lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1be14849-ba98-432a-9686-e0189c9c7ffd@kernel.org>
Date: Wed, 4 Sep 2024 12:24:19 +0200
From: Konrad Dybcio <konradybcio@...nel.org>
To: JieGan <quic_jiegan@...cinc.com>, Konrad Dybcio <konradybcio@...nel.org>
Cc: Bjorn Andersson <andersson@...nel.org>, Rob Herring <robh@...nel.org>,
 Krzysztof Kozlowski <krzk+dt@...nel.org>, Conor Dooley
 <conor+dt@...nel.org>, linux-arm-msm@...r.kernel.org,
 devicetree@...r.kernel.org, linux-kernel@...r.kernel.org,
 Tingwei Zhang <quic_tingweiz@...cinc.com>,
 Jinlong Mao <quic_jinlmao@...cinc.com>, Tao Zhang <quic_taozha@...cinc.com>,
 Yuanfang Zhang <quic_yuanfang@...cinc.com>,
 Song Chai <quic_songchai@...cinc.com>, Yushan Li <quic_yushli@...cinc.com>
Subject: Re: [PATCH v1 0/1] arm64: dts: qcom: Add coresight components for
 x1e80100

On 3.09.2024 3:30 AM, JieGan wrote:
> On Mon, Sep 02, 2024 at 05:27:32PM +0200, Konrad Dybcio wrote:
>> On 27.08.2024 9:27 AM, Jie Gan wrote:
>>> Add coresight components for x1e80100. This change includes CTI,
>>> dummy sink, dynamic Funnel, Replicator, STM, TPDM, TPDA and TMC ETF.
>>>
>>> Change in V1:
>>> Check the dtb with dtbs_check W=1, and fix the warnings for
>>> the change.
>>>
>>
>> Applying this series and enabling CORESIGHT=m (along with all the options
>> in menuconfig) breaks booting on my X1E Surface Laptop 7
>>
>> Konrad
> 
> Did not observe any booting issues with our devices. Any relevant log to share?
> This patch also tested by my colleague.

Sorry, it crashes too early and my device doesn't seem to have an
easily accessible serial port. Does any of the functionality
described here require an unsecured device?

What tag did you test this patch against?

> 
> Can you successfully boot without the patch?

Yes.

Konrad

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ