| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 1 | /* | 
|  | 2 | * | 
|  | 3 | * Copyright (C) 2011 Novell Inc. | 
|  | 4 | * | 
|  | 5 | * This program is free software; you can redistribute it and/or modify it | 
|  | 6 | * under the terms of the GNU General Public License version 2 as published by | 
|  | 7 | * the Free Software Foundation. | 
|  | 8 | */ | 
|  | 9 |  | 
|  | 10 | #include <linux/fs.h> | 
|  | 11 | #include <linux/slab.h> | 
| Ingo Molnar | 5b825c3 | 2017-02-02 17:54:15 +0100 | [diff] [blame] | 12 | #include <linux/cred.h> | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 13 | #include <linux/xattr.h> | 
| Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 14 | #include <linux/posix_acl.h> | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 15 | #include "overlayfs.h" | 
|  | 16 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 17 | int ovl_setattr(struct dentry *dentry, struct iattr *attr) | 
|  | 18 | { | 
|  | 19 | int err; | 
|  | 20 | struct dentry *upperdentry; | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 21 | const struct cred *old_cred; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 22 |  | 
| Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 23 | /* | 
|  | 24 | * Check for permissions before trying to copy-up.  This is redundant | 
|  | 25 | * since it will be rechecked later by ->setattr() on upper dentry.  But | 
|  | 26 | * without this, copy-up can be triggered by just about anybody. | 
|  | 27 | * | 
|  | 28 | * We don't initialize inode->size, which just means that | 
|  | 29 | * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not | 
|  | 30 | * check for a swapfile (which this won't be anyway). | 
|  | 31 | */ | 
| Jan Kara | 31051c8 | 2016-05-26 16:55:18 +0200 | [diff] [blame] | 32 | err = setattr_prepare(dentry, attr); | 
| Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 33 | if (err) | 
|  | 34 | return err; | 
|  | 35 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 36 | err = ovl_want_write(dentry); | 
|  | 37 | if (err) | 
|  | 38 | goto out; | 
|  | 39 |  | 
| Miklos Szeredi | acff81e | 2015-12-04 19:18:48 +0100 | [diff] [blame] | 40 | err = ovl_copy_up(dentry); | 
|  | 41 | if (!err) { | 
|  | 42 | upperdentry = ovl_dentry_upper(dentry); | 
|  | 43 |  | 
| Miklos Szeredi | b99c2d9 | 2016-07-04 16:49:48 +0200 | [diff] [blame] | 44 | if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) | 
|  | 45 | attr->ia_valid &= ~ATTR_MODE; | 
|  | 46 |  | 
| Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 47 | inode_lock(upperdentry->d_inode); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 48 | old_cred = ovl_override_creds(dentry->d_sb); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 49 | err = notify_change(upperdentry, attr, NULL); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 50 | revert_creds(old_cred); | 
| Konstantin Khlebnikov | b81de06 | 2016-01-31 16:21:29 +0300 | [diff] [blame] | 51 | if (!err) | 
|  | 52 | ovl_copyattr(upperdentry->d_inode, dentry->d_inode); | 
| Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 53 | inode_unlock(upperdentry->d_inode); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 54 | } | 
|  | 55 | ovl_drop_write(dentry); | 
|  | 56 | out: | 
|  | 57 | return err; | 
|  | 58 | } | 
|  | 59 |  | 
| David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 60 | static int ovl_getattr(const struct path *path, struct kstat *stat, | 
|  | 61 | u32 request_mask, unsigned int flags) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 62 | { | 
| David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 63 | struct dentry *dentry = path->dentry; | 
| Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 64 | enum ovl_path_type type; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 65 | struct path realpath; | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 66 | const struct cred *old_cred; | 
|  | 67 | int err; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 68 |  | 
| Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 69 | type = ovl_path_real(dentry, &realpath); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 70 | old_cred = ovl_override_creds(dentry->d_sb); | 
| David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 71 | err = vfs_getattr(&realpath, stat, request_mask, flags); | 
| Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 72 | if (err) | 
|  | 73 | goto out; | 
|  | 74 |  | 
|  | 75 | /* | 
|  | 76 | * When all layers are on the same fs, all real inode number are | 
|  | 77 | * unique, so we use the overlay st_dev, which is friendly to du -x. | 
|  | 78 | * | 
|  | 79 | * We also use st_ino of the copy up origin, if we know it. | 
|  | 80 | * This guaranties constant st_dev/st_ino across copy up. | 
|  | 81 | * | 
|  | 82 | * If filesystem supports NFS export ops, this also guaranties | 
|  | 83 | * persistent st_ino across mount cycle. | 
|  | 84 | */ | 
|  | 85 | if (ovl_same_sb(dentry->d_sb)) { | 
|  | 86 | if (OVL_TYPE_ORIGIN(type)) { | 
|  | 87 | struct kstat lowerstat; | 
|  | 88 |  | 
|  | 89 | ovl_path_lower(dentry, &realpath); | 
|  | 90 | err = vfs_getattr(&realpath, &lowerstat, | 
|  | 91 | STATX_INO | STATX_NLINK, flags); | 
|  | 92 | if (err) | 
|  | 93 | goto out; | 
|  | 94 |  | 
|  | 95 | WARN_ON_ONCE(stat->dev != lowerstat.dev); | 
|  | 96 | /* | 
|  | 97 | * Lower hardlinks are broken on copy up to different | 
|  | 98 | * upper files, so we cannot use the lower origin st_ino | 
|  | 99 | * for those different files, even for the same fs case. | 
|  | 100 | */ | 
|  | 101 | if (lowerstat.nlink == 1) | 
|  | 102 | stat->ino = lowerstat.ino; | 
|  | 103 | } | 
|  | 104 | stat->dev = dentry->d_sb->s_dev; | 
|  | 105 | } | 
|  | 106 | out: | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 107 | revert_creds(old_cred); | 
| Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame^] | 108 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 109 | return err; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 110 | } | 
|  | 111 |  | 
|  | 112 | int ovl_permission(struct inode *inode, int mask) | 
|  | 113 | { | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 114 | bool is_upper; | 
| Miklos Szeredi | 39b681f | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 115 | struct inode *realinode = ovl_inode_real(inode, &is_upper); | 
| Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 116 | const struct cred *old_cred; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 117 | int err; | 
|  | 118 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 119 | /* Careful in RCU walk mode */ | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 120 | if (!realinode) { | 
|  | 121 | WARN_ON(!(mask & MAY_NOT_BLOCK)); | 
| Miklos Szeredi | a999d7e | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 122 | return -ECHILD; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 123 | } | 
|  | 124 |  | 
| Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 125 | /* | 
|  | 126 | * Check overlay inode with the creds of task and underlying inode | 
|  | 127 | * with creds of mounter | 
|  | 128 | */ | 
|  | 129 | err = generic_permission(inode, mask); | 
|  | 130 | if (err) | 
|  | 131 | return err; | 
|  | 132 |  | 
|  | 133 | old_cred = ovl_override_creds(inode->i_sb); | 
| Vivek Goyal | 500cac3 | 2016-07-13 11:00:14 -0400 | [diff] [blame] | 134 | if (!is_upper && !special_file(realinode->i_mode) && mask & MAY_WRITE) { | 
| Vivek Goyal | 754f8cb | 2016-07-01 16:34:29 -0400 | [diff] [blame] | 135 | mask &= ~(MAY_WRITE | MAY_APPEND); | 
| Vivek Goyal | 500cac3 | 2016-07-13 11:00:14 -0400 | [diff] [blame] | 136 | /* Make sure mounter can read file for copy up later */ | 
|  | 137 | mask |= MAY_READ; | 
|  | 138 | } | 
| Miklos Szeredi | 9c630eb | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 139 | err = inode_permission(realinode, mask); | 
| Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 140 | revert_creds(old_cred); | 
|  | 141 |  | 
|  | 142 | return err; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 143 | } | 
|  | 144 |  | 
| Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 145 | static const char *ovl_get_link(struct dentry *dentry, | 
| Al Viro | fceef39 | 2015-12-29 15:58:39 -0500 | [diff] [blame] | 146 | struct inode *inode, | 
|  | 147 | struct delayed_call *done) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 148 | { | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 149 | const struct cred *old_cred; | 
|  | 150 | const char *p; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 151 |  | 
| Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 152 | if (!dentry) | 
|  | 153 | return ERR_PTR(-ECHILD); | 
|  | 154 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 155 | old_cred = ovl_override_creds(dentry->d_sb); | 
| Miklos Szeredi | 7764235b | 2016-10-04 14:40:45 +0200 | [diff] [blame] | 156 | p = vfs_get_link(ovl_dentry_real(dentry), done); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 157 | revert_creds(old_cred); | 
|  | 158 | return p; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 159 | } | 
|  | 160 |  | 
| Miklos Szeredi | 0956254 | 2016-08-08 15:08:49 +0200 | [diff] [blame] | 161 | bool ovl_is_private_xattr(const char *name) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 162 | { | 
| Andreas Gruenbacher | fe2b759 | 2016-08-22 17:59:22 +0200 | [diff] [blame] | 163 | return strncmp(name, OVL_XATTR_PREFIX, | 
|  | 164 | sizeof(OVL_XATTR_PREFIX) - 1) == 0; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 165 | } | 
|  | 166 |  | 
| Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 167 | int ovl_xattr_set(struct dentry *dentry, const char *name, const void *value, | 
|  | 168 | size_t size, int flags) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 169 | { | 
|  | 170 | int err; | 
| Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 171 | struct path realpath; | 
|  | 172 | enum ovl_path_type type = ovl_path_real(dentry, &realpath); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 173 | const struct cred *old_cred; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 174 |  | 
|  | 175 | err = ovl_want_write(dentry); | 
|  | 176 | if (err) | 
|  | 177 | goto out; | 
|  | 178 |  | 
| Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 179 | if (!value && !OVL_TYPE_UPPER(type)) { | 
|  | 180 | err = vfs_getxattr(realpath.dentry, name, NULL, 0); | 
|  | 181 | if (err < 0) | 
|  | 182 | goto out_drop_write; | 
|  | 183 | } | 
|  | 184 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 185 | err = ovl_copy_up(dentry); | 
|  | 186 | if (err) | 
|  | 187 | goto out_drop_write; | 
|  | 188 |  | 
| Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 189 | if (!OVL_TYPE_UPPER(type)) | 
|  | 190 | ovl_path_upper(dentry, &realpath); | 
|  | 191 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 192 | old_cred = ovl_override_creds(dentry->d_sb); | 
| Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 193 | if (value) | 
|  | 194 | err = vfs_setxattr(realpath.dentry, name, value, size, flags); | 
|  | 195 | else { | 
|  | 196 | WARN_ON(flags != XATTR_REPLACE); | 
|  | 197 | err = vfs_removexattr(realpath.dentry, name); | 
|  | 198 | } | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 199 | revert_creds(old_cred); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 200 |  | 
|  | 201 | out_drop_write: | 
|  | 202 | ovl_drop_write(dentry); | 
|  | 203 | out: | 
|  | 204 | return err; | 
|  | 205 | } | 
|  | 206 |  | 
| Andreas Gruenbacher | 0eb45fc | 2016-08-22 17:52:55 +0200 | [diff] [blame] | 207 | int ovl_xattr_get(struct dentry *dentry, const char *name, | 
|  | 208 | void *value, size_t size) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 209 | { | 
| Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 210 | struct dentry *realdentry = ovl_dentry_real(dentry); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 211 | ssize_t res; | 
|  | 212 | const struct cred *old_cred; | 
| Miklos Szeredi | 5214846 | 2014-11-20 16:40:00 +0100 | [diff] [blame] | 213 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 214 | old_cred = ovl_override_creds(dentry->d_sb); | 
|  | 215 | res = vfs_getxattr(realdentry, name, value, size); | 
|  | 216 | revert_creds(old_cred); | 
|  | 217 | return res; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 218 | } | 
|  | 219 |  | 
|  | 220 | ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size) | 
|  | 221 | { | 
| Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 222 | struct dentry *realdentry = ovl_dentry_real(dentry); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 223 | ssize_t res; | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 224 | size_t len; | 
|  | 225 | char *s; | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 226 | const struct cred *old_cred; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 227 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 228 | old_cred = ovl_override_creds(dentry->d_sb); | 
| Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 229 | res = vfs_listxattr(realdentry, list, size); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 230 | revert_creds(old_cred); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 231 | if (res <= 0 || size == 0) | 
|  | 232 | return res; | 
|  | 233 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 234 | /* filter out private xattrs */ | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 235 | for (s = list, len = res; len;) { | 
|  | 236 | size_t slen = strnlen(s, len) + 1; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 237 |  | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 238 | /* underlying fs providing us with an broken xattr list? */ | 
|  | 239 | if (WARN_ON(slen > len)) | 
|  | 240 | return -EIO; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 241 |  | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 242 | len -= slen; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 243 | if (ovl_is_private_xattr(s)) { | 
|  | 244 | res -= slen; | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 245 | memmove(s, s + slen, len); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 246 | } else { | 
| Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 247 | s += slen; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 248 | } | 
|  | 249 | } | 
|  | 250 |  | 
|  | 251 | return res; | 
|  | 252 | } | 
|  | 253 |  | 
| Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 254 | struct posix_acl *ovl_get_acl(struct inode *inode, int type) | 
|  | 255 | { | 
| Miklos Szeredi | 39b681f | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 256 | struct inode *realinode = ovl_inode_real(inode, NULL); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 257 | const struct cred *old_cred; | 
|  | 258 | struct posix_acl *acl; | 
| Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 259 |  | 
| Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 260 | if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !IS_POSIXACL(realinode)) | 
| Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 261 | return NULL; | 
|  | 262 |  | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 263 | old_cred = ovl_override_creds(inode->i_sb); | 
| Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 264 | acl = get_acl(realinode, type); | 
| Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 265 | revert_creds(old_cred); | 
|  | 266 |  | 
|  | 267 | return acl; | 
| Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 268 | } | 
|  | 269 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 270 | static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type, | 
|  | 271 | struct dentry *realdentry) | 
|  | 272 | { | 
| Miklos Szeredi | 1afaba1 | 2014-12-13 00:59:42 +0100 | [diff] [blame] | 273 | if (OVL_TYPE_UPPER(type)) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 274 | return false; | 
|  | 275 |  | 
|  | 276 | if (special_file(realdentry->d_inode->i_mode)) | 
|  | 277 | return false; | 
|  | 278 |  | 
|  | 279 | if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC)) | 
|  | 280 | return false; | 
|  | 281 |  | 
|  | 282 | return true; | 
|  | 283 | } | 
|  | 284 |  | 
| Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 285 | int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 286 | { | 
| Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 287 | int err = 0; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 288 | struct path realpath; | 
|  | 289 | enum ovl_path_type type; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 290 |  | 
|  | 291 | type = ovl_path_real(dentry, &realpath); | 
| David Howells | 4bacc9c | 2015-06-18 14:32:31 +0100 | [diff] [blame] | 292 | if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) { | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 293 | err = ovl_want_write(dentry); | 
| Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 294 | if (!err) { | 
| Amir Goldstein | 9aba652 | 2016-11-12 21:36:03 +0200 | [diff] [blame] | 295 | err = ovl_copy_up_flags(dentry, file_flags); | 
| Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 296 | ovl_drop_write(dentry); | 
|  | 297 | } | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 298 | } | 
|  | 299 |  | 
| Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 300 | return err; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 301 | } | 
|  | 302 |  | 
| Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 303 | int ovl_update_time(struct inode *inode, struct timespec *ts, int flags) | 
|  | 304 | { | 
|  | 305 | struct dentry *alias; | 
|  | 306 | struct path upperpath; | 
|  | 307 |  | 
|  | 308 | if (!(flags & S_ATIME)) | 
|  | 309 | return 0; | 
|  | 310 |  | 
|  | 311 | alias = d_find_any_alias(inode); | 
|  | 312 | if (!alias) | 
|  | 313 | return 0; | 
|  | 314 |  | 
|  | 315 | ovl_path_upper(alias, &upperpath); | 
|  | 316 | if (upperpath.dentry) { | 
|  | 317 | touch_atime(&upperpath); | 
|  | 318 | inode->i_atime = d_inode(upperpath.dentry)->i_atime; | 
|  | 319 | } | 
|  | 320 |  | 
|  | 321 | dput(alias); | 
|  | 322 |  | 
|  | 323 | return 0; | 
|  | 324 | } | 
|  | 325 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 326 | static const struct inode_operations ovl_file_inode_operations = { | 
|  | 327 | .setattr	= ovl_setattr, | 
|  | 328 | .permission	= ovl_permission, | 
|  | 329 | .getattr	= ovl_getattr, | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 330 | .listxattr	= ovl_listxattr, | 
| Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 331 | .get_acl	= ovl_get_acl, | 
| Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 332 | .update_time	= ovl_update_time, | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 333 | }; | 
|  | 334 |  | 
|  | 335 | static const struct inode_operations ovl_symlink_inode_operations = { | 
|  | 336 | .setattr	= ovl_setattr, | 
| Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 337 | .get_link	= ovl_get_link, | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 338 | .getattr	= ovl_getattr, | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 339 | .listxattr	= ovl_listxattr, | 
| Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 340 | .update_time	= ovl_update_time, | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 341 | }; | 
|  | 342 |  | 
| Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 343 | /* | 
|  | 344 | * It is possible to stack overlayfs instance on top of another | 
|  | 345 | * overlayfs instance as lower layer. We need to annonate the | 
|  | 346 | * stackable i_mutex locks according to stack level of the super | 
|  | 347 | * block instance. An overlayfs instance can never be in stack | 
|  | 348 | * depth 0 (there is always a real fs below it).  An overlayfs | 
|  | 349 | * inode lock will use the lockdep annotaion ovl_i_mutex_key[depth]. | 
|  | 350 | * | 
|  | 351 | * For example, here is a snip from /proc/lockdep_chains after | 
|  | 352 | * dir_iterate of nested overlayfs: | 
|  | 353 | * | 
|  | 354 | * [...] &ovl_i_mutex_dir_key[depth]   (stack_depth=2) | 
|  | 355 | * [...] &ovl_i_mutex_dir_key[depth]#2 (stack_depth=1) | 
|  | 356 | * [...] &type->i_mutex_dir_key        (stack_depth=0) | 
|  | 357 | */ | 
|  | 358 | #define OVL_MAX_NESTING FILESYSTEM_MAX_STACK_DEPTH | 
|  | 359 |  | 
|  | 360 | static inline void ovl_lockdep_annotate_inode_mutex_key(struct inode *inode) | 
|  | 361 | { | 
|  | 362 | #ifdef CONFIG_LOCKDEP | 
|  | 363 | static struct lock_class_key ovl_i_mutex_key[OVL_MAX_NESTING]; | 
|  | 364 | static struct lock_class_key ovl_i_mutex_dir_key[OVL_MAX_NESTING]; | 
|  | 365 |  | 
|  | 366 | int depth = inode->i_sb->s_stack_depth - 1; | 
|  | 367 |  | 
|  | 368 | if (WARN_ON_ONCE(depth < 0 || depth >= OVL_MAX_NESTING)) | 
|  | 369 | depth = 0; | 
|  | 370 |  | 
|  | 371 | if (S_ISDIR(inode->i_mode)) | 
|  | 372 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_dir_key[depth]); | 
|  | 373 | else | 
|  | 374 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_key[depth]); | 
|  | 375 | #endif | 
|  | 376 | } | 
|  | 377 |  | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 378 | static void ovl_fill_inode(struct inode *inode, umode_t mode, dev_t rdev) | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 379 | { | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 380 | inode->i_ino = get_next_ino(); | 
|  | 381 | inode->i_mode = mode; | 
| Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 382 | inode->i_flags |= S_NOCMTIME; | 
| Miklos Szeredi | 2a3a2a3 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 383 | #ifdef CONFIG_FS_POSIX_ACL | 
|  | 384 | inode->i_acl = inode->i_default_acl = ACL_DONT_CACHE; | 
|  | 385 | #endif | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 386 |  | 
| Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 387 | ovl_lockdep_annotate_inode_mutex_key(inode); | 
|  | 388 |  | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 389 | switch (mode & S_IFMT) { | 
|  | 390 | case S_IFREG: | 
|  | 391 | inode->i_op = &ovl_file_inode_operations; | 
|  | 392 | break; | 
|  | 393 |  | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 394 | case S_IFDIR: | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 395 | inode->i_op = &ovl_dir_inode_operations; | 
|  | 396 | inode->i_fop = &ovl_dir_operations; | 
|  | 397 | break; | 
|  | 398 |  | 
|  | 399 | case S_IFLNK: | 
|  | 400 | inode->i_op = &ovl_symlink_inode_operations; | 
|  | 401 | break; | 
|  | 402 |  | 
| Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 403 | default: | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 404 | inode->i_op = &ovl_file_inode_operations; | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 405 | init_special_inode(inode, mode, rdev); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 406 | break; | 
| Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 407 | } | 
|  | 408 | } | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 409 |  | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 410 | struct inode *ovl_new_inode(struct super_block *sb, umode_t mode, dev_t rdev) | 
| Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 411 | { | 
|  | 412 | struct inode *inode; | 
|  | 413 |  | 
|  | 414 | inode = new_inode(sb); | 
|  | 415 | if (inode) | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 416 | ovl_fill_inode(inode, mode, rdev); | 
| Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 417 |  | 
|  | 418 | return inode; | 
|  | 419 | } | 
|  | 420 |  | 
|  | 421 | static int ovl_inode_test(struct inode *inode, void *data) | 
|  | 422 | { | 
|  | 423 | return ovl_inode_real(inode, NULL) == data; | 
|  | 424 | } | 
|  | 425 |  | 
|  | 426 | static int ovl_inode_set(struct inode *inode, void *data) | 
|  | 427 | { | 
|  | 428 | inode->i_private = (void *) (((unsigned long) data) | OVL_ISUPPER_MASK); | 
|  | 429 | return 0; | 
|  | 430 | } | 
|  | 431 |  | 
|  | 432 | struct inode *ovl_get_inode(struct super_block *sb, struct inode *realinode) | 
|  | 433 |  | 
|  | 434 | { | 
|  | 435 | struct inode *inode; | 
|  | 436 |  | 
|  | 437 | inode = iget5_locked(sb, (unsigned long) realinode, | 
|  | 438 | ovl_inode_test, ovl_inode_set, realinode); | 
|  | 439 | if (inode && inode->i_state & I_NEW) { | 
| Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 440 | ovl_fill_inode(inode, realinode->i_mode, realinode->i_rdev); | 
| Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 441 | set_nlink(inode, realinode->i_nlink); | 
|  | 442 | unlock_new_inode(inode); | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 443 | } | 
|  | 444 |  | 
|  | 445 | return inode; | 
| Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 446 | } |