lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87bk0s588m.fsf@geanix.com>
Date: Fri, 13 Sep 2024 09:21:45 +0200
From: Esben Haabendal <esben@...nix.com>
To: Shawn Guo <shawnguo2@...h.net>
Cc: Russell King <linux@...linux.org.uk>,  Shawn Guo <shawnguo@...nel.org>,
  Sascha Hauer <s.hauer@...gutronix.de>,  Pengutronix Kernel Team
 <kernel@...gutronix.de>,  Fabio Estevam <festevam@...il.com>,  Dong
 Aisheng <aisheng.dong@....com>,  Jacky Bai <ping.bai@....com>,  Linus
 Walleij <linus.walleij@...aro.org>,  Arnd Bergmann <arnd@...db.de>,
  Rasmus Villemoes <rasmus.villemoes@...vas.dk>,
  linux-arm-kernel@...ts.infradead.org,  imx@...ts.linux.dev,
  linux-kernel@...r.kernel.org,  linux-gpio@...r.kernel.org
Subject: Re: [PATCH v2 1/3] ARM: imx: Allow user to disable pinctrl

Shawn Guo <shawnguo2@...h.net> writes:

> On Mon, May 06, 2024 at 12:23:53PM +0200, Esben Haabendal wrote:
>> Making pinctrl drivers and subsequently the pinctrl framework
>> user-controllable, allows building a kernel without this.
>> While in many (most) cases, this could make the system unbootable, it
>> does allow building smaller kernels for those situations where picntrl
>> is not needed.
>> 
>> One such situation is when building a kernel for NXP LS1021A systems,
>> which does not have run-time controllable pinctrl, so pinctrl framework
>> and drivers are 100% dead-weight.
>> 
>> 
>> Signed-off-by: Esben Haabendal <esben@...nix.com>
>
> Acked-by: Shawn Guo <shawnguo@...nel.org>

Was this only for this patch 1/3, or the whole series?

/Esben

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ