lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 19 Oct 2009 21:07:41 GMT
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 14354] Bad corruption with 2.6.32-rc1 and upwards

http://bugzilla.kernel.org/show_bug.cgi?id=14354





--- Comment #92 from Theodore Tso <tytso@....edu>  2009-10-19 21:07:37 ---
Created an attachment (id=23468)
 --> (http://bugzilla.kernel.org/attachment.cgi?id=23468)
Testing patch; ro-diff with a WARN_ON(1)

Could you try this patch on top of a stock 2.6.32-rc kernel? 
ext4_write_inode() should not be called before the journal is set up, and I'm
not able to see how this could work.  Yet if the ro-diff.patch in attachment
#23458 makes a difference working, then that must be what's happening.

This is a variant on that patch that executes a printk and a WARN_ON(1) when if
the conditional triggers; that will allow me to figure out how
ext4_write_inode() is getting called early.  I'm not able to replicate this on
my system with this patch, but if it's working for you, then this should allow
me to see what's actually happening.   If we need to simply revert the change
to ext4_write_inode(), I can do that, but I'd really like to see what's going
on first.   If in fact there is a patch where ext4_write_inode() can get called
before ext4_load_journal(), which is what sets EXT4_SB(sb)->s_journal, then
there's opportunities for other mischief/data corruption.

-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ