lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <bug-200169-13602-Z83yfiJuGw@https.bugzilla.kernel.org/>
Date:   Fri, 22 Jun 2018 23:34:07 +0000
From:   bugzilla-daemon@...zilla.kernel.org
To:     linux-ext4@...nel.org
Subject: [Bug 200169] move_expired_inodes crash

https://bugzilla.kernel.org/show_bug.cgi?id=200169

Theodore Tso (tytso@....edu) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
                 CC|                            |tytso@....edu
         Resolution|---                         |UNREPRODUCIBLE

--- Comment #1 from Theodore Tso (tytso@....edu) ---
Unfortunately, no one is likely to pay attention to this bug given how you
filed it.

The problems are:

*  You filed this against the ext4 component, and this stack trace doesn't show
anything related to ext4 at all; it appears to be a writeback issue.

*   This is against a 4.9.x (and you mentioned 4.4.x) kernel.  The upstream
developers generally don't field bug reports against old stable kernels. 
Customers who need that kind of support pay distributions (e.g,. Red Hat, SuSE,
Canonical) to work on those bugs, and the distro kernel engineers will push
fixe upstream if they are still applicable.  (Or maybe they will find an
upstream fix and backport it into their distro kernel.)

*   You don't have a repro, so we can't even check and see if it is
reproducible on the mainline developmment kernel.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ