lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 15 Apr 2012 12:03:16 +0800
From:	Dong Aisheng <dongas86@...il.com>
To:	Sascha Hauer <s.hauer@...gutronix.de>
Cc:	Dong Aisheng <b29396@...escale.com>, linux-kernel@...r.kernel.org,
	linux-arm-kernel@...ts.infradead.org,
	devicetree-discuss@...ts.ozlabs.org, linus.walleij@...ricsson.com,
	swarren@...dotorg.org, shawn.guo@...escale.com,
	kernel@...gutronix.de, grant.likely@...retlab.ca,
	rob.herring@...xeda.com
Subject: Re: [PATCH 3/3] ARM: imx6q: switch to use pinctrl driver

On Sat, Apr 14, 2012 at 9:53 PM, Sascha Hauer <s.hauer@...gutronix.de> wrote:
> On Sat, Apr 14, 2012 at 12:18:35AM +0800, Dong Aisheng wrote:
>> From: Dong Aisheng <dong.aisheng@...aro.org>
>>
>> ---
>> This patch is used for test the new pinctrl driver.
>
> Then please test it with i.MX35, i.MX5...
>
>>
>> +     imx_data->p = pinctrl_get_select_default(&pdev->dev);
>> +     if (IS_ERR(imx_data->p)) {
>> +             err = PTR_ERR(imx_data->p);
>> +             goto pin_err;
>> +     }
>> +
>
> ... which will fail here.
Sorry, it will not work, it's not a formal patch.
I just sent it quickly for users to try on imx6q.
For MX3 and MX5, before their pinctrl driver are available, user may
need to define a dummy in dt to avoid such an error.

Regards
Dong Aisheng
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ