lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 31 May 2013 11:14:54 -0400 From: Theodore Ts'o <tytso@....edu> To: Lukas Czerner <lczerner@...hat.com> Cc: linux-mm@...ck.org, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-ext4@...r.kernel.org, akpm@...ux-foundation.org, hughd@...gle.com Subject: Re: [PATCH v4 20/20] ext4: Allow punch hole with bigalloc enabled On Tue, May 14, 2013 at 06:37:34PM +0200, Lukas Czerner wrote: > In commits 5f95d21fb6f2aaa52830e5b7fb405f6c71d3ab85 and > 30bc2ec9598a1b156ad75217f2e7d4560efdeeab we've reworked punch_hole > implementation and there is noting holding us back from using punch hole > on file system with bigalloc feature enabled. > > This has been tested with fsx and xfstests. > > Signed-off-by: Lukas Czerner <lczerner@...hat.com> > Reviewed-by: Jan Kara <jack@...e.cz> This patch is causing a test failure with bigalloc enabled with the xfstests shared/298. Since it's at the end of the invalidate page range tests, I'm going to drop this patch for now. Could you take a look at this? Thanks!! - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists