588 inarg.fh = ff->fh;
1589 }
7078187a 1590 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
b0aa7606 1591
7078187a 1592 return fuse_simple_request(fc, &args);
b0aa7606
MP
1593}
1594
6f9f1180
MS
1595/*
1596 * Set attributes, and at the same time refresh them.
1597 *
1598 * Truncation is slightly complicated, because the 'truncate' request
1599 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1600 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1601 * and the actual truncation by hand.
6f9f1180 1602 */
efb9fa9e
MP
1603int fuse_do_setattr(struct inode *inode, struct iattr *attr,
1604 struct file *file)
9e6268db 1605{
9e6268db 1606 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1607 struct fuse_inode *fi = get_fuse_inode(inode);
7078187a 1608 FUSE_ARGS(args);
9e6268db
MS
1609 struct fuse_setattr_in inarg;
1610 struct fuse_attr_out outarg;
3be5a52b 1611 bool is_truncate = false;
8373200b 1612 bool is_wb = fc->writeback_cache;
3be5a52b 1613 loff_t oldsize;
9e6268db 1614 int err;
3ad22c62 1615 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
9e6268db 1616
db78b877
CH
1617 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1618 attr->ia_valid |= ATTR_FORCE;
1619
1620 err = inode_change_ok(inode, attr);
1621 if (err)
1622 return err;
1e9a4ed9 1623
8d56addd
MS
1624 if (attr->ia_valid & ATTR_OPEN) {
1625 if (fc->atomic_o_trunc)
1626 return 0;
1627 file = NULL;
1628 }
6ff958ed 1629
2c27c65e 1630 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1631 is_truncate = true;
9e6268db 1632
06a7c3c2 1633 if (is_truncate) {
3be5a52b 1634 fuse_set_nowrite(inode);
06a7c3c2 1635 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3ad22c62
MP
1636 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1637 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
06a7c3c2 1638 }
3be5a52b 1639
9e6268db 1640 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1641 memset(&outarg, 0, sizeof(outarg));
3ad22c62 1642 iattr_to_fattr(attr, &inarg, trust_local_cmtime);
49d4914f
MS
1643 if (file) {
1644 struct fuse_file *ff = file->private_data;
1645 inarg.valid |= FATTR_FH;
1646 inarg.fh = ff->fh;
1647 }
f3332114
MS
1648 if (attr->ia_valid & ATTR_SIZE) {
1649 /* For mandatory locking in truncate */
1650 inarg.valid |= FATTR_LOCKOWNER;
1651 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1652 }
7078187a
MS
1653 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1654 err = fuse_simple_request(fc, &args);
e00d2c2d
MS
1655 if (err) {
1656 if (err == -EINTR)
1657 fuse_invalidate_attr(inode);
3be5a52b 1658 goto error;
e00d2c2d 1659 }
9e6268db 1660
e00d2c2d
MS
1661 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1662 make_bad_inode(inode);
3be5a52b
MS
1663 err = -EIO;
1664 goto error;
1665 }
1666
1667 spin_lock(&fc->lock);
b0aa7606 1668 /* the kernel maintains i_mtime locally */
3ad22c62
MP
1669 if (trust_local_cmtime) {
1670 if (attr->ia_valid & ATTR_MTIME)
1671 inode->i_mtime = attr->ia_mtime;
1672 if (attr->ia_valid & ATTR_CTIME)
1673 inode->i_ctime = attr->ia_ctime;
1e18bda8 1674 /* FIXME: clear I_DIRTY_SYNC? */
b0aa7606
MP
1675 }
1676
3be5a52b
MS
1677 fuse_change_attributes_common(inode, &outarg.attr,
1678 attr_timeout(&outarg));
1679 oldsize = inode->i_size;
8373200b
PE
1680 /* see the comment in fuse_change_attributes() */
1681 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode))
1682 i_size_write(inode, outarg.attr.size);
3be5a52b
MS
1683
1684 if (is_truncate) {
1685 /* NOTE: this may release/reacquire fc->lock */
1686 __fuse_release_nowrite(inode);
1687 }
1688 spin_unlock(&fc->lock);
1689
1690 /*
1691 * Only call invalidate_inode_pages2() after removing
1692 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1693 */
8373200b
PE
1694 if ((is_truncate || !is_wb) &&
1695 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
7caef267 1696 truncate_pagecache(inode, outarg.attr.size);
3be5a52b 1697 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1698 }
1699
06a7c3c2 1700 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
e00d2c2d 1701 return 0;
3be5a52b
MS
1702
1703error:
1704 if (is_truncate)
1705 fuse_release_nowrite(inode);
1706
06a7c3c2 1707 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3be5a52b 1708 return err;
9e6268db
MS
1709}
1710
49d4914f
MS
1711static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1712{
2b0143b5 1713 struct inode *inode = d_inode(entry);
5e940c1d 1714 struct fuse_conn *fc = get_fuse_conn(inode);
a09f99ed 1715 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
5e2b8828 1716 int ret;
efb9fa9e
MP
1717
1718 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1719 return -EACCES;
1720
a09f99ed 1721 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
a09f99ed
MS
1722 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1723 ATTR_MODE);
5e940c1d 1724
a09f99ed 1725 /*
5e940c1d
MS
1726 * The only sane way to reliably kill suid/sgid is to do it in
1727 * the userspace filesystem
1728 *
1729 * This should be done on write(), truncate() and chown().
a09f99ed 1730 */
5e940c1d
MS
1731 if (!fc->handle_killpriv) {
1732 int kill;
1733
1734 /*
1735 * ia_mode calculation may have used stale i_mode.
1736 * Refresh and recalculate.
1737 */
1738 ret = fuse_do_getattr(inode, NULL, file);
1739 if (ret)
1740 return ret;
1741
1742 attr->ia_mode = inode->i_mode;
1743 kill = should_remove_suid(entry);
1744 if (kill & ATTR_KILL_SUID) {
1745 attr->ia_valid |= ATTR_MODE;
1746 attr->ia_mode &= ~S_ISUID;
1747 }
1748 if (kill & ATTR_KILL_SGID) {
1749 attr->ia_valid |= ATTR_MODE;
1750 attr->ia_mode &= ~S_ISGID;
1751 }
a09f99ed
MS
1752 }
1753 }
1754 if (!attr->ia_valid)
1755 return 0;
5e2b8828 1756
a09f99ed 1757 ret = fuse_do_setattr(inode, attr, file);
5e2b8828 1758 if (!ret) {
60bcc88a
SF
1759 /*
1760 * If filesystem supports acls it may have updated acl xattrs in
1761 * the filesystem, so forget cached acls for the inode.
1762 */
1763 if (fc->posix_acl)
1764 forget_all_cached_acls(inode);
1765
5e2b8828
MS
1766 /* Directory mode changed, may need to revalidate access */
1767 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1768 fuse_invalidate_entry_cache(entry);
1769 }
1770 return ret;
49d4914f
MS
1771}
1772
e5e5558e
MS
1773static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1774 struct kstat *stat)
1775{
2b0143b5 1776 struct inode *inode = d_inode(entry);
244f6385 1777 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385 1778
c2132c1b 1779 if (!fuse_allow_current_process(fc))
244f6385
MS
1780 return -EACCES;
1781
bcb4be80 1782 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1783}
1784
754661f1 1785static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1786 .lookup = fuse_lookup,
9e6268db
MS
1787 .mkdir = fuse_mkdir,
1788 .symlink = fuse_symlink,
1789 .unlink = fuse_unlink,
1790 .rmdir = fuse_rmdir,
1560c974 1791 .rename2 = fuse_rename2,
9e6268db
MS
1792 .link = fuse_link,
1793 .setattr = fuse_setattr,
1794 .create = fuse_create,
c8ccbe03 1795 .atomic_open = fuse_atomic_open,
9e6268db 1796 .mknod = fuse_mknod,
e5e5558e
MS
1797 .permission = fuse_permission,
1798 .getattr = fuse_getattr,
703c7362
SF
1799 .setxattr = generic_setxattr,
1800 .getxattr = generic_getxattr,
92a8780e 1801 .listxattr = fuse_listxattr,
703c7362 1802 .removexattr = generic_removexattr,
60bcc88a
SF
1803 .get_acl = fuse_get_acl,
1804 .set_acl = fuse_set_acl,
e5e5558e
MS
1805};
1806
4b6f5d20 1807static const struct file_operations fuse_dir_operations = {
b6aeaded 1808 .llseek = generic_file_llseek,
e5e5558e 1809 .read = generic_read_dir,
d9b3dbdc 1810 .iterate_shared = fuse_readdir,
e5e5558e
MS
1811 .open = fuse_dir_open,
1812 .release = fuse_dir_release,
82547981 1813 .fsync = fuse_dir_fsync,
b18da0c5
MS
1814 .unlocked_ioctl = fuse_dir_ioctl,
1815 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1816};
1817
754661f1 1818static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1819 .setattr = fuse_setattr,
e5e5558e
MS
1820 .permission = fuse_permission,
1821 .getattr = fuse_getattr,
703c7362
SF
1822 .setxattr = generic_setxattr,
1823 .getxattr = generic_getxattr,
92a8780e 1824 .listxattr = fuse_listxattr,
703c7362 1825 .removexattr = generic_removexattr,
60bcc88a
SF
1826 .get_acl = fuse_get_acl,
1827 .set_acl = fuse_set_acl,
e5e5558e
MS
1828};
1829
754661f1 1830static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1831 .setattr = fuse_setattr,
6b255391 1832 .get_link = fuse_get_link,
e5e5558e
MS
1833 .readlink = generic_readlink,
1834 .getattr = fuse_getattr,
703c7362
SF
1835 .setxattr = generic_setxattr,
1836 .getxattr = generic_getxattr,
92a8780e 1837 .listxattr = fuse_listxattr,
703c7362 1838 .removexattr = generic_removexattr,
e5e5558e
MS
1839};
1840
1841void fuse_init_common(struct inode *inode)
1842{
1843 inode->i_op = &fuse_common_inode_operations;
1844}
1845
1846void fuse_init_dir(struct inode *inode)
1847{
1848 inode->i_op = &fuse_dir_inode_operations;
1849 inode->i_fop = &fuse_dir_operations;
1850}
1851
1852void fuse_init_symlink(struct inode *inode)
1853{
1854 inode->i_op = &fuse_symlink_inode_operations;
1855}
This page took 1.157757 seconds and 4 git commands to generate.