dir.c (49438B)
1/* 2 FUSE: Filesystem in Userspace 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu> 4 5 This program can be distributed under the terms of the GNU GPL. 6 See the file COPYING. 7*/ 8 9#include "fuse_i.h" 10 11#include <linux/pagemap.h> 12#include <linux/file.h> 13#include <linux/fs_context.h> 14#include <linux/sched.h> 15#include <linux/namei.h> 16#include <linux/slab.h> 17#include <linux/xattr.h> 18#include <linux/iversion.h> 19#include <linux/posix_acl.h> 20#include <linux/security.h> 21#include <linux/types.h> 22#include <linux/kernel.h> 23 24static void fuse_advise_use_readdirplus(struct inode *dir) 25{ 26 struct fuse_inode *fi = get_fuse_inode(dir); 27 28 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state); 29} 30 31#if BITS_PER_LONG >= 64 32static inline void __fuse_dentry_settime(struct dentry *entry, u64 time) 33{ 34 entry->d_fsdata = (void *) time; 35} 36 37static inline u64 fuse_dentry_time(const struct dentry *entry) 38{ 39 return (u64)entry->d_fsdata; 40} 41 42#else 43union fuse_dentry { 44 u64 time; 45 struct rcu_head rcu; 46}; 47 48static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time) 49{ 50 ((union fuse_dentry *) dentry->d_fsdata)->time = time; 51} 52 53static inline u64 fuse_dentry_time(const struct dentry *entry) 54{ 55 return ((union fuse_dentry *) entry->d_fsdata)->time; 56} 57#endif 58 59static void fuse_dentry_settime(struct dentry *dentry, u64 time) 60{ 61 struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb); 62 bool delete = !time && fc->delete_stale; 63 /* 64 * Mess with DCACHE_OP_DELETE because dput() will be faster without it. 65 * Don't care about races, either way it's just an optimization 66 */ 67 if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) || 68 (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) { 69 spin_lock(&dentry->d_lock); 70 if (!delete) 71 dentry->d_flags &= ~DCACHE_OP_DELETE; 72 else 73 dentry->d_flags |= DCACHE_OP_DELETE; 74 spin_unlock(&dentry->d_lock); 75 } 76 77 __fuse_dentry_settime(dentry, time); 78} 79 80/* 81 * FUSE caches dentries and attributes with separate timeout. The 82 * time in jiffies until the dentry/attributes are valid is stored in 83 * dentry->d_fsdata and fuse_inode->i_time respectively. 84 */ 85 86/* 87 * Calculate the time in jiffies until a dentry/attributes are valid 88 */ 89static u64 time_to_jiffies(u64 sec, u32 nsec) 90{ 91 if (sec || nsec) { 92 struct timespec64 ts = { 93 sec, 94 min_t(u32, nsec, NSEC_PER_SEC - 1) 95 }; 96 97 return get_jiffies_64() + timespec64_to_jiffies(&ts); 98 } else 99 return 0; 100} 101 102/* 103 * Set dentry and possibly attribute timeouts from the lookup/mk* 104 * replies 105 */ 106void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o) 107{ 108 fuse_dentry_settime(entry, 109 time_to_jiffies(o->entry_valid, o->entry_valid_nsec)); 110} 111 112static u64 attr_timeout(struct fuse_attr_out *o) 113{ 114 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); 115} 116 117u64 entry_attr_timeout(struct fuse_entry_out *o) 118{ 119 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec); 120} 121 122void fuse_invalidate_attr_mask(struct inode *inode, u32 mask) 123{ 124 set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask); 125} 126 127/* 128 * Mark the attributes as stale, so that at the next call to 129 * ->getattr() they will be fetched from userspace 130 */ 131void fuse_invalidate_attr(struct inode *inode) 132{ 133 fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS); 134} 135 136static void fuse_dir_changed(struct inode *dir) 137{ 138 fuse_invalidate_attr(dir); 139 inode_maybe_inc_iversion(dir, false); 140} 141 142/** 143 * Mark the attributes as stale due to an atime change. Avoid the invalidate if 144 * atime is not used. 145 */ 146void fuse_invalidate_atime(struct inode *inode) 147{ 148 if (!IS_RDONLY(inode)) 149 fuse_invalidate_attr_mask(inode, STATX_ATIME); 150} 151 152/* 153 * Just mark the entry as stale, so that a next attempt to look it up 154 * will result in a new lookup call to userspace 155 * 156 * This is called when a dentry is about to become negative and the 157 * timeout is unknown (unlink, rmdir, rename and in some cases 158 * lookup) 159 */ 160void fuse_invalidate_entry_cache(struct dentry *entry) 161{ 162 fuse_dentry_settime(entry, 0); 163} 164 165/* 166 * Same as fuse_invalidate_entry_cache(), but also try to remove the 167 * dentry from the hash 168 */ 169static void fuse_invalidate_entry(struct dentry *entry) 170{ 171 d_invalidate(entry); 172 fuse_invalidate_entry_cache(entry); 173} 174 175static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args, 176 u64 nodeid, const struct qstr *name, 177 struct fuse_entry_out *outarg) 178{ 179 memset(outarg, 0, sizeof(struct fuse_entry_out)); 180 args->opcode = FUSE_LOOKUP; 181 args->nodeid = nodeid; 182 args->in_numargs = 1; 183 args->in_args[0].size = name->len + 1; 184 args->in_args[0].value = name->name; 185 args->out_numargs = 1; 186 args->out_args[0].size = sizeof(struct fuse_entry_out); 187 args->out_args[0].value = outarg; 188} 189 190/* 191 * Check whether the dentry is still valid 192 * 193 * If the entry validity timeout has expired and the dentry is 194 * positive, try to redo the lookup. If the lookup results in a 195 * different inode, then let the VFS invalidate the dentry and redo 196 * the lookup once more. If the lookup results in the same inode, 197 * then refresh the attributes, timeouts and mark the dentry valid. 198 */ 199static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags) 200{ 201 struct inode *inode; 202 struct dentry *parent; 203 struct fuse_mount *fm; 204 struct fuse_inode *fi; 205 int ret; 206 207 inode = d_inode_rcu(entry); 208 if (inode && fuse_is_bad(inode)) 209 goto invalid; 210 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) || 211 (flags & (LOOKUP_EXCL | LOOKUP_REVAL))) { 212 struct fuse_entry_out outarg; 213 FUSE_ARGS(args); 214 struct fuse_forget_link *forget; 215 u64 attr_version; 216 217 /* For negative dentries, always do a fresh lookup */ 218 if (!inode) 219 goto invalid; 220 221 ret = -ECHILD; 222 if (flags & LOOKUP_RCU) 223 goto out; 224 225 fm = get_fuse_mount(inode); 226 227 forget = fuse_alloc_forget(); 228 ret = -ENOMEM; 229 if (!forget) 230 goto out; 231 232 attr_version = fuse_get_attr_version(fm->fc); 233 234 parent = dget_parent(entry); 235 fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)), 236 &entry->d_name, &outarg); 237 ret = fuse_simple_request(fm, &args); 238 dput(parent); 239 /* Zero nodeid is same as -ENOENT */ 240 if (!ret && !outarg.nodeid) 241 ret = -ENOENT; 242 if (!ret) { 243 fi = get_fuse_inode(inode); 244 if (outarg.nodeid != get_node_id(inode) || 245 (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) { 246 fuse_queue_forget(fm->fc, forget, 247 outarg.nodeid, 1); 248 goto invalid; 249 } 250 spin_lock(&fi->lock); 251 fi->nlookup++; 252 spin_unlock(&fi->lock); 253 } 254 kfree(forget); 255 if (ret == -ENOMEM) 256 goto out; 257 if (ret || fuse_invalid_attr(&outarg.attr) || 258 fuse_stale_inode(inode, outarg.generation, &outarg.attr)) 259 goto invalid; 260 261 forget_all_cached_acls(inode); 262 fuse_change_attributes(inode, &outarg.attr, 263 entry_attr_timeout(&outarg), 264 attr_version); 265 fuse_change_entry_timeout(entry, &outarg); 266 } else if (inode) { 267 fi = get_fuse_inode(inode); 268 if (flags & LOOKUP_RCU) { 269 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state)) 270 return -ECHILD; 271 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) { 272 parent = dget_parent(entry); 273 fuse_advise_use_readdirplus(d_inode(parent)); 274 dput(parent); 275 } 276 } 277 ret = 1; 278out: 279 return ret; 280 281invalid: 282 ret = 0; 283 goto out; 284} 285 286#if BITS_PER_LONG < 64 287static int fuse_dentry_init(struct dentry *dentry) 288{ 289 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), 290 GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE); 291 292 return dentry->d_fsdata ? 0 : -ENOMEM; 293} 294static void fuse_dentry_release(struct dentry *dentry) 295{ 296 union fuse_dentry *fd = dentry->d_fsdata; 297 298 kfree_rcu(fd, rcu); 299} 300#endif 301 302static int fuse_dentry_delete(const struct dentry *dentry) 303{ 304 return time_before64(fuse_dentry_time(dentry), get_jiffies_64()); 305} 306 307/* 308 * Create a fuse_mount object with a new superblock (with path->dentry 309 * as the root), and return that mount so it can be auto-mounted on 310 * @path. 311 */ 312static struct vfsmount *fuse_dentry_automount(struct path *path) 313{ 314 struct fs_context *fsc; 315 struct vfsmount *mnt; 316 struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry)); 317 318 fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry); 319 if (IS_ERR(fsc)) 320 return ERR_CAST(fsc); 321 322 /* Pass the FUSE inode of the mount for fuse_get_tree_submount() */ 323 fsc->fs_private = mp_fi; 324 325 /* Create the submount */ 326 mnt = fc_mount(fsc); 327 if (!IS_ERR(mnt)) 328 mntget(mnt); 329 330 put_fs_context(fsc); 331 return mnt; 332} 333 334const struct dentry_operations fuse_dentry_operations = { 335 .d_revalidate = fuse_dentry_revalidate, 336 .d_delete = fuse_dentry_delete, 337#if BITS_PER_LONG < 64 338 .d_init = fuse_dentry_init, 339 .d_release = fuse_dentry_release, 340#endif 341 .d_automount = fuse_dentry_automount, 342}; 343 344const struct dentry_operations fuse_root_dentry_operations = { 345#if BITS_PER_LONG < 64 346 .d_init = fuse_dentry_init, 347 .d_release = fuse_dentry_release, 348#endif 349}; 350 351int fuse_valid_type(int m) 352{ 353 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) || 354 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m); 355} 356 357bool fuse_invalid_attr(struct fuse_attr *attr) 358{ 359 return !fuse_valid_type(attr->mode) || 360 attr->size > LLONG_MAX; 361} 362 363int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name, 364 struct fuse_entry_out *outarg, struct inode **inode) 365{ 366 struct fuse_mount *fm = get_fuse_mount_super(sb); 367 FUSE_ARGS(args); 368 struct fuse_forget_link *forget; 369 u64 attr_version; 370 int err; 371 372 *inode = NULL; 373 err = -ENAMETOOLONG; 374 if (name->len > FUSE_NAME_MAX) 375 goto out; 376 377 378 forget = fuse_alloc_forget(); 379 err = -ENOMEM; 380 if (!forget) 381 goto out; 382 383 attr_version = fuse_get_attr_version(fm->fc); 384 385 fuse_lookup_init(fm->fc, &args, nodeid, name, outarg); 386 err = fuse_simple_request(fm, &args); 387 /* Zero nodeid is same as -ENOENT, but with valid timeout */ 388 if (err || !outarg->nodeid) 389 goto out_put_forget; 390 391 err = -EIO; 392 if (!outarg->nodeid) 393 goto out_put_forget; 394 if (fuse_invalid_attr(&outarg->attr)) 395 goto out_put_forget; 396 397 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation, 398 &outarg->attr, entry_attr_timeout(outarg), 399 attr_version); 400 err = -ENOMEM; 401 if (!*inode) { 402 fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1); 403 goto out; 404 } 405 err = 0; 406 407 out_put_forget: 408 kfree(forget); 409 out: 410 return err; 411} 412 413static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry, 414 unsigned int flags) 415{ 416 int err; 417 struct fuse_entry_out outarg; 418 struct inode *inode; 419 struct dentry *newent; 420 bool outarg_valid = true; 421 bool locked; 422 423 if (fuse_is_bad(dir)) 424 return ERR_PTR(-EIO); 425 426 locked = fuse_lock_inode(dir); 427 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name, 428 &outarg, &inode); 429 fuse_unlock_inode(dir, locked); 430 if (err == -ENOENT) { 431 outarg_valid = false; 432 err = 0; 433 } 434 if (err) 435 goto out_err; 436 437 err = -EIO; 438 if (inode && get_node_id(inode) == FUSE_ROOT_ID) 439 goto out_iput; 440 441 newent = d_splice_alias(inode, entry); 442 err = PTR_ERR(newent); 443 if (IS_ERR(newent)) 444 goto out_err; 445 446 entry = newent ? newent : entry; 447 if (outarg_valid) 448 fuse_change_entry_timeout(entry, &outarg); 449 else 450 fuse_invalidate_entry_cache(entry); 451 452 if (inode) 453 fuse_advise_use_readdirplus(dir); 454 return newent; 455 456 out_iput: 457 iput(inode); 458 out_err: 459 return ERR_PTR(err); 460} 461 462static int get_security_context(struct dentry *entry, umode_t mode, 463 void **security_ctx, u32 *security_ctxlen) 464{ 465 struct fuse_secctx *fctx; 466 struct fuse_secctx_header *header; 467 void *ctx = NULL, *ptr; 468 u32 ctxlen, total_len = sizeof(*header); 469 int err, nr_ctx = 0; 470 const char *name; 471 size_t namelen; 472 473 err = security_dentry_init_security(entry, mode, &entry->d_name, 474 &name, &ctx, &ctxlen); 475 if (err) { 476 if (err != -EOPNOTSUPP) 477 goto out_err; 478 /* No LSM is supporting this security hook. Ignore error */ 479 ctxlen = 0; 480 ctx = NULL; 481 } 482 483 if (ctxlen) { 484 nr_ctx = 1; 485 namelen = strlen(name) + 1; 486 err = -EIO; 487 if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX)) 488 goto out_err; 489 total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen); 490 } 491 492 err = -ENOMEM; 493 header = ptr = kzalloc(total_len, GFP_KERNEL); 494 if (!ptr) 495 goto out_err; 496 497 header->nr_secctx = nr_ctx; 498 header->size = total_len; 499 ptr += sizeof(*header); 500 if (nr_ctx) { 501 fctx = ptr; 502 fctx->size = ctxlen; 503 ptr += sizeof(*fctx); 504 505 strcpy(ptr, name); 506 ptr += namelen; 507 508 memcpy(ptr, ctx, ctxlen); 509 } 510 *security_ctxlen = total_len; 511 *security_ctx = header; 512 err = 0; 513out_err: 514 kfree(ctx); 515 return err; 516} 517 518/* 519 * Atomic create+open operation 520 * 521 * If the filesystem doesn't support this, then fall back to separate 522 * 'mknod' + 'open' requests. 523 */ 524static int fuse_create_open(struct inode *dir, struct dentry *entry, 525 struct file *file, unsigned int flags, 526 umode_t mode) 527{ 528 int err; 529 struct inode *inode; 530 struct fuse_mount *fm = get_fuse_mount(dir); 531 FUSE_ARGS(args); 532 struct fuse_forget_link *forget; 533 struct fuse_create_in inarg; 534 struct fuse_open_out outopen; 535 struct fuse_entry_out outentry; 536 struct fuse_inode *fi; 537 struct fuse_file *ff; 538 void *security_ctx = NULL; 539 u32 security_ctxlen; 540 541 /* Userspace expects S_IFREG in create mode */ 542 BUG_ON((mode & S_IFMT) != S_IFREG); 543 544 forget = fuse_alloc_forget(); 545 err = -ENOMEM; 546 if (!forget) 547 goto out_err; 548 549 err = -ENOMEM; 550 ff = fuse_file_alloc(fm); 551 if (!ff) 552 goto out_put_forget_req; 553 554 if (!fm->fc->dont_mask) 555 mode &= ~current_umask(); 556 557 flags &= ~O_NOCTTY; 558 memset(&inarg, 0, sizeof(inarg)); 559 memset(&outentry, 0, sizeof(outentry)); 560 inarg.flags = flags; 561 inarg.mode = mode; 562 inarg.umask = current_umask(); 563 564 if (fm->fc->handle_killpriv_v2 && (flags & O_TRUNC) && 565 !(flags & O_EXCL) && !capable(CAP_FSETID)) { 566 inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID; 567 } 568 569 args.opcode = FUSE_CREATE; 570 args.nodeid = get_node_id(dir); 571 args.in_numargs = 2; 572 args.in_args[0].size = sizeof(inarg); 573 args.in_args[0].value = &inarg; 574 args.in_args[1].size = entry->d_name.len + 1; 575 args.in_args[1].value = entry->d_name.name; 576 args.out_numargs = 2; 577 args.out_args[0].size = sizeof(outentry); 578 args.out_args[0].value = &outentry; 579 args.out_args[1].size = sizeof(outopen); 580 args.out_args[1].value = &outopen; 581 582 if (fm->fc->init_security) { 583 err = get_security_context(entry, mode, &security_ctx, 584 &security_ctxlen); 585 if (err) 586 goto out_put_forget_req; 587 588 args.in_numargs = 3; 589 args.in_args[2].size = security_ctxlen; 590 args.in_args[2].value = security_ctx; 591 } 592 593 err = fuse_simple_request(fm, &args); 594 kfree(security_ctx); 595 if (err) 596 goto out_free_ff; 597 598 err = -EIO; 599 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) || 600 fuse_invalid_attr(&outentry.attr)) 601 goto out_free_ff; 602 603 ff->fh = outopen.fh; 604 ff->nodeid = outentry.nodeid; 605 ff->open_flags = outopen.open_flags; 606 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation, 607 &outentry.attr, entry_attr_timeout(&outentry), 0); 608 if (!inode) { 609 flags &= ~(O_CREAT | O_EXCL | O_TRUNC); 610 fuse_sync_release(NULL, ff, flags); 611 fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1); 612 err = -ENOMEM; 613 goto out_err; 614 } 615 kfree(forget); 616 d_instantiate(entry, inode); 617 fuse_change_entry_timeout(entry, &outentry); 618 fuse_dir_changed(dir); 619 err = finish_open(file, entry, generic_file_open); 620 if (err) { 621 fi = get_fuse_inode(inode); 622 fuse_sync_release(fi, ff, flags); 623 } else { 624 file->private_data = ff; 625 fuse_finish_open(inode, file); 626 } 627 return err; 628 629out_free_ff: 630 fuse_file_free(ff); 631out_put_forget_req: 632 kfree(forget); 633out_err: 634 return err; 635} 636 637static int fuse_mknod(struct user_namespace *, struct inode *, struct dentry *, 638 umode_t, dev_t); 639static int fuse_atomic_open(struct inode *dir, struct dentry *entry, 640 struct file *file, unsigned flags, 641 umode_t mode) 642{ 643 int err; 644 struct fuse_conn *fc = get_fuse_conn(dir); 645 struct dentry *res = NULL; 646 647 if (fuse_is_bad(dir)) 648 return -EIO; 649 650 if (d_in_lookup(entry)) { 651 res = fuse_lookup(dir, entry, 0); 652 if (IS_ERR(res)) 653 return PTR_ERR(res); 654 655 if (res) 656 entry = res; 657 } 658 659 if (!(flags & O_CREAT) || d_really_is_positive(entry)) 660 goto no_open; 661 662 /* Only creates */ 663 file->f_mode |= FMODE_CREATED; 664 665 if (fc->no_create) 666 goto mknod; 667 668 err = fuse_create_open(dir, entry, file, flags, mode); 669 if (err == -ENOSYS) { 670 fc->no_create = 1; 671 goto mknod; 672 } 673out_dput: 674 dput(res); 675 return err; 676 677mknod: 678 err = fuse_mknod(&init_user_ns, dir, entry, mode, 0); 679 if (err) 680 goto out_dput; 681no_open: 682 return finish_no_open(file, res); 683} 684 685/* 686 * Code shared between mknod, mkdir, symlink and link 687 */ 688static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args, 689 struct inode *dir, struct dentry *entry, 690 umode_t mode) 691{ 692 struct fuse_entry_out outarg; 693 struct inode *inode; 694 struct dentry *d; 695 int err; 696 struct fuse_forget_link *forget; 697 void *security_ctx = NULL; 698 u32 security_ctxlen; 699 700 if (fuse_is_bad(dir)) 701 return -EIO; 702 703 forget = fuse_alloc_forget(); 704 if (!forget) 705 return -ENOMEM; 706 707 memset(&outarg, 0, sizeof(outarg)); 708 args->nodeid = get_node_id(dir); 709 args->out_numargs = 1; 710 args->out_args[0].size = sizeof(outarg); 711 args->out_args[0].value = &outarg; 712 713 if (fm->fc->init_security && args->opcode != FUSE_LINK) { 714 err = get_security_context(entry, mode, &security_ctx, 715 &security_ctxlen); 716 if (err) 717 goto out_put_forget_req; 718 719 BUG_ON(args->in_numargs != 2); 720 721 args->in_numargs = 3; 722 args->in_args[2].size = security_ctxlen; 723 args->in_args[2].value = security_ctx; 724 } 725 726 err = fuse_simple_request(fm, args); 727 kfree(security_ctx); 728 if (err) 729 goto out_put_forget_req; 730 731 err = -EIO; 732 if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr)) 733 goto out_put_forget_req; 734 735 if ((outarg.attr.mode ^ mode) & S_IFMT) 736 goto out_put_forget_req; 737 738 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation, 739 &outarg.attr, entry_attr_timeout(&outarg), 0); 740 if (!inode) { 741 fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1); 742 return -ENOMEM; 743 } 744 kfree(forget); 745 746 d_drop(entry); 747 d = d_splice_alias(inode, entry); 748 if (IS_ERR(d)) 749 return PTR_ERR(d); 750 751 if (d) { 752 fuse_change_entry_timeout(d, &outarg); 753 dput(d); 754 } else { 755 fuse_change_entry_timeout(entry, &outarg); 756 } 757 fuse_dir_changed(dir); 758 return 0; 759 760 out_put_forget_req: 761 kfree(forget); 762 return err; 763} 764 765static int fuse_mknod(struct user_namespace *mnt_userns, struct inode *dir, 766 struct dentry *entry, umode_t mode, dev_t rdev) 767{ 768 struct fuse_mknod_in inarg; 769 struct fuse_mount *fm = get_fuse_mount(dir); 770 FUSE_ARGS(args); 771 772 if (!fm->fc->dont_mask) 773 mode &= ~current_umask(); 774 775 memset(&inarg, 0, sizeof(inarg)); 776 inarg.mode = mode; 777 inarg.rdev = new_encode_dev(rdev); 778 inarg.umask = current_umask(); 779 args.opcode = FUSE_MKNOD; 780 args.in_numargs = 2; 781 args.in_args[0].size = sizeof(inarg); 782 args.in_args[0].value = &inarg; 783 args.in_args[1].size = entry->d_name.len + 1; 784 args.in_args[1].value = entry->d_name.name; 785 return create_new_entry(fm, &args, dir, entry, mode); 786} 787 788static int fuse_create(struct user_namespace *mnt_userns, struct inode *dir, 789 struct dentry *entry, umode_t mode, bool excl) 790{ 791 return fuse_mknod(&init_user_ns, dir, entry, mode, 0); 792} 793 794static int fuse_mkdir(struct user_namespace *mnt_userns, struct inode *dir, 795 struct dentry *entry, umode_t mode) 796{ 797 struct fuse_mkdir_in inarg; 798 struct fuse_mount *fm = get_fuse_mount(dir); 799 FUSE_ARGS(args); 800 801 if (!fm->fc->dont_mask) 802 mode &= ~current_umask(); 803 804 memset(&inarg, 0, sizeof(inarg)); 805 inarg.mode = mode; 806 inarg.umask = current_umask(); 807 args.opcode = FUSE_MKDIR; 808 args.in_numargs = 2; 809 args.in_args[0].size = sizeof(inarg); 810 args.in_args[0].value = &inarg; 811 args.in_args[1].size = entry->d_name.len + 1; 812 args.in_args[1].value = entry->d_name.name; 813 return create_new_entry(fm, &args, dir, entry, S_IFDIR); 814} 815 816static int fuse_symlink(struct user_namespace *mnt_userns, struct inode *dir, 817 struct dentry *entry, const char *link) 818{ 819 struct fuse_mount *fm = get_fuse_mount(dir); 820 unsigned len = strlen(link) + 1; 821 FUSE_ARGS(args); 822 823 args.opcode = FUSE_SYMLINK; 824 args.in_numargs = 2; 825 args.in_args[0].size = entry->d_name.len + 1; 826 args.in_args[0].value = entry->d_name.name; 827 args.in_args[1].size = len; 828 args.in_args[1].value = link; 829 return create_new_entry(fm, &args, dir, entry, S_IFLNK); 830} 831 832void fuse_flush_time_update(struct inode *inode) 833{ 834 int err = sync_inode_metadata(inode, 1); 835 836 mapping_set_error(inode->i_mapping, err); 837} 838 839static void fuse_update_ctime_in_cache(struct inode *inode) 840{ 841 if (!IS_NOCMTIME(inode)) { 842 inode->i_ctime = current_time(inode); 843 mark_inode_dirty_sync(inode); 844 fuse_flush_time_update(inode); 845 } 846} 847 848void fuse_update_ctime(struct inode *inode) 849{ 850 fuse_invalidate_attr_mask(inode, STATX_CTIME); 851 fuse_update_ctime_in_cache(inode); 852} 853 854static void fuse_entry_unlinked(struct dentry *entry) 855{ 856 struct inode *inode = d_inode(entry); 857 struct fuse_conn *fc = get_fuse_conn(inode); 858 struct fuse_inode *fi = get_fuse_inode(inode); 859 860 spin_lock(&fi->lock); 861 fi->attr_version = atomic64_inc_return(&fc->attr_version); 862 /* 863 * If i_nlink == 0 then unlink doesn't make sense, yet this can 864 * happen if userspace filesystem is careless. It would be 865 * difficult to enforce correct nlink usage so just ignore this 866 * condition here 867 */ 868 if (S_ISDIR(inode->i_mode)) 869 clear_nlink(inode); 870 else if (inode->i_nlink > 0) 871 drop_nlink(inode); 872 spin_unlock(&fi->lock); 873 fuse_invalidate_entry_cache(entry); 874 fuse_update_ctime(inode); 875} 876 877static int fuse_unlink(struct inode *dir, struct dentry *entry) 878{ 879 int err; 880 struct fuse_mount *fm = get_fuse_mount(dir); 881 FUSE_ARGS(args); 882 883 if (fuse_is_bad(dir)) 884 return -EIO; 885 886 args.opcode = FUSE_UNLINK; 887 args.nodeid = get_node_id(dir); 888 args.in_numargs = 1; 889 args.in_args[0].size = entry->d_name.len + 1; 890 args.in_args[0].value = entry->d_name.name; 891 err = fuse_simple_request(fm, &args); 892 if (!err) { 893 fuse_dir_changed(dir); 894 fuse_entry_unlinked(entry); 895 } else if (err == -EINTR) 896 fuse_invalidate_entry(entry); 897 return err; 898} 899 900static int fuse_rmdir(struct inode *dir, struct dentry *entry) 901{ 902 int err; 903 struct fuse_mount *fm = get_fuse_mount(dir); 904 FUSE_ARGS(args); 905 906 if (fuse_is_bad(dir)) 907 return -EIO; 908 909 args.opcode = FUSE_RMDIR; 910 args.nodeid = get_node_id(dir); 911 args.in_numargs = 1; 912 args.in_args[0].size = entry->d_name.len + 1; 913 args.in_args[0].value = entry->d_name.name; 914 err = fuse_simple_request(fm, &args); 915 if (!err) { 916 fuse_dir_changed(dir); 917 fuse_entry_unlinked(entry); 918 } else if (err == -EINTR) 919 fuse_invalidate_entry(entry); 920 return err; 921} 922 923static int fuse_rename_common(struct inode *olddir, struct dentry *oldent, 924 struct inode *newdir, struct dentry *newent, 925 unsigned int flags, int opcode, size_t argsize) 926{ 927 int err; 928 struct fuse_rename2_in inarg; 929 struct fuse_mount *fm = get_fuse_mount(olddir); 930 FUSE_ARGS(args); 931 932 memset(&inarg, 0, argsize); 933 inarg.newdir = get_node_id(newdir); 934 inarg.flags = flags; 935 args.opcode = opcode; 936 args.nodeid = get_node_id(olddir); 937 args.in_numargs = 3; 938 args.in_args[0].size = argsize; 939 args.in_args[0].value = &inarg; 940 args.in_args[1].size = oldent->d_name.len + 1; 941 args.in_args[1].value = oldent->d_name.name; 942 args.in_args[2].size = newent->d_name.len + 1; 943 args.in_args[2].value = newent->d_name.name; 944 err = fuse_simple_request(fm, &args); 945 if (!err) { 946 /* ctime changes */ 947 fuse_update_ctime(d_inode(oldent)); 948 949 if (flags & RENAME_EXCHANGE) 950 fuse_update_ctime(d_inode(newent)); 951 952 fuse_dir_changed(olddir); 953 if (olddir != newdir) 954 fuse_dir_changed(newdir); 955 956 /* newent will end up negative */ 957 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) 958 fuse_entry_unlinked(newent); 959 } else if (err == -EINTR) { 960 /* If request was interrupted, DEITY only knows if the 961 rename actually took place. If the invalidation 962 fails (e.g. some process has CWD under the renamed 963 directory), then there can be inconsistency between 964 the dcache and the real filesystem. Tough luck. */ 965 fuse_invalidate_entry(oldent); 966 if (d_really_is_positive(newent)) 967 fuse_invalidate_entry(newent); 968 } 969 970 return err; 971} 972 973static int fuse_rename2(struct user_namespace *mnt_userns, struct inode *olddir, 974 struct dentry *oldent, struct inode *newdir, 975 struct dentry *newent, unsigned int flags) 976{ 977 struct fuse_conn *fc = get_fuse_conn(olddir); 978 int err; 979 980 if (fuse_is_bad(olddir)) 981 return -EIO; 982 983 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT)) 984 return -EINVAL; 985 986 if (flags) { 987 if (fc->no_rename2 || fc->minor < 23) 988 return -EINVAL; 989 990 err = fuse_rename_common(olddir, oldent, newdir, newent, flags, 991 FUSE_RENAME2, 992 sizeof(struct fuse_rename2_in)); 993 if (err == -ENOSYS) { 994 fc->no_rename2 = 1; 995 err = -EINVAL; 996 } 997 } else { 998 err = fuse_rename_common(olddir, oldent, newdir, newent, 0, 999 FUSE_RENAME, 1000 sizeof(struct fuse_rename_in)); 1001 } 1002 1003 return err; 1004} 1005 1006static int fuse_link(struct dentry *entry, struct inode *newdir, 1007 struct dentry *newent) 1008{ 1009 int err; 1010 struct fuse_link_in inarg; 1011 struct inode *inode = d_inode(entry); 1012 struct fuse_mount *fm = get_fuse_mount(inode); 1013 FUSE_ARGS(args); 1014 1015 memset(&inarg, 0, sizeof(inarg)); 1016 inarg.oldnodeid = get_node_id(inode); 1017 args.opcode = FUSE_LINK; 1018 args.in_numargs = 2; 1019 args.in_args[0].size = sizeof(inarg); 1020 args.in_args[0].value = &inarg; 1021 args.in_args[1].size = newent->d_name.len + 1; 1022 args.in_args[1].value = newent->d_name.name; 1023 err = create_new_entry(fm, &args, newdir, newent, inode->i_mode); 1024 if (!err) 1025 fuse_update_ctime_in_cache(inode); 1026 else if (err == -EINTR) 1027 fuse_invalidate_attr(inode); 1028 1029 return err; 1030} 1031 1032static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr, 1033 struct kstat *stat) 1034{ 1035 unsigned int blkbits; 1036 struct fuse_conn *fc = get_fuse_conn(inode); 1037 1038 stat->dev = inode->i_sb->s_dev; 1039 stat->ino = attr->ino; 1040 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777); 1041 stat->nlink = attr->nlink; 1042 stat->uid = make_kuid(fc->user_ns, attr->uid); 1043 stat->gid = make_kgid(fc->user_ns, attr->gid); 1044 stat->rdev = inode->i_rdev; 1045 stat->atime.tv_sec = attr->atime; 1046 stat->atime.tv_nsec = attr->atimensec; 1047 stat->mtime.tv_sec = attr->mtime; 1048 stat->mtime.tv_nsec = attr->mtimensec; 1049 stat->ctime.tv_sec = attr->ctime; 1050 stat->ctime.tv_nsec = attr->ctimensec; 1051 stat->size = attr->size; 1052 stat->blocks = attr->blocks; 1053 1054 if (attr->blksize != 0) 1055 blkbits = ilog2(attr->blksize); 1056 else 1057 blkbits = inode->i_sb->s_blocksize_bits; 1058 1059 stat->blksize = 1 << blkbits; 1060} 1061 1062static int fuse_do_getattr(struct inode *inode, struct kstat *stat, 1063 struct file *file) 1064{ 1065 int err; 1066 struct fuse_getattr_in inarg; 1067 struct fuse_attr_out outarg; 1068 struct fuse_mount *fm = get_fuse_mount(inode); 1069 FUSE_ARGS(args); 1070 u64 attr_version; 1071 1072 attr_version = fuse_get_attr_version(fm->fc); 1073 1074 memset(&inarg, 0, sizeof(inarg)); 1075 memset(&outarg, 0, sizeof(outarg)); 1076 /* Directories have separate file-handle space */ 1077 if (file && S_ISREG(inode->i_mode)) { 1078 struct fuse_file *ff = file->private_data; 1079 1080 inarg.getattr_flags |= FUSE_GETATTR_FH; 1081 inarg.fh = ff->fh; 1082 } 1083 args.opcode = FUSE_GETATTR; 1084 args.nodeid = get_node_id(inode); 1085 args.in_numargs = 1; 1086 args.in_args[0].size = sizeof(inarg); 1087 args.in_args[0].value = &inarg; 1088 args.out_numargs = 1; 1089 args.out_args[0].size = sizeof(outarg); 1090 args.out_args[0].value = &outarg; 1091 err = fuse_simple_request(fm, &args); 1092 if (!err) { 1093 if (fuse_invalid_attr(&outarg.attr) || 1094 inode_wrong_type(inode, outarg.attr.mode)) { 1095 fuse_make_bad(inode); 1096 err = -EIO; 1097 } else { 1098 fuse_change_attributes(inode, &outarg.attr, 1099 attr_timeout(&outarg), 1100 attr_version); 1101 if (stat) 1102 fuse_fillattr(inode, &outarg.attr, stat); 1103 } 1104 } 1105 return err; 1106} 1107 1108static int fuse_update_get_attr(struct inode *inode, struct file *file, 1109 struct kstat *stat, u32 request_mask, 1110 unsigned int flags) 1111{ 1112 struct fuse_inode *fi = get_fuse_inode(inode); 1113 int err = 0; 1114 bool sync; 1115 u32 inval_mask = READ_ONCE(fi->inval_mask); 1116 u32 cache_mask = fuse_get_cache_mask(inode); 1117 1118 if (flags & AT_STATX_FORCE_SYNC) 1119 sync = true; 1120 else if (flags & AT_STATX_DONT_SYNC) 1121 sync = false; 1122 else if (request_mask & inval_mask & ~cache_mask) 1123 sync = true; 1124 else 1125 sync = time_before64(fi->i_time, get_jiffies_64()); 1126 1127 if (sync) { 1128 forget_all_cached_acls(inode); 1129 err = fuse_do_getattr(inode, stat, file); 1130 } else if (stat) { 1131 generic_fillattr(&init_user_ns, inode, stat); 1132 stat->mode = fi->orig_i_mode; 1133 stat->ino = fi->orig_ino; 1134 } 1135 1136 return err; 1137} 1138 1139int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask) 1140{ 1141 return fuse_update_get_attr(inode, file, NULL, mask, 0); 1142} 1143 1144int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid, 1145 u64 child_nodeid, struct qstr *name) 1146{ 1147 int err = -ENOTDIR; 1148 struct inode *parent; 1149 struct dentry *dir; 1150 struct dentry *entry; 1151 1152 parent = fuse_ilookup(fc, parent_nodeid, NULL); 1153 if (!parent) 1154 return -ENOENT; 1155 1156 inode_lock_nested(parent, I_MUTEX_PARENT); 1157 if (!S_ISDIR(parent->i_mode)) 1158 goto unlock; 1159 1160 err = -ENOENT; 1161 dir = d_find_alias(parent); 1162 if (!dir) 1163 goto unlock; 1164 1165 name->hash = full_name_hash(dir, name->name, name->len); 1166 entry = d_lookup(dir, name); 1167 dput(dir); 1168 if (!entry) 1169 goto unlock; 1170 1171 fuse_dir_changed(parent); 1172 fuse_invalidate_entry(entry); 1173 1174 if (child_nodeid != 0 && d_really_is_positive(entry)) { 1175 inode_lock(d_inode(entry)); 1176 if (get_node_id(d_inode(entry)) != child_nodeid) { 1177 err = -ENOENT; 1178 goto badentry; 1179 } 1180 if (d_mountpoint(entry)) { 1181 err = -EBUSY; 1182 goto badentry; 1183 } 1184 if (d_is_dir(entry)) { 1185 shrink_dcache_parent(entry); 1186 if (!simple_empty(entry)) { 1187 err = -ENOTEMPTY; 1188 goto badentry; 1189 } 1190 d_inode(entry)->i_flags |= S_DEAD; 1191 } 1192 dont_mount(entry); 1193 clear_nlink(d_inode(entry)); 1194 err = 0; 1195 badentry: 1196 inode_unlock(d_inode(entry)); 1197 if (!err) 1198 d_delete(entry); 1199 } else { 1200 err = 0; 1201 } 1202 dput(entry); 1203 1204 unlock: 1205 inode_unlock(parent); 1206 iput(parent); 1207 return err; 1208} 1209 1210/* 1211 * Calling into a user-controlled filesystem gives the filesystem 1212 * daemon ptrace-like capabilities over the current process. This 1213 * means, that the filesystem daemon is able to record the exact 1214 * filesystem operations performed, and can also control the behavior 1215 * of the requester process in otherwise impossible ways. For example 1216 * it can delay the operation for arbitrary length of time allowing 1217 * DoS against the requester. 1218 * 1219 * For this reason only those processes can call into the filesystem, 1220 * for which the owner of the mount has ptrace privilege. This 1221 * excludes processes started by other users, suid or sgid processes. 1222 */ 1223int fuse_allow_current_process(struct fuse_conn *fc) 1224{ 1225 const struct cred *cred; 1226 1227 if (fc->allow_other) 1228 return current_in_userns(fc->user_ns); 1229 1230 cred = current_cred(); 1231 if (uid_eq(cred->euid, fc->user_id) && 1232 uid_eq(cred->suid, fc->user_id) && 1233 uid_eq(cred->uid, fc->user_id) && 1234 gid_eq(cred->egid, fc->group_id) && 1235 gid_eq(cred->sgid, fc->group_id) && 1236 gid_eq(cred->gid, fc->group_id)) 1237 return 1; 1238 1239 return 0; 1240} 1241 1242static int fuse_access(struct inode *inode, int mask) 1243{ 1244 struct fuse_mount *fm = get_fuse_mount(inode); 1245 FUSE_ARGS(args); 1246 struct fuse_access_in inarg; 1247 int err; 1248 1249 BUG_ON(mask & MAY_NOT_BLOCK); 1250 1251 if (fm->fc->no_access) 1252 return 0; 1253 1254 memset(&inarg, 0, sizeof(inarg)); 1255 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC); 1256 args.opcode = FUSE_ACCESS; 1257 args.nodeid = get_node_id(inode); 1258 args.in_numargs = 1; 1259 args.in_args[0].size = sizeof(inarg); 1260 args.in_args[0].value = &inarg; 1261 err = fuse_simple_request(fm, &args); 1262 if (err == -ENOSYS) { 1263 fm->fc->no_access = 1; 1264 err = 0; 1265 } 1266 return err; 1267} 1268 1269static int fuse_perm_getattr(struct inode *inode, int mask) 1270{ 1271 if (mask & MAY_NOT_BLOCK) 1272 return -ECHILD; 1273 1274 forget_all_cached_acls(inode); 1275 return fuse_do_getattr(inode, NULL, NULL); 1276} 1277 1278/* 1279 * Check permission. The two basic access models of FUSE are: 1280 * 1281 * 1) Local access checking ('default_permissions' mount option) based 1282 * on file mode. This is the plain old disk filesystem permission 1283 * modell. 1284 * 1285 * 2) "Remote" access checking, where server is responsible for 1286 * checking permission in each inode operation. An exception to this 1287 * is if ->permission() was invoked from sys_access() in which case an 1288 * access request is sent. Execute permission is still checked 1289 * locally based on file mode. 1290 */ 1291static int fuse_permission(struct user_namespace *mnt_userns, 1292 struct inode *inode, int mask) 1293{ 1294 struct fuse_conn *fc = get_fuse_conn(inode); 1295 bool refreshed = false; 1296 int err = 0; 1297 1298 if (fuse_is_bad(inode)) 1299 return -EIO; 1300 1301 if (!fuse_allow_current_process(fc)) 1302 return -EACCES; 1303 1304 /* 1305 * If attributes are needed, refresh them before proceeding 1306 */ 1307 if (fc->default_permissions || 1308 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { 1309 struct fuse_inode *fi = get_fuse_inode(inode); 1310 u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID; 1311 1312 if (perm_mask & READ_ONCE(fi->inval_mask) || 1313 time_before64(fi->i_time, get_jiffies_64())) { 1314 refreshed = true; 1315 1316 err = fuse_perm_getattr(inode, mask); 1317 if (err) 1318 return err; 1319 } 1320 } 1321 1322 if (fc->default_permissions) { 1323 err = generic_permission(&init_user_ns, inode, mask); 1324 1325 /* If permission is denied, try to refresh file 1326 attributes. This is also needed, because the root 1327 node will at first have no permissions */ 1328 if (err == -EACCES && !refreshed) { 1329 err = fuse_perm_getattr(inode, mask); 1330 if (!err) 1331 err = generic_permission(&init_user_ns, 1332 inode, mask); 1333 } 1334 1335 /* Note: the opposite of the above test does not 1336 exist. So if permissions are revoked this won't be 1337 noticed immediately, only after the attribute 1338 timeout has expired */ 1339 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) { 1340 err = fuse_access(inode, mask); 1341 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) { 1342 if (!(inode->i_mode & S_IXUGO)) { 1343 if (refreshed) 1344 return -EACCES; 1345 1346 err = fuse_perm_getattr(inode, mask); 1347 if (!err && !(inode->i_mode & S_IXUGO)) 1348 return -EACCES; 1349 } 1350 } 1351 return err; 1352} 1353 1354static int fuse_readlink_page(struct inode *inode, struct page *page) 1355{ 1356 struct fuse_mount *fm = get_fuse_mount(inode); 1357 struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 }; 1358 struct fuse_args_pages ap = { 1359 .num_pages = 1, 1360 .pages = &page, 1361 .descs = &desc, 1362 }; 1363 char *link; 1364 ssize_t res; 1365 1366 ap.args.opcode = FUSE_READLINK; 1367 ap.args.nodeid = get_node_id(inode); 1368 ap.args.out_pages = true; 1369 ap.args.out_argvar = true; 1370 ap.args.page_zeroing = true; 1371 ap.args.out_numargs = 1; 1372 ap.args.out_args[0].size = desc.length; 1373 res = fuse_simple_request(fm, &ap.args); 1374 1375 fuse_invalidate_atime(inode); 1376 1377 if (res < 0) 1378 return res; 1379 1380 if (WARN_ON(res >= PAGE_SIZE)) 1381 return -EIO; 1382 1383 link = page_address(page); 1384 link[res] = '\0'; 1385 1386 return 0; 1387} 1388 1389static const char *fuse_get_link(struct dentry *dentry, struct inode *inode, 1390 struct delayed_call *callback) 1391{ 1392 struct fuse_conn *fc = get_fuse_conn(inode); 1393 struct page *page; 1394 int err; 1395 1396 err = -EIO; 1397 if (fuse_is_bad(inode)) 1398 goto out_err; 1399 1400 if (fc->cache_symlinks) 1401 return page_get_link(dentry, inode, callback); 1402 1403 err = -ECHILD; 1404 if (!dentry) 1405 goto out_err; 1406 1407 page = alloc_page(GFP_KERNEL); 1408 err = -ENOMEM; 1409 if (!page) 1410 goto out_err; 1411 1412 err = fuse_readlink_page(inode, page); 1413 if (err) { 1414 __free_page(page); 1415 goto out_err; 1416 } 1417 1418 set_delayed_call(callback, page_put_link, page); 1419 1420 return page_address(page); 1421 1422out_err: 1423 return ERR_PTR(err); 1424} 1425 1426static int fuse_dir_open(struct inode *inode, struct file *file) 1427{ 1428 return fuse_open_common(inode, file, true); 1429} 1430 1431static int fuse_dir_release(struct inode *inode, struct file *file) 1432{ 1433 fuse_release_common(file, true); 1434 1435 return 0; 1436} 1437 1438static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end, 1439 int datasync) 1440{ 1441 struct inode *inode = file->f_mapping->host; 1442 struct fuse_conn *fc = get_fuse_conn(inode); 1443 int err; 1444 1445 if (fuse_is_bad(inode)) 1446 return -EIO; 1447 1448 if (fc->no_fsyncdir) 1449 return 0; 1450 1451 inode_lock(inode); 1452 err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR); 1453 if (err == -ENOSYS) { 1454 fc->no_fsyncdir = 1; 1455 err = 0; 1456 } 1457 inode_unlock(inode); 1458 1459 return err; 1460} 1461 1462static long fuse_dir_ioctl(struct file *file, unsigned int cmd, 1463 unsigned long arg) 1464{ 1465 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1466 1467 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */ 1468 if (fc->minor < 18) 1469 return -ENOTTY; 1470 1471 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR); 1472} 1473 1474static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd, 1475 unsigned long arg) 1476{ 1477 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host); 1478 1479 if (fc->minor < 18) 1480 return -ENOTTY; 1481 1482 return fuse_ioctl_common(file, cmd, arg, 1483 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR); 1484} 1485 1486static bool update_mtime(unsigned ivalid, bool trust_local_mtime) 1487{ 1488 /* Always update if mtime is explicitly set */ 1489 if (ivalid & ATTR_MTIME_SET) 1490 return true; 1491 1492 /* Or if kernel i_mtime is the official one */ 1493 if (trust_local_mtime) 1494 return true; 1495 1496 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */ 1497 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE))) 1498 return false; 1499 1500 /* In all other cases update */ 1501 return true; 1502} 1503 1504static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr, 1505 struct fuse_setattr_in *arg, bool trust_local_cmtime) 1506{ 1507 unsigned ivalid = iattr->ia_valid; 1508 1509 if (ivalid & ATTR_MODE) 1510 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode; 1511 if (ivalid & ATTR_UID) 1512 arg->valid |= FATTR_UID, arg->uid = from_kuid(fc->user_ns, iattr->ia_uid); 1513 if (ivalid & ATTR_GID) 1514 arg->valid |= FATTR_GID, arg->gid = from_kgid(fc->user_ns, iattr->ia_gid); 1515 if (ivalid & ATTR_SIZE) 1516 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size; 1517 if (ivalid & ATTR_ATIME) { 1518 arg->valid |= FATTR_ATIME; 1519 arg->atime = iattr->ia_atime.tv_sec; 1520 arg->atimensec = iattr->ia_atime.tv_nsec; 1521 if (!(ivalid & ATTR_ATIME_SET)) 1522 arg->valid |= FATTR_ATIME_NOW; 1523 } 1524 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) { 1525 arg->valid |= FATTR_MTIME; 1526 arg->mtime = iattr->ia_mtime.tv_sec; 1527 arg->mtimensec = iattr->ia_mtime.tv_nsec; 1528 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime) 1529 arg->valid |= FATTR_MTIME_NOW; 1530 } 1531 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) { 1532 arg->valid |= FATTR_CTIME; 1533 arg->ctime = iattr->ia_ctime.tv_sec; 1534 arg->ctimensec = iattr->ia_ctime.tv_nsec; 1535 } 1536} 1537 1538/* 1539 * Prevent concurrent writepages on inode 1540 * 1541 * This is done by adding a negative bias to the inode write counter 1542 * and waiting for all pending writes to finish. 1543 */ 1544void fuse_set_nowrite(struct inode *inode) 1545{ 1546 struct fuse_inode *fi = get_fuse_inode(inode); 1547 1548 BUG_ON(!inode_is_locked(inode)); 1549 1550 spin_lock(&fi->lock); 1551 BUG_ON(fi->writectr < 0); 1552 fi->writectr += FUSE_NOWRITE; 1553 spin_unlock(&fi->lock); 1554 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE); 1555} 1556 1557/* 1558 * Allow writepages on inode 1559 * 1560 * Remove the bias from the writecounter and send any queued 1561 * writepages. 1562 */ 1563static void __fuse_release_nowrite(struct inode *inode) 1564{ 1565 struct fuse_inode *fi = get_fuse_inode(inode); 1566 1567 BUG_ON(fi->writectr != FUSE_NOWRITE); 1568 fi->writectr = 0; 1569 fuse_flush_writepages(inode); 1570} 1571 1572void fuse_release_nowrite(struct inode *inode) 1573{ 1574 struct fuse_inode *fi = get_fuse_inode(inode); 1575 1576 spin_lock(&fi->lock); 1577 __fuse_release_nowrite(inode); 1578 spin_unlock(&fi->lock); 1579} 1580 1581static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args, 1582 struct inode *inode, 1583 struct fuse_setattr_in *inarg_p, 1584 struct fuse_attr_out *outarg_p) 1585{ 1586 args->opcode = FUSE_SETATTR; 1587 args->nodeid = get_node_id(inode); 1588 args->in_numargs = 1; 1589 args->in_args[0].size = sizeof(*inarg_p); 1590 args->in_args[0].value = inarg_p; 1591 args->out_numargs = 1; 1592 args->out_args[0].size = sizeof(*outarg_p); 1593 args->out_args[0].value = outarg_p; 1594} 1595 1596/* 1597 * Flush inode->i_mtime to the server 1598 */ 1599int fuse_flush_times(struct inode *inode, struct fuse_file *ff) 1600{ 1601 struct fuse_mount *fm = get_fuse_mount(inode); 1602 FUSE_ARGS(args); 1603 struct fuse_setattr_in inarg; 1604 struct fuse_attr_out outarg; 1605 1606 memset(&inarg, 0, sizeof(inarg)); 1607 memset(&outarg, 0, sizeof(outarg)); 1608 1609 inarg.valid = FATTR_MTIME; 1610 inarg.mtime = inode->i_mtime.tv_sec; 1611 inarg.mtimensec = inode->i_mtime.tv_nsec; 1612 if (fm->fc->minor >= 23) { 1613 inarg.valid |= FATTR_CTIME; 1614 inarg.ctime = inode->i_ctime.tv_sec; 1615 inarg.ctimensec = inode->i_ctime.tv_nsec; 1616 } 1617 if (ff) { 1618 inarg.valid |= FATTR_FH; 1619 inarg.fh = ff->fh; 1620 } 1621 fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg); 1622 1623 return fuse_simple_request(fm, &args); 1624} 1625 1626/* 1627 * Set attributes, and at the same time refresh them. 1628 * 1629 * Truncation is slightly complicated, because the 'truncate' request 1630 * may fail, in which case we don't want to touch the mapping. 1631 * vmtruncate() doesn't allow for this case, so do the rlimit checking 1632 * and the actual truncation by hand. 1633 */ 1634int fuse_do_setattr(struct dentry *dentry, struct iattr *attr, 1635 struct file *file) 1636{ 1637 struct inode *inode = d_inode(dentry); 1638 struct fuse_mount *fm = get_fuse_mount(inode); 1639 struct fuse_conn *fc = fm->fc; 1640 struct fuse_inode *fi = get_fuse_inode(inode); 1641 struct address_space *mapping = inode->i_mapping; 1642 FUSE_ARGS(args); 1643 struct fuse_setattr_in inarg; 1644 struct fuse_attr_out outarg; 1645 bool is_truncate = false; 1646 bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode); 1647 loff_t oldsize; 1648 int err; 1649 bool trust_local_cmtime = is_wb; 1650 bool fault_blocked = false; 1651 1652 if (!fc->default_permissions) 1653 attr->ia_valid |= ATTR_FORCE; 1654 1655 err = setattr_prepare(&init_user_ns, dentry, attr); 1656 if (err) 1657 return err; 1658 1659 if (attr->ia_valid & ATTR_SIZE) { 1660 if (WARN_ON(!S_ISREG(inode->i_mode))) 1661 return -EIO; 1662 is_truncate = true; 1663 } 1664 1665 if (FUSE_IS_DAX(inode) && is_truncate) { 1666 filemap_invalidate_lock(mapping); 1667 fault_blocked = true; 1668 err = fuse_dax_break_layouts(inode, 0, 0); 1669 if (err) { 1670 filemap_invalidate_unlock(mapping); 1671 return err; 1672 } 1673 } 1674 1675 if (attr->ia_valid & ATTR_OPEN) { 1676 /* This is coming from open(..., ... | O_TRUNC); */ 1677 WARN_ON(!(attr->ia_valid & ATTR_SIZE)); 1678 WARN_ON(attr->ia_size != 0); 1679 if (fc->atomic_o_trunc) { 1680 /* 1681 * No need to send request to userspace, since actual 1682 * truncation has already been done by OPEN. But still 1683 * need to truncate page cache. 1684 */ 1685 i_size_write(inode, 0); 1686 truncate_pagecache(inode, 0); 1687 goto out; 1688 } 1689 file = NULL; 1690 } 1691 1692 /* Flush dirty data/metadata before non-truncate SETATTR */ 1693 if (is_wb && 1694 attr->ia_valid & 1695 (ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET | 1696 ATTR_TIMES_SET)) { 1697 err = write_inode_now(inode, true); 1698 if (err) 1699 return err; 1700 1701 fuse_set_nowrite(inode); 1702 fuse_release_nowrite(inode); 1703 } 1704 1705 if (is_truncate) { 1706 fuse_set_nowrite(inode); 1707 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1708 if (trust_local_cmtime && attr->ia_size != inode->i_size) 1709 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME; 1710 } 1711 1712 memset(&inarg, 0, sizeof(inarg)); 1713 memset(&outarg, 0, sizeof(outarg)); 1714 iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime); 1715 if (file) { 1716 struct fuse_file *ff = file->private_data; 1717 inarg.valid |= FATTR_FH; 1718 inarg.fh = ff->fh; 1719 } 1720 1721 /* Kill suid/sgid for non-directory chown unconditionally */ 1722 if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) && 1723 attr->ia_valid & (ATTR_UID | ATTR_GID)) 1724 inarg.valid |= FATTR_KILL_SUIDGID; 1725 1726 if (attr->ia_valid & ATTR_SIZE) { 1727 /* For mandatory locking in truncate */ 1728 inarg.valid |= FATTR_LOCKOWNER; 1729 inarg.lock_owner = fuse_lock_owner_id(fc, current->files); 1730 1731 /* Kill suid/sgid for truncate only if no CAP_FSETID */ 1732 if (fc->handle_killpriv_v2 && !capable(CAP_FSETID)) 1733 inarg.valid |= FATTR_KILL_SUIDGID; 1734 } 1735 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg); 1736 err = fuse_simple_request(fm, &args); 1737 if (err) { 1738 if (err == -EINTR) 1739 fuse_invalidate_attr(inode); 1740 goto error; 1741 } 1742 1743 if (fuse_invalid_attr(&outarg.attr) || 1744 inode_wrong_type(inode, outarg.attr.mode)) { 1745 fuse_make_bad(inode); 1746 err = -EIO; 1747 goto error; 1748 } 1749 1750 spin_lock(&fi->lock); 1751 /* the kernel maintains i_mtime locally */ 1752 if (trust_local_cmtime) { 1753 if (attr->ia_valid & ATTR_MTIME) 1754 inode->i_mtime = attr->ia_mtime; 1755 if (attr->ia_valid & ATTR_CTIME) 1756 inode->i_ctime = attr->ia_ctime; 1757 /* FIXME: clear I_DIRTY_SYNC? */ 1758 } 1759 1760 fuse_change_attributes_common(inode, &outarg.attr, 1761 attr_timeout(&outarg), 1762 fuse_get_cache_mask(inode)); 1763 oldsize = inode->i_size; 1764 /* see the comment in fuse_change_attributes() */ 1765 if (!is_wb || is_truncate) 1766 i_size_write(inode, outarg.attr.size); 1767 1768 if (is_truncate) { 1769 /* NOTE: this may release/reacquire fi->lock */ 1770 __fuse_release_nowrite(inode); 1771 } 1772 spin_unlock(&fi->lock); 1773 1774 /* 1775 * Only call invalidate_inode_pages2() after removing 1776 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock. 1777 */ 1778 if ((is_truncate || !is_wb) && 1779 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) { 1780 truncate_pagecache(inode, outarg.attr.size); 1781 invalidate_inode_pages2(mapping); 1782 } 1783 1784 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1785out: 1786 if (fault_blocked) 1787 filemap_invalidate_unlock(mapping); 1788 1789 return 0; 1790 1791error: 1792 if (is_truncate) 1793 fuse_release_nowrite(inode); 1794 1795 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state); 1796 1797 if (fault_blocked) 1798 filemap_invalidate_unlock(mapping); 1799 return err; 1800} 1801 1802static int fuse_setattr(struct user_namespace *mnt_userns, struct dentry *entry, 1803 struct iattr *attr) 1804{ 1805 struct inode *inode = d_inode(entry); 1806 struct fuse_conn *fc = get_fuse_conn(inode); 1807 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL; 1808 int ret; 1809 1810 if (fuse_is_bad(inode)) 1811 return -EIO; 1812 1813 if (!fuse_allow_current_process(get_fuse_conn(inode))) 1814 return -EACCES; 1815 1816 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) { 1817 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID | 1818 ATTR_MODE); 1819 1820 /* 1821 * The only sane way to reliably kill suid/sgid is to do it in 1822 * the userspace filesystem 1823 * 1824 * This should be done on write(), truncate() and chown(). 1825 */ 1826 if (!fc->handle_killpriv && !fc->handle_killpriv_v2) { 1827 /* 1828 * ia_mode calculation may have used stale i_mode. 1829 * Refresh and recalculate. 1830 */ 1831 ret = fuse_do_getattr(inode, NULL, file); 1832 if (ret) 1833 return ret; 1834 1835 attr->ia_mode = inode->i_mode; 1836 if (inode->i_mode & S_ISUID) { 1837 attr->ia_valid |= ATTR_MODE; 1838 attr->ia_mode &= ~S_ISUID; 1839 } 1840 if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { 1841 attr->ia_valid |= ATTR_MODE; 1842 attr->ia_mode &= ~S_ISGID; 1843 } 1844 } 1845 } 1846 if (!attr->ia_valid) 1847 return 0; 1848 1849 ret = fuse_do_setattr(entry, attr, file); 1850 if (!ret) { 1851 /* 1852 * If filesystem supports acls it may have updated acl xattrs in 1853 * the filesystem, so forget cached acls for the inode. 1854 */ 1855 if (fc->posix_acl) 1856 forget_all_cached_acls(inode); 1857 1858 /* Directory mode changed, may need to revalidate access */ 1859 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE)) 1860 fuse_invalidate_entry_cache(entry); 1861 } 1862 return ret; 1863} 1864 1865static int fuse_getattr(struct user_namespace *mnt_userns, 1866 const struct path *path, struct kstat *stat, 1867 u32 request_mask, unsigned int flags) 1868{ 1869 struct inode *inode = d_inode(path->dentry); 1870 struct fuse_conn *fc = get_fuse_conn(inode); 1871 1872 if (fuse_is_bad(inode)) 1873 return -EIO; 1874 1875 if (!fuse_allow_current_process(fc)) { 1876 if (!request_mask) { 1877 /* 1878 * If user explicitly requested *nothing* then don't 1879 * error out, but return st_dev only. 1880 */ 1881 stat->result_mask = 0; 1882 stat->dev = inode->i_sb->s_dev; 1883 return 0; 1884 } 1885 return -EACCES; 1886 } 1887 1888 return fuse_update_get_attr(inode, NULL, stat, request_mask, flags); 1889} 1890 1891static const struct inode_operations fuse_dir_inode_operations = { 1892 .lookup = fuse_lookup, 1893 .mkdir = fuse_mkdir, 1894 .symlink = fuse_symlink, 1895 .unlink = fuse_unlink, 1896 .rmdir = fuse_rmdir, 1897 .rename = fuse_rename2, 1898 .link = fuse_link, 1899 .setattr = fuse_setattr, 1900 .create = fuse_create, 1901 .atomic_open = fuse_atomic_open, 1902 .mknod = fuse_mknod, 1903 .permission = fuse_permission, 1904 .getattr = fuse_getattr, 1905 .listxattr = fuse_listxattr, 1906 .get_acl = fuse_get_acl, 1907 .set_acl = fuse_set_acl, 1908 .fileattr_get = fuse_fileattr_get, 1909 .fileattr_set = fuse_fileattr_set, 1910}; 1911 1912static const struct file_operations fuse_dir_operations = { 1913 .llseek = generic_file_llseek, 1914 .read = generic_read_dir, 1915 .iterate_shared = fuse_readdir, 1916 .open = fuse_dir_open, 1917 .release = fuse_dir_release, 1918 .fsync = fuse_dir_fsync, 1919 .unlocked_ioctl = fuse_dir_ioctl, 1920 .compat_ioctl = fuse_dir_compat_ioctl, 1921}; 1922 1923static const struct inode_operations fuse_common_inode_operations = { 1924 .setattr = fuse_setattr, 1925 .permission = fuse_permission, 1926 .getattr = fuse_getattr, 1927 .listxattr = fuse_listxattr, 1928 .get_acl = fuse_get_acl, 1929 .set_acl = fuse_set_acl, 1930 .fileattr_get = fuse_fileattr_get, 1931 .fileattr_set = fuse_fileattr_set, 1932}; 1933 1934static const struct inode_operations fuse_symlink_inode_operations = { 1935 .setattr = fuse_setattr, 1936 .get_link = fuse_get_link, 1937 .getattr = fuse_getattr, 1938 .listxattr = fuse_listxattr, 1939}; 1940 1941void fuse_init_common(struct inode *inode) 1942{ 1943 inode->i_op = &fuse_common_inode_operations; 1944} 1945 1946void fuse_init_dir(struct inode *inode) 1947{ 1948 struct fuse_inode *fi = get_fuse_inode(inode); 1949 1950 inode->i_op = &fuse_dir_inode_operations; 1951 inode->i_fop = &fuse_dir_operations; 1952 1953 spin_lock_init(&fi->rdc.lock); 1954 fi->rdc.cached = false; 1955 fi->rdc.size = 0; 1956 fi->rdc.pos = 0; 1957 fi->rdc.version = 0; 1958} 1959 1960static int fuse_symlink_read_folio(struct file *null, struct folio *folio) 1961{ 1962 int err = fuse_readlink_page(folio->mapping->host, &folio->page); 1963 1964 if (!err) 1965 folio_mark_uptodate(folio); 1966 1967 folio_unlock(folio); 1968 1969 return err; 1970} 1971 1972static const struct address_space_operations fuse_symlink_aops = { 1973 .read_folio = fuse_symlink_read_folio, 1974}; 1975 1976void fuse_init_symlink(struct inode *inode) 1977{ 1978 inode->i_op = &fuse_symlink_inode_operations; 1979 inode->i_data.a_ops = &fuse_symlink_aops; 1980 inode_nohighmem(inode); 1981}