lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <c4c17b11-16f4-ef70-5897-02f923907963@gmail.com>
Date:   Tue, 4 Jan 2022 12:55:04 -0600
From:   Bruce Dubbs <bruce.dubbs@...il.com>
To:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Cc:     "Douglas R. Reno" <renodr2002@...il.com>,
        Pierre Labastie <pierre.labastie@...f.fr>
Subject: mdadm regression tests fail

I am trying to document the mdadm-4.2 installation procedures for our book,
https://www.linuxfromscratch.org/blfs/view/svn/postlfs/mdadm.html

For testing, I am doing a simple:

   make
   sudo ./test --keep-going --logdir=test-logs --save-logs

But I get failures for about half the tests.

Digging in a bit I just ran:

  sudo ./test --tests=00raid0 --logdir=test-logs

This is the first test that fails.  With some hacking, it appears that the first 
portion of this test that fails is:

   mdadm -CR $md0 -e0.90 -l0 -n4 $dev0 $dev1 $dev2 $dev3

This resolves to

   mdadm -CR /dev/md0 -e0.90 -l0 -n4 /dev/loop0 /dev/loop1 /dev/loop2 /dev/loop3

There is not a lot of error output in the test, so I manually ran:

   dd if=/dev/zero of=/tmp/mdtest0 count=20000 bs=1K
   losetup /dev/loop0 /tmp/mdtest0

For /dev/loop[0123]

Then I ran

   mdadm -CR /dev/md0 -e0.90 -l0 -n4 /dev/loop0 /dev/loop1 /dev/loop2 /dev/loop3
   mdadm: 0.90 metadata does not support layouts for RAID0

My question is whether the regression tests in the tarball are valid for mdadm-4.2?

   -- Bruce Dubbs
      linuxfromscratch.org

Note: The kernel is version 5.15.12.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ