lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 7 Jun 2011 16:48:35 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Arun Sharma <asharma@...com>
Cc:	Mike Frysinger <vapier.adi@...il.com>,
	linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...e.hu>,
	David Miller <davem@...emloft.net>,
	Eric Dumazet <eric.dumazet@...il.com>
Subject: Re: [PATCH 2/2] atomic: move atomic_add_unless to generic code

On Thu, 02 Jun 2011 10:23:11 -0700
Arun Sharma <asharma@...com> wrote:

> On 6/2/11 7:53 AM, Mike Frysinger wrote:
> 
> >> The idea is to move atomic_add_unless_return() into linux/atomic.h
> >
> > my point is that that patchset doesnt seem to exist yet, and it'd
> > probably make sense to have it ready and part of this series before
> > attempting to push this.
> 
> I posted the patch a couple of days ago:
> 
> 1306889876-5327-1-git-send-email-asharma@...com
> http://thread.gmane.org/gmane.linux.kernel/1148420
> 

This is way too hard.  Please send the *entire* patchset with full
descriptions in the changelogs.  Not referring to kooky MessageID's, no
links to archives which might be removed.  Aim to have a complete,
well-presented patchset which our children can as-easily-as-possible
understand when they read the git commit logs in 2042.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ