lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+55aFwRL_ZydndoYaqFZBnRRnt21=+kmP7tBiryfqvfis6hCg@mail.gmail.com>
Date:   Mon, 20 Feb 2017 16:20:58 -0800
From:   Linus Torvalds <torvalds@...ux-foundation.org>
To:     Ingo Molnar <mingo@...nel.org>, Mike Travis <travis@....com>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        "H. Peter Anvin" <hpa@...or.com>,
        Peter Zijlstra <a.p.zijlstra@...llo.nl>,
        Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [GIT PULL] x86/platform changes for v4.11

On Mon, Feb 20, 2017 at 5:17 AM, Ingo Molnar <mingo@...nel.org> wrote:
>
> Mike Travis (2):
>      [...]
>
> travis@....com (8):
>      [...]

Btw, can you be a bit more careful when applying patches to make sure
that the name and email address is actually good?

This seems to be due to some screw-up on Mike's part, since the
original email seems to have this crap in the headers:

    From: "'Mike Travis" <travis@....com>, '@....com

which should never have worked but Mike apparently screwed up some
script, and mail transport generally has a "let any crap through"
tendency, but I would have hoped that people who commit these things
actually react to how bad the end result is.

Mike, please fix whatever braindamage your mail sending model has.

But Ingo and Thomas (I see both of you committing those broken
patches), please also look at what downstream sends you, and catch it
early rather than have crap authorship information.

                    Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ