lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <VI1PR04MB145553411CE22AE1ECF2A2D78B1C0@VI1PR04MB1455.eurprd04.prod.outlook.com>
Date:	Tue, 9 Aug 2016 00:36:43 +0000
From:	Peter Chen <peter.chen@....com>
To:	Stephen Boyd <stephen.boyd@...aro.org>,
	Peter Chen <hzpeterchen@...il.com>
CC:	"linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
	Felipe Balbi <balbi@...nel.org>, Arnd Bergmann <arnd@...db.de>,
	Neil Armstrong <narmstrong@...libre.com>,
	"linux-arm-msm@...r.kernel.org" <linux-arm-msm@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	Bjorn Andersson <bjorn.andersson@...aro.org>,
	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	Andy Gross <andy.gross@...aro.org>,
	"linux-arm-kernel@...ts.infradead.org" 
	<linux-arm-kernel@...ts.infradead.org>
Subject: RE: [PATCH v2 06/22] usb: chipidea: Add platform flag for wrapper phy
 management

 
>> On Fri, Aug 05, 2016 at 02:46:00PM -0700, Stephen Boyd wrote:
>> > Quoting Peter Chen (2016-07-08 02:25:35)
>> > >
>> > > How you handle the code for PHY getting at probe?
>> > >
>> >
>> > Which probe? Glue layer probe? In my case I'm not using the phy
>> > until the RESET/STOPPED event so I just rely on the chipidea core to
>> > get the phy and then control the phy manually in the glue layer.
>>
>> I have no idea about it after reading your patch 10/22.
>>
>
>Sorry, you lost me now. What is the question?

At first, I don't know how you get the PHY for ULPI. But after reading your
later patch, I know it. So,  it is ok for this patch.

Acked-by: Peter Chen <peter.chen@....com>

Peter

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ