lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 5 Jun 2007 07:13:15 +0100 From: Christoph Hellwig <hch@...radead.org> To: Vasily Averin <vvs@...ru> Cc: Andrew Morton <akpm@...ux-foundation.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, devel@...nvz.org, linux-ext4@...r.kernel.org, Stephen Tweedie <sct@...hat.com>, adilger@...sterfs.com Subject: Re: [RFC PATCH ext3/ext4] orphan list corruption due bad inode On Tue, Jun 05, 2007 at 10:11:12AM +0400, Vasily Averin wrote: > >> return d_splice_alias(inode, dentry); > >> } > > Seems reasonable. So this prevents the bad inodes from getting onto the > > orphan list in the first place? > > make_bad_inode() is called from ext3_read_inode() that is called from iget() only. Which is artefact of using the read_inode interface. Please switch from iget to iget_locked and you can handle this case without ever inserting the "bad" inode into the inode hash. - To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists