lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150105101331.GE7056@quack.suse.cz> Date: Mon, 5 Jan 2015 11:13:31 +0100 From: Jan Kara <jack@...e.cz> To: Fabian Frederick <fabf@...net.be> Cc: linux-kernel@...r.kernel.org, Jan Kara <jack@...e.cz>, Andrew Morton <akpm@...ux-foundation.org>, Andreas Dilger <adilger.kernel@...ger.ca>, linux-ext4@...r.kernel.org Subject: Re: [PATCH 1/1 linux-next] ext3: destroy sbi mutexes in put_super On Sat 27-12-14 16:01:22, Fabian Frederick wrote: > Signed-off-by: Fabian Frederick <fabf@...net.be> Thanks, I have merged the patch with somewhat updated changelog to describe what are the visible effects of this. Honza > --- > This is untested. > > fs/ext3/super.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/fs/ext3/super.c b/fs/ext3/super.c > index 9b4e7d7..d4dbf3c 100644 > --- a/fs/ext3/super.c > +++ b/fs/ext3/super.c > @@ -466,6 +466,8 @@ static void ext3_put_super (struct super_block * sb) > } > sb->s_fs_info = NULL; > kfree(sbi->s_blockgroup_lock); > + mutex_destroy(&sbi->s_orphan_lock); > + mutex_destroy(&sbi->s_resize_lock); > kfree(sbi); > } > > -- > 2.1.0 > -- Jan Kara <jack@...e.cz> SUSE Labs, CR -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists