lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20210614184403.5e3097ba@coco.lan>
Date:   Mon, 14 Jun 2021 18:44:03 +0200
From:   Mauro Carvalho Chehab <mchehab@...nel.org>
To:     "Fabio M. De Francesco" <fmdefrancesco@...il.com>
Cc:     Sakari Ailus <sakari.ailus@...ux.intel.com>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Dan Carpenter <dan.carpenter@...cle.com>,
        linux-media@...r.kernel.org, linux-staging@...ts.linux.dev,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 0/2] Remove unnecessary tests and cast before
 kfree/kvfree

Em Mon, 14 Jun 2021 18:33:55 +0200
"Fabio M. De Francesco" <fmdefrancesco@...il.com> escreveu:

> Hi All,
> 
> I've seen that some patches of mine, more recent the following ones, have 
> already been applied. In the past I had noticed that the patches are 
> (usually?) placed in a time of submission ordered FIFO, unless they are 
> rejected.
> 
> I'm wondering if I should re-send them or if I am missing some details about 
> the specific workflow of staging/media.

Any patches sent to linux-media@...r.kernel.org are automatically stored
at patchwork:

	https://patchwork.linuxtv.org/project/linux-media/list/

If the patches you sent are there and are marked with "New" state,
there's no need to re-submit. On a quick check, there are 3 media
patches from you there:

	https://patchwork.linuxtv.org/project/linux-media/list/?series=&submitter=8492&state=&q=&archive=&delegate=
	
No need to resubmit those, except if some reviewer asks you to
change your patch(es).

Thanks,
Mauro

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ