lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 27 Apr 2007 11:03:19 +0200 From: Lennert Buytenhek <buytenh@...tstofly.org> To: dmitry pervushin <dpervushin@...il.com> Cc: netdev@...r.kernel.org, nico@....org Subject: Re: [PATCH] SMC on pxa3xx (was: pxa3xx base patch [5/5] - net) On Fri, Apr 27, 2007 at 12:52:08PM +0400, dmitry pervushin wrote: > +#elif defined(CONFIG_PXA3xx) > +#define SMC_CAN_USE_8BIT 1 > +#define SMC_CAN_USE_16BIT 1 > +#define SMC_CAN_USE_32BIT 0 > +#define SMC_IO_SHIFT 0 > +#define SMC_NOWAIT 1 > +#define SMC_USE_PXA_DMA 1 > +#define SMC_inb(a, r) readb((a) + (r)) > +#define SMC_outb(v, a, r) writeb(v, (a) + (r)) > +#define SMC_inw(a, r) readw((a) + (r)) > +#define SMC_outw(v, a, r) writew(v, (a) + (r)) > +#define SMC_insw(a, r, p, l) insw((a) + (r), p, l) > +#define SMC_outsw(a, r, p, l) outsw((a) + (r), p, l) This is bogus, please don't apply. The fact that the SMC might be hooked up in a certain way on one certain PXA3xx board doesn't mean that it will be hooked up in that way on every PXA3xx board. Everything I've seen of the PXA3xx patch set so far is a disaster. MontaVista is flooding every corner of the internet with these crap patches. This idiocy has got to stop. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists