lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 18 Nov 2021 18:57:43 -0500 From: Gabriel Krisman Bertazi <krisman@...labora.com> To: pvorel@...e.cz, jack@...e.com, amir73il@...il.com, repnop@...gle.com Cc: linux-ext4@...r.kernel.org, kernel@...labora.com, khazhy@...gle.com, ltp@...ts.linux.it, Gabriel Krisman Bertazi <krisman@...labora.com> Subject: [PATCH v4 8/9] syscalls/fanotify22: Test file event with broken inode This test corrupts an inode entry with an invalid mode through debugfs and then tries to access it. This should result in a ext4 error, which we monitor through the fanotify group. In order for this test to succeed, it requires a kernel fix introduced by kernel commit 124e7c61deb2 ("ext4: fix error code saved on super block during file system abort"), which is added to .tags. Reviewed-by: Amir Goldstein <amir73il@...il.com> Signed-off-by: Gabriel Krisman Bertazi <krisman@...labora.com> --- .../kernel/syscalls/fanotify/fanotify22.c | 26 +++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/testcases/kernel/syscalls/fanotify/fanotify22.c b/testcases/kernel/syscalls/fanotify/fanotify22.c index 5d8b4eec74bd..9cd8c8f919b0 100644 --- a/testcases/kernel/syscalls/fanotify/fanotify22.c +++ b/testcases/kernel/syscalls/fanotify/fanotify22.c @@ -34,6 +34,10 @@ #ifdef HAVE_SYS_FANOTIFY_H #include "fanotify.h" +#ifndef EFSCORRUPTED +#define EFSCORRUPTED EUCLEAN /* Filesystem is corrupted */ +#endif + #define BUF_SIZE 256 static char event_buf[BUF_SIZE]; int fd_notify; @@ -59,6 +63,17 @@ static void do_debugfs_request(const char *dev, char *request) SAFE_CMD(cmd, NULL, NULL); } +static void tcase2_trigger_lookup(void) +{ + int ret; + + /* SAFE_OPEN cannot be used here because we expect it to fail. */ + ret = open(MOUNT_PATH"/"BAD_DIR, O_RDONLY, 0); + if (ret != -1 && errno != EUCLEAN) + tst_res(TFAIL, "Unexpected lookup result(%d) of %s (%d!=%d)", + ret, BAD_DIR, errno, EUCLEAN); +} + static struct test_case { char *name; int error; @@ -73,6 +88,13 @@ static struct test_case { .error = ESHUTDOWN, .fid = &null_fid, }, + { + .name = "Lookup of inode with invalid mode", + .trigger_error = &tcase2_trigger_lookup, + .error_count = 1, + .error = EFSCORRUPTED, + .fid = &bad_file_fid, + }, }; int check_error_event_info_fid(struct fanotify_event_info_fid *fid, @@ -251,6 +273,10 @@ static struct tst_test test = { .mntpoint = MOUNT_PATH, .needs_root = 1, .dev_fs_type = "ext4", + .tags = (const struct tst_tag[]) { + {"linux-git", "124e7c61deb2"}, + {} + }, .needs_cmds = (const char *[]) { "debugfs", NULL -- 2.33.0
Powered by blists - more mailing lists