blob: 7b5357a4606bf6310c0a27b65fb2e733e78f534d [file] [log] [blame]
xjb04a4022021-11-25 15:01:52 +08001/*
2 *
3 * Copyright (C) 2011 Novell Inc.
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 as published by
7 * the Free Software Foundation.
8 */
9
10#include <linux/fs.h>
11#include <linux/namei.h>
12#include <linux/xattr.h>
13#include <linux/security.h>
14#include <linux/cred.h>
15#include <linux/module.h>
16#include <linux/posix_acl.h>
17#include <linux/posix_acl_xattr.h>
18#include <linux/atomic.h>
19#include <linux/ratelimit.h>
20#include "overlayfs.h"
21
22static unsigned short ovl_redirect_max = 256;
23module_param_named(redirect_max, ovl_redirect_max, ushort, 0644);
24MODULE_PARM_DESC(ovl_redirect_max,
25 "Maximum length of absolute redirect xattr value");
26
27static int ovl_set_redirect(struct dentry *dentry, bool samedir);
28
29int ovl_cleanup(struct inode *wdir, struct dentry *wdentry)
30{
31 int err;
32
33 dget(wdentry);
34 if (d_is_dir(wdentry))
35 err = ovl_do_rmdir(wdir, wdentry);
36 else
37 err = ovl_do_unlink(wdir, wdentry);
38 dput(wdentry);
39
40 if (err) {
41 pr_err("overlayfs: cleanup of '%pd2' failed (%i)\n",
42 wdentry, err);
43 }
44
45 return err;
46}
47
48static struct dentry *ovl_lookup_temp(struct dentry *workdir)
49{
50 struct dentry *temp;
51 char name[20];
52 static atomic_t temp_id = ATOMIC_INIT(0);
53
54 /* counter is allowed to wrap, since temp dentries are ephemeral */
55 snprintf(name, sizeof(name), "#%x", atomic_inc_return(&temp_id));
56
57 temp = lookup_one_len(name, workdir, strlen(name));
58 if (!IS_ERR(temp) && temp->d_inode) {
59 pr_err("overlayfs: workdir/%s already exists\n", name);
60 dput(temp);
61 temp = ERR_PTR(-EIO);
62 }
63
64 return temp;
65}
66
67/* caller holds i_mutex on workdir */
68static struct dentry *ovl_whiteout(struct dentry *workdir)
69{
70 int err;
71 struct dentry *whiteout;
72 struct inode *wdir = workdir->d_inode;
73
74 whiteout = ovl_lookup_temp(workdir);
75 if (IS_ERR(whiteout))
76 return whiteout;
77
78 err = ovl_do_whiteout(wdir, whiteout);
79 if (err) {
80 dput(whiteout);
81 whiteout = ERR_PTR(err);
82 }
83
84 return whiteout;
85}
86
87/* Caller must hold i_mutex on both workdir and dir */
88int ovl_cleanup_and_whiteout(struct dentry *workdir, struct inode *dir,
89 struct dentry *dentry)
90{
91 struct inode *wdir = workdir->d_inode;
92 struct dentry *whiteout;
93 int err;
94 int flags = 0;
95
96 whiteout = ovl_whiteout(workdir);
97 err = PTR_ERR(whiteout);
98 if (IS_ERR(whiteout))
99 return err;
100
101 if (d_is_dir(dentry))
102 flags = RENAME_EXCHANGE;
103
104 err = ovl_do_rename(wdir, whiteout, dir, dentry, flags);
105 if (err)
106 goto kill_whiteout;
107 if (flags)
108 ovl_cleanup(wdir, dentry);
109
110out:
111 dput(whiteout);
112 return err;
113
114kill_whiteout:
115 ovl_cleanup(wdir, whiteout);
116 goto out;
117}
118
119static int ovl_mkdir_real(struct inode *dir, struct dentry **newdentry,
120 umode_t mode)
121{
122 int err;
123 struct dentry *d, *dentry = *newdentry;
124
125 err = ovl_do_mkdir(dir, dentry, mode);
126 if (err)
127 return err;
128
129 if (likely(!d_unhashed(dentry)))
130 return 0;
131
132 /*
133 * vfs_mkdir() may succeed and leave the dentry passed
134 * to it unhashed and negative. If that happens, try to
135 * lookup a new hashed and positive dentry.
136 */
137 d = lookup_one_len(dentry->d_name.name, dentry->d_parent,
138 dentry->d_name.len);
139 if (IS_ERR(d)) {
140 pr_warn("overlayfs: failed lookup after mkdir (%pd2, err=%i).\n",
141 dentry, err);
142 return PTR_ERR(d);
143 }
144 dput(dentry);
145 *newdentry = d;
146
147 return 0;
148}
149
150struct dentry *ovl_create_real(struct inode *dir, struct dentry *newdentry,
151 struct ovl_cattr *attr)
152{
153 int err;
154
155 if (IS_ERR(newdentry))
156 return newdentry;
157
158 err = -ESTALE;
159 if (newdentry->d_inode)
160 goto out;
161
162 if (attr->hardlink) {
163 err = ovl_do_link(attr->hardlink, dir, newdentry);
164 } else {
165 switch (attr->mode & S_IFMT) {
166 case S_IFREG:
167 err = ovl_do_create(dir, newdentry, attr->mode);
168 break;
169
170 case S_IFDIR:
171 /* mkdir is special... */
172 err = ovl_mkdir_real(dir, &newdentry, attr->mode);
173 break;
174
175 case S_IFCHR:
176 case S_IFBLK:
177 case S_IFIFO:
178 case S_IFSOCK:
179 err = ovl_do_mknod(dir, newdentry, attr->mode,
180 attr->rdev);
181 break;
182
183 case S_IFLNK:
184 err = ovl_do_symlink(dir, newdentry, attr->link);
185 break;
186
187 default:
188 err = -EPERM;
189 }
190 }
191 if (!err && WARN_ON(!newdentry->d_inode)) {
192 /*
193 * Not quite sure if non-instantiated dentry is legal or not.
194 * VFS doesn't seem to care so check and warn here.
195 */
196 err = -EIO;
197 }
198out:
199 if (err) {
200 dput(newdentry);
201 return ERR_PTR(err);
202 }
203 return newdentry;
204}
205
206struct dentry *ovl_create_temp(struct dentry *workdir, struct ovl_cattr *attr)
207{
208 return ovl_create_real(d_inode(workdir), ovl_lookup_temp(workdir),
209 attr);
210}
211
212static int ovl_set_opaque_xerr(struct dentry *dentry, struct dentry *upper,
213 int xerr)
214{
215 int err;
216
217 err = ovl_check_setxattr(dentry, upper, OVL_XATTR_OPAQUE, "y", 1, xerr);
218 if (!err)
219 ovl_dentry_set_opaque(dentry);
220
221 return err;
222}
223
224static int ovl_set_opaque(struct dentry *dentry, struct dentry *upperdentry)
225{
226 /*
227 * Fail with -EIO when trying to create opaque dir and upper doesn't
228 * support xattrs. ovl_rename() calls ovl_set_opaque_xerr(-EXDEV) to
229 * return a specific error for noxattr case.
230 */
231 return ovl_set_opaque_xerr(dentry, upperdentry, -EIO);
232}
233
234/*
235 * Common operations required to be done after creation of file on upper.
236 * If @hardlink is false, then @inode is a pre-allocated inode, we may or
237 * may not use to instantiate the new dentry.
238 */
239static int ovl_instantiate(struct dentry *dentry, struct inode *inode,
240 struct dentry *newdentry, bool hardlink)
241{
242 struct ovl_inode_params oip = {
243 .upperdentry = newdentry,
244 .newinode = inode,
245 };
246
247 ovl_dir_modified(dentry->d_parent, false);
248 ovl_dentry_set_upper_alias(dentry);
249 if (!hardlink) {
250 /*
251 * ovl_obtain_alias() can be called after ovl_create_real()
252 * and before we get here, so we may get an inode from cache
253 * with the same real upperdentry that is not the inode we
254 * pre-allocated. In this case we will use the cached inode
255 * to instantiate the new dentry.
256 *
257 * XXX: if we ever use ovl_obtain_alias() to decode directory
258 * file handles, need to use ovl_get_inode_locked() and
259 * d_instantiate_new() here to prevent from creating two
260 * hashed directory inode aliases.
261 */
262 inode = ovl_get_inode(dentry->d_sb, &oip);
263 if (IS_ERR(inode))
264 return PTR_ERR(inode);
265 } else {
266 WARN_ON(ovl_inode_real(inode) != d_inode(newdentry));
267 dput(newdentry);
268 inc_nlink(inode);
269 }
270
271 d_instantiate(dentry, inode);
272 if (inode != oip.newinode) {
273 pr_warn_ratelimited("overlayfs: newly created inode found in cache (%pd2)\n",
274 dentry);
275 }
276
277 /* Force lookup of new upper hardlink to find its lower */
278 if (hardlink)
279 d_drop(dentry);
280
281 return 0;
282}
283
284static bool ovl_type_merge(struct dentry *dentry)
285{
286 return OVL_TYPE_MERGE(ovl_path_type(dentry));
287}
288
289static bool ovl_type_origin(struct dentry *dentry)
290{
291 return OVL_TYPE_ORIGIN(ovl_path_type(dentry));
292}
293
294static int ovl_create_upper(struct dentry *dentry, struct inode *inode,
295 struct ovl_cattr *attr)
296{
297 struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
298 struct inode *udir = upperdir->d_inode;
299 struct dentry *newdentry;
300 int err;
301
302 if (!attr->hardlink && !IS_POSIXACL(udir))
303 attr->mode &= ~current_umask();
304
305 inode_lock_nested(udir, I_MUTEX_PARENT);
306 newdentry = ovl_create_real(udir,
307 lookup_one_len(dentry->d_name.name,
308 upperdir,
309 dentry->d_name.len),
310 attr);
311 err = PTR_ERR(newdentry);
312 if (IS_ERR(newdentry))
313 goto out_unlock;
314
315 if (ovl_type_merge(dentry->d_parent) && d_is_dir(newdentry)) {
316 /* Setting opaque here is just an optimization, allow to fail */
317 ovl_set_opaque(dentry, newdentry);
318 }
319
320 err = ovl_instantiate(dentry, inode, newdentry, !!attr->hardlink);
321 if (err)
322 goto out_cleanup;
323out_unlock:
324 inode_unlock(udir);
325 return err;
326
327out_cleanup:
328 ovl_cleanup(udir, newdentry);
329 dput(newdentry);
330 goto out_unlock;
331}
332
333static struct dentry *ovl_clear_empty(struct dentry *dentry,
334 struct list_head *list)
335{
336 struct dentry *workdir = ovl_workdir(dentry);
337 struct inode *wdir = workdir->d_inode;
338 struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
339 struct inode *udir = upperdir->d_inode;
340 struct path upperpath;
341 struct dentry *upper;
342 struct dentry *opaquedir;
343 struct kstat stat;
344 int err;
345
346 if (WARN_ON(!workdir))
347 return ERR_PTR(-EROFS);
348
349 err = ovl_lock_rename_workdir(workdir, upperdir);
350 if (err)
351 goto out;
352
353 ovl_path_upper(dentry, &upperpath);
354 err = vfs_getattr(&upperpath, &stat,
355 STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
356 if (err)
357 goto out_unlock;
358
359 err = -ESTALE;
360 if (!S_ISDIR(stat.mode))
361 goto out_unlock;
362 upper = upperpath.dentry;
363 if (upper->d_parent->d_inode != udir)
364 goto out_unlock;
365
366 opaquedir = ovl_create_temp(workdir, OVL_CATTR(stat.mode));
367 err = PTR_ERR(opaquedir);
368 if (IS_ERR(opaquedir))
369 goto out_unlock;
370
371 err = ovl_copy_xattr(upper, opaquedir);
372 if (err)
373 goto out_cleanup;
374
375 err = ovl_set_opaque(dentry, opaquedir);
376 if (err)
377 goto out_cleanup;
378
379 inode_lock(opaquedir->d_inode);
380 err = ovl_set_attr(opaquedir, &stat);
381 inode_unlock(opaquedir->d_inode);
382 if (err)
383 goto out_cleanup;
384
385 err = ovl_do_rename(wdir, opaquedir, udir, upper, RENAME_EXCHANGE);
386 if (err)
387 goto out_cleanup;
388
389 ovl_cleanup_whiteouts(upper, list);
390 ovl_cleanup(wdir, upper);
391 unlock_rename(workdir, upperdir);
392
393 /* dentry's upper doesn't match now, get rid of it */
394 d_drop(dentry);
395
396 return opaquedir;
397
398out_cleanup:
399 ovl_cleanup(wdir, opaquedir);
400 dput(opaquedir);
401out_unlock:
402 unlock_rename(workdir, upperdir);
403out:
404 return ERR_PTR(err);
405}
406
407static int ovl_set_upper_acl(struct dentry *upperdentry, const char *name,
408 const struct posix_acl *acl)
409{
410 void *buffer;
411 size_t size;
412 int err;
413
414 if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !acl)
415 return 0;
416
417 size = posix_acl_to_xattr(NULL, acl, NULL, 0);
418 buffer = kmalloc(size, GFP_KERNEL);
419 if (!buffer)
420 return -ENOMEM;
421
422 size = posix_acl_to_xattr(&init_user_ns, acl, buffer, size);
423 err = size;
424 if (err < 0)
425 goto out_free;
426
427 err = vfs_setxattr(upperdentry, name, buffer, size, XATTR_CREATE);
428out_free:
429 kfree(buffer);
430 return err;
431}
432
433static int ovl_create_over_whiteout(struct dentry *dentry, struct inode *inode,
434 struct ovl_cattr *cattr)
435{
436 struct dentry *workdir = ovl_workdir(dentry);
437 struct inode *wdir = workdir->d_inode;
438 struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
439 struct inode *udir = upperdir->d_inode;
440 struct dentry *upper;
441 struct dentry *newdentry;
442 int err;
443 struct posix_acl *acl, *default_acl;
444 bool hardlink = !!cattr->hardlink;
445
446 if (WARN_ON(!workdir))
447 return -EROFS;
448
449 if (!hardlink) {
450 err = posix_acl_create(dentry->d_parent->d_inode,
451 &cattr->mode, &default_acl, &acl);
452 if (err)
453 return err;
454 }
455
456 err = ovl_lock_rename_workdir(workdir, upperdir);
457 if (err)
458 goto out;
459
460 upper = lookup_one_len(dentry->d_name.name, upperdir,
461 dentry->d_name.len);
462 err = PTR_ERR(upper);
463 if (IS_ERR(upper))
464 goto out_unlock;
465
466 err = -ESTALE;
467 if (d_is_negative(upper) || !IS_WHITEOUT(d_inode(upper)))
468 goto out_dput;
469
470 newdentry = ovl_create_temp(workdir, cattr);
471 err = PTR_ERR(newdentry);
472 if (IS_ERR(newdentry))
473 goto out_dput;
474
475 /*
476 * mode could have been mutilated due to umask (e.g. sgid directory)
477 */
478 if (!hardlink &&
479 !S_ISLNK(cattr->mode) &&
480 newdentry->d_inode->i_mode != cattr->mode) {
481 struct iattr attr = {
482 .ia_valid = ATTR_MODE,
483 .ia_mode = cattr->mode,
484 };
485 inode_lock(newdentry->d_inode);
486 err = notify_change(newdentry, &attr, NULL);
487 inode_unlock(newdentry->d_inode);
488 if (err)
489 goto out_cleanup;
490 }
491 if (!hardlink) {
492 err = ovl_set_upper_acl(newdentry, XATTR_NAME_POSIX_ACL_ACCESS,
493 acl);
494 if (err)
495 goto out_cleanup;
496
497 err = ovl_set_upper_acl(newdentry, XATTR_NAME_POSIX_ACL_DEFAULT,
498 default_acl);
499 if (err)
500 goto out_cleanup;
501 }
502
503 if (!hardlink && S_ISDIR(cattr->mode)) {
504 err = ovl_set_opaque(dentry, newdentry);
505 if (err)
506 goto out_cleanup;
507
508 err = ovl_do_rename(wdir, newdentry, udir, upper,
509 RENAME_EXCHANGE);
510 if (err)
511 goto out_cleanup;
512
513 ovl_cleanup(wdir, upper);
514 } else {
515 err = ovl_do_rename(wdir, newdentry, udir, upper, 0);
516 if (err)
517 goto out_cleanup;
518 }
519 err = ovl_instantiate(dentry, inode, newdentry, hardlink);
520 if (err)
521 goto out_cleanup;
522out_dput:
523 dput(upper);
524out_unlock:
525 unlock_rename(workdir, upperdir);
526out:
527 if (!hardlink) {
528 posix_acl_release(acl);
529 posix_acl_release(default_acl);
530 }
531 return err;
532
533out_cleanup:
534 ovl_cleanup(wdir, newdentry);
535 dput(newdentry);
536 goto out_dput;
537}
538
539static int ovl_create_or_link(struct dentry *dentry, struct inode *inode,
540 struct ovl_cattr *attr, bool origin)
541{
542 int err;
543 const struct cred *old_cred, *hold_cred = NULL;
544 struct cred *override_cred;
545 struct dentry *parent = dentry->d_parent;
546
547 err = ovl_copy_up(parent);
548 if (err)
549 return err;
550
551 old_cred = ovl_override_creds(dentry->d_sb);
552
553 /*
554 * When linking a file with copy up origin into a new parent, mark the
555 * new parent dir "impure".
556 */
557 if (origin) {
558 err = ovl_set_impure(parent, ovl_dentry_upper(parent));
559 if (err)
560 goto out_revert_creds;
561 }
562
563 err = -ENOMEM;
564 override_cred = prepare_creds();
565 if (override_cred) {
566 override_cred->fsuid = inode->i_uid;
567 override_cred->fsgid = inode->i_gid;
568 if (!attr->hardlink) {
569 err = security_dentry_create_files_as(dentry,
570 attr->mode, &dentry->d_name,
571 old_cred ? old_cred : current_cred(),
572 override_cred);
573 if (err) {
574 put_cred(override_cred);
575 goto out_revert_creds;
576 }
577 }
578 hold_cred = override_creds(override_cred);
579 put_cred(override_cred);
580
581 if (!ovl_dentry_is_whiteout(dentry))
582 err = ovl_create_upper(dentry, inode, attr);
583 else
584 err = ovl_create_over_whiteout(dentry, inode, attr);
585 }
586out_revert_creds:
587 ovl_revert_creds(old_cred ?: hold_cred);
588 if (old_cred && hold_cred)
589 put_cred(hold_cred);
590 return err;
591}
592
593static int ovl_create_object(struct dentry *dentry, int mode, dev_t rdev,
594 const char *link)
595{
596 int err;
597 struct inode *inode;
598 struct ovl_cattr attr = {
599 .rdev = rdev,
600 .link = link,
601 };
602
603 err = ovl_want_write(dentry);
604 if (err)
605 goto out;
606
607 /* Preallocate inode to be used by ovl_get_inode() */
608 err = -ENOMEM;
609 inode = ovl_new_inode(dentry->d_sb, mode, rdev);
610 if (!inode)
611 goto out_drop_write;
612
613 spin_lock(&inode->i_lock);
614 inode->i_state |= I_CREATING;
615 spin_unlock(&inode->i_lock);
616
617 inode_init_owner(inode, dentry->d_parent->d_inode, mode);
618 attr.mode = inode->i_mode;
619
620 err = ovl_create_or_link(dentry, inode, &attr, false);
621 /* Did we end up using the preallocated inode? */
622 if (inode != d_inode(dentry))
623 iput(inode);
624
625out_drop_write:
626 ovl_drop_write(dentry);
627out:
628 return err;
629}
630
631static int ovl_create(struct inode *dir, struct dentry *dentry, umode_t mode,
632 bool excl)
633{
634 return ovl_create_object(dentry, (mode & 07777) | S_IFREG, 0, NULL);
635}
636
637static int ovl_mkdir(struct inode *dir, struct dentry *dentry, umode_t mode)
638{
639 return ovl_create_object(dentry, (mode & 07777) | S_IFDIR, 0, NULL);
640}
641
642static int ovl_mknod(struct inode *dir, struct dentry *dentry, umode_t mode,
643 dev_t rdev)
644{
645 /* Don't allow creation of "whiteout" on overlay */
646 if (S_ISCHR(mode) && rdev == WHITEOUT_DEV)
647 return -EPERM;
648
649 return ovl_create_object(dentry, mode, rdev, NULL);
650}
651
652static int ovl_symlink(struct inode *dir, struct dentry *dentry,
653 const char *link)
654{
655 return ovl_create_object(dentry, S_IFLNK, 0, link);
656}
657
658static int ovl_set_link_redirect(struct dentry *dentry)
659{
660 const struct cred *old_cred;
661 int err;
662
663 old_cred = ovl_override_creds(dentry->d_sb);
664 err = ovl_set_redirect(dentry, false);
665 ovl_revert_creds(old_cred);
666
667 return err;
668}
669
670static int ovl_link(struct dentry *old, struct inode *newdir,
671 struct dentry *new)
672{
673 int err;
674 bool locked = false;
675 struct inode *inode;
676
677 err = ovl_want_write(old);
678 if (err)
679 goto out;
680
681 err = ovl_copy_up(old);
682 if (err)
683 goto out_drop_write;
684
685 err = ovl_copy_up(new->d_parent);
686 if (err)
687 goto out_drop_write;
688
689 if (ovl_is_metacopy_dentry(old)) {
690 err = ovl_set_link_redirect(old);
691 if (err)
692 goto out_drop_write;
693 }
694
695 err = ovl_nlink_start(old, &locked);
696 if (err)
697 goto out_drop_write;
698
699 inode = d_inode(old);
700 ihold(inode);
701
702 err = ovl_create_or_link(new, inode,
703 &(struct ovl_cattr) {.hardlink = ovl_dentry_upper(old)},
704 ovl_type_origin(old));
705 if (err)
706 iput(inode);
707
708 ovl_nlink_end(old, locked);
709out_drop_write:
710 ovl_drop_write(old);
711out:
712 return err;
713}
714
715static bool ovl_matches_upper(struct dentry *dentry, struct dentry *upper)
716{
717 return d_inode(ovl_dentry_upper(dentry)) == d_inode(upper);
718}
719
720static int ovl_remove_and_whiteout(struct dentry *dentry,
721 struct list_head *list)
722{
723 struct dentry *workdir = ovl_workdir(dentry);
724 struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
725 struct dentry *upper;
726 struct dentry *opaquedir = NULL;
727 int err;
728
729 if (WARN_ON(!workdir))
730 return -EROFS;
731
732 if (!list_empty(list)) {
733 opaquedir = ovl_clear_empty(dentry, list);
734 err = PTR_ERR(opaquedir);
735 if (IS_ERR(opaquedir))
736 goto out;
737 }
738
739 err = ovl_lock_rename_workdir(workdir, upperdir);
740 if (err)
741 goto out_dput;
742
743 upper = lookup_one_len(dentry->d_name.name, upperdir,
744 dentry->d_name.len);
745 err = PTR_ERR(upper);
746 if (IS_ERR(upper))
747 goto out_unlock;
748
749 err = -ESTALE;
750 if ((opaquedir && upper != opaquedir) ||
751 (!opaquedir && ovl_dentry_upper(dentry) &&
752 !ovl_matches_upper(dentry, upper))) {
753 goto out_dput_upper;
754 }
755
756 err = ovl_cleanup_and_whiteout(workdir, d_inode(upperdir), upper);
757 if (err)
758 goto out_d_drop;
759
760 ovl_dir_modified(dentry->d_parent, true);
761out_d_drop:
762 d_drop(dentry);
763out_dput_upper:
764 dput(upper);
765out_unlock:
766 unlock_rename(workdir, upperdir);
767out_dput:
768 dput(opaquedir);
769out:
770 return err;
771}
772
773static int ovl_remove_upper(struct dentry *dentry, bool is_dir,
774 struct list_head *list)
775{
776 struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
777 struct inode *dir = upperdir->d_inode;
778 struct dentry *upper;
779 struct dentry *opaquedir = NULL;
780 int err;
781
782 if (!list_empty(list)) {
783 opaquedir = ovl_clear_empty(dentry, list);
784 err = PTR_ERR(opaquedir);
785 if (IS_ERR(opaquedir))
786 goto out;
787 }
788
789 inode_lock_nested(dir, I_MUTEX_PARENT);
790 upper = lookup_one_len(dentry->d_name.name, upperdir,
791 dentry->d_name.len);
792 err = PTR_ERR(upper);
793 if (IS_ERR(upper))
794 goto out_unlock;
795
796 err = -ESTALE;
797 if ((opaquedir && upper != opaquedir) ||
798 (!opaquedir && !ovl_matches_upper(dentry, upper)))
799 goto out_dput_upper;
800
801 if (is_dir)
802 err = vfs_rmdir(dir, upper);
803 else
804 err = vfs_unlink(dir, upper, NULL);
805 ovl_dir_modified(dentry->d_parent, ovl_type_origin(dentry));
806
807 /*
808 * Keeping this dentry hashed would mean having to release
809 * upperpath/lowerpath, which could only be done if we are the
810 * sole user of this dentry. Too tricky... Just unhash for
811 * now.
812 */
813 if (!err)
814 d_drop(dentry);
815out_dput_upper:
816 dput(upper);
817out_unlock:
818 inode_unlock(dir);
819 dput(opaquedir);
820out:
821 return err;
822}
823
824static bool ovl_pure_upper(struct dentry *dentry)
825{
826 return !ovl_dentry_lower(dentry) &&
827 !ovl_test_flag(OVL_WHITEOUTS, d_inode(dentry));
828}
829
830static int ovl_do_remove(struct dentry *dentry, bool is_dir)
831{
832 int err;
833 bool locked = false;
834 const struct cred *old_cred;
835 struct dentry *upperdentry;
836 bool lower_positive = ovl_lower_positive(dentry);
837 LIST_HEAD(list);
838
839 /* No need to clean pure upper removed by vfs_rmdir() */
840 if (is_dir && (lower_positive || !ovl_pure_upper(dentry))) {
841 err = ovl_check_empty_dir(dentry, &list);
842 if (err)
843 goto out;
844 }
845
846 err = ovl_want_write(dentry);
847 if (err)
848 goto out;
849
850 err = ovl_copy_up(dentry->d_parent);
851 if (err)
852 goto out_drop_write;
853
854 err = ovl_nlink_start(dentry, &locked);
855 if (err)
856 goto out_drop_write;
857
858 old_cred = ovl_override_creds(dentry->d_sb);
859 if (!lower_positive)
860 err = ovl_remove_upper(dentry, is_dir, &list);
861 else
862 err = ovl_remove_and_whiteout(dentry, &list);
863 ovl_revert_creds(old_cred);
864 if (!err) {
865 if (is_dir)
866 clear_nlink(dentry->d_inode);
867 else
868 drop_nlink(dentry->d_inode);
869 }
870 ovl_nlink_end(dentry, locked);
871
872 /*
873 * Copy ctime
874 *
875 * Note: we fail to update ctime if there was no copy-up, only a
876 * whiteout
877 */
878 upperdentry = ovl_dentry_upper(dentry);
879 if (upperdentry)
880 ovl_copyattr(d_inode(upperdentry), d_inode(dentry));
881
882out_drop_write:
883 ovl_drop_write(dentry);
884out:
885 ovl_cache_free(&list);
886 return err;
887}
888
889static int ovl_unlink(struct inode *dir, struct dentry *dentry)
890{
891 return ovl_do_remove(dentry, false);
892}
893
894static int ovl_rmdir(struct inode *dir, struct dentry *dentry)
895{
896 return ovl_do_remove(dentry, true);
897}
898
899static bool ovl_type_merge_or_lower(struct dentry *dentry)
900{
901 enum ovl_path_type type = ovl_path_type(dentry);
902
903 return OVL_TYPE_MERGE(type) || !OVL_TYPE_UPPER(type);
904}
905
906static bool ovl_can_move(struct dentry *dentry)
907{
908 return ovl_redirect_dir(dentry->d_sb) ||
909 !d_is_dir(dentry) || !ovl_type_merge_or_lower(dentry);
910}
911
912static char *ovl_get_redirect(struct dentry *dentry, bool abs_redirect)
913{
914 char *buf, *ret;
915 struct dentry *d, *tmp;
916 int buflen = ovl_redirect_max + 1;
917
918 if (!abs_redirect) {
919 ret = kstrndup(dentry->d_name.name, dentry->d_name.len,
920 GFP_KERNEL);
921 goto out;
922 }
923
924 buf = ret = kmalloc(buflen, GFP_KERNEL);
925 if (!buf)
926 goto out;
927
928 buflen--;
929 buf[buflen] = '\0';
930 for (d = dget(dentry); !IS_ROOT(d);) {
931 const char *name;
932 int thislen;
933
934 spin_lock(&d->d_lock);
935 name = ovl_dentry_get_redirect(d);
936 if (name) {
937 thislen = strlen(name);
938 } else {
939 name = d->d_name.name;
940 thislen = d->d_name.len;
941 }
942
943 /* If path is too long, fall back to userspace move */
944 if (thislen + (name[0] != '/') > buflen) {
945 ret = ERR_PTR(-EXDEV);
946 spin_unlock(&d->d_lock);
947 goto out_put;
948 }
949
950 buflen -= thislen;
951 memcpy(&buf[buflen], name, thislen);
952 tmp = dget_dlock(d->d_parent);
953 spin_unlock(&d->d_lock);
954
955 dput(d);
956 d = tmp;
957
958 /* Absolute redirect: finished */
959 if (buf[buflen] == '/')
960 break;
961 buflen--;
962 buf[buflen] = '/';
963 }
964 ret = kstrdup(&buf[buflen], GFP_KERNEL);
965out_put:
966 dput(d);
967 kfree(buf);
968out:
969 return ret ? ret : ERR_PTR(-ENOMEM);
970}
971
972static bool ovl_need_absolute_redirect(struct dentry *dentry, bool samedir)
973{
974 struct dentry *lowerdentry;
975
976 if (!samedir)
977 return true;
978
979 if (d_is_dir(dentry))
980 return false;
981
982 /*
983 * For non-dir hardlinked files, we need absolute redirects
984 * in general as two upper hardlinks could be in different
985 * dirs. We could put a relative redirect now and convert
986 * it to absolute redirect later. But when nlink > 1 and
987 * indexing is on, that means relative redirect needs to be
988 * converted to absolute during copy up of another lower
989 * hardllink as well.
990 *
991 * So without optimizing too much, just check if lower is
992 * a hard link or not. If lower is hard link, put absolute
993 * redirect.
994 */
995 lowerdentry = ovl_dentry_lower(dentry);
996 return (d_inode(lowerdentry)->i_nlink > 1);
997}
998
999static int ovl_set_redirect(struct dentry *dentry, bool samedir)
1000{
1001 int err;
1002 const char *redirect = ovl_dentry_get_redirect(dentry);
1003 bool absolute_redirect = ovl_need_absolute_redirect(dentry, samedir);
1004
1005 if (redirect && (!absolute_redirect || redirect[0] == '/'))
1006 return 0;
1007
1008 redirect = ovl_get_redirect(dentry, absolute_redirect);
1009 if (IS_ERR(redirect))
1010 return PTR_ERR(redirect);
1011
1012 err = ovl_check_setxattr(dentry, ovl_dentry_upper(dentry),
1013 OVL_XATTR_REDIRECT,
1014 redirect, strlen(redirect), -EXDEV);
1015 if (!err) {
1016 spin_lock(&dentry->d_lock);
1017 ovl_dentry_set_redirect(dentry, redirect);
1018 spin_unlock(&dentry->d_lock);
1019 } else {
1020 kfree(redirect);
1021 pr_warn_ratelimited("overlayfs: failed to set redirect (%i)\n",
1022 err);
1023 /* Fall back to userspace copy-up */
1024 err = -EXDEV;
1025 }
1026 return err;
1027}
1028
1029static int ovl_rename(struct inode *olddir, struct dentry *old,
1030 struct inode *newdir, struct dentry *new,
1031 unsigned int flags)
1032{
1033 int err;
1034 bool locked = false;
1035 struct dentry *old_upperdir;
1036 struct dentry *new_upperdir;
1037 struct dentry *olddentry;
1038 struct dentry *newdentry;
1039 struct dentry *trap;
1040 bool old_opaque;
1041 bool new_opaque;
1042 bool cleanup_whiteout = false;
1043 bool overwrite = !(flags & RENAME_EXCHANGE);
1044 bool is_dir = d_is_dir(old);
1045 bool new_is_dir = d_is_dir(new);
1046 bool samedir = olddir == newdir;
1047 struct dentry *opaquedir = NULL;
1048 const struct cred *old_cred = NULL;
1049 LIST_HEAD(list);
1050
1051 err = -EINVAL;
1052 if (flags & ~(RENAME_EXCHANGE | RENAME_NOREPLACE))
1053 goto out;
1054
1055 flags &= ~RENAME_NOREPLACE;
1056
1057 /* Don't copy up directory trees */
1058 err = -EXDEV;
1059 if (!ovl_can_move(old))
1060 goto out;
1061 if (!overwrite && !ovl_can_move(new))
1062 goto out;
1063
1064 if (overwrite && new_is_dir && !ovl_pure_upper(new)) {
1065 err = ovl_check_empty_dir(new, &list);
1066 if (err)
1067 goto out;
1068 }
1069
1070 if (overwrite) {
1071 if (ovl_lower_positive(old)) {
1072 if (!ovl_dentry_is_whiteout(new)) {
1073 /* Whiteout source */
1074 flags |= RENAME_WHITEOUT;
1075 } else {
1076 /* Switch whiteouts */
1077 flags |= RENAME_EXCHANGE;
1078 }
1079 } else if (is_dir && ovl_dentry_is_whiteout(new)) {
1080 flags |= RENAME_EXCHANGE;
1081 cleanup_whiteout = true;
1082 }
1083 }
1084
1085 err = ovl_want_write(old);
1086 if (err)
1087 goto out;
1088
1089 err = ovl_copy_up(old);
1090 if (err)
1091 goto out_drop_write;
1092
1093 err = ovl_copy_up(new->d_parent);
1094 if (err)
1095 goto out_drop_write;
1096 if (!overwrite) {
1097 err = ovl_copy_up(new);
1098 if (err)
1099 goto out_drop_write;
1100 } else {
1101 err = ovl_nlink_start(new, &locked);
1102 if (err)
1103 goto out_drop_write;
1104 }
1105
1106 old_cred = ovl_override_creds(old->d_sb);
1107
1108 if (!list_empty(&list)) {
1109 opaquedir = ovl_clear_empty(new, &list);
1110 err = PTR_ERR(opaquedir);
1111 if (IS_ERR(opaquedir)) {
1112 opaquedir = NULL;
1113 goto out_revert_creds;
1114 }
1115 }
1116
1117 old_upperdir = ovl_dentry_upper(old->d_parent);
1118 new_upperdir = ovl_dentry_upper(new->d_parent);
1119
1120 if (!samedir) {
1121 /*
1122 * When moving a merge dir or non-dir with copy up origin into
1123 * a new parent, we are marking the new parent dir "impure".
1124 * When ovl_iterate() iterates an "impure" upper dir, it will
1125 * lookup the origin inodes of the entries to fill d_ino.
1126 */
1127 if (ovl_type_origin(old)) {
1128 err = ovl_set_impure(new->d_parent, new_upperdir);
1129 if (err)
1130 goto out_revert_creds;
1131 }
1132 if (!overwrite && ovl_type_origin(new)) {
1133 err = ovl_set_impure(old->d_parent, old_upperdir);
1134 if (err)
1135 goto out_revert_creds;
1136 }
1137 }
1138
1139 trap = lock_rename(new_upperdir, old_upperdir);
1140
1141 olddentry = lookup_one_len(old->d_name.name, old_upperdir,
1142 old->d_name.len);
1143 err = PTR_ERR(olddentry);
1144 if (IS_ERR(olddentry))
1145 goto out_unlock;
1146
1147 err = -ESTALE;
1148 if (!ovl_matches_upper(old, olddentry))
1149 goto out_dput_old;
1150
1151 newdentry = lookup_one_len(new->d_name.name, new_upperdir,
1152 new->d_name.len);
1153 err = PTR_ERR(newdentry);
1154 if (IS_ERR(newdentry))
1155 goto out_dput_old;
1156
1157 old_opaque = ovl_dentry_is_opaque(old);
1158 new_opaque = ovl_dentry_is_opaque(new);
1159
1160 err = -ESTALE;
1161 if (d_inode(new) && ovl_dentry_upper(new)) {
1162 if (opaquedir) {
1163 if (newdentry != opaquedir)
1164 goto out_dput;
1165 } else {
1166 if (!ovl_matches_upper(new, newdentry))
1167 goto out_dput;
1168 }
1169 } else {
1170 if (!d_is_negative(newdentry) &&
1171 (!new_opaque || !ovl_is_whiteout(newdentry)))
1172 goto out_dput;
1173 }
1174
1175 if (olddentry == trap)
1176 goto out_dput;
1177 if (newdentry == trap)
1178 goto out_dput;
1179
1180 if (olddentry->d_inode == newdentry->d_inode)
1181 goto out_dput;
1182
1183 err = 0;
1184 if (ovl_type_merge_or_lower(old))
1185 err = ovl_set_redirect(old, samedir);
1186 else if (is_dir && !old_opaque && ovl_type_merge(new->d_parent))
1187 err = ovl_set_opaque_xerr(old, olddentry, -EXDEV);
1188 if (err)
1189 goto out_dput;
1190
1191 if (!overwrite && ovl_type_merge_or_lower(new))
1192 err = ovl_set_redirect(new, samedir);
1193 else if (!overwrite && new_is_dir && !new_opaque &&
1194 ovl_type_merge(old->d_parent))
1195 err = ovl_set_opaque_xerr(new, newdentry, -EXDEV);
1196 if (err)
1197 goto out_dput;
1198
1199 err = ovl_do_rename(old_upperdir->d_inode, olddentry,
1200 new_upperdir->d_inode, newdentry, flags);
1201 if (err)
1202 goto out_dput;
1203
1204 if (cleanup_whiteout)
1205 ovl_cleanup(old_upperdir->d_inode, newdentry);
1206
1207 if (overwrite && d_inode(new)) {
1208 if (new_is_dir)
1209 clear_nlink(d_inode(new));
1210 else
1211 drop_nlink(d_inode(new));
1212 }
1213
1214 ovl_dir_modified(old->d_parent, ovl_type_origin(old) ||
1215 (!overwrite && ovl_type_origin(new)));
1216 ovl_dir_modified(new->d_parent, ovl_type_origin(old) ||
1217 (d_inode(new) && ovl_type_origin(new)));
1218
1219 /* copy ctime: */
1220 ovl_copyattr(d_inode(olddentry), d_inode(old));
1221 if (d_inode(new) && ovl_dentry_upper(new))
1222 ovl_copyattr(d_inode(newdentry), d_inode(new));
1223
1224out_dput:
1225 dput(newdentry);
1226out_dput_old:
1227 dput(olddentry);
1228out_unlock:
1229 unlock_rename(new_upperdir, old_upperdir);
1230out_revert_creds:
1231 ovl_revert_creds(old_cred);
1232 ovl_nlink_end(new, locked);
1233out_drop_write:
1234 ovl_drop_write(old);
1235out:
1236 dput(opaquedir);
1237 ovl_cache_free(&list);
1238 return err;
1239}
1240
1241const struct inode_operations ovl_dir_inode_operations = {
1242 .lookup = ovl_lookup,
1243 .mkdir = ovl_mkdir,
1244 .symlink = ovl_symlink,
1245 .unlink = ovl_unlink,
1246 .rmdir = ovl_rmdir,
1247 .rename = ovl_rename,
1248 .link = ovl_link,
1249 .setattr = ovl_setattr,
1250 .create = ovl_create,
1251 .mknod = ovl_mknod,
1252 .permission = ovl_permission,
1253 .getattr = ovl_getattr,
1254 .listxattr = ovl_listxattr,
1255 .get_acl = ovl_get_acl,
1256 .update_time = ovl_update_time,
1257};