lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 17 Apr 2009 19:51:21 +0100 (BST)
From:	Jeremy Sanders <jss@....cam.ac.uk>
To:	Eric Sandeen <sandeen@...hat.com>
cc:	linux-ext4@...r.kernel.org
Subject: Re: fsck.ext4: Group descriptors look bad... trying backup
 blocks...

On Fri, 17 Apr 2009, Eric Sandeen wrote:

> Jeremy Sanders wrote:
>> Theodore Tso wrote:
>
> ...
>
>>> I see from the dumpe2fs that you sent it had only been in use for a
>>> week.  How were you using the filesystem?  Did you try using the
>>> online resize feature at any time?
>>
>> No. The filesystem was used to store rsync snapshots of other file systems
>> (using the hard link feature). I had only rsynced the initial data and run a
>> couple of rsync backups on to it. The filesystem was created using:
>>
>> mkfs.ext4 -m0 -b 4096 -E stride=8,stripe-width=72  /dev/md0
>
> Can you show us exactly how you're using rsync?  is this with
> rdiff-backup or some similar tool?

No, plain rsync. We have a script which does something like

rsync -raHSx --stats --while-file --numeric-ids  \
--link-dest=/mnt/username/20090418/ host:/data/username/ \ 
/mnt/username/20090419/

for a set of users.

This command copies the files from /data/username on host to 
/mnt/username/20090419, but creates hard links to the previous copy 
(/mnt/username/20090418/) for unchanged files.

It worked fine on ext3, at least for a 2.4TB device.

Jeremy

-- 
Jeremy Sanders <jss@....cam.ac.uk>   http://www-xray.ast.cam.ac.uk/~jss/
X-Ray Group, Institute of Astronomy, University of Cambridge, UK.
Public Key Server PGP Key ID: E1AAE053
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ