lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 14 Aug 2020 09:04:04 +0100 From: Christoph Hellwig <hch@...radead.org> To: Jiang Ying <jiangying8582@....com> Cc: tytso@....edu, adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, stable@...r.kernel.org, wanglong19@...tuan.com, heguanjun@...tuan.com, jack@...e.cz Subject: Re: [PATCH v4] ext4: fix direct I/O read error On Wed, Aug 05, 2020 at 03:40:34PM +0800, Jiang Ying wrote: > This patch is used to fix ext4 direct I/O read error when > the read size is not aligned with block size. > > Then, I will use a test to explain the error. > > (1) Make a file that is not aligned with block size: > $dd if=/dev/zero of=./test.jar bs=1000 count=3 > > (2) I wrote a source file named "direct_io_read_file.c" as following: Can you please add your reproducer to xfstests? Thanks!
Powered by blists - more mailing lists