lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 29 Nov 2013 11:05:20 +0100 From: Linus Walleij <linus.walleij@...aro.org> To: Chao Xu <caesarxuchao@...il.com>, ext Tony Lindgren <tony@...mide.com>, Kevin Hilman <khilman@...aro.org> Cc: Linux-OMAP <linux-omap@...r.kernel.org>, "santosh.shilimkar@...com" <santosh.shilimkar@...com>, "linux-gpio@...r.kernel.org" <linux-gpio@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Felipe Balbi <balbi@...com>, Paul Walmsley <paul@...an.com> Subject: Re: [PATCH V2] gpio: omap: refresh patch "be more aggressive with pm_runtime" against v3.12-rc5 On Tue, Nov 26, 2013 at 11:46 PM, Chao Xu <caesarxuchao@...il.com> wrote: > From: Felipe Balbi <balbi@...com> > > try to keep gpio block suspended as much as possible. > > Tested with pandaboard and a sysfs exported gpio. > > Signed-off-by: Felipe Balbi <balbi at ti.com> > > [caesarxuchao@...il.com : Refreshed against v3.12-rc5, and added revision check to enable aggressive pm_runtime on OMAP4-only. Because am33xx_gpio_sysc.idlemodes seems to be wrongly marked as SIDLE_SMART_WKUP, which might cause missed interrupts with this patch. Tested on Pandaboard rev A2.] > > Signed-off-by: Chao Xu <caesarxuchao@...il.com> I'd like Tony and/or Kevin to have a look at this from a PM point of view so I get some confirmation from the core maintainers that this is the way forward. Yours, Linus Walleij -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists