lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Nov 2019 23:56:58 +0530 From: Naresh Kamboju <naresh.kamboju@...aro.org> To: Jan Stancek <jstancek@...hat.com> Cc: Christoph Hellwig <hch@...radead.org>, "Darrick J. Wong" <darrick.wong@...cle.com>, LTP List <ltp@...ts.linux.it>, Linux-Next Mailing List <linux-next@...r.kernel.org>, linux-fsdevel@...r.kernel.org, chrubis <chrubis@...e.cz>, open list <linux-kernel@...r.kernel.org>, Al Viro <viro@...iv.linux.org.uk>, Mark Brown <broonie@...nel.org>, Arnd Bergmann <arnd@...db.de>, lkft-triage@...ts.linaro.org, linux-ext4 <linux-ext4@...r.kernel.org>, "Theodore Ts'o" <tytso@....edu> Subject: Re: LTP: diotest4.c:476: read to read-only space. returns 0: Success On Mon, 11 Nov 2019 at 16:09, Jan Stancek <jstancek@...hat.com> wrote: > > > ----- Original Message ----- > > Is this a new test? > > No, it's not new. > > > If not why was this never reported? Sounds like > > we should add this test case to xfstests. > > I'm guessing not that many users still run 32bit kernels. > Naresh' setup is using ext4, so I assume he noticed only > after recent changes in linux-next wrt. directio and ext4. That's true. Started noticing recently from Linux next-20191107 kernel on i386 and arm32. Steps to reproduce: ./runltp -f dio -d /mounted-ext4-drive - Naresh
Powered by blists - more mailing lists