lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8298.1239832267@alphaville.usa.hp.com>
Date:	Wed, 15 Apr 2009 17:51:07 -0400
From:	Nick Dokos <nicholas.dokos@...com>
To:	Valerie Aurora Henson <vaurora@...hat.com>
Cc:	Nick Dokos <nicholas.dokos@...com>,
	"Theodore Ts'o" <tytso@....edu>, linux-ext4@...r.kernel.org
Subject: Re: [PATCH 0/5][64-BIT] Miscellaneous e2fsprogs 64-bit patches - description 

Valerie Aurora Henson <vaurora@...hat.com> wrote:

> Thanks for the testing and patches!  I apologize for the delay in
> replying; if it's any consolation, we were all at the Linux file
> systems workshop when you sent this email.
> 
> All the patches look good to me (and I will ACK them individually).  I
> pulled them into my shared-64bit branch at:
> 
> http://git.kernel.org/?p=fs/ext2/val/e2fsprogs.git;a=summary
> 

Val,

Thanks for the feedback (no problem about the delay: I really was not
expecting a response last week).

I should add a caution that these were (mostly) problems that arose in
testing and I tried to fix them (and only them: e.g., in a subsequent
email you found a place where a blk_t should be a blk64_t: there are
probably *many other* such places); in particular, there is no pretense
of a complete and thorough code audit - that still needs to be done and
I'm trying to do it, but I'm not there yet.

Thanks,
Nick

--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ