lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 5 Apr 2007 18:45:44 -0400 (EDT)
From:	Justin Piszcz <jpiszcz@...idpixels.com>
To:	linux-kernel@...r.kernel.org,
	Martin Drab <drab@...ler.fjfi.cvut.cz>
cc:	linux-raid@...r.kernel.org, linux-scsi@...r.kernel.org,
	linux-ide@...r.kernel.org
Subject: Re: Any Intel folks on the list? Intel PCI-E bridge ACPI resource
 question

My .config is attached.. I cannot reproduce this problem, it only happened 
once, but I want to find out how to make sure it does not happen again.


On Thu, 5 Apr 2007, Justin Piszcz wrote:

>
>
>>> On Thu, 5 Apr 2007, Justin Piszcz wrote:
>>> 
>>>> http://www.ussg.iu.edu/hypermail/linux/kernel/0701.3/0315.html
>>>> 
>
> Here is the badblocks output:
>
> p34:~# /usr/bin/time badblocks -b 512 -s -v -w /dev/sdl
> Checking for bad blocks in read-write mode
> From block 0 to 293046768
> Testing with pattern 0xaa: done
> Reading and comparing: done
> Testing with pattern 0x55: done
> Reading and comparing: done
> Testing with pattern 0xff: done
> Reading and comparing: done
> Testing with pattern 0x00: done
> Reading and comparing: done
> Pass completed, 0 bad blocks found.
> 1929.06user 467.89system 4:36:23elapsed 14%CPU (0avgtext+0avgdata 
> 0maxresident)k
> 0inputs+0outputs (1major+257minor)pagefaults 0swaps
> p34:~#
>
> Nothing wrong with the drive.  This problem concerns me greatly as I am not 
> sure what I can do to fix this issue, how can I make sure it does not happen 
> again?
>
> Justin.
>
Download attachment "config-2.6.20.4.bz2" of type "APPLICATION/octet-stream" (7508 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ