Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp556051imn; Tue, 26 Jul 2022 03:25:17 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uZ06zIyHv4xMI5DOZX7qj2IiEuULOLa0lCFRMQWVgtWLb3090rUsrYC1IAANCdzUpaLTIj X-Received: by 2002:a05:6a00:892:b0:52b:c986:c781 with SMTP id q18-20020a056a00089200b0052bc986c781mr16965334pfj.64.1658831115673; Tue, 26 Jul 2022 03:25:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658831115; cv=none; d=google.com; s=arc-20160816; b=nNSsraDj+GpIgPle2WqM9lqHA22Oha5CGZBGhVc2QicxDc68DIjnZmRNtkYdXnOLtW o8luRL8dIh/fuFIX+JdpvALuUEBLg0L7qtYW8S2+Gg+ugqQoewGPv+AO2xsiATAE87i+ kMHciY1Xh75gTcr2445kzKymCo7IXOxx3/GLP6DelTHZsLrF+JD7/RD/gB0P7UFnFHJV Tw0GMposi7yjErShjOYkhqkd5QPJ2HziI8x8gxd+Sy5AJS32cDUQeIXHCpBFiWfGs69f NpNQ0KNvvN9yxBh54Lr4rAeBxplHTS/K15n1EuiXBk9UFqBvBj8TAsSt3ieSSeopiYfA mmZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=k5O4EHVtxr88sGikNEClrHBrRMv6Wt5HYjbVbFJmD00=; b=cqGUVsh0hDDHdWzVILkOkMFN2YxFmH1nv9KATg5G8BSDnAXN+0eqUMu7mBCZGKqvpD NkL6MLeK1sdb3koWF+fQcv29oslVmW3IUJXdSFJsxj8IDa8TTayGiakzUThn53RnUcUy 7kDU2n0Sr9KYUXYb2wpIdej/r+fPe72KX8aKr70wEOwnYeZYinO4bUQDmJUH1WXjPw/3 wEkmkOkyAU71jYGk1dTVjtgvsvWBEliuc+IT7dOFkBOntl5czizhGX3J1+/+7jxMToWc 6HtjNa9qEmyo7STh1JmloJu/QhD6pFiWj03cpNbQbUJwBVuJ8U/WkX0mVwxeUcvTCbPf Y3ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=vJpAIwYZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z16-20020a62d110000000b005250a05fff7si16913876pfg.50.2022.07.26.03.24.59; Tue, 26 Jul 2022 03:25:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=vJpAIwYZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238242AbiGZKRI (ORCPT + 99 others); Tue, 26 Jul 2022 06:17:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48672 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232849AbiGZKRG (ORCPT ); Tue, 26 Jul 2022 06:17:06 -0400 Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3BFEC25EA6 for ; Tue, 26 Jul 2022 03:17:04 -0700 (PDT) Received: by mail-lj1-x22e.google.com with SMTP id p22so6178417lji.10 for ; Tue, 26 Jul 2022 03:17:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=k5O4EHVtxr88sGikNEClrHBrRMv6Wt5HYjbVbFJmD00=; b=vJpAIwYZMErEj5rbGqQ350mc3DCwuGHIizHIV5HmshxNf4Nft1JqUJibbEaQ4UGP3g vw39nBSZJfIqI/XG3vZZaz2dTrpo6uIZi9xYNSTeRGR/DQif/KbWGwtkq388iwShp0gv mP9rVynS6uo9w6P5Jl9Rb1x2SwhDE32s8qhojzZvMBIhdENmCL9rroS/hIDTgtD+zf6z r2ASk5SDwigvx5mC2rkitjtqoKrBzHLSxEzgpL4MnvXE6QduyDQwm115Paei4jBS1Sw0 pP/XZdNcsEpxhoxulbvaCJVg7WbhwAwRscys4wzpeIRejNy2KTiv0BM4aZLWBqUsLC5v 0ijQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=k5O4EHVtxr88sGikNEClrHBrRMv6Wt5HYjbVbFJmD00=; b=bnu0VHkSe2sM/bU1EdpC6wFIgW106K7FgwtE1DcW1H7dy/iPBNJd5dY7byw760CddY m6gnVfhvdtyITvNtLQKon8Q4kABimSIUuEVl9wdIOdAFfNCKKUygUUYyppT9DPUK/klY qn4A/2IpWqdrvsRBtJLBCJ8J3I8MRVQ9gu8Fp0SnhjOj/AuWIOeUR6SR3CuICIyTm7wu tONn2o2ruaRF0TPiLpPbq4YEGIwCOwrnSpRK0cEDLQN4T50I3GINXV9F2eu4T+z+Rw6+ Uy3TUwkJAYSfyp3oIHi7EoVh40aPH6ARhq82UM7HOAmS/da0P4EKMJPbXVgcYKwvN0RT Yc2A== X-Gm-Message-State: AJIora/RGb/A5kQpaTDT9FCyfj8/h0PEUu9y/p26pqD4/vuAZlG2bzwa EfWyLhyUiggFYt6t7EFSwh2mEw== X-Received: by 2002:a2e:9d02:0:b0:25d:d6b9:b753 with SMTP id t2-20020a2e9d02000000b0025dd6b9b753mr5387184lji.344.1658830622608; Tue, 26 Jul 2022 03:17:02 -0700 (PDT) Received: from [192.168.3.197] (78-26-46-173.network.trollfjord.no. [78.26.46.173]) by smtp.gmail.com with ESMTPSA id q21-20020ac24a75000000b00484e9e254c4sm3142760lfp.100.2022.07.26.03.17.01 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 26 Jul 2022 03:17:02 -0700 (PDT) Message-ID: Date: Tue, 26 Jul 2022 12:17:00 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Subject: Re: [PATCH 4/4] dt-bindings: firmware: Add Qualcomm UEFI Secure Application client Content-Language: en-US To: Maximilian Luz , Andy Gross , Bjorn Andersson , Ard Biesheuvel Cc: Konrad Dybcio , Rob Herring , Krzysztof Kozlowski , Steev Klimaszewski , Shawn Guo , Sudeep Holla , Cristian Marussi , Greg Kroah-Hartman , linux-arm-msm@vger.kernel.org, linux-efi@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org References: <20220723224949.1089973-1-luzmaximilian@gmail.com> <20220723224949.1089973-5-luzmaximilian@gmail.com> From: Krzysztof Kozlowski In-Reply-To: <20220723224949.1089973-5-luzmaximilian@gmail.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 24/07/2022 00:49, Maximilian Luz wrote: > Add bindings for the Qualcomm Trusted Execution Environment (TrEE) UEFI > Secure application (uefisecapp) client. > > Signed-off-by: Maximilian Luz > --- > .../firmware/qcom,tee-uefisecapp.yaml | 38 +++++++++++++++++++ > MAINTAINERS | 1 + > 2 files changed, 39 insertions(+) > create mode 100644 Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml > > diff --git a/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml b/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml > new file mode 100644 > index 000000000000..9e5de1005d5c > --- /dev/null > +++ b/Documentation/devicetree/bindings/firmware/qcom,tee-uefisecapp.yaml > @@ -0,0 +1,38 @@ > +# SPDX-License-Identifier: (GPL-2.0 OR BSD-2-Clause) > +%YAML 1.2 > +--- > +$id: http://devicetree.org/schemas/soc/qcom/qcom,rpmh-rsc.yaml# Does not look like you tested the bindings. Please run `make dt_binding_check` (see Documentation/devicetree/bindings/writing-schema.rst for instructions). > +$schema: http://devicetree.org/meta-schemas/core.yaml# > + > +title: Qualcomm Trusted Execution Environment UEFI Secure Application > + > +maintainers: > + - Maximilian Luz > + > +description: | > + Various Qualcomm SoCs do not allow direct access to UEFI variables. Instead, > + these need to be accessed via the UEFI Secure Application (uefisecapp), > + residing in the Trusted Execution Environment (TrEE). These bindings mark the > + presence of uefisecapp and allow the respective client driver to load and > + install efivar operations, providing the kernel with access to UEFI > + variables. > + > +properties: > + compatible: > + const: qcom,tee-uefisecapp Isn't this SoC-specific device? Generic compatibles are usually not expected. > + > +required: > + - compatible > + > +additionalProperties: false > + > +examples: > + - | > + firmware { > + scm { > + compatible = "qcom,scm-sc8180x", "qcom,scm"; > + }; > + tee-uefisecapp { > + compatible = "qcom,tee-uefisecapp"; You did not model here any dependency on SCM. This is not full description of the firmware/hardware. Best regards, Krzysztof