lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 18 Oct 2011 11:33:34 +0800
From:	Guan Xuetao <gxt@...c.pku.edu.cn>
To:	Paul Bolle <pebolle@...cali.nl>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 06/21] unicore32: drop unused Kconfig symbols

Thanks Paul.
I will push the patch into my repo.

Acked-by: Guan Xuetao <gxt@...c.pku.edu.cn>


On Fri, 2011-10-14 at 14:28 +0200, Paul Bolle wrote:
> Signed-off-by: Paul Bolle <pebolle@...cali.nl>
> ---
>  arch/unicore32/Kconfig.debug |   14 --------------
>  1 files changed, 0 insertions(+), 14 deletions(-)
> 
> diff --git a/arch/unicore32/Kconfig.debug b/arch/unicore32/Kconfig.debug
> index ae2ec33..1a36262 100644
> --- a/arch/unicore32/Kconfig.debug
> +++ b/arch/unicore32/Kconfig.debug
> @@ -44,18 +44,4 @@ config DEBUG_OCD
>  	  Say Y here if you want the debug print routines to direct their
>  	  output to the UniCore On-Chip-Debugger channel using CP #1.
>  
> -config DEBUG_OCD_BREAKPOINT
> -	bool "Breakpoint support via On-Chip-Debugger"
> -	depends on DEBUG_OCD
> -
> -config DEBUG_UART
> -	int "Kernel low-level debugging messages via serial port"
> -	depends on DEBUG_LL
> -	range 0 1
> -	default "0"
> -	help
> -	  Choice for UART for kernel low-level using PKUnity UARTS,
> -	  should be between zero and one. The port must have been
> -	  initialised by the boot-loader before use.
> -
>  endmenu


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ