lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-217965-13602-J5OFfrmSGB@https.bugzilla.kernel.org/>
Date: Fri, 17 Nov 2023 01:40:56 +0000
From: bugzilla-daemon@...nel.org
To: linux-ext4@...r.kernel.org
Subject: [Bug 217965] ext4(?) regression since 6.5.0 on sata hdd

https://bugzilla.kernel.org/show_bug.cgi?id=217965

--- Comment #35 from Eyal Lebedinsky (bugzilla@...l.emu.id.au) ---
$ sudo dnf debuginfo-install kernel
Installing:
 kernel-debuginfo
Installing dependencies:
 kernel-debuginfo-common-x86_64

$ sudo perf probe -a "ext4_mb_find_good_group_avg_frag_lists order"

$ sudo perf probe -a "ext4_mb_find_good_group_avg_frag_lists:18 cr
iter->bb_group"

$ sudo perf record -e probe:ext4_mb_find_good_group_avg_frag_lists -e
probe:ext4_mb_find_good_group_avg_frag_lists_L18 -e
probe:ext4_mb_good_group_L20 -e ext4:ext4_mballoc_alloc -g -p 2789843 sleep 20

$ sudo perf script -i perf.data > perf-probe.log
[ perf record: Woken up 1395 times to write data ]
Warning:
Processed 24640612 events and lost 22 chunks!

Check IO/CPU overload!

[ perf record: Captured and wrote 4725.791 MB perf.data (19187380 samples) ]

$ sudo perf script -i perf.data > perf-probe.log
Warning:
Processed 24640612 events and lost 22 chunks!

Check IO/CPU overload!

$ ls -l perf-probe.log
-rw-r--r-- 1 eyal eyal 39024390135 Nov 17 12:31 perf-probe.log

I am limited to upload much less that this as an attachment.
        File size limit: 5120 KB)

I managed to include only so many likes ftom the head:

$ wc -l perf-probe-head.log
51594 perf-probe-head.log

See attachement https://bugzilla.kernel.org/attachment.cgi?id=305414

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ