lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190616.135357.658647099528379354.davem@davemloft.net>
Date:   Sun, 16 Jun 2019 13:53:57 -0700 (PDT)
From:   David Miller <davem@...emloft.net>
To:     martin.blumenstingl@...glemail.com
Cc:     netdev@...r.kernel.org, peppe.cavallaro@...com,
        alexandre.torgue@...com, joabreu@...opsys.com,
        linus.walleij@...aro.org, andrew@...n.ch,
        linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH net-next v1 0/5] stmmac: cleanups for stmmac_mdio_reset

From: Martin Blumenstingl <martin.blumenstingl@...glemail.com>
Date: Sat, 15 Jun 2019 12:09:27 +0200

> This is a successor to my previous series "stmmac: honor the GPIO flags
> for the PHY reset GPIO" from [0]. It contains only the "cleanup"
> patches from that series plus some additional cleanups on top.
> 
> I broke out the actual GPIO flag handling into a separate patch which
> is already part of net-next: "net: stmmac: use GPIO descriptors in
> stmmac_mdio_reset" from [1]
> 
> I have build and runtime tested this on my ARM Meson8b Odroid-C1.
> 
> 
> [0] https://patchwork.kernel.org/cover/10983801/
> [1] https://patchwork.ozlabs.org/patch/1114798/

Looks good, series applied.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ