From patchwork Thu Dec 9 12:06:23 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Srinivas Kandagatla X-Patchwork-Id: 1565728 Return-Path: X-Original-To: incoming-dt@patchwork.ozlabs.org Delivered-To: patchwork-incoming-dt@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=linaro.org header.i=@linaro.org header.a=rsa-sha256 header.s=google header.b=BzeK7MOw; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=devicetree-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by bilbo.ozlabs.org (Postfix) with ESMTP id 4J8t7n5YF4z9s5P for ; Thu, 9 Dec 2021 23:07:17 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237184AbhLIMKk (ORCPT ); Thu, 9 Dec 2021 07:10:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57120 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237091AbhLIMKh (ORCPT ); Thu, 9 Dec 2021 07:10:37 -0500 Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7EFC7C061353 for ; Thu, 9 Dec 2021 04:07:03 -0800 (PST) Received: by mail-wm1-x330.google.com with SMTP id k37-20020a05600c1ca500b00330cb84834fso6390094wms.2 for ; Thu, 09 Dec 2021 04:07:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=TiA6PgewKebLzTC/0Nu4JQ5xqNf0QAazS+rKuy2Mz40=; b=BzeK7MOwXel3g19BiDr5+Hxt0v6gJsFC4OvI1Uqz8XGJjvcMJ66JZdAC5TyOAF5ju+ 0XyA5c+Oo9PS1vMNn0GhFN06y97/P2CeSojCVzWp5r7v5c4Jg46sqVnmL3enXRXodjSm TwxXmCzpF82WZAs0ygjuPqw9SipJTGMf0w+cTFpd27zosBtsgFDXgaEZLt/zOB9UAg2y GC1MHrlL9oRCixdnaGr9A39sLNr+03NDmAkLEloMtYBAACcQbedFLtjd+nyJ09Z2kO1J NK8643ewa+vInO0JfiaHhmUbUgJ6nHk6NT/OKu/EvNpvAihWrC5rLP0/CoTfkBaYTfT5 HStQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=TiA6PgewKebLzTC/0Nu4JQ5xqNf0QAazS+rKuy2Mz40=; b=Ah9aTYIqzNthwShuRmRXWSKhODA8N7T6QWlzm97VHQptErFlGW2qfNFSmRjyZl5+Hs CWqLvh9txIgsvcr4pG6kC1g87sY7klrZu51IwiDe7NCJgXYo6f4MxSfNOYyrzSKB3U1f xXdi6/kovfvoAv3sHqCQZvkBnOFXY55PL0p2VuUQgt4cMvZJMQJPgjBXFb20QtipnpXb hkDcuoAFXV2Z72bMFHO0aoN9cwnY0nlbsi0SOIBSl8KJahYnX4evjzDOrbygmqen+jo0 dRZWhM7dfe/B70ATtiSNxxu9hTW2DbR1/ZqtMlHNm6vLyKtBpysfPOdHF9Pk4uBniuv4 89bw== X-Gm-Message-State: AOAM531ioJuu/qQwEP1+/P8XQgC0E40odrWKES7KzudGqsp20oVpH+oW +iFfKUhrEXf6xfgDKGpk1UOAoA== X-Google-Smtp-Source: ABdhPJxjsK+eRZ4ZlBtNszX24uRPmMbpOy3grcHWxBMAEA4GMp9WW+pd2vP5Y8FhkRZaUuQBXeX9xQ== X-Received: by 2002:a7b:c848:: with SMTP id c8mr6758428wml.105.1639051621968; Thu, 09 Dec 2021 04:07:01 -0800 (PST) Received: from srini-hackbox.lan (cpc90716-aztw32-2-0-cust825.18-1.cable.virginm.net. [86.26.103.58]) by smtp.gmail.com with ESMTPSA id 4sm7513289wrz.90.2021.12.09.04.07.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Dec 2021 04:07:01 -0800 (PST) From: Srinivas Kandagatla To: robh+dt@kernel.org, gregkh@linuxfoundation.org Cc: devicetree@vger.kernel.org, ekangupt@qti.qualcomm.com, jeyr@codeaurora.org, bkumar@qti.qualcomm.com, linux-kernel@vger.kernel.org, bjorn.andersson@linaro.org, linux-arm-msm@vger.kernel.org, Srinivas Kandagatla Subject: [PATCH v2 5/8] dt-bindings: misc: add property to support non-secure DSP Date: Thu, 9 Dec 2021 12:06:23 +0000 Message-Id: <20211209120626.26373-6-srinivas.kandagatla@linaro.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20211209120626.26373-1-srinivas.kandagatla@linaro.org> References: <20211209120626.26373-1-srinivas.kandagatla@linaro.org> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org From: Jeya R Add property to set DSP domain as non-secure. ADSP/MDSP/SDSP are by default secured, where as CDSP can be either be secured/unsecured. non-secured Compute DSP would allow users to load unsigned process and run hexagon instructions, but limiting access to secured hardware within the DSP. Based on this flag device nodes for secured and unsecured are created. Signed-off-by: Jeya R Signed-off-by: Srinivas Kandagatla --- This patch has dependency this yaml conversion patch: https://lore.kernel.org/lkml/20211208101508.24582-1-david@ixit.cz/T/ Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml b/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml index f42ab208a7fc..f0df0a3bf69f 100644 --- a/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml +++ b/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml @@ -29,6 +29,11 @@ properties: - sdsp - cdsp + qcom,non-secure-domain: + type: boolean + description: > + Property to specify that dsp domain is non-secure. + '#address-cells': const: 1