lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 9 Oct 2022 13:29:10 +0200 From: Pali Rohár <pali@...nel.org> To: Bjorn Helgaas <helgaas@...nel.org> Cc: Andrew Lunn <andrew@...n.ch>, Bjorn Helgaas <bhelgaas@...gle.com>, Rob Herring <robh+dt@...nel.org>, Marek Behún <marek.behun@....cz>, linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v2] PCI: Assign PCI domain by ida_alloc() On Thursday 18 August 2022 11:52:20 Bjorn Helgaas wrote: > On Thu, Aug 18, 2022 at 06:37:56PM +0200, Pali Rohár wrote: > > On Thursday 18 August 2022 16:59:33 Andrew Lunn wrote: > > > On Thu, Aug 18, 2022 at 03:50:09PM +0200, Pali Rohár wrote: > > > > PING? > > > > > > Pretty much anything sent during the merge window, and just before the > > > merge window gets thrown away. Please rebase onto the current pci tree > > > and repost. > > > > Please write it pretty clear that you are not interested in those > > patches, and not hiding this info behind asking me after month of > > waiting for another work of rebase with sending them at eight o'clock > > during full moon. It is pretty ridiculous how to say "go away". Thanks. > > Nobody is saying "go away". I apologize that I haven't had time to > look at this yet. > > It's still in patchwork [1], and if it still applies cleanly to > v6.0-rc1, you don't need to do anything. If it requires rebasing to > apply cleanly, it will expedite things if you do that. > > Bjorn > > [1] https://patchwork.kernel.org/project/linux-pci/patch/20220714184130.5436-1-pali@kernel.org/ It applies cleanly on v6.0-rc1.
Powered by blists - more mailing lists