[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <m1ljhlq614.fsf@fess.ebiederm.org>
Date: Wed, 02 Dec 2009 16:01:59 -0800
From: ebiederm@...ssion.com (Eric W. Biederman)
To: Jeff Layton <jlayton@...hat.com>
Cc: linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
jamie@...reable.org, pavel@....cz, miklos@...redi.hu,
viro@...IV.linux.org.uk, duaneg@...da.com
Subject: Re: [PATCH 2/2] vfs: force reval on dentry of bind mounted files on FS_REVAL_DOT filesystems
Jeff Layton <jlayton@...hat.com> writes:
> In the case of a bind mounted file, the path walking code will assume
> that the cached dentry that was bind mounted is valid. This is a problem
> problem for NFSv4 in a way that's similar to LAST_BIND symlinks.
>
> Fix this by revalidating the dentry if FS_FOLLOW_DOT is set and
> __follow_mount returns true.
>
> Note that in the non-open codepath, we cannot return an error to the
> lookup if the revalidation fails. Doing so will leave a bind mount in
> a state such that we can't unmount it. In that case we'll just have to
> settle for d_invalidating it (which should mostly turn out to be a
> d_drop in this case) and returning success.
Looks reasonable to me. I wonder a little if we care about follow_mount
as well as __follow_mount.
This seems reasonable to me.
Acked-by: "Eric W. Biederman" <ebiederm@...ssion.com>
>
> Signed-off-by: Jeff Layton <jlayton@...hat.com>
> ---
> fs/namei.c | 11 ++++++++++-
> 1 files changed, 10 insertions(+), 1 deletions(-)
>
> diff --git a/fs/namei.c b/fs/namei.c
> index 339789e..0d55b6f 100644
> --- a/fs/namei.c
> +++ b/fs/namei.c
> @@ -851,7 +851,13 @@ static int do_lookup(struct nameidata *nd, struct qstr *name,
> done:
> path->mnt = mnt;
> path->dentry = dentry;
> - __follow_mount(path);
> +
> + /*
> + * cannot return the error returned by force_reval_path as that can
> + * make it impossible to unmount a bind mounted dentry if it's stale.
> + */
> + if (__follow_mount(path))
> + force_reval_path(path, nd);
> return 0;
>
> need_lookup:
> @@ -1840,6 +1846,9 @@ do_last:
> error = -ELOOP;
> if (flag & O_NOFOLLOW)
> goto exit_dput;
> + error = force_reval_path(&path, &nd);
> + if (error)
> + goto exit_dput;
> }
>
> error = -ENOENT;
> --
> 1.5.5.6
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists