lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6bd94bae0902061008n251d6bb9g9b9ec5bc791dc9ae@mail.gmail.com>
Date:	Fri, 6 Feb 2009 19:08:33 +0100
From:	Manfred Wassmann <tux.wassmann@...glemail.com>
To:	linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: Spurious Filesystem corruption with ext3 + large (<400GB) hw RAID 
	partition + SMP

On 2/1/09, Henrique de Moraes Holschuh <hmh@....eng.br> wrote:
[...]
> Search the list archives, there are other problem reports for that
> 3ware card, you probably want to check those.

Thank you very much, I checked these but I could not find much about
filesystem corruption problems. The most similar problem was mentioned
in http://lkml.org/lkml/2008/6/23/230 but was related to xen which
isn't in use here.

Regarding the memory test, memtest86+ ran for almost 70 hours without
detecting any error.

I trying to reproduce the problem using my installation disk and
running stress/dbench but wasn't able to do so. The only reliable way
to reproduce it is to install Ubuntu, which isn't very helpful :-(

As already said I'm no longer using ext3 for the systems in question,
so if switching filesystems really does solve my problem, this will be
my last post in this regard. In any case thanks for your  help.

regards Manfred
-- 
Unix "Birthday" on 2009-02-13 23:31:30 UTC
...it's 1234567890 seconds since the epoch.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ