lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 29 Dec 2018 13:08:46 +0800
From:   Eryu Guan <guaneryu@...il.com>
To:     Theodore Ts'o <tytso@....edu>
Cc:     Ext4 Developers List <linux-ext4@...r.kernel.org>,
        Liu Bo <obuil.liubo@...il.com>, fstests@...r.kernel.org
Subject: Re: [PATCH] ext4/034: adjust commit which fixes the problem tested
 by ext4/034

On Wed, Dec 26, 2018 at 11:08:05AM -0500, Theodore Ts'o wrote:
> Also add a requirment that fallocate and fiemap is supported.
> (Fallocate isn't the case when we are emulating ext3, for example.)
> 
> Signed-off-by: Theodore Ts'o <tytso@....edu>
> Cc: Liu Bo <obuil.liubo@...il.com>

Patch looks good, but I assume you meant to send it to
fstests@...r.kernel.org not linux-fstests@....edu :)

Thanks,
Eryu

> ---
>  tests/ext4/034 | 4 +++-
>  1 file changed, 3 insertions(+), 1 deletion(-)
> 
> diff --git a/tests/ext4/034 b/tests/ext4/034
> index 5c34d0d9..f9e4bfaf 100755
> --- a/tests/ext4/034
> +++ b/tests/ext4/034
> @@ -8,7 +8,7 @@
>  # "-o dioread_nolock,nodelalloc" is used.
>  #
>  # The bug was fixed by commit
> -# "Ext4: fix ENOSPC when both quota and dioread_nolock are enabled"
> +# "ext4: make sure enough credits are reserved for dioread_nolock writes"
>  #
>  seq=`basename $0`
>  seqres=$RESULT_DIR/$seq
> @@ -41,6 +41,8 @@ _supported_os Linux
>  _require_scratch
>  _require_quota
>  _require_nobody
> +_require_xfs_io_command "falloc"
> +_require_xfs_io_command "fiemap"
>  _require_xfs_io_command "syncfs"
>  
>  echo "Format and mount"
> -- 
> 2.19.1
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ