xref: /openbmc/linux/fs/fuse/dir.c (revision 9dc10a54abe50b733a5b561d5f8be718e79c3590)
1 /*
2   FUSE: Filesystem in Userspace
3   Copyright (C) 2001-2008  Miklos Szeredi <miklos@szeredi.hu>
4 
5   This program can be distributed under the terms of the GNU GPL.
6   See the file COPYING.
7 */
8 
9 #include "fuse_i.h"
10 
11 #include <linux/pagemap.h>
12 #include <linux/file.h>
13 #include <linux/fs_context.h>
14 #include <linux/moduleparam.h>
15 #include <linux/sched.h>
16 #include <linux/namei.h>
17 #include <linux/slab.h>
18 #include <linux/xattr.h>
19 #include <linux/iversion.h>
20 #include <linux/posix_acl.h>
21 #include <linux/security.h>
22 #include <linux/types.h>
23 #include <linux/kernel.h>
24 
25 static bool __read_mostly allow_sys_admin_access;
26 module_param(allow_sys_admin_access, bool, 0644);
27 MODULE_PARM_DESC(allow_sys_admin_access,
28 		 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check");
29 
30 static void fuse_advise_use_readdirplus(struct inode *dir)
31 {
32 	struct fuse_inode *fi = get_fuse_inode(dir);
33 
34 	set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
35 }
36 
37 #if BITS_PER_LONG >= 64
38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
39 {
40 	entry->d_fsdata = (void *) time;
41 }
42 
43 static inline u64 fuse_dentry_time(const struct dentry *entry)
44 {
45 	return (u64)entry->d_fsdata;
46 }
47 
48 #else
49 union fuse_dentry {
50 	u64 time;
51 	struct rcu_head rcu;
52 };
53 
54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
55 {
56 	((union fuse_dentry *) dentry->d_fsdata)->time = time;
57 }
58 
59 static inline u64 fuse_dentry_time(const struct dentry *entry)
60 {
61 	return ((union fuse_dentry *) entry->d_fsdata)->time;
62 }
63 #endif
64 
65 static void fuse_dentry_settime(struct dentry *dentry, u64 time)
66 {
67 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
68 	bool delete = !time && fc->delete_stale;
69 	/*
70 	 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
71 	 * Don't care about races, either way it's just an optimization
72 	 */
73 	if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
74 	    (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
75 		spin_lock(&dentry->d_lock);
76 		if (!delete)
77 			dentry->d_flags &= ~DCACHE_OP_DELETE;
78 		else
79 			dentry->d_flags |= DCACHE_OP_DELETE;
80 		spin_unlock(&dentry->d_lock);
81 	}
82 
83 	__fuse_dentry_settime(dentry, time);
84 }
85 
86 /*
87  * FUSE caches dentries and attributes with separate timeout.  The
88  * time in jiffies until the dentry/attributes are valid is stored in
89  * dentry->d_fsdata and fuse_inode->i_time respectively.
90  */
91 
92 /*
93  * Calculate the time in jiffies until a dentry/attributes are valid
94  */
95 u64 fuse_time_to_jiffies(u64 sec, u32 nsec)
96 {
97 	if (sec || nsec) {
98 		struct timespec64 ts = {
99 			sec,
100 			min_t(u32, nsec, NSEC_PER_SEC - 1)
101 		};
102 
103 		return get_jiffies_64() + timespec64_to_jiffies(&ts);
104 	} else
105 		return 0;
106 }
107 
108 /*
109  * Set dentry and possibly attribute timeouts from the lookup/mk*
110  * replies
111  */
112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
113 {
114 	fuse_dentry_settime(entry,
115 		fuse_time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
116 }
117 
118 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
119 {
120 	set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
121 }
122 
123 /*
124  * Mark the attributes as stale, so that at the next call to
125  * ->getattr() they will be fetched from userspace
126  */
127 void fuse_invalidate_attr(struct inode *inode)
128 {
129 	fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
130 }
131 
132 static void fuse_dir_changed(struct inode *dir)
133 {
134 	fuse_invalidate_attr(dir);
135 	inode_maybe_inc_iversion(dir, false);
136 }
137 
138 /*
139  * Mark the attributes as stale due to an atime change.  Avoid the invalidate if
140  * atime is not used.
141  */
142 void fuse_invalidate_atime(struct inode *inode)
143 {
144 	if (!IS_RDONLY(inode))
145 		fuse_invalidate_attr_mask(inode, STATX_ATIME);
146 }
147 
148 /*
149  * Just mark the entry as stale, so that a next attempt to look it up
150  * will result in a new lookup call to userspace
151  *
152  * This is called when a dentry is about to become negative and the
153  * timeout is unknown (unlink, rmdir, rename and in some cases
154  * lookup)
155  */
156 void fuse_invalidate_entry_cache(struct dentry *entry)
157 {
158 	fuse_dentry_settime(entry, 0);
159 }
160 
161 /*
162  * Same as fuse_invalidate_entry_cache(), but also try to remove the
163  * dentry from the hash
164  */
165 static void fuse_invalidate_entry(struct dentry *entry)
166 {
167 	d_invalidate(entry);
168 	fuse_invalidate_entry_cache(entry);
169 }
170 
171 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
172 			     u64 nodeid, const struct qstr *name,
173 			     struct fuse_entry_out *outarg)
174 {
175 	memset(outarg, 0, sizeof(struct fuse_entry_out));
176 	args->opcode = FUSE_LOOKUP;
177 	args->nodeid = nodeid;
178 	args->in_numargs = 1;
179 	args->in_args[0].size = name->len + 1;
180 	args->in_args[0].value = name->name;
181 	args->out_numargs = 1;
182 	args->out_args[0].size = sizeof(struct fuse_entry_out);
183 	args->out_args[0].value = outarg;
184 }
185 
186 /*
187  * Check whether the dentry is still valid
188  *
189  * If the entry validity timeout has expired and the dentry is
190  * positive, try to redo the lookup.  If the lookup results in a
191  * different inode, then let the VFS invalidate the dentry and redo
192  * the lookup once more.  If the lookup results in the same inode,
193  * then refresh the attributes, timeouts and mark the dentry valid.
194  */
195 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
196 {
197 	struct inode *inode;
198 	struct dentry *parent;
199 	struct fuse_mount *fm;
200 	struct fuse_inode *fi;
201 	int ret;
202 
203 	inode = d_inode_rcu(entry);
204 	if (inode && fuse_is_bad(inode))
205 		goto invalid;
206 	else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
207 		 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) {
208 		struct fuse_entry_out outarg;
209 		FUSE_ARGS(args);
210 		struct fuse_forget_link *forget;
211 		u64 attr_version;
212 
213 		/* For negative dentries, always do a fresh lookup */
214 		if (!inode)
215 			goto invalid;
216 
217 		ret = -ECHILD;
218 		if (flags & LOOKUP_RCU)
219 			goto out;
220 
221 		fm = get_fuse_mount(inode);
222 
223 		forget = fuse_alloc_forget();
224 		ret = -ENOMEM;
225 		if (!forget)
226 			goto out;
227 
228 		attr_version = fuse_get_attr_version(fm->fc);
229 
230 		parent = dget_parent(entry);
231 		fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
232 				 &entry->d_name, &outarg);
233 		ret = fuse_simple_request(fm, &args);
234 		dput(parent);
235 		/* Zero nodeid is same as -ENOENT */
236 		if (!ret && !outarg.nodeid)
237 			ret = -ENOENT;
238 		if (!ret) {
239 			fi = get_fuse_inode(inode);
240 			if (outarg.nodeid != get_node_id(inode) ||
241 			    (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
242 				fuse_queue_forget(fm->fc, forget,
243 						  outarg.nodeid, 1);
244 				goto invalid;
245 			}
246 			spin_lock(&fi->lock);
247 			fi->nlookup++;
248 			spin_unlock(&fi->lock);
249 		}
250 		kfree(forget);
251 		if (ret == -ENOMEM || ret == -EINTR)
252 			goto out;
253 		if (ret || fuse_invalid_attr(&outarg.attr) ||
254 		    fuse_stale_inode(inode, outarg.generation, &outarg.attr))
255 			goto invalid;
256 
257 		forget_all_cached_acls(inode);
258 		fuse_change_attributes(inode, &outarg.attr,
259 				       ATTR_TIMEOUT(&outarg),
260 				       attr_version);
261 		fuse_change_entry_timeout(entry, &outarg);
262 	} else if (inode) {
263 		fi = get_fuse_inode(inode);
264 		if (flags & LOOKUP_RCU) {
265 			if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
266 				return -ECHILD;
267 		} else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
268 			parent = dget_parent(entry);
269 			fuse_advise_use_readdirplus(d_inode(parent));
270 			dput(parent);
271 		}
272 	}
273 	ret = 1;
274 out:
275 	return ret;
276 
277 invalid:
278 	ret = 0;
279 	goto out;
280 }
281 
282 #if BITS_PER_LONG < 64
283 static int fuse_dentry_init(struct dentry *dentry)
284 {
285 	dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
286 				   GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
287 
288 	return dentry->d_fsdata ? 0 : -ENOMEM;
289 }
290 static void fuse_dentry_release(struct dentry *dentry)
291 {
292 	union fuse_dentry *fd = dentry->d_fsdata;
293 
294 	kfree_rcu(fd, rcu);
295 }
296 #endif
297 
298 static int fuse_dentry_delete(const struct dentry *dentry)
299 {
300 	return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
301 }
302 
303 /*
304  * Create a fuse_mount object with a new superblock (with path->dentry
305  * as the root), and return that mount so it can be auto-mounted on
306  * @path.
307  */
308 static struct vfsmount *fuse_dentry_automount(struct path *path)
309 {
310 	struct fs_context *fsc;
311 	struct vfsmount *mnt;
312 	struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
313 
314 	fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
315 	if (IS_ERR(fsc))
316 		return ERR_CAST(fsc);
317 
318 	/* Pass the FUSE inode of the mount for fuse_get_tree_submount() */
319 	fsc->fs_private = mp_fi;
320 
321 	/* Create the submount */
322 	mnt = fc_mount(fsc);
323 	if (!IS_ERR(mnt))
324 		mntget(mnt);
325 
326 	put_fs_context(fsc);
327 	return mnt;
328 }
329 
330 const struct dentry_operations fuse_dentry_operations = {
331 	.d_revalidate	= fuse_dentry_revalidate,
332 	.d_delete	= fuse_dentry_delete,
333 #if BITS_PER_LONG < 64
334 	.d_init		= fuse_dentry_init,
335 	.d_release	= fuse_dentry_release,
336 #endif
337 	.d_automount	= fuse_dentry_automount,
338 };
339 
340 const struct dentry_operations fuse_root_dentry_operations = {
341 #if BITS_PER_LONG < 64
342 	.d_init		= fuse_dentry_init,
343 	.d_release	= fuse_dentry_release,
344 #endif
345 };
346 
347 int fuse_valid_type(int m)
348 {
349 	return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
350 		S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
351 }
352 
353 bool fuse_invalid_attr(struct fuse_attr *attr)
354 {
355 	return !fuse_valid_type(attr->mode) ||
356 		attr->size > LLONG_MAX;
357 }
358 
359 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
360 		     struct fuse_entry_out *outarg, struct inode **inode)
361 {
362 	struct fuse_mount *fm = get_fuse_mount_super(sb);
363 	FUSE_ARGS(args);
364 	struct fuse_forget_link *forget;
365 	u64 attr_version;
366 	int err;
367 
368 	*inode = NULL;
369 	err = -ENAMETOOLONG;
370 	if (name->len > FUSE_NAME_MAX)
371 		goto out;
372 
373 
374 	forget = fuse_alloc_forget();
375 	err = -ENOMEM;
376 	if (!forget)
377 		goto out;
378 
379 	attr_version = fuse_get_attr_version(fm->fc);
380 
381 	fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
382 	err = fuse_simple_request(fm, &args);
383 	/* Zero nodeid is same as -ENOENT, but with valid timeout */
384 	if (err || !outarg->nodeid)
385 		goto out_put_forget;
386 
387 	err = -EIO;
388 	if (fuse_invalid_attr(&outarg->attr))
389 		goto out_put_forget;
390 
391 	*inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
392 			   &outarg->attr, ATTR_TIMEOUT(outarg),
393 			   attr_version);
394 	err = -ENOMEM;
395 	if (!*inode) {
396 		fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
397 		goto out;
398 	}
399 	err = 0;
400 
401  out_put_forget:
402 	kfree(forget);
403  out:
404 	return err;
405 }
406 
407 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
408 				  unsigned int flags)
409 {
410 	int err;
411 	struct fuse_entry_out outarg;
412 	struct inode *inode;
413 	struct dentry *newent;
414 	bool outarg_valid = true;
415 	bool locked;
416 
417 	if (fuse_is_bad(dir))
418 		return ERR_PTR(-EIO);
419 
420 	locked = fuse_lock_inode(dir);
421 	err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
422 			       &outarg, &inode);
423 	fuse_unlock_inode(dir, locked);
424 	if (err == -ENOENT) {
425 		outarg_valid = false;
426 		err = 0;
427 	}
428 	if (err)
429 		goto out_err;
430 
431 	err = -EIO;
432 	if (inode && get_node_id(inode) == FUSE_ROOT_ID)
433 		goto out_iput;
434 
435 	newent = d_splice_alias(inode, entry);
436 	err = PTR_ERR(newent);
437 	if (IS_ERR(newent))
438 		goto out_err;
439 
440 	entry = newent ? newent : entry;
441 	if (outarg_valid)
442 		fuse_change_entry_timeout(entry, &outarg);
443 	else
444 		fuse_invalidate_entry_cache(entry);
445 
446 	if (inode)
447 		fuse_advise_use_readdirplus(dir);
448 	return newent;
449 
450  out_iput:
451 	iput(inode);
452  out_err:
453 	return ERR_PTR(err);
454 }
455 
456 static int get_security_context(struct dentry *entry, umode_t mode,
457 				struct fuse_in_arg *ext)
458 {
459 	struct fuse_secctx *fctx;
460 	struct fuse_secctx_header *header;
461 	void *ctx = NULL, *ptr;
462 	u32 ctxlen, total_len = sizeof(*header);
463 	int err, nr_ctx = 0;
464 	const char *name;
465 	size_t namelen;
466 
467 	err = security_dentry_init_security(entry, mode, &entry->d_name,
468 					    &name, &ctx, &ctxlen);
469 	if (err) {
470 		if (err != -EOPNOTSUPP)
471 			goto out_err;
472 		/* No LSM is supporting this security hook. Ignore error */
473 		ctxlen = 0;
474 		ctx = NULL;
475 	}
476 
477 	if (ctxlen) {
478 		nr_ctx = 1;
479 		namelen = strlen(name) + 1;
480 		err = -EIO;
481 		if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX))
482 			goto out_err;
483 		total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen);
484 	}
485 
486 	err = -ENOMEM;
487 	header = ptr = kzalloc(total_len, GFP_KERNEL);
488 	if (!ptr)
489 		goto out_err;
490 
491 	header->nr_secctx = nr_ctx;
492 	header->size = total_len;
493 	ptr += sizeof(*header);
494 	if (nr_ctx) {
495 		fctx = ptr;
496 		fctx->size = ctxlen;
497 		ptr += sizeof(*fctx);
498 
499 		strcpy(ptr, name);
500 		ptr += namelen;
501 
502 		memcpy(ptr, ctx, ctxlen);
503 	}
504 	ext->size = total_len;
505 	ext->value = header;
506 	err = 0;
507 out_err:
508 	kfree(ctx);
509 	return err;
510 }
511 
512 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes)
513 {
514 	void *p;
515 	u32 newlen = buf->size + bytes;
516 
517 	p = krealloc(buf->value, newlen, GFP_KERNEL);
518 	if (!p) {
519 		kfree(buf->value);
520 		buf->size = 0;
521 		buf->value = NULL;
522 		return NULL;
523 	}
524 
525 	memset(p + buf->size, 0, bytes);
526 	buf->value = p;
527 	buf->size = newlen;
528 
529 	return p + newlen - bytes;
530 }
531 
532 static u32 fuse_ext_size(size_t size)
533 {
534 	return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size);
535 }
536 
537 /*
538  * This adds just a single supplementary group that matches the parent's group.
539  */
540 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext)
541 {
542 	struct fuse_conn *fc = get_fuse_conn(dir);
543 	struct fuse_ext_header *xh;
544 	struct fuse_supp_groups *sg;
545 	kgid_t kgid = dir->i_gid;
546 	gid_t parent_gid = from_kgid(fc->user_ns, kgid);
547 	u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0]));
548 
549 	if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) ||
550 	    !in_group_p(kgid))
551 		return 0;
552 
553 	xh = extend_arg(ext, sg_len);
554 	if (!xh)
555 		return -ENOMEM;
556 
557 	xh->size = sg_len;
558 	xh->type = FUSE_EXT_GROUPS;
559 
560 	sg = (struct fuse_supp_groups *) &xh[1];
561 	sg->nr_groups = 1;
562 	sg->groups[0] = parent_gid;
563 
564 	return 0;
565 }
566 
567 static int get_create_ext(struct fuse_args *args,
568 			  struct inode *dir, struct dentry *dentry,
569 			  umode_t mode)
570 {
571 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
572 	struct fuse_in_arg ext = { .size = 0, .value = NULL };
573 	int err = 0;
574 
575 	if (fc->init_security)
576 		err = get_security_context(dentry, mode, &ext);
577 	if (!err && fc->create_supp_group)
578 		err = get_create_supp_group(dir, &ext);
579 
580 	if (!err && ext.size) {
581 		WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args));
582 		args->is_ext = true;
583 		args->ext_idx = args->in_numargs++;
584 		args->in_args[args->ext_idx] = ext;
585 	} else {
586 		kfree(ext.value);
587 	}
588 
589 	return err;
590 }
591 
592 static void free_ext_value(struct fuse_args *args)
593 {
594 	if (args->is_ext)
595 		kfree(args->in_args[args->ext_idx].value);
596 }
597 
598 /*
599  * Atomic create+open operation
600  *
601  * If the filesystem doesn't support this, then fall back to separate
602  * 'mknod' + 'open' requests.
603  */
604 static int fuse_create_open(struct inode *dir, struct dentry *entry,
605 			    struct file *file, unsigned int flags,
606 			    umode_t mode, u32 opcode)
607 {
608 	int err;
609 	struct inode *inode;
610 	struct fuse_mount *fm = get_fuse_mount(dir);
611 	FUSE_ARGS(args);
612 	struct fuse_forget_link *forget;
613 	struct fuse_create_in inarg;
614 	struct fuse_open_out outopen;
615 	struct fuse_entry_out outentry;
616 	struct fuse_inode *fi;
617 	struct fuse_file *ff;
618 	bool trunc = flags & O_TRUNC;
619 
620 	/* Userspace expects S_IFREG in create mode */
621 	BUG_ON((mode & S_IFMT) != S_IFREG);
622 
623 	forget = fuse_alloc_forget();
624 	err = -ENOMEM;
625 	if (!forget)
626 		goto out_err;
627 
628 	err = -ENOMEM;
629 	ff = fuse_file_alloc(fm);
630 	if (!ff)
631 		goto out_put_forget_req;
632 
633 	if (!fm->fc->dont_mask)
634 		mode &= ~current_umask();
635 
636 	flags &= ~O_NOCTTY;
637 	memset(&inarg, 0, sizeof(inarg));
638 	memset(&outentry, 0, sizeof(outentry));
639 	inarg.flags = flags;
640 	inarg.mode = mode;
641 	inarg.umask = current_umask();
642 
643 	if (fm->fc->handle_killpriv_v2 && trunc &&
644 	    !(flags & O_EXCL) && !capable(CAP_FSETID)) {
645 		inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
646 	}
647 
648 	args.opcode = opcode;
649 	args.nodeid = get_node_id(dir);
650 	args.in_numargs = 2;
651 	args.in_args[0].size = sizeof(inarg);
652 	args.in_args[0].value = &inarg;
653 	args.in_args[1].size = entry->d_name.len + 1;
654 	args.in_args[1].value = entry->d_name.name;
655 	args.out_numargs = 2;
656 	args.out_args[0].size = sizeof(outentry);
657 	args.out_args[0].value = &outentry;
658 	args.out_args[1].size = sizeof(outopen);
659 	args.out_args[1].value = &outopen;
660 
661 	err = get_create_ext(&args, dir, entry, mode);
662 	if (err)
663 		goto out_put_forget_req;
664 
665 	err = fuse_simple_request(fm, &args);
666 	free_ext_value(&args);
667 	if (err)
668 		goto out_free_ff;
669 
670 	err = -EIO;
671 	if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
672 	    fuse_invalid_attr(&outentry.attr))
673 		goto out_free_ff;
674 
675 	ff->fh = outopen.fh;
676 	ff->nodeid = outentry.nodeid;
677 	ff->open_flags = outopen.open_flags;
678 	inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
679 			  &outentry.attr, ATTR_TIMEOUT(&outentry), 0);
680 	if (!inode) {
681 		flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
682 		fuse_sync_release(NULL, ff, flags);
683 		fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
684 		err = -ENOMEM;
685 		goto out_err;
686 	}
687 	kfree(forget);
688 	d_instantiate(entry, inode);
689 	fuse_change_entry_timeout(entry, &outentry);
690 	fuse_dir_changed(dir);
691 	err = finish_open(file, entry, generic_file_open);
692 	if (err) {
693 		fi = get_fuse_inode(inode);
694 		fuse_sync_release(fi, ff, flags);
695 	} else {
696 		file->private_data = ff;
697 		fuse_finish_open(inode, file);
698 		if (fm->fc->atomic_o_trunc && trunc)
699 			truncate_pagecache(inode, 0);
700 		else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
701 			invalidate_inode_pages2(inode->i_mapping);
702 	}
703 	return err;
704 
705 out_free_ff:
706 	fuse_file_free(ff);
707 out_put_forget_req:
708 	kfree(forget);
709 out_err:
710 	return err;
711 }
712 
713 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
714 		      umode_t, dev_t);
715 static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
716 			    struct file *file, unsigned flags,
717 			    umode_t mode)
718 {
719 	int err;
720 	struct fuse_conn *fc = get_fuse_conn(dir);
721 	struct dentry *res = NULL;
722 
723 	if (fuse_is_bad(dir))
724 		return -EIO;
725 
726 	if (d_in_lookup(entry)) {
727 		res = fuse_lookup(dir, entry, 0);
728 		if (IS_ERR(res))
729 			return PTR_ERR(res);
730 
731 		if (res)
732 			entry = res;
733 	}
734 
735 	if (!(flags & O_CREAT) || d_really_is_positive(entry))
736 		goto no_open;
737 
738 	/* Only creates */
739 	file->f_mode |= FMODE_CREATED;
740 
741 	if (fc->no_create)
742 		goto mknod;
743 
744 	err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE);
745 	if (err == -ENOSYS) {
746 		fc->no_create = 1;
747 		goto mknod;
748 	}
749 out_dput:
750 	dput(res);
751 	return err;
752 
753 mknod:
754 	err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
755 	if (err)
756 		goto out_dput;
757 no_open:
758 	return finish_no_open(file, res);
759 }
760 
761 /*
762  * Code shared between mknod, mkdir, symlink and link
763  */
764 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args,
765 			    struct inode *dir, struct dentry *entry,
766 			    umode_t mode)
767 {
768 	struct fuse_entry_out outarg;
769 	struct inode *inode;
770 	struct dentry *d;
771 	int err;
772 	struct fuse_forget_link *forget;
773 
774 	if (fuse_is_bad(dir))
775 		return -EIO;
776 
777 	forget = fuse_alloc_forget();
778 	if (!forget)
779 		return -ENOMEM;
780 
781 	memset(&outarg, 0, sizeof(outarg));
782 	args->nodeid = get_node_id(dir);
783 	args->out_numargs = 1;
784 	args->out_args[0].size = sizeof(outarg);
785 	args->out_args[0].value = &outarg;
786 
787 	if (args->opcode != FUSE_LINK) {
788 		err = get_create_ext(args, dir, entry, mode);
789 		if (err)
790 			goto out_put_forget_req;
791 	}
792 
793 	err = fuse_simple_request(fm, args);
794 	free_ext_value(args);
795 	if (err)
796 		goto out_put_forget_req;
797 
798 	err = -EIO;
799 	if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
800 		goto out_put_forget_req;
801 
802 	if ((outarg.attr.mode ^ mode) & S_IFMT)
803 		goto out_put_forget_req;
804 
805 	inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
806 			  &outarg.attr, ATTR_TIMEOUT(&outarg), 0);
807 	if (!inode) {
808 		fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
809 		return -ENOMEM;
810 	}
811 	kfree(forget);
812 
813 	d_drop(entry);
814 	d = d_splice_alias(inode, entry);
815 	if (IS_ERR(d))
816 		return PTR_ERR(d);
817 
818 	if (d) {
819 		fuse_change_entry_timeout(d, &outarg);
820 		dput(d);
821 	} else {
822 		fuse_change_entry_timeout(entry, &outarg);
823 	}
824 	fuse_dir_changed(dir);
825 	return 0;
826 
827  out_put_forget_req:
828 	kfree(forget);
829 	return err;
830 }
831 
832 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir,
833 		      struct dentry *entry, umode_t mode, dev_t rdev)
834 {
835 	struct fuse_mknod_in inarg;
836 	struct fuse_mount *fm = get_fuse_mount(dir);
837 	FUSE_ARGS(args);
838 
839 	if (!fm->fc->dont_mask)
840 		mode &= ~current_umask();
841 
842 	memset(&inarg, 0, sizeof(inarg));
843 	inarg.mode = mode;
844 	inarg.rdev = new_encode_dev(rdev);
845 	inarg.umask = current_umask();
846 	args.opcode = FUSE_MKNOD;
847 	args.in_numargs = 2;
848 	args.in_args[0].size = sizeof(inarg);
849 	args.in_args[0].value = &inarg;
850 	args.in_args[1].size = entry->d_name.len + 1;
851 	args.in_args[1].value = entry->d_name.name;
852 	return create_new_entry(fm, &args, dir, entry, mode);
853 }
854 
855 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir,
856 		       struct dentry *entry, umode_t mode, bool excl)
857 {
858 	return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
859 }
860 
861 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir,
862 			struct file *file, umode_t mode)
863 {
864 	struct fuse_conn *fc = get_fuse_conn(dir);
865 	int err;
866 
867 	if (fc->no_tmpfile)
868 		return -EOPNOTSUPP;
869 
870 	err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE);
871 	if (err == -ENOSYS) {
872 		fc->no_tmpfile = 1;
873 		err = -EOPNOTSUPP;
874 	}
875 	return err;
876 }
877 
878 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir,
879 		      struct dentry *entry, umode_t mode)
880 {
881 	struct fuse_mkdir_in inarg;
882 	struct fuse_mount *fm = get_fuse_mount(dir);
883 	FUSE_ARGS(args);
884 
885 	if (!fm->fc->dont_mask)
886 		mode &= ~current_umask();
887 
888 	memset(&inarg, 0, sizeof(inarg));
889 	inarg.mode = mode;
890 	inarg.umask = current_umask();
891 	args.opcode = FUSE_MKDIR;
892 	args.in_numargs = 2;
893 	args.in_args[0].size = sizeof(inarg);
894 	args.in_args[0].value = &inarg;
895 	args.in_args[1].size = entry->d_name.len + 1;
896 	args.in_args[1].value = entry->d_name.name;
897 	return create_new_entry(fm, &args, dir, entry, S_IFDIR);
898 }
899 
900 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir,
901 			struct dentry *entry, const char *link)
902 {
903 	struct fuse_mount *fm = get_fuse_mount(dir);
904 	unsigned len = strlen(link) + 1;
905 	FUSE_ARGS(args);
906 
907 	args.opcode = FUSE_SYMLINK;
908 	args.in_numargs = 2;
909 	args.in_args[0].size = entry->d_name.len + 1;
910 	args.in_args[0].value = entry->d_name.name;
911 	args.in_args[1].size = len;
912 	args.in_args[1].value = link;
913 	return create_new_entry(fm, &args, dir, entry, S_IFLNK);
914 }
915 
916 void fuse_flush_time_update(struct inode *inode)
917 {
918 	int err = sync_inode_metadata(inode, 1);
919 
920 	mapping_set_error(inode->i_mapping, err);
921 }
922 
923 static void fuse_update_ctime_in_cache(struct inode *inode)
924 {
925 	if (!IS_NOCMTIME(inode)) {
926 		inode->i_ctime = current_time(inode);
927 		mark_inode_dirty_sync(inode);
928 		fuse_flush_time_update(inode);
929 	}
930 }
931 
932 void fuse_update_ctime(struct inode *inode)
933 {
934 	fuse_invalidate_attr_mask(inode, STATX_CTIME);
935 	fuse_update_ctime_in_cache(inode);
936 }
937 
938 static void fuse_entry_unlinked(struct dentry *entry)
939 {
940 	struct inode *inode = d_inode(entry);
941 	struct fuse_conn *fc = get_fuse_conn(inode);
942 	struct fuse_inode *fi = get_fuse_inode(inode);
943 
944 	spin_lock(&fi->lock);
945 	fi->attr_version = atomic64_inc_return(&fc->attr_version);
946 	/*
947 	 * If i_nlink == 0 then unlink doesn't make sense, yet this can
948 	 * happen if userspace filesystem is careless.  It would be
949 	 * difficult to enforce correct nlink usage so just ignore this
950 	 * condition here
951 	 */
952 	if (S_ISDIR(inode->i_mode))
953 		clear_nlink(inode);
954 	else if (inode->i_nlink > 0)
955 		drop_nlink(inode);
956 	spin_unlock(&fi->lock);
957 	fuse_invalidate_entry_cache(entry);
958 	fuse_update_ctime(inode);
959 }
960 
961 static int fuse_unlink(struct inode *dir, struct dentry *entry)
962 {
963 	int err;
964 	struct fuse_mount *fm = get_fuse_mount(dir);
965 	FUSE_ARGS(args);
966 
967 	if (fuse_is_bad(dir))
968 		return -EIO;
969 
970 	args.opcode = FUSE_UNLINK;
971 	args.nodeid = get_node_id(dir);
972 	args.in_numargs = 1;
973 	args.in_args[0].size = entry->d_name.len + 1;
974 	args.in_args[0].value = entry->d_name.name;
975 	err = fuse_simple_request(fm, &args);
976 	if (!err) {
977 		fuse_dir_changed(dir);
978 		fuse_entry_unlinked(entry);
979 	} else if (err == -EINTR)
980 		fuse_invalidate_entry(entry);
981 	return err;
982 }
983 
984 static int fuse_rmdir(struct inode *dir, struct dentry *entry)
985 {
986 	int err;
987 	struct fuse_mount *fm = get_fuse_mount(dir);
988 	FUSE_ARGS(args);
989 
990 	if (fuse_is_bad(dir))
991 		return -EIO;
992 
993 	args.opcode = FUSE_RMDIR;
994 	args.nodeid = get_node_id(dir);
995 	args.in_numargs = 1;
996 	args.in_args[0].size = entry->d_name.len + 1;
997 	args.in_args[0].value = entry->d_name.name;
998 	err = fuse_simple_request(fm, &args);
999 	if (!err) {
1000 		fuse_dir_changed(dir);
1001 		fuse_entry_unlinked(entry);
1002 	} else if (err == -EINTR)
1003 		fuse_invalidate_entry(entry);
1004 	return err;
1005 }
1006 
1007 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
1008 			      struct inode *newdir, struct dentry *newent,
1009 			      unsigned int flags, int opcode, size_t argsize)
1010 {
1011 	int err;
1012 	struct fuse_rename2_in inarg;
1013 	struct fuse_mount *fm = get_fuse_mount(olddir);
1014 	FUSE_ARGS(args);
1015 
1016 	memset(&inarg, 0, argsize);
1017 	inarg.newdir = get_node_id(newdir);
1018 	inarg.flags = flags;
1019 	args.opcode = opcode;
1020 	args.nodeid = get_node_id(olddir);
1021 	args.in_numargs = 3;
1022 	args.in_args[0].size = argsize;
1023 	args.in_args[0].value = &inarg;
1024 	args.in_args[1].size = oldent->d_name.len + 1;
1025 	args.in_args[1].value = oldent->d_name.name;
1026 	args.in_args[2].size = newent->d_name.len + 1;
1027 	args.in_args[2].value = newent->d_name.name;
1028 	err = fuse_simple_request(fm, &args);
1029 	if (!err) {
1030 		/* ctime changes */
1031 		fuse_update_ctime(d_inode(oldent));
1032 
1033 		if (flags & RENAME_EXCHANGE)
1034 			fuse_update_ctime(d_inode(newent));
1035 
1036 		fuse_dir_changed(olddir);
1037 		if (olddir != newdir)
1038 			fuse_dir_changed(newdir);
1039 
1040 		/* newent will end up negative */
1041 		if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent))
1042 			fuse_entry_unlinked(newent);
1043 	} else if (err == -EINTR) {
1044 		/* If request was interrupted, DEITY only knows if the
1045 		   rename actually took place.  If the invalidation
1046 		   fails (e.g. some process has CWD under the renamed
1047 		   directory), then there can be inconsistency between
1048 		   the dcache and the real filesystem.  Tough luck. */
1049 		fuse_invalidate_entry(oldent);
1050 		if (d_really_is_positive(newent))
1051 			fuse_invalidate_entry(newent);
1052 	}
1053 
1054 	return err;
1055 }
1056 
1057 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir,
1058 			struct dentry *oldent, struct inode *newdir,
1059 			struct dentry *newent, unsigned int flags)
1060 {
1061 	struct fuse_conn *fc = get_fuse_conn(olddir);
1062 	int err;
1063 
1064 	if (fuse_is_bad(olddir))
1065 		return -EIO;
1066 
1067 	if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
1068 		return -EINVAL;
1069 
1070 	if (flags) {
1071 		if (fc->no_rename2 || fc->minor < 23)
1072 			return -EINVAL;
1073 
1074 		err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
1075 					 FUSE_RENAME2,
1076 					 sizeof(struct fuse_rename2_in));
1077 		if (err == -ENOSYS) {
1078 			fc->no_rename2 = 1;
1079 			err = -EINVAL;
1080 		}
1081 	} else {
1082 		err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
1083 					 FUSE_RENAME,
1084 					 sizeof(struct fuse_rename_in));
1085 	}
1086 
1087 	return err;
1088 }
1089 
1090 static int fuse_link(struct dentry *entry, struct inode *newdir,
1091 		     struct dentry *newent)
1092 {
1093 	int err;
1094 	struct fuse_link_in inarg;
1095 	struct inode *inode = d_inode(entry);
1096 	struct fuse_mount *fm = get_fuse_mount(inode);
1097 	FUSE_ARGS(args);
1098 
1099 	memset(&inarg, 0, sizeof(inarg));
1100 	inarg.oldnodeid = get_node_id(inode);
1101 	args.opcode = FUSE_LINK;
1102 	args.in_numargs = 2;
1103 	args.in_args[0].size = sizeof(inarg);
1104 	args.in_args[0].value = &inarg;
1105 	args.in_args[1].size = newent->d_name.len + 1;
1106 	args.in_args[1].value = newent->d_name.name;
1107 	err = create_new_entry(fm, &args, newdir, newent, inode->i_mode);
1108 	if (!err)
1109 		fuse_update_ctime_in_cache(inode);
1110 	else if (err == -EINTR)
1111 		fuse_invalidate_attr(inode);
1112 
1113 	return err;
1114 }
1115 
1116 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
1117 			  struct kstat *stat)
1118 {
1119 	unsigned int blkbits;
1120 	struct fuse_conn *fc = get_fuse_conn(inode);
1121 
1122 	stat->dev = inode->i_sb->s_dev;
1123 	stat->ino = attr->ino;
1124 	stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
1125 	stat->nlink = attr->nlink;
1126 	stat->uid = make_kuid(fc->user_ns, attr->uid);
1127 	stat->gid = make_kgid(fc->user_ns, attr->gid);
1128 	stat->rdev = inode->i_rdev;
1129 	stat->atime.tv_sec = attr->atime;
1130 	stat->atime.tv_nsec = attr->atimensec;
1131 	stat->mtime.tv_sec = attr->mtime;
1132 	stat->mtime.tv_nsec = attr->mtimensec;
1133 	stat->ctime.tv_sec = attr->ctime;
1134 	stat->ctime.tv_nsec = attr->ctimensec;
1135 	stat->size = attr->size;
1136 	stat->blocks = attr->blocks;
1137 
1138 	if (attr->blksize != 0)
1139 		blkbits = ilog2(attr->blksize);
1140 	else
1141 		blkbits = inode->i_sb->s_blocksize_bits;
1142 
1143 	stat->blksize = 1 << blkbits;
1144 }
1145 
1146 static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
1147 			   struct file *file)
1148 {
1149 	int err;
1150 	struct fuse_getattr_in inarg;
1151 	struct fuse_attr_out outarg;
1152 	struct fuse_mount *fm = get_fuse_mount(inode);
1153 	FUSE_ARGS(args);
1154 	u64 attr_version;
1155 
1156 	attr_version = fuse_get_attr_version(fm->fc);
1157 
1158 	memset(&inarg, 0, sizeof(inarg));
1159 	memset(&outarg, 0, sizeof(outarg));
1160 	/* Directories have separate file-handle space */
1161 	if (file && S_ISREG(inode->i_mode)) {
1162 		struct fuse_file *ff = file->private_data;
1163 
1164 		inarg.getattr_flags |= FUSE_GETATTR_FH;
1165 		inarg.fh = ff->fh;
1166 	}
1167 	args.opcode = FUSE_GETATTR;
1168 	args.nodeid = get_node_id(inode);
1169 	args.in_numargs = 1;
1170 	args.in_args[0].size = sizeof(inarg);
1171 	args.in_args[0].value = &inarg;
1172 	args.out_numargs = 1;
1173 	args.out_args[0].size = sizeof(outarg);
1174 	args.out_args[0].value = &outarg;
1175 	err = fuse_simple_request(fm, &args);
1176 	if (!err) {
1177 		if (fuse_invalid_attr(&outarg.attr) ||
1178 		    inode_wrong_type(inode, outarg.attr.mode)) {
1179 			fuse_make_bad(inode);
1180 			err = -EIO;
1181 		} else {
1182 			fuse_change_attributes(inode, &outarg.attr,
1183 					       ATTR_TIMEOUT(&outarg),
1184 					       attr_version);
1185 			if (stat)
1186 				fuse_fillattr(inode, &outarg.attr, stat);
1187 		}
1188 	}
1189 	return err;
1190 }
1191 
1192 static int fuse_update_get_attr(struct inode *inode, struct file *file,
1193 				struct kstat *stat, u32 request_mask,
1194 				unsigned int flags)
1195 {
1196 	struct fuse_inode *fi = get_fuse_inode(inode);
1197 	int err = 0;
1198 	bool sync;
1199 	u32 inval_mask = READ_ONCE(fi->inval_mask);
1200 	u32 cache_mask = fuse_get_cache_mask(inode);
1201 
1202 	/* FUSE only supports basic stats */
1203 	request_mask &= STATX_BASIC_STATS;
1204 
1205 	if (!request_mask)
1206 		sync = false;
1207 	else if (flags & AT_STATX_FORCE_SYNC)
1208 		sync = true;
1209 	else if (flags & AT_STATX_DONT_SYNC)
1210 		sync = false;
1211 	else if (request_mask & inval_mask & ~cache_mask)
1212 		sync = true;
1213 	else
1214 		sync = time_before64(fi->i_time, get_jiffies_64());
1215 
1216 	if (sync) {
1217 		forget_all_cached_acls(inode);
1218 		err = fuse_do_getattr(inode, stat, file);
1219 	} else if (stat) {
1220 		generic_fillattr(&nop_mnt_idmap, inode, stat);
1221 		stat->mode = fi->orig_i_mode;
1222 		stat->ino = fi->orig_ino;
1223 	}
1224 
1225 	return err;
1226 }
1227 
1228 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask)
1229 {
1230 	return fuse_update_get_attr(inode, file, NULL, mask, 0);
1231 }
1232 
1233 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
1234 			     u64 child_nodeid, struct qstr *name, u32 flags)
1235 {
1236 	int err = -ENOTDIR;
1237 	struct inode *parent;
1238 	struct dentry *dir;
1239 	struct dentry *entry;
1240 
1241 	parent = fuse_ilookup(fc, parent_nodeid, NULL);
1242 	if (!parent)
1243 		return -ENOENT;
1244 
1245 	inode_lock_nested(parent, I_MUTEX_PARENT);
1246 	if (!S_ISDIR(parent->i_mode))
1247 		goto unlock;
1248 
1249 	err = -ENOENT;
1250 	dir = d_find_alias(parent);
1251 	if (!dir)
1252 		goto unlock;
1253 
1254 	name->hash = full_name_hash(dir, name->name, name->len);
1255 	entry = d_lookup(dir, name);
1256 	dput(dir);
1257 	if (!entry)
1258 		goto unlock;
1259 
1260 	fuse_dir_changed(parent);
1261 	if (!(flags & FUSE_EXPIRE_ONLY))
1262 		d_invalidate(entry);
1263 	fuse_invalidate_entry_cache(entry);
1264 
1265 	if (child_nodeid != 0 && d_really_is_positive(entry)) {
1266 		inode_lock(d_inode(entry));
1267 		if (get_node_id(d_inode(entry)) != child_nodeid) {
1268 			err = -ENOENT;
1269 			goto badentry;
1270 		}
1271 		if (d_mountpoint(entry)) {
1272 			err = -EBUSY;
1273 			goto badentry;
1274 		}
1275 		if (d_is_dir(entry)) {
1276 			shrink_dcache_parent(entry);
1277 			if (!simple_empty(entry)) {
1278 				err = -ENOTEMPTY;
1279 				goto badentry;
1280 			}
1281 			d_inode(entry)->i_flags |= S_DEAD;
1282 		}
1283 		dont_mount(entry);
1284 		clear_nlink(d_inode(entry));
1285 		err = 0;
1286  badentry:
1287 		inode_unlock(d_inode(entry));
1288 		if (!err)
1289 			d_delete(entry);
1290 	} else {
1291 		err = 0;
1292 	}
1293 	dput(entry);
1294 
1295  unlock:
1296 	inode_unlock(parent);
1297 	iput(parent);
1298 	return err;
1299 }
1300 
1301 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc)
1302 {
1303 	const struct cred *cred = current_cred();
1304 
1305 	return (uid_eq(cred->euid, fc->user_id) &&
1306 		uid_eq(cred->suid, fc->user_id) &&
1307 		uid_eq(cred->uid,  fc->user_id) &&
1308 		gid_eq(cred->egid, fc->group_id) &&
1309 		gid_eq(cred->sgid, fc->group_id) &&
1310 		gid_eq(cred->gid,  fc->group_id));
1311 }
1312 
1313 /*
1314  * Calling into a user-controlled filesystem gives the filesystem
1315  * daemon ptrace-like capabilities over the current process.  This
1316  * means, that the filesystem daemon is able to record the exact
1317  * filesystem operations performed, and can also control the behavior
1318  * of the requester process in otherwise impossible ways.  For example
1319  * it can delay the operation for arbitrary length of time allowing
1320  * DoS against the requester.
1321  *
1322  * For this reason only those processes can call into the filesystem,
1323  * for which the owner of the mount has ptrace privilege.  This
1324  * excludes processes started by other users, suid or sgid processes.
1325  */
1326 bool fuse_allow_current_process(struct fuse_conn *fc)
1327 {
1328 	bool allow;
1329 
1330 	if (fc->allow_other)
1331 		allow = current_in_userns(fc->user_ns);
1332 	else
1333 		allow = fuse_permissible_uidgid(fc);
1334 
1335 	if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN))
1336 		allow = true;
1337 
1338 	return allow;
1339 }
1340 
1341 static int fuse_access(struct inode *inode, int mask)
1342 {
1343 	struct fuse_mount *fm = get_fuse_mount(inode);
1344 	FUSE_ARGS(args);
1345 	struct fuse_access_in inarg;
1346 	int err;
1347 
1348 	BUG_ON(mask & MAY_NOT_BLOCK);
1349 
1350 	if (fm->fc->no_access)
1351 		return 0;
1352 
1353 	memset(&inarg, 0, sizeof(inarg));
1354 	inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
1355 	args.opcode = FUSE_ACCESS;
1356 	args.nodeid = get_node_id(inode);
1357 	args.in_numargs = 1;
1358 	args.in_args[0].size = sizeof(inarg);
1359 	args.in_args[0].value = &inarg;
1360 	err = fuse_simple_request(fm, &args);
1361 	if (err == -ENOSYS) {
1362 		fm->fc->no_access = 1;
1363 		err = 0;
1364 	}
1365 	return err;
1366 }
1367 
1368 static int fuse_perm_getattr(struct inode *inode, int mask)
1369 {
1370 	if (mask & MAY_NOT_BLOCK)
1371 		return -ECHILD;
1372 
1373 	forget_all_cached_acls(inode);
1374 	return fuse_do_getattr(inode, NULL, NULL);
1375 }
1376 
1377 /*
1378  * Check permission.  The two basic access models of FUSE are:
1379  *
1380  * 1) Local access checking ('default_permissions' mount option) based
1381  * on file mode.  This is the plain old disk filesystem permission
1382  * modell.
1383  *
1384  * 2) "Remote" access checking, where server is responsible for
1385  * checking permission in each inode operation.  An exception to this
1386  * is if ->permission() was invoked from sys_access() in which case an
1387  * access request is sent.  Execute permission is still checked
1388  * locally based on file mode.
1389  */
1390 static int fuse_permission(struct mnt_idmap *idmap,
1391 			   struct inode *inode, int mask)
1392 {
1393 	struct fuse_conn *fc = get_fuse_conn(inode);
1394 	bool refreshed = false;
1395 	int err = 0;
1396 
1397 	if (fuse_is_bad(inode))
1398 		return -EIO;
1399 
1400 	if (!fuse_allow_current_process(fc))
1401 		return -EACCES;
1402 
1403 	/*
1404 	 * If attributes are needed, refresh them before proceeding
1405 	 */
1406 	if (fc->default_permissions ||
1407 	    ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
1408 		struct fuse_inode *fi = get_fuse_inode(inode);
1409 		u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
1410 
1411 		if (perm_mask & READ_ONCE(fi->inval_mask) ||
1412 		    time_before64(fi->i_time, get_jiffies_64())) {
1413 			refreshed = true;
1414 
1415 			err = fuse_perm_getattr(inode, mask);
1416 			if (err)
1417 				return err;
1418 		}
1419 	}
1420 
1421 	if (fc->default_permissions) {
1422 		err = generic_permission(&nop_mnt_idmap, inode, mask);
1423 
1424 		/* If permission is denied, try to refresh file
1425 		   attributes.  This is also needed, because the root
1426 		   node will at first have no permissions */
1427 		if (err == -EACCES && !refreshed) {
1428 			err = fuse_perm_getattr(inode, mask);
1429 			if (!err)
1430 				err = generic_permission(&nop_mnt_idmap,
1431 							 inode, mask);
1432 		}
1433 
1434 		/* Note: the opposite of the above test does not
1435 		   exist.  So if permissions are revoked this won't be
1436 		   noticed immediately, only after the attribute
1437 		   timeout has expired */
1438 	} else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
1439 		err = fuse_access(inode, mask);
1440 	} else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1441 		if (!(inode->i_mode & S_IXUGO)) {
1442 			if (refreshed)
1443 				return -EACCES;
1444 
1445 			err = fuse_perm_getattr(inode, mask);
1446 			if (!err && !(inode->i_mode & S_IXUGO))
1447 				return -EACCES;
1448 		}
1449 	}
1450 	return err;
1451 }
1452 
1453 static int fuse_readlink_page(struct inode *inode, struct page *page)
1454 {
1455 	struct fuse_mount *fm = get_fuse_mount(inode);
1456 	struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1457 	struct fuse_args_pages ap = {
1458 		.num_pages = 1,
1459 		.pages = &page,
1460 		.descs = &desc,
1461 	};
1462 	char *link;
1463 	ssize_t res;
1464 
1465 	ap.args.opcode = FUSE_READLINK;
1466 	ap.args.nodeid = get_node_id(inode);
1467 	ap.args.out_pages = true;
1468 	ap.args.out_argvar = true;
1469 	ap.args.page_zeroing = true;
1470 	ap.args.out_numargs = 1;
1471 	ap.args.out_args[0].size = desc.length;
1472 	res = fuse_simple_request(fm, &ap.args);
1473 
1474 	fuse_invalidate_atime(inode);
1475 
1476 	if (res < 0)
1477 		return res;
1478 
1479 	if (WARN_ON(res >= PAGE_SIZE))
1480 		return -EIO;
1481 
1482 	link = page_address(page);
1483 	link[res] = '\0';
1484 
1485 	return 0;
1486 }
1487 
1488 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1489 				 struct delayed_call *callback)
1490 {
1491 	struct fuse_conn *fc = get_fuse_conn(inode);
1492 	struct page *page;
1493 	int err;
1494 
1495 	err = -EIO;
1496 	if (fuse_is_bad(inode))
1497 		goto out_err;
1498 
1499 	if (fc->cache_symlinks)
1500 		return page_get_link(dentry, inode, callback);
1501 
1502 	err = -ECHILD;
1503 	if (!dentry)
1504 		goto out_err;
1505 
1506 	page = alloc_page(GFP_KERNEL);
1507 	err = -ENOMEM;
1508 	if (!page)
1509 		goto out_err;
1510 
1511 	err = fuse_readlink_page(inode, page);
1512 	if (err) {
1513 		__free_page(page);
1514 		goto out_err;
1515 	}
1516 
1517 	set_delayed_call(callback, page_put_link, page);
1518 
1519 	return page_address(page);
1520 
1521 out_err:
1522 	return ERR_PTR(err);
1523 }
1524 
1525 static int fuse_dir_open(struct inode *inode, struct file *file)
1526 {
1527 	return fuse_open_common(inode, file, true);
1528 }
1529 
1530 static int fuse_dir_release(struct inode *inode, struct file *file)
1531 {
1532 	fuse_release_common(file, true);
1533 
1534 	return 0;
1535 }
1536 
1537 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1538 			  int datasync)
1539 {
1540 	struct inode *inode = file->f_mapping->host;
1541 	struct fuse_conn *fc = get_fuse_conn(inode);
1542 	int err;
1543 
1544 	if (fuse_is_bad(inode))
1545 		return -EIO;
1546 
1547 	if (fc->no_fsyncdir)
1548 		return 0;
1549 
1550 	inode_lock(inode);
1551 	err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1552 	if (err == -ENOSYS) {
1553 		fc->no_fsyncdir = 1;
1554 		err = 0;
1555 	}
1556 	inode_unlock(inode);
1557 
1558 	return err;
1559 }
1560 
1561 static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1562 			    unsigned long arg)
1563 {
1564 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1565 
1566 	/* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1567 	if (fc->minor < 18)
1568 		return -ENOTTY;
1569 
1570 	return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1571 }
1572 
1573 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1574 				   unsigned long arg)
1575 {
1576 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1577 
1578 	if (fc->minor < 18)
1579 		return -ENOTTY;
1580 
1581 	return fuse_ioctl_common(file, cmd, arg,
1582 				 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1583 }
1584 
1585 static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
1586 {
1587 	/* Always update if mtime is explicitly set  */
1588 	if (ivalid & ATTR_MTIME_SET)
1589 		return true;
1590 
1591 	/* Or if kernel i_mtime is the official one */
1592 	if (trust_local_mtime)
1593 		return true;
1594 
1595 	/* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1596 	if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1597 		return false;
1598 
1599 	/* In all other cases update */
1600 	return true;
1601 }
1602 
1603 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1604 			   struct fuse_setattr_in *arg, bool trust_local_cmtime)
1605 {
1606 	unsigned ivalid = iattr->ia_valid;
1607 
1608 	if (ivalid & ATTR_MODE)
1609 		arg->valid |= FATTR_MODE,   arg->mode = iattr->ia_mode;
1610 	if (ivalid & ATTR_UID)
1611 		arg->valid |= FATTR_UID,    arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
1612 	if (ivalid & ATTR_GID)
1613 		arg->valid |= FATTR_GID,    arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
1614 	if (ivalid & ATTR_SIZE)
1615 		arg->valid |= FATTR_SIZE,   arg->size = iattr->ia_size;
1616 	if (ivalid & ATTR_ATIME) {
1617 		arg->valid |= FATTR_ATIME;
1618 		arg->atime = iattr->ia_atime.tv_sec;
1619 		arg->atimensec = iattr->ia_atime.tv_nsec;
1620 		if (!(ivalid & ATTR_ATIME_SET))
1621 			arg->valid |= FATTR_ATIME_NOW;
1622 	}
1623 	if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
1624 		arg->valid |= FATTR_MTIME;
1625 		arg->mtime = iattr->ia_mtime.tv_sec;
1626 		arg->mtimensec = iattr->ia_mtime.tv_nsec;
1627 		if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
1628 			arg->valid |= FATTR_MTIME_NOW;
1629 	}
1630 	if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1631 		arg->valid |= FATTR_CTIME;
1632 		arg->ctime = iattr->ia_ctime.tv_sec;
1633 		arg->ctimensec = iattr->ia_ctime.tv_nsec;
1634 	}
1635 }
1636 
1637 /*
1638  * Prevent concurrent writepages on inode
1639  *
1640  * This is done by adding a negative bias to the inode write counter
1641  * and waiting for all pending writes to finish.
1642  */
1643 void fuse_set_nowrite(struct inode *inode)
1644 {
1645 	struct fuse_inode *fi = get_fuse_inode(inode);
1646 
1647 	BUG_ON(!inode_is_locked(inode));
1648 
1649 	spin_lock(&fi->lock);
1650 	BUG_ON(fi->writectr < 0);
1651 	fi->writectr += FUSE_NOWRITE;
1652 	spin_unlock(&fi->lock);
1653 	wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1654 }
1655 
1656 /*
1657  * Allow writepages on inode
1658  *
1659  * Remove the bias from the writecounter and send any queued
1660  * writepages.
1661  */
1662 static void __fuse_release_nowrite(struct inode *inode)
1663 {
1664 	struct fuse_inode *fi = get_fuse_inode(inode);
1665 
1666 	BUG_ON(fi->writectr != FUSE_NOWRITE);
1667 	fi->writectr = 0;
1668 	fuse_flush_writepages(inode);
1669 }
1670 
1671 void fuse_release_nowrite(struct inode *inode)
1672 {
1673 	struct fuse_inode *fi = get_fuse_inode(inode);
1674 
1675 	spin_lock(&fi->lock);
1676 	__fuse_release_nowrite(inode);
1677 	spin_unlock(&fi->lock);
1678 }
1679 
1680 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
1681 			      struct inode *inode,
1682 			      struct fuse_setattr_in *inarg_p,
1683 			      struct fuse_attr_out *outarg_p)
1684 {
1685 	args->opcode = FUSE_SETATTR;
1686 	args->nodeid = get_node_id(inode);
1687 	args->in_numargs = 1;
1688 	args->in_args[0].size = sizeof(*inarg_p);
1689 	args->in_args[0].value = inarg_p;
1690 	args->out_numargs = 1;
1691 	args->out_args[0].size = sizeof(*outarg_p);
1692 	args->out_args[0].value = outarg_p;
1693 }
1694 
1695 /*
1696  * Flush inode->i_mtime to the server
1697  */
1698 int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
1699 {
1700 	struct fuse_mount *fm = get_fuse_mount(inode);
1701 	FUSE_ARGS(args);
1702 	struct fuse_setattr_in inarg;
1703 	struct fuse_attr_out outarg;
1704 
1705 	memset(&inarg, 0, sizeof(inarg));
1706 	memset(&outarg, 0, sizeof(outarg));
1707 
1708 	inarg.valid = FATTR_MTIME;
1709 	inarg.mtime = inode->i_mtime.tv_sec;
1710 	inarg.mtimensec = inode->i_mtime.tv_nsec;
1711 	if (fm->fc->minor >= 23) {
1712 		inarg.valid |= FATTR_CTIME;
1713 		inarg.ctime = inode->i_ctime.tv_sec;
1714 		inarg.ctimensec = inode->i_ctime.tv_nsec;
1715 	}
1716 	if (ff) {
1717 		inarg.valid |= FATTR_FH;
1718 		inarg.fh = ff->fh;
1719 	}
1720 	fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
1721 
1722 	return fuse_simple_request(fm, &args);
1723 }
1724 
1725 /*
1726  * Set attributes, and at the same time refresh them.
1727  *
1728  * Truncation is slightly complicated, because the 'truncate' request
1729  * may fail, in which case we don't want to touch the mapping.
1730  * vmtruncate() doesn't allow for this case, so do the rlimit checking
1731  * and the actual truncation by hand.
1732  */
1733 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
1734 		    struct file *file)
1735 {
1736 	struct inode *inode = d_inode(dentry);
1737 	struct fuse_mount *fm = get_fuse_mount(inode);
1738 	struct fuse_conn *fc = fm->fc;
1739 	struct fuse_inode *fi = get_fuse_inode(inode);
1740 	struct address_space *mapping = inode->i_mapping;
1741 	FUSE_ARGS(args);
1742 	struct fuse_setattr_in inarg;
1743 	struct fuse_attr_out outarg;
1744 	bool is_truncate = false;
1745 	bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode);
1746 	loff_t oldsize;
1747 	int err;
1748 	bool trust_local_cmtime = is_wb;
1749 	bool fault_blocked = false;
1750 
1751 	if (!fc->default_permissions)
1752 		attr->ia_valid |= ATTR_FORCE;
1753 
1754 	err = setattr_prepare(&nop_mnt_idmap, dentry, attr);
1755 	if (err)
1756 		return err;
1757 
1758 	if (attr->ia_valid & ATTR_SIZE) {
1759 		if (WARN_ON(!S_ISREG(inode->i_mode)))
1760 			return -EIO;
1761 		is_truncate = true;
1762 	}
1763 
1764 	if (FUSE_IS_DAX(inode) && is_truncate) {
1765 		filemap_invalidate_lock(mapping);
1766 		fault_blocked = true;
1767 		err = fuse_dax_break_layouts(inode, 0, 0);
1768 		if (err) {
1769 			filemap_invalidate_unlock(mapping);
1770 			return err;
1771 		}
1772 	}
1773 
1774 	if (attr->ia_valid & ATTR_OPEN) {
1775 		/* This is coming from open(..., ... | O_TRUNC); */
1776 		WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1777 		WARN_ON(attr->ia_size != 0);
1778 		if (fc->atomic_o_trunc) {
1779 			/*
1780 			 * No need to send request to userspace, since actual
1781 			 * truncation has already been done by OPEN.  But still
1782 			 * need to truncate page cache.
1783 			 */
1784 			i_size_write(inode, 0);
1785 			truncate_pagecache(inode, 0);
1786 			goto out;
1787 		}
1788 		file = NULL;
1789 	}
1790 
1791 	/* Flush dirty data/metadata before non-truncate SETATTR */
1792 	if (is_wb &&
1793 	    attr->ia_valid &
1794 			(ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1795 			 ATTR_TIMES_SET)) {
1796 		err = write_inode_now(inode, true);
1797 		if (err)
1798 			return err;
1799 
1800 		fuse_set_nowrite(inode);
1801 		fuse_release_nowrite(inode);
1802 	}
1803 
1804 	if (is_truncate) {
1805 		fuse_set_nowrite(inode);
1806 		set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1807 		if (trust_local_cmtime && attr->ia_size != inode->i_size)
1808 			attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
1809 	}
1810 
1811 	memset(&inarg, 0, sizeof(inarg));
1812 	memset(&outarg, 0, sizeof(outarg));
1813 	iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
1814 	if (file) {
1815 		struct fuse_file *ff = file->private_data;
1816 		inarg.valid |= FATTR_FH;
1817 		inarg.fh = ff->fh;
1818 	}
1819 
1820 	/* Kill suid/sgid for non-directory chown unconditionally */
1821 	if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
1822 	    attr->ia_valid & (ATTR_UID | ATTR_GID))
1823 		inarg.valid |= FATTR_KILL_SUIDGID;
1824 
1825 	if (attr->ia_valid & ATTR_SIZE) {
1826 		/* For mandatory locking in truncate */
1827 		inarg.valid |= FATTR_LOCKOWNER;
1828 		inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1829 
1830 		/* Kill suid/sgid for truncate only if no CAP_FSETID */
1831 		if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1832 			inarg.valid |= FATTR_KILL_SUIDGID;
1833 	}
1834 	fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1835 	err = fuse_simple_request(fm, &args);
1836 	if (err) {
1837 		if (err == -EINTR)
1838 			fuse_invalidate_attr(inode);
1839 		goto error;
1840 	}
1841 
1842 	if (fuse_invalid_attr(&outarg.attr) ||
1843 	    inode_wrong_type(inode, outarg.attr.mode)) {
1844 		fuse_make_bad(inode);
1845 		err = -EIO;
1846 		goto error;
1847 	}
1848 
1849 	spin_lock(&fi->lock);
1850 	/* the kernel maintains i_mtime locally */
1851 	if (trust_local_cmtime) {
1852 		if (attr->ia_valid & ATTR_MTIME)
1853 			inode->i_mtime = attr->ia_mtime;
1854 		if (attr->ia_valid & ATTR_CTIME)
1855 			inode->i_ctime = attr->ia_ctime;
1856 		/* FIXME: clear I_DIRTY_SYNC? */
1857 	}
1858 
1859 	fuse_change_attributes_common(inode, &outarg.attr,
1860 				      ATTR_TIMEOUT(&outarg),
1861 				      fuse_get_cache_mask(inode));
1862 	oldsize = inode->i_size;
1863 	/* see the comment in fuse_change_attributes() */
1864 	if (!is_wb || is_truncate)
1865 		i_size_write(inode, outarg.attr.size);
1866 
1867 	if (is_truncate) {
1868 		/* NOTE: this may release/reacquire fi->lock */
1869 		__fuse_release_nowrite(inode);
1870 	}
1871 	spin_unlock(&fi->lock);
1872 
1873 	/*
1874 	 * Only call invalidate_inode_pages2() after removing
1875 	 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock.
1876 	 */
1877 	if ((is_truncate || !is_wb) &&
1878 	    S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
1879 		truncate_pagecache(inode, outarg.attr.size);
1880 		invalidate_inode_pages2(mapping);
1881 	}
1882 
1883 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1884 out:
1885 	if (fault_blocked)
1886 		filemap_invalidate_unlock(mapping);
1887 
1888 	return 0;
1889 
1890 error:
1891 	if (is_truncate)
1892 		fuse_release_nowrite(inode);
1893 
1894 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1895 
1896 	if (fault_blocked)
1897 		filemap_invalidate_unlock(mapping);
1898 	return err;
1899 }
1900 
1901 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry,
1902 			struct iattr *attr)
1903 {
1904 	struct inode *inode = d_inode(entry);
1905 	struct fuse_conn *fc = get_fuse_conn(inode);
1906 	struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
1907 	int ret;
1908 
1909 	if (fuse_is_bad(inode))
1910 		return -EIO;
1911 
1912 	if (!fuse_allow_current_process(get_fuse_conn(inode)))
1913 		return -EACCES;
1914 
1915 	if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
1916 		attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1917 				    ATTR_MODE);
1918 
1919 		/*
1920 		 * The only sane way to reliably kill suid/sgid is to do it in
1921 		 * the userspace filesystem
1922 		 *
1923 		 * This should be done on write(), truncate() and chown().
1924 		 */
1925 		if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
1926 			/*
1927 			 * ia_mode calculation may have used stale i_mode.
1928 			 * Refresh and recalculate.
1929 			 */
1930 			ret = fuse_do_getattr(inode, NULL, file);
1931 			if (ret)
1932 				return ret;
1933 
1934 			attr->ia_mode = inode->i_mode;
1935 			if (inode->i_mode & S_ISUID) {
1936 				attr->ia_valid |= ATTR_MODE;
1937 				attr->ia_mode &= ~S_ISUID;
1938 			}
1939 			if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
1940 				attr->ia_valid |= ATTR_MODE;
1941 				attr->ia_mode &= ~S_ISGID;
1942 			}
1943 		}
1944 	}
1945 	if (!attr->ia_valid)
1946 		return 0;
1947 
1948 	ret = fuse_do_setattr(entry, attr, file);
1949 	if (!ret) {
1950 		/*
1951 		 * If filesystem supports acls it may have updated acl xattrs in
1952 		 * the filesystem, so forget cached acls for the inode.
1953 		 */
1954 		if (fc->posix_acl)
1955 			forget_all_cached_acls(inode);
1956 
1957 		/* Directory mode changed, may need to revalidate access */
1958 		if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1959 			fuse_invalidate_entry_cache(entry);
1960 	}
1961 	return ret;
1962 }
1963 
1964 static int fuse_getattr(struct mnt_idmap *idmap,
1965 			const struct path *path, struct kstat *stat,
1966 			u32 request_mask, unsigned int flags)
1967 {
1968 	struct inode *inode = d_inode(path->dentry);
1969 	struct fuse_conn *fc = get_fuse_conn(inode);
1970 
1971 	if (fuse_is_bad(inode))
1972 		return -EIO;
1973 
1974 	if (!fuse_allow_current_process(fc)) {
1975 		if (!request_mask) {
1976 			/*
1977 			 * If user explicitly requested *nothing* then don't
1978 			 * error out, but return st_dev only.
1979 			 */
1980 			stat->result_mask = 0;
1981 			stat->dev = inode->i_sb->s_dev;
1982 			return 0;
1983 		}
1984 		return -EACCES;
1985 	}
1986 
1987 	return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
1988 }
1989 
1990 static const struct inode_operations fuse_dir_inode_operations = {
1991 	.lookup		= fuse_lookup,
1992 	.mkdir		= fuse_mkdir,
1993 	.symlink	= fuse_symlink,
1994 	.unlink		= fuse_unlink,
1995 	.rmdir		= fuse_rmdir,
1996 	.rename		= fuse_rename2,
1997 	.link		= fuse_link,
1998 	.setattr	= fuse_setattr,
1999 	.create		= fuse_create,
2000 	.atomic_open	= fuse_atomic_open,
2001 	.tmpfile	= fuse_tmpfile,
2002 	.mknod		= fuse_mknod,
2003 	.permission	= fuse_permission,
2004 	.getattr	= fuse_getattr,
2005 	.listxattr	= fuse_listxattr,
2006 	.get_inode_acl	= fuse_get_inode_acl,
2007 	.get_acl	= fuse_get_acl,
2008 	.set_acl	= fuse_set_acl,
2009 	.fileattr_get	= fuse_fileattr_get,
2010 	.fileattr_set	= fuse_fileattr_set,
2011 };
2012 
2013 static const struct file_operations fuse_dir_operations = {
2014 	.llseek		= generic_file_llseek,
2015 	.read		= generic_read_dir,
2016 	.iterate_shared	= fuse_readdir,
2017 	.open		= fuse_dir_open,
2018 	.release	= fuse_dir_release,
2019 	.fsync		= fuse_dir_fsync,
2020 	.unlocked_ioctl	= fuse_dir_ioctl,
2021 	.compat_ioctl	= fuse_dir_compat_ioctl,
2022 };
2023 
2024 static const struct inode_operations fuse_common_inode_operations = {
2025 	.setattr	= fuse_setattr,
2026 	.permission	= fuse_permission,
2027 	.getattr	= fuse_getattr,
2028 	.listxattr	= fuse_listxattr,
2029 	.get_inode_acl	= fuse_get_inode_acl,
2030 	.get_acl	= fuse_get_acl,
2031 	.set_acl	= fuse_set_acl,
2032 	.fileattr_get	= fuse_fileattr_get,
2033 	.fileattr_set	= fuse_fileattr_set,
2034 };
2035 
2036 static const struct inode_operations fuse_symlink_inode_operations = {
2037 	.setattr	= fuse_setattr,
2038 	.get_link	= fuse_get_link,
2039 	.getattr	= fuse_getattr,
2040 	.listxattr	= fuse_listxattr,
2041 };
2042 
2043 void fuse_init_common(struct inode *inode)
2044 {
2045 	inode->i_op = &fuse_common_inode_operations;
2046 }
2047 
2048 void fuse_init_dir(struct inode *inode)
2049 {
2050 	struct fuse_inode *fi = get_fuse_inode(inode);
2051 
2052 	inode->i_op = &fuse_dir_inode_operations;
2053 	inode->i_fop = &fuse_dir_operations;
2054 
2055 	spin_lock_init(&fi->rdc.lock);
2056 	fi->rdc.cached = false;
2057 	fi->rdc.size = 0;
2058 	fi->rdc.pos = 0;
2059 	fi->rdc.version = 0;
2060 }
2061 
2062 static int fuse_symlink_read_folio(struct file *null, struct folio *folio)
2063 {
2064 	int err = fuse_readlink_page(folio->mapping->host, &folio->page);
2065 
2066 	if (!err)
2067 		folio_mark_uptodate(folio);
2068 
2069 	folio_unlock(folio);
2070 
2071 	return err;
2072 }
2073 
2074 static const struct address_space_operations fuse_symlink_aops = {
2075 	.read_folio	= fuse_symlink_read_folio,
2076 };
2077 
2078 void fuse_init_symlink(struct inode *inode)
2079 {
2080 	inode->i_op = &fuse_symlink_inode_operations;
2081 	inode->i_data.a_ops = &fuse_symlink_aops;
2082 	inode_nohighmem(inode);
2083 }
2084