lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20160802.105901.1278960621806579606.davem@davemloft.net>
Date:	Tue, 02 Aug 2016 10:59:01 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	pavel@....cz
Cc:	ebiederm@...ssion.com, baolex.ni@...el.com, pablo@...filter.org,
	kaber@...sh.net, kadlec@...ckhole.kfki.hu, jmorris@...ei.org,
	yoshfuji@...ux-ipv6.org, m.szyprowski@...sung.com,
	kyungmin.park@...sung.com, k.kozlowski@...sung.com,
	netfilter-devel@...r.kernel.org, coreteam@...filter.org,
	netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
	johunt@...mai.com, vpai@...mai.com, chuansheng.liu@...el.com,
	aryabinin@...tuozzo.com
Subject: Re: [PATCH 1115/1285] Replace numeric parameter like 0444 with
 macro

From: Pavel Machek <pavel@....cz>
Date: Tue, 2 Aug 2016 19:47:33 +0200

> But that does not make me like the series. And yes, hiding backdoor
> in one of those would be way too easy...

This is one of the worst patch series submissions in history.
At vger.kernel.org postmaster I just spent 45 minutes dealing
with the fallout.

1200+ patches all at once, unacceptable.

Every patch having the same Subject line text, unacceptable.

Triggering rate limiting bounces on %50+ of all lkml recipients,
unacceptable.

This is why you don't spam lists with a thousand patches.

If this is going to be properly submitted, it must be done in
reasonable, bite size, pieces of 10 to 15 patches at a time.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ