lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4726C577.9000209@sandeen.net> Date: Tue, 30 Oct 2007 00:47:35 -0500 From: Eric Sandeen <sandeen@...deen.net> To: Andi Kleen <andi@...stfloor.org> CC: David Miller <davem@...emloft.net>, byron.bbradley@...il.com, linux-kernel@...r.kernel.org Subject: Re: XFS Fails Quality Assurance Tests on ARM Andi Kleen wrote: > David Miller <davem@...emloft.net> writes: > >> From: Byron Bradley <byron.bbradley@...il.com> >> Date: Fri, 31 Aug 2007 03:12:46 +0000 (UTC) >> >>> Anybody got any ideas of how we fix this? >> I don't know how much testing XFS gets on ARM, but one thing that some >> ARM chips have is D-cache aliasing problems and one thing XFS uses a >> lot is virtual remapping of various data structures via vmap(). >> >> This might be what is causing the problems. Sorry, I lost the original to reply to, but stumbled on this thread looking for something else. :) Anyway, from the assertion: Assertion failed: (char *)sfep - (char *)sfp == dp->i_d.di_size, file: fs/xfs/xfs_dir2_sf.c, line: 647 kernel BUG at fs/xfs/support/debug.c:82! this is almost certainly a result of xfs_dir2_sf_off_t, xfs_dir2_sf_hdr_t, and/or xfs_dir2_sf_entry_t or others not being "properly" aligned on arm. There was a patch floating around to "fix" it but it's not on-disk compatible w/ x86 & friends, it just makes things consistent for arm. I think packing some of these structures would take care of it, but this problem could use some attention & testing I think, it's been floating around a long time. -Eric - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists