I use a mix of xfs and ext4. I use xfs for / and ext4 for /var. My reason is based on crash recovery experience.
With ext4, crash recovery (power failure) is pretty fast, and complete.
My experience with xfs following a crash (power failure), is that it takes double the time to recover, when compared to ext4. Like the posted results, my own experience with xfs providing faster I/O than ext4 is confirmed.
Since I like fast program loads, I maintain / as xfs based. Reason-- inserts, updates and deletes for / are relatively low in number. If I discover in a future time that the elapsed recovery time for an xfs failure is about the same as it is for ext4, then I will move most of /var to xfs
So, For my next Linux 5 installation, I will do the following:
/boot ext4
/ xfs as / is low volatility
/etc xfs ditto to above
/var xfs with high activity directories installed onto a ext4 partition and links made thereto (/var/log for example).
/home ext4
I did note that an empty xfs partition trivially uses less space than does an empty ext4 partition
Announcement
Collapse
No announcement yet.
Linux 5.0 File-System Benchmarks: Btrfs vs. EXT4 vs. F2FS vs. XFS
Collapse
X
-
Originally posted by Vistaus View Post
Is that safe to apply on SSD's? My SSD is modern (this is a 2018 laptop).
Anyway, on my home laptop I don't have anything critical and I always do backups, so it was never an issue for me for the past 5 years.
Leave a comment:
-
Originally posted by hreindl View Post
and then proud because uptime of 900 days with no kernel and glibc updates ever got loaded :-)
- Likes 1
Leave a comment:
-
Originally posted by hreindl View Post
i hope all the full-disk-encryption guys are properly secure their running services which are much more in danger, but given how many anti-systemd trolls not realizing namespaces and cgroups not available their holy 30 years old initscripts are missing the most likely attack vectors are wide open
But then there are guys that is going completely of rails when it comes to security (and since they do for good reason I don't really blame them), e.g I have a friend that is the CEO of a VPN service where his programmers takes security quite seriously: E.g they all use laptops running Qubes and when they bought them they filled the tip of every screw with translucent nail polish and mixed in glitter which creates a unique pattern with extremely high entropy. Then they took zoomed 4K images of each screw and stores them off site and once in a while they bring back the laptops there and manually confirm that the pattern is identical.
Now that is commitment
- Likes 3
Leave a comment:
-
Originally posted by edgmnt View Post
And what happens when KeePassX fills in a password in Firefox and that gets swapped out to disk? Or if it crashes and ends up in a coredump?
Previously this was "what happens if a thief steals your computer" and now it's "what if mega clever hackers are actively trying to steal that one password that they just hope will be flushed to swap". What will be next, implying that I'm crazy enough to use a laptop?
- Likes 3
Leave a comment:
-
Originally posted by Yalok View PostI wonder what would be the results for ext4 after my usual tuning: noatime,nobarriers,data=writeback.
On the other hand, these optimizations mostly affect write performance, so read performance perhaps will remain the same?
Leave a comment:
-
Originally posted by debianxfce View Post
It is crazy to live in a physically and virtually unsafe place. Developing countries have fixed adsl lines and ip adresses, while modern countries have cheap care free 4G mobile networks. When I was using adsl, I had 100 attackers per day to my router firewall, with 3G/4G mobile networks zero.
- Likes 1
Leave a comment:
-
I wonder what would be the results for ext4 after my usual tuning: noatime,nobarriers,data=writeback.
On the other hand, these optimizations mostly affect write performance, so read performance perhaps will remain the same?
Leave a comment:
Leave a comment: