lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20221207074043.1286731-4-yebin@huaweicloud.com> Date: Wed, 7 Dec 2022 15:40:40 +0800 From: Ye Bin <yebin@...weicloud.com> To: tytso@....edu, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org Cc: linux-kernel@...r.kernel.org, jack@...e.cz, Ye Bin <yebin10@...wei.com> Subject: [PATCH v2 3/6] ext4: remove unnessary size check in ext4_xattr_inode_get() From: Ye Bin <yebin10@...wei.com> As previous patch add check in ext4_xattr_check_entries(), before call ext4_xattr_inode_get() will already do xattr entries check. Signed-off-by: Ye Bin <yebin10@...wei.com> --- fs/ext4/xattr.c | 8 -------- 1 file changed, 8 deletions(-) diff --git a/fs/ext4/xattr.c b/fs/ext4/xattr.c index eed001eee3ec..75287422c36c 100644 --- a/fs/ext4/xattr.c +++ b/fs/ext4/xattr.c @@ -525,14 +525,6 @@ ext4_xattr_inode_get(struct inode *inode, struct ext4_xattr_entry *entry, goto out; } - if (i_size_read(ea_inode) != size) { - ext4_warning_inode(ea_inode, - "ea_inode file size=%llu entry size=%zu", - i_size_read(ea_inode), size); - err = -EFSCORRUPTED; - goto out; - } - err = ext4_xattr_inode_read(ea_inode, buffer, size); if (err) goto out; -- 2.31.1
Powered by blists - more mailing lists