lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <56D09FB3.6070301@linaro.org>
Date:	Fri, 26 Feb 2016 18:55:47 +0000
From:	Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
To:	Andrew Lunn <andrew@...n.ch>, Sekhar Nori <nsekhar@...com>
Cc:	GregKH <greg@...ah.com>, maxime.ripard@...e-electrons.com,
	wsa@...-dreams.de, broonie@...nel.org, vz@...ia.com,
	linux-kernel@...r.kernel.org, pantelis.antoniou@...sulko.com,
	bgolaszewski@...libre.com, Kevin Hilman <khilman@...nel.org>
Subject: Re: [PATCHv6 7/7] misc: at24: replace memory_accessor with
 nvmem_device_read

Hi Andrew,

On 26/02/16 17:33, Andrew Lunn wrote:
> On Fri, Feb 26, 2016 at 08:55:11PM +0530, Sekhar Nori wrote:
>> On Tuesday 23 February 2016 09:38 PM, Andrew Lunn wrote:
>>> Hi Sekhar
>>>
>>> Thanks for offering to test. You can get the series here:
>>>
>>> https://github.com/lunn/linux.git branch v4.5-rc3-nvmem
>>
>> Tested on DM365 by verifying MAC address read continues to work
>>
>> Tested-by: Sekhar Nori <nsekhar@...com>
>
> Hi Sekhar
>
> Thanks for testing.
>
> Srinivas, are you now happy to accept this whole series and then push
> it to GregKH? I'm guessing his trees are going to close soon.
Yes, thats true, But we can try and request Greg.

BTW, Am unable to apply the patches cleanly on top of 
https://git.kernel.org/cgit/linux/kernel/git/gregkh/char-misc.git/log/?h=char-misc-next

TBH, I think it would be faster if you can rebase them and send it 
directly to Greg KH with my Acks to all the series.


Thanks,
srini
>
> Thanks
> 	Andrew
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ