From: =?UTF-8?B?VG9yYWxmIEbDtnJzdGVy?= Subject: Re: found a scenario for BUG at fs/ext4/super.c:804! Date: Sat, 01 Jun 2013 20:02:36 +0200 Message-ID: <51AA373C.4060801@gmx.de> References: <51A79353.7030604@gmx.de> <51AA0CA1.6080600@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE Cc: linux-ext4@vger.kernel.org, Dave Jones To: Eric Sandeen Return-path: Received: from mout.gmx.net ([212.227.17.21]:59941 "EHLO mout.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751326Ab3FASCk (ORCPT ); Sat, 1 Jun 2013 14:02:40 -0400 Received: from mailout-de.gmx.net ([10.1.76.20]) by mrigmx.server.lan (mrigmx002) with ESMTP (Nemesis) id 0Llbtx-1UAb720XGZ-00bOVL for ; Sat, 01 Jun 2013 20:02:39 +0200 In-Reply-To: <51AA0CA1.6080600@redhat.com> Sender: linux-ext4-owner@vger.kernel.org List-ID: On 06/01/2013 05:00 PM, Eric Sandeen wrote: > And therein lies the unknown magic. >=20 > Again, trinity's job is to try to corrupt the kernel by fuzzing sysca= lls Just one question : Is trinity able to corrupt the host kernel while running within a user mode linux guest ? Because it is the host kernel which fails after being attacked with a lot of NFS calls. --=20 MfG/Sincerely Toralf F=C3=B6rster pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3 -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" i= n the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html