xref: /openbmc/linux/fs/fuse/dir.c (revision 972f4c46d0a1bb7fde3ce0bd15775855b2d02c68)
1 /*
2   FUSE: Filesystem in Userspace
3   Copyright (C) 2001-2008  Miklos Szeredi <miklos@szeredi.hu>
4 
5   This program can be distributed under the terms of the GNU GPL.
6   See the file COPYING.
7 */
8 
9 #include "fuse_i.h"
10 
11 #include <linux/pagemap.h>
12 #include <linux/file.h>
13 #include <linux/fs_context.h>
14 #include <linux/moduleparam.h>
15 #include <linux/sched.h>
16 #include <linux/namei.h>
17 #include <linux/slab.h>
18 #include <linux/xattr.h>
19 #include <linux/iversion.h>
20 #include <linux/posix_acl.h>
21 #include <linux/security.h>
22 #include <linux/types.h>
23 #include <linux/kernel.h>
24 
25 static bool __read_mostly allow_sys_admin_access;
26 module_param(allow_sys_admin_access, bool, 0644);
27 MODULE_PARM_DESC(allow_sys_admin_access,
28 		 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check");
29 
30 static void fuse_advise_use_readdirplus(struct inode *dir)
31 {
32 	struct fuse_inode *fi = get_fuse_inode(dir);
33 
34 	set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
35 }
36 
37 #if BITS_PER_LONG >= 64
38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
39 {
40 	entry->d_fsdata = (void *) time;
41 }
42 
43 static inline u64 fuse_dentry_time(const struct dentry *entry)
44 {
45 	return (u64)entry->d_fsdata;
46 }
47 
48 #else
49 union fuse_dentry {
50 	u64 time;
51 	struct rcu_head rcu;
52 };
53 
54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
55 {
56 	((union fuse_dentry *) dentry->d_fsdata)->time = time;
57 }
58 
59 static inline u64 fuse_dentry_time(const struct dentry *entry)
60 {
61 	return ((union fuse_dentry *) entry->d_fsdata)->time;
62 }
63 #endif
64 
65 static void fuse_dentry_settime(struct dentry *dentry, u64 time)
66 {
67 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
68 	bool delete = !time && fc->delete_stale;
69 	/*
70 	 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
71 	 * Don't care about races, either way it's just an optimization
72 	 */
73 	if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
74 	    (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
75 		spin_lock(&dentry->d_lock);
76 		if (!delete)
77 			dentry->d_flags &= ~DCACHE_OP_DELETE;
78 		else
79 			dentry->d_flags |= DCACHE_OP_DELETE;
80 		spin_unlock(&dentry->d_lock);
81 	}
82 
83 	__fuse_dentry_settime(dentry, time);
84 }
85 
86 /*
87  * FUSE caches dentries and attributes with separate timeout.  The
88  * time in jiffies until the dentry/attributes are valid is stored in
89  * dentry->d_fsdata and fuse_inode->i_time respectively.
90  */
91 
92 /*
93  * Calculate the time in jiffies until a dentry/attributes are valid
94  */
95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec)
96 {
97 	if (sec || nsec) {
98 		struct timespec64 ts = {
99 			sec,
100 			min_t(u32, nsec, NSEC_PER_SEC - 1)
101 		};
102 
103 		return get_jiffies_64() + timespec64_to_jiffies(&ts);
104 	} else
105 		return 0;
106 }
107 
108 /*
109  * Set dentry and possibly attribute timeouts from the lookup/mk*
110  * replies
111  */
112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
113 {
114 	fuse_dentry_settime(entry,
115 		fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
116 }
117 
118 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
119 {
120 	set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
121 }
122 
123 /*
124  * Mark the attributes as stale, so that at the next call to
125  * ->getattr() they will be fetched from userspace
126  */
127 void fuse_invalidate_attr(struct inode *inode)
128 {
129 	fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
130 }
131 
132 static void fuse_dir_changed(struct inode *dir)
133 {
134 	fuse_invalidate_attr(dir);
135 	inode_maybe_inc_iversion(dir, false);
136 }
137 
138 /*
139  * Mark the attributes as stale due to an atime change.  Avoid the invalidate if
140  * atime is not used.
141  */
142 void fuse_invalidate_atime(struct inode *inode)
143 {
144 	if (!IS_RDONLY(inode))
145 		fuse_invalidate_attr_mask(inode, STATX_ATIME);
146 }
147 
148 /*
149  * Just mark the entry as stale, so that a next attempt to look it up
150  * will result in a new lookup call to userspace
151  *
152  * This is called when a dentry is about to become negative and the
153  * timeout is unknown (unlink, rmdir, rename and in some cases
154  * lookup)
155  */
156 void fuse_invalidate_entry_cache(struct dentry *entry)
157 {
158 	fuse_dentry_settime(entry, 0);
159 }
160 
161 /*
162  * Same as fuse_invalidate_entry_cache(), but also try to remove the
163  * dentry from the hash
164  */
165 static void fuse_invalidate_entry(struct dentry *entry)
166 {
167 	d_invalidate(entry);
168 	fuse_invalidate_entry_cache(entry);
169 }
170 
171 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
172 			     u64 nodeid, const struct qstr *name,
173 			     struct fuse_entry_out *outarg)
174 {
175 	memset(outarg, 0, sizeof(struct fuse_entry_out));
176 	args->opcode = FUSE_LOOKUP;
177 	args->nodeid = nodeid;
178 	args->in_numargs = 1;
179 	args->in_args[0].size = name->len + 1;
180 	args->in_args[0].value = name->name;
181 	args->out_numargs = 1;
182 	args->out_args[0].size = sizeof(struct fuse_entry_out);
183 	args->out_args[0].value = outarg;
184 }
185 
186 /*
187  * Check whether the dentry is still valid
188  *
189  * If the entry validity timeout has expired and the dentry is
190  * positive, try to redo the lookup.  If the lookup results in a
191  * different inode, then let the VFS invalidate the dentry and redo
192  * the lookup once more.  If the lookup results in the same inode,
193  * then refresh the attributes, timeouts and mark the dentry valid.
194  */
195 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
196 {
197 	struct inode *inode;
198 	struct dentry *parent;
199 	struct fuse_mount *fm;
200 	struct fuse_inode *fi;
201 	int ret;
202 
203 	inode = d_inode_rcu(entry);
204 	if (inode && fuse_is_bad(inode))
205 		goto invalid;
206 	else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
207 		 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) {
208 		struct fuse_entry_out outarg;
209 		FUSE_ARGS(args);
210 		struct fuse_forget_link *forget;
211 		u64 attr_version;
212 
213 		/* For negative dentries, always do a fresh lookup */
214 		if (!inode)
215 			goto invalid;
216 
217 		ret = -ECHILD;
218 		if (flags & LOOKUP_RCU)
219 			goto out;
220 
221 		fm = get_fuse_mount(inode);
222 
223 		forget = fuse_alloc_forget();
224 		ret = -ENOMEM;
225 		if (!forget)
226 			goto out;
227 
228 		attr_version = fuse_get_attr_version(fm->fc);
229 
230 		parent = dget_parent(entry);
231 		fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
232 				 &entry->d_name, &outarg);
233 		ret = fuse_simple_request(fm, &args);
234 		dput(parent);
235 		/* Zero nodeid is same as -ENOENT */
236 		if (!ret && !outarg.nodeid)
237 			ret = -ENOENT;
238 		if (!ret) {
239 			fi = get_fuse_inode(inode);
240 			if (outarg.nodeid != get_node_id(inode) ||
241 			    (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
242 				fuse_queue_forget(fm->fc, forget,
243 						  outarg.nodeid, 1);
244 				goto invalid;
245 			}
246 			spin_lock(&fi->lock);
247 			fi->nlookup++;
248 			spin_unlock(&fi->lock);
249 		}
250 		kfree(forget);
251 		if (ret == -ENOMEM || ret == -EINTR)
252 			goto out;
253 		if (ret || fuse_invalid_attr(&outarg.attr) ||
254 		    fuse_stale_inode(inode, outarg.generation, &outarg.attr))
255 			goto invalid;
256 
257 		forget_all_cached_acls(inode);
258 		fuse_change_attributes(inode, &outarg.attr, NULL,
259 				       ATTR_TIMEOUT(&outarg),
260 				       attr_version);
261 		fuse_change_entry_timeout(entry, &outarg);
262 	} else if (inode) {
263 		fi = get_fuse_inode(inode);
264 		if (flags & LOOKUP_RCU) {
265 			if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
266 				return -ECHILD;
267 		} else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
268 			parent = dget_parent(entry);
269 			fuse_advise_use_readdirplus(d_inode(parent));
270 			dput(parent);
271 		}
272 	}
273 	ret = 1;
274 out:
275 	return ret;
276 
277 invalid:
278 	ret = 0;
279 	goto out;
280 }
281 
282 #if BITS_PER_LONG < 64
283 static int fuse_dentry_init(struct dentry *dentry)
284 {
285 	dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
286 				   GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
287 
288 	return dentry->d_fsdata ? 0 : -ENOMEM;
289 }
290 static void fuse_dentry_release(struct dentry *dentry)
291 {
292 	union fuse_dentry *fd = dentry->d_fsdata;
293 
294 	kfree_rcu(fd, rcu);
295 }
296 #endif
297 
298 static int fuse_dentry_delete(const struct dentry *dentry)
299 {
300 	return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
301 }
302 
303 /*
304  * Create a fuse_mount object with a new superblock (with path->dentry
305  * as the root), and return that mount so it can be auto-mounted on
306  * @path.
307  */
308 static struct vfsmount *fuse_dentry_automount(struct path *path)
309 {
310 	struct fs_context *fsc;
311 	struct vfsmount *mnt;
312 	struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
313 
314 	fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
315 	if (IS_ERR(fsc))
316 		return ERR_CAST(fsc);
317 
318 	/* Pass the FUSE inode of the mount for fuse_get_tree_submount() */
319 	fsc->fs_private = mp_fi;
320 
321 	/* Create the submount */
322 	mnt = fc_mount(fsc);
323 	if (!IS_ERR(mnt))
324 		mntget(mnt);
325 
326 	put_fs_context(fsc);
327 	return mnt;
328 }
329 
330 const struct dentry_operations fuse_dentry_operations = {
331 	.d_revalidate	= fuse_dentry_revalidate,
332 	.d_delete	= fuse_dentry_delete,
333 #if BITS_PER_LONG < 64
334 	.d_init		= fuse_dentry_init,
335 	.d_release	= fuse_dentry_release,
336 #endif
337 	.d_automount	= fuse_dentry_automount,
338 };
339 
340 const struct dentry_operations fuse_root_dentry_operations = {
341 #if BITS_PER_LONG < 64
342 	.d_init		= fuse_dentry_init,
343 	.d_release	= fuse_dentry_release,
344 #endif
345 };
346 
347 int fuse_valid_type(int m)
348 {
349 	return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
350 		S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
351 }
352 
353 static bool fuse_valid_size(u64 size)
354 {
355 	return size <= LLONG_MAX;
356 }
357 
358 bool fuse_invalid_attr(struct fuse_attr *attr)
359 {
360 	return !fuse_valid_type(attr->mode) || !fuse_valid_size(attr->size);
361 }
362 
363 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
364 		     struct fuse_entry_out *outarg, struct inode **inode)
365 {
366 	struct fuse_mount *fm = get_fuse_mount_super(sb);
367 	FUSE_ARGS(args);
368 	struct fuse_forget_link *forget;
369 	u64 attr_version;
370 	int err;
371 
372 	*inode = NULL;
373 	err = -ENAMETOOLONG;
374 	if (name->len > FUSE_NAME_MAX)
375 		goto out;
376 
377 
378 	forget = fuse_alloc_forget();
379 	err = -ENOMEM;
380 	if (!forget)
381 		goto out;
382 
383 	attr_version = fuse_get_attr_version(fm->fc);
384 
385 	fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
386 	err = fuse_simple_request(fm, &args);
387 	/* Zero nodeid is same as -ENOENT, but with valid timeout */
388 	if (err || !outarg->nodeid)
389 		goto out_put_forget;
390 
391 	err = -EIO;
392 	if (fuse_invalid_attr(&outarg->attr))
393 		goto out_put_forget;
394 
395 	*inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
396 			   &outarg->attr, ATTR_TIMEOUT(outarg),
397 			   attr_version);
398 	err = -ENOMEM;
399 	if (!*inode) {
400 		fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
401 		goto out;
402 	}
403 	err = 0;
404 
405  out_put_forget:
406 	kfree(forget);
407  out:
408 	return err;
409 }
410 
411 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
412 				  unsigned int flags)
413 {
414 	int err;
415 	struct fuse_entry_out outarg;
416 	struct inode *inode;
417 	struct dentry *newent;
418 	bool outarg_valid = true;
419 	bool locked;
420 
421 	if (fuse_is_bad(dir))
422 		return ERR_PTR(-EIO);
423 
424 	locked = fuse_lock_inode(dir);
425 	err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
426 			       &outarg, &inode);
427 	fuse_unlock_inode(dir, locked);
428 	if (err == -ENOENT) {
429 		outarg_valid = false;
430 		err = 0;
431 	}
432 	if (err)
433 		goto out_err;
434 
435 	err = -EIO;
436 	if (inode && get_node_id(inode) == FUSE_ROOT_ID)
437 		goto out_iput;
438 
439 	newent = d_splice_alias(inode, entry);
440 	err = PTR_ERR(newent);
441 	if (IS_ERR(newent))
442 		goto out_err;
443 
444 	entry = newent ? newent : entry;
445 	if (outarg_valid)
446 		fuse_change_entry_timeout(entry, &outarg);
447 	else
448 		fuse_invalidate_entry_cache(entry);
449 
450 	if (inode)
451 		fuse_advise_use_readdirplus(dir);
452 	return newent;
453 
454  out_iput:
455 	iput(inode);
456  out_err:
457 	return ERR_PTR(err);
458 }
459 
460 static int get_security_context(struct dentry *entry, umode_t mode,
461 				struct fuse_in_arg *ext)
462 {
463 	struct fuse_secctx *fctx;
464 	struct fuse_secctx_header *header;
465 	void *ctx = NULL, *ptr;
466 	u32 ctxlen, total_len = sizeof(*header);
467 	int err, nr_ctx = 0;
468 	const char *name;
469 	size_t namelen;
470 
471 	err = security_dentry_init_security(entry, mode, &entry->d_name,
472 					    &name, &ctx, &ctxlen);
473 	if (err) {
474 		if (err != -EOPNOTSUPP)
475 			goto out_err;
476 		/* No LSM is supporting this security hook. Ignore error */
477 		ctxlen = 0;
478 		ctx = NULL;
479 	}
480 
481 	if (ctxlen) {
482 		nr_ctx = 1;
483 		namelen = strlen(name) + 1;
484 		err = -EIO;
485 		if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX))
486 			goto out_err;
487 		total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen);
488 	}
489 
490 	err = -ENOMEM;
491 	header = ptr = kzalloc(total_len, GFP_KERNEL);
492 	if (!ptr)
493 		goto out_err;
494 
495 	header->nr_secctx = nr_ctx;
496 	header->size = total_len;
497 	ptr += sizeof(*header);
498 	if (nr_ctx) {
499 		fctx = ptr;
500 		fctx->size = ctxlen;
501 		ptr += sizeof(*fctx);
502 
503 		strcpy(ptr, name);
504 		ptr += namelen;
505 
506 		memcpy(ptr, ctx, ctxlen);
507 	}
508 	ext->size = total_len;
509 	ext->value = header;
510 	err = 0;
511 out_err:
512 	kfree(ctx);
513 	return err;
514 }
515 
516 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes)
517 {
518 	void *p;
519 	u32 newlen = buf->size + bytes;
520 
521 	p = krealloc(buf->value, newlen, GFP_KERNEL);
522 	if (!p) {
523 		kfree(buf->value);
524 		buf->size = 0;
525 		buf->value = NULL;
526 		return NULL;
527 	}
528 
529 	memset(p + buf->size, 0, bytes);
530 	buf->value = p;
531 	buf->size = newlen;
532 
533 	return p + newlen - bytes;
534 }
535 
536 static u32 fuse_ext_size(size_t size)
537 {
538 	return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size);
539 }
540 
541 /*
542  * This adds just a single supplementary group that matches the parent's group.
543  */
544 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext)
545 {
546 	struct fuse_conn *fc = get_fuse_conn(dir);
547 	struct fuse_ext_header *xh;
548 	struct fuse_supp_groups *sg;
549 	kgid_t kgid = dir->i_gid;
550 	gid_t parent_gid = from_kgid(fc->user_ns, kgid);
551 	u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0]));
552 
553 	if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) ||
554 	    !in_group_p(kgid))
555 		return 0;
556 
557 	xh = extend_arg(ext, sg_len);
558 	if (!xh)
559 		return -ENOMEM;
560 
561 	xh->size = sg_len;
562 	xh->type = FUSE_EXT_GROUPS;
563 
564 	sg = (struct fuse_supp_groups *) &xh[1];
565 	sg->nr_groups = 1;
566 	sg->groups[0] = parent_gid;
567 
568 	return 0;
569 }
570 
571 static int get_create_ext(struct fuse_args *args,
572 			  struct inode *dir, struct dentry *dentry,
573 			  umode_t mode)
574 {
575 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
576 	struct fuse_in_arg ext = { .size = 0, .value = NULL };
577 	int err = 0;
578 
579 	if (fc->init_security)
580 		err = get_security_context(dentry, mode, &ext);
581 	if (!err && fc->create_supp_group)
582 		err = get_create_supp_group(dir, &ext);
583 
584 	if (!err && ext.size) {
585 		WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args));
586 		args->is_ext = true;
587 		args->ext_idx = args->in_numargs++;
588 		args->in_args[args->ext_idx] = ext;
589 	} else {
590 		kfree(ext.value);
591 	}
592 
593 	return err;
594 }
595 
596 static void free_ext_value(struct fuse_args *args)
597 {
598 	if (args->is_ext)
599 		kfree(args->in_args[args->ext_idx].value);
600 }
601 
602 /*
603  * Atomic create+open operation
604  *
605  * If the filesystem doesn't support this, then fall back to separate
606  * 'mknod' + 'open' requests.
607  */
608 static int fuse_create_open(struct inode *dir, struct dentry *entry,
609 			    struct file *file, unsigned int flags,
610 			    umode_t mode, u32 opcode)
611 {
612 	int err;
613 	struct inode *inode;
614 	struct fuse_mount *fm = get_fuse_mount(dir);
615 	FUSE_ARGS(args);
616 	struct fuse_forget_link *forget;
617 	struct fuse_create_in inarg;
618 	struct fuse_open_out outopen;
619 	struct fuse_entry_out outentry;
620 	struct fuse_inode *fi;
621 	struct fuse_file *ff;
622 	bool trunc = flags & O_TRUNC;
623 
624 	/* Userspace expects S_IFREG in create mode */
625 	BUG_ON((mode & S_IFMT) != S_IFREG);
626 
627 	forget = fuse_alloc_forget();
628 	err = -ENOMEM;
629 	if (!forget)
630 		goto out_err;
631 
632 	err = -ENOMEM;
633 	ff = fuse_file_alloc(fm);
634 	if (!ff)
635 		goto out_put_forget_req;
636 
637 	if (!fm->fc->dont_mask)
638 		mode &= ~current_umask();
639 
640 	flags &= ~O_NOCTTY;
641 	memset(&inarg, 0, sizeof(inarg));
642 	memset(&outentry, 0, sizeof(outentry));
643 	inarg.flags = flags;
644 	inarg.mode = mode;
645 	inarg.umask = current_umask();
646 
647 	if (fm->fc->handle_killpriv_v2 && trunc &&
648 	    !(flags & O_EXCL) && !capable(CAP_FSETID)) {
649 		inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
650 	}
651 
652 	args.opcode = opcode;
653 	args.nodeid = get_node_id(dir);
654 	args.in_numargs = 2;
655 	args.in_args[0].size = sizeof(inarg);
656 	args.in_args[0].value = &inarg;
657 	args.in_args[1].size = entry->d_name.len + 1;
658 	args.in_args[1].value = entry->d_name.name;
659 	args.out_numargs = 2;
660 	args.out_args[0].size = sizeof(outentry);
661 	args.out_args[0].value = &outentry;
662 	args.out_args[1].size = sizeof(outopen);
663 	args.out_args[1].value = &outopen;
664 
665 	err = get_create_ext(&args, dir, entry, mode);
666 	if (err)
667 		goto out_put_forget_req;
668 
669 	err = fuse_simple_request(fm, &args);
670 	free_ext_value(&args);
671 	if (err)
672 		goto out_free_ff;
673 
674 	err = -EIO;
675 	if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
676 	    fuse_invalid_attr(&outentry.attr))
677 		goto out_free_ff;
678 
679 	ff->fh = outopen.fh;
680 	ff->nodeid = outentry.nodeid;
681 	ff->open_flags = outopen.open_flags;
682 	inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
683 			  &outentry.attr, ATTR_TIMEOUT(&outentry), 0);
684 	if (!inode) {
685 		flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
686 		fuse_sync_release(NULL, ff, flags);
687 		fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
688 		err = -ENOMEM;
689 		goto out_err;
690 	}
691 	kfree(forget);
692 	d_instantiate(entry, inode);
693 	fuse_change_entry_timeout(entry, &outentry);
694 	fuse_dir_changed(dir);
695 	err = finish_open(file, entry, generic_file_open);
696 	if (err) {
697 		fi = get_fuse_inode(inode);
698 		fuse_sync_release(fi, ff, flags);
699 	} else {
700 		file->private_data = ff;
701 		fuse_finish_open(inode, file);
702 		if (fm->fc->atomic_o_trunc && trunc)
703 			truncate_pagecache(inode, 0);
704 		else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
705 			invalidate_inode_pages2(inode->i_mapping);
706 	}
707 	return err;
708 
709 out_free_ff:
710 	fuse_file_free(ff);
711 out_put_forget_req:
712 	kfree(forget);
713 out_err:
714 	return err;
715 }
716 
717 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
718 		      umode_t, dev_t);
719 static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
720 			    struct file *file, unsigned flags,
721 			    umode_t mode)
722 {
723 	int err;
724 	struct fuse_conn *fc = get_fuse_conn(dir);
725 	struct dentry *res = NULL;
726 
727 	if (fuse_is_bad(dir))
728 		return -EIO;
729 
730 	if (d_in_lookup(entry)) {
731 		res = fuse_lookup(dir, entry, 0);
732 		if (IS_ERR(res))
733 			return PTR_ERR(res);
734 
735 		if (res)
736 			entry = res;
737 	}
738 
739 	if (!(flags & O_CREAT) || d_really_is_positive(entry))
740 		goto no_open;
741 
742 	/* Only creates */
743 	file->f_mode |= FMODE_CREATED;
744 
745 	if (fc->no_create)
746 		goto mknod;
747 
748 	err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE);
749 	if (err == -ENOSYS) {
750 		fc->no_create = 1;
751 		goto mknod;
752 	}
753 out_dput:
754 	dput(res);
755 	return err;
756 
757 mknod:
758 	err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
759 	if (err)
760 		goto out_dput;
761 no_open:
762 	return finish_no_open(file, res);
763 }
764 
765 /*
766  * Code shared between mknod, mkdir, symlink and link
767  */
768 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args,
769 			    struct inode *dir, struct dentry *entry,
770 			    umode_t mode)
771 {
772 	struct fuse_entry_out outarg;
773 	struct inode *inode;
774 	struct dentry *d;
775 	int err;
776 	struct fuse_forget_link *forget;
777 
778 	if (fuse_is_bad(dir))
779 		return -EIO;
780 
781 	forget = fuse_alloc_forget();
782 	if (!forget)
783 		return -ENOMEM;
784 
785 	memset(&outarg, 0, sizeof(outarg));
786 	args->nodeid = get_node_id(dir);
787 	args->out_numargs = 1;
788 	args->out_args[0].size = sizeof(outarg);
789 	args->out_args[0].value = &outarg;
790 
791 	if (args->opcode != FUSE_LINK) {
792 		err = get_create_ext(args, dir, entry, mode);
793 		if (err)
794 			goto out_put_forget_req;
795 	}
796 
797 	err = fuse_simple_request(fm, args);
798 	free_ext_value(args);
799 	if (err)
800 		goto out_put_forget_req;
801 
802 	err = -EIO;
803 	if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
804 		goto out_put_forget_req;
805 
806 	if ((outarg.attr.mode ^ mode) & S_IFMT)
807 		goto out_put_forget_req;
808 
809 	inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
810 			  &outarg.attr, ATTR_TIMEOUT(&outarg), 0);
811 	if (!inode) {
812 		fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
813 		return -ENOMEM;
814 	}
815 	kfree(forget);
816 
817 	d_drop(entry);
818 	d = d_splice_alias(inode, entry);
819 	if (IS_ERR(d))
820 		return PTR_ERR(d);
821 
822 	if (d) {
823 		fuse_change_entry_timeout(d, &outarg);
824 		dput(d);
825 	} else {
826 		fuse_change_entry_timeout(entry, &outarg);
827 	}
828 	fuse_dir_changed(dir);
829 	return 0;
830 
831  out_put_forget_req:
832 	kfree(forget);
833 	return err;
834 }
835 
836 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir,
837 		      struct dentry *entry, umode_t mode, dev_t rdev)
838 {
839 	struct fuse_mknod_in inarg;
840 	struct fuse_mount *fm = get_fuse_mount(dir);
841 	FUSE_ARGS(args);
842 
843 	if (!fm->fc->dont_mask)
844 		mode &= ~current_umask();
845 
846 	memset(&inarg, 0, sizeof(inarg));
847 	inarg.mode = mode;
848 	inarg.rdev = new_encode_dev(rdev);
849 	inarg.umask = current_umask();
850 	args.opcode = FUSE_MKNOD;
851 	args.in_numargs = 2;
852 	args.in_args[0].size = sizeof(inarg);
853 	args.in_args[0].value = &inarg;
854 	args.in_args[1].size = entry->d_name.len + 1;
855 	args.in_args[1].value = entry->d_name.name;
856 	return create_new_entry(fm, &args, dir, entry, mode);
857 }
858 
859 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir,
860 		       struct dentry *entry, umode_t mode, bool excl)
861 {
862 	return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
863 }
864 
865 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir,
866 			struct file *file, umode_t mode)
867 {
868 	struct fuse_conn *fc = get_fuse_conn(dir);
869 	int err;
870 
871 	if (fc->no_tmpfile)
872 		return -EOPNOTSUPP;
873 
874 	err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE);
875 	if (err == -ENOSYS) {
876 		fc->no_tmpfile = 1;
877 		err = -EOPNOTSUPP;
878 	}
879 	return err;
880 }
881 
882 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir,
883 		      struct dentry *entry, umode_t mode)
884 {
885 	struct fuse_mkdir_in inarg;
886 	struct fuse_mount *fm = get_fuse_mount(dir);
887 	FUSE_ARGS(args);
888 
889 	if (!fm->fc->dont_mask)
890 		mode &= ~current_umask();
891 
892 	memset(&inarg, 0, sizeof(inarg));
893 	inarg.mode = mode;
894 	inarg.umask = current_umask();
895 	args.opcode = FUSE_MKDIR;
896 	args.in_numargs = 2;
897 	args.in_args[0].size = sizeof(inarg);
898 	args.in_args[0].value = &inarg;
899 	args.in_args[1].size = entry->d_name.len + 1;
900 	args.in_args[1].value = entry->d_name.name;
901 	return create_new_entry(fm, &args, dir, entry, S_IFDIR);
902 }
903 
904 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir,
905 			struct dentry *entry, const char *link)
906 {
907 	struct fuse_mount *fm = get_fuse_mount(dir);
908 	unsigned len = strlen(link) + 1;
909 	FUSE_ARGS(args);
910 
911 	args.opcode = FUSE_SYMLINK;
912 	args.in_numargs = 2;
913 	args.in_args[0].size = entry->d_name.len + 1;
914 	args.in_args[0].value = entry->d_name.name;
915 	args.in_args[1].size = len;
916 	args.in_args[1].value = link;
917 	return create_new_entry(fm, &args, dir, entry, S_IFLNK);
918 }
919 
920 void fuse_flush_time_update(struct inode *inode)
921 {
922 	int err = sync_inode_metadata(inode, 1);
923 
924 	mapping_set_error(inode->i_mapping, err);
925 }
926 
927 static void fuse_update_ctime_in_cache(struct inode *inode)
928 {
929 	if (!IS_NOCMTIME(inode)) {
930 		inode->i_ctime = current_time(inode);
931 		mark_inode_dirty_sync(inode);
932 		fuse_flush_time_update(inode);
933 	}
934 }
935 
936 void fuse_update_ctime(struct inode *inode)
937 {
938 	fuse_invalidate_attr_mask(inode, STATX_CTIME);
939 	fuse_update_ctime_in_cache(inode);
940 }
941 
942 static void fuse_entry_unlinked(struct dentry *entry)
943 {
944 	struct inode *inode = d_inode(entry);
945 	struct fuse_conn *fc = get_fuse_conn(inode);
946 	struct fuse_inode *fi = get_fuse_inode(inode);
947 
948 	spin_lock(&fi->lock);
949 	fi->attr_version = atomic64_inc_return(&fc->attr_version);
950 	/*
951 	 * If i_nlink == 0 then unlink doesn't make sense, yet this can
952 	 * happen if userspace filesystem is careless.  It would be
953 	 * difficult to enforce correct nlink usage so just ignore this
954 	 * condition here
955 	 */
956 	if (S_ISDIR(inode->i_mode))
957 		clear_nlink(inode);
958 	else if (inode->i_nlink > 0)
959 		drop_nlink(inode);
960 	spin_unlock(&fi->lock);
961 	fuse_invalidate_entry_cache(entry);
962 	fuse_update_ctime(inode);
963 }
964 
965 static int fuse_unlink(struct inode *dir, struct dentry *entry)
966 {
967 	int err;
968 	struct fuse_mount *fm = get_fuse_mount(dir);
969 	FUSE_ARGS(args);
970 
971 	if (fuse_is_bad(dir))
972 		return -EIO;
973 
974 	args.opcode = FUSE_UNLINK;
975 	args.nodeid = get_node_id(dir);
976 	args.in_numargs = 1;
977 	args.in_args[0].size = entry->d_name.len + 1;
978 	args.in_args[0].value = entry->d_name.name;
979 	err = fuse_simple_request(fm, &args);
980 	if (!err) {
981 		fuse_dir_changed(dir);
982 		fuse_entry_unlinked(entry);
983 	} else if (err == -EINTR)
984 		fuse_invalidate_entry(entry);
985 	return err;
986 }
987 
988 static int fuse_rmdir(struct inode *dir, struct dentry *entry)
989 {
990 	int err;
991 	struct fuse_mount *fm = get_fuse_mount(dir);
992 	FUSE_ARGS(args);
993 
994 	if (fuse_is_bad(dir))
995 		return -EIO;
996 
997 	args.opcode = FUSE_RMDIR;
998 	args.nodeid = get_node_id(dir);
999 	args.in_numargs = 1;
1000 	args.in_args[0].size = entry->d_name.len + 1;
1001 	args.in_args[0].value = entry->d_name.name;
1002 	err = fuse_simple_request(fm, &args);
1003 	if (!err) {
1004 		fuse_dir_changed(dir);
1005 		fuse_entry_unlinked(entry);
1006 	} else if (err == -EINTR)
1007 		fuse_invalidate_entry(entry);
1008 	return err;
1009 }
1010 
1011 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
1012 			      struct inode *newdir, struct dentry *newent,
1013 			      unsigned int flags, int opcode, size_t argsize)
1014 {
1015 	int err;
1016 	struct fuse_rename2_in inarg;
1017 	struct fuse_mount *fm = get_fuse_mount(olddir);
1018 	FUSE_ARGS(args);
1019 
1020 	memset(&inarg, 0, argsize);
1021 	inarg.newdir = get_node_id(newdir);
1022 	inarg.flags = flags;
1023 	args.opcode = opcode;
1024 	args.nodeid = get_node_id(olddir);
1025 	args.in_numargs = 3;
1026 	args.in_args[0].size = argsize;
1027 	args.in_args[0].value = &inarg;
1028 	args.in_args[1].size = oldent->d_name.len + 1;
1029 	args.in_args[1].value = oldent->d_name.name;
1030 	args.in_args[2].size = newent->d_name.len + 1;
1031 	args.in_args[2].value = newent->d_name.name;
1032 	err = fuse_simple_request(fm, &args);
1033 	if (!err) {
1034 		/* ctime changes */
1035 		fuse_update_ctime(d_inode(oldent));
1036 
1037 		if (flags & RENAME_EXCHANGE)
1038 			fuse_update_ctime(d_inode(newent));
1039 
1040 		fuse_dir_changed(olddir);
1041 		if (olddir != newdir)
1042 			fuse_dir_changed(newdir);
1043 
1044 		/* newent will end up negative */
1045 		if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent))
1046 			fuse_entry_unlinked(newent);
1047 	} else if (err == -EINTR) {
1048 		/* If request was interrupted, DEITY only knows if the
1049 		   rename actually took place.  If the invalidation
1050 		   fails (e.g. some process has CWD under the renamed
1051 		   directory), then there can be inconsistency between
1052 		   the dcache and the real filesystem.  Tough luck. */
1053 		fuse_invalidate_entry(oldent);
1054 		if (d_really_is_positive(newent))
1055 			fuse_invalidate_entry(newent);
1056 	}
1057 
1058 	return err;
1059 }
1060 
1061 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir,
1062 			struct dentry *oldent, struct inode *newdir,
1063 			struct dentry *newent, unsigned int flags)
1064 {
1065 	struct fuse_conn *fc = get_fuse_conn(olddir);
1066 	int err;
1067 
1068 	if (fuse_is_bad(olddir))
1069 		return -EIO;
1070 
1071 	if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
1072 		return -EINVAL;
1073 
1074 	if (flags) {
1075 		if (fc->no_rename2 || fc->minor < 23)
1076 			return -EINVAL;
1077 
1078 		err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
1079 					 FUSE_RENAME2,
1080 					 sizeof(struct fuse_rename2_in));
1081 		if (err == -ENOSYS) {
1082 			fc->no_rename2 = 1;
1083 			err = -EINVAL;
1084 		}
1085 	} else {
1086 		err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
1087 					 FUSE_RENAME,
1088 					 sizeof(struct fuse_rename_in));
1089 	}
1090 
1091 	return err;
1092 }
1093 
1094 static int fuse_link(struct dentry *entry, struct inode *newdir,
1095 		     struct dentry *newent)
1096 {
1097 	int err;
1098 	struct fuse_link_in inarg;
1099 	struct inode *inode = d_inode(entry);
1100 	struct fuse_mount *fm = get_fuse_mount(inode);
1101 	FUSE_ARGS(args);
1102 
1103 	memset(&inarg, 0, sizeof(inarg));
1104 	inarg.oldnodeid = get_node_id(inode);
1105 	args.opcode = FUSE_LINK;
1106 	args.in_numargs = 2;
1107 	args.in_args[0].size = sizeof(inarg);
1108 	args.in_args[0].value = &inarg;
1109 	args.in_args[1].size = newent->d_name.len + 1;
1110 	args.in_args[1].value = newent->d_name.name;
1111 	err = create_new_entry(fm, &args, newdir, newent, inode->i_mode);
1112 	if (!err)
1113 		fuse_update_ctime_in_cache(inode);
1114 	else if (err == -EINTR)
1115 		fuse_invalidate_attr(inode);
1116 
1117 	return err;
1118 }
1119 
1120 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
1121 			  struct kstat *stat)
1122 {
1123 	unsigned int blkbits;
1124 	struct fuse_conn *fc = get_fuse_conn(inode);
1125 
1126 	stat->dev = inode->i_sb->s_dev;
1127 	stat->ino = attr->ino;
1128 	stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
1129 	stat->nlink = attr->nlink;
1130 	stat->uid = make_kuid(fc->user_ns, attr->uid);
1131 	stat->gid = make_kgid(fc->user_ns, attr->gid);
1132 	stat->rdev = inode->i_rdev;
1133 	stat->atime.tv_sec = attr->atime;
1134 	stat->atime.tv_nsec = attr->atimensec;
1135 	stat->mtime.tv_sec = attr->mtime;
1136 	stat->mtime.tv_nsec = attr->mtimensec;
1137 	stat->ctime.tv_sec = attr->ctime;
1138 	stat->ctime.tv_nsec = attr->ctimensec;
1139 	stat->size = attr->size;
1140 	stat->blocks = attr->blocks;
1141 
1142 	if (attr->blksize != 0)
1143 		blkbits = ilog2(attr->blksize);
1144 	else
1145 		blkbits = inode->i_sb->s_blocksize_bits;
1146 
1147 	stat->blksize = 1 << blkbits;
1148 }
1149 
1150 static void fuse_statx_to_attr(struct fuse_statx *sx, struct fuse_attr *attr)
1151 {
1152 	memset(attr, 0, sizeof(*attr));
1153 	attr->ino = sx->ino;
1154 	attr->size = sx->size;
1155 	attr->blocks = sx->blocks;
1156 	attr->atime = sx->atime.tv_sec;
1157 	attr->mtime = sx->mtime.tv_sec;
1158 	attr->ctime = sx->ctime.tv_sec;
1159 	attr->atimensec = sx->atime.tv_nsec;
1160 	attr->mtimensec = sx->mtime.tv_nsec;
1161 	attr->ctimensec = sx->ctime.tv_nsec;
1162 	attr->mode = sx->mode;
1163 	attr->nlink = sx->nlink;
1164 	attr->uid = sx->uid;
1165 	attr->gid = sx->gid;
1166 	attr->rdev = new_encode_dev(MKDEV(sx->rdev_major, sx->rdev_minor));
1167 	attr->blksize = sx->blksize;
1168 }
1169 
1170 static int fuse_do_statx(struct inode *inode, struct file *file,
1171 			 struct kstat *stat)
1172 {
1173 	int err;
1174 	struct fuse_attr attr;
1175 	struct fuse_statx *sx;
1176 	struct fuse_statx_in inarg;
1177 	struct fuse_statx_out outarg;
1178 	struct fuse_mount *fm = get_fuse_mount(inode);
1179 	u64 attr_version = fuse_get_attr_version(fm->fc);
1180 	FUSE_ARGS(args);
1181 
1182 	memset(&inarg, 0, sizeof(inarg));
1183 	memset(&outarg, 0, sizeof(outarg));
1184 	/* Directories have separate file-handle space */
1185 	if (file && S_ISREG(inode->i_mode)) {
1186 		struct fuse_file *ff = file->private_data;
1187 
1188 		inarg.getattr_flags |= FUSE_GETATTR_FH;
1189 		inarg.fh = ff->fh;
1190 	}
1191 	/* For now leave sync hints as the default, request all stats. */
1192 	inarg.sx_flags = 0;
1193 	inarg.sx_mask = STATX_BASIC_STATS | STATX_BTIME;
1194 	args.opcode = FUSE_STATX;
1195 	args.nodeid = get_node_id(inode);
1196 	args.in_numargs = 1;
1197 	args.in_args[0].size = sizeof(inarg);
1198 	args.in_args[0].value = &inarg;
1199 	args.out_numargs = 1;
1200 	args.out_args[0].size = sizeof(outarg);
1201 	args.out_args[0].value = &outarg;
1202 	err = fuse_simple_request(fm, &args);
1203 	if (err)
1204 		return err;
1205 
1206 	sx = &outarg.stat;
1207 	if (((sx->mask & STATX_SIZE) && !fuse_valid_size(sx->size)) ||
1208 	    ((sx->mask & STATX_TYPE) && (!fuse_valid_type(sx->mode) ||
1209 					 inode_wrong_type(inode, sx->mode)))) {
1210 		make_bad_inode(inode);
1211 		return -EIO;
1212 	}
1213 
1214 	fuse_statx_to_attr(&outarg.stat, &attr);
1215 	if ((sx->mask & STATX_BASIC_STATS) == STATX_BASIC_STATS) {
1216 		fuse_change_attributes(inode, &attr, &outarg.stat,
1217 				       ATTR_TIMEOUT(&outarg), attr_version);
1218 	}
1219 	stat->result_mask = sx->mask & (STATX_BASIC_STATS | STATX_BTIME);
1220 	stat->btime.tv_sec = sx->btime.tv_sec;
1221 	stat->btime.tv_nsec = min_t(u32, sx->btime.tv_nsec, NSEC_PER_SEC - 1);
1222 	fuse_fillattr(inode, &attr, stat);
1223 	stat->result_mask |= STATX_TYPE;
1224 
1225 	return 0;
1226 }
1227 
1228 static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
1229 			   struct file *file)
1230 {
1231 	int err;
1232 	struct fuse_getattr_in inarg;
1233 	struct fuse_attr_out outarg;
1234 	struct fuse_mount *fm = get_fuse_mount(inode);
1235 	FUSE_ARGS(args);
1236 	u64 attr_version;
1237 
1238 	attr_version = fuse_get_attr_version(fm->fc);
1239 
1240 	memset(&inarg, 0, sizeof(inarg));
1241 	memset(&outarg, 0, sizeof(outarg));
1242 	/* Directories have separate file-handle space */
1243 	if (file && S_ISREG(inode->i_mode)) {
1244 		struct fuse_file *ff = file->private_data;
1245 
1246 		inarg.getattr_flags |= FUSE_GETATTR_FH;
1247 		inarg.fh = ff->fh;
1248 	}
1249 	args.opcode = FUSE_GETATTR;
1250 	args.nodeid = get_node_id(inode);
1251 	args.in_numargs = 1;
1252 	args.in_args[0].size = sizeof(inarg);
1253 	args.in_args[0].value = &inarg;
1254 	args.out_numargs = 1;
1255 	args.out_args[0].size = sizeof(outarg);
1256 	args.out_args[0].value = &outarg;
1257 	err = fuse_simple_request(fm, &args);
1258 	if (!err) {
1259 		if (fuse_invalid_attr(&outarg.attr) ||
1260 		    inode_wrong_type(inode, outarg.attr.mode)) {
1261 			fuse_make_bad(inode);
1262 			err = -EIO;
1263 		} else {
1264 			fuse_change_attributes(inode, &outarg.attr, NULL,
1265 					       ATTR_TIMEOUT(&outarg),
1266 					       attr_version);
1267 			if (stat)
1268 				fuse_fillattr(inode, &outarg.attr, stat);
1269 		}
1270 	}
1271 	return err;
1272 }
1273 
1274 static int fuse_update_get_attr(struct inode *inode, struct file *file,
1275 				struct kstat *stat, u32 request_mask,
1276 				unsigned int flags)
1277 {
1278 	struct fuse_inode *fi = get_fuse_inode(inode);
1279 	struct fuse_conn *fc = get_fuse_conn(inode);
1280 	int err = 0;
1281 	bool sync;
1282 	u32 inval_mask = READ_ONCE(fi->inval_mask);
1283 	u32 cache_mask = fuse_get_cache_mask(inode);
1284 
1285 
1286 	/* FUSE only supports basic stats and possibly btime */
1287 	request_mask &= STATX_BASIC_STATS | STATX_BTIME;
1288 retry:
1289 	if (fc->no_statx)
1290 		request_mask &= STATX_BASIC_STATS;
1291 
1292 	if (!request_mask)
1293 		sync = false;
1294 	else if (flags & AT_STATX_FORCE_SYNC)
1295 		sync = true;
1296 	else if (flags & AT_STATX_DONT_SYNC)
1297 		sync = false;
1298 	else if (request_mask & inval_mask & ~cache_mask)
1299 		sync = true;
1300 	else
1301 		sync = time_before64(fi->i_time, get_jiffies_64());
1302 
1303 	if (sync) {
1304 		forget_all_cached_acls(inode);
1305 		/* Try statx if BTIME is requested */
1306 		if (!fc->no_statx && (request_mask & ~STATX_BASIC_STATS)) {
1307 			err = fuse_do_statx(inode, file, stat);
1308 			if (err == -ENOSYS) {
1309 				fc->no_statx = 1;
1310 				goto retry;
1311 			}
1312 		} else {
1313 			err = fuse_do_getattr(inode, stat, file);
1314 		}
1315 	} else if (stat) {
1316 		generic_fillattr(&nop_mnt_idmap, inode, stat);
1317 		stat->mode = fi->orig_i_mode;
1318 		stat->ino = fi->orig_ino;
1319 		if (test_bit(FUSE_I_BTIME, &fi->state)) {
1320 			stat->btime = fi->i_btime;
1321 			stat->result_mask |= STATX_BTIME;
1322 		}
1323 	}
1324 
1325 	return err;
1326 }
1327 
1328 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask)
1329 {
1330 	return fuse_update_get_attr(inode, file, NULL, mask, 0);
1331 }
1332 
1333 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
1334 			     u64 child_nodeid, struct qstr *name, u32 flags)
1335 {
1336 	int err = -ENOTDIR;
1337 	struct inode *parent;
1338 	struct dentry *dir;
1339 	struct dentry *entry;
1340 
1341 	parent = fuse_ilookup(fc, parent_nodeid, NULL);
1342 	if (!parent)
1343 		return -ENOENT;
1344 
1345 	inode_lock_nested(parent, I_MUTEX_PARENT);
1346 	if (!S_ISDIR(parent->i_mode))
1347 		goto unlock;
1348 
1349 	err = -ENOENT;
1350 	dir = d_find_alias(parent);
1351 	if (!dir)
1352 		goto unlock;
1353 
1354 	name->hash = full_name_hash(dir, name->name, name->len);
1355 	entry = d_lookup(dir, name);
1356 	dput(dir);
1357 	if (!entry)
1358 		goto unlock;
1359 
1360 	fuse_dir_changed(parent);
1361 	if (!(flags & FUSE_EXPIRE_ONLY))
1362 		d_invalidate(entry);
1363 	fuse_invalidate_entry_cache(entry);
1364 
1365 	if (child_nodeid != 0 && d_really_is_positive(entry)) {
1366 		inode_lock(d_inode(entry));
1367 		if (get_node_id(d_inode(entry)) != child_nodeid) {
1368 			err = -ENOENT;
1369 			goto badentry;
1370 		}
1371 		if (d_mountpoint(entry)) {
1372 			err = -EBUSY;
1373 			goto badentry;
1374 		}
1375 		if (d_is_dir(entry)) {
1376 			shrink_dcache_parent(entry);
1377 			if (!simple_empty(entry)) {
1378 				err = -ENOTEMPTY;
1379 				goto badentry;
1380 			}
1381 			d_inode(entry)->i_flags |= S_DEAD;
1382 		}
1383 		dont_mount(entry);
1384 		clear_nlink(d_inode(entry));
1385 		err = 0;
1386  badentry:
1387 		inode_unlock(d_inode(entry));
1388 		if (!err)
1389 			d_delete(entry);
1390 	} else {
1391 		err = 0;
1392 	}
1393 	dput(entry);
1394 
1395  unlock:
1396 	inode_unlock(parent);
1397 	iput(parent);
1398 	return err;
1399 }
1400 
1401 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc)
1402 {
1403 	const struct cred *cred = current_cred();
1404 
1405 	return (uid_eq(cred->euid, fc->user_id) &&
1406 		uid_eq(cred->suid, fc->user_id) &&
1407 		uid_eq(cred->uid,  fc->user_id) &&
1408 		gid_eq(cred->egid, fc->group_id) &&
1409 		gid_eq(cred->sgid, fc->group_id) &&
1410 		gid_eq(cred->gid,  fc->group_id));
1411 }
1412 
1413 /*
1414  * Calling into a user-controlled filesystem gives the filesystem
1415  * daemon ptrace-like capabilities over the current process.  This
1416  * means, that the filesystem daemon is able to record the exact
1417  * filesystem operations performed, and can also control the behavior
1418  * of the requester process in otherwise impossible ways.  For example
1419  * it can delay the operation for arbitrary length of time allowing
1420  * DoS against the requester.
1421  *
1422  * For this reason only those processes can call into the filesystem,
1423  * for which the owner of the mount has ptrace privilege.  This
1424  * excludes processes started by other users, suid or sgid processes.
1425  */
1426 bool fuse_allow_current_process(struct fuse_conn *fc)
1427 {
1428 	bool allow;
1429 
1430 	if (fc->allow_other)
1431 		allow = current_in_userns(fc->user_ns);
1432 	else
1433 		allow = fuse_permissible_uidgid(fc);
1434 
1435 	if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN))
1436 		allow = true;
1437 
1438 	return allow;
1439 }
1440 
1441 static int fuse_access(struct inode *inode, int mask)
1442 {
1443 	struct fuse_mount *fm = get_fuse_mount(inode);
1444 	FUSE_ARGS(args);
1445 	struct fuse_access_in inarg;
1446 	int err;
1447 
1448 	BUG_ON(mask & MAY_NOT_BLOCK);
1449 
1450 	if (fm->fc->no_access)
1451 		return 0;
1452 
1453 	memset(&inarg, 0, sizeof(inarg));
1454 	inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
1455 	args.opcode = FUSE_ACCESS;
1456 	args.nodeid = get_node_id(inode);
1457 	args.in_numargs = 1;
1458 	args.in_args[0].size = sizeof(inarg);
1459 	args.in_args[0].value = &inarg;
1460 	err = fuse_simple_request(fm, &args);
1461 	if (err == -ENOSYS) {
1462 		fm->fc->no_access = 1;
1463 		err = 0;
1464 	}
1465 	return err;
1466 }
1467 
1468 static int fuse_perm_getattr(struct inode *inode, int mask)
1469 {
1470 	if (mask & MAY_NOT_BLOCK)
1471 		return -ECHILD;
1472 
1473 	forget_all_cached_acls(inode);
1474 	return fuse_do_getattr(inode, NULL, NULL);
1475 }
1476 
1477 /*
1478  * Check permission.  The two basic access models of FUSE are:
1479  *
1480  * 1) Local access checking ('default_permissions' mount option) based
1481  * on file mode.  This is the plain old disk filesystem permission
1482  * modell.
1483  *
1484  * 2) "Remote" access checking, where server is responsible for
1485  * checking permission in each inode operation.  An exception to this
1486  * is if ->permission() was invoked from sys_access() in which case an
1487  * access request is sent.  Execute permission is still checked
1488  * locally based on file mode.
1489  */
1490 static int fuse_permission(struct mnt_idmap *idmap,
1491 			   struct inode *inode, int mask)
1492 {
1493 	struct fuse_conn *fc = get_fuse_conn(inode);
1494 	bool refreshed = false;
1495 	int err = 0;
1496 
1497 	if (fuse_is_bad(inode))
1498 		return -EIO;
1499 
1500 	if (!fuse_allow_current_process(fc))
1501 		return -EACCES;
1502 
1503 	/*
1504 	 * If attributes are needed, refresh them before proceeding
1505 	 */
1506 	if (fc->default_permissions ||
1507 	    ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
1508 		struct fuse_inode *fi = get_fuse_inode(inode);
1509 		u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
1510 
1511 		if (perm_mask & READ_ONCE(fi->inval_mask) ||
1512 		    time_before64(fi->i_time, get_jiffies_64())) {
1513 			refreshed = true;
1514 
1515 			err = fuse_perm_getattr(inode, mask);
1516 			if (err)
1517 				return err;
1518 		}
1519 	}
1520 
1521 	if (fc->default_permissions) {
1522 		err = generic_permission(&nop_mnt_idmap, inode, mask);
1523 
1524 		/* If permission is denied, try to refresh file
1525 		   attributes.  This is also needed, because the root
1526 		   node will at first have no permissions */
1527 		if (err == -EACCES && !refreshed) {
1528 			err = fuse_perm_getattr(inode, mask);
1529 			if (!err)
1530 				err = generic_permission(&nop_mnt_idmap,
1531 							 inode, mask);
1532 		}
1533 
1534 		/* Note: the opposite of the above test does not
1535 		   exist.  So if permissions are revoked this won't be
1536 		   noticed immediately, only after the attribute
1537 		   timeout has expired */
1538 	} else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
1539 		err = fuse_access(inode, mask);
1540 	} else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1541 		if (!(inode->i_mode & S_IXUGO)) {
1542 			if (refreshed)
1543 				return -EACCES;
1544 
1545 			err = fuse_perm_getattr(inode, mask);
1546 			if (!err && !(inode->i_mode & S_IXUGO))
1547 				return -EACCES;
1548 		}
1549 	}
1550 	return err;
1551 }
1552 
1553 static int fuse_readlink_page(struct inode *inode, struct page *page)
1554 {
1555 	struct fuse_mount *fm = get_fuse_mount(inode);
1556 	struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1557 	struct fuse_args_pages ap = {
1558 		.num_pages = 1,
1559 		.pages = &page,
1560 		.descs = &desc,
1561 	};
1562 	char *link;
1563 	ssize_t res;
1564 
1565 	ap.args.opcode = FUSE_READLINK;
1566 	ap.args.nodeid = get_node_id(inode);
1567 	ap.args.out_pages = true;
1568 	ap.args.out_argvar = true;
1569 	ap.args.page_zeroing = true;
1570 	ap.args.out_numargs = 1;
1571 	ap.args.out_args[0].size = desc.length;
1572 	res = fuse_simple_request(fm, &ap.args);
1573 
1574 	fuse_invalidate_atime(inode);
1575 
1576 	if (res < 0)
1577 		return res;
1578 
1579 	if (WARN_ON(res >= PAGE_SIZE))
1580 		return -EIO;
1581 
1582 	link = page_address(page);
1583 	link[res] = '\0';
1584 
1585 	return 0;
1586 }
1587 
1588 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1589 				 struct delayed_call *callback)
1590 {
1591 	struct fuse_conn *fc = get_fuse_conn(inode);
1592 	struct page *page;
1593 	int err;
1594 
1595 	err = -EIO;
1596 	if (fuse_is_bad(inode))
1597 		goto out_err;
1598 
1599 	if (fc->cache_symlinks)
1600 		return page_get_link(dentry, inode, callback);
1601 
1602 	err = -ECHILD;
1603 	if (!dentry)
1604 		goto out_err;
1605 
1606 	page = alloc_page(GFP_KERNEL);
1607 	err = -ENOMEM;
1608 	if (!page)
1609 		goto out_err;
1610 
1611 	err = fuse_readlink_page(inode, page);
1612 	if (err) {
1613 		__free_page(page);
1614 		goto out_err;
1615 	}
1616 
1617 	set_delayed_call(callback, page_put_link, page);
1618 
1619 	return page_address(page);
1620 
1621 out_err:
1622 	return ERR_PTR(err);
1623 }
1624 
1625 static int fuse_dir_open(struct inode *inode, struct file *file)
1626 {
1627 	return fuse_open_common(inode, file, true);
1628 }
1629 
1630 static int fuse_dir_release(struct inode *inode, struct file *file)
1631 {
1632 	fuse_release_common(file, true);
1633 
1634 	return 0;
1635 }
1636 
1637 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1638 			  int datasync)
1639 {
1640 	struct inode *inode = file->f_mapping->host;
1641 	struct fuse_conn *fc = get_fuse_conn(inode);
1642 	int err;
1643 
1644 	if (fuse_is_bad(inode))
1645 		return -EIO;
1646 
1647 	if (fc->no_fsyncdir)
1648 		return 0;
1649 
1650 	inode_lock(inode);
1651 	err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1652 	if (err == -ENOSYS) {
1653 		fc->no_fsyncdir = 1;
1654 		err = 0;
1655 	}
1656 	inode_unlock(inode);
1657 
1658 	return err;
1659 }
1660 
1661 static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1662 			    unsigned long arg)
1663 {
1664 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1665 
1666 	/* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1667 	if (fc->minor < 18)
1668 		return -ENOTTY;
1669 
1670 	return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1671 }
1672 
1673 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1674 				   unsigned long arg)
1675 {
1676 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1677 
1678 	if (fc->minor < 18)
1679 		return -ENOTTY;
1680 
1681 	return fuse_ioctl_common(file, cmd, arg,
1682 				 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1683 }
1684 
1685 static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
1686 {
1687 	/* Always update if mtime is explicitly set  */
1688 	if (ivalid & ATTR_MTIME_SET)
1689 		return true;
1690 
1691 	/* Or if kernel i_mtime is the official one */
1692 	if (trust_local_mtime)
1693 		return true;
1694 
1695 	/* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1696 	if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1697 		return false;
1698 
1699 	/* In all other cases update */
1700 	return true;
1701 }
1702 
1703 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1704 			   struct fuse_setattr_in *arg, bool trust_local_cmtime)
1705 {
1706 	unsigned ivalid = iattr->ia_valid;
1707 
1708 	if (ivalid & ATTR_MODE)
1709 		arg->valid |= FATTR_MODE,   arg->mode = iattr->ia_mode;
1710 	if (ivalid & ATTR_UID)
1711 		arg->valid |= FATTR_UID,    arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
1712 	if (ivalid & ATTR_GID)
1713 		arg->valid |= FATTR_GID,    arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
1714 	if (ivalid & ATTR_SIZE)
1715 		arg->valid |= FATTR_SIZE,   arg->size = iattr->ia_size;
1716 	if (ivalid & ATTR_ATIME) {
1717 		arg->valid |= FATTR_ATIME;
1718 		arg->atime = iattr->ia_atime.tv_sec;
1719 		arg->atimensec = iattr->ia_atime.tv_nsec;
1720 		if (!(ivalid & ATTR_ATIME_SET))
1721 			arg->valid |= FATTR_ATIME_NOW;
1722 	}
1723 	if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
1724 		arg->valid |= FATTR_MTIME;
1725 		arg->mtime = iattr->ia_mtime.tv_sec;
1726 		arg->mtimensec = iattr->ia_mtime.tv_nsec;
1727 		if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
1728 			arg->valid |= FATTR_MTIME_NOW;
1729 	}
1730 	if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1731 		arg->valid |= FATTR_CTIME;
1732 		arg->ctime = iattr->ia_ctime.tv_sec;
1733 		arg->ctimensec = iattr->ia_ctime.tv_nsec;
1734 	}
1735 }
1736 
1737 /*
1738  * Prevent concurrent writepages on inode
1739  *
1740  * This is done by adding a negative bias to the inode write counter
1741  * and waiting for all pending writes to finish.
1742  */
1743 void fuse_set_nowrite(struct inode *inode)
1744 {
1745 	struct fuse_inode *fi = get_fuse_inode(inode);
1746 
1747 	BUG_ON(!inode_is_locked(inode));
1748 
1749 	spin_lock(&fi->lock);
1750 	BUG_ON(fi->writectr < 0);
1751 	fi->writectr += FUSE_NOWRITE;
1752 	spin_unlock(&fi->lock);
1753 	wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1754 }
1755 
1756 /*
1757  * Allow writepages on inode
1758  *
1759  * Remove the bias from the writecounter and send any queued
1760  * writepages.
1761  */
1762 static void __fuse_release_nowrite(struct inode *inode)
1763 {
1764 	struct fuse_inode *fi = get_fuse_inode(inode);
1765 
1766 	BUG_ON(fi->writectr != FUSE_NOWRITE);
1767 	fi->writectr = 0;
1768 	fuse_flush_writepages(inode);
1769 }
1770 
1771 void fuse_release_nowrite(struct inode *inode)
1772 {
1773 	struct fuse_inode *fi = get_fuse_inode(inode);
1774 
1775 	spin_lock(&fi->lock);
1776 	__fuse_release_nowrite(inode);
1777 	spin_unlock(&fi->lock);
1778 }
1779 
1780 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
1781 			      struct inode *inode,
1782 			      struct fuse_setattr_in *inarg_p,
1783 			      struct fuse_attr_out *outarg_p)
1784 {
1785 	args->opcode = FUSE_SETATTR;
1786 	args->nodeid = get_node_id(inode);
1787 	args->in_numargs = 1;
1788 	args->in_args[0].size = sizeof(*inarg_p);
1789 	args->in_args[0].value = inarg_p;
1790 	args->out_numargs = 1;
1791 	args->out_args[0].size = sizeof(*outarg_p);
1792 	args->out_args[0].value = outarg_p;
1793 }
1794 
1795 /*
1796  * Flush inode->i_mtime to the server
1797  */
1798 int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
1799 {
1800 	struct fuse_mount *fm = get_fuse_mount(inode);
1801 	FUSE_ARGS(args);
1802 	struct fuse_setattr_in inarg;
1803 	struct fuse_attr_out outarg;
1804 
1805 	memset(&inarg, 0, sizeof(inarg));
1806 	memset(&outarg, 0, sizeof(outarg));
1807 
1808 	inarg.valid = FATTR_MTIME;
1809 	inarg.mtime = inode->i_mtime.tv_sec;
1810 	inarg.mtimensec = inode->i_mtime.tv_nsec;
1811 	if (fm->fc->minor >= 23) {
1812 		inarg.valid |= FATTR_CTIME;
1813 		inarg.ctime = inode->i_ctime.tv_sec;
1814 		inarg.ctimensec = inode->i_ctime.tv_nsec;
1815 	}
1816 	if (ff) {
1817 		inarg.valid |= FATTR_FH;
1818 		inarg.fh = ff->fh;
1819 	}
1820 	fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
1821 
1822 	return fuse_simple_request(fm, &args);
1823 }
1824 
1825 /*
1826  * Set attributes, and at the same time refresh them.
1827  *
1828  * Truncation is slightly complicated, because the 'truncate' request
1829  * may fail, in which case we don't want to touch the mapping.
1830  * vmtruncate() doesn't allow for this case, so do the rlimit checking
1831  * and the actual truncation by hand.
1832  */
1833 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
1834 		    struct file *file)
1835 {
1836 	struct inode *inode = d_inode(dentry);
1837 	struct fuse_mount *fm = get_fuse_mount(inode);
1838 	struct fuse_conn *fc = fm->fc;
1839 	struct fuse_inode *fi = get_fuse_inode(inode);
1840 	struct address_space *mapping = inode->i_mapping;
1841 	FUSE_ARGS(args);
1842 	struct fuse_setattr_in inarg;
1843 	struct fuse_attr_out outarg;
1844 	bool is_truncate = false;
1845 	bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode);
1846 	loff_t oldsize;
1847 	int err;
1848 	bool trust_local_cmtime = is_wb;
1849 	bool fault_blocked = false;
1850 
1851 	if (!fc->default_permissions)
1852 		attr->ia_valid |= ATTR_FORCE;
1853 
1854 	err = setattr_prepare(&nop_mnt_idmap, dentry, attr);
1855 	if (err)
1856 		return err;
1857 
1858 	if (attr->ia_valid & ATTR_SIZE) {
1859 		if (WARN_ON(!S_ISREG(inode->i_mode)))
1860 			return -EIO;
1861 		is_truncate = true;
1862 	}
1863 
1864 	if (FUSE_IS_DAX(inode) && is_truncate) {
1865 		filemap_invalidate_lock(mapping);
1866 		fault_blocked = true;
1867 		err = fuse_dax_break_layouts(inode, 0, 0);
1868 		if (err) {
1869 			filemap_invalidate_unlock(mapping);
1870 			return err;
1871 		}
1872 	}
1873 
1874 	if (attr->ia_valid & ATTR_OPEN) {
1875 		/* This is coming from open(..., ... | O_TRUNC); */
1876 		WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1877 		WARN_ON(attr->ia_size != 0);
1878 		if (fc->atomic_o_trunc) {
1879 			/*
1880 			 * No need to send request to userspace, since actual
1881 			 * truncation has already been done by OPEN.  But still
1882 			 * need to truncate page cache.
1883 			 */
1884 			i_size_write(inode, 0);
1885 			truncate_pagecache(inode, 0);
1886 			goto out;
1887 		}
1888 		file = NULL;
1889 	}
1890 
1891 	/* Flush dirty data/metadata before non-truncate SETATTR */
1892 	if (is_wb &&
1893 	    attr->ia_valid &
1894 			(ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1895 			 ATTR_TIMES_SET)) {
1896 		err = write_inode_now(inode, true);
1897 		if (err)
1898 			return err;
1899 
1900 		fuse_set_nowrite(inode);
1901 		fuse_release_nowrite(inode);
1902 	}
1903 
1904 	if (is_truncate) {
1905 		fuse_set_nowrite(inode);
1906 		set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1907 		if (trust_local_cmtime && attr->ia_size != inode->i_size)
1908 			attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
1909 	}
1910 
1911 	memset(&inarg, 0, sizeof(inarg));
1912 	memset(&outarg, 0, sizeof(outarg));
1913 	iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
1914 	if (file) {
1915 		struct fuse_file *ff = file->private_data;
1916 		inarg.valid |= FATTR_FH;
1917 		inarg.fh = ff->fh;
1918 	}
1919 
1920 	/* Kill suid/sgid for non-directory chown unconditionally */
1921 	if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
1922 	    attr->ia_valid & (ATTR_UID | ATTR_GID))
1923 		inarg.valid |= FATTR_KILL_SUIDGID;
1924 
1925 	if (attr->ia_valid & ATTR_SIZE) {
1926 		/* For mandatory locking in truncate */
1927 		inarg.valid |= FATTR_LOCKOWNER;
1928 		inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1929 
1930 		/* Kill suid/sgid for truncate only if no CAP_FSETID */
1931 		if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1932 			inarg.valid |= FATTR_KILL_SUIDGID;
1933 	}
1934 	fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1935 	err = fuse_simple_request(fm, &args);
1936 	if (err) {
1937 		if (err == -EINTR)
1938 			fuse_invalidate_attr(inode);
1939 		goto error;
1940 	}
1941 
1942 	if (fuse_invalid_attr(&outarg.attr) ||
1943 	    inode_wrong_type(inode, outarg.attr.mode)) {
1944 		fuse_make_bad(inode);
1945 		err = -EIO;
1946 		goto error;
1947 	}
1948 
1949 	spin_lock(&fi->lock);
1950 	/* the kernel maintains i_mtime locally */
1951 	if (trust_local_cmtime) {
1952 		if (attr->ia_valid & ATTR_MTIME)
1953 			inode->i_mtime = attr->ia_mtime;
1954 		if (attr->ia_valid & ATTR_CTIME)
1955 			inode->i_ctime = attr->ia_ctime;
1956 		/* FIXME: clear I_DIRTY_SYNC? */
1957 	}
1958 
1959 	fuse_change_attributes_common(inode, &outarg.attr, NULL,
1960 				      ATTR_TIMEOUT(&outarg),
1961 				      fuse_get_cache_mask(inode));
1962 	oldsize = inode->i_size;
1963 	/* see the comment in fuse_change_attributes() */
1964 	if (!is_wb || is_truncate)
1965 		i_size_write(inode, outarg.attr.size);
1966 
1967 	if (is_truncate) {
1968 		/* NOTE: this may release/reacquire fi->lock */
1969 		__fuse_release_nowrite(inode);
1970 	}
1971 	spin_unlock(&fi->lock);
1972 
1973 	/*
1974 	 * Only call invalidate_inode_pages2() after removing
1975 	 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock.
1976 	 */
1977 	if ((is_truncate || !is_wb) &&
1978 	    S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
1979 		truncate_pagecache(inode, outarg.attr.size);
1980 		invalidate_inode_pages2(mapping);
1981 	}
1982 
1983 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1984 out:
1985 	if (fault_blocked)
1986 		filemap_invalidate_unlock(mapping);
1987 
1988 	return 0;
1989 
1990 error:
1991 	if (is_truncate)
1992 		fuse_release_nowrite(inode);
1993 
1994 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1995 
1996 	if (fault_blocked)
1997 		filemap_invalidate_unlock(mapping);
1998 	return err;
1999 }
2000 
2001 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry,
2002 			struct iattr *attr)
2003 {
2004 	struct inode *inode = d_inode(entry);
2005 	struct fuse_conn *fc = get_fuse_conn(inode);
2006 	struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
2007 	int ret;
2008 
2009 	if (fuse_is_bad(inode))
2010 		return -EIO;
2011 
2012 	if (!fuse_allow_current_process(get_fuse_conn(inode)))
2013 		return -EACCES;
2014 
2015 	if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
2016 		attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
2017 				    ATTR_MODE);
2018 
2019 		/*
2020 		 * The only sane way to reliably kill suid/sgid is to do it in
2021 		 * the userspace filesystem
2022 		 *
2023 		 * This should be done on write(), truncate() and chown().
2024 		 */
2025 		if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
2026 			/*
2027 			 * ia_mode calculation may have used stale i_mode.
2028 			 * Refresh and recalculate.
2029 			 */
2030 			ret = fuse_do_getattr(inode, NULL, file);
2031 			if (ret)
2032 				return ret;
2033 
2034 			attr->ia_mode = inode->i_mode;
2035 			if (inode->i_mode & S_ISUID) {
2036 				attr->ia_valid |= ATTR_MODE;
2037 				attr->ia_mode &= ~S_ISUID;
2038 			}
2039 			if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
2040 				attr->ia_valid |= ATTR_MODE;
2041 				attr->ia_mode &= ~S_ISGID;
2042 			}
2043 		}
2044 	}
2045 	if (!attr->ia_valid)
2046 		return 0;
2047 
2048 	ret = fuse_do_setattr(entry, attr, file);
2049 	if (!ret) {
2050 		/*
2051 		 * If filesystem supports acls it may have updated acl xattrs in
2052 		 * the filesystem, so forget cached acls for the inode.
2053 		 */
2054 		if (fc->posix_acl)
2055 			forget_all_cached_acls(inode);
2056 
2057 		/* Directory mode changed, may need to revalidate access */
2058 		if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
2059 			fuse_invalidate_entry_cache(entry);
2060 	}
2061 	return ret;
2062 }
2063 
2064 static int fuse_getattr(struct mnt_idmap *idmap,
2065 			const struct path *path, struct kstat *stat,
2066 			u32 request_mask, unsigned int flags)
2067 {
2068 	struct inode *inode = d_inode(path->dentry);
2069 	struct fuse_conn *fc = get_fuse_conn(inode);
2070 
2071 	if (fuse_is_bad(inode))
2072 		return -EIO;
2073 
2074 	if (!fuse_allow_current_process(fc)) {
2075 		if (!request_mask) {
2076 			/*
2077 			 * If user explicitly requested *nothing* then don't
2078 			 * error out, but return st_dev only.
2079 			 */
2080 			stat->result_mask = 0;
2081 			stat->dev = inode->i_sb->s_dev;
2082 			return 0;
2083 		}
2084 		return -EACCES;
2085 	}
2086 
2087 	return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
2088 }
2089 
2090 static const struct inode_operations fuse_dir_inode_operations = {
2091 	.lookup		= fuse_lookup,
2092 	.mkdir		= fuse_mkdir,
2093 	.symlink	= fuse_symlink,
2094 	.unlink		= fuse_unlink,
2095 	.rmdir		= fuse_rmdir,
2096 	.rename		= fuse_rename2,
2097 	.link		= fuse_link,
2098 	.setattr	= fuse_setattr,
2099 	.create		= fuse_create,
2100 	.atomic_open	= fuse_atomic_open,
2101 	.tmpfile	= fuse_tmpfile,
2102 	.mknod		= fuse_mknod,
2103 	.permission	= fuse_permission,
2104 	.getattr	= fuse_getattr,
2105 	.listxattr	= fuse_listxattr,
2106 	.get_inode_acl	= fuse_get_inode_acl,
2107 	.get_acl	= fuse_get_acl,
2108 	.set_acl	= fuse_set_acl,
2109 	.fileattr_get	= fuse_fileattr_get,
2110 	.fileattr_set	= fuse_fileattr_set,
2111 };
2112 
2113 static const struct file_operations fuse_dir_operations = {
2114 	.llseek		= generic_file_llseek,
2115 	.read		= generic_read_dir,
2116 	.iterate_shared	= fuse_readdir,
2117 	.open		= fuse_dir_open,
2118 	.release	= fuse_dir_release,
2119 	.fsync		= fuse_dir_fsync,
2120 	.unlocked_ioctl	= fuse_dir_ioctl,
2121 	.compat_ioctl	= fuse_dir_compat_ioctl,
2122 };
2123 
2124 static const struct inode_operations fuse_common_inode_operations = {
2125 	.setattr	= fuse_setattr,
2126 	.permission	= fuse_permission,
2127 	.getattr	= fuse_getattr,
2128 	.listxattr	= fuse_listxattr,
2129 	.get_inode_acl	= fuse_get_inode_acl,
2130 	.get_acl	= fuse_get_acl,
2131 	.set_acl	= fuse_set_acl,
2132 	.fileattr_get	= fuse_fileattr_get,
2133 	.fileattr_set	= fuse_fileattr_set,
2134 };
2135 
2136 static const struct inode_operations fuse_symlink_inode_operations = {
2137 	.setattr	= fuse_setattr,
2138 	.get_link	= fuse_get_link,
2139 	.getattr	= fuse_getattr,
2140 	.listxattr	= fuse_listxattr,
2141 };
2142 
2143 void fuse_init_common(struct inode *inode)
2144 {
2145 	inode->i_op = &fuse_common_inode_operations;
2146 }
2147 
2148 void fuse_init_dir(struct inode *inode)
2149 {
2150 	struct fuse_inode *fi = get_fuse_inode(inode);
2151 
2152 	inode->i_op = &fuse_dir_inode_operations;
2153 	inode->i_fop = &fuse_dir_operations;
2154 
2155 	spin_lock_init(&fi->rdc.lock);
2156 	fi->rdc.cached = false;
2157 	fi->rdc.size = 0;
2158 	fi->rdc.pos = 0;
2159 	fi->rdc.version = 0;
2160 }
2161 
2162 static int fuse_symlink_read_folio(struct file *null, struct folio *folio)
2163 {
2164 	int err = fuse_readlink_page(folio->mapping->host, &folio->page);
2165 
2166 	if (!err)
2167 		folio_mark_uptodate(folio);
2168 
2169 	folio_unlock(folio);
2170 
2171 	return err;
2172 }
2173 
2174 static const struct address_space_operations fuse_symlink_aops = {
2175 	.read_folio	= fuse_symlink_read_folio,
2176 };
2177 
2178 void fuse_init_symlink(struct inode *inode)
2179 {
2180 	inode->i_op = &fuse_symlink_inode_operations;
2181 	inode->i_data.a_ops = &fuse_symlink_aops;
2182 	inode_nohighmem(inode);
2183 }
2184