dir.c 33 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. *
  4. * Copyright (C) 2011 Novell Inc.
  5. */
  6. #include <linux/fs.h>
  7. #include <linux/namei.h>
  8. #include <linux/xattr.h>
  9. #include <linux/security.h>
  10. #include <linux/cred.h>
  11. #include <linux/module.h>
  12. #include <linux/posix_acl.h>
  13. #include <linux/posix_acl_xattr.h>
  14. #include <linux/atomic.h>
  15. #include <linux/ratelimit.h>
  16. #include <linux/backing-file.h>
  17. #include "overlayfs.h"
  18. static unsigned short ovl_redirect_max = 256;
  19. module_param_named(redirect_max, ovl_redirect_max, ushort, 0644);
  20. MODULE_PARM_DESC(redirect_max,
  21. "Maximum length of absolute redirect xattr value");
  22. static int ovl_set_redirect(struct dentry *dentry, bool samedir);
  23. int ovl_cleanup(struct ovl_fs *ofs, struct inode *wdir, struct dentry *wdentry)
  24. {
  25. int err;
  26. dget(wdentry);
  27. if (d_is_dir(wdentry))
  28. err = ovl_do_rmdir(ofs, wdir, wdentry);
  29. else
  30. err = ovl_do_unlink(ofs, wdir, wdentry);
  31. dput(wdentry);
  32. if (err) {
  33. pr_err("cleanup of '%pd2' failed (%i)\n",
  34. wdentry, err);
  35. }
  36. return err;
  37. }
  38. struct dentry *ovl_lookup_temp(struct ovl_fs *ofs, struct dentry *workdir)
  39. {
  40. struct dentry *temp;
  41. char name[20];
  42. static atomic_t temp_id = ATOMIC_INIT(0);
  43. /* counter is allowed to wrap, since temp dentries are ephemeral */
  44. snprintf(name, sizeof(name), "#%x", atomic_inc_return(&temp_id));
  45. temp = ovl_lookup_upper(ofs, name, workdir, strlen(name));
  46. if (!IS_ERR(temp) && temp->d_inode) {
  47. pr_err("workdir/%s already exists\n", name);
  48. dput(temp);
  49. temp = ERR_PTR(-EIO);
  50. }
  51. return temp;
  52. }
  53. /* caller holds i_mutex on workdir */
  54. static struct dentry *ovl_whiteout(struct ovl_fs *ofs)
  55. {
  56. int err;
  57. struct dentry *whiteout;
  58. struct dentry *workdir = ofs->workdir;
  59. struct inode *wdir = workdir->d_inode;
  60. if (!ofs->whiteout) {
  61. whiteout = ovl_lookup_temp(ofs, workdir);
  62. if (IS_ERR(whiteout))
  63. goto out;
  64. err = ovl_do_whiteout(ofs, wdir, whiteout);
  65. if (err) {
  66. dput(whiteout);
  67. whiteout = ERR_PTR(err);
  68. goto out;
  69. }
  70. ofs->whiteout = whiteout;
  71. }
  72. if (!ofs->no_shared_whiteout) {
  73. whiteout = ovl_lookup_temp(ofs, workdir);
  74. if (IS_ERR(whiteout))
  75. goto out;
  76. err = ovl_do_link(ofs, ofs->whiteout, wdir, whiteout);
  77. if (!err)
  78. goto out;
  79. if (err != -EMLINK) {
  80. pr_warn("Failed to link whiteout - disabling whiteout inode sharing(nlink=%u, err=%i)\n",
  81. ofs->whiteout->d_inode->i_nlink, err);
  82. ofs->no_shared_whiteout = true;
  83. }
  84. dput(whiteout);
  85. }
  86. whiteout = ofs->whiteout;
  87. ofs->whiteout = NULL;
  88. out:
  89. return whiteout;
  90. }
  91. /* Caller must hold i_mutex on both workdir and dir */
  92. int ovl_cleanup_and_whiteout(struct ovl_fs *ofs, struct inode *dir,
  93. struct dentry *dentry)
  94. {
  95. struct inode *wdir = ofs->workdir->d_inode;
  96. struct dentry *whiteout;
  97. int err;
  98. int flags = 0;
  99. whiteout = ovl_whiteout(ofs);
  100. err = PTR_ERR(whiteout);
  101. if (IS_ERR(whiteout))
  102. return err;
  103. if (d_is_dir(dentry))
  104. flags = RENAME_EXCHANGE;
  105. err = ovl_do_rename(ofs, wdir, whiteout, dir, dentry, flags);
  106. if (err)
  107. goto kill_whiteout;
  108. if (flags)
  109. ovl_cleanup(ofs, wdir, dentry);
  110. out:
  111. dput(whiteout);
  112. return err;
  113. kill_whiteout:
  114. ovl_cleanup(ofs, wdir, whiteout);
  115. goto out;
  116. }
  117. int ovl_mkdir_real(struct ovl_fs *ofs, struct inode *dir,
  118. struct dentry **newdentry, umode_t mode)
  119. {
  120. int err;
  121. struct dentry *d, *dentry = *newdentry;
  122. err = ovl_do_mkdir(ofs, dir, dentry, mode);
  123. if (err)
  124. return err;
  125. if (likely(!d_unhashed(dentry)))
  126. return 0;
  127. /*
  128. * vfs_mkdir() may succeed and leave the dentry passed
  129. * to it unhashed and negative. If that happens, try to
  130. * lookup a new hashed and positive dentry.
  131. */
  132. d = ovl_lookup_upper(ofs, dentry->d_name.name, dentry->d_parent,
  133. dentry->d_name.len);
  134. if (IS_ERR(d)) {
  135. pr_warn("failed lookup after mkdir (%pd2, err=%i).\n",
  136. dentry, err);
  137. return PTR_ERR(d);
  138. }
  139. dput(dentry);
  140. *newdentry = d;
  141. return 0;
  142. }
  143. struct dentry *ovl_create_real(struct ovl_fs *ofs, struct inode *dir,
  144. struct dentry *newdentry, struct ovl_cattr *attr)
  145. {
  146. int err;
  147. if (IS_ERR(newdentry))
  148. return newdentry;
  149. err = -ESTALE;
  150. if (newdentry->d_inode)
  151. goto out;
  152. if (attr->hardlink) {
  153. err = ovl_do_link(ofs, attr->hardlink, dir, newdentry);
  154. } else {
  155. switch (attr->mode & S_IFMT) {
  156. case S_IFREG:
  157. err = ovl_do_create(ofs, dir, newdentry, attr->mode);
  158. break;
  159. case S_IFDIR:
  160. /* mkdir is special... */
  161. err = ovl_mkdir_real(ofs, dir, &newdentry, attr->mode);
  162. break;
  163. case S_IFCHR:
  164. case S_IFBLK:
  165. case S_IFIFO:
  166. case S_IFSOCK:
  167. err = ovl_do_mknod(ofs, dir, newdentry, attr->mode,
  168. attr->rdev);
  169. break;
  170. case S_IFLNK:
  171. err = ovl_do_symlink(ofs, dir, newdentry, attr->link);
  172. break;
  173. default:
  174. err = -EPERM;
  175. }
  176. }
  177. if (!err && WARN_ON(!newdentry->d_inode)) {
  178. /*
  179. * Not quite sure if non-instantiated dentry is legal or not.
  180. * VFS doesn't seem to care so check and warn here.
  181. */
  182. err = -EIO;
  183. }
  184. out:
  185. if (err) {
  186. dput(newdentry);
  187. return ERR_PTR(err);
  188. }
  189. return newdentry;
  190. }
  191. struct dentry *ovl_create_temp(struct ovl_fs *ofs, struct dentry *workdir,
  192. struct ovl_cattr *attr)
  193. {
  194. return ovl_create_real(ofs, d_inode(workdir),
  195. ovl_lookup_temp(ofs, workdir), attr);
  196. }
  197. static int ovl_set_opaque_xerr(struct dentry *dentry, struct dentry *upper,
  198. int xerr)
  199. {
  200. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  201. int err;
  202. err = ovl_check_setxattr(ofs, upper, OVL_XATTR_OPAQUE, "y", 1, xerr);
  203. if (!err)
  204. ovl_dentry_set_opaque(dentry);
  205. return err;
  206. }
  207. static int ovl_set_opaque(struct dentry *dentry, struct dentry *upperdentry)
  208. {
  209. /*
  210. * Fail with -EIO when trying to create opaque dir and upper doesn't
  211. * support xattrs. ovl_rename() calls ovl_set_opaque_xerr(-EXDEV) to
  212. * return a specific error for noxattr case.
  213. */
  214. return ovl_set_opaque_xerr(dentry, upperdentry, -EIO);
  215. }
  216. /*
  217. * Common operations required to be done after creation of file on upper.
  218. * If @hardlink is false, then @inode is a pre-allocated inode, we may or
  219. * may not use to instantiate the new dentry.
  220. */
  221. static int ovl_instantiate(struct dentry *dentry, struct inode *inode,
  222. struct dentry *newdentry, bool hardlink, struct file *tmpfile)
  223. {
  224. struct ovl_inode_params oip = {
  225. .upperdentry = newdentry,
  226. .newinode = inode,
  227. };
  228. ovl_dentry_set_upper_alias(dentry);
  229. ovl_dentry_init_reval(dentry, newdentry, NULL);
  230. if (!hardlink) {
  231. /*
  232. * ovl_obtain_alias() can be called after ovl_create_real()
  233. * and before we get here, so we may get an inode from cache
  234. * with the same real upperdentry that is not the inode we
  235. * pre-allocated. In this case we will use the cached inode
  236. * to instantiate the new dentry.
  237. *
  238. * XXX: if we ever use ovl_obtain_alias() to decode directory
  239. * file handles, need to use ovl_get_inode_locked() and
  240. * d_instantiate_new() here to prevent from creating two
  241. * hashed directory inode aliases.
  242. */
  243. inode = ovl_get_inode(dentry->d_sb, &oip);
  244. if (IS_ERR(inode))
  245. return PTR_ERR(inode);
  246. if (inode == oip.newinode)
  247. ovl_set_flag(OVL_UPPERDATA, inode);
  248. } else {
  249. WARN_ON(ovl_inode_real(inode) != d_inode(newdentry));
  250. dput(newdentry);
  251. inc_nlink(inode);
  252. }
  253. if (tmpfile)
  254. d_mark_tmpfile(tmpfile, inode);
  255. d_instantiate(dentry, inode);
  256. if (inode != oip.newinode) {
  257. pr_warn_ratelimited("newly created inode found in cache (%pd2)\n",
  258. dentry);
  259. }
  260. /* Force lookup of new upper hardlink to find its lower */
  261. if (hardlink)
  262. d_drop(dentry);
  263. return 0;
  264. }
  265. static bool ovl_type_merge(struct dentry *dentry)
  266. {
  267. return OVL_TYPE_MERGE(ovl_path_type(dentry));
  268. }
  269. static bool ovl_type_origin(struct dentry *dentry)
  270. {
  271. return OVL_TYPE_ORIGIN(ovl_path_type(dentry));
  272. }
  273. static int ovl_create_upper(struct dentry *dentry, struct inode *inode,
  274. struct ovl_cattr *attr)
  275. {
  276. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  277. struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
  278. struct inode *udir = upperdir->d_inode;
  279. struct dentry *newdentry;
  280. int err;
  281. inode_lock_nested(udir, I_MUTEX_PARENT);
  282. newdentry = ovl_create_real(ofs, udir,
  283. ovl_lookup_upper(ofs, dentry->d_name.name,
  284. upperdir, dentry->d_name.len),
  285. attr);
  286. err = PTR_ERR(newdentry);
  287. if (IS_ERR(newdentry))
  288. goto out_unlock;
  289. if (ovl_type_merge(dentry->d_parent) && d_is_dir(newdentry) &&
  290. !ovl_allow_offline_changes(ofs)) {
  291. /* Setting opaque here is just an optimization, allow to fail */
  292. ovl_set_opaque(dentry, newdentry);
  293. }
  294. ovl_dir_modified(dentry->d_parent, false);
  295. err = ovl_instantiate(dentry, inode, newdentry, !!attr->hardlink, NULL);
  296. if (err)
  297. goto out_cleanup;
  298. out_unlock:
  299. inode_unlock(udir);
  300. return err;
  301. out_cleanup:
  302. ovl_cleanup(ofs, udir, newdentry);
  303. dput(newdentry);
  304. goto out_unlock;
  305. }
  306. static struct dentry *ovl_clear_empty(struct dentry *dentry,
  307. struct list_head *list)
  308. {
  309. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  310. struct dentry *workdir = ovl_workdir(dentry);
  311. struct inode *wdir = workdir->d_inode;
  312. struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
  313. struct inode *udir = upperdir->d_inode;
  314. struct path upperpath;
  315. struct dentry *upper;
  316. struct dentry *opaquedir;
  317. struct kstat stat;
  318. int err;
  319. if (WARN_ON(!workdir))
  320. return ERR_PTR(-EROFS);
  321. err = ovl_lock_rename_workdir(workdir, upperdir);
  322. if (err)
  323. goto out;
  324. ovl_path_upper(dentry, &upperpath);
  325. err = vfs_getattr(&upperpath, &stat,
  326. STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
  327. if (err)
  328. goto out_unlock;
  329. err = -ESTALE;
  330. if (!S_ISDIR(stat.mode))
  331. goto out_unlock;
  332. upper = upperpath.dentry;
  333. if (upper->d_parent->d_inode != udir)
  334. goto out_unlock;
  335. opaquedir = ovl_create_temp(ofs, workdir, OVL_CATTR(stat.mode));
  336. err = PTR_ERR(opaquedir);
  337. if (IS_ERR(opaquedir))
  338. goto out_unlock;
  339. err = ovl_copy_xattr(dentry->d_sb, &upperpath, opaquedir);
  340. if (err)
  341. goto out_cleanup;
  342. err = ovl_set_opaque(dentry, opaquedir);
  343. if (err)
  344. goto out_cleanup;
  345. inode_lock(opaquedir->d_inode);
  346. err = ovl_set_attr(ofs, opaquedir, &stat);
  347. inode_unlock(opaquedir->d_inode);
  348. if (err)
  349. goto out_cleanup;
  350. err = ovl_do_rename(ofs, wdir, opaquedir, udir, upper, RENAME_EXCHANGE);
  351. if (err)
  352. goto out_cleanup;
  353. ovl_cleanup_whiteouts(ofs, upper, list);
  354. ovl_cleanup(ofs, wdir, upper);
  355. unlock_rename(workdir, upperdir);
  356. /* dentry's upper doesn't match now, get rid of it */
  357. d_drop(dentry);
  358. return opaquedir;
  359. out_cleanup:
  360. ovl_cleanup(ofs, wdir, opaquedir);
  361. dput(opaquedir);
  362. out_unlock:
  363. unlock_rename(workdir, upperdir);
  364. out:
  365. return ERR_PTR(err);
  366. }
  367. static int ovl_set_upper_acl(struct ovl_fs *ofs, struct dentry *upperdentry,
  368. const char *acl_name, struct posix_acl *acl)
  369. {
  370. if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !acl)
  371. return 0;
  372. return ovl_do_set_acl(ofs, upperdentry, acl_name, acl);
  373. }
  374. static int ovl_create_over_whiteout(struct dentry *dentry, struct inode *inode,
  375. struct ovl_cattr *cattr)
  376. {
  377. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  378. struct dentry *workdir = ovl_workdir(dentry);
  379. struct inode *wdir = workdir->d_inode;
  380. struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
  381. struct inode *udir = upperdir->d_inode;
  382. struct dentry *upper;
  383. struct dentry *newdentry;
  384. int err;
  385. struct posix_acl *acl, *default_acl;
  386. bool hardlink = !!cattr->hardlink;
  387. if (WARN_ON(!workdir))
  388. return -EROFS;
  389. if (!hardlink) {
  390. err = posix_acl_create(dentry->d_parent->d_inode,
  391. &cattr->mode, &default_acl, &acl);
  392. if (err)
  393. return err;
  394. }
  395. err = ovl_lock_rename_workdir(workdir, upperdir);
  396. if (err)
  397. goto out;
  398. upper = ovl_lookup_upper(ofs, dentry->d_name.name, upperdir,
  399. dentry->d_name.len);
  400. err = PTR_ERR(upper);
  401. if (IS_ERR(upper))
  402. goto out_unlock;
  403. err = -ESTALE;
  404. if (d_is_negative(upper) || !ovl_upper_is_whiteout(ofs, upper))
  405. goto out_dput;
  406. newdentry = ovl_create_temp(ofs, workdir, cattr);
  407. err = PTR_ERR(newdentry);
  408. if (IS_ERR(newdentry))
  409. goto out_dput;
  410. /*
  411. * mode could have been mutilated due to umask (e.g. sgid directory)
  412. */
  413. if (!hardlink &&
  414. !S_ISLNK(cattr->mode) &&
  415. newdentry->d_inode->i_mode != cattr->mode) {
  416. struct iattr attr = {
  417. .ia_valid = ATTR_MODE,
  418. .ia_mode = cattr->mode,
  419. };
  420. inode_lock(newdentry->d_inode);
  421. err = ovl_do_notify_change(ofs, newdentry, &attr);
  422. inode_unlock(newdentry->d_inode);
  423. if (err)
  424. goto out_cleanup;
  425. }
  426. if (!hardlink) {
  427. err = ovl_set_upper_acl(ofs, newdentry,
  428. XATTR_NAME_POSIX_ACL_ACCESS, acl);
  429. if (err)
  430. goto out_cleanup;
  431. err = ovl_set_upper_acl(ofs, newdentry,
  432. XATTR_NAME_POSIX_ACL_DEFAULT, default_acl);
  433. if (err)
  434. goto out_cleanup;
  435. }
  436. if (!hardlink && S_ISDIR(cattr->mode)) {
  437. err = ovl_set_opaque(dentry, newdentry);
  438. if (err)
  439. goto out_cleanup;
  440. err = ovl_do_rename(ofs, wdir, newdentry, udir, upper,
  441. RENAME_EXCHANGE);
  442. if (err)
  443. goto out_cleanup;
  444. ovl_cleanup(ofs, wdir, upper);
  445. } else {
  446. err = ovl_do_rename(ofs, wdir, newdentry, udir, upper, 0);
  447. if (err)
  448. goto out_cleanup;
  449. }
  450. ovl_dir_modified(dentry->d_parent, false);
  451. err = ovl_instantiate(dentry, inode, newdentry, hardlink, NULL);
  452. if (err) {
  453. ovl_cleanup(ofs, udir, newdentry);
  454. dput(newdentry);
  455. }
  456. out_dput:
  457. dput(upper);
  458. out_unlock:
  459. unlock_rename(workdir, upperdir);
  460. out:
  461. if (!hardlink) {
  462. posix_acl_release(acl);
  463. posix_acl_release(default_acl);
  464. }
  465. return err;
  466. out_cleanup:
  467. ovl_cleanup(ofs, wdir, newdentry);
  468. dput(newdentry);
  469. goto out_dput;
  470. }
  471. static int ovl_setup_cred_for_create(struct dentry *dentry, struct inode *inode,
  472. umode_t mode, const struct cred *old_cred)
  473. {
  474. int err;
  475. struct cred *override_cred;
  476. override_cred = prepare_creds();
  477. if (!override_cred)
  478. return -ENOMEM;
  479. override_cred->fsuid = inode->i_uid;
  480. override_cred->fsgid = inode->i_gid;
  481. err = security_dentry_create_files_as(dentry, mode, &dentry->d_name,
  482. old_cred, override_cred);
  483. if (err) {
  484. put_cred(override_cred);
  485. return err;
  486. }
  487. put_cred(override_creds(override_cred));
  488. put_cred(override_cred);
  489. return 0;
  490. }
  491. static int ovl_create_or_link(struct dentry *dentry, struct inode *inode,
  492. struct ovl_cattr *attr, bool origin)
  493. {
  494. int err;
  495. const struct cred *old_cred;
  496. struct dentry *parent = dentry->d_parent;
  497. old_cred = ovl_override_creds(dentry->d_sb);
  498. /*
  499. * When linking a file with copy up origin into a new parent, mark the
  500. * new parent dir "impure".
  501. */
  502. if (origin) {
  503. err = ovl_set_impure(parent, ovl_dentry_upper(parent));
  504. if (err)
  505. goto out_revert_creds;
  506. }
  507. if (!attr->hardlink) {
  508. /*
  509. * In the creation cases(create, mkdir, mknod, symlink),
  510. * ovl should transfer current's fs{u,g}id to underlying
  511. * fs. Because underlying fs want to initialize its new
  512. * inode owner using current's fs{u,g}id. And in this
  513. * case, the @inode is a new inode that is initialized
  514. * in inode_init_owner() to current's fs{u,g}id. So use
  515. * the inode's i_{u,g}id to override the cred's fs{u,g}id.
  516. *
  517. * But in the other hardlink case, ovl_link() does not
  518. * create a new inode, so just use the ovl mounter's
  519. * fs{u,g}id.
  520. */
  521. err = ovl_setup_cred_for_create(dentry, inode, attr->mode, old_cred);
  522. if (err)
  523. goto out_revert_creds;
  524. }
  525. if (!ovl_dentry_is_whiteout(dentry))
  526. err = ovl_create_upper(dentry, inode, attr);
  527. else
  528. err = ovl_create_over_whiteout(dentry, inode, attr);
  529. out_revert_creds:
  530. revert_creds(old_cred);
  531. return err;
  532. }
  533. static int ovl_create_object(struct dentry *dentry, int mode, dev_t rdev,
  534. const char *link)
  535. {
  536. int err;
  537. struct inode *inode;
  538. struct ovl_cattr attr = {
  539. .rdev = rdev,
  540. .link = link,
  541. };
  542. err = ovl_copy_up(dentry->d_parent);
  543. if (err)
  544. return err;
  545. err = ovl_want_write(dentry);
  546. if (err)
  547. goto out;
  548. /* Preallocate inode to be used by ovl_get_inode() */
  549. err = -ENOMEM;
  550. inode = ovl_new_inode(dentry->d_sb, mode, rdev);
  551. if (!inode)
  552. goto out_drop_write;
  553. spin_lock(&inode->i_lock);
  554. inode->i_state |= I_CREATING;
  555. spin_unlock(&inode->i_lock);
  556. inode_init_owner(&nop_mnt_idmap, inode, dentry->d_parent->d_inode, mode);
  557. attr.mode = inode->i_mode;
  558. err = ovl_create_or_link(dentry, inode, &attr, false);
  559. /* Did we end up using the preallocated inode? */
  560. if (inode != d_inode(dentry))
  561. iput(inode);
  562. out_drop_write:
  563. ovl_drop_write(dentry);
  564. out:
  565. return err;
  566. }
  567. static int ovl_create(struct mnt_idmap *idmap, struct inode *dir,
  568. struct dentry *dentry, umode_t mode, bool excl)
  569. {
  570. return ovl_create_object(dentry, (mode & 07777) | S_IFREG, 0, NULL);
  571. }
  572. static int ovl_mkdir(struct mnt_idmap *idmap, struct inode *dir,
  573. struct dentry *dentry, umode_t mode)
  574. {
  575. return ovl_create_object(dentry, (mode & 07777) | S_IFDIR, 0, NULL);
  576. }
  577. static int ovl_mknod(struct mnt_idmap *idmap, struct inode *dir,
  578. struct dentry *dentry, umode_t mode, dev_t rdev)
  579. {
  580. /* Don't allow creation of "whiteout" on overlay */
  581. if (S_ISCHR(mode) && rdev == WHITEOUT_DEV)
  582. return -EPERM;
  583. return ovl_create_object(dentry, mode, rdev, NULL);
  584. }
  585. static int ovl_symlink(struct mnt_idmap *idmap, struct inode *dir,
  586. struct dentry *dentry, const char *link)
  587. {
  588. return ovl_create_object(dentry, S_IFLNK, 0, link);
  589. }
  590. static int ovl_set_link_redirect(struct dentry *dentry)
  591. {
  592. const struct cred *old_cred;
  593. int err;
  594. old_cred = ovl_override_creds(dentry->d_sb);
  595. err = ovl_set_redirect(dentry, false);
  596. revert_creds(old_cred);
  597. return err;
  598. }
  599. static int ovl_link(struct dentry *old, struct inode *newdir,
  600. struct dentry *new)
  601. {
  602. int err;
  603. struct inode *inode;
  604. err = ovl_copy_up(old);
  605. if (err)
  606. goto out;
  607. err = ovl_copy_up(new->d_parent);
  608. if (err)
  609. goto out;
  610. err = ovl_nlink_start(old);
  611. if (err)
  612. goto out;
  613. if (ovl_is_metacopy_dentry(old)) {
  614. err = ovl_set_link_redirect(old);
  615. if (err)
  616. goto out_nlink_end;
  617. }
  618. inode = d_inode(old);
  619. ihold(inode);
  620. err = ovl_create_or_link(new, inode,
  621. &(struct ovl_cattr) {.hardlink = ovl_dentry_upper(old)},
  622. ovl_type_origin(old));
  623. if (err)
  624. iput(inode);
  625. out_nlink_end:
  626. ovl_nlink_end(old);
  627. out:
  628. return err;
  629. }
  630. static bool ovl_matches_upper(struct dentry *dentry, struct dentry *upper)
  631. {
  632. return d_inode(ovl_dentry_upper(dentry)) == d_inode(upper);
  633. }
  634. static int ovl_remove_and_whiteout(struct dentry *dentry,
  635. struct list_head *list)
  636. {
  637. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  638. struct dentry *workdir = ovl_workdir(dentry);
  639. struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
  640. struct dentry *upper;
  641. struct dentry *opaquedir = NULL;
  642. int err;
  643. if (WARN_ON(!workdir))
  644. return -EROFS;
  645. if (!list_empty(list)) {
  646. opaquedir = ovl_clear_empty(dentry, list);
  647. err = PTR_ERR(opaquedir);
  648. if (IS_ERR(opaquedir))
  649. goto out;
  650. }
  651. err = ovl_lock_rename_workdir(workdir, upperdir);
  652. if (err)
  653. goto out_dput;
  654. upper = ovl_lookup_upper(ofs, dentry->d_name.name, upperdir,
  655. dentry->d_name.len);
  656. err = PTR_ERR(upper);
  657. if (IS_ERR(upper))
  658. goto out_unlock;
  659. err = -ESTALE;
  660. if ((opaquedir && upper != opaquedir) ||
  661. (!opaquedir && ovl_dentry_upper(dentry) &&
  662. !ovl_matches_upper(dentry, upper))) {
  663. goto out_dput_upper;
  664. }
  665. err = ovl_cleanup_and_whiteout(ofs, d_inode(upperdir), upper);
  666. if (err)
  667. goto out_d_drop;
  668. ovl_dir_modified(dentry->d_parent, true);
  669. out_d_drop:
  670. d_drop(dentry);
  671. out_dput_upper:
  672. dput(upper);
  673. out_unlock:
  674. unlock_rename(workdir, upperdir);
  675. out_dput:
  676. dput(opaquedir);
  677. out:
  678. return err;
  679. }
  680. static int ovl_remove_upper(struct dentry *dentry, bool is_dir,
  681. struct list_head *list)
  682. {
  683. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  684. struct dentry *upperdir = ovl_dentry_upper(dentry->d_parent);
  685. struct inode *dir = upperdir->d_inode;
  686. struct dentry *upper;
  687. struct dentry *opaquedir = NULL;
  688. int err;
  689. if (!list_empty(list)) {
  690. opaquedir = ovl_clear_empty(dentry, list);
  691. err = PTR_ERR(opaquedir);
  692. if (IS_ERR(opaquedir))
  693. goto out;
  694. }
  695. inode_lock_nested(dir, I_MUTEX_PARENT);
  696. upper = ovl_lookup_upper(ofs, dentry->d_name.name, upperdir,
  697. dentry->d_name.len);
  698. err = PTR_ERR(upper);
  699. if (IS_ERR(upper))
  700. goto out_unlock;
  701. err = -ESTALE;
  702. if ((opaquedir && upper != opaquedir) ||
  703. (!opaquedir && !ovl_matches_upper(dentry, upper)))
  704. goto out_dput_upper;
  705. if (is_dir)
  706. err = ovl_do_rmdir(ofs, dir, upper);
  707. else
  708. err = ovl_do_unlink(ofs, dir, upper);
  709. ovl_dir_modified(dentry->d_parent, ovl_type_origin(dentry));
  710. /*
  711. * Keeping this dentry hashed would mean having to release
  712. * upperpath/lowerpath, which could only be done if we are the
  713. * sole user of this dentry. Too tricky... Just unhash for
  714. * now.
  715. */
  716. if (!err)
  717. d_drop(dentry);
  718. out_dput_upper:
  719. dput(upper);
  720. out_unlock:
  721. inode_unlock(dir);
  722. dput(opaquedir);
  723. out:
  724. return err;
  725. }
  726. static bool ovl_pure_upper(struct dentry *dentry)
  727. {
  728. return !ovl_dentry_lower(dentry) &&
  729. !ovl_test_flag(OVL_WHITEOUTS, d_inode(dentry));
  730. }
  731. static void ovl_drop_nlink(struct dentry *dentry)
  732. {
  733. struct inode *inode = d_inode(dentry);
  734. struct dentry *alias;
  735. /* Try to find another, hashed alias */
  736. spin_lock(&inode->i_lock);
  737. hlist_for_each_entry(alias, &inode->i_dentry, d_u.d_alias) {
  738. if (alias != dentry && !d_unhashed(alias))
  739. break;
  740. }
  741. spin_unlock(&inode->i_lock);
  742. /*
  743. * Changes to underlying layers may cause i_nlink to lose sync with
  744. * reality. In this case prevent the link count from going to zero
  745. * prematurely.
  746. */
  747. if (inode->i_nlink > !!alias)
  748. drop_nlink(inode);
  749. }
  750. static int ovl_do_remove(struct dentry *dentry, bool is_dir)
  751. {
  752. int err;
  753. const struct cred *old_cred;
  754. bool lower_positive = ovl_lower_positive(dentry);
  755. LIST_HEAD(list);
  756. /* No need to clean pure upper removed by vfs_rmdir() */
  757. if (is_dir && (lower_positive || !ovl_pure_upper(dentry))) {
  758. err = ovl_check_empty_dir(dentry, &list);
  759. if (err)
  760. goto out;
  761. }
  762. err = ovl_copy_up(dentry->d_parent);
  763. if (err)
  764. goto out;
  765. err = ovl_nlink_start(dentry);
  766. if (err)
  767. goto out;
  768. old_cred = ovl_override_creds(dentry->d_sb);
  769. if (!lower_positive)
  770. err = ovl_remove_upper(dentry, is_dir, &list);
  771. else
  772. err = ovl_remove_and_whiteout(dentry, &list);
  773. revert_creds(old_cred);
  774. if (!err) {
  775. if (is_dir)
  776. clear_nlink(dentry->d_inode);
  777. else
  778. ovl_drop_nlink(dentry);
  779. }
  780. ovl_nlink_end(dentry);
  781. /*
  782. * Copy ctime
  783. *
  784. * Note: we fail to update ctime if there was no copy-up, only a
  785. * whiteout
  786. */
  787. if (ovl_dentry_upper(dentry))
  788. ovl_copyattr(d_inode(dentry));
  789. out:
  790. ovl_cache_free(&list);
  791. return err;
  792. }
  793. static int ovl_unlink(struct inode *dir, struct dentry *dentry)
  794. {
  795. return ovl_do_remove(dentry, false);
  796. }
  797. static int ovl_rmdir(struct inode *dir, struct dentry *dentry)
  798. {
  799. return ovl_do_remove(dentry, true);
  800. }
  801. static bool ovl_type_merge_or_lower(struct dentry *dentry)
  802. {
  803. enum ovl_path_type type = ovl_path_type(dentry);
  804. return OVL_TYPE_MERGE(type) || !OVL_TYPE_UPPER(type);
  805. }
  806. static bool ovl_can_move(struct dentry *dentry)
  807. {
  808. return ovl_redirect_dir(OVL_FS(dentry->d_sb)) ||
  809. !d_is_dir(dentry) || !ovl_type_merge_or_lower(dentry);
  810. }
  811. static char *ovl_get_redirect(struct dentry *dentry, bool abs_redirect)
  812. {
  813. char *buf, *ret;
  814. struct dentry *d, *tmp;
  815. int buflen = ovl_redirect_max + 1;
  816. if (!abs_redirect) {
  817. ret = kstrndup(dentry->d_name.name, dentry->d_name.len,
  818. GFP_KERNEL);
  819. goto out;
  820. }
  821. buf = ret = kmalloc(buflen, GFP_KERNEL);
  822. if (!buf)
  823. goto out;
  824. buflen--;
  825. buf[buflen] = '\0';
  826. for (d = dget(dentry); !IS_ROOT(d);) {
  827. const char *name;
  828. int thislen;
  829. spin_lock(&d->d_lock);
  830. name = ovl_dentry_get_redirect(d);
  831. if (name) {
  832. thislen = strlen(name);
  833. } else {
  834. name = d->d_name.name;
  835. thislen = d->d_name.len;
  836. }
  837. /* If path is too long, fall back to userspace move */
  838. if (thislen + (name[0] != '/') > buflen) {
  839. ret = ERR_PTR(-EXDEV);
  840. spin_unlock(&d->d_lock);
  841. goto out_put;
  842. }
  843. buflen -= thislen;
  844. memcpy(&buf[buflen], name, thislen);
  845. spin_unlock(&d->d_lock);
  846. tmp = dget_parent(d);
  847. dput(d);
  848. d = tmp;
  849. /* Absolute redirect: finished */
  850. if (buf[buflen] == '/')
  851. break;
  852. buflen--;
  853. buf[buflen] = '/';
  854. }
  855. ret = kstrdup(&buf[buflen], GFP_KERNEL);
  856. out_put:
  857. dput(d);
  858. kfree(buf);
  859. out:
  860. return ret ? ret : ERR_PTR(-ENOMEM);
  861. }
  862. static bool ovl_need_absolute_redirect(struct dentry *dentry, bool samedir)
  863. {
  864. struct dentry *lowerdentry;
  865. if (!samedir)
  866. return true;
  867. if (d_is_dir(dentry))
  868. return false;
  869. /*
  870. * For non-dir hardlinked files, we need absolute redirects
  871. * in general as two upper hardlinks could be in different
  872. * dirs. We could put a relative redirect now and convert
  873. * it to absolute redirect later. But when nlink > 1 and
  874. * indexing is on, that means relative redirect needs to be
  875. * converted to absolute during copy up of another lower
  876. * hardllink as well.
  877. *
  878. * So without optimizing too much, just check if lower is
  879. * a hard link or not. If lower is hard link, put absolute
  880. * redirect.
  881. */
  882. lowerdentry = ovl_dentry_lower(dentry);
  883. return (d_inode(lowerdentry)->i_nlink > 1);
  884. }
  885. static int ovl_set_redirect(struct dentry *dentry, bool samedir)
  886. {
  887. int err;
  888. struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
  889. const char *redirect = ovl_dentry_get_redirect(dentry);
  890. bool absolute_redirect = ovl_need_absolute_redirect(dentry, samedir);
  891. if (redirect && (!absolute_redirect || redirect[0] == '/'))
  892. return 0;
  893. redirect = ovl_get_redirect(dentry, absolute_redirect);
  894. if (IS_ERR(redirect))
  895. return PTR_ERR(redirect);
  896. err = ovl_check_setxattr(ofs, ovl_dentry_upper(dentry),
  897. OVL_XATTR_REDIRECT,
  898. redirect, strlen(redirect), -EXDEV);
  899. if (!err) {
  900. spin_lock(&dentry->d_lock);
  901. ovl_dentry_set_redirect(dentry, redirect);
  902. spin_unlock(&dentry->d_lock);
  903. } else {
  904. kfree(redirect);
  905. pr_warn_ratelimited("failed to set redirect (%i)\n",
  906. err);
  907. /* Fall back to userspace copy-up */
  908. err = -EXDEV;
  909. }
  910. return err;
  911. }
  912. static int ovl_rename(struct mnt_idmap *idmap, struct inode *olddir,
  913. struct dentry *old, struct inode *newdir,
  914. struct dentry *new, unsigned int flags)
  915. {
  916. int err;
  917. struct dentry *old_upperdir;
  918. struct dentry *new_upperdir;
  919. struct dentry *olddentry;
  920. struct dentry *newdentry;
  921. struct dentry *trap;
  922. bool old_opaque;
  923. bool new_opaque;
  924. bool cleanup_whiteout = false;
  925. bool update_nlink = false;
  926. bool overwrite = !(flags & RENAME_EXCHANGE);
  927. bool is_dir = d_is_dir(old);
  928. bool new_is_dir = d_is_dir(new);
  929. bool samedir = olddir == newdir;
  930. struct dentry *opaquedir = NULL;
  931. const struct cred *old_cred = NULL;
  932. struct ovl_fs *ofs = OVL_FS(old->d_sb);
  933. LIST_HEAD(list);
  934. err = -EINVAL;
  935. if (flags & ~(RENAME_EXCHANGE | RENAME_NOREPLACE))
  936. goto out;
  937. flags &= ~RENAME_NOREPLACE;
  938. /* Don't copy up directory trees */
  939. err = -EXDEV;
  940. if (!ovl_can_move(old))
  941. goto out;
  942. if (!overwrite && !ovl_can_move(new))
  943. goto out;
  944. if (overwrite && new_is_dir && !ovl_pure_upper(new)) {
  945. err = ovl_check_empty_dir(new, &list);
  946. if (err)
  947. goto out;
  948. }
  949. if (overwrite) {
  950. if (ovl_lower_positive(old)) {
  951. if (!ovl_dentry_is_whiteout(new)) {
  952. /* Whiteout source */
  953. flags |= RENAME_WHITEOUT;
  954. } else {
  955. /* Switch whiteouts */
  956. flags |= RENAME_EXCHANGE;
  957. }
  958. } else if (is_dir && ovl_dentry_is_whiteout(new)) {
  959. flags |= RENAME_EXCHANGE;
  960. cleanup_whiteout = true;
  961. }
  962. }
  963. err = ovl_copy_up(old);
  964. if (err)
  965. goto out;
  966. err = ovl_copy_up(new->d_parent);
  967. if (err)
  968. goto out;
  969. if (!overwrite) {
  970. err = ovl_copy_up(new);
  971. if (err)
  972. goto out;
  973. } else if (d_inode(new)) {
  974. err = ovl_nlink_start(new);
  975. if (err)
  976. goto out;
  977. update_nlink = true;
  978. }
  979. if (!update_nlink) {
  980. /* ovl_nlink_start() took ovl_want_write() */
  981. err = ovl_want_write(old);
  982. if (err)
  983. goto out;
  984. }
  985. old_cred = ovl_override_creds(old->d_sb);
  986. if (!list_empty(&list)) {
  987. opaquedir = ovl_clear_empty(new, &list);
  988. err = PTR_ERR(opaquedir);
  989. if (IS_ERR(opaquedir)) {
  990. opaquedir = NULL;
  991. goto out_revert_creds;
  992. }
  993. }
  994. old_upperdir = ovl_dentry_upper(old->d_parent);
  995. new_upperdir = ovl_dentry_upper(new->d_parent);
  996. if (!samedir) {
  997. /*
  998. * When moving a merge dir or non-dir with copy up origin into
  999. * a new parent, we are marking the new parent dir "impure".
  1000. * When ovl_iterate() iterates an "impure" upper dir, it will
  1001. * lookup the origin inodes of the entries to fill d_ino.
  1002. */
  1003. if (ovl_type_origin(old)) {
  1004. err = ovl_set_impure(new->d_parent, new_upperdir);
  1005. if (err)
  1006. goto out_revert_creds;
  1007. }
  1008. if (!overwrite && ovl_type_origin(new)) {
  1009. err = ovl_set_impure(old->d_parent, old_upperdir);
  1010. if (err)
  1011. goto out_revert_creds;
  1012. }
  1013. }
  1014. trap = lock_rename(new_upperdir, old_upperdir);
  1015. if (IS_ERR(trap)) {
  1016. err = PTR_ERR(trap);
  1017. goto out_revert_creds;
  1018. }
  1019. olddentry = ovl_lookup_upper(ofs, old->d_name.name, old_upperdir,
  1020. old->d_name.len);
  1021. err = PTR_ERR(olddentry);
  1022. if (IS_ERR(olddentry))
  1023. goto out_unlock;
  1024. err = -ESTALE;
  1025. if (!ovl_matches_upper(old, olddentry))
  1026. goto out_dput_old;
  1027. newdentry = ovl_lookup_upper(ofs, new->d_name.name, new_upperdir,
  1028. new->d_name.len);
  1029. err = PTR_ERR(newdentry);
  1030. if (IS_ERR(newdentry))
  1031. goto out_dput_old;
  1032. old_opaque = ovl_dentry_is_opaque(old);
  1033. new_opaque = ovl_dentry_is_opaque(new);
  1034. err = -ESTALE;
  1035. if (d_inode(new) && ovl_dentry_upper(new)) {
  1036. if (opaquedir) {
  1037. if (newdentry != opaquedir)
  1038. goto out_dput;
  1039. } else {
  1040. if (!ovl_matches_upper(new, newdentry))
  1041. goto out_dput;
  1042. }
  1043. } else {
  1044. if (!d_is_negative(newdentry)) {
  1045. if (!new_opaque || !ovl_upper_is_whiteout(ofs, newdentry))
  1046. goto out_dput;
  1047. } else {
  1048. if (flags & RENAME_EXCHANGE)
  1049. goto out_dput;
  1050. }
  1051. }
  1052. if (olddentry == trap)
  1053. goto out_dput;
  1054. if (newdentry == trap)
  1055. goto out_dput;
  1056. if (olddentry->d_inode == newdentry->d_inode)
  1057. goto out_dput;
  1058. err = 0;
  1059. if (ovl_type_merge_or_lower(old))
  1060. err = ovl_set_redirect(old, samedir);
  1061. else if (is_dir && !old_opaque && ovl_type_merge(new->d_parent))
  1062. err = ovl_set_opaque_xerr(old, olddentry, -EXDEV);
  1063. if (err)
  1064. goto out_dput;
  1065. if (!overwrite && ovl_type_merge_or_lower(new))
  1066. err = ovl_set_redirect(new, samedir);
  1067. else if (!overwrite && new_is_dir && !new_opaque &&
  1068. ovl_type_merge(old->d_parent))
  1069. err = ovl_set_opaque_xerr(new, newdentry, -EXDEV);
  1070. if (err)
  1071. goto out_dput;
  1072. err = ovl_do_rename(ofs, old_upperdir->d_inode, olddentry,
  1073. new_upperdir->d_inode, newdentry, flags);
  1074. if (err)
  1075. goto out_dput;
  1076. if (cleanup_whiteout)
  1077. ovl_cleanup(ofs, old_upperdir->d_inode, newdentry);
  1078. if (overwrite && d_inode(new)) {
  1079. if (new_is_dir)
  1080. clear_nlink(d_inode(new));
  1081. else
  1082. ovl_drop_nlink(new);
  1083. }
  1084. ovl_dir_modified(old->d_parent, ovl_type_origin(old) ||
  1085. (!overwrite && ovl_type_origin(new)));
  1086. ovl_dir_modified(new->d_parent, ovl_type_origin(old) ||
  1087. (d_inode(new) && ovl_type_origin(new)));
  1088. /* copy ctime: */
  1089. ovl_copyattr(d_inode(old));
  1090. if (d_inode(new) && ovl_dentry_upper(new))
  1091. ovl_copyattr(d_inode(new));
  1092. out_dput:
  1093. dput(newdentry);
  1094. out_dput_old:
  1095. dput(olddentry);
  1096. out_unlock:
  1097. unlock_rename(new_upperdir, old_upperdir);
  1098. out_revert_creds:
  1099. revert_creds(old_cred);
  1100. if (update_nlink)
  1101. ovl_nlink_end(new);
  1102. else
  1103. ovl_drop_write(old);
  1104. out:
  1105. dput(opaquedir);
  1106. ovl_cache_free(&list);
  1107. return err;
  1108. }
  1109. static int ovl_create_tmpfile(struct file *file, struct dentry *dentry,
  1110. struct inode *inode, umode_t mode)
  1111. {
  1112. const struct cred *old_cred;
  1113. struct path realparentpath;
  1114. struct file *realfile;
  1115. struct dentry *newdentry;
  1116. /* It's okay to set O_NOATIME, since the owner will be current fsuid */
  1117. int flags = file->f_flags | OVL_OPEN_FLAGS;
  1118. int err;
  1119. old_cred = ovl_override_creds(dentry->d_sb);
  1120. err = ovl_setup_cred_for_create(dentry, inode, mode, old_cred);
  1121. if (err)
  1122. goto out_revert_creds;
  1123. ovl_path_upper(dentry->d_parent, &realparentpath);
  1124. realfile = backing_tmpfile_open(&file->f_path, flags, &realparentpath,
  1125. mode, current_cred());
  1126. err = PTR_ERR_OR_ZERO(realfile);
  1127. pr_debug("tmpfile/open(%pd2, 0%o) = %i\n", realparentpath.dentry, mode, err);
  1128. if (err)
  1129. goto out_revert_creds;
  1130. /* ovl_instantiate() consumes the newdentry reference on success */
  1131. newdentry = dget(realfile->f_path.dentry);
  1132. err = ovl_instantiate(dentry, inode, newdentry, false, file);
  1133. if (!err) {
  1134. file->private_data = realfile;
  1135. } else {
  1136. dput(newdentry);
  1137. fput(realfile);
  1138. }
  1139. out_revert_creds:
  1140. revert_creds(old_cred);
  1141. return err;
  1142. }
  1143. static int ovl_dummy_open(struct inode *inode, struct file *file)
  1144. {
  1145. return 0;
  1146. }
  1147. static int ovl_tmpfile(struct mnt_idmap *idmap, struct inode *dir,
  1148. struct file *file, umode_t mode)
  1149. {
  1150. int err;
  1151. struct dentry *dentry = file->f_path.dentry;
  1152. struct inode *inode;
  1153. if (!OVL_FS(dentry->d_sb)->tmpfile)
  1154. return -EOPNOTSUPP;
  1155. err = ovl_copy_up(dentry->d_parent);
  1156. if (err)
  1157. return err;
  1158. err = ovl_want_write(dentry);
  1159. if (err)
  1160. return err;
  1161. err = -ENOMEM;
  1162. inode = ovl_new_inode(dentry->d_sb, mode, 0);
  1163. if (!inode)
  1164. goto drop_write;
  1165. inode_init_owner(&nop_mnt_idmap, inode, dir, mode);
  1166. err = ovl_create_tmpfile(file, dentry, inode, inode->i_mode);
  1167. if (err)
  1168. goto put_inode;
  1169. /*
  1170. * Check if the preallocated inode was actually used. Having something
  1171. * else assigned to the dentry shouldn't happen as that would indicate
  1172. * that the backing tmpfile "leaked" out of overlayfs.
  1173. */
  1174. err = -EIO;
  1175. if (WARN_ON(inode != d_inode(dentry)))
  1176. goto put_realfile;
  1177. /* inode reference was transferred to dentry */
  1178. inode = NULL;
  1179. err = finish_open(file, dentry, ovl_dummy_open);
  1180. put_realfile:
  1181. /* Without FMODE_OPENED ->release() won't be called on @file */
  1182. if (!(file->f_mode & FMODE_OPENED))
  1183. fput(file->private_data);
  1184. put_inode:
  1185. iput(inode);
  1186. drop_write:
  1187. ovl_drop_write(dentry);
  1188. return err;
  1189. }
  1190. const struct inode_operations ovl_dir_inode_operations = {
  1191. .lookup = ovl_lookup,
  1192. .mkdir = ovl_mkdir,
  1193. .symlink = ovl_symlink,
  1194. .unlink = ovl_unlink,
  1195. .rmdir = ovl_rmdir,
  1196. .rename = ovl_rename,
  1197. .link = ovl_link,
  1198. .setattr = ovl_setattr,
  1199. .create = ovl_create,
  1200. .mknod = ovl_mknod,
  1201. .permission = ovl_permission,
  1202. .getattr = ovl_getattr,
  1203. .listxattr = ovl_listxattr,
  1204. .get_inode_acl = ovl_get_inode_acl,
  1205. .get_acl = ovl_get_acl,
  1206. .set_acl = ovl_set_acl,
  1207. .update_time = ovl_update_time,
  1208. .fileattr_get = ovl_fileattr_get,
  1209. .fileattr_set = ovl_fileattr_set,
  1210. .tmpfile = ovl_tmpfile,
  1211. };