lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20110607124354.06ed074e.taeuber@bbaw.de>
Date:	Tue, 7 Jun 2011 12:43:54 +0200
From:	Lars Täuber <taeuber@...w.de>
To:	linux-kernel@...r.kernel.org
Subject: Re: [PROBLEM] reproduceable storage errors on high IO load

Hi!

Am Mon, 6 Jun 2011 15:56:10 +0200
Lars Täuber <taeuber@...w.de> schrieb:
> I sent an email to the WD support.

WD told me that the firmware versions I use are the newest available for the
models. Here is a list of models in the array:
Model          		Serial #    		Firmware
WDC WD2002FYPS-01U1B1   WD-WCAVY4757773         04.05G05

WDC WD2002FYPS-02W3B0   WD-WCAVY5361793         04.01G01
WDC WD2002FYPS-02W3B0   WD-WCAVY6201161         04.01G01
WDC WD2002FYPS-02W3B0   WD-WCAVY6252449         04.01G01
WDC WD2002FYPS-02W3B0   WD-WCAVY6408178         04.01G01

WDC WD2003FYYS-02W0B0   WD-WMAY01123610         01.01D01
WDC WD2003FYYS-02W0B0   WD-WMAY01800979         01.01D01
WDC WD2003FYYS-02W0B0   WD-WMAY02037927         01.01D01


I think it really is a kernel problem because I had the same problem also
with seagate drives for which also no newer firmware seems to be available.

What can I do to track this down?

Is there someone that can confirm this problem on different hardware? It
really is simple to test if you have six drives and a (relatively fast)
running system.

Thanks
Lars
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ