lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170810173044.GA16896@localhost.localdomain>
Date:   Thu, 10 Aug 2017 13:30:44 -0400
From:   Eric Whitney <enwlinux@...il.com>
To:     sandeen@...hat.com
Cc:     linux-ext4@...r.kernel.org
Subject: Re: Release of e2fsprogs 1.43.5

* Eric Sandeen <esandeen@...hat.com>:
> On 8/5/17 9:34 AM, Theodore Ts'o wrote:
> > I've released e2fsprogs 1.43.5 in all of the usual places; it's tagged
> > in the git trees on git.kernel.org, github, and sourceforge, and
> > available for download at:
> > 
> > ftp://ftp.kernel.org/pub/linux/kernel/people/tytso/e2fsprogs/v1.43.5
> > 
> > and
> > 
> > http://prdownloads.sourceforge.net/e2fsprogs/e2fsprogs-1.43.5.tar.gz
> > 
> > The release notes for 1.43.5 can be found below.
> 
> I'm getting test failures in rawhide with this, FWIW; on i686
> and arm:
> 
> 336 tests succeeded	3 tests failed
> Tests failed: f_del_dup_quota f_quota f_quota_extent_opt 
> 
> Haven't dug into this yet (failures are on ephemeral build root
> on a build host), but has anyone else seen problems?
> 

Yes - I can reproduce these failures on Debian Jessie on 32 bit x86, as can
Ted.

Reverting "libext2fs: fix compile errors/warnings" (a850bc56e0aa) resolves
the problem for me.  In particular, undoing the format string changes in
scan_dquots_callback() fixes the failures.  I think we need to use %lld as
dqb_curspace and dqb_curinodes are __le64, as addressed in "e2fsck: fix type
mismatches in quota warning message" (f09669fc6889).

Eric

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ