lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 11 Jan 2007 16:17:56 -0800
From:	Mingming Cao <cmm@...ibm.com>
To:	ext4 development <linux-ext4@...r.kernel.org>
Subject: Call for Ext4 patches

Hello,

Since ext4 was created at the end of last year, there are many wonderful
ideas and patches proposed to add to ext4, waiting for thorough review,
comment and testing. Some of them were briefly documented at Ext4 wiki
page(http://ext4.wiki.kernel.org/index.php/New_ext4_features).

To spin the wheels faster, at the ext4 interlock call yesterday, it was
agreed to create a home for ext4 candidate patches.  Ted suggested to
host a ext4 git tree somewhere at kernel.org, and probably also put all
patches together in quilt format. This will benefit the developer, the
reviewer and the end users to look at where things are, sort out the
directions, priorities, so we can then work on stabilizing the
code and getting it production-ready.

Instead of looking back to find out what patches have been posted last
year, it seems easier if the patches could be re-post to the mailing
list. It would be great to have a description of what the patches for,
current status, next steps, any dependencies and outstanding issues (if
there is any).

P.S. The feature list documented in the ext4 wiki page by no means to be
complete, very well may have missed some.  Any prototype patches, new
ideas, suggestions and requirements are very welcome and appreciated.

Happy New year!

Cheers,

Mingming

-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ