2 * Copyright (C) 2011 Novell Inc.
3 * Copyright (C) 2016 Red Hat, Inc.
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 as published by
7 * the Free Software Foundation.
11 #include <linux/cred.h>
12 #include <linux/ctype.h>
13 #include <linux/namei.h>
14 #include <linux/xattr.h>
15 #include <linux/ratelimit.h>
16 #include <linux/mount.h>
17 #include <linux/exportfs.h>
18 #include "overlayfs.h"
20 struct ovl_lookup_data
{
29 static int ovl_check_redirect(struct dentry
*dentry
, struct ovl_lookup_data
*d
,
30 size_t prelen
, const char *post
)
33 char *s
, *next
, *buf
= NULL
;
35 res
= vfs_getxattr(dentry
, OVL_XATTR_REDIRECT
, NULL
, 0);
37 if (res
== -ENODATA
|| res
== -EOPNOTSUPP
)
41 buf
= kzalloc(prelen
+ res
+ strlen(post
) + 1, GFP_KERNEL
);
48 res
= vfs_getxattr(dentry
, OVL_XATTR_REDIRECT
, buf
, res
);
54 for (s
= buf
; *s
++ == '/'; s
= next
) {
55 next
= strchrnul(s
, '/');
60 * One of the ancestor path elements in an absolute path
61 * lookup in ovl_lookup_layer() could have been opaque and
62 * that will stop further lookup in lower layers (d->stop=true)
63 * But we have found an absolute redirect in decendant path
64 * element and that should force continue lookup in lower
65 * layers (reset d->stop).
69 if (strchr(buf
, '/') != NULL
)
72 memmove(buf
+ prelen
, buf
, res
);
73 memcpy(buf
, d
->name
.name
, prelen
);
79 d
->name
.name
= d
->redirect
;
80 d
->name
.len
= strlen(d
->redirect
);
88 pr_warn_ratelimited("overlayfs: failed to get redirect (%i)\n", res
);
91 pr_warn_ratelimited("overlayfs: invalid redirect (%s)\n", buf
);
95 static int ovl_acceptable(void *ctx
, struct dentry
*dentry
)
98 * A non-dir origin may be disconnected, which is fine, because
99 * we only need it for its unique inode number.
101 if (!d_is_dir(dentry
))
104 /* Don't decode a deleted empty directory */
105 if (d_unhashed(dentry
))
108 /* Check if directory belongs to the layer we are decoding from */
109 return is_subdir(dentry
, ((struct vfsmount
*)ctx
)->mnt_root
);
113 * Check validity of an overlay file handle buffer.
115 * Return 0 for a valid file handle.
116 * Return -ENODATA for "origin unknown".
117 * Return <0 for an invalid file handle.
119 int ovl_check_fh_len(struct ovl_fh
*fh
, int fh_len
)
121 if (fh_len
< sizeof(struct ovl_fh
) || fh_len
< fh
->len
)
124 if (fh
->magic
!= OVL_FH_MAGIC
)
127 /* Treat larger version and unknown flags as "origin unknown" */
128 if (fh
->version
> OVL_FH_VERSION
|| fh
->flags
& ~OVL_FH_FLAG_ALL
)
131 /* Treat endianness mismatch as "origin unknown" */
132 if (!(fh
->flags
& OVL_FH_FLAG_ANY_ENDIAN
) &&
133 (fh
->flags
& OVL_FH_FLAG_BIG_ENDIAN
) != OVL_FH_FLAG_CPU_ENDIAN
)
139 static struct ovl_fh
*ovl_get_fh(struct dentry
*dentry
, const char *name
)
142 struct ovl_fh
*fh
= NULL
;
144 res
= vfs_getxattr(dentry
, name
, NULL
, 0);
146 if (res
== -ENODATA
|| res
== -EOPNOTSUPP
)
150 /* Zero size value means "copied up but origin unknown" */
154 fh
= kzalloc(res
, GFP_KERNEL
);
156 return ERR_PTR(-ENOMEM
);
158 res
= vfs_getxattr(dentry
, name
, fh
, res
);
162 err
= ovl_check_fh_len(fh
, res
);
176 pr_warn_ratelimited("overlayfs: failed to get origin (%i)\n", res
);
179 pr_warn_ratelimited("overlayfs: invalid origin (%*phN)\n", res
, fh
);
183 struct dentry
*ovl_decode_fh(struct ovl_fh
*fh
, struct vfsmount
*mnt
)
189 * Make sure that the stored uuid matches the uuid of the lower
190 * layer where file handle will be decoded.
192 if (!uuid_equal(&fh
->uuid
, &mnt
->mnt_sb
->s_uuid
))
195 bytes
= (fh
->len
- offsetof(struct ovl_fh
, fid
));
196 real
= exportfs_decode_fh(mnt
, (struct fid
*)fh
->fid
,
197 bytes
>> 2, (int)fh
->type
,
198 ovl_acceptable
, mnt
);
201 * Treat stale file handle to lower file as "origin unknown".
202 * upper file handle could become stale when upper file is
203 * unlinked and this information is needed to handle stale
204 * index entries correctly.
206 if (real
== ERR_PTR(-ESTALE
) &&
207 !(fh
->flags
& OVL_FH_FLAG_PATH_UPPER
))
212 if (ovl_dentry_weird(real
)) {
220 static bool ovl_is_opaquedir(struct dentry
*dentry
)
222 return ovl_check_dir_xattr(dentry
, OVL_XATTR_OPAQUE
);
225 static int ovl_lookup_single(struct dentry
*base
, struct ovl_lookup_data
*d
,
226 const char *name
, unsigned int namelen
,
227 size_t prelen
, const char *post
,
233 this = lookup_one_len_unlocked(name
, base
, namelen
);
237 if (err
== -ENOENT
|| err
== -ENAMETOOLONG
)
244 if (ovl_dentry_weird(this)) {
245 /* Don't support traversing automounts and other weirdness */
249 if (ovl_is_whiteout(this)) {
250 d
->stop
= d
->opaque
= true;
253 if (!d_can_lookup(this)) {
260 if (!d
->last
&& ovl_is_opaquedir(this)) {
261 d
->stop
= d
->opaque
= true;
264 err
= ovl_check_redirect(this, d
, prelen
, post
);
281 static int ovl_lookup_layer(struct dentry
*base
, struct ovl_lookup_data
*d
,
284 /* Counting down from the end, since the prefix can change */
285 size_t rem
= d
->name
.len
- 1;
286 struct dentry
*dentry
= NULL
;
289 if (d
->name
.name
[0] != '/')
290 return ovl_lookup_single(base
, d
, d
->name
.name
, d
->name
.len
,
293 while (!IS_ERR_OR_NULL(base
) && d_can_lookup(base
)) {
294 const char *s
= d
->name
.name
+ d
->name
.len
- rem
;
295 const char *next
= strchrnul(s
, '/');
296 size_t thislen
= next
- s
;
299 /* Verify we did not go off the rails */
300 if (WARN_ON(s
[-1] != '/'))
303 err
= ovl_lookup_single(base
, d
, s
, thislen
,
304 d
->name
.len
- rem
, next
, &base
);
314 if (WARN_ON(rem
>= d
->name
.len
))
322 int ovl_check_origin_fh(struct ovl_fs
*ofs
, struct ovl_fh
*fh
,
323 struct dentry
*upperdentry
, struct ovl_path
**stackp
)
325 struct dentry
*origin
= NULL
;
328 for (i
= 0; i
< ofs
->numlower
; i
++) {
329 origin
= ovl_decode_fh(fh
, ofs
->lower_layers
[i
].mnt
);
336 else if (IS_ERR(origin
))
337 return PTR_ERR(origin
);
339 if (upperdentry
&& !ovl_is_whiteout(upperdentry
) &&
340 ((d_inode(origin
)->i_mode
^ d_inode(upperdentry
)->i_mode
) & S_IFMT
))
344 *stackp
= kmalloc(sizeof(struct ovl_path
), GFP_KERNEL
);
349 **stackp
= (struct ovl_path
){
351 .layer
= &ofs
->lower_layers
[i
]
357 pr_warn_ratelimited("overlayfs: invalid origin (%pd2, ftype=%x, origin ftype=%x).\n",
358 upperdentry
, d_inode(upperdentry
)->i_mode
& S_IFMT
,
359 d_inode(origin
)->i_mode
& S_IFMT
);
364 static int ovl_check_origin(struct ovl_fs
*ofs
, struct dentry
*upperdentry
,
365 struct ovl_path
**stackp
, unsigned int *ctrp
)
367 struct ovl_fh
*fh
= ovl_get_fh(upperdentry
, OVL_XATTR_ORIGIN
);
370 if (IS_ERR_OR_NULL(fh
))
373 err
= ovl_check_origin_fh(ofs
, fh
, upperdentry
, stackp
);
390 * Verify that @fh matches the file handle stored in xattr @name.
391 * Return 0 on match, -ESTALE on mismatch, < 0 on error.
393 static int ovl_verify_fh(struct dentry
*dentry
, const char *name
,
394 const struct ovl_fh
*fh
)
396 struct ovl_fh
*ofh
= ovl_get_fh(dentry
, name
);
405 if (fh
->len
!= ofh
->len
|| memcmp(fh
, ofh
, fh
->len
))
413 * Verify that @real dentry matches the file handle stored in xattr @name.
415 * If @set is true and there is no stored file handle, encode @real and store
416 * file handle in xattr @name.
418 * Return 0 on match, -ESTALE on mismatch, -ENODATA on no xattr, < 0 on error.
420 int ovl_verify_set_fh(struct dentry
*dentry
, const char *name
,
421 struct dentry
*real
, bool is_upper
, bool set
)
427 fh
= ovl_encode_fh(real
, is_upper
);
432 err
= ovl_verify_fh(dentry
, name
, fh
);
433 if (set
&& err
== -ENODATA
)
434 err
= ovl_do_setxattr(dentry
, name
, fh
, fh
->len
, 0);
443 inode
= d_inode(real
);
444 pr_warn_ratelimited("overlayfs: failed to verify %s (%pd2, ino=%lu, err=%i)\n",
445 is_upper
? "upper" : "origin", real
,
446 inode
? inode
->i_ino
: 0, err
);
450 /* Get upper dentry from index */
451 struct dentry
*ovl_index_upper(struct ovl_fs
*ofs
, struct dentry
*index
)
454 struct dentry
*upper
;
456 if (!d_is_dir(index
))
459 fh
= ovl_get_fh(index
, OVL_XATTR_UPPER
);
460 if (IS_ERR_OR_NULL(fh
))
463 upper
= ovl_decode_fh(fh
, ofs
->upper_mnt
);
466 if (IS_ERR_OR_NULL(upper
))
467 return upper
?: ERR_PTR(-ESTALE
);
469 if (!d_is_dir(upper
)) {
470 pr_warn_ratelimited("overlayfs: invalid index upper (%pd2, upper=%pd2).\n",
473 return ERR_PTR(-EIO
);
479 /* Is this a leftover from create/whiteout of directory index entry? */
480 static bool ovl_is_temp_index(struct dentry
*index
)
482 return index
->d_name
.name
[0] == '#';
486 * Verify that an index entry name matches the origin file handle stored in
487 * OVL_XATTR_ORIGIN and that origin file handle can be decoded to lower path.
488 * Return 0 on match, -ESTALE on mismatch or stale origin, < 0 on error.
490 int ovl_verify_index(struct ovl_fs
*ofs
, struct dentry
*index
)
492 struct ovl_fh
*fh
= NULL
;
494 struct ovl_path origin
= { };
495 struct ovl_path
*stack
= &origin
;
496 struct dentry
*upper
= NULL
;
502 /* Cleanup leftover from index create/cleanup attempt */
504 if (ovl_is_temp_index(index
))
508 if (index
->d_name
.len
< sizeof(struct ovl_fh
)*2)
512 len
= index
->d_name
.len
/ 2;
513 fh
= kzalloc(len
, GFP_KERNEL
);
518 if (hex2bin((u8
*)fh
, index
->d_name
.name
, len
))
521 err
= ovl_check_fh_len(fh
, len
);
526 * Whiteout index entries are used as an indication that an exported
527 * overlay file handle should be treated as stale (i.e. after unlink
528 * of the overlay inode). These entries contain no origin xattr.
530 if (ovl_is_whiteout(index
))
534 * Verifying directory index entries are not stale is expensive, so
535 * only verify stale dir index if NFS export is enabled.
537 if (d_is_dir(index
) && !ofs
->config
.nfs_export
)
541 * Directory index entries should have 'upper' xattr pointing to the
542 * real upper dir. Non-dir index entries are hardlinks to the upper
543 * real inode. For non-dir index, we can read the copy up origin xattr
544 * directly from the index dentry, but for dir index we first need to
545 * decode the upper directory.
547 upper
= ovl_index_upper(ofs
, index
);
548 if (IS_ERR_OR_NULL(upper
)) {
549 err
= PTR_ERR(upper
);
551 * Directory index entries with no 'upper' xattr need to be
552 * removed. When dir index entry has a stale 'upper' xattr,
553 * we assume that upper dir was removed and we treat the dir
554 * index as orphan entry that needs to be whited out.
563 err
= ovl_verify_fh(upper
, OVL_XATTR_ORIGIN
, fh
);
568 /* Check if non-dir index is orphan and don't warn before cleaning it */
569 if (!d_is_dir(index
) && d_inode(index
)->i_nlink
== 1) {
570 err
= ovl_check_origin_fh(ofs
, fh
, index
, &stack
);
574 if (ovl_get_nlink(origin
.dentry
, index
, 0) == 0)
584 pr_warn_ratelimited("overlayfs: failed to verify index (%pd2, ftype=%x, err=%i)\n",
585 index
, d_inode(index
)->i_mode
& S_IFMT
, err
);
589 pr_warn_ratelimited("overlayfs: orphan index entry (%pd2, ftype=%x, nlink=%u)\n",
590 index
, d_inode(index
)->i_mode
& S_IFMT
,
591 d_inode(index
)->i_nlink
);
596 static int ovl_get_index_name_fh(struct ovl_fh
*fh
, struct qstr
*name
)
600 n
= kzalloc(fh
->len
* 2, GFP_KERNEL
);
604 s
= bin2hex(n
, fh
, fh
->len
);
605 *name
= (struct qstr
) QSTR_INIT(n
, s
- n
);
612 * Lookup in indexdir for the index entry of a lower real inode or a copy up
613 * origin inode. The index entry name is the hex representation of the lower
616 * If the index dentry in negative, then either no lower aliases have been
617 * copied up yet, or aliases have been copied up in older kernels and are
620 * If the index dentry for a copy up origin inode is positive, but points
621 * to an inode different than the upper inode, then either the upper inode
622 * has been copied up and not indexed or it was indexed, but since then
623 * index dir was cleared. Either way, that index cannot be used to indentify
626 int ovl_get_index_name(struct dentry
*origin
, struct qstr
*name
)
631 fh
= ovl_encode_fh(origin
, false);
635 err
= ovl_get_index_name_fh(fh
, name
);
641 /* Lookup index by file handle for NFS export */
642 struct dentry
*ovl_get_index_fh(struct ovl_fs
*ofs
, struct ovl_fh
*fh
)
644 struct dentry
*index
;
648 err
= ovl_get_index_name_fh(fh
, &name
);
652 index
= lookup_one_len_unlocked(name
.name
, ofs
->indexdir
, name
.len
);
655 if (PTR_ERR(index
) == -ENOENT
)
660 if (d_is_negative(index
))
662 else if (ovl_is_whiteout(index
))
664 else if (ovl_dentry_weird(index
))
673 struct dentry
*ovl_lookup_index(struct ovl_fs
*ofs
, struct dentry
*upper
,
674 struct dentry
*origin
, bool verify
)
676 struct dentry
*index
;
679 bool is_dir
= d_is_dir(origin
);
682 err
= ovl_get_index_name(origin
, &name
);
686 index
= lookup_one_len_unlocked(name
.name
, ofs
->indexdir
, name
.len
);
688 err
= PTR_ERR(index
);
689 if (err
== -ENOENT
) {
693 pr_warn_ratelimited("overlayfs: failed inode index lookup (ino=%lu, key=%*s, err=%i);\n"
694 "overlayfs: mount with '-o index=off' to disable inodes index.\n",
695 d_inode(origin
)->i_ino
, name
.len
, name
.name
,
700 inode
= d_inode(index
);
701 if (d_is_negative(index
)) {
703 } else if (ovl_is_whiteout(index
) && !verify
) {
705 * When index lookup is called with !verify for decoding an
706 * overlay file handle, a whiteout index implies that decode
707 * should treat file handle as stale and no need to print a
711 index
= ERR_PTR(-ESTALE
);
713 } else if (ovl_dentry_weird(index
) || ovl_is_whiteout(index
) ||
714 ((inode
->i_mode
^ d_inode(origin
)->i_mode
) & S_IFMT
)) {
716 * Index should always be of the same file type as origin
717 * except for the case of a whiteout index. A whiteout
718 * index should only exist if all lower aliases have been
719 * unlinked, which means that finding a lower origin on lookup
720 * whose index is a whiteout should be treated as an error.
722 pr_warn_ratelimited("overlayfs: bad index found (index=%pd2, ftype=%x, origin ftype=%x).\n",
723 index
, d_inode(index
)->i_mode
& S_IFMT
,
724 d_inode(origin
)->i_mode
& S_IFMT
);
726 } else if (is_dir
&& verify
) {
728 pr_warn_ratelimited("overlayfs: suspected uncovered redirected dir found (origin=%pd2, index=%pd2).\n",
733 /* Verify that dir index 'upper' xattr points to upper dir */
734 err
= ovl_verify_upper(index
, upper
, false);
736 if (err
== -ESTALE
) {
737 pr_warn_ratelimited("overlayfs: suspected multiply redirected dir found (upper=%pd2, origin=%pd2, index=%pd2).\n",
738 upper
, origin
, index
);
742 } else if (upper
&& d_inode(upper
) != inode
) {
756 index
= ERR_PTR(-EIO
);
761 * Returns next layer in stack starting from top.
762 * Returns -1 if this is the last layer.
764 int ovl_path_next(int idx
, struct dentry
*dentry
, struct path
*path
)
766 struct ovl_entry
*oe
= dentry
->d_fsdata
;
770 ovl_path_upper(dentry
, path
);
772 return oe
->numlower
? 1 : -1;
775 BUG_ON(idx
> oe
->numlower
);
776 path
->dentry
= oe
->lowerstack
[idx
- 1].dentry
;
777 path
->mnt
= oe
->lowerstack
[idx
- 1].layer
->mnt
;
779 return (idx
< oe
->numlower
) ? idx
+ 1 : -1;
782 /* Fix missing 'origin' xattr */
783 static int ovl_fix_origin(struct dentry
*dentry
, struct dentry
*lower
,
784 struct dentry
*upper
)
788 if (ovl_check_origin_xattr(upper
))
791 err
= ovl_want_write(dentry
);
795 err
= ovl_set_origin(dentry
, lower
, upper
);
797 err
= ovl_set_impure(dentry
->d_parent
, upper
->d_parent
);
799 ovl_drop_write(dentry
);
803 struct dentry
*ovl_lookup(struct inode
*dir
, struct dentry
*dentry
,
806 struct ovl_entry
*oe
;
807 const struct cred
*old_cred
;
808 struct ovl_fs
*ofs
= dentry
->d_sb
->s_fs_info
;
809 struct ovl_entry
*poe
= dentry
->d_parent
->d_fsdata
;
810 struct ovl_entry
*roe
= dentry
->d_sb
->s_root
->d_fsdata
;
811 struct ovl_path
*stack
= NULL
;
812 struct dentry
*upperdir
, *upperdentry
= NULL
;
813 struct dentry
*origin
= NULL
;
814 struct dentry
*index
= NULL
;
815 unsigned int ctr
= 0;
816 struct inode
*inode
= NULL
;
817 bool upperopaque
= false;
818 char *upperredirect
= NULL
;
822 struct ovl_lookup_data d
= {
823 .name
= dentry
->d_name
,
827 .last
= ofs
->config
.redirect_follow
? false : !poe
->numlower
,
831 if (dentry
->d_name
.len
> ofs
->namelen
)
832 return ERR_PTR(-ENAMETOOLONG
);
834 old_cred
= ovl_override_creds(dentry
->d_sb
);
835 upperdir
= ovl_dentry_upper(dentry
->d_parent
);
837 err
= ovl_lookup_layer(upperdir
, &d
, &upperdentry
);
841 if (upperdentry
&& unlikely(ovl_dentry_remote(upperdentry
))) {
846 if (upperdentry
&& !d
.is_dir
) {
847 BUG_ON(!d
.stop
|| d
.redirect
);
849 * Lookup copy up origin by decoding origin file handle.
850 * We may get a disconnected dentry, which is fine,
851 * because we only need to hold the origin inode in
852 * cache and use its inode number. We may even get a
853 * connected dentry, that is not under any of the lower
854 * layers root. That is also fine for using it's inode
855 * number - it's the same as if we held a reference
856 * to a dentry in lower layer that was moved under us.
858 err
= ovl_check_origin(ofs
, upperdentry
, &stack
, &ctr
);
865 upperredirect
= kstrdup(d
.redirect
, GFP_KERNEL
);
868 if (d
.redirect
[0] == '/')
871 upperopaque
= d
.opaque
;
874 if (!d
.stop
&& poe
->numlower
) {
876 stack
= kcalloc(ofs
->numlower
, sizeof(struct ovl_path
),
882 for (i
= 0; !d
.stop
&& i
< poe
->numlower
; i
++) {
883 struct ovl_path lower
= poe
->lowerstack
[i
];
885 if (!ofs
->config
.redirect_follow
)
886 d
.last
= i
== poe
->numlower
- 1;
888 d
.last
= lower
.layer
->idx
== roe
->numlower
;
890 err
= ovl_lookup_layer(lower
.dentry
, &d
, &this);
898 * If no origin fh is stored in upper of a merge dir, store fh
899 * of lower dir and set upper parent "impure".
901 if (upperdentry
&& !ctr
&& !ofs
->noxattr
) {
902 err
= ovl_fix_origin(dentry
, this, upperdentry
);
910 * When "verify_lower" feature is enabled, do not merge with a
911 * lower dir that does not match a stored origin xattr. In any
912 * case, only verified origin is used for index lookup.
914 if (upperdentry
&& !ctr
&& ovl_verify_lower(dentry
->d_sb
)) {
915 err
= ovl_verify_origin(upperdentry
, this, false);
921 /* Bless lower dir as verified origin */
925 stack
[ctr
].dentry
= this;
926 stack
[ctr
].layer
= lower
.layer
;
930 * Following redirects can have security consequences: it's like
931 * a symlink into the lower layer without the permission checks.
932 * This is only a problem if the upper layer is untrusted (e.g
933 * comes from an USB drive). This can allow a non-readable file
934 * or directory to become readable.
936 * Only following redirects when redirects are enabled disables
937 * this attack vector when not necessary.
940 if (d
.redirect
&& !ofs
->config
.redirect_follow
) {
941 pr_warn_ratelimited("overlayfs: refusing to follow redirect for (%pd2)\n",
949 if (d
.redirect
&& d
.redirect
[0] == '/' && poe
!= roe
) {
951 /* Find the current layer on the root dentry */
952 i
= lower
.layer
->idx
- 1;
957 * Lookup index by lower inode and verify it matches upper inode.
958 * We only trust dir index if we verified that lower dir matches
959 * origin, otherwise dir index entries may be inconsistent and we
960 * ignore them. Always lookup index of non-dir and non-upper.
962 if (ctr
&& (!upperdentry
|| !d
.is_dir
))
963 origin
= stack
[0].dentry
;
965 if (origin
&& ovl_indexdir(dentry
->d_sb
) &&
966 (!d
.is_dir
|| ovl_index_all(dentry
->d_sb
))) {
967 index
= ovl_lookup_index(ofs
, upperdentry
, origin
, true);
969 err
= PTR_ERR(index
);
975 oe
= ovl_alloc_entry(ctr
);
980 memcpy(oe
->lowerstack
, stack
, sizeof(struct ovl_path
) * ctr
);
981 dentry
->d_fsdata
= oe
;
984 ovl_dentry_set_opaque(dentry
);
987 ovl_dentry_set_upper_alias(dentry
);
989 upperdentry
= dget(index
);
991 if (upperdentry
|| ctr
) {
993 origin
= stack
[0].dentry
;
994 inode
= ovl_get_inode(dentry
->d_sb
, upperdentry
, origin
, index
,
996 err
= PTR_ERR(inode
);
1000 OVL_I(inode
)->redirect
= upperredirect
;
1002 ovl_set_flag(OVL_INDEX
, inode
);
1005 revert_creds(old_cred
);
1009 return d_splice_alias(inode
, dentry
);
1012 dentry
->d_fsdata
= NULL
;
1016 for (i
= 0; i
< ctr
; i
++)
1017 dput(stack
[i
].dentry
);
1021 kfree(upperredirect
);
1024 revert_creds(old_cred
);
1025 return ERR_PTR(err
);
1028 bool ovl_lower_positive(struct dentry
*dentry
)
1030 struct ovl_entry
*poe
= dentry
->d_parent
->d_fsdata
;
1031 const struct qstr
*name
= &dentry
->d_name
;
1032 const struct cred
*old_cred
;
1034 bool positive
= false;
1038 * If dentry is negative, then lower is positive iff this is a
1041 if (!dentry
->d_inode
)
1042 return ovl_dentry_is_opaque(dentry
);
1044 /* Negative upper -> positive lower */
1045 if (!ovl_dentry_upper(dentry
))
1048 old_cred
= ovl_override_creds(dentry
->d_sb
);
1049 /* Positive upper -> have to look up lower to see whether it exists */
1050 for (i
= 0; !done
&& !positive
&& i
< poe
->numlower
; i
++) {
1051 struct dentry
*this;
1052 struct dentry
*lowerdir
= poe
->lowerstack
[i
].dentry
;
1054 this = lookup_one_len_unlocked(name
->name
, lowerdir
,
1057 switch (PTR_ERR(this)) {
1064 * Assume something is there, we just couldn't
1071 if (this->d_inode
) {
1072 positive
= !ovl_is_whiteout(this);
1078 revert_creds(old_cred
);