lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 20 Dec 2010 12:12:16 +0000 From: Mark Brown <broonie@...nsource.wolfsonmicro.com> To: Paul Mundt <lethal@...ux-sh.org> Cc: Stephen Rothwell <sfr@...b.auug.org.au>, Samuel Ortiz <sameo@...ux.intel.com>, linux-next@...r.kernel.org, linux-kernel@...r.kernel.org, Sundar Iyer <sundar.iyer@...ricsson.com>, Linus Walleij <linus.walleij@...aro.org> Subject: Re: linux-next: manual merge of the mfd tree with the ux500-core tree On Mon, Dec 20, 2010 at 01:23:44PM +0900, Paul Mundt wrote: > On Mon, Dec 20, 2010 at 03:21:48PM +1100, Stephen Rothwell wrote: > > -static void tc3589x_irq_dummy(unsigned int irq) > > +static void tc3589x_irq_dummy(struct irq_data *data) > > { > > /* No mask/unmask at this level */ > > } > > > > static struct irq_chip tc3589x_irq_chip = { > > - .name = "tc3589x", > > - .mask = tc3589x_irq_dummy, > > - .unmask = tc3589x_irq_dummy, > > + .name = "tc3589x", > > + .irq_mask = tc3589x_irq_dummy, > > + .irq_unmask = tc3589x_irq_dummy, > > }; > > static int tc3589x_irq_init(struct tc3589x *tc3589x) > Is there some reason you don't just kill this off and use dummy_irq_chip? Mainly that I didn't take the time to read through the code and figure out if it was doing anything interesting with the struct elsewhere which meant this was actually sensible (one of the other drivers was doing something surprising). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists