lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 17 Sep 2014 07:42:54 +1000 From: Dave Chinner <david@...morbit.com> To: Milosz Tanski <milosz@...in.com> Cc: Jeff Moyer <jmoyer@...hat.com>, LKML <linux-kernel@...r.kernel.org>, Christoph Hellwig <hch@...radead.org>, "linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>, linux-aio@...ck.org, Mel Gorman <mgorman@...e.de>, Volker Lendecke <Volker.Lendecke@...net.de>, Tejun Heo <tj@...nel.org> Subject: Re: [PATCH 7/7] check for O_NONBLOCK in all read_iter instances [Please don't top post!] On Tue, Sep 16, 2014 at 03:45:52PM -0400, Milosz Tanski wrote: > On Tue, Sep 16, 2014 at 3:27 PM, Jeff Moyer <jmoyer@...hat.com> wrote: > > Christoph Hellwig <milosz@...in.com> writes: > > > > Hrm, you're not Christoph... > > I am not Christoph, we collaborated and he sent me this patch. You're missing Jeff's point - have a look at the name and email adress the mail appears to be from. It's completely mangled - forged if you will and Linus had a major rant about doing exactly this to patch sereies recently. There is a perfectly acceptible way of crediting who the patch is from correctly without resorting to games like this. Also, this patch doesn't have a description or a valid SOB on it.... Please read Documentation/SubmittingPatches so you get the format of the patches correct for V2. ;) Cheers, Dave. -- Dave Chinner david@...morbit.com -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists