lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 21 Jul 2010 12:21:17 +0300
From:	"Amir G." <amir73il@...rs.sourceforge.net>
To:	Greg Freemyer <greg.freemyer@...il.com>
Cc:	Jan Kara <jack@...e.cz>, Theodore Tso <tytso@....edu>,
	Andreas Dilger <adilger@...ger.ca>,
	Ext4 Developers List <linux-ext4@...r.kernel.org>
Subject: Re: [PATCHES/RFC v1.0.12] e2fsprogs: Next3 patch series

On Wed, Jul 21, 2010 at 12:11 AM, Greg Freemyer <greg.freemyer@...il.com> wrote:
>
> So are you just asking for comments right now, or are you asking that
> the e2fsprogs patches get applied?
>

I am asking that the patches will get applied. comments are always welcome.

I am looking for 2 types of code review:

1. check that the patch looks good in general and doesn't change
behavior when the snapshot feature is disabled.
that kind of review would approve that the patch may be applied to the
master branch.

2. check the behavior of the code when snapshot feature is enabled.
this requires the reviewer to acquire some knowledge about the design
of the snapshot feature.

> Maybe a separate e2fsprogs branch for next3 should be created like
> there was for the 64-bit patches?  (That would be Ted/Jan's call, not
> mine.)
>

That's not my call, but I do not think that would be necessary.
the next3 e2fsprogs patches are really small and are restricted to a
small number of files.
for that reason, it wasn't so hard for me to rebase them from the
maint branch to the master branch (64bit code).
there is some dependency among the patches, but most of them are small
and independent,
so they don't have to be applied all at once. I also verified that
every sub-series of the patches builds with no errors.

To put it in other words, any review, of any type, of any patch, would
be helpful.
Thanks,
Amir.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ