lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A5B64C3.2010102@redhat.com>
Date:	Mon, 13 Jul 2009 11:45:55 -0500
From:	Eric Sandeen <sandeen@...hat.com>
To:	ext4 development <linux-ext4@...r.kernel.org>
Subject: using dm-zero to test large filesystems w/o all those pesky disks

>From Documentation/device-mapper/zero.txt in the kernel:

> To create a sparse device, start by creating a dm-zero device that's the
> desired size of the sparse device. For this example, we'll assume a 10TB
> sparse device.
> 
> TEN_TERABYTES=`expr 10 \* 1024 \* 1024 \* 1024 \* 2`   # 10 TB in sectors
> echo "0 $TEN_TERABYTES zero" | dmsetup create zero1
> 
> Then create a snapshot of the zero device, using any available block-device as
> the COW device. The size of the COW device will determine the amount of real
> space available to the sparse device. For this example, we'll assume /dev/sdb1
> is an available 10GB partition.
> 
> echo "0 $TEN_TERABYTES snapshot /dev/mapper/zero1 /dev/sdb1 p 128" | \
>    dmsetup create sparse1
> 
> This will create a 10TB sparse device called /dev/mapper/sparse1 that has
> 10GB of actual storage space available. If more than 10GB of data is written
> to this device, it will start returning I/O errors.

It should be quite possible to use this sort of thing for large ext4
filesystem testing.

Further tricks could be done to mark certain regions of the filesystem
as full, and then place dm error targets under those regions, so that if
any IO happens in this region it will return an error; this could maybe
help catch wraparounds & overflows...

-Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ