lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <167892332568.4030021.2021586293901844303.b4-ty@kernel.org>
Date:   Wed, 15 Mar 2023 16:35:19 -0700
From:   Bjorn Andersson <andersson@...nel.org>
To:     linux-arm-msm@...r.kernel.org, konrad.dybcio@...aro.org,
        agross@...nel.org, robh+dt@...nel.org, devicetree@...r.kernel.org,
        Kathiravan T <quic_kathirav@...cinc.com>,
        krzysztof.kozlowski+dt@...aro.org, linux-kernel@...r.kernel.org,
        lee@...nel.org
Cc:     quic_srichara@...cinc.com, quic_varada@...cinc.com
Subject: Re: (subset) [PATCH V2 0/2] Add the download mode support for IPQ5332

On Fri, 10 Feb 2023 11:33:59 +0530, Kathiravan T wrote:
> Enable the support for download mode to collect the RAM dumps if
> system crashes, to perform the post mortem analysis.
> 
> During the bootup, bootloaders initialize the SMEM. However the bootup
> after crash, SMEM will not be initialized again. If the memory for the
> SMEM is not reserved, linux consumes that region, which leads to the
> loss of SMEM data. So, during the next bootup after crash, bootloaders
> will hang due to invalid data present in the SMEM region. Due to this,
> added the SMEM support along with this series.
> 
> [...]

Applied, thanks!

[1/2] arm64: dts: qcom: ipq5332: enable the download mode support
      commit: ed32155302fc3e5b8d30c51b95666e844f1449e1
[2/2] arm64: dts: qcom: ipq5332: add SMEM support
      commit: d56dd7f935e125244bc15f5a0a9e68cdb0ec87ca

Best regards,
-- 
Bjorn Andersson <andersson@...nel.org>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ