arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi | 6 ++++++ 1 file changed, 6 insertions(+)
Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware
of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach
ensures secure SE assignment and access control, it limits flexibility for
developers who need to enable various protocols on different SEs.
Add the firmware-name property to QUPv3 nodes in the device tree to enable
firmware loading from the Linux environment. Handle SE assignments and
access control permissions directly within Linux, removing the dependency
on TrustZone.
Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com>
---
arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi | 6 ++++++
1 file changed, 6 insertions(+)
diff --git a/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi b/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
index 1a9e930c0496..c26eaf187b17 100644
--- a/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
+++ b/arch/arm64/boot/dts/qcom/hamoa-iot-som.dtsi
@@ -458,14 +458,20 @@ &pcie6a_phy {
};
&qupv3_0 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
&qupv3_1 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
&qupv3_2 {
+ firmware-name = "qcom/x1e80100/qupv3fw.elf";
+
status = "okay";
};
--
2.34.1
On Thu, 12 Feb 2026 16:25:57 +0800, Xueyao An wrote:
> Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware
> of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach
> ensures secure SE assignment and access control, it limits flexibility for
> developers who need to enable various protocols on different SEs.
>
> Add the firmware-name property to QUPv3 nodes in the device tree to enable
> firmware loading from the Linux environment. Handle SE assignments and
> access control permissions directly within Linux, removing the dependency
> on TrustZone.
>
> [...]
Applied, thanks!
[1/1] arm64: dts: qcom: hamoa-iot-som: Add firmware-name to QUPv3 nodes
commit: 2f50108a6c04e0a68ee82a54f2d209d9c7551002
Best regards,
--
Bjorn Andersson <andersson@kernel.org>
On 2/12/26 9:25 AM, Xueyao An wrote: > Traditionally, firmware loading for Serial Engines (SE) in the QUP hardware > of Qualcomm SoCs has been managed by TrustZone (TZ). While this approach > ensures secure SE assignment and access control, it limits flexibility for > developers who need to enable various protocols on different SEs. > > Add the firmware-name property to QUPv3 nodes in the device tree to enable > firmware loading from the Linux environment. Handle SE assignments and > access control permissions directly within Linux, removing the dependency > on TrustZone. > > Signed-off-by: Xueyao An <xueyao.an@oss.qualcomm.com> > --- Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com> Konrad
© 2016 - 2026 Red Hat, Inc.