2016-12-16 13:02:56 +03:00
/*
* Copyright ( C ) 2011 Novell Inc .
* Copyright ( C ) 2016 Red Hat , Inc .
*
* This program is free software ; you can redistribute it and / or modify it
* under the terms of the GNU General Public License version 2 as published by
* the Free Software Foundation .
*/
# include <linux/fs.h>
2017-02-02 19:54:15 +03:00
# include <linux/cred.h>
2016-12-16 13:02:56 +03:00
# include <linux/namei.h>
# include <linux/xattr.h>
2016-12-16 13:02:56 +03:00
# include <linux/ratelimit.h>
2017-04-30 14:46:31 +03:00
# include <linux/mount.h>
# include <linux/exportfs.h>
2016-12-16 13:02:56 +03:00
# include "overlayfs.h"
2016-12-16 13:02:56 +03:00
struct ovl_lookup_data {
struct qstr name ;
bool is_dir ;
bool opaque ;
bool stop ;
bool last ;
2016-12-16 13:02:56 +03:00
char * redirect ;
2016-12-16 13:02:56 +03:00
} ;
2016-12-16 13:02:56 +03:00
2016-12-16 13:02:56 +03:00
static int ovl_check_redirect ( struct dentry * dentry , struct ovl_lookup_data * d ,
size_t prelen , const char * post )
{
int res ;
char * s , * next , * buf = NULL ;
res = vfs_getxattr ( dentry , OVL_XATTR_REDIRECT , NULL , 0 ) ;
if ( res < 0 ) {
if ( res = = - ENODATA | | res = = - EOPNOTSUPP )
return 0 ;
goto fail ;
}
2017-09-14 02:28:29 +03:00
buf = kzalloc ( prelen + res + strlen ( post ) + 1 , GFP_KERNEL ) ;
2016-12-16 13:02:56 +03:00
if ( ! buf )
return - ENOMEM ;
if ( res = = 0 )
goto invalid ;
res = vfs_getxattr ( dentry , OVL_XATTR_REDIRECT , buf , res ) ;
if ( res < 0 )
goto fail ;
if ( res = = 0 )
goto invalid ;
if ( buf [ 0 ] = = ' / ' ) {
for ( s = buf ; * s + + = = ' / ' ; s = next ) {
next = strchrnul ( s , ' / ' ) ;
if ( s = = next )
goto invalid ;
}
} else {
if ( strchr ( buf , ' / ' ) ! = NULL )
goto invalid ;
memmove ( buf + prelen , buf , res ) ;
memcpy ( buf , d - > name . name , prelen ) ;
}
strcat ( buf , post ) ;
kfree ( d - > redirect ) ;
d - > redirect = buf ;
d - > name . name = d - > redirect ;
d - > name . len = strlen ( d - > redirect ) ;
return 0 ;
err_free :
kfree ( buf ) ;
return 0 ;
fail :
pr_warn_ratelimited ( " overlayfs: failed to get redirect (%i) \n " , res ) ;
goto err_free ;
invalid :
pr_warn_ratelimited ( " overlayfs: invalid redirect (%s) \n " , buf ) ;
goto err_free ;
}
2017-04-30 14:46:31 +03:00
static int ovl_acceptable ( void * ctx , struct dentry * dentry )
{
return 1 ;
}
2017-06-21 15:28:37 +03:00
static struct ovl_fh * ovl_get_origin_fh ( struct dentry * dentry )
2017-04-30 14:46:31 +03:00
{
int res ;
struct ovl_fh * fh = NULL ;
res = vfs_getxattr ( dentry , OVL_XATTR_ORIGIN , NULL , 0 ) ;
if ( res < 0 ) {
if ( res = = - ENODATA | | res = = - EOPNOTSUPP )
return NULL ;
goto fail ;
}
/* Zero size value means "copied up but origin unknown" */
if ( res = = 0 )
return NULL ;
2017-09-14 02:28:29 +03:00
fh = kzalloc ( res , GFP_KERNEL ) ;
2017-04-30 14:46:31 +03:00
if ( ! fh )
return ERR_PTR ( - ENOMEM ) ;
res = vfs_getxattr ( dentry , OVL_XATTR_ORIGIN , fh , res ) ;
if ( res < 0 )
goto fail ;
if ( res < sizeof ( struct ovl_fh ) | | res < fh - > len )
goto invalid ;
if ( fh - > magic ! = OVL_FH_MAGIC )
goto invalid ;
/* Treat larger version and unknown flags as "origin unknown" */
if ( fh - > version > OVL_FH_VERSION | | fh - > flags & ~ OVL_FH_FLAG_ALL )
goto out ;
/* Treat endianness mismatch as "origin unknown" */
if ( ! ( fh - > flags & OVL_FH_FLAG_ANY_ENDIAN ) & &
( fh - > flags & OVL_FH_FLAG_BIG_ENDIAN ) ! = OVL_FH_FLAG_CPU_ENDIAN )
goto out ;
2017-06-21 15:28:37 +03:00
return fh ;
out :
kfree ( fh ) ;
return NULL ;
fail :
pr_warn_ratelimited ( " overlayfs: failed to get origin (%i) \n " , res ) ;
goto out ;
invalid :
pr_warn_ratelimited ( " overlayfs: invalid origin (%*phN) \n " , res , fh ) ;
goto out ;
}
static struct dentry * ovl_get_origin ( struct dentry * dentry ,
struct vfsmount * mnt )
{
struct dentry * origin = NULL ;
struct ovl_fh * fh = ovl_get_origin_fh ( dentry ) ;
int bytes ;
if ( IS_ERR_OR_NULL ( fh ) )
return ( struct dentry * ) fh ;
2017-04-30 14:46:31 +03:00
/*
* Make sure that the stored uuid matches the uuid of the lower
* layer where file handle will be decoded .
*/
2017-05-10 16:06:33 +03:00
if ( ! uuid_equal ( & fh - > uuid , & mnt - > mnt_sb - > s_uuid ) )
2017-04-30 14:46:31 +03:00
goto out ;
2017-06-21 15:28:37 +03:00
bytes = ( fh - > len - offsetof ( struct ovl_fh , fid ) ) ;
2017-04-30 14:46:31 +03:00
origin = exportfs_decode_fh ( mnt , ( struct fid * ) fh - > fid ,
bytes > > 2 , ( int ) fh - > type ,
ovl_acceptable , NULL ) ;
if ( IS_ERR ( origin ) ) {
/* Treat stale file handle as "origin unknown" */
if ( origin = = ERR_PTR ( - ESTALE ) )
origin = NULL ;
goto out ;
}
if ( ovl_dentry_weird ( origin ) | |
2017-06-21 15:28:37 +03:00
( ( d_inode ( origin ) - > i_mode ^ d_inode ( dentry ) - > i_mode ) & S_IFMT ) )
2017-04-30 14:46:31 +03:00
goto invalid ;
out :
kfree ( fh ) ;
return origin ;
invalid :
2017-06-21 15:28:37 +03:00
pr_warn_ratelimited ( " overlayfs: invalid origin (%pd2) \n " , origin ) ;
dput ( origin ) ;
origin = NULL ;
2017-04-30 14:46:31 +03:00
goto out ;
}
2017-05-11 16:42:26 +03:00
static bool ovl_is_opaquedir ( struct dentry * dentry )
{
return ovl_check_dir_xattr ( dentry , OVL_XATTR_OPAQUE ) ;
}
2016-12-16 13:02:56 +03:00
static int ovl_lookup_single ( struct dentry * base , struct ovl_lookup_data * d ,
const char * name , unsigned int namelen ,
2016-12-16 13:02:56 +03:00
size_t prelen , const char * post ,
2016-12-16 13:02:56 +03:00
struct dentry * * ret )
{
struct dentry * this ;
int err ;
this = lookup_one_len_unlocked ( name , base , namelen ) ;
if ( IS_ERR ( this ) ) {
err = PTR_ERR ( this ) ;
this = NULL ;
if ( err = = - ENOENT | | err = = - ENAMETOOLONG )
goto out ;
goto out_err ;
}
if ( ! this - > d_inode )
goto put_and_out ;
if ( ovl_dentry_weird ( this ) ) {
/* Don't support traversing automounts and other weirdness */
err = - EREMOTE ;
goto out_err ;
}
if ( ovl_is_whiteout ( this ) ) {
d - > stop = d - > opaque = true ;
goto put_and_out ;
}
if ( ! d_can_lookup ( this ) ) {
d - > stop = true ;
if ( d - > is_dir )
goto put_and_out ;
goto out ;
}
d - > is_dir = true ;
if ( ! d - > last & & ovl_is_opaquedir ( this ) ) {
d - > stop = d - > opaque = true ;
goto out ;
}
2016-12-16 13:02:56 +03:00
err = ovl_check_redirect ( this , d , prelen , post ) ;
if ( err )
goto out_err ;
2016-12-16 13:02:56 +03:00
out :
* ret = this ;
return 0 ;
put_and_out :
dput ( this ) ;
this = NULL ;
goto out ;
out_err :
dput ( this ) ;
return err ;
}
static int ovl_lookup_layer ( struct dentry * base , struct ovl_lookup_data * d ,
struct dentry * * ret )
{
2017-01-18 17:19:54 +03:00
/* Counting down from the end, since the prefix can change */
size_t rem = d - > name . len - 1 ;
2016-12-16 13:02:56 +03:00
struct dentry * dentry = NULL ;
int err ;
2017-01-18 17:19:54 +03:00
if ( d - > name . name [ 0 ] ! = ' / ' )
2016-12-16 13:02:56 +03:00
return ovl_lookup_single ( base , d , d - > name . name , d - > name . len ,
0 , " " , ret ) ;
2017-01-18 17:19:54 +03:00
while ( ! IS_ERR_OR_NULL ( base ) & & d_can_lookup ( base ) ) {
const char * s = d - > name . name + d - > name . len - rem ;
2016-12-16 13:02:56 +03:00
const char * next = strchrnul ( s , ' / ' ) ;
2017-01-18 17:19:54 +03:00
size_t thislen = next - s ;
bool end = ! next [ 0 ] ;
2016-12-16 13:02:56 +03:00
2017-01-18 17:19:54 +03:00
/* Verify we did not go off the rails */
if ( WARN_ON ( s [ - 1 ] ! = ' / ' ) )
2016-12-16 13:02:56 +03:00
return - EIO ;
2017-01-18 17:19:54 +03:00
err = ovl_lookup_single ( base , d , s , thislen ,
d - > name . len - rem , next , & base ) ;
2016-12-16 13:02:56 +03:00
dput ( dentry ) ;
if ( err )
return err ;
dentry = base ;
2017-01-18 17:19:54 +03:00
if ( end )
break ;
rem - = thislen + 1 ;
if ( WARN_ON ( rem > = d - > name . len ) )
return - EIO ;
2016-12-16 13:02:56 +03:00
}
* ret = dentry ;
return 0 ;
2016-12-16 13:02:56 +03:00
}
2017-04-30 14:46:31 +03:00
2017-06-21 15:28:42 +03:00
static int ovl_check_origin ( struct dentry * upperdentry ,
2017-07-24 09:57:54 +03:00
struct ovl_path * lower , unsigned int numlower ,
struct ovl_path * * stackp , unsigned int * ctrp )
2017-04-30 14:46:31 +03:00
{
struct vfsmount * mnt ;
2017-06-21 15:28:34 +03:00
struct dentry * origin = NULL ;
int i ;
2017-04-30 14:46:31 +03:00
2017-06-21 15:28:42 +03:00
for ( i = 0 ; i < numlower ; i + + ) {
2017-07-24 09:57:54 +03:00
mnt = lower [ i ] . layer - > mnt ;
2017-06-21 15:28:34 +03:00
origin = ovl_get_origin ( upperdentry , mnt ) ;
if ( IS_ERR ( origin ) )
return PTR_ERR ( origin ) ;
if ( origin )
break ;
}
if ( ! origin )
return 0 ;
2017-04-30 14:46:31 +03:00
2017-06-21 15:28:42 +03:00
BUG_ON ( * ctrp ) ;
if ( ! * stackp )
2017-07-24 09:57:54 +03:00
* stackp = kmalloc ( sizeof ( struct ovl_path ) , GFP_KERNEL ) ;
2017-04-30 14:46:31 +03:00
if ( ! * stackp ) {
dput ( origin ) ;
return - ENOMEM ;
}
2017-07-24 09:57:54 +03:00
* * stackp = ( struct ovl_path ) { . dentry = origin , . layer = lower [ i ] . layer } ;
2017-04-30 14:46:31 +03:00
* ctrp = 1 ;
return 0 ;
}
2017-06-21 15:28:37 +03:00
/*
* Verify that @ fh matches the origin file handle stored in OVL_XATTR_ORIGIN .
* Return 0 on match , - ESTALE on mismatch , < 0 on error .
*/
static int ovl_verify_origin_fh ( struct dentry * dentry , const struct ovl_fh * fh )
{
struct ovl_fh * ofh = ovl_get_origin_fh ( dentry ) ;
int err = 0 ;
if ( ! ofh )
return - ENODATA ;
if ( IS_ERR ( ofh ) )
return PTR_ERR ( ofh ) ;
if ( fh - > len ! = ofh - > len | | memcmp ( fh , ofh , fh - > len ) )
err = - ESTALE ;
kfree ( ofh ) ;
return err ;
}
/*
* Verify that an inode matches the origin file handle stored in upper inode .
*
* If @ set is true and there is no stored file handle , encode and store origin
* file handle in OVL_XATTR_ORIGIN .
*
* Return 0 on match , - ESTALE on mismatch , < 0 on error .
*/
2017-09-24 13:00:19 +03:00
int ovl_verify_origin ( struct dentry * dentry , struct dentry * origin ,
bool is_upper , bool set )
2017-06-21 15:28:37 +03:00
{
struct inode * inode ;
struct ovl_fh * fh ;
int err ;
2017-06-21 15:28:38 +03:00
fh = ovl_encode_fh ( origin , is_upper ) ;
2017-06-21 15:28:37 +03:00
err = PTR_ERR ( fh ) ;
if ( IS_ERR ( fh ) )
goto fail ;
err = ovl_verify_origin_fh ( dentry , fh ) ;
if ( set & & err = = - ENODATA )
err = ovl_do_setxattr ( dentry , OVL_XATTR_ORIGIN , fh , fh - > len , 0 ) ;
if ( err )
goto fail ;
out :
kfree ( fh ) ;
return err ;
fail :
inode = d_inode ( origin ) ;
pr_warn_ratelimited ( " overlayfs: failed to verify origin (%pd2, ino=%lu, err=%i) \n " ,
origin , inode ? inode - > i_ino : 0 , err ) ;
goto out ;
}
2017-06-21 15:28:42 +03:00
/*
* Verify that an index entry name matches the origin file handle stored in
* OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path .
* Return 0 on match , - ESTALE on mismatch or stale origin , < 0 on error .
*/
2017-07-24 09:57:54 +03:00
int ovl_verify_index ( struct dentry * index , struct ovl_path * lower ,
2017-06-21 15:28:42 +03:00
unsigned int numlower )
{
struct ovl_fh * fh = NULL ;
size_t len ;
2017-07-24 09:57:54 +03:00
struct ovl_path origin = { } ;
struct ovl_path * stack = & origin ;
2017-06-21 15:28:42 +03:00
unsigned int ctr = 0 ;
int err ;
if ( ! d_inode ( index ) )
return 0 ;
2017-07-18 21:07:42 +03:00
/*
* Directory index entries are going to be used for looking up
* redirected upper dirs by lower dir fh when decoding an overlay
* file handle of a merge dir . Whiteout index entries are going to be
* used as an indication that an exported overlay file handle should
* be treated as stale ( i . e . after unlink of the overlay inode ) .
* We don ' t know the verification rules for directory and whiteout
* index entries , because they have not been implemented yet , so return
2017-10-24 12:24:11 +03:00
* EINVAL if those entries are found to abort the mount to avoid
* corrupting an index that was created by a newer kernel .
2017-07-18 21:07:42 +03:00
*/
2017-10-24 12:24:11 +03:00
err = - EINVAL ;
2017-07-18 21:07:42 +03:00
if ( d_is_dir ( index ) | | ovl_is_whiteout ( index ) )
2017-06-21 15:28:42 +03:00
goto fail ;
if ( index - > d_name . len < sizeof ( struct ovl_fh ) * 2 )
goto fail ;
err = - ENOMEM ;
len = index - > d_name . len / 2 ;
2017-09-14 02:28:29 +03:00
fh = kzalloc ( len , GFP_KERNEL ) ;
2017-06-21 15:28:42 +03:00
if ( ! fh )
goto fail ;
err = - EINVAL ;
if ( hex2bin ( ( u8 * ) fh , index - > d_name . name , len ) | | len ! = fh - > len )
goto fail ;
err = ovl_verify_origin_fh ( index , fh ) ;
if ( err )
goto fail ;
2017-07-24 09:57:54 +03:00
err = ovl_check_origin ( index , lower , numlower , & stack , & ctr ) ;
2017-06-21 15:28:42 +03:00
if ( ! err & & ! ctr )
err = - ESTALE ;
if ( err )
goto fail ;
2017-06-21 13:46:12 +03:00
/* Check if index is orphan and don't warn before cleaning it */
if ( d_inode ( index ) - > i_nlink = = 1 & &
2017-11-27 18:12:44 +03:00
ovl_get_nlink ( origin . dentry , index , 0 ) = = 0 )
2017-06-21 13:46:12 +03:00
err = - ENOENT ;
2017-06-21 15:28:42 +03:00
dput ( origin . dentry ) ;
out :
kfree ( fh ) ;
return err ;
fail :
2017-07-18 21:07:42 +03:00
pr_warn_ratelimited ( " overlayfs: failed to verify index (%pd2, ftype=%x, err=%i) \n " ,
index , d_inode ( index ) - > i_mode & S_IFMT , err ) ;
2017-06-21 15:28:42 +03:00
goto out ;
}
2017-06-21 15:28:41 +03:00
/*
* Lookup in indexdir for the index entry of a lower real inode or a copy up
* origin inode . The index entry name is the hex representation of the lower
* inode file handle .
*
* If the index dentry in negative , then either no lower aliases have been
* copied up yet , or aliases have been copied up in older kernels and are
* not indexed .
*
* If the index dentry for a copy up origin inode is positive , but points
* to an inode different than the upper inode , then either the upper inode
* has been copied up and not indexed or it was indexed , but since then
* index dir was cleared . Either way , that index cannot be used to indentify
* the overlay inode .
*/
int ovl_get_index_name ( struct dentry * origin , struct qstr * name )
{
int err ;
struct ovl_fh * fh ;
char * n , * s ;
fh = ovl_encode_fh ( origin , false ) ;
if ( IS_ERR ( fh ) )
return PTR_ERR ( fh ) ;
err = - ENOMEM ;
2017-09-14 02:28:29 +03:00
n = kzalloc ( fh - > len * 2 , GFP_KERNEL ) ;
2017-06-21 15:28:41 +03:00
if ( n ) {
s = bin2hex ( n , fh , fh - > len ) ;
* name = ( struct qstr ) QSTR_INIT ( n , s - n ) ;
err = 0 ;
}
kfree ( fh ) ;
return err ;
}
static struct dentry * ovl_lookup_index ( struct dentry * dentry ,
struct dentry * upper ,
struct dentry * origin )
{
struct ovl_fs * ofs = dentry - > d_sb - > s_fs_info ;
struct dentry * index ;
struct inode * inode ;
struct qstr name ;
int err ;
err = ovl_get_index_name ( origin , & name ) ;
if ( err )
return ERR_PTR ( err ) ;
index = lookup_one_len_unlocked ( name . name , ofs - > indexdir , name . len ) ;
if ( IS_ERR ( index ) ) {
2017-09-24 13:01:35 +03:00
err = PTR_ERR ( index ) ;
2017-10-20 17:19:06 +03:00
if ( err = = - ENOENT ) {
index = NULL ;
goto out ;
}
2017-06-21 15:28:41 +03:00
pr_warn_ratelimited ( " overlayfs: failed inode index lookup (ino=%lu, key=%*s, err=%i); \n "
" overlayfs: mount with '-o index=off' to disable inodes index. \n " ,
d_inode ( origin ) - > i_ino , name . len , name . name ,
err ) ;
goto out ;
}
2017-07-18 21:07:43 +03:00
inode = d_inode ( index ) ;
2017-06-21 15:28:41 +03:00
if ( d_is_negative ( index ) ) {
2017-10-12 19:03:04 +03:00
goto out_dput ;
2017-07-18 21:07:43 +03:00
} else if ( upper & & d_inode ( upper ) ! = inode ) {
2017-10-12 19:03:04 +03:00
goto out_dput ;
2017-07-18 21:07:43 +03:00
} else if ( ovl_dentry_weird ( index ) | | ovl_is_whiteout ( index ) | |
( ( inode - > i_mode ^ d_inode ( origin ) - > i_mode ) & S_IFMT ) ) {
/*
* Index should always be of the same file type as origin
* except for the case of a whiteout index . A whiteout
* index should only exist if all lower aliases have been
* unlinked , which means that finding a lower origin on lookup
* whose index is a whiteout should be treated as an error .
*/
pr_warn_ratelimited ( " overlayfs: bad index found (index=%pd2, ftype=%x, origin ftype=%x). \n " ,
index , d_inode ( index ) - > i_mode & S_IFMT ,
d_inode ( origin ) - > i_mode & S_IFMT ) ;
2017-06-21 15:28:41 +03:00
goto fail ;
}
out :
kfree ( name . name ) ;
return index ;
2017-10-12 19:03:04 +03:00
out_dput :
dput ( index ) ;
index = NULL ;
goto out ;
2017-06-21 15:28:41 +03:00
fail :
dput ( index ) ;
index = ERR_PTR ( - EIO ) ;
goto out ;
}
2016-12-16 13:02:56 +03:00
/*
* Returns next layer in stack starting from top .
* Returns - 1 if this is the last layer .
*/
int ovl_path_next ( int idx , struct dentry * dentry , struct path * path )
{
struct ovl_entry * oe = dentry - > d_fsdata ;
BUG_ON ( idx < 0 ) ;
if ( idx = = 0 ) {
ovl_path_upper ( dentry , path ) ;
if ( path - > dentry )
return oe - > numlower ? 1 : - 1 ;
idx + + ;
}
BUG_ON ( idx > oe - > numlower ) ;
2017-07-24 09:57:54 +03:00
path - > dentry = oe - > lowerstack [ idx - 1 ] . dentry ;
path - > mnt = oe - > lowerstack [ idx - 1 ] . layer - > mnt ;
2016-12-16 13:02:56 +03:00
return ( idx < oe - > numlower ) ? idx + 1 : - 1 ;
}
2018-01-03 20:34:45 +03:00
/* Fix missing 'origin' xattr */
static int ovl_fix_origin ( struct dentry * dentry , struct dentry * lower ,
struct dentry * upper )
{
int err ;
if ( ovl_check_origin_xattr ( upper ) )
return 0 ;
err = ovl_want_write ( dentry ) ;
if ( err )
return err ;
err = ovl_set_origin ( dentry , lower , upper ) ;
if ( ! err )
err = ovl_set_impure ( dentry - > d_parent , upper - > d_parent ) ;
ovl_drop_write ( dentry ) ;
return err ;
}
2016-12-16 13:02:56 +03:00
struct dentry * ovl_lookup ( struct inode * dir , struct dentry * dentry ,
unsigned int flags )
{
struct ovl_entry * oe ;
const struct cred * old_cred ;
2016-12-16 13:02:56 +03:00
struct ovl_fs * ofs = dentry - > d_sb - > s_fs_info ;
2016-12-16 13:02:56 +03:00
struct ovl_entry * poe = dentry - > d_parent - > d_fsdata ;
2017-04-26 23:40:52 +03:00
struct ovl_entry * roe = dentry - > d_sb - > s_root - > d_fsdata ;
2017-07-24 09:57:54 +03:00
struct ovl_path * stack = NULL ;
2016-12-16 13:02:56 +03:00
struct dentry * upperdir , * upperdentry = NULL ;
2017-06-21 15:28:41 +03:00
struct dentry * index = NULL ;
2016-12-16 13:02:56 +03:00
unsigned int ctr = 0 ;
struct inode * inode = NULL ;
bool upperopaque = false ;
2016-12-16 13:02:56 +03:00
char * upperredirect = NULL ;
2016-12-16 13:02:56 +03:00
struct dentry * this ;
unsigned int i ;
int err ;
2016-12-16 13:02:56 +03:00
struct ovl_lookup_data d = {
. name = dentry - > d_name ,
. is_dir = false ,
. opaque = false ,
. stop = false ,
. last = ! poe - > numlower ,
2016-12-16 13:02:56 +03:00
. redirect = NULL ,
2016-12-16 13:02:56 +03:00
} ;
2016-12-16 13:02:56 +03:00
2016-12-16 13:02:56 +03:00
if ( dentry - > d_name . len > ofs - > namelen )
return ERR_PTR ( - ENAMETOOLONG ) ;
2016-12-16 13:02:56 +03:00
old_cred = ovl_override_creds ( dentry - > d_sb ) ;
2017-07-04 23:03:16 +03:00
upperdir = ovl_dentry_upper ( dentry - > d_parent ) ;
2016-12-16 13:02:56 +03:00
if ( upperdir ) {
2016-12-16 13:02:56 +03:00
err = ovl_lookup_layer ( upperdir , & d , & upperdentry ) ;
if ( err )
2016-12-16 13:02:56 +03:00
goto out ;
2016-12-16 13:02:56 +03:00
if ( upperdentry & & unlikely ( ovl_dentry_remote ( upperdentry ) ) ) {
dput ( upperdentry ) ;
err = - EREMOTE ;
goto out ;
2016-12-16 13:02:56 +03:00
}
2017-04-30 14:46:31 +03:00
if ( upperdentry & & ! d . is_dir ) {
BUG_ON ( ! d . stop | | d . redirect ) ;
2017-06-21 15:28:34 +03:00
/*
* Lookup copy up origin by decoding origin file handle .
* We may get a disconnected dentry , which is fine ,
* because we only need to hold the origin inode in
* cache and use its inode number . We may even get a
* connected dentry , that is not under any of the lower
* layers root . That is also fine for using it ' s inode
* number - it ' s the same as if we held a reference
* to a dentry in lower layer that was moved under us .
*/
2017-06-21 15:28:42 +03:00
err = ovl_check_origin ( upperdentry , roe - > lowerstack ,
roe - > numlower , & stack , & ctr ) ;
2017-04-30 14:46:31 +03:00
if ( err )
2017-11-01 22:37:22 +03:00
goto out_put_upper ;
2017-04-30 14:46:31 +03:00
}
2016-12-16 13:02:56 +03:00
if ( d . redirect ) {
2017-09-22 23:45:18 +03:00
err = - ENOMEM ;
2016-12-16 13:02:56 +03:00
upperredirect = kstrdup ( d . redirect , GFP_KERNEL ) ;
if ( ! upperredirect )
goto out_put_upper ;
if ( d . redirect [ 0 ] = = ' / ' )
2017-04-26 23:40:52 +03:00
poe = roe ;
2016-12-16 13:02:56 +03:00
}
2016-12-16 13:02:56 +03:00
upperopaque = d . opaque ;
2016-12-16 13:02:56 +03:00
}
2016-12-16 13:02:56 +03:00
if ( ! d . stop & & poe - > numlower ) {
2016-12-16 13:02:56 +03:00
err = - ENOMEM ;
2017-07-24 09:57:54 +03:00
stack = kcalloc ( ofs - > numlower , sizeof ( struct ovl_path ) ,
2017-09-14 02:28:29 +03:00
GFP_KERNEL ) ;
2016-12-16 13:02:56 +03:00
if ( ! stack )
goto out_put_upper ;
}
2016-12-16 13:02:56 +03:00
for ( i = 0 ; ! d . stop & & i < poe - > numlower ; i + + ) {
2017-07-24 09:57:54 +03:00
struct ovl_path lower = poe - > lowerstack [ i ] ;
2016-12-16 13:02:56 +03:00
2016-12-16 13:02:56 +03:00
d . last = i = = poe - > numlower - 1 ;
2017-07-24 09:57:54 +03:00
err = ovl_lookup_layer ( lower . dentry , & d , & this ) ;
2016-12-16 13:02:56 +03:00
if ( err )
2016-12-16 13:02:56 +03:00
goto out_put ;
2016-12-16 13:02:56 +03:00
2016-12-16 13:02:56 +03:00
if ( ! this )
continue ;
2018-01-03 20:34:45 +03:00
/*
* If no origin fh is stored in upper of a merge dir , store fh
* of lower dir and set upper parent " impure " .
*/
if ( upperdentry & & ! ctr & & ! ofs - > noxattr ) {
err = ovl_fix_origin ( dentry , this , upperdentry ) ;
if ( err ) {
dput ( this ) ;
goto out_put ;
}
}
2016-12-16 13:02:56 +03:00
stack [ ctr ] . dentry = this ;
2017-07-24 09:57:54 +03:00
stack [ ctr ] . layer = lower . layer ;
2016-12-16 13:02:56 +03:00
ctr + + ;
2016-12-16 13:02:56 +03:00
if ( d . stop )
break ;
2017-12-11 13:28:10 +03:00
/*
* Following redirects can have security consequences : it ' s like
* a symlink into the lower layer without the permission checks .
* This is only a problem if the upper layer is untrusted ( e . g
* comes from an USB drive ) . This can allow a non - readable file
* or directory to become readable .
*
* Only following redirects when redirects are enabled disables
* this attack vector when not necessary .
*/
err = - EPERM ;
if ( d . redirect & & ! ofs - > config . redirect_follow ) {
2017-12-18 15:25:56 +03:00
pr_warn_ratelimited ( " overlayfs: refusing to follow redirect for (%pd2) \n " ,
dentry ) ;
2017-12-11 13:28:10 +03:00
goto out_put ;
}
2017-04-26 23:40:52 +03:00
if ( d . redirect & & d . redirect [ 0 ] = = ' / ' & & poe ! = roe ) {
poe = roe ;
2016-12-16 13:02:56 +03:00
/* Find the current layer on the root dentry */
2017-11-08 20:23:36 +03:00
i = lower . layer - > idx - 1 ;
2016-12-16 13:02:56 +03:00
}
2016-12-16 13:02:56 +03:00
}
2017-06-21 15:28:41 +03:00
/* Lookup index by lower inode and verify it matches upper inode */
if ( ctr & & ! d . is_dir & & ovl_indexdir ( dentry - > d_sb ) ) {
struct dentry * origin = stack [ 0 ] . dentry ;
index = ovl_lookup_index ( dentry , upperdentry , origin ) ;
if ( IS_ERR ( index ) ) {
err = PTR_ERR ( index ) ;
index = NULL ;
goto out_put ;
}
}
2016-12-16 13:02:56 +03:00
oe = ovl_alloc_entry ( ctr ) ;
err = - ENOMEM ;
if ( ! oe )
goto out_put ;
2017-07-04 23:03:16 +03:00
oe - > opaque = upperopaque ;
2017-07-24 09:57:54 +03:00
memcpy ( oe - > lowerstack , stack , sizeof ( struct ovl_path ) * ctr ) ;
2017-07-04 23:03:16 +03:00
dentry - > d_fsdata = oe ;
2016-12-16 13:02:56 +03:00
2017-07-04 23:03:18 +03:00
if ( upperdentry )
ovl_dentry_set_upper_alias ( dentry ) ;
else if ( index )
2017-06-21 15:28:41 +03:00
upperdentry = dget ( index ) ;
2017-07-04 23:03:16 +03:00
if ( upperdentry | | ctr ) {
2017-10-12 19:03:04 +03:00
inode = ovl_get_inode ( dentry , upperdentry , index ) ;
2017-07-04 23:03:17 +03:00
err = PTR_ERR ( inode ) ;
if ( IS_ERR ( inode ) )
2016-12-16 13:02:56 +03:00
goto out_free_oe ;
2017-07-04 23:03:16 +03:00
OVL_I ( inode ) - > redirect = upperredirect ;
2017-06-21 15:28:41 +03:00
if ( index )
ovl_set_flag ( OVL_INDEX , inode ) ;
2016-12-16 13:02:56 +03:00
}
revert_creds ( old_cred ) ;
2017-06-21 15:28:41 +03:00
dput ( index ) ;
2016-12-16 13:02:56 +03:00
kfree ( stack ) ;
2016-12-16 13:02:56 +03:00
kfree ( d . redirect ) ;
2016-12-16 13:02:56 +03:00
d_add ( dentry , inode ) ;
return NULL ;
out_free_oe :
2017-07-04 23:03:16 +03:00
dentry - > d_fsdata = NULL ;
2016-12-16 13:02:56 +03:00
kfree ( oe ) ;
out_put :
2017-06-21 15:28:41 +03:00
dput ( index ) ;
2016-12-16 13:02:56 +03:00
for ( i = 0 ; i < ctr ; i + + )
dput ( stack [ i ] . dentry ) ;
kfree ( stack ) ;
out_put_upper :
dput ( upperdentry ) ;
2016-12-16 13:02:56 +03:00
kfree ( upperredirect ) ;
2016-12-16 13:02:56 +03:00
out :
2016-12-16 13:02:56 +03:00
kfree ( d . redirect ) ;
2016-12-16 13:02:56 +03:00
revert_creds ( old_cred ) ;
return ERR_PTR ( err ) ;
}
bool ovl_lower_positive ( struct dentry * dentry )
{
struct ovl_entry * oe = dentry - > d_fsdata ;
struct ovl_entry * poe = dentry - > d_parent - > d_fsdata ;
const struct qstr * name = & dentry - > d_name ;
2017-11-10 14:18:07 +03:00
const struct cred * old_cred ;
2016-12-16 13:02:56 +03:00
unsigned int i ;
bool positive = false ;
bool done = false ;
/*
* If dentry is negative , then lower is positive iff this is a
* whiteout .
*/
if ( ! dentry - > d_inode )
return oe - > opaque ;
/* Negative upper -> positive lower */
2017-07-04 23:03:16 +03:00
if ( ! ovl_dentry_upper ( dentry ) )
2016-12-16 13:02:56 +03:00
return true ;
2017-11-10 14:18:07 +03:00
old_cred = ovl_override_creds ( dentry - > d_sb ) ;
2016-12-16 13:02:56 +03:00
/* Positive upper -> have to look up lower to see whether it exists */
for ( i = 0 ; ! done & & ! positive & & i < poe - > numlower ; i + + ) {
struct dentry * this ;
struct dentry * lowerdir = poe - > lowerstack [ i ] . dentry ;
this = lookup_one_len_unlocked ( name - > name , lowerdir ,
name - > len ) ;
if ( IS_ERR ( this ) ) {
switch ( PTR_ERR ( this ) ) {
case - ENOENT :
case - ENAMETOOLONG :
break ;
default :
/*
* Assume something is there , we just couldn ' t
* access it .
*/
positive = true ;
break ;
}
} else {
if ( this - > d_inode ) {
positive = ! ovl_is_whiteout ( this ) ;
done = true ;
}
dput ( this ) ;
}
}
2017-11-10 14:18:07 +03:00
revert_creds ( old_cred ) ;
2016-12-16 13:02:56 +03:00
return positive ;
}