lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 01 Mar 2023 10:02:54 +0100
From:   John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Geert Uytterhoeven <geert@...ux-m68k.org>,
        Michael Karcher <kernel@...rcher.dialup.fu-berlin.de>,
        Rich Felker <dalias@...c.org>,
        Yoshinori Sato <ysato@...rs.sourceforge.jp>,
        linux-sh@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] sh updates for v6.3

Hi Linus!

This is my first pull request as a SuperH maintainer, so the list of changes
is very short and contains just two fixes.

One patch by Geert Uytterhoeven fixes a regression in connection with the rtl8169
driver on SuperH boards that was introduced when the driver was switched to use
devm_clk_get_optional_enabled() to simplify the code.

The second patch by Michael Karcher fixes a build warning and allows the kernel
to be built with CONFIG_WERROR enabled on SuperH.

The following changes since commit c9c3395d5e3dcc6daee66c6908354d47bf98cb0c:

 Linux 6.2 (2023-02-19 14:24:22 -0800)

are available in the Git repository at:

 git://git.kernel.org/pub/scm/linux/kernel/git/glaubitz/sh-linux.git tags/sh-for-v6.3-tag1

for you to fetch changes up to ff30bd6a6618e979b16977617371c0f28a95036e:

 sh: clk: Fix clk_enable() to return 0 on NULL clk (2023-02-27 10:50:48 +0100)

Thanks for pulling!

Adrian

----------------------------------------------------------------
sh updates for v6.3

- sh: clk: Fix clk_enable() to return 0 on NULL clk
- sh: intc: Avoid spurious sizeof-pointer-div warning

----------------------------------------------------------------
Geert Uytterhoeven (1):
 sh: clk: Fix clk_enable() to return 0 on NULL clk

Michael Karcher (1):
 sh: intc: Avoid spurious sizeof-pointer-div warning

 drivers/sh/clk/core.c | 2 +-
 include/linux/sh_intc.h | 5 ++++-
 2 files changed, 5 insertions(+), 2 deletions(-)

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ