lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20090120140510.GC10037@mit.edu>
Date:	Tue, 20 Jan 2009 09:05:10 -0500
From:	Theodore Tso <tytso@....edu>
To:	fdbugs <fdbugs@...oux.com>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: bug when we do an mkfs.ext4 + tune2fs

On Tue, Jan 20, 2009 at 01:21:45PM +0000, fdbugs wrote:
> Hi,
> 
> I have an error when I try to mount an ext4 after having changed its
> uuid with tune2fs. If I just do an mkfs.ext4 I can mount it, but if I
> do an mkfs.ext4 and then an e2label -U on it, it can't be mounted.
> Fortunately this bug is quite easy to reproduce.

This is a bug in tune2fs/e2label; it's fixed in the maint branch of
e2fsprogs, and I hope to get a release out soon.  The relevant commit
is:

commit 9d4a4dc2870c46c74f815ec2bebe10b4701accf2
Author: Theodore Ts'o <tytso@....edu>
Date:   Fri Nov 14 17:42:27 2008 -0500

    tune2fs: Update the block group checksums when changing the UUID
    
    Since the block group checksums depend on the UUID, we need to update
    the block group checksums when setting the UUID.  We only do so if all
    of the checksums are correct, however.
    
    Signed-off-by: "Theodore Ts'o" <tytso@....edu>

You can work around it by using the command "e2fsck -fy" right after
the e2label -U, but that's admittedly quite annoying.  :-/

							- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ