lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <573C7DF6.6020105@linaro.org>
Date:	Wed, 18 May 2016 15:36:38 +0100
From:	Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
To:	Stefan Wahren <stefan.wahren@...e.com>
Cc:	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	linux-mediatek@...ts.infradead.org,
	Maxime Ripard <maxime.ripard@...e-electrons.com>,
	linux-kernel@...r.kernel.org, linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH v3 0/2] nvmem: remove regmap dependency



On 18/05/16 15:30, Stefan Wahren wrote:
> Hi Srinivas,
>
> Am 02.05.2016 um 20:36 schrieb Srinivas Kandagatla:
>> Hi Greg,
>>
>> This is v3 patchset for the leftover 2 patches for nvmem regmap
>> removal series [1]. These patches are based on char-misc tree.
>>
>> nvmem uses regmap_raw_read/write apis to read/write data from providers,
>> With recent patch 922a9f936e40 ("regmap: mmio: Convert to regmap_bus
>> and fix accessor usage") nvmem providers based on regmap-mmio stopped
>> working, as nvmem core was using raw accessors.
>> This issue can be fixed temporarly by moving to other regmap apis,
>> but we might hit same issue in future, and regmap looks like an
>> overdo for nvmem. Moving to interfaces based on read/write callbacks
>> from providers would be more robust.
>
> i noticed that Documentation/nvmem/nvmem.txt also needs a fix after
> removing regmap dependency.

Thanks Stefan for reporting this, I will send a patch to fix that too.

--srini
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ