lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20121026.151055.328093458246032481.davem@davemloft.net>
Date:	Fri, 26 Oct 2012 15:10:55 -0400 (EDT)
From:	David Miller <davem@...emloft.net>
To:	shuah.khan@...com
Cc:	kyungmin.park@...sung.com, arnd@...db.de, m.szyprowski@...sung.com,
	sam@...nborg.org, sparclinux@...r.kernel.org,
	linux-kernel@...r.kernel.org, shuahkhan@...il.com
Subject: Re: [PATCH RFT RESEND linux-next] sparc: dma-mapping: support
 debug_dma_mapping_error

From: David Miller <davem@...emloft.net>
Date: Fri, 26 Oct 2012 15:01:53 -0400 (EDT)

> From: Shuah Khan <shuah.khan@...com>
> Date: Fri, 26 Oct 2012 10:13:09 -0600
> 
>> Add support for debug_dma_mapping_error() call to avoid warning from
>> debug_dma_unmap() interface when it checks for mapping error checked
>> status. Without this patch, device driver failed to check map error
>> warning is generated.
>> 
>> Signed-off-by: Shuah Khan <shuah.khan@...com>
> 
> Why are you resending this?
> 
> When you resend patches, you have to give a reason.  Did the patch
> change?  Are you updating the CC: list of the patch posting? Are
> you correcting something else?

In fact you sent this _3_ times.  Please, don't do this, or at least
explain why you are reposting something each time.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ