| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20131008160331.GI17896@thunk.org> Date: Tue, 8 Oct 2013 12:03:31 -0400 From: Theodore Ts'o <tytso@....edu> To: "Darrick J. Wong" <darrick.wong@...cle.com> Cc: linux-ext4@...r.kernel.org Subject: Re: [PATCH 18/31] libext2fs: Badblocks should handle 48-bit block numbers correctly On Mon, Sep 30, 2013 at 06:28:37PM -0700, Darrick J. Wong wrote: > Currently, the badblocks code assumes 32-bit block numbers. This leads to > unfortunate results, because feeding a badblocks file to mke2fs with 64-bit > block numbers causes libext2fs to rip off the upper 32 bits of the block number > and then assign a truncated block number to the badblocks file. > > This is just as well, since the code that writes to the bb inode doesn't know > about extents anyway. Rather than continuing to open-code block map > manipulation, simply use existing library functions to truncate the old bb > inode, mark all badblocks in use, and then assign them to the badblocks file. > We can even use extents now. > > (It's arguable that badblocks is a vestigial organ now, but perhaps someone is > using it? I use it to stress-test disk block allocation, but I might just be > nutty.) > > Signed-off-by: Darrick J. Wong <darrick.wong@...cle.com> Yeah, I think badblocks is vestigal at this point, and for huge disk arrays, almost certainly block replacement will be handed at the LVM, storage array, or HDD level. So it might be better simply to have mke2fs throw an error if there is an attempt to hand it a 64-bit block number. - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists