]>
Commit | Line | Data |
---|---|---|
0c9b70d5 HR |
1 | /* |
2 | * Present a block device as a raw image through FUSE | |
3 | * | |
4 | * Copyright (c) 2020 Max Reitz <[email protected]> | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; under version 2 or later of the License. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, | |
11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | * GNU General Public License for more details. | |
14 | * | |
15 | * You should have received a copy of the GNU General Public License | |
16 | * along with this program; if not, see <http://www.gnu.org/licenses/>. | |
17 | */ | |
18 | ||
19 | #define FUSE_USE_VERSION 31 | |
20 | ||
21 | #include "qemu/osdep.h" | |
5df022cf | 22 | #include "qemu/memalign.h" |
0c9b70d5 HR |
23 | #include "block/aio.h" |
24 | #include "block/block.h" | |
25 | #include "block/export.h" | |
26 | #include "block/fuse.h" | |
27 | #include "block/qapi.h" | |
28 | #include "qapi/error.h" | |
29 | #include "qapi/qapi-commands-block.h" | |
30 | #include "sysemu/block-backend.h" | |
31 | ||
32 | #include <fuse.h> | |
33 | #include <fuse_lowlevel.h> | |
34 | ||
30433203 FF |
35 | #if defined(CONFIG_FALLOCATE_ZERO_RANGE) |
36 | #include <linux/falloc.h> | |
37 | #endif | |
38 | ||
28031d5c FF |
39 | #ifdef __linux__ |
40 | #include <linux/fs.h> | |
41 | #endif | |
0c9b70d5 HR |
42 | |
43 | /* Prevent overly long bounce buffer allocations */ | |
44 | #define FUSE_MAX_BOUNCE_BYTES (MIN(BDRV_REQUEST_MAX_BYTES, 64 * 1024 * 1024)) | |
45 | ||
46 | ||
47 | typedef struct FuseExport { | |
48 | BlockExport common; | |
49 | ||
50 | struct fuse_session *fuse_session; | |
51 | struct fuse_buf fuse_buf; | |
52 | bool mounted, fd_handler_set_up; | |
53 | ||
54 | char *mountpoint; | |
55 | bool writable; | |
4fba06d5 | 56 | bool growable; |
8fc54f94 HR |
57 | /* Whether allow_other was used as a mount option or not */ |
58 | bool allow_other; | |
6aeeaed2 HR |
59 | |
60 | mode_t st_mode; | |
61 | uid_t st_uid; | |
62 | gid_t st_gid; | |
0c9b70d5 HR |
63 | } FuseExport; |
64 | ||
65 | static GHashTable *exports; | |
66 | static const struct fuse_lowlevel_ops fuse_ops; | |
67 | ||
68 | static void fuse_export_shutdown(BlockExport *exp); | |
69 | static void fuse_export_delete(BlockExport *exp); | |
70 | ||
71 | static void init_exports_table(void); | |
72 | ||
73 | static int setup_fuse_export(FuseExport *exp, const char *mountpoint, | |
8fc54f94 | 74 | bool allow_other, Error **errp); |
0c9b70d5 HR |
75 | static void read_from_fuse_export(void *opaque); |
76 | ||
77 | static bool is_regular_file(const char *path, Error **errp); | |
78 | ||
79 | ||
80 | static int fuse_export_create(BlockExport *blk_exp, | |
81 | BlockExportOptions *blk_exp_args, | |
82 | Error **errp) | |
83 | { | |
84 | FuseExport *exp = container_of(blk_exp, FuseExport, common); | |
85 | BlockExportOptionsFuse *args = &blk_exp_args->u.fuse; | |
86 | int ret; | |
87 | ||
88 | assert(blk_exp_args->type == BLOCK_EXPORT_TYPE_FUSE); | |
89 | ||
8cc5882c EGE |
90 | /* For growable and writable exports, take the RESIZE permission */ |
91 | if (args->growable || blk_exp_args->writable) { | |
4fba06d5 HR |
92 | uint64_t blk_perm, blk_shared_perm; |
93 | ||
94 | blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm); | |
95 | ||
96 | ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE, | |
97 | blk_shared_perm, errp); | |
98 | if (ret < 0) { | |
99 | return ret; | |
100 | } | |
101 | } | |
102 | ||
0c9b70d5 HR |
103 | init_exports_table(); |
104 | ||
105 | /* | |
106 | * It is important to do this check before calling is_regular_file() -- | |
107 | * that function will do a stat(), which we would have to handle if we | |
108 | * already exported something on @mountpoint. But we cannot, because | |
109 | * we are currently caught up here. | |
110 | * (Note that ideally we would want to resolve relative paths here, | |
111 | * but bdrv_make_absolute_filename() might do the wrong thing for | |
112 | * paths that contain colons, and realpath() would resolve symlinks, | |
113 | * which we do not want: The mount point is not going to be the | |
114 | * symlink's destination, but the link itself.) | |
115 | * So this will not catch all potential clashes, but hopefully at | |
116 | * least the most common one of specifying exactly the same path | |
117 | * string twice. | |
118 | */ | |
119 | if (g_hash_table_contains(exports, args->mountpoint)) { | |
120 | error_setg(errp, "There already is a FUSE export on '%s'", | |
121 | args->mountpoint); | |
122 | ret = -EEXIST; | |
123 | goto fail; | |
124 | } | |
125 | ||
126 | if (!is_regular_file(args->mountpoint, errp)) { | |
127 | ret = -EINVAL; | |
128 | goto fail; | |
129 | } | |
130 | ||
131 | exp->mountpoint = g_strdup(args->mountpoint); | |
132 | exp->writable = blk_exp_args->writable; | |
4fba06d5 | 133 | exp->growable = args->growable; |
0c9b70d5 | 134 | |
8fc54f94 HR |
135 | /* set default */ |
136 | if (!args->has_allow_other) { | |
137 | args->allow_other = FUSE_EXPORT_ALLOW_OTHER_AUTO; | |
138 | } | |
139 | ||
6aeeaed2 HR |
140 | exp->st_mode = S_IFREG | S_IRUSR; |
141 | if (exp->writable) { | |
142 | exp->st_mode |= S_IWUSR; | |
143 | } | |
144 | exp->st_uid = getuid(); | |
145 | exp->st_gid = getgid(); | |
146 | ||
8fc54f94 HR |
147 | if (args->allow_other == FUSE_EXPORT_ALLOW_OTHER_AUTO) { |
148 | /* Ignore errors on our first attempt */ | |
149 | ret = setup_fuse_export(exp, args->mountpoint, true, NULL); | |
150 | exp->allow_other = ret == 0; | |
151 | if (ret < 0) { | |
152 | ret = setup_fuse_export(exp, args->mountpoint, false, errp); | |
153 | } | |
154 | } else { | |
155 | exp->allow_other = args->allow_other == FUSE_EXPORT_ALLOW_OTHER_ON; | |
156 | ret = setup_fuse_export(exp, args->mountpoint, exp->allow_other, errp); | |
157 | } | |
0c9b70d5 HR |
158 | if (ret < 0) { |
159 | goto fail; | |
160 | } | |
161 | ||
162 | return 0; | |
163 | ||
164 | fail: | |
165 | fuse_export_delete(blk_exp); | |
166 | return ret; | |
167 | } | |
168 | ||
169 | /** | |
170 | * Allocates the global @exports hash table. | |
171 | */ | |
172 | static void init_exports_table(void) | |
173 | { | |
174 | if (exports) { | |
175 | return; | |
176 | } | |
177 | ||
178 | exports = g_hash_table_new_full(g_str_hash, g_str_equal, g_free, NULL); | |
179 | } | |
180 | ||
181 | /** | |
182 | * Create exp->fuse_session and mount it. | |
183 | */ | |
184 | static int setup_fuse_export(FuseExport *exp, const char *mountpoint, | |
8fc54f94 | 185 | bool allow_other, Error **errp) |
0c9b70d5 HR |
186 | { |
187 | const char *fuse_argv[4]; | |
188 | char *mount_opts; | |
189 | struct fuse_args fuse_args; | |
190 | int ret; | |
191 | ||
2c7dd057 HR |
192 | /* |
193 | * max_read needs to match what fuse_init() sets. | |
194 | * max_write need not be supplied. | |
195 | */ | |
8fc54f94 HR |
196 | mount_opts = g_strdup_printf("max_read=%zu,default_permissions%s", |
197 | FUSE_MAX_BOUNCE_BYTES, | |
198 | allow_other ? ",allow_other" : ""); | |
0c9b70d5 HR |
199 | |
200 | fuse_argv[0] = ""; /* Dummy program name */ | |
201 | fuse_argv[1] = "-o"; | |
202 | fuse_argv[2] = mount_opts; | |
203 | fuse_argv[3] = NULL; | |
204 | fuse_args = (struct fuse_args)FUSE_ARGS_INIT(3, (char **)fuse_argv); | |
205 | ||
206 | exp->fuse_session = fuse_session_new(&fuse_args, &fuse_ops, | |
207 | sizeof(fuse_ops), exp); | |
208 | g_free(mount_opts); | |
209 | if (!exp->fuse_session) { | |
210 | error_setg(errp, "Failed to set up FUSE session"); | |
211 | ret = -EIO; | |
212 | goto fail; | |
213 | } | |
214 | ||
215 | ret = fuse_session_mount(exp->fuse_session, mountpoint); | |
216 | if (ret < 0) { | |
217 | error_setg(errp, "Failed to mount FUSE session to export"); | |
218 | ret = -EIO; | |
219 | goto fail; | |
220 | } | |
221 | exp->mounted = true; | |
222 | ||
223 | g_hash_table_insert(exports, g_strdup(mountpoint), NULL); | |
224 | ||
225 | aio_set_fd_handler(exp->common.ctx, | |
226 | fuse_session_fd(exp->fuse_session), true, | |
826cc324 | 227 | read_from_fuse_export, NULL, NULL, NULL, exp); |
0c9b70d5 HR |
228 | exp->fd_handler_set_up = true; |
229 | ||
230 | return 0; | |
231 | ||
232 | fail: | |
233 | fuse_export_shutdown(&exp->common); | |
234 | return ret; | |
235 | } | |
236 | ||
237 | /** | |
238 | * Callback to be invoked when the FUSE session FD can be read from. | |
239 | * (This is basically the FUSE event loop.) | |
240 | */ | |
241 | static void read_from_fuse_export(void *opaque) | |
242 | { | |
243 | FuseExport *exp = opaque; | |
244 | int ret; | |
245 | ||
246 | blk_exp_ref(&exp->common); | |
247 | ||
248 | do { | |
249 | ret = fuse_session_receive_buf(exp->fuse_session, &exp->fuse_buf); | |
250 | } while (ret == -EINTR); | |
251 | if (ret < 0) { | |
252 | goto out; | |
253 | } | |
254 | ||
255 | fuse_session_process_buf(exp->fuse_session, &exp->fuse_buf); | |
256 | ||
257 | out: | |
258 | blk_exp_unref(&exp->common); | |
259 | } | |
260 | ||
261 | static void fuse_export_shutdown(BlockExport *blk_exp) | |
262 | { | |
263 | FuseExport *exp = container_of(blk_exp, FuseExport, common); | |
264 | ||
265 | if (exp->fuse_session) { | |
266 | fuse_session_exit(exp->fuse_session); | |
267 | ||
268 | if (exp->fd_handler_set_up) { | |
269 | aio_set_fd_handler(exp->common.ctx, | |
270 | fuse_session_fd(exp->fuse_session), true, | |
826cc324 | 271 | NULL, NULL, NULL, NULL, NULL); |
0c9b70d5 HR |
272 | exp->fd_handler_set_up = false; |
273 | } | |
274 | } | |
275 | ||
276 | if (exp->mountpoint) { | |
277 | /* | |
278 | * Safe to drop now, because we will not handle any requests | |
279 | * for this export anymore anyway. | |
280 | */ | |
281 | g_hash_table_remove(exports, exp->mountpoint); | |
282 | } | |
283 | } | |
284 | ||
285 | static void fuse_export_delete(BlockExport *blk_exp) | |
286 | { | |
287 | FuseExport *exp = container_of(blk_exp, FuseExport, common); | |
288 | ||
289 | if (exp->fuse_session) { | |
290 | if (exp->mounted) { | |
291 | fuse_session_unmount(exp->fuse_session); | |
292 | } | |
293 | ||
294 | fuse_session_destroy(exp->fuse_session); | |
295 | } | |
296 | ||
297 | free(exp->fuse_buf.mem); | |
298 | g_free(exp->mountpoint); | |
299 | } | |
300 | ||
301 | /** | |
302 | * Check whether @path points to a regular file. If not, put an | |
303 | * appropriate message into *errp. | |
304 | */ | |
305 | static bool is_regular_file(const char *path, Error **errp) | |
306 | { | |
307 | struct stat statbuf; | |
308 | int ret; | |
309 | ||
310 | ret = stat(path, &statbuf); | |
311 | if (ret < 0) { | |
312 | error_setg_errno(errp, errno, "Failed to stat '%s'", path); | |
313 | return false; | |
314 | } | |
315 | ||
316 | if (!S_ISREG(statbuf.st_mode)) { | |
317 | error_setg(errp, "'%s' is not a regular file", path); | |
318 | return false; | |
319 | } | |
320 | ||
321 | return true; | |
322 | } | |
323 | ||
324 | /** | |
325 | * A chance to set change some parameters supplied to FUSE_INIT. | |
326 | */ | |
327 | static void fuse_init(void *userdata, struct fuse_conn_info *conn) | |
328 | { | |
329 | /* | |
330 | * MIN_NON_ZERO() would not be wrong here, but what we set here | |
331 | * must equal what has been passed to fuse_session_new(). | |
332 | * Therefore, as long as max_read must be passed as a mount option | |
333 | * (which libfuse claims will be changed at some point), we have | |
334 | * to set max_read to a fixed value here. | |
335 | */ | |
336 | conn->max_read = FUSE_MAX_BOUNCE_BYTES; | |
337 | ||
338 | conn->max_write = MIN_NON_ZERO(BDRV_REQUEST_MAX_BYTES, conn->max_write); | |
339 | } | |
340 | ||
41429e3d HR |
341 | /** |
342 | * Let clients look up files. Always return ENOENT because we only | |
343 | * care about the mountpoint itself. | |
344 | */ | |
345 | static void fuse_lookup(fuse_req_t req, fuse_ino_t parent, const char *name) | |
346 | { | |
347 | fuse_reply_err(req, ENOENT); | |
348 | } | |
349 | ||
350 | /** | |
351 | * Let clients get file attributes (i.e., stat() the file). | |
352 | */ | |
353 | static void fuse_getattr(fuse_req_t req, fuse_ino_t inode, | |
354 | struct fuse_file_info *fi) | |
355 | { | |
356 | struct stat statbuf; | |
357 | int64_t length, allocated_blocks; | |
358 | time_t now = time(NULL); | |
359 | FuseExport *exp = fuse_req_userdata(req); | |
41429e3d HR |
360 | |
361 | length = blk_getlength(exp->common.blk); | |
362 | if (length < 0) { | |
363 | fuse_reply_err(req, -length); | |
364 | return; | |
365 | } | |
366 | ||
367 | allocated_blocks = bdrv_get_allocated_file_size(blk_bs(exp->common.blk)); | |
368 | if (allocated_blocks <= 0) { | |
369 | allocated_blocks = DIV_ROUND_UP(length, 512); | |
370 | } else { | |
371 | allocated_blocks = DIV_ROUND_UP(allocated_blocks, 512); | |
372 | } | |
373 | ||
41429e3d HR |
374 | statbuf = (struct stat) { |
375 | .st_ino = inode, | |
6aeeaed2 | 376 | .st_mode = exp->st_mode, |
41429e3d | 377 | .st_nlink = 1, |
6aeeaed2 HR |
378 | .st_uid = exp->st_uid, |
379 | .st_gid = exp->st_gid, | |
41429e3d HR |
380 | .st_size = length, |
381 | .st_blksize = blk_bs(exp->common.blk)->bl.request_alignment, | |
382 | .st_blocks = allocated_blocks, | |
383 | .st_atime = now, | |
384 | .st_mtime = now, | |
385 | .st_ctime = now, | |
386 | }; | |
387 | ||
388 | fuse_reply_attr(req, &statbuf, 1.); | |
389 | } | |
390 | ||
391 | static int fuse_do_truncate(const FuseExport *exp, int64_t size, | |
392 | bool req_zero_write, PreallocMode prealloc) | |
393 | { | |
394 | uint64_t blk_perm, blk_shared_perm; | |
395 | BdrvRequestFlags truncate_flags = 0; | |
8cc5882c EGE |
396 | bool add_resize_perm; |
397 | int ret, ret_check; | |
398 | ||
399 | /* Growable and writable exports have a permanent RESIZE permission */ | |
400 | add_resize_perm = !exp->growable && !exp->writable; | |
41429e3d HR |
401 | |
402 | if (req_zero_write) { | |
403 | truncate_flags |= BDRV_REQ_ZERO_WRITE; | |
404 | } | |
405 | ||
8cc5882c EGE |
406 | if (add_resize_perm) { |
407 | ||
408 | if (!qemu_in_main_thread()) { | |
409 | /* Changing permissions like below only works in the main thread */ | |
410 | return -EPERM; | |
411 | } | |
412 | ||
4fba06d5 | 413 | blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm); |
41429e3d | 414 | |
4fba06d5 HR |
415 | ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE, |
416 | blk_shared_perm, NULL); | |
417 | if (ret < 0) { | |
418 | return ret; | |
419 | } | |
41429e3d HR |
420 | } |
421 | ||
422 | ret = blk_truncate(exp->common.blk, size, true, prealloc, | |
423 | truncate_flags, NULL); | |
424 | ||
8cc5882c | 425 | if (add_resize_perm) { |
4fba06d5 | 426 | /* Must succeed, because we are only giving up the RESIZE permission */ |
8cc5882c EGE |
427 | ret_check = blk_set_perm(exp->common.blk, blk_perm, |
428 | blk_shared_perm, &error_abort); | |
429 | assert(ret_check == 0); | |
4fba06d5 | 430 | } |
41429e3d HR |
431 | |
432 | return ret; | |
433 | } | |
434 | ||
435 | /** | |
6aeeaed2 HR |
436 | * Let clients set file attributes. Only resizing and changing |
437 | * permissions (st_mode, st_uid, st_gid) is allowed. | |
438 | * Changing permissions is only allowed as far as it will actually | |
439 | * permit access: Read-only exports cannot be given +w, and exports | |
440 | * without allow_other cannot be given a different UID or GID, and | |
441 | * they cannot be given non-owner access. | |
41429e3d HR |
442 | */ |
443 | static void fuse_setattr(fuse_req_t req, fuse_ino_t inode, struct stat *statbuf, | |
444 | int to_set, struct fuse_file_info *fi) | |
445 | { | |
446 | FuseExport *exp = fuse_req_userdata(req); | |
6aeeaed2 | 447 | int supported_attrs; |
41429e3d HR |
448 | int ret; |
449 | ||
6aeeaed2 HR |
450 | supported_attrs = FUSE_SET_ATTR_SIZE | FUSE_SET_ATTR_MODE; |
451 | if (exp->allow_other) { | |
452 | supported_attrs |= FUSE_SET_ATTR_UID | FUSE_SET_ATTR_GID; | |
453 | } | |
454 | ||
455 | if (to_set & ~supported_attrs) { | |
41429e3d HR |
456 | fuse_reply_err(req, ENOTSUP); |
457 | return; | |
458 | } | |
459 | ||
6aeeaed2 HR |
460 | /* Do some argument checks first before committing to anything */ |
461 | if (to_set & FUSE_SET_ATTR_MODE) { | |
462 | /* | |
463 | * Without allow_other, non-owners can never access the export, so do | |
464 | * not allow setting permissions for them | |
465 | */ | |
466 | if (!exp->allow_other && | |
467 | (statbuf->st_mode & (S_IRWXG | S_IRWXO)) != 0) | |
468 | { | |
469 | fuse_reply_err(req, EPERM); | |
470 | return; | |
471 | } | |
472 | ||
473 | /* +w for read-only exports makes no sense, disallow it */ | |
474 | if (!exp->writable && | |
475 | (statbuf->st_mode & (S_IWUSR | S_IWGRP | S_IWOTH)) != 0) | |
476 | { | |
477 | fuse_reply_err(req, EROFS); | |
478 | return; | |
479 | } | |
480 | } | |
481 | ||
9bad96a8 HR |
482 | if (to_set & FUSE_SET_ATTR_SIZE) { |
483 | if (!exp->writable) { | |
484 | fuse_reply_err(req, EACCES); | |
485 | return; | |
486 | } | |
487 | ||
488 | ret = fuse_do_truncate(exp, statbuf->st_size, true, PREALLOC_MODE_OFF); | |
489 | if (ret < 0) { | |
490 | fuse_reply_err(req, -ret); | |
491 | return; | |
492 | } | |
41429e3d HR |
493 | } |
494 | ||
6aeeaed2 HR |
495 | if (to_set & FUSE_SET_ATTR_MODE) { |
496 | /* Ignore FUSE-supplied file type, only change the mode */ | |
497 | exp->st_mode = (statbuf->st_mode & 07777) | S_IFREG; | |
498 | } | |
499 | ||
500 | if (to_set & FUSE_SET_ATTR_UID) { | |
501 | exp->st_uid = statbuf->st_uid; | |
502 | } | |
503 | ||
504 | if (to_set & FUSE_SET_ATTR_GID) { | |
505 | exp->st_gid = statbuf->st_gid; | |
506 | } | |
507 | ||
41429e3d HR |
508 | fuse_getattr(req, inode, fi); |
509 | } | |
510 | ||
511 | /** | |
512 | * Let clients open a file (i.e., the exported image). | |
513 | */ | |
514 | static void fuse_open(fuse_req_t req, fuse_ino_t inode, | |
515 | struct fuse_file_info *fi) | |
516 | { | |
517 | fuse_reply_open(req, fi); | |
518 | } | |
519 | ||
520 | /** | |
521 | * Handle client reads from the exported image. | |
522 | */ | |
523 | static void fuse_read(fuse_req_t req, fuse_ino_t inode, | |
524 | size_t size, off_t offset, struct fuse_file_info *fi) | |
525 | { | |
526 | FuseExport *exp = fuse_req_userdata(req); | |
527 | int64_t length; | |
528 | void *buf; | |
529 | int ret; | |
530 | ||
531 | /* Limited by max_read, should not happen */ | |
532 | if (size > FUSE_MAX_BOUNCE_BYTES) { | |
533 | fuse_reply_err(req, EINVAL); | |
534 | return; | |
535 | } | |
536 | ||
537 | /** | |
538 | * Clients will expect short reads at EOF, so we have to limit | |
539 | * offset+size to the image length. | |
540 | */ | |
541 | length = blk_getlength(exp->common.blk); | |
542 | if (length < 0) { | |
543 | fuse_reply_err(req, -length); | |
544 | return; | |
545 | } | |
546 | ||
547 | if (offset + size > length) { | |
548 | size = length - offset; | |
549 | } | |
550 | ||
551 | buf = qemu_try_blockalign(blk_bs(exp->common.blk), size); | |
552 | if (!buf) { | |
553 | fuse_reply_err(req, ENOMEM); | |
554 | return; | |
555 | } | |
556 | ||
a9262f55 | 557 | ret = blk_pread(exp->common.blk, offset, size, buf, 0); |
41429e3d HR |
558 | if (ret >= 0) { |
559 | fuse_reply_buf(req, buf, size); | |
560 | } else { | |
561 | fuse_reply_err(req, -ret); | |
562 | } | |
563 | ||
564 | qemu_vfree(buf); | |
565 | } | |
566 | ||
567 | /** | |
568 | * Handle client writes to the exported image. | |
569 | */ | |
570 | static void fuse_write(fuse_req_t req, fuse_ino_t inode, const char *buf, | |
571 | size_t size, off_t offset, struct fuse_file_info *fi) | |
572 | { | |
573 | FuseExport *exp = fuse_req_userdata(req); | |
574 | int64_t length; | |
575 | int ret; | |
576 | ||
577 | /* Limited by max_write, should not happen */ | |
578 | if (size > BDRV_REQUEST_MAX_BYTES) { | |
579 | fuse_reply_err(req, EINVAL); | |
580 | return; | |
581 | } | |
582 | ||
583 | if (!exp->writable) { | |
584 | fuse_reply_err(req, EACCES); | |
585 | return; | |
586 | } | |
587 | ||
588 | /** | |
589 | * Clients will expect short writes at EOF, so we have to limit | |
590 | * offset+size to the image length. | |
591 | */ | |
592 | length = blk_getlength(exp->common.blk); | |
593 | if (length < 0) { | |
594 | fuse_reply_err(req, -length); | |
595 | return; | |
596 | } | |
597 | ||
598 | if (offset + size > length) { | |
4fba06d5 HR |
599 | if (exp->growable) { |
600 | ret = fuse_do_truncate(exp, offset + size, true, PREALLOC_MODE_OFF); | |
601 | if (ret < 0) { | |
602 | fuse_reply_err(req, -ret); | |
603 | return; | |
604 | } | |
605 | } else { | |
606 | size = length - offset; | |
607 | } | |
41429e3d HR |
608 | } |
609 | ||
a9262f55 | 610 | ret = blk_pwrite(exp->common.blk, offset, size, buf, 0); |
41429e3d HR |
611 | if (ret >= 0) { |
612 | fuse_reply_write(req, size); | |
613 | } else { | |
614 | fuse_reply_err(req, -ret); | |
615 | } | |
616 | } | |
617 | ||
4ca37a96 HR |
618 | /** |
619 | * Let clients perform various fallocate() operations. | |
620 | */ | |
621 | static void fuse_fallocate(fuse_req_t req, fuse_ino_t inode, int mode, | |
622 | off_t offset, off_t length, | |
623 | struct fuse_file_info *fi) | |
624 | { | |
625 | FuseExport *exp = fuse_req_userdata(req); | |
626 | int64_t blk_len; | |
627 | int ret; | |
628 | ||
629 | if (!exp->writable) { | |
630 | fuse_reply_err(req, EACCES); | |
631 | return; | |
632 | } | |
633 | ||
634 | blk_len = blk_getlength(exp->common.blk); | |
635 | if (blk_len < 0) { | |
636 | fuse_reply_err(req, -blk_len); | |
637 | return; | |
638 | } | |
639 | ||
3c9c7034 | 640 | #ifdef CONFIG_FALLOCATE_PUNCH_HOLE |
4ca37a96 HR |
641 | if (mode & FALLOC_FL_KEEP_SIZE) { |
642 | length = MIN(length, blk_len - offset); | |
643 | } | |
3c9c7034 | 644 | #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */ |
4ca37a96 | 645 | |
ac504194 PMD |
646 | if (!mode) { |
647 | /* We can only fallocate at the EOF with a truncate */ | |
648 | if (offset < blk_len) { | |
649 | fuse_reply_err(req, EOPNOTSUPP); | |
650 | return; | |
651 | } | |
652 | ||
653 | if (offset > blk_len) { | |
654 | /* No preallocation needed here */ | |
655 | ret = fuse_do_truncate(exp, offset, true, PREALLOC_MODE_OFF); | |
656 | if (ret < 0) { | |
657 | fuse_reply_err(req, -ret); | |
658 | return; | |
659 | } | |
660 | } | |
661 | ||
662 | ret = fuse_do_truncate(exp, offset + length, true, | |
663 | PREALLOC_MODE_FALLOC); | |
664 | } | |
3c9c7034 | 665 | #ifdef CONFIG_FALLOCATE_PUNCH_HOLE |
ac504194 | 666 | else if (mode & FALLOC_FL_PUNCH_HOLE) { |
4ca37a96 HR |
667 | if (!(mode & FALLOC_FL_KEEP_SIZE)) { |
668 | fuse_reply_err(req, EINVAL); | |
669 | return; | |
670 | } | |
671 | ||
672 | do { | |
673 | int size = MIN(length, BDRV_REQUEST_MAX_BYTES); | |
674 | ||
675 | ret = blk_pdiscard(exp->common.blk, offset, size); | |
676 | offset += size; | |
677 | length -= size; | |
678 | } while (ret == 0 && length > 0); | |
50482fda | 679 | } |
3c9c7034 | 680 | #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */ |
50482fda FF |
681 | #ifdef CONFIG_FALLOCATE_ZERO_RANGE |
682 | else if (mode & FALLOC_FL_ZERO_RANGE) { | |
4ca37a96 HR |
683 | if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + length > blk_len) { |
684 | /* No need for zeroes, we are going to write them ourselves */ | |
685 | ret = fuse_do_truncate(exp, offset + length, false, | |
686 | PREALLOC_MODE_OFF); | |
687 | if (ret < 0) { | |
688 | fuse_reply_err(req, -ret); | |
689 | return; | |
690 | } | |
691 | } | |
692 | ||
693 | do { | |
694 | int size = MIN(length, BDRV_REQUEST_MAX_BYTES); | |
695 | ||
696 | ret = blk_pwrite_zeroes(exp->common.blk, | |
697 | offset, size, 0); | |
698 | offset += size; | |
699 | length -= size; | |
700 | } while (ret == 0 && length > 0); | |
50482fda FF |
701 | } |
702 | #endif /* CONFIG_FALLOCATE_ZERO_RANGE */ | |
ac504194 | 703 | else { |
4ca37a96 HR |
704 | ret = -EOPNOTSUPP; |
705 | } | |
706 | ||
707 | fuse_reply_err(req, ret < 0 ? -ret : 0); | |
708 | } | |
709 | ||
41429e3d HR |
710 | /** |
711 | * Let clients fsync the exported image. | |
712 | */ | |
713 | static void fuse_fsync(fuse_req_t req, fuse_ino_t inode, int datasync, | |
714 | struct fuse_file_info *fi) | |
715 | { | |
716 | FuseExport *exp = fuse_req_userdata(req); | |
717 | int ret; | |
718 | ||
719 | ret = blk_flush(exp->common.blk); | |
720 | fuse_reply_err(req, ret < 0 ? -ret : 0); | |
721 | } | |
722 | ||
723 | /** | |
724 | * Called before an FD to the exported image is closed. (libfuse | |
725 | * notes this to be a way to return last-minute errors.) | |
726 | */ | |
727 | static void fuse_flush(fuse_req_t req, fuse_ino_t inode, | |
728 | struct fuse_file_info *fi) | |
729 | { | |
730 | fuse_fsync(req, inode, 1, fi); | |
731 | } | |
732 | ||
df4ea709 HR |
733 | #ifdef CONFIG_FUSE_LSEEK |
734 | /** | |
735 | * Let clients inquire allocation status. | |
736 | */ | |
737 | static void fuse_lseek(fuse_req_t req, fuse_ino_t inode, off_t offset, | |
738 | int whence, struct fuse_file_info *fi) | |
739 | { | |
740 | FuseExport *exp = fuse_req_userdata(req); | |
741 | ||
742 | if (whence != SEEK_HOLE && whence != SEEK_DATA) { | |
743 | fuse_reply_err(req, EINVAL); | |
744 | return; | |
745 | } | |
746 | ||
747 | while (true) { | |
748 | int64_t pnum; | |
749 | int ret; | |
750 | ||
751 | ret = bdrv_block_status_above(blk_bs(exp->common.blk), NULL, | |
752 | offset, INT64_MAX, &pnum, NULL, NULL); | |
753 | if (ret < 0) { | |
754 | fuse_reply_err(req, -ret); | |
755 | return; | |
756 | } | |
757 | ||
758 | if (!pnum && (ret & BDRV_BLOCK_EOF)) { | |
759 | int64_t blk_len; | |
760 | ||
761 | /* | |
762 | * If blk_getlength() rounds (e.g. by sectors), then the | |
763 | * export length will be rounded, too. However, | |
764 | * bdrv_block_status_above() may return EOF at unaligned | |
765 | * offsets. We must not let this become visible and thus | |
766 | * always simulate a hole between @offset (the real EOF) | |
767 | * and @blk_len (the client-visible EOF). | |
768 | */ | |
769 | ||
770 | blk_len = blk_getlength(exp->common.blk); | |
771 | if (blk_len < 0) { | |
772 | fuse_reply_err(req, -blk_len); | |
773 | return; | |
774 | } | |
775 | ||
776 | if (offset > blk_len || whence == SEEK_DATA) { | |
777 | fuse_reply_err(req, ENXIO); | |
778 | } else { | |
779 | fuse_reply_lseek(req, offset); | |
780 | } | |
781 | return; | |
782 | } | |
783 | ||
784 | if (ret & BDRV_BLOCK_DATA) { | |
785 | if (whence == SEEK_DATA) { | |
786 | fuse_reply_lseek(req, offset); | |
787 | return; | |
788 | } | |
789 | } else { | |
790 | if (whence == SEEK_HOLE) { | |
791 | fuse_reply_lseek(req, offset); | |
792 | return; | |
793 | } | |
794 | } | |
795 | ||
796 | /* Safety check against infinite loops */ | |
797 | if (!pnum) { | |
798 | fuse_reply_err(req, ENXIO); | |
799 | return; | |
800 | } | |
801 | ||
802 | offset += pnum; | |
803 | } | |
804 | } | |
805 | #endif | |
806 | ||
0c9b70d5 HR |
807 | static const struct fuse_lowlevel_ops fuse_ops = { |
808 | .init = fuse_init, | |
41429e3d HR |
809 | .lookup = fuse_lookup, |
810 | .getattr = fuse_getattr, | |
811 | .setattr = fuse_setattr, | |
812 | .open = fuse_open, | |
813 | .read = fuse_read, | |
814 | .write = fuse_write, | |
4ca37a96 | 815 | .fallocate = fuse_fallocate, |
41429e3d HR |
816 | .flush = fuse_flush, |
817 | .fsync = fuse_fsync, | |
df4ea709 HR |
818 | #ifdef CONFIG_FUSE_LSEEK |
819 | .lseek = fuse_lseek, | |
820 | #endif | |
0c9b70d5 HR |
821 | }; |
822 | ||
823 | const BlockExportDriver blk_exp_fuse = { | |
824 | .type = BLOCK_EXPORT_TYPE_FUSE, | |
825 | .instance_size = sizeof(FuseExport), | |
826 | .create = fuse_export_create, | |
827 | .delete = fuse_export_delete, | |
828 | .request_shutdown = fuse_export_shutdown, | |
829 | }; |