xref: /linux/fs/fuse/dir.c (revision 266679ffd867cb247c36717ea4d7998e9304823b)
1 /*
2   FUSE: Filesystem in Userspace
3   Copyright (C) 2001-2008  Miklos Szeredi <miklos@szeredi.hu>
4 
5   This program can be distributed under the terms of the GNU GPL.
6   See the file COPYING.
7 */
8 
9 #include "fuse_i.h"
10 
11 #include <linux/pagemap.h>
12 #include <linux/file.h>
13 #include <linux/fs_context.h>
14 #include <linux/moduleparam.h>
15 #include <linux/sched.h>
16 #include <linux/namei.h>
17 #include <linux/slab.h>
18 #include <linux/xattr.h>
19 #include <linux/iversion.h>
20 #include <linux/posix_acl.h>
21 #include <linux/security.h>
22 #include <linux/types.h>
23 #include <linux/kernel.h>
24 
25 static bool __read_mostly allow_sys_admin_access;
26 module_param(allow_sys_admin_access, bool, 0644);
27 MODULE_PARM_DESC(allow_sys_admin_access,
28 		 "Allow users with CAP_SYS_ADMIN in initial userns to bypass allow_other access check");
29 
30 static void fuse_advise_use_readdirplus(struct inode *dir)
31 {
32 	struct fuse_inode *fi = get_fuse_inode(dir);
33 
34 	set_bit(FUSE_I_ADVISE_RDPLUS, &fi->state);
35 }
36 
37 #if BITS_PER_LONG >= 64
38 static inline void __fuse_dentry_settime(struct dentry *entry, u64 time)
39 {
40 	entry->d_fsdata = (void *) time;
41 }
42 
43 static inline u64 fuse_dentry_time(const struct dentry *entry)
44 {
45 	return (u64)entry->d_fsdata;
46 }
47 
48 #else
49 union fuse_dentry {
50 	u64 time;
51 	struct rcu_head rcu;
52 };
53 
54 static inline void __fuse_dentry_settime(struct dentry *dentry, u64 time)
55 {
56 	((union fuse_dentry *) dentry->d_fsdata)->time = time;
57 }
58 
59 static inline u64 fuse_dentry_time(const struct dentry *entry)
60 {
61 	return ((union fuse_dentry *) entry->d_fsdata)->time;
62 }
63 #endif
64 
65 static void fuse_dentry_settime(struct dentry *dentry, u64 time)
66 {
67 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
68 	bool delete = !time && fc->delete_stale;
69 	/*
70 	 * Mess with DCACHE_OP_DELETE because dput() will be faster without it.
71 	 * Don't care about races, either way it's just an optimization
72 	 */
73 	if ((!delete && (dentry->d_flags & DCACHE_OP_DELETE)) ||
74 	    (delete && !(dentry->d_flags & DCACHE_OP_DELETE))) {
75 		spin_lock(&dentry->d_lock);
76 		if (!delete)
77 			dentry->d_flags &= ~DCACHE_OP_DELETE;
78 		else
79 			dentry->d_flags |= DCACHE_OP_DELETE;
80 		spin_unlock(&dentry->d_lock);
81 	}
82 
83 	__fuse_dentry_settime(dentry, time);
84 }
85 
86 /*
87  * FUSE caches dentries and attributes with separate timeout.  The
88  * time in jiffies until the dentry/attributes are valid is stored in
89  * dentry->d_fsdata and fuse_inode->i_time respectively.
90  */
91 
92 /*
93  * Calculate the time in jiffies until a dentry/attributes are valid
94  */
95 static u64 time_to_jiffies(u64 sec, u32 nsec)
96 {
97 	if (sec || nsec) {
98 		struct timespec64 ts = {
99 			sec,
100 			min_t(u32, nsec, NSEC_PER_SEC - 1)
101 		};
102 
103 		return get_jiffies_64() + timespec64_to_jiffies(&ts);
104 	} else
105 		return 0;
106 }
107 
108 /*
109  * Set dentry and possibly attribute timeouts from the lookup/mk*
110  * replies
111  */
112 void fuse_change_entry_timeout(struct dentry *entry, struct fuse_entry_out *o)
113 {
114 	fuse_dentry_settime(entry,
115 		time_to_jiffies(o->entry_valid, o->entry_valid_nsec));
116 }
117 
118 static u64 attr_timeout(struct fuse_attr_out *o)
119 {
120 	return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
121 }
122 
123 u64 entry_attr_timeout(struct fuse_entry_out *o)
124 {
125 	return time_to_jiffies(o->attr_valid, o->attr_valid_nsec);
126 }
127 
128 void fuse_invalidate_attr_mask(struct inode *inode, u32 mask)
129 {
130 	set_mask_bits(&get_fuse_inode(inode)->inval_mask, 0, mask);
131 }
132 
133 /*
134  * Mark the attributes as stale, so that at the next call to
135  * ->getattr() they will be fetched from userspace
136  */
137 void fuse_invalidate_attr(struct inode *inode)
138 {
139 	fuse_invalidate_attr_mask(inode, STATX_BASIC_STATS);
140 }
141 
142 static void fuse_dir_changed(struct inode *dir)
143 {
144 	fuse_invalidate_attr(dir);
145 	inode_maybe_inc_iversion(dir, false);
146 }
147 
148 /*
149  * Mark the attributes as stale due to an atime change.  Avoid the invalidate if
150  * atime is not used.
151  */
152 void fuse_invalidate_atime(struct inode *inode)
153 {
154 	if (!IS_RDONLY(inode))
155 		fuse_invalidate_attr_mask(inode, STATX_ATIME);
156 }
157 
158 /*
159  * Just mark the entry as stale, so that a next attempt to look it up
160  * will result in a new lookup call to userspace
161  *
162  * This is called when a dentry is about to become negative and the
163  * timeout is unknown (unlink, rmdir, rename and in some cases
164  * lookup)
165  */
166 void fuse_invalidate_entry_cache(struct dentry *entry)
167 {
168 	fuse_dentry_settime(entry, 0);
169 }
170 
171 /*
172  * Same as fuse_invalidate_entry_cache(), but also try to remove the
173  * dentry from the hash
174  */
175 static void fuse_invalidate_entry(struct dentry *entry)
176 {
177 	d_invalidate(entry);
178 	fuse_invalidate_entry_cache(entry);
179 }
180 
181 static void fuse_lookup_init(struct fuse_conn *fc, struct fuse_args *args,
182 			     u64 nodeid, const struct qstr *name,
183 			     struct fuse_entry_out *outarg)
184 {
185 	memset(outarg, 0, sizeof(struct fuse_entry_out));
186 	args->opcode = FUSE_LOOKUP;
187 	args->nodeid = nodeid;
188 	args->in_numargs = 1;
189 	args->in_args[0].size = name->len + 1;
190 	args->in_args[0].value = name->name;
191 	args->out_numargs = 1;
192 	args->out_args[0].size = sizeof(struct fuse_entry_out);
193 	args->out_args[0].value = outarg;
194 }
195 
196 /*
197  * Check whether the dentry is still valid
198  *
199  * If the entry validity timeout has expired and the dentry is
200  * positive, try to redo the lookup.  If the lookup results in a
201  * different inode, then let the VFS invalidate the dentry and redo
202  * the lookup once more.  If the lookup results in the same inode,
203  * then refresh the attributes, timeouts and mark the dentry valid.
204  */
205 static int fuse_dentry_revalidate(struct dentry *entry, unsigned int flags)
206 {
207 	struct inode *inode;
208 	struct dentry *parent;
209 	struct fuse_mount *fm;
210 	struct fuse_inode *fi;
211 	int ret;
212 
213 	inode = d_inode_rcu(entry);
214 	if (inode && fuse_is_bad(inode))
215 		goto invalid;
216 	else if (time_before64(fuse_dentry_time(entry), get_jiffies_64()) ||
217 		 (flags & (LOOKUP_EXCL | LOOKUP_REVAL | LOOKUP_RENAME_TARGET))) {
218 		struct fuse_entry_out outarg;
219 		FUSE_ARGS(args);
220 		struct fuse_forget_link *forget;
221 		u64 attr_version;
222 
223 		/* For negative dentries, always do a fresh lookup */
224 		if (!inode)
225 			goto invalid;
226 
227 		ret = -ECHILD;
228 		if (flags & LOOKUP_RCU)
229 			goto out;
230 
231 		fm = get_fuse_mount(inode);
232 
233 		forget = fuse_alloc_forget();
234 		ret = -ENOMEM;
235 		if (!forget)
236 			goto out;
237 
238 		attr_version = fuse_get_attr_version(fm->fc);
239 
240 		parent = dget_parent(entry);
241 		fuse_lookup_init(fm->fc, &args, get_node_id(d_inode(parent)),
242 				 &entry->d_name, &outarg);
243 		ret = fuse_simple_request(fm, &args);
244 		dput(parent);
245 		/* Zero nodeid is same as -ENOENT */
246 		if (!ret && !outarg.nodeid)
247 			ret = -ENOENT;
248 		if (!ret) {
249 			fi = get_fuse_inode(inode);
250 			if (outarg.nodeid != get_node_id(inode) ||
251 			    (bool) IS_AUTOMOUNT(inode) != (bool) (outarg.attr.flags & FUSE_ATTR_SUBMOUNT)) {
252 				fuse_queue_forget(fm->fc, forget,
253 						  outarg.nodeid, 1);
254 				goto invalid;
255 			}
256 			spin_lock(&fi->lock);
257 			fi->nlookup++;
258 			spin_unlock(&fi->lock);
259 		}
260 		kfree(forget);
261 		if (ret == -ENOMEM)
262 			goto out;
263 		if (ret || fuse_invalid_attr(&outarg.attr) ||
264 		    fuse_stale_inode(inode, outarg.generation, &outarg.attr))
265 			goto invalid;
266 
267 		forget_all_cached_acls(inode);
268 		fuse_change_attributes(inode, &outarg.attr,
269 				       entry_attr_timeout(&outarg),
270 				       attr_version);
271 		fuse_change_entry_timeout(entry, &outarg);
272 	} else if (inode) {
273 		fi = get_fuse_inode(inode);
274 		if (flags & LOOKUP_RCU) {
275 			if (test_bit(FUSE_I_INIT_RDPLUS, &fi->state))
276 				return -ECHILD;
277 		} else if (test_and_clear_bit(FUSE_I_INIT_RDPLUS, &fi->state)) {
278 			parent = dget_parent(entry);
279 			fuse_advise_use_readdirplus(d_inode(parent));
280 			dput(parent);
281 		}
282 	}
283 	ret = 1;
284 out:
285 	return ret;
286 
287 invalid:
288 	ret = 0;
289 	goto out;
290 }
291 
292 #if BITS_PER_LONG < 64
293 static int fuse_dentry_init(struct dentry *dentry)
294 {
295 	dentry->d_fsdata = kzalloc(sizeof(union fuse_dentry),
296 				   GFP_KERNEL_ACCOUNT | __GFP_RECLAIMABLE);
297 
298 	return dentry->d_fsdata ? 0 : -ENOMEM;
299 }
300 static void fuse_dentry_release(struct dentry *dentry)
301 {
302 	union fuse_dentry *fd = dentry->d_fsdata;
303 
304 	kfree_rcu(fd, rcu);
305 }
306 #endif
307 
308 static int fuse_dentry_delete(const struct dentry *dentry)
309 {
310 	return time_before64(fuse_dentry_time(dentry), get_jiffies_64());
311 }
312 
313 /*
314  * Create a fuse_mount object with a new superblock (with path->dentry
315  * as the root), and return that mount so it can be auto-mounted on
316  * @path.
317  */
318 static struct vfsmount *fuse_dentry_automount(struct path *path)
319 {
320 	struct fs_context *fsc;
321 	struct vfsmount *mnt;
322 	struct fuse_inode *mp_fi = get_fuse_inode(d_inode(path->dentry));
323 
324 	fsc = fs_context_for_submount(path->mnt->mnt_sb->s_type, path->dentry);
325 	if (IS_ERR(fsc))
326 		return ERR_CAST(fsc);
327 
328 	/* Pass the FUSE inode of the mount for fuse_get_tree_submount() */
329 	fsc->fs_private = mp_fi;
330 
331 	/* Create the submount */
332 	mnt = fc_mount(fsc);
333 	if (!IS_ERR(mnt))
334 		mntget(mnt);
335 
336 	put_fs_context(fsc);
337 	return mnt;
338 }
339 
340 const struct dentry_operations fuse_dentry_operations = {
341 	.d_revalidate	= fuse_dentry_revalidate,
342 	.d_delete	= fuse_dentry_delete,
343 #if BITS_PER_LONG < 64
344 	.d_init		= fuse_dentry_init,
345 	.d_release	= fuse_dentry_release,
346 #endif
347 	.d_automount	= fuse_dentry_automount,
348 };
349 
350 const struct dentry_operations fuse_root_dentry_operations = {
351 #if BITS_PER_LONG < 64
352 	.d_init		= fuse_dentry_init,
353 	.d_release	= fuse_dentry_release,
354 #endif
355 };
356 
357 int fuse_valid_type(int m)
358 {
359 	return S_ISREG(m) || S_ISDIR(m) || S_ISLNK(m) || S_ISCHR(m) ||
360 		S_ISBLK(m) || S_ISFIFO(m) || S_ISSOCK(m);
361 }
362 
363 bool fuse_invalid_attr(struct fuse_attr *attr)
364 {
365 	return !fuse_valid_type(attr->mode) ||
366 		attr->size > LLONG_MAX;
367 }
368 
369 int fuse_lookup_name(struct super_block *sb, u64 nodeid, const struct qstr *name,
370 		     struct fuse_entry_out *outarg, struct inode **inode)
371 {
372 	struct fuse_mount *fm = get_fuse_mount_super(sb);
373 	FUSE_ARGS(args);
374 	struct fuse_forget_link *forget;
375 	u64 attr_version;
376 	int err;
377 
378 	*inode = NULL;
379 	err = -ENAMETOOLONG;
380 	if (name->len > FUSE_NAME_MAX)
381 		goto out;
382 
383 
384 	forget = fuse_alloc_forget();
385 	err = -ENOMEM;
386 	if (!forget)
387 		goto out;
388 
389 	attr_version = fuse_get_attr_version(fm->fc);
390 
391 	fuse_lookup_init(fm->fc, &args, nodeid, name, outarg);
392 	err = fuse_simple_request(fm, &args);
393 	/* Zero nodeid is same as -ENOENT, but with valid timeout */
394 	if (err || !outarg->nodeid)
395 		goto out_put_forget;
396 
397 	err = -EIO;
398 	if (!outarg->nodeid)
399 		goto out_put_forget;
400 	if (fuse_invalid_attr(&outarg->attr))
401 		goto out_put_forget;
402 
403 	*inode = fuse_iget(sb, outarg->nodeid, outarg->generation,
404 			   &outarg->attr, entry_attr_timeout(outarg),
405 			   attr_version);
406 	err = -ENOMEM;
407 	if (!*inode) {
408 		fuse_queue_forget(fm->fc, forget, outarg->nodeid, 1);
409 		goto out;
410 	}
411 	err = 0;
412 
413  out_put_forget:
414 	kfree(forget);
415  out:
416 	return err;
417 }
418 
419 static struct dentry *fuse_lookup(struct inode *dir, struct dentry *entry,
420 				  unsigned int flags)
421 {
422 	int err;
423 	struct fuse_entry_out outarg;
424 	struct inode *inode;
425 	struct dentry *newent;
426 	bool outarg_valid = true;
427 	bool locked;
428 
429 	if (fuse_is_bad(dir))
430 		return ERR_PTR(-EIO);
431 
432 	locked = fuse_lock_inode(dir);
433 	err = fuse_lookup_name(dir->i_sb, get_node_id(dir), &entry->d_name,
434 			       &outarg, &inode);
435 	fuse_unlock_inode(dir, locked);
436 	if (err == -ENOENT) {
437 		outarg_valid = false;
438 		err = 0;
439 	}
440 	if (err)
441 		goto out_err;
442 
443 	err = -EIO;
444 	if (inode && get_node_id(inode) == FUSE_ROOT_ID)
445 		goto out_iput;
446 
447 	newent = d_splice_alias(inode, entry);
448 	err = PTR_ERR(newent);
449 	if (IS_ERR(newent))
450 		goto out_err;
451 
452 	entry = newent ? newent : entry;
453 	if (outarg_valid)
454 		fuse_change_entry_timeout(entry, &outarg);
455 	else
456 		fuse_invalidate_entry_cache(entry);
457 
458 	if (inode)
459 		fuse_advise_use_readdirplus(dir);
460 	return newent;
461 
462  out_iput:
463 	iput(inode);
464  out_err:
465 	return ERR_PTR(err);
466 }
467 
468 static int get_security_context(struct dentry *entry, umode_t mode,
469 				struct fuse_in_arg *ext)
470 {
471 	struct fuse_secctx *fctx;
472 	struct fuse_secctx_header *header;
473 	void *ctx = NULL, *ptr;
474 	u32 ctxlen, total_len = sizeof(*header);
475 	int err, nr_ctx = 0;
476 	const char *name;
477 	size_t namelen;
478 
479 	err = security_dentry_init_security(entry, mode, &entry->d_name,
480 					    &name, &ctx, &ctxlen);
481 	if (err) {
482 		if (err != -EOPNOTSUPP)
483 			goto out_err;
484 		/* No LSM is supporting this security hook. Ignore error */
485 		ctxlen = 0;
486 		ctx = NULL;
487 	}
488 
489 	if (ctxlen) {
490 		nr_ctx = 1;
491 		namelen = strlen(name) + 1;
492 		err = -EIO;
493 		if (WARN_ON(namelen > XATTR_NAME_MAX + 1 || ctxlen > S32_MAX))
494 			goto out_err;
495 		total_len += FUSE_REC_ALIGN(sizeof(*fctx) + namelen + ctxlen);
496 	}
497 
498 	err = -ENOMEM;
499 	header = ptr = kzalloc(total_len, GFP_KERNEL);
500 	if (!ptr)
501 		goto out_err;
502 
503 	header->nr_secctx = nr_ctx;
504 	header->size = total_len;
505 	ptr += sizeof(*header);
506 	if (nr_ctx) {
507 		fctx = ptr;
508 		fctx->size = ctxlen;
509 		ptr += sizeof(*fctx);
510 
511 		strcpy(ptr, name);
512 		ptr += namelen;
513 
514 		memcpy(ptr, ctx, ctxlen);
515 	}
516 	ext->size = total_len;
517 	ext->value = header;
518 	err = 0;
519 out_err:
520 	kfree(ctx);
521 	return err;
522 }
523 
524 static void *extend_arg(struct fuse_in_arg *buf, u32 bytes)
525 {
526 	void *p;
527 	u32 newlen = buf->size + bytes;
528 
529 	p = krealloc(buf->value, newlen, GFP_KERNEL);
530 	if (!p) {
531 		kfree(buf->value);
532 		buf->size = 0;
533 		buf->value = NULL;
534 		return NULL;
535 	}
536 
537 	memset(p + buf->size, 0, bytes);
538 	buf->value = p;
539 	buf->size = newlen;
540 
541 	return p + newlen - bytes;
542 }
543 
544 static u32 fuse_ext_size(size_t size)
545 {
546 	return FUSE_REC_ALIGN(sizeof(struct fuse_ext_header) + size);
547 }
548 
549 /*
550  * This adds just a single supplementary group that matches the parent's group.
551  */
552 static int get_create_supp_group(struct inode *dir, struct fuse_in_arg *ext)
553 {
554 	struct fuse_conn *fc = get_fuse_conn(dir);
555 	struct fuse_ext_header *xh;
556 	struct fuse_supp_groups *sg;
557 	kgid_t kgid = dir->i_gid;
558 	gid_t parent_gid = from_kgid(fc->user_ns, kgid);
559 	u32 sg_len = fuse_ext_size(sizeof(*sg) + sizeof(sg->groups[0]));
560 
561 	if (parent_gid == (gid_t) -1 || gid_eq(kgid, current_fsgid()) ||
562 	    !in_group_p(kgid))
563 		return 0;
564 
565 	xh = extend_arg(ext, sg_len);
566 	if (!xh)
567 		return -ENOMEM;
568 
569 	xh->size = sg_len;
570 	xh->type = FUSE_EXT_GROUPS;
571 
572 	sg = (struct fuse_supp_groups *) &xh[1];
573 	sg->nr_groups = 1;
574 	sg->groups[0] = parent_gid;
575 
576 	return 0;
577 }
578 
579 static int get_create_ext(struct fuse_args *args,
580 			  struct inode *dir, struct dentry *dentry,
581 			  umode_t mode)
582 {
583 	struct fuse_conn *fc = get_fuse_conn_super(dentry->d_sb);
584 	struct fuse_in_arg ext = { .size = 0, .value = NULL };
585 	int err = 0;
586 
587 	if (fc->init_security)
588 		err = get_security_context(dentry, mode, &ext);
589 	if (!err && fc->create_supp_group)
590 		err = get_create_supp_group(dir, &ext);
591 
592 	if (!err && ext.size) {
593 		WARN_ON(args->in_numargs >= ARRAY_SIZE(args->in_args));
594 		args->is_ext = true;
595 		args->ext_idx = args->in_numargs++;
596 		args->in_args[args->ext_idx] = ext;
597 	} else {
598 		kfree(ext.value);
599 	}
600 
601 	return err;
602 }
603 
604 static void free_ext_value(struct fuse_args *args)
605 {
606 	if (args->is_ext)
607 		kfree(args->in_args[args->ext_idx].value);
608 }
609 
610 /*
611  * Atomic create+open operation
612  *
613  * If the filesystem doesn't support this, then fall back to separate
614  * 'mknod' + 'open' requests.
615  */
616 static int fuse_create_open(struct inode *dir, struct dentry *entry,
617 			    struct file *file, unsigned int flags,
618 			    umode_t mode, u32 opcode)
619 {
620 	int err;
621 	struct inode *inode;
622 	struct fuse_mount *fm = get_fuse_mount(dir);
623 	FUSE_ARGS(args);
624 	struct fuse_forget_link *forget;
625 	struct fuse_create_in inarg;
626 	struct fuse_open_out outopen;
627 	struct fuse_entry_out outentry;
628 	struct fuse_inode *fi;
629 	struct fuse_file *ff;
630 	bool trunc = flags & O_TRUNC;
631 
632 	/* Userspace expects S_IFREG in create mode */
633 	BUG_ON((mode & S_IFMT) != S_IFREG);
634 
635 	forget = fuse_alloc_forget();
636 	err = -ENOMEM;
637 	if (!forget)
638 		goto out_err;
639 
640 	err = -ENOMEM;
641 	ff = fuse_file_alloc(fm);
642 	if (!ff)
643 		goto out_put_forget_req;
644 
645 	if (!fm->fc->dont_mask)
646 		mode &= ~current_umask();
647 
648 	flags &= ~O_NOCTTY;
649 	memset(&inarg, 0, sizeof(inarg));
650 	memset(&outentry, 0, sizeof(outentry));
651 	inarg.flags = flags;
652 	inarg.mode = mode;
653 	inarg.umask = current_umask();
654 
655 	if (fm->fc->handle_killpriv_v2 && trunc &&
656 	    !(flags & O_EXCL) && !capable(CAP_FSETID)) {
657 		inarg.open_flags |= FUSE_OPEN_KILL_SUIDGID;
658 	}
659 
660 	args.opcode = opcode;
661 	args.nodeid = get_node_id(dir);
662 	args.in_numargs = 2;
663 	args.in_args[0].size = sizeof(inarg);
664 	args.in_args[0].value = &inarg;
665 	args.in_args[1].size = entry->d_name.len + 1;
666 	args.in_args[1].value = entry->d_name.name;
667 	args.out_numargs = 2;
668 	args.out_args[0].size = sizeof(outentry);
669 	args.out_args[0].value = &outentry;
670 	args.out_args[1].size = sizeof(outopen);
671 	args.out_args[1].value = &outopen;
672 
673 	err = get_create_ext(&args, dir, entry, mode);
674 	if (err)
675 		goto out_put_forget_req;
676 
677 	err = fuse_simple_request(fm, &args);
678 	free_ext_value(&args);
679 	if (err)
680 		goto out_free_ff;
681 
682 	err = -EIO;
683 	if (!S_ISREG(outentry.attr.mode) || invalid_nodeid(outentry.nodeid) ||
684 	    fuse_invalid_attr(&outentry.attr))
685 		goto out_free_ff;
686 
687 	ff->fh = outopen.fh;
688 	ff->nodeid = outentry.nodeid;
689 	ff->open_flags = outopen.open_flags;
690 	inode = fuse_iget(dir->i_sb, outentry.nodeid, outentry.generation,
691 			  &outentry.attr, entry_attr_timeout(&outentry), 0);
692 	if (!inode) {
693 		flags &= ~(O_CREAT | O_EXCL | O_TRUNC);
694 		fuse_sync_release(NULL, ff, flags);
695 		fuse_queue_forget(fm->fc, forget, outentry.nodeid, 1);
696 		err = -ENOMEM;
697 		goto out_err;
698 	}
699 	kfree(forget);
700 	d_instantiate(entry, inode);
701 	fuse_change_entry_timeout(entry, &outentry);
702 	fuse_dir_changed(dir);
703 	err = finish_open(file, entry, generic_file_open);
704 	if (err) {
705 		fi = get_fuse_inode(inode);
706 		fuse_sync_release(fi, ff, flags);
707 	} else {
708 		file->private_data = ff;
709 		fuse_finish_open(inode, file);
710 		if (fm->fc->atomic_o_trunc && trunc)
711 			truncate_pagecache(inode, 0);
712 		else if (!(ff->open_flags & FOPEN_KEEP_CACHE))
713 			invalidate_inode_pages2(inode->i_mapping);
714 	}
715 	return err;
716 
717 out_free_ff:
718 	fuse_file_free(ff);
719 out_put_forget_req:
720 	kfree(forget);
721 out_err:
722 	return err;
723 }
724 
725 static int fuse_mknod(struct mnt_idmap *, struct inode *, struct dentry *,
726 		      umode_t, dev_t);
727 static int fuse_atomic_open(struct inode *dir, struct dentry *entry,
728 			    struct file *file, unsigned flags,
729 			    umode_t mode)
730 {
731 	int err;
732 	struct fuse_conn *fc = get_fuse_conn(dir);
733 	struct dentry *res = NULL;
734 
735 	if (fuse_is_bad(dir))
736 		return -EIO;
737 
738 	if (d_in_lookup(entry)) {
739 		res = fuse_lookup(dir, entry, 0);
740 		if (IS_ERR(res))
741 			return PTR_ERR(res);
742 
743 		if (res)
744 			entry = res;
745 	}
746 
747 	if (!(flags & O_CREAT) || d_really_is_positive(entry))
748 		goto no_open;
749 
750 	/* Only creates */
751 	file->f_mode |= FMODE_CREATED;
752 
753 	if (fc->no_create)
754 		goto mknod;
755 
756 	err = fuse_create_open(dir, entry, file, flags, mode, FUSE_CREATE);
757 	if (err == -ENOSYS) {
758 		fc->no_create = 1;
759 		goto mknod;
760 	}
761 out_dput:
762 	dput(res);
763 	return err;
764 
765 mknod:
766 	err = fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
767 	if (err)
768 		goto out_dput;
769 no_open:
770 	return finish_no_open(file, res);
771 }
772 
773 /*
774  * Code shared between mknod, mkdir, symlink and link
775  */
776 static int create_new_entry(struct fuse_mount *fm, struct fuse_args *args,
777 			    struct inode *dir, struct dentry *entry,
778 			    umode_t mode)
779 {
780 	struct fuse_entry_out outarg;
781 	struct inode *inode;
782 	struct dentry *d;
783 	int err;
784 	struct fuse_forget_link *forget;
785 
786 	if (fuse_is_bad(dir))
787 		return -EIO;
788 
789 	forget = fuse_alloc_forget();
790 	if (!forget)
791 		return -ENOMEM;
792 
793 	memset(&outarg, 0, sizeof(outarg));
794 	args->nodeid = get_node_id(dir);
795 	args->out_numargs = 1;
796 	args->out_args[0].size = sizeof(outarg);
797 	args->out_args[0].value = &outarg;
798 
799 	if (args->opcode != FUSE_LINK) {
800 		err = get_create_ext(args, dir, entry, mode);
801 		if (err)
802 			goto out_put_forget_req;
803 	}
804 
805 	err = fuse_simple_request(fm, args);
806 	free_ext_value(args);
807 	if (err)
808 		goto out_put_forget_req;
809 
810 	err = -EIO;
811 	if (invalid_nodeid(outarg.nodeid) || fuse_invalid_attr(&outarg.attr))
812 		goto out_put_forget_req;
813 
814 	if ((outarg.attr.mode ^ mode) & S_IFMT)
815 		goto out_put_forget_req;
816 
817 	inode = fuse_iget(dir->i_sb, outarg.nodeid, outarg.generation,
818 			  &outarg.attr, entry_attr_timeout(&outarg), 0);
819 	if (!inode) {
820 		fuse_queue_forget(fm->fc, forget, outarg.nodeid, 1);
821 		return -ENOMEM;
822 	}
823 	kfree(forget);
824 
825 	d_drop(entry);
826 	d = d_splice_alias(inode, entry);
827 	if (IS_ERR(d))
828 		return PTR_ERR(d);
829 
830 	if (d) {
831 		fuse_change_entry_timeout(d, &outarg);
832 		dput(d);
833 	} else {
834 		fuse_change_entry_timeout(entry, &outarg);
835 	}
836 	fuse_dir_changed(dir);
837 	return 0;
838 
839  out_put_forget_req:
840 	kfree(forget);
841 	return err;
842 }
843 
844 static int fuse_mknod(struct mnt_idmap *idmap, struct inode *dir,
845 		      struct dentry *entry, umode_t mode, dev_t rdev)
846 {
847 	struct fuse_mknod_in inarg;
848 	struct fuse_mount *fm = get_fuse_mount(dir);
849 	FUSE_ARGS(args);
850 
851 	if (!fm->fc->dont_mask)
852 		mode &= ~current_umask();
853 
854 	memset(&inarg, 0, sizeof(inarg));
855 	inarg.mode = mode;
856 	inarg.rdev = new_encode_dev(rdev);
857 	inarg.umask = current_umask();
858 	args.opcode = FUSE_MKNOD;
859 	args.in_numargs = 2;
860 	args.in_args[0].size = sizeof(inarg);
861 	args.in_args[0].value = &inarg;
862 	args.in_args[1].size = entry->d_name.len + 1;
863 	args.in_args[1].value = entry->d_name.name;
864 	return create_new_entry(fm, &args, dir, entry, mode);
865 }
866 
867 static int fuse_create(struct mnt_idmap *idmap, struct inode *dir,
868 		       struct dentry *entry, umode_t mode, bool excl)
869 {
870 	return fuse_mknod(&nop_mnt_idmap, dir, entry, mode, 0);
871 }
872 
873 static int fuse_tmpfile(struct mnt_idmap *idmap, struct inode *dir,
874 			struct file *file, umode_t mode)
875 {
876 	struct fuse_conn *fc = get_fuse_conn(dir);
877 	int err;
878 
879 	if (fc->no_tmpfile)
880 		return -EOPNOTSUPP;
881 
882 	err = fuse_create_open(dir, file->f_path.dentry, file, file->f_flags, mode, FUSE_TMPFILE);
883 	if (err == -ENOSYS) {
884 		fc->no_tmpfile = 1;
885 		err = -EOPNOTSUPP;
886 	}
887 	return err;
888 }
889 
890 static int fuse_mkdir(struct mnt_idmap *idmap, struct inode *dir,
891 		      struct dentry *entry, umode_t mode)
892 {
893 	struct fuse_mkdir_in inarg;
894 	struct fuse_mount *fm = get_fuse_mount(dir);
895 	FUSE_ARGS(args);
896 
897 	if (!fm->fc->dont_mask)
898 		mode &= ~current_umask();
899 
900 	memset(&inarg, 0, sizeof(inarg));
901 	inarg.mode = mode;
902 	inarg.umask = current_umask();
903 	args.opcode = FUSE_MKDIR;
904 	args.in_numargs = 2;
905 	args.in_args[0].size = sizeof(inarg);
906 	args.in_args[0].value = &inarg;
907 	args.in_args[1].size = entry->d_name.len + 1;
908 	args.in_args[1].value = entry->d_name.name;
909 	return create_new_entry(fm, &args, dir, entry, S_IFDIR);
910 }
911 
912 static int fuse_symlink(struct mnt_idmap *idmap, struct inode *dir,
913 			struct dentry *entry, const char *link)
914 {
915 	struct fuse_mount *fm = get_fuse_mount(dir);
916 	unsigned len = strlen(link) + 1;
917 	FUSE_ARGS(args);
918 
919 	args.opcode = FUSE_SYMLINK;
920 	args.in_numargs = 2;
921 	args.in_args[0].size = entry->d_name.len + 1;
922 	args.in_args[0].value = entry->d_name.name;
923 	args.in_args[1].size = len;
924 	args.in_args[1].value = link;
925 	return create_new_entry(fm, &args, dir, entry, S_IFLNK);
926 }
927 
928 void fuse_flush_time_update(struct inode *inode)
929 {
930 	int err = sync_inode_metadata(inode, 1);
931 
932 	mapping_set_error(inode->i_mapping, err);
933 }
934 
935 static void fuse_update_ctime_in_cache(struct inode *inode)
936 {
937 	if (!IS_NOCMTIME(inode)) {
938 		inode->i_ctime = current_time(inode);
939 		mark_inode_dirty_sync(inode);
940 		fuse_flush_time_update(inode);
941 	}
942 }
943 
944 void fuse_update_ctime(struct inode *inode)
945 {
946 	fuse_invalidate_attr_mask(inode, STATX_CTIME);
947 	fuse_update_ctime_in_cache(inode);
948 }
949 
950 static void fuse_entry_unlinked(struct dentry *entry)
951 {
952 	struct inode *inode = d_inode(entry);
953 	struct fuse_conn *fc = get_fuse_conn(inode);
954 	struct fuse_inode *fi = get_fuse_inode(inode);
955 
956 	spin_lock(&fi->lock);
957 	fi->attr_version = atomic64_inc_return(&fc->attr_version);
958 	/*
959 	 * If i_nlink == 0 then unlink doesn't make sense, yet this can
960 	 * happen if userspace filesystem is careless.  It would be
961 	 * difficult to enforce correct nlink usage so just ignore this
962 	 * condition here
963 	 */
964 	if (S_ISDIR(inode->i_mode))
965 		clear_nlink(inode);
966 	else if (inode->i_nlink > 0)
967 		drop_nlink(inode);
968 	spin_unlock(&fi->lock);
969 	fuse_invalidate_entry_cache(entry);
970 	fuse_update_ctime(inode);
971 }
972 
973 static int fuse_unlink(struct inode *dir, struct dentry *entry)
974 {
975 	int err;
976 	struct fuse_mount *fm = get_fuse_mount(dir);
977 	FUSE_ARGS(args);
978 
979 	if (fuse_is_bad(dir))
980 		return -EIO;
981 
982 	args.opcode = FUSE_UNLINK;
983 	args.nodeid = get_node_id(dir);
984 	args.in_numargs = 1;
985 	args.in_args[0].size = entry->d_name.len + 1;
986 	args.in_args[0].value = entry->d_name.name;
987 	err = fuse_simple_request(fm, &args);
988 	if (!err) {
989 		fuse_dir_changed(dir);
990 		fuse_entry_unlinked(entry);
991 	} else if (err == -EINTR)
992 		fuse_invalidate_entry(entry);
993 	return err;
994 }
995 
996 static int fuse_rmdir(struct inode *dir, struct dentry *entry)
997 {
998 	int err;
999 	struct fuse_mount *fm = get_fuse_mount(dir);
1000 	FUSE_ARGS(args);
1001 
1002 	if (fuse_is_bad(dir))
1003 		return -EIO;
1004 
1005 	args.opcode = FUSE_RMDIR;
1006 	args.nodeid = get_node_id(dir);
1007 	args.in_numargs = 1;
1008 	args.in_args[0].size = entry->d_name.len + 1;
1009 	args.in_args[0].value = entry->d_name.name;
1010 	err = fuse_simple_request(fm, &args);
1011 	if (!err) {
1012 		fuse_dir_changed(dir);
1013 		fuse_entry_unlinked(entry);
1014 	} else if (err == -EINTR)
1015 		fuse_invalidate_entry(entry);
1016 	return err;
1017 }
1018 
1019 static int fuse_rename_common(struct inode *olddir, struct dentry *oldent,
1020 			      struct inode *newdir, struct dentry *newent,
1021 			      unsigned int flags, int opcode, size_t argsize)
1022 {
1023 	int err;
1024 	struct fuse_rename2_in inarg;
1025 	struct fuse_mount *fm = get_fuse_mount(olddir);
1026 	FUSE_ARGS(args);
1027 
1028 	memset(&inarg, 0, argsize);
1029 	inarg.newdir = get_node_id(newdir);
1030 	inarg.flags = flags;
1031 	args.opcode = opcode;
1032 	args.nodeid = get_node_id(olddir);
1033 	args.in_numargs = 3;
1034 	args.in_args[0].size = argsize;
1035 	args.in_args[0].value = &inarg;
1036 	args.in_args[1].size = oldent->d_name.len + 1;
1037 	args.in_args[1].value = oldent->d_name.name;
1038 	args.in_args[2].size = newent->d_name.len + 1;
1039 	args.in_args[2].value = newent->d_name.name;
1040 	err = fuse_simple_request(fm, &args);
1041 	if (!err) {
1042 		/* ctime changes */
1043 		fuse_update_ctime(d_inode(oldent));
1044 
1045 		if (flags & RENAME_EXCHANGE)
1046 			fuse_update_ctime(d_inode(newent));
1047 
1048 		fuse_dir_changed(olddir);
1049 		if (olddir != newdir)
1050 			fuse_dir_changed(newdir);
1051 
1052 		/* newent will end up negative */
1053 		if (!(flags & RENAME_EXCHANGE) && d_really_is_positive(newent))
1054 			fuse_entry_unlinked(newent);
1055 	} else if (err == -EINTR) {
1056 		/* If request was interrupted, DEITY only knows if the
1057 		   rename actually took place.  If the invalidation
1058 		   fails (e.g. some process has CWD under the renamed
1059 		   directory), then there can be inconsistency between
1060 		   the dcache and the real filesystem.  Tough luck. */
1061 		fuse_invalidate_entry(oldent);
1062 		if (d_really_is_positive(newent))
1063 			fuse_invalidate_entry(newent);
1064 	}
1065 
1066 	return err;
1067 }
1068 
1069 static int fuse_rename2(struct mnt_idmap *idmap, struct inode *olddir,
1070 			struct dentry *oldent, struct inode *newdir,
1071 			struct dentry *newent, unsigned int flags)
1072 {
1073 	struct fuse_conn *fc = get_fuse_conn(olddir);
1074 	int err;
1075 
1076 	if (fuse_is_bad(olddir))
1077 		return -EIO;
1078 
1079 	if (flags & ~(RENAME_NOREPLACE | RENAME_EXCHANGE | RENAME_WHITEOUT))
1080 		return -EINVAL;
1081 
1082 	if (flags) {
1083 		if (fc->no_rename2 || fc->minor < 23)
1084 			return -EINVAL;
1085 
1086 		err = fuse_rename_common(olddir, oldent, newdir, newent, flags,
1087 					 FUSE_RENAME2,
1088 					 sizeof(struct fuse_rename2_in));
1089 		if (err == -ENOSYS) {
1090 			fc->no_rename2 = 1;
1091 			err = -EINVAL;
1092 		}
1093 	} else {
1094 		err = fuse_rename_common(olddir, oldent, newdir, newent, 0,
1095 					 FUSE_RENAME,
1096 					 sizeof(struct fuse_rename_in));
1097 	}
1098 
1099 	return err;
1100 }
1101 
1102 static int fuse_link(struct dentry *entry, struct inode *newdir,
1103 		     struct dentry *newent)
1104 {
1105 	int err;
1106 	struct fuse_link_in inarg;
1107 	struct inode *inode = d_inode(entry);
1108 	struct fuse_mount *fm = get_fuse_mount(inode);
1109 	FUSE_ARGS(args);
1110 
1111 	memset(&inarg, 0, sizeof(inarg));
1112 	inarg.oldnodeid = get_node_id(inode);
1113 	args.opcode = FUSE_LINK;
1114 	args.in_numargs = 2;
1115 	args.in_args[0].size = sizeof(inarg);
1116 	args.in_args[0].value = &inarg;
1117 	args.in_args[1].size = newent->d_name.len + 1;
1118 	args.in_args[1].value = newent->d_name.name;
1119 	err = create_new_entry(fm, &args, newdir, newent, inode->i_mode);
1120 	if (!err)
1121 		fuse_update_ctime_in_cache(inode);
1122 	else if (err == -EINTR)
1123 		fuse_invalidate_attr(inode);
1124 
1125 	return err;
1126 }
1127 
1128 static void fuse_fillattr(struct inode *inode, struct fuse_attr *attr,
1129 			  struct kstat *stat)
1130 {
1131 	unsigned int blkbits;
1132 	struct fuse_conn *fc = get_fuse_conn(inode);
1133 
1134 	stat->dev = inode->i_sb->s_dev;
1135 	stat->ino = attr->ino;
1136 	stat->mode = (inode->i_mode & S_IFMT) | (attr->mode & 07777);
1137 	stat->nlink = attr->nlink;
1138 	stat->uid = make_kuid(fc->user_ns, attr->uid);
1139 	stat->gid = make_kgid(fc->user_ns, attr->gid);
1140 	stat->rdev = inode->i_rdev;
1141 	stat->atime.tv_sec = attr->atime;
1142 	stat->atime.tv_nsec = attr->atimensec;
1143 	stat->mtime.tv_sec = attr->mtime;
1144 	stat->mtime.tv_nsec = attr->mtimensec;
1145 	stat->ctime.tv_sec = attr->ctime;
1146 	stat->ctime.tv_nsec = attr->ctimensec;
1147 	stat->size = attr->size;
1148 	stat->blocks = attr->blocks;
1149 
1150 	if (attr->blksize != 0)
1151 		blkbits = ilog2(attr->blksize);
1152 	else
1153 		blkbits = inode->i_sb->s_blocksize_bits;
1154 
1155 	stat->blksize = 1 << blkbits;
1156 }
1157 
1158 static int fuse_do_getattr(struct inode *inode, struct kstat *stat,
1159 			   struct file *file)
1160 {
1161 	int err;
1162 	struct fuse_getattr_in inarg;
1163 	struct fuse_attr_out outarg;
1164 	struct fuse_mount *fm = get_fuse_mount(inode);
1165 	FUSE_ARGS(args);
1166 	u64 attr_version;
1167 
1168 	attr_version = fuse_get_attr_version(fm->fc);
1169 
1170 	memset(&inarg, 0, sizeof(inarg));
1171 	memset(&outarg, 0, sizeof(outarg));
1172 	/* Directories have separate file-handle space */
1173 	if (file && S_ISREG(inode->i_mode)) {
1174 		struct fuse_file *ff = file->private_data;
1175 
1176 		inarg.getattr_flags |= FUSE_GETATTR_FH;
1177 		inarg.fh = ff->fh;
1178 	}
1179 	args.opcode = FUSE_GETATTR;
1180 	args.nodeid = get_node_id(inode);
1181 	args.in_numargs = 1;
1182 	args.in_args[0].size = sizeof(inarg);
1183 	args.in_args[0].value = &inarg;
1184 	args.out_numargs = 1;
1185 	args.out_args[0].size = sizeof(outarg);
1186 	args.out_args[0].value = &outarg;
1187 	err = fuse_simple_request(fm, &args);
1188 	if (!err) {
1189 		if (fuse_invalid_attr(&outarg.attr) ||
1190 		    inode_wrong_type(inode, outarg.attr.mode)) {
1191 			fuse_make_bad(inode);
1192 			err = -EIO;
1193 		} else {
1194 			fuse_change_attributes(inode, &outarg.attr,
1195 					       attr_timeout(&outarg),
1196 					       attr_version);
1197 			if (stat)
1198 				fuse_fillattr(inode, &outarg.attr, stat);
1199 		}
1200 	}
1201 	return err;
1202 }
1203 
1204 static int fuse_update_get_attr(struct inode *inode, struct file *file,
1205 				struct kstat *stat, u32 request_mask,
1206 				unsigned int flags)
1207 {
1208 	struct fuse_inode *fi = get_fuse_inode(inode);
1209 	int err = 0;
1210 	bool sync;
1211 	u32 inval_mask = READ_ONCE(fi->inval_mask);
1212 	u32 cache_mask = fuse_get_cache_mask(inode);
1213 
1214 	if (flags & AT_STATX_FORCE_SYNC)
1215 		sync = true;
1216 	else if (flags & AT_STATX_DONT_SYNC)
1217 		sync = false;
1218 	else if (request_mask & inval_mask & ~cache_mask)
1219 		sync = true;
1220 	else
1221 		sync = time_before64(fi->i_time, get_jiffies_64());
1222 
1223 	if (sync) {
1224 		forget_all_cached_acls(inode);
1225 		err = fuse_do_getattr(inode, stat, file);
1226 	} else if (stat) {
1227 		generic_fillattr(&nop_mnt_idmap, inode, stat);
1228 		stat->mode = fi->orig_i_mode;
1229 		stat->ino = fi->orig_ino;
1230 	}
1231 
1232 	return err;
1233 }
1234 
1235 int fuse_update_attributes(struct inode *inode, struct file *file, u32 mask)
1236 {
1237 	return fuse_update_get_attr(inode, file, NULL, mask, 0);
1238 }
1239 
1240 int fuse_reverse_inval_entry(struct fuse_conn *fc, u64 parent_nodeid,
1241 			     u64 child_nodeid, struct qstr *name, u32 flags)
1242 {
1243 	int err = -ENOTDIR;
1244 	struct inode *parent;
1245 	struct dentry *dir;
1246 	struct dentry *entry;
1247 
1248 	parent = fuse_ilookup(fc, parent_nodeid, NULL);
1249 	if (!parent)
1250 		return -ENOENT;
1251 
1252 	inode_lock_nested(parent, I_MUTEX_PARENT);
1253 	if (!S_ISDIR(parent->i_mode))
1254 		goto unlock;
1255 
1256 	err = -ENOENT;
1257 	dir = d_find_alias(parent);
1258 	if (!dir)
1259 		goto unlock;
1260 
1261 	name->hash = full_name_hash(dir, name->name, name->len);
1262 	entry = d_lookup(dir, name);
1263 	dput(dir);
1264 	if (!entry)
1265 		goto unlock;
1266 
1267 	fuse_dir_changed(parent);
1268 	if (!(flags & FUSE_EXPIRE_ONLY))
1269 		d_invalidate(entry);
1270 	fuse_invalidate_entry_cache(entry);
1271 
1272 	if (child_nodeid != 0 && d_really_is_positive(entry)) {
1273 		inode_lock(d_inode(entry));
1274 		if (get_node_id(d_inode(entry)) != child_nodeid) {
1275 			err = -ENOENT;
1276 			goto badentry;
1277 		}
1278 		if (d_mountpoint(entry)) {
1279 			err = -EBUSY;
1280 			goto badentry;
1281 		}
1282 		if (d_is_dir(entry)) {
1283 			shrink_dcache_parent(entry);
1284 			if (!simple_empty(entry)) {
1285 				err = -ENOTEMPTY;
1286 				goto badentry;
1287 			}
1288 			d_inode(entry)->i_flags |= S_DEAD;
1289 		}
1290 		dont_mount(entry);
1291 		clear_nlink(d_inode(entry));
1292 		err = 0;
1293  badentry:
1294 		inode_unlock(d_inode(entry));
1295 		if (!err)
1296 			d_delete(entry);
1297 	} else {
1298 		err = 0;
1299 	}
1300 	dput(entry);
1301 
1302  unlock:
1303 	inode_unlock(parent);
1304 	iput(parent);
1305 	return err;
1306 }
1307 
1308 static inline bool fuse_permissible_uidgid(struct fuse_conn *fc)
1309 {
1310 	const struct cred *cred = current_cred();
1311 
1312 	return (uid_eq(cred->euid, fc->user_id) &&
1313 		uid_eq(cred->suid, fc->user_id) &&
1314 		uid_eq(cred->uid,  fc->user_id) &&
1315 		gid_eq(cred->egid, fc->group_id) &&
1316 		gid_eq(cred->sgid, fc->group_id) &&
1317 		gid_eq(cred->gid,  fc->group_id));
1318 }
1319 
1320 /*
1321  * Calling into a user-controlled filesystem gives the filesystem
1322  * daemon ptrace-like capabilities over the current process.  This
1323  * means, that the filesystem daemon is able to record the exact
1324  * filesystem operations performed, and can also control the behavior
1325  * of the requester process in otherwise impossible ways.  For example
1326  * it can delay the operation for arbitrary length of time allowing
1327  * DoS against the requester.
1328  *
1329  * For this reason only those processes can call into the filesystem,
1330  * for which the owner of the mount has ptrace privilege.  This
1331  * excludes processes started by other users, suid or sgid processes.
1332  */
1333 bool fuse_allow_current_process(struct fuse_conn *fc)
1334 {
1335 	bool allow;
1336 
1337 	if (fc->allow_other)
1338 		allow = current_in_userns(fc->user_ns);
1339 	else
1340 		allow = fuse_permissible_uidgid(fc);
1341 
1342 	if (!allow && allow_sys_admin_access && capable(CAP_SYS_ADMIN))
1343 		allow = true;
1344 
1345 	return allow;
1346 }
1347 
1348 static int fuse_access(struct inode *inode, int mask)
1349 {
1350 	struct fuse_mount *fm = get_fuse_mount(inode);
1351 	FUSE_ARGS(args);
1352 	struct fuse_access_in inarg;
1353 	int err;
1354 
1355 	BUG_ON(mask & MAY_NOT_BLOCK);
1356 
1357 	if (fm->fc->no_access)
1358 		return 0;
1359 
1360 	memset(&inarg, 0, sizeof(inarg));
1361 	inarg.mask = mask & (MAY_READ | MAY_WRITE | MAY_EXEC);
1362 	args.opcode = FUSE_ACCESS;
1363 	args.nodeid = get_node_id(inode);
1364 	args.in_numargs = 1;
1365 	args.in_args[0].size = sizeof(inarg);
1366 	args.in_args[0].value = &inarg;
1367 	err = fuse_simple_request(fm, &args);
1368 	if (err == -ENOSYS) {
1369 		fm->fc->no_access = 1;
1370 		err = 0;
1371 	}
1372 	return err;
1373 }
1374 
1375 static int fuse_perm_getattr(struct inode *inode, int mask)
1376 {
1377 	if (mask & MAY_NOT_BLOCK)
1378 		return -ECHILD;
1379 
1380 	forget_all_cached_acls(inode);
1381 	return fuse_do_getattr(inode, NULL, NULL);
1382 }
1383 
1384 /*
1385  * Check permission.  The two basic access models of FUSE are:
1386  *
1387  * 1) Local access checking ('default_permissions' mount option) based
1388  * on file mode.  This is the plain old disk filesystem permission
1389  * modell.
1390  *
1391  * 2) "Remote" access checking, where server is responsible for
1392  * checking permission in each inode operation.  An exception to this
1393  * is if ->permission() was invoked from sys_access() in which case an
1394  * access request is sent.  Execute permission is still checked
1395  * locally based on file mode.
1396  */
1397 static int fuse_permission(struct mnt_idmap *idmap,
1398 			   struct inode *inode, int mask)
1399 {
1400 	struct fuse_conn *fc = get_fuse_conn(inode);
1401 	bool refreshed = false;
1402 	int err = 0;
1403 
1404 	if (fuse_is_bad(inode))
1405 		return -EIO;
1406 
1407 	if (!fuse_allow_current_process(fc))
1408 		return -EACCES;
1409 
1410 	/*
1411 	 * If attributes are needed, refresh them before proceeding
1412 	 */
1413 	if (fc->default_permissions ||
1414 	    ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
1415 		struct fuse_inode *fi = get_fuse_inode(inode);
1416 		u32 perm_mask = STATX_MODE | STATX_UID | STATX_GID;
1417 
1418 		if (perm_mask & READ_ONCE(fi->inval_mask) ||
1419 		    time_before64(fi->i_time, get_jiffies_64())) {
1420 			refreshed = true;
1421 
1422 			err = fuse_perm_getattr(inode, mask);
1423 			if (err)
1424 				return err;
1425 		}
1426 	}
1427 
1428 	if (fc->default_permissions) {
1429 		err = generic_permission(&nop_mnt_idmap, inode, mask);
1430 
1431 		/* If permission is denied, try to refresh file
1432 		   attributes.  This is also needed, because the root
1433 		   node will at first have no permissions */
1434 		if (err == -EACCES && !refreshed) {
1435 			err = fuse_perm_getattr(inode, mask);
1436 			if (!err)
1437 				err = generic_permission(&nop_mnt_idmap,
1438 							 inode, mask);
1439 		}
1440 
1441 		/* Note: the opposite of the above test does not
1442 		   exist.  So if permissions are revoked this won't be
1443 		   noticed immediately, only after the attribute
1444 		   timeout has expired */
1445 	} else if (mask & (MAY_ACCESS | MAY_CHDIR)) {
1446 		err = fuse_access(inode, mask);
1447 	} else if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) {
1448 		if (!(inode->i_mode & S_IXUGO)) {
1449 			if (refreshed)
1450 				return -EACCES;
1451 
1452 			err = fuse_perm_getattr(inode, mask);
1453 			if (!err && !(inode->i_mode & S_IXUGO))
1454 				return -EACCES;
1455 		}
1456 	}
1457 	return err;
1458 }
1459 
1460 static int fuse_readlink_page(struct inode *inode, struct page *page)
1461 {
1462 	struct fuse_mount *fm = get_fuse_mount(inode);
1463 	struct fuse_page_desc desc = { .length = PAGE_SIZE - 1 };
1464 	struct fuse_args_pages ap = {
1465 		.num_pages = 1,
1466 		.pages = &page,
1467 		.descs = &desc,
1468 	};
1469 	char *link;
1470 	ssize_t res;
1471 
1472 	ap.args.opcode = FUSE_READLINK;
1473 	ap.args.nodeid = get_node_id(inode);
1474 	ap.args.out_pages = true;
1475 	ap.args.out_argvar = true;
1476 	ap.args.page_zeroing = true;
1477 	ap.args.out_numargs = 1;
1478 	ap.args.out_args[0].size = desc.length;
1479 	res = fuse_simple_request(fm, &ap.args);
1480 
1481 	fuse_invalidate_atime(inode);
1482 
1483 	if (res < 0)
1484 		return res;
1485 
1486 	if (WARN_ON(res >= PAGE_SIZE))
1487 		return -EIO;
1488 
1489 	link = page_address(page);
1490 	link[res] = '\0';
1491 
1492 	return 0;
1493 }
1494 
1495 static const char *fuse_get_link(struct dentry *dentry, struct inode *inode,
1496 				 struct delayed_call *callback)
1497 {
1498 	struct fuse_conn *fc = get_fuse_conn(inode);
1499 	struct page *page;
1500 	int err;
1501 
1502 	err = -EIO;
1503 	if (fuse_is_bad(inode))
1504 		goto out_err;
1505 
1506 	if (fc->cache_symlinks)
1507 		return page_get_link(dentry, inode, callback);
1508 
1509 	err = -ECHILD;
1510 	if (!dentry)
1511 		goto out_err;
1512 
1513 	page = alloc_page(GFP_KERNEL);
1514 	err = -ENOMEM;
1515 	if (!page)
1516 		goto out_err;
1517 
1518 	err = fuse_readlink_page(inode, page);
1519 	if (err) {
1520 		__free_page(page);
1521 		goto out_err;
1522 	}
1523 
1524 	set_delayed_call(callback, page_put_link, page);
1525 
1526 	return page_address(page);
1527 
1528 out_err:
1529 	return ERR_PTR(err);
1530 }
1531 
1532 static int fuse_dir_open(struct inode *inode, struct file *file)
1533 {
1534 	return fuse_open_common(inode, file, true);
1535 }
1536 
1537 static int fuse_dir_release(struct inode *inode, struct file *file)
1538 {
1539 	fuse_release_common(file, true);
1540 
1541 	return 0;
1542 }
1543 
1544 static int fuse_dir_fsync(struct file *file, loff_t start, loff_t end,
1545 			  int datasync)
1546 {
1547 	struct inode *inode = file->f_mapping->host;
1548 	struct fuse_conn *fc = get_fuse_conn(inode);
1549 	int err;
1550 
1551 	if (fuse_is_bad(inode))
1552 		return -EIO;
1553 
1554 	if (fc->no_fsyncdir)
1555 		return 0;
1556 
1557 	inode_lock(inode);
1558 	err = fuse_fsync_common(file, start, end, datasync, FUSE_FSYNCDIR);
1559 	if (err == -ENOSYS) {
1560 		fc->no_fsyncdir = 1;
1561 		err = 0;
1562 	}
1563 	inode_unlock(inode);
1564 
1565 	return err;
1566 }
1567 
1568 static long fuse_dir_ioctl(struct file *file, unsigned int cmd,
1569 			    unsigned long arg)
1570 {
1571 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1572 
1573 	/* FUSE_IOCTL_DIR only supported for API version >= 7.18 */
1574 	if (fc->minor < 18)
1575 		return -ENOTTY;
1576 
1577 	return fuse_ioctl_common(file, cmd, arg, FUSE_IOCTL_DIR);
1578 }
1579 
1580 static long fuse_dir_compat_ioctl(struct file *file, unsigned int cmd,
1581 				   unsigned long arg)
1582 {
1583 	struct fuse_conn *fc = get_fuse_conn(file->f_mapping->host);
1584 
1585 	if (fc->minor < 18)
1586 		return -ENOTTY;
1587 
1588 	return fuse_ioctl_common(file, cmd, arg,
1589 				 FUSE_IOCTL_COMPAT | FUSE_IOCTL_DIR);
1590 }
1591 
1592 static bool update_mtime(unsigned ivalid, bool trust_local_mtime)
1593 {
1594 	/* Always update if mtime is explicitly set  */
1595 	if (ivalid & ATTR_MTIME_SET)
1596 		return true;
1597 
1598 	/* Or if kernel i_mtime is the official one */
1599 	if (trust_local_mtime)
1600 		return true;
1601 
1602 	/* If it's an open(O_TRUNC) or an ftruncate(), don't update */
1603 	if ((ivalid & ATTR_SIZE) && (ivalid & (ATTR_OPEN | ATTR_FILE)))
1604 		return false;
1605 
1606 	/* In all other cases update */
1607 	return true;
1608 }
1609 
1610 static void iattr_to_fattr(struct fuse_conn *fc, struct iattr *iattr,
1611 			   struct fuse_setattr_in *arg, bool trust_local_cmtime)
1612 {
1613 	unsigned ivalid = iattr->ia_valid;
1614 
1615 	if (ivalid & ATTR_MODE)
1616 		arg->valid |= FATTR_MODE,   arg->mode = iattr->ia_mode;
1617 	if (ivalid & ATTR_UID)
1618 		arg->valid |= FATTR_UID,    arg->uid = from_kuid(fc->user_ns, iattr->ia_uid);
1619 	if (ivalid & ATTR_GID)
1620 		arg->valid |= FATTR_GID,    arg->gid = from_kgid(fc->user_ns, iattr->ia_gid);
1621 	if (ivalid & ATTR_SIZE)
1622 		arg->valid |= FATTR_SIZE,   arg->size = iattr->ia_size;
1623 	if (ivalid & ATTR_ATIME) {
1624 		arg->valid |= FATTR_ATIME;
1625 		arg->atime = iattr->ia_atime.tv_sec;
1626 		arg->atimensec = iattr->ia_atime.tv_nsec;
1627 		if (!(ivalid & ATTR_ATIME_SET))
1628 			arg->valid |= FATTR_ATIME_NOW;
1629 	}
1630 	if ((ivalid & ATTR_MTIME) && update_mtime(ivalid, trust_local_cmtime)) {
1631 		arg->valid |= FATTR_MTIME;
1632 		arg->mtime = iattr->ia_mtime.tv_sec;
1633 		arg->mtimensec = iattr->ia_mtime.tv_nsec;
1634 		if (!(ivalid & ATTR_MTIME_SET) && !trust_local_cmtime)
1635 			arg->valid |= FATTR_MTIME_NOW;
1636 	}
1637 	if ((ivalid & ATTR_CTIME) && trust_local_cmtime) {
1638 		arg->valid |= FATTR_CTIME;
1639 		arg->ctime = iattr->ia_ctime.tv_sec;
1640 		arg->ctimensec = iattr->ia_ctime.tv_nsec;
1641 	}
1642 }
1643 
1644 /*
1645  * Prevent concurrent writepages on inode
1646  *
1647  * This is done by adding a negative bias to the inode write counter
1648  * and waiting for all pending writes to finish.
1649  */
1650 void fuse_set_nowrite(struct inode *inode)
1651 {
1652 	struct fuse_inode *fi = get_fuse_inode(inode);
1653 
1654 	BUG_ON(!inode_is_locked(inode));
1655 
1656 	spin_lock(&fi->lock);
1657 	BUG_ON(fi->writectr < 0);
1658 	fi->writectr += FUSE_NOWRITE;
1659 	spin_unlock(&fi->lock);
1660 	wait_event(fi->page_waitq, fi->writectr == FUSE_NOWRITE);
1661 }
1662 
1663 /*
1664  * Allow writepages on inode
1665  *
1666  * Remove the bias from the writecounter and send any queued
1667  * writepages.
1668  */
1669 static void __fuse_release_nowrite(struct inode *inode)
1670 {
1671 	struct fuse_inode *fi = get_fuse_inode(inode);
1672 
1673 	BUG_ON(fi->writectr != FUSE_NOWRITE);
1674 	fi->writectr = 0;
1675 	fuse_flush_writepages(inode);
1676 }
1677 
1678 void fuse_release_nowrite(struct inode *inode)
1679 {
1680 	struct fuse_inode *fi = get_fuse_inode(inode);
1681 
1682 	spin_lock(&fi->lock);
1683 	__fuse_release_nowrite(inode);
1684 	spin_unlock(&fi->lock);
1685 }
1686 
1687 static void fuse_setattr_fill(struct fuse_conn *fc, struct fuse_args *args,
1688 			      struct inode *inode,
1689 			      struct fuse_setattr_in *inarg_p,
1690 			      struct fuse_attr_out *outarg_p)
1691 {
1692 	args->opcode = FUSE_SETATTR;
1693 	args->nodeid = get_node_id(inode);
1694 	args->in_numargs = 1;
1695 	args->in_args[0].size = sizeof(*inarg_p);
1696 	args->in_args[0].value = inarg_p;
1697 	args->out_numargs = 1;
1698 	args->out_args[0].size = sizeof(*outarg_p);
1699 	args->out_args[0].value = outarg_p;
1700 }
1701 
1702 /*
1703  * Flush inode->i_mtime to the server
1704  */
1705 int fuse_flush_times(struct inode *inode, struct fuse_file *ff)
1706 {
1707 	struct fuse_mount *fm = get_fuse_mount(inode);
1708 	FUSE_ARGS(args);
1709 	struct fuse_setattr_in inarg;
1710 	struct fuse_attr_out outarg;
1711 
1712 	memset(&inarg, 0, sizeof(inarg));
1713 	memset(&outarg, 0, sizeof(outarg));
1714 
1715 	inarg.valid = FATTR_MTIME;
1716 	inarg.mtime = inode->i_mtime.tv_sec;
1717 	inarg.mtimensec = inode->i_mtime.tv_nsec;
1718 	if (fm->fc->minor >= 23) {
1719 		inarg.valid |= FATTR_CTIME;
1720 		inarg.ctime = inode->i_ctime.tv_sec;
1721 		inarg.ctimensec = inode->i_ctime.tv_nsec;
1722 	}
1723 	if (ff) {
1724 		inarg.valid |= FATTR_FH;
1725 		inarg.fh = ff->fh;
1726 	}
1727 	fuse_setattr_fill(fm->fc, &args, inode, &inarg, &outarg);
1728 
1729 	return fuse_simple_request(fm, &args);
1730 }
1731 
1732 /*
1733  * Set attributes, and at the same time refresh them.
1734  *
1735  * Truncation is slightly complicated, because the 'truncate' request
1736  * may fail, in which case we don't want to touch the mapping.
1737  * vmtruncate() doesn't allow for this case, so do the rlimit checking
1738  * and the actual truncation by hand.
1739  */
1740 int fuse_do_setattr(struct dentry *dentry, struct iattr *attr,
1741 		    struct file *file)
1742 {
1743 	struct inode *inode = d_inode(dentry);
1744 	struct fuse_mount *fm = get_fuse_mount(inode);
1745 	struct fuse_conn *fc = fm->fc;
1746 	struct fuse_inode *fi = get_fuse_inode(inode);
1747 	struct address_space *mapping = inode->i_mapping;
1748 	FUSE_ARGS(args);
1749 	struct fuse_setattr_in inarg;
1750 	struct fuse_attr_out outarg;
1751 	bool is_truncate = false;
1752 	bool is_wb = fc->writeback_cache && S_ISREG(inode->i_mode);
1753 	loff_t oldsize;
1754 	int err;
1755 	bool trust_local_cmtime = is_wb;
1756 	bool fault_blocked = false;
1757 
1758 	if (!fc->default_permissions)
1759 		attr->ia_valid |= ATTR_FORCE;
1760 
1761 	err = setattr_prepare(&nop_mnt_idmap, dentry, attr);
1762 	if (err)
1763 		return err;
1764 
1765 	if (attr->ia_valid & ATTR_SIZE) {
1766 		if (WARN_ON(!S_ISREG(inode->i_mode)))
1767 			return -EIO;
1768 		is_truncate = true;
1769 	}
1770 
1771 	if (FUSE_IS_DAX(inode) && is_truncate) {
1772 		filemap_invalidate_lock(mapping);
1773 		fault_blocked = true;
1774 		err = fuse_dax_break_layouts(inode, 0, 0);
1775 		if (err) {
1776 			filemap_invalidate_unlock(mapping);
1777 			return err;
1778 		}
1779 	}
1780 
1781 	if (attr->ia_valid & ATTR_OPEN) {
1782 		/* This is coming from open(..., ... | O_TRUNC); */
1783 		WARN_ON(!(attr->ia_valid & ATTR_SIZE));
1784 		WARN_ON(attr->ia_size != 0);
1785 		if (fc->atomic_o_trunc) {
1786 			/*
1787 			 * No need to send request to userspace, since actual
1788 			 * truncation has already been done by OPEN.  But still
1789 			 * need to truncate page cache.
1790 			 */
1791 			i_size_write(inode, 0);
1792 			truncate_pagecache(inode, 0);
1793 			goto out;
1794 		}
1795 		file = NULL;
1796 	}
1797 
1798 	/* Flush dirty data/metadata before non-truncate SETATTR */
1799 	if (is_wb &&
1800 	    attr->ia_valid &
1801 			(ATTR_MODE | ATTR_UID | ATTR_GID | ATTR_MTIME_SET |
1802 			 ATTR_TIMES_SET)) {
1803 		err = write_inode_now(inode, true);
1804 		if (err)
1805 			return err;
1806 
1807 		fuse_set_nowrite(inode);
1808 		fuse_release_nowrite(inode);
1809 	}
1810 
1811 	if (is_truncate) {
1812 		fuse_set_nowrite(inode);
1813 		set_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1814 		if (trust_local_cmtime && attr->ia_size != inode->i_size)
1815 			attr->ia_valid |= ATTR_MTIME | ATTR_CTIME;
1816 	}
1817 
1818 	memset(&inarg, 0, sizeof(inarg));
1819 	memset(&outarg, 0, sizeof(outarg));
1820 	iattr_to_fattr(fc, attr, &inarg, trust_local_cmtime);
1821 	if (file) {
1822 		struct fuse_file *ff = file->private_data;
1823 		inarg.valid |= FATTR_FH;
1824 		inarg.fh = ff->fh;
1825 	}
1826 
1827 	/* Kill suid/sgid for non-directory chown unconditionally */
1828 	if (fc->handle_killpriv_v2 && !S_ISDIR(inode->i_mode) &&
1829 	    attr->ia_valid & (ATTR_UID | ATTR_GID))
1830 		inarg.valid |= FATTR_KILL_SUIDGID;
1831 
1832 	if (attr->ia_valid & ATTR_SIZE) {
1833 		/* For mandatory locking in truncate */
1834 		inarg.valid |= FATTR_LOCKOWNER;
1835 		inarg.lock_owner = fuse_lock_owner_id(fc, current->files);
1836 
1837 		/* Kill suid/sgid for truncate only if no CAP_FSETID */
1838 		if (fc->handle_killpriv_v2 && !capable(CAP_FSETID))
1839 			inarg.valid |= FATTR_KILL_SUIDGID;
1840 	}
1841 	fuse_setattr_fill(fc, &args, inode, &inarg, &outarg);
1842 	err = fuse_simple_request(fm, &args);
1843 	if (err) {
1844 		if (err == -EINTR)
1845 			fuse_invalidate_attr(inode);
1846 		goto error;
1847 	}
1848 
1849 	if (fuse_invalid_attr(&outarg.attr) ||
1850 	    inode_wrong_type(inode, outarg.attr.mode)) {
1851 		fuse_make_bad(inode);
1852 		err = -EIO;
1853 		goto error;
1854 	}
1855 
1856 	spin_lock(&fi->lock);
1857 	/* the kernel maintains i_mtime locally */
1858 	if (trust_local_cmtime) {
1859 		if (attr->ia_valid & ATTR_MTIME)
1860 			inode->i_mtime = attr->ia_mtime;
1861 		if (attr->ia_valid & ATTR_CTIME)
1862 			inode->i_ctime = attr->ia_ctime;
1863 		/* FIXME: clear I_DIRTY_SYNC? */
1864 	}
1865 
1866 	fuse_change_attributes_common(inode, &outarg.attr,
1867 				      attr_timeout(&outarg),
1868 				      fuse_get_cache_mask(inode));
1869 	oldsize = inode->i_size;
1870 	/* see the comment in fuse_change_attributes() */
1871 	if (!is_wb || is_truncate)
1872 		i_size_write(inode, outarg.attr.size);
1873 
1874 	if (is_truncate) {
1875 		/* NOTE: this may release/reacquire fi->lock */
1876 		__fuse_release_nowrite(inode);
1877 	}
1878 	spin_unlock(&fi->lock);
1879 
1880 	/*
1881 	 * Only call invalidate_inode_pages2() after removing
1882 	 * FUSE_NOWRITE, otherwise fuse_launder_folio() would deadlock.
1883 	 */
1884 	if ((is_truncate || !is_wb) &&
1885 	    S_ISREG(inode->i_mode) && oldsize != outarg.attr.size) {
1886 		truncate_pagecache(inode, outarg.attr.size);
1887 		invalidate_inode_pages2(mapping);
1888 	}
1889 
1890 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1891 out:
1892 	if (fault_blocked)
1893 		filemap_invalidate_unlock(mapping);
1894 
1895 	return 0;
1896 
1897 error:
1898 	if (is_truncate)
1899 		fuse_release_nowrite(inode);
1900 
1901 	clear_bit(FUSE_I_SIZE_UNSTABLE, &fi->state);
1902 
1903 	if (fault_blocked)
1904 		filemap_invalidate_unlock(mapping);
1905 	return err;
1906 }
1907 
1908 static int fuse_setattr(struct mnt_idmap *idmap, struct dentry *entry,
1909 			struct iattr *attr)
1910 {
1911 	struct inode *inode = d_inode(entry);
1912 	struct fuse_conn *fc = get_fuse_conn(inode);
1913 	struct file *file = (attr->ia_valid & ATTR_FILE) ? attr->ia_file : NULL;
1914 	int ret;
1915 
1916 	if (fuse_is_bad(inode))
1917 		return -EIO;
1918 
1919 	if (!fuse_allow_current_process(get_fuse_conn(inode)))
1920 		return -EACCES;
1921 
1922 	if (attr->ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) {
1923 		attr->ia_valid &= ~(ATTR_KILL_SUID | ATTR_KILL_SGID |
1924 				    ATTR_MODE);
1925 
1926 		/*
1927 		 * The only sane way to reliably kill suid/sgid is to do it in
1928 		 * the userspace filesystem
1929 		 *
1930 		 * This should be done on write(), truncate() and chown().
1931 		 */
1932 		if (!fc->handle_killpriv && !fc->handle_killpriv_v2) {
1933 			/*
1934 			 * ia_mode calculation may have used stale i_mode.
1935 			 * Refresh and recalculate.
1936 			 */
1937 			ret = fuse_do_getattr(inode, NULL, file);
1938 			if (ret)
1939 				return ret;
1940 
1941 			attr->ia_mode = inode->i_mode;
1942 			if (inode->i_mode & S_ISUID) {
1943 				attr->ia_valid |= ATTR_MODE;
1944 				attr->ia_mode &= ~S_ISUID;
1945 			}
1946 			if ((inode->i_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
1947 				attr->ia_valid |= ATTR_MODE;
1948 				attr->ia_mode &= ~S_ISGID;
1949 			}
1950 		}
1951 	}
1952 	if (!attr->ia_valid)
1953 		return 0;
1954 
1955 	ret = fuse_do_setattr(entry, attr, file);
1956 	if (!ret) {
1957 		/*
1958 		 * If filesystem supports acls it may have updated acl xattrs in
1959 		 * the filesystem, so forget cached acls for the inode.
1960 		 */
1961 		if (fc->posix_acl)
1962 			forget_all_cached_acls(inode);
1963 
1964 		/* Directory mode changed, may need to revalidate access */
1965 		if (d_is_dir(entry) && (attr->ia_valid & ATTR_MODE))
1966 			fuse_invalidate_entry_cache(entry);
1967 	}
1968 	return ret;
1969 }
1970 
1971 static int fuse_getattr(struct mnt_idmap *idmap,
1972 			const struct path *path, struct kstat *stat,
1973 			u32 request_mask, unsigned int flags)
1974 {
1975 	struct inode *inode = d_inode(path->dentry);
1976 	struct fuse_conn *fc = get_fuse_conn(inode);
1977 
1978 	if (fuse_is_bad(inode))
1979 		return -EIO;
1980 
1981 	if (!fuse_allow_current_process(fc)) {
1982 		if (!request_mask) {
1983 			/*
1984 			 * If user explicitly requested *nothing* then don't
1985 			 * error out, but return st_dev only.
1986 			 */
1987 			stat->result_mask = 0;
1988 			stat->dev = inode->i_sb->s_dev;
1989 			return 0;
1990 		}
1991 		return -EACCES;
1992 	}
1993 
1994 	return fuse_update_get_attr(inode, NULL, stat, request_mask, flags);
1995 }
1996 
1997 static const struct inode_operations fuse_dir_inode_operations = {
1998 	.lookup		= fuse_lookup,
1999 	.mkdir		= fuse_mkdir,
2000 	.symlink	= fuse_symlink,
2001 	.unlink		= fuse_unlink,
2002 	.rmdir		= fuse_rmdir,
2003 	.rename		= fuse_rename2,
2004 	.link		= fuse_link,
2005 	.setattr	= fuse_setattr,
2006 	.create		= fuse_create,
2007 	.atomic_open	= fuse_atomic_open,
2008 	.tmpfile	= fuse_tmpfile,
2009 	.mknod		= fuse_mknod,
2010 	.permission	= fuse_permission,
2011 	.getattr	= fuse_getattr,
2012 	.listxattr	= fuse_listxattr,
2013 	.get_inode_acl	= fuse_get_inode_acl,
2014 	.get_acl	= fuse_get_acl,
2015 	.set_acl	= fuse_set_acl,
2016 	.fileattr_get	= fuse_fileattr_get,
2017 	.fileattr_set	= fuse_fileattr_set,
2018 };
2019 
2020 static const struct file_operations fuse_dir_operations = {
2021 	.llseek		= generic_file_llseek,
2022 	.read		= generic_read_dir,
2023 	.iterate_shared	= fuse_readdir,
2024 	.open		= fuse_dir_open,
2025 	.release	= fuse_dir_release,
2026 	.fsync		= fuse_dir_fsync,
2027 	.unlocked_ioctl	= fuse_dir_ioctl,
2028 	.compat_ioctl	= fuse_dir_compat_ioctl,
2029 };
2030 
2031 static const struct inode_operations fuse_common_inode_operations = {
2032 	.setattr	= fuse_setattr,
2033 	.permission	= fuse_permission,
2034 	.getattr	= fuse_getattr,
2035 	.listxattr	= fuse_listxattr,
2036 	.get_inode_acl	= fuse_get_inode_acl,
2037 	.get_acl	= fuse_get_acl,
2038 	.set_acl	= fuse_set_acl,
2039 	.fileattr_get	= fuse_fileattr_get,
2040 	.fileattr_set	= fuse_fileattr_set,
2041 };
2042 
2043 static const struct inode_operations fuse_symlink_inode_operations = {
2044 	.setattr	= fuse_setattr,
2045 	.get_link	= fuse_get_link,
2046 	.getattr	= fuse_getattr,
2047 	.listxattr	= fuse_listxattr,
2048 };
2049 
2050 void fuse_init_common(struct inode *inode)
2051 {
2052 	inode->i_op = &fuse_common_inode_operations;
2053 }
2054 
2055 void fuse_init_dir(struct inode *inode)
2056 {
2057 	struct fuse_inode *fi = get_fuse_inode(inode);
2058 
2059 	inode->i_op = &fuse_dir_inode_operations;
2060 	inode->i_fop = &fuse_dir_operations;
2061 
2062 	spin_lock_init(&fi->rdc.lock);
2063 	fi->rdc.cached = false;
2064 	fi->rdc.size = 0;
2065 	fi->rdc.pos = 0;
2066 	fi->rdc.version = 0;
2067 }
2068 
2069 static int fuse_symlink_read_folio(struct file *null, struct folio *folio)
2070 {
2071 	int err = fuse_readlink_page(folio->mapping->host, &folio->page);
2072 
2073 	if (!err)
2074 		folio_mark_uptodate(folio);
2075 
2076 	folio_unlock(folio);
2077 
2078 	return err;
2079 }
2080 
2081 static const struct address_space_operations fuse_symlink_aops = {
2082 	.read_folio	= fuse_symlink_read_folio,
2083 };
2084 
2085 void fuse_init_symlink(struct inode *inode)
2086 {
2087 	inode->i_op = &fuse_symlink_inode_operations;
2088 	inode->i_data.a_ops = &fuse_symlink_aops;
2089 	inode_nohighmem(inode);
2090 }
2091