lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20231010174731.3a1d454e@kernel.org> Date: Tue, 10 Oct 2023 17:47:31 -0700 From: Jakub Kicinski <kuba@...nel.org> To: Justin Stitt <justinstitt@...gle.com> Cc: Jesse Brandeburg <jesse.brandeburg@...el.com>, Tony Nguyen <anthony.l.nguyen@...el.com>, "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>, intel-wired-lan@...ts.osuosl.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, linux-hardening@...r.kernel.org, Kees Cook <keescook@...omium.org> Subject: Re: [PATCH] igbvf: replace deprecated strncpy with strscpy On Tue, 10 Oct 2023 14:41:10 -0700 Justin Stitt wrote: > > Thanks Justin for these patches, please make sure you mark the subject > > line as per the netdev rules: > > [PATCH net-next v1] etc etc > > Sure, I'll resend! Please do read the netdev rules Jesse pointed you at. Maybe it's the combined flow of strncpy and __counted_by patches but managing the state of the "hardening" patches is getting a bit tedious :( Please group them into reasonable series. Do not repost withing 24h. Do not have more than 15 patches for networking pending at any given time. That's basically the gist of our "good citizen" rules.
Powered by blists - more mailing lists