From owner-freebsd-fs@FreeBSD.ORG Sat Jan 11 01:09:26 2014 Return-Path: Delivered-To: freebsd-fs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 09EC8B5D; Sat, 11 Jan 2014 01:09:26 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id D0E0C117C; Sat, 11 Jan 2014 01:09:25 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s0B19PQJ048492; Sat, 11 Jan 2014 01:09:25 GMT (envelope-from pfg@freefall.freebsd.org) Received: (from pfg@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id s0B19O2u048491; Sat, 11 Jan 2014 01:09:24 GMT (envelope-from pfg) Date: Sat, 11 Jan 2014 01:09:24 GMT Message-Id: <201401110109.s0B19O2u048491@freefall.freebsd.org> To: bjoern@cs.tu-berlin.de, pfg@FreeBSD.org, freebsd-fs@FreeBSD.org From: pfg@FreeBSD.org Subject: Re: kern/104133: [ext2fs] EXT2FS module corrupts EXT2/3 filesystems X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jan 2014 01:09:26 -0000 Synopsis: [ext2fs] EXT2FS module corrupts EXT2/3 filesystems State-Changed-From-To: open->closed State-Changed-By: pfg State-Changed-When: Sat Jan 11 01:05:03 UTC 2014 State-Changed-Why: We have never supported extended attributes in ext2/3. Linux seems to have made changes several times in the support of extended attributes and our current ext2fs implementation has also been improved. This strange problem should not happen in newer FreeBSD (9.2+). http://www.freebsd.org/cgi/query-pr.cgi?pr=104133