-
Notifications
You must be signed in to change notification settings - Fork 5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
F2FS-fs (mmcblk0p3): access invalid blkaddr:259 #2894
Comments
The patch you reference is in 4.19, whilst you're running 4.14. If those upstream have not tagged the fix as required for the stable/LTS branches, then it won't be backported. These are unmodified upstream files, therefore issues really ought to be flagged to the normal kernel mailing lists. |
Same problem here (with different blkaddr) using the kernel of 1.20190215. |
I had a look at the current stable 4.14.106 at kernel.org. The issue is still present here. |
We will consider a back-port of this commit if someone can provide confirmation that it fixes the problem. |
Kernel build and confirmed fully working again! The character devices are fully working and no problems are shown in syslog anymore.
|
Thanks to @f00b4r0 for addressing the reason! I hope this will be part of the next kernel release. |
#2896 is a PR of the back-port to 4.14, which I am prepared to merge, and the 4.14 kernel is a Long Term Stable version, but as far as we are concerned it is End Of Life. Are you sure that upgrading to 4.19 isn't a better option for you? |
First: Thank's a lot for your effort! To your suggestion: |
|
(Chiming in after being AFK). Thanks @Phiber2000 for testing and confirming the patch works. @pelwell quick - hopefully useful - remarks:
As far as I'm concerned it's not installed on any of my raspbian setups, and considering 1) it's old (2014), 2) it's pulling from some "random" git repo without any kind of cryptographic signature check (AFAICT), I consider it a security risk (and I suspect I'm not alone). The tool appears to be operating completely oblivious to the way apt/dpkg manage files and is likely to break kernel package management eventually. My 2c: rpi-update should be obsoleted and kernel/firmware should be provided via standard packages. I don't know if there are/will be distros based on raspbian but that would also likely make that easier... HTH |
Raspberry Pi will not be releasing any more 4.14 kernel builds - it's all 4.19 from here on. |
rpi-update is a Pi supplied tool for grabbing testing version of kernel and firmware. Although we have been using it since the first Pi, we no longer recommend it for general use (well, never have done really), only for those people wanting to get bleeding edge test firmware and kernels for testing reasons. I'm not sure the usual package management system would be suitable for that. |
@JamesH65 thanks for the clarification. Should there ever be a need to do what rpi-update does (testing bleeding edge firmware and kernels) the "debian way", I believe the correct approach would be to use the "experimental" branch, which is designed for exactly that purpose. @pelwell that's ok, but these kernels should be provided via apt, imho. Please don't discount the fact that people who run the (last) "stable" release of raspbian are usually doing so for security and stability reasons. |
I suspect the overhead of maintaining an experimental branch, vs the extremely simple github mechanism we use at the moment would means this is a non-starter. The current system also allows very easy movement between kernel/firmware combinations via git hashes. Does the experimental branch approach provide that? With regard to older kernel security, this is mostly a manpower issue. We always recommend usage of our latest releases to ensure the best security. |
Probably not as easily.
OK, that makes sense. Still, maybe I missed something but I couldn't find direct, obvious recommendation to that end on the websites. I think there's a gap between "we recommend using our latest releases to ensure the best security" and "we don't provide (kernel) security updates on our previous releases": imho the former doesn't imply the latter. Best |
I think, we can close this issue here. I left a hint at https://bugzilla.kernel.org/show_bug.cgi?id=202495 and mentioned one of the devs here last week to get that fixed there too. Let's see, if they move as quick as the devs and maintainers here. |
Hi, is there an ETA on getting this fix into the Stretch repository? Thanks |
Writting a special inode to the F2FS filesystem (via e.g. mknod or copying a device node from /dev) will corrupt the filesystem.
If I read the commit message correctly this bug should already be fixed by dda9f4b, however I am running:
And I've been bitten by this issue. I am unable to remove any of the created special files which appear in
ls
as:dmesg
output is then filled with:To reproduce this issue, create a f2fs filesystem, create special inodes on that filesystem, unmount/remount or reboot and observe corruption.
System
Which model of Raspberry Pi? e.g. Pi3B+, PiZeroW
Reproduced on Pi1 revA, Pi2 and Pi3B+
Which OS and version (
cat /etc/rpi-issue
)?vcgencmd version
)?uname -a
)?Linux rPi2 4.14.98-v7+ #1200 SMP Tue Feb 12 20:27:48 GMT 2019 armv7l GNU/Linux
Hope this helps
The text was updated successfully, but these errors were encountered: