lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 8 Nov 2006 09:09:21 +1100
From:	NeilBrown <neilb@...e.de>
To:	Andrew Morton <akpm@...l.org>
Cc:	linux-raid@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH 000 of 9] md: udev notification, raid5 read improvements etc


Following are 9 patches for md in 2.6.19-rc4-mm2.
The first two are suitable for 2.6.19.
The third might be.  It seems straight forward, but is awkward to test.
Possibly safest to keep it for .20...
The rest should be held for .20.

4 is a minor tidyup
5 is a resend with a bug fixed.
6-9 are resends with attribution improved.

Thanks,
NeilBrown


 [PATCH 001 of 9] md: Change ONLINE/OFFLINE events to a single CHANGE event
 [PATCH 002 of 9] md: Fix sizing problem with raid5-reshape and CONFIG_LBD=n
 [PATCH 003 of 9] md: Do not freeze md threads for suspend.
 [PATCH 004 of 9] md: Tidy up device-change notification when an md array is stopped
 [PATCH 005 of 9] md: Change lifetime rules for 'md' devices.
 [PATCH 006 of 9] md: Define raid5_mergeable_bvec
 [PATCH 007 of 9] md: Handle bypassing the read cache (assuming nothing fails).
 [PATCH 008 of 9] md: Allow reads that have bypassed the cache to be retried on failure.
 [PATCH 009 of 9] md: Enable bypassing cache for reads.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ