lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 28 Jan 2010 05:54:46 +0530
From:	Vishal Rao <vishalrao@...il.com>
To:	David Rees <drees76@...il.com>
Cc:	Mark Lord <kernel@...savvy.com>,
	Alan Cox <alan@...rguk.ukuu.org.uk>, jgarzik@...ox.com,
	linux-ide@...r.kernel.org, linux-kernel@...r.kernel.org,
	trivial@...nel.org, stable@...nel.org
Subject: Re: [PATCH] ata: Disable NCQ for Crucial M225 brand SSDs

2010/1/28 David Rees <drees76@...il.com>:
>
> badblocks <name of partition>
>
> See the man page for more details, but that should do a read test -
> may want to boot from a rescue disk or from another disk if possible
> to run the test.

The first "badblocks /dev/sda7" run went ahead with no output.

Now running "badblocks -nv /dev/sda7" on this unmounted 20gb partition
and it's taking a little while for the nondestructive read+write test but
so far again no output indicating errors - will post full output shortly.

---

Yes, I'd come across this one - ran just the plain command first on
hopefully the same disk "areas" which initially had Arch and Fedora
partitions which also exhibited the same problem but I blew them away
and repartitioned/reformatted as ext4 from my ubuntu installation.

I trust (based on the man page) that badblocks re-checks any blocks
marked away by formatting (i didnt select the 'check bad blocks' option
during formatting via gparted) so the problem is not hidden?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ