lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 13 Feb 2024 09:31:21 +0000
From: <Rengarajan.S@...rochip.com>
To: <jirislaby@...nel.org>, <gregkh@...uxfoundation.org>
CC: <linux-serial@...r.kernel.org>, <UNGLinuxDriver@...rochip.com>,
	<Kumaravel.Thiagarajan@...rochip.com>, <linux-kernel@...r.kernel.org>,
	<Tharunkumar.Pasumarthi@...rochip.com>
Subject: Re: [PATCH v1 tty] 8250: microchip: pci1xxxx: Add Burst mode
 transmission support in uart driver for reading from FIFO

Hi Greg,

Since, Most of the comments were alignment related and no
functionalities were affected, the current patch can be merged in the
next window. Will share another patch with the suggested incremental
changes shortly. Thanks!!

On Fri, 2024-02-09 at 10:20 +0000, Greg KH wrote:
> EXTERNAL EMAIL: Do not click links or open attachments unless you
> know the content is safe
> 
> On Fri, Feb 09, 2024 at 07:38:49AM +0100, Jiri Slaby wrote:
> > On 09. 02. 24, 5:52, Rengarajan.S@...rochip.com wrote:
> > > Hi Jiri Slaby,
> > > 
> > > The patch has been accepted and added in the tty-git tree and
> > > will be
> > > merged during the next merged window. Should the changes be given
> > > as a
> > > seperate incremental patch or should we re-submit this patch
> > > again.
> > 
> > Hi,
> > 
> > as you write, you cannot change the patch as it is already queued.
> > PLease
> > submit changes on top.
> 
> Or, if the original is so bad, we can revert them now and wait for
> new
> ones later, just let me know.
> 
> thanks,
> 
> greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ