lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160915110024.GC28767@localhost>
Date:   Thu, 15 Sep 2016 13:00:24 +0200
From:   Johan Hovold <johan@...nel.org>
To:     Aidan Thornton <makosoft@...il.com>
Cc:     Greg KH <gregkh@...uxfoundation.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        linux-usb@...r.kernel.org, Mathieu Othacehe <m.othacehe@...il.com>,
        david.ward@...mit.edu, johan@...nel.org, pberger@...mson.com,
        WCH Tech Group <tech@...chiphead.com>,
        konstantin.shkolnyy@...il.com, greg@...wn.ath.cx
Subject: Re: 转发: [PATCH] usb: serial:
 update CH34x driver in drivers/usb/serial

On Thu, Sep 15, 2016 at 11:19:26AM +0100, Aidan Thornton wrote:
> On Thu, Sep 15, 2016 at 6:56 AM, Greg KH <gregkh@...uxfoundation.org> wrote:
> > On Thu, Sep 15, 2016 at 12:03:48AM +0100, Aidan Thornton wrote:
> >>
> >> It looks like someone by the name of Grigori Goronzy (CCed) had a patch series
> >> or four attempting to do this that just never went anywhere like all the other
> >> attempts. Might be worth someone talking to him or looking at his patches.
> >
> > Do you have a pointer to those patches on the mailing list?  Why were
> > they rejected?
> 
> https://lkml.org/lkml/2016/4/15/849
> Not entirely sure. I think mainly some quibble with an unrelated
> resume issue in the first patch and some objection to RTS/CTS and B0
> handling for it being in separate patches, but but there's 13 patches
> in the series, four revisions of it, and probably other issues waiting
> to be discovered by the next fool who tries to resubmit them.

The patches were going through the normal review process. Anyone with
access to hardware should be able to complete that series in a few
hours. The four revisions had more to do with new versions being posted
quickly (or initially to the serial list) IIRC.

Johan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ