blob: 5becbaf1cec73be17f1f7611c78daf6f392dba93 [file] [log] [blame]
Miklos Szeredie9be9d52014-10-24 00:14:38 +02001/*
2 *
3 * Copyright (C) 2011 Novell Inc.
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 as published by
7 * the Free Software Foundation.
8 */
9
10#include <linux/fs.h>
11#include <linux/slab.h>
12#include <linux/xattr.h>
13#include "overlayfs.h"
14
Al Viro0f7ff2d2015-12-06 12:31:07 -050015static int ovl_copy_up_truncate(struct dentry *dentry)
Miklos Szeredie9be9d52014-10-24 00:14:38 +020016{
17 int err;
18 struct dentry *parent;
19 struct kstat stat;
20 struct path lowerpath;
21
22 parent = dget_parent(dentry);
23 err = ovl_copy_up(parent);
24 if (err)
25 goto out_dput_parent;
26
27 ovl_path_lower(dentry, &lowerpath);
28 err = vfs_getattr(&lowerpath, &stat);
29 if (err)
30 goto out_dput_parent;
31
Al Viro0f7ff2d2015-12-06 12:31:07 -050032 stat.size = 0;
33 err = ovl_copy_up_one(parent, dentry, &lowerpath, &stat);
Miklos Szeredie9be9d52014-10-24 00:14:38 +020034
35out_dput_parent:
36 dput(parent);
37 return err;
38}
39
40int ovl_setattr(struct dentry *dentry, struct iattr *attr)
41{
42 int err;
43 struct dentry *upperdentry;
Vivek Goyal1175b6b2016-07-01 16:34:28 -040044 const struct cred *old_cred;
Miklos Szeredie9be9d52014-10-24 00:14:38 +020045
Miklos Szeredicf9a6782015-12-11 16:30:49 +010046 /*
47 * Check for permissions before trying to copy-up. This is redundant
48 * since it will be rechecked later by ->setattr() on upper dentry. But
49 * without this, copy-up can be triggered by just about anybody.
50 *
51 * We don't initialize inode->size, which just means that
52 * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not
53 * check for a swapfile (which this won't be anyway).
54 */
55 err = inode_change_ok(dentry->d_inode, attr);
56 if (err)
57 return err;
58
Miklos Szeredie9be9d52014-10-24 00:14:38 +020059 err = ovl_want_write(dentry);
60 if (err)
61 goto out;
62
Miklos Szeredi03bea602016-06-29 16:03:55 +020063 if (attr->ia_valid & ATTR_SIZE) {
64 struct inode *realinode = d_inode(ovl_dentry_real(dentry));
65
66 err = -ETXTBSY;
67 if (atomic_read(&realinode->i_writecount) < 0)
68 goto out_drop_write;
69 }
70
Miklos Szerediacff81e2015-12-04 19:18:48 +010071 err = ovl_copy_up(dentry);
72 if (!err) {
Miklos Szeredi03bea602016-06-29 16:03:55 +020073 struct inode *winode = NULL;
74
Miklos Szerediacff81e2015-12-04 19:18:48 +010075 upperdentry = ovl_dentry_upper(dentry);
76
Miklos Szeredi03bea602016-06-29 16:03:55 +020077 if (attr->ia_valid & ATTR_SIZE) {
78 winode = d_inode(upperdentry);
79 err = get_write_access(winode);
80 if (err)
81 goto out_drop_write;
82 }
83
Miklos Szeredib99c2d92016-07-04 16:49:48 +020084 if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
85 attr->ia_valid &= ~ATTR_MODE;
86
Al Viro59551022016-01-22 15:40:57 -050087 inode_lock(upperdentry->d_inode);
Vivek Goyal1175b6b2016-07-01 16:34:28 -040088 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredie9be9d52014-10-24 00:14:38 +020089 err = notify_change(upperdentry, attr, NULL);
Vivek Goyal1175b6b2016-07-01 16:34:28 -040090 revert_creds(old_cred);
Konstantin Khlebnikovb81de062016-01-31 16:21:29 +030091 if (!err)
92 ovl_copyattr(upperdentry->d_inode, dentry->d_inode);
Al Viro59551022016-01-22 15:40:57 -050093 inode_unlock(upperdentry->d_inode);
Miklos Szeredi03bea602016-06-29 16:03:55 +020094
95 if (winode)
96 put_write_access(winode);
Miklos Szeredie9be9d52014-10-24 00:14:38 +020097 }
Miklos Szeredi03bea602016-06-29 16:03:55 +020098out_drop_write:
Miklos Szeredie9be9d52014-10-24 00:14:38 +020099 ovl_drop_write(dentry);
100out:
101 return err;
102}
103
104static int ovl_getattr(struct vfsmount *mnt, struct dentry *dentry,
105 struct kstat *stat)
106{
107 struct path realpath;
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400108 const struct cred *old_cred;
109 int err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200110
111 ovl_path_real(dentry, &realpath);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400112 old_cred = ovl_override_creds(dentry->d_sb);
113 err = vfs_getattr(&realpath, stat);
114 revert_creds(old_cred);
115 return err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200116}
117
118int ovl_permission(struct inode *inode, int mask)
119{
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200120 struct ovl_entry *oe = inode->i_private;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200121 bool is_upper;
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200122 struct dentry *realdentry = ovl_entry_real(oe, &is_upper);
123 struct inode *realinode;
Vivek Goyalc0ca3d72016-07-01 16:34:27 -0400124 const struct cred *old_cred;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200125 int err;
126
Miklos Szeredi8d3095f2015-10-12 17:11:44 +0200127 if (ovl_is_default_permissions(inode)) {
128 struct kstat stat;
129 struct path realpath = { .dentry = realdentry };
130
131 if (mask & MAY_NOT_BLOCK)
132 return -ECHILD;
133
134 realpath.mnt = ovl_entry_mnt_real(oe, inode, is_upper);
135
136 err = vfs_getattr(&realpath, &stat);
137 if (err)
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200138 return err;
Miklos Szeredi8d3095f2015-10-12 17:11:44 +0200139
140 if ((stat.mode ^ inode->i_mode) & S_IFMT)
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200141 return -ESTALE;
Miklos Szeredi8d3095f2015-10-12 17:11:44 +0200142
143 inode->i_mode = stat.mode;
144 inode->i_uid = stat.uid;
145 inode->i_gid = stat.gid;
146
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200147 return generic_permission(inode, mask);
Miklos Szeredi8d3095f2015-10-12 17:11:44 +0200148 }
149
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200150 /* Careful in RCU walk mode */
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200151 realinode = d_inode_rcu(realdentry);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200152 if (!realinode) {
153 WARN_ON(!(mask & MAY_NOT_BLOCK));
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200154 return -ENOENT;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200155 }
156
157 if (mask & MAY_WRITE) {
158 umode_t mode = realinode->i_mode;
159
160 /*
161 * Writes will always be redirected to upper layer, so
162 * ignore lower layer being read-only.
163 *
164 * If the overlay itself is read-only then proceed
165 * with the permission check, don't return EROFS.
166 * This will only happen if this is the lower layer of
167 * another overlayfs.
168 *
169 * If upper fs becomes read-only after the overlay was
170 * constructed return EROFS to prevent modification of
171 * upper layer.
172 */
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200173 if (is_upper && !IS_RDONLY(inode) && IS_RDONLY(realinode) &&
174 (S_ISREG(mode) || S_ISDIR(mode) || S_ISLNK(mode)))
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200175 return -EROFS;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200176 }
177
Vivek Goyalc0ca3d72016-07-01 16:34:27 -0400178 /*
179 * Check overlay inode with the creds of task and underlying inode
180 * with creds of mounter
181 */
182 err = generic_permission(inode, mask);
183 if (err)
184 return err;
185
186 old_cred = ovl_override_creds(inode->i_sb);
187 err = __inode_permission(realinode, mask);
188 revert_creds(old_cred);
189
190 return err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200191}
192
Al Viro6b255392015-11-17 10:20:54 -0500193static const char *ovl_get_link(struct dentry *dentry,
Al Virofceef392015-12-29 15:58:39 -0500194 struct inode *inode,
195 struct delayed_call *done)
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200196{
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200197 struct dentry *realdentry;
198 struct inode *realinode;
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400199 const struct cred *old_cred;
200 const char *p;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200201
Al Viro6b255392015-11-17 10:20:54 -0500202 if (!dentry)
203 return ERR_PTR(-ECHILD);
204
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200205 realdentry = ovl_dentry_real(dentry);
206 realinode = realdentry->d_inode;
207
Al Viro6b255392015-11-17 10:20:54 -0500208 if (WARN_ON(!realinode->i_op->get_link))
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200209 return ERR_PTR(-EPERM);
210
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400211 old_cred = ovl_override_creds(dentry->d_sb);
212 p = realinode->i_op->get_link(realdentry, realinode, done);
213 revert_creds(old_cred);
214 return p;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200215}
216
217static int ovl_readlink(struct dentry *dentry, char __user *buf, int bufsiz)
218{
219 struct path realpath;
220 struct inode *realinode;
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400221 const struct cred *old_cred;
222 int err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200223
224 ovl_path_real(dentry, &realpath);
225 realinode = realpath.dentry->d_inode;
226
227 if (!realinode->i_op->readlink)
228 return -EINVAL;
229
230 touch_atime(&realpath);
231
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400232 old_cred = ovl_override_creds(dentry->d_sb);
233 err = realinode->i_op->readlink(realpath.dentry, buf, bufsiz);
234 revert_creds(old_cred);
235 return err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200236}
237
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200238static bool ovl_is_private_xattr(const char *name)
239{
hujianyangcead89b2014-11-24 18:25:21 +0800240 return strncmp(name, OVL_XATTR_PRE_NAME, OVL_XATTR_PRE_LEN) == 0;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200241}
242
Al Viro3767e252016-05-27 11:06:05 -0400243int ovl_setxattr(struct dentry *dentry, struct inode *inode,
244 const char *name, const void *value,
245 size_t size, int flags)
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200246{
247 int err;
248 struct dentry *upperdentry;
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400249 const struct cred *old_cred;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200250
251 err = ovl_want_write(dentry);
252 if (err)
253 goto out;
254
255 err = -EPERM;
256 if (ovl_is_private_xattr(name))
257 goto out_drop_write;
258
259 err = ovl_copy_up(dentry);
260 if (err)
261 goto out_drop_write;
262
263 upperdentry = ovl_dentry_upper(dentry);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400264 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200265 err = vfs_setxattr(upperdentry, name, value, size, flags);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400266 revert_creds(old_cred);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200267
268out_drop_write:
269 ovl_drop_write(dentry);
270out:
271 return err;
272}
273
Al Viroce23e642016-04-11 00:48:00 -0400274ssize_t ovl_getxattr(struct dentry *dentry, struct inode *inode,
275 const char *name, void *value, size_t size)
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200276{
Miklos Szeredib5817552016-06-06 16:21:37 +0200277 struct dentry *realdentry = ovl_dentry_real(dentry);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400278 ssize_t res;
279 const struct cred *old_cred;
Miklos Szeredi52148462014-11-20 16:40:00 +0100280
Miklos Szeredib5817552016-06-06 16:21:37 +0200281 if (ovl_is_private_xattr(name))
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200282 return -ENODATA;
283
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400284 old_cred = ovl_override_creds(dentry->d_sb);
285 res = vfs_getxattr(realdentry, name, value, size);
286 revert_creds(old_cred);
287 return res;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200288}
289
290ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size)
291{
Miklos Szeredib5817552016-06-06 16:21:37 +0200292 struct dentry *realdentry = ovl_dentry_real(dentry);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200293 ssize_t res;
294 int off;
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400295 const struct cred *old_cred;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200296
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400297 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredib5817552016-06-06 16:21:37 +0200298 res = vfs_listxattr(realdentry, list, size);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400299 revert_creds(old_cred);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200300 if (res <= 0 || size == 0)
301 return res;
302
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200303 /* filter out private xattrs */
304 for (off = 0; off < res;) {
305 char *s = list + off;
306 size_t slen = strlen(s) + 1;
307
308 BUG_ON(off + slen > res);
309
310 if (ovl_is_private_xattr(s)) {
311 res -= slen;
312 memmove(s, s + slen, res - off);
313 } else {
314 off += slen;
315 }
316 }
317
318 return res;
319}
320
321int ovl_removexattr(struct dentry *dentry, const char *name)
322{
323 int err;
324 struct path realpath;
Miklos Szeredi52148462014-11-20 16:40:00 +0100325 enum ovl_path_type type = ovl_path_real(dentry, &realpath);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400326 const struct cred *old_cred;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200327
328 err = ovl_want_write(dentry);
329 if (err)
330 goto out;
331
Miklos Szeredi52148462014-11-20 16:40:00 +0100332 err = -ENODATA;
Miklos Szeredib5817552016-06-06 16:21:37 +0200333 if (ovl_is_private_xattr(name))
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200334 goto out_drop_write;
335
Miklos Szeredi1afaba12014-12-13 00:59:42 +0100336 if (!OVL_TYPE_UPPER(type)) {
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200337 err = vfs_getxattr(realpath.dentry, name, NULL, 0);
338 if (err < 0)
339 goto out_drop_write;
340
341 err = ovl_copy_up(dentry);
342 if (err)
343 goto out_drop_write;
344
345 ovl_path_upper(dentry, &realpath);
346 }
347
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400348 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200349 err = vfs_removexattr(realpath.dentry, name);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400350 revert_creds(old_cred);
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200351out_drop_write:
352 ovl_drop_write(dentry);
353out:
354 return err;
355}
356
Vivek Goyal39a25b22016-07-01 16:34:26 -0400357struct posix_acl *ovl_get_acl(struct inode *inode, int type)
358{
359 struct inode *realinode = ovl_inode_real(inode);
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400360 const struct cred *old_cred;
361 struct posix_acl *acl;
Vivek Goyal39a25b22016-07-01 16:34:26 -0400362
Vivek Goyal39a25b22016-07-01 16:34:26 -0400363 if (!IS_POSIXACL(realinode))
364 return NULL;
365
366 if (!realinode->i_op->get_acl)
367 return NULL;
368
Vivek Goyal1175b6b2016-07-01 16:34:28 -0400369 old_cred = ovl_override_creds(inode->i_sb);
370 acl = realinode->i_op->get_acl(realinode, type);
371 revert_creds(old_cred);
372
373 return acl;
Vivek Goyal39a25b22016-07-01 16:34:26 -0400374}
375
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200376static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type,
377 struct dentry *realdentry)
378{
Miklos Szeredi1afaba12014-12-13 00:59:42 +0100379 if (OVL_TYPE_UPPER(type))
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200380 return false;
381
382 if (special_file(realdentry->d_inode->i_mode))
383 return false;
384
385 if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC))
386 return false;
387
388 return true;
389}
390
Miklos Szeredi2d902672016-06-30 08:53:27 +0200391int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags)
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200392{
Miklos Szeredi2d902672016-06-30 08:53:27 +0200393 int err = 0;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200394 struct path realpath;
395 enum ovl_path_type type;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200396
397 type = ovl_path_real(dentry, &realpath);
David Howells4bacc9c2015-06-18 14:32:31 +0100398 if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) {
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200399 err = ovl_want_write(dentry);
Miklos Szeredi2d902672016-06-30 08:53:27 +0200400 if (!err) {
401 if (file_flags & O_TRUNC)
402 err = ovl_copy_up_truncate(dentry);
403 else
404 err = ovl_copy_up(dentry);
405 ovl_drop_write(dentry);
406 }
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200407 }
408
Miklos Szeredi2d902672016-06-30 08:53:27 +0200409 return err;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200410}
411
412static const struct inode_operations ovl_file_inode_operations = {
413 .setattr = ovl_setattr,
414 .permission = ovl_permission,
415 .getattr = ovl_getattr,
416 .setxattr = ovl_setxattr,
417 .getxattr = ovl_getxattr,
418 .listxattr = ovl_listxattr,
419 .removexattr = ovl_removexattr,
Vivek Goyal39a25b22016-07-01 16:34:26 -0400420 .get_acl = ovl_get_acl,
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200421};
422
423static const struct inode_operations ovl_symlink_inode_operations = {
424 .setattr = ovl_setattr,
Al Viro6b255392015-11-17 10:20:54 -0500425 .get_link = ovl_get_link,
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200426 .readlink = ovl_readlink,
427 .getattr = ovl_getattr,
428 .setxattr = ovl_setxattr,
429 .getxattr = ovl_getxattr,
430 .listxattr = ovl_listxattr,
431 .removexattr = ovl_removexattr,
432};
433
434struct inode *ovl_new_inode(struct super_block *sb, umode_t mode,
435 struct ovl_entry *oe)
436{
437 struct inode *inode;
438
439 inode = new_inode(sb);
440 if (!inode)
441 return NULL;
442
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200443 inode->i_ino = get_next_ino();
444 inode->i_mode = mode;
445 inode->i_flags |= S_NOATIME | S_NOCMTIME;
Andreas Gruenbacher58ed4e72016-05-26 02:01:47 +0200446 inode->i_private = oe;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200447
Vivek Goyal07a2daa2016-07-01 16:34:25 -0400448 mode &= S_IFMT;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200449 switch (mode) {
450 case S_IFDIR:
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200451 inode->i_op = &ovl_dir_inode_operations;
452 inode->i_fop = &ovl_dir_operations;
453 break;
454
455 case S_IFLNK:
456 inode->i_op = &ovl_symlink_inode_operations;
457 break;
458
459 case S_IFREG:
460 case S_IFSOCK:
461 case S_IFBLK:
462 case S_IFCHR:
463 case S_IFIFO:
464 inode->i_op = &ovl_file_inode_operations;
465 break;
466
467 default:
468 WARN(1, "illegal file type: %i\n", mode);
469 iput(inode);
470 inode = NULL;
471 }
472
473 return inode;
Miklos Szeredie9be9d52014-10-24 00:14:38 +0200474}