lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251014044135.177210-7-ghatto404@gmail.com>
Date: Tue, 14 Oct 2025 00:41:35 -0400
From: Eric Gonçalves <ghatto404@...il.com>
To: Krzysztof Kozlowski <krzk@...nel.org>,
	Bjorn Andersson <andersson@...nel.org>,
	Konrad Dybcio <konradybcio@...nel.org>,
	Rob Herring <robh@...nel.org>,
	Conor Dooley <conor+dt@...nel.org>
Cc: linux-arm-msm@...r.kernel.org,
	devicetree@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: [PATCH v2 6/6] arm64: dts: qcom: r0q: fix reserved memory regions

ADSP and video memory regions in SoC dtsi is misplaced on this
platform, fix them by deleting those nodes and redefining them.

Signed-off-by: Eric Gonçalves <ghatto404@...il.com>
---
 arch/arm64/boot/dts/qcom/sm8450-samsung-r0q.dts | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/arch/arm64/boot/dts/qcom/sm8450-samsung-r0q.dts b/arch/arm64/boot/dts/qcom/sm8450-samsung-r0q.dts
index a3b81403d180..8ed8a67aae0d 100644
--- a/arch/arm64/boot/dts/qcom/sm8450-samsung-r0q.dts
+++ b/arch/arm64/boot/dts/qcom/sm8450-samsung-r0q.dts
@@ -10,6 +10,9 @@
 #include "pm8350c.dtsi"
 #include "pmk8350.dtsi"
 
+/delete-node/ &adsp_mem;
+/delete-node/ &video_mem;
+
 / {
 	model = "Samsung Galaxy S22 5G";
 	compatible = "samsung,r0q", "qcom,sm8450";
@@ -64,6 +67,16 @@ splash-region@...00000 {
 			reg = <0x0 0xb8000000 0x0 0x2b00000>;
 			no-map;
 		};
+
+		adsp_mem: memory@...00000 {
+			reg = <0x0 0x84500000 0x0 0x3b00000>;
+			no-map;
+		};
+
+		video_mem: memory@...00000 {
+			reg = <0x0 0x83e00000 0x0 0x700000>;
+			no-map;
+		};
 	};
 
 	/*
-- 
2.51.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ