lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 22 Nov 2011 13:33:43 +0800
From:	wangyanqing <udknight@...il.com>
To:	Matt Domsch <Matt_Domsch@...l.com>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	"warns@...-sense.de" <warns@...-sense.de>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"tj@...nel.org" <tj@...nel.org>,
	"jaxboe@...ionio.com" <jaxboe@...ionio.com>, pjones@...hat.com,
	mjg59@...hat.com
Subject: Re: [PATCH] fs:partitions:efi.c: correct misuse force_gpt

On Mon, Nov 21, 2011 at 10:33:25PM -0600, Matt Domsch wrote:

> Again, here there is some debate, what the Alternate GPT header and
> table are good for.
> 
> I put the comment in to remind myself a decade later...
> 
> /**
>  * find_valid_gpt() - Search disk for valid GPT headers and PTEs
>  * @state
>  * @gpt is a GPT header ptr, filled on return.
>  * @ptes is a PTEs ptr, filled on return.
>  * Description: Returns 1 if valid, 0 on error.
>  * If valid, returns pointers to newly allocated GPT header and PTEs.
>  * Validity depends on PMBR being valid (or being overridden by the
>  * 'gpt' kernel command line option) and finding either the Primary
>  * GPT header and PTEs valid, or the Alternate GPT header and PTEs
>  * valid.  If the Primary GPT header is not valid, the Alternate GPT header
>  * is not checked unless the 'gpt' kernel command line option is passed.
>  * This protects against devices which misreport their size, and forces
>  * the user to decide to use the Alternate GPT.
>  */
> 
> Why is this?
> 
> There were a class of hard disks (IIRC, first generation iPods at
> least), that would report their size off by one (one sector larger
> than they actually were), and attempting to read from that one-past
> sector would cause the whole device to go catatonic, which would then
> hang the boot process.
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=281905 and what
> should be in the historical kernel tree.
> 
> Your patch undoes the patch that prevented the boot from hanging in
> such situations.
> 
> Because we can't know which disks might misbehave this way, and
> because it is a catastrophic failure when it happens, we wanted to
> force the user to do something which might cause the failure to occur,
> hence it's protected behind the force_gpt flag.
Sorry I miss the comment, and you are right!

> 
> Seconarily, the primary purpose of the AGPT in my mind is so that
> userspace tools like parted can look at all the available information
> and make a decision as to whether the AGPT info is valid and should be
> used, if the PGPT is corrupt, and then can fix up either or both
> headers as necessary.  Inside the kernel, there's very little I want
> to trust the AGPT for if I can avoid it, and nothing can fix either
> header if determined to be corrupt.
Thanks for the detail explanation! Matt


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ