From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 99646 invoked by alias); 27 Nov 2016 03:14:03 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Received: (qmail 99583 invoked by uid 89); 27 Nov 2016 03:13:59 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=0.5 required=5.0 tests=AWL,BAYES_20,SPF_HELO_PASS,SPF_SOFTFAIL autolearn=no version=3.3.2 spammy=HX-PHP-Originating-Script:rcube.php, thirdparty, third-party, isps X-HELO: simark.ca Received: from simark.ca (HELO simark.ca) (158.69.221.121) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Sun, 27 Nov 2016 03:13:57 +0000 Received: by simark.ca (Postfix, from userid 33) id D683E1E86E; Sat, 26 Nov 2016 22:13:55 -0500 (EST) To: Pedro Alves Subject: Re: [PATCH 00/22] Convert ui-out subsystem to C++ X-PHP-Originating-Script: 33:rcube.php MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Sun, 27 Nov 2016 03:14:00 -0000 From: Simon Marchi Cc: gdb-patches@sourceware.org In-Reply-To: <8f6f01e9-a86e-ee3e-1e05-7f4342291474@redhat.com> References: <20161124152428.24725-1-simon.marchi@polymtl.ca> <55f46d37da0b47fff95dfa00fc340fa4@polymtl.ca> <8f6f01e9-a86e-ee3e-1e05-7f4342291474@redhat.com> Message-ID: <67478d0e625544e6ecf25d24e3792ff6@polymtl.ca> X-Sender: simon.marchi@polymtl.ca User-Agent: Roundcube Webmail/1.2.2 X-IsSubscribed: yes X-SW-Source: 2016-11/txt/msg00903.txt.bz2 On 2016-11-24 13:47, Pedro Alves wrote: > BTW, all other patches (I haven't looked at the missing ones) > look good to me, apart from the nits I sent. Ok, thanks. I have pushed patches 1-6, since they are self-standing. I'll wait a bit for the others, I'll try to push all of them together. I have sent the missing patch (19/22) from a third-party server (not my ISP's or my work's), and it seem like it got through with no problem this time, so all patches should be there. Thanks, Simon