| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130312220452.GR21651@dastard> Date: Wed, 13 Mar 2013 09:04:52 +1100 From: Dave Chinner <david@...morbit.com> To: Sander <sander@...ilis.net> Cc: Markus Trippelsdorf <markus@...ppelsdorf.de>, Theodore Ts'o <tytso@....edu>, Dave Jones <davej@...hat.com>, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: torrent hash failures since 3.9.0-rc1 On Tue, Mar 12, 2013 at 09:28:54AM +0100, Sander wrote: > Markus Trippelsdorf wrote (ao): > > On 2013.03.11 at 16:37 -0400, Theodore Ts'o wrote: > > > We actually run fsx in a number of different configruations as part of > > > our regression testing before we send Linus a pull request, and > > > haven't found any issues. So unless it's a hardware problem, it seems > > > unlikely to me that your running fsx would turn up anything. > > > > Yes, I let it run for a while anyway and it didn't report any failure. > > > Please note that my local rtorrent version was configured with > > "--with-posix-fallocate". > > Would it be possible to enhance fsx to detect such an issue? fsx in xfstests already uses fallocate() for preallocation and hole punching, so such problems related to these operations can be found using fsx. The issue here, however, involves memory reclaim interactions and so is not something fsx can reproduce in isolation. :/ Cheers, Dave. -- Dave Chinner david@...morbit.com -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists