lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 23 Mar 2021 20:12:51 +0100
From:   'Greg KH' <gregkh@...uxfoundation.org>
To:     Don Bollinger <don@...bollingers.org>
Cc:     arndb@...db.de, linux-kernel@...r.kernel.org,
        brandon_chuang@...e-core.com, wally_wang@...ton.com,
        aken_liu@...e-core.com, gulv@...rosoft.com, jolevequ@...rosoft.com,
        xinxliu@...rosoft.com
Subject: Re: [PATCH v2] eeprom/optoe: driver to read/write SFP/QSFP/CMIS
 EEPROMS

On Tue, Mar 23, 2021 at 12:08:32PM -0700, Don Bollinger wrote:
> On Tue, Mar 23, 2021 at 12:00AM -0700, Greg KH wrote:
> > On Tue, Mar 23, 2021 at 11:43:55AM -0700, Don Bollinger wrote:
> > > On Tue, Mar 23, 2021 at 7:12AM-0700, Greg KH wrote:
> > > > On Mon, Feb 15, 2021 at 11:38:21AM -0800, Don Bollinger wrote:
> > > > > optoe is an i2c based driver that supports read/write access to
> > > > > all the pages (tables) of MSA standard SFP and similar devices
> > > > > (conforming to the SFF-8472 spec), MSA standard QSFP and similar
> > > > > devices (conforming to the SFF-8636 spec) and CMIS and similar
> > > > > devices (conforming to the Common Management Interface
> > Specfication).
> > > >
> > >
> > > I promise not to engage in a drawn out email exchange over this, but I
> > > would like to appeal your decision, just once...
> 
> Thanks for your response.  As promised, I'm done.
> 
> Is there a correct protocol for withdrawing a patch, or does it just get
> abandoned?  Still trying to be a good citizen.

Patches just get abandonded, nothing special to do here, we have mailing
lists littered with them :)

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ