lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 6 Aug 2010 11:41:20 +0100
From:	Mark Brown <broonie@...nsource.wolfsonmicro.com>
To:	Joonyoung Shim <jy0922.shim@...sung.com>
Cc:	lrg@...mlogic.co.uk, kyungmin.park@...sung.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] regulator: Fix WM8994 LDO enable gpio set when probed

On Fri, Aug 06, 2010 at 11:07:26AM +0900, Joonyoung Shim wrote:
> The enable time needs to enable WM8994 LDO, but WM8994 LDO is enabled
> without the enable time at the probe function. This can cause the
> problem to try i2c operation before LDO is enabled.

> This patch sets to 0 WM8994 LDO enable gpio when probed then if it is
> requested to enable WM8994 LDO, will be enabled by enable interface of
> regulator core with enable time.

That's not what the patch actually does.  It's not changing the GPIO
that is configured at all, it is changing the configuration of the flag
which says if the GPIO has been enabled.  This made it very hard to
follow what you're trying to do here.  The change itself is OK but
please supply a better changelog (actually I think I may just rewrite
the changelog for you and send on a new version to Liam - you'll be CCed
if I do this).

The underlying problem here is that due to the gpiolib API it's not
possible for us to read the status of the GPIO when we inherit it at
startup.  If the GPIO was already high when we started then the current
code is fine, if it was low we don't have the delay.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ