gvisor/pkg/sentry/fs/mount_overlay.go

122 lines
3.7 KiB
Go
Raw Normal View History

// Copyright 2018 Google Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package fs
import (
"gvisor.googlesource.com/gvisor/pkg/sentry/context"
)
// overlayMountSourceOperations implements MountSourceOperations for an overlay
// mount point. The upper filesystem determines the caching behavior of the
// overlay.
//
// +stateify savable
type overlayMountSourceOperations struct {
upper *MountSource
lower *MountSource
}
func newOverlayMountSource(upper, lower *MountSource, flags MountSourceFlags) *MountSource {
upper.IncRef()
lower.IncRef()
return NewMountSource(&overlayMountSourceOperations{
upper: upper,
lower: lower,
}, &overlayFilesystem{}, flags)
}
// Revalidate implements MountSourceOperations.Revalidate for an overlay by
// delegating to the upper filesystem's Revalidate method. We cannot reload
// files from the lower filesystem, so we panic if the lower filesystem's
// Revalidate method returns true.
func (o *overlayMountSourceOperations) Revalidate(ctx context.Context, inode *Inode) bool {
if inode.overlay == nil {
panic("overlay cannot revalidate inode that is not an overlay")
}
// Should we bother checking this, or just ignore?
if inode.overlay.lower != nil && o.lower.Revalidate(ctx, inode.overlay.lower) {
panic("an overlay cannot revalidate file objects from the lower fs")
}
if inode.overlay.upper == nil {
// Nothing to revalidate.
return false
}
// Does the upper require revalidation?
return o.upper.Revalidate(ctx, inode.overlay.upper)
}
// Keep implements MountSourceOperations by delegating to the upper
// filesystem's Keep method.
func (o *overlayMountSourceOperations) Keep(dirent *Dirent) bool {
return o.upper.Keep(dirent)
}
// ResetInodeMappings propagates the call to both upper and lower MountSource.
func (o *overlayMountSourceOperations) ResetInodeMappings() {
o.upper.ResetInodeMappings()
o.lower.ResetInodeMappings()
}
// SaveInodeMapping propagates the call to both upper and lower MountSource.
func (o *overlayMountSourceOperations) SaveInodeMapping(inode *Inode, path string) {
inode.overlay.copyMu.RLock()
defer inode.overlay.copyMu.RUnlock()
if inode.overlay.upper != nil {
o.upper.SaveInodeMapping(inode.overlay.upper, path)
}
if inode.overlay.lower != nil {
o.lower.SaveInodeMapping(inode.overlay.lower, path)
}
}
// Destroy drops references on the upper and lower MountSource.
func (o *overlayMountSourceOperations) Destroy() {
o.upper.DecRef()
o.lower.DecRef()
}
// type overlayFilesystem is the filesystem for overlay mounts.
//
// +stateify savable
type overlayFilesystem struct{}
// Name implements Filesystem.Name.
func (ofs *overlayFilesystem) Name() string {
return "overlayfs"
}
// Flags implements Filesystem.Flags.
func (ofs *overlayFilesystem) Flags() FilesystemFlags {
return 0
}
// AllowUserMount implements Filesystem.AllowUserMount.
func (ofs *overlayFilesystem) AllowUserMount() bool {
return false
}
// AllowUserList implements Filesystem.AllowUserList.
func (*overlayFilesystem) AllowUserList() bool {
return true
}
// Mount implements Filesystem.Mount.
func (ofs *overlayFilesystem) Mount(ctx context.Context, device string, flags MountSourceFlags, data string) (*Inode, error) {
panic("overlayFilesystem.Mount should not be called!")
}