Hello,

> On Fri, 2005-07-08 at 14:58, Stephen Smalley wrote:
> > This patch modifies ext3 to call the inode_init_security LSM hook to
> > obtain the security attribute for a newly created inode and to set the
> > resulting attribute on the new inode as part of the same transaction.
> > This parallels the existing processing for setting ACLs on newly
> > created inodes.
> > 
> > Please let me know if you have any comments or suggestions for improvement.
> 
> > +   err = ext3_init_security(handle,inode, dir);
> > +   if (err) {
> > +           DQUOT_FREE_INODE(inode);
> > +           goto fail2;
> > +   }
> 
> This looks fine but it lead me to something else...
> 
> I wanted to just double-check that the above code gets the inode cleanup
> right if we get EDQUOT when allocating the EA block during inode
> initialisation.  I tried it with the equivalent ACL block of code, not
> actually using SELinux, and it worked as expected (set a default ACL on
> a directory, set quota to prevent further block allocations, and try to
> allocate a new inode; you get EDQUOT back.)
> 
> Trouble is, on unmounting the fs I got a 
> 
> Kernel BUG at "fs/dquot.c":422
> 
> in invalidate_dquots:
> #ifdef __DQUOT_PARANOIA
>               if (atomic_read(&dquot->dq_count))
>                       BUG();
> #endif
> 
> backtrace
> RIP: 0010:[<ffffffff801a62e0>] <ffffffff801a62e0>{vfs_quota_off+512}
> Call Trace:<ffffffff80190ed5>{sys_umount+533} <ffffffff8010f31d>{error_exit+0}
>        <ffffffff8010e99e>{system_call+126} 
> 
> It seems repeatable to me --- it hit twice out of two attempts.  Jan,
> recognise this problem?
  Which kernel was that? We had a similar bug in 2.6.11 kernel but it
should be fixed in 2.6.12. I suppose you get the same BUG if you run
just quotaoff(8), right?

                                                                Honza
-- 
Jan Kara <[EMAIL PROTECTED]>
SuSE CR Labs
-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to