lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 10 Oct 2017 08:55:25 +0530
From:   Viresh Kumar <viresh.kumar@...aro.org>
To:     "Rafael J . Wysocki" <rafael.j.wysocki@...el.com>
Cc:     Masahiro Yamada <yamada.masahiro@...ionext.com>,
        linux-pm@...r.kernel.org, "Rafael J. Wysocki" <rjw@...ysocki.net>,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] cpufreq: dt-platdev: drop socionext,uniphier-ld6b from
 whitelist

On 14-09-17, 14:26, Viresh Kumar wrote:
> On 30-08-17, 00:37, Masahiro Yamada wrote:
> > As you see arch/arm/boot/dts/uniphier-ld6b.dtsi, it includes
> > uniphier-pxs2.dtsi, which uses "operating-points-v2" property
> > and whose cpufreq device is automatically created.
> > 
> > Signed-off-by: Masahiro Yamada <yamada.masahiro@...ionext.com>
> > ---
> > 
> >  drivers/cpufreq/cpufreq-dt-platdev.c | 2 --
> >  1 file changed, 2 deletions(-)
> > 
> > diff --git a/drivers/cpufreq/cpufreq-dt-platdev.c b/drivers/cpufreq/cpufreq-dt-platdev.c
> > index a020da7940d6..c344fc1c4eb8 100644
> > --- a/drivers/cpufreq/cpufreq-dt-platdev.c
> > +++ b/drivers/cpufreq/cpufreq-dt-platdev.c
> > @@ -83,8 +83,6 @@ static const struct of_device_id whitelist[] __initconst = {
> >  	{ .compatible = "rockchip,rk3368", },
> >  	{ .compatible = "rockchip,rk3399", },
> >  
> > -	{ .compatible = "socionext,uniphier-ld6b", },
> > -
> >  	{ .compatible = "st-ericsson,u8500", },
> >  	{ .compatible = "st-ericsson,u8540", },
> >  	{ .compatible = "st-ericsson,u9500", },
> 
> Acked-by: Viresh Kumar <viresh.kumar@...aro.org>

@Rafael: You missed my Ack while applying this patch ?

-- 
viresh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ