lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CACtp79BMK8yEVFar4Sc3iABbatJVDppqMR4w=bRgY50dVmtppA@mail.gmail.com>
Date:   Mon, 18 Nov 2019 00:14:07 +0200
From:   Jesse Grodman <jgrodman@...il.com>
To:     "Theodore Y. Ts'o" <tytso@....edu>
Cc:     linux-ext4@...r.kernel.org
Subject: Re: Suggested change for superblock journal hint

Sorry, and got it. I asked my employer but it can take a while to get
a response, so feel free to make the change yourself if you'd like.
I'd be curious if you think it is a good change.

Best,
Jesse


On Thu, Nov 14, 2019 at 7:27 PM Theodore Y. Ts'o <tytso@....edu> wrote:
>
> On Thu, Nov 14, 2019 at 05:05:06PM +0200, Jesse Grodman wrote:
> > Hi,
> >
> > I encountered the scenario that a full fsck check was being run
> > unnecessarily when the major / minor number of my external journal was
> > being fixed by fsck. This PR changes that so that this change does
> > trigger the full fsck run: github.com/tytso/e2fsprogs/pull/26
>
> Hi Jessie,
>
> It's preferable that patches e2fsprogs be sent to the linux-ext4 list,
> so they can get reviewed by the full ext4 community.  That being said,
> I will accept minor patches sent via a pull request if they full meet
> the requirements for kernel patches:
>
> https://www.kernel.org/doc/html/latest/process/submitting-patches.html
>
> Note in particular the requirements for the Developer's Certification
> of Origin (aka the Signed-off-by tag).  That has specific legal
> meanings (for example, you are certifying that your employer allows
> you to contribute to open source projects, or at least, *this* open
> source project), so please take a close look at that.
>
> Cheers,
>
>                                         - Ted

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ