diff options
author | Zhao Heming <heming.zhao@suse.com> | 2020-10-06 00:00:24 +0800 |
---|---|---|
committer | Song Liu <songliubraving@fb.com> | 2020-10-08 22:31:29 -0700 |
commit | d837f7277f56e70d82b3a4a037d744854e62f387 (patch) | |
tree | b46c1b95bd92c91fb6c106e25bbfcc87b2502cca /kernel/audit_fsnotify.c | |
parent | a913096decbf4101271e7d87b9affb1454bb7676 (diff) | |
download | linux-stable-d837f7277f56e70d82b3a4a037d744854e62f387.tar.gz linux-stable-d837f7277f56e70d82b3a4a037d744854e62f387.tar.bz2 linux-stable-d837f7277f56e70d82b3a4a037d744854e62f387.zip |
md/bitmap: md_bitmap_get_counter returns wrong blocks
md_bitmap_get_counter() has code:
```
if (bitmap->bp[page].hijacked ||
bitmap->bp[page].map == NULL)
csize = ((sector_t)1) << (bitmap->chunkshift +
PAGE_COUNTER_SHIFT - 1);
```
The minus 1 is wrong, this branch should report 2048 bits of space.
With "-1" action, this only report 1024 bit of space.
This bug code returns wrong blocks, but it doesn't inflence bitmap logic:
1. Most callers focus this function return value (the counter of offset),
not the parameter blocks.
2. The bug is only triggered when hijacked is true or map is NULL.
the hijacked true condition is very rare.
the "map == null" only true when array is creating or resizing.
3. Even the caller gets wrong blocks, current code makes caller just to
call md_bitmap_get_counter() one more time.
Signed-off-by: Zhao Heming <heming.zhao@suse.com>
Signed-off-by: Song Liu <songliubraving@fb.com>
Diffstat (limited to 'kernel/audit_fsnotify.c')
0 files changed, 0 insertions, 0 deletions