lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100519233408.7436bd9b@mjolnir.ossman.eu>
Date:	Wed, 19 May 2010 23:34:08 +0200
From:	Pierre Ossman <pierre@...man.eu>
To:	unlisted-recipients:; (no To-header on input)
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Strange read data corruption on ext4/LVM/md

On Wed, 19 May 2010 23:29:06 +0200
Pierre Ossman <pierre@...man.eu> wrote:

> 
> Noteworthy is also that the last three nibbles of the corruption are
> always the same (xxxxx380 => xxxxxf80).
> 

I'm mostly talking to myself at this point, but one thing that occurs
to me here is 4096 sectors line up decently with the numbers above.
0x380 is just at the end of a 512 byte sector, and 0xf80 is just at the
end of a 4096 byte one. Not sure it's relevant, but then again I've
stayed blissfully unaware of how this sector size transformation is
going to happen. :)

Rgds
-- 
     -- Pierre Ossman

  WARNING: This correspondence is being monitored by FRA, a
  Swedish intelligence agency. Make sure your server uses
  encryption for SMTP traffic and consider using PGP for
  end-to-end encryption.

Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ