]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/fuse/inode.c
fuse: fix missing fput on error
[mirror_ubuntu-artful-kernel.git] / fs / fuse / inode.c
CommitLineData
d8a5ba45
MS
1/*
2 FUSE: Filesystem in Userspace
1729a16c 3 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
d8a5ba45
MS
4
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/pagemap.h>
12#include <linux/slab.h>
13#include <linux/file.h>
d8a5ba45
MS
14#include <linux/seq_file.h>
15#include <linux/init.h>
16#include <linux/module.h>
d8a5ba45
MS
17#include <linux/parser.h>
18#include <linux/statfs.h>
9c8ef561 19#include <linux/random.h>
e8edc6e0 20#include <linux/sched.h>
dbd561d2 21#include <linux/exportfs.h>
d8a5ba45
MS
22
23MODULE_AUTHOR("Miklos Szeredi <miklos@szeredi.hu>");
24MODULE_DESCRIPTION("Filesystem in Userspace");
25MODULE_LICENSE("GPL");
26
e18b890b 27static struct kmem_cache *fuse_inode_cachep;
bafa9654
MS
28struct list_head fuse_conn_list;
29DEFINE_MUTEX(fuse_mutex);
d8a5ba45
MS
30
31#define FUSE_SUPER_MAGIC 0x65735546
32
d1875dba
MS
33#define FUSE_DEFAULT_BLKSIZE 512
34
d8a5ba45
MS
35struct fuse_mount_data {
36 int fd;
37 unsigned rootmode;
38 unsigned user_id;
87729a55 39 unsigned group_id;
1729a16c
MS
40 unsigned fd_present:1;
41 unsigned rootmode_present:1;
42 unsigned user_id_present:1;
43 unsigned group_id_present:1;
1e9a4ed9 44 unsigned flags;
db50b96c 45 unsigned max_read;
d8091614 46 unsigned blksize;
d8a5ba45
MS
47};
48
49static struct inode *fuse_alloc_inode(struct super_block *sb)
50{
51 struct inode *inode;
52 struct fuse_inode *fi;
53
e94b1766 54 inode = kmem_cache_alloc(fuse_inode_cachep, GFP_KERNEL);
d8a5ba45
MS
55 if (!inode)
56 return NULL;
57
58 fi = get_fuse_inode(inode);
0a0898cf 59 fi->i_time = 0;
d8a5ba45 60 fi->nodeid = 0;
9e6268db 61 fi->nlookup = 0;
fbee36b9 62 fi->attr_version = 0;
3be5a52b 63 fi->writectr = 0;
93a8c3cd 64 INIT_LIST_HEAD(&fi->write_files);
3be5a52b
MS
65 INIT_LIST_HEAD(&fi->queued_writes);
66 INIT_LIST_HEAD(&fi->writepages);
67 init_waitqueue_head(&fi->page_waitq);
e5e5558e
MS
68 fi->forget_req = fuse_request_alloc();
69 if (!fi->forget_req) {
70 kmem_cache_free(fuse_inode_cachep, inode);
71 return NULL;
72 }
d8a5ba45
MS
73
74 return inode;
75}
76
77static void fuse_destroy_inode(struct inode *inode)
78{
e5e5558e 79 struct fuse_inode *fi = get_fuse_inode(inode);
93a8c3cd 80 BUG_ON(!list_empty(&fi->write_files));
3be5a52b 81 BUG_ON(!list_empty(&fi->queued_writes));
e5e5558e
MS
82 if (fi->forget_req)
83 fuse_request_free(fi->forget_req);
d8a5ba45
MS
84 kmem_cache_free(fuse_inode_cachep, inode);
85}
86
e5e5558e 87void fuse_send_forget(struct fuse_conn *fc, struct fuse_req *req,
b48badf0 88 u64 nodeid, u64 nlookup)
e5e5558e
MS
89{
90 struct fuse_forget_in *inarg = &req->misc.forget_in;
9e6268db 91 inarg->nlookup = nlookup;
e5e5558e
MS
92 req->in.h.opcode = FUSE_FORGET;
93 req->in.h.nodeid = nodeid;
94 req->in.numargs = 1;
95 req->in.args[0].size = sizeof(struct fuse_forget_in);
96 req->in.args[0].value = inarg;
b93f858a 97 fuse_request_send_noreply(fc, req);
e5e5558e
MS
98}
99
d8a5ba45
MS
100static void fuse_clear_inode(struct inode *inode)
101{
1e9a4ed9
MS
102 if (inode->i_sb->s_flags & MS_ACTIVE) {
103 struct fuse_conn *fc = get_fuse_conn(inode);
e5e5558e 104 struct fuse_inode *fi = get_fuse_inode(inode);
9e6268db 105 fuse_send_forget(fc, fi->forget_req, fi->nodeid, fi->nlookup);
e5e5558e
MS
106 fi->forget_req = NULL;
107 }
d8a5ba45
MS
108}
109
71421259
MS
110static int fuse_remount_fs(struct super_block *sb, int *flags, char *data)
111{
112 if (*flags & MS_MANDLOCK)
113 return -EINVAL;
114
115 return 0;
116}
117
3be5a52b 118void fuse_truncate(struct address_space *mapping, loff_t offset)
e00d2c2d
MS
119{
120 /* See vmtruncate() */
121 unmap_mapping_range(mapping, offset + PAGE_SIZE - 1, 0, 1);
122 truncate_inode_pages(mapping, offset);
123 unmap_mapping_range(mapping, offset + PAGE_SIZE - 1, 0, 1);
124}
125
3be5a52b
MS
126void fuse_change_attributes_common(struct inode *inode, struct fuse_attr *attr,
127 u64 attr_valid)
d8a5ba45 128{
9ffbb916 129 struct fuse_conn *fc = get_fuse_conn(inode);
ebc14c4d 130 struct fuse_inode *fi = get_fuse_inode(inode);
d8a5ba45 131
1fb69e78
MS
132 fi->attr_version = ++fc->attr_version;
133 fi->i_time = attr_valid;
134
d8a5ba45 135 inode->i_ino = attr->ino;
ebc14c4d 136 inode->i_mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
d8a5ba45
MS
137 inode->i_nlink = attr->nlink;
138 inode->i_uid = attr->uid;
139 inode->i_gid = attr->gid;
d8a5ba45
MS
140 inode->i_blocks = attr->blocks;
141 inode->i_atime.tv_sec = attr->atime;
142 inode->i_atime.tv_nsec = attr->atimensec;
143 inode->i_mtime.tv_sec = attr->mtime;
144 inode->i_mtime.tv_nsec = attr->mtimensec;
145 inode->i_ctime.tv_sec = attr->ctime;
146 inode->i_ctime.tv_nsec = attr->ctimensec;
e00d2c2d 147
0e9663ee
MS
148 if (attr->blksize != 0)
149 inode->i_blkbits = ilog2(attr->blksize);
150 else
151 inode->i_blkbits = inode->i_sb->s_blocksize_bits;
152
ebc14c4d
MS
153 /*
154 * Don't set the sticky bit in i_mode, unless we want the VFS
155 * to check permissions. This prevents failures due to the
156 * check in may_delete().
157 */
158 fi->orig_i_mode = inode->i_mode;
159 if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS))
160 inode->i_mode &= ~S_ISVTX;
3be5a52b
MS
161}
162
163void fuse_change_attributes(struct inode *inode, struct fuse_attr *attr,
164 u64 attr_valid, u64 attr_version)
165{
166 struct fuse_conn *fc = get_fuse_conn(inode);
167 struct fuse_inode *fi = get_fuse_inode(inode);
168 loff_t oldsize;
169
170 spin_lock(&fc->lock);
171 if (attr_version != 0 && fi->attr_version > attr_version) {
172 spin_unlock(&fc->lock);
173 return;
174 }
175
176 fuse_change_attributes_common(inode, attr, attr_valid);
ebc14c4d 177
e00d2c2d
MS
178 oldsize = inode->i_size;
179 i_size_write(inode, attr->size);
180 spin_unlock(&fc->lock);
181
182 if (S_ISREG(inode->i_mode) && oldsize != attr->size) {
183 if (attr->size < oldsize)
184 fuse_truncate(inode->i_mapping, attr->size);
b1009979 185 invalidate_inode_pages2(inode->i_mapping);
e00d2c2d 186 }
d8a5ba45
MS
187}
188
189static void fuse_init_inode(struct inode *inode, struct fuse_attr *attr)
190{
191 inode->i_mode = attr->mode & S_IFMT;
9ffbb916 192 inode->i_size = attr->size;
e5e5558e
MS
193 if (S_ISREG(inode->i_mode)) {
194 fuse_init_common(inode);
b6aeaded 195 fuse_init_file_inode(inode);
e5e5558e
MS
196 } else if (S_ISDIR(inode->i_mode))
197 fuse_init_dir(inode);
198 else if (S_ISLNK(inode->i_mode))
199 fuse_init_symlink(inode);
200 else if (S_ISCHR(inode->i_mode) || S_ISBLK(inode->i_mode) ||
201 S_ISFIFO(inode->i_mode) || S_ISSOCK(inode->i_mode)) {
202 fuse_init_common(inode);
203 init_special_inode(inode, inode->i_mode,
204 new_decode_dev(attr->rdev));
39ee059a
MS
205 } else
206 BUG();
d8a5ba45
MS
207}
208
209static int fuse_inode_eq(struct inode *inode, void *_nodeidp)
210{
b48badf0 211 u64 nodeid = *(u64 *) _nodeidp;
d8a5ba45
MS
212 if (get_node_id(inode) == nodeid)
213 return 1;
214 else
215 return 0;
216}
217
218static int fuse_inode_set(struct inode *inode, void *_nodeidp)
219{
b48badf0 220 u64 nodeid = *(u64 *) _nodeidp;
d8a5ba45
MS
221 get_fuse_inode(inode)->nodeid = nodeid;
222 return 0;
223}
224
b48badf0 225struct inode *fuse_iget(struct super_block *sb, u64 nodeid,
1fb69e78
MS
226 int generation, struct fuse_attr *attr,
227 u64 attr_valid, u64 attr_version)
d8a5ba45
MS
228{
229 struct inode *inode;
9e6268db 230 struct fuse_inode *fi;
d8a5ba45 231 struct fuse_conn *fc = get_fuse_conn_super(sb);
d8a5ba45
MS
232
233 retry:
234 inode = iget5_locked(sb, nodeid, fuse_inode_eq, fuse_inode_set, &nodeid);
235 if (!inode)
236 return NULL;
237
238 if ((inode->i_state & I_NEW)) {
b36c31ba 239 inode->i_flags |= S_NOATIME|S_NOCMTIME;
d8a5ba45
MS
240 inode->i_generation = generation;
241 inode->i_data.backing_dev_info = &fc->bdi;
242 fuse_init_inode(inode, attr);
243 unlock_new_inode(inode);
244 } else if ((inode->i_mode ^ attr->mode) & S_IFMT) {
d8a5ba45
MS
245 /* Inode has changed type, any I/O on the old should fail */
246 make_bad_inode(inode);
247 iput(inode);
d8a5ba45
MS
248 goto retry;
249 }
250
9e6268db 251 fi = get_fuse_inode(inode);
8da5ff23 252 spin_lock(&fc->lock);
1729a16c 253 fi->nlookup++;
8da5ff23 254 spin_unlock(&fc->lock);
1fb69e78
MS
255 fuse_change_attributes(inode, attr, attr_valid, attr_version);
256
d8a5ba45
MS
257 return inode;
258}
259
42faad99 260static void fuse_umount_begin(struct super_block *sb)
69a53bf2 261{
42faad99 262 fuse_abort_conn(get_fuse_conn_super(sb));
69a53bf2
MS
263}
264
0ec7ca41
MS
265static void fuse_send_destroy(struct fuse_conn *fc)
266{
267 struct fuse_req *req = fc->destroy_req;
268 if (req && fc->conn_init) {
269 fc->destroy_req = NULL;
270 req->in.h.opcode = FUSE_DESTROY;
271 req->force = 1;
b93f858a 272 fuse_request_send(fc, req);
0ec7ca41
MS
273 fuse_put_request(fc, req);
274 }
275}
276
d8a5ba45
MS
277static void fuse_put_super(struct super_block *sb)
278{
279 struct fuse_conn *fc = get_fuse_conn_super(sb);
280
0ec7ca41 281 fuse_send_destroy(fc);
d7133114 282 spin_lock(&fc->lock);
9ba7cbba 283 fc->connected = 0;
51eb01e7 284 fc->blocked = 0;
d7133114 285 spin_unlock(&fc->lock);
334f485d 286 /* Flush all readers on this fs */
385a17bf 287 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
334f485d 288 wake_up_all(&fc->waitq);
51eb01e7 289 wake_up_all(&fc->blocked_waitq);
de5e3dec 290 wake_up_all(&fc->reserved_req_waitq);
bafa9654
MS
291 mutex_lock(&fuse_mutex);
292 list_del(&fc->entry);
293 fuse_ctl_remove_conn(fc);
294 mutex_unlock(&fuse_mutex);
295 fuse_conn_put(fc);
d8a5ba45
MS
296}
297
e5e5558e
MS
298static void convert_fuse_statfs(struct kstatfs *stbuf, struct fuse_kstatfs *attr)
299{
300 stbuf->f_type = FUSE_SUPER_MAGIC;
301 stbuf->f_bsize = attr->bsize;
de5f1202 302 stbuf->f_frsize = attr->frsize;
e5e5558e
MS
303 stbuf->f_blocks = attr->blocks;
304 stbuf->f_bfree = attr->bfree;
305 stbuf->f_bavail = attr->bavail;
306 stbuf->f_files = attr->files;
307 stbuf->f_ffree = attr->ffree;
308 stbuf->f_namelen = attr->namelen;
309 /* fsid is left zero */
310}
311
726c3342 312static int fuse_statfs(struct dentry *dentry, struct kstatfs *buf)
e5e5558e 313{
726c3342 314 struct super_block *sb = dentry->d_sb;
e5e5558e
MS
315 struct fuse_conn *fc = get_fuse_conn_super(sb);
316 struct fuse_req *req;
317 struct fuse_statfs_out outarg;
318 int err;
319
e57ac683
MS
320 if (!fuse_allow_task(fc, current)) {
321 buf->f_type = FUSE_SUPER_MAGIC;
322 return 0;
323 }
324
ce1d5a49
MS
325 req = fuse_get_req(fc);
326 if (IS_ERR(req))
327 return PTR_ERR(req);
e5e5558e 328
de5f1202 329 memset(&outarg, 0, sizeof(outarg));
e5e5558e
MS
330 req->in.numargs = 0;
331 req->in.h.opcode = FUSE_STATFS;
5b35e8e5 332 req->in.h.nodeid = get_node_id(dentry->d_inode);
e5e5558e 333 req->out.numargs = 1;
de5f1202
MS
334 req->out.args[0].size =
335 fc->minor < 4 ? FUSE_COMPAT_STATFS_SIZE : sizeof(outarg);
e5e5558e 336 req->out.args[0].value = &outarg;
b93f858a 337 fuse_request_send(fc, req);
e5e5558e
MS
338 err = req->out.h.error;
339 if (!err)
340 convert_fuse_statfs(buf, &outarg.st);
341 fuse_put_request(fc, req);
342 return err;
343}
344
d8a5ba45
MS
345enum {
346 OPT_FD,
347 OPT_ROOTMODE,
348 OPT_USER_ID,
87729a55 349 OPT_GROUP_ID,
d8a5ba45
MS
350 OPT_DEFAULT_PERMISSIONS,
351 OPT_ALLOW_OTHER,
db50b96c 352 OPT_MAX_READ,
d8091614 353 OPT_BLKSIZE,
d8a5ba45
MS
354 OPT_ERR
355};
356
a447c093 357static const match_table_t tokens = {
d8a5ba45
MS
358 {OPT_FD, "fd=%u"},
359 {OPT_ROOTMODE, "rootmode=%o"},
360 {OPT_USER_ID, "user_id=%u"},
87729a55 361 {OPT_GROUP_ID, "group_id=%u"},
d8a5ba45
MS
362 {OPT_DEFAULT_PERMISSIONS, "default_permissions"},
363 {OPT_ALLOW_OTHER, "allow_other"},
db50b96c 364 {OPT_MAX_READ, "max_read=%u"},
d8091614 365 {OPT_BLKSIZE, "blksize=%u"},
d8a5ba45
MS
366 {OPT_ERR, NULL}
367};
368
d8091614 369static int parse_fuse_opt(char *opt, struct fuse_mount_data *d, int is_bdev)
d8a5ba45
MS
370{
371 char *p;
372 memset(d, 0, sizeof(struct fuse_mount_data));
db50b96c 373 d->max_read = ~0;
d1875dba 374 d->blksize = FUSE_DEFAULT_BLKSIZE;
d8a5ba45
MS
375
376 while ((p = strsep(&opt, ",")) != NULL) {
377 int token;
378 int value;
379 substring_t args[MAX_OPT_ARGS];
380 if (!*p)
381 continue;
382
383 token = match_token(p, tokens, args);
384 switch (token) {
385 case OPT_FD:
386 if (match_int(&args[0], &value))
387 return 0;
388 d->fd = value;
5a533682 389 d->fd_present = 1;
d8a5ba45
MS
390 break;
391
392 case OPT_ROOTMODE:
393 if (match_octal(&args[0], &value))
394 return 0;
a5bfffac
TS
395 if (!fuse_valid_type(value))
396 return 0;
d8a5ba45 397 d->rootmode = value;
5a533682 398 d->rootmode_present = 1;
d8a5ba45
MS
399 break;
400
401 case OPT_USER_ID:
402 if (match_int(&args[0], &value))
403 return 0;
404 d->user_id = value;
5a533682 405 d->user_id_present = 1;
d8a5ba45
MS
406 break;
407
87729a55
MS
408 case OPT_GROUP_ID:
409 if (match_int(&args[0], &value))
410 return 0;
411 d->group_id = value;
5a533682 412 d->group_id_present = 1;
87729a55
MS
413 break;
414
1e9a4ed9
MS
415 case OPT_DEFAULT_PERMISSIONS:
416 d->flags |= FUSE_DEFAULT_PERMISSIONS;
417 break;
418
419 case OPT_ALLOW_OTHER:
420 d->flags |= FUSE_ALLOW_OTHER;
421 break;
422
db50b96c
MS
423 case OPT_MAX_READ:
424 if (match_int(&args[0], &value))
425 return 0;
426 d->max_read = value;
427 break;
428
d8091614
MS
429 case OPT_BLKSIZE:
430 if (!is_bdev || match_int(&args[0], &value))
431 return 0;
432 d->blksize = value;
433 break;
434
d8a5ba45
MS
435 default:
436 return 0;
437 }
438 }
5a533682
MS
439
440 if (!d->fd_present || !d->rootmode_present ||
441 !d->user_id_present || !d->group_id_present)
d8a5ba45
MS
442 return 0;
443
444 return 1;
445}
446
447static int fuse_show_options(struct seq_file *m, struct vfsmount *mnt)
448{
449 struct fuse_conn *fc = get_fuse_conn_super(mnt->mnt_sb);
450
451 seq_printf(m, ",user_id=%u", fc->user_id);
87729a55 452 seq_printf(m, ",group_id=%u", fc->group_id);
1e9a4ed9
MS
453 if (fc->flags & FUSE_DEFAULT_PERMISSIONS)
454 seq_puts(m, ",default_permissions");
455 if (fc->flags & FUSE_ALLOW_OTHER)
456 seq_puts(m, ",allow_other");
db50b96c
MS
457 if (fc->max_read != ~0)
458 seq_printf(m, ",max_read=%u", fc->max_read);
d1875dba
MS
459 if (mnt->mnt_sb->s_bdev &&
460 mnt->mnt_sb->s_blocksize != FUSE_DEFAULT_BLKSIZE)
461 seq_printf(m, ",blksize=%lu", mnt->mnt_sb->s_blocksize);
d8a5ba45
MS
462 return 0;
463}
464
0d179aa5 465int fuse_conn_init(struct fuse_conn *fc, struct super_block *sb)
d8a5ba45 466{
e0bf68dd 467 int err;
d8a5ba45 468
0d179aa5
TH
469 memset(fc, 0, sizeof(*fc));
470 spin_lock_init(&fc->lock);
471 mutex_init(&fc->inst_mutex);
472 atomic_set(&fc->count, 1);
473 init_waitqueue_head(&fc->waitq);
474 init_waitqueue_head(&fc->blocked_waitq);
475 init_waitqueue_head(&fc->reserved_req_waitq);
476 INIT_LIST_HEAD(&fc->pending);
477 INIT_LIST_HEAD(&fc->processing);
478 INIT_LIST_HEAD(&fc->io);
479 INIT_LIST_HEAD(&fc->interrupts);
480 INIT_LIST_HEAD(&fc->bg_queue);
481 INIT_LIST_HEAD(&fc->entry);
482 atomic_set(&fc->num_waiting, 0);
483 fc->bdi.ra_pages = (VM_MAX_READAHEAD * 1024) / PAGE_CACHE_SIZE;
484 fc->bdi.unplug_io_fn = default_unplug_io_fn;
485 /* fuse does it's own writeback accounting */
486 fc->bdi.capabilities = BDI_CAP_NO_ACCT_WB;
487 fc->khctr = 0;
488 fc->polled_files = RB_ROOT;
489 fc->dev = sb->s_dev;
490 err = bdi_init(&fc->bdi);
491 if (err)
492 goto error_mutex_destroy;
493 if (sb->s_bdev) {
494 err = bdi_register(&fc->bdi, NULL, "%u:%u-fuseblk",
495 MAJOR(fc->dev), MINOR(fc->dev));
496 } else {
497 err = bdi_register_dev(&fc->bdi, fc->dev);
d8a5ba45 498 }
0d179aa5
TH
499 if (err)
500 goto error_bdi_destroy;
501 /*
502 * For a single fuse filesystem use max 1% of dirty +
503 * writeback threshold.
504 *
505 * This gives about 1M of write buffer for memory maps on a
506 * machine with 1G and 10% dirty_ratio, which should be more
507 * than enough.
508 *
509 * Privileged users can raise it by writing to
510 *
511 * /sys/class/bdi/<bdi>/max_ratio
512 */
513 bdi_set_max_ratio(&fc->bdi, 1);
514 fc->reqctr = 0;
515 fc->blocked = 1;
516 fc->attr_version = 1;
517 get_random_bytes(&fc->scramble_key, sizeof(fc->scramble_key));
b6f2fcbc 518
0d179aa5
TH
519 return 0;
520
521 error_bdi_destroy:
b6f2fcbc 522 bdi_destroy(&fc->bdi);
0d179aa5 523 error_mutex_destroy:
b6f2fcbc 524 mutex_destroy(&fc->inst_mutex);
0d179aa5 525 return err;
d8a5ba45 526}
0d179aa5 527EXPORT_SYMBOL_GPL(fuse_conn_init);
d8a5ba45 528
bafa9654
MS
529void fuse_conn_put(struct fuse_conn *fc)
530{
d2a85164 531 if (atomic_dec_and_test(&fc->count)) {
0ec7ca41
MS
532 if (fc->destroy_req)
533 fuse_request_free(fc->destroy_req);
d2a85164 534 mutex_destroy(&fc->inst_mutex);
e0bf68dd 535 bdi_destroy(&fc->bdi);
43901aab 536 fc->release(fc);
d2a85164 537 }
bafa9654
MS
538}
539
540struct fuse_conn *fuse_conn_get(struct fuse_conn *fc)
541{
542 atomic_inc(&fc->count);
543 return fc;
544}
545
b93f858a 546static struct inode *fuse_get_root_inode(struct super_block *sb, unsigned mode)
d8a5ba45
MS
547{
548 struct fuse_attr attr;
549 memset(&attr, 0, sizeof(attr));
550
551 attr.mode = mode;
552 attr.ino = FUSE_ROOT_ID;
074406fa 553 attr.nlink = 1;
1fb69e78 554 return fuse_iget(sb, 1, 0, &attr, 0, 0);
d8a5ba45
MS
555}
556
1729a16c 557struct fuse_inode_handle {
dbd561d2
MS
558 u64 nodeid;
559 u32 generation;
560};
561
562static struct dentry *fuse_get_dentry(struct super_block *sb,
563 struct fuse_inode_handle *handle)
564{
33670fa2 565 struct fuse_conn *fc = get_fuse_conn_super(sb);
dbd561d2
MS
566 struct inode *inode;
567 struct dentry *entry;
568 int err = -ESTALE;
569
570 if (handle->nodeid == 0)
571 goto out_err;
572
573 inode = ilookup5(sb, handle->nodeid, fuse_inode_eq, &handle->nodeid);
33670fa2
MS
574 if (!inode) {
575 struct fuse_entry_out outarg;
576 struct qstr name;
577
578 if (!fc->export_support)
579 goto out_err;
580
581 name.len = 1;
582 name.name = ".";
583 err = fuse_lookup_name(sb, handle->nodeid, &name, &outarg,
584 &inode);
585 if (err && err != -ENOENT)
586 goto out_err;
587 if (err || !inode) {
588 err = -ESTALE;
589 goto out_err;
590 }
591 err = -EIO;
592 if (get_node_id(inode) != handle->nodeid)
593 goto out_iput;
594 }
dbd561d2
MS
595 err = -ESTALE;
596 if (inode->i_generation != handle->generation)
597 goto out_iput;
598
44003728
CH
599 entry = d_obtain_alias(inode);
600 if (!IS_ERR(entry) && get_node_id(inode) != FUSE_ROOT_ID) {
dbd561d2
MS
601 entry->d_op = &fuse_dentry_operations;
602 fuse_invalidate_entry_cache(entry);
603 }
604
605 return entry;
606
607 out_iput:
608 iput(inode);
609 out_err:
610 return ERR_PTR(err);
611}
612
613static int fuse_encode_fh(struct dentry *dentry, u32 *fh, int *max_len,
614 int connectable)
615{
616 struct inode *inode = dentry->d_inode;
617 bool encode_parent = connectable && !S_ISDIR(inode->i_mode);
618 int len = encode_parent ? 6 : 3;
619 u64 nodeid;
620 u32 generation;
621
622 if (*max_len < len)
623 return 255;
624
625 nodeid = get_fuse_inode(inode)->nodeid;
626 generation = inode->i_generation;
627
628 fh[0] = (u32)(nodeid >> 32);
629 fh[1] = (u32)(nodeid & 0xffffffff);
630 fh[2] = generation;
631
632 if (encode_parent) {
633 struct inode *parent;
634
635 spin_lock(&dentry->d_lock);
636 parent = dentry->d_parent->d_inode;
637 nodeid = get_fuse_inode(parent)->nodeid;
638 generation = parent->i_generation;
639 spin_unlock(&dentry->d_lock);
640
641 fh[3] = (u32)(nodeid >> 32);
642 fh[4] = (u32)(nodeid & 0xffffffff);
643 fh[5] = generation;
644 }
645
646 *max_len = len;
647 return encode_parent ? 0x82 : 0x81;
648}
649
650static struct dentry *fuse_fh_to_dentry(struct super_block *sb,
651 struct fid *fid, int fh_len, int fh_type)
652{
653 struct fuse_inode_handle handle;
654
655 if ((fh_type != 0x81 && fh_type != 0x82) || fh_len < 3)
656 return NULL;
657
658 handle.nodeid = (u64) fid->raw[0] << 32;
659 handle.nodeid |= (u64) fid->raw[1];
660 handle.generation = fid->raw[2];
661 return fuse_get_dentry(sb, &handle);
662}
663
664static struct dentry *fuse_fh_to_parent(struct super_block *sb,
665 struct fid *fid, int fh_len, int fh_type)
666{
667 struct fuse_inode_handle parent;
668
669 if (fh_type != 0x82 || fh_len < 6)
670 return NULL;
671
672 parent.nodeid = (u64) fid->raw[3] << 32;
673 parent.nodeid |= (u64) fid->raw[4];
674 parent.generation = fid->raw[5];
675 return fuse_get_dentry(sb, &parent);
676}
677
33670fa2
MS
678static struct dentry *fuse_get_parent(struct dentry *child)
679{
680 struct inode *child_inode = child->d_inode;
681 struct fuse_conn *fc = get_fuse_conn(child_inode);
682 struct inode *inode;
683 struct dentry *parent;
684 struct fuse_entry_out outarg;
685 struct qstr name;
686 int err;
687
688 if (!fc->export_support)
689 return ERR_PTR(-ESTALE);
690
691 name.len = 2;
692 name.name = "..";
693 err = fuse_lookup_name(child_inode->i_sb, get_node_id(child_inode),
694 &name, &outarg, &inode);
44003728
CH
695 if (err) {
696 if (err == -ENOENT)
697 return ERR_PTR(-ESTALE);
33670fa2 698 return ERR_PTR(err);
33670fa2 699 }
44003728
CH
700
701 parent = d_obtain_alias(inode);
702 if (!IS_ERR(parent) && get_node_id(inode) != FUSE_ROOT_ID) {
33670fa2
MS
703 parent->d_op = &fuse_dentry_operations;
704 fuse_invalidate_entry_cache(parent);
705 }
706
707 return parent;
708}
dbd561d2
MS
709
710static const struct export_operations fuse_export_operations = {
711 .fh_to_dentry = fuse_fh_to_dentry,
712 .fh_to_parent = fuse_fh_to_parent,
713 .encode_fh = fuse_encode_fh,
33670fa2 714 .get_parent = fuse_get_parent,
dbd561d2
MS
715};
716
ee9b6d61 717static const struct super_operations fuse_super_operations = {
d8a5ba45
MS
718 .alloc_inode = fuse_alloc_inode,
719 .destroy_inode = fuse_destroy_inode,
d8a5ba45 720 .clear_inode = fuse_clear_inode,
ead5f0b5 721 .drop_inode = generic_delete_inode,
71421259 722 .remount_fs = fuse_remount_fs,
d8a5ba45 723 .put_super = fuse_put_super,
69a53bf2 724 .umount_begin = fuse_umount_begin,
e5e5558e 725 .statfs = fuse_statfs,
d8a5ba45
MS
726 .show_options = fuse_show_options,
727};
728
9b9a0469
MS
729static void process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
730{
9b9a0469
MS
731 struct fuse_init_out *arg = &req->misc.init_out;
732
733 if (req->out.h.error || arg->major != FUSE_KERNEL_VERSION)
734 fc->conn_error = 1;
735 else {
9cd68455
MS
736 unsigned long ra_pages;
737
738 if (arg->minor >= 6) {
739 ra_pages = arg->max_readahead / PAGE_CACHE_SIZE;
740 if (arg->flags & FUSE_ASYNC_READ)
741 fc->async_read = 1;
71421259
MS
742 if (!(arg->flags & FUSE_POSIX_LOCKS))
743 fc->no_lock = 1;
6ff958ed
MS
744 if (arg->flags & FUSE_ATOMIC_O_TRUNC)
745 fc->atomic_o_trunc = 1;
33670fa2
MS
746 if (arg->minor >= 9) {
747 /* LOOKUP has dependency on proto version */
748 if (arg->flags & FUSE_EXPORT_SUPPORT)
749 fc->export_support = 1;
750 }
78bb6cb9
MS
751 if (arg->flags & FUSE_BIG_WRITES)
752 fc->big_writes = 1;
71421259 753 } else {
9cd68455 754 ra_pages = fc->max_read / PAGE_CACHE_SIZE;
71421259
MS
755 fc->no_lock = 1;
756 }
9cd68455
MS
757
758 fc->bdi.ra_pages = min(fc->bdi.ra_pages, ra_pages);
9b9a0469
MS
759 fc->minor = arg->minor;
760 fc->max_write = arg->minor < 5 ? 4096 : arg->max_write;
f948d564 761 fc->max_write = max_t(unsigned, 4096, fc->max_write);
0ec7ca41 762 fc->conn_init = 1;
9b9a0469 763 }
08a53cdc
MS
764 fc->blocked = 0;
765 wake_up_all(&fc->blocked_waitq);
9b9a0469
MS
766}
767
ce1d5a49 768static void fuse_send_init(struct fuse_conn *fc, struct fuse_req *req)
9b9a0469 769{
9b9a0469 770 struct fuse_init_in *arg = &req->misc.init_in;
095da6cb 771
9b9a0469
MS
772 arg->major = FUSE_KERNEL_VERSION;
773 arg->minor = FUSE_KERNEL_MINOR_VERSION;
9cd68455 774 arg->max_readahead = fc->bdi.ra_pages * PAGE_CACHE_SIZE;
78bb6cb9 775 arg->flags |= FUSE_ASYNC_READ | FUSE_POSIX_LOCKS | FUSE_ATOMIC_O_TRUNC |
33670fa2 776 FUSE_EXPORT_SUPPORT | FUSE_BIG_WRITES;
9b9a0469
MS
777 req->in.h.opcode = FUSE_INIT;
778 req->in.numargs = 1;
779 req->in.args[0].size = sizeof(*arg);
780 req->in.args[0].value = arg;
781 req->out.numargs = 1;
782 /* Variable length arguement used for backward compatibility
783 with interface version < 7.5. Rest of init_out is zeroed
784 by do_get_request(), so a short reply is not a problem */
785 req->out.argvar = 1;
786 req->out.args[0].size = sizeof(struct fuse_init_out);
787 req->out.args[0].value = &req->misc.init_out;
788 req->end = process_init_reply;
b93f858a 789 fuse_request_send_background(fc, req);
9b9a0469
MS
790}
791
43901aab
TH
792static void fuse_free_conn(struct fuse_conn *fc)
793{
794 kfree(fc);
795}
796
d8a5ba45
MS
797static int fuse_fill_super(struct super_block *sb, void *data, int silent)
798{
799 struct fuse_conn *fc;
800 struct inode *root;
801 struct fuse_mount_data d;
802 struct file *file;
f543f253 803 struct dentry *root_dentry;
ce1d5a49 804 struct fuse_req *init_req;
d8a5ba45 805 int err;
d8091614 806 int is_bdev = sb->s_bdev != NULL;
d8a5ba45 807
71421259
MS
808 if (sb->s_flags & MS_MANDLOCK)
809 return -EINVAL;
810
d8091614 811 if (!parse_fuse_opt((char *) data, &d, is_bdev))
d8a5ba45
MS
812 return -EINVAL;
813
d8091614 814 if (is_bdev) {
875d95ec 815#ifdef CONFIG_BLOCK
d8091614
MS
816 if (!sb_set_blocksize(sb, d.blksize))
817 return -EINVAL;
875d95ec 818#endif
d8091614
MS
819 } else {
820 sb->s_blocksize = PAGE_CACHE_SIZE;
821 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
822 }
d8a5ba45
MS
823 sb->s_magic = FUSE_SUPER_MAGIC;
824 sb->s_op = &fuse_super_operations;
825 sb->s_maxbytes = MAX_LFS_FILESIZE;
dbd561d2 826 sb->s_export_op = &fuse_export_operations;
d8a5ba45
MS
827
828 file = fget(d.fd);
829 if (!file)
830 return -EINVAL;
831
3ddf1e7f
MS
832 if (file->f_op != &fuse_dev_operations) {
833 fput(file);
0720b315 834 return -EINVAL;
3ddf1e7f 835 }
0720b315 836
0d179aa5 837 fc = kmalloc(sizeof(*fc), GFP_KERNEL);
3ddf1e7f
MS
838 if (!fc) {
839 fput(file);
0720b315 840 return -ENOMEM;
3ddf1e7f 841 }
d8a5ba45 842
0d179aa5
TH
843 err = fuse_conn_init(fc, sb);
844 if (err) {
3ddf1e7f 845 fput(file);
0d179aa5
TH
846 kfree(fc);
847 return err;
848 }
849
43901aab 850 fc->release = fuse_free_conn;
1e9a4ed9 851 fc->flags = d.flags;
d8a5ba45 852 fc->user_id = d.user_id;
87729a55 853 fc->group_id = d.group_id;
f948d564 854 fc->max_read = max_t(unsigned, 4096, d.max_read);
d8a5ba45 855
f543f253
MS
856 /* Used by get_root_inode() */
857 sb->s_fs_info = fc;
858
d8a5ba45 859 err = -ENOMEM;
b93f858a 860 root = fuse_get_root_inode(sb, d.rootmode);
f543f253 861 if (!root)
d8a5ba45
MS
862 goto err;
863
f543f253
MS
864 root_dentry = d_alloc_root(root);
865 if (!root_dentry) {
d8a5ba45
MS
866 iput(root);
867 goto err;
868 }
f543f253 869
ce1d5a49
MS
870 init_req = fuse_request_alloc();
871 if (!init_req)
872 goto err_put_root;
873
0ec7ca41
MS
874 if (is_bdev) {
875 fc->destroy_req = fuse_request_alloc();
876 if (!fc->destroy_req)
17e18ab6 877 goto err_free_init_req;
0ec7ca41
MS
878 }
879
bafa9654 880 mutex_lock(&fuse_mutex);
8aa09a50
MS
881 err = -EINVAL;
882 if (file->private_data)
bafa9654 883 goto err_unlock;
8aa09a50 884
bafa9654
MS
885 err = fuse_ctl_add_conn(fc);
886 if (err)
887 goto err_unlock;
888
889 list_add_tail(&fc->entry, &fuse_conn_list);
f543f253 890 sb->s_root = root_dentry;
f543f253 891 fc->connected = 1;
bafa9654
MS
892 file->private_data = fuse_conn_get(fc);
893 mutex_unlock(&fuse_mutex);
0720b315
MS
894 /*
895 * atomic_dec_and_test() in fput() provides the necessary
896 * memory barrier for file->private_data to be visible on all
897 * CPUs after this
898 */
899 fput(file);
f543f253 900
ce1d5a49 901 fuse_send_init(fc, init_req);
f543f253 902
d8a5ba45
MS
903 return 0;
904
bafa9654
MS
905 err_unlock:
906 mutex_unlock(&fuse_mutex);
17e18ab6 907 err_free_init_req:
ce1d5a49 908 fuse_request_free(init_req);
f543f253
MS
909 err_put_root:
910 dput(root_dentry);
d8a5ba45 911 err:
0720b315 912 fput(file);
bafa9654 913 fuse_conn_put(fc);
d8a5ba45
MS
914 return err;
915}
916
454e2398
DH
917static int fuse_get_sb(struct file_system_type *fs_type,
918 int flags, const char *dev_name,
919 void *raw_data, struct vfsmount *mnt)
d8a5ba45 920{
454e2398 921 return get_sb_nodev(fs_type, flags, raw_data, fuse_fill_super, mnt);
d8a5ba45
MS
922}
923
875d95ec
MS
924static struct file_system_type fuse_fs_type = {
925 .owner = THIS_MODULE,
926 .name = "fuse",
79c0b2df 927 .fs_flags = FS_HAS_SUBTYPE,
875d95ec
MS
928 .get_sb = fuse_get_sb,
929 .kill_sb = kill_anon_super,
930};
931
932#ifdef CONFIG_BLOCK
d6392f87
MS
933static int fuse_get_sb_blk(struct file_system_type *fs_type,
934 int flags, const char *dev_name,
935 void *raw_data, struct vfsmount *mnt)
936{
937 return get_sb_bdev(fs_type, flags, dev_name, raw_data, fuse_fill_super,
938 mnt);
939}
940
d6392f87
MS
941static struct file_system_type fuseblk_fs_type = {
942 .owner = THIS_MODULE,
943 .name = "fuseblk",
944 .get_sb = fuse_get_sb_blk,
945 .kill_sb = kill_block_super,
edad01e2 946 .fs_flags = FS_REQUIRES_DEV | FS_HAS_SUBTYPE,
d6392f87
MS
947};
948
875d95ec
MS
949static inline int register_fuseblk(void)
950{
951 return register_filesystem(&fuseblk_fs_type);
952}
953
954static inline void unregister_fuseblk(void)
955{
956 unregister_filesystem(&fuseblk_fs_type);
957}
958#else
959static inline int register_fuseblk(void)
960{
961 return 0;
962}
963
964static inline void unregister_fuseblk(void)
965{
966}
967#endif
968
51cc5068 969static void fuse_inode_init_once(void *foo)
d8a5ba45 970{
1729a16c 971 struct inode *inode = foo;
d8a5ba45 972
a35afb83 973 inode_init_once(inode);
d8a5ba45
MS
974}
975
976static int __init fuse_fs_init(void)
977{
978 int err;
979
980 err = register_filesystem(&fuse_fs_type);
981 if (err)
d6392f87
MS
982 goto out;
983
875d95ec 984 err = register_fuseblk();
d6392f87
MS
985 if (err)
986 goto out_unreg;
987
988 fuse_inode_cachep = kmem_cache_create("fuse_inode",
989 sizeof(struct fuse_inode),
990 0, SLAB_HWCACHE_ALIGN,
20c2df83 991 fuse_inode_init_once);
d6392f87
MS
992 err = -ENOMEM;
993 if (!fuse_inode_cachep)
994 goto out_unreg2;
995
996 return 0;
d8a5ba45 997
d6392f87 998 out_unreg2:
875d95ec 999 unregister_fuseblk();
d6392f87
MS
1000 out_unreg:
1001 unregister_filesystem(&fuse_fs_type);
1002 out:
d8a5ba45
MS
1003 return err;
1004}
1005
1006static void fuse_fs_cleanup(void)
1007{
1008 unregister_filesystem(&fuse_fs_type);
875d95ec 1009 unregister_fuseblk();
d8a5ba45
MS
1010 kmem_cache_destroy(fuse_inode_cachep);
1011}
1012
5c89e17e
GKH
1013static struct kobject *fuse_kobj;
1014static struct kobject *connections_kobj;
1015
f543f253
MS
1016static int fuse_sysfs_init(void)
1017{
1018 int err;
1019
00d26666 1020 fuse_kobj = kobject_create_and_add("fuse", fs_kobj);
5c89e17e
GKH
1021 if (!fuse_kobj) {
1022 err = -ENOMEM;
f543f253 1023 goto out_err;
5c89e17e 1024 }
f543f253 1025
5c89e17e
GKH
1026 connections_kobj = kobject_create_and_add("connections", fuse_kobj);
1027 if (!connections_kobj) {
1028 err = -ENOMEM;
f543f253 1029 goto out_fuse_unregister;
5c89e17e 1030 }
f543f253
MS
1031
1032 return 0;
1033
1034 out_fuse_unregister:
197b12d6 1035 kobject_put(fuse_kobj);
f543f253
MS
1036 out_err:
1037 return err;
1038}
1039
1040static void fuse_sysfs_cleanup(void)
1041{
197b12d6
GKH
1042 kobject_put(connections_kobj);
1043 kobject_put(fuse_kobj);
f543f253
MS
1044}
1045
d8a5ba45
MS
1046static int __init fuse_init(void)
1047{
1048 int res;
1049
1729a16c 1050 printk(KERN_INFO "fuse init (API version %i.%i)\n",
d8a5ba45
MS
1051 FUSE_KERNEL_VERSION, FUSE_KERNEL_MINOR_VERSION);
1052
bafa9654 1053 INIT_LIST_HEAD(&fuse_conn_list);
d8a5ba45
MS
1054 res = fuse_fs_init();
1055 if (res)
1056 goto err;
1057
334f485d
MS
1058 res = fuse_dev_init();
1059 if (res)
1060 goto err_fs_cleanup;
1061
f543f253
MS
1062 res = fuse_sysfs_init();
1063 if (res)
1064 goto err_dev_cleanup;
1065
bafa9654
MS
1066 res = fuse_ctl_init();
1067 if (res)
1068 goto err_sysfs_cleanup;
1069
d8a5ba45
MS
1070 return 0;
1071
bafa9654
MS
1072 err_sysfs_cleanup:
1073 fuse_sysfs_cleanup();
f543f253
MS
1074 err_dev_cleanup:
1075 fuse_dev_cleanup();
334f485d
MS
1076 err_fs_cleanup:
1077 fuse_fs_cleanup();
d8a5ba45
MS
1078 err:
1079 return res;
1080}
1081
1082static void __exit fuse_exit(void)
1083{
1084 printk(KERN_DEBUG "fuse exit\n");
1085
bafa9654 1086 fuse_ctl_cleanup();
f543f253 1087 fuse_sysfs_cleanup();
d8a5ba45 1088 fuse_fs_cleanup();
334f485d 1089 fuse_dev_cleanup();
d8a5ba45
MS
1090}
1091
1092module_init(fuse_init);
1093module_exit(fuse_exit);