lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20121208163508.4DB5911FC70@bugzilla.kernel.org>
Date:	Sat,  8 Dec 2012 16:35:08 +0000 (UTC)
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 51431] ext4_mb_generate_buddy self ext4 errors

https://bugzilla.kernel.org/show_bug.cgi?id=51431


Eric Sandeen <sandeen@...hat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |sandeen@...hat.com




--- Comment #1 from Eric Sandeen <sandeen@...hat.com>  2012-12-08 16:35:07 ---
The messages you see are telling you about a message which happened int the
past.

ext4 stores errors, and reports them again every 24h, which seems to be a
source of confusion for most people who encounter it.  :(

this:

> initial error at 1354656587

means that it happened at that unix timestamp, i.e. 

# date -u --date="1970-01-01 1354656587 sec GMT"
Tue Dec  4 21:29:47 UTC 2012

Newer e2fsck should clear the message, as of about version 1.41.14 IIRC.  Older
e2fsck does not, and the kernel message will repeat every 24h ad infinitum
until it gets cleared.

-Eric

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ