lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <542F03CF.8010900@c-s.fr>
Date:	Fri, 03 Oct 2014 22:15:11 +0200
From:	christophe leroy <christophe.leroy@....fr>
To:	Mark Brown <broonie@...nel.org>
CC:	Benjamin Herrenschmidt <benh@...nel.crashing.org>,
	Paul Mackerras <paulus@...ba.org>,
	Marcelo Tosatti <marcelo@...ck.org>,
	Vitaly Bordug <vitb@...nel.crashing.org>,
	linux-kernel@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
	linux-spi@...r.kernel.org,
	Joakim Tjernlund <joakim.tjernlund@...nsmode.se>,
	scottwood@...escale.com
Subject: Re: [PATCH 2/2] spi: fsl-spi: Allow dynamic allocation of CPM1 parameter
 RAM


Le 03/10/2014 16:44, Mark Brown a écrit :
> On Fri, Oct 03, 2014 at 02:56:09PM +0200, Christophe Leroy wrote:
>
>> +config CPM1_RELOCSPI
>> +	bool "Dynamic SPI relocation"
>> +	default n
>> +	help
>> +	  On recent MPC8xx (at least MPC866 and MPC885) SPI can be relocated
>> +	  without micropatch. This activates relocation to a dynamically
>> +	  allocated area in the CPM Dual port RAM.
>> +	  When combined with SPI relocation patch (for older MPC8xx) it avoids
>> +	  the "loss" of additional Dual port RAM space just above the patch,
>> +	  which might be needed for example when using the CPM QMC.
> Something like this shouldn't be a compile time option.  Either it
> should be unconditional or it should be triggered in some system
> specific manner (from DT, from knowing about other users or similar).
Can't be unconditional as older versions of mpc8xx (eg MPC860) don't 
support relocation without a micropatch.
I have therefore submitted a v2 based on a DTS compatible property.

---
Ce courrier électronique ne contient aucun virus ou logiciel malveillant parce que la protection avast! Antivirus est active.
http://www.avast.com

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ