lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <0c0b0fade091a701624379d91813cfb9f30a5111.camel@redhat.com> Date: Thu, 05 Oct 2023 09:37:21 +0200 From: Paolo Abeni <pabeni@...hat.com> To: Linus Walleij <linus.walleij@...aro.org>, patchwork-bot+netdevbpf@...nel.org Cc: khalasa@...p.pl, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net-next] net: ixp4xx_eth: Specify min/max MTU On Tue, 2023-10-03 at 23:54 +0200, Linus Walleij wrote: > On Tue, Oct 3, 2023 at 11:40 AM <patchwork-bot+netdevbpf@...nel.org> wrote: > > > This patch was applied to netdev/net-next.git (main) > > by Paolo Abeni <pabeni@...hat.com>: > > Sorry Paolo, this is the latest version of this patch, which sadly changed > Subject in the process: > https://lore.kernel.org/netdev/20230928-ixp4xx-eth-mtu-v3-1-cb18eaa0edb9@linaro.org/ Ouch, my bad :( The change of subject baffled both me and patchwork. As I process the backlog fifo, and was unable to reach the most recent versions due to the backlog size, I missed the newer revisions. In the future, please try to avoid subject change. If the subject chane is needed, please explicitly mark the old version as superseded, it will help us a lot, thanks! Paolo
Powered by blists - more mailing lists