lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAP6Zq1ghiUhecvtC7gpKtbP11QTU8Js0wCk_sTFqjUf=d6KK1A@mail.gmail.com>
Date:   Tue, 3 Oct 2023 12:23:46 +0300
From:   Tomer Maimon <tmaimon77@...il.com>
To:     Krzysztof Kozlowski <krzysztof.kozlowski@...aro.org>
Cc:     Greg KH <gregkh@...uxfoundation.org>, peter.chen@...nel.org,
        robh+dt@...nel.org, krzysztof.kozlowski+dt@...aro.org,
        xu.yang_2@....com, peng.fan@....com, avifishman70@...il.com,
        tali.perry1@...il.com, joel@....id.au, venture@...gle.com,
        yuenn@...gle.com, benjaminfair@...gle.com, j.neuschaefer@....net,
        openbmc@...ts.ozlabs.org, linux-usb@...r.kernel.org,
        linux-kernel@...r.kernel.org, devicetree@...r.kernel.org
Subject: Re: [PATCH RESEND v3 0/3] usb: ChipIdea: add Nuvoton NPCM UDC support

Hi Krzysztof,

Appreciate your clarifications

Thanks,

Tomer

On Tue, 3 Oct 2023 at 11:32, Krzysztof Kozlowski
<krzysztof.kozlowski@...aro.org> wrote:
>
> On 03/10/2023 08:56, Tomer Maimon wrote:
> > Hi Greg,
> >
> > Forgot to add in Acked-by: Peter Chen <peter.chen@...nel.org> in V3,
> > Resend the patch set with the Ack.
> >
> > Should I do it differently?
>
> If it is RESEND after some time (min. 2 weeks), then it is fine. If you
> added tags or changed something, make a new version. If you resend for
> any other reason (assuming resend is valid), please mention shortly why
> do you resend (e.g. "My company email servers maybe blocked it, so
> resending without changes").
>
> Best regards,
> Krzysztof
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ