[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Y5lzLzVz6icx+5K1@sol.localdomain>
Date: Tue, 13 Dec 2022 22:54:39 -0800
From: Eric Biggers <ebiggers@...nel.org>
To: Jun Nie <jun.nie@...aro.org>
Cc: tytso@....edu, jaegeuk@...nel.org, linux-fscrypt@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] fscrypt: Fix null pointer when defer i_crypt_info
On Wed, Dec 14, 2022 at 09:33:41AM +0800, Jun Nie wrote:
> Eric Biggers <ebiggers@...nel.org> 于2022年12月14日周三 02:54写道:
> >
> > On Tue, Dec 13, 2022 at 04:11:03PM +0800, Jun Nie wrote:
> > > syzbot report below bug[1]. Fix it with checking null pointer before
> > > deferring i_crypt_info.
> > >
> >
> > Thanks, but this has already been fixed upstream by commit 105c78e12468
> > ("ext4: don't allow journal inode to have encrypt flag").
> >
> > Also, I don't think adding a NULL check to __fscrypt_inode_uses_inline_crypto()
> > is a good idea because it is only meant to be called when the inode's encryption
> > key has already been set up. Instead of making the function return a
> > potentially-incorrect result, it was better to address the root cause of why it
> > was being called at an inappropriate time in the first place.
> >
> > - Eric
>
> Thanks for the information! Do you know what's the plan/schedule of
> back porting,
> such as linux-5.15.y branch?
>
> - Jun
The commit has 'Cc: stable@...r.kernel.org', and it is marked as fixing a commit
in 5.9. So it will be backported to 5.10 LTS and later. It will take a little
while for the stable maintainers to pick it up, though, since it just made it
upstream yesterday.
- Eric
Powered by blists - more mailing lists