lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201010260824.05826.thomas@fjellstrom.ca>
Date:	Tue, 26 Oct 2010 08:24:05 -0600
From:	Thomas Fjellstrom <thomas@...llstrom.ca>
To:	Anders Larsen <al@...rsen.net>
Cc:	linux-kernel@...r.kernel.org, xen-users@...ts.xensource.com
Subject: Re: Strange fsck messages showing up in dmesg

On October 26, 2010, Anders Larsen wrote:
> Hi,
> 
> On 2010-10-26 16:05:37, Thomas Fjellstrom wrote:
> > Recently on an Xen based system I've seen some odd messages show up in
> > dmesg.
> > 
> > [3949276.262287] SGI XFS with ACLs, security attributes, realtime, large
> > block/inode numbers, no debug enabled
> > [3949276.263130] SGI XFS Quota Management subsystem
> > [3949276.276566] JFS: nTxBlock = 8192, nTxLock = 65536
> > [3949276.297503] NTFS driver 2.1.29 [Flags: R/W MODULE].
> > [3949276.333813] QNX4 filesystem 0.2.3 registered.
> > [3949276.476177] Btrfs loaded
> > [3949276.867188] EXT3-fs: INFO: recovery required on readonly filesystem.
> 
> etc.
> 
> Looks like fairly normal boot messages after an unclean shutdown (crash).
> 
> BTW: Which kernel version?  Is this the host or a guest?

debian's 2.6.32-5-xen-amd64.

This is the host/Dom0. Thats after about 45 days of uptime. None of those 
devices are set to mount in the host by any conventional means.

> Cheers
> Anders


-- 
Thomas Fjellstrom
thomas@...llstrom.ca
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ