diff options
author | Louis Rilling <louis.rilling@kerlabs.com> | 2008-06-23 08:16:17 -0400 |
---|---|---|
committer | Mark Fasheh <mfasheh@suse.com> | 2008-07-31 19:21:12 -0400 |
commit | 4768e9b18dc63719209c68920d4ae52dc49b6161 (patch) | |
tree | ee9e805c405ea6a6cdf44ba30fd66047bc522b1b /fs/configfs/symlink.c | |
parent | dacdd0e04768da1fd2b24a6ee274c582b40d0c5b (diff) |
[PATCH] configfs: Fix symlink() to a removing item
The rule for configfs symlinks is that symlinks always point to valid
config_items, and prevent the target from being removed. However,
configfs_symlink() only checks that it can grab a reference on the target item,
without ensuring that it remains alive until the symlink is correctly attached.
This patch makes configfs_symlink() fail whenever the target is being removed,
using the CONFIGFS_USET_DROPPING flag set by configfs_detach_prep() and
protected by configfs_dirent_lock.
This patch introduces a similar (weird?) behavior as with mkdir failures making
rmdir fail: if symlink() races with rmdir() of the parent directory (or its
youngest user-created ancestor if parent is a default group) or rmdir() of the
target directory, and then fails in configfs_create(), this can make the racing
rmdir() fail despite the concerned directory having no user-created entry (resp.
no symlink pointing to it or one of its default groups) in the end.
This behavior is fixed in later patches.
Signed-off-by: Louis Rilling <louis.rilling@kerlabs.com>
Signed-off-by: Joel Becker <joel.becker@oracle.com>
Signed-off-by: Mark Fasheh <mfasheh@suse.com>
Diffstat (limited to 'fs/configfs/symlink.c')
-rw-r--r-- | fs/configfs/symlink.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/fs/configfs/symlink.c b/fs/configfs/symlink.c index 0004d18c40ac..c12801a12c34 100644 --- a/fs/configfs/symlink.c +++ b/fs/configfs/symlink.c | |||
@@ -78,6 +78,12 @@ static int create_link(struct config_item *parent_item, | |||
78 | if (sl) { | 78 | if (sl) { |
79 | sl->sl_target = config_item_get(item); | 79 | sl->sl_target = config_item_get(item); |
80 | spin_lock(&configfs_dirent_lock); | 80 | spin_lock(&configfs_dirent_lock); |
81 | if (target_sd->s_type & CONFIGFS_USET_DROPPING) { | ||
82 | spin_unlock(&configfs_dirent_lock); | ||
83 | config_item_put(item); | ||
84 | kfree(sl); | ||
85 | return -ENOENT; | ||
86 | } | ||
81 | list_add(&sl->sl_list, &target_sd->s_links); | 87 | list_add(&sl->sl_list, &target_sd->s_links); |
82 | spin_unlock(&configfs_dirent_lock); | 88 | spin_unlock(&configfs_dirent_lock); |
83 | ret = configfs_create_link(sl, parent_item->ci_dentry, | 89 | ret = configfs_create_link(sl, parent_item->ci_dentry, |