Monday, April 20, 2009
During this upgrade, additional register accesses were decoded into human readable defines and a few translation errors I had made earlier were fixed. These were due to the baud rate latch divisor multiplexing. Basically, if a certain register had a special value on the chip, it causes register addresses to actually write to different data.
As things develop, I will lock the code more properly. Currently you could easily generate unexpected output on the serial port due to a number of race conditions from multiple users. A prime example is the issues arrising from the divisor multiplexing. Future revisions will lock these as it is found to be safe and necessary. However, any locking errors right now will not result in system instabiility, just unexpected results on the serial port.
Friday, April 17, 2009
The code is being converted to spinlocks and is modeled off of another driver, the pl2303. It is another USB-serial converter that I have and has very clean code, so makes a good model.
Friday, April 3, 2009
I've also recieved techniques for keeping compatibility across kernels. I've managed to clean up the code and use less preprocessor logic. This mostly involves using some high level wrapper functions for different kernels, and then using a few inline core functions to do the actual logic. Also trying to clean up some of the ugly macros around this.
Sunday, February 22, 2009
In case the link breaks, it says:
What happened when Google visited this site?
Of the 204 pages we tested on the site over the past 90 days, 1 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2009-02-22, and the last time suspicious content was found on this site was on 2009-02-21.I don't think the site honestly has bad intent, they just seem to not be very careful. So I'll go with that they were hacked. I tried to download some PDF from a different site (that probably linked to MosChip) and it tried to download an exe instead. I wonder how effective viruses are under WINE?
Malicious software includes 9 exploit(s), 1 scripting exploit(s), 1 trojan(s). Successful infection resulted in an average of 45 new processes on the target machine.
Malicious software is hosted on 1 domain(s), including sagardia.com/.
This site was hosted on 1 network(s) including AS6130 (ADN).