lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <174480737097.2514153.5351260600015584210.robh@kernel.org>
Date: Wed, 16 Apr 2025 07:43:39 -0500
From: "Rob Herring (Arm)" <robh@...nel.org>
To: Vishwaroop A <va@...dia.com>
Cc: linux-tegra@...r.kernel.org, smangipudi@...dia.com, 
 linux-spi@...r.kernel.org, skomatineni@...dia.com, thierry.reding@...il.com, 
 kyarlagadda@...dia.com, ldewangan@...dia.com, linux-kernel@...r.kernel.org, 
 broonie@...nel.org, jonathanh@...dia.com
Subject: Re: [PATCH v3 0/6] Configure Clocks, Add Internal DMA support


On Wed, 16 Apr 2025 11:06:00 +0000, Vishwaroop A wrote:
> This series introduces QSPI clock configuration and internal DMA
> support for Quad SPI controller. The patches have been reorganized
> for better logical flow and review comments from v2 have been addressed.
> 
> Vishwaroop A (6):
>   spi: tegra210-quad: Fix X1_X2_X4 encoding and support x4 transfers
>   spi: tegra210-quad: remove redundant error handling code
>   spi: tegra210-quad: modify chip select (CS) deactivation
>   arm64: tegra: Configure QSPI clocks and add DMA
>   spi: tegra210-quad: Update dummy sequence configuration
>   spi: tegra210-quad: Add support for internal DMA
> 
>  arch/arm64/boot/dts/nvidia/tegra234.dtsi |  10 +
>  drivers/spi/spi-tegra210-quad.c          | 282 +++++++++++++----------
>  2 files changed, 176 insertions(+), 116 deletions(-)
> 
> ---
> v2 -> v3:
>         * Reorganized the patches.
>         * Addressed review comments received on the patches.
> ---
> 
> --
> 2.17.1
> 
> 
> 


My bot found new DTB warnings on the .dts files added or changed in this
series.

Some warnings may be from an existing SoC .dtsi. Or perhaps the warnings
are fixed by another series. Ultimately, it is up to the platform
maintainer whether these warnings are acceptable or not. No need to reply
unless the platform maintainer has comments.

If you already ran DT checks and didn't see these error(s), then
make sure dt-schema is up to date:

  pip3 install dtschema --upgrade


This patch series was applied (using b4) to base:
 Base: attempting to guess base-commit...
 Base: tags/v6.15-rc2-1-g36ff6c3f5084 (exact match)

If this is not the correct base, please add 'base-commit' tag
(or use b4 which does this automatically)

New warnings running 'make CHECK_DTBS=y for arch/arm64/boot/dts/nvidia/' for 20250416110606.2737315-1-va@...dia.com:

arch/arm64/boot/dts/nvidia/tegra234-p3737-0000+p3701-0008.dtb: spi@...0000 (nvidia,tegra234-qspi): Unevaluated properties are not allowed ('iommus' was unexpected)
	from schema $id: http://devicetree.org/schemas/spi/nvidia,tegra210-quad.yaml#
arch/arm64/boot/dts/nvidia/tegra234-p3768-0000+p3767-0000.dtb: spi@...0000 (nvidia,tegra234-qspi): Unevaluated properties are not allowed ('iommus' was unexpected)
	from schema $id: http://devicetree.org/schemas/spi/nvidia,tegra210-quad.yaml#
arch/arm64/boot/dts/nvidia/tegra234-p3768-0000+p3767-0005.dtb: spi@...0000 (nvidia,tegra234-qspi): Unevaluated properties are not allowed ('iommus' was unexpected)
	from schema $id: http://devicetree.org/schemas/spi/nvidia,tegra210-quad.yaml#
arch/arm64/boot/dts/nvidia/tegra234-p3737-0000+p3701-0000.dtb: spi@...0000 (nvidia,tegra234-qspi): Unevaluated properties are not allowed ('iommus' was unexpected)
	from schema $id: http://devicetree.org/schemas/spi/nvidia,tegra210-quad.yaml#
arch/arm64/boot/dts/nvidia/tegra234-p3740-0002+p3701-0008.dtb: spi@...0000 (nvidia,tegra234-qspi): Unevaluated properties are not allowed ('iommus' was unexpected)
	from schema $id: http://devicetree.org/schemas/spi/nvidia,tegra210-quad.yaml#






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ