lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 19 Mar 2008 12:56:45 +0100
From:	Solofo.Ramangalahy@...l.net
To:	Andreas Dilger <adilger@....com>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: [2.6.25-rc5-ext4-36c86] attempt to access beyond end of device

Hi Andreas,

Andreas Dilger writes:
 > You should print out the page->mapping->host->i_ino in this message
 > and then you can possibly examine the filesystem to see if it is
 > a corrupt block allocation, or possibly random garbage in the block.

Will do thanks.

 > Hmm, is this filesystem formatted with 64BIT?

I'm using: 
mke2fs 1.40.8 (13-Mar-2008)
        Using EXT2FS Library version 1.40.8
(the one from debian unstable)
and format like this:
/sbin/mkfs.ext3 -E test_fs /dev/sdb

Just want to note (because of current vger problems) that Dmitri
confirmed the symptom (with fsstress+fallocate patch) and offered an
analysis.

-- 
solofo
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ