lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171218172404.3nqyza4ml5oofykn@earth>
Date:   Mon, 18 Dec 2017 18:24:04 +0100
From:   Sebastian Reichel <sre@...nel.org>
To:     SF Markus Elfring <elfring@...rs.sourceforge.net>
Cc:     Julia Lawall <julia.lawall@...6.fr>, linux-pm@...r.kernel.org,
        Joe Perches <joe@...ches.com>,
        LKML <linux-kernel@...r.kernel.org>,
        kernel-janitors@...r.kernel.org
Subject: Re: tps65090-charger: Delete an error message for a failed memory
 allocation in two functions

Hi,

On Sat, Dec 16, 2017 at 09:47:34PM +0100, SF Markus Elfring wrote:
> >> I am still waiting for possibilities to improve also the corresponding
> >> reference documentation somehow as you know it already.
> > 
> > If you require someone else to update the documentation to be able to
> > explain why the patch is useful,
> 
> My approach is to refer to the Linux allocation failure report.
> 
> 
> > then it would seem that you do not know why the patch is useful,
> > and thus should not submit it.
> 
> We tried to clarify other explanation approaches a few times.
> 
> But it seems that we are stuck with specific software aspects.
> How would you like to see remaining open issues to be resolved
> there anyhow?

FYI: I will drop this and (without any further notice) all future
patches from you, that do no follow the documented process in
Documentation/process/.

-- Sebastian

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ