| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <4FF1E63D.8040707@ya.ru> Date: Mon, 02 Jul 2012 22:19:41 +0400 From: Andrew Perepechko <anserper@...ru> To: Theodore Ts'o <tytso@....edu> CC: Jan Kara <jack@...e.cz>, linux-ext4@...r.kernel.org Subject: Re: dead/wrong code in ext3/4_releasepage() Hi Theodore! Sent. Thank you, Andrew On 07/02/2012 10:17 PM, Theodore Ts'o wrote: > On Mon, Jul 02, 2012 at 07:33:26PM +0200, Jan Kara wrote: >> Hi, >> >> On Mon 02-07-12 21:14:58, Andrew Perepechko wrote: >>> So you think the correct fix would be to remove the check completely >>> since every try_to_release_page() caller is obliged to perform the >>> page_has_private() check? >> Yes, I think that would be reasonable. XFS already relies on this so >> it should be safe. > > Andrew, can you send me a patch? > > Thanks, > > - Ted > -- > To unsubscribe from this list: send the line "unsubscribe linux-ext4" in > the body of a message to majordomo@...r.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists