Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp5321377rwb; Tue, 1 Aug 2023 00:01:43 -0700 (PDT) X-Google-Smtp-Source: APBJJlFJddmUYcV5sPi9fyi+Vc24h/xhnQKC/3Hj/zaLq8m/FXD6yDEikXI/fswMV05aZbuge8YY X-Received: by 2002:a19:2d17:0:b0:4f9:69af:9857 with SMTP id k23-20020a192d17000000b004f969af9857mr1486709lfj.51.1690873302785; Tue, 01 Aug 2023 00:01:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690873302; cv=none; d=google.com; s=arc-20160816; b=KFif14XiScUYJVLLuElwwe7HWOcpV6Ybf5Z6aE3Ihj7X71skrgWrzNGJg1JLZjudQY rHdVVPCRK4MlBYwW86P6XaHaO08zoIO6d5h8pjiw5gX6Xxz5sUraa0atDCpN+EiN3oQh YQg5l07SCzLtOIDAm/G0em7tqO1oP5l7lpinWtQZ1fIUu9dTU5ThSR+H7eql1q7b9VKZ nkG6/jPPTN8Ok9gOBL/QTWOxMLIhuX4mdkrC7Dh3eeqGXO/1etpNh+gGUGx2+odsMwcm tZn6q1kvEAkMxAWbqiH0gzP0gH2MCqrcUVyWubBgYpgsNzdl9b6P8+214UNA1uDcmSqS HalQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JbjO2Wfy7QaHBVXCLAhRJLPFixM6KtVmJK6hdGWBKI4=; fh=y0caFB2zyowW0GjJ9gIvLzmJYfJBaLcb02W6Minh+WE=; b=hClfNyDBSoscyev+wxO7cIQM/rNRVOzAyDwbzEGAG+44TRPS3esHhV8kyeAH1Kzs8D e5WvcorQFJGXaCI/Wn/muhhvo6Gl6/CNhm1nLOldpDlvxwvBUKVkY7N0HFaZWgiwiwwJ IZyKl/Wb2SRmFc1Q6XJTl5wUZWQYAOLlPqV3Qw+pnICBHLh6OpHR2wXzCKxN6dseR/3H yN3u6l416lQ1lJaUcNRYEeurlGtlU+XtNL/+IHnqFtbWqu+janaRlf4IEWqk2wIQR4Eb XV74/ZGrtcyIhetTg6nj7OV3ObEKOGPYGVnLpNWA/6wlsPInP/efJJAgkdrvoSRGwRxw 1Dkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=amphz5XN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y2-20020aa7d502000000b00522c0ee05d9si3296448edq.241.2023.08.01.00.01.18; Tue, 01 Aug 2023 00:01:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=amphz5XN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231825AbjHAGld (ORCPT + 99 others); Tue, 1 Aug 2023 02:41:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51812 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231820AbjHAGlb (ORCPT ); Tue, 1 Aug 2023 02:41:31 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3E898DB; Mon, 31 Jul 2023 23:41:23 -0700 (PDT) Received: from pps.filterd (m0279873.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 371504Ac006566; Tue, 1 Aug 2023 06:41:19 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=qcppdkim1; bh=JbjO2Wfy7QaHBVXCLAhRJLPFixM6KtVmJK6hdGWBKI4=; b=amphz5XNwwLVNzIGu0rM1qIO8mM8Jg3MDCFlQiAy47ZLiuEo5wip68F0py5CR3e/PYfC 9SgaOnUKCywDEsV3uOK4JsdxS6VXn77/mF8I3756AGw/MonrkySvl9OViV3Uaj147/ec Q/LsBQ/hQAZlm1LoFAOEP7rJWqTqR02BT4V0vBsa/HVC8Dg0NqWRgOT/Kue6wrnxRHr2 BE5V1p96U28q8JB/mSOoaKFv9bTlQ52ASQcaSoJ7uwgKVhjgoOeZxtR6hfGaSfPT+HzV ACkC320DVrdbJP/mijYD7jrWyRCBy6na+FHENmfJujKfnoX3v+grnfGNdLT7qAZsmpx5 rQ== Received: from nalasppmta02.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3s6e9j1u7a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 01 Aug 2023 06:41:19 +0000 Received: from nalasex01b.na.qualcomm.com (nalasex01b.na.qualcomm.com [10.47.209.197]) by NALASPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 3716erGW014561 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 1 Aug 2023 06:40:53 GMT Received: from hu-kbajaj-hyd.qualcomm.com (10.80.80.8) by nalasex01b.na.qualcomm.com (10.47.209.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.30; Mon, 31 Jul 2023 23:40:49 -0700 From: Komal Bajaj To: , , , , , , CC: , , , Komal Bajaj , Krzysztof Kozlowski Subject: [PATCH v6 1/2] dt-bindings: nvmem: sec-qfprom: Add bindings for secure qfprom Date: Tue, 1 Aug 2023 12:10:24 +0530 Message-ID: <20230801064025.17381-2-quic_kbajaj@quicinc.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230801064025.17381-1-quic_kbajaj@quicinc.com> References: <20230801064025.17381-1-quic_kbajaj@quicinc.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nalasex01b.na.qualcomm.com (10.47.209.197) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: P8ZfGoE89ioVRxqRRYydT0ABlsFK-3r- X-Proofpoint-GUID: P8ZfGoE89ioVRxqRRYydT0ABlsFK-3r- X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.591,FMLib:17.11.176.26 definitions=2023-08-01_03,2023-07-31_02,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 mlxscore=0 spamscore=0 priorityscore=1501 malwarescore=0 mlxlogscore=862 suspectscore=0 bulkscore=0 lowpriorityscore=0 impostorscore=0 phishscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2306200000 definitions=main-2308010060 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch adds bindings for secure qfprom found in QCOM SOCs. Secure QFPROM driver is based on simple nvmem framework. Signed-off-by: Komal Bajaj Reviewed-by: Krzysztof Kozlowski --- .../bindings/nvmem/qcom,sec-qfprom.yaml | 55 +++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml diff --git a/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml b/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml new file mode 100644 index 000000000000..9b133f783d29 --- /dev/null +++ b/Documentation/devicetree/bindings/nvmem/qcom,sec-qfprom.yaml @@ -0,0 +1,55 @@ +# SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/nvmem/qcom,sec-qfprom.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Qualcomm Technologies Inc, Secure QFPROM Efuse + +maintainers: + - Komal Bajaj + +description: + For some of the Qualcomm SoC's, it is possible that the qfprom region is + protected from non-secure access. In such situations, the OS have to use + secure calls to read the region. + +allOf: + - $ref: nvmem.yaml# + +properties: + compatible: + items: + - enum: + - qcom,qdu1000-sec-qfprom + - const: qcom,sec-qfprom + + reg: + items: + - description: The secure qfprom corrected region. + +required: + - compatible + - reg + +unevaluatedProperties: false + +examples: + - | + soc { + #address-cells = <2>; + #size-cells = <2>; + + efuse@221c8000 { + compatible = "qcom,qdu1000-sec-qfprom", "qcom,sec-qfprom"; + reg = <0 0x221c8000 0 0x1000>; + #address-cells = <1>; + #size-cells = <1>; + + multi_chan_ddr: multi-chan-ddr@12b { + reg = <0x12b 0x1>; + bits = <0 2>; + }; + }; + }; + -- 2.41.0