vfs: don't BUG_ON() if following a /proc fd pseudo-symlink results in a symlink
authorLinus Torvalds <[email protected]>
Fri, 8 Mar 2013 17:03:07 +0000 (09:03 -0800)
committerLinus Torvalds <[email protected]>
Fri, 8 Mar 2013 17:03:07 +0000 (09:03 -0800)
It's "normal" - it can happen if the file descriptor you followed was
opened with O_NOFOLLOW.

Reported-by: Dave Jones <[email protected]>
Cc: Al Viro <[email protected]>
Cc: [email protected]
Signed-off-by: Linus Torvalds <[email protected]>
fs/namei.c

index 961bc1268366d80c8b44adf5adc0aec26f59edbd..57ae9c8c66bfc6d98ae96643874710cdc3de321a 100644 (file)
@@ -689,8 +689,6 @@ void nd_jump_link(struct nameidata *nd, struct path *path)
        nd->path = *path;
        nd->inode = nd->path.dentry->d_inode;
        nd->flags |= LOOKUP_JUMPED;
-
-       BUG_ON(nd->inode->i_op->follow_link);
 }
 
 static inline void put_link(struct nameidata *nd, struct path *link, void *cookie)