lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 18 Feb 2022 16:31:55 +0900 From: Shin'ichiro Kawasaki <shinichiro.kawasaki@....com> To: fstests@...r.kernel.org, linux-btrfs@...r.kernel.org Cc: linux-xfs@...r.kernel.org, linux-ext4@...r.kernel.org, Naohiro Aota <naohiro.aota@....com>, Johannes Thumshirn <johannes.thumshirn@....com>, Damien Le Moal <damien.lemoal@...nsource.wdc.com>, Shin'ichiro Kawasaki <shinichiro.kawasaki@....com> Subject: [PATCH v3 5/6] xfs/015: check _scratch_mkfs_sized return code The test cases xfs/015 calls _scratch_mkfs before _scratch_mkfs_sized, and does not check return code of _scratch_mkfs_sized. Even if _scratch_mkfs_sized failed, _scratch_mount after it cannot detect the sized mkfs failure because _scratch_mkfs already created a file system on the device. This results in unexpected test condition. To avoid the unexpected test condition, check return code of _scratch_mkfs_sized. Suggested-by: Naohiro Aota <naohiro.aota@....com> Signed-off-by: Shin'ichiro Kawasaki <shinichiro.kawasaki@....com> Reviewed-by: Darrick J. Wong <djwong@...nel.org> --- tests/xfs/015 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tests/xfs/015 b/tests/xfs/015 index 86fa6336..2bb7b8d5 100755 --- a/tests/xfs/015 +++ b/tests/xfs/015 @@ -43,7 +43,7 @@ _scratch_mount _require_fs_space $SCRATCH_MNT 131072 _scratch_unmount -_scratch_mkfs_sized $((32 * 1024 * 1024)) > $tmp.mkfs.raw +_scratch_mkfs_sized $((32 * 1024 * 1024)) > $tmp.mkfs.raw || _fail "mkfs failed" cat $tmp.mkfs.raw | _filter_mkfs >$seqres.full 2>$tmp.mkfs # get original data blocks number and agcount . $tmp.mkfs -- 2.34.1
Powered by blists - more mailing lists