]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - fs/fuse/dir.c
fuse: use timespec64
[mirror_ubuntu-zesty-kernel.git] / fs / fuse / dir.c
CommitLineData
e5e5558e
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
e5e5558e
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/file.h>
e5e5558e
MS
13#include <linux/sched.h>
14#include <linux/namei.h>
07e77dca 15#include <linux/slab.h>
703c7362 16#include <linux/xattr.h>
60bcc88a 17#include <linux/posix_acl.h>
e5e5558e 18
8d3af7f3 19static bool fuse_use_readdirplus(struct inode *dir, struct dir_context *ctx)
4582a4ab
FS
20{
21 struct fuse_conn *fc = get_fuse_conn(dir);
22 struct fuse_inode *fi = get_fuse_inode(dir);
23
24 if (!fc->do_readdirplus)
25 return false;
634734b6
EW
26 if (!fc->readdirplus_auto)
27 return true;
4582a4ab
FS
28 if (test_and_clear_bit(FUSE_I_ADVISE_RDPLUS, &fi->state))
29 return true;
8d3af7f3 30 if (ctx->pos == 0)
4582a4ab
FS
31 return true;
32 return false;
33}
34
35static void fuse_advise_use_readdirplus(struct inode *dir)
36{
37 struct fuse_inode *fi = get_fuse_inode(dir);
38
39 set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
40}
41
f75fdf22
MS
42union fuse_dentry {
43 u64 time;
44 struct rcu_head rcu;
45};
46
0a0898cf
MS
47static inline void fuse_dentry_settime(struct dentry *entry, u64 time)
48{
f75fdf22 49 ((union fuse_dentry *) entry->d_fsdata)->time = time;
0a0898cf
MS
50}
51
52static inline u64 fuse_dentry_time(struct dentry *entry)
53{
f75fdf22 54 return ((union fuse_dentry *) entry->d_fsdata)->time;
0a0898cf 55}
0a0898cf 56
6f9f1180
MS
57/*
58 * FUSE caches dentries and attributes with separate timeout. The
59 * time in jiffies until the dentry/attributes are valid is stored in
f75fdf22 60 * dentry->d_fsdata and fuse_inode->i_time respectively.
6f9f1180
MS
61 */
62
63/*
64 * Calculate the time in jiffies until a dentry/attributes are valid
65 */
bcb6f6d2 66static u64 time_to_jiffies(u64 sec, u32 nsec)
e5e5558e 67{
685d16dd 68 if (sec || nsec) {
bcb6f6d2
MS
69 struct timespec64 ts = {
70 sec,
71 max_t(u32, nsec, NSEC_PER_SEC - 1)
72 };
73
74 return get_jiffies_64() + timespec64_to_jiffies(&ts);
685d16dd 75 } else
0a0898cf 76 return 0;
e5e5558e
MS
77}
78
6f9f1180
MS
79/*
80 * Set dentry and possibly attribute timeouts from the lookup/mk*
81 * replies
82 */
1fb69e78
MS
83static void fuse_change_entry_timeout(struct dentry *entry,
84 struct fuse_entry_out *o)
0aa7c699 85{
0a0898cf
MS
86 fuse_dentry_settime(entry,
87 time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
1fb69e78
MS
88}
89
90static u64 attr_timeout(struct fuse_attr_out *o)
91{
92 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
93}
94
95static u64 entry_attr_timeout(struct fuse_entry_out *o)
96{
97 return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
8cbdf1e6
MS
98}
99
6f9f1180
MS
100/*
101 * Mark the attributes as stale, so that at the next call to
102 * ->getattr() they will be fetched from userspace
103 */
8cbdf1e6
MS
104void fuse_invalidate_attr(struct inode *inode)
105{
0a0898cf 106 get_fuse_inode(inode)->i_time = 0;
8cbdf1e6
MS
107}
108
451418fc
AG
109/**
110 * Mark the attributes as stale due to an atime change. Avoid the invalidate if
111 * atime is not used.
112 */
113void fuse_invalidate_atime(struct inode *inode)
114{
115 if (!IS_RDONLY(inode))
116 fuse_invalidate_attr(inode);
117}
118
6f9f1180
MS
119/*
120 * Just mark the entry as stale, so that a next attempt to look it up
121 * will result in a new lookup call to userspace
122 *
123 * This is called when a dentry is about to become negative and the
124 * timeout is unknown (unlink, rmdir, rename and in some cases
125 * lookup)
126 */
dbd561d2 127void fuse_invalidate_entry_cache(struct dentry *entry)
8cbdf1e6 128{
0a0898cf 129 fuse_dentry_settime(entry, 0);
8cbdf1e6
MS
130}
131
6f9f1180
MS
132/*
133 * Same as fuse_invalidate_entry_cache(), but also try to remove the
134 * dentry from the hash
135 */
8cbdf1e6
MS
136static void fuse_invalidate_entry(struct dentry *entry)
137{
138 d_invalidate(entry);
139 fuse_invalidate_entry_cache(entry);
0aa7c699
MS
140}
141
7078187a 142static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
13983d06 143 u64 nodeid, const struct qstr *name,
e5e5558e
MS
144 struct fuse_entry_out *outarg)
145{
0e9663ee 146 memset(outarg, 0, sizeof(struct fuse_entry_out));
7078187a
MS
147 args->in.h.opcode = FUSE_LOOKUP;
148 args->in.h.nodeid = nodeid;
149 args->in.numargs = 1;
150 args->in.args[0].size = name->len + 1;
151 args->in.args[0].value = name->name;
152 args->out.numargs = 1;
21f62174 153 args->out.args[0].size = sizeof(struct fuse_entry_out);
7078187a 154 args->out.args[0].value = outarg;
e5e5558e
MS
155}
156
5c5c5e51 157u64 fuse_get_attr_version(struct fuse_conn *fc)
7dca9fd3
MS
158{
159 u64 curr_version;
160
161 /*
162 * The spin lock isn't actually needed on 64bit archs, but we
163 * don't yet care too much about such optimizations.
164 */
165 spin_lock(&fc->lock);
166 curr_version = fc->attr_version;
167 spin_unlock(&fc->lock);
168
169 return curr_version;
170}
171
6f9f1180
MS
172/*
173 * Check whether the dentry is still valid
174 *
175 * If the entry validity timeout has expired and the dentry is
176 * positive, try to redo the lookup. If the lookup results in a
177 * different inode, then let the VFS invalidate the dentry and redo
178 * the lookup once more. If the lookup results in the same inode,
179 * then refresh the attributes, timeouts and mark the dentry valid.
180 */
0b728e19 181static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
e5e5558e 182{
34286d66 183 struct inode *inode;
28420dad
MS
184 struct dentry *parent;
185 struct fuse_conn *fc;
6314efee 186 struct fuse_inode *fi;
e2a6b952 187 int ret;
8cbdf1e6 188
2b0143b5 189 inode = d_inode_rcu(entry);
8cbdf1e6 190 if (inode && is_bad_inode(inode))
e2a6b952 191 goto invalid;
154210cc
AA
192 else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
193 (flags & LOOKUP_REVAL)) {
e5e5558e 194 struct fuse_entry_out outarg;
7078187a 195 FUSE_ARGS(args);
07e77dca 196 struct fuse_forget_link *forget;
1fb69e78 197 u64 attr_version;
8cbdf1e6 198
50322fe7 199 /* For negative dentries, always do a fresh lookup */
8cbdf1e6 200 if (!inode)
e2a6b952 201 goto invalid;
8cbdf1e6 202
e2a6b952 203 ret = -ECHILD;
0b728e19 204 if (flags & LOOKUP_RCU)
e2a6b952 205 goto out;
e7c0a167 206
8cbdf1e6 207 fc = get_fuse_conn(inode);
e5e5558e 208
07e77dca 209 forget = fuse_alloc_forget();
7078187a
MS
210 ret = -ENOMEM;
211 if (!forget)
e2a6b952 212 goto out;
2d51013e 213
7dca9fd3 214 attr_version = fuse_get_attr_version(fc);
1fb69e78 215
e956edd0 216 parent = dget_parent(entry);
2b0143b5 217 fuse_lookup_init(fc, &args, get_node_id(d_inode(parent)),
c180eebe 218 &entry->d_name, &outarg);
7078187a 219 ret = fuse_simple_request(fc, &args);
e956edd0 220 dput(parent);
50322fe7 221 /* Zero nodeid is same as -ENOENT */
7078187a
MS
222 if (!ret && !outarg.nodeid)
223 ret = -ENOENT;
224 if (!ret) {
6314efee 225 fi = get_fuse_inode(inode);
9e6268db 226 if (outarg.nodeid != get_node_id(inode)) {
07e77dca 227 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
e2a6b952 228 goto invalid;
9e6268db 229 }
8da5ff23 230 spin_lock(&fc->lock);
1729a16c 231 fi->nlookup++;
8da5ff23 232 spin_unlock(&fc->lock);
9e6268db 233 }
07e77dca 234 kfree(forget);
7078187a
MS
235 if (ret == -ENOMEM)
236 goto out;
237 if (ret || (outarg.attr.mode ^ inode->i_mode) & S_IFMT)
e2a6b952 238 goto invalid;
e5e5558e 239
60bcc88a 240 forget_all_cached_acls(inode);
1fb69e78
MS
241 fuse_change_attributes(inode, &outarg.attr,
242 entry_attr_timeout(&outarg),
243 attr_version);
244 fuse_change_entry_timeout(entry, &outarg);
28420dad 245 } else if (inode) {
6314efee
MS
246 fi = get_fuse_inode(inode);
247 if (flags & LOOKUP_RCU) {
248 if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
249 return -ECHILD;
250 } else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
28420dad 251 parent = dget_parent(entry);
2b0143b5 252 fuse_advise_use_readdirplus(d_inode(parent));
28420dad
MS
253 dput(parent);
254 }
e5e5558e 255 }
e2a6b952
MS
256 ret = 1;
257out:
258 return ret;
259
260invalid:
261 ret = 0;
262 goto out;
e5e5558e
MS
263}
264
8bfc016d 265static int invalid_nodeid(u64 nodeid)
2827d0b2
MS
266{
267 return !nodeid || nodeid == FUSE_ROOT_ID;
268}
269
f75fdf22
MS
270static int fuse_dentry_init(struct dentry *dentry)
271{
272 dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry), GFP_KERNEL);
273
274 return dentry->d_fsdata ? 0 : -ENOMEM;
275}
276static void fuse_dentry_release(struct dentry *dentry)
277{
278 union fuse_dentry *fd = dentry->d_fsdata;
279
280 kfree_rcu(fd, rcu);
281}
282
4269590a 283const struct dentry_operations fuse_dentry_operations = {
e5e5558e 284 .d_revalidate = fuse_dentry_revalidate,
f75fdf22
MS
285 .d_init = fuse_dentry_init,
286 .d_release = fuse_dentry_release,
e5e5558e
MS
287};
288
a5bfffac 289int fuse_valid_type(int m)
39ee059a
MS
290{
291 return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
292 S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
293}
294
13983d06 295int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
c180eebe 296 struct fuse_entry_out *outarg, struct inode **inode)
e5e5558e 297{
c180eebe 298 struct fuse_conn *fc = get_fuse_conn_super(sb);
7078187a 299 FUSE_ARGS(args);
07e77dca 300 struct fuse_forget_link *forget;
1fb69e78 301 u64 attr_version;
c180eebe 302 int err;
e5e5558e 303
c180eebe
MS
304 *inode = NULL;
305 err = -ENAMETOOLONG;
306 if (name->len > FUSE_NAME_MAX)
307 goto out;
e5e5558e 308
e5e5558e 309
07e77dca
MS
310 forget = fuse_alloc_forget();
311 err = -ENOMEM;
7078187a 312 if (!forget)
c180eebe 313 goto out;
2d51013e 314
7dca9fd3 315 attr_version = fuse_get_attr_version(fc);
1fb69e78 316
7078187a
MS
317 fuse_lookup_init(fc, &args, nodeid, name, outarg);
318 err = fuse_simple_request(fc, &args);
50322fe7 319 /* Zero nodeid is same as -ENOENT, but with valid timeout */
c180eebe
MS
320 if (err || !outarg->nodeid)
321 goto out_put_forget;
322
323 err = -EIO;
324 if (!outarg->nodeid)
325 goto out_put_forget;
326 if (!fuse_valid_type(outarg->attr.mode))
327 goto out_put_forget;
328
329 *inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
330 &outarg->attr, entry_attr_timeout(outarg),
331 attr_version);
332 err = -ENOMEM;
333 if (!*inode) {
07e77dca 334 fuse_queue_forget(fc, forget, outarg->nodeid, 1);
c180eebe 335 goto out;
e5e5558e 336 }
c180eebe
MS
337 err = 0;
338
339 out_put_forget:
07e77dca 340 kfree(forget);
c180eebe
MS
341 out:
342 return err;
343}
344
345static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
00cd8dd3 346 unsigned int flags)
c180eebe
MS
347{
348 int err;
349 struct fuse_entry_out outarg;
350 struct inode *inode;
351 struct dentry *newent;
c180eebe
MS
352 bool outarg_valid = true;
353
5c672ab3 354 fuse_lock_inode(dir);
c180eebe
MS
355 err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
356 &outarg, &inode);
5c672ab3 357 fuse_unlock_inode(dir);
c180eebe
MS
358 if (err == -ENOENT) {
359 outarg_valid = false;
360 err = 0;
361 }
362 if (err)
363 goto out_err;
364
365 err = -EIO;
366 if (inode && get_node_id(inode) == FUSE_ROOT_ID)
367 goto out_iput;
e5e5558e 368
41d28bca 369 newent = d_splice_alias(inode, entry);
5835f339
MS
370 err = PTR_ERR(newent);
371 if (IS_ERR(newent))
372 goto out_err;
d2a85164 373
0de6256d 374 entry = newent ? newent : entry;
c180eebe 375 if (outarg_valid)
1fb69e78 376 fuse_change_entry_timeout(entry, &outarg);
8cbdf1e6
MS
377 else
378 fuse_invalidate_entry_cache(entry);
c180eebe 379
4582a4ab 380 fuse_advise_use_readdirplus(dir);
0de6256d 381 return newent;
c180eebe
MS
382
383 out_iput:
384 iput(inode);
385 out_err:
386 return ERR_PTR(err);
e5e5558e
MS
387}
388
6f9f1180
MS
389/*
390 * Atomic create+open operation
391 *
392 * If the filesystem doesn't support this, then fall back to separate
393 * 'mknod' + 'open' requests.
394 */
d9585277 395static int fuse_create_open(struct inode *dir, struct dentry *entry,
30d90494 396 struct file *file, unsigned flags,
d9585277 397 umode_t mode, int *opened)
fd72faac
MS
398{
399 int err;
400 struct inode *inode;
401 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 402 FUSE_ARGS(args);
07e77dca 403 struct fuse_forget_link *forget;
e0a43ddc 404 struct fuse_create_in inarg;
fd72faac
MS
405 struct fuse_open_out outopen;
406 struct fuse_entry_out outentry;
fd72faac 407 struct fuse_file *ff;
fd72faac 408
af109bca
MS
409 /* Userspace expects S_IFREG in create mode */
410 BUG_ON((mode & S_IFMT) != S_IFREG);
411
07e77dca 412 forget = fuse_alloc_forget();
c8ccbe03 413 err = -ENOMEM;
07e77dca 414 if (!forget)
c8ccbe03 415 goto out_err;
51eb01e7 416
ce1d5a49 417 err = -ENOMEM;
acf99433 418 ff = fuse_file_alloc(fc);
fd72faac 419 if (!ff)
7078187a 420 goto out_put_forget_req;
fd72faac 421
e0a43ddc
MS
422 if (!fc->dont_mask)
423 mode &= ~current_umask();
424
fd72faac
MS
425 flags &= ~O_NOCTTY;
426 memset(&inarg, 0, sizeof(inarg));
0e9663ee 427 memset(&outentry, 0, sizeof(outentry));
fd72faac
MS
428 inarg.flags = flags;
429 inarg.mode = mode;
e0a43ddc 430 inarg.umask = current_umask();
7078187a
MS
431 args.in.h.opcode = FUSE_CREATE;
432 args.in.h.nodeid = get_node_id(dir);
433 args.in.numargs = 2;
21f62174 434 args.in.args[0].size = sizeof(inarg);
7078187a
MS
435 args.in.args[0].value = &inarg;
436 args.in.args[1].size = entry->d_name.len + 1;
437 args.in.args[1].value = entry->d_name.name;
438 args.out.numargs = 2;
21f62174 439 args.out.args[0].size = sizeof(outentry);
7078187a
MS
440 args.out.args[0].value = &outentry;
441 args.out.args[1].size = sizeof(outopen);
442 args.out.args[1].value = &outopen;
443 err = fuse_simple_request(fc, &args);
c8ccbe03 444 if (err)
fd72faac 445 goto out_free_ff;
fd72faac
MS
446
447 err = -EIO;
2827d0b2 448 if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid))
fd72faac
MS
449 goto out_free_ff;
450
c7b7143c
MS
451 ff->fh = outopen.fh;
452 ff->nodeid = outentry.nodeid;
453 ff->open_flags = outopen.open_flags;
fd72faac 454 inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
1fb69e78 455 &outentry.attr, entry_attr_timeout(&outentry), 0);
fd72faac
MS
456 if (!inode) {
457 flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
8b0797a4 458 fuse_sync_release(ff, flags);
07e77dca 459 fuse_queue_forget(fc, forget, outentry.nodeid, 1);
c8ccbe03
MS
460 err = -ENOMEM;
461 goto out_err;
fd72faac 462 }
07e77dca 463 kfree(forget);
fd72faac 464 d_instantiate(entry, inode);
1fb69e78 465 fuse_change_entry_timeout(entry, &outentry);
0952b2a4 466 fuse_invalidate_attr(dir);
30d90494
AV
467 err = finish_open(file, entry, generic_file_open, opened);
468 if (err) {
8b0797a4 469 fuse_sync_release(ff, flags);
c8ccbe03
MS
470 } else {
471 file->private_data = fuse_file_get(ff);
472 fuse_finish_open(inode, file);
fd72faac 473 }
d9585277 474 return err;
fd72faac 475
c8ccbe03 476out_free_ff:
fd72faac 477 fuse_file_free(ff);
c8ccbe03 478out_put_forget_req:
07e77dca 479 kfree(forget);
c8ccbe03 480out_err:
d9585277 481 return err;
c8ccbe03
MS
482}
483
484static int fuse_mknod(struct inode *, struct dentry *, umode_t, dev_t);
d9585277 485static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
30d90494 486 struct file *file, unsigned flags,
d9585277 487 umode_t mode, int *opened)
c8ccbe03
MS
488{
489 int err;
490 struct fuse_conn *fc = get_fuse_conn(dir);
c8ccbe03
MS
491 struct dentry *res = NULL;
492
00699ad8 493 if (d_in_lookup(entry)) {
00cd8dd3 494 res = fuse_lookup(dir, entry, 0);
c8ccbe03 495 if (IS_ERR(res))
d9585277 496 return PTR_ERR(res);
c8ccbe03
MS
497
498 if (res)
499 entry = res;
500 }
501
2b0143b5 502 if (!(flags & O_CREAT) || d_really_is_positive(entry))
c8ccbe03
MS
503 goto no_open;
504
505 /* Only creates */
47237687 506 *opened |= FILE_CREATED;
c8ccbe03
MS
507
508 if (fc->no_create)
509 goto mknod;
510
30d90494 511 err = fuse_create_open(dir, entry, file, flags, mode, opened);
d9585277 512 if (err == -ENOSYS) {
c8ccbe03
MS
513 fc->no_create = 1;
514 goto mknod;
515 }
516out_dput:
517 dput(res);
d9585277 518 return err;
c8ccbe03
MS
519
520mknod:
521 err = fuse_mknod(dir, entry, mode, 0);
d9585277 522 if (err)
c8ccbe03 523 goto out_dput;
c8ccbe03 524no_open:
e45198a6 525 return finish_no_open(file, res);
fd72faac
MS
526}
527
6f9f1180
MS
528/*
529 * Code shared between mknod, mkdir, symlink and link
530 */
7078187a 531static int create_new_entry(struct fuse_conn *fc, struct fuse_args *args,
9e6268db 532 struct inode *dir, struct dentry *entry,
541af6a0 533 umode_t mode)
9e6268db
MS
534{
535 struct fuse_entry_out outarg;
536 struct inode *inode;
9e6268db 537 int err;
07e77dca 538 struct fuse_forget_link *forget;
2d51013e 539
07e77dca 540 forget = fuse_alloc_forget();
7078187a 541 if (!forget)
07e77dca 542 return -ENOMEM;
9e6268db 543
0e9663ee 544 memset(&outarg, 0, sizeof(outarg));
7078187a
MS
545 args->in.h.nodeid = get_node_id(dir);
546 args->out.numargs = 1;
21f62174 547 args->out.args[0].size = sizeof(outarg);
7078187a
MS
548 args->out.args[0].value = &outarg;
549 err = fuse_simple_request(fc, args);
2d51013e
MS
550 if (err)
551 goto out_put_forget_req;
552
39ee059a
MS
553 err = -EIO;
554 if (invalid_nodeid(outarg.nodeid))
2d51013e 555 goto out_put_forget_req;
39ee059a
MS
556
557 if ((outarg.attr.mode ^ mode) & S_IFMT)
2d51013e 558 goto out_put_forget_req;
39ee059a 559
9e6268db 560 inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
1fb69e78 561 &outarg.attr, entry_attr_timeout(&outarg), 0);
9e6268db 562 if (!inode) {
07e77dca 563 fuse_queue_forget(fc, forget, outarg.nodeid, 1);
9e6268db
MS
564 return -ENOMEM;
565 }
07e77dca 566 kfree(forget);
9e6268db 567
b70a80e7
MS
568 err = d_instantiate_no_diralias(entry, inode);
569 if (err)
570 return err;
9e6268db 571
1fb69e78 572 fuse_change_entry_timeout(entry, &outarg);
9e6268db
MS
573 fuse_invalidate_attr(dir);
574 return 0;
39ee059a 575
2d51013e 576 out_put_forget_req:
07e77dca 577 kfree(forget);
39ee059a 578 return err;
9e6268db
MS
579}
580
1a67aafb 581static int fuse_mknod(struct inode *dir, struct dentry *entry, umode_t mode,
9e6268db
MS
582 dev_t rdev)
583{
584 struct fuse_mknod_in inarg;
585 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 586 FUSE_ARGS(args);
9e6268db 587
e0a43ddc
MS
588 if (!fc->dont_mask)
589 mode &= ~current_umask();
590
9e6268db
MS
591 memset(&inarg, 0, sizeof(inarg));
592 inarg.mode = mode;
593 inarg.rdev = new_encode_dev(rdev);
e0a43ddc 594 inarg.umask = current_umask();
7078187a
MS
595 args.in.h.opcode = FUSE_MKNOD;
596 args.in.numargs = 2;
21f62174 597 args.in.args[0].size = sizeof(inarg);
7078187a
MS
598 args.in.args[0].value = &inarg;
599 args.in.args[1].size = entry->d_name.len + 1;
600 args.in.args[1].value = entry->d_name.name;
601 return create_new_entry(fc, &args, dir, entry, mode);
9e6268db
MS
602}
603
4acdaf27 604static int fuse_create(struct inode *dir, struct dentry *entry, umode_t mode,
ebfc3b49 605 bool excl)
9e6268db
MS
606{
607 return fuse_mknod(dir, entry, mode, 0);
608}
609
18bb1db3 610static int fuse_mkdir(struct inode *dir, struct dentry *entry, umode_t mode)
9e6268db
MS
611{
612 struct fuse_mkdir_in inarg;
613 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a 614 FUSE_ARGS(args);
9e6268db 615
e0a43ddc
MS
616 if (!fc->dont_mask)
617 mode &= ~current_umask();
618
9e6268db
MS
619 memset(&inarg, 0, sizeof(inarg));
620 inarg.mode = mode;
e0a43ddc 621 inarg.umask = current_umask();
7078187a
MS
622 args.in.h.opcode = FUSE_MKDIR;
623 args.in.numargs = 2;
624 args.in.args[0].size = sizeof(inarg);
625 args.in.args[0].value = &inarg;
626 args.in.args[1].size = entry->d_name.len + 1;
627 args.in.args[1].value = entry->d_name.name;
628 return create_new_entry(fc, &args, dir, entry, S_IFDIR);
9e6268db
MS
629}
630
631static int fuse_symlink(struct inode *dir, struct dentry *entry,
632 const char *link)
633{
634 struct fuse_conn *fc = get_fuse_conn(dir);
635 unsigned len = strlen(link) + 1;
7078187a 636 FUSE_ARGS(args);
9e6268db 637
7078187a
MS
638 args.in.h.opcode = FUSE_SYMLINK;
639 args.in.numargs = 2;
640 args.in.args[0].size = entry->d_name.len + 1;
641 args.in.args[0].value = entry->d_name.name;
642 args.in.args[1].size = len;
643 args.in.args[1].value = link;
644 return create_new_entry(fc, &args, dir, entry, S_IFLNK);
9e6268db
MS
645}
646
703c7362 647void fuse_update_ctime(struct inode *inode)
31f3267b
MP
648{
649 if (!IS_NOCMTIME(inode)) {
650 inode->i_ctime = current_fs_time(inode->i_sb);
651 mark_inode_dirty_sync(inode);
652 }
653}
654
9e6268db
MS
655static int fuse_unlink(struct inode *dir, struct dentry *entry)
656{
657 int err;
658 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
659 FUSE_ARGS(args);
660
661 args.in.h.opcode = FUSE_UNLINK;
662 args.in.h.nodeid = get_node_id(dir);
663 args.in.numargs = 1;
664 args.in.args[0].size = entry->d_name.len + 1;
665 args.in.args[0].value = entry->d_name.name;
666 err = fuse_simple_request(fc, &args);
9e6268db 667 if (!err) {
2b0143b5 668 struct inode *inode = d_inode(entry);
ac45d613 669 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 670
ac45d613
MS
671 spin_lock(&fc->lock);
672 fi->attr_version = ++fc->attr_version;
dfca7ceb
MS
673 /*
674 * If i_nlink == 0 then unlink doesn't make sense, yet this can
675 * happen if userspace filesystem is careless. It would be
676 * difficult to enforce correct nlink usage so just ignore this
677 * condition here
678 */
679 if (inode->i_nlink > 0)
680 drop_nlink(inode);
ac45d613 681 spin_unlock(&fc->lock);
9e6268db
MS
682 fuse_invalidate_attr(inode);
683 fuse_invalidate_attr(dir);
8cbdf1e6 684 fuse_invalidate_entry_cache(entry);
31f3267b 685 fuse_update_ctime(inode);
9e6268db
MS
686 } else if (err == -EINTR)
687 fuse_invalidate_entry(entry);
688 return err;
689}
690
691static int fuse_rmdir(struct inode *dir, struct dentry *entry)
692{
693 int err;
694 struct fuse_conn *fc = get_fuse_conn(dir);
7078187a
MS
695 FUSE_ARGS(args);
696
697 args.in.h.opcode = FUSE_RMDIR;
698 args.in.h.nodeid = get_node_id(dir);
699 args.in.numargs = 1;
700 args.in.args[0].size = entry->d_name.len + 1;
701 args.in.args[0].value = entry->d_name.name;
702 err = fuse_simple_request(fc, &args);
9e6268db 703 if (!err) {
2b0143b5 704 clear_nlink(d_inode(entry));
9e6268db 705 fuse_invalidate_attr(dir);
8cbdf1e6 706 fuse_invalidate_entry_cache(entry);
9e6268db
MS
707 } else if (err == -EINTR)
708 fuse_invalidate_entry(entry);
709 return err;
710}
711
1560c974
MS
712static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
713 struct inode *newdir, struct dentry *newent,
714 unsigned int flags, int opcode, size_t argsize)
9e6268db
MS
715{
716 int err;
1560c974 717 struct fuse_rename2_in inarg;
9e6268db 718 struct fuse_conn *fc = get_fuse_conn(olddir);
7078187a 719 FUSE_ARGS(args);
9e6268db 720
1560c974 721 memset(&inarg, 0, argsize);
9e6268db 722 inarg.newdir = get_node_id(newdir);
1560c974 723 inarg.flags = flags;
7078187a
MS
724 args.in.h.opcode = opcode;
725 args.in.h.nodeid = get_node_id(olddir);
726 args.in.numargs = 3;
727 args.in.args[0].size = argsize;
728 args.in.args[0].value = &inarg;
729 args.in.args[1].size = oldent->d_name.len + 1;
730 args.in.args[1].value = oldent->d_name.name;
731 args.in.args[2].size = newent->d_name.len + 1;
732 args.in.args[2].value = newent->d_name.name;
733 err = fuse_simple_request(fc, &args);
9e6268db 734 if (!err) {
08b63307 735 /* ctime changes */
2b0143b5
DH
736 fuse_invalidate_attr(d_inode(oldent));
737 fuse_update_ctime(d_inode(oldent));
08b63307 738
1560c974 739 if (flags & RENAME_EXCHANGE) {
2b0143b5
DH
740 fuse_invalidate_attr(d_inode(newent));
741 fuse_update_ctime(d_inode(newent));
1560c974
MS
742 }
743
9e6268db
MS
744 fuse_invalidate_attr(olddir);
745 if (olddir != newdir)
746 fuse_invalidate_attr(newdir);
8cbdf1e6
MS
747
748 /* newent will end up negative */
2b0143b5
DH
749 if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent)) {
750 fuse_invalidate_attr(d_inode(newent));
8cbdf1e6 751 fuse_invalidate_entry_cache(newent);
2b0143b5 752 fuse_update_ctime(d_inode(newent));
5219f346 753 }
9e6268db
MS
754 } else if (err == -EINTR) {
755 /* If request was interrupted, DEITY only knows if the
756 rename actually took place. If the invalidation
757 fails (e.g. some process has CWD under the renamed
758 directory), then there can be inconsistency between
759 the dcache and the real filesystem. Tough luck. */
760 fuse_invalidate_entry(oldent);
2b0143b5 761 if (d_really_is_positive(newent))
9e6268db
MS
762 fuse_invalidate_entry(newent);
763 }
764
765 return err;
766}
767
1560c974
MS
768static int fuse_rename2(struct inode *olddir, struct dentry *oldent,
769 struct inode *newdir, struct dentry *newent,
770 unsigned int flags)
771{
772 struct fuse_conn *fc = get_fuse_conn(olddir);
773 int err;
774
775 if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE))
776 return -EINVAL;
777
4237ba43
MS
778 if (flags) {
779 if (fc->no_rename2 || fc->minor < 23)
780 return -EINVAL;
1560c974 781
4237ba43
MS
782 err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
783 FUSE_RENAME2,
784 sizeof(struct fuse_rename2_in));
785 if (err == -ENOSYS) {
786 fc->no_rename2 = 1;
787 err = -EINVAL;
788 }
789 } else {
790 err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
791 FUSE_RENAME,
792 sizeof(struct fuse_rename_in));
1560c974 793 }
4237ba43 794
1560c974 795 return err;
4237ba43 796}
1560c974 797
9e6268db
MS
798static int fuse_link(struct dentry *entry, struct inode *newdir,
799 struct dentry *newent)
800{
801 int err;
802 struct fuse_link_in inarg;
2b0143b5 803 struct inode *inode = d_inode(entry);
9e6268db 804 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 805 FUSE_ARGS(args);
9e6268db
MS
806
807 memset(&inarg, 0, sizeof(inarg));
808 inarg.oldnodeid = get_node_id(inode);
7078187a
MS
809 args.in.h.opcode = FUSE_LINK;
810 args.in.numargs = 2;
811 args.in.args[0].size = sizeof(inarg);
812 args.in.args[0].value = &inarg;
813 args.in.args[1].size = newent->d_name.len + 1;
814 args.in.args[1].value = newent->d_name.name;
815 err = create_new_entry(fc, &args, newdir, newent, inode->i_mode);
9e6268db
MS
816 /* Contrary to "normal" filesystems it can happen that link
817 makes two "logical" inodes point to the same "physical"
818 inode. We invalidate the attributes of the old one, so it
819 will reflect changes in the backing inode (link count,
820 etc.)
821 */
ac45d613
MS
822 if (!err) {
823 struct fuse_inode *fi = get_fuse_inode(inode);
824
825 spin_lock(&fc->lock);
826 fi->attr_version = ++fc->attr_version;
827 inc_nlink(inode);
828 spin_unlock(&fc->lock);
9e6268db 829 fuse_invalidate_attr(inode);
31f3267b 830 fuse_update_ctime(inode);
ac45d613
MS
831 } else if (err == -EINTR) {
832 fuse_invalidate_attr(inode);
833 }
9e6268db
MS
834 return err;
835}
836
1fb69e78
MS
837static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
838 struct kstat *stat)
839{
203627bb 840 unsigned int blkbits;
8373200b
PE
841 struct fuse_conn *fc = get_fuse_conn(inode);
842
843 /* see the comment in fuse_change_attributes() */
b0aa7606 844 if (fc->writeback_cache && S_ISREG(inode->i_mode)) {
8373200b 845 attr->size = i_size_read(inode);
b0aa7606
MP
846 attr->mtime = inode->i_mtime.tv_sec;
847 attr->mtimensec = inode->i_mtime.tv_nsec;
31f3267b
MP
848 attr->ctime = inode->i_ctime.tv_sec;
849 attr->ctimensec = inode->i_ctime.tv_nsec;
b0aa7606 850 }
203627bb 851
1fb69e78
MS
852 stat->dev = inode->i_sb->s_dev;
853 stat->ino = attr->ino;
854 stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
855 stat->nlink = attr->nlink;
499dcf20
EB
856 stat->uid = make_kuid(&init_user_ns, attr->uid);
857 stat->gid = make_kgid(&init_user_ns, attr->gid);
1fb69e78
MS
858 stat->rdev = inode->i_rdev;
859 stat->atime.tv_sec = attr->atime;
860 stat->atime.tv_nsec = attr->atimensec;
861 stat->mtime.tv_sec = attr->mtime;
862 stat->mtime.tv_nsec = attr->mtimensec;
863 stat->ctime.tv_sec = attr->ctime;
864 stat->ctime.tv_nsec = attr->ctimensec;
865 stat->size = attr->size;
866 stat->blocks = attr->blocks;
203627bb
MS
867
868 if (attr->blksize != 0)
869 blkbits = ilog2(attr->blksize);
870 else
871 blkbits = inode->i_sb->s_blocksize_bits;
872
873 stat->blksize = 1 << blkbits;
1fb69e78
MS
874}
875
c79e322f
MS
876static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
877 struct file *file)
e5e5558e
MS
878{
879 int err;
c79e322f
MS
880 struct fuse_getattr_in inarg;
881 struct fuse_attr_out outarg;
e5e5558e 882 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 883 FUSE_ARGS(args);
1fb69e78
MS
884 u64 attr_version;
885
7dca9fd3 886 attr_version = fuse_get_attr_version(fc);
1fb69e78 887
c79e322f 888 memset(&inarg, 0, sizeof(inarg));
0e9663ee 889 memset(&outarg, 0, sizeof(outarg));
c79e322f
MS
890 /* Directories have separate file-handle space */
891 if (file && S_ISREG(inode->i_mode)) {
892 struct fuse_file *ff = file->private_data;
893
894 inarg.getattr_flags |= FUSE_GETATTR_FH;
895 inarg.fh = ff->fh;
896 }
7078187a
MS
897 args.in.h.opcode = FUSE_GETATTR;
898 args.in.h.nodeid = get_node_id(inode);
899 args.in.numargs = 1;
900 args.in.args[0].size = sizeof(inarg);
901 args.in.args[0].value = &inarg;
902 args.out.numargs = 1;
21f62174 903 args.out.args[0].size = sizeof(outarg);
7078187a
MS
904 args.out.args[0].value = &outarg;
905 err = fuse_simple_request(fc, &args);
e5e5558e 906 if (!err) {
c79e322f 907 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
e5e5558e
MS
908 make_bad_inode(inode);
909 err = -EIO;
910 } else {
c79e322f
MS
911 fuse_change_attributes(inode, &outarg.attr,
912 attr_timeout(&outarg),
1fb69e78
MS
913 attr_version);
914 if (stat)
c79e322f 915 fuse_fillattr(inode, &outarg.attr, stat);
e5e5558e
MS
916 }
917 }
918 return err;
919}
920
bcb4be80
MS
921int fuse_update_attributes(struct inode *inode, struct kstat *stat,
922 struct file *file, bool *refreshed)
923{
924 struct fuse_inode *fi = get_fuse_inode(inode);
925 int err;
926 bool r;
927
126b9d43 928 if (time_before64(fi->i_time, get_jiffies_64())) {
bcb4be80 929 r = true;
60bcc88a 930 forget_all_cached_acls(inode);
bcb4be80
MS
931 err = fuse_do_getattr(inode, stat, file);
932 } else {
933 r = false;
934 err = 0;
935 if (stat) {
936 generic_fillattr(inode, stat);
937 stat->mode = fi->orig_i_mode;
45c72cd7 938 stat->ino = fi->orig_ino;
bcb4be80
MS
939 }
940 }
941
942 if (refreshed != NULL)
943 *refreshed = r;
944
945 return err;
946}
947
3b463ae0 948int fuse_reverse_inval_entry(struct super_block *sb, u64 parent_nodeid,
451d0f59 949 u64 child_nodeid, struct qstr *name)
3b463ae0
JM
950{
951 int err = -ENOTDIR;
952 struct inode *parent;
953 struct dentry *dir;
954 struct dentry *entry;
955
956 parent = ilookup5(sb, parent_nodeid, fuse_inode_eq, &parent_nodeid);
957 if (!parent)
958 return -ENOENT;
959
5955102c 960 inode_lock(parent);
3b463ae0
JM
961 if (!S_ISDIR(parent->i_mode))
962 goto unlock;
963
964 err = -ENOENT;
965 dir = d_find_alias(parent);
966 if (!dir)
967 goto unlock;
968
8387ff25 969 name->hash = full_name_hash(dir, name->name, name->len);
3b463ae0
JM
970 entry = d_lookup(dir, name);
971 dput(dir);
972 if (!entry)
973 goto unlock;
974
975 fuse_invalidate_attr(parent);
976 fuse_invalidate_entry(entry);
451d0f59 977
2b0143b5 978 if (child_nodeid != 0 && d_really_is_positive(entry)) {
5955102c 979 inode_lock(d_inode(entry));
2b0143b5 980 if (get_node_id(d_inode(entry)) != child_nodeid) {
451d0f59
JM
981 err = -ENOENT;
982 goto badentry;
983 }
984 if (d_mountpoint(entry)) {
985 err = -EBUSY;
986 goto badentry;
987 }
e36cb0b8 988 if (d_is_dir(entry)) {
451d0f59
JM
989 shrink_dcache_parent(entry);
990 if (!simple_empty(entry)) {
991 err = -ENOTEMPTY;
992 goto badentry;
993 }
2b0143b5 994 d_inode(entry)->i_flags |= S_DEAD;
451d0f59
JM
995 }
996 dont_mount(entry);
2b0143b5 997 clear_nlink(d_inode(entry));
451d0f59
JM
998 err = 0;
999 badentry:
5955102c 1000 inode_unlock(d_inode(entry));
451d0f59
JM
1001 if (!err)
1002 d_delete(entry);
1003 } else {
1004 err = 0;
1005 }
3b463ae0 1006 dput(entry);
3b463ae0
JM
1007
1008 unlock:
5955102c 1009 inode_unlock(parent);
3b463ae0
JM
1010 iput(parent);
1011 return err;
1012}
1013
87729a55
MS
1014/*
1015 * Calling into a user-controlled filesystem gives the filesystem
c2132c1b 1016 * daemon ptrace-like capabilities over the current process. This
87729a55
MS
1017 * means, that the filesystem daemon is able to record the exact
1018 * filesystem operations performed, and can also control the behavior
1019 * of the requester process in otherwise impossible ways. For example
1020 * it can delay the operation for arbitrary length of time allowing
1021 * DoS against the requester.
1022 *
1023 * For this reason only those processes can call into the filesystem,
1024 * for which the owner of the mount has ptrace privilege. This
1025 * excludes processes started by other users, suid or sgid processes.
1026 */
c2132c1b 1027int fuse_allow_current_process(struct fuse_conn *fc)
87729a55 1028{
c69e8d9c 1029 const struct cred *cred;
87729a55 1030
c69e8d9c 1031 if (fc->flags & FUSE_ALLOW_OTHER)
87729a55
MS
1032 return 1;
1033
c2132c1b 1034 cred = current_cred();
499dcf20
EB
1035 if (uid_eq(cred->euid, fc->user_id) &&
1036 uid_eq(cred->suid, fc->user_id) &&
1037 uid_eq(cred->uid, fc->user_id) &&
1038 gid_eq(cred->egid, fc->group_id) &&
1039 gid_eq(cred->sgid, fc->group_id) &&
1040 gid_eq(cred->gid, fc->group_id))
c2132c1b 1041 return 1;
c69e8d9c 1042
c2132c1b 1043 return 0;
87729a55
MS
1044}
1045
31d40d74
MS
1046static int fuse_access(struct inode *inode, int mask)
1047{
1048 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1049 FUSE_ARGS(args);
31d40d74
MS
1050 struct fuse_access_in inarg;
1051 int err;
1052
698fa1d1
MS
1053 BUG_ON(mask & MAY_NOT_BLOCK);
1054
31d40d74
MS
1055 if (fc->no_access)
1056 return 0;
1057
31d40d74 1058 memset(&inarg, 0, sizeof(inarg));
e6305c43 1059 inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
7078187a
MS
1060 args.in.h.opcode = FUSE_ACCESS;
1061 args.in.h.nodeid = get_node_id(inode);
1062 args.in.numargs = 1;
1063 args.in.args[0].size = sizeof(inarg);
1064 args.in.args[0].value = &inarg;
1065 err = fuse_simple_request(fc, &args);
31d40d74
MS
1066 if (err == -ENOSYS) {
1067 fc->no_access = 1;
1068 err = 0;
1069 }
1070 return err;
1071}
1072
10556cb2 1073static int fuse_perm_getattr(struct inode *inode, int mask)
19690ddb 1074{
10556cb2 1075 if (mask & MAY_NOT_BLOCK)
19690ddb
MS
1076 return -ECHILD;
1077
60bcc88a 1078 forget_all_cached_acls(inode);
19690ddb
MS
1079 return fuse_do_getattr(inode, NULL, NULL);
1080}
1081
6f9f1180
MS
1082/*
1083 * Check permission. The two basic access models of FUSE are:
1084 *
1085 * 1) Local access checking ('default_permissions' mount option) based
1086 * on file mode. This is the plain old disk filesystem permission
1087 * modell.
1088 *
1089 * 2) "Remote" access checking, where server is responsible for
1090 * checking permission in each inode operation. An exception to this
1091 * is if ->permission() was invoked from sys_access() in which case an
1092 * access request is sent. Execute permission is still checked
1093 * locally based on file mode.
1094 */
10556cb2 1095static int fuse_permission(struct inode *inode, int mask)
e5e5558e
MS
1096{
1097 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385
MS
1098 bool refreshed = false;
1099 int err = 0;
e5e5558e 1100
c2132c1b 1101 if (!fuse_allow_current_process(fc))
e5e5558e 1102 return -EACCES;
244f6385
MS
1103
1104 /*
e8e96157 1105 * If attributes are needed, refresh them before proceeding
244f6385 1106 */
e8e96157
MS
1107 if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) ||
1108 ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
19690ddb
MS
1109 struct fuse_inode *fi = get_fuse_inode(inode);
1110
126b9d43 1111 if (time_before64(fi->i_time, get_jiffies_64())) {
19690ddb
MS
1112 refreshed = true;
1113
10556cb2 1114 err = fuse_perm_getattr(inode, mask);
19690ddb
MS
1115 if (err)
1116 return err;
1117 }
244f6385
MS
1118 }
1119
1120 if (fc->flags & FUSE_DEFAULT_PERMISSIONS) {
2830ba7f 1121 err = generic_permission(inode, mask);
1e9a4ed9
MS
1122
1123 /* If permission is denied, try to refresh file
1124 attributes. This is also needed, because the root
1125 node will at first have no permissions */
244f6385 1126 if (err == -EACCES && !refreshed) {
10556cb2 1127 err = fuse_perm_getattr(inode, mask);
1e9a4ed9 1128 if (!err)
2830ba7f 1129 err = generic_permission(inode, mask);
1e9a4ed9
MS
1130 }
1131
6f9f1180
MS
1132 /* Note: the opposite of the above test does not
1133 exist. So if permissions are revoked this won't be
1134 noticed immediately, only after the attribute
1135 timeout has expired */
9cfcac81 1136 } else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
e8e96157
MS
1137 err = fuse_access(inode, mask);
1138 } else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1139 if (!(inode->i_mode & S_IXUGO)) {
1140 if (refreshed)
1141 return -EACCES;
1142
10556cb2 1143 err = fuse_perm_getattr(inode, mask);
e8e96157
MS
1144 if (!err && !(inode->i_mode & S_IXUGO))
1145 return -EACCES;
1146 }
e5e5558e 1147 }
244f6385 1148 return err;
e5e5558e
MS
1149}
1150
1151static int parse_dirfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1152 struct dir_context *ctx)
e5e5558e
MS
1153{
1154 while (nbytes >= FUSE_NAME_OFFSET) {
1155 struct fuse_dirent *dirent = (struct fuse_dirent *) buf;
1156 size_t reclen = FUSE_DIRENT_SIZE(dirent);
e5e5558e
MS
1157 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1158 return -EIO;
1159 if (reclen > nbytes)
1160 break;
efeb9e60
MS
1161 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1162 return -EIO;
e5e5558e 1163
8d3af7f3
AV
1164 if (!dir_emit(ctx, dirent->name, dirent->namelen,
1165 dirent->ino, dirent->type))
e5e5558e
MS
1166 break;
1167
1168 buf += reclen;
1169 nbytes -= reclen;
8d3af7f3 1170 ctx->pos = dirent->off;
e5e5558e
MS
1171 }
1172
1173 return 0;
1174}
1175
0b05b183
AA
1176static int fuse_direntplus_link(struct file *file,
1177 struct fuse_direntplus *direntplus,
1178 u64 attr_version)
1179{
0b05b183
AA
1180 struct fuse_entry_out *o = &direntplus->entry_out;
1181 struct fuse_dirent *dirent = &direntplus->dirent;
1182 struct dentry *parent = file->f_path.dentry;
1183 struct qstr name = QSTR_INIT(dirent->name, dirent->namelen);
1184 struct dentry *dentry;
1185 struct dentry *alias;
2b0143b5 1186 struct inode *dir = d_inode(parent);
0b05b183
AA
1187 struct fuse_conn *fc;
1188 struct inode *inode;
d9b3dbdc 1189 DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
0b05b183
AA
1190
1191 if (!o->nodeid) {
1192 /*
1193 * Unlike in the case of fuse_lookup, zero nodeid does not mean
1194 * ENOENT. Instead, it only means the userspace filesystem did
1195 * not want to return attributes/handle for this entry.
1196 *
1197 * So do nothing.
1198 */
1199 return 0;
1200 }
1201
1202 if (name.name[0] == '.') {
1203 /*
1204 * We could potentially refresh the attributes of the directory
1205 * and its parent?
1206 */
1207 if (name.len == 1)
1208 return 0;
1209 if (name.name[1] == '.' && name.len == 2)
1210 return 0;
1211 }
a28ef45c
MS
1212
1213 if (invalid_nodeid(o->nodeid))
1214 return -EIO;
1215 if (!fuse_valid_type(o->attr.mode))
1216 return -EIO;
1217
0b05b183
AA
1218 fc = get_fuse_conn(dir);
1219
8387ff25 1220 name.hash = full_name_hash(parent, name.name, name.len);
0b05b183 1221 dentry = d_lookup(parent, &name);
d9b3dbdc
AV
1222 if (!dentry) {
1223retry:
1224 dentry = d_alloc_parallel(parent, &name, &wq);
1225 if (IS_ERR(dentry))
1226 return PTR_ERR(dentry);
1227 }
1228 if (!d_in_lookup(dentry)) {
1229 struct fuse_inode *fi;
2b0143b5 1230 inode = d_inode(dentry);
d9b3dbdc
AV
1231 if (!inode ||
1232 get_node_id(inode) != o->nodeid ||
1233 ((o->attr.mode ^ inode->i_mode) & S_IFMT)) {
5542aa2f 1234 d_invalidate(dentry);
d9b3dbdc
AV
1235 dput(dentry);
1236 goto retry;
1237 }
1238 if (is_bad_inode(inode)) {
1239 dput(dentry);
1240 return -EIO;
0b05b183 1241 }
0b05b183 1242
d9b3dbdc
AV
1243 fi = get_fuse_inode(inode);
1244 spin_lock(&fc->lock);
1245 fi->nlookup++;
1246 spin_unlock(&fc->lock);
0b05b183 1247
60bcc88a 1248 forget_all_cached_acls(inode);
d9b3dbdc
AV
1249 fuse_change_attributes(inode, &o->attr,
1250 entry_attr_timeout(o),
1251 attr_version);
1252 /*
1253 * The other branch comes via fuse_iget()
1254 * which bumps nlookup inside
1255 */
1256 } else {
1257 inode = fuse_iget(dir->i_sb, o->nodeid, o->generation,
1258 &o->attr, entry_attr_timeout(o),
1259 attr_version);
1260 if (!inode)
1261 inode = ERR_PTR(-ENOMEM);
2914941e 1262
d9b3dbdc
AV
1263 alias = d_splice_alias(inode, dentry);
1264 d_lookup_done(dentry);
1265 if (alias) {
1266 dput(dentry);
1267 dentry = alias;
1268 }
1269 if (IS_ERR(dentry))
1270 return PTR_ERR(dentry);
0b05b183 1271 }
6314efee
MS
1272 if (fc->readdirplus_auto)
1273 set_bit(FUSE_I_INIT_RDPLUS, &get_fuse_inode(inode)->state);
0b05b183
AA
1274 fuse_change_entry_timeout(dentry, o);
1275
c7263bcd 1276 dput(dentry);
d9b3dbdc 1277 return 0;
0b05b183
AA
1278}
1279
1280static int parse_dirplusfile(char *buf, size_t nbytes, struct file *file,
8d3af7f3 1281 struct dir_context *ctx, u64 attr_version)
0b05b183
AA
1282{
1283 struct fuse_direntplus *direntplus;
1284 struct fuse_dirent *dirent;
1285 size_t reclen;
1286 int over = 0;
1287 int ret;
1288
1289 while (nbytes >= FUSE_NAME_OFFSET_DIRENTPLUS) {
1290 direntplus = (struct fuse_direntplus *) buf;
1291 dirent = &direntplus->dirent;
1292 reclen = FUSE_DIRENTPLUS_SIZE(direntplus);
1293
1294 if (!dirent->namelen || dirent->namelen > FUSE_NAME_MAX)
1295 return -EIO;
1296 if (reclen > nbytes)
1297 break;
efeb9e60
MS
1298 if (memchr(dirent->name, '/', dirent->namelen) != NULL)
1299 return -EIO;
0b05b183
AA
1300
1301 if (!over) {
1302 /* We fill entries into dstbuf only as much as
1303 it can hold. But we still continue iterating
1304 over remaining entries to link them. If not,
1305 we need to send a FORGET for each of those
1306 which we did not link.
1307 */
8d3af7f3
AV
1308 over = !dir_emit(ctx, dirent->name, dirent->namelen,
1309 dirent->ino, dirent->type);
1310 ctx->pos = dirent->off;
0b05b183
AA
1311 }
1312
1313 buf += reclen;
1314 nbytes -= reclen;
1315
1316 ret = fuse_direntplus_link(file, direntplus, attr_version);
1317 if (ret)
1318 fuse_force_forget(file, direntplus->entry_out.nodeid);
1319 }
1320
1321 return 0;
1322}
1323
8d3af7f3 1324static int fuse_readdir(struct file *file, struct dir_context *ctx)
e5e5558e 1325{
4582a4ab 1326 int plus, err;
04730fef
MS
1327 size_t nbytes;
1328 struct page *page;
496ad9aa 1329 struct inode *inode = file_inode(file);
e5e5558e 1330 struct fuse_conn *fc = get_fuse_conn(inode);
248d86e8 1331 struct fuse_req *req;
0b05b183 1332 u64 attr_version = 0;
248d86e8
MS
1333
1334 if (is_bad_inode(inode))
1335 return -EIO;
1336
b111c8c0 1337 req = fuse_get_req(fc, 1);
ce1d5a49
MS
1338 if (IS_ERR(req))
1339 return PTR_ERR(req);
e5e5558e 1340
04730fef
MS
1341 page = alloc_page(GFP_KERNEL);
1342 if (!page) {
1343 fuse_put_request(fc, req);
1344 return -ENOMEM;
1345 }
4582a4ab 1346
8d3af7f3 1347 plus = fuse_use_readdirplus(inode, ctx);
f4975c67 1348 req->out.argpages = 1;
04730fef
MS
1349 req->num_pages = 1;
1350 req->pages[0] = page;
85f40aec 1351 req->page_descs[0].length = PAGE_SIZE;
4582a4ab 1352 if (plus) {
0b05b183 1353 attr_version = fuse_get_attr_version(fc);
8d3af7f3 1354 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1355 FUSE_READDIRPLUS);
1356 } else {
8d3af7f3 1357 fuse_read_fill(req, file, ctx->pos, PAGE_SIZE,
0b05b183
AA
1358 FUSE_READDIR);
1359 }
5c672ab3 1360 fuse_lock_inode(inode);
b93f858a 1361 fuse_request_send(fc, req);
5c672ab3 1362 fuse_unlock_inode(inode);
361b1eb5 1363 nbytes = req->out.args[0].size;
e5e5558e
MS
1364 err = req->out.h.error;
1365 fuse_put_request(fc, req);
0b05b183 1366 if (!err) {
4582a4ab 1367 if (plus) {
0b05b183 1368 err = parse_dirplusfile(page_address(page), nbytes,
8d3af7f3 1369 file, ctx,
0b05b183
AA
1370 attr_version);
1371 } else {
1372 err = parse_dirfile(page_address(page), nbytes, file,
8d3af7f3 1373 ctx);
0b05b183
AA
1374 }
1375 }
e5e5558e 1376
04730fef 1377 __free_page(page);
451418fc 1378 fuse_invalidate_atime(inode);
04730fef 1379 return err;
e5e5558e
MS
1380}
1381
6b255391 1382static const char *fuse_get_link(struct dentry *dentry,
fceef393
AV
1383 struct inode *inode,
1384 struct delayed_call *done)
e5e5558e 1385{
e5e5558e 1386 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1387 FUSE_ARGS(args);
e5e5558e 1388 char *link;
7078187a 1389 ssize_t ret;
e5e5558e 1390
6b255391
AV
1391 if (!dentry)
1392 return ERR_PTR(-ECHILD);
1393
cd3417c8 1394 link = kmalloc(PAGE_SIZE, GFP_KERNEL);
7078187a
MS
1395 if (!link)
1396 return ERR_PTR(-ENOMEM);
1397
1398 args.in.h.opcode = FUSE_READLINK;
1399 args.in.h.nodeid = get_node_id(inode);
1400 args.out.argvar = 1;
1401 args.out.numargs = 1;
1402 args.out.args[0].size = PAGE_SIZE - 1;
1403 args.out.args[0].value = link;
1404 ret = fuse_simple_request(fc, &args);
1405 if (ret < 0) {
cd3417c8 1406 kfree(link);
7078187a
MS
1407 link = ERR_PTR(ret);
1408 } else {
1409 link[ret] = '\0';
fceef393 1410 set_delayed_call(done, kfree_link, link);
7078187a 1411 }
451418fc 1412 fuse_invalidate_atime(inode);
e5e5558e
MS
1413 return link;
1414}
1415
e5e5558e
MS
1416static int fuse_dir_open(struct inode *inode, struct file *file)
1417{
91fe96b4 1418 return fuse_open_common(inode, file, true);
e5e5558e
MS
1419}
1420
1421static int fuse_dir_release(struct inode *inode, struct file *file)
1422{
8b0797a4
MS
1423 fuse_release_common(file, FUSE_RELEASEDIR);
1424
1425 return 0;
e5e5558e
MS
1426}
1427
02c24a82
JB
1428static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1429 int datasync)
82547981 1430{
02c24a82 1431 return fuse_fsync_common(file, start, end, datasync, 1);
82547981
MS
1432}
1433
b18da0c5
MS
1434static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1435 unsigned long arg)
1436{
1437 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1438
1439 /* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1440 if (fc->minor < 18)
1441 return -ENOTTY;
1442
1443 return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1444}
1445
1446static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1447 unsigned long arg)
1448{
1449 struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1450
1451 if (fc->minor < 18)
1452 return -ENOTTY;
1453
1454 return fuse_ioctl_common(file, cmd, arg,
1455 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1456}
1457
b0aa7606 1458static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
17637cba
MS
1459{
1460 /* Always update if mtime is explicitly set */
1461 if (ivalid & ATTR_MTIME_SET)
1462 return true;
1463
b0aa7606
MP
1464 /* Or if kernel i_mtime is the official one */
1465 if (trust_local_mtime)
1466 return true;
1467
17637cba
MS
1468 /* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1469 if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1470 return false;
1471
1472 /* In all other cases update */
1473 return true;
1474}
1475
b0aa7606 1476static void iattr_to_fattr(struct iattr *iattr, struct fuse_setattr_in *arg,
3ad22c62 1477 bool trust_local_cmtime)
9e6268db
MS
1478{
1479 unsigned ivalid = iattr->ia_valid;
9e6268db
MS
1480
1481 if (ivalid & ATTR_MODE)
befc649c 1482 arg->valid |= FATTR_MODE, arg->mode = iattr->ia_mode;
9e6268db 1483 if (ivalid & ATTR_UID)
499dcf20 1484 arg->valid |= FATTR_UID, arg->uid = from_kuid(&init_user_ns, iattr->ia_uid);
9e6268db 1485 if (ivalid & ATTR_GID)
499dcf20 1486 arg->valid |= FATTR_GID, arg->gid = from_kgid(&init_user_ns, iattr->ia_gid);
9e6268db 1487 if (ivalid & ATTR_SIZE)
befc649c 1488 arg->valid |= FATTR_SIZE, arg->size = iattr->ia_size;
17637cba
MS
1489 if (ivalid & ATTR_ATIME) {
1490 arg->valid |= FATTR_ATIME;
befc649c 1491 arg->atime = iattr->ia_atime.tv_sec;
17637cba
MS
1492 arg->atimensec = iattr->ia_atime.tv_nsec;
1493 if (!(ivalid & ATTR_ATIME_SET))
1494 arg->valid |= FATTR_ATIME_NOW;
1495 }
3ad22c62 1496 if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
17637cba 1497 arg->valid |= FATTR_MTIME;
befc649c 1498 arg->mtime = iattr->ia_mtime.tv_sec;
17637cba 1499 arg->mtimensec = iattr->ia_mtime.tv_nsec;
3ad22c62 1500 if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
17637cba 1501 arg->valid |= FATTR_MTIME_NOW;
befc649c 1502 }
3ad22c62
MP
1503 if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1504 arg->valid |= FATTR_CTIME;
1505 arg->ctime = iattr->ia_ctime.tv_sec;
1506 arg->ctimensec = iattr->ia_ctime.tv_nsec;
1507 }
9e6268db
MS
1508}
1509
3be5a52b
MS
1510/*
1511 * Prevent concurrent writepages on inode
1512 *
1513 * This is done by adding a negative bias to the inode write counter
1514 * and waiting for all pending writes to finish.
1515 */
1516void fuse_set_nowrite(struct inode *inode)
1517{
1518 struct fuse_conn *fc = get_fuse_conn(inode);
1519 struct fuse_inode *fi = get_fuse_inode(inode);
1520
5955102c 1521 BUG_ON(!inode_is_locked(inode));
3be5a52b
MS
1522
1523 spin_lock(&fc->lock);
1524 BUG_ON(fi->writectr < 0);
1525 fi->writectr += FUSE_NOWRITE;
1526 spin_unlock(&fc->lock);
1527 wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1528}
1529
1530/*
1531 * Allow writepages on inode
1532 *
1533 * Remove the bias from the writecounter and send any queued
1534 * writepages.
1535 */
1536static void __fuse_release_nowrite(struct inode *inode)
1537{
1538 struct fuse_inode *fi = get_fuse_inode(inode);
1539
1540 BUG_ON(fi->writectr != FUSE_NOWRITE);
1541 fi->writectr = 0;
1542 fuse_flush_writepages(inode);
1543}
1544
1545void fuse_release_nowrite(struct inode *inode)
1546{
1547 struct fuse_conn *fc = get_fuse_conn(inode);
1548
1549 spin_lock(&fc->lock);
1550 __fuse_release_nowrite(inode);
1551 spin_unlock(&fc->lock);
1552}
1553
7078187a 1554static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
b0aa7606
MP
1555 struct inode *inode,
1556 struct fuse_setattr_in *inarg_p,
1557 struct fuse_attr_out *outarg_p)
1558{
7078187a
MS
1559 args->in.h.opcode = FUSE_SETATTR;
1560 args->in.h.nodeid = get_node_id(inode);
1561 args->in.numargs = 1;
1562 args->in.args[0].size = sizeof(*inarg_p);
1563 args->in.args[0].value = inarg_p;
1564 args->out.numargs = 1;
21f62174 1565 args->out.args[0].size = sizeof(*outarg_p);
7078187a 1566 args->out.args[0].value = outarg_p;
b0aa7606
MP
1567}
1568
1569/*
1570 * Flush inode->i_mtime to the server
1571 */
ab9e13f7 1572int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
b0aa7606 1573{
b0aa7606 1574 struct fuse_conn *fc = get_fuse_conn(inode);
7078187a 1575 FUSE_ARGS(args);
b0aa7606
MP
1576 struct fuse_setattr_in inarg;
1577 struct fuse_attr_out outarg;
b0aa7606
MP
1578
1579 memset(&inarg, 0, sizeof(inarg));
1580 memset(&outarg, 0, sizeof(outarg));
1581
ab9e13f7 1582 inarg.valid = FATTR_MTIME;
b0aa7606
MP
1583 inarg.mtime = inode->i_mtime.tv_sec;
1584 inarg.mtimensec = inode->i_mtime.tv_nsec;
ab9e13f7
MP
1585 if (fc->minor >= 23) {
1586 inarg.valid |= FATTR_CTIME;
1587 inarg.ctime = inode->i_ctime.tv_sec;
1588 inarg.ctimensec = inode->i_ctime.tv_nsec;
1589 }
1e18bda8
MS
1590 if (ff) {
1591 inarg.valid |= FATTR_FH;
1592 inarg.fh = ff->fh;
1593 }
7078187a 1594 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
b0aa7606 1595
7078187a 1596 return fuse_simple_request(fc, &args);
b0aa7606
MP
1597}
1598
6f9f1180
MS
1599/*
1600 * Set attributes, and at the same time refresh them.
1601 *
1602 * Truncation is slightly complicated, because the 'truncate' request
1603 * may fail, in which case we don't want to touch the mapping.
9ffbb916
MS
1604 * vmtruncate() doesn't allow for this case, so do the rlimit checking
1605 * and the actual truncation by hand.
6f9f1180 1606 */
efb9fa9e
MP
1607int fuse_do_setattr(struct inode *inode, struct iattr *attr,
1608 struct file *file)
9e6268db 1609{
9e6268db 1610 struct fuse_conn *fc = get_fuse_conn(inode);
06a7c3c2 1611 struct fuse_inode *fi = get_fuse_inode(inode);
7078187a 1612 FUSE_ARGS(args);
9e6268db
MS
1613 struct fuse_setattr_in inarg;
1614 struct fuse_attr_out outarg;
3be5a52b 1615 bool is_truncate = false;
8373200b 1616 bool is_wb = fc->writeback_cache;
3be5a52b 1617 loff_t oldsize;
9e6268db 1618 int err;
3ad22c62 1619 bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
9e6268db 1620
db78b877
CH
1621 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
1622 attr->ia_valid |= ATTR_FORCE;
1623
1624 err = inode_change_ok(inode, attr);
1625 if (err)
1626 return err;
1e9a4ed9 1627
8d56addd
MS
1628 if (attr->ia_valid & ATTR_OPEN) {
1629 if (fc->atomic_o_trunc)
1630 return 0;
1631 file = NULL;
1632 }
6ff958ed 1633
2c27c65e 1634 if (attr->ia_valid & ATTR_SIZE)
3be5a52b 1635 is_truncate = true;
9e6268db 1636
06a7c3c2 1637 if (is_truncate) {
3be5a52b 1638 fuse_set_nowrite(inode);
06a7c3c2 1639 set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3ad22c62
MP
1640 if (trust_local_cmtime && attr->ia_size != inode->i_size)
1641 attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
06a7c3c2 1642 }
3be5a52b 1643
9e6268db 1644 memset(&inarg, 0, sizeof(inarg));
0e9663ee 1645 memset(&outarg, 0, sizeof(outarg));
3ad22c62 1646 iattr_to_fattr(attr, &inarg, trust_local_cmtime);
49d4914f
MS
1647 if (file) {
1648 struct fuse_file *ff = file->private_data;
1649 inarg.valid |= FATTR_FH;
1650 inarg.fh = ff->fh;
1651 }
f3332114
MS
1652 if (attr->ia_valid & ATTR_SIZE) {
1653 /* For mandatory locking in truncate */
1654 inarg.valid |= FATTR_LOCKOWNER;
1655 inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1656 }
7078187a
MS
1657 fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1658 err = fuse_simple_request(fc, &args);
e00d2c2d
MS
1659 if (err) {
1660 if (err == -EINTR)
1661 fuse_invalidate_attr(inode);
3be5a52b 1662 goto error;
e00d2c2d 1663 }
9e6268db 1664
e00d2c2d
MS
1665 if ((inode->i_mode ^ outarg.attr.mode) & S_IFMT) {
1666 make_bad_inode(inode);
3be5a52b
MS
1667 err = -EIO;
1668 goto error;
1669 }
1670
1671 spin_lock(&fc->lock);
b0aa7606 1672 /* the kernel maintains i_mtime locally */
3ad22c62
MP
1673 if (trust_local_cmtime) {
1674 if (attr->ia_valid & ATTR_MTIME)
1675 inode->i_mtime = attr->ia_mtime;
1676 if (attr->ia_valid & ATTR_CTIME)
1677 inode->i_ctime = attr->ia_ctime;
1e18bda8 1678 /* FIXME: clear I_DIRTY_SYNC? */
b0aa7606
MP
1679 }
1680
3be5a52b
MS
1681 fuse_change_attributes_common(inode, &outarg.attr,
1682 attr_timeout(&outarg));
1683 oldsize = inode->i_size;
8373200b
PE
1684 /* see the comment in fuse_change_attributes() */
1685 if (!is_wb || is_truncate || !S_ISREG(inode->i_mode))
1686 i_size_write(inode, outarg.attr.size);
3be5a52b
MS
1687
1688 if (is_truncate) {
1689 /* NOTE: this may release/reacquire fc->lock */
1690 __fuse_release_nowrite(inode);
1691 }
1692 spin_unlock(&fc->lock);
1693
1694 /*
1695 * Only call invalidate_inode_pages2() after removing
1696 * FUSE_NOWRITE, otherwise fuse_launder_page() would deadlock.
1697 */
8373200b
PE
1698 if ((is_truncate || !is_wb) &&
1699 S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
7caef267 1700 truncate_pagecache(inode, outarg.attr.size);
3be5a52b 1701 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d
MS
1702 }
1703
06a7c3c2 1704 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
e00d2c2d 1705 return 0;
3be5a52b
MS
1706
1707error:
1708 if (is_truncate)
1709 fuse_release_nowrite(inode);
1710
06a7c3c2 1711 clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
3be5a52b 1712 return err;
9e6268db
MS
1713}
1714
49d4914f
MS
1715static int fuse_setattr(struct dentry *entry, struct iattr *attr)
1716{
2b0143b5 1717 struct inode *inode = d_inode(entry);
5e940c1d 1718 struct fuse_conn *fc = get_fuse_conn(inode);
a09f99ed 1719 struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
5e2b8828 1720 int ret;
efb9fa9e
MP
1721
1722 if (!fuse_allow_current_process(get_fuse_conn(inode)))
1723 return -EACCES;
1724
a09f99ed 1725 if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
a09f99ed
MS
1726 attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1727 ATTR_MODE);
5e940c1d 1728
a09f99ed 1729 /*
5e940c1d
MS
1730 * The only sane way to reliably kill suid/sgid is to do it in
1731 * the userspace filesystem
1732 *
1733 * This should be done on write(), truncate() and chown().
a09f99ed 1734 */
5e940c1d
MS
1735 if (!fc->handle_killpriv) {
1736 int kill;
1737
1738 /*
1739 * ia_mode calculation may have used stale i_mode.
1740 * Refresh and recalculate.
1741 */
1742 ret = fuse_do_getattr(inode, NULL, file);
1743 if (ret)
1744 return ret;
1745
1746 attr->ia_mode = inode->i_mode;
1747 kill = should_remove_suid(entry);
1748 if (kill & ATTR_KILL_SUID) {
1749 attr->ia_valid |= ATTR_MODE;
1750 attr->ia_mode &= ~S_ISUID;
1751 }
1752 if (kill & ATTR_KILL_SGID) {
1753 attr->ia_valid |= ATTR_MODE;
1754 attr->ia_mode &= ~S_ISGID;
1755 }
a09f99ed
MS
1756 }
1757 }
1758 if (!attr->ia_valid)
1759 return 0;
5e2b8828 1760
a09f99ed 1761 ret = fuse_do_setattr(inode, attr, file);
5e2b8828 1762 if (!ret) {
60bcc88a
SF
1763 /*
1764 * If filesystem supports acls it may have updated acl xattrs in
1765 * the filesystem, so forget cached acls for the inode.
1766 */
1767 if (fc->posix_acl)
1768 forget_all_cached_acls(inode);
1769
5e2b8828
MS
1770 /* Directory mode changed, may need to revalidate access */
1771 if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1772 fuse_invalidate_entry_cache(entry);
1773 }
1774 return ret;
49d4914f
MS
1775}
1776
e5e5558e
MS
1777static int fuse_getattr(struct vfsmount *mnt, struct dentry *entry,
1778 struct kstat *stat)
1779{
2b0143b5 1780 struct inode *inode = d_inode(entry);
244f6385 1781 struct fuse_conn *fc = get_fuse_conn(inode);
244f6385 1782
c2132c1b 1783 if (!fuse_allow_current_process(fc))
244f6385
MS
1784 return -EACCES;
1785
bcb4be80 1786 return fuse_update_attributes(inode, stat, NULL, NULL);
e5e5558e
MS
1787}
1788
754661f1 1789static const struct inode_operations fuse_dir_inode_operations = {
e5e5558e 1790 .lookup = fuse_lookup,
9e6268db
MS
1791 .mkdir = fuse_mkdir,
1792 .symlink = fuse_symlink,
1793 .unlink = fuse_unlink,
1794 .rmdir = fuse_rmdir,
1560c974 1795 .rename2 = fuse_rename2,
9e6268db
MS
1796 .link = fuse_link,
1797 .setattr = fuse_setattr,
1798 .create = fuse_create,
c8ccbe03 1799 .atomic_open = fuse_atomic_open,
9e6268db 1800 .mknod = fuse_mknod,
e5e5558e
MS
1801 .permission = fuse_permission,
1802 .getattr = fuse_getattr,
703c7362
SF
1803 .setxattr = generic_setxattr,
1804 .getxattr = generic_getxattr,
92a8780e 1805 .listxattr = fuse_listxattr,
703c7362 1806 .removexattr = generic_removexattr,
60bcc88a
SF
1807 .get_acl = fuse_get_acl,
1808 .set_acl = fuse_set_acl,
e5e5558e
MS
1809};
1810
4b6f5d20 1811static const struct file_operations fuse_dir_operations = {
b6aeaded 1812 .llseek = generic_file_llseek,
e5e5558e 1813 .read = generic_read_dir,
d9b3dbdc 1814 .iterate_shared = fuse_readdir,
e5e5558e
MS
1815 .open = fuse_dir_open,
1816 .release = fuse_dir_release,
82547981 1817 .fsync = fuse_dir_fsync,
b18da0c5
MS
1818 .unlocked_ioctl = fuse_dir_ioctl,
1819 .compat_ioctl = fuse_dir_compat_ioctl,
e5e5558e
MS
1820};
1821
754661f1 1822static const struct inode_operations fuse_common_inode_operations = {
9e6268db 1823 .setattr = fuse_setattr,
e5e5558e
MS
1824 .permission = fuse_permission,
1825 .getattr = fuse_getattr,
703c7362
SF
1826 .setxattr = generic_setxattr,
1827 .getxattr = generic_getxattr,
92a8780e 1828 .listxattr = fuse_listxattr,
703c7362 1829 .removexattr = generic_removexattr,
60bcc88a
SF
1830 .get_acl = fuse_get_acl,
1831 .set_acl = fuse_set_acl,
e5e5558e
MS
1832};
1833
754661f1 1834static const struct inode_operations fuse_symlink_inode_operations = {
9e6268db 1835 .setattr = fuse_setattr,
6b255391 1836 .get_link = fuse_get_link,
e5e5558e
MS
1837 .readlink = generic_readlink,
1838 .getattr = fuse_getattr,
703c7362
SF
1839 .setxattr = generic_setxattr,
1840 .getxattr = generic_getxattr,
92a8780e 1841 .listxattr = fuse_listxattr,
703c7362 1842 .removexattr = generic_removexattr,
e5e5558e
MS
1843};
1844
1845void fuse_init_common(struct inode *inode)
1846{
1847 inode->i_op = &fuse_common_inode_operations;
1848}
1849
1850void fuse_init_dir(struct inode *inode)
1851{
1852 inode->i_op = &fuse_dir_inode_operations;
1853 inode->i_fop = &fuse_dir_operations;
1854}
1855
1856void fuse_init_symlink(struct inode *inode)
1857{
1858 inode->i_op = &fuse_symlink_inode_operations;
1859}