lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <YkwGM9yVb1lZ2HL7@MiWiFi-R3L-srv>
Date:   Tue, 5 Apr 2022 17:04:51 +0800
From:   Baoquan He <bhe@...hat.com>
To:     Andrew Morton <akpm@...ux-foundation.org>
Cc:     willy@...radead.org, linux-kernel@...r.kernel.org,
        kexec@...ts.infradead.org, yangtiezhu@...ngson.cn,
        amit.kachhap@....com, hch@....de, linux-fsdevel@...r.kernel.org,
        viro@...iv.linux.org.uk
Subject: Re: [PATCH v5 0/3] Convert vmcore to use an iov_iter

On 04/04/22 at 02:34pm, Andrew Morton wrote:
> > On Sat,  2 Apr 2022 12:30:05 +0800 Baoquan He <bhe@...hat.com> wrote:
> 
> You were on the patch delivery path, so these patches should have had
> your signoff.  Documentation/process/submitting-patches.rst explains.

OK, will update and repost after our IT replying and fixing the mail issue.

> 
> > Copy the description of v3 cover letter from Willy:
> > ===
> > For some reason several people have been sending bad patches to fix
> > compiler warnings in vmcore recently.  Here's how it should be done.
> > Compile-tested only on x86.  As noted in the first patch, s390 should
> > take this conversion a bit further, but I'm not inclined to do that
> > work myself.
> 
> We should tell the S390 maintainers this!
> 
> Can you please fix the signoff issue, add the S390 team to Cc and resend?

S390 maintainer has already known this. Heiko replied to v1 saying he
will take care of the s390 part, please see his comment from below link.
I will add Heiko in CC when resend.
https://lore.kernel.org/all/YbsGxJRo1153aykr@osiris/T/#u

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ