From nobody Tue Apr 11 16:47:12 2023 X-Original-To: fs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PwsFY3LLSz459R3 for ; Tue, 11 Apr 2023 16:47:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PwsFY2Bvnz3FV6 for ; Tue, 11 Apr 2023 16:47:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1681231633; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ffLE8N+ikHUdt5dBheW75pppfGP8BTStZvf4OXuWKE8=; b=aowFl/cvfzwL6T1rOsnYZd4ArZdkAQg5cQY/OFENFGvtEfzoGzQqnJrchn3cIcPRbijL7D s1MKKF+QftLQhxoKc86n0/OL0p7+rk55nhLUGPvxKuhskU8M3YR9ekjzeS+w22y89vl4zH WY/V6QYmNreL6G/VM1OXEFH7TGN2nVbbs5v675QGaU+6AjU7qkbGFOK21TOxP75nXy1Tqr LurbGfSHwgXqRzc0x8hm1Xx69okC6BBiKgKxCypPcu6IbpXxgW7uO58FTQmd5PIIDfpmq/ LDpTnNeXIoG/RQhTLMi3B+NZ7T/ZCWnagIgF/2A9atmiEQ7BzKhV7m02/Cg8yQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1681231633; a=rsa-sha256; cv=none; b=uv5rM3HaCQeU91CBFIvRxzPAGQXkxi7OkZzAVSTRpGx8OMq5NVsEnOs8ZRrtwlMlTceSNs P5kzncZ8E/mvXgm8E20I+aHHjxKs1oSzilO+21RPgmNvrgiPR0JcbQETgI40rElfVx+I4B nMwxmQehJHy66/N8eWZ5bIdCKbaTva45DTYtrfUQ6nFD3Srv6Q1eVcHh56fUAlf/DMWI+G 0iWeo8CxH4A97OBOVrZ9mrxXftRGqg0Iab9BDXtoBsQUgJISRU07dvkL/jTxXSvxyo5loN LXbVismOrmA7hTNOD0XR8S0LtFBiA2QCy0dqcH6N4OFvM4TTbdluEmd3lcK3TA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PwsFY0vqNzQ6W for ; Tue, 11 Apr 2023 16:47:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 33BGlDF9041416 for ; Tue, 11 Apr 2023 16:47:13 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 33BGlDvv041415 for fs@FreeBSD.org; Tue, 11 Apr 2023 16:47:13 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: fs@FreeBSD.org Subject: [Bug 270632] [ext2fs] files <4096 bytes are corrupted on ext4 filesystems Date: Tue, 11 Apr 2023 16:47:12 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: emaste@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: fs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Filesystems List-Archive: https://lists.freebsd.org/archives/freebsd-fs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-fs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270632 Ed Maste changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |emaste@freebsd.org --- Comment #24 from Ed Maste --- For reference the following commits under sys/fs/ext2fs are in main but not cherry-picked to stable/13: 2bfd8992c7c7 vnode: move write cluster support data to inodes. 8b7239681e27 ext2fs: clear write cluster tracking on truncation 1484574843a3 Fix inode birthtime updating logic. 1ed5f62d61ac Add chr/blk devices support. 5679656e09fb Improve extents verification logic. b3f46656393f Invalidate inode extents cache on truncation. c40a160fd0aa Make inode extra time fields updating logic more closer to lin= ux. 2a984c2b4982 Make encode/decode extra time functions inline. b4a58fbf6404 vfs: remove cn_thread 40dd1c9c06eb ext2: plug set-but-not-used vars 7e1d3eefd410 vfs: remove the unused thread argument from NDINIT* b214fcceacad Change VOP_READDIR's cookies argument to a **uint64_t 5034b44574c4 Remove unnecessary e2fs_first_dblock value check bb9f1ba4b55c Add more accurate directory entries check ced217282230 Add more accurate check for root inode f1d5e2c862ef Improve extents verification logic 0134bbe56fbb vfs: prefix lookup and relookup with vfs_ bb92cd7bcd16 vfs: NDFREE(&nd, NDF_ONLY_PNBUF) -> NDFREE_PNBUF(&nd) 11c549555469 ext2: plug a set-but-not-used var 5b5b7e2ca2fa vfs: always retain path buffer after lookup b935e867af18 Tree-wide replacement of VOP_UNLOCK + vrele combo with vput 38389acc59fc ext2fs: fix potential memory leak in ext4_ext_grow_indepth() 8f874e92ebc9 vfs: make relookup take an additional argument 829f0bcb5fe2 vfs: add the concept of vnode state transitions 344243fc9213 Fix block bitmap end position computation 366da717deda Add root directory entry check. 3c2dc524c333 Do not panic in case of corrupted directory 62b572694b0a ext2_dirbad(): fix !DTRACE build bb95e6fa98a3 Fix compilation issue, when DTRACE is not defined Not all of them are applicable. --=20 You are receiving this mail because: You are the assignee for the bug.=