lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <52CE94DE.40604@overkiz.com>
Date:	Thu, 09 Jan 2014 13:23:58 +0100
From:	boris brezillon <b.brezillon@...rkiz.com>
To:	Jean-Jacques Hiblot <jjhiblot@...phandler.com>,
	nicolas.ferre@...el.com
CC:	linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] at91: smc: bug fix in sam9_smc_cs_read()

On 09/01/2014 12:49, Jean-Jacques Hiblot wrote:
> There was a copy/paste error when reading the nwe_pulse value.
>
> Signed-off-by: Jean-Jacques Hiblot <jjhiblot@...phandler.com>
Acked-by: Boris BREZILLON <b.brezillon@...rkiz.com>
> ---
>   arch/arm/mach-at91/sam9_smc.c | 2 +-
>   1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/arch/arm/mach-at91/sam9_smc.c b/arch/arm/mach-at91/sam9_smc.c
> index 99a0a1d..b26156b 100644
> --- a/arch/arm/mach-at91/sam9_smc.c
> +++ b/arch/arm/mach-at91/sam9_smc.c
> @@ -101,7 +101,7 @@ static void sam9_smc_cs_read(void __iomem *base,
>   	/* Pulse register */
>   	val = __raw_readl(base + AT91_SMC_PULSE);
>   
> -	config->nwe_setup = val & AT91_SMC_NWEPULSE;
> +	config->nwe_pulse = val & AT91_SMC_NWEPULSE;
>   	config->ncs_write_pulse = (val & AT91_SMC_NCS_WRPULSE) >> 8;
>   	config->nrd_pulse = (val & AT91_SMC_NRDPULSE) >> 16;
>   	config->ncs_read_pulse = (val & AT91_SMC_NCS_RDPULSE) >> 24;

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ