blob: 30e0ee766ade7f0fcdfce4937ed4f3235e64260b [file] [log] [blame]
Thomas Gleixnerd2912cb2019-06-04 10:11:33 +02001// SPDX-License-Identifier: GPL-2.0-only
Miklos Szeredibbb1e542016-12-16 11:02:56 +01002/*
3 * Copyright (C) 2011 Novell Inc.
4 * Copyright (C) 2016 Red Hat, Inc.
Miklos Szeredibbb1e542016-12-16 11:02:56 +01005 */
6
7#include <linux/fs.h>
Ingo Molnar5b825c32017-02-02 17:54:15 +01008#include <linux/cred.h>
Amir Goldstein9ee60ce2017-11-01 10:13:51 +02009#include <linux/ctype.h>
Miklos Szeredibbb1e542016-12-16 11:02:56 +010010#include <linux/namei.h>
11#include <linux/xattr.h>
Miklos Szeredi02b69b22016-12-16 11:02:56 +010012#include <linux/ratelimit.h>
Amir Goldsteina9d01952017-04-30 14:46:31 +030013#include <linux/mount.h>
14#include <linux/exportfs.h>
Miklos Szeredibbb1e542016-12-16 11:02:56 +010015#include "overlayfs.h"
Miklos Szeredibbb1e542016-12-16 11:02:56 +010016
Miklos Szeredie28edc42016-12-16 11:02:56 +010017struct ovl_lookup_data {
Amir Goldstein146d62e2019-04-18 17:42:08 +030018 struct super_block *sb;
Miklos Szeredie28edc42016-12-16 11:02:56 +010019 struct qstr name;
20 bool is_dir;
21 bool opaque;
22 bool stop;
23 bool last;
Miklos Szeredi02b69b22016-12-16 11:02:56 +010024 char *redirect;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -040025 bool metacopy;
Miklos Szeredie28edc42016-12-16 11:02:56 +010026};
Miklos Szeredibbb1e542016-12-16 11:02:56 +010027
Miklos Szeredi02b69b22016-12-16 11:02:56 +010028static int ovl_check_redirect(struct dentry *dentry, struct ovl_lookup_data *d,
29 size_t prelen, const char *post)
30{
31 int res;
Vivek Goyal0a2d0d32018-05-11 11:49:32 -040032 char *buf;
Miklos Szeredi610afc02020-09-02 10:58:49 +020033 struct ovl_fs *ofs = OVL_FS(d->sb);
Miklos Szeredi02b69b22016-12-16 11:02:56 +010034
Miklos Szeredi610afc02020-09-02 10:58:49 +020035 buf = ovl_get_redirect_xattr(ofs, dentry, prelen + strlen(post));
Vivek Goyal0a2d0d32018-05-11 11:49:32 -040036 if (IS_ERR_OR_NULL(buf))
37 return PTR_ERR(buf);
Miklos Szeredi02b69b22016-12-16 11:02:56 +010038
Miklos Szeredi02b69b22016-12-16 11:02:56 +010039 if (buf[0] == '/') {
Amir Goldstein3ec9b3f2018-03-12 10:30:41 -040040 /*
41 * One of the ancestor path elements in an absolute path
42 * lookup in ovl_lookup_layer() could have been opaque and
43 * that will stop further lookup in lower layers (d->stop=true)
44 * But we have found an absolute redirect in decendant path
45 * element and that should force continue lookup in lower
46 * layers (reset d->stop).
47 */
48 d->stop = false;
Miklos Szeredi02b69b22016-12-16 11:02:56 +010049 } else {
Vivek Goyal0a2d0d32018-05-11 11:49:32 -040050 res = strlen(buf) + 1;
Miklos Szeredi02b69b22016-12-16 11:02:56 +010051 memmove(buf + prelen, buf, res);
52 memcpy(buf, d->name.name, prelen);
53 }
54
55 strcat(buf, post);
56 kfree(d->redirect);
57 d->redirect = buf;
58 d->name.name = d->redirect;
59 d->name.len = strlen(d->redirect);
60
61 return 0;
Miklos Szeredi02b69b22016-12-16 11:02:56 +010062}
63
Amir Goldsteina9d01952017-04-30 14:46:31 +030064static int ovl_acceptable(void *ctx, struct dentry *dentry)
65{
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +020066 /*
67 * A non-dir origin may be disconnected, which is fine, because
68 * we only need it for its unique inode number.
69 */
70 if (!d_is_dir(dentry))
71 return 1;
72
73 /* Don't decode a deleted empty directory */
74 if (d_unhashed(dentry))
75 return 0;
76
77 /* Check if directory belongs to the layer we are decoding from */
78 return is_subdir(dentry, ((struct vfsmount *)ctx)->mnt_root);
Amir Goldsteina9d01952017-04-30 14:46:31 +030079}
80
Amir Goldstein2e1a53282017-10-24 15:12:15 +030081/*
82 * Check validity of an overlay file handle buffer.
83 *
84 * Return 0 for a valid file handle.
85 * Return -ENODATA for "origin unknown".
86 * Return <0 for an invalid file handle.
87 */
Amir Goldsteincbe7fba2019-11-15 13:33:03 +020088int ovl_check_fb_len(struct ovl_fb *fb, int fb_len)
Amir Goldstein2e1a53282017-10-24 15:12:15 +030089{
Amir Goldsteincbe7fba2019-11-15 13:33:03 +020090 if (fb_len < sizeof(struct ovl_fb) || fb_len < fb->len)
Amir Goldstein2e1a53282017-10-24 15:12:15 +030091 return -EINVAL;
92
Amir Goldsteincbe7fba2019-11-15 13:33:03 +020093 if (fb->magic != OVL_FH_MAGIC)
Amir Goldstein2e1a53282017-10-24 15:12:15 +030094 return -EINVAL;
95
96 /* Treat larger version and unknown flags as "origin unknown" */
Amir Goldsteincbe7fba2019-11-15 13:33:03 +020097 if (fb->version > OVL_FH_VERSION || fb->flags & ~OVL_FH_FLAG_ALL)
Amir Goldstein2e1a53282017-10-24 15:12:15 +030098 return -ENODATA;
99
100 /* Treat endianness mismatch as "origin unknown" */
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200101 if (!(fb->flags & OVL_FH_FLAG_ANY_ENDIAN) &&
102 (fb->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN)
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300103 return -ENODATA;
104
105 return 0;
106}
107
Miklos Szeredi610afc02020-09-02 10:58:49 +0200108static struct ovl_fh *ovl_get_fh(struct ovl_fs *ofs, struct dentry *dentry,
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200109 enum ovl_xattr ox)
Amir Goldsteina9d01952017-04-30 14:46:31 +0300110{
Greg Kroah-Hartman791d8a92020-02-08 14:23:00 +0100111 ssize_t res;
112 int err;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300113 struct ovl_fh *fh = NULL;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300114
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200115 res = ovl_do_getxattr(ofs, dentry, ox, NULL, 0);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300116 if (res < 0) {
117 if (res == -ENODATA || res == -EOPNOTSUPP)
118 return NULL;
119 goto fail;
120 }
121 /* Zero size value means "copied up but origin unknown" */
122 if (res == 0)
123 return NULL;
124
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200125 fh = kzalloc(res + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300126 if (!fh)
127 return ERR_PTR(-ENOMEM);
128
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200129 res = ovl_do_getxattr(ofs, dentry, ox, fh->buf, res);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300130 if (res < 0)
131 goto fail;
132
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200133 err = ovl_check_fb_len(&fh->fb, res);
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300134 if (err < 0) {
135 if (err == -ENODATA)
136 goto out;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300137 goto invalid;
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300138 }
Amir Goldsteina9d01952017-04-30 14:46:31 +0300139
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300140 return fh;
141
142out:
143 kfree(fh);
144 return NULL;
145
146fail:
Greg Kroah-Hartman791d8a92020-02-08 14:23:00 +0100147 pr_warn_ratelimited("failed to get origin (%zi)\n", res);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300148 goto out;
149invalid:
Greg Kroah-Hartman791d8a92020-02-08 14:23:00 +0100150 pr_warn_ratelimited("invalid origin (%*phN)\n", (int)res, fh);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300151 goto out;
152}
153
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200154struct dentry *ovl_decode_real_fh(struct ovl_fh *fh, struct vfsmount *mnt,
155 bool connected)
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300156{
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200157 struct dentry *real;
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300158 int bytes;
159
Amir Goldsteina9d01952017-04-30 14:46:31 +0300160 /*
161 * Make sure that the stored uuid matches the uuid of the lower
162 * layer where file handle will be decoded.
163 */
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200164 if (!uuid_equal(&fh->fb.uuid, &mnt->mnt_sb->s_uuid))
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300165 return NULL;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300166
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200167 bytes = (fh->fb.len - offsetof(struct ovl_fb, fid));
168 real = exportfs_decode_fh(mnt, (struct fid *)fh->fb.fid,
169 bytes >> 2, (int)fh->fb.type,
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200170 connected ? ovl_acceptable : NULL, mnt);
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200171 if (IS_ERR(real)) {
172 /*
173 * Treat stale file handle to lower file as "origin unknown".
174 * upper file handle could become stale when upper file is
175 * unlinked and this information is needed to handle stale
176 * index entries correctly.
177 */
178 if (real == ERR_PTR(-ESTALE) &&
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200179 !(fh->fb.flags & OVL_FH_FLAG_PATH_UPPER))
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200180 real = NULL;
181 return real;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300182 }
183
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200184 if (ovl_dentry_weird(real)) {
185 dput(real);
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300186 return NULL;
187 }
Amir Goldsteina9d01952017-04-30 14:46:31 +0300188
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200189 return real;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300190}
191
Miklos Szeredi610afc02020-09-02 10:58:49 +0200192static bool ovl_is_opaquedir(struct super_block *sb, struct dentry *dentry)
Amir Goldsteinee1d6d372017-05-11 16:42:26 +0300193{
Miklos Szeredi610afc02020-09-02 10:58:49 +0200194 return ovl_check_dir_xattr(sb, dentry, OVL_XATTR_OPAQUE);
Amir Goldsteinee1d6d372017-05-11 16:42:26 +0300195}
196
Chengguang Xu1434a652020-05-26 09:35:57 +0800197static struct dentry *ovl_lookup_positive_unlocked(const char *name,
198 struct dentry *base, int len,
199 bool drop_negative)
200{
201 struct dentry *ret = lookup_one_len_unlocked(name, base, len);
202
203 if (!IS_ERR(ret) && d_flags_negative(smp_load_acquire(&ret->d_flags))) {
204 if (drop_negative && ret->d_lockref.count == 1) {
205 spin_lock(&ret->d_lock);
206 /* Recheck condition under lock */
207 if (d_is_negative(ret) && ret->d_lockref.count == 1)
208 __d_drop(ret);
209 spin_unlock(&ret->d_lock);
210 }
211 dput(ret);
212 ret = ERR_PTR(-ENOENT);
213 }
214 return ret;
215}
216
Miklos Szeredie28edc42016-12-16 11:02:56 +0100217static int ovl_lookup_single(struct dentry *base, struct ovl_lookup_data *d,
218 const char *name, unsigned int namelen,
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100219 size_t prelen, const char *post,
Chengguang Xu1434a652020-05-26 09:35:57 +0800220 struct dentry **ret, bool drop_negative)
Miklos Szeredie28edc42016-12-16 11:02:56 +0100221{
222 struct dentry *this;
223 int err;
Vivek Goyal102b0d12018-03-09 15:44:43 -0500224 bool last_element = !post[0];
Miklos Szeredie28edc42016-12-16 11:02:56 +0100225
Chengguang Xu1434a652020-05-26 09:35:57 +0800226 this = ovl_lookup_positive_unlocked(name, base, namelen, drop_negative);
Miklos Szeredie28edc42016-12-16 11:02:56 +0100227 if (IS_ERR(this)) {
228 err = PTR_ERR(this);
229 this = NULL;
230 if (err == -ENOENT || err == -ENAMETOOLONG)
231 goto out;
232 goto out_err;
233 }
Miklos Szeredie28edc42016-12-16 11:02:56 +0100234
235 if (ovl_dentry_weird(this)) {
236 /* Don't support traversing automounts and other weirdness */
237 err = -EREMOTE;
238 goto out_err;
239 }
240 if (ovl_is_whiteout(this)) {
241 d->stop = d->opaque = true;
242 goto put_and_out;
243 }
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400244 /*
245 * This dentry should be a regular file if previous layer lookup
246 * found a metacopy dentry.
247 */
248 if (last_element && d->metacopy && !d_is_reg(this)) {
Miklos Szeredie28edc42016-12-16 11:02:56 +0100249 d->stop = true;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400250 goto put_and_out;
251 }
252 if (!d_can_lookup(this)) {
253 if (d->is_dir || !last_element) {
254 d->stop = true;
Miklos Szeredie28edc42016-12-16 11:02:56 +0100255 goto put_and_out;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400256 }
Miklos Szeredi610afc02020-09-02 10:58:49 +0200257 err = ovl_check_metacopy_xattr(OVL_FS(d->sb), this);
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400258 if (err < 0)
259 goto out_err;
Miklos Szeredi3a291772018-04-12 12:04:49 +0200260
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400261 d->metacopy = err;
262 d->stop = !d->metacopy;
Vivek Goyalb8a88242018-05-11 11:49:31 -0400263 if (!d->metacopy || d->last)
264 goto out;
Vivek Goyal0618a812018-05-11 11:49:31 -0400265 } else {
Amir Goldstein146d62e2019-04-18 17:42:08 +0300266 if (ovl_lookup_trap_inode(d->sb, this)) {
267 /* Caught in a trap of overlapping layers */
268 err = -ELOOP;
269 goto out_err;
270 }
271
Vivek Goyal102b0d12018-03-09 15:44:43 -0500272 if (last_element)
Vivek Goyal0618a812018-05-11 11:49:31 -0400273 d->is_dir = true;
274 if (d->last)
275 goto out;
276
Miklos Szeredi610afc02020-09-02 10:58:49 +0200277 if (ovl_is_opaquedir(d->sb, this)) {
Vivek Goyal0618a812018-05-11 11:49:31 -0400278 d->stop = true;
279 if (last_element)
280 d->opaque = true;
281 goto out;
282 }
Miklos Szeredie28edc42016-12-16 11:02:56 +0100283 }
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100284 err = ovl_check_redirect(this, d, prelen, post);
285 if (err)
286 goto out_err;
Miklos Szeredie28edc42016-12-16 11:02:56 +0100287out:
288 *ret = this;
289 return 0;
290
291put_and_out:
292 dput(this);
293 this = NULL;
294 goto out;
295
296out_err:
297 dput(this);
298 return err;
299}
300
301static int ovl_lookup_layer(struct dentry *base, struct ovl_lookup_data *d,
Chengguang Xu1434a652020-05-26 09:35:57 +0800302 struct dentry **ret, bool drop_negative)
Miklos Szeredie28edc42016-12-16 11:02:56 +0100303{
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100304 /* Counting down from the end, since the prefix can change */
305 size_t rem = d->name.len - 1;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100306 struct dentry *dentry = NULL;
307 int err;
308
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100309 if (d->name.name[0] != '/')
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100310 return ovl_lookup_single(base, d, d->name.name, d->name.len,
Chengguang Xu1434a652020-05-26 09:35:57 +0800311 0, "", ret, drop_negative);
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100312
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100313 while (!IS_ERR_OR_NULL(base) && d_can_lookup(base)) {
314 const char *s = d->name.name + d->name.len - rem;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100315 const char *next = strchrnul(s, '/');
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100316 size_t thislen = next - s;
317 bool end = !next[0];
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100318
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100319 /* Verify we did not go off the rails */
320 if (WARN_ON(s[-1] != '/'))
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100321 return -EIO;
322
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100323 err = ovl_lookup_single(base, d, s, thislen,
Chengguang Xu1434a652020-05-26 09:35:57 +0800324 d->name.len - rem, next, &base,
325 drop_negative);
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100326 dput(dentry);
327 if (err)
328 return err;
329 dentry = base;
Amir Goldstein4c7d0c92017-01-18 15:19:54 +0100330 if (end)
331 break;
332
333 rem -= thislen + 1;
334
335 if (WARN_ON(rem >= d->name.len))
336 return -EIO;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100337 }
338 *ret = dentry;
339 return 0;
Miklos Szeredie28edc42016-12-16 11:02:56 +0100340}
341
Amir Goldsteina9d01952017-04-30 14:46:31 +0300342
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200343int ovl_check_origin_fh(struct ovl_fs *ofs, struct ovl_fh *fh, bool connected,
Amir Goldsteinf9418662018-01-19 21:33:44 +0200344 struct dentry *upperdentry, struct ovl_path **stackp)
Amir Goldsteina9d01952017-04-30 14:46:31 +0300345{
Amir Goldsteinf7d3dac2017-06-21 15:28:34 +0300346 struct dentry *origin = NULL;
347 int i;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300348
Amir Goldstein94375f92019-11-15 14:12:40 +0200349 for (i = 1; i < ofs->numlayer; i++) {
Amir Goldstein7e63c872019-11-14 22:28:41 +0200350 /*
351 * If lower fs uuid is not unique among lower fs we cannot match
352 * fh->uuid to layer.
353 */
Amir Goldstein94375f92019-11-15 14:12:40 +0200354 if (ofs->layers[i].fsid &&
355 ofs->layers[i].fs->bad_uuid)
Amir Goldstein7e63c872019-11-14 22:28:41 +0200356 continue;
357
Amir Goldstein94375f92019-11-15 14:12:40 +0200358 origin = ovl_decode_real_fh(fh, ofs->layers[i].mnt,
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200359 connected);
Amir Goldsteinf7d3dac2017-06-21 15:28:34 +0300360 if (origin)
361 break;
362 }
363
364 if (!origin)
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300365 return -ESTALE;
366 else if (IS_ERR(origin))
367 return PTR_ERR(origin);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300368
Amir Goldsteinf9418662018-01-19 21:33:44 +0200369 if (upperdentry && !ovl_is_whiteout(upperdentry) &&
Al Viro40ba4332021-03-01 20:37:10 -0500370 inode_wrong_type(d_inode(upperdentry), d_inode(origin)->i_mode))
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300371 goto invalid;
372
Amir Goldstein415543d2017-06-21 15:28:42 +0300373 if (!*stackp)
Chandan Rajendrab9343632017-07-24 01:57:54 -0500374 *stackp = kmalloc(sizeof(struct ovl_path), GFP_KERNEL);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300375 if (!*stackp) {
376 dput(origin);
377 return -ENOMEM;
378 }
Amir Goldstein1eff1a12017-12-12 22:40:46 +0200379 **stackp = (struct ovl_path){
380 .dentry = origin,
Amir Goldstein94375f92019-11-15 14:12:40 +0200381 .layer = &ofs->layers[i]
Amir Goldstein1eff1a12017-12-12 22:40:46 +0200382 };
Amir Goldsteina9d01952017-04-30 14:46:31 +0300383
384 return 0;
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300385
386invalid:
lijiazi1bd0a3a2019-12-16 19:12:32 +0800387 pr_warn_ratelimited("invalid origin (%pd2, ftype=%x, origin ftype=%x).\n",
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300388 upperdentry, d_inode(upperdentry)->i_mode & S_IFMT,
389 d_inode(origin)->i_mode & S_IFMT);
390 dput(origin);
391 return -EIO;
392}
393
Amir Goldstein1eff1a12017-12-12 22:40:46 +0200394static int ovl_check_origin(struct ovl_fs *ofs, struct dentry *upperdentry,
youngjund78a0dc2020-06-21 05:50:01 -0700395 struct ovl_path **stackp)
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300396{
Miklos Szeredi610afc02020-09-02 10:58:49 +0200397 struct ovl_fh *fh = ovl_get_fh(ofs, upperdentry, OVL_XATTR_ORIGIN);
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300398 int err;
399
400 if (IS_ERR_OR_NULL(fh))
401 return PTR_ERR(fh);
402
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200403 err = ovl_check_origin_fh(ofs, fh, false, upperdentry, stackp);
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300404 kfree(fh);
405
406 if (err) {
407 if (err == -ESTALE)
408 return 0;
409 return err;
410 }
411
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300412 return 0;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300413}
414
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100415/*
Amir Goldstein05122442018-01-11 08:25:32 +0200416 * Verify that @fh matches the file handle stored in xattr @name.
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300417 * Return 0 on match, -ESTALE on mismatch, < 0 on error.
418 */
Miklos Szeredi610afc02020-09-02 10:58:49 +0200419static int ovl_verify_fh(struct ovl_fs *ofs, struct dentry *dentry,
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200420 enum ovl_xattr ox, const struct ovl_fh *fh)
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300421{
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200422 struct ovl_fh *ofh = ovl_get_fh(ofs, dentry, ox);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300423 int err = 0;
424
425 if (!ofh)
426 return -ENODATA;
427
428 if (IS_ERR(ofh))
429 return PTR_ERR(ofh);
430
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200431 if (fh->fb.len != ofh->fb.len || memcmp(&fh->fb, &ofh->fb, fh->fb.len))
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300432 err = -ESTALE;
433
434 kfree(ofh);
435 return err;
436}
437
438/*
Amir Goldstein05122442018-01-11 08:25:32 +0200439 * Verify that @real dentry matches the file handle stored in xattr @name.
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300440 *
Amir Goldstein05122442018-01-11 08:25:32 +0200441 * If @set is true and there is no stored file handle, encode @real and store
442 * file handle in xattr @name.
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300443 *
Amir Goldstein05122442018-01-11 08:25:32 +0200444 * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300445 */
Miklos Szeredi610afc02020-09-02 10:58:49 +0200446int ovl_verify_set_fh(struct ovl_fs *ofs, struct dentry *dentry,
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200447 enum ovl_xattr ox, struct dentry *real, bool is_upper,
Miklos Szeredi610afc02020-09-02 10:58:49 +0200448 bool set)
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300449{
450 struct inode *inode;
451 struct ovl_fh *fh;
452 int err;
453
Amir Goldstein5b2cccd2018-02-02 10:42:03 +0200454 fh = ovl_encode_real_fh(real, is_upper);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300455 err = PTR_ERR(fh);
Amir Goldsteinbabf4772018-10-10 19:10:06 +0300456 if (IS_ERR(fh)) {
457 fh = NULL;
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300458 goto fail;
Amir Goldsteinbabf4772018-10-10 19:10:06 +0300459 }
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300460
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200461 err = ovl_verify_fh(ofs, dentry, ox, fh);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300462 if (set && err == -ENODATA)
Miklos Szeredi43d193f2020-09-02 10:58:49 +0200463 err = ovl_do_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300464 if (err)
465 goto fail;
466
467out:
468 kfree(fh);
469 return err;
470
471fail:
Amir Goldstein05122442018-01-11 08:25:32 +0200472 inode = d_inode(real);
lijiazi1bd0a3a2019-12-16 19:12:32 +0800473 pr_warn_ratelimited("failed to verify %s (%pd2, ino=%lu, err=%i)\n",
Amir Goldstein05122442018-01-11 08:25:32 +0200474 is_upper ? "upper" : "origin", real,
475 inode ? inode->i_ino : 0, err);
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300476 goto out;
477}
478
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200479/* Get upper dentry from index */
Amir Goldstein3b0bfc62017-12-24 18:42:16 +0200480struct dentry *ovl_index_upper(struct ovl_fs *ofs, struct dentry *index)
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200481{
482 struct ovl_fh *fh;
483 struct dentry *upper;
484
485 if (!d_is_dir(index))
486 return dget(index);
487
Miklos Szeredi610afc02020-09-02 10:58:49 +0200488 fh = ovl_get_fh(ofs, index, OVL_XATTR_UPPER);
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200489 if (IS_ERR_OR_NULL(fh))
490 return ERR_CAST(fh);
491
Miklos Szeredi08f4c7c2020-06-04 10:48:19 +0200492 upper = ovl_decode_real_fh(fh, ovl_upper_mnt(ofs), true);
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200493 kfree(fh);
494
495 if (IS_ERR_OR_NULL(upper))
496 return upper ?: ERR_PTR(-ESTALE);
497
498 if (!d_is_dir(upper)) {
lijiazi1bd0a3a2019-12-16 19:12:32 +0800499 pr_warn_ratelimited("invalid index upper (%pd2, upper=%pd2).\n",
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200500 index, upper);
501 dput(upper);
502 return ERR_PTR(-EIO);
503 }
504
505 return upper;
506}
507
Amir Goldstein8b88a2e2017-06-21 15:28:37 +0300508/*
Amir Goldstein415543d2017-06-21 15:28:42 +0300509 * Verify that an index entry name matches the origin file handle stored in
510 * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path.
511 * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error.
512 */
Amir Goldstein1eff1a12017-12-12 22:40:46 +0200513int ovl_verify_index(struct ovl_fs *ofs, struct dentry *index)
Amir Goldstein415543d2017-06-21 15:28:42 +0300514{
515 struct ovl_fh *fh = NULL;
516 size_t len;
Chandan Rajendrab9343632017-07-24 01:57:54 -0500517 struct ovl_path origin = { };
518 struct ovl_path *stack = &origin;
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200519 struct dentry *upper = NULL;
Amir Goldstein415543d2017-06-21 15:28:42 +0300520 int err;
521
522 if (!d_inode(index))
523 return 0;
524
Amir Goldsteinfa0096e2017-10-24 12:24:11 +0300525 err = -EINVAL;
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200526 if (index->d_name.len < sizeof(struct ovl_fb)*2)
Amir Goldstein415543d2017-06-21 15:28:42 +0300527 goto fail;
528
529 err = -ENOMEM;
530 len = index->d_name.len / 2;
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200531 fh = kzalloc(len + OVL_FH_WIRE_OFFSET, GFP_KERNEL);
Amir Goldstein415543d2017-06-21 15:28:42 +0300532 if (!fh)
533 goto fail;
534
535 err = -EINVAL;
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200536 if (hex2bin(fh->buf, index->d_name.name, len))
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300537 goto fail;
538
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200539 err = ovl_check_fb_len(&fh->fb, len);
Amir Goldstein2e1a53282017-10-24 15:12:15 +0300540 if (err)
Amir Goldstein415543d2017-06-21 15:28:42 +0300541 goto fail;
542
Amir Goldstein7db25d32018-01-11 11:03:13 +0200543 /*
544 * Whiteout index entries are used as an indication that an exported
545 * overlay file handle should be treated as stale (i.e. after unlink
546 * of the overlay inode). These entries contain no origin xattr.
547 */
548 if (ovl_is_whiteout(index))
549 goto out;
550
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200551 /*
552 * Verifying directory index entries are not stale is expensive, so
553 * only verify stale dir index if NFS export is enabled.
554 */
555 if (d_is_dir(index) && !ofs->config.nfs_export)
556 goto out;
557
558 /*
559 * Directory index entries should have 'upper' xattr pointing to the
560 * real upper dir. Non-dir index entries are hardlinks to the upper
561 * real inode. For non-dir index, we can read the copy up origin xattr
562 * directly from the index dentry, but for dir index we first need to
563 * decode the upper directory.
564 */
565 upper = ovl_index_upper(ofs, index);
566 if (IS_ERR_OR_NULL(upper)) {
567 err = PTR_ERR(upper);
Amir Goldstein24f0b172018-01-11 15:33:51 +0200568 /*
569 * Directory index entries with no 'upper' xattr need to be
570 * removed. When dir index entry has a stale 'upper' xattr,
571 * we assume that upper dir was removed and we treat the dir
572 * index as orphan entry that needs to be whited out.
573 */
574 if (err == -ESTALE)
575 goto orphan;
576 else if (!err)
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200577 err = -ESTALE;
578 goto fail;
579 }
580
Miklos Szeredi610afc02020-09-02 10:58:49 +0200581 err = ovl_verify_fh(ofs, upper, OVL_XATTR_ORIGIN, fh);
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200582 dput(upper);
Amir Goldstein415543d2017-06-21 15:28:42 +0300583 if (err)
584 goto fail;
585
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200586 /* Check if non-dir index is orphan and don't warn before cleaning it */
587 if (!d_is_dir(index) && d_inode(index)->i_nlink == 1) {
Amir Goldstein8a22efa2018-03-09 15:51:02 +0200588 err = ovl_check_origin_fh(ofs, fh, false, index, &stack);
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200589 if (err)
590 goto fail;
Amir Goldstein415543d2017-06-21 15:28:42 +0300591
Miklos Szeredi610afc02020-09-02 10:58:49 +0200592 if (ovl_get_nlink(ofs, origin.dentry, index, 0) == 0)
Amir Goldstein24f0b172018-01-11 15:33:51 +0200593 goto orphan;
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200594 }
Amir Goldsteincaf70cb2017-06-21 13:46:12 +0300595
Amir Goldstein415543d2017-06-21 15:28:42 +0300596out:
Amir Goldsteine8f9e5b2018-01-11 11:33:24 +0200597 dput(origin.dentry);
Amir Goldstein415543d2017-06-21 15:28:42 +0300598 kfree(fh);
599 return err;
600
601fail:
lijiazi1bd0a3a2019-12-16 19:12:32 +0800602 pr_warn_ratelimited("failed to verify index (%pd2, ftype=%x, err=%i)\n",
Amir Goldstein61b67472017-07-18 21:07:42 +0300603 index, d_inode(index)->i_mode & S_IFMT, err);
Amir Goldstein415543d2017-06-21 15:28:42 +0300604 goto out;
Amir Goldstein24f0b172018-01-11 15:33:51 +0200605
606orphan:
lijiazi1bd0a3a2019-12-16 19:12:32 +0800607 pr_warn_ratelimited("orphan index entry (%pd2, ftype=%x, nlink=%u)\n",
Amir Goldstein24f0b172018-01-11 15:33:51 +0200608 index, d_inode(index)->i_mode & S_IFMT,
609 d_inode(index)->i_nlink);
610 err = -ENOENT;
611 goto out;
Amir Goldstein415543d2017-06-21 15:28:42 +0300612}
613
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200614static int ovl_get_index_name_fh(struct ovl_fh *fh, struct qstr *name)
615{
616 char *n, *s;
617
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200618 n = kcalloc(fh->fb.len, 2, GFP_KERNEL);
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200619 if (!n)
620 return -ENOMEM;
621
Amir Goldsteincbe7fba2019-11-15 13:33:03 +0200622 s = bin2hex(n, fh->buf, fh->fb.len);
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200623 *name = (struct qstr) QSTR_INIT(n, s - n);
624
625 return 0;
626
627}
628
Amir Goldstein415543d2017-06-21 15:28:42 +0300629/*
Amir Goldstein359f3922017-06-21 15:28:41 +0300630 * Lookup in indexdir for the index entry of a lower real inode or a copy up
631 * origin inode. The index entry name is the hex representation of the lower
632 * inode file handle.
633 *
634 * If the index dentry in negative, then either no lower aliases have been
635 * copied up yet, or aliases have been copied up in older kernels and are
636 * not indexed.
637 *
638 * If the index dentry for a copy up origin inode is positive, but points
639 * to an inode different than the upper inode, then either the upper inode
640 * has been copied up and not indexed or it was indexed, but since then
641 * index dir was cleared. Either way, that index cannot be used to indentify
642 * the overlay inode.
643 */
644int ovl_get_index_name(struct dentry *origin, struct qstr *name)
645{
Amir Goldstein359f3922017-06-21 15:28:41 +0300646 struct ovl_fh *fh;
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200647 int err;
Amir Goldstein359f3922017-06-21 15:28:41 +0300648
Amir Goldstein5b2cccd2018-02-02 10:42:03 +0200649 fh = ovl_encode_real_fh(origin, false);
Amir Goldstein359f3922017-06-21 15:28:41 +0300650 if (IS_ERR(fh))
651 return PTR_ERR(fh);
652
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200653 err = ovl_get_index_name_fh(fh, name);
654
Amir Goldstein359f3922017-06-21 15:28:41 +0300655 kfree(fh);
Amir Goldstein359f3922017-06-21 15:28:41 +0300656 return err;
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200657}
Amir Goldstein359f3922017-06-21 15:28:41 +0300658
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200659/* Lookup index by file handle for NFS export */
660struct dentry *ovl_get_index_fh(struct ovl_fs *ofs, struct ovl_fh *fh)
661{
662 struct dentry *index;
663 struct qstr name;
664 int err;
665
666 err = ovl_get_index_name_fh(fh, &name);
667 if (err)
668 return ERR_PTR(err);
669
Al Viro6c2d47982019-10-31 01:21:58 -0400670 index = lookup_positive_unlocked(name.name, ofs->indexdir, name.len);
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200671 kfree(name.name);
672 if (IS_ERR(index)) {
673 if (PTR_ERR(index) == -ENOENT)
674 index = NULL;
675 return index;
676 }
677
Al Viro6c2d47982019-10-31 01:21:58 -0400678 if (ovl_is_whiteout(index))
Amir Goldstein91ffe7b2017-12-28 20:23:05 +0200679 err = -ESTALE;
680 else if (ovl_dentry_weird(index))
681 err = -EIO;
682 else
683 return index;
684
685 dput(index);
686 return ERR_PTR(err);
Amir Goldstein359f3922017-06-21 15:28:41 +0300687}
688
Amir Goldstein06170152018-01-17 14:40:27 +0200689struct dentry *ovl_lookup_index(struct ovl_fs *ofs, struct dentry *upper,
690 struct dentry *origin, bool verify)
Amir Goldstein359f3922017-06-21 15:28:41 +0300691{
Amir Goldstein359f3922017-06-21 15:28:41 +0300692 struct dentry *index;
693 struct inode *inode;
694 struct qstr name;
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200695 bool is_dir = d_is_dir(origin);
Amir Goldstein359f3922017-06-21 15:28:41 +0300696 int err;
697
698 err = ovl_get_index_name(origin, &name);
699 if (err)
700 return ERR_PTR(err);
701
Al Viro6c2d47982019-10-31 01:21:58 -0400702 index = lookup_positive_unlocked(name.name, ofs->indexdir, name.len);
Amir Goldstein359f3922017-06-21 15:28:41 +0300703 if (IS_ERR(index)) {
Amir Goldsteine0082a02017-09-24 13:01:35 +0300704 err = PTR_ERR(index);
Amir Goldstein7937a562017-10-20 17:19:06 +0300705 if (err == -ENOENT) {
706 index = NULL;
707 goto out;
708 }
lijiazi1bd0a3a2019-12-16 19:12:32 +0800709 pr_warn_ratelimited("failed inode index lookup (ino=%lu, key=%.*s, err=%i);\n"
Amir Goldstein359f3922017-06-21 15:28:41 +0300710 "overlayfs: mount with '-o index=off' to disable inodes index.\n",
711 d_inode(origin)->i_ino, name.len, name.name,
712 err);
713 goto out;
714 }
715
Amir Goldstein0e082552017-07-18 21:07:43 +0300716 inode = d_inode(index);
Al Viro6c2d47982019-10-31 01:21:58 -0400717 if (ovl_is_whiteout(index) && !verify) {
Amir Goldstein06170152018-01-17 14:40:27 +0200718 /*
719 * When index lookup is called with !verify for decoding an
720 * overlay file handle, a whiteout index implies that decode
721 * should treat file handle as stale and no need to print a
722 * warning about it.
723 */
724 dput(index);
725 index = ERR_PTR(-ESTALE);
726 goto out;
Amir Goldstein0e082552017-07-18 21:07:43 +0300727 } else if (ovl_dentry_weird(index) || ovl_is_whiteout(index) ||
Al Viro40ba4332021-03-01 20:37:10 -0500728 inode_wrong_type(inode, d_inode(origin)->i_mode)) {
Amir Goldstein0e082552017-07-18 21:07:43 +0300729 /*
730 * Index should always be of the same file type as origin
731 * except for the case of a whiteout index. A whiteout
732 * index should only exist if all lower aliases have been
733 * unlinked, which means that finding a lower origin on lookup
734 * whose index is a whiteout should be treated as an error.
735 */
lijiazi1bd0a3a2019-12-16 19:12:32 +0800736 pr_warn_ratelimited("bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n",
Amir Goldstein0e082552017-07-18 21:07:43 +0300737 index, d_inode(index)->i_mode & S_IFMT,
738 d_inode(origin)->i_mode & S_IFMT);
Amir Goldstein359f3922017-06-21 15:28:41 +0300739 goto fail;
Amir Goldstein06170152018-01-17 14:40:27 +0200740 } else if (is_dir && verify) {
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200741 if (!upper) {
lijiazi1bd0a3a2019-12-16 19:12:32 +0800742 pr_warn_ratelimited("suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n",
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200743 origin, index);
744 goto fail;
745 }
Amir Goldstein359f3922017-06-21 15:28:41 +0300746
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200747 /* Verify that dir index 'upper' xattr points to upper dir */
Miklos Szeredi610afc02020-09-02 10:58:49 +0200748 err = ovl_verify_upper(ofs, index, upper, false);
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200749 if (err) {
750 if (err == -ESTALE) {
lijiazi1bd0a3a2019-12-16 19:12:32 +0800751 pr_warn_ratelimited("suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2).\n",
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200752 upper, origin, index);
753 }
754 goto fail;
755 }
756 } else if (upper && d_inode(upper) != inode) {
757 goto out_dput;
758 }
Amir Goldstein359f3922017-06-21 15:28:41 +0300759out:
760 kfree(name.name);
761 return index;
762
Amir Goldstein6eaf0112017-10-12 19:03:04 +0300763out_dput:
764 dput(index);
765 index = NULL;
766 goto out;
767
Amir Goldstein359f3922017-06-21 15:28:41 +0300768fail:
769 dput(index);
770 index = ERR_PTR(-EIO);
771 goto out;
772}
773
774/*
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100775 * Returns next layer in stack starting from top.
776 * Returns -1 if this is the last layer.
777 */
778int ovl_path_next(int idx, struct dentry *dentry, struct path *path)
779{
780 struct ovl_entry *oe = dentry->d_fsdata;
781
782 BUG_ON(idx < 0);
783 if (idx == 0) {
784 ovl_path_upper(dentry, path);
785 if (path->dentry)
786 return oe->numlower ? 1 : -1;
787 idx++;
788 }
789 BUG_ON(idx > oe->numlower);
Chandan Rajendrab9343632017-07-24 01:57:54 -0500790 path->dentry = oe->lowerstack[idx - 1].dentry;
791 path->mnt = oe->lowerstack[idx - 1].layer->mnt;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100792
793 return (idx < oe->numlower) ? idx + 1 : -1;
794}
795
Amir Goldstein9678e632018-01-03 19:34:45 +0200796/* Fix missing 'origin' xattr */
Miklos Szeredi610afc02020-09-02 10:58:49 +0200797static int ovl_fix_origin(struct ovl_fs *ofs, struct dentry *dentry,
798 struct dentry *lower, struct dentry *upper)
Amir Goldstein9678e632018-01-03 19:34:45 +0200799{
800 int err;
801
Miklos Szeredi610afc02020-09-02 10:58:49 +0200802 if (ovl_check_origin_xattr(ofs, upper))
Amir Goldstein9678e632018-01-03 19:34:45 +0200803 return 0;
804
805 err = ovl_want_write(dentry);
806 if (err)
807 return err;
808
809 err = ovl_set_origin(dentry, lower, upper);
810 if (!err)
811 err = ovl_set_impure(dentry->d_parent, upper->d_parent);
812
813 ovl_drop_write(dentry);
814 return err;
815}
816
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100817struct dentry *ovl_lookup(struct inode *dir, struct dentry *dentry,
818 unsigned int flags)
819{
820 struct ovl_entry *oe;
821 const struct cred *old_cred;
Miklos Szeredi6b2d5fe2016-12-16 11:02:56 +0100822 struct ovl_fs *ofs = dentry->d_sb->s_fs_info;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100823 struct ovl_entry *poe = dentry->d_parent->d_fsdata;
Amir Goldsteinc22205d2017-04-26 23:40:52 +0300824 struct ovl_entry *roe = dentry->d_sb->s_root->d_fsdata;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400825 struct ovl_path *stack = NULL, *origin_path = NULL;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100826 struct dentry *upperdir, *upperdentry = NULL;
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200827 struct dentry *origin = NULL;
Amir Goldstein359f3922017-06-21 15:28:41 +0300828 struct dentry *index = NULL;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100829 unsigned int ctr = 0;
830 struct inode *inode = NULL;
831 bool upperopaque = false;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100832 char *upperredirect = NULL;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100833 struct dentry *this;
834 unsigned int i;
835 int err;
Vivek Goyal6815f472020-06-01 11:56:51 -0400836 bool uppermetacopy = false;
Miklos Szeredie28edc42016-12-16 11:02:56 +0100837 struct ovl_lookup_data d = {
Amir Goldstein146d62e2019-04-18 17:42:08 +0300838 .sb = dentry->d_sb,
Miklos Szeredie28edc42016-12-16 11:02:56 +0100839 .name = dentry->d_name,
840 .is_dir = false,
841 .opaque = false,
842 .stop = false,
Vivek Goyal452061f2018-03-09 15:44:41 -0500843 .last = ofs->config.redirect_follow ? false : !poe->numlower,
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100844 .redirect = NULL,
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400845 .metacopy = false,
Miklos Szeredie28edc42016-12-16 11:02:56 +0100846 };
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100847
Miklos Szeredi6b2d5fe2016-12-16 11:02:56 +0100848 if (dentry->d_name.len > ofs->namelen)
849 return ERR_PTR(-ENAMETOOLONG);
850
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100851 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredi09d8b582017-07-04 22:03:16 +0200852 upperdir = ovl_dentry_upper(dentry->d_parent);
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100853 if (upperdir) {
Chengguang Xu1434a652020-05-26 09:35:57 +0800854 err = ovl_lookup_layer(upperdir, &d, &upperdentry, true);
Miklos Szeredie28edc42016-12-16 11:02:56 +0100855 if (err)
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100856 goto out;
857
Miklos Szeredibccece12020-03-17 15:04:22 +0100858 if (upperdentry && upperdentry->d_flags & DCACHE_OP_REAL) {
Miklos Szeredie28edc42016-12-16 11:02:56 +0100859 dput(upperdentry);
860 err = -EREMOTE;
861 goto out;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100862 }
Amir Goldsteina9d01952017-04-30 14:46:31 +0300863 if (upperdentry && !d.is_dir) {
Amir Goldsteinf7d3dac2017-06-21 15:28:34 +0300864 /*
865 * Lookup copy up origin by decoding origin file handle.
866 * We may get a disconnected dentry, which is fine,
867 * because we only need to hold the origin inode in
868 * cache and use its inode number. We may even get a
869 * connected dentry, that is not under any of the lower
870 * layers root. That is also fine for using it's inode
871 * number - it's the same as if we held a reference
872 * to a dentry in lower layer that was moved under us.
873 */
youngjund78a0dc2020-06-21 05:50:01 -0700874 err = ovl_check_origin(ofs, upperdentry, &origin_path);
Amir Goldsteina9d01952017-04-30 14:46:31 +0300875 if (err)
Vivek Goyal5455f922017-11-01 15:37:22 -0400876 goto out_put_upper;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400877
878 if (d.metacopy)
Vivek Goyal6815f472020-06-01 11:56:51 -0400879 uppermetacopy = true;
Amir Goldsteina9d01952017-04-30 14:46:31 +0300880 }
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100881
882 if (d.redirect) {
Dan Carpenter0ce5cdc2017-09-22 23:45:18 +0300883 err = -ENOMEM;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100884 upperredirect = kstrdup(d.redirect, GFP_KERNEL);
885 if (!upperredirect)
886 goto out_put_upper;
887 if (d.redirect[0] == '/')
Amir Goldsteinc22205d2017-04-26 23:40:52 +0300888 poe = roe;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100889 }
Miklos Szeredie28edc42016-12-16 11:02:56 +0100890 upperopaque = d.opaque;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100891 }
892
Miklos Szeredie28edc42016-12-16 11:02:56 +0100893 if (!d.stop && poe->numlower) {
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100894 err = -ENOMEM;
Amir Goldstein94375f92019-11-15 14:12:40 +0200895 stack = kcalloc(ofs->numlayer - 1, sizeof(struct ovl_path),
Michal Hocko0ee931c2017-09-13 16:28:29 -0700896 GFP_KERNEL);
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100897 if (!stack)
898 goto out_put_upper;
899 }
900
Miklos Szeredie28edc42016-12-16 11:02:56 +0100901 for (i = 0; !d.stop && i < poe->numlower; i++) {
Chandan Rajendrab9343632017-07-24 01:57:54 -0500902 struct ovl_path lower = poe->lowerstack[i];
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100903
Vivek Goyal452061f2018-03-09 15:44:41 -0500904 if (!ofs->config.redirect_follow)
905 d.last = i == poe->numlower - 1;
906 else
907 d.last = lower.layer->idx == roe->numlower;
908
Chengguang Xu1434a652020-05-26 09:35:57 +0800909 err = ovl_lookup_layer(lower.dentry, &d, &this, false);
Miklos Szeredie28edc42016-12-16 11:02:56 +0100910 if (err)
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100911 goto out_put;
Miklos Szeredi6b2d5fe2016-12-16 11:02:56 +0100912
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100913 if (!this)
914 continue;
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100915
Vivek Goyal6815f472020-06-01 11:56:51 -0400916 if ((uppermetacopy || d.metacopy) && !ofs->config.metacopy) {
Mickaël Salaün71d58452021-03-29 18:49:07 +0200917 dput(this);
Vivek Goyal6815f472020-06-01 11:56:51 -0400918 err = -EPERM;
919 pr_warn_ratelimited("refusing to follow metacopy origin for (%pd2)\n", dentry);
920 goto out_put;
921 }
922
Amir Goldstein9678e632018-01-03 19:34:45 +0200923 /*
924 * If no origin fh is stored in upper of a merge dir, store fh
925 * of lower dir and set upper parent "impure".
926 */
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400927 if (upperdentry && !ctr && !ofs->noxattr && d.is_dir) {
Miklos Szeredi610afc02020-09-02 10:58:49 +0200928 err = ovl_fix_origin(ofs, dentry, this, upperdentry);
Amir Goldstein9678e632018-01-03 19:34:45 +0200929 if (err) {
930 dput(this);
931 goto out_put;
932 }
933 }
934
Amir Goldstein37b129162018-01-10 22:29:38 +0200935 /*
936 * When "verify_lower" feature is enabled, do not merge with a
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200937 * lower dir that does not match a stored origin xattr. In any
938 * case, only verified origin is used for index lookup.
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400939 *
940 * For non-dir dentry, if index=on, then ensure origin
941 * matches the dentry found using path based lookup,
942 * otherwise error out.
Amir Goldstein37b129162018-01-10 22:29:38 +0200943 */
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400944 if (upperdentry && !ctr &&
945 ((d.is_dir && ovl_verify_lower(dentry->d_sb)) ||
946 (!d.is_dir && ofs->config.index && origin_path))) {
Miklos Szeredi610afc02020-09-02 10:58:49 +0200947 err = ovl_verify_origin(ofs, upperdentry, this, false);
Amir Goldstein37b129162018-01-10 22:29:38 +0200948 if (err) {
949 dput(this);
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400950 if (d.is_dir)
951 break;
952 goto out_put;
Amir Goldstein37b129162018-01-10 22:29:38 +0200953 }
Amir Goldsteinad1d6152018-01-11 10:47:03 +0200954 origin = this;
Amir Goldstein37b129162018-01-10 22:29:38 +0200955 }
956
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400957 if (d.metacopy && ctr) {
Vivek Goyal21d8d662020-06-02 11:23:38 -0400958 /*
959 * Do not store intermediate metacopy dentries in
960 * lower chain, except top most lower metacopy dentry.
961 * Continue the loop so that if there is an absolute
962 * redirect on this dentry, poe can be reset to roe.
963 */
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400964 dput(this);
Vivek Goyal21d8d662020-06-02 11:23:38 -0400965 this = NULL;
966 } else {
967 stack[ctr].dentry = this;
968 stack[ctr].layer = lower.layer;
969 ctr++;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -0400970 }
971
Miklos Szeredi438c84c2017-12-11 11:28:10 +0100972 /*
973 * Following redirects can have security consequences: it's like
974 * a symlink into the lower layer without the permission checks.
975 * This is only a problem if the upper layer is untrusted (e.g
976 * comes from an USB drive). This can allow a non-readable file
977 * or directory to become readable.
978 *
979 * Only following redirects when redirects are enabled disables
980 * this attack vector when not necessary.
981 */
982 err = -EPERM;
983 if (d.redirect && !ofs->config.redirect_follow) {
lijiazi1bd0a3a2019-12-16 19:12:32 +0800984 pr_warn_ratelimited("refusing to follow redirect for (%pd2)\n",
Amir Goldsteinf8167812017-12-18 14:25:56 +0200985 dentry);
Miklos Szeredi438c84c2017-12-11 11:28:10 +0100986 goto out_put;
987 }
988
Vivek Goyald1fe96c2018-02-02 10:23:24 -0500989 if (d.stop)
990 break;
991
Amir Goldsteinc22205d2017-04-26 23:40:52 +0300992 if (d.redirect && d.redirect[0] == '/' && poe != roe) {
993 poe = roe;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100994 /* Find the current layer on the root dentry */
Amir Goldsteind583ed72017-11-08 19:23:36 +0200995 i = lower.layer->idx - 1;
Miklos Szeredi02b69b22016-12-16 11:02:56 +0100996 }
Miklos Szeredibbb1e542016-12-16 11:02:56 +0100997 }
998
Vivek Goyal6815f472020-06-01 11:56:51 -0400999 /*
1000 * For regular non-metacopy upper dentries, there is no lower
1001 * path based lookup, hence ctr will be zero. If a dentry is found
1002 * using ORIGIN xattr on upper, install it in stack.
1003 *
1004 * For metacopy dentry, path based lookup will find lower dentries.
1005 * Just make sure a corresponding data dentry has been found.
1006 */
1007 if (d.metacopy || (uppermetacopy && !ctr)) {
1008 err = -EIO;
1009 goto out_put;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001010 } else if (!d.is_dir && upperdentry && !ctr && origin_path) {
1011 if (WARN_ON(stack != NULL)) {
1012 err = -EIO;
1013 goto out_put;
1014 }
1015 stack = origin_path;
1016 ctr = 1;
Vivek Goyal59fb2012020-06-01 11:56:50 -04001017 origin = origin_path->dentry;
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001018 origin_path = NULL;
1019 }
1020
Amir Goldsteinad1d6152018-01-11 10:47:03 +02001021 /*
Vivek Goyal59fb2012020-06-01 11:56:50 -04001022 * Always lookup index if there is no-upperdentry.
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001023 *
Vivek Goyal59fb2012020-06-01 11:56:50 -04001024 * For the case of upperdentry, we have set origin by now if it
1025 * needed to be set. There are basically three cases.
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001026 *
Vivek Goyal59fb2012020-06-01 11:56:50 -04001027 * For directories, lookup index by lower inode and verify it matches
1028 * upper inode. We only trust dir index if we verified that lower dir
1029 * matches origin, otherwise dir index entries may be inconsistent
1030 * and we ignore them.
1031 *
1032 * For regular upper, we already set origin if upper had ORIGIN
1033 * xattr. There is no verification though as there is no path
1034 * based dentry lookup in lower in this case.
1035 *
1036 * For metacopy upper, we set a verified origin already if index
1037 * is enabled and if upper had an ORIGIN xattr.
1038 *
Amir Goldsteinad1d6152018-01-11 10:47:03 +02001039 */
Vivek Goyal59fb2012020-06-01 11:56:50 -04001040 if (!upperdentry && ctr)
Amir Goldsteinad1d6152018-01-11 10:47:03 +02001041 origin = stack[0].dentry;
Amir Goldstein359f3922017-06-21 15:28:41 +03001042
Amir Goldsteinad1d6152018-01-11 10:47:03 +02001043 if (origin && ovl_indexdir(dentry->d_sb) &&
1044 (!d.is_dir || ovl_index_all(dentry->d_sb))) {
Amir Goldstein06170152018-01-17 14:40:27 +02001045 index = ovl_lookup_index(ofs, upperdentry, origin, true);
Amir Goldstein359f3922017-06-21 15:28:41 +03001046 if (IS_ERR(index)) {
1047 err = PTR_ERR(index);
1048 index = NULL;
1049 goto out_put;
1050 }
1051 }
1052
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001053 oe = ovl_alloc_entry(ctr);
1054 err = -ENOMEM;
1055 if (!oe)
1056 goto out_put;
1057
Chandan Rajendrab9343632017-07-24 01:57:54 -05001058 memcpy(oe->lowerstack, stack, sizeof(struct ovl_path) * ctr);
Miklos Szeredie6d2ebd2017-07-04 22:03:16 +02001059 dentry->d_fsdata = oe;
1060
Amir Goldsteinc62520a2018-01-14 19:25:31 +02001061 if (upperopaque)
1062 ovl_dentry_set_opaque(dentry);
1063
Miklos Szeredi55acc662017-07-04 22:03:18 +02001064 if (upperdentry)
1065 ovl_dentry_set_upper_alias(dentry);
Vivek Goyal0a2d0d32018-05-11 11:49:32 -04001066 else if (index) {
Amir Goldstein359f3922017-06-21 15:28:41 +03001067 upperdentry = dget(index);
Miklos Szeredi610afc02020-09-02 10:58:49 +02001068 upperredirect = ovl_get_redirect_xattr(ofs, upperdentry, 0);
Vivek Goyal0a2d0d32018-05-11 11:49:32 -04001069 if (IS_ERR(upperredirect)) {
1070 err = PTR_ERR(upperredirect);
1071 upperredirect = NULL;
1072 goto out_free_oe;
1073 }
Miklos Szeredi610afc02020-09-02 10:58:49 +02001074 err = ovl_check_metacopy_xattr(ofs, upperdentry);
Amir Goldstein4518dfc2020-07-15 16:38:08 +03001075 if (err < 0)
1076 goto out_free_oe;
1077 uppermetacopy = err;
Vivek Goyal0a2d0d32018-05-11 11:49:32 -04001078 }
Amir Goldstein359f3922017-06-21 15:28:41 +03001079
Miklos Szeredie6d2ebd2017-07-04 22:03:16 +02001080 if (upperdentry || ctr) {
Vivek Goyalac6a52e2018-05-08 09:27:21 -04001081 struct ovl_inode_params oip = {
1082 .upperdentry = upperdentry,
1083 .lowerpath = stack,
1084 .index = index,
1085 .numlower = ctr,
Vivek Goyal9cec54c2018-05-11 11:49:27 -04001086 .redirect = upperredirect,
Vivek Goyal2664bd02018-05-11 11:49:30 -04001087 .lowerdata = (ctr > 1 && !d.is_dir) ?
1088 stack[ctr - 1].dentry : NULL,
Vivek Goyalac6a52e2018-05-08 09:27:21 -04001089 };
1090
1091 inode = ovl_get_inode(dentry->d_sb, &oip);
Miklos Szeredib9ac5c272017-07-04 22:03:17 +02001092 err = PTR_ERR(inode);
1093 if (IS_ERR(inode))
Miklos Szeredie6d2ebd2017-07-04 22:03:16 +02001094 goto out_free_oe;
Vivek Goyal28166ab2020-06-01 11:56:52 -04001095 if (upperdentry && !uppermetacopy)
1096 ovl_set_flag(OVL_UPPERDATA, inode);
Miklos Szeredie6d2ebd2017-07-04 22:03:16 +02001097 }
1098
Miklos Szeredif4288842020-03-17 15:04:22 +01001099 ovl_dentry_update_reval(dentry, upperdentry,
1100 DCACHE_OP_REVALIDATE | DCACHE_OP_WEAK_REVALIDATE);
1101
Mark Salyzyn6120a4d2018-06-14 11:15:22 -07001102 ovl_revert_creds(dentry->d_sb, old_cred);
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001103 if (origin_path) {
1104 dput(origin_path->dentry);
1105 kfree(origin_path);
1106 }
Amir Goldstein359f3922017-06-21 15:28:41 +03001107 dput(index);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001108 kfree(stack);
Miklos Szeredi02b69b22016-12-16 11:02:56 +01001109 kfree(d.redirect);
Amir Goldstein829c28b2017-09-29 21:43:07 +03001110 return d_splice_alias(inode, dentry);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001111
1112out_free_oe:
Miklos Szeredie6d2ebd2017-07-04 22:03:16 +02001113 dentry->d_fsdata = NULL;
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001114 kfree(oe);
1115out_put:
Amir Goldstein359f3922017-06-21 15:28:41 +03001116 dput(index);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001117 for (i = 0; i < ctr; i++)
1118 dput(stack[i].dentry);
1119 kfree(stack);
1120out_put_upper:
Vivek Goyal9d3dfea2018-05-11 11:49:28 -04001121 if (origin_path) {
1122 dput(origin_path->dentry);
1123 kfree(origin_path);
1124 }
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001125 dput(upperdentry);
Miklos Szeredi02b69b22016-12-16 11:02:56 +01001126 kfree(upperredirect);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001127out:
Miklos Szeredi02b69b22016-12-16 11:02:56 +01001128 kfree(d.redirect);
Mark Salyzyn6120a4d2018-06-14 11:15:22 -07001129 ovl_revert_creds(dentry->d_sb, old_cred);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001130 return ERR_PTR(err);
1131}
1132
1133bool ovl_lower_positive(struct dentry *dentry)
1134{
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001135 struct ovl_entry *poe = dentry->d_parent->d_fsdata;
1136 const struct qstr *name = &dentry->d_name;
Amir Goldstein6d0a8a92017-11-10 13:18:07 +02001137 const struct cred *old_cred;
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001138 unsigned int i;
1139 bool positive = false;
1140 bool done = false;
1141
1142 /*
1143 * If dentry is negative, then lower is positive iff this is a
1144 * whiteout.
1145 */
1146 if (!dentry->d_inode)
Amir Goldsteinc62520a2018-01-14 19:25:31 +02001147 return ovl_dentry_is_opaque(dentry);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001148
1149 /* Negative upper -> positive lower */
Miklos Szeredi09d8b582017-07-04 22:03:16 +02001150 if (!ovl_dentry_upper(dentry))
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001151 return true;
1152
Amir Goldstein6d0a8a92017-11-10 13:18:07 +02001153 old_cred = ovl_override_creds(dentry->d_sb);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001154 /* Positive upper -> have to look up lower to see whether it exists */
1155 for (i = 0; !done && !positive && i < poe->numlower; i++) {
1156 struct dentry *this;
1157 struct dentry *lowerdir = poe->lowerstack[i].dentry;
1158
Al Viro6c2d47982019-10-31 01:21:58 -04001159 this = lookup_positive_unlocked(name->name, lowerdir,
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001160 name->len);
1161 if (IS_ERR(this)) {
1162 switch (PTR_ERR(this)) {
1163 case -ENOENT:
1164 case -ENAMETOOLONG:
1165 break;
1166
1167 default:
1168 /*
1169 * Assume something is there, we just couldn't
1170 * access it.
1171 */
1172 positive = true;
1173 break;
1174 }
1175 } else {
Al Viro6c2d47982019-10-31 01:21:58 -04001176 positive = !ovl_is_whiteout(this);
1177 done = true;
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001178 dput(this);
1179 }
1180 }
Mark Salyzyn6120a4d2018-06-14 11:15:22 -07001181 ovl_revert_creds(dentry->d_sb, old_cred);
Miklos Szeredibbb1e542016-12-16 11:02:56 +01001182
1183 return positive;
1184}