Commit | Line | Data |
---|---|---|
55716d26 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
b8441ed2 TH |
2 | /* |
3 | * fs/kernfs/inode.c - kernfs inode implementation | |
4 | * | |
5 | * Copyright (c) 2001-3 Patrick Mochel | |
6 | * Copyright (c) 2007 SUSE Linux Products GmbH | |
7 | * Copyright (c) 2007, 2013 Tejun Heo <tj@kernel.org> | |
b8441ed2 | 8 | */ |
ffed24e2 TH |
9 | |
10 | #include <linux/pagemap.h> | |
11 | #include <linux/backing-dev.h> | |
12 | #include <linux/capability.h> | |
13 | #include <linux/errno.h> | |
14 | #include <linux/slab.h> | |
15 | #include <linux/xattr.h> | |
16 | #include <linux/security.h> | |
17 | ||
18 | #include "kernfs-internal.h" | |
19 | ||
a797bfc3 | 20 | static const struct inode_operations kernfs_iops = { |
c637b8ac TH |
21 | .permission = kernfs_iop_permission, |
22 | .setattr = kernfs_iop_setattr, | |
23 | .getattr = kernfs_iop_getattr, | |
c637b8ac | 24 | .listxattr = kernfs_iop_listxattr, |
ffed24e2 TH |
25 | }; |
26 | ||
d0c9c153 | 27 | static struct kernfs_iattrs *__kernfs_iattrs(struct kernfs_node *kn, int alloc) |
ffed24e2 | 28 | { |
4afddd60 TH |
29 | static DEFINE_MUTEX(iattr_mutex); |
30 | struct kernfs_iattrs *ret; | |
ffed24e2 | 31 | |
4afddd60 TH |
32 | mutex_lock(&iattr_mutex); |
33 | ||
d0c9c153 | 34 | if (kn->iattr || !alloc) |
4afddd60 | 35 | goto out_unlock; |
9a8049af | 36 | |
26e28d68 | 37 | kn->iattr = kmem_cache_zalloc(kernfs_iattrs_cache, GFP_KERNEL); |
adc5e8b5 | 38 | if (!kn->iattr) |
4afddd60 | 39 | goto out_unlock; |
ffed24e2 TH |
40 | |
41 | /* assign default attributes */ | |
05895219 OM |
42 | kn->iattr->ia_uid = GLOBAL_ROOT_UID; |
43 | kn->iattr->ia_gid = GLOBAL_ROOT_GID; | |
3a3a5fec | 44 | |
05895219 OM |
45 | ktime_get_real_ts64(&kn->iattr->ia_atime); |
46 | kn->iattr->ia_mtime = kn->iattr->ia_atime; | |
47 | kn->iattr->ia_ctime = kn->iattr->ia_atime; | |
ffed24e2 | 48 | |
adc5e8b5 | 49 | simple_xattrs_init(&kn->iattr->xattrs); |
0c47383b DX |
50 | atomic_set(&kn->iattr->nr_user_xattrs, 0); |
51 | atomic_set(&kn->iattr->user_xattr_size, 0); | |
4afddd60 TH |
52 | out_unlock: |
53 | ret = kn->iattr; | |
54 | mutex_unlock(&iattr_mutex); | |
55 | return ret; | |
ffed24e2 TH |
56 | } |
57 | ||
d0c9c153 OM |
58 | static struct kernfs_iattrs *kernfs_iattrs(struct kernfs_node *kn) |
59 | { | |
60 | return __kernfs_iattrs(kn, 1); | |
61 | } | |
62 | ||
63 | static struct kernfs_iattrs *kernfs_iattrs_noalloc(struct kernfs_node *kn) | |
64 | { | |
65 | return __kernfs_iattrs(kn, 0); | |
66 | } | |
67 | ||
488dee96 | 68 | int __kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr) |
ffed24e2 | 69 | { |
c525aadd | 70 | struct kernfs_iattrs *attrs; |
ffed24e2 TH |
71 | unsigned int ia_valid = iattr->ia_valid; |
72 | ||
c525aadd | 73 | attrs = kernfs_iattrs(kn); |
9a8049af TH |
74 | if (!attrs) |
75 | return -ENOMEM; | |
ffed24e2 | 76 | |
ffed24e2 | 77 | if (ia_valid & ATTR_UID) |
05895219 | 78 | attrs->ia_uid = iattr->ia_uid; |
ffed24e2 | 79 | if (ia_valid & ATTR_GID) |
05895219 | 80 | attrs->ia_gid = iattr->ia_gid; |
ffed24e2 | 81 | if (ia_valid & ATTR_ATIME) |
05895219 | 82 | attrs->ia_atime = iattr->ia_atime; |
ffed24e2 | 83 | if (ia_valid & ATTR_MTIME) |
05895219 | 84 | attrs->ia_mtime = iattr->ia_mtime; |
ffed24e2 | 85 | if (ia_valid & ATTR_CTIME) |
05895219 OM |
86 | attrs->ia_ctime = iattr->ia_ctime; |
87 | if (ia_valid & ATTR_MODE) | |
88 | kn->mode = iattr->ia_mode; | |
ffed24e2 TH |
89 | return 0; |
90 | } | |
91 | ||
92 | /** | |
93 | * kernfs_setattr - set iattr on a node | |
324a56e1 | 94 | * @kn: target node |
ffed24e2 TH |
95 | * @iattr: iattr to set |
96 | * | |
24b3e3dd | 97 | * Return: %0 on success, -errno on failure. |
ffed24e2 | 98 | */ |
324a56e1 | 99 | int kernfs_setattr(struct kernfs_node *kn, const struct iattr *iattr) |
ffed24e2 TH |
100 | { |
101 | int ret; | |
393c3714 | 102 | struct kernfs_root *root = kernfs_root(kn); |
ffed24e2 | 103 | |
9caf6961 | 104 | down_write(&root->kernfs_iattr_rwsem); |
324a56e1 | 105 | ret = __kernfs_setattr(kn, iattr); |
9caf6961 | 106 | up_write(&root->kernfs_iattr_rwsem); |
ffed24e2 TH |
107 | return ret; |
108 | } | |
109 | ||
c1632a0f | 110 | int kernfs_iop_setattr(struct mnt_idmap *idmap, struct dentry *dentry, |
549c7297 | 111 | struct iattr *iattr) |
ffed24e2 | 112 | { |
2b0143b5 | 113 | struct inode *inode = d_inode(dentry); |
319ba91d | 114 | struct kernfs_node *kn = inode->i_private; |
393c3714 | 115 | struct kernfs_root *root; |
ffed24e2 TH |
116 | int error; |
117 | ||
324a56e1 | 118 | if (!kn) |
ffed24e2 TH |
119 | return -EINVAL; |
120 | ||
393c3714 | 121 | root = kernfs_root(kn); |
9caf6961 | 122 | down_write(&root->kernfs_iattr_rwsem); |
c1632a0f | 123 | error = setattr_prepare(&nop_mnt_idmap, dentry, iattr); |
ffed24e2 TH |
124 | if (error) |
125 | goto out; | |
126 | ||
324a56e1 | 127 | error = __kernfs_setattr(kn, iattr); |
ffed24e2 TH |
128 | if (error) |
129 | goto out; | |
130 | ||
131 | /* this ignores size changes */ | |
c1632a0f | 132 | setattr_copy(&nop_mnt_idmap, inode, iattr); |
ffed24e2 TH |
133 | |
134 | out: | |
9caf6961 | 135 | up_write(&root->kernfs_iattr_rwsem); |
ffed24e2 TH |
136 | return error; |
137 | } | |
138 | ||
c637b8ac | 139 | ssize_t kernfs_iop_listxattr(struct dentry *dentry, char *buf, size_t size) |
2322392b | 140 | { |
319ba91d | 141 | struct kernfs_node *kn = kernfs_dentry_node(dentry); |
c525aadd | 142 | struct kernfs_iattrs *attrs; |
2322392b | 143 | |
c525aadd | 144 | attrs = kernfs_iattrs(kn); |
2322392b TH |
145 | if (!attrs) |
146 | return -ENOMEM; | |
147 | ||
786534b9 | 148 | return simple_xattr_list(d_inode(dentry), &attrs->xattrs, buf, size); |
ffed24e2 TH |
149 | } |
150 | ||
151 | static inline void set_default_inode_attr(struct inode *inode, umode_t mode) | |
152 | { | |
153 | inode->i_mode = mode; | |
2a45ac15 | 154 | simple_inode_init_ts(inode); |
ffed24e2 TH |
155 | } |
156 | ||
05895219 OM |
157 | static inline void set_inode_attr(struct inode *inode, |
158 | struct kernfs_iattrs *attrs) | |
ffed24e2 | 159 | { |
05895219 OM |
160 | inode->i_uid = attrs->ia_uid; |
161 | inode->i_gid = attrs->ia_gid; | |
2a45ac15 JL |
162 | inode_set_atime_to_ts(inode, attrs->ia_atime); |
163 | inode_set_mtime_to_ts(inode, attrs->ia_mtime); | |
f7f43858 | 164 | inode_set_ctime_to_ts(inode, attrs->ia_ctime); |
ffed24e2 TH |
165 | } |
166 | ||
c637b8ac | 167 | static void kernfs_refresh_inode(struct kernfs_node *kn, struct inode *inode) |
ffed24e2 | 168 | { |
c525aadd | 169 | struct kernfs_iattrs *attrs = kn->iattr; |
ffed24e2 | 170 | |
adc5e8b5 | 171 | inode->i_mode = kn->mode; |
0ac6075a | 172 | if (attrs) |
324a56e1 TH |
173 | /* |
174 | * kernfs_node has non-default attributes get them from | |
175 | * persistent copy in kernfs_node. | |
ffed24e2 | 176 | */ |
05895219 | 177 | set_inode_attr(inode, attrs); |
ffed24e2 | 178 | |
df23fc39 | 179 | if (kernfs_type(kn) == KERNFS_DIR) |
adc5e8b5 | 180 | set_nlink(inode, kn->dir.subdirs + 2); |
ffed24e2 TH |
181 | } |
182 | ||
b74d24f7 | 183 | int kernfs_iop_getattr(struct mnt_idmap *idmap, |
549c7297 | 184 | const struct path *path, struct kstat *stat, |
a528d35e | 185 | u32 request_mask, unsigned int query_flags) |
ffed24e2 | 186 | { |
a528d35e | 187 | struct inode *inode = d_inode(path->dentry); |
319ba91d | 188 | struct kernfs_node *kn = inode->i_private; |
393c3714 | 189 | struct kernfs_root *root = kernfs_root(kn); |
ffed24e2 | 190 | |
9caf6961 | 191 | down_read(&root->kernfs_iattr_rwsem); |
c637b8ac | 192 | kernfs_refresh_inode(kn, inode); |
0d72b928 | 193 | generic_fillattr(&nop_mnt_idmap, request_mask, inode, stat); |
9caf6961 | 194 | up_read(&root->kernfs_iattr_rwsem); |
47b5c64d | 195 | |
ffed24e2 TH |
196 | return 0; |
197 | } | |
198 | ||
c637b8ac | 199 | static void kernfs_init_inode(struct kernfs_node *kn, struct inode *inode) |
ffed24e2 | 200 | { |
324a56e1 TH |
201 | kernfs_get(kn); |
202 | inode->i_private = kn; | |
c1e3dbe9 | 203 | inode->i_mapping->a_ops = &ram_aops; |
a797bfc3 | 204 | inode->i_op = &kernfs_iops; |
67c0496e | 205 | inode->i_generation = kernfs_gen(kn); |
ffed24e2 | 206 | |
adc5e8b5 | 207 | set_default_inode_attr(inode, kn->mode); |
c637b8ac | 208 | kernfs_refresh_inode(kn, inode); |
ffed24e2 TH |
209 | |
210 | /* initialize inode according to type */ | |
df23fc39 TH |
211 | switch (kernfs_type(kn)) { |
212 | case KERNFS_DIR: | |
a797bfc3 TH |
213 | inode->i_op = &kernfs_dir_iops; |
214 | inode->i_fop = &kernfs_dir_fops; | |
ea015218 EB |
215 | if (kn->flags & KERNFS_EMPTY_DIR) |
216 | make_empty_dir_inode(inode); | |
ffed24e2 | 217 | break; |
df23fc39 | 218 | case KERNFS_FILE: |
adc5e8b5 | 219 | inode->i_size = kn->attr.size; |
a797bfc3 | 220 | inode->i_fop = &kernfs_file_fops; |
ffed24e2 | 221 | break; |
df23fc39 | 222 | case KERNFS_LINK: |
a797bfc3 | 223 | inode->i_op = &kernfs_symlink_iops; |
ffed24e2 TH |
224 | break; |
225 | default: | |
226 | BUG(); | |
227 | } | |
228 | ||
229 | unlock_new_inode(inode); | |
230 | } | |
231 | ||
232 | /** | |
c637b8ac | 233 | * kernfs_get_inode - get inode for kernfs_node |
ffed24e2 | 234 | * @sb: super block |
324a56e1 | 235 | * @kn: kernfs_node to allocate inode for |
ffed24e2 | 236 | * |
324a56e1 TH |
237 | * Get inode for @kn. If such inode doesn't exist, a new inode is |
238 | * allocated and basics are initialized. New inode is returned | |
239 | * locked. | |
ffed24e2 | 240 | * |
24b3e3dd | 241 | * Locking: |
ffed24e2 TH |
242 | * Kernel thread context (may sleep). |
243 | * | |
24b3e3dd RD |
244 | * Return: |
245 | * Pointer to allocated inode on success, %NULL on failure. | |
ffed24e2 | 246 | */ |
c637b8ac | 247 | struct inode *kernfs_get_inode(struct super_block *sb, struct kernfs_node *kn) |
ffed24e2 TH |
248 | { |
249 | struct inode *inode; | |
250 | ||
67c0496e | 251 | inode = iget_locked(sb, kernfs_ino(kn)); |
ffed24e2 | 252 | if (inode && (inode->i_state & I_NEW)) |
c637b8ac | 253 | kernfs_init_inode(kn, inode); |
ffed24e2 TH |
254 | |
255 | return inode; | |
256 | } | |
257 | ||
258 | /* | |
c637b8ac TH |
259 | * The kernfs_node serves as both an inode and a directory entry for |
260 | * kernfs. To prevent the kernfs inode numbers from being freed | |
261 | * prematurely we take a reference to kernfs_node from the kernfs inode. A | |
ffed24e2 TH |
262 | * super_operations.evict_inode() implementation is needed to drop that |
263 | * reference upon inode destruction. | |
264 | */ | |
c637b8ac | 265 | void kernfs_evict_inode(struct inode *inode) |
ffed24e2 | 266 | { |
324a56e1 | 267 | struct kernfs_node *kn = inode->i_private; |
ffed24e2 | 268 | |
91b0abe3 | 269 | truncate_inode_pages_final(&inode->i_data); |
ffed24e2 | 270 | clear_inode(inode); |
324a56e1 | 271 | kernfs_put(kn); |
ffed24e2 TH |
272 | } |
273 | ||
4609e1f1 | 274 | int kernfs_iop_permission(struct mnt_idmap *idmap, |
549c7297 | 275 | struct inode *inode, int mask) |
ffed24e2 | 276 | { |
324a56e1 | 277 | struct kernfs_node *kn; |
393c3714 | 278 | struct kernfs_root *root; |
47b5c64d | 279 | int ret; |
ffed24e2 TH |
280 | |
281 | if (mask & MAY_NOT_BLOCK) | |
282 | return -ECHILD; | |
283 | ||
324a56e1 | 284 | kn = inode->i_private; |
393c3714 | 285 | root = kernfs_root(kn); |
ffed24e2 | 286 | |
9caf6961 | 287 | down_read(&root->kernfs_iattr_rwsem); |
c637b8ac | 288 | kernfs_refresh_inode(kn, inode); |
4609e1f1 | 289 | ret = generic_permission(&nop_mnt_idmap, inode, mask); |
9caf6961 | 290 | up_read(&root->kernfs_iattr_rwsem); |
ffed24e2 | 291 | |
47b5c64d | 292 | return ret; |
ffed24e2 | 293 | } |
e72a1a8b | 294 | |
1537ad15 OM |
295 | int kernfs_xattr_get(struct kernfs_node *kn, const char *name, |
296 | void *value, size_t size) | |
e72a1a8b | 297 | { |
1537ad15 | 298 | struct kernfs_iattrs *attrs = kernfs_iattrs_noalloc(kn); |
e72a1a8b | 299 | if (!attrs) |
d0c9c153 | 300 | return -ENODATA; |
e72a1a8b AG |
301 | |
302 | return simple_xattr_get(&attrs->xattrs, name, value, size); | |
303 | } | |
304 | ||
1537ad15 OM |
305 | int kernfs_xattr_set(struct kernfs_node *kn, const char *name, |
306 | const void *value, size_t size, int flags) | |
e72a1a8b | 307 | { |
5de75970 | 308 | struct simple_xattr *old_xattr; |
1537ad15 | 309 | struct kernfs_iattrs *attrs = kernfs_iattrs(kn); |
e72a1a8b AG |
310 | if (!attrs) |
311 | return -ENOMEM; | |
312 | ||
5de75970 HD |
313 | old_xattr = simple_xattr_set(&attrs->xattrs, name, value, size, flags); |
314 | if (IS_ERR(old_xattr)) | |
315 | return PTR_ERR(old_xattr); | |
316 | ||
317 | simple_xattr_free(old_xattr); | |
318 | return 0; | |
e72a1a8b AG |
319 | } |
320 | ||
1537ad15 OM |
321 | static int kernfs_vfs_xattr_get(const struct xattr_handler *handler, |
322 | struct dentry *unused, struct inode *inode, | |
323 | const char *suffix, void *value, size_t size) | |
b230d5ab | 324 | { |
1537ad15 | 325 | const char *name = xattr_full_name(handler, suffix); |
b230d5ab OM |
326 | struct kernfs_node *kn = inode->i_private; |
327 | ||
1537ad15 | 328 | return kernfs_xattr_get(kn, name, value, size); |
b230d5ab OM |
329 | } |
330 | ||
1537ad15 | 331 | static int kernfs_vfs_xattr_set(const struct xattr_handler *handler, |
39f60c1c | 332 | struct mnt_idmap *idmap, |
1537ad15 OM |
333 | struct dentry *unused, struct inode *inode, |
334 | const char *suffix, const void *value, | |
335 | size_t size, int flags) | |
b230d5ab | 336 | { |
1537ad15 | 337 | const char *name = xattr_full_name(handler, suffix); |
b230d5ab OM |
338 | struct kernfs_node *kn = inode->i_private; |
339 | ||
1537ad15 | 340 | return kernfs_xattr_set(kn, name, value, size, flags); |
b230d5ab OM |
341 | } |
342 | ||
0c47383b DX |
343 | static int kernfs_vfs_user_xattr_add(struct kernfs_node *kn, |
344 | const char *full_name, | |
345 | struct simple_xattrs *xattrs, | |
346 | const void *value, size_t size, int flags) | |
347 | { | |
348 | atomic_t *sz = &kn->iattr->user_xattr_size; | |
349 | atomic_t *nr = &kn->iattr->nr_user_xattrs; | |
5de75970 | 350 | struct simple_xattr *old_xattr; |
0c47383b DX |
351 | int ret; |
352 | ||
353 | if (atomic_inc_return(nr) > KERNFS_MAX_USER_XATTRS) { | |
354 | ret = -ENOSPC; | |
355 | goto dec_count_out; | |
356 | } | |
357 | ||
358 | if (atomic_add_return(size, sz) > KERNFS_USER_XATTR_SIZE_LIMIT) { | |
359 | ret = -ENOSPC; | |
360 | goto dec_size_out; | |
361 | } | |
362 | ||
5de75970 HD |
363 | old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); |
364 | if (!old_xattr) | |
0c47383b | 365 | return 0; |
5de75970 HD |
366 | |
367 | if (IS_ERR(old_xattr)) { | |
368 | ret = PTR_ERR(old_xattr); | |
369 | goto dec_size_out; | |
370 | } | |
371 | ||
372 | ret = 0; | |
373 | size = old_xattr->size; | |
374 | simple_xattr_free(old_xattr); | |
0c47383b DX |
375 | dec_size_out: |
376 | atomic_sub(size, sz); | |
377 | dec_count_out: | |
378 | atomic_dec(nr); | |
379 | return ret; | |
380 | } | |
381 | ||
382 | static int kernfs_vfs_user_xattr_rm(struct kernfs_node *kn, | |
383 | const char *full_name, | |
384 | struct simple_xattrs *xattrs, | |
385 | const void *value, size_t size, int flags) | |
386 | { | |
387 | atomic_t *sz = &kn->iattr->user_xattr_size; | |
388 | atomic_t *nr = &kn->iattr->nr_user_xattrs; | |
5de75970 | 389 | struct simple_xattr *old_xattr; |
0c47383b | 390 | |
5de75970 HD |
391 | old_xattr = simple_xattr_set(xattrs, full_name, value, size, flags); |
392 | if (!old_xattr) | |
393 | return 0; | |
0c47383b | 394 | |
5de75970 HD |
395 | if (IS_ERR(old_xattr)) |
396 | return PTR_ERR(old_xattr); | |
0c47383b | 397 | |
5de75970 HD |
398 | atomic_sub(old_xattr->size, sz); |
399 | atomic_dec(nr); | |
400 | simple_xattr_free(old_xattr); | |
401 | return 0; | |
0c47383b DX |
402 | } |
403 | ||
404 | static int kernfs_vfs_user_xattr_set(const struct xattr_handler *handler, | |
39f60c1c | 405 | struct mnt_idmap *idmap, |
0c47383b DX |
406 | struct dentry *unused, struct inode *inode, |
407 | const char *suffix, const void *value, | |
408 | size_t size, int flags) | |
409 | { | |
410 | const char *full_name = xattr_full_name(handler, suffix); | |
411 | struct kernfs_node *kn = inode->i_private; | |
412 | struct kernfs_iattrs *attrs; | |
413 | ||
414 | if (!(kernfs_root(kn)->flags & KERNFS_ROOT_SUPPORT_USER_XATTR)) | |
415 | return -EOPNOTSUPP; | |
416 | ||
417 | attrs = kernfs_iattrs(kn); | |
418 | if (!attrs) | |
419 | return -ENOMEM; | |
420 | ||
421 | if (value) | |
422 | return kernfs_vfs_user_xattr_add(kn, full_name, &attrs->xattrs, | |
423 | value, size, flags); | |
424 | else | |
425 | return kernfs_vfs_user_xattr_rm(kn, full_name, &attrs->xattrs, | |
426 | value, size, flags); | |
427 | ||
428 | } | |
429 | ||
b5a06234 | 430 | static const struct xattr_handler kernfs_trusted_xattr_handler = { |
e72a1a8b | 431 | .prefix = XATTR_TRUSTED_PREFIX, |
1537ad15 OM |
432 | .get = kernfs_vfs_xattr_get, |
433 | .set = kernfs_vfs_xattr_set, | |
e72a1a8b AG |
434 | }; |
435 | ||
b5a06234 | 436 | static const struct xattr_handler kernfs_security_xattr_handler = { |
e72a1a8b | 437 | .prefix = XATTR_SECURITY_PREFIX, |
1537ad15 OM |
438 | .get = kernfs_vfs_xattr_get, |
439 | .set = kernfs_vfs_xattr_set, | |
e72a1a8b AG |
440 | }; |
441 | ||
0c47383b DX |
442 | static const struct xattr_handler kernfs_user_xattr_handler = { |
443 | .prefix = XATTR_USER_PREFIX, | |
444 | .get = kernfs_vfs_xattr_get, | |
445 | .set = kernfs_vfs_user_xattr_set, | |
446 | }; | |
447 | ||
ffb2e065 | 448 | const struct xattr_handler * const kernfs_xattr_handlers[] = { |
e72a1a8b AG |
449 | &kernfs_trusted_xattr_handler, |
450 | &kernfs_security_xattr_handler, | |
0c47383b | 451 | &kernfs_user_xattr_handler, |
e72a1a8b AG |
452 | NULL |
453 | }; |