lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <D4RIBTPD0W5Y.198XNBY2OIDGL@matfyz.cz>
Date: Wed, 09 Oct 2024 21:03:29 +0200
From: "Karel Balej" <balejk@...fyz.cz>
To: "Lee Jones" <lee@...nel.org>
Cc: <duje.mihanovic@...le.hr>, <phone-devel@...r.kernel.org>,
        <~postmarketos/upstreaming@...ts.sr.ht>,
        "Alexandre Belloni"
 <alexandre.belloni@...tlin.com>,
        <linux-kernel@...r.kernel.org>, <linux-rtc@...r.kernel.org>
Subject: Re: (subset) [RFC PATCH 1/2] mfd: 88pm886: add the RTC cell and
 relevant definitions

Lee Jones, 2024-10-09T11:06:43+01:00:
> On Fri, 20 Sep 2024 18:12:34 +0200, Karel Balej wrote:
> > RTC lives on the base register page of the chip. Add definitions of the
> > registers needed for a basic set/read time functionality.
> > 
> > 
>
> Applied, thanks!

Thank you, however I'm a little perplexed.

It was my understanding that RFC patches should not be applied without
further agreement, is that not the case? Obviously this patch was very
simple and I used RFC mainly because of the RTC driver itself, but I'm
curious to know for future submissions.

Also, I expected the entire series to go at once through the rtc tree
with your ack as while it is not a strict dependency in terms of
breakage, the first patch seems rather pointless without the follow-up
which could theoretically take a long time to get applied and even some
requested changes could require changes to this patch. Could you please
explain what the policy is on this?

Thank you, kind regards,
K. B.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ