lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0cb38b14-13bd-43e9-8dca-3d78afd62a28@kernel.org>
Date: Mon, 19 Jan 2026 08:05:50 +0100
From: Krzysztof Kozlowski <krzk@...nel.org>
To: Yijie Yang <yijie.yang@....qualcomm.com>, andersson@...nel.org,
 konradybcio@...nel.org, robh@...nel.org, krzk+dt@...nel.org,
 conor+dt@...nel.org
Cc: linux-arm-msm@...r.kernel.org, linux-kernel@...r.kernel.org,
 devicetree@...r.kernel.org
Subject: Re: [PATCH v4 4/4] arm64: dts: qcom: Add base PURWA-IOT-EVK board

On 19/01/2026 04:13, Yijie Yang wrote:
> 
> 
> On 1/17/2026 12:19 AM, Krzysztof Kozlowski wrote:
>> On 16/01/2026 11:41, YijieYang wrote:
>>> From: Yijie Yang <yijie.yang@....qualcomm.com>
>>>
>>> The PURWA-IOT-EVK is an evaluation platform for IoT products, composed of
>>> the Purwa IoT SoM and a carrier board. Together, they form a complete
>>> embedded system capable of booting to UART.
>>>
>>> PURWA-IOT-EVK uses the PS8833 as a retimer for USB0, unlike HAMOA-IOT-EVK.
>>> Meanwhile, USB0 bypasses the SBU selector FSUSB42.
>>>
>>
>> NAK.
>>
>> Warnings were reported at v3. Did you address them? No, you completely
>> ignored them, so warnings are reported again at v4.
>>
>> What do you think these emails are for?
> 
> This warning is caused by the pcie3_phy node in purwa.dtsi, which is not 
> introduced by this patch set. Since it does not impact functionality, 

Your patchset introduces that warning. There was no such warning before.

My NAK still stays, such patchset must not be merged.

Best regards,
Krzysztof

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ