The patch titled
     user ns: prepare copy_tree, copy_mnt, and their callers to handle errs fix
has been removed from the -mm tree.  Its filename was
     
user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs-fix.patch

This patch was dropped because it was folded into 
user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs.patch

------------------------------------------------------
Subject: user ns: prepare copy_tree, copy_mnt, and their callers to handle errs 
fix
From: "Serge E. Hallyn" <[EMAIL PROTECTED]>

Quoting Frederik Deweerdt ([EMAIL PROTECTED]):
> On Thu, Jan 04, 2007 at 12:12:15PM -0600, Serge E. Hallyn wrote:
> > diff --git a/fs/namespace.c b/fs/namespace.c
> > index 5da87e2..a4039a3 100644
> > --- a/fs/namespace.c
> > +++ b/fs/namespace.c
> > @@ -708,8 +708,9 @@ struct vfsmount *copy_tree(struct vfsmou
> >             return NULL;
> >
> >     res = q = clone_mnt(mnt, dentry, flag);
> > -   if (!q)
> > -           goto Enomem;
> > +   if (!q || IS_ERR(q)) {
> > +           return q;
> > +   }
> >     q->mnt_mountpoint = mnt->mnt_mountpoint;
> >
> >     p = mnt;
> > @@ -730,8 +731,9 @@ struct vfsmount *copy_tree(struct vfsmou
> >                     nd.mnt = q;
> >                     nd.dentry = p->mnt_mountpoint;
> >                     q = clone_mnt(p, p->mnt_root, flag);
> > -                   if (!q)
> > -                           goto Enomem;
> > +                   if (!q || IS_ERR(q)) {
> > +                           goto Error;
> > +                   }
> >                     spin_lock(&vfsmount_lock);
> >                     list_add_tail(&q->mnt_list, &res->mnt_list);
> >                     attach_mnt(q, &nd);
> > @@ -739,7 +741,7 @@ struct vfsmount *copy_tree(struct vfsmou
> >             }
> >     }
> >     return res;
> > -Enomem:
> > +Error:
> >     if (res) {
>         ^^^^^^^^^^
> I think that this check can be safely skiped, as res is always non-NULL
> when Error: is now reached, isn't it?

Good point.  In addition, we can clean the code up a little by not
letting clone_mnt return NULL.  Compile-tested patch follows.  Though
really it starts to look like clone_mnt should be split into two
parts, with the original clone_mnt static inline, and the new clone_mnt
doing the permission check and return value conversion...

Subject: [PATCH 1/1] userns: cleanups with clone_mnt

As Frederik Deweerdt points out, the Error: case in copy_tree()
can no longer have res==NULL, so remove that check.

Also make clone_mnt always return -ENOMEM in place of NULL.

Signed-off-by: Serge E. Hallyn <[EMAIL PROTECTED]>
Cc: Herbert Poetzl <[EMAIL PROTECTED]>
Cc: Kirill Korotaev <[EMAIL PROTECTED]>
Cc: "Eric W. Biederman" <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---

 fs/namespace.c |   80 +++++++++++++++++++++++------------------------
 1 files changed, 40 insertions(+), 40 deletions(-)

diff -puN 
fs/namespace.c~user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs-fix
 fs/namespace.c
--- 
a/fs/namespace.c~user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs-fix
+++ a/fs/namespace.c
@@ -236,37 +236,39 @@ static struct vfsmount *clone_mnt(struct
        struct super_block *sb = old->mnt_sb;
        struct vfsmount *mnt = alloc_vfsmnt(old->mnt_devname);
 
-       if (mnt) {
-               mnt->mnt_flags = old->mnt_flags;
-               atomic_inc(&sb->s_active);
-               mnt->mnt_sb = sb;
-               mnt->mnt_root = dget(root);
-               mnt->mnt_mountpoint = mnt->mnt_root;
-               mnt->mnt_parent = mnt;
-
-               if (flag & CL_SLAVE) {
-                       list_add(&mnt->mnt_slave, &old->mnt_slave_list);
-                       mnt->mnt_master = old;
-                       CLEAR_MNT_SHARED(mnt);
-               } else {
-                       if ((flag & CL_PROPAGATION) || IS_MNT_SHARED(old))
-                               list_add(&mnt->mnt_share, &old->mnt_share);
-                       if (IS_MNT_SLAVE(old))
-                               list_add(&mnt->mnt_slave, &old->mnt_slave);
-                       mnt->mnt_master = old->mnt_master;
-               }
-               if (flag & CL_MAKE_SHARED)
-                       set_mnt_shared(mnt);
+       if (!mnt)
+               return ERR_PTR(-ENOMEM);
 
-               /* stick the duplicate mount on the same expiry list
-                * as the original if that was on one */
-               if (flag & CL_EXPIRE) {
-                       spin_lock(&vfsmount_lock);
-                       if (!list_empty(&old->mnt_expire))
-                               list_add(&mnt->mnt_expire, &old->mnt_expire);
-                       spin_unlock(&vfsmount_lock);
-               }
+       mnt->mnt_flags = old->mnt_flags;
+       atomic_inc(&sb->s_active);
+       mnt->mnt_sb = sb;
+       mnt->mnt_root = dget(root);
+       mnt->mnt_mountpoint = mnt->mnt_root;
+       mnt->mnt_parent = mnt;
+
+       if (flag & CL_SLAVE) {
+               list_add(&mnt->mnt_slave, &old->mnt_slave_list);
+               mnt->mnt_master = old;
+               CLEAR_MNT_SHARED(mnt);
+       } else {
+               if ((flag & CL_PROPAGATION) || IS_MNT_SHARED(old))
+                       list_add(&mnt->mnt_share, &old->mnt_share);
+               if (IS_MNT_SLAVE(old))
+                       list_add(&mnt->mnt_slave, &old->mnt_slave);
+               mnt->mnt_master = old->mnt_master;
+       }
+       if (flag & CL_MAKE_SHARED)
+               set_mnt_shared(mnt);
+
+       /* stick the duplicate mount on the same expiry list
+        * as the original if that was on one */
+       if (flag & CL_EXPIRE) {
+               spin_lock(&vfsmount_lock);
+               if (!list_empty(&old->mnt_expire))
+                       list_add(&mnt->mnt_expire, &old->mnt_expire);
+               spin_unlock(&vfsmount_lock);
        }
+
        return mnt;
 }
 
@@ -703,14 +705,15 @@ struct vfsmount *copy_tree(struct vfsmou
 {
        struct vfsmount *res, *p, *q, *r, *s;
        struct nameidata nd;
+       LIST_HEAD(umount_list);
 
        if (!(flag & CL_COPY_ALL) && IS_MNT_UNBINDABLE(mnt))
                return NULL;
 
        res = q = clone_mnt(mnt, dentry, flag);
-       if (!q || IS_ERR(q)) {
+       if (IS_ERR(q))
                return q;
-       }
+
        q->mnt_mountpoint = mnt->mnt_mountpoint;
 
        p = mnt;
@@ -731,9 +734,8 @@ struct vfsmount *copy_tree(struct vfsmou
                        nd.mnt = q;
                        nd.dentry = p->mnt_mountpoint;
                        q = clone_mnt(p, p->mnt_root, flag);
-                       if (!q || IS_ERR(q)) {
+                       if (IS_ERR(q))
                                goto Error;
-                       }
                        spin_lock(&vfsmount_lock);
                        list_add_tail(&q->mnt_list, &res->mnt_list);
                        attach_mnt(q, &nd);
@@ -742,13 +744,11 @@ struct vfsmount *copy_tree(struct vfsmou
        }
        return res;
 Error:
-       if (res) {
-               LIST_HEAD(umount_list);
-               spin_lock(&vfsmount_lock);
-               umount_tree(res, 0, &umount_list);
-               spin_unlock(&vfsmount_lock);
-               release_mounts(&umount_list);
-       }
+       spin_lock(&vfsmount_lock);
+       umount_tree(res, 0, &umount_list);
+       spin_unlock(&vfsmount_lock);
+       release_mounts(&umount_list);
+
        return q;
 }
 
_

Patches currently in -mm which might be from [EMAIL PROTECTED] are

implement-file-posix-capabilities.patch
file-capabilities-dont-do-file-caps-if-mnt_nosuid.patch
file-capabilities-honor-secure_noroot.patch
introduce-and-use-get_task_mnt_ns.patch
nsproxy-externalizes-exit_task_namespaces.patch
user-namespace-add-the-framework.patch
user-ns-add-user_namespace-ptr-to-vfsmount.patch
user-ns-hook-permission.patch
user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs.patch
user-ns-prepare-copy_tree-copy_mnt-and-their-callers-to-handle-errs-fix.patch
user-ns-implement-shared-mounts.patch
user-ns-implement-shared-mounts-fixes.patch
user_ns-handle-file-sigio.patch
user_ns-handle-file-sigio-fix.patch
user_ns-handle-file-sigio-fix-2.patch
user-ns-implement-user-ns-unshare.patch
user-ns-implement-user-ns-unshare-tidy.patch
rename-attach_pid-to-find_attach_pid.patch
attach_pid-with-struct-pid-parameter.patch
remove-find_attach_pid.patch
statically-initialize-struct-pid-for-swapper.patch
explicitly-set-pgid-sid-of-init.patch
uts-namespace-remove-config_uts_ns.patch
ipc-namespace-remove-config_ipc_ns.patch
ipc-namespace-remove-config_ipc_ns-linkage-fix.patch
ipc-namespace-remove-config_ipc_ns-linkage-fix-fix.patch
integrity-service-api-and-dummy-provider-fix.patch
sysctl-move-utsname-sysctls-to-their-own-file.patch
sysctl-move-sysv-ipc-sysctls-to-their-own-file.patch

-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to