lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 14 Dec 2012 18:00:02 +0100
From:	Jennifer Naumann 
	<Jennifer.Naumann@...ormatik.stud.uni-erlangen.de>
To:	gregkh@...uxfoundation.org
CC:	Sebastian Hahn <snsehahn@....cs.fau.de>, dan.carpenter@...cle.com,
	standby24x7@...il.com, Julia.Lawall@...6.fr, jkosina@...e.cz,
	joe@...ches.com, yongjun_wei@...ndmicro.com.cn,
	adam.buchbinder@...il.com, amwang@...hat.com,
	justinmattock@...il.com, wfp5p@...ginia.edu, jim.cromie@...il.com,
	devel@...verdev.osuosl.org, linux-kernel@...r.kernel.org,
	linux-kernel@...informatik.uni-erlangen.de,
	Jennifer.Naumann@...ormatik.stud.uni-erlangen.de
Subject: Re: [PATCH 0/6] staging:rtl8192u: begin cleanup of some checkpatch
 errors

On 12/05/2012 09:40 PM, Sebastian Hahn wrote:
> Jennifer and I have started making the rtl8192u driver conform with the
> CodingStyle rules a little better. We started out with a cleanfile run,
> then did corrections for individual issues, grouped into patches by
> specific issue fixed.

Thanks for the feedback we've received so far, is there anything else we
need to do from here? We've verified the series still applies to the
current staging-next tree and would be happy to further improve the
patches as necessary.

Regards,
Jennifer Naumann
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ