lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 29 Mar 2012 23:20:11 +0800
From:	Daniel Kurtz <djkurtz@...omium.org>
To:	Nick Dyer <nick.dyer@...ev.co.uk>
Cc:	Dmitry Torokhov <dmitry.torokhov@...il.com>,
	Joonyoung Shim <jy0922.shim@...sung.com>,
	Iiro Valkonen <iiro.valkonen@...el.com>,
	Henrik Rydberg <rydberg@...omail.se>,
	linux-input@...r.kernel.org, linux-kernel@...r.kernel.org,
	Benson Leung <bleung@...omium.org>,
	Yufeng Shen <miletus@...omium.org>,
	"Tiwari, Atul" <Atul.Tiwari@...el.com>,
	"Bowens, Alan" <Alan.Bowens@...el.com>
Subject: Re: [PATCH 19/20] Input: atmel_mxt_ts - remove mxt_make_highchg and
 parse T6 report

On Tue, Mar 20, 2012 at 11:38 PM, Nick Dyer <nick.dyer@...ev.co.uk> wrote:
> Daniel Kurtz wrote:
>> This function attempts to make the CHG pin high by reading a bunch of
>> messages until the device is happy.  Instead of just blindly trying to
>> read a fixed number of messages, let's actually read and process them.
>>
>> It turns out that the messages after boot or nvupdates are T6 reports,
>> containing a status, and the config memory checksum.  So, let's parse
>> them and dump a useful info message.
>>
>> Signed-off-by: Daniel Kurtz <djkurtz@...omium.org>
>
> mxt_make_highchg exists due to the interrupts being edge triggered. It
> forces the CHG line to go high.
>
> With this implementation, I suspect that if a new message arrives after you
> have read T44 and before you finish processing messages, then the interrupt
> handler will not ever be run. What testing have you done on this?

Actually, for the MXT224E on which I've been testing, the CHG line
goes high after reading the first byte of the T5 message (in other
words, the first byte of the first message, no matter how many
messages T44 reports).

Expect an updated version of this patchset soon.

Thanks for all of your reviews!

>
> The printout of T6 messages looks OK, though. I'd prefer to see a lookup
> table for the report IDs.
>
> --
> Nick Dyer
> Software Engineer, ITDev Ltd
> Hardware and Software Development Consultancy
> Website: http://www.itdev.co.uk
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ