lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 12 Dec 2006 00:20:18 -0800
From:	David Brownell <david-b@...bell.net>
To:	"Dan Williams" <dan.j.williams@...el.com>
Cc:	"Voipio Riku" <Riku.Voipio@...ial.fi>, rtc-linux@...glegroups.com,
	"Linux Kernel list" <linux-kernel@...r.kernel.org>,
	"Alessandro Zummo" <alessandro.zummo@...ertech.it>,
	i2c@...sensors.org
Subject: Re: [patch 2.6.19-git] rts-rs5c372 updates: more chips, alarm, 12hr mode, etc

On Monday 11 December 2006 3:33 pm, Dan Williams wrote:
> 
> According to the latest specification update
> (http://www.intel.com/design/iio/specupdt/27351910.pdf) there are no
> known issues with the i2c. 

That's for the 80319 ... Riku said he was using 80219, that
could imply some differences.  And I distinctly recall Intel's
XScale docs having a few problems whereby "live" silicon bugs
didn't always stay in the "spec update" documents, so it's
possible that older docs would be needed.

At this point all we really _know_ is that requests made
through 80219's i2c controller don't give the correct result
(at least on Riku's 80219 board) and moreover seem to have a
consistent failure mode ... whereas ones made with OMAP's
controller (and presumably that of the original driver author,
for a Synology DS-101 presumably with IXP420) do act ok.

- Dave

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ