lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <167892332568.4030021.1650680100964955590.b4-ty@kernel.org>
Date:   Wed, 15 Mar 2023 16:35:20 -0700
From:   Bjorn Andersson <andersson@...nel.org>
To:     broonie@...nel.org, agross@...nel.org,
        Kathiravan T <quic_kathirav@...cinc.com>,
        geert+renesas@...der.be, linux-arm-kernel@...ts.infradead.org,
        catalin.marinas@....com, linux-clk@...r.kernel.org,
        rafal@...ecki.pl, devicetree@...r.kernel.org, will@...nel.org,
        mturquette@...libre.com, dmitry.baryshkov@...aro.org,
        linux-arm-msm@...r.kernel.org, sboyd@...nel.org,
        robimarko@...il.com, robh+dt@...nel.org, nfraprado@...labora.com,
        konrad.dybcio@...aro.org, quic_gurus@...cinc.com, arnd@...db.de,
        krzysztof.kozlowski+dt@...aro.org, linux-kernel@...r.kernel.org
Subject: Re: (subset) [PATCH V6 0/9] Add minimal boot support for IPQ5332

On Tue, 7 Mar 2023 11:52:23 +0530, Kathiravan T wrote:
> The IPQ5332 is Qualcomm's 802.11be SoC for Routers, Gateways and
> Access Points.
> 
> This series adds minimal board boot support for ipq5332-mi01.2 board.
> 
> Changes in V6:
> 	- Added couple of patches 1/9 and 5/9 in the series to make sure
> 	  all the dependent patches are together
> 	- V5 can be found at
> 	  https://lore.kernel.org/linux-arm-msm/20230217075835.460-1-quic_kathirav@quicinc.com/
> 
> [...]

Applied, thanks!

[9/9] arm64: defconfig: Enable IPQ5332 SoC base configs
      commit: 48adb3be7d617ecc7d9656032e7253406b8040f5

Best regards,
-- 
Bjorn Andersson <andersson@...nel.org>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ