| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <bug-20992-13602@https.bugzilla.kernel.org/>
Date: Sat, 23 Oct 2010 14:39:02 GMT
From: bugzilla-daemon@...zilla.kernel.org
To: linux-ext4@...r.kernel.org
Subject: [Bug 20992] New: Data corruption triggers ext4 oops
https://bugzilla.kernel.org/show_bug.cgi?id=20992
Summary: Data corruption triggers ext4 oops
Product: File System
Version: 2.5
Kernel Version: 2.6.35.7
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: ext4
AssignedTo: fs_ext4@...nel-bugs.osdl.org
ReportedBy: bart.vanassche@...il.com
Regression: No
While running I/O performance tests I accidentally overwrote an ext4
filesystem. The next access of that filesystem triggered a kernel oops. I don't
think that should happen ?
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html