lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 19 Feb 2009 09:46:51 -0600 From: Eric Sandeen <sandeen@...hat.com> To: Theodore Tso <tytso@....edu>, Andres Freund <andres@...razel.de>, Alex Buell <alex.buell@...ted.org.uk>, adilger@....com, LKML <linux-kernel@...r.kernel.org>, linux-ext4@...r.kernel.org, Jonathan Bastien-Filiatrault <joe@....org>, "Aneesh Kumar K.V" <aneesh.kumar@...ux.vnet.ibm.com> Subject: Re: EXT4 ENOSPC Bug Theodore Tso wrote: > On Thu, Feb 19, 2009 at 03:18:45AM +0100, Andres Freund wrote: >> On 02/18/2009 10:29 PM, Theodore Tso wrote: >>> Ok, that's good. Good to know the workaround works. >>> Can you send me a dumpe2fs of the filesystem in question? I'm curious >>> what was going on... >> Will do as soon as I am at the same place as the machine. I guess thats >> only interesting to you privately (size and so on)? >> >>> Thanks for the report. I'll push the workaround patch to Linus for >>> 2.6.29 to avoid this problem for now. I recently sent to linux-ext4 >>> for comment a patch to revamp the Orlov allocator for flex_bg and to >>> use that instead of find_group_flex(), but no way that's going into >>> 2.6.29 at this point.... >> Would it be helpfull if I test that patch? >> > > Sure, I'll take all of the testing I can get. :-) > > The patch is in the ext4 patch queue, and I sent them to the ext4 > patch queue. The patch is also in patch work: > > http://patchwork.ozlabs.org/patch/23343/ > > The patch which I sent you earlier (available below) is a prequisite: > > http://patchwork.ozlabs.org/patch/23228/ Ted, I hope the printk will be removed or at least ratelimited before it gets upstream? Thanks, -Eric -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists