lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080128143842.GA9881@mit.edu>
Date:	Mon, 28 Jan 2008 09:38:42 -0500
From:	Theodore Tso <tytso@....edu>
To:	Valerie Clement <valerie.clement@...l.net>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: e2fsprogs: pu branch

On Fri, Jan 25, 2008 at 05:32:59PM +0100, Valerie Clement wrote:
> Hi Ted,
> 
> Here are the problems I found when testing e2fsprogs built in the "pu"
> branch. I've checked that they haven't been fixed in the latest version.
> (git describe => v1.40.3-98-gb6fea68)
> 
> 1- "Corrupt extent header" report from e2fsck
>   =======================================================
> 
> Steps to reproduce it:
> Copy a regular file on the ext4 filesystem and make a symbolic links to it:
> # ln -s foo lnk
> Unmount fs.
> 
> # e2fsck -f /dev/sdc0
> e2fsck 1.40.3 (05-Dec-2007)
> Pass 1: Checking inodes, blocks, and sizes
> Error while reading over extent tree in inode 49105: Corrupt extent header
> Clear inode<y>

This is a kernel-level bug, actually.  The symlink is a "fast symlink"
where the target of the symlink is in inode itself.  The kernel level
code should *not* be setting the EXTENTS_FL flag.  Still, we'll have
to put in some code to work around it for people with current kernel
levels.

> 2- "EXT2 directory corrupted" report from debugfs
>   ===================================i===========
> When trying to debug the previous problem using debugfs: 
> 
> debugfs:  ncheck 49105
> ncheck: EXT2 directory corrupted while calling ext2_dir_iterate
> ncheck: EXT2 directory corrupted while calling ext2_dir_iterate
> ncheck: EXT2 directory corrupted while calling ext2_dir_iterate

Not all parts of the ext2 library have been fixed to understand
extents (in particular, ext2_dir_iterate).  On the todo list...

> 3- Strange "FILE SYSTEM WAS MODIFIED" report from e2fsck.
>   =======================================================
> 
> The test just creates an empty file so it is surprising that e2fsck modifies
> the filesystem. 
> I found the reason of this modification when reading the git logs, e2fsck
> backups the primary superblock to the backups when the feature sets are 
> different (EXT3_FEATURE_INCOMPAT_EXTENTS in that case).
> 
> It's not really a problem, it's just confusing. To see with other users,
> perhaps.

Yeah, we should add a explanatory message for that case.  Thanks for
pointing that out.

					- Ted
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ