lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20191029071925.60AABA405B@b06wcsmtp001.portsmouth.uk.ibm.com> Date: Tue, 29 Oct 2019 12:49:24 +0530 From: Ritesh Harjani <riteshh@...ux.ibm.com> To: "Theodore Y. Ts'o" <tytso@....edu>, jack@...e.cz Cc: linux-ext4@...r.kernel.org, linux-fsdevel@...r.kernel.org, mbobrowski@...browski.org Subject: Re: [RFC 0/5] Ext4: Add support for blocksize < pagesize for dioread_nolock Hello Ted, I tried reproducing issue generic/273 & generic/476 on vanilla 5.4-rc4. I could see that both of these could be very well reproduced with same symptoms on vanilla 5.4-rc4 as well with 1K blocksize on x86 (i.e. without this patch series). Although when I tried reproducing generic/273 & generic/476 on ppc64le (64K pagesize & 4K blocksize) both with & without these patches, I could not reproduce this issue on this platform. As of now, I haven't gone deep into analyzing failure for generic/476, but generic/273 seems to be failing with 1K blocksize because of "No space left in device". This is happening, since the free inode count is exhausted (mostly only with 1K blocksize). I will have to look into this on whether it needs any xfstest fixing or if there is something else going on. So it looks like these failed tests does not seem to be because of this patch series. But these are broken in general for at least 1K blocksize. Also as an FYI, it seems generic/388 is also broken for blocksize < pagesize for both platforms. So I will be planning to look into these failures (generic/273 generic/388 generic/476) in parallel. Do you think we can work on these failing tests separately, since it does not look to be failing because of these patches and go ahead in reviewing this current patch series? -ritesh On 10/24/19 4:56 AM, Theodore Y. Ts'o wrote: > Hi Ritesh, > > I haven't had a chance to dig into the test failures yet, but FYI.... > when I ran the auto test group in xfstests, I saw failures for > generic/219, generic 273, and generic/476 --- these errors did not > show up when running using a standard 4k blocksize on x86, and they > also did not show up when running dioread_nolock using a 4k blocksize. > > So I tried running "generic/219 generic/273 generic/476" 30 time > using in a Google Compute Engine VM, using gce-xfstests, and while I > wasn't able to get generic/219 to fail when run in isolation, > generic/273 seems to fail quite reliably, and generic/476 about a > third of the time. > > How much testing have you done with these patches? > > Thanks, > > - Ted > > TESTRUNID: tytso-20191023144956 > KERNEL: kernel 5.4.0-rc3-xfstests-00005-g39b811602906 #1244 SMP Wed Oct 23 11:30:25 EDT 2019 x86_64 > CMDLINE: --update-files -C 30 -c dioread_nolock_1k generic/219 generic/273 generic/476 > CPUS: 2 > MEM: 7680 > > ext4/dioread_nolock_1k: 90 tests, 42 failures, 10434 seconds > Failures: generic/273 generic/273 generic/273 generic/273 > generic/476 generic/273 generic/476 generic/273 generic/273 > generic/273 generic/476 generic/273 generic/476 generic/273 > generic/476 generic/273 generic/476 generic/273 generic/273 > generic/273 generic/273 generic/273 generic/476 generic/273 > generic/273 generic/273 generic/273 generic/476 generic/273 > generic/476 generic/273 generic/476 generic/273 generic/273 > generic/273 generic/273 generic/273 generic/273 generic/273 > generic/476 generic/273 generic/476 > Totals: 90 tests, 0 skipped, 42 failures, 0 errors, 10434s >
Powered by blists - more mailing lists