Re: Versioning file system

2007-06-17 Thread Dale Amon
On Sat, Jun 16, 2007 at 11:17:58PM +0100, Alan Cox wrote:
> >   (Vax/VMS System Software Handbook)
> >   (TOPS-20 User's Manual)
> 
> Also Files/11

And don't forget the really ground breaking work (for the
time) done by the Xanadu folk.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Versioning file system

2007-06-17 Thread Dale Amon
On Sat, Jun 16, 2007 at 11:17:58PM +0100, Alan Cox wrote:
(Vax/VMS System Software Handbook)
(TOPS-20 User's Manual)
 
 Also Files/11

And don't forget the really ground breaking work (for the
time) done by the Xanadu folk.

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Versioning file system

2007-06-16 Thread Dale Amon
DEC had versioning files systems 30 years ago. Any
patents on their style must certainly have expired
long ago.

Look at RSX-11 and other seventies era operating 
systems.

This is ancient stuff.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Versioning file system

2007-06-16 Thread Dale Amon
DEC had versioning files systems 30 years ago. Any
patents on their style must certainly have expired
long ago.

Look at RSX-11 and other seventies era operating 
systems.

This is ancient stuff.

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-19 Thread Dale Amon
On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
> >The error also happens in 2.6.19, same as in 2.6.18.
> >I extracted this from syslog: 
> >Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
> >ufs_check_page: bad entry
> 
> Is this happened also with this patch:
> http://lkml.org/lkml/diff/2007/2/5/75/1
> ?
> 
> -- 
> /Evgeniy

I tried the patch but it would not apply to 2.6.20.7 and
appeared to already exist in that release as patch was
asking me about reversing the patch. So I just built a
vanilla version:

Linux otv2 2.6.20.7-i686 #1 SMP Tue Apr 17 02:33:19 BST 2007 i686 GNU/Linux

and then tried the mount again:

otv2:/dma/FloppyDisks-3.50# mount -t ufs -o ro,ufstype=nextstep,loop 
NeXT-Diagram1-fd0a.ufs /floppy
otv2:/dma/FloppyDisks-3.50# df
Filesystem   1K-blocks  Used Available Use% Mounted on
/dev/hda2  8649576   5141412   3068788  63% /
tmpfs   128128 0128128   0% /lib/init/rw
udev 1024060 10180   1% /dev
tmpfs   128128 0128128   0% /dev/shm
/dma/FloppyDisks-3.50/NeXT-Diagram1-fd0a.ufs
  1255  118471  95% /media/floppy0
otv2:/dma/FloppyDisks-3.50# ls /floppy
ls: reading directory /floppy: Input/output error

I find in syslog:

Apr 19 17:34:29 localhost kernel: UFS-fs error (device loop0): ufs_check_page: 
bad entry in directory #2: directory entry across blocks - offset=140, 
rec_len=884, name_len=7
Apr 19 17:34:29 localhost kernel: UFS-fs error (device loop0): ufs_readdir: bad 
page in #2

I would be happy to supply you with an image of the NeXT /dev/fd0a
floppy partition if you would like, or even a full image of
the floppy made via the NeXT raw device /dev/rfd0b.





-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-19 Thread Dale Amon
On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
 The error also happens in 2.6.19, same as in 2.6.18.
 I extracted this from syslog: 
 Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
 ufs_check_page: bad entry
 
 Is this happened also with this patch:
 http://lkml.org/lkml/diff/2007/2/5/75/1
 ?
 
 -- 
 /Evgeniy

I tried the patch but it would not apply to 2.6.20.7 and
appeared to already exist in that release as patch was
asking me about reversing the patch. So I just built a
vanilla version:

Linux otv2 2.6.20.7-i686 #1 SMP Tue Apr 17 02:33:19 BST 2007 i686 GNU/Linux

and then tried the mount again:

otv2:/dma/FloppyDisks-3.50# mount -t ufs -o ro,ufstype=nextstep,loop 
NeXT-Diagram1-fd0a.ufs /floppy
otv2:/dma/FloppyDisks-3.50# df
Filesystem   1K-blocks  Used Available Use% Mounted on
/dev/hda2  8649576   5141412   3068788  63% /
tmpfs   128128 0128128   0% /lib/init/rw
udev 1024060 10180   1% /dev
tmpfs   128128 0128128   0% /dev/shm
/dma/FloppyDisks-3.50/NeXT-Diagram1-fd0a.ufs
  1255  118471  95% /media/floppy0
otv2:/dma/FloppyDisks-3.50# ls /floppy
ls: reading directory /floppy: Input/output error

I find in syslog:

Apr 19 17:34:29 localhost kernel: UFS-fs error (device loop0): ufs_check_page: 
bad entry in directory #2: directory entry across blocks - offset=140, 
rec_len=884, name_len=7
Apr 19 17:34:29 localhost kernel: UFS-fs error (device loop0): ufs_readdir: bad 
page in #2

I would be happy to supply you with an image of the NeXT /dev/fd0a
floppy partition if you would like, or even a full image of
the floppy made via the NeXT raw device /dev/rfd0b.





-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-16 Thread Dale Amon
On Mon, Apr 16, 2007 at 05:04:22PM +0100, Dale Amon wrote:
> On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
> > >The error also happens in 2.6.19, same as in 2.6.18.
> > >I extracted this from syslog: 
> > >Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
> > >ufs_check_page: bad entry
> > 
> > Is this happened also with this patch:
> > http://lkml.org/lkml/diff/2007/2/5/75/1
> 
> Thanks. I will try that out tonight GMT. Which kernel
> is that against? Will it work against a 2.6.19 or should
> I get a 2.6.20 and work with that?

Hmmm... looks like that patch is already applied in 
a 2.6.20.7? I will try that.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-16 Thread Dale Amon
On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
> >The error also happens in 2.6.19, same as in 2.6.18.
> >I extracted this from syslog: 
> >Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
> >ufs_check_page: bad entry
> 
> Is this happened also with this patch:
> http://lkml.org/lkml/diff/2007/2/5/75/1

Thanks. I will try that out tonight GMT. Which kernel
is that against? Will it work against a 2.6.19 or should
I get a 2.6.20 and work with that?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-16 Thread Dale Amon
On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
 The error also happens in 2.6.19, same as in 2.6.18.
 I extracted this from syslog: 
 Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
 ufs_check_page: bad entry
 
 Is this happened also with this patch:
 http://lkml.org/lkml/diff/2007/2/5/75/1

Thanks. I will try that out tonight GMT. Which kernel
is that against? Will it work against a 2.6.19 or should
I get a 2.6.20 and work with that?

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-16 Thread Dale Amon
On Mon, Apr 16, 2007 at 05:04:22PM +0100, Dale Amon wrote:
 On Mon, Apr 16, 2007 at 11:32:04AM +0400, Evgeniy Dushistov wrote:
  The error also happens in 2.6.19, same as in 2.6.18.
  I extracted this from syslog: 
  Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0):
  ufs_check_page: bad entry
  
  Is this happened also with this patch:
  http://lkml.org/lkml/diff/2007/2/5/75/1
 
 Thanks. I will try that out tonight GMT. Which kernel
 is that against? Will it work against a 2.6.19 or should
 I get a 2.6.20 and work with that?

Hmmm... looks like that patch is already applied in 
a 2.6.20.7? I will try that.
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-15 Thread Dale Amon
The error also happens in 2.6.19, same as in 2.6.18. I
extracted this from syslog:

Apr 17 00:14:08 kdev kernel: loop: loaded (max 8 devices)
Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0): ufs_check_page: bad 
entry in directory #2: directory entry across blocks - offset=356, rec_len=668, 
name_len=19
Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0): ufs_readdir: bad page 
in #2

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Problem with ufs nextstep in 2.6.18 (debian)

2007-04-15 Thread Dale Amon
The error also happens in 2.6.19, same as in 2.6.18. I
extracted this from syslog:

Apr 17 00:14:08 kdev kernel: loop: loaded (max 8 devices)
Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0): ufs_check_page: bad 
entry in directory #2: directory entry across blocks - offset=356, rec_len=668, 
name_len=19
Apr 17 00:14:15 kdev kernel: UFS-fs error (device loop0): ufs_readdir: bad page 
in #2

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Problem with ufs nextstep in 2.6.18 (debian)

2007-04-14 Thread Dale Amon
I recently noticed that I can no longer read my 
images of NeXTstep floppies on certain machines.
All are running an up to date etch distribution
but the difference between where I can read or not
read seems to be the linux version. On a 2.6.18
machine:

# mount -t ufs -o ro,ufstype=nextstep,loop nextfloppy-fd0a.ufs /floppy
# ls /floppy
ls: reading directory /floppy: Input/output error

On a 2.6.13 machine it still works fine:

# mount -t ufs -o ro,ufstype=nextstep,loop nextfloppy-fd0a.ufs /floppy
# ls /floppy/
private
# ls /floppy/private
Drivers

Have there been any recent changes that would cause a 
breakage in this area?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Problem with ufs nextstep in 2.6.18 (debian)

2007-04-14 Thread Dale Amon
I recently noticed that I can no longer read my 
images of NeXTstep floppies on certain machines.
All are running an up to date etch distribution
but the difference between where I can read or not
read seems to be the linux version. On a 2.6.18
machine:

# mount -t ufs -o ro,ufstype=nextstep,loop nextfloppy-fd0a.ufs /floppy
# ls /floppy
ls: reading directory /floppy: Input/output error

On a 2.6.13 machine it still works fine:

# mount -t ufs -o ro,ufstype=nextstep,loop nextfloppy-fd0a.ufs /floppy
# ls /floppy/
private
# ls /floppy/private
Drivers

Have there been any recent changes that would cause a 
breakage in this area?

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Reiser4. BEST FILESYSTEM EVER.

2007-04-07 Thread Dale Amon
Jan does have a point about bad blocks. A couple years ago
I had a relatively new disk start to go bad on random blocks.
I detected it fairly quickly but did have some data loss.

All the compressed archives which were hit were near
total losses; most other files were at least partially
recoverable.

It is not a matter of your operating system writing
to bad blocks. It is a matter of what happens when the
blocks on which your data sit go bad underneath you.

This issue has also been discussed by people working
with revision control system. If you are archiving
data, how do you know you if your data is still good
unless you actually need it? If you do not know it
is bad, you may well get rid of good copies thinking
you do not need the extras... it does happen.

I would be quite hesitant to go with on disk compression
unless damage was limited to only the bad bits or blocks
and did not propagate through the rest of the file.

Perhaps if everyone used hardware RAID and the RAID
automatically detected a difference due to trashed
data on one disk and flagged the admin with a warning...

BTW: I'm a CMU Alum, so who are you working with Jan?




-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Reiser4. BEST FILESYSTEM EVER.

2007-04-07 Thread Dale Amon
Jan does have a point about bad blocks. A couple years ago
I had a relatively new disk start to go bad on random blocks.
I detected it fairly quickly but did have some data loss.

All the compressed archives which were hit were near
total losses; most other files were at least partially
recoverable.

It is not a matter of your operating system writing
to bad blocks. It is a matter of what happens when the
blocks on which your data sit go bad underneath you.

This issue has also been discussed by people working
with revision control system. If you are archiving
data, how do you know you if your data is still good
unless you actually need it? If you do not know it
is bad, you may well get rid of good copies thinking
you do not need the extras... it does happen.

I would be quite hesitant to go with on disk compression
unless damage was limited to only the bad bits or blocks
and did not propagate through the rest of the file.

Perhaps if everyone used hardware RAID and the RAID
automatically detected a difference due to trashed
data on one disk and flagged the admin with a warning...

BTW: I'm a CMU Alum, so who are you working with Jan?




-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Idea: Encryption plugin architecture for file-systems

2001-04-24 Thread Dale Amon

On Mon, Apr 23, 2001 at 09:54:34PM -0500, David L. Nicol wrote:
> why not port one of the twenty or thirty preexisting tools
> that let you mount a filesystem from an encrypted file instead
> of making a generic layer?  That way you could have inter-os 
> portability.  The steganographic ones make really impressive
> claims.  

I'm doing an 18GB raid file system. The standard loopback is
working fine. What I am unsure of is the bobustness against lost
blocks when running "on the metal" vs interposing another file
system layer.

I suspect the answer is that each block is individually encrypted,
so that the worst case data loss is the same; that an ext2 on
top of an encrypted partition would be no worse off than the 
same file system without the interposed layer. Both would find
a bad block and do their best.

But my knowledge of how the loopbacks are structured is not
good enough for me to say this with confidence. That's why 
I'm asking here: in hopes that someone who really does know
can say something about the worst case data loses.

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Idea: Encryption plugin architecture for file-systems

2001-04-24 Thread Dale Amon

On Mon, Apr 23, 2001 at 09:54:34PM -0500, David L. Nicol wrote:
 why not port one of the twenty or thirty preexisting tools
 that let you mount a filesystem from an encrypted file instead
 of making a generic layer?  That way you could have inter-os 
 portability.  The steganographic ones make really impressive
 claims.  

I'm doing an 18GB raid file system. The standard loopback is
working fine. What I am unsure of is the bobustness against lost
blocks when running on the metal vs interposing another file
system layer.

I suspect the answer is that each block is individually encrypted,
so that the worst case data loss is the same; that an ext2 on
top of an encrypted partition would be no worse off than the 
same file system without the interposed layer. Both would find
a bad block and do their best.

But my knowledge of how the loopbacks are structured is not
good enough for me to say this with confidence. That's why 
I'm asking here: in hopes that someone who really does know
can say something about the worst case data loses.

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Idea: Encryption plugin architecture for file-systems

2001-04-23 Thread Dale Amon

Talk about syncronicity... I had just last week asked
about the pro's and con's on this on the crypto list and
have heard nothing at all back. So I'll drop the body
of that message in here:

--
I've got a crypto loopback running directly on a /dev/md0
partition and then the file system on top of that. I'm
interested in what the feelings of others are on the
trade offs of doing it this way.

Is there something to be gained by adding a file system
layer between the /dev/md0 and the loopback file as far
as error recovery is concerned?

Do I actually gain performance (as I am guessing currently
that I do) by eliminating one layer?

It's just a plaything right now, but I'd be interested
in some feedback on the wisdom of it before I actually
use this on something important. So just to reiterated:

   fs
  fsc. loopback
c. loopback  vsfs
 raid1raid1
disk disk   disk disk

where fs = ext2 until this evening when I replace it
with reiserfs.
--

And update by saying I've got reiserfs working on top
of it with no problems. But I'm still just that wee
bit nervous about the approach even though it works.

What happens if I get one bad disk sector in a partition?
What is the difference in data loss between encrypting
on the bare partition versus having say, a reiserfs
under you?

(Obviously RAID doesn't save you. It will just merrily
reproduce the bad sector on the mirror disk)

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Has the iptables security patch been vetted?

2001-04-23 Thread Dale Amon

I'm sure you've run across this one:

http://netfilter.samba.org/security-fix/

I'd like to know how official this patch is, ie how
well checked out? I'd hardly want to cure one problem
and create another. And I'm uncomfortable with it at
first glance: I'd have to find figure out why it is
returning immediate success at that point, or rather
prove to myself that it is just skipping making the
bad table entries.

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: [OT] Re: Your response is requested

2001-04-23 Thread Dale Amon

On Tue, Apr 17, 2001 at 12:34:36PM -0700, J Sloan wrote:
> [EMAIL PROTECTED] wrote:
> 
> > Dear Friend:
> >
> > YOU CAN make over a half million dollars every 4 to 5 months from
> > your home for a one time investment of only twenty five U.S.
> > Dollars.
> 
> This did not originate from toyota.com - The spammer simply
> used that domain as the "from" hostname. We are careful
> about mail server security here, there is no open relay.
> 

Yeah, I saw it to with *MY* domain on it and near had a fit!

-- 
------
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: [OT] Re: Your response is requested

2001-04-23 Thread Dale Amon

On Tue, Apr 17, 2001 at 12:34:36PM -0700, J Sloan wrote:
 [EMAIL PROTECTED] wrote:
 
  Dear Friend:
 
  YOU CAN make over a half million dollars every 4 to 5 months from
  your home for a one time investment of only twenty five U.S.
  Dollars.
 
 This did not originate from toyota.com - The spammer simply
 used that domain as the from hostname. We are careful
 about mail server security here, there is no open relay.
 

Yeah, I saw it to with *MY* domain on it and near had a fit!

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Idea: Encryption plugin architecture for file-systems

2001-04-23 Thread Dale Amon

Talk about syncronicity... I had just last week asked
about the pro's and con's on this on the crypto list and
have heard nothing at all back. So I'll drop the body
of that message in here:

--
I've got a crypto loopback running directly on a /dev/md0
partition and then the file system on top of that. I'm
interested in what the feelings of others are on the
trade offs of doing it this way.

Is there something to be gained by adding a file system
layer between the /dev/md0 and the loopback file as far
as error recovery is concerned?

Do I actually gain performance (as I am guessing currently
that I do) by eliminating one layer?

It's just a plaything right now, but I'd be interested
in some feedback on the wisdom of it before I actually
use this on something important. So just to reiterated:

   fs
  fsc. loopback
c. loopback  vsfs
 raid1raid1
disk disk   disk disk

where fs = ext2 until this evening when I replace it
with reiserfs.
--

And update by saying I've got reiserfs working on top
of it with no problems. But I'm still just that wee
bit nervous about the approach even though it works.

What happens if I get one bad disk sector in a partition?
What is the difference in data loss between encrypting
on the bare partition versus having say, a reiserfs
under you?

(Obviously RAID doesn't save you. It will just merrily
reproduce the bad sector on the mirror disk)

-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



General interest: lawyers talking about GPL and Linux

2001-03-02 Thread Dale Amon

__
   
"Legal Implications of Open-Source Software"
  University of Illinois Law Review, Forthcoming
  
  BY:  DAVID MCGOWAN
  University of Minnesota Law School

 Contact:  DAVID MCGOWAN
   Email:  Mailto:[EMAIL PROTECTED]
  Postal:  University of Minnesota Law School
   229 19th Avenue South
   Minneapolis, MN 55455  USA
   
ABSTRACT:
 This article examines some legal and economic aspects of
 software produced under licenses that provide for distribution
 of source code and allow downstream users to copy, modify, and
 redistribute code. The article focuses in particular on the
 General Public License (GPL), which grants permission to engage
 in such activities on the condition that downstream users make
 their own works available on the same terms on which they
 received the code. Production under this model is informal
 compared to production in conventional firms. Persons who work
 on projects utilizing these licenses do not receive wages from
 those who initiate or maintain the projects. This model
 therefore poses questions about traditional assumptions of agent
 behavior that characterize the Theory of the Firm literature.
 
 This article first analyzes the agency question and contends  
 that classifying software by license terms provides an
 incomplete understanding of this form of production. The social 
 structures necessary to sustain production vary depending upon   
 the complexity, and therefore cost, of different projects; the 
 market position of different projects is relevant as well.
 Production of simple, low-cost projects may require little if  
 any coordination and therefore little if any hierarchy.
 Production of complex projects, such as the GNU/Linux operating
 system, require coordination and are in fact characterized by
 hierarchy. The article discusses the social factors that have   
 thus far supported these hierarchies. The article also analyzes
 the reciprocal licensing model of the GPL, and discusses various
 issues relevant to its enforceability under existing copyright
 and contract law.
  
---

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



General interest: lawyers talking about GPL and Linux

2001-03-02 Thread Dale Amon

__
   
"Legal Implications of Open-Source Software"
  University of Illinois Law Review, Forthcoming
  
  BY:  DAVID MCGOWAN
  University of Minnesota Law School

 Contact:  DAVID MCGOWAN
   Email:  Mailto:[EMAIL PROTECTED]
  Postal:  University of Minnesota Law School
   229 19th Avenue South
   Minneapolis, MN 55455  USA
   
ABSTRACT:
 This article examines some legal and economic aspects of
 software produced under licenses that provide for distribution
 of source code and allow downstream users to copy, modify, and
 redistribute code. The article focuses in particular on the
 General Public License (GPL), which grants permission to engage
 in such activities on the condition that downstream users make
 their own works available on the same terms on which they
 received the code. Production under this model is informal
 compared to production in conventional firms. Persons who work
 on projects utilizing these licenses do not receive wages from
 those who initiate or maintain the projects. This model
 therefore poses questions about traditional assumptions of agent
 behavior that characterize the Theory of the Firm literature.
 
 This article first analyzes the agency question and contends  
 that classifying software by license terms provides an
 incomplete understanding of this form of production. The social 
 structures necessary to sustain production vary depending upon   
 the complexity, and therefore cost, of different projects; the 
 market position of different projects is relevant as well.
 Production of simple, low-cost projects may require little if  
 any coordination and therefore little if any hierarchy.
 Production of complex projects, such as the GNU/Linux operating
 system, require coordination and are in fact characterized by
 hierarchy. The article discusses the social factors that have   
 thus far supported these hierarchies. The article also analyzes
 the reciprocal licensing model of the GPL, and discusses various
 issues relevant to its enforceability under existing copyright
 and contract law.
  
---

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Crypto patches for losetup

2001-02-15 Thread Dale Amon

I'm trying to update some patches of Harald's to work
with the official 2.4.0 international patches. He had
a very nice unofficial patch set that doesn't use a
table, it just sees what is in /proc/crypto. I fixed
a few bugs and it worked marvelously with unofficial
test9 patches all the way up to t12.

However the official patches have changed the data
structure underlying the "files", ie 
/proc/crypto/cipher/twofish-ecb no longer has int t_id;
it has int t_flags instead. And it isn't just a name
change, it does something entirely different.

Since Harald's code depended on predefined id's in the
international patches, that broke it pretty thoroughly.
I'm looking at them to see if I can excise that dependance
entirely. I think I can, but I'd like someone who I
could chat with about some of the underlying reasons
for certain things being there. Harald is busy with
other things and can't take time off to refresh himself
on the contents of the patch-int's enough to help.

I'm working on some mods now but I can see a couple
ways to go and I'd rather pick the right one first
time.

Please contact me directly, [EMAIL PROTECTED]; since the
LK-digest went away I've been finding I often (mostly?)
miss things in the flood of thousands of itty bitty
messages :-) 

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Crypto patches for losetup

2001-02-15 Thread Dale Amon

I'm trying to update some patches of Harald's to work
with the official 2.4.0 international patches. He had
a very nice unofficial patch set that doesn't use a
table, it just sees what is in /proc/crypto. I fixed
a few bugs and it worked marvelously with unofficial
test9 patches all the way up to t12.

However the official patches have changed the data
structure underlying the "files", ie 
/proc/crypto/cipher/twofish-ecb no longer has int t_id;
it has int t_flags instead. And it isn't just a name
change, it does something entirely different.

Since Harald's code depended on predefined id's in the
international patches, that broke it pretty thoroughly.
I'm looking at them to see if I can excise that dependance
entirely. I think I can, but I'd like someone who I
could chat with about some of the underlying reasons
for certain things being there. Harald is busy with
other things and can't take time off to refresh himself
on the contents of the patch-int's enough to help.

I'm working on some mods now but I can see a couple
ways to go and I'd rather pick the right one first
time.

Please contact me directly, [EMAIL PROTECTED]; since the
LK-digest went away I've been finding I often (mostly?)
miss things in the flood of thousands of itty bitty
messages :-) 

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Secure Linux

2001-01-31 Thread Dale Amon

On Tue, Jan 30, 2001 at 11:55:17AM -0800, David D.W. Downey wrote:
> 
> 
> Hey Dale, got a URL for this? Now *I* am intrigued!
> 
> 
> David D.W. Downey
> RHCE
> 

http://www.nsa.gov/selinux/


-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: Secure Linux

2001-01-31 Thread Dale Amon

On Tue, Jan 30, 2001 at 11:55:17AM -0800, David D.W. Downey wrote:
 
 
 Hey Dale, got a URL for this? Now *I* am intrigued!
 
 
 David D.W. Downey
 RHCE
 

http://www.nsa.gov/selinux/


-- 
--
Use Linux: A computerDale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Secure Linux

2001-01-30 Thread Dale Amon

Has anyone else signed up on the NSA's secure Linux
discussion list? The idea of NSA backing the development
of  a secure GPL'd linux is one I find intriguing. 

However I have only seen one posting. Is there anyone
"real" involved with it?

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Secure Linux

2001-01-30 Thread Dale Amon

Has anyone else signed up on the NSA's secure Linux
discussion list? The idea of NSA backing the development
of  a secure GPL'd linux is one I find intriguing. 

However I have only seen one posting. Is there anyone
"real" involved with it?

-- 
--
Use Linux: A computer    Dale Amon, CEO/MD
is a terrible thing  Village Networking Ltd
to waste.Belfast, Northern Ireland
--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/