public inbox for linux-ext4@vger.kernel.org
 help / color / mirror / Atom feed
* EXT3 fuzzing
@ 2006-10-27 15:14 Eric Sesterhenn / Snakebyte
  2006-10-27 15:26 ` Eric Sandeen
  0 siblings, 1 reply; 3+ messages in thread
From: Eric Sesterhenn / Snakebyte @ 2006-10-27 15:14 UTC (permalink / raw)
  To: linux-ext4

hi,

after fsfuzz
(http://www.securityfocus.com/archive/1/449568/30/0/threaded) was
released i decided to give it a spin. So far I got two problematic
images:

http://www.cobra-basket.de/ext3_ls_prozzy_hog.img.bz2
	which makes the kernel use as much cpu as it can get

http://www.cobra-basket.de/ext3_memhog.img.bz2
	eats all memory it can get

I enabled jbd debugging for a while, and the traces looked
similar, but made not much sense to me. kmemleak
locked my box, so I was not able to get some debugging
info from there.
To test the images, just mount them, and do an ls
on the image.

Greetings, Eric

-- 
 www.cobra-basket.de -- just my stuff

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2006-10-27 16:44 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-27 15:14 EXT3 fuzzing Eric Sesterhenn / Snakebyte
2006-10-27 15:26 ` Eric Sandeen
2006-10-27 16:44   ` Eric Sandeen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox