1bbb1e54dSMiklos Szeredi /* 2bbb1e54dSMiklos Szeredi * Copyright (C) 2011 Novell Inc. 3bbb1e54dSMiklos Szeredi * Copyright (C) 2016 Red Hat, Inc. 4bbb1e54dSMiklos Szeredi * 5bbb1e54dSMiklos Szeredi * This program is free software; you can redistribute it and/or modify it 6bbb1e54dSMiklos Szeredi * under the terms of the GNU General Public License version 2 as published by 7bbb1e54dSMiklos Szeredi * the Free Software Foundation. 8bbb1e54dSMiklos Szeredi */ 9bbb1e54dSMiklos Szeredi 10bbb1e54dSMiklos Szeredi #include <linux/fs.h> 115b825c3aSIngo Molnar #include <linux/cred.h> 12bbb1e54dSMiklos Szeredi #include <linux/namei.h> 13bbb1e54dSMiklos Szeredi #include <linux/xattr.h> 1402b69b28SMiklos Szeredi #include <linux/ratelimit.h> 15a9d01957SAmir Goldstein #include <linux/mount.h> 16a9d01957SAmir Goldstein #include <linux/exportfs.h> 17bbb1e54dSMiklos Szeredi #include "overlayfs.h" 18bbb1e54dSMiklos Szeredi 19e28edc46SMiklos Szeredi struct ovl_lookup_data { 20e28edc46SMiklos Szeredi struct qstr name; 21e28edc46SMiklos Szeredi bool is_dir; 22e28edc46SMiklos Szeredi bool opaque; 23e28edc46SMiklos Szeredi bool stop; 24e28edc46SMiklos Szeredi bool last; 2502b69b28SMiklos Szeredi char *redirect; 26e28edc46SMiklos Szeredi }; 27bbb1e54dSMiklos Szeredi 2802b69b28SMiklos Szeredi static int ovl_check_redirect(struct dentry *dentry, struct ovl_lookup_data *d, 2902b69b28SMiklos Szeredi size_t prelen, const char *post) 3002b69b28SMiklos Szeredi { 3102b69b28SMiklos Szeredi int res; 3202b69b28SMiklos Szeredi char *s, *next, *buf = NULL; 3302b69b28SMiklos Szeredi 3402b69b28SMiklos Szeredi res = vfs_getxattr(dentry, OVL_XATTR_REDIRECT, NULL, 0); 3502b69b28SMiklos Szeredi if (res < 0) { 3602b69b28SMiklos Szeredi if (res == -ENODATA || res == -EOPNOTSUPP) 3702b69b28SMiklos Szeredi return 0; 3802b69b28SMiklos Szeredi goto fail; 3902b69b28SMiklos Szeredi } 400ee931c4SMichal Hocko buf = kzalloc(prelen + res + strlen(post) + 1, GFP_KERNEL); 4102b69b28SMiklos Szeredi if (!buf) 4202b69b28SMiklos Szeredi return -ENOMEM; 4302b69b28SMiklos Szeredi 4402b69b28SMiklos Szeredi if (res == 0) 4502b69b28SMiklos Szeredi goto invalid; 4602b69b28SMiklos Szeredi 4702b69b28SMiklos Szeredi res = vfs_getxattr(dentry, OVL_XATTR_REDIRECT, buf, res); 4802b69b28SMiklos Szeredi if (res < 0) 4902b69b28SMiklos Szeredi goto fail; 5002b69b28SMiklos Szeredi if (res == 0) 5102b69b28SMiklos Szeredi goto invalid; 5202b69b28SMiklos Szeredi if (buf[0] == '/') { 5302b69b28SMiklos Szeredi for (s = buf; *s++ == '/'; s = next) { 5402b69b28SMiklos Szeredi next = strchrnul(s, '/'); 5502b69b28SMiklos Szeredi if (s == next) 5602b69b28SMiklos Szeredi goto invalid; 5702b69b28SMiklos Szeredi } 5802b69b28SMiklos Szeredi } else { 5902b69b28SMiklos Szeredi if (strchr(buf, '/') != NULL) 6002b69b28SMiklos Szeredi goto invalid; 6102b69b28SMiklos Szeredi 6202b69b28SMiklos Szeredi memmove(buf + prelen, buf, res); 6302b69b28SMiklos Szeredi memcpy(buf, d->name.name, prelen); 6402b69b28SMiklos Szeredi } 6502b69b28SMiklos Szeredi 6602b69b28SMiklos Szeredi strcat(buf, post); 6702b69b28SMiklos Szeredi kfree(d->redirect); 6802b69b28SMiklos Szeredi d->redirect = buf; 6902b69b28SMiklos Szeredi d->name.name = d->redirect; 7002b69b28SMiklos Szeredi d->name.len = strlen(d->redirect); 7102b69b28SMiklos Szeredi 7202b69b28SMiklos Szeredi return 0; 7302b69b28SMiklos Szeredi 7402b69b28SMiklos Szeredi err_free: 7502b69b28SMiklos Szeredi kfree(buf); 7602b69b28SMiklos Szeredi return 0; 7702b69b28SMiklos Szeredi fail: 7802b69b28SMiklos Szeredi pr_warn_ratelimited("overlayfs: failed to get redirect (%i)\n", res); 7902b69b28SMiklos Szeredi goto err_free; 8002b69b28SMiklos Szeredi invalid: 8102b69b28SMiklos Szeredi pr_warn_ratelimited("overlayfs: invalid redirect (%s)\n", buf); 8202b69b28SMiklos Szeredi goto err_free; 8302b69b28SMiklos Szeredi } 8402b69b28SMiklos Szeredi 85a9d01957SAmir Goldstein static int ovl_acceptable(void *ctx, struct dentry *dentry) 86a9d01957SAmir Goldstein { 87a9d01957SAmir Goldstein return 1; 88a9d01957SAmir Goldstein } 89a9d01957SAmir Goldstein 902e1a5328SAmir Goldstein /* 912e1a5328SAmir Goldstein * Check validity of an overlay file handle buffer. 922e1a5328SAmir Goldstein * 932e1a5328SAmir Goldstein * Return 0 for a valid file handle. 942e1a5328SAmir Goldstein * Return -ENODATA for "origin unknown". 952e1a5328SAmir Goldstein * Return <0 for an invalid file handle. 962e1a5328SAmir Goldstein */ 972e1a5328SAmir Goldstein static int ovl_check_fh_len(struct ovl_fh *fh, int fh_len) 982e1a5328SAmir Goldstein { 992e1a5328SAmir Goldstein if (fh_len < sizeof(struct ovl_fh) || fh_len < fh->len) 1002e1a5328SAmir Goldstein return -EINVAL; 1012e1a5328SAmir Goldstein 1022e1a5328SAmir Goldstein if (fh->magic != OVL_FH_MAGIC) 1032e1a5328SAmir Goldstein return -EINVAL; 1042e1a5328SAmir Goldstein 1052e1a5328SAmir Goldstein /* Treat larger version and unknown flags as "origin unknown" */ 1062e1a5328SAmir Goldstein if (fh->version > OVL_FH_VERSION || fh->flags & ~OVL_FH_FLAG_ALL) 1072e1a5328SAmir Goldstein return -ENODATA; 1082e1a5328SAmir Goldstein 1092e1a5328SAmir Goldstein /* Treat endianness mismatch as "origin unknown" */ 1102e1a5328SAmir Goldstein if (!(fh->flags & OVL_FH_FLAG_ANY_ENDIAN) && 1112e1a5328SAmir Goldstein (fh->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN) 1122e1a5328SAmir Goldstein return -ENODATA; 1132e1a5328SAmir Goldstein 1142e1a5328SAmir Goldstein return 0; 1152e1a5328SAmir Goldstein } 1162e1a5328SAmir Goldstein 117*05122443SAmir Goldstein static struct ovl_fh *ovl_get_fh(struct dentry *dentry, const char *name) 118a9d01957SAmir Goldstein { 1192e1a5328SAmir Goldstein int res, err; 120a9d01957SAmir Goldstein struct ovl_fh *fh = NULL; 121a9d01957SAmir Goldstein 122*05122443SAmir Goldstein res = vfs_getxattr(dentry, name, NULL, 0); 123a9d01957SAmir Goldstein if (res < 0) { 124a9d01957SAmir Goldstein if (res == -ENODATA || res == -EOPNOTSUPP) 125a9d01957SAmir Goldstein return NULL; 126a9d01957SAmir Goldstein goto fail; 127a9d01957SAmir Goldstein } 128a9d01957SAmir Goldstein /* Zero size value means "copied up but origin unknown" */ 129a9d01957SAmir Goldstein if (res == 0) 130a9d01957SAmir Goldstein return NULL; 131a9d01957SAmir Goldstein 1320ee931c4SMichal Hocko fh = kzalloc(res, GFP_KERNEL); 133a9d01957SAmir Goldstein if (!fh) 134a9d01957SAmir Goldstein return ERR_PTR(-ENOMEM); 135a9d01957SAmir Goldstein 136*05122443SAmir Goldstein res = vfs_getxattr(dentry, name, fh, res); 137a9d01957SAmir Goldstein if (res < 0) 138a9d01957SAmir Goldstein goto fail; 139a9d01957SAmir Goldstein 1402e1a5328SAmir Goldstein err = ovl_check_fh_len(fh, res); 1412e1a5328SAmir Goldstein if (err < 0) { 1422e1a5328SAmir Goldstein if (err == -ENODATA) 143a9d01957SAmir Goldstein goto out; 1442e1a5328SAmir Goldstein goto invalid; 1452e1a5328SAmir Goldstein } 146a9d01957SAmir Goldstein 1478b88a2e6SAmir Goldstein return fh; 1488b88a2e6SAmir Goldstein 1498b88a2e6SAmir Goldstein out: 1508b88a2e6SAmir Goldstein kfree(fh); 1518b88a2e6SAmir Goldstein return NULL; 1528b88a2e6SAmir Goldstein 1538b88a2e6SAmir Goldstein fail: 1548b88a2e6SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to get origin (%i)\n", res); 1558b88a2e6SAmir Goldstein goto out; 1568b88a2e6SAmir Goldstein invalid: 1578b88a2e6SAmir Goldstein pr_warn_ratelimited("overlayfs: invalid origin (%*phN)\n", res, fh); 1588b88a2e6SAmir Goldstein goto out; 1598b88a2e6SAmir Goldstein } 1608b88a2e6SAmir Goldstein 1612e1a5328SAmir Goldstein static struct dentry *ovl_decode_fh(struct ovl_fh *fh, struct vfsmount *mnt) 1628b88a2e6SAmir Goldstein { 1632e1a5328SAmir Goldstein struct dentry *origin; 1648b88a2e6SAmir Goldstein int bytes; 1658b88a2e6SAmir Goldstein 166a9d01957SAmir Goldstein /* 167a9d01957SAmir Goldstein * Make sure that the stored uuid matches the uuid of the lower 168a9d01957SAmir Goldstein * layer where file handle will be decoded. 169a9d01957SAmir Goldstein */ 17085787090SChristoph Hellwig if (!uuid_equal(&fh->uuid, &mnt->mnt_sb->s_uuid)) 1712e1a5328SAmir Goldstein return NULL; 172a9d01957SAmir Goldstein 1738b88a2e6SAmir Goldstein bytes = (fh->len - offsetof(struct ovl_fh, fid)); 174a9d01957SAmir Goldstein origin = exportfs_decode_fh(mnt, (struct fid *)fh->fid, 175a9d01957SAmir Goldstein bytes >> 2, (int)fh->type, 176a9d01957SAmir Goldstein ovl_acceptable, NULL); 177a9d01957SAmir Goldstein if (IS_ERR(origin)) { 178a9d01957SAmir Goldstein /* Treat stale file handle as "origin unknown" */ 179a9d01957SAmir Goldstein if (origin == ERR_PTR(-ESTALE)) 180a9d01957SAmir Goldstein origin = NULL; 1812e1a5328SAmir Goldstein return origin; 182a9d01957SAmir Goldstein } 183a9d01957SAmir Goldstein 1842e1a5328SAmir Goldstein if (ovl_dentry_weird(origin)) { 1858b88a2e6SAmir Goldstein dput(origin); 1862e1a5328SAmir Goldstein return NULL; 1872e1a5328SAmir Goldstein } 1882e1a5328SAmir Goldstein 1892e1a5328SAmir Goldstein return origin; 190a9d01957SAmir Goldstein } 191a9d01957SAmir Goldstein 192ee1d6d37SAmir Goldstein static bool ovl_is_opaquedir(struct dentry *dentry) 193ee1d6d37SAmir Goldstein { 194ee1d6d37SAmir Goldstein return ovl_check_dir_xattr(dentry, OVL_XATTR_OPAQUE); 195ee1d6d37SAmir Goldstein } 196ee1d6d37SAmir Goldstein 197e28edc46SMiklos Szeredi static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d, 198e28edc46SMiklos Szeredi const char *name, unsigned int namelen, 19902b69b28SMiklos Szeredi size_t prelen, const char *post, 200e28edc46SMiklos Szeredi struct dentry **ret) 201e28edc46SMiklos Szeredi { 202e28edc46SMiklos Szeredi struct dentry *this; 203e28edc46SMiklos Szeredi int err; 204e28edc46SMiklos Szeredi 205e28edc46SMiklos Szeredi this = lookup_one_len_unlocked(name, base, namelen); 206e28edc46SMiklos Szeredi if (IS_ERR(this)) { 207e28edc46SMiklos Szeredi err = PTR_ERR(this); 208e28edc46SMiklos Szeredi this = NULL; 209e28edc46SMiklos Szeredi if (err == -ENOENT || err == -ENAMETOOLONG) 210e28edc46SMiklos Szeredi goto out; 211e28edc46SMiklos Szeredi goto out_err; 212e28edc46SMiklos Szeredi } 213e28edc46SMiklos Szeredi if (!this->d_inode) 214e28edc46SMiklos Szeredi goto put_and_out; 215e28edc46SMiklos Szeredi 216e28edc46SMiklos Szeredi if (ovl_dentry_weird(this)) { 217e28edc46SMiklos Szeredi /* Don't support traversing automounts and other weirdness */ 218e28edc46SMiklos Szeredi err = -EREMOTE; 219e28edc46SMiklos Szeredi goto out_err; 220e28edc46SMiklos Szeredi } 221e28edc46SMiklos Szeredi if (ovl_is_whiteout(this)) { 222e28edc46SMiklos Szeredi d->stop = d->opaque = true; 223e28edc46SMiklos Szeredi goto put_and_out; 224e28edc46SMiklos Szeredi } 225e28edc46SMiklos Szeredi if (!d_can_lookup(this)) { 226e28edc46SMiklos Szeredi d->stop = true; 227e28edc46SMiklos Szeredi if (d->is_dir) 228e28edc46SMiklos Szeredi goto put_and_out; 229e28edc46SMiklos Szeredi goto out; 230e28edc46SMiklos Szeredi } 231e28edc46SMiklos Szeredi d->is_dir = true; 232e28edc46SMiklos Szeredi if (!d->last && ovl_is_opaquedir(this)) { 233e28edc46SMiklos Szeredi d->stop = d->opaque = true; 234e28edc46SMiklos Szeredi goto out; 235e28edc46SMiklos Szeredi } 23602b69b28SMiklos Szeredi err = ovl_check_redirect(this, d, prelen, post); 23702b69b28SMiklos Szeredi if (err) 23802b69b28SMiklos Szeredi goto out_err; 239e28edc46SMiklos Szeredi out: 240e28edc46SMiklos Szeredi *ret = this; 241e28edc46SMiklos Szeredi return 0; 242e28edc46SMiklos Szeredi 243e28edc46SMiklos Szeredi put_and_out: 244e28edc46SMiklos Szeredi dput(this); 245e28edc46SMiklos Szeredi this = NULL; 246e28edc46SMiklos Szeredi goto out; 247e28edc46SMiklos Szeredi 248e28edc46SMiklos Szeredi out_err: 249e28edc46SMiklos Szeredi dput(this); 250e28edc46SMiklos Szeredi return err; 251e28edc46SMiklos Szeredi } 252e28edc46SMiklos Szeredi 253e28edc46SMiklos Szeredi static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d, 254e28edc46SMiklos Szeredi struct dentry **ret) 255e28edc46SMiklos Szeredi { 2564c7d0c9cSAmir Goldstein /* Counting down from the end, since the prefix can change */ 2574c7d0c9cSAmir Goldstein size_t rem = d->name.len - 1; 25802b69b28SMiklos Szeredi struct dentry *dentry = NULL; 25902b69b28SMiklos Szeredi int err; 26002b69b28SMiklos Szeredi 2614c7d0c9cSAmir Goldstein if (d->name.name[0] != '/') 26202b69b28SMiklos Szeredi return ovl_lookup_single(base, d, d->name.name, d->name.len, 26302b69b28SMiklos Szeredi 0, "", ret); 26402b69b28SMiklos Szeredi 2654c7d0c9cSAmir Goldstein while (!IS_ERR_OR_NULL(base) && d_can_lookup(base)) { 2664c7d0c9cSAmir Goldstein const char *s = d->name.name + d->name.len - rem; 26702b69b28SMiklos Szeredi const char *next = strchrnul(s, '/'); 2684c7d0c9cSAmir Goldstein size_t thislen = next - s; 2694c7d0c9cSAmir Goldstein bool end = !next[0]; 27002b69b28SMiklos Szeredi 2714c7d0c9cSAmir Goldstein /* Verify we did not go off the rails */ 2724c7d0c9cSAmir Goldstein if (WARN_ON(s[-1] != '/')) 27302b69b28SMiklos Szeredi return -EIO; 27402b69b28SMiklos Szeredi 2754c7d0c9cSAmir Goldstein err = ovl_lookup_single(base, d, s, thislen, 2764c7d0c9cSAmir Goldstein d->name.len - rem, next, &base); 27702b69b28SMiklos Szeredi dput(dentry); 27802b69b28SMiklos Szeredi if (err) 27902b69b28SMiklos Szeredi return err; 28002b69b28SMiklos Szeredi dentry = base; 2814c7d0c9cSAmir Goldstein if (end) 2824c7d0c9cSAmir Goldstein break; 2834c7d0c9cSAmir Goldstein 2844c7d0c9cSAmir Goldstein rem -= thislen + 1; 2854c7d0c9cSAmir Goldstein 2864c7d0c9cSAmir Goldstein if (WARN_ON(rem >= d->name.len)) 2874c7d0c9cSAmir Goldstein return -EIO; 28802b69b28SMiklos Szeredi } 28902b69b28SMiklos Szeredi *ret = dentry; 29002b69b28SMiklos Szeredi return 0; 291e28edc46SMiklos Szeredi } 292e28edc46SMiklos Szeredi 293a9d01957SAmir Goldstein 2941eff1a1dSAmir Goldstein static int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, 2951eff1a1dSAmir Goldstein struct dentry *upperdentry, 2962e1a5328SAmir Goldstein struct ovl_path **stackp) 297a9d01957SAmir Goldstein { 298f7d3dacaSAmir Goldstein struct dentry *origin = NULL; 299f7d3dacaSAmir Goldstein int i; 300a9d01957SAmir Goldstein 3011eff1a1dSAmir Goldstein for (i = 0; i < ofs->numlower; i++) { 3021eff1a1dSAmir Goldstein origin = ovl_decode_fh(fh, ofs->lower_layers[i].mnt); 303f7d3dacaSAmir Goldstein if (origin) 304f7d3dacaSAmir Goldstein break; 305f7d3dacaSAmir Goldstein } 306f7d3dacaSAmir Goldstein 307f7d3dacaSAmir Goldstein if (!origin) 3082e1a5328SAmir Goldstein return -ESTALE; 3092e1a5328SAmir Goldstein else if (IS_ERR(origin)) 3102e1a5328SAmir Goldstein return PTR_ERR(origin); 311f7d3dacaSAmir Goldstein 3122e1a5328SAmir Goldstein if (!ovl_is_whiteout(upperdentry) && 3132e1a5328SAmir Goldstein ((d_inode(origin)->i_mode ^ d_inode(upperdentry)->i_mode) & S_IFMT)) 3142e1a5328SAmir Goldstein goto invalid; 3152e1a5328SAmir Goldstein 316415543d5SAmir Goldstein if (!*stackp) 317b9343632SChandan Rajendra *stackp = kmalloc(sizeof(struct ovl_path), GFP_KERNEL); 318a9d01957SAmir Goldstein if (!*stackp) { 319a9d01957SAmir Goldstein dput(origin); 320a9d01957SAmir Goldstein return -ENOMEM; 321a9d01957SAmir Goldstein } 3221eff1a1dSAmir Goldstein **stackp = (struct ovl_path){ 3231eff1a1dSAmir Goldstein .dentry = origin, 3241eff1a1dSAmir Goldstein .layer = &ofs->lower_layers[i] 3251eff1a1dSAmir Goldstein }; 326a9d01957SAmir Goldstein 327a9d01957SAmir Goldstein return 0; 3282e1a5328SAmir Goldstein 3292e1a5328SAmir Goldstein invalid: 3302e1a5328SAmir Goldstein pr_warn_ratelimited("overlayfs: invalid origin (%pd2, ftype=%x, origin ftype=%x).\n", 3312e1a5328SAmir Goldstein upperdentry, d_inode(upperdentry)->i_mode & S_IFMT, 3322e1a5328SAmir Goldstein d_inode(origin)->i_mode & S_IFMT); 3332e1a5328SAmir Goldstein dput(origin); 3342e1a5328SAmir Goldstein return -EIO; 3352e1a5328SAmir Goldstein } 3362e1a5328SAmir Goldstein 3371eff1a1dSAmir Goldstein static int ovl_check_origin(struct ovl_fs *ofs, struct dentry *upperdentry, 3382e1a5328SAmir Goldstein struct ovl_path **stackp, unsigned int *ctrp) 3392e1a5328SAmir Goldstein { 340*05122443SAmir Goldstein struct ovl_fh *fh = ovl_get_fh(upperdentry, OVL_XATTR_ORIGIN); 3412e1a5328SAmir Goldstein int err; 3422e1a5328SAmir Goldstein 3432e1a5328SAmir Goldstein if (IS_ERR_OR_NULL(fh)) 3442e1a5328SAmir Goldstein return PTR_ERR(fh); 3452e1a5328SAmir Goldstein 3461eff1a1dSAmir Goldstein err = ovl_check_origin_fh(ofs, fh, upperdentry, stackp); 3472e1a5328SAmir Goldstein kfree(fh); 3482e1a5328SAmir Goldstein 3492e1a5328SAmir Goldstein if (err) { 3502e1a5328SAmir Goldstein if (err == -ESTALE) 3512e1a5328SAmir Goldstein return 0; 3522e1a5328SAmir Goldstein return err; 3532e1a5328SAmir Goldstein } 3542e1a5328SAmir Goldstein 3552e1a5328SAmir Goldstein if (WARN_ON(*ctrp)) 3562e1a5328SAmir Goldstein return -EIO; 3572e1a5328SAmir Goldstein 3582e1a5328SAmir Goldstein *ctrp = 1; 3592e1a5328SAmir Goldstein return 0; 360a9d01957SAmir Goldstein } 361a9d01957SAmir Goldstein 362bbb1e54dSMiklos Szeredi /* 363*05122443SAmir Goldstein * Verify that @fh matches the file handle stored in xattr @name. 3648b88a2e6SAmir Goldstein * Return 0 on match, -ESTALE on mismatch, < 0 on error. 3658b88a2e6SAmir Goldstein */ 366*05122443SAmir Goldstein static int ovl_verify_fh(struct dentry *dentry, const char *name, 367*05122443SAmir Goldstein const struct ovl_fh *fh) 3688b88a2e6SAmir Goldstein { 369*05122443SAmir Goldstein struct ovl_fh *ofh = ovl_get_fh(dentry, name); 3708b88a2e6SAmir Goldstein int err = 0; 3718b88a2e6SAmir Goldstein 3728b88a2e6SAmir Goldstein if (!ofh) 3738b88a2e6SAmir Goldstein return -ENODATA; 3748b88a2e6SAmir Goldstein 3758b88a2e6SAmir Goldstein if (IS_ERR(ofh)) 3768b88a2e6SAmir Goldstein return PTR_ERR(ofh); 3778b88a2e6SAmir Goldstein 3788b88a2e6SAmir Goldstein if (fh->len != ofh->len || memcmp(fh, ofh, fh->len)) 3798b88a2e6SAmir Goldstein err = -ESTALE; 3808b88a2e6SAmir Goldstein 3818b88a2e6SAmir Goldstein kfree(ofh); 3828b88a2e6SAmir Goldstein return err; 3838b88a2e6SAmir Goldstein } 3848b88a2e6SAmir Goldstein 3858b88a2e6SAmir Goldstein /* 386*05122443SAmir Goldstein * Verify that @real dentry matches the file handle stored in xattr @name. 3878b88a2e6SAmir Goldstein * 388*05122443SAmir Goldstein * If @set is true and there is no stored file handle, encode @real and store 389*05122443SAmir Goldstein * file handle in xattr @name. 3908b88a2e6SAmir Goldstein * 391*05122443SAmir Goldstein * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error. 3928b88a2e6SAmir Goldstein */ 393*05122443SAmir Goldstein int ovl_verify_set_fh(struct dentry *dentry, const char *name, 394*05122443SAmir Goldstein struct dentry *real, bool is_upper, bool set) 3958b88a2e6SAmir Goldstein { 3968b88a2e6SAmir Goldstein struct inode *inode; 3978b88a2e6SAmir Goldstein struct ovl_fh *fh; 3988b88a2e6SAmir Goldstein int err; 3998b88a2e6SAmir Goldstein 400*05122443SAmir Goldstein fh = ovl_encode_fh(real, is_upper); 4018b88a2e6SAmir Goldstein err = PTR_ERR(fh); 4028b88a2e6SAmir Goldstein if (IS_ERR(fh)) 4038b88a2e6SAmir Goldstein goto fail; 4048b88a2e6SAmir Goldstein 405*05122443SAmir Goldstein err = ovl_verify_fh(dentry, name, fh); 4068b88a2e6SAmir Goldstein if (set && err == -ENODATA) 407*05122443SAmir Goldstein err = ovl_do_setxattr(dentry, name, fh, fh->len, 0); 4088b88a2e6SAmir Goldstein if (err) 4098b88a2e6SAmir Goldstein goto fail; 4108b88a2e6SAmir Goldstein 4118b88a2e6SAmir Goldstein out: 4128b88a2e6SAmir Goldstein kfree(fh); 4138b88a2e6SAmir Goldstein return err; 4148b88a2e6SAmir Goldstein 4158b88a2e6SAmir Goldstein fail: 416*05122443SAmir Goldstein inode = d_inode(real); 417*05122443SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to verify %s (%pd2, ino=%lu, err=%i)\n", 418*05122443SAmir Goldstein is_upper ? "upper" : "origin", real, 419*05122443SAmir Goldstein inode ? inode->i_ino : 0, err); 4208b88a2e6SAmir Goldstein goto out; 4218b88a2e6SAmir Goldstein } 4228b88a2e6SAmir Goldstein 4238b88a2e6SAmir Goldstein /* 424415543d5SAmir Goldstein * Verify that an index entry name matches the origin file handle stored in 425415543d5SAmir Goldstein * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path. 426415543d5SAmir Goldstein * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error. 427415543d5SAmir Goldstein */ 4281eff1a1dSAmir Goldstein int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index) 429415543d5SAmir Goldstein { 430415543d5SAmir Goldstein struct ovl_fh *fh = NULL; 431415543d5SAmir Goldstein size_t len; 432b9343632SChandan Rajendra struct ovl_path origin = { }; 433b9343632SChandan Rajendra struct ovl_path *stack = &origin; 434415543d5SAmir Goldstein int err; 435415543d5SAmir Goldstein 436415543d5SAmir Goldstein if (!d_inode(index)) 437415543d5SAmir Goldstein return 0; 438415543d5SAmir Goldstein 43961b67471SAmir Goldstein /* 44061b67471SAmir Goldstein * Directory index entries are going to be used for looking up 44161b67471SAmir Goldstein * redirected upper dirs by lower dir fh when decoding an overlay 44261b67471SAmir Goldstein * file handle of a merge dir. Whiteout index entries are going to be 44361b67471SAmir Goldstein * used as an indication that an exported overlay file handle should 44461b67471SAmir Goldstein * be treated as stale (i.e. after unlink of the overlay inode). 44561b67471SAmir Goldstein * We don't know the verification rules for directory and whiteout 44661b67471SAmir Goldstein * index entries, because they have not been implemented yet, so return 447fa0096e3SAmir Goldstein * EINVAL if those entries are found to abort the mount to avoid 448fa0096e3SAmir Goldstein * corrupting an index that was created by a newer kernel. 44961b67471SAmir Goldstein */ 450fa0096e3SAmir Goldstein err = -EINVAL; 45161b67471SAmir Goldstein if (d_is_dir(index) || ovl_is_whiteout(index)) 452415543d5SAmir Goldstein goto fail; 453415543d5SAmir Goldstein 454415543d5SAmir Goldstein if (index->d_name.len < sizeof(struct ovl_fh)*2) 455415543d5SAmir Goldstein goto fail; 456415543d5SAmir Goldstein 457415543d5SAmir Goldstein err = -ENOMEM; 458415543d5SAmir Goldstein len = index->d_name.len / 2; 4590ee931c4SMichal Hocko fh = kzalloc(len, GFP_KERNEL); 460415543d5SAmir Goldstein if (!fh) 461415543d5SAmir Goldstein goto fail; 462415543d5SAmir Goldstein 463415543d5SAmir Goldstein err = -EINVAL; 4642e1a5328SAmir Goldstein if (hex2bin((u8 *)fh, index->d_name.name, len)) 4652e1a5328SAmir Goldstein goto fail; 4662e1a5328SAmir Goldstein 4672e1a5328SAmir Goldstein err = ovl_check_fh_len(fh, len); 4682e1a5328SAmir Goldstein if (err) 469415543d5SAmir Goldstein goto fail; 470415543d5SAmir Goldstein 471*05122443SAmir Goldstein err = ovl_verify_fh(index, OVL_XATTR_ORIGIN, fh); 472415543d5SAmir Goldstein if (err) 473415543d5SAmir Goldstein goto fail; 474415543d5SAmir Goldstein 4751eff1a1dSAmir Goldstein err = ovl_check_origin_fh(ofs, fh, index, &stack); 476415543d5SAmir Goldstein if (err) 477415543d5SAmir Goldstein goto fail; 478415543d5SAmir Goldstein 479caf70cb2SAmir Goldstein /* Check if index is orphan and don't warn before cleaning it */ 480caf70cb2SAmir Goldstein if (d_inode(index)->i_nlink == 1 && 48108d8f8a5SVivek Goyal ovl_get_nlink(origin.dentry, index, 0) == 0) 482caf70cb2SAmir Goldstein err = -ENOENT; 483caf70cb2SAmir Goldstein 484415543d5SAmir Goldstein dput(origin.dentry); 485415543d5SAmir Goldstein out: 486415543d5SAmir Goldstein kfree(fh); 487415543d5SAmir Goldstein return err; 488415543d5SAmir Goldstein 489415543d5SAmir Goldstein fail: 49061b67471SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to verify index (%pd2, ftype=%x, err=%i)\n", 49161b67471SAmir Goldstein index, d_inode(index)->i_mode & S_IFMT, err); 492415543d5SAmir Goldstein goto out; 493415543d5SAmir Goldstein } 494415543d5SAmir Goldstein 495415543d5SAmir Goldstein /* 496359f392cSAmir Goldstein * Lookup in indexdir for the index entry of a lower real inode or a copy up 497359f392cSAmir Goldstein * origin inode. The index entry name is the hex representation of the lower 498359f392cSAmir Goldstein * inode file handle. 499359f392cSAmir Goldstein * 500359f392cSAmir Goldstein * If the index dentry in negative, then either no lower aliases have been 501359f392cSAmir Goldstein * copied up yet, or aliases have been copied up in older kernels and are 502359f392cSAmir Goldstein * not indexed. 503359f392cSAmir Goldstein * 504359f392cSAmir Goldstein * If the index dentry for a copy up origin inode is positive, but points 505359f392cSAmir Goldstein * to an inode different than the upper inode, then either the upper inode 506359f392cSAmir Goldstein * has been copied up and not indexed or it was indexed, but since then 507359f392cSAmir Goldstein * index dir was cleared. Either way, that index cannot be used to indentify 508359f392cSAmir Goldstein * the overlay inode. 509359f392cSAmir Goldstein */ 510359f392cSAmir Goldstein int ovl_get_index_name(struct dentry *origin, struct qstr *name) 511359f392cSAmir Goldstein { 512359f392cSAmir Goldstein int err; 513359f392cSAmir Goldstein struct ovl_fh *fh; 514359f392cSAmir Goldstein char *n, *s; 515359f392cSAmir Goldstein 516359f392cSAmir Goldstein fh = ovl_encode_fh(origin, false); 517359f392cSAmir Goldstein if (IS_ERR(fh)) 518359f392cSAmir Goldstein return PTR_ERR(fh); 519359f392cSAmir Goldstein 520359f392cSAmir Goldstein err = -ENOMEM; 5210ee931c4SMichal Hocko n = kzalloc(fh->len * 2, GFP_KERNEL); 522359f392cSAmir Goldstein if (n) { 523359f392cSAmir Goldstein s = bin2hex(n, fh, fh->len); 524359f392cSAmir Goldstein *name = (struct qstr) QSTR_INIT(n, s - n); 525359f392cSAmir Goldstein err = 0; 526359f392cSAmir Goldstein } 527359f392cSAmir Goldstein kfree(fh); 528359f392cSAmir Goldstein 529359f392cSAmir Goldstein return err; 530359f392cSAmir Goldstein 531359f392cSAmir Goldstein } 532359f392cSAmir Goldstein 533359f392cSAmir Goldstein static struct dentry *ovl_lookup_index(struct dentry *dentry, 534359f392cSAmir Goldstein struct dentry *upper, 535359f392cSAmir Goldstein struct dentry *origin) 536359f392cSAmir Goldstein { 537359f392cSAmir Goldstein struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 538359f392cSAmir Goldstein struct dentry *index; 539359f392cSAmir Goldstein struct inode *inode; 540359f392cSAmir Goldstein struct qstr name; 541359f392cSAmir Goldstein int err; 542359f392cSAmir Goldstein 543359f392cSAmir Goldstein err = ovl_get_index_name(origin, &name); 544359f392cSAmir Goldstein if (err) 545359f392cSAmir Goldstein return ERR_PTR(err); 546359f392cSAmir Goldstein 547359f392cSAmir Goldstein index = lookup_one_len_unlocked(name.name, ofs->indexdir, name.len); 548359f392cSAmir Goldstein if (IS_ERR(index)) { 549e0082a0fSAmir Goldstein err = PTR_ERR(index); 5507937a56fSAmir Goldstein if (err == -ENOENT) { 5517937a56fSAmir Goldstein index = NULL; 5527937a56fSAmir Goldstein goto out; 5537937a56fSAmir Goldstein } 554359f392cSAmir Goldstein pr_warn_ratelimited("overlayfs: failed inode index lookup (ino=%lu, key=%*s, err=%i);\n" 555359f392cSAmir Goldstein "overlayfs: mount with '-o index=off' to disable inodes index.\n", 556359f392cSAmir Goldstein d_inode(origin)->i_ino, name.len, name.name, 557359f392cSAmir Goldstein err); 558359f392cSAmir Goldstein goto out; 559359f392cSAmir Goldstein } 560359f392cSAmir Goldstein 5610e082555SAmir Goldstein inode = d_inode(index); 562359f392cSAmir Goldstein if (d_is_negative(index)) { 5636eaf0111SAmir Goldstein goto out_dput; 5640e082555SAmir Goldstein } else if (upper && d_inode(upper) != inode) { 5656eaf0111SAmir Goldstein goto out_dput; 5660e082555SAmir Goldstein } else if (ovl_dentry_weird(index) || ovl_is_whiteout(index) || 5670e082555SAmir Goldstein ((inode->i_mode ^ d_inode(origin)->i_mode) & S_IFMT)) { 5680e082555SAmir Goldstein /* 5690e082555SAmir Goldstein * Index should always be of the same file type as origin 5700e082555SAmir Goldstein * except for the case of a whiteout index. A whiteout 5710e082555SAmir Goldstein * index should only exist if all lower aliases have been 5720e082555SAmir Goldstein * unlinked, which means that finding a lower origin on lookup 5730e082555SAmir Goldstein * whose index is a whiteout should be treated as an error. 5740e082555SAmir Goldstein */ 5750e082555SAmir Goldstein pr_warn_ratelimited("overlayfs: bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n", 5760e082555SAmir Goldstein index, d_inode(index)->i_mode & S_IFMT, 5770e082555SAmir Goldstein d_inode(origin)->i_mode & S_IFMT); 578359f392cSAmir Goldstein goto fail; 579359f392cSAmir Goldstein } 580359f392cSAmir Goldstein 581359f392cSAmir Goldstein out: 582359f392cSAmir Goldstein kfree(name.name); 583359f392cSAmir Goldstein return index; 584359f392cSAmir Goldstein 5856eaf0111SAmir Goldstein out_dput: 5866eaf0111SAmir Goldstein dput(index); 5876eaf0111SAmir Goldstein index = NULL; 5886eaf0111SAmir Goldstein goto out; 5896eaf0111SAmir Goldstein 590359f392cSAmir Goldstein fail: 591359f392cSAmir Goldstein dput(index); 592359f392cSAmir Goldstein index = ERR_PTR(-EIO); 593359f392cSAmir Goldstein goto out; 594359f392cSAmir Goldstein } 595359f392cSAmir Goldstein 596359f392cSAmir Goldstein /* 597bbb1e54dSMiklos Szeredi * Returns next layer in stack starting from top. 598bbb1e54dSMiklos Szeredi * Returns -1 if this is the last layer. 599bbb1e54dSMiklos Szeredi */ 600bbb1e54dSMiklos Szeredi int ovl_path_next(int idx, struct dentry *dentry, struct path *path) 601bbb1e54dSMiklos Szeredi { 602bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 603bbb1e54dSMiklos Szeredi 604bbb1e54dSMiklos Szeredi BUG_ON(idx < 0); 605bbb1e54dSMiklos Szeredi if (idx == 0) { 606bbb1e54dSMiklos Szeredi ovl_path_upper(dentry, path); 607bbb1e54dSMiklos Szeredi if (path->dentry) 608bbb1e54dSMiklos Szeredi return oe->numlower ? 1 : -1; 609bbb1e54dSMiklos Szeredi idx++; 610bbb1e54dSMiklos Szeredi } 611bbb1e54dSMiklos Szeredi BUG_ON(idx > oe->numlower); 612b9343632SChandan Rajendra path->dentry = oe->lowerstack[idx - 1].dentry; 613b9343632SChandan Rajendra path->mnt = oe->lowerstack[idx - 1].layer->mnt; 614bbb1e54dSMiklos Szeredi 615bbb1e54dSMiklos Szeredi return (idx < oe->numlower) ? idx + 1 : -1; 616bbb1e54dSMiklos Szeredi } 617bbb1e54dSMiklos Szeredi 6189678e630SAmir Goldstein /* Fix missing 'origin' xattr */ 6199678e630SAmir Goldstein static int ovl_fix_origin(struct dentry *dentry, struct dentry *lower, 6209678e630SAmir Goldstein struct dentry *upper) 6219678e630SAmir Goldstein { 6229678e630SAmir Goldstein int err; 6239678e630SAmir Goldstein 6249678e630SAmir Goldstein if (ovl_check_origin_xattr(upper)) 6259678e630SAmir Goldstein return 0; 6269678e630SAmir Goldstein 6279678e630SAmir Goldstein err = ovl_want_write(dentry); 6289678e630SAmir Goldstein if (err) 6299678e630SAmir Goldstein return err; 6309678e630SAmir Goldstein 6319678e630SAmir Goldstein err = ovl_set_origin(dentry, lower, upper); 6329678e630SAmir Goldstein if (!err) 6339678e630SAmir Goldstein err = ovl_set_impure(dentry->d_parent, upper->d_parent); 6349678e630SAmir Goldstein 6359678e630SAmir Goldstein ovl_drop_write(dentry); 6369678e630SAmir Goldstein return err; 6379678e630SAmir Goldstein } 6389678e630SAmir Goldstein 639bbb1e54dSMiklos Szeredi struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry, 640bbb1e54dSMiklos Szeredi unsigned int flags) 641bbb1e54dSMiklos Szeredi { 642bbb1e54dSMiklos Szeredi struct ovl_entry *oe; 643bbb1e54dSMiklos Szeredi const struct cred *old_cred; 6446b2d5fe4SMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 645bbb1e54dSMiklos Szeredi struct ovl_entry *poe = dentry->d_parent->d_fsdata; 646c22205d0SAmir Goldstein struct ovl_entry *roe = dentry->d_sb->s_root->d_fsdata; 647b9343632SChandan Rajendra struct ovl_path *stack = NULL; 648bbb1e54dSMiklos Szeredi struct dentry *upperdir, *upperdentry = NULL; 649359f392cSAmir Goldstein struct dentry *index = NULL; 650bbb1e54dSMiklos Szeredi unsigned int ctr = 0; 651bbb1e54dSMiklos Szeredi struct inode *inode = NULL; 652bbb1e54dSMiklos Szeredi bool upperopaque = false; 65302b69b28SMiklos Szeredi char *upperredirect = NULL; 654bbb1e54dSMiklos Szeredi struct dentry *this; 655bbb1e54dSMiklos Szeredi unsigned int i; 656bbb1e54dSMiklos Szeredi int err; 657e28edc46SMiklos Szeredi struct ovl_lookup_data d = { 658e28edc46SMiklos Szeredi .name = dentry->d_name, 659e28edc46SMiklos Szeredi .is_dir = false, 660e28edc46SMiklos Szeredi .opaque = false, 661e28edc46SMiklos Szeredi .stop = false, 662e28edc46SMiklos Szeredi .last = !poe->numlower, 66302b69b28SMiklos Szeredi .redirect = NULL, 664e28edc46SMiklos Szeredi }; 665bbb1e54dSMiklos Szeredi 6666b2d5fe4SMiklos Szeredi if (dentry->d_name.len > ofs->namelen) 6676b2d5fe4SMiklos Szeredi return ERR_PTR(-ENAMETOOLONG); 6686b2d5fe4SMiklos Szeredi 669bbb1e54dSMiklos Szeredi old_cred = ovl_override_creds(dentry->d_sb); 67009d8b586SMiklos Szeredi upperdir = ovl_dentry_upper(dentry->d_parent); 671bbb1e54dSMiklos Szeredi if (upperdir) { 672e28edc46SMiklos Szeredi err = ovl_lookup_layer(upperdir, &d, &upperdentry); 673e28edc46SMiklos Szeredi if (err) 674bbb1e54dSMiklos Szeredi goto out; 675bbb1e54dSMiklos Szeredi 676e28edc46SMiklos Szeredi if (upperdentry && unlikely(ovl_dentry_remote(upperdentry))) { 677e28edc46SMiklos Szeredi dput(upperdentry); 678bbb1e54dSMiklos Szeredi err = -EREMOTE; 679bbb1e54dSMiklos Szeredi goto out; 680bbb1e54dSMiklos Szeredi } 681a9d01957SAmir Goldstein if (upperdentry && !d.is_dir) { 682a9d01957SAmir Goldstein BUG_ON(!d.stop || d.redirect); 683f7d3dacaSAmir Goldstein /* 684f7d3dacaSAmir Goldstein * Lookup copy up origin by decoding origin file handle. 685f7d3dacaSAmir Goldstein * We may get a disconnected dentry, which is fine, 686f7d3dacaSAmir Goldstein * because we only need to hold the origin inode in 687f7d3dacaSAmir Goldstein * cache and use its inode number. We may even get a 688f7d3dacaSAmir Goldstein * connected dentry, that is not under any of the lower 689f7d3dacaSAmir Goldstein * layers root. That is also fine for using it's inode 690f7d3dacaSAmir Goldstein * number - it's the same as if we held a reference 691f7d3dacaSAmir Goldstein * to a dentry in lower layer that was moved under us. 692f7d3dacaSAmir Goldstein */ 6931eff1a1dSAmir Goldstein err = ovl_check_origin(ofs, upperdentry, &stack, &ctr); 694a9d01957SAmir Goldstein if (err) 6955455f92bSVivek Goyal goto out_put_upper; 696a9d01957SAmir Goldstein } 69702b69b28SMiklos Szeredi 69802b69b28SMiklos Szeredi if (d.redirect) { 6990ce5cdc9SDan Carpenter err = -ENOMEM; 70002b69b28SMiklos Szeredi upperredirect = kstrdup(d.redirect, GFP_KERNEL); 70102b69b28SMiklos Szeredi if (!upperredirect) 70202b69b28SMiklos Szeredi goto out_put_upper; 70302b69b28SMiklos Szeredi if (d.redirect[0] == '/') 704c22205d0SAmir Goldstein poe = roe; 70502b69b28SMiklos Szeredi } 706e28edc46SMiklos Szeredi upperopaque = d.opaque; 707bbb1e54dSMiklos Szeredi } 708bbb1e54dSMiklos Szeredi 709e28edc46SMiklos Szeredi if (!d.stop && poe->numlower) { 710bbb1e54dSMiklos Szeredi err = -ENOMEM; 711b9343632SChandan Rajendra stack = kcalloc(ofs->numlower, sizeof(struct ovl_path), 7120ee931c4SMichal Hocko GFP_KERNEL); 713bbb1e54dSMiklos Szeredi if (!stack) 714bbb1e54dSMiklos Szeredi goto out_put_upper; 715bbb1e54dSMiklos Szeredi } 716bbb1e54dSMiklos Szeredi 717e28edc46SMiklos Szeredi for (i = 0; !d.stop && i < poe->numlower; i++) { 718b9343632SChandan Rajendra struct ovl_path lower = poe->lowerstack[i]; 719bbb1e54dSMiklos Szeredi 720e28edc46SMiklos Szeredi d.last = i == poe->numlower - 1; 721b9343632SChandan Rajendra err = ovl_lookup_layer(lower.dentry, &d, &this); 722e28edc46SMiklos Szeredi if (err) 723bbb1e54dSMiklos Szeredi goto out_put; 7246b2d5fe4SMiklos Szeredi 725bbb1e54dSMiklos Szeredi if (!this) 726bbb1e54dSMiklos Szeredi continue; 727bbb1e54dSMiklos Szeredi 7289678e630SAmir Goldstein /* 7299678e630SAmir Goldstein * If no origin fh is stored in upper of a merge dir, store fh 7309678e630SAmir Goldstein * of lower dir and set upper parent "impure". 7319678e630SAmir Goldstein */ 7329678e630SAmir Goldstein if (upperdentry && !ctr && !ofs->noxattr) { 7339678e630SAmir Goldstein err = ovl_fix_origin(dentry, this, upperdentry); 7349678e630SAmir Goldstein if (err) { 7359678e630SAmir Goldstein dput(this); 7369678e630SAmir Goldstein goto out_put; 7379678e630SAmir Goldstein } 7389678e630SAmir Goldstein } 7399678e630SAmir Goldstein 740bbb1e54dSMiklos Szeredi stack[ctr].dentry = this; 741b9343632SChandan Rajendra stack[ctr].layer = lower.layer; 742bbb1e54dSMiklos Szeredi ctr++; 74302b69b28SMiklos Szeredi 74402b69b28SMiklos Szeredi if (d.stop) 74502b69b28SMiklos Szeredi break; 74602b69b28SMiklos Szeredi 747438c84c2SMiklos Szeredi /* 748438c84c2SMiklos Szeredi * Following redirects can have security consequences: it's like 749438c84c2SMiklos Szeredi * a symlink into the lower layer without the permission checks. 750438c84c2SMiklos Szeredi * This is only a problem if the upper layer is untrusted (e.g 751438c84c2SMiklos Szeredi * comes from an USB drive). This can allow a non-readable file 752438c84c2SMiklos Szeredi * or directory to become readable. 753438c84c2SMiklos Szeredi * 754438c84c2SMiklos Szeredi * Only following redirects when redirects are enabled disables 755438c84c2SMiklos Szeredi * this attack vector when not necessary. 756438c84c2SMiklos Szeredi */ 757438c84c2SMiklos Szeredi err = -EPERM; 758438c84c2SMiklos Szeredi if (d.redirect && !ofs->config.redirect_follow) { 759f8167817SAmir Goldstein pr_warn_ratelimited("overlayfs: refusing to follow redirect for (%pd2)\n", 760f8167817SAmir Goldstein dentry); 761438c84c2SMiklos Szeredi goto out_put; 762438c84c2SMiklos Szeredi } 763438c84c2SMiklos Szeredi 764c22205d0SAmir Goldstein if (d.redirect && d.redirect[0] == '/' && poe != roe) { 765c22205d0SAmir Goldstein poe = roe; 76602b69b28SMiklos Szeredi /* Find the current layer on the root dentry */ 767d583ed7dSAmir Goldstein i = lower.layer->idx - 1; 76802b69b28SMiklos Szeredi } 769bbb1e54dSMiklos Szeredi } 770bbb1e54dSMiklos Szeredi 771359f392cSAmir Goldstein /* Lookup index by lower inode and verify it matches upper inode */ 772359f392cSAmir Goldstein if (ctr && !d.is_dir && ovl_indexdir(dentry->d_sb)) { 773359f392cSAmir Goldstein struct dentry *origin = stack[0].dentry; 774359f392cSAmir Goldstein 775359f392cSAmir Goldstein index = ovl_lookup_index(dentry, upperdentry, origin); 776359f392cSAmir Goldstein if (IS_ERR(index)) { 777359f392cSAmir Goldstein err = PTR_ERR(index); 778359f392cSAmir Goldstein index = NULL; 779359f392cSAmir Goldstein goto out_put; 780359f392cSAmir Goldstein } 781359f392cSAmir Goldstein } 782359f392cSAmir Goldstein 783bbb1e54dSMiklos Szeredi oe = ovl_alloc_entry(ctr); 784bbb1e54dSMiklos Szeredi err = -ENOMEM; 785bbb1e54dSMiklos Szeredi if (!oe) 786bbb1e54dSMiklos Szeredi goto out_put; 787bbb1e54dSMiklos Szeredi 788bbb1e54dSMiklos Szeredi oe->opaque = upperopaque; 789b9343632SChandan Rajendra memcpy(oe->lowerstack, stack, sizeof(struct ovl_path) * ctr); 790e6d2ebddSMiklos Szeredi dentry->d_fsdata = oe; 791e6d2ebddSMiklos Szeredi 79255acc661SMiklos Szeredi if (upperdentry) 79355acc661SMiklos Szeredi ovl_dentry_set_upper_alias(dentry); 79455acc661SMiklos Szeredi else if (index) 795359f392cSAmir Goldstein upperdentry = dget(index); 796359f392cSAmir Goldstein 797e6d2ebddSMiklos Szeredi if (upperdentry || ctr) { 7986eaf0111SAmir Goldstein inode = ovl_get_inode(dentry, upperdentry, index); 799b9ac5c27SMiklos Szeredi err = PTR_ERR(inode); 800b9ac5c27SMiklos Szeredi if (IS_ERR(inode)) 801e6d2ebddSMiklos Szeredi goto out_free_oe; 802cf31c463SMiklos Szeredi 803cf31c463SMiklos Szeredi OVL_I(inode)->redirect = upperredirect; 804359f392cSAmir Goldstein if (index) 805359f392cSAmir Goldstein ovl_set_flag(OVL_INDEX, inode); 806e6d2ebddSMiklos Szeredi } 807e6d2ebddSMiklos Szeredi 808e6d2ebddSMiklos Szeredi revert_creds(old_cred); 809359f392cSAmir Goldstein dput(index); 810bbb1e54dSMiklos Szeredi kfree(stack); 81102b69b28SMiklos Szeredi kfree(d.redirect); 812bbb1e54dSMiklos Szeredi d_add(dentry, inode); 813bbb1e54dSMiklos Szeredi 814bbb1e54dSMiklos Szeredi return NULL; 815bbb1e54dSMiklos Szeredi 816bbb1e54dSMiklos Szeredi out_free_oe: 817e6d2ebddSMiklos Szeredi dentry->d_fsdata = NULL; 818bbb1e54dSMiklos Szeredi kfree(oe); 819bbb1e54dSMiklos Szeredi out_put: 820359f392cSAmir Goldstein dput(index); 821bbb1e54dSMiklos Szeredi for (i = 0; i < ctr; i++) 822bbb1e54dSMiklos Szeredi dput(stack[i].dentry); 823bbb1e54dSMiklos Szeredi kfree(stack); 824bbb1e54dSMiklos Szeredi out_put_upper: 825bbb1e54dSMiklos Szeredi dput(upperdentry); 82602b69b28SMiklos Szeredi kfree(upperredirect); 827bbb1e54dSMiklos Szeredi out: 82802b69b28SMiklos Szeredi kfree(d.redirect); 829bbb1e54dSMiklos Szeredi revert_creds(old_cred); 830bbb1e54dSMiklos Szeredi return ERR_PTR(err); 831bbb1e54dSMiklos Szeredi } 832bbb1e54dSMiklos Szeredi 833bbb1e54dSMiklos Szeredi bool ovl_lower_positive(struct dentry *dentry) 834bbb1e54dSMiklos Szeredi { 835bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 836bbb1e54dSMiklos Szeredi struct ovl_entry *poe = dentry->d_parent->d_fsdata; 837bbb1e54dSMiklos Szeredi const struct qstr *name = &dentry->d_name; 8386d0a8a90SAmir Goldstein const struct cred *old_cred; 839bbb1e54dSMiklos Szeredi unsigned int i; 840bbb1e54dSMiklos Szeredi bool positive = false; 841bbb1e54dSMiklos Szeredi bool done = false; 842bbb1e54dSMiklos Szeredi 843bbb1e54dSMiklos Szeredi /* 844bbb1e54dSMiklos Szeredi * If dentry is negative, then lower is positive iff this is a 845bbb1e54dSMiklos Szeredi * whiteout. 846bbb1e54dSMiklos Szeredi */ 847bbb1e54dSMiklos Szeredi if (!dentry->d_inode) 848bbb1e54dSMiklos Szeredi return oe->opaque; 849bbb1e54dSMiklos Szeredi 850bbb1e54dSMiklos Szeredi /* Negative upper -> positive lower */ 85109d8b586SMiklos Szeredi if (!ovl_dentry_upper(dentry)) 852bbb1e54dSMiklos Szeredi return true; 853bbb1e54dSMiklos Szeredi 8546d0a8a90SAmir Goldstein old_cred = ovl_override_creds(dentry->d_sb); 855bbb1e54dSMiklos Szeredi /* Positive upper -> have to look up lower to see whether it exists */ 856bbb1e54dSMiklos Szeredi for (i = 0; !done && !positive && i < poe->numlower; i++) { 857bbb1e54dSMiklos Szeredi struct dentry *this; 858bbb1e54dSMiklos Szeredi struct dentry *lowerdir = poe->lowerstack[i].dentry; 859bbb1e54dSMiklos Szeredi 860bbb1e54dSMiklos Szeredi this = lookup_one_len_unlocked(name->name, lowerdir, 861bbb1e54dSMiklos Szeredi name->len); 862bbb1e54dSMiklos Szeredi if (IS_ERR(this)) { 863bbb1e54dSMiklos Szeredi switch (PTR_ERR(this)) { 864bbb1e54dSMiklos Szeredi case -ENOENT: 865bbb1e54dSMiklos Szeredi case -ENAMETOOLONG: 866bbb1e54dSMiklos Szeredi break; 867bbb1e54dSMiklos Szeredi 868bbb1e54dSMiklos Szeredi default: 869bbb1e54dSMiklos Szeredi /* 870bbb1e54dSMiklos Szeredi * Assume something is there, we just couldn't 871bbb1e54dSMiklos Szeredi * access it. 872bbb1e54dSMiklos Szeredi */ 873bbb1e54dSMiklos Szeredi positive = true; 874bbb1e54dSMiklos Szeredi break; 875bbb1e54dSMiklos Szeredi } 876bbb1e54dSMiklos Szeredi } else { 877bbb1e54dSMiklos Szeredi if (this->d_inode) { 878bbb1e54dSMiklos Szeredi positive = !ovl_is_whiteout(this); 879bbb1e54dSMiklos Szeredi done = true; 880bbb1e54dSMiklos Szeredi } 881bbb1e54dSMiklos Szeredi dput(this); 882bbb1e54dSMiklos Szeredi } 883bbb1e54dSMiklos Szeredi } 8846d0a8a90SAmir Goldstein revert_creds(old_cred); 885bbb1e54dSMiklos Szeredi 886bbb1e54dSMiklos Szeredi return positive; 887bbb1e54dSMiklos Szeredi } 888