lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=_QBgDutcb7h2XHpjHR6k-4Rj-r6zryMXaNn6e@mail.gmail.com>
Date:	Sat, 26 Feb 2011 20:21:47 +0200
From:	Amir Goldstein <amir73il@...il.com>
To:	Theodore Tso <tytso@....edu>, Jan Kara <jack@...e.cz>,
	Andreas Dilger <adilger@...ger.ca>,
	Eric Sandeen <sandeen@...hat.com>
Cc:	Ext4 Developers List <linux-ext4@...r.kernel.org>
Subject: orphan cleanup on readonly fs will corrupt future fs!

Hi guys,

I have just realized something very disturbing -
that orphan cleanup is not being skipped on readonly mount of ext4/ext3.

I know that journal recovery is done on readonly mount
and there is problem with that, since nothing happens
in the fs level.

But orphan cleanup deletes inodes and frees blocks and that
could be very bad for some RO_COMPAT features, SNAPSHOT
and BIGALLOC to name two.

I am not so sure why orphan cleanup is so important for readonly
mount in the first place?

Now the damage has been done, because current stock kernels will
corrupt future fs with SNAPSHOT and BIGALLOC features
(unless Ted backs up from the decision to make BIGALLOC RO_COMPAT...)

I think that we should skip orphan cleanup on readonly mount ASAP and try
to push this fix to as many stable/maint kernels out there, before the
problem gets worse.

Can anyway see a problem with skipping orphan cleanup?
Maybe there is a problem with later remount read-write?

I would spend time more time to investigate these questions,
but I find this problem too disturbing and urgent to wait until I find
the time to do so...

Amir.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ