Linux Audio

Check our new training course

Loading...
v4.6
  1/*
  2 *
  3 * Copyright (C) 2011 Novell Inc.
  4 *
  5 * This program is free software; you can redistribute it and/or modify it
  6 * under the terms of the GNU General Public License version 2 as published by
  7 * the Free Software Foundation.
  8 */
  9
 10#include <linux/fs.h>
 11#include <linux/slab.h>
 12#include <linux/xattr.h>
 
 13#include "overlayfs.h"
 14
 15static int ovl_copy_up_truncate(struct dentry *dentry)
 16{
 17	int err;
 18	struct dentry *parent;
 19	struct kstat stat;
 20	struct path lowerpath;
 21
 22	parent = dget_parent(dentry);
 23	err = ovl_copy_up(parent);
 24	if (err)
 25		goto out_dput_parent;
 26
 27	ovl_path_lower(dentry, &lowerpath);
 28	err = vfs_getattr(&lowerpath, &stat);
 29	if (err)
 30		goto out_dput_parent;
 31
 32	stat.size = 0;
 33	err = ovl_copy_up_one(parent, dentry, &lowerpath, &stat);
 34
 35out_dput_parent:
 36	dput(parent);
 37	return err;
 38}
 39
 40int ovl_setattr(struct dentry *dentry, struct iattr *attr)
 41{
 42	int err;
 43	struct dentry *upperdentry;
 
 44
 45	/*
 46	 * Check for permissions before trying to copy-up.  This is redundant
 47	 * since it will be rechecked later by ->setattr() on upper dentry.  But
 48	 * without this, copy-up can be triggered by just about anybody.
 49	 *
 50	 * We don't initialize inode->size, which just means that
 51	 * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not
 52	 * check for a swapfile (which this won't be anyway).
 53	 */
 54	err = inode_change_ok(dentry->d_inode, attr);
 55	if (err)
 56		return err;
 57
 58	err = ovl_want_write(dentry);
 59	if (err)
 60		goto out;
 61
 62	err = ovl_copy_up(dentry);
 63	if (!err) {
 64		upperdentry = ovl_dentry_upper(dentry);
 65
 
 
 
 66		inode_lock(upperdentry->d_inode);
 
 67		err = notify_change(upperdentry, attr, NULL);
 
 68		if (!err)
 69			ovl_copyattr(upperdentry->d_inode, dentry->d_inode);
 70		inode_unlock(upperdentry->d_inode);
 71	}
 72	ovl_drop_write(dentry);
 73out:
 74	return err;
 75}
 76
 77static int ovl_getattr(struct vfsmount *mnt, struct dentry *dentry,
 78			 struct kstat *stat)
 79{
 80	struct path realpath;
 
 
 81
 82	ovl_path_real(dentry, &realpath);
 83	return vfs_getattr(&realpath, stat);
 
 
 
 84}
 85
 86int ovl_permission(struct inode *inode, int mask)
 87{
 88	struct ovl_entry *oe;
 89	struct dentry *alias = NULL;
 90	struct inode *realinode;
 91	struct dentry *realdentry;
 92	bool is_upper;
 
 
 93	int err;
 94
 95	if (S_ISDIR(inode->i_mode)) {
 96		oe = inode->i_private;
 97	} else if (mask & MAY_NOT_BLOCK) {
 98		return -ECHILD;
 99	} else {
100		/*
101		 * For non-directories find an alias and get the info
102		 * from there.
103		 */
104		alias = d_find_any_alias(inode);
105		if (WARN_ON(!alias))
106			return -ENOENT;
107
108		oe = alias->d_fsdata;
109	}
110
111	realdentry = ovl_entry_real(oe, &is_upper);
112
113	if (ovl_is_default_permissions(inode)) {
114		struct kstat stat;
115		struct path realpath = { .dentry = realdentry };
116
117		if (mask & MAY_NOT_BLOCK)
118			return -ECHILD;
119
120		realpath.mnt = ovl_entry_mnt_real(oe, inode, is_upper);
121
122		err = vfs_getattr(&realpath, &stat);
123		if (err)
124			return err;
125
126		if ((stat.mode ^ inode->i_mode) & S_IFMT)
127			return -ESTALE;
128
129		inode->i_mode = stat.mode;
130		inode->i_uid = stat.uid;
131		inode->i_gid = stat.gid;
132
133		return generic_permission(inode, mask);
134	}
135
136	/* Careful in RCU walk mode */
137	realinode = ACCESS_ONCE(realdentry->d_inode);
138	if (!realinode) {
139		WARN_ON(!(mask & MAY_NOT_BLOCK));
140		err = -ENOENT;
141		goto out_dput;
142	}
143
144	if (mask & MAY_WRITE) {
145		umode_t mode = realinode->i_mode;
 
 
 
 
 
146
147		/*
148		 * Writes will always be redirected to upper layer, so
149		 * ignore lower layer being read-only.
150		 *
151		 * If the overlay itself is read-only then proceed
152		 * with the permission check, don't return EROFS.
153		 * This will only happen if this is the lower layer of
154		 * another overlayfs.
155		 *
156		 * If upper fs becomes read-only after the overlay was
157		 * constructed return EROFS to prevent modification of
158		 * upper layer.
159		 */
160		err = -EROFS;
161		if (is_upper && !IS_RDONLY(inode) && IS_RDONLY(realinode) &&
162		    (S_ISREG(mode) || S_ISDIR(mode) || S_ISLNK(mode)))
163			goto out_dput;
164	}
 
 
165
166	err = __inode_permission(realinode, mask);
167out_dput:
168	dput(alias);
169	return err;
170}
171
172static const char *ovl_get_link(struct dentry *dentry,
173				struct inode *inode,
174				struct delayed_call *done)
175{
176	struct dentry *realdentry;
177	struct inode *realinode;
178
179	if (!dentry)
180		return ERR_PTR(-ECHILD);
181
182	realdentry = ovl_dentry_real(dentry);
183	realinode = realdentry->d_inode;
184
185	if (WARN_ON(!realinode->i_op->get_link))
186		return ERR_PTR(-EPERM);
187
188	return realinode->i_op->get_link(realdentry, realinode, done);
189}
190
191static int ovl_readlink(struct dentry *dentry, char __user *buf, int bufsiz)
192{
193	struct path realpath;
194	struct inode *realinode;
195
196	ovl_path_real(dentry, &realpath);
197	realinode = realpath.dentry->d_inode;
198
199	if (!realinode->i_op->readlink)
200		return -EINVAL;
201
202	touch_atime(&realpath);
203
204	return realinode->i_op->readlink(realpath.dentry, buf, bufsiz);
205}
206
207
208static bool ovl_is_private_xattr(const char *name)
209{
210	return strncmp(name, OVL_XATTR_PRE_NAME, OVL_XATTR_PRE_LEN) == 0;
211}
212
213int ovl_setxattr(struct dentry *dentry, const char *name,
214		 const void *value, size_t size, int flags)
215{
216	int err;
217	struct dentry *upperdentry;
 
 
218
219	err = ovl_want_write(dentry);
220	if (err)
221		goto out;
222
223	err = -EPERM;
224	if (ovl_is_private_xattr(name))
225		goto out_drop_write;
 
 
226
227	err = ovl_copy_up(dentry);
228	if (err)
229		goto out_drop_write;
230
231	upperdentry = ovl_dentry_upper(dentry);
232	err = vfs_setxattr(upperdentry, name, value, size, flags);
 
 
 
 
 
 
 
 
 
233
234out_drop_write:
235	ovl_drop_write(dentry);
236out:
237	return err;
238}
239
240static bool ovl_need_xattr_filter(struct dentry *dentry,
241				  enum ovl_path_type type)
242{
243	if ((type & (__OVL_PATH_PURE | __OVL_PATH_UPPER)) == __OVL_PATH_UPPER)
244		return S_ISDIR(dentry->d_inode->i_mode);
245	else
246		return false;
247}
248
249ssize_t ovl_getxattr(struct dentry *dentry, const char *name,
250		     void *value, size_t size)
251{
252	struct path realpath;
253	enum ovl_path_type type = ovl_path_real(dentry, &realpath);
254
255	if (ovl_need_xattr_filter(dentry, type) && ovl_is_private_xattr(name))
256		return -ENODATA;
257
258	return vfs_getxattr(realpath.dentry, name, value, size);
 
 
 
259}
260
261ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size)
262{
263	struct path realpath;
264	enum ovl_path_type type = ovl_path_real(dentry, &realpath);
265	ssize_t res;
266	int off;
267
268	res = vfs_listxattr(realpath.dentry, list, size);
 
 
 
 
269	if (res <= 0 || size == 0)
270		return res;
271
272	if (!ovl_need_xattr_filter(dentry, type))
273		return res;
274
275	/* filter out private xattrs */
276	for (off = 0; off < res;) {
277		char *s = list + off;
278		size_t slen = strlen(s) + 1;
279
280		BUG_ON(off + slen > res);
 
 
281
 
282		if (ovl_is_private_xattr(s)) {
283			res -= slen;
284			memmove(s, s + slen, res - off);
285		} else {
286			off += slen;
287		}
288	}
289
290	return res;
291}
292
293int ovl_removexattr(struct dentry *dentry, const char *name)
294{
295	int err;
296	struct path realpath;
297	enum ovl_path_type type = ovl_path_real(dentry, &realpath);
298
299	err = ovl_want_write(dentry);
300	if (err)
301		goto out;
302
303	err = -ENODATA;
304	if (ovl_need_xattr_filter(dentry, type) && ovl_is_private_xattr(name))
305		goto out_drop_write;
306
307	if (!OVL_TYPE_UPPER(type)) {
308		err = vfs_getxattr(realpath.dentry, name, NULL, 0);
309		if (err < 0)
310			goto out_drop_write;
311
312		err = ovl_copy_up(dentry);
313		if (err)
314			goto out_drop_write;
315
316		ovl_path_upper(dentry, &realpath);
317	}
 
318
319	err = vfs_removexattr(realpath.dentry, name);
320out_drop_write:
321	ovl_drop_write(dentry);
322out:
323	return err;
324}
325
326static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type,
327				  struct dentry *realdentry)
328{
329	if (OVL_TYPE_UPPER(type))
330		return false;
331
332	if (special_file(realdentry->d_inode->i_mode))
333		return false;
334
335	if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC))
336		return false;
337
338	return true;
339}
340
341struct inode *ovl_d_select_inode(struct dentry *dentry, unsigned file_flags)
342{
343	int err;
344	struct path realpath;
345	enum ovl_path_type type;
346
347	if (d_is_dir(dentry))
348		return d_backing_inode(dentry);
349
350	type = ovl_path_real(dentry, &realpath);
351	if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) {
352		err = ovl_want_write(dentry);
353		if (err)
354			return ERR_PTR(err);
 
 
 
 
 
 
 
 
 
 
 
355
356		if (file_flags & O_TRUNC)
357			err = ovl_copy_up_truncate(dentry);
358		else
359			err = ovl_copy_up(dentry);
360		ovl_drop_write(dentry);
361		if (err)
362			return ERR_PTR(err);
363
364		ovl_path_upper(dentry, &realpath);
 
 
 
 
 
 
 
365	}
366
367	if (realpath.dentry->d_flags & DCACHE_OP_SELECT_INODE)
368		return realpath.dentry->d_op->d_select_inode(realpath.dentry, file_flags);
369
370	return d_backing_inode(realpath.dentry);
371}
372
373static const struct inode_operations ovl_file_inode_operations = {
374	.setattr	= ovl_setattr,
375	.permission	= ovl_permission,
376	.getattr	= ovl_getattr,
377	.setxattr	= ovl_setxattr,
378	.getxattr	= ovl_getxattr,
379	.listxattr	= ovl_listxattr,
380	.removexattr	= ovl_removexattr,
 
381};
382
383static const struct inode_operations ovl_symlink_inode_operations = {
384	.setattr	= ovl_setattr,
385	.get_link	= ovl_get_link,
386	.readlink	= ovl_readlink,
387	.getattr	= ovl_getattr,
388	.setxattr	= ovl_setxattr,
389	.getxattr	= ovl_getxattr,
390	.listxattr	= ovl_listxattr,
391	.removexattr	= ovl_removexattr,
392};
393
394struct inode *ovl_new_inode(struct super_block *sb, umode_t mode,
395			    struct ovl_entry *oe)
396{
397	struct inode *inode;
398
399	inode = new_inode(sb);
400	if (!inode)
401		return NULL;
402
403	mode &= S_IFMT;
404
405	inode->i_ino = get_next_ino();
406	inode->i_mode = mode;
407	inode->i_flags |= S_NOATIME | S_NOCMTIME;
 
 
 
 
 
 
 
 
408
409	switch (mode) {
410	case S_IFDIR:
411		inode->i_private = oe;
412		inode->i_op = &ovl_dir_inode_operations;
413		inode->i_fop = &ovl_dir_operations;
414		break;
415
416	case S_IFLNK:
417		inode->i_op = &ovl_symlink_inode_operations;
418		break;
419
420	case S_IFREG:
421	case S_IFSOCK:
422	case S_IFBLK:
423	case S_IFCHR:
424	case S_IFIFO:
425		inode->i_op = &ovl_file_inode_operations;
 
426		break;
 
 
427
428	default:
429		WARN(1, "illegal file type: %i\n", mode);
430		iput(inode);
431		inode = NULL;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
432	}
433
434	return inode;
435}
v4.10.11
  1/*
  2 *
  3 * Copyright (C) 2011 Novell Inc.
  4 *
  5 * This program is free software; you can redistribute it and/or modify it
  6 * under the terms of the GNU General Public License version 2 as published by
  7 * the Free Software Foundation.
  8 */
  9
 10#include <linux/fs.h>
 11#include <linux/slab.h>
 12#include <linux/xattr.h>
 13#include <linux/posix_acl.h>
 14#include "overlayfs.h"
 15
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 16int ovl_setattr(struct dentry *dentry, struct iattr *attr)
 17{
 18	int err;
 19	struct dentry *upperdentry;
 20	const struct cred *old_cred;
 21
 22	/*
 23	 * Check for permissions before trying to copy-up.  This is redundant
 24	 * since it will be rechecked later by ->setattr() on upper dentry.  But
 25	 * without this, copy-up can be triggered by just about anybody.
 26	 *
 27	 * We don't initialize inode->size, which just means that
 28	 * inode_newsize_ok() will always check against MAX_LFS_FILESIZE and not
 29	 * check for a swapfile (which this won't be anyway).
 30	 */
 31	err = setattr_prepare(dentry, attr);
 32	if (err)
 33		return err;
 34
 35	err = ovl_want_write(dentry);
 36	if (err)
 37		goto out;
 38
 39	err = ovl_copy_up(dentry);
 40	if (!err) {
 41		upperdentry = ovl_dentry_upper(dentry);
 42
 43		if (attr->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
 44			attr->ia_valid &= ~ATTR_MODE;
 45
 46		inode_lock(upperdentry->d_inode);
 47		old_cred = ovl_override_creds(dentry->d_sb);
 48		err = notify_change(upperdentry, attr, NULL);
 49		revert_creds(old_cred);
 50		if (!err)
 51			ovl_copyattr(upperdentry->d_inode, dentry->d_inode);
 52		inode_unlock(upperdentry->d_inode);
 53	}
 54	ovl_drop_write(dentry);
 55out:
 56	return err;
 57}
 58
 59static int ovl_getattr(struct vfsmount *mnt, struct dentry *dentry,
 60			 struct kstat *stat)
 61{
 62	struct path realpath;
 63	const struct cred *old_cred;
 64	int err;
 65
 66	ovl_path_real(dentry, &realpath);
 67	old_cred = ovl_override_creds(dentry->d_sb);
 68	err = vfs_getattr(&realpath, stat);
 69	revert_creds(old_cred);
 70	return err;
 71}
 72
 73int ovl_permission(struct inode *inode, int mask)
 74{
 
 
 
 
 75	bool is_upper;
 76	struct inode *realinode = ovl_inode_real(inode, &is_upper);
 77	const struct cred *old_cred;
 78	int err;
 79
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 80	/* Careful in RCU walk mode */
 
 81	if (!realinode) {
 82		WARN_ON(!(mask & MAY_NOT_BLOCK));
 83		return -ECHILD;
 
 84	}
 85
 86	/*
 87	 * Check overlay inode with the creds of task and underlying inode
 88	 * with creds of mounter
 89	 */
 90	err = generic_permission(inode, mask);
 91	if (err)
 92		return err;
 93
 94	old_cred = ovl_override_creds(inode->i_sb);
 95	if (!is_upper && !special_file(realinode->i_mode) && mask & MAY_WRITE) {
 96		mask &= ~(MAY_WRITE | MAY_APPEND);
 97		/* Make sure mounter can read file for copy up later */
 98		mask |= MAY_READ;
 
 
 
 
 
 
 
 
 
 
 
 
 99	}
100	err = inode_permission(realinode, mask);
101	revert_creds(old_cred);
102
 
 
 
103	return err;
104}
105
106static const char *ovl_get_link(struct dentry *dentry,
107				struct inode *inode,
108				struct delayed_call *done)
109{
110	const struct cred *old_cred;
111	const char *p;
112
113	if (!dentry)
114		return ERR_PTR(-ECHILD);
115
116	old_cred = ovl_override_creds(dentry->d_sb);
117	p = vfs_get_link(ovl_dentry_real(dentry), done);
118	revert_creds(old_cred);
119	return p;
 
 
 
120}
121
122bool ovl_is_private_xattr(const char *name)
123{
124	return strncmp(name, OVL_XATTR_PREFIX,
125		       sizeof(OVL_XATTR_PREFIX) - 1) == 0;
 
 
 
 
 
 
 
 
 
 
126}
127
128int ovl_xattr_set(struct dentry *dentry, const char *name, const void *value,
129		  size_t size, int flags)
 
 
 
 
 
 
130{
131	int err;
132	struct path realpath;
133	enum ovl_path_type type = ovl_path_real(dentry, &realpath);
134	const struct cred *old_cred;
135
136	err = ovl_want_write(dentry);
137	if (err)
138		goto out;
139
140	if (!value && !OVL_TYPE_UPPER(type)) {
141		err = vfs_getxattr(realpath.dentry, name, NULL, 0);
142		if (err < 0)
143			goto out_drop_write;
144	}
145
146	err = ovl_copy_up(dentry);
147	if (err)
148		goto out_drop_write;
149
150	if (!OVL_TYPE_UPPER(type))
151		ovl_path_upper(dentry, &realpath);
152
153	old_cred = ovl_override_creds(dentry->d_sb);
154	if (value)
155		err = vfs_setxattr(realpath.dentry, name, value, size, flags);
156	else {
157		WARN_ON(flags != XATTR_REPLACE);
158		err = vfs_removexattr(realpath.dentry, name);
159	}
160	revert_creds(old_cred);
161
162out_drop_write:
163	ovl_drop_write(dentry);
164out:
165	return err;
166}
167
168int ovl_xattr_get(struct dentry *dentry, const char *name,
169		  void *value, size_t size)
 
 
 
 
 
 
 
 
 
170{
171	struct dentry *realdentry = ovl_dentry_real(dentry);
172	ssize_t res;
173	const struct cred *old_cred;
 
 
174
175	old_cred = ovl_override_creds(dentry->d_sb);
176	res = vfs_getxattr(realdentry, name, value, size);
177	revert_creds(old_cred);
178	return res;
179}
180
181ssize_t ovl_listxattr(struct dentry *dentry, char *list, size_t size)
182{
183	struct dentry *realdentry = ovl_dentry_real(dentry);
 
184	ssize_t res;
185	size_t len;
186	char *s;
187	const struct cred *old_cred;
188
189	old_cred = ovl_override_creds(dentry->d_sb);
190	res = vfs_listxattr(realdentry, list, size);
191	revert_creds(old_cred);
192	if (res <= 0 || size == 0)
193		return res;
194
 
 
 
195	/* filter out private xattrs */
196	for (s = list, len = res; len;) {
197		size_t slen = strnlen(s, len) + 1;
 
198
199		/* underlying fs providing us with an broken xattr list? */
200		if (WARN_ON(slen > len))
201			return -EIO;
202
203		len -= slen;
204		if (ovl_is_private_xattr(s)) {
205			res -= slen;
206			memmove(s, s + slen, len);
207		} else {
208			s += slen;
209		}
210	}
211
212	return res;
213}
214
215struct posix_acl *ovl_get_acl(struct inode *inode, int type)
216{
217	struct inode *realinode = ovl_inode_real(inode, NULL);
218	const struct cred *old_cred;
219	struct posix_acl *acl;
220
221	if (!IS_ENABLED(CONFIG_FS_POSIX_ACL) || !IS_POSIXACL(realinode))
222		return NULL;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
223
224	old_cred = ovl_override_creds(inode->i_sb);
225	acl = get_acl(realinode, type);
226	revert_creds(old_cred);
227
228	return acl;
 
 
 
 
229}
230
231static bool ovl_open_need_copy_up(int flags, enum ovl_path_type type,
232				  struct dentry *realdentry)
233{
234	if (OVL_TYPE_UPPER(type))
235		return false;
236
237	if (special_file(realdentry->d_inode->i_mode))
238		return false;
239
240	if (!(OPEN_FMODE(flags) & FMODE_WRITE) && !(flags & O_TRUNC))
241		return false;
242
243	return true;
244}
245
246int ovl_open_maybe_copy_up(struct dentry *dentry, unsigned int file_flags)
247{
248	int err = 0;
249	struct path realpath;
250	enum ovl_path_type type;
251
 
 
 
252	type = ovl_path_real(dentry, &realpath);
253	if (ovl_open_need_copy_up(file_flags, type, realpath.dentry)) {
254		err = ovl_want_write(dentry);
255		if (!err) {
256			err = ovl_copy_up_flags(dentry, file_flags);
257			ovl_drop_write(dentry);
258		}
259	}
260
261	return err;
262}
263
264int ovl_update_time(struct inode *inode, struct timespec *ts, int flags)
265{
266	struct dentry *alias;
267	struct path upperpath;
268
269	if (!(flags & S_ATIME))
270		return 0;
 
 
 
 
 
271
272	alias = d_find_any_alias(inode);
273	if (!alias)
274		return 0;
275
276	ovl_path_upper(alias, &upperpath);
277	if (upperpath.dentry) {
278		touch_atime(&upperpath);
279		inode->i_atime = d_inode(upperpath.dentry)->i_atime;
280	}
281
282	dput(alias);
 
283
284	return 0;
285}
286
287static const struct inode_operations ovl_file_inode_operations = {
288	.setattr	= ovl_setattr,
289	.permission	= ovl_permission,
290	.getattr	= ovl_getattr,
 
 
291	.listxattr	= ovl_listxattr,
292	.get_acl	= ovl_get_acl,
293	.update_time	= ovl_update_time,
294};
295
296static const struct inode_operations ovl_symlink_inode_operations = {
297	.setattr	= ovl_setattr,
298	.get_link	= ovl_get_link,
 
299	.getattr	= ovl_getattr,
 
 
300	.listxattr	= ovl_listxattr,
301	.update_time	= ovl_update_time,
302};
303
304static void ovl_fill_inode(struct inode *inode, umode_t mode, dev_t rdev)
 
305{
 
 
 
 
 
 
 
 
306	inode->i_ino = get_next_ino();
307	inode->i_mode = mode;
308	inode->i_flags |= S_NOCMTIME;
309#ifdef CONFIG_FS_POSIX_ACL
310	inode->i_acl = inode->i_default_acl = ACL_DONT_CACHE;
311#endif
312
313	switch (mode & S_IFMT) {
314	case S_IFREG:
315		inode->i_op = &ovl_file_inode_operations;
316		break;
317
 
318	case S_IFDIR:
 
319		inode->i_op = &ovl_dir_inode_operations;
320		inode->i_fop = &ovl_dir_operations;
321		break;
322
323	case S_IFLNK:
324		inode->i_op = &ovl_symlink_inode_operations;
325		break;
326
327	default:
 
 
 
 
328		inode->i_op = &ovl_file_inode_operations;
329		init_special_inode(inode, mode, rdev);
330		break;
331	}
332}
333
334struct inode *ovl_new_inode(struct super_block *sb, umode_t mode, dev_t rdev)
335{
336	struct inode *inode;
337
338	inode = new_inode(sb);
339	if (inode)
340		ovl_fill_inode(inode, mode, rdev);
341
342	return inode;
343}
344
345static int ovl_inode_test(struct inode *inode, void *data)
346{
347	return ovl_inode_real(inode, NULL) == data;
348}
349
350static int ovl_inode_set(struct inode *inode, void *data)
351{
352	inode->i_private = (void *) (((unsigned long) data) | OVL_ISUPPER_MASK);
353	return 0;
354}
355
356struct inode *ovl_get_inode(struct super_block *sb, struct inode *realinode)
357
358{
359	struct inode *inode;
360
361	inode = iget5_locked(sb, (unsigned long) realinode,
362			     ovl_inode_test, ovl_inode_set, realinode);
363	if (inode && inode->i_state & I_NEW) {
364		ovl_fill_inode(inode, realinode->i_mode, realinode->i_rdev);
365		set_nlink(inode, realinode->i_nlink);
366		unlock_new_inode(inode);
367	}
368
369	return inode;
370}