xref: /openbmc/linux/fs/fuse/cuse.c (revision afb46f79)
1 /*
2  * CUSE: Character device in Userspace
3  *
4  * Copyright (C) 2008-2009  SUSE Linux Products GmbH
5  * Copyright (C) 2008-2009  Tejun Heo <tj@kernel.org>
6  *
7  * This file is released under the GPLv2.
8  *
9  * CUSE enables character devices to be implemented from userland much
10  * like FUSE allows filesystems.  On initialization /dev/cuse is
11  * created.  By opening the file and replying to the CUSE_INIT request
12  * userland CUSE server can create a character device.  After that the
13  * operation is very similar to FUSE.
14  *
15  * A CUSE instance involves the following objects.
16  *
17  * cuse_conn	: contains fuse_conn and serves as bonding structure
18  * channel	: file handle connected to the userland CUSE server
19  * cdev		: the implemented character device
20  * dev		: generic device for cdev
21  *
22  * Note that 'channel' is what 'dev' is in FUSE.  As CUSE deals with
23  * devices, it's called 'channel' to reduce confusion.
24  *
25  * channel determines when the character device dies.  When channel is
26  * closed, everything begins to destruct.  The cuse_conn is taken off
27  * the lookup table preventing further access from cdev, cdev and
28  * generic device are removed and the base reference of cuse_conn is
29  * put.
30  *
31  * On each open, the matching cuse_conn is looked up and if found an
32  * additional reference is taken which is released when the file is
33  * closed.
34  */
35 
36 #include <linux/fuse.h>
37 #include <linux/cdev.h>
38 #include <linux/device.h>
39 #include <linux/file.h>
40 #include <linux/fs.h>
41 #include <linux/aio.h>
42 #include <linux/kdev_t.h>
43 #include <linux/kthread.h>
44 #include <linux/list.h>
45 #include <linux/magic.h>
46 #include <linux/miscdevice.h>
47 #include <linux/mutex.h>
48 #include <linux/slab.h>
49 #include <linux/stat.h>
50 #include <linux/module.h>
51 
52 #include "fuse_i.h"
53 
54 #define CUSE_CONNTBL_LEN	64
55 
56 struct cuse_conn {
57 	struct list_head	list;	/* linked on cuse_conntbl */
58 	struct fuse_conn	fc;	/* fuse connection */
59 	struct cdev		*cdev;	/* associated character device */
60 	struct device		*dev;	/* device representing @cdev */
61 
62 	/* init parameters, set once during initialization */
63 	bool			unrestricted_ioctl;
64 };
65 
66 static DEFINE_MUTEX(cuse_lock);		/* protects registration */
67 static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
68 static struct class *cuse_class;
69 
70 static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
71 {
72 	return container_of(fc, struct cuse_conn, fc);
73 }
74 
75 static struct list_head *cuse_conntbl_head(dev_t devt)
76 {
77 	return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
78 }
79 
80 
81 /**************************************************************************
82  * CUSE frontend operations
83  *
84  * These are file operations for the character device.
85  *
86  * On open, CUSE opens a file from the FUSE mnt and stores it to
87  * private_data of the open file.  All other ops call FUSE ops on the
88  * FUSE file.
89  */
90 
91 static ssize_t cuse_read(struct file *file, char __user *buf, size_t count,
92 			 loff_t *ppos)
93 {
94 	loff_t pos = 0;
95 	struct iovec iov = { .iov_base = buf, .iov_len = count };
96 	struct fuse_io_priv io = { .async = 0, .file = file };
97 
98 	return fuse_direct_io(&io, &iov, 1, count, &pos, FUSE_DIO_CUSE);
99 }
100 
101 static ssize_t cuse_write(struct file *file, const char __user *buf,
102 			  size_t count, loff_t *ppos)
103 {
104 	loff_t pos = 0;
105 	struct iovec iov = { .iov_base = (void __user *)buf, .iov_len = count };
106 	struct fuse_io_priv io = { .async = 0, .file = file };
107 
108 	/*
109 	 * No locking or generic_write_checks(), the server is
110 	 * responsible for locking and sanity checks.
111 	 */
112 	return fuse_direct_io(&io, &iov, 1, count, &pos,
113 			      FUSE_DIO_WRITE | FUSE_DIO_CUSE);
114 }
115 
116 static int cuse_open(struct inode *inode, struct file *file)
117 {
118 	dev_t devt = inode->i_cdev->dev;
119 	struct cuse_conn *cc = NULL, *pos;
120 	int rc;
121 
122 	/* look up and get the connection */
123 	mutex_lock(&cuse_lock);
124 	list_for_each_entry(pos, cuse_conntbl_head(devt), list)
125 		if (pos->dev->devt == devt) {
126 			fuse_conn_get(&pos->fc);
127 			cc = pos;
128 			break;
129 		}
130 	mutex_unlock(&cuse_lock);
131 
132 	/* dead? */
133 	if (!cc)
134 		return -ENODEV;
135 
136 	/*
137 	 * Generic permission check is already done against the chrdev
138 	 * file, proceed to open.
139 	 */
140 	rc = fuse_do_open(&cc->fc, 0, file, 0);
141 	if (rc)
142 		fuse_conn_put(&cc->fc);
143 	return rc;
144 }
145 
146 static int cuse_release(struct inode *inode, struct file *file)
147 {
148 	struct fuse_file *ff = file->private_data;
149 	struct fuse_conn *fc = ff->fc;
150 
151 	fuse_sync_release(ff, file->f_flags);
152 	fuse_conn_put(fc);
153 
154 	return 0;
155 }
156 
157 static long cuse_file_ioctl(struct file *file, unsigned int cmd,
158 			    unsigned long arg)
159 {
160 	struct fuse_file *ff = file->private_data;
161 	struct cuse_conn *cc = fc_to_cc(ff->fc);
162 	unsigned int flags = 0;
163 
164 	if (cc->unrestricted_ioctl)
165 		flags |= FUSE_IOCTL_UNRESTRICTED;
166 
167 	return fuse_do_ioctl(file, cmd, arg, flags);
168 }
169 
170 static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
171 				   unsigned long arg)
172 {
173 	struct fuse_file *ff = file->private_data;
174 	struct cuse_conn *cc = fc_to_cc(ff->fc);
175 	unsigned int flags = FUSE_IOCTL_COMPAT;
176 
177 	if (cc->unrestricted_ioctl)
178 		flags |= FUSE_IOCTL_UNRESTRICTED;
179 
180 	return fuse_do_ioctl(file, cmd, arg, flags);
181 }
182 
183 static const struct file_operations cuse_frontend_fops = {
184 	.owner			= THIS_MODULE,
185 	.read			= cuse_read,
186 	.write			= cuse_write,
187 	.open			= cuse_open,
188 	.release		= cuse_release,
189 	.unlocked_ioctl		= cuse_file_ioctl,
190 	.compat_ioctl		= cuse_file_compat_ioctl,
191 	.poll			= fuse_file_poll,
192 	.llseek		= noop_llseek,
193 };
194 
195 
196 /**************************************************************************
197  * CUSE channel initialization and destruction
198  */
199 
200 struct cuse_devinfo {
201 	const char		*name;
202 };
203 
204 /**
205  * cuse_parse_one - parse one key=value pair
206  * @pp: i/o parameter for the current position
207  * @end: points to one past the end of the packed string
208  * @keyp: out parameter for key
209  * @valp: out parameter for value
210  *
211  * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
212  * at @end - 1.  This function parses one pair and set *@keyp to the
213  * start of the key and *@valp to the start of the value.  Note that
214  * the original string is modified such that the key string is
215  * terminated with '\0'.  *@pp is updated to point to the next string.
216  *
217  * RETURNS:
218  * 1 on successful parse, 0 on EOF, -errno on failure.
219  */
220 static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
221 {
222 	char *p = *pp;
223 	char *key, *val;
224 
225 	while (p < end && *p == '\0')
226 		p++;
227 	if (p == end)
228 		return 0;
229 
230 	if (end[-1] != '\0') {
231 		printk(KERN_ERR "CUSE: info not properly terminated\n");
232 		return -EINVAL;
233 	}
234 
235 	key = val = p;
236 	p += strlen(p);
237 
238 	if (valp) {
239 		strsep(&val, "=");
240 		if (!val)
241 			val = key + strlen(key);
242 		key = strstrip(key);
243 		val = strstrip(val);
244 	} else
245 		key = strstrip(key);
246 
247 	if (!strlen(key)) {
248 		printk(KERN_ERR "CUSE: zero length info key specified\n");
249 		return -EINVAL;
250 	}
251 
252 	*pp = p;
253 	*keyp = key;
254 	if (valp)
255 		*valp = val;
256 
257 	return 1;
258 }
259 
260 /**
261  * cuse_parse_dev_info - parse device info
262  * @p: device info string
263  * @len: length of device info string
264  * @devinfo: out parameter for parsed device info
265  *
266  * Parse @p to extract device info and store it into @devinfo.  String
267  * pointed to by @p is modified by parsing and @devinfo points into
268  * them, so @p shouldn't be freed while @devinfo is in use.
269  *
270  * RETURNS:
271  * 0 on success, -errno on failure.
272  */
273 static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
274 {
275 	char *end = p + len;
276 	char *uninitialized_var(key), *uninitialized_var(val);
277 	int rc;
278 
279 	while (true) {
280 		rc = cuse_parse_one(&p, end, &key, &val);
281 		if (rc < 0)
282 			return rc;
283 		if (!rc)
284 			break;
285 		if (strcmp(key, "DEVNAME") == 0)
286 			devinfo->name = val;
287 		else
288 			printk(KERN_WARNING "CUSE: unknown device info \"%s\"\n",
289 			       key);
290 	}
291 
292 	if (!devinfo->name || !strlen(devinfo->name)) {
293 		printk(KERN_ERR "CUSE: DEVNAME unspecified\n");
294 		return -EINVAL;
295 	}
296 
297 	return 0;
298 }
299 
300 static void cuse_gendev_release(struct device *dev)
301 {
302 	kfree(dev);
303 }
304 
305 /**
306  * cuse_process_init_reply - finish initializing CUSE channel
307  *
308  * This function creates the character device and sets up all the
309  * required data structures for it.  Please read the comment at the
310  * top of this file for high level overview.
311  */
312 static void cuse_process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
313 {
314 	struct cuse_conn *cc = fc_to_cc(fc), *pos;
315 	struct cuse_init_out *arg = req->out.args[0].value;
316 	struct page *page = req->pages[0];
317 	struct cuse_devinfo devinfo = { };
318 	struct device *dev;
319 	struct cdev *cdev;
320 	dev_t devt;
321 	int rc, i;
322 
323 	if (req->out.h.error ||
324 	    arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) {
325 		goto err;
326 	}
327 
328 	fc->minor = arg->minor;
329 	fc->max_read = max_t(unsigned, arg->max_read, 4096);
330 	fc->max_write = max_t(unsigned, arg->max_write, 4096);
331 
332 	/* parse init reply */
333 	cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
334 
335 	rc = cuse_parse_devinfo(page_address(page), req->out.args[1].size,
336 				&devinfo);
337 	if (rc)
338 		goto err;
339 
340 	/* determine and reserve devt */
341 	devt = MKDEV(arg->dev_major, arg->dev_minor);
342 	if (!MAJOR(devt))
343 		rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
344 	else
345 		rc = register_chrdev_region(devt, 1, devinfo.name);
346 	if (rc) {
347 		printk(KERN_ERR "CUSE: failed to register chrdev region\n");
348 		goto err;
349 	}
350 
351 	/* devt determined, create device */
352 	rc = -ENOMEM;
353 	dev = kzalloc(sizeof(*dev), GFP_KERNEL);
354 	if (!dev)
355 		goto err_region;
356 
357 	device_initialize(dev);
358 	dev_set_uevent_suppress(dev, 1);
359 	dev->class = cuse_class;
360 	dev->devt = devt;
361 	dev->release = cuse_gendev_release;
362 	dev_set_drvdata(dev, cc);
363 	dev_set_name(dev, "%s", devinfo.name);
364 
365 	mutex_lock(&cuse_lock);
366 
367 	/* make sure the device-name is unique */
368 	for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
369 		list_for_each_entry(pos, &cuse_conntbl[i], list)
370 			if (!strcmp(dev_name(pos->dev), dev_name(dev)))
371 				goto err_unlock;
372 	}
373 
374 	rc = device_add(dev);
375 	if (rc)
376 		goto err_unlock;
377 
378 	/* register cdev */
379 	rc = -ENOMEM;
380 	cdev = cdev_alloc();
381 	if (!cdev)
382 		goto err_unlock;
383 
384 	cdev->owner = THIS_MODULE;
385 	cdev->ops = &cuse_frontend_fops;
386 
387 	rc = cdev_add(cdev, devt, 1);
388 	if (rc)
389 		goto err_cdev;
390 
391 	cc->dev = dev;
392 	cc->cdev = cdev;
393 
394 	/* make the device available */
395 	list_add(&cc->list, cuse_conntbl_head(devt));
396 	mutex_unlock(&cuse_lock);
397 
398 	/* announce device availability */
399 	dev_set_uevent_suppress(dev, 0);
400 	kobject_uevent(&dev->kobj, KOBJ_ADD);
401 out:
402 	kfree(arg);
403 	__free_page(page);
404 	return;
405 
406 err_cdev:
407 	cdev_del(cdev);
408 err_unlock:
409 	mutex_unlock(&cuse_lock);
410 	put_device(dev);
411 err_region:
412 	unregister_chrdev_region(devt, 1);
413 err:
414 	fuse_conn_kill(fc);
415 	goto out;
416 }
417 
418 static int cuse_send_init(struct cuse_conn *cc)
419 {
420 	int rc;
421 	struct fuse_req *req;
422 	struct page *page;
423 	struct fuse_conn *fc = &cc->fc;
424 	struct cuse_init_in *arg;
425 	void *outarg;
426 
427 	BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
428 
429 	req = fuse_get_req_for_background(fc, 1);
430 	if (IS_ERR(req)) {
431 		rc = PTR_ERR(req);
432 		goto err;
433 	}
434 
435 	rc = -ENOMEM;
436 	page = alloc_page(GFP_KERNEL | __GFP_ZERO);
437 	if (!page)
438 		goto err_put_req;
439 
440 	outarg = kzalloc(sizeof(struct cuse_init_out), GFP_KERNEL);
441 	if (!outarg)
442 		goto err_free_page;
443 
444 	arg = &req->misc.cuse_init_in;
445 	arg->major = FUSE_KERNEL_VERSION;
446 	arg->minor = FUSE_KERNEL_MINOR_VERSION;
447 	arg->flags |= CUSE_UNRESTRICTED_IOCTL;
448 	req->in.h.opcode = CUSE_INIT;
449 	req->in.numargs = 1;
450 	req->in.args[0].size = sizeof(struct cuse_init_in);
451 	req->in.args[0].value = arg;
452 	req->out.numargs = 2;
453 	req->out.args[0].size = sizeof(struct cuse_init_out);
454 	req->out.args[0].value = outarg;
455 	req->out.args[1].size = CUSE_INIT_INFO_MAX;
456 	req->out.argvar = 1;
457 	req->out.argpages = 1;
458 	req->pages[0] = page;
459 	req->page_descs[0].length = req->out.args[1].size;
460 	req->num_pages = 1;
461 	req->end = cuse_process_init_reply;
462 	fuse_request_send_background(fc, req);
463 
464 	return 0;
465 
466 err_free_page:
467 	__free_page(page);
468 err_put_req:
469 	fuse_put_request(fc, req);
470 err:
471 	return rc;
472 }
473 
474 static void cuse_fc_release(struct fuse_conn *fc)
475 {
476 	struct cuse_conn *cc = fc_to_cc(fc);
477 	kfree_rcu(cc, fc.rcu);
478 }
479 
480 /**
481  * cuse_channel_open - open method for /dev/cuse
482  * @inode: inode for /dev/cuse
483  * @file: file struct being opened
484  *
485  * Userland CUSE server can create a CUSE device by opening /dev/cuse
486  * and replying to the initialization request kernel sends.  This
487  * function is responsible for handling CUSE device initialization.
488  * Because the fd opened by this function is used during
489  * initialization, this function only creates cuse_conn and sends
490  * init.  The rest is delegated to a kthread.
491  *
492  * RETURNS:
493  * 0 on success, -errno on failure.
494  */
495 static int cuse_channel_open(struct inode *inode, struct file *file)
496 {
497 	struct cuse_conn *cc;
498 	int rc;
499 
500 	/* set up cuse_conn */
501 	cc = kzalloc(sizeof(*cc), GFP_KERNEL);
502 	if (!cc)
503 		return -ENOMEM;
504 
505 	fuse_conn_init(&cc->fc);
506 
507 	INIT_LIST_HEAD(&cc->list);
508 	cc->fc.release = cuse_fc_release;
509 
510 	cc->fc.connected = 1;
511 	cc->fc.initialized = 1;
512 	rc = cuse_send_init(cc);
513 	if (rc) {
514 		fuse_conn_put(&cc->fc);
515 		return rc;
516 	}
517 	file->private_data = &cc->fc;	/* channel owns base reference to cc */
518 
519 	return 0;
520 }
521 
522 /**
523  * cuse_channel_release - release method for /dev/cuse
524  * @inode: inode for /dev/cuse
525  * @file: file struct being closed
526  *
527  * Disconnect the channel, deregister CUSE device and initiate
528  * destruction by putting the default reference.
529  *
530  * RETURNS:
531  * 0 on success, -errno on failure.
532  */
533 static int cuse_channel_release(struct inode *inode, struct file *file)
534 {
535 	struct cuse_conn *cc = fc_to_cc(file->private_data);
536 	int rc;
537 
538 	/* remove from the conntbl, no more access from this point on */
539 	mutex_lock(&cuse_lock);
540 	list_del_init(&cc->list);
541 	mutex_unlock(&cuse_lock);
542 
543 	/* remove device */
544 	if (cc->dev)
545 		device_unregister(cc->dev);
546 	if (cc->cdev) {
547 		unregister_chrdev_region(cc->cdev->dev, 1);
548 		cdev_del(cc->cdev);
549 	}
550 
551 	rc = fuse_dev_release(inode, file);	/* puts the base reference */
552 
553 	return rc;
554 }
555 
556 static struct file_operations cuse_channel_fops; /* initialized during init */
557 
558 
559 /**************************************************************************
560  * Misc stuff and module initializatiion
561  *
562  * CUSE exports the same set of attributes to sysfs as fusectl.
563  */
564 
565 static ssize_t cuse_class_waiting_show(struct device *dev,
566 				       struct device_attribute *attr, char *buf)
567 {
568 	struct cuse_conn *cc = dev_get_drvdata(dev);
569 
570 	return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
571 }
572 static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
573 
574 static ssize_t cuse_class_abort_store(struct device *dev,
575 				      struct device_attribute *attr,
576 				      const char *buf, size_t count)
577 {
578 	struct cuse_conn *cc = dev_get_drvdata(dev);
579 
580 	fuse_abort_conn(&cc->fc);
581 	return count;
582 }
583 static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
584 
585 static struct attribute *cuse_class_dev_attrs[] = {
586 	&dev_attr_waiting.attr,
587 	&dev_attr_abort.attr,
588 	NULL,
589 };
590 ATTRIBUTE_GROUPS(cuse_class_dev);
591 
592 static struct miscdevice cuse_miscdev = {
593 	.minor		= CUSE_MINOR,
594 	.name		= "cuse",
595 	.fops		= &cuse_channel_fops,
596 };
597 
598 MODULE_ALIAS_MISCDEV(CUSE_MINOR);
599 MODULE_ALIAS("devname:cuse");
600 
601 static int __init cuse_init(void)
602 {
603 	int i, rc;
604 
605 	/* init conntbl */
606 	for (i = 0; i < CUSE_CONNTBL_LEN; i++)
607 		INIT_LIST_HEAD(&cuse_conntbl[i]);
608 
609 	/* inherit and extend fuse_dev_operations */
610 	cuse_channel_fops		= fuse_dev_operations;
611 	cuse_channel_fops.owner		= THIS_MODULE;
612 	cuse_channel_fops.open		= cuse_channel_open;
613 	cuse_channel_fops.release	= cuse_channel_release;
614 
615 	cuse_class = class_create(THIS_MODULE, "cuse");
616 	if (IS_ERR(cuse_class))
617 		return PTR_ERR(cuse_class);
618 
619 	cuse_class->dev_groups = cuse_class_dev_groups;
620 
621 	rc = misc_register(&cuse_miscdev);
622 	if (rc) {
623 		class_destroy(cuse_class);
624 		return rc;
625 	}
626 
627 	return 0;
628 }
629 
630 static void __exit cuse_exit(void)
631 {
632 	misc_deregister(&cuse_miscdev);
633 	class_destroy(cuse_class);
634 }
635 
636 module_init(cuse_init);
637 module_exit(cuse_exit);
638 
639 MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
640 MODULE_DESCRIPTION("Character device in Userspace");
641 MODULE_LICENSE("GPL");
642