lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CABymUCMC=8PwrqetiOBVK98iwKrycAf_eYZdfqVOPya6jZTPvQ@mail.gmail.com> Date: Wed, 7 Dec 2022 16:11:01 +0800 From: Jun Nie <jun.nie@...aro.org> To: "yebin (H)" <yebin10@...wei.com> Cc: Ye Bin <yebin@...weicloud.com>, tytso@....edu, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, jack@...e.cz, syzbot+4faa160fa96bfba639f8@...kaller.appspotmail.com Subject: Re: [PATCH v2] ext4: fix kernel BUG in 'ext4_write_inline_data_end()' yebin (H) <yebin10@...wei.com> 于2022年12月7日周三 15:54写道: > > > > On 2022/12/7 14:44, Jun Nie wrote: > > Hi Bin, > > > > Thanks for the patch! The bug is reproduced with this patch. I can > > help trigger another > > test when you have new patch. > > https://syzkaller.appspot.com/text?tag=CrashLog&x=16760797880000 > > The cause of this issue is different from that of the previous issue. > I analyze that the issue > "https://syzkaller.appspot.com/text?tag=CrashLog&x=16760797880000 " > is caused by the concurrency of inline data conversion and buffer > write. To be honest, I haven't > thought of any good solution. > Thanks for explanation. So the patch to fix the previous bug is still in upstream plan, right? > > > > Regards, > > Jun > > . >
Powered by blists - more mailing lists