Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp635515ybg; Wed, 10 Jun 2020 09:39:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz6wFH7EwM2Xbno9x5aT5k8npHWDeIlTQd7vXpjGi0Xp6rtksMkJDM50310wa0WJHfhi4yr X-Received: by 2002:a17:906:edb6:: with SMTP id sa22mr4351042ejb.393.1591807181530; Wed, 10 Jun 2020 09:39:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591807181; cv=none; d=google.com; s=arc-20160816; b=ogsd9qW0QMIU3c3CsJ4WBT8mnNf5TkJFdrZPQg1JcHv2oJAN9F/ptIJcwuGRvwF4+k SgRgDuN4BYTwlE2z7Cq3o0QaR1KuA7DCRwLfGc0ZLK76AazAFaJ+4BLE9PRo7Pcyr7JY g+ItNQzWw8aio7AkWscJcUn0dUn3dV0OjnGjzvZGJyJRYTRt8ofO6qNkLkj5oVPTCEBx dBSmF0XT/rEkt1CxkdHXBFQqwhcGlesnsJskYoij3lpGwMICAbxNknQ5BYLrcapTusHj jy/nN5SCdX+YJpOVQTxtoTDTneE622SP25IAm5OYftGTNiZm7vjV+dwCVIRKZXk9hYGQ 758A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=TvMWV8ZhEJXnMbXLmGeZcASqaeUKEXsvSa4NgUYnSdQ=; b=QAetacKAyngt1KH7iK2+vdj5wU6B5RE52nzhghzJpIQXpm94oEQQ3+l/21XL838zxz NjfdV/a6WPOr19ljX2kJGJSv316sIl2to/vRHNF8Ia8tOulot+fCcwuMXoAnttzWjIA2 o9S7/mbo/6c+D7Ya5LegYGataQsXuRFzVJ6HIOMVMsE0EPiltK+3lllHpQYY+KFOgFGm BNQUcrAJYJtSAYIHPypq9KqJktPm3PtQ2ehSNCHCHtZvjI3tX53p/UnCOLyRdEz0OODS Yo4F4Q3UoUuCO49VqXj3Ztiet876b1L2yD1onBcpgbC2kv/smmEwtGtNoWZkAzFqTYYY rPfA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cxfDQV9c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r8si93342edi.43.2020.06.10.09.39.18; Wed, 10 Jun 2020 09:39:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cxfDQV9c; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729592AbgFJN4l (ORCPT + 99 others); Wed, 10 Jun 2020 09:56:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:47022 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726387AbgFJN4k (ORCPT ); Wed, 10 Jun 2020 09:56:40 -0400 Received: from mail-ot1-f53.google.com (mail-ot1-f53.google.com [209.85.210.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 293A4206F7; Wed, 10 Jun 2020 13:56:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591797400; bh=1Cj2Fu88LV4A1GgSyK0XUoUZIOiwmlOBdE+eZjQYBE8=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=cxfDQV9c7q2CTPvH9bVVbFxTVYhTD/TelQG5Yq27BP7A4hg/tJgMFNm8ivwMarGjO //yBZphNP8a1ZofgNgh46xyBh6cjhJOMoAjWU/nRxi9KUj5kZvUQmlGHWfusM5T/1r qGtTogDeicpAsCSSiGjscw3KPco8jXPwv6C5TMzs= Received: by mail-ot1-f53.google.com with SMTP id k15so1749089otp.8; Wed, 10 Jun 2020 06:56:40 -0700 (PDT) X-Gm-Message-State: AOAM531m1dZIFb+1rkI4bgBKmhKAaakL2oXHRFqarWQQcjeb7xzSCGyZ z3xE15fSJTypdATcudAE3ub/b6BYsO6mgi4WEQ== X-Received: by 2002:a9d:c29:: with SMTP id 38mr2547303otr.107.1591797399576; Wed, 10 Jun 2020 06:56:39 -0700 (PDT) MIME-Version: 1.0 References: <20200601094512.50509-1-sudeep.holla@arm.com> <20200601094512.50509-2-sudeep.holla@arm.com> <20200609223551.GA1620273@bogus> <20200610074346.GB15939@willie-the-truck> In-Reply-To: <20200610074346.GB15939@willie-the-truck> From: Rob Herring Date: Wed, 10 Jun 2020 07:56:28 -0600 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC PATCH 1/3] dt-bindings: Add ARM PSA FF binding for non-secure VM partitions To: Will Deacon Cc: Sudeep Holla , devicetree@vger.kernel.org, "moderated list:ARM/FREESCALE IMX / MXC ARM ARCHITECTURE" , "linux-kernel@vger.kernel.org" , Marc Zyngier Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 10, 2020 at 1:43 AM Will Deacon wrote: > > On Tue, Jun 09, 2020 at 04:35:51PM -0600, Rob Herring wrote: > > On Mon, Jun 01, 2020 at 10:45:10AM +0100, Sudeep Holla wrote: > > > Add devicetree bindings for a Arm PSA FF-A compliant non-secure partition > > > at virtual interface(VMs). > > > > > > Signed-off-by: Sudeep Holla > > > --- > > > .../devicetree/bindings/arm/arm,psa-ffa.txt | 47 +++++++++++++++++++ > > > 1 file changed, 47 insertions(+) > > > create mode 100644 Documentation/devicetree/bindings/arm/arm,psa-ffa.txt > > > > I'm hoping this goes away if the firmware is discoverable, but if not DT > > bindings are DT schema now. > > We'll need the binding for the kvm host side, because there are plenty > of partition properties that are not discoverable (e.g. number of vCPUs). BTW, there's already a partitioning binding for Power in ePAPR. I've not paid much attention to it, but maybe it could be useful here. Rob