lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1e04c57094d871869997220fc5539dfe2ffa1884.1643089143.git.riteshh@linux.ibm.com>
Date:   Tue, 25 Jan 2022 11:32:02 +0530
From:   Ritesh Harjani <riteshh@...ux.ibm.com>
To:     fstests <fstests@...r.kernel.org>, linux-ext4@...r.kernel.org
Cc:     Zhang Yi <yi.zhang@...wei.com>, tytso@....edu,
        Jan Kara <jack@...e.cz>, chenlong <chenlongcl.chen@...wei.com>,
        Ritesh Harjani <riteshh@...ux.ibm.com>
Subject: [RFC 1/1] ext4/054: Remove auto and quick group

It seems this test creates a crafted corrupted image by modifying ext4
extent block structure of an inode to test some ext4 extent consistency
fixes done at [1].
This IMO, should not be in auto and quick group, since it could cause BUG_ON()
and happens only with some crafted corrupted image (or with fault injection
testing with errors=continue mount option).

[1]: https://lore.kernel.org/all/20210908120850.4012324-1-yi.zhang@huawei.com/
Signed-off-by: Ritesh Harjani <riteshh@...ux.ibm.com>
---
 tests/ext4/054 | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/ext4/054 b/tests/ext4/054
index 9a11719f..21fa4e0a 100755
--- a/tests/ext4/054
+++ b/tests/ext4/054
@@ -12,7 +12,7 @@
 #    ext4_valid_extent_entries())

 . ./common/preamble
-_begin_fstest auto quick dangerous_fuzzers
+_begin_fstest dangerous_fuzzers

 # Import common functions
 . ./common/filter
--
2.31.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ