Changes in 4.9.269 net: usb: ax88179_178a: initialize local variables before use iwlwifi: Fix softirq/hardirq disabling in iwl_pcie_enqueue_hcmd() ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet USB: Add reset-resume quirk for WD19's Realtek Hub platform/x86: thinkpad_acpi: Correct thermal sensor allocation s390/disassembler: increase ebpf disasm buffer size ACPI: custom_method: fix potential use-after-free issue ACPI: custom_method: fix a possible memory leak arm64: dts: mt8173: fix property typo of 'phys' in dsi node ecryptfs: fix kernel panic with null dev_name mmc: core: Do a power cycle when the CMD11 fails mmc: core: Set read only for SD cards with permanent write protect bit btrfs: fix metadata extent leak after failure to create subvolume fbdev: zero-fill colormap in fbcmap.c staging: wimax/i2400m: fix byte-order issue usb: gadget: uvc: add bInterval checking for HS mode usb: dwc3: gadget: Ignore EP queue requests during bus reset usb: xhci: Fix port minor revision PCI: PM: Do not read power state in pci_enable_device_flags() x86/build: Propagate $(CLANG_FLAGS) to $(REALMODE_FLAGS) spi: dln2: Fix reference leak to master spi: omap-100k: Fix reference leak to master intel_th: Consistency and off-by-one fix phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() btrfs: convert logic BUG_ON()'s in replace_path to ASSERT()'s scsi: target: pscsi: Fix warning in pscsi_complete_cmd() media: ite-cir: check for receive overflow extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged media: media/saa7164: fix saa7164_encoder_register() memory leak bugs media: gspca/sq905.c: fix uninitialized variable power: supply: Use IRQF_ONESHOT scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() scsi: scsi_dh_alua: Remove check for ASC 24h in alua_rtpg() media: em28xx: fix memory leak clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() media: adv7604: fix possible use-after-free in adv76xx_remove() media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() media: i2c: adv7842: fix possible use-after-free in adv7842_remove() media: dvb-usb: fix memory leak in dvb_usb_adapter_init media: gscpa/stv06xx: fix memory leak drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal drm/amdgpu: fix NULL pointer dereference scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response scsi: libfc: Fix a format specifier ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer ALSA: sb: Fix two use after free in snd_sb_qsound_build arm64/vdso: Discard .note.gnu.property sections in vDSO openvswitch: fix stack OOB read while fragmenting IPv4 packets NFSv4: Don't discard segments marked for return in _pnfs_return_layout() jffs2: Fix kasan slab-out-of-bounds problem powerpc/eeh: Fix EEH handling for hugepages in ioremap space. powerpc: fix EDEADLOCK redefinition error in uapi/asm/errno.h jffs2: check the validity of dstlen in jffs2_zlib_compress() Revert 337f13046ff0 ("futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op") ftrace: Handle commands when closing set_ftrace_filter file ext4: fix check to prevent false positive report of incorrect used inodes ext4: fix error code in ext4_commit_super media: dvbdev: Fix memory leak in dvb_media_device_free() usb: gadget: dummy_hcd: fix gpf in gadget_setup usb: gadget: Fix double free of device descriptor pointers usb: gadget/function/f_fs string table fix for multiple languages dm persistent data: packed struct should have an aligned() attribute too dm space map common: fix division bug in sm_ll_find_free_block() dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails Bluetooth: verify AMP hci_chan before amp_destroy hsr: use netdev_err() instead of WARN_ONCE() bluetooth: eliminate the potential race condition when removing the HCI controller net/nfc: fix use-after-free llcp_sock_bind/connect FDDI: defxx: Bail out gracefully with unassigned PCI resource for CSR misc: lis3lv02d: Fix false-positive WARN on various HP models misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct misc: vmw_vmci: explicitly initialize vmci_datagram payload tracing: Treat recording comm for idle task as a success tracing: Use strlcpy() instead of strcpy() in __trace_find_cmdline() tracing: Map all PIDs to command lines tracing: Restructure trace_clock_global() to never block md-cluster: fix use-after-free issue when removing rdev md: factor out a mddev_find_locked helper from mddev_find md: md_open returns -EBUSY when entering racing area ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() cfg80211: scan: drop entry from hidden_list on overflow drm/radeon: fix copy of uninitialized variable back to userspace ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices usb: gadget: pch_udc: Revert d3cb25a12138 completely memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 ARM: dts: exynos: correct PMIC interrupt trigger level on Snow serial: stm32: fix incorrect characters on console usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() usb: gadget: pch_udc: Check if driver is present before calling ->setup() usb: gadget: pch_udc: Check for DMA mapping error crypto: qat - don't release uninitialized resources crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init fotg210-udc: Fix DMA on EP0 for length > max packet size fotg210-udc: Fix EP0 IN requests bigger than two packets fotg210-udc: Remove a dubious condition leading to fotg210_done fotg210-udc: Mask GRP2 interrupts we don't handle fotg210-udc: Don't DMA more than the buffer can take fotg210-udc: Complete OUT requests on short packets mtd: require write permissions for locking and badblock ioctls bus: qcom: Put child node before return crypto: qat - fix error path in adf_isr_resource_alloc() mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init staging: rtl8192u: Fix potential infinite loop staging: greybus: uart: fix unprivileged TIOCCSERIAL crypto: qat - Fix a double free in adf_create_ring usb: gadget: r8a66597: Add missing null check on return from platform_get_resource USB: cdc-acm: fix unprivileged TIOCCSERIAL tty: actually undefine superseded ASYNC flags tty: fix return value for unsupported ioctls firmware: qcom-scm: Fix QCOM_SCM configuration x86/platform/uv: Fix !KEXEC build failure Drivers: hv: vmbus: Increase wait time for VMbus unload ttyprintk: Add TTY hangup callback. media: vivid: fix assignment of dev->fbuf_out_flags media: omap4iss: return error code when omap4iss_get() failed media: m88rs6000t: avoid potential out-of-bounds reads on arrays pata_arasan_cf: fix IRQ check pata_ipx4xx_cf: fix IRQ check sata_mv: add IRQ checks ata: libahci_platform: fix IRQ check scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration media: dvb-usb-remote: fix dvb_usb_nec_rc_key_to_event type mismatch clk: uniphier: Fix potential infinite loop scsi: jazz_esp: Add IRQ check scsi: sun3x_esp: Add IRQ check scsi: sni_53c710: Add IRQ check HSI: core: fix resource leaks in hsi_add_client_from_dt() x86/events/amd/iommu: Fix sysfs type mismatch HID: plantronics: Workaround for double volume key presses perf symbols: Fix dso__fprintf_symbols_by_name() to return the number of printed chars net: lapbether: Prevent racing when checking whether the netif is running powerpc/prom: Mark identical_pvr_fixup as __init ALSA: core: remove redundant spin_lock pair in snd_card_disconnect nfc: pn533: prevent potential memory corruption ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls liquidio: Fix unintented sign extension of a left shift of a u16 powerpc/perf: Fix PMU constraint check for EBB events powerpc: iommu: fix build when neither PCI or IBMVIO is set mac80211: bail out if cipher schemes are invalid mt7601u: fix always true expression net: thunderx: Fix unintentional sign extension issue i2c: cadence: add IRQ check i2c: emev2: add IRQ check i2c: jz4780: add IRQ check i2c: sh7760: add IRQ check MIPS: pci-legacy: stop using of_pci_range_to_resource powerpc/pseries: extract host bridge from pci_bus prior to bus removal i2c: sh7760: fix IRQ error path mwl8k: Fix a double Free in mwl8k_probe_hw vsock/vmci: log once the failed queue pair allocation RDMA/i40iw: Fix error unwinding when i40iw_hmc_sd_one fails net: davinci_emac: Fix incorrect masking of tx and rx error channel ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices powerpc/52xx: Fix an invalid ASM expression ('addi' used instead of 'add') net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send net:nfc:digital: Fix a double free in digital_tg_recv_dep_req kfifo: fix ternary sign extension bugs Revert "net/sctp: fix race condition in sctp_destroy_sock" sctp: delay auto_asconf init until binding the first addr Revert "of/fdt: Make sure no-map does not remove already reserved regions" Revert "fdt: Properly handle "no-map" field in the memory region" fs: dlm: fix debugfs dump tipc: convert dest node's address to network order net: stmmac: Set FIFO sizes for ipq806x ALSA: hdsp: don't disable if not enabled ALSA: hdspm: don't disable if not enabled ALSA: rme9652: don't disable if not enabled Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default Bluetooth: initialize skb_queue_head at l2cap_chan_create() ip6_vti: proper dev_{hold|put} in ndo_[un]init methods mac80211: clear the beacon's CRC after channel switch cuse: prevent clone selftests: Set CC to clang in lib.mk if LLVM is set kconfig: nconf: stop endless search loops sctp: Fix out-of-bounds warning in sctp_process_asconf_param() ASoC: rt286: Generalize support for ALC3263 codec samples/bpf: Fix broken tracex1 due to kprobe argument change powerpc/pseries: Stop calling printk in rtas_stop_self() wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join powerpc/iommu: Annotate nested lock for lockdep net: ethernet: mtk_eth_soc: fix RX VLAN offload ASoC: rt286: Make RT286_SET_GPIO_* readable and writable f2fs: fix a redundant call to f2fs_balance_fs if an error occurs PCI: Release OF node in pci_scan_device()'s error path ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook NFSv4.2: Always flush out writes in nfs42_proc_fallocate() NFS: Deal correctly with attribute generation counter overflow pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() NFSv4.2 fix handling of sr_eof in SEEK's reply sctp: fix a SCTP_MIB_CURRESTAB leak in sctp_sf_do_dupcook_b drm/radeon: Fix off-by-one power_state index heap overwrite khugepaged: fix wrong result value for trace_mm_collapse_huge_page_isolate() mm/hugeltb: handle the error case in hugetlb_fix_reserve_counts() ksm: fix potential missing rmap_item for stable_node kernel: kexec_file: fix error return code of kexec_calculate_store_digests() ARC: entry: fix off-by-one error in syscall number validation powerpc/64s: Fix crashes when toggling entry flush barrier squashfs: fix divide error in calculate_skip() iio: proximity: pulsedlight: Fix rumtime PM imbalance on error usb: fotg210-hcd: Fix an error message ACPI: scan: Fix a memory leak in an error handling path usb: xhci: Increase timeout for HC halt usb: dwc2: Fix gadget DMA unmap direction usb: core: hub: fix race condition about TRSMRCY of resume KVM: x86: Cancel pvclock_gtod_work on module removal FDDI: defxx: Make MMIO the configuration default except for EISA MIPS: Reinstate platform `__div64_32' handler MIPS: Avoid DIVU in `__div64_32' is result would be zero MIPS: Avoid handcoded DIVU in `__div64_32' altogether thermal/core/fair share: Lock the thermal zone while looping over instances dm ioctl: fix out of bounds array access when no devices kobject_uevent: remove warning in init_uevent_argv() netfilter: conntrack: Make global sysctls readonly in non-init netns clk: exynos7: Mark aclk_fsys1_200 as critical x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes extcon: adc-jack: Fix incompatible pointer type warning kgdb: fix gcc-11 warning on indentation usb: sl811-hcd: improve misleading indentation cxgb4: Fix the -Wmisleading-indentation warning isdn: capi: fix mismatched prototypes ACPI / hotplug / PCI: Fix reference count leak in enable_slot() Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state um: Mark all kernel symbols as local ceph: fix fscache invalidation ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP lib: stackdepot: turn depot_lock spinlock to raw_spinlock sit: proper dev_{hold|put} in ndo_[un]init methods ip6_tunnel: sit: proper dev_{hold|put} in ndo_[un]init methods xhci: Do not use GFP_KERNEL in (potentially) atomic context ipv6: remove extra dev_hold() for fallback tunnels Linux 4.9.269 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com> Change-Id: Ib994aef2c6746afa8dcbb237d8c0645ba2c6f7e1
649 lines
16 KiB
C
649 lines
16 KiB
C
/*
|
|
* CUSE: Character device in Userspace
|
|
*
|
|
* Copyright (C) 2008-2009 SUSE Linux Products GmbH
|
|
* Copyright (C) 2008-2009 Tejun Heo <tj@kernel.org>
|
|
*
|
|
* This file is released under the GPLv2.
|
|
*
|
|
* CUSE enables character devices to be implemented from userland much
|
|
* like FUSE allows filesystems. On initialization /dev/cuse is
|
|
* created. By opening the file and replying to the CUSE_INIT request
|
|
* userland CUSE server can create a character device. After that the
|
|
* operation is very similar to FUSE.
|
|
*
|
|
* A CUSE instance involves the following objects.
|
|
*
|
|
* cuse_conn : contains fuse_conn and serves as bonding structure
|
|
* channel : file handle connected to the userland CUSE server
|
|
* cdev : the implemented character device
|
|
* dev : generic device for cdev
|
|
*
|
|
* Note that 'channel' is what 'dev' is in FUSE. As CUSE deals with
|
|
* devices, it's called 'channel' to reduce confusion.
|
|
*
|
|
* channel determines when the character device dies. When channel is
|
|
* closed, everything begins to destruct. The cuse_conn is taken off
|
|
* the lookup table preventing further access from cdev, cdev and
|
|
* generic device are removed and the base reference of cuse_conn is
|
|
* put.
|
|
*
|
|
* On each open, the matching cuse_conn is looked up and if found an
|
|
* additional reference is taken which is released when the file is
|
|
* closed.
|
|
*/
|
|
|
|
#include <linux/fuse.h>
|
|
#include <linux/cdev.h>
|
|
#include <linux/device.h>
|
|
#include <linux/file.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/kdev_t.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/list.h>
|
|
#include <linux/magic.h>
|
|
#include <linux/miscdevice.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/stat.h>
|
|
#include <linux/module.h>
|
|
#include <linux/uio.h>
|
|
|
|
#include "fuse_i.h"
|
|
|
|
#define CUSE_CONNTBL_LEN 64
|
|
|
|
struct cuse_conn {
|
|
struct list_head list; /* linked on cuse_conntbl */
|
|
struct fuse_conn fc; /* fuse connection */
|
|
struct cdev *cdev; /* associated character device */
|
|
struct device *dev; /* device representing @cdev */
|
|
|
|
/* init parameters, set once during initialization */
|
|
bool unrestricted_ioctl;
|
|
};
|
|
|
|
static DEFINE_MUTEX(cuse_lock); /* protects registration */
|
|
static struct list_head cuse_conntbl[CUSE_CONNTBL_LEN];
|
|
static struct class *cuse_class;
|
|
|
|
static struct cuse_conn *fc_to_cc(struct fuse_conn *fc)
|
|
{
|
|
return container_of(fc, struct cuse_conn, fc);
|
|
}
|
|
|
|
static struct list_head *cuse_conntbl_head(dev_t devt)
|
|
{
|
|
return &cuse_conntbl[(MAJOR(devt) + MINOR(devt)) % CUSE_CONNTBL_LEN];
|
|
}
|
|
|
|
|
|
/**************************************************************************
|
|
* CUSE frontend operations
|
|
*
|
|
* These are file operations for the character device.
|
|
*
|
|
* On open, CUSE opens a file from the FUSE mnt and stores it to
|
|
* private_data of the open file. All other ops call FUSE ops on the
|
|
* FUSE file.
|
|
*/
|
|
|
|
static ssize_t cuse_read_iter(struct kiocb *kiocb, struct iov_iter *to)
|
|
{
|
|
struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb->ki_filp);
|
|
loff_t pos = 0;
|
|
|
|
return fuse_direct_io(&io, to, &pos, FUSE_DIO_CUSE);
|
|
}
|
|
|
|
static ssize_t cuse_write_iter(struct kiocb *kiocb, struct iov_iter *from)
|
|
{
|
|
struct fuse_io_priv io = FUSE_IO_PRIV_SYNC(kiocb->ki_filp);
|
|
loff_t pos = 0;
|
|
/*
|
|
* No locking or generic_write_checks(), the server is
|
|
* responsible for locking and sanity checks.
|
|
*/
|
|
return fuse_direct_io(&io, from, &pos,
|
|
FUSE_DIO_WRITE | FUSE_DIO_CUSE);
|
|
}
|
|
|
|
static int cuse_open(struct inode *inode, struct file *file)
|
|
{
|
|
dev_t devt = inode->i_cdev->dev;
|
|
struct cuse_conn *cc = NULL, *pos;
|
|
int rc;
|
|
|
|
/* look up and get the connection */
|
|
mutex_lock(&cuse_lock);
|
|
list_for_each_entry(pos, cuse_conntbl_head(devt), list)
|
|
if (pos->dev->devt == devt) {
|
|
fuse_conn_get(&pos->fc);
|
|
cc = pos;
|
|
break;
|
|
}
|
|
mutex_unlock(&cuse_lock);
|
|
|
|
/* dead? */
|
|
if (!cc)
|
|
return -ENODEV;
|
|
|
|
/*
|
|
* Generic permission check is already done against the chrdev
|
|
* file, proceed to open.
|
|
*/
|
|
rc = fuse_do_open(&cc->fc, 0, file, 0);
|
|
if (rc)
|
|
fuse_conn_put(&cc->fc);
|
|
return rc;
|
|
}
|
|
|
|
static int cuse_release(struct inode *inode, struct file *file)
|
|
{
|
|
struct fuse_file *ff = file->private_data;
|
|
struct fuse_conn *fc = ff->fc;
|
|
|
|
fuse_sync_release(ff, file->f_flags);
|
|
fuse_conn_put(fc);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static long cuse_file_ioctl(struct file *file, unsigned int cmd,
|
|
unsigned long arg)
|
|
{
|
|
struct fuse_file *ff = file->private_data;
|
|
struct cuse_conn *cc = fc_to_cc(ff->fc);
|
|
unsigned int flags = 0;
|
|
|
|
if (cc->unrestricted_ioctl)
|
|
flags |= FUSE_IOCTL_UNRESTRICTED;
|
|
|
|
return fuse_do_ioctl(file, cmd, arg, flags);
|
|
}
|
|
|
|
static long cuse_file_compat_ioctl(struct file *file, unsigned int cmd,
|
|
unsigned long arg)
|
|
{
|
|
struct fuse_file *ff = file->private_data;
|
|
struct cuse_conn *cc = fc_to_cc(ff->fc);
|
|
unsigned int flags = FUSE_IOCTL_COMPAT;
|
|
|
|
if (cc->unrestricted_ioctl)
|
|
flags |= FUSE_IOCTL_UNRESTRICTED;
|
|
|
|
return fuse_do_ioctl(file, cmd, arg, flags);
|
|
}
|
|
|
|
static const struct file_operations cuse_frontend_fops = {
|
|
.owner = THIS_MODULE,
|
|
.read_iter = cuse_read_iter,
|
|
.write_iter = cuse_write_iter,
|
|
.open = cuse_open,
|
|
.release = cuse_release,
|
|
.unlocked_ioctl = cuse_file_ioctl,
|
|
.compat_ioctl = cuse_file_compat_ioctl,
|
|
.poll = fuse_file_poll,
|
|
.llseek = noop_llseek,
|
|
};
|
|
|
|
|
|
/**************************************************************************
|
|
* CUSE channel initialization and destruction
|
|
*/
|
|
|
|
struct cuse_devinfo {
|
|
const char *name;
|
|
};
|
|
|
|
/**
|
|
* cuse_parse_one - parse one key=value pair
|
|
* @pp: i/o parameter for the current position
|
|
* @end: points to one past the end of the packed string
|
|
* @keyp: out parameter for key
|
|
* @valp: out parameter for value
|
|
*
|
|
* *@pp points to packed strings - "key0=val0\0key1=val1\0" which ends
|
|
* at @end - 1. This function parses one pair and set *@keyp to the
|
|
* start of the key and *@valp to the start of the value. Note that
|
|
* the original string is modified such that the key string is
|
|
* terminated with '\0'. *@pp is updated to point to the next string.
|
|
*
|
|
* RETURNS:
|
|
* 1 on successful parse, 0 on EOF, -errno on failure.
|
|
*/
|
|
static int cuse_parse_one(char **pp, char *end, char **keyp, char **valp)
|
|
{
|
|
char *p = *pp;
|
|
char *key, *val;
|
|
|
|
while (p < end && *p == '\0')
|
|
p++;
|
|
if (p == end)
|
|
return 0;
|
|
|
|
if (end[-1] != '\0') {
|
|
printk(KERN_ERR "CUSE: info not properly terminated\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
key = val = p;
|
|
p += strlen(p);
|
|
|
|
if (valp) {
|
|
strsep(&val, "=");
|
|
if (!val)
|
|
val = key + strlen(key);
|
|
key = strstrip(key);
|
|
val = strstrip(val);
|
|
} else
|
|
key = strstrip(key);
|
|
|
|
if (!strlen(key)) {
|
|
printk(KERN_ERR "CUSE: zero length info key specified\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
*pp = p;
|
|
*keyp = key;
|
|
if (valp)
|
|
*valp = val;
|
|
|
|
return 1;
|
|
}
|
|
|
|
/**
|
|
* cuse_parse_dev_info - parse device info
|
|
* @p: device info string
|
|
* @len: length of device info string
|
|
* @devinfo: out parameter for parsed device info
|
|
*
|
|
* Parse @p to extract device info and store it into @devinfo. String
|
|
* pointed to by @p is modified by parsing and @devinfo points into
|
|
* them, so @p shouldn't be freed while @devinfo is in use.
|
|
*
|
|
* RETURNS:
|
|
* 0 on success, -errno on failure.
|
|
*/
|
|
static int cuse_parse_devinfo(char *p, size_t len, struct cuse_devinfo *devinfo)
|
|
{
|
|
char *end = p + len;
|
|
char *uninitialized_var(key), *uninitialized_var(val);
|
|
int rc;
|
|
|
|
while (true) {
|
|
rc = cuse_parse_one(&p, end, &key, &val);
|
|
if (rc < 0)
|
|
return rc;
|
|
if (!rc)
|
|
break;
|
|
if (strcmp(key, "DEVNAME") == 0)
|
|
devinfo->name = val;
|
|
else
|
|
printk(KERN_WARNING "CUSE: unknown device info \"%s\"\n",
|
|
key);
|
|
}
|
|
|
|
if (!devinfo->name || !strlen(devinfo->name)) {
|
|
printk(KERN_ERR "CUSE: DEVNAME unspecified\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void cuse_gendev_release(struct device *dev)
|
|
{
|
|
kfree(dev);
|
|
}
|
|
|
|
/**
|
|
* cuse_process_init_reply - finish initializing CUSE channel
|
|
*
|
|
* This function creates the character device and sets up all the
|
|
* required data structures for it. Please read the comment at the
|
|
* top of this file for high level overview.
|
|
*/
|
|
static void cuse_process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
|
|
{
|
|
struct cuse_conn *cc = fc_to_cc(fc), *pos;
|
|
struct cuse_init_out *arg = req->out.args[0].value;
|
|
struct page *page = req->pages[0];
|
|
struct cuse_devinfo devinfo = { };
|
|
struct device *dev;
|
|
struct cdev *cdev;
|
|
dev_t devt;
|
|
int rc, i;
|
|
|
|
if (req->out.h.error ||
|
|
arg->major != FUSE_KERNEL_VERSION || arg->minor < 11) {
|
|
goto err;
|
|
}
|
|
|
|
fc->minor = arg->minor;
|
|
fc->max_read = max_t(unsigned, arg->max_read, 4096);
|
|
fc->max_write = max_t(unsigned, arg->max_write, 4096);
|
|
|
|
/* parse init reply */
|
|
cc->unrestricted_ioctl = arg->flags & CUSE_UNRESTRICTED_IOCTL;
|
|
|
|
rc = cuse_parse_devinfo(page_address(page), req->out.args[1].size,
|
|
&devinfo);
|
|
if (rc)
|
|
goto err;
|
|
|
|
/* determine and reserve devt */
|
|
devt = MKDEV(arg->dev_major, arg->dev_minor);
|
|
if (!MAJOR(devt))
|
|
rc = alloc_chrdev_region(&devt, MINOR(devt), 1, devinfo.name);
|
|
else
|
|
rc = register_chrdev_region(devt, 1, devinfo.name);
|
|
if (rc) {
|
|
printk(KERN_ERR "CUSE: failed to register chrdev region\n");
|
|
goto err;
|
|
}
|
|
|
|
/* devt determined, create device */
|
|
rc = -ENOMEM;
|
|
dev = kzalloc(sizeof(*dev), GFP_KERNEL);
|
|
if (!dev)
|
|
goto err_region;
|
|
|
|
device_initialize(dev);
|
|
dev_set_uevent_suppress(dev, 1);
|
|
dev->class = cuse_class;
|
|
dev->devt = devt;
|
|
dev->release = cuse_gendev_release;
|
|
dev_set_drvdata(dev, cc);
|
|
dev_set_name(dev, "%s", devinfo.name);
|
|
|
|
mutex_lock(&cuse_lock);
|
|
|
|
/* make sure the device-name is unique */
|
|
for (i = 0; i < CUSE_CONNTBL_LEN; ++i) {
|
|
list_for_each_entry(pos, &cuse_conntbl[i], list)
|
|
if (!strcmp(dev_name(pos->dev), dev_name(dev)))
|
|
goto err_unlock;
|
|
}
|
|
|
|
rc = device_add(dev);
|
|
if (rc)
|
|
goto err_unlock;
|
|
|
|
/* register cdev */
|
|
rc = -ENOMEM;
|
|
cdev = cdev_alloc();
|
|
if (!cdev)
|
|
goto err_unlock;
|
|
|
|
cdev->owner = THIS_MODULE;
|
|
cdev->ops = &cuse_frontend_fops;
|
|
|
|
rc = cdev_add(cdev, devt, 1);
|
|
if (rc)
|
|
goto err_cdev;
|
|
|
|
cc->dev = dev;
|
|
cc->cdev = cdev;
|
|
|
|
/* make the device available */
|
|
list_add(&cc->list, cuse_conntbl_head(devt));
|
|
mutex_unlock(&cuse_lock);
|
|
|
|
/* announce device availability */
|
|
dev_set_uevent_suppress(dev, 0);
|
|
kobject_uevent(&dev->kobj, KOBJ_ADD);
|
|
out:
|
|
kfree(arg);
|
|
__free_page(page);
|
|
return;
|
|
|
|
err_cdev:
|
|
cdev_del(cdev);
|
|
err_unlock:
|
|
mutex_unlock(&cuse_lock);
|
|
put_device(dev);
|
|
err_region:
|
|
unregister_chrdev_region(devt, 1);
|
|
err:
|
|
fuse_abort_conn(fc);
|
|
goto out;
|
|
}
|
|
|
|
static int cuse_send_init(struct cuse_conn *cc)
|
|
{
|
|
int rc;
|
|
struct fuse_req *req;
|
|
struct page *page;
|
|
struct fuse_conn *fc = &cc->fc;
|
|
struct cuse_init_in *arg;
|
|
void *outarg;
|
|
|
|
BUILD_BUG_ON(CUSE_INIT_INFO_MAX > PAGE_SIZE);
|
|
|
|
req = fuse_get_req_for_background(fc, 1);
|
|
if (IS_ERR(req)) {
|
|
rc = PTR_ERR(req);
|
|
goto err;
|
|
}
|
|
|
|
rc = -ENOMEM;
|
|
page = alloc_page(GFP_KERNEL | __GFP_ZERO);
|
|
if (!page)
|
|
goto err_put_req;
|
|
|
|
outarg = kzalloc(sizeof(struct cuse_init_out), GFP_KERNEL);
|
|
if (!outarg)
|
|
goto err_free_page;
|
|
|
|
arg = &req->misc.cuse_init_in;
|
|
arg->major = FUSE_KERNEL_VERSION;
|
|
arg->minor = FUSE_KERNEL_MINOR_VERSION;
|
|
arg->flags |= CUSE_UNRESTRICTED_IOCTL;
|
|
req->in.h.opcode = CUSE_INIT;
|
|
req->in.numargs = 1;
|
|
req->in.args[0].size = sizeof(struct cuse_init_in);
|
|
req->in.args[0].value = arg;
|
|
req->out.numargs = 2;
|
|
req->out.args[0].size = sizeof(struct cuse_init_out);
|
|
req->out.args[0].value = outarg;
|
|
req->out.args[1].size = CUSE_INIT_INFO_MAX;
|
|
req->out.argvar = 1;
|
|
req->out.argpages = 1;
|
|
req->pages[0] = page;
|
|
req->page_descs[0].length = req->out.args[1].size;
|
|
req->num_pages = 1;
|
|
req->end = cuse_process_init_reply;
|
|
fuse_request_send_background(fc, req);
|
|
|
|
return 0;
|
|
|
|
err_free_page:
|
|
__free_page(page);
|
|
err_put_req:
|
|
fuse_put_request(fc, req);
|
|
err:
|
|
return rc;
|
|
}
|
|
|
|
static void cuse_fc_release(struct fuse_conn *fc)
|
|
{
|
|
struct cuse_conn *cc = fc_to_cc(fc);
|
|
kfree_rcu(cc, fc.rcu);
|
|
}
|
|
|
|
/**
|
|
* cuse_channel_open - open method for /dev/cuse
|
|
* @inode: inode for /dev/cuse
|
|
* @file: file struct being opened
|
|
*
|
|
* Userland CUSE server can create a CUSE device by opening /dev/cuse
|
|
* and replying to the initialization request kernel sends. This
|
|
* function is responsible for handling CUSE device initialization.
|
|
* Because the fd opened by this function is used during
|
|
* initialization, this function only creates cuse_conn and sends
|
|
* init. The rest is delegated to a kthread.
|
|
*
|
|
* RETURNS:
|
|
* 0 on success, -errno on failure.
|
|
*/
|
|
static int cuse_channel_open(struct inode *inode, struct file *file)
|
|
{
|
|
struct fuse_dev *fud;
|
|
struct cuse_conn *cc;
|
|
int rc;
|
|
|
|
/* set up cuse_conn */
|
|
cc = kzalloc(sizeof(*cc), GFP_KERNEL);
|
|
if (!cc)
|
|
return -ENOMEM;
|
|
|
|
fuse_conn_init(&cc->fc);
|
|
|
|
fud = fuse_dev_alloc(&cc->fc);
|
|
if (!fud) {
|
|
kfree(cc);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
INIT_LIST_HEAD(&cc->list);
|
|
cc->fc.release = cuse_fc_release;
|
|
|
|
cc->fc.initialized = 1;
|
|
rc = cuse_send_init(cc);
|
|
if (rc) {
|
|
fuse_dev_free(fud);
|
|
fuse_conn_put(&cc->fc);
|
|
return rc;
|
|
}
|
|
file->private_data = fud;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* cuse_channel_release - release method for /dev/cuse
|
|
* @inode: inode for /dev/cuse
|
|
* @file: file struct being closed
|
|
*
|
|
* Disconnect the channel, deregister CUSE device and initiate
|
|
* destruction by putting the default reference.
|
|
*
|
|
* RETURNS:
|
|
* 0 on success, -errno on failure.
|
|
*/
|
|
static int cuse_channel_release(struct inode *inode, struct file *file)
|
|
{
|
|
struct fuse_dev *fud = file->private_data;
|
|
struct cuse_conn *cc = fc_to_cc(fud->fc);
|
|
int rc;
|
|
|
|
/* remove from the conntbl, no more access from this point on */
|
|
mutex_lock(&cuse_lock);
|
|
list_del_init(&cc->list);
|
|
mutex_unlock(&cuse_lock);
|
|
|
|
/* remove device */
|
|
if (cc->dev)
|
|
device_unregister(cc->dev);
|
|
if (cc->cdev) {
|
|
unregister_chrdev_region(cc->cdev->dev, 1);
|
|
cdev_del(cc->cdev);
|
|
}
|
|
/* Base reference is now owned by "fud" */
|
|
fuse_conn_put(&cc->fc);
|
|
|
|
rc = fuse_dev_release(inode, file); /* puts the base reference */
|
|
|
|
return rc;
|
|
}
|
|
|
|
static struct file_operations cuse_channel_fops; /* initialized during init */
|
|
|
|
|
|
/**************************************************************************
|
|
* Misc stuff and module initializatiion
|
|
*
|
|
* CUSE exports the same set of attributes to sysfs as fusectl.
|
|
*/
|
|
|
|
static ssize_t cuse_class_waiting_show(struct device *dev,
|
|
struct device_attribute *attr, char *buf)
|
|
{
|
|
struct cuse_conn *cc = dev_get_drvdata(dev);
|
|
|
|
return sprintf(buf, "%d\n", atomic_read(&cc->fc.num_waiting));
|
|
}
|
|
static DEVICE_ATTR(waiting, 0400, cuse_class_waiting_show, NULL);
|
|
|
|
static ssize_t cuse_class_abort_store(struct device *dev,
|
|
struct device_attribute *attr,
|
|
const char *buf, size_t count)
|
|
{
|
|
struct cuse_conn *cc = dev_get_drvdata(dev);
|
|
|
|
fuse_abort_conn(&cc->fc);
|
|
return count;
|
|
}
|
|
static DEVICE_ATTR(abort, 0200, NULL, cuse_class_abort_store);
|
|
|
|
static struct attribute *cuse_class_dev_attrs[] = {
|
|
&dev_attr_waiting.attr,
|
|
&dev_attr_abort.attr,
|
|
NULL,
|
|
};
|
|
ATTRIBUTE_GROUPS(cuse_class_dev);
|
|
|
|
static struct miscdevice cuse_miscdev = {
|
|
.minor = CUSE_MINOR,
|
|
.name = "cuse",
|
|
.fops = &cuse_channel_fops,
|
|
};
|
|
|
|
MODULE_ALIAS_MISCDEV(CUSE_MINOR);
|
|
MODULE_ALIAS("devname:cuse");
|
|
|
|
static int __init cuse_init(void)
|
|
{
|
|
int i, rc;
|
|
|
|
/* init conntbl */
|
|
for (i = 0; i < CUSE_CONNTBL_LEN; i++)
|
|
INIT_LIST_HEAD(&cuse_conntbl[i]);
|
|
|
|
/* inherit and extend fuse_dev_operations */
|
|
cuse_channel_fops = fuse_dev_operations;
|
|
cuse_channel_fops.owner = THIS_MODULE;
|
|
cuse_channel_fops.open = cuse_channel_open;
|
|
cuse_channel_fops.release = cuse_channel_release;
|
|
/* CUSE is not prepared for FUSE_DEV_IOC_CLONE */
|
|
cuse_channel_fops.unlocked_ioctl = NULL;
|
|
|
|
cuse_class = class_create(THIS_MODULE, "cuse");
|
|
if (IS_ERR(cuse_class))
|
|
return PTR_ERR(cuse_class);
|
|
|
|
cuse_class->dev_groups = cuse_class_dev_groups;
|
|
|
|
rc = misc_register(&cuse_miscdev);
|
|
if (rc) {
|
|
class_destroy(cuse_class);
|
|
return rc;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void __exit cuse_exit(void)
|
|
{
|
|
misc_deregister(&cuse_miscdev);
|
|
class_destroy(cuse_class);
|
|
}
|
|
|
|
module_init(cuse_init);
|
|
module_exit(cuse_exit);
|
|
|
|
MODULE_AUTHOR("Tejun Heo <tj@kernel.org>");
|
|
MODULE_DESCRIPTION("Character device in Userspace");
|
|
MODULE_LICENSE("GPL");
|