lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.2.00.1006062036240.3515@i5.linux-foundation.org>
Date:	Sun, 6 Jun 2010 20:38:17 -0700 (PDT)
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	Markus Trippelsdorf <markus@...ppelsdorf.de>
cc:	Theodore Tso <tytso@....EDU>, linux-kernel@...r.kernel.org,
	linux-ext4@...r.kernel.org
Subject: Re: ext4 2.6.35-rc2 regression (ext4: Make sure the MOVE_EXT ioctl
 can't overwrite append-only files)



On Sun, 6 Jun 2010, Markus Trippelsdorf wrote:

> On Sun, Jun 06, 2010 at 01:59:47PM +0200, Markus Trippelsdorf wrote:
> > On Sun, Jun 06, 2010 at 07:45:48AM -0400, Theodore Tso wrote:
> > > 
> > > On Jun 6, 2010, at 4:16 AM, Markus Trippelsdorf wrote:
> > > 
> > > > Commit 1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72
> > > > "ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files"
> > > > causes the following kernel BUG on my machine (x86_64):
> > > > 
> > > > BUG: Bad page map in process mpd  pte:720072000000000 pmd:11d2f7067

This is the same "VGA pattern": 07200720 is two spaces. 

It causes lots of trouble, too bad it made it into -rc2. It has nothing to 
do with ext4.

And I bet it gets fix by the same vt.c patch that apparently fixed some 
KMS issues. Look on lkml for a "poison overwritten" subject line.

Or just revert 962400e8fd29981a7b166e463dd143b6ac6a3e76.

		Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ