Commit 6e310c82 authored by Al Viro's avatar Al Viro Committed by Jiri Slaby

RCU pathwalk breakage when running into a symlink overmounting something

commit 3cab989a upstream.

Calling unlazy_walk() in walk_component() and do_last() when we find
a symlink that needs to be followed doesn't acquire a reference to vfsmount.
That's fine when the symlink is on the same vfsmount as the parent directory
(which is almost always the case), but it's not always true - one _can_
manage to bind a symlink on top of something.  And in such cases we end up
with excessive mntput().
Signed-off-by: default avatarAl Viro <viro@zeniv.linux.org.uk>
Signed-off-by: default avatarJiri Slaby <jslaby@suse.cz>
parent 378e22f6
...@@ -1557,7 +1557,8 @@ static inline int walk_component(struct nameidata *nd, struct path *path, ...@@ -1557,7 +1557,8 @@ static inline int walk_component(struct nameidata *nd, struct path *path,
if (should_follow_link(inode, follow)) { if (should_follow_link(inode, follow)) {
if (nd->flags & LOOKUP_RCU) { if (nd->flags & LOOKUP_RCU) {
if (unlikely(unlazy_walk(nd, path->dentry))) { if (unlikely(nd->path.mnt != path->mnt ||
unlazy_walk(nd, path->dentry))) {
err = -ECHILD; err = -ECHILD;
goto out_err; goto out_err;
} }
...@@ -3023,7 +3024,8 @@ static int do_last(struct nameidata *nd, struct path *path, ...@@ -3023,7 +3024,8 @@ static int do_last(struct nameidata *nd, struct path *path,
if (should_follow_link(inode, !symlink_ok)) { if (should_follow_link(inode, !symlink_ok)) {
if (nd->flags & LOOKUP_RCU) { if (nd->flags & LOOKUP_RCU) {
if (unlikely(unlazy_walk(nd, path->dentry))) { if (unlikely(nd->path.mnt != path->mnt ||
unlazy_walk(nd, path->dentry))) {
error = -ECHILD; error = -ECHILD;
goto out; goto out;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment