lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <169518233725.1055386.8371009743953920681.b4-ty@kernel.org>
Date:   Tue, 19 Sep 2023 20:58:57 -0700
From:   Bjorn Andersson <andersson@...nel.org>
To:     agross@...nel.org, konrad.dybcio@...aro.org, robh+dt@...nel.org,
        krzysztof.kozlowski+dt@...aro.org, conor+dt@...nel.org,
        linux-arm-msm@...r.kernel.org, devicetree@...r.kernel.org,
        linux-kernel@...r.kernel.org, ohad@...ery.com,
        baolin.wang@...ux.alibaba.com, linux-remoteproc@...r.kernel.org,
        Vignesh Viswanathan <quic_viswanat@...cinc.com>
Cc:     quic_kathirav@...cinc.com, quic_anusha@...cinc.com,
        quic_sjaganat@...cinc.com, quic_srichara@...cinc.com,
        quic_varada@...cinc.com
Subject: Re: (subset) [PATCH v2 0/2] Fix tcsr_mutex register for IPQ6018


On Tue, 05 Sep 2023 15:25:33 +0530, Vignesh Viswanathan wrote:
> IPQ6018 has 32 tcsr_mutex hwlock registers of 0x1000 size each.
> The compatible string qcom,ipq6018-tcsr-mutex is mapped to
> of_msm8226_tcsr_mutex which has 32 locks configured with stride of 0x80
> and doesn't match the HW present in IPQ6018.
> 
> This series fixes the following:
>  1. Fix the tcsr_mutex register size to 0x20000 in IPQ6018 DTSI.
>  2. Remove IPQ6018 specific compatible in hwspinlock driver so that it
>     falls back to pick of_tcsr_mutex data.
> 
> [...]

Applied, thanks!

[1/2] arm64: dts: qcom: ipq6018: Fix tcsr_mutex register size
      commit: 72fc3d58b87b0d622039c6299b89024fbb7b420f

Best regards,
-- 
Bjorn Andersson <andersson@...nel.org>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ