lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20171030092114.GA26880@jaegeuk-macbookpro.roam.corp.google.com> Date: Mon, 30 Oct 2017 02:21:14 -0700 From: Jaegeuk Kim <jaegeuk@...nel.org> To: Chao Yu <yuchao0@...wei.com> Cc: Chao Yu <chao@...nel.org>, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-f2fs-devel@...ts.sourceforge.net Subject: Re: [f2fs-dev] [PATCH 2/2] f2fs: relax EIO injection for quota file On 10/28, Chao Yu wrote: > Hi Jaegeuk, > > On 2017/10/23 0:51, Jaegeuk Kim wrote: > > On 10/22, Chao Yu wrote: > >> On 2017/10/20 0:56, Jaegeuk Kim wrote: > >>> This case is not happening easily. > >> > >> Actually it can happen, so why not just keep it? > > > > Okay, so let me keep this patch for local stress tests only. > > May I ask which type and rate of fault injection you are using for > test now? I select random value between 3000 and 5000, and 255 for type. Thanks, > > Thanks, > > > > > Thanks, > > > > > >> > >> Thanks, > >> > >>> > >>> Signed-off-by: Jaegeuk Kim <jaegeuk@...nel.org> > >>> --- > >>> fs/f2fs/f2fs.h | 2 +- > >>> 1 file changed, 1 insertion(+), 1 deletion(-) > >>> > >>> diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > >>> index e0ef31cb2cc6..6301ccca8888 100644 > >>> --- a/fs/f2fs/f2fs.h > >>> +++ b/fs/f2fs/f2fs.h > >>> @@ -1544,7 +1544,7 @@ static inline int inc_valid_block_count(struct f2fs_sb_info *sbi, > >>> return ret; > >>> > >>> #ifdef CONFIG_F2FS_FAULT_INJECTION > >>> - if (time_to_inject(sbi, FAULT_BLOCK)) { > >>> + if (!IS_NOQUOTA(inode) && time_to_inject(sbi, FAULT_BLOCK)) { > >>> f2fs_show_injection_info(FAULT_BLOCK); > >>> release = *count; > >>> goto enospc; > >>> > > > > . > >
Powered by blists - more mailing lists