lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 10 Jul 2012 08:38:41 -0400
From:	Kevin McKinney <klmckinney1@...il.com>
To:	Marcos Souza <marcos.souza.org@...il.com>
Cc:	gregkh@...uxfoundation.org, devel@...verdev.osuosl.org,
	linux-kernel@...r.kernel.org, dan.carpenter@...cle.com,
	standby24x7@...il.com, klmckinney1@...il.com
Subject: Re: [PATCH 0/3] staging: bcm: Cleanup bcm driver

On Mon, Jul 09, 2012 at 11:48:09PM -0300, Marcos Souza wrote:
> 2012/7/9 Kevin McKinney <klmckinney1@...il.com>:
> > On Mon, Jul 09, 2012 at 10:32:37PM -0300, Marcos Paulo de Souza wrote:
> >> Hi Kernel guys!
> >>
> >> This new patchset tries to clean a little the bcm driver, removing
> >> some unused macros and some dead code.
> >>
> >> These macros and dead code were reported by the forgotten-macros tool
> >> (https://github.com/marcosps/forgotten_macros).
> >>
> >> The tool is under development, but all the patches looks like OK.
> >>
> >> This patchset is based in staging-next.
> >>
> >> Thanks guys!
> >
> > The patchset looks good!
> 
> Thanks for the answer Kevin!!
> 
> So, do I have your ack?
Yes, I ack.
> 
> 
> 
> -- 
> Att,
> 
> Marcos Paulo de Souza
> Acadêmico de Ciencia da Computação - FURB - SC
> "Uma vida sem desafios é uma vida sem razão"
> "A life without challenges, is a non reason life"
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ