Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp1730903imi; Sat, 23 Jul 2022 15:51:47 -0700 (PDT) X-Google-Smtp-Source: AGRyM1u0DqicONUPN4HO+ZtbbJ93cxrDtCbfmnvxAvcpXvIoC6FFh5gr1JyTSMWgnxXg+rx7+yIs X-Received: by 2002:a17:903:d4:b0:16d:251e:5ac7 with SMTP id x20-20020a17090300d400b0016d251e5ac7mr5865989plc.56.1658616707417; Sat, 23 Jul 2022 15:51:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658616707; cv=none; d=google.com; s=arc-20160816; b=CoDj3R+Wz9c1YpwsblLdKFEGKQiMrnP2IuGpXSNZ8XlomJSJWo1f3kZ8P+iKE39Ofb oWNBZmqZ+pXShzWgUt6VtlXsurhnh/6fN1yh+L9moyaVyKGGh0NWwkXcchHSivtXnL0b W8UbvIDVNXa1LruvGSFaZy9UiZLilQuksk7lzIfyQbw3LuamxI5/9up6zCcZMEOg6BM9 5YjJ6rO6Yf+ZrXi4aPQhdWXn/cjAsxku4j5Kc037fPMx9K2LtEWfXvswLZA0MkxSTknJ o09WcnH46YYVETBC7q7OP2Xzk1qO0smaOGrol/XfltMgUXA4hw1GLq7dn4bCieYbox29 40Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=iGCbFdlBTzAuiBGLOtwTpT2WdPgCLGwr/LKBh4mT2I8=; b=sQuzux7kKbprA79FjvPj0BK+B0SDh0bPZavUcU1QvCVYOuabX3Q2LaYyt/zxA5bG8V dutj/apoTSDbjAQDAP4cAcyjSgiCwVNAdICMnwPNARQDWZ547dmz1OTYLMLbof5H9o0w sJxRp5THJ86L7wvsB4n+gLQiKvi+8QxOupHeNcAwC8Gh6gNllpozZ0X1ZMbrwP01b2hh 8fVox7LPtZptGl8dkHGSaGqaiJHXJmfR9GA5J9BID7vSKd7JxGyETxk6X/FpaNNmo2K+ UhPrMCbVNPiNOlVoCSDDlbormiE4sdBdBOfXMUpg6t5/PvfdvTEOUMNP/CsQUVTbWT6p olhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=mlj0vCbM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u187-20020a6260c4000000b00528bffe4553si9562921pfb.107.2022.07.23.15.51.33; Sat, 23 Jul 2022 15:51:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=mlj0vCbM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238975AbiGWWuc (ORCPT + 99 others); Sat, 23 Jul 2022 18:50:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42554 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236450AbiGWWuV (ORCPT ); Sat, 23 Jul 2022 18:50:21 -0400 Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9AF22B4B0; Sat, 23 Jul 2022 15:50:20 -0700 (PDT) Received: by mail-wr1-x436.google.com with SMTP id q18so615811wrx.8; Sat, 23 Jul 2022 15:50:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=iGCbFdlBTzAuiBGLOtwTpT2WdPgCLGwr/LKBh4mT2I8=; b=mlj0vCbMggjKmdckuFteu4WQcrbibul3YZBYK8HL9sttdJ1gDBWBDNMQist5ZSxsYz 4S0wi/uLjNJDj73xB0cKcXSLiV4rv3lwx5DvhRfMPTPPbRVBhYbA947nyiTTbhRAQkhJ AA9tU7EQLQJp2bGZBMO5kbK8pjzI6jdJC/jgqNPoOHAybWS9cftB15fhGcvR7g4At6gu aCWzPRpqFK2/0T7dNIxxOboUH4kLyhAjov+2U+55dB2LrS8B4HpGXo+FiWItKZG+qpB3 Me7JLJPdl/E/LB+yOuAXy9felk0a6GQKLij3dOs11CVU8pxRkQwF+xhlXoYDKrqH+e6M rqCA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=iGCbFdlBTzAuiBGLOtwTpT2WdPgCLGwr/LKBh4mT2I8=; b=xo7oCxdx6sF9Crj4krXLZ4UaGX/lmMspN0jwuDPCrMWyGuAOuOD9bWIBu6SRjRREF7 a2HwOE3E9KEq/NqSQ2HdmxvnTIE6SqvSZ9LjK/3B7DReM07+/hrIOA8OL2QlG8Hn3FEa nnWoDZqq2nkpIPNtxFg+G3HAYCi9IFusmZfqWf77RAnhYca09XrBbf0bUlB0nkSDZUXe cSwGS7uYOiPV3OzLwnGrL1tUrbCumj14vazAR+LDVBSs/E3g0HaKdxS6KoTCCfosS1rX ZNyUarLNefXt57wph+ItzRYN0fmj7HcVobwdALogvDJ10aX+M8F4LjjBGeTBibdWT02F S/FQ== X-Gm-Message-State: AJIora9hWd7cpvEvWubv4oAQrt6gYhKN5e+dhtVMB5XsperGGqlVKQB8 I2L8hAdZn9TH3HSj79Eczdk= X-Received: by 2002:a5d:64cc:0:b0:21d:a4bd:fdbe with SMTP id f12-20020a5d64cc000000b0021da4bdfdbemr3692388wri.580.1658616619030; Sat, 23 Jul 2022 15:50:19 -0700 (PDT) Received: from xws.localdomain (pd9ea3743.dip0.t-ipconnect.de. [217.234.55.67]) by smtp.gmail.com with ESMTPSA id x3-20020adff0c3000000b0021deba99142sm7799284wro.40.2022.07.23.15.50.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 23 Jul 2022 15:50:18 -0700 (PDT) From: Maximilian Luz To: Andy Gross , Bjorn Andersson , Ard Biesheuvel Cc: Konrad Dybcio , Rob Herring , Krzysztof Kozlowski , Steev Klimaszewski , Shawn Guo , Sudeep Holla , Cristian Marussi , Greg Kroah-Hartman , linux-arm-msm@vger.kernel.org, linux-efi@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Maximilian Luz Subject: [PATCH 4/4] dt-bindings: firmware: Add Qualcomm UEFI Secure Application client Date: Sun, 24 Jul 2022 00:49:49 +0200 Message-Id: <20220723224949.1089973-5-luzmaximilian@gmail.com> X-Mailer: git-send-email 2.37.1 In-Reply-To: <20220723224949.1089973-1-luzmaximilian@gmail.com> References: <20220723224949.1089973-1-luzmaximilian@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add bindings for the Qualcomm Trusted Execution Environment (TrEE) UEFI Secure application (uefisecapp) client. Signed-off-by: Maximilian Luz --- .../firmware/qcom,tee-uefisecapp.yaml | 38 +++++++++++++++++++ MAINTAINERS | 1 + 2 files changed, 39 insertions(+) create mode 100644 Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml diff --git a/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml b/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml new file mode 100644 index 000000000000..9e5de1005d5c --- /dev/null +++ b/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml @@ -0,0 +1,38 @@ +# SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/soc/qcom/qcom,rpmh-rsc.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Qualcomm Trusted Execution Environment UEFI Secure Application + +maintainers: + - Maximilian Luz + +description: | + Various Qualcomm SoCs do not allow direct access to UEFI variables. Instead, + these need to be accessed via the UEFI Secure Application (uefisecapp), + residing in the Trusted Execution Environment (TrEE). These bindings mark the + presence of uefisecapp and allow the respective client driver to load and + install efivar operations, providing the kernel with access to UEFI + variables. + +properties: + compatible: + const: qcom,tee-uefisecapp + +required: + - compatible + +additionalProperties: false + +examples: + - | + firmware { + scm { + compatible = "qcom,scm-sc8180x", "qcom,scm"; + }; + tee-uefisecapp { + compatible = "qcom,tee-uefisecapp"; + }; + }; diff --git a/MAINTAINERS b/MAINTAINERS index 6e014e16fc82..00436245189d 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -16607,6 +16607,7 @@ QUALCOMM UEFISECAPP DRIVER M: Maximilian Luz L: linux-arm-msm@vger.kernel.org S: Maintained +F: Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml F: drivers/firmware/qcom_tee_uefisecapp.c QUALCOMM VENUS VIDEO ACCELERATOR DRIVER -- 2.37.1