lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 02 Dec 2015 10:12:29 -0500
From:	Jeff Moyer <jmoyer@...hat.com>
To:	Dave Chinner <david@...morbit.com>
Cc:	Ross Zwisler <ross.zwisler@...ux.intel.com>, xfs@....sgi.com,
	Brian Foster <bfoster@...hat.com>,
	linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: xfstest failure with xfs, dax and v4.4-rc3

Dave Chinner <david@...morbit.com> writes:

> On Tue, Dec 01, 2015 at 03:43:46PM -0700, Ross Zwisler wrote:
>> I'm seeing a new intermittent xfstests failure with v4.4-rc3 using XFS and
>> DAX.  The test that is failing is generic/083, and it fails about 50% of the
>> time in my setup.  Here's the output:
>> 
>> FSTYP         -- xfs (debug)
>> PLATFORM      -- Linux/x86_64 lorwyn 4.4.0-rc3
>> MKFS_OPTIONS  -- -f -bsize=4096 /dev/pmem0p2
>> MOUNT_OPTIONS -- -o dax -o context=system_u:object_r:nfs_t:s0 /dev/pmem0p2
>> /mnt/xfstests_scratch
>> 
>> generic/083 2s ... 2s
   ^^^^^^^
>> _check_xfs_filesystem: filesystem on /dev/pmem0p2 is inconsistent (r) (see
>> /root/xfstests/results//generic/083.full)
>> Ran: generic/083
>> Failures: generic/083
>> Failed 1 of 1 tests
>
> $ grep 083  tests/xfs/group
> 083 dangerous_fuzzers
> $

That's great, but Ross reported an issues with *generic*/083.  ;-)

/me hands Dave more coffee.

-Jeff
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ