1bbb1e54dSMiklos Szeredi /* 2bbb1e54dSMiklos Szeredi * Copyright (C) 2011 Novell Inc. 3bbb1e54dSMiklos Szeredi * Copyright (C) 2016 Red Hat, Inc. 4bbb1e54dSMiklos Szeredi * 5bbb1e54dSMiklos Szeredi * This program is free software; you can redistribute it and/or modify it 6bbb1e54dSMiklos Szeredi * under the terms of the GNU General Public License version 2 as published by 7bbb1e54dSMiklos Szeredi * the Free Software Foundation. 8bbb1e54dSMiklos Szeredi */ 9bbb1e54dSMiklos Szeredi 10bbb1e54dSMiklos Szeredi #include <linux/fs.h> 115b825c3aSIngo Molnar #include <linux/cred.h> 129ee60ce2SAmir Goldstein #include <linux/ctype.h> 13bbb1e54dSMiklos Szeredi #include <linux/namei.h> 14bbb1e54dSMiklos Szeredi #include <linux/xattr.h> 1502b69b28SMiklos Szeredi #include <linux/ratelimit.h> 16a9d01957SAmir Goldstein #include <linux/mount.h> 17a9d01957SAmir Goldstein #include <linux/exportfs.h> 18bbb1e54dSMiklos Szeredi #include "overlayfs.h" 19bbb1e54dSMiklos Szeredi 20e28edc46SMiklos Szeredi struct ovl_lookup_data { 21e28edc46SMiklos Szeredi struct qstr name; 22e28edc46SMiklos Szeredi bool is_dir; 23e28edc46SMiklos Szeredi bool opaque; 24e28edc46SMiklos Szeredi bool stop; 25e28edc46SMiklos Szeredi bool last; 2602b69b28SMiklos Szeredi char *redirect; 27*9d3dfea3SVivek Goyal bool metacopy; 28e28edc46SMiklos Szeredi }; 29bbb1e54dSMiklos Szeredi 3002b69b28SMiklos Szeredi static int ovl_check_redirect(struct dentry *dentry, struct ovl_lookup_data *d, 3102b69b28SMiklos Szeredi size_t prelen, const char *post) 3202b69b28SMiklos Szeredi { 3302b69b28SMiklos Szeredi int res; 3402b69b28SMiklos Szeredi char *s, *next, *buf = NULL; 3502b69b28SMiklos Szeredi 3602b69b28SMiklos Szeredi res = vfs_getxattr(dentry, OVL_XATTR_REDIRECT, NULL, 0); 3702b69b28SMiklos Szeredi if (res < 0) { 3802b69b28SMiklos Szeredi if (res == -ENODATA || res == -EOPNOTSUPP) 3902b69b28SMiklos Szeredi return 0; 4002b69b28SMiklos Szeredi goto fail; 4102b69b28SMiklos Szeredi } 420ee931c4SMichal Hocko buf = kzalloc(prelen + res + strlen(post) + 1, GFP_KERNEL); 4302b69b28SMiklos Szeredi if (!buf) 4402b69b28SMiklos Szeredi return -ENOMEM; 4502b69b28SMiklos Szeredi 4602b69b28SMiklos Szeredi if (res == 0) 4702b69b28SMiklos Szeredi goto invalid; 4802b69b28SMiklos Szeredi 4902b69b28SMiklos Szeredi res = vfs_getxattr(dentry, OVL_XATTR_REDIRECT, buf, res); 5002b69b28SMiklos Szeredi if (res < 0) 5102b69b28SMiklos Szeredi goto fail; 5202b69b28SMiklos Szeredi if (res == 0) 5302b69b28SMiklos Szeredi goto invalid; 5402b69b28SMiklos Szeredi if (buf[0] == '/') { 5502b69b28SMiklos Szeredi for (s = buf; *s++ == '/'; s = next) { 5602b69b28SMiklos Szeredi next = strchrnul(s, '/'); 5702b69b28SMiklos Szeredi if (s == next) 5802b69b28SMiklos Szeredi goto invalid; 5902b69b28SMiklos Szeredi } 603ec9b3faSAmir Goldstein /* 613ec9b3faSAmir Goldstein * One of the ancestor path elements in an absolute path 623ec9b3faSAmir Goldstein * lookup in ovl_lookup_layer() could have been opaque and 633ec9b3faSAmir Goldstein * that will stop further lookup in lower layers (d->stop=true) 643ec9b3faSAmir Goldstein * But we have found an absolute redirect in decendant path 653ec9b3faSAmir Goldstein * element and that should force continue lookup in lower 663ec9b3faSAmir Goldstein * layers (reset d->stop). 673ec9b3faSAmir Goldstein */ 683ec9b3faSAmir Goldstein d->stop = false; 6902b69b28SMiklos Szeredi } else { 7002b69b28SMiklos Szeredi if (strchr(buf, '/') != NULL) 7102b69b28SMiklos Szeredi goto invalid; 7202b69b28SMiklos Szeredi 7302b69b28SMiklos Szeredi memmove(buf + prelen, buf, res); 7402b69b28SMiklos Szeredi memcpy(buf, d->name.name, prelen); 7502b69b28SMiklos Szeredi } 7602b69b28SMiklos Szeredi 7702b69b28SMiklos Szeredi strcat(buf, post); 7802b69b28SMiklos Szeredi kfree(d->redirect); 7902b69b28SMiklos Szeredi d->redirect = buf; 8002b69b28SMiklos Szeredi d->name.name = d->redirect; 8102b69b28SMiklos Szeredi d->name.len = strlen(d->redirect); 8202b69b28SMiklos Szeredi 8302b69b28SMiklos Szeredi return 0; 8402b69b28SMiklos Szeredi 8502b69b28SMiklos Szeredi err_free: 8602b69b28SMiklos Szeredi kfree(buf); 8702b69b28SMiklos Szeredi return 0; 8802b69b28SMiklos Szeredi fail: 8902b69b28SMiklos Szeredi pr_warn_ratelimited("overlayfs: failed to get redirect (%i)\n", res); 9002b69b28SMiklos Szeredi goto err_free; 9102b69b28SMiklos Szeredi invalid: 9202b69b28SMiklos Szeredi pr_warn_ratelimited("overlayfs: invalid redirect (%s)\n", buf); 9302b69b28SMiklos Szeredi goto err_free; 9402b69b28SMiklos Szeredi } 9502b69b28SMiklos Szeredi 96a9d01957SAmir Goldstein static int ovl_acceptable(void *ctx, struct dentry *dentry) 97a9d01957SAmir Goldstein { 98e8f9e5b7SAmir Goldstein /* 99e8f9e5b7SAmir Goldstein * A non-dir origin may be disconnected, which is fine, because 100e8f9e5b7SAmir Goldstein * we only need it for its unique inode number. 101e8f9e5b7SAmir Goldstein */ 102e8f9e5b7SAmir Goldstein if (!d_is_dir(dentry)) 103a9d01957SAmir Goldstein return 1; 104e8f9e5b7SAmir Goldstein 105e8f9e5b7SAmir Goldstein /* Don't decode a deleted empty directory */ 106e8f9e5b7SAmir Goldstein if (d_unhashed(dentry)) 107e8f9e5b7SAmir Goldstein return 0; 108e8f9e5b7SAmir Goldstein 109e8f9e5b7SAmir Goldstein /* Check if directory belongs to the layer we are decoding from */ 110e8f9e5b7SAmir Goldstein return is_subdir(dentry, ((struct vfsmount *)ctx)->mnt_root); 111a9d01957SAmir Goldstein } 112a9d01957SAmir Goldstein 1132e1a5328SAmir Goldstein /* 1142e1a5328SAmir Goldstein * Check validity of an overlay file handle buffer. 1152e1a5328SAmir Goldstein * 1162e1a5328SAmir Goldstein * Return 0 for a valid file handle. 1172e1a5328SAmir Goldstein * Return -ENODATA for "origin unknown". 1182e1a5328SAmir Goldstein * Return <0 for an invalid file handle. 1192e1a5328SAmir Goldstein */ 1208556a420SAmir Goldstein int ovl_check_fh_len(struct ovl_fh *fh, int fh_len) 1212e1a5328SAmir Goldstein { 1222e1a5328SAmir Goldstein if (fh_len < sizeof(struct ovl_fh) || fh_len < fh->len) 1232e1a5328SAmir Goldstein return -EINVAL; 1242e1a5328SAmir Goldstein 1252e1a5328SAmir Goldstein if (fh->magic != OVL_FH_MAGIC) 1262e1a5328SAmir Goldstein return -EINVAL; 1272e1a5328SAmir Goldstein 1282e1a5328SAmir Goldstein /* Treat larger version and unknown flags as "origin unknown" */ 1292e1a5328SAmir Goldstein if (fh->version > OVL_FH_VERSION || fh->flags & ~OVL_FH_FLAG_ALL) 1302e1a5328SAmir Goldstein return -ENODATA; 1312e1a5328SAmir Goldstein 1322e1a5328SAmir Goldstein /* Treat endianness mismatch as "origin unknown" */ 1332e1a5328SAmir Goldstein if (!(fh->flags & OVL_FH_FLAG_ANY_ENDIAN) && 1342e1a5328SAmir Goldstein (fh->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN) 1352e1a5328SAmir Goldstein return -ENODATA; 1362e1a5328SAmir Goldstein 1372e1a5328SAmir Goldstein return 0; 1382e1a5328SAmir Goldstein } 1392e1a5328SAmir Goldstein 14005122443SAmir Goldstein static struct ovl_fh *ovl_get_fh(struct dentry *dentry, const char *name) 141a9d01957SAmir Goldstein { 1422e1a5328SAmir Goldstein int res, err; 143a9d01957SAmir Goldstein struct ovl_fh *fh = NULL; 144a9d01957SAmir Goldstein 14505122443SAmir Goldstein res = vfs_getxattr(dentry, name, NULL, 0); 146a9d01957SAmir Goldstein if (res < 0) { 147a9d01957SAmir Goldstein if (res == -ENODATA || res == -EOPNOTSUPP) 148a9d01957SAmir Goldstein return NULL; 149a9d01957SAmir Goldstein goto fail; 150a9d01957SAmir Goldstein } 151a9d01957SAmir Goldstein /* Zero size value means "copied up but origin unknown" */ 152a9d01957SAmir Goldstein if (res == 0) 153a9d01957SAmir Goldstein return NULL; 154a9d01957SAmir Goldstein 1550ee931c4SMichal Hocko fh = kzalloc(res, GFP_KERNEL); 156a9d01957SAmir Goldstein if (!fh) 157a9d01957SAmir Goldstein return ERR_PTR(-ENOMEM); 158a9d01957SAmir Goldstein 15905122443SAmir Goldstein res = vfs_getxattr(dentry, name, fh, res); 160a9d01957SAmir Goldstein if (res < 0) 161a9d01957SAmir Goldstein goto fail; 162a9d01957SAmir Goldstein 1632e1a5328SAmir Goldstein err = ovl_check_fh_len(fh, res); 1642e1a5328SAmir Goldstein if (err < 0) { 1652e1a5328SAmir Goldstein if (err == -ENODATA) 166a9d01957SAmir Goldstein goto out; 1672e1a5328SAmir Goldstein goto invalid; 1682e1a5328SAmir Goldstein } 169a9d01957SAmir Goldstein 1708b88a2e6SAmir Goldstein return fh; 1718b88a2e6SAmir Goldstein 1728b88a2e6SAmir Goldstein out: 1738b88a2e6SAmir Goldstein kfree(fh); 1748b88a2e6SAmir Goldstein return NULL; 1758b88a2e6SAmir Goldstein 1768b88a2e6SAmir Goldstein fail: 1778b88a2e6SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to get origin (%i)\n", res); 1788b88a2e6SAmir Goldstein goto out; 1798b88a2e6SAmir Goldstein invalid: 1808b88a2e6SAmir Goldstein pr_warn_ratelimited("overlayfs: invalid origin (%*phN)\n", res, fh); 1818b88a2e6SAmir Goldstein goto out; 1828b88a2e6SAmir Goldstein } 1838b88a2e6SAmir Goldstein 1848a22efa1SAmir Goldstein struct dentry *ovl_decode_real_fh(struct ovl_fh *fh, struct vfsmount *mnt, 1858a22efa1SAmir Goldstein bool connected) 1868b88a2e6SAmir Goldstein { 187e8f9e5b7SAmir Goldstein struct dentry *real; 1888b88a2e6SAmir Goldstein int bytes; 1898b88a2e6SAmir Goldstein 190a9d01957SAmir Goldstein /* 191a9d01957SAmir Goldstein * Make sure that the stored uuid matches the uuid of the lower 192a9d01957SAmir Goldstein * layer where file handle will be decoded. 193a9d01957SAmir Goldstein */ 19485787090SChristoph Hellwig if (!uuid_equal(&fh->uuid, &mnt->mnt_sb->s_uuid)) 1952e1a5328SAmir Goldstein return NULL; 196a9d01957SAmir Goldstein 1978b88a2e6SAmir Goldstein bytes = (fh->len - offsetof(struct ovl_fh, fid)); 198e8f9e5b7SAmir Goldstein real = exportfs_decode_fh(mnt, (struct fid *)fh->fid, 199a9d01957SAmir Goldstein bytes >> 2, (int)fh->type, 2008a22efa1SAmir Goldstein connected ? ovl_acceptable : NULL, mnt); 201e8f9e5b7SAmir Goldstein if (IS_ERR(real)) { 202e8f9e5b7SAmir Goldstein /* 203e8f9e5b7SAmir Goldstein * Treat stale file handle to lower file as "origin unknown". 204e8f9e5b7SAmir Goldstein * upper file handle could become stale when upper file is 205e8f9e5b7SAmir Goldstein * unlinked and this information is needed to handle stale 206e8f9e5b7SAmir Goldstein * index entries correctly. 207e8f9e5b7SAmir Goldstein */ 208e8f9e5b7SAmir Goldstein if (real == ERR_PTR(-ESTALE) && 209e8f9e5b7SAmir Goldstein !(fh->flags & OVL_FH_FLAG_PATH_UPPER)) 210e8f9e5b7SAmir Goldstein real = NULL; 211e8f9e5b7SAmir Goldstein return real; 212a9d01957SAmir Goldstein } 213a9d01957SAmir Goldstein 214e8f9e5b7SAmir Goldstein if (ovl_dentry_weird(real)) { 215e8f9e5b7SAmir Goldstein dput(real); 2162e1a5328SAmir Goldstein return NULL; 2172e1a5328SAmir Goldstein } 2182e1a5328SAmir Goldstein 219e8f9e5b7SAmir Goldstein return real; 220a9d01957SAmir Goldstein } 221a9d01957SAmir Goldstein 222ee1d6d37SAmir Goldstein static bool ovl_is_opaquedir(struct dentry *dentry) 223ee1d6d37SAmir Goldstein { 224ee1d6d37SAmir Goldstein return ovl_check_dir_xattr(dentry, OVL_XATTR_OPAQUE); 225ee1d6d37SAmir Goldstein } 226ee1d6d37SAmir Goldstein 227e28edc46SMiklos Szeredi static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d, 228e28edc46SMiklos Szeredi const char *name, unsigned int namelen, 22902b69b28SMiklos Szeredi size_t prelen, const char *post, 230e28edc46SMiklos Szeredi struct dentry **ret) 231e28edc46SMiklos Szeredi { 232e28edc46SMiklos Szeredi struct dentry *this; 233e28edc46SMiklos Szeredi int err; 234102b0d11SVivek Goyal bool last_element = !post[0]; 235e28edc46SMiklos Szeredi 236e28edc46SMiklos Szeredi this = lookup_one_len_unlocked(name, base, namelen); 237e28edc46SMiklos Szeredi if (IS_ERR(this)) { 238e28edc46SMiklos Szeredi err = PTR_ERR(this); 239e28edc46SMiklos Szeredi this = NULL; 240e28edc46SMiklos Szeredi if (err == -ENOENT || err == -ENAMETOOLONG) 241e28edc46SMiklos Szeredi goto out; 242e28edc46SMiklos Szeredi goto out_err; 243e28edc46SMiklos Szeredi } 244e28edc46SMiklos Szeredi if (!this->d_inode) 245e28edc46SMiklos Szeredi goto put_and_out; 246e28edc46SMiklos Szeredi 247e28edc46SMiklos Szeredi if (ovl_dentry_weird(this)) { 248e28edc46SMiklos Szeredi /* Don't support traversing automounts and other weirdness */ 249e28edc46SMiklos Szeredi err = -EREMOTE; 250e28edc46SMiklos Szeredi goto out_err; 251e28edc46SMiklos Szeredi } 252e28edc46SMiklos Szeredi if (ovl_is_whiteout(this)) { 253e28edc46SMiklos Szeredi d->stop = d->opaque = true; 254e28edc46SMiklos Szeredi goto put_and_out; 255e28edc46SMiklos Szeredi } 2563a291774SMiklos Szeredi /* 257*9d3dfea3SVivek Goyal * This dentry should be a regular file if previous layer lookup 258*9d3dfea3SVivek Goyal * found a metacopy dentry. 2593a291774SMiklos Szeredi */ 260*9d3dfea3SVivek Goyal if (last_element && d->metacopy && !d_is_reg(this)) { 261*9d3dfea3SVivek Goyal d->stop = true; 262*9d3dfea3SVivek Goyal goto put_and_out; 263*9d3dfea3SVivek Goyal } 264*9d3dfea3SVivek Goyal if (!d_can_lookup(this)) { 265*9d3dfea3SVivek Goyal if (d->is_dir || !last_element) { 266*9d3dfea3SVivek Goyal d->stop = true; 267*9d3dfea3SVivek Goyal goto put_and_out; 268*9d3dfea3SVivek Goyal } 269*9d3dfea3SVivek Goyal err = ovl_check_metacopy_xattr(this); 270*9d3dfea3SVivek Goyal if (err < 0) 271*9d3dfea3SVivek Goyal goto out_err; 272*9d3dfea3SVivek Goyal 273*9d3dfea3SVivek Goyal d->metacopy = err; 274*9d3dfea3SVivek Goyal d->stop = !d->metacopy; 275e28edc46SMiklos Szeredi goto out; 276e28edc46SMiklos Szeredi } 277102b0d11SVivek Goyal if (last_element) 278e28edc46SMiklos Szeredi d->is_dir = true; 279e9b77f90SVivek Goyal if (d->last) 280e9b77f90SVivek Goyal goto out; 281e9b77f90SVivek Goyal 282e9b77f90SVivek Goyal if (ovl_is_opaquedir(this)) { 283102b0d11SVivek Goyal d->stop = true; 284102b0d11SVivek Goyal if (last_element) 285102b0d11SVivek Goyal d->opaque = true; 286e28edc46SMiklos Szeredi goto out; 287e28edc46SMiklos Szeredi } 28802b69b28SMiklos Szeredi err = ovl_check_redirect(this, d, prelen, post); 28902b69b28SMiklos Szeredi if (err) 29002b69b28SMiklos Szeredi goto out_err; 291e28edc46SMiklos Szeredi out: 292e28edc46SMiklos Szeredi *ret = this; 293e28edc46SMiklos Szeredi return 0; 294e28edc46SMiklos Szeredi 295e28edc46SMiklos Szeredi put_and_out: 296e28edc46SMiklos Szeredi dput(this); 297e28edc46SMiklos Szeredi this = NULL; 298e28edc46SMiklos Szeredi goto out; 299e28edc46SMiklos Szeredi 300e28edc46SMiklos Szeredi out_err: 301e28edc46SMiklos Szeredi dput(this); 302e28edc46SMiklos Szeredi return err; 303e28edc46SMiklos Szeredi } 304e28edc46SMiklos Szeredi 305e28edc46SMiklos Szeredi static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d, 306e28edc46SMiklos Szeredi struct dentry **ret) 307e28edc46SMiklos Szeredi { 3084c7d0c9cSAmir Goldstein /* Counting down from the end, since the prefix can change */ 3094c7d0c9cSAmir Goldstein size_t rem = d->name.len - 1; 31002b69b28SMiklos Szeredi struct dentry *dentry = NULL; 31102b69b28SMiklos Szeredi int err; 31202b69b28SMiklos Szeredi 3134c7d0c9cSAmir Goldstein if (d->name.name[0] != '/') 31402b69b28SMiklos Szeredi return ovl_lookup_single(base, d, d->name.name, d->name.len, 31502b69b28SMiklos Szeredi 0, "", ret); 31602b69b28SMiklos Szeredi 3174c7d0c9cSAmir Goldstein while (!IS_ERR_OR_NULL(base) && d_can_lookup(base)) { 3184c7d0c9cSAmir Goldstein const char *s = d->name.name + d->name.len - rem; 31902b69b28SMiklos Szeredi const char *next = strchrnul(s, '/'); 3204c7d0c9cSAmir Goldstein size_t thislen = next - s; 3214c7d0c9cSAmir Goldstein bool end = !next[0]; 32202b69b28SMiklos Szeredi 3234c7d0c9cSAmir Goldstein /* Verify we did not go off the rails */ 3244c7d0c9cSAmir Goldstein if (WARN_ON(s[-1] != '/')) 32502b69b28SMiklos Szeredi return -EIO; 32602b69b28SMiklos Szeredi 3274c7d0c9cSAmir Goldstein err = ovl_lookup_single(base, d, s, thislen, 3284c7d0c9cSAmir Goldstein d->name.len - rem, next, &base); 32902b69b28SMiklos Szeredi dput(dentry); 33002b69b28SMiklos Szeredi if (err) 33102b69b28SMiklos Szeredi return err; 33202b69b28SMiklos Szeredi dentry = base; 3334c7d0c9cSAmir Goldstein if (end) 3344c7d0c9cSAmir Goldstein break; 3354c7d0c9cSAmir Goldstein 3364c7d0c9cSAmir Goldstein rem -= thislen + 1; 3374c7d0c9cSAmir Goldstein 3384c7d0c9cSAmir Goldstein if (WARN_ON(rem >= d->name.len)) 3394c7d0c9cSAmir Goldstein return -EIO; 34002b69b28SMiklos Szeredi } 34102b69b28SMiklos Szeredi *ret = dentry; 34202b69b28SMiklos Szeredi return 0; 343e28edc46SMiklos Szeredi } 344e28edc46SMiklos Szeredi 345a9d01957SAmir Goldstein 3468a22efa1SAmir Goldstein int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, bool connected, 347f941866fSAmir Goldstein struct dentry *upperdentry, struct ovl_path **stackp) 348a9d01957SAmir Goldstein { 349f7d3dacaSAmir Goldstein struct dentry *origin = NULL; 350f7d3dacaSAmir Goldstein int i; 351a9d01957SAmir Goldstein 3521eff1a1dSAmir Goldstein for (i = 0; i < ofs->numlower; i++) { 3538a22efa1SAmir Goldstein origin = ovl_decode_real_fh(fh, ofs->lower_layers[i].mnt, 3548a22efa1SAmir Goldstein connected); 355f7d3dacaSAmir Goldstein if (origin) 356f7d3dacaSAmir Goldstein break; 357f7d3dacaSAmir Goldstein } 358f7d3dacaSAmir Goldstein 359f7d3dacaSAmir Goldstein if (!origin) 3602e1a5328SAmir Goldstein return -ESTALE; 3612e1a5328SAmir Goldstein else if (IS_ERR(origin)) 3622e1a5328SAmir Goldstein return PTR_ERR(origin); 363f7d3dacaSAmir Goldstein 364f941866fSAmir Goldstein if (upperdentry && !ovl_is_whiteout(upperdentry) && 3652e1a5328SAmir Goldstein ((d_inode(origin)->i_mode ^ d_inode(upperdentry)->i_mode) & S_IFMT)) 3662e1a5328SAmir Goldstein goto invalid; 3672e1a5328SAmir Goldstein 368415543d5SAmir Goldstein if (!*stackp) 369b9343632SChandan Rajendra *stackp = kmalloc(sizeof(struct ovl_path), GFP_KERNEL); 370a9d01957SAmir Goldstein if (!*stackp) { 371a9d01957SAmir Goldstein dput(origin); 372a9d01957SAmir Goldstein return -ENOMEM; 373a9d01957SAmir Goldstein } 3741eff1a1dSAmir Goldstein **stackp = (struct ovl_path){ 3751eff1a1dSAmir Goldstein .dentry = origin, 3761eff1a1dSAmir Goldstein .layer = &ofs->lower_layers[i] 3771eff1a1dSAmir Goldstein }; 378a9d01957SAmir Goldstein 379a9d01957SAmir Goldstein return 0; 3802e1a5328SAmir Goldstein 3812e1a5328SAmir Goldstein invalid: 3822e1a5328SAmir Goldstein pr_warn_ratelimited("overlayfs: invalid origin (%pd2, ftype=%x, origin ftype=%x).\n", 3832e1a5328SAmir Goldstein upperdentry, d_inode(upperdentry)->i_mode & S_IFMT, 3842e1a5328SAmir Goldstein d_inode(origin)->i_mode & S_IFMT); 3852e1a5328SAmir Goldstein dput(origin); 3862e1a5328SAmir Goldstein return -EIO; 3872e1a5328SAmir Goldstein } 3882e1a5328SAmir Goldstein 3891eff1a1dSAmir Goldstein static int ovl_check_origin(struct ovl_fs *ofs, struct dentry *upperdentry, 3902e1a5328SAmir Goldstein struct ovl_path **stackp, unsigned int *ctrp) 3912e1a5328SAmir Goldstein { 39205122443SAmir Goldstein struct ovl_fh *fh = ovl_get_fh(upperdentry, OVL_XATTR_ORIGIN); 3932e1a5328SAmir Goldstein int err; 3942e1a5328SAmir Goldstein 3952e1a5328SAmir Goldstein if (IS_ERR_OR_NULL(fh)) 3962e1a5328SAmir Goldstein return PTR_ERR(fh); 3972e1a5328SAmir Goldstein 3988a22efa1SAmir Goldstein err = ovl_check_origin_fh(ofs, fh, false, upperdentry, stackp); 3992e1a5328SAmir Goldstein kfree(fh); 4002e1a5328SAmir Goldstein 4012e1a5328SAmir Goldstein if (err) { 4022e1a5328SAmir Goldstein if (err == -ESTALE) 4032e1a5328SAmir Goldstein return 0; 4042e1a5328SAmir Goldstein return err; 4052e1a5328SAmir Goldstein } 4062e1a5328SAmir Goldstein 4072e1a5328SAmir Goldstein if (WARN_ON(*ctrp)) 4082e1a5328SAmir Goldstein return -EIO; 4092e1a5328SAmir Goldstein 4102e1a5328SAmir Goldstein *ctrp = 1; 4112e1a5328SAmir Goldstein return 0; 412a9d01957SAmir Goldstein } 413a9d01957SAmir Goldstein 414bbb1e54dSMiklos Szeredi /* 41505122443SAmir Goldstein * Verify that @fh matches the file handle stored in xattr @name. 4168b88a2e6SAmir Goldstein * Return 0 on match, -ESTALE on mismatch, < 0 on error. 4178b88a2e6SAmir Goldstein */ 41805122443SAmir Goldstein static int ovl_verify_fh(struct dentry *dentry, const char *name, 41905122443SAmir Goldstein const struct ovl_fh *fh) 4208b88a2e6SAmir Goldstein { 42105122443SAmir Goldstein struct ovl_fh *ofh = ovl_get_fh(dentry, name); 4228b88a2e6SAmir Goldstein int err = 0; 4238b88a2e6SAmir Goldstein 4248b88a2e6SAmir Goldstein if (!ofh) 4258b88a2e6SAmir Goldstein return -ENODATA; 4268b88a2e6SAmir Goldstein 4278b88a2e6SAmir Goldstein if (IS_ERR(ofh)) 4288b88a2e6SAmir Goldstein return PTR_ERR(ofh); 4298b88a2e6SAmir Goldstein 4308b88a2e6SAmir Goldstein if (fh->len != ofh->len || memcmp(fh, ofh, fh->len)) 4318b88a2e6SAmir Goldstein err = -ESTALE; 4328b88a2e6SAmir Goldstein 4338b88a2e6SAmir Goldstein kfree(ofh); 4348b88a2e6SAmir Goldstein return err; 4358b88a2e6SAmir Goldstein } 4368b88a2e6SAmir Goldstein 4378b88a2e6SAmir Goldstein /* 43805122443SAmir Goldstein * Verify that @real dentry matches the file handle stored in xattr @name. 4398b88a2e6SAmir Goldstein * 44005122443SAmir Goldstein * If @set is true and there is no stored file handle, encode @real and store 44105122443SAmir Goldstein * file handle in xattr @name. 4428b88a2e6SAmir Goldstein * 44305122443SAmir Goldstein * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error. 4448b88a2e6SAmir Goldstein */ 44505122443SAmir Goldstein int ovl_verify_set_fh(struct dentry *dentry, const char *name, 44605122443SAmir Goldstein struct dentry *real, bool is_upper, bool set) 4478b88a2e6SAmir Goldstein { 4488b88a2e6SAmir Goldstein struct inode *inode; 4498b88a2e6SAmir Goldstein struct ovl_fh *fh; 4508b88a2e6SAmir Goldstein int err; 4518b88a2e6SAmir Goldstein 4525b2cccd3SAmir Goldstein fh = ovl_encode_real_fh(real, is_upper); 4538b88a2e6SAmir Goldstein err = PTR_ERR(fh); 4548b88a2e6SAmir Goldstein if (IS_ERR(fh)) 4558b88a2e6SAmir Goldstein goto fail; 4568b88a2e6SAmir Goldstein 45705122443SAmir Goldstein err = ovl_verify_fh(dentry, name, fh); 4588b88a2e6SAmir Goldstein if (set && err == -ENODATA) 45905122443SAmir Goldstein err = ovl_do_setxattr(dentry, name, fh, fh->len, 0); 4608b88a2e6SAmir Goldstein if (err) 4618b88a2e6SAmir Goldstein goto fail; 4628b88a2e6SAmir Goldstein 4638b88a2e6SAmir Goldstein out: 4648b88a2e6SAmir Goldstein kfree(fh); 4658b88a2e6SAmir Goldstein return err; 4668b88a2e6SAmir Goldstein 4678b88a2e6SAmir Goldstein fail: 46805122443SAmir Goldstein inode = d_inode(real); 46905122443SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to verify %s (%pd2, ino=%lu, err=%i)\n", 47005122443SAmir Goldstein is_upper ? "upper" : "origin", real, 47105122443SAmir Goldstein inode ? inode->i_ino : 0, err); 4728b88a2e6SAmir Goldstein goto out; 4738b88a2e6SAmir Goldstein } 4748b88a2e6SAmir Goldstein 475e8f9e5b7SAmir Goldstein /* Get upper dentry from index */ 4763b0bfc6eSAmir Goldstein struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index) 477e8f9e5b7SAmir Goldstein { 478e8f9e5b7SAmir Goldstein struct ovl_fh *fh; 479e8f9e5b7SAmir Goldstein struct dentry *upper; 480e8f9e5b7SAmir Goldstein 481e8f9e5b7SAmir Goldstein if (!d_is_dir(index)) 482e8f9e5b7SAmir Goldstein return dget(index); 483e8f9e5b7SAmir Goldstein 484e8f9e5b7SAmir Goldstein fh = ovl_get_fh(index, OVL_XATTR_UPPER); 485e8f9e5b7SAmir Goldstein if (IS_ERR_OR_NULL(fh)) 486e8f9e5b7SAmir Goldstein return ERR_CAST(fh); 487e8f9e5b7SAmir Goldstein 4888a22efa1SAmir Goldstein upper = ovl_decode_real_fh(fh, ofs->upper_mnt, true); 489e8f9e5b7SAmir Goldstein kfree(fh); 490e8f9e5b7SAmir Goldstein 491e8f9e5b7SAmir Goldstein if (IS_ERR_OR_NULL(upper)) 492e8f9e5b7SAmir Goldstein return upper ?: ERR_PTR(-ESTALE); 493e8f9e5b7SAmir Goldstein 494e8f9e5b7SAmir Goldstein if (!d_is_dir(upper)) { 495e8f9e5b7SAmir Goldstein pr_warn_ratelimited("overlayfs: invalid index upper (%pd2, upper=%pd2).\n", 496e8f9e5b7SAmir Goldstein index, upper); 497e8f9e5b7SAmir Goldstein dput(upper); 498e8f9e5b7SAmir Goldstein return ERR_PTR(-EIO); 499e8f9e5b7SAmir Goldstein } 500e8f9e5b7SAmir Goldstein 501e8f9e5b7SAmir Goldstein return upper; 502e8f9e5b7SAmir Goldstein } 503e8f9e5b7SAmir Goldstein 5049ee60ce2SAmir Goldstein /* Is this a leftover from create/whiteout of directory index entry? */ 5059ee60ce2SAmir Goldstein static bool ovl_is_temp_index(struct dentry *index) 5069ee60ce2SAmir Goldstein { 5079ee60ce2SAmir Goldstein return index->d_name.name[0] == '#'; 5089ee60ce2SAmir Goldstein } 5099ee60ce2SAmir Goldstein 5108b88a2e6SAmir Goldstein /* 511415543d5SAmir Goldstein * Verify that an index entry name matches the origin file handle stored in 512415543d5SAmir Goldstein * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path. 513415543d5SAmir Goldstein * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error. 514415543d5SAmir Goldstein */ 5151eff1a1dSAmir Goldstein int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index) 516415543d5SAmir Goldstein { 517415543d5SAmir Goldstein struct ovl_fh *fh = NULL; 518415543d5SAmir Goldstein size_t len; 519b9343632SChandan Rajendra struct ovl_path origin = { }; 520b9343632SChandan Rajendra struct ovl_path *stack = &origin; 521e8f9e5b7SAmir Goldstein struct dentry *upper = NULL; 522415543d5SAmir Goldstein int err; 523415543d5SAmir Goldstein 524415543d5SAmir Goldstein if (!d_inode(index)) 525415543d5SAmir Goldstein return 0; 526415543d5SAmir Goldstein 5279ee60ce2SAmir Goldstein /* Cleanup leftover from index create/cleanup attempt */ 5289ee60ce2SAmir Goldstein err = -ESTALE; 5299ee60ce2SAmir Goldstein if (ovl_is_temp_index(index)) 5309ee60ce2SAmir Goldstein goto fail; 5319ee60ce2SAmir Goldstein 532fa0096e3SAmir Goldstein err = -EINVAL; 533415543d5SAmir Goldstein if (index->d_name.len < sizeof(struct ovl_fh)*2) 534415543d5SAmir Goldstein goto fail; 535415543d5SAmir Goldstein 536415543d5SAmir Goldstein err = -ENOMEM; 537415543d5SAmir Goldstein len = index->d_name.len / 2; 5380ee931c4SMichal Hocko fh = kzalloc(len, GFP_KERNEL); 539415543d5SAmir Goldstein if (!fh) 540415543d5SAmir Goldstein goto fail; 541415543d5SAmir Goldstein 542415543d5SAmir Goldstein err = -EINVAL; 5432e1a5328SAmir Goldstein if (hex2bin((u8 *)fh, index->d_name.name, len)) 5442e1a5328SAmir Goldstein goto fail; 5452e1a5328SAmir Goldstein 5462e1a5328SAmir Goldstein err = ovl_check_fh_len(fh, len); 5472e1a5328SAmir Goldstein if (err) 548415543d5SAmir Goldstein goto fail; 549415543d5SAmir Goldstein 5507db25d36SAmir Goldstein /* 5517db25d36SAmir Goldstein * Whiteout index entries are used as an indication that an exported 5527db25d36SAmir Goldstein * overlay file handle should be treated as stale (i.e. after unlink 5537db25d36SAmir Goldstein * of the overlay inode). These entries contain no origin xattr. 5547db25d36SAmir Goldstein */ 5557db25d36SAmir Goldstein if (ovl_is_whiteout(index)) 5567db25d36SAmir Goldstein goto out; 5577db25d36SAmir Goldstein 558e8f9e5b7SAmir Goldstein /* 559e8f9e5b7SAmir Goldstein * Verifying directory index entries are not stale is expensive, so 560e8f9e5b7SAmir Goldstein * only verify stale dir index if NFS export is enabled. 561e8f9e5b7SAmir Goldstein */ 562e8f9e5b7SAmir Goldstein if (d_is_dir(index) && !ofs->config.nfs_export) 563e8f9e5b7SAmir Goldstein goto out; 564e8f9e5b7SAmir Goldstein 565e8f9e5b7SAmir Goldstein /* 566e8f9e5b7SAmir Goldstein * Directory index entries should have 'upper' xattr pointing to the 567e8f9e5b7SAmir Goldstein * real upper dir. Non-dir index entries are hardlinks to the upper 568e8f9e5b7SAmir Goldstein * real inode. For non-dir index, we can read the copy up origin xattr 569e8f9e5b7SAmir Goldstein * directly from the index dentry, but for dir index we first need to 570e8f9e5b7SAmir Goldstein * decode the upper directory. 571e8f9e5b7SAmir Goldstein */ 572e8f9e5b7SAmir Goldstein upper = ovl_index_upper(ofs, index); 573e8f9e5b7SAmir Goldstein if (IS_ERR_OR_NULL(upper)) { 574e8f9e5b7SAmir Goldstein err = PTR_ERR(upper); 57524f0b172SAmir Goldstein /* 57624f0b172SAmir Goldstein * Directory index entries with no 'upper' xattr need to be 57724f0b172SAmir Goldstein * removed. When dir index entry has a stale 'upper' xattr, 57824f0b172SAmir Goldstein * we assume that upper dir was removed and we treat the dir 57924f0b172SAmir Goldstein * index as orphan entry that needs to be whited out. 58024f0b172SAmir Goldstein */ 58124f0b172SAmir Goldstein if (err == -ESTALE) 58224f0b172SAmir Goldstein goto orphan; 58324f0b172SAmir Goldstein else if (!err) 584e8f9e5b7SAmir Goldstein err = -ESTALE; 585e8f9e5b7SAmir Goldstein goto fail; 586e8f9e5b7SAmir Goldstein } 587e8f9e5b7SAmir Goldstein 588e8f9e5b7SAmir Goldstein err = ovl_verify_fh(upper, OVL_XATTR_ORIGIN, fh); 589e8f9e5b7SAmir Goldstein dput(upper); 590415543d5SAmir Goldstein if (err) 591415543d5SAmir Goldstein goto fail; 592415543d5SAmir Goldstein 593e8f9e5b7SAmir Goldstein /* Check if non-dir index is orphan and don't warn before cleaning it */ 594e8f9e5b7SAmir Goldstein if (!d_is_dir(index) && d_inode(index)->i_nlink == 1) { 5958a22efa1SAmir Goldstein err = ovl_check_origin_fh(ofs, fh, false, index, &stack); 596415543d5SAmir Goldstein if (err) 597415543d5SAmir Goldstein goto fail; 598415543d5SAmir Goldstein 599e8f9e5b7SAmir Goldstein if (ovl_get_nlink(origin.dentry, index, 0) == 0) 60024f0b172SAmir Goldstein goto orphan; 601e8f9e5b7SAmir Goldstein } 602caf70cb2SAmir Goldstein 603415543d5SAmir Goldstein out: 604e8f9e5b7SAmir Goldstein dput(origin.dentry); 605415543d5SAmir Goldstein kfree(fh); 606415543d5SAmir Goldstein return err; 607415543d5SAmir Goldstein 608415543d5SAmir Goldstein fail: 60961b67471SAmir Goldstein pr_warn_ratelimited("overlayfs: failed to verify index (%pd2, ftype=%x, err=%i)\n", 61061b67471SAmir Goldstein index, d_inode(index)->i_mode & S_IFMT, err); 611415543d5SAmir Goldstein goto out; 61224f0b172SAmir Goldstein 61324f0b172SAmir Goldstein orphan: 61424f0b172SAmir Goldstein pr_warn_ratelimited("overlayfs: orphan index entry (%pd2, ftype=%x, nlink=%u)\n", 61524f0b172SAmir Goldstein index, d_inode(index)->i_mode & S_IFMT, 61624f0b172SAmir Goldstein d_inode(index)->i_nlink); 61724f0b172SAmir Goldstein err = -ENOENT; 61824f0b172SAmir Goldstein goto out; 619415543d5SAmir Goldstein } 620415543d5SAmir Goldstein 62191ffe7beSAmir Goldstein static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name) 62291ffe7beSAmir Goldstein { 62391ffe7beSAmir Goldstein char *n, *s; 62491ffe7beSAmir Goldstein 6256396bb22SKees Cook n = kcalloc(fh->len, 2, GFP_KERNEL); 62691ffe7beSAmir Goldstein if (!n) 62791ffe7beSAmir Goldstein return -ENOMEM; 62891ffe7beSAmir Goldstein 62991ffe7beSAmir Goldstein s = bin2hex(n, fh, fh->len); 63091ffe7beSAmir Goldstein *name = (struct qstr) QSTR_INIT(n, s - n); 63191ffe7beSAmir Goldstein 63291ffe7beSAmir Goldstein return 0; 63391ffe7beSAmir Goldstein 63491ffe7beSAmir Goldstein } 63591ffe7beSAmir Goldstein 636415543d5SAmir Goldstein /* 637359f392cSAmir Goldstein * Lookup in indexdir for the index entry of a lower real inode or a copy up 638359f392cSAmir Goldstein * origin inode. The index entry name is the hex representation of the lower 639359f392cSAmir Goldstein * inode file handle. 640359f392cSAmir Goldstein * 641359f392cSAmir Goldstein * If the index dentry in negative, then either no lower aliases have been 642359f392cSAmir Goldstein * copied up yet, or aliases have been copied up in older kernels and are 643359f392cSAmir Goldstein * not indexed. 644359f392cSAmir Goldstein * 645359f392cSAmir Goldstein * If the index dentry for a copy up origin inode is positive, but points 646359f392cSAmir Goldstein * to an inode different than the upper inode, then either the upper inode 647359f392cSAmir Goldstein * has been copied up and not indexed or it was indexed, but since then 648359f392cSAmir Goldstein * index dir was cleared. Either way, that index cannot be used to indentify 649359f392cSAmir Goldstein * the overlay inode. 650359f392cSAmir Goldstein */ 651359f392cSAmir Goldstein int ovl_get_index_name(struct dentry *origin, struct qstr *name) 652359f392cSAmir Goldstein { 653359f392cSAmir Goldstein struct ovl_fh *fh; 65491ffe7beSAmir Goldstein int err; 655359f392cSAmir Goldstein 6565b2cccd3SAmir Goldstein fh = ovl_encode_real_fh(origin, false); 657359f392cSAmir Goldstein if (IS_ERR(fh)) 658359f392cSAmir Goldstein return PTR_ERR(fh); 659359f392cSAmir Goldstein 66091ffe7beSAmir Goldstein err = ovl_get_index_name_fh(fh, name); 66191ffe7beSAmir Goldstein 662359f392cSAmir Goldstein kfree(fh); 663359f392cSAmir Goldstein return err; 66491ffe7beSAmir Goldstein } 665359f392cSAmir Goldstein 66691ffe7beSAmir Goldstein /* Lookup index by file handle for NFS export */ 66791ffe7beSAmir Goldstein struct dentry *ovl_get_index_fh(struct ovl_fs *ofs, struct ovl_fh *fh) 66891ffe7beSAmir Goldstein { 66991ffe7beSAmir Goldstein struct dentry *index; 67091ffe7beSAmir Goldstein struct qstr name; 67191ffe7beSAmir Goldstein int err; 67291ffe7beSAmir Goldstein 67391ffe7beSAmir Goldstein err = ovl_get_index_name_fh(fh, &name); 67491ffe7beSAmir Goldstein if (err) 67591ffe7beSAmir Goldstein return ERR_PTR(err); 67691ffe7beSAmir Goldstein 67791ffe7beSAmir Goldstein index = lookup_one_len_unlocked(name.name, ofs->indexdir, name.len); 67891ffe7beSAmir Goldstein kfree(name.name); 67991ffe7beSAmir Goldstein if (IS_ERR(index)) { 68091ffe7beSAmir Goldstein if (PTR_ERR(index) == -ENOENT) 68191ffe7beSAmir Goldstein index = NULL; 68291ffe7beSAmir Goldstein return index; 68391ffe7beSAmir Goldstein } 68491ffe7beSAmir Goldstein 68591ffe7beSAmir Goldstein if (d_is_negative(index)) 68691ffe7beSAmir Goldstein err = 0; 68791ffe7beSAmir Goldstein else if (ovl_is_whiteout(index)) 68891ffe7beSAmir Goldstein err = -ESTALE; 68991ffe7beSAmir Goldstein else if (ovl_dentry_weird(index)) 69091ffe7beSAmir Goldstein err = -EIO; 69191ffe7beSAmir Goldstein else 69291ffe7beSAmir Goldstein return index; 69391ffe7beSAmir Goldstein 69491ffe7beSAmir Goldstein dput(index); 69591ffe7beSAmir Goldstein return ERR_PTR(err); 696359f392cSAmir Goldstein } 697359f392cSAmir Goldstein 69806170154SAmir Goldstein struct dentry *ovl_lookup_index(struct ovl_fs *ofs, struct dentry *upper, 69906170154SAmir Goldstein struct dentry *origin, bool verify) 700359f392cSAmir Goldstein { 701359f392cSAmir Goldstein struct dentry *index; 702359f392cSAmir Goldstein struct inode *inode; 703359f392cSAmir Goldstein struct qstr name; 704ad1d615cSAmir Goldstein bool is_dir = d_is_dir(origin); 705359f392cSAmir Goldstein int err; 706359f392cSAmir Goldstein 707359f392cSAmir Goldstein err = ovl_get_index_name(origin, &name); 708359f392cSAmir Goldstein if (err) 709359f392cSAmir Goldstein return ERR_PTR(err); 710359f392cSAmir Goldstein 711359f392cSAmir Goldstein index = lookup_one_len_unlocked(name.name, ofs->indexdir, name.len); 712359f392cSAmir Goldstein if (IS_ERR(index)) { 713e0082a0fSAmir Goldstein err = PTR_ERR(index); 7147937a56fSAmir Goldstein if (err == -ENOENT) { 7157937a56fSAmir Goldstein index = NULL; 7167937a56fSAmir Goldstein goto out; 7177937a56fSAmir Goldstein } 718359f392cSAmir Goldstein pr_warn_ratelimited("overlayfs: failed inode index lookup (ino=%lu, key=%*s, err=%i);\n" 719359f392cSAmir Goldstein "overlayfs: mount with '-o index=off' to disable inodes index.\n", 720359f392cSAmir Goldstein d_inode(origin)->i_ino, name.len, name.name, 721359f392cSAmir Goldstein err); 722359f392cSAmir Goldstein goto out; 723359f392cSAmir Goldstein } 724359f392cSAmir Goldstein 7250e082555SAmir Goldstein inode = d_inode(index); 726359f392cSAmir Goldstein if (d_is_negative(index)) { 7276eaf0111SAmir Goldstein goto out_dput; 72806170154SAmir Goldstein } else if (ovl_is_whiteout(index) && !verify) { 72906170154SAmir Goldstein /* 73006170154SAmir Goldstein * When index lookup is called with !verify for decoding an 73106170154SAmir Goldstein * overlay file handle, a whiteout index implies that decode 73206170154SAmir Goldstein * should treat file handle as stale and no need to print a 73306170154SAmir Goldstein * warning about it. 73406170154SAmir Goldstein */ 73506170154SAmir Goldstein dput(index); 73606170154SAmir Goldstein index = ERR_PTR(-ESTALE); 73706170154SAmir Goldstein goto out; 7380e082555SAmir Goldstein } else if (ovl_dentry_weird(index) || ovl_is_whiteout(index) || 7390e082555SAmir Goldstein ((inode->i_mode ^ d_inode(origin)->i_mode) & S_IFMT)) { 7400e082555SAmir Goldstein /* 7410e082555SAmir Goldstein * Index should always be of the same file type as origin 7420e082555SAmir Goldstein * except for the case of a whiteout index. A whiteout 7430e082555SAmir Goldstein * index should only exist if all lower aliases have been 7440e082555SAmir Goldstein * unlinked, which means that finding a lower origin on lookup 7450e082555SAmir Goldstein * whose index is a whiteout should be treated as an error. 7460e082555SAmir Goldstein */ 7470e082555SAmir Goldstein pr_warn_ratelimited("overlayfs: bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n", 7480e082555SAmir Goldstein index, d_inode(index)->i_mode & S_IFMT, 7490e082555SAmir Goldstein d_inode(origin)->i_mode & S_IFMT); 750359f392cSAmir Goldstein goto fail; 75106170154SAmir Goldstein } else if (is_dir && verify) { 752ad1d615cSAmir Goldstein if (!upper) { 753ad1d615cSAmir Goldstein pr_warn_ratelimited("overlayfs: suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n", 754ad1d615cSAmir Goldstein origin, index); 755ad1d615cSAmir Goldstein goto fail; 756359f392cSAmir Goldstein } 757359f392cSAmir Goldstein 758ad1d615cSAmir Goldstein /* Verify that dir index 'upper' xattr points to upper dir */ 759ad1d615cSAmir Goldstein err = ovl_verify_upper(index, upper, false); 760ad1d615cSAmir Goldstein if (err) { 761ad1d615cSAmir Goldstein if (err == -ESTALE) { 762ad1d615cSAmir Goldstein pr_warn_ratelimited("overlayfs: suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2).\n", 763ad1d615cSAmir Goldstein upper, origin, index); 764ad1d615cSAmir Goldstein } 765ad1d615cSAmir Goldstein goto fail; 766ad1d615cSAmir Goldstein } 767ad1d615cSAmir Goldstein } else if (upper && d_inode(upper) != inode) { 768ad1d615cSAmir Goldstein goto out_dput; 769ad1d615cSAmir Goldstein } 770359f392cSAmir Goldstein out: 771359f392cSAmir Goldstein kfree(name.name); 772359f392cSAmir Goldstein return index; 773359f392cSAmir Goldstein 7746eaf0111SAmir Goldstein out_dput: 7756eaf0111SAmir Goldstein dput(index); 7766eaf0111SAmir Goldstein index = NULL; 7776eaf0111SAmir Goldstein goto out; 7786eaf0111SAmir Goldstein 779359f392cSAmir Goldstein fail: 780359f392cSAmir Goldstein dput(index); 781359f392cSAmir Goldstein index = ERR_PTR(-EIO); 782359f392cSAmir Goldstein goto out; 783359f392cSAmir Goldstein } 784359f392cSAmir Goldstein 785359f392cSAmir Goldstein /* 786bbb1e54dSMiklos Szeredi * Returns next layer in stack starting from top. 787bbb1e54dSMiklos Szeredi * Returns -1 if this is the last layer. 788bbb1e54dSMiklos Szeredi */ 789bbb1e54dSMiklos Szeredi int ovl_path_next(int idx, struct dentry *dentry, struct path *path) 790bbb1e54dSMiklos Szeredi { 791bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 792bbb1e54dSMiklos Szeredi 793bbb1e54dSMiklos Szeredi BUG_ON(idx < 0); 794bbb1e54dSMiklos Szeredi if (idx == 0) { 795bbb1e54dSMiklos Szeredi ovl_path_upper(dentry, path); 796bbb1e54dSMiklos Szeredi if (path->dentry) 797bbb1e54dSMiklos Szeredi return oe->numlower ? 1 : -1; 798bbb1e54dSMiklos Szeredi idx++; 799bbb1e54dSMiklos Szeredi } 800bbb1e54dSMiklos Szeredi BUG_ON(idx > oe->numlower); 801b9343632SChandan Rajendra path->dentry = oe->lowerstack[idx - 1].dentry; 802b9343632SChandan Rajendra path->mnt = oe->lowerstack[idx - 1].layer->mnt; 803bbb1e54dSMiklos Szeredi 804bbb1e54dSMiklos Szeredi return (idx < oe->numlower) ? idx + 1 : -1; 805bbb1e54dSMiklos Szeredi } 806bbb1e54dSMiklos Szeredi 8079678e630SAmir Goldstein /* Fix missing 'origin' xattr */ 8089678e630SAmir Goldstein static int ovl_fix_origin(struct dentry *dentry, struct dentry *lower, 8099678e630SAmir Goldstein struct dentry *upper) 8109678e630SAmir Goldstein { 8119678e630SAmir Goldstein int err; 8129678e630SAmir Goldstein 8139678e630SAmir Goldstein if (ovl_check_origin_xattr(upper)) 8149678e630SAmir Goldstein return 0; 8159678e630SAmir Goldstein 8169678e630SAmir Goldstein err = ovl_want_write(dentry); 8179678e630SAmir Goldstein if (err) 8189678e630SAmir Goldstein return err; 8199678e630SAmir Goldstein 8209678e630SAmir Goldstein err = ovl_set_origin(dentry, lower, upper); 8219678e630SAmir Goldstein if (!err) 8229678e630SAmir Goldstein err = ovl_set_impure(dentry->d_parent, upper->d_parent); 8239678e630SAmir Goldstein 8249678e630SAmir Goldstein ovl_drop_write(dentry); 8259678e630SAmir Goldstein return err; 8269678e630SAmir Goldstein } 8279678e630SAmir Goldstein 828bbb1e54dSMiklos Szeredi struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry, 829bbb1e54dSMiklos Szeredi unsigned int flags) 830bbb1e54dSMiklos Szeredi { 831bbb1e54dSMiklos Szeredi struct ovl_entry *oe; 832bbb1e54dSMiklos Szeredi const struct cred *old_cred; 8336b2d5fe4SMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 834bbb1e54dSMiklos Szeredi struct ovl_entry *poe = dentry->d_parent->d_fsdata; 835c22205d0SAmir Goldstein struct ovl_entry *roe = dentry->d_sb->s_root->d_fsdata; 836*9d3dfea3SVivek Goyal struct ovl_path *stack = NULL, *origin_path = NULL; 837bbb1e54dSMiklos Szeredi struct dentry *upperdir, *upperdentry = NULL; 838ad1d615cSAmir Goldstein struct dentry *origin = NULL; 839359f392cSAmir Goldstein struct dentry *index = NULL; 840bbb1e54dSMiklos Szeredi unsigned int ctr = 0; 841bbb1e54dSMiklos Szeredi struct inode *inode = NULL; 842bbb1e54dSMiklos Szeredi bool upperopaque = false; 84302b69b28SMiklos Szeredi char *upperredirect = NULL; 844bbb1e54dSMiklos Szeredi struct dentry *this; 845bbb1e54dSMiklos Szeredi unsigned int i; 846bbb1e54dSMiklos Szeredi int err; 847*9d3dfea3SVivek Goyal bool metacopy = false; 848e28edc46SMiklos Szeredi struct ovl_lookup_data d = { 849e28edc46SMiklos Szeredi .name = dentry->d_name, 850e28edc46SMiklos Szeredi .is_dir = false, 851e28edc46SMiklos Szeredi .opaque = false, 852e28edc46SMiklos Szeredi .stop = false, 853452061fdSVivek Goyal .last = ofs->config.redirect_follow ? false : !poe->numlower, 85402b69b28SMiklos Szeredi .redirect = NULL, 855*9d3dfea3SVivek Goyal .metacopy = false, 856e28edc46SMiklos Szeredi }; 857bbb1e54dSMiklos Szeredi 8586b2d5fe4SMiklos Szeredi if (dentry->d_name.len > ofs->namelen) 8596b2d5fe4SMiklos Szeredi return ERR_PTR(-ENAMETOOLONG); 8606b2d5fe4SMiklos Szeredi 861bbb1e54dSMiklos Szeredi old_cred = ovl_override_creds(dentry->d_sb); 86209d8b586SMiklos Szeredi upperdir = ovl_dentry_upper(dentry->d_parent); 863bbb1e54dSMiklos Szeredi if (upperdir) { 864e28edc46SMiklos Szeredi err = ovl_lookup_layer(upperdir, &d, &upperdentry); 865e28edc46SMiklos Szeredi if (err) 866bbb1e54dSMiklos Szeredi goto out; 867bbb1e54dSMiklos Szeredi 868e28edc46SMiklos Szeredi if (upperdentry && unlikely(ovl_dentry_remote(upperdentry))) { 869e28edc46SMiklos Szeredi dput(upperdentry); 870bbb1e54dSMiklos Szeredi err = -EREMOTE; 871bbb1e54dSMiklos Szeredi goto out; 872bbb1e54dSMiklos Szeredi } 873a9d01957SAmir Goldstein if (upperdentry && !d.is_dir) { 874*9d3dfea3SVivek Goyal unsigned int origin_ctr = 0; 875*9d3dfea3SVivek Goyal 876*9d3dfea3SVivek Goyal BUG_ON(d.redirect); 877f7d3dacaSAmir Goldstein /* 878f7d3dacaSAmir Goldstein * Lookup copy up origin by decoding origin file handle. 879f7d3dacaSAmir Goldstein * We may get a disconnected dentry, which is fine, 880f7d3dacaSAmir Goldstein * because we only need to hold the origin inode in 881f7d3dacaSAmir Goldstein * cache and use its inode number. We may even get a 882f7d3dacaSAmir Goldstein * connected dentry, that is not under any of the lower 883f7d3dacaSAmir Goldstein * layers root. That is also fine for using it's inode 884f7d3dacaSAmir Goldstein * number - it's the same as if we held a reference 885f7d3dacaSAmir Goldstein * to a dentry in lower layer that was moved under us. 886f7d3dacaSAmir Goldstein */ 887*9d3dfea3SVivek Goyal err = ovl_check_origin(ofs, upperdentry, &origin_path, 888*9d3dfea3SVivek Goyal &origin_ctr); 889a9d01957SAmir Goldstein if (err) 8905455f92bSVivek Goyal goto out_put_upper; 891*9d3dfea3SVivek Goyal 892*9d3dfea3SVivek Goyal if (d.metacopy) 893*9d3dfea3SVivek Goyal metacopy = true; 894a9d01957SAmir Goldstein } 89502b69b28SMiklos Szeredi 89602b69b28SMiklos Szeredi if (d.redirect) { 8970ce5cdc9SDan Carpenter err = -ENOMEM; 89802b69b28SMiklos Szeredi upperredirect = kstrdup(d.redirect, GFP_KERNEL); 89902b69b28SMiklos Szeredi if (!upperredirect) 90002b69b28SMiklos Szeredi goto out_put_upper; 90102b69b28SMiklos Szeredi if (d.redirect[0] == '/') 902c22205d0SAmir Goldstein poe = roe; 90302b69b28SMiklos Szeredi } 904e28edc46SMiklos Szeredi upperopaque = d.opaque; 905bbb1e54dSMiklos Szeredi } 906bbb1e54dSMiklos Szeredi 907e28edc46SMiklos Szeredi if (!d.stop && poe->numlower) { 908bbb1e54dSMiklos Szeredi err = -ENOMEM; 909b9343632SChandan Rajendra stack = kcalloc(ofs->numlower, sizeof(struct ovl_path), 9100ee931c4SMichal Hocko GFP_KERNEL); 911bbb1e54dSMiklos Szeredi if (!stack) 912bbb1e54dSMiklos Szeredi goto out_put_upper; 913bbb1e54dSMiklos Szeredi } 914bbb1e54dSMiklos Szeredi 915e28edc46SMiklos Szeredi for (i = 0; !d.stop && i < poe->numlower; i++) { 916b9343632SChandan Rajendra struct ovl_path lower = poe->lowerstack[i]; 917bbb1e54dSMiklos Szeredi 918452061fdSVivek Goyal if (!ofs->config.redirect_follow) 919e28edc46SMiklos Szeredi d.last = i == poe->numlower - 1; 920452061fdSVivek Goyal else 921452061fdSVivek Goyal d.last = lower.layer->idx == roe->numlower; 922452061fdSVivek Goyal 923b9343632SChandan Rajendra err = ovl_lookup_layer(lower.dentry, &d, &this); 924e28edc46SMiklos Szeredi if (err) 925bbb1e54dSMiklos Szeredi goto out_put; 9266b2d5fe4SMiklos Szeredi 927bbb1e54dSMiklos Szeredi if (!this) 928bbb1e54dSMiklos Szeredi continue; 929bbb1e54dSMiklos Szeredi 9309678e630SAmir Goldstein /* 9319678e630SAmir Goldstein * If no origin fh is stored in upper of a merge dir, store fh 9329678e630SAmir Goldstein * of lower dir and set upper parent "impure". 9339678e630SAmir Goldstein */ 934*9d3dfea3SVivek Goyal if (upperdentry && !ctr && !ofs->noxattr && d.is_dir) { 9359678e630SAmir Goldstein err = ovl_fix_origin(dentry, this, upperdentry); 9369678e630SAmir Goldstein if (err) { 9379678e630SAmir Goldstein dput(this); 9389678e630SAmir Goldstein goto out_put; 9399678e630SAmir Goldstein } 9409678e630SAmir Goldstein } 9419678e630SAmir Goldstein 94237b12916SAmir Goldstein /* 94337b12916SAmir Goldstein * When "verify_lower" feature is enabled, do not merge with a 944ad1d615cSAmir Goldstein * lower dir that does not match a stored origin xattr. In any 945ad1d615cSAmir Goldstein * case, only verified origin is used for index lookup. 946*9d3dfea3SVivek Goyal * 947*9d3dfea3SVivek Goyal * For non-dir dentry, if index=on, then ensure origin 948*9d3dfea3SVivek Goyal * matches the dentry found using path based lookup, 949*9d3dfea3SVivek Goyal * otherwise error out. 95037b12916SAmir Goldstein */ 951*9d3dfea3SVivek Goyal if (upperdentry && !ctr && 952*9d3dfea3SVivek Goyal ((d.is_dir && ovl_verify_lower(dentry->d_sb)) || 953*9d3dfea3SVivek Goyal (!d.is_dir && ofs->config.index && origin_path))) { 95437b12916SAmir Goldstein err = ovl_verify_origin(upperdentry, this, false); 95537b12916SAmir Goldstein if (err) { 95637b12916SAmir Goldstein dput(this); 957*9d3dfea3SVivek Goyal if (d.is_dir) 95837b12916SAmir Goldstein break; 959*9d3dfea3SVivek Goyal goto out_put; 960*9d3dfea3SVivek Goyal } 961*9d3dfea3SVivek Goyal origin = this; 96237b12916SAmir Goldstein } 963ad1d615cSAmir Goldstein 964*9d3dfea3SVivek Goyal if (d.metacopy) 965*9d3dfea3SVivek Goyal metacopy = true; 966*9d3dfea3SVivek Goyal /* 967*9d3dfea3SVivek Goyal * Do not store intermediate metacopy dentries in chain, 968*9d3dfea3SVivek Goyal * except top most lower metacopy dentry 969*9d3dfea3SVivek Goyal */ 970*9d3dfea3SVivek Goyal if (d.metacopy && ctr) { 971*9d3dfea3SVivek Goyal dput(this); 972*9d3dfea3SVivek Goyal continue; 97337b12916SAmir Goldstein } 97437b12916SAmir Goldstein 975bbb1e54dSMiklos Szeredi stack[ctr].dentry = this; 976b9343632SChandan Rajendra stack[ctr].layer = lower.layer; 977bbb1e54dSMiklos Szeredi ctr++; 97802b69b28SMiklos Szeredi 979438c84c2SMiklos Szeredi /* 980438c84c2SMiklos Szeredi * Following redirects can have security consequences: it's like 981438c84c2SMiklos Szeredi * a symlink into the lower layer without the permission checks. 982438c84c2SMiklos Szeredi * This is only a problem if the upper layer is untrusted (e.g 983438c84c2SMiklos Szeredi * comes from an USB drive). This can allow a non-readable file 984438c84c2SMiklos Szeredi * or directory to become readable. 985438c84c2SMiklos Szeredi * 986438c84c2SMiklos Szeredi * Only following redirects when redirects are enabled disables 987438c84c2SMiklos Szeredi * this attack vector when not necessary. 988438c84c2SMiklos Szeredi */ 989438c84c2SMiklos Szeredi err = -EPERM; 990438c84c2SMiklos Szeredi if (d.redirect && !ofs->config.redirect_follow) { 991f8167817SAmir Goldstein pr_warn_ratelimited("overlayfs: refusing to follow redirect for (%pd2)\n", 992f8167817SAmir Goldstein dentry); 993438c84c2SMiklos Szeredi goto out_put; 994438c84c2SMiklos Szeredi } 995438c84c2SMiklos Szeredi 996d1fe96c0SVivek Goyal if (d.stop) 997d1fe96c0SVivek Goyal break; 998d1fe96c0SVivek Goyal 999c22205d0SAmir Goldstein if (d.redirect && d.redirect[0] == '/' && poe != roe) { 1000c22205d0SAmir Goldstein poe = roe; 100102b69b28SMiklos Szeredi /* Find the current layer on the root dentry */ 1002d583ed7dSAmir Goldstein i = lower.layer->idx - 1; 100302b69b28SMiklos Szeredi } 1004bbb1e54dSMiklos Szeredi } 1005bbb1e54dSMiklos Szeredi 1006*9d3dfea3SVivek Goyal if (metacopy) { 1007*9d3dfea3SVivek Goyal /* 1008*9d3dfea3SVivek Goyal * Found a metacopy dentry but did not find corresponding 1009*9d3dfea3SVivek Goyal * data dentry 1010*9d3dfea3SVivek Goyal */ 1011*9d3dfea3SVivek Goyal if (d.metacopy) { 1012*9d3dfea3SVivek Goyal err = -EIO; 1013*9d3dfea3SVivek Goyal goto out_put; 1014*9d3dfea3SVivek Goyal } 1015*9d3dfea3SVivek Goyal 1016*9d3dfea3SVivek Goyal err = -EPERM; 1017*9d3dfea3SVivek Goyal if (!ofs->config.metacopy) { 1018*9d3dfea3SVivek Goyal pr_warn_ratelimited("overlay: refusing to follow metacopy origin for (%pd2)\n", 1019*9d3dfea3SVivek Goyal dentry); 1020*9d3dfea3SVivek Goyal goto out_put; 1021*9d3dfea3SVivek Goyal } 1022*9d3dfea3SVivek Goyal } else if (!d.is_dir && upperdentry && !ctr && origin_path) { 1023*9d3dfea3SVivek Goyal if (WARN_ON(stack != NULL)) { 1024*9d3dfea3SVivek Goyal err = -EIO; 1025*9d3dfea3SVivek Goyal goto out_put; 1026*9d3dfea3SVivek Goyal } 1027*9d3dfea3SVivek Goyal stack = origin_path; 1028*9d3dfea3SVivek Goyal ctr = 1; 1029*9d3dfea3SVivek Goyal origin_path = NULL; 1030*9d3dfea3SVivek Goyal } 1031*9d3dfea3SVivek Goyal 1032ad1d615cSAmir Goldstein /* 1033ad1d615cSAmir Goldstein * Lookup index by lower inode and verify it matches upper inode. 1034ad1d615cSAmir Goldstein * We only trust dir index if we verified that lower dir matches 1035ad1d615cSAmir Goldstein * origin, otherwise dir index entries may be inconsistent and we 1036*9d3dfea3SVivek Goyal * ignore them. 1037*9d3dfea3SVivek Goyal * 1038*9d3dfea3SVivek Goyal * For non-dir upper metacopy dentry, we already set "origin" if we 1039*9d3dfea3SVivek Goyal * verified that lower matched upper origin. If upper origin was 1040*9d3dfea3SVivek Goyal * not present (because lower layer did not support fh encode/decode), 1041*9d3dfea3SVivek Goyal * or indexing is not enabled, do not set "origin" and skip looking up 1042*9d3dfea3SVivek Goyal * index. This case should be handled in same way as a non-dir upper 1043*9d3dfea3SVivek Goyal * without ORIGIN is handled. 1044*9d3dfea3SVivek Goyal * 1045*9d3dfea3SVivek Goyal * Always lookup index of non-dir non-metacopy and non-upper. 1046ad1d615cSAmir Goldstein */ 1047*9d3dfea3SVivek Goyal if (ctr && (!upperdentry || (!d.is_dir && !metacopy))) 1048ad1d615cSAmir Goldstein origin = stack[0].dentry; 1049359f392cSAmir Goldstein 1050ad1d615cSAmir Goldstein if (origin && ovl_indexdir(dentry->d_sb) && 1051ad1d615cSAmir Goldstein (!d.is_dir || ovl_index_all(dentry->d_sb))) { 105206170154SAmir Goldstein index = ovl_lookup_index(ofs, upperdentry, origin, true); 1053359f392cSAmir Goldstein if (IS_ERR(index)) { 1054359f392cSAmir Goldstein err = PTR_ERR(index); 1055359f392cSAmir Goldstein index = NULL; 1056359f392cSAmir Goldstein goto out_put; 1057359f392cSAmir Goldstein } 1058359f392cSAmir Goldstein } 1059359f392cSAmir Goldstein 1060bbb1e54dSMiklos Szeredi oe = ovl_alloc_entry(ctr); 1061bbb1e54dSMiklos Szeredi err = -ENOMEM; 1062bbb1e54dSMiklos Szeredi if (!oe) 1063bbb1e54dSMiklos Szeredi goto out_put; 1064bbb1e54dSMiklos Szeredi 1065b9343632SChandan Rajendra memcpy(oe->lowerstack, stack, sizeof(struct ovl_path) * ctr); 1066e6d2ebddSMiklos Szeredi dentry->d_fsdata = oe; 1067e6d2ebddSMiklos Szeredi 1068c62520a8SAmir Goldstein if (upperopaque) 1069c62520a8SAmir Goldstein ovl_dentry_set_opaque(dentry); 1070c62520a8SAmir Goldstein 107155acc661SMiklos Szeredi if (upperdentry) 107255acc661SMiklos Szeredi ovl_dentry_set_upper_alias(dentry); 107355acc661SMiklos Szeredi else if (index) 1074359f392cSAmir Goldstein upperdentry = dget(index); 1075359f392cSAmir Goldstein 1076e6d2ebddSMiklos Szeredi if (upperdentry || ctr) { 1077ac6a52ebSVivek Goyal struct ovl_inode_params oip = { 1078ac6a52ebSVivek Goyal .upperdentry = upperdentry, 1079ac6a52ebSVivek Goyal .lowerpath = stack, 1080ac6a52ebSVivek Goyal .index = index, 1081ac6a52ebSVivek Goyal .numlower = ctr, 10829cec54c8SVivek Goyal .redirect = upperredirect, 1083ac6a52ebSVivek Goyal }; 1084ac6a52ebSVivek Goyal 1085ac6a52ebSVivek Goyal inode = ovl_get_inode(dentry->d_sb, &oip); 1086b9ac5c27SMiklos Szeredi err = PTR_ERR(inode); 1087b9ac5c27SMiklos Szeredi if (IS_ERR(inode)) 1088e6d2ebddSMiklos Szeredi goto out_free_oe; 1089e6d2ebddSMiklos Szeredi } 1090e6d2ebddSMiklos Szeredi 1091e6d2ebddSMiklos Szeredi revert_creds(old_cred); 1092*9d3dfea3SVivek Goyal if (origin_path) { 1093*9d3dfea3SVivek Goyal dput(origin_path->dentry); 1094*9d3dfea3SVivek Goyal kfree(origin_path); 1095*9d3dfea3SVivek Goyal } 1096359f392cSAmir Goldstein dput(index); 1097bbb1e54dSMiklos Szeredi kfree(stack); 109802b69b28SMiklos Szeredi kfree(d.redirect); 1099829c28beSAmir Goldstein return d_splice_alias(inode, dentry); 1100bbb1e54dSMiklos Szeredi 1101bbb1e54dSMiklos Szeredi out_free_oe: 1102e6d2ebddSMiklos Szeredi dentry->d_fsdata = NULL; 1103bbb1e54dSMiklos Szeredi kfree(oe); 1104bbb1e54dSMiklos Szeredi out_put: 1105359f392cSAmir Goldstein dput(index); 1106bbb1e54dSMiklos Szeredi for (i = 0; i < ctr; i++) 1107bbb1e54dSMiklos Szeredi dput(stack[i].dentry); 1108bbb1e54dSMiklos Szeredi kfree(stack); 1109bbb1e54dSMiklos Szeredi out_put_upper: 1110*9d3dfea3SVivek Goyal if (origin_path) { 1111*9d3dfea3SVivek Goyal dput(origin_path->dentry); 1112*9d3dfea3SVivek Goyal kfree(origin_path); 1113*9d3dfea3SVivek Goyal } 1114bbb1e54dSMiklos Szeredi dput(upperdentry); 111502b69b28SMiklos Szeredi kfree(upperredirect); 1116bbb1e54dSMiklos Szeredi out: 111702b69b28SMiklos Szeredi kfree(d.redirect); 1118bbb1e54dSMiklos Szeredi revert_creds(old_cred); 1119bbb1e54dSMiklos Szeredi return ERR_PTR(err); 1120bbb1e54dSMiklos Szeredi } 1121bbb1e54dSMiklos Szeredi 1122bbb1e54dSMiklos Szeredi bool ovl_lower_positive(struct dentry *dentry) 1123bbb1e54dSMiklos Szeredi { 1124bbb1e54dSMiklos Szeredi struct ovl_entry *poe = dentry->d_parent->d_fsdata; 1125bbb1e54dSMiklos Szeredi const struct qstr *name = &dentry->d_name; 11266d0a8a90SAmir Goldstein const struct cred *old_cred; 1127bbb1e54dSMiklos Szeredi unsigned int i; 1128bbb1e54dSMiklos Szeredi bool positive = false; 1129bbb1e54dSMiklos Szeredi bool done = false; 1130bbb1e54dSMiklos Szeredi 1131bbb1e54dSMiklos Szeredi /* 1132bbb1e54dSMiklos Szeredi * If dentry is negative, then lower is positive iff this is a 1133bbb1e54dSMiklos Szeredi * whiteout. 1134bbb1e54dSMiklos Szeredi */ 1135bbb1e54dSMiklos Szeredi if (!dentry->d_inode) 1136c62520a8SAmir Goldstein return ovl_dentry_is_opaque(dentry); 1137bbb1e54dSMiklos Szeredi 1138bbb1e54dSMiklos Szeredi /* Negative upper -> positive lower */ 113909d8b586SMiklos Szeredi if (!ovl_dentry_upper(dentry)) 1140bbb1e54dSMiklos Szeredi return true; 1141bbb1e54dSMiklos Szeredi 11426d0a8a90SAmir Goldstein old_cred = ovl_override_creds(dentry->d_sb); 1143bbb1e54dSMiklos Szeredi /* Positive upper -> have to look up lower to see whether it exists */ 1144bbb1e54dSMiklos Szeredi for (i = 0; !done && !positive && i < poe->numlower; i++) { 1145bbb1e54dSMiklos Szeredi struct dentry *this; 1146bbb1e54dSMiklos Szeredi struct dentry *lowerdir = poe->lowerstack[i].dentry; 1147bbb1e54dSMiklos Szeredi 1148bbb1e54dSMiklos Szeredi this = lookup_one_len_unlocked(name->name, lowerdir, 1149bbb1e54dSMiklos Szeredi name->len); 1150bbb1e54dSMiklos Szeredi if (IS_ERR(this)) { 1151bbb1e54dSMiklos Szeredi switch (PTR_ERR(this)) { 1152bbb1e54dSMiklos Szeredi case -ENOENT: 1153bbb1e54dSMiklos Szeredi case -ENAMETOOLONG: 1154bbb1e54dSMiklos Szeredi break; 1155bbb1e54dSMiklos Szeredi 1156bbb1e54dSMiklos Szeredi default: 1157bbb1e54dSMiklos Szeredi /* 1158bbb1e54dSMiklos Szeredi * Assume something is there, we just couldn't 1159bbb1e54dSMiklos Szeredi * access it. 1160bbb1e54dSMiklos Szeredi */ 1161bbb1e54dSMiklos Szeredi positive = true; 1162bbb1e54dSMiklos Szeredi break; 1163bbb1e54dSMiklos Szeredi } 1164bbb1e54dSMiklos Szeredi } else { 1165bbb1e54dSMiklos Szeredi if (this->d_inode) { 1166bbb1e54dSMiklos Szeredi positive = !ovl_is_whiteout(this); 1167bbb1e54dSMiklos Szeredi done = true; 1168bbb1e54dSMiklos Szeredi } 1169bbb1e54dSMiklos Szeredi dput(this); 1170bbb1e54dSMiklos Szeredi } 1171bbb1e54dSMiklos Szeredi } 11726d0a8a90SAmir Goldstein revert_creds(old_cred); 1173bbb1e54dSMiklos Szeredi 1174bbb1e54dSMiklos Szeredi return positive; 1175bbb1e54dSMiklos Szeredi } 1176