Commit | Line | Data |
---|---|---|
e9be9d5e MS |
1 | /* |
2 | * | |
3 | * Copyright (C) 2011 Novell Inc. | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or modify it | |
6 | * under the terms of the GNU General Public License version 2 as published by | |
7 | * the Free Software Foundation. | |
8 | */ | |
9 | ||
10 | #include <linux/fs.h> | |
11 | #include <linux/slab.h> | |
12 | #include <linux/xattr.h> | |
5201dc44 | 13 | #include <linux/posix_acl.h> |
e9be9d5e MS |
14 | #include "overlayfs.h" |
15 | ||
0f7ff2da | 16 | static int ovl_copy_up_truncate(struct dentry *dentry) |
e9be9d5e MS |
17 | { |
18 | int err; | |
19 | struct dentry *parent; | |
20 | struct kstat stat; | |
21 | struct path lowerpath; | |
22 | ||
23 | parent = dget_parent(dentry); | |
24 | err = ovl_copy_up(parent); | |
25 | if (err) | |
26 | goto out_dput_parent; | |
27 | ||
28 | ovl_path_lower(dentry, &lowerpath); | |
29 | err = vfs_getattr(&lowerpath, &stat); | |
30 | if (err) | |
31 | goto out_dput_parent; | |
32 | ||
0f7ff2da AV |
33 | stat.size = 0; |
34 | err = ovl_copy_up_one(parent, dentry, &lowerpath, &stat); | |
e9be9d5e MS |
35 | |
36 | out_dput_parent: | |
37 | dput(parent); | |
38 | return err; | |
39 | } | |
40 | ||
41 | int ovl_setattr(struct dentry *dentry, struct iattr *attr) | |
42 | { | |
43 | int err; | |
44 | struct dentry *upperdentry; | |
1175b6b8 | 45 | const struct cred *old_cred; |
e9be9d5e | 46 | |
cf9a6784 MS |
47 | /* |
48 | * Check for permissions before trying to copy-up. This is redundant | |
49 | * since it will be rechecked later by ->setattr() on upper dentry. But | |
50 | * without this, copy-up can be triggered by just about anybody. | |
51 | * | |
52 | * We don't initialize inode->size, which just means that | |
53 | * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not | |
54 | * check for a swapfile (which this won't be anyway). | |
55 | */ | |
56 | err = inode_change_ok(dentry->d_inode, attr); | |
57 | if (err) | |
58 | return err; | |
59 | ||
e9be9d5e MS |
60 | err = ovl_want_write(dentry); |
61 | if (err) | |
62 | goto out; | |
63 | ||
03bea604 MS |
64 | if (attr->ia_valid & ATTR_SIZE) { |
65 | struct inode *realinode = d_inode(ovl_dentry_real(dentry)); | |
66 | ||
67 | err = -ETXTBSY; | |
68 | if (atomic_read(&realinode->i_writecount) < 0) | |
69 | goto out_drop_write; | |
70 | } | |
71 | ||
acff81ec MS |
72 | err = ovl_copy_up(dentry); |
73 | if (!err) { | |
03bea604 MS |
74 | struct inode *winode = NULL; |
75 | ||
acff81ec MS |
76 | upperdentry = ovl_dentry_upper(dentry); |
77 | ||
03bea604 MS |
78 | if (attr->ia_valid & ATTR_SIZE) { |
79 | winode = d_inode(upperdentry); | |
80 | err = get_write_access(winode); | |
81 | if (err) | |
82 | goto out_drop_write; | |
83 | } | |
84 | ||
b99c2d91 MS |
85 | if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID)) |
86 | attr->ia_valid &= ~ATTR_MODE; | |
87 | ||
5955102c | 88 | inode_lock(upperdentry->d_inode); |
1175b6b8 | 89 | old_cred = ovl_override_creds(dentry->d_sb); |
e9be9d5e | 90 | err = notify_change(upperdentry, attr, NULL); |
1175b6b8 | 91 | revert_creds(old_cred); |
b81de061 KK |
92 | if (!err) |
93 | ovl_copyattr(upperdentry->d_inode, dentry->d_inode); | |
5955102c | 94 | inode_unlock(upperdentry->d_inode); |
03bea604 MS |
95 | |
96 | if (winode) | |
97 | put_write_access(winode); | |
e9be9d5e | 98 | } |
03bea604 | 99 | out_drop_write: |
e9be9d5e MS |
100 | ovl_drop_write(dentry); |
101 | out: | |
102 | return err; | |
103 | } | |
104 | ||
105 | static int ovl_getattr(struct vfsmount *mnt, struct dentry *dentry, | |
106 | struct kstat *stat) | |
107 | { | |
108 | struct path realpath; | |
1175b6b8 VG |
109 | const struct cred *old_cred; |
110 | int err; | |
e9be9d5e MS |
111 | |
112 | ovl_path_real(dentry, &realpath); | |
1175b6b8 VG |
113 | old_cred = ovl_override_creds(dentry->d_sb); |
114 | err = vfs_getattr(&realpath, stat); | |
115 | revert_creds(old_cred); | |
116 | return err; | |
e9be9d5e MS |
117 | } |
118 | ||
119 | int ovl_permission(struct inode *inode, int mask) | |
120 | { | |
e9be9d5e | 121 | bool is_upper; |
39b681f8 | 122 | struct inode *realinode = ovl_inode_real(inode, &is_upper); |
c0ca3d70 | 123 | const struct cred *old_cred; |
e9be9d5e MS |
124 | int err; |
125 | ||
e9be9d5e | 126 | /* Careful in RCU walk mode */ |
e9be9d5e MS |
127 | if (!realinode) { |
128 | WARN_ON(!(mask & MAY_NOT_BLOCK)); | |
a999d7e1 | 129 | return -ECHILD; |
e9be9d5e MS |
130 | } |
131 | ||
c0ca3d70 VG |
132 | /* |
133 | * Check overlay inode with the creds of task and underlying inode | |
134 | * with creds of mounter | |
135 | */ | |
136 | err = generic_permission(inode, mask); | |
137 | if (err) | |
138 | return err; | |
139 | ||
140 | old_cred = ovl_override_creds(inode->i_sb); | |
500cac3c | 141 | if (!is_upper && !special_file(realinode->i_mode) && mask & MAY_WRITE) { |
754f8cb7 | 142 | mask &= ~(MAY_WRITE | MAY_APPEND); |
500cac3c VG |
143 | /* Make sure mounter can read file for copy up later */ |
144 | mask |= MAY_READ; | |
145 | } | |
9c630ebe | 146 | err = inode_permission(realinode, mask); |
c0ca3d70 VG |
147 | revert_creds(old_cred); |
148 | ||
149 | return err; | |
e9be9d5e MS |
150 | } |
151 | ||
6b255391 | 152 | static const char *ovl_get_link(struct dentry *dentry, |
fceef393 AV |
153 | struct inode *inode, |
154 | struct delayed_call *done) | |
e9be9d5e | 155 | { |
e9be9d5e MS |
156 | struct dentry *realdentry; |
157 | struct inode *realinode; | |
1175b6b8 VG |
158 | const struct cred *old_cred; |
159 | const char *p; | |
e9be9d5e | 160 | |
6b255391 AV |
161 | if (!dentry) |
162 | return ERR_PTR(-ECHILD); | |
163 | ||
e9be9d5e MS |
164 | realdentry = ovl_dentry_real(dentry); |
165 | realinode = realdentry->d_inode; | |
166 | ||
6b255391 | 167 | if (WARN_ON(!realinode->i_op->get_link)) |
e9be9d5e MS |
168 | return ERR_PTR(-EPERM); |
169 | ||
1175b6b8 VG |
170 | old_cred = ovl_override_creds(dentry->d_sb); |
171 | p = realinode->i_op->get_link(realdentry, realinode, done); | |
172 | revert_creds(old_cred); | |
173 | return p; | |
e9be9d5e MS |
174 | } |
175 | ||
176 | static int ovl_readlink(struct dentry *dentry, char __user *buf, int bufsiz) | |
177 | { | |
178 | struct path realpath; | |
179 | struct inode *realinode; | |
1175b6b8 VG |
180 | const struct cred *old_cred; |
181 | int err; | |
e9be9d5e MS |
182 | |
183 | ovl_path_real(dentry, &realpath); | |
184 | realinode = realpath.dentry->d_inode; | |
185 | ||
186 | if (!realinode->i_op->readlink) | |
187 | return -EINVAL; | |
188 | ||
1175b6b8 VG |
189 | old_cred = ovl_override_creds(dentry->d_sb); |
190 | err = realinode->i_op->readlink(realpath.dentry, buf, bufsiz); | |
191 | revert_creds(old_cred); | |
192 | return err; | |
e9be9d5e MS |
193 | } |
194 | ||
0956254a | 195 | bool ovl_is_private_xattr(const char *name) |
e9be9d5e | 196 | { |
fe2b7595 AG |
197 | return strncmp(name, OVL_XATTR_PREFIX, |
198 | sizeof(OVL_XATTR_PREFIX) - 1) == 0; | |
e9be9d5e MS |
199 | } |
200 | ||
3767e255 AV |
201 | int ovl_setxattr(struct dentry *dentry, struct inode *inode, |
202 | const char *name, const void *value, | |
203 | size_t size, int flags) | |
e9be9d5e MS |
204 | { |
205 | int err; | |
206 | struct dentry *upperdentry; | |
1175b6b8 | 207 | const struct cred *old_cred; |
e9be9d5e MS |
208 | |
209 | err = ovl_want_write(dentry); | |
210 | if (err) | |
211 | goto out; | |
212 | ||
e9be9d5e MS |
213 | err = ovl_copy_up(dentry); |
214 | if (err) | |
215 | goto out_drop_write; | |
216 | ||
217 | upperdentry = ovl_dentry_upper(dentry); | |
1175b6b8 | 218 | old_cred = ovl_override_creds(dentry->d_sb); |
e9be9d5e | 219 | err = vfs_setxattr(upperdentry, name, value, size, flags); |
1175b6b8 | 220 | revert_creds(old_cred); |
e9be9d5e MS |
221 | |
222 | out_drop_write: | |
223 | ovl_drop_write(dentry); | |
224 | out: | |
225 | return err; | |
226 | } | |
227 | ||
ce23e640 AV |
228 | ssize_t ovl_getxattr(struct dentry *dentry, struct inode *inode, |
229 | const char *name, void *value, size_t size) | |
e9be9d5e | 230 | { |
b581755b | 231 | struct dentry *realdentry = ovl_dentry_real(dentry); |
1175b6b8 VG |
232 | ssize_t res; |
233 | const struct cred *old_cred; | |
52148463 | 234 | |
b581755b | 235 | if (ovl_is_private_xattr(name)) |
e9be9d5e MS |
236 | return -ENODATA; |
237 | ||
1175b6b8 VG |
238 | old_cred = ovl_override_creds(dentry->d_sb); |
239 | res = vfs_getxattr(realdentry, name, value, size); | |
240 | revert_creds(old_cred); | |
241 | return res; | |
e9be9d5e MS |
242 | } |
243 | ||
244 | ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size) | |
245 | { | |
b581755b | 246 | struct dentry *realdentry = ovl_dentry_real(dentry); |
e9be9d5e MS |
247 | ssize_t res; |
248 | int off; | |
1175b6b8 | 249 | const struct cred *old_cred; |
e9be9d5e | 250 | |
1175b6b8 | 251 | old_cred = ovl_override_creds(dentry->d_sb); |
b581755b | 252 | res = vfs_listxattr(realdentry, list, size); |
1175b6b8 | 253 | revert_creds(old_cred); |
e9be9d5e MS |
254 | if (res <= 0 || size == 0) |
255 | return res; | |
256 | ||
e9be9d5e MS |
257 | /* filter out private xattrs */ |
258 | for (off = 0; off < res;) { | |
259 | char *s = list + off; | |
260 | size_t slen = strlen(s) + 1; | |
261 | ||
262 | BUG_ON(off + slen > res); | |
263 | ||
264 | if (ovl_is_private_xattr(s)) { | |
265 | res -= slen; | |
266 | memmove(s, s + slen, res - off); | |
267 | } else { | |
268 | off += slen; | |
269 | } | |
270 | } | |
271 | ||
272 | return res; | |
273 | } | |
274 | ||
275 | int ovl_removexattr(struct dentry *dentry, const char *name) | |
276 | { | |
277 | int err; | |
278 | struct path realpath; | |
52148463 | 279 | enum ovl_path_type type = ovl_path_real(dentry, &realpath); |
1175b6b8 | 280 | const struct cred *old_cred; |
e9be9d5e MS |
281 | |
282 | err = ovl_want_write(dentry); | |
283 | if (err) | |
284 | goto out; | |
285 | ||
52148463 | 286 | err = -ENODATA; |
b581755b | 287 | if (ovl_is_private_xattr(name)) |
e9be9d5e MS |
288 | goto out_drop_write; |
289 | ||
1afaba1e | 290 | if (!OVL_TYPE_UPPER(type)) { |
e9be9d5e MS |
291 | err = vfs_getxattr(realpath.dentry, name, NULL, 0); |
292 | if (err < 0) | |
293 | goto out_drop_write; | |
294 | ||
295 | err = ovl_copy_up(dentry); | |
296 | if (err) | |
297 | goto out_drop_write; | |
298 | ||
299 | ovl_path_upper(dentry, &realpath); | |
300 | } | |
301 | ||
1175b6b8 | 302 | old_cred = ovl_override_creds(dentry->d_sb); |
e9be9d5e | 303 | err = vfs_removexattr(realpath.dentry, name); |
1175b6b8 | 304 | revert_creds(old_cred); |
e9be9d5e MS |
305 | out_drop_write: |
306 | ovl_drop_write(dentry); | |
307 | out: | |
308 | return err; | |
309 | } | |
310 | ||
39a25b2b VG |
311 | struct posix_acl *ovl_get_acl(struct inode *inode, int type) |
312 | { | |
39b681f8 | 313 | struct inode *realinode = ovl_inode_real(inode, NULL); |
1175b6b8 VG |
314 | const struct cred *old_cred; |
315 | struct posix_acl *acl; | |
39a25b2b | 316 | |
5201dc44 | 317 | if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !IS_POSIXACL(realinode)) |
39a25b2b VG |
318 | return NULL; |
319 | ||
320 | if (!realinode->i_op->get_acl) | |
321 | return NULL; | |
322 | ||
1175b6b8 | 323 | old_cred = ovl_override_creds(inode->i_sb); |
5201dc44 | 324 | acl = get_acl(realinode, type); |
1175b6b8 VG |
325 | revert_creds(old_cred); |
326 | ||
327 | return acl; | |
39a25b2b VG |
328 | } |
329 | ||
e9be9d5e MS |
330 | static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type, |
331 | struct dentry *realdentry) | |
332 | { | |
1afaba1e | 333 | if (OVL_TYPE_UPPER(type)) |
e9be9d5e MS |
334 | return false; |
335 | ||
336 | if (special_file(realdentry->d_inode->i_mode)) | |
337 | return false; | |
338 | ||
339 | if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC)) | |
340 | return false; | |
341 | ||
342 | return true; | |
343 | } | |
344 | ||
2d902671 | 345 | int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags) |
e9be9d5e | 346 | { |
2d902671 | 347 | int err = 0; |
e9be9d5e MS |
348 | struct path realpath; |
349 | enum ovl_path_type type; | |
e9be9d5e MS |
350 | |
351 | type = ovl_path_real(dentry, &realpath); | |
4bacc9c9 | 352 | if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) { |
e9be9d5e | 353 | err = ovl_want_write(dentry); |
2d902671 MS |
354 | if (!err) { |
355 | if (file_flags & O_TRUNC) | |
356 | err = ovl_copy_up_truncate(dentry); | |
357 | else | |
358 | err = ovl_copy_up(dentry); | |
359 | ovl_drop_write(dentry); | |
360 | } | |
e9be9d5e MS |
361 | } |
362 | ||
2d902671 | 363 | return err; |
e9be9d5e MS |
364 | } |
365 | ||
d719e8f2 MS |
366 | int ovl_update_time(struct inode *inode, struct timespec *ts, int flags) |
367 | { | |
368 | struct dentry *alias; | |
369 | struct path upperpath; | |
370 | ||
371 | if (!(flags & S_ATIME)) | |
372 | return 0; | |
373 | ||
374 | alias = d_find_any_alias(inode); | |
375 | if (!alias) | |
376 | return 0; | |
377 | ||
378 | ovl_path_upper(alias, &upperpath); | |
379 | if (upperpath.dentry) { | |
380 | touch_atime(&upperpath); | |
381 | inode->i_atime = d_inode(upperpath.dentry)->i_atime; | |
382 | } | |
383 | ||
384 | dput(alias); | |
385 | ||
386 | return 0; | |
387 | } | |
388 | ||
e9be9d5e MS |
389 | static const struct inode_operations ovl_file_inode_operations = { |
390 | .setattr = ovl_setattr, | |
391 | .permission = ovl_permission, | |
392 | .getattr = ovl_getattr, | |
d837a49b | 393 | .setxattr = generic_setxattr, |
e9be9d5e MS |
394 | .getxattr = ovl_getxattr, |
395 | .listxattr = ovl_listxattr, | |
396 | .removexattr = ovl_removexattr, | |
39a25b2b | 397 | .get_acl = ovl_get_acl, |
d719e8f2 | 398 | .update_time = ovl_update_time, |
e9be9d5e MS |
399 | }; |
400 | ||
401 | static const struct inode_operations ovl_symlink_inode_operations = { | |
402 | .setattr = ovl_setattr, | |
6b255391 | 403 | .get_link = ovl_get_link, |
e9be9d5e MS |
404 | .readlink = ovl_readlink, |
405 | .getattr = ovl_getattr, | |
d837a49b | 406 | .setxattr = generic_setxattr, |
e9be9d5e MS |
407 | .getxattr = ovl_getxattr, |
408 | .listxattr = ovl_listxattr, | |
409 | .removexattr = ovl_removexattr, | |
d719e8f2 | 410 | .update_time = ovl_update_time, |
e9be9d5e MS |
411 | }; |
412 | ||
51f7e52d | 413 | static void ovl_fill_inode(struct inode *inode, umode_t mode) |
e9be9d5e | 414 | { |
e9be9d5e MS |
415 | inode->i_ino = get_next_ino(); |
416 | inode->i_mode = mode; | |
d719e8f2 | 417 | inode->i_flags |= S_NOCMTIME; |
2a3a2a3f MS |
418 | #ifdef CONFIG_FS_POSIX_ACL |
419 | inode->i_acl = inode->i_default_acl = ACL_DONT_CACHE; | |
420 | #endif | |
e9be9d5e | 421 | |
07a2daab | 422 | mode &= S_IFMT; |
e9be9d5e MS |
423 | switch (mode) { |
424 | case S_IFDIR: | |
e9be9d5e MS |
425 | inode->i_op = &ovl_dir_inode_operations; |
426 | inode->i_fop = &ovl_dir_operations; | |
427 | break; | |
428 | ||
429 | case S_IFLNK: | |
430 | inode->i_op = &ovl_symlink_inode_operations; | |
431 | break; | |
432 | ||
51f7e52d MS |
433 | default: |
434 | WARN(1, "illegal file type: %i\n", mode); | |
435 | /* Fall through */ | |
436 | ||
e9be9d5e MS |
437 | case S_IFREG: |
438 | case S_IFSOCK: | |
439 | case S_IFBLK: | |
440 | case S_IFCHR: | |
441 | case S_IFIFO: | |
442 | inode->i_op = &ovl_file_inode_operations; | |
443 | break; | |
51f7e52d MS |
444 | } |
445 | } | |
e9be9d5e | 446 | |
51f7e52d MS |
447 | struct inode *ovl_new_inode(struct super_block *sb, umode_t mode) |
448 | { | |
449 | struct inode *inode; | |
450 | ||
451 | inode = new_inode(sb); | |
452 | if (inode) | |
453 | ovl_fill_inode(inode, mode); | |
454 | ||
455 | return inode; | |
456 | } | |
457 | ||
458 | static int ovl_inode_test(struct inode *inode, void *data) | |
459 | { | |
460 | return ovl_inode_real(inode, NULL) == data; | |
461 | } | |
462 | ||
463 | static int ovl_inode_set(struct inode *inode, void *data) | |
464 | { | |
465 | inode->i_private = (void *) (((unsigned long) data) | OVL_ISUPPER_MASK); | |
466 | return 0; | |
467 | } | |
468 | ||
469 | struct inode *ovl_get_inode(struct super_block *sb, struct inode *realinode) | |
470 | ||
471 | { | |
472 | struct inode *inode; | |
473 | ||
474 | inode = iget5_locked(sb, (unsigned long) realinode, | |
475 | ovl_inode_test, ovl_inode_set, realinode); | |
476 | if (inode && inode->i_state & I_NEW) { | |
477 | ovl_fill_inode(inode, realinode->i_mode); | |
478 | set_nlink(inode, realinode->i_nlink); | |
479 | unlock_new_inode(inode); | |
e9be9d5e MS |
480 | } |
481 | ||
482 | return inode; | |
e9be9d5e | 483 | } |