lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 15 Dec 2020 03:20:10 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Marc Kleine-Budde <mkl@...gutronix.de>
Cc:     netdev@...r.kernel.org, davem@...emloft.net, kuba@...nel.org,
        linux-can@...r.kernel.org, kernel@...gutronix.de
Subject: Re: pull-request: can-next 2020-12-14

Hello:

This pull request was applied to netdev/net-next.git (refs/heads/master):

On Mon, 14 Dec 2020 14:31:38 +0100 you wrote:
> Hello Jakub, hello David,
> 
> this is a series of 7 patches for net-next/master.
> 
> All 7 patches are by me and target the m_can driver. First there are 4 cleanup
> patches (fix link to doc, fix coding style, uniform variable name usage, mark
> function as static). Then the driver is converted to
> pm_runtime_resume_and_get(). The next patch lets the m_can class driver
> allocate the driver's private data, to get rid of one level of indirection. And
> the last patch consistently uses struct m_can_classdev as drvdata over all
> binding drivers.
> 
> [...]

Here is the summary with links:
  - pull-request: can-next 2020-12-14
    https://git.kernel.org/netdev/net-next/c/b02487560740

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists