Lines Matching +full:x +full:- +full:origin

1 // SPDX-License-Identifier: GPL-2.0-only
39 struct ovl_fs *ofs = OVL_FS(d->sb); in ovl_check_redirect()
41 d->absolute_redirect = false; in ovl_check_redirect()
47 d->absolute_redirect = true; in ovl_check_redirect()
51 * that will stop further lookup in lower layers (d->stop=true) in ovl_check_redirect()
54 * layers (reset d->stop). in ovl_check_redirect()
56 d->stop = false; in ovl_check_redirect()
60 memcpy(buf, d->name.name, prelen); in ovl_check_redirect()
64 kfree(d->redirect); in ovl_check_redirect()
65 d->redirect = buf; in ovl_check_redirect()
66 d->name.name = d->redirect; in ovl_check_redirect()
67 d->name.len = strlen(d->redirect); in ovl_check_redirect()
75 * A non-dir origin may be disconnected, which is fine, because in ovl_acceptable()
86 return is_subdir(dentry, ((struct vfsmount *)ctx)->mnt_root); in ovl_acceptable()
93 * Return -ENODATA for "origin unknown".
98 if (fb_len < sizeof(struct ovl_fb) || fb_len < fb->len) in ovl_check_fb_len()
99 return -EINVAL; in ovl_check_fb_len()
101 if (fb->magic != OVL_FH_MAGIC) in ovl_check_fb_len()
102 return -EINVAL; in ovl_check_fb_len()
104 /* Treat larger version and unknown flags as "origin unknown" */ in ovl_check_fb_len()
105 if (fb->version > OVL_FH_VERSION || fb->flags & ~OVL_FH_FLAG_ALL) in ovl_check_fb_len()
106 return -ENODATA; in ovl_check_fb_len()
108 /* Treat endianness mismatch as "origin unknown" */ in ovl_check_fb_len()
109 if (!(fb->flags & OVL_FH_FLAG_ANY_ENDIAN) && in ovl_check_fb_len()
110 (fb->flags & OVL_FH_FLAG_BIG_ENDIAN) != OVL_FH_FLAG_CPU_ENDIAN) in ovl_check_fb_len()
111 return -ENODATA; in ovl_check_fb_len()
124 if (res == -ENODATA || res == -EOPNOTSUPP) in ovl_get_fh()
128 /* Zero size value means "copied up but origin unknown" */ in ovl_get_fh()
134 return ERR_PTR(-ENOMEM); in ovl_get_fh()
136 res = ovl_getxattr_upper(ofs, upperdentry, ox, fh->buf, res); in ovl_get_fh()
140 err = ovl_check_fb_len(&fh->fb, res); in ovl_get_fh()
142 if (err == -ENODATA) in ovl_get_fh()
154 pr_warn_ratelimited("failed to get origin (%i)\n", res); in ovl_get_fh()
157 pr_warn_ratelimited("invalid origin (%*phN)\n", res, fh); in ovl_get_fh()
176 !uuid_equal(&fh->fb.uuid, &mnt->mnt_sb->s_uuid) : in ovl_decode_real_fh()
177 !uuid_is_null(&fh->fb.uuid)) in ovl_decode_real_fh()
180 bytes = (fh->fb.len - offsetof(struct ovl_fb, fid)); in ovl_decode_real_fh()
181 real = exportfs_decode_fh(mnt, (struct fid *)fh->fb.fid, in ovl_decode_real_fh()
182 bytes >> 2, (int)fh->fb.type, in ovl_decode_real_fh()
186 * Treat stale file handle to lower file as "origin unknown". in ovl_decode_real_fh()
191 if (real == ERR_PTR(-ESTALE) && in ovl_decode_real_fh()
192 !(fh->fb.flags & OVL_FH_FLAG_PATH_UPPER)) in ovl_decode_real_fh()
210 struct dentry *ret = lookup_one_unlocked(mnt_idmap(d->layer->mnt), in ovl_lookup_positive_unlocked()
213 if (!IS_ERR(ret) && d_flags_negative(smp_load_acquire(&ret->d_flags))) { in ovl_lookup_positive_unlocked()
214 if (drop_negative && ret->d_lockref.count == 1) { in ovl_lookup_positive_unlocked()
215 spin_lock(&ret->d_lock); in ovl_lookup_positive_unlocked()
217 if (d_is_negative(ret) && ret->d_lockref.count == 1) in ovl_lookup_positive_unlocked()
219 spin_unlock(&ret->d_lock); in ovl_lookup_positive_unlocked()
222 ret = ERR_PTR(-ENOENT); in ovl_lookup_positive_unlocked()
232 struct ovl_fs *ofs = OVL_FS(d->sb); in ovl_lookup_single()
238 bool is_upper = d->layer->idx == 0; in ovl_lookup_single()
242 * We allow filesystems that are case-folding capable as long as the in ovl_lookup_single()
248 if (ofs->casefold != ovl_dentry_casefolded(base)) { in ovl_lookup_single()
250 err = -ESTALE; in ovl_lookup_single()
258 if (err == -ENOENT || err == -ENAMETOOLONG) in ovl_lookup_single()
263 if (ofs->casefold != ovl_dentry_casefolded(this)) { in ovl_lookup_single()
265 err = -EREMOTE; in ovl_lookup_single()
272 err = -EREMOTE; in ovl_lookup_single()
277 path.mnt = d->layer->mnt; in ovl_lookup_single()
279 d->stop = d->opaque = true; in ovl_lookup_single()
286 if (last_element && d->metacopy && !d_is_reg(this)) { in ovl_lookup_single()
287 d->stop = true; in ovl_lookup_single()
292 if (d->is_dir || !last_element) { in ovl_lookup_single()
293 d->stop = true; in ovl_lookup_single()
300 d->metacopy = err; in ovl_lookup_single()
301 d->stop = !d->metacopy; in ovl_lookup_single()
302 if (!d->metacopy || d->last) in ovl_lookup_single()
305 if (ovl_lookup_trap_inode(d->sb, this)) { in ovl_lookup_single()
308 err = -ELOOP; in ovl_lookup_single()
313 d->is_dir = true; in ovl_lookup_single()
314 if (d->last) in ovl_lookup_single()
317 /* overlay.opaque=x means xwhiteouts directory */ in ovl_lookup_single()
319 if (last_element && !is_upper && val == 'x') { in ovl_lookup_single()
320 d->xwhiteouts = true; in ovl_lookup_single()
321 ovl_layer_set_xwhiteouts(ofs, d->layer); in ovl_lookup_single()
323 d->stop = true; in ovl_lookup_single()
325 d->opaque = true; in ovl_lookup_single()
354 size_t rem = d->name.len - 1; in ovl_lookup_layer()
358 if (d->name.name[0] != '/') in ovl_lookup_layer()
359 return ovl_lookup_single(base, d, d->name.name, d->name.len, in ovl_lookup_layer()
363 const char *s = d->name.name + d->name.len - rem; in ovl_lookup_layer()
365 size_t thislen = next - s; in ovl_lookup_layer()
369 if (WARN_ON(s[-1] != '/')) in ovl_lookup_layer()
370 return -EIO; in ovl_lookup_layer()
373 d->name.len - rem, next, &base, in ovl_lookup_layer()
382 rem -= thislen + 1; in ovl_lookup_layer()
384 if (WARN_ON(rem >= d->name.len)) in ovl_lookup_layer()
385 return -EIO; in ovl_lookup_layer()
397 err = vfs_path_lookup(layer->mnt->mnt_root, layer->mnt, redirect, in ovl_lookup_data_layer()
401 dentry, redirect, layer->idx, err); in ovl_lookup_data_layer()
406 err = -EREMOTE; in ovl_lookup_data_layer()
407 if (ovl_dentry_weird(datapath->dentry)) in ovl_lookup_data_layer()
410 err = -ENOENT; in ovl_lookup_data_layer()
412 if (!d_is_reg(datapath->dentry)) in ovl_lookup_data_layer()
423 /* Lookup in data-only layers by absolute redirect to layer root */
427 struct ovl_fs *ofs = OVL_FS(dentry->d_sb); in ovl_lookup_data_layers()
430 int err = -ENOENT; in ovl_lookup_data_layers()
433 layer = &ofs->layers[ofs->numlayer - ofs->numdatalayer]; in ovl_lookup_data_layers()
434 for (i = 0; i < ofs->numdatalayer; i++, layer++) { in ovl_lookup_data_layers()
438 lowerdata->dentry = datapath.dentry; in ovl_lookup_data_layers()
439 lowerdata->layer = layer; in ovl_lookup_data_layers()
450 struct dentry *origin = NULL; in ovl_check_origin_fh() local
456 * fh->uuid to layer. in ovl_check_origin_fh()
458 if (ofs->layers[i].fsid && in ovl_check_origin_fh()
459 ofs->layers[i].fs->bad_uuid) in ovl_check_origin_fh()
462 origin = ovl_decode_real_fh(ofs, fh, ofs->layers[i].mnt, in ovl_check_origin_fh()
464 if (origin) in ovl_check_origin_fh()
468 if (!origin) in ovl_check_origin_fh()
469 return -ESTALE; in ovl_check_origin_fh()
470 else if (IS_ERR(origin)) in ovl_check_origin_fh()
471 return PTR_ERR(origin); in ovl_check_origin_fh()
474 inode_wrong_type(d_inode(upperdentry), d_inode(origin)->i_mode)) in ovl_check_origin_fh()
480 dput(origin); in ovl_check_origin_fh()
481 return -ENOMEM; in ovl_check_origin_fh()
484 .dentry = origin, in ovl_check_origin_fh()
485 .layer = &ofs->layers[i] in ovl_check_origin_fh()
491 pr_warn_ratelimited("invalid origin (%pd2, ftype=%x, origin ftype=%x).\n", in ovl_check_origin_fh()
492 upperdentry, d_inode(upperdentry)->i_mode & S_IFMT, in ovl_check_origin_fh()
493 d_inode(origin)->i_mode & S_IFMT); in ovl_check_origin_fh()
494 dput(origin); in ovl_check_origin_fh()
495 return -ESTALE; in ovl_check_origin_fh()
511 if (err == -ESTALE) in ovl_check_origin()
521 * Return 0 on match, -ESTALE on mismatch, < 0 on error.
530 return -ENODATA; in ovl_verify_fh()
535 if (fh->fb.len != ofh->fb.len || memcmp(&fh->fb, &ofh->fb, fh->fb.len)) in ovl_verify_fh()
536 err = -ESTALE; in ovl_verify_fh()
549 if (set && err == -ENODATA) in ovl_verify_set_fh()
550 err = ovl_setxattr(ofs, dentry, ox, fh->buf, fh->fb.len); in ovl_verify_set_fh()
561 * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
589 is_upper ? "upper" : "origin", real, in ovl_verify_origin_xattr()
590 inode ? inode->i_ino : 0, err); in ovl_verify_origin_xattr()
613 return upper ?: ERR_PTR(-ESTALE); in ovl_index_upper()
619 return ERR_PTR(-EIO); in ovl_index_upper()
626 * Verify that an index entry name matches the origin file handle stored in
627 * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path.
628 * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error.
634 struct ovl_path origin = { }; in ovl_verify_index() local
635 struct ovl_path *stack = &origin; in ovl_verify_index()
642 err = -EINVAL; in ovl_verify_index()
643 if (index->d_name.len < sizeof(struct ovl_fb)*2) in ovl_verify_index()
646 err = -ENOMEM; in ovl_verify_index()
647 len = index->d_name.len / 2; in ovl_verify_index()
652 err = -EINVAL; in ovl_verify_index()
653 if (hex2bin(fh->buf, index->d_name.name, len)) in ovl_verify_index()
656 err = ovl_check_fb_len(&fh->fb, len); in ovl_verify_index()
663 * of the overlay inode). These entries contain no origin xattr. in ovl_verify_index()
672 if (d_is_dir(index) && !ofs->config.nfs_export) in ovl_verify_index()
677 * real upper dir. Non-dir index entries are hardlinks to the upper in ovl_verify_index()
678 * real inode. For non-dir index, we can read the copy up origin xattr in ovl_verify_index()
691 if (err == -ESTALE) in ovl_verify_index()
694 err = -ESTALE; in ovl_verify_index()
703 /* Check if non-dir index is orphan and don't warn before cleaning it */ in ovl_verify_index()
704 if (!d_is_dir(index) && d_inode(index)->i_nlink == 1) { in ovl_verify_index()
709 if (ovl_get_nlink(ofs, origin.dentry, index, 0) == 0) in ovl_verify_index()
714 dput(origin.dentry); in ovl_verify_index()
719 pr_warn_ratelimited("failed to verify index (%pd2, ftype=%x, err=%i)\n", in ovl_verify_index()
720 index, d_inode(index)->i_mode & S_IFMT, err); in ovl_verify_index()
724 pr_warn_ratelimited("orphan index entry (%pd2, ftype=%x, nlink=%u)\n", in ovl_verify_index()
725 index, d_inode(index)->i_mode & S_IFMT, in ovl_verify_index()
726 d_inode(index)->i_nlink); in ovl_verify_index()
727 err = -ENOENT; in ovl_verify_index()
735 n = kcalloc(fh->fb.len, 2, GFP_KERNEL); in ovl_get_index_name_fh()
737 return -ENOMEM; in ovl_get_index_name_fh()
739 s = bin2hex(n, fh->buf, fh->fb.len); in ovl_get_index_name_fh()
740 *name = (struct qstr) QSTR_INIT(n, s - n); in ovl_get_index_name_fh()
748 * origin inode. The index entry name is the hex representation of the lower
755 * If the index dentry for a copy up origin inode is positive, but points
761 int ovl_get_index_name(struct ovl_fs *ofs, struct dentry *origin, in ovl_get_index_name() argument
767 fh = ovl_encode_real_fh(ofs, d_inode(origin), false); in ovl_get_index_name()
788 index = lookup_noperm_positive_unlocked(&name, ofs->workdir); in ovl_get_index_fh()
791 if (PTR_ERR(index) == -ENOENT) in ovl_get_index_fh()
797 err = -ESTALE; in ovl_get_index_fh()
799 err = -EIO; in ovl_get_index_fh()
808 struct dentry *origin, bool verify) in ovl_lookup_index() argument
813 bool is_dir = d_is_dir(origin); in ovl_lookup_index()
816 err = ovl_get_index_name(ofs, origin, &name); in ovl_lookup_index()
821 ofs->workdir); in ovl_lookup_index()
824 if (err == -ENOENT) { in ovl_lookup_index()
829 "overlayfs: mount with '-o index=off' to disable inodes index.\n", in ovl_lookup_index()
830 d_inode(origin)->i_ino, name.len, name.name, in ovl_lookup_index()
844 index = ERR_PTR(-ESTALE); in ovl_lookup_index()
847 inode_wrong_type(inode, d_inode(origin)->i_mode)) { in ovl_lookup_index()
849 * Index should always be of the same file type as origin in ovl_lookup_index()
852 * unlinked, which means that finding a lower origin on lookup in ovl_lookup_index()
855 pr_warn_ratelimited("bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n", in ovl_lookup_index()
856 index, d_inode(index)->i_mode & S_IFMT, in ovl_lookup_index()
857 d_inode(origin)->i_mode & S_IFMT); in ovl_lookup_index()
861 pr_warn_ratelimited("suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n", in ovl_lookup_index()
862 origin, index); in ovl_lookup_index()
869 if (err == -ESTALE) { in ovl_lookup_index()
870 …pr_warn_ratelimited("suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2)… in ovl_lookup_index()
871 upper, origin, index); in ovl_lookup_index()
889 index = ERR_PTR(-EIO); in ovl_lookup_index()
895 * Returns -1 if this is the last layer.
906 if (path->dentry) { in ovl_path_next()
907 *layer = &OVL_FS(dentry->d_sb)->layers[0]; in ovl_path_next()
908 return ovl_numlower(oe) ? 1 : -1; in ovl_path_next()
913 path->dentry = lowerstack[idx - 1].dentry; in ovl_path_next()
914 *layer = lowerstack[idx - 1].layer; in ovl_path_next()
915 path->mnt = (*layer)->mnt; in ovl_path_next()
917 return (idx < ovl_numlower(oe)) ? idx + 1 : -1; in ovl_path_next()
920 /* Fix missing 'origin' xattr */
940 err = ovl_set_impure(dentry->d_parent, upper->d_parent); in ovl_fix_origin()
950 struct ovl_fs *ofs = OVL_FS(dentry->d_sb); in ovl_maybe_validate_verity()
955 if (!ofs->config.verity_mode || in ovl_maybe_validate_verity()
961 if (ofs->config.verity_mode == OVL_VERITY_REQUIRE) { in ovl_maybe_validate_verity()
964 return -EIO; in ovl_maybe_validate_verity()
971 return -EIO; in ovl_maybe_validate_verity()
975 return -EIO; in ovl_maybe_validate_verity()
984 old_cred = ovl_override_creds(dentry->d_sb); in ovl_maybe_validate_verity()
1011 return -EIO; in ovl_maybe_lookup_lowerdata()
1022 old_cred = ovl_override_creds(dentry->d_sb); in ovl_maybe_lookup_lowerdata()
1060 * drive). This can allow a non-readable file or directory to become readable.
1067 struct ovl_fs *ofs = OVL_FS(d->sb); in ovl_check_follow_redirect()
1069 if (d->metacopy && !ofs->config.metacopy) { in ovl_check_follow_redirect()
1070 pr_warn_ratelimited("refusing to follow metacopy origin for (%pd2)\n", d->dentry); in ovl_check_follow_redirect()
1073 if ((d->redirect || d->upperredirect) && !ovl_redirect_follow(ofs)) { in ovl_check_follow_redirect()
1074 pr_warn_ratelimited("refusing to follow redirect for (%pd2)\n", d->dentry); in ovl_check_follow_redirect()
1085 struct ovl_fs *ofs = OVL_FS(dentry->d_sb); in ovl_lookup()
1086 struct ovl_entry *poe = OVL_E(dentry->d_parent); in ovl_lookup()
1087 struct ovl_entry *roe = OVL_E(dentry->d_sb->s_root); in ovl_lookup()
1090 struct dentry *origin = NULL; in ovl_lookup() local
1095 bool check_redirect = (ovl_redirect_follow(ofs) || ofs->numdatalayer); in ovl_lookup()
1102 .sb = dentry->d_sb, in ovl_lookup()
1104 .name = dentry->d_name, in ovl_lookup()
1114 if (dentry->d_name.len > ofs->namelen) in ovl_lookup()
1115 return ERR_PTR(-ENAMETOOLONG); in ovl_lookup()
1117 old_cred = ovl_override_creds(dentry->d_sb); in ovl_lookup()
1118 upperdir = ovl_dentry_upper(dentry->d_parent); in ovl_lookup()
1120 d.layer = &ofs->layers[0]; in ovl_lookup()
1125 if (upperdentry && upperdentry->d_flags & DCACHE_OP_REAL) { in ovl_lookup()
1127 err = -EREMOTE; in ovl_lookup()
1132 * Lookup copy up origin by decoding origin file handle. in ovl_lookup()
1134 * because we only need to hold the origin inode in in ovl_lookup()
1138 * number - it's the same as if we held a reference in ovl_lookup()
1151 err = -ENOMEM; in ovl_lookup()
1162 err = -ENOMEM; in ovl_lookup()
1163 stack = ovl_stack_alloc(ofs->numlayer - 1); in ovl_lookup()
1172 err = -EPERM; in ovl_lookup()
1177 d.last = i == ovl_numlower(poe) - 1; in ovl_lookup()
1178 else if (d.is_dir || !ofs->numdatalayer) in ovl_lookup()
1179 d.last = lower.layer->idx == ovl_numlower(roe); in ovl_lookup()
1190 * If no origin fh is stored in upper of a merge dir, store fh in ovl_lookup()
1193 if (upperdentry && !ctr && !ofs->noxattr && d.is_dir) { in ovl_lookup()
1203 * lower dir that does not match a stored origin xattr. In any in ovl_lookup()
1204 * case, only verified origin is used for index lookup. in ovl_lookup()
1206 * For non-dir dentry, if index=on, then ensure origin in ovl_lookup()
1211 ((d.is_dir && ovl_verify_lower(dentry->d_sb)) || in ovl_lookup()
1212 (!d.is_dir && ofs->config.index && origin_path))) { in ovl_lookup()
1220 origin = this; in ovl_lookup()
1247 i = lower.layer->idx - 1; in ovl_lookup()
1252 * Defer lookup of lowerdata in data-only layers to first access. in ovl_lookup()
1255 if (d.metacopy && ctr && ofs->numdatalayer && d.absolute_redirect) { in ovl_lookup()
1259 err = -EPERM; in ovl_lookup()
1264 * For regular non-metacopy upper dentries, there is no lower in ovl_lookup()
1266 * using ORIGIN xattr on upper, install it in stack. in ovl_lookup()
1272 pr_warn_ratelimited("metacopy with no lower data found - abort lookup (%pd2)\n", in ovl_lookup()
1274 err = -EIO; in ovl_lookup()
1278 err = -EIO; in ovl_lookup()
1283 origin = origin_path->dentry; in ovl_lookup()
1288 * Always lookup index if there is no-upperdentry. in ovl_lookup()
1290 * For the case of upperdentry, we have set origin by now if it in ovl_lookup()
1295 * matches origin, otherwise dir index entries may be inconsistent in ovl_lookup()
1298 * For regular upper, we already set origin if upper had ORIGIN in ovl_lookup()
1302 * For metacopy upper, we set a verified origin already if index in ovl_lookup()
1303 * is enabled and if upper had an ORIGIN xattr. in ovl_lookup()
1307 origin = stack[0].dentry; in ovl_lookup()
1309 if (origin && ovl_indexdir(dentry->d_sb) && in ovl_lookup()
1310 (!d.is_dir || ovl_index_all(dentry->d_sb))) { in ovl_lookup()
1311 index = ovl_lookup_index(ofs, upperdentry, origin, true); in ovl_lookup()
1321 err = -ENOMEM; in ovl_lookup()
1343 * assignment happens only if upperdentry is non-NULL, and in ovl_lookup()
1360 err = -EPERM; in ovl_lookup()
1374 if (ctr > 1 && !d.is_dir && !stack[ctr - 1].dentry) { in ovl_lookup()
1378 inode = ovl_get_inode(dentry->d_sb, &oip); in ovl_lookup()
1393 dput(origin_path->dentry); in ovl_lookup()
1408 dput(origin_path->dentry); in ovl_lookup()
1421 struct ovl_entry *poe = OVL_E(dentry->d_parent); in ovl_lower_positive()
1422 const struct qstr *name = &dentry->d_name; in ovl_lower_positive()
1432 if (!dentry->d_inode) in ovl_lower_positive()
1435 /* Negative upper -> positive lower */ in ovl_lower_positive()
1439 old_cred = ovl_override_creds(dentry->d_sb); in ovl_lower_positive()
1440 /* Positive upper -> have to look up lower to see whether it exists */ in ovl_lower_positive()
1446 * We need to make a non-const copy of dentry->d_name, in ovl_lower_positive()
1451 mnt_idmap(parentpath->layer->mnt), in ovl_lower_positive()
1452 &QSTR_LEN(name->name, name->len), in ovl_lower_positive()
1453 parentpath->dentry); in ovl_lower_positive()
1456 case -ENOENT: in ovl_lower_positive()
1457 case -ENAMETOOLONG: in ovl_lower_positive()
1471 .mnt = parentpath->layer->mnt, in ovl_lower_positive()
1473 positive = !ovl_path_is_whiteout(OVL_FS(dentry->d_sb), &path); in ovl_lower_positive()