[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-201631-13602-fLPdVg15vh@https.bugzilla.kernel.org/>
Date: Thu, 07 Feb 2019 09:06:38 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: linux-ext4@...r.kernel.org
Subject: [Bug 201631] WARNING: CPU: 11 PID: 29593 at fs/ext4/inode.c:3927
.ext4_set_page_dirty+0x70/0xb0
https://bugzilla.kernel.org/show_bug.cgi?id=201631
--- Comment #72 from Jan Kara (jack@...e.cz) ---
Just a suggestion to PPC maintainers / Aneesh: This bug can lead to data
corruption (lost data written to a file) or potential security issues (writes
to file user is no longer supposed to be able to write to) because it leads to
PPC leaving writeably mapped pages behind. So since we are at -rc5 I think
considering just reverting the patches and figuring out what's going on
separately without exposing general users to these issues is a fair question...
Note that the problem affects already 4.20 so -stable needs to be included
regardless how you decide to solve these issues.
--
You are receiving this mail because:
You are watching the assignee of the bug.
Powered by blists - more mailing lists