lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Jun 2020 19:38:20 +0200 From: Miquel Raynal <miquel.raynal@...tlin.com> To: Álvaro Fernández Rojas <noltari@...il.com>, tsbogend@...ha.franken.de, f.fainelli@...il.com, bcm-kernel-feedback-list@...adcom.com, miquel.raynal@...tlin.com, richard@....at, vigneshr@...com, jonas.gorski@...il.com, linus.walleij@...aro.org, linux-mips@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, linux-mtd@...ts.infradead.org Subject: Re: [PATCH v4] mtd: parsers: bcm63xx: simplify CFE detection On Mon, 2020-06-15 at 09:17:40 UTC, =?utf-8?q?=C3=81lvaro_Fern=C3=A1ndez_Rojas?= wrote: > Instead of trying to parse CFE version string, which is customized by some > vendors, let's just check that "CFE1" was passed on argument 3. > > Signed-off-by: Álvaro Fernández Rojas <noltari@...il.com> > Signed-off-by: Jonas Gorski <jonas.gorski@...il.com> > Reviewed-by: Florian Fainelli <f.fainelli@...il.com> Applied to https://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux.git nand/next, thanks. Miquel
Powered by blists - more mailing lists