]> git.ipfire.org Git - thirdparty/qemu.git/blob - block/export/fuse.c
adf3236b5a557539fa0b1c455cebeeee097499a0
[thirdparty/qemu.git] / block / export / fuse.c
1 /*
2 * Present a block device as a raw image through FUSE
3 *
4 * Copyright (c) 2020 Max Reitz <mreitz@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 or later of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
17 */
18
19 #define FUSE_USE_VERSION 31
20
21 #include "qemu/osdep.h"
22 #include "qemu/memalign.h"
23 #include "block/aio.h"
24 #include "block/block_int-common.h"
25 #include "block/export.h"
26 #include "block/fuse.h"
27 #include "block/qapi.h"
28 #include "qapi/error.h"
29 #include "qapi/qapi-commands-block.h"
30 #include "qemu/main-loop.h"
31 #include "sysemu/block-backend.h"
32
33 #include <fuse.h>
34 #include <fuse_lowlevel.h>
35
36 #if defined(CONFIG_FALLOCATE_ZERO_RANGE)
37 #include <linux/falloc.h>
38 #endif
39
40 #ifdef __linux__
41 #include <linux/fs.h>
42 #endif
43
44 /* Prevent overly long bounce buffer allocations */
45 #define FUSE_MAX_BOUNCE_BYTES (MIN(BDRV_REQUEST_MAX_BYTES, 64 * 1024 * 1024))
46
47
48 typedef struct FuseExport {
49 BlockExport common;
50
51 struct fuse_session *fuse_session;
52 struct fuse_buf fuse_buf;
53 unsigned int in_flight; /* atomic */
54 bool mounted, fd_handler_set_up;
55
56 char *mountpoint;
57 bool writable;
58 bool growable;
59 /* Whether allow_other was used as a mount option or not */
60 bool allow_other;
61
62 mode_t st_mode;
63 uid_t st_uid;
64 gid_t st_gid;
65 } FuseExport;
66
67 static GHashTable *exports;
68 static const struct fuse_lowlevel_ops fuse_ops;
69
70 static void fuse_export_shutdown(BlockExport *exp);
71 static void fuse_export_delete(BlockExport *exp);
72
73 static void init_exports_table(void);
74
75 static int setup_fuse_export(FuseExport *exp, const char *mountpoint,
76 bool allow_other, Error **errp);
77 static void read_from_fuse_export(void *opaque);
78
79 static bool is_regular_file(const char *path, Error **errp);
80
81
82 static void fuse_export_drained_begin(void *opaque)
83 {
84 FuseExport *exp = opaque;
85
86 aio_set_fd_handler(exp->common.ctx,
87 fuse_session_fd(exp->fuse_session), false,
88 NULL, NULL, NULL, NULL, NULL);
89 exp->fd_handler_set_up = false;
90 }
91
92 static void fuse_export_drained_end(void *opaque)
93 {
94 FuseExport *exp = opaque;
95
96 /* Refresh AioContext in case it changed */
97 exp->common.ctx = blk_get_aio_context(exp->common.blk);
98
99 aio_set_fd_handler(exp->common.ctx,
100 fuse_session_fd(exp->fuse_session), false,
101 read_from_fuse_export, NULL, NULL, NULL, exp);
102 exp->fd_handler_set_up = true;
103 }
104
105 static bool fuse_export_drained_poll(void *opaque)
106 {
107 FuseExport *exp = opaque;
108
109 return qatomic_read(&exp->in_flight) > 0;
110 }
111
112 static const BlockDevOps fuse_export_blk_dev_ops = {
113 .drained_begin = fuse_export_drained_begin,
114 .drained_end = fuse_export_drained_end,
115 .drained_poll = fuse_export_drained_poll,
116 };
117
118 static int fuse_export_create(BlockExport *blk_exp,
119 BlockExportOptions *blk_exp_args,
120 Error **errp)
121 {
122 FuseExport *exp = container_of(blk_exp, FuseExport, common);
123 BlockExportOptionsFuse *args = &blk_exp_args->u.fuse;
124 int ret;
125
126 assert(blk_exp_args->type == BLOCK_EXPORT_TYPE_FUSE);
127
128 /* For growable and writable exports, take the RESIZE permission */
129 if (args->growable || blk_exp_args->writable) {
130 uint64_t blk_perm, blk_shared_perm;
131
132 blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm);
133
134 ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE,
135 blk_shared_perm, errp);
136 if (ret < 0) {
137 return ret;
138 }
139 }
140
141 blk_set_dev_ops(exp->common.blk, &fuse_export_blk_dev_ops, exp);
142
143 /*
144 * We handle draining ourselves using an in-flight counter and by disabling
145 * the FUSE fd handler. Do not queue BlockBackend requests, they need to
146 * complete so the in-flight counter reaches zero.
147 */
148 blk_set_disable_request_queuing(exp->common.blk, true);
149
150 init_exports_table();
151
152 /*
153 * It is important to do this check before calling is_regular_file() --
154 * that function will do a stat(), which we would have to handle if we
155 * already exported something on @mountpoint. But we cannot, because
156 * we are currently caught up here.
157 * (Note that ideally we would want to resolve relative paths here,
158 * but bdrv_make_absolute_filename() might do the wrong thing for
159 * paths that contain colons, and realpath() would resolve symlinks,
160 * which we do not want: The mount point is not going to be the
161 * symlink's destination, but the link itself.)
162 * So this will not catch all potential clashes, but hopefully at
163 * least the most common one of specifying exactly the same path
164 * string twice.
165 */
166 if (g_hash_table_contains(exports, args->mountpoint)) {
167 error_setg(errp, "There already is a FUSE export on '%s'",
168 args->mountpoint);
169 ret = -EEXIST;
170 goto fail;
171 }
172
173 if (!is_regular_file(args->mountpoint, errp)) {
174 ret = -EINVAL;
175 goto fail;
176 }
177
178 exp->mountpoint = g_strdup(args->mountpoint);
179 exp->writable = blk_exp_args->writable;
180 exp->growable = args->growable;
181
182 /* set default */
183 if (!args->has_allow_other) {
184 args->allow_other = FUSE_EXPORT_ALLOW_OTHER_AUTO;
185 }
186
187 exp->st_mode = S_IFREG | S_IRUSR;
188 if (exp->writable) {
189 exp->st_mode |= S_IWUSR;
190 }
191 exp->st_uid = getuid();
192 exp->st_gid = getgid();
193
194 if (args->allow_other == FUSE_EXPORT_ALLOW_OTHER_AUTO) {
195 /* Ignore errors on our first attempt */
196 ret = setup_fuse_export(exp, args->mountpoint, true, NULL);
197 exp->allow_other = ret == 0;
198 if (ret < 0) {
199 ret = setup_fuse_export(exp, args->mountpoint, false, errp);
200 }
201 } else {
202 exp->allow_other = args->allow_other == FUSE_EXPORT_ALLOW_OTHER_ON;
203 ret = setup_fuse_export(exp, args->mountpoint, exp->allow_other, errp);
204 }
205 if (ret < 0) {
206 goto fail;
207 }
208
209 return 0;
210
211 fail:
212 fuse_export_delete(blk_exp);
213 return ret;
214 }
215
216 /**
217 * Allocates the global @exports hash table.
218 */
219 static void init_exports_table(void)
220 {
221 if (exports) {
222 return;
223 }
224
225 exports = g_hash_table_new_full(g_str_hash, g_str_equal, g_free, NULL);
226 }
227
228 /**
229 * Create exp->fuse_session and mount it.
230 */
231 static int setup_fuse_export(FuseExport *exp, const char *mountpoint,
232 bool allow_other, Error **errp)
233 {
234 const char *fuse_argv[4];
235 char *mount_opts;
236 struct fuse_args fuse_args;
237 int ret;
238
239 /*
240 * max_read needs to match what fuse_init() sets.
241 * max_write need not be supplied.
242 */
243 mount_opts = g_strdup_printf("max_read=%zu,default_permissions%s",
244 FUSE_MAX_BOUNCE_BYTES,
245 allow_other ? ",allow_other" : "");
246
247 fuse_argv[0] = ""; /* Dummy program name */
248 fuse_argv[1] = "-o";
249 fuse_argv[2] = mount_opts;
250 fuse_argv[3] = NULL;
251 fuse_args = (struct fuse_args)FUSE_ARGS_INIT(3, (char **)fuse_argv);
252
253 exp->fuse_session = fuse_session_new(&fuse_args, &fuse_ops,
254 sizeof(fuse_ops), exp);
255 g_free(mount_opts);
256 if (!exp->fuse_session) {
257 error_setg(errp, "Failed to set up FUSE session");
258 ret = -EIO;
259 goto fail;
260 }
261
262 ret = fuse_session_mount(exp->fuse_session, mountpoint);
263 if (ret < 0) {
264 error_setg(errp, "Failed to mount FUSE session to export");
265 ret = -EIO;
266 goto fail;
267 }
268 exp->mounted = true;
269
270 g_hash_table_insert(exports, g_strdup(mountpoint), NULL);
271
272 aio_set_fd_handler(exp->common.ctx,
273 fuse_session_fd(exp->fuse_session), false,
274 read_from_fuse_export, NULL, NULL, NULL, exp);
275 exp->fd_handler_set_up = true;
276
277 return 0;
278
279 fail:
280 fuse_export_shutdown(&exp->common);
281 return ret;
282 }
283
284 /**
285 * Callback to be invoked when the FUSE session FD can be read from.
286 * (This is basically the FUSE event loop.)
287 */
288 static void read_from_fuse_export(void *opaque)
289 {
290 FuseExport *exp = opaque;
291 int ret;
292
293 blk_exp_ref(&exp->common);
294
295 qatomic_inc(&exp->in_flight);
296
297 do {
298 ret = fuse_session_receive_buf(exp->fuse_session, &exp->fuse_buf);
299 } while (ret == -EINTR);
300 if (ret < 0) {
301 goto out;
302 }
303
304 fuse_session_process_buf(exp->fuse_session, &exp->fuse_buf);
305
306 out:
307 if (qatomic_fetch_dec(&exp->in_flight) == 1) {
308 aio_wait_kick(); /* wake AIO_WAIT_WHILE() */
309 }
310
311 blk_exp_unref(&exp->common);
312 }
313
314 static void fuse_export_shutdown(BlockExport *blk_exp)
315 {
316 FuseExport *exp = container_of(blk_exp, FuseExport, common);
317
318 if (exp->fuse_session) {
319 fuse_session_exit(exp->fuse_session);
320
321 if (exp->fd_handler_set_up) {
322 aio_set_fd_handler(exp->common.ctx,
323 fuse_session_fd(exp->fuse_session), false,
324 NULL, NULL, NULL, NULL, NULL);
325 exp->fd_handler_set_up = false;
326 }
327 }
328
329 if (exp->mountpoint) {
330 /*
331 * Safe to drop now, because we will not handle any requests
332 * for this export anymore anyway.
333 */
334 g_hash_table_remove(exports, exp->mountpoint);
335 }
336 }
337
338 static void fuse_export_delete(BlockExport *blk_exp)
339 {
340 FuseExport *exp = container_of(blk_exp, FuseExport, common);
341
342 if (exp->fuse_session) {
343 if (exp->mounted) {
344 fuse_session_unmount(exp->fuse_session);
345 }
346
347 fuse_session_destroy(exp->fuse_session);
348 }
349
350 free(exp->fuse_buf.mem);
351 g_free(exp->mountpoint);
352 }
353
354 /**
355 * Check whether @path points to a regular file. If not, put an
356 * appropriate message into *errp.
357 */
358 static bool is_regular_file(const char *path, Error **errp)
359 {
360 struct stat statbuf;
361 int ret;
362
363 ret = stat(path, &statbuf);
364 if (ret < 0) {
365 error_setg_errno(errp, errno, "Failed to stat '%s'", path);
366 return false;
367 }
368
369 if (!S_ISREG(statbuf.st_mode)) {
370 error_setg(errp, "'%s' is not a regular file", path);
371 return false;
372 }
373
374 return true;
375 }
376
377 /**
378 * A chance to set change some parameters supplied to FUSE_INIT.
379 */
380 static void fuse_init(void *userdata, struct fuse_conn_info *conn)
381 {
382 /*
383 * MIN_NON_ZERO() would not be wrong here, but what we set here
384 * must equal what has been passed to fuse_session_new().
385 * Therefore, as long as max_read must be passed as a mount option
386 * (which libfuse claims will be changed at some point), we have
387 * to set max_read to a fixed value here.
388 */
389 conn->max_read = FUSE_MAX_BOUNCE_BYTES;
390
391 conn->max_write = MIN_NON_ZERO(BDRV_REQUEST_MAX_BYTES, conn->max_write);
392 }
393
394 /**
395 * Let clients look up files. Always return ENOENT because we only
396 * care about the mountpoint itself.
397 */
398 static void fuse_lookup(fuse_req_t req, fuse_ino_t parent, const char *name)
399 {
400 fuse_reply_err(req, ENOENT);
401 }
402
403 /**
404 * Let clients get file attributes (i.e., stat() the file).
405 */
406 static void fuse_getattr(fuse_req_t req, fuse_ino_t inode,
407 struct fuse_file_info *fi)
408 {
409 struct stat statbuf;
410 int64_t length, allocated_blocks;
411 time_t now = time(NULL);
412 FuseExport *exp = fuse_req_userdata(req);
413
414 length = blk_getlength(exp->common.blk);
415 if (length < 0) {
416 fuse_reply_err(req, -length);
417 return;
418 }
419
420 allocated_blocks = bdrv_get_allocated_file_size(blk_bs(exp->common.blk));
421 if (allocated_blocks <= 0) {
422 allocated_blocks = DIV_ROUND_UP(length, 512);
423 } else {
424 allocated_blocks = DIV_ROUND_UP(allocated_blocks, 512);
425 }
426
427 statbuf = (struct stat) {
428 .st_ino = inode,
429 .st_mode = exp->st_mode,
430 .st_nlink = 1,
431 .st_uid = exp->st_uid,
432 .st_gid = exp->st_gid,
433 .st_size = length,
434 .st_blksize = blk_bs(exp->common.blk)->bl.request_alignment,
435 .st_blocks = allocated_blocks,
436 .st_atime = now,
437 .st_mtime = now,
438 .st_ctime = now,
439 };
440
441 fuse_reply_attr(req, &statbuf, 1.);
442 }
443
444 static int fuse_do_truncate(const FuseExport *exp, int64_t size,
445 bool req_zero_write, PreallocMode prealloc)
446 {
447 uint64_t blk_perm, blk_shared_perm;
448 BdrvRequestFlags truncate_flags = 0;
449 bool add_resize_perm;
450 int ret, ret_check;
451
452 /* Growable and writable exports have a permanent RESIZE permission */
453 add_resize_perm = !exp->growable && !exp->writable;
454
455 if (req_zero_write) {
456 truncate_flags |= BDRV_REQ_ZERO_WRITE;
457 }
458
459 if (add_resize_perm) {
460
461 if (!qemu_in_main_thread()) {
462 /* Changing permissions like below only works in the main thread */
463 return -EPERM;
464 }
465
466 blk_get_perm(exp->common.blk, &blk_perm, &blk_shared_perm);
467
468 ret = blk_set_perm(exp->common.blk, blk_perm | BLK_PERM_RESIZE,
469 blk_shared_perm, NULL);
470 if (ret < 0) {
471 return ret;
472 }
473 }
474
475 ret = blk_truncate(exp->common.blk, size, true, prealloc,
476 truncate_flags, NULL);
477
478 if (add_resize_perm) {
479 /* Must succeed, because we are only giving up the RESIZE permission */
480 ret_check = blk_set_perm(exp->common.blk, blk_perm,
481 blk_shared_perm, &error_abort);
482 assert(ret_check == 0);
483 }
484
485 return ret;
486 }
487
488 /**
489 * Let clients set file attributes. Only resizing and changing
490 * permissions (st_mode, st_uid, st_gid) is allowed.
491 * Changing permissions is only allowed as far as it will actually
492 * permit access: Read-only exports cannot be given +w, and exports
493 * without allow_other cannot be given a different UID or GID, and
494 * they cannot be given non-owner access.
495 */
496 static void fuse_setattr(fuse_req_t req, fuse_ino_t inode, struct stat *statbuf,
497 int to_set, struct fuse_file_info *fi)
498 {
499 FuseExport *exp = fuse_req_userdata(req);
500 int supported_attrs;
501 int ret;
502
503 supported_attrs = FUSE_SET_ATTR_SIZE | FUSE_SET_ATTR_MODE;
504 if (exp->allow_other) {
505 supported_attrs |= FUSE_SET_ATTR_UID | FUSE_SET_ATTR_GID;
506 }
507
508 if (to_set & ~supported_attrs) {
509 fuse_reply_err(req, ENOTSUP);
510 return;
511 }
512
513 /* Do some argument checks first before committing to anything */
514 if (to_set & FUSE_SET_ATTR_MODE) {
515 /*
516 * Without allow_other, non-owners can never access the export, so do
517 * not allow setting permissions for them
518 */
519 if (!exp->allow_other &&
520 (statbuf->st_mode & (S_IRWXG | S_IRWXO)) != 0)
521 {
522 fuse_reply_err(req, EPERM);
523 return;
524 }
525
526 /* +w for read-only exports makes no sense, disallow it */
527 if (!exp->writable &&
528 (statbuf->st_mode & (S_IWUSR | S_IWGRP | S_IWOTH)) != 0)
529 {
530 fuse_reply_err(req, EROFS);
531 return;
532 }
533 }
534
535 if (to_set & FUSE_SET_ATTR_SIZE) {
536 if (!exp->writable) {
537 fuse_reply_err(req, EACCES);
538 return;
539 }
540
541 ret = fuse_do_truncate(exp, statbuf->st_size, true, PREALLOC_MODE_OFF);
542 if (ret < 0) {
543 fuse_reply_err(req, -ret);
544 return;
545 }
546 }
547
548 if (to_set & FUSE_SET_ATTR_MODE) {
549 /* Ignore FUSE-supplied file type, only change the mode */
550 exp->st_mode = (statbuf->st_mode & 07777) | S_IFREG;
551 }
552
553 if (to_set & FUSE_SET_ATTR_UID) {
554 exp->st_uid = statbuf->st_uid;
555 }
556
557 if (to_set & FUSE_SET_ATTR_GID) {
558 exp->st_gid = statbuf->st_gid;
559 }
560
561 fuse_getattr(req, inode, fi);
562 }
563
564 /**
565 * Let clients open a file (i.e., the exported image).
566 */
567 static void fuse_open(fuse_req_t req, fuse_ino_t inode,
568 struct fuse_file_info *fi)
569 {
570 fuse_reply_open(req, fi);
571 }
572
573 /**
574 * Handle client reads from the exported image.
575 */
576 static void fuse_read(fuse_req_t req, fuse_ino_t inode,
577 size_t size, off_t offset, struct fuse_file_info *fi)
578 {
579 FuseExport *exp = fuse_req_userdata(req);
580 int64_t length;
581 void *buf;
582 int ret;
583
584 /* Limited by max_read, should not happen */
585 if (size > FUSE_MAX_BOUNCE_BYTES) {
586 fuse_reply_err(req, EINVAL);
587 return;
588 }
589
590 /**
591 * Clients will expect short reads at EOF, so we have to limit
592 * offset+size to the image length.
593 */
594 length = blk_getlength(exp->common.blk);
595 if (length < 0) {
596 fuse_reply_err(req, -length);
597 return;
598 }
599
600 if (offset + size > length) {
601 size = length - offset;
602 }
603
604 buf = qemu_try_blockalign(blk_bs(exp->common.blk), size);
605 if (!buf) {
606 fuse_reply_err(req, ENOMEM);
607 return;
608 }
609
610 ret = blk_pread(exp->common.blk, offset, size, buf, 0);
611 if (ret >= 0) {
612 fuse_reply_buf(req, buf, size);
613 } else {
614 fuse_reply_err(req, -ret);
615 }
616
617 qemu_vfree(buf);
618 }
619
620 /**
621 * Handle client writes to the exported image.
622 */
623 static void fuse_write(fuse_req_t req, fuse_ino_t inode, const char *buf,
624 size_t size, off_t offset, struct fuse_file_info *fi)
625 {
626 FuseExport *exp = fuse_req_userdata(req);
627 int64_t length;
628 int ret;
629
630 /* Limited by max_write, should not happen */
631 if (size > BDRV_REQUEST_MAX_BYTES) {
632 fuse_reply_err(req, EINVAL);
633 return;
634 }
635
636 if (!exp->writable) {
637 fuse_reply_err(req, EACCES);
638 return;
639 }
640
641 /**
642 * Clients will expect short writes at EOF, so we have to limit
643 * offset+size to the image length.
644 */
645 length = blk_getlength(exp->common.blk);
646 if (length < 0) {
647 fuse_reply_err(req, -length);
648 return;
649 }
650
651 if (offset + size > length) {
652 if (exp->growable) {
653 ret = fuse_do_truncate(exp, offset + size, true, PREALLOC_MODE_OFF);
654 if (ret < 0) {
655 fuse_reply_err(req, -ret);
656 return;
657 }
658 } else {
659 size = length - offset;
660 }
661 }
662
663 ret = blk_pwrite(exp->common.blk, offset, size, buf, 0);
664 if (ret >= 0) {
665 fuse_reply_write(req, size);
666 } else {
667 fuse_reply_err(req, -ret);
668 }
669 }
670
671 /**
672 * Let clients perform various fallocate() operations.
673 */
674 static void fuse_fallocate(fuse_req_t req, fuse_ino_t inode, int mode,
675 off_t offset, off_t length,
676 struct fuse_file_info *fi)
677 {
678 FuseExport *exp = fuse_req_userdata(req);
679 int64_t blk_len;
680 int ret;
681
682 if (!exp->writable) {
683 fuse_reply_err(req, EACCES);
684 return;
685 }
686
687 blk_len = blk_getlength(exp->common.blk);
688 if (blk_len < 0) {
689 fuse_reply_err(req, -blk_len);
690 return;
691 }
692
693 #ifdef CONFIG_FALLOCATE_PUNCH_HOLE
694 if (mode & FALLOC_FL_KEEP_SIZE) {
695 length = MIN(length, blk_len - offset);
696 }
697 #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */
698
699 if (!mode) {
700 /* We can only fallocate at the EOF with a truncate */
701 if (offset < blk_len) {
702 fuse_reply_err(req, EOPNOTSUPP);
703 return;
704 }
705
706 if (offset > blk_len) {
707 /* No preallocation needed here */
708 ret = fuse_do_truncate(exp, offset, true, PREALLOC_MODE_OFF);
709 if (ret < 0) {
710 fuse_reply_err(req, -ret);
711 return;
712 }
713 }
714
715 ret = fuse_do_truncate(exp, offset + length, true,
716 PREALLOC_MODE_FALLOC);
717 }
718 #ifdef CONFIG_FALLOCATE_PUNCH_HOLE
719 else if (mode & FALLOC_FL_PUNCH_HOLE) {
720 if (!(mode & FALLOC_FL_KEEP_SIZE)) {
721 fuse_reply_err(req, EINVAL);
722 return;
723 }
724
725 do {
726 int size = MIN(length, BDRV_REQUEST_MAX_BYTES);
727
728 ret = blk_pwrite_zeroes(exp->common.blk, offset, size,
729 BDRV_REQ_MAY_UNMAP | BDRV_REQ_NO_FALLBACK);
730 if (ret == -ENOTSUP) {
731 /*
732 * fallocate() specifies to return EOPNOTSUPP for unsupported
733 * operations
734 */
735 ret = -EOPNOTSUPP;
736 }
737
738 offset += size;
739 length -= size;
740 } while (ret == 0 && length > 0);
741 }
742 #endif /* CONFIG_FALLOCATE_PUNCH_HOLE */
743 #ifdef CONFIG_FALLOCATE_ZERO_RANGE
744 else if (mode & FALLOC_FL_ZERO_RANGE) {
745 if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + length > blk_len) {
746 /* No need for zeroes, we are going to write them ourselves */
747 ret = fuse_do_truncate(exp, offset + length, false,
748 PREALLOC_MODE_OFF);
749 if (ret < 0) {
750 fuse_reply_err(req, -ret);
751 return;
752 }
753 }
754
755 do {
756 int size = MIN(length, BDRV_REQUEST_MAX_BYTES);
757
758 ret = blk_pwrite_zeroes(exp->common.blk,
759 offset, size, 0);
760 offset += size;
761 length -= size;
762 } while (ret == 0 && length > 0);
763 }
764 #endif /* CONFIG_FALLOCATE_ZERO_RANGE */
765 else {
766 ret = -EOPNOTSUPP;
767 }
768
769 fuse_reply_err(req, ret < 0 ? -ret : 0);
770 }
771
772 /**
773 * Let clients fsync the exported image.
774 */
775 static void fuse_fsync(fuse_req_t req, fuse_ino_t inode, int datasync,
776 struct fuse_file_info *fi)
777 {
778 FuseExport *exp = fuse_req_userdata(req);
779 int ret;
780
781 ret = blk_flush(exp->common.blk);
782 fuse_reply_err(req, ret < 0 ? -ret : 0);
783 }
784
785 /**
786 * Called before an FD to the exported image is closed. (libfuse
787 * notes this to be a way to return last-minute errors.)
788 */
789 static void fuse_flush(fuse_req_t req, fuse_ino_t inode,
790 struct fuse_file_info *fi)
791 {
792 fuse_fsync(req, inode, 1, fi);
793 }
794
795 #ifdef CONFIG_FUSE_LSEEK
796 /**
797 * Let clients inquire allocation status.
798 */
799 static void fuse_lseek(fuse_req_t req, fuse_ino_t inode, off_t offset,
800 int whence, struct fuse_file_info *fi)
801 {
802 FuseExport *exp = fuse_req_userdata(req);
803
804 if (whence != SEEK_HOLE && whence != SEEK_DATA) {
805 fuse_reply_err(req, EINVAL);
806 return;
807 }
808
809 while (true) {
810 int64_t pnum;
811 int ret;
812
813 ret = bdrv_block_status_above(blk_bs(exp->common.blk), NULL,
814 offset, INT64_MAX, &pnum, NULL, NULL);
815 if (ret < 0) {
816 fuse_reply_err(req, -ret);
817 return;
818 }
819
820 if (!pnum && (ret & BDRV_BLOCK_EOF)) {
821 int64_t blk_len;
822
823 /*
824 * If blk_getlength() rounds (e.g. by sectors), then the
825 * export length will be rounded, too. However,
826 * bdrv_block_status_above() may return EOF at unaligned
827 * offsets. We must not let this become visible and thus
828 * always simulate a hole between @offset (the real EOF)
829 * and @blk_len (the client-visible EOF).
830 */
831
832 blk_len = blk_getlength(exp->common.blk);
833 if (blk_len < 0) {
834 fuse_reply_err(req, -blk_len);
835 return;
836 }
837
838 if (offset > blk_len || whence == SEEK_DATA) {
839 fuse_reply_err(req, ENXIO);
840 } else {
841 fuse_reply_lseek(req, offset);
842 }
843 return;
844 }
845
846 if (ret & BDRV_BLOCK_DATA) {
847 if (whence == SEEK_DATA) {
848 fuse_reply_lseek(req, offset);
849 return;
850 }
851 } else {
852 if (whence == SEEK_HOLE) {
853 fuse_reply_lseek(req, offset);
854 return;
855 }
856 }
857
858 /* Safety check against infinite loops */
859 if (!pnum) {
860 fuse_reply_err(req, ENXIO);
861 return;
862 }
863
864 offset += pnum;
865 }
866 }
867 #endif
868
869 static const struct fuse_lowlevel_ops fuse_ops = {
870 .init = fuse_init,
871 .lookup = fuse_lookup,
872 .getattr = fuse_getattr,
873 .setattr = fuse_setattr,
874 .open = fuse_open,
875 .read = fuse_read,
876 .write = fuse_write,
877 .fallocate = fuse_fallocate,
878 .flush = fuse_flush,
879 .fsync = fuse_fsync,
880 #ifdef CONFIG_FUSE_LSEEK
881 .lseek = fuse_lseek,
882 #endif
883 };
884
885 const BlockExportDriver blk_exp_fuse = {
886 .type = BLOCK_EXPORT_TYPE_FUSE,
887 .instance_size = sizeof(FuseExport),
888 .create = fuse_export_create,
889 .delete = fuse_export_delete,
890 .request_shutdown = fuse_export_shutdown,
891 };