lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20200806054251.GL7657@mit.edu> Date: Thu, 6 Aug 2020 01:42:51 -0400 From: tytso@....edu To: Lukas Czerner <lczerner@...hat.com> Cc: linux-ext4@...r.kernel.org Subject: Re: [PATCH v2] ext4: handle read only external journal device On Fri, Jul 17, 2020 at 11:06:05AM +0200, Lukas Czerner wrote: > Ext4 uses blkdev_get_by_dev() to get the block_device for journal device > which does check to see if the read-only block device was opened > read-only. > > As a result ext4 will hapily proceed mounting the file system with > external journal on read-only device. This is bad as we would not be > able to use the journal leading to errors later on. > > Instead of simply failing to mount file system in this case, treat it in > a similar way we treat internal journal on read-only device. Allow to > mount with -o noload in read-only mode. Applied, thanks. - Ted
Powered by blists - more mailing lists