From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.linutronix.de (193.142.43.55:993) by crypto-ml.lab.linutronix.de with IMAP4-SSL for ; 26 Feb 2020 07:28:05 -0000 Received: from mail.kernel.org ([198.145.29.99]) by Galois.linutronix.de with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1j6r6x-0002WQ-O4 for speck@linutronix.de; Wed, 26 Feb 2020 08:28:04 +0100 Date: Wed, 26 Feb 2020 08:27:52 +0100 From: Greg KH Subject: [MODERATED] Re: [PATCH v2 2/2] v2: more sampling fun 2 Message-ID: <20200226072752.GA20467@kroah.com> References: <5e5595e6.1c69fb81.69e80.2880SMTPIN_ADDED_BROKEN@mx.google.com> MIME-Version: 1.0 In-Reply-To: <5e5595e6.1c69fb81.69e80.2880SMTPIN_ADDED_BROKEN@mx.google.com> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit To: speck@linutronix.de List-ID: On Thu, Jan 16, 2020 at 02:16:07PM -0800, speck for mark gross wrote: > * exports vulnerability status via sysfs You forgot to document the new sysfs file :(