lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 16 Feb 2023 23:51:45 +0900
From:   Taichi Nishimura <awkrail01@...il.com>
To:     rdunlap@...radead.org
Cc:     andrii@...nel.org, ast@...nel.org, awkrail01@...il.com,
        bpf@...r.kernel.org, daniel@...earbox.net, davem@...emloft.net,
        deso@...teo.net, haoluo@...gle.com, hawk@...nel.org,
        iii@...ux.ibm.com, joannelkoong@...il.com,
        john.fastabend@...il.com, jolsa@...nel.org, kpsingh@...nel.org,
        kuba@...nel.org, linux-kernel@...r.kernel.org,
        linux-kselftest@...r.kernel.org, llvm@...ts.linux.dev,
        martin.lau@...ux.dev, memxor@...il.com, mykolal@...com,
        nathan@...nel.org, ndesaulniers@...gle.com, netdev@...r.kernel.org,
        sdf@...gle.com, shuah@...nel.org, song@...nel.org, trix@...hat.com,
        yhs@...com, ytcoode@...il.com, gregkh@...uxfoundation.org
Subject: [Re: PATCH bpf-next] Fix typos in selftest/bpf files

> This text is not needed in the changelog for a patch, please read the
> section entitled "The canonical patch format" in the kernel file,
> Documentation/process/submitting-patches.rst for what is needed in order
> to properly describe the change.

> thanks,

> greg k-h

> Hi,
> The corrections all look good.
> Of course, you need to fix what Greg mentioned, then you can resubmit
> the patch with this added:

> Reviewed-by: Randy Dunlap <rdunlap@...radead.org>

> Thanks.

Thank you for your reviewing and advices.
I am a beginner so they are helpful.

I read the docs and re-sent a patch.
After sending it, I found forgetting to reply to this thread...
Sorry in advance.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ