Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754542AbZLBUAK (ORCPT ); Wed, 2 Dec 2009 15:00:10 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754300AbZLBUAK (ORCPT ); Wed, 2 Dec 2009 15:00:10 -0500 Received: from mx1.redhat.com ([209.132.183.28]:49440 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752402AbZLBUAI (ORCPT ); Wed, 2 Dec 2009 15:00:08 -0500 From: Jeff Layton To: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Cc: jamie@shareable.org, pavel@ucw.cz, miklos@szeredi.hu, viro@ZenIV.linux.org.uk, duaneg@dghda.com, ebiederm@xmission.com Subject: [PATCH 2/2] vfs: force reval on dentry of bind mounted files on FS_REVAL_DOT filesystems Date: Wed, 2 Dec 2009 14:59:43 -0500 Message-Id: <1259783983-26884-3-git-send-email-jlayton@redhat.com> In-Reply-To: <1259783983-26884-1-git-send-email-jlayton@redhat.com> References: <1259783983-26884-1-git-send-email-jlayton@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1715 Lines: 55 In the case of a bind mounted file, the path walking code will assume that the cached dentry that was bind mounted is valid. This is a problem problem for NFSv4 in a way that's similar to LAST_BIND symlinks. Fix this by revalidating the dentry if FS_FOLLOW_DOT is set and __follow_mount returns true. Note that in the non-open codepath, we cannot return an error to the lookup if the revalidation fails. Doing so will leave a bind mount in a state such that we can't unmount it. In that case we'll just have to settle for d_invalidating it (which should mostly turn out to be a d_drop in this case) and returning success. Signed-off-by: Jeff Layton --- fs/namei.c | 11 ++++++++++- 1 files changed, 10 insertions(+), 1 deletions(-) diff --git a/fs/namei.c b/fs/namei.c index 339789e..0d55b6f 100644 --- a/fs/namei.c +++ b/fs/namei.c @@ -851,7 +851,13 @@ static int do_lookup(struct nameidata *nd, struct qstr *name, done: path->mnt = mnt; path->dentry = dentry; - __follow_mount(path); + + /* + * cannot return the error returned by force_reval_path as that can + * make it impossible to unmount a bind mounted dentry if it's stale. + */ + if (__follow_mount(path)) + force_reval_path(path, nd); return 0; need_lookup: @@ -1840,6 +1846,9 @@ do_last: error = -ELOOP; if (flag & O_NOFOLLOW) goto exit_dput; + error = force_reval_path(&path, &nd); + if (error) + goto exit_dput; } error = -ENOENT; -- 1.5.5.6 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/