blob: 3ef85226bcce5637957773f1fcdde7f88cbdc39f [file] [log] [blame]
NeilBrowna907c902015-11-07 17:38:58 +11001Written by: Neil Brown
2Please see MAINTAINERS file for where to send questions.
Neil Brown7c37fbd2014-10-24 00:14:39 +02003
4Overlay Filesystem
5==================
6
7This document describes a prototype for a new approach to providing
8overlay-filesystem functionality in Linux (sometimes referred to as
9union-filesystems). An overlay-filesystem tries to present a
10filesystem which is the result over overlaying one filesystem on top
11of the other.
12
13The result will inevitably fail to look exactly like a normal
14filesystem for various technical reasons. The expectation is that
15many use cases will be able to ignore these differences.
16
17This approach is 'hybrid' because the objects that appear in the
18filesystem do not all appear to belong to that filesystem. In many
19cases an object accessed in the union will be indistinguishable
20from accessing the corresponding object from the original filesystem.
21This is most obvious from the 'st_dev' field returned by stat(2).
22
23While directories will report an st_dev from the overlay-filesystem,
24all non-directory objects will report an st_dev from the lower or
25upper filesystem that is providing the object. Similarly st_ino will
26only be unique when combined with st_dev, and both of these can change
27over the lifetime of a non-directory object. Many applications and
28tools ignore these values and will not be affected.
29
30Upper and Lower
31---------------
32
33An overlay filesystem combines two filesystems - an 'upper' filesystem
34and a 'lower' filesystem. When a name exists in both filesystems, the
35object in the 'upper' filesystem is visible while the object in the
36'lower' filesystem is either hidden or, in the case of directories,
37merged with the 'upper' object.
38
39It would be more correct to refer to an upper and lower 'directory
40tree' rather than 'filesystem' as it is quite possible for both
41directory trees to be in the same filesystem and there is no
42requirement that the root of a filesystem be given for either upper or
43lower.
44
45The lower filesystem can be any filesystem supported by Linux and does
46not need to be writable. The lower filesystem can even be another
47overlayfs. The upper filesystem will normally be writable and if it
48is it must support the creation of trusted.* extended attributes, and
49must provide valid d_type in readdir responses, so NFS is not suitable.
50
51A read-only overlay of two read-only filesystems may use any
52filesystem type.
53
54Directories
55-----------
56
57Overlaying mainly involves directories. If a given name appears in both
58upper and lower filesystems and refers to a non-directory in either,
59then the lower object is hidden - the name refers only to the upper
60object.
61
62Where both upper and lower objects are directories, a merged directory
63is formed.
64
65At mount time, the two directories given as mount options "lowerdir" and
66"upperdir" are combined into a merged directory:
67
Miklos Szeredief94b182014-11-20 16:39:59 +010068 mount -t overlay overlay -olowerdir=/lower,upperdir=/upper,\
Neil Brown7c37fbd2014-10-24 00:14:39 +020069workdir=/work /merged
70
71The "workdir" needs to be an empty directory on the same filesystem
72as upperdir.
73
74Then whenever a lookup is requested in such a merged directory, the
75lookup is performed in each actual directory and the combined result
76is cached in the dentry belonging to the overlay filesystem. If both
77actual lookups find directories, both are stored and a merged
78directory is created, otherwise only one is stored: the upper if it
79exists, else the lower.
80
81Only the lists of names from directories are merged. Other content
82such as metadata and extended attributes are reported for the upper
83directory only. These attributes of the lower directory are hidden.
84
Mark Salyzynf5f87ec2019-02-21 12:45:59 -080085credentials
86-----------
87
88By default, all access to the upper, lower and work directories is the
89recorded mounter's MAC and DAC credentials. The incoming accesses are
90checked against the caller's credentials.
91
92In the case where caller MAC or DAC credentials do not overlap, a
93use case available in older versions of the driver, the
94override_creds mount flag can be turned off and help when the use
95pattern has caller with legitimate credentials where the mounter
96does not. Several unintended side effects will occur though. The
97caller without certain key capabilities or lower privilege will not
98always be able to delete files or directories, create nodes, or
99search some restricted directories. The ability to search and read
100a directory entry is spotty as a result of the cache mechanism not
101retesting the credentials because of the assumption, a privileged
102caller can fill cache, then a lower privilege can read the directory
103cache. The uneven security model where cache, upperdir and workdir
104are opened at privilege, but accessed without creating a form of
105privilege escalation, should only be used with strict understanding
106of the side effects and of the security policies.
107
Neil Brown7c37fbd2014-10-24 00:14:39 +0200108whiteouts and opaque directories
109--------------------------------
110
111In order to support rm and rmdir without changing the lower
112filesystem, an overlay filesystem needs to record in the upper filesystem
113that files have been removed. This is done using whiteouts and opaque
114directories (non-directories are always opaque).
115
116A whiteout is created as a character device with 0/0 device number.
117When a whiteout is found in the upper level of a merged directory, any
118matching name in the lower level is ignored, and the whiteout itself
119is also hidden.
120
121A directory is made opaque by setting the xattr "trusted.overlay.opaque"
122to "y". Where the upper filesystem contains an opaque directory, any
123directory in the lower filesystem with the same name is ignored.
124
125readdir
126-------
127
128When a 'readdir' request is made on a merged directory, the upper and
129lower directories are each read and the name lists merged in the
130obvious way (upper is read first, then lower - entries that already
131exist are not re-added). This merged name list is cached in the
132'struct file' and so remains as long as the file is kept open. If the
133directory is opened and read by two processes at the same time, they
134will each have separate caches. A seekdir to the start of the
135directory (offset 0) followed by a readdir will cause the cache to be
136discarded and rebuilt.
137
138This means that changes to the merged directory do not appear while a
139directory is being read. This is unlikely to be noticed by many
140programs.
141
142seek offsets are assigned sequentially when the directories are read.
143Thus if
144 - read part of a directory
145 - remember an offset, and close the directory
146 - re-open the directory some time later
147 - seek to the remembered offset
148
149there may be little correlation between the old and new locations in
150the list of filenames, particularly if anything has changed in the
151directory.
152
153Readdir on directories that are not merged is simply handled by the
154underlying directory (upper or lower).
155
156
157Non-directories
158---------------
159
160Objects that are not directories (files, symlinks, device-special
161files etc.) are presented either from the upper or lower filesystem as
162appropriate. When a file in the lower filesystem is accessed in a way
163the requires write-access, such as opening for write access, changing
164some metadata etc., the file is first copied from the lower filesystem
165to the upper filesystem (copy_up). Note that creating a hard-link
166also requires copy_up, though of course creation of a symlink does
167not.
168
169The copy_up may turn out to be unnecessary, for example if the file is
170opened for read-write but the data is not modified.
171
172The copy_up process first makes sure that the containing directory
173exists in the upper filesystem - creating it and any parents as
174necessary. It then creates the object with the same metadata (owner,
175mode, mtime, symlink-target etc.) and then if the object is a file, the
176data is copied from the lower to the upper filesystem. Finally any
177extended attributes are copied up.
178
179Once the copy_up is complete, the overlay filesystem simply
180provides direct access to the newly created file in the upper
181filesystem - future operations on the file are barely noticed by the
182overlay filesystem (though an operation on the name of the file such as
183rename or unlink will of course be noticed and handled).
184
185
Miklos Szeredia78d9f0d2014-12-13 00:59:52 +0100186Multiple lower layers
187---------------------
188
189Multiple lower layers can now be given using the the colon (":") as a
190separator character between the directory names. For example:
191
192 mount -t overlay overlay -olowerdir=/lower1:/lower2:/lower3 /merged
193
Miklos Szeredi6d900f5a2015-01-08 15:09:15 +0100194As the example shows, "upperdir=" and "workdir=" may be omitted. In
195that case the overlay will be read-only.
196
197The specified lower directories will be stacked beginning from the
198rightmost one and going left. In the above example lower1 will be the
199top, lower2 the middle and lower3 the bottom layer.
Miklos Szeredia78d9f0d2014-12-13 00:59:52 +0100200
201
Neil Brown7c37fbd2014-10-24 00:14:39 +0200202Non-standard behavior
203---------------------
204
205The copy_up operation essentially creates a new, identical file and
206moves it over to the old name. The new file may be on a different
207filesystem, so both st_dev and st_ino of the file may change.
208
Miklos Szeredi026e5e02016-09-01 11:12:00 +0200209Any open files referring to this inode will access the old data.
Neil Brown7c37fbd2014-10-24 00:14:39 +0200210
Miklos Szeredi026e5e02016-09-01 11:12:00 +0200211Any file locks (and leases) obtained before copy_up will not apply
212to the copied up file.
Neil Brown7c37fbd2014-10-24 00:14:39 +0200213
214If a file with multiple hard links is copied up, then this will
215"break" the link. Changes will not be propagated to other names
216referring to the same inode.
217
Neil Brown7c37fbd2014-10-24 00:14:39 +0200218Changes to underlying filesystems
219---------------------------------
220
221Offline changes, when the overlay is not mounted, are allowed to either
222the upper or the lower trees.
223
224Changes to the underlying filesystems while part of a mounted overlay
225filesystem are not allowed. If the underlying filesystem is changed,
226the behavior of the overlay is undefined, though it will not result in
227a crash or deadlock.
Miklos Szeredi2b7a8f362014-12-13 00:59:53 +0100228
229Testsuite
230---------
231
232There's testsuite developed by David Howells at:
233
234 git://git.infradead.org/users/dhowells/unionmount-testsuite.git
235
236Run as root:
237
238 # cd unionmount-testsuite
239 # ./run --ov