lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Sat,  3 Jan 2009 23:02:15 -0800 (PST)
From:	bugme-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 12354] New: Advisory: Debian's current initramdisk scripts break with an ext4 root

http://bugzilla.kernel.org/show_bug.cgi?id=12354

           Summary: Advisory: Debian's current initramdisk scripts break
                    with an ext4 root
           Product: File System
           Version: 2.5
     KernelVersion: 2.6.28
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: enhancement
          Priority: P1
         Component: ext4
        AssignedTo: fs_ext4@...nel-bugs.osdl.org
        ReportedBy: jimsantelmo@...il.com


This is just a heads-up to hopefully save other people some time. I'm running
2.6.28 with debian/unstable, finally converted the root to ext4, and discovered
that Debian with an initrd can't boot it because the initrd scripts apparently
decide it is an ext3 filesystem with unsupported features. Not that they report
this: instead you get an ENODEV message that had me convinced ext4 wasn't
registering itself or some other such weirdness. Works fine if you use a
"rootfstype=ext4" kernel boot parameter, or no initrd.


-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ