lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 21 Nov 2018 16:12:04 +0000
Subject: [Bug 201685] ext4 file system corruption

--- Comment #11 from Theodore Tso ( ---
Thanks Jimmy for your report.  Can you specify what sort of LVM devices are you
using?   Is it just a standard LVM volume (e.g., no LVM raid, no LVM snapshops,
no dm-thin provisioning)?

The reason why I ask is because I've run gce-xfstests on 4.19, 4.19.1, and
4.19.2, and it uses LVM (nothing fancy just standard LVM volumes, although
xfstests will layer some dm-error and dm-thin on top of the LVM volumes for
specific xfstests) on top of virtio-scsi on top of Google Compute Engine's
Persistent Disks, and I'm not noticing any problems.

I just noticed that my .config file for my GCE testing has
CONFIG_SCSI_MQ_DEFAULT set to "no", which means I'm not using the new block-mq
data path.   So perhaps this is a MQ specific bug?   (Checking... hmm, my
laptop running 4.19.0 plus the ext4 commits landing in 4.20-rc2+ is *also*
using CONFIG_SCSI_MQ_DEFAULT=n.)   And Kconfig recommends that SCSI_MQ_DEFAULT
be defaulted to y.

This is why having people include their Kernel configs, and what devices they
use is so important.   The vast amount of time, given the constant testing
which we do in the ext4 layer, more often than not the problem is somewhere
*else* in the storage stack.   There have been bugs which have escaped notice
by our tests, yes.  But it's rare, and it's almost never the case when a large
number of users are reporting the same problem.

You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists