lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 14 Jun 2013 09:02:42 -0700 (PDT)
From:	Sage Weil <sage@...tank.com>
To:	Li Wang <liwang@...ntukylin.com>
cc:	ceph-devel@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/2] Kernel file system client support for punch hole

On Fri, 14 Jun 2013, Li Wang wrote:
> This patch implements punch hole (fallocate) support for Ceph kernel
> file system client.
> We prepared two patches based on different kernel versions, one against
> kernel 3.8-rc3, the other against the latest 3.10-rc5. It is because
> unfortunately, we failed to set up a workable Ceph system with the client
> based on the lastest code from Linux kernel git tree, for the server
> side, we tried both the latest code from Ceph git tree and
> the latest v0.61.3 release. The client will easily hang there without
> any response, unless rebooting the machine.

This is odd; was there anything in dmesg?  We test this nightly (currently 
on 3.10-rc5).

> We managed to set up a Ceph system with the client based on Linux 
> kernel 3.8-rc3 and the server based on Ceph v0.61.3, so the patch 
> against v3.8-rc3 has been under preliminary tests. However, the one 
> against v3.10-rc5 not.

Do they differ substantially?  The one against the latest kernel is what 
we'll ultimately apply and merge.

Comments inline...

Thanks!
sage
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ