Tags give the ability to mark specific points in history as being important
-
v4.19-stm32mp-r3.3
24e69823 · ·The following changes since commit c306aaa45d7332fc3e295388039e0d4d51ad019e: dmaengine: stm32: take address into account when computing max width (2020-05-29 16:25:17 +0200) are available in the Git repository at: https://github.com/STMicroelectronics/linux.git tags/v4.19-stm32mp-r3.3 for you to fetch changes up to 24e698236f9c2197f9e4547075ec9647e8b99814: spi: stm32h7: ensure message are smaller than max size (2020-09-09 14:34:35 +0200) ---------------------------------------------------------------- This is the v4.19-stm32mp-r3.3 release. ---------------------------------------------------------------- Alain Volmat (4): spi: stm32: properly handle 0 byte transfer spi: stm32: removal of the data extension feature spi: stm32h7: ensure message are smaller than max size Amelie Delaunay (6): dmaengine: stm32-dma: fix max width computing usb: dwc2: fix wakeup support with dedicated wake irq usb: dwc2: fix build issue when config is USB_DWC2_HOST only Merge tag 'v4.19.143' into v4.19-stm32mp usb: dwc2: disable Link Power Management on STM32MP1 HS OTG Arnaud Pouliquen (1): rpmg: rpmsg_tty: rework to tty port allocation and release drivers/crypto/stm32/stm32-crc32.c | 258 +++++++++---------- drivers/dma/stm32-dma.c | 3 +- drivers/mtd/nand/raw/stm32_fmc2_nand.c | 4 +- drivers/rpmsg/rpmsg_tty.c | 97 ++++--- drivers/spi/spi-stm32.c | 64 ++--- drivers/usb/dwc2/core.h | 1 + drivers/usb/dwc2/drd.c | 3 + drivers/usb/dwc2/params.c | 4 + drivers/usb/dwc2/platform.c | 24 +- drivers/usb/host/ehci-platform.c | 125 +++++++++ 1563 files changed, 12758 insertions(+), 6301 deletions(-) -
-
-
-
-
-
wireless-drivers-2020-09-09
1264c1e0 · ·wireless-drivers fixes for v5.9 First set of fixes for v5.9, small but important. brcmfmac * fix a throughput regression on bcm4329 mt76 * fix a regression with stations reconnecting on mt7616 * properly free tx skbs, it was working by accident before mwifiex * fix a regression with 256 bit encryption keys wlcore * revert AES CMAC support as it caused a regression
-
ASB-2020-09-05_mainline
cbf07d5f · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_12-5.4
2d65e6a4 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_11-5.4
72f2bc5f · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.19-q-release
5811ca14 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.19-q
a1e08ab8 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.19-stable
a13ec5ea · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.14-q-release
4240339a · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.14-q
4861ce9e · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.14-p-release
8ce40651 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.14-p
f7bc5c22 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.14-stable
aaa9fead · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.9-q-release
fa6c9a35 · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407
-
ASB-2020-09-05_4.9-q
dd05251a · ·https://source.android.com/security/bulletin/2020-09-01 CVE-2020-0402 CVE-2020-0404 CVE-2020-0407