vfs: don't BUG_ON() if following a /proc fd pseudo-symlink results in a symlink
It's "normal" - it can happen if the file descriptor you followed was opened with O_NOFOLLOW. Reported-by: Dave Jones <davej@redhat.com> Cc: Al Viro <viro@zeniv.linux.org.uk> Cc: stable@kernel.org Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
parent
47b3bc9073
commit
7b54c165a0
1 changed files with 0 additions and 2 deletions
|
@ -689,8 +689,6 @@ void nd_jump_link(struct nameidata *nd, struct path *path)
|
|||
nd->path = *path;
|
||||
nd->inode = nd->path.dentry->d_inode;
|
||||
nd->flags |= LOOKUP_JUMPED;
|
||||
|
||||
BUG_ON(nd->inode->i_op->follow_link);
|
||||
}
|
||||
|
||||
static inline void put_link(struct nameidata *nd, struct path *link, void *cookie)
|
||||
|
|
Loading…
Reference in a new issue