xref: /openbmc/linux/fs/overlayfs/namei.c (revision af5f2396)
1d2912cb1SThomas Gleixner // SPDX-License-Identifier: GPL-2.0-only
2bbb1e54dSMiklos Szeredi /*
3bbb1e54dSMiklos Szeredi  * Copyright (C) 2011 Novell Inc.
4bbb1e54dSMiklos Szeredi  * Copyright (C) 2016 Red Hat, Inc.
5bbb1e54dSMiklos Szeredi  */
6bbb1e54dSMiklos Szeredi 
7bbb1e54dSMiklos Szeredi #include <linux/fs.h>
85b825c3aSIngo Molnar #include <linux/cred.h>
99ee60ce2SAmir Goldstein #include <linux/ctype.h>
10bbb1e54dSMiklos Szeredi #include <linux/namei.h>
11bbb1e54dSMiklos Szeredi #include <linux/xattr.h>
1202b69b28SMiklos Szeredi #include <linux/ratelimit.h>
13a9d01957SAmir Goldstein #include <linux/mount.h>
14a9d01957SAmir Goldstein #include <linux/exportfs.h>
15bbb1e54dSMiklos Szeredi #include "overlayfs.h"
16bbb1e54dSMiklos Szeredi 
175436ab0aSAmir Goldstein #include "../internal.h"	/* for vfs_path_lookup */
185436ab0aSAmir Goldstein 
19e28edc46SMiklos Szeredi struct ovl_lookup_data {
20146d62e5SAmir Goldstein 	struct super_block *sb;
21dad7017aSChristian Brauner 	struct vfsmount *mnt;
22e28edc46SMiklos Szeredi 	struct qstr name;
23e28edc46SMiklos Szeredi 	bool is_dir;
24e28edc46SMiklos Szeredi 	bool opaque;
25e28edc46SMiklos Szeredi 	bool stop;
26e28edc46SMiklos Szeredi 	bool last;
2702b69b28SMiklos Szeredi 	char *redirect;
289d3dfea3SVivek Goyal 	bool metacopy;
295436ab0aSAmir Goldstein 	/* Referring to last redirect xattr */
305436ab0aSAmir Goldstein 	bool absolute_redirect;
31e28edc46SMiklos Szeredi };
32bbb1e54dSMiklos Szeredi 
332d343087SAl Viro static int ovl_check_redirect(const struct path *path, struct ovl_lookup_data *d,
3402b69b28SMiklos Szeredi 			      size_t prelen, const char *post)
3502b69b28SMiklos Szeredi {
3602b69b28SMiklos Szeredi 	int res;
370a2d0d3fSVivek Goyal 	char *buf;
38610afc0bSMiklos Szeredi 	struct ovl_fs *ofs = OVL_FS(d->sb);
3902b69b28SMiklos Szeredi 
405436ab0aSAmir Goldstein 	d->absolute_redirect = false;
41dad7017aSChristian Brauner 	buf = ovl_get_redirect_xattr(ofs, path, prelen + strlen(post));
420a2d0d3fSVivek Goyal 	if (IS_ERR_OR_NULL(buf))
430a2d0d3fSVivek Goyal 		return PTR_ERR(buf);
4402b69b28SMiklos Szeredi 
4502b69b28SMiklos Szeredi 	if (buf[0] == '/') {
465436ab0aSAmir Goldstein 		d->absolute_redirect = true;
473ec9b3faSAmir Goldstein 		/*
483ec9b3faSAmir Goldstein 		 * One of the ancestor path elements in an absolute path
493ec9b3faSAmir Goldstein 		 * lookup in ovl_lookup_layer() could have been opaque and
503ec9b3faSAmir Goldstein 		 * that will stop further lookup in lower layers (d->stop=true)
514f119628SWilliam Dean 		 * But we have found an absolute redirect in descendant path
523ec9b3faSAmir Goldstein 		 * element and that should force continue lookup in lower
533ec9b3faSAmir Goldstein 		 * layers (reset d->stop).
543ec9b3faSAmir Goldstein 		 */
553ec9b3faSAmir Goldstein 		d->stop = false;
5602b69b28SMiklos Szeredi 	} else {
570a2d0d3fSVivek Goyal 		res = strlen(buf) + 1;
5802b69b28SMiklos Szeredi 		memmove(buf + prelen, buf, res);
5902b69b28SMiklos Szeredi 		memcpy(buf, d->name.name, prelen);
6002b69b28SMiklos Szeredi 	}
6102b69b28SMiklos Szeredi 
6202b69b28SMiklos Szeredi 	strcat(buf, post);
6302b69b28SMiklos Szeredi 	kfree(d->redirect);
6402b69b28SMiklos Szeredi 	d->redirect = buf;
6502b69b28SMiklos Szeredi 	d->name.name = d->redirect;
6602b69b28SMiklos Szeredi 	d->name.len = strlen(d->redirect);
6702b69b28SMiklos Szeredi 
6802b69b28SMiklos Szeredi 	return 0;
6902b69b28SMiklos Szeredi }
7002b69b28SMiklos Szeredi 
71a9d01957SAmir Goldstein static int ovl_acceptable(void *ctx, struct dentry *dentry)
72a9d01957SAmir Goldstein {
73e8f9e5b7SAmir Goldstein 	/*
74e8f9e5b7SAmir Goldstein 	 * A non-dir origin may be disconnected, which is fine, because
75e8f9e5b7SAmir Goldstein 	 * we only need it for its unique inode number.
76e8f9e5b7SAmir Goldstein 	 */
77e8f9e5b7SAmir Goldstein 	if (!d_is_dir(dentry))
78a9d01957SAmir Goldstein 		return 1;
79e8f9e5b7SAmir Goldstein 
80e8f9e5b7SAmir Goldstein 	/* Don't decode a deleted empty directory */
81e8f9e5b7SAmir Goldstein 	if (d_unhashed(dentry))
82e8f9e5b7SAmir Goldstein 		return 0;
83e8f9e5b7SAmir Goldstein 
84e8f9e5b7SAmir Goldstein 	/* Check if directory belongs to the layer we are decoding from */
85e8f9e5b7SAmir Goldstein 	return is_subdir(dentry, ((struct vfsmount *)ctx)->mnt_root);
86a9d01957SAmir Goldstein }
87a9d01957SAmir Goldstein 
882e1a5328SAmir Goldstein /*
892e1a5328SAmir Goldstein  * Check validity of an overlay file handle buffer.
902e1a5328SAmir Goldstein  *
912e1a5328SAmir Goldstein  * Return 0 for a valid file handle.
922e1a5328SAmir Goldstein  * Return -ENODATA for "origin unknown".
932e1a5328SAmir Goldstein  * Return <0 for an invalid file handle.
942e1a5328SAmir Goldstein  */
95cbe7fba8SAmir Goldstein int ovl_check_fb_len(struct ovl_fb *fb, int fb_len)
962e1a5328SAmir Goldstein {
97cbe7fba8SAmir Goldstein 	if (fb_len < sizeof(struct ovl_fb) || fb_len < fb->len)
982e1a5328SAmir Goldstein 		return -EINVAL;
992e1a5328SAmir Goldstein 
100cbe7fba8SAmir Goldstein 	if (fb->magic != OVL_FH_MAGIC)
1012e1a5328SAmir Goldstein 		return -EINVAL;
1022e1a5328SAmir Goldstein 
1032e1a5328SAmir Goldstein 	/* Treat larger version and unknown flags as "origin unknown" */
104cbe7fba8SAmir Goldstein 	if (fb->version > OVL_FH_VERSION || fb->flags & ~OVL_FH_FLAG_ALL)
1052e1a5328SAmir Goldstein 		return -ENODATA;
1062e1a5328SAmir Goldstein 
1072e1a5328SAmir Goldstein 	/* Treat endianness mismatch as "origin unknown" */
108cbe7fba8SAmir Goldstein 	if (!(fb->flags & OVL_FH_FLAG_ANY_ENDIAN) &&
109cbe7fba8SAmir Goldstein 	    (fb->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN)
1102e1a5328SAmir Goldstein 		return -ENODATA;
1112e1a5328SAmir Goldstein 
1122e1a5328SAmir Goldstein 	return 0;
1132e1a5328SAmir Goldstein }
1142e1a5328SAmir Goldstein 
115dad7017aSChristian Brauner static struct ovl_fh *ovl_get_fh(struct ovl_fs *ofs, struct dentry *upperdentry,
11643d193f8SMiklos Szeredi 				 enum ovl_xattr ox)
117a9d01957SAmir Goldstein {
1182e1a5328SAmir Goldstein 	int res, err;
119a9d01957SAmir Goldstein 	struct ovl_fh *fh = NULL;
120a9d01957SAmir Goldstein 
121dad7017aSChristian Brauner 	res = ovl_getxattr_upper(ofs, upperdentry, ox, NULL, 0);
122a9d01957SAmir Goldstein 	if (res < 0) {
123a9d01957SAmir Goldstein 		if (res == -ENODATA || res == -EOPNOTSUPP)
124a9d01957SAmir Goldstein 			return NULL;
125a9d01957SAmir Goldstein 		goto fail;
126a9d01957SAmir Goldstein 	}
127a9d01957SAmir Goldstein 	/* Zero size value means "copied up but origin unknown" */
128a9d01957SAmir Goldstein 	if (res == 0)
129a9d01957SAmir Goldstein 		return NULL;
130a9d01957SAmir Goldstein 
131cbe7fba8SAmir Goldstein 	fh = kzalloc(res + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
132a9d01957SAmir Goldstein 	if (!fh)
133a9d01957SAmir Goldstein 		return ERR_PTR(-ENOMEM);
134a9d01957SAmir Goldstein 
135dad7017aSChristian Brauner 	res = ovl_getxattr_upper(ofs, upperdentry, ox, fh->buf, res);
136a9d01957SAmir Goldstein 	if (res < 0)
137a9d01957SAmir Goldstein 		goto fail;
138a9d01957SAmir Goldstein 
139cbe7fba8SAmir Goldstein 	err = ovl_check_fb_len(&fh->fb, res);
1402e1a5328SAmir Goldstein 	if (err < 0) {
1412e1a5328SAmir Goldstein 		if (err == -ENODATA)
142a9d01957SAmir Goldstein 			goto out;
1432e1a5328SAmir Goldstein 		goto invalid;
1442e1a5328SAmir Goldstein 	}
145a9d01957SAmir Goldstein 
1468b88a2e6SAmir Goldstein 	return fh;
1478b88a2e6SAmir Goldstein 
1488b88a2e6SAmir Goldstein out:
1498b88a2e6SAmir Goldstein 	kfree(fh);
1508b88a2e6SAmir Goldstein 	return NULL;
1518b88a2e6SAmir Goldstein 
1528b88a2e6SAmir Goldstein fail:
1531bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to get origin (%i)\n", res);
1548b88a2e6SAmir Goldstein 	goto out;
1558b88a2e6SAmir Goldstein invalid:
1561bd0a3aeSlijiazi 	pr_warn_ratelimited("invalid origin (%*phN)\n", res, fh);
1578b88a2e6SAmir Goldstein 	goto out;
1588b88a2e6SAmir Goldstein }
1598b88a2e6SAmir Goldstein 
1601cdb0cb6SPavel Tikhomirov struct dentry *ovl_decode_real_fh(struct ovl_fs *ofs, struct ovl_fh *fh,
1611cdb0cb6SPavel Tikhomirov 				  struct vfsmount *mnt, bool connected)
1628b88a2e6SAmir Goldstein {
163e8f9e5b7SAmir Goldstein 	struct dentry *real;
1648b88a2e6SAmir Goldstein 	int bytes;
1658b88a2e6SAmir Goldstein 
166c846af05SMiklos Szeredi 	if (!capable(CAP_DAC_READ_SEARCH))
167c846af05SMiklos Szeredi 		return NULL;
168c846af05SMiklos Szeredi 
169a9d01957SAmir Goldstein 	/*
170a9d01957SAmir Goldstein 	 * Make sure that the stored uuid matches the uuid of the lower
171a9d01957SAmir Goldstein 	 * layer where file handle will be decoded.
1725830fb6bSPavel Tikhomirov 	 * In case of uuid=off option just make sure that stored uuid is null.
173a9d01957SAmir Goldstein 	 */
1745830fb6bSPavel Tikhomirov 	if (ofs->config.uuid ? !uuid_equal(&fh->fb.uuid, &mnt->mnt_sb->s_uuid) :
1755830fb6bSPavel Tikhomirov 			      !uuid_is_null(&fh->fb.uuid))
1762e1a5328SAmir Goldstein 		return NULL;
177a9d01957SAmir Goldstein 
178cbe7fba8SAmir Goldstein 	bytes = (fh->fb.len - offsetof(struct ovl_fb, fid));
179cbe7fba8SAmir Goldstein 	real = exportfs_decode_fh(mnt, (struct fid *)fh->fb.fid,
180cbe7fba8SAmir Goldstein 				  bytes >> 2, (int)fh->fb.type,
1818a22efa1SAmir Goldstein 				  connected ? ovl_acceptable : NULL, mnt);
182e8f9e5b7SAmir Goldstein 	if (IS_ERR(real)) {
183e8f9e5b7SAmir Goldstein 		/*
184e8f9e5b7SAmir Goldstein 		 * Treat stale file handle to lower file as "origin unknown".
185e8f9e5b7SAmir Goldstein 		 * upper file handle could become stale when upper file is
186e8f9e5b7SAmir Goldstein 		 * unlinked and this information is needed to handle stale
187e8f9e5b7SAmir Goldstein 		 * index entries correctly.
188e8f9e5b7SAmir Goldstein 		 */
189e8f9e5b7SAmir Goldstein 		if (real == ERR_PTR(-ESTALE) &&
190cbe7fba8SAmir Goldstein 		    !(fh->fb.flags & OVL_FH_FLAG_PATH_UPPER))
191e8f9e5b7SAmir Goldstein 			real = NULL;
192e8f9e5b7SAmir Goldstein 		return real;
193a9d01957SAmir Goldstein 	}
194a9d01957SAmir Goldstein 
195e8f9e5b7SAmir Goldstein 	if (ovl_dentry_weird(real)) {
196e8f9e5b7SAmir Goldstein 		dput(real);
1972e1a5328SAmir Goldstein 		return NULL;
1982e1a5328SAmir Goldstein 	}
1992e1a5328SAmir Goldstein 
200e8f9e5b7SAmir Goldstein 	return real;
201a9d01957SAmir Goldstein }
202a9d01957SAmir Goldstein 
2032d343087SAl Viro static bool ovl_is_opaquedir(struct ovl_fs *ofs, const struct path *path)
204ee1d6d37SAmir Goldstein {
205dad7017aSChristian Brauner 	return ovl_path_check_dir_xattr(ofs, path, OVL_XATTR_OPAQUE);
206ee1d6d37SAmir Goldstein }
207ee1d6d37SAmir Goldstein 
208ba9ea771SChristian Brauner static struct dentry *ovl_lookup_positive_unlocked(struct ovl_lookup_data *d,
209ba9ea771SChristian Brauner 						   const char *name,
2101434a65eSChengguang Xu 						   struct dentry *base, int len,
2111434a65eSChengguang Xu 						   bool drop_negative)
2121434a65eSChengguang Xu {
2134609e1f1SChristian Brauner 	struct dentry *ret = lookup_one_unlocked(mnt_idmap(d->mnt), name, base, len);
2141434a65eSChengguang Xu 
2151434a65eSChengguang Xu 	if (!IS_ERR(ret) && d_flags_negative(smp_load_acquire(&ret->d_flags))) {
2161434a65eSChengguang Xu 		if (drop_negative && ret->d_lockref.count == 1) {
2171434a65eSChengguang Xu 			spin_lock(&ret->d_lock);
2181434a65eSChengguang Xu 			/* Recheck condition under lock */
2191434a65eSChengguang Xu 			if (d_is_negative(ret) && ret->d_lockref.count == 1)
2201434a65eSChengguang Xu 				__d_drop(ret);
2211434a65eSChengguang Xu 			spin_unlock(&ret->d_lock);
2221434a65eSChengguang Xu 		}
2231434a65eSChengguang Xu 		dput(ret);
2241434a65eSChengguang Xu 		ret = ERR_PTR(-ENOENT);
2251434a65eSChengguang Xu 	}
2261434a65eSChengguang Xu 	return ret;
2271434a65eSChengguang Xu }
2281434a65eSChengguang Xu 
229e28edc46SMiklos Szeredi static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d,
230e28edc46SMiklos Szeredi 			     const char *name, unsigned int namelen,
23102b69b28SMiklos Szeredi 			     size_t prelen, const char *post,
2321434a65eSChengguang Xu 			     struct dentry **ret, bool drop_negative)
233e28edc46SMiklos Szeredi {
234e28edc46SMiklos Szeredi 	struct dentry *this;
235dad7017aSChristian Brauner 	struct path path;
236e28edc46SMiklos Szeredi 	int err;
237102b0d11SVivek Goyal 	bool last_element = !post[0];
238e28edc46SMiklos Szeredi 
239ba9ea771SChristian Brauner 	this = ovl_lookup_positive_unlocked(d, name, base, namelen, drop_negative);
240e28edc46SMiklos Szeredi 	if (IS_ERR(this)) {
241e28edc46SMiklos Szeredi 		err = PTR_ERR(this);
242e28edc46SMiklos Szeredi 		this = NULL;
243e28edc46SMiklos Szeredi 		if (err == -ENOENT || err == -ENAMETOOLONG)
244e28edc46SMiklos Szeredi 			goto out;
245e28edc46SMiklos Szeredi 		goto out_err;
246e28edc46SMiklos Szeredi 	}
247e28edc46SMiklos Szeredi 
248e28edc46SMiklos Szeredi 	if (ovl_dentry_weird(this)) {
249e28edc46SMiklos Szeredi 		/* Don't support traversing automounts and other weirdness */
250e28edc46SMiklos Szeredi 		err = -EREMOTE;
251e28edc46SMiklos Szeredi 		goto out_err;
252e28edc46SMiklos Szeredi 	}
253e28edc46SMiklos Szeredi 	if (ovl_is_whiteout(this)) {
254e28edc46SMiklos Szeredi 		d->stop = d->opaque = true;
255e28edc46SMiklos Szeredi 		goto put_and_out;
256e28edc46SMiklos Szeredi 	}
2573a291774SMiklos Szeredi 	/*
2589d3dfea3SVivek Goyal 	 * This dentry should be a regular file if previous layer lookup
2599d3dfea3SVivek Goyal 	 * found a metacopy dentry.
2603a291774SMiklos Szeredi 	 */
2619d3dfea3SVivek Goyal 	if (last_element && d->metacopy && !d_is_reg(this)) {
2629d3dfea3SVivek Goyal 		d->stop = true;
2639d3dfea3SVivek Goyal 		goto put_and_out;
2649d3dfea3SVivek Goyal 	}
265dad7017aSChristian Brauner 
266dad7017aSChristian Brauner 	path.dentry = this;
267dad7017aSChristian Brauner 	path.mnt = d->mnt;
2689d3dfea3SVivek Goyal 	if (!d_can_lookup(this)) {
2699d3dfea3SVivek Goyal 		if (d->is_dir || !last_element) {
2709d3dfea3SVivek Goyal 			d->stop = true;
2719d3dfea3SVivek Goyal 			goto put_and_out;
2729d3dfea3SVivek Goyal 		}
273dad7017aSChristian Brauner 		err = ovl_check_metacopy_xattr(OVL_FS(d->sb), &path);
2749d3dfea3SVivek Goyal 		if (err < 0)
2759d3dfea3SVivek Goyal 			goto out_err;
2769d3dfea3SVivek Goyal 
2779d3dfea3SVivek Goyal 		d->metacopy = err;
2789d3dfea3SVivek Goyal 		d->stop = !d->metacopy;
279b8a8824cSVivek Goyal 		if (!d->metacopy || d->last)
280e28edc46SMiklos Szeredi 			goto out;
2810618a816SVivek Goyal 	} else {
282146d62e5SAmir Goldstein 		if (ovl_lookup_trap_inode(d->sb, this)) {
283146d62e5SAmir Goldstein 			/* Caught in a trap of overlapping layers */
284146d62e5SAmir Goldstein 			err = -ELOOP;
285146d62e5SAmir Goldstein 			goto out_err;
286146d62e5SAmir Goldstein 		}
287146d62e5SAmir Goldstein 
288102b0d11SVivek Goyal 		if (last_element)
289e28edc46SMiklos Szeredi 			d->is_dir = true;
290e9b77f90SVivek Goyal 		if (d->last)
291e9b77f90SVivek Goyal 			goto out;
292e9b77f90SVivek Goyal 
293dad7017aSChristian Brauner 		if (ovl_is_opaquedir(OVL_FS(d->sb), &path)) {
294102b0d11SVivek Goyal 			d->stop = true;
295102b0d11SVivek Goyal 			if (last_element)
296102b0d11SVivek Goyal 				d->opaque = true;
297e28edc46SMiklos Szeredi 			goto out;
298e28edc46SMiklos Szeredi 		}
2990618a816SVivek Goyal 	}
300dad7017aSChristian Brauner 	err = ovl_check_redirect(&path, d, prelen, post);
30102b69b28SMiklos Szeredi 	if (err)
30202b69b28SMiklos Szeredi 		goto out_err;
303e28edc46SMiklos Szeredi out:
304e28edc46SMiklos Szeredi 	*ret = this;
305e28edc46SMiklos Szeredi 	return 0;
306e28edc46SMiklos Szeredi 
307e28edc46SMiklos Szeredi put_and_out:
308e28edc46SMiklos Szeredi 	dput(this);
309e28edc46SMiklos Szeredi 	this = NULL;
310e28edc46SMiklos Szeredi 	goto out;
311e28edc46SMiklos Szeredi 
312e28edc46SMiklos Szeredi out_err:
313e28edc46SMiklos Szeredi 	dput(this);
314e28edc46SMiklos Szeredi 	return err;
315e28edc46SMiklos Szeredi }
316e28edc46SMiklos Szeredi 
317e28edc46SMiklos Szeredi static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d,
3181434a65eSChengguang Xu 			    struct dentry **ret, bool drop_negative)
319e28edc46SMiklos Szeredi {
3204c7d0c9cSAmir Goldstein 	/* Counting down from the end, since the prefix can change */
3214c7d0c9cSAmir Goldstein 	size_t rem = d->name.len - 1;
32202b69b28SMiklos Szeredi 	struct dentry *dentry = NULL;
32302b69b28SMiklos Szeredi 	int err;
32402b69b28SMiklos Szeredi 
3254c7d0c9cSAmir Goldstein 	if (d->name.name[0] != '/')
32602b69b28SMiklos Szeredi 		return ovl_lookup_single(base, d, d->name.name, d->name.len,
3271434a65eSChengguang Xu 					 0, "", ret, drop_negative);
32802b69b28SMiklos Szeredi 
3294c7d0c9cSAmir Goldstein 	while (!IS_ERR_OR_NULL(base) && d_can_lookup(base)) {
3304c7d0c9cSAmir Goldstein 		const char *s = d->name.name + d->name.len - rem;
33102b69b28SMiklos Szeredi 		const char *next = strchrnul(s, '/');
3324c7d0c9cSAmir Goldstein 		size_t thislen = next - s;
3334c7d0c9cSAmir Goldstein 		bool end = !next[0];
33402b69b28SMiklos Szeredi 
3354c7d0c9cSAmir Goldstein 		/* Verify we did not go off the rails */
3364c7d0c9cSAmir Goldstein 		if (WARN_ON(s[-1] != '/'))
33702b69b28SMiklos Szeredi 			return -EIO;
33802b69b28SMiklos Szeredi 
3394c7d0c9cSAmir Goldstein 		err = ovl_lookup_single(base, d, s, thislen,
3401434a65eSChengguang Xu 					d->name.len - rem, next, &base,
3411434a65eSChengguang Xu 					drop_negative);
34202b69b28SMiklos Szeredi 		dput(dentry);
34302b69b28SMiklos Szeredi 		if (err)
34402b69b28SMiklos Szeredi 			return err;
34502b69b28SMiklos Szeredi 		dentry = base;
3464c7d0c9cSAmir Goldstein 		if (end)
3474c7d0c9cSAmir Goldstein 			break;
3484c7d0c9cSAmir Goldstein 
3494c7d0c9cSAmir Goldstein 		rem -= thislen + 1;
3504c7d0c9cSAmir Goldstein 
3514c7d0c9cSAmir Goldstein 		if (WARN_ON(rem >= d->name.len))
3524c7d0c9cSAmir Goldstein 			return -EIO;
35302b69b28SMiklos Szeredi 	}
35402b69b28SMiklos Szeredi 	*ret = dentry;
35502b69b28SMiklos Szeredi 	return 0;
356e28edc46SMiklos Szeredi }
357e28edc46SMiklos Szeredi 
3585436ab0aSAmir Goldstein static int ovl_lookup_data_layer(struct dentry *dentry, const char *redirect,
3595436ab0aSAmir Goldstein 				 const struct ovl_layer *layer,
3605436ab0aSAmir Goldstein 				 struct path *datapath)
3615436ab0aSAmir Goldstein {
3625436ab0aSAmir Goldstein 	int err;
3635436ab0aSAmir Goldstein 
3645436ab0aSAmir Goldstein 	err = vfs_path_lookup(layer->mnt->mnt_root, layer->mnt, redirect,
3655436ab0aSAmir Goldstein 			LOOKUP_BENEATH | LOOKUP_NO_SYMLINKS | LOOKUP_NO_XDEV,
3665436ab0aSAmir Goldstein 			datapath);
3675436ab0aSAmir Goldstein 	pr_debug("lookup lowerdata (%pd2, redirect=\"%s\", layer=%d, err=%i)\n",
3685436ab0aSAmir Goldstein 		 dentry, redirect, layer->idx, err);
3695436ab0aSAmir Goldstein 
3705436ab0aSAmir Goldstein 	if (err)
3715436ab0aSAmir Goldstein 		return err;
3725436ab0aSAmir Goldstein 
3735436ab0aSAmir Goldstein 	err = -EREMOTE;
3745436ab0aSAmir Goldstein 	if (ovl_dentry_weird(datapath->dentry))
3755436ab0aSAmir Goldstein 		goto out_path_put;
3765436ab0aSAmir Goldstein 
3775436ab0aSAmir Goldstein 	err = -ENOENT;
3785436ab0aSAmir Goldstein 	/* Only regular file is acceptable as lower data */
3795436ab0aSAmir Goldstein 	if (!d_is_reg(datapath->dentry))
3805436ab0aSAmir Goldstein 		goto out_path_put;
3815436ab0aSAmir Goldstein 
3825436ab0aSAmir Goldstein 	return 0;
3835436ab0aSAmir Goldstein 
3845436ab0aSAmir Goldstein out_path_put:
3855436ab0aSAmir Goldstein 	path_put(datapath);
3865436ab0aSAmir Goldstein 
3875436ab0aSAmir Goldstein 	return err;
3885436ab0aSAmir Goldstein }
3895436ab0aSAmir Goldstein 
3905436ab0aSAmir Goldstein /* Lookup in data-only layers by absolute redirect to layer root */
3915436ab0aSAmir Goldstein static int ovl_lookup_data_layers(struct dentry *dentry, const char *redirect,
3925436ab0aSAmir Goldstein 				  struct ovl_path *lowerdata)
3935436ab0aSAmir Goldstein {
3945436ab0aSAmir Goldstein 	struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
3955436ab0aSAmir Goldstein 	const struct ovl_layer *layer;
3965436ab0aSAmir Goldstein 	struct path datapath;
3975436ab0aSAmir Goldstein 	int err = -ENOENT;
3985436ab0aSAmir Goldstein 	int i;
3995436ab0aSAmir Goldstein 
4005436ab0aSAmir Goldstein 	layer = &ofs->layers[ofs->numlayer - ofs->numdatalayer];
4015436ab0aSAmir Goldstein 	for (i = 0; i < ofs->numdatalayer; i++, layer++) {
4025436ab0aSAmir Goldstein 		err = ovl_lookup_data_layer(dentry, redirect, layer, &datapath);
4035436ab0aSAmir Goldstein 		if (!err) {
4045436ab0aSAmir Goldstein 			mntput(datapath.mnt);
4055436ab0aSAmir Goldstein 			lowerdata->dentry = datapath.dentry;
4065436ab0aSAmir Goldstein 			lowerdata->layer = layer;
4075436ab0aSAmir Goldstein 			return 0;
4085436ab0aSAmir Goldstein 		}
4095436ab0aSAmir Goldstein 	}
4105436ab0aSAmir Goldstein 
4115436ab0aSAmir Goldstein 	return err;
4125436ab0aSAmir Goldstein }
413a9d01957SAmir Goldstein 
4148a22efa1SAmir Goldstein int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, bool connected,
415f941866fSAmir Goldstein 			struct dentry *upperdentry, struct ovl_path **stackp)
416a9d01957SAmir Goldstein {
417f7d3dacaSAmir Goldstein 	struct dentry *origin = NULL;
418f7d3dacaSAmir Goldstein 	int i;
419a9d01957SAmir Goldstein 
42037ebf056SAmir Goldstein 	for (i = 1; i <= ovl_numlowerlayer(ofs); i++) {
4217e63c87fSAmir Goldstein 		/*
4227e63c87fSAmir Goldstein 		 * If lower fs uuid is not unique among lower fs we cannot match
4237e63c87fSAmir Goldstein 		 * fh->uuid to layer.
4247e63c87fSAmir Goldstein 		 */
42594375f9dSAmir Goldstein 		if (ofs->layers[i].fsid &&
42694375f9dSAmir Goldstein 		    ofs->layers[i].fs->bad_uuid)
4277e63c87fSAmir Goldstein 			continue;
4287e63c87fSAmir Goldstein 
4291cdb0cb6SPavel Tikhomirov 		origin = ovl_decode_real_fh(ofs, fh, ofs->layers[i].mnt,
4308a22efa1SAmir Goldstein 					    connected);
431f7d3dacaSAmir Goldstein 		if (origin)
432f7d3dacaSAmir Goldstein 			break;
433f7d3dacaSAmir Goldstein 	}
434f7d3dacaSAmir Goldstein 
435f7d3dacaSAmir Goldstein 	if (!origin)
4362e1a5328SAmir Goldstein 		return -ESTALE;
4372e1a5328SAmir Goldstein 	else if (IS_ERR(origin))
4382e1a5328SAmir Goldstein 		return PTR_ERR(origin);
439f7d3dacaSAmir Goldstein 
440f941866fSAmir Goldstein 	if (upperdentry && !ovl_is_whiteout(upperdentry) &&
4416e3e2c43SAl Viro 	    inode_wrong_type(d_inode(upperdentry), d_inode(origin)->i_mode))
4422e1a5328SAmir Goldstein 		goto invalid;
4432e1a5328SAmir Goldstein 
444415543d5SAmir Goldstein 	if (!*stackp)
445b9343632SChandan Rajendra 		*stackp = kmalloc(sizeof(struct ovl_path), GFP_KERNEL);
446a9d01957SAmir Goldstein 	if (!*stackp) {
447a9d01957SAmir Goldstein 		dput(origin);
448a9d01957SAmir Goldstein 		return -ENOMEM;
449a9d01957SAmir Goldstein 	}
4501eff1a1dSAmir Goldstein 	**stackp = (struct ovl_path){
4511eff1a1dSAmir Goldstein 		.dentry = origin,
45294375f9dSAmir Goldstein 		.layer = &ofs->layers[i]
4531eff1a1dSAmir Goldstein 	};
454a9d01957SAmir Goldstein 
455a9d01957SAmir Goldstein 	return 0;
4562e1a5328SAmir Goldstein 
4572e1a5328SAmir Goldstein invalid:
4581bd0a3aeSlijiazi 	pr_warn_ratelimited("invalid origin (%pd2, ftype=%x, origin ftype=%x).\n",
4592e1a5328SAmir Goldstein 			    upperdentry, d_inode(upperdentry)->i_mode & S_IFMT,
4602e1a5328SAmir Goldstein 			    d_inode(origin)->i_mode & S_IFMT);
4612e1a5328SAmir Goldstein 	dput(origin);
462ffb24e3cSAmir Goldstein 	return -ESTALE;
4632e1a5328SAmir Goldstein }
4642e1a5328SAmir Goldstein 
4651eff1a1dSAmir Goldstein static int ovl_check_origin(struct ovl_fs *ofs, struct dentry *upperdentry,
466d78a0dcfSyoungjun 			    struct ovl_path **stackp)
4672e1a5328SAmir Goldstein {
468610afc0bSMiklos Szeredi 	struct ovl_fh *fh = ovl_get_fh(ofs, upperdentry, OVL_XATTR_ORIGIN);
4692e1a5328SAmir Goldstein 	int err;
4702e1a5328SAmir Goldstein 
4712e1a5328SAmir Goldstein 	if (IS_ERR_OR_NULL(fh))
4722e1a5328SAmir Goldstein 		return PTR_ERR(fh);
4732e1a5328SAmir Goldstein 
4748a22efa1SAmir Goldstein 	err = ovl_check_origin_fh(ofs, fh, false, upperdentry, stackp);
4752e1a5328SAmir Goldstein 	kfree(fh);
4762e1a5328SAmir Goldstein 
4772e1a5328SAmir Goldstein 	if (err) {
4782e1a5328SAmir Goldstein 		if (err == -ESTALE)
4792e1a5328SAmir Goldstein 			return 0;
4802e1a5328SAmir Goldstein 		return err;
4812e1a5328SAmir Goldstein 	}
4822e1a5328SAmir Goldstein 
4832e1a5328SAmir Goldstein 	return 0;
484a9d01957SAmir Goldstein }
485a9d01957SAmir Goldstein 
486bbb1e54dSMiklos Szeredi /*
48705122443SAmir Goldstein  * Verify that @fh matches the file handle stored in xattr @name.
4888b88a2e6SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch, < 0 on error.
4898b88a2e6SAmir Goldstein  */
490610afc0bSMiklos Szeredi static int ovl_verify_fh(struct ovl_fs *ofs, struct dentry *dentry,
49143d193f8SMiklos Szeredi 			 enum ovl_xattr ox, const struct ovl_fh *fh)
4928b88a2e6SAmir Goldstein {
49343d193f8SMiklos Szeredi 	struct ovl_fh *ofh = ovl_get_fh(ofs, dentry, ox);
4948b88a2e6SAmir Goldstein 	int err = 0;
4958b88a2e6SAmir Goldstein 
4968b88a2e6SAmir Goldstein 	if (!ofh)
4978b88a2e6SAmir Goldstein 		return -ENODATA;
4988b88a2e6SAmir Goldstein 
4998b88a2e6SAmir Goldstein 	if (IS_ERR(ofh))
5008b88a2e6SAmir Goldstein 		return PTR_ERR(ofh);
5018b88a2e6SAmir Goldstein 
502cbe7fba8SAmir Goldstein 	if (fh->fb.len != ofh->fb.len || memcmp(&fh->fb, &ofh->fb, fh->fb.len))
5038b88a2e6SAmir Goldstein 		err = -ESTALE;
5048b88a2e6SAmir Goldstein 
5058b88a2e6SAmir Goldstein 	kfree(ofh);
5068b88a2e6SAmir Goldstein 	return err;
5078b88a2e6SAmir Goldstein }
5088b88a2e6SAmir Goldstein 
5098b88a2e6SAmir Goldstein /*
51005122443SAmir Goldstein  * Verify that @real dentry matches the file handle stored in xattr @name.
5118b88a2e6SAmir Goldstein  *
51205122443SAmir Goldstein  * If @set is true and there is no stored file handle, encode @real and store
51305122443SAmir Goldstein  * file handle in xattr @name.
5148b88a2e6SAmir Goldstein  *
51505122443SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
5168b88a2e6SAmir Goldstein  */
517610afc0bSMiklos Szeredi int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
51843d193f8SMiklos Szeredi 		      enum ovl_xattr ox, struct dentry *real, bool is_upper,
519610afc0bSMiklos Szeredi 		      bool set)
5208b88a2e6SAmir Goldstein {
5218b88a2e6SAmir Goldstein 	struct inode *inode;
5228b88a2e6SAmir Goldstein 	struct ovl_fh *fh;
5238b88a2e6SAmir Goldstein 	int err;
5248b88a2e6SAmir Goldstein 
5251cdb0cb6SPavel Tikhomirov 	fh = ovl_encode_real_fh(ofs, real, is_upper);
5268b88a2e6SAmir Goldstein 	err = PTR_ERR(fh);
527babf4770SAmir Goldstein 	if (IS_ERR(fh)) {
528babf4770SAmir Goldstein 		fh = NULL;
5298b88a2e6SAmir Goldstein 		goto fail;
530babf4770SAmir Goldstein 	}
5318b88a2e6SAmir Goldstein 
53243d193f8SMiklos Szeredi 	err = ovl_verify_fh(ofs, dentry, ox, fh);
5338b88a2e6SAmir Goldstein 	if (set && err == -ENODATA)
534c914c0e2SAmir Goldstein 		err = ovl_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len);
5358b88a2e6SAmir Goldstein 	if (err)
5368b88a2e6SAmir Goldstein 		goto fail;
5378b88a2e6SAmir Goldstein 
5388b88a2e6SAmir Goldstein out:
5398b88a2e6SAmir Goldstein 	kfree(fh);
5408b88a2e6SAmir Goldstein 	return err;
5418b88a2e6SAmir Goldstein 
5428b88a2e6SAmir Goldstein fail:
54305122443SAmir Goldstein 	inode = d_inode(real);
5441bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to verify %s (%pd2, ino=%lu, err=%i)\n",
54505122443SAmir Goldstein 			    is_upper ? "upper" : "origin", real,
54605122443SAmir Goldstein 			    inode ? inode->i_ino : 0, err);
5478b88a2e6SAmir Goldstein 	goto out;
5488b88a2e6SAmir Goldstein }
5498b88a2e6SAmir Goldstein 
550e8f9e5b7SAmir Goldstein /* Get upper dentry from index */
5518ea28765SAmir Goldstein struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index,
5528ea28765SAmir Goldstein 			       bool connected)
553e8f9e5b7SAmir Goldstein {
554e8f9e5b7SAmir Goldstein 	struct ovl_fh *fh;
555e8f9e5b7SAmir Goldstein 	struct dentry *upper;
556e8f9e5b7SAmir Goldstein 
557e8f9e5b7SAmir Goldstein 	if (!d_is_dir(index))
558e8f9e5b7SAmir Goldstein 		return dget(index);
559e8f9e5b7SAmir Goldstein 
560610afc0bSMiklos Szeredi 	fh = ovl_get_fh(ofs, index, OVL_XATTR_UPPER);
561e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(fh))
562e8f9e5b7SAmir Goldstein 		return ERR_CAST(fh);
563e8f9e5b7SAmir Goldstein 
5648ea28765SAmir Goldstein 	upper = ovl_decode_real_fh(ofs, fh, ovl_upper_mnt(ofs), connected);
565e8f9e5b7SAmir Goldstein 	kfree(fh);
566e8f9e5b7SAmir Goldstein 
567e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(upper))
568e8f9e5b7SAmir Goldstein 		return upper ?: ERR_PTR(-ESTALE);
569e8f9e5b7SAmir Goldstein 
570e8f9e5b7SAmir Goldstein 	if (!d_is_dir(upper)) {
5711bd0a3aeSlijiazi 		pr_warn_ratelimited("invalid index upper (%pd2, upper=%pd2).\n",
572e8f9e5b7SAmir Goldstein 				    index, upper);
573e8f9e5b7SAmir Goldstein 		dput(upper);
574e8f9e5b7SAmir Goldstein 		return ERR_PTR(-EIO);
575e8f9e5b7SAmir Goldstein 	}
576e8f9e5b7SAmir Goldstein 
577e8f9e5b7SAmir Goldstein 	return upper;
578e8f9e5b7SAmir Goldstein }
579e8f9e5b7SAmir Goldstein 
5808b88a2e6SAmir Goldstein /*
581415543d5SAmir Goldstein  * Verify that an index entry name matches the origin file handle stored in
582415543d5SAmir Goldstein  * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path.
583415543d5SAmir Goldstein  * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error.
584415543d5SAmir Goldstein  */
5851eff1a1dSAmir Goldstein int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index)
586415543d5SAmir Goldstein {
587415543d5SAmir Goldstein 	struct ovl_fh *fh = NULL;
588415543d5SAmir Goldstein 	size_t len;
589b9343632SChandan Rajendra 	struct ovl_path origin = { };
590b9343632SChandan Rajendra 	struct ovl_path *stack = &origin;
591e8f9e5b7SAmir Goldstein 	struct dentry *upper = NULL;
592415543d5SAmir Goldstein 	int err;
593415543d5SAmir Goldstein 
594415543d5SAmir Goldstein 	if (!d_inode(index))
595415543d5SAmir Goldstein 		return 0;
596415543d5SAmir Goldstein 
597fa0096e3SAmir Goldstein 	err = -EINVAL;
598cbe7fba8SAmir Goldstein 	if (index->d_name.len < sizeof(struct ovl_fb)*2)
599415543d5SAmir Goldstein 		goto fail;
600415543d5SAmir Goldstein 
601415543d5SAmir Goldstein 	err = -ENOMEM;
602415543d5SAmir Goldstein 	len = index->d_name.len / 2;
603cbe7fba8SAmir Goldstein 	fh = kzalloc(len + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
604415543d5SAmir Goldstein 	if (!fh)
605415543d5SAmir Goldstein 		goto fail;
606415543d5SAmir Goldstein 
607415543d5SAmir Goldstein 	err = -EINVAL;
608cbe7fba8SAmir Goldstein 	if (hex2bin(fh->buf, index->d_name.name, len))
6092e1a5328SAmir Goldstein 		goto fail;
6102e1a5328SAmir Goldstein 
611cbe7fba8SAmir Goldstein 	err = ovl_check_fb_len(&fh->fb, len);
6122e1a5328SAmir Goldstein 	if (err)
613415543d5SAmir Goldstein 		goto fail;
614415543d5SAmir Goldstein 
6157db25d36SAmir Goldstein 	/*
6167db25d36SAmir Goldstein 	 * Whiteout index entries are used as an indication that an exported
6177db25d36SAmir Goldstein 	 * overlay file handle should be treated as stale (i.e. after unlink
6187db25d36SAmir Goldstein 	 * of the overlay inode). These entries contain no origin xattr.
6197db25d36SAmir Goldstein 	 */
6207db25d36SAmir Goldstein 	if (ovl_is_whiteout(index))
6217db25d36SAmir Goldstein 		goto out;
6227db25d36SAmir Goldstein 
623e8f9e5b7SAmir Goldstein 	/*
624e8f9e5b7SAmir Goldstein 	 * Verifying directory index entries are not stale is expensive, so
625e8f9e5b7SAmir Goldstein 	 * only verify stale dir index if NFS export is enabled.
626e8f9e5b7SAmir Goldstein 	 */
627e8f9e5b7SAmir Goldstein 	if (d_is_dir(index) && !ofs->config.nfs_export)
628e8f9e5b7SAmir Goldstein 		goto out;
629e8f9e5b7SAmir Goldstein 
630e8f9e5b7SAmir Goldstein 	/*
631e8f9e5b7SAmir Goldstein 	 * Directory index entries should have 'upper' xattr pointing to the
632e8f9e5b7SAmir Goldstein 	 * real upper dir. Non-dir index entries are hardlinks to the upper
633e8f9e5b7SAmir Goldstein 	 * real inode. For non-dir index, we can read the copy up origin xattr
634e8f9e5b7SAmir Goldstein 	 * directly from the index dentry, but for dir index we first need to
635e8f9e5b7SAmir Goldstein 	 * decode the upper directory.
636e8f9e5b7SAmir Goldstein 	 */
6378ea28765SAmir Goldstein 	upper = ovl_index_upper(ofs, index, false);
638e8f9e5b7SAmir Goldstein 	if (IS_ERR_OR_NULL(upper)) {
639e8f9e5b7SAmir Goldstein 		err = PTR_ERR(upper);
64024f0b172SAmir Goldstein 		/*
64124f0b172SAmir Goldstein 		 * Directory index entries with no 'upper' xattr need to be
64224f0b172SAmir Goldstein 		 * removed. When dir index entry has a stale 'upper' xattr,
64324f0b172SAmir Goldstein 		 * we assume that upper dir was removed and we treat the dir
64424f0b172SAmir Goldstein 		 * index as orphan entry that needs to be whited out.
64524f0b172SAmir Goldstein 		 */
64624f0b172SAmir Goldstein 		if (err == -ESTALE)
64724f0b172SAmir Goldstein 			goto orphan;
64824f0b172SAmir Goldstein 		else if (!err)
649e8f9e5b7SAmir Goldstein 			err = -ESTALE;
650e8f9e5b7SAmir Goldstein 		goto fail;
651e8f9e5b7SAmir Goldstein 	}
652e8f9e5b7SAmir Goldstein 
653610afc0bSMiklos Szeredi 	err = ovl_verify_fh(ofs, upper, OVL_XATTR_ORIGIN, fh);
654e8f9e5b7SAmir Goldstein 	dput(upper);
655415543d5SAmir Goldstein 	if (err)
656415543d5SAmir Goldstein 		goto fail;
657415543d5SAmir Goldstein 
658e8f9e5b7SAmir Goldstein 	/* Check if non-dir index is orphan and don't warn before cleaning it */
659e8f9e5b7SAmir Goldstein 	if (!d_is_dir(index) && d_inode(index)->i_nlink == 1) {
6608a22efa1SAmir Goldstein 		err = ovl_check_origin_fh(ofs, fh, false, index, &stack);
661415543d5SAmir Goldstein 		if (err)
662415543d5SAmir Goldstein 			goto fail;
663415543d5SAmir Goldstein 
664610afc0bSMiklos Szeredi 		if (ovl_get_nlink(ofs, origin.dentry, index, 0) == 0)
66524f0b172SAmir Goldstein 			goto orphan;
666e8f9e5b7SAmir Goldstein 	}
667caf70cb2SAmir Goldstein 
668415543d5SAmir Goldstein out:
669e8f9e5b7SAmir Goldstein 	dput(origin.dentry);
670415543d5SAmir Goldstein 	kfree(fh);
671415543d5SAmir Goldstein 	return err;
672415543d5SAmir Goldstein 
673415543d5SAmir Goldstein fail:
6741bd0a3aeSlijiazi 	pr_warn_ratelimited("failed to verify index (%pd2, ftype=%x, err=%i)\n",
67561b67471SAmir Goldstein 			    index, d_inode(index)->i_mode & S_IFMT, err);
676415543d5SAmir Goldstein 	goto out;
67724f0b172SAmir Goldstein 
67824f0b172SAmir Goldstein orphan:
6791bd0a3aeSlijiazi 	pr_warn_ratelimited("orphan index entry (%pd2, ftype=%x, nlink=%u)\n",
68024f0b172SAmir Goldstein 			    index, d_inode(index)->i_mode & S_IFMT,
68124f0b172SAmir Goldstein 			    d_inode(index)->i_nlink);
68224f0b172SAmir Goldstein 	err = -ENOENT;
68324f0b172SAmir Goldstein 	goto out;
684415543d5SAmir Goldstein }
685415543d5SAmir Goldstein 
68691ffe7beSAmir Goldstein static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name)
68791ffe7beSAmir Goldstein {
68891ffe7beSAmir Goldstein 	char *n, *s;
68991ffe7beSAmir Goldstein 
690cbe7fba8SAmir Goldstein 	n = kcalloc(fh->fb.len, 2, GFP_KERNEL);
69191ffe7beSAmir Goldstein 	if (!n)
69291ffe7beSAmir Goldstein 		return -ENOMEM;
69391ffe7beSAmir Goldstein 
694cbe7fba8SAmir Goldstein 	s  = bin2hex(n, fh->buf, fh->fb.len);
69591ffe7beSAmir Goldstein 	*name = (struct qstr) QSTR_INIT(n, s - n);
69691ffe7beSAmir Goldstein 
69791ffe7beSAmir Goldstein 	return 0;
69891ffe7beSAmir Goldstein 
69991ffe7beSAmir Goldstein }
70091ffe7beSAmir Goldstein 
701415543d5SAmir Goldstein /*
702359f392cSAmir Goldstein  * Lookup in indexdir for the index entry of a lower real inode or a copy up
703359f392cSAmir Goldstein  * origin inode. The index entry name is the hex representation of the lower
704359f392cSAmir Goldstein  * inode file handle.
705359f392cSAmir Goldstein  *
706359f392cSAmir Goldstein  * If the index dentry in negative, then either no lower aliases have been
707359f392cSAmir Goldstein  * copied up yet, or aliases have been copied up in older kernels and are
708359f392cSAmir Goldstein  * not indexed.
709359f392cSAmir Goldstein  *
710359f392cSAmir Goldstein  * If the index dentry for a copy up origin inode is positive, but points
711359f392cSAmir Goldstein  * to an inode different than the upper inode, then either the upper inode
712359f392cSAmir Goldstein  * has been copied up and not indexed or it was indexed, but since then
7134f119628SWilliam Dean  * index dir was cleared. Either way, that index cannot be used to identify
714359f392cSAmir Goldstein  * the overlay inode.
715359f392cSAmir Goldstein  */
7161cdb0cb6SPavel Tikhomirov int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin,
7171cdb0cb6SPavel Tikhomirov 		       struct qstr *name)
718359f392cSAmir Goldstein {
719359f392cSAmir Goldstein 	struct ovl_fh *fh;
72091ffe7beSAmir Goldstein 	int err;
721359f392cSAmir Goldstein 
7221cdb0cb6SPavel Tikhomirov 	fh = ovl_encode_real_fh(ofs, origin, false);
723359f392cSAmir Goldstein 	if (IS_ERR(fh))
724359f392cSAmir Goldstein 		return PTR_ERR(fh);
725359f392cSAmir Goldstein 
72691ffe7beSAmir Goldstein 	err = ovl_get_index_name_fh(fh, name);
72791ffe7beSAmir Goldstein 
728359f392cSAmir Goldstein 	kfree(fh);
729359f392cSAmir Goldstein 	return err;
73091ffe7beSAmir Goldstein }
731359f392cSAmir Goldstein 
73291ffe7beSAmir Goldstein /* Lookup index by file handle for NFS export */
73391ffe7beSAmir Goldstein struct dentry *ovl_get_index_fh(struct ovl_fs *ofs, struct ovl_fh *fh)
73491ffe7beSAmir Goldstein {
73591ffe7beSAmir Goldstein 	struct dentry *index;
73691ffe7beSAmir Goldstein 	struct qstr name;
73791ffe7beSAmir Goldstein 	int err;
73891ffe7beSAmir Goldstein 
73991ffe7beSAmir Goldstein 	err = ovl_get_index_name_fh(fh, &name);
74091ffe7beSAmir Goldstein 	if (err)
74191ffe7beSAmir Goldstein 		return ERR_PTR(err);
74291ffe7beSAmir Goldstein 
7436c2d4798SAl Viro 	index = lookup_positive_unlocked(name.name, ofs->indexdir, name.len);
74491ffe7beSAmir Goldstein 	kfree(name.name);
74591ffe7beSAmir Goldstein 	if (IS_ERR(index)) {
74691ffe7beSAmir Goldstein 		if (PTR_ERR(index) == -ENOENT)
74791ffe7beSAmir Goldstein 			index = NULL;
74891ffe7beSAmir Goldstein 		return index;
74991ffe7beSAmir Goldstein 	}
75091ffe7beSAmir Goldstein 
7516c2d4798SAl Viro 	if (ovl_is_whiteout(index))
75291ffe7beSAmir Goldstein 		err = -ESTALE;
75391ffe7beSAmir Goldstein 	else if (ovl_dentry_weird(index))
75491ffe7beSAmir Goldstein 		err = -EIO;
75591ffe7beSAmir Goldstein 	else
75691ffe7beSAmir Goldstein 		return index;
75791ffe7beSAmir Goldstein 
75891ffe7beSAmir Goldstein 	dput(index);
75991ffe7beSAmir Goldstein 	return ERR_PTR(err);
760359f392cSAmir Goldstein }
761359f392cSAmir Goldstein 
76206170154SAmir Goldstein struct dentry *ovl_lookup_index(struct ovl_fs *ofs, struct dentry *upper,
76306170154SAmir Goldstein 				struct dentry *origin, bool verify)
764359f392cSAmir Goldstein {
765359f392cSAmir Goldstein 	struct dentry *index;
766359f392cSAmir Goldstein 	struct inode *inode;
767359f392cSAmir Goldstein 	struct qstr name;
768ad1d615cSAmir Goldstein 	bool is_dir = d_is_dir(origin);
769359f392cSAmir Goldstein 	int err;
770359f392cSAmir Goldstein 
7711cdb0cb6SPavel Tikhomirov 	err = ovl_get_index_name(ofs, origin, &name);
772359f392cSAmir Goldstein 	if (err)
773359f392cSAmir Goldstein 		return ERR_PTR(err);
774359f392cSAmir Goldstein 
7754609e1f1SChristian Brauner 	index = lookup_one_positive_unlocked(ovl_upper_mnt_idmap(ofs), name.name,
776ba9ea771SChristian Brauner 					     ofs->indexdir, name.len);
777359f392cSAmir Goldstein 	if (IS_ERR(index)) {
778e0082a0fSAmir Goldstein 		err = PTR_ERR(index);
7797937a56fSAmir Goldstein 		if (err == -ENOENT) {
7807937a56fSAmir Goldstein 			index = NULL;
7817937a56fSAmir Goldstein 			goto out;
7827937a56fSAmir Goldstein 		}
7831bd0a3aeSlijiazi 		pr_warn_ratelimited("failed inode index lookup (ino=%lu, key=%.*s, err=%i);\n"
784359f392cSAmir Goldstein 				    "overlayfs: mount with '-o index=off' to disable inodes index.\n",
785359f392cSAmir Goldstein 				    d_inode(origin)->i_ino, name.len, name.name,
786359f392cSAmir Goldstein 				    err);
787359f392cSAmir Goldstein 		goto out;
788359f392cSAmir Goldstein 	}
789359f392cSAmir Goldstein 
7900e082555SAmir Goldstein 	inode = d_inode(index);
7916c2d4798SAl Viro 	if (ovl_is_whiteout(index) && !verify) {
79206170154SAmir Goldstein 		/*
79306170154SAmir Goldstein 		 * When index lookup is called with !verify for decoding an
79406170154SAmir Goldstein 		 * overlay file handle, a whiteout index implies that decode
79506170154SAmir Goldstein 		 * should treat file handle as stale and no need to print a
79606170154SAmir Goldstein 		 * warning about it.
79706170154SAmir Goldstein 		 */
79806170154SAmir Goldstein 		dput(index);
79906170154SAmir Goldstein 		index = ERR_PTR(-ESTALE);
80006170154SAmir Goldstein 		goto out;
8010e082555SAmir Goldstein 	} else if (ovl_dentry_weird(index) || ovl_is_whiteout(index) ||
8026e3e2c43SAl Viro 		   inode_wrong_type(inode, d_inode(origin)->i_mode)) {
8030e082555SAmir Goldstein 		/*
8040e082555SAmir Goldstein 		 * Index should always be of the same file type as origin
8050e082555SAmir Goldstein 		 * except for the case of a whiteout index. A whiteout
8060e082555SAmir Goldstein 		 * index should only exist if all lower aliases have been
8070e082555SAmir Goldstein 		 * unlinked, which means that finding a lower origin on lookup
8080e082555SAmir Goldstein 		 * whose index is a whiteout should be treated as an error.
8090e082555SAmir Goldstein 		 */
8101bd0a3aeSlijiazi 		pr_warn_ratelimited("bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n",
8110e082555SAmir Goldstein 				    index, d_inode(index)->i_mode & S_IFMT,
8120e082555SAmir Goldstein 				    d_inode(origin)->i_mode & S_IFMT);
813359f392cSAmir Goldstein 		goto fail;
81406170154SAmir Goldstein 	} else if (is_dir && verify) {
815ad1d615cSAmir Goldstein 		if (!upper) {
8161bd0a3aeSlijiazi 			pr_warn_ratelimited("suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n",
817ad1d615cSAmir Goldstein 					    origin, index);
818ad1d615cSAmir Goldstein 			goto fail;
819359f392cSAmir Goldstein 		}
820359f392cSAmir Goldstein 
821ad1d615cSAmir Goldstein 		/* Verify that dir index 'upper' xattr points to upper dir */
822610afc0bSMiklos Szeredi 		err = ovl_verify_upper(ofs, index, upper, false);
823ad1d615cSAmir Goldstein 		if (err) {
824ad1d615cSAmir Goldstein 			if (err == -ESTALE) {
8251bd0a3aeSlijiazi 				pr_warn_ratelimited("suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2).\n",
826ad1d615cSAmir Goldstein 						    upper, origin, index);
827ad1d615cSAmir Goldstein 			}
828ad1d615cSAmir Goldstein 			goto fail;
829ad1d615cSAmir Goldstein 		}
830ad1d615cSAmir Goldstein 	} else if (upper && d_inode(upper) != inode) {
831ad1d615cSAmir Goldstein 		goto out_dput;
832ad1d615cSAmir Goldstein 	}
833359f392cSAmir Goldstein out:
834359f392cSAmir Goldstein 	kfree(name.name);
835359f392cSAmir Goldstein 	return index;
836359f392cSAmir Goldstein 
8376eaf0111SAmir Goldstein out_dput:
8386eaf0111SAmir Goldstein 	dput(index);
8396eaf0111SAmir Goldstein 	index = NULL;
8406eaf0111SAmir Goldstein 	goto out;
8416eaf0111SAmir Goldstein 
842359f392cSAmir Goldstein fail:
843359f392cSAmir Goldstein 	dput(index);
844359f392cSAmir Goldstein 	index = ERR_PTR(-EIO);
845359f392cSAmir Goldstein 	goto out;
846359f392cSAmir Goldstein }
847359f392cSAmir Goldstein 
848359f392cSAmir Goldstein /*
849bbb1e54dSMiklos Szeredi  * Returns next layer in stack starting from top.
850bbb1e54dSMiklos Szeredi  * Returns -1 if this is the last layer.
851bbb1e54dSMiklos Szeredi  */
852bbb1e54dSMiklos Szeredi int ovl_path_next(int idx, struct dentry *dentry, struct path *path)
853bbb1e54dSMiklos Szeredi {
854a6ff2bc0SAmir Goldstein 	struct ovl_entry *oe = OVL_E(dentry);
8555522c9c7SAmir Goldstein 	struct ovl_path *lowerstack = ovl_lowerstack(oe);
856bbb1e54dSMiklos Szeredi 
857bbb1e54dSMiklos Szeredi 	BUG_ON(idx < 0);
858bbb1e54dSMiklos Szeredi 	if (idx == 0) {
859bbb1e54dSMiklos Szeredi 		ovl_path_upper(dentry, path);
860bbb1e54dSMiklos Szeredi 		if (path->dentry)
8615522c9c7SAmir Goldstein 			return ovl_numlower(oe) ? 1 : -1;
862bbb1e54dSMiklos Szeredi 		idx++;
863bbb1e54dSMiklos Szeredi 	}
8645522c9c7SAmir Goldstein 	BUG_ON(idx > ovl_numlower(oe));
8655522c9c7SAmir Goldstein 	path->dentry = lowerstack[idx - 1].dentry;
8665522c9c7SAmir Goldstein 	path->mnt = lowerstack[idx - 1].layer->mnt;
867bbb1e54dSMiklos Szeredi 
8685522c9c7SAmir Goldstein 	return (idx < ovl_numlower(oe)) ? idx + 1 : -1;
869bbb1e54dSMiklos Szeredi }
870bbb1e54dSMiklos Szeredi 
8719678e630SAmir Goldstein /* Fix missing 'origin' xattr */
872610afc0bSMiklos Szeredi static int ovl_fix_origin(struct ovl_fs *ofs, struct dentry *dentry,
873610afc0bSMiklos Szeredi 			  struct dentry *lower, struct dentry *upper)
8749678e630SAmir Goldstein {
8759678e630SAmir Goldstein 	int err;
8769678e630SAmir Goldstein 
877610afc0bSMiklos Szeredi 	if (ovl_check_origin_xattr(ofs, upper))
8789678e630SAmir Goldstein 		return 0;
8799678e630SAmir Goldstein 
8809678e630SAmir Goldstein 	err = ovl_want_write(dentry);
8819678e630SAmir Goldstein 	if (err)
8829678e630SAmir Goldstein 		return err;
8839678e630SAmir Goldstein 
884a0c236b1SAmir Goldstein 	err = ovl_set_origin(ofs, lower, upper);
8859678e630SAmir Goldstein 	if (!err)
8869678e630SAmir Goldstein 		err = ovl_set_impure(dentry->d_parent, upper->d_parent);
8879678e630SAmir Goldstein 
8889678e630SAmir Goldstein 	ovl_drop_write(dentry);
8899678e630SAmir Goldstein 	return err;
8909678e630SAmir Goldstein }
8919678e630SAmir Goldstein 
89242dd69aeSAmir Goldstein /* Lazy lookup of lowerdata */
89342dd69aeSAmir Goldstein int ovl_maybe_lookup_lowerdata(struct dentry *dentry)
89442dd69aeSAmir Goldstein {
89542dd69aeSAmir Goldstein 	struct inode *inode = d_inode(dentry);
89642dd69aeSAmir Goldstein 	const char *redirect = ovl_lowerdata_redirect(inode);
89742dd69aeSAmir Goldstein 	struct ovl_path datapath = {};
89842dd69aeSAmir Goldstein 	const struct cred *old_cred;
89942dd69aeSAmir Goldstein 	int err;
90042dd69aeSAmir Goldstein 
90142dd69aeSAmir Goldstein 	if (!redirect || ovl_dentry_lowerdata(dentry))
90242dd69aeSAmir Goldstein 		return 0;
90342dd69aeSAmir Goldstein 
90442dd69aeSAmir Goldstein 	if (redirect[0] != '/')
90542dd69aeSAmir Goldstein 		return -EIO;
90642dd69aeSAmir Goldstein 
90742dd69aeSAmir Goldstein 	err = ovl_inode_lock_interruptible(inode);
90842dd69aeSAmir Goldstein 	if (err)
90942dd69aeSAmir Goldstein 		return err;
91042dd69aeSAmir Goldstein 
91142dd69aeSAmir Goldstein 	err = 0;
91242dd69aeSAmir Goldstein 	/* Someone got here before us? */
91342dd69aeSAmir Goldstein 	if (ovl_dentry_lowerdata(dentry))
91442dd69aeSAmir Goldstein 		goto out;
91542dd69aeSAmir Goldstein 
91642dd69aeSAmir Goldstein 	old_cred = ovl_override_creds(dentry->d_sb);
91742dd69aeSAmir Goldstein 	err = ovl_lookup_data_layers(dentry, redirect, &datapath);
91842dd69aeSAmir Goldstein 	revert_creds(old_cred);
91942dd69aeSAmir Goldstein 	if (err)
92042dd69aeSAmir Goldstein 		goto out_err;
92142dd69aeSAmir Goldstein 
92242dd69aeSAmir Goldstein 	err = ovl_dentry_set_lowerdata(dentry, &datapath);
92342dd69aeSAmir Goldstein 	if (err)
92442dd69aeSAmir Goldstein 		goto out_err;
92542dd69aeSAmir Goldstein 
92642dd69aeSAmir Goldstein out:
92742dd69aeSAmir Goldstein 	ovl_inode_unlock(inode);
92842dd69aeSAmir Goldstein 	dput(datapath.dentry);
92942dd69aeSAmir Goldstein 
93042dd69aeSAmir Goldstein 	return err;
93142dd69aeSAmir Goldstein 
93242dd69aeSAmir Goldstein out_err:
93342dd69aeSAmir Goldstein 	pr_warn_ratelimited("lazy lowerdata lookup failed (%pd2, err=%i)\n",
93442dd69aeSAmir Goldstein 			    dentry, err);
93542dd69aeSAmir Goldstein 	goto out;
93642dd69aeSAmir Goldstein }
93742dd69aeSAmir Goldstein 
938bbb1e54dSMiklos Szeredi struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry,
939bbb1e54dSMiklos Szeredi 			  unsigned int flags)
940bbb1e54dSMiklos Szeredi {
9410af950f5SAmir Goldstein 	struct ovl_entry *oe = NULL;
942bbb1e54dSMiklos Szeredi 	const struct cred *old_cred;
9436b2d5fe4SMiklos Szeredi 	struct ovl_fs *ofs = dentry->d_sb->s_fs_info;
944a6ff2bc0SAmir Goldstein 	struct ovl_entry *poe = OVL_E(dentry->d_parent);
945a6ff2bc0SAmir Goldstein 	struct ovl_entry *roe = OVL_E(dentry->d_sb->s_root);
9469d3dfea3SVivek Goyal 	struct ovl_path *stack = NULL, *origin_path = NULL;
947bbb1e54dSMiklos Szeredi 	struct dentry *upperdir, *upperdentry = NULL;
948ad1d615cSAmir Goldstein 	struct dentry *origin = NULL;
949359f392cSAmir Goldstein 	struct dentry *index = NULL;
950bbb1e54dSMiklos Szeredi 	unsigned int ctr = 0;
951bbb1e54dSMiklos Szeredi 	struct inode *inode = NULL;
952bbb1e54dSMiklos Szeredi 	bool upperopaque = false;
95302b69b28SMiklos Szeredi 	char *upperredirect = NULL;
954bbb1e54dSMiklos Szeredi 	struct dentry *this;
955bbb1e54dSMiklos Szeredi 	unsigned int i;
956bbb1e54dSMiklos Szeredi 	int err;
9576815f479SVivek Goyal 	bool uppermetacopy = false;
958e28edc46SMiklos Szeredi 	struct ovl_lookup_data d = {
959146d62e5SAmir Goldstein 		.sb = dentry->d_sb,
960e28edc46SMiklos Szeredi 		.name = dentry->d_name,
961e28edc46SMiklos Szeredi 		.is_dir = false,
962e28edc46SMiklos Szeredi 		.opaque = false,
963e28edc46SMiklos Szeredi 		.stop = false,
964*af5f2396SAmir Goldstein 		.last = ovl_redirect_follow(ofs) ? false : !ovl_numlower(poe),
96502b69b28SMiklos Szeredi 		.redirect = NULL,
9669d3dfea3SVivek Goyal 		.metacopy = false,
967e28edc46SMiklos Szeredi 	};
968bbb1e54dSMiklos Szeredi 
9696b2d5fe4SMiklos Szeredi 	if (dentry->d_name.len > ofs->namelen)
9706b2d5fe4SMiklos Szeredi 		return ERR_PTR(-ENAMETOOLONG);
9716b2d5fe4SMiklos Szeredi 
972bbb1e54dSMiklos Szeredi 	old_cred = ovl_override_creds(dentry->d_sb);
97309d8b586SMiklos Szeredi 	upperdir = ovl_dentry_upper(dentry->d_parent);
974bbb1e54dSMiklos Szeredi 	if (upperdir) {
975dad7017aSChristian Brauner 		d.mnt = ovl_upper_mnt(ofs);
9761434a65eSChengguang Xu 		err = ovl_lookup_layer(upperdir, &d, &upperdentry, true);
977e28edc46SMiklos Szeredi 		if (err)
978bbb1e54dSMiklos Szeredi 			goto out;
979bbb1e54dSMiklos Szeredi 
980bccece1eSMiklos Szeredi 		if (upperdentry && upperdentry->d_flags & DCACHE_OP_REAL) {
981e28edc46SMiklos Szeredi 			dput(upperdentry);
982bbb1e54dSMiklos Szeredi 			err = -EREMOTE;
983bbb1e54dSMiklos Szeredi 			goto out;
984bbb1e54dSMiklos Szeredi 		}
985a9d01957SAmir Goldstein 		if (upperdentry && !d.is_dir) {
986f7d3dacaSAmir Goldstein 			/*
987f7d3dacaSAmir Goldstein 			 * Lookup copy up origin by decoding origin file handle.
988f7d3dacaSAmir Goldstein 			 * We may get a disconnected dentry, which is fine,
989f7d3dacaSAmir Goldstein 			 * because we only need to hold the origin inode in
990f7d3dacaSAmir Goldstein 			 * cache and use its inode number.  We may even get a
991f7d3dacaSAmir Goldstein 			 * connected dentry, that is not under any of the lower
992f7d3dacaSAmir Goldstein 			 * layers root.  That is also fine for using it's inode
993f7d3dacaSAmir Goldstein 			 * number - it's the same as if we held a reference
994f7d3dacaSAmir Goldstein 			 * to a dentry in lower layer that was moved under us.
995f7d3dacaSAmir Goldstein 			 */
996d78a0dcfSyoungjun 			err = ovl_check_origin(ofs, upperdentry, &origin_path);
997a9d01957SAmir Goldstein 			if (err)
9985455f92bSVivek Goyal 				goto out_put_upper;
9999d3dfea3SVivek Goyal 
10009d3dfea3SVivek Goyal 			if (d.metacopy)
10016815f479SVivek Goyal 				uppermetacopy = true;
1002a9d01957SAmir Goldstein 		}
100302b69b28SMiklos Szeredi 
100402b69b28SMiklos Szeredi 		if (d.redirect) {
10050ce5cdc9SDan Carpenter 			err = -ENOMEM;
100602b69b28SMiklos Szeredi 			upperredirect = kstrdup(d.redirect, GFP_KERNEL);
100702b69b28SMiklos Szeredi 			if (!upperredirect)
100802b69b28SMiklos Szeredi 				goto out_put_upper;
100902b69b28SMiklos Szeredi 			if (d.redirect[0] == '/')
1010c22205d0SAmir Goldstein 				poe = roe;
101102b69b28SMiklos Szeredi 		}
1012e28edc46SMiklos Szeredi 		upperopaque = d.opaque;
1013bbb1e54dSMiklos Szeredi 	}
1014bbb1e54dSMiklos Szeredi 
10155522c9c7SAmir Goldstein 	if (!d.stop && ovl_numlower(poe)) {
1016bbb1e54dSMiklos Szeredi 		err = -ENOMEM;
1017163db0daSAmir Goldstein 		stack = ovl_stack_alloc(ofs->numlayer - 1);
1018bbb1e54dSMiklos Szeredi 		if (!stack)
1019bbb1e54dSMiklos Szeredi 			goto out_put_upper;
1020bbb1e54dSMiklos Szeredi 	}
1021bbb1e54dSMiklos Szeredi 
10225522c9c7SAmir Goldstein 	for (i = 0; !d.stop && i < ovl_numlower(poe); i++) {
10235522c9c7SAmir Goldstein 		struct ovl_path lower = ovl_lowerstack(poe)[i];
1024bbb1e54dSMiklos Szeredi 
1025*af5f2396SAmir Goldstein 		if (!ovl_redirect_follow(ofs))
10265522c9c7SAmir Goldstein 			d.last = i == ovl_numlower(poe) - 1;
10275436ab0aSAmir Goldstein 		else if (d.is_dir || !ofs->numdatalayer)
10285522c9c7SAmir Goldstein 			d.last = lower.layer->idx == ovl_numlower(roe);
1029452061fdSVivek Goyal 
1030dad7017aSChristian Brauner 		d.mnt = lower.layer->mnt;
10311434a65eSChengguang Xu 		err = ovl_lookup_layer(lower.dentry, &d, &this, false);
1032e28edc46SMiklos Szeredi 		if (err)
1033bbb1e54dSMiklos Szeredi 			goto out_put;
10346b2d5fe4SMiklos Szeredi 
1035bbb1e54dSMiklos Szeredi 		if (!this)
1036bbb1e54dSMiklos Szeredi 			continue;
1037bbb1e54dSMiklos Szeredi 
10386815f479SVivek Goyal 		if ((uppermetacopy || d.metacopy) && !ofs->config.metacopy) {
1039eaab1d45SMickaël Salaün 			dput(this);
10406815f479SVivek Goyal 			err = -EPERM;
10416815f479SVivek Goyal 			pr_warn_ratelimited("refusing to follow metacopy origin for (%pd2)\n", dentry);
10426815f479SVivek Goyal 			goto out_put;
10436815f479SVivek Goyal 		}
10446815f479SVivek Goyal 
10456815f479SVivek Goyal 		/*
10469678e630SAmir Goldstein 		 * If no origin fh is stored in upper of a merge dir, store fh
10479678e630SAmir Goldstein 		 * of lower dir and set upper parent "impure".
10489678e630SAmir Goldstein 		 */
10499d3dfea3SVivek Goyal 		if (upperdentry && !ctr && !ofs->noxattr && d.is_dir) {
1050610afc0bSMiklos Szeredi 			err = ovl_fix_origin(ofs, dentry, this, upperdentry);
10519678e630SAmir Goldstein 			if (err) {
10529678e630SAmir Goldstein 				dput(this);
10539678e630SAmir Goldstein 				goto out_put;
10549678e630SAmir Goldstein 			}
10559678e630SAmir Goldstein 		}
10569678e630SAmir Goldstein 
105737b12916SAmir Goldstein 		/*
105837b12916SAmir Goldstein 		 * When "verify_lower" feature is enabled, do not merge with a
1059ad1d615cSAmir Goldstein 		 * lower dir that does not match a stored origin xattr. In any
1060ad1d615cSAmir Goldstein 		 * case, only verified origin is used for index lookup.
10619d3dfea3SVivek Goyal 		 *
10629d3dfea3SVivek Goyal 		 * For non-dir dentry, if index=on, then ensure origin
10639d3dfea3SVivek Goyal 		 * matches the dentry found using path based lookup,
10649d3dfea3SVivek Goyal 		 * otherwise error out.
106537b12916SAmir Goldstein 		 */
10669d3dfea3SVivek Goyal 		if (upperdentry && !ctr &&
10679d3dfea3SVivek Goyal 		    ((d.is_dir && ovl_verify_lower(dentry->d_sb)) ||
10689d3dfea3SVivek Goyal 		     (!d.is_dir && ofs->config.index && origin_path))) {
1069610afc0bSMiklos Szeredi 			err = ovl_verify_origin(ofs, upperdentry, this, false);
107037b12916SAmir Goldstein 			if (err) {
107137b12916SAmir Goldstein 				dput(this);
10729d3dfea3SVivek Goyal 				if (d.is_dir)
107337b12916SAmir Goldstein 					break;
10749d3dfea3SVivek Goyal 				goto out_put;
10759d3dfea3SVivek Goyal 			}
10769d3dfea3SVivek Goyal 			origin = this;
107737b12916SAmir Goldstein 		}
1078ad1d615cSAmir Goldstein 
107921d8d66aSVivek Goyal 		if (d.metacopy && ctr) {
108021d8d66aSVivek Goyal 			/*
108121d8d66aSVivek Goyal 			 * Do not store intermediate metacopy dentries in
108221d8d66aSVivek Goyal 			 * lower chain, except top most lower metacopy dentry.
108321d8d66aSVivek Goyal 			 * Continue the loop so that if there is an absolute
108421d8d66aSVivek Goyal 			 * redirect on this dentry, poe can be reset to roe.
108521d8d66aSVivek Goyal 			 */
108621d8d66aSVivek Goyal 			dput(this);
108721d8d66aSVivek Goyal 			this = NULL;
108821d8d66aSVivek Goyal 		} else {
1089bbb1e54dSMiklos Szeredi 			stack[ctr].dentry = this;
1090b9343632SChandan Rajendra 			stack[ctr].layer = lower.layer;
1091bbb1e54dSMiklos Szeredi 			ctr++;
109221d8d66aSVivek Goyal 		}
109302b69b28SMiklos Szeredi 
1094438c84c2SMiklos Szeredi 		/*
1095438c84c2SMiklos Szeredi 		 * Following redirects can have security consequences: it's like
1096438c84c2SMiklos Szeredi 		 * a symlink into the lower layer without the permission checks.
1097438c84c2SMiklos Szeredi 		 * This is only a problem if the upper layer is untrusted (e.g
1098438c84c2SMiklos Szeredi 		 * comes from an USB drive).  This can allow a non-readable file
1099438c84c2SMiklos Szeredi 		 * or directory to become readable.
1100438c84c2SMiklos Szeredi 		 *
1101438c84c2SMiklos Szeredi 		 * Only following redirects when redirects are enabled disables
1102438c84c2SMiklos Szeredi 		 * this attack vector when not necessary.
1103438c84c2SMiklos Szeredi 		 */
1104438c84c2SMiklos Szeredi 		err = -EPERM;
1105*af5f2396SAmir Goldstein 		if (d.redirect && !ovl_redirect_follow(ofs)) {
11061bd0a3aeSlijiazi 			pr_warn_ratelimited("refusing to follow redirect for (%pd2)\n",
1107f8167817SAmir Goldstein 					    dentry);
1108438c84c2SMiklos Szeredi 			goto out_put;
1109438c84c2SMiklos Szeredi 		}
1110438c84c2SMiklos Szeredi 
1111d1fe96c0SVivek Goyal 		if (d.stop)
1112d1fe96c0SVivek Goyal 			break;
1113d1fe96c0SVivek Goyal 
1114c22205d0SAmir Goldstein 		if (d.redirect && d.redirect[0] == '/' && poe != roe) {
1115c22205d0SAmir Goldstein 			poe = roe;
111602b69b28SMiklos Szeredi 			/* Find the current layer on the root dentry */
1117d583ed7dSAmir Goldstein 			i = lower.layer->idx - 1;
111802b69b28SMiklos Szeredi 		}
1119bbb1e54dSMiklos Szeredi 	}
1120bbb1e54dSMiklos Szeredi 
112142dd69aeSAmir Goldstein 	/* Defer lookup of lowerdata in data-only layers to first access */
11225436ab0aSAmir Goldstein 	if (d.metacopy && ctr && ofs->numdatalayer && d.absolute_redirect) {
11235436ab0aSAmir Goldstein 		d.metacopy = false;
11245436ab0aSAmir Goldstein 		ctr++;
11255436ab0aSAmir Goldstein 	}
11265436ab0aSAmir Goldstein 
11279d3dfea3SVivek Goyal 	/*
11286815f479SVivek Goyal 	 * For regular non-metacopy upper dentries, there is no lower
11296815f479SVivek Goyal 	 * path based lookup, hence ctr will be zero. If a dentry is found
11306815f479SVivek Goyal 	 * using ORIGIN xattr on upper, install it in stack.
11316815f479SVivek Goyal 	 *
11326815f479SVivek Goyal 	 * For metacopy dentry, path based lookup will find lower dentries.
11336815f479SVivek Goyal 	 * Just make sure a corresponding data dentry has been found.
11349d3dfea3SVivek Goyal 	 */
11356815f479SVivek Goyal 	if (d.metacopy || (uppermetacopy && !ctr)) {
11360a8d0b64SKevin Locke 		pr_warn_ratelimited("metacopy with no lower data found - abort lookup (%pd2)\n",
11370a8d0b64SKevin Locke 				    dentry);
11389d3dfea3SVivek Goyal 		err = -EIO;
11399d3dfea3SVivek Goyal 		goto out_put;
11409d3dfea3SVivek Goyal 	} else if (!d.is_dir && upperdentry && !ctr && origin_path) {
11419d3dfea3SVivek Goyal 		if (WARN_ON(stack != NULL)) {
11429d3dfea3SVivek Goyal 			err = -EIO;
11439d3dfea3SVivek Goyal 			goto out_put;
11449d3dfea3SVivek Goyal 		}
11459d3dfea3SVivek Goyal 		stack = origin_path;
11469d3dfea3SVivek Goyal 		ctr = 1;
114759fb2013SVivek Goyal 		origin = origin_path->dentry;
11489d3dfea3SVivek Goyal 		origin_path = NULL;
11499d3dfea3SVivek Goyal 	}
11509d3dfea3SVivek Goyal 
1151ad1d615cSAmir Goldstein 	/*
115259fb2013SVivek Goyal 	 * Always lookup index if there is no-upperdentry.
11539d3dfea3SVivek Goyal 	 *
115459fb2013SVivek Goyal 	 * For the case of upperdentry, we have set origin by now if it
115559fb2013SVivek Goyal 	 * needed to be set. There are basically three cases.
11569d3dfea3SVivek Goyal 	 *
115759fb2013SVivek Goyal 	 * For directories, lookup index by lower inode and verify it matches
115859fb2013SVivek Goyal 	 * upper inode. We only trust dir index if we verified that lower dir
115959fb2013SVivek Goyal 	 * matches origin, otherwise dir index entries may be inconsistent
116059fb2013SVivek Goyal 	 * and we ignore them.
116159fb2013SVivek Goyal 	 *
116259fb2013SVivek Goyal 	 * For regular upper, we already set origin if upper had ORIGIN
116359fb2013SVivek Goyal 	 * xattr. There is no verification though as there is no path
116459fb2013SVivek Goyal 	 * based dentry lookup in lower in this case.
116559fb2013SVivek Goyal 	 *
116659fb2013SVivek Goyal 	 * For metacopy upper, we set a verified origin already if index
116759fb2013SVivek Goyal 	 * is enabled and if upper had an ORIGIN xattr.
116859fb2013SVivek Goyal 	 *
1169ad1d615cSAmir Goldstein 	 */
117059fb2013SVivek Goyal 	if (!upperdentry && ctr)
1171ad1d615cSAmir Goldstein 		origin = stack[0].dentry;
1172359f392cSAmir Goldstein 
1173ad1d615cSAmir Goldstein 	if (origin && ovl_indexdir(dentry->d_sb) &&
1174ad1d615cSAmir Goldstein 	    (!d.is_dir || ovl_index_all(dentry->d_sb))) {
117506170154SAmir Goldstein 		index = ovl_lookup_index(ofs, upperdentry, origin, true);
1176359f392cSAmir Goldstein 		if (IS_ERR(index)) {
1177359f392cSAmir Goldstein 			err = PTR_ERR(index);
1178359f392cSAmir Goldstein 			index = NULL;
1179359f392cSAmir Goldstein 			goto out_put;
1180359f392cSAmir Goldstein 		}
1181359f392cSAmir Goldstein 	}
1182359f392cSAmir Goldstein 
11830af950f5SAmir Goldstein 	if (ctr) {
1184bbb1e54dSMiklos Szeredi 		oe = ovl_alloc_entry(ctr);
1185bbb1e54dSMiklos Szeredi 		err = -ENOMEM;
1186bbb1e54dSMiklos Szeredi 		if (!oe)
1187bbb1e54dSMiklos Szeredi 			goto out_put;
1188bbb1e54dSMiklos Szeredi 
1189163db0daSAmir Goldstein 		ovl_stack_cpy(ovl_lowerstack(oe), stack, ctr);
11900af950f5SAmir Goldstein 	}
1191e6d2ebddSMiklos Szeredi 
1192c62520a8SAmir Goldstein 	if (upperopaque)
1193c62520a8SAmir Goldstein 		ovl_dentry_set_opaque(dentry);
1194c62520a8SAmir Goldstein 
119555acc661SMiklos Szeredi 	if (upperdentry)
119655acc661SMiklos Szeredi 		ovl_dentry_set_upper_alias(dentry);
11970a2d0d3fSVivek Goyal 	else if (index) {
1198dad7017aSChristian Brauner 		struct path upperpath = {
1199dad7017aSChristian Brauner 			.dentry = upperdentry = dget(index),
1200dad7017aSChristian Brauner 			.mnt = ovl_upper_mnt(ofs),
1201dad7017aSChristian Brauner 		};
1202dad7017aSChristian Brauner 
1203cf4ef780SStanislav Goriainov 		/*
1204cf4ef780SStanislav Goriainov 		 * It's safe to assign upperredirect here: the previous
1205cf4ef780SStanislav Goriainov 		 * assignment of happens only if upperdentry is non-NULL, and
1206cf4ef780SStanislav Goriainov 		 * this one only if upperdentry is NULL.
1207cf4ef780SStanislav Goriainov 		 */
1208dad7017aSChristian Brauner 		upperredirect = ovl_get_redirect_xattr(ofs, &upperpath, 0);
12090a2d0d3fSVivek Goyal 		if (IS_ERR(upperredirect)) {
12100a2d0d3fSVivek Goyal 			err = PTR_ERR(upperredirect);
12110a2d0d3fSVivek Goyal 			upperredirect = NULL;
12120a2d0d3fSVivek Goyal 			goto out_free_oe;
12130a2d0d3fSVivek Goyal 		}
1214dad7017aSChristian Brauner 		err = ovl_check_metacopy_xattr(ofs, &upperpath);
12154518dfcfSAmir Goldstein 		if (err < 0)
12164518dfcfSAmir Goldstein 			goto out_free_oe;
12174518dfcfSAmir Goldstein 		uppermetacopy = err;
12180a2d0d3fSVivek Goyal 	}
1219359f392cSAmir Goldstein 
1220e6d2ebddSMiklos Szeredi 	if (upperdentry || ctr) {
1221ac6a52ebSVivek Goyal 		struct ovl_inode_params oip = {
1222ac6a52ebSVivek Goyal 			.upperdentry = upperdentry,
12230af950f5SAmir Goldstein 			.oe = oe,
1224ac6a52ebSVivek Goyal 			.index = index,
12259cec54c8SVivek Goyal 			.redirect = upperredirect,
1226ac6a52ebSVivek Goyal 		};
1227ac6a52ebSVivek Goyal 
12282b21da92SAmir Goldstein 		/* Store lowerdata redirect for lazy lookup */
12292b21da92SAmir Goldstein 		if (ctr > 1 && !d.is_dir && !stack[ctr - 1].dentry) {
12302b21da92SAmir Goldstein 			oip.lowerdata_redirect = d.redirect;
12312b21da92SAmir Goldstein 			d.redirect = NULL;
12322b21da92SAmir Goldstein 		}
1233ac6a52ebSVivek Goyal 		inode = ovl_get_inode(dentry->d_sb, &oip);
1234b9ac5c27SMiklos Szeredi 		err = PTR_ERR(inode);
1235b9ac5c27SMiklos Szeredi 		if (IS_ERR(inode))
1236e6d2ebddSMiklos Szeredi 			goto out_free_oe;
123728166ab3SVivek Goyal 		if (upperdentry && !uppermetacopy)
123828166ab3SVivek Goyal 			ovl_set_flag(OVL_UPPERDATA, inode);
1239e6d2ebddSMiklos Szeredi 	}
1240e6d2ebddSMiklos Szeredi 
12410af950f5SAmir Goldstein 	ovl_dentry_init_reval(dentry, upperdentry, OVL_I_E(inode));
1242f4288844SMiklos Szeredi 
1243e6d2ebddSMiklos Szeredi 	revert_creds(old_cred);
12449d3dfea3SVivek Goyal 	if (origin_path) {
12459d3dfea3SVivek Goyal 		dput(origin_path->dentry);
12469d3dfea3SVivek Goyal 		kfree(origin_path);
12479d3dfea3SVivek Goyal 	}
1248359f392cSAmir Goldstein 	dput(index);
1249163db0daSAmir Goldstein 	ovl_stack_free(stack, ctr);
125002b69b28SMiklos Szeredi 	kfree(d.redirect);
1251829c28beSAmir Goldstein 	return d_splice_alias(inode, dentry);
1252bbb1e54dSMiklos Szeredi 
1253bbb1e54dSMiklos Szeredi out_free_oe:
1254163db0daSAmir Goldstein 	ovl_free_entry(oe);
1255bbb1e54dSMiklos Szeredi out_put:
1256359f392cSAmir Goldstein 	dput(index);
1257163db0daSAmir Goldstein 	ovl_stack_free(stack, ctr);
1258bbb1e54dSMiklos Szeredi out_put_upper:
12599d3dfea3SVivek Goyal 	if (origin_path) {
12609d3dfea3SVivek Goyal 		dput(origin_path->dentry);
12619d3dfea3SVivek Goyal 		kfree(origin_path);
12629d3dfea3SVivek Goyal 	}
1263bbb1e54dSMiklos Szeredi 	dput(upperdentry);
126402b69b28SMiklos Szeredi 	kfree(upperredirect);
1265bbb1e54dSMiklos Szeredi out:
126602b69b28SMiklos Szeredi 	kfree(d.redirect);
1267bbb1e54dSMiklos Szeredi 	revert_creds(old_cred);
1268bbb1e54dSMiklos Szeredi 	return ERR_PTR(err);
1269bbb1e54dSMiklos Szeredi }
1270bbb1e54dSMiklos Szeredi 
1271bbb1e54dSMiklos Szeredi bool ovl_lower_positive(struct dentry *dentry)
1272bbb1e54dSMiklos Szeredi {
1273a6ff2bc0SAmir Goldstein 	struct ovl_entry *poe = OVL_E(dentry->d_parent);
1274bbb1e54dSMiklos Szeredi 	const struct qstr *name = &dentry->d_name;
12756d0a8a90SAmir Goldstein 	const struct cred *old_cred;
1276bbb1e54dSMiklos Szeredi 	unsigned int i;
1277bbb1e54dSMiklos Szeredi 	bool positive = false;
1278bbb1e54dSMiklos Szeredi 	bool done = false;
1279bbb1e54dSMiklos Szeredi 
1280bbb1e54dSMiklos Szeredi 	/*
1281bbb1e54dSMiklos Szeredi 	 * If dentry is negative, then lower is positive iff this is a
1282bbb1e54dSMiklos Szeredi 	 * whiteout.
1283bbb1e54dSMiklos Szeredi 	 */
1284bbb1e54dSMiklos Szeredi 	if (!dentry->d_inode)
1285c62520a8SAmir Goldstein 		return ovl_dentry_is_opaque(dentry);
1286bbb1e54dSMiklos Szeredi 
1287bbb1e54dSMiklos Szeredi 	/* Negative upper -> positive lower */
128809d8b586SMiklos Szeredi 	if (!ovl_dentry_upper(dentry))
1289bbb1e54dSMiklos Szeredi 		return true;
1290bbb1e54dSMiklos Szeredi 
12916d0a8a90SAmir Goldstein 	old_cred = ovl_override_creds(dentry->d_sb);
1292bbb1e54dSMiklos Szeredi 	/* Positive upper -> have to look up lower to see whether it exists */
12935522c9c7SAmir Goldstein 	for (i = 0; !done && !positive && i < ovl_numlower(poe); i++) {
1294bbb1e54dSMiklos Szeredi 		struct dentry *this;
12955522c9c7SAmir Goldstein 		struct ovl_path *parentpath = &ovl_lowerstack(poe)[i];
1296bbb1e54dSMiklos Szeredi 
12975522c9c7SAmir Goldstein 		this = lookup_one_positive_unlocked(
12985522c9c7SAmir Goldstein 				mnt_idmap(parentpath->layer->mnt),
12995522c9c7SAmir Goldstein 				name->name, parentpath->dentry, name->len);
1300bbb1e54dSMiklos Szeredi 		if (IS_ERR(this)) {
1301bbb1e54dSMiklos Szeredi 			switch (PTR_ERR(this)) {
1302bbb1e54dSMiklos Szeredi 			case -ENOENT:
1303bbb1e54dSMiklos Szeredi 			case -ENAMETOOLONG:
1304bbb1e54dSMiklos Szeredi 				break;
1305bbb1e54dSMiklos Szeredi 
1306bbb1e54dSMiklos Szeredi 			default:
1307bbb1e54dSMiklos Szeredi 				/*
1308bbb1e54dSMiklos Szeredi 				 * Assume something is there, we just couldn't
1309bbb1e54dSMiklos Szeredi 				 * access it.
1310bbb1e54dSMiklos Szeredi 				 */
1311bbb1e54dSMiklos Szeredi 				positive = true;
1312bbb1e54dSMiklos Szeredi 				break;
1313bbb1e54dSMiklos Szeredi 			}
1314bbb1e54dSMiklos Szeredi 		} else {
1315bbb1e54dSMiklos Szeredi 			positive = !ovl_is_whiteout(this);
1316bbb1e54dSMiklos Szeredi 			done = true;
1317bbb1e54dSMiklos Szeredi 			dput(this);
1318bbb1e54dSMiklos Szeredi 		}
1319bbb1e54dSMiklos Szeredi 	}
13206d0a8a90SAmir Goldstein 	revert_creds(old_cred);
1321bbb1e54dSMiklos Szeredi 
1322bbb1e54dSMiklos Szeredi 	return positive;
1323bbb1e54dSMiklos Szeredi }
1324