xref: /openbmc/linux/fs/fuse/cuse.c (revision adb80490)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * CUSE: Character device in Userspace
4  *
5  * Copyright (C) 2008-2009  SUSE Linux Products GmbH
6  * Copyright (C) 2008-2009  Tejun Heo <tj@kernel.org>
7  *
8  * CUSE enables character devices to be implemented from userland much
9  * like FUSE allows filesystems.  On initialization /dev/cuse is
10  * created.  By opening the file and replying to the CUSE_INIT request
11  * userland CUSE server can create a character device.  After that the
12  * operation is very similar to FUSE.
13  *
14  * A CUSE instance involves the following objects.
15  *
16  * cuse_conn	: contains fuse_conn and serves as bonding structure
17  * channel	: file handle connected to the userland CUSE server
18  * cdev		: the implemented character device
19  * dev		: generic device for cdev
20  *
21  * Note that 'channel' is what 'dev' is in FUSE.  As CUSE deals with
22  * devices, it's called 'channel' to reduce confusion.
23  *
24  * channel determines when the character device dies.  When channel is
25  * closed, everything begins to destruct.  The cuse_conn is taken off
26  * the lookup table preventing further access from cdev, cdev and
27  * generic device are removed and the base reference of cuse_conn is
28  * put.
29  *
30  * On each open, the matching cuse_conn is looked up and if found an
31  * additional reference is taken which is released when the file is
32  * closed.
33  */
34 
35 #define pr_fmt(fmt) "CUSE: " fmt
36 
37 #include <linux/fuse.h>
38 #include <linux/cdev.h>
39 #include <linux/device.h>
40 #include <linux/file.h>
41 #include <linux/fs.h>
42 #include <linux/kdev_t.h>
43 #include <linux/kthread.h>
44 #include <linux/list.h>
45 #include <linux/magic.h>
46 #include <linux/miscdevice.h>
47 #include <linux/mutex.h>
48 #include <linux/slab.h>
49 #include <linux/stat.h>
50 #include <linux/module.h>
51 #include <linux/uio.h>
52 #include <linux/user_namespace.h>
53 
54 #include "fuse_i.h"
55 
56 #define CUSE_CONNTBL_LEN	64
57 
58 struct cuse_conn {
59 	struct list_head	list;	/* linked on cuse_conntbl */
60 	struct fuse_conn	fc;	/* fuse connection */
61 	struct cdev		*cdev;	/* associated character device */
62 	struct device		*dev;	/* device representing @cdev */
63 
64 	/* init parameters, set once during initialization */
65 	bool			unrestricted_ioctl;
66 };
67 
68 static DEFINE_MUTEX(cuse_lock);		/* protects registration */
69 static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
70 static struct class *cuse_class;
71 
72 static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
73 {
74 	return container_of(fc, struct cuse_conn, fc);
75 }
76 
77 static struct list_head *cuse_conntbl_head(dev_t devt)
78 {
79 	return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
80 }
81 
82 
83 /**************************************************************************
84  * CUSE frontend operations
85  *
86  * These are file operations for the character device.
87  *
88  * On open, CUSE opens a file from the FUSE mnt and stores it to
89  * private_data of the open file.  All other ops call FUSE ops on the
90  * FUSE file.
91  */
92 
93 static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
94 {
95 	struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
96 	loff_t pos = 0;
97 
98 	return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
99 }
100 
101 static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
102 {
103 	struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
104 	loff_t pos = 0;
105 	/*
106 	 * No locking or generic_write_checks(), the server is
107 	 * responsible for locking and sanity checks.
108 	 */
109 	return fuse_direct_io(&io, from, &pos,
110 			      FUSE_DIO_WRITE | FUSE_DIO_CUSE);
111 }
112 
113 static int cuse_open(struct inode *inode, struct file *file)
114 {
115 	dev_t devt = inode->i_cdev->dev;
116 	struct cuse_conn *cc = NULL, *pos;
117 	int rc;
118 
119 	/* look up and get the connection */
120 	mutex_lock(&cuse_lock);
121 	list_for_each_entry(pos, cuse_conntbl_head(devt), list)
122 		if (pos->dev->devt == devt) {
123 			fuse_conn_get(&pos->fc);
124 			cc = pos;
125 			break;
126 		}
127 	mutex_unlock(&cuse_lock);
128 
129 	/* dead? */
130 	if (!cc)
131 		return -ENODEV;
132 
133 	/*
134 	 * Generic permission check is already done against the chrdev
135 	 * file, proceed to open.
136 	 */
137 	rc = fuse_do_open(&cc->fc, 0, file, 0);
138 	if (rc)
139 		fuse_conn_put(&cc->fc);
140 	return rc;
141 }
142 
143 static int cuse_release(struct inode *inode, struct file *file)
144 {
145 	struct fuse_inode *fi = get_fuse_inode(inode);
146 	struct fuse_file *ff = file->private_data;
147 	struct fuse_conn *fc = ff->fc;
148 
149 	fuse_sync_release(fi, ff, file->f_flags);
150 	fuse_conn_put(fc);
151 
152 	return 0;
153 }
154 
155 static long cuse_file_ioctl(struct file *file, unsigned int cmd,
156 			    unsigned long arg)
157 {
158 	struct fuse_file *ff = file->private_data;
159 	struct cuse_conn *cc = fc_to_cc(ff->fc);
160 	unsigned int flags = 0;
161 
162 	if (cc->unrestricted_ioctl)
163 		flags |= FUSE_IOCTL_UNRESTRICTED;
164 
165 	return fuse_do_ioctl(file, cmd, arg, flags);
166 }
167 
168 static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
169 				   unsigned long arg)
170 {
171 	struct fuse_file *ff = file->private_data;
172 	struct cuse_conn *cc = fc_to_cc(ff->fc);
173 	unsigned int flags = FUSE_IOCTL_COMPAT;
174 
175 	if (cc->unrestricted_ioctl)
176 		flags |= FUSE_IOCTL_UNRESTRICTED;
177 
178 	return fuse_do_ioctl(file, cmd, arg, flags);
179 }
180 
181 static const struct file_operations cuse_frontend_fops = {
182 	.owner			= THIS_MODULE,
183 	.read_iter		= cuse_read_iter,
184 	.write_iter		= cuse_write_iter,
185 	.open			= cuse_open,
186 	.release		= cuse_release,
187 	.unlocked_ioctl		= cuse_file_ioctl,
188 	.compat_ioctl		= cuse_file_compat_ioctl,
189 	.poll			= fuse_file_poll,
190 	.llseek		= noop_llseek,
191 };
192 
193 
194 /**************************************************************************
195  * CUSE channel initialization and destruction
196  */
197 
198 struct cuse_devinfo {
199 	const char		*name;
200 };
201 
202 /**
203  * cuse_parse_one - parse one key=value pair
204  * @pp: i/o parameter for the current position
205  * @end: points to one past the end of the packed string
206  * @keyp: out parameter for key
207  * @valp: out parameter for value
208  *
209  * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
210  * at @end - 1.  This function parses one pair and set *@keyp to the
211  * start of the key and *@valp to the start of the value.  Note that
212  * the original string is modified such that the key string is
213  * terminated with '\0'.  *@pp is updated to point to the next string.
214  *
215  * RETURNS:
216  * 1 on successful parse, 0 on EOF, -errno on failure.
217  */
218 static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
219 {
220 	char *p = *pp;
221 	char *key, *val;
222 
223 	while (p < end && *p == '\0')
224 		p++;
225 	if (p == end)
226 		return 0;
227 
228 	if (end[-1] != '\0') {
229 		pr_err("info not properly terminated\n");
230 		return -EINVAL;
231 	}
232 
233 	key = val = p;
234 	p += strlen(p);
235 
236 	if (valp) {
237 		strsep(&val, "=");
238 		if (!val)
239 			val = key + strlen(key);
240 		key = strstrip(key);
241 		val = strstrip(val);
242 	} else
243 		key = strstrip(key);
244 
245 	if (!strlen(key)) {
246 		pr_err("zero length info key specified\n");
247 		return -EINVAL;
248 	}
249 
250 	*pp = p;
251 	*keyp = key;
252 	if (valp)
253 		*valp = val;
254 
255 	return 1;
256 }
257 
258 /**
259  * cuse_parse_dev_info - parse device info
260  * @p: device info string
261  * @len: length of device info string
262  * @devinfo: out parameter for parsed device info
263  *
264  * Parse @p to extract device info and store it into @devinfo.  String
265  * pointed to by @p is modified by parsing and @devinfo points into
266  * them, so @p shouldn't be freed while @devinfo is in use.
267  *
268  * RETURNS:
269  * 0 on success, -errno on failure.
270  */
271 static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
272 {
273 	char *end = p + len;
274 	char *uninitialized_var(key), *uninitialized_var(val);
275 	int rc;
276 
277 	while (true) {
278 		rc = cuse_parse_one(&p, end, &key, &val);
279 		if (rc < 0)
280 			return rc;
281 		if (!rc)
282 			break;
283 		if (strcmp(key, "DEVNAME") == 0)
284 			devinfo->name = val;
285 		else
286 			pr_warn("unknown device info \"%s\"\n", key);
287 	}
288 
289 	if (!devinfo->name || !strlen(devinfo->name)) {
290 		pr_err("DEVNAME unspecified\n");
291 		return -EINVAL;
292 	}
293 
294 	return 0;
295 }
296 
297 static void cuse_gendev_release(struct device *dev)
298 {
299 	kfree(dev);
300 }
301 
302 /**
303  * cuse_process_init_reply - finish initializing CUSE channel
304  *
305  * This function creates the character device and sets up all the
306  * required data structures for it.  Please read the comment at the
307  * top of this file for high level overview.
308  */
309 static void cuse_process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
310 {
311 	struct cuse_conn *cc = fc_to_cc(fc), *pos;
312 	struct cuse_init_out *arg = req->out.args[0].value;
313 	struct page *page = req->pages[0];
314 	struct cuse_devinfo devinfo = { };
315 	struct device *dev;
316 	struct cdev *cdev;
317 	dev_t devt;
318 	int rc, i;
319 
320 	if (req->out.h.error ||
321 	    arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) {
322 		goto err;
323 	}
324 
325 	fc->minor = arg->minor;
326 	fc->max_read = max_t(unsigned, arg->max_read, 4096);
327 	fc->max_write = max_t(unsigned, arg->max_write, 4096);
328 
329 	/* parse init reply */
330 	cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
331 
332 	rc = cuse_parse_devinfo(page_address(page), req->out.args[1].size,
333 				&devinfo);
334 	if (rc)
335 		goto err;
336 
337 	/* determine and reserve devt */
338 	devt = MKDEV(arg->dev_major, arg->dev_minor);
339 	if (!MAJOR(devt))
340 		rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
341 	else
342 		rc = register_chrdev_region(devt, 1, devinfo.name);
343 	if (rc) {
344 		pr_err("failed to register chrdev region\n");
345 		goto err;
346 	}
347 
348 	/* devt determined, create device */
349 	rc = -ENOMEM;
350 	dev = kzalloc(sizeof(*dev), GFP_KERNEL);
351 	if (!dev)
352 		goto err_region;
353 
354 	device_initialize(dev);
355 	dev_set_uevent_suppress(dev, 1);
356 	dev->class = cuse_class;
357 	dev->devt = devt;
358 	dev->release = cuse_gendev_release;
359 	dev_set_drvdata(dev, cc);
360 	dev_set_name(dev, "%s", devinfo.name);
361 
362 	mutex_lock(&cuse_lock);
363 
364 	/* make sure the device-name is unique */
365 	for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
366 		list_for_each_entry(pos, &cuse_conntbl[i], list)
367 			if (!strcmp(dev_name(pos->dev), dev_name(dev)))
368 				goto err_unlock;
369 	}
370 
371 	rc = device_add(dev);
372 	if (rc)
373 		goto err_unlock;
374 
375 	/* register cdev */
376 	rc = -ENOMEM;
377 	cdev = cdev_alloc();
378 	if (!cdev)
379 		goto err_unlock;
380 
381 	cdev->owner = THIS_MODULE;
382 	cdev->ops = &cuse_frontend_fops;
383 
384 	rc = cdev_add(cdev, devt, 1);
385 	if (rc)
386 		goto err_cdev;
387 
388 	cc->dev = dev;
389 	cc->cdev = cdev;
390 
391 	/* make the device available */
392 	list_add(&cc->list, cuse_conntbl_head(devt));
393 	mutex_unlock(&cuse_lock);
394 
395 	/* announce device availability */
396 	dev_set_uevent_suppress(dev, 0);
397 	kobject_uevent(&dev->kobj, KOBJ_ADD);
398 out:
399 	kfree(arg);
400 	__free_page(page);
401 	return;
402 
403 err_cdev:
404 	cdev_del(cdev);
405 err_unlock:
406 	mutex_unlock(&cuse_lock);
407 	put_device(dev);
408 err_region:
409 	unregister_chrdev_region(devt, 1);
410 err:
411 	fuse_abort_conn(fc);
412 	goto out;
413 }
414 
415 static int cuse_send_init(struct cuse_conn *cc)
416 {
417 	int rc;
418 	struct fuse_req *req;
419 	struct page *page;
420 	struct fuse_conn *fc = &cc->fc;
421 	struct cuse_init_in *arg;
422 	void *outarg;
423 
424 	BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
425 
426 	req = fuse_get_req_for_background(fc, 1);
427 	if (IS_ERR(req)) {
428 		rc = PTR_ERR(req);
429 		goto err;
430 	}
431 
432 	rc = -ENOMEM;
433 	page = alloc_page(GFP_KERNEL | __GFP_ZERO);
434 	if (!page)
435 		goto err_put_req;
436 
437 	outarg = kzalloc(sizeof(struct cuse_init_out), GFP_KERNEL);
438 	if (!outarg)
439 		goto err_free_page;
440 
441 	arg = &req->misc.cuse_init_in;
442 	arg->major = FUSE_KERNEL_VERSION;
443 	arg->minor = FUSE_KERNEL_MINOR_VERSION;
444 	arg->flags |= CUSE_UNRESTRICTED_IOCTL;
445 	req->in.h.opcode = CUSE_INIT;
446 	req->in.numargs = 1;
447 	req->in.args[0].size = sizeof(struct cuse_init_in);
448 	req->in.args[0].value = arg;
449 	req->out.numargs = 2;
450 	req->out.args[0].size = sizeof(struct cuse_init_out);
451 	req->out.args[0].value = outarg;
452 	req->out.args[1].size = CUSE_INIT_INFO_MAX;
453 	req->out.argvar = 1;
454 	req->out.argpages = 1;
455 	req->pages[0] = page;
456 	req->page_descs[0].length = req->out.args[1].size;
457 	req->num_pages = 1;
458 	req->end = cuse_process_init_reply;
459 	fuse_request_send_background(fc, req);
460 
461 	return 0;
462 
463 err_free_page:
464 	__free_page(page);
465 err_put_req:
466 	fuse_put_request(fc, req);
467 err:
468 	return rc;
469 }
470 
471 static void cuse_fc_release(struct fuse_conn *fc)
472 {
473 	struct cuse_conn *cc = fc_to_cc(fc);
474 	kfree_rcu(cc, fc.rcu);
475 }
476 
477 /**
478  * cuse_channel_open - open method for /dev/cuse
479  * @inode: inode for /dev/cuse
480  * @file: file struct being opened
481  *
482  * Userland CUSE server can create a CUSE device by opening /dev/cuse
483  * and replying to the initialization request kernel sends.  This
484  * function is responsible for handling CUSE device initialization.
485  * Because the fd opened by this function is used during
486  * initialization, this function only creates cuse_conn and sends
487  * init.  The rest is delegated to a kthread.
488  *
489  * RETURNS:
490  * 0 on success, -errno on failure.
491  */
492 static int cuse_channel_open(struct inode *inode, struct file *file)
493 {
494 	struct fuse_dev *fud;
495 	struct cuse_conn *cc;
496 	int rc;
497 
498 	/* set up cuse_conn */
499 	cc = kzalloc(sizeof(*cc), GFP_KERNEL);
500 	if (!cc)
501 		return -ENOMEM;
502 
503 	/*
504 	 * Limit the cuse channel to requests that can
505 	 * be represented in file->f_cred->user_ns.
506 	 */
507 	fuse_conn_init(&cc->fc, file->f_cred->user_ns);
508 
509 	fud = fuse_dev_alloc(&cc->fc);
510 	if (!fud) {
511 		kfree(cc);
512 		return -ENOMEM;
513 	}
514 
515 	INIT_LIST_HEAD(&cc->list);
516 	cc->fc.release = cuse_fc_release;
517 
518 	cc->fc.initialized = 1;
519 	rc = cuse_send_init(cc);
520 	if (rc) {
521 		fuse_dev_free(fud);
522 		return rc;
523 	}
524 	file->private_data = fud;
525 
526 	return 0;
527 }
528 
529 /**
530  * cuse_channel_release - release method for /dev/cuse
531  * @inode: inode for /dev/cuse
532  * @file: file struct being closed
533  *
534  * Disconnect the channel, deregister CUSE device and initiate
535  * destruction by putting the default reference.
536  *
537  * RETURNS:
538  * 0 on success, -errno on failure.
539  */
540 static int cuse_channel_release(struct inode *inode, struct file *file)
541 {
542 	struct fuse_dev *fud = file->private_data;
543 	struct cuse_conn *cc = fc_to_cc(fud->fc);
544 	int rc;
545 
546 	/* remove from the conntbl, no more access from this point on */
547 	mutex_lock(&cuse_lock);
548 	list_del_init(&cc->list);
549 	mutex_unlock(&cuse_lock);
550 
551 	/* remove device */
552 	if (cc->dev)
553 		device_unregister(cc->dev);
554 	if (cc->cdev) {
555 		unregister_chrdev_region(cc->cdev->dev, 1);
556 		cdev_del(cc->cdev);
557 	}
558 	/* Base reference is now owned by "fud" */
559 	fuse_conn_put(&cc->fc);
560 
561 	rc = fuse_dev_release(inode, file);	/* puts the base reference */
562 
563 	return rc;
564 }
565 
566 static struct file_operations cuse_channel_fops; /* initialized during init */
567 
568 
569 /**************************************************************************
570  * Misc stuff and module initializatiion
571  *
572  * CUSE exports the same set of attributes to sysfs as fusectl.
573  */
574 
575 static ssize_t cuse_class_waiting_show(struct device *dev,
576 				       struct device_attribute *attr, char *buf)
577 {
578 	struct cuse_conn *cc = dev_get_drvdata(dev);
579 
580 	return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
581 }
582 static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
583 
584 static ssize_t cuse_class_abort_store(struct device *dev,
585 				      struct device_attribute *attr,
586 				      const char *buf, size_t count)
587 {
588 	struct cuse_conn *cc = dev_get_drvdata(dev);
589 
590 	fuse_abort_conn(&cc->fc);
591 	return count;
592 }
593 static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
594 
595 static struct attribute *cuse_class_dev_attrs[] = {
596 	&dev_attr_waiting.attr,
597 	&dev_attr_abort.attr,
598 	NULL,
599 };
600 ATTRIBUTE_GROUPS(cuse_class_dev);
601 
602 static struct miscdevice cuse_miscdev = {
603 	.minor		= CUSE_MINOR,
604 	.name		= "cuse",
605 	.fops		= &cuse_channel_fops,
606 };
607 
608 MODULE_ALIAS_MISCDEV(CUSE_MINOR);
609 MODULE_ALIAS("devname:cuse");
610 
611 static int __init cuse_init(void)
612 {
613 	int i, rc;
614 
615 	/* init conntbl */
616 	for (i = 0; i < CUSE_CONNTBL_LEN; i++)
617 		INIT_LIST_HEAD(&cuse_conntbl[i]);
618 
619 	/* inherit and extend fuse_dev_operations */
620 	cuse_channel_fops		= fuse_dev_operations;
621 	cuse_channel_fops.owner		= THIS_MODULE;
622 	cuse_channel_fops.open		= cuse_channel_open;
623 	cuse_channel_fops.release	= cuse_channel_release;
624 
625 	cuse_class = class_create(THIS_MODULE, "cuse");
626 	if (IS_ERR(cuse_class))
627 		return PTR_ERR(cuse_class);
628 
629 	cuse_class->dev_groups = cuse_class_dev_groups;
630 
631 	rc = misc_register(&cuse_miscdev);
632 	if (rc) {
633 		class_destroy(cuse_class);
634 		return rc;
635 	}
636 
637 	return 0;
638 }
639 
640 static void __exit cuse_exit(void)
641 {
642 	misc_deregister(&cuse_miscdev);
643 	class_destroy(cuse_class);
644 }
645 
646 module_init(cuse_init);
647 module_exit(cuse_exit);
648 
649 MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
650 MODULE_DESCRIPTION("Character device in Userspace");
651 MODULE_LICENSE("GPL");
652