lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <c0d08132-c1ac-72a9-9ba3-376add0352c2@gmail.com> Date: Fri, 3 May 2019 09:50:21 -0400 From: Eric Dumazet <eric.dumazet@...il.com> To: Heiko Carstens <heiko.carstens@...ibm.com>, Jiong Wang <jiong.wang@...ronome.com> Cc: alexei.starovoitov@...il.com, daniel@...earbox.net, bpf@...r.kernel.org, netdev@...r.kernel.org, oss-drivers@...ronome.com, Martin Schwidefsky <schwidefsky@...ibm.com> Subject: Re: [PATCH v6 bpf-next 13/17] s390: bpf: eliminate zero extension code-gen On 5/3/19 9:41 AM, Heiko Carstens wrote: > On Fri, May 03, 2019 at 11:42:40AM +0100, Jiong Wang wrote: >> Cc: Martin Schwidefsky <schwidefsky@...ibm.com> >> Cc: Heiko Carstens <heiko.carstens@...ibm.com> >> Signed-off-by: Jiong Wang <jiong.wang@...ronome.com> >> --- >> arch/s390/net/bpf_jit_comp.c | 20 +++++++++++++++++--- >> 1 file changed, 17 insertions(+), 3 deletions(-) > > When sending patches which affect s390, could you please add Martin > and me on cc to _all_ patches? We now received only the cover-letter > plus one patch. It's always hard in such cirumstances to figure out if > the code is doing the right thing. > > One possible way is to use --signed-off-by-cc option in git send-email --[no-]signed-off-by-cc If this is set, add emails found in Signed-off-by: or Cc: lines to the cc list. Default is the value of sendemail.signedoffbycc configuration value; if that is unspecified, default to --signed-off-by-cc.
Powered by blists - more mailing lists