lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 7 Mar 2018 09:49:18 +0100
From:   Jan Kara <>
To:     "Theodore Y. Ts'o" <>
Cc:     rong zhao <>,,
Subject: Re: resize2fs hang at read function

On Wed 07-03-18 00:08:46, Theodore Y. Ts'o wrote:
> On Wed, Mar 07, 2018 at 11:01:40AM +0800, rong zhao wrote:
> > 
> > I downloaded the latest e2fsprogs source code from, it works.
> I'm not sure what the difference is, but I'm *shocked* that RHEL 7.4
> is still using e2fsprogs 1.42.x.  There are a very large number of
> resize2fs bugs, especially with very large file systems, with
> e2fsprogs 1.42.x.  Especially in the case of off-line resizes with a
> lage ext4 file system, with a resize2fs from e2fsprogs 1.42.x, data
> corruption is almost a certainty.

Yeah, welcome to the world of enterprise distributions :-|. Even in SLES 12
SP3 (our current latest "enterprise offering") we have e2fsprogs 1.42.11 as
well. And the reason is that at the time we were looking what e2fsprogs to
put there (which was about two years back), 1.43 was still "WIP" and so I
had some doubts whether we can ship it in a distro supported for another 10
years. So we have 1.42.11 and only backport fixes based on customers' bug

Luckily we are somewhat flexible at least on service pack releases so now
that e2fsprogs is having more regular releases (big thanks for that!), I
actually take your comment as a good reminder to talk to our PMs about
pushing 1.43.x to SLE12 SP4 :).

Jan Kara <>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ