From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 94693C4332F for ; Mon, 13 Dec 2021 15:45:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240188AbhLMPp0 (ORCPT ); Mon, 13 Dec 2021 10:45:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58486 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234484AbhLMPpZ (ORCPT ); Mon, 13 Dec 2021 10:45:25 -0500 Received: from mail-ot1-x32c.google.com (mail-ot1-x32c.google.com [IPv6:2607:f8b0:4864:20::32c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F3047C061574 for ; Mon, 13 Dec 2021 07:45:24 -0800 (PST) Received: by mail-ot1-x32c.google.com with SMTP id n17-20020a9d64d1000000b00579cf677301so17840541otl.8 for ; Mon, 13 Dec 2021 07:45:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=dQ0iYUP0JWxWxyVvkeGeGLlGPIXkHbinLcx5o3bfw2o=; b=GT2LUf8AZMMbJBvm19dhzHYN+vNChABVOEFBTkozsYpZC7hM/deocMT5X5GMYIDOek 5LBXg6Ot9xO7cq/Jk7zgArH4zvnKvrbCFxFNX8dsF13FJEKUga57PYX+I8Hi1ZfJAIK/ lbC6PuujBugYWprOiaNoUFWcBjLuSQX8QIWYLTNOIErrR3PFA/R/NZ5OZ1BQe0cyH2u0 nAxuEZuXTWTPI8uD3iiMIhXC+C6hwff7Bfdc2WEeE81/t/APcJ7o3YcoRbMbC+3Gxrb6 F71aYRG/1GESx3DTZCuueBZ/iX706Ujvo4hj5uB/ty469INRnDEZrTlkBjMLNWhE+0OQ nJPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=dQ0iYUP0JWxWxyVvkeGeGLlGPIXkHbinLcx5o3bfw2o=; b=0RAzHgNvduOjKulOvAVR9wMHsh2DxjF6w56ghS6I9HwMwhqyVZwygnAycCvzHLkd6Y O7uP1ZLSW424/QGJNUvJDBofTOIpKAtoH6oMnHlQlCdeY5hCvZpFhV6VscyxkVDmSgZ/ 7/ucY9jLFq6vwMvA999CFOhag78NiezNPIG9hRQhuu5AU0eSbUPiCWHyMc6G09B2FTrj 7ziq6+NlEwXiE9wn331JB/8nWS02+WdET0bEUBsfo3SapoczEf3BW22R3dOMrpb8LVWc c7gXK2eKaNCm2CJ1BHQuOaFMW9DRuqRg6kcRFAHrVDJE46ZhEkJKOjnB8hOx3wBHlAkO Srig== X-Gm-Message-State: AOAM533+U4iIoLSPLMdKzlkyccg7bwExBt0bd1bqwVZfte45JuHAbkJu zBoQ5hs5ov6QbYxF5delqiW3/A== X-Google-Smtp-Source: ABdhPJzNsAq/rJmgcNdCPksFNXX6L/lDEXt5jzOfIQryTdTz3diL0hIrAXJ+3WKe0bwcch9hGMFEwQ== X-Received: by 2002:a9d:6f13:: with SMTP id n19mr24707012otq.317.1639410324291; Mon, 13 Dec 2021 07:45:24 -0800 (PST) Received: from ripper (104-57-184-186.lightspeed.austtx.sbcglobal.net. [104.57.184.186]) by smtp.gmail.com with ESMTPSA id c8sm2281168otk.40.2021.12.13.07.45.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Dec 2021 07:45:23 -0800 (PST) Date: Mon, 13 Dec 2021 07:46:42 -0800 From: Bjorn Andersson To: Srinivas Kandagatla Cc: robh+dt@kernel.org, gregkh@linuxfoundation.org, devicetree@vger.kernel.org, ekangupt@qti.qualcomm.com, jeyr@codeaurora.org, bkumar@qti.qualcomm.com, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org Subject: Re: [PATCH v2 5/8] dt-bindings: misc: add property to support non-secure DSP Message-ID: References: <20211209120626.26373-1-srinivas.kandagatla@linaro.org> <20211209120626.26373-6-srinivas.kandagatla@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211209120626.26373-6-srinivas.kandagatla@linaro.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 09 Dec 04:06 PST 2021, Srinivas Kandagatla wrote: > From: Jeya R > > Add property to set DSP domain as non-secure. > > ADSP/MDSP/SDSP are by default secured, where as CDSP can be either be > secured/unsecured. > non-secured Compute DSP would allow users to load unsigned process > and run hexagon instructions, but limiting access to secured hardware > within the DSP. > > Based on this flag device nodes for secured and unsecured are created. > > Signed-off-by: Jeya R > Signed-off-by: Srinivas Kandagatla > --- > > This patch has dependency this yaml conversion patch: > https://lore.kernel.org/lkml/20211208101508.24582-1-david@ixit.cz/T/ > > Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml b/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml > index f42ab208a7fc..f0df0a3bf69f 100644 > --- a/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml > +++ b/Documentation/devicetree/bindings/misc/qcom,fastrpc.yaml > @@ -29,6 +29,11 @@ properties: > - sdsp > - cdsp > > + qcom,non-secure-domain: > + type: boolean > + description: > > + Property to specify that dsp domain is non-secure. "non-secure" feels vague, how about expressing it as "Specifies that the domains of this DSP instance may run unsigned programs." Perhaps even go so far to name the property qcom,allow-unsigned-programs? (Or some other word for "program"?) Regards, Bjorn > + > '#address-cells': > const: 1 > > -- > 2.21.0 >