Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 1 | /* |
| 2 | * |
| 3 | * Copyright (C) 2011 Novell Inc. |
| 4 | * |
| 5 | * This program is free software; you can redistribute it and/or modify it |
| 6 | * under the terms of the GNU General Public License version 2 as published by |
| 7 | * the Free Software Foundation. |
| 8 | */ |
| 9 | |
| 10 | #include <linux/fs.h> |
| 11 | #include <linux/slab.h> |
Ingo Molnar | 5b825c3 | 2017-02-02 17:54:15 +0100 | [diff] [blame] | 12 | #include <linux/cred.h> |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 13 | #include <linux/xattr.h> |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 14 | #include <linux/posix_acl.h> |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 15 | #include "overlayfs.h" |
| 16 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 17 | int ovl_setattr(struct dentry *dentry, struct iattr *attr) |
| 18 | { |
| 19 | int err; |
| 20 | struct dentry *upperdentry; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 21 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 22 | |
Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 23 | /* |
| 24 | * Check for permissions before trying to copy-up. This is redundant |
| 25 | * since it will be rechecked later by ->setattr() on upper dentry. But |
| 26 | * without this, copy-up can be triggered by just about anybody. |
| 27 | * |
| 28 | * We don't initialize inode->size, which just means that |
| 29 | * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not |
| 30 | * check for a swapfile (which this won't be anyway). |
| 31 | */ |
Jan Kara | 31051c8 | 2016-05-26 16:55:18 +0200 | [diff] [blame] | 32 | err = setattr_prepare(dentry, attr); |
Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 33 | if (err) |
| 34 | return err; |
| 35 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 36 | err = ovl_want_write(dentry); |
| 37 | if (err) |
| 38 | goto out; |
| 39 | |
Miklos Szeredi | acff81e | 2015-12-04 19:18:48 +0100 | [diff] [blame] | 40 | err = ovl_copy_up(dentry); |
| 41 | if (!err) { |
| 42 | upperdentry = ovl_dentry_upper(dentry); |
| 43 | |
Miklos Szeredi | b99c2d9 | 2016-07-04 16:49:48 +0200 | [diff] [blame] | 44 | if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) |
| 45 | attr->ia_valid &= ~ATTR_MODE; |
| 46 | |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 47 | inode_lock(upperdentry->d_inode); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 48 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 49 | err = notify_change(upperdentry, attr, NULL); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 50 | revert_creds(old_cred); |
Konstantin Khlebnikov | b81de06 | 2016-01-31 16:21:29 +0300 | [diff] [blame] | 51 | if (!err) |
| 52 | ovl_copyattr(upperdentry->d_inode, dentry->d_inode); |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 53 | inode_unlock(upperdentry->d_inode); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 54 | } |
| 55 | ovl_drop_write(dentry); |
| 56 | out: |
| 57 | return err; |
| 58 | } |
| 59 | |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 60 | static int ovl_getattr(const struct path *path, struct kstat *stat, |
| 61 | u32 request_mask, unsigned int flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 62 | { |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 63 | struct dentry *dentry = path->dentry; |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 64 | enum ovl_path_type type; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 65 | struct path realpath; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 66 | const struct cred *old_cred; |
| 67 | int err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 68 | |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 69 | type = ovl_path_real(dentry, &realpath); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 70 | old_cred = ovl_override_creds(dentry->d_sb); |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 71 | err = vfs_getattr(&realpath, stat, request_mask, flags); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 72 | if (err) |
| 73 | goto out; |
| 74 | |
| 75 | /* |
| 76 | * When all layers are on the same fs, all real inode number are |
| 77 | * unique, so we use the overlay st_dev, which is friendly to du -x. |
| 78 | * |
| 79 | * We also use st_ino of the copy up origin, if we know it. |
| 80 | * This guaranties constant st_dev/st_ino across copy up. |
| 81 | * |
| 82 | * If filesystem supports NFS export ops, this also guaranties |
| 83 | * persistent st_ino across mount cycle. |
| 84 | */ |
| 85 | if (ovl_same_sb(dentry->d_sb)) { |
| 86 | if (OVL_TYPE_ORIGIN(type)) { |
| 87 | struct kstat lowerstat; |
| 88 | |
| 89 | ovl_path_lower(dentry, &realpath); |
| 90 | err = vfs_getattr(&realpath, &lowerstat, |
| 91 | STATX_INO | STATX_NLINK, flags); |
| 92 | if (err) |
| 93 | goto out; |
| 94 | |
| 95 | WARN_ON_ONCE(stat->dev != lowerstat.dev); |
| 96 | /* |
| 97 | * Lower hardlinks are broken on copy up to different |
| 98 | * upper files, so we cannot use the lower origin st_ino |
| 99 | * for those different files, even for the same fs case. |
| 100 | */ |
| 101 | if (lowerstat.nlink == 1) |
| 102 | stat->ino = lowerstat.ino; |
| 103 | } |
| 104 | stat->dev = dentry->d_sb->s_dev; |
| 105 | } |
| 106 | out: |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 107 | revert_creds(old_cred); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 108 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 109 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 110 | } |
| 111 | |
| 112 | int ovl_permission(struct inode *inode, int mask) |
| 113 | { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 114 | bool is_upper; |
Miklos Szeredi | 39b681f | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 115 | struct inode *realinode = ovl_inode_real(inode, &is_upper); |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 116 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 117 | int err; |
| 118 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 119 | /* Careful in RCU walk mode */ |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 120 | if (!realinode) { |
| 121 | WARN_ON(!(mask & MAY_NOT_BLOCK)); |
Miklos Szeredi | a999d7e | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 122 | return -ECHILD; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 123 | } |
| 124 | |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 125 | /* |
| 126 | * Check overlay inode with the creds of task and underlying inode |
| 127 | * with creds of mounter |
| 128 | */ |
| 129 | err = generic_permission(inode, mask); |
| 130 | if (err) |
| 131 | return err; |
| 132 | |
| 133 | old_cred = ovl_override_creds(inode->i_sb); |
Vivek Goyal | 500cac3 | 2016-07-13 11:00:14 -0400 | [diff] [blame] | 134 | if (!is_upper && !special_file(realinode->i_mode) && mask & MAY_WRITE) { |
Vivek Goyal | 754f8cb | 2016-07-01 16:34:29 -0400 | [diff] [blame] | 135 | mask &= ~(MAY_WRITE | MAY_APPEND); |
Vivek Goyal | 500cac3 | 2016-07-13 11:00:14 -0400 | [diff] [blame] | 136 | /* Make sure mounter can read file for copy up later */ |
| 137 | mask |= MAY_READ; |
| 138 | } |
Miklos Szeredi | 9c630eb | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 139 | err = inode_permission(realinode, mask); |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 140 | revert_creds(old_cred); |
| 141 | |
| 142 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 143 | } |
| 144 | |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 145 | static const char *ovl_get_link(struct dentry *dentry, |
Al Viro | fceef39 | 2015-12-29 15:58:39 -0500 | [diff] [blame] | 146 | struct inode *inode, |
| 147 | struct delayed_call *done) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 148 | { |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 149 | const struct cred *old_cred; |
| 150 | const char *p; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 151 | |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 152 | if (!dentry) |
| 153 | return ERR_PTR(-ECHILD); |
| 154 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 155 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | 7764235 | 2016-10-04 14:40:45 +0200 | [diff] [blame] | 156 | p = vfs_get_link(ovl_dentry_real(dentry), done); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 157 | revert_creds(old_cred); |
| 158 | return p; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 159 | } |
| 160 | |
Miklos Szeredi | 0956254 | 2016-08-08 15:08:49 +0200 | [diff] [blame] | 161 | bool ovl_is_private_xattr(const char *name) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 162 | { |
Andreas Gruenbacher | fe2b759 | 2016-08-22 17:59:22 +0200 | [diff] [blame] | 163 | return strncmp(name, OVL_XATTR_PREFIX, |
| 164 | sizeof(OVL_XATTR_PREFIX) - 1) == 0; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 165 | } |
| 166 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 167 | int ovl_xattr_set(struct dentry *dentry, const char *name, const void *value, |
| 168 | size_t size, int flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 169 | { |
| 170 | int err; |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 171 | struct path realpath; |
| 172 | enum ovl_path_type type = ovl_path_real(dentry, &realpath); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 173 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 174 | |
| 175 | err = ovl_want_write(dentry); |
| 176 | if (err) |
| 177 | goto out; |
| 178 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 179 | if (!value && !OVL_TYPE_UPPER(type)) { |
| 180 | err = vfs_getxattr(realpath.dentry, name, NULL, 0); |
| 181 | if (err < 0) |
| 182 | goto out_drop_write; |
| 183 | } |
| 184 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 185 | err = ovl_copy_up(dentry); |
| 186 | if (err) |
| 187 | goto out_drop_write; |
| 188 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 189 | if (!OVL_TYPE_UPPER(type)) |
| 190 | ovl_path_upper(dentry, &realpath); |
| 191 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 192 | old_cred = ovl_override_creds(dentry->d_sb); |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 193 | if (value) |
| 194 | err = vfs_setxattr(realpath.dentry, name, value, size, flags); |
| 195 | else { |
| 196 | WARN_ON(flags != XATTR_REPLACE); |
| 197 | err = vfs_removexattr(realpath.dentry, name); |
| 198 | } |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 199 | revert_creds(old_cred); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 200 | |
| 201 | out_drop_write: |
| 202 | ovl_drop_write(dentry); |
| 203 | out: |
| 204 | return err; |
| 205 | } |
| 206 | |
Andreas Gruenbacher | 0eb45fc | 2016-08-22 17:52:55 +0200 | [diff] [blame] | 207 | int ovl_xattr_get(struct dentry *dentry, const char *name, |
| 208 | void *value, size_t size) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 209 | { |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 210 | struct dentry *realdentry = ovl_dentry_real(dentry); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 211 | ssize_t res; |
| 212 | const struct cred *old_cred; |
Miklos Szeredi | 5214846 | 2014-11-20 16:40:00 +0100 | [diff] [blame] | 213 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 214 | old_cred = ovl_override_creds(dentry->d_sb); |
| 215 | res = vfs_getxattr(realdentry, name, value, size); |
| 216 | revert_creds(old_cred); |
| 217 | return res; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 218 | } |
| 219 | |
| 220 | ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size) |
| 221 | { |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 222 | struct dentry *realdentry = ovl_dentry_real(dentry); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 223 | ssize_t res; |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 224 | size_t len; |
| 225 | char *s; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 226 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 227 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 228 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 229 | res = vfs_listxattr(realdentry, list, size); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 230 | revert_creds(old_cred); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 231 | if (res <= 0 || size == 0) |
| 232 | return res; |
| 233 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 234 | /* filter out private xattrs */ |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 235 | for (s = list, len = res; len;) { |
| 236 | size_t slen = strnlen(s, len) + 1; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 237 | |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 238 | /* underlying fs providing us with an broken xattr list? */ |
| 239 | if (WARN_ON(slen > len)) |
| 240 | return -EIO; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 241 | |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 242 | len -= slen; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 243 | if (ovl_is_private_xattr(s)) { |
| 244 | res -= slen; |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 245 | memmove(s, s + slen, len); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 246 | } else { |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 247 | s += slen; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 248 | } |
| 249 | } |
| 250 | |
| 251 | return res; |
| 252 | } |
| 253 | |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 254 | struct posix_acl *ovl_get_acl(struct inode *inode, int type) |
| 255 | { |
Miklos Szeredi | 39b681f | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 256 | struct inode *realinode = ovl_inode_real(inode, NULL); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 257 | const struct cred *old_cred; |
| 258 | struct posix_acl *acl; |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 259 | |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 260 | if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !IS_POSIXACL(realinode)) |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 261 | return NULL; |
| 262 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 263 | old_cred = ovl_override_creds(inode->i_sb); |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 264 | acl = get_acl(realinode, type); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 265 | revert_creds(old_cred); |
| 266 | |
| 267 | return acl; |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 268 | } |
| 269 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 270 | static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type, |
| 271 | struct dentry *realdentry) |
| 272 | { |
Miklos Szeredi | 1afaba1 | 2014-12-13 00:59:42 +0100 | [diff] [blame] | 273 | if (OVL_TYPE_UPPER(type)) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 274 | return false; |
| 275 | |
| 276 | if (special_file(realdentry->d_inode->i_mode)) |
| 277 | return false; |
| 278 | |
| 279 | if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC)) |
| 280 | return false; |
| 281 | |
| 282 | return true; |
| 283 | } |
| 284 | |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 285 | int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 286 | { |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 287 | int err = 0; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 288 | struct path realpath; |
| 289 | enum ovl_path_type type; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 290 | |
| 291 | type = ovl_path_real(dentry, &realpath); |
David Howells | 4bacc9c | 2015-06-18 14:32:31 +0100 | [diff] [blame] | 292 | if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 293 | err = ovl_want_write(dentry); |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 294 | if (!err) { |
Amir Goldstein | 9aba652 | 2016-11-12 21:36:03 +0200 | [diff] [blame] | 295 | err = ovl_copy_up_flags(dentry, file_flags); |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 296 | ovl_drop_write(dentry); |
| 297 | } |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 298 | } |
| 299 | |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 300 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 301 | } |
| 302 | |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 303 | int ovl_update_time(struct inode *inode, struct timespec *ts, int flags) |
| 304 | { |
| 305 | struct dentry *alias; |
| 306 | struct path upperpath; |
| 307 | |
| 308 | if (!(flags & S_ATIME)) |
| 309 | return 0; |
| 310 | |
| 311 | alias = d_find_any_alias(inode); |
| 312 | if (!alias) |
| 313 | return 0; |
| 314 | |
| 315 | ovl_path_upper(alias, &upperpath); |
| 316 | if (upperpath.dentry) { |
| 317 | touch_atime(&upperpath); |
| 318 | inode->i_atime = d_inode(upperpath.dentry)->i_atime; |
| 319 | } |
| 320 | |
| 321 | dput(alias); |
| 322 | |
| 323 | return 0; |
| 324 | } |
| 325 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 326 | static const struct inode_operations ovl_file_inode_operations = { |
| 327 | .setattr = ovl_setattr, |
| 328 | .permission = ovl_permission, |
| 329 | .getattr = ovl_getattr, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 330 | .listxattr = ovl_listxattr, |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 331 | .get_acl = ovl_get_acl, |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 332 | .update_time = ovl_update_time, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 333 | }; |
| 334 | |
| 335 | static const struct inode_operations ovl_symlink_inode_operations = { |
| 336 | .setattr = ovl_setattr, |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 337 | .get_link = ovl_get_link, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 338 | .getattr = ovl_getattr, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 339 | .listxattr = ovl_listxattr, |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 340 | .update_time = ovl_update_time, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 341 | }; |
| 342 | |
Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 343 | /* |
| 344 | * It is possible to stack overlayfs instance on top of another |
| 345 | * overlayfs instance as lower layer. We need to annonate the |
| 346 | * stackable i_mutex locks according to stack level of the super |
| 347 | * block instance. An overlayfs instance can never be in stack |
| 348 | * depth 0 (there is always a real fs below it). An overlayfs |
| 349 | * inode lock will use the lockdep annotaion ovl_i_mutex_key[depth]. |
| 350 | * |
| 351 | * For example, here is a snip from /proc/lockdep_chains after |
| 352 | * dir_iterate of nested overlayfs: |
| 353 | * |
| 354 | * [...] &ovl_i_mutex_dir_key[depth] (stack_depth=2) |
| 355 | * [...] &ovl_i_mutex_dir_key[depth]#2 (stack_depth=1) |
| 356 | * [...] &type->i_mutex_dir_key (stack_depth=0) |
| 357 | */ |
| 358 | #define OVL_MAX_NESTING FILESYSTEM_MAX_STACK_DEPTH |
| 359 | |
| 360 | static inline void ovl_lockdep_annotate_inode_mutex_key(struct inode *inode) |
| 361 | { |
| 362 | #ifdef CONFIG_LOCKDEP |
| 363 | static struct lock_class_key ovl_i_mutex_key[OVL_MAX_NESTING]; |
| 364 | static struct lock_class_key ovl_i_mutex_dir_key[OVL_MAX_NESTING]; |
| 365 | |
| 366 | int depth = inode->i_sb->s_stack_depth - 1; |
| 367 | |
| 368 | if (WARN_ON_ONCE(depth < 0 || depth >= OVL_MAX_NESTING)) |
| 369 | depth = 0; |
| 370 | |
| 371 | if (S_ISDIR(inode->i_mode)) |
| 372 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_dir_key[depth]); |
| 373 | else |
| 374 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_key[depth]); |
| 375 | #endif |
| 376 | } |
| 377 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 378 | static void ovl_fill_inode(struct inode *inode, umode_t mode, dev_t rdev) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 379 | { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 380 | inode->i_ino = get_next_ino(); |
| 381 | inode->i_mode = mode; |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 382 | inode->i_flags |= S_NOCMTIME; |
Miklos Szeredi | 2a3a2a3 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 383 | #ifdef CONFIG_FS_POSIX_ACL |
| 384 | inode->i_acl = inode->i_default_acl = ACL_DONT_CACHE; |
| 385 | #endif |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 386 | |
Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 387 | ovl_lockdep_annotate_inode_mutex_key(inode); |
| 388 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 389 | switch (mode & S_IFMT) { |
| 390 | case S_IFREG: |
| 391 | inode->i_op = &ovl_file_inode_operations; |
| 392 | break; |
| 393 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 394 | case S_IFDIR: |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 395 | inode->i_op = &ovl_dir_inode_operations; |
| 396 | inode->i_fop = &ovl_dir_operations; |
| 397 | break; |
| 398 | |
| 399 | case S_IFLNK: |
| 400 | inode->i_op = &ovl_symlink_inode_operations; |
| 401 | break; |
| 402 | |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 403 | default: |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 404 | inode->i_op = &ovl_file_inode_operations; |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 405 | init_special_inode(inode, mode, rdev); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 406 | break; |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 407 | } |
| 408 | } |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 409 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 410 | struct inode *ovl_new_inode(struct super_block *sb, umode_t mode, dev_t rdev) |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 411 | { |
| 412 | struct inode *inode; |
| 413 | |
| 414 | inode = new_inode(sb); |
| 415 | if (inode) |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 416 | ovl_fill_inode(inode, mode, rdev); |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 417 | |
| 418 | return inode; |
| 419 | } |
| 420 | |
| 421 | static int ovl_inode_test(struct inode *inode, void *data) |
| 422 | { |
| 423 | return ovl_inode_real(inode, NULL) == data; |
| 424 | } |
| 425 | |
| 426 | static int ovl_inode_set(struct inode *inode, void *data) |
| 427 | { |
| 428 | inode->i_private = (void *) (((unsigned long) data) | OVL_ISUPPER_MASK); |
| 429 | return 0; |
| 430 | } |
| 431 | |
| 432 | struct inode *ovl_get_inode(struct super_block *sb, struct inode *realinode) |
| 433 | |
| 434 | { |
| 435 | struct inode *inode; |
| 436 | |
| 437 | inode = iget5_locked(sb, (unsigned long) realinode, |
| 438 | ovl_inode_test, ovl_inode_set, realinode); |
| 439 | if (inode && inode->i_state & I_NEW) { |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 440 | ovl_fill_inode(inode, realinode->i_mode, realinode->i_rdev); |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 441 | set_nlink(inode, realinode->i_nlink); |
| 442 | unlock_new_inode(inode); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 443 | } |
| 444 | |
| 445 | return inode; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 446 | } |