xref: /openbmc/linux/fs/overlayfs/copy_up.c (revision addee42a)
1 /*
2  *
3  * Copyright (C) 2011 Novell Inc.
4  *
5  * This program is free software; you can redistribute it and/or modify it
6  * under the terms of the GNU General Public License version 2 as published by
7  * the Free Software Foundation.
8  */
9 
10 #include <linux/module.h>
11 #include <linux/fs.h>
12 #include <linux/slab.h>
13 #include <linux/file.h>
14 #include <linux/splice.h>
15 #include <linux/xattr.h>
16 #include <linux/security.h>
17 #include <linux/uaccess.h>
18 #include <linux/sched/signal.h>
19 #include <linux/cred.h>
20 #include <linux/namei.h>
21 #include <linux/fdtable.h>
22 #include <linux/ratelimit.h>
23 #include <linux/exportfs.h>
24 #include "overlayfs.h"
25 
26 #define OVL_COPY_UP_CHUNK_SIZE (1 << 20)
27 
28 static bool __read_mostly ovl_check_copy_up;
29 module_param_named(check_copy_up, ovl_check_copy_up, bool,
30 		   S_IWUSR | S_IRUGO);
31 MODULE_PARM_DESC(ovl_check_copy_up,
32 		 "Warn on copy-up when causing process also has a R/O fd open");
33 
34 static int ovl_check_fd(const void *data, struct file *f, unsigned int fd)
35 {
36 	const struct dentry *dentry = data;
37 
38 	if (file_inode(f) == d_inode(dentry))
39 		pr_warn_ratelimited("overlayfs: Warning: Copying up %pD, but open R/O on fd %u which will cease to be coherent [pid=%d %s]\n",
40 				    f, fd, current->pid, current->comm);
41 	return 0;
42 }
43 
44 /*
45  * Check the fds open by this process and warn if something like the following
46  * scenario is about to occur:
47  *
48  *	fd1 = open("foo", O_RDONLY);
49  *	fd2 = open("foo", O_RDWR);
50  */
51 static void ovl_do_check_copy_up(struct dentry *dentry)
52 {
53 	if (ovl_check_copy_up)
54 		iterate_fd(current->files, 0, ovl_check_fd, dentry);
55 }
56 
57 int ovl_copy_xattr(struct dentry *old, struct dentry *new)
58 {
59 	ssize_t list_size, size, value_size = 0;
60 	char *buf, *name, *value = NULL;
61 	int uninitialized_var(error);
62 	size_t slen;
63 
64 	if (!(old->d_inode->i_opflags & IOP_XATTR) ||
65 	    !(new->d_inode->i_opflags & IOP_XATTR))
66 		return 0;
67 
68 	list_size = vfs_listxattr(old, NULL, 0);
69 	if (list_size <= 0) {
70 		if (list_size == -EOPNOTSUPP)
71 			return 0;
72 		return list_size;
73 	}
74 
75 	buf = kzalloc(list_size, GFP_KERNEL);
76 	if (!buf)
77 		return -ENOMEM;
78 
79 	list_size = vfs_listxattr(old, buf, list_size);
80 	if (list_size <= 0) {
81 		error = list_size;
82 		goto out;
83 	}
84 
85 	for (name = buf; list_size; name += slen) {
86 		slen = strnlen(name, list_size) + 1;
87 
88 		/* underlying fs providing us with an broken xattr list? */
89 		if (WARN_ON(slen > list_size)) {
90 			error = -EIO;
91 			break;
92 		}
93 		list_size -= slen;
94 
95 		if (ovl_is_private_xattr(name))
96 			continue;
97 retry:
98 		size = vfs_getxattr(old, name, value, value_size);
99 		if (size == -ERANGE)
100 			size = vfs_getxattr(old, name, NULL, 0);
101 
102 		if (size < 0) {
103 			error = size;
104 			break;
105 		}
106 
107 		if (size > value_size) {
108 			void *new;
109 
110 			new = krealloc(value, size, GFP_KERNEL);
111 			if (!new) {
112 				error = -ENOMEM;
113 				break;
114 			}
115 			value = new;
116 			value_size = size;
117 			goto retry;
118 		}
119 
120 		error = security_inode_copy_up_xattr(name);
121 		if (error < 0 && error != -EOPNOTSUPP)
122 			break;
123 		if (error == 1) {
124 			error = 0;
125 			continue; /* Discard */
126 		}
127 		error = vfs_setxattr(new, name, value, size, 0);
128 		if (error)
129 			break;
130 	}
131 	kfree(value);
132 out:
133 	kfree(buf);
134 	return error;
135 }
136 
137 static int ovl_copy_up_data(struct path *old, struct path *new, loff_t len)
138 {
139 	struct file *old_file;
140 	struct file *new_file;
141 	loff_t old_pos = 0;
142 	loff_t new_pos = 0;
143 	int error = 0;
144 
145 	if (len == 0)
146 		return 0;
147 
148 	old_file = ovl_path_open(old, O_LARGEFILE | O_RDONLY);
149 	if (IS_ERR(old_file))
150 		return PTR_ERR(old_file);
151 
152 	new_file = ovl_path_open(new, O_LARGEFILE | O_WRONLY);
153 	if (IS_ERR(new_file)) {
154 		error = PTR_ERR(new_file);
155 		goto out_fput;
156 	}
157 
158 	/* Try to use clone_file_range to clone up within the same fs */
159 	error = vfs_clone_file_range(old_file, 0, new_file, 0, len);
160 	if (!error)
161 		goto out;
162 	/* Couldn't clone, so now we try to copy the data */
163 	error = 0;
164 
165 	/* FIXME: copy up sparse files efficiently */
166 	while (len) {
167 		size_t this_len = OVL_COPY_UP_CHUNK_SIZE;
168 		long bytes;
169 
170 		if (len < this_len)
171 			this_len = len;
172 
173 		if (signal_pending_state(TASK_KILLABLE, current)) {
174 			error = -EINTR;
175 			break;
176 		}
177 
178 		bytes = do_splice_direct(old_file, &old_pos,
179 					 new_file, &new_pos,
180 					 this_len, SPLICE_F_MOVE);
181 		if (bytes <= 0) {
182 			error = bytes;
183 			break;
184 		}
185 		WARN_ON(old_pos != new_pos);
186 
187 		len -= bytes;
188 	}
189 out:
190 	if (!error)
191 		error = vfs_fsync(new_file, 0);
192 	fput(new_file);
193 out_fput:
194 	fput(old_file);
195 	return error;
196 }
197 
198 static int ovl_set_timestamps(struct dentry *upperdentry, struct kstat *stat)
199 {
200 	struct iattr attr = {
201 		.ia_valid =
202 		     ATTR_ATIME | ATTR_MTIME | ATTR_ATIME_SET | ATTR_MTIME_SET,
203 		.ia_atime = stat->atime,
204 		.ia_mtime = stat->mtime,
205 	};
206 
207 	return notify_change(upperdentry, &attr, NULL);
208 }
209 
210 int ovl_set_attr(struct dentry *upperdentry, struct kstat *stat)
211 {
212 	int err = 0;
213 
214 	if (!S_ISLNK(stat->mode)) {
215 		struct iattr attr = {
216 			.ia_valid = ATTR_MODE,
217 			.ia_mode = stat->mode,
218 		};
219 		err = notify_change(upperdentry, &attr, NULL);
220 	}
221 	if (!err) {
222 		struct iattr attr = {
223 			.ia_valid = ATTR_UID | ATTR_GID,
224 			.ia_uid = stat->uid,
225 			.ia_gid = stat->gid,
226 		};
227 		err = notify_change(upperdentry, &attr, NULL);
228 	}
229 	if (!err)
230 		ovl_set_timestamps(upperdentry, stat);
231 
232 	return err;
233 }
234 
235 struct ovl_fh *ovl_encode_real_fh(struct dentry *real, bool is_upper)
236 {
237 	struct ovl_fh *fh;
238 	int fh_type, fh_len, dwords;
239 	void *buf;
240 	int buflen = MAX_HANDLE_SZ;
241 	uuid_t *uuid = &real->d_sb->s_uuid;
242 
243 	buf = kmalloc(buflen, GFP_KERNEL);
244 	if (!buf)
245 		return ERR_PTR(-ENOMEM);
246 
247 	/*
248 	 * We encode a non-connectable file handle for non-dir, because we
249 	 * only need to find the lower inode number and we don't want to pay
250 	 * the price or reconnecting the dentry.
251 	 */
252 	dwords = buflen >> 2;
253 	fh_type = exportfs_encode_fh(real, buf, &dwords, 0);
254 	buflen = (dwords << 2);
255 
256 	fh = ERR_PTR(-EIO);
257 	if (WARN_ON(fh_type < 0) ||
258 	    WARN_ON(buflen > MAX_HANDLE_SZ) ||
259 	    WARN_ON(fh_type == FILEID_INVALID))
260 		goto out;
261 
262 	BUILD_BUG_ON(MAX_HANDLE_SZ + offsetof(struct ovl_fh, fid) > 255);
263 	fh_len = offsetof(struct ovl_fh, fid) + buflen;
264 	fh = kmalloc(fh_len, GFP_KERNEL);
265 	if (!fh) {
266 		fh = ERR_PTR(-ENOMEM);
267 		goto out;
268 	}
269 
270 	fh->version = OVL_FH_VERSION;
271 	fh->magic = OVL_FH_MAGIC;
272 	fh->type = fh_type;
273 	fh->flags = OVL_FH_FLAG_CPU_ENDIAN;
274 	/*
275 	 * When we will want to decode an overlay dentry from this handle
276 	 * and all layers are on the same fs, if we get a disconncted real
277 	 * dentry when we decode fid, the only way to tell if we should assign
278 	 * it to upperdentry or to lowerstack is by checking this flag.
279 	 */
280 	if (is_upper)
281 		fh->flags |= OVL_FH_FLAG_PATH_UPPER;
282 	fh->len = fh_len;
283 	fh->uuid = *uuid;
284 	memcpy(fh->fid, buf, buflen);
285 
286 out:
287 	kfree(buf);
288 	return fh;
289 }
290 
291 int ovl_set_origin(struct dentry *dentry, struct dentry *lower,
292 		   struct dentry *upper)
293 {
294 	const struct ovl_fh *fh = NULL;
295 	int err;
296 
297 	/*
298 	 * When lower layer doesn't support export operations store a 'null' fh,
299 	 * so we can use the overlay.origin xattr to distignuish between a copy
300 	 * up and a pure upper inode.
301 	 */
302 	if (ovl_can_decode_fh(lower->d_sb)) {
303 		fh = ovl_encode_real_fh(lower, false);
304 		if (IS_ERR(fh))
305 			return PTR_ERR(fh);
306 	}
307 
308 	/*
309 	 * Do not fail when upper doesn't support xattrs.
310 	 */
311 	err = ovl_check_setxattr(dentry, upper, OVL_XATTR_ORIGIN, fh,
312 				 fh ? fh->len : 0, 0);
313 	kfree(fh);
314 
315 	return err;
316 }
317 
318 /* Store file handle of @upper dir in @index dir entry */
319 static int ovl_set_upper_fh(struct dentry *upper, struct dentry *index)
320 {
321 	const struct ovl_fh *fh;
322 	int err;
323 
324 	fh = ovl_encode_real_fh(upper, true);
325 	if (IS_ERR(fh))
326 		return PTR_ERR(fh);
327 
328 	err = ovl_do_setxattr(index, OVL_XATTR_UPPER, fh, fh->len, 0);
329 
330 	kfree(fh);
331 	return err;
332 }
333 
334 /*
335  * Create and install index entry.
336  *
337  * Caller must hold i_mutex on indexdir.
338  */
339 static int ovl_create_index(struct dentry *dentry, struct dentry *origin,
340 			    struct dentry *upper)
341 {
342 	struct dentry *indexdir = ovl_indexdir(dentry->d_sb);
343 	struct inode *dir = d_inode(indexdir);
344 	struct dentry *index = NULL;
345 	struct dentry *temp = NULL;
346 	struct qstr name = { };
347 	int err;
348 
349 	/*
350 	 * For now this is only used for creating index entry for directories,
351 	 * because non-dir are copied up directly to index and then hardlinked
352 	 * to upper dir.
353 	 *
354 	 * TODO: implement create index for non-dir, so we can call it when
355 	 * encoding file handle for non-dir in case index does not exist.
356 	 */
357 	if (WARN_ON(!d_is_dir(dentry)))
358 		return -EIO;
359 
360 	/* Directory not expected to be indexed before copy up */
361 	if (WARN_ON(ovl_test_flag(OVL_INDEX, d_inode(dentry))))
362 		return -EIO;
363 
364 	err = ovl_get_index_name(origin, &name);
365 	if (err)
366 		return err;
367 
368 	temp = ovl_lookup_temp(indexdir);
369 	if (IS_ERR(temp))
370 		goto temp_err;
371 
372 	err = ovl_do_mkdir(dir, temp, S_IFDIR, true);
373 	if (err)
374 		goto out;
375 
376 	err = ovl_set_upper_fh(upper, temp);
377 	if (err)
378 		goto out_cleanup;
379 
380 	index = lookup_one_len(name.name, indexdir, name.len);
381 	if (IS_ERR(index)) {
382 		err = PTR_ERR(index);
383 	} else {
384 		err = ovl_do_rename(dir, temp, dir, index, 0);
385 		dput(index);
386 	}
387 
388 	if (err)
389 		goto out_cleanup;
390 
391 out:
392 	dput(temp);
393 	kfree(name.name);
394 	return err;
395 
396 temp_err:
397 	err = PTR_ERR(temp);
398 	temp = NULL;
399 	goto out;
400 
401 out_cleanup:
402 	ovl_cleanup(dir, temp);
403 	goto out;
404 }
405 
406 struct ovl_copy_up_ctx {
407 	struct dentry *parent;
408 	struct dentry *dentry;
409 	struct path lowerpath;
410 	struct kstat stat;
411 	struct kstat pstat;
412 	const char *link;
413 	struct dentry *destdir;
414 	struct qstr destname;
415 	struct dentry *workdir;
416 	bool tmpfile;
417 	bool origin;
418 	bool indexed;
419 };
420 
421 static int ovl_link_up(struct ovl_copy_up_ctx *c)
422 {
423 	int err;
424 	struct dentry *upper;
425 	struct dentry *upperdir = ovl_dentry_upper(c->parent);
426 	struct inode *udir = d_inode(upperdir);
427 
428 	/* Mark parent "impure" because it may now contain non-pure upper */
429 	err = ovl_set_impure(c->parent, upperdir);
430 	if (err)
431 		return err;
432 
433 	err = ovl_set_nlink_lower(c->dentry);
434 	if (err)
435 		return err;
436 
437 	inode_lock_nested(udir, I_MUTEX_PARENT);
438 	upper = lookup_one_len(c->dentry->d_name.name, upperdir,
439 			       c->dentry->d_name.len);
440 	err = PTR_ERR(upper);
441 	if (!IS_ERR(upper)) {
442 		err = ovl_do_link(ovl_dentry_upper(c->dentry), udir, upper,
443 				  true);
444 		dput(upper);
445 
446 		if (!err) {
447 			/* Restore timestamps on parent (best effort) */
448 			ovl_set_timestamps(upperdir, &c->pstat);
449 			ovl_dentry_set_upper_alias(c->dentry);
450 		}
451 	}
452 	inode_unlock(udir);
453 	if (err)
454 		return err;
455 
456 	err = ovl_set_nlink_upper(c->dentry);
457 
458 	return err;
459 }
460 
461 static int ovl_install_temp(struct ovl_copy_up_ctx *c, struct dentry *temp,
462 			    struct dentry **newdentry)
463 {
464 	int err;
465 	struct dentry *upper;
466 	struct inode *udir = d_inode(c->destdir);
467 
468 	upper = lookup_one_len(c->destname.name, c->destdir, c->destname.len);
469 	if (IS_ERR(upper))
470 		return PTR_ERR(upper);
471 
472 	if (c->tmpfile)
473 		err = ovl_do_link(temp, udir, upper, true);
474 	else
475 		err = ovl_do_rename(d_inode(c->workdir), temp, udir, upper, 0);
476 
477 	if (!err)
478 		*newdentry = dget(c->tmpfile ? upper : temp);
479 	dput(upper);
480 
481 	return err;
482 }
483 
484 static int ovl_get_tmpfile(struct ovl_copy_up_ctx *c, struct dentry **tempp)
485 {
486 	int err;
487 	struct dentry *temp;
488 	const struct cred *old_creds = NULL;
489 	struct cred *new_creds = NULL;
490 	struct cattr cattr = {
491 		/* Can't properly set mode on creation because of the umask */
492 		.mode = c->stat.mode & S_IFMT,
493 		.rdev = c->stat.rdev,
494 		.link = c->link
495 	};
496 
497 	err = security_inode_copy_up(c->dentry, &new_creds);
498 	if (err < 0)
499 		goto out;
500 
501 	if (new_creds)
502 		old_creds = override_creds(new_creds);
503 
504 	if (c->tmpfile) {
505 		temp = ovl_do_tmpfile(c->workdir, c->stat.mode);
506 		if (IS_ERR(temp))
507 			goto temp_err;
508 	} else {
509 		temp = ovl_lookup_temp(c->workdir);
510 		if (IS_ERR(temp))
511 			goto temp_err;
512 
513 		err = ovl_create_real(d_inode(c->workdir), temp, &cattr,
514 				      NULL, true);
515 		if (err) {
516 			dput(temp);
517 			goto out;
518 		}
519 	}
520 	err = 0;
521 	*tempp = temp;
522 out:
523 	if (new_creds) {
524 		revert_creds(old_creds);
525 		put_cred(new_creds);
526 	}
527 
528 	return err;
529 
530 temp_err:
531 	err = PTR_ERR(temp);
532 	goto out;
533 }
534 
535 static int ovl_copy_up_inode(struct ovl_copy_up_ctx *c, struct dentry *temp)
536 {
537 	int err;
538 
539 	if (S_ISREG(c->stat.mode)) {
540 		struct path upperpath;
541 
542 		ovl_path_upper(c->dentry, &upperpath);
543 		BUG_ON(upperpath.dentry != NULL);
544 		upperpath.dentry = temp;
545 
546 		err = ovl_copy_up_data(&c->lowerpath, &upperpath, c->stat.size);
547 		if (err)
548 			return err;
549 	}
550 
551 	err = ovl_copy_xattr(c->lowerpath.dentry, temp);
552 	if (err)
553 		return err;
554 
555 	inode_lock(temp->d_inode);
556 	err = ovl_set_attr(temp, &c->stat);
557 	inode_unlock(temp->d_inode);
558 	if (err)
559 		return err;
560 
561 	/*
562 	 * Store identifier of lower inode in upper inode xattr to
563 	 * allow lookup of the copy up origin inode.
564 	 *
565 	 * Don't set origin when we are breaking the association with a lower
566 	 * hard link.
567 	 */
568 	if (c->origin) {
569 		err = ovl_set_origin(c->dentry, c->lowerpath.dentry, temp);
570 		if (err)
571 			return err;
572 	}
573 
574 	return 0;
575 }
576 
577 static int ovl_copy_up_locked(struct ovl_copy_up_ctx *c)
578 {
579 	struct inode *udir = c->destdir->d_inode;
580 	struct inode *inode;
581 	struct dentry *newdentry = NULL;
582 	struct dentry *temp = NULL;
583 	int err;
584 
585 	err = ovl_get_tmpfile(c, &temp);
586 	if (err)
587 		goto out;
588 
589 	err = ovl_copy_up_inode(c, temp);
590 	if (err)
591 		goto out_cleanup;
592 
593 	if (S_ISDIR(c->stat.mode) && c->indexed) {
594 		err = ovl_create_index(c->dentry, c->lowerpath.dentry, temp);
595 		if (err)
596 			goto out_cleanup;
597 	}
598 
599 	if (c->tmpfile) {
600 		inode_lock_nested(udir, I_MUTEX_PARENT);
601 		err = ovl_install_temp(c, temp, &newdentry);
602 		inode_unlock(udir);
603 	} else {
604 		err = ovl_install_temp(c, temp, &newdentry);
605 	}
606 	if (err)
607 		goto out_cleanup;
608 
609 	inode = d_inode(c->dentry);
610 	ovl_inode_update(inode, newdentry);
611 	if (S_ISDIR(inode->i_mode))
612 		ovl_set_flag(OVL_WHITEOUTS, inode);
613 
614 out:
615 	dput(temp);
616 	return err;
617 
618 out_cleanup:
619 	if (!c->tmpfile)
620 		ovl_cleanup(d_inode(c->workdir), temp);
621 	goto out;
622 }
623 
624 /*
625  * Copy up a single dentry
626  *
627  * All renames start with copy up of source if necessary.  The actual
628  * rename will only proceed once the copy up was successful.  Copy up uses
629  * upper parent i_mutex for exclusion.  Since rename can change d_parent it
630  * is possible that the copy up will lock the old parent.  At that point
631  * the file will have already been copied up anyway.
632  */
633 static int ovl_do_copy_up(struct ovl_copy_up_ctx *c)
634 {
635 	int err;
636 	struct ovl_fs *ofs = c->dentry->d_sb->s_fs_info;
637 	bool to_index = false;
638 
639 	/*
640 	 * Indexed non-dir is copied up directly to the index entry and then
641 	 * hardlinked to upper dir. Indexed dir is copied up to indexdir,
642 	 * then index entry is created and then copied up dir installed.
643 	 * Copying dir up to indexdir instead of workdir simplifies locking.
644 	 */
645 	if (ovl_need_index(c->dentry)) {
646 		c->indexed = true;
647 		if (S_ISDIR(c->stat.mode))
648 			c->workdir = ovl_indexdir(c->dentry->d_sb);
649 		else
650 			to_index = true;
651 	}
652 
653 	if (S_ISDIR(c->stat.mode) || c->stat.nlink == 1 || to_index)
654 		c->origin = true;
655 
656 	if (to_index) {
657 		c->destdir = ovl_indexdir(c->dentry->d_sb);
658 		err = ovl_get_index_name(c->lowerpath.dentry, &c->destname);
659 		if (err)
660 			return err;
661 	} else if (WARN_ON(!c->parent)) {
662 		/* Disconnected dentry must be copied up to index dir */
663 		return -EIO;
664 	} else {
665 		/*
666 		 * Mark parent "impure" because it may now contain non-pure
667 		 * upper
668 		 */
669 		err = ovl_set_impure(c->parent, c->destdir);
670 		if (err)
671 			return err;
672 	}
673 
674 	/* Should we copyup with O_TMPFILE or with workdir? */
675 	if (S_ISREG(c->stat.mode) && ofs->tmpfile) {
676 		c->tmpfile = true;
677 		err = ovl_copy_up_locked(c);
678 	} else {
679 		err = ovl_lock_rename_workdir(c->workdir, c->destdir);
680 		if (!err) {
681 			err = ovl_copy_up_locked(c);
682 			unlock_rename(c->workdir, c->destdir);
683 		}
684 	}
685 
686 
687 	if (err)
688 		goto out;
689 
690 	if (c->indexed)
691 		ovl_set_flag(OVL_INDEX, d_inode(c->dentry));
692 
693 	if (to_index) {
694 		/* Initialize nlink for copy up of disconnected dentry */
695 		err = ovl_set_nlink_upper(c->dentry);
696 	} else {
697 		struct inode *udir = d_inode(c->destdir);
698 
699 		/* Restore timestamps on parent (best effort) */
700 		inode_lock(udir);
701 		ovl_set_timestamps(c->destdir, &c->pstat);
702 		inode_unlock(udir);
703 
704 		ovl_dentry_set_upper_alias(c->dentry);
705 	}
706 
707 out:
708 	if (to_index)
709 		kfree(c->destname.name);
710 	return err;
711 }
712 
713 static int ovl_copy_up_one(struct dentry *parent, struct dentry *dentry,
714 			   int flags)
715 {
716 	int err;
717 	DEFINE_DELAYED_CALL(done);
718 	struct path parentpath;
719 	struct ovl_copy_up_ctx ctx = {
720 		.parent = parent,
721 		.dentry = dentry,
722 		.workdir = ovl_workdir(dentry),
723 	};
724 
725 	if (WARN_ON(!ctx.workdir))
726 		return -EROFS;
727 
728 	ovl_path_lower(dentry, &ctx.lowerpath);
729 	err = vfs_getattr(&ctx.lowerpath, &ctx.stat,
730 			  STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
731 	if (err)
732 		return err;
733 
734 	if (parent) {
735 		ovl_path_upper(parent, &parentpath);
736 		ctx.destdir = parentpath.dentry;
737 		ctx.destname = dentry->d_name;
738 
739 		err = vfs_getattr(&parentpath, &ctx.pstat,
740 				  STATX_ATIME | STATX_MTIME,
741 				  AT_STATX_SYNC_AS_STAT);
742 		if (err)
743 			return err;
744 	}
745 
746 	/* maybe truncate regular file. this has no effect on dirs */
747 	if (flags & O_TRUNC)
748 		ctx.stat.size = 0;
749 
750 	if (S_ISLNK(ctx.stat.mode)) {
751 		ctx.link = vfs_get_link(ctx.lowerpath.dentry, &done);
752 		if (IS_ERR(ctx.link))
753 			return PTR_ERR(ctx.link);
754 	}
755 	ovl_do_check_copy_up(ctx.lowerpath.dentry);
756 
757 	err = ovl_copy_up_start(dentry);
758 	/* err < 0: interrupted, err > 0: raced with another copy-up */
759 	if (unlikely(err)) {
760 		if (err > 0)
761 			err = 0;
762 	} else {
763 		if (!ovl_dentry_upper(dentry))
764 			err = ovl_do_copy_up(&ctx);
765 		if (!err && parent && !ovl_dentry_has_upper_alias(dentry))
766 			err = ovl_link_up(&ctx);
767 		ovl_copy_up_end(dentry);
768 	}
769 	do_delayed_call(&done);
770 
771 	return err;
772 }
773 
774 int ovl_copy_up_flags(struct dentry *dentry, int flags)
775 {
776 	int err = 0;
777 	const struct cred *old_cred = ovl_override_creds(dentry->d_sb);
778 	bool disconnected = (dentry->d_flags & DCACHE_DISCONNECTED);
779 
780 	/*
781 	 * With NFS export, copy up can get called for a disconnected non-dir.
782 	 * In this case, we will copy up lower inode to index dir without
783 	 * linking it to upper dir.
784 	 */
785 	if (WARN_ON(disconnected && d_is_dir(dentry)))
786 		return -EIO;
787 
788 	while (!err) {
789 		struct dentry *next;
790 		struct dentry *parent = NULL;
791 
792 		/*
793 		 * Check if copy-up has happened as well as for upper alias (in
794 		 * case of hard links) is there.
795 		 *
796 		 * Both checks are lockless:
797 		 *  - false negatives: will recheck under oi->lock
798 		 *  - false positives:
799 		 *    + ovl_dentry_upper() uses memory barriers to ensure the
800 		 *      upper dentry is up-to-date
801 		 *    + ovl_dentry_has_upper_alias() relies on locking of
802 		 *      upper parent i_rwsem to prevent reordering copy-up
803 		 *      with rename.
804 		 */
805 		if (ovl_dentry_upper(dentry) &&
806 		    (ovl_dentry_has_upper_alias(dentry) || disconnected))
807 			break;
808 
809 		next = dget(dentry);
810 		/* find the topmost dentry not yet copied up */
811 		for (; !disconnected;) {
812 			parent = dget_parent(next);
813 
814 			if (ovl_dentry_upper(parent))
815 				break;
816 
817 			dput(next);
818 			next = parent;
819 		}
820 
821 		err = ovl_copy_up_one(parent, next, flags);
822 
823 		dput(parent);
824 		dput(next);
825 	}
826 	revert_creds(old_cred);
827 
828 	return err;
829 }
830 
831 int ovl_copy_up(struct dentry *dentry)
832 {
833 	return ovl_copy_up_flags(dentry, 0);
834 }
835