lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 09 Nov 2009 12:57:49 +0900 From: Tejun Heo <tj@...nel.org> To: "Eric W. Biederman" <ebiederm@...ssion.com> CC: Greg Kroah-Hartman <gregkh@...e.de>, Kay Sievers <kay.sievers@...y.org>, Greg KH <greg@...ah.com>, linux-kernel@...r.kernel.org, Cornelia Huck <cornelia.huck@...ibm.com>, linux-fsdevel@...r.kernel.org, Eric Dumazet <eric.dumazet@...il.com>, Benjamin LaHaise <bcrl@...et.ca>, Serge Hallyn <serue@...ibm.com> Subject: Re: [PATCH 0/15] sysfs lazification final Eric W. Biederman wrote: > The sysfs code updates the vfs caches immediately when the sysfs data > structures change causing a lot of unnecessary complications. The > following patchset untangles that beast. Allowing for simpler > more straight forward code, the removal of a hack from the vfs > to support sysfs, and human comprehensible locking on sysfs. > > Most of these patches have already been reviewed and acked from the > last time I had time to work on sysfs. > > This acks have been folded in and the two small bugs found in the > previous review have been fixed in the trailing patches (they are > minor enough nits that even a bisect that happens to land in the > middle should not see sysfs problems). Thanks a lot for bringing some sanity to sysfs. :-) -- tejun -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists