lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <45d8cfa5eef633532b25c36b0bffa12c@sf-mail.de>
Date:	Tue, 13 Aug 2013 13:57:36 +0200
From:	Rolf Eike Beer <eike-kernel@...tec.de>
To:	Borislav Petkov <bp@...en8.de>
Cc:	Peter Zijlstra <peterz@...radead.org>,
	<linux-kernel@...r.kernel.org>, <dhowells@...hat.com>,
	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
Subject: Re: Hard lockups using 3.10.0

Borislav Petkov wrote:
> On Sun, Aug 11, 2013 at 01:10:11PM +0200, Rolf Eike Beer wrote:
>> The RAM seems fine. It looks like it is the mainboard or a harddisk.
>> The issues have magically disappeared since 3 weeks, but I have not
>> done any suspend2disk since then anymore. Before that I had suspended
>> the machine on the evening and resumed when I came to work. So it's
>> possible that there was some corrupted stuff in the image.
> 
> Hmm, probably...
> 
>> This is the smart output I got of one disk yesterday:
>> 
>> Vendor:               /0:0:0:0
>> Product:
>> User Capacity:        600,332,565,813,390,450 bytes [600 PB]
> 
> Is this for real? 600 PB??
> 
> I wanna hdd like that :-)

We have problems getting such a disk again. Seems all available one 
have disappeared somewhere near Bluffdale.

I'm not sure how good ext4 can handle sector sizes of several hundred 
megabytes, so it may be not that fun ;)

Eike
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ