diff options
Diffstat (limited to 'fs')
-rw-r--r-- | fs/inotify.c | 2 | ||||
-rw-r--r-- | fs/namei.c | 6 | ||||
-rw-r--r-- | fs/namespace.c | 56 | ||||
-rw-r--r-- | fs/nfsd/nfs4proc.c | 6 | ||||
-rw-r--r-- | fs/super.c | 5 |
5 files changed, 48 insertions, 27 deletions
diff --git a/fs/inotify.c b/fs/inotify.c index 878ccca61213..3041503bde02 100644 --- a/fs/inotify.c +++ b/fs/inotify.c | |||
@@ -967,7 +967,7 @@ asmlinkage long sys_inotify_add_watch(int fd, const char __user *path, u32 mask) | |||
967 | mask_add = 1; | 967 | mask_add = 1; |
968 | 968 | ||
969 | /* don't let user-space set invalid bits: we don't want flags set */ | 969 | /* don't let user-space set invalid bits: we don't want flags set */ |
970 | mask &= IN_ALL_EVENTS; | 970 | mask &= IN_ALL_EVENTS | IN_ONESHOT; |
971 | if (unlikely(!mask)) { | 971 | if (unlikely(!mask)) { |
972 | ret = -EINVAL; | 972 | ret = -EINVAL; |
973 | goto out; | 973 | goto out; |
diff --git a/fs/namei.c b/fs/namei.c index faf61c35308c..e28de846c591 100644 --- a/fs/namei.c +++ b/fs/namei.c | |||
@@ -1119,9 +1119,11 @@ static int fastcall do_path_lookup(int dfd, const char *name, | |||
1119 | current->total_link_count = 0; | 1119 | current->total_link_count = 0; |
1120 | retval = link_path_walk(name, nd); | 1120 | retval = link_path_walk(name, nd); |
1121 | out: | 1121 | out: |
1122 | if (unlikely(current->audit_context | 1122 | if (likely(retval == 0)) { |
1123 | && nd && nd->dentry && nd->dentry->d_inode)) | 1123 | if (unlikely(current->audit_context && nd && nd->dentry && |
1124 | nd->dentry->d_inode)) | ||
1124 | audit_inode(name, nd->dentry->d_inode, flags); | 1125 | audit_inode(name, nd->dentry->d_inode, flags); |
1126 | } | ||
1125 | return retval; | 1127 | return retval; |
1126 | 1128 | ||
1127 | fput_unlock_fail: | 1129 | fput_unlock_fail: |
diff --git a/fs/namespace.c b/fs/namespace.c index ce97becff461..a2bef5c81033 100644 --- a/fs/namespace.c +++ b/fs/namespace.c | |||
@@ -1325,27 +1325,17 @@ dput_out: | |||
1325 | return retval; | 1325 | return retval; |
1326 | } | 1326 | } |
1327 | 1327 | ||
1328 | int copy_namespace(int flags, struct task_struct *tsk) | 1328 | /* |
1329 | * Allocate a new namespace structure and populate it with contents | ||
1330 | * copied from the namespace of the passed in task structure. | ||
1331 | */ | ||
1332 | struct namespace *dup_namespace(struct task_struct *tsk, struct fs_struct *fs) | ||
1329 | { | 1333 | { |
1330 | struct namespace *namespace = tsk->namespace; | 1334 | struct namespace *namespace = tsk->namespace; |
1331 | struct namespace *new_ns; | 1335 | struct namespace *new_ns; |
1332 | struct vfsmount *rootmnt = NULL, *pwdmnt = NULL, *altrootmnt = NULL; | 1336 | struct vfsmount *rootmnt = NULL, *pwdmnt = NULL, *altrootmnt = NULL; |
1333 | struct fs_struct *fs = tsk->fs; | ||
1334 | struct vfsmount *p, *q; | 1337 | struct vfsmount *p, *q; |
1335 | 1338 | ||
1336 | if (!namespace) | ||
1337 | return 0; | ||
1338 | |||
1339 | get_namespace(namespace); | ||
1340 | |||
1341 | if (!(flags & CLONE_NEWNS)) | ||
1342 | return 0; | ||
1343 | |||
1344 | if (!capable(CAP_SYS_ADMIN)) { | ||
1345 | put_namespace(namespace); | ||
1346 | return -EPERM; | ||
1347 | } | ||
1348 | |||
1349 | new_ns = kmalloc(sizeof(struct namespace), GFP_KERNEL); | 1339 | new_ns = kmalloc(sizeof(struct namespace), GFP_KERNEL); |
1350 | if (!new_ns) | 1340 | if (!new_ns) |
1351 | goto out; | 1341 | goto out; |
@@ -1396,8 +1386,6 @@ int copy_namespace(int flags, struct task_struct *tsk) | |||
1396 | } | 1386 | } |
1397 | up_write(&namespace_sem); | 1387 | up_write(&namespace_sem); |
1398 | 1388 | ||
1399 | tsk->namespace = new_ns; | ||
1400 | |||
1401 | if (rootmnt) | 1389 | if (rootmnt) |
1402 | mntput(rootmnt); | 1390 | mntput(rootmnt); |
1403 | if (pwdmnt) | 1391 | if (pwdmnt) |
@@ -1405,12 +1393,40 @@ int copy_namespace(int flags, struct task_struct *tsk) | |||
1405 | if (altrootmnt) | 1393 | if (altrootmnt) |
1406 | mntput(altrootmnt); | 1394 | mntput(altrootmnt); |
1407 | 1395 | ||
1408 | put_namespace(namespace); | 1396 | out: |
1409 | return 0; | 1397 | return new_ns; |
1398 | } | ||
1399 | |||
1400 | int copy_namespace(int flags, struct task_struct *tsk) | ||
1401 | { | ||
1402 | struct namespace *namespace = tsk->namespace; | ||
1403 | struct namespace *new_ns; | ||
1404 | int err = 0; | ||
1405 | |||
1406 | if (!namespace) | ||
1407 | return 0; | ||
1408 | |||
1409 | get_namespace(namespace); | ||
1410 | |||
1411 | if (!(flags & CLONE_NEWNS)) | ||
1412 | return 0; | ||
1413 | |||
1414 | if (!capable(CAP_SYS_ADMIN)) { | ||
1415 | err = -EPERM; | ||
1416 | goto out; | ||
1417 | } | ||
1418 | |||
1419 | new_ns = dup_namespace(tsk, tsk->fs); | ||
1420 | if (!new_ns) { | ||
1421 | err = -ENOMEM; | ||
1422 | goto out; | ||
1423 | } | ||
1424 | |||
1425 | tsk->namespace = new_ns; | ||
1410 | 1426 | ||
1411 | out: | 1427 | out: |
1412 | put_namespace(namespace); | 1428 | put_namespace(namespace); |
1413 | return -ENOMEM; | 1429 | return err; |
1414 | } | 1430 | } |
1415 | 1431 | ||
1416 | asmlinkage long sys_mount(char __user * dev_name, char __user * dir_name, | 1432 | asmlinkage long sys_mount(char __user * dev_name, char __user * dir_name, |
diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c index a00fe8686293..6d63f1d9e5f5 100644 --- a/fs/nfsd/nfs4proc.c +++ b/fs/nfsd/nfs4proc.c | |||
@@ -195,10 +195,12 @@ nfsd4_open(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open | |||
195 | 195 | ||
196 | /* Openowner is now set, so sequence id will get bumped. Now we need | 196 | /* Openowner is now set, so sequence id will get bumped. Now we need |
197 | * these checks before we do any creates: */ | 197 | * these checks before we do any creates: */ |
198 | status = nfserr_grace; | ||
198 | if (nfs4_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS) | 199 | if (nfs4_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS) |
199 | return nfserr_grace; | 200 | goto out; |
201 | status = nfserr_no_grace; | ||
200 | if (!nfs4_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS) | 202 | if (!nfs4_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS) |
201 | return nfserr_no_grace; | 203 | goto out; |
202 | 204 | ||
203 | switch (open->op_claim_type) { | 205 | switch (open->op_claim_type) { |
204 | case NFS4_OPEN_CLAIM_DELEGATE_CUR: | 206 | case NFS4_OPEN_CLAIM_DELEGATE_CUR: |
diff --git a/fs/super.c b/fs/super.c index c177b92419c5..30294218fa63 100644 --- a/fs/super.c +++ b/fs/super.c | |||
@@ -247,8 +247,9 @@ void generic_shutdown_super(struct super_block *sb) | |||
247 | 247 | ||
248 | /* Forget any remaining inodes */ | 248 | /* Forget any remaining inodes */ |
249 | if (invalidate_inodes(sb)) { | 249 | if (invalidate_inodes(sb)) { |
250 | printk("VFS: Busy inodes after unmount. " | 250 | printk("VFS: Busy inodes after unmount of %s. " |
251 | "Self-destruct in 5 seconds. Have a nice day...\n"); | 251 | "Self-destruct in 5 seconds. Have a nice day...\n", |
252 | sb->s_id); | ||
252 | } | 253 | } |
253 | 254 | ||
254 | unlock_kernel(); | 255 | unlock_kernel(); |