lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20100311.102646.06576136.davem@davemloft.net> Date: Thu, 11 Mar 2010 10:26:46 -0800 (PST) From: David Miller <davem@...emloft.net> To: grant.likely@...retlab.ca Cc: monstr@...str.eu, gregkh@...e.de, benh@...nel.crashing.org, akpm@...ux-foundation.org, sfr@...b.auug.org.au, jgarzik@...ox.com, ben-linux@...ff.org, dwmw2@...radead.org, jeremy.kerr@...onical.com, James.Bottomley@...e.de, broonie@...nsource.wolfsonmicro.com, microblaze-uclinux@...e.uq.edu.au, linux-kernel@...r.kernel.org, linuxppc-dev@...abs.org, sparclinux@...r.kernel.org, linux-ide@...r.kernel.org, netdev@...r.kernel.org, linux-i2c@...r.kernel.org, devicetree-discuss@...ts.ozlabs.org, linux-scsi@...r.kernel.org, alsa-devel@...a-project.org Subject: Re: [PATCH 00/27] Clean up of_platform drivers Grant you've just posted two enormous patch sets at the SAME EXACT TIME to the SAME AREAS of the kernel. One has 37 patches and this one has 27. Not only are these sets enormous, you haven't specified what in the world they are against. The 37 patch set didn't apply cleanly to Linus tree and once I worked through the rejects as best I could it didn't even compile. How are people supposed to test this stuff? :-/ -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists