lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <471570CB.3030709@redhat.com>
Date:	Tue, 16 Oct 2007 21:17:47 -0500
From:	Eric Sandeen <sandeen@...hat.com>
To:	linux-ext4@...r.kernel.org
Subject: Re: ext3 warnings from LTP rename14

Eric Sandeen wrote:
> Martin Habets wrote:
>> Hello,
>>
>> I ran the ltp-full-20070930 tests on 2.6.23-rc9-mph4 (sparc32 SMP), and am
>> seeing the following warnings:
> 
> This makes me a little nervous about my change
> ef2b02d3e617cb0400eedf2668f86215e1b0e6af
> (ext34: ensure do_split leaves enough free space in both blocks)
> 
> Do you know when this first showed up?  Could you test -rc6?
> 
> You say you can reproduce it; have you checked (fsck'd) the filesystem
> in between, and is it in good shape?
> 
> -Eric

FWIW, I ran rename14 "standalone" a few times on 2.6.23.1 with no
problems...

[root@...r-05 ltp-full-20070930]#
./testcases/kernel/syscalls/rename/rename14
rename14    1  PASS  :  Test Passed
[root@...r-05 ltp-full-20070930]#
./testcases/kernel/syscalls/rename/rename14
rename14    1  PASS  :  Test Passed
[root@...r-05 ltp-full-20070930]#
./testcases/kernel/syscalls/rename/rename14
rename14    1  PASS  :  Test Passed
[root@...r-05 ~]# uname -a
Linux bear-05.lab.msp.redhat.com 2.6.23.1 #1 SMP Mon Oct 15 15:28:08 CDT
2007 i686 athlon i386 GNU/Linux


-Eric
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ