1 /* 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 7 */ 8 9 #include "fuse_i.h" 10 11 #include <linux/pagemap.h> 12 #include <linux/file.h> 13 #include <linux/fs_context.h> 14 #include <linux/moduleparam.h> 15 #include <linux/sched.h> 16 #include <linux/namei.h> 17 #include <linux/slab.h> 18 #include <linux/xattr.h> 19 #include <linux/iversion.h> 20 #include <linux/posix_acl.h> 21 #include <linux/security.h> 22 #include <linux/types.h> 23 #include <linux/kernel.h> 24 25 static bool __read_mostly allow_sys_admin_access; 26 module_param(allow_sys_admin_access, bool, 0644); 27 MODULE_PARM_DESC(allow_sys_admin_access, 28 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check"); 29 30 static void fuse_advise_use_readdirplus(struct inode *dir) 31 { 32 struct fuse_inode *fi = get_fuse_inode(dir); 33 34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 35 } 36 37 #if BITS_PER_LONG >= 64 38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time) 39 { 40 entry->d_fsdata = (void *) time; 41 } 42 43 static inline u64 fuse_dentry_time(const struct dentry *entry) 44 { 45 return (u64)entry->d_fsdata; 46 } 47 48 #else 49 union fuse_dentry { 50 u64 time; 51 struct rcu_head rcu; 52 }; 53 54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time) 55 { 56 ((union fuse_dentry *) dentry->d_fsdata)->time = time; 57 } 58 59 static inline u64 fuse_dentry_time(const struct dentry *entry) 60 { 61 return ((union fuse_dentry *) entry->d_fsdata)->time; 62 } 63 #endif 64 65 static void fuse_dentry_settime(struct dentry *dentry, u64 time) 66 { 67 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 68 bool delete = !time && fc->delete_stale; 69 /* 70 * Mess with DCACHE_OP_DELETE because dput() will be faster without it. 71 * Don't care about races, either way it's just an optimization 72 */ 73 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) || 74 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) { 75 spin_lock(&dentry->d_lock); 76 if (!delete) 77 dentry->d_flags &= ~DCACHE_OP_DELETE; 78 else 79 dentry->d_flags |= DCACHE_OP_DELETE; 80 spin_unlock(&dentry->d_lock); 81 } 82 83 __fuse_dentry_settime(dentry, time); 84 } 85 86 /* 87 * FUSE caches dentries and attributes with separate timeout. The 88 * time in jiffies until the dentry/attributes are valid is stored in 89 * dentry->d_fsdata and fuse_inode->i_time respectively. 90 */ 91 92 /* 93 * Calculate the time in jiffies until a dentry/attributes are valid 94 */ 95 static u64 time_to_jiffies(u64 sec, u32 nsec) 96 { 97 if (sec || nsec) { 98 struct timespec64 ts = { 99 sec, 100 min_t(u32, nsec, NSEC_PER_SEC - 1) 101 }; 102 103 return get_jiffies_64() + timespec64_to_jiffies(&ts); 104 } else 105 return 0; 106 } 107 108 /* 109 * Set dentry and possibly attribute timeouts from the lookup/mk* 110 * replies 111 */ 112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 113 { 114 fuse_dentry_settime(entry, 115 time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); 116 } 117 118 static u64 attr_timeout(struct fuse_attr_out *o) 119 { 120 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); 121 } 122 123 u64 entry_attr_timeout(struct fuse_entry_out *o) 124 { 125 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); 126 } 127 128 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 129 { 130 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 131 } 132 133 /* 134 * Mark the attributes as stale, so that at the next call to 135 * ->getattr() they will be fetched from userspace 136 */ 137 void fuse_invalidate_attr(struct inode *inode) 138 { 139 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 140 } 141 142 static void fuse_dir_changed(struct inode *dir) 143 { 144 fuse_invalidate_attr(dir); 145 inode_maybe_inc_iversion(dir, false); 146 } 147 148 /* 149 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 150 * atime is not used. 151 */ 152 void fuse_invalidate_atime(struct inode *inode) 153 { 154 if (!IS_RDONLY(inode)) 155 fuse_invalidate_attr_mask(inode, STATX_ATIME); 156 } 157 158 /* 159 * Just mark the entry as stale, so that a next attempt to look it up 160 * will result in a new lookup call to userspace 161 * 162 * This is called when a dentry is about to become negative and the 163 * timeout is unknown (unlink, rmdir, rename and in some cases 164 * lookup) 165 */ 166 void fuse_invalidate_entry_cache(struct dentry *entry) 167 { 168 fuse_dentry_settime(entry, 0); 169 } 170 171 /* 172 * Same as fuse_invalidate_entry_cache(), but also try to remove the 173 * dentry from the hash 174 */ 175 static void fuse_invalidate_entry(struct dentry *entry) 176 { 177 d_invalidate(entry); 178 fuse_invalidate_entry_cache(entry); 179 } 180 181 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 182 u64 nodeid, const struct qstr *name, 183 struct fuse_entry_out *outarg) 184 { 185 memset(outarg, 0, sizeof(struct fuse_entry_out)); 186 args->opcode = FUSE_LOOKUP; 187 args->nodeid = nodeid; 188 args->in_numargs = 1; 189 args->in_args[0].size = name->len + 1; 190 args->in_args[0].value = name->name; 191 args->out_numargs = 1; 192 args->out_args[0].size = sizeof(struct fuse_entry_out); 193 args->out_args[0].value = outarg; 194 } 195 196 /* 197 * Check whether the dentry is still valid 198 * 199 * If the entry validity timeout has expired and the dentry is 200 * positive, try to redo the lookup. If the lookup results in a 201 * different inode, then let the VFS invalidate the dentry and redo 202 * the lookup once more. If the lookup results in the same inode, 203 * then refresh the attributes, timeouts and mark the dentry valid. 204 */ 205 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 206 { 207 struct inode *inode; 208 struct dentry *parent; 209 struct fuse_mount *fm; 210 struct fuse_inode *fi; 211 int ret; 212 213 inode = d_inode_rcu(entry); 214 if (inode && fuse_is_bad(inode)) 215 goto invalid; 216 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 217 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) { 218 struct fuse_entry_out outarg; 219 FUSE_ARGS(args); 220 struct fuse_forget_link *forget; 221 u64 attr_version; 222 223 /* For negative dentries, always do a fresh lookup */ 224 if (!inode) 225 goto invalid; 226 227 ret = -ECHILD; 228 if (flags & LOOKUP_RCU) 229 goto out; 230 231 fm = get_fuse_mount(inode); 232 233 forget = fuse_alloc_forget(); 234 ret = -ENOMEM; 235 if (!forget) 236 goto out; 237 238 attr_version = fuse_get_attr_version(fm->fc); 239 240 parent = dget_parent(entry); 241 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)), 242 &entry->d_name, &outarg); 243 ret = fuse_simple_request(fm, &args); 244 dput(parent); 245 /* Zero nodeid is same as -ENOENT */ 246 if (!ret && !outarg.nodeid) 247 ret = -ENOENT; 248 if (!ret) { 249 fi = get_fuse_inode(inode); 250 if (outarg.nodeid != get_node_id(inode) || 251 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) { 252 fuse_queue_forget(fm->fc, forget, 253 outarg.nodeid, 1); 254 goto invalid; 255 } 256 spin_lock(&fi->lock); 257 fi->nlookup++; 258 spin_unlock(&fi->lock); 259 } 260 kfree(forget); 261 if (ret == -ENOMEM || ret == -EINTR) 262 goto out; 263 if (ret || fuse_invalid_attr(&outarg.attr) || 264 fuse_stale_inode(inode, outarg.generation, &outarg.attr)) 265 goto invalid; 266 267 forget_all_cached_acls(inode); 268 fuse_change_attributes(inode, &outarg.attr, 269 entry_attr_timeout(&outarg), 270 attr_version); 271 fuse_change_entry_timeout(entry, &outarg); 272 } else if (inode) { 273 fi = get_fuse_inode(inode); 274 if (flags & LOOKUP_RCU) { 275 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 276 return -ECHILD; 277 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 278 parent = dget_parent(entry); 279 fuse_advise_use_readdirplus(d_inode(parent)); 280 dput(parent); 281 } 282 } 283 ret = 1; 284 out: 285 return ret; 286 287 invalid: 288 ret = 0; 289 goto out; 290 } 291 292 #if BITS_PER_LONG < 64 293 static int fuse_dentry_init(struct dentry *dentry) 294 { 295 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), 296 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE); 297 298 return dentry->d_fsdata ? 0 : -ENOMEM; 299 } 300 static void fuse_dentry_release(struct dentry *dentry) 301 { 302 union fuse_dentry *fd = dentry->d_fsdata; 303 304 kfree_rcu(fd, rcu); 305 } 306 #endif 307 308 static int fuse_dentry_delete(const struct dentry *dentry) 309 { 310 return time_before64(fuse_dentry_time(dentry), get_jiffies_64()); 311 } 312 313 /* 314 * Create a fuse_mount object with a new superblock (with path->dentry 315 * as the root), and return that mount so it can be auto-mounted on 316 * @path. 317 */ 318 static struct vfsmount *fuse_dentry_automount(struct path *path) 319 { 320 struct fs_context *fsc; 321 struct vfsmount *mnt; 322 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry)); 323 324 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry); 325 if (IS_ERR(fsc)) 326 return ERR_CAST(fsc); 327 328 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */ 329 fsc->fs_private = mp_fi; 330 331 /* Create the submount */ 332 mnt = fc_mount(fsc); 333 if (!IS_ERR(mnt)) 334 mntget(mnt); 335 336 put_fs_context(fsc); 337 return mnt; 338 } 339 340 const struct dentry_operations fuse_dentry_operations = { 341 .d_revalidate = fuse_dentry_revalidate, 342 .d_delete = fuse_dentry_delete, 343 #if BITS_PER_LONG < 64 344 .d_init = fuse_dentry_init, 345 .d_release = fuse_dentry_release, 346 #endif 347 .d_automount = fuse_dentry_automount, 348 }; 349 350 const struct dentry_operations fuse_root_dentry_operations = { 351 #if BITS_PER_LONG < 64 352 .d_init = fuse_dentry_init, 353 .d_release = fuse_dentry_release, 354 #endif 355 }; 356 357 int fuse_valid_type(int m) 358 { 359 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 360 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 361 } 362 363 bool fuse_invalid_attr(struct fuse_attr *attr) 364 { 365 return !fuse_valid_type(attr->mode) || 366 attr->size > LLONG_MAX; 367 } 368 369 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 370 struct fuse_entry_out *outarg, struct inode **inode) 371 { 372 struct fuse_mount *fm = get_fuse_mount_super(sb); 373 FUSE_ARGS(args); 374 struct fuse_forget_link *forget; 375 u64 attr_version; 376 int err; 377 378 *inode = NULL; 379 err = -ENAMETOOLONG; 380 if (name->len > FUSE_NAME_MAX) 381 goto out; 382 383 384 forget = fuse_alloc_forget(); 385 err = -ENOMEM; 386 if (!forget) 387 goto out; 388 389 attr_version = fuse_get_attr_version(fm->fc); 390 391 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg); 392 err = fuse_simple_request(fm, &args); 393 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 394 if (err || !outarg->nodeid) 395 goto out_put_forget; 396 397 err = -EIO; 398 if (fuse_invalid_attr(&outarg->attr)) 399 goto out_put_forget; 400 401 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 402 &outarg->attr, entry_attr_timeout(outarg), 403 attr_version); 404 err = -ENOMEM; 405 if (!*inode) { 406 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1); 407 goto out; 408 } 409 err = 0; 410 411 out_put_forget: 412 kfree(forget); 413 out: 414 return err; 415 } 416 417 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 418 unsigned int flags) 419 { 420 int err; 421 struct fuse_entry_out outarg; 422 struct inode *inode; 423 struct dentry *newent; 424 bool outarg_valid = true; 425 bool locked; 426 427 if (fuse_is_bad(dir)) 428 return ERR_PTR(-EIO); 429 430 locked = fuse_lock_inode(dir); 431 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 432 &outarg, &inode); 433 fuse_unlock_inode(dir, locked); 434 if (err == -ENOENT) { 435 outarg_valid = false; 436 err = 0; 437 } 438 if (err) 439 goto out_err; 440 441 err = -EIO; 442 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 443 goto out_iput; 444 445 newent = d_splice_alias(inode, entry); 446 err = PTR_ERR(newent); 447 if (IS_ERR(newent)) 448 goto out_err; 449 450 entry = newent ? newent : entry; 451 if (outarg_valid) 452 fuse_change_entry_timeout(entry, &outarg); 453 else 454 fuse_invalidate_entry_cache(entry); 455 456 if (inode) 457 fuse_advise_use_readdirplus(dir); 458 return newent; 459 460 out_iput: 461 iput(inode); 462 out_err: 463 return ERR_PTR(err); 464 } 465 466 static int get_security_context(struct dentry *entry, umode_t mode, 467 struct fuse_in_arg *ext) 468 { 469 struct fuse_secctx *fctx; 470 struct fuse_secctx_header *header; 471 void *ctx = NULL, *ptr; 472 u32 ctxlen, total_len = sizeof(*header); 473 int err, nr_ctx = 0; 474 const char *name; 475 size_t namelen; 476 477 err = security_dentry_init_security(entry, mode, &entry->d_name, 478 &name, &ctx, &ctxlen); 479 if (err) { 480 if (err != -EOPNOTSUPP) 481 goto out_err; 482 /* No LSM is supporting this security hook. Ignore error */ 483 ctxlen = 0; 484 ctx = NULL; 485 } 486 487 if (ctxlen) { 488 nr_ctx = 1; 489 namelen = strlen(name) + 1; 490 err = -EIO; 491 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) 492 goto out_err; 493 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); 494 } 495 496 err = -ENOMEM; 497 header = ptr = kzalloc(total_len, GFP_KERNEL); 498 if (!ptr) 499 goto out_err; 500 501 header->nr_secctx = nr_ctx; 502 header->size = total_len; 503 ptr += sizeof(*header); 504 if (nr_ctx) { 505 fctx = ptr; 506 fctx->size = ctxlen; 507 ptr += sizeof(*fctx); 508 509 strcpy(ptr, name); 510 ptr += namelen; 511 512 memcpy(ptr, ctx, ctxlen); 513 } 514 ext->size = total_len; 515 ext->value = header; 516 err = 0; 517 out_err: 518 kfree(ctx); 519 return err; 520 } 521 522 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes) 523 { 524 void *p; 525 u32 newlen = buf->size + bytes; 526 527 p = krealloc(buf->value, newlen, GFP_KERNEL); 528 if (!p) { 529 kfree(buf->value); 530 buf->size = 0; 531 buf->value = NULL; 532 return NULL; 533 } 534 535 memset(p + buf->size, 0, bytes); 536 buf->value = p; 537 buf->size = newlen; 538 539 return p + newlen - bytes; 540 } 541 542 static u32 fuse_ext_size(size_t size) 543 { 544 return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size); 545 } 546 547 /* 548 * This adds just a single supplementary group that matches the parent's group. 549 */ 550 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext) 551 { 552 struct fuse_conn *fc = get_fuse_conn(dir); 553 struct fuse_ext_header *xh; 554 struct fuse_supp_groups *sg; 555 kgid_t kgid = dir->i_gid; 556 gid_t parent_gid = from_kgid(fc->user_ns, kgid); 557 u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0])); 558 559 if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) || 560 !in_group_p(kgid)) 561 return 0; 562 563 xh = extend_arg(ext, sg_len); 564 if (!xh) 565 return -ENOMEM; 566 567 xh->size = sg_len; 568 xh->type = FUSE_EXT_GROUPS; 569 570 sg = (struct fuse_supp_groups *) &xh[1]; 571 sg->nr_groups = 1; 572 sg->groups[0] = parent_gid; 573 574 return 0; 575 } 576 577 static int get_create_ext(struct fuse_args *args, 578 struct inode *dir, struct dentry *dentry, 579 umode_t mode) 580 { 581 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 582 struct fuse_in_arg ext = { .size = 0, .value = NULL }; 583 int err = 0; 584 585 if (fc->init_security) 586 err = get_security_context(dentry, mode, &ext); 587 if (!err && fc->create_supp_group) 588 err = get_create_supp_group(dir, &ext); 589 590 if (!err && ext.size) { 591 WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args)); 592 args->is_ext = true; 593 args->ext_idx = args->in_numargs++; 594 args->in_args[args->ext_idx] = ext; 595 } else { 596 kfree(ext.value); 597 } 598 599 return err; 600 } 601 602 static void free_ext_value(struct fuse_args *args) 603 { 604 if (args->is_ext) 605 kfree(args->in_args[args->ext_idx].value); 606 } 607 608 /* 609 * Atomic create+open operation 610 * 611 * If the filesystem doesn't support this, then fall back to separate 612 * 'mknod' + 'open' requests. 613 */ 614 static int fuse_create_open(struct inode *dir, struct dentry *entry, 615 struct file *file, unsigned int flags, 616 umode_t mode, u32 opcode) 617 { 618 int err; 619 struct inode *inode; 620 struct fuse_mount *fm = get_fuse_mount(dir); 621 FUSE_ARGS(args); 622 struct fuse_forget_link *forget; 623 struct fuse_create_in inarg; 624 struct fuse_open_out outopen; 625 struct fuse_entry_out outentry; 626 struct fuse_inode *fi; 627 struct fuse_file *ff; 628 bool trunc = flags & O_TRUNC; 629 630 /* Userspace expects S_IFREG in create mode */ 631 BUG_ON((mode & S_IFMT) != S_IFREG); 632 633 forget = fuse_alloc_forget(); 634 err = -ENOMEM; 635 if (!forget) 636 goto out_err; 637 638 err = -ENOMEM; 639 ff = fuse_file_alloc(fm); 640 if (!ff) 641 goto out_put_forget_req; 642 643 if (!fm->fc->dont_mask) 644 mode &= ~current_umask(); 645 646 flags &= ~O_NOCTTY; 647 memset(&inarg, 0, sizeof(inarg)); 648 memset(&outentry, 0, sizeof(outentry)); 649 inarg.flags = flags; 650 inarg.mode = mode; 651 inarg.umask = current_umask(); 652 653 if (fm->fc->handle_killpriv_v2 && trunc && 654 !(flags & O_EXCL) && !capable(CAP_FSETID)) { 655 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID; 656 } 657 658 args.opcode = opcode; 659 args.nodeid = get_node_id(dir); 660 args.in_numargs = 2; 661 args.in_args[0].size = sizeof(inarg); 662 args.in_args[0].value = &inarg; 663 args.in_args[1].size = entry->d_name.len + 1; 664 args.in_args[1].value = entry->d_name.name; 665 args.out_numargs = 2; 666 args.out_args[0].size = sizeof(outentry); 667 args.out_args[0].value = &outentry; 668 args.out_args[1].size = sizeof(outopen); 669 args.out_args[1].value = &outopen; 670 671 err = get_create_ext(&args, dir, entry, mode); 672 if (err) 673 goto out_put_forget_req; 674 675 err = fuse_simple_request(fm, &args); 676 free_ext_value(&args); 677 if (err) 678 goto out_free_ff; 679 680 err = -EIO; 681 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) || 682 fuse_invalid_attr(&outentry.attr)) 683 goto out_free_ff; 684 685 ff->fh = outopen.fh; 686 ff->nodeid = outentry.nodeid; 687 ff->open_flags = outopen.open_flags; 688 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 689 &outentry.attr, entry_attr_timeout(&outentry), 0); 690 if (!inode) { 691 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 692 fuse_sync_release(NULL, ff, flags); 693 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1); 694 err = -ENOMEM; 695 goto out_err; 696 } 697 kfree(forget); 698 d_instantiate(entry, inode); 699 fuse_change_entry_timeout(entry, &outentry); 700 fuse_dir_changed(dir); 701 err = finish_open(file, entry, generic_file_open); 702 if (err) { 703 fi = get_fuse_inode(inode); 704 fuse_sync_release(fi, ff, flags); 705 } else { 706 file->private_data = ff; 707 fuse_finish_open(inode, file); 708 if (fm->fc->atomic_o_trunc && trunc) 709 truncate_pagecache(inode, 0); 710 else if (!(ff->open_flags & FOPEN_KEEP_CACHE)) 711 invalidate_inode_pages2(inode->i_mapping); 712 } 713 return err; 714 715 out_free_ff: 716 fuse_file_free(ff); 717 out_put_forget_req: 718 kfree(forget); 719 out_err: 720 return err; 721 } 722 723 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *, 724 umode_t, dev_t); 725 static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 726 struct file *file, unsigned flags, 727 umode_t mode) 728 { 729 int err; 730 struct fuse_conn *fc = get_fuse_conn(dir); 731 struct dentry *res = NULL; 732 733 if (fuse_is_bad(dir)) 734 return -EIO; 735 736 if (d_in_lookup(entry)) { 737 res = fuse_lookup(dir, entry, 0); 738 if (IS_ERR(res)) 739 return PTR_ERR(res); 740 741 if (res) 742 entry = res; 743 } 744 745 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 746 goto no_open; 747 748 /* Only creates */ 749 file->f_mode |= FMODE_CREATED; 750 751 if (fc->no_create) 752 goto mknod; 753 754 err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE); 755 if (err == -ENOSYS) { 756 fc->no_create = 1; 757 goto mknod; 758 } 759 out_dput: 760 dput(res); 761 return err; 762 763 mknod: 764 err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 765 if (err) 766 goto out_dput; 767 no_open: 768 return finish_no_open(file, res); 769 } 770 771 /* 772 * Code shared between mknod, mkdir, symlink and link 773 */ 774 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args, 775 struct inode *dir, struct dentry *entry, 776 umode_t mode) 777 { 778 struct fuse_entry_out outarg; 779 struct inode *inode; 780 struct dentry *d; 781 int err; 782 struct fuse_forget_link *forget; 783 784 if (fuse_is_bad(dir)) 785 return -EIO; 786 787 forget = fuse_alloc_forget(); 788 if (!forget) 789 return -ENOMEM; 790 791 memset(&outarg, 0, sizeof(outarg)); 792 args->nodeid = get_node_id(dir); 793 args->out_numargs = 1; 794 args->out_args[0].size = sizeof(outarg); 795 args->out_args[0].value = &outarg; 796 797 if (args->opcode != FUSE_LINK) { 798 err = get_create_ext(args, dir, entry, mode); 799 if (err) 800 goto out_put_forget_req; 801 } 802 803 err = fuse_simple_request(fm, args); 804 free_ext_value(args); 805 if (err) 806 goto out_put_forget_req; 807 808 err = -EIO; 809 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr)) 810 goto out_put_forget_req; 811 812 if ((outarg.attr.mode ^ mode) & S_IFMT) 813 goto out_put_forget_req; 814 815 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 816 &outarg.attr, entry_attr_timeout(&outarg), 0); 817 if (!inode) { 818 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1); 819 return -ENOMEM; 820 } 821 kfree(forget); 822 823 d_drop(entry); 824 d = d_splice_alias(inode, entry); 825 if (IS_ERR(d)) 826 return PTR_ERR(d); 827 828 if (d) { 829 fuse_change_entry_timeout(d, &outarg); 830 dput(d); 831 } else { 832 fuse_change_entry_timeout(entry, &outarg); 833 } 834 fuse_dir_changed(dir); 835 return 0; 836 837 out_put_forget_req: 838 kfree(forget); 839 return err; 840 } 841 842 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir, 843 struct dentry *entry, umode_t mode, dev_t rdev) 844 { 845 struct fuse_mknod_in inarg; 846 struct fuse_mount *fm = get_fuse_mount(dir); 847 FUSE_ARGS(args); 848 849 if (!fm->fc->dont_mask) 850 mode &= ~current_umask(); 851 852 memset(&inarg, 0, sizeof(inarg)); 853 inarg.mode = mode; 854 inarg.rdev = new_encode_dev(rdev); 855 inarg.umask = current_umask(); 856 args.opcode = FUSE_MKNOD; 857 args.in_numargs = 2; 858 args.in_args[0].size = sizeof(inarg); 859 args.in_args[0].value = &inarg; 860 args.in_args[1].size = entry->d_name.len + 1; 861 args.in_args[1].value = entry->d_name.name; 862 return create_new_entry(fm, &args, dir, entry, mode); 863 } 864 865 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir, 866 struct dentry *entry, umode_t mode, bool excl) 867 { 868 return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 869 } 870 871 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir, 872 struct file *file, umode_t mode) 873 { 874 struct fuse_conn *fc = get_fuse_conn(dir); 875 int err; 876 877 if (fc->no_tmpfile) 878 return -EOPNOTSUPP; 879 880 err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE); 881 if (err == -ENOSYS) { 882 fc->no_tmpfile = 1; 883 err = -EOPNOTSUPP; 884 } 885 return err; 886 } 887 888 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir, 889 struct dentry *entry, umode_t mode) 890 { 891 struct fuse_mkdir_in inarg; 892 struct fuse_mount *fm = get_fuse_mount(dir); 893 FUSE_ARGS(args); 894 895 if (!fm->fc->dont_mask) 896 mode &= ~current_umask(); 897 898 memset(&inarg, 0, sizeof(inarg)); 899 inarg.mode = mode; 900 inarg.umask = current_umask(); 901 args.opcode = FUSE_MKDIR; 902 args.in_numargs = 2; 903 args.in_args[0].size = sizeof(inarg); 904 args.in_args[0].value = &inarg; 905 args.in_args[1].size = entry->d_name.len + 1; 906 args.in_args[1].value = entry->d_name.name; 907 return create_new_entry(fm, &args, dir, entry, S_IFDIR); 908 } 909 910 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir, 911 struct dentry *entry, const char *link) 912 { 913 struct fuse_mount *fm = get_fuse_mount(dir); 914 unsigned len = strlen(link) + 1; 915 FUSE_ARGS(args); 916 917 args.opcode = FUSE_SYMLINK; 918 args.in_numargs = 2; 919 args.in_args[0].size = entry->d_name.len + 1; 920 args.in_args[0].value = entry->d_name.name; 921 args.in_args[1].size = len; 922 args.in_args[1].value = link; 923 return create_new_entry(fm, &args, dir, entry, S_IFLNK); 924 } 925 926 void fuse_flush_time_update(struct inode *inode) 927 { 928 int err = sync_inode_metadata(inode, 1); 929 930 mapping_set_error(inode->i_mapping, err); 931 } 932 933 static void fuse_update_ctime_in_cache(struct inode *inode) 934 { 935 if (!IS_NOCMTIME(inode)) { 936 inode->i_ctime = current_time(inode); 937 mark_inode_dirty_sync(inode); 938 fuse_flush_time_update(inode); 939 } 940 } 941 942 void fuse_update_ctime(struct inode *inode) 943 { 944 fuse_invalidate_attr_mask(inode, STATX_CTIME); 945 fuse_update_ctime_in_cache(inode); 946 } 947 948 static void fuse_entry_unlinked(struct dentry *entry) 949 { 950 struct inode *inode = d_inode(entry); 951 struct fuse_conn *fc = get_fuse_conn(inode); 952 struct fuse_inode *fi = get_fuse_inode(inode); 953 954 spin_lock(&fi->lock); 955 fi->attr_version = atomic64_inc_return(&fc->attr_version); 956 /* 957 * If i_nlink == 0 then unlink doesn't make sense, yet this can 958 * happen if userspace filesystem is careless. It would be 959 * difficult to enforce correct nlink usage so just ignore this 960 * condition here 961 */ 962 if (S_ISDIR(inode->i_mode)) 963 clear_nlink(inode); 964 else if (inode->i_nlink > 0) 965 drop_nlink(inode); 966 spin_unlock(&fi->lock); 967 fuse_invalidate_entry_cache(entry); 968 fuse_update_ctime(inode); 969 } 970 971 static int fuse_unlink(struct inode *dir, struct dentry *entry) 972 { 973 int err; 974 struct fuse_mount *fm = get_fuse_mount(dir); 975 FUSE_ARGS(args); 976 977 if (fuse_is_bad(dir)) 978 return -EIO; 979 980 args.opcode = FUSE_UNLINK; 981 args.nodeid = get_node_id(dir); 982 args.in_numargs = 1; 983 args.in_args[0].size = entry->d_name.len + 1; 984 args.in_args[0].value = entry->d_name.name; 985 err = fuse_simple_request(fm, &args); 986 if (!err) { 987 fuse_dir_changed(dir); 988 fuse_entry_unlinked(entry); 989 } else if (err == -EINTR) 990 fuse_invalidate_entry(entry); 991 return err; 992 } 993 994 static int fuse_rmdir(struct inode *dir, struct dentry *entry) 995 { 996 int err; 997 struct fuse_mount *fm = get_fuse_mount(dir); 998 FUSE_ARGS(args); 999 1000 if (fuse_is_bad(dir)) 1001 return -EIO; 1002 1003 args.opcode = FUSE_RMDIR; 1004 args.nodeid = get_node_id(dir); 1005 args.in_numargs = 1; 1006 args.in_args[0].size = entry->d_name.len + 1; 1007 args.in_args[0].value = entry->d_name.name; 1008 err = fuse_simple_request(fm, &args); 1009 if (!err) { 1010 fuse_dir_changed(dir); 1011 fuse_entry_unlinked(entry); 1012 } else if (err == -EINTR) 1013 fuse_invalidate_entry(entry); 1014 return err; 1015 } 1016 1017 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 1018 struct inode *newdir, struct dentry *newent, 1019 unsigned int flags, int opcode, size_t argsize) 1020 { 1021 int err; 1022 struct fuse_rename2_in inarg; 1023 struct fuse_mount *fm = get_fuse_mount(olddir); 1024 FUSE_ARGS(args); 1025 1026 memset(&inarg, 0, argsize); 1027 inarg.newdir = get_node_id(newdir); 1028 inarg.flags = flags; 1029 args.opcode = opcode; 1030 args.nodeid = get_node_id(olddir); 1031 args.in_numargs = 3; 1032 args.in_args[0].size = argsize; 1033 args.in_args[0].value = &inarg; 1034 args.in_args[1].size = oldent->d_name.len + 1; 1035 args.in_args[1].value = oldent->d_name.name; 1036 args.in_args[2].size = newent->d_name.len + 1; 1037 args.in_args[2].value = newent->d_name.name; 1038 err = fuse_simple_request(fm, &args); 1039 if (!err) { 1040 /* ctime changes */ 1041 fuse_update_ctime(d_inode(oldent)); 1042 1043 if (flags & RENAME_EXCHANGE) 1044 fuse_update_ctime(d_inode(newent)); 1045 1046 fuse_dir_changed(olddir); 1047 if (olddir != newdir) 1048 fuse_dir_changed(newdir); 1049 1050 /* newent will end up negative */ 1051 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) 1052 fuse_entry_unlinked(newent); 1053 } else if (err == -EINTR) { 1054 /* If request was interrupted, DEITY only knows if the 1055 rename actually took place. If the invalidation 1056 fails (e.g. some process has CWD under the renamed 1057 directory), then there can be inconsistency between 1058 the dcache and the real filesystem. Tough luck. */ 1059 fuse_invalidate_entry(oldent); 1060 if (d_really_is_positive(newent)) 1061 fuse_invalidate_entry(newent); 1062 } 1063 1064 return err; 1065 } 1066 1067 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir, 1068 struct dentry *oldent, struct inode *newdir, 1069 struct dentry *newent, unsigned int flags) 1070 { 1071 struct fuse_conn *fc = get_fuse_conn(olddir); 1072 int err; 1073 1074 if (fuse_is_bad(olddir)) 1075 return -EIO; 1076 1077 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT)) 1078 return -EINVAL; 1079 1080 if (flags) { 1081 if (fc->no_rename2 || fc->minor < 23) 1082 return -EINVAL; 1083 1084 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 1085 FUSE_RENAME2, 1086 sizeof(struct fuse_rename2_in)); 1087 if (err == -ENOSYS) { 1088 fc->no_rename2 = 1; 1089 err = -EINVAL; 1090 } 1091 } else { 1092 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 1093 FUSE_RENAME, 1094 sizeof(struct fuse_rename_in)); 1095 } 1096 1097 return err; 1098 } 1099 1100 static int fuse_link(struct dentry *entry, struct inode *newdir, 1101 struct dentry *newent) 1102 { 1103 int err; 1104 struct fuse_link_in inarg; 1105 struct inode *inode = d_inode(entry); 1106 struct fuse_mount *fm = get_fuse_mount(inode); 1107 FUSE_ARGS(args); 1108 1109 memset(&inarg, 0, sizeof(inarg)); 1110 inarg.oldnodeid = get_node_id(inode); 1111 args.opcode = FUSE_LINK; 1112 args.in_numargs = 2; 1113 args.in_args[0].size = sizeof(inarg); 1114 args.in_args[0].value = &inarg; 1115 args.in_args[1].size = newent->d_name.len + 1; 1116 args.in_args[1].value = newent->d_name.name; 1117 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode); 1118 if (!err) 1119 fuse_update_ctime_in_cache(inode); 1120 else if (err == -EINTR) 1121 fuse_invalidate_attr(inode); 1122 1123 return err; 1124 } 1125 1126 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1127 struct kstat *stat) 1128 { 1129 unsigned int blkbits; 1130 struct fuse_conn *fc = get_fuse_conn(inode); 1131 1132 stat->dev = inode->i_sb->s_dev; 1133 stat->ino = attr->ino; 1134 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1135 stat->nlink = attr->nlink; 1136 stat->uid = make_kuid(fc->user_ns, attr->uid); 1137 stat->gid = make_kgid(fc->user_ns, attr->gid); 1138 stat->rdev = inode->i_rdev; 1139 stat->atime.tv_sec = attr->atime; 1140 stat->atime.tv_nsec = attr->atimensec; 1141 stat->mtime.tv_sec = attr->mtime; 1142 stat->mtime.tv_nsec = attr->mtimensec; 1143 stat->ctime.tv_sec = attr->ctime; 1144 stat->ctime.tv_nsec = attr->ctimensec; 1145 stat->size = attr->size; 1146 stat->blocks = attr->blocks; 1147 1148 if (attr->blksize != 0) 1149 blkbits = ilog2(attr->blksize); 1150 else 1151 blkbits = inode->i_sb->s_blocksize_bits; 1152 1153 stat->blksize = 1 << blkbits; 1154 } 1155 1156 static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1157 struct file *file) 1158 { 1159 int err; 1160 struct fuse_getattr_in inarg; 1161 struct fuse_attr_out outarg; 1162 struct fuse_mount *fm = get_fuse_mount(inode); 1163 FUSE_ARGS(args); 1164 u64 attr_version; 1165 1166 attr_version = fuse_get_attr_version(fm->fc); 1167 1168 memset(&inarg, 0, sizeof(inarg)); 1169 memset(&outarg, 0, sizeof(outarg)); 1170 /* Directories have separate file-handle space */ 1171 if (file && S_ISREG(inode->i_mode)) { 1172 struct fuse_file *ff = file->private_data; 1173 1174 inarg.getattr_flags |= FUSE_GETATTR_FH; 1175 inarg.fh = ff->fh; 1176 } 1177 args.opcode = FUSE_GETATTR; 1178 args.nodeid = get_node_id(inode); 1179 args.in_numargs = 1; 1180 args.in_args[0].size = sizeof(inarg); 1181 args.in_args[0].value = &inarg; 1182 args.out_numargs = 1; 1183 args.out_args[0].size = sizeof(outarg); 1184 args.out_args[0].value = &outarg; 1185 err = fuse_simple_request(fm, &args); 1186 if (!err) { 1187 if (fuse_invalid_attr(&outarg.attr) || 1188 inode_wrong_type(inode, outarg.attr.mode)) { 1189 fuse_make_bad(inode); 1190 err = -EIO; 1191 } else { 1192 fuse_change_attributes(inode, &outarg.attr, 1193 attr_timeout(&outarg), 1194 attr_version); 1195 if (stat) 1196 fuse_fillattr(inode, &outarg.attr, stat); 1197 } 1198 } 1199 return err; 1200 } 1201 1202 static int fuse_update_get_attr(struct inode *inode, struct file *file, 1203 struct kstat *stat, u32 request_mask, 1204 unsigned int flags) 1205 { 1206 struct fuse_inode *fi = get_fuse_inode(inode); 1207 int err = 0; 1208 bool sync; 1209 u32 inval_mask = READ_ONCE(fi->inval_mask); 1210 u32 cache_mask = fuse_get_cache_mask(inode); 1211 1212 /* FUSE only supports basic stats */ 1213 request_mask &= STATX_BASIC_STATS; 1214 1215 if (!request_mask) 1216 sync = false; 1217 else if (flags & AT_STATX_FORCE_SYNC) 1218 sync = true; 1219 else if (flags & AT_STATX_DONT_SYNC) 1220 sync = false; 1221 else if (request_mask & inval_mask & ~cache_mask) 1222 sync = true; 1223 else 1224 sync = time_before64(fi->i_time, get_jiffies_64()); 1225 1226 if (sync) { 1227 forget_all_cached_acls(inode); 1228 err = fuse_do_getattr(inode, stat, file); 1229 } else if (stat) { 1230 generic_fillattr(&nop_mnt_idmap, inode, stat); 1231 stat->mode = fi->orig_i_mode; 1232 stat->ino = fi->orig_ino; 1233 } 1234 1235 return err; 1236 } 1237 1238 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) 1239 { 1240 return fuse_update_get_attr(inode, file, NULL, mask, 0); 1241 } 1242 1243 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, 1244 u64 child_nodeid, struct qstr *name, u32 flags) 1245 { 1246 int err = -ENOTDIR; 1247 struct inode *parent; 1248 struct dentry *dir; 1249 struct dentry *entry; 1250 1251 parent = fuse_ilookup(fc, parent_nodeid, NULL); 1252 if (!parent) 1253 return -ENOENT; 1254 1255 inode_lock_nested(parent, I_MUTEX_PARENT); 1256 if (!S_ISDIR(parent->i_mode)) 1257 goto unlock; 1258 1259 err = -ENOENT; 1260 dir = d_find_alias(parent); 1261 if (!dir) 1262 goto unlock; 1263 1264 name->hash = full_name_hash(dir, name->name, name->len); 1265 entry = d_lookup(dir, name); 1266 dput(dir); 1267 if (!entry) 1268 goto unlock; 1269 1270 fuse_dir_changed(parent); 1271 if (!(flags & FUSE_EXPIRE_ONLY)) 1272 d_invalidate(entry); 1273 fuse_invalidate_entry_cache(entry); 1274 1275 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1276 inode_lock(d_inode(entry)); 1277 if (get_node_id(d_inode(entry)) != child_nodeid) { 1278 err = -ENOENT; 1279 goto badentry; 1280 } 1281 if (d_mountpoint(entry)) { 1282 err = -EBUSY; 1283 goto badentry; 1284 } 1285 if (d_is_dir(entry)) { 1286 shrink_dcache_parent(entry); 1287 if (!simple_empty(entry)) { 1288 err = -ENOTEMPTY; 1289 goto badentry; 1290 } 1291 d_inode(entry)->i_flags |= S_DEAD; 1292 } 1293 dont_mount(entry); 1294 clear_nlink(d_inode(entry)); 1295 err = 0; 1296 badentry: 1297 inode_unlock(d_inode(entry)); 1298 if (!err) 1299 d_delete(entry); 1300 } else { 1301 err = 0; 1302 } 1303 dput(entry); 1304 1305 unlock: 1306 inode_unlock(parent); 1307 iput(parent); 1308 return err; 1309 } 1310 1311 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc) 1312 { 1313 const struct cred *cred = current_cred(); 1314 1315 return (uid_eq(cred->euid, fc->user_id) && 1316 uid_eq(cred->suid, fc->user_id) && 1317 uid_eq(cred->uid, fc->user_id) && 1318 gid_eq(cred->egid, fc->group_id) && 1319 gid_eq(cred->sgid, fc->group_id) && 1320 gid_eq(cred->gid, fc->group_id)); 1321 } 1322 1323 /* 1324 * Calling into a user-controlled filesystem gives the filesystem 1325 * daemon ptrace-like capabilities over the current process. This 1326 * means, that the filesystem daemon is able to record the exact 1327 * filesystem operations performed, and can also control the behavior 1328 * of the requester process in otherwise impossible ways. For example 1329 * it can delay the operation for arbitrary length of time allowing 1330 * DoS against the requester. 1331 * 1332 * For this reason only those processes can call into the filesystem, 1333 * for which the owner of the mount has ptrace privilege. This 1334 * excludes processes started by other users, suid or sgid processes. 1335 */ 1336 bool fuse_allow_current_process(struct fuse_conn *fc) 1337 { 1338 bool allow; 1339 1340 if (fc->allow_other) 1341 allow = current_in_userns(fc->user_ns); 1342 else 1343 allow = fuse_permissible_uidgid(fc); 1344 1345 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN)) 1346 allow = true; 1347 1348 return allow; 1349 } 1350 1351 static int fuse_access(struct inode *inode, int mask) 1352 { 1353 struct fuse_mount *fm = get_fuse_mount(inode); 1354 FUSE_ARGS(args); 1355 struct fuse_access_in inarg; 1356 int err; 1357 1358 BUG_ON(mask & MAY_NOT_BLOCK); 1359 1360 if (fm->fc->no_access) 1361 return 0; 1362 1363 memset(&inarg, 0, sizeof(inarg)); 1364 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1365 args.opcode = FUSE_ACCESS; 1366 args.nodeid = get_node_id(inode); 1367 args.in_numargs = 1; 1368 args.in_args[0].size = sizeof(inarg); 1369 args.in_args[0].value = &inarg; 1370 err = fuse_simple_request(fm, &args); 1371 if (err == -ENOSYS) { 1372 fm->fc->no_access = 1; 1373 err = 0; 1374 } 1375 return err; 1376 } 1377 1378 static int fuse_perm_getattr(struct inode *inode, int mask) 1379 { 1380 if (mask & MAY_NOT_BLOCK) 1381 return -ECHILD; 1382 1383 forget_all_cached_acls(inode); 1384 return fuse_do_getattr(inode, NULL, NULL); 1385 } 1386 1387 /* 1388 * Check permission. The two basic access models of FUSE are: 1389 * 1390 * 1) Local access checking ('default_permissions' mount option) based 1391 * on file mode. This is the plain old disk filesystem permission 1392 * modell. 1393 * 1394 * 2) "Remote" access checking, where server is responsible for 1395 * checking permission in each inode operation. An exception to this 1396 * is if ->permission() was invoked from sys_access() in which case an 1397 * access request is sent. Execute permission is still checked 1398 * locally based on file mode. 1399 */ 1400 static int fuse_permission(struct mnt_idmap *idmap, 1401 struct inode *inode, int mask) 1402 { 1403 struct fuse_conn *fc = get_fuse_conn(inode); 1404 bool refreshed = false; 1405 int err = 0; 1406 1407 if (fuse_is_bad(inode)) 1408 return -EIO; 1409 1410 if (!fuse_allow_current_process(fc)) 1411 return -EACCES; 1412 1413 /* 1414 * If attributes are needed, refresh them before proceeding 1415 */ 1416 if (fc->default_permissions || 1417 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1418 struct fuse_inode *fi = get_fuse_inode(inode); 1419 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1420 1421 if (perm_mask & READ_ONCE(fi->inval_mask) || 1422 time_before64(fi->i_time, get_jiffies_64())) { 1423 refreshed = true; 1424 1425 err = fuse_perm_getattr(inode, mask); 1426 if (err) 1427 return err; 1428 } 1429 } 1430 1431 if (fc->default_permissions) { 1432 err = generic_permission(&nop_mnt_idmap, inode, mask); 1433 1434 /* If permission is denied, try to refresh file 1435 attributes. This is also needed, because the root 1436 node will at first have no permissions */ 1437 if (err == -EACCES && !refreshed) { 1438 err = fuse_perm_getattr(inode, mask); 1439 if (!err) 1440 err = generic_permission(&nop_mnt_idmap, 1441 inode, mask); 1442 } 1443 1444 /* Note: the opposite of the above test does not 1445 exist. So if permissions are revoked this won't be 1446 noticed immediately, only after the attribute 1447 timeout has expired */ 1448 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1449 err = fuse_access(inode, mask); 1450 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1451 if (!(inode->i_mode & S_IXUGO)) { 1452 if (refreshed) 1453 return -EACCES; 1454 1455 err = fuse_perm_getattr(inode, mask); 1456 if (!err && !(inode->i_mode & S_IXUGO)) 1457 return -EACCES; 1458 } 1459 } 1460 return err; 1461 } 1462 1463 static int fuse_readlink_page(struct inode *inode, struct page *page) 1464 { 1465 struct fuse_mount *fm = get_fuse_mount(inode); 1466 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 }; 1467 struct fuse_args_pages ap = { 1468 .num_pages = 1, 1469 .pages = &page, 1470 .descs = &desc, 1471 }; 1472 char *link; 1473 ssize_t res; 1474 1475 ap.args.opcode = FUSE_READLINK; 1476 ap.args.nodeid = get_node_id(inode); 1477 ap.args.out_pages = true; 1478 ap.args.out_argvar = true; 1479 ap.args.page_zeroing = true; 1480 ap.args.out_numargs = 1; 1481 ap.args.out_args[0].size = desc.length; 1482 res = fuse_simple_request(fm, &ap.args); 1483 1484 fuse_invalidate_atime(inode); 1485 1486 if (res < 0) 1487 return res; 1488 1489 if (WARN_ON(res >= PAGE_SIZE)) 1490 return -EIO; 1491 1492 link = page_address(page); 1493 link[res] = '\0'; 1494 1495 return 0; 1496 } 1497 1498 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1499 struct delayed_call *callback) 1500 { 1501 struct fuse_conn *fc = get_fuse_conn(inode); 1502 struct page *page; 1503 int err; 1504 1505 err = -EIO; 1506 if (fuse_is_bad(inode)) 1507 goto out_err; 1508 1509 if (fc->cache_symlinks) 1510 return page_get_link(dentry, inode, callback); 1511 1512 err = -ECHILD; 1513 if (!dentry) 1514 goto out_err; 1515 1516 page = alloc_page(GFP_KERNEL); 1517 err = -ENOMEM; 1518 if (!page) 1519 goto out_err; 1520 1521 err = fuse_readlink_page(inode, page); 1522 if (err) { 1523 __free_page(page); 1524 goto out_err; 1525 } 1526 1527 set_delayed_call(callback, page_put_link, page); 1528 1529 return page_address(page); 1530 1531 out_err: 1532 return ERR_PTR(err); 1533 } 1534 1535 static int fuse_dir_open(struct inode *inode, struct file *file) 1536 { 1537 return fuse_open_common(inode, file, true); 1538 } 1539 1540 static int fuse_dir_release(struct inode *inode, struct file *file) 1541 { 1542 fuse_release_common(file, true); 1543 1544 return 0; 1545 } 1546 1547 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1548 int datasync) 1549 { 1550 struct inode *inode = file->f_mapping->host; 1551 struct fuse_conn *fc = get_fuse_conn(inode); 1552 int err; 1553 1554 if (fuse_is_bad(inode)) 1555 return -EIO; 1556 1557 if (fc->no_fsyncdir) 1558 return 0; 1559 1560 inode_lock(inode); 1561 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1562 if (err == -ENOSYS) { 1563 fc->no_fsyncdir = 1; 1564 err = 0; 1565 } 1566 inode_unlock(inode); 1567 1568 return err; 1569 } 1570 1571 static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1572 unsigned long arg) 1573 { 1574 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1575 1576 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1577 if (fc->minor < 18) 1578 return -ENOTTY; 1579 1580 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1581 } 1582 1583 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1584 unsigned long arg) 1585 { 1586 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1587 1588 if (fc->minor < 18) 1589 return -ENOTTY; 1590 1591 return fuse_ioctl_common(file, cmd, arg, 1592 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1593 } 1594 1595 static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1596 { 1597 /* Always update if mtime is explicitly set */ 1598 if (ivalid & ATTR_MTIME_SET) 1599 return true; 1600 1601 /* Or if kernel i_mtime is the official one */ 1602 if (trust_local_mtime) 1603 return true; 1604 1605 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1606 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1607 return false; 1608 1609 /* In all other cases update */ 1610 return true; 1611 } 1612 1613 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1614 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1615 { 1616 unsigned ivalid = iattr->ia_valid; 1617 1618 if (ivalid & ATTR_MODE) 1619 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1620 if (ivalid & ATTR_UID) 1621 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1622 if (ivalid & ATTR_GID) 1623 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1624 if (ivalid & ATTR_SIZE) 1625 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1626 if (ivalid & ATTR_ATIME) { 1627 arg->valid |= FATTR_ATIME; 1628 arg->atime = iattr->ia_atime.tv_sec; 1629 arg->atimensec = iattr->ia_atime.tv_nsec; 1630 if (!(ivalid & ATTR_ATIME_SET)) 1631 arg->valid |= FATTR_ATIME_NOW; 1632 } 1633 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1634 arg->valid |= FATTR_MTIME; 1635 arg->mtime = iattr->ia_mtime.tv_sec; 1636 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1637 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1638 arg->valid |= FATTR_MTIME_NOW; 1639 } 1640 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1641 arg->valid |= FATTR_CTIME; 1642 arg->ctime = iattr->ia_ctime.tv_sec; 1643 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1644 } 1645 } 1646 1647 /* 1648 * Prevent concurrent writepages on inode 1649 * 1650 * This is done by adding a negative bias to the inode write counter 1651 * and waiting for all pending writes to finish. 1652 */ 1653 void fuse_set_nowrite(struct inode *inode) 1654 { 1655 struct fuse_inode *fi = get_fuse_inode(inode); 1656 1657 BUG_ON(!inode_is_locked(inode)); 1658 1659 spin_lock(&fi->lock); 1660 BUG_ON(fi->writectr < 0); 1661 fi->writectr += FUSE_NOWRITE; 1662 spin_unlock(&fi->lock); 1663 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1664 } 1665 1666 /* 1667 * Allow writepages on inode 1668 * 1669 * Remove the bias from the writecounter and send any queued 1670 * writepages. 1671 */ 1672 static void __fuse_release_nowrite(struct inode *inode) 1673 { 1674 struct fuse_inode *fi = get_fuse_inode(inode); 1675 1676 BUG_ON(fi->writectr != FUSE_NOWRITE); 1677 fi->writectr = 0; 1678 fuse_flush_writepages(inode); 1679 } 1680 1681 void fuse_release_nowrite(struct inode *inode) 1682 { 1683 struct fuse_inode *fi = get_fuse_inode(inode); 1684 1685 spin_lock(&fi->lock); 1686 __fuse_release_nowrite(inode); 1687 spin_unlock(&fi->lock); 1688 } 1689 1690 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1691 struct inode *inode, 1692 struct fuse_setattr_in *inarg_p, 1693 struct fuse_attr_out *outarg_p) 1694 { 1695 args->opcode = FUSE_SETATTR; 1696 args->nodeid = get_node_id(inode); 1697 args->in_numargs = 1; 1698 args->in_args[0].size = sizeof(*inarg_p); 1699 args->in_args[0].value = inarg_p; 1700 args->out_numargs = 1; 1701 args->out_args[0].size = sizeof(*outarg_p); 1702 args->out_args[0].value = outarg_p; 1703 } 1704 1705 /* 1706 * Flush inode->i_mtime to the server 1707 */ 1708 int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1709 { 1710 struct fuse_mount *fm = get_fuse_mount(inode); 1711 FUSE_ARGS(args); 1712 struct fuse_setattr_in inarg; 1713 struct fuse_attr_out outarg; 1714 1715 memset(&inarg, 0, sizeof(inarg)); 1716 memset(&outarg, 0, sizeof(outarg)); 1717 1718 inarg.valid = FATTR_MTIME; 1719 inarg.mtime = inode->i_mtime.tv_sec; 1720 inarg.mtimensec = inode->i_mtime.tv_nsec; 1721 if (fm->fc->minor >= 23) { 1722 inarg.valid |= FATTR_CTIME; 1723 inarg.ctime = inode->i_ctime.tv_sec; 1724 inarg.ctimensec = inode->i_ctime.tv_nsec; 1725 } 1726 if (ff) { 1727 inarg.valid |= FATTR_FH; 1728 inarg.fh = ff->fh; 1729 } 1730 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg); 1731 1732 return fuse_simple_request(fm, &args); 1733 } 1734 1735 /* 1736 * Set attributes, and at the same time refresh them. 1737 * 1738 * Truncation is slightly complicated, because the 'truncate' request 1739 * may fail, in which case we don't want to touch the mapping. 1740 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1741 * and the actual truncation by hand. 1742 */ 1743 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1744 struct file *file) 1745 { 1746 struct inode *inode = d_inode(dentry); 1747 struct fuse_mount *fm = get_fuse_mount(inode); 1748 struct fuse_conn *fc = fm->fc; 1749 struct fuse_inode *fi = get_fuse_inode(inode); 1750 struct address_space *mapping = inode->i_mapping; 1751 FUSE_ARGS(args); 1752 struct fuse_setattr_in inarg; 1753 struct fuse_attr_out outarg; 1754 bool is_truncate = false; 1755 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode); 1756 loff_t oldsize; 1757 int err; 1758 bool trust_local_cmtime = is_wb; 1759 bool fault_blocked = false; 1760 1761 if (!fc->default_permissions) 1762 attr->ia_valid |= ATTR_FORCE; 1763 1764 err = setattr_prepare(&nop_mnt_idmap, dentry, attr); 1765 if (err) 1766 return err; 1767 1768 if (attr->ia_valid & ATTR_SIZE) { 1769 if (WARN_ON(!S_ISREG(inode->i_mode))) 1770 return -EIO; 1771 is_truncate = true; 1772 } 1773 1774 if (FUSE_IS_DAX(inode) && is_truncate) { 1775 filemap_invalidate_lock(mapping); 1776 fault_blocked = true; 1777 err = fuse_dax_break_layouts(inode, 0, 0); 1778 if (err) { 1779 filemap_invalidate_unlock(mapping); 1780 return err; 1781 } 1782 } 1783 1784 if (attr->ia_valid & ATTR_OPEN) { 1785 /* This is coming from open(..., ... | O_TRUNC); */ 1786 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1787 WARN_ON(attr->ia_size != 0); 1788 if (fc->atomic_o_trunc) { 1789 /* 1790 * No need to send request to userspace, since actual 1791 * truncation has already been done by OPEN. But still 1792 * need to truncate page cache. 1793 */ 1794 i_size_write(inode, 0); 1795 truncate_pagecache(inode, 0); 1796 goto out; 1797 } 1798 file = NULL; 1799 } 1800 1801 /* Flush dirty data/metadata before non-truncate SETATTR */ 1802 if (is_wb && 1803 attr->ia_valid & 1804 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET | 1805 ATTR_TIMES_SET)) { 1806 err = write_inode_now(inode, true); 1807 if (err) 1808 return err; 1809 1810 fuse_set_nowrite(inode); 1811 fuse_release_nowrite(inode); 1812 } 1813 1814 if (is_truncate) { 1815 fuse_set_nowrite(inode); 1816 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1817 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1818 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1819 } 1820 1821 memset(&inarg, 0, sizeof(inarg)); 1822 memset(&outarg, 0, sizeof(outarg)); 1823 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1824 if (file) { 1825 struct fuse_file *ff = file->private_data; 1826 inarg.valid |= FATTR_FH; 1827 inarg.fh = ff->fh; 1828 } 1829 1830 /* Kill suid/sgid for non-directory chown unconditionally */ 1831 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) && 1832 attr->ia_valid & (ATTR_UID | ATTR_GID)) 1833 inarg.valid |= FATTR_KILL_SUIDGID; 1834 1835 if (attr->ia_valid & ATTR_SIZE) { 1836 /* For mandatory locking in truncate */ 1837 inarg.valid |= FATTR_LOCKOWNER; 1838 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1839 1840 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 1841 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID)) 1842 inarg.valid |= FATTR_KILL_SUIDGID; 1843 } 1844 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1845 err = fuse_simple_request(fm, &args); 1846 if (err) { 1847 if (err == -EINTR) 1848 fuse_invalidate_attr(inode); 1849 goto error; 1850 } 1851 1852 if (fuse_invalid_attr(&outarg.attr) || 1853 inode_wrong_type(inode, outarg.attr.mode)) { 1854 fuse_make_bad(inode); 1855 err = -EIO; 1856 goto error; 1857 } 1858 1859 spin_lock(&fi->lock); 1860 /* the kernel maintains i_mtime locally */ 1861 if (trust_local_cmtime) { 1862 if (attr->ia_valid & ATTR_MTIME) 1863 inode->i_mtime = attr->ia_mtime; 1864 if (attr->ia_valid & ATTR_CTIME) 1865 inode->i_ctime = attr->ia_ctime; 1866 /* FIXME: clear I_DIRTY_SYNC? */ 1867 } 1868 1869 fuse_change_attributes_common(inode, &outarg.attr, 1870 attr_timeout(&outarg), 1871 fuse_get_cache_mask(inode)); 1872 oldsize = inode->i_size; 1873 /* see the comment in fuse_change_attributes() */ 1874 if (!is_wb || is_truncate) 1875 i_size_write(inode, outarg.attr.size); 1876 1877 if (is_truncate) { 1878 /* NOTE: this may release/reacquire fi->lock */ 1879 __fuse_release_nowrite(inode); 1880 } 1881 spin_unlock(&fi->lock); 1882 1883 /* 1884 * Only call invalidate_inode_pages2() after removing 1885 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock. 1886 */ 1887 if ((is_truncate || !is_wb) && 1888 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 1889 truncate_pagecache(inode, outarg.attr.size); 1890 invalidate_inode_pages2(mapping); 1891 } 1892 1893 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1894 out: 1895 if (fault_blocked) 1896 filemap_invalidate_unlock(mapping); 1897 1898 return 0; 1899 1900 error: 1901 if (is_truncate) 1902 fuse_release_nowrite(inode); 1903 1904 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1905 1906 if (fault_blocked) 1907 filemap_invalidate_unlock(mapping); 1908 return err; 1909 } 1910 1911 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry, 1912 struct iattr *attr) 1913 { 1914 struct inode *inode = d_inode(entry); 1915 struct fuse_conn *fc = get_fuse_conn(inode); 1916 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 1917 int ret; 1918 1919 if (fuse_is_bad(inode)) 1920 return -EIO; 1921 1922 if (!fuse_allow_current_process(get_fuse_conn(inode))) 1923 return -EACCES; 1924 1925 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 1926 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 1927 ATTR_MODE); 1928 1929 /* 1930 * The only sane way to reliably kill suid/sgid is to do it in 1931 * the userspace filesystem 1932 * 1933 * This should be done on write(), truncate() and chown(). 1934 */ 1935 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) { 1936 /* 1937 * ia_mode calculation may have used stale i_mode. 1938 * Refresh and recalculate. 1939 */ 1940 ret = fuse_do_getattr(inode, NULL, file); 1941 if (ret) 1942 return ret; 1943 1944 attr->ia_mode = inode->i_mode; 1945 if (inode->i_mode & S_ISUID) { 1946 attr->ia_valid |= ATTR_MODE; 1947 attr->ia_mode &= ~S_ISUID; 1948 } 1949 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 1950 attr->ia_valid |= ATTR_MODE; 1951 attr->ia_mode &= ~S_ISGID; 1952 } 1953 } 1954 } 1955 if (!attr->ia_valid) 1956 return 0; 1957 1958 ret = fuse_do_setattr(entry, attr, file); 1959 if (!ret) { 1960 /* 1961 * If filesystem supports acls it may have updated acl xattrs in 1962 * the filesystem, so forget cached acls for the inode. 1963 */ 1964 if (fc->posix_acl) 1965 forget_all_cached_acls(inode); 1966 1967 /* Directory mode changed, may need to revalidate access */ 1968 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 1969 fuse_invalidate_entry_cache(entry); 1970 } 1971 return ret; 1972 } 1973 1974 static int fuse_getattr(struct mnt_idmap *idmap, 1975 const struct path *path, struct kstat *stat, 1976 u32 request_mask, unsigned int flags) 1977 { 1978 struct inode *inode = d_inode(path->dentry); 1979 struct fuse_conn *fc = get_fuse_conn(inode); 1980 1981 if (fuse_is_bad(inode)) 1982 return -EIO; 1983 1984 if (!fuse_allow_current_process(fc)) { 1985 if (!request_mask) { 1986 /* 1987 * If user explicitly requested *nothing* then don't 1988 * error out, but return st_dev only. 1989 */ 1990 stat->result_mask = 0; 1991 stat->dev = inode->i_sb->s_dev; 1992 return 0; 1993 } 1994 return -EACCES; 1995 } 1996 1997 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 1998 } 1999 2000 static const struct inode_operations fuse_dir_inode_operations = { 2001 .lookup = fuse_lookup, 2002 .mkdir = fuse_mkdir, 2003 .symlink = fuse_symlink, 2004 .unlink = fuse_unlink, 2005 .rmdir = fuse_rmdir, 2006 .rename = fuse_rename2, 2007 .link = fuse_link, 2008 .setattr = fuse_setattr, 2009 .create = fuse_create, 2010 .atomic_open = fuse_atomic_open, 2011 .tmpfile = fuse_tmpfile, 2012 .mknod = fuse_mknod, 2013 .permission = fuse_permission, 2014 .getattr = fuse_getattr, 2015 .listxattr = fuse_listxattr, 2016 .get_inode_acl = fuse_get_inode_acl, 2017 .get_acl = fuse_get_acl, 2018 .set_acl = fuse_set_acl, 2019 .fileattr_get = fuse_fileattr_get, 2020 .fileattr_set = fuse_fileattr_set, 2021 }; 2022 2023 static const struct file_operations fuse_dir_operations = { 2024 .llseek = generic_file_llseek, 2025 .read = generic_read_dir, 2026 .iterate_shared = fuse_readdir, 2027 .open = fuse_dir_open, 2028 .release = fuse_dir_release, 2029 .fsync = fuse_dir_fsync, 2030 .unlocked_ioctl = fuse_dir_ioctl, 2031 .compat_ioctl = fuse_dir_compat_ioctl, 2032 }; 2033 2034 static const struct inode_operations fuse_common_inode_operations = { 2035 .setattr = fuse_setattr, 2036 .permission = fuse_permission, 2037 .getattr = fuse_getattr, 2038 .listxattr = fuse_listxattr, 2039 .get_inode_acl = fuse_get_inode_acl, 2040 .get_acl = fuse_get_acl, 2041 .set_acl = fuse_set_acl, 2042 .fileattr_get = fuse_fileattr_get, 2043 .fileattr_set = fuse_fileattr_set, 2044 }; 2045 2046 static const struct inode_operations fuse_symlink_inode_operations = { 2047 .setattr = fuse_setattr, 2048 .get_link = fuse_get_link, 2049 .getattr = fuse_getattr, 2050 .listxattr = fuse_listxattr, 2051 }; 2052 2053 void fuse_init_common(struct inode *inode) 2054 { 2055 inode->i_op = &fuse_common_inode_operations; 2056 } 2057 2058 void fuse_init_dir(struct inode *inode) 2059 { 2060 struct fuse_inode *fi = get_fuse_inode(inode); 2061 2062 inode->i_op = &fuse_dir_inode_operations; 2063 inode->i_fop = &fuse_dir_operations; 2064 2065 spin_lock_init(&fi->rdc.lock); 2066 fi->rdc.cached = false; 2067 fi->rdc.size = 0; 2068 fi->rdc.pos = 0; 2069 fi->rdc.version = 0; 2070 } 2071 2072 static int fuse_symlink_read_folio(struct file *null, struct folio *folio) 2073 { 2074 int err = fuse_readlink_page(folio->mapping->host, &folio->page); 2075 2076 if (!err) 2077 folio_mark_uptodate(folio); 2078 2079 folio_unlock(folio); 2080 2081 return err; 2082 } 2083 2084 static const struct address_space_operations fuse_symlink_aops = { 2085 .read_folio = fuse_symlink_read_folio, 2086 }; 2087 2088 void fuse_init_symlink(struct inode *inode) 2089 { 2090 inode->i_op = &fuse_symlink_inode_operations; 2091 inode->i_data.a_ops = &fuse_symlink_aops; 2092 inode_nohighmem(inode); 2093 } 2094