On Fri, Nov 2, 2012 at 9:55 AM, Dale <[email protected]> wrote: > Kerin Millar wrote: >> Helmut Jarausch wrote: >>> On 10/24/2012 03:54:39 PM, Nikos Chantziaras wrote: >>>> Kernels 3.4, 3.5, and 3.6 can result in severe data corruption if >>>> you're using the EXT4 filesystem: >>> >>> It looks as if Eric Sandeen has found the culprit and Theodore Ts'o has >>> suggested this patch yesterday >>> https://lkml.org/lkml/2012/10/28/309 >>> >>> Helmut. >>> >> >> Here's the final patch: >> >> https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ffb5387 >> >> >> It turns out to have had nothing to do with nobarrier. >> >> --Kerin >> >> > > > Could you explain a little on who it could have affected? Is it more > serious or less serious than originally thought? This is for those of > us who don't subscribe to the kernel mailing list, which I have read is > hugely active. > > Thanks much.
AFAIK they originally thought it was related to normal reboots after short uptime, which would potentially put all ext4 users at risk who use newer kernels. That is when the news stories came out about the disastrous ext4 bug. As it turns it, it seems to have been related to enabling some combination of experimental, non-default mount options with an unsafe shutdown cherry on top. So the number of people who are using that would be far, far fewer than they originally thought. Still a dangerous bug for those people, of course, but I would guess probably 99+ percent of ext4 users weren't at risk from it. That is my layman's understanding, I probably got it all wrong. Experts, feel free to correct me. :)

