1 /* 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 7 */ 8 9 #include "fuse_i.h" 10 11 #include <linux/pagemap.h> 12 #include <linux/file.h> 13 #include <linux/fs_context.h> 14 #include <linux/moduleparam.h> 15 #include <linux/sched.h> 16 #include <linux/namei.h> 17 #include <linux/slab.h> 18 #include <linux/xattr.h> 19 #include <linux/iversion.h> 20 #include <linux/posix_acl.h> 21 #include <linux/security.h> 22 #include <linux/types.h> 23 #include <linux/kernel.h> 24 25 static bool __read_mostly allow_sys_admin_access; 26 module_param(allow_sys_admin_access, bool, 0644); 27 MODULE_PARM_DESC(allow_sys_admin_access, 28 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check"); 29 30 static void fuse_advise_use_readdirplus(struct inode *dir) 31 { 32 struct fuse_inode *fi = get_fuse_inode(dir); 33 34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 35 } 36 37 #if BITS_PER_LONG >= 64 38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time) 39 { 40 entry->d_fsdata = (void *) time; 41 } 42 43 static inline u64 fuse_dentry_time(const struct dentry *entry) 44 { 45 return (u64)entry->d_fsdata; 46 } 47 48 #else 49 union fuse_dentry { 50 u64 time; 51 struct rcu_head rcu; 52 }; 53 54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time) 55 { 56 ((union fuse_dentry *) dentry->d_fsdata)->time = time; 57 } 58 59 static inline u64 fuse_dentry_time(const struct dentry *entry) 60 { 61 return ((union fuse_dentry *) entry->d_fsdata)->time; 62 } 63 #endif 64 65 static void fuse_dentry_settime(struct dentry *dentry, u64 time) 66 { 67 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 68 bool delete = !time && fc->delete_stale; 69 /* 70 * Mess with DCACHE_OP_DELETE because dput() will be faster without it. 71 * Don't care about races, either way it's just an optimization 72 */ 73 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) || 74 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) { 75 spin_lock(&dentry->d_lock); 76 if (!delete) 77 dentry->d_flags &= ~DCACHE_OP_DELETE; 78 else 79 dentry->d_flags |= DCACHE_OP_DELETE; 80 spin_unlock(&dentry->d_lock); 81 } 82 83 __fuse_dentry_settime(dentry, time); 84 } 85 86 /* 87 * FUSE caches dentries and attributes with separate timeout. The 88 * time in jiffies until the dentry/attributes are valid is stored in 89 * dentry->d_fsdata and fuse_inode->i_time respectively. 90 */ 91 92 /* 93 * Calculate the time in jiffies until a dentry/attributes are valid 94 */ 95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec) 96 { 97 if (sec || nsec) { 98 struct timespec64 ts = { 99 sec, 100 min_t(u32, nsec, NSEC_PER_SEC - 1) 101 }; 102 103 return get_jiffies_64() + timespec64_to_jiffies(&ts); 104 } else 105 return 0; 106 } 107 108 /* 109 * Set dentry and possibly attribute timeouts from the lookup/mk* 110 * replies 111 */ 112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 113 { 114 fuse_dentry_settime(entry, 115 fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); 116 } 117 118 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 119 { 120 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 121 } 122 123 /* 124 * Mark the attributes as stale, so that at the next call to 125 * ->getattr() they will be fetched from userspace 126 */ 127 void fuse_invalidate_attr(struct inode *inode) 128 { 129 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 130 } 131 132 static void fuse_dir_changed(struct inode *dir) 133 { 134 fuse_invalidate_attr(dir); 135 inode_maybe_inc_iversion(dir, false); 136 } 137 138 /* 139 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 140 * atime is not used. 141 */ 142 void fuse_invalidate_atime(struct inode *inode) 143 { 144 if (!IS_RDONLY(inode)) 145 fuse_invalidate_attr_mask(inode, STATX_ATIME); 146 } 147 148 /* 149 * Just mark the entry as stale, so that a next attempt to look it up 150 * will result in a new lookup call to userspace 151 * 152 * This is called when a dentry is about to become negative and the 153 * timeout is unknown (unlink, rmdir, rename and in some cases 154 * lookup) 155 */ 156 void fuse_invalidate_entry_cache(struct dentry *entry) 157 { 158 fuse_dentry_settime(entry, 0); 159 } 160 161 /* 162 * Same as fuse_invalidate_entry_cache(), but also try to remove the 163 * dentry from the hash 164 */ 165 static void fuse_invalidate_entry(struct dentry *entry) 166 { 167 d_invalidate(entry); 168 fuse_invalidate_entry_cache(entry); 169 } 170 171 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 172 u64 nodeid, const struct qstr *name, 173 struct fuse_entry_out *outarg) 174 { 175 memset(outarg, 0, sizeof(struct fuse_entry_out)); 176 args->opcode = FUSE_LOOKUP; 177 args->nodeid = nodeid; 178 args->in_numargs = 1; 179 args->in_args[0].size = name->len + 1; 180 args->in_args[0].value = name->name; 181 args->out_numargs = 1; 182 args->out_args[0].size = sizeof(struct fuse_entry_out); 183 args->out_args[0].value = outarg; 184 } 185 186 /* 187 * Check whether the dentry is still valid 188 * 189 * If the entry validity timeout has expired and the dentry is 190 * positive, try to redo the lookup. If the lookup results in a 191 * different inode, then let the VFS invalidate the dentry and redo 192 * the lookup once more. If the lookup results in the same inode, 193 * then refresh the attributes, timeouts and mark the dentry valid. 194 */ 195 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 196 { 197 struct inode *inode; 198 struct dentry *parent; 199 struct fuse_mount *fm; 200 struct fuse_inode *fi; 201 int ret; 202 203 inode = d_inode_rcu(entry); 204 if (inode && fuse_is_bad(inode)) 205 goto invalid; 206 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 207 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) { 208 struct fuse_entry_out outarg; 209 FUSE_ARGS(args); 210 struct fuse_forget_link *forget; 211 u64 attr_version; 212 213 /* For negative dentries, always do a fresh lookup */ 214 if (!inode) 215 goto invalid; 216 217 ret = -ECHILD; 218 if (flags & LOOKUP_RCU) 219 goto out; 220 221 fm = get_fuse_mount(inode); 222 223 forget = fuse_alloc_forget(); 224 ret = -ENOMEM; 225 if (!forget) 226 goto out; 227 228 attr_version = fuse_get_attr_version(fm->fc); 229 230 parent = dget_parent(entry); 231 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)), 232 &entry->d_name, &outarg); 233 ret = fuse_simple_request(fm, &args); 234 dput(parent); 235 /* Zero nodeid is same as -ENOENT */ 236 if (!ret && !outarg.nodeid) 237 ret = -ENOENT; 238 if (!ret) { 239 fi = get_fuse_inode(inode); 240 if (outarg.nodeid != get_node_id(inode) || 241 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) { 242 fuse_queue_forget(fm->fc, forget, 243 outarg.nodeid, 1); 244 goto invalid; 245 } 246 spin_lock(&fi->lock); 247 fi->nlookup++; 248 spin_unlock(&fi->lock); 249 } 250 kfree(forget); 251 if (ret == -ENOMEM || ret == -EINTR) 252 goto out; 253 if (ret || fuse_invalid_attr(&outarg.attr) || 254 fuse_stale_inode(inode, outarg.generation, &outarg.attr)) 255 goto invalid; 256 257 forget_all_cached_acls(inode); 258 fuse_change_attributes(inode, &outarg.attr, NULL, 259 ATTR_TIMEOUT(&outarg), 260 attr_version); 261 fuse_change_entry_timeout(entry, &outarg); 262 } else if (inode) { 263 fi = get_fuse_inode(inode); 264 if (flags & LOOKUP_RCU) { 265 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 266 return -ECHILD; 267 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 268 parent = dget_parent(entry); 269 fuse_advise_use_readdirplus(d_inode(parent)); 270 dput(parent); 271 } 272 } 273 ret = 1; 274 out: 275 return ret; 276 277 invalid: 278 ret = 0; 279 goto out; 280 } 281 282 #if BITS_PER_LONG < 64 283 static int fuse_dentry_init(struct dentry *dentry) 284 { 285 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), 286 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE); 287 288 return dentry->d_fsdata ? 0 : -ENOMEM; 289 } 290 static void fuse_dentry_release(struct dentry *dentry) 291 { 292 union fuse_dentry *fd = dentry->d_fsdata; 293 294 kfree_rcu(fd, rcu); 295 } 296 #endif 297 298 static int fuse_dentry_delete(const struct dentry *dentry) 299 { 300 return time_before64(fuse_dentry_time(dentry), get_jiffies_64()); 301 } 302 303 /* 304 * Create a fuse_mount object with a new superblock (with path->dentry 305 * as the root), and return that mount so it can be auto-mounted on 306 * @path. 307 */ 308 static struct vfsmount *fuse_dentry_automount(struct path *path) 309 { 310 struct fs_context *fsc; 311 struct vfsmount *mnt; 312 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry)); 313 314 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry); 315 if (IS_ERR(fsc)) 316 return ERR_CAST(fsc); 317 318 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */ 319 fsc->fs_private = mp_fi; 320 321 /* Create the submount */ 322 mnt = fc_mount(fsc); 323 if (!IS_ERR(mnt)) 324 mntget(mnt); 325 326 put_fs_context(fsc); 327 return mnt; 328 } 329 330 const struct dentry_operations fuse_dentry_operations = { 331 .d_revalidate = fuse_dentry_revalidate, 332 .d_delete = fuse_dentry_delete, 333 #if BITS_PER_LONG < 64 334 .d_init = fuse_dentry_init, 335 .d_release = fuse_dentry_release, 336 #endif 337 .d_automount = fuse_dentry_automount, 338 }; 339 340 const struct dentry_operations fuse_root_dentry_operations = { 341 #if BITS_PER_LONG < 64 342 .d_init = fuse_dentry_init, 343 .d_release = fuse_dentry_release, 344 #endif 345 }; 346 347 int fuse_valid_type(int m) 348 { 349 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 350 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 351 } 352 353 static bool fuse_valid_size(u64 size) 354 { 355 return size <= LLONG_MAX; 356 } 357 358 bool fuse_invalid_attr(struct fuse_attr *attr) 359 { 360 return !fuse_valid_type(attr->mode) || !fuse_valid_size(attr->size); 361 } 362 363 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 364 struct fuse_entry_out *outarg, struct inode **inode) 365 { 366 struct fuse_mount *fm = get_fuse_mount_super(sb); 367 FUSE_ARGS(args); 368 struct fuse_forget_link *forget; 369 u64 attr_version; 370 int err; 371 372 *inode = NULL; 373 err = -ENAMETOOLONG; 374 if (name->len > FUSE_NAME_MAX) 375 goto out; 376 377 378 forget = fuse_alloc_forget(); 379 err = -ENOMEM; 380 if (!forget) 381 goto out; 382 383 attr_version = fuse_get_attr_version(fm->fc); 384 385 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg); 386 err = fuse_simple_request(fm, &args); 387 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 388 if (err || !outarg->nodeid) 389 goto out_put_forget; 390 391 err = -EIO; 392 if (fuse_invalid_attr(&outarg->attr)) 393 goto out_put_forget; 394 395 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 396 &outarg->attr, ATTR_TIMEOUT(outarg), 397 attr_version); 398 err = -ENOMEM; 399 if (!*inode) { 400 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1); 401 goto out; 402 } 403 err = 0; 404 405 out_put_forget: 406 kfree(forget); 407 out: 408 return err; 409 } 410 411 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 412 unsigned int flags) 413 { 414 int err; 415 struct fuse_entry_out outarg; 416 struct inode *inode; 417 struct dentry *newent; 418 bool outarg_valid = true; 419 bool locked; 420 421 if (fuse_is_bad(dir)) 422 return ERR_PTR(-EIO); 423 424 locked = fuse_lock_inode(dir); 425 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 426 &outarg, &inode); 427 fuse_unlock_inode(dir, locked); 428 if (err == -ENOENT) { 429 outarg_valid = false; 430 err = 0; 431 } 432 if (err) 433 goto out_err; 434 435 err = -EIO; 436 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 437 goto out_iput; 438 439 newent = d_splice_alias(inode, entry); 440 err = PTR_ERR(newent); 441 if (IS_ERR(newent)) 442 goto out_err; 443 444 entry = newent ? newent : entry; 445 if (outarg_valid) 446 fuse_change_entry_timeout(entry, &outarg); 447 else 448 fuse_invalidate_entry_cache(entry); 449 450 if (inode) 451 fuse_advise_use_readdirplus(dir); 452 return newent; 453 454 out_iput: 455 iput(inode); 456 out_err: 457 return ERR_PTR(err); 458 } 459 460 static int get_security_context(struct dentry *entry, umode_t mode, 461 struct fuse_in_arg *ext) 462 { 463 struct fuse_secctx *fctx; 464 struct fuse_secctx_header *header; 465 void *ctx = NULL, *ptr; 466 u32 ctxlen, total_len = sizeof(*header); 467 int err, nr_ctx = 0; 468 const char *name; 469 size_t namelen; 470 471 err = security_dentry_init_security(entry, mode, &entry->d_name, 472 &name, &ctx, &ctxlen); 473 if (err) { 474 if (err != -EOPNOTSUPP) 475 goto out_err; 476 /* No LSM is supporting this security hook. Ignore error */ 477 ctxlen = 0; 478 ctx = NULL; 479 } 480 481 if (ctxlen) { 482 nr_ctx = 1; 483 namelen = strlen(name) + 1; 484 err = -EIO; 485 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) 486 goto out_err; 487 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); 488 } 489 490 err = -ENOMEM; 491 header = ptr = kzalloc(total_len, GFP_KERNEL); 492 if (!ptr) 493 goto out_err; 494 495 header->nr_secctx = nr_ctx; 496 header->size = total_len; 497 ptr += sizeof(*header); 498 if (nr_ctx) { 499 fctx = ptr; 500 fctx->size = ctxlen; 501 ptr += sizeof(*fctx); 502 503 strcpy(ptr, name); 504 ptr += namelen; 505 506 memcpy(ptr, ctx, ctxlen); 507 } 508 ext->size = total_len; 509 ext->value = header; 510 err = 0; 511 out_err: 512 kfree(ctx); 513 return err; 514 } 515 516 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes) 517 { 518 void *p; 519 u32 newlen = buf->size + bytes; 520 521 p = krealloc(buf->value, newlen, GFP_KERNEL); 522 if (!p) { 523 kfree(buf->value); 524 buf->size = 0; 525 buf->value = NULL; 526 return NULL; 527 } 528 529 memset(p + buf->size, 0, bytes); 530 buf->value = p; 531 buf->size = newlen; 532 533 return p + newlen - bytes; 534 } 535 536 static u32 fuse_ext_size(size_t size) 537 { 538 return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size); 539 } 540 541 /* 542 * This adds just a single supplementary group that matches the parent's group. 543 */ 544 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext) 545 { 546 struct fuse_conn *fc = get_fuse_conn(dir); 547 struct fuse_ext_header *xh; 548 struct fuse_supp_groups *sg; 549 kgid_t kgid = dir->i_gid; 550 gid_t parent_gid = from_kgid(fc->user_ns, kgid); 551 u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0])); 552 553 if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) || 554 !in_group_p(kgid)) 555 return 0; 556 557 xh = extend_arg(ext, sg_len); 558 if (!xh) 559 return -ENOMEM; 560 561 xh->size = sg_len; 562 xh->type = FUSE_EXT_GROUPS; 563 564 sg = (struct fuse_supp_groups *) &xh[1]; 565 sg->nr_groups = 1; 566 sg->groups[0] = parent_gid; 567 568 return 0; 569 } 570 571 static int get_create_ext(struct fuse_args *args, 572 struct inode *dir, struct dentry *dentry, 573 umode_t mode) 574 { 575 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 576 struct fuse_in_arg ext = { .size = 0, .value = NULL }; 577 int err = 0; 578 579 if (fc->init_security) 580 err = get_security_context(dentry, mode, &ext); 581 if (!err && fc->create_supp_group) 582 err = get_create_supp_group(dir, &ext); 583 584 if (!err && ext.size) { 585 WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args)); 586 args->is_ext = true; 587 args->ext_idx = args->in_numargs++; 588 args->in_args[args->ext_idx] = ext; 589 } else { 590 kfree(ext.value); 591 } 592 593 return err; 594 } 595 596 static void free_ext_value(struct fuse_args *args) 597 { 598 if (args->is_ext) 599 kfree(args->in_args[args->ext_idx].value); 600 } 601 602 /* 603 * Atomic create+open operation 604 * 605 * If the filesystem doesn't support this, then fall back to separate 606 * 'mknod' + 'open' requests. 607 */ 608 static int fuse_create_open(struct inode *dir, struct dentry *entry, 609 struct file *file, unsigned int flags, 610 umode_t mode, u32 opcode) 611 { 612 int err; 613 struct inode *inode; 614 struct fuse_mount *fm = get_fuse_mount(dir); 615 FUSE_ARGS(args); 616 struct fuse_forget_link *forget; 617 struct fuse_create_in inarg; 618 struct fuse_open_out outopen; 619 struct fuse_entry_out outentry; 620 struct fuse_inode *fi; 621 struct fuse_file *ff; 622 bool trunc = flags & O_TRUNC; 623 624 /* Userspace expects S_IFREG in create mode */ 625 BUG_ON((mode & S_IFMT) != S_IFREG); 626 627 forget = fuse_alloc_forget(); 628 err = -ENOMEM; 629 if (!forget) 630 goto out_err; 631 632 err = -ENOMEM; 633 ff = fuse_file_alloc(fm); 634 if (!ff) 635 goto out_put_forget_req; 636 637 if (!fm->fc->dont_mask) 638 mode &= ~current_umask(); 639 640 flags &= ~O_NOCTTY; 641 memset(&inarg, 0, sizeof(inarg)); 642 memset(&outentry, 0, sizeof(outentry)); 643 inarg.flags = flags; 644 inarg.mode = mode; 645 inarg.umask = current_umask(); 646 647 if (fm->fc->handle_killpriv_v2 && trunc && 648 !(flags & O_EXCL) && !capable(CAP_FSETID)) { 649 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID; 650 } 651 652 args.opcode = opcode; 653 args.nodeid = get_node_id(dir); 654 args.in_numargs = 2; 655 args.in_args[0].size = sizeof(inarg); 656 args.in_args[0].value = &inarg; 657 args.in_args[1].size = entry->d_name.len + 1; 658 args.in_args[1].value = entry->d_name.name; 659 args.out_numargs = 2; 660 args.out_args[0].size = sizeof(outentry); 661 args.out_args[0].value = &outentry; 662 args.out_args[1].size = sizeof(outopen); 663 args.out_args[1].value = &outopen; 664 665 err = get_create_ext(&args, dir, entry, mode); 666 if (err) 667 goto out_put_forget_req; 668 669 err = fuse_simple_request(fm, &args); 670 free_ext_value(&args); 671 if (err) 672 goto out_free_ff; 673 674 err = -EIO; 675 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) || 676 fuse_invalid_attr(&outentry.attr)) 677 goto out_free_ff; 678 679 ff->fh = outopen.fh; 680 ff->nodeid = outentry.nodeid; 681 ff->open_flags = outopen.open_flags; 682 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 683 &outentry.attr, ATTR_TIMEOUT(&outentry), 0); 684 if (!inode) { 685 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 686 fuse_sync_release(NULL, ff, flags); 687 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1); 688 err = -ENOMEM; 689 goto out_err; 690 } 691 kfree(forget); 692 d_instantiate(entry, inode); 693 fuse_change_entry_timeout(entry, &outentry); 694 fuse_dir_changed(dir); 695 err = finish_open(file, entry, generic_file_open); 696 if (err) { 697 fi = get_fuse_inode(inode); 698 fuse_sync_release(fi, ff, flags); 699 } else { 700 file->private_data = ff; 701 fuse_finish_open(inode, file); 702 if (fm->fc->atomic_o_trunc && trunc) 703 truncate_pagecache(inode, 0); 704 else if (!(ff->open_flags & FOPEN_KEEP_CACHE)) 705 invalidate_inode_pages2(inode->i_mapping); 706 } 707 return err; 708 709 out_free_ff: 710 fuse_file_free(ff); 711 out_put_forget_req: 712 kfree(forget); 713 out_err: 714 return err; 715 } 716 717 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *, 718 umode_t, dev_t); 719 static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 720 struct file *file, unsigned flags, 721 umode_t mode) 722 { 723 int err; 724 struct fuse_conn *fc = get_fuse_conn(dir); 725 struct dentry *res = NULL; 726 727 if (fuse_is_bad(dir)) 728 return -EIO; 729 730 if (d_in_lookup(entry)) { 731 res = fuse_lookup(dir, entry, 0); 732 if (IS_ERR(res)) 733 return PTR_ERR(res); 734 735 if (res) 736 entry = res; 737 } 738 739 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 740 goto no_open; 741 742 /* Only creates */ 743 file->f_mode |= FMODE_CREATED; 744 745 if (fc->no_create) 746 goto mknod; 747 748 err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE); 749 if (err == -ENOSYS) { 750 fc->no_create = 1; 751 goto mknod; 752 } else if (err == -EEXIST) 753 fuse_invalidate_entry(entry); 754 out_dput: 755 dput(res); 756 return err; 757 758 mknod: 759 err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 760 if (err) 761 goto out_dput; 762 no_open: 763 return finish_no_open(file, res); 764 } 765 766 /* 767 * Code shared between mknod, mkdir, symlink and link 768 */ 769 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args, 770 struct inode *dir, struct dentry *entry, 771 umode_t mode) 772 { 773 struct fuse_entry_out outarg; 774 struct inode *inode; 775 struct dentry *d; 776 int err; 777 struct fuse_forget_link *forget; 778 779 if (fuse_is_bad(dir)) 780 return -EIO; 781 782 forget = fuse_alloc_forget(); 783 if (!forget) 784 return -ENOMEM; 785 786 memset(&outarg, 0, sizeof(outarg)); 787 args->nodeid = get_node_id(dir); 788 args->out_numargs = 1; 789 args->out_args[0].size = sizeof(outarg); 790 args->out_args[0].value = &outarg; 791 792 if (args->opcode != FUSE_LINK) { 793 err = get_create_ext(args, dir, entry, mode); 794 if (err) 795 goto out_put_forget_req; 796 } 797 798 err = fuse_simple_request(fm, args); 799 free_ext_value(args); 800 if (err) 801 goto out_put_forget_req; 802 803 err = -EIO; 804 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr)) 805 goto out_put_forget_req; 806 807 if ((outarg.attr.mode ^ mode) & S_IFMT) 808 goto out_put_forget_req; 809 810 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 811 &outarg.attr, ATTR_TIMEOUT(&outarg), 0); 812 if (!inode) { 813 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1); 814 return -ENOMEM; 815 } 816 kfree(forget); 817 818 d_drop(entry); 819 d = d_splice_alias(inode, entry); 820 if (IS_ERR(d)) 821 return PTR_ERR(d); 822 823 if (d) { 824 fuse_change_entry_timeout(d, &outarg); 825 dput(d); 826 } else { 827 fuse_change_entry_timeout(entry, &outarg); 828 } 829 fuse_dir_changed(dir); 830 return 0; 831 832 out_put_forget_req: 833 if (err == -EEXIST) 834 fuse_invalidate_entry(entry); 835 kfree(forget); 836 return err; 837 } 838 839 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir, 840 struct dentry *entry, umode_t mode, dev_t rdev) 841 { 842 struct fuse_mknod_in inarg; 843 struct fuse_mount *fm = get_fuse_mount(dir); 844 FUSE_ARGS(args); 845 846 if (!fm->fc->dont_mask) 847 mode &= ~current_umask(); 848 849 memset(&inarg, 0, sizeof(inarg)); 850 inarg.mode = mode; 851 inarg.rdev = new_encode_dev(rdev); 852 inarg.umask = current_umask(); 853 args.opcode = FUSE_MKNOD; 854 args.in_numargs = 2; 855 args.in_args[0].size = sizeof(inarg); 856 args.in_args[0].value = &inarg; 857 args.in_args[1].size = entry->d_name.len + 1; 858 args.in_args[1].value = entry->d_name.name; 859 return create_new_entry(fm, &args, dir, entry, mode); 860 } 861 862 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir, 863 struct dentry *entry, umode_t mode, bool excl) 864 { 865 return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 866 } 867 868 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir, 869 struct file *file, umode_t mode) 870 { 871 struct fuse_conn *fc = get_fuse_conn(dir); 872 int err; 873 874 if (fc->no_tmpfile) 875 return -EOPNOTSUPP; 876 877 err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE); 878 if (err == -ENOSYS) { 879 fc->no_tmpfile = 1; 880 err = -EOPNOTSUPP; 881 } 882 return err; 883 } 884 885 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir, 886 struct dentry *entry, umode_t mode) 887 { 888 struct fuse_mkdir_in inarg; 889 struct fuse_mount *fm = get_fuse_mount(dir); 890 FUSE_ARGS(args); 891 892 if (!fm->fc->dont_mask) 893 mode &= ~current_umask(); 894 895 memset(&inarg, 0, sizeof(inarg)); 896 inarg.mode = mode; 897 inarg.umask = current_umask(); 898 args.opcode = FUSE_MKDIR; 899 args.in_numargs = 2; 900 args.in_args[0].size = sizeof(inarg); 901 args.in_args[0].value = &inarg; 902 args.in_args[1].size = entry->d_name.len + 1; 903 args.in_args[1].value = entry->d_name.name; 904 return create_new_entry(fm, &args, dir, entry, S_IFDIR); 905 } 906 907 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir, 908 struct dentry *entry, const char *link) 909 { 910 struct fuse_mount *fm = get_fuse_mount(dir); 911 unsigned len = strlen(link) + 1; 912 FUSE_ARGS(args); 913 914 args.opcode = FUSE_SYMLINK; 915 args.in_numargs = 2; 916 args.in_args[0].size = entry->d_name.len + 1; 917 args.in_args[0].value = entry->d_name.name; 918 args.in_args[1].size = len; 919 args.in_args[1].value = link; 920 return create_new_entry(fm, &args, dir, entry, S_IFLNK); 921 } 922 923 void fuse_flush_time_update(struct inode *inode) 924 { 925 int err = sync_inode_metadata(inode, 1); 926 927 mapping_set_error(inode->i_mapping, err); 928 } 929 930 static void fuse_update_ctime_in_cache(struct inode *inode) 931 { 932 if (!IS_NOCMTIME(inode)) { 933 inode->i_ctime = current_time(inode); 934 mark_inode_dirty_sync(inode); 935 fuse_flush_time_update(inode); 936 } 937 } 938 939 void fuse_update_ctime(struct inode *inode) 940 { 941 fuse_invalidate_attr_mask(inode, STATX_CTIME); 942 fuse_update_ctime_in_cache(inode); 943 } 944 945 static void fuse_entry_unlinked(struct dentry *entry) 946 { 947 struct inode *inode = d_inode(entry); 948 struct fuse_conn *fc = get_fuse_conn(inode); 949 struct fuse_inode *fi = get_fuse_inode(inode); 950 951 spin_lock(&fi->lock); 952 fi->attr_version = atomic64_inc_return(&fc->attr_version); 953 /* 954 * If i_nlink == 0 then unlink doesn't make sense, yet this can 955 * happen if userspace filesystem is careless. It would be 956 * difficult to enforce correct nlink usage so just ignore this 957 * condition here 958 */ 959 if (S_ISDIR(inode->i_mode)) 960 clear_nlink(inode); 961 else if (inode->i_nlink > 0) 962 drop_nlink(inode); 963 spin_unlock(&fi->lock); 964 fuse_invalidate_entry_cache(entry); 965 fuse_update_ctime(inode); 966 } 967 968 static int fuse_unlink(struct inode *dir, struct dentry *entry) 969 { 970 int err; 971 struct fuse_mount *fm = get_fuse_mount(dir); 972 FUSE_ARGS(args); 973 974 if (fuse_is_bad(dir)) 975 return -EIO; 976 977 args.opcode = FUSE_UNLINK; 978 args.nodeid = get_node_id(dir); 979 args.in_numargs = 1; 980 args.in_args[0].size = entry->d_name.len + 1; 981 args.in_args[0].value = entry->d_name.name; 982 err = fuse_simple_request(fm, &args); 983 if (!err) { 984 fuse_dir_changed(dir); 985 fuse_entry_unlinked(entry); 986 } else if (err == -EINTR || err == -ENOENT) 987 fuse_invalidate_entry(entry); 988 return err; 989 } 990 991 static int fuse_rmdir(struct inode *dir, struct dentry *entry) 992 { 993 int err; 994 struct fuse_mount *fm = get_fuse_mount(dir); 995 FUSE_ARGS(args); 996 997 if (fuse_is_bad(dir)) 998 return -EIO; 999 1000 args.opcode = FUSE_RMDIR; 1001 args.nodeid = get_node_id(dir); 1002 args.in_numargs = 1; 1003 args.in_args[0].size = entry->d_name.len + 1; 1004 args.in_args[0].value = entry->d_name.name; 1005 err = fuse_simple_request(fm, &args); 1006 if (!err) { 1007 fuse_dir_changed(dir); 1008 fuse_entry_unlinked(entry); 1009 } else if (err == -EINTR || err == -ENOENT) 1010 fuse_invalidate_entry(entry); 1011 return err; 1012 } 1013 1014 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 1015 struct inode *newdir, struct dentry *newent, 1016 unsigned int flags, int opcode, size_t argsize) 1017 { 1018 int err; 1019 struct fuse_rename2_in inarg; 1020 struct fuse_mount *fm = get_fuse_mount(olddir); 1021 FUSE_ARGS(args); 1022 1023 memset(&inarg, 0, argsize); 1024 inarg.newdir = get_node_id(newdir); 1025 inarg.flags = flags; 1026 args.opcode = opcode; 1027 args.nodeid = get_node_id(olddir); 1028 args.in_numargs = 3; 1029 args.in_args[0].size = argsize; 1030 args.in_args[0].value = &inarg; 1031 args.in_args[1].size = oldent->d_name.len + 1; 1032 args.in_args[1].value = oldent->d_name.name; 1033 args.in_args[2].size = newent->d_name.len + 1; 1034 args.in_args[2].value = newent->d_name.name; 1035 err = fuse_simple_request(fm, &args); 1036 if (!err) { 1037 /* ctime changes */ 1038 fuse_update_ctime(d_inode(oldent)); 1039 1040 if (flags & RENAME_EXCHANGE) 1041 fuse_update_ctime(d_inode(newent)); 1042 1043 fuse_dir_changed(olddir); 1044 if (olddir != newdir) 1045 fuse_dir_changed(newdir); 1046 1047 /* newent will end up negative */ 1048 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) 1049 fuse_entry_unlinked(newent); 1050 } else if (err == -EINTR || err == -ENOENT) { 1051 /* If request was interrupted, DEITY only knows if the 1052 rename actually took place. If the invalidation 1053 fails (e.g. some process has CWD under the renamed 1054 directory), then there can be inconsistency between 1055 the dcache and the real filesystem. Tough luck. */ 1056 fuse_invalidate_entry(oldent); 1057 if (d_really_is_positive(newent)) 1058 fuse_invalidate_entry(newent); 1059 } 1060 1061 return err; 1062 } 1063 1064 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir, 1065 struct dentry *oldent, struct inode *newdir, 1066 struct dentry *newent, unsigned int flags) 1067 { 1068 struct fuse_conn *fc = get_fuse_conn(olddir); 1069 int err; 1070 1071 if (fuse_is_bad(olddir)) 1072 return -EIO; 1073 1074 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT)) 1075 return -EINVAL; 1076 1077 if (flags) { 1078 if (fc->no_rename2 || fc->minor < 23) 1079 return -EINVAL; 1080 1081 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 1082 FUSE_RENAME2, 1083 sizeof(struct fuse_rename2_in)); 1084 if (err == -ENOSYS) { 1085 fc->no_rename2 = 1; 1086 err = -EINVAL; 1087 } 1088 } else { 1089 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 1090 FUSE_RENAME, 1091 sizeof(struct fuse_rename_in)); 1092 } 1093 1094 return err; 1095 } 1096 1097 static int fuse_link(struct dentry *entry, struct inode *newdir, 1098 struct dentry *newent) 1099 { 1100 int err; 1101 struct fuse_link_in inarg; 1102 struct inode *inode = d_inode(entry); 1103 struct fuse_mount *fm = get_fuse_mount(inode); 1104 FUSE_ARGS(args); 1105 1106 memset(&inarg, 0, sizeof(inarg)); 1107 inarg.oldnodeid = get_node_id(inode); 1108 args.opcode = FUSE_LINK; 1109 args.in_numargs = 2; 1110 args.in_args[0].size = sizeof(inarg); 1111 args.in_args[0].value = &inarg; 1112 args.in_args[1].size = newent->d_name.len + 1; 1113 args.in_args[1].value = newent->d_name.name; 1114 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode); 1115 if (!err) 1116 fuse_update_ctime_in_cache(inode); 1117 else if (err == -EINTR) 1118 fuse_invalidate_attr(inode); 1119 1120 return err; 1121 } 1122 1123 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1124 struct kstat *stat) 1125 { 1126 unsigned int blkbits; 1127 struct fuse_conn *fc = get_fuse_conn(inode); 1128 1129 stat->dev = inode->i_sb->s_dev; 1130 stat->ino = attr->ino; 1131 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1132 stat->nlink = attr->nlink; 1133 stat->uid = make_kuid(fc->user_ns, attr->uid); 1134 stat->gid = make_kgid(fc->user_ns, attr->gid); 1135 stat->rdev = inode->i_rdev; 1136 stat->atime.tv_sec = attr->atime; 1137 stat->atime.tv_nsec = attr->atimensec; 1138 stat->mtime.tv_sec = attr->mtime; 1139 stat->mtime.tv_nsec = attr->mtimensec; 1140 stat->ctime.tv_sec = attr->ctime; 1141 stat->ctime.tv_nsec = attr->ctimensec; 1142 stat->size = attr->size; 1143 stat->blocks = attr->blocks; 1144 1145 if (attr->blksize != 0) 1146 blkbits = ilog2(attr->blksize); 1147 else 1148 blkbits = inode->i_sb->s_blocksize_bits; 1149 1150 stat->blksize = 1 << blkbits; 1151 } 1152 1153 static void fuse_statx_to_attr(struct fuse_statx *sx, struct fuse_attr *attr) 1154 { 1155 memset(attr, 0, sizeof(*attr)); 1156 attr->ino = sx->ino; 1157 attr->size = sx->size; 1158 attr->blocks = sx->blocks; 1159 attr->atime = sx->atime.tv_sec; 1160 attr->mtime = sx->mtime.tv_sec; 1161 attr->ctime = sx->ctime.tv_sec; 1162 attr->atimensec = sx->atime.tv_nsec; 1163 attr->mtimensec = sx->mtime.tv_nsec; 1164 attr->ctimensec = sx->ctime.tv_nsec; 1165 attr->mode = sx->mode; 1166 attr->nlink = sx->nlink; 1167 attr->uid = sx->uid; 1168 attr->gid = sx->gid; 1169 attr->rdev = new_encode_dev(MKDEV(sx->rdev_major, sx->rdev_minor)); 1170 attr->blksize = sx->blksize; 1171 } 1172 1173 static int fuse_do_statx(struct inode *inode, struct file *file, 1174 struct kstat *stat) 1175 { 1176 int err; 1177 struct fuse_attr attr; 1178 struct fuse_statx *sx; 1179 struct fuse_statx_in inarg; 1180 struct fuse_statx_out outarg; 1181 struct fuse_mount *fm = get_fuse_mount(inode); 1182 u64 attr_version = fuse_get_attr_version(fm->fc); 1183 FUSE_ARGS(args); 1184 1185 memset(&inarg, 0, sizeof(inarg)); 1186 memset(&outarg, 0, sizeof(outarg)); 1187 /* Directories have separate file-handle space */ 1188 if (file && S_ISREG(inode->i_mode)) { 1189 struct fuse_file *ff = file->private_data; 1190 1191 inarg.getattr_flags |= FUSE_GETATTR_FH; 1192 inarg.fh = ff->fh; 1193 } 1194 /* For now leave sync hints as the default, request all stats. */ 1195 inarg.sx_flags = 0; 1196 inarg.sx_mask = STATX_BASIC_STATS | STATX_BTIME; 1197 args.opcode = FUSE_STATX; 1198 args.nodeid = get_node_id(inode); 1199 args.in_numargs = 1; 1200 args.in_args[0].size = sizeof(inarg); 1201 args.in_args[0].value = &inarg; 1202 args.out_numargs = 1; 1203 args.out_args[0].size = sizeof(outarg); 1204 args.out_args[0].value = &outarg; 1205 err = fuse_simple_request(fm, &args); 1206 if (err) 1207 return err; 1208 1209 sx = &outarg.stat; 1210 if (((sx->mask & STATX_SIZE) && !fuse_valid_size(sx->size)) || 1211 ((sx->mask & STATX_TYPE) && (!fuse_valid_type(sx->mode) || 1212 inode_wrong_type(inode, sx->mode)))) { 1213 make_bad_inode(inode); 1214 return -EIO; 1215 } 1216 1217 fuse_statx_to_attr(&outarg.stat, &attr); 1218 if ((sx->mask & STATX_BASIC_STATS) == STATX_BASIC_STATS) { 1219 fuse_change_attributes(inode, &attr, &outarg.stat, 1220 ATTR_TIMEOUT(&outarg), attr_version); 1221 } 1222 stat->result_mask = sx->mask & (STATX_BASIC_STATS | STATX_BTIME); 1223 stat->btime.tv_sec = sx->btime.tv_sec; 1224 stat->btime.tv_nsec = min_t(u32, sx->btime.tv_nsec, NSEC_PER_SEC - 1); 1225 fuse_fillattr(inode, &attr, stat); 1226 stat->result_mask |= STATX_TYPE; 1227 1228 return 0; 1229 } 1230 1231 static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1232 struct file *file) 1233 { 1234 int err; 1235 struct fuse_getattr_in inarg; 1236 struct fuse_attr_out outarg; 1237 struct fuse_mount *fm = get_fuse_mount(inode); 1238 FUSE_ARGS(args); 1239 u64 attr_version; 1240 1241 attr_version = fuse_get_attr_version(fm->fc); 1242 1243 memset(&inarg, 0, sizeof(inarg)); 1244 memset(&outarg, 0, sizeof(outarg)); 1245 /* Directories have separate file-handle space */ 1246 if (file && S_ISREG(inode->i_mode)) { 1247 struct fuse_file *ff = file->private_data; 1248 1249 inarg.getattr_flags |= FUSE_GETATTR_FH; 1250 inarg.fh = ff->fh; 1251 } 1252 args.opcode = FUSE_GETATTR; 1253 args.nodeid = get_node_id(inode); 1254 args.in_numargs = 1; 1255 args.in_args[0].size = sizeof(inarg); 1256 args.in_args[0].value = &inarg; 1257 args.out_numargs = 1; 1258 args.out_args[0].size = sizeof(outarg); 1259 args.out_args[0].value = &outarg; 1260 err = fuse_simple_request(fm, &args); 1261 if (!err) { 1262 if (fuse_invalid_attr(&outarg.attr) || 1263 inode_wrong_type(inode, outarg.attr.mode)) { 1264 fuse_make_bad(inode); 1265 err = -EIO; 1266 } else { 1267 fuse_change_attributes(inode, &outarg.attr, NULL, 1268 ATTR_TIMEOUT(&outarg), 1269 attr_version); 1270 if (stat) 1271 fuse_fillattr(inode, &outarg.attr, stat); 1272 } 1273 } 1274 return err; 1275 } 1276 1277 static int fuse_update_get_attr(struct inode *inode, struct file *file, 1278 struct kstat *stat, u32 request_mask, 1279 unsigned int flags) 1280 { 1281 struct fuse_inode *fi = get_fuse_inode(inode); 1282 struct fuse_conn *fc = get_fuse_conn(inode); 1283 int err = 0; 1284 bool sync; 1285 u32 inval_mask = READ_ONCE(fi->inval_mask); 1286 u32 cache_mask = fuse_get_cache_mask(inode); 1287 1288 1289 /* FUSE only supports basic stats and possibly btime */ 1290 request_mask &= STATX_BASIC_STATS | STATX_BTIME; 1291 retry: 1292 if (fc->no_statx) 1293 request_mask &= STATX_BASIC_STATS; 1294 1295 if (!request_mask) 1296 sync = false; 1297 else if (flags & AT_STATX_FORCE_SYNC) 1298 sync = true; 1299 else if (flags & AT_STATX_DONT_SYNC) 1300 sync = false; 1301 else if (request_mask & inval_mask & ~cache_mask) 1302 sync = true; 1303 else 1304 sync = time_before64(fi->i_time, get_jiffies_64()); 1305 1306 if (sync) { 1307 forget_all_cached_acls(inode); 1308 /* Try statx if BTIME is requested */ 1309 if (!fc->no_statx && (request_mask & ~STATX_BASIC_STATS)) { 1310 err = fuse_do_statx(inode, file, stat); 1311 if (err == -ENOSYS) { 1312 fc->no_statx = 1; 1313 goto retry; 1314 } 1315 } else { 1316 err = fuse_do_getattr(inode, stat, file); 1317 } 1318 } else if (stat) { 1319 generic_fillattr(&nop_mnt_idmap, inode, stat); 1320 stat->mode = fi->orig_i_mode; 1321 stat->ino = fi->orig_ino; 1322 if (test_bit(FUSE_I_BTIME, &fi->state)) { 1323 stat->btime = fi->i_btime; 1324 stat->result_mask |= STATX_BTIME; 1325 } 1326 } 1327 1328 return err; 1329 } 1330 1331 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) 1332 { 1333 return fuse_update_get_attr(inode, file, NULL, mask, 0); 1334 } 1335 1336 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, 1337 u64 child_nodeid, struct qstr *name, u32 flags) 1338 { 1339 int err = -ENOTDIR; 1340 struct inode *parent; 1341 struct dentry *dir; 1342 struct dentry *entry; 1343 1344 parent = fuse_ilookup(fc, parent_nodeid, NULL); 1345 if (!parent) 1346 return -ENOENT; 1347 1348 inode_lock_nested(parent, I_MUTEX_PARENT); 1349 if (!S_ISDIR(parent->i_mode)) 1350 goto unlock; 1351 1352 err = -ENOENT; 1353 dir = d_find_alias(parent); 1354 if (!dir) 1355 goto unlock; 1356 1357 name->hash = full_name_hash(dir, name->name, name->len); 1358 entry = d_lookup(dir, name); 1359 dput(dir); 1360 if (!entry) 1361 goto unlock; 1362 1363 fuse_dir_changed(parent); 1364 if (!(flags & FUSE_EXPIRE_ONLY)) 1365 d_invalidate(entry); 1366 fuse_invalidate_entry_cache(entry); 1367 1368 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1369 inode_lock(d_inode(entry)); 1370 if (get_node_id(d_inode(entry)) != child_nodeid) { 1371 err = -ENOENT; 1372 goto badentry; 1373 } 1374 if (d_mountpoint(entry)) { 1375 err = -EBUSY; 1376 goto badentry; 1377 } 1378 if (d_is_dir(entry)) { 1379 shrink_dcache_parent(entry); 1380 if (!simple_empty(entry)) { 1381 err = -ENOTEMPTY; 1382 goto badentry; 1383 } 1384 d_inode(entry)->i_flags |= S_DEAD; 1385 } 1386 dont_mount(entry); 1387 clear_nlink(d_inode(entry)); 1388 err = 0; 1389 badentry: 1390 inode_unlock(d_inode(entry)); 1391 if (!err) 1392 d_delete(entry); 1393 } else { 1394 err = 0; 1395 } 1396 dput(entry); 1397 1398 unlock: 1399 inode_unlock(parent); 1400 iput(parent); 1401 return err; 1402 } 1403 1404 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc) 1405 { 1406 const struct cred *cred = current_cred(); 1407 1408 return (uid_eq(cred->euid, fc->user_id) && 1409 uid_eq(cred->suid, fc->user_id) && 1410 uid_eq(cred->uid, fc->user_id) && 1411 gid_eq(cred->egid, fc->group_id) && 1412 gid_eq(cred->sgid, fc->group_id) && 1413 gid_eq(cred->gid, fc->group_id)); 1414 } 1415 1416 /* 1417 * Calling into a user-controlled filesystem gives the filesystem 1418 * daemon ptrace-like capabilities over the current process. This 1419 * means, that the filesystem daemon is able to record the exact 1420 * filesystem operations performed, and can also control the behavior 1421 * of the requester process in otherwise impossible ways. For example 1422 * it can delay the operation for arbitrary length of time allowing 1423 * DoS against the requester. 1424 * 1425 * For this reason only those processes can call into the filesystem, 1426 * for which the owner of the mount has ptrace privilege. This 1427 * excludes processes started by other users, suid or sgid processes. 1428 */ 1429 bool fuse_allow_current_process(struct fuse_conn *fc) 1430 { 1431 bool allow; 1432 1433 if (fc->allow_other) 1434 allow = current_in_userns(fc->user_ns); 1435 else 1436 allow = fuse_permissible_uidgid(fc); 1437 1438 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN)) 1439 allow = true; 1440 1441 return allow; 1442 } 1443 1444 static int fuse_access(struct inode *inode, int mask) 1445 { 1446 struct fuse_mount *fm = get_fuse_mount(inode); 1447 FUSE_ARGS(args); 1448 struct fuse_access_in inarg; 1449 int err; 1450 1451 BUG_ON(mask & MAY_NOT_BLOCK); 1452 1453 if (fm->fc->no_access) 1454 return 0; 1455 1456 memset(&inarg, 0, sizeof(inarg)); 1457 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1458 args.opcode = FUSE_ACCESS; 1459 args.nodeid = get_node_id(inode); 1460 args.in_numargs = 1; 1461 args.in_args[0].size = sizeof(inarg); 1462 args.in_args[0].value = &inarg; 1463 err = fuse_simple_request(fm, &args); 1464 if (err == -ENOSYS) { 1465 fm->fc->no_access = 1; 1466 err = 0; 1467 } 1468 return err; 1469 } 1470 1471 static int fuse_perm_getattr(struct inode *inode, int mask) 1472 { 1473 if (mask & MAY_NOT_BLOCK) 1474 return -ECHILD; 1475 1476 forget_all_cached_acls(inode); 1477 return fuse_do_getattr(inode, NULL, NULL); 1478 } 1479 1480 /* 1481 * Check permission. The two basic access models of FUSE are: 1482 * 1483 * 1) Local access checking ('default_permissions' mount option) based 1484 * on file mode. This is the plain old disk filesystem permission 1485 * modell. 1486 * 1487 * 2) "Remote" access checking, where server is responsible for 1488 * checking permission in each inode operation. An exception to this 1489 * is if ->permission() was invoked from sys_access() in which case an 1490 * access request is sent. Execute permission is still checked 1491 * locally based on file mode. 1492 */ 1493 static int fuse_permission(struct mnt_idmap *idmap, 1494 struct inode *inode, int mask) 1495 { 1496 struct fuse_conn *fc = get_fuse_conn(inode); 1497 bool refreshed = false; 1498 int err = 0; 1499 1500 if (fuse_is_bad(inode)) 1501 return -EIO; 1502 1503 if (!fuse_allow_current_process(fc)) 1504 return -EACCES; 1505 1506 /* 1507 * If attributes are needed, refresh them before proceeding 1508 */ 1509 if (fc->default_permissions || 1510 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1511 struct fuse_inode *fi = get_fuse_inode(inode); 1512 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1513 1514 if (perm_mask & READ_ONCE(fi->inval_mask) || 1515 time_before64(fi->i_time, get_jiffies_64())) { 1516 refreshed = true; 1517 1518 err = fuse_perm_getattr(inode, mask); 1519 if (err) 1520 return err; 1521 } 1522 } 1523 1524 if (fc->default_permissions) { 1525 err = generic_permission(&nop_mnt_idmap, inode, mask); 1526 1527 /* If permission is denied, try to refresh file 1528 attributes. This is also needed, because the root 1529 node will at first have no permissions */ 1530 if (err == -EACCES && !refreshed) { 1531 err = fuse_perm_getattr(inode, mask); 1532 if (!err) 1533 err = generic_permission(&nop_mnt_idmap, 1534 inode, mask); 1535 } 1536 1537 /* Note: the opposite of the above test does not 1538 exist. So if permissions are revoked this won't be 1539 noticed immediately, only after the attribute 1540 timeout has expired */ 1541 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1542 err = fuse_access(inode, mask); 1543 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1544 if (!(inode->i_mode & S_IXUGO)) { 1545 if (refreshed) 1546 return -EACCES; 1547 1548 err = fuse_perm_getattr(inode, mask); 1549 if (!err && !(inode->i_mode & S_IXUGO)) 1550 return -EACCES; 1551 } 1552 } 1553 return err; 1554 } 1555 1556 static int fuse_readlink_page(struct inode *inode, struct page *page) 1557 { 1558 struct fuse_mount *fm = get_fuse_mount(inode); 1559 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 }; 1560 struct fuse_args_pages ap = { 1561 .num_pages = 1, 1562 .pages = &page, 1563 .descs = &desc, 1564 }; 1565 char *link; 1566 ssize_t res; 1567 1568 ap.args.opcode = FUSE_READLINK; 1569 ap.args.nodeid = get_node_id(inode); 1570 ap.args.out_pages = true; 1571 ap.args.out_argvar = true; 1572 ap.args.page_zeroing = true; 1573 ap.args.out_numargs = 1; 1574 ap.args.out_args[0].size = desc.length; 1575 res = fuse_simple_request(fm, &ap.args); 1576 1577 fuse_invalidate_atime(inode); 1578 1579 if (res < 0) 1580 return res; 1581 1582 if (WARN_ON(res >= PAGE_SIZE)) 1583 return -EIO; 1584 1585 link = page_address(page); 1586 link[res] = '\0'; 1587 1588 return 0; 1589 } 1590 1591 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1592 struct delayed_call *callback) 1593 { 1594 struct fuse_conn *fc = get_fuse_conn(inode); 1595 struct page *page; 1596 int err; 1597 1598 err = -EIO; 1599 if (fuse_is_bad(inode)) 1600 goto out_err; 1601 1602 if (fc->cache_symlinks) 1603 return page_get_link(dentry, inode, callback); 1604 1605 err = -ECHILD; 1606 if (!dentry) 1607 goto out_err; 1608 1609 page = alloc_page(GFP_KERNEL); 1610 err = -ENOMEM; 1611 if (!page) 1612 goto out_err; 1613 1614 err = fuse_readlink_page(inode, page); 1615 if (err) { 1616 __free_page(page); 1617 goto out_err; 1618 } 1619 1620 set_delayed_call(callback, page_put_link, page); 1621 1622 return page_address(page); 1623 1624 out_err: 1625 return ERR_PTR(err); 1626 } 1627 1628 static int fuse_dir_open(struct inode *inode, struct file *file) 1629 { 1630 return fuse_open_common(inode, file, true); 1631 } 1632 1633 static int fuse_dir_release(struct inode *inode, struct file *file) 1634 { 1635 fuse_release_common(file, true); 1636 1637 return 0; 1638 } 1639 1640 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1641 int datasync) 1642 { 1643 struct inode *inode = file->f_mapping->host; 1644 struct fuse_conn *fc = get_fuse_conn(inode); 1645 int err; 1646 1647 if (fuse_is_bad(inode)) 1648 return -EIO; 1649 1650 if (fc->no_fsyncdir) 1651 return 0; 1652 1653 inode_lock(inode); 1654 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1655 if (err == -ENOSYS) { 1656 fc->no_fsyncdir = 1; 1657 err = 0; 1658 } 1659 inode_unlock(inode); 1660 1661 return err; 1662 } 1663 1664 static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1665 unsigned long arg) 1666 { 1667 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1668 1669 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1670 if (fc->minor < 18) 1671 return -ENOTTY; 1672 1673 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1674 } 1675 1676 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1677 unsigned long arg) 1678 { 1679 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1680 1681 if (fc->minor < 18) 1682 return -ENOTTY; 1683 1684 return fuse_ioctl_common(file, cmd, arg, 1685 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1686 } 1687 1688 static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1689 { 1690 /* Always update if mtime is explicitly set */ 1691 if (ivalid & ATTR_MTIME_SET) 1692 return true; 1693 1694 /* Or if kernel i_mtime is the official one */ 1695 if (trust_local_mtime) 1696 return true; 1697 1698 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1699 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1700 return false; 1701 1702 /* In all other cases update */ 1703 return true; 1704 } 1705 1706 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1707 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1708 { 1709 unsigned ivalid = iattr->ia_valid; 1710 1711 if (ivalid & ATTR_MODE) 1712 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1713 if (ivalid & ATTR_UID) 1714 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1715 if (ivalid & ATTR_GID) 1716 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1717 if (ivalid & ATTR_SIZE) 1718 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1719 if (ivalid & ATTR_ATIME) { 1720 arg->valid |= FATTR_ATIME; 1721 arg->atime = iattr->ia_atime.tv_sec; 1722 arg->atimensec = iattr->ia_atime.tv_nsec; 1723 if (!(ivalid & ATTR_ATIME_SET)) 1724 arg->valid |= FATTR_ATIME_NOW; 1725 } 1726 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1727 arg->valid |= FATTR_MTIME; 1728 arg->mtime = iattr->ia_mtime.tv_sec; 1729 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1730 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1731 arg->valid |= FATTR_MTIME_NOW; 1732 } 1733 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1734 arg->valid |= FATTR_CTIME; 1735 arg->ctime = iattr->ia_ctime.tv_sec; 1736 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1737 } 1738 } 1739 1740 /* 1741 * Prevent concurrent writepages on inode 1742 * 1743 * This is done by adding a negative bias to the inode write counter 1744 * and waiting for all pending writes to finish. 1745 */ 1746 void fuse_set_nowrite(struct inode *inode) 1747 { 1748 struct fuse_inode *fi = get_fuse_inode(inode); 1749 1750 BUG_ON(!inode_is_locked(inode)); 1751 1752 spin_lock(&fi->lock); 1753 BUG_ON(fi->writectr < 0); 1754 fi->writectr += FUSE_NOWRITE; 1755 spin_unlock(&fi->lock); 1756 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1757 } 1758 1759 /* 1760 * Allow writepages on inode 1761 * 1762 * Remove the bias from the writecounter and send any queued 1763 * writepages. 1764 */ 1765 static void __fuse_release_nowrite(struct inode *inode) 1766 { 1767 struct fuse_inode *fi = get_fuse_inode(inode); 1768 1769 BUG_ON(fi->writectr != FUSE_NOWRITE); 1770 fi->writectr = 0; 1771 fuse_flush_writepages(inode); 1772 } 1773 1774 void fuse_release_nowrite(struct inode *inode) 1775 { 1776 struct fuse_inode *fi = get_fuse_inode(inode); 1777 1778 spin_lock(&fi->lock); 1779 __fuse_release_nowrite(inode); 1780 spin_unlock(&fi->lock); 1781 } 1782 1783 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1784 struct inode *inode, 1785 struct fuse_setattr_in *inarg_p, 1786 struct fuse_attr_out *outarg_p) 1787 { 1788 args->opcode = FUSE_SETATTR; 1789 args->nodeid = get_node_id(inode); 1790 args->in_numargs = 1; 1791 args->in_args[0].size = sizeof(*inarg_p); 1792 args->in_args[0].value = inarg_p; 1793 args->out_numargs = 1; 1794 args->out_args[0].size = sizeof(*outarg_p); 1795 args->out_args[0].value = outarg_p; 1796 } 1797 1798 /* 1799 * Flush inode->i_mtime to the server 1800 */ 1801 int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1802 { 1803 struct fuse_mount *fm = get_fuse_mount(inode); 1804 FUSE_ARGS(args); 1805 struct fuse_setattr_in inarg; 1806 struct fuse_attr_out outarg; 1807 1808 memset(&inarg, 0, sizeof(inarg)); 1809 memset(&outarg, 0, sizeof(outarg)); 1810 1811 inarg.valid = FATTR_MTIME; 1812 inarg.mtime = inode->i_mtime.tv_sec; 1813 inarg.mtimensec = inode->i_mtime.tv_nsec; 1814 if (fm->fc->minor >= 23) { 1815 inarg.valid |= FATTR_CTIME; 1816 inarg.ctime = inode->i_ctime.tv_sec; 1817 inarg.ctimensec = inode->i_ctime.tv_nsec; 1818 } 1819 if (ff) { 1820 inarg.valid |= FATTR_FH; 1821 inarg.fh = ff->fh; 1822 } 1823 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg); 1824 1825 return fuse_simple_request(fm, &args); 1826 } 1827 1828 /* 1829 * Set attributes, and at the same time refresh them. 1830 * 1831 * Truncation is slightly complicated, because the 'truncate' request 1832 * may fail, in which case we don't want to touch the mapping. 1833 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1834 * and the actual truncation by hand. 1835 */ 1836 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1837 struct file *file) 1838 { 1839 struct inode *inode = d_inode(dentry); 1840 struct fuse_mount *fm = get_fuse_mount(inode); 1841 struct fuse_conn *fc = fm->fc; 1842 struct fuse_inode *fi = get_fuse_inode(inode); 1843 struct address_space *mapping = inode->i_mapping; 1844 FUSE_ARGS(args); 1845 struct fuse_setattr_in inarg; 1846 struct fuse_attr_out outarg; 1847 bool is_truncate = false; 1848 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode); 1849 loff_t oldsize; 1850 int err; 1851 bool trust_local_cmtime = is_wb; 1852 bool fault_blocked = false; 1853 1854 if (!fc->default_permissions) 1855 attr->ia_valid |= ATTR_FORCE; 1856 1857 err = setattr_prepare(&nop_mnt_idmap, dentry, attr); 1858 if (err) 1859 return err; 1860 1861 if (attr->ia_valid & ATTR_SIZE) { 1862 if (WARN_ON(!S_ISREG(inode->i_mode))) 1863 return -EIO; 1864 is_truncate = true; 1865 } 1866 1867 if (FUSE_IS_DAX(inode) && is_truncate) { 1868 filemap_invalidate_lock(mapping); 1869 fault_blocked = true; 1870 err = fuse_dax_break_layouts(inode, 0, 0); 1871 if (err) { 1872 filemap_invalidate_unlock(mapping); 1873 return err; 1874 } 1875 } 1876 1877 if (attr->ia_valid & ATTR_OPEN) { 1878 /* This is coming from open(..., ... | O_TRUNC); */ 1879 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1880 WARN_ON(attr->ia_size != 0); 1881 if (fc->atomic_o_trunc) { 1882 /* 1883 * No need to send request to userspace, since actual 1884 * truncation has already been done by OPEN. But still 1885 * need to truncate page cache. 1886 */ 1887 i_size_write(inode, 0); 1888 truncate_pagecache(inode, 0); 1889 goto out; 1890 } 1891 file = NULL; 1892 } 1893 1894 /* Flush dirty data/metadata before non-truncate SETATTR */ 1895 if (is_wb && 1896 attr->ia_valid & 1897 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET | 1898 ATTR_TIMES_SET)) { 1899 err = write_inode_now(inode, true); 1900 if (err) 1901 return err; 1902 1903 fuse_set_nowrite(inode); 1904 fuse_release_nowrite(inode); 1905 } 1906 1907 if (is_truncate) { 1908 fuse_set_nowrite(inode); 1909 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1910 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1911 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1912 } 1913 1914 memset(&inarg, 0, sizeof(inarg)); 1915 memset(&outarg, 0, sizeof(outarg)); 1916 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1917 if (file) { 1918 struct fuse_file *ff = file->private_data; 1919 inarg.valid |= FATTR_FH; 1920 inarg.fh = ff->fh; 1921 } 1922 1923 /* Kill suid/sgid for non-directory chown unconditionally */ 1924 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) && 1925 attr->ia_valid & (ATTR_UID | ATTR_GID)) 1926 inarg.valid |= FATTR_KILL_SUIDGID; 1927 1928 if (attr->ia_valid & ATTR_SIZE) { 1929 /* For mandatory locking in truncate */ 1930 inarg.valid |= FATTR_LOCKOWNER; 1931 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1932 1933 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 1934 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID)) 1935 inarg.valid |= FATTR_KILL_SUIDGID; 1936 } 1937 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1938 err = fuse_simple_request(fm, &args); 1939 if (err) { 1940 if (err == -EINTR) 1941 fuse_invalidate_attr(inode); 1942 goto error; 1943 } 1944 1945 if (fuse_invalid_attr(&outarg.attr) || 1946 inode_wrong_type(inode, outarg.attr.mode)) { 1947 fuse_make_bad(inode); 1948 err = -EIO; 1949 goto error; 1950 } 1951 1952 spin_lock(&fi->lock); 1953 /* the kernel maintains i_mtime locally */ 1954 if (trust_local_cmtime) { 1955 if (attr->ia_valid & ATTR_MTIME) 1956 inode->i_mtime = attr->ia_mtime; 1957 if (attr->ia_valid & ATTR_CTIME) 1958 inode->i_ctime = attr->ia_ctime; 1959 /* FIXME: clear I_DIRTY_SYNC? */ 1960 } 1961 1962 fuse_change_attributes_common(inode, &outarg.attr, NULL, 1963 ATTR_TIMEOUT(&outarg), 1964 fuse_get_cache_mask(inode)); 1965 oldsize = inode->i_size; 1966 /* see the comment in fuse_change_attributes() */ 1967 if (!is_wb || is_truncate) 1968 i_size_write(inode, outarg.attr.size); 1969 1970 if (is_truncate) { 1971 /* NOTE: this may release/reacquire fi->lock */ 1972 __fuse_release_nowrite(inode); 1973 } 1974 spin_unlock(&fi->lock); 1975 1976 /* 1977 * Only call invalidate_inode_pages2() after removing 1978 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock. 1979 */ 1980 if ((is_truncate || !is_wb) && 1981 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 1982 truncate_pagecache(inode, outarg.attr.size); 1983 invalidate_inode_pages2(mapping); 1984 } 1985 1986 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1987 out: 1988 if (fault_blocked) 1989 filemap_invalidate_unlock(mapping); 1990 1991 return 0; 1992 1993 error: 1994 if (is_truncate) 1995 fuse_release_nowrite(inode); 1996 1997 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1998 1999 if (fault_blocked) 2000 filemap_invalidate_unlock(mapping); 2001 return err; 2002 } 2003 2004 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry, 2005 struct iattr *attr) 2006 { 2007 struct inode *inode = d_inode(entry); 2008 struct fuse_conn *fc = get_fuse_conn(inode); 2009 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 2010 int ret; 2011 2012 if (fuse_is_bad(inode)) 2013 return -EIO; 2014 2015 if (!fuse_allow_current_process(get_fuse_conn(inode))) 2016 return -EACCES; 2017 2018 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 2019 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 2020 ATTR_MODE); 2021 2022 /* 2023 * The only sane way to reliably kill suid/sgid is to do it in 2024 * the userspace filesystem 2025 * 2026 * This should be done on write(), truncate() and chown(). 2027 */ 2028 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) { 2029 /* 2030 * ia_mode calculation may have used stale i_mode. 2031 * Refresh and recalculate. 2032 */ 2033 ret = fuse_do_getattr(inode, NULL, file); 2034 if (ret) 2035 return ret; 2036 2037 attr->ia_mode = inode->i_mode; 2038 if (inode->i_mode & S_ISUID) { 2039 attr->ia_valid |= ATTR_MODE; 2040 attr->ia_mode &= ~S_ISUID; 2041 } 2042 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 2043 attr->ia_valid |= ATTR_MODE; 2044 attr->ia_mode &= ~S_ISGID; 2045 } 2046 } 2047 } 2048 if (!attr->ia_valid) 2049 return 0; 2050 2051 ret = fuse_do_setattr(entry, attr, file); 2052 if (!ret) { 2053 /* 2054 * If filesystem supports acls it may have updated acl xattrs in 2055 * the filesystem, so forget cached acls for the inode. 2056 */ 2057 if (fc->posix_acl) 2058 forget_all_cached_acls(inode); 2059 2060 /* Directory mode changed, may need to revalidate access */ 2061 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 2062 fuse_invalidate_entry_cache(entry); 2063 } 2064 return ret; 2065 } 2066 2067 static int fuse_getattr(struct mnt_idmap *idmap, 2068 const struct path *path, struct kstat *stat, 2069 u32 request_mask, unsigned int flags) 2070 { 2071 struct inode *inode = d_inode(path->dentry); 2072 struct fuse_conn *fc = get_fuse_conn(inode); 2073 2074 if (fuse_is_bad(inode)) 2075 return -EIO; 2076 2077 if (!fuse_allow_current_process(fc)) { 2078 if (!request_mask) { 2079 /* 2080 * If user explicitly requested *nothing* then don't 2081 * error out, but return st_dev only. 2082 */ 2083 stat->result_mask = 0; 2084 stat->dev = inode->i_sb->s_dev; 2085 return 0; 2086 } 2087 return -EACCES; 2088 } 2089 2090 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 2091 } 2092 2093 static const struct inode_operations fuse_dir_inode_operations = { 2094 .lookup = fuse_lookup, 2095 .mkdir = fuse_mkdir, 2096 .symlink = fuse_symlink, 2097 .unlink = fuse_unlink, 2098 .rmdir = fuse_rmdir, 2099 .rename = fuse_rename2, 2100 .link = fuse_link, 2101 .setattr = fuse_setattr, 2102 .create = fuse_create, 2103 .atomic_open = fuse_atomic_open, 2104 .tmpfile = fuse_tmpfile, 2105 .mknod = fuse_mknod, 2106 .permission = fuse_permission, 2107 .getattr = fuse_getattr, 2108 .listxattr = fuse_listxattr, 2109 .get_inode_acl = fuse_get_inode_acl, 2110 .get_acl = fuse_get_acl, 2111 .set_acl = fuse_set_acl, 2112 .fileattr_get = fuse_fileattr_get, 2113 .fileattr_set = fuse_fileattr_set, 2114 }; 2115 2116 static const struct file_operations fuse_dir_operations = { 2117 .llseek = generic_file_llseek, 2118 .read = generic_read_dir, 2119 .iterate_shared = fuse_readdir, 2120 .open = fuse_dir_open, 2121 .release = fuse_dir_release, 2122 .fsync = fuse_dir_fsync, 2123 .unlocked_ioctl = fuse_dir_ioctl, 2124 .compat_ioctl = fuse_dir_compat_ioctl, 2125 }; 2126 2127 static const struct inode_operations fuse_common_inode_operations = { 2128 .setattr = fuse_setattr, 2129 .permission = fuse_permission, 2130 .getattr = fuse_getattr, 2131 .listxattr = fuse_listxattr, 2132 .get_inode_acl = fuse_get_inode_acl, 2133 .get_acl = fuse_get_acl, 2134 .set_acl = fuse_set_acl, 2135 .fileattr_get = fuse_fileattr_get, 2136 .fileattr_set = fuse_fileattr_set, 2137 }; 2138 2139 static const struct inode_operations fuse_symlink_inode_operations = { 2140 .setattr = fuse_setattr, 2141 .get_link = fuse_get_link, 2142 .getattr = fuse_getattr, 2143 .listxattr = fuse_listxattr, 2144 }; 2145 2146 void fuse_init_common(struct inode *inode) 2147 { 2148 inode->i_op = &fuse_common_inode_operations; 2149 } 2150 2151 void fuse_init_dir(struct inode *inode) 2152 { 2153 struct fuse_inode *fi = get_fuse_inode(inode); 2154 2155 inode->i_op = &fuse_dir_inode_operations; 2156 inode->i_fop = &fuse_dir_operations; 2157 2158 spin_lock_init(&fi->rdc.lock); 2159 fi->rdc.cached = false; 2160 fi->rdc.size = 0; 2161 fi->rdc.pos = 0; 2162 fi->rdc.version = 0; 2163 } 2164 2165 static int fuse_symlink_read_folio(struct file *null, struct folio *folio) 2166 { 2167 int err = fuse_readlink_page(folio->mapping->host, &folio->page); 2168 2169 if (!err) 2170 folio_mark_uptodate(folio); 2171 2172 folio_unlock(folio); 2173 2174 return err; 2175 } 2176 2177 static const struct address_space_operations fuse_symlink_aops = { 2178 .read_folio = fuse_symlink_read_folio, 2179 }; 2180 2181 void fuse_init_symlink(struct inode *inode) 2182 { 2183 inode->i_op = &fuse_symlink_inode_operations; 2184 inode->i_data.a_ops = &fuse_symlink_aops; 2185 inode_nohighmem(inode); 2186 } 2187