Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp1288104rwb; Wed, 26 Jul 2023 10:07:55 -0700 (PDT) X-Google-Smtp-Source: APBJJlEVqt9jQlo76f7jybiJIuMq6re8KLf0Jp5PUiWN9OCztqHrwJ3EawXsJb4tTQWGxBPB/nB9 X-Received: by 2002:a05:6e02:e50:b0:345:a3c6:87b8 with SMTP id l16-20020a056e020e5000b00345a3c687b8mr2296614ilk.12.1690391275284; Wed, 26 Jul 2023 10:07:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690391275; cv=none; d=google.com; s=arc-20160816; b=TK9qPVSvP7aNFm16XrVvPN+JcB/PUX2KR/7NF00eg83UDbRai3S+EXZ5x4QF+PWSse Yz/Kj5uIR1hB2uPTVUuiEPE6wxPNZ7msMgYPY2uVSzoCyvoeZEsSxRIqptWsOoKWxmDl lTsLKW2rSRP0hoP/3ebzG4no4FOPZA7ZxIEGFiDW4LX06lpxLzc7fJHYTk+w3gGLcChi 5bUscKjF9wftvdnPLrN/V8gydG5vTNCJ6xw33MrklT8ixBsoDvzzMmgdYYqY/NXlWj3V G4iOVtWdibm1l0IjpgY9PxYODePR6aGvNWJIzcyNwYNABS4UfMzLH4AJTKJ9CyMNF7JF z9Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=XJ0wRT0pBI050tMpYRdVb1YkxNIPTOyXrm0TE4DLudk=; fh=kN7+M3AYIgiY3y3TeCONu7aP/ankex2FU5XAmv0BBrs=; b=rgZoTILiOwMBaMdmA+BDYqgSW3ZHMqJjGaG/bwINdHW7dtUqPBu1UU0J9j9DB0YV8T nj6Ph+pT00jV5SnAvb429GNbuJy6NQ2RrVNa2xNFm7lwPW3jgCG7D6LQdWPtmCV69URv oO1z2wkprvF0Gg83UNvD1XXjBoAQsju+KrzhAo7Pr5cUuJZb6qZwwQ4tvTM1v999DzCM BTNAy9vUF718vtpGomM59dBwKQ5nJYJH3DkCOAP4wzwTHnPAu2jj8AZy78HD0vyQ3Doq s8eJ4S15aJdDYcAaNHNhvN/9NfCqFohalMDotp0TXHdVk1AwHN4t2fWoP5R4hoJ84vba ksWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QdpTr3VB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h23-20020a656397000000b0055c1fb5a4a9si12977303pgv.661.2023.07.26.10.07.42; Wed, 26 Jul 2023 10:07:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QdpTr3VB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230410AbjGZQkq (ORCPT + 99 others); Wed, 26 Jul 2023 12:40:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55860 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230236AbjGZQkn (ORCPT ); Wed, 26 Jul 2023 12:40:43 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7B1C926AE; Wed, 26 Jul 2023 09:40:42 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 03B3A61B68; Wed, 26 Jul 2023 16:40:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7F047C433C9; Wed, 26 Jul 2023 16:40:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1690389641; bh=xi5pkQ9Tg9na29dO/s5rHGt9JpISIfvqy22VjzX/1gA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=QdpTr3VBWsh7BRv21+96+VTltIOXif1+4R+Ybp42rMF7CLq9VJfCyYHhXoZHNiaB4 GXBVIbocKFgsA1eq6WnRYIzjweWSxxYeshz7FyDvOZxPqoLAKv33YEBFS968fVdTZP NhF1iCRQdoEVRp3pvCDLTAphmkMm83oOfWsky90NRQHcCDXooaxeylXqP40n3AlpOA qaUa3+EYQlkfdLjuNqrPNpjp0pJaY8cU1WYXP9kynym9ovQjD6wxhsMPOSmz6TrMBc ZCsaJmWFxb82lt34u++ew2HUAUbaT99b64iIqI8pNK5+x/Mbg+dPQOwwdBEd8+NIb6 1DquZ87IVdCeA== Received: (nullmailer pid 1562148 invoked by uid 1000); Wed, 26 Jul 2023 16:40:39 -0000 Date: Wed, 26 Jul 2023 10:40:39 -0600 From: Rob Herring To: Komal Bajaj Cc: agross@kernel.org, andersson@kernel.org, konrad.dybcio@linaro.org, krzysztof.kozlowski+dt@linaro.org, conor+dt@kernel.org, srinivas.kandagatla@linaro.org, linux-arm-msm@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 1/2] dt-bindings: nvmem: sec-qfprom: Add bindings for secure qfprom Message-ID: <20230726164039.GA1558299-robh@kernel.org> References: <20230724083849.8277-1-quic_kbajaj@quicinc.com> <20230724083849.8277-2-quic_kbajaj@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230724083849.8277-2-quic_kbajaj@quicinc.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 24, 2023 at 02:08:48PM +0530, Komal Bajaj wrote: > This patch adds bindings for secure qfprom found in QCOM SOCs. > Secure QFPROM driver is based on simple nvmem framework. > > Signed-off-by: Komal Bajaj > --- > .../bindings/nvmem/qcom,sec-qfprom.yaml | 58 +++++++++++++++++++ > 1 file changed, 58 insertions(+) > create mode 100644 Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml > > diff --git a/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml b/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml > new file mode 100644 > index 000000000000..1425ced36fdf > --- /dev/null > +++ b/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml > @@ -0,0 +1,58 @@ > +# SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) > +%YAML 1.2 > +--- > +$id: http://devicetree.org/schemas/nvmem/qcom,sec-qfprom.yaml# > +$schema: http://devicetree.org/meta-schemas/core.yaml# > + > +title: Qualcomm Technologies Inc, Secure QFPROM Efuse > + > +maintainers: > + - Komal Bajaj > + > +description: | Don't need '|' > + For some of the Qualcomm SoC's, it is possible that > + the qfprom region is protected from non-secure access. > + In such situations, linux will have to use secure calls s/linux/the OS/ > + to read the region. Wrap lines at 80 The wording for this is strange. Only sometimes for this binding do secure calls have to be used? If you are using secure calls, does that mean the 'reg' address is not directly accessible. > + > +allOf: > + - $ref: nvmem.yaml# > + > +properties: > + compatible: > + items: > + - enum: > + - qcom,qdu1000-sec-qfprom > + - const: qcom,sec-qfprom > + > + reg: > + items: > + - description: The secure qfprom corrected region. > + > +required: > + - compatible > + - reg > + > +unevaluatedProperties: false > + > +examples: > + - | > + #include > + > + soc { > + #address-cells = <2>; > + #size-cells = <2>; > + > + efuse@221c8000 { > + compatible = "qcom,qdu1000-sec-qfprom", "qcom,sec-qfprom"; > + reg = <0 0x221c8000 0 0x1000>; > + #address-cells = <1>; > + #size-cells = <1>; > + > + multi_chan_ddr: multi-chan-ddr@12b { > + reg = <0x12b 0x1>; > + bits = <0 2>; > + }; > + }; > + }; > + > -- > 2.40.1 >