lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 16 Mar 2011 18:42:33 +0800
From:	Coly Li <colyli@...il.com>
To:	unlisted-recipients:; (no To-header on input)
CC:	linux-ext4@...r.kernel.org, Robin Dong <sanbai@...bao.com>
Subject: Re: [PATCH] ext4: critical info format fix in __acquire

On 2011年03月16日 17:37, Robin Dong Wrote:
> From: Robin Dong<sanbai@...bao.com>
>
> When we do performence-testing on ext4 filesystem, we observe a warning
[snip]

This bug is found on upstream 2.6.36 kernel. We ran a 2.6.36 kernel on the online system with 8 Ext4 file systems. 2 of 
them are mounted with delayed allocation feature. This warning is only observed on delayed allocation enabled Ext4 file 
systems.

This issue is not easy to reproduce, on two servers with 2.6.36 kenrel + ext4, after running 110+ days, the error starts 
to appear on kernel log. When check the error log, we found the info format should be fixed, that's how this patch comes.

For the bug mentioned in Robin's patch, we will start another thread to discuss.

Thanks.

Coly Li
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ