Hi,
I would like to use kernel 4.14 by default on the mvebu target soon.
If you are aware of any regressions compared to kernel 4.9 then please
report them, now.
I only have a Linksys device here for testing and I haven't tested the
SFP functionality, would be nice if someone could test if that
On 02/15/2018 05:34 PM, Tim Harvey wrote:
> Testted on a Gateworks GW54xx. Does not support enabling imx-drm modules
> yet as those will need some adjustments based on kernel configs.
>
> v3:
> - included missing patch for pcie enumeration fix
>
> v2:
> - move dwc pci patch to generic (Koen)
>
On 02/15/2018 05:34 PM, Tim Harvey wrote:
> Backport of: http://patchwork.ozlabs.org/patch/860701/
>
> Signed-off-by: Tim Harvey
> ---
> .../generic/pending-4.14/812-pci-dwc-fix-enumeration.patch| 11
> +++
> 1 file changed, 11 insertions(+)
> create mode
On 02/15/2018 06:42 PM, Tim Harvey wrote:
> On Tue, Feb 13, 2018 at 12:51 PM, Hauke Mehrtens wrote:
>> On 02/13/2018 09:46 PM, Hauke Mehrtens wrote:
>>> Hi Tim,
>>>
>>> sorry that I haven't reviewed this earlyer, but now I saw some problems,
>>> see my comments inline.
>>>
>>>
On 09-02-18 01:28, Philip Prindeville wrote:
> From: Philip Prindeville
>
> Allowing password logins leaves you vulnerable to dictionary
> attacks. We disable password-based authentication, limiting
> authentication to keys only which are more secure.
>
> Note:
On Thu, Feb 15, 2018 at 11:45 AM, Kevin Darbyshire-Bryant
wrote:
> 1721453 Remove special handling of A-for-A queries.
> 499d8dd Fix boundary for test introduced in
> 3e3f1029c9ec6c63e430ff51063a6301d4b2262
> 6f1cbfd Fix debian/readme typo.
> 55ecde7 Inotify: Ignore
Philip Prindeville wrote:
>
>
> In a perfect world, no one should ever have to build with
> patches, anything in files/, cherry-picked commits, etc.
> Everything would be expressed in the .config (or
> kernel-config).
I think this is probably the root of all the
On Sat, Feb 17, 2018 at 1:54 PM, Stijn Tintel wrote:
> On 09-02-18 01:28, Philip Prindeville wrote:
>> From: Philip Prindeville
>>
>> Allowing password logins leaves you vulnerable to dictionary
>> attacks. We disable password-based