Am 28.01.2017 um 13:37 schrieb Janos Toth F.:
> I usually compile my kernels with CONFIG_X86_RESERVE_LOW=640 and
> CONFIG_X86_CHECK_BIOS_CORRUPTION=N because 640 kilobyte seems like a
> very cheap price to pay in order to avoid worrying about this (and
> skip the associated checking + monitoring).
> 
> Out of curiosity (after reading this email) I set these to 4 and Y (so
> 1 page = 4k reserve and checking turned ON and activated by default)
> on a useless laptop. Right after reboot, the kernel log was full of
> the same kind of Btrfs errors reported in the first email of this
> topic ("bad key order", etc). I could run a scrub with zero errors and
> successfully reboot with a read-write mounted root filesystem with the
> old kernel build (but the kernel log was still full of errors, as your
> might imagine). I tried to run "btrfs check --repair" but it seems to
> be useless in this situation, the filesystem needs to be recreated
> (not too hard in my case when it's still fully readable). Although,
> the kernel log was free of the "Corrupted low memory at" kind of
> messages (even though I let it run for hours).
Thanks for this report about the (even destructive...) test! 
It's astonishing how fast this broke... 
As mentioned in my last mail a few minutes ago, I am now following your example 
and the machine is running with
CONFIG_X86_RESERVE_LOW=640
(but still with checking for the first 64k active). I consider using that for 
all machines I'm administrating,
but it's interesting to see that major distributions targetting desktop use 
stay with 64. 

--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to