2018-06-06 05:42:14 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2013-08-12 14:49:40 +04:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2000-2006 Silicon Graphics, Inc.
|
|
|
|
* Copyright (c) 2012-2013 Red Hat, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*/
|
|
|
|
#include "xfs.h"
|
|
|
|
#include "xfs_fs.h"
|
|
|
|
#include "xfs_format.h"
|
2013-10-23 03:50:10 +04:00
|
|
|
#include "xfs_log_format.h"
|
2013-10-23 03:36:05 +04:00
|
|
|
#include "xfs_shared.h"
|
2013-10-23 03:50:10 +04:00
|
|
|
#include "xfs_trans_resv.h"
|
2013-08-12 14:49:40 +04:00
|
|
|
#include "xfs_mount.h"
|
|
|
|
#include "xfs_bmap_btree.h"
|
|
|
|
#include "xfs_inode.h"
|
|
|
|
#include "xfs_error.h"
|
|
|
|
#include "xfs_trace.h"
|
|
|
|
#include "xfs_symlink.h"
|
|
|
|
#include "xfs_cksum.h"
|
2013-10-23 03:50:10 +04:00
|
|
|
#include "xfs_trans.h"
|
2013-08-12 14:49:40 +04:00
|
|
|
#include "xfs_buf_item.h"
|
2015-10-12 07:59:25 +03:00
|
|
|
#include "xfs_log.h"
|
2013-08-12 14:49:40 +04:00
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Each contiguous block has a header, so it is not just a simple pathlen
|
|
|
|
* to FSB conversion.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
xfs_symlink_blocks(
|
|
|
|
struct xfs_mount *mp,
|
|
|
|
int pathlen)
|
|
|
|
{
|
|
|
|
int buflen = XFS_SYMLINK_BUF_SPACE(mp, mp->m_sb.sb_blocksize);
|
|
|
|
|
|
|
|
return (pathlen + buflen - 1) / buflen;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
xfs_symlink_hdr_set(
|
|
|
|
struct xfs_mount *mp,
|
|
|
|
xfs_ino_t ino,
|
|
|
|
uint32_t offset,
|
|
|
|
uint32_t size,
|
|
|
|
struct xfs_buf *bp)
|
|
|
|
{
|
|
|
|
struct xfs_dsymlink_hdr *dsl = bp->b_addr;
|
|
|
|
|
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb))
|
|
|
|
return 0;
|
|
|
|
|
2015-10-12 07:59:25 +03:00
|
|
|
memset(dsl, 0, sizeof(struct xfs_dsymlink_hdr));
|
2013-08-12 14:49:40 +04:00
|
|
|
dsl->sl_magic = cpu_to_be32(XFS_SYMLINK_MAGIC);
|
|
|
|
dsl->sl_offset = cpu_to_be32(offset);
|
|
|
|
dsl->sl_bytes = cpu_to_be32(size);
|
2015-07-29 04:53:31 +03:00
|
|
|
uuid_copy(&dsl->sl_uuid, &mp->m_sb.sb_meta_uuid);
|
2013-08-12 14:49:40 +04:00
|
|
|
dsl->sl_owner = cpu_to_be64(ino);
|
|
|
|
dsl->sl_blkno = cpu_to_be64(bp->b_bn);
|
|
|
|
bp->b_ops = &xfs_symlink_buf_ops;
|
|
|
|
|
|
|
|
return sizeof(struct xfs_dsymlink_hdr);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Checking of the symlink header is split into two parts. the verifier does
|
|
|
|
* CRC, location and bounds checking, the unpacking function checks the path
|
|
|
|
* parameters and owner.
|
|
|
|
*/
|
|
|
|
bool
|
|
|
|
xfs_symlink_hdr_ok(
|
|
|
|
xfs_ino_t ino,
|
|
|
|
uint32_t offset,
|
|
|
|
uint32_t size,
|
|
|
|
struct xfs_buf *bp)
|
|
|
|
{
|
|
|
|
struct xfs_dsymlink_hdr *dsl = bp->b_addr;
|
|
|
|
|
|
|
|
if (offset != be32_to_cpu(dsl->sl_offset))
|
|
|
|
return false;
|
|
|
|
if (size != be32_to_cpu(dsl->sl_bytes))
|
|
|
|
return false;
|
|
|
|
if (ino != be64_to_cpu(dsl->sl_owner))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* ok */
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-01-08 21:51:03 +03:00
|
|
|
static xfs_failaddr_t
|
2013-08-12 14:49:40 +04:00
|
|
|
xfs_symlink_verify(
|
|
|
|
struct xfs_buf *bp)
|
|
|
|
{
|
|
|
|
struct xfs_mount *mp = bp->b_target->bt_mount;
|
|
|
|
struct xfs_dsymlink_hdr *dsl = bp->b_addr;
|
|
|
|
|
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb))
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2019-02-07 21:45:48 +03:00
|
|
|
if (!xfs_verify_magic(bp, dsl->sl_magic))
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2015-07-29 04:53:31 +03:00
|
|
|
if (!uuid_equal(&dsl->sl_uuid, &mp->m_sb.sb_meta_uuid))
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2013-08-12 14:49:40 +04:00
|
|
|
if (bp->b_bn != be64_to_cpu(dsl->sl_blkno))
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2013-08-12 14:49:40 +04:00
|
|
|
if (be32_to_cpu(dsl->sl_offset) +
|
2017-07-07 18:37:26 +03:00
|
|
|
be32_to_cpu(dsl->sl_bytes) >= XFS_SYMLINK_MAXLEN)
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2013-08-12 14:49:40 +04:00
|
|
|
if (dsl->sl_owner == 0)
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2015-10-12 07:59:25 +03:00
|
|
|
if (!xfs_log_check_lsn(mp, be64_to_cpu(dsl->sl_lsn)))
|
2018-01-08 21:51:03 +03:00
|
|
|
return __this_address;
|
2013-08-12 14:49:40 +04:00
|
|
|
|
2018-01-08 21:51:03 +03:00
|
|
|
return NULL;
|
2013-08-12 14:49:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
xfs_symlink_read_verify(
|
|
|
|
struct xfs_buf *bp)
|
|
|
|
{
|
|
|
|
struct xfs_mount *mp = bp->b_target->bt_mount;
|
2018-01-08 21:51:03 +03:00
|
|
|
xfs_failaddr_t fa;
|
2013-08-12 14:49:40 +04:00
|
|
|
|
|
|
|
/* no verification of non-crc buffers */
|
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb))
|
|
|
|
return;
|
|
|
|
|
2014-02-27 08:23:10 +04:00
|
|
|
if (!xfs_buf_verify_cksum(bp, XFS_SYMLINK_CRC_OFF))
|
2018-01-08 21:51:03 +03:00
|
|
|
xfs_verifier_error(bp, -EFSBADCRC, __this_address);
|
|
|
|
else {
|
|
|
|
fa = xfs_symlink_verify(bp);
|
|
|
|
if (fa)
|
|
|
|
xfs_verifier_error(bp, -EFSCORRUPTED, fa);
|
|
|
|
}
|
2013-08-12 14:49:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
xfs_symlink_write_verify(
|
|
|
|
struct xfs_buf *bp)
|
|
|
|
{
|
|
|
|
struct xfs_mount *mp = bp->b_target->bt_mount;
|
2018-01-25 00:38:48 +03:00
|
|
|
struct xfs_buf_log_item *bip = bp->b_log_item;
|
2018-01-08 21:51:03 +03:00
|
|
|
xfs_failaddr_t fa;
|
2013-08-12 14:49:40 +04:00
|
|
|
|
|
|
|
/* no verification of non-crc buffers */
|
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb))
|
|
|
|
return;
|
|
|
|
|
2018-01-08 21:51:03 +03:00
|
|
|
fa = xfs_symlink_verify(bp);
|
|
|
|
if (fa) {
|
|
|
|
xfs_verifier_error(bp, -EFSCORRUPTED, fa);
|
2013-08-12 14:49:40 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bip) {
|
|
|
|
struct xfs_dsymlink_hdr *dsl = bp->b_addr;
|
|
|
|
dsl->sl_lsn = cpu_to_be64(bip->bli_item.li_lsn);
|
|
|
|
}
|
2014-02-27 08:18:23 +04:00
|
|
|
xfs_buf_update_cksum(bp, XFS_SYMLINK_CRC_OFF);
|
2013-08-12 14:49:40 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
const struct xfs_buf_ops xfs_symlink_buf_ops = {
|
2016-01-04 08:10:19 +03:00
|
|
|
.name = "xfs_symlink",
|
2019-02-07 21:45:48 +03:00
|
|
|
.magic = { 0, cpu_to_be32(XFS_SYMLINK_MAGIC) },
|
2013-08-12 14:49:40 +04:00
|
|
|
.verify_read = xfs_symlink_read_verify,
|
|
|
|
.verify_write = xfs_symlink_write_verify,
|
2018-01-08 21:51:08 +03:00
|
|
|
.verify_struct = xfs_symlink_verify,
|
2013-08-12 14:49:40 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
void
|
|
|
|
xfs_symlink_local_to_remote(
|
|
|
|
struct xfs_trans *tp,
|
|
|
|
struct xfs_buf *bp,
|
|
|
|
struct xfs_inode *ip,
|
|
|
|
struct xfs_ifork *ifp)
|
|
|
|
{
|
|
|
|
struct xfs_mount *mp = ip->i_mount;
|
|
|
|
char *buf;
|
|
|
|
|
2015-01-22 01:30:06 +03:00
|
|
|
xfs_trans_buf_set_type(tp, bp, XFS_BLFT_SYMLINK_BUF);
|
|
|
|
|
2013-08-12 14:49:40 +04:00
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb)) {
|
|
|
|
bp->b_ops = NULL;
|
|
|
|
memcpy(bp->b_addr, ifp->if_u1.if_data, ifp->if_bytes);
|
2015-10-12 07:40:24 +03:00
|
|
|
xfs_trans_log_buf(tp, bp, 0, ifp->if_bytes - 1);
|
2013-08-12 14:49:40 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* As this symlink fits in an inode literal area, it must also fit in
|
|
|
|
* the smallest buffer the filesystem supports.
|
|
|
|
*/
|
|
|
|
ASSERT(BBTOB(bp->b_length) >=
|
|
|
|
ifp->if_bytes + sizeof(struct xfs_dsymlink_hdr));
|
|
|
|
|
|
|
|
bp->b_ops = &xfs_symlink_buf_ops;
|
|
|
|
|
|
|
|
buf = bp->b_addr;
|
|
|
|
buf += xfs_symlink_hdr_set(mp, ip->i_ino, 0, ifp->if_bytes, bp);
|
|
|
|
memcpy(buf, ifp->if_u1.if_data, ifp->if_bytes);
|
2015-10-12 07:40:24 +03:00
|
|
|
xfs_trans_log_buf(tp, bp, 0, sizeof(struct xfs_dsymlink_hdr) +
|
|
|
|
ifp->if_bytes - 1);
|
2013-08-12 14:49:40 +04:00
|
|
|
}
|
2018-01-08 21:51:05 +03:00
|
|
|
|
2018-12-12 19:46:21 +03:00
|
|
|
/*
|
|
|
|
* Verify the in-memory consistency of an inline symlink data fork. This
|
|
|
|
* does not do on-disk format checks.
|
|
|
|
*/
|
2018-01-08 21:51:05 +03:00
|
|
|
xfs_failaddr_t
|
|
|
|
xfs_symlink_shortform_verify(
|
|
|
|
struct xfs_inode *ip)
|
|
|
|
{
|
|
|
|
char *sfp;
|
|
|
|
char *endp;
|
|
|
|
struct xfs_ifork *ifp;
|
|
|
|
int size;
|
|
|
|
|
|
|
|
ASSERT(ip->i_d.di_format == XFS_DINODE_FMT_LOCAL);
|
|
|
|
ifp = XFS_IFORK_PTR(ip, XFS_DATA_FORK);
|
|
|
|
sfp = (char *)ifp->if_u1.if_data;
|
|
|
|
size = ifp->if_bytes;
|
|
|
|
endp = sfp + size;
|
|
|
|
|
2018-12-12 19:46:21 +03:00
|
|
|
/*
|
|
|
|
* Zero length symlinks should never occur in memory as they are
|
|
|
|
* never alllowed to exist on disk.
|
|
|
|
*/
|
|
|
|
if (!size)
|
|
|
|
return __this_address;
|
2018-01-08 21:51:05 +03:00
|
|
|
|
|
|
|
/* No negative sizes or overly long symlink targets. */
|
|
|
|
if (size < 0 || size > XFS_SYMLINK_MAXLEN)
|
|
|
|
return __this_address;
|
|
|
|
|
|
|
|
/* No NULLs in the target either. */
|
|
|
|
if (memchr(sfp, 0, size - 1))
|
|
|
|
return __this_address;
|
|
|
|
|
|
|
|
/* We /did/ null-terminate the buffer, right? */
|
|
|
|
if (*endp != 0)
|
|
|
|
return __this_address;
|
|
|
|
return NULL;
|
|
|
|
}
|