lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 9 Oct 2006 18:50:36 -0400
From:	Dave Jones <davej@...hat.com>
To:	Badari Pulavarty <pbadari@...ibm.com>
Cc:	Eric Sandeen <sandeen@...deen.net>, Andrew Morton <akpm@...l.org>,
	Linux Kernel <linux-kernel@...r.kernel.org>,
	esandeen@...hat.com, Jan Kara <jack@....cz>
Subject: Re: 2.6.18 ext3 panic.

On Mon, Oct 09, 2006 at 02:59:25PM -0700, Badari Pulavarty wrote:

 > journal_dirty_data() would do submit_bh() ONLY if its part of the older
 > transaction.
 > 
 > I need to take a closer look to understand the race.
 > 
 > BTW, is this 1k or 2k filesystem ?

(18:41:11:davej@...k:~)$ sudo tune2fs -l /dev/md0  | grep size
Block size:               1024
Fragment size:            1024
Inode size:               128
(18:41:16:davej@...k:~)$ 

 > How easy is to reproduce the problem ?

I can reproduce it within a few hours of stressing, but only
on that one box.  I've not figured out exactly what's so
special about it yet (though the 1k block thing may be it).
I had been thinking it was a raid0 only thing, as none of
my other boxes have that.

I'm not entirely sure how it got set up that way either.
The Fedora installer being too smart for its own good perhaps.

	Dave

-- 
http://www.codemonkey.org.uk
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ