lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPweEDyUJZ8ggm0zhMquKNM6Kd-ejjUXrCMR3TnJngukSHAFkw@mail.gmail.com>
Date:	Mon, 25 Jul 2011 13:15:36 +0100
From:	Luke Kenneth Casson Leighton <luke.leighton@...il.com>
To:	linux-kernel@...r.kernel.org
Subject: corrupted ext4 1000gb filesystem (2.6.32, debian stable)

folks, hi,

i set up a 1000gb RAID1 mirrored filesystem, possibly in a foolish way
(multiple external USB drives) and had not added a fsck check to the
script which dynamically assembles the drives.  naively and yet
happily i followed this advice, here:

http://lists.debian.org/debian-user/2011/06/msg02164.html

the problem was that uh, yeah, the ext4 filesystem _did_ end up
getting massively corrupted, very very quickly (within weeks), and i
don't entirely know how.  at approx 50% filled, i carried out another
copy operation of several tens of thousands of files (backup of a
system with about 10gb usage) and it was these files and directories
that had the worst level of filesystem corruption.

so my question is: has anyone else encountered significant filesystem
corruption of large (1000gb+) ext4 filesystems, with any *recent* 2.6
linux kernels?

tia,

l.

p.s. yes fsck has now been added to the drive assembly script, but i
am not yet filled with confidence that everything will be hunky-dory.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ