lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 15 Aug 2017 20:44:16 -0500 From: Vijay Chidambaram <vvijay03@...il.com> To: Amir Goldstein <amir73il@...il.com> Cc: Josef Bacik <josef@...icpanda.com>, Ext4 <linux-ext4@...r.kernel.org>, linux-xfs <linux-xfs@...r.kernel.org>, linux-fsdevel <linux-fsdevel@...r.kernel.org>, linux-btrfs@...r.kernel.og, Ashlie Martinez <ashmrtn@...xas.edu> Subject: Re: CrashMonkey: A Framework to Systematically Test File-System Crash Consistency Hi Amir, I neglected to mention this earlier: CrashMonkey does not require recompiling the kernel (it is a stand-alone kernel module), and has been tested with the kernel 4.4. It should work with future kernel versions as long as there are no changes to the bio structure. As it is, I believe CrashMonkey is compatible with the current kernel. It certainly provides functionality beyond log-writes (the ability to replay a subset of writes between FLUSH/FUA), and we intend to add more functionality in the future. Right now, CrashMonkey does not do random sampling among possible crash states -- it will simply test a given number of unique states. Thus, right now I don't think it is very effective in finding crash-consistency bugs. But the entire infrastructure to profile a workload, construct crash states, and test them with fsck is present. I'd be grateful if you could try it and give us feedback on what make testing easier/more useful for you. As I mentioned before, this is a work-in-progress, so we are happy to incorporate feedback. Thanks, Vijay Chidambaram, http://www.cs.utexas.edu/~vijay/ On Tue, Aug 15, 2017 at 3:32 PM, Amir Goldstein <amir73il@...il.com> wrote: > On Tue, Aug 15, 2017 at 8:01 PM, Vijay Chidambaram <vvijay03@...il.com> wrote: >> Hi Josef and Amir, >> > ... >> >> @Amir: Given that Josef's code is already in the kernel, do you think >> changing CrashMonkey code would be useful? We are always happy to >> provide something for upstream, but we want to be sure how much work >> would be involved. >> > > Simply put, people (myself included) are more likely to use CrashMonkey > if it uses upstream kernel and/or if it brings valuable functionality > to filesystem > testing, beyond what log-writes already does - > I am have not studies either tools yet to be able to determine if that > is the case. > > Cheers, > Amir.
Powered by blists - more mailing lists