lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150611142247.GL24181@thunk.org> Date: Thu, 11 Jun 2015 10:22:47 -0400 From: Theodore Ts'o <tytso@....edu> To: Seunghun Lee <waydi1@...il.com> Cc: linux-ext4@...r.kernel.org Subject: Re: ext4: truncate issue in ext4 encryption. On Thu, Jun 11, 2015 at 09:08:36AM +0900, Seunghun Lee wrote: > Hi, > > I was running fsstress on encrypted ext4 image, > and I hit BUG_ON(blocksize != PAGE_CACHE_SIZE); in __ext4_block_zero_page_range. > > It occurs when I'm using filesytem that has small block size(1024 bytes). Yes, we don't have support for blocksize != pagesize yet. This should have been prevented when the file system was mounted. I thought we had that check, but obviously we had forgotten to add it or it had somehow gotten dropped. Thanks for the bug report. Regards, - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists