lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ZMBmJ/n1/Q1/86Mx@debian.me>
Date:   Wed, 26 Jul 2023 07:17:43 +0700
From:   Bagas Sanjaya <bagasdotme@...il.com>
To:     Greg KH <gregkh@...uxfoundation.org>, wuyonggang001@...suo.com
Cc:     linux-usb@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] usb: gadget: f_serial: Modify sizeof format and Variable
 type

On Tue, Jul 25, 2023 at 05:34:59PM +0200, Greg KH wrote:
> You are receiving this message because of the following common error(s)
> as indicated below:
> 
> - Your patch is malformed (tabs converted to spaces, linewrapped, etc.)
>   and can not be applied.  Please read the file,
>   Documentation/process/email-clients.rst in order to fix this.

Hi Greg,

208suo.com people still ignore review comments which ask them to change
their tooling. I guess they have issues on their mail infra that ML
traffic doesn't get through their inbox, or they deliberately ignore
the review. The EXACT same situation happened last year with cdjrlc.com
people. In fact, these latter developers now use the same infra and tooling
as 208suo.com (and the former people also sometimes forward patches from
the latter).

Not to mention that they keep doing `checkpatch -f` fixes despite Steven's
warning [1].

Thanks.

[1]: https://lore.kernel.org/all/20230720134501.01f9f1de@gandalf.local.home/

-- 
An old man doll... just what I always wanted! - Clara

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ