http://bugzilla.kernel.org/show_bug.cgi?id=13909 --- Comment #30 from Anonymous Emailer <anonymous@xxxxxxxxxxxxxxxxxxxx> 2009-08-17 14:29:19 --- Reply-To: rwheeler@xxxxxxxxxx On 08/15/2009 09:54 AM, bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote: > http://bugzilla.kernel.org/show_bug.cgi?id=13909 > > > > > > --- Comment #28 from Roland Kletzing<devzero@xxxxxx> 2009-08-15 13:54:43 --- > rus,any chance to try the attached patch and confirm if it is the real fix for > the problem ? > > > > We're now able to duplicate this bug. Not sure why it only affects ext4. > > ima: kernel_read parm integer overflow bugfix > > Reading large files>2G causes process to loop. > (http://bugzilla.kernel.org/show_bug.cgi?id=13909) > > Signed-off-by: Mimi Zohar<zohar@xxxxxxxxxx> > > Index: security-testing-2.6/security/integrity/ima/ima_crypto.c > =================================================================== > --- security-testing-2.6.orig/security/integrity/ima/ima_crypto.c > +++ security-testing-2.6/security/integrity/ima/ima_crypto.c > @@ -47,7 +47,8 @@ int ima_calc_hash(struct file *file, cha > struct scatterlist sg[1]; > loff_t i_size; > char *rbuf; > - int rc, offset = 0; > + unsigned long offset = 0; > + int rc; > > rc = init_desc(&desc); > if (rc != 0) > > I suspect that you will need to use the official offset type to avoid overflow at 4GB - loff_t should be more consistent, Ric -- Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html