lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Y90Ic0F/c32Eay/q@casper.infradead.org> Date: Fri, 3 Feb 2023 13:13:23 +0000 From: Matthew Wilcox <willy@...radead.org> To: Johannes Thumshirn <Johannes.Thumshirn@....com> Cc: "linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>, "linux-afs@...ts.infradead.org" <linux-afs@...ts.infradead.org>, "linux-btrfs@...r.kernel.org" <linux-btrfs@...r.kernel.org>, "linux-ext4@...r.kernel.org" <linux-ext4@...r.kernel.org>, "linux-mm@...ck.org" <linux-mm@...ck.org>, Hugh Dickins <hughd@...gle.com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "fstests@...r.kernel.org" <fstests@...r.kernel.org> Subject: Re: [PATCH 6/5] generic: test ftruncate zeroes bytes after EOF On Fri, Feb 03, 2023 at 11:57:11AM +0000, Johannes Thumshirn wrote: > On 02.02.23 21:45, Matthew Wilcox (Oracle) wrote: > > + fprintf(stderr, "Truncation did not zero new bytes:\n"); > > + for (i = 0; i < 5; i++) > > + fprintf(stderr, "%#x ", buf[i]); > > + fputc('\n', stderr); > > > > [...] > > > + > > +$here/src/truncate-zero $test_file > $seqres.full 2>&1 || > > + _fail "truncate zero failed!" > > + > Is '_fail' really needed here? truncate-zero will spit out an error message > in case the truncation doesn't work. I don't know what I'm doing. I totally cargo-culted 706 to make 707. If someone wants to completely rewrite it, go ahead!
Powered by blists - more mailing lists