lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+icZUXfzPsqZt6=o5evcQ2xO9XGKcMVYBO1zco0aEmGn_x0rA@mail.gmail.com>
Date:	Thu, 29 May 2014 19:11:10 +0200
From:	Sedat Dilek <sedat.dilek@...il.com>
To:	David Howells <dhowells@...hat.com>
Cc:	Miklos Szeredi <miklos@...redi.hu>,
	Al Viro <viro@...iv.linux.org.uk>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	linux-fsdevel <linux-fsdevel@...r.kernel.org>,
	LKML <linux-kernel@...r.kernel.org>,
	Christoph Hellwig <hch@...radead.org>,
	Andrew Morton <akpm@...ux-foundation.org>, apw@...onical.com,
	Felix Fietkau <nbd@...nwrt.org>, neilb@...e.de,
	jordipujolp@...il.com, ezk@....cs.sunysb.edu,
	"J. R. Okajima" <hooanon05@...oo.co.jp>, mszeredi@...e.cz
Subject: Re: Unionmount and overlayfs testsuite

On Thu, May 29, 2014 at 6:48 PM, David Howells <dhowells@...hat.com> wrote:
>
> http://git.infradead.org/users/dhowells/unionmount-testsuite.git
>
> Check it out and read the README file as to how to drive it.  Sorry, it's a
> bit crude.  I may rewrite it in python or perl at some point.
>
> Make sure you turn on CONFIG_LOCKDEP before running it - you don't want to
> miss any locking conflicts!
>
> Further tests would be appreciated.  There are no rename tests, for instance.
>


I am testing this with current OverlayFS (here: as module).

# grep LOCKDEP /boot/config-3.15.0-rc7-58.1-iniza-small
CONFIG_LOCKDEP_SUPPORT=y

( My full kernel-config is attached. )

Attached is one patch to fix a hardcoded path to mount binary.

I cannot run the testsuite successfully...

# LC_ALL=C TEST_OVERLAYFS=1 ./run.sh
***
*** ./run.sh open-plain.test
***
TEST100: Open O_RDONLY
 - open_file -r /mnt/a/foo100 -R :xxx:yyy:zzz
./tool_box.inc: line 144: /usr/local/bin/open-file: No such file or directory

[ ./tool_box.inc ]
...
    echo " - open_file" "$@" $add
    if $openfile "$@" $add <--- Line #144
    then
        :
    else
        exit $?
    fi
    check_not_tainted
}

# LC_ALL=C ll /mnt/a/foo100
-rw-r--r-- 1 bin bin 12 May 29 19:06 /mnt/a/foo100

# LC_ALL=C df -h
Filesystem      Size  Used Avail Use% Mounted on
rootfs           17G   13G  3.5G  79% /
udev            1.9G   12K  1.9G   1% /dev
tmpfs           386M  892K  385M   1% /run
/dev/sda2       444G  113G  332G  26% /host
/dev/loop0       17G   13G  3.5G  79% /
none            5.0M     0  5.0M   0% /run/lock
none            1.9G  180K  1.9G   1% /run/shm
lower_layer     1.9G  240K  1.9G   1% /lower
upper_layer     1.9G     0  1.9G   0% /upper
overlayfs       1.9G     0  1.9G   0% /mnt

Not sure what's wrong.

- Sedat -

View attachment "0001-mount_union.sh-Remove-hardcoded-path-to-mount-binary.patch" of type "text/x-diff" (760 bytes)

Download attachment "config-3.15.0-rc7-58.1-iniza-small" of type "application/octet-stream" (119177 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ