lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-102731-13602-taNjppTriJ@https.bugzilla.kernel.org/>
Date:	Mon, 31 Aug 2015 18:03:10 +0000
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 102731] I have a cough.

https://bugzilla.kernel.org/show_bug.cgi?id=102731

--- Comment #8 from Theodore Tso <tytso@....edu> ---
How many guest VM's are you running, and how often does the file system
corruption happens?   It sounds like it's about once every 2-3 weeks?

Would you be willing to experiment running the VM without using the RAID1 so
we're bypassing the MD layer?   One of the common factors between those people
who are reporting this are (a) they are using KVM, and (b) they are using RAID.
  Now, I'm doing all of my testing using KVM, and I've never seen anything like
this.   So I wonder if the operative issue is happening at the MD layer....

You workload is common enough that I would expect that if this was happening
for everyone who was using ext4, I should be getting a lot more bug reports.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ