lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 7 Jun 2010 08:32:46 +0200
From:	Markus Trippelsdorf <markus@...ppelsdorf.de>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	Theodore Tso <tytso@....EDU>, linux-kernel@...r.kernel.org,
	linux-ext4@...r.kernel.org
Subject: Re: 2.6.35-rc2 regression

On Sun, Jun 06, 2010 at 08:38:17PM -0700, Linus Torvalds wrote:
> 
> 
> On Sun, 6 Jun 2010, Markus Trippelsdorf wrote:
> 
> > On Sun, Jun 06, 2010 at 01:59:47PM +0200, Markus Trippelsdorf wrote:
> > > On Sun, Jun 06, 2010 at 07:45:48AM -0400, Theodore Tso wrote:
> > > > 
> > > > On Jun 6, 2010, at 4:16 AM, Markus Trippelsdorf wrote:
> > > > 
> > > > > Commit 1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72
> > > > > "ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files"
> > > > > causes the following kernel BUG on my machine (x86_64):
> > > > > 
> > > > > BUG: Bad page map in process mpd  pte:720072000000000 pmd:11d2f7067
> 
> This is the same "VGA pattern": 07200720 is two spaces. 
> 
> It causes lots of trouble, too bad it made it into -rc2. It has nothing to 
> do with ext4.
> 
> And I bet it gets fix by the same vt.c patch that apparently fixed some 
> KMS issues. Look on lkml for a "poison overwritten" subject line.
> 
> Or just revert 962400e8fd29981a7b166e463dd143b6ac6a3e76.

Yes, I applied the patch early this morning and had no issues thus far.

-- 
Markus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ