lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 16 Nov 2010 07:50:16 -0500 From: Josef Bacik <josef@...hat.com> To: Avi Kivity <avi@...hat.com> Cc: Josef Bacik <josef@...hat.com>, david@...morbit.com, linux-kernel@...r.kernel.org, linux-btrfs@...r.kernel.org, linux-ext4@...r.kernel.org, linux-fsdevel@...r.kernel.org, xfs@....sgi.com, cmm@...ibm.com, cluster-devel@...hat.com, ocfs2-devel@....oracle.com Subject: Re: [PATCH 4/6] Ext4: fail if we try to use hole punch On Tue, Nov 16, 2010 at 02:25:35PM +0200, Avi Kivity wrote: > On 11/15/2010 07:05 PM, Josef Bacik wrote: >> Ext4 doesn't have the ability to punch holes yet, so make sure we return >> EOPNOTSUPP if we try to use hole punching through fallocate. This support can >> be added later. Thanks, >> > > Instead of teaching filesystems to fail if they don't support the > capability, why don't supporting filesystems say so, allowing the fail > code to be in common code? > There is no simple way to test if a filesystem supports hole punching or not so the check has to be done per fs. Thanks, Josef -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists