lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 30 Nov 2018 18:05:45 +0000 From: bugzilla-daemon@...zilla.kernel.org To: linux-ext4@...r.kernel.org Subject: [Bug 201685] ext4 file system corruption https://bugzilla.kernel.org/show_bug.cgi?id=201685 --- Comment #94 from Jens Axboe (axboe@...nel.dk) --- In terms of ext4 changes, it'd be interesting to just revert this one: commit ac22b46a0b65dbeccbf4d458db95687e825bde90 Author: Jens Axboe <axboe@...nel.dk> Date: Fri Aug 17 15:45:42 2018 -0700 ext4: readpages() should submit IO as read-ahead as that guy is generally just not trust worthy. In all seriousness, though, it shouldn't cause issues (or I would not have done it), and we already do this for readpages in general, but I guess we could have an older bug in ext4 that depends deeply on read-ahead NOT failing. Not sure how likely that is, Ted can probably comment on that. But it's a trivial revert, and it could potentially be implicated. -- You are receiving this mail because: You are watching the assignee of the bug.
Powered by blists - more mailing lists