lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20130731.120126.2193837817631047825.davem@davemloft.net>
Date:	Wed, 31 Jul 2013 12:01:26 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	benjamin.poirier@...il.com
Cc:	eric.dumazet@...il.com, luis.henriques@...onical.com,
	bhutchings@...arflare.com, nhorman@...driver.com,
	netdev@...r.kernel.org, jcliburn@...il.com
Subject: Re: [net PATCH] atl1c: Fix misuse of netdev_alloc_skb in refilling
 rx ring

From: Benjamin Poirier <benjamin.poirier@...il.com>
Date: Wed, 31 Jul 2013 13:48:54 -0400

> On 2013/07/30 19:11, David Miller wrote:
>> From: Eric Dumazet <eric.dumazet@...il.com>
>> Date: Mon, 29 Jul 2013 10:24:04 -0700
>> 
>> > [PATCH] atl1c: use custom skb allocator
>> > 
> 
> BTW, this didn't end up in git with the intended patch subject. The
> extra text prepended in the email also made it to the log.
> 
> 7b70176 atl1c: Fix misuse of netdev_alloc_skb in refilling rx ring

I know, I realized this when I sent the pull request to Linus.

Eric, your patch submission format is extremely error prone for me
sometime.  When you submit patches in email thread, and do things like
you did here, it causes problems sometimes.

Really just send it in the usual way, with the real Subject line
matching the commit message header line you wish to use etc.

Thanks!
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ