lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100520182852.58f504fb@mjolnir.ossman.eu>
Date:	Thu, 20 May 2010 18:28:52 +0200
From:	Pierre Ossman <pierre-list@...man.eu>
To:	Tejun Heo <tj@...nel.org>
Cc:	linux-ide@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: Strange read data corruption on ext4/LVM/md

On Thu, 20 May 2010 16:00:49 +0200
Pierre Ossman <pierre-list@...man.eu> wrote:

> On Thu, 20 May 2010 12:22:27 +0200
> Pierre Ossman <pierre-list@...man.eu> wrote:
> 
> > 
> > I've since constructed a script that keeps re-running the above over
> > all relevant disks and keeps track of how many unique md5 values we
> > get. It's been running for about 1.5 hours right now, and here are the
> > results so far:
> > 
> > sdd - 3, sde - 4, sdf - 1, sdb - 1, sdc - 1, 
> > 
> > sdd and sde are both on the same controller, so the problem you
> > mentioned could be relevant.
> > 
> > I'll let the test run for a few more hours and try moving things off
> > that controller later tonight.
> > 
> 
> The trend continues and the numbers are now 9 and 8 for sdd and sde and
> 1 for the others.
> 

Controller now taken out of the picture and I no longer see any errors
on either filesystem nor direct disk level.

I have a sil3132 of a different OEM brand here. I'll try that in that
pci-e slot next.

Rgds
-- 
     -- Pierre Ossman

  WARNING: This correspondence is being monitored by FRA, a
  Swedish intelligence agency. Make sure your server uses
  encryption for SMTP traffic and consider using PGP for
  end-to-end encryption.

Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ