lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 1 Nov 2007 06:03:00 -0500
From:	"Jose R. Santos" <jrs@...ibm.com>
To:	Coly Li <coyli@...e.de>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: [PATCH 13/13][e2fsprogs] Add m_uninit test case.

On Thu, 01 Nov 2007 17:58:42 +0800
Coly Li <coyli@...e.de> wrote:

> Coly Li wrote:
> > I plan to do some work based on uninit group patch. When I try to patch the patch into kernel, I
>                                                                                    ~~~~~~~~~~~~sorry
> it's typo, I mean into e2fsprogs...
> > find the sequence number of patch is not continuous. Here is what I find for e2fsprogs patch,
> > 
> > [PATCH 00/13]
> > [PATCH 02/13]
> > [PATCH 03/13]
> > [PATCH 04/13]
> > [PATCH 05/13]
> > [PATCH 06/13]
> > [PATCH 07/13]
> > [PATCH 08/13]
> > [PATCH 09/13]
> > [PATCH 10/13]
> > [PATCH 13/13]
> > 
> > I can not find 01, 11 and 12. Do I miss them, or where can I find these 3 patch ?
> > 
> > Thanks.

It seems like a problem on your end since I got the patches from the
mailing list after sending them.  Here are the patches from the
archives.

[PATCH 01/13] http://lists.openwall.net/linux-ext4/2007/10/11/20
[PATCH 11/13] http://lists.openwall.net/linux-ext4/2007/10/11/29
[PATCH 12/13] http://lists.openwall.net/linux-ext4/2007/10/11/33


-JRS
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ