lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 27 Sep 2010 17:59:41 -0400
From:	Chris Frey <cdfrey@...rsquare.net>
To:	richard -rw- weinberger <richard.weinberger@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: ext3 filesystem corruption in user mode linux

On Mon, Sep 27, 2010 at 05:26:50PM -0400, Chris Frey wrote:
> > Hmm, maybe this issue affects only your configuration.
> > When I have some spare time I'll try to trigger this on my setup.
> 
> That would be great.  Let me know if you need any specific data from my end.

One data point that I'm finding so far, is that it is easier to trigger
in 2.6.35.x than 2.6.32.x.  It also doesn't seem to be dependent on the
version of the host kernel.  I can reproduce it running 2.6.35.4 or
2.6.32.22.

If you want a small gentoo starting point, I have a 56M compressed
ext3 gentoo guest filesystem I can share with those who wish to test.
I don't want to make it available to everyone, due to size.

- Chris

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ