lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 24 Jul 2010 23:55:55 -0500
From:	Eric Sandeen <sandeen@...hat.com>
To:	Chris Frost <chris@...stnet.net>
CC:	linux-ext4@...r.kernel.org
Subject: Re: [PATCH] mke2fs.8.in: correct the sign of a block-size constraint.

Chris Frost wrote:
> Small but technical typo correction.
> 
> There may be more preferred mark ups (e.g., no space between the negative
> sign and "block-sized") or expressions (e.g., absolute value instead of
> negation).

wow I didn't even know that behavior existed.

How about "If block-size is preceded by a negative sign ("-"), then mke2fs 
will use heuristics to determine the appropriate block size, with the 
constraint that the block size will be at least block-size bytes."

-Eric

> 
> Signed-off-by: Chris Frost <chris@...stnet.net>
> ---
>  misc/mke2fs.8.in |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
> 
> diff --git a/misc/mke2fs.8.in b/misc/mke2fs.8.in
> index 45a99f8..05cfe17 100644
> --- a/misc/mke2fs.8.in
> +++ b/misc/mke2fs.8.in
> @@ -177,7 +177,7 @@ is negative, then
>  .B mke2fs
>  will use heuristics to determine the
>  appropriate block size, with the constraint that the block size will be
> -at least
> +at least \-
>  .I block-size
>  bytes.  This is useful for certain hardware devices which require that
>  the blocksize be a multiple of 2k.

--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ