blob: 8ca36394fa30dc0742ecf8408cba15bb5fdd1ad8 [file] [log] [blame]
Thomas Gleixner328970d2019-05-24 12:04:05 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Joel Becker7063fbf2005-12-15 14:29:43 -08002/* -*- mode: c; c-basic-offset: 8; -*-
3 * vim: noexpandtab sw=8 ts=8 sts=0:
4 *
5 * symlink.c - operations for configfs symlinks.
6 *
Joel Becker7063fbf2005-12-15 14:29:43 -08007 * Based on sysfs:
8 * sysfs is Copyright (C) 2001, 2002, 2003 Patrick Mochel
9 *
10 * configfs Copyright (C) 2005 Oracle. All rights reserved.
11 */
12
13#include <linux/fs.h>
14#include <linux/module.h>
15#include <linux/namei.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090016#include <linux/slab.h>
Joel Becker7063fbf2005-12-15 14:29:43 -080017
18#include <linux/configfs.h>
19#include "configfs_internal.h"
20
Louis Rilling9a73d782008-06-20 14:09:22 +020021/* Protects attachments of new symlinks */
22DEFINE_MUTEX(configfs_symlink_mutex);
23
Joel Becker7063fbf2005-12-15 14:29:43 -080024static int item_depth(struct config_item * item)
25{
26 struct config_item * p = item;
27 int depth = 0;
28 do { depth++; } while ((p = p->ci_parent) && !configfs_is_root(p));
29 return depth;
30}
31
32static int item_path_length(struct config_item * item)
33{
34 struct config_item * p = item;
35 int length = 1;
36 do {
37 length += strlen(config_item_name(p)) + 1;
38 p = p->ci_parent;
39 } while (p && !configfs_is_root(p));
40 return length;
41}
42
43static void fill_item_path(struct config_item * item, char * buffer, int length)
44{
45 struct config_item * p;
46
47 --length;
48 for (p = item; p && !configfs_is_root(p); p = p->ci_parent) {
49 int cur = strlen(config_item_name(p));
50
51 /* back up enough to print this bus id with '/' */
52 length -= cur;
Guenter Roeck18233422018-07-01 13:56:54 -070053 memcpy(buffer + length, config_item_name(p), cur);
Joel Becker7063fbf2005-12-15 14:29:43 -080054 *(buffer + --length) = '/';
55 }
56}
57
Al Viroe9c03af2019-09-11 09:00:01 +020058static int configfs_get_target_path(struct config_item *item,
59 struct config_item *target, char *path)
60{
61 int depth, size;
62 char *s;
63
64 depth = item_depth(item);
65 size = item_path_length(target) + depth * 3 - 1;
66 if (size > PATH_MAX)
67 return -ENAMETOOLONG;
68
69 pr_debug("%s: depth = %d, size = %d\n", __func__, depth, size);
70
71 for (s = path; depth--; s += 3)
72 strcpy(s,"../");
73
74 fill_item_path(target, path, size);
75 pr_debug("%s: path = '%s'\n", __func__, path);
76 return 0;
77}
78
Joel Becker7063fbf2005-12-15 14:29:43 -080079static int create_link(struct config_item *parent_item,
Joel Beckere7515d02006-03-10 11:42:30 -080080 struct config_item *item,
Joel Becker7063fbf2005-12-15 14:29:43 -080081 struct dentry *dentry)
82{
83 struct configfs_dirent *target_sd = item->ci_dentry->d_fsdata;
Al Viroe9c03af2019-09-11 09:00:01 +020084 char *body;
Joel Becker7063fbf2005-12-15 14:29:43 -080085 int ret;
86
Louis Rilling2a109f22008-07-04 16:56:05 +020087 if (!configfs_dirent_is_ready(target_sd))
Al Viroe9c03af2019-09-11 09:00:01 +020088 return -ENOENT;
Joel Becker7063fbf2005-12-15 14:29:43 -080089
Al Viroe9c03af2019-09-11 09:00:01 +020090 body = kzalloc(PAGE_SIZE, GFP_KERNEL);
91 if (!body)
92 return -ENOMEM;
93
94 configfs_get(target_sd);
95 spin_lock(&configfs_dirent_lock);
96 if (target_sd->s_type & CONFIGFS_USET_DROPPING) {
97 spin_unlock(&configfs_dirent_lock);
98 configfs_put(target_sd);
99 kfree(body);
100 return -ENOENT;
101 }
102 target_sd->s_links++;
103 spin_unlock(&configfs_dirent_lock);
Honggang Lie2f238f2019-11-04 20:43:22 +0800104 ret = configfs_get_target_path(parent_item, item, body);
Al Viroe9c03af2019-09-11 09:00:01 +0200105 if (!ret)
106 ret = configfs_create_link(target_sd, parent_item->ci_dentry,
107 dentry, body);
108 if (ret) {
109 spin_lock(&configfs_dirent_lock);
110 target_sd->s_links--;
111 spin_unlock(&configfs_dirent_lock);
112 configfs_put(target_sd);
113 kfree(body);
114 }
Joel Becker7063fbf2005-12-15 14:29:43 -0800115 return ret;
116}
117
118
Al Viro421748e2008-08-02 01:04:36 -0400119static int get_target(const char *symname, struct path *path,
Al Virob7c177f2012-03-17 16:24:54 -0400120 struct config_item **target, struct super_block *sb)
Joel Becker7063fbf2005-12-15 14:29:43 -0800121{
122 int ret;
123
Al Viro421748e2008-08-02 01:04:36 -0400124 ret = kern_path(symname, LOOKUP_FOLLOW|LOOKUP_DIRECTORY, path);
Joel Becker7063fbf2005-12-15 14:29:43 -0800125 if (!ret) {
Al Virob7c177f2012-03-17 16:24:54 -0400126 if (path->dentry->d_sb == sb) {
Al Viro421748e2008-08-02 01:04:36 -0400127 *target = configfs_get_config_item(path->dentry);
Joel Becker7063fbf2005-12-15 14:29:43 -0800128 if (!*target) {
129 ret = -ENOENT;
Al Viro421748e2008-08-02 01:04:36 -0400130 path_put(path);
Joel Becker7063fbf2005-12-15 14:29:43 -0800131 }
Al Viro9b6e3102010-01-13 22:10:57 -0500132 } else {
Joel Becker7063fbf2005-12-15 14:29:43 -0800133 ret = -EPERM;
Al Viro9b6e3102010-01-13 22:10:57 -0500134 path_put(path);
135 }
Joel Becker7063fbf2005-12-15 14:29:43 -0800136 }
137
138 return ret;
139}
140
141
142int configfs_symlink(struct inode *dir, struct dentry *dentry, const char *symname)
143{
144 int ret;
Al Viro421748e2008-08-02 01:04:36 -0400145 struct path path;
Louis Rilling2a109f22008-07-04 16:56:05 +0200146 struct configfs_dirent *sd;
Joel Becker7063fbf2005-12-15 14:29:43 -0800147 struct config_item *parent_item;
Subrata Modak3c48f232009-04-19 01:10:03 +0530148 struct config_item *target_item = NULL;
Bhumika Goyalaa293582017-10-16 17:18:40 +0200149 const struct config_item_type *type;
Joel Becker7063fbf2005-12-15 14:29:43 -0800150
Louis Rilling2a109f22008-07-04 16:56:05 +0200151 sd = dentry->d_parent->d_fsdata;
152 /*
153 * Fake invisibility if dir belongs to a group/default groups hierarchy
154 * being attached
155 */
Louis Rilling2a109f22008-07-04 16:56:05 +0200156 if (!configfs_dirent_is_ready(sd))
Al Viroe9c03af2019-09-11 09:00:01 +0200157 return -ENOENT;
Louis Rilling2a109f22008-07-04 16:56:05 +0200158
Joel Becker7063fbf2005-12-15 14:29:43 -0800159 parent_item = configfs_get_config_item(dentry->d_parent);
160 type = parent_item->ci_type;
161
Louis Rilling2a109f22008-07-04 16:56:05 +0200162 ret = -EPERM;
Joel Becker7063fbf2005-12-15 14:29:43 -0800163 if (!type || !type->ct_item_ops ||
164 !type->ct_item_ops->allow_link)
165 goto out_put;
166
Al Viro351e5d82019-08-03 11:51:18 -0400167 /*
168 * This is really sick. What they wanted was a hybrid of
169 * link(2) and symlink(2) - they wanted the target resolved
170 * at syscall time (as link(2) would've done), be a directory
171 * (which link(2) would've refused to do) *AND* be a deep
172 * fucking magic, making the target busy from rmdir POV.
173 * symlink(2) is nothing of that sort, and the locking it
174 * gets matches the normal symlink(2) semantics. Without
175 * attempts to resolve the target (which might very well
176 * not even exist yet) done prior to locking the parent
177 * directory. This perversion, OTOH, needs to resolve
178 * the target, which would lead to obvious deadlocks if
179 * attempted with any directories locked.
180 *
181 * Unfortunately, that garbage is userland ABI and we should've
182 * said "no" back in 2005. Too late now, so we get to
183 * play very ugly games with locking.
184 *
185 * Try *ANYTHING* of that sort in new code, and you will
186 * really regret it. Just ask yourself - what could a BOFH
187 * do to me and do I want to find it out first-hand?
188 *
189 * AV, a thoroughly annoyed bastard.
190 */
191 inode_unlock(dir);
Al Virob7c177f2012-03-17 16:24:54 -0400192 ret = get_target(symname, &path, &target_item, dentry->d_sb);
Al Viro351e5d82019-08-03 11:51:18 -0400193 inode_lock(dir);
Joel Becker7063fbf2005-12-15 14:29:43 -0800194 if (ret)
195 goto out_put;
196
Al Viro351e5d82019-08-03 11:51:18 -0400197 if (dentry->d_inode || d_unhashed(dentry))
198 ret = -EEXIST;
199 else
Christian Brauner47291ba2021-01-21 14:19:24 +0100200 ret = inode_permission(&init_user_ns, dir,
201 MAY_WRITE | MAY_EXEC);
Al Viro351e5d82019-08-03 11:51:18 -0400202 if (!ret)
203 ret = type->ct_item_ops->allow_link(parent_item, target_item);
Louis Rillinge7520652008-06-12 17:26:47 +0200204 if (!ret) {
Louis Rilling9a73d782008-06-20 14:09:22 +0200205 mutex_lock(&configfs_symlink_mutex);
Joel Becker7063fbf2005-12-15 14:29:43 -0800206 ret = create_link(parent_item, target_item, dentry);
Louis Rilling9a73d782008-06-20 14:09:22 +0200207 mutex_unlock(&configfs_symlink_mutex);
Louis Rillinge7520652008-06-12 17:26:47 +0200208 if (ret && type->ct_item_ops->drop_link)
209 type->ct_item_ops->drop_link(parent_item,
210 target_item);
211 }
Joel Becker7063fbf2005-12-15 14:29:43 -0800212
213 config_item_put(target_item);
Al Viro421748e2008-08-02 01:04:36 -0400214 path_put(&path);
Joel Becker7063fbf2005-12-15 14:29:43 -0800215
216out_put:
217 config_item_put(parent_item);
Joel Becker7063fbf2005-12-15 14:29:43 -0800218 return ret;
219}
220
221int configfs_unlink(struct inode *dir, struct dentry *dentry)
222{
Al Viroe9c03af2019-09-11 09:00:01 +0200223 struct configfs_dirent *sd = dentry->d_fsdata, *target_sd;
Joel Becker7063fbf2005-12-15 14:29:43 -0800224 struct config_item *parent_item;
Bhumika Goyalaa293582017-10-16 17:18:40 +0200225 const struct config_item_type *type;
Joel Becker7063fbf2005-12-15 14:29:43 -0800226 int ret;
227
228 ret = -EPERM; /* What lack-of-symlink returns */
229 if (!(sd->s_type & CONFIGFS_ITEM_LINK))
230 goto out;
231
Al Viroe9c03af2019-09-11 09:00:01 +0200232 target_sd = sd->s_element;
Joel Becker7063fbf2005-12-15 14:29:43 -0800233
234 parent_item = configfs_get_config_item(dentry->d_parent);
235 type = parent_item->ci_type;
236
Louis Rilling6f610762008-06-16 19:00:58 +0200237 spin_lock(&configfs_dirent_lock);
Joel Becker7063fbf2005-12-15 14:29:43 -0800238 list_del_init(&sd->s_sibling);
Louis Rilling6f610762008-06-16 19:00:58 +0200239 spin_unlock(&configfs_dirent_lock);
Joel Becker7063fbf2005-12-15 14:29:43 -0800240 configfs_drop_dentry(sd, dentry->d_parent);
241 dput(dentry);
242 configfs_put(sd);
243
244 /*
245 * drop_link() must be called before
Al Viroe9c03af2019-09-11 09:00:01 +0200246 * decrementing target's ->s_links, so that the order of
Joel Becker7063fbf2005-12-15 14:29:43 -0800247 * drop_link(this, target) and drop_item(target) is preserved.
248 */
249 if (type && type->ct_item_ops &&
250 type->ct_item_ops->drop_link)
251 type->ct_item_ops->drop_link(parent_item,
Al Viroe9c03af2019-09-11 09:00:01 +0200252 target_sd->s_element);
Joel Becker7063fbf2005-12-15 14:29:43 -0800253
Louis Rilling5301a772008-06-16 19:00:59 +0200254 spin_lock(&configfs_dirent_lock);
Al Viroe9c03af2019-09-11 09:00:01 +0200255 target_sd->s_links--;
Louis Rilling5301a772008-06-16 19:00:59 +0200256 spin_unlock(&configfs_dirent_lock);
Al Viroe9c03af2019-09-11 09:00:01 +0200257 configfs_put(target_sd);
Joel Becker7063fbf2005-12-15 14:29:43 -0800258
259 config_item_put(parent_item);
260
261 ret = 0;
262
263out:
264 return ret;
265}
266
Arjan van de Ven754661f2007-02-12 00:55:38 -0800267const struct inode_operations configfs_symlink_inode_operations = {
Al Viroe9c03af2019-09-11 09:00:01 +0200268 .get_link = simple_get_link,
Joel Becker3d0f89b2006-01-25 13:31:07 -0800269 .setattr = configfs_setattr,
Joel Becker7063fbf2005-12-15 14:29:43 -0800270};
271