lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 9 May 2017 09:35:21 +0200 From: Richard Weinberger <richard@....at> To: Amir Goldstein <amir73il@...il.com> Cc: Oleksij Rempel <ore@...gutronix.de>, Christoph Hellwig <hch@...radead.org>, Artem Bityutskiy <dedekind1@...il.com>, Adrian Hunter <adrian.hunter@...el.com>, linux-mtd@...ts.infradead.org, linux-kernel <linux-kernel@...r.kernel.org>, linux-fsdevel <linux-fsdevel@...r.kernel.org>, Steffen Trumtrar <s.trumtrar@...gutronix.de> Subject: Re: [PATCH v2 3/3] fs: ubifs: set s_uuid in super block Amir, Am 09.05.2017 um 09:08 schrieb Amir Goldstein: >> Then we can queue this patch for 4.13. >> Please resend and make sure it addresses everything what was also >> suggested for the xfs s_uuid patch. >> > > Just to be clear, the xfs s_uuid patch is just a memcpy, > no different from Oleksij's patch. Wasn't there a huge discussion about LE/BE/uniqueness and more details on UUID that hurt my brain. Thanks, //richard
Powered by blists - more mailing lists