linux/fs/fuse/cuse.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0-only
   2/*
   3 * CUSE: Character device in Userspace
   4 *
   5 * Copyright (C) 2008-2009  SUSE Linux Products GmbH
   6 * Copyright (C) 2008-2009  Tejun Heo <tj@kernel.org>
   7 *
   8 * CUSE enables character devices to be implemented from userland much
   9 * like FUSE allows filesystems.  On initialization /dev/cuse is
  10 * created.  By opening the file and replying to the CUSE_INIT request
  11 * userland CUSE server can create a character device.  After that the
  12 * operation is very similar to FUSE.
  13 *
  14 * A CUSE instance involves the following objects.
  15 *
  16 * cuse_conn    : contains fuse_conn and serves as bonding structure
  17 * channel      : file handle connected to the userland CUSE server
  18 * cdev         : the implemented character device
  19 * dev          : generic device for cdev
  20 *
  21 * Note that 'channel' is what 'dev' is in FUSE.  As CUSE deals with
  22 * devices, it's called 'channel' to reduce confusion.
  23 *
  24 * channel determines when the character device dies.  When channel is
  25 * closed, everything begins to destruct.  The cuse_conn is taken off
  26 * the lookup table preventing further access from cdev, cdev and
  27 * generic device are removed and the base reference of cuse_conn is
  28 * put.
  29 *
  30 * On each open, the matching cuse_conn is looked up and if found an
  31 * additional reference is taken which is released when the file is
  32 * closed.
  33 */
  34
  35#define pr_fmt(fmt) "CUSE: " fmt
  36
  37#include <linux/fuse.h>
  38#include <linux/cdev.h>
  39#include <linux/device.h>
  40#include <linux/file.h>
  41#include <linux/fs.h>
  42#include <linux/kdev_t.h>
  43#include <linux/kthread.h>
  44#include <linux/list.h>
  45#include <linux/magic.h>
  46#include <linux/miscdevice.h>
  47#include <linux/mutex.h>
  48#include <linux/slab.h>
  49#include <linux/stat.h>
  50#include <linux/module.h>
  51#include <linux/uio.h>
  52#include <linux/user_namespace.h>
  53
  54#include "fuse_i.h"
  55
  56#define CUSE_CONNTBL_LEN        64
  57
  58struct cuse_conn {
  59        struct list_head        list;   /* linked on cuse_conntbl */
  60        struct fuse_mount       fm;     /* Dummy mount referencing fc */
  61        struct fuse_conn        fc;     /* fuse connection */
  62        struct cdev             *cdev;  /* associated character device */
  63        struct device           *dev;   /* device representing @cdev */
  64
  65        /* init parameters, set once during initialization */
  66        bool                    unrestricted_ioctl;
  67};
  68
  69static DEFINE_MUTEX(cuse_lock);         /* protects registration */
  70static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
  71static struct class *cuse_class;
  72
  73static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
  74{
  75        return container_of(fc, struct cuse_conn, fc);
  76}
  77
  78static struct list_head *cuse_conntbl_head(dev_t devt)
  79{
  80        return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
  81}
  82
  83
  84/**************************************************************************
  85 * CUSE frontend operations
  86 *
  87 * These are file operations for the character device.
  88 *
  89 * On open, CUSE opens a file from the FUSE mnt and stores it to
  90 * private_data of the open file.  All other ops call FUSE ops on the
  91 * FUSE file.
  92 */
  93
  94static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
  95{
  96        struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
  97        loff_t pos = 0;
  98
  99        return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
 100}
 101
 102static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
 103{
 104        struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb);
 105        loff_t pos = 0;
 106        /*
 107         * No locking or generic_write_checks(), the server is
 108         * responsible for locking and sanity checks.
 109         */
 110        return fuse_direct_io(&io, from, &pos,
 111                              FUSE_DIO_WRITE | FUSE_DIO_CUSE);
 112}
 113
 114static int cuse_open(struct inode *inode, struct file *file)
 115{
 116        dev_t devt = inode->i_cdev->dev;
 117        struct cuse_conn *cc = NULL, *pos;
 118        int rc;
 119
 120        /* look up and get the connection */
 121        mutex_lock(&cuse_lock);
 122        list_for_each_entry(pos, cuse_conntbl_head(devt), list)
 123                if (pos->dev->devt == devt) {
 124                        fuse_conn_get(&pos->fc);
 125                        cc = pos;
 126                        break;
 127                }
 128        mutex_unlock(&cuse_lock);
 129
 130        /* dead? */
 131        if (!cc)
 132                return -ENODEV;
 133
 134        /*
 135         * Generic permission check is already done against the chrdev
 136         * file, proceed to open.
 137         */
 138        rc = fuse_do_open(&cc->fm, 0, file, 0);
 139        if (rc)
 140                fuse_conn_put(&cc->fc);
 141        return rc;
 142}
 143
 144static int cuse_release(struct inode *inode, struct file *file)
 145{
 146        struct fuse_file *ff = file->private_data;
 147        struct fuse_mount *fm = ff->fm;
 148
 149        fuse_sync_release(NULL, ff, file->f_flags);
 150        fuse_conn_put(fm->fc);
 151
 152        return 0;
 153}
 154
 155static long cuse_file_ioctl(struct file *file, unsigned int cmd,
 156                            unsigned long arg)
 157{
 158        struct fuse_file *ff = file->private_data;
 159        struct cuse_conn *cc = fc_to_cc(ff->fm->fc);
 160        unsigned int flags = 0;
 161
 162        if (cc->unrestricted_ioctl)
 163                flags |= FUSE_IOCTL_UNRESTRICTED;
 164
 165        return fuse_do_ioctl(file, cmd, arg, flags);
 166}
 167
 168static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
 169                                   unsigned long arg)
 170{
 171        struct fuse_file *ff = file->private_data;
 172        struct cuse_conn *cc = fc_to_cc(ff->fm->fc);
 173        unsigned int flags = FUSE_IOCTL_COMPAT;
 174
 175        if (cc->unrestricted_ioctl)
 176                flags |= FUSE_IOCTL_UNRESTRICTED;
 177
 178        return fuse_do_ioctl(file, cmd, arg, flags);
 179}
 180
 181static const struct file_operations cuse_frontend_fops = {
 182        .owner                  = THIS_MODULE,
 183        .read_iter              = cuse_read_iter,
 184        .write_iter             = cuse_write_iter,
 185        .open                   = cuse_open,
 186        .release                = cuse_release,
 187        .unlocked_ioctl         = cuse_file_ioctl,
 188        .compat_ioctl           = cuse_file_compat_ioctl,
 189        .poll                   = fuse_file_poll,
 190        .llseek         = noop_llseek,
 191};
 192
 193
 194/**************************************************************************
 195 * CUSE channel initialization and destruction
 196 */
 197
 198struct cuse_devinfo {
 199        const char              *name;
 200};
 201
 202/**
 203 * cuse_parse_one - parse one key=value pair
 204 * @pp: i/o parameter for the current position
 205 * @end: points to one past the end of the packed string
 206 * @keyp: out parameter for key
 207 * @valp: out parameter for value
 208 *
 209 * *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
 210 * at @end - 1.  This function parses one pair and set *@keyp to the
 211 * start of the key and *@valp to the start of the value.  Note that
 212 * the original string is modified such that the key string is
 213 * terminated with '\0'.  *@pp is updated to point to the next string.
 214 *
 215 * RETURNS:
 216 * 1 on successful parse, 0 on EOF, -errno on failure.
 217 */
 218static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
 219{
 220        char *p = *pp;
 221        char *key, *val;
 222
 223        while (p < end && *p == '\0')
 224                p++;
 225        if (p == end)
 226                return 0;
 227
 228        if (end[-1] != '\0') {
 229                pr_err("info not properly terminated\n");
 230                return -EINVAL;
 231        }
 232
 233        key = val = p;
 234        p += strlen(p);
 235
 236        if (valp) {
 237                strsep(&val, "=");
 238                if (!val)
 239                        val = key + strlen(key);
 240                key = strstrip(key);
 241                val = strstrip(val);
 242        } else
 243                key = strstrip(key);
 244
 245        if (!strlen(key)) {
 246                pr_err("zero length info key specified\n");
 247                return -EINVAL;
 248        }
 249
 250        *pp = p;
 251        *keyp = key;
 252        if (valp)
 253                *valp = val;
 254
 255        return 1;
 256}
 257
 258/**
 259 * cuse_parse_dev_info - parse device info
 260 * @p: device info string
 261 * @len: length of device info string
 262 * @devinfo: out parameter for parsed device info
 263 *
 264 * Parse @p to extract device info and store it into @devinfo.  String
 265 * pointed to by @p is modified by parsing and @devinfo points into
 266 * them, so @p shouldn't be freed while @devinfo is in use.
 267 *
 268 * RETURNS:
 269 * 0 on success, -errno on failure.
 270 */
 271static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
 272{
 273        char *end = p + len;
 274        char *key, *val;
 275        int rc;
 276
 277        while (true) {
 278                rc = cuse_parse_one(&p, end, &key, &val);
 279                if (rc < 0)
 280                        return rc;
 281                if (!rc)
 282                        break;
 283                if (strcmp(key, "DEVNAME") == 0)
 284                        devinfo->name = val;
 285                else
 286                        pr_warn("unknown device info \"%s\"\n", key);
 287        }
 288
 289        if (!devinfo->name || !strlen(devinfo->name)) {
 290                pr_err("DEVNAME unspecified\n");
 291                return -EINVAL;
 292        }
 293
 294        return 0;
 295}
 296
 297static void cuse_gendev_release(struct device *dev)
 298{
 299        kfree(dev);
 300}
 301
 302struct cuse_init_args {
 303        struct fuse_args_pages ap;
 304        struct cuse_init_in in;
 305        struct cuse_init_out out;
 306        struct page *page;
 307        struct fuse_page_desc desc;
 308};
 309
 310/**
 311 * cuse_process_init_reply - finish initializing CUSE channel
 312 *
 313 * This function creates the character device and sets up all the
 314 * required data structures for it.  Please read the comment at the
 315 * top of this file for high level overview.
 316 */
 317static void cuse_process_init_reply(struct fuse_mount *fm,
 318                                    struct fuse_args *args, int error)
 319{
 320        struct fuse_conn *fc = fm->fc;
 321        struct cuse_init_args *ia = container_of(args, typeof(*ia), ap.args);
 322        struct fuse_args_pages *ap = &ia->ap;
 323        struct cuse_conn *cc = fc_to_cc(fc), *pos;
 324        struct cuse_init_out *arg = &ia->out;
 325        struct page *page = ap->pages[0];
 326        struct cuse_devinfo devinfo = { };
 327        struct device *dev;
 328        struct cdev *cdev;
 329        dev_t devt;
 330        int rc, i;
 331
 332        if (error || arg->major != FUSE_KERNEL_VERSION || arg->minor < 11)
 333                goto err;
 334
 335        fc->minor = arg->minor;
 336        fc->max_read = max_t(unsigned, arg->max_read, 4096);
 337        fc->max_write = max_t(unsigned, arg->max_write, 4096);
 338
 339        /* parse init reply */
 340        cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
 341
 342        rc = cuse_parse_devinfo(page_address(page), ap->args.out_args[1].size,
 343                                &devinfo);
 344        if (rc)
 345                goto err;
 346
 347        /* determine and reserve devt */
 348        devt = MKDEV(arg->dev_major, arg->dev_minor);
 349        if (!MAJOR(devt))
 350                rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
 351        else
 352                rc = register_chrdev_region(devt, 1, devinfo.name);
 353        if (rc) {
 354                pr_err("failed to register chrdev region\n");
 355                goto err;
 356        }
 357
 358        /* devt determined, create device */
 359        rc = -ENOMEM;
 360        dev = kzalloc(sizeof(*dev), GFP_KERNEL);
 361        if (!dev)
 362                goto err_region;
 363
 364        device_initialize(dev);
 365        dev_set_uevent_suppress(dev, 1);
 366        dev->class = cuse_class;
 367        dev->devt = devt;
 368        dev->release = cuse_gendev_release;
 369        dev_set_drvdata(dev, cc);
 370        dev_set_name(dev, "%s", devinfo.name);
 371
 372        mutex_lock(&cuse_lock);
 373
 374        /* make sure the device-name is unique */
 375        for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
 376                list_for_each_entry(pos, &cuse_conntbl[i], list)
 377                        if (!strcmp(dev_name(pos->dev), dev_name(dev)))
 378                                goto err_unlock;
 379        }
 380
 381        rc = device_add(dev);
 382        if (rc)
 383                goto err_unlock;
 384
 385        /* register cdev */
 386        rc = -ENOMEM;
 387        cdev = cdev_alloc();
 388        if (!cdev)
 389                goto err_unlock;
 390
 391        cdev->owner = THIS_MODULE;
 392        cdev->ops = &cuse_frontend_fops;
 393
 394        rc = cdev_add(cdev, devt, 1);
 395        if (rc)
 396                goto err_cdev;
 397
 398        cc->dev = dev;
 399        cc->cdev = cdev;
 400
 401        /* make the device available */
 402        list_add(&cc->list, cuse_conntbl_head(devt));
 403        mutex_unlock(&cuse_lock);
 404
 405        /* announce device availability */
 406        dev_set_uevent_suppress(dev, 0);
 407        kobject_uevent(&dev->kobj, KOBJ_ADD);
 408out:
 409        kfree(ia);
 410        __free_page(page);
 411        return;
 412
 413err_cdev:
 414        cdev_del(cdev);
 415err_unlock:
 416        mutex_unlock(&cuse_lock);
 417        put_device(dev);
 418err_region:
 419        unregister_chrdev_region(devt, 1);
 420err:
 421        fuse_abort_conn(fc);
 422        goto out;
 423}
 424
 425static int cuse_send_init(struct cuse_conn *cc)
 426{
 427        int rc;
 428        struct page *page;
 429        struct fuse_mount *fm = &cc->fm;
 430        struct cuse_init_args *ia;
 431        struct fuse_args_pages *ap;
 432
 433        BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
 434
 435        rc = -ENOMEM;
 436        page = alloc_page(GFP_KERNEL | __GFP_ZERO);
 437        if (!page)
 438                goto err;
 439
 440        ia = kzalloc(sizeof(*ia), GFP_KERNEL);
 441        if (!ia)
 442                goto err_free_page;
 443
 444        ap = &ia->ap;
 445        ia->in.major = FUSE_KERNEL_VERSION;
 446        ia->in.minor = FUSE_KERNEL_MINOR_VERSION;
 447        ia->in.flags |= CUSE_UNRESTRICTED_IOCTL;
 448        ap->args.opcode = CUSE_INIT;
 449        ap->args.in_numargs = 1;
 450        ap->args.in_args[0].size = sizeof(ia->in);
 451        ap->args.in_args[0].value = &ia->in;
 452        ap->args.out_numargs = 2;
 453        ap->args.out_args[0].size = sizeof(ia->out);
 454        ap->args.out_args[0].value = &ia->out;
 455        ap->args.out_args[1].size = CUSE_INIT_INFO_MAX;
 456        ap->args.out_argvar = true;
 457        ap->args.out_pages = true;
 458        ap->num_pages = 1;
 459        ap->pages = &ia->page;
 460        ap->descs = &ia->desc;
 461        ia->page = page;
 462        ia->desc.length = ap->args.out_args[1].size;
 463        ap->args.end = cuse_process_init_reply;
 464
 465        rc = fuse_simple_background(fm, &ap->args, GFP_KERNEL);
 466        if (rc) {
 467                kfree(ia);
 468err_free_page:
 469                __free_page(page);
 470        }
 471err:
 472        return rc;
 473}
 474
 475static void cuse_fc_release(struct fuse_conn *fc)
 476{
 477        struct cuse_conn *cc = fc_to_cc(fc);
 478        kfree_rcu(cc, fc.rcu);
 479}
 480
 481/**
 482 * cuse_channel_open - open method for /dev/cuse
 483 * @inode: inode for /dev/cuse
 484 * @file: file struct being opened
 485 *
 486 * Userland CUSE server can create a CUSE device by opening /dev/cuse
 487 * and replying to the initialization request kernel sends.  This
 488 * function is responsible for handling CUSE device initialization.
 489 * Because the fd opened by this function is used during
 490 * initialization, this function only creates cuse_conn and sends
 491 * init.  The rest is delegated to a kthread.
 492 *
 493 * RETURNS:
 494 * 0 on success, -errno on failure.
 495 */
 496static int cuse_channel_open(struct inode *inode, struct file *file)
 497{
 498        struct fuse_dev *fud;
 499        struct cuse_conn *cc;
 500        int rc;
 501
 502        /* set up cuse_conn */
 503        cc = kzalloc(sizeof(*cc), GFP_KERNEL);
 504        if (!cc)
 505                return -ENOMEM;
 506
 507        /*
 508         * Limit the cuse channel to requests that can
 509         * be represented in file->f_cred->user_ns.
 510         */
 511        fuse_conn_init(&cc->fc, &cc->fm, file->f_cred->user_ns,
 512                       &fuse_dev_fiq_ops, NULL);
 513
 514        fud = fuse_dev_alloc_install(&cc->fc);
 515        if (!fud) {
 516                kfree(cc);
 517                return -ENOMEM;
 518        }
 519
 520        INIT_LIST_HEAD(&cc->list);
 521        cc->fc.release = cuse_fc_release;
 522
 523        cc->fc.initialized = 1;
 524        rc = cuse_send_init(cc);
 525        if (rc) {
 526                fuse_dev_free(fud);
 527                fuse_conn_put(&cc->fc);
 528                return rc;
 529        }
 530        file->private_data = fud;
 531
 532        return 0;
 533}
 534
 535/**
 536 * cuse_channel_release - release method for /dev/cuse
 537 * @inode: inode for /dev/cuse
 538 * @file: file struct being closed
 539 *
 540 * Disconnect the channel, deregister CUSE device and initiate
 541 * destruction by putting the default reference.
 542 *
 543 * RETURNS:
 544 * 0 on success, -errno on failure.
 545 */
 546static int cuse_channel_release(struct inode *inode, struct file *file)
 547{
 548        struct fuse_dev *fud = file->private_data;
 549        struct cuse_conn *cc = fc_to_cc(fud->fc);
 550        int rc;
 551
 552        /* remove from the conntbl, no more access from this point on */
 553        mutex_lock(&cuse_lock);
 554        list_del_init(&cc->list);
 555        mutex_unlock(&cuse_lock);
 556
 557        /* remove device */
 558        if (cc->dev)
 559                device_unregister(cc->dev);
 560        if (cc->cdev) {
 561                unregister_chrdev_region(cc->cdev->dev, 1);
 562                cdev_del(cc->cdev);
 563        }
 564        /* Base reference is now owned by "fud" */
 565        fuse_conn_put(&cc->fc);
 566
 567        rc = fuse_dev_release(inode, file);     /* puts the base reference */
 568
 569        return rc;
 570}
 571
 572static struct file_operations cuse_channel_fops; /* initialized during init */
 573
 574
 575/**************************************************************************
 576 * Misc stuff and module initializatiion
 577 *
 578 * CUSE exports the same set of attributes to sysfs as fusectl.
 579 */
 580
 581static ssize_t cuse_class_waiting_show(struct device *dev,
 582                                       struct device_attribute *attr, char *buf)
 583{
 584        struct cuse_conn *cc = dev_get_drvdata(dev);
 585
 586        return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
 587}
 588static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
 589
 590static ssize_t cuse_class_abort_store(struct device *dev,
 591                                      struct device_attribute *attr,
 592                                      const char *buf, size_t count)
 593{
 594        struct cuse_conn *cc = dev_get_drvdata(dev);
 595
 596        fuse_abort_conn(&cc->fc);
 597        return count;
 598}
 599static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
 600
 601static struct attribute *cuse_class_dev_attrs[] = {
 602        &dev_attr_waiting.attr,
 603        &dev_attr_abort.attr,
 604        NULL,
 605};
 606ATTRIBUTE_GROUPS(cuse_class_dev);
 607
 608static struct miscdevice cuse_miscdev = {
 609        .minor          = CUSE_MINOR,
 610        .name           = "cuse",
 611        .fops           = &cuse_channel_fops,
 612};
 613
 614MODULE_ALIAS_MISCDEV(CUSE_MINOR);
 615MODULE_ALIAS("devname:cuse");
 616
 617static int __init cuse_init(void)
 618{
 619        int i, rc;
 620
 621        /* init conntbl */
 622        for (i = 0; i < CUSE_CONNTBL_LEN; i++)
 623                INIT_LIST_HEAD(&cuse_conntbl[i]);
 624
 625        /* inherit and extend fuse_dev_operations */
 626        cuse_channel_fops               = fuse_dev_operations;
 627        cuse_channel_fops.owner         = THIS_MODULE;
 628        cuse_channel_fops.open          = cuse_channel_open;
 629        cuse_channel_fops.release       = cuse_channel_release;
 630
 631        cuse_class = class_create(THIS_MODULE, "cuse");
 632        if (IS_ERR(cuse_class))
 633                return PTR_ERR(cuse_class);
 634
 635        cuse_class->dev_groups = cuse_class_dev_groups;
 636
 637        rc = misc_register(&cuse_miscdev);
 638        if (rc) {
 639                class_destroy(cuse_class);
 640                return rc;
 641        }
 642
 643        return 0;
 644}
 645
 646static void __exit cuse_exit(void)
 647{
 648        misc_deregister(&cuse_miscdev);
 649        class_destroy(cuse_class);
 650}
 651
 652module_init(cuse_init);
 653module_exit(cuse_exit);
 654
 655MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
 656MODULE_DESCRIPTION("Character device in Userspace");
 657MODULE_LICENSE("GPL");
 658