Invalidate stale eCryptfs dcache entries caused by unlinked lower inodes
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABCgAGBQJV7v55AAoJENaSAD2qAscKAwoQAKkBJiRk4s8xmhHh++qgMxKr JPOJqiwsV86KWMrxzT7xYO9IUr/D8zFo0m7mXydMeJvRZl1MJe9atnoZL9xRuvch +ALh6i2c1o/tjuWze4ewMatxMiWffJ7W72p8dcihDiacDp0gxArd6zqaURjQRyns nwk/vt41PerXv2dloFFsnC3XibojwS5/dltM8B98dzdP8lj9XYSHAhwhsa4/MUvF pkv/PGuoDuuK0mbNaCEvjy2c40qjETlW0Hn/YkvJhBYYDR3awuXqCvNO+dZbhoym NeHb7Jfvzkagfd8v5Us9aQ0lK1ABTjmRdW5zGIymCke5HbpzzkMMKfAJKBvx186I M3eNnztc78lOjWOfqrfwOHM3/X1ELKiHgrZcG3KR+XX9J3fCmp7fL5EYL+JDf86H 2FPEU1RZue3oJUo3PYhCbEvWekUyHbG/18JHxRXAwVsUpcjeHprfvmn7hBN0sFPs hom3Mcc1IMUuos00Mj3H6CxpD2xe2+77L6VngQ681zNIhkG2nnCLx5zNPUx7d+68 RjV/KKs17/YNGZKxuNVD//RYJqx58NyM2BwBQ7caVm3dPWHa5tLoAxJstFjhKwhZ lon7mS4odEidSU4s1apEtoTeCjQMSAMgtQbTHUj+p+dNXx+CVdXXFaMqNvBHhCEI 5h01NR6QzfE8QGzLUcXf =ejQ5 -----END PGP SIGNATURE----- Merge tag 'ecryptfs-4.3-rc1-stale-dcache' of git://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs Pull ecryptfs fixes from Tyler Hicks: "Invalidate stale eCryptfs dcache entries caused by unlinked lower inodes" * tag 'ecryptfs-4.3-rc1-stale-dcache' of git://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs: eCryptfs: Delete a check before the function call "key_put" eCryptfs: Invalidate dcache entries when lower i_nlink is zero
This commit is contained in:
commit
b9ffce9ae1
2 changed files with 10 additions and 11 deletions
|
@ -258,8 +258,7 @@ void ecryptfs_destroy_mount_crypt_stat(
|
|||
&mount_crypt_stat->global_auth_tok_list,
|
||||
mount_crypt_stat_list) {
|
||||
list_del(&auth_tok->mount_crypt_stat_list);
|
||||
if (auth_tok->global_auth_tok_key
|
||||
&& !(auth_tok->flags & ECRYPTFS_AUTH_TOK_INVALID))
|
||||
if (!(auth_tok->flags & ECRYPTFS_AUTH_TOK_INVALID))
|
||||
key_put(auth_tok->global_auth_tok_key);
|
||||
kmem_cache_free(ecryptfs_global_auth_tok_cache, auth_tok);
|
||||
}
|
||||
|
|
|
@ -45,20 +45,20 @@
|
|||
static int ecryptfs_d_revalidate(struct dentry *dentry, unsigned int flags)
|
||||
{
|
||||
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
||||
int rc;
|
||||
|
||||
if (!(lower_dentry->d_flags & DCACHE_OP_REVALIDATE))
|
||||
return 1;
|
||||
int rc = 1;
|
||||
|
||||
if (flags & LOOKUP_RCU)
|
||||
return -ECHILD;
|
||||
|
||||
rc = lower_dentry->d_op->d_revalidate(lower_dentry, flags);
|
||||
if (d_really_is_positive(dentry)) {
|
||||
struct inode *lower_inode =
|
||||
ecryptfs_inode_to_lower(d_inode(dentry));
|
||||
if (lower_dentry->d_flags & DCACHE_OP_REVALIDATE)
|
||||
rc = lower_dentry->d_op->d_revalidate(lower_dentry, flags);
|
||||
|
||||
fsstack_copy_attr_all(d_inode(dentry), lower_inode);
|
||||
if (d_really_is_positive(dentry)) {
|
||||
struct inode *inode = d_inode(dentry);
|
||||
|
||||
fsstack_copy_attr_all(inode, ecryptfs_inode_to_lower(inode));
|
||||
if (!inode->i_nlink)
|
||||
return 0;
|
||||
}
|
||||
return rc;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue