xref: /openbmc/linux/fs/overlayfs/namei.c (revision 5522c9c7)
1d2912cb1SThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2bbb1e54dSMiklos Szeredi /*
3bbb1e54dSMiklos Szeredi  * Copyright (C) 2011 Novell Inc.
4bbb1e54dSMiklos Szeredi  * Copyright (C) 2016 Red Hat, Inc.
5bbb1e54dSMiklos Szeredi  */
6bbb1e54dSMiklos Szeredi 
7bbb1e54dSMiklos Szeredi #include <linux/fs.h>
85b825c3aSIngo Molnar #include <linux/cred.h>
99ee60ce2SAmir Goldstein #include <linux/ctype.h>
10bbb1e54dSMiklos Szeredi #include <linux/namei.h>
11bbb1e54dSMiklos Szeredi #include <linux/xattr.h>
1202b69b28SMiklos Szeredi #include <linux/ratelimit.h>
13a9d01957SAmir Goldstein #include <linux/mount.h>
14a9d01957SAmir Goldstein #include <linux/exportfs.h>
15bbb1e54dSMiklos Szeredi #include "overlayfs.h"
16bbb1e54dSMiklos Szeredi 
17e28edc46SMiklos Szeredi struct ovl_lookup_data {
18146d62e5SAmir Goldstein 	struct super_block *sb;
19dad7017aSChristian Brauner 	struct vfsmount *mnt;
20e28edc46SMiklos Szeredi 	struct qstr name;
21e28edc46SMiklos Szeredi 	bool is_dir;
22e28edc46SMiklos Szeredi 	bool opaque;
23e28edc46SMiklos Szeredi 	bool stop;
24e28edc46SMiklos Szeredi 	bool last;
2502b69b28SMiklos Szeredi 	char *redirect;
269d3dfea3SVivek Goyal 	bool metacopy;
27e28edc46SMiklos Szeredi };
28bbb1e54dSMiklos Szeredi 
292d343087SAl Viro static int ovl_check_redirect(const struct path *path, struct ovl_lookup_data *d,
3002b69b28SMiklos Szeredi 			      size_t prelen, const char *post)
3102b69b28SMiklos Szeredi {
3202b69b28SMiklos Szeredi 	int res;
330a2d0d3fSVivek Goyal 	char *buf;
34610afc0bSMiklos Szeredi 	struct ovl_fs *ofs = OVL_FS(d->sb);
3502b69b28SMiklos Szeredi 
36dad7017aSChristian Brauner 	buf = ovl_get_redirect_xattr(ofs, path, prelen + strlen(post));
370a2d0d3fSVivek Goyal 	if (IS_ERR_OR_NULL(buf))
380a2d0d3fSVivek Goyal 		return PTR_ERR(buf);
3902b69b28SMiklos Szeredi 
4002b69b28SMiklos Szeredi 	if (buf[0] == '/') {
413ec9b3faSAmir Goldstein 		/*
423ec9b3faSAmir Goldstein 		 * One of the ancestor path elements in an absolute path
433ec9b3faSAmir Goldstein 		 * lookup in ovl_lookup_layer() could have been opaque and
443ec9b3faSAmir Goldstein 		 * that will stop further lookup in lower layers (d->stop=true)
454f119628SWilliam Dean 		 * But we have found an absolute redirect in descendant path
463ec9b3faSAmir Goldstein 		 * element and that should force continue lookup in lower
473ec9b3faSAmir Goldstein 		 * layers (reset d->stop).
483ec9b3faSAmir Goldstein 		 */
493ec9b3faSAmir Goldstein 		d->stop = false;
5002b69b28SMiklos Szeredi 	} else {
510a2d0d3fSVivek Goyal 		res = strlen(buf) + 1;
5202b69b28SMiklos Szeredi 		memmove(buf + prelen, buf, res);
5302b69b28SMiklos Szeredi 		memcpy(buf, d->name.name, prelen);
5402b69b28SMiklos Szeredi 	}
5502b69b28SMiklos Szeredi 
5602b69b28SMiklos Szeredi 	strcat(buf, post);
5702b69b28SMiklos Szeredi 	kfree(d->redirect);
5802b69b28SMiklos Szeredi 	d->redirect = buf;
5902b69b28SMiklos Szeredi 	d->name.name = d->redirect;
6002b69b28SMiklos Szeredi 	d->name.len = strlen(d->redirect);
6102b69b28SMiklos Szeredi 
6202b69b28SMiklos Szeredi 	return 0;
6302b69b28SMiklos Szeredi }
6402b69b28SMiklos Szeredi 
65a9d01957SAmir Goldstein static int ovl_acceptable(void *ctx, struct dentry *dentry)
66a9d01957SAmir Goldstein {
67e8f9e5b7SAmir Goldstein 	/*
68e8f9e5b7SAmir Goldstein 	 * A non-dir origin may be disconnected, which is fine, because
69e8f9e5b7SAmir Goldstein 	 * we only need it for its unique inode number.
70e8f9e5b7SAmir Goldstein 	 */
71e8f9e5b7SAmir Goldstein 	if (!d_is_dir(dentry))
72a9d01957SAmir Goldstein 		return 1;
73e8f9e5b7SAmir Goldstein 
74e8f9e5b7SAmir Goldstein 	/* Don't decode a deleted empty directory */
75e8f9e5b7SAmir Goldstein 	if (d_unhashed(dentry))
76e8f9e5b7SAmir Goldstein 		return 0;
77e8f9e5b7SAmir Goldstein 
78e8f9e5b7SAmir Goldstein 	/* Check if directory belongs to the layer we are decoding from */
79e8f9e5b7SAmir Goldstein 	return is_subdir(dentry, ((struct vfsmount *)ctx)->mnt_root);
80a9d01957SAmir Goldstein }
81a9d01957SAmir Goldstein 
822e1a5328SAmir Goldstein /*
832e1a5328SAmir Goldstein  * Check validity of an overlay file handle buffer.
842e1a5328SAmir Goldstein  *
852e1a5328SAmir Goldstein  * Return 0 for a valid file handle.
862e1a5328SAmir Goldstein  * Return -ENODATA for "origin unknown".
872e1a5328SAmir Goldstein  * Return <0 for an invalid file handle.
882e1a5328SAmir Goldstein  */
89cbe7fba8SAmir Goldstein int ovl_check_fb_len(struct ovl_fb *fb, int fb_len)
902e1a5328SAmir Goldstein {
91cbe7fba8SAmir Goldstein 	if (fb_len < sizeof(struct ovl_fb) || fb_len < fb->len)
922e1a5328SAmir Goldstein 		return -EINVAL;
932e1a5328SAmir Goldstein 
94cbe7fba8SAmir Goldstein 	if (fb->magic != OVL_FH_MAGIC)
952e1a5328SAmir Goldstein 		return -EINVAL;
962e1a5328SAmir Goldstein 
972e1a5328SAmir Goldstein 	/* Treat larger version and unknown flags as "origin unknown" */
98cbe7fba8SAmir Goldstein 	if (fb->version > OVL_FH_VERSION || fb->flags & ~OVL_FH_FLAG_ALL)
992e1a5328SAmir Goldstein 		return -ENODATA;
1002e1a5328SAmir Goldstein 
1012e1a5328SAmir Goldstein 	/* Treat endianness mismatch as "origin unknown" */
102cbe7fba8SAmir Goldstein 	if (!(fb->flags & OVL_FH_FLAG_ANY_ENDIAN) &&
103cbe7fba8SAmir Goldstein 	    (fb->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN)
1042e1a5328SAmir Goldstein 		return -ENODATA;
1052e1a5328SAmir Goldstein 
1062e1a5328SAmir Goldstein 	return 0;
1072e1a5328SAmir Goldstein }
1082e1a5328SAmir Goldstein 
109dad7017aSChristian Brauner static struct ovl_fh *ovl_get_fh(struct ovl_fs *ofs, struct dentry *upperdentry,
11043d193f8SMiklos Szeredi 				 enum ovl_xattr ox)
111a9d01957SAmir Goldstein {
1122e1a5328SAmir Goldstein 	int res, err;
113a9d01957SAmir Goldstein 	struct ovl_fh *fh = NULL;
114a9d01957SAmir Goldstein 
115dad7017aSChristian Brauner 	res = ovl_getxattr_upper(ofs, upperdentry, ox, NULL, 0);
116a9d01957SAmir Goldstein 	if (res < 0) {
117a9d01957SAmir Goldstein 		if (res == -ENODATA || res == -EOPNOTSUPP)
118a9d01957SAmir Goldstein 			return NULL;
119a9d01957SAmir Goldstein 		goto fail;
120a9d01957SAmir Goldstein 	}
121a9d01957SAmir Goldstein 	/* Zero size value means "copied up but origin unknown" */
122a9d01957SAmir Goldstein 	if (res == 0)
123a9d01957SAmir Goldstein 		return NULL;
124a9d01957SAmir Goldstein 
125cbe7fba8SAmir Goldstein 	fh = kzalloc(res + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
126a9d01957SAmir Goldstein 	if (!fh)
127a9d01957SAmir Goldstein 		return ERR_PTR(-ENOMEM);
128a9d01957SAmir Goldstein 
129dad7017aSChristian Brauner 	res = ovl_getxattr_upper(ofs, upperdentry, ox, fh->buf, res);
130a9d01957SAmir Goldstein 	if (res < 0)
131a9d01957SAmir Goldstein 		goto fail;
132a9d01957SAmir Goldstein 
133cbe7fba8SAmir Goldstein 	err = ovl_check_fb_len(&fh->fb, res);
1342e1a5328SAmir Goldstein 	if (err < 0) {
1352e1a5328SAmir Goldstein 		if (err == -ENODATA)
136a9d01957SAmir Goldstein 			goto out;
1372e1a5328SAmir Goldstein 		goto invalid;
1382e1a5328SAmir Goldstein 	}
139a9d01957SAmir Goldstein 
1408b88a2e6SAmir Goldstein 	return fh;
1418b88a2e6SAmir Goldstein 
1428b88a2e6SAmir Goldstein out:
1438b88a2e6SAmir Goldstein 	kfree(fh);
1448b88a2e6SAmir Goldstein 	return NULL;
1458b88a2e6SAmir Goldstein 
1468b88a2e6SAmir Goldstein fail:
1471bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to get origin (%i)\n", res);
1488b88a2e6SAmir Goldstein 	goto out;
1498b88a2e6SAmir Goldstein invalid:
1501bd0a3aeSlijiazi 	pr_warn_ratelimited("invalid origin (%*phN)\n", res, fh);
1518b88a2e6SAmir Goldstein 	goto out;
1528b88a2e6SAmir Goldstein }
1538b88a2e6SAmir Goldstein 
1541cdb0cb6SPavel Tikhomirov struct dentry *ovl_decode_real_fh(struct ovl_fs *ofs, struct ovl_fh *fh,
1551cdb0cb6SPavel Tikhomirov 				  struct vfsmount *mnt, bool connected)
1568b88a2e6SAmir Goldstein {
157e8f9e5b7SAmir Goldstein 	struct dentry *real;
1588b88a2e6SAmir Goldstein 	int bytes;
1598b88a2e6SAmir Goldstein 
160c846af05SMiklos Szeredi 	if (!capable(CAP_DAC_READ_SEARCH))
161c846af05SMiklos Szeredi 		return NULL;
162c846af05SMiklos Szeredi 
163a9d01957SAmir Goldstein 	/*
164a9d01957SAmir Goldstein 	 * Make sure that the stored uuid matches the uuid of the lower
165a9d01957SAmir Goldstein 	 * layer where file handle will be decoded.
1665830fb6bSPavel Tikhomirov 	 * In case of uuid=off option just make sure that stored uuid is null.
167a9d01957SAmir Goldstein 	 */
1685830fb6bSPavel Tikhomirov 	if (ofs->config.uuid ? !uuid_equal(&fh->fb.uuid, &mnt->mnt_sb->s_uuid) :
1695830fb6bSPavel Tikhomirov 			      !uuid_is_null(&fh->fb.uuid))
1702e1a5328SAmir Goldstein 		return NULL;
171a9d01957SAmir Goldstein 
172cbe7fba8SAmir Goldstein 	bytes = (fh->fb.len - offsetof(struct ovl_fb, fid));
173cbe7fba8SAmir Goldstein 	real = exportfs_decode_fh(mnt, (struct fid *)fh->fb.fid,
174cbe7fba8SAmir Goldstein 				  bytes >> 2, (int)fh->fb.type,
1758a22efa1SAmir Goldstein 				  connected ? ovl_acceptable : NULL, mnt);
176e8f9e5b7SAmir Goldstein 	if (IS_ERR(real)) {
177e8f9e5b7SAmir Goldstein 		/*
178e8f9e5b7SAmir Goldstein 		 * Treat stale file handle to lower file as "origin unknown".
179e8f9e5b7SAmir Goldstein 		 * upper file handle could become stale when upper file is
180e8f9e5b7SAmir Goldstein 		 * unlinked and this information is needed to handle stale
181e8f9e5b7SAmir Goldstein 		 * index entries correctly.
182e8f9e5b7SAmir Goldstein 		 */
183e8f9e5b7SAmir Goldstein 		if (real == ERR_PTR(-ESTALE) &&
184cbe7fba8SAmir Goldstein 		    !(fh->fb.flags & OVL_FH_FLAG_PATH_UPPER))
185e8f9e5b7SAmir Goldstein 			real = NULL;
186e8f9e5b7SAmir Goldstein 		return real;
187a9d01957SAmir Goldstein 	}
188a9d01957SAmir Goldstein 
189e8f9e5b7SAmir Goldstein 	if (ovl_dentry_weird(real)) {
190e8f9e5b7SAmir Goldstein 		dput(real);
1912e1a5328SAmir Goldstein 		return NULL;
1922e1a5328SAmir Goldstein 	}
1932e1a5328SAmir Goldstein 
194e8f9e5b7SAmir Goldstein 	return real;
195a9d01957SAmir Goldstein }
196a9d01957SAmir Goldstein 
1972d343087SAl Viro static bool ovl_is_opaquedir(struct ovl_fs *ofs, const struct path *path)
198ee1d6d37SAmir Goldstein {
199dad7017aSChristian Brauner 	return ovl_path_check_dir_xattr(ofs, path, OVL_XATTR_OPAQUE);
200ee1d6d37SAmir Goldstein }
201ee1d6d37SAmir Goldstein 
202ba9ea771SChristian Brauner static struct dentry *ovl_lookup_positive_unlocked(struct ovl_lookup_data *d,
203ba9ea771SChristian Brauner 						   const char *name,
2041434a65eSChengguang Xu 						   struct dentry *base, int len,
2051434a65eSChengguang Xu 						   bool drop_negative)
2061434a65eSChengguang Xu {
2074609e1f1SChristian Brauner 	struct dentry *ret = lookup_one_unlocked(mnt_idmap(d->mnt), name, base, len);
2081434a65eSChengguang Xu 
2091434a65eSChengguang Xu 	if (!IS_ERR(ret) && d_flags_negative(smp_load_acquire(&ret->d_flags))) {
2101434a65eSChengguang Xu 		if (drop_negative && ret->d_lockref.count == 1) {
2111434a65eSChengguang Xu 			spin_lock(&ret->d_lock);
2121434a65eSChengguang Xu 			/* Recheck condition under lock */
2131434a65eSChengguang Xu 			if (d_is_negative(ret) && ret->d_lockref.count == 1)
2141434a65eSChengguang Xu 				__d_drop(ret);
2151434a65eSChengguang Xu 			spin_unlock(&ret->d_lock);
2161434a65eSChengguang Xu 		}
2171434a65eSChengguang Xu 		dput(ret);
2181434a65eSChengguang Xu 		ret = ERR_PTR(-ENOENT);
2191434a65eSChengguang Xu 	}
2201434a65eSChengguang Xu 	return ret;
2211434a65eSChengguang Xu }
2221434a65eSChengguang Xu 
223e28edc46SMiklos Szeredi static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d,
224e28edc46SMiklos Szeredi 			     const char *name, unsigned int namelen,
22502b69b28SMiklos Szeredi 			     size_t prelen, const char *post,
2261434a65eSChengguang Xu 			     struct dentry **ret, bool drop_negative)
227e28edc46SMiklos Szeredi {
228e28edc46SMiklos Szeredi 	struct dentry *this;
229dad7017aSChristian Brauner 	struct path path;
230e28edc46SMiklos Szeredi 	int err;
231102b0d11SVivek Goyal 	bool last_element = !post[0];
232e28edc46SMiklos Szeredi 
233ba9ea771SChristian Brauner 	this = ovl_lookup_positive_unlocked(d, name, base, namelen, drop_negative);
234e28edc46SMiklos Szeredi 	if (IS_ERR(this)) {
235e28edc46SMiklos Szeredi 		err = PTR_ERR(this);
236e28edc46SMiklos Szeredi 		this = NULL;
237e28edc46SMiklos Szeredi 		if (err == -ENOENT || err == -ENAMETOOLONG)
238e28edc46SMiklos Szeredi 			goto out;
239e28edc46SMiklos Szeredi 		goto out_err;
240e28edc46SMiklos Szeredi 	}
241e28edc46SMiklos Szeredi 
242e28edc46SMiklos Szeredi 	if (ovl_dentry_weird(this)) {
243e28edc46SMiklos Szeredi 		/* Don't support traversing automounts and other weirdness */
244e28edc46SMiklos Szeredi 		err = -EREMOTE;
245e28edc46SMiklos Szeredi 		goto out_err;
246e28edc46SMiklos Szeredi 	}
247e28edc46SMiklos Szeredi 	if (ovl_is_whiteout(this)) {
248e28edc46SMiklos Szeredi 		d->stop = d->opaque = true;
249e28edc46SMiklos Szeredi 		goto put_and_out;
250e28edc46SMiklos Szeredi 	}
2513a291774SMiklos Szeredi 	/*
2529d3dfea3SVivek Goyal 	 * This dentry should be a regular file if previous layer lookup
2539d3dfea3SVivek Goyal 	 * found a metacopy dentry.
2543a291774SMiklos Szeredi 	 */
2559d3dfea3SVivek Goyal 	if (last_element && d->metacopy && !d_is_reg(this)) {
2569d3dfea3SVivek Goyal 		d->stop = true;
2579d3dfea3SVivek Goyal 		goto put_and_out;
2589d3dfea3SVivek Goyal 	}
259dad7017aSChristian Brauner 
260dad7017aSChristian Brauner 	path.dentry = this;
261dad7017aSChristian Brauner 	path.mnt = d->mnt;
2629d3dfea3SVivek Goyal 	if (!d_can_lookup(this)) {
2639d3dfea3SVivek Goyal 		if (d->is_dir || !last_element) {
2649d3dfea3SVivek Goyal 			d->stop = true;
2659d3dfea3SVivek Goyal 			goto put_and_out;
2669d3dfea3SVivek Goyal 		}
267dad7017aSChristian Brauner 		err = ovl_check_metacopy_xattr(OVL_FS(d->sb), &path);
2689d3dfea3SVivek Goyal 		if (err < 0)
2699d3dfea3SVivek Goyal 			goto out_err;
2709d3dfea3SVivek Goyal 
2719d3dfea3SVivek Goyal 		d->metacopy = err;
2729d3dfea3SVivek Goyal 		d->stop = !d->metacopy;
273b8a8824cSVivek Goyal 		if (!d->metacopy || d->last)
274e28edc46SMiklos Szeredi 			goto out;
2750618a816SVivek Goyal 	} else {
276146d62e5SAmir Goldstein 		if (ovl_lookup_trap_inode(d->sb, this)) {
277146d62e5SAmir Goldstein 			/* Caught in a trap of overlapping layers */
278146d62e5SAmir Goldstein 			err = -ELOOP;
279146d62e5SAmir Goldstein 			goto out_err;
280146d62e5SAmir Goldstein 		}
281146d62e5SAmir Goldstein 
282102b0d11SVivek Goyal 		if (last_element)
283e28edc46SMiklos Szeredi 			d->is_dir = true;
284e9b77f90SVivek Goyal 		if (d->last)
285e9b77f90SVivek Goyal 			goto out;
286e9b77f90SVivek Goyal 
287dad7017aSChristian Brauner 		if (ovl_is_opaquedir(OVL_FS(d->sb), &path)) {
288102b0d11SVivek Goyal 			d->stop = true;
289102b0d11SVivek Goyal 			if (last_element)
290102b0d11SVivek Goyal 				d->opaque = true;
291e28edc46SMiklos Szeredi 			goto out;
292e28edc46SMiklos Szeredi 		}
2930618a816SVivek Goyal 	}
294dad7017aSChristian Brauner 	err = ovl_check_redirect(&path, d, prelen, post);
29502b69b28SMiklos Szeredi 	if (err)
29602b69b28SMiklos Szeredi 		goto out_err;
297e28edc46SMiklos Szeredi out:
298e28edc46SMiklos Szeredi 	*ret = this;
299e28edc46SMiklos Szeredi 	return 0;
300e28edc46SMiklos Szeredi 
301e28edc46SMiklos Szeredi put_and_out:
302e28edc46SMiklos Szeredi 	dput(this);
303e28edc46SMiklos Szeredi 	this = NULL;
304e28edc46SMiklos Szeredi 	goto out;
305e28edc46SMiklos Szeredi 
306e28edc46SMiklos Szeredi out_err:
307e28edc46SMiklos Szeredi 	dput(this);
308e28edc46SMiklos Szeredi 	return err;
309e28edc46SMiklos Szeredi }
310e28edc46SMiklos Szeredi 
311e28edc46SMiklos Szeredi static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d,
3121434a65eSChengguang Xu 			    struct dentry **ret, bool drop_negative)
313e28edc46SMiklos Szeredi {
3144c7d0c9cSAmir Goldstein 	/* Counting down from the end, since the prefix can change */
3154c7d0c9cSAmir Goldstein 	size_t rem = d->name.len - 1;
31602b69b28SMiklos Szeredi 	struct dentry *dentry = NULL;
31702b69b28SMiklos Szeredi 	int err;
31802b69b28SMiklos Szeredi 
3194c7d0c9cSAmir Goldstein 	if (d->name.name[0] != '/')
32002b69b28SMiklos Szeredi 		return ovl_lookup_single(base, d, d->name.name, d->name.len,
3211434a65eSChengguang Xu 					 0, "", ret, drop_negative);
32202b69b28SMiklos Szeredi 
3234c7d0c9cSAmir Goldstein 	while (!IS_ERR_OR_NULL(base) && d_can_lookup(base)) {
3244c7d0c9cSAmir Goldstein 		const char *s = d->name.name + d->name.len - rem;
32502b69b28SMiklos Szeredi 		const char *next = strchrnul(s, '/');
3264c7d0c9cSAmir Goldstein 		size_t thislen = next - s;
3274c7d0c9cSAmir Goldstein 		bool end = !next[0];
32802b69b28SMiklos Szeredi 
3294c7d0c9cSAmir Goldstein 		/* Verify we did not go off the rails */
3304c7d0c9cSAmir Goldstein 		if (WARN_ON(s[-1] != '/'))
33102b69b28SMiklos Szeredi 			return -EIO;
33202b69b28SMiklos Szeredi 
3334c7d0c9cSAmir Goldstein 		err = ovl_lookup_single(base, d, s, thislen,
3341434a65eSChengguang Xu 					d->name.len - rem, next, &base,
3351434a65eSChengguang Xu 					drop_negative);
33602b69b28SMiklos Szeredi 		dput(dentry);
33702b69b28SMiklos Szeredi 		if (err)
33802b69b28SMiklos Szeredi 			return err;
33902b69b28SMiklos Szeredi 		dentry = base;
3404c7d0c9cSAmir Goldstein 		if (end)
3414c7d0c9cSAmir Goldstein 			break;
3424c7d0c9cSAmir Goldstein 
3434c7d0c9cSAmir Goldstein 		rem -= thislen + 1;
3444c7d0c9cSAmir Goldstein 
3454c7d0c9cSAmir Goldstein 		if (WARN_ON(rem >= d->name.len))
3464c7d0c9cSAmir Goldstein 			return -EIO;
34702b69b28SMiklos Szeredi 	}
34802b69b28SMiklos Szeredi 	*ret = dentry;
34902b69b28SMiklos Szeredi 	return 0;
350e28edc46SMiklos Szeredi }
351e28edc46SMiklos Szeredi 
352a9d01957SAmir Goldstein 
3538a22efa1SAmir Goldstein int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, bool connected,
354f941866fSAmir Goldstein 			struct dentry *upperdentry, struct ovl_path **stackp)
355a9d01957SAmir Goldstein {
356f7d3dacaSAmir Goldstein 	struct dentry *origin = NULL;
357f7d3dacaSAmir Goldstein 	int i;
358a9d01957SAmir Goldstein 
35994375f9dSAmir Goldstein 	for (i = 1; i < ofs->numlayer; i++) {
3607e63c87fSAmir Goldstein 		/*
3617e63c87fSAmir Goldstein 		 * If lower fs uuid is not unique among lower fs we cannot match
3627e63c87fSAmir Goldstein 		 * fh->uuid to layer.
3637e63c87fSAmir Goldstein 		 */
36494375f9dSAmir Goldstein 		if (ofs->layers[i].fsid &&
36594375f9dSAmir Goldstein 		    ofs->layers[i].fs->bad_uuid)
3667e63c87fSAmir Goldstein 			continue;
3677e63c87fSAmir Goldstein 
3681cdb0cb6SPavel Tikhomirov 		origin = ovl_decode_real_fh(ofs, fh, ofs->layers[i].mnt,
3698a22efa1SAmir Goldstein 					    connected);
370f7d3dacaSAmir Goldstein 		if (origin)
371f7d3dacaSAmir Goldstein 			break;
372f7d3dacaSAmir Goldstein 	}
373f7d3dacaSAmir Goldstein 
374f7d3dacaSAmir Goldstein 	if (!origin)
3752e1a5328SAmir Goldstein 		return -ESTALE;
3762e1a5328SAmir Goldstein 	else if (IS_ERR(origin))
3772e1a5328SAmir Goldstein 		return PTR_ERR(origin);
378f7d3dacaSAmir Goldstein 
379f941866fSAmir Goldstein 	if (upperdentry && !ovl_is_whiteout(upperdentry) &&
3806e3e2c43SAl Viro 	    inode_wrong_type(d_inode(upperdentry), d_inode(origin)->i_mode))
3812e1a5328SAmir Goldstein 		goto invalid;
3822e1a5328SAmir Goldstein 
383415543d5SAmir Goldstein 	if (!*stackp)
384b9343632SChandan Rajendra 		*stackp = kmalloc(sizeof(struct ovl_path), GFP_KERNEL);
385a9d01957SAmir Goldstein 	if (!*stackp) {
386a9d01957SAmir Goldstein 		dput(origin);
387a9d01957SAmir Goldstein 		return -ENOMEM;
388a9d01957SAmir Goldstein 	}
3891eff1a1dSAmir Goldstein 	**stackp = (struct ovl_path){
3901eff1a1dSAmir Goldstein 		.dentry = origin,
39194375f9dSAmir Goldstein 		.layer = &ofs->layers[i]
3921eff1a1dSAmir Goldstein 	};
393a9d01957SAmir Goldstein 
394a9d01957SAmir Goldstein 	return 0;
3952e1a5328SAmir Goldstein 
3962e1a5328SAmir Goldstein invalid:
3971bd0a3aeSlijiazi 	pr_warn_ratelimited("invalid origin (%pd2, ftype=%x, origin ftype=%x).\n",
3982e1a5328SAmir Goldstein 			    upperdentry, d_inode(upperdentry)->i_mode & S_IFMT,
3992e1a5328SAmir Goldstein 			    d_inode(origin)->i_mode & S_IFMT);
4002e1a5328SAmir Goldstein 	dput(origin);
401ffb24e3cSAmir Goldstein 	return -ESTALE;
4022e1a5328SAmir Goldstein }
4032e1a5328SAmir Goldstein 
4041eff1a1dSAmir Goldstein static int ovl_check_origin(struct ovl_fs *ofs, struct dentry *upperdentry,
405d78a0dcfSyoungjun 			    struct ovl_path **stackp)
4062e1a5328SAmir Goldstein {
407610afc0bSMiklos Szeredi 	struct ovl_fh *fh = ovl_get_fh(ofs, upperdentry, OVL_XATTR_ORIGIN);
4082e1a5328SAmir Goldstein 	int err;
4092e1a5328SAmir Goldstein 
4102e1a5328SAmir Goldstein 	if (IS_ERR_OR_NULL(fh))
4112e1a5328SAmir Goldstein 		return PTR_ERR(fh);
4122e1a5328SAmir Goldstein 
4138a22efa1SAmir Goldstein 	err = ovl_check_origin_fh(ofs, fh, false, upperdentry, stackp);
4142e1a5328SAmir Goldstein 	kfree(fh);
4152e1a5328SAmir Goldstein 
4162e1a5328SAmir Goldstein 	if (err) {
4172e1a5328SAmir Goldstein 		if (err == -ESTALE)
4182e1a5328SAmir Goldstein 			return 0;
4192e1a5328SAmir Goldstein 		return err;
4202e1a5328SAmir Goldstein 	}
4212e1a5328SAmir Goldstein 
4222e1a5328SAmir Goldstein 	return 0;
423a9d01957SAmir Goldstein }
424a9d01957SAmir Goldstein 
425bbb1e54dSMiklos Szeredi /*
42605122443SAmir Goldstein  * Verify that @fh matches the file handle stored in xattr @name.
4278b88a2e6SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch, < 0 on error.
4288b88a2e6SAmir Goldstein  */
429610afc0bSMiklos Szeredi static int ovl_verify_fh(struct ovl_fs *ofs, struct dentry *dentry,
43043d193f8SMiklos Szeredi 			 enum ovl_xattr ox, const struct ovl_fh *fh)
4318b88a2e6SAmir Goldstein {
43243d193f8SMiklos Szeredi 	struct ovl_fh *ofh = ovl_get_fh(ofs, dentry, ox);
4338b88a2e6SAmir Goldstein 	int err = 0;
4348b88a2e6SAmir Goldstein 
4358b88a2e6SAmir Goldstein 	if (!ofh)
4368b88a2e6SAmir Goldstein 		return -ENODATA;
4378b88a2e6SAmir Goldstein 
4388b88a2e6SAmir Goldstein 	if (IS_ERR(ofh))
4398b88a2e6SAmir Goldstein 		return PTR_ERR(ofh);
4408b88a2e6SAmir Goldstein 
441cbe7fba8SAmir Goldstein 	if (fh->fb.len != ofh->fb.len || memcmp(&fh->fb, &ofh->fb, fh->fb.len))
4428b88a2e6SAmir Goldstein 		err = -ESTALE;
4438b88a2e6SAmir Goldstein 
4448b88a2e6SAmir Goldstein 	kfree(ofh);
4458b88a2e6SAmir Goldstein 	return err;
4468b88a2e6SAmir Goldstein }
4478b88a2e6SAmir Goldstein 
4488b88a2e6SAmir Goldstein /*
44905122443SAmir Goldstein  * Verify that @real dentry matches the file handle stored in xattr @name.
4508b88a2e6SAmir Goldstein  *
45105122443SAmir Goldstein  * If @set is true and there is no stored file handle, encode @real and store
45205122443SAmir Goldstein  * file handle in xattr @name.
4538b88a2e6SAmir Goldstein  *
45405122443SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
4558b88a2e6SAmir Goldstein  */
456610afc0bSMiklos Szeredi int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
45743d193f8SMiklos Szeredi 		      enum ovl_xattr ox, struct dentry *real, bool is_upper,
458610afc0bSMiklos Szeredi 		      bool set)
4598b88a2e6SAmir Goldstein {
4608b88a2e6SAmir Goldstein 	struct inode *inode;
4618b88a2e6SAmir Goldstein 	struct ovl_fh *fh;
4628b88a2e6SAmir Goldstein 	int err;
4638b88a2e6SAmir Goldstein 
4641cdb0cb6SPavel Tikhomirov 	fh = ovl_encode_real_fh(ofs, real, is_upper);
4658b88a2e6SAmir Goldstein 	err = PTR_ERR(fh);
466babf4770SAmir Goldstein 	if (IS_ERR(fh)) {
467babf4770SAmir Goldstein 		fh = NULL;
4688b88a2e6SAmir Goldstein 		goto fail;
469babf4770SAmir Goldstein 	}
4708b88a2e6SAmir Goldstein 
47143d193f8SMiklos Szeredi 	err = ovl_verify_fh(ofs, dentry, ox, fh);
4728b88a2e6SAmir Goldstein 	if (set && err == -ENODATA)
473c914c0e2SAmir Goldstein 		err = ovl_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len);
4748b88a2e6SAmir Goldstein 	if (err)
4758b88a2e6SAmir Goldstein 		goto fail;
4768b88a2e6SAmir Goldstein 
4778b88a2e6SAmir Goldstein out:
4788b88a2e6SAmir Goldstein 	kfree(fh);
4798b88a2e6SAmir Goldstein 	return err;
4808b88a2e6SAmir Goldstein 
4818b88a2e6SAmir Goldstein fail:
48205122443SAmir Goldstein 	inode = d_inode(real);
4831bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to verify %s (%pd2, ino=%lu, err=%i)\n",
48405122443SAmir Goldstein 			    is_upper ? "upper" : "origin", real,
48505122443SAmir Goldstein 			    inode ? inode->i_ino : 0, err);
4868b88a2e6SAmir Goldstein 	goto out;
4878b88a2e6SAmir Goldstein }
4888b88a2e6SAmir Goldstein 
489e8f9e5b7SAmir Goldstein /* Get upper dentry from index */
4908ea28765SAmir Goldstein struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index,
4918ea28765SAmir Goldstein 			       bool connected)
492e8f9e5b7SAmir Goldstein {
493e8f9e5b7SAmir Goldstein 	struct ovl_fh *fh;
494e8f9e5b7SAmir Goldstein 	struct dentry *upper;
495e8f9e5b7SAmir Goldstein 
496e8f9e5b7SAmir Goldstein 	if (!d_is_dir(index))
497e8f9e5b7SAmir Goldstein 		return dget(index);
498e8f9e5b7SAmir Goldstein 
499610afc0bSMiklos Szeredi 	fh = ovl_get_fh(ofs, index, OVL_XATTR_UPPER);
500e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(fh))
501e8f9e5b7SAmir Goldstein 		return ERR_CAST(fh);
502e8f9e5b7SAmir Goldstein 
5038ea28765SAmir Goldstein 	upper = ovl_decode_real_fh(ofs, fh, ovl_upper_mnt(ofs), connected);
504e8f9e5b7SAmir Goldstein 	kfree(fh);
505e8f9e5b7SAmir Goldstein 
506e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(upper))
507e8f9e5b7SAmir Goldstein 		return upper ?: ERR_PTR(-ESTALE);
508e8f9e5b7SAmir Goldstein 
509e8f9e5b7SAmir Goldstein 	if (!d_is_dir(upper)) {
5101bd0a3aeSlijiazi 		pr_warn_ratelimited("invalid index upper (%pd2, upper=%pd2).\n",
511e8f9e5b7SAmir Goldstein 				    index, upper);
512e8f9e5b7SAmir Goldstein 		dput(upper);
513e8f9e5b7SAmir Goldstein 		return ERR_PTR(-EIO);
514e8f9e5b7SAmir Goldstein 	}
515e8f9e5b7SAmir Goldstein 
516e8f9e5b7SAmir Goldstein 	return upper;
517e8f9e5b7SAmir Goldstein }
518e8f9e5b7SAmir Goldstein 
5198b88a2e6SAmir Goldstein /*
520415543d5SAmir Goldstein  * Verify that an index entry name matches the origin file handle stored in
521415543d5SAmir Goldstein  * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path.
522415543d5SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error.
523415543d5SAmir Goldstein  */
5241eff1a1dSAmir Goldstein int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index)
525415543d5SAmir Goldstein {
526415543d5SAmir Goldstein 	struct ovl_fh *fh = NULL;
527415543d5SAmir Goldstein 	size_t len;
528b9343632SChandan Rajendra 	struct ovl_path origin = { };
529b9343632SChandan Rajendra 	struct ovl_path *stack = &origin;
530e8f9e5b7SAmir Goldstein 	struct dentry *upper = NULL;
531415543d5SAmir Goldstein 	int err;
532415543d5SAmir Goldstein 
533415543d5SAmir Goldstein 	if (!d_inode(index))
534415543d5SAmir Goldstein 		return 0;
535415543d5SAmir Goldstein 
536fa0096e3SAmir Goldstein 	err = -EINVAL;
537cbe7fba8SAmir Goldstein 	if (index->d_name.len < sizeof(struct ovl_fb)*2)
538415543d5SAmir Goldstein 		goto fail;
539415543d5SAmir Goldstein 
540415543d5SAmir Goldstein 	err = -ENOMEM;
541415543d5SAmir Goldstein 	len = index->d_name.len / 2;
542cbe7fba8SAmir Goldstein 	fh = kzalloc(len + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
543415543d5SAmir Goldstein 	if (!fh)
544415543d5SAmir Goldstein 		goto fail;
545415543d5SAmir Goldstein 
546415543d5SAmir Goldstein 	err = -EINVAL;
547cbe7fba8SAmir Goldstein 	if (hex2bin(fh->buf, index->d_name.name, len))
5482e1a5328SAmir Goldstein 		goto fail;
5492e1a5328SAmir Goldstein 
550cbe7fba8SAmir Goldstein 	err = ovl_check_fb_len(&fh->fb, len);
5512e1a5328SAmir Goldstein 	if (err)
552415543d5SAmir Goldstein 		goto fail;
553415543d5SAmir Goldstein 
5547db25d36SAmir Goldstein 	/*
5557db25d36SAmir Goldstein 	 * Whiteout index entries are used as an indication that an exported
5567db25d36SAmir Goldstein 	 * overlay file handle should be treated as stale (i.e. after unlink
5577db25d36SAmir Goldstein 	 * of the overlay inode). These entries contain no origin xattr.
5587db25d36SAmir Goldstein 	 */
5597db25d36SAmir Goldstein 	if (ovl_is_whiteout(index))
5607db25d36SAmir Goldstein 		goto out;
5617db25d36SAmir Goldstein 
562e8f9e5b7SAmir Goldstein 	/*
563e8f9e5b7SAmir Goldstein 	 * Verifying directory index entries are not stale is expensive, so
564e8f9e5b7SAmir Goldstein 	 * only verify stale dir index if NFS export is enabled.
565e8f9e5b7SAmir Goldstein 	 */
566e8f9e5b7SAmir Goldstein 	if (d_is_dir(index) && !ofs->config.nfs_export)
567e8f9e5b7SAmir Goldstein 		goto out;
568e8f9e5b7SAmir Goldstein 
569e8f9e5b7SAmir Goldstein 	/*
570e8f9e5b7SAmir Goldstein 	 * Directory index entries should have 'upper' xattr pointing to the
571e8f9e5b7SAmir Goldstein 	 * real upper dir. Non-dir index entries are hardlinks to the upper
572e8f9e5b7SAmir Goldstein 	 * real inode. For non-dir index, we can read the copy up origin xattr
573e8f9e5b7SAmir Goldstein 	 * directly from the index dentry, but for dir index we first need to
574e8f9e5b7SAmir Goldstein 	 * decode the upper directory.
575e8f9e5b7SAmir Goldstein 	 */
5768ea28765SAmir Goldstein 	upper = ovl_index_upper(ofs, index, false);
577e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(upper)) {
578e8f9e5b7SAmir Goldstein 		err = PTR_ERR(upper);
57924f0b172SAmir Goldstein 		/*
58024f0b172SAmir Goldstein 		 * Directory index entries with no 'upper' xattr need to be
58124f0b172SAmir Goldstein 		 * removed. When dir index entry has a stale 'upper' xattr,
58224f0b172SAmir Goldstein 		 * we assume that upper dir was removed and we treat the dir
58324f0b172SAmir Goldstein 		 * index as orphan entry that needs to be whited out.
58424f0b172SAmir Goldstein 		 */
58524f0b172SAmir Goldstein 		if (err == -ESTALE)
58624f0b172SAmir Goldstein 			goto orphan;
58724f0b172SAmir Goldstein 		else if (!err)
588e8f9e5b7SAmir Goldstein 			err = -ESTALE;
589e8f9e5b7SAmir Goldstein 		goto fail;
590e8f9e5b7SAmir Goldstein 	}
591e8f9e5b7SAmir Goldstein 
592610afc0bSMiklos Szeredi 	err = ovl_verify_fh(ofs, upper, OVL_XATTR_ORIGIN, fh);
593e8f9e5b7SAmir Goldstein 	dput(upper);
594415543d5SAmir Goldstein 	if (err)
595415543d5SAmir Goldstein 		goto fail;
596415543d5SAmir Goldstein 
597e8f9e5b7SAmir Goldstein 	/* Check if non-dir index is orphan and don't warn before cleaning it */
598e8f9e5b7SAmir Goldstein 	if (!d_is_dir(index) && d_inode(index)->i_nlink == 1) {
5998a22efa1SAmir Goldstein 		err = ovl_check_origin_fh(ofs, fh, false, index, &stack);
600415543d5SAmir Goldstein 		if (err)
601415543d5SAmir Goldstein 			goto fail;
602415543d5SAmir Goldstein 
603610afc0bSMiklos Szeredi 		if (ovl_get_nlink(ofs, origin.dentry, index, 0) == 0)
60424f0b172SAmir Goldstein 			goto orphan;
605e8f9e5b7SAmir Goldstein 	}
606caf70cb2SAmir Goldstein 
607415543d5SAmir Goldstein out:
608e8f9e5b7SAmir Goldstein 	dput(origin.dentry);
609415543d5SAmir Goldstein 	kfree(fh);
610415543d5SAmir Goldstein 	return err;
611415543d5SAmir Goldstein 
612415543d5SAmir Goldstein fail:
6131bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to verify index (%pd2, ftype=%x, err=%i)\n",
61461b67471SAmir Goldstein 			    index, d_inode(index)->i_mode & S_IFMT, err);
615415543d5SAmir Goldstein 	goto out;
61624f0b172SAmir Goldstein 
61724f0b172SAmir Goldstein orphan:
6181bd0a3aeSlijiazi 	pr_warn_ratelimited("orphan index entry (%pd2, ftype=%x, nlink=%u)\n",
61924f0b172SAmir Goldstein 			    index, d_inode(index)->i_mode & S_IFMT,
62024f0b172SAmir Goldstein 			    d_inode(index)->i_nlink);
62124f0b172SAmir Goldstein 	err = -ENOENT;
62224f0b172SAmir Goldstein 	goto out;
623415543d5SAmir Goldstein }
624415543d5SAmir Goldstein 
62591ffe7beSAmir Goldstein static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name)
62691ffe7beSAmir Goldstein {
62791ffe7beSAmir Goldstein 	char *n, *s;
62891ffe7beSAmir Goldstein 
629cbe7fba8SAmir Goldstein 	n = kcalloc(fh->fb.len, 2, GFP_KERNEL);
63091ffe7beSAmir Goldstein 	if (!n)
63191ffe7beSAmir Goldstein 		return -ENOMEM;
63291ffe7beSAmir Goldstein 
633cbe7fba8SAmir Goldstein 	s  = bin2hex(n, fh->buf, fh->fb.len);
63491ffe7beSAmir Goldstein 	*name = (struct qstr) QSTR_INIT(n, s - n);
63591ffe7beSAmir Goldstein 
63691ffe7beSAmir Goldstein 	return 0;
63791ffe7beSAmir Goldstein 
63891ffe7beSAmir Goldstein }
63991ffe7beSAmir Goldstein 
640415543d5SAmir Goldstein /*
641359f392cSAmir Goldstein  * Lookup in indexdir for the index entry of a lower real inode or a copy up
642359f392cSAmir Goldstein  * origin inode. The index entry name is the hex representation of the lower
643359f392cSAmir Goldstein  * inode file handle.
644359f392cSAmir Goldstein  *
645359f392cSAmir Goldstein  * If the index dentry in negative, then either no lower aliases have been
646359f392cSAmir Goldstein  * copied up yet, or aliases have been copied up in older kernels and are
647359f392cSAmir Goldstein  * not indexed.
648359f392cSAmir Goldstein  *
649359f392cSAmir Goldstein  * If the index dentry for a copy up origin inode is positive, but points
650359f392cSAmir Goldstein  * to an inode different than the upper inode, then either the upper inode
651359f392cSAmir Goldstein  * has been copied up and not indexed or it was indexed, but since then
6524f119628SWilliam Dean  * index dir was cleared. Either way, that index cannot be used to identify
653359f392cSAmir Goldstein  * the overlay inode.
654359f392cSAmir Goldstein  */
6551cdb0cb6SPavel Tikhomirov int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin,
6561cdb0cb6SPavel Tikhomirov 		       struct qstr *name)
657359f392cSAmir Goldstein {
658359f392cSAmir Goldstein 	struct ovl_fh *fh;
65991ffe7beSAmir Goldstein 	int err;
660359f392cSAmir Goldstein 
6611cdb0cb6SPavel Tikhomirov 	fh = ovl_encode_real_fh(ofs, origin, false);
662359f392cSAmir Goldstein 	if (IS_ERR(fh))
663359f392cSAmir Goldstein 		return PTR_ERR(fh);
664359f392cSAmir Goldstein 
66591ffe7beSAmir Goldstein 	err = ovl_get_index_name_fh(fh, name);
66691ffe7beSAmir Goldstein 
667359f392cSAmir Goldstein 	kfree(fh);
668359f392cSAmir Goldstein 	return err;
66991ffe7beSAmir Goldstein }
670359f392cSAmir Goldstein 
67191ffe7beSAmir Goldstein /* Lookup index by file handle for NFS export */
67291ffe7beSAmir Goldstein struct dentry *ovl_get_index_fh(struct ovl_fs *ofs, struct ovl_fh *fh)
67391ffe7beSAmir Goldstein {
67491ffe7beSAmir Goldstein 	struct dentry *index;
67591ffe7beSAmir Goldstein 	struct qstr name;
67691ffe7beSAmir Goldstein 	int err;
67791ffe7beSAmir Goldstein 
67891ffe7beSAmir Goldstein 	err = ovl_get_index_name_fh(fh, &name);
67991ffe7beSAmir Goldstein 	if (err)
68091ffe7beSAmir Goldstein 		return ERR_PTR(err);
68191ffe7beSAmir Goldstein 
6826c2d4798SAl Viro 	index = lookup_positive_unlocked(name.name, ofs->indexdir, name.len);
68391ffe7beSAmir Goldstein 	kfree(name.name);
68491ffe7beSAmir Goldstein 	if (IS_ERR(index)) {
68591ffe7beSAmir Goldstein 		if (PTR_ERR(index) == -ENOENT)
68691ffe7beSAmir Goldstein 			index = NULL;
68791ffe7beSAmir Goldstein 		return index;
68891ffe7beSAmir Goldstein 	}
68991ffe7beSAmir Goldstein 
6906c2d4798SAl Viro 	if (ovl_is_whiteout(index))
69191ffe7beSAmir Goldstein 		err = -ESTALE;
69291ffe7beSAmir Goldstein 	else if (ovl_dentry_weird(index))
69391ffe7beSAmir Goldstein 		err = -EIO;
69491ffe7beSAmir Goldstein 	else
69591ffe7beSAmir Goldstein 		return index;
69691ffe7beSAmir Goldstein 
69791ffe7beSAmir Goldstein 	dput(index);
69891ffe7beSAmir Goldstein 	return ERR_PTR(err);
699359f392cSAmir Goldstein }
700359f392cSAmir Goldstein 
70106170154SAmir Goldstein struct dentry *ovl_lookup_index(struct ovl_fs *ofs, struct dentry *upper,
70206170154SAmir Goldstein 				struct dentry *origin, bool verify)
703359f392cSAmir Goldstein {
704359f392cSAmir Goldstein 	struct dentry *index;
705359f392cSAmir Goldstein 	struct inode *inode;
706359f392cSAmir Goldstein 	struct qstr name;
707ad1d615cSAmir Goldstein 	bool is_dir = d_is_dir(origin);
708359f392cSAmir Goldstein 	int err;
709359f392cSAmir Goldstein 
7101cdb0cb6SPavel Tikhomirov 	err = ovl_get_index_name(ofs, origin, &name);
711359f392cSAmir Goldstein 	if (err)
712359f392cSAmir Goldstein 		return ERR_PTR(err);
713359f392cSAmir Goldstein 
7144609e1f1SChristian Brauner 	index = lookup_one_positive_unlocked(ovl_upper_mnt_idmap(ofs), name.name,
715ba9ea771SChristian Brauner 					     ofs->indexdir, name.len);
716359f392cSAmir Goldstein 	if (IS_ERR(index)) {
717e0082a0fSAmir Goldstein 		err = PTR_ERR(index);
7187937a56fSAmir Goldstein 		if (err == -ENOENT) {
7197937a56fSAmir Goldstein 			index = NULL;
7207937a56fSAmir Goldstein 			goto out;
7217937a56fSAmir Goldstein 		}
7221bd0a3aeSlijiazi 		pr_warn_ratelimited("failed inode index lookup (ino=%lu, key=%.*s, err=%i);\n"
723359f392cSAmir Goldstein 				    "overlayfs: mount with '-o index=off' to disable inodes index.\n",
724359f392cSAmir Goldstein 				    d_inode(origin)->i_ino, name.len, name.name,
725359f392cSAmir Goldstein 				    err);
726359f392cSAmir Goldstein 		goto out;
727359f392cSAmir Goldstein 	}
728359f392cSAmir Goldstein 
7290e082555SAmir Goldstein 	inode = d_inode(index);
7306c2d4798SAl Viro 	if (ovl_is_whiteout(index) && !verify) {
73106170154SAmir Goldstein 		/*
73206170154SAmir Goldstein 		 * When index lookup is called with !verify for decoding an
73306170154SAmir Goldstein 		 * overlay file handle, a whiteout index implies that decode
73406170154SAmir Goldstein 		 * should treat file handle as stale and no need to print a
73506170154SAmir Goldstein 		 * warning about it.
73606170154SAmir Goldstein 		 */
73706170154SAmir Goldstein 		dput(index);
73806170154SAmir Goldstein 		index = ERR_PTR(-ESTALE);
73906170154SAmir Goldstein 		goto out;
7400e082555SAmir Goldstein 	} else if (ovl_dentry_weird(index) || ovl_is_whiteout(index) ||
7416e3e2c43SAl Viro 		   inode_wrong_type(inode, d_inode(origin)->i_mode)) {
7420e082555SAmir Goldstein 		/*
7430e082555SAmir Goldstein 		 * Index should always be of the same file type as origin
7440e082555SAmir Goldstein 		 * except for the case of a whiteout index. A whiteout
7450e082555SAmir Goldstein 		 * index should only exist if all lower aliases have been
7460e082555SAmir Goldstein 		 * unlinked, which means that finding a lower origin on lookup
7470e082555SAmir Goldstein 		 * whose index is a whiteout should be treated as an error.
7480e082555SAmir Goldstein 		 */
7491bd0a3aeSlijiazi 		pr_warn_ratelimited("bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n",
7500e082555SAmir Goldstein 				    index, d_inode(index)->i_mode & S_IFMT,
7510e082555SAmir Goldstein 				    d_inode(origin)->i_mode & S_IFMT);
752359f392cSAmir Goldstein 		goto fail;
75306170154SAmir Goldstein 	} else if (is_dir && verify) {
754ad1d615cSAmir Goldstein 		if (!upper) {
7551bd0a3aeSlijiazi 			pr_warn_ratelimited("suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n",
756ad1d615cSAmir Goldstein 					    origin, index);
757ad1d615cSAmir Goldstein 			goto fail;
758359f392cSAmir Goldstein 		}
759359f392cSAmir Goldstein 
760ad1d615cSAmir Goldstein 		/* Verify that dir index 'upper' xattr points to upper dir */
761610afc0bSMiklos Szeredi 		err = ovl_verify_upper(ofs, index, upper, false);
762ad1d615cSAmir Goldstein 		if (err) {
763ad1d615cSAmir Goldstein 			if (err == -ESTALE) {
7641bd0a3aeSlijiazi 				pr_warn_ratelimited("suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2).\n",
765ad1d615cSAmir Goldstein 						    upper, origin, index);
766ad1d615cSAmir Goldstein 			}
767ad1d615cSAmir Goldstein 			goto fail;
768ad1d615cSAmir Goldstein 		}
769ad1d615cSAmir Goldstein 	} else if (upper && d_inode(upper) != inode) {
770ad1d615cSAmir Goldstein 		goto out_dput;
771ad1d615cSAmir Goldstein 	}
772359f392cSAmir Goldstein out:
773359f392cSAmir Goldstein 	kfree(name.name);
774359f392cSAmir Goldstein 	return index;
775359f392cSAmir Goldstein 
7766eaf0111SAmir Goldstein out_dput:
7776eaf0111SAmir Goldstein 	dput(index);
7786eaf0111SAmir Goldstein 	index = NULL;
7796eaf0111SAmir Goldstein 	goto out;
7806eaf0111SAmir Goldstein 
781359f392cSAmir Goldstein fail:
782359f392cSAmir Goldstein 	dput(index);
783359f392cSAmir Goldstein 	index = ERR_PTR(-EIO);
784359f392cSAmir Goldstein 	goto out;
785359f392cSAmir Goldstein }
786359f392cSAmir Goldstein 
787359f392cSAmir Goldstein /*
788bbb1e54dSMiklos Szeredi  * Returns next layer in stack starting from top.
789bbb1e54dSMiklos Szeredi  * Returns -1 if this is the last layer.
790bbb1e54dSMiklos Szeredi  */
791bbb1e54dSMiklos Szeredi int ovl_path_next(int idx, struct dentry *dentry, struct path *path)
792bbb1e54dSMiklos Szeredi {
793a6ff2bc0SAmir Goldstein 	struct ovl_entry *oe = OVL_E(dentry);
794*5522c9c7SAmir Goldstein 	struct ovl_path *lowerstack = ovl_lowerstack(oe);
795bbb1e54dSMiklos Szeredi 
796bbb1e54dSMiklos Szeredi 	BUG_ON(idx < 0);
797bbb1e54dSMiklos Szeredi 	if (idx == 0) {
798bbb1e54dSMiklos Szeredi 		ovl_path_upper(dentry, path);
799bbb1e54dSMiklos Szeredi 		if (path->dentry)
800*5522c9c7SAmir Goldstein 			return ovl_numlower(oe) ? 1 : -1;
801bbb1e54dSMiklos Szeredi 		idx++;
802bbb1e54dSMiklos Szeredi 	}
803*5522c9c7SAmir Goldstein 	BUG_ON(idx > ovl_numlower(oe));
804*5522c9c7SAmir Goldstein 	path->dentry = lowerstack[idx - 1].dentry;
805*5522c9c7SAmir Goldstein 	path->mnt = lowerstack[idx - 1].layer->mnt;
806bbb1e54dSMiklos Szeredi 
807*5522c9c7SAmir Goldstein 	return (idx < ovl_numlower(oe)) ? idx + 1 : -1;
808bbb1e54dSMiklos Szeredi }
809bbb1e54dSMiklos Szeredi 
8109678e630SAmir Goldstein /* Fix missing 'origin' xattr */
811610afc0bSMiklos Szeredi static int ovl_fix_origin(struct ovl_fs *ofs, struct dentry *dentry,
812610afc0bSMiklos Szeredi 			  struct dentry *lower, struct dentry *upper)
8139678e630SAmir Goldstein {
8149678e630SAmir Goldstein 	int err;
8159678e630SAmir Goldstein 
816610afc0bSMiklos Szeredi 	if (ovl_check_origin_xattr(ofs, upper))
8179678e630SAmir Goldstein 		return 0;
8189678e630SAmir Goldstein 
8199678e630SAmir Goldstein 	err = ovl_want_write(dentry);
8209678e630SAmir Goldstein 	if (err)
8219678e630SAmir Goldstein 		return err;
8229678e630SAmir Goldstein 
823a0c236b1SAmir Goldstein 	err = ovl_set_origin(ofs, lower, upper);
8249678e630SAmir Goldstein 	if (!err)
8259678e630SAmir Goldstein 		err = ovl_set_impure(dentry->d_parent, upper->d_parent);
8269678e630SAmir Goldstein 
8279678e630SAmir Goldstein 	ovl_drop_write(dentry);
8289678e630SAmir Goldstein 	return err;
8299678e630SAmir Goldstein }
8309678e630SAmir Goldstein 
831bbb1e54dSMiklos Szeredi struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry,
832bbb1e54dSMiklos Szeredi 			  unsigned int flags)
833bbb1e54dSMiklos Szeredi {
834bbb1e54dSMiklos Szeredi 	struct ovl_entry *oe;
835bbb1e54dSMiklos Szeredi 	const struct cred *old_cred;
8366b2d5fe4SMiklos Szeredi 	struct ovl_fs *ofs = dentry->d_sb->s_fs_info;
837a6ff2bc0SAmir Goldstein 	struct ovl_entry *poe = OVL_E(dentry->d_parent);
838a6ff2bc0SAmir Goldstein 	struct ovl_entry *roe = OVL_E(dentry->d_sb->s_root);
8399d3dfea3SVivek Goyal 	struct ovl_path *stack = NULL, *origin_path = NULL;
840bbb1e54dSMiklos Szeredi 	struct dentry *upperdir, *upperdentry = NULL;
841ad1d615cSAmir Goldstein 	struct dentry *origin = NULL;
842359f392cSAmir Goldstein 	struct dentry *index = NULL;
843bbb1e54dSMiklos Szeredi 	unsigned int ctr = 0;
844bbb1e54dSMiklos Szeredi 	struct inode *inode = NULL;
845bbb1e54dSMiklos Szeredi 	bool upperopaque = false;
84602b69b28SMiklos Szeredi 	char *upperredirect = NULL;
847bbb1e54dSMiklos Szeredi 	struct dentry *this;
848bbb1e54dSMiklos Szeredi 	unsigned int i;
849bbb1e54dSMiklos Szeredi 	int err;
8506815f479SVivek Goyal 	bool uppermetacopy = false;
851e28edc46SMiklos Szeredi 	struct ovl_lookup_data d = {
852146d62e5SAmir Goldstein 		.sb = dentry->d_sb,
853e28edc46SMiklos Szeredi 		.name = dentry->d_name,
854e28edc46SMiklos Szeredi 		.is_dir = false,
855e28edc46SMiklos Szeredi 		.opaque = false,
856e28edc46SMiklos Szeredi 		.stop = false,
857*5522c9c7SAmir Goldstein 		.last = ofs->config.redirect_follow ? false : !ovl_numlower(poe),
85802b69b28SMiklos Szeredi 		.redirect = NULL,
8599d3dfea3SVivek Goyal 		.metacopy = false,
860e28edc46SMiklos Szeredi 	};
861bbb1e54dSMiklos Szeredi 
8626b2d5fe4SMiklos Szeredi 	if (dentry->d_name.len > ofs->namelen)
8636b2d5fe4SMiklos Szeredi 		return ERR_PTR(-ENAMETOOLONG);
8646b2d5fe4SMiklos Szeredi 
865bbb1e54dSMiklos Szeredi 	old_cred = ovl_override_creds(dentry->d_sb);
86609d8b586SMiklos Szeredi 	upperdir = ovl_dentry_upper(dentry->d_parent);
867bbb1e54dSMiklos Szeredi 	if (upperdir) {
868dad7017aSChristian Brauner 		d.mnt = ovl_upper_mnt(ofs);
8691434a65eSChengguang Xu 		err = ovl_lookup_layer(upperdir, &d, &upperdentry, true);
870e28edc46SMiklos Szeredi 		if (err)
871bbb1e54dSMiklos Szeredi 			goto out;
872bbb1e54dSMiklos Szeredi 
873bccece1eSMiklos Szeredi 		if (upperdentry && upperdentry->d_flags & DCACHE_OP_REAL) {
874e28edc46SMiklos Szeredi 			dput(upperdentry);
875bbb1e54dSMiklos Szeredi 			err = -EREMOTE;
876bbb1e54dSMiklos Szeredi 			goto out;
877bbb1e54dSMiklos Szeredi 		}
878a9d01957SAmir Goldstein 		if (upperdentry && !d.is_dir) {
879f7d3dacaSAmir Goldstein 			/*
880f7d3dacaSAmir Goldstein 			 * Lookup copy up origin by decoding origin file handle.
881f7d3dacaSAmir Goldstein 			 * We may get a disconnected dentry, which is fine,
882f7d3dacaSAmir Goldstein 			 * because we only need to hold the origin inode in
883f7d3dacaSAmir Goldstein 			 * cache and use its inode number.  We may even get a
884f7d3dacaSAmir Goldstein 			 * connected dentry, that is not under any of the lower
885f7d3dacaSAmir Goldstein 			 * layers root.  That is also fine for using it's inode
886f7d3dacaSAmir Goldstein 			 * number - it's the same as if we held a reference
887f7d3dacaSAmir Goldstein 			 * to a dentry in lower layer that was moved under us.
888f7d3dacaSAmir Goldstein 			 */
889d78a0dcfSyoungjun 			err = ovl_check_origin(ofs, upperdentry, &origin_path);
890a9d01957SAmir Goldstein 			if (err)
8915455f92bSVivek Goyal 				goto out_put_upper;
8929d3dfea3SVivek Goyal 
8939d3dfea3SVivek Goyal 			if (d.metacopy)
8946815f479SVivek Goyal 				uppermetacopy = true;
895a9d01957SAmir Goldstein 		}
89602b69b28SMiklos Szeredi 
89702b69b28SMiklos Szeredi 		if (d.redirect) {
8980ce5cdc9SDan Carpenter 			err = -ENOMEM;
89902b69b28SMiklos Szeredi 			upperredirect = kstrdup(d.redirect, GFP_KERNEL);
90002b69b28SMiklos Szeredi 			if (!upperredirect)
90102b69b28SMiklos Szeredi 				goto out_put_upper;
90202b69b28SMiklos Szeredi 			if (d.redirect[0] == '/')
903c22205d0SAmir Goldstein 				poe = roe;
90402b69b28SMiklos Szeredi 		}
905e28edc46SMiklos Szeredi 		upperopaque = d.opaque;
906bbb1e54dSMiklos Szeredi 	}
907bbb1e54dSMiklos Szeredi 
908*5522c9c7SAmir Goldstein 	if (!d.stop && ovl_numlower(poe)) {
909bbb1e54dSMiklos Szeredi 		err = -ENOMEM;
91094375f9dSAmir Goldstein 		stack = kcalloc(ofs->numlayer - 1, sizeof(struct ovl_path),
9110ee931c4SMichal Hocko 				GFP_KERNEL);
912bbb1e54dSMiklos Szeredi 		if (!stack)
913bbb1e54dSMiklos Szeredi 			goto out_put_upper;
914bbb1e54dSMiklos Szeredi 	}
915bbb1e54dSMiklos Szeredi 
916*5522c9c7SAmir Goldstein 	for (i = 0; !d.stop && i < ovl_numlower(poe); i++) {
917*5522c9c7SAmir Goldstein 		struct ovl_path lower = ovl_lowerstack(poe)[i];
918bbb1e54dSMiklos Szeredi 
919452061fdSVivek Goyal 		if (!ofs->config.redirect_follow)
920*5522c9c7SAmir Goldstein 			d.last = i == ovl_numlower(poe) - 1;
921452061fdSVivek Goyal 		else
922*5522c9c7SAmir Goldstein 			d.last = lower.layer->idx == ovl_numlower(roe);
923452061fdSVivek Goyal 
924dad7017aSChristian Brauner 		d.mnt = lower.layer->mnt;
9251434a65eSChengguang Xu 		err = ovl_lookup_layer(lower.dentry, &d, &this, false);
926e28edc46SMiklos Szeredi 		if (err)
927bbb1e54dSMiklos Szeredi 			goto out_put;
9286b2d5fe4SMiklos Szeredi 
929bbb1e54dSMiklos Szeredi 		if (!this)
930bbb1e54dSMiklos Szeredi 			continue;
931bbb1e54dSMiklos Szeredi 
9326815f479SVivek Goyal 		if ((uppermetacopy || d.metacopy) && !ofs->config.metacopy) {
933eaab1d45SMickaël Salaün 			dput(this);
9346815f479SVivek Goyal 			err = -EPERM;
9356815f479SVivek Goyal 			pr_warn_ratelimited("refusing to follow metacopy origin for (%pd2)\n", dentry);
9366815f479SVivek Goyal 			goto out_put;
9376815f479SVivek Goyal 		}
9386815f479SVivek Goyal 
9396815f479SVivek Goyal 		/*
9409678e630SAmir Goldstein 		 * If no origin fh is stored in upper of a merge dir, store fh
9419678e630SAmir Goldstein 		 * of lower dir and set upper parent "impure".
9429678e630SAmir Goldstein 		 */
9439d3dfea3SVivek Goyal 		if (upperdentry && !ctr && !ofs->noxattr && d.is_dir) {
944610afc0bSMiklos Szeredi 			err = ovl_fix_origin(ofs, dentry, this, upperdentry);
9459678e630SAmir Goldstein 			if (err) {
9469678e630SAmir Goldstein 				dput(this);
9479678e630SAmir Goldstein 				goto out_put;
9489678e630SAmir Goldstein 			}
9499678e630SAmir Goldstein 		}
9509678e630SAmir Goldstein 
95137b12916SAmir Goldstein 		/*
95237b12916SAmir Goldstein 		 * When "verify_lower" feature is enabled, do not merge with a
953ad1d615cSAmir Goldstein 		 * lower dir that does not match a stored origin xattr. In any
954ad1d615cSAmir Goldstein 		 * case, only verified origin is used for index lookup.
9559d3dfea3SVivek Goyal 		 *
9569d3dfea3SVivek Goyal 		 * For non-dir dentry, if index=on, then ensure origin
9579d3dfea3SVivek Goyal 		 * matches the dentry found using path based lookup,
9589d3dfea3SVivek Goyal 		 * otherwise error out.
95937b12916SAmir Goldstein 		 */
9609d3dfea3SVivek Goyal 		if (upperdentry && !ctr &&
9619d3dfea3SVivek Goyal 		    ((d.is_dir && ovl_verify_lower(dentry->d_sb)) ||
9629d3dfea3SVivek Goyal 		     (!d.is_dir && ofs->config.index && origin_path))) {
963610afc0bSMiklos Szeredi 			err = ovl_verify_origin(ofs, upperdentry, this, false);
96437b12916SAmir Goldstein 			if (err) {
96537b12916SAmir Goldstein 				dput(this);
9669d3dfea3SVivek Goyal 				if (d.is_dir)
96737b12916SAmir Goldstein 					break;
9689d3dfea3SVivek Goyal 				goto out_put;
9699d3dfea3SVivek Goyal 			}
9709d3dfea3SVivek Goyal 			origin = this;
97137b12916SAmir Goldstein 		}
972ad1d615cSAmir Goldstein 
97321d8d66aSVivek Goyal 		if (d.metacopy && ctr) {
97421d8d66aSVivek Goyal 			/*
97521d8d66aSVivek Goyal 			 * Do not store intermediate metacopy dentries in
97621d8d66aSVivek Goyal 			 * lower chain, except top most lower metacopy dentry.
97721d8d66aSVivek Goyal 			 * Continue the loop so that if there is an absolute
97821d8d66aSVivek Goyal 			 * redirect on this dentry, poe can be reset to roe.
97921d8d66aSVivek Goyal 			 */
98021d8d66aSVivek Goyal 			dput(this);
98121d8d66aSVivek Goyal 			this = NULL;
98221d8d66aSVivek Goyal 		} else {
983bbb1e54dSMiklos Szeredi 			stack[ctr].dentry = this;
984b9343632SChandan Rajendra 			stack[ctr].layer = lower.layer;
985bbb1e54dSMiklos Szeredi 			ctr++;
98621d8d66aSVivek Goyal 		}
98702b69b28SMiklos Szeredi 
988438c84c2SMiklos Szeredi 		/*
989438c84c2SMiklos Szeredi 		 * Following redirects can have security consequences: it's like
990438c84c2SMiklos Szeredi 		 * a symlink into the lower layer without the permission checks.
991438c84c2SMiklos Szeredi 		 * This is only a problem if the upper layer is untrusted (e.g
992438c84c2SMiklos Szeredi 		 * comes from an USB drive).  This can allow a non-readable file
993438c84c2SMiklos Szeredi 		 * or directory to become readable.
994438c84c2SMiklos Szeredi 		 *
995438c84c2SMiklos Szeredi 		 * Only following redirects when redirects are enabled disables
996438c84c2SMiklos Szeredi 		 * this attack vector when not necessary.
997438c84c2SMiklos Szeredi 		 */
998438c84c2SMiklos Szeredi 		err = -EPERM;
999438c84c2SMiklos Szeredi 		if (d.redirect && !ofs->config.redirect_follow) {
10001bd0a3aeSlijiazi 			pr_warn_ratelimited("refusing to follow redirect for (%pd2)\n",
1001f8167817SAmir Goldstein 					    dentry);
1002438c84c2SMiklos Szeredi 			goto out_put;
1003438c84c2SMiklos Szeredi 		}
1004438c84c2SMiklos Szeredi 
1005d1fe96c0SVivek Goyal 		if (d.stop)
1006d1fe96c0SVivek Goyal 			break;
1007d1fe96c0SVivek Goyal 
1008c22205d0SAmir Goldstein 		if (d.redirect && d.redirect[0] == '/' && poe != roe) {
1009c22205d0SAmir Goldstein 			poe = roe;
101002b69b28SMiklos Szeredi 			/* Find the current layer on the root dentry */
1011d583ed7dSAmir Goldstein 			i = lower.layer->idx - 1;
101202b69b28SMiklos Szeredi 		}
1013bbb1e54dSMiklos Szeredi 	}
1014bbb1e54dSMiklos Szeredi 
10159d3dfea3SVivek Goyal 	/*
10166815f479SVivek Goyal 	 * For regular non-metacopy upper dentries, there is no lower
10176815f479SVivek Goyal 	 * path based lookup, hence ctr will be zero. If a dentry is found
10186815f479SVivek Goyal 	 * using ORIGIN xattr on upper, install it in stack.
10196815f479SVivek Goyal 	 *
10206815f479SVivek Goyal 	 * For metacopy dentry, path based lookup will find lower dentries.
10216815f479SVivek Goyal 	 * Just make sure a corresponding data dentry has been found.
10229d3dfea3SVivek Goyal 	 */
10236815f479SVivek Goyal 	if (d.metacopy || (uppermetacopy && !ctr)) {
10240a8d0b64SKevin Locke 		pr_warn_ratelimited("metacopy with no lower data found - abort lookup (%pd2)\n",
10250a8d0b64SKevin Locke 				    dentry);
10269d3dfea3SVivek Goyal 		err = -EIO;
10279d3dfea3SVivek Goyal 		goto out_put;
10289d3dfea3SVivek Goyal 	} else if (!d.is_dir && upperdentry && !ctr && origin_path) {
10299d3dfea3SVivek Goyal 		if (WARN_ON(stack != NULL)) {
10309d3dfea3SVivek Goyal 			err = -EIO;
10319d3dfea3SVivek Goyal 			goto out_put;
10329d3dfea3SVivek Goyal 		}
10339d3dfea3SVivek Goyal 		stack = origin_path;
10349d3dfea3SVivek Goyal 		ctr = 1;
103559fb2013SVivek Goyal 		origin = origin_path->dentry;
10369d3dfea3SVivek Goyal 		origin_path = NULL;
10379d3dfea3SVivek Goyal 	}
10389d3dfea3SVivek Goyal 
1039ad1d615cSAmir Goldstein 	/*
104059fb2013SVivek Goyal 	 * Always lookup index if there is no-upperdentry.
10419d3dfea3SVivek Goyal 	 *
104259fb2013SVivek Goyal 	 * For the case of upperdentry, we have set origin by now if it
104359fb2013SVivek Goyal 	 * needed to be set. There are basically three cases.
10449d3dfea3SVivek Goyal 	 *
104559fb2013SVivek Goyal 	 * For directories, lookup index by lower inode and verify it matches
104659fb2013SVivek Goyal 	 * upper inode. We only trust dir index if we verified that lower dir
104759fb2013SVivek Goyal 	 * matches origin, otherwise dir index entries may be inconsistent
104859fb2013SVivek Goyal 	 * and we ignore them.
104959fb2013SVivek Goyal 	 *
105059fb2013SVivek Goyal 	 * For regular upper, we already set origin if upper had ORIGIN
105159fb2013SVivek Goyal 	 * xattr. There is no verification though as there is no path
105259fb2013SVivek Goyal 	 * based dentry lookup in lower in this case.
105359fb2013SVivek Goyal 	 *
105459fb2013SVivek Goyal 	 * For metacopy upper, we set a verified origin already if index
105559fb2013SVivek Goyal 	 * is enabled and if upper had an ORIGIN xattr.
105659fb2013SVivek Goyal 	 *
1057ad1d615cSAmir Goldstein 	 */
105859fb2013SVivek Goyal 	if (!upperdentry && ctr)
1059ad1d615cSAmir Goldstein 		origin = stack[0].dentry;
1060359f392cSAmir Goldstein 
1061ad1d615cSAmir Goldstein 	if (origin && ovl_indexdir(dentry->d_sb) &&
1062ad1d615cSAmir Goldstein 	    (!d.is_dir || ovl_index_all(dentry->d_sb))) {
106306170154SAmir Goldstein 		index = ovl_lookup_index(ofs, upperdentry, origin, true);
1064359f392cSAmir Goldstein 		if (IS_ERR(index)) {
1065359f392cSAmir Goldstein 			err = PTR_ERR(index);
1066359f392cSAmir Goldstein 			index = NULL;
1067359f392cSAmir Goldstein 			goto out_put;
1068359f392cSAmir Goldstein 		}
1069359f392cSAmir Goldstein 	}
1070359f392cSAmir Goldstein 
1071bbb1e54dSMiklos Szeredi 	oe = ovl_alloc_entry(ctr);
1072bbb1e54dSMiklos Szeredi 	err = -ENOMEM;
1073bbb1e54dSMiklos Szeredi 	if (!oe)
1074bbb1e54dSMiklos Szeredi 		goto out_put;
1075bbb1e54dSMiklos Szeredi 
1076*5522c9c7SAmir Goldstein 	memcpy(ovl_lowerstack(oe), stack, sizeof(struct ovl_path) * ctr);
1077e6d2ebddSMiklos Szeredi 	dentry->d_fsdata = oe;
1078e6d2ebddSMiklos Szeredi 
1079c62520a8SAmir Goldstein 	if (upperopaque)
1080c62520a8SAmir Goldstein 		ovl_dentry_set_opaque(dentry);
1081c62520a8SAmir Goldstein 
108255acc661SMiklos Szeredi 	if (upperdentry)
108355acc661SMiklos Szeredi 		ovl_dentry_set_upper_alias(dentry);
10840a2d0d3fSVivek Goyal 	else if (index) {
1085dad7017aSChristian Brauner 		struct path upperpath = {
1086dad7017aSChristian Brauner 			.dentry = upperdentry = dget(index),
1087dad7017aSChristian Brauner 			.mnt = ovl_upper_mnt(ofs),
1088dad7017aSChristian Brauner 		};
1089dad7017aSChristian Brauner 
1090cf4ef780SStanislav Goriainov 		/*
1091cf4ef780SStanislav Goriainov 		 * It's safe to assign upperredirect here: the previous
1092cf4ef780SStanislav Goriainov 		 * assignment of happens only if upperdentry is non-NULL, and
1093cf4ef780SStanislav Goriainov 		 * this one only if upperdentry is NULL.
1094cf4ef780SStanislav Goriainov 		 */
1095dad7017aSChristian Brauner 		upperredirect = ovl_get_redirect_xattr(ofs, &upperpath, 0);
10960a2d0d3fSVivek Goyal 		if (IS_ERR(upperredirect)) {
10970a2d0d3fSVivek Goyal 			err = PTR_ERR(upperredirect);
10980a2d0d3fSVivek Goyal 			upperredirect = NULL;
10990a2d0d3fSVivek Goyal 			goto out_free_oe;
11000a2d0d3fSVivek Goyal 		}
1101dad7017aSChristian Brauner 		err = ovl_check_metacopy_xattr(ofs, &upperpath);
11024518dfcfSAmir Goldstein 		if (err < 0)
11034518dfcfSAmir Goldstein 			goto out_free_oe;
11044518dfcfSAmir Goldstein 		uppermetacopy = err;
11050a2d0d3fSVivek Goyal 	}
1106359f392cSAmir Goldstein 
1107e6d2ebddSMiklos Szeredi 	if (upperdentry || ctr) {
1108ac6a52ebSVivek Goyal 		struct ovl_inode_params oip = {
1109ac6a52ebSVivek Goyal 			.upperdentry = upperdentry,
1110ac6a52ebSVivek Goyal 			.lowerpath = stack,
1111ac6a52ebSVivek Goyal 			.index = index,
1112ac6a52ebSVivek Goyal 			.numlower = ctr,
11139cec54c8SVivek Goyal 			.redirect = upperredirect,
11142664bd08SVivek Goyal 			.lowerdata = (ctr > 1 && !d.is_dir) ?
11152664bd08SVivek Goyal 				      stack[ctr - 1].dentry : NULL,
1116ac6a52ebSVivek Goyal 		};
1117ac6a52ebSVivek Goyal 
1118ac6a52ebSVivek Goyal 		inode = ovl_get_inode(dentry->d_sb, &oip);
1119b9ac5c27SMiklos Szeredi 		err = PTR_ERR(inode);
1120b9ac5c27SMiklos Szeredi 		if (IS_ERR(inode))
1121e6d2ebddSMiklos Szeredi 			goto out_free_oe;
112228166ab3SVivek Goyal 		if (upperdentry && !uppermetacopy)
112328166ab3SVivek Goyal 			ovl_set_flag(OVL_UPPERDATA, inode);
1124e6d2ebddSMiklos Szeredi 	}
1125e6d2ebddSMiklos Szeredi 
1126b07d5cc9SAmir Goldstein 	ovl_dentry_init_reval(dentry, upperdentry);
1127f4288844SMiklos Szeredi 
1128e6d2ebddSMiklos Szeredi 	revert_creds(old_cred);
11299d3dfea3SVivek Goyal 	if (origin_path) {
11309d3dfea3SVivek Goyal 		dput(origin_path->dentry);
11319d3dfea3SVivek Goyal 		kfree(origin_path);
11329d3dfea3SVivek Goyal 	}
1133359f392cSAmir Goldstein 	dput(index);
1134bbb1e54dSMiklos Szeredi 	kfree(stack);
113502b69b28SMiklos Szeredi 	kfree(d.redirect);
1136829c28beSAmir Goldstein 	return d_splice_alias(inode, dentry);
1137bbb1e54dSMiklos Szeredi 
1138bbb1e54dSMiklos Szeredi out_free_oe:
1139e6d2ebddSMiklos Szeredi 	dentry->d_fsdata = NULL;
1140bbb1e54dSMiklos Szeredi 	kfree(oe);
1141bbb1e54dSMiklos Szeredi out_put:
1142359f392cSAmir Goldstein 	dput(index);
1143bbb1e54dSMiklos Szeredi 	for (i = 0; i < ctr; i++)
1144bbb1e54dSMiklos Szeredi 		dput(stack[i].dentry);
1145bbb1e54dSMiklos Szeredi 	kfree(stack);
1146bbb1e54dSMiklos Szeredi out_put_upper:
11479d3dfea3SVivek Goyal 	if (origin_path) {
11489d3dfea3SVivek Goyal 		dput(origin_path->dentry);
11499d3dfea3SVivek Goyal 		kfree(origin_path);
11509d3dfea3SVivek Goyal 	}
1151bbb1e54dSMiklos Szeredi 	dput(upperdentry);
115202b69b28SMiklos Szeredi 	kfree(upperredirect);
1153bbb1e54dSMiklos Szeredi out:
115402b69b28SMiklos Szeredi 	kfree(d.redirect);
1155bbb1e54dSMiklos Szeredi 	revert_creds(old_cred);
1156bbb1e54dSMiklos Szeredi 	return ERR_PTR(err);
1157bbb1e54dSMiklos Szeredi }
1158bbb1e54dSMiklos Szeredi 
1159bbb1e54dSMiklos Szeredi bool ovl_lower_positive(struct dentry *dentry)
1160bbb1e54dSMiklos Szeredi {
1161a6ff2bc0SAmir Goldstein 	struct ovl_entry *poe = OVL_E(dentry->d_parent);
1162bbb1e54dSMiklos Szeredi 	const struct qstr *name = &dentry->d_name;
11636d0a8a90SAmir Goldstein 	const struct cred *old_cred;
1164bbb1e54dSMiklos Szeredi 	unsigned int i;
1165bbb1e54dSMiklos Szeredi 	bool positive = false;
1166bbb1e54dSMiklos Szeredi 	bool done = false;
1167bbb1e54dSMiklos Szeredi 
1168bbb1e54dSMiklos Szeredi 	/*
1169bbb1e54dSMiklos Szeredi 	 * If dentry is negative, then lower is positive iff this is a
1170bbb1e54dSMiklos Szeredi 	 * whiteout.
1171bbb1e54dSMiklos Szeredi 	 */
1172bbb1e54dSMiklos Szeredi 	if (!dentry->d_inode)
1173c62520a8SAmir Goldstein 		return ovl_dentry_is_opaque(dentry);
1174bbb1e54dSMiklos Szeredi 
1175bbb1e54dSMiklos Szeredi 	/* Negative upper -> positive lower */
117609d8b586SMiklos Szeredi 	if (!ovl_dentry_upper(dentry))
1177bbb1e54dSMiklos Szeredi 		return true;
1178bbb1e54dSMiklos Szeredi 
11796d0a8a90SAmir Goldstein 	old_cred = ovl_override_creds(dentry->d_sb);
1180bbb1e54dSMiklos Szeredi 	/* Positive upper -> have to look up lower to see whether it exists */
1181*5522c9c7SAmir Goldstein 	for (i = 0; !done && !positive && i < ovl_numlower(poe); i++) {
1182bbb1e54dSMiklos Szeredi 		struct dentry *this;
1183*5522c9c7SAmir Goldstein 		struct ovl_path *parentpath = &ovl_lowerstack(poe)[i];
1184bbb1e54dSMiklos Szeredi 
1185*5522c9c7SAmir Goldstein 		this = lookup_one_positive_unlocked(
1186*5522c9c7SAmir Goldstein 				mnt_idmap(parentpath->layer->mnt),
1187*5522c9c7SAmir Goldstein 				name->name, parentpath->dentry, name->len);
1188bbb1e54dSMiklos Szeredi 		if (IS_ERR(this)) {
1189bbb1e54dSMiklos Szeredi 			switch (PTR_ERR(this)) {
1190bbb1e54dSMiklos Szeredi 			case -ENOENT:
1191bbb1e54dSMiklos Szeredi 			case -ENAMETOOLONG:
1192bbb1e54dSMiklos Szeredi 				break;
1193bbb1e54dSMiklos Szeredi 
1194bbb1e54dSMiklos Szeredi 			default:
1195bbb1e54dSMiklos Szeredi 				/*
1196bbb1e54dSMiklos Szeredi 				 * Assume something is there, we just couldn't
1197bbb1e54dSMiklos Szeredi 				 * access it.
1198bbb1e54dSMiklos Szeredi 				 */
1199bbb1e54dSMiklos Szeredi 				positive = true;
1200bbb1e54dSMiklos Szeredi 				break;
1201bbb1e54dSMiklos Szeredi 			}
1202bbb1e54dSMiklos Szeredi 		} else {
1203bbb1e54dSMiklos Szeredi 			positive = !ovl_is_whiteout(this);
1204bbb1e54dSMiklos Szeredi 			done = true;
1205bbb1e54dSMiklos Szeredi 			dput(this);
1206bbb1e54dSMiklos Szeredi 		}
1207bbb1e54dSMiklos Szeredi 	}
12086d0a8a90SAmir Goldstein 	revert_creds(old_cred);
1209bbb1e54dSMiklos Szeredi 
1210bbb1e54dSMiklos Szeredi 	return positive;
1211bbb1e54dSMiklos Szeredi }
1212