lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 02 Oct 2023 15:22:43 +0000
From:   bugzilla-daemon@...nel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 217965] ext4(?) regression since 6.5.0 on sata hdd

https://bugzilla.kernel.org/show_bug.cgi?id=217965

Theodore Tso (tytso@....edu) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |tytso@....edu

--- Comment #3 from Theodore Tso (tytso@....edu) ---
What sort of information can you give about the ext4 file system where this is
happening?  How much free space is there?   Can you run "df" and "dumpe2fs -h"
on the system so we can see which file system features were enabled?   Also,
can you specify the kind of the block device?

Differential debugging would be useful.  For example, can you try is to copy
the file system image to a hardware, and see if you can reproduce the behavior
using the same kernel build workload?   What if you copy to the file system
image to a USB attached SSD, and see if you can reproduce the behavior?   What
you attach the USB attached SSD, and use a freshly formatted ext4 file system? 
 Does it reproduce then?   If the file system is nearly full, what if you
delete a lot of unused space, to provide a lot more free space, and see if it
reproduces then?

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ