lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201002171348.o1HDmBTW031193@demeter.kernel.org> Date: Wed, 17 Feb 2010 13:48:11 GMT From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 15025] Oops in ext4 driver http://bugzilla.kernel.org/show_bug.cgi?id=15025 --- Comment #11 from Dmitry Monakhov <dmonakhov@...nvz.org> 2010-02-17 13:47:27 --- After the patch i can not trigger the bug (In reply to comment #10) > On Tue, Feb 16, 2010 at 02:08:33PM +0000, bugzilla-daemon@...zilla.kernel.org > wrote: > > The issue was fixed by following commit > > http://git.kernel.org/?p=linux/kernel/git/tytso/ext4.git;a=commit;h=1db913823c0f8360fccbd24ca67eb073966a5ffd > > This cannot be, as I don't use quota. It i is posible to triger the bug without quota. Untill the patch it we have following code fs/ext4/inode.c: 1850 if (ext4_claim_free_blocks(sbi, md_needed + 1)) { 1851 vfs_dq_release_reservation_block(inode, md_needed + 1); 1852 if (ext4_should_retry_alloc(inode->i_sb, &retries)) { 1853 retry: 1854 if (md_reserved) 1855 write_inode_now(inode, (retries == 3)); ^^^^^^^^^^ Here we goes in to lack of journal credits. ^^^^^^^^^^^^^^^^^^^^^^ 1856 yield(); 1857 goto repeat; 1858 } 1859 return -ENOSPC; 1860 } You have failed exactly here. So the bug happens even in case of ENOSPC (try following testase): dd if=/dev/zero /mnt/BIG_FILE bs=1M But it takes longer if partition is really huge. -- Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists