lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200910131620.12676.shawn.starr@rogers.com>
Date:	Tue, 13 Oct 2009 16:20:12 -0400
From:	Shawn Starr <shawn.starr@...ers.com>
To:	Theodore Tso <tytso@....edu>, linux-kernel@...r.kernel.org
Subject: Re: [2.6.32-rc4] + EXT4 corruption

On October 12, 2009 10:23:01 pm Theodore Tso wrote:
> On Mon, Oct 12, 2009 at 10:07:49PM -0400, Shawn Starr wrote:
> > Hello everyone,
> >
> > I somehow managed to corrupt some of my filesystem.
> >
> > What I did was this:
> >
> > in /etc/modprobe.d/alsa-base.conf (Kubuntu)
> >
> > I added:
> >
> > install snd-aloop /sbin/modprobe snd-aloop
> >
> > Saved it, then ran, modprobe snd-aloop, the system started spawning
> > many copies of modprobe, then machine started going though a swap
> > storm, could not reboot safely, hit power button on laptop. When the
> > system came back up, EXT4 greeted me with severe errors on some
> > opened files. It did repair filesystem however. It corrupted some
> > configuration files that were open at the time of the shutdown.
> >
> > I'm guessing no matter how much you attempt to replay a journal you
> > still can get corruption such as this?
> 
> You shouldn't get any file system corruption after replaying a
> journal.  I'm trying to get an easily reproducible test case for this.
> Can you give me more information about where your root filesystem is
> located.  Is it using LVM?  dm-crypt?  Can you reliably reproducible
> the file system corruption?
> 
> 						- Ted
> 

Hi Ted, 

No LVM, no encryption. Regular primary partitions. root is on sda4, swap on 
sda3, /boot is on sda2, sda1 contains another OS that came with laptop.

/ is mounted as: 
/dev/sda4 on / type ext4 (rw,noatime,nodiratime,errors=remount-ro)

Some more information:

I was in X with several KDE and non-KDE applications at the time of the swap 
storm. I noticed in my .viminfo file contents got corrupted with of some .kde4 
configurations (looks to be a plasma configuration), lost my kconversationrc 
completely.  That file is was also in $HOME/.kde4/config. 

fsck.ext4 asked me if I wanted to clone some inodes and truncate illegal ones. 
I said yes to all the warnings (too bad it doesn't have a log of that anywhere 
I could give you).

It might be useful to have fsck write a log file to filesystem after its 
cleaned, then one could provide you a full dump of what fsck says and what 
EXT4 spits out?

I am pretty sure I can reproduce the corruption. I am more surprised that 
opened files such as .viminfo were corrupted when they are not being changed? 
(I don't believe vim examines the file if you've loaded it once during start 
of vim?)

Thanks, 
Shawn.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ