lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 2 May 2008 18:55:11 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Stephen Rothwell <sfr@...b.auug.org.au>
Cc:	samuel@...tiz.org, netdev@...r.kernel.org, bjorn.helgaas@...com,
	kamalesh@...ux.vnet.ibm.com
Subject: Re: [patch 1/2] smsc-ircc2: wrap PNP probe code in #ifdef
 CONFIG_PNP

On Sat, 3 May 2008 11:46:17 +1000 Stephen Rothwell <sfr@...b.auug.org.au> wrote:

> Hi Andrew,
> 
> On Fri, 2 May 2008 14:38:02 -0700 Andrew Morton <akpm@...ux-foundation.org> wrote:
> >
> > On Fri, 02 May 2008 13:40:23 -0700
> > akpm@...ux-foundation.org wrote:
> > 
> > > From: Bjorn Helgaas <bjorn.helgaas@...com>
> > > 
> > > Wrap PNP probe code in #ifdef CONFIG_PNP.
> > > 
> > > Without this change, we'll have unresolved references to pnp_get_resource()
> > > function when CONFIG_PNP=n.  (This is a new interface that's not in mainline
> > > yet.)
> > 
> > hrm, it turns out that this is already in linux-next, only I'm
> > not sure by what route it got there.
> 
> I put it there directly at the end so that the tee would build for various
> configs.  I have been carrying it for some time.  I am also carrying a
> similar patch for nsc-ircc.  I will remove them when someone puts them
> into some other tree that I am merging.

argh, that's a process problem.

When those patches turn up in linux-next, I will assume that someone merged
them into a git tree and I will drop them.

You now own the sole copy.  If you drop them, they are lost.  If you don't
send them to anyone, you own them forever.

So..  what to do about this?  I think the only solution is for you to go
into akpm mode and start desperately trying to entice someone into merging
the patch.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ