From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jeff Layton Subject: [PATCH v7 36/49] vfs: make chroot retry once on ESTALE error Date: Mon, 1 Oct 2012 20:16:45 -0400 Message-ID: <1349137018-21948-37-git-send-email-jlayton@redhat.com> References: <1349137018-21948-1-git-send-email-jlayton@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mx1.redhat.com (ext-mx15.extmail.prod.ext.phx2.redhat.com [10.5.110.20]) by int-mx11.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id q920Hvsl028718 for ; Mon, 1 Oct 2012 20:17:57 -0400 Received: from mail-yx0-f174.google.com (mail-yx0-f174.google.com [209.85.213.174]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id q920H9mf025412 for ; Mon, 1 Oct 2012 20:17:57 -0400 Received: by mail-yx0-f174.google.com with SMTP id m12so1534924yen.33 for ; Mon, 01 Oct 2012 17:17:57 -0700 (PDT) In-Reply-To: <1349137018-21948-1-git-send-email-jlayton@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: viro@ZenIV.linux.org.uk Cc: linux-fsdevel@vger.kernel.org, linux-audit@redhat.com, linux-kernel@vger.kernel.org List-Id: linux-audit@redhat.com Signed-off-by: Jeff Layton --- fs/open.c | 37 +++++++++++++++++++++---------------- 1 file changed, 21 insertions(+), 16 deletions(-) diff --git a/fs/open.c b/fs/open.c index 81ba325..a015cb8 100644 --- a/fs/open.c +++ b/fs/open.c @@ -437,27 +437,32 @@ SYSCALL_DEFINE1(chroot, const char __user *, filename) { struct path path; int error; + int lookup_flags = LOOKUP_FOLLOW | LOOKUP_DIRECTORY; + unsigned int try = 0; - error = user_path_dir(filename, &path); - if (error) - goto out; + do { + error = user_path_at(AT_FDCWD, filename, lookup_flags, &path); + if (error) + break; - error = inode_permission(path.dentry->d_inode, MAY_EXEC | MAY_CHDIR); - if (error) - goto dput_and_out; + error = inode_permission(path.dentry->d_inode, + MAY_EXEC | MAY_CHDIR); + if (error) + goto dput_and_out; - error = -EPERM; - if (!capable(CAP_SYS_CHROOT)) - goto dput_and_out; - error = security_path_chroot(&path); - if (error) - goto dput_and_out; + error = -EPERM; + if (!capable(CAP_SYS_CHROOT)) + goto dput_and_out; + error = security_path_chroot(&path); + if (error) + goto dput_and_out; - set_fs_root(current->fs, &path); - error = 0; + set_fs_root(current->fs, &path); + error = 0; dput_and_out: - path_put(&path); -out: + path_put(&path); + lookup_flags |= LOOKUP_REVAL; + } while (retry_estale(error, try++)); return error; } -- 1.7.11.4