1bbb1e54dSMiklos Szeredi /* 2bbb1e54dSMiklos Szeredi * Copyright (C) 2011 Novell Inc. 3bbb1e54dSMiklos Szeredi * Copyright (C) 2016 Red Hat, Inc. 4bbb1e54dSMiklos Szeredi * 5bbb1e54dSMiklos Szeredi * This program is free software; you can redistribute it and/or modify it 6bbb1e54dSMiklos Szeredi * under the terms of the GNU General Public License version 2 as published by 7bbb1e54dSMiklos Szeredi * the Free Software Foundation. 8bbb1e54dSMiklos Szeredi */ 9bbb1e54dSMiklos Szeredi 10bbb1e54dSMiklos Szeredi #include <linux/fs.h> 11bbb1e54dSMiklos Szeredi #include <linux/mount.h> 12bbb1e54dSMiklos Szeredi #include <linux/slab.h> 135b825c3aSIngo Molnar #include <linux/cred.h> 14bbb1e54dSMiklos Szeredi #include <linux/xattr.h> 1502bcd157SAmir Goldstein #include <linux/exportfs.h> 1602bcd157SAmir Goldstein #include <linux/uuid.h> 17caf70cb2SAmir Goldstein #include <linux/namei.h> 18caf70cb2SAmir Goldstein #include <linux/ratelimit.h> 19bbb1e54dSMiklos Szeredi #include "overlayfs.h" 20bbb1e54dSMiklos Szeredi 21bbb1e54dSMiklos Szeredi int ovl_want_write(struct dentry *dentry) 22bbb1e54dSMiklos Szeredi { 23bbb1e54dSMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 24bbb1e54dSMiklos Szeredi return mnt_want_write(ofs->upper_mnt); 25bbb1e54dSMiklos Szeredi } 26bbb1e54dSMiklos Szeredi 27bbb1e54dSMiklos Szeredi void ovl_drop_write(struct dentry *dentry) 28bbb1e54dSMiklos Szeredi { 29bbb1e54dSMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 30bbb1e54dSMiklos Szeredi mnt_drop_write(ofs->upper_mnt); 31bbb1e54dSMiklos Szeredi } 32bbb1e54dSMiklos Szeredi 33bbb1e54dSMiklos Szeredi struct dentry *ovl_workdir(struct dentry *dentry) 34bbb1e54dSMiklos Szeredi { 35bbb1e54dSMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 36bbb1e54dSMiklos Szeredi return ofs->workdir; 37bbb1e54dSMiklos Szeredi } 38bbb1e54dSMiklos Szeredi 39bbb1e54dSMiklos Szeredi const struct cred *ovl_override_creds(struct super_block *sb) 40bbb1e54dSMiklos Szeredi { 41bbb1e54dSMiklos Szeredi struct ovl_fs *ofs = sb->s_fs_info; 42bbb1e54dSMiklos Szeredi 43bbb1e54dSMiklos Szeredi return override_creds(ofs->creator_cred); 44bbb1e54dSMiklos Szeredi } 45bbb1e54dSMiklos Szeredi 467bcd74b9SAmir Goldstein struct super_block *ovl_same_sb(struct super_block *sb) 477bcd74b9SAmir Goldstein { 487bcd74b9SAmir Goldstein struct ovl_fs *ofs = sb->s_fs_info; 497bcd74b9SAmir Goldstein 505148626bSAmir Goldstein if (!ofs->numlowerfs) 515148626bSAmir Goldstein return ofs->upper_mnt->mnt_sb; 525148626bSAmir Goldstein else if (ofs->numlowerfs == 1 && !ofs->upper_mnt) 535148626bSAmir Goldstein return ofs->lower_fs[0].sb; 545148626bSAmir Goldstein else 555148626bSAmir Goldstein return NULL; 567bcd74b9SAmir Goldstein } 577bcd74b9SAmir Goldstein 58e487d889SAmir Goldstein /* 59e487d889SAmir Goldstein * Check if underlying fs supports file handles and try to determine encoding 60e487d889SAmir Goldstein * type, in order to deduce maximum inode number used by fs. 61e487d889SAmir Goldstein * 62e487d889SAmir Goldstein * Return 0 if file handles are not supported. 63e487d889SAmir Goldstein * Return 1 (FILEID_INO32_GEN) if fs uses the default 32bit inode encoding. 64e487d889SAmir Goldstein * Return -1 if fs uses a non default encoding with unknown inode size. 65e487d889SAmir Goldstein */ 66e487d889SAmir Goldstein int ovl_can_decode_fh(struct super_block *sb) 6702bcd157SAmir Goldstein { 68e487d889SAmir Goldstein if (!sb->s_export_op || !sb->s_export_op->fh_to_dentry || 69e487d889SAmir Goldstein uuid_is_null(&sb->s_uuid)) 70e487d889SAmir Goldstein return 0; 71e487d889SAmir Goldstein 72e487d889SAmir Goldstein return sb->s_export_op->encode_fh ? -1 : FILEID_INO32_GEN; 7302bcd157SAmir Goldstein } 7402bcd157SAmir Goldstein 7502bcd157SAmir Goldstein struct dentry *ovl_indexdir(struct super_block *sb) 7602bcd157SAmir Goldstein { 7702bcd157SAmir Goldstein struct ovl_fs *ofs = sb->s_fs_info; 7802bcd157SAmir Goldstein 7902bcd157SAmir Goldstein return ofs->indexdir; 8002bcd157SAmir Goldstein } 8102bcd157SAmir Goldstein 82f168f109SAmir Goldstein /* Index all files on copy up. For now only enabled for NFS export */ 83f168f109SAmir Goldstein bool ovl_index_all(struct super_block *sb) 84f168f109SAmir Goldstein { 85f168f109SAmir Goldstein struct ovl_fs *ofs = sb->s_fs_info; 86f168f109SAmir Goldstein 87f168f109SAmir Goldstein return ofs->config.nfs_export && ofs->config.index; 88f168f109SAmir Goldstein } 89f168f109SAmir Goldstein 90f168f109SAmir Goldstein /* Verify lower origin on lookup. For now only enabled for NFS export */ 91f168f109SAmir Goldstein bool ovl_verify_lower(struct super_block *sb) 92f168f109SAmir Goldstein { 93f168f109SAmir Goldstein struct ovl_fs *ofs = sb->s_fs_info; 94f168f109SAmir Goldstein 95f168f109SAmir Goldstein return ofs->config.nfs_export && ofs->config.index; 96f168f109SAmir Goldstein } 97f168f109SAmir Goldstein 98bbb1e54dSMiklos Szeredi struct ovl_entry *ovl_alloc_entry(unsigned int numlower) 99bbb1e54dSMiklos Szeredi { 100bbb1e54dSMiklos Szeredi size_t size = offsetof(struct ovl_entry, lowerstack[numlower]); 101bbb1e54dSMiklos Szeredi struct ovl_entry *oe = kzalloc(size, GFP_KERNEL); 102bbb1e54dSMiklos Szeredi 103bbb1e54dSMiklos Szeredi if (oe) 104bbb1e54dSMiklos Szeredi oe->numlower = numlower; 105bbb1e54dSMiklos Szeredi 106bbb1e54dSMiklos Szeredi return oe; 107bbb1e54dSMiklos Szeredi } 108bbb1e54dSMiklos Szeredi 109bbb1e54dSMiklos Szeredi bool ovl_dentry_remote(struct dentry *dentry) 110bbb1e54dSMiklos Szeredi { 111bbb1e54dSMiklos Szeredi return dentry->d_flags & 112bbb1e54dSMiklos Szeredi (DCACHE_OP_REVALIDATE | DCACHE_OP_WEAK_REVALIDATE | 113bbb1e54dSMiklos Szeredi DCACHE_OP_REAL); 114bbb1e54dSMiklos Szeredi } 115bbb1e54dSMiklos Szeredi 116bbb1e54dSMiklos Szeredi bool ovl_dentry_weird(struct dentry *dentry) 117bbb1e54dSMiklos Szeredi { 118bbb1e54dSMiklos Szeredi return dentry->d_flags & (DCACHE_NEED_AUTOMOUNT | 119bbb1e54dSMiklos Szeredi DCACHE_MANAGE_TRANSIT | 120bbb1e54dSMiklos Szeredi DCACHE_OP_HASH | 121bbb1e54dSMiklos Szeredi DCACHE_OP_COMPARE); 122bbb1e54dSMiklos Szeredi } 123bbb1e54dSMiklos Szeredi 124bbb1e54dSMiklos Szeredi enum ovl_path_type ovl_path_type(struct dentry *dentry) 125bbb1e54dSMiklos Szeredi { 126bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 127bbb1e54dSMiklos Szeredi enum ovl_path_type type = 0; 128bbb1e54dSMiklos Szeredi 12909d8b586SMiklos Szeredi if (ovl_dentry_upper(dentry)) { 130bbb1e54dSMiklos Szeredi type = __OVL_PATH_UPPER; 131bbb1e54dSMiklos Szeredi 132bbb1e54dSMiklos Szeredi /* 13359548503SAmir Goldstein * Non-dir dentry can hold lower dentry of its copy up origin. 134bbb1e54dSMiklos Szeredi */ 13559548503SAmir Goldstein if (oe->numlower) { 13659548503SAmir Goldstein type |= __OVL_PATH_ORIGIN; 13759548503SAmir Goldstein if (d_is_dir(dentry)) 138bbb1e54dSMiklos Szeredi type |= __OVL_PATH_MERGE; 13959548503SAmir Goldstein } 140bbb1e54dSMiklos Szeredi } else { 141bbb1e54dSMiklos Szeredi if (oe->numlower > 1) 142bbb1e54dSMiklos Szeredi type |= __OVL_PATH_MERGE; 143bbb1e54dSMiklos Szeredi } 144bbb1e54dSMiklos Szeredi return type; 145bbb1e54dSMiklos Szeredi } 146bbb1e54dSMiklos Szeredi 147bbb1e54dSMiklos Szeredi void ovl_path_upper(struct dentry *dentry, struct path *path) 148bbb1e54dSMiklos Szeredi { 149bbb1e54dSMiklos Szeredi struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 150bbb1e54dSMiklos Szeredi 151bbb1e54dSMiklos Szeredi path->mnt = ofs->upper_mnt; 15209d8b586SMiklos Szeredi path->dentry = ovl_dentry_upper(dentry); 153bbb1e54dSMiklos Szeredi } 154bbb1e54dSMiklos Szeredi 155bbb1e54dSMiklos Szeredi void ovl_path_lower(struct dentry *dentry, struct path *path) 156bbb1e54dSMiklos Szeredi { 157bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 158bbb1e54dSMiklos Szeredi 159b9343632SChandan Rajendra if (oe->numlower) { 160b9343632SChandan Rajendra path->mnt = oe->lowerstack[0].layer->mnt; 161b9343632SChandan Rajendra path->dentry = oe->lowerstack[0].dentry; 162b9343632SChandan Rajendra } else { 163b9343632SChandan Rajendra *path = (struct path) { }; 164b9343632SChandan Rajendra } 165bbb1e54dSMiklos Szeredi } 166bbb1e54dSMiklos Szeredi 167bbb1e54dSMiklos Szeredi enum ovl_path_type ovl_path_real(struct dentry *dentry, struct path *path) 168bbb1e54dSMiklos Szeredi { 169bbb1e54dSMiklos Szeredi enum ovl_path_type type = ovl_path_type(dentry); 170bbb1e54dSMiklos Szeredi 171bbb1e54dSMiklos Szeredi if (!OVL_TYPE_UPPER(type)) 172bbb1e54dSMiklos Szeredi ovl_path_lower(dentry, path); 173bbb1e54dSMiklos Szeredi else 174bbb1e54dSMiklos Szeredi ovl_path_upper(dentry, path); 175bbb1e54dSMiklos Szeredi 176bbb1e54dSMiklos Szeredi return type; 177bbb1e54dSMiklos Szeredi } 178bbb1e54dSMiklos Szeredi 179bbb1e54dSMiklos Szeredi struct dentry *ovl_dentry_upper(struct dentry *dentry) 180bbb1e54dSMiklos Szeredi { 18109d8b586SMiklos Szeredi return ovl_upperdentry_dereference(OVL_I(d_inode(dentry))); 182bbb1e54dSMiklos Szeredi } 183bbb1e54dSMiklos Szeredi 184bbb1e54dSMiklos Szeredi struct dentry *ovl_dentry_lower(struct dentry *dentry) 185bbb1e54dSMiklos Szeredi { 186bbb1e54dSMiklos Szeredi struct ovl_entry *oe = dentry->d_fsdata; 187bbb1e54dSMiklos Szeredi 18809d8b586SMiklos Szeredi return oe->numlower ? oe->lowerstack[0].dentry : NULL; 189bbb1e54dSMiklos Szeredi } 190bbb1e54dSMiklos Szeredi 191da309e8cSAmir Goldstein struct ovl_layer *ovl_layer_lower(struct dentry *dentry) 192da309e8cSAmir Goldstein { 193da309e8cSAmir Goldstein struct ovl_entry *oe = dentry->d_fsdata; 194da309e8cSAmir Goldstein 195da309e8cSAmir Goldstein return oe->numlower ? oe->lowerstack[0].layer : NULL; 196da309e8cSAmir Goldstein } 197da309e8cSAmir Goldstein 198bbb1e54dSMiklos Szeredi struct dentry *ovl_dentry_real(struct dentry *dentry) 199bbb1e54dSMiklos Szeredi { 20009d8b586SMiklos Szeredi return ovl_dentry_upper(dentry) ?: ovl_dentry_lower(dentry); 201bbb1e54dSMiklos Szeredi } 202bbb1e54dSMiklos Szeredi 2031d88f183SMiklos Szeredi struct dentry *ovl_i_dentry_upper(struct inode *inode) 2041d88f183SMiklos Szeredi { 2051d88f183SMiklos Szeredi return ovl_upperdentry_dereference(OVL_I(inode)); 2061d88f183SMiklos Szeredi } 2071d88f183SMiklos Szeredi 20809d8b586SMiklos Szeredi struct inode *ovl_inode_upper(struct inode *inode) 20925b7713aSMiklos Szeredi { 2101d88f183SMiklos Szeredi struct dentry *upperdentry = ovl_i_dentry_upper(inode); 21125b7713aSMiklos Szeredi 21209d8b586SMiklos Szeredi return upperdentry ? d_inode(upperdentry) : NULL; 21325b7713aSMiklos Szeredi } 21425b7713aSMiklos Szeredi 21509d8b586SMiklos Szeredi struct inode *ovl_inode_lower(struct inode *inode) 21609d8b586SMiklos Szeredi { 21709d8b586SMiklos Szeredi return OVL_I(inode)->lower; 21809d8b586SMiklos Szeredi } 21909d8b586SMiklos Szeredi 22009d8b586SMiklos Szeredi struct inode *ovl_inode_real(struct inode *inode) 22109d8b586SMiklos Szeredi { 22209d8b586SMiklos Szeredi return ovl_inode_upper(inode) ?: ovl_inode_lower(inode); 22309d8b586SMiklos Szeredi } 22409d8b586SMiklos Szeredi 22509d8b586SMiklos Szeredi 2264edb83bbSMiklos Szeredi struct ovl_dir_cache *ovl_dir_cache(struct inode *inode) 227bbb1e54dSMiklos Szeredi { 2284edb83bbSMiklos Szeredi return OVL_I(inode)->cache; 229bbb1e54dSMiklos Szeredi } 230bbb1e54dSMiklos Szeredi 2314edb83bbSMiklos Szeredi void ovl_set_dir_cache(struct inode *inode, struct ovl_dir_cache *cache) 232bbb1e54dSMiklos Szeredi { 2334edb83bbSMiklos Szeredi OVL_I(inode)->cache = cache; 234bbb1e54dSMiklos Szeredi } 235bbb1e54dSMiklos Szeredi 236c62520a8SAmir Goldstein void ovl_dentry_set_flag(unsigned long flag, struct dentry *dentry) 237c62520a8SAmir Goldstein { 238c62520a8SAmir Goldstein set_bit(flag, &OVL_E(dentry)->flags); 239c62520a8SAmir Goldstein } 240c62520a8SAmir Goldstein 241c62520a8SAmir Goldstein void ovl_dentry_clear_flag(unsigned long flag, struct dentry *dentry) 242c62520a8SAmir Goldstein { 243c62520a8SAmir Goldstein clear_bit(flag, &OVL_E(dentry)->flags); 244c62520a8SAmir Goldstein } 245c62520a8SAmir Goldstein 246c62520a8SAmir Goldstein bool ovl_dentry_test_flag(unsigned long flag, struct dentry *dentry) 247c62520a8SAmir Goldstein { 248c62520a8SAmir Goldstein return test_bit(flag, &OVL_E(dentry)->flags); 249c62520a8SAmir Goldstein } 250c62520a8SAmir Goldstein 251bbb1e54dSMiklos Szeredi bool ovl_dentry_is_opaque(struct dentry *dentry) 252bbb1e54dSMiklos Szeredi { 253c62520a8SAmir Goldstein return ovl_dentry_test_flag(OVL_E_OPAQUE, dentry); 254bbb1e54dSMiklos Szeredi } 255bbb1e54dSMiklos Szeredi 256bbb1e54dSMiklos Szeredi bool ovl_dentry_is_whiteout(struct dentry *dentry) 257bbb1e54dSMiklos Szeredi { 258bbb1e54dSMiklos Szeredi return !dentry->d_inode && ovl_dentry_is_opaque(dentry); 259bbb1e54dSMiklos Szeredi } 260bbb1e54dSMiklos Szeredi 2615cf5b477SMiklos Szeredi void ovl_dentry_set_opaque(struct dentry *dentry) 262bbb1e54dSMiklos Szeredi { 263c62520a8SAmir Goldstein ovl_dentry_set_flag(OVL_E_OPAQUE, dentry); 264bbb1e54dSMiklos Szeredi } 265bbb1e54dSMiklos Szeredi 26655acc661SMiklos Szeredi /* 267aa3ff3c1SAmir Goldstein * For hard links and decoded file handles, it's possible for ovl_dentry_upper() 268aa3ff3c1SAmir Goldstein * to return positive, while there's no actual upper alias for the inode. 269aa3ff3c1SAmir Goldstein * Copy up code needs to know about the existence of the upper alias, so it 270aa3ff3c1SAmir Goldstein * can't use ovl_dentry_upper(). 27155acc661SMiklos Szeredi */ 27255acc661SMiklos Szeredi bool ovl_dentry_has_upper_alias(struct dentry *dentry) 27355acc661SMiklos Szeredi { 274c62520a8SAmir Goldstein return ovl_dentry_test_flag(OVL_E_UPPER_ALIAS, dentry); 27555acc661SMiklos Szeredi } 27655acc661SMiklos Szeredi 27755acc661SMiklos Szeredi void ovl_dentry_set_upper_alias(struct dentry *dentry) 27855acc661SMiklos Szeredi { 279c62520a8SAmir Goldstein ovl_dentry_set_flag(OVL_E_UPPER_ALIAS, dentry); 28055acc661SMiklos Szeredi } 28155acc661SMiklos Szeredi 2820c288874SVivek Goyal static bool ovl_should_check_upperdata(struct inode *inode) 2830c288874SVivek Goyal { 2840c288874SVivek Goyal if (!S_ISREG(inode->i_mode)) 2850c288874SVivek Goyal return false; 2860c288874SVivek Goyal 2870c288874SVivek Goyal if (!ovl_inode_lower(inode)) 2880c288874SVivek Goyal return false; 2890c288874SVivek Goyal 2900c288874SVivek Goyal return true; 2910c288874SVivek Goyal } 2920c288874SVivek Goyal 2930c288874SVivek Goyal bool ovl_has_upperdata(struct inode *inode) 2940c288874SVivek Goyal { 2950c288874SVivek Goyal if (!ovl_should_check_upperdata(inode)) 2960c288874SVivek Goyal return true; 2970c288874SVivek Goyal 2980c288874SVivek Goyal if (!ovl_test_flag(OVL_UPPERDATA, inode)) 2990c288874SVivek Goyal return false; 3000c288874SVivek Goyal /* 3010c288874SVivek Goyal * Pairs with smp_wmb() in ovl_set_upperdata(). Main user of 3020c288874SVivek Goyal * ovl_has_upperdata() is ovl_copy_up_meta_inode_data(). Make sure 3030c288874SVivek Goyal * if setting of OVL_UPPERDATA is visible, then effects of writes 3040c288874SVivek Goyal * before that are visible too. 3050c288874SVivek Goyal */ 3060c288874SVivek Goyal smp_rmb(); 3070c288874SVivek Goyal return true; 3080c288874SVivek Goyal } 3090c288874SVivek Goyal 3100c288874SVivek Goyal void ovl_set_upperdata(struct inode *inode) 3110c288874SVivek Goyal { 3120c288874SVivek Goyal /* 3130c288874SVivek Goyal * Pairs with smp_rmb() in ovl_has_upperdata(). Make sure 3140c288874SVivek Goyal * if OVL_UPPERDATA flag is visible, then effects of write operations 3150c288874SVivek Goyal * before it are visible as well. 3160c288874SVivek Goyal */ 3170c288874SVivek Goyal smp_wmb(); 3180c288874SVivek Goyal ovl_set_flag(OVL_UPPERDATA, inode); 3190c288874SVivek Goyal } 3200c288874SVivek Goyal 3210c288874SVivek Goyal /* Caller should hold ovl_inode->lock */ 3220c288874SVivek Goyal bool ovl_dentry_needs_data_copy_up_locked(struct dentry *dentry, int flags) 3230c288874SVivek Goyal { 3240c288874SVivek Goyal if (!ovl_open_flags_need_copy_up(flags)) 3250c288874SVivek Goyal return false; 3260c288874SVivek Goyal 3270c288874SVivek Goyal return !ovl_test_flag(OVL_UPPERDATA, d_inode(dentry)); 3280c288874SVivek Goyal } 3290c288874SVivek Goyal 3300c288874SVivek Goyal bool ovl_dentry_needs_data_copy_up(struct dentry *dentry, int flags) 3310c288874SVivek Goyal { 3320c288874SVivek Goyal if (!ovl_open_flags_need_copy_up(flags)) 3330c288874SVivek Goyal return false; 3340c288874SVivek Goyal 3350c288874SVivek Goyal return !ovl_has_upperdata(d_inode(dentry)); 3360c288874SVivek Goyal } 3370c288874SVivek Goyal 338a6c60655SMiklos Szeredi bool ovl_redirect_dir(struct super_block *sb) 339a6c60655SMiklos Szeredi { 340a6c60655SMiklos Szeredi struct ovl_fs *ofs = sb->s_fs_info; 341a6c60655SMiklos Szeredi 34221a22878SAmir Goldstein return ofs->config.redirect_dir && !ofs->noxattr; 343a6c60655SMiklos Szeredi } 344a6c60655SMiklos Szeredi 345a6c60655SMiklos Szeredi const char *ovl_dentry_get_redirect(struct dentry *dentry) 346a6c60655SMiklos Szeredi { 347cf31c463SMiklos Szeredi return OVL_I(d_inode(dentry))->redirect; 348a6c60655SMiklos Szeredi } 349a6c60655SMiklos Szeredi 350a6c60655SMiklos Szeredi void ovl_dentry_set_redirect(struct dentry *dentry, const char *redirect) 351a6c60655SMiklos Szeredi { 352cf31c463SMiklos Szeredi struct ovl_inode *oi = OVL_I(d_inode(dentry)); 353a6c60655SMiklos Szeredi 354cf31c463SMiklos Szeredi kfree(oi->redirect); 355cf31c463SMiklos Szeredi oi->redirect = redirect; 356a6c60655SMiklos Szeredi } 357a6c60655SMiklos Szeredi 35809d8b586SMiklos Szeredi void ovl_inode_init(struct inode *inode, struct dentry *upperdentry, 35909d8b586SMiklos Szeredi struct dentry *lowerdentry) 360bbb1e54dSMiklos Szeredi { 361695b46e7SAmir Goldstein struct inode *realinode = d_inode(upperdentry ?: lowerdentry); 362695b46e7SAmir Goldstein 36309d8b586SMiklos Szeredi if (upperdentry) 36409d8b586SMiklos Szeredi OVL_I(inode)->__upperdentry = upperdentry; 36509d8b586SMiklos Szeredi if (lowerdentry) 36631747edaSAmir Goldstein OVL_I(inode)->lower = igrab(d_inode(lowerdentry)); 367bbb1e54dSMiklos Szeredi 368695b46e7SAmir Goldstein ovl_copyattr(realinode, inode); 3694f357295SMiklos Szeredi ovl_copyflags(realinode, inode); 370695b46e7SAmir Goldstein if (!inode->i_ino) 371695b46e7SAmir Goldstein inode->i_ino = realinode->i_ino; 372bbb1e54dSMiklos Szeredi } 373bbb1e54dSMiklos Szeredi 37409d8b586SMiklos Szeredi void ovl_inode_update(struct inode *inode, struct dentry *upperdentry) 375bbb1e54dSMiklos Szeredi { 37609d8b586SMiklos Szeredi struct inode *upperinode = d_inode(upperdentry); 377e6d2ebddSMiklos Szeredi 37809d8b586SMiklos Szeredi WARN_ON(OVL_I(inode)->__upperdentry); 37909d8b586SMiklos Szeredi 38025b7713aSMiklos Szeredi /* 38109d8b586SMiklos Szeredi * Make sure upperdentry is consistent before making it visible 38225b7713aSMiklos Szeredi */ 38325b7713aSMiklos Szeredi smp_wmb(); 38409d8b586SMiklos Szeredi OVL_I(inode)->__upperdentry = upperdentry; 38531747edaSAmir Goldstein if (inode_unhashed(inode)) { 386695b46e7SAmir Goldstein if (!inode->i_ino) 387695b46e7SAmir Goldstein inode->i_ino = upperinode->i_ino; 38825b7713aSMiklos Szeredi inode->i_private = upperinode; 389bbb1e54dSMiklos Szeredi __insert_inode_hash(inode, (unsigned long) upperinode); 390bbb1e54dSMiklos Szeredi } 39125b7713aSMiklos Szeredi } 392bbb1e54dSMiklos Szeredi 393d9854c87SMiklos Szeredi static void ovl_dentry_version_inc(struct dentry *dentry, bool impurity) 394bbb1e54dSMiklos Szeredi { 39504a01ac7SMiklos Szeredi struct inode *inode = d_inode(dentry); 396bbb1e54dSMiklos Szeredi 39704a01ac7SMiklos Szeredi WARN_ON(!inode_is_locked(inode)); 3984edb83bbSMiklos Szeredi /* 3994edb83bbSMiklos Szeredi * Version is used by readdir code to keep cache consistent. For merge 4004edb83bbSMiklos Szeredi * dirs all changes need to be noted. For non-merge dirs, cache only 4014edb83bbSMiklos Szeredi * contains impure (ones which have been copied up and have origins) 4024edb83bbSMiklos Szeredi * entries, so only need to note changes to impure entries. 4034edb83bbSMiklos Szeredi */ 4044edb83bbSMiklos Szeredi if (OVL_TYPE_MERGE(ovl_path_type(dentry)) || impurity) 40504a01ac7SMiklos Szeredi OVL_I(inode)->version++; 406bbb1e54dSMiklos Szeredi } 407bbb1e54dSMiklos Szeredi 408d9854c87SMiklos Szeredi void ovl_dir_modified(struct dentry *dentry, bool impurity) 409d9854c87SMiklos Szeredi { 410d9854c87SMiklos Szeredi /* Copy mtime/ctime */ 411d9854c87SMiklos Szeredi ovl_copyattr(d_inode(ovl_dentry_upper(dentry)), d_inode(dentry)); 412d9854c87SMiklos Szeredi 413d9854c87SMiklos Szeredi ovl_dentry_version_inc(dentry, impurity); 414d9854c87SMiklos Szeredi } 415d9854c87SMiklos Szeredi 416bbb1e54dSMiklos Szeredi u64 ovl_dentry_version_get(struct dentry *dentry) 417bbb1e54dSMiklos Szeredi { 41804a01ac7SMiklos Szeredi struct inode *inode = d_inode(dentry); 419bbb1e54dSMiklos Szeredi 42004a01ac7SMiklos Szeredi WARN_ON(!inode_is_locked(inode)); 42104a01ac7SMiklos Szeredi return OVL_I(inode)->version; 422bbb1e54dSMiklos Szeredi } 423bbb1e54dSMiklos Szeredi 424bbb1e54dSMiklos Szeredi bool ovl_is_whiteout(struct dentry *dentry) 425bbb1e54dSMiklos Szeredi { 426bbb1e54dSMiklos Szeredi struct inode *inode = dentry->d_inode; 427bbb1e54dSMiklos Szeredi 428bbb1e54dSMiklos Szeredi return inode && IS_WHITEOUT(inode); 429bbb1e54dSMiklos Szeredi } 430bbb1e54dSMiklos Szeredi 431bbb1e54dSMiklos Szeredi struct file *ovl_path_open(struct path *path, int flags) 432bbb1e54dSMiklos Szeredi { 433bbb1e54dSMiklos Szeredi return dentry_open(path, flags | O_NOATIME, current_cred()); 434bbb1e54dSMiklos Szeredi } 43539d3d60aSAmir Goldstein 4360c288874SVivek Goyal /* Caller should hold ovl_inode->lock */ 4370c288874SVivek Goyal static bool ovl_already_copied_up_locked(struct dentry *dentry, int flags) 4380c288874SVivek Goyal { 4390c288874SVivek Goyal bool disconnected = dentry->d_flags & DCACHE_DISCONNECTED; 4400c288874SVivek Goyal 4410c288874SVivek Goyal if (ovl_dentry_upper(dentry) && 4420c288874SVivek Goyal (ovl_dentry_has_upper_alias(dentry) || disconnected) && 4430c288874SVivek Goyal !ovl_dentry_needs_data_copy_up_locked(dentry, flags)) 4440c288874SVivek Goyal return true; 4450c288874SVivek Goyal 4460c288874SVivek Goyal return false; 4470c288874SVivek Goyal } 4480c288874SVivek Goyal 4490c288874SVivek Goyal bool ovl_already_copied_up(struct dentry *dentry, int flags) 4502002df85SVivek Goyal { 4512002df85SVivek Goyal bool disconnected = dentry->d_flags & DCACHE_DISCONNECTED; 4522002df85SVivek Goyal 4532002df85SVivek Goyal /* 4542002df85SVivek Goyal * Check if copy-up has happened as well as for upper alias (in 4552002df85SVivek Goyal * case of hard links) is there. 4562002df85SVivek Goyal * 4572002df85SVivek Goyal * Both checks are lockless: 4582002df85SVivek Goyal * - false negatives: will recheck under oi->lock 4592002df85SVivek Goyal * - false positives: 4602002df85SVivek Goyal * + ovl_dentry_upper() uses memory barriers to ensure the 4612002df85SVivek Goyal * upper dentry is up-to-date 4622002df85SVivek Goyal * + ovl_dentry_has_upper_alias() relies on locking of 4632002df85SVivek Goyal * upper parent i_rwsem to prevent reordering copy-up 4642002df85SVivek Goyal * with rename. 4652002df85SVivek Goyal */ 4662002df85SVivek Goyal if (ovl_dentry_upper(dentry) && 4670c288874SVivek Goyal (ovl_dentry_has_upper_alias(dentry) || disconnected) && 4680c288874SVivek Goyal !ovl_dentry_needs_data_copy_up(dentry, flags)) 4692002df85SVivek Goyal return true; 4702002df85SVivek Goyal 4712002df85SVivek Goyal return false; 4722002df85SVivek Goyal } 4732002df85SVivek Goyal 4740c288874SVivek Goyal int ovl_copy_up_start(struct dentry *dentry, int flags) 47539d3d60aSAmir Goldstein { 476a015dafcSAmir Goldstein struct ovl_inode *oi = OVL_I(d_inode(dentry)); 47739d3d60aSAmir Goldstein int err; 47839d3d60aSAmir Goldstein 479a015dafcSAmir Goldstein err = mutex_lock_interruptible(&oi->lock); 4800c288874SVivek Goyal if (!err && ovl_already_copied_up_locked(dentry, flags)) { 48139d3d60aSAmir Goldstein err = 1; /* Already copied up */ 482a015dafcSAmir Goldstein mutex_unlock(&oi->lock); 48339d3d60aSAmir Goldstein } 48439d3d60aSAmir Goldstein 48539d3d60aSAmir Goldstein return err; 48639d3d60aSAmir Goldstein } 48739d3d60aSAmir Goldstein 48839d3d60aSAmir Goldstein void ovl_copy_up_end(struct dentry *dentry) 48939d3d60aSAmir Goldstein { 490a015dafcSAmir Goldstein mutex_unlock(&OVL_I(d_inode(dentry))->lock); 49139d3d60aSAmir Goldstein } 49282b749b2SAmir Goldstein 493b79e05aaSAmir Goldstein bool ovl_check_origin_xattr(struct dentry *dentry) 494b79e05aaSAmir Goldstein { 495b79e05aaSAmir Goldstein int res; 496b79e05aaSAmir Goldstein 497b79e05aaSAmir Goldstein res = vfs_getxattr(dentry, OVL_XATTR_ORIGIN, NULL, 0); 498b79e05aaSAmir Goldstein 499b79e05aaSAmir Goldstein /* Zero size value means "copied up but origin unknown" */ 500b79e05aaSAmir Goldstein if (res >= 0) 501b79e05aaSAmir Goldstein return true; 502b79e05aaSAmir Goldstein 503b79e05aaSAmir Goldstein return false; 504b79e05aaSAmir Goldstein } 505b79e05aaSAmir Goldstein 506f3a15685SAmir Goldstein bool ovl_check_dir_xattr(struct dentry *dentry, const char *name) 507f3a15685SAmir Goldstein { 508f3a15685SAmir Goldstein int res; 509f3a15685SAmir Goldstein char val; 510f3a15685SAmir Goldstein 511f3a15685SAmir Goldstein if (!d_is_dir(dentry)) 512f3a15685SAmir Goldstein return false; 513f3a15685SAmir Goldstein 514f3a15685SAmir Goldstein res = vfs_getxattr(dentry, name, &val, 1); 515f3a15685SAmir Goldstein if (res == 1 && val == 'y') 516f3a15685SAmir Goldstein return true; 517f3a15685SAmir Goldstein 518f3a15685SAmir Goldstein return false; 519f3a15685SAmir Goldstein } 520f3a15685SAmir Goldstein 52182b749b2SAmir Goldstein int ovl_check_setxattr(struct dentry *dentry, struct dentry *upperdentry, 52282b749b2SAmir Goldstein const char *name, const void *value, size_t size, 52382b749b2SAmir Goldstein int xerr) 52482b749b2SAmir Goldstein { 52582b749b2SAmir Goldstein int err; 52682b749b2SAmir Goldstein struct ovl_fs *ofs = dentry->d_sb->s_fs_info; 52782b749b2SAmir Goldstein 52882b749b2SAmir Goldstein if (ofs->noxattr) 52982b749b2SAmir Goldstein return xerr; 53082b749b2SAmir Goldstein 53182b749b2SAmir Goldstein err = ovl_do_setxattr(upperdentry, name, value, size, 0); 53282b749b2SAmir Goldstein 53382b749b2SAmir Goldstein if (err == -EOPNOTSUPP) { 53482b749b2SAmir Goldstein pr_warn("overlayfs: cannot set %s xattr on upper\n", name); 53582b749b2SAmir Goldstein ofs->noxattr = true; 53682b749b2SAmir Goldstein return xerr; 53782b749b2SAmir Goldstein } 53882b749b2SAmir Goldstein 53982b749b2SAmir Goldstein return err; 54082b749b2SAmir Goldstein } 541f3a15685SAmir Goldstein 542f3a15685SAmir Goldstein int ovl_set_impure(struct dentry *dentry, struct dentry *upperdentry) 543f3a15685SAmir Goldstein { 544f3a15685SAmir Goldstein int err; 545f3a15685SAmir Goldstein 54613c72075SMiklos Szeredi if (ovl_test_flag(OVL_IMPURE, d_inode(dentry))) 547f3a15685SAmir Goldstein return 0; 548f3a15685SAmir Goldstein 549f3a15685SAmir Goldstein /* 550f3a15685SAmir Goldstein * Do not fail when upper doesn't support xattrs. 551f3a15685SAmir Goldstein * Upper inodes won't have origin nor redirect xattr anyway. 552f3a15685SAmir Goldstein */ 553f3a15685SAmir Goldstein err = ovl_check_setxattr(dentry, upperdentry, OVL_XATTR_IMPURE, 554f3a15685SAmir Goldstein "y", 1, 0); 555f3a15685SAmir Goldstein if (!err) 55613c72075SMiklos Szeredi ovl_set_flag(OVL_IMPURE, d_inode(dentry)); 557f3a15685SAmir Goldstein 558f3a15685SAmir Goldstein return err; 559f3a15685SAmir Goldstein } 56013c72075SMiklos Szeredi 56113c72075SMiklos Szeredi void ovl_set_flag(unsigned long flag, struct inode *inode) 56213c72075SMiklos Szeredi { 56313c72075SMiklos Szeredi set_bit(flag, &OVL_I(inode)->flags); 56413c72075SMiklos Szeredi } 56513c72075SMiklos Szeredi 5664edb83bbSMiklos Szeredi void ovl_clear_flag(unsigned long flag, struct inode *inode) 5674edb83bbSMiklos Szeredi { 5684edb83bbSMiklos Szeredi clear_bit(flag, &OVL_I(inode)->flags); 5694edb83bbSMiklos Szeredi } 5704edb83bbSMiklos Szeredi 57113c72075SMiklos Szeredi bool ovl_test_flag(unsigned long flag, struct inode *inode) 57213c72075SMiklos Szeredi { 57313c72075SMiklos Szeredi return test_bit(flag, &OVL_I(inode)->flags); 57413c72075SMiklos Szeredi } 575ad0af710SAmir Goldstein 576ad0af710SAmir Goldstein /** 577ad0af710SAmir Goldstein * Caller must hold a reference to inode to prevent it from being freed while 578ad0af710SAmir Goldstein * it is marked inuse. 579ad0af710SAmir Goldstein */ 580ad0af710SAmir Goldstein bool ovl_inuse_trylock(struct dentry *dentry) 581ad0af710SAmir Goldstein { 582ad0af710SAmir Goldstein struct inode *inode = d_inode(dentry); 583ad0af710SAmir Goldstein bool locked = false; 584ad0af710SAmir Goldstein 585ad0af710SAmir Goldstein spin_lock(&inode->i_lock); 586ad0af710SAmir Goldstein if (!(inode->i_state & I_OVL_INUSE)) { 587ad0af710SAmir Goldstein inode->i_state |= I_OVL_INUSE; 588ad0af710SAmir Goldstein locked = true; 589ad0af710SAmir Goldstein } 590ad0af710SAmir Goldstein spin_unlock(&inode->i_lock); 591ad0af710SAmir Goldstein 592ad0af710SAmir Goldstein return locked; 593ad0af710SAmir Goldstein } 594ad0af710SAmir Goldstein 595ad0af710SAmir Goldstein void ovl_inuse_unlock(struct dentry *dentry) 596ad0af710SAmir Goldstein { 597ad0af710SAmir Goldstein if (dentry) { 598ad0af710SAmir Goldstein struct inode *inode = d_inode(dentry); 599ad0af710SAmir Goldstein 600ad0af710SAmir Goldstein spin_lock(&inode->i_lock); 601ad0af710SAmir Goldstein WARN_ON(!(inode->i_state & I_OVL_INUSE)); 602ad0af710SAmir Goldstein inode->i_state &= ~I_OVL_INUSE; 603ad0af710SAmir Goldstein spin_unlock(&inode->i_lock); 604ad0af710SAmir Goldstein } 605ad0af710SAmir Goldstein } 6065f8415d6SAmir Goldstein 60724b33ee1SAmir Goldstein /* 60824b33ee1SAmir Goldstein * Does this overlay dentry need to be indexed on copy up? 60924b33ee1SAmir Goldstein */ 61024b33ee1SAmir Goldstein bool ovl_need_index(struct dentry *dentry) 61124b33ee1SAmir Goldstein { 61224b33ee1SAmir Goldstein struct dentry *lower = ovl_dentry_lower(dentry); 61324b33ee1SAmir Goldstein 61424b33ee1SAmir Goldstein if (!lower || !ovl_indexdir(dentry->d_sb)) 61524b33ee1SAmir Goldstein return false; 61624b33ee1SAmir Goldstein 617fbd2d207SAmir Goldstein /* Index all files for NFS export and consistency verification */ 618016b720fSAmir Goldstein if (ovl_index_all(dentry->d_sb)) 619fbd2d207SAmir Goldstein return true; 620fbd2d207SAmir Goldstein 62124b33ee1SAmir Goldstein /* Index only lower hardlinks on copy up */ 62224b33ee1SAmir Goldstein if (!d_is_dir(lower) && d_inode(lower)->i_nlink > 1) 62324b33ee1SAmir Goldstein return true; 62424b33ee1SAmir Goldstein 62524b33ee1SAmir Goldstein return false; 62624b33ee1SAmir Goldstein } 62724b33ee1SAmir Goldstein 6289f4ec904SAmir Goldstein /* Caller must hold OVL_I(inode)->lock */ 629caf70cb2SAmir Goldstein static void ovl_cleanup_index(struct dentry *dentry) 630caf70cb2SAmir Goldstein { 631e7dd0e71SAmir Goldstein struct dentry *indexdir = ovl_indexdir(dentry->d_sb); 632e7dd0e71SAmir Goldstein struct inode *dir = indexdir->d_inode; 633caf70cb2SAmir Goldstein struct dentry *lowerdentry = ovl_dentry_lower(dentry); 634caf70cb2SAmir Goldstein struct dentry *upperdentry = ovl_dentry_upper(dentry); 635caf70cb2SAmir Goldstein struct dentry *index = NULL; 636caf70cb2SAmir Goldstein struct inode *inode; 637caf70cb2SAmir Goldstein struct qstr name; 638caf70cb2SAmir Goldstein int err; 639caf70cb2SAmir Goldstein 640caf70cb2SAmir Goldstein err = ovl_get_index_name(lowerdentry, &name); 641caf70cb2SAmir Goldstein if (err) 642caf70cb2SAmir Goldstein goto fail; 643caf70cb2SAmir Goldstein 644caf70cb2SAmir Goldstein inode = d_inode(upperdentry); 64589a17556SAmir Goldstein if (!S_ISDIR(inode->i_mode) && inode->i_nlink != 1) { 646caf70cb2SAmir Goldstein pr_warn_ratelimited("overlayfs: cleanup linked index (%pd2, ino=%lu, nlink=%u)\n", 647caf70cb2SAmir Goldstein upperdentry, inode->i_ino, inode->i_nlink); 648caf70cb2SAmir Goldstein /* 649caf70cb2SAmir Goldstein * We either have a bug with persistent union nlink or a lower 650caf70cb2SAmir Goldstein * hardlink was added while overlay is mounted. Adding a lower 651caf70cb2SAmir Goldstein * hardlink and then unlinking all overlay hardlinks would drop 652caf70cb2SAmir Goldstein * overlay nlink to zero before all upper inodes are unlinked. 653caf70cb2SAmir Goldstein * As a safety measure, when that situation is detected, set 654caf70cb2SAmir Goldstein * the overlay nlink to the index inode nlink minus one for the 655caf70cb2SAmir Goldstein * index entry itself. 656caf70cb2SAmir Goldstein */ 657caf70cb2SAmir Goldstein set_nlink(d_inode(dentry), inode->i_nlink - 1); 658caf70cb2SAmir Goldstein ovl_set_nlink_upper(dentry); 659caf70cb2SAmir Goldstein goto out; 660caf70cb2SAmir Goldstein } 661caf70cb2SAmir Goldstein 662caf70cb2SAmir Goldstein inode_lock_nested(dir, I_MUTEX_PARENT); 663e7dd0e71SAmir Goldstein index = lookup_one_len(name.name, indexdir, name.len); 664caf70cb2SAmir Goldstein err = PTR_ERR(index); 665e7dd0e71SAmir Goldstein if (IS_ERR(index)) { 6669f4ec904SAmir Goldstein index = NULL; 667e7dd0e71SAmir Goldstein } else if (ovl_index_all(dentry->d_sb)) { 668e7dd0e71SAmir Goldstein /* Whiteout orphan index to block future open by handle */ 669e7dd0e71SAmir Goldstein err = ovl_cleanup_and_whiteout(indexdir, dir, index); 670e7dd0e71SAmir Goldstein } else { 671e7dd0e71SAmir Goldstein /* Cleanup orphan index entries */ 672e7dd0e71SAmir Goldstein err = ovl_cleanup(dir, index); 673e7dd0e71SAmir Goldstein } 6749f4ec904SAmir Goldstein 675caf70cb2SAmir Goldstein inode_unlock(dir); 676caf70cb2SAmir Goldstein if (err) 677caf70cb2SAmir Goldstein goto fail; 678caf70cb2SAmir Goldstein 679caf70cb2SAmir Goldstein out: 680caf70cb2SAmir Goldstein dput(index); 681caf70cb2SAmir Goldstein return; 682caf70cb2SAmir Goldstein 683caf70cb2SAmir Goldstein fail: 684caf70cb2SAmir Goldstein pr_err("overlayfs: cleanup index of '%pd2' failed (%i)\n", dentry, err); 685caf70cb2SAmir Goldstein goto out; 686caf70cb2SAmir Goldstein } 687caf70cb2SAmir Goldstein 6885f8415d6SAmir Goldstein /* 6895f8415d6SAmir Goldstein * Operations that change overlay inode and upper inode nlink need to be 6905f8415d6SAmir Goldstein * synchronized with copy up for persistent nlink accounting. 6915f8415d6SAmir Goldstein */ 6925f8415d6SAmir Goldstein int ovl_nlink_start(struct dentry *dentry, bool *locked) 6935f8415d6SAmir Goldstein { 6945f8415d6SAmir Goldstein struct ovl_inode *oi = OVL_I(d_inode(dentry)); 6955f8415d6SAmir Goldstein const struct cred *old_cred; 6965f8415d6SAmir Goldstein int err; 6975f8415d6SAmir Goldstein 69889a17556SAmir Goldstein if (!d_inode(dentry)) 6995f8415d6SAmir Goldstein return 0; 7005f8415d6SAmir Goldstein 7015f8415d6SAmir Goldstein /* 7025f8415d6SAmir Goldstein * With inodes index is enabled, we store the union overlay nlink 70324b33ee1SAmir Goldstein * in an xattr on the index inode. When whiting out an indexed lower, 7045f8415d6SAmir Goldstein * we need to decrement the overlay persistent nlink, but before the 7055f8415d6SAmir Goldstein * first copy up, we have no upper index inode to store the xattr. 7065f8415d6SAmir Goldstein * 70724b33ee1SAmir Goldstein * As a workaround, before whiteout/rename over an indexed lower, 7085f8415d6SAmir Goldstein * copy up to create the upper index. Creating the upper index will 7095f8415d6SAmir Goldstein * initialize the overlay nlink, so it could be dropped if unlink 7105f8415d6SAmir Goldstein * or rename succeeds. 7115f8415d6SAmir Goldstein * 7125f8415d6SAmir Goldstein * TODO: implement metadata only index copy up when called with 7135f8415d6SAmir Goldstein * ovl_copy_up_flags(dentry, O_PATH). 7145f8415d6SAmir Goldstein */ 71524b33ee1SAmir Goldstein if (ovl_need_index(dentry) && !ovl_dentry_has_upper_alias(dentry)) { 7165f8415d6SAmir Goldstein err = ovl_copy_up(dentry); 7175f8415d6SAmir Goldstein if (err) 7185f8415d6SAmir Goldstein return err; 7195f8415d6SAmir Goldstein } 7205f8415d6SAmir Goldstein 7215f8415d6SAmir Goldstein err = mutex_lock_interruptible(&oi->lock); 7225f8415d6SAmir Goldstein if (err) 7235f8415d6SAmir Goldstein return err; 7245f8415d6SAmir Goldstein 72589a17556SAmir Goldstein if (d_is_dir(dentry) || !ovl_test_flag(OVL_INDEX, d_inode(dentry))) 7265f8415d6SAmir Goldstein goto out; 7275f8415d6SAmir Goldstein 7285f8415d6SAmir Goldstein old_cred = ovl_override_creds(dentry->d_sb); 7295f8415d6SAmir Goldstein /* 7305f8415d6SAmir Goldstein * The overlay inode nlink should be incremented/decremented IFF the 7315f8415d6SAmir Goldstein * upper operation succeeds, along with nlink change of upper inode. 7325f8415d6SAmir Goldstein * Therefore, before link/unlink/rename, we store the union nlink 7335f8415d6SAmir Goldstein * value relative to the upper inode nlink in an upper inode xattr. 7345f8415d6SAmir Goldstein */ 7355f8415d6SAmir Goldstein err = ovl_set_nlink_upper(dentry); 7365f8415d6SAmir Goldstein revert_creds(old_cred); 7375f8415d6SAmir Goldstein 7385f8415d6SAmir Goldstein out: 7395f8415d6SAmir Goldstein if (err) 7405f8415d6SAmir Goldstein mutex_unlock(&oi->lock); 7415f8415d6SAmir Goldstein else 7425f8415d6SAmir Goldstein *locked = true; 7435f8415d6SAmir Goldstein 7445f8415d6SAmir Goldstein return err; 7455f8415d6SAmir Goldstein } 7465f8415d6SAmir Goldstein 7475f8415d6SAmir Goldstein void ovl_nlink_end(struct dentry *dentry, bool locked) 7485f8415d6SAmir Goldstein { 749caf70cb2SAmir Goldstein if (locked) { 750caf70cb2SAmir Goldstein if (ovl_test_flag(OVL_INDEX, d_inode(dentry)) && 751caf70cb2SAmir Goldstein d_inode(dentry)->i_nlink == 0) { 752caf70cb2SAmir Goldstein const struct cred *old_cred; 753caf70cb2SAmir Goldstein 754caf70cb2SAmir Goldstein old_cred = ovl_override_creds(dentry->d_sb); 755caf70cb2SAmir Goldstein ovl_cleanup_index(dentry); 756caf70cb2SAmir Goldstein revert_creds(old_cred); 757caf70cb2SAmir Goldstein } 758caf70cb2SAmir Goldstein 7595f8415d6SAmir Goldstein mutex_unlock(&OVL_I(d_inode(dentry))->lock); 7605f8415d6SAmir Goldstein } 761caf70cb2SAmir Goldstein } 7625820dc08SAmir Goldstein 7635820dc08SAmir Goldstein int ovl_lock_rename_workdir(struct dentry *workdir, struct dentry *upperdir) 7645820dc08SAmir Goldstein { 7655820dc08SAmir Goldstein /* Workdir should not be the same as upperdir */ 7665820dc08SAmir Goldstein if (workdir == upperdir) 7675820dc08SAmir Goldstein goto err; 7685820dc08SAmir Goldstein 7695820dc08SAmir Goldstein /* Workdir should not be subdir of upperdir and vice versa */ 7705820dc08SAmir Goldstein if (lock_rename(workdir, upperdir) != NULL) 7715820dc08SAmir Goldstein goto err_unlock; 7725820dc08SAmir Goldstein 7735820dc08SAmir Goldstein return 0; 7745820dc08SAmir Goldstein 7755820dc08SAmir Goldstein err_unlock: 7765820dc08SAmir Goldstein unlock_rename(workdir, upperdir); 7775820dc08SAmir Goldstein err: 7785820dc08SAmir Goldstein pr_err("overlayfs: failed to lock workdir+upperdir\n"); 7795820dc08SAmir Goldstein return -EIO; 7805820dc08SAmir Goldstein } 7819d3dfea3SVivek Goyal 7829d3dfea3SVivek Goyal /* err < 0, 0 if no metacopy xattr, 1 if metacopy xattr found */ 7839d3dfea3SVivek Goyal int ovl_check_metacopy_xattr(struct dentry *dentry) 7849d3dfea3SVivek Goyal { 7859d3dfea3SVivek Goyal int res; 7869d3dfea3SVivek Goyal 7879d3dfea3SVivek Goyal /* Only regular files can have metacopy xattr */ 7889d3dfea3SVivek Goyal if (!S_ISREG(d_inode(dentry)->i_mode)) 7899d3dfea3SVivek Goyal return 0; 7909d3dfea3SVivek Goyal 7919d3dfea3SVivek Goyal res = vfs_getxattr(dentry, OVL_XATTR_METACOPY, NULL, 0); 7929d3dfea3SVivek Goyal if (res < 0) { 7939d3dfea3SVivek Goyal if (res == -ENODATA || res == -EOPNOTSUPP) 7949d3dfea3SVivek Goyal return 0; 7959d3dfea3SVivek Goyal goto out; 7969d3dfea3SVivek Goyal } 7979d3dfea3SVivek Goyal 7989d3dfea3SVivek Goyal return 1; 7999d3dfea3SVivek Goyal out: 8009d3dfea3SVivek Goyal pr_warn_ratelimited("overlayfs: failed to get metacopy (%i)\n", res); 8019d3dfea3SVivek Goyal return res; 8029d3dfea3SVivek Goyal } 803