lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <173505491734.10614.11394326797380035834.b4-ty@bootlin.com>
Date: Tue, 24 Dec 2024 16:43:21 +0100
From: Miquel Raynal <miquel.raynal@...tlin.com>
To: broonie@...nel.org,
	robh@...nel.org,
	krzk+dt@...nel.org,
	conor+dt@...nel.org,
	andersson@...nel.org,
	konradybcio@...nel.org,
	richard@....at,
	vigneshr@...com,
	manivannan.sadhasivam@...aro.org,
	linux-arm-msm@...r.kernel.org,
	linux-spi@...r.kernel.org,
	devicetree@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	linux-mtd@...ts.infradead.org,
	Md Sadre Alam <quic_mdalam@...cinc.com>
Cc: Miquel Raynal <miquel.raynal@...tlin.com>,
	quic_srichara@...cinc.com,
	quic_varada@...cinc.com
Subject: Re: [PATCH v14 0/8] Add QPIC SPI NAND driver

On Wed, 20 Nov 2024 14:44:58 +0530, Md Sadre Alam wrote:
> v14:
>  * Updated commit message
>  * Fix spelling mistake
>  * Remove "inline" from multiple APIs from qcom_nandc.c file
>  * Move '|' in qcom_param_page_type_exec() APIs at the end of line
> 
> [...]

Applied to mtd/6.13-rc1/qcom-reorg-for-spi-6.14, thanks!

[2/8] mtd: rawnand: qcom: cleanup qcom_nandc driver
      commit: 8c52932da5e6756fa66f52f0720da283fba13aa6
[3/8] mtd: rawnand: qcom: Add qcom prefix to common api
      commit: 1d479f5b345e0c3650fec4dddeef9fc6fab30c8b
[4/8] mtd: nand: Add qpic_common API file
      commit: fdf3ee5c6e5278dab4f60b998b47ed2d510bf80f
[5/8] mtd: rawnand: qcom: use FIELD_PREP and GENMASK
      commit: 0c08080fd71cd5dd59643104b39d3c89d793ab3c

Patche(s) will be available within hours on linux-mtd.

Kind regards,
Miquèl

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ