lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 21 May 2007 17:53:02 +0200
From:	"Udo A. Steinberg" <us15@...inf.tu-dresden.de>
To:	Jesse Barnes <jbarnes@...tuousgeek.org>
Cc:	Venki Pallipadi <venkatesh.pallipadi@...el.com>,
	linux-kernel <linux-kernel@...r.kernel.org>,
	Andrew Morton <akpm@...l.org>,
	Thomas Gleixner <tglx@...utronix.de>, Andi Kleen <ak@...e.de>,
	Ingo Molnar <mingo@...e.hu>, Chris Wright <chrisw@...s-sol.org>
Subject: Re: [PATCH 4/8] Force detect and enable HPET on ICH

On Mon, 21 May 2007 08:46:03 -0700 Jesse Barnes (JB) wrote:

JB> I see it documented in the ICH5 datasheet, but that bit is marked reserved 
JB> in the ICH3 and ICH4 datasheets...  Which docs are you looking at?

It's documented for ICH5 only. My experiments on IBM T30 (ICH3) and T41p (ICH4)
laptops show that HPET exists on these chipsets as well and can be enabled the
same way as described in the ICH5 datasheet.

Cheers,

	- Udo

-- 
Dipl.-Inf. Udo Steinberg                     
Technische Universität Dresden               http://os.inf.tu-dresden.de/~us15
Institute for System Architecture            Tel: +49 351 463 38401
D-01062 Dresden                              Fax: +49 351 463 38284

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ