Re: new feature: client-side, server-side encryption dumptype option
2005-12-11 00:57:27
On Sunday 11 December 2005 00:23, Ian Turner wrote:
>On Saturday 10 December 2005 10:50 pm, Gene Heskett wrote:
>> Go grab a linux kernel src in bz2 format from kernel.org, make
>> yourself about 10 directories to play in, and do a "tar xjf
>> /path/to/.bz2" file in each of them, and then compare trees.
>
>On my system, I extracted the latest Linux kernel 11 times using
> bzip2, and they all came out the same. See the details below. Maybe
> this is a hardware problem on your system? Bad memory could cause
> the behavior you describe.
Humm, all I can say is that its happened on 3 different boxes here,
with 2 different amd cpu's, both of which get a days running of
memtest86 occasionally.
Really, I'd love to pin point this better, but its a lot like watching
paint dry, boreing until it actually does it. gzip doesn't do it,
bzip2 does it just often enough for you to forget, until it happens
again....
>But again, even if there is a problem with bzip2, the solution is to
> fix the bug in bzip2, not to stop using it. If you can find
> circumstances that reproduce it, I will be happy to report this to
> the bzip2 team.
>
>Cheers,
>
>--Ian
>
>Test results follow. Note the --brief option to diff, which asks it
> to only report the existence of differences, rather than the
> details.
>
>$ gpg --keyserver wwwkeys.pgp.net --recv-keys 0x517D0F0E
>[snip]
>$ wget
> http://kernel.org/pub/linux/kernel/v2.6/linux-2.6.14.3.tar.bz2{,.sig
>n} [snip]
>$ gpg --verify linux-2.6.14.3.tar.bz2{.sign,}
>gpg: Signature made Thu 24 Nov 2005 05:53:27 PM EST using DSA key ID
> 517D0F0E gpg: Good signature from "Linux Kernel Archives
> Verification Key <ftpadmin AT kernel DOT org>"
>[snip trustdb message]
>Primary key fingerprint: C75D C40A 11D7 AF88 9981 ED5B C86B A06A
> 517D 0F0E $ for ((i=0; $i<=10; i++)); do mkdir test$i; tar -xjf
> linux-2.6.14.3.tar.bz2 -C test$i; done
>[no output]
>$ for ((i=1; $i<=10; i++)); do diff --brief -r test0 test$i; done
>[no output]
--
Cheers, Gene
People having trouble with vz bouncing email to me should use this
address: <gene.heskett AT verizononline DOT net> which bypasses vz's
stupid bounce rules. I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2005 by Maurice Eugene Heskett, all rights reserved.
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
Re: new feature: client-side, server-side encryption dumptype option, Josef Wolf
- Re: new feature: client-side, server-side encryption dumptype option, Kevin Till
- Re: new feature: client-side, server-side encryption dumptype option, Greg Troxel
- Re: new feature: client-side, server-side encryption dumptype option, Kevin Till
- Re: new feature: client-side, server-side encryption dumptype option, Greg Troxel
- Re: new feature: client-side, server-side encryption dumptype option, Josef Wolf
- Re: new feature: client-side, server-side encryption dumptype option, Greg Troxel
- Re: new feature: client-side, server-side encryption dumptype option, Josef Wolf
|
|
|