1 /* 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 7 */ 8 9 #include "fuse_i.h" 10 11 #include <linux/pagemap.h> 12 #include <linux/file.h> 13 #include <linux/fs_context.h> 14 #include <linux/moduleparam.h> 15 #include <linux/sched.h> 16 #include <linux/namei.h> 17 #include <linux/slab.h> 18 #include <linux/xattr.h> 19 #include <linux/iversion.h> 20 #include <linux/posix_acl.h> 21 #include <linux/security.h> 22 #include <linux/types.h> 23 #include <linux/kernel.h> 24 25 static bool __read_mostly allow_sys_admin_access; 26 module_param(allow_sys_admin_access, bool, 0644); 27 MODULE_PARM_DESC(allow_sys_admin_access, 28 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check"); 29 30 static void fuse_advise_use_readdirplus(struct inode *dir) 31 { 32 struct fuse_inode *fi = get_fuse_inode(dir); 33 34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 35 } 36 37 #if BITS_PER_LONG >= 64 38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time) 39 { 40 entry->d_fsdata = (void *) time; 41 } 42 43 static inline u64 fuse_dentry_time(const struct dentry *entry) 44 { 45 return (u64)entry->d_fsdata; 46 } 47 48 #else 49 union fuse_dentry { 50 u64 time; 51 struct rcu_head rcu; 52 }; 53 54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time) 55 { 56 ((union fuse_dentry *) dentry->d_fsdata)->time = time; 57 } 58 59 static inline u64 fuse_dentry_time(const struct dentry *entry) 60 { 61 return ((union fuse_dentry *) entry->d_fsdata)->time; 62 } 63 #endif 64 65 static void fuse_dentry_settime(struct dentry *dentry, u64 time) 66 { 67 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 68 bool delete = !time && fc->delete_stale; 69 /* 70 * Mess with DCACHE_OP_DELETE because dput() will be faster without it. 71 * Don't care about races, either way it's just an optimization 72 */ 73 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) || 74 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) { 75 spin_lock(&dentry->d_lock); 76 if (!delete) 77 dentry->d_flags &= ~DCACHE_OP_DELETE; 78 else 79 dentry->d_flags |= DCACHE_OP_DELETE; 80 spin_unlock(&dentry->d_lock); 81 } 82 83 __fuse_dentry_settime(dentry, time); 84 } 85 86 /* 87 * FUSE caches dentries and attributes with separate timeout. The 88 * time in jiffies until the dentry/attributes are valid is stored in 89 * dentry->d_fsdata and fuse_inode->i_time respectively. 90 */ 91 92 /* 93 * Calculate the time in jiffies until a dentry/attributes are valid 94 */ 95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec) 96 { 97 if (sec || nsec) { 98 struct timespec64 ts = { 99 sec, 100 min_t(u32, nsec, NSEC_PER_SEC - 1) 101 }; 102 103 return get_jiffies_64() + timespec64_to_jiffies(&ts); 104 } else 105 return 0; 106 } 107 108 /* 109 * Set dentry and possibly attribute timeouts from the lookup/mk* 110 * replies 111 */ 112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 113 { 114 fuse_dentry_settime(entry, 115 fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); 116 } 117 118 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 119 { 120 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 121 } 122 123 /* 124 * Mark the attributes as stale, so that at the next call to 125 * ->getattr() they will be fetched from userspace 126 */ 127 void fuse_invalidate_attr(struct inode *inode) 128 { 129 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 130 } 131 132 static void fuse_dir_changed(struct inode *dir) 133 { 134 fuse_invalidate_attr(dir); 135 inode_maybe_inc_iversion(dir, false); 136 } 137 138 /* 139 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 140 * atime is not used. 141 */ 142 void fuse_invalidate_atime(struct inode *inode) 143 { 144 if (!IS_RDONLY(inode)) 145 fuse_invalidate_attr_mask(inode, STATX_ATIME); 146 } 147 148 /* 149 * Just mark the entry as stale, so that a next attempt to look it up 150 * will result in a new lookup call to userspace 151 * 152 * This is called when a dentry is about to become negative and the 153 * timeout is unknown (unlink, rmdir, rename and in some cases 154 * lookup) 155 */ 156 void fuse_invalidate_entry_cache(struct dentry *entry) 157 { 158 fuse_dentry_settime(entry, 0); 159 } 160 161 /* 162 * Same as fuse_invalidate_entry_cache(), but also try to remove the 163 * dentry from the hash 164 */ 165 static void fuse_invalidate_entry(struct dentry *entry) 166 { 167 d_invalidate(entry); 168 fuse_invalidate_entry_cache(entry); 169 } 170 171 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 172 u64 nodeid, const struct qstr *name, 173 struct fuse_entry_out *outarg) 174 { 175 memset(outarg, 0, sizeof(struct fuse_entry_out)); 176 args->opcode = FUSE_LOOKUP; 177 args->nodeid = nodeid; 178 args->in_numargs = 1; 179 args->in_args[0].size = name->len + 1; 180 args->in_args[0].value = name->name; 181 args->out_numargs = 1; 182 args->out_args[0].size = sizeof(struct fuse_entry_out); 183 args->out_args[0].value = outarg; 184 } 185 186 /* 187 * Check whether the dentry is still valid 188 * 189 * If the entry validity timeout has expired and the dentry is 190 * positive, try to redo the lookup. If the lookup results in a 191 * different inode, then let the VFS invalidate the dentry and redo 192 * the lookup once more. If the lookup results in the same inode, 193 * then refresh the attributes, timeouts and mark the dentry valid. 194 */ 195 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 196 { 197 struct inode *inode; 198 struct dentry *parent; 199 struct fuse_mount *fm; 200 struct fuse_inode *fi; 201 int ret; 202 203 inode = d_inode_rcu(entry); 204 if (inode && fuse_is_bad(inode)) 205 goto invalid; 206 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 207 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) { 208 struct fuse_entry_out outarg; 209 FUSE_ARGS(args); 210 struct fuse_forget_link *forget; 211 u64 attr_version; 212 213 /* For negative dentries, always do a fresh lookup */ 214 if (!inode) 215 goto invalid; 216 217 ret = -ECHILD; 218 if (flags & LOOKUP_RCU) 219 goto out; 220 221 fm = get_fuse_mount(inode); 222 223 forget = fuse_alloc_forget(); 224 ret = -ENOMEM; 225 if (!forget) 226 goto out; 227 228 attr_version = fuse_get_attr_version(fm->fc); 229 230 parent = dget_parent(entry); 231 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)), 232 &entry->d_name, &outarg); 233 ret = fuse_simple_request(fm, &args); 234 dput(parent); 235 /* Zero nodeid is same as -ENOENT */ 236 if (!ret && !outarg.nodeid) 237 ret = -ENOENT; 238 if (!ret) { 239 fi = get_fuse_inode(inode); 240 if (outarg.nodeid != get_node_id(inode) || 241 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) { 242 fuse_queue_forget(fm->fc, forget, 243 outarg.nodeid, 1); 244 goto invalid; 245 } 246 spin_lock(&fi->lock); 247 fi->nlookup++; 248 spin_unlock(&fi->lock); 249 } 250 kfree(forget); 251 if (ret == -ENOMEM || ret == -EINTR) 252 goto out; 253 if (ret || fuse_invalid_attr(&outarg.attr) || 254 fuse_stale_inode(inode, outarg.generation, &outarg.attr)) 255 goto invalid; 256 257 forget_all_cached_acls(inode); 258 fuse_change_attributes(inode, &outarg.attr, NULL, 259 ATTR_TIMEOUT(&outarg), 260 attr_version); 261 fuse_change_entry_timeout(entry, &outarg); 262 } else if (inode) { 263 fi = get_fuse_inode(inode); 264 if (flags & LOOKUP_RCU) { 265 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 266 return -ECHILD; 267 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 268 parent = dget_parent(entry); 269 fuse_advise_use_readdirplus(d_inode(parent)); 270 dput(parent); 271 } 272 } 273 ret = 1; 274 out: 275 return ret; 276 277 invalid: 278 ret = 0; 279 goto out; 280 } 281 282 #if BITS_PER_LONG < 64 283 static int fuse_dentry_init(struct dentry *dentry) 284 { 285 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), 286 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE); 287 288 return dentry->d_fsdata ? 0 : -ENOMEM; 289 } 290 static void fuse_dentry_release(struct dentry *dentry) 291 { 292 union fuse_dentry *fd = dentry->d_fsdata; 293 294 kfree_rcu(fd, rcu); 295 } 296 #endif 297 298 static int fuse_dentry_delete(const struct dentry *dentry) 299 { 300 return time_before64(fuse_dentry_time(dentry), get_jiffies_64()); 301 } 302 303 /* 304 * Create a fuse_mount object with a new superblock (with path->dentry 305 * as the root), and return that mount so it can be auto-mounted on 306 * @path. 307 */ 308 static struct vfsmount *fuse_dentry_automount(struct path *path) 309 { 310 struct fs_context *fsc; 311 struct vfsmount *mnt; 312 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry)); 313 314 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry); 315 if (IS_ERR(fsc)) 316 return ERR_CAST(fsc); 317 318 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */ 319 fsc->fs_private = mp_fi; 320 321 /* Create the submount */ 322 mnt = fc_mount(fsc); 323 if (!IS_ERR(mnt)) 324 mntget(mnt); 325 326 put_fs_context(fsc); 327 return mnt; 328 } 329 330 const struct dentry_operations fuse_dentry_operations = { 331 .d_revalidate = fuse_dentry_revalidate, 332 .d_delete = fuse_dentry_delete, 333 #if BITS_PER_LONG < 64 334 .d_init = fuse_dentry_init, 335 .d_release = fuse_dentry_release, 336 #endif 337 .d_automount = fuse_dentry_automount, 338 }; 339 340 const struct dentry_operations fuse_root_dentry_operations = { 341 #if BITS_PER_LONG < 64 342 .d_init = fuse_dentry_init, 343 .d_release = fuse_dentry_release, 344 #endif 345 }; 346 347 int fuse_valid_type(int m) 348 { 349 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 350 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 351 } 352 353 static bool fuse_valid_size(u64 size) 354 { 355 return size <= LLONG_MAX; 356 } 357 358 bool fuse_invalid_attr(struct fuse_attr *attr) 359 { 360 return !fuse_valid_type(attr->mode) || !fuse_valid_size(attr->size); 361 } 362 363 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 364 struct fuse_entry_out *outarg, struct inode **inode) 365 { 366 struct fuse_mount *fm = get_fuse_mount_super(sb); 367 FUSE_ARGS(args); 368 struct fuse_forget_link *forget; 369 u64 attr_version; 370 int err; 371 372 *inode = NULL; 373 err = -ENAMETOOLONG; 374 if (name->len > FUSE_NAME_MAX) 375 goto out; 376 377 378 forget = fuse_alloc_forget(); 379 err = -ENOMEM; 380 if (!forget) 381 goto out; 382 383 attr_version = fuse_get_attr_version(fm->fc); 384 385 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg); 386 err = fuse_simple_request(fm, &args); 387 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 388 if (err || !outarg->nodeid) 389 goto out_put_forget; 390 391 err = -EIO; 392 if (fuse_invalid_attr(&outarg->attr)) 393 goto out_put_forget; 394 395 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 396 &outarg->attr, ATTR_TIMEOUT(outarg), 397 attr_version); 398 err = -ENOMEM; 399 if (!*inode) { 400 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1); 401 goto out; 402 } 403 err = 0; 404 405 out_put_forget: 406 kfree(forget); 407 out: 408 return err; 409 } 410 411 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 412 unsigned int flags) 413 { 414 int err; 415 struct fuse_entry_out outarg; 416 struct inode *inode; 417 struct dentry *newent; 418 bool outarg_valid = true; 419 bool locked; 420 421 if (fuse_is_bad(dir)) 422 return ERR_PTR(-EIO); 423 424 locked = fuse_lock_inode(dir); 425 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 426 &outarg, &inode); 427 fuse_unlock_inode(dir, locked); 428 if (err == -ENOENT) { 429 outarg_valid = false; 430 err = 0; 431 } 432 if (err) 433 goto out_err; 434 435 err = -EIO; 436 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 437 goto out_iput; 438 439 newent = d_splice_alias(inode, entry); 440 err = PTR_ERR(newent); 441 if (IS_ERR(newent)) 442 goto out_err; 443 444 entry = newent ? newent : entry; 445 if (outarg_valid) 446 fuse_change_entry_timeout(entry, &outarg); 447 else 448 fuse_invalidate_entry_cache(entry); 449 450 if (inode) 451 fuse_advise_use_readdirplus(dir); 452 return newent; 453 454 out_iput: 455 iput(inode); 456 out_err: 457 return ERR_PTR(err); 458 } 459 460 static int get_security_context(struct dentry *entry, umode_t mode, 461 struct fuse_in_arg *ext) 462 { 463 struct fuse_secctx *fctx; 464 struct fuse_secctx_header *header; 465 void *ctx = NULL, *ptr; 466 u32 ctxlen, total_len = sizeof(*header); 467 int err, nr_ctx = 0; 468 const char *name; 469 size_t namelen; 470 471 err = security_dentry_init_security(entry, mode, &entry->d_name, 472 &name, &ctx, &ctxlen); 473 if (err) { 474 if (err != -EOPNOTSUPP) 475 goto out_err; 476 /* No LSM is supporting this security hook. Ignore error */ 477 ctxlen = 0; 478 ctx = NULL; 479 } 480 481 if (ctxlen) { 482 nr_ctx = 1; 483 namelen = strlen(name) + 1; 484 err = -EIO; 485 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) 486 goto out_err; 487 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); 488 } 489 490 err = -ENOMEM; 491 header = ptr = kzalloc(total_len, GFP_KERNEL); 492 if (!ptr) 493 goto out_err; 494 495 header->nr_secctx = nr_ctx; 496 header->size = total_len; 497 ptr += sizeof(*header); 498 if (nr_ctx) { 499 fctx = ptr; 500 fctx->size = ctxlen; 501 ptr += sizeof(*fctx); 502 503 strcpy(ptr, name); 504 ptr += namelen; 505 506 memcpy(ptr, ctx, ctxlen); 507 } 508 ext->size = total_len; 509 ext->value = header; 510 err = 0; 511 out_err: 512 kfree(ctx); 513 return err; 514 } 515 516 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes) 517 { 518 void *p; 519 u32 newlen = buf->size + bytes; 520 521 p = krealloc(buf->value, newlen, GFP_KERNEL); 522 if (!p) { 523 kfree(buf->value); 524 buf->size = 0; 525 buf->value = NULL; 526 return NULL; 527 } 528 529 memset(p + buf->size, 0, bytes); 530 buf->value = p; 531 buf->size = newlen; 532 533 return p + newlen - bytes; 534 } 535 536 static u32 fuse_ext_size(size_t size) 537 { 538 return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size); 539 } 540 541 /* 542 * This adds just a single supplementary group that matches the parent's group. 543 */ 544 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext) 545 { 546 struct fuse_conn *fc = get_fuse_conn(dir); 547 struct fuse_ext_header *xh; 548 struct fuse_supp_groups *sg; 549 kgid_t kgid = dir->i_gid; 550 gid_t parent_gid = from_kgid(fc->user_ns, kgid); 551 u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0])); 552 553 if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) || 554 !in_group_p(kgid)) 555 return 0; 556 557 xh = extend_arg(ext, sg_len); 558 if (!xh) 559 return -ENOMEM; 560 561 xh->size = sg_len; 562 xh->type = FUSE_EXT_GROUPS; 563 564 sg = (struct fuse_supp_groups *) &xh[1]; 565 sg->nr_groups = 1; 566 sg->groups[0] = parent_gid; 567 568 return 0; 569 } 570 571 static int get_create_ext(struct fuse_args *args, 572 struct inode *dir, struct dentry *dentry, 573 umode_t mode) 574 { 575 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 576 struct fuse_in_arg ext = { .size = 0, .value = NULL }; 577 int err = 0; 578 579 if (fc->init_security) 580 err = get_security_context(dentry, mode, &ext); 581 if (!err && fc->create_supp_group) 582 err = get_create_supp_group(dir, &ext); 583 584 if (!err && ext.size) { 585 WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args)); 586 args->is_ext = true; 587 args->ext_idx = args->in_numargs++; 588 args->in_args[args->ext_idx] = ext; 589 } else { 590 kfree(ext.value); 591 } 592 593 return err; 594 } 595 596 static void free_ext_value(struct fuse_args *args) 597 { 598 if (args->is_ext) 599 kfree(args->in_args[args->ext_idx].value); 600 } 601 602 /* 603 * Atomic create+open operation 604 * 605 * If the filesystem doesn't support this, then fall back to separate 606 * 'mknod' + 'open' requests. 607 */ 608 static int fuse_create_open(struct inode *dir, struct dentry *entry, 609 struct file *file, unsigned int flags, 610 umode_t mode, u32 opcode) 611 { 612 int err; 613 struct inode *inode; 614 struct fuse_mount *fm = get_fuse_mount(dir); 615 FUSE_ARGS(args); 616 struct fuse_forget_link *forget; 617 struct fuse_create_in inarg; 618 struct fuse_open_out outopen; 619 struct fuse_entry_out outentry; 620 struct fuse_inode *fi; 621 struct fuse_file *ff; 622 bool trunc = flags & O_TRUNC; 623 624 /* Userspace expects S_IFREG in create mode */ 625 BUG_ON((mode & S_IFMT) != S_IFREG); 626 627 forget = fuse_alloc_forget(); 628 err = -ENOMEM; 629 if (!forget) 630 goto out_err; 631 632 err = -ENOMEM; 633 ff = fuse_file_alloc(fm); 634 if (!ff) 635 goto out_put_forget_req; 636 637 if (!fm->fc->dont_mask) 638 mode &= ~current_umask(); 639 640 flags &= ~O_NOCTTY; 641 memset(&inarg, 0, sizeof(inarg)); 642 memset(&outentry, 0, sizeof(outentry)); 643 inarg.flags = flags; 644 inarg.mode = mode; 645 inarg.umask = current_umask(); 646 647 if (fm->fc->handle_killpriv_v2 && trunc && 648 !(flags & O_EXCL) && !capable(CAP_FSETID)) { 649 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID; 650 } 651 652 args.opcode = opcode; 653 args.nodeid = get_node_id(dir); 654 args.in_numargs = 2; 655 args.in_args[0].size = sizeof(inarg); 656 args.in_args[0].value = &inarg; 657 args.in_args[1].size = entry->d_name.len + 1; 658 args.in_args[1].value = entry->d_name.name; 659 args.out_numargs = 2; 660 args.out_args[0].size = sizeof(outentry); 661 args.out_args[0].value = &outentry; 662 args.out_args[1].size = sizeof(outopen); 663 args.out_args[1].value = &outopen; 664 665 err = get_create_ext(&args, dir, entry, mode); 666 if (err) 667 goto out_put_forget_req; 668 669 err = fuse_simple_request(fm, &args); 670 free_ext_value(&args); 671 if (err) 672 goto out_free_ff; 673 674 err = -EIO; 675 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) || 676 fuse_invalid_attr(&outentry.attr)) 677 goto out_free_ff; 678 679 ff->fh = outopen.fh; 680 ff->nodeid = outentry.nodeid; 681 ff->open_flags = outopen.open_flags; 682 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 683 &outentry.attr, ATTR_TIMEOUT(&outentry), 0); 684 if (!inode) { 685 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 686 fuse_sync_release(NULL, ff, flags); 687 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1); 688 err = -ENOMEM; 689 goto out_err; 690 } 691 kfree(forget); 692 d_instantiate(entry, inode); 693 fuse_change_entry_timeout(entry, &outentry); 694 fuse_dir_changed(dir); 695 err = finish_open(file, entry, generic_file_open); 696 if (err) { 697 fi = get_fuse_inode(inode); 698 fuse_sync_release(fi, ff, flags); 699 } else { 700 file->private_data = ff; 701 fuse_finish_open(inode, file); 702 if (fm->fc->atomic_o_trunc && trunc) 703 truncate_pagecache(inode, 0); 704 else if (!(ff->open_flags & FOPEN_KEEP_CACHE)) 705 invalidate_inode_pages2(inode->i_mapping); 706 } 707 return err; 708 709 out_free_ff: 710 fuse_file_free(ff); 711 out_put_forget_req: 712 kfree(forget); 713 out_err: 714 return err; 715 } 716 717 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *, 718 umode_t, dev_t); 719 static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 720 struct file *file, unsigned flags, 721 umode_t mode) 722 { 723 int err; 724 struct fuse_conn *fc = get_fuse_conn(dir); 725 struct dentry *res = NULL; 726 727 if (fuse_is_bad(dir)) 728 return -EIO; 729 730 if (d_in_lookup(entry)) { 731 res = fuse_lookup(dir, entry, 0); 732 if (IS_ERR(res)) 733 return PTR_ERR(res); 734 735 if (res) 736 entry = res; 737 } 738 739 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 740 goto no_open; 741 742 /* Only creates */ 743 file->f_mode |= FMODE_CREATED; 744 745 if (fc->no_create) 746 goto mknod; 747 748 err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE); 749 if (err == -ENOSYS) { 750 fc->no_create = 1; 751 goto mknod; 752 } 753 out_dput: 754 dput(res); 755 return err; 756 757 mknod: 758 err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 759 if (err) 760 goto out_dput; 761 no_open: 762 return finish_no_open(file, res); 763 } 764 765 /* 766 * Code shared between mknod, mkdir, symlink and link 767 */ 768 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args, 769 struct inode *dir, struct dentry *entry, 770 umode_t mode) 771 { 772 struct fuse_entry_out outarg; 773 struct inode *inode; 774 struct dentry *d; 775 int err; 776 struct fuse_forget_link *forget; 777 778 if (fuse_is_bad(dir)) 779 return -EIO; 780 781 forget = fuse_alloc_forget(); 782 if (!forget) 783 return -ENOMEM; 784 785 memset(&outarg, 0, sizeof(outarg)); 786 args->nodeid = get_node_id(dir); 787 args->out_numargs = 1; 788 args->out_args[0].size = sizeof(outarg); 789 args->out_args[0].value = &outarg; 790 791 if (args->opcode != FUSE_LINK) { 792 err = get_create_ext(args, dir, entry, mode); 793 if (err) 794 goto out_put_forget_req; 795 } 796 797 err = fuse_simple_request(fm, args); 798 free_ext_value(args); 799 if (err) 800 goto out_put_forget_req; 801 802 err = -EIO; 803 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr)) 804 goto out_put_forget_req; 805 806 if ((outarg.attr.mode ^ mode) & S_IFMT) 807 goto out_put_forget_req; 808 809 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 810 &outarg.attr, ATTR_TIMEOUT(&outarg), 0); 811 if (!inode) { 812 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1); 813 return -ENOMEM; 814 } 815 kfree(forget); 816 817 d_drop(entry); 818 d = d_splice_alias(inode, entry); 819 if (IS_ERR(d)) 820 return PTR_ERR(d); 821 822 if (d) { 823 fuse_change_entry_timeout(d, &outarg); 824 dput(d); 825 } else { 826 fuse_change_entry_timeout(entry, &outarg); 827 } 828 fuse_dir_changed(dir); 829 return 0; 830 831 out_put_forget_req: 832 kfree(forget); 833 return err; 834 } 835 836 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir, 837 struct dentry *entry, umode_t mode, dev_t rdev) 838 { 839 struct fuse_mknod_in inarg; 840 struct fuse_mount *fm = get_fuse_mount(dir); 841 FUSE_ARGS(args); 842 843 if (!fm->fc->dont_mask) 844 mode &= ~current_umask(); 845 846 memset(&inarg, 0, sizeof(inarg)); 847 inarg.mode = mode; 848 inarg.rdev = new_encode_dev(rdev); 849 inarg.umask = current_umask(); 850 args.opcode = FUSE_MKNOD; 851 args.in_numargs = 2; 852 args.in_args[0].size = sizeof(inarg); 853 args.in_args[0].value = &inarg; 854 args.in_args[1].size = entry->d_name.len + 1; 855 args.in_args[1].value = entry->d_name.name; 856 return create_new_entry(fm, &args, dir, entry, mode); 857 } 858 859 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir, 860 struct dentry *entry, umode_t mode, bool excl) 861 { 862 return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 863 } 864 865 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir, 866 struct file *file, umode_t mode) 867 { 868 struct fuse_conn *fc = get_fuse_conn(dir); 869 int err; 870 871 if (fc->no_tmpfile) 872 return -EOPNOTSUPP; 873 874 err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE); 875 if (err == -ENOSYS) { 876 fc->no_tmpfile = 1; 877 err = -EOPNOTSUPP; 878 } 879 return err; 880 } 881 882 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir, 883 struct dentry *entry, umode_t mode) 884 { 885 struct fuse_mkdir_in inarg; 886 struct fuse_mount *fm = get_fuse_mount(dir); 887 FUSE_ARGS(args); 888 889 if (!fm->fc->dont_mask) 890 mode &= ~current_umask(); 891 892 memset(&inarg, 0, sizeof(inarg)); 893 inarg.mode = mode; 894 inarg.umask = current_umask(); 895 args.opcode = FUSE_MKDIR; 896 args.in_numargs = 2; 897 args.in_args[0].size = sizeof(inarg); 898 args.in_args[0].value = &inarg; 899 args.in_args[1].size = entry->d_name.len + 1; 900 args.in_args[1].value = entry->d_name.name; 901 return create_new_entry(fm, &args, dir, entry, S_IFDIR); 902 } 903 904 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir, 905 struct dentry *entry, const char *link) 906 { 907 struct fuse_mount *fm = get_fuse_mount(dir); 908 unsigned len = strlen(link) + 1; 909 FUSE_ARGS(args); 910 911 args.opcode = FUSE_SYMLINK; 912 args.in_numargs = 2; 913 args.in_args[0].size = entry->d_name.len + 1; 914 args.in_args[0].value = entry->d_name.name; 915 args.in_args[1].size = len; 916 args.in_args[1].value = link; 917 return create_new_entry(fm, &args, dir, entry, S_IFLNK); 918 } 919 920 void fuse_flush_time_update(struct inode *inode) 921 { 922 int err = sync_inode_metadata(inode, 1); 923 924 mapping_set_error(inode->i_mapping, err); 925 } 926 927 static void fuse_update_ctime_in_cache(struct inode *inode) 928 { 929 if (!IS_NOCMTIME(inode)) { 930 inode->i_ctime = current_time(inode); 931 mark_inode_dirty_sync(inode); 932 fuse_flush_time_update(inode); 933 } 934 } 935 936 void fuse_update_ctime(struct inode *inode) 937 { 938 fuse_invalidate_attr_mask(inode, STATX_CTIME); 939 fuse_update_ctime_in_cache(inode); 940 } 941 942 static void fuse_entry_unlinked(struct dentry *entry) 943 { 944 struct inode *inode = d_inode(entry); 945 struct fuse_conn *fc = get_fuse_conn(inode); 946 struct fuse_inode *fi = get_fuse_inode(inode); 947 948 spin_lock(&fi->lock); 949 fi->attr_version = atomic64_inc_return(&fc->attr_version); 950 /* 951 * If i_nlink == 0 then unlink doesn't make sense, yet this can 952 * happen if userspace filesystem is careless. It would be 953 * difficult to enforce correct nlink usage so just ignore this 954 * condition here 955 */ 956 if (S_ISDIR(inode->i_mode)) 957 clear_nlink(inode); 958 else if (inode->i_nlink > 0) 959 drop_nlink(inode); 960 spin_unlock(&fi->lock); 961 fuse_invalidate_entry_cache(entry); 962 fuse_update_ctime(inode); 963 } 964 965 static int fuse_unlink(struct inode *dir, struct dentry *entry) 966 { 967 int err; 968 struct fuse_mount *fm = get_fuse_mount(dir); 969 FUSE_ARGS(args); 970 971 if (fuse_is_bad(dir)) 972 return -EIO; 973 974 args.opcode = FUSE_UNLINK; 975 args.nodeid = get_node_id(dir); 976 args.in_numargs = 1; 977 args.in_args[0].size = entry->d_name.len + 1; 978 args.in_args[0].value = entry->d_name.name; 979 err = fuse_simple_request(fm, &args); 980 if (!err) { 981 fuse_dir_changed(dir); 982 fuse_entry_unlinked(entry); 983 } else if (err == -EINTR) 984 fuse_invalidate_entry(entry); 985 return err; 986 } 987 988 static int fuse_rmdir(struct inode *dir, struct dentry *entry) 989 { 990 int err; 991 struct fuse_mount *fm = get_fuse_mount(dir); 992 FUSE_ARGS(args); 993 994 if (fuse_is_bad(dir)) 995 return -EIO; 996 997 args.opcode = FUSE_RMDIR; 998 args.nodeid = get_node_id(dir); 999 args.in_numargs = 1; 1000 args.in_args[0].size = entry->d_name.len + 1; 1001 args.in_args[0].value = entry->d_name.name; 1002 err = fuse_simple_request(fm, &args); 1003 if (!err) { 1004 fuse_dir_changed(dir); 1005 fuse_entry_unlinked(entry); 1006 } else if (err == -EINTR) 1007 fuse_invalidate_entry(entry); 1008 return err; 1009 } 1010 1011 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 1012 struct inode *newdir, struct dentry *newent, 1013 unsigned int flags, int opcode, size_t argsize) 1014 { 1015 int err; 1016 struct fuse_rename2_in inarg; 1017 struct fuse_mount *fm = get_fuse_mount(olddir); 1018 FUSE_ARGS(args); 1019 1020 memset(&inarg, 0, argsize); 1021 inarg.newdir = get_node_id(newdir); 1022 inarg.flags = flags; 1023 args.opcode = opcode; 1024 args.nodeid = get_node_id(olddir); 1025 args.in_numargs = 3; 1026 args.in_args[0].size = argsize; 1027 args.in_args[0].value = &inarg; 1028 args.in_args[1].size = oldent->d_name.len + 1; 1029 args.in_args[1].value = oldent->d_name.name; 1030 args.in_args[2].size = newent->d_name.len + 1; 1031 args.in_args[2].value = newent->d_name.name; 1032 err = fuse_simple_request(fm, &args); 1033 if (!err) { 1034 /* ctime changes */ 1035 fuse_update_ctime(d_inode(oldent)); 1036 1037 if (flags & RENAME_EXCHANGE) 1038 fuse_update_ctime(d_inode(newent)); 1039 1040 fuse_dir_changed(olddir); 1041 if (olddir != newdir) 1042 fuse_dir_changed(newdir); 1043 1044 /* newent will end up negative */ 1045 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) 1046 fuse_entry_unlinked(newent); 1047 } else if (err == -EINTR) { 1048 /* If request was interrupted, DEITY only knows if the 1049 rename actually took place. If the invalidation 1050 fails (e.g. some process has CWD under the renamed 1051 directory), then there can be inconsistency between 1052 the dcache and the real filesystem. Tough luck. */ 1053 fuse_invalidate_entry(oldent); 1054 if (d_really_is_positive(newent)) 1055 fuse_invalidate_entry(newent); 1056 } 1057 1058 return err; 1059 } 1060 1061 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir, 1062 struct dentry *oldent, struct inode *newdir, 1063 struct dentry *newent, unsigned int flags) 1064 { 1065 struct fuse_conn *fc = get_fuse_conn(olddir); 1066 int err; 1067 1068 if (fuse_is_bad(olddir)) 1069 return -EIO; 1070 1071 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT)) 1072 return -EINVAL; 1073 1074 if (flags) { 1075 if (fc->no_rename2 || fc->minor < 23) 1076 return -EINVAL; 1077 1078 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 1079 FUSE_RENAME2, 1080 sizeof(struct fuse_rename2_in)); 1081 if (err == -ENOSYS) { 1082 fc->no_rename2 = 1; 1083 err = -EINVAL; 1084 } 1085 } else { 1086 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 1087 FUSE_RENAME, 1088 sizeof(struct fuse_rename_in)); 1089 } 1090 1091 return err; 1092 } 1093 1094 static int fuse_link(struct dentry *entry, struct inode *newdir, 1095 struct dentry *newent) 1096 { 1097 int err; 1098 struct fuse_link_in inarg; 1099 struct inode *inode = d_inode(entry); 1100 struct fuse_mount *fm = get_fuse_mount(inode); 1101 FUSE_ARGS(args); 1102 1103 memset(&inarg, 0, sizeof(inarg)); 1104 inarg.oldnodeid = get_node_id(inode); 1105 args.opcode = FUSE_LINK; 1106 args.in_numargs = 2; 1107 args.in_args[0].size = sizeof(inarg); 1108 args.in_args[0].value = &inarg; 1109 args.in_args[1].size = newent->d_name.len + 1; 1110 args.in_args[1].value = newent->d_name.name; 1111 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode); 1112 if (!err) 1113 fuse_update_ctime_in_cache(inode); 1114 else if (err == -EINTR) 1115 fuse_invalidate_attr(inode); 1116 1117 return err; 1118 } 1119 1120 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1121 struct kstat *stat) 1122 { 1123 unsigned int blkbits; 1124 struct fuse_conn *fc = get_fuse_conn(inode); 1125 1126 stat->dev = inode->i_sb->s_dev; 1127 stat->ino = attr->ino; 1128 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1129 stat->nlink = attr->nlink; 1130 stat->uid = make_kuid(fc->user_ns, attr->uid); 1131 stat->gid = make_kgid(fc->user_ns, attr->gid); 1132 stat->rdev = inode->i_rdev; 1133 stat->atime.tv_sec = attr->atime; 1134 stat->atime.tv_nsec = attr->atimensec; 1135 stat->mtime.tv_sec = attr->mtime; 1136 stat->mtime.tv_nsec = attr->mtimensec; 1137 stat->ctime.tv_sec = attr->ctime; 1138 stat->ctime.tv_nsec = attr->ctimensec; 1139 stat->size = attr->size; 1140 stat->blocks = attr->blocks; 1141 1142 if (attr->blksize != 0) 1143 blkbits = ilog2(attr->blksize); 1144 else 1145 blkbits = inode->i_sb->s_blocksize_bits; 1146 1147 stat->blksize = 1 << blkbits; 1148 } 1149 1150 static void fuse_statx_to_attr(struct fuse_statx *sx, struct fuse_attr *attr) 1151 { 1152 memset(attr, 0, sizeof(*attr)); 1153 attr->ino = sx->ino; 1154 attr->size = sx->size; 1155 attr->blocks = sx->blocks; 1156 attr->atime = sx->atime.tv_sec; 1157 attr->mtime = sx->mtime.tv_sec; 1158 attr->ctime = sx->ctime.tv_sec; 1159 attr->atimensec = sx->atime.tv_nsec; 1160 attr->mtimensec = sx->mtime.tv_nsec; 1161 attr->ctimensec = sx->ctime.tv_nsec; 1162 attr->mode = sx->mode; 1163 attr->nlink = sx->nlink; 1164 attr->uid = sx->uid; 1165 attr->gid = sx->gid; 1166 attr->rdev = new_encode_dev(MKDEV(sx->rdev_major, sx->rdev_minor)); 1167 attr->blksize = sx->blksize; 1168 } 1169 1170 static int fuse_do_statx(struct inode *inode, struct file *file, 1171 struct kstat *stat) 1172 { 1173 int err; 1174 struct fuse_attr attr; 1175 struct fuse_statx *sx; 1176 struct fuse_statx_in inarg; 1177 struct fuse_statx_out outarg; 1178 struct fuse_mount *fm = get_fuse_mount(inode); 1179 u64 attr_version = fuse_get_attr_version(fm->fc); 1180 FUSE_ARGS(args); 1181 1182 memset(&inarg, 0, sizeof(inarg)); 1183 memset(&outarg, 0, sizeof(outarg)); 1184 /* Directories have separate file-handle space */ 1185 if (file && S_ISREG(inode->i_mode)) { 1186 struct fuse_file *ff = file->private_data; 1187 1188 inarg.getattr_flags |= FUSE_GETATTR_FH; 1189 inarg.fh = ff->fh; 1190 } 1191 /* For now leave sync hints as the default, request all stats. */ 1192 inarg.sx_flags = 0; 1193 inarg.sx_mask = STATX_BASIC_STATS | STATX_BTIME; 1194 args.opcode = FUSE_STATX; 1195 args.nodeid = get_node_id(inode); 1196 args.in_numargs = 1; 1197 args.in_args[0].size = sizeof(inarg); 1198 args.in_args[0].value = &inarg; 1199 args.out_numargs = 1; 1200 args.out_args[0].size = sizeof(outarg); 1201 args.out_args[0].value = &outarg; 1202 err = fuse_simple_request(fm, &args); 1203 if (err) 1204 return err; 1205 1206 sx = &outarg.stat; 1207 if (((sx->mask & STATX_SIZE) && !fuse_valid_size(sx->size)) || 1208 ((sx->mask & STATX_TYPE) && (!fuse_valid_type(sx->mode) || 1209 inode_wrong_type(inode, sx->mode)))) { 1210 make_bad_inode(inode); 1211 return -EIO; 1212 } 1213 1214 fuse_statx_to_attr(&outarg.stat, &attr); 1215 if ((sx->mask & STATX_BASIC_STATS) == STATX_BASIC_STATS) { 1216 fuse_change_attributes(inode, &attr, &outarg.stat, 1217 ATTR_TIMEOUT(&outarg), attr_version); 1218 } 1219 stat->result_mask = sx->mask & (STATX_BASIC_STATS | STATX_BTIME); 1220 stat->btime.tv_sec = sx->btime.tv_sec; 1221 stat->btime.tv_nsec = min_t(u32, sx->btime.tv_nsec, NSEC_PER_SEC - 1); 1222 fuse_fillattr(inode, &attr, stat); 1223 stat->result_mask |= STATX_TYPE; 1224 1225 return 0; 1226 } 1227 1228 static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1229 struct file *file) 1230 { 1231 int err; 1232 struct fuse_getattr_in inarg; 1233 struct fuse_attr_out outarg; 1234 struct fuse_mount *fm = get_fuse_mount(inode); 1235 FUSE_ARGS(args); 1236 u64 attr_version; 1237 1238 attr_version = fuse_get_attr_version(fm->fc); 1239 1240 memset(&inarg, 0, sizeof(inarg)); 1241 memset(&outarg, 0, sizeof(outarg)); 1242 /* Directories have separate file-handle space */ 1243 if (file && S_ISREG(inode->i_mode)) { 1244 struct fuse_file *ff = file->private_data; 1245 1246 inarg.getattr_flags |= FUSE_GETATTR_FH; 1247 inarg.fh = ff->fh; 1248 } 1249 args.opcode = FUSE_GETATTR; 1250 args.nodeid = get_node_id(inode); 1251 args.in_numargs = 1; 1252 args.in_args[0].size = sizeof(inarg); 1253 args.in_args[0].value = &inarg; 1254 args.out_numargs = 1; 1255 args.out_args[0].size = sizeof(outarg); 1256 args.out_args[0].value = &outarg; 1257 err = fuse_simple_request(fm, &args); 1258 if (!err) { 1259 if (fuse_invalid_attr(&outarg.attr) || 1260 inode_wrong_type(inode, outarg.attr.mode)) { 1261 fuse_make_bad(inode); 1262 err = -EIO; 1263 } else { 1264 fuse_change_attributes(inode, &outarg.attr, NULL, 1265 ATTR_TIMEOUT(&outarg), 1266 attr_version); 1267 if (stat) 1268 fuse_fillattr(inode, &outarg.attr, stat); 1269 } 1270 } 1271 return err; 1272 } 1273 1274 static int fuse_update_get_attr(struct inode *inode, struct file *file, 1275 struct kstat *stat, u32 request_mask, 1276 unsigned int flags) 1277 { 1278 struct fuse_inode *fi = get_fuse_inode(inode); 1279 struct fuse_conn *fc = get_fuse_conn(inode); 1280 int err = 0; 1281 bool sync; 1282 u32 inval_mask = READ_ONCE(fi->inval_mask); 1283 u32 cache_mask = fuse_get_cache_mask(inode); 1284 1285 1286 /* FUSE only supports basic stats and possibly btime */ 1287 request_mask &= STATX_BASIC_STATS | STATX_BTIME; 1288 retry: 1289 if (fc->no_statx) 1290 request_mask &= STATX_BASIC_STATS; 1291 1292 if (!request_mask) 1293 sync = false; 1294 else if (flags & AT_STATX_FORCE_SYNC) 1295 sync = true; 1296 else if (flags & AT_STATX_DONT_SYNC) 1297 sync = false; 1298 else if (request_mask & inval_mask & ~cache_mask) 1299 sync = true; 1300 else 1301 sync = time_before64(fi->i_time, get_jiffies_64()); 1302 1303 if (sync) { 1304 forget_all_cached_acls(inode); 1305 /* Try statx if BTIME is requested */ 1306 if (!fc->no_statx && (request_mask & ~STATX_BASIC_STATS)) { 1307 err = fuse_do_statx(inode, file, stat); 1308 if (err == -ENOSYS) { 1309 fc->no_statx = 1; 1310 goto retry; 1311 } 1312 } else { 1313 err = fuse_do_getattr(inode, stat, file); 1314 } 1315 } else if (stat) { 1316 generic_fillattr(&nop_mnt_idmap, inode, stat); 1317 stat->mode = fi->orig_i_mode; 1318 stat->ino = fi->orig_ino; 1319 if (test_bit(FUSE_I_BTIME, &fi->state)) { 1320 stat->btime = fi->i_btime; 1321 stat->result_mask |= STATX_BTIME; 1322 } 1323 } 1324 1325 return err; 1326 } 1327 1328 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) 1329 { 1330 return fuse_update_get_attr(inode, file, NULL, mask, 0); 1331 } 1332 1333 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, 1334 u64 child_nodeid, struct qstr *name, u32 flags) 1335 { 1336 int err = -ENOTDIR; 1337 struct inode *parent; 1338 struct dentry *dir; 1339 struct dentry *entry; 1340 1341 parent = fuse_ilookup(fc, parent_nodeid, NULL); 1342 if (!parent) 1343 return -ENOENT; 1344 1345 inode_lock_nested(parent, I_MUTEX_PARENT); 1346 if (!S_ISDIR(parent->i_mode)) 1347 goto unlock; 1348 1349 err = -ENOENT; 1350 dir = d_find_alias(parent); 1351 if (!dir) 1352 goto unlock; 1353 1354 name->hash = full_name_hash(dir, name->name, name->len); 1355 entry = d_lookup(dir, name); 1356 dput(dir); 1357 if (!entry) 1358 goto unlock; 1359 1360 fuse_dir_changed(parent); 1361 if (!(flags & FUSE_EXPIRE_ONLY)) 1362 d_invalidate(entry); 1363 fuse_invalidate_entry_cache(entry); 1364 1365 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1366 inode_lock(d_inode(entry)); 1367 if (get_node_id(d_inode(entry)) != child_nodeid) { 1368 err = -ENOENT; 1369 goto badentry; 1370 } 1371 if (d_mountpoint(entry)) { 1372 err = -EBUSY; 1373 goto badentry; 1374 } 1375 if (d_is_dir(entry)) { 1376 shrink_dcache_parent(entry); 1377 if (!simple_empty(entry)) { 1378 err = -ENOTEMPTY; 1379 goto badentry; 1380 } 1381 d_inode(entry)->i_flags |= S_DEAD; 1382 } 1383 dont_mount(entry); 1384 clear_nlink(d_inode(entry)); 1385 err = 0; 1386 badentry: 1387 inode_unlock(d_inode(entry)); 1388 if (!err) 1389 d_delete(entry); 1390 } else { 1391 err = 0; 1392 } 1393 dput(entry); 1394 1395 unlock: 1396 inode_unlock(parent); 1397 iput(parent); 1398 return err; 1399 } 1400 1401 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc) 1402 { 1403 const struct cred *cred = current_cred(); 1404 1405 return (uid_eq(cred->euid, fc->user_id) && 1406 uid_eq(cred->suid, fc->user_id) && 1407 uid_eq(cred->uid, fc->user_id) && 1408 gid_eq(cred->egid, fc->group_id) && 1409 gid_eq(cred->sgid, fc->group_id) && 1410 gid_eq(cred->gid, fc->group_id)); 1411 } 1412 1413 /* 1414 * Calling into a user-controlled filesystem gives the filesystem 1415 * daemon ptrace-like capabilities over the current process. This 1416 * means, that the filesystem daemon is able to record the exact 1417 * filesystem operations performed, and can also control the behavior 1418 * of the requester process in otherwise impossible ways. For example 1419 * it can delay the operation for arbitrary length of time allowing 1420 * DoS against the requester. 1421 * 1422 * For this reason only those processes can call into the filesystem, 1423 * for which the owner of the mount has ptrace privilege. This 1424 * excludes processes started by other users, suid or sgid processes. 1425 */ 1426 bool fuse_allow_current_process(struct fuse_conn *fc) 1427 { 1428 bool allow; 1429 1430 if (fc->allow_other) 1431 allow = current_in_userns(fc->user_ns); 1432 else 1433 allow = fuse_permissible_uidgid(fc); 1434 1435 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN)) 1436 allow = true; 1437 1438 return allow; 1439 } 1440 1441 static int fuse_access(struct inode *inode, int mask) 1442 { 1443 struct fuse_mount *fm = get_fuse_mount(inode); 1444 FUSE_ARGS(args); 1445 struct fuse_access_in inarg; 1446 int err; 1447 1448 BUG_ON(mask & MAY_NOT_BLOCK); 1449 1450 if (fm->fc->no_access) 1451 return 0; 1452 1453 memset(&inarg, 0, sizeof(inarg)); 1454 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1455 args.opcode = FUSE_ACCESS; 1456 args.nodeid = get_node_id(inode); 1457 args.in_numargs = 1; 1458 args.in_args[0].size = sizeof(inarg); 1459 args.in_args[0].value = &inarg; 1460 err = fuse_simple_request(fm, &args); 1461 if (err == -ENOSYS) { 1462 fm->fc->no_access = 1; 1463 err = 0; 1464 } 1465 return err; 1466 } 1467 1468 static int fuse_perm_getattr(struct inode *inode, int mask) 1469 { 1470 if (mask & MAY_NOT_BLOCK) 1471 return -ECHILD; 1472 1473 forget_all_cached_acls(inode); 1474 return fuse_do_getattr(inode, NULL, NULL); 1475 } 1476 1477 /* 1478 * Check permission. The two basic access models of FUSE are: 1479 * 1480 * 1) Local access checking ('default_permissions' mount option) based 1481 * on file mode. This is the plain old disk filesystem permission 1482 * modell. 1483 * 1484 * 2) "Remote" access checking, where server is responsible for 1485 * checking permission in each inode operation. An exception to this 1486 * is if ->permission() was invoked from sys_access() in which case an 1487 * access request is sent. Execute permission is still checked 1488 * locally based on file mode. 1489 */ 1490 static int fuse_permission(struct mnt_idmap *idmap, 1491 struct inode *inode, int mask) 1492 { 1493 struct fuse_conn *fc = get_fuse_conn(inode); 1494 bool refreshed = false; 1495 int err = 0; 1496 1497 if (fuse_is_bad(inode)) 1498 return -EIO; 1499 1500 if (!fuse_allow_current_process(fc)) 1501 return -EACCES; 1502 1503 /* 1504 * If attributes are needed, refresh them before proceeding 1505 */ 1506 if (fc->default_permissions || 1507 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1508 struct fuse_inode *fi = get_fuse_inode(inode); 1509 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1510 1511 if (perm_mask & READ_ONCE(fi->inval_mask) || 1512 time_before64(fi->i_time, get_jiffies_64())) { 1513 refreshed = true; 1514 1515 err = fuse_perm_getattr(inode, mask); 1516 if (err) 1517 return err; 1518 } 1519 } 1520 1521 if (fc->default_permissions) { 1522 err = generic_permission(&nop_mnt_idmap, inode, mask); 1523 1524 /* If permission is denied, try to refresh file 1525 attributes. This is also needed, because the root 1526 node will at first have no permissions */ 1527 if (err == -EACCES && !refreshed) { 1528 err = fuse_perm_getattr(inode, mask); 1529 if (!err) 1530 err = generic_permission(&nop_mnt_idmap, 1531 inode, mask); 1532 } 1533 1534 /* Note: the opposite of the above test does not 1535 exist. So if permissions are revoked this won't be 1536 noticed immediately, only after the attribute 1537 timeout has expired */ 1538 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1539 err = fuse_access(inode, mask); 1540 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1541 if (!(inode->i_mode & S_IXUGO)) { 1542 if (refreshed) 1543 return -EACCES; 1544 1545 err = fuse_perm_getattr(inode, mask); 1546 if (!err && !(inode->i_mode & S_IXUGO)) 1547 return -EACCES; 1548 } 1549 } 1550 return err; 1551 } 1552 1553 static int fuse_readlink_page(struct inode *inode, struct page *page) 1554 { 1555 struct fuse_mount *fm = get_fuse_mount(inode); 1556 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 }; 1557 struct fuse_args_pages ap = { 1558 .num_pages = 1, 1559 .pages = &page, 1560 .descs = &desc, 1561 }; 1562 char *link; 1563 ssize_t res; 1564 1565 ap.args.opcode = FUSE_READLINK; 1566 ap.args.nodeid = get_node_id(inode); 1567 ap.args.out_pages = true; 1568 ap.args.out_argvar = true; 1569 ap.args.page_zeroing = true; 1570 ap.args.out_numargs = 1; 1571 ap.args.out_args[0].size = desc.length; 1572 res = fuse_simple_request(fm, &ap.args); 1573 1574 fuse_invalidate_atime(inode); 1575 1576 if (res < 0) 1577 return res; 1578 1579 if (WARN_ON(res >= PAGE_SIZE)) 1580 return -EIO; 1581 1582 link = page_address(page); 1583 link[res] = '\0'; 1584 1585 return 0; 1586 } 1587 1588 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1589 struct delayed_call *callback) 1590 { 1591 struct fuse_conn *fc = get_fuse_conn(inode); 1592 struct page *page; 1593 int err; 1594 1595 err = -EIO; 1596 if (fuse_is_bad(inode)) 1597 goto out_err; 1598 1599 if (fc->cache_symlinks) 1600 return page_get_link(dentry, inode, callback); 1601 1602 err = -ECHILD; 1603 if (!dentry) 1604 goto out_err; 1605 1606 page = alloc_page(GFP_KERNEL); 1607 err = -ENOMEM; 1608 if (!page) 1609 goto out_err; 1610 1611 err = fuse_readlink_page(inode, page); 1612 if (err) { 1613 __free_page(page); 1614 goto out_err; 1615 } 1616 1617 set_delayed_call(callback, page_put_link, page); 1618 1619 return page_address(page); 1620 1621 out_err: 1622 return ERR_PTR(err); 1623 } 1624 1625 static int fuse_dir_open(struct inode *inode, struct file *file) 1626 { 1627 return fuse_open_common(inode, file, true); 1628 } 1629 1630 static int fuse_dir_release(struct inode *inode, struct file *file) 1631 { 1632 fuse_release_common(file, true); 1633 1634 return 0; 1635 } 1636 1637 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1638 int datasync) 1639 { 1640 struct inode *inode = file->f_mapping->host; 1641 struct fuse_conn *fc = get_fuse_conn(inode); 1642 int err; 1643 1644 if (fuse_is_bad(inode)) 1645 return -EIO; 1646 1647 if (fc->no_fsyncdir) 1648 return 0; 1649 1650 inode_lock(inode); 1651 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1652 if (err == -ENOSYS) { 1653 fc->no_fsyncdir = 1; 1654 err = 0; 1655 } 1656 inode_unlock(inode); 1657 1658 return err; 1659 } 1660 1661 static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1662 unsigned long arg) 1663 { 1664 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1665 1666 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1667 if (fc->minor < 18) 1668 return -ENOTTY; 1669 1670 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1671 } 1672 1673 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1674 unsigned long arg) 1675 { 1676 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1677 1678 if (fc->minor < 18) 1679 return -ENOTTY; 1680 1681 return fuse_ioctl_common(file, cmd, arg, 1682 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1683 } 1684 1685 static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1686 { 1687 /* Always update if mtime is explicitly set */ 1688 if (ivalid & ATTR_MTIME_SET) 1689 return true; 1690 1691 /* Or if kernel i_mtime is the official one */ 1692 if (trust_local_mtime) 1693 return true; 1694 1695 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1696 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1697 return false; 1698 1699 /* In all other cases update */ 1700 return true; 1701 } 1702 1703 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1704 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1705 { 1706 unsigned ivalid = iattr->ia_valid; 1707 1708 if (ivalid & ATTR_MODE) 1709 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1710 if (ivalid & ATTR_UID) 1711 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1712 if (ivalid & ATTR_GID) 1713 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1714 if (ivalid & ATTR_SIZE) 1715 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1716 if (ivalid & ATTR_ATIME) { 1717 arg->valid |= FATTR_ATIME; 1718 arg->atime = iattr->ia_atime.tv_sec; 1719 arg->atimensec = iattr->ia_atime.tv_nsec; 1720 if (!(ivalid & ATTR_ATIME_SET)) 1721 arg->valid |= FATTR_ATIME_NOW; 1722 } 1723 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1724 arg->valid |= FATTR_MTIME; 1725 arg->mtime = iattr->ia_mtime.tv_sec; 1726 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1727 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1728 arg->valid |= FATTR_MTIME_NOW; 1729 } 1730 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1731 arg->valid |= FATTR_CTIME; 1732 arg->ctime = iattr->ia_ctime.tv_sec; 1733 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1734 } 1735 } 1736 1737 /* 1738 * Prevent concurrent writepages on inode 1739 * 1740 * This is done by adding a negative bias to the inode write counter 1741 * and waiting for all pending writes to finish. 1742 */ 1743 void fuse_set_nowrite(struct inode *inode) 1744 { 1745 struct fuse_inode *fi = get_fuse_inode(inode); 1746 1747 BUG_ON(!inode_is_locked(inode)); 1748 1749 spin_lock(&fi->lock); 1750 BUG_ON(fi->writectr < 0); 1751 fi->writectr += FUSE_NOWRITE; 1752 spin_unlock(&fi->lock); 1753 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1754 } 1755 1756 /* 1757 * Allow writepages on inode 1758 * 1759 * Remove the bias from the writecounter and send any queued 1760 * writepages. 1761 */ 1762 static void __fuse_release_nowrite(struct inode *inode) 1763 { 1764 struct fuse_inode *fi = get_fuse_inode(inode); 1765 1766 BUG_ON(fi->writectr != FUSE_NOWRITE); 1767 fi->writectr = 0; 1768 fuse_flush_writepages(inode); 1769 } 1770 1771 void fuse_release_nowrite(struct inode *inode) 1772 { 1773 struct fuse_inode *fi = get_fuse_inode(inode); 1774 1775 spin_lock(&fi->lock); 1776 __fuse_release_nowrite(inode); 1777 spin_unlock(&fi->lock); 1778 } 1779 1780 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1781 struct inode *inode, 1782 struct fuse_setattr_in *inarg_p, 1783 struct fuse_attr_out *outarg_p) 1784 { 1785 args->opcode = FUSE_SETATTR; 1786 args->nodeid = get_node_id(inode); 1787 args->in_numargs = 1; 1788 args->in_args[0].size = sizeof(*inarg_p); 1789 args->in_args[0].value = inarg_p; 1790 args->out_numargs = 1; 1791 args->out_args[0].size = sizeof(*outarg_p); 1792 args->out_args[0].value = outarg_p; 1793 } 1794 1795 /* 1796 * Flush inode->i_mtime to the server 1797 */ 1798 int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1799 { 1800 struct fuse_mount *fm = get_fuse_mount(inode); 1801 FUSE_ARGS(args); 1802 struct fuse_setattr_in inarg; 1803 struct fuse_attr_out outarg; 1804 1805 memset(&inarg, 0, sizeof(inarg)); 1806 memset(&outarg, 0, sizeof(outarg)); 1807 1808 inarg.valid = FATTR_MTIME; 1809 inarg.mtime = inode->i_mtime.tv_sec; 1810 inarg.mtimensec = inode->i_mtime.tv_nsec; 1811 if (fm->fc->minor >= 23) { 1812 inarg.valid |= FATTR_CTIME; 1813 inarg.ctime = inode->i_ctime.tv_sec; 1814 inarg.ctimensec = inode->i_ctime.tv_nsec; 1815 } 1816 if (ff) { 1817 inarg.valid |= FATTR_FH; 1818 inarg.fh = ff->fh; 1819 } 1820 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg); 1821 1822 return fuse_simple_request(fm, &args); 1823 } 1824 1825 /* 1826 * Set attributes, and at the same time refresh them. 1827 * 1828 * Truncation is slightly complicated, because the 'truncate' request 1829 * may fail, in which case we don't want to touch the mapping. 1830 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1831 * and the actual truncation by hand. 1832 */ 1833 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1834 struct file *file) 1835 { 1836 struct inode *inode = d_inode(dentry); 1837 struct fuse_mount *fm = get_fuse_mount(inode); 1838 struct fuse_conn *fc = fm->fc; 1839 struct fuse_inode *fi = get_fuse_inode(inode); 1840 struct address_space *mapping = inode->i_mapping; 1841 FUSE_ARGS(args); 1842 struct fuse_setattr_in inarg; 1843 struct fuse_attr_out outarg; 1844 bool is_truncate = false; 1845 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode); 1846 loff_t oldsize; 1847 int err; 1848 bool trust_local_cmtime = is_wb; 1849 bool fault_blocked = false; 1850 1851 if (!fc->default_permissions) 1852 attr->ia_valid |= ATTR_FORCE; 1853 1854 err = setattr_prepare(&nop_mnt_idmap, dentry, attr); 1855 if (err) 1856 return err; 1857 1858 if (attr->ia_valid & ATTR_SIZE) { 1859 if (WARN_ON(!S_ISREG(inode->i_mode))) 1860 return -EIO; 1861 is_truncate = true; 1862 } 1863 1864 if (FUSE_IS_DAX(inode) && is_truncate) { 1865 filemap_invalidate_lock(mapping); 1866 fault_blocked = true; 1867 err = fuse_dax_break_layouts(inode, 0, 0); 1868 if (err) { 1869 filemap_invalidate_unlock(mapping); 1870 return err; 1871 } 1872 } 1873 1874 if (attr->ia_valid & ATTR_OPEN) { 1875 /* This is coming from open(..., ... | O_TRUNC); */ 1876 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1877 WARN_ON(attr->ia_size != 0); 1878 if (fc->atomic_o_trunc) { 1879 /* 1880 * No need to send request to userspace, since actual 1881 * truncation has already been done by OPEN. But still 1882 * need to truncate page cache. 1883 */ 1884 i_size_write(inode, 0); 1885 truncate_pagecache(inode, 0); 1886 goto out; 1887 } 1888 file = NULL; 1889 } 1890 1891 /* Flush dirty data/metadata before non-truncate SETATTR */ 1892 if (is_wb && 1893 attr->ia_valid & 1894 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET | 1895 ATTR_TIMES_SET)) { 1896 err = write_inode_now(inode, true); 1897 if (err) 1898 return err; 1899 1900 fuse_set_nowrite(inode); 1901 fuse_release_nowrite(inode); 1902 } 1903 1904 if (is_truncate) { 1905 fuse_set_nowrite(inode); 1906 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1907 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1908 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1909 } 1910 1911 memset(&inarg, 0, sizeof(inarg)); 1912 memset(&outarg, 0, sizeof(outarg)); 1913 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1914 if (file) { 1915 struct fuse_file *ff = file->private_data; 1916 inarg.valid |= FATTR_FH; 1917 inarg.fh = ff->fh; 1918 } 1919 1920 /* Kill suid/sgid for non-directory chown unconditionally */ 1921 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) && 1922 attr->ia_valid & (ATTR_UID | ATTR_GID)) 1923 inarg.valid |= FATTR_KILL_SUIDGID; 1924 1925 if (attr->ia_valid & ATTR_SIZE) { 1926 /* For mandatory locking in truncate */ 1927 inarg.valid |= FATTR_LOCKOWNER; 1928 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1929 1930 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 1931 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID)) 1932 inarg.valid |= FATTR_KILL_SUIDGID; 1933 } 1934 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1935 err = fuse_simple_request(fm, &args); 1936 if (err) { 1937 if (err == -EINTR) 1938 fuse_invalidate_attr(inode); 1939 goto error; 1940 } 1941 1942 if (fuse_invalid_attr(&outarg.attr) || 1943 inode_wrong_type(inode, outarg.attr.mode)) { 1944 fuse_make_bad(inode); 1945 err = -EIO; 1946 goto error; 1947 } 1948 1949 spin_lock(&fi->lock); 1950 /* the kernel maintains i_mtime locally */ 1951 if (trust_local_cmtime) { 1952 if (attr->ia_valid & ATTR_MTIME) 1953 inode->i_mtime = attr->ia_mtime; 1954 if (attr->ia_valid & ATTR_CTIME) 1955 inode->i_ctime = attr->ia_ctime; 1956 /* FIXME: clear I_DIRTY_SYNC? */ 1957 } 1958 1959 fuse_change_attributes_common(inode, &outarg.attr, NULL, 1960 ATTR_TIMEOUT(&outarg), 1961 fuse_get_cache_mask(inode)); 1962 oldsize = inode->i_size; 1963 /* see the comment in fuse_change_attributes() */ 1964 if (!is_wb || is_truncate) 1965 i_size_write(inode, outarg.attr.size); 1966 1967 if (is_truncate) { 1968 /* NOTE: this may release/reacquire fi->lock */ 1969 __fuse_release_nowrite(inode); 1970 } 1971 spin_unlock(&fi->lock); 1972 1973 /* 1974 * Only call invalidate_inode_pages2() after removing 1975 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock. 1976 */ 1977 if ((is_truncate || !is_wb) && 1978 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 1979 truncate_pagecache(inode, outarg.attr.size); 1980 invalidate_inode_pages2(mapping); 1981 } 1982 1983 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1984 out: 1985 if (fault_blocked) 1986 filemap_invalidate_unlock(mapping); 1987 1988 return 0; 1989 1990 error: 1991 if (is_truncate) 1992 fuse_release_nowrite(inode); 1993 1994 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1995 1996 if (fault_blocked) 1997 filemap_invalidate_unlock(mapping); 1998 return err; 1999 } 2000 2001 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry, 2002 struct iattr *attr) 2003 { 2004 struct inode *inode = d_inode(entry); 2005 struct fuse_conn *fc = get_fuse_conn(inode); 2006 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 2007 int ret; 2008 2009 if (fuse_is_bad(inode)) 2010 return -EIO; 2011 2012 if (!fuse_allow_current_process(get_fuse_conn(inode))) 2013 return -EACCES; 2014 2015 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 2016 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 2017 ATTR_MODE); 2018 2019 /* 2020 * The only sane way to reliably kill suid/sgid is to do it in 2021 * the userspace filesystem 2022 * 2023 * This should be done on write(), truncate() and chown(). 2024 */ 2025 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) { 2026 /* 2027 * ia_mode calculation may have used stale i_mode. 2028 * Refresh and recalculate. 2029 */ 2030 ret = fuse_do_getattr(inode, NULL, file); 2031 if (ret) 2032 return ret; 2033 2034 attr->ia_mode = inode->i_mode; 2035 if (inode->i_mode & S_ISUID) { 2036 attr->ia_valid |= ATTR_MODE; 2037 attr->ia_mode &= ~S_ISUID; 2038 } 2039 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 2040 attr->ia_valid |= ATTR_MODE; 2041 attr->ia_mode &= ~S_ISGID; 2042 } 2043 } 2044 } 2045 if (!attr->ia_valid) 2046 return 0; 2047 2048 ret = fuse_do_setattr(entry, attr, file); 2049 if (!ret) { 2050 /* 2051 * If filesystem supports acls it may have updated acl xattrs in 2052 * the filesystem, so forget cached acls for the inode. 2053 */ 2054 if (fc->posix_acl) 2055 forget_all_cached_acls(inode); 2056 2057 /* Directory mode changed, may need to revalidate access */ 2058 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 2059 fuse_invalidate_entry_cache(entry); 2060 } 2061 return ret; 2062 } 2063 2064 static int fuse_getattr(struct mnt_idmap *idmap, 2065 const struct path *path, struct kstat *stat, 2066 u32 request_mask, unsigned int flags) 2067 { 2068 struct inode *inode = d_inode(path->dentry); 2069 struct fuse_conn *fc = get_fuse_conn(inode); 2070 2071 if (fuse_is_bad(inode)) 2072 return -EIO; 2073 2074 if (!fuse_allow_current_process(fc)) { 2075 if (!request_mask) { 2076 /* 2077 * If user explicitly requested *nothing* then don't 2078 * error out, but return st_dev only. 2079 */ 2080 stat->result_mask = 0; 2081 stat->dev = inode->i_sb->s_dev; 2082 return 0; 2083 } 2084 return -EACCES; 2085 } 2086 2087 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 2088 } 2089 2090 static const struct inode_operations fuse_dir_inode_operations = { 2091 .lookup = fuse_lookup, 2092 .mkdir = fuse_mkdir, 2093 .symlink = fuse_symlink, 2094 .unlink = fuse_unlink, 2095 .rmdir = fuse_rmdir, 2096 .rename = fuse_rename2, 2097 .link = fuse_link, 2098 .setattr = fuse_setattr, 2099 .create = fuse_create, 2100 .atomic_open = fuse_atomic_open, 2101 .tmpfile = fuse_tmpfile, 2102 .mknod = fuse_mknod, 2103 .permission = fuse_permission, 2104 .getattr = fuse_getattr, 2105 .listxattr = fuse_listxattr, 2106 .get_inode_acl = fuse_get_inode_acl, 2107 .get_acl = fuse_get_acl, 2108 .set_acl = fuse_set_acl, 2109 .fileattr_get = fuse_fileattr_get, 2110 .fileattr_set = fuse_fileattr_set, 2111 }; 2112 2113 static const struct file_operations fuse_dir_operations = { 2114 .llseek = generic_file_llseek, 2115 .read = generic_read_dir, 2116 .iterate_shared = fuse_readdir, 2117 .open = fuse_dir_open, 2118 .release = fuse_dir_release, 2119 .fsync = fuse_dir_fsync, 2120 .unlocked_ioctl = fuse_dir_ioctl, 2121 .compat_ioctl = fuse_dir_compat_ioctl, 2122 }; 2123 2124 static const struct inode_operations fuse_common_inode_operations = { 2125 .setattr = fuse_setattr, 2126 .permission = fuse_permission, 2127 .getattr = fuse_getattr, 2128 .listxattr = fuse_listxattr, 2129 .get_inode_acl = fuse_get_inode_acl, 2130 .get_acl = fuse_get_acl, 2131 .set_acl = fuse_set_acl, 2132 .fileattr_get = fuse_fileattr_get, 2133 .fileattr_set = fuse_fileattr_set, 2134 }; 2135 2136 static const struct inode_operations fuse_symlink_inode_operations = { 2137 .setattr = fuse_setattr, 2138 .get_link = fuse_get_link, 2139 .getattr = fuse_getattr, 2140 .listxattr = fuse_listxattr, 2141 }; 2142 2143 void fuse_init_common(struct inode *inode) 2144 { 2145 inode->i_op = &fuse_common_inode_operations; 2146 } 2147 2148 void fuse_init_dir(struct inode *inode) 2149 { 2150 struct fuse_inode *fi = get_fuse_inode(inode); 2151 2152 inode->i_op = &fuse_dir_inode_operations; 2153 inode->i_fop = &fuse_dir_operations; 2154 2155 spin_lock_init(&fi->rdc.lock); 2156 fi->rdc.cached = false; 2157 fi->rdc.size = 0; 2158 fi->rdc.pos = 0; 2159 fi->rdc.version = 0; 2160 } 2161 2162 static int fuse_symlink_read_folio(struct file *null, struct folio *folio) 2163 { 2164 int err = fuse_readlink_page(folio->mapping->host, &folio->page); 2165 2166 if (!err) 2167 folio_mark_uptodate(folio); 2168 2169 folio_unlock(folio); 2170 2171 return err; 2172 } 2173 2174 static const struct address_space_operations fuse_symlink_aops = { 2175 .read_folio = fuse_symlink_read_folio, 2176 }; 2177 2178 void fuse_init_symlink(struct inode *inode) 2179 { 2180 inode->i_op = &fuse_symlink_inode_operations; 2181 inode->i_data.a_ops = &fuse_symlink_aops; 2182 inode_nohighmem(inode); 2183 } 2184