github.com/ttpreport/gvisor-ligolo@v0.0.0-20240123134145-a858404967ba/pkg/sentry/fsimpl/overlay/overlay.go (about) 1 // Copyright 2020 The gVisor Authors. 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 // Package overlay provides an overlay filesystem implementation, which 16 // synthesizes a filesystem by composing one or more immutable filesystems 17 // ("lower layers") with an optional mutable filesystem ("upper layer"). 18 // 19 // Lock order: 20 // 21 // directoryFD.mu / regularFileFD.mu 22 // filesystem.renameMu 23 // dentry.dirMu 24 // dentry.copyMu 25 // filesystem.devMu 26 // *** "memmap.Mappable locks" below this point 27 // dentry.mapsMu 28 // *** "memmap.Mappable locks taken by Translate" below this point 29 // dentry.dataMu 30 // 31 // Locking dentry.dirMu in multiple dentries requires that parent dentries are 32 // locked before child dentries, and that filesystem.renameMu is locked to 33 // stabilize this relationship. 34 package overlay 35 36 import ( 37 "fmt" 38 "strings" 39 40 "github.com/ttpreport/gvisor-ligolo/pkg/abi/linux" 41 "github.com/ttpreport/gvisor-ligolo/pkg/atomicbitops" 42 "github.com/ttpreport/gvisor-ligolo/pkg/context" 43 "github.com/ttpreport/gvisor-ligolo/pkg/errors/linuxerr" 44 "github.com/ttpreport/gvisor-ligolo/pkg/fspath" 45 "github.com/ttpreport/gvisor-ligolo/pkg/refs" 46 "github.com/ttpreport/gvisor-ligolo/pkg/sentry/kernel/auth" 47 "github.com/ttpreport/gvisor-ligolo/pkg/sentry/memmap" 48 "github.com/ttpreport/gvisor-ligolo/pkg/sentry/vfs" 49 "github.com/ttpreport/gvisor-ligolo/pkg/sync" 50 ) 51 52 // Name is the default filesystem name. 53 const Name = "overlay" 54 55 // FilesystemType implements vfs.FilesystemType. 56 // 57 // +stateify savable 58 type FilesystemType struct{} 59 60 // Name implements vfs.FilesystemType.Name. 61 func (FilesystemType) Name() string { 62 return Name 63 } 64 65 // Release implements FilesystemType.Release. 66 func (FilesystemType) Release(ctx context.Context) {} 67 68 // FilesystemOptions may be passed as vfs.GetFilesystemOptions.InternalData to 69 // FilesystemType.GetFilesystem. 70 // 71 // +stateify savable 72 type FilesystemOptions struct { 73 // Callers passing FilesystemOptions to 74 // overlay.FilesystemType.GetFilesystem() are responsible for ensuring that 75 // the vfs.Mounts comprising the layers of the overlay filesystem do not 76 // contain submounts. 77 78 // If UpperRoot.Ok(), it is the root of the writable upper layer of the 79 // overlay. 80 UpperRoot vfs.VirtualDentry 81 82 // LowerRoots contains the roots of the immutable lower layers of the 83 // overlay. LowerRoots is immutable. 84 LowerRoots []vfs.VirtualDentry 85 } 86 87 // filesystem implements vfs.FilesystemImpl. 88 // 89 // +stateify savable 90 type filesystem struct { 91 vfsfs vfs.Filesystem 92 93 // Immutable options. 94 opts FilesystemOptions 95 96 // creds is a copy of the filesystem's creator's credentials, which are 97 // used for accesses to the filesystem's layers. creds is immutable. 98 creds *auth.Credentials 99 100 // dirDevMinor is the device minor number used for directories. dirDevMinor 101 // is immutable. 102 dirDevMinor uint32 103 104 // lowerDevMinors maps device numbers from lower layer filesystems to 105 // device minor numbers assigned to non-directory files originating from 106 // that filesystem. (This remapping is necessary for lower layers because a 107 // file on a lower layer, and that same file on an overlay, are 108 // distinguishable because they will diverge after copy-up; this isn't true 109 // for non-directory files already on the upper layer.) lowerDevMinors is 110 // protected by devMu. 111 devMu devMutex `state:"nosave"` 112 lowerDevMinors map[layerDevNumber]uint32 113 114 // renameMu synchronizes renaming with non-renaming operations in order to 115 // ensure consistent lock ordering between dentry.dirMu in different 116 // dentries. 117 renameMu renameRWMutex `state:"nosave"` 118 119 // dirInoCache caches overlay-private directory inode numbers by mapped 120 // bottommost device numbers and inode number. dirInoCache is protected by 121 // dirInoCacheMu. 122 dirInoCacheMu dirInoCacheMutex `state:"nosave"` 123 dirInoCache map[layerDevNoAndIno]uint64 124 125 // lastDirIno is the last inode number assigned to a directory. lastDirIno 126 // is protected by dirInoCacheMu. 127 lastDirIno uint64 128 129 // MaxFilenameLen is the maximum filename length allowed by the overlayfs. 130 maxFilenameLen uint64 131 } 132 133 // +stateify savable 134 type layerDevNumber struct { 135 major uint32 136 minor uint32 137 } 138 139 // +stateify savable 140 type layerDevNoAndIno struct { 141 layerDevNumber 142 ino uint64 143 } 144 145 // GetFilesystem implements vfs.FilesystemType.GetFilesystem. 146 func (fstype FilesystemType) GetFilesystem(ctx context.Context, vfsObj *vfs.VirtualFilesystem, creds *auth.Credentials, source string, opts vfs.GetFilesystemOptions) (*vfs.Filesystem, *vfs.Dentry, error) { 147 mopts := vfs.GenericParseMountOptions(opts.Data) 148 fsoptsRaw := opts.InternalData 149 fsopts, ok := fsoptsRaw.(FilesystemOptions) 150 if fsoptsRaw != nil && !ok { 151 ctx.Infof("overlay.FilesystemType.GetFilesystem: GetFilesystemOptions.InternalData has type %T, wanted overlay.FilesystemOptions or nil", fsoptsRaw) 152 return nil, nil, linuxerr.EINVAL 153 } 154 vfsroot := vfs.RootFromContext(ctx) 155 if vfsroot.Ok() { 156 defer vfsroot.DecRef(ctx) 157 } 158 159 if upperPathname, ok := mopts["upperdir"]; ok { 160 if fsopts.UpperRoot.Ok() { 161 ctx.Infof("overlay.FilesystemType.GetFilesystem: both upperdir and FilesystemOptions.UpperRoot are specified") 162 return nil, nil, linuxerr.EINVAL 163 } 164 delete(mopts, "upperdir") 165 // Linux overlayfs also requires a workdir when upperdir is 166 // specified; we don't, so silently ignore this option. 167 delete(mopts, "workdir") 168 upperPath := fspath.Parse(upperPathname) 169 if !upperPath.Absolute { 170 ctx.Infof("overlay.FilesystemType.GetFilesystem: upperdir %q must be absolute", upperPathname) 171 return nil, nil, linuxerr.EINVAL 172 } 173 upperRoot, err := vfsObj.GetDentryAt(ctx, creds, &vfs.PathOperation{ 174 Root: vfsroot, 175 Start: vfsroot, 176 Path: upperPath, 177 FollowFinalSymlink: true, 178 }, &vfs.GetDentryOptions{ 179 CheckSearchable: true, 180 }) 181 if err != nil { 182 ctx.Infof("overlay.FilesystemType.GetFilesystem: failed to resolve upperdir %q: %v", upperPathname, err) 183 return nil, nil, err 184 } 185 privateUpperRoot, err := clonePrivateMount(vfsObj, upperRoot, false /* forceReadOnly */) 186 upperRoot.DecRef(ctx) 187 if err != nil { 188 ctx.Infof("overlay.FilesystemType.GetFilesystem: failed to make private bind mount of upperdir %q: %v", upperPathname, err) 189 return nil, nil, err 190 } 191 defer privateUpperRoot.DecRef(ctx) 192 fsopts.UpperRoot = privateUpperRoot 193 } 194 195 if lowerPathnamesStr, ok := mopts["lowerdir"]; ok { 196 if len(fsopts.LowerRoots) != 0 { 197 ctx.Infof("overlay.FilesystemType.GetFilesystem: both lowerdir and FilesystemOptions.LowerRoots are specified") 198 return nil, nil, linuxerr.EINVAL 199 } 200 delete(mopts, "lowerdir") 201 lowerPathnames := strings.Split(lowerPathnamesStr, ":") 202 for _, lowerPathname := range lowerPathnames { 203 lowerPath := fspath.Parse(lowerPathname) 204 if !lowerPath.Absolute { 205 ctx.Infof("overlay.FilesystemType.GetFilesystem: lowerdir %q must be absolute", lowerPathname) 206 return nil, nil, linuxerr.EINVAL 207 } 208 lowerRoot, err := vfsObj.GetDentryAt(ctx, creds, &vfs.PathOperation{ 209 Root: vfsroot, 210 Start: vfsroot, 211 Path: lowerPath, 212 FollowFinalSymlink: true, 213 }, &vfs.GetDentryOptions{ 214 CheckSearchable: true, 215 }) 216 if err != nil { 217 ctx.Infof("overlay.FilesystemType.GetFilesystem: failed to resolve lowerdir %q: %v", lowerPathname, err) 218 return nil, nil, err 219 } 220 privateLowerRoot, err := clonePrivateMount(vfsObj, lowerRoot, true /* forceReadOnly */) 221 lowerRoot.DecRef(ctx) 222 if err != nil { 223 ctx.Infof("overlay.FilesystemType.GetFilesystem: failed to make private bind mount of lowerdir %q: %v", lowerPathname, err) 224 return nil, nil, err 225 } 226 defer privateLowerRoot.DecRef(ctx) 227 fsopts.LowerRoots = append(fsopts.LowerRoots, privateLowerRoot) 228 } 229 } 230 231 if len(mopts) != 0 { 232 ctx.Infof("overlay.FilesystemType.GetFilesystem: unused options: %v", mopts) 233 return nil, nil, linuxerr.EINVAL 234 } 235 236 if len(fsopts.LowerRoots) == 0 { 237 ctx.Infof("overlay.FilesystemType.GetFilesystem: at least one lower layer is required") 238 return nil, nil, linuxerr.EINVAL 239 } 240 if len(fsopts.LowerRoots) < 2 && !fsopts.UpperRoot.Ok() { 241 ctx.Infof("overlay.FilesystemType.GetFilesystem: at least two lower layers are required when no upper layer is present") 242 return nil, nil, linuxerr.EINVAL 243 } 244 const maxLowerLayers = 500 // Linux: fs/overlay/super.c:OVL_MAX_STACK 245 if len(fsopts.LowerRoots) > maxLowerLayers { 246 ctx.Infof("overlay.FilesystemType.GetFilesystem: %d lower layers specified, maximum %d", len(fsopts.LowerRoots), maxLowerLayers) 247 return nil, nil, linuxerr.EINVAL 248 } 249 250 // Allocate dirDevMinor. lowerDevMinors are allocated dynamically. 251 dirDevMinor, err := vfsObj.GetAnonBlockDevMinor() 252 if err != nil { 253 return nil, nil, err 254 } 255 256 // Take extra references held by the filesystem. 257 if fsopts.UpperRoot.Ok() { 258 fsopts.UpperRoot.IncRef() 259 } 260 for _, lowerRoot := range fsopts.LowerRoots { 261 lowerRoot.IncRef() 262 } 263 264 fs := &filesystem{ 265 opts: fsopts, 266 creds: creds.Fork(), 267 dirDevMinor: dirDevMinor, 268 lowerDevMinors: make(map[layerDevNumber]uint32), 269 dirInoCache: make(map[layerDevNoAndIno]uint64), 270 maxFilenameLen: linux.NAME_MAX, 271 } 272 fs.vfsfs.Init(vfsObj, &fstype, fs) 273 274 // Configure max filename length. Similar to what Linux does in 275 // fs/overlayfs/super.c:ovl_fill_super() -> ... -> ovl_check_namelen(). 276 if fsopts.UpperRoot.Ok() { 277 if err := fs.updateMaxNameLen(ctx, creds, vfsObj, fs.opts.UpperRoot); err != nil { 278 ctx.Debugf("overlay.FilesystemType.GetFilesystem: failed to StatFSAt on upper layer root: %v", err) 279 } 280 } 281 for _, lowerRoot := range fsopts.LowerRoots { 282 if err := fs.updateMaxNameLen(ctx, creds, vfsObj, lowerRoot); err != nil { 283 ctx.Debugf("overlay.FilesystemType.GetFilesystem: failed to StatFSAt on lower layer root: %v", err) 284 } 285 } 286 287 // Construct the root dentry. 288 root := fs.newDentry() 289 root.refs = atomicbitops.FromInt64(1) 290 if fs.opts.UpperRoot.Ok() { 291 fs.opts.UpperRoot.IncRef() 292 root.copiedUp = atomicbitops.FromUint32(1) 293 root.upperVD = fs.opts.UpperRoot 294 } 295 for _, lowerRoot := range fs.opts.LowerRoots { 296 lowerRoot.IncRef() 297 root.lowerVDs = append(root.lowerVDs, lowerRoot) 298 } 299 rootTopVD := root.topLayer() 300 // Get metadata from the topmost layer. See fs.lookupLocked(). 301 const rootStatMask = linux.STATX_TYPE | linux.STATX_MODE | linux.STATX_UID | linux.STATX_GID | linux.STATX_INO 302 rootStat, err := vfsObj.StatAt(ctx, creds, &vfs.PathOperation{ 303 Root: rootTopVD, 304 Start: rootTopVD, 305 }, &vfs.StatOptions{ 306 Mask: rootStatMask, 307 }) 308 if err != nil { 309 root.destroyLocked(ctx) 310 fs.vfsfs.DecRef(ctx) 311 return nil, nil, err 312 } 313 if rootStat.Mask&rootStatMask != rootStatMask { 314 root.destroyLocked(ctx) 315 fs.vfsfs.DecRef(ctx) 316 return nil, nil, linuxerr.EREMOTE 317 } 318 if isWhiteout(&rootStat) { 319 ctx.Infof("overlay.FilesystemType.GetFilesystem: filesystem root is a whiteout") 320 root.destroyLocked(ctx) 321 fs.vfsfs.DecRef(ctx) 322 return nil, nil, linuxerr.EINVAL 323 } 324 root.mode = atomicbitops.FromUint32(uint32(rootStat.Mode)) 325 root.uid = atomicbitops.FromUint32(rootStat.UID) 326 root.gid = atomicbitops.FromUint32(rootStat.GID) 327 if rootStat.Mode&linux.S_IFMT == linux.S_IFDIR { 328 root.devMajor = atomicbitops.FromUint32(linux.UNNAMED_MAJOR) 329 root.devMinor = atomicbitops.FromUint32(fs.dirDevMinor) 330 // For root dir, it is okay to use top most level's stat to compute inode 331 // number because we don't allow copy ups on root dentries. 332 root.ino.Store(fs.newDirIno(rootStat.DevMajor, rootStat.DevMinor, rootStat.Ino)) 333 } else if !root.upperVD.Ok() { 334 root.devMajor = atomicbitops.FromUint32(linux.UNNAMED_MAJOR) 335 rootDevMinor, err := fs.getLowerDevMinor(rootStat.DevMajor, rootStat.DevMinor) 336 if err != nil { 337 ctx.Infof("overlay.FilesystemType.GetFilesystem: failed to get device number for root: %v", err) 338 root.destroyLocked(ctx) 339 fs.vfsfs.DecRef(ctx) 340 return nil, nil, err 341 } 342 root.devMinor = atomicbitops.FromUint32(rootDevMinor) 343 root.ino.Store(rootStat.Ino) 344 } else { 345 root.devMajor = atomicbitops.FromUint32(rootStat.DevMajor) 346 root.devMinor = atomicbitops.FromUint32(rootStat.DevMinor) 347 root.ino.Store(rootStat.Ino) 348 } 349 350 return &fs.vfsfs, &root.vfsd, nil 351 } 352 353 // clonePrivateMount creates a non-recursive bind mount rooted at vd, not 354 // associated with any MountNamespace, and returns the root of the new mount. 355 // (This is required to ensure that each layer of an overlay comprises only a 356 // single mount, and therefore can't cross into e.g. the overlay filesystem 357 // itself, risking lock recursion.) A reference is held on the returned 358 // VirtualDentry. 359 func clonePrivateMount(vfsObj *vfs.VirtualFilesystem, vd vfs.VirtualDentry, forceReadOnly bool) (vfs.VirtualDentry, error) { 360 oldmnt := vd.Mount() 361 opts := oldmnt.Options() 362 if forceReadOnly { 363 opts.ReadOnly = true 364 } 365 newmnt := vfsObj.NewDisconnectedMount(oldmnt.Filesystem(), vd.Dentry(), &opts) 366 // Take a reference on the dentry which will be owned by the returned 367 // VirtualDentry. 368 d := vd.Dentry() 369 d.IncRef() 370 return vfs.MakeVirtualDentry(newmnt, d), nil 371 } 372 373 // Release implements vfs.FilesystemImpl.Release. 374 func (fs *filesystem) Release(ctx context.Context) { 375 vfsObj := fs.vfsfs.VirtualFilesystem() 376 vfsObj.PutAnonBlockDevMinor(fs.dirDevMinor) 377 for _, lowerDevMinor := range fs.lowerDevMinors { 378 vfsObj.PutAnonBlockDevMinor(lowerDevMinor) 379 } 380 if fs.opts.UpperRoot.Ok() { 381 fs.opts.UpperRoot.DecRef(ctx) 382 } 383 for _, lowerRoot := range fs.opts.LowerRoots { 384 lowerRoot.DecRef(ctx) 385 } 386 } 387 388 // updateMaxNameLen is analogous to fs/overlayfs/super.c:ovl_check_namelen(). 389 func (fs *filesystem) updateMaxNameLen(ctx context.Context, creds *auth.Credentials, vfsObj *vfs.VirtualFilesystem, vd vfs.VirtualDentry) error { 390 statfs, err := vfsObj.StatFSAt(ctx, creds, &vfs.PathOperation{ 391 Root: vd, 392 Start: vd, 393 }) 394 if err != nil { 395 return err 396 } 397 if statfs.NameLength > fs.maxFilenameLen { 398 fs.maxFilenameLen = statfs.NameLength 399 } 400 return nil 401 } 402 403 func (fs *filesystem) statFS(ctx context.Context) (linux.Statfs, error) { 404 // Always statfs the root of the topmost layer. Compare Linux's 405 // fs/overlayfs/super.c:ovl_statfs(). 406 var rootVD vfs.VirtualDentry 407 if fs.opts.UpperRoot.Ok() { 408 rootVD = fs.opts.UpperRoot 409 } else { 410 rootVD = fs.opts.LowerRoots[0] 411 } 412 fsstat, err := fs.vfsfs.VirtualFilesystem().StatFSAt(ctx, fs.creds, &vfs.PathOperation{ 413 Root: rootVD, 414 Start: rootVD, 415 }) 416 if err != nil { 417 return linux.Statfs{}, err 418 } 419 fsstat.Type = linux.OVERLAYFS_SUPER_MAGIC 420 return fsstat, nil 421 } 422 423 func (fs *filesystem) newDirIno(layerMajor, layerMinor uint32, layerIno uint64) uint64 { 424 fs.dirInoCacheMu.Lock() 425 defer fs.dirInoCacheMu.Unlock() 426 orig := layerDevNoAndIno{ 427 layerDevNumber: layerDevNumber{layerMajor, layerMinor}, 428 ino: layerIno, 429 } 430 if ino, ok := fs.dirInoCache[orig]; ok { 431 return ino 432 } 433 fs.lastDirIno++ 434 newIno := fs.lastDirIno 435 fs.dirInoCache[orig] = newIno 436 return newIno 437 } 438 439 func (fs *filesystem) getLowerDevMinor(layerMajor, layerMinor uint32) (uint32, error) { 440 fs.devMu.Lock() 441 defer fs.devMu.Unlock() 442 orig := layerDevNumber{layerMajor, layerMinor} 443 if minor, ok := fs.lowerDevMinors[orig]; ok { 444 return minor, nil 445 } 446 minor, err := fs.vfsfs.VirtualFilesystem().GetAnonBlockDevMinor() 447 if err != nil { 448 return 0, err 449 } 450 fs.lowerDevMinors[orig] = minor 451 return minor, nil 452 } 453 454 // dentry implements vfs.DentryImpl. 455 // 456 // +stateify savable 457 type dentry struct { 458 vfsd vfs.Dentry 459 460 refs atomicbitops.Int64 461 462 // fs is the owning filesystem. fs is immutable. 463 fs *filesystem 464 465 // mode, uid, and gid are the file mode, owner, and group of the file in 466 // the topmost layer (and therefore the overlay file as well), and are used 467 // for permission checks on this dentry. These fields are protected by 468 // copyMu. 469 mode atomicbitops.Uint32 470 uid atomicbitops.Uint32 471 gid atomicbitops.Uint32 472 473 // copiedUp is 1 if this dentry has been copied-up (i.e. upperVD.Ok()) and 474 // 0 otherwise. 475 copiedUp atomicbitops.Uint32 476 477 // parent is the dentry corresponding to this dentry's parent directory. 478 // name is this dentry's name in parent. If this dentry is a filesystem 479 // root, parent is nil and name is the empty string. parent and name are 480 // protected by fs.renameMu. 481 parent *dentry 482 name string 483 484 // If this dentry represents a directory, children maps the names of 485 // children for which dentries have been instantiated to those dentries, 486 // and dirents (if not nil) is a cache of dirents as returned by 487 // directoryFDs representing this directory. children is protected by 488 // dirMu. 489 dirMu dirMutex `state:"nosave"` 490 children map[string]*dentry 491 dirents []vfs.Dirent 492 493 // upperVD and lowerVDs are the files from the overlay filesystem's layers 494 // that comprise the file on the overlay filesystem. 495 // 496 // If !upperVD.Ok(), it can transition to a valid vfs.VirtualDentry (i.e. 497 // be copied up) with copyMu locked for writing; otherwise, it is 498 // immutable. lowerVDs is always immutable. 499 copyMu sync.RWMutex `state:"nosave"` 500 upperVD vfs.VirtualDentry 501 lowerVDs []vfs.VirtualDentry 502 503 // inlineLowerVDs backs lowerVDs in the common case where len(lowerVDs) <= 504 // len(inlineLowerVDs). 505 inlineLowerVDs [1]vfs.VirtualDentry 506 507 // devMajor, devMinor, and ino are the device major/minor and inode numbers 508 // used by this dentry. These fields are protected by copyMu. 509 devMajor atomicbitops.Uint32 510 devMinor atomicbitops.Uint32 511 ino atomicbitops.Uint64 512 513 // If this dentry represents a regular file, then: 514 // 515 // - mapsMu is used to synchronize between copy-up and memmap.Mappable 516 // methods on dentry preceding mm.MemoryManager.activeMu in the lock order. 517 // 518 // - dataMu is used to synchronize between copy-up and 519 // dentry.(memmap.Mappable).Translate. 520 // 521 // - lowerMappings tracks memory mappings of the file. lowerMappings is 522 // used to invalidate mappings of the lower layer when the file is copied 523 // up to ensure that they remain coherent with subsequent writes to the 524 // file. (Note that, as of this writing, Linux overlayfs does not do this; 525 // this feature is a gVisor extension.) lowerMappings is protected by 526 // mapsMu. 527 // 528 // - If this dentry is copied-up, then wrappedMappable is the Mappable 529 // obtained from a call to the current top layer's 530 // FileDescription.ConfigureMMap(). Once wrappedMappable becomes non-nil 531 // (from a call to regularFileFD.ensureMappable()), it cannot become nil. 532 // wrappedMappable is protected by mapsMu and dataMu. 533 // 534 // - isMappable is non-zero iff wrappedMappable is non-nil. isMappable is 535 // accessed using atomic memory operations. 536 // 537 // - wrappedMappable is protected by mapsMu and dataMu. In addition, 538 // it has to be immutable if copyMu is taken for write. 539 // copyUpMaybeSyntheticMountpointLocked relies on this behavior. 540 mapsMu mapsMutex `state:"nosave"` 541 lowerMappings memmap.MappingSet 542 dataMu dataRWMutex `state:"nosave"` 543 wrappedMappable memmap.Mappable 544 isMappable atomicbitops.Uint32 545 546 locks vfs.FileLocks 547 548 // watches is the set of inotify watches on the file repesented by this dentry. 549 // 550 // Note that hard links to the same file will not share the same set of 551 // watches, due to the fact that we do not have inode structures in this 552 // overlay implementation. 553 watches vfs.Watches 554 } 555 556 // newDentry creates a new dentry. The dentry initially has no references; it 557 // is the caller's responsibility to set the dentry's reference count and/or 558 // call dentry.destroy() as appropriate. The dentry is initially invalid in 559 // that it contains no layers; the caller is responsible for setting them. 560 func (fs *filesystem) newDentry() *dentry { 561 d := &dentry{ 562 fs: fs, 563 } 564 d.lowerVDs = d.inlineLowerVDs[:0] 565 d.vfsd.Init(d) 566 refs.Register(d) 567 return d 568 } 569 570 // IncRef implements vfs.DentryImpl.IncRef. 571 func (d *dentry) IncRef() { 572 // d.refs may be 0 if d.fs.renameMu is locked, which serializes against 573 // d.checkDropLocked(). 574 r := d.refs.Add(1) 575 if d.LogRefs() { 576 refs.LogIncRef(d, r) 577 } 578 } 579 580 // TryIncRef implements vfs.DentryImpl.TryIncRef. 581 func (d *dentry) TryIncRef() bool { 582 for { 583 r := d.refs.Load() 584 if r <= 0 { 585 return false 586 } 587 if d.refs.CompareAndSwap(r, r+1) { 588 if d.LogRefs() { 589 refs.LogTryIncRef(d, r+1) 590 } 591 return true 592 } 593 } 594 } 595 596 // DecRef implements vfs.DentryImpl.DecRef. 597 func (d *dentry) DecRef(ctx context.Context) { 598 r := d.refs.Add(-1) 599 if d.LogRefs() { 600 refs.LogDecRef(d, r) 601 } 602 if r == 0 { 603 d.fs.renameMu.Lock() 604 d.checkDropLocked(ctx) 605 d.fs.renameMu.Unlock() 606 } else if r < 0 { 607 panic("overlay.dentry.DecRef() called without holding a reference") 608 } 609 } 610 611 func (d *dentry) decRefLocked(ctx context.Context) { 612 r := d.refs.Add(-1) 613 if d.LogRefs() { 614 refs.LogDecRef(d, r) 615 } 616 if r == 0 { 617 d.checkDropLocked(ctx) 618 } else if r < 0 { 619 panic("overlay.dentry.decRefLocked() called without holding a reference") 620 } 621 } 622 623 // checkDropLocked should be called after d's reference count becomes 0 or it 624 // becomes deleted. 625 // 626 // Preconditions: d.fs.renameMu must be locked for writing. 627 func (d *dentry) checkDropLocked(ctx context.Context) { 628 // Dentries with a positive reference count must be retained. (The only way 629 // to obtain a reference on a dentry with zero references is via path 630 // resolution, which requires renameMu, so if d.refs is zero then it will 631 // remain zero while we hold renameMu for writing.) Dentries with a 632 // negative reference count have already been destroyed. 633 if d.refs.Load() != 0 { 634 return 635 } 636 637 // Make sure that we do not lose watches on dentries that have not been 638 // deleted. Note that overlayfs never calls VFS.InvalidateDentry(), so 639 // d.vfsd.IsDead() indicates that d was deleted. 640 if !d.vfsd.IsDead() && d.watches.Size() > 0 { 641 return 642 } 643 644 // Refs is still zero; destroy it. 645 d.destroyLocked(ctx) 646 return 647 } 648 649 // destroyLocked destroys the dentry. 650 // 651 // Preconditions: 652 // - d.fs.renameMu must be locked for writing. 653 // - d.refs == 0. 654 func (d *dentry) destroyLocked(ctx context.Context) { 655 switch d.refs.Load() { 656 case 0: 657 // Mark the dentry destroyed. 658 d.refs.Store(-1) 659 case -1: 660 panic("overlay.dentry.destroyLocked() called on already destroyed dentry") 661 default: 662 panic("overlay.dentry.destroyLocked() called with references on the dentry") 663 } 664 665 if d.upperVD.Ok() { 666 d.upperVD.DecRef(ctx) 667 } 668 for _, lowerVD := range d.lowerVDs { 669 lowerVD.DecRef(ctx) 670 } 671 672 d.watches.HandleDeletion(ctx) 673 674 if d.parent != nil { 675 d.parent.dirMu.Lock() 676 if !d.vfsd.IsDead() { 677 delete(d.parent.children, d.name) 678 } 679 d.parent.dirMu.Unlock() 680 // Drop the reference held by d on its parent without recursively 681 // locking d.fs.renameMu. 682 d.parent.decRefLocked(ctx) 683 } 684 refs.Unregister(d) 685 } 686 687 // RefType implements refs.CheckedObject.Type. 688 func (d *dentry) RefType() string { 689 return "overlay.dentry" 690 } 691 692 // LeakMessage implements refs.CheckedObject.LeakMessage. 693 func (d *dentry) LeakMessage() string { 694 return fmt.Sprintf("[overlay.dentry %p] reference count of %d instead of -1", d, d.refs.Load()) 695 } 696 697 // LogRefs implements refs.CheckedObject.LogRefs. 698 // 699 // This should only be set to true for debugging purposes, as it can generate an 700 // extremely large amount of output and drastically degrade performance. 701 func (d *dentry) LogRefs() bool { 702 return false 703 } 704 705 // InotifyWithParent implements vfs.DentryImpl.InotifyWithParent. 706 func (d *dentry) InotifyWithParent(ctx context.Context, events uint32, cookie uint32, et vfs.EventType) { 707 if d.isDir() { 708 events |= linux.IN_ISDIR 709 } 710 711 // overlayfs never calls VFS.InvalidateDentry(), so d.vfsd.IsDead() indicates 712 // that d was deleted. 713 deleted := d.vfsd.IsDead() 714 715 d.fs.renameMu.RLock() 716 // The ordering below is important, Linux always notifies the parent first. 717 if d.parent != nil { 718 d.parent.watches.Notify(ctx, d.name, events, cookie, et, deleted) 719 } 720 d.watches.Notify(ctx, "", events, cookie, et, deleted) 721 d.fs.renameMu.RUnlock() 722 } 723 724 // Watches implements vfs.DentryImpl.Watches. 725 func (d *dentry) Watches() *vfs.Watches { 726 return &d.watches 727 } 728 729 // OnZeroWatches implements vfs.DentryImpl.OnZeroWatches. 730 func (d *dentry) OnZeroWatches(ctx context.Context) { 731 if d.refs.Load() == 0 { 732 d.fs.renameMu.Lock() 733 d.checkDropLocked(ctx) 734 d.fs.renameMu.Unlock() 735 } 736 } 737 738 // iterLayers invokes yield on each layer comprising d, from top to bottom. If 739 // any call to yield returns false, iterLayer stops iteration. 740 func (d *dentry) iterLayers(yield func(vd vfs.VirtualDentry, isUpper bool) bool) { 741 if d.isCopiedUp() { 742 if !yield(d.upperVD, true) { 743 return 744 } 745 } 746 for _, lowerVD := range d.lowerVDs { 747 if !yield(lowerVD, false) { 748 return 749 } 750 } 751 } 752 753 func (d *dentry) topLayerInfo() (vd vfs.VirtualDentry, isUpper bool) { 754 if d.isCopiedUp() { 755 return d.upperVD, true 756 } 757 return d.lowerVDs[0], false 758 } 759 760 func (d *dentry) topLayer() vfs.VirtualDentry { 761 vd, _ := d.topLayerInfo() 762 return vd 763 } 764 765 func (d *dentry) topLookupLayer() lookupLayer { 766 if d.upperVD.Ok() { 767 return lookupLayerUpper 768 } 769 return lookupLayerLower 770 } 771 772 func (d *dentry) checkPermissions(creds *auth.Credentials, ats vfs.AccessTypes) error { 773 return vfs.GenericCheckPermissions(creds, ats, linux.FileMode(d.mode.Load()), auth.KUID(d.uid.Load()), auth.KGID(d.gid.Load())) 774 } 775 776 func (d *dentry) checkXattrPermissions(creds *auth.Credentials, name string, ats vfs.AccessTypes) error { 777 mode := linux.FileMode(d.mode.Load()) 778 kuid := auth.KUID(d.uid.Load()) 779 kgid := auth.KGID(d.gid.Load()) 780 if err := vfs.GenericCheckPermissions(creds, ats, mode, kuid, kgid); err != nil { 781 return err 782 } 783 return vfs.CheckXattrPermissions(creds, ats, mode, kuid, name) 784 } 785 786 // statInternalMask is the set of stat fields that is set by 787 // dentry.statInternalTo(). 788 const statInternalMask = linux.STATX_TYPE | linux.STATX_MODE | linux.STATX_UID | linux.STATX_GID | linux.STATX_INO 789 790 // statInternalTo writes fields to stat that are stored in d, and therefore do 791 // not requiring invoking StatAt on the overlay's layers. 792 func (d *dentry) statInternalTo(ctx context.Context, opts *vfs.StatOptions, stat *linux.Statx) { 793 stat.Mask |= statInternalMask 794 if d.isDir() { 795 // Linux sets nlink to 1 for merged directories 796 // (fs/overlayfs/inode.c:ovl_getattr()); we set it to 2 because this is 797 // correct more often ("." and the directory's entry in its parent), 798 // and some of our tests expect this. 799 stat.Nlink = 2 800 } 801 stat.UID = d.uid.Load() 802 stat.GID = d.gid.Load() 803 stat.Mode = uint16(d.mode.Load()) 804 stat.Ino = d.ino.Load() 805 stat.DevMajor = d.devMajor.Load() 806 stat.DevMinor = d.devMinor.Load() 807 } 808 809 // Preconditions: d.copyMu must be locked for writing. 810 func (d *dentry) updateAfterSetStatLocked(opts *vfs.SetStatOptions) { 811 if opts.Stat.Mask&linux.STATX_MODE != 0 { 812 d.mode.Store((d.mode.RacyLoad() & linux.S_IFMT) | uint32(opts.Stat.Mode&^linux.S_IFMT)) 813 } 814 if opts.Stat.Mask&linux.STATX_UID != 0 { 815 d.uid.Store(opts.Stat.UID) 816 } 817 if opts.Stat.Mask&linux.STATX_GID != 0 { 818 d.gid.Store(opts.Stat.GID) 819 } 820 } 821 822 func (d *dentry) mayDelete(creds *auth.Credentials, child *dentry) error { 823 return vfs.CheckDeleteSticky( 824 creds, 825 linux.FileMode(d.mode.Load()), 826 auth.KUID(d.uid.Load()), 827 auth.KUID(child.uid.Load()), 828 auth.KGID(child.gid.Load()), 829 ) 830 } 831 832 // newChildOwnerStat returns a Statx for configuring the UID, GID, and mode of 833 // children. 834 func (d *dentry) newChildOwnerStat(mode linux.FileMode, creds *auth.Credentials) linux.Statx { 835 stat := linux.Statx{ 836 Mask: uint32(linux.STATX_UID | linux.STATX_GID), 837 UID: uint32(creds.EffectiveKUID), 838 GID: uint32(creds.EffectiveKGID), 839 } 840 // Set GID and possibly the SGID bit if the parent is an SGID directory. 841 d.copyMu.RLock() 842 defer d.copyMu.RUnlock() 843 if d.mode.Load()&linux.ModeSetGID == linux.ModeSetGID { 844 stat.GID = d.gid.Load() 845 if stat.Mode&linux.ModeDirectory == linux.ModeDirectory { 846 stat.Mode = uint16(mode) | linux.ModeSetGID 847 stat.Mask |= linux.STATX_MODE 848 } 849 } 850 return stat 851 } 852 853 // fileDescription is embedded by overlay implementations of 854 // vfs.FileDescriptionImpl. 855 // 856 // +stateify savable 857 type fileDescription struct { 858 vfsfd vfs.FileDescription 859 vfs.FileDescriptionDefaultImpl 860 vfs.LockFD 861 } 862 863 func (fd *fileDescription) filesystem() *filesystem { 864 return fd.vfsfd.Mount().Filesystem().Impl().(*filesystem) 865 } 866 867 func (fd *fileDescription) dentry() *dentry { 868 return fd.vfsfd.Dentry().Impl().(*dentry) 869 } 870 871 // ListXattr implements vfs.FileDescriptionImpl.ListXattr. 872 func (fd *fileDescription) ListXattr(ctx context.Context, size uint64) ([]string, error) { 873 return fd.filesystem().listXattr(ctx, fd.dentry(), size) 874 } 875 876 // GetXattr implements vfs.FileDescriptionImpl.GetXattr. 877 func (fd *fileDescription) GetXattr(ctx context.Context, opts vfs.GetXattrOptions) (string, error) { 878 return fd.filesystem().getXattr(ctx, fd.dentry(), auth.CredentialsFromContext(ctx), &opts) 879 } 880 881 // SetXattr implements vfs.FileDescriptionImpl.SetXattr. 882 func (fd *fileDescription) SetXattr(ctx context.Context, opts vfs.SetXattrOptions) error { 883 fs := fd.filesystem() 884 fs.renameMu.RLock() 885 defer fs.renameMu.RUnlock() 886 return fs.setXattrLocked(ctx, fd.dentry(), fd.vfsfd.Mount(), auth.CredentialsFromContext(ctx), &opts) 887 } 888 889 // RemoveXattr implements vfs.FileDescriptionImpl.RemoveXattr. 890 func (fd *fileDescription) RemoveXattr(ctx context.Context, name string) error { 891 fs := fd.filesystem() 892 fs.renameMu.RLock() 893 defer fs.renameMu.RUnlock() 894 return fs.removeXattrLocked(ctx, fd.dentry(), fd.vfsfd.Mount(), auth.CredentialsFromContext(ctx), name) 895 }