]> git.proxmox.com Git - mirror_qemu.git/blob - block/export/fuse.c
1b26ddfcf3c11bd53c1157d93d3bf24637cf803d
[mirror_qemu.git] / block / export / fuse.c
1 /*
2 * Present a block device as a raw image through FUSE
3 *
4 * Copyright (c) 2020 Max Reitz <mreitz@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 or later of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
17 */
18
19 #define FUSE_USE_VERSION 31
20
21 #include "qemu/osdep.h"
22 #include "qemu/memalign.h"
23 #include "block/aio.h"
24 #include "block/block.h"
25 #include "block/export.h"
26 #include "block/fuse.h"
27 #include "block/qapi.h"
28 #include "qapi/error.h"
29 #include "qapi/qapi-commands-block.h"
30 #include "sysemu/block-backend.h"
31
32 #include <fuse.h>
33 #include <fuse_lowlevel.h>
34
35 #if defined(CONFIG_FALLOCATE_ZERO_RANGE)
36 #include <linux/falloc.h>
37 #endif
38
39 #ifdef __linux__
40 #include <linux/fs.h>
41 #endif
42
43 /* Prevent overly long bounce buffer allocations */
44 #define FUSE_MAX_BOUNCE_BYTES (MIN(BDRV_REQUEST_MAX_BYTES, 64 * 1024 * 1024))
45
46
47 typedef struct FuseExport {
48 BlockExport common;
49
50 struct fuse_session *fuse_session;
51 struct fuse_buf fuse_buf;
52 bool mounted, fd_handler_set_up;
53
54 char *mountpoint;
55 bool writable;
56 bool growable;
57 /* Whether allow_other was used as a mount option or not */
58 bool allow_other;
59
60 mode_t st_mode;
61 uid_t st_uid;
62 gid_t st_gid;
63 } FuseExport;
64
65 static GHashTable *exports;
66 static const struct fuse_lowlevel_ops fuse_ops;
67
68 static void fuse_export_shutdown(BlockExport *exp);
69 static void fuse_export_delete(BlockExport *exp);
70
71 static void init_exports_table(void);
72
73 static int setup_fuse_export(FuseExport *exp, const char *mountpoint,
74 bool allow_other, Error **errp);
75 static void read_from_fuse_export(void *opaque);
76
77 static bool is_regular_file(const char *path, Error **errp);
78
79
80 static int fuse_export_create(BlockExport *blk_exp,
81 BlockExportOptions *blk_exp_args,
82 Error **errp)
83 {
84 FuseExport *exp = container_of(blk_exp, FuseExport, common);
85 BlockExportOptionsFuse *args = &blk_exp_args->u.fuse;
86 int ret;
87
88 assert(blk_exp_args->type == BLOCK_EXPORT_TYPE_FUSE);
89
90 /* For growable and writable exports, take the RESIZE permission */
91 if (args->growable || blk_exp_args->writable) {
92 uint64_t blk_perm, blk_shared_perm;
93
94 blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm);
95
96 ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE,
97 blk_shared_perm, errp);
98 if (ret < 0) {
99 return ret;
100 }
101 }
102
103 init_exports_table();
104
105 /*
106 * It is important to do this check before calling is_regular_file() --
107 * that function will do a stat(), which we would have to handle if we
108 * already exported something on @mountpoint. But we cannot, because
109 * we are currently caught up here.
110 * (Note that ideally we would want to resolve relative paths here,
111 * but bdrv_make_absolute_filename() might do the wrong thing for
112 * paths that contain colons, and realpath() would resolve symlinks,
113 * which we do not want: The mount point is not going to be the
114 * symlink's destination, but the link itself.)
115 * So this will not catch all potential clashes, but hopefully at
116 * least the most common one of specifying exactly the same path
117 * string twice.
118 */
119 if (g_hash_table_contains(exports, args->mountpoint)) {
120 error_setg(errp, "There already is a FUSE export on '%s'",
121 args->mountpoint);
122 ret = -EEXIST;
123 goto fail;
124 }
125
126 if (!is_regular_file(args->mountpoint, errp)) {
127 ret = -EINVAL;
128 goto fail;
129 }
130
131 exp->mountpoint = g_strdup(args->mountpoint);
132 exp->writable = blk_exp_args->writable;
133 exp->growable = args->growable;
134
135 /* set default */
136 if (!args->has_allow_other) {
137 args->allow_other = FUSE_EXPORT_ALLOW_OTHER_AUTO;
138 }
139
140 exp->st_mode = S_IFREG | S_IRUSR;
141 if (exp->writable) {
142 exp->st_mode |= S_IWUSR;
143 }
144 exp->st_uid = getuid();
145 exp->st_gid = getgid();
146
147 if (args->allow_other == FUSE_EXPORT_ALLOW_OTHER_AUTO) {
148 /* Ignore errors on our first attempt */
149 ret = setup_fuse_export(exp, args->mountpoint, true, NULL);
150 exp->allow_other = ret == 0;
151 if (ret < 0) {
152 ret = setup_fuse_export(exp, args->mountpoint, false, errp);
153 }
154 } else {
155 exp->allow_other = args->allow_other == FUSE_EXPORT_ALLOW_OTHER_ON;
156 ret = setup_fuse_export(exp, args->mountpoint, exp->allow_other, errp);
157 }
158 if (ret < 0) {
159 goto fail;
160 }
161
162 return 0;
163
164 fail:
165 fuse_export_delete(blk_exp);
166 return ret;
167 }
168
169 /**
170 * Allocates the global @exports hash table.
171 */
172 static void init_exports_table(void)
173 {
174 if (exports) {
175 return;
176 }
177
178 exports = g_hash_table_new_full(g_str_hash, g_str_equal, g_free, NULL);
179 }
180
181 /**
182 * Create exp->fuse_session and mount it.
183 */
184 static int setup_fuse_export(FuseExport *exp, const char *mountpoint,
185 bool allow_other, Error **errp)
186 {
187 const char *fuse_argv[4];
188 char *mount_opts;
189 struct fuse_args fuse_args;
190 int ret;
191
192 /*
193 * max_read needs to match what fuse_init() sets.
194 * max_write need not be supplied.
195 */
196 mount_opts = g_strdup_printf("max_read=%zu,default_permissions%s",
197 FUSE_MAX_BOUNCE_BYTES,
198 allow_other ? ",allow_other" : "");
199
200 fuse_argv[0] = ""; /* Dummy program name */
201 fuse_argv[1] = "-o";
202 fuse_argv[2] = mount_opts;
203 fuse_argv[3] = NULL;
204 fuse_args = (struct fuse_args)FUSE_ARGS_INIT(3, (char **)fuse_argv);
205
206 exp->fuse_session = fuse_session_new(&fuse_args, &fuse_ops,
207 sizeof(fuse_ops), exp);
208 g_free(mount_opts);
209 if (!exp->fuse_session) {
210 error_setg(errp, "Failed to set up FUSE session");
211 ret = -EIO;
212 goto fail;
213 }
214
215 ret = fuse_session_mount(exp->fuse_session, mountpoint);
216 if (ret < 0) {
217 error_setg(errp, "Failed to mount FUSE session to export");
218 ret = -EIO;
219 goto fail;
220 }
221 exp->mounted = true;
222
223 g_hash_table_insert(exports, g_strdup(mountpoint), NULL);
224
225 aio_set_fd_handler(exp->common.ctx,
226 fuse_session_fd(exp->fuse_session), true,
227 read_from_fuse_export, NULL, NULL, NULL, exp);
228 exp->fd_handler_set_up = true;
229
230 return 0;
231
232 fail:
233 fuse_export_shutdown(&exp->common);
234 return ret;
235 }
236
237 /**
238 * Callback to be invoked when the FUSE session FD can be read from.
239 * (This is basically the FUSE event loop.)
240 */
241 static void read_from_fuse_export(void *opaque)
242 {
243 FuseExport *exp = opaque;
244 int ret;
245
246 blk_exp_ref(&exp->common);
247
248 do {
249 ret = fuse_session_receive_buf(exp->fuse_session, &exp->fuse_buf);
250 } while (ret == -EINTR);
251 if (ret < 0) {
252 goto out;
253 }
254
255 fuse_session_process_buf(exp->fuse_session, &exp->fuse_buf);
256
257 out:
258 blk_exp_unref(&exp->common);
259 }
260
261 static void fuse_export_shutdown(BlockExport *blk_exp)
262 {
263 FuseExport *exp = container_of(blk_exp, FuseExport, common);
264
265 if (exp->fuse_session) {
266 fuse_session_exit(exp->fuse_session);
267
268 if (exp->fd_handler_set_up) {
269 aio_set_fd_handler(exp->common.ctx,
270 fuse_session_fd(exp->fuse_session), true,
271 NULL, NULL, NULL, NULL, NULL);
272 exp->fd_handler_set_up = false;
273 }
274 }
275
276 if (exp->mountpoint) {
277 /*
278 * Safe to drop now, because we will not handle any requests
279 * for this export anymore anyway.
280 */
281 g_hash_table_remove(exports, exp->mountpoint);
282 }
283 }
284
285 static void fuse_export_delete(BlockExport *blk_exp)
286 {
287 FuseExport *exp = container_of(blk_exp, FuseExport, common);
288
289 if (exp->fuse_session) {
290 if (exp->mounted) {
291 fuse_session_unmount(exp->fuse_session);
292 }
293
294 fuse_session_destroy(exp->fuse_session);
295 }
296
297 free(exp->fuse_buf.mem);
298 g_free(exp->mountpoint);
299 }
300
301 /**
302 * Check whether @path points to a regular file. If not, put an
303 * appropriate message into *errp.
304 */
305 static bool is_regular_file(const char *path, Error **errp)
306 {
307 struct stat statbuf;
308 int ret;
309
310 ret = stat(path, &statbuf);
311 if (ret < 0) {
312 error_setg_errno(errp, errno, "Failed to stat '%s'", path);
313 return false;
314 }
315
316 if (!S_ISREG(statbuf.st_mode)) {
317 error_setg(errp, "'%s' is not a regular file", path);
318 return false;
319 }
320
321 return true;
322 }
323
324 /**
325 * A chance to set change some parameters supplied to FUSE_INIT.
326 */
327 static void fuse_init(void *userdata, struct fuse_conn_info *conn)
328 {
329 /*
330 * MIN_NON_ZERO() would not be wrong here, but what we set here
331 * must equal what has been passed to fuse_session_new().
332 * Therefore, as long as max_read must be passed as a mount option
333 * (which libfuse claims will be changed at some point), we have
334 * to set max_read to a fixed value here.
335 */
336 conn->max_read = FUSE_MAX_BOUNCE_BYTES;
337
338 conn->max_write = MIN_NON_ZERO(BDRV_REQUEST_MAX_BYTES, conn->max_write);
339 }
340
341 /**
342 * Let clients look up files. Always return ENOENT because we only
343 * care about the mountpoint itself.
344 */
345 static void fuse_lookup(fuse_req_t req, fuse_ino_t parent, const char *name)
346 {
347 fuse_reply_err(req, ENOENT);
348 }
349
350 /**
351 * Let clients get file attributes (i.e., stat() the file).
352 */
353 static void fuse_getattr(fuse_req_t req, fuse_ino_t inode,
354 struct fuse_file_info *fi)
355 {
356 struct stat statbuf;
357 int64_t length, allocated_blocks;
358 time_t now = time(NULL);
359 FuseExport *exp = fuse_req_userdata(req);
360
361 length = blk_getlength(exp->common.blk);
362 if (length < 0) {
363 fuse_reply_err(req, -length);
364 return;
365 }
366
367 allocated_blocks = bdrv_get_allocated_file_size(blk_bs(exp->common.blk));
368 if (allocated_blocks <= 0) {
369 allocated_blocks = DIV_ROUND_UP(length, 512);
370 } else {
371 allocated_blocks = DIV_ROUND_UP(allocated_blocks, 512);
372 }
373
374 statbuf = (struct stat) {
375 .st_ino = inode,
376 .st_mode = exp->st_mode,
377 .st_nlink = 1,
378 .st_uid = exp->st_uid,
379 .st_gid = exp->st_gid,
380 .st_size = length,
381 .st_blksize = blk_bs(exp->common.blk)->bl.request_alignment,
382 .st_blocks = allocated_blocks,
383 .st_atime = now,
384 .st_mtime = now,
385 .st_ctime = now,
386 };
387
388 fuse_reply_attr(req, &statbuf, 1.);
389 }
390
391 static int fuse_do_truncate(const FuseExport *exp, int64_t size,
392 bool req_zero_write, PreallocMode prealloc)
393 {
394 uint64_t blk_perm, blk_shared_perm;
395 BdrvRequestFlags truncate_flags = 0;
396 bool add_resize_perm;
397 int ret, ret_check;
398
399 /* Growable and writable exports have a permanent RESIZE permission */
400 add_resize_perm = !exp->growable && !exp->writable;
401
402 if (req_zero_write) {
403 truncate_flags |= BDRV_REQ_ZERO_WRITE;
404 }
405
406 if (add_resize_perm) {
407
408 if (!qemu_in_main_thread()) {
409 /* Changing permissions like below only works in the main thread */
410 return -EPERM;
411 }
412
413 blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm);
414
415 ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE,
416 blk_shared_perm, NULL);
417 if (ret < 0) {
418 return ret;
419 }
420 }
421
422 ret = blk_truncate(exp->common.blk, size, true, prealloc,
423 truncate_flags, NULL);
424
425 if (add_resize_perm) {
426 /* Must succeed, because we are only giving up the RESIZE permission */
427 ret_check = blk_set_perm(exp->common.blk, blk_perm,
428 blk_shared_perm, &error_abort);
429 assert(ret_check == 0);
430 }
431
432 return ret;
433 }
434
435 /**
436 * Let clients set file attributes. Only resizing and changing
437 * permissions (st_mode, st_uid, st_gid) is allowed.
438 * Changing permissions is only allowed as far as it will actually
439 * permit access: Read-only exports cannot be given +w, and exports
440 * without allow_other cannot be given a different UID or GID, and
441 * they cannot be given non-owner access.
442 */
443 static void fuse_setattr(fuse_req_t req, fuse_ino_t inode, struct stat *statbuf,
444 int to_set, struct fuse_file_info *fi)
445 {
446 FuseExport *exp = fuse_req_userdata(req);
447 int supported_attrs;
448 int ret;
449
450 supported_attrs = FUSE_SET_ATTR_SIZE | FUSE_SET_ATTR_MODE;
451 if (exp->allow_other) {
452 supported_attrs |= FUSE_SET_ATTR_UID | FUSE_SET_ATTR_GID;
453 }
454
455 if (to_set & ~supported_attrs) {
456 fuse_reply_err(req, ENOTSUP);
457 return;
458 }
459
460 /* Do some argument checks first before committing to anything */
461 if (to_set & FUSE_SET_ATTR_MODE) {
462 /*
463 * Without allow_other, non-owners can never access the export, so do
464 * not allow setting permissions for them
465 */
466 if (!exp->allow_other &&
467 (statbuf->st_mode & (S_IRWXG | S_IRWXO)) != 0)
468 {
469 fuse_reply_err(req, EPERM);
470 return;
471 }
472
473 /* +w for read-only exports makes no sense, disallow it */
474 if (!exp->writable &&
475 (statbuf->st_mode & (S_IWUSR | S_IWGRP | S_IWOTH)) != 0)
476 {
477 fuse_reply_err(req, EROFS);
478 return;
479 }
480 }
481
482 if (to_set & FUSE_SET_ATTR_SIZE) {
483 if (!exp->writable) {
484 fuse_reply_err(req, EACCES);
485 return;
486 }
487
488 ret = fuse_do_truncate(exp, statbuf->st_size, true, PREALLOC_MODE_OFF);
489 if (ret < 0) {
490 fuse_reply_err(req, -ret);
491 return;
492 }
493 }
494
495 if (to_set & FUSE_SET_ATTR_MODE) {
496 /* Ignore FUSE-supplied file type, only change the mode */
497 exp->st_mode = (statbuf->st_mode & 07777) | S_IFREG;
498 }
499
500 if (to_set & FUSE_SET_ATTR_UID) {
501 exp->st_uid = statbuf->st_uid;
502 }
503
504 if (to_set & FUSE_SET_ATTR_GID) {
505 exp->st_gid = statbuf->st_gid;
506 }
507
508 fuse_getattr(req, inode, fi);
509 }
510
511 /**
512 * Let clients open a file (i.e., the exported image).
513 */
514 static void fuse_open(fuse_req_t req, fuse_ino_t inode,
515 struct fuse_file_info *fi)
516 {
517 fuse_reply_open(req, fi);
518 }
519
520 /**
521 * Handle client reads from the exported image.
522 */
523 static void fuse_read(fuse_req_t req, fuse_ino_t inode,
524 size_t size, off_t offset, struct fuse_file_info *fi)
525 {
526 FuseExport *exp = fuse_req_userdata(req);
527 int64_t length;
528 void *buf;
529 int ret;
530
531 /* Limited by max_read, should not happen */
532 if (size > FUSE_MAX_BOUNCE_BYTES) {
533 fuse_reply_err(req, EINVAL);
534 return;
535 }
536
537 /**
538 * Clients will expect short reads at EOF, so we have to limit
539 * offset+size to the image length.
540 */
541 length = blk_getlength(exp->common.blk);
542 if (length < 0) {
543 fuse_reply_err(req, -length);
544 return;
545 }
546
547 if (offset + size > length) {
548 size = length - offset;
549 }
550
551 buf = qemu_try_blockalign(blk_bs(exp->common.blk), size);
552 if (!buf) {
553 fuse_reply_err(req, ENOMEM);
554 return;
555 }
556
557 ret = blk_pread(exp->common.blk, offset, size, buf, 0);
558 if (ret >= 0) {
559 fuse_reply_buf(req, buf, size);
560 } else {
561 fuse_reply_err(req, -ret);
562 }
563
564 qemu_vfree(buf);
565 }
566
567 /**
568 * Handle client writes to the exported image.
569 */
570 static void fuse_write(fuse_req_t req, fuse_ino_t inode, const char *buf,
571 size_t size, off_t offset, struct fuse_file_info *fi)
572 {
573 FuseExport *exp = fuse_req_userdata(req);
574 int64_t length;
575 int ret;
576
577 /* Limited by max_write, should not happen */
578 if (size > BDRV_REQUEST_MAX_BYTES) {
579 fuse_reply_err(req, EINVAL);
580 return;
581 }
582
583 if (!exp->writable) {
584 fuse_reply_err(req, EACCES);
585 return;
586 }
587
588 /**
589 * Clients will expect short writes at EOF, so we have to limit
590 * offset+size to the image length.
591 */
592 length = blk_getlength(exp->common.blk);
593 if (length < 0) {
594 fuse_reply_err(req, -length);
595 return;
596 }
597
598 if (offset + size > length) {
599 if (exp->growable) {
600 ret = fuse_do_truncate(exp, offset + size, true, PREALLOC_MODE_OFF);
601 if (ret < 0) {
602 fuse_reply_err(req, -ret);
603 return;
604 }
605 } else {
606 size = length - offset;
607 }
608 }
609
610 ret = blk_pwrite(exp->common.blk, offset, size, buf, 0);
611 if (ret >= 0) {
612 fuse_reply_write(req, size);
613 } else {
614 fuse_reply_err(req, -ret);
615 }
616 }
617
618 /**
619 * Let clients perform various fallocate() operations.
620 */
621 static void fuse_fallocate(fuse_req_t req, fuse_ino_t inode, int mode,
622 off_t offset, off_t length,
623 struct fuse_file_info *fi)
624 {
625 FuseExport *exp = fuse_req_userdata(req);
626 int64_t blk_len;
627 int ret;
628
629 if (!exp->writable) {
630 fuse_reply_err(req, EACCES);
631 return;
632 }
633
634 blk_len = blk_getlength(exp->common.blk);
635 if (blk_len < 0) {
636 fuse_reply_err(req, -blk_len);
637 return;
638 }
639
640 #ifdef CONFIG_FALLOCATE_PUNCH_HOLE
641 if (mode & FALLOC_FL_KEEP_SIZE) {
642 length = MIN(length, blk_len - offset);
643 }
644 #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */
645
646 if (!mode) {
647 /* We can only fallocate at the EOF with a truncate */
648 if (offset < blk_len) {
649 fuse_reply_err(req, EOPNOTSUPP);
650 return;
651 }
652
653 if (offset > blk_len) {
654 /* No preallocation needed here */
655 ret = fuse_do_truncate(exp, offset, true, PREALLOC_MODE_OFF);
656 if (ret < 0) {
657 fuse_reply_err(req, -ret);
658 return;
659 }
660 }
661
662 ret = fuse_do_truncate(exp, offset + length, true,
663 PREALLOC_MODE_FALLOC);
664 }
665 #ifdef CONFIG_FALLOCATE_PUNCH_HOLE
666 else if (mode & FALLOC_FL_PUNCH_HOLE) {
667 if (!(mode & FALLOC_FL_KEEP_SIZE)) {
668 fuse_reply_err(req, EINVAL);
669 return;
670 }
671
672 do {
673 int size = MIN(length, BDRV_REQUEST_MAX_BYTES);
674
675 ret = blk_pdiscard(exp->common.blk, offset, size);
676 offset += size;
677 length -= size;
678 } while (ret == 0 && length > 0);
679 }
680 #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */
681 #ifdef CONFIG_FALLOCATE_ZERO_RANGE
682 else if (mode & FALLOC_FL_ZERO_RANGE) {
683 if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + length > blk_len) {
684 /* No need for zeroes, we are going to write them ourselves */
685 ret = fuse_do_truncate(exp, offset + length, false,
686 PREALLOC_MODE_OFF);
687 if (ret < 0) {
688 fuse_reply_err(req, -ret);
689 return;
690 }
691 }
692
693 do {
694 int size = MIN(length, BDRV_REQUEST_MAX_BYTES);
695
696 ret = blk_pwrite_zeroes(exp->common.blk,
697 offset, size, 0);
698 offset += size;
699 length -= size;
700 } while (ret == 0 && length > 0);
701 }
702 #endif /* CONFIG_FALLOCATE_ZERO_RANGE */
703 else {
704 ret = -EOPNOTSUPP;
705 }
706
707 fuse_reply_err(req, ret < 0 ? -ret : 0);
708 }
709
710 /**
711 * Let clients fsync the exported image.
712 */
713 static void fuse_fsync(fuse_req_t req, fuse_ino_t inode, int datasync,
714 struct fuse_file_info *fi)
715 {
716 FuseExport *exp = fuse_req_userdata(req);
717 int ret;
718
719 ret = blk_flush(exp->common.blk);
720 fuse_reply_err(req, ret < 0 ? -ret : 0);
721 }
722
723 /**
724 * Called before an FD to the exported image is closed. (libfuse
725 * notes this to be a way to return last-minute errors.)
726 */
727 static void fuse_flush(fuse_req_t req, fuse_ino_t inode,
728 struct fuse_file_info *fi)
729 {
730 fuse_fsync(req, inode, 1, fi);
731 }
732
733 #ifdef CONFIG_FUSE_LSEEK
734 /**
735 * Let clients inquire allocation status.
736 */
737 static void fuse_lseek(fuse_req_t req, fuse_ino_t inode, off_t offset,
738 int whence, struct fuse_file_info *fi)
739 {
740 FuseExport *exp = fuse_req_userdata(req);
741
742 if (whence != SEEK_HOLE && whence != SEEK_DATA) {
743 fuse_reply_err(req, EINVAL);
744 return;
745 }
746
747 while (true) {
748 int64_t pnum;
749 int ret;
750
751 ret = bdrv_block_status_above(blk_bs(exp->common.blk), NULL,
752 offset, INT64_MAX, &pnum, NULL, NULL);
753 if (ret < 0) {
754 fuse_reply_err(req, -ret);
755 return;
756 }
757
758 if (!pnum && (ret & BDRV_BLOCK_EOF)) {
759 int64_t blk_len;
760
761 /*
762 * If blk_getlength() rounds (e.g. by sectors), then the
763 * export length will be rounded, too. However,
764 * bdrv_block_status_above() may return EOF at unaligned
765 * offsets. We must not let this become visible and thus
766 * always simulate a hole between @offset (the real EOF)
767 * and @blk_len (the client-visible EOF).
768 */
769
770 blk_len = blk_getlength(exp->common.blk);
771 if (blk_len < 0) {
772 fuse_reply_err(req, -blk_len);
773 return;
774 }
775
776 if (offset > blk_len || whence == SEEK_DATA) {
777 fuse_reply_err(req, ENXIO);
778 } else {
779 fuse_reply_lseek(req, offset);
780 }
781 return;
782 }
783
784 if (ret & BDRV_BLOCK_DATA) {
785 if (whence == SEEK_DATA) {
786 fuse_reply_lseek(req, offset);
787 return;
788 }
789 } else {
790 if (whence == SEEK_HOLE) {
791 fuse_reply_lseek(req, offset);
792 return;
793 }
794 }
795
796 /* Safety check against infinite loops */
797 if (!pnum) {
798 fuse_reply_err(req, ENXIO);
799 return;
800 }
801
802 offset += pnum;
803 }
804 }
805 #endif
806
807 static const struct fuse_lowlevel_ops fuse_ops = {
808 .init = fuse_init,
809 .lookup = fuse_lookup,
810 .getattr = fuse_getattr,
811 .setattr = fuse_setattr,
812 .open = fuse_open,
813 .read = fuse_read,
814 .write = fuse_write,
815 .fallocate = fuse_fallocate,
816 .flush = fuse_flush,
817 .fsync = fuse_fsync,
818 #ifdef CONFIG_FUSE_LSEEK
819 .lseek = fuse_lseek,
820 #endif
821 };
822
823 const BlockExportDriver blk_exp_fuse = {
824 .type = BLOCK_EXPORT_TYPE_FUSE,
825 .instance_size = sizeof(FuseExport),
826 .create = fuse_export_create,
827 .delete = fuse_export_delete,
828 .request_shutdown = fuse_export_shutdown,
829 };