Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 1 | /* |
| 2 | * |
| 3 | * Copyright (C) 2011 Novell Inc. |
| 4 | * |
| 5 | * This program is free software; you can redistribute it and/or modify it |
| 6 | * under the terms of the GNU General Public License version 2 as published by |
| 7 | * the Free Software Foundation. |
| 8 | */ |
| 9 | |
| 10 | #include <linux/fs.h> |
| 11 | #include <linux/slab.h> |
Ingo Molnar | 5b825c3 | 2017-02-02 17:54:15 +0100 | [diff] [blame] | 12 | #include <linux/cred.h> |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 13 | #include <linux/xattr.h> |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 14 | #include <linux/posix_acl.h> |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 15 | #include "overlayfs.h" |
| 16 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 17 | int ovl_setattr(struct dentry *dentry, struct iattr *attr) |
| 18 | { |
| 19 | int err; |
| 20 | struct dentry *upperdentry; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 21 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 22 | |
Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 23 | /* |
| 24 | * Check for permissions before trying to copy-up. This is redundant |
| 25 | * since it will be rechecked later by ->setattr() on upper dentry. But |
| 26 | * without this, copy-up can be triggered by just about anybody. |
| 27 | * |
| 28 | * We don't initialize inode->size, which just means that |
| 29 | * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not |
| 30 | * check for a swapfile (which this won't be anyway). |
| 31 | */ |
Jan Kara | 31051c8 | 2016-05-26 16:55:18 +0200 | [diff] [blame] | 32 | err = setattr_prepare(dentry, attr); |
Miklos Szeredi | cf9a678 | 2015-12-11 16:30:49 +0100 | [diff] [blame] | 33 | if (err) |
| 34 | return err; |
| 35 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 36 | err = ovl_want_write(dentry); |
| 37 | if (err) |
| 38 | goto out; |
| 39 | |
Miklos Szeredi | acff81e | 2015-12-04 19:18:48 +0100 | [diff] [blame] | 40 | err = ovl_copy_up(dentry); |
| 41 | if (!err) { |
| 42 | upperdentry = ovl_dentry_upper(dentry); |
| 43 | |
Miklos Szeredi | b99c2d9 | 2016-07-04 16:49:48 +0200 | [diff] [blame] | 44 | if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) |
| 45 | attr->ia_valid &= ~ATTR_MODE; |
| 46 | |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 47 | inode_lock(upperdentry->d_inode); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 48 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 49 | err = notify_change(upperdentry, attr, NULL); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 50 | revert_creds(old_cred); |
Konstantin Khlebnikov | b81de06 | 2016-01-31 16:21:29 +0300 | [diff] [blame] | 51 | if (!err) |
| 52 | ovl_copyattr(upperdentry->d_inode, dentry->d_inode); |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 53 | inode_unlock(upperdentry->d_inode); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 54 | } |
| 55 | ovl_drop_write(dentry); |
| 56 | out: |
| 57 | return err; |
| 58 | } |
| 59 | |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 60 | int ovl_getattr(const struct path *path, struct kstat *stat, |
| 61 | u32 request_mask, unsigned int flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 62 | { |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 63 | struct dentry *dentry = path->dentry; |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 64 | enum ovl_path_type type; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 65 | struct path realpath; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 66 | const struct cred *old_cred; |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 67 | bool is_dir = S_ISDIR(dentry->d_inode->i_mode); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 68 | int err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 69 | |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 70 | type = ovl_path_real(dentry, &realpath); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 71 | old_cred = ovl_override_creds(dentry->d_sb); |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 72 | err = vfs_getattr(&realpath, stat, request_mask, flags); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 73 | if (err) |
| 74 | goto out; |
| 75 | |
| 76 | /* |
| 77 | * When all layers are on the same fs, all real inode number are |
| 78 | * unique, so we use the overlay st_dev, which is friendly to du -x. |
| 79 | * |
| 80 | * We also use st_ino of the copy up origin, if we know it. |
| 81 | * This guaranties constant st_dev/st_ino across copy up. |
| 82 | * |
| 83 | * If filesystem supports NFS export ops, this also guaranties |
| 84 | * persistent st_ino across mount cycle. |
| 85 | */ |
| 86 | if (ovl_same_sb(dentry->d_sb)) { |
| 87 | if (OVL_TYPE_ORIGIN(type)) { |
| 88 | struct kstat lowerstat; |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 89 | u32 lowermask = STATX_INO | (!is_dir ? STATX_NLINK : 0); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 90 | |
| 91 | ovl_path_lower(dentry, &realpath); |
| 92 | err = vfs_getattr(&realpath, &lowerstat, |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 93 | lowermask, flags); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 94 | if (err) |
| 95 | goto out; |
| 96 | |
| 97 | WARN_ON_ONCE(stat->dev != lowerstat.dev); |
| 98 | /* |
| 99 | * Lower hardlinks are broken on copy up to different |
| 100 | * upper files, so we cannot use the lower origin st_ino |
| 101 | * for those different files, even for the same fs case. |
| 102 | */ |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 103 | if (is_dir || lowerstat.nlink == 1) |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 104 | stat->ino = lowerstat.ino; |
| 105 | } |
| 106 | stat->dev = dentry->d_sb->s_dev; |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 107 | } else if (is_dir) { |
| 108 | /* |
| 109 | * If not all layers are on the same fs the pair {real st_ino; |
| 110 | * overlay st_dev} is not unique, so use the non persistent |
| 111 | * overlay st_ino. |
| 112 | * |
| 113 | * Always use the overlay st_dev for directories, so 'find |
| 114 | * -xdev' will scan the entire overlay mount and won't cross the |
| 115 | * overlay mount boundaries. |
| 116 | */ |
| 117 | stat->dev = dentry->d_sb->s_dev; |
| 118 | stat->ino = dentry->d_inode->i_ino; |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 119 | } |
Miklos Szeredi | 5b71209 | 2017-05-05 11:38:58 +0200 | [diff] [blame] | 120 | |
| 121 | /* |
| 122 | * It's probably not worth it to count subdirs to get the |
| 123 | * correct link count. nlink=1 seems to pacify 'find' and |
| 124 | * other utilities. |
| 125 | */ |
| 126 | if (is_dir && OVL_TYPE_MERGE(type)) |
| 127 | stat->nlink = 1; |
| 128 | |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 129 | out: |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 130 | revert_creds(old_cred); |
Amir Goldstein | 72b608f | 2017-04-24 00:25:49 +0300 | [diff] [blame] | 131 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 132 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 133 | } |
| 134 | |
| 135 | int ovl_permission(struct inode *inode, int mask) |
| 136 | { |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 137 | struct inode *upperinode = ovl_inode_upper(inode); |
| 138 | struct inode *realinode = upperinode ?: ovl_inode_lower(inode); |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 139 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 140 | int err; |
| 141 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 142 | /* Careful in RCU walk mode */ |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 143 | if (!realinode) { |
| 144 | WARN_ON(!(mask & MAY_NOT_BLOCK)); |
Miklos Szeredi | a999d7e | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 145 | return -ECHILD; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 146 | } |
| 147 | |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 148 | /* |
| 149 | * Check overlay inode with the creds of task and underlying inode |
| 150 | * with creds of mounter |
| 151 | */ |
| 152 | err = generic_permission(inode, mask); |
| 153 | if (err) |
| 154 | return err; |
| 155 | |
| 156 | old_cred = ovl_override_creds(inode->i_sb); |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 157 | if (!upperinode && |
| 158 | !special_file(realinode->i_mode) && mask & MAY_WRITE) { |
Vivek Goyal | 754f8cb | 2016-07-01 16:34:29 -0400 | [diff] [blame] | 159 | mask &= ~(MAY_WRITE | MAY_APPEND); |
Vivek Goyal | 500cac3 | 2016-07-13 11:00:14 -0400 | [diff] [blame] | 160 | /* Make sure mounter can read file for copy up later */ |
| 161 | mask |= MAY_READ; |
| 162 | } |
Miklos Szeredi | 9c630eb | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 163 | err = inode_permission(realinode, mask); |
Vivek Goyal | c0ca3d7 | 2016-07-01 16:34:27 -0400 | [diff] [blame] | 164 | revert_creds(old_cred); |
| 165 | |
| 166 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 167 | } |
| 168 | |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 169 | static const char *ovl_get_link(struct dentry *dentry, |
Al Viro | fceef39 | 2015-12-29 15:58:39 -0500 | [diff] [blame] | 170 | struct inode *inode, |
| 171 | struct delayed_call *done) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 172 | { |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 173 | const struct cred *old_cred; |
| 174 | const char *p; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 175 | |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 176 | if (!dentry) |
| 177 | return ERR_PTR(-ECHILD); |
| 178 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 179 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | 7764235b | 2016-10-04 14:40:45 +0200 | [diff] [blame] | 180 | p = vfs_get_link(ovl_dentry_real(dentry), done); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 181 | revert_creds(old_cred); |
| 182 | return p; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 183 | } |
| 184 | |
Miklos Szeredi | 0956254 | 2016-08-08 15:08:49 +0200 | [diff] [blame] | 185 | bool ovl_is_private_xattr(const char *name) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 186 | { |
Andreas Gruenbacher | fe2b759 | 2016-08-22 17:59:22 +0200 | [diff] [blame] | 187 | return strncmp(name, OVL_XATTR_PREFIX, |
| 188 | sizeof(OVL_XATTR_PREFIX) - 1) == 0; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 189 | } |
| 190 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 191 | int ovl_xattr_set(struct dentry *dentry, const char *name, const void *value, |
| 192 | size_t size, int flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 193 | { |
| 194 | int err; |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 195 | struct path realpath; |
| 196 | enum ovl_path_type type = ovl_path_real(dentry, &realpath); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 197 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 198 | |
| 199 | err = ovl_want_write(dentry); |
| 200 | if (err) |
| 201 | goto out; |
| 202 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 203 | if (!value && !OVL_TYPE_UPPER(type)) { |
| 204 | err = vfs_getxattr(realpath.dentry, name, NULL, 0); |
| 205 | if (err < 0) |
| 206 | goto out_drop_write; |
| 207 | } |
| 208 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 209 | err = ovl_copy_up(dentry); |
| 210 | if (err) |
| 211 | goto out_drop_write; |
| 212 | |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 213 | if (!OVL_TYPE_UPPER(type)) |
| 214 | ovl_path_upper(dentry, &realpath); |
| 215 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 216 | old_cred = ovl_override_creds(dentry->d_sb); |
Andreas Gruenbacher | 0e585cc | 2016-08-22 17:22:11 +0200 | [diff] [blame] | 217 | if (value) |
| 218 | err = vfs_setxattr(realpath.dentry, name, value, size, flags); |
| 219 | else { |
| 220 | WARN_ON(flags != XATTR_REPLACE); |
| 221 | err = vfs_removexattr(realpath.dentry, name); |
| 222 | } |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 223 | revert_creds(old_cred); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 224 | |
| 225 | out_drop_write: |
| 226 | ovl_drop_write(dentry); |
| 227 | out: |
| 228 | return err; |
| 229 | } |
| 230 | |
Andreas Gruenbacher | 0eb45fc | 2016-08-22 17:52:55 +0200 | [diff] [blame] | 231 | int ovl_xattr_get(struct dentry *dentry, const char *name, |
| 232 | void *value, size_t size) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 233 | { |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 234 | struct dentry *realdentry = ovl_dentry_real(dentry); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 235 | ssize_t res; |
| 236 | const struct cred *old_cred; |
Miklos Szeredi | 5214846 | 2014-11-20 16:40:00 +0100 | [diff] [blame] | 237 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 238 | old_cred = ovl_override_creds(dentry->d_sb); |
| 239 | res = vfs_getxattr(realdentry, name, value, size); |
| 240 | revert_creds(old_cred); |
| 241 | return res; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 242 | } |
| 243 | |
Miklos Szeredi | a082c6f | 2017-05-29 15:15:27 +0200 | [diff] [blame] | 244 | static bool ovl_can_list(const char *s) |
| 245 | { |
| 246 | /* List all non-trusted xatts */ |
| 247 | if (strncmp(s, XATTR_TRUSTED_PREFIX, XATTR_TRUSTED_PREFIX_LEN) != 0) |
| 248 | return true; |
| 249 | |
| 250 | /* Never list trusted.overlay, list other trusted for superuser only */ |
| 251 | return !ovl_is_private_xattr(s) && capable(CAP_SYS_ADMIN); |
| 252 | } |
| 253 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 254 | ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size) |
| 255 | { |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 256 | struct dentry *realdentry = ovl_dentry_real(dentry); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 257 | ssize_t res; |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 258 | size_t len; |
| 259 | char *s; |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 260 | const struct cred *old_cred; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 261 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 262 | old_cred = ovl_override_creds(dentry->d_sb); |
Miklos Szeredi | b581755 | 2016-06-06 16:21:37 +0200 | [diff] [blame] | 263 | res = vfs_listxattr(realdentry, list, size); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 264 | revert_creds(old_cred); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 265 | if (res <= 0 || size == 0) |
| 266 | return res; |
| 267 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 268 | /* filter out private xattrs */ |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 269 | for (s = list, len = res; len;) { |
| 270 | size_t slen = strnlen(s, len) + 1; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 271 | |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 272 | /* underlying fs providing us with an broken xattr list? */ |
| 273 | if (WARN_ON(slen > len)) |
| 274 | return -EIO; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 275 | |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 276 | len -= slen; |
Miklos Szeredi | a082c6f | 2017-05-29 15:15:27 +0200 | [diff] [blame] | 277 | if (!ovl_can_list(s)) { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 278 | res -= slen; |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 279 | memmove(s, s + slen, len); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 280 | } else { |
Miklos Szeredi | 7cb3511 | 2016-09-01 11:12:00 +0200 | [diff] [blame] | 281 | s += slen; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 282 | } |
| 283 | } |
| 284 | |
| 285 | return res; |
| 286 | } |
| 287 | |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 288 | struct posix_acl *ovl_get_acl(struct inode *inode, int type) |
| 289 | { |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 290 | struct inode *realinode = ovl_inode_real(inode); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 291 | const struct cred *old_cred; |
| 292 | struct posix_acl *acl; |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 293 | |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 294 | if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !IS_POSIXACL(realinode)) |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 295 | return NULL; |
| 296 | |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 297 | old_cred = ovl_override_creds(inode->i_sb); |
Miklos Szeredi | 5201dc4 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 298 | acl = get_acl(realinode, type); |
Vivek Goyal | 1175b6b | 2016-07-01 16:34:28 -0400 | [diff] [blame] | 299 | revert_creds(old_cred); |
| 300 | |
| 301 | return acl; |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 302 | } |
| 303 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 304 | static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type, |
| 305 | struct dentry *realdentry) |
| 306 | { |
Miklos Szeredi | 1afaba1 | 2014-12-13 00:59:42 +0100 | [diff] [blame] | 307 | if (OVL_TYPE_UPPER(type)) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 308 | return false; |
| 309 | |
| 310 | if (special_file(realdentry->d_inode->i_mode)) |
| 311 | return false; |
| 312 | |
| 313 | if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC)) |
| 314 | return false; |
| 315 | |
| 316 | return true; |
| 317 | } |
| 318 | |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 319 | int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 320 | { |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 321 | int err = 0; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 322 | struct path realpath; |
| 323 | enum ovl_path_type type; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 324 | |
| 325 | type = ovl_path_real(dentry, &realpath); |
David Howells | 4bacc9c | 2015-06-18 14:32:31 +0100 | [diff] [blame] | 326 | if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 327 | err = ovl_want_write(dentry); |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 328 | if (!err) { |
Amir Goldstein | 9aba652 | 2016-11-12 21:36:03 +0200 | [diff] [blame] | 329 | err = ovl_copy_up_flags(dentry, file_flags); |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 330 | ovl_drop_write(dentry); |
| 331 | } |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 332 | } |
| 333 | |
Miklos Szeredi | 2d90267 | 2016-06-30 08:53:27 +0200 | [diff] [blame] | 334 | return err; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 335 | } |
| 336 | |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 337 | int ovl_update_time(struct inode *inode, struct timespec *ts, int flags) |
| 338 | { |
| 339 | struct dentry *alias; |
| 340 | struct path upperpath; |
| 341 | |
| 342 | if (!(flags & S_ATIME)) |
| 343 | return 0; |
| 344 | |
| 345 | alias = d_find_any_alias(inode); |
| 346 | if (!alias) |
| 347 | return 0; |
| 348 | |
| 349 | ovl_path_upper(alias, &upperpath); |
| 350 | if (upperpath.dentry) { |
| 351 | touch_atime(&upperpath); |
| 352 | inode->i_atime = d_inode(upperpath.dentry)->i_atime; |
| 353 | } |
| 354 | |
| 355 | dput(alias); |
| 356 | |
| 357 | return 0; |
| 358 | } |
| 359 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 360 | static const struct inode_operations ovl_file_inode_operations = { |
| 361 | .setattr = ovl_setattr, |
| 362 | .permission = ovl_permission, |
| 363 | .getattr = ovl_getattr, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 364 | .listxattr = ovl_listxattr, |
Vivek Goyal | 39a25b2 | 2016-07-01 16:34:26 -0400 | [diff] [blame] | 365 | .get_acl = ovl_get_acl, |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 366 | .update_time = ovl_update_time, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 367 | }; |
| 368 | |
| 369 | static const struct inode_operations ovl_symlink_inode_operations = { |
| 370 | .setattr = ovl_setattr, |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 371 | .get_link = ovl_get_link, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 372 | .getattr = ovl_getattr, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 373 | .listxattr = ovl_listxattr, |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 374 | .update_time = ovl_update_time, |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 375 | }; |
| 376 | |
Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 377 | /* |
| 378 | * It is possible to stack overlayfs instance on top of another |
| 379 | * overlayfs instance as lower layer. We need to annonate the |
| 380 | * stackable i_mutex locks according to stack level of the super |
| 381 | * block instance. An overlayfs instance can never be in stack |
| 382 | * depth 0 (there is always a real fs below it). An overlayfs |
| 383 | * inode lock will use the lockdep annotaion ovl_i_mutex_key[depth]. |
| 384 | * |
| 385 | * For example, here is a snip from /proc/lockdep_chains after |
| 386 | * dir_iterate of nested overlayfs: |
| 387 | * |
| 388 | * [...] &ovl_i_mutex_dir_key[depth] (stack_depth=2) |
| 389 | * [...] &ovl_i_mutex_dir_key[depth]#2 (stack_depth=1) |
| 390 | * [...] &type->i_mutex_dir_key (stack_depth=0) |
| 391 | */ |
| 392 | #define OVL_MAX_NESTING FILESYSTEM_MAX_STACK_DEPTH |
| 393 | |
| 394 | static inline void ovl_lockdep_annotate_inode_mutex_key(struct inode *inode) |
| 395 | { |
| 396 | #ifdef CONFIG_LOCKDEP |
| 397 | static struct lock_class_key ovl_i_mutex_key[OVL_MAX_NESTING]; |
| 398 | static struct lock_class_key ovl_i_mutex_dir_key[OVL_MAX_NESTING]; |
| 399 | |
| 400 | int depth = inode->i_sb->s_stack_depth - 1; |
| 401 | |
| 402 | if (WARN_ON_ONCE(depth < 0 || depth >= OVL_MAX_NESTING)) |
| 403 | depth = 0; |
| 404 | |
| 405 | if (S_ISDIR(inode->i_mode)) |
| 406 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_dir_key[depth]); |
| 407 | else |
| 408 | lockdep_set_class(&inode->i_rwsem, &ovl_i_mutex_key[depth]); |
| 409 | #endif |
| 410 | } |
| 411 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 412 | static void ovl_fill_inode(struct inode *inode, umode_t mode, dev_t rdev) |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 413 | { |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 414 | inode->i_ino = get_next_ino(); |
| 415 | inode->i_mode = mode; |
Miklos Szeredi | d719e8f | 2016-07-29 12:05:23 +0200 | [diff] [blame] | 416 | inode->i_flags |= S_NOCMTIME; |
Miklos Szeredi | 2a3a2a3 | 2016-09-01 11:11:59 +0200 | [diff] [blame] | 417 | #ifdef CONFIG_FS_POSIX_ACL |
| 418 | inode->i_acl = inode->i_default_acl = ACL_DONT_CACHE; |
| 419 | #endif |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 420 | |
Amir Goldstein | b1eaa95 | 2017-01-11 12:07:46 +0200 | [diff] [blame] | 421 | ovl_lockdep_annotate_inode_mutex_key(inode); |
| 422 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 423 | switch (mode & S_IFMT) { |
| 424 | case S_IFREG: |
| 425 | inode->i_op = &ovl_file_inode_operations; |
| 426 | break; |
| 427 | |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 428 | case S_IFDIR: |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 429 | inode->i_op = &ovl_dir_inode_operations; |
| 430 | inode->i_fop = &ovl_dir_operations; |
| 431 | break; |
| 432 | |
| 433 | case S_IFLNK: |
| 434 | inode->i_op = &ovl_symlink_inode_operations; |
| 435 | break; |
| 436 | |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 437 | default: |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 438 | inode->i_op = &ovl_file_inode_operations; |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 439 | init_special_inode(inode, mode, rdev); |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 440 | break; |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 441 | } |
| 442 | } |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 443 | |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 444 | struct inode *ovl_new_inode(struct super_block *sb, umode_t mode, dev_t rdev) |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 445 | { |
| 446 | struct inode *inode; |
| 447 | |
| 448 | inode = new_inode(sb); |
| 449 | if (inode) |
Miklos Szeredi | ca4c8a3 | 2016-12-16 11:02:55 +0100 | [diff] [blame] | 450 | ovl_fill_inode(inode, mode, rdev); |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 451 | |
| 452 | return inode; |
| 453 | } |
| 454 | |
| 455 | static int ovl_inode_test(struct inode *inode, void *data) |
| 456 | { |
Miklos Szeredi | 25b7713 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 457 | return inode->i_private == data; |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 458 | } |
| 459 | |
| 460 | static int ovl_inode_set(struct inode *inode, void *data) |
| 461 | { |
Miklos Szeredi | 25b7713 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 462 | inode->i_private = data; |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 463 | return 0; |
| 464 | } |
| 465 | |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 466 | struct inode *ovl_get_inode(struct dentry *dentry, struct dentry *upperdentry) |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 467 | { |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 468 | struct dentry *lowerdentry = ovl_dentry_lower(dentry); |
| 469 | struct inode *realinode = upperdentry ? d_inode(upperdentry) : NULL; |
Miklos Szeredi | 51f7e52 | 2016-07-29 12:05:24 +0200 | [diff] [blame] | 470 | struct inode *inode; |
| 471 | |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 472 | if (!realinode) |
| 473 | realinode = d_inode(lowerdentry); |
| 474 | |
Miklos Szeredi | e6d2ebd | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 475 | if (upperdentry && !d_is_dir(upperdentry)) { |
| 476 | inode = iget5_locked(dentry->d_sb, (unsigned long) realinode, |
| 477 | ovl_inode_test, ovl_inode_set, realinode); |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 478 | if (!inode) |
Miklos Szeredi | e6d2ebd | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 479 | goto out; |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 480 | if (!(inode->i_state & I_NEW)) { |
| 481 | dput(upperdentry); |
| 482 | goto out; |
| 483 | } |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 484 | |
Miklos Szeredi | e6d2ebd | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 485 | set_nlink(inode, realinode->i_nlink); |
| 486 | } else { |
| 487 | inode = new_inode(dentry->d_sb); |
| 488 | if (!inode) |
| 489 | goto out; |
| 490 | } |
| 491 | ovl_fill_inode(inode, realinode->i_mode, realinode->i_rdev); |
Miklos Szeredi | 09d8b58 | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 492 | ovl_inode_init(inode, upperdentry, lowerdentry); |
Miklos Szeredi | 13c7207 | 2017-07-04 22:03:16 +0200 | [diff] [blame^] | 493 | |
| 494 | if (upperdentry && ovl_is_impuredir(upperdentry)) |
| 495 | ovl_set_flag(OVL_IMPURE, inode); |
| 496 | |
Miklos Szeredi | e6d2ebd | 2017-07-04 22:03:16 +0200 | [diff] [blame] | 497 | if (inode->i_state & I_NEW) |
| 498 | unlock_new_inode(inode); |
| 499 | out: |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 500 | return inode; |
Miklos Szeredi | e9be9d5 | 2014-10-24 00:14:38 +0200 | [diff] [blame] | 501 | } |