Merge tag 'xfs-6.3-merge-4' of git://git.kernel.org/pub/scm/fs/xfs/xfs-linux
[linux-block.git] / fs / overlayfs / readdir.c
CommitLineData
d2912cb1 1// SPDX-License-Identifier: GPL-2.0-only
e9be9d5e
MS
2/*
3 *
4 * Copyright (C) 2011 Novell Inc.
e9be9d5e
MS
5 */
6
7#include <linux/fs.h>
8#include <linux/slab.h>
9#include <linux/namei.h>
10#include <linux/file.h>
11#include <linux/xattr.h>
12#include <linux/rbtree.h>
13#include <linux/security.h>
14#include <linux/cred.h>
b5efccbe 15#include <linux/ratelimit.h>
e9be9d5e
MS
16#include "overlayfs.h"
17
18struct ovl_cache_entry {
e9be9d5e
MS
19 unsigned int len;
20 unsigned int type;
b5efccbe 21 u64 real_ino;
e9be9d5e 22 u64 ino;
e9be9d5e
MS
23 struct list_head l_node;
24 struct rb_node node;
cdb67279 25 struct ovl_cache_entry *next_maybe_whiteout;
95e598e7 26 bool is_upper;
c2096537 27 bool is_whiteout;
68bf8611 28 char name[];
e9be9d5e
MS
29};
30
31struct ovl_dir_cache {
32 long refcount;
33 u64 version;
34 struct list_head entries;
4edb83bb 35 struct rb_root root;
e9be9d5e
MS
36};
37
38struct ovl_readdir_data {
39 struct dir_context ctx;
3fe6e52f 40 struct dentry *dentry;
56656e96 41 bool is_lowest;
4edb83bb 42 struct rb_root *root;
e9be9d5e 43 struct list_head *list;
db6ec212 44 struct list_head middle;
cdb67279 45 struct ovl_cache_entry *first_maybe_whiteout;
e9be9d5e
MS
46 int count;
47 int err;
b5efccbe 48 bool is_upper;
45aebeaf 49 bool d_type_supported;
e9be9d5e
MS
50};
51
52struct ovl_dir_file {
53 bool is_real;
54 bool is_upper;
55 struct ovl_dir_cache *cache;
4330397e 56 struct list_head *cursor;
e9be9d5e
MS
57 struct file *realfile;
58 struct file *upperfile;
59};
60
61static struct ovl_cache_entry *ovl_cache_entry_from_node(struct rb_node *n)
62{
4edb83bb
MS
63 return rb_entry(n, struct ovl_cache_entry, node);
64}
65
66static bool ovl_cache_entry_find_link(const char *name, int len,
67 struct rb_node ***link,
68 struct rb_node **parent)
69{
70 bool found = false;
71 struct rb_node **newp = *link;
72
73 while (!found && *newp) {
74 int cmp;
75 struct ovl_cache_entry *tmp;
76
77 *parent = *newp;
78 tmp = ovl_cache_entry_from_node(*newp);
79 cmp = strncmp(name, tmp->name, len);
80 if (cmp > 0)
81 newp = &tmp->node.rb_right;
82 else if (cmp < 0 || len < tmp->len)
83 newp = &tmp->node.rb_left;
84 else
85 found = true;
86 }
87 *link = newp;
88
89 return found;
e9be9d5e
MS
90}
91
92static struct ovl_cache_entry *ovl_cache_entry_find(struct rb_root *root,
93 const char *name, int len)
94{
95 struct rb_node *node = root->rb_node;
96 int cmp;
97
98 while (node) {
99 struct ovl_cache_entry *p = ovl_cache_entry_from_node(node);
100
101 cmp = strncmp(name, p->name, len);
102 if (cmp > 0)
103 node = p->node.rb_right;
104 else if (cmp < 0 || len < p->len)
105 node = p->node.rb_left;
106 else
107 return p;
108 }
109
110 return NULL;
111}
112
b5efccbe
AG
113static bool ovl_calc_d_ino(struct ovl_readdir_data *rdd,
114 struct ovl_cache_entry *p)
115{
116 /* Don't care if not doing ovl_iter() */
117 if (!rdd->dentry)
118 return false;
119
adbf4f7e
AG
120 /* Always recalc d_ino when remapping lower inode numbers */
121 if (ovl_xino_bits(rdd->dentry->d_sb))
122 return true;
123
b5efccbe
AG
124 /* Always recalc d_ino for parent */
125 if (strcmp(p->name, "..") == 0)
126 return true;
127
128 /* If this is lower, then native d_ino will do */
129 if (!rdd->is_upper)
130 return false;
131
132 /*
133 * Recalc d_ino for '.' and for all entries if dir is impure (contains
134 * copied up entries)
135 */
136 if ((p->name[0] == '.' && p->len == 1) ||
137 ovl_test_flag(OVL_IMPURE, d_inode(rdd->dentry)))
138 return true;
139
140 return false;
141}
142
cdb67279 143static struct ovl_cache_entry *ovl_cache_entry_new(struct ovl_readdir_data *rdd,
3e01cee3 144 const char *name, int len,
e9be9d5e
MS
145 u64 ino, unsigned int d_type)
146{
147 struct ovl_cache_entry *p;
68bf8611 148 size_t size = offsetof(struct ovl_cache_entry, name[len + 1]);
e9be9d5e 149
68bf8611 150 p = kmalloc(size, GFP_KERNEL);
3e01cee3
MS
151 if (!p)
152 return NULL;
153
154 memcpy(p->name, name, len);
155 p->name[len] = '\0';
156 p->len = len;
157 p->type = d_type;
b5efccbe 158 p->real_ino = ino;
3e01cee3 159 p->ino = ino;
b5efccbe
AG
160 /* Defer setting d_ino for upper entry to ovl_iterate() */
161 if (ovl_calc_d_ino(rdd, p))
162 p->ino = 0;
95e598e7 163 p->is_upper = rdd->is_upper;
3e01cee3 164 p->is_whiteout = false;
3e01cee3
MS
165
166 if (d_type == DT_CHR) {
cdb67279
MS
167 p->next_maybe_whiteout = rdd->first_maybe_whiteout;
168 rdd->first_maybe_whiteout = p;
3e01cee3 169 }
e9be9d5e
MS
170 return p;
171}
172
25885a35 173static bool ovl_cache_entry_add_rb(struct ovl_readdir_data *rdd,
e9be9d5e
MS
174 const char *name, int len, u64 ino,
175 unsigned int d_type)
176{
4edb83bb 177 struct rb_node **newp = &rdd->root->rb_node;
e9be9d5e
MS
178 struct rb_node *parent = NULL;
179 struct ovl_cache_entry *p;
180
4edb83bb 181 if (ovl_cache_entry_find_link(name, len, &newp, &parent))
25885a35 182 return true;
e9be9d5e 183
cdb67279 184 p = ovl_cache_entry_new(rdd, name, len, ino, d_type);
31e8ccea
MS
185 if (p == NULL) {
186 rdd->err = -ENOMEM;
25885a35 187 return false;
31e8ccea 188 }
e9be9d5e
MS
189
190 list_add_tail(&p->l_node, rdd->list);
191 rb_link_node(&p->node, parent, newp);
4edb83bb 192 rb_insert_color(&p->node, rdd->root);
e9be9d5e 193
25885a35 194 return true;
e9be9d5e
MS
195}
196
25885a35 197static bool ovl_fill_lowest(struct ovl_readdir_data *rdd,
56656e96
MS
198 const char *name, int namelen,
199 loff_t offset, u64 ino, unsigned int d_type)
e9be9d5e
MS
200{
201 struct ovl_cache_entry *p;
202
4edb83bb 203 p = ovl_cache_entry_find(rdd->root, name, namelen);
e9be9d5e 204 if (p) {
db6ec212 205 list_move_tail(&p->l_node, &rdd->middle);
e9be9d5e 206 } else {
cdb67279 207 p = ovl_cache_entry_new(rdd, name, namelen, ino, d_type);
e9be9d5e
MS
208 if (p == NULL)
209 rdd->err = -ENOMEM;
210 else
db6ec212 211 list_add_tail(&p->l_node, &rdd->middle);
e9be9d5e
MS
212 }
213
25885a35 214 return rdd->err == 0;
e9be9d5e
MS
215}
216
217void ovl_cache_free(struct list_head *list)
218{
219 struct ovl_cache_entry *p;
220 struct ovl_cache_entry *n;
221
222 list_for_each_entry_safe(p, n, list, l_node)
223 kfree(p);
224
225 INIT_LIST_HEAD(list);
226}
227
4edb83bb
MS
228void ovl_dir_cache_free(struct inode *inode)
229{
230 struct ovl_dir_cache *cache = ovl_dir_cache(inode);
231
232 if (cache) {
233 ovl_cache_free(&cache->entries);
234 kfree(cache);
235 }
236}
237
1fa9c5c5 238static void ovl_cache_put(struct ovl_dir_file *od, struct inode *inode)
e9be9d5e
MS
239{
240 struct ovl_dir_cache *cache = od->cache;
241
e9be9d5e
MS
242 WARN_ON(cache->refcount <= 0);
243 cache->refcount--;
244 if (!cache->refcount) {
1fa9c5c5
MS
245 if (ovl_dir_cache(inode) == cache)
246 ovl_set_dir_cache(inode, NULL);
e9be9d5e
MS
247
248 ovl_cache_free(&cache->entries);
249 kfree(cache);
250 }
251}
252
25885a35 253static bool ovl_fill_merge(struct dir_context *ctx, const char *name,
ac7576f4
MS
254 int namelen, loff_t offset, u64 ino,
255 unsigned int d_type)
e9be9d5e 256{
ac7576f4
MS
257 struct ovl_readdir_data *rdd =
258 container_of(ctx, struct ovl_readdir_data, ctx);
e9be9d5e
MS
259
260 rdd->count++;
56656e96 261 if (!rdd->is_lowest)
e9be9d5e
MS
262 return ovl_cache_entry_add_rb(rdd, name, namelen, ino, d_type);
263 else
56656e96 264 return ovl_fill_lowest(rdd, name, namelen, offset, ino, d_type);
e9be9d5e
MS
265}
266
2d343087 267static int ovl_check_whiteouts(const struct path *path, struct ovl_readdir_data *rdd)
cdb67279
MS
268{
269 int err;
270 struct ovl_cache_entry *p;
ba9ea771 271 struct dentry *dentry, *dir = path->dentry;
cdb67279 272 const struct cred *old_cred;
cdb67279 273
3fe6e52f 274 old_cred = ovl_override_creds(rdd->dentry->d_sb);
cdb67279 275
00235411 276 err = down_write_killable(&dir->d_inode->i_rwsem);
cdb67279
MS
277 if (!err) {
278 while (rdd->first_maybe_whiteout) {
279 p = rdd->first_maybe_whiteout;
280 rdd->first_maybe_whiteout = p->next_maybe_whiteout;
4609e1f1 281 dentry = lookup_one(mnt_idmap(path->mnt), p->name, dir, p->len);
cdb67279
MS
282 if (!IS_ERR(dentry)) {
283 p->is_whiteout = ovl_is_whiteout(dentry);
284 dput(dentry);
285 }
286 }
5955102c 287 inode_unlock(dir->d_inode);
cdb67279
MS
288 }
289 revert_creds(old_cred);
cdb67279
MS
290
291 return err;
292}
293
2d343087 294static inline int ovl_dir_read(const struct path *realpath,
e9be9d5e
MS
295 struct ovl_readdir_data *rdd)
296{
297 struct file *realfile;
298 int err;
299
130fdbc3 300 realfile = ovl_path_open(realpath, O_RDONLY | O_LARGEFILE);
e9be9d5e
MS
301 if (IS_ERR(realfile))
302 return PTR_ERR(realfile);
303
cdb67279 304 rdd->first_maybe_whiteout = NULL;
e9be9d5e
MS
305 rdd->ctx.pos = 0;
306 do {
307 rdd->count = 0;
308 rdd->err = 0;
309 err = iterate_dir(realfile, &rdd->ctx);
310 if (err >= 0)
311 err = rdd->err;
312 } while (!err && rdd->count);
cdb67279 313
eea2fb48 314 if (!err && rdd->first_maybe_whiteout && rdd->dentry)
ba9ea771 315 err = ovl_check_whiteouts(realpath, rdd);
cdb67279 316
e9be9d5e
MS
317 fput(realfile);
318
319 return err;
320}
321
322static void ovl_dir_reset(struct file *file)
323{
324 struct ovl_dir_file *od = file->private_data;
325 struct ovl_dir_cache *cache = od->cache;
1fa9c5c5 326 struct inode *inode = file_inode(file);
b79e05aa 327 bool is_real;
e9be9d5e 328
1fa9c5c5
MS
329 if (cache && ovl_inode_version_get(inode) != cache->version) {
330 ovl_cache_put(od, inode);
e9be9d5e 331 od->cache = NULL;
4330397e 332 od->cursor = NULL;
e9be9d5e 333 }
1fa9c5c5 334 is_real = ovl_dir_is_real(inode);
b79e05aa
AG
335 if (od->is_real != is_real) {
336 /* is_real can only become false when dir is copied up */
337 if (WARN_ON(is_real))
338 return;
e9be9d5e 339 od->is_real = false;
b79e05aa 340 }
e9be9d5e
MS
341}
342
4edb83bb
MS
343static int ovl_dir_read_merged(struct dentry *dentry, struct list_head *list,
344 struct rb_root *root)
e9be9d5e
MS
345{
346 int err;
9d7459d8 347 struct path realpath;
e9be9d5e
MS
348 struct ovl_readdir_data rdd = {
349 .ctx.actor = ovl_fill_merge,
3fe6e52f 350 .dentry = dentry,
e9be9d5e 351 .list = list,
4edb83bb 352 .root = root,
56656e96 353 .is_lowest = false,
e9be9d5e 354 };
9d7459d8 355 int idx, next;
e9be9d5e 356
9d7459d8
MS
357 for (idx = 0; idx != -1; idx = next) {
358 next = ovl_path_next(idx, dentry, &realpath);
b5efccbe 359 rdd.is_upper = ovl_dentry_upper(dentry) == realpath.dentry;
c9f00fdb 360
9d7459d8 361 if (next != -1) {
9d7459d8 362 err = ovl_dir_read(&realpath, &rdd);
e9be9d5e 363 if (err)
9d7459d8
MS
364 break;
365 } else {
366 /*
367 * Insert lowest layer entries before upper ones, this
368 * allows offsets to be reasonably constant
369 */
370 list_add(&rdd.middle, rdd.list);
56656e96 371 rdd.is_lowest = true;
9d7459d8
MS
372 err = ovl_dir_read(&realpath, &rdd);
373 list_del(&rdd.middle);
e9be9d5e
MS
374 }
375 }
e9be9d5e 376 return err;
e9be9d5e
MS
377}
378
379static void ovl_seek_cursor(struct ovl_dir_file *od, loff_t pos)
380{
4330397e 381 struct list_head *p;
e9be9d5e
MS
382 loff_t off = 0;
383
4330397e 384 list_for_each(p, &od->cache->entries) {
e9be9d5e
MS
385 if (off >= pos)
386 break;
387 off++;
388 }
4330397e 389 /* Cursor is safe since the cache is stable */
390 od->cursor = p;
e9be9d5e
MS
391}
392
393static struct ovl_dir_cache *ovl_cache_get(struct dentry *dentry)
394{
395 int res;
e9be9d5e 396 struct ovl_dir_cache *cache;
1fa9c5c5 397 struct inode *inode = d_inode(dentry);
e9be9d5e 398
1fa9c5c5
MS
399 cache = ovl_dir_cache(inode);
400 if (cache && ovl_inode_version_get(inode) == cache->version) {
4edb83bb 401 WARN_ON(!cache->refcount);
e9be9d5e
MS
402 cache->refcount++;
403 return cache;
404 }
4edb83bb 405 ovl_set_dir_cache(d_inode(dentry), NULL);
e9be9d5e
MS
406
407 cache = kzalloc(sizeof(struct ovl_dir_cache), GFP_KERNEL);
408 if (!cache)
409 return ERR_PTR(-ENOMEM);
410
411 cache->refcount = 1;
412 INIT_LIST_HEAD(&cache->entries);
4edb83bb 413 cache->root = RB_ROOT;
e9be9d5e 414
4edb83bb 415 res = ovl_dir_read_merged(dentry, &cache->entries, &cache->root);
e9be9d5e
MS
416 if (res) {
417 ovl_cache_free(&cache->entries);
418 kfree(cache);
419 return ERR_PTR(res);
420 }
421
1fa9c5c5
MS
422 cache->version = ovl_inode_version_get(inode);
423 ovl_set_dir_cache(inode, cache);
e9be9d5e
MS
424
425 return cache;
426}
427
adbf4f7e
AG
428/* Map inode number to lower fs unique range */
429static u64 ovl_remap_lower_ino(u64 ino, int xinobits, int fsid,
926e94d7 430 const char *name, int namelen, bool warn)
adbf4f7e 431{
dfe51d47
AG
432 unsigned int xinoshift = 64 - xinobits;
433
434 if (unlikely(ino >> xinoshift)) {
926e94d7
AG
435 if (warn) {
436 pr_warn_ratelimited("d_ino too big (%.*s, ino=%llu, xinobits=%d)\n",
437 namelen, name, ino, xinobits);
438 }
adbf4f7e
AG
439 return ino;
440 }
441
dfe51d47
AG
442 /*
443 * The lowest xinobit is reserved for mapping the non-peresistent inode
444 * numbers range, but this range is only exposed via st_ino, not here.
445 */
446 return ino | ((u64)fsid) << (xinoshift + 1);
adbf4f7e
AG
447}
448
b5efccbe
AG
449/*
450 * Set d_ino for upper entries. Non-upper entries should always report
451 * the uppermost real inode ino and should not call this function.
452 *
453 * When not all layer are on same fs, report real ino also for upper.
454 *
455 * When all layers are on the same fs, and upper has a reference to
456 * copy up origin, call vfs_getattr() on the overlay entry to make
457 * sure that d_ino will be consistent with st_ino from stat(2).
458 */
2d343087 459static int ovl_cache_update_ino(const struct path *path, struct ovl_cache_entry *p)
b5efccbe
AG
460
461{
462 struct dentry *dir = path->dentry;
463 struct dentry *this = NULL;
464 enum ovl_path_type type;
465 u64 ino = p->real_ino;
adbf4f7e 466 int xinobits = ovl_xino_bits(dir->d_sb);
b5efccbe
AG
467 int err = 0;
468
0f831ec8 469 if (!ovl_same_dev(dir->d_sb))
b5efccbe
AG
470 goto out;
471
472 if (p->name[0] == '.') {
473 if (p->len == 1) {
474 this = dget(dir);
475 goto get;
476 }
477 if (p->len == 2 && p->name[1] == '.') {
478 /* we shall not be moved */
479 this = dget(dir->d_parent);
480 goto get;
481 }
482 }
4609e1f1 483 this = lookup_one(mnt_idmap(path->mnt), p->name, dir, p->len);
b5efccbe 484 if (IS_ERR_OR_NULL(this) || !this->d_inode) {
9011c279
AG
485 /* Mark a stale entry */
486 p->is_whiteout = true;
b5efccbe
AG
487 if (IS_ERR(this)) {
488 err = PTR_ERR(this);
489 this = NULL;
490 goto fail;
491 }
492 goto out;
493 }
494
495get:
496 type = ovl_path_type(this);
497 if (OVL_TYPE_ORIGIN(type)) {
498 struct kstat stat;
499 struct path statpath = *path;
500
501 statpath.dentry = this;
502 err = vfs_getattr(&statpath, &stat, STATX_INO, 0);
503 if (err)
504 goto fail;
505
4c37e71b
AG
506 /*
507 * Directory inode is always on overlay st_dev.
508 * Non-dir with ovl_same_dev() could be on pseudo st_dev in case
509 * of xino bits overflow.
510 */
511 WARN_ON_ONCE(S_ISDIR(stat.mode) &&
512 dir->d_sb->s_dev != stat.dev);
b5efccbe 513 ino = stat.ino;
adbf4f7e
AG
514 } else if (xinobits && !OVL_TYPE_UPPER(type)) {
515 ino = ovl_remap_lower_ino(ino, xinobits,
516 ovl_layer_lower(this)->fsid,
926e94d7
AG
517 p->name, p->len,
518 ovl_xino_warn(dir->d_sb));
b5efccbe
AG
519 }
520
521out:
522 p->ino = ino;
523 dput(this);
524 return err;
525
526fail:
1bd0a3ae 527 pr_warn_ratelimited("failed to look up (%s) for ino (%i)\n",
b5efccbe
AG
528 p->name, err);
529 goto out;
530}
531
25885a35 532static bool ovl_fill_plain(struct dir_context *ctx, const char *name,
4edb83bb
MS
533 int namelen, loff_t offset, u64 ino,
534 unsigned int d_type)
535{
536 struct ovl_cache_entry *p;
537 struct ovl_readdir_data *rdd =
538 container_of(ctx, struct ovl_readdir_data, ctx);
539
540 rdd->count++;
541 p = ovl_cache_entry_new(rdd, name, namelen, ino, d_type);
542 if (p == NULL) {
543 rdd->err = -ENOMEM;
25885a35 544 return false;
4edb83bb
MS
545 }
546 list_add_tail(&p->l_node, rdd->list);
547
25885a35 548 return true;
4edb83bb
MS
549}
550
2d343087 551static int ovl_dir_read_impure(const struct path *path, struct list_head *list,
4edb83bb
MS
552 struct rb_root *root)
553{
554 int err;
555 struct path realpath;
556 struct ovl_cache_entry *p, *n;
557 struct ovl_readdir_data rdd = {
558 .ctx.actor = ovl_fill_plain,
559 .list = list,
560 .root = root,
561 };
562
563 INIT_LIST_HEAD(list);
564 *root = RB_ROOT;
565 ovl_path_upper(path->dentry, &realpath);
566
567 err = ovl_dir_read(&realpath, &rdd);
568 if (err)
569 return err;
570
571 list_for_each_entry_safe(p, n, list, l_node) {
572 if (strcmp(p->name, ".") != 0 &&
573 strcmp(p->name, "..") != 0) {
574 err = ovl_cache_update_ino(path, p);
575 if (err)
576 return err;
577 }
578 if (p->ino == p->real_ino) {
579 list_del(&p->l_node);
580 kfree(p);
581 } else {
582 struct rb_node **newp = &root->rb_node;
583 struct rb_node *parent = NULL;
584
585 if (WARN_ON(ovl_cache_entry_find_link(p->name, p->len,
586 &newp, &parent)))
587 return -EIO;
588
589 rb_link_node(&p->node, parent, newp);
590 rb_insert_color(&p->node, root);
591 }
592 }
593 return 0;
594}
595
2d343087 596static struct ovl_dir_cache *ovl_cache_get_impure(const struct path *path)
4edb83bb
MS
597{
598 int res;
599 struct dentry *dentry = path->dentry;
1fa9c5c5 600 struct inode *inode = d_inode(dentry);
610afc0b 601 struct ovl_fs *ofs = OVL_FS(dentry->d_sb);
4edb83bb
MS
602 struct ovl_dir_cache *cache;
603
1fa9c5c5
MS
604 cache = ovl_dir_cache(inode);
605 if (cache && ovl_inode_version_get(inode) == cache->version)
4edb83bb
MS
606 return cache;
607
608 /* Impure cache is not refcounted, free it here */
1fa9c5c5
MS
609 ovl_dir_cache_free(inode);
610 ovl_set_dir_cache(inode, NULL);
4edb83bb
MS
611
612 cache = kzalloc(sizeof(struct ovl_dir_cache), GFP_KERNEL);
613 if (!cache)
614 return ERR_PTR(-ENOMEM);
615
616 res = ovl_dir_read_impure(path, &cache->entries, &cache->root);
617 if (res) {
618 ovl_cache_free(&cache->entries);
619 kfree(cache);
620 return ERR_PTR(res);
621 }
622 if (list_empty(&cache->entries)) {
a5a927a7
AG
623 /*
624 * A good opportunity to get rid of an unneeded "impure" flag.
625 * Removing the "impure" xattr is best effort.
626 */
627 if (!ovl_want_write(dentry)) {
c914c0e2
AG
628 ovl_removexattr(ofs, ovl_dentry_upper(dentry),
629 OVL_XATTR_IMPURE);
a5a927a7
AG
630 ovl_drop_write(dentry);
631 }
1fa9c5c5 632 ovl_clear_flag(OVL_IMPURE, inode);
4edb83bb
MS
633 kfree(cache);
634 return NULL;
635 }
636
1fa9c5c5
MS
637 cache->version = ovl_inode_version_get(inode);
638 ovl_set_dir_cache(inode, cache);
4edb83bb
MS
639
640 return cache;
641}
642
643struct ovl_readdir_translate {
644 struct dir_context *orig_ctx;
645 struct ovl_dir_cache *cache;
646 struct dir_context ctx;
647 u64 parent_ino;
adbf4f7e
AG
648 int fsid;
649 int xinobits;
926e94d7 650 bool xinowarn;
4edb83bb
MS
651};
652
25885a35 653static bool ovl_fill_real(struct dir_context *ctx, const char *name,
4edb83bb
MS
654 int namelen, loff_t offset, u64 ino,
655 unsigned int d_type)
656{
657 struct ovl_readdir_translate *rdt =
658 container_of(ctx, struct ovl_readdir_translate, ctx);
659 struct dir_context *orig_ctx = rdt->orig_ctx;
660
adbf4f7e 661 if (rdt->parent_ino && strcmp(name, "..") == 0) {
4edb83bb 662 ino = rdt->parent_ino;
adbf4f7e 663 } else if (rdt->cache) {
4edb83bb
MS
664 struct ovl_cache_entry *p;
665
666 p = ovl_cache_entry_find(&rdt->cache->root, name, namelen);
667 if (p)
668 ino = p->ino;
adbf4f7e
AG
669 } else if (rdt->xinobits) {
670 ino = ovl_remap_lower_ino(ino, rdt->xinobits, rdt->fsid,
926e94d7 671 name, namelen, rdt->xinowarn);
4edb83bb
MS
672 }
673
674 return orig_ctx->actor(orig_ctx, name, namelen, offset, ino, d_type);
675}
676
67810693
AG
677static bool ovl_is_impure_dir(struct file *file)
678{
679 struct ovl_dir_file *od = file->private_data;
1fa9c5c5 680 struct inode *dir = file_inode(file);
67810693
AG
681
682 /*
683 * Only upper dir can be impure, but if we are in the middle of
684 * iterating a lower real dir, dir could be copied up and marked
685 * impure. We only want the impure cache if we started iterating
686 * a real upper dir to begin with.
687 */
688 return od->is_upper && ovl_test_flag(OVL_IMPURE, dir);
689
690}
691
4edb83bb
MS
692static int ovl_iterate_real(struct file *file, struct dir_context *ctx)
693{
694 int err;
695 struct ovl_dir_file *od = file->private_data;
696 struct dentry *dir = file->f_path.dentry;
13464165 697 const struct ovl_layer *lower_layer = ovl_layer_lower(dir);
4edb83bb
MS
698 struct ovl_readdir_translate rdt = {
699 .ctx.actor = ovl_fill_real,
700 .orig_ctx = ctx,
adbf4f7e 701 .xinobits = ovl_xino_bits(dir->d_sb),
926e94d7 702 .xinowarn = ovl_xino_warn(dir->d_sb),
4edb83bb
MS
703 };
704
adbf4f7e
AG
705 if (rdt.xinobits && lower_layer)
706 rdt.fsid = lower_layer->fsid;
707
4edb83bb
MS
708 if (OVL_TYPE_MERGE(ovl_path_type(dir->d_parent))) {
709 struct kstat stat;
710 struct path statpath = file->f_path;
711
712 statpath.dentry = dir->d_parent;
713 err = vfs_getattr(&statpath, &stat, STATX_INO, 0);
714 if (err)
715 return err;
716
717 WARN_ON_ONCE(dir->d_sb->s_dev != stat.dev);
718 rdt.parent_ino = stat.ino;
719 }
720
67810693 721 if (ovl_is_impure_dir(file)) {
4edb83bb
MS
722 rdt.cache = ovl_cache_get_impure(&file->f_path);
723 if (IS_ERR(rdt.cache))
724 return PTR_ERR(rdt.cache);
725 }
726
b02a16e6
AG
727 err = iterate_dir(od->realfile, &rdt.ctx);
728 ctx->pos = rdt.ctx.pos;
729
730 return err;
4edb83bb
MS
731}
732
733
e9be9d5e
MS
734static int ovl_iterate(struct file *file, struct dir_context *ctx)
735{
736 struct ovl_dir_file *od = file->private_data;
737 struct dentry *dentry = file->f_path.dentry;
4330397e 738 struct ovl_cache_entry *p;
48bd024b 739 const struct cred *old_cred;
b5efccbe 740 int err;
e9be9d5e 741
48bd024b 742 old_cred = ovl_override_creds(dentry->d_sb);
e9be9d5e
MS
743 if (!ctx->pos)
744 ovl_dir_reset(file);
745
4edb83bb
MS
746 if (od->is_real) {
747 /*
748 * If parent is merge, then need to adjust d_ino for '..', if
749 * dir is impure then need to adjust d_ino for copied up
750 * entries.
751 */
adbf4f7e 752 if (ovl_xino_bits(dentry->d_sb) ||
0f831ec8 753 (ovl_same_fs(dentry->d_sb) &&
67810693 754 (ovl_is_impure_dir(file) ||
adbf4f7e 755 OVL_TYPE_MERGE(ovl_path_type(dentry->d_parent))))) {
48bd024b
MS
756 err = ovl_iterate_real(file, ctx);
757 } else {
758 err = iterate_dir(od->realfile, ctx);
4edb83bb 759 }
48bd024b 760 goto out;
4edb83bb 761 }
e9be9d5e
MS
762
763 if (!od->cache) {
764 struct ovl_dir_cache *cache;
765
766 cache = ovl_cache_get(dentry);
48bd024b 767 err = PTR_ERR(cache);
e9be9d5e 768 if (IS_ERR(cache))
48bd024b 769 goto out;
e9be9d5e
MS
770
771 od->cache = cache;
772 ovl_seek_cursor(od, ctx->pos);
773 }
774
4330397e 775 while (od->cursor != &od->cache->entries) {
776 p = list_entry(od->cursor, struct ovl_cache_entry, l_node);
b5efccbe
AG
777 if (!p->is_whiteout) {
778 if (!p->ino) {
779 err = ovl_cache_update_ino(&file->f_path, p);
780 if (err)
48bd024b 781 goto out;
b5efccbe 782 }
9011c279
AG
783 }
784 /* ovl_cache_update_ino() sets is_whiteout on stale entry */
785 if (!p->is_whiteout) {
4330397e 786 if (!dir_emit(ctx, p->name, p->len, p->ino, p->type))
787 break;
b5efccbe 788 }
4330397e 789 od->cursor = p->l_node.next;
790 ctx->pos++;
e9be9d5e 791 }
48bd024b
MS
792 err = 0;
793out:
794 revert_creds(old_cred);
795 return err;
e9be9d5e
MS
796}
797
798static loff_t ovl_dir_llseek(struct file *file, loff_t offset, int origin)
799{
800 loff_t res;
801 struct ovl_dir_file *od = file->private_data;
802
5955102c 803 inode_lock(file_inode(file));
e9be9d5e
MS
804 if (!file->f_pos)
805 ovl_dir_reset(file);
806
807 if (od->is_real) {
808 res = vfs_llseek(od->realfile, offset, origin);
809 file->f_pos = od->realfile->f_pos;
810 } else {
811 res = -EINVAL;
812
813 switch (origin) {
814 case SEEK_CUR:
815 offset += file->f_pos;
816 break;
817 case SEEK_SET:
818 break;
819 default:
820 goto out_unlock;
821 }
822 if (offset < 0)
823 goto out_unlock;
824
825 if (offset != file->f_pos) {
826 file->f_pos = offset;
827 if (od->cache)
828 ovl_seek_cursor(od, offset);
829 }
830 res = offset;
831 }
832out_unlock:
5955102c 833 inode_unlock(file_inode(file));
e9be9d5e
MS
834
835 return res;
836}
837
61536bed 838static struct file *ovl_dir_open_realfile(const struct file *file,
2d343087 839 const struct path *realpath)
130fdbc3 840{
48bd024b
MS
841 struct file *res;
842 const struct cred *old_cred;
843
844 old_cred = ovl_override_creds(file_inode(file)->i_sb);
845 res = ovl_path_open(realpath, O_RDONLY | (file->f_flags & O_LARGEFILE));
846 revert_creds(old_cred);
847
848 return res;
130fdbc3
MS
849}
850
61536bed
AG
851/*
852 * Like ovl_real_fdget(), returns upperfile if dir was copied up since open.
853 * Unlike ovl_real_fdget(), this caches upperfile in file->private_data.
854 *
855 * TODO: use same abstract type for file->private_data of dir and file so
856 * upperfile could also be cached for files as well.
857 */
858struct file *ovl_dir_real_file(const struct file *file, bool want_upper)
e9be9d5e 859{
61536bed 860
e9be9d5e
MS
861 struct ovl_dir_file *od = file->private_data;
862 struct dentry *dentry = file->f_path.dentry;
b854cc65 863 struct file *old, *realfile = od->realfile;
e9be9d5e 864
d796e77f 865 if (!OVL_TYPE_UPPER(ovl_path_type(dentry)))
61536bed 866 return want_upper ? NULL : realfile;
c86243b0 867
e9be9d5e
MS
868 /*
869 * Need to check if we started out being a lower dir, but got copied up
870 */
d796e77f 871 if (!od->is_upper) {
506458ef 872 realfile = READ_ONCE(od->upperfile);
e9be9d5e
MS
873 if (!realfile) {
874 struct path upperpath;
875
876 ovl_path_upper(dentry, &upperpath);
130fdbc3 877 realfile = ovl_dir_open_realfile(file, &upperpath);
b854cc65
MS
878 if (IS_ERR(realfile))
879 return realfile;
ff7a5fb0 880
b854cc65
MS
881 old = cmpxchg_release(&od->upperfile, NULL, realfile);
882 if (old) {
883 fput(realfile);
884 realfile = old;
e9be9d5e 885 }
e9be9d5e 886 }
e9be9d5e
MS
887 }
888
61536bed
AG
889 return realfile;
890}
891
892static int ovl_dir_fsync(struct file *file, loff_t start, loff_t end,
893 int datasync)
894{
895 struct file *realfile;
896 int err;
897
1fa9c5c5 898 err = ovl_sync_status(OVL_FS(file_inode(file)->i_sb));
335d3fc5
SD
899 if (err <= 0)
900 return err;
61536bed
AG
901
902 realfile = ovl_dir_real_file(file, true);
903 err = PTR_ERR_OR_ZERO(realfile);
904
905 /* Nothing to sync for lower */
906 if (!realfile || err)
907 return err;
908
e9be9d5e
MS
909 return vfs_fsync_range(realfile, start, end, datasync);
910}
911
912static int ovl_dir_release(struct inode *inode, struct file *file)
913{
914 struct ovl_dir_file *od = file->private_data;
915
916 if (od->cache) {
5955102c 917 inode_lock(inode);
1fa9c5c5 918 ovl_cache_put(od, inode);
5955102c 919 inode_unlock(inode);
e9be9d5e
MS
920 }
921 fput(od->realfile);
922 if (od->upperfile)
923 fput(od->upperfile);
924 kfree(od);
925
926 return 0;
927}
928
929static int ovl_dir_open(struct inode *inode, struct file *file)
930{
931 struct path realpath;
932 struct file *realfile;
933 struct ovl_dir_file *od;
934 enum ovl_path_type type;
935
936 od = kzalloc(sizeof(struct ovl_dir_file), GFP_KERNEL);
937 if (!od)
938 return -ENOMEM;
939
940 type = ovl_path_real(file->f_path.dentry, &realpath);
130fdbc3 941 realfile = ovl_dir_open_realfile(file, &realpath);
e9be9d5e
MS
942 if (IS_ERR(realfile)) {
943 kfree(od);
944 return PTR_ERR(realfile);
945 }
e9be9d5e 946 od->realfile = realfile;
1fa9c5c5 947 od->is_real = ovl_dir_is_real(inode);
1afaba1e 948 od->is_upper = OVL_TYPE_UPPER(type);
e9be9d5e
MS
949 file->private_data = od;
950
951 return 0;
952}
953
954const struct file_operations ovl_dir_operations = {
955 .read = generic_read_dir,
956 .open = ovl_dir_open,
957 .iterate = ovl_iterate,
958 .llseek = ovl_dir_llseek,
959 .fsync = ovl_dir_fsync,
960 .release = ovl_dir_release,
961};
962
963int ovl_check_empty_dir(struct dentry *dentry, struct list_head *list)
964{
965 int err;
95e598e7 966 struct ovl_cache_entry *p, *n;
4edb83bb 967 struct rb_root root = RB_ROOT;
6d0a8a90 968 const struct cred *old_cred;
e9be9d5e 969
6d0a8a90 970 old_cred = ovl_override_creds(dentry->d_sb);
4edb83bb 971 err = ovl_dir_read_merged(dentry, list, &root);
6d0a8a90 972 revert_creds(old_cred);
e9be9d5e
MS
973 if (err)
974 return err;
975
976 err = 0;
977
95e598e7 978 list_for_each_entry_safe(p, n, list, l_node) {
979 /*
980 * Select whiteouts in upperdir, they should
981 * be cleared when deleting this directory.
982 */
983 if (p->is_whiteout) {
984 if (p->is_upper)
985 continue;
986 goto del_entry;
987 }
e9be9d5e
MS
988
989 if (p->name[0] == '.') {
990 if (p->len == 1)
95e598e7 991 goto del_entry;
e9be9d5e 992 if (p->len == 2 && p->name[1] == '.')
95e598e7 993 goto del_entry;
e9be9d5e
MS
994 }
995 err = -ENOTEMPTY;
996 break;
95e598e7 997
998del_entry:
999 list_del(&p->l_node);
1000 kfree(p);
e9be9d5e
MS
1001 }
1002
1003 return err;
1004}
1005
576bb263
CB
1006void ovl_cleanup_whiteouts(struct ovl_fs *ofs, struct dentry *upper,
1007 struct list_head *list)
e9be9d5e
MS
1008{
1009 struct ovl_cache_entry *p;
1010
5955102c 1011 inode_lock_nested(upper->d_inode, I_MUTEX_CHILD);
e9be9d5e
MS
1012 list_for_each_entry(p, list, l_node) {
1013 struct dentry *dentry;
1014
95e598e7 1015 if (WARN_ON(!p->is_whiteout || !p->is_upper))
e9be9d5e
MS
1016 continue;
1017
22f289ce 1018 dentry = ovl_lookup_upper(ofs, p->name, upper, p->len);
e9be9d5e 1019 if (IS_ERR(dentry)) {
1bd0a3ae 1020 pr_err("lookup '%s/%.*s' failed (%i)\n",
e9be9d5e
MS
1021 upper->d_name.name, p->len, p->name,
1022 (int) PTR_ERR(dentry));
1023 continue;
1024 }
84889d49 1025 if (dentry->d_inode)
576bb263 1026 ovl_cleanup(ofs, upper->d_inode, dentry);
e9be9d5e
MS
1027 dput(dentry);
1028 }
5955102c 1029 inode_unlock(upper->d_inode);
e9be9d5e 1030}
45aebeaf 1031
25885a35 1032static bool ovl_check_d_type(struct dir_context *ctx, const char *name,
45aebeaf
VG
1033 int namelen, loff_t offset, u64 ino,
1034 unsigned int d_type)
1035{
1036 struct ovl_readdir_data *rdd =
1037 container_of(ctx, struct ovl_readdir_data, ctx);
1038
1039 /* Even if d_type is not supported, DT_DIR is returned for . and .. */
1040 if (!strncmp(name, ".", namelen) || !strncmp(name, "..", namelen))
25885a35 1041 return true;
45aebeaf
VG
1042
1043 if (d_type != DT_UNKNOWN)
1044 rdd->d_type_supported = true;
1045
25885a35 1046 return true;
45aebeaf
VG
1047}
1048
1049/*
1050 * Returns 1 if d_type is supported, 0 not supported/unknown. Negative values
1051 * if error is encountered.
1052 */
2d343087 1053int ovl_check_d_type_supported(const struct path *realpath)
45aebeaf
VG
1054{
1055 int err;
1056 struct ovl_readdir_data rdd = {
1057 .ctx.actor = ovl_check_d_type,
1058 .d_type_supported = false,
1059 };
1060
1061 err = ovl_dir_read(realpath, &rdd);
1062 if (err)
1063 return err;
1064
1065 return rdd.d_type_supported;
1066}
eea2fb48 1067
235ce9ed
AG
1068#define OVL_INCOMPATDIR_NAME "incompat"
1069
2d343087 1070static int ovl_workdir_cleanup_recurse(struct ovl_fs *ofs, const struct path *path,
576bb263 1071 int level)
eea2fb48
MS
1072{
1073 int err;
1074 struct inode *dir = path->dentry->d_inode;
1075 LIST_HEAD(list);
1076 struct ovl_cache_entry *p;
1077 struct ovl_readdir_data rdd = {
af4dcb6d 1078 .ctx.actor = ovl_fill_plain,
eea2fb48 1079 .list = &list,
eea2fb48 1080 };
235ce9ed
AG
1081 bool incompat = false;
1082
1083 /*
1084 * The "work/incompat" directory is treated specially - if it is not
1085 * empty, instead of printing a generic error and mounting read-only,
1086 * we will error about incompat features and fail the mount.
1087 *
1088 * When called from ovl_indexdir_cleanup(), path->dentry->d_name.name
1089 * starts with '#'.
1090 */
1091 if (level == 2 &&
1092 !strcmp(path->dentry->d_name.name, OVL_INCOMPATDIR_NAME))
1093 incompat = true;
eea2fb48
MS
1094
1095 err = ovl_dir_read(path, &rdd);
1096 if (err)
1097 goto out;
1098
1099 inode_lock_nested(dir, I_MUTEX_PARENT);
1100 list_for_each_entry(p, &list, l_node) {
1101 struct dentry *dentry;
1102
1103 if (p->name[0] == '.') {
1104 if (p->len == 1)
1105 continue;
1106 if (p->len == 2 && p->name[1] == '.')
1107 continue;
235ce9ed
AG
1108 } else if (incompat) {
1109 pr_err("overlay with incompat feature '%s' cannot be mounted\n",
1110 p->name);
1111 err = -EINVAL;
1112 break;
eea2fb48 1113 }
22f289ce 1114 dentry = ovl_lookup_upper(ofs, p->name, path->dentry, p->len);
eea2fb48
MS
1115 if (IS_ERR(dentry))
1116 continue;
1117 if (dentry->d_inode)
576bb263 1118 err = ovl_workdir_cleanup(ofs, dir, path->mnt, dentry, level);
eea2fb48 1119 dput(dentry);
235ce9ed
AG
1120 if (err)
1121 break;
eea2fb48
MS
1122 }
1123 inode_unlock(dir);
1124out:
1125 ovl_cache_free(&list);
235ce9ed 1126 return err;
eea2fb48
MS
1127}
1128
576bb263
CB
1129int ovl_workdir_cleanup(struct ovl_fs *ofs, struct inode *dir,
1130 struct vfsmount *mnt, struct dentry *dentry, int level)
eea2fb48
MS
1131{
1132 int err;
1133
1134 if (!d_is_dir(dentry) || level > 1) {
576bb263 1135 return ovl_cleanup(ofs, dir, dentry);
eea2fb48
MS
1136 }
1137
576bb263 1138 err = ovl_do_rmdir(ofs, dir, dentry);
eea2fb48
MS
1139 if (err) {
1140 struct path path = { .mnt = mnt, .dentry = dentry };
1141
1142 inode_unlock(dir);
576bb263 1143 err = ovl_workdir_cleanup_recurse(ofs, &path, level + 1);
eea2fb48 1144 inode_lock_nested(dir, I_MUTEX_PARENT);
235ce9ed 1145 if (!err)
576bb263 1146 err = ovl_cleanup(ofs, dir, dentry);
eea2fb48 1147 }
3011645b
AG
1148
1149 return err;
eea2fb48 1150}
415543d5 1151
1eff1a1d 1152int ovl_indexdir_cleanup(struct ovl_fs *ofs)
415543d5
AG
1153{
1154 int err;
1eff1a1d 1155 struct dentry *indexdir = ofs->indexdir;
dc7ab677 1156 struct dentry *index = NULL;
1eff1a1d 1157 struct inode *dir = indexdir->d_inode;
08f4c7c8 1158 struct path path = { .mnt = ovl_upper_mnt(ofs), .dentry = indexdir };
415543d5
AG
1159 LIST_HEAD(list);
1160 struct ovl_cache_entry *p;
1161 struct ovl_readdir_data rdd = {
af4dcb6d 1162 .ctx.actor = ovl_fill_plain,
415543d5 1163 .list = &list,
415543d5
AG
1164 };
1165
1166 err = ovl_dir_read(&path, &rdd);
1167 if (err)
1168 goto out;
1169
1170 inode_lock_nested(dir, I_MUTEX_PARENT);
1171 list_for_each_entry(p, &list, l_node) {
415543d5
AG
1172 if (p->name[0] == '.') {
1173 if (p->len == 1)
1174 continue;
1175 if (p->len == 2 && p->name[1] == '.')
1176 continue;
1177 }
22f289ce 1178 index = ovl_lookup_upper(ofs, p->name, indexdir, p->len);
415543d5
AG
1179 if (IS_ERR(index)) {
1180 err = PTR_ERR(index);
dc7ab677 1181 index = NULL;
415543d5
AG
1182 break;
1183 }
3011645b
AG
1184 /* Cleanup leftover from index create/cleanup attempt */
1185 if (index->d_name.name[0] == '#') {
576bb263 1186 err = ovl_workdir_cleanup(ofs, dir, path.mnt, index, 1);
3011645b
AG
1187 if (err)
1188 break;
1189 goto next;
1190 }
1eff1a1d 1191 err = ovl_verify_index(ofs, index);
24f0b172
AG
1192 if (!err) {
1193 goto next;
1194 } else if (err == -ESTALE) {
1195 /* Cleanup stale index entries */
576bb263 1196 err = ovl_cleanup(ofs, dir, index);
24f0b172
AG
1197 } else if (err != -ENOENT) {
1198 /*
1199 * Abort mount to avoid corrupting the index if
1200 * an incompatible index entry was found or on out
1201 * of memory.
1202 */
1203 break;
1204 } else if (ofs->config.nfs_export) {
1205 /*
1206 * Whiteout orphan index to block future open by
1207 * handle after overlay nlink dropped to zero.
1208 */
c21c839b 1209 err = ovl_cleanup_and_whiteout(ofs, dir, index);
24f0b172
AG
1210 } else {
1211 /* Cleanup orphan index entries */
576bb263 1212 err = ovl_cleanup(ofs, dir, index);
24f0b172
AG
1213 }
1214
fa0096e3
AG
1215 if (err)
1216 break;
1217
24f0b172 1218next:
415543d5 1219 dput(index);
dc7ab677 1220 index = NULL;
415543d5 1221 }
dc7ab677 1222 dput(index);
415543d5
AG
1223 inode_unlock(dir);
1224out:
1225 ovl_cache_free(&list);
1226 if (err)
1bd0a3ae 1227 pr_err("failed index dir cleanup (%i)\n", err);
415543d5
AG
1228 return err;
1229}