lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <7C2EEB3C-3007-469A-B3E6-B810AFB6E983@126.com> Date: Fri, 14 Aug 2020 16:38:16 +0800 From: 姜迎 <jiangying8582@....com> To: Christoph Hellwig <hch@...radead.org> Cc: tytso@....edu, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, stable@...r.kernel.org, wanglong19@...tuan.com, heguanjun@...tuan.com, jack@...e.cz Subject: Re: [PATCH v4] ext4: fix direct I/O read error Ok,I will make time to do it. 发自我的iPhone > 在 2020年8月14日,下午4:04,Christoph Hellwig <hch@...radead.org> 写道: > > On Wed, Aug 05, 2020 at 03:40:34PM +0800, Jiang Ying wrote: >> This patch is used to fix ext4 direct I/O read error when >> the read size is not aligned with block size. >> >> Then, I will use a test to explain the error. >> >> (1) Make a file that is not aligned with block size: >> $dd if=/dev/zero of=./test.jar bs=1000 count=3 >> >> (2) I wrote a source file named "direct_io_read_file.c" as following: > > Can you please add your reproducer to xfstests? > > Thanks!
Powered by blists - more mailing lists