Received: by 10.192.165.156 with SMTP id m28csp285330imm; Tue, 17 Apr 2018 10:05:35 -0700 (PDT) X-Google-Smtp-Source: AIpwx497SlMsDBiNGz1fI6XecAUpu6eNbJod3M5cpmehpYNrPOuFNK01zr3Yi0RpT+YXagIIbps6 X-Received: by 2002:a17:902:a603:: with SMTP id u3-v6mr2820518plq.214.1523984735787; Tue, 17 Apr 2018 10:05:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523984735; cv=none; d=google.com; s=arc-20160816; b=OXjGZhu24UbgZ05tL8MzDpRzZ/f0rlZmT4cYOi2X/5fooHNWtTAag4ntrajmfOyUXw pa7HYyXI5O6Pr0Bk6Glrn2EauwvdhBejbhlBwqfJJcJPceAIEZu+2yGivr78+RqjTsHi sLiZclGOUUKdzQD98r1BbJXOYqw/oDb3e/CxXrKy/oe1Rri+iCrRWlzVAWGGjJ6hLoJj foCr5drMl2crPcAA+12Yz9Af/+mjiLoUUG78gstLoLD1eLgCLiSooVxny/7HP80NF+B6 XRE1wnvOTKt378+Gfu5TWXDG6Bh/N/bcPA/tsAi3xJ/2MFINrhbmuTFwHTkSV4Saznm5 yd8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=+MM7OvZ4LgEfhx319mmCmq9BHVcpABUmJbGTQKYfx2Y=; b=Yvlp/eoN9eF9LAtRKhIvws4C76Je1umfgE+YubiT/MP/jl5yDhC+ZuqB2Nh3XXX8Pr ohHoD+hY0LEcQNVK5pp5dwKPDPJG7YiDh6C76qzv+mB08MbVPDKjYF8qmsisLXxaw5sa uOrjkae9gnOwvWNy9kcYgan+Xhd5faexH6RsaANQ4YjxLBZBseGSnj3fvM66JshS7gWz dGHuDFRr3J0Ay1lVNk2aM4aQpd26+ZgOgRKYn7OmiO5AypVB0gkpkL0ecIg/62Zi2cTm NFmeEeiK9Gd5+AtgnfeYg0hRIFwE4YsmlXBS6JG8QuUaI7K3w5d6mXyo7BbMxcPl6loq Fc1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j63si11869893pgc.474.2018.04.17.10.05.21; Tue, 17 Apr 2018 10:05:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753890AbeDQQBp (ORCPT + 99 others); Tue, 17 Apr 2018 12:01:45 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60546 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753859AbeDQQBm (ORCPT ); Tue, 17 Apr 2018 12:01:42 -0400 Received: from localhost (unknown [46.44.180.42]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 26AA4E29; Tue, 17 Apr 2018 16:01:42 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Amir Goldstein , Vivek Goyal , Miklos Szeredi Subject: [PATCH 4.16 45/68] ovl: fix lookup with middle layer opaque dir and absolute path redirects Date: Tue, 17 Apr 2018 17:57:58 +0200 Message-Id: <20180417155751.169731940@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180417155749.341779147@linuxfoundation.org> References: <20180417155749.341779147@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Amir Goldstein commit 3ec9b3fafcaf441cc4d46b9742cd6ec0c79f8df0 upstream. As of now if we encounter an opaque dir while looking for a dentry, we set d->last=true. This means that there is no need to look further in any of the lower layers. This works fine as long as there are no redirets or relative redircts. But what if there is an absolute redirect on the children dentry of opaque directory. We still need to continue to look into next lower layer. This patch fixes it. Here is an example to demonstrate the issue. Say you have following setup. upper: /redirect (redirect=/a/b/c) lower1: /a/[b]/c ([b] is opaque) (c has absolute redirect=/a/b/d/) lower0: /a/b/d/foo Now "redirect" dir should merge with lower1:/a/b/c/ and lower0:/a/b/d. Note, despite the fact lower1:/a/[b] is opaque, we need to continue to look into lower0 because children c has an absolute redirect. Following is a reproducer. Watch me make foo disappear: $ mkdir lower middle upper work work2 merged $ mkdir lower/origin $ touch lower/origin/foo $ mount -t overlay none merged/ \ -olowerdir=lower,upperdir=middle,workdir=work2 $ mkdir merged/pure $ mv merged/origin merged/pure/redirect $ umount merged $ mount -t overlay none merged/ \ -olowerdir=middle:lower,upperdir=upper,workdir=work $ mv merged/pure/redirect merged/redirect Now you see foo inside a twice redirected merged dir: $ ls merged/redirect foo $ umount merged $ mount -t overlay none merged/ \ -olowerdir=middle:lower,upperdir=upper,workdir=work After mount cycle you don't see foo inside the same dir: $ ls merged/redirect During middle layer lookup, the opaqueness of middle/pure is left in the lookup state and then middle/pure/redirect is wrongly treated as opaque. Fixes: 02b69b284cd7 ("ovl: lookup redirects") Cc: #v4.10 Signed-off-by: Amir Goldstein Signed-off-by: Vivek Goyal Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/overlayfs/namei.c | 9 +++++++++ 1 file changed, 9 insertions(+) --- a/fs/overlayfs/namei.c +++ b/fs/overlayfs/namei.c @@ -56,6 +56,15 @@ static int ovl_check_redirect(struct den if (s == next) goto invalid; } + /* + * One of the ancestor path elements in an absolute path + * lookup in ovl_lookup_layer() could have been opaque and + * that will stop further lookup in lower layers (d->stop=true) + * But we have found an absolute redirect in decendant path + * element and that should force continue lookup in lower + * layers (reset d->stop). + */ + d->stop = false; } else { if (strchr(buf, '/') != NULL) goto invalid;