lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 4 Dec 2020 10:28:02 -0500
From:   "Theodore Y. Ts'o" <tytso@....edu>
To:     Paul Menzel <pmenzel@...gen.mpg.de>
Cc:     Andreas Dilger <adilger.kernel@...ger.ca>,
        linux-ext4@...r.kernel.org
Subject: Re: ext4: Funny characters appended to file names

On Fri, Dec 04, 2020 at 03:30:38PM +0100, Paul Menzel wrote:
> Dear Linux folks,
> 
> 
> Using Debian Sid/unstable with 5.9.11 (5.9.0-4-686-pae), it looks like the
> last `sudo grub-update` installed modules with corrupted file names. `/boot`
> is mounted.
> 
> > $ findmnt /boot
> > TARGET SOURCE   FSTYPE OPTIONS
> > /boot  /dev/md0 ext4   rw,relatime
> > $ ls -l /boot/grub/i386-pc/
> > insgesamt 2085
> > -rw-r--r-- 1 root root   8004 13. Aug 23:00 '915resolution.mod-'$'\205\300''u'$'\023\211''鍓]'$'\206\371\377\211\360\350''f'$'\376\377\377\205\300''ur'$'\203\354\004''V'$'\377''t$'$'\030''j'$'\002''胒'
> > -rw-r--r-- 1 root root  10596 13. Aug 23:00 'acpi.mod-'$'\205\300''u'$'\023\211''鍓]'$'\206\371\377\211\360\350''f'$'\376\377\377\205\300''ur'$'\203\354\004''V'$'\377''t$'$'\030''j'$'\002''胒'
> > […]
> > $ file /boot/grub/i386-pc/zstd.mod-��u^S�鍓\]�����f���ur��^DVt\$^Xj^B胒
> > /boot/grub/i386-pc/zstd.mod-��u�鍓]������f�����ur��V�t$j胒: ELF 32-bit
> > LSB relocatable, Intel 80386, version 1 (SYSV), not stripped
> 
> Checking the file system returned no errors.
> 
>     $ sudo umount /boot
>     $ sudo fsck.ext4 /dev/md0
>     e2fsck 1.45.6 (20-Mar-2020)
>     boot: sauber, 331/124928 Dateien, 145680/497856 Blöcke

Try forcing a full fsck:

sudo fsck.ext4 -f /dev/md0

You'll see that it takes rather longer to run....

       	   	   	 	       - Ted

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ