lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20170920150653.09f1a0d7@recife.lan>
Date:   Wed, 20 Sep 2017 15:06:53 -0300
From:   Mauro Carvalho Chehab <mchehab@...pensource.com>
To:     Lubomir Rintel <lkundrak@...sk>
Cc:     linux-media@...r.kernel.org,
        Mauro Carvalho Chehab <mchehab@...nel.org>,
        Hans Verkuil <hans.verkuil@...co.com>,
        linux-kernel@...r.kernel.org
Subject: Re: A patch slipped through the cracks?

Em Wed, 20 Sep 2017 19:17:17 +0200
Lubomir Rintel <lkundrak@...sk> escreveu:

> Hi,
> 
> we're trying to get this reasonably trivial patch [1] applied for more
> than a year and four attempts now. (I'm not including it in this
> message so that this message won't be ignored for the same reason the
> submissions were, whatever they are.)
> 
> [1] https://patchwork.linuxtv.org/patch/40862/
> 
> I have no idea what went wrong. There was a suspicion (somewhat
> confirmed by the initial patch submitter) that spam filtering could
> have dropped the first message. Since then the patch did make it to the
> list numerous times and was picked up by patchwork.
> 
> The patchwork's idea about the patch being "Superseded" is wrong -- I
> have no idea why. But someone *please* look into this and apply the
> patch.

Not sure what happened, but I tagged is as new. I'll take a look
on it later, when I start handling patches for Kernel 4.15.

Regards,
Maur

Thanks,
Mauro

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ