lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090416012447.fd6e6dee.akpm@linux-foundation.org>
Date:	Thu, 16 Apr 2009 01:24:47 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Chris Zankel <chris@...kel.net>
Cc:	Johannes Weiner <jw@...ix.com>, linux-kernel@...r.kernel.org
Subject: Re: Xtensa patches

On Thu, 16 Apr 2009 00:42:13 -0700 Chris Zankel <chris@...kel.net> wrote:

> Hi Andrew,
> 
> I will look over those patches and commit them to xtensa-2.6.
> 

OK.  I have a random pile if i-dont-know-what xtensa stuff here.

xtensa-add-flat-support-checkpatch-fixes.patch
xtensa-variant-specific-code.patch
xtensa-cache-inquiry-and-unaligned-cache-handling-functions.patch
xtensa-s6000-dma-engine-support.patch
xtensa-allow-platform-and-variant-to-initialize-own-irq-chips.patch
xtensa-support-s6000-gpio-irqs-and-alternate-function-selection.patch
s6gmac-xtensa-s6000-on-chip-ethernet-driver.patch
s6gmac-xtensa-s6000-on-chip-ethernet-driver-fix.patch
xtensa-s6105-specific-configuration-for-s6gmac.patch
xtensa-enable-s6gmac-in-s6105_defconfig.patch
xtensa-add-m41t62-rtc-to-s6105-platform.patch
xtensa-enable-m41t80-driver-in-s6105_defconfig.patch

I'll drop xtensa-add-flat-support-checkpatch-fixes.patch (as I usually
do when someone merges the base patch but doesn't run checkpatch on it
- hint) and I'll send the rest over at you.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ