lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 20 Jan 2009 14:56:12 +0100
From:	Jörg Sommer <joerg@...a.gnuu.de>
To:	Andreas Dilger <adilger@....com>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: ext4 fails on ext2 filesystems

Hello Andreas,

Andreas Dilger schrieb am Tue 20. Jan, 07:30 (+0800):
> On Jan 18, 2009  02:35 +0100, J�rg Sommer wrote:
> > I've an ext2 filesystem as root filesystem, because it's mounted readonly
> > for the most part. I've built in the support for ext[234] in the kernel.
> > Ext4 takes precedence over ext2 and it mounts the root filesystem:
> 
> Hmm, probably an unintended consequence of the newly-added patch to
> allow ext4 to mount ext2 filesystems.
> 
> > But when remounting the filesystem read/write and changing a file, the
> > changes are written to the filesystem, but it's remounted readonly
> > immediatly. I've set the mount option remount-ro.
> > 
> > [  203.082300] EXT4 FS on hda3, no journal
> > [  205.746713] EXT4-fs error (device hda3): ext4_free_data: circular indirect block detected, inode=165056, block=184476
> 
> > motherboard	: PowerBook6,3 MacRISC3 Power Macintosh
> 
> Hmm, looks like it might be a bug in the endian conversion?

Or an unsigned vs. signed char bug? Can I somehow help you hunting the
bug? How can I mount my rootfs with ext4 on 2.6.28. Maybe this bug isn't
in this version.

Bye, Jörg.
-- 
$ cat /dev/random
#!/usr/bin/perl -WT
print "hello world\n";

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ