Blame view
fs/overlayfs/export.c
22.3 KB
d2912cb15 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
8ed5eec9d ovl: encode pure ... |
2 3 4 5 6 7 |
/* * Overlayfs NFS export support. * * Amir Goldstein <amir73il@gmail.com> * * Copyright (C) 2017-2018 CTERA Networks. All Rights Reserved. |
8ed5eec9d ovl: encode pure ... |
8 9 10 11 12 13 14 15 16 17 |
*/ #include <linux/fs.h> #include <linux/cred.h> #include <linux/mount.h> #include <linux/namei.h> #include <linux/xattr.h> #include <linux/exportfs.h> #include <linux/ratelimit.h> #include "overlayfs.h" |
2ca3c148a ovl: check lower ... |
18 19 20 21 22 23 24 25 26 27 28 29 30 31 |
static int ovl_encode_maybe_copy_up(struct dentry *dentry) { int err; if (ovl_dentry_upper(dentry)) return 0; err = ovl_want_write(dentry); if (!err) { err = ovl_copy_up(dentry); ovl_drop_write(dentry); } if (err) { |
1bd0a3aea ovl: use pr_fmt a... |
32 33 |
pr_warn_ratelimited("failed to copy up on encode (%pd2, err=%i) ", |
2ca3c148a ovl: check lower ... |
34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 |
dentry, err); } return err; } /* * Before encoding a non-upper directory file handle from real layer N, we need * to check if it will be possible to reconnect an overlay dentry from the real * lower decoded dentry. This is done by following the overlay ancestry up to a * "layer N connected" ancestor and verifying that all parents along the way are * "layer N connectable". If an ancestor that is NOT "layer N connectable" is * found, we need to copy up an ancestor, which is "layer N connectable", thus * making that ancestor "layer N connected". For example: * * layer 1: /a * layer 2: /a/b/c * * The overlay dentry /a is NOT "layer 2 connectable", because if dir /a is * copied up and renamed, upper dir /a will be indexed by lower dir /a from * layer 1. The dir /a from layer 2 will never be indexed, so the algorithm (*) * in ovl_lookup_real_ancestor() will not be able to lookup a connected overlay * dentry from the connected lower dentry /a/b/c. * * To avoid this problem on decode time, we need to copy up an ancestor of * /a/b/c, which is "layer 2 connectable", on encode time. That ancestor is * /a/b. After copy up (and index) of /a/b, it will become "layer 2 connected" * and when the time comes to decode the file handle from lower dentry /a/b/c, * ovl_lookup_real_ancestor() will find the indexed ancestor /a/b and decoding * a connected overlay dentry will be accomplished. * * (*) the algorithm in ovl_lookup_real_ancestor() can be improved to lookup an * entry /a in the lower layers above layer N and find the indexed dir /a from * layer 1. If that improvement is made, then the check for "layer N connected" * will need to verify there are no redirects in lower layers above N. In the * example above, /a will be "layer 2 connectable". However, if layer 2 dir /a * is a target of a layer 1 redirect, then /a will NOT be "layer 2 connectable": * * layer 1: /A (redirect = /a) * layer 2: /a/b/c */ /* Return the lowest layer for encoding a connectable file handle */ static int ovl_connectable_layer(struct dentry *dentry) { struct ovl_entry *oe = OVL_E(dentry); /* We can get overlay root from root of any layer */ if (dentry == dentry->d_sb->s_root) return oe->numlower; /* * If it's an unindexed merge dir, then it's not connectable with any * lower layer */ if (ovl_dentry_upper(dentry) && !ovl_test_flag(OVL_INDEX, d_inode(dentry))) return 0; /* We can get upper/overlay path from indexed/lower dentry */ return oe->lowerstack[0].layer->idx; } /* * @dentry is "connected" if all ancestors up to root or a "connected" ancestor * have the same uppermost lower layer as the origin's layer. We may need to * copy up a "connectable" ancestor to make it "connected". A "connected" dentry * cannot become non "connected", so cache positive result in dentry flags. * * Return the connected origin layer or < 0 on error. */ static int ovl_connect_layer(struct dentry *dentry) { struct dentry *next, *parent = NULL; int origin_layer; int err = 0; if (WARN_ON(dentry == dentry->d_sb->s_root) || WARN_ON(!ovl_dentry_lower(dentry))) return -EIO; origin_layer = OVL_E(dentry)->lowerstack[0].layer->idx; if (ovl_dentry_test_flag(OVL_E_CONNECTED, dentry)) return origin_layer; /* Find the topmost origin layer connectable ancestor of @dentry */ next = dget(dentry); for (;;) { parent = dget_parent(next); if (WARN_ON(parent == next)) { err = -EIO; break; } /* * If @parent is not origin layer connectable, then copy up * @next which is origin layer connectable and we are done. */ if (ovl_connectable_layer(parent) < origin_layer) { err = ovl_encode_maybe_copy_up(next); break; } /* If @parent is connected or indexed we are done */ if (ovl_dentry_test_flag(OVL_E_CONNECTED, parent) || ovl_test_flag(OVL_INDEX, d_inode(parent))) break; dput(next); next = parent; } dput(parent); dput(next); if (!err) ovl_dentry_set_flag(OVL_E_CONNECTED, dentry); return err ?: origin_layer; } |
b305e8443 ovl: encode non-i... |
154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 |
/* * We only need to encode origin if there is a chance that the same object was * encoded pre copy up and then we need to stay consistent with the same * encoding also after copy up. If non-pure upper is not indexed, then it was * copied up before NFS export was enabled. In that case we don't need to worry * about staying consistent with pre copy up encoding and we encode an upper * file handle. Overlay root dentry is a private case of non-indexed upper. * * The following table summarizes the different file handle encodings used for * different overlay object types: * * Object type | Encoding * -------------------------------- * Pure upper | U * Non-indexed upper | U |
05e1f1181 ovl: copy up befo... |
169 170 |
* Indexed upper | L (*) * Non-upper | L (*) |
b305e8443 ovl: encode non-i... |
171 172 173 |
* * U = upper file handle * L = lower file handle |
05e1f1181 ovl: copy up befo... |
174 175 |
* * (*) Connecting an overlay dir from real lower dentry is not always |
2ca3c148a ovl: check lower ... |
176 177 178 179 180 |
* possible when there are redirects in lower layers and non-indexed merge dirs. * To mitigate those case, we may copy up the lower dir ancestor before encode * a lower dir file handle. * * Return 0 for upper file handle, > 0 for lower file handle or < 0 on error. |
b305e8443 ovl: encode non-i... |
181 |
*/ |
2ca3c148a ovl: check lower ... |
182 |
static int ovl_check_encode_origin(struct dentry *dentry) |
b305e8443 ovl: encode non-i... |
183 |
{ |
05e1f1181 ovl: copy up befo... |
184 |
struct ovl_fs *ofs = dentry->d_sb->s_fs_info; |
2ca3c148a ovl: check lower ... |
185 |
/* Upper file handle for pure upper */ |
b305e8443 ovl: encode non-i... |
186 |
if (!ovl_dentry_lower(dentry)) |
2ca3c148a ovl: check lower ... |
187 |
return 0; |
b305e8443 ovl: encode non-i... |
188 |
|
05e1f1181 ovl: copy up befo... |
189 |
/* |
2ca3c148a ovl: check lower ... |
190 |
* Upper file handle for non-indexed upper. |
05e1f1181 ovl: copy up befo... |
191 |
* |
2ca3c148a ovl: check lower ... |
192 193 |
* Root is never indexed, so if there's an upper layer, encode upper for * root. |
05e1f1181 ovl: copy up befo... |
194 |
*/ |
b305e8443 ovl: encode non-i... |
195 196 |
if (ovl_dentry_upper(dentry) && !ovl_test_flag(OVL_INDEX, d_inode(dentry))) |
05e1f1181 ovl: copy up befo... |
197 |
return 0; |
2ca3c148a ovl: check lower ... |
198 199 200 201 202 203 |
/* * Decoding a merge dir, whose origin's ancestor is under a redirected * lower dir or under a non-indexed upper is not always possible. * ovl_connect_layer() will try to make origin's layer "connected" by * copying up a "connectable" ancestor. */ |
08f4c7c86 ovl: add accessor... |
204 |
if (d_is_dir(dentry) && ovl_upper_mnt(ofs)) |
2ca3c148a ovl: check lower ... |
205 |
return ovl_connect_layer(dentry); |
05e1f1181 ovl: copy up befo... |
206 |
|
2ca3c148a ovl: check lower ... |
207 208 |
/* Lower file handle for indexed and non-upper dir/non-dir */ return 1; |
05e1f1181 ovl: copy up befo... |
209 |
} |
cbe7fba8e ovl: make sure th... |
210 |
static int ovl_dentry_to_fid(struct dentry *dentry, u32 *fid, int buflen) |
8ed5eec9d ovl: encode pure ... |
211 |
{ |
8ed5eec9d ovl: encode pure ... |
212 |
struct ovl_fh *fh = NULL; |
2ca3c148a ovl: check lower ... |
213 |
int err, enc_lower; |
cbe7fba8e ovl: make sure th... |
214 |
int len; |
8ed5eec9d ovl: encode pure ... |
215 |
|
05e1f1181 ovl: copy up befo... |
216 |
/* |
2ca3c148a ovl: check lower ... |
217 218 |
* Check if we should encode a lower or upper file handle and maybe * copy up an ancestor to make lower file handle connectable. |
05e1f1181 ovl: copy up befo... |
219 |
*/ |
2ca3c148a ovl: check lower ... |
220 221 222 |
err = enc_lower = ovl_check_encode_origin(dentry); if (enc_lower < 0) goto fail; |
8ed5eec9d ovl: encode pure ... |
223 |
|
2ca3c148a ovl: check lower ... |
224 |
/* Encode an upper or lower file handle */ |
5b2cccd32 ovl: disambiguate... |
225 226 |
fh = ovl_encode_real_fh(enc_lower ? ovl_dentry_lower(dentry) : ovl_dentry_upper(dentry), !enc_lower); |
9b6faee07 ovl: check ERR_PT... |
227 |
if (IS_ERR(fh)) |
97f024b91 ovl: Fix derefere... |
228 |
return PTR_ERR(fh); |
8ed5eec9d ovl: encode pure ... |
229 |
|
cbe7fba8e ovl: make sure th... |
230 |
len = OVL_FH_LEN(fh); |
144da23be ovl: return requi... |
231 232 |
if (len <= buflen) memcpy(fid, fh, len); |
cbe7fba8e ovl: make sure th... |
233 |
err = len; |
8ed5eec9d ovl: encode pure ... |
234 235 236 237 238 239 |
out: kfree(fh); return err; fail: |
144da23be ovl: return requi... |
240 241 242 |
pr_warn_ratelimited("failed to encode file handle (%pd2, err=%i) ", dentry, err); |
8ed5eec9d ovl: encode pure ... |
243 244 |
goto out; } |
5b2cccd32 ovl: disambiguate... |
245 246 |
static int ovl_encode_fh(struct inode *inode, u32 *fid, int *max_len, struct inode *parent) |
8ed5eec9d ovl: encode pure ... |
247 248 |
{ struct dentry *dentry; |
144da23be ovl: return requi... |
249 |
int bytes, buflen = *max_len << 2; |
8ed5eec9d ovl: encode pure ... |
250 251 252 253 254 255 256 257 |
/* TODO: encode connectable file handles */ if (parent) return FILEID_INVALID; dentry = d_find_any_alias(inode); if (WARN_ON(!dentry)) return FILEID_INVALID; |
144da23be ovl: return requi... |
258 |
bytes = ovl_dentry_to_fid(dentry, fid, buflen); |
8ed5eec9d ovl: encode pure ... |
259 |
dput(dentry); |
cbe7fba8e ovl: make sure th... |
260 261 262 263 |
if (bytes <= 0) return FILEID_INVALID; *max_len = bytes >> 2; |
144da23be ovl: return requi... |
264 265 |
if (bytes > buflen) return FILEID_INVALID; |
cbe7fba8e ovl: make sure th... |
266 267 |
return OVL_FILEID_V1; |
8ed5eec9d ovl: encode pure ... |
268 |
} |
8556a4205 ovl: decode pure ... |
269 |
/* |
f71bd9cfb ovl: decode index... |
270 |
* Find or instantiate an overlay dentry from real dentries and index. |
8556a4205 ovl: decode pure ... |
271 272 |
*/ static struct dentry *ovl_obtain_alias(struct super_block *sb, |
f71bd9cfb ovl: decode index... |
273 274 275 |
struct dentry *upper_alias, struct ovl_path *lowerpath, struct dentry *index) |
8556a4205 ovl: decode pure ... |
276 |
{ |
f941866fc ovl: decode lower... |
277 |
struct dentry *lower = lowerpath ? lowerpath->dentry : NULL; |
f71bd9cfb ovl: decode index... |
278 |
struct dentry *upper = upper_alias ?: index; |
8556a4205 ovl: decode pure ... |
279 |
struct dentry *dentry; |
f941866fc ovl: decode lower... |
280 |
struct inode *inode; |
8556a4205 ovl: decode pure ... |
281 |
struct ovl_entry *oe; |
ac6a52eb6 ovl: Pass argumen... |
282 283 284 285 286 |
struct ovl_inode_params oip = { .lowerpath = lowerpath, .index = index, .numlower = !!lower }; |
8556a4205 ovl: decode pure ... |
287 |
|
f71bd9cfb ovl: decode index... |
288 289 |
/* We get overlay directory dentries with ovl_lookup_real() */ if (d_is_dir(upper ?: lower)) |
8556a4205 ovl: decode pure ... |
290 |
return ERR_PTR(-EIO); |
ac6a52eb6 ovl: Pass argumen... |
291 292 |
oip.upperdentry = dget(upper); inode = ovl_get_inode(sb, &oip); |
8556a4205 ovl: decode pure ... |
293 294 295 296 |
if (IS_ERR(inode)) { dput(upper); return ERR_CAST(inode); } |
9d3dfea3d ovl: Modify ovl_l... |
297 298 |
if (upper) ovl_set_flag(OVL_UPPERDATA, inode); |
8556a4205 ovl: decode pure ... |
299 |
dentry = d_find_any_alias(inode); |
504f38410 ovl: ovl_obtain_a... |
300 301 302 303 304 305 306 307 308 309 310 311 312 |
if (dentry) goto out_iput; dentry = d_alloc_anon(inode->i_sb); if (unlikely(!dentry)) goto nomem; oe = ovl_alloc_entry(lower ? 1 : 0); if (!oe) goto nomem; if (lower) { oe->lowerstack->dentry = dget(lower); oe->lowerstack->layer = lowerpath->layer; |
8556a4205 ovl: decode pure ... |
313 |
} |
504f38410 ovl: ovl_obtain_a... |
314 315 316 |
dentry->d_fsdata = oe; if (upper_alias) ovl_dentry_set_upper_alias(dentry); |
f42888445 ovl: decide if re... |
317 318 |
ovl_dentry_update_reval(dentry, upper, DCACHE_OP_REVALIDATE | DCACHE_OP_WEAK_REVALIDATE); |
8556a4205 ovl: decode pure ... |
319 320 321 322 |
return d_instantiate_anon(dentry, inode); nomem: |
8556a4205 ovl: decode pure ... |
323 |
dput(dentry); |
504f38410 ovl: ovl_obtain_a... |
324 325 326 327 |
dentry = ERR_PTR(-ENOMEM); out_iput: iput(inode); return dentry; |
8556a4205 ovl: decode pure ... |
328 |
} |
988925164 ovl: decode pure ... |
329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 |
/* Get the upper or lower dentry in stach whose on layer @idx */ static struct dentry *ovl_dentry_real_at(struct dentry *dentry, int idx) { struct ovl_entry *oe = dentry->d_fsdata; int i; if (!idx) return ovl_dentry_upper(dentry); for (i = 0; i < oe->numlower; i++) { if (oe->lowerstack[i].layer->idx == idx) return oe->lowerstack[i].dentry; } return NULL; } |
3985b70a3 ovl: decode conne... |
345 346 347 348 349 350 351 352 |
/* * Lookup a child overlay dentry to get a connected overlay dentry whose real * dentry is @real. If @real is on upper layer, we lookup a child overlay * dentry with the same name as the real dentry. Otherwise, we need to consult * index for lookup. */ static struct dentry *ovl_lookup_real_one(struct dentry *connected, struct dentry *real, |
134641656 ovl: layer is const |
353 |
const struct ovl_layer *layer) |
3985b70a3 ovl: decode conne... |
354 355 356 357 358 |
{ struct inode *dir = d_inode(connected); struct dentry *this, *parent = NULL; struct name_snapshot name; int err; |
3985b70a3 ovl: decode conne... |
359 360 361 362 363 364 365 366 367 368 |
/* * Lookup child overlay dentry by real name. The dir mutex protects us * from racing with overlay rename. If the overlay dentry that is above * real has already been moved to a parent that is not under the * connected overlay dir, we return -ECHILD and restart the lookup of * connected real path from the top. */ inode_lock_nested(dir, I_MUTEX_PARENT); err = -ECHILD; parent = dget_parent(real); |
988925164 ovl: decode pure ... |
369 |
if (ovl_dentry_real_at(connected, layer->idx) != parent) |
3985b70a3 ovl: decode conne... |
370 371 372 373 374 375 376 377 378 |
goto fail; /* * We also need to take a snapshot of real dentry name to protect us * from racing with underlying layer rename. In this case, we don't * care about returning ESTALE, only from dereferencing a free name * pointer because we hold no lock on the real dentry. */ take_dentry_name_snapshot(&name, real); |
230c6402b ovl_lookup_real_o... |
379 |
this = lookup_one_len(name.name.name, connected, name.name.len); |
3985b70a3 ovl: decode conne... |
380 381 382 383 384 385 386 |
err = PTR_ERR(this); if (IS_ERR(this)) { goto fail; } else if (!this || !this->d_inode) { dput(this); err = -ENOENT; goto fail; |
988925164 ovl: decode pure ... |
387 |
} else if (ovl_dentry_real_at(this, layer->idx) != real) { |
3985b70a3 ovl: decode conne... |
388 389 390 391 392 393 394 395 396 397 398 399 |
dput(this); err = -ESTALE; goto fail; } out: release_dentry_name_snapshot(&name); dput(parent); inode_unlock(dir); return this; fail: |
1bd0a3aea ovl: use pr_fmt a... |
400 401 |
pr_warn_ratelimited("failed to lookup one by real (%pd2, layer=%d, connected=%pd2, err=%i) ", |
3985b70a3 ovl: decode conne... |
402 403 404 405 |
real, layer->idx, connected, err); this = ERR_PTR(err); goto out; } |
061701540 ovl: lookup index... |
406 407 |
static struct dentry *ovl_lookup_real(struct super_block *sb, struct dentry *real, |
134641656 ovl: layer is const |
408 |
const struct ovl_layer *layer); |
061701540 ovl: lookup index... |
409 |
|
3985b70a3 ovl: decode conne... |
410 |
/* |
4b91c30a5 ovl: lookup conne... |
411 412 413 414 |
* Lookup an indexed or hashed overlay dentry by real inode. */ static struct dentry *ovl_lookup_real_inode(struct super_block *sb, struct dentry *real, |
134641656 ovl: layer is const |
415 |
const struct ovl_layer *layer) |
4b91c30a5 ovl: lookup conne... |
416 |
{ |
061701540 ovl: lookup index... |
417 |
struct ovl_fs *ofs = sb->s_fs_info; |
061701540 ovl: lookup index... |
418 |
struct dentry *index = NULL; |
4b91c30a5 ovl: lookup conne... |
419 420 |
struct dentry *this = NULL; struct inode *inode; |
061701540 ovl: lookup index... |
421 422 423 424 |
/* * Decoding upper dir from index is expensive, so first try to lookup * overlay dentry in inode/dcache. */ |
4b91c30a5 ovl: lookup conne... |
425 426 427 428 429 430 431 |
inode = ovl_lookup_inode(sb, real, !layer->idx); if (IS_ERR(inode)) return ERR_CAST(inode); if (inode) { this = d_find_any_alias(inode); iput(inode); } |
061701540 ovl: lookup index... |
432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 |
/* * For decoded lower dir file handle, lookup index by origin to check * if lower dir was copied up and and/or removed. */ if (!this && layer->idx && ofs->indexdir && !WARN_ON(!d_is_dir(real))) { index = ovl_lookup_index(ofs, NULL, real, false); if (IS_ERR(index)) return index; } /* Get connected upper overlay dir from index */ if (index) { struct dentry *upper = ovl_index_upper(ofs, index); dput(index); if (IS_ERR_OR_NULL(upper)) return upper; /* * ovl_lookup_real() in lower layer may call recursively once to * ovl_lookup_real() in upper layer. The first level call walks * back lower parents to the topmost indexed parent. The second * recursive call walks back from indexed upper to the topmost * connected/hashed upper parent (or up to root). */ |
94375f9d5 ovl: generalize t... |
457 |
this = ovl_lookup_real(sb, upper, &ofs->layers[0]); |
061701540 ovl: lookup index... |
458 459 |
dput(upper); } |
7168179fc ovl: check ERR_PT... |
460 461 |
if (IS_ERR_OR_NULL(this)) return this; |
4b91c30a5 ovl: lookup conne... |
462 |
|
124c2de2c ovl: relax WARN_O... |
463 |
if (ovl_dentry_real_at(this, layer->idx) != real) { |
4b91c30a5 ovl: lookup conne... |
464 465 466 467 468 469 470 471 472 473 474 475 476 |
dput(this); this = ERR_PTR(-EIO); } return this; } /* * Lookup an indexed or hashed overlay dentry, whose real dentry is an * ancestor of @real. */ static struct dentry *ovl_lookup_real_ancestor(struct super_block *sb, struct dentry *real, |
134641656 ovl: layer is const |
477 |
const struct ovl_layer *layer) |
4b91c30a5 ovl: lookup conne... |
478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 |
{ struct dentry *next, *parent = NULL; struct dentry *ancestor = ERR_PTR(-EIO); if (real == layer->mnt->mnt_root) return dget(sb->s_root); /* Find the topmost indexed or hashed ancestor */ next = dget(real); for (;;) { parent = dget_parent(next); /* * Lookup a matching overlay dentry in inode/dentry * cache or in index by real inode. */ ancestor = ovl_lookup_real_inode(sb, next, layer); if (ancestor) break; if (parent == layer->mnt->mnt_root) { ancestor = dget(sb->s_root); break; } /* * If @real has been moved out of the layer root directory, * we will eventully hit the real fs root. This cannot happen * by legit overlay rename, so we return error in that case. */ if (parent == next) { ancestor = ERR_PTR(-EXDEV); break; } dput(next); next = parent; } dput(parent); dput(next); return ancestor; } /* |
3985b70a3 ovl: decode conne... |
524 525 526 527 528 529 |
* Lookup a connected overlay dentry whose real dentry is @real. * If @real is on upper layer, we lookup a child overlay dentry with the same * path the real dentry. Otherwise, we need to consult index for lookup. */ static struct dentry *ovl_lookup_real(struct super_block *sb, struct dentry *real, |
134641656 ovl: layer is const |
530 |
const struct ovl_layer *layer) |
3985b70a3 ovl: decode conne... |
531 532 533 |
{ struct dentry *connected; int err = 0; |
4b91c30a5 ovl: lookup conne... |
534 535 536 |
connected = ovl_lookup_real_ancestor(sb, real, layer); if (IS_ERR(connected)) return connected; |
3985b70a3 ovl: decode conne... |
537 |
|
3985b70a3 ovl: decode conne... |
538 539 540 |
while (!err) { struct dentry *next, *this; struct dentry *parent = NULL; |
988925164 ovl: decode pure ... |
541 542 |
struct dentry *real_connected = ovl_dentry_real_at(connected, layer->idx); |
3985b70a3 ovl: decode conne... |
543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 |
if (real_connected == real) break; /* Find the topmost dentry not yet connected */ next = dget(real); for (;;) { parent = dget_parent(next); if (parent == real_connected) break; /* * If real has been moved out of 'real_connected', * we will not find 'real_connected' and hit the layer * root. In that case, we need to restart connecting. * This game can go on forever in the worst case. We * may want to consider taking s_vfs_rename_mutex if * this happens more than once. */ if (parent == layer->mnt->mnt_root) { dput(connected); connected = dget(sb->s_root); break; } /* * If real file has been moved out of the layer root * directory, we will eventully hit the real fs root. * This cannot happen by legit overlay rename, so we * return error in that case. */ if (parent == next) { err = -EXDEV; break; } dput(next); next = parent; } if (!err) { this = ovl_lookup_real_one(connected, next, layer); if (IS_ERR(this)) err = PTR_ERR(this); /* * Lookup of child in overlay can fail when racing with * overlay rename of child away from 'connected' parent. * In this case, we need to restart the lookup from the * top, because we cannot trust that 'real_connected' is |
4b91c30a5 ovl: lookup conne... |
594 595 596 597 |
* still an ancestor of 'real'. There is a good chance * that the renamed overlay ancestor is now in cache, so * ovl_lookup_real_ancestor() will find it and we can * continue to connect exactly from where lookup failed. |
3985b70a3 ovl: decode conne... |
598 599 |
*/ if (err == -ECHILD) { |
4b91c30a5 ovl: lookup conne... |
600 601 |
this = ovl_lookup_real_ancestor(sb, real, layer); |
b5095f24e ovl: fix ptr_ret.... |
602 |
err = PTR_ERR_OR_ZERO(this); |
3985b70a3 ovl: decode conne... |
603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 |
} if (!err) { dput(connected); connected = this; } } dput(parent); dput(next); } if (err) goto fail; return connected; fail: |
1bd0a3aea ovl: use pr_fmt a... |
620 621 |
pr_warn_ratelimited("failed to lookup by real (%pd2, layer=%d, connected=%pd2, err=%i) ", |
3985b70a3 ovl: decode conne... |
622 623 624 625 626 627 |
real, layer->idx, connected, err); dput(connected); return ERR_PTR(err); } /* |
f71bd9cfb ovl: decode index... |
628 |
* Get an overlay dentry from upper/lower real dentries and index. |
3985b70a3 ovl: decode conne... |
629 630 631 |
*/ static struct dentry *ovl_get_dentry(struct super_block *sb, struct dentry *upper, |
f71bd9cfb ovl: decode index... |
632 633 |
struct ovl_path *lowerpath, struct dentry *index) |
3985b70a3 ovl: decode conne... |
634 635 |
{ struct ovl_fs *ofs = sb->s_fs_info; |
134641656 ovl: layer is const |
636 |
const struct ovl_layer *layer = upper ? &ofs->layers[0] : lowerpath->layer; |
f71bd9cfb ovl: decode index... |
637 |
struct dentry *real = upper ?: (index ?: lowerpath->dentry); |
3985b70a3 ovl: decode conne... |
638 |
|
f941866fc ovl: decode lower... |
639 |
/* |
f71bd9cfb ovl: decode index... |
640 641 |
* Obtain a disconnected overlay dentry from a non-dir real dentry * and index. |
f941866fc ovl: decode lower... |
642 |
*/ |
f71bd9cfb ovl: decode index... |
643 644 |
if (!d_is_dir(real)) return ovl_obtain_alias(sb, upper, lowerpath, index); |
f941866fc ovl: decode lower... |
645 |
|
3985b70a3 ovl: decode conne... |
646 |
/* Removed empty directory? */ |
988925164 ovl: decode pure ... |
647 |
if ((real->d_flags & DCACHE_DISCONNECTED) || d_unhashed(real)) |
3985b70a3 ovl: decode conne... |
648 649 650 |
return ERR_PTR(-ENOENT); /* |
988925164 ovl: decode pure ... |
651 652 |
* If real dentry is connected and hashed, get a connected overlay * dentry whose real dentry is @real. |
3985b70a3 ovl: decode conne... |
653 |
*/ |
988925164 ovl: decode pure ... |
654 |
return ovl_lookup_real(sb, real, layer); |
3985b70a3 ovl: decode conne... |
655 |
} |
8556a4205 ovl: decode pure ... |
656 657 658 659 660 661 |
static struct dentry *ovl_upper_fh_to_d(struct super_block *sb, struct ovl_fh *fh) { struct ovl_fs *ofs = sb->s_fs_info; struct dentry *dentry; struct dentry *upper; |
08f4c7c86 ovl: add accessor... |
662 |
if (!ovl_upper_mnt(ofs)) |
8556a4205 ovl: decode pure ... |
663 |
return ERR_PTR(-EACCES); |
08f4c7c86 ovl: add accessor... |
664 |
upper = ovl_decode_real_fh(fh, ovl_upper_mnt(ofs), true); |
8556a4205 ovl: decode pure ... |
665 666 |
if (IS_ERR_OR_NULL(upper)) return upper; |
f71bd9cfb ovl: decode index... |
667 |
dentry = ovl_get_dentry(sb, upper, NULL, NULL); |
8556a4205 ovl: decode pure ... |
668 669 670 671 |
dput(upper); return dentry; } |
f941866fc ovl: decode lower... |
672 673 674 675 676 677 678 |
static struct dentry *ovl_lower_fh_to_d(struct super_block *sb, struct ovl_fh *fh) { struct ovl_fs *ofs = sb->s_fs_info; struct ovl_path origin = { }; struct ovl_path *stack = &origin; struct dentry *dentry = NULL; |
f71bd9cfb ovl: decode index... |
679 |
struct dentry *index = NULL; |
8b58924ad ovl: lookup in in... |
680 |
struct inode *inode; |
f941866fc ovl: decode lower... |
681 |
int err; |
8b58924ad ovl: lookup in in... |
682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 |
/* First lookup overlay inode in inode cache by origin fh */ err = ovl_check_origin_fh(ofs, fh, false, NULL, &stack); if (err) return ERR_PTR(err); if (!d_is_dir(origin.dentry) || !(origin.dentry->d_flags & DCACHE_DISCONNECTED)) { inode = ovl_lookup_inode(sb, origin.dentry, false); err = PTR_ERR(inode); if (IS_ERR(inode)) goto out_err; if (inode) { dentry = d_find_any_alias(inode); iput(inode); if (dentry) goto out; } } /* Then lookup indexed upper/whiteout by origin fh */ |
f71bd9cfb ovl: decode index... |
702 703 704 |
if (ofs->indexdir) { index = ovl_get_index_fh(ofs, fh); err = PTR_ERR(index); |
9436a1a33 ovl: decode lower... |
705 |
if (IS_ERR(index)) { |
9436a1a33 ovl: decode lower... |
706 |
index = NULL; |
8b58924ad ovl: lookup in in... |
707 |
goto out_err; |
9436a1a33 ovl: decode lower... |
708 |
} |
f71bd9cfb ovl: decode index... |
709 |
} |
8b58924ad ovl: lookup in in... |
710 |
/* Then try to get a connected upper dir by index */ |
3b0bfc6ed ovl: decode index... |
711 712 713 714 715 716 717 718 719 720 721 |
if (index && d_is_dir(index)) { struct dentry *upper = ovl_index_upper(ofs, index); err = PTR_ERR(upper); if (IS_ERR_OR_NULL(upper)) goto out_err; dentry = ovl_get_dentry(sb, upper, NULL, NULL); dput(upper); goto out; } |
155b8a049 ovl: fix decode o... |
722 723 |
/* Find origin.dentry again with ovl_acceptable() layer check */ if (d_is_dir(origin.dentry)) { |
8b58924ad ovl: lookup in in... |
724 725 726 |
dput(origin.dentry); origin.dentry = NULL; err = ovl_check_origin_fh(ofs, fh, true, NULL, &stack); |
f71bd9cfb ovl: decode index... |
727 728 |
if (err) goto out_err; |
8b58924ad ovl: lookup in in... |
729 730 |
} if (index) { |
610afc0bd ovl: pass ovl_fs ... |
731 |
err = ovl_verify_origin(ofs, index, origin.dentry, false); |
8b58924ad ovl: lookup in in... |
732 |
if (err) |
9436a1a33 ovl: decode lower... |
733 |
goto out_err; |
f71bd9cfb ovl: decode index... |
734 |
} |
f941866fc ovl: decode lower... |
735 |
|
155b8a049 ovl: fix decode o... |
736 |
/* Get a connected non-upper dir or disconnected non-dir */ |
f71bd9cfb ovl: decode index... |
737 |
dentry = ovl_get_dentry(sb, NULL, &origin, index); |
f941866fc ovl: decode lower... |
738 |
|
f71bd9cfb ovl: decode index... |
739 740 741 |
out: dput(origin.dentry); dput(index); |
f941866fc ovl: decode lower... |
742 |
return dentry; |
f71bd9cfb ovl: decode index... |
743 744 745 746 |
out_err: dentry = ERR_PTR(err); goto out; |
f941866fc ovl: decode lower... |
747 |
} |
cbe7fba8e ovl: make sure th... |
748 749 750 751 752 753 754 755 756 757 |
static struct ovl_fh *ovl_fid_to_fh(struct fid *fid, int buflen, int fh_type) { struct ovl_fh *fh; /* If on-wire inner fid is aligned - nothing to do */ if (fh_type == OVL_FILEID_V1) return (struct ovl_fh *)fid; if (fh_type != OVL_FILEID_V0) return ERR_PTR(-EINVAL); |
9aafc1b01 ovl: potential cr... |
758 759 |
if (buflen <= OVL_FH_WIRE_OFFSET) return ERR_PTR(-EINVAL); |
cbe7fba8e ovl: make sure th... |
760 761 762 763 764 765 766 767 |
fh = kzalloc(buflen, GFP_KERNEL); if (!fh) return ERR_PTR(-ENOMEM); /* Copy unaligned inner fh into aligned buffer */ memcpy(&fh->fb, fid, buflen - OVL_FH_WIRE_OFFSET); return fh; } |
8556a4205 ovl: decode pure ... |
768 769 770 771 |
static struct dentry *ovl_fh_to_dentry(struct super_block *sb, struct fid *fid, int fh_len, int fh_type) { struct dentry *dentry = NULL; |
cbe7fba8e ovl: make sure th... |
772 |
struct ovl_fh *fh = NULL; |
8556a4205 ovl: decode pure ... |
773 774 775 |
int len = fh_len << 2; unsigned int flags = 0; int err; |
cbe7fba8e ovl: make sure th... |
776 777 778 |
fh = ovl_fid_to_fh(fid, len, fh_type); err = PTR_ERR(fh); if (IS_ERR(fh)) |
8556a4205 ovl: decode pure ... |
779 780 781 782 783 |
goto out_err; err = ovl_check_fh_len(fh, len); if (err) goto out_err; |
cbe7fba8e ovl: make sure th... |
784 |
flags = fh->fb.flags; |
f941866fc ovl: decode lower... |
785 786 787 |
dentry = (flags & OVL_FH_FLAG_PATH_UPPER) ? ovl_upper_fh_to_d(sb, fh) : ovl_lower_fh_to_d(sb, fh); |
8556a4205 ovl: decode pure ... |
788 789 790 |
err = PTR_ERR(dentry); if (IS_ERR(dentry) && err != -ESTALE) goto out_err; |
cbe7fba8e ovl: make sure th... |
791 792 793 794 |
out: /* We may have needed to re-align OVL_FILEID_V0 */ if (!IS_ERR_OR_NULL(fh) && fh != (void *)fid) kfree(fh); |
8556a4205 ovl: decode pure ... |
795 796 797 |
return dentry; out_err: |
1bd0a3aea ovl: use pr_fmt a... |
798 799 |
pr_warn_ratelimited("failed to decode file handle (len=%d, type=%d, flags=%x, err=%i) ", |
cbe7fba8e ovl: make sure th... |
800 801 802 |
fh_len, fh_type, flags, err); dentry = ERR_PTR(err); goto out; |
8556a4205 ovl: decode pure ... |
803 |
} |
3985b70a3 ovl: decode conne... |
804 805 806 |
static struct dentry *ovl_fh_to_parent(struct super_block *sb, struct fid *fid, int fh_len, int fh_type) { |
1bd0a3aea ovl: use pr_fmt a... |
807 808 |
pr_warn_ratelimited("connectable file handles not supported; use 'no_subtree_check' exportfs option. "); |
3985b70a3 ovl: decode conne... |
809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 |
return ERR_PTR(-EACCES); } static int ovl_get_name(struct dentry *parent, char *name, struct dentry *child) { /* * ovl_fh_to_dentry() returns connected dir overlay dentries and * ovl_fh_to_parent() is not implemented, so we should not get here. */ WARN_ON_ONCE(1); return -EIO; } static struct dentry *ovl_get_parent(struct dentry *dentry) { /* * ovl_fh_to_dentry() returns connected dir overlay dentries, so we * should not get here. */ WARN_ON_ONCE(1); return ERR_PTR(-EIO); } |
8ed5eec9d ovl: encode pure ... |
832 |
const struct export_operations ovl_export_operations = { |
5b2cccd32 ovl: disambiguate... |
833 |
.encode_fh = ovl_encode_fh, |
8556a4205 ovl: decode pure ... |
834 |
.fh_to_dentry = ovl_fh_to_dentry, |
3985b70a3 ovl: decode conne... |
835 836 837 |
.fh_to_parent = ovl_fh_to_parent, .get_name = ovl_get_name, .get_parent = ovl_get_parent, |
8ed5eec9d ovl: encode pure ... |
838 |
}; |