blob: d9aba970072670be069c548a4b3b849f2cc70e52 [file] [log] [blame]
Tejun Heo151060a2009-04-14 10:54:54 +09001/*
2 * CUSE: Character device in Userspace
3 *
4 * Copyright (C) 2008-2009 SUSE Linux Products GmbH
5 * Copyright (C) 2008-2009 Tejun Heo <tj@kernel.org>
6 *
7 * This file is released under the GPLv2.
8 *
9 * CUSE enables character devices to be implemented from userland much
10 * like FUSE allows filesystems. On initialization /dev/cuse is
11 * created. By opening the file and replying to the CUSE_INIT request
12 * userland CUSE server can create a character device. After that the
13 * operation is very similar to FUSE.
14 *
15 * A CUSE instance involves the following objects.
16 *
17 * cuse_conn : contains fuse_conn and serves as bonding structure
18 * channel : file handle connected to the userland CUSE server
19 * cdev : the implemented character device
20 * dev : generic device for cdev
21 *
22 * Note that 'channel' is what 'dev' is in FUSE. As CUSE deals with
23 * devices, it's called 'channel' to reduce confusion.
24 *
25 * channel determines when the character device dies. When channel is
26 * closed, everything begins to destruct. The cuse_conn is taken off
27 * the lookup table preventing further access from cdev, cdev and
28 * generic device are removed and the base reference of cuse_conn is
29 * put.
30 *
31 * On each open, the matching cuse_conn is looked up and if found an
32 * additional reference is taken which is released when the file is
33 * closed.
34 */
35
36#include <linux/fuse.h>
37#include <linux/cdev.h>
38#include <linux/device.h>
39#include <linux/file.h>
40#include <linux/fs.h>
41#include <linux/kdev_t.h>
42#include <linux/kthread.h>
43#include <linux/list.h>
44#include <linux/magic.h>
45#include <linux/miscdevice.h>
46#include <linux/mutex.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090047#include <linux/slab.h>
Tejun Heo151060a2009-04-14 10:54:54 +090048#include <linux/stat.h>
Paul Gortmaker143cb492011-07-01 14:23:34 -040049#include <linux/module.h>
Christoph Hellwige2e40f22015-02-22 08:58:50 -080050#include <linux/uio.h>
Tejun Heo151060a2009-04-14 10:54:54 +090051
52#include "fuse_i.h"
53
54#define CUSE_CONNTBL_LEN 64
55
56struct cuse_conn {
57 struct list_head list; /* linked on cuse_conntbl */
58 struct fuse_conn fc; /* fuse connection */
59 struct cdev *cdev; /* associated character device */
60 struct device *dev; /* device representing @cdev */
61
62 /* init parameters, set once during initialization */
63 bool unrestricted_ioctl;
64};
65
David Herrmann8ce03fd2012-11-17 12:45:47 +010066static DEFINE_MUTEX(cuse_lock); /* protects registration */
Tejun Heo151060a2009-04-14 10:54:54 +090067static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
68static struct class *cuse_class;
69
70static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
71{
72 return container_of(fc, struct cuse_conn, fc);
73}
74
75static struct list_head *cuse_conntbl_head(dev_t devt)
76{
77 return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
78}
79
80
81/**************************************************************************
82 * CUSE frontend operations
83 *
84 * These are file operations for the character device.
85 *
86 * On open, CUSE opens a file from the FUSE mnt and stores it to
87 * private_data of the open file. All other ops call FUSE ops on the
88 * FUSE file.
89 */
90
Al Virocfa86a72015-03-21 09:01:45 -040091static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
Tejun Heo151060a2009-04-14 10:54:54 +090092{
Seth Forshee744742d2016-03-11 10:35:34 -060093 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb->ki_filp);
Tejun Heo151060a2009-04-14 10:54:54 +090094 loff_t pos = 0;
95
Al Virocfa86a72015-03-21 09:01:45 -040096 return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
Tejun Heo151060a2009-04-14 10:54:54 +090097}
98
Al Virocfa86a72015-03-21 09:01:45 -040099static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
Tejun Heo151060a2009-04-14 10:54:54 +0900100{
Seth Forshee744742d2016-03-11 10:35:34 -0600101 struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb->ki_filp);
Tejun Heo151060a2009-04-14 10:54:54 +0900102 loff_t pos = 0;
103 /*
104 * No locking or generic_write_checks(), the server is
105 * responsible for locking and sanity checks.
106 */
Al Virocfa86a72015-03-21 09:01:45 -0400107 return fuse_direct_io(&io, from, &pos,
Pavel Emelyanovea8cd332013-10-10 17:12:05 +0400108 FUSE_DIO_WRITE | FUSE_DIO_CUSE);
Tejun Heo151060a2009-04-14 10:54:54 +0900109}
110
111static int cuse_open(struct inode *inode, struct file *file)
112{
113 dev_t devt = inode->i_cdev->dev;
114 struct cuse_conn *cc = NULL, *pos;
115 int rc;
116
117 /* look up and get the connection */
David Herrmann8ce03fd2012-11-17 12:45:47 +0100118 mutex_lock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900119 list_for_each_entry(pos, cuse_conntbl_head(devt), list)
120 if (pos->dev->devt == devt) {
121 fuse_conn_get(&pos->fc);
122 cc = pos;
123 break;
124 }
David Herrmann8ce03fd2012-11-17 12:45:47 +0100125 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900126
127 /* dead? */
128 if (!cc)
129 return -ENODEV;
130
131 /*
132 * Generic permission check is already done against the chrdev
133 * file, proceed to open.
134 */
135 rc = fuse_do_open(&cc->fc, 0, file, 0);
136 if (rc)
137 fuse_conn_put(&cc->fc);
138 return rc;
139}
140
141static int cuse_release(struct inode *inode, struct file *file)
142{
143 struct fuse_file *ff = file->private_data;
144 struct fuse_conn *fc = ff->fc;
145
146 fuse_sync_release(ff, file->f_flags);
147 fuse_conn_put(fc);
148
149 return 0;
150}
151
152static long cuse_file_ioctl(struct file *file, unsigned int cmd,
153 unsigned long arg)
154{
155 struct fuse_file *ff = file->private_data;
156 struct cuse_conn *cc = fc_to_cc(ff->fc);
157 unsigned int flags = 0;
158
159 if (cc->unrestricted_ioctl)
160 flags |= FUSE_IOCTL_UNRESTRICTED;
161
162 return fuse_do_ioctl(file, cmd, arg, flags);
163}
164
165static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
166 unsigned long arg)
167{
168 struct fuse_file *ff = file->private_data;
169 struct cuse_conn *cc = fc_to_cc(ff->fc);
170 unsigned int flags = FUSE_IOCTL_COMPAT;
171
172 if (cc->unrestricted_ioctl)
173 flags |= FUSE_IOCTL_UNRESTRICTED;
174
175 return fuse_do_ioctl(file, cmd, arg, flags);
176}
177
178static const struct file_operations cuse_frontend_fops = {
179 .owner = THIS_MODULE,
Al Virocfa86a72015-03-21 09:01:45 -0400180 .read_iter = cuse_read_iter,
181 .write_iter = cuse_write_iter,
Tejun Heo151060a2009-04-14 10:54:54 +0900182 .open = cuse_open,
183 .release = cuse_release,
184 .unlocked_ioctl = cuse_file_ioctl,
185 .compat_ioctl = cuse_file_compat_ioctl,
186 .poll = fuse_file_poll,
Arnd Bergmann6038f372010-08-15 18:52:59 +0200187 .llseek = noop_llseek,
Tejun Heo151060a2009-04-14 10:54:54 +0900188};
189
190
191/**************************************************************************
192 * CUSE channel initialization and destruction
193 */
194
195struct cuse_devinfo {
196 const char *name;
197};
198
199/**
200 * cuse_parse_one - parse one key=value pair
201 * @pp: i/o parameter for the current position
202 * @end: points to one past the end of the packed string
203 * @keyp: out parameter for key
204 * @valp: out parameter for value
205 *
206 * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
207 * at @end - 1. This function parses one pair and set *@keyp to the
208 * start of the key and *@valp to the start of the value. Note that
209 * the original string is modified such that the key string is
210 * terminated with '\0'. *@pp is updated to point to the next string.
211 *
212 * RETURNS:
213 * 1 on successful parse, 0 on EOF, -errno on failure.
214 */
215static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
216{
217 char *p = *pp;
218 char *key, *val;
219
220 while (p < end && *p == '\0')
221 p++;
222 if (p == end)
223 return 0;
224
225 if (end[-1] != '\0') {
226 printk(KERN_ERR "CUSE: info not properly terminated\n");
227 return -EINVAL;
228 }
229
230 key = val = p;
231 p += strlen(p);
232
233 if (valp) {
234 strsep(&val, "=");
235 if (!val)
236 val = key + strlen(key);
237 key = strstrip(key);
238 val = strstrip(val);
239 } else
240 key = strstrip(key);
241
242 if (!strlen(key)) {
243 printk(KERN_ERR "CUSE: zero length info key specified\n");
244 return -EINVAL;
245 }
246
247 *pp = p;
248 *keyp = key;
249 if (valp)
250 *valp = val;
251
252 return 1;
253}
254
255/**
256 * cuse_parse_dev_info - parse device info
257 * @p: device info string
258 * @len: length of device info string
259 * @devinfo: out parameter for parsed device info
260 *
261 * Parse @p to extract device info and store it into @devinfo. String
262 * pointed to by @p is modified by parsing and @devinfo points into
263 * them, so @p shouldn't be freed while @devinfo is in use.
264 *
265 * RETURNS:
266 * 0 on success, -errno on failure.
267 */
268static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
269{
270 char *end = p + len;
Miklos Szeredie2560362013-01-15 12:24:46 +0100271 char *uninitialized_var(key), *uninitialized_var(val);
Tejun Heo151060a2009-04-14 10:54:54 +0900272 int rc;
273
274 while (true) {
275 rc = cuse_parse_one(&p, end, &key, &val);
276 if (rc < 0)
277 return rc;
278 if (!rc)
279 break;
280 if (strcmp(key, "DEVNAME") == 0)
281 devinfo->name = val;
282 else
283 printk(KERN_WARNING "CUSE: unknown device info \"%s\"\n",
284 key);
285 }
286
287 if (!devinfo->name || !strlen(devinfo->name)) {
288 printk(KERN_ERR "CUSE: DEVNAME unspecified\n");
289 return -EINVAL;
290 }
291
292 return 0;
293}
294
295static void cuse_gendev_release(struct device *dev)
296{
297 kfree(dev);
298}
299
300/**
301 * cuse_process_init_reply - finish initializing CUSE channel
302 *
303 * This function creates the character device and sets up all the
304 * required data structures for it. Please read the comment at the
305 * top of this file for high level overview.
306 */
307static void cuse_process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
308{
David Herrmann30783582012-11-17 12:45:48 +0100309 struct cuse_conn *cc = fc_to_cc(fc), *pos;
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100310 struct cuse_init_out *arg = req->out.args[0].value;
Tejun Heo151060a2009-04-14 10:54:54 +0900311 struct page *page = req->pages[0];
312 struct cuse_devinfo devinfo = { };
313 struct device *dev;
314 struct cdev *cdev;
315 dev_t devt;
David Herrmann30783582012-11-17 12:45:48 +0100316 int rc, i;
Tejun Heo151060a2009-04-14 10:54:54 +0900317
318 if (req->out.h.error ||
319 arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) {
320 goto err;
321 }
322
323 fc->minor = arg->minor;
324 fc->max_read = max_t(unsigned, arg->max_read, 4096);
325 fc->max_write = max_t(unsigned, arg->max_write, 4096);
326
327 /* parse init reply */
328 cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
329
330 rc = cuse_parse_devinfo(page_address(page), req->out.args[1].size,
331 &devinfo);
332 if (rc)
333 goto err;
334
335 /* determine and reserve devt */
336 devt = MKDEV(arg->dev_major, arg->dev_minor);
337 if (!MAJOR(devt))
338 rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
339 else
340 rc = register_chrdev_region(devt, 1, devinfo.name);
341 if (rc) {
342 printk(KERN_ERR "CUSE: failed to register chrdev region\n");
343 goto err;
344 }
345
346 /* devt determined, create device */
347 rc = -ENOMEM;
348 dev = kzalloc(sizeof(*dev), GFP_KERNEL);
349 if (!dev)
350 goto err_region;
351
352 device_initialize(dev);
353 dev_set_uevent_suppress(dev, 1);
354 dev->class = cuse_class;
355 dev->devt = devt;
356 dev->release = cuse_gendev_release;
357 dev_set_drvdata(dev, cc);
358 dev_set_name(dev, "%s", devinfo.name);
359
David Herrmann30783582012-11-17 12:45:48 +0100360 mutex_lock(&cuse_lock);
361
362 /* make sure the device-name is unique */
363 for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
364 list_for_each_entry(pos, &cuse_conntbl[i], list)
365 if (!strcmp(dev_name(pos->dev), dev_name(dev)))
366 goto err_unlock;
367 }
368
Tejun Heo151060a2009-04-14 10:54:54 +0900369 rc = device_add(dev);
370 if (rc)
David Herrmann30783582012-11-17 12:45:48 +0100371 goto err_unlock;
Tejun Heo151060a2009-04-14 10:54:54 +0900372
373 /* register cdev */
374 rc = -ENOMEM;
375 cdev = cdev_alloc();
376 if (!cdev)
David Herrmann30783582012-11-17 12:45:48 +0100377 goto err_unlock;
Tejun Heo151060a2009-04-14 10:54:54 +0900378
379 cdev->owner = THIS_MODULE;
380 cdev->ops = &cuse_frontend_fops;
381
382 rc = cdev_add(cdev, devt, 1);
383 if (rc)
384 goto err_cdev;
385
386 cc->dev = dev;
387 cc->cdev = cdev;
388
389 /* make the device available */
Tejun Heo151060a2009-04-14 10:54:54 +0900390 list_add(&cc->list, cuse_conntbl_head(devt));
David Herrmann8ce03fd2012-11-17 12:45:47 +0100391 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900392
393 /* announce device availability */
394 dev_set_uevent_suppress(dev, 0);
395 kobject_uevent(&dev->kobj, KOBJ_ADD);
396out:
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100397 kfree(arg);
Tejun Heo151060a2009-04-14 10:54:54 +0900398 __free_page(page);
399 return;
400
401err_cdev:
402 cdev_del(cdev);
David Herrmann30783582012-11-17 12:45:48 +0100403err_unlock:
404 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900405 put_device(dev);
406err_region:
407 unregister_chrdev_region(devt, 1);
408err:
Miklos Szeredi580640b2014-12-12 09:49:04 +0100409 fuse_abort_conn(fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900410 goto out;
411}
412
413static int cuse_send_init(struct cuse_conn *cc)
414{
415 int rc;
416 struct fuse_req *req;
417 struct page *page;
418 struct fuse_conn *fc = &cc->fc;
419 struct cuse_init_in *arg;
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100420 void *outarg;
Tejun Heo151060a2009-04-14 10:54:54 +0900421
422 BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
423
Maxim Patlasov8b41e672013-03-21 18:02:04 +0400424 req = fuse_get_req_for_background(fc, 1);
Tejun Heo151060a2009-04-14 10:54:54 +0900425 if (IS_ERR(req)) {
426 rc = PTR_ERR(req);
427 goto err;
428 }
429
430 rc = -ENOMEM;
431 page = alloc_page(GFP_KERNEL | __GFP_ZERO);
432 if (!page)
433 goto err_put_req;
434
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100435 outarg = kzalloc(sizeof(struct cuse_init_out), GFP_KERNEL);
436 if (!outarg)
437 goto err_free_page;
438
Tejun Heo151060a2009-04-14 10:54:54 +0900439 arg = &req->misc.cuse_init_in;
440 arg->major = FUSE_KERNEL_VERSION;
441 arg->minor = FUSE_KERNEL_MINOR_VERSION;
442 arg->flags |= CUSE_UNRESTRICTED_IOCTL;
443 req->in.h.opcode = CUSE_INIT;
444 req->in.numargs = 1;
445 req->in.args[0].size = sizeof(struct cuse_init_in);
446 req->in.args[0].value = arg;
447 req->out.numargs = 2;
448 req->out.args[0].size = sizeof(struct cuse_init_out);
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100449 req->out.args[0].value = outarg;
Tejun Heo151060a2009-04-14 10:54:54 +0900450 req->out.args[1].size = CUSE_INIT_INFO_MAX;
451 req->out.argvar = 1;
452 req->out.argpages = 1;
453 req->pages[0] = page;
Maxim Patlasov85f40ae2012-10-26 19:49:33 +0400454 req->page_descs[0].length = req->out.args[1].size;
Tejun Heo151060a2009-04-14 10:54:54 +0900455 req->num_pages = 1;
456 req->end = cuse_process_init_reply;
457 fuse_request_send_background(fc, req);
458
459 return 0;
460
Miklos Szeredi07d5f692011-03-21 13:58:05 +0100461err_free_page:
462 __free_page(page);
Tejun Heo151060a2009-04-14 10:54:54 +0900463err_put_req:
464 fuse_put_request(fc, req);
465err:
466 return rc;
467}
468
469static void cuse_fc_release(struct fuse_conn *fc)
470{
471 struct cuse_conn *cc = fc_to_cc(fc);
Al Virodd3e2c52013-10-03 21:21:39 -0400472 kfree_rcu(cc, fc.rcu);
Tejun Heo151060a2009-04-14 10:54:54 +0900473}
474
475/**
476 * cuse_channel_open - open method for /dev/cuse
477 * @inode: inode for /dev/cuse
478 * @file: file struct being opened
479 *
480 * Userland CUSE server can create a CUSE device by opening /dev/cuse
Paul Bolle8272f4c2011-02-15 00:05:34 +0100481 * and replying to the initialization request kernel sends. This
Tejun Heo151060a2009-04-14 10:54:54 +0900482 * function is responsible for handling CUSE device initialization.
483 * Because the fd opened by this function is used during
484 * initialization, this function only creates cuse_conn and sends
485 * init. The rest is delegated to a kthread.
486 *
487 * RETURNS:
488 * 0 on success, -errno on failure.
489 */
490static int cuse_channel_open(struct inode *inode, struct file *file)
491{
Miklos Szeredicc080e92015-07-01 16:26:08 +0200492 struct fuse_dev *fud;
Tejun Heo151060a2009-04-14 10:54:54 +0900493 struct cuse_conn *cc;
494 int rc;
495
496 /* set up cuse_conn */
497 cc = kzalloc(sizeof(*cc), GFP_KERNEL);
498 if (!cc)
499 return -ENOMEM;
500
501 fuse_conn_init(&cc->fc);
502
Miklos Szeredicc080e92015-07-01 16:26:08 +0200503 fud = fuse_dev_alloc(&cc->fc);
504 if (!fud) {
505 kfree(cc);
506 return -ENOMEM;
507 }
508
Tejun Heo151060a2009-04-14 10:54:54 +0900509 INIT_LIST_HEAD(&cc->list);
510 cc->fc.release = cuse_fc_release;
511
Maxim Patlasov796523fb2013-03-21 18:02:15 +0400512 cc->fc.initialized = 1;
Tejun Heo151060a2009-04-14 10:54:54 +0900513 rc = cuse_send_init(cc);
514 if (rc) {
Miklos Szeredicc080e92015-07-01 16:26:08 +0200515 fuse_dev_free(fud);
zhengbin80a84d62019-08-14 15:59:09 +0800516 fuse_conn_put(&cc->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900517 return rc;
518 }
Miklos Szeredicc080e92015-07-01 16:26:08 +0200519 file->private_data = fud;
Tejun Heo151060a2009-04-14 10:54:54 +0900520
521 return 0;
522}
523
524/**
525 * cuse_channel_release - release method for /dev/cuse
526 * @inode: inode for /dev/cuse
527 * @file: file struct being closed
528 *
529 * Disconnect the channel, deregister CUSE device and initiate
530 * destruction by putting the default reference.
531 *
532 * RETURNS:
533 * 0 on success, -errno on failure.
534 */
535static int cuse_channel_release(struct inode *inode, struct file *file)
536{
Miklos Szeredicc080e92015-07-01 16:26:08 +0200537 struct fuse_dev *fud = file->private_data;
538 struct cuse_conn *cc = fc_to_cc(fud->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900539 int rc;
540
541 /* remove from the conntbl, no more access from this point on */
David Herrmann8ce03fd2012-11-17 12:45:47 +0100542 mutex_lock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900543 list_del_init(&cc->list);
David Herrmann8ce03fd2012-11-17 12:45:47 +0100544 mutex_unlock(&cuse_lock);
Tejun Heo151060a2009-04-14 10:54:54 +0900545
546 /* remove device */
547 if (cc->dev)
548 device_unregister(cc->dev);
549 if (cc->cdev) {
550 unregister_chrdev_region(cc->cdev->dev, 1);
551 cdev_del(cc->cdev);
552 }
Miklos Szeredi2c5816b2015-11-10 10:32:36 +0100553 /* Base reference is now owned by "fud" */
554 fuse_conn_put(&cc->fc);
Tejun Heo151060a2009-04-14 10:54:54 +0900555
Tejun Heo151060a2009-04-14 10:54:54 +0900556 rc = fuse_dev_release(inode, file); /* puts the base reference */
557
558 return rc;
559}
560
561static struct file_operations cuse_channel_fops; /* initialized during init */
562
563
564/**************************************************************************
565 * Misc stuff and module initializatiion
566 *
567 * CUSE exports the same set of attributes to sysfs as fusectl.
568 */
569
570static ssize_t cuse_class_waiting_show(struct device *dev,
571 struct device_attribute *attr, char *buf)
572{
573 struct cuse_conn *cc = dev_get_drvdata(dev);
574
575 return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
576}
Rusty Russell58f86cc2014-03-24 12:00:34 +1030577static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
Tejun Heo151060a2009-04-14 10:54:54 +0900578
579static ssize_t cuse_class_abort_store(struct device *dev,
580 struct device_attribute *attr,
581 const char *buf, size_t count)
582{
583 struct cuse_conn *cc = dev_get_drvdata(dev);
584
585 fuse_abort_conn(&cc->fc);
586 return count;
587}
Rusty Russell58f86cc2014-03-24 12:00:34 +1030588static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
Tejun Heo151060a2009-04-14 10:54:54 +0900589
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700590static struct attribute *cuse_class_dev_attrs[] = {
591 &dev_attr_waiting.attr,
592 &dev_attr_abort.attr,
593 NULL,
Tejun Heo151060a2009-04-14 10:54:54 +0900594};
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700595ATTRIBUTE_GROUPS(cuse_class_dev);
Tejun Heo151060a2009-04-14 10:54:54 +0900596
597static struct miscdevice cuse_miscdev = {
Tom Gundersencb2ffb22013-09-09 20:18:27 +0200598 .minor = CUSE_MINOR,
Tejun Heo151060a2009-04-14 10:54:54 +0900599 .name = "cuse",
600 .fops = &cuse_channel_fops,
601};
602
Tom Gundersencb2ffb22013-09-09 20:18:27 +0200603MODULE_ALIAS_MISCDEV(CUSE_MINOR);
604MODULE_ALIAS("devname:cuse");
605
Tejun Heo151060a2009-04-14 10:54:54 +0900606static int __init cuse_init(void)
607{
608 int i, rc;
609
610 /* init conntbl */
611 for (i = 0; i < CUSE_CONNTBL_LEN; i++)
612 INIT_LIST_HEAD(&cuse_conntbl[i]);
613
614 /* inherit and extend fuse_dev_operations */
615 cuse_channel_fops = fuse_dev_operations;
616 cuse_channel_fops.owner = THIS_MODULE;
617 cuse_channel_fops.open = cuse_channel_open;
618 cuse_channel_fops.release = cuse_channel_release;
619
620 cuse_class = class_create(THIS_MODULE, "cuse");
621 if (IS_ERR(cuse_class))
622 return PTR_ERR(cuse_class);
623
Greg Kroah-Hartman4183fb92013-07-24 15:05:24 -0700624 cuse_class->dev_groups = cuse_class_dev_groups;
Tejun Heo151060a2009-04-14 10:54:54 +0900625
626 rc = misc_register(&cuse_miscdev);
627 if (rc) {
628 class_destroy(cuse_class);
629 return rc;
630 }
631
632 return 0;
633}
634
635static void __exit cuse_exit(void)
636{
637 misc_deregister(&cuse_miscdev);
638 class_destroy(cuse_class);
639}
640
641module_init(cuse_init);
642module_exit(cuse_exit);
643
644MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
645MODULE_DESCRIPTION("Character device in Userspace");
646MODULE_LICENSE("GPL");