lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3d1a84a6d486613555091e95c1537e05be9e18d8.camel@metztli.com>
Date:   Thu, 23 Dec 2021 10:46:47 -0800
From:   Metztli Information Technology <jose.r.r@...ztli.com>
To:     ReiserFS Development List <reiserfs-devel@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Cc:     Edward Shishkin <edward.shishkin@...il.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        debian-devel@...ts.debian.org
Subject: Reiser4 -enabled Debian packaging hack for Linux 5.14.21-1 EOL

Niltze [Hello]-

Attached is a Reiser4 -enabled Debian packaging hack for Linux 5.14.21-
1 EOL: metztli-reiser4-gcc10-debian-packaging-for-5.14.21-1EOL.patch

For a one off, we can fetch the Debian packaging for 5.14.16-1, the
last one that Debian released, as:

git clone --depth 1 -b debian/5.14.16-1 --single-branch
https://anonscm.debian.org/git/kernel/linux.git

Customize your branch:
git switch -c <new-branch-name>

fetch the 5.14.21 EOL kernel source, etc.
wget https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-5.14.21.tar.xz
https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-5.14.21.tar.sign

Verify:
xz -dc linux-5.14.21.tar.xz | gpg --verify  linux-5.14.21.tar.sign -

Make a sym link to feed it to debian:
ln -s linux-5.14.21.tar.xz linux_5.14.21.orig.tar.xz

Change directory:
cd linux

Apply metztli-reiser4-gcc10-debian-packaging-for-5.14.21-1EOL.patch

Debianize your kernel source tree:
debian/rules orig

Apply either of Ed's modified patch for 5.14:
metztli-reiser4-stable-for-5.14.patch.gz
OR
metztli-reiser4-unstable-for-5.14.patch.gz

Of course, we assume -- a priori -- development environment.

Snapshot of the hack in an AMD Ryzen bare metal server:
https://metztli.it/bullseye-reiser5/reiser4-sfrn4-5.14.20-1-amd.png

Hack is currently working in a couple of physical hardware instances
but there are **no implicit nor explicit warranties.**


Best Professional Regards. 

-- 
-- 
Jose R R
http://metztli.it
-----------------------------------------------------------------------
----------------------
Download Metztli Reiser4: Debian Buster w/ Linux 5.13.14 AMD64
-----------------------------------------------------------------------
----------------------
feats ZSTD compression https://sf.net/projects/metztli-reiser4/
-----------------------------------------------------------------------
----------------------
or SFRN 5.1.3, Metztli Reiser5 https://sf.net/projects/debian-reiser4/
-----------------------------------------------------------------------
--------------------
Official current Reiser4 resources: https://reiser4.wiki.kernel.org/


View attachment "metztli-reiser4-gcc10-debian-packaging-for-5.14.21-1EOL.patch" of type "text/x-patch" (15556 bytes)

Download attachment "metztli-reiser4-stable-for-5.14.patch.gz" of type "application/gzip" (623517 bytes)

Download attachment "metztli-reiser4-unstable-for-5.14.patch.gz" of type "application/gzip" (723309 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ