lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <d86e4fc9-c4bc-b503-6f73-deac083452d8@gmail.com>
Date:   Wed, 13 Jul 2022 09:11:50 -0700
From:   Florian Fainelli <f.fainelli@...il.com>
To:     Mark Brown <broonie@...nel.org>,
        Florian Fainelli <f.fainelli@...il.com>
Cc:     bcm-kernel-feedback-list@...adcom.com,
        William Zhang <william.zhang@...adcom.com>,
        Linux ARM List <linux-arm-kernel@...ts.infradead.org>,
        anand.gore@...adcom.com, dan.beygelman@...adcom.com,
        kursad.oney@...adcom.com, joel.peshkin@...adcom.com,
        linux-kernel@...r.kernel.org, linux-spi@...r.kernel.org
Subject: Re: [RESEND PATCH 7/8] spi: bcm63xx-hsspi: bcmbca: Replace
 ARCH_BCM_63XX with ARCH_BCMBCA

On 7/11/22 09:09, Mark Brown wrote:
> On Mon, Jul 11, 2022 at 09:04:39AM -0700, Florian Fainelli wrote:
> 
>> Each patch is independent from one another and there are not dependencies on
>> the Broadcom arm-soc tree(s) other than for CONFIG_ARCH_BCMBCA which was
>> introduced with v5.19 with b32c613b3fda3e1c26119609f1ad6b19178f82f5. That
>> said, I prefer to take all patches via the Broadcom arm-soc tree(s) to
>> ensure a timely inclusion for our upcoming v5.20 pull request, and ensure
>> that all drivers are converted in one release cycle.
> 
>> If you want to give me your Acked-by or that I drop this and take it via the
>> spi tree, please let me know.
> 
> Acked-by: Mark Brown <broonie@...nel.org>

Thanks, FWIW, I had amended that patch with your ACked-by before sending 
it to the arm-soc maintainers.
-- 
Florian

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ