1 /* 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 7 */ 8 9 #include "fuse_i.h" 10 11 #include <linux/pagemap.h> 12 #include <linux/file.h> 13 #include <linux/fs_context.h> 14 #include <linux/moduleparam.h> 15 #include <linux/sched.h> 16 #include <linux/namei.h> 17 #include <linux/slab.h> 18 #include <linux/xattr.h> 19 #include <linux/iversion.h> 20 #include <linux/posix_acl.h> 21 #include <linux/security.h> 22 #include <linux/types.h> 23 #include <linux/kernel.h> 24 25 static bool __read_mostly allow_sys_admin_access; 26 module_param(allow_sys_admin_access, bool, 0644); 27 MODULE_PARM_DESC(allow_sys_admin_access, 28 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check"); 29 30 static void fuse_advise_use_readdirplus(struct inode *dir) 31 { 32 struct fuse_inode *fi = get_fuse_inode(dir); 33 34 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 35 } 36 37 #if BITS_PER_LONG >= 64 38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time) 39 { 40 entry->d_fsdata = (void *) time; 41 } 42 43 static inline u64 fuse_dentry_time(const struct dentry *entry) 44 { 45 return (u64)entry->d_fsdata; 46 } 47 48 #else 49 union fuse_dentry { 50 u64 time; 51 struct rcu_head rcu; 52 }; 53 54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time) 55 { 56 ((union fuse_dentry *) dentry->d_fsdata)->time = time; 57 } 58 59 static inline u64 fuse_dentry_time(const struct dentry *entry) 60 { 61 return ((union fuse_dentry *) entry->d_fsdata)->time; 62 } 63 #endif 64 65 static void fuse_dentry_settime(struct dentry *dentry, u64 time) 66 { 67 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 68 bool delete = !time && fc->delete_stale; 69 /* 70 * Mess with DCACHE_OP_DELETE because dput() will be faster without it. 71 * Don't care about races, either way it's just an optimization 72 */ 73 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) || 74 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) { 75 spin_lock(&dentry->d_lock); 76 if (!delete) 77 dentry->d_flags &= ~DCACHE_OP_DELETE; 78 else 79 dentry->d_flags |= DCACHE_OP_DELETE; 80 spin_unlock(&dentry->d_lock); 81 } 82 83 __fuse_dentry_settime(dentry, time); 84 } 85 86 /* 87 * FUSE caches dentries and attributes with separate timeout. The 88 * time in jiffies until the dentry/attributes are valid is stored in 89 * dentry->d_fsdata and fuse_inode->i_time respectively. 90 */ 91 92 /* 93 * Calculate the time in jiffies until a dentry/attributes are valid 94 */ 95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec) 96 { 97 if (sec || nsec) { 98 struct timespec64 ts = { 99 sec, 100 min_t(u32, nsec, NSEC_PER_SEC - 1) 101 }; 102 103 return get_jiffies_64() + timespec64_to_jiffies(&ts); 104 } else 105 return 0; 106 } 107 108 /* 109 * Set dentry and possibly attribute timeouts from the lookup/mk* 110 * replies 111 */ 112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 113 { 114 fuse_dentry_settime(entry, 115 fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); 116 } 117 118 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 119 { 120 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 121 } 122 123 /* 124 * Mark the attributes as stale, so that at the next call to 125 * ->getattr() they will be fetched from userspace 126 */ 127 void fuse_invalidate_attr(struct inode *inode) 128 { 129 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 130 } 131 132 static void fuse_dir_changed(struct inode *dir) 133 { 134 fuse_invalidate_attr(dir); 135 inode_maybe_inc_iversion(dir, false); 136 } 137 138 /* 139 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 140 * atime is not used. 141 */ 142 void fuse_invalidate_atime(struct inode *inode) 143 { 144 if (!IS_RDONLY(inode)) 145 fuse_invalidate_attr_mask(inode, STATX_ATIME); 146 } 147 148 /* 149 * Just mark the entry as stale, so that a next attempt to look it up 150 * will result in a new lookup call to userspace 151 * 152 * This is called when a dentry is about to become negative and the 153 * timeout is unknown (unlink, rmdir, rename and in some cases 154 * lookup) 155 */ 156 void fuse_invalidate_entry_cache(struct dentry *entry) 157 { 158 fuse_dentry_settime(entry, 0); 159 } 160 161 /* 162 * Same as fuse_invalidate_entry_cache(), but also try to remove the 163 * dentry from the hash 164 */ 165 static void fuse_invalidate_entry(struct dentry *entry) 166 { 167 d_invalidate(entry); 168 fuse_invalidate_entry_cache(entry); 169 } 170 171 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 172 u64 nodeid, const struct qstr *name, 173 struct fuse_entry_out *outarg) 174 { 175 memset(outarg, 0, sizeof(struct fuse_entry_out)); 176 args->opcode = FUSE_LOOKUP; 177 args->nodeid = nodeid; 178 args->in_numargs = 1; 179 args->in_args[0].size = name->len + 1; 180 args->in_args[0].value = name->name; 181 args->out_numargs = 1; 182 args->out_args[0].size = sizeof(struct fuse_entry_out); 183 args->out_args[0].value = outarg; 184 } 185 186 /* 187 * Check whether the dentry is still valid 188 * 189 * If the entry validity timeout has expired and the dentry is 190 * positive, try to redo the lookup. If the lookup results in a 191 * different inode, then let the VFS invalidate the dentry and redo 192 * the lookup once more. If the lookup results in the same inode, 193 * then refresh the attributes, timeouts and mark the dentry valid. 194 */ 195 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 196 { 197 struct inode *inode; 198 struct dentry *parent; 199 struct fuse_mount *fm; 200 struct fuse_inode *fi; 201 int ret; 202 203 inode = d_inode_rcu(entry); 204 if (inode && fuse_is_bad(inode)) 205 goto invalid; 206 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 207 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) { 208 struct fuse_entry_out outarg; 209 FUSE_ARGS(args); 210 struct fuse_forget_link *forget; 211 u64 attr_version; 212 213 /* For negative dentries, always do a fresh lookup */ 214 if (!inode) 215 goto invalid; 216 217 ret = -ECHILD; 218 if (flags & LOOKUP_RCU) 219 goto out; 220 221 fm = get_fuse_mount(inode); 222 223 forget = fuse_alloc_forget(); 224 ret = -ENOMEM; 225 if (!forget) 226 goto out; 227 228 attr_version = fuse_get_attr_version(fm->fc); 229 230 parent = dget_parent(entry); 231 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)), 232 &entry->d_name, &outarg); 233 ret = fuse_simple_request(fm, &args); 234 dput(parent); 235 /* Zero nodeid is same as -ENOENT */ 236 if (!ret && !outarg.nodeid) 237 ret = -ENOENT; 238 if (!ret) { 239 fi = get_fuse_inode(inode); 240 if (outarg.nodeid != get_node_id(inode) || 241 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) { 242 fuse_queue_forget(fm->fc, forget, 243 outarg.nodeid, 1); 244 goto invalid; 245 } 246 spin_lock(&fi->lock); 247 fi->nlookup++; 248 spin_unlock(&fi->lock); 249 } 250 kfree(forget); 251 if (ret == -ENOMEM || ret == -EINTR) 252 goto out; 253 if (ret || fuse_invalid_attr(&outarg.attr) || 254 fuse_stale_inode(inode, outarg.generation, &outarg.attr)) 255 goto invalid; 256 257 forget_all_cached_acls(inode); 258 fuse_change_attributes(inode, &outarg.attr, 259 ATTR_TIMEOUT(&outarg), 260 attr_version); 261 fuse_change_entry_timeout(entry, &outarg); 262 } else if (inode) { 263 fi = get_fuse_inode(inode); 264 if (flags & LOOKUP_RCU) { 265 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 266 return -ECHILD; 267 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 268 parent = dget_parent(entry); 269 fuse_advise_use_readdirplus(d_inode(parent)); 270 dput(parent); 271 } 272 } 273 ret = 1; 274 out: 275 return ret; 276 277 invalid: 278 ret = 0; 279 goto out; 280 } 281 282 #if BITS_PER_LONG < 64 283 static int fuse_dentry_init(struct dentry *dentry) 284 { 285 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), 286 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE); 287 288 return dentry->d_fsdata ? 0 : -ENOMEM; 289 } 290 static void fuse_dentry_release(struct dentry *dentry) 291 { 292 union fuse_dentry *fd = dentry->d_fsdata; 293 294 kfree_rcu(fd, rcu); 295 } 296 #endif 297 298 static int fuse_dentry_delete(const struct dentry *dentry) 299 { 300 return time_before64(fuse_dentry_time(dentry), get_jiffies_64()); 301 } 302 303 /* 304 * Create a fuse_mount object with a new superblock (with path->dentry 305 * as the root), and return that mount so it can be auto-mounted on 306 * @path. 307 */ 308 static struct vfsmount *fuse_dentry_automount(struct path *path) 309 { 310 struct fs_context *fsc; 311 struct vfsmount *mnt; 312 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry)); 313 314 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry); 315 if (IS_ERR(fsc)) 316 return ERR_CAST(fsc); 317 318 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */ 319 fsc->fs_private = mp_fi; 320 321 /* Create the submount */ 322 mnt = fc_mount(fsc); 323 if (!IS_ERR(mnt)) 324 mntget(mnt); 325 326 put_fs_context(fsc); 327 return mnt; 328 } 329 330 const struct dentry_operations fuse_dentry_operations = { 331 .d_revalidate = fuse_dentry_revalidate, 332 .d_delete = fuse_dentry_delete, 333 #if BITS_PER_LONG < 64 334 .d_init = fuse_dentry_init, 335 .d_release = fuse_dentry_release, 336 #endif 337 .d_automount = fuse_dentry_automount, 338 }; 339 340 const struct dentry_operations fuse_root_dentry_operations = { 341 #if BITS_PER_LONG < 64 342 .d_init = fuse_dentry_init, 343 .d_release = fuse_dentry_release, 344 #endif 345 }; 346 347 int fuse_valid_type(int m) 348 { 349 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 350 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 351 } 352 353 bool fuse_invalid_attr(struct fuse_attr *attr) 354 { 355 return !fuse_valid_type(attr->mode) || 356 attr->size > LLONG_MAX; 357 } 358 359 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 360 struct fuse_entry_out *outarg, struct inode **inode) 361 { 362 struct fuse_mount *fm = get_fuse_mount_super(sb); 363 FUSE_ARGS(args); 364 struct fuse_forget_link *forget; 365 u64 attr_version; 366 int err; 367 368 *inode = NULL; 369 err = -ENAMETOOLONG; 370 if (name->len > FUSE_NAME_MAX) 371 goto out; 372 373 374 forget = fuse_alloc_forget(); 375 err = -ENOMEM; 376 if (!forget) 377 goto out; 378 379 attr_version = fuse_get_attr_version(fm->fc); 380 381 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg); 382 err = fuse_simple_request(fm, &args); 383 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 384 if (err || !outarg->nodeid) 385 goto out_put_forget; 386 387 err = -EIO; 388 if (fuse_invalid_attr(&outarg->attr)) 389 goto out_put_forget; 390 391 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 392 &outarg->attr, ATTR_TIMEOUT(outarg), 393 attr_version); 394 err = -ENOMEM; 395 if (!*inode) { 396 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1); 397 goto out; 398 } 399 err = 0; 400 401 out_put_forget: 402 kfree(forget); 403 out: 404 return err; 405 } 406 407 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 408 unsigned int flags) 409 { 410 int err; 411 struct fuse_entry_out outarg; 412 struct inode *inode; 413 struct dentry *newent; 414 bool outarg_valid = true; 415 bool locked; 416 417 if (fuse_is_bad(dir)) 418 return ERR_PTR(-EIO); 419 420 locked = fuse_lock_inode(dir); 421 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 422 &outarg, &inode); 423 fuse_unlock_inode(dir, locked); 424 if (err == -ENOENT) { 425 outarg_valid = false; 426 err = 0; 427 } 428 if (err) 429 goto out_err; 430 431 err = -EIO; 432 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 433 goto out_iput; 434 435 newent = d_splice_alias(inode, entry); 436 err = PTR_ERR(newent); 437 if (IS_ERR(newent)) 438 goto out_err; 439 440 entry = newent ? newent : entry; 441 if (outarg_valid) 442 fuse_change_entry_timeout(entry, &outarg); 443 else 444 fuse_invalidate_entry_cache(entry); 445 446 if (inode) 447 fuse_advise_use_readdirplus(dir); 448 return newent; 449 450 out_iput: 451 iput(inode); 452 out_err: 453 return ERR_PTR(err); 454 } 455 456 static int get_security_context(struct dentry *entry, umode_t mode, 457 struct fuse_in_arg *ext) 458 { 459 struct fuse_secctx *fctx; 460 struct fuse_secctx_header *header; 461 void *ctx = NULL, *ptr; 462 u32 ctxlen, total_len = sizeof(*header); 463 int err, nr_ctx = 0; 464 const char *name; 465 size_t namelen; 466 467 err = security_dentry_init_security(entry, mode, &entry->d_name, 468 &name, &ctx, &ctxlen); 469 if (err) { 470 if (err != -EOPNOTSUPP) 471 goto out_err; 472 /* No LSM is supporting this security hook. Ignore error */ 473 ctxlen = 0; 474 ctx = NULL; 475 } 476 477 if (ctxlen) { 478 nr_ctx = 1; 479 namelen = strlen(name) + 1; 480 err = -EIO; 481 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) 482 goto out_err; 483 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); 484 } 485 486 err = -ENOMEM; 487 header = ptr = kzalloc(total_len, GFP_KERNEL); 488 if (!ptr) 489 goto out_err; 490 491 header->nr_secctx = nr_ctx; 492 header->size = total_len; 493 ptr += sizeof(*header); 494 if (nr_ctx) { 495 fctx = ptr; 496 fctx->size = ctxlen; 497 ptr += sizeof(*fctx); 498 499 strcpy(ptr, name); 500 ptr += namelen; 501 502 memcpy(ptr, ctx, ctxlen); 503 } 504 ext->size = total_len; 505 ext->value = header; 506 err = 0; 507 out_err: 508 kfree(ctx); 509 return err; 510 } 511 512 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes) 513 { 514 void *p; 515 u32 newlen = buf->size + bytes; 516 517 p = krealloc(buf->value, newlen, GFP_KERNEL); 518 if (!p) { 519 kfree(buf->value); 520 buf->size = 0; 521 buf->value = NULL; 522 return NULL; 523 } 524 525 memset(p + buf->size, 0, bytes); 526 buf->value = p; 527 buf->size = newlen; 528 529 return p + newlen - bytes; 530 } 531 532 static u32 fuse_ext_size(size_t size) 533 { 534 return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size); 535 } 536 537 /* 538 * This adds just a single supplementary group that matches the parent's group. 539 */ 540 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext) 541 { 542 struct fuse_conn *fc = get_fuse_conn(dir); 543 struct fuse_ext_header *xh; 544 struct fuse_supp_groups *sg; 545 kgid_t kgid = dir->i_gid; 546 gid_t parent_gid = from_kgid(fc->user_ns, kgid); 547 u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0])); 548 549 if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) || 550 !in_group_p(kgid)) 551 return 0; 552 553 xh = extend_arg(ext, sg_len); 554 if (!xh) 555 return -ENOMEM; 556 557 xh->size = sg_len; 558 xh->type = FUSE_EXT_GROUPS; 559 560 sg = (struct fuse_supp_groups *) &xh[1]; 561 sg->nr_groups = 1; 562 sg->groups[0] = parent_gid; 563 564 return 0; 565 } 566 567 static int get_create_ext(struct fuse_args *args, 568 struct inode *dir, struct dentry *dentry, 569 umode_t mode) 570 { 571 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 572 struct fuse_in_arg ext = { .size = 0, .value = NULL }; 573 int err = 0; 574 575 if (fc->init_security) 576 err = get_security_context(dentry, mode, &ext); 577 if (!err && fc->create_supp_group) 578 err = get_create_supp_group(dir, &ext); 579 580 if (!err && ext.size) { 581 WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args)); 582 args->is_ext = true; 583 args->ext_idx = args->in_numargs++; 584 args->in_args[args->ext_idx] = ext; 585 } else { 586 kfree(ext.value); 587 } 588 589 return err; 590 } 591 592 static void free_ext_value(struct fuse_args *args) 593 { 594 if (args->is_ext) 595 kfree(args->in_args[args->ext_idx].value); 596 } 597 598 /* 599 * Atomic create+open operation 600 * 601 * If the filesystem doesn't support this, then fall back to separate 602 * 'mknod' + 'open' requests. 603 */ 604 static int fuse_create_open(struct inode *dir, struct dentry *entry, 605 struct file *file, unsigned int flags, 606 umode_t mode, u32 opcode) 607 { 608 int err; 609 struct inode *inode; 610 struct fuse_mount *fm = get_fuse_mount(dir); 611 FUSE_ARGS(args); 612 struct fuse_forget_link *forget; 613 struct fuse_create_in inarg; 614 struct fuse_open_out outopen; 615 struct fuse_entry_out outentry; 616 struct fuse_inode *fi; 617 struct fuse_file *ff; 618 bool trunc = flags & O_TRUNC; 619 620 /* Userspace expects S_IFREG in create mode */ 621 BUG_ON((mode & S_IFMT) != S_IFREG); 622 623 forget = fuse_alloc_forget(); 624 err = -ENOMEM; 625 if (!forget) 626 goto out_err; 627 628 err = -ENOMEM; 629 ff = fuse_file_alloc(fm); 630 if (!ff) 631 goto out_put_forget_req; 632 633 if (!fm->fc->dont_mask) 634 mode &= ~current_umask(); 635 636 flags &= ~O_NOCTTY; 637 memset(&inarg, 0, sizeof(inarg)); 638 memset(&outentry, 0, sizeof(outentry)); 639 inarg.flags = flags; 640 inarg.mode = mode; 641 inarg.umask = current_umask(); 642 643 if (fm->fc->handle_killpriv_v2 && trunc && 644 !(flags & O_EXCL) && !capable(CAP_FSETID)) { 645 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID; 646 } 647 648 args.opcode = opcode; 649 args.nodeid = get_node_id(dir); 650 args.in_numargs = 2; 651 args.in_args[0].size = sizeof(inarg); 652 args.in_args[0].value = &inarg; 653 args.in_args[1].size = entry->d_name.len + 1; 654 args.in_args[1].value = entry->d_name.name; 655 args.out_numargs = 2; 656 args.out_args[0].size = sizeof(outentry); 657 args.out_args[0].value = &outentry; 658 args.out_args[1].size = sizeof(outopen); 659 args.out_args[1].value = &outopen; 660 661 err = get_create_ext(&args, dir, entry, mode); 662 if (err) 663 goto out_put_forget_req; 664 665 err = fuse_simple_request(fm, &args); 666 free_ext_value(&args); 667 if (err) 668 goto out_free_ff; 669 670 err = -EIO; 671 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) || 672 fuse_invalid_attr(&outentry.attr)) 673 goto out_free_ff; 674 675 ff->fh = outopen.fh; 676 ff->nodeid = outentry.nodeid; 677 ff->open_flags = outopen.open_flags; 678 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 679 &outentry.attr, ATTR_TIMEOUT(&outentry), 0); 680 if (!inode) { 681 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 682 fuse_sync_release(NULL, ff, flags); 683 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1); 684 err = -ENOMEM; 685 goto out_err; 686 } 687 kfree(forget); 688 d_instantiate(entry, inode); 689 fuse_change_entry_timeout(entry, &outentry); 690 fuse_dir_changed(dir); 691 err = finish_open(file, entry, generic_file_open); 692 if (err) { 693 fi = get_fuse_inode(inode); 694 fuse_sync_release(fi, ff, flags); 695 } else { 696 file->private_data = ff; 697 fuse_finish_open(inode, file); 698 if (fm->fc->atomic_o_trunc && trunc) 699 truncate_pagecache(inode, 0); 700 else if (!(ff->open_flags & FOPEN_KEEP_CACHE)) 701 invalidate_inode_pages2(inode->i_mapping); 702 } 703 return err; 704 705 out_free_ff: 706 fuse_file_free(ff); 707 out_put_forget_req: 708 kfree(forget); 709 out_err: 710 return err; 711 } 712 713 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *, 714 umode_t, dev_t); 715 static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 716 struct file *file, unsigned flags, 717 umode_t mode) 718 { 719 int err; 720 struct fuse_conn *fc = get_fuse_conn(dir); 721 struct dentry *res = NULL; 722 723 if (fuse_is_bad(dir)) 724 return -EIO; 725 726 if (d_in_lookup(entry)) { 727 res = fuse_lookup(dir, entry, 0); 728 if (IS_ERR(res)) 729 return PTR_ERR(res); 730 731 if (res) 732 entry = res; 733 } 734 735 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 736 goto no_open; 737 738 /* Only creates */ 739 file->f_mode |= FMODE_CREATED; 740 741 if (fc->no_create) 742 goto mknod; 743 744 err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE); 745 if (err == -ENOSYS) { 746 fc->no_create = 1; 747 goto mknod; 748 } 749 out_dput: 750 dput(res); 751 return err; 752 753 mknod: 754 err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 755 if (err) 756 goto out_dput; 757 no_open: 758 return finish_no_open(file, res); 759 } 760 761 /* 762 * Code shared between mknod, mkdir, symlink and link 763 */ 764 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args, 765 struct inode *dir, struct dentry *entry, 766 umode_t mode) 767 { 768 struct fuse_entry_out outarg; 769 struct inode *inode; 770 struct dentry *d; 771 int err; 772 struct fuse_forget_link *forget; 773 774 if (fuse_is_bad(dir)) 775 return -EIO; 776 777 forget = fuse_alloc_forget(); 778 if (!forget) 779 return -ENOMEM; 780 781 memset(&outarg, 0, sizeof(outarg)); 782 args->nodeid = get_node_id(dir); 783 args->out_numargs = 1; 784 args->out_args[0].size = sizeof(outarg); 785 args->out_args[0].value = &outarg; 786 787 if (args->opcode != FUSE_LINK) { 788 err = get_create_ext(args, dir, entry, mode); 789 if (err) 790 goto out_put_forget_req; 791 } 792 793 err = fuse_simple_request(fm, args); 794 free_ext_value(args); 795 if (err) 796 goto out_put_forget_req; 797 798 err = -EIO; 799 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr)) 800 goto out_put_forget_req; 801 802 if ((outarg.attr.mode ^ mode) & S_IFMT) 803 goto out_put_forget_req; 804 805 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 806 &outarg.attr, ATTR_TIMEOUT(&outarg), 0); 807 if (!inode) { 808 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1); 809 return -ENOMEM; 810 } 811 kfree(forget); 812 813 d_drop(entry); 814 d = d_splice_alias(inode, entry); 815 if (IS_ERR(d)) 816 return PTR_ERR(d); 817 818 if (d) { 819 fuse_change_entry_timeout(d, &outarg); 820 dput(d); 821 } else { 822 fuse_change_entry_timeout(entry, &outarg); 823 } 824 fuse_dir_changed(dir); 825 return 0; 826 827 out_put_forget_req: 828 kfree(forget); 829 return err; 830 } 831 832 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir, 833 struct dentry *entry, umode_t mode, dev_t rdev) 834 { 835 struct fuse_mknod_in inarg; 836 struct fuse_mount *fm = get_fuse_mount(dir); 837 FUSE_ARGS(args); 838 839 if (!fm->fc->dont_mask) 840 mode &= ~current_umask(); 841 842 memset(&inarg, 0, sizeof(inarg)); 843 inarg.mode = mode; 844 inarg.rdev = new_encode_dev(rdev); 845 inarg.umask = current_umask(); 846 args.opcode = FUSE_MKNOD; 847 args.in_numargs = 2; 848 args.in_args[0].size = sizeof(inarg); 849 args.in_args[0].value = &inarg; 850 args.in_args[1].size = entry->d_name.len + 1; 851 args.in_args[1].value = entry->d_name.name; 852 return create_new_entry(fm, &args, dir, entry, mode); 853 } 854 855 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir, 856 struct dentry *entry, umode_t mode, bool excl) 857 { 858 return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0); 859 } 860 861 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir, 862 struct file *file, umode_t mode) 863 { 864 struct fuse_conn *fc = get_fuse_conn(dir); 865 int err; 866 867 if (fc->no_tmpfile) 868 return -EOPNOTSUPP; 869 870 err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE); 871 if (err == -ENOSYS) { 872 fc->no_tmpfile = 1; 873 err = -EOPNOTSUPP; 874 } 875 return err; 876 } 877 878 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir, 879 struct dentry *entry, umode_t mode) 880 { 881 struct fuse_mkdir_in inarg; 882 struct fuse_mount *fm = get_fuse_mount(dir); 883 FUSE_ARGS(args); 884 885 if (!fm->fc->dont_mask) 886 mode &= ~current_umask(); 887 888 memset(&inarg, 0, sizeof(inarg)); 889 inarg.mode = mode; 890 inarg.umask = current_umask(); 891 args.opcode = FUSE_MKDIR; 892 args.in_numargs = 2; 893 args.in_args[0].size = sizeof(inarg); 894 args.in_args[0].value = &inarg; 895 args.in_args[1].size = entry->d_name.len + 1; 896 args.in_args[1].value = entry->d_name.name; 897 return create_new_entry(fm, &args, dir, entry, S_IFDIR); 898 } 899 900 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir, 901 struct dentry *entry, const char *link) 902 { 903 struct fuse_mount *fm = get_fuse_mount(dir); 904 unsigned len = strlen(link) + 1; 905 FUSE_ARGS(args); 906 907 args.opcode = FUSE_SYMLINK; 908 args.in_numargs = 2; 909 args.in_args[0].size = entry->d_name.len + 1; 910 args.in_args[0].value = entry->d_name.name; 911 args.in_args[1].size = len; 912 args.in_args[1].value = link; 913 return create_new_entry(fm, &args, dir, entry, S_IFLNK); 914 } 915 916 void fuse_flush_time_update(struct inode *inode) 917 { 918 int err = sync_inode_metadata(inode, 1); 919 920 mapping_set_error(inode->i_mapping, err); 921 } 922 923 static void fuse_update_ctime_in_cache(struct inode *inode) 924 { 925 if (!IS_NOCMTIME(inode)) { 926 inode->i_ctime = current_time(inode); 927 mark_inode_dirty_sync(inode); 928 fuse_flush_time_update(inode); 929 } 930 } 931 932 void fuse_update_ctime(struct inode *inode) 933 { 934 fuse_invalidate_attr_mask(inode, STATX_CTIME); 935 fuse_update_ctime_in_cache(inode); 936 } 937 938 static void fuse_entry_unlinked(struct dentry *entry) 939 { 940 struct inode *inode = d_inode(entry); 941 struct fuse_conn *fc = get_fuse_conn(inode); 942 struct fuse_inode *fi = get_fuse_inode(inode); 943 944 spin_lock(&fi->lock); 945 fi->attr_version = atomic64_inc_return(&fc->attr_version); 946 /* 947 * If i_nlink == 0 then unlink doesn't make sense, yet this can 948 * happen if userspace filesystem is careless. It would be 949 * difficult to enforce correct nlink usage so just ignore this 950 * condition here 951 */ 952 if (S_ISDIR(inode->i_mode)) 953 clear_nlink(inode); 954 else if (inode->i_nlink > 0) 955 drop_nlink(inode); 956 spin_unlock(&fi->lock); 957 fuse_invalidate_entry_cache(entry); 958 fuse_update_ctime(inode); 959 } 960 961 static int fuse_unlink(struct inode *dir, struct dentry *entry) 962 { 963 int err; 964 struct fuse_mount *fm = get_fuse_mount(dir); 965 FUSE_ARGS(args); 966 967 if (fuse_is_bad(dir)) 968 return -EIO; 969 970 args.opcode = FUSE_UNLINK; 971 args.nodeid = get_node_id(dir); 972 args.in_numargs = 1; 973 args.in_args[0].size = entry->d_name.len + 1; 974 args.in_args[0].value = entry->d_name.name; 975 err = fuse_simple_request(fm, &args); 976 if (!err) { 977 fuse_dir_changed(dir); 978 fuse_entry_unlinked(entry); 979 } else if (err == -EINTR) 980 fuse_invalidate_entry(entry); 981 return err; 982 } 983 984 static int fuse_rmdir(struct inode *dir, struct dentry *entry) 985 { 986 int err; 987 struct fuse_mount *fm = get_fuse_mount(dir); 988 FUSE_ARGS(args); 989 990 if (fuse_is_bad(dir)) 991 return -EIO; 992 993 args.opcode = FUSE_RMDIR; 994 args.nodeid = get_node_id(dir); 995 args.in_numargs = 1; 996 args.in_args[0].size = entry->d_name.len + 1; 997 args.in_args[0].value = entry->d_name.name; 998 err = fuse_simple_request(fm, &args); 999 if (!err) { 1000 fuse_dir_changed(dir); 1001 fuse_entry_unlinked(entry); 1002 } else if (err == -EINTR) 1003 fuse_invalidate_entry(entry); 1004 return err; 1005 } 1006 1007 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 1008 struct inode *newdir, struct dentry *newent, 1009 unsigned int flags, int opcode, size_t argsize) 1010 { 1011 int err; 1012 struct fuse_rename2_in inarg; 1013 struct fuse_mount *fm = get_fuse_mount(olddir); 1014 FUSE_ARGS(args); 1015 1016 memset(&inarg, 0, argsize); 1017 inarg.newdir = get_node_id(newdir); 1018 inarg.flags = flags; 1019 args.opcode = opcode; 1020 args.nodeid = get_node_id(olddir); 1021 args.in_numargs = 3; 1022 args.in_args[0].size = argsize; 1023 args.in_args[0].value = &inarg; 1024 args.in_args[1].size = oldent->d_name.len + 1; 1025 args.in_args[1].value = oldent->d_name.name; 1026 args.in_args[2].size = newent->d_name.len + 1; 1027 args.in_args[2].value = newent->d_name.name; 1028 err = fuse_simple_request(fm, &args); 1029 if (!err) { 1030 /* ctime changes */ 1031 fuse_update_ctime(d_inode(oldent)); 1032 1033 if (flags & RENAME_EXCHANGE) 1034 fuse_update_ctime(d_inode(newent)); 1035 1036 fuse_dir_changed(olddir); 1037 if (olddir != newdir) 1038 fuse_dir_changed(newdir); 1039 1040 /* newent will end up negative */ 1041 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) 1042 fuse_entry_unlinked(newent); 1043 } else if (err == -EINTR) { 1044 /* If request was interrupted, DEITY only knows if the 1045 rename actually took place. If the invalidation 1046 fails (e.g. some process has CWD under the renamed 1047 directory), then there can be inconsistency between 1048 the dcache and the real filesystem. Tough luck. */ 1049 fuse_invalidate_entry(oldent); 1050 if (d_really_is_positive(newent)) 1051 fuse_invalidate_entry(newent); 1052 } 1053 1054 return err; 1055 } 1056 1057 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir, 1058 struct dentry *oldent, struct inode *newdir, 1059 struct dentry *newent, unsigned int flags) 1060 { 1061 struct fuse_conn *fc = get_fuse_conn(olddir); 1062 int err; 1063 1064 if (fuse_is_bad(olddir)) 1065 return -EIO; 1066 1067 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT)) 1068 return -EINVAL; 1069 1070 if (flags) { 1071 if (fc->no_rename2 || fc->minor < 23) 1072 return -EINVAL; 1073 1074 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 1075 FUSE_RENAME2, 1076 sizeof(struct fuse_rename2_in)); 1077 if (err == -ENOSYS) { 1078 fc->no_rename2 = 1; 1079 err = -EINVAL; 1080 } 1081 } else { 1082 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 1083 FUSE_RENAME, 1084 sizeof(struct fuse_rename_in)); 1085 } 1086 1087 return err; 1088 } 1089 1090 static int fuse_link(struct dentry *entry, struct inode *newdir, 1091 struct dentry *newent) 1092 { 1093 int err; 1094 struct fuse_link_in inarg; 1095 struct inode *inode = d_inode(entry); 1096 struct fuse_mount *fm = get_fuse_mount(inode); 1097 FUSE_ARGS(args); 1098 1099 memset(&inarg, 0, sizeof(inarg)); 1100 inarg.oldnodeid = get_node_id(inode); 1101 args.opcode = FUSE_LINK; 1102 args.in_numargs = 2; 1103 args.in_args[0].size = sizeof(inarg); 1104 args.in_args[0].value = &inarg; 1105 args.in_args[1].size = newent->d_name.len + 1; 1106 args.in_args[1].value = newent->d_name.name; 1107 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode); 1108 if (!err) 1109 fuse_update_ctime_in_cache(inode); 1110 else if (err == -EINTR) 1111 fuse_invalidate_attr(inode); 1112 1113 return err; 1114 } 1115 1116 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1117 struct kstat *stat) 1118 { 1119 unsigned int blkbits; 1120 struct fuse_conn *fc = get_fuse_conn(inode); 1121 1122 stat->dev = inode->i_sb->s_dev; 1123 stat->ino = attr->ino; 1124 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1125 stat->nlink = attr->nlink; 1126 stat->uid = make_kuid(fc->user_ns, attr->uid); 1127 stat->gid = make_kgid(fc->user_ns, attr->gid); 1128 stat->rdev = inode->i_rdev; 1129 stat->atime.tv_sec = attr->atime; 1130 stat->atime.tv_nsec = attr->atimensec; 1131 stat->mtime.tv_sec = attr->mtime; 1132 stat->mtime.tv_nsec = attr->mtimensec; 1133 stat->ctime.tv_sec = attr->ctime; 1134 stat->ctime.tv_nsec = attr->ctimensec; 1135 stat->size = attr->size; 1136 stat->blocks = attr->blocks; 1137 1138 if (attr->blksize != 0) 1139 blkbits = ilog2(attr->blksize); 1140 else 1141 blkbits = inode->i_sb->s_blocksize_bits; 1142 1143 stat->blksize = 1 << blkbits; 1144 } 1145 1146 static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1147 struct file *file) 1148 { 1149 int err; 1150 struct fuse_getattr_in inarg; 1151 struct fuse_attr_out outarg; 1152 struct fuse_mount *fm = get_fuse_mount(inode); 1153 FUSE_ARGS(args); 1154 u64 attr_version; 1155 1156 attr_version = fuse_get_attr_version(fm->fc); 1157 1158 memset(&inarg, 0, sizeof(inarg)); 1159 memset(&outarg, 0, sizeof(outarg)); 1160 /* Directories have separate file-handle space */ 1161 if (file && S_ISREG(inode->i_mode)) { 1162 struct fuse_file *ff = file->private_data; 1163 1164 inarg.getattr_flags |= FUSE_GETATTR_FH; 1165 inarg.fh = ff->fh; 1166 } 1167 args.opcode = FUSE_GETATTR; 1168 args.nodeid = get_node_id(inode); 1169 args.in_numargs = 1; 1170 args.in_args[0].size = sizeof(inarg); 1171 args.in_args[0].value = &inarg; 1172 args.out_numargs = 1; 1173 args.out_args[0].size = sizeof(outarg); 1174 args.out_args[0].value = &outarg; 1175 err = fuse_simple_request(fm, &args); 1176 if (!err) { 1177 if (fuse_invalid_attr(&outarg.attr) || 1178 inode_wrong_type(inode, outarg.attr.mode)) { 1179 fuse_make_bad(inode); 1180 err = -EIO; 1181 } else { 1182 fuse_change_attributes(inode, &outarg.attr, 1183 ATTR_TIMEOUT(&outarg), 1184 attr_version); 1185 if (stat) 1186 fuse_fillattr(inode, &outarg.attr, stat); 1187 } 1188 } 1189 return err; 1190 } 1191 1192 static int fuse_update_get_attr(struct inode *inode, struct file *file, 1193 struct kstat *stat, u32 request_mask, 1194 unsigned int flags) 1195 { 1196 struct fuse_inode *fi = get_fuse_inode(inode); 1197 int err = 0; 1198 bool sync; 1199 u32 inval_mask = READ_ONCE(fi->inval_mask); 1200 u32 cache_mask = fuse_get_cache_mask(inode); 1201 1202 /* FUSE only supports basic stats */ 1203 request_mask &= STATX_BASIC_STATS; 1204 1205 if (!request_mask) 1206 sync = false; 1207 else if (flags & AT_STATX_FORCE_SYNC) 1208 sync = true; 1209 else if (flags & AT_STATX_DONT_SYNC) 1210 sync = false; 1211 else if (request_mask & inval_mask & ~cache_mask) 1212 sync = true; 1213 else 1214 sync = time_before64(fi->i_time, get_jiffies_64()); 1215 1216 if (sync) { 1217 forget_all_cached_acls(inode); 1218 err = fuse_do_getattr(inode, stat, file); 1219 } else if (stat) { 1220 generic_fillattr(&nop_mnt_idmap, inode, stat); 1221 stat->mode = fi->orig_i_mode; 1222 stat->ino = fi->orig_ino; 1223 } 1224 1225 return err; 1226 } 1227 1228 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) 1229 { 1230 return fuse_update_get_attr(inode, file, NULL, mask, 0); 1231 } 1232 1233 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, 1234 u64 child_nodeid, struct qstr *name, u32 flags) 1235 { 1236 int err = -ENOTDIR; 1237 struct inode *parent; 1238 struct dentry *dir; 1239 struct dentry *entry; 1240 1241 parent = fuse_ilookup(fc, parent_nodeid, NULL); 1242 if (!parent) 1243 return -ENOENT; 1244 1245 inode_lock_nested(parent, I_MUTEX_PARENT); 1246 if (!S_ISDIR(parent->i_mode)) 1247 goto unlock; 1248 1249 err = -ENOENT; 1250 dir = d_find_alias(parent); 1251 if (!dir) 1252 goto unlock; 1253 1254 name->hash = full_name_hash(dir, name->name, name->len); 1255 entry = d_lookup(dir, name); 1256 dput(dir); 1257 if (!entry) 1258 goto unlock; 1259 1260 fuse_dir_changed(parent); 1261 if (!(flags & FUSE_EXPIRE_ONLY)) 1262 d_invalidate(entry); 1263 fuse_invalidate_entry_cache(entry); 1264 1265 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1266 inode_lock(d_inode(entry)); 1267 if (get_node_id(d_inode(entry)) != child_nodeid) { 1268 err = -ENOENT; 1269 goto badentry; 1270 } 1271 if (d_mountpoint(entry)) { 1272 err = -EBUSY; 1273 goto badentry; 1274 } 1275 if (d_is_dir(entry)) { 1276 shrink_dcache_parent(entry); 1277 if (!simple_empty(entry)) { 1278 err = -ENOTEMPTY; 1279 goto badentry; 1280 } 1281 d_inode(entry)->i_flags |= S_DEAD; 1282 } 1283 dont_mount(entry); 1284 clear_nlink(d_inode(entry)); 1285 err = 0; 1286 badentry: 1287 inode_unlock(d_inode(entry)); 1288 if (!err) 1289 d_delete(entry); 1290 } else { 1291 err = 0; 1292 } 1293 dput(entry); 1294 1295 unlock: 1296 inode_unlock(parent); 1297 iput(parent); 1298 return err; 1299 } 1300 1301 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc) 1302 { 1303 const struct cred *cred = current_cred(); 1304 1305 return (uid_eq(cred->euid, fc->user_id) && 1306 uid_eq(cred->suid, fc->user_id) && 1307 uid_eq(cred->uid, fc->user_id) && 1308 gid_eq(cred->egid, fc->group_id) && 1309 gid_eq(cred->sgid, fc->group_id) && 1310 gid_eq(cred->gid, fc->group_id)); 1311 } 1312 1313 /* 1314 * Calling into a user-controlled filesystem gives the filesystem 1315 * daemon ptrace-like capabilities over the current process. This 1316 * means, that the filesystem daemon is able to record the exact 1317 * filesystem operations performed, and can also control the behavior 1318 * of the requester process in otherwise impossible ways. For example 1319 * it can delay the operation for arbitrary length of time allowing 1320 * DoS against the requester. 1321 * 1322 * For this reason only those processes can call into the filesystem, 1323 * for which the owner of the mount has ptrace privilege. This 1324 * excludes processes started by other users, suid or sgid processes. 1325 */ 1326 bool fuse_allow_current_process(struct fuse_conn *fc) 1327 { 1328 bool allow; 1329 1330 if (fc->allow_other) 1331 allow = current_in_userns(fc->user_ns); 1332 else 1333 allow = fuse_permissible_uidgid(fc); 1334 1335 if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN)) 1336 allow = true; 1337 1338 return allow; 1339 } 1340 1341 static int fuse_access(struct inode *inode, int mask) 1342 { 1343 struct fuse_mount *fm = get_fuse_mount(inode); 1344 FUSE_ARGS(args); 1345 struct fuse_access_in inarg; 1346 int err; 1347 1348 BUG_ON(mask & MAY_NOT_BLOCK); 1349 1350 if (fm->fc->no_access) 1351 return 0; 1352 1353 memset(&inarg, 0, sizeof(inarg)); 1354 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1355 args.opcode = FUSE_ACCESS; 1356 args.nodeid = get_node_id(inode); 1357 args.in_numargs = 1; 1358 args.in_args[0].size = sizeof(inarg); 1359 args.in_args[0].value = &inarg; 1360 err = fuse_simple_request(fm, &args); 1361 if (err == -ENOSYS) { 1362 fm->fc->no_access = 1; 1363 err = 0; 1364 } 1365 return err; 1366 } 1367 1368 static int fuse_perm_getattr(struct inode *inode, int mask) 1369 { 1370 if (mask & MAY_NOT_BLOCK) 1371 return -ECHILD; 1372 1373 forget_all_cached_acls(inode); 1374 return fuse_do_getattr(inode, NULL, NULL); 1375 } 1376 1377 /* 1378 * Check permission. The two basic access models of FUSE are: 1379 * 1380 * 1) Local access checking ('default_permissions' mount option) based 1381 * on file mode. This is the plain old disk filesystem permission 1382 * modell. 1383 * 1384 * 2) "Remote" access checking, where server is responsible for 1385 * checking permission in each inode operation. An exception to this 1386 * is if ->permission() was invoked from sys_access() in which case an 1387 * access request is sent. Execute permission is still checked 1388 * locally based on file mode. 1389 */ 1390 static int fuse_permission(struct mnt_idmap *idmap, 1391 struct inode *inode, int mask) 1392 { 1393 struct fuse_conn *fc = get_fuse_conn(inode); 1394 bool refreshed = false; 1395 int err = 0; 1396 1397 if (fuse_is_bad(inode)) 1398 return -EIO; 1399 1400 if (!fuse_allow_current_process(fc)) 1401 return -EACCES; 1402 1403 /* 1404 * If attributes are needed, refresh them before proceeding 1405 */ 1406 if (fc->default_permissions || 1407 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1408 struct fuse_inode *fi = get_fuse_inode(inode); 1409 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1410 1411 if (perm_mask & READ_ONCE(fi->inval_mask) || 1412 time_before64(fi->i_time, get_jiffies_64())) { 1413 refreshed = true; 1414 1415 err = fuse_perm_getattr(inode, mask); 1416 if (err) 1417 return err; 1418 } 1419 } 1420 1421 if (fc->default_permissions) { 1422 err = generic_permission(&nop_mnt_idmap, inode, mask); 1423 1424 /* If permission is denied, try to refresh file 1425 attributes. This is also needed, because the root 1426 node will at first have no permissions */ 1427 if (err == -EACCES && !refreshed) { 1428 err = fuse_perm_getattr(inode, mask); 1429 if (!err) 1430 err = generic_permission(&nop_mnt_idmap, 1431 inode, mask); 1432 } 1433 1434 /* Note: the opposite of the above test does not 1435 exist. So if permissions are revoked this won't be 1436 noticed immediately, only after the attribute 1437 timeout has expired */ 1438 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1439 err = fuse_access(inode, mask); 1440 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1441 if (!(inode->i_mode & S_IXUGO)) { 1442 if (refreshed) 1443 return -EACCES; 1444 1445 err = fuse_perm_getattr(inode, mask); 1446 if (!err && !(inode->i_mode & S_IXUGO)) 1447 return -EACCES; 1448 } 1449 } 1450 return err; 1451 } 1452 1453 static int fuse_readlink_page(struct inode *inode, struct page *page) 1454 { 1455 struct fuse_mount *fm = get_fuse_mount(inode); 1456 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 }; 1457 struct fuse_args_pages ap = { 1458 .num_pages = 1, 1459 .pages = &page, 1460 .descs = &desc, 1461 }; 1462 char *link; 1463 ssize_t res; 1464 1465 ap.args.opcode = FUSE_READLINK; 1466 ap.args.nodeid = get_node_id(inode); 1467 ap.args.out_pages = true; 1468 ap.args.out_argvar = true; 1469 ap.args.page_zeroing = true; 1470 ap.args.out_numargs = 1; 1471 ap.args.out_args[0].size = desc.length; 1472 res = fuse_simple_request(fm, &ap.args); 1473 1474 fuse_invalidate_atime(inode); 1475 1476 if (res < 0) 1477 return res; 1478 1479 if (WARN_ON(res >= PAGE_SIZE)) 1480 return -EIO; 1481 1482 link = page_address(page); 1483 link[res] = '\0'; 1484 1485 return 0; 1486 } 1487 1488 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1489 struct delayed_call *callback) 1490 { 1491 struct fuse_conn *fc = get_fuse_conn(inode); 1492 struct page *page; 1493 int err; 1494 1495 err = -EIO; 1496 if (fuse_is_bad(inode)) 1497 goto out_err; 1498 1499 if (fc->cache_symlinks) 1500 return page_get_link(dentry, inode, callback); 1501 1502 err = -ECHILD; 1503 if (!dentry) 1504 goto out_err; 1505 1506 page = alloc_page(GFP_KERNEL); 1507 err = -ENOMEM; 1508 if (!page) 1509 goto out_err; 1510 1511 err = fuse_readlink_page(inode, page); 1512 if (err) { 1513 __free_page(page); 1514 goto out_err; 1515 } 1516 1517 set_delayed_call(callback, page_put_link, page); 1518 1519 return page_address(page); 1520 1521 out_err: 1522 return ERR_PTR(err); 1523 } 1524 1525 static int fuse_dir_open(struct inode *inode, struct file *file) 1526 { 1527 return fuse_open_common(inode, file, true); 1528 } 1529 1530 static int fuse_dir_release(struct inode *inode, struct file *file) 1531 { 1532 fuse_release_common(file, true); 1533 1534 return 0; 1535 } 1536 1537 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1538 int datasync) 1539 { 1540 struct inode *inode = file->f_mapping->host; 1541 struct fuse_conn *fc = get_fuse_conn(inode); 1542 int err; 1543 1544 if (fuse_is_bad(inode)) 1545 return -EIO; 1546 1547 if (fc->no_fsyncdir) 1548 return 0; 1549 1550 inode_lock(inode); 1551 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1552 if (err == -ENOSYS) { 1553 fc->no_fsyncdir = 1; 1554 err = 0; 1555 } 1556 inode_unlock(inode); 1557 1558 return err; 1559 } 1560 1561 static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1562 unsigned long arg) 1563 { 1564 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1565 1566 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1567 if (fc->minor < 18) 1568 return -ENOTTY; 1569 1570 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1571 } 1572 1573 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1574 unsigned long arg) 1575 { 1576 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1577 1578 if (fc->minor < 18) 1579 return -ENOTTY; 1580 1581 return fuse_ioctl_common(file, cmd, arg, 1582 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1583 } 1584 1585 static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1586 { 1587 /* Always update if mtime is explicitly set */ 1588 if (ivalid & ATTR_MTIME_SET) 1589 return true; 1590 1591 /* Or if kernel i_mtime is the official one */ 1592 if (trust_local_mtime) 1593 return true; 1594 1595 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1596 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1597 return false; 1598 1599 /* In all other cases update */ 1600 return true; 1601 } 1602 1603 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1604 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1605 { 1606 unsigned ivalid = iattr->ia_valid; 1607 1608 if (ivalid & ATTR_MODE) 1609 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1610 if (ivalid & ATTR_UID) 1611 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1612 if (ivalid & ATTR_GID) 1613 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1614 if (ivalid & ATTR_SIZE) 1615 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1616 if (ivalid & ATTR_ATIME) { 1617 arg->valid |= FATTR_ATIME; 1618 arg->atime = iattr->ia_atime.tv_sec; 1619 arg->atimensec = iattr->ia_atime.tv_nsec; 1620 if (!(ivalid & ATTR_ATIME_SET)) 1621 arg->valid |= FATTR_ATIME_NOW; 1622 } 1623 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1624 arg->valid |= FATTR_MTIME; 1625 arg->mtime = iattr->ia_mtime.tv_sec; 1626 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1627 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1628 arg->valid |= FATTR_MTIME_NOW; 1629 } 1630 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1631 arg->valid |= FATTR_CTIME; 1632 arg->ctime = iattr->ia_ctime.tv_sec; 1633 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1634 } 1635 } 1636 1637 /* 1638 * Prevent concurrent writepages on inode 1639 * 1640 * This is done by adding a negative bias to the inode write counter 1641 * and waiting for all pending writes to finish. 1642 */ 1643 void fuse_set_nowrite(struct inode *inode) 1644 { 1645 struct fuse_inode *fi = get_fuse_inode(inode); 1646 1647 BUG_ON(!inode_is_locked(inode)); 1648 1649 spin_lock(&fi->lock); 1650 BUG_ON(fi->writectr < 0); 1651 fi->writectr += FUSE_NOWRITE; 1652 spin_unlock(&fi->lock); 1653 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1654 } 1655 1656 /* 1657 * Allow writepages on inode 1658 * 1659 * Remove the bias from the writecounter and send any queued 1660 * writepages. 1661 */ 1662 static void __fuse_release_nowrite(struct inode *inode) 1663 { 1664 struct fuse_inode *fi = get_fuse_inode(inode); 1665 1666 BUG_ON(fi->writectr != FUSE_NOWRITE); 1667 fi->writectr = 0; 1668 fuse_flush_writepages(inode); 1669 } 1670 1671 void fuse_release_nowrite(struct inode *inode) 1672 { 1673 struct fuse_inode *fi = get_fuse_inode(inode); 1674 1675 spin_lock(&fi->lock); 1676 __fuse_release_nowrite(inode); 1677 spin_unlock(&fi->lock); 1678 } 1679 1680 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1681 struct inode *inode, 1682 struct fuse_setattr_in *inarg_p, 1683 struct fuse_attr_out *outarg_p) 1684 { 1685 args->opcode = FUSE_SETATTR; 1686 args->nodeid = get_node_id(inode); 1687 args->in_numargs = 1; 1688 args->in_args[0].size = sizeof(*inarg_p); 1689 args->in_args[0].value = inarg_p; 1690 args->out_numargs = 1; 1691 args->out_args[0].size = sizeof(*outarg_p); 1692 args->out_args[0].value = outarg_p; 1693 } 1694 1695 /* 1696 * Flush inode->i_mtime to the server 1697 */ 1698 int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1699 { 1700 struct fuse_mount *fm = get_fuse_mount(inode); 1701 FUSE_ARGS(args); 1702 struct fuse_setattr_in inarg; 1703 struct fuse_attr_out outarg; 1704 1705 memset(&inarg, 0, sizeof(inarg)); 1706 memset(&outarg, 0, sizeof(outarg)); 1707 1708 inarg.valid = FATTR_MTIME; 1709 inarg.mtime = inode->i_mtime.tv_sec; 1710 inarg.mtimensec = inode->i_mtime.tv_nsec; 1711 if (fm->fc->minor >= 23) { 1712 inarg.valid |= FATTR_CTIME; 1713 inarg.ctime = inode->i_ctime.tv_sec; 1714 inarg.ctimensec = inode->i_ctime.tv_nsec; 1715 } 1716 if (ff) { 1717 inarg.valid |= FATTR_FH; 1718 inarg.fh = ff->fh; 1719 } 1720 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg); 1721 1722 return fuse_simple_request(fm, &args); 1723 } 1724 1725 /* 1726 * Set attributes, and at the same time refresh them. 1727 * 1728 * Truncation is slightly complicated, because the 'truncate' request 1729 * may fail, in which case we don't want to touch the mapping. 1730 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1731 * and the actual truncation by hand. 1732 */ 1733 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1734 struct file *file) 1735 { 1736 struct inode *inode = d_inode(dentry); 1737 struct fuse_mount *fm = get_fuse_mount(inode); 1738 struct fuse_conn *fc = fm->fc; 1739 struct fuse_inode *fi = get_fuse_inode(inode); 1740 struct address_space *mapping = inode->i_mapping; 1741 FUSE_ARGS(args); 1742 struct fuse_setattr_in inarg; 1743 struct fuse_attr_out outarg; 1744 bool is_truncate = false; 1745 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode); 1746 loff_t oldsize; 1747 int err; 1748 bool trust_local_cmtime = is_wb; 1749 bool fault_blocked = false; 1750 1751 if (!fc->default_permissions) 1752 attr->ia_valid |= ATTR_FORCE; 1753 1754 err = setattr_prepare(&nop_mnt_idmap, dentry, attr); 1755 if (err) 1756 return err; 1757 1758 if (attr->ia_valid & ATTR_SIZE) { 1759 if (WARN_ON(!S_ISREG(inode->i_mode))) 1760 return -EIO; 1761 is_truncate = true; 1762 } 1763 1764 if (FUSE_IS_DAX(inode) && is_truncate) { 1765 filemap_invalidate_lock(mapping); 1766 fault_blocked = true; 1767 err = fuse_dax_break_layouts(inode, 0, 0); 1768 if (err) { 1769 filemap_invalidate_unlock(mapping); 1770 return err; 1771 } 1772 } 1773 1774 if (attr->ia_valid & ATTR_OPEN) { 1775 /* This is coming from open(..., ... | O_TRUNC); */ 1776 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1777 WARN_ON(attr->ia_size != 0); 1778 if (fc->atomic_o_trunc) { 1779 /* 1780 * No need to send request to userspace, since actual 1781 * truncation has already been done by OPEN. But still 1782 * need to truncate page cache. 1783 */ 1784 i_size_write(inode, 0); 1785 truncate_pagecache(inode, 0); 1786 goto out; 1787 } 1788 file = NULL; 1789 } 1790 1791 /* Flush dirty data/metadata before non-truncate SETATTR */ 1792 if (is_wb && 1793 attr->ia_valid & 1794 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET | 1795 ATTR_TIMES_SET)) { 1796 err = write_inode_now(inode, true); 1797 if (err) 1798 return err; 1799 1800 fuse_set_nowrite(inode); 1801 fuse_release_nowrite(inode); 1802 } 1803 1804 if (is_truncate) { 1805 fuse_set_nowrite(inode); 1806 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1807 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1808 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1809 } 1810 1811 memset(&inarg, 0, sizeof(inarg)); 1812 memset(&outarg, 0, sizeof(outarg)); 1813 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1814 if (file) { 1815 struct fuse_file *ff = file->private_data; 1816 inarg.valid |= FATTR_FH; 1817 inarg.fh = ff->fh; 1818 } 1819 1820 /* Kill suid/sgid for non-directory chown unconditionally */ 1821 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) && 1822 attr->ia_valid & (ATTR_UID | ATTR_GID)) 1823 inarg.valid |= FATTR_KILL_SUIDGID; 1824 1825 if (attr->ia_valid & ATTR_SIZE) { 1826 /* For mandatory locking in truncate */ 1827 inarg.valid |= FATTR_LOCKOWNER; 1828 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1829 1830 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 1831 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID)) 1832 inarg.valid |= FATTR_KILL_SUIDGID; 1833 } 1834 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1835 err = fuse_simple_request(fm, &args); 1836 if (err) { 1837 if (err == -EINTR) 1838 fuse_invalidate_attr(inode); 1839 goto error; 1840 } 1841 1842 if (fuse_invalid_attr(&outarg.attr) || 1843 inode_wrong_type(inode, outarg.attr.mode)) { 1844 fuse_make_bad(inode); 1845 err = -EIO; 1846 goto error; 1847 } 1848 1849 spin_lock(&fi->lock); 1850 /* the kernel maintains i_mtime locally */ 1851 if (trust_local_cmtime) { 1852 if (attr->ia_valid & ATTR_MTIME) 1853 inode->i_mtime = attr->ia_mtime; 1854 if (attr->ia_valid & ATTR_CTIME) 1855 inode->i_ctime = attr->ia_ctime; 1856 /* FIXME: clear I_DIRTY_SYNC? */ 1857 } 1858 1859 fuse_change_attributes_common(inode, &outarg.attr, 1860 ATTR_TIMEOUT(&outarg), 1861 fuse_get_cache_mask(inode)); 1862 oldsize = inode->i_size; 1863 /* see the comment in fuse_change_attributes() */ 1864 if (!is_wb || is_truncate) 1865 i_size_write(inode, outarg.attr.size); 1866 1867 if (is_truncate) { 1868 /* NOTE: this may release/reacquire fi->lock */ 1869 __fuse_release_nowrite(inode); 1870 } 1871 spin_unlock(&fi->lock); 1872 1873 /* 1874 * Only call invalidate_inode_pages2() after removing 1875 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock. 1876 */ 1877 if ((is_truncate || !is_wb) && 1878 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 1879 truncate_pagecache(inode, outarg.attr.size); 1880 invalidate_inode_pages2(mapping); 1881 } 1882 1883 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1884 out: 1885 if (fault_blocked) 1886 filemap_invalidate_unlock(mapping); 1887 1888 return 0; 1889 1890 error: 1891 if (is_truncate) 1892 fuse_release_nowrite(inode); 1893 1894 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1895 1896 if (fault_blocked) 1897 filemap_invalidate_unlock(mapping); 1898 return err; 1899 } 1900 1901 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry, 1902 struct iattr *attr) 1903 { 1904 struct inode *inode = d_inode(entry); 1905 struct fuse_conn *fc = get_fuse_conn(inode); 1906 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 1907 int ret; 1908 1909 if (fuse_is_bad(inode)) 1910 return -EIO; 1911 1912 if (!fuse_allow_current_process(get_fuse_conn(inode))) 1913 return -EACCES; 1914 1915 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 1916 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 1917 ATTR_MODE); 1918 1919 /* 1920 * The only sane way to reliably kill suid/sgid is to do it in 1921 * the userspace filesystem 1922 * 1923 * This should be done on write(), truncate() and chown(). 1924 */ 1925 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) { 1926 /* 1927 * ia_mode calculation may have used stale i_mode. 1928 * Refresh and recalculate. 1929 */ 1930 ret = fuse_do_getattr(inode, NULL, file); 1931 if (ret) 1932 return ret; 1933 1934 attr->ia_mode = inode->i_mode; 1935 if (inode->i_mode & S_ISUID) { 1936 attr->ia_valid |= ATTR_MODE; 1937 attr->ia_mode &= ~S_ISUID; 1938 } 1939 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 1940 attr->ia_valid |= ATTR_MODE; 1941 attr->ia_mode &= ~S_ISGID; 1942 } 1943 } 1944 } 1945 if (!attr->ia_valid) 1946 return 0; 1947 1948 ret = fuse_do_setattr(entry, attr, file); 1949 if (!ret) { 1950 /* 1951 * If filesystem supports acls it may have updated acl xattrs in 1952 * the filesystem, so forget cached acls for the inode. 1953 */ 1954 if (fc->posix_acl) 1955 forget_all_cached_acls(inode); 1956 1957 /* Directory mode changed, may need to revalidate access */ 1958 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 1959 fuse_invalidate_entry_cache(entry); 1960 } 1961 return ret; 1962 } 1963 1964 static int fuse_getattr(struct mnt_idmap *idmap, 1965 const struct path *path, struct kstat *stat, 1966 u32 request_mask, unsigned int flags) 1967 { 1968 struct inode *inode = d_inode(path->dentry); 1969 struct fuse_conn *fc = get_fuse_conn(inode); 1970 1971 if (fuse_is_bad(inode)) 1972 return -EIO; 1973 1974 if (!fuse_allow_current_process(fc)) { 1975 if (!request_mask) { 1976 /* 1977 * If user explicitly requested *nothing* then don't 1978 * error out, but return st_dev only. 1979 */ 1980 stat->result_mask = 0; 1981 stat->dev = inode->i_sb->s_dev; 1982 return 0; 1983 } 1984 return -EACCES; 1985 } 1986 1987 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 1988 } 1989 1990 static const struct inode_operations fuse_dir_inode_operations = { 1991 .lookup = fuse_lookup, 1992 .mkdir = fuse_mkdir, 1993 .symlink = fuse_symlink, 1994 .unlink = fuse_unlink, 1995 .rmdir = fuse_rmdir, 1996 .rename = fuse_rename2, 1997 .link = fuse_link, 1998 .setattr = fuse_setattr, 1999 .create = fuse_create, 2000 .atomic_open = fuse_atomic_open, 2001 .tmpfile = fuse_tmpfile, 2002 .mknod = fuse_mknod, 2003 .permission = fuse_permission, 2004 .getattr = fuse_getattr, 2005 .listxattr = fuse_listxattr, 2006 .get_inode_acl = fuse_get_inode_acl, 2007 .get_acl = fuse_get_acl, 2008 .set_acl = fuse_set_acl, 2009 .fileattr_get = fuse_fileattr_get, 2010 .fileattr_set = fuse_fileattr_set, 2011 }; 2012 2013 static const struct file_operations fuse_dir_operations = { 2014 .llseek = generic_file_llseek, 2015 .read = generic_read_dir, 2016 .iterate_shared = fuse_readdir, 2017 .open = fuse_dir_open, 2018 .release = fuse_dir_release, 2019 .fsync = fuse_dir_fsync, 2020 .unlocked_ioctl = fuse_dir_ioctl, 2021 .compat_ioctl = fuse_dir_compat_ioctl, 2022 }; 2023 2024 static const struct inode_operations fuse_common_inode_operations = { 2025 .setattr = fuse_setattr, 2026 .permission = fuse_permission, 2027 .getattr = fuse_getattr, 2028 .listxattr = fuse_listxattr, 2029 .get_inode_acl = fuse_get_inode_acl, 2030 .get_acl = fuse_get_acl, 2031 .set_acl = fuse_set_acl, 2032 .fileattr_get = fuse_fileattr_get, 2033 .fileattr_set = fuse_fileattr_set, 2034 }; 2035 2036 static const struct inode_operations fuse_symlink_inode_operations = { 2037 .setattr = fuse_setattr, 2038 .get_link = fuse_get_link, 2039 .getattr = fuse_getattr, 2040 .listxattr = fuse_listxattr, 2041 }; 2042 2043 void fuse_init_common(struct inode *inode) 2044 { 2045 inode->i_op = &fuse_common_inode_operations; 2046 } 2047 2048 void fuse_init_dir(struct inode *inode) 2049 { 2050 struct fuse_inode *fi = get_fuse_inode(inode); 2051 2052 inode->i_op = &fuse_dir_inode_operations; 2053 inode->i_fop = &fuse_dir_operations; 2054 2055 spin_lock_init(&fi->rdc.lock); 2056 fi->rdc.cached = false; 2057 fi->rdc.size = 0; 2058 fi->rdc.pos = 0; 2059 fi->rdc.version = 0; 2060 } 2061 2062 static int fuse_symlink_read_folio(struct file *null, struct folio *folio) 2063 { 2064 int err = fuse_readlink_page(folio->mapping->host, &folio->page); 2065 2066 if (!err) 2067 folio_mark_uptodate(folio); 2068 2069 folio_unlock(folio); 2070 2071 return err; 2072 } 2073 2074 static const struct address_space_operations fuse_symlink_aops = { 2075 .read_folio = fuse_symlink_read_folio, 2076 }; 2077 2078 void fuse_init_symlink(struct inode *inode) 2079 { 2080 inode->i_op = &fuse_symlink_inode_operations; 2081 inode->i_data.a_ops = &fuse_symlink_aops; 2082 inode_nohighmem(inode); 2083 } 2084