blob: 368189fd4056a8f2e2bb73f15baeccabeba3c059 [file] [log] [blame]
Miklos Szeredi334f4852005-09-09 13:10:27 -07001/*
2 FUSE: Filesystem in Userspace
Miklos Szeredi1729a162008-11-26 12:03:54 +01003 Copyright (C) 2001-2008 Miklos Szeredi <miklos@szeredi.hu>
Miklos Szeredi334f4852005-09-09 13:10:27 -07004
5 This program can be distributed under the terms of the GNU GPL.
6 See the file COPYING.
7*/
8
9#include "fuse_i.h"
10
11#include <linux/init.h>
12#include <linux/module.h>
13#include <linux/poll.h>
14#include <linux/uio.h>
15#include <linux/miscdevice.h>
16#include <linux/pagemap.h>
17#include <linux/file.h>
18#include <linux/slab.h>
19
20MODULE_ALIAS_MISCDEV(FUSE_MINOR);
21
Christoph Lametere18b8902006-12-06 20:33:20 -080022static struct kmem_cache *fuse_req_cachep;
Miklos Szeredi334f4852005-09-09 13:10:27 -070023
Miklos Szeredi8bfc0162006-01-16 22:14:28 -080024static struct fuse_conn *fuse_get_conn(struct file *file)
Miklos Szeredi334f4852005-09-09 13:10:27 -070025{
Miklos Szeredi0720b312006-04-10 22:54:55 -070026 /*
27 * Lockless access is OK, because file->private data is set
28 * once during mount and is valid until the file is released.
29 */
30 return file->private_data;
Miklos Szeredi334f4852005-09-09 13:10:27 -070031}
32
Miklos Szeredi8bfc0162006-01-16 22:14:28 -080033static void fuse_request_init(struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -070034{
35 memset(req, 0, sizeof(*req));
36 INIT_LIST_HEAD(&req->list);
Miklos Szeredia4d27e72006-06-25 05:48:54 -070037 INIT_LIST_HEAD(&req->intr_entry);
Miklos Szeredi334f4852005-09-09 13:10:27 -070038 init_waitqueue_head(&req->waitq);
39 atomic_set(&req->count, 1);
40}
41
42struct fuse_req *fuse_request_alloc(void)
43{
Christoph Lametere94b1762006-12-06 20:33:17 -080044 struct fuse_req *req = kmem_cache_alloc(fuse_req_cachep, GFP_KERNEL);
Miklos Szeredi334f4852005-09-09 13:10:27 -070045 if (req)
46 fuse_request_init(req);
47 return req;
48}
49
Miklos Szeredi3be5a522008-04-30 00:54:41 -070050struct fuse_req *fuse_request_alloc_nofs(void)
51{
52 struct fuse_req *req = kmem_cache_alloc(fuse_req_cachep, GFP_NOFS);
53 if (req)
54 fuse_request_init(req);
55 return req;
56}
57
Miklos Szeredi334f4852005-09-09 13:10:27 -070058void fuse_request_free(struct fuse_req *req)
59{
60 kmem_cache_free(fuse_req_cachep, req);
61}
62
Miklos Szeredi8bfc0162006-01-16 22:14:28 -080063static void block_sigs(sigset_t *oldset)
Miklos Szeredi334f4852005-09-09 13:10:27 -070064{
65 sigset_t mask;
66
67 siginitsetinv(&mask, sigmask(SIGKILL));
68 sigprocmask(SIG_BLOCK, &mask, oldset);
69}
70
Miklos Szeredi8bfc0162006-01-16 22:14:28 -080071static void restore_sigs(sigset_t *oldset)
Miklos Szeredi334f4852005-09-09 13:10:27 -070072{
73 sigprocmask(SIG_SETMASK, oldset, NULL);
74}
75
Miklos Szeredi334f4852005-09-09 13:10:27 -070076static void __fuse_get_request(struct fuse_req *req)
77{
78 atomic_inc(&req->count);
79}
80
81/* Must be called with > 1 refcount */
82static void __fuse_put_request(struct fuse_req *req)
83{
84 BUG_ON(atomic_read(&req->count) < 2);
85 atomic_dec(&req->count);
86}
87
Miklos Szeredi33649c92006-06-25 05:48:52 -070088static void fuse_req_init_context(struct fuse_req *req)
89{
David Howells2186a712008-11-14 10:38:53 +110090 req->in.h.uid = current_fsuid();
91 req->in.h.gid = current_fsgid();
Miklos Szeredi33649c92006-06-25 05:48:52 -070092 req->in.h.pid = current->pid;
93}
94
Miklos Szeredice1d5a42006-04-10 22:54:58 -070095struct fuse_req *fuse_get_req(struct fuse_conn *fc)
Miklos Szeredi334f4852005-09-09 13:10:27 -070096{
Miklos Szeredi08a53cd2006-04-10 22:54:59 -070097 struct fuse_req *req;
98 sigset_t oldset;
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +020099 int intr;
Miklos Szeredi08a53cd2006-04-10 22:54:59 -0700100 int err;
101
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200102 atomic_inc(&fc->num_waiting);
Miklos Szeredi08a53cd2006-04-10 22:54:59 -0700103 block_sigs(&oldset);
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200104 intr = wait_event_interruptible(fc->blocked_waitq, !fc->blocked);
Miklos Szeredi08a53cd2006-04-10 22:54:59 -0700105 restore_sigs(&oldset);
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200106 err = -EINTR;
107 if (intr)
108 goto out;
Miklos Szeredi08a53cd2006-04-10 22:54:59 -0700109
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700110 err = -ENOTCONN;
111 if (!fc->connected)
112 goto out;
113
Miklos Szeredi08a53cd2006-04-10 22:54:59 -0700114 req = fuse_request_alloc();
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200115 err = -ENOMEM;
Miklos Szeredice1d5a42006-04-10 22:54:58 -0700116 if (!req)
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200117 goto out;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700118
Miklos Szeredi33649c92006-06-25 05:48:52 -0700119 fuse_req_init_context(req);
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200120 req->waiting = 1;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700121 return req;
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200122
123 out:
124 atomic_dec(&fc->num_waiting);
125 return ERR_PTR(err);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700126}
127
Miklos Szeredi33649c92006-06-25 05:48:52 -0700128/*
129 * Return request in fuse_file->reserved_req. However that may
130 * currently be in use. If that is the case, wait for it to become
131 * available.
132 */
133static struct fuse_req *get_reserved_req(struct fuse_conn *fc,
134 struct file *file)
135{
136 struct fuse_req *req = NULL;
137 struct fuse_file *ff = file->private_data;
138
139 do {
Miklos Szeredide5e3de2007-10-16 23:31:00 -0700140 wait_event(fc->reserved_req_waitq, ff->reserved_req);
Miklos Szeredi33649c92006-06-25 05:48:52 -0700141 spin_lock(&fc->lock);
142 if (ff->reserved_req) {
143 req = ff->reserved_req;
144 ff->reserved_req = NULL;
145 get_file(file);
146 req->stolen_file = file;
147 }
148 spin_unlock(&fc->lock);
149 } while (!req);
150
151 return req;
152}
153
154/*
155 * Put stolen request back into fuse_file->reserved_req
156 */
157static void put_reserved_req(struct fuse_conn *fc, struct fuse_req *req)
158{
159 struct file *file = req->stolen_file;
160 struct fuse_file *ff = file->private_data;
161
162 spin_lock(&fc->lock);
163 fuse_request_init(req);
164 BUG_ON(ff->reserved_req);
165 ff->reserved_req = req;
Miklos Szeredide5e3de2007-10-16 23:31:00 -0700166 wake_up_all(&fc->reserved_req_waitq);
Miklos Szeredi33649c92006-06-25 05:48:52 -0700167 spin_unlock(&fc->lock);
168 fput(file);
169}
170
171/*
172 * Gets a requests for a file operation, always succeeds
173 *
174 * This is used for sending the FLUSH request, which must get to
175 * userspace, due to POSIX locks which may need to be unlocked.
176 *
177 * If allocation fails due to OOM, use the reserved request in
178 * fuse_file.
179 *
180 * This is very unlikely to deadlock accidentally, since the
181 * filesystem should not have it's own file open. If deadlock is
182 * intentional, it can still be broken by "aborting" the filesystem.
183 */
184struct fuse_req *fuse_get_req_nofail(struct fuse_conn *fc, struct file *file)
185{
186 struct fuse_req *req;
187
188 atomic_inc(&fc->num_waiting);
189 wait_event(fc->blocked_waitq, !fc->blocked);
190 req = fuse_request_alloc();
191 if (!req)
192 req = get_reserved_req(fc, file);
193
194 fuse_req_init_context(req);
195 req->waiting = 1;
196 return req;
197}
198
Miklos Szeredi334f4852005-09-09 13:10:27 -0700199void fuse_put_request(struct fuse_conn *fc, struct fuse_req *req)
200{
Miklos Szeredi7128ec22006-02-04 23:27:40 -0800201 if (atomic_dec_and_test(&req->count)) {
Miklos Szeredi9bc5ddd2006-04-11 21:16:09 +0200202 if (req->waiting)
203 atomic_dec(&fc->num_waiting);
Miklos Szeredi33649c92006-06-25 05:48:52 -0700204
205 if (req->stolen_file)
206 put_reserved_req(fc, req);
207 else
208 fuse_request_free(req);
Miklos Szeredi7128ec22006-02-04 23:27:40 -0800209 }
210}
211
Miklos Szeredid12def12008-02-06 01:38:39 -0800212static unsigned len_args(unsigned numargs, struct fuse_arg *args)
213{
214 unsigned nbytes = 0;
215 unsigned i;
216
217 for (i = 0; i < numargs; i++)
218 nbytes += args[i].size;
219
220 return nbytes;
221}
222
223static u64 fuse_get_unique(struct fuse_conn *fc)
224{
225 fc->reqctr++;
226 /* zero is special */
227 if (fc->reqctr == 0)
228 fc->reqctr = 1;
229
230 return fc->reqctr;
231}
232
233static void queue_request(struct fuse_conn *fc, struct fuse_req *req)
234{
235 req->in.h.unique = fuse_get_unique(fc);
236 req->in.h.len = sizeof(struct fuse_in_header) +
237 len_args(req->in.numargs, (struct fuse_arg *) req->in.args);
238 list_add_tail(&req->list, &fc->pending);
239 req->state = FUSE_REQ_PENDING;
240 if (!req->waiting) {
241 req->waiting = 1;
242 atomic_inc(&fc->num_waiting);
243 }
244 wake_up(&fc->waitq);
245 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
246}
247
248static void flush_bg_queue(struct fuse_conn *fc)
249{
250 while (fc->active_background < FUSE_MAX_BACKGROUND &&
251 !list_empty(&fc->bg_queue)) {
252 struct fuse_req *req;
253
254 req = list_entry(fc->bg_queue.next, struct fuse_req, list);
255 list_del(&req->list);
256 fc->active_background++;
257 queue_request(fc, req);
258 }
259}
260
Miklos Szeredi6dbbcb12006-04-26 10:49:06 +0200261/*
Miklos Szeredi334f4852005-09-09 13:10:27 -0700262 * This function is called when a request is finished. Either a reply
Miklos Szeredif9a28422006-06-25 05:48:53 -0700263 * has arrived or it was aborted (and not yet sent) or some error
Miklos Szeredif43b1552006-01-16 22:14:26 -0800264 * occurred during communication with userspace, or the device file
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700265 * was closed. The requester thread is woken up (if still waiting),
266 * the 'end' callback is called if given, else the reference to the
267 * request is released
Miklos Szeredi7128ec22006-02-04 23:27:40 -0800268 *
Miklos Szeredid7133112006-04-10 22:54:55 -0700269 * Called with fc->lock, unlocks it
Miklos Szeredi334f4852005-09-09 13:10:27 -0700270 */
271static void request_end(struct fuse_conn *fc, struct fuse_req *req)
Harvey Harrison5d9ec852008-12-02 14:49:42 +0100272__releases(&fc->lock)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700273{
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700274 void (*end) (struct fuse_conn *, struct fuse_req *) = req->end;
275 req->end = NULL;
Miklos Szeredid77a1d52006-01-16 22:14:31 -0800276 list_del(&req->list);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700277 list_del(&req->intr_entry);
Miklos Szeredi83cfd492006-01-16 22:14:31 -0800278 req->state = FUSE_REQ_FINISHED;
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700279 if (req->background) {
280 if (fc->num_background == FUSE_MAX_BACKGROUND) {
281 fc->blocked = 0;
282 wake_up_all(&fc->blocked_waitq);
283 }
Miklos Szeredi26c36792009-01-26 15:00:59 +0100284 if (fc->num_background == FUSE_CONGESTION_THRESHOLD &&
Tejun Heoa325f9b2009-04-14 10:54:52 +0900285 fc->connected && fc->bdi_initialized) {
Miklos Szeredif92b99b2007-10-16 23:30:59 -0700286 clear_bdi_congested(&fc->bdi, READ);
287 clear_bdi_congested(&fc->bdi, WRITE);
288 }
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700289 fc->num_background--;
Miklos Szeredid12def12008-02-06 01:38:39 -0800290 fc->active_background--;
291 flush_bg_queue(fc);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700292 }
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700293 spin_unlock(&fc->lock);
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700294 wake_up(&req->waitq);
295 if (end)
296 end(fc, req);
Tejun Heoe9bb09d2008-11-26 12:03:54 +0100297 fuse_put_request(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700298}
299
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700300static void wait_answer_interruptible(struct fuse_conn *fc,
301 struct fuse_req *req)
Harvey Harrison5d9ec852008-12-02 14:49:42 +0100302__releases(&fc->lock)
303__acquires(&fc->lock)
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700304{
305 if (signal_pending(current))
306 return;
307
308 spin_unlock(&fc->lock);
309 wait_event_interruptible(req->waitq, req->state == FUSE_REQ_FINISHED);
310 spin_lock(&fc->lock);
311}
312
313static void queue_interrupt(struct fuse_conn *fc, struct fuse_req *req)
314{
315 list_add_tail(&req->intr_entry, &fc->interrupts);
316 wake_up(&fc->waitq);
317 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
318}
319
Miklos Szeredi7c352bd2005-09-09 13:10:39 -0700320static void request_wait_answer(struct fuse_conn *fc, struct fuse_req *req)
Harvey Harrison5d9ec852008-12-02 14:49:42 +0100321__releases(&fc->lock)
322__acquires(&fc->lock)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700323{
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700324 if (!fc->no_interrupt) {
325 /* Any signal may interrupt this */
326 wait_answer_interruptible(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700327
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700328 if (req->aborted)
329 goto aborted;
330 if (req->state == FUSE_REQ_FINISHED)
331 return;
332
333 req->interrupted = 1;
334 if (req->state == FUSE_REQ_SENT)
335 queue_interrupt(fc, req);
336 }
337
Miklos Szeredia131de02007-10-16 23:31:04 -0700338 if (!req->force) {
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700339 sigset_t oldset;
340
341 /* Only fatal signals may interrupt this */
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700342 block_sigs(&oldset);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700343 wait_answer_interruptible(fc, req);
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700344 restore_sigs(&oldset);
Miklos Szeredia131de02007-10-16 23:31:04 -0700345
346 if (req->aborted)
347 goto aborted;
348 if (req->state == FUSE_REQ_FINISHED)
349 return;
350
351 /* Request is not yet in userspace, bail out */
352 if (req->state == FUSE_REQ_PENDING) {
353 list_del(&req->list);
354 __fuse_put_request(req);
355 req->out.h.error = -EINTR;
356 return;
357 }
Miklos Szeredi51eb01e2006-06-25 05:48:50 -0700358 }
Miklos Szeredi334f4852005-09-09 13:10:27 -0700359
Miklos Szeredia131de02007-10-16 23:31:04 -0700360 /*
361 * Either request is already in userspace, or it was forced.
362 * Wait it out.
363 */
364 spin_unlock(&fc->lock);
365 wait_event(req->waitq, req->state == FUSE_REQ_FINISHED);
366 spin_lock(&fc->lock);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700367
Miklos Szeredia131de02007-10-16 23:31:04 -0700368 if (!req->aborted)
369 return;
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700370
371 aborted:
Miklos Szeredia131de02007-10-16 23:31:04 -0700372 BUG_ON(req->state != FUSE_REQ_FINISHED);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700373 if (req->locked) {
374 /* This is uninterruptible sleep, because data is
375 being copied to/from the buffers of req. During
376 locked state, there mustn't be any filesystem
377 operation (e.g. page fault), since that could lead
378 to deadlock */
Miklos Szeredid7133112006-04-10 22:54:55 -0700379 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700380 wait_event(req->waitq, !req->locked);
Miklos Szeredid7133112006-04-10 22:54:55 -0700381 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700382 }
Miklos Szeredi334f4852005-09-09 13:10:27 -0700383}
384
Tejun Heob93f8582008-11-26 12:03:55 +0100385void fuse_request_send(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700386{
387 req->isreply = 1;
Miklos Szeredid7133112006-04-10 22:54:55 -0700388 spin_lock(&fc->lock);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -0700389 if (!fc->connected)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700390 req->out.h.error = -ENOTCONN;
391 else if (fc->conn_error)
392 req->out.h.error = -ECONNREFUSED;
393 else {
394 queue_request(fc, req);
395 /* acquire extra reference, since request is still needed
396 after request_end() */
397 __fuse_get_request(req);
398
Miklos Szeredi7c352bd2005-09-09 13:10:39 -0700399 request_wait_answer(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700400 }
Miklos Szeredid7133112006-04-10 22:54:55 -0700401 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700402}
403
Tejun Heob93f8582008-11-26 12:03:55 +0100404static void fuse_request_send_nowait_locked(struct fuse_conn *fc,
405 struct fuse_req *req)
Miklos Szeredid12def12008-02-06 01:38:39 -0800406{
407 req->background = 1;
408 fc->num_background++;
409 if (fc->num_background == FUSE_MAX_BACKGROUND)
410 fc->blocked = 1;
Tejun Heoa325f9b2009-04-14 10:54:52 +0900411 if (fc->num_background == FUSE_CONGESTION_THRESHOLD &&
412 fc->bdi_initialized) {
Miklos Szeredid12def12008-02-06 01:38:39 -0800413 set_bdi_congested(&fc->bdi, READ);
414 set_bdi_congested(&fc->bdi, WRITE);
415 }
416 list_add_tail(&req->list, &fc->bg_queue);
417 flush_bg_queue(fc);
418}
419
Tejun Heob93f8582008-11-26 12:03:55 +0100420static void fuse_request_send_nowait(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700421{
Miklos Szeredid7133112006-04-10 22:54:55 -0700422 spin_lock(&fc->lock);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -0700423 if (fc->connected) {
Tejun Heob93f8582008-11-26 12:03:55 +0100424 fuse_request_send_nowait_locked(fc, req);
Miklos Szeredid7133112006-04-10 22:54:55 -0700425 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700426 } else {
427 req->out.h.error = -ENOTCONN;
428 request_end(fc, req);
429 }
430}
431
Tejun Heob93f8582008-11-26 12:03:55 +0100432void fuse_request_send_noreply(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700433{
434 req->isreply = 0;
Tejun Heob93f8582008-11-26 12:03:55 +0100435 fuse_request_send_nowait(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700436}
437
Tejun Heob93f8582008-11-26 12:03:55 +0100438void fuse_request_send_background(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700439{
440 req->isreply = 1;
Tejun Heob93f8582008-11-26 12:03:55 +0100441 fuse_request_send_nowait(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700442}
443
Miklos Szeredi334f4852005-09-09 13:10:27 -0700444/*
Miklos Szeredi3be5a522008-04-30 00:54:41 -0700445 * Called under fc->lock
446 *
447 * fc->connected must have been checked previously
448 */
Tejun Heob93f8582008-11-26 12:03:55 +0100449void fuse_request_send_background_locked(struct fuse_conn *fc,
450 struct fuse_req *req)
Miklos Szeredi3be5a522008-04-30 00:54:41 -0700451{
452 req->isreply = 1;
Tejun Heob93f8582008-11-26 12:03:55 +0100453 fuse_request_send_nowait_locked(fc, req);
Miklos Szeredi3be5a522008-04-30 00:54:41 -0700454}
455
456/*
Miklos Szeredi334f4852005-09-09 13:10:27 -0700457 * Lock the request. Up to the next unlock_request() there mustn't be
458 * anything that could cause a page-fault. If the request was already
Miklos Szeredif9a28422006-06-25 05:48:53 -0700459 * aborted bail out.
Miklos Szeredi334f4852005-09-09 13:10:27 -0700460 */
Miklos Szeredid7133112006-04-10 22:54:55 -0700461static int lock_request(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700462{
463 int err = 0;
464 if (req) {
Miklos Szeredid7133112006-04-10 22:54:55 -0700465 spin_lock(&fc->lock);
Miklos Szeredif9a28422006-06-25 05:48:53 -0700466 if (req->aborted)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700467 err = -ENOENT;
468 else
469 req->locked = 1;
Miklos Szeredid7133112006-04-10 22:54:55 -0700470 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700471 }
472 return err;
473}
474
475/*
Miklos Szeredif9a28422006-06-25 05:48:53 -0700476 * Unlock request. If it was aborted during being locked, the
Miklos Szeredi334f4852005-09-09 13:10:27 -0700477 * requester thread is currently waiting for it to be unlocked, so
478 * wake it up.
479 */
Miklos Szeredid7133112006-04-10 22:54:55 -0700480static void unlock_request(struct fuse_conn *fc, struct fuse_req *req)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700481{
482 if (req) {
Miklos Szeredid7133112006-04-10 22:54:55 -0700483 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700484 req->locked = 0;
Miklos Szeredif9a28422006-06-25 05:48:53 -0700485 if (req->aborted)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700486 wake_up(&req->waitq);
Miklos Szeredid7133112006-04-10 22:54:55 -0700487 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700488 }
489}
490
491struct fuse_copy_state {
Miklos Szeredid7133112006-04-10 22:54:55 -0700492 struct fuse_conn *fc;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700493 int write;
494 struct fuse_req *req;
495 const struct iovec *iov;
496 unsigned long nr_segs;
497 unsigned long seglen;
498 unsigned long addr;
499 struct page *pg;
500 void *mapaddr;
501 void *buf;
502 unsigned len;
503};
504
Miklos Szeredid7133112006-04-10 22:54:55 -0700505static void fuse_copy_init(struct fuse_copy_state *cs, struct fuse_conn *fc,
506 int write, struct fuse_req *req,
507 const struct iovec *iov, unsigned long nr_segs)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700508{
509 memset(cs, 0, sizeof(*cs));
Miklos Szeredid7133112006-04-10 22:54:55 -0700510 cs->fc = fc;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700511 cs->write = write;
512 cs->req = req;
513 cs->iov = iov;
514 cs->nr_segs = nr_segs;
515}
516
517/* Unmap and put previous page of userspace buffer */
Miklos Szeredi8bfc0162006-01-16 22:14:28 -0800518static void fuse_copy_finish(struct fuse_copy_state *cs)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700519{
520 if (cs->mapaddr) {
521 kunmap_atomic(cs->mapaddr, KM_USER0);
522 if (cs->write) {
523 flush_dcache_page(cs->pg);
524 set_page_dirty_lock(cs->pg);
525 }
526 put_page(cs->pg);
527 cs->mapaddr = NULL;
528 }
529}
530
531/*
532 * Get another pagefull of userspace buffer, and map it to kernel
533 * address space, and lock request
534 */
535static int fuse_copy_fill(struct fuse_copy_state *cs)
536{
537 unsigned long offset;
538 int err;
539
Miklos Szeredid7133112006-04-10 22:54:55 -0700540 unlock_request(cs->fc, cs->req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700541 fuse_copy_finish(cs);
542 if (!cs->seglen) {
543 BUG_ON(!cs->nr_segs);
544 cs->seglen = cs->iov[0].iov_len;
545 cs->addr = (unsigned long) cs->iov[0].iov_base;
Miklos Szeredi1729a162008-11-26 12:03:54 +0100546 cs->iov++;
547 cs->nr_segs--;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700548 }
549 down_read(&current->mm->mmap_sem);
550 err = get_user_pages(current, current->mm, cs->addr, 1, cs->write, 0,
551 &cs->pg, NULL);
552 up_read(&current->mm->mmap_sem);
553 if (err < 0)
554 return err;
555 BUG_ON(err != 1);
556 offset = cs->addr % PAGE_SIZE;
557 cs->mapaddr = kmap_atomic(cs->pg, KM_USER0);
558 cs->buf = cs->mapaddr + offset;
559 cs->len = min(PAGE_SIZE - offset, cs->seglen);
560 cs->seglen -= cs->len;
561 cs->addr += cs->len;
562
Miklos Szeredid7133112006-04-10 22:54:55 -0700563 return lock_request(cs->fc, cs->req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700564}
565
566/* Do as much copy to/from userspace buffer as we can */
Miklos Szeredi8bfc0162006-01-16 22:14:28 -0800567static int fuse_copy_do(struct fuse_copy_state *cs, void **val, unsigned *size)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700568{
569 unsigned ncpy = min(*size, cs->len);
570 if (val) {
571 if (cs->write)
572 memcpy(cs->buf, *val, ncpy);
573 else
574 memcpy(*val, cs->buf, ncpy);
575 *val += ncpy;
576 }
577 *size -= ncpy;
578 cs->len -= ncpy;
579 cs->buf += ncpy;
580 return ncpy;
581}
582
583/*
584 * Copy a page in the request to/from the userspace buffer. Must be
585 * done atomically
586 */
Miklos Szeredi8bfc0162006-01-16 22:14:28 -0800587static int fuse_copy_page(struct fuse_copy_state *cs, struct page *page,
588 unsigned offset, unsigned count, int zeroing)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700589{
590 if (page && zeroing && count < PAGE_SIZE) {
591 void *mapaddr = kmap_atomic(page, KM_USER1);
592 memset(mapaddr, 0, PAGE_SIZE);
593 kunmap_atomic(mapaddr, KM_USER1);
594 }
595 while (count) {
Miklos Szeredi1729a162008-11-26 12:03:54 +0100596 if (!cs->len) {
597 int err = fuse_copy_fill(cs);
598 if (err)
599 return err;
600 }
Miklos Szeredi334f4852005-09-09 13:10:27 -0700601 if (page) {
602 void *mapaddr = kmap_atomic(page, KM_USER1);
603 void *buf = mapaddr + offset;
604 offset += fuse_copy_do(cs, &buf, &count);
605 kunmap_atomic(mapaddr, KM_USER1);
606 } else
607 offset += fuse_copy_do(cs, NULL, &count);
608 }
609 if (page && !cs->write)
610 flush_dcache_page(page);
611 return 0;
612}
613
614/* Copy pages in the request to/from userspace buffer */
615static int fuse_copy_pages(struct fuse_copy_state *cs, unsigned nbytes,
616 int zeroing)
617{
618 unsigned i;
619 struct fuse_req *req = cs->req;
620 unsigned offset = req->page_offset;
621 unsigned count = min(nbytes, (unsigned) PAGE_SIZE - offset);
622
623 for (i = 0; i < req->num_pages && (nbytes || zeroing); i++) {
624 struct page *page = req->pages[i];
625 int err = fuse_copy_page(cs, page, offset, count, zeroing);
626 if (err)
627 return err;
628
629 nbytes -= count;
630 count = min(nbytes, (unsigned) PAGE_SIZE);
631 offset = 0;
632 }
633 return 0;
634}
635
636/* Copy a single argument in the request to/from userspace buffer */
637static int fuse_copy_one(struct fuse_copy_state *cs, void *val, unsigned size)
638{
639 while (size) {
Miklos Szeredi1729a162008-11-26 12:03:54 +0100640 if (!cs->len) {
641 int err = fuse_copy_fill(cs);
642 if (err)
643 return err;
644 }
Miklos Szeredi334f4852005-09-09 13:10:27 -0700645 fuse_copy_do(cs, &val, &size);
646 }
647 return 0;
648}
649
650/* Copy request arguments to/from userspace buffer */
651static int fuse_copy_args(struct fuse_copy_state *cs, unsigned numargs,
652 unsigned argpages, struct fuse_arg *args,
653 int zeroing)
654{
655 int err = 0;
656 unsigned i;
657
658 for (i = 0; !err && i < numargs; i++) {
659 struct fuse_arg *arg = &args[i];
660 if (i == numargs - 1 && argpages)
661 err = fuse_copy_pages(cs, arg->size, zeroing);
662 else
663 err = fuse_copy_one(cs, arg->value, arg->size);
664 }
665 return err;
666}
667
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700668static int request_pending(struct fuse_conn *fc)
669{
670 return !list_empty(&fc->pending) || !list_empty(&fc->interrupts);
671}
672
Miklos Szeredi334f4852005-09-09 13:10:27 -0700673/* Wait until a request is available on the pending list */
674static void request_wait(struct fuse_conn *fc)
Harvey Harrison5d9ec852008-12-02 14:49:42 +0100675__releases(&fc->lock)
676__acquires(&fc->lock)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700677{
678 DECLARE_WAITQUEUE(wait, current);
679
680 add_wait_queue_exclusive(&fc->waitq, &wait);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700681 while (fc->connected && !request_pending(fc)) {
Miklos Szeredi334f4852005-09-09 13:10:27 -0700682 set_current_state(TASK_INTERRUPTIBLE);
683 if (signal_pending(current))
684 break;
685
Miklos Szeredid7133112006-04-10 22:54:55 -0700686 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700687 schedule();
Miklos Szeredid7133112006-04-10 22:54:55 -0700688 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700689 }
690 set_current_state(TASK_RUNNING);
691 remove_wait_queue(&fc->waitq, &wait);
692}
693
694/*
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700695 * Transfer an interrupt request to userspace
696 *
697 * Unlike other requests this is assembled on demand, without a need
698 * to allocate a separate fuse_req structure.
699 *
700 * Called with fc->lock held, releases it
701 */
702static int fuse_read_interrupt(struct fuse_conn *fc, struct fuse_req *req,
703 const struct iovec *iov, unsigned long nr_segs)
Harvey Harrison5d9ec852008-12-02 14:49:42 +0100704__releases(&fc->lock)
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700705{
706 struct fuse_copy_state cs;
707 struct fuse_in_header ih;
708 struct fuse_interrupt_in arg;
709 unsigned reqsize = sizeof(ih) + sizeof(arg);
710 int err;
711
712 list_del_init(&req->intr_entry);
713 req->intr_unique = fuse_get_unique(fc);
714 memset(&ih, 0, sizeof(ih));
715 memset(&arg, 0, sizeof(arg));
716 ih.len = reqsize;
717 ih.opcode = FUSE_INTERRUPT;
718 ih.unique = req->intr_unique;
719 arg.unique = req->in.h.unique;
720
721 spin_unlock(&fc->lock);
722 if (iov_length(iov, nr_segs) < reqsize)
723 return -EINVAL;
724
725 fuse_copy_init(&cs, fc, 1, NULL, iov, nr_segs);
726 err = fuse_copy_one(&cs, &ih, sizeof(ih));
727 if (!err)
728 err = fuse_copy_one(&cs, &arg, sizeof(arg));
729 fuse_copy_finish(&cs);
730
731 return err ? err : reqsize;
732}
733
734/*
Miklos Szeredi334f4852005-09-09 13:10:27 -0700735 * Read a single request into the userspace filesystem's buffer. This
736 * function waits until a request is available, then removes it from
737 * the pending list and copies request data to userspace buffer. If
Miklos Szeredif9a28422006-06-25 05:48:53 -0700738 * no reply is needed (FORGET) or request has been aborted or there
739 * was an error during the copying then it's finished by calling
Miklos Szeredi334f4852005-09-09 13:10:27 -0700740 * request_end(). Otherwise add it to the processing list, and set
741 * the 'sent' flag.
742 */
Badari Pulavartyee0b3e62006-09-30 23:28:47 -0700743static ssize_t fuse_dev_read(struct kiocb *iocb, const struct iovec *iov,
744 unsigned long nr_segs, loff_t pos)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700745{
746 int err;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700747 struct fuse_req *req;
748 struct fuse_in *in;
749 struct fuse_copy_state cs;
750 unsigned reqsize;
Badari Pulavartyee0b3e62006-09-30 23:28:47 -0700751 struct file *file = iocb->ki_filp;
Miklos Szeredi0720b312006-04-10 22:54:55 -0700752 struct fuse_conn *fc = fuse_get_conn(file);
753 if (!fc)
754 return -EPERM;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700755
Miklos Szeredi1d3d7522006-01-06 00:19:40 -0800756 restart:
Miklos Szeredid7133112006-04-10 22:54:55 -0700757 spin_lock(&fc->lock);
Jeff Dikee5ac1d12006-04-10 22:54:53 -0700758 err = -EAGAIN;
759 if ((file->f_flags & O_NONBLOCK) && fc->connected &&
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700760 !request_pending(fc))
Jeff Dikee5ac1d12006-04-10 22:54:53 -0700761 goto err_unlock;
762
Miklos Szeredi334f4852005-09-09 13:10:27 -0700763 request_wait(fc);
764 err = -ENODEV;
Miklos Szeredi9ba7cbb2006-01-16 22:14:34 -0800765 if (!fc->connected)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700766 goto err_unlock;
767 err = -ERESTARTSYS;
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700768 if (!request_pending(fc))
Miklos Szeredi334f4852005-09-09 13:10:27 -0700769 goto err_unlock;
770
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700771 if (!list_empty(&fc->interrupts)) {
772 req = list_entry(fc->interrupts.next, struct fuse_req,
773 intr_entry);
774 return fuse_read_interrupt(fc, req, iov, nr_segs);
775 }
776
Miklos Szeredi334f4852005-09-09 13:10:27 -0700777 req = list_entry(fc->pending.next, struct fuse_req, list);
Miklos Szeredi83cfd492006-01-16 22:14:31 -0800778 req->state = FUSE_REQ_READING;
Miklos Szeredid77a1d52006-01-16 22:14:31 -0800779 list_move(&req->list, &fc->io);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700780
781 in = &req->in;
Miklos Szeredi1d3d7522006-01-06 00:19:40 -0800782 reqsize = in->h.len;
783 /* If request is too large, reply with an error and restart the read */
784 if (iov_length(iov, nr_segs) < reqsize) {
785 req->out.h.error = -EIO;
786 /* SETXATTR is special, since it may contain too large data */
787 if (in->h.opcode == FUSE_SETXATTR)
788 req->out.h.error = -E2BIG;
789 request_end(fc, req);
790 goto restart;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700791 }
Miklos Szeredid7133112006-04-10 22:54:55 -0700792 spin_unlock(&fc->lock);
793 fuse_copy_init(&cs, fc, 1, req, iov, nr_segs);
Miklos Szeredi1d3d7522006-01-06 00:19:40 -0800794 err = fuse_copy_one(&cs, &in->h, sizeof(in->h));
795 if (!err)
796 err = fuse_copy_args(&cs, in->numargs, in->argpages,
797 (struct fuse_arg *) in->args, 0);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700798 fuse_copy_finish(&cs);
Miklos Szeredid7133112006-04-10 22:54:55 -0700799 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700800 req->locked = 0;
Miklos Szeredic9c9d7d2007-10-16 23:31:05 -0700801 if (req->aborted) {
802 request_end(fc, req);
803 return -ENODEV;
804 }
Miklos Szeredi334f4852005-09-09 13:10:27 -0700805 if (err) {
Miklos Szeredic9c9d7d2007-10-16 23:31:05 -0700806 req->out.h.error = -EIO;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700807 request_end(fc, req);
808 return err;
809 }
810 if (!req->isreply)
811 request_end(fc, req);
812 else {
Miklos Szeredi83cfd492006-01-16 22:14:31 -0800813 req->state = FUSE_REQ_SENT;
Miklos Szeredid77a1d52006-01-16 22:14:31 -0800814 list_move_tail(&req->list, &fc->processing);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700815 if (req->interrupted)
816 queue_interrupt(fc, req);
Miklos Szeredid7133112006-04-10 22:54:55 -0700817 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700818 }
819 return reqsize;
820
821 err_unlock:
Miklos Szeredid7133112006-04-10 22:54:55 -0700822 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700823 return err;
824}
825
Tejun Heo95668a62008-11-26 12:03:55 +0100826static int fuse_notify_poll(struct fuse_conn *fc, unsigned int size,
827 struct fuse_copy_state *cs)
828{
829 struct fuse_notify_poll_wakeup_out outarg;
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100830 int err = -EINVAL;
Tejun Heo95668a62008-11-26 12:03:55 +0100831
832 if (size != sizeof(outarg))
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100833 goto err;
Tejun Heo95668a62008-11-26 12:03:55 +0100834
835 err = fuse_copy_one(cs, &outarg, sizeof(outarg));
836 if (err)
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100837 goto err;
Tejun Heo95668a62008-11-26 12:03:55 +0100838
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100839 fuse_copy_finish(cs);
Tejun Heo95668a62008-11-26 12:03:55 +0100840 return fuse_notify_poll_wakeup(fc, &outarg);
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100841
842err:
843 fuse_copy_finish(cs);
844 return err;
Tejun Heo95668a62008-11-26 12:03:55 +0100845}
846
Tejun Heo85993962008-11-26 12:03:55 +0100847static int fuse_notify(struct fuse_conn *fc, enum fuse_notify_code code,
848 unsigned int size, struct fuse_copy_state *cs)
849{
850 switch (code) {
Tejun Heo95668a62008-11-26 12:03:55 +0100851 case FUSE_NOTIFY_POLL:
852 return fuse_notify_poll(fc, size, cs);
853
Tejun Heo85993962008-11-26 12:03:55 +0100854 default:
Miklos Szeredif6d47a12009-01-26 15:00:59 +0100855 fuse_copy_finish(cs);
Tejun Heo85993962008-11-26 12:03:55 +0100856 return -EINVAL;
857 }
858}
859
Miklos Szeredi334f4852005-09-09 13:10:27 -0700860/* Look up request on processing list by unique ID */
861static struct fuse_req *request_find(struct fuse_conn *fc, u64 unique)
862{
863 struct list_head *entry;
864
865 list_for_each(entry, &fc->processing) {
866 struct fuse_req *req;
867 req = list_entry(entry, struct fuse_req, list);
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700868 if (req->in.h.unique == unique || req->intr_unique == unique)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700869 return req;
870 }
871 return NULL;
872}
873
874static int copy_out_args(struct fuse_copy_state *cs, struct fuse_out *out,
875 unsigned nbytes)
876{
877 unsigned reqsize = sizeof(struct fuse_out_header);
878
879 if (out->h.error)
880 return nbytes != reqsize ? -EINVAL : 0;
881
882 reqsize += len_args(out->numargs, out->args);
883
884 if (reqsize < nbytes || (reqsize > nbytes && !out->argvar))
885 return -EINVAL;
886 else if (reqsize > nbytes) {
887 struct fuse_arg *lastarg = &out->args[out->numargs-1];
888 unsigned diffsize = reqsize - nbytes;
889 if (diffsize > lastarg->size)
890 return -EINVAL;
891 lastarg->size -= diffsize;
892 }
893 return fuse_copy_args(cs, out->numargs, out->argpages, out->args,
894 out->page_zeroing);
895}
896
897/*
898 * Write a single reply to a request. First the header is copied from
899 * the write buffer. The request is then searched on the processing
900 * list by the unique ID found in the header. If found, then remove
901 * it from the list and copy the rest of the buffer to the request.
902 * The request is finished by calling request_end()
903 */
Badari Pulavartyee0b3e62006-09-30 23:28:47 -0700904static ssize_t fuse_dev_write(struct kiocb *iocb, const struct iovec *iov,
905 unsigned long nr_segs, loff_t pos)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700906{
907 int err;
908 unsigned nbytes = iov_length(iov, nr_segs);
909 struct fuse_req *req;
910 struct fuse_out_header oh;
911 struct fuse_copy_state cs;
Badari Pulavartyee0b3e62006-09-30 23:28:47 -0700912 struct fuse_conn *fc = fuse_get_conn(iocb->ki_filp);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700913 if (!fc)
Miklos Szeredia87046d2006-04-10 22:54:56 -0700914 return -EPERM;
Miklos Szeredi334f4852005-09-09 13:10:27 -0700915
Miklos Szeredid7133112006-04-10 22:54:55 -0700916 fuse_copy_init(&cs, fc, 0, NULL, iov, nr_segs);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700917 if (nbytes < sizeof(struct fuse_out_header))
918 return -EINVAL;
919
920 err = fuse_copy_one(&cs, &oh, sizeof(oh));
921 if (err)
922 goto err_finish;
Tejun Heo85993962008-11-26 12:03:55 +0100923
Miklos Szeredi334f4852005-09-09 13:10:27 -0700924 err = -EINVAL;
Tejun Heo85993962008-11-26 12:03:55 +0100925 if (oh.len != nbytes)
926 goto err_finish;
927
928 /*
929 * Zero oh.unique indicates unsolicited notification message
930 * and error contains notification code.
931 */
932 if (!oh.unique) {
933 err = fuse_notify(fc, oh.error, nbytes - sizeof(oh), &cs);
Tejun Heo85993962008-11-26 12:03:55 +0100934 return err ? err : nbytes;
935 }
936
937 err = -EINVAL;
938 if (oh.error <= -1000 || oh.error > 0)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700939 goto err_finish;
940
Miklos Szeredid7133112006-04-10 22:54:55 -0700941 spin_lock(&fc->lock);
Miklos Szeredi69a53bf2006-01-16 22:14:41 -0800942 err = -ENOENT;
943 if (!fc->connected)
944 goto err_unlock;
945
Miklos Szeredi334f4852005-09-09 13:10:27 -0700946 req = request_find(fc, oh.unique);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700947 if (!req)
948 goto err_unlock;
949
Miklos Szeredif9a28422006-06-25 05:48:53 -0700950 if (req->aborted) {
Miklos Szeredid7133112006-04-10 22:54:55 -0700951 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700952 fuse_copy_finish(&cs);
Miklos Szeredid7133112006-04-10 22:54:55 -0700953 spin_lock(&fc->lock);
Miklos Szeredi222f1d62006-01-16 22:14:25 -0800954 request_end(fc, req);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700955 return -ENOENT;
956 }
Miklos Szeredia4d27e72006-06-25 05:48:54 -0700957 /* Is it an interrupt reply? */
958 if (req->intr_unique == oh.unique) {
959 err = -EINVAL;
960 if (nbytes != sizeof(struct fuse_out_header))
961 goto err_unlock;
962
963 if (oh.error == -ENOSYS)
964 fc->no_interrupt = 1;
965 else if (oh.error == -EAGAIN)
966 queue_interrupt(fc, req);
967
968 spin_unlock(&fc->lock);
969 fuse_copy_finish(&cs);
970 return nbytes;
971 }
972
973 req->state = FUSE_REQ_WRITING;
Miklos Szeredid77a1d52006-01-16 22:14:31 -0800974 list_move(&req->list, &fc->io);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700975 req->out.h = oh;
976 req->locked = 1;
977 cs.req = req;
Miklos Szeredid7133112006-04-10 22:54:55 -0700978 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700979
980 err = copy_out_args(&cs, &req->out, nbytes);
981 fuse_copy_finish(&cs);
982
Miklos Szeredid7133112006-04-10 22:54:55 -0700983 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700984 req->locked = 0;
985 if (!err) {
Miklos Szeredif9a28422006-06-25 05:48:53 -0700986 if (req->aborted)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700987 err = -ENOENT;
Miklos Szeredif9a28422006-06-25 05:48:53 -0700988 } else if (!req->aborted)
Miklos Szeredi334f4852005-09-09 13:10:27 -0700989 req->out.h.error = -EIO;
990 request_end(fc, req);
991
992 return err ? err : nbytes;
993
994 err_unlock:
Miklos Szeredid7133112006-04-10 22:54:55 -0700995 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -0700996 err_finish:
997 fuse_copy_finish(&cs);
998 return err;
999}
1000
Miklos Szeredi334f4852005-09-09 13:10:27 -07001001static unsigned fuse_dev_poll(struct file *file, poll_table *wait)
1002{
Miklos Szeredi334f4852005-09-09 13:10:27 -07001003 unsigned mask = POLLOUT | POLLWRNORM;
Miklos Szeredi7025d9a2006-04-10 22:54:50 -07001004 struct fuse_conn *fc = fuse_get_conn(file);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001005 if (!fc)
Miklos Szeredi7025d9a2006-04-10 22:54:50 -07001006 return POLLERR;
Miklos Szeredi334f4852005-09-09 13:10:27 -07001007
1008 poll_wait(file, &fc->waitq, wait);
1009
Miklos Szeredid7133112006-04-10 22:54:55 -07001010 spin_lock(&fc->lock);
Miklos Szeredi7025d9a2006-04-10 22:54:50 -07001011 if (!fc->connected)
1012 mask = POLLERR;
Miklos Szeredia4d27e72006-06-25 05:48:54 -07001013 else if (request_pending(fc))
Miklos Szeredi7025d9a2006-04-10 22:54:50 -07001014 mask |= POLLIN | POLLRDNORM;
Miklos Szeredid7133112006-04-10 22:54:55 -07001015 spin_unlock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001016
1017 return mask;
1018}
1019
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001020/*
1021 * Abort all requests on the given list (pending or processing)
1022 *
Miklos Szeredid7133112006-04-10 22:54:55 -07001023 * This function releases and reacquires fc->lock
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001024 */
Miklos Szeredi334f4852005-09-09 13:10:27 -07001025static void end_requests(struct fuse_conn *fc, struct list_head *head)
Harvey Harrison5d9ec852008-12-02 14:49:42 +01001026__releases(&fc->lock)
1027__acquires(&fc->lock)
Miklos Szeredi334f4852005-09-09 13:10:27 -07001028{
1029 while (!list_empty(head)) {
1030 struct fuse_req *req;
1031 req = list_entry(head->next, struct fuse_req, list);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001032 req->out.h.error = -ECONNABORTED;
1033 request_end(fc, req);
Miklos Szeredid7133112006-04-10 22:54:55 -07001034 spin_lock(&fc->lock);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001035 }
1036}
1037
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001038/*
1039 * Abort requests under I/O
1040 *
Miklos Szeredif9a28422006-06-25 05:48:53 -07001041 * The requests are set to aborted and finished, and the request
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001042 * waiter is woken up. This will make request_wait_answer() wait
1043 * until the request is unlocked and then return.
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001044 *
1045 * If the request is asynchronous, then the end function needs to be
1046 * called after waiting for the request to be unlocked (if it was
1047 * locked).
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001048 */
1049static void end_io_requests(struct fuse_conn *fc)
Harvey Harrison5d9ec852008-12-02 14:49:42 +01001050__releases(&fc->lock)
1051__acquires(&fc->lock)
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001052{
1053 while (!list_empty(&fc->io)) {
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001054 struct fuse_req *req =
1055 list_entry(fc->io.next, struct fuse_req, list);
1056 void (*end) (struct fuse_conn *, struct fuse_req *) = req->end;
1057
Miklos Szeredif9a28422006-06-25 05:48:53 -07001058 req->aborted = 1;
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001059 req->out.h.error = -ECONNABORTED;
1060 req->state = FUSE_REQ_FINISHED;
1061 list_del_init(&req->list);
1062 wake_up(&req->waitq);
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001063 if (end) {
1064 req->end = NULL;
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001065 __fuse_get_request(req);
Miklos Szeredid7133112006-04-10 22:54:55 -07001066 spin_unlock(&fc->lock);
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001067 wait_event(req->waitq, !req->locked);
1068 end(fc, req);
Tejun Heoe9bb09d2008-11-26 12:03:54 +01001069 fuse_put_request(fc, req);
Miklos Szeredid7133112006-04-10 22:54:55 -07001070 spin_lock(&fc->lock);
Miklos Szeredi64c6d8e2006-01-16 22:14:42 -08001071 }
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001072 }
1073}
1074
1075/*
1076 * Abort all requests.
1077 *
1078 * Emergency exit in case of a malicious or accidental deadlock, or
1079 * just a hung filesystem.
1080 *
1081 * The same effect is usually achievable through killing the
1082 * filesystem daemon and all users of the filesystem. The exception
1083 * is the combination of an asynchronous request and the tricky
1084 * deadlock (see Documentation/filesystems/fuse.txt).
1085 *
1086 * During the aborting, progression of requests from the pending and
1087 * processing lists onto the io list, and progression of new requests
1088 * onto the pending list is prevented by req->connected being false.
1089 *
1090 * Progression of requests under I/O to the processing list is
Miklos Szeredif9a28422006-06-25 05:48:53 -07001091 * prevented by the req->aborted flag being true for these requests.
1092 * For this reason requests on the io list must be aborted first.
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001093 */
1094void fuse_abort_conn(struct fuse_conn *fc)
1095{
Miklos Szeredid7133112006-04-10 22:54:55 -07001096 spin_lock(&fc->lock);
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001097 if (fc->connected) {
1098 fc->connected = 0;
Miklos Szeredi51eb01e2006-06-25 05:48:50 -07001099 fc->blocked = 0;
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001100 end_io_requests(fc);
1101 end_requests(fc, &fc->pending);
1102 end_requests(fc, &fc->processing);
1103 wake_up_all(&fc->waitq);
Miklos Szeredi51eb01e2006-06-25 05:48:50 -07001104 wake_up_all(&fc->blocked_waitq);
Jeff Dike385a17b2006-04-10 22:54:52 -07001105 kill_fasync(&fc->fasync, SIGIO, POLL_IN);
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001106 }
Miklos Szeredid7133112006-04-10 22:54:55 -07001107 spin_unlock(&fc->lock);
Miklos Szeredi69a53bf2006-01-16 22:14:41 -08001108}
1109
Miklos Szeredi334f4852005-09-09 13:10:27 -07001110static int fuse_dev_release(struct inode *inode, struct file *file)
1111{
Miklos Szeredi0720b312006-04-10 22:54:55 -07001112 struct fuse_conn *fc = fuse_get_conn(file);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001113 if (fc) {
Miklos Szeredid7133112006-04-10 22:54:55 -07001114 spin_lock(&fc->lock);
Miklos Szeredi1e9a4ed2005-09-09 13:10:31 -07001115 fc->connected = 0;
Miklos Szeredi334f4852005-09-09 13:10:27 -07001116 end_requests(fc, &fc->pending);
1117 end_requests(fc, &fc->processing);
Miklos Szeredid7133112006-04-10 22:54:55 -07001118 spin_unlock(&fc->lock);
Miklos Szeredibafa9652006-06-25 05:48:51 -07001119 fuse_conn_put(fc);
Jeff Dike385a17b2006-04-10 22:54:52 -07001120 }
Miklos Szeredif543f252006-01-16 22:14:35 -08001121
Miklos Szeredi334f4852005-09-09 13:10:27 -07001122 return 0;
1123}
1124
Jeff Dike385a17b2006-04-10 22:54:52 -07001125static int fuse_dev_fasync(int fd, struct file *file, int on)
1126{
1127 struct fuse_conn *fc = fuse_get_conn(file);
1128 if (!fc)
Miklos Szeredia87046d2006-04-10 22:54:56 -07001129 return -EPERM;
Jeff Dike385a17b2006-04-10 22:54:52 -07001130
1131 /* No locking - fasync_helper does its own locking */
1132 return fasync_helper(fd, file, on, &fc->fasync);
1133}
1134
Arjan van de Ven4b6f5d22006-03-28 01:56:42 -08001135const struct file_operations fuse_dev_operations = {
Miklos Szeredi334f4852005-09-09 13:10:27 -07001136 .owner = THIS_MODULE,
1137 .llseek = no_llseek,
Badari Pulavartyee0b3e62006-09-30 23:28:47 -07001138 .read = do_sync_read,
1139 .aio_read = fuse_dev_read,
1140 .write = do_sync_write,
1141 .aio_write = fuse_dev_write,
Miklos Szeredi334f4852005-09-09 13:10:27 -07001142 .poll = fuse_dev_poll,
1143 .release = fuse_dev_release,
Jeff Dike385a17b2006-04-10 22:54:52 -07001144 .fasync = fuse_dev_fasync,
Miklos Szeredi334f4852005-09-09 13:10:27 -07001145};
1146
1147static struct miscdevice fuse_miscdevice = {
1148 .minor = FUSE_MINOR,
1149 .name = "fuse",
1150 .fops = &fuse_dev_operations,
1151};
1152
1153int __init fuse_dev_init(void)
1154{
1155 int err = -ENOMEM;
1156 fuse_req_cachep = kmem_cache_create("fuse_request",
1157 sizeof(struct fuse_req),
Paul Mundt20c2df82007-07-20 10:11:58 +09001158 0, 0, NULL);
Miklos Szeredi334f4852005-09-09 13:10:27 -07001159 if (!fuse_req_cachep)
1160 goto out;
1161
1162 err = misc_register(&fuse_miscdevice);
1163 if (err)
1164 goto out_cache_clean;
1165
1166 return 0;
1167
1168 out_cache_clean:
1169 kmem_cache_destroy(fuse_req_cachep);
1170 out:
1171 return err;
1172}
1173
1174void fuse_dev_cleanup(void)
1175{
1176 misc_deregister(&fuse_miscdevice);
1177 kmem_cache_destroy(fuse_req_cachep);
1178}