2 FUSE: Filesystem in Userspace
5 This program can be distributed under the terms of the GNU GPL.
11 #include <linux/pagemap.h>
12 #include <linux/file.h>
13 #include <linux/fs_context.h>
14 #include <linux/moduleparam.h>
15 #include <linux/sched.h>
16 #include <linux/namei.h>
17 #include <linux/slab.h>
18 #include <linux/xattr.h>
19 #include <linux/iversion.h>
20 #include <linux/posix_acl.h>
21 #include <linux/security.h>
22 #include <linux/types.h>
23 #include <linux/kernel.h>
25 static bool __read_mostly allow_sys_admin_access;
26 module_param(allow_sys_admin_access, bool, 0644);
27 MODULE_PARM_DESC(allow_sys_admin_access,
28 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check");
30 static void fuse_advise_use_readdirplus(struct inode *dir)
32 struct fuse_inode *fi = get_fuse_inode(dir);
34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
37 #if BITS_PER_LONG >= 64
38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
40 entry->d_fsdata = (void *) time;
43 static inline u64 fuse_dentry_time(const struct dentry *entry)
45 return (u64)entry->d_fsdata;
54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
56 ((union fuse_dentry *) dentry->d_fsdata)->time = time;
59 static inline u64 fuse_dentry_time(const struct dentry *entry)
61 return ((union fuse_dentry *) entry->d_fsdata)->time;
65 static void fuse_dentry_settime(struct dentry *dentry, u64 time)
67 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
68 bool delete = !time && fc->delete_stale;
70 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
71 * Don't care about races, either way it's just an optimization
73 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
74 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
75 spin_lock(&dentry->d_lock);
77 dentry->d_flags &= ~DCACHE_OP_DELETE;
79 dentry->d_flags |= DCACHE_OP_DELETE;
80 spin_unlock(&dentry->d_lock);
83 __fuse_dentry_settime(dentry, time);
87 * FUSE caches dentries and attributes with separate timeout. The
88 * time in jiffies until the dentry/attributes are valid is stored in
89 * dentry->d_fsdata and fuse_inode->i_time respectively.
93 * Calculate the time in jiffies until a dentry/attributes are valid
95 static u64 time_to_jiffies(u64 sec, u32 nsec)
98 struct timespec64 ts = {
100 min_t(u32, nsec, NSEC_PER_SEC - 1)
103 return get_jiffies_64() + timespec64_to_jiffies(&ts);
109 * Set dentry and possibly attribute timeouts from the lookup/mk*
112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
114 fuse_dentry_settime(entry,
115 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
118 static u64 attr_timeout(struct fuse_attr_out *o)
120 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
123 u64 entry_attr_timeout(struct fuse_entry_out *o)
125 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
128 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
130 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
134 * Mark the attributes as stale, so that at the next call to
135 * ->getattr() they will be fetched from userspace
137 void fuse_invalidate_attr(struct inode *inode)
139 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
142 static void fuse_dir_changed(struct inode *dir)
144 fuse_invalidate_attr(dir);
145 inode_maybe_inc_iversion(dir, false);
149 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
152 void fuse_invalidate_atime(struct inode *inode)
154 if (!IS_RDONLY(inode))
155 fuse_invalidate_attr_mask(inode, STATX_ATIME);
159 * Just mark the entry as stale, so that a next attempt to look it up
160 * will result in a new lookup call to userspace
162 * This is called when a dentry is about to become negative and the
163 * timeout is unknown (unlink, rmdir, rename and in some cases
166 void fuse_invalidate_entry_cache(struct dentry *entry)
168 fuse_dentry_settime(entry, 0);
172 * Same as fuse_invalidate_entry_cache(), but also try to remove the
173 * dentry from the hash
175 static void fuse_invalidate_entry(struct dentry *entry)
178 fuse_invalidate_entry_cache(entry);
181 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
182 u64 nodeid, const struct qstr *name,
183 struct fuse_entry_out *outarg)
185 memset(outarg, 0, sizeof(struct fuse_entry_out));
186 args->opcode = FUSE_LOOKUP;
187 args->nodeid = nodeid;
188 args->in_numargs = 1;
189 args->in_args[0].size = name->len + 1;
190 args->in_args[0].value = name->name;
191 args->out_numargs = 1;
192 args->out_args[0].size = sizeof(struct fuse_entry_out);
193 args->out_args[0].value = outarg;
197 * Check whether the dentry is still valid
199 * If the entry validity timeout has expired and the dentry is
200 * positive, try to redo the lookup. If the lookup results in a
201 * different inode, then let the VFS invalidate the dentry and redo
202 * the lookup once more. If the lookup results in the same inode,
203 * then refresh the attributes, timeouts and mark the dentry valid.
205 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
208 struct dentry *parent;
209 struct fuse_mount *fm;
210 struct fuse_inode *fi;
213 inode = d_inode_rcu(entry);
214 if (inode && fuse_is_bad(inode))
216 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
217 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) {
218 struct fuse_entry_out outarg;
220 struct fuse_forget_link *forget;
223 /* For negative dentries, always do a fresh lookup */
228 if (flags & LOOKUP_RCU)
231 fm = get_fuse_mount(inode);
233 forget = fuse_alloc_forget();
238 attr_version = fuse_get_attr_version(fm->fc);
240 parent = dget_parent(entry);
241 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
242 &entry->d_name, &outarg);
243 ret = fuse_simple_request(fm, &args);
245 /* Zero nodeid is same as -ENOENT */
246 if (!ret && !outarg.nodeid)
249 fi = get_fuse_inode(inode);
250 if (outarg.nodeid != get_node_id(inode) ||
251 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
252 fuse_queue_forget(fm->fc, forget,
256 spin_lock(&fi->lock);
258 spin_unlock(&fi->lock);
263 if (ret || fuse_invalid_attr(&outarg.attr) ||
264 fuse_stale_inode(inode, outarg.generation, &outarg.attr))
267 forget_all_cached_acls(inode);
268 fuse_change_attributes(inode, &outarg.attr,
269 entry_attr_timeout(&outarg),
271 fuse_change_entry_timeout(entry, &outarg);
273 fi = get_fuse_inode(inode);
274 if (flags & LOOKUP_RCU) {
275 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
277 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
278 parent = dget_parent(entry);
279 fuse_advise_use_readdirplus(d_inode(parent));
292 #if BITS_PER_LONG < 64
293 static int fuse_dentry_init(struct dentry *dentry)
295 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
296 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
298 return dentry->d_fsdata ? 0 : -ENOMEM;
300 static void fuse_dentry_release(struct dentry *dentry)
302 union fuse_dentry *fd = dentry->d_fsdata;
308 static int fuse_dentry_delete(const struct dentry *dentry)
310 return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
314 * Create a fuse_mount object with a new superblock (with path->dentry
315 * as the root), and return that mount so it can be auto-mounted on
318 static struct vfsmount *fuse_dentry_automount(struct path *path)
320 struct fs_context *fsc;
321 struct vfsmount *mnt;
322 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
324 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
326 return ERR_CAST(fsc);
328 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */
329 fsc->fs_private = mp_fi;
331 /* Create the submount */
340 const struct dentry_operations fuse_dentry_operations = {
341 .d_revalidate = fuse_dentry_revalidate,
342 .d_delete = fuse_dentry_delete,
343 #if BITS_PER_LONG < 64
344 .d_init = fuse_dentry_init,
345 .d_release = fuse_dentry_release,
347 .d_automount = fuse_dentry_automount,
350 const struct dentry_operations fuse_root_dentry_operations = {
351 #if BITS_PER_LONG < 64
352 .d_init = fuse_dentry_init,
353 .d_release = fuse_dentry_release,
357 int fuse_valid_type(int m)
359 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
360 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
363 bool fuse_invalid_attr(struct fuse_attr *attr)
365 return !fuse_valid_type(attr->mode) ||
366 attr->size > LLONG_MAX;
369 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
370 struct fuse_entry_out *outarg, struct inode **inode)
372 struct fuse_mount *fm = get_fuse_mount_super(sb);
374 struct fuse_forget_link *forget;
380 if (name->len > FUSE_NAME_MAX)
384 forget = fuse_alloc_forget();
389 attr_version = fuse_get_attr_version(fm->fc);
391 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
392 err = fuse_simple_request(fm, &args);
393 /* Zero nodeid is same as -ENOENT, but with valid timeout */
394 if (err || !outarg->nodeid)
400 if (fuse_invalid_attr(&outarg->attr))
403 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
404 &outarg->attr, entry_attr_timeout(outarg),
408 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
419 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
423 struct fuse_entry_out outarg;
425 struct dentry *newent;
426 bool outarg_valid = true;
429 if (fuse_is_bad(dir))
430 return ERR_PTR(-EIO);
432 locked = fuse_lock_inode(dir);
433 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
435 fuse_unlock_inode(dir, locked);
436 if (err == -ENOENT) {
437 outarg_valid = false;
444 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
447 newent = d_splice_alias(inode, entry);
448 err = PTR_ERR(newent);
452 entry = newent ? newent : entry;
454 fuse_change_entry_timeout(entry, &outarg);
456 fuse_invalidate_entry_cache(entry);
459 fuse_advise_use_readdirplus(dir);
468 static int get_security_context(struct dentry *entry, umode_t mode,
469 void **security_ctx, u32 *security_ctxlen)
471 struct fuse_secctx *fctx;
472 struct fuse_secctx_header *header;
473 void *ctx = NULL, *ptr;
474 u32 ctxlen, total_len = sizeof(*header);
479 err = security_dentry_init_security(entry, mode, &entry->d_name,
480 &name, &ctx, &ctxlen);
482 if (err != -EOPNOTSUPP)
484 /* No LSM is supporting this security hook. Ignore error */
491 namelen = strlen(name) + 1;
493 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX))
495 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen);
499 header = ptr = kzalloc(total_len, GFP_KERNEL);
503 header->nr_secctx = nr_ctx;
504 header->size = total_len;
505 ptr += sizeof(*header);
509 ptr += sizeof(*fctx);
514 memcpy(ptr, ctx, ctxlen);
516 *security_ctxlen = total_len;
517 *security_ctx = header;
525 * Atomic create+open operation
527 * If the filesystem doesn't support this, then fall back to separate
528 * 'mknod' + 'open' requests.
530 static int fuse_create_open(struct inode *dir, struct dentry *entry,
531 struct file *file, unsigned int flags,
532 umode_t mode, u32 opcode)
536 struct fuse_mount *fm = get_fuse_mount(dir);
538 struct fuse_forget_link *forget;
539 struct fuse_create_in inarg;
540 struct fuse_open_out outopen;
541 struct fuse_entry_out outentry;
542 struct fuse_inode *fi;
543 struct fuse_file *ff;
544 void *security_ctx = NULL;
546 bool trunc = flags & O_TRUNC;
548 /* Userspace expects S_IFREG in create mode */
549 BUG_ON((mode & S_IFMT) != S_IFREG);
551 forget = fuse_alloc_forget();
557 ff = fuse_file_alloc(fm);
559 goto out_put_forget_req;
561 if (!fm->fc->dont_mask)
562 mode &= ~current_umask();
565 memset(&inarg, 0, sizeof(inarg));
566 memset(&outentry, 0, sizeof(outentry));
569 inarg.umask = current_umask();
571 if (fm->fc->handle_killpriv_v2 && trunc &&
572 !(flags & O_EXCL) && !capable(CAP_FSETID)) {
573 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
576 args.opcode = opcode;
577 args.nodeid = get_node_id(dir);
579 args.in_args[0].size = sizeof(inarg);
580 args.in_args[0].value = &inarg;
581 args.in_args[1].size = entry->d_name.len + 1;
582 args.in_args[1].value = entry->d_name.name;
583 args.out_numargs = 2;
584 args.out_args[0].size = sizeof(outentry);
585 args.out_args[0].value = &outentry;
586 args.out_args[1].size = sizeof(outopen);
587 args.out_args[1].value = &outopen;
589 if (fm->fc->init_security) {
590 err = get_security_context(entry, mode, &security_ctx,
593 goto out_put_forget_req;
596 args.in_args[2].size = security_ctxlen;
597 args.in_args[2].value = security_ctx;
600 err = fuse_simple_request(fm, &args);
606 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
607 fuse_invalid_attr(&outentry.attr))
611 ff->nodeid = outentry.nodeid;
612 ff->open_flags = outopen.open_flags;
613 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
614 &outentry.attr, entry_attr_timeout(&outentry), 0);
616 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
617 fuse_sync_release(NULL, ff, flags);
618 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
623 d_instantiate(entry, inode);
624 fuse_change_entry_timeout(entry, &outentry);
625 fuse_dir_changed(dir);
626 err = finish_open(file, entry, generic_file_open);
628 fi = get_fuse_inode(inode);
629 fuse_sync_release(fi, ff, flags);
631 file->private_data = ff;
632 fuse_finish_open(inode, file);
633 if (fm->fc->atomic_o_trunc && trunc)
634 truncate_pagecache(inode, 0);
635 else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
636 invalidate_inode_pages2(inode->i_mapping);
648 static int fuse_mknod(struct user_namespace *, struct inode *, struct dentry *,
650 static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
651 struct file *file, unsigned flags,
655 struct fuse_conn *fc = get_fuse_conn(dir);
656 struct dentry *res = NULL;
658 if (fuse_is_bad(dir))
661 if (d_in_lookup(entry)) {
662 res = fuse_lookup(dir, entry, 0);
670 if (!(flags & O_CREAT) || d_really_is_positive(entry))
674 file->f_mode |= FMODE_CREATED;
679 err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE);
680 if (err == -ENOSYS) {
689 err = fuse_mknod(&init_user_ns, dir, entry, mode, 0);
693 return finish_no_open(file, res);
697 * Code shared between mknod, mkdir, symlink and link
699 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args,
700 struct inode *dir, struct dentry *entry,
703 struct fuse_entry_out outarg;
707 struct fuse_forget_link *forget;
708 void *security_ctx = NULL;
711 if (fuse_is_bad(dir))
714 forget = fuse_alloc_forget();
718 memset(&outarg, 0, sizeof(outarg));
719 args->nodeid = get_node_id(dir);
720 args->out_numargs = 1;
721 args->out_args[0].size = sizeof(outarg);
722 args->out_args[0].value = &outarg;
724 if (fm->fc->init_security && args->opcode != FUSE_LINK) {
725 err = get_security_context(entry, mode, &security_ctx,
728 goto out_put_forget_req;
730 BUG_ON(args->in_numargs != 2);
732 args->in_numargs = 3;
733 args->in_args[2].size = security_ctxlen;
734 args->in_args[2].value = security_ctx;
737 err = fuse_simple_request(fm, args);
740 goto out_put_forget_req;
743 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
744 goto out_put_forget_req;
746 if ((outarg.attr.mode ^ mode) & S_IFMT)
747 goto out_put_forget_req;
749 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
750 &outarg.attr, entry_attr_timeout(&outarg), 0);
752 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
758 d = d_splice_alias(inode, entry);
763 fuse_change_entry_timeout(d, &outarg);
766 fuse_change_entry_timeout(entry, &outarg);
768 fuse_dir_changed(dir);
776 static int fuse_mknod(struct user_namespace *mnt_userns, struct inode *dir,
777 struct dentry *entry, umode_t mode, dev_t rdev)
779 struct fuse_mknod_in inarg;
780 struct fuse_mount *fm = get_fuse_mount(dir);
783 if (!fm->fc->dont_mask)
784 mode &= ~current_umask();
786 memset(&inarg, 0, sizeof(inarg));
788 inarg.rdev = new_encode_dev(rdev);
789 inarg.umask = current_umask();
790 args.opcode = FUSE_MKNOD;
792 args.in_args[0].size = sizeof(inarg);
793 args.in_args[0].value = &inarg;
794 args.in_args[1].size = entry->d_name.len + 1;
795 args.in_args[1].value = entry->d_name.name;
796 return create_new_entry(fm, &args, dir, entry, mode);
799 static int fuse_create(struct user_namespace *mnt_userns, struct inode *dir,
800 struct dentry *entry, umode_t mode, bool excl)
802 return fuse_mknod(&init_user_ns, dir, entry, mode, 0);
805 static int fuse_tmpfile(struct user_namespace *mnt_userns, struct inode *dir,
806 struct file *file, umode_t mode)
808 struct fuse_conn *fc = get_fuse_conn(dir);
814 err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE);
815 if (err == -ENOSYS) {
822 static int fuse_mkdir(struct user_namespace *mnt_userns, struct inode *dir,
823 struct dentry *entry, umode_t mode)
825 struct fuse_mkdir_in inarg;
826 struct fuse_mount *fm = get_fuse_mount(dir);
829 if (!fm->fc->dont_mask)
830 mode &= ~current_umask();
832 memset(&inarg, 0, sizeof(inarg));
834 inarg.umask = current_umask();
835 args.opcode = FUSE_MKDIR;
837 args.in_args[0].size = sizeof(inarg);
838 args.in_args[0].value = &inarg;
839 args.in_args[1].size = entry->d_name.len + 1;
840 args.in_args[1].value = entry->d_name.name;
841 return create_new_entry(fm, &args, dir, entry, S_IFDIR);
844 static int fuse_symlink(struct user_namespace *mnt_userns, struct inode *dir,
845 struct dentry *entry, const char *link)
847 struct fuse_mount *fm = get_fuse_mount(dir);
848 unsigned len = strlen(link) + 1;
851 args.opcode = FUSE_SYMLINK;
853 args.in_args[0].size = entry->d_name.len + 1;
854 args.in_args[0].value = entry->d_name.name;
855 args.in_args[1].size = len;
856 args.in_args[1].value = link;
857 return create_new_entry(fm, &args, dir, entry, S_IFLNK);
860 void fuse_flush_time_update(struct inode *inode)
862 int err = sync_inode_metadata(inode, 1);
864 mapping_set_error(inode->i_mapping, err);
867 static void fuse_update_ctime_in_cache(struct inode *inode)
869 if (!IS_NOCMTIME(inode)) {
870 inode->i_ctime = current_time(inode);
871 mark_inode_dirty_sync(inode);
872 fuse_flush_time_update(inode);
876 void fuse_update_ctime(struct inode *inode)
878 fuse_invalidate_attr_mask(inode, STATX_CTIME);
879 fuse_update_ctime_in_cache(inode);
882 static void fuse_entry_unlinked(struct dentry *entry)
884 struct inode *inode = d_inode(entry);
885 struct fuse_conn *fc = get_fuse_conn(inode);
886 struct fuse_inode *fi = get_fuse_inode(inode);
888 spin_lock(&fi->lock);
889 fi->attr_version = atomic64_inc_return(&fc->attr_version);
891 * If i_nlink == 0 then unlink doesn't make sense, yet this can
892 * happen if userspace filesystem is careless. It would be
893 * difficult to enforce correct nlink usage so just ignore this
896 if (S_ISDIR(inode->i_mode))
898 else if (inode->i_nlink > 0)
900 spin_unlock(&fi->lock);
901 fuse_invalidate_entry_cache(entry);
902 fuse_update_ctime(inode);
905 static int fuse_unlink(struct inode *dir, struct dentry *entry)
908 struct fuse_mount *fm = get_fuse_mount(dir);
911 if (fuse_is_bad(dir))
914 args.opcode = FUSE_UNLINK;
915 args.nodeid = get_node_id(dir);
917 args.in_args[0].size = entry->d_name.len + 1;
918 args.in_args[0].value = entry->d_name.name;
919 err = fuse_simple_request(fm, &args);
921 fuse_dir_changed(dir);
922 fuse_entry_unlinked(entry);
923 } else if (err == -EINTR)
924 fuse_invalidate_entry(entry);
928 static int fuse_rmdir(struct inode *dir, struct dentry *entry)
931 struct fuse_mount *fm = get_fuse_mount(dir);
934 if (fuse_is_bad(dir))
937 args.opcode = FUSE_RMDIR;
938 args.nodeid = get_node_id(dir);
940 args.in_args[0].size = entry->d_name.len + 1;
941 args.in_args[0].value = entry->d_name.name;
942 err = fuse_simple_request(fm, &args);
944 fuse_dir_changed(dir);
945 fuse_entry_unlinked(entry);
946 } else if (err == -EINTR)
947 fuse_invalidate_entry(entry);
951 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
952 struct inode *newdir, struct dentry *newent,
953 unsigned int flags, int opcode, size_t argsize)
956 struct fuse_rename2_in inarg;
957 struct fuse_mount *fm = get_fuse_mount(olddir);
960 memset(&inarg, 0, argsize);
961 inarg.newdir = get_node_id(newdir);
963 args.opcode = opcode;
964 args.nodeid = get_node_id(olddir);
966 args.in_args[0].size = argsize;
967 args.in_args[0].value = &inarg;
968 args.in_args[1].size = oldent->d_name.len + 1;
969 args.in_args[1].value = oldent->d_name.name;
970 args.in_args[2].size = newent->d_name.len + 1;
971 args.in_args[2].value = newent->d_name.name;
972 err = fuse_simple_request(fm, &args);
975 fuse_update_ctime(d_inode(oldent));
977 if (flags & RENAME_EXCHANGE)
978 fuse_update_ctime(d_inode(newent));
980 fuse_dir_changed(olddir);
981 if (olddir != newdir)
982 fuse_dir_changed(newdir);
984 /* newent will end up negative */
985 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent))
986 fuse_entry_unlinked(newent);
987 } else if (err == -EINTR) {
988 /* If request was interrupted, DEITY only knows if the
989 rename actually took place. If the invalidation
990 fails (e.g. some process has CWD under the renamed
991 directory), then there can be inconsistency between
992 the dcache and the real filesystem. Tough luck. */
993 fuse_invalidate_entry(oldent);
994 if (d_really_is_positive(newent))
995 fuse_invalidate_entry(newent);
1001 static int fuse_rename2(struct user_namespace *mnt_userns, struct inode *olddir,
1002 struct dentry *oldent, struct inode *newdir,
1003 struct dentry *newent, unsigned int flags)
1005 struct fuse_conn *fc = get_fuse_conn(olddir);
1008 if (fuse_is_bad(olddir))
1011 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
1015 if (fc->no_rename2 || fc->minor < 23)
1018 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
1020 sizeof(struct fuse_rename2_in));
1021 if (err == -ENOSYS) {
1026 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
1028 sizeof(struct fuse_rename_in));
1034 static int fuse_link(struct dentry *entry, struct inode *newdir,
1035 struct dentry *newent)
1038 struct fuse_link_in inarg;
1039 struct inode *inode = d_inode(entry);
1040 struct fuse_mount *fm = get_fuse_mount(inode);
1043 memset(&inarg, 0, sizeof(inarg));
1044 inarg.oldnodeid = get_node_id(inode);
1045 args.opcode = FUSE_LINK;
1046 args.in_numargs = 2;
1047 args.in_args[0].size = sizeof(inarg);
1048 args.in_args[0].value = &inarg;
1049 args.in_args[1].size = newent->d_name.len + 1;
1050 args.in_args[1].value = newent->d_name.name;
1051 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode);
1053 fuse_update_ctime_in_cache(inode);
1054 else if (err == -EINTR)
1055 fuse_invalidate_attr(inode);
1060 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
1063 unsigned int blkbits;
1064 struct fuse_conn *fc = get_fuse_conn(inode);
1066 stat->dev = inode->i_sb->s_dev;
1067 stat->ino = attr->ino;
1068 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
1069 stat->nlink = attr->nlink;
1070 stat->uid = make_kuid(fc->user_ns, attr->uid);
1071 stat->gid = make_kgid(fc->user_ns, attr->gid);
1072 stat->rdev = inode->i_rdev;
1073 stat->atime.tv_sec = attr->atime;
1074 stat->atime.tv_nsec = attr->atimensec;
1075 stat->mtime.tv_sec = attr->mtime;
1076 stat->mtime.tv_nsec = attr->mtimensec;
1077 stat->ctime.tv_sec = attr->ctime;
1078 stat->ctime.tv_nsec = attr->ctimensec;
1079 stat->size = attr->size;
1080 stat->blocks = attr->blocks;
1082 if (attr->blksize != 0)
1083 blkbits = ilog2(attr->blksize);
1085 blkbits = inode->i_sb->s_blocksize_bits;
1087 stat->blksize = 1 << blkbits;
1090 static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
1094 struct fuse_getattr_in inarg;
1095 struct fuse_attr_out outarg;
1096 struct fuse_mount *fm = get_fuse_mount(inode);
1100 attr_version = fuse_get_attr_version(fm->fc);
1102 memset(&inarg, 0, sizeof(inarg));
1103 memset(&outarg, 0, sizeof(outarg));
1104 /* Directories have separate file-handle space */
1105 if (file && S_ISREG(inode->i_mode)) {
1106 struct fuse_file *ff = file->private_data;
1108 inarg.getattr_flags |= FUSE_GETATTR_FH;
1111 args.opcode = FUSE_GETATTR;
1112 args.nodeid = get_node_id(inode);
1113 args.in_numargs = 1;
1114 args.in_args[0].size = sizeof(inarg);
1115 args.in_args[0].value = &inarg;
1116 args.out_numargs = 1;
1117 args.out_args[0].size = sizeof(outarg);
1118 args.out_args[0].value = &outarg;
1119 err = fuse_simple_request(fm, &args);
1121 if (fuse_invalid_attr(&outarg.attr) ||
1122 inode_wrong_type(inode, outarg.attr.mode)) {
1123 fuse_make_bad(inode);
1126 fuse_change_attributes(inode, &outarg.attr,
1127 attr_timeout(&outarg),
1130 fuse_fillattr(inode, &outarg.attr, stat);
1136 static int fuse_update_get_attr(struct inode *inode, struct file *file,
1137 struct kstat *stat, u32 request_mask,
1140 struct fuse_inode *fi = get_fuse_inode(inode);
1143 u32 inval_mask = READ_ONCE(fi->inval_mask);
1144 u32 cache_mask = fuse_get_cache_mask(inode);
1146 if (flags & AT_STATX_FORCE_SYNC)
1148 else if (flags & AT_STATX_DONT_SYNC)
1150 else if (request_mask & inval_mask & ~cache_mask)
1153 sync = time_before64(fi->i_time, get_jiffies_64());
1156 forget_all_cached_acls(inode);
1157 err = fuse_do_getattr(inode, stat, file);
1159 generic_fillattr(&init_user_ns, inode, stat);
1160 stat->mode = fi->orig_i_mode;
1161 stat->ino = fi->orig_ino;
1167 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask)
1169 return fuse_update_get_attr(inode, file, NULL, mask, 0);
1172 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
1173 u64 child_nodeid, struct qstr *name, u32 flags)
1176 struct inode *parent;
1178 struct dentry *entry;
1180 parent = fuse_ilookup(fc, parent_nodeid, NULL);
1184 inode_lock_nested(parent, I_MUTEX_PARENT);
1185 if (!S_ISDIR(parent->i_mode))
1189 dir = d_find_alias(parent);
1193 name->hash = full_name_hash(dir, name->name, name->len);
1194 entry = d_lookup(dir, name);
1199 fuse_dir_changed(parent);
1200 if (!(flags & FUSE_EXPIRE_ONLY))
1201 d_invalidate(entry);
1202 fuse_invalidate_entry_cache(entry);
1204 if (child_nodeid != 0 && d_really_is_positive(entry)) {
1205 inode_lock(d_inode(entry));
1206 if (get_node_id(d_inode(entry)) != child_nodeid) {
1210 if (d_mountpoint(entry)) {
1214 if (d_is_dir(entry)) {
1215 shrink_dcache_parent(entry);
1216 if (!simple_empty(entry)) {
1220 d_inode(entry)->i_flags |= S_DEAD;
1223 clear_nlink(d_inode(entry));
1226 inode_unlock(d_inode(entry));
1235 inode_unlock(parent);
1240 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc)
1242 const struct cred *cred = current_cred();
1244 return (uid_eq(cred->euid, fc->user_id) &&
1245 uid_eq(cred->suid, fc->user_id) &&
1246 uid_eq(cred->uid, fc->user_id) &&
1247 gid_eq(cred->egid, fc->group_id) &&
1248 gid_eq(cred->sgid, fc->group_id) &&
1249 gid_eq(cred->gid, fc->group_id));
1253 * Calling into a user-controlled filesystem gives the filesystem
1254 * daemon ptrace-like capabilities over the current process. This
1255 * means, that the filesystem daemon is able to record the exact
1256 * filesystem operations performed, and can also control the behavior
1257 * of the requester process in otherwise impossible ways. For example
1258 * it can delay the operation for arbitrary length of time allowing
1259 * DoS against the requester.
1261 * For this reason only those processes can call into the filesystem,
1262 * for which the owner of the mount has ptrace privilege. This
1263 * excludes processes started by other users, suid or sgid processes.
1265 bool fuse_allow_current_process(struct fuse_conn *fc)
1269 if (fc->allow_other)
1270 allow = current_in_userns(fc->user_ns);
1272 allow = fuse_permissible_uidgid(fc);
1274 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN))
1280 static int fuse_access(struct inode *inode, int mask)
1282 struct fuse_mount *fm = get_fuse_mount(inode);
1284 struct fuse_access_in inarg;
1287 BUG_ON(mask & MAY_NOT_BLOCK);
1289 if (fm->fc->no_access)
1292 memset(&inarg, 0, sizeof(inarg));
1293 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
1294 args.opcode = FUSE_ACCESS;
1295 args.nodeid = get_node_id(inode);
1296 args.in_numargs = 1;
1297 args.in_args[0].size = sizeof(inarg);
1298 args.in_args[0].value = &inarg;
1299 err = fuse_simple_request(fm, &args);
1300 if (err == -ENOSYS) {
1301 fm->fc->no_access = 1;
1307 static int fuse_perm_getattr(struct inode *inode, int mask)
1309 if (mask & MAY_NOT_BLOCK)
1312 forget_all_cached_acls(inode);
1313 return fuse_do_getattr(inode, NULL, NULL);
1317 * Check permission. The two basic access models of FUSE are:
1319 * 1) Local access checking ('default_permissions' mount option) based
1320 * on file mode. This is the plain old disk filesystem permission
1323 * 2) "Remote" access checking, where server is responsible for
1324 * checking permission in each inode operation. An exception to this
1325 * is if ->permission() was invoked from sys_access() in which case an
1326 * access request is sent. Execute permission is still checked
1327 * locally based on file mode.
1329 static int fuse_permission(struct user_namespace *mnt_userns,
1330 struct inode *inode, int mask)
1332 struct fuse_conn *fc = get_fuse_conn(inode);
1333 bool refreshed = false;
1336 if (fuse_is_bad(inode))
1339 if (!fuse_allow_current_process(fc))
1343 * If attributes are needed, refresh them before proceeding
1345 if (fc->default_permissions ||
1346 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
1347 struct fuse_inode *fi = get_fuse_inode(inode);
1348 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
1350 if (perm_mask & READ_ONCE(fi->inval_mask) ||
1351 time_before64(fi->i_time, get_jiffies_64())) {
1354 err = fuse_perm_getattr(inode, mask);
1360 if (fc->default_permissions) {
1361 err = generic_permission(&init_user_ns, inode, mask);
1363 /* If permission is denied, try to refresh file
1364 attributes. This is also needed, because the root
1365 node will at first have no permissions */
1366 if (err == -EACCES && !refreshed) {
1367 err = fuse_perm_getattr(inode, mask);
1369 err = generic_permission(&init_user_ns,
1373 /* Note: the opposite of the above test does not
1374 exist. So if permissions are revoked this won't be
1375 noticed immediately, only after the attribute
1376 timeout has expired */
1377 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
1378 err = fuse_access(inode, mask);
1379 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1380 if (!(inode->i_mode & S_IXUGO)) {
1384 err = fuse_perm_getattr(inode, mask);
1385 if (!err && !(inode->i_mode & S_IXUGO))
1392 static int fuse_readlink_page(struct inode *inode, struct page *page)
1394 struct fuse_mount *fm = get_fuse_mount(inode);
1395 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1396 struct fuse_args_pages ap = {
1404 ap.args.opcode = FUSE_READLINK;
1405 ap.args.nodeid = get_node_id(inode);
1406 ap.args.out_pages = true;
1407 ap.args.out_argvar = true;
1408 ap.args.page_zeroing = true;
1409 ap.args.out_numargs = 1;
1410 ap.args.out_args[0].size = desc.length;
1411 res = fuse_simple_request(fm, &ap.args);
1413 fuse_invalidate_atime(inode);
1418 if (WARN_ON(res >= PAGE_SIZE))
1421 link = page_address(page);
1427 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1428 struct delayed_call *callback)
1430 struct fuse_conn *fc = get_fuse_conn(inode);
1435 if (fuse_is_bad(inode))
1438 if (fc->cache_symlinks)
1439 return page_get_link(dentry, inode, callback);
1445 page = alloc_page(GFP_KERNEL);
1450 err = fuse_readlink_page(inode, page);
1456 set_delayed_call(callback, page_put_link, page);
1458 return page_address(page);
1461 return ERR_PTR(err);
1464 static int fuse_dir_open(struct inode *inode, struct file *file)
1466 return fuse_open_common(inode, file, true);
1469 static int fuse_dir_release(struct inode *inode, struct file *file)
1471 fuse_release_common(file, true);
1476 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1479 struct inode *inode = file->f_mapping->host;
1480 struct fuse_conn *fc = get_fuse_conn(inode);
1483 if (fuse_is_bad(inode))
1486 if (fc->no_fsyncdir)
1490 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1491 if (err == -ENOSYS) {
1492 fc->no_fsyncdir = 1;
1495 inode_unlock(inode);
1500 static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1503 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1505 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1509 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1512 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1515 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1520 return fuse_ioctl_common(file, cmd, arg,
1521 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1524 static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
1526 /* Always update if mtime is explicitly set */
1527 if (ivalid & ATTR_MTIME_SET)
1530 /* Or if kernel i_mtime is the official one */
1531 if (trust_local_mtime)
1534 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1535 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1538 /* In all other cases update */
1542 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1543 struct fuse_setattr_in *arg, bool trust_local_cmtime)
1545 unsigned ivalid = iattr->ia_valid;
1547 if (ivalid & ATTR_MODE)
1548 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
1549 if (ivalid & ATTR_UID)
1550 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
1551 if (ivalid & ATTR_GID)
1552 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
1553 if (ivalid & ATTR_SIZE)
1554 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
1555 if (ivalid & ATTR_ATIME) {
1556 arg->valid |= FATTR_ATIME;
1557 arg->atime = iattr->ia_atime.tv_sec;
1558 arg->atimensec = iattr->ia_atime.tv_nsec;
1559 if (!(ivalid & ATTR_ATIME_SET))
1560 arg->valid |= FATTR_ATIME_NOW;
1562 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
1563 arg->valid |= FATTR_MTIME;
1564 arg->mtime = iattr->ia_mtime.tv_sec;
1565 arg->mtimensec = iattr->ia_mtime.tv_nsec;
1566 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
1567 arg->valid |= FATTR_MTIME_NOW;
1569 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1570 arg->valid |= FATTR_CTIME;
1571 arg->ctime = iattr->ia_ctime.tv_sec;
1572 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1577 * Prevent concurrent writepages on inode
1579 * This is done by adding a negative bias to the inode write counter
1580 * and waiting for all pending writes to finish.
1582 void fuse_set_nowrite(struct inode *inode)
1584 struct fuse_inode *fi = get_fuse_inode(inode);
1586 BUG_ON(!inode_is_locked(inode));
1588 spin_lock(&fi->lock);
1589 BUG_ON(fi->writectr < 0);
1590 fi->writectr += FUSE_NOWRITE;
1591 spin_unlock(&fi->lock);
1592 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1596 * Allow writepages on inode
1598 * Remove the bias from the writecounter and send any queued
1601 static void __fuse_release_nowrite(struct inode *inode)
1603 struct fuse_inode *fi = get_fuse_inode(inode);
1605 BUG_ON(fi->writectr != FUSE_NOWRITE);
1607 fuse_flush_writepages(inode);
1610 void fuse_release_nowrite(struct inode *inode)
1612 struct fuse_inode *fi = get_fuse_inode(inode);
1614 spin_lock(&fi->lock);
1615 __fuse_release_nowrite(inode);
1616 spin_unlock(&fi->lock);
1619 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
1620 struct inode *inode,
1621 struct fuse_setattr_in *inarg_p,
1622 struct fuse_attr_out *outarg_p)
1624 args->opcode = FUSE_SETATTR;
1625 args->nodeid = get_node_id(inode);
1626 args->in_numargs = 1;
1627 args->in_args[0].size = sizeof(*inarg_p);
1628 args->in_args[0].value = inarg_p;
1629 args->out_numargs = 1;
1630 args->out_args[0].size = sizeof(*outarg_p);
1631 args->out_args[0].value = outarg_p;
1635 * Flush inode->i_mtime to the server
1637 int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
1639 struct fuse_mount *fm = get_fuse_mount(inode);
1641 struct fuse_setattr_in inarg;
1642 struct fuse_attr_out outarg;
1644 memset(&inarg, 0, sizeof(inarg));
1645 memset(&outarg, 0, sizeof(outarg));
1647 inarg.valid = FATTR_MTIME;
1648 inarg.mtime = inode->i_mtime.tv_sec;
1649 inarg.mtimensec = inode->i_mtime.tv_nsec;
1650 if (fm->fc->minor >= 23) {
1651 inarg.valid |= FATTR_CTIME;
1652 inarg.ctime = inode->i_ctime.tv_sec;
1653 inarg.ctimensec = inode->i_ctime.tv_nsec;
1656 inarg.valid |= FATTR_FH;
1659 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
1661 return fuse_simple_request(fm, &args);
1665 * Set attributes, and at the same time refresh them.
1667 * Truncation is slightly complicated, because the 'truncate' request
1668 * may fail, in which case we don't want to touch the mapping.
1669 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1670 * and the actual truncation by hand.
1672 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
1675 struct inode *inode = d_inode(dentry);
1676 struct fuse_mount *fm = get_fuse_mount(inode);
1677 struct fuse_conn *fc = fm->fc;
1678 struct fuse_inode *fi = get_fuse_inode(inode);
1679 struct address_space *mapping = inode->i_mapping;
1681 struct fuse_setattr_in inarg;
1682 struct fuse_attr_out outarg;
1683 bool is_truncate = false;
1684 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode);
1687 bool trust_local_cmtime = is_wb;
1688 bool fault_blocked = false;
1690 if (!fc->default_permissions)
1691 attr->ia_valid |= ATTR_FORCE;
1693 err = setattr_prepare(&init_user_ns, dentry, attr);
1697 if (attr->ia_valid & ATTR_SIZE) {
1698 if (WARN_ON(!S_ISREG(inode->i_mode)))
1703 if (FUSE_IS_DAX(inode) && is_truncate) {
1704 filemap_invalidate_lock(mapping);
1705 fault_blocked = true;
1706 err = fuse_dax_break_layouts(inode, 0, 0);
1708 filemap_invalidate_unlock(mapping);
1713 if (attr->ia_valid & ATTR_OPEN) {
1714 /* This is coming from open(..., ... | O_TRUNC); */
1715 WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1716 WARN_ON(attr->ia_size != 0);
1717 if (fc->atomic_o_trunc) {
1719 * No need to send request to userspace, since actual
1720 * truncation has already been done by OPEN. But still
1721 * need to truncate page cache.
1723 i_size_write(inode, 0);
1724 truncate_pagecache(inode, 0);
1730 /* Flush dirty data/metadata before non-truncate SETATTR */
1733 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1735 err = write_inode_now(inode, true);
1739 fuse_set_nowrite(inode);
1740 fuse_release_nowrite(inode);
1744 fuse_set_nowrite(inode);
1745 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1746 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1747 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
1750 memset(&inarg, 0, sizeof(inarg));
1751 memset(&outarg, 0, sizeof(outarg));
1752 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
1754 struct fuse_file *ff = file->private_data;
1755 inarg.valid |= FATTR_FH;
1759 /* Kill suid/sgid for non-directory chown unconditionally */
1760 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
1761 attr->ia_valid & (ATTR_UID | ATTR_GID))
1762 inarg.valid |= FATTR_KILL_SUIDGID;
1764 if (attr->ia_valid & ATTR_SIZE) {
1765 /* For mandatory locking in truncate */
1766 inarg.valid |= FATTR_LOCKOWNER;
1767 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1769 /* Kill suid/sgid for truncate only if no CAP_FSETID */
1770 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1771 inarg.valid |= FATTR_KILL_SUIDGID;
1773 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1774 err = fuse_simple_request(fm, &args);
1777 fuse_invalidate_attr(inode);
1781 if (fuse_invalid_attr(&outarg.attr) ||
1782 inode_wrong_type(inode, outarg.attr.mode)) {
1783 fuse_make_bad(inode);
1788 spin_lock(&fi->lock);
1789 /* the kernel maintains i_mtime locally */
1790 if (trust_local_cmtime) {
1791 if (attr->ia_valid & ATTR_MTIME)
1792 inode->i_mtime = attr->ia_mtime;
1793 if (attr->ia_valid & ATTR_CTIME)
1794 inode->i_ctime = attr->ia_ctime;
1795 /* FIXME: clear I_DIRTY_SYNC? */
1798 fuse_change_attributes_common(inode, &outarg.attr,
1799 attr_timeout(&outarg),
1800 fuse_get_cache_mask(inode));
1801 oldsize = inode->i_size;
1802 /* see the comment in fuse_change_attributes() */
1803 if (!is_wb || is_truncate)
1804 i_size_write(inode, outarg.attr.size);
1807 /* NOTE: this may release/reacquire fi->lock */
1808 __fuse_release_nowrite(inode);
1810 spin_unlock(&fi->lock);
1813 * Only call invalidate_inode_pages2() after removing
1814 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock.
1816 if ((is_truncate || !is_wb) &&
1817 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
1818 truncate_pagecache(inode, outarg.attr.size);
1819 invalidate_inode_pages2(mapping);
1822 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1825 filemap_invalidate_unlock(mapping);
1831 fuse_release_nowrite(inode);
1833 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1836 filemap_invalidate_unlock(mapping);
1840 static int fuse_setattr(struct user_namespace *mnt_userns, struct dentry *entry,
1843 struct inode *inode = d_inode(entry);
1844 struct fuse_conn *fc = get_fuse_conn(inode);
1845 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
1848 if (fuse_is_bad(inode))
1851 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1854 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
1855 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1859 * The only sane way to reliably kill suid/sgid is to do it in
1860 * the userspace filesystem
1862 * This should be done on write(), truncate() and chown().
1864 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
1866 * ia_mode calculation may have used stale i_mode.
1867 * Refresh and recalculate.
1869 ret = fuse_do_getattr(inode, NULL, file);
1873 attr->ia_mode = inode->i_mode;
1874 if (inode->i_mode & S_ISUID) {
1875 attr->ia_valid |= ATTR_MODE;
1876 attr->ia_mode &= ~S_ISUID;
1878 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
1879 attr->ia_valid |= ATTR_MODE;
1880 attr->ia_mode &= ~S_ISGID;
1884 if (!attr->ia_valid)
1887 ret = fuse_do_setattr(entry, attr, file);
1890 * If filesystem supports acls it may have updated acl xattrs in
1891 * the filesystem, so forget cached acls for the inode.
1894 forget_all_cached_acls(inode);
1896 /* Directory mode changed, may need to revalidate access */
1897 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1898 fuse_invalidate_entry_cache(entry);
1903 static int fuse_getattr(struct user_namespace *mnt_userns,
1904 const struct path *path, struct kstat *stat,
1905 u32 request_mask, unsigned int flags)
1907 struct inode *inode = d_inode(path->dentry);
1908 struct fuse_conn *fc = get_fuse_conn(inode);
1910 if (fuse_is_bad(inode))
1913 if (!fuse_allow_current_process(fc)) {
1914 if (!request_mask) {
1916 * If user explicitly requested *nothing* then don't
1917 * error out, but return st_dev only.
1919 stat->result_mask = 0;
1920 stat->dev = inode->i_sb->s_dev;
1926 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
1929 static const struct inode_operations fuse_dir_inode_operations = {
1930 .lookup = fuse_lookup,
1931 .mkdir = fuse_mkdir,
1932 .symlink = fuse_symlink,
1933 .unlink = fuse_unlink,
1934 .rmdir = fuse_rmdir,
1935 .rename = fuse_rename2,
1937 .setattr = fuse_setattr,
1938 .create = fuse_create,
1939 .atomic_open = fuse_atomic_open,
1940 .tmpfile = fuse_tmpfile,
1941 .mknod = fuse_mknod,
1942 .permission = fuse_permission,
1943 .getattr = fuse_getattr,
1944 .listxattr = fuse_listxattr,
1945 .get_inode_acl = fuse_get_inode_acl,
1946 .get_acl = fuse_get_acl,
1947 .set_acl = fuse_set_acl,
1948 .fileattr_get = fuse_fileattr_get,
1949 .fileattr_set = fuse_fileattr_set,
1952 static const struct file_operations fuse_dir_operations = {
1953 .llseek = generic_file_llseek,
1954 .read = generic_read_dir,
1955 .iterate_shared = fuse_readdir,
1956 .open = fuse_dir_open,
1957 .release = fuse_dir_release,
1958 .fsync = fuse_dir_fsync,
1959 .unlocked_ioctl = fuse_dir_ioctl,
1960 .compat_ioctl = fuse_dir_compat_ioctl,
1963 static const struct inode_operations fuse_common_inode_operations = {
1964 .setattr = fuse_setattr,
1965 .permission = fuse_permission,
1966 .getattr = fuse_getattr,
1967 .listxattr = fuse_listxattr,
1968 .get_inode_acl = fuse_get_inode_acl,
1969 .get_acl = fuse_get_acl,
1970 .set_acl = fuse_set_acl,
1971 .fileattr_get = fuse_fileattr_get,
1972 .fileattr_set = fuse_fileattr_set,
1975 static const struct inode_operations fuse_symlink_inode_operations = {
1976 .setattr = fuse_setattr,
1977 .get_link = fuse_get_link,
1978 .getattr = fuse_getattr,
1979 .listxattr = fuse_listxattr,
1982 void fuse_init_common(struct inode *inode)
1984 inode->i_op = &fuse_common_inode_operations;
1987 void fuse_init_dir(struct inode *inode)
1989 struct fuse_inode *fi = get_fuse_inode(inode);
1991 inode->i_op = &fuse_dir_inode_operations;
1992 inode->i_fop = &fuse_dir_operations;
1994 spin_lock_init(&fi->rdc.lock);
1995 fi->rdc.cached = false;
1998 fi->rdc.version = 0;
2001 static int fuse_symlink_read_folio(struct file *null, struct folio *folio)
2003 int err = fuse_readlink_page(folio->mapping->host, &folio->page);
2006 folio_mark_uptodate(folio);
2008 folio_unlock(folio);
2013 static const struct address_space_operations fuse_symlink_aops = {
2014 .read_folio = fuse_symlink_read_folio,
2017 void fuse_init_symlink(struct inode *inode)
2019 inode->i_op = &fuse_symlink_inode_operations;
2020 inode->i_data.a_ops = &fuse_symlink_aops;
2021 inode_nohighmem(inode);