lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081001204009.GA4259@lst.de>
Date:	Wed, 1 Oct 2008 22:40:09 +0200
From:	Christoph Hellwig <hch@....de>
To:	xfs@....sgi.com, linux-kernel@...r.kernel.org
Subject: XFS status update for September 2008


With Linux 2.6.27 still not released but only making slow progress from
2.6.27-rc5 to 2.6.27-rc8 XFS changes in mainline have been minimal in
September with only about half a dozen bug fixes patches.

In the meantime the generic btree patch set has been committed to the
development tree, but not many other updates yet.  On the user space side
xfsprogs 2.10.1 has been released on September 5th with a number of
important bug fixes.  Following the release of xfsprogs 2.10.1 open season
for development of the user space code has started.  The first full update
of the shared kernel / user space code in libxfs since 2005 has been
committed.  In addition to that the number of headers installed for the
regular devel package has been reduced to the required minimum and support
for checking the source code for endianess errors using sparse has been
added.

The patch sets to unify the XFS and Linux inode structures, and rewrite
various bits of the sync code have seen various iterations on the XFS
list, but haven't been committed yet.   A first set of patches implementing
CRCs for various metadata structures has been posted to the list.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ