lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20211214234648.23369-1-david@ixit.cz>
Date:   Wed, 15 Dec 2021 00:46:47 +0100
From:   David Heidelberg <david@...t.cz>
To:     Andy Gross <agross@...nel.org>,
        Bjorn Andersson <bjorn.andersson@...aro.org>,
        Rob Herring <robh+dt@...nel.org>
Cc:     Caleb Connolly <caleb@...nolly.tech>,
        David Heidelberg <david@...t.cz>,
        linux-arm-msm@...r.kernel.org, devicetree@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: [PATCH] arm64: dts: sdm845: rename memory@ nodes to more descriptive names

Pure effort to avoid `make dtbs_check` warnings about memory@ nodes, which
should have property device_type set to memory.

Fixes warnings as:
arch/arm64/boot/dts/qcom/sdm845-oneplus-fajita.dt.yaml: memory@...00000: 'device_type' is a required property
        From schema: dtschema/schemas/memory.yaml

Signed-off-by: David Heidelberg <david@...t.cz>
---
 .../boot/dts/qcom/sdm845-oneplus-common.dtsi  |  8 ++--
 arch/arm64/boot/dts/qcom/sdm845.dtsi          | 38 +++++++++----------
 2 files changed, 23 insertions(+), 23 deletions(-)

diff --git a/arch/arm64/boot/dts/qcom/sdm845-oneplus-common.dtsi b/arch/arm64/boot/dts/qcom/sdm845-oneplus-common.dtsi
index 7f42e5315ecb..511ca72f465e 100644
--- a/arch/arm64/boot/dts/qcom/sdm845-oneplus-common.dtsi
+++ b/arch/arm64/boot/dts/qcom/sdm845-oneplus-common.dtsi
@@ -54,7 +54,7 @@ reserved-memory {
 		 * it is otherwise possible for an allocation adjacent to the
 		 * rmtfs_mem region to trigger an XPU violation, causing a crash.
 		 */
-		rmtfs_lower_guard: memory@...00000 {
+		rmtfs_lower_guard: rmtfs-lower-guard@...00000 {
 			no-map;
 			reg = <0 0xf5b00000 0 0x1000>;
 		};
@@ -63,7 +63,7 @@ rmtfs_lower_guard: memory@...00000 {
 		 * but given the same address every time. Hard code it as this address is
 		 * where the modem firmware expects it to be.
 		 */
-		rmtfs_mem: memory@...01000 {
+		rmtfs_mem: rmtfs-mem@...01000 {
 			compatible = "qcom,rmtfs-mem";
 			reg = <0 0xf5b01000 0 0x200000>;
 			no-map;
@@ -71,7 +71,7 @@ rmtfs_mem: memory@...01000 {
 			qcom,client-id = <1>;
 			qcom,vmid = <15>;
 		};
-		rmtfs_upper_guard: memory@...01000 {
+		rmtfs_upper_guard: rmtfs-upper-guard@...01000 {
 			no-map;
 			reg = <0 0xf5d01000 0 0x1000>;
 		};
@@ -80,7 +80,7 @@ rmtfs_upper_guard: memory@...01000 {
 		 * It seems like reserving the old rmtfs_mem region is also needed to prevent
 		 * random crashes which are most likely modem related, more testing needed.
 		 */
-		removed_region: memory@...00000 {
+		removed_region: removed-region@...00000 {
 			no-map;
 			reg = <0 0x88f00000 0 0x1c00000>;
 		};
diff --git a/arch/arm64/boot/dts/qcom/sdm845.dtsi b/arch/arm64/boot/dts/qcom/sdm845.dtsi
index 5fac82f026fd..28f7dc5c886a 100644
--- a/arch/arm64/boot/dts/qcom/sdm845.dtsi
+++ b/arch/arm64/boot/dts/qcom/sdm845.dtsi
@@ -79,22 +79,22 @@ reserved-memory {
 		#size-cells = <2>;
 		ranges;
 
-		hyp_mem: memory@...00000 {
+		hyp_mem: hyp-mem@...00000 {
 			reg = <0 0x85700000 0 0x600000>;
 			no-map;
 		};
 
-		xbl_mem: memory@...00000 {
+		xbl_mem: xbl-mem@...00000 {
 			reg = <0 0x85e00000 0 0x100000>;
 			no-map;
 		};
 
-		aop_mem: memory@...c0000 {
+		aop_mem: aop-mem@...c0000 {
 			reg = <0 0x85fc0000 0 0x20000>;
 			no-map;
 		};
 
-		aop_cmd_db_mem: memory@...e0000 {
+		aop_cmd_db_mem: aop-cmd-db-mem@...e0000 {
 			compatible = "qcom,cmd-db";
 			reg = <0x0 0x85fe0000 0 0x20000>;
 			no-map;
@@ -107,12 +107,12 @@ smem@...00000 {
 			hwlocks = <&tcsr_mutex 3>;
 		};
 
-		tz_mem: memory@...00000 {
+		tz_mem: tz@...00000 {
 			reg = <0 0x86200000 0 0x2d00000>;
 			no-map;
 		};
 
-		rmtfs_mem: memory@...00000 {
+		rmtfs_mem: rmtfs@...00000 {
 			compatible = "qcom,rmtfs-mem";
 			reg = <0 0x88f00000 0 0x200000>;
 			no-map;
@@ -121,67 +121,67 @@ rmtfs_mem: memory@...00000 {
 			qcom,vmid = <15>;
 		};
 
-		qseecom_mem: memory@...00000 {
+		qseecom_mem: qseecom@...00000 {
 			reg = <0 0x8ab00000 0 0x1400000>;
 			no-map;
 		};
 
-		camera_mem: memory@...00000 {
+		camera_mem: camera-mem@...00000 {
 			reg = <0 0x8bf00000 0 0x500000>;
 			no-map;
 		};
 
-		ipa_fw_mem: memory@...00000 {
+		ipa_fw_mem: ipa-fw@...00000 {
 			reg = <0 0x8c400000 0 0x10000>;
 			no-map;
 		};
 
-		ipa_gsi_mem: memory@...10000 {
+		ipa_gsi_mem: ipa-gsi@...10000 {
 			reg = <0 0x8c410000 0 0x5000>;
 			no-map;
 		};
 
-		gpu_mem: memory@...15000 {
+		gpu_mem: gpu@...15000 {
 			reg = <0 0x8c415000 0 0x2000>;
 			no-map;
 		};
 
-		adsp_mem: memory@...00000 {
+		adsp_mem: adsp@...00000 {
 			reg = <0 0x8c500000 0 0x1a00000>;
 			no-map;
 		};
 
-		wlan_msa_mem: memory@...00000 {
+		wlan_msa_mem: wlan-msa@...00000 {
 			reg = <0 0x8df00000 0 0x100000>;
 			no-map;
 		};
 
-		mpss_region: memory@...00000 {
+		mpss_region: mpss@...00000 {
 			reg = <0 0x8e000000 0 0x7800000>;
 			no-map;
 		};
 
-		venus_mem: memory@...00000 {
+		venus_mem: venus@...00000 {
 			reg = <0 0x95800000 0 0x500000>;
 			no-map;
 		};
 
-		cdsp_mem: memory@...00000 {
+		cdsp_mem: cdsp@...00000 {
 			reg = <0 0x95d00000 0 0x800000>;
 			no-map;
 		};
 
-		mba_region: memory@...00000 {
+		mba_region: mba@...00000 {
 			reg = <0 0x96500000 0 0x200000>;
 			no-map;
 		};
 
-		slpi_mem: memory@...00000 {
+		slpi_mem: slpi@...00000 {
 			reg = <0 0x96700000 0 0x1400000>;
 			no-map;
 		};
 
-		spss_mem: memory@...00000 {
+		spss_mem: spss@...00000 {
 			reg = <0 0x97b00000 0 0x100000>;
 			no-map;
 		};
-- 
2.33.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ