lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20220831072111.3569680-8-yi.zhang@huawei.com> Date: Wed, 31 Aug 2022 15:21:04 +0800 From: Zhang Yi <yi.zhang@...wei.com> To: <linux-ext4@...r.kernel.org>, <linux-fsdevel@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <cluster-devel@...hat.com>, <ntfs3@...ts.linux.dev>, <ocfs2-devel@....oracle.com>, <reiserfs-devel@...r.kernel.org> CC: <jack@...e.cz>, <tytso@....edu>, <akpm@...ux-foundation.org>, <axboe@...nel.dk>, <viro@...iv.linux.org.uk>, <rpeterso@...hat.com>, <agruenba@...hat.com>, <almaz.alexandrovich@...agon-software.com>, <mark@...heh.com>, <dushistov@...l.ru>, <hch@...radead.org>, <yi.zhang@...wei.com>, <chengzhihao1@...wei.com>, <yukuai3@...wei.com> Subject: [PATCH 07/14] ntfs3: replace ll_rw_block() ll_rw_block() is not safe for the sync read path because it cannot guarantee that submitting read IO if the buffer has been locked. We could get false positive EIO after wait_on_buffer() if the buffer has been locked by others. So stop using ll_rw_block() in ntfs_get_block_vbo(). Signed-off-by: Zhang Yi <yi.zhang@...wei.com> --- fs/ntfs3/inode.c | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/fs/ntfs3/inode.c b/fs/ntfs3/inode.c index 51363d4e8636..bbe7d4ea1750 100644 --- a/fs/ntfs3/inode.c +++ b/fs/ntfs3/inode.c @@ -630,12 +630,9 @@ static noinline int ntfs_get_block_vbo(struct inode *inode, u64 vbo, bh->b_size = block_size; off = vbo & (PAGE_SIZE - 1); set_bh_page(bh, page, off); - ll_rw_block(REQ_OP_READ, 1, &bh); - wait_on_buffer(bh); - if (!buffer_uptodate(bh)) { - err = -EIO; + err = bh_read(bh, 0); + if (err) goto out; - } zero_user_segment(page, off + voff, off + block_size); } } -- 2.31.1
Powered by blists - more mailing lists