lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <167233461774.1099840.11525870770738189217.b4-ty@kernel.org>
Date:   Thu, 29 Dec 2022 11:23:36 -0600
From:   Bjorn Andersson <andersson@...nel.org>
To:     phone-devel@...r.kernel.org,
        Marijn Suijten <marijn.suijten@...ainline.org>
Cc:     agross@...nel.org, linux-arm-msm@...r.kernel.org,
        konrad.dybcio@...ainline.org, jami.kettunen@...ainline.org,
        martin.botka@...ainline.org, robh+dt@...nel.org,
        krzysztof.kozlowski+dt@...aro.org, linux-kernel@...r.kernel.org,
        ~postmarketos/upstreaming@...ts.sr.ht,
        angelogioacchino.delregno@...ainline.org, konrad.dybcio@...aro.org,
        devicetree@...r.kernel.org
Subject: Re: [PATCH v2] arm64: dts: qcom: sm6125-seine: Clean up gpio-keys (volume down)

On Thu, 22 Dec 2022 20:24:43 +0100, Marijn Suijten wrote:
> - Remove autorepeat (leave key repetition to userspace);
> - Remove unneeded status = "okay" (this is the default);
> - Remove unneeded linux,input-type <EV_KEY> (this is the default for
>   gpio-keys);
> - Allow the interrupt line for this button to be disabled;
> - Use a full, descriptive node name;
> - Set proper bias on the GPIO via pinctrl;
> - Sort properties;
> - Replace deprecated gpio-key,wakeup property with wakeup-source.
> 
> [...]

Applied, thanks!

[1/1] arm64: dts: qcom: sm6125-seine: Clean up gpio-keys (volume down)
      commit: a9f6a13da473bb6c7406d2784d9e3792f6763cba

Best regards,
-- 
Bjorn Andersson <andersson@...nel.org>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ