This patch adds cheking for granted memory while
filling up inode data to prevent possible NULL
pointer usage. If there is not enough memory to
fill inode data we just mark it as "bad".

Signed-off-by: Cyrill Gorcunov <[EMAIL PROTECTED]>

---

Please check the patch, maybe just marking inode as
"bad" is not a good solution.

 fs/udf/inode.c |   27 ++++++++++++++++++++++++---
 1 files changed, 24 insertions(+), 3 deletions(-)

diff --git a/fs/udf/inode.c b/fs/udf/inode.c
index c846155..91cddae 100644
--- a/fs/udf/inode.c
+++ b/fs/udf/inode.c
@@ -1144,6 +1144,13 @@ static void udf_fill_inode(struct inode *inode, struct 
buffer_head *bh)
                UDF_I_EFE(inode) = 1;
                UDF_I_USE(inode) = 0;
                UDF_I_DATA(inode) = kmalloc(inode->i_sb->s_blocksize - 
sizeof(struct extendedFileEntry), GFP_KERNEL);
+               if (!UDF_I_DATA(inode))
+               {
+                       printk(KERN_ERR "udf: udf_fill_inode(ino %ld) no free 
memory\n",
+                              inode->i_ino);
+                       make_bad_inode(inode);
+                       return;
+               }
                memcpy(UDF_I_DATA(inode), bh->b_data + sizeof(struct 
extendedFileEntry), inode->i_sb->s_blocksize - sizeof(struct 
extendedFileEntry));
        }
        else if (le16_to_cpu(fe->descTag.tagIdent) == TAG_IDENT_FE)
@@ -1151,6 +1158,13 @@ static void udf_fill_inode(struct inode *inode, struct 
buffer_head *bh)
                UDF_I_EFE(inode) = 0;
                UDF_I_USE(inode) = 0;
                UDF_I_DATA(inode) = kmalloc(inode->i_sb->s_blocksize - 
sizeof(struct fileEntry), GFP_KERNEL);
+               if (!UDF_I_DATA(inode))
+               {
+                       printk(KERN_ERR "udf: udf_fill_inode(ino %ld) no free 
memory\n",
+                              inode->i_ino);
+                       make_bad_inode(inode);
+                       return;
+               }
                memcpy(UDF_I_DATA(inode), bh->b_data + sizeof(struct 
fileEntry), inode->i_sb->s_blocksize - sizeof(struct fileEntry));
        }
        else if (le16_to_cpu(fe->descTag.tagIdent) == TAG_IDENT_USE)
@@ -1161,6 +1175,13 @@ static void udf_fill_inode(struct inode *inode, struct 
buffer_head *bh)
                        le32_to_cpu(
                                ((struct unallocSpaceEntry 
*)bh->b_data)->lengthAllocDescs);
                UDF_I_DATA(inode) = kmalloc(inode->i_sb->s_blocksize - 
sizeof(struct unallocSpaceEntry), GFP_KERNEL);
+               if (!UDF_I_DATA(inode))
+               {
+                       printk(KERN_ERR "udf: udf_fill_inode(ino %ld) no free 
memory\n",
+                              inode->i_ino);
+                       make_bad_inode(inode);
+                       return;
+               }
                memcpy(UDF_I_DATA(inode), bh->b_data + sizeof(struct 
unallocSpaceEntry), inode->i_sb->s_blocksize - sizeof(struct 
unallocSpaceEntry));
                return;
        }
@@ -1178,7 +1199,7 @@ static void udf_fill_inode(struct inode *inode, struct 
buffer_head *bh)
        inode->i_nlink = le16_to_cpu(fe->fileLinkCount);
        if (!inode->i_nlink)
                inode->i_nlink = 1;
-       
+
        inode->i_size = le64_to_cpu(fe->informationLength);
        UDF_I_LENEXTENTS(inode) = inode->i_size;
 
@@ -1230,7 +1251,7 @@ static void udf_fill_inode(struct inode *inode, struct 
buffer_head *bh)
        }
        else
        {
-               inode->i_blocks = le64_to_cpu(efe->logicalBlocksRecorded) << 
+               inode->i_blocks = le64_to_cpu(efe->logicalBlocksRecorded) <<
                        (inode->i_sb->s_blocksize_bits - 9);
 
                if ( udf_stamp_to_time(&convtime, &convtime_usec,
@@ -2059,7 +2080,7 @@ int8_t udf_delete_aext(struct inode *inode, struct 
extent_position epos,
                        mark_buffer_dirty_inode(oepos.bh, inode);
                }
        }
-       
+
        brelse(epos.bh);
        brelse(oepos.bh);
        return (elen >> 30);
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to