Received: by 2002:ab2:6d45:0:b0:1fb:d597:ff75 with SMTP id d5csp71064lqr; Tue, 4 Jun 2024 21:52:05 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUULK50Lw9h7RaJDb3iM3SV0Kgi+8tUqWq6F1LzKYr9ZaPNMnB2CPUV8ISNpbCPieIbauCgWzHJ/f9q33R6phNa0T++alHaejwCLAoquQ== X-Google-Smtp-Source: AGHT+IF2DgU/sH4NWpP37qYK6wkJnXBA5rJW/jnXi8stZ7tPlNgjIHzzAa8ikiU+NhhN1ykYtW7k X-Received: by 2002:a05:622a:510:b0:43d:f0f8:1985 with SMTP id d75a77b69052e-4402b5ba5cbmr16890941cf.28.1717563125108; Tue, 04 Jun 2024 21:52:05 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717563125; cv=pass; d=google.com; s=arc-20160816; b=zDq74gEKn623fRZiFVJk6vYgVhvBeW14/fJK80UJ2qAivok2k/Wv0yOsgWdHp5Tg8E a3ze9G3Q3bKEvZ8nSFFadL3ahxS378yrtQtKoKw/GhuOXLSZk+MhTyvWMKvhTEEXq5Q5 s/caY5Wg+769TwxnwYzucYAfiR+dgz2Q4xmSWq6qkhcpwPUveORz3MoafFqZijJMeUxF mTVAC20DtMm7GiVGbTX834YW7m3VVdS7iKmeKpPD7nxktmcfAi6SOGlb+M4p5sRTziA8 QEemmza4AUUmMEhe4D3wX6OSjuHY3BUHpvyPTGCZcEyBEo8jP+mlQYxImG+sbuEXKLEa fY/w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:content-language:from :references:cc:to:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=wf3gaFytqWlIidX5fgAsIdyjNKy494CtFEQ8kw92qOI=; fh=6u2iDKrpubpx3kcLxwqhIE/BXGHhR269gbNOcpIZMBk=; b=LSlz68mUmIoA+QzCVmOTDB/kUTOvijTfhrSbgNSO4o5VPmdqZgyoGZIf8ycTcE35Zs N8tShVzuddKQft6AwUK0s5RbC7GPFjdyZqJGdejrnPsILyjEx1me+5bvZK4km0zT4wQN SomKHtrgReiiFm8Lm8ltbWyxnGpWWjlJ4ATX1geTYrxqHOfSsz/akFdYLRX2EaBuzZup ptxyFZevgishkizrtMXcSjcQLSqm0dDpN3U9Xe7ATba18TE/9DVlLOGtiNva/Gb6xgBA 0l/aJlalExH5OhLoy4JuXAnc+L7f3S50GrLMFo7vzVU0Unlsvm8OYmw9h9X3G0vPCsKn 8nAA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=Yu4m3KH0; arc=pass (i=1 spf=pass spfdomain=quicinc.com dkim=pass dkdomain=quicinc.com dmarc=pass fromdomain=quicinc.com); spf=pass (google.com: domain of linux-kernel+bounces-201755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201755-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id d75a77b69052e-43ff259c6d5si117690271cf.578.2024.06.04.21.52.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Jun 2024 21:52:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-201755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=Yu4m3KH0; arc=pass (i=1 spf=pass spfdomain=quicinc.com dkim=pass dkdomain=quicinc.com dmarc=pass fromdomain=quicinc.com); spf=pass (google.com: domain of linux-kernel+bounces-201755-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201755-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C2D881C22528 for ; Wed, 5 Jun 2024 04:52:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AE9D413A276; Wed, 5 Jun 2024 04:51:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=quicinc.com header.i=@quicinc.com header.b="Yu4m3KH0" Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EE9C9139D19; Wed, 5 Jun 2024 04:51:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.168.131 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717563106; cv=none; b=JZcFD95IYeIKujASTKMV9cFJLRfciDvB2kxCXBOsXhrSrSeSADwxCmbXfQxC0g1sJjIRl2X9Zhsfv/4KJJh1P+3che4Jjph0KTf9YYzJNdMc4r5QXqR5jYQzcJ5VsUzAdsc6ZJ0qOlMhC04mTWrnSQFwrv7GCkXPhFZqPSP8U+c= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717563106; c=relaxed/simple; bh=SUKMG8igZCm1udAIX7xmvYf8ftRUquMZbRBKcAdYIO0=; h=Message-ID:Date:MIME-Version:Subject:To:CC:References:From: In-Reply-To:Content-Type; b=dbVuVK6yZh3MMSyPYChysPtQpRtZcKBqd6dxKvET40q7gGtAEkSQl+50YWkHyWWy6X+TvjxB8HN2ax980/0Oplz0N7LCyCFCxNqvjuuEx1KUxKcrkjYP1pXQeAHVYeTAk+Xjxq8sVmWRJQyNB05nr9kJnOCzKCX0xYHjGv/DrPY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=quicinc.com; spf=pass smtp.mailfrom=quicinc.com; dkim=pass (2048-bit key) header.d=quicinc.com header.i=@quicinc.com header.b=Yu4m3KH0; arc=none smtp.client-ip=205.220.168.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=quicinc.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=quicinc.com Received: from pps.filterd (m0279867.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 454HHoj1003591; Wed, 5 Jun 2024 04:51:37 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=qcppdkim1; bh= wf3gaFytqWlIidX5fgAsIdyjNKy494CtFEQ8kw92qOI=; b=Yu4m3KH0dQUJXSXU JP+uoG0jhUysN66SW9/bZoWPZzqwk3J4voKhQ0MtDV20F4RhyElFpvVhlnntyzNp FzvB4pWQiL6g0NGeAfVOiG0F0goH3PyPPVMUjpRKrxD6hKFx2bzt9zr9TFAZtHJq cMbzA+mZpesaosUh20u1NtNY33A1Exwpb8OBzfofcZNaCn+SjuuhIN9HjnBNW9MR +vRJEjTtFWJ3vD6avrJOrohvcv+8Wdcjh3WXGo0rXkg6sZD3iwHhETgrRpRC8A0l MYDfi+R1Sm5d36Dg4qu+tFX5FJ249I1ZIUoWSgaamNF3XUsygabSMYcHPhTY2+C5 E9DGhw== Received: from nasanppmta04.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3yj76wh5am-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 05 Jun 2024 04:51:37 +0000 (GMT) Received: from nasanex01a.na.qualcomm.com (nasanex01a.na.qualcomm.com [10.52.223.231]) by NASANPPMTA04.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 4554pauT006080 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 5 Jun 2024 04:51:36 GMT Received: from [10.239.132.150] (10.80.80.8) by nasanex01a.na.qualcomm.com (10.52.223.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.9; Tue, 4 Jun 2024 21:51:29 -0700 Message-ID: <5a3a7033-0cc3-40cd-8560-2dfa6939fe7f@quicinc.com> Date: Wed, 5 Jun 2024 12:51:27 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v9 2/4] arm64: dts: qcom: qcs8550: introduce qcs8550 dtsi To: Caleb Connolly , Tengfei Fan , , , , , , CC: , , , References: <20240529100926.3166325-1-quic_tengfan@quicinc.com> <20240529100926.3166325-3-quic_tengfan@quicinc.com> <18ff1bf2-be4d-4d82-a4b3-28242b1d1d59@quicinc.com> <580f629d-6fae-4cf7-9137-f98b901ae29d@linaro.org> From: "Aiqun Yu (Maria)" Content-Language: en-US In-Reply-To: <580f629d-6fae-4cf7-9137-f98b901ae29d@linaro.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nasanex01a.na.qualcomm.com (10.52.223.231) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: n_q31qQsQuonKMzHG63JMHyallkAL7jE X-Proofpoint-ORIG-GUID: n_q31qQsQuonKMzHG63JMHyallkAL7jE X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-06-04_11,2024-06-04_02,2024-05-17_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 bulkscore=0 mlxscore=0 suspectscore=0 mlxlogscore=999 clxscore=1015 adultscore=0 impostorscore=0 malwarescore=0 priorityscore=1501 phishscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2405170001 definitions=main-2406050035 On 6/4/2024 7:20 PM, Caleb Connolly wrote: > > > On 04/06/2024 12:51, Aiqun Yu (Maria) wrote: >> >> >> On 6/3/2024 5:20 PM, Caleb Connolly wrote: >>> Hi Tengfei, >>> >>> On 29/05/2024 12:09, Tengfei Fan wrote: >>>> QCS8550 is derived from SM8550. The difference between SM8550 and >>>> QCS8550 is QCS8550 doesn't have modem RF system. QCS8550 is mainly used >>>> in IoT products. >>>> QCS8550 firmware has different memory map compared to SM8550. >>>> The memory map will be runtime added through bootloader. >>>> There are 3 types of reserved memory regions here: >>>> 1. Firmware related regions which aren't shared with kernel. >>>>       The device tree source in kernel doesn't need to have node to >>>> indicate >>>> the firmware related reserved information. Bootloader converys the >>>> information by updating devicetree at runtime. >>>>       This will be described as: UEFI saves the physical address of the >>>> UEFI System Table to dts file's chosen node. Kernel read this table and >>>> add reserved memory regions to efi config table. Current reserved >>>> memory >>>> region may have reserved region which was not yet used, release note of >>>> the firmware have such kind of information. >>> >>> Are you describing some particular quirk of the platform here, or just >>> standard UEFI booting? >> >> It's standard UEFI booting efi config table. > > Ok, thanks for confirming. >>> >>> When booting with UEFI, the memory map is passed via the ESRT, so having >>> memory that the kernel shouldn't use it pretty simple (and typical). > > woo! \o/ >> >> yes. It is very simple. And the bootloader firmware config the >> "reserved" region in the efi config table from the uefi firmware. >>>> 2. Firmware related memory regions which are shared with Kernel >>>>       The device tree source in the kernel needs to include nodes that >>>> indicate fimware-related shared information. A label name is suggested >>>> because this type of shared information needs to be referenced by >>>> specific drivers for handling purposes. >>> >>> Again, is there something non-standard here? If not I would suggest >>> dropping these detail comments as they might be misleading. >> >> Detailed comments is used to describe current device tree reserved >> memory regions. >> >> Current patch is not creating a new mechanism to have memory map >> described. But it is the first time qcom device trees use this design, >> and have a simplified(also more compatible) device tree reserved memory >> region(memory map). Previously, bootloader(apps bootloader) only pass >> the whole physical memory base and size, and use reserved memory nodes >> only in device tree(which is also a standard choose). >> >> So that's why it is detailed comments for other qcom platform reference. > > Doesn't the rb3gen2 also use this design? Checked current qcs6490-rb3gen2.dts still use the device tree to have all the reserved regions, even have detailed regions like "Firmware related regions which aren't shared with kernel." Not sure current qcs6490 firmware efi config table looks like, if it have all the reserved region marked carefully on efi config table, then device tree don't need to mention the reserved regions which is not shared to kernel. The qcom memory map in device tree discussion was happened after qcs6490 rb3gen2 time frame. efi config table is standard. But we still need to check what's the final config placed in the table for different platforms. I will suggest to have current qcs8550 as an example to config the current memory non-kernel needed to know region inside the efi config table in bootloader, and have kernel shared reserved region marked in the device tree. >> >>> >>> Thanks and regards, >>>> 3. Remoteproc regions. >>>>       Remoteproc regions will be reserved and then assigned to >>>> subsystem >>>> firmware later. >>>> Here is a reserved memory map for this platform: >>>> 0x100000000 +-------------------+ >>>>               |                   | >>>>               | Firmware Related  | >>>>               |                   | >>>>    0xd4d00000 +-------------------+ >>>>               |                   | >>>>               | Kernel Available  | >>>>               |                   | >>>>    0xa7000000 +-------------------+ >>>>               |                   | >>>>               | Remoteproc Region | >>>>               |                   | >>>>    0x8a800000 +-------------------+ >>>>               |                   | >>>>               | Firmware Related  | >>>>               |                   | >>>>    0x80000000 +-------------------+ >>>> >>>> Reviewed-by: Dmitry Baryshkov >>>> Signed-off-by: Tengfei Fan >>>> --- >>>>    arch/arm64/boot/dts/qcom/qcs8550.dtsi | 167 >>>> ++++++++++++++++++++++++++ >>>>    1 file changed, 167 insertions(+) >>>>    create mode 100644 arch/arm64/boot/dts/qcom/qcs8550.dtsi >>>> >>>> diff --git a/arch/arm64/boot/dts/qcom/qcs8550.dtsi >>>> b/arch/arm64/boot/dts/qcom/qcs8550.dtsi >>>> new file mode 100644 >>>> index 000000000000..685668c6ad14 >>>> --- /dev/null >>>> +++ b/arch/arm64/boot/dts/qcom/qcs8550.dtsi >>>> @@ -0,0 +1,167 @@ >>>> +// SPDX-License-Identifier: BSD-3-Clause >>>> +/* >>>> + * Copyright (c) 2023-2024, Qualcomm Innovation Center, Inc. All >>>> rights reserved. >>>> + */ >>>> + >>>> +#include "sm8550.dtsi" >>>> + >>>> +/delete-node/ &reserved_memory; >>>> + >>>> +/ { >>>> +    reserved_memory: reserved-memory { >>>> +        #address-cells = <2>; >>>> +        #size-cells = <2>; >>>> +        ranges; >>>> + >>>> + >>>> +        /* These are 3 types of reserved memory regions here: >>>> +         * 1. Firmware related regions which aren't shared with >>>> kernel. >>>> +         *     The device tree source in kernel doesn't need to have >>>> node to >>>> +         * indicate the firmware related reserved information. >>>> Bootloader >>>> +         * conveys the information by updating devicetree at runtime. >>>> +         *     This will be described as: UEFI saves the physical >>>> address of >>>> +         * the UEFI System Table to dts file's chosen node. Kernel >>>> read this >>>> +         * table and add reserved memory regions to efi config table. >>>> Current >>>> +         * reserved memory region may have reserved region which was >>>> not yet >>>> +         * used, release note of the firmware have such kind of >>>> information. >>>> +         * 2. Firmware related memory regions which are shared with >>>> Kernel >>>> +         *     The device tree source in the kernel needs to include >>>> nodes >>>> +         * that indicate fimware-related shared information. A label >>>> name >>>> +         * is suggested because this type of shared information >>>> needs to >>>> +         * be referenced by specific drivers for handling purposes. >>>> +         * 3. Remoteproc regions. >>>> +         *     Remoteproc regions will be reserved and then >>>> assigned to >>>> +         * subsystem firmware later. >>>> +         * Here is a reserved memory map for this platform: >>>> +         * 0x100000000 +-------------------+ >>>> +         *             |                   | >>>> +         *             | Firmware Related  | >>>> +         *             |                   | >>>> +         *  0xd4d00000 +-------------------+ >>>> +         *             |                   | >>>> +         *             | Kernel Available  | >>>> +         *             |                   | >>>> +         *  0xa7000000 +-------------------+ >>>> +         *             |                   | >>>> +         *             | Remoteproc Region | >>>> +         *             |                   | >>>> +         *  0x8a800000 +-------------------+ >>>> +         *             |                   | >>>> +         *             | Firmware Related  | >>>> +         *             |                   | >>>> +         *  0x80000000 +-------------------+ >>>> +         */ >>>> + >>>> +        /* >>>> +         * Firmware related regions, bootloader will possible reserve >>>> parts of >>>> +         * region from 0x80000000..0x8a800000. >>>> +         */ >>>> +        aop_image_mem: aop-image-region@81c00000 { >>>> +            reg = <0x0 0x81c00000 0x0 0x60000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        aop_cmd_db_mem: aop-cmd-db-region@81c60000 { >>>> +            compatible = "qcom,cmd-db"; >>>> +            reg = <0x0 0x81c60000 0x0 0x20000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        aop_config_mem: aop-config-region@81c80000 { >>>> +            no-map; >>>> +            reg = <0x0 0x81c80000 0x0 0x20000>; >>>> +        }; >>>> + >>>> +        smem_mem: smem-region@81d00000 { >>>> +            compatible = "qcom,smem"; >>>> +            reg = <0x0 0x81d00000 0x0 0x200000>; >>>> +            hwlocks = <&tcsr_mutex 3>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        adsp_mhi_mem: adsp-mhi-region@81f00000 { >>>> +            reg = <0x0 0x81f00000 0x0 0x20000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        /* PIL region */ >>>> +        mpss_mem: mpss-region@8a800000 { >>>> +            reg = <0x0 0x8a800000 0x0 0x10800000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        q6_mpss_dtb_mem: q6-mpss-dtb-region@9b000000 { >>>> +            reg = <0x0 0x9b000000 0x0 0x80000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        ipa_fw_mem: ipa-fw-region@9b080000 { >>>> +            reg = <0x0 0x9b080000 0x0 0x10000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        ipa_gsi_mem: ipa-gsi-region@9b090000 { >>>> +            reg = <0x0 0x9b090000 0x0 0xa000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        gpu_micro_code_mem: gpu-micro-code-region@9b09a000 { >>>> +            reg = <0x0 0x9b09a000 0x0 0x2000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        spss_region_mem: spss-region@9b100000 { >>>> +            reg = <0x0 0x9b100000 0x0 0x180000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        spu_secure_shared_memory_mem: >>>> spu-secure-shared-memory-region@9b280000 { >>>> +            reg = <0x0 0x9b280000 0x0 0x80000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        camera_mem: camera-region@9b300000 { >>>> +            reg = <0x0 0x9b300000 0x0 0x800000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        video_mem: video-region@9bb00000 { >>>> +            reg = <0x0 0x9bb00000 0x0 0x700000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        cvp_mem: cvp-region@9c200000 { >>>> +            reg = <0x0 0x9c200000 0x0 0x700000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        cdsp_mem: cdsp-region@9c900000 { >>>> +            reg = <0x0 0x9c900000 0x0 0x2000000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        q6_cdsp_dtb_mem: q6-cdsp-dtb-region@9e900000 { >>>> +            reg = <0x0 0x9e900000 0x0 0x80000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        q6_adsp_dtb_mem: q6-adsp-dtb-region@9e980000 { >>>> +            reg = <0x0 0x9e980000 0x0 0x80000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        adspslpi_mem: adspslpi-region@9ea00000 { >>>> +            reg = <0x0 0x9ea00000 0x0 0x4080000>; >>>> +            no-map; >>>> +        }; >>>> + >>>> +        /* >>>> +         * Firmware related regions, bootloader will possible reserve >>>> parts of >>>> +         * region from 0xd8000000..0x100000000. >>>> +         */ >>>> +        mpss_dsm_mem: mpss_dsm_region@d4d00000 { >>>> +            reg = <0x0 0xd4d00000 0x0 0x3300000>; >>>> +            no-map; >>>> +        }; >>>> +    }; >>>> +}; >>> >> > -- Thx and BRs, Aiqun(Maria) Yu