lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B0E325B.7060203@ladisch.de>
Date:	Thu, 26 Nov 2009 08:46:35 +0100
From:	Clemens Ladisch <clemens@...isch.de>
To:	Andrew Morton <akpm@...ux-foundation.org>
CC:	Jean Delvare <khali@...ux-fr.org>,
	Serge Belyshev <belyshev@...ni.sinp.msu.ru>,
	linux-kernel@...r.kernel.org, lm-sensors@...sensors.org,
	x86@...nel.org
Subject: Re: [PATCH v4] k10temp: temperature sensor for AMD Family 10h/11h
 CPUs

Andrew Morton wrote:
> Clemens Ladisch <clemens@...isch.de> wrote:
> > This adds a driver for the internal temperature sensor of AMD Family 10h
> > and 11h CPUs.
> > ...
> > +#define REG_HARDWARE_THERMAL_CONTROL	0x64
> > +#define  HTC_ENABLE			0x00000001
> > +
> > +#define REG_REPORTED_TEMPERATURE	0xa4
> > +
> > +#define REG_NORTHBRIDGE_CAPABILITIES	0xe8
> > +#define  NB_CAP_HTC			0x00000400
> 
> These definitions relate to register addresses within the AMD CPUs,
> yes?

Yes, in the PCI configuration space of the internal northbridge.

> I wonder if these should be placed in some header file in
> arch/x86/include/asm/ where other such things are described.

There is no such header.  The files that also access PCI cfg registers:
  arch/x86/kernel/k8.c
  arch/x86/kernel/quirks.c
  arch/x86/oprofile/op_model_amd.c
define their own private symbols or use magic numbers.


Best regards,
Clemens
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ