lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5003CB26.9040401@gmail.com> Date: Mon, 16 Jul 2012 16:04:54 +0800 From: Wang Sheng-Hui <shhuiw@...il.com> To: Lukáš Czerner <lczerner@...hat.com> CC: Allison Henderson <achender@...ux.vnet.ibm.com>, Theodore Ts'o <tytso@....edu>, linux-ext4@...r.kernel.org Subject: Re: Question about extents.c/ext4_ext_punch_hole On 2012年07月16日 14:36, Lukáš Czerner wrote: > Indeed we're going to align > the range to the block size, but that's because blocks in this range > are going to be freed. Then, the rest of the range (non block > aligned) is going to be zeroed manually. The reason is that we can > not free those blocks, because it still contains valid data and we > can not just leave it alone, since after the punch hole finishes > we'll have to read zeroes from entire punched region. > Got it. Thanks, Lukas! -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists